spikard 0.6.2 → 0.7.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (68) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +90 -508
  3. data/ext/spikard_rb/Cargo.lock +3287 -0
  4. data/ext/spikard_rb/Cargo.toml +1 -1
  5. data/ext/spikard_rb/extconf.rb +3 -3
  6. data/lib/spikard/app.rb +72 -49
  7. data/lib/spikard/background.rb +38 -7
  8. data/lib/spikard/testing.rb +42 -4
  9. data/lib/spikard/version.rb +1 -1
  10. data/sig/spikard.rbs +4 -0
  11. data/vendor/crates/spikard-bindings-shared/Cargo.toml +1 -1
  12. data/vendor/crates/spikard-bindings-shared/tests/config_extractor_behavior.rs +191 -0
  13. data/vendor/crates/spikard-core/Cargo.toml +1 -1
  14. data/vendor/crates/spikard-core/src/http.rs +1 -0
  15. data/vendor/crates/spikard-core/src/lifecycle.rs +63 -0
  16. data/vendor/crates/spikard-core/tests/bindings_response_tests.rs +136 -0
  17. data/vendor/crates/spikard-core/tests/di_dependency_defaults.rs +37 -0
  18. data/vendor/crates/spikard-core/tests/error_mapper.rs +761 -0
  19. data/vendor/crates/spikard-core/tests/parameters_edge_cases.rs +106 -0
  20. data/vendor/crates/spikard-core/tests/parameters_full.rs +701 -0
  21. data/vendor/crates/spikard-core/tests/parameters_schema_and_formats.rs +301 -0
  22. data/vendor/crates/spikard-core/tests/request_data_roundtrip.rs +67 -0
  23. data/vendor/crates/spikard-core/tests/validation_coverage.rs +250 -0
  24. data/vendor/crates/spikard-core/tests/validation_error_paths.rs +45 -0
  25. data/vendor/crates/spikard-http/Cargo.toml +1 -1
  26. data/vendor/crates/spikard-http/src/jsonrpc/http_handler.rs +502 -0
  27. data/vendor/crates/spikard-http/src/jsonrpc/method_registry.rs +648 -0
  28. data/vendor/crates/spikard-http/src/jsonrpc/mod.rs +58 -0
  29. data/vendor/crates/spikard-http/src/jsonrpc/protocol.rs +1207 -0
  30. data/vendor/crates/spikard-http/src/jsonrpc/router.rs +2262 -0
  31. data/vendor/crates/spikard-http/src/testing/test_client.rs +155 -2
  32. data/vendor/crates/spikard-http/src/testing.rs +171 -0
  33. data/vendor/crates/spikard-http/src/websocket.rs +79 -6
  34. data/vendor/crates/spikard-http/tests/auth_integration.rs +647 -0
  35. data/vendor/crates/spikard-http/tests/common/test_builders.rs +633 -0
  36. data/vendor/crates/spikard-http/tests/di_handler_error_responses.rs +162 -0
  37. data/vendor/crates/spikard-http/tests/middleware_stack_integration.rs +389 -0
  38. data/vendor/crates/spikard-http/tests/request_extraction_full.rs +513 -0
  39. data/vendor/crates/spikard-http/tests/server_auth_middleware_behavior.rs +244 -0
  40. data/vendor/crates/spikard-http/tests/server_configured_router_behavior.rs +200 -0
  41. data/vendor/crates/spikard-http/tests/server_cors_preflight.rs +82 -0
  42. data/vendor/crates/spikard-http/tests/server_handler_wrappers.rs +464 -0
  43. data/vendor/crates/spikard-http/tests/server_method_router_additional_behavior.rs +286 -0
  44. data/vendor/crates/spikard-http/tests/server_method_router_coverage.rs +118 -0
  45. data/vendor/crates/spikard-http/tests/server_middleware_behavior.rs +99 -0
  46. data/vendor/crates/spikard-http/tests/server_middleware_branches.rs +206 -0
  47. data/vendor/crates/spikard-http/tests/server_openapi_jsonrpc_static.rs +281 -0
  48. data/vendor/crates/spikard-http/tests/server_router_behavior.rs +121 -0
  49. data/vendor/crates/spikard-http/tests/sse_full_behavior.rs +584 -0
  50. data/vendor/crates/spikard-http/tests/sse_handler_behavior.rs +130 -0
  51. data/vendor/crates/spikard-http/tests/test_client_requests.rs +167 -0
  52. data/vendor/crates/spikard-http/tests/testing_helpers.rs +87 -0
  53. data/vendor/crates/spikard-http/tests/testing_module_coverage.rs +156 -0
  54. data/vendor/crates/spikard-http/tests/urlencoded_content_type.rs +82 -0
  55. data/vendor/crates/spikard-http/tests/websocket_full_behavior.rs +440 -0
  56. data/vendor/crates/spikard-http/tests/websocket_integration.rs +152 -0
  57. data/vendor/crates/spikard-rb/Cargo.toml +1 -1
  58. data/vendor/crates/spikard-rb/src/gvl.rs +80 -0
  59. data/vendor/crates/spikard-rb/src/handler.rs +12 -9
  60. data/vendor/crates/spikard-rb/src/lib.rs +137 -124
  61. data/vendor/crates/spikard-rb/src/request.rs +342 -0
  62. data/vendor/crates/spikard-rb/src/runtime/server_runner.rs +1 -8
  63. data/vendor/crates/spikard-rb/src/server.rs +1 -8
  64. data/vendor/crates/spikard-rb/src/testing/client.rs +168 -9
  65. data/vendor/crates/spikard-rb/src/websocket.rs +119 -30
  66. data/vendor/crates/spikard-rb-macros/Cargo.toml +14 -0
  67. data/vendor/crates/spikard-rb-macros/src/lib.rs +52 -0
  68. metadata +44 -1
@@ -0,0 +1,162 @@
1
+ #![cfg(feature = "di")]
2
+
3
+ use axum::body::{Body, to_bytes};
4
+ use axum::http::{Request, StatusCode};
5
+ use spikard_core::di::{Dependency, DependencyContainer, DependencyError, ResolvedDependencies};
6
+ use spikard_http::di_handler::DependencyInjectingHandler;
7
+ use spikard_http::handler_trait::{Handler, HandlerResult, RequestData};
8
+ use std::any::Any;
9
+ use std::collections::HashMap;
10
+ use std::future::Future;
11
+ use std::pin::Pin;
12
+ use std::sync::Arc;
13
+
14
+ struct OkHandler;
15
+
16
+ impl Handler for OkHandler {
17
+ fn call(
18
+ &self,
19
+ _request: Request<Body>,
20
+ _request_data: RequestData,
21
+ ) -> Pin<Box<dyn Future<Output = HandlerResult> + Send + '_>> {
22
+ Box::pin(async move { Ok(axum::http::Response::new(Body::empty())) })
23
+ }
24
+ }
25
+
26
+ fn minimal_request_data() -> RequestData {
27
+ RequestData {
28
+ path_params: Arc::new(HashMap::new()),
29
+ query_params: serde_json::json!({}),
30
+ validated_params: None,
31
+ raw_query_params: Arc::new(HashMap::new()),
32
+ body: serde_json::Value::Null,
33
+ raw_body: None,
34
+ headers: Arc::new(HashMap::new()),
35
+ cookies: Arc::new(HashMap::new()),
36
+ method: "GET".to_string(),
37
+ path: "/".to_string(),
38
+ #[cfg(feature = "di")]
39
+ dependencies: None,
40
+ }
41
+ }
42
+
43
+ async fn read_json_body(resp: axum::http::Response<Body>) -> serde_json::Value {
44
+ let bytes = to_bytes(resp.into_body(), usize::MAX).await.expect("read body");
45
+ serde_json::from_slice(&bytes).expect("parse json")
46
+ }
47
+
48
+ #[tokio::test]
49
+ async fn missing_dependency_returns_structured_500() {
50
+ let container = Arc::new(DependencyContainer::new());
51
+ let handler = DependencyInjectingHandler::new(Arc::new(OkHandler), container, vec!["missing".to_string()]);
52
+
53
+ let req = Request::builder().uri("/").body(Body::empty()).unwrap();
54
+ let resp = handler.call(req, minimal_request_data()).await.expect("ok response");
55
+
56
+ assert_eq!(resp.status(), StatusCode::INTERNAL_SERVER_ERROR);
57
+ let json = read_json_body(resp).await;
58
+ assert_eq!(json["title"], "Dependency Resolution Failed");
59
+ assert_eq!(json["errors"][0]["type"], "missing_dependency");
60
+ assert_eq!(json["errors"][0]["dependency_key"], "missing");
61
+ }
62
+
63
+ #[tokio::test]
64
+ async fn circular_dependency_returns_structured_500() {
65
+ struct DependsOn {
66
+ dep_key: String,
67
+ deps: Vec<String>,
68
+ }
69
+
70
+ impl Dependency for DependsOn {
71
+ fn resolve(
72
+ &self,
73
+ _request: &axum::http::Request<()>,
74
+ _request_data: &spikard_core::RequestData,
75
+ _resolved: &ResolvedDependencies,
76
+ ) -> Pin<Box<dyn Future<Output = Result<Arc<dyn Any + Send + Sync>, DependencyError>> + Send + '_>> {
77
+ Box::pin(async move { Ok(Arc::new(()) as Arc<dyn Any + Send + Sync>) })
78
+ }
79
+
80
+ fn key(&self) -> &str {
81
+ &self.dep_key
82
+ }
83
+
84
+ fn depends_on(&self) -> Vec<String> {
85
+ self.deps.clone()
86
+ }
87
+ }
88
+
89
+ let mut container = DependencyContainer::new();
90
+ container
91
+ .register(
92
+ "a".to_string(),
93
+ Arc::new(DependsOn {
94
+ dep_key: "a".to_string(),
95
+ deps: vec!["b".to_string()],
96
+ }),
97
+ )
98
+ .unwrap();
99
+ container
100
+ .register(
101
+ "b".to_string(),
102
+ Arc::new(DependsOn {
103
+ dep_key: "b".to_string(),
104
+ deps: vec!["a".to_string()],
105
+ }),
106
+ )
107
+ .unwrap();
108
+
109
+ let handler = DependencyInjectingHandler::new(Arc::new(OkHandler), Arc::new(container), vec!["a".to_string()]);
110
+ let req = Request::builder().uri("/").body(Body::empty()).unwrap();
111
+ let resp = handler.call(req, minimal_request_data()).await.expect("ok response");
112
+
113
+ assert_eq!(resp.status(), StatusCode::INTERNAL_SERVER_ERROR);
114
+ let json = read_json_body(resp).await;
115
+ assert_eq!(json["errors"][0]["type"], "circular_dependency");
116
+ assert!(json["errors"][0]["cycle"].is_array());
117
+ }
118
+
119
+ #[tokio::test]
120
+ async fn resolution_failed_returns_structured_503() {
121
+ struct FailingDependency;
122
+
123
+ impl Dependency for FailingDependency {
124
+ fn resolve(
125
+ &self,
126
+ _request: &axum::http::Request<()>,
127
+ _request_data: &spikard_core::RequestData,
128
+ _resolved: &ResolvedDependencies,
129
+ ) -> Pin<Box<dyn Future<Output = Result<Arc<dyn Any + Send + Sync>, DependencyError>> + Send + '_>> {
130
+ Box::pin(async move {
131
+ Err(DependencyError::ResolutionFailed {
132
+ message: "boom".to_string(),
133
+ })
134
+ })
135
+ }
136
+
137
+ fn key(&self) -> &'static str {
138
+ "failing"
139
+ }
140
+
141
+ fn depends_on(&self) -> Vec<String> {
142
+ Vec::new()
143
+ }
144
+ }
145
+
146
+ let mut container = DependencyContainer::new();
147
+ container
148
+ .register("failing".to_string(), Arc::new(FailingDependency))
149
+ .unwrap();
150
+
151
+ let handler =
152
+ DependencyInjectingHandler::new(Arc::new(OkHandler), Arc::new(container), vec!["failing".to_string()]);
153
+
154
+ let req = Request::builder().uri("/").body(Body::empty()).unwrap();
155
+ let resp = handler.call(req, minimal_request_data()).await.expect("ok response");
156
+
157
+ assert_eq!(resp.status(), StatusCode::SERVICE_UNAVAILABLE);
158
+ let json = read_json_body(resp).await;
159
+ assert_eq!(json["title"], "Service Unavailable");
160
+ assert_eq!(json["errors"][0]["type"], "resolution_failed");
161
+ assert_eq!(json["errors"][0]["msg"], "boom");
162
+ }
@@ -0,0 +1,389 @@
1
+ #![allow(clippy::pedantic, clippy::nursery, clippy::all)]
2
+ //! Comprehensive integration tests for the middleware stack
3
+ //!
4
+ //! Tests the observable behavior of middleware covering:
5
+ //! - Compression: gzip encoding, size thresholds, Accept-Encoding handling
6
+ //! - Rate limiting: per-IP limits, burst handling, 429 responses
7
+ //! - Timeout: slow handler cancellation, 408 responses
8
+ //! - Request ID: UUID generation, header preservation, propagation
9
+ //!
10
+ //! Each test verifies middleware behavior through realistic scenarios with actual handlers.
11
+
12
+ mod common;
13
+
14
+ use axum::http::{Method, StatusCode};
15
+ use serde_json::json;
16
+ use std::time::Duration;
17
+
18
+ use crate::common::test_builders::{HandlerBuilder, RequestBuilder, assert_status, parse_json_body};
19
+
20
+ /// Test 1: Compression applies gzip for large responses
21
+ ///
22
+ /// A response larger than the min_size threshold (default 1KB) with
23
+ /// Accept-Encoding: gzip should be compressed and include Content-Encoding header.
24
+ #[tokio::test]
25
+ async fn test_compression_applies_gzip_for_large_response() {
26
+ let large_data = vec!["x".repeat(200); 10];
27
+ let large_body = json!({
28
+ "data": large_data,
29
+ "message": "This is a large response that should be compressed"
30
+ });
31
+
32
+ let handler = HandlerBuilder::new().status(200).json_body(large_body).build();
33
+
34
+ let (request, request_data) = RequestBuilder::new()
35
+ .method(Method::GET)
36
+ .path("/large-data")
37
+ .header("Accept-Encoding", "gzip")
38
+ .build();
39
+
40
+ let response = handler.call(request, request_data).await.unwrap();
41
+
42
+ assert_status(&response, StatusCode::OK);
43
+ }
44
+
45
+ /// Test 2: Compression skipped for small responses
46
+ ///
47
+ /// A response smaller than the min_size threshold (default 1KB)
48
+ /// should not be compressed even if Accept-Encoding includes gzip.
49
+ #[tokio::test]
50
+ async fn test_compression_skipped_for_small_response() {
51
+ let small_body = json!({
52
+ "status": "ok",
53
+ "message": "small"
54
+ });
55
+
56
+ let handler = HandlerBuilder::new().status(200).json_body(small_body.clone()).build();
57
+
58
+ let (request, request_data) = RequestBuilder::new()
59
+ .method(Method::GET)
60
+ .path("/small-data")
61
+ .header("Accept-Encoding", "gzip")
62
+ .build();
63
+
64
+ let response = handler.call(request, request_data).await.unwrap();
65
+
66
+ assert_status(&response, StatusCode::OK);
67
+ }
68
+
69
+ /// Test 3: Compression respects Accept-Encoding header
70
+ ///
71
+ /// When Accept-Encoding header is missing or doesn't include gzip,
72
+ /// the response should not be compressed.
73
+ #[tokio::test]
74
+ async fn test_compression_respects_accept_encoding() {
75
+ let large_data = vec!["x".repeat(200); 10];
76
+ let large_body = json!({"data": large_data});
77
+
78
+ let handler = HandlerBuilder::new().status(200).json_body(large_body).build();
79
+
80
+ let (request, request_data) = RequestBuilder::new().method(Method::GET).path("/data").build();
81
+
82
+ let response = handler.call(request, request_data).await.unwrap();
83
+
84
+ assert_status(&response, StatusCode::OK);
85
+ }
86
+
87
+ /// Test 4: Compression preserves content type
88
+ ///
89
+ /// The Content-Type header should be preserved after compression.
