@@ -46,7 +46,7 @@ func Test_Ctx_Accepts(t *testing.T) {
46
46
47
47
c .Request ().Header .Set (HeaderAccept , "text/html,application/xhtml+xml,application/xml;q=0.9" )
48
48
require .Equal (t , "" , c .Accepts ("" ))
49
- require .Equal (t , "" , c .Accepts ())
49
+ require .Equal (t , "" , c .Req (). Accepts ())
50
50
require .Equal (t , ".xml" , c .Accepts (".xml" ))
51
51
require .Equal (t , "" , c .Accepts (".john" ))
52
52
require .Equal (t , "application/xhtml+xml" , c .Accepts ("application/xml" , "application/xml+rss" , "application/yaml" , "application/xhtml+xml" ), "must use client-preferred mime type" )
@@ -57,13 +57,13 @@ func Test_Ctx_Accepts(t *testing.T) {
57
57
c .Request ().Header .Set (HeaderAccept , "text/*, application/json" )
58
58
require .Equal (t , "html" , c .Accepts ("html" ))
59
59
require .Equal (t , "text/html" , c .Accepts ("text/html" ))
60
- require .Equal (t , "json" , c .Accepts ("json" , "text" ))
60
+ require .Equal (t , "json" , c .Req (). Accepts ("json" , "text" ))
61
61
require .Equal (t , "application/json" , c .Accepts ("application/json" ))
62
62
require .Equal (t , "" , c .Accepts ("image/png" ))
63
63
require .Equal (t , "" , c .Accepts ("png" ))
64
64
65
65
c .Request ().Header .Set (HeaderAccept , "text/html, application/json" )
66
- require .Equal (t , "text/*" , c .Accepts ("text/*" ))
66
+ require .Equal (t , "text/*" , c .Req (). Accepts ("text/*" ))
67
67
68
68
c .Request ().Header .Set (HeaderAccept , "*/*" )
69
69
require .Equal (t , "html" , c .Accepts ("html" ))
@@ -968,46 +968,46 @@ func Test_Ctx_Cookie(t *testing.T) {
968
968
Expires : expire ,
969
969
// SameSite: CookieSameSiteStrictMode, // default is "lax"
970
970
}
971
- c .Cookie (cookie )
971
+ c .Res (). Cookie (cookie )
972
972
expect := "username=john; expires=" + httpdate + "; path=/; SameSite=Lax"
973
- require .Equal (t , expect , string ( c . Response ().Header . Peek (HeaderSetCookie ) ))
973
+ require .Equal (t , expect , c . Res ().Get (HeaderSetCookie ))
974
974
975
975
expect = "username=john; expires=" + httpdate + "; path=/"
976
976
cookie .SameSite = CookieSameSiteDisabled
977
- c .Cookie (cookie )
978
- require .Equal (t , expect , string ( c . Response ().Header . Peek (HeaderSetCookie ) ))
977
+ c .Res (). Cookie (cookie )
978
+ require .Equal (t , expect , c . Res ().Get (HeaderSetCookie ))
979
979
980
980
expect = "username=john; expires=" + httpdate + "; path=/; SameSite=Strict"
981
981
cookie .SameSite = CookieSameSiteStrictMode
982
- c .Cookie (cookie )
983
- require .Equal (t , expect , string ( c . Response ().Header . Peek (HeaderSetCookie ) ))
982
+ c .Res (). Cookie (cookie )
983
+ require .Equal (t , expect , c . Res ().Get (HeaderSetCookie ))
984
984
985
985
expect = "username=john; expires=" + httpdate + "; path=/; secure; SameSite=None"
986
986
cookie .Secure = true
987
987
cookie .SameSite = CookieSameSiteNoneMode
988
- c .Cookie (cookie )
989
- require .Equal (t , expect , string ( c . Response ().Header . Peek (HeaderSetCookie ) ))
988
+ c .Res (). Cookie (cookie )
989
+ require .Equal (t , expect , c . Res ().Get (HeaderSetCookie ))
990
990
991
991
expect = "username=john; path=/; secure; SameSite=None"
992
992
// should remove expires and max-age headers
993
993
cookie .SessionOnly = true
994
994
cookie .Expires = expire
995
995
cookie .MaxAge = 10000
996
- c .Cookie (cookie )
997
- require .Equal (t , expect , string ( c . Response ().Header . Peek (HeaderSetCookie ) ))
996
+ c .Res (). Cookie (cookie )
997
+ require .Equal (t , expect , c . Res ().Get (HeaderSetCookie ))
998
998
999
999
expect = "username=john; path=/; secure; SameSite=None"
1000
1000
// should remove expires and max-age headers when no expire and no MaxAge (default time)
1001
1001
cookie .SessionOnly = false
1002
1002
cookie .Expires = time.Time {}
1003
1003
cookie .MaxAge = 0
