spikard 0.4.0-x86_64-linux
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/LICENSE +1 -0
- data/README.md +659 -0
- data/ext/spikard_rb/Cargo.toml +17 -0
- data/ext/spikard_rb/extconf.rb +10 -0
- data/ext/spikard_rb/src/lib.rs +6 -0
- data/lib/spikard/app.rb +405 -0
- data/lib/spikard/background.rb +27 -0
- data/lib/spikard/config.rb +396 -0
- data/lib/spikard/converters.rb +13 -0
- data/lib/spikard/handler_wrapper.rb +113 -0
- data/lib/spikard/provide.rb +214 -0
- data/lib/spikard/response.rb +173 -0
- data/lib/spikard/schema.rb +243 -0
- data/lib/spikard/sse.rb +111 -0
- data/lib/spikard/streaming_response.rb +44 -0
- data/lib/spikard/testing.rb +221 -0
- data/lib/spikard/upload_file.rb +131 -0
- data/lib/spikard/version.rb +5 -0
- data/lib/spikard/websocket.rb +59 -0
- data/lib/spikard.rb +43 -0
- data/sig/spikard.rbs +366 -0
- data/vendor/bundle/ruby/3.4.0/gems/diff-lcs-1.6.2/mise.toml +5 -0
- data/vendor/bundle/ruby/3.4.0/gems/rake-compiler-dock-1.10.0/build/buildkitd.toml +2 -0
- data/vendor/crates/spikard-bindings-shared/Cargo.toml +63 -0
- data/vendor/crates/spikard-bindings-shared/examples/config_extraction.rs +139 -0
- data/vendor/crates/spikard-bindings-shared/src/config_extractor.rs +561 -0
- data/vendor/crates/spikard-bindings-shared/src/conversion_traits.rs +194 -0
- data/vendor/crates/spikard-bindings-shared/src/di_traits.rs +246 -0
- data/vendor/crates/spikard-bindings-shared/src/error_response.rs +403 -0
- data/vendor/crates/spikard-bindings-shared/src/handler_base.rs +274 -0
- data/vendor/crates/spikard-bindings-shared/src/lib.rs +25 -0
- data/vendor/crates/spikard-bindings-shared/src/lifecycle_base.rs +298 -0
- data/vendor/crates/spikard-bindings-shared/src/lifecycle_executor.rs +637 -0
- data/vendor/crates/spikard-bindings-shared/src/response_builder.rs +309 -0
- data/vendor/crates/spikard-bindings-shared/src/test_client_base.rs +248 -0
- data/vendor/crates/spikard-bindings-shared/src/validation_helpers.rs +355 -0
- data/vendor/crates/spikard-bindings-shared/tests/comprehensive_coverage.rs +502 -0
- data/vendor/crates/spikard-bindings-shared/tests/error_response_edge_cases.rs +389 -0
- data/vendor/crates/spikard-bindings-shared/tests/handler_base_integration.rs +413 -0
- data/vendor/crates/spikard-core/Cargo.toml +40 -0
- data/vendor/crates/spikard-core/src/bindings/mod.rs +3 -0
- data/vendor/crates/spikard-core/src/bindings/response.rs +133 -0
- data/vendor/crates/spikard-core/src/debug.rs +63 -0
- data/vendor/crates/spikard-core/src/di/container.rs +726 -0
- data/vendor/crates/spikard-core/src/di/dependency.rs +273 -0
- data/vendor/crates/spikard-core/src/di/error.rs +118 -0
- data/vendor/crates/spikard-core/src/di/factory.rs +538 -0
- data/vendor/crates/spikard-core/src/di/graph.rs +545 -0
- data/vendor/crates/spikard-core/src/di/mod.rs +192 -0
- data/vendor/crates/spikard-core/src/di/resolved.rs +411 -0
- data/vendor/crates/spikard-core/src/di/value.rs +283 -0
- data/vendor/crates/spikard-core/src/errors.rs +39 -0
- data/vendor/crates/spikard-core/src/http.rs +153 -0
- data/vendor/crates/spikard-core/src/lib.rs +29 -0
- data/vendor/crates/spikard-core/src/lifecycle.rs +422 -0
- data/vendor/crates/spikard-core/src/metadata.rs +397 -0
- data/vendor/crates/spikard-core/src/parameters.rs +723 -0
- data/vendor/crates/spikard-core/src/problem.rs +310 -0
- data/vendor/crates/spikard-core/src/request_data.rs +189 -0
- data/vendor/crates/spikard-core/src/router.rs +249 -0
- data/vendor/crates/spikard-core/src/schema_registry.rs +183 -0
- data/vendor/crates/spikard-core/src/type_hints.rs +304 -0
- data/vendor/crates/spikard-core/src/validation/error_mapper.rs +689 -0
- data/vendor/crates/spikard-core/src/validation/mod.rs +459 -0
- data/vendor/crates/spikard-http/Cargo.toml +58 -0
- data/vendor/crates/spikard-http/examples/sse-notifications.rs +147 -0
- data/vendor/crates/spikard-http/examples/websocket-chat.rs +91 -0
- data/vendor/crates/spikard-http/src/auth.rs +247 -0
- data/vendor/crates/spikard-http/src/background.rs +1562 -0
- data/vendor/crates/spikard-http/src/bindings/mod.rs +3 -0
- data/vendor/crates/spikard-http/src/bindings/response.rs +1 -0
- data/vendor/crates/spikard-http/src/body_metadata.rs +8 -0
- data/vendor/crates/spikard-http/src/cors.rs +490 -0
- data/vendor/crates/spikard-http/src/debug.rs +63 -0
- data/vendor/crates/spikard-http/src/di_handler.rs +1878 -0
- data/vendor/crates/spikard-http/src/handler_response.rs +532 -0
- data/vendor/crates/spikard-http/src/handler_trait.rs +861 -0
- data/vendor/crates/spikard-http/src/handler_trait_tests.rs +284 -0
- data/vendor/crates/spikard-http/src/lib.rs +524 -0
- data/vendor/crates/spikard-http/src/lifecycle/adapter.rs +149 -0
- data/vendor/crates/spikard-http/src/lifecycle.rs +428 -0
- data/vendor/crates/spikard-http/src/middleware/mod.rs +285 -0
- data/vendor/crates/spikard-http/src/middleware/multipart.rs +930 -0
- data/vendor/crates/spikard-http/src/middleware/urlencoded.rs +541 -0
- data/vendor/crates/spikard-http/src/middleware/validation.rs +287 -0
- data/vendor/crates/spikard-http/src/openapi/mod.rs +309 -0
- data/vendor/crates/spikard-http/src/openapi/parameter_extraction.rs +535 -0
- data/vendor/crates/spikard-http/src/openapi/schema_conversion.rs +867 -0
- data/vendor/crates/spikard-http/src/openapi/spec_generation.rs +678 -0
- data/vendor/crates/spikard-http/src/query_parser.rs +369 -0
- data/vendor/crates/spikard-http/src/response.rs +399 -0
- data/vendor/crates/spikard-http/src/server/handler.rs +1557 -0
- data/vendor/crates/spikard-http/src/server/lifecycle_execution.rs +98 -0
- data/vendor/crates/spikard-http/src/server/mod.rs +806 -0
- data/vendor/crates/spikard-http/src/server/request_extraction.rs +630 -0
- data/vendor/crates/spikard-http/src/server/routing_factory.rs +497 -0
- data/vendor/crates/spikard-http/src/sse.rs +961 -0
- data/vendor/crates/spikard-http/src/testing/form.rs +14 -0
- data/vendor/crates/spikard-http/src/testing/multipart.rs +60 -0
- data/vendor/crates/spikard-http/src/testing/test_client.rs +285 -0
- data/vendor/crates/spikard-http/src/testing.rs +377 -0
- data/vendor/crates/spikard-http/src/websocket.rs +831 -0
- data/vendor/crates/spikard-http/tests/background_behavior.rs +918 -0
- data/vendor/crates/spikard-http/tests/common/handlers.rs +308 -0
- data/vendor/crates/spikard-http/tests/common/mod.rs +21 -0
- data/vendor/crates/spikard-http/tests/di_integration.rs +202 -0
- data/vendor/crates/spikard-http/tests/doc_snippets.rs +4 -0
- data/vendor/crates/spikard-http/tests/lifecycle_execution.rs +1135 -0
- data/vendor/crates/spikard-http/tests/multipart_behavior.rs +688 -0
- data/vendor/crates/spikard-http/tests/server_config_builder.rs +324 -0
- data/vendor/crates/spikard-http/tests/sse_behavior.rs +728 -0
- data/vendor/crates/spikard-http/tests/websocket_behavior.rs +724 -0
- data/vendor/crates/spikard-rb/Cargo.toml +43 -0
- data/vendor/crates/spikard-rb/build.rs +199 -0
- data/vendor/crates/spikard-rb/src/background.rs +63 -0
- data/vendor/crates/spikard-rb/src/config/mod.rs +5 -0
- data/vendor/crates/spikard-rb/src/config/server_config.rs +283 -0
- data/vendor/crates/spikard-rb/src/conversion.rs +459 -0
- data/vendor/crates/spikard-rb/src/di/builder.rs +105 -0
- data/vendor/crates/spikard-rb/src/di/mod.rs +413 -0
- data/vendor/crates/spikard-rb/src/handler.rs +612 -0
- data/vendor/crates/spikard-rb/src/integration/mod.rs +3 -0
- data/vendor/crates/spikard-rb/src/lib.rs +1857 -0
- data/vendor/crates/spikard-rb/src/lifecycle.rs +275 -0
- data/vendor/crates/spikard-rb/src/metadata/mod.rs +5 -0
- data/vendor/crates/spikard-rb/src/metadata/route_extraction.rs +427 -0
- data/vendor/crates/spikard-rb/src/runtime/mod.rs +5 -0
- data/vendor/crates/spikard-rb/src/runtime/server_runner.rs +326 -0
- data/vendor/crates/spikard-rb/src/server.rs +283 -0
- data/vendor/crates/spikard-rb/src/sse.rs +231 -0
- data/vendor/crates/spikard-rb/src/testing/client.rs +404 -0
- data/vendor/crates/spikard-rb/src/testing/mod.rs +7 -0
- data/vendor/crates/spikard-rb/src/testing/sse.rs +143 -0
- data/vendor/crates/spikard-rb/src/testing/websocket.rs +221 -0
- data/vendor/crates/spikard-rb/src/websocket.rs +233 -0
- data/vendor/crates/spikard-rb/tests/magnus_ffi_tests.rs +14 -0
- metadata +213 -0
|
@@ -0,0 +1,688 @@
|
|
|
1
|
+
//! Behavioral tests for multipart form data handling in spikard-http
|
|
2
|
+
//!
|
|
3
|
+
//! These tests verify observable behavior of the multipart parser through real HTTP requests
|
|
4
|
+
//! and response outcomes, not parsing internals. They test edge cases, error conditions,
|
|
5
|
+
//! and unusual input patterns to ensure robust handling of form data.
|
|
6
|
+
|
|
7
|
+
mod common;
|
|
8
|
+
|
|
9
|
+
use axum::body::Body;
|
|
10
|
+
use axum::extract::FromRequest;
|
|
11
|
+
use axum::extract::Multipart;
|
|
12
|
+
use axum::http::Request;
|
|
13
|
+
|
|
14
|
+
/// Helper to create a multipart body with proper RFC 7578 formatting
|
|
15
|
+
fn create_multipart_body(boundary: &str, parts: Vec<String>) -> Vec<u8> {
|
|
16
|
+
let mut body = Vec::new();
|
|
17
|
+
for part in parts {
|
|
18
|
+
body.extend_from_slice(format!("--{}\r\n", boundary).as_bytes());
|
|
19
|
+
body.extend_from_slice(part.as_bytes());
|
|
20
|
+
body.extend_from_slice(b"\r\n");
|
|
21
|
+
}
|
|
22
|
+
body.extend_from_slice(format!("--{}--\r\n", boundary).as_bytes());
|
|
23
|
+
body
|
|
24
|
+
}
|
|
25
|
+
|
|
26
|
+
/// Test 1: Large file upload (>1MB) streaming behavior
|
|
27
|
+
/// Verifies that large files are properly handled and marked as binary/streaming
|
|
28
|
+
#[tokio::test]
|
|
29
|
+
async fn test_large_file_upload_streaming_behavior() {
|
|
30
|
+
let boundary = "multipart-boundary";
|
|
31
|
+
|
|
32
|
+
// Create a file just over 1MB to trigger binary handling
|
|
33
|
+
// We use a modest size to avoid memory issues in tests
|
|
34
|
+
let large_file_size = 1024 * 1024 + 512; // 1MB + 512 bytes
|
|
35
|
+
let large_file_content: Vec<u8> = (0..large_file_size).map(|i| (i % 256) as u8).collect();
|
|
36
|
+
|
|
37
|
+
let mut body = Vec::new();
|
|
38
|
+
body.extend_from_slice(format!("--{}\r\n", boundary).as_bytes());
|
|
39
|
+
body.extend_from_slice(b"Content-Disposition: form-data; name=\"large_upload\"; filename=\"large_file.bin\"\r\nContent-Type: application/octet-stream\r\n\r\n");
|
|
40
|
+
body.extend_from_slice(&large_file_content);
|
|
41
|
+
body.extend_from_slice(b"\r\n");
|
|
42
|
+
body.extend_from_slice(format!("--{}--\r\n", boundary).as_bytes());
|
|
43
|
+
|
|
44
|
+
let request = Request::builder()
|
|
45
|
+
.method("POST")
|
|
46
|
+
.header("content-type", format!("multipart/form-data; boundary={}", boundary))
|
|
47
|
+
.body(Body::from(body))
|
|
48
|
+
.unwrap();
|
|
49
|
+
|
|
50
|
+
let multipart = Multipart::from_request(request, &()).await.unwrap();
|
|
51
|
+
let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
|
|
52
|
+
.await
|
|
53
|
+
.unwrap();
|
|
54
|
+
|
|
55
|
+
let obj = result.as_object().unwrap();
|
|
56
|
+
assert!(obj.contains_key("large_upload"));
|
|
57
|
+
|
|
58
|
+
let file_obj = &obj["large_upload"];
|
|
59
|
+
|
|
60
|
+
// Verify file metadata is captured
|
|
61
|
+
assert!(file_obj["filename"].is_string());
|
|
62
|
+
assert_eq!(file_obj["filename"], "large_file.bin");
|
|
63
|
+
assert!(file_obj["size"].is_number());
|
|
64
|
+
assert_eq!(file_obj["size"], large_file_size);
|
|
65
|
+
|
|
66
|
+
// Verify large file is marked as binary (not fully buffered)
|
|
67
|
+
let content = file_obj["content"].as_str().unwrap();
|
|
68
|
+
assert!(content.contains("<binary data"));
|
|
69
|
+
assert!(content.contains("bytes"));
|
|
70
|
+
}
|
|
71
|
+
|
|
72
|
+
/// Test 2: Boundary string appearing in file data
|
|
73
|
+
/// Verifies that boundary strings within file content don't break parsing
|
|
74
|
+
#[tokio::test]
|
|
75
|
+
async fn test_boundary_string_in_file_data() {
|
|
76
|
+
let boundary = "boundary123";
|
|
77
|
+
|
|
78
|
+
// File content contains the boundary string itself
|
|
79
|
+
let file_content = "This file contains --boundary123 in the data\nBut it should not confuse the parser";
|
|
80
|
+
let parts = vec![format!(
|
|
81
|
+
"Content-Disposition: form-data; name=\"file\"; filename=\"tricky.txt\"\r\nContent-Type: text/plain\r\n\r\n{}",
|
|
82
|
+
file_content
|
|
83
|
+
)];
|
|
84
|
+
|
|
85
|
+
let body = create_multipart_body(boundary, parts);
|
|
86
|
+
|
|
87
|
+
let request = Request::builder()
|
|
88
|
+
.method("POST")
|
|
89
|
+
.header("content-type", format!("multipart/form-data; boundary={}", boundary))
|
|
90
|
+
.body(Body::from(body))
|
|
91
|
+
.unwrap();
|
|
92
|
+
|
|
93
|
+
let multipart = Multipart::from_request(request, &()).await.unwrap();
|
|
94
|
+
let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
|
|
95
|
+
.await
|
|
96
|
+
.unwrap();
|
|
97
|
+
|
|
98
|
+
let obj = result.as_object().unwrap();
|
|
99
|
+
assert!(obj.contains_key("file"));
|
|
100
|
+
|
|
101
|
+
// Verify content is preserved exactly as uploaded
|
|
102
|
+
let returned_content = obj["file"]["content"].as_str().unwrap();
|
|
103
|
+
assert_eq!(returned_content, file_content);
|
|
104
|
+
assert!(returned_content.contains("--boundary123"));
|
|
105
|
+
}
|
|
106
|
+
|
|
107
|
+
/// Test 3: Mixed file and form field ordering
|
|
108
|
+
/// Verifies that files and fields can be interleaved and all are captured correctly
|
|
109
|
+
#[tokio::test]
|
|
110
|
+
async fn test_mixed_file_and_form_field_ordering() {
|
|
111
|
+
let boundary = "mixed-boundary";
|
|
112
|
+
let parts = vec![
|
|
113
|
+
"Content-Disposition: form-data; name=\"field1\"\r\n\r\nValue 1".to_string(),
|
|
114
|
+
"Content-Disposition: form-data; name=\"upload1\"; filename=\"file1.txt\"\r\nContent-Type: text/plain\r\n\r\nFile 1 content".to_string(),
|
|
115
|
+
"Content-Disposition: form-data; name=\"field2\"\r\n\r\nValue 2".to_string(),
|
|
116
|
+
"Content-Disposition: form-data; name=\"upload2\"; filename=\"file2.txt\"\r\nContent-Type: text/plain\r\n\r\nFile 2 content".to_string(),
|
|
117
|
+
"Content-Disposition: form-data; name=\"field3\"\r\n\r\nValue 3".to_string(),
|
|
118
|
+
];
|
|
119
|
+
|
|
120
|
+
let body = create_multipart_body(boundary, parts);
|
|
121
|
+
|
|
122
|
+
let request = Request::builder()
|
|
123
|
+
.method("POST")
|
|
124
|
+
.header("content-type", format!("multipart/form-data; boundary={}", boundary))
|
|
125
|
+
.body(Body::from(body))
|
|
126
|
+
.unwrap();
|
|
127
|
+
|
|
128
|
+
let multipart = Multipart::from_request(request, &()).await.unwrap();
|
|
129
|
+
let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
|
|
130
|
+
.await
|
|
131
|
+
.unwrap();
|
|
132
|
+
|
|
133
|
+
let obj = result.as_object().unwrap();
|
|
134
|
+
|
|
135
|
+
// Verify all fields present regardless of order
|
|
136
|
+
assert_eq!(obj["field1"], "Value 1");
|
|
137
|
+
assert_eq!(obj["field2"], "Value 2");
|
|
138
|
+
assert_eq!(obj["field3"], "Value 3");
|
|
139
|
+
|
|
140
|
+
// Verify files are captured with metadata
|
|
141
|
+
assert!(obj["upload1"].is_object());
|
|
142
|
+
assert!(obj["upload2"].is_object());
|
|
143
|
+
assert_eq!(obj["upload1"]["filename"], "file1.txt");
|
|
144
|
+
assert_eq!(obj["upload2"]["filename"], "file2.txt");
|
|
145
|
+
}
|
|
146
|
+
|
|
147
|
+
/// Test 4: Invalid UTF-8 in text fields
|
|
148
|
+
/// Verifies graceful handling of non-UTF8 data in text fields with lossy conversion
|
|
149
|
+
#[tokio::test]
|
|
150
|
+
async fn test_invalid_utf8_in_text_fields() {
|
|
151
|
+
let boundary = "boundary123";
|
|
152
|
+
let mut body = Vec::new();
|
|
153
|
+
|
|
154
|
+
body.extend_from_slice(format!("--{}\r\n", boundary).as_bytes());
|
|
155
|
+
body.extend_from_slice(b"Content-Disposition: form-data; name=\"text_field\"\r\n\r\n");
|
|
156
|
+
|
|
157
|
+
// Append valid UTF-8
|
|
158
|
+
body.extend_from_slice(b"Valid UTF-8: ");
|
|
159
|
+
|
|
160
|
+
// Append invalid UTF-8 sequence
|
|
161
|
+
body.extend_from_slice(&[0xFF, 0xFE, 0xFD]);
|
|
162
|
+
|
|
163
|
+
// Append more valid UTF-8
|
|
164
|
+
body.extend_from_slice(b" and more valid");
|
|
165
|
+
|
|
166
|
+
body.extend_from_slice(b"\r\n");
|
|
167
|
+
body.extend_from_slice(format!("--{}--\r\n", boundary).as_bytes());
|
|
168
|
+
|
|
169
|
+
let request = Request::builder()
|
|
170
|
+
.method("POST")
|
|
171
|
+
.header("content-type", format!("multipart/form-data; boundary={}", boundary))
|
|
172
|
+
.body(Body::from(body))
|
|
173
|
+
.unwrap();
|
|
174
|
+
|
|
175
|
+
let multipart = Multipart::from_request(request, &()).await.unwrap();
|
|
176
|
+
let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
|
|
177
|
+
.await
|
|
178
|
+
.unwrap();
|
|
179
|
+
|
|
180
|
+
let obj = result.as_object().unwrap();
|
|
181
|
+
|
|
182
|
+
// Verify field exists and contains lossy-decoded content
|
|
183
|
+
assert!(obj.contains_key("text_field"));
|
|
184
|
+
let text_value = obj["text_field"].as_str().unwrap();
|
|
185
|
+
|
|
186
|
+
// The invalid bytes should be replaced with replacement character (handled by from_utf8_lossy)
|
|
187
|
+
assert!(text_value.contains("Valid UTF-8:"));
|
|
188
|
+
assert!(text_value.contains("and more valid"));
|
|
189
|
+
}
|
|
190
|
+
|
|
191
|
+
/// Test 5: Malformed multipart bodies (missing headers)
|
|
192
|
+
/// Verifies that the parser handles structural errors gracefully
|
|
193
|
+
#[tokio::test]
|
|
194
|
+
async fn test_malformed_multipart_missing_content_disposition() {
|
|
195
|
+
let boundary = "boundary123";
|
|
196
|
+
let mut body = Vec::new();
|
|
197
|
+
|
|
198
|
+
body.extend_from_slice(format!("--{}\r\n", boundary).as_bytes());
|
|
199
|
+
// Missing Content-Disposition header - just try to add content directly
|
|
200
|
+
body.extend_from_slice(b"\r\n");
|
|
201
|
+
body.extend_from_slice(b"orphaned content");
|
|
202
|
+
body.extend_from_slice(b"\r\n");
|
|
203
|
+
body.extend_from_slice(format!("--{}--\r\n", boundary).as_bytes());
|
|
204
|
+
|
|
205
|
+
let request = Request::builder()
|
|
206
|
+
.method("POST")
|
|
207
|
+
.header("content-type", format!("multipart/form-data; boundary={}", boundary))
|
|
208
|
+
.body(Body::from(body))
|
|
209
|
+
.unwrap();
|
|
210
|
+
|
|
211
|
+
let multipart = Multipart::from_request(request, &()).await.unwrap();
|
|
212
|
+
|
|
213
|
+
// Should handle gracefully - either returning empty or error depending on implementation
|
|
214
|
+
let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart).await;
|
|
215
|
+
|
|
216
|
+
// Verify behavior is defined (not panic)
|
|
217
|
+
if let Ok(parsed) = result {
|
|
218
|
+
// If it succeeds, verify result is reasonable (likely empty object)
|
|
219
|
+
assert!(parsed.is_object());
|
|
220
|
+
}
|
|
221
|
+
}
|
|
222
|
+
|
|
223
|
+
/// Test 6: Duplicate field names aggregation
|
|
224
|
+
/// Verifies that multiple values with same field name are properly aggregated into arrays
|
|
225
|
+
#[tokio::test]
|
|
226
|
+
async fn test_duplicate_field_names_aggregation() {
|
|
227
|
+
let boundary = "boundary123";
|
|
228
|
+
let parts = vec![
|
|
229
|
+
"Content-Disposition: form-data; name=\"tags\"\r\n\r\nrust".to_string(),
|
|
230
|
+
"Content-Disposition: form-data; name=\"tags\"\r\n\r\nweb".to_string(),
|
|
231
|
+
"Content-Disposition: form-data; name=\"tags\"\r\n\r\napi".to_string(),
|
|
232
|
+
"Content-Disposition: form-data; name=\"tags\"\r\n\r\nserver".to_string(),
|
|
233
|
+
];
|
|
234
|
+
|
|
235
|
+
let body = create_multipart_body(boundary, parts);
|
|
236
|
+
|
|
237
|
+
let request = Request::builder()
|
|
238
|
+
.method("POST")
|
|
239
|
+
.header("content-type", format!("multipart/form-data; boundary={}", boundary))
|
|
240
|
+
.body(Body::from(body))
|
|
241
|
+
.unwrap();
|
|
242
|
+
|
|
243
|
+
let multipart = Multipart::from_request(request, &()).await.unwrap();
|
|
244
|
+
let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
|
|
245
|
+
.await
|
|
246
|
+
.unwrap();
|
|
247
|
+
|
|
248
|
+
let obj = result.as_object().unwrap();
|
|
249
|
+
assert!(obj.contains_key("tags"));
|
|
250
|
+
|
|
251
|
+
let tags = &obj["tags"];
|
|
252
|
+
assert!(
|
|
253
|
+
tags.is_array(),
|
|
254
|
+
"Multiple values with same name should be aggregated into array"
|
|
255
|
+
);
|
|
256
|
+
|
|
257
|
+
let tags_array = tags.as_array().unwrap();
|
|
258
|
+
assert_eq!(tags_array.len(), 4, "All 4 tag values should be present");
|
|
259
|
+
assert_eq!(tags_array[0], "rust");
|
|
260
|
+
assert_eq!(tags_array[1], "web");
|
|
261
|
+
assert_eq!(tags_array[2], "api");
|
|
262
|
+
assert_eq!(tags_array[3], "server");
|
|
263
|
+
}
|
|
264
|
+
|
|
265
|
+
/// Test 7: Upload timeout behavior with streaming files
|
|
266
|
+
/// Verifies that streaming large files doesn't cause handlers to timeout
|
|
267
|
+
/// (Tests observable streaming behavior, not timeout mechanics)
|
|
268
|
+
#[tokio::test]
|
|
269
|
+
async fn test_large_streaming_file_completes() {
|
|
270
|
+
let boundary = "stream-boundary";
|
|
271
|
+
|
|
272
|
+
// Create a file just over 1MB to ensure binary handling
|
|
273
|
+
let streaming_file_size = 1024 * 1024 + 256 * 1024; // 1.25 MB
|
|
274
|
+
let streaming_file: Vec<u8> = (0..streaming_file_size).map(|i| ((i >> 8) % 256) as u8).collect();
|
|
275
|
+
|
|
276
|
+
let mut body = Vec::new();
|
|
277
|
+
body.extend_from_slice(format!("--{}\r\n", boundary).as_bytes());
|
|
278
|
+
body.extend_from_slice(b"Content-Disposition: form-data; name=\"stream_upload\"; filename=\"stream.dat\"\r\nContent-Type: application/octet-stream\r\n\r\n");
|
|
279
|
+
body.extend_from_slice(&streaming_file);
|
|
280
|
+
body.extend_from_slice(b"\r\n");
|
|
281
|
+
body.extend_from_slice(format!("--{}--\r\n", boundary).as_bytes());
|
|
282
|
+
|
|
283
|
+
let request = Request::builder()
|
|
284
|
+
.method("POST")
|
|
285
|
+
.header("content-type", format!("multipart/form-data; boundary={}", boundary))
|
|
286
|
+
.body(Body::from(body))
|
|
287
|
+
.unwrap();
|
|
288
|
+
|
|
289
|
+
let multipart = Multipart::from_request(request, &()).await.unwrap();
|
|
290
|
+
|
|
291
|
+
// Parse should complete successfully for large streaming file
|
|
292
|
+
let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart).await;
|
|
293
|
+
|
|
294
|
+
assert!(result.is_ok(), "Large streaming file should parse without timeout");
|
|
295
|
+
|
|
296
|
+
let parsed = result.unwrap();
|
|
297
|
+
let obj = parsed.as_object().unwrap();
|
|
298
|
+
assert!(obj.contains_key("stream_upload"));
|
|
299
|
+
|
|
300
|
+
// Verify size is correctly captured
|
|
301
|
+
assert_eq!(obj["stream_upload"]["size"], streaming_file_size);
|
|
302
|
+
}
|
|
303
|
+
|
|
304
|
+
/// Test 8: Multiple files with same field name
|
|
305
|
+
/// Verifies that multiple file uploads with identical field names are aggregated correctly
|
|
306
|
+
#[tokio::test]
|
|
307
|
+
async fn test_multiple_file_uploads_same_field_name() {
|
|
308
|
+
let boundary = "boundary123";
|
|
309
|
+
let parts = vec![
|
|
310
|
+
"Content-Disposition: form-data; name=\"attachments\"; filename=\"file1.txt\"\r\nContent-Type: text/plain\r\n\r\nFirst file content".to_string(),
|
|
311
|
+
"Content-Disposition: form-data; name=\"attachments\"; filename=\"file2.txt\"\r\nContent-Type: text/plain\r\n\r\nSecond file content".to_string(),
|
|
312
|
+
"Content-Disposition: form-data; name=\"attachments\"; filename=\"file3.txt\"\r\nContent-Type: text/plain\r\n\r\nThird file content".to_string(),
|
|
313
|
+
];
|
|
314
|
+
|
|
315
|
+
let body = create_multipart_body(boundary, parts);
|
|
316
|
+
|
|
317
|
+
let request = Request::builder()
|
|
318
|
+
.method("POST")
|
|
319
|
+
.header("content-type", format!("multipart/form-data; boundary={}", boundary))
|
|
320
|
+
.body(Body::from(body))
|
|
321
|
+
.unwrap();
|
|
322
|
+
|
|
323
|
+
let multipart = Multipart::from_request(request, &()).await.unwrap();
|
|
324
|
+
let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
|
|
325
|
+
.await
|
|
326
|
+
.unwrap();
|
|
327
|
+
|
|
328
|
+
let obj = result.as_object().unwrap();
|
|
329
|
+
assert!(obj.contains_key("attachments"));
|
|
330
|
+
|
|
331
|
+
let attachments = &obj["attachments"];
|
|
332
|
+
assert!(
|
|
333
|
+
attachments.is_array(),
|
|
334
|
+
"Multiple files with same name should be aggregated"
|
|
335
|
+
);
|
|
336
|
+
|
|
337
|
+
let files = attachments.as_array().unwrap();
|
|
338
|
+
assert_eq!(files.len(), 3, "All 3 file uploads should be present");
|
|
339
|
+
|
|
340
|
+
// Verify each file's metadata
|
|
341
|
+
assert_eq!(files[0]["filename"], "file1.txt");
|
|
342
|
+
assert_eq!(files[0]["content"], "First file content");
|
|
343
|
+
|
|
344
|
+
assert_eq!(files[1]["filename"], "file2.txt");
|
|
345
|
+
assert_eq!(files[1]["content"], "Second file content");
|
|
346
|
+
|
|
347
|
+
assert_eq!(files[2]["filename"], "file3.txt");
|
|
348
|
+
assert_eq!(files[2]["content"], "Third file content");
|
|
349
|
+
}
|
|
350
|
+
|
|
351
|
+
/// Test 9: Empty file upload
|
|
352
|
+
/// Verifies that empty files are handled correctly
|
|
353
|
+
#[tokio::test]
|
|
354
|
+
async fn test_empty_file_upload() {
|
|
355
|
+
let boundary = "boundary123";
|
|
356
|
+
let parts = vec![
|
|
357
|
+
"Content-Disposition: form-data; name=\"empty_file\"; filename=\"empty.txt\"\r\nContent-Type: text/plain\r\n\r\n".to_string(),