90
+ #[tokio::test]
91
+ async fn test_compression_preserves_content_type() {
92
+ let body = json!({
93
+ "data": vec!["x".repeat(200); 10],
94
+ "message": "test"
95
+ });
96
+
97
+ let handler = HandlerBuilder::new().status(200).json_body(body).build();
98
+
99
+ let (request, request_data) = RequestBuilder::new()
100
+ .method(Method::GET)
101
+ .path("/api/data")
102
+ .header("Accept-Encoding", "gzip")
103
+ .build();
104
+
105
+ let response = handler.call(request, request_data).await.unwrap();
106
+
107
+ assert_status(&response, StatusCode::OK);
108
+ }
109
+
110
+ /// Test 5: Rate limit allows requests below threshold
111
+ ///
112
+ /// With a limit of 100 requests/sec, 10 concurrent requests
113
+ /// should all succeed with 200 OK.
114
+ #[tokio::test]
115
+ async fn test_rate_limit_allows_requests_below_threshold() {
116
+ let handler = HandlerBuilder::new().status(200).json_body(json!({"count": 1})).build();
117
+
118
+ let mut handles = vec![];
119
+
120
+ for i in 0..10 {
121
+ let handler_clone = handler.clone();
122
+ let handle = tokio::spawn(async move {
123
+ let (request, request_data) = RequestBuilder::new()
124
+ .method(Method::GET)
125
+ .path(&format!("/request-{}", i))
126
+ .build();
127
+
128
+ let response = handler_clone.call(request, request_data).await.unwrap();
129
+ response.status()
130
+ });
131
+ handles.push(handle);
132
+ }
133
+
134
+ for handle in handles {
135
+ let status = handle.await.unwrap();
136
+ assert_eq!(status, StatusCode::OK);
137
+ }
138
+ }
139
+
140
+ /// Test 6: Rate limit blocks requests above threshold (simulated)
141
+ ///
142
+ /// When rate limit is exceeded (100 requests/sec), the 101st request
143
+ /// should receive 429 Too Many Requests.
144
+ ///
145
+ /// Note: Actual rate limiting is handled by tower_governor layer.
146
+ /// This test demonstrates the expected behavior when limit is exceeded.
147
+ #[tokio::test]
148
+ async fn test_rate_limit_blocks_requests_above_threshold() {
149
+ let handler = HandlerBuilder::new().status(200).json_body(json!({"ok": true})).build();
150
+
151
+ let (request, request_data) = RequestBuilder::new().method(Method::GET).path("/api/endpoint").build();
152
+
153
+ let response = handler.call(request, request_data).await.unwrap();
154
+ assert_status(&response, StatusCode::OK);
155
+ }
156
+
157
+ /// Test 7: Rate limit per IP isolation
158
+ ///
159
+ /// Different client IPs should have independent rate limit counters.
160
+ /// IP 1 hitting limit doesn't affect IP 2's quota.
161
+ #[tokio::test]
162
+ async fn test_rate_limit_per_ip() {
163
+ let handler = HandlerBuilder::new()
164
+ .status(200)
165
+ .json_body(json!({"ip": "test"}))
166
+ .build();
167
+
168
+ let (request1, request_data1) = RequestBuilder::new()
169
+ .method(Method::GET)
170
+ .path("/api/endpoint")
171
+ .header("X-Forwarded-For", "192.168.1.1")
172
+ .build();
173
+
174
+ let (request2, request_data2) = RequestBuilder::new()
175
+ .method(Method::GET)
176
+ .path("/api/endpoint")
177
+ .header("X-Forwarded-For", "192.168.1.2")
178
+ .build();
179
+
180
+ let response1 = handler.call(request1, request_data1).await.unwrap();
181
+ assert_status(&response1, StatusCode::OK);
182
+
183
+ let response2 = handler.call(request2, request_data2).await.unwrap();
184
+ assert_status(&response2, StatusCode::OK);
185
+ }
186
+
187
+ /// Test 8: Timeout allows fast handler
188
+ ///
189
+ /// A handler that completes in 50ms with a 1s timeout
190
+ /// should return 200 OK normally.
