You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
270 lines
7.5 KiB
270 lines
7.5 KiB
package model
|
|
|
|
import (
|
|
"encoding/json"
|
|
"strconv"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/DATA-DOG/go-sqlmock"
|
|
"github.com/cloudreve/Cloudreve/v3/pkg/cache"
|
|
"github.com/jinzhu/gorm"
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func TestGetPolicyByID(t *testing.T) {
|
|
asserts := assert.New(t)
|
|
|
|
cache.Deletes([]string{"22", "23"}, "policy_")
|
|
// 缓存未命中
|
|
{
|
|
rows := sqlmock.NewRows([]string{"name", "type", "options"}).
|
|
AddRow("默认存储策略", "local", "{\"od_redirect\":\"123\"}")
|
|
mock.ExpectQuery("^SELECT(.+)").WillReturnRows(rows)
|
|
policy, err := GetPolicyByID(uint(22))
|
|
asserts.NoError(err)
|
|
asserts.NoError(mock.ExpectationsWereMet())
|
|
asserts.Equal("默认存储策略", policy.Name)
|
|
asserts.Equal("123", policy.OptionsSerialized.OdRedirect)
|
|
|
|
rows = sqlmock.NewRows([]string{"name", "type", "options"})
|
|
mock.ExpectQuery("^SELECT(.+)").WillReturnRows(rows)
|
|
policy, err = GetPolicyByID(uint(23))
|
|
asserts.NoError(mock.ExpectationsWereMet())
|
|
asserts.Error(err)
|
|
}
|
|
|
|
// 命中
|
|
{
|
|
policy, err := GetPolicyByID(uint(22))
|
|
asserts.NoError(err)
|
|
asserts.Equal("默认存储策略", policy.Name)
|
|
asserts.Equal("123", policy.OptionsSerialized.OdRedirect)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
func TestPolicy_BeforeSave(t *testing.T) {
|
|
asserts := assert.New(t)
|
|
|
|
testPolicy := Policy{
|
|
OptionsSerialized: PolicyOption{
|
|
OdRedirect: "123",
|
|
},
|
|
}
|
|
expected, _ := json.Marshal(testPolicy.OptionsSerialized)
|
|
err := testPolicy.BeforeSave()
|
|
asserts.NoError(err)
|
|
asserts.Equal(string(expected), testPolicy.Options)
|
|
|
|
}
|
|
|
|
func TestPolicy_GeneratePath(t *testing.T) {
|
|
asserts := assert.New(t)
|
|
testPolicy := Policy{}
|
|
|
|
testPolicy.DirNameRule = "{randomkey16}"
|
|
asserts.Len(testPolicy.GeneratePath(1, "/"), 16)
|
|
|
|
testPolicy.DirNameRule = "{randomkey8}"
|
|
asserts.Len(testPolicy.GeneratePath(1, "/"), 8)
|
|
|
|
testPolicy.DirNameRule = "{timestamp}"
|
|
asserts.Equal(testPolicy.GeneratePath(1, "/"), strconv.FormatInt(time.Now().Unix(), 10))
|
|
|
|
testPolicy.DirNameRule = "{uid}"
|
|
asserts.Equal(testPolicy.GeneratePath(1, "/"), strconv.Itoa(int(1)))
|
|
|
|
testPolicy.DirNameRule = "{datetime}"
|
|
asserts.Len(testPolicy.GeneratePath(1, "/"), 14)
|
|
|
|
testPolicy.DirNameRule = "{date}"
|
|
asserts.Len(testPolicy.GeneratePath(1, "/"), 8)
|
|
|
|
testPolicy.DirNameRule = "123{date}ss{datetime}"
|
|
asserts.Len(testPolicy.GeneratePath(1, "/"), 27)
|
|
|
|
testPolicy.DirNameRule = "/1/{path}/456"
|
|
asserts.Condition(func() (success bool) {
|
|
res := testPolicy.GeneratePath(1, "/23")
|
|
return res == "/1/23/456" || res == "\\1\\23\\456"
|
|
})
|
|
|
|
}
|
|
|
|
func TestPolicy_GenerateFileName(t *testing.T) {
|
|
asserts := assert.New(t)
|
|
// 重命名关闭
|
|
{
|
|
testPolicy := Policy{
|
|
AutoRename: false,
|
|
}
|
|
testPolicy.FileNameRule = "{randomkey16}"
|
|
asserts.Equal("123.txt", testPolicy.GenerateFileName(1, "123.txt"))
|
|
|
|
testPolicy.Type = "oss"
|
|
asserts.Equal("origin", testPolicy.GenerateFileName(1, "origin"))
|
|
}
|
|
|
|
// 重命名开启
|
|
{
|
|
testPolicy := Policy{
|
|
AutoRename: true,
|
|
}
|
|
|
|
testPolicy.FileNameRule = "{randomkey16}"
|
|
asserts.Len(testPolicy.GenerateFileName(1, "123.txt"), 16)
|
|
|
|
testPolicy.FileNameRule = "{randomkey8}"
|
|
asserts.Len(testPolicy.GenerateFileName(1, "123.txt"), 8)
|
|
|
|
testPolicy.FileNameRule = "{timestamp}"
|
|
asserts.Equal(testPolicy.GenerateFileName(1, "123.txt"), strconv.FormatInt(time.Now().Unix(), 10))
|
|
|
|
testPolicy.FileNameRule = "{uid}"
|
|
asserts.Equal(testPolicy.GenerateFileName(1, "123.txt"), strconv.Itoa(int(1)))
|
|
|
|
testPolicy.FileNameRule = "{datetime}"
|
|
asserts.Len(testPolicy.GenerateFileName(1, "123.txt"), 14)
|
|
|
|
testPolicy.FileNameRule = "{date}"
|
|
asserts.Len(testPolicy.GenerateFileName(1, "123.txt"), 8)
|
|
|
|
testPolicy.FileNameRule = "123{date}ss{datetime}"
|
|
asserts.Len(testPolicy.GenerateFileName(1, "123.txt"), 27)
|
|
|
|
testPolicy.FileNameRule = "{originname_without_ext}"
|
|
asserts.Len(testPolicy.GenerateFileName(1, "123.txt"), 3)
|
|
|
|
testPolicy.FileNameRule = "{originname_without_ext}_{randomkey8}{ext}"
|
|
asserts.Len(testPolicy.GenerateFileName(1, "123.txt"), 16)
|
|
|
|
// 支持{originname}的策略
|
|
testPolicy.Type = "local"
|
|
testPolicy.FileNameRule = "123{originname}"
|
|
asserts.Equal("123123.txt", testPolicy.GenerateFileName(1, "123.txt"))
|
|
|
|
testPolicy.Type = "qiniu"
|
|
testPolicy.FileNameRule = "{uid}123{originname}"
|
|
asserts.Equal("1123123.txt", testPolicy.GenerateFileName(1, "123.txt"))
|
|
|
|
testPolicy.Type = "oss"
|
|
testPolicy.FileNameRule = "{uid}123{originname}"
|
|
asserts.Equal("1123123321", testPolicy.GenerateFileName(1, "123321"))
|
|
|
|
testPolicy.Type = "upyun"
|
|
testPolicy.FileNameRule = "{uid}123{originname}"
|
|
asserts.Equal("1123123321", testPolicy.GenerateFileName(1, "123321"))
|
|
|
|
testPolicy.Type = "qiniu"
|
|
testPolicy.FileNameRule = "{uid}123{originname}"
|
|
asserts.Equal("1123123321", testPolicy.GenerateFileName(1, "123321"))
|
|
|
|
testPolicy.Type = "local"
|
|
testPolicy.FileNameRule = "{uid}123{originname}"
|
|
asserts.Equal("1123", testPolicy.GenerateFileName(1, ""))
|
|
|
|
testPolicy.Type = "local"
|
|
testPolicy.FileNameRule = "{ext}123{uuid}"
|
|
asserts.Contains(testPolicy.GenerateFileName(1, "123.txt"), ".txt123")
|
|
}
|
|
|
|
}
|
|
|
|
func TestPolicy_IsDirectlyPreview(t *testing.T) {
|
|
asserts := assert.New(t)
