Bump google.golang.org/api

This commit is contained in:
Andrea Spacca
2019-03-17 20:19:56 +01:00
parent 8e39b7fa01
commit ec086b4eb3
5432 changed files with 2486664 additions and 231553 deletions

457
vendor/github.com/google/martian/cmd/proxy/main.go generated vendored Normal file
View File

@@ -0,0 +1,457 @@
// Copyright 2015 Google Inc. All rights reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
// proxy is an HTTP/S proxy configurable via an HTTP API.
//
// It can be dynamically configured/queried at runtime by issuing requests to
// proxy specific paths using JSON.
//
// Supported configuration endpoints:
//
// POST http://martian.proxy/configure
//
// sets the request and response modifier of the proxy; modifiers adhere to the
// following top-level JSON structure:
//
// {
// "package.Modifier": {
// "scope": ["request", "response"],
// "attribute 1": "value",
// "attribute 2": "value"
// }
// }
//
// modifiers may be "stacked" to provide support for additional behaviors; for
// example, to add a "Martian-Test" header with the value "true" for requests
// with the domain "www.example.com" the JSON message would be:
//
// {
// "url.Filter": {
// "scope": ["request"],
// "host": "www.example.com",
// "modifier": {
// "header.Modifier": {
// "name": "Martian-Test",
// "value": "true"
// }
// }
// }
// }
//
// url.Filter parses the JSON object in the value of the "url.Filter" attribute;
// the "host" key tells the url.Filter to filter requests if the host explicitly
// matches "www.example.com"
//
// the "modifier" key within the "url.Filter" JSON object contains another
// modifier message of the type header.Modifier to run iff the filter passes
//
// groups may also be used to run multiple modifiers sequentially; for example to
// log requests and responses after adding the "Martian-Test" header to the
// request, but only when the host matches www.example.com:
//
// {
// "url.Filter": {
// "host": "www.example.com",
// "modifier": {
// "fifo.Group": {
// "modifiers": [
// {
// "header.Modifier": {
// "scope": ["request"],
// "name": "Martian-Test",
// "value": "true"
// }
// },
// {
// "log.Logger": { }
// }
// ]
// }
// }
// }
// }
//
// modifiers are designed to be composed together in ways that allow the user to
// write a single JSON structure to accomplish a variety of functionality
//
// GET http://martian.proxy/verify
//
// retrieves the verifications errors as JSON with the following structure:
//
// {
// "errors": [
// {
// "message": "request(url) verification failure"
// },
// {
// "message": "response(url) verification failure"
// }
// ]
// }
//
// verifiers also adhere to the modifier interface and thus can be included in the
// modifier configuration request; for example, to verify that all requests to
// "www.example.com" are sent over HTTPS send the following JSON to the
// configuration endpoint:
//
// {
// "url.Filter": {
// "scope": ["request"],
// "host": "www.example.com",
// "modifier": {
// "url.Verifier": {
// "scope": ["request"],
// "scheme": "https"
// }
// }
// }
// }
//
// sending a request to "http://martian.proxy/verify" will then return errors from the url.Verifier
//
// POST http://martian.proxy/verify/reset
//
// resets the verifiers to their initial state; note some verifiers may start in
// a failure state (e.g., pingback.Verifier is failed if no requests have been
// seen by the proxy)
//
// GET http://martian.proxy/authority.cer
//
// prompts the user to install the CA certificate used by the proxy if MITM is enabled
//
// GET http://martian.proxy/logs
//
// retrieves the HAR logs for all requests and responses seen by the proxy if
// the HAR flag is enabled
//
// DELETE http://martian.proxy/logs/reset
//
// reset the in-memory HAR log; note that the log will grow unbounded unless it
// is periodically reset
//
// passing the -cors flag will enable CORS support for the endpoints so that they
// may be called via AJAX
//
// Sending a sigint will cause the proxy to stop receiving new connections,
// finish processing any inflight requests, and close existing connections without
// reading anymore requests from them.
//
// The flags are:
// -addr=":8080"
// host:port of the proxy
// -api-addr=":8181"
// host:port of the proxy API
// -tls-addr=":4443"
// host:port of the proxy over TLS
// -api="martian.proxy"
// hostname that can be used to reference the configuration API when
// configuring through the proxy
// -cert=""
// PEM encoded X.509 CA certificate; if set, it will be set as the
// issuer for dynamically-generated certificates during man-in-the-middle
// -key=""
// PEM encoded private key of cert (RSA or ECDSA); if set, the key will be used
// to sign dynamically-generated certificates during man-in-the-middle
// -generate-ca-cert=false
// generates a CA certificate and private key to use for man-in-the-middle;
// the certificate is only valid while the proxy is running and will be
// discarded on shutdown
// -organization="Martian Proxy"
// organization name set on the dynamically-generated certificates during
// man-in-the-middle
// -validity="1h"
// window of time around the time of request that the dynamically-generated
// certificate is valid for; the duration is set such that the total valid
// timeframe is double the value of validity (1h before & 1h after)
// -cors=false
// allow the proxy to be configured via CORS requests; such as when
// configuring the proxy via AJAX
// -har=false
// enable logging endpoints for retrieving full request/response logs in
// HAR format.
// -traffic-shaping=false
// enable traffic shaping endpoints for simulating latency and constrained
// bandwidth conditions (e.g. mobile, exotic network infrastructure, the
// 90's)
// -skip-tls-verify=false
// skip TLS server verification; insecure and intended for testing only
// -v=0
// log level for console logs; defaults to error only.
package main
import (
"crypto/tls"
"crypto/x509"
"flag"
"log"
"net"
"net/http"
"net/url"
"os"
"os/signal"
"path"
"strconv"
"strings"
"time"
"github.com/google/martian"
mapi "github.com/google/martian/api"
"github.com/google/martian/cors"
"github.com/google/martian/fifo"
"github.com/google/martian/har"
"github.com/google/martian/httpspec"
"github.com/google/martian/marbl"
"github.com/google/martian/martianhttp"
"github.com/google/martian/martianlog"
"github.com/google/martian/mitm"
"github.com/google/martian/servemux"
"github.com/google/martian/trafficshape"
"github.com/google/martian/verify"
_ "github.com/google/martian/body"
_ "github.com/google/martian/cookie"
_ "github.com/google/martian/failure"
_ "github.com/google/martian/martianurl"
_ "github.com/google/martian/method"
_ "github.com/google/martian/pingback"
_ "github.com/google/martian/port"
_ "github.com/google/martian/priority"
_ "github.com/google/martian/querystring"
_ "github.com/google/martian/skip"
_ "github.com/google/martian/stash"
_ "github.com/google/martian/static"
_ "github.com/google/martian/status"
)
var (
addr = flag.String("addr", ":8080", "host:port of the proxy")
apiAddr = flag.String("api-addr", ":8181", "host:port of the configuration API")
tlsAddr = flag.String("tls-addr", ":4443", "host:port of the proxy over TLS")
api = flag.String("api", "martian.proxy", "hostname for the API")
generateCA = flag.Bool("generate-ca-cert", false, "generate CA certificate and private key for MITM")
cert = flag.String("cert", "", "filepath to the CA certificate used to sign MITM certificates")
key = flag.String("key", "", "filepath to the private key of the CA used to sign MITM certificates")
organization = flag.String("organization", "Martian Proxy", "organization name for MITM certificates")
validity = flag.Duration("validity", time.Hour, "window of time that MITM certificates are valid")
allowCORS = flag.Bool("cors", false, "allow CORS requests to configure the proxy")
harLogging = flag.Bool("har", false, "enable HAR logging API")
marblLogging = flag.Bool("marbl", false, "enable MARBL logging API")
trafficShaping = flag.Bool("traffic-shaping", false, "enable traffic shaping API")
skipTLSVerify = flag.Bool("skip-tls-verify", false, "skip TLS server verification; insecure")
dsProxyURL = flag.String("downstream-proxy-url", "", "URL of downstream proxy")
)
func main() {
p := martian.NewProxy()
defer p.Close()
tr := &http.Transport{
Dial: (&net.Dialer{
Timeout: 30 * time.Second,
KeepAlive: 30 * time.Second,
}).Dial,
TLSHandshakeTimeout: 10 * time.Second,
ExpectContinueTimeout: time.Second,
TLSClientConfig: &tls.Config{
InsecureSkipVerify: *skipTLSVerify,
},
}
p.SetRoundTripper(tr)
if *dsProxyURL != "" {
u, err := url.Parse(*dsProxyURL)
if err != nil {
log.Fatal(err)
}
p.SetDownstreamProxy(u)
}
mux := http.NewServeMux()
var x509c *x509.Certificate
var priv interface{}
if *generateCA {
var err error
x509c, priv, err = mitm.NewAuthority("martian.proxy", "Martian Authority", 30*24*time.Hour)
if err != nil {
log.Fatal(err)
}
} else if *cert != "" && *key != "" {
tlsc, err := tls.LoadX509KeyPair(*cert, *key)
if err != nil {
log.Fatal(err)
}
priv = tlsc.PrivateKey
x509c, err = x509.ParseCertificate(tlsc.Certificate[0])
if err != nil {
log.Fatal(err)
}
}
if x509c != nil && priv != nil {
mc, err := mitm.NewConfig(x509c, priv)
if err != nil {
log.Fatal(err)
}
mc.SetValidity(*validity)
mc.SetOrganization(*organization)
mc.SkipTLSVerify(*skipTLSVerify)
p.SetMITM(mc)
// Expose certificate authority.
ah := martianhttp.NewAuthorityHandler(x509c)
configure("/authority.cer", ah, mux)
// Start TLS listener for transparent MITM.
tl, err := net.Listen("tcp", *tlsAddr)
if err != nil {
log.Fatal(err)
}
go p.Serve(tls.NewListener(tl, mc.TLS()))
}
stack, fg := httpspec.NewStack("martian")
// wrap stack in a group so that we can forward API requests to the API port
// before the httpspec modifiers which include the via modifier which will
// trip loop detection
topg := fifo.NewGroup()
// Redirect API traffic to API server.
if *apiAddr != "" {
apip := strings.Replace(*apiAddr, ":", "", 1)
port, err := strconv.Atoi(apip)
if err != nil {
log.Fatal(err)
}
// Forward traffic that pattern matches in http.DefaultServeMux
apif := servemux.NewFilter(mux)
apif.SetRequestModifier(mapi.NewForwarder("", port))
topg.AddRequestModifier(apif)
}
topg.AddRequestModifier(stack)
topg.AddResponseModifier(stack)
p.SetRequestModifier(topg)
p.SetResponseModifier(topg)
m := martianhttp.NewModifier()
fg.AddRequestModifier(m)
fg.AddResponseModifier(m)
if *harLogging {
hl := har.NewLogger()
muxf := servemux.NewFilter(mux)
// Only append to HAR logs when the requests are not API requests,
// that is, they are not matched in http.DefaultServeMux
muxf.RequestWhenFalse(hl)
muxf.ResponseWhenFalse(hl)
stack.AddRequestModifier(muxf)
stack.AddResponseModifier(muxf)
configure("/logs", har.NewExportHandler(hl), mux)
configure("/logs/reset", har.NewResetHandler(hl), mux)
}
logger := martianlog.NewLogger()
logger.SetDecode(true)
stack.AddRequestModifier(logger)
stack.AddResponseModifier(logger)
if *marblLogging {
lsh := marbl.NewHandler()
lsm := marbl.NewModifier(lsh)
muxf := servemux.NewFilter(mux)
muxf.RequestWhenFalse(lsm)
muxf.ResponseWhenFalse(lsm)
stack.AddRequestModifier(muxf)
stack.AddResponseModifier(muxf)
// retrieve binary marbl logs
mux.Handle("/binlogs", lsh)
}
// Configure modifiers.
configure("/configure", m, mux)
// Verify assertions.
vh := verify.NewHandler()
vh.SetRequestVerifier(m)
vh.SetResponseVerifier(m)
configure("/verify", vh, mux)
// Reset verifications.
rh := verify.NewResetHandler()
rh.SetRequestVerifier(m)
rh.SetResponseVerifier(m)
configure("/verify/reset", rh, mux)
l, err := net.Listen("tcp", *addr)
if err != nil {
log.Fatal(err)
}
if *trafficShaping {
tsl := trafficshape.NewListener(l)
tsh := trafficshape.NewHandler(tsl)
configure("/shape-traffic", tsh, mux)
l = tsl
}
lAPI, err := net.Listen("tcp", *apiAddr)
if err != nil {
log.Fatal(err)
}
log.Printf("martian: starting proxy on %s and api on %s", l.Addr().String(), lAPI.Addr().String())
go p.Serve(l)
go http.Serve(lAPI, mux)
sigc := make(chan os.Signal, 1)
signal.Notify(sigc, os.Interrupt, os.Kill)
<-sigc
log.Println("martian: shutting down")
}
func init() {
martian.Init()
}
// configure installs a configuration handler at path.
