Skip to content

Commit 070fdfc

Browse files
committed
test: add comment on regexp necessity
for details, see #12999 and https://go.dev/play/p/cgkKxJZtCCp
1 parent 0a68f5b commit 070fdfc

File tree

2 files changed

+6
-1
lines changed

2 files changed

+6
-1
lines changed

test/e2e/settings/enable_real_ip.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,7 @@ var _ = framework.DescribeSetting("enable-real-ip", func() {
6565
Body().
6666
Raw()
6767

68+
// we use a regexp to prevent matching the expression in the middle of the x-original-forwarded-host header
6869
assert.NotRegexp(ginkgo.GinkgoT(), `(\s)host=myhost`, body)
6970
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-host=myhost")
7071
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-proto=myproto")
@@ -106,6 +107,7 @@ var _ = framework.DescribeSetting("enable-real-ip", func() {
106107
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-proto=http")
107108
assert.Contains(ginkgo.GinkgoT(), body, "x-original-forwarded-for=1.2.3.4")
108109
assert.Contains(ginkgo.GinkgoT(), body, "x-original-forwarded-host=myhost")
110+
// we use a regexp to prevent matching the expression in the middle of the x-original-forwarded-host header
109111
assert.NotRegexp(ginkgo.GinkgoT(), `(\s)host=myhost`, body)
110112
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-host=myhost")
111113
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-proto=myproto")

test/e2e/settings/forwarded_headers.go

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,7 @@ var _ = framework.DescribeSetting("use-forwarded-headers", func() {
6666
Body().
6767
Raw()
6868

69+
// we use a regexp to prevent matching the expression in the middle of the x-original-forwarded-host header
6970
assert.Regexp(ginkgo.GinkgoT(), `(\s)host=myhost`, body)
7071
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-host=myhost")
7172
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-proto=myproto")
@@ -86,7 +87,8 @@ var _ = framework.DescribeSetting("use-forwarded-headers", func() {
8687
Body().
8788
Raw()
8889

89-
assert.Regexp(ginkgo.GinkgoT(), `(\s)host=myhost`, body)
90+
// we use a regexp to prevent matching the expression in the middle of the x-original-forwarded-host header
91+
assert.Regexp(ginkgo.GinkgoT(), `(\s)host=myhost.com`, body)
9092
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-host=myhost.com")
9193
})
9294

@@ -122,6 +124,7 @@ var _ = framework.DescribeSetting("use-forwarded-headers", func() {
122124
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-scheme=http")
123125
assert.Contains(ginkgo.GinkgoT(), body, "x-original-forwarded-for=1.2.3.4")
124126
assert.Contains(ginkgo.GinkgoT(), body, "x-original-forwarded-host=myhost")
127+
// we use a regexp to prevent matching the expression in the middle of the x-original-forwarded-host header
125128
assert.NotRegexp(ginkgo.GinkgoT(), `(\s)host=myhost`, body)
126129
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-host=myhost")
127130
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-proto=myproto")

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy