mirror of
https://github.com/nodejs/node.git
synced 2024-11-21 21:19:50 +01:00
952cf0d17a
PR-URL: https://github.com/nodejs/node/pull/49928 Reviewed-By: Yagiz Nizipli <yagiz@nizipli.com> Reviewed-By: Benjamin Gruenbaum <benjamingr@gmail.com> Reviewed-By: Antoine du Hamel <duhamelantoine1995@gmail.com>
165 lines
4.8 KiB
JavaScript
165 lines
4.8 KiB
JavaScript
// Flags: --expose-internals
|
|
'use strict';
|
|
|
|
require('../common');
|
|
const assert = require('assert');
|
|
const {
|
|
validateArray,
|
|
validateBoolean,
|
|
validateInteger,
|
|
validateNumber,
|
|
validateObject,
|
|
kValidateObjectAllowNullable,
|
|
kValidateObjectAllowArray,
|
|
kValidateObjectAllowFunction,
|
|
validateString,
|
|
validateInt32,
|
|
validateUint32,
|
|
validateLinkHeaderValue,
|
|
} = require('internal/validators');
|
|
const { MAX_SAFE_INTEGER, MIN_SAFE_INTEGER } = Number;
|
|
const outOfRangeError = {
|
|
code: 'ERR_OUT_OF_RANGE',
|
|
name: 'RangeError',
|
|
};
|
|
const invalidArgTypeError = {
|
|
code: 'ERR_INVALID_ARG_TYPE',
|
|
name: 'TypeError',
|
|
};
|
|
const invalidArgValueError = {
|
|
code: 'ERR_INVALID_ARG_VALUE',
|
|
name: 'TypeError',
|
|
};
|
|
|
|
{
|
|
// validateInteger tests.
|
|
|
|
// validateInteger() defaults to validating safe integers.
|
|
validateInteger(MAX_SAFE_INTEGER, 'foo');
|
|
validateInteger(MIN_SAFE_INTEGER, 'foo');
|
|
assert.throws(() => {
|
|
validateInteger(MAX_SAFE_INTEGER + 1, 'foo');
|
|
}, outOfRangeError);
|
|
assert.throws(() => {
|
|
validateInteger(MIN_SAFE_INTEGER - 1, 'foo');
|
|
}, outOfRangeError);
|
|
|
|
// validateInteger() works with unsafe integers.
|
|
validateInteger(MAX_SAFE_INTEGER + 1, 'foo', 0, MAX_SAFE_INTEGER + 1);
|
|
validateInteger(MIN_SAFE_INTEGER - 1, 'foo', MIN_SAFE_INTEGER - 1);
|
|
|
|
// validateInt32() and validateUint32()
|
|
[
|
|
Symbol(), 1n, {}, [], false, true, undefined, null, () => {}, '', '1',
|
|
].forEach((val) => assert.throws(() => validateInt32(val, 'name'), {
|
|
code: 'ERR_INVALID_ARG_TYPE'
|
|
}));
|
|
[
|
|
2147483647 + 1, -2147483648 - 1, NaN,
|
|
].forEach((val) => assert.throws(() => validateInt32(val, 'name'), {
|
|
code: 'ERR_OUT_OF_RANGE'
|
|
}));
|
|
[
|
|
0, 1, -1,
|
|
].forEach((val) => validateInt32(val, 'name'));
|
|
[
|
|
Symbol(), 1n, {}, [], false, true, undefined, null, () => {}, '', '1',
|
|
].forEach((val) => assert.throws(() => validateUint32(val, 'name'), {
|
|
code: 'ERR_INVALID_ARG_TYPE'
|
|
}));
|
|
[
|
|
4294967296, -1, NaN,
|
|
].forEach((val) => assert.throws(() => validateUint32(val, 'name'), {
|
|
code: 'ERR_OUT_OF_RANGE'
|
|
}));
|
|
[
|
|
0, 1,
|
|
].forEach((val) => validateUint32(val, 'name'));
|
|
}
|
|
|
|
{
|
|
// validateArray tests.