func configure(pattern string, handler http.Handler, mux *http.ServeMux) {
if *allowCORS {
handler = cors.NewHandler(handler)
}
// register handler for martian.proxy to be forwarded to
// local API server
mux.Handle(path.Join(*api, pattern), handler)
// register handler for local API server
p := path.Join("localhost"+*apiAddr, pattern)
mux.Handle(p, handler)
}

380
vendor/github.com/google/martian/cmd/proxy/main_test.go generated vendored Normal file
View File

@@ -0,0 +1,380 @@
// Copyright 2015 Google Inc. All rights reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package main
import (
"crypto/tls"
"crypto/x509"
"encoding/base64"
"fmt"
"io/ioutil"
"net"
"net/http"
"net/url"
"os"
"os/exec"
"path/filepath"
"strings"
"testing"
"time"
"github.com/google/martian/mitm"
)
func waitForProxy(t *testing.T, c *http.Client, apiURL string) {
timeout := 5 * time.Second
deadline := time.Now().Add(timeout)
for time.Now().Before(deadline) {
res, err := c.Get(apiURL)
if err != nil {
time.Sleep(200 * time.Millisecond)
continue
}
defer res.Body.Close()
if got, want := res.StatusCode, http.StatusOK; got != want {
t.Fatalf("waitForProxy: c.Get(%q): got status %d, want %d", apiURL, got, want)
}
return
}
t.Fatalf("waitForProxy: did not start up within %.1f seconds", timeout.Seconds())
}
// getFreePort returns a port string preceded by a colon, e.g. ":1234"
func getFreePort(t *testing.T) string {
l, err := net.Listen("tcp", ":")
if err != nil {
t.Fatalf("getFreePort: could not get free port: %v", err)
}
defer l.Close()
return l.Addr().String()[strings.LastIndex(l.Addr().String(), ":"):]
}
func parseURL(t *testing.T, u string) *url.URL {
p, err := url.Parse(u)
if err != nil {
t.Fatalf("url.Parse(%q): got error %v, want no error", u, err)
}
return p
}
func TestProxyMain(t *testing.T) {
tempDir, err := ioutil.TempDir("", t.Name())
if err != nil {
t.Fatal(err)
}
defer os.RemoveAll(tempDir)
// Build proxy binary
binPath := filepath.Join(tempDir, "proxy")
cmd := exec.Command("go", "build", "-o", binPath)
cmd.Stdout = os.Stdout
cmd.Stderr = os.Stderr
if err := cmd.Run(); err != nil {
t.Fatal(err)
}
t.Run("Http", func(t *testing.T) {
// Start proxy
proxyPort := getFreePort(t)
apiPort := getFreePort(t)
cmd := exec.Command(binPath, "-addr="+proxyPort, "-api-addr="+apiPort)
cmd.Stdout = os.Stdout
cmd.Stderr = os.Stderr
if err := cmd.Start(); err != nil {
t.Fatal(err)
}
defer cmd.Wait()
defer cmd.Process.Signal(os.Interrupt)
proxyURL := "http://localhost" + proxyPort
apiURL := "http://localhost" + apiPort
configureURL := "http://martian.proxy/configure"
// TODO: Make using API hostport directly work on Travis.
apiClient := &http.Client{Transport: &http.Transport{Proxy: http.ProxyURL(parseURL(t, apiURL))}}
waitForProxy(t, apiClient, configureURL)
// Configure modifiers
config := strings.NewReader(`
{
"fifo.Group": {
"scope": ["request", "response"],
"modifiers": [
{
"status.Modifier": {
"scope": ["response"],
"statusCode": 418
}
},
{
"skip.RoundTrip": {}
}
]
}
}`)
res, err := apiClient.Post(configureURL, "application/json", config)
if err != nil {
t.Fatalf("apiClient.Post(%q): got error %v, want no error", configureURL, err)
}
defer res.Body.Close()
if got, want := res.StatusCode, http.StatusOK; got != want {
t.Fatalf("apiClient.Post(%q): got status %d, want %d", configureURL, got, want)
}
// Exercise proxy
client := &http.Client{Transport: &http.Transport{Proxy: http.ProxyURL(parseURL(t, proxyURL))}}
testURL := "http://super.fake.domain/"
res, err = client.Get(testURL)
if err != nil {
t.Fatalf("client.Get(%q): got error %v, want no error", testURL, err)
}
defer res.Body.Close()
if got, want := res.StatusCode, http.StatusTeapot; got != want {
t.Errorf("client.Get(%q): got status %d, want %d", testURL, got, want)
}
})
t.Run("HttpsGenerateCert", func(t *testing.T) {
// Create test certificate for test TLS server
certName := "martian.proxy"
certOrg := "Martian Authority"
certExpiry := 90 * time.Minute
servCert, servPriv, err := mitm.NewAuthority(certName, certOrg, certExpiry)
if err != nil {
t.Fatalf("mitm.NewAuthority(%q, %q, %q): got error %v, want no error", certName, certOrg, certExpiry, err)
}
mc, err := mitm.NewConfig(servCert, servPriv)
if err != nil {
t.Fatalf("mitm.NewConfig(%p, %q): got error %v, want no error", servCert, servPriv, err)
}
sc := mc.TLS()
// Configure and start test TLS server
servPort := getFreePort(t)
l, err := tls.Listen("tcp", servPort, sc)
if err != nil {
t.Fatalf("tls.Listen(\"tcp\", %q, %p): got error %v, want no error", servPort, sc, err)
}
defer l.Close()
server := &http.Server{
Handler: http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
w.WriteHeader(http.StatusTeapot)
w.Write([]byte("Hello!"))
}),
}
go server.Serve(l)
defer server.Close()
// Start proxy
proxyPort := getFreePort(t)
apiPort := getFreePort(t)
cmd := exec.Command(binPath, "-addr="+proxyPort, "-api-addr="+apiPort, "-generate-ca-cert", "-skip-tls-verify")
cmd.Stdout = os.Stdout
cmd.Stderr = os.Stderr
if err := cmd.Start(); err != nil {
t.Fatal(err)
}
defer cmd.Wait()
defer cmd.Process.Signal(os.Interrupt)
proxyURL := "http://localhost" + proxyPort
apiURL := "http://localhost" + apiPort
configureURL := "http://martian.proxy/configure"
// TODO: Make using API hostport directly work on Travis.
apiClient := &http.Client{Transport: &http.Transport{Proxy: http.ProxyURL(parseURL(t, apiURL))}}
waitForProxy(t, apiClient, configureURL)
// Configure modifiers
config := strings.NewReader(fmt.Sprintf(`
{
"body.Modifier": {
"scope": ["response"],
"contentType": "text/plain",
"body": "%s"
}
}`, base64.StdEncoding.EncodeToString([]byte("茶壺"))))
res, err := apiClient.Post(configureURL, "application/json", config)
if err != nil {
t.Fatalf("apiClient.Post(%q): got error %v, want no error", configureURL, err)
}
defer res.Body.Close()
if got, want := res.StatusCode, http.StatusOK; got != want {
t.Fatalf("apiClient.Post(%q): got status %d, want %d", configureURL, got, want)
}
// Install proxy's CA cert into http client
caCertURL := "http://martian.proxy/authority.cer"
res, err = apiClient.Get(caCertURL)
if err != nil {
t.Fatalf("apiClient.Get(%q): got error %v, want no error", caCertURL, err)
}
defer res.Body.Close()
caCert, err := ioutil.ReadAll(res.Body)
if err != nil {
t.Fatalf("ioutil.ReadAll(res.Body): got error %v, want no error", err)
}
caCertPool := x509.NewCertPool()
caCertPool.AppendCertsFromPEM(caCert)
// Exercise proxy
client := &http.Client{Transport: &http.Transport{
Proxy: http.ProxyURL(parseURL(t, proxyURL)),
TLSClientConfig: &tls.Config{
RootCAs: caCertPool,
},
}}
testURL := "https://localhost" + servPort
res, err = client.Get(testURL)
if err != nil {
t.Fatalf("client.Get(%q): got error %v, want no error", testURL, err)
}
defer res.Body.Close()
if got, want := res.StatusCode, http.StatusTeapot; got != want {
t.Fatalf("client.Get(%q): got status %d, want %d", testURL, got, want)
}
body, err := ioutil.ReadAll(res.Body)
if err != nil {
t.Fatalf("ioutil.ReadAll(res.Body): got error %v, want no error", err)
}
if got, want := string(body), "茶壺"; got != want {
t.Fatalf("modified response body: got %s, want %s", got, want)
}
})
t.Run("DownstreamProxy", func(t *testing.T) {
// Start downstream proxy
dsProxyPort := getFreePort(t)
dsAPIPort := getFreePort(t)
cmd := exec.Command(binPath, "-addr="+dsProxyPort, "-api-addr="+dsAPIPort)
cmd.Stdout = os.Stdout
cmd.Stderr = os.Stderr
if err := cmd.Start(); err != nil {
t.Fatal(err)
}
defer cmd.Wait()
defer cmd.Process.Signal(os.Interrupt)
dsProxyURL := "http://localhost" + dsProxyPort
dsAPIURL := "http://localhost" + dsAPIPort
configureURL := "http://martian.proxy/configure"
// TODO: Make using API hostport directly work on Travis.