|
|
358
|
+
];
|
|
359
|
+
|
|
360
|
+
let body = create_multipart_body(boundary, parts);
|
|
361
|
+
|
|
362
|
+
let request = Request::builder()
|
|
363
|
+
.method("POST")
|
|
364
|
+
.header("content-type", format!("multipart/form-data; boundary={}", boundary))
|
|
365
|
+
.body(Body::from(body))
|
|
366
|
+
.unwrap();
|
|
367
|
+
|
|
368
|
+
let multipart = Multipart::from_request(request, &()).await.unwrap();
|
|
369
|
+
let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
|
|
370
|
+
.await
|
|
371
|
+
.unwrap();
|
|
372
|
+
|
|
373
|
+
let obj = result.as_object().unwrap();
|
|
374
|
+
assert!(obj.contains_key("empty_file"));
|
|
375
|
+
|
|
376
|
+
let file_obj = &obj["empty_file"];
|
|
377
|
+
assert_eq!(file_obj["size"], 0, "Empty file should have size 0");
|
|
378
|
+
assert_eq!(file_obj["content"], "", "Empty file should have empty content");
|
|
379
|
+
assert_eq!(file_obj["filename"], "empty.txt");
|
|
380
|
+
}
|
|
381
|
+
|
|
382
|
+
/// Test 10: File with binary null bytes
|
|
383
|
+
/// Verifies that binary data with null bytes is preserved correctly
|
|
384
|
+
#[tokio::test]
|
|
385
|
+
async fn test_binary_file_with_null_bytes() {
|
|
386
|
+
let boundary = "boundary123";
|
|
387
|
+
let mut body = Vec::new();
|
|
388
|
+
|
|
389
|
+
body.extend_from_slice(format!("--{}\r\n", boundary).as_bytes());
|
|
390
|
+
body.extend_from_slice(b"Content-Disposition: form-data; name=\"binary\"; filename=\"binary.dat\"\r\nContent-Type: application/octet-stream\r\n\r\n");
|
|
391
|
+
|
|
392
|
+
// Binary data with null bytes
|
|
393
|
+
body.extend_from_slice(&[0x00, 0x01, 0x02, 0x03, 0xFF, 0xFE, 0xFD, 0xFC]);
|
|
394
|
+
|
|
395
|
+
body.extend_from_slice(b"\r\n");
|
|
396
|
+
body.extend_from_slice(format!("--{}--\r\n", boundary).as_bytes());
|
|
397
|
+
|
|
398
|
+
let request = Request::builder()
|
|
399
|
+
.method("POST")
|
|
400
|
+
.header("content-type", format!("multipart/form-data; boundary={}", boundary))
|
|
401
|
+
.body(Body::from(body))
|
|
402
|
+
.unwrap();
|
|
403
|
+
|
|
404
|
+
let multipart = Multipart::from_request(request, &()).await.unwrap();
|
|
405
|
+
let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
|
|
406
|
+
.await
|
|
407
|
+
.unwrap();
|
|
408
|
+
|
|
409
|
+
let obj = result.as_object().unwrap();
|
|
410
|
+
assert!(obj.contains_key("binary"));
|
|
411
|
+
|
|
412
|
+
let file_obj = &obj["binary"];
|
|
413
|
+
assert_eq!(file_obj["size"], 8, "Binary file size should be 8 bytes");
|
|
414
|
+
assert_eq!(file_obj["content_type"], "application/octet-stream");
|
|
415
|
+
}
|
|
416
|
+
|
|
417
|
+
/// Test 11: Mixed JSON and binary file uploads
|
|
418
|
+
/// Verifies that JSON form fields are parsed while binary files are preserved
|
|
419
|
+
#[tokio::test]
|
|
420
|
+
async fn test_mixed_json_and_binary_files() {
|
|
421
|
+
let boundary = "boundary123";
|
|
422
|
+
let parts = vec![
|
|
423
|
+
"Content-Disposition: form-data; name=\"metadata\"\r\n\r\n{\"version\":1,\"timestamp\":1234567890}".to_string(),
|
|
424
|
+
"Content-Disposition: form-data; name=\"image\"; filename=\"photo.bin\"\r\nContent-Type: application/octet-stream\r\n\r\nBINARY_IMAGE_DATA_HERE".to_string(),
|
|
425
|
+
"Content-Disposition: form-data; name=\"config\"\r\n\r\n[1,2,3,4,5]".to_string(),
|
|
426
|
+
];
|
|
427
|
+
|
|
428
|
+
let body = create_multipart_body(boundary, parts);
|
|
429
|
+
|
|
430
|
+
let request = Request::builder()
|
|
431
|
+
.method("POST")
|
|
432
|
+
.header("content-type", format!("multipart/form-data; boundary={}", boundary))
|
|
433
|
+
.body(Body::from(body))
|
|
434
|
+
.unwrap();
|
|
435
|
+
|
|
436
|
+
let multipart = Multipart::from_request(request, &()).await.unwrap();
|
|
437
|
+
let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
|
|
438
|
+
.await
|
|
439
|
+
.unwrap();
|
|
440
|
+
|
|
441
|
+
let obj = result.as_object().unwrap();
|
|
442
|
+
|
|
443
|
+
// Verify JSON fields are parsed as objects
|
|
444
|
+
assert!(obj["metadata"].is_object());
|
|
445
|
+
assert_eq!(obj["metadata"]["version"], 1);
|
|
446
|
+
|
|
447
|
+
assert!(obj["config"].is_array());
|
|
448
|
+
assert_eq!(obj["config"][0], 1);
|
|
449
|
+
assert_eq!(obj["config"][4], 5);
|
|
450
|
+
|
|
451
|
+
// Verify binary file is captured with metadata
|
|
452
|
+
assert!(obj["image"].is_object());
|
|
453
|
+
assert_eq!(obj["image"]["filename"], "photo.bin");
|
|
454
|
+
assert_eq!(obj["image"]["content"], "BINARY_IMAGE_DATA_HERE");
|
|
455
|
+
}
|
|
456
|
+
|
|
457
|
+
/// Test 12: Very large field name
|
|
458
|
+
/// Verifies that extremely long field names are handled correctly
|
|
459
|
+
#[tokio::test]
|
|
460
|
+
async fn test_very_large_field_name() {
|
|
461
|
+
let boundary = "boundary123";
|
|
462
|
+
let long_field_name = "field_".repeat(200); // ~1200 character field name
|
|
463
|
+
let parts = vec![format!(
|
|
464
|
+
"Content-Disposition: form-data; name=\"{}\"\r\n\r\nvalue",
|
|
465
|
+
long_field_name
|
|
466
|
+
)];
|
|
467
|
+
|
|
468
|
