spikard 0.4.0-x86_64-linux

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (138) hide show
  1. checksums.yaml +7 -0
  2. data/LICENSE +1 -0
  3. data/README.md +659 -0
  4. data/ext/spikard_rb/Cargo.toml +17 -0
  5. data/ext/spikard_rb/extconf.rb +10 -0
  6. data/ext/spikard_rb/src/lib.rs +6 -0
  7. data/lib/spikard/app.rb +405 -0
  8. data/lib/spikard/background.rb +27 -0
  9. data/lib/spikard/config.rb +396 -0
  10. data/lib/spikard/converters.rb +13 -0
  11. data/lib/spikard/handler_wrapper.rb +113 -0
  12. data/lib/spikard/provide.rb +214 -0
  13. data/lib/spikard/response.rb +173 -0
  14. data/lib/spikard/schema.rb +243 -0
  15. data/lib/spikard/sse.rb +111 -0
  16. data/lib/spikard/streaming_response.rb +44 -0
  17. data/lib/spikard/testing.rb +221 -0
  18. data/lib/spikard/upload_file.rb +131 -0
  19. data/lib/spikard/version.rb +5 -0
  20. data/lib/spikard/websocket.rb +59 -0
  21. data/lib/spikard.rb +43 -0
  22. data/sig/spikard.rbs +366 -0
  23. data/vendor/bundle/ruby/3.4.0/gems/diff-lcs-1.6.2/mise.toml +5 -0
  24. data/vendor/bundle/ruby/3.4.0/gems/rake-compiler-dock-1.10.0/build/buildkitd.toml +2 -0
  25. data/vendor/crates/spikard-bindings-shared/Cargo.toml +63 -0
  26. data/vendor/crates/spikard-bindings-shared/examples/config_extraction.rs +139 -0
  27. data/vendor/crates/spikard-bindings-shared/src/config_extractor.rs +561 -0
  28. data/vendor/crates/spikard-bindings-shared/src/conversion_traits.rs +194 -0
  29. data/vendor/crates/spikard-bindings-shared/src/di_traits.rs +246 -0
  30. data/vendor/crates/spikard-bindings-shared/src/error_response.rs +403 -0
  31. data/vendor/crates/spikard-bindings-shared/src/handler_base.rs +274 -0
  32. data/vendor/crates/spikard-bindings-shared/src/lib.rs +25 -0
  33. data/vendor/crates/spikard-bindings-shared/src/lifecycle_base.rs +298 -0
  34. data/vendor/crates/spikard-bindings-shared/src/lifecycle_executor.rs +637 -0
  35. data/vendor/crates/spikard-bindings-shared/src/response_builder.rs +309 -0
  36. data/vendor/crates/spikard-bindings-shared/src/test_client_base.rs +248 -0
  37. data/vendor/crates/spikard-bindings-shared/src/validation_helpers.rs +355 -0
  38. data/vendor/crates/spikard-bindings-shared/tests/comprehensive_coverage.rs +502 -0
  39. data/vendor/crates/spikard-bindings-shared/tests/error_response_edge_cases.rs +389 -0
  40. data/vendor/crates/spikard-bindings-shared/tests/handler_base_integration.rs +413 -0
  41. data/vendor/crates/spikard-core/Cargo.toml +40 -0
  42. data/vendor/crates/spikard-core/src/bindings/mod.rs +3 -0
  43. data/vendor/crates/spikard-core/src/bindings/response.rs +133 -0
  44. data/vendor/crates/spikard-core/src/debug.rs +63 -0
  45. data/vendor/crates/spikard-core/src/di/container.rs +726 -0
  46. data/vendor/crates/spikard-core/src/di/dependency.rs +273 -0
  47. data/vendor/crates/spikard-core/src/di/error.rs +118 -0
  48. data/vendor/crates/spikard-core/src/di/factory.rs +538 -0
  49. data/vendor/crates/spikard-core/src/di/graph.rs +545 -0
  50. data/vendor/crates/spikard-core/src/di/mod.rs +192 -0
  51. data/vendor/crates/spikard-core/src/di/resolved.rs +411 -0
  52. data/vendor/crates/spikard-core/src/di/value.rs +283 -0
  53. data/vendor/crates/spikard-core/src/errors.rs +39 -0
  54. data/vendor/crates/spikard-core/src/http.rs +153 -0
  55. data/vendor/crates/spikard-core/src/lib.rs +29 -0
  56. data/vendor/crates/spikard-core/src/lifecycle.rs +422 -0
  57. data/vendor/crates/spikard-core/src/metadata.rs +397 -0
  58. data/vendor/crates/spikard-core/src/parameters.rs +723 -0
  59. data/vendor/crates/spikard-core/src/problem.rs +310 -0
  60. data/vendor/crates/spikard-core/src/request_data.rs +189 -0
  61. data/vendor/crates/spikard-core/src/router.rs +249 -0
  62. data/vendor/crates/spikard-core/src/schema_registry.rs +183 -0
  63. data/vendor/crates/spikard-core/src/type_hints.rs +304 -0
  64. data/vendor/crates/spikard-core/src/validation/error_mapper.rs +689 -0
  65. data/vendor/crates/spikard-core/src/validation/mod.rs +459 -0
  66. data/vendor/crates/spikard-http/Cargo.toml +58 -0
  67. data/vendor/crates/spikard-http/examples/sse-notifications.rs +147 -0
  68. data/vendor/crates/spikard-http/examples/websocket-chat.rs +91 -0
  69. data/vendor/crates/spikard-http/src/auth.rs +247 -0
  70. data/vendor/crates/spikard-http/src/background.rs +1562 -0
  71. data/vendor/crates/spikard-http/src/bindings/mod.rs +3 -0
  72. data/vendor/crates/spikard-http/src/bindings/response.rs +1 -0