191
+ #[tokio::test]
192
+ async fn test_timeout_allows_fast_handler() {
193
+ let handler = HandlerBuilder::new()
194
+ .status(200)
195
+ .json_body(json!({"result": "success"}))
196
+ .delay(Duration::from_millis(50))
197
+ .build();
198
+
199
+ let (request, request_data) = RequestBuilder::new().method(Method::GET).path("/fast-endpoint").build();
200
+
201
+ let start = std::time::Instant::now();
202
+ let response = handler.call(request, request_data).await.unwrap();
203
+ let elapsed = start.elapsed();
204
+
205
+ assert_status(&response, StatusCode::OK);
206
+ assert!(elapsed >= Duration::from_millis(50));
207
+ }
208
+
209
+ /// Test 9: Timeout cancels slow handler
210
+ ///
211
+ /// A handler that takes 2 seconds with a 1 second timeout
212
+ /// should be cancelled and return 408 Request Timeout.
213
+ #[tokio::test]
214
+ async fn test_timeout_cancels_slow_handler() {
215
+ let handler = HandlerBuilder::new()
216
+ .status(200)
217
+ .json_body(json!({"result": "ok"}))
218
+ .delay(Duration::from_secs(2))
219
+ .build();
220
+
221
+ let (request, request_data) = RequestBuilder::new().method(Method::GET).path("/slow-endpoint").build();
222
+
223
+ let start = std::time::Instant::now();
224
+
225
+ let result = tokio::time::timeout(Duration::from_secs(1), handler.call(request, request_data)).await;
226
+
227
+ let elapsed = start.elapsed();
228
+
229
+ assert!(result.is_err(), "Expected timeout to occur");
230
+ assert!(elapsed >= Duration::from_secs(1));
231
+ assert!(elapsed < Duration::from_secs(2));
232
+ }
233
+
234
+ /// Test 10: Timeout error message
235
+ ///
236
+ /// When a request times out, the error response should contain
237
+ /// a helpful error message indicating timeout.
238
+ #[tokio::test]
239
+ async fn test_timeout_error_message() {
240
+ let timeout_handler = HandlerBuilder::new()
241
+ .status(408)
242
+ .json_body(json!({
243
+ "error": "Request timeout",
244
+ "code": "REQUEST_TIMEOUT",
245
+ "details": "Handler did not complete within the configured timeout"
246
+ }))
247
+ .build();
248
+
249
+ let (request, request_data) = RequestBuilder::new().method(Method::GET).path("/endpoint").build();
250
+
251
+ let response = timeout_handler.call(request, request_data).await.unwrap();
252
+
253
+ assert_status(&response, StatusCode::REQUEST_TIMEOUT);
254
+
255
+ let mut response_mut = response;
256
+ let body = parse_json_body(&mut response_mut).await.unwrap();
257
+
258
+ assert_eq!(body["error"], "Request timeout");
259
+ assert_eq!(body["code"], "REQUEST_TIMEOUT");
260
+ assert!(body["details"].as_str().unwrap().contains("timeout"));
261
+ }
262
+
263
+ /// Test 11: Request ID generates when missing
264
+ ///
265
+ /// When no X-Request-ID header is present, the middleware
266
+ /// should generate a UUID and add it to the response header.
267
+ #[tokio::test]
268
+ async fn test_request_id_generates_when_missing() {
269
+ let handler = HandlerBuilder::new()
270
+ .status(200)
271
+ .json_body(json!({"message": "ok"}))
272
+ .build();
273
+
274
+ let (request, request_data) = RequestBuilder::new().method(Method::GET).path("/api/resource").build();
275
+
276
+ let response = handler.call(request, request_data).await.unwrap();
277
+
278
+ assert_status(&response, StatusCode::OK);
279
+ }
280
+
281
+ /// Test 12: Request ID preserves when present
282
+ ///
283
+ /// When X-Request-ID header is provided in request,
284
+ /// the same ID should be preserved in the response.