1004
- c .Cookie (cookie )
1005
- require .Equal (t , expect , string ( c . Response ().Header . Peek (HeaderSetCookie ) ))
1004
+ c .Res (). Cookie (cookie )
1005
+ require .Equal (t , expect , c . Res ().Get (HeaderSetCookie ))
1006
1006
1007
1007
expect = "username=john; path=/; secure; SameSite=None; Partitioned"
1008
1008
cookie .Partitioned = true
1009
- c .Cookie (cookie )
1010
- require .Equal (t , expect , string ( c . Response ().Header . Peek (HeaderSetCookie ) ))
1009
+ c .Res (). Cookie (cookie )
1010
+ require .Equal (t , expect , c . Res ().Get (HeaderSetCookie ))
1011
1011
}
1012
1012
1013
1013
// go test -v -run=^$ -bench=Benchmark_Ctx_Cookie -benchmem -count=4
@@ -1033,8 +1033,8 @@ func Test_Ctx_Cookies(t *testing.T) {
1033
1033
c := app .AcquireCtx (& fasthttp.RequestCtx {})
1034
1034
1035
1035
c .Request ().Header .Set ("Cookie" , "john=doe" )
1036
- require .Equal (t , "doe" , c .Cookies ("john" ))
1037
- require .Equal (t , "default" , c .Cookies ("unknown" , "default" ))
1036
+ require .Equal (t , "doe" , c .Req (). Cookies ("john" ))
1037
+ require .Equal (t , "default" , c .Req (). Cookies ("unknown" , "default" ))
1038
1038
}
1039
1039
1040
1040
// go test -run Test_Ctx_Format
@@ -1058,13 +1058,13 @@ func Test_Ctx_Format(t *testing.T) {
1058
1058
}
1059
1059
1060
1060
c .Request ().Header .Set (HeaderAccept , `text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7` )
1061
- err := c .Format (formatHandlers ("application/xhtml+xml" , "application/xml" , "foo/bar" )... )
1061
+ err := c .Res (). Format (formatHandlers ("application/xhtml+xml" , "application/xml" , "foo/bar" )... )
1062
1062
require .Equal (t , "application/xhtml+xml" , accepted )
1063
1063
require .Equal (t , "application/xhtml+xml" , c .GetRespHeader (HeaderContentType ))
1064
1064
require .NoError (t , err )
1065
1065
require .NotEqual (t , StatusNotAcceptable , c .Response ().StatusCode ())
1066
1066
1067
- err = c .Format (formatHandlers ("foo/bar;a=b" )... )
1067
+ err = c .Res (). Format (formatHandlers ("foo/bar;a=b" )... )
1068
1068
require .Equal (t , "foo/bar;a=b" , accepted )
1069
1069
require .Equal (t , "foo/bar;a=b" , c .GetRespHeader (HeaderContentType ))
1070
1070
require .NoError (t , err )
@@ -1165,7 +1165,7 @@ func Test_Ctx_AutoFormat(t *testing.T) {
1165
1165
require .Equal (t , "Hello, World!" , string (c .Response ().Body ()))
1166
1166
1167
1167
c .Request ().Header .Set (HeaderAccept , MIMETextHTML )
1168
- err = c .AutoFormat ("Hello, World!" )
1168
+ err = c .Res (). AutoFormat ("Hello, World!" )
1169
1169
require .NoError (t , err )
1170
1170
require .Equal (t , "<p>Hello, World!</p>" , string (c .Response ().Body ()))
1171
1171
@@ -1175,7 +1175,7 @@ func Test_Ctx_AutoFormat(t *testing.T) {
1175
1175
require .Equal (t , `"Hello, World!"` , string (c .Response ().Body ()))
1176
1176
1177
1177
c .Request ().Header .Set (HeaderAccept , MIMETextPlain )
1178
- err = c .AutoFormat (complex (1 , 1 ))
1178
+ err = c .Res (). AutoFormat (complex (1 , 1 ))
1179
1179
require .NoError (t , err )
1180
1180
require .Equal (t , "(1+1i)" , string (c .Response ().Body ()))
1181
1181
@@ -2939,7 +2939,7 @@ func Test_Ctx_SaveFile(t *testing.T) {
2939
2939
app := New ()
2940
2940
2941
2941
app .Post ("/test" , func (c Ctx ) error {
2942
- fh , err := c .FormFile ("file" )
2942
+ fh , err := c .Req (). FormFile ("file" )
2943
2943
require .NoError (t , err )
2944
2944
2945
2945
tempFile , err := os .CreateTemp (os .TempDir (), "test-" )
@@ -3075,7 +3075,7 @@ func Test_Ctx_ClearCookie(t *testing.T) {
3075
3075
c := app .AcquireCtx (& fasthttp.RequestCtx {})
3076
3076
3077
3077
c .Request ().Header .Set (HeaderCookie , "john=doe" )
3078
- c .ClearCookie ("john" )
3078
+ c .Res (). ClearCookie ("john" )
3079
3079
require .True (t , strings .HasPrefix (string (c .Response ().Header .Peek (HeaderSetCookie )), "john=; expires=" ))
3080
3080
3081
3081
c .Request ().Header .Set (HeaderCookie , "test1=dummy" )
@@ -3104,7 +3104,7 @@ func Test_Ctx_Download(t *testing.T) {
3104
3104
require .Equal (t , expect , c .Response ().Body ())
3105
3105
require .Equal (t , `attachment; filename="Awesome+File%21"` , string (c .Response ().Header .Peek (HeaderContentDisposition )))
3106
3106
3107
- require .NoError (t , c .Download ("ctx.go" ))
3107
+ require .NoError (t , c .Res (). Download ("ctx.go" ))
3108
3108
require .Equal (t , `attachment; filename="ctx.go"` , string (c .Response ().Header .Peek (HeaderContentDisposition )))
3109
3109
}
3110
3110
@@ -3136,7 +3136,7 @@ func Test_Ctx_SendFile(t *testing.T) {
3136
3136
3137
3137
// test with custom error code
3138
3138
c = app .AcquireCtx (& fasthttp.RequestCtx {})
3139
- err = c .Status (StatusInternalServerError ).SendFile ("ctx.go" )
3139
+ err = c .Res (). Status (StatusInternalServerError ).SendFile ("ctx.go" )
3140
3140
// check expectation
3141
3141
require .NoError (t , err )
3142
3142
require .Equal (t , expectFileContent , c .Response ().Body ())
@@ -3161,7 +3161,7 @@ func Test_Ctx_SendFile_ContentType(t *testing.T) {
3161
3161
3162
3162
// 1) simple case
3163
3163
c := app .AcquireCtx (& fasthttp.RequestCtx {})
3164
- err := c .SendFile ("./.github/testdata/fs/img/fiber.png" )
3164
+ err := c .Res (). SendFile ("./.github/testdata/fs/img/fiber.png" )
3165
3165
// check expectation
3166
3166
require .NoError (t , err )
3167
3167
require .Equal (t , StatusOK , c .Response ().StatusCode ())
@@ -3782,7 +3782,7 @@ func Test_Ctx_JSONP(t *testing.T) {
3782
3782
require .Equal (t , `callback({"Age":20,"Name":"Grame"});` , string (c .Response ().Body ()))
3783
3783
require .Equal (t , "text/javascript; charset=utf-8" , string (c .Response ().Header .Peek ("content-type" )))
3784
3784
3785
- err = c .JSONP (Map {
3785
+ err = c .Res (). JSONP (Map {
3786
3786
"Name" : "Grame" ,
3787
3787
"Age" : 20 ,
3788
3788
}, "john" )
@@ -4006,7 +4006,7 @@ func Test_Ctx_Render(t *testing.T) {
4006
4006
err = c .Render ("./.github/testdata/template-non-exists.html" , nil )
4007
4007
require .Error (t , err )
4008
4008
4009
- err = c .Render ("./.github/testdata/template-invalid.html" , nil )
4009
+ err = c .Res (). Render ("./.github/testdata/template-invalid.html" , nil )
4010
4010
require .Error (t , err )
4011
4011
}
4012
4012
@@ -4907,7 +4907,7 @@ func Test_Ctx_Queries(t *testing.T) {
4907
4907
4908
4908
c .Request ().URI ().SetQueryString ("tags=apple,orange,banana&filters[tags]=apple,orange,banana&filters[category][name]=fruits&filters.tags=apple,orange,banana&filters.category.name=fruits" )
4909
4909
4910
- queries = c .Queries ()
4910
+ queries = c .Req (). Queries ()
4911
4911
require .Equal (t , "apple,orange,banana" , queries ["tags" ])
4912
4912
require .Equal (t , "apple,orange,banana" , queries ["filters[tags]" ])
4913
4913
require .Equal (t , "fruits" , queries ["filters[category][name]" ])
@@ -5055,7 +5055,7 @@ func Test_Ctx_IsFromLocal_X_Forwarded(t *testing.T) {
5055
5055
c := app .AcquireCtx (& fasthttp.RequestCtx {})
5056
5056
c .Request ().Header .Set (HeaderXForwardedFor , "93.46.8.90" )
5057
5057
5058
- require .False (t , c .IsFromLocal ())
5058
+ require .False (t , c .Req (). IsFromLocal ())
5059
5059
}
5060
5060
}
5061
5061
@@ -5088,8 +5088,8 @@ func Test_Ctx_IsFromLocal_RemoteAddr(t *testing.T) {
5088
5088
fastCtx := & fasthttp.RequestCtx {}
5089
5089
fastCtx .SetRemoteAddr (localIPv6 )
5090
5090
c := app .AcquireCtx (fastCtx )
5091
- require .Equal (t , "::1" , c .IP ())
5092
- require .True (t , c .IsFromLocal ())
5091
+ require .Equal (t , "::1" , c .Req (). IP ())
5092
+ require .True (t , c .Req (). IsFromLocal ())
5093
5093
}
5094
5094
// Test for the case fasthttp remoteAddr is set to "0:0:0:0:0:0:0:1".
5095
5095
{
0 commit comments