  73. data/vendor/crates/spikard-http/src/body_metadata.rs +8 -0
  74. data/vendor/crates/spikard-http/src/cors.rs +490 -0
  75. data/vendor/crates/spikard-http/src/debug.rs +63 -0
  76. data/vendor/crates/spikard-http/src/di_handler.rs +1878 -0
  77. data/vendor/crates/spikard-http/src/handler_response.rs +532 -0
  78. data/vendor/crates/spikard-http/src/handler_trait.rs +861 -0
  79. data/vendor/crates/spikard-http/src/handler_trait_tests.rs +284 -0
  80. data/vendor/crates/spikard-http/src/lib.rs +524 -0
  81. data/vendor/crates/spikard-http/src/lifecycle/adapter.rs +149 -0
  82. data/vendor/crates/spikard-http/src/lifecycle.rs +428 -0
  83. data/vendor/crates/spikard-http/src/middleware/mod.rs +285 -0
  84. data/vendor/crates/spikard-http/src/middleware/multipart.rs +930 -0
  85. data/vendor/crates/spikard-http/src/middleware/urlencoded.rs +541 -0
  86. data/vendor/crates/spikard-http/src/middleware/validation.rs +287 -0
  87. data/vendor/crates/spikard-http/src/openapi/mod.rs +309 -0
  88. data/vendor/crates/spikard-http/src/openapi/parameter_extraction.rs +535 -0
  89. data/vendor/crates/spikard-http/src/openapi/schema_conversion.rs +867 -0
  90. data/vendor/crates/spikard-http/src/openapi/spec_generation.rs +678 -0
  91. data/vendor/crates/spikard-http/src/query_parser.rs +369 -0
  92. data/vendor/crates/spikard-http/src/response.rs +399 -0
  93. data/vendor/crates/spikard-http/src/server/handler.rs +1557 -0
  94. data/vendor/crates/spikard-http/src/server/lifecycle_execution.rs +98 -0
  95. data/vendor/crates/spikard-http/src/server/mod.rs +806 -0
  96. data/vendor/crates/spikard-http/src/server/request_extraction.rs +630 -0
  97. data/vendor/crates/spikard-http/src/server/routing_factory.rs +497 -0
  98. data/vendor/crates/spikard-http/src/sse.rs +961 -0
  99. data/vendor/crates/spikard-http/src/testing/form.rs +14 -0
  100. data/vendor/crates/spikard-http/src/testing/multipart.rs +60 -0
  101. data/vendor/crates/spikard-http/src/testing/test_client.rs +285 -0
  102. data/vendor/crates/spikard-http/src/testing.rs +377 -0
  103. data/vendor/crates/spikard-http/src/websocket.rs +831 -0
  104. data/vendor/crates/spikard-http/tests/background_behavior.rs +918 -0
  105. data/vendor/crates/spikard-http/tests/common/handlers.rs +308 -0
  106. data/vendor/crates/spikard-http/tests/common/mod.rs +21 -0
  107. data/vendor/crates/spikard-http/tests/di_integration.rs +202 -0
  108. data/vendor/crates/spikard-http/tests/doc_snippets.rs +4 -0
  109. data/vendor/crates/spikard-http/tests/lifecycle_execution.rs +1135 -0
  110. data/vendor/crates/spikard-http/tests/multipart_behavior.rs +688 -0
  111. data/vendor/crates/spikard-http/tests/server_config_builder.rs +324 -0
  112. data/vendor/crates/spikard-http/tests/sse_behavior.rs +728 -0
  113. data/vendor/crates/spikard-http/tests/websocket_behavior.rs +724 -0
  114. data/vendor/crates/spikard-rb/Cargo.toml +43 -0
  115. data/vendor/crates/spikard-rb/build.rs +199 -0
  116. data/vendor/crates/spikard-rb/src/background.rs +63 -0
  117. data/vendor/crates/spikard-rb/src/config/mod.rs +5 -0
  118. data/vendor/crates/spikard-rb/src/config/server_config.rs +283 -0
  119. data/vendor/crates/spikard-rb/src/conversion.rs +459 -0
  120. data/vendor/crates/spikard-rb/src/di/builder.rs +105 -0
  121. data/vendor/crates/spikard-rb/src/di/mod.rs +413 -0
  122. data/vendor/crates/spikard-rb/src/handler.rs +612 -0
  123. data/vendor/crates/spikard-rb/src/integration/mod.rs +3 -0
  124. data/vendor/crates/spikard-rb/src/lib.rs +1857 -0
  125. data/vendor/crates/spikard-rb/src/lifecycle.rs +275 -0
  126. data/vendor/crates/spikard-rb/src/metadata/mod.rs +5 -0
  127. data/vendor/crates/spikard-rb/src/metadata/route_extraction.rs +427 -0
  128. data/vendor/crates/spikard-rb/src/runtime/mod.rs +5 -0
  129. data/vendor/crates/spikard-rb/src/runtime/server_runner.rs +326 -0
  130. data/vendor/crates/spikard-rb/src/server.rs +283 -0
  131. data/vendor/crates/spikard-rb/src/sse.rs +231 -0
  132. data/vendor/crates/spikard-rb/src/testing/client.rs +404 -0
  133. data/vendor/crates/spikard-rb/src/testing/mod.rs +7 -0
  134. data/vendor/crates/spikard-rb/src/testing/sse.rs +143 -0
  135. data/vendor/crates/spikard-rb/src/testing/websocket.rs +221 -0
  136. data/vendor/crates/spikard-rb/src/websocket.rs +233 -0
  137. data/vendor/crates/spikard-rb/tests/magnus_ffi_tests.rs +14 -0
  138. metadata +213 -0
@@ -0,0 +1,688 @@
1
+ //! Behavioral tests for multipart form data handling in spikard-http
2
+ //!
3
+ //! These tests verify observable behavior of the multipart parser through real HTTP requests
4
+ //! and response outcomes, not parsing internals. They test edge cases, error conditions,
5
+ //! and unusual input patterns to ensure robust handling of form data.
6
+
7
+ mod common;
8
+
9
+ use axum::body::Body;
10
+ use axum::extract::FromRequest;
11
+ use axum::extract::Multipart;
12
+ use axum::http::Request;
13
+
14
+ /// Helper to create a multipart body with proper RFC 7578 formatting
15
+ fn create_multipart_body(boundary: &str, parts: Vec<String>) -> Vec<u8> {
16
+ let mut body = Vec::new();
17
+ for part in parts {
18
+ body.extend_from_slice(format!("--{}\r\n", boundary).as_bytes());
19
+ body.extend_from_slice(part.as_bytes());
20
+ body.extend_from_slice(b"\r\n");
21
+ }
22
+ body.extend_from_slice(format!("--{}--\r\n", boundary).as_bytes());
23
+ body
24
+ }
25
+
26
+ /// Test 1: Large file upload (>1MB) streaming behavior
27
+ /// Verifies that large files are properly handled and marked as binary/streaming
28
+ #[tokio::test]
29
+ async fn test_large_file_upload_streaming_behavior() {
30
+ let boundary = "multipart-boundary";
31
+
32
+ // Create a file just over 1MB to trigger binary handling
33
+ // We use a modest size to avoid memory issues in tests
34
+ let large_file_size = 1024 * 1024 + 512; // 1MB + 512 bytes
35
+ let large_file_content: Vec<u8> = (0..large_file_size).map(|i| (i % 256) as u8).collect();
36
+
37
+ let mut body = Vec::new();
38
+ body.extend_from_slice(format!("--{}\r\n", boundary).as_bytes());
39
+ body.extend_from_slice(b"Content-Disposition: form-data; name=\"large_upload\"; filename=\"large_file.bin\"\r\nContent-Type: application/octet-stream\r\n\r\n");
40
+ body.extend_from_slice(&large_file_content);
41
+ body.extend_from_slice(b"\r\n");
42
+ body.extend_from_slice(format!("--{}--\r\n", boundary).as_bytes());
43
+
44
+ let request = Request::builder()
45
+ .method("POST")
46
+ .header("content-type", format!("multipart/form-data; boundary={}", boundary))
47
+ .body(Body::from(body))
48
+ .unwrap();
49
+
50
+ let multipart = Multipart::from_request(request, &()).await.unwrap();
51
+ let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
52
+ .await
53
+ .unwrap();
54
+
55
+ let obj = result.as_object().unwrap();
56
+ assert!(obj.contains_key("large_upload"));
57
+
58
+ let file_obj = &obj["large_upload"];
59
+
60
+ // Verify file metadata is captured
61
+ assert!(file_obj["filename"].is_string());
62
+ assert_eq!(file_obj["filename"], "large_file.bin");
63
+ assert!(file_obj["size"].is_number());
64
+ assert_eq!(file_obj["size"], large_file_size);
65
+
66
+ // Verify large file is marked as binary (not fully buffered)
67
+ let content = file_obj["content"].as_str().unwrap();
68
+ assert!(content.contains("<binary data"));
69
+ assert!(content.contains("bytes"));
70
+ }
71
+
72
+ /// Test 2: Boundary string appearing in file data
73
+ /// Verifies that boundary strings within file content don't break parsing
74
+ #[tokio::test]
75
+ async fn test_boundary_string_in_file_data() {
76
+ let boundary = "boundary123";
77
+
78
+ // File content contains the boundary string itself
79
+ let file_content = "This file contains --boundary123 in the data\nBut it should not confuse the parser";
80
+ let parts = vec![format!(
81
+ "Content-Disposition: form-data; name=\"file\"; filename=\"tricky.txt\"\r\nContent-Type: text/plain\r\n\r\n{}",
82
+ file_content
83
+ )];
84
+
85
+ let body = create_multipart_body(boundary, parts);
86
+
87
+ let request = Request::builder()
88
+ .method("POST")
89
+ .header("content-type", format!("multipart/form-data; boundary={}", boundary))
90
+ .body(Body::from(body))
91
+ .unwrap();
92
+
93
+ let multipart = Multipart::from_request(request, &()).await.unwrap();
94
+ let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
95
+ .await
96
+ .unwrap();
97
+
98
+ let obj = result.as_object().unwrap();
99
+ assert!(obj.contains_key("file"));
100
+
101
+ // Verify content is preserved exactly as uploaded
102
+ let returned_content = obj["file"]["content"].as_str().unwrap();
103
+ assert_eq!(returned_content, file_content);
104
+ assert!(returned_content.contains("--boundary123"));
105
+ }
106
+
107
+ /// Test 3: Mixed file and form field ordering
108
+ /// Verifies that files and fields can be interleaved and all are captured correctly
109
+ #[tokio::test]
110
+ async fn test_mixed_file_and_form_field_ordering() {
111
+ let boundary = "mixed-boundary";
112
+ let parts = vec![
113
+ "Content-Disposition: form-data; name=\"field1\"\r\n\r\nValue 1".to_string(),
114
