test: invalid map key is caught by hocon

now that hocon has a built-in map key validation,
some of the resource name validations are cought by hocon
This commit is contained in:
zmstone 2024-07-03 22:56:44 +02:00
parent 5446bc305f
commit 947cddb2eb
5 changed files with 8 additions and 9 deletions

View File

@ -216,7 +216,7 @@ t_create_with_bad_name(_Config) ->
ok.
t_create_with_bad_name_root(_Config) ->
BadBridgeName = <<"test_哈哈">>,
BadBridgeName = <<"test_哈哈"/utf8>>,
BridgeConf = #{
<<"bridge_mode">> => false,
<<"clean_start">> => true,

View File

@ -1431,7 +1431,7 @@ t_cluster_later_join_metrics(Config) ->
t_create_with_bad_name(Config) ->
Port = ?config(port, Config),
URL1 = ?URL(Port, "path1"),
Name = <<"test_哈哈">>,
Name = <<"test_哈哈"/utf8>>,
BadBridgeParams =
emqx_utils_maps:deep_merge(
?HTTP_BRIDGE(URL1, Name),
@ -1457,7 +1457,7 @@ t_create_with_bad_name(Config) ->
?assertMatch(
#{
<<"kind">> := <<"validation_error">>,
<<"reason">> := <<"Invalid name format.", _/binary>>
<<"reason">> := <<"invalid_map_key">>
},
Msg
),

View File

@ -604,8 +604,7 @@ deprecated_config() ->
t_name_too_long(_Config) ->
LongName = list_to_binary(lists:duplicate(256, $a)),
?assertMatch(
{error,
{{_, 400, _}, _, #{<<"message">> := #{<<"reason">> := <<"Name is too long", _/binary>>}}}},
{error, {{_, 400, _}, _, #{<<"message">> := #{<<"reason">> := <<"invalid_map_key">>}}}},
create_bridge_http_api_v1(#{name => LongName})
),
ok.
@ -942,7 +941,7 @@ t_scenario_2(Config) ->
ok.
t_create_with_bad_name(_Config) ->
BadBridgeName = <<"test_哈哈">>,
BadBridgeName = <<"test_哈哈"/utf8>>,
%% Note: must contain SSL options to trigger bug.
Cacertfile = emqx_common_test_helpers:app_path(
emqx,
@ -960,7 +959,7 @@ t_create_with_bad_name(_Config) ->
<<"code">> := <<"BAD_REQUEST">>,
<<"message">> := #{
<<"kind">> := <<"validation_error">>,
<<"reason">> := <<"Invalid name format.", _/binary>>
<<"reason">> := <<"invalid_map_key">>
}
}}} = create_bridge_http_api_v1(Opts),
ok.

View File

@ -275,7 +275,7 @@ t_create_with_bad_name_root_path({'end', _Config}) ->
ok;
t_create_with_bad_name_root_path(_Config) ->
Path = [connectors],
BadConnectorName = <<"test_哈哈">>,
BadConnectorName = <<"test_哈哈"/utf8>>,
ConnConfig0 = connector_config(),
%% Note: must contain SSL options to trigger original bug.
Cacertfile = emqx_common_test_helpers:app_path(

View File

@ -697,7 +697,7 @@ t_connectors_probe(Config) ->
ok.
t_create_with_bad_name(Config) ->
ConnectorName = <<"test_哈哈">>,
ConnectorName = <<"test_哈哈"/utf8>>,
Conf0 = ?KAFKA_CONNECTOR(ConnectorName),
%% Note: must contain SSL options to trigger original bug.
Cacertfile = emqx_common_test_helpers:app_path(