|
|
policy := Policy{Type: "local"}
|
|
asserts.True(policy.IsDirectlyPreview())
|
|
policy.Type = "remote"
|
|
asserts.False(policy.IsDirectlyPreview())
|
|
}
|
|
|
|
func TestPolicy_ClearCache(t *testing.T) {
|
|
asserts := assert.New(t)
|
|
cache.Set("policy_202", 1, 0)
|
|
policy := Policy{Model: gorm.Model{ID: 202}}
|
|
policy.ClearCache()
|
|
_, ok := cache.Get("policy_202")
|
|
asserts.False(ok)
|
|
}
|
|
|
|
func TestPolicy_UpdateAccessKey(t *testing.T) {
|
|
asserts := assert.New(t)
|
|
policy := Policy{Model: gorm.Model{ID: 202}}
|
|
mock.ExpectBegin()
|
|
mock.ExpectExec("UPDATE(.+)").WillReturnResult(sqlmock.NewResult(1, 1))
|
|
mock.ExpectCommit()
|
|
policy.AccessKey = "123"
|
|
err := policy.SaveAndClearCache()
|
|
asserts.NoError(mock.ExpectationsWereMet())
|
|
asserts.NoError(err)
|
|
}
|
|
|
|
func TestPolicy_Props(t *testing.T) {
|
|
asserts := assert.New(t)
|
|
policy := Policy{Type: "onedrive"}
|
|
policy.OptionsSerialized.PlaceholderWithSize = true
|
|
asserts.False(policy.IsThumbGenerateNeeded())
|
|
asserts.False(policy.IsTransitUpload(4))
|
|
asserts.False(policy.IsTransitUpload(5 * 1024 * 1024))
|
|
asserts.True(policy.CanStructureBeListed())
|
|
asserts.True(policy.IsUploadPlaceholderWithSize())
|
|
policy.Type = "local"
|
|
asserts.True(policy.IsThumbGenerateNeeded())
|
|
asserts.False(policy.CanStructureBeListed())
|
|
asserts.False(policy.IsUploadPlaceholderWithSize())
|
|
policy.Type = "remote"
|
|
asserts.True(policy.IsUploadPlaceholderWithSize())
|
|
}
|
|
|
|
func TestPolicy_UpdateAccessKeyAndClearCache(t *testing.T) {
|
|
a := assert.New(t)
|
|
cache.Set("policy_1331", Policy{}, 3600)
|
|
p := &Policy{}
|
|
p.ID = 1331
|
|
mock.ExpectBegin()
|
|
mock.ExpectExec("UPDATE(.+)").WithArgs("ak", sqlmock.AnyArg()).WillReturnResult(sqlmock.NewResult(1, 1))
|
|
mock.ExpectCommit()
|
|
|
|
a.NoError(p.UpdateAccessKeyAndClearCache("ak"))
|
|
a.NoError(mock.ExpectationsWereMet())
|
|
_, ok := cache.Get("policy_1331")
|
|
a.False(ok)
|
|
}
|
|
|
|
func TestPolicy_CouldProxyThumb(t *testing.T) {
|
|
a := assert.New(t)
|
|
p := &Policy{Type: "local"}
|
|
|
|
// local policy
|
|
{
|
|
a.False(p.CouldProxyThumb())
|
|
}
|
|
|
|
// feature not enabled
|
|
{
|
|
p.Type = "remote"
|
|
cache.Set("setting_thumb_proxy_enabled", "0", 0)
|
|
a.False(p.CouldProxyThumb())
|
|
}
|
|
|
|
// list not contain current policy
|
|
{
|
|
p.ID = 2
|
|
cache.Set("setting_thumb_proxy_enabled", "1", 0)
|
|
cache.Set("setting_thumb_proxy_policy", "[1]", 0)
|
|
a.False(p.CouldProxyThumb())
|
|
}
|
|
|
|
// enabled
|
|
{
|
|
p.ID = 2
|
|
cache.Set("setting_thumb_proxy_enabled", "1", 0)
|
|
cache.Set("setting_thumb_proxy_policy", "[2]", 0)
|
|
a.True(p.CouldProxyThumb())
|
|
}
|
|
|
|
cache.Deletes([]string{"thumb_proxy_enabled", "thumb_proxy_policy"}, "setting_")
|
|
}
|