+ "Content-Disposition: form-data; name=\"upload1\"; filename=\"file1.txt\"\r\nContent-Type: text/plain\r\n\r\nFile 1 content".to_string(),
115
+ "Content-Disposition: form-data; name=\"field2\"\r\n\r\nValue 2".to_string(),
116
+ "Content-Disposition: form-data; name=\"upload2\"; filename=\"file2.txt\"\r\nContent-Type: text/plain\r\n\r\nFile 2 content".to_string(),
117
+ "Content-Disposition: form-data; name=\"field3\"\r\n\r\nValue 3".to_string(),
118
+ ];
119
+
120
+ let body = create_multipart_body(boundary, parts);
121
+
122
+ let request = Request::builder()
123
+ .method("POST")
124
+ .header("content-type", format!("multipart/form-data; boundary={}", boundary))
125
+ .body(Body::from(body))
126
+ .unwrap();
127
+
128
+ let multipart = Multipart::from_request(request, &()).await.unwrap();
129
+ let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
130
+ .await
131
+ .unwrap();
132
+
133
+ let obj = result.as_object().unwrap();
134
+
135
+ // Verify all fields present regardless of order
136
+ assert_eq!(obj["field1"], "Value 1");
137
+ assert_eq!(obj["field2"], "Value 2");
138
+ assert_eq!(obj["field3"], "Value 3");
139
+
140
+ // Verify files are captured with metadata
141
+ assert!(obj["upload1"].is_object());
142
+ assert!(obj["upload2"].is_object());
143
+ assert_eq!(obj["upload1"]["filename"], "file1.txt");
144
+ assert_eq!(obj["upload2"]["filename"], "file2.txt");
145
+ }
146
+
147
+ /// Test 4: Invalid UTF-8 in text fields
148
+ /// Verifies graceful handling of non-UTF8 data in text fields with lossy conversion
149
+ #[tokio::test]
150
+ async fn test_invalid_utf8_in_text_fields() {
151
+ let boundary = "boundary123";
152
+ let mut body = Vec::new();
153
+
154
+ body.extend_from_slice(format!("--{}\r\n", boundary).as_bytes());
155
+ body.extend_from_slice(b"Content-Disposition: form-data; name=\"text_field\"\r\n\r\n");
156
+
157
+ // Append valid UTF-8
158
+ body.extend_from_slice(b"Valid UTF-8: ");
159
+
160
+ // Append invalid UTF-8 sequence
161
+ body.extend_from_slice(&[0xFF, 0xFE, 0xFD]);
162
+
163
+ // Append more valid UTF-8
164
+ body.extend_from_slice(b" and more valid");
165
+
166
+ body.extend_from_slice(b"\r\n");
167
+ body.extend_from_slice(format!("--{}--\r\n", boundary).as_bytes());
168
+
169
+ let request = Request::builder()
170
+ .method("POST")
171
+ .header("content-type", format!("multipart/form-data; boundary={}", boundary))
172
+ .body(Body::from(body))
173
+ .unwrap();
174
+
175
+ let multipart = Multipart::from_request(request, &()).await.unwrap();
176
+ let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
177
+ .await
178
+ .unwrap();
179
+
180
+ let obj = result.as_object().unwrap();
181
+
182
+ // Verify field exists and contains lossy-decoded content
183
+ assert!(obj.contains_key("text_field"));
184
+ let text_value = obj["text_field"].as_str().unwrap();
185
+
186
+ // The invalid bytes should be replaced with replacement character (handled by from_utf8_lossy)
187
+ assert!(text_value.contains("Valid UTF-8:"));
188
+ assert!(text_value.contains("and more valid"));
189
+ }
190
+
191
+ /// Test 5: Malformed multipart bodies (missing headers)
192
+ /// Verifies that the parser handles structural errors gracefully
193
+ #[tokio::test]
194
+ async fn test_malformed_multipart_missing_content_disposition() {
195
+ let boundary = "boundary123";
196
+ let mut body = Vec::new();
197
+
198
+ body.extend_from_slice(format!("--{}\r\n", boundary).as_bytes());
199
+ // Missing Content-Disposition header - just try to add content directly
200
+ body.extend_from_slice(b"\r\n");
201
+ body.extend_from_slice(b"orphaned content");
202
+ body.extend_from_slice(b"\r\n");
203
+ body.extend_from_slice(format!("--{}--\r\n", boundary).as_bytes());
204
+
205
+ let request = Request::builder()
206
+ .method("POST")
207
+ .header("content-type", format!("multipart/form-data; boundary={}", boundary))
208
+ .body(Body::from(body))
209
+ .unwrap();
210
+
211
+ let multipart = Multipart::from_request(request, &()).await.unwrap();
212
+
213
+ // Should handle gracefully - either returning empty or error depending on implementation
214
+ let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart).await;
215
+
216
+ // Verify behavior is defined (not panic)
217
+ if let Ok(parsed) = result {
218
+ // If it succeeds, verify result is reasonable (likely empty object)
219
+ assert!(parsed.is_object());
220
+ }
221
+ }
222
+
223
+ /// Test 6: Duplicate field names aggregation
224
+ /// Verifies that multiple values with same field name are properly aggregated into arrays
225
+ #[tokio::test]
226
+ async fn test_duplicate_field_names_aggregation() {
227
+ let boundary = "boundary123";
228
+ let parts = vec![
229
+ "Content-Disposition: form-data; name=\"tags\"\r\n\r\nrust".to_string(),
230
+ "Content-Disposition: form-data; name=\"tags\"\r\n\r\nweb".to_string(),
231
+ "Content-Disposition: form-data; name=\"tags\"\r\n\r\napi".to_string(),
232
+ "Content-Disposition: form-data; name=\"tags\"\r\n\r\nserver".to_string(),
233
+ ];
234
+
235
+ let body = create_multipart_body(boundary, parts);
236
+
237
+ let request = Request::builder()
238
+ .method("POST")
239
+ .header("content-type", format!("multipart/form-data; boundary={}", boundary))
240
+ .body(Body::from(body))
241
+ .unwrap();
242
+
243
+ let multipart = Multipart::from_request(request, &()).await.unwrap();
244
+ let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
245
+ .await
246
+ .unwrap();
247
+
248
+ let obj = result.as_object().unwrap();
249
+ assert!(obj.contains_key("tags"));
250
+
251
+ let tags = &obj["tags"];
252
+ assert!(
253
+ tags.is_array(),
254
+ "Multiple values with same name should be aggregated into array"
255
+ );
256
+
257
+ let tags_array = tags.as_array().unwrap();
258
+ assert_eq!(tags_array.len(), 4, "All 4 tag values should be present");
259
+ assert_eq!(tags_array[0], "rust");
260
+ assert_eq!(tags_array[1], "web");
261
+ assert_eq!(tags_array[2], "api");
262
+ assert_eq!(tags_array[3], "server");
263
+ }
264
+
265
+ /// Test 7: Upload timeout behavior with streaming files
266
+ /// Verifies that streaming large files doesn't cause handlers to timeout
267
+ /// (Tests observable streaming behavior, not timeout mechanics)
268
+ #[tokio::test]
269
+ async fn test_large_streaming_file_completes() {
270
+ let boundary = "stream-boundary";
271
+
272
+ // Create a file just over 1MB to ensure binary handling
273
+ let streaming_file_size = 1024 * 1024 + 256 * 1024; // 1.25 MB
274
+ let streaming_file: Vec<u8> = (0..streaming_file_size).map(|i| ((i >> 8) % 256) as u8).collect();
275
+
276
+ let mut body = Vec::new();
277
+ body.extend_from_slice(format!("--{}\r\n", boundary).as_bytes());
278
+ body.extend_from_slice(b"Content-Disposition: form-data; name=\"stream_upload\"; filename=\"stream.dat\"\r\nContent-Type: application/octet-stream\r\n\r\n");
279
+ body.extend_from_slice(&streaming_file);
280
+ body.extend_from_slice(b"\r\n");
281
+ body.extend_from_slice(format!("--{}--\r\n", boundary).as_bytes());
282
+
283
+ let request = Request::builder()
284
+ .method("POST")
285
+ .header("content-type", format!("multipart/form-data; boundary={}", boundary))
286
+ .body(Body::from(body))
287
+ .unwrap();
288
+
289
+ let multipart = Multipart::from_request(request, &()).await.unwrap();
290
+
291
+ // Parse should complete successfully for large streaming file
292
+ let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart).await;
293
+
294
+ assert!(result.is_ok(), "Large streaming file should parse without timeout");
295
+
296
+ let parsed = result.unwrap();
297
+ let obj = parsed.as_object().unwrap();
298
+ assert!(obj.contains_key("stream_upload"));
299
+
300
+ // Verify size is correctly captured
301
+ assert_eq!(obj["stream_upload"]["size"], streaming_file_size);
302
+ }
303
+
304
+ /// Test 8: Multiple files with same field name
305
+ /// Verifies that multiple file uploads with identical field names are aggregated correctly
306
+ #[tokio::test]
307
+ async fn test_multiple_file_uploads_same_field_name() {
308
+ let boundary = "boundary123";
309
+ let parts = vec![
310
+ "Content-Disposition: form-data; name=\"attachments\"; filename=\"file1.txt\"\r\nContent-Type: text/plain\r\n\r\nFirst file content".to_string(),
311
+ "Content-Disposition: form-data; name=\"attachments\"; filename=\"file2.txt\"\r\nContent-Type: text/plain\r\n\r\nSecond file content".to_string(),
312
+ "Content-Disposition: form-data; name=\"attachments\"; filename=\"file3.txt\"\r\nContent-Type: text/plain\r\n\r\nThird file content".to_string(),
313
+ ];
314
+
315
+ let body = create_multipart_body(boundary, parts);
316
+
317
+ let request = Request::builder()
318
+ .method("POST")
319
+ .header("content-type", format!("multipart/form-data; boundary={}", boundary))
320
+ .body(Body::from(body))
321
+ .unwrap();
322
+
323
+ let multipart = Multipart::from_request(request, &()).await.unwrap();
324
+ let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
325
+ .await
326
+ .unwrap();
327
+
328
+ let obj = result.as_object().unwrap();
329
+ assert!(obj.contains_key("attachments"));
330
+
331
+ let attachments = &obj["attachments"];
332
+ assert!(
333
+ attachments.is_array(),
334
+ "Multiple files with same name should be aggregated"
335
+ );
336
+
337
+ let files = attachments.as_array().unwrap();
338
+ assert_eq!(files.len(), 3, "All 3 file uploads should be present");
339
+
340
+ // Verify each file's metadata
341
+ assert_eq!(files[0]["filename"], "file1.txt");
342
+ assert_eq!(files[0]["content"], "First file content");
343
+
344
+ assert_eq!(files[1]["filename"], "file2.txt");
345
+ assert_eq!(files[1]["content"], "Second file content");
346
+
347
+ assert_eq!(files[2]["filename"], "file3.txt");
348
+ assert_eq!(files[2]["content"], "Third file content");
349
+ }
350
+
351
+ /// Test 9: Empty file upload
352
+ /// Verifies that empty files are handled correctly
353
+ #[tokio::test]
354
+ async fn test_empty_file_upload() {
355
+ let boundary = "boundary123";
356
+ let parts = vec![
357
+ "Content-Disposition: form-data; name=\"empty_file\"; filename=\"empty.txt\"\r\nContent-Type: text/plain\r\n\r\n".to_string(),
358
+ ];
359
+
360
+ let body = create_multipart_body(boundary, parts);
361
+
362
+ let request = Request::builder()
363
+ .method("POST")
364
+ .header("content-type", format!("multipart/form-data; boundary={}", boundary))
365
+ .body(Body::from(body))
366
+ .unwrap();
367
+
368
+ let multipart = Multipart::from_request(request, &()).await.unwrap();
369
+ let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
370
+ .await
371
+ .unwrap();
372
+
373
+ let obj = result.as_object().unwrap();
374
+ assert!(obj.contains_key("empty_file"));
375
+
376
+ let file_obj = &obj["empty_file"];
377
+ assert_eq!(file_obj["size"], 0, "Empty file should have size 0");
378
+ assert_eq!(file_obj["content"], "", "Empty file should have empty content");
379
+ assert_eq!(file_obj["filename"], "empty.txt");
380
+ }
381
+
382
+ /// Test 10: File with binary null bytes
383
+ /// Verifies that binary data with null bytes is preserved correctly
384
+ #[tokio::test]
385
+ async fn test_binary_file_with_null_bytes() {
386
+ let boundary = "boundary123";
387
+ let mut body = Vec::new();
388
+
389
+ body.extend_from_slice(format!("--{}\r\n", boundary).as_bytes());
390
+ body.extend_from_slice(b"Content-Disposition: form-data; name=\"binary\"; filename=\"binary.dat\"\r\nContent-Type: application/octet-stream\r\n\r\n");
391
+
392
+ // Binary data with null bytes
393
+ body.extend_from_slice(&[0x00, 0x01, 0x02, 0x03, 0xFF, 0xFE, 0xFD, 0xFC]);
394
+
395
+ body.extend_from_slice(b"\r\n");
396
+ body.extend_from_slice(format!("--{}--\r\n", boundary).as_bytes());
397
+
398
+ let request = Request::builder()
399
+ .method("POST")
400
+ .header("content-type", format!("multipart/form-data; boundary={}", boundary))
401
+ .body(Body::from(body))
402
+ .unwrap();
403
+
404
+ let multipart = Multipart::from_request(request, &()).await.unwrap();
405
+ let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
406
+ .await
407
+ .unwrap();
408
+
409
+ let obj = result.as_object().unwrap();
410
+ assert!(obj.contains_key("binary"));
411
+
412
+ let file_obj = &obj["binary"];
413
+ assert_eq!(file_obj["size"], 8, "Binary file size should be 8 bytes");
414
+ assert_eq!(file_obj["content_type"], "application/octet-stream");
415
+ }
416
+
417
+ /// Test 11: Mixed JSON and binary file uploads
418
+ /// Verifies that JSON form fields are parsed while binary files are preserved
419
+ #[tokio::test]
420
+ async fn test_mixed_json_and_binary_files() {
421
+ let boundary = "boundary123";
422
+ let parts = vec![
423
+ "Content-Disposition: form-data; name=\"metadata\"\r\n\r\n{\"version\":1,\"timestamp\":1234567890}".to_string(),
424
+ "Content-Disposition: form-data; name=\"image\"; filename=\"photo.bin\"\r\nContent-Type: application/octet-stream\r\n\r\nBINARY_IMAGE_DATA_HERE".to_string(),
425
+ "Content-Disposition: form-data; name=\"config\"\r\n\r\n[1,2,3,4,5]".to_string(),
426
+ ];
427
+
428
+ let body = create_multipart_body(boundary, parts);
429
+
430
+ let request = Request::builder()
431
+ .method("POST")
432
+ .header("content-type", format!("multipart/form-data; boundary={}", boundary))
433
+ .body(Body::from(body))
434
+ .unwrap();
435
+
436
+ let multipart = Multipart::from_request(request, &()).await.unwrap();
437
+ let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
438
+ .await
439
+ .unwrap();
440
+
441
+ let obj = result.as_object().unwrap();
442
+
443
+ // Verify JSON fields are parsed as objects
444
+ assert!(obj["metadata"].is_object());
445
+ assert_eq!(obj["metadata"]["version"], 1);
446
+
447
+ assert!(obj["config"].is_array());
448
+ assert_eq!(obj["config"][0], 1);
449
+ assert_eq!(obj["config"][4], 5);
450
+
451
+ // Verify binary file is captured with metadata
452
+ assert!(obj["image"].is_object());
453
+ assert_eq!(obj["image"]["filename"], "photo.bin");
454
+ assert_eq!(obj["image"]["content"], "BINARY_IMAGE_DATA_HERE");
455
+ }
456
+
457
+ /// Test 12: Very large field name
458
+ /// Verifies that extremely long field names are handled correctly
459
+ #[tokio::test]
460
+ async fn test_very_large_field_name() {
461
+ let boundary = "boundary123";
462
+ let long_field_name = "field_".repeat(200); // ~1200 character field name
463
+ let parts = vec![format!(
464
+ "Content-Disposition: form-data; name=\"{}\"\r\n\r\nvalue",
465
+ long_field_name
466
+ )];
467
+
468
+ let body = create_multipart_body(boundary, parts);
469
+
470
+ let request = Request::builder()
471
+ .method("POST")
472
+ .header("content-type", format!("multipart/form-data; boundary={}", boundary))
473
+ .body(Body::from(body))
474
+ .unwrap();
475
+
476
+ let multipart = Multipart::from_request(request, &()).await.unwrap();
477
+ let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
478
+ .await
479
+ .unwrap();
480
+
481
+ let obj = result.as_object().unwrap();
482
+ assert!(obj.contains_key(&long_field_name));
483
+ assert_eq!(obj[&long_field_name], "value");
484
+ }
485
+
486
+ /// Test 13: Content-Type with charset parameter
487
+ /// Verifies that Content-Type headers with parameters are preserved
488
+ #[tokio::test]
489
+ async fn test_content_type_with_charset_parameter() {
490
+ let boundary = "boundary123";
491
+ let parts = vec![
492
+ "Content-Disposition: form-data; name=\"text_file\"; filename=\"utf8.txt\"\r\nContent-Type: text/plain; charset=utf-8\r\n\r\nUTF-8 encoded content: Ñ é ü".to_string(),
493
+ ];
494
+
495
+ let body = create_multipart_body(boundary, parts);
496
+
497
+ let request = Request::builder()
498
+ .method("POST")
499
+ .header("content-type", format!("multipart/form-data; boundary={}", boundary))
500
+ .body(Body::from(body))
501
+ .unwrap();
502
+
503
+ let multipart = Multipart::from_request(request, &()).await.unwrap();
504
+ let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
505
+ .await
506
+ .unwrap();
507
+
508
+ let obj = result.as_object().unwrap();
509
+ let file_obj = &obj["text_file"];
510
+
511
+ let content_type = file_obj["content_type"].as_str().unwrap();
512
+ assert!(content_type.contains("text/plain"));
513
+ // charset parameter may or may not be preserved, but Content-Type base should be
514
+ }
515
+
516
+ /// Test 14: CRLF line endings preservation in file content
517
+ /// Verifies that CRLF sequences within file content are preserved
518
+ #[tokio::test]
519
+ async fn test_crlf_line_endings_in_file_content() {
520
+ let boundary = "boundary123";
521
+ let content_with_crlf = "Line 1\r\nLine 2\r\nLine 3\r\n";
522
+ let parts = vec![format!(
523
+ "Content-Disposition: form-data; name=\"multiline\"; filename=\"text.txt\"\r\nContent-Type: text/plain\r\n\r\n{}",
524
+ content_with_crlf
525
+ )];
526
+
527
+ let body = create_multipart_body(boundary, parts);
528
+
529
+ let request = Request::builder()
530
+ .method("POST")
531
+ .header("content-type", format!("multipart/form-data; boundary={}", boundary))
532
+ .body(Body::from(body))
533
+ .unwrap();
534
+
535
+ let multipart = Multipart::from_request(request, &()).await.unwrap();
536
+ let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
537
+ .await
538
+ .unwrap();
539
+
540
+ let obj = result.as_object().unwrap();
541
+ let file_content = obj["multiline"]["content"].as_str().unwrap();
542
+
543
+ // Verify CRLF sequences are preserved
544
+ assert!(file_content.contains("Line 1\r\nLine 2"));
545
+ }
546
+
547
+ /// Test 15: File upload with default Content-Type when missing
548
+ /// Verifies that missing Content-Type defaults to application/octet-stream
549
+ #[tokio::test]
550
+ async fn test_default_content_type_when_missing() {
551
+ let boundary = "boundary123";
552
+ let parts = vec![
553
+ "Content-Disposition: form-data; name=\"no_type\"; filename=\"mystery.bin\"\r\n\r\nFile content without explicit type".to_string(),
554
+ ];
555
+
556
+ let body = create_multipart_body(boundary, parts);
557
+
558
+ let request = Request::builder()
559
+ .method("POST")
560
+ .header("content-type", format!("multipart/form-data; boundary={}", boundary))
561
+ .body(Body::from(body))
562
+ .unwrap();
563
+
564
+ let multipart = Multipart::from_request(request, &()).await.unwrap();
565
+ let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
566
+ .await
567
+ .unwrap();
568
+
569
+ let obj = result.as_object().unwrap();
570
+ let file_obj = &obj["no_type"];
571
+
572
+ assert_eq!(
573
+ file_obj["content_type"], "application/octet-stream",
574
+ "Missing Content-Type should default to application/octet-stream"
575
+ );
576
+ }
577
+
578
+ /// Test 16: Unicode characters in filenames
579
+ /// Verifies that Unicode filenames are properly handled and preserved
580
+ #[tokio::test]
581
+ async fn test_unicode_characters_in_filenames() {
582
+ let boundary = "boundary123";
583
+ let parts = vec![
584
+ "Content-Disposition: form-data; name=\"file\"; filename=\"файл_文件_🎯.txt\"\r\nContent-Type: text/plain\r\n\r\nUnicode filename test".to_string(),
585
+ ];
586
+
587
+ let body = create_multipart_body(boundary, parts);
588
+
589
+ let request = Request::builder()
590
+ .method("POST")
591
+ .header("content-type", format!("multipart/form-data; boundary={}", boundary))
592
+ .body(Body::from(body))
593
+ .unwrap();
594
+
595
+ let multipart = Multipart::from_request(request, &()).await.unwrap();
596
+ let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
597
+ .await
598
+ .unwrap();
599
+
600
+ let obj = result.as_object().unwrap();
601
+ let filename = obj["file"]["filename"].as_str().unwrap();
602
+
603
+ assert!(filename.contains("файл"));
604
+ assert!(filename.contains("文件"));
605
+ }
606
+
607
+ /// Test 17: All single-value fields when no duplicates
608
+ /// Verifies that fields with single values are not converted to arrays
609
+ #[tokio::test]
610
+ async fn test_single_value_fields_not_arrays() {
611
+ let boundary = "boundary123";
612
+ let parts = vec![
613
+ "Content-Disposition: form-data; name=\"username\"\r\n\r\njohn_doe".to_string(),
614
+ "Content-Disposition: form-data; name=\"email\"\r\n\r\njohn@example.com".to_string(),
615
+ "Content-Disposition: form-data; name=\"age\"\r\n\r\n30".to_string(),
616
+ ];
617
+
618
+ let body = create_multipart_body(boundary, parts);
619
+
620
+ let request = Request::builder()
621
+ .method("POST")
622
+ .header("content-type", format!("multipart/form-data; boundary={}", boundary))
623
+ .body(Body::from(body))
624
+ .unwrap();
625
+
626
+ let multipart = Multipart::from_request(request, &()).await.unwrap();
627
+ let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
628
+ .await
629
+ .unwrap();
630
+
631
+ let obj = result.as_object().unwrap();
632
+
633
+ // Single values should be strings, not arrays
634
+ assert!(obj["username"].is_string());
635
+ assert!(obj["email"].is_string());
636
+ assert!(obj["age"].is_string()); // Note: form fields are strings even for numeric input
637
+ }
638
+
639
+ /// Test 18: File around the 1MB streaming threshold
640
+ /// Verifies correct handling at the boundary of streaming threshold
641
+ #[tokio::test]
642
+ async fn test_file_around_1mb_threshold() {
643
+ let boundary = "boundary123";
644
+
645
+ // Create a file just under 1MB
646
+ let small_file_size = 1024 * 1024 - 1024; // 1MB - 1KB
647
+ let small_file: Vec<u8> = (0..small_file_size).map(|i| (i % 256) as u8).collect();
648
+
649
+ // Create a file just over 1MB
650
+ let large_file_size = 1024 * 1024 + 512; // 1MB + 512 bytes
651
+ let large_file: Vec<u8> = (0..large_file_size).map(|i| ((i >> 8) % 256) as u8).collect();
652
+
653
+ let mut body = Vec::new();
654
+
655
+ // Small file (below threshold)
656
+ body.extend_from_slice(format!("--{}\r\n", boundary).as_bytes());
657
+ body.extend_from_slice(b"Content-Disposition: form-data; name=\"small\"; filename=\"small.dat\"\r\nContent-Type: application/octet-stream\r\n\r\n");
658
+ body.extend_from_slice(&small_file);
659
+ body.extend_from_slice(b"\r\n");
660
+
661
+ // Large file (exceeds threshold)
662
+ body.extend_from_slice(format!("--{}\r\n", boundary).as_bytes());
663
+ body.extend_from_slice(b"Content-Disposition: form-data; name=\"large\"; filename=\"large.dat\"\r\nContent-Type: application/octet-stream\r\n\r\n");
664
+ body.extend_from_slice(&large_file);
665
+ body.extend_from_slice(b"\r\n");
666
+
667
+ body.extend_from_slice(format!("--{}--\r\n", boundary).as_bytes());
668
+
669
+ let request = Request::builder()
670
+ .method("POST")
671
+ .header("content-type", format!("multipart/form-data; boundary={}", boundary))
672
+ .body(Body::from(body))
673
+ .unwrap();
674
+
675
+ let multipart = Multipart::from_request(request, &()).await.unwrap();
676
+ let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
677
+ .await
678
+ .unwrap();
679
+
680
+ let obj = result.as_object().unwrap();
681
+
682
+ // Small file should show actual content (or indicate it's included)
683
+ assert_eq!(obj["small"]["size"], small_file_size);
684
+
685
+ // Large file should be marked as binary
686
+ let large_content = obj["large"]["content"].as_str().unwrap();
687
+ assert!(large_content.contains("<binary data") || large_content.len() > 100);
688
+ }