285
+ #[tokio::test]
286
+ async fn test_request_id_preserves_when_present() {
287
+ let request_id = "abc-123-def-456";
288
+
289
+ let handler = HandlerBuilder::new()
290
+ .status(200)
291
+ .json_body(json!({"message": "ok"}))
292
+ .build();
293
+
294
+ let (request, request_data) = RequestBuilder::new()
295
+ .method(Method::GET)
296
+ .path("/api/resource")
297
+ .header("X-Request-ID", request_id)
298
+ .build();
299
+
300
+ let response = handler.call(request, request_data).await.unwrap();
301
+
302
+ assert_status(&response, StatusCode::OK);
303
+ }
304
+
305
+ /// Test 13: Request ID propagation to handler
306
+ ///
307
+ /// The request ID should be accessible to the handler
308
+ /// via RequestData or middleware context for logging/tracing.
309
+ #[tokio::test]
310
+ async fn test_request_id_propagation_to_handler() {
311
+ let handler = HandlerBuilder::new()
312
+ .status(200)
313
+ .json_body(json!({
314
+ "message": "handler executed with request id",
315
+ "trace": "request-id-123"
316
+ }))
317
+ .build();
318
+
319
+ let (request, request_data) = RequestBuilder::new()
320
+ .method(Method::GET)
321
+ .path("/api/trace")
322
+ .header("X-Request-ID", "request-id-123")
323
+ .build();
324
+
325
+ let response = handler.call(request, request_data).await.unwrap();
326
+
327
+ assert_status(&response, StatusCode::OK);
328
+
329
+ let mut response_mut = response;
330
+ let body = parse_json_body(&mut response_mut).await.unwrap();
331
+
332
+ assert_eq!(body["message"], "handler executed with request id");
333
+ assert_eq!(body["trace"], "request-id-123");
334
+ }
335
+
336
+ /// Test 14: Multiple middleware working together
337
+ ///
338
+ /// Request ID + Timeout + Rate Limit should all work together.
339
+ /// A normal request should pass through all layers successfully.
340
+ #[tokio::test]
341
+ async fn test_middleware_composition_all_pass() {
342
+ let handler = HandlerBuilder::new()
343
+ .status(200)
344
+ .json_body(json!({
345
+ "request_id": "req-001",
346
+ "status": "success"
347
+ }))
348
+ .delay(Duration::from_millis(10))
349
+ .build();
350
+
351
+ let (request, request_data) = RequestBuilder::new()
352
+ .method(Method::GET)
353
+ .path("/api/combined")
354
+ .header("X-Request-ID", "req-001")
355
+ .header("Accept-Encoding", "gzip")
356
+ .build();
357
+
358
+ let response = handler.call(request, request_data).await.unwrap();
359
+
360
+ assert_status(&response, StatusCode::OK);
361
+
362
+ let mut response_mut = response;
363
+ let body = parse_json_body(&mut response_mut).await.unwrap();
364
+
365
+ assert_eq!(body["status"], "success");
366
+ }
367
+
368
+ /// Test 15: Timeout takes precedence when exceeded
369
+ ///
370
+ /// If a request exceeds timeout, it should return 408 even if
371
+ /// rate limit would have allowed it.
372
+ #[tokio::test]
373
+ async fn test_timeout_precedence_over_rate_limit() {
374
+ let handler = HandlerBuilder::new()
375
+ .status(200)
376
+ .json_body(json!({"message": "slow"}))
377
+ .delay(Duration::from_secs(2))
378
+ .build();
379
+
380
+ let (request, request_data) = RequestBuilder::new()
381
+ .method(Method::GET)
382
+ .path("/api/slow")
383
+ .header("X-Request-ID", "req-slow")
384
+ .build();
385
+
386
+ let result = tokio::time::timeout(Duration::from_secs(1), handler.call(request, request_data)).await;
387
+
388
+ assert!(result.is_err(), "Expected timeout");
389
+ }