dsAPIClient := &http.Client{Transport: &http.Transport{Proxy: http.ProxyURL(parseURL(t, dsAPIURL))}}
waitForProxy(t, dsAPIClient, configureURL)
// Configure modifiers
config := strings.NewReader(`
{
"fifo.Group": {
"scope": ["request", "response"],
"modifiers": [
{
"status.Modifier": {
"scope": ["response"],
"statusCode": 418
}
},
{
"skip.RoundTrip": {}
}
]
}
}`)
res, err := dsAPIClient.Post(configureURL, "application/json", config)
if err != nil {
t.Fatalf("dsApiClient.Post(%q): got error %v, want no error", configureURL, err)
}
defer res.Body.Close()
if got, want := res.StatusCode, http.StatusOK; got != want {
t.Fatalf("dsApiClient.Post(%q): got status %d, want %d", configureURL, got, want)
}
// Start main proxy
proxyPort := getFreePort(t)
apiPort := getFreePort(t)
cmd = exec.Command(binPath, "-addr="+proxyPort, "-api-addr="+apiPort, "-downstream-proxy-url="+dsProxyURL)
cmd.Stdout = os.Stdout
cmd.Stderr = os.Stderr
if err := cmd.Start(); err != nil {
t.Fatal(err)
}
defer cmd.Wait()
defer cmd.Process.Signal(os.Interrupt)
proxyURL := "http://localhost" + proxyPort
apiURL := "http://localhost" + apiPort
// TODO: Make using API hostport directly work on Travis.
apiClient := &http.Client{Transport: &http.Transport{Proxy: http.ProxyURL(parseURL(t, apiURL))}}
waitForProxy(t, apiClient, configureURL)
// Configure modifiers
// Setting a different Via header value to circumvent loop detection.
config = strings.NewReader(fmt.Sprintf(`
{
"fifo.Group": {
"scope": ["request", "response"],
"modifiers": [
{
"header.Modifier": {
"scope": ["request"],
"name": "Via",
"value": "martian_1"
}
},
{
"body.Modifier": {
"scope": ["response"],
"contentType": "text/plain",
"body": "%s"
}
}
]
}
}`, base64.StdEncoding.EncodeToString([]byte("茶壺"))))
res, err = apiClient.Post(configureURL, "application/json", config)
if err != nil {
t.Fatalf("apiClient.Post(%q): got error %v, want no error", configureURL, err)
}
defer res.Body.Close()
if got, want := res.StatusCode, http.StatusOK; got != want {
t.Fatalf("apiClient.Post(%q): got status %d, want %d", configureURL, got, want)
}
// Exercise proxy
client := &http.Client{Transport: &http.Transport{Proxy: http.ProxyURL(parseURL(t, proxyURL))}}
testURL := "http://super.fake.domain/"
res, err = client.Get(testURL)
if err != nil {
t.Fatalf("client.Get(%q): got error %v, want no error", testURL, err)
}
defer res.Body.Close()
if got, want := res.StatusCode, http.StatusTeapot; got != want {
t.Errorf("client.Get(%q): got status %d, want %d", testURL, got, want)
}
body, err := ioutil.ReadAll(res.Body)
if err != nil {
t.Fatalf("ioutil.ReadAll(res.Body): got error %v, want no error", err)
}
if got, want := string(body), "茶壺"; got != want {
t.Fatalf("modified response body: got %s, want %s", got, want)
}
})
}