Skip to content

🧹 chore: Improve CORS tests coverage #3530

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 2 commits into from
Jun 20, 2025
Merged

Conversation

gaby
Copy link
Member

@gaby gaby commented Jun 19, 2025

Summary

  • add regression test for warning when AllowOrigins is wildcard and AllowOriginsFunc is set.

@Copilot Copilot AI review requested due to automatic review settings June 19, 2025 22:14
@gaby gaby requested a review from a team as a code owner June 19, 2025 22:14
Copy link
Contributor

coderabbitai bot commented Jun 19, 2025

Walkthrough

A new test was added to verify that a warning is logged when both AllowOrigins is set to "*" and an AllowOriginsFunc is provided in the CORS middleware configuration. The test captures and checks the logger output to ensure the warning is present. No other code or control flow changes were made.

Changes

File(s) Change Summary
middleware/cors/cors_test.go Added a test to check warning log when AllowOrigins="*" and AllowOriginsFunc are both set.

Suggested labels

🧹 Updates, v3

Suggested reviewers

  • efectn
  • sixcolors

Poem

In the land of middleware hops,
A rabbit checks the warning logs—
When origins all and functions meet,
The logger’s message is quite neat.
With tests in place, our code is sound,
Bugs and warnings soon unwound!
🐇✨


📜 Recent review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 9516bd2 and ac95d9b.

📒 Files selected for processing (1)
  • middleware/cors/cors_test.go (2 hunks)
🚧 Files skipped from review as they are similar to previous changes (1)
  • middleware/cors/cors_test.go
⏰ Context from checks skipped due to timeout of 90000ms (9)
  • GitHub Check: unit (1.24.x, macos-13)
  • GitHub Check: unit (1.24.x, macos-latest)
  • GitHub Check: lint
  • GitHub Check: unit (1.24.x, windows-latest)
  • GitHub Check: unit (1.24.x, ubuntu-latest)
  • GitHub Check: repeated
  • GitHub Check: govulncheck-check
  • GitHub Check: Analyse
  • GitHub Check: Compare
✨ Finishing Touches
  • 📝 Generate Docstrings

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share
🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Explain this complex logic.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai explain this code block.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and explain its main purpose.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Support

Need help? Create a ticket on our support page for assistance with any issues or questions.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai generate docstrings to generate docstrings for this PR.
  • @coderabbitai generate sequence diagram to generate a sequence diagram of the changes in this PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Summary of Changes

Hello @gaby, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request primarily focuses on enhancing the test suite for the CORS middleware. I've introduced a new regression test to validate that a warning message is correctly emitted when the CORS configuration includes both a wildcard origin and a custom origin function, which helps prevent silent misconfigurations and improves developer awareness of how these settings interact.

Highlights

  • New Test Case: I've added a new regression test, Test_CORS_Warn_AllowAllOrigins_WithFunc, to specifically verify that a warning is logged when the CORS middleware is configured with both a wildcard AllowOrigins (e.g., "*") and a custom AllowOriginsFunc. In such a scenario, the AllowOriginsFunc is effectively ignored, and the test ensures this behavior is correctly communicated via a log warning.
  • CORS Coverage: This PR increases the test coverage for the CORS middleware by addressing an important configuration edge case, ensuring that developers are properly warned about potentially redundant or misunderstood settings.
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point in your pull request via creating an issue comment (i.e. comment on the pull request page) using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in issue comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist is currently in preview and may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments to provide feedback.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

Copy link
Contributor

@Copilot Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

Adds a regression test to ensure a warning is logged when both wildcard origins and a custom AllowOriginsFunc are provided.

  • Introduced Test_CORS_Warn_AllowAllOrigins_WithFunc to capture and assert the warning log.
  • Imported bytes, os, and fiber/v3/log to redirect and inspect log output.

Copy link
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request adds a regression test to the CORS middleware, ensuring that a warning is logged when AllowOrigins is set to a wildcard and AllowOriginsFunc is also provided. The test is well-structured and verifies the expected warning message.

Copy link

codecov bot commented Jun 19, 2025

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 90.42%. Comparing base (3b2af61) to head (ac95d9b).
Report is 1 commits behind head on main.

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #3530      +/-   ##
==========================================
+ Coverage   90.40%   90.42%   +0.02%     
==========================================
  Files         110      110              
  Lines       10939    10939              
==========================================
+ Hits         9889     9892       +3     
+ Misses        791      789       -2     
+ Partials      259      258       -1     
Flag Coverage Δ
unittests 90.42% <ø> (+0.02%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

@gaby gaby changed the title Increase CORS coverage 🧹 chore: Increase CORS tests coverage Jun 19, 2025
Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Nitpick comments (1)
middleware/cors/cors_test.go (1)

267-281: Good test structure with potential for improved assertion robustness.

The test correctly implements a regression test for the warning scenario and follows good practices:

  • Proper log output capture and restoration using t.Cleanup
  • Tests the exact configuration mentioned in the PR objectives
  • Clear test intent and structure

However, consider improving the assertion for better robustness:

The current assertion checks for a partial message that could be fragile:

-	require.Contains(t, buf.String(), "AllowOriginsFunc' will not be used")
+	require.Contains(t, buf.String(), "AllowOriginsFunc will not be used when AllowOrigins is '*'")

This would make the test more specific and less prone to false positives if the message format changes slightly.

Please verify that this test actually triggers the warning by running it and ensuring the CORS middleware implementation logs the expected message for this configuration.

#!/bin/bash
# Description: Run the specific test to verify it captures the expected warning
cd middleware/cors
go test -v -run "Test_CORS_Warn_AllowAllOrigins_WithFunc"
📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 3b2af61 and 9516bd2.

📒 Files selected for processing (1)
  • middleware/cors/cors_test.go (2 hunks)
⏰ Context from checks skipped due to timeout of 90000ms (9)
  • GitHub Check: unit (1.24.x, macos-13)
  • GitHub Check: unit (1.24.x, ubuntu-latest)
  • GitHub Check: unit (1.24.x, macos-latest)
  • GitHub Check: unit (1.24.x, windows-latest)
  • GitHub Check: Compare
  • GitHub Check: repeated
  • GitHub Check: lint
  • GitHub Check: Analyse
  • GitHub Check: govulncheck-check
🔇 Additional comments (1)
middleware/cors/cors_test.go (1)

4-4: LGTM: Necessary imports for log capture functionality.

The added imports (bytes, os, and log) are appropriately used in the new test function for capturing and verifying log output.

Also applies to: 6-6, 11-11

@gaby gaby changed the title 🧹 chore: Increase CORS tests coverage 🧹 chore: Improve CORS tests coverage Jun 19, 2025
Copy link
Contributor

@github-actions github-actions bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Performance Alert ⚠️

Possible performance regression was detected for benchmark.
Benchmark result of this commit is worse than the previous benchmark result exceeding threshold 1.50.

Benchmark suite Current: 9516bd2 Previous: 3b2af61 Ratio
Benchmark_Utils_GetOffer/6_offers 223.3 ns/op 0 B/op 0 allocs/op 130 ns/op 0 B/op 0 allocs/op 1.72
Benchmark_Utils_GetOffer/6_offers - ns/op 223.3 ns/op 130 ns/op 1.72
Benchmark_SlashRecognition/indexBytes 7.904 ns/op 0 B/op 0 allocs/op 4.982 ns/op 0 B/op 0 allocs/op 1.59
Benchmark_SlashRecognition/indexBytes - ns/op 7.904 ns/op 4.982 ns/op 1.59
Benchmark_GenericParseTypeBytes/benchmark_genericParseTypeBytes#01 35.21 ns/op 8 B/op 1 allocs/op 21.17 ns/op 8 B/op 1 allocs/op 1.66
Benchmark_GenericParseTypeBytes/benchmark_genericParseTypeBytes#01 - ns/op 35.21 ns/op 21.17 ns/op 1.66

This comment was automatically generated by workflow using github-action-benchmark.

@ReneWerner87 ReneWerner87 merged commit aea0fd2 into main Jun 20, 2025
17 of 19 checks passed
@gaby gaby deleted the codex/2025-06-19-22-13-58 branch June 20, 2025 11:03
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants