E2E tests done

This commit is contained in:
DarkGopher 2025-06-08 21:24:21 +02:00
parent e7c9034d2c
commit 23a192635e
4 changed files with 32 additions and 22 deletions

View file

@ -46,7 +46,6 @@ func (ts *TestServer) Serve() {
mux.HandleFunc("/deletesessionvar", ts.deleteSessionValue)
mux.HandleFunc("/validatedeletedvar", ts.validateDeletedValue)
mux.HandleFunc("/sessionGC", ts.sessionGC) //ck
mux.HandleFunc("/", ts.root)
testserver = httptest.NewUnstartedServer(mux)
testserver.EnableHTTP2 = true
testserver.StartTLS()
@ -176,17 +175,17 @@ func (ts *TestServer) validateDeletedValue(w http.ResponseWriter, r *http.Reques
}
func (ts *TestServer) sessionGC(w http.ResponseWriter, r *http.Request) {
var ses session.Session
var err error
if _, err = sm.SessionStart(w, r); err != nil {
if ses, err = sm.SessionStart(w, r); err != nil {
io.WriteString(w, err.Error())
return
}
time.Sleep(200 * time.Millisecond)
io.WriteString(w, "OK")
}
func (ts *TestServer) root(w http.ResponseWriter, r *http.Request) {
if r.Header.Get("Cookie") != "" {
io.WriteString(w, fmt.Sprintf("Cookie send after end session: %v", r.Header.Get("Cookie")))
if sm.Exists(ses.SessionID()) {
io.WriteString(w, fmt.Sprintf("Session id: %s must not exists in storage after GC",
ses.SessionID()))
return
}
io.WriteString(w, "OK")
}
@ -279,12 +278,6 @@ func t9(t *testing.T) {
}
}
func t10(t *testing.T) {
if err := CheckRequestOK("/"); err != nil {
t.Error(err)
}
}
// iterate all session storage impls. and run t1 - t7
func TestRunAll(t *testing.T) {
ts := &TestServer{}
@ -297,7 +290,7 @@ func TestRunAll(t *testing.T) {
if sm, err = session.NewManager(pn, sid, lifet, true); err != nil {
t.Errorf("Session provider %s failed initialize err: %v", pn, err)
}
fns := []func(t *testing.T){t1, t2, t3, t4, t5, t6, t7, t8, t9, t10}
fns := []func(t *testing.T){t1, t2, t3, t4, t5, t6, t7, t8, t9}
for idx, fn := range fns {
t.Run(fmt.Sprintf("Test%d", idx+1), fn)
}