|
|
validateArray([], 'foo');
|
|
validateArray([1, 2, 3], 'foo');
|
|
|
|
[undefined, null, true, false, 0, 0.0, 42, '', 'string', {}]
|
|
.forEach((val) => {
|
|
assert.throws(() => {
|
|
validateArray(val, 'foo');
|
|
}, invalidArgTypeError);
|
|
});
|
|
|
|
validateArray([1], 'foo', 1);
|
|
assert.throws(() => {
|
|
validateArray([], 'foo', 1);
|
|
}, invalidArgValueError);
|
|
}
|
|
|
|
{
|
|
// validateBoolean tests.
|
|
validateBoolean(true, 'foo');
|
|
validateBoolean(false, 'foo');
|
|
|
|
[undefined, null, 0, 0.0, 42, '', 'string', {}, []].forEach((val) => {
|
|
assert.throws(() => {
|
|
validateBoolean(val, 'foo');
|
|
}, invalidArgTypeError);
|
|
});
|
|
}
|
|
|
|
{
|
|
// validateObject tests.
|
|
validateObject({}, 'foo');
|
|
validateObject({ a: 42, b: 'foo' }, 'foo');
|
|
|
|
[undefined, null, true, false, 0, 0.0, 42, '', 'string', [], () => {}]
|
|
.forEach((val) => {
|
|
assert.throws(() => {
|
|
validateObject(val, 'foo');
|
|
}, invalidArgTypeError);
|
|
});
|
|
|
|
// validateObject options tests:
|
|
validateObject(null, 'foo', kValidateObjectAllowNullable);
|
|
validateObject([], 'foo', kValidateObjectAllowArray);
|
|
validateObject(() => {}, 'foo', kValidateObjectAllowFunction);
|
|
|
|
// validateObject should not be affected by Object.prototype tampering.
|
|
assert.throws(() => validateObject(null, 'foo', kValidateObjectAllowArray), invalidArgTypeError);
|
|
assert.throws(() => validateObject([], 'foo', kValidateObjectAllowNullable), invalidArgTypeError);
|
|
assert.throws(() => validateObject(() => {}, 'foo', kValidateObjectAllowNullable), invalidArgTypeError);
|
|
}
|
|
|
|
{
|
|
// validateString type validation.
|
|
[
|
|
-1, {}, [], false, true,
|
|
1, Infinity, -Infinity, NaN,
|
|
undefined, null, 1.1,
|
|
].forEach((i) => assert.throws(() => validateString(i, 'name'), {
|
|
code: 'ERR_INVALID_ARG_TYPE'
|
|
}));
|
|
}
|
|
{
|
|
// validateNumber type validation.
|
|
[
|
|
'a', {}, [], false, true,
|
|
undefined, null, '', ' ', '0x',
|
|
'-0x1', '-0o1', '-0b1', '0o', '0b',
|
|
].forEach((i) => assert.throws(() => validateNumber(i, 'name'), {
|
|
code: 'ERR_INVALID_ARG_TYPE'
|
|
}));
|
|
}
|
|
|
|
{
|
|
// validateLinkHeaderValue type validation.
|
|
[
|
|
['</styles.css>; rel=preload; as=style', '</styles.css>; rel=preload; as=style'],
|
|
['</styles.css>; rel=preload; title=hello', '</styles.css>; rel=preload; title=hello'],
|
|
['</styles.css>; rel=preload; crossorigin=hello', '</styles.css>; rel=preload; crossorigin=hello'],
|
|
['</styles.css>; rel=preload; disabled=true', '</styles.css>; rel=preload; disabled=true'],
|
|
['</styles.css>; rel=preload; fetchpriority=high', '</styles.css>; rel=preload; fetchpriority=high'],
|
|
['</styles.css>; rel=preload; referrerpolicy=origin', '</styles.css>; rel=preload; referrerpolicy=origin'],
|
|
].forEach(([value, expected]) => assert.strictEqual(validateLinkHeaderValue(value), expected));
|
|
}
|