+
let body = create_multipart_body(boundary, parts);
|
|
469
|
+
|
|
470
|
+
let request = Request::builder()
|
|
471
|
+
.method("POST")
|
|
472
|
+
.header("content-type", format!("multipart/form-data; boundary={}", boundary))
|
|
473
|
+
.body(Body::from(body))
|
|
474
|
+
.unwrap();
|
|
475
|
+
|
|
476
|
+
let multipart = Multipart::from_request(request, &()).await.unwrap();
|
|
477
|
+
let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
|
|
478
|
+
.await
|
|
479
|
+
.unwrap();
|
|
480
|
+
|
|
481
|
+
let obj = result.as_object().unwrap();
|
|
482
|
+
assert!(obj.contains_key(&long_field_name));
|
|
483
|
+
assert_eq!(obj[&long_field_name], "value");
|
|
484
|
+
}
|
|
485
|
+
|
|
486
|
+
/// Test 13: Content-Type with charset parameter
|
|
487
|
+
/// Verifies that Content-Type headers with parameters are preserved
|
|
488
|
+
#[tokio::test]
|
|
489
|
+
async fn test_content_type_with_charset_parameter() {
|
|
490
|
+
let boundary = "boundary123";
|
|
491
|
+
let parts = vec![
|
|
492
|
+
"Content-Disposition: form-data; name=\"text_file\"; filename=\"utf8.txt\"\r\nContent-Type: text/plain; charset=utf-8\r\n\r\nUTF-8 encoded content: Ñ é ü".to_string(),
|
|
493
|
+
];
|
|
494
|
+
|
|
495
|
+
let body = create_multipart_body(boundary, parts);
|
|
496
|
+
|
|
497
|
+
let request = Request::builder()
|
|
498
|
+
.method("POST")
|
|
499
|
+
.header("content-type", format!("multipart/form-data; boundary={}", boundary))
|
|
500
|
+
.body(Body::from(body))
|
|
501
|
+
.unwrap();
|
|
502
|
+
|
|
503
|
+
let multipart = Multipart::from_request(request, &()).await.unwrap();
|
|
504
|
+
let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
|
|
505
|
+
.await
|
|
506
|
+
.unwrap();
|
|
507
|
+
|
|
508
|
+
let obj = result.as_object().unwrap();
|
|
509
|
+
let file_obj = &obj["text_file"];
|
|
510
|
+
|
|
511
|
+
let content_type = file_obj["content_type"].as_str().unwrap();
|
|
512
|
+
assert!(content_type.contains("text/plain"));
|
|
513
|
+
// charset parameter may or may not be preserved, but Content-Type base should be
|
|
514
|
+
}
|
|
515
|
+
|
|
516
|
+
/// Test 14: CRLF line endings preservation in file content
|
|
517
|
+
/// Verifies that CRLF sequences within file content are preserved
|
|
518
|
+
#[tokio::test]
|
|
519
|
+
async fn test_crlf_line_endings_in_file_content() {
|
|
520
|
+
let boundary = "boundary123";
|
|
521
|
+
let content_with_crlf = "Line 1\r\nLine 2\r\nLine 3\r\n";
|
|
522
|
+
let parts = vec![format!(
|
|
523
|
+
"Content-Disposition: form-data; name=\"multiline\"; filename=\"text.txt\"\r\nContent-Type: text/plain\r\n\r\n{}",
|
|
524
|
+
content_with_crlf
|
|
525
|
+
)];
|
|
526
|
+
|
|
527
|
+
let body = create_multipart_body(boundary, parts);
|
|
528
|
+
|
|
529
|
+
let request = Request::builder()
|
|
530
|
+
.method("POST")
|
|
531
|
+
.header("content-type", format!("multipart/form-data; boundary={}", boundary))
|
|
532
|
+
.body(Body::from(body))
|
|
533
|
+
.unwrap();
|
|
534
|
+
|
|
535
|
+
let multipart = Multipart::from_request(request, &()).await.unwrap();
|
|
536
|
+
let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
|
|
537
|
+
.await
|
|
538
|
+
.unwrap();
|
|
539
|
+
|
|
540
|
+
let obj = result.as_object().unwrap();
|
|
541
|
+
let file_content = obj["multiline"]["content"].as_str().unwrap();
|
|
542
|
+
|
|
543
|
+
// Verify CRLF sequences are preserved
|
|
544
|
+
assert!(file_content.contains("Line 1\r\nLine 2"));
|
|
545
|
+
}
|
|
546
|
+
|
|
547
|
+
/// Test 15: File upload with default Content-Type when missing
|
|
548
|
+
/// Verifies that missing Content-Type defaults to application/octet-stream
|
|
549
|
+
#[tokio::test]
|
|
550
|
+
async fn test_default_content_type_when_missing() {
|
|
551
|
+
let boundary = "boundary123";
|
|
552
|
+
let parts = vec![
|
|
553
|
+
"Content-Disposition: form-data; name=\"no_type\"; filename=\"mystery.bin\"\r\n\r\nFile content without explicit type".to_string(),
|
|
554
|
+
];
|
|
555
|
+
|
|
556
|
+
let body = create_multipart_body(boundary, parts);
|
|
557
|
+
|
|
558
|
+
let request = Request::builder()
|
|
559
|
+
.method("POST")
|
|
560
|
+
.header("content-type", format!("multipart/form-data; boundary={}", boundary))
|
|
561
|
+
.body(Body::from(body))
|
|
562
|
+
.unwrap();
|
|
563
|
+
|
|
564
|
+
let multipart = Multipart::from_request(request, &()).await.unwrap();
|
|
565
|
+
let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
|
|
566
|
+
.await
|
|
567
|
+
.unwrap();
|
|
568
|
+
|
|
569
|
+
let obj = result.as_object().unwrap();
|
|
570
|
+
let file_obj = &obj["no_type"];
|
|
571
|
+
|
|
572
|
+
assert_eq!(
|
|
573
|
+
file_obj["content_type"], "application/octet-stream",
|
|
574
|
+
"Missing Content-Type should default to application/octet-stream"
|
|
575
|
+
);
|
|
576
|
+
}
|
|
577
|
+
|
|
578
|
+
/// Test 16: Unicode characters in filenames
|
|
579
|
+
/// Verifies that Unicode filenames are properly handled and preserved
|
|
580
|
+
#[tokio::test]
|
|
581
|
+
async fn test_unicode_characters_in_filenames() {
|
|
582
|
+
let boundary = "boundary123";
|
|
583
|
+
let parts = vec![
|
|
584
|
+
"Content-Disposition: form-data; name=\"file\"; filename=\"файл_文件_🎯.txt\"\r\nContent-Type: text/plain\r\n\r\nUnicode filename test".to_string(),
|
|
585
|
+
];
|
|
586
|
+
|
|
587
|
+
let body = create_multipart_body(boundary, parts);
|
|
588
|
+
|
|
589
|
+
let request = Request::builder()
|
|
590
|
+
.method("POST")
|
|
591
|
+
.header("content-type", format!("multipart/form-data; boundary={}", boundary))
|
|
592
|
+
.body(Body::from(body))
|
|
593
|
+
.unwrap();
|
|
594
|
+
|
|
595
|
+
let multipart = Multipart::from_request(request, &()).await.unwrap();
|
|
596
|
+
let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
|
|
597
|
+
.await
|
|
598
|
+
.unwrap();
|
|
599
|
+
|
|
600
|
+
let obj = result.as_object().unwrap();
|
|
601
|
+
let filename = obj["file"]["filename"].as_str().unwrap();
|
|
602
|
+
|
|
603
|
+
assert!(filename.contains("файл"));
|
|
604
|
+
assert!(filename.contains("文件"));
|
|
605
|
+
}
|
|
606
|
+
|
|
607
|
+
/// Test 17: All single-value fields when no duplicates
|
|
608
|
+
/// Verifies that fields with single values are not converted to arrays
|
|
609
|
+
#[tokio::test]
|
|
610
|
+
async fn test_single_value_fields_not_arrays() {
|
|
611
|
+
let boundary = "boundary123";
|
|
612
|
+
let parts = vec![
|
|
613
|
+
"Content-Disposition: form-data; name=\"username\"\r\n\r\njohn_doe".to_string(),
|
|
614
|
+
"Content-Disposition: form-data; name=\"email\"\r\n\r\njohn@example.com".to_string(),
|
|
615
|
+
"Content-Disposition: form-data; name=\"age\"\r\n\r\n30".to_string(),
|
|
616
|
+
];
|
|
617
|
+
|
|
618
|
+
let body = create_multipart_body(boundary, parts);
|
|
619
|
+
|
|
620
|
+
let request = Request::builder()
|
|
621
|
+
.method("POST")
|
|
622
|
+
.header("content-type", format!("multipart/form-data; boundary={}", boundary))
|
|
623
|
+
.body(Body::from(body))
|
|
624
|
+
.unwrap();
|
|
625
|
+
|
|
626
|
+
let multipart = Multipart::from_request(request, &()).await.unwrap();
|
|
627
|
+
let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
|
|
628
|
+
.await
|
|
629
|
+
.unwrap();
|
|
630
|
+
|
|
631
|
+
let obj = result.as_object().unwrap();
|
|
632
|
+
|
|
633
|
+
// Single values should be strings, not arrays
|
|
634
|
+
assert!(obj["username"].is_string());
|
|
635
|
+
assert!(obj["email"].is_string());
|
|
636
|
+
assert!(obj["age"].is_string()); // Note: form fields are strings even for numeric input
|
|
637
|
+
}
|
|
638
|
+
|
|
639
|
+
/// Test 18: File around the 1MB streaming threshold
|
|
640
|
+
/// Verifies correct handling at the boundary of streaming threshold
|
|
641
|
+
#[tokio::test]
|
|
642
|
+
async fn test_file_around_1mb_threshold() {
|
|
643
|
+
let boundary = "boundary123";
|
|
644
|
+
|
|
645
|
+
// Create a file just under 1MB
|
|
646
|
+
let small_file_size = 1024 * 1024 - 1024; // 1MB - 1KB
|
|
647
|
+
let small_file: Vec<u8> = (0..small_file_size).map(|i| (i % 256) as u8).collect();
|
|
648
|
+
|
|
649
|
+
// Create a file just over 1MB
|
|
650
|
+
let large_file_size = 1024 * 1024 + 512; // 1MB + 512 bytes
|
|
651
|
+
let large_file: Vec<u8> = (0..large_file_size).map(|i| ((i >> 8) % 256) as u8).collect();
|
|
652
|
+
|
|
653
|
+
let mut body = Vec::new();
|
|
654
|
+
|
|
655
|
+
// Small file (below threshold)
|
|
656
|
+
body.extend_from_slice(format!("--{}\r\n", boundary).as_bytes());
|
|
657
|
+
body.extend_from_slice(b"Content-Disposition: form-data; name=\"small\"; filename=\"small.dat\"\r\nContent-Type: application/octet-stream\r\n\r\n");
|
|
658
|
+
body.extend_from_slice(&small_file);
|
|
659
|
+
body.extend_from_slice(b"\r\n");
|
|
660
|
+
|
|
661
|
+
// Large file (exceeds threshold)
|
|
662
|
+
body.extend_from_slice(format!("--{}\r\n", boundary).as_bytes());
|
|
663
|
+
body.extend_from_slice(b"Content-Disposition: form-data; name=\"large\"; filename=\"large.dat\"\r\nContent-Type: application/octet-stream\r\n\r\n");
|
|
664
|
+
body.extend_from_slice(&large_file);
|
|
665
|
+
body.extend_from_slice(b"\r\n");
|
|
666
|
+
|
|
667
|
+
body.extend_from_slice(format!("--{}--\r\n", boundary).as_bytes());
|
|
668
|
+
|
|
669
|
+
let request = Request::builder()
|
|
670
|
+
.method("POST")
|
|
671
|
+
.header("content-type", format!("multipart/form-data; boundary={}", boundary))
|
|
672
|
+
.body(Body::from(body))
|
|
673
|
+
.unwrap();
|
|
674
|
+
|
|
675
|
+
let multipart = Multipart::from_request(request, &()).await.unwrap();
|
|
676
|
+
let result = spikard_http::middleware::multipart::parse_multipart_to_json(multipart)
|
|
677
|
+
.await
|
|
678
|
+
.unwrap();
|
|
679
|
+
|
|
680
|
+
let obj = result.as_object().unwrap();
|
|
681
|
+
|
|
682
|
+
// Small file should show actual content (or indicate it's included)
|
|
683
|
+
assert_eq!(obj["small"]["size"], small_file_size);
|
|
684
|
+
|
|
685
|
+
// Large file should be marked as binary
|
|
686
|
+
let large_content = obj["large"]["content"].as_str().unwrap();
|
|
687
|
+
assert!(large_content.contains("<binary data") || large_content.len() > 100);
|
|
688
|
+
}
|