X-Git-Url: http://git.shadowcat.co.uk/gitweb/gitweb.cgi?a=blobdiff_plain;f=t%2Funit_core_uri_for.t;h=af47c9f2d4b28fd8796554eac14188946441930e;hb=294773cac46b5c71759076b1504d66836c881bac;hp=72ccda16ded6ccf46365223430956dbe119c34bc;hpb=d0f0fcf6ec9f6445e3e241b3edcd3920886a02cf;p=catagits%2FCatalyst-Runtime.git diff --git a/t/unit_core_uri_for.t b/t/unit_core_uri_for.t index 72ccda1..af47c9f 100644 --- a/t/unit_core_uri_for.t +++ b/t/unit_core_uri_for.t @@ -1,7 +1,7 @@ use strict; use warnings; -use Test::More tests => 11; +use Test::More tests => 19; use URI; use_ok('Catalyst'); @@ -43,12 +43,31 @@ is( 'URI for undef action with query params' ); +is (Catalyst::uri_for( $context, '/bar/wibble?' )->as_string, + 'http://127.0.0.1/foo/bar/wibble%3F', 'Question Mark gets encoded' +); + +is( Catalyst::uri_for( $context, qw/bar wibble?/, 'with space' )->as_string, + 'http://127.0.0.1/foo/yada/bar/wibble%3F/with%20space', 'Space gets encoded' +); + +is( + Catalyst::uri_for( $context, '/bar', 'with+plus', { 'also' => 'with+plus' })->as_string, + 'http://127.0.0.1/foo/bar/with+plus?also=with%2Bplus', + 'Plus is not encoded' +); + # test with utf-8 is( Catalyst::uri_for( $context, 'quux', { param1 => "\x{2620}" } )->as_string, 'http://127.0.0.1/foo/yada/quux?param1=%E2%98%A0', 'URI for undef action with query params in unicode' ); +is( + Catalyst::uri_for( $context, 'quux', { 'param:1' => "foo" } )->as_string, + 'http://127.0.0.1/foo/yada/quux?param%3A1=foo', + 'URI for undef action with query params in unicode' +); # test with object is( @@ -72,6 +91,12 @@ is( is( Catalyst::uri_for( $context, '/bar/baz' )->as_string, 'http://127.0.0.1/bar/baz', 'URI with no base or match' ); + + # test "0" as the path + is( Catalyst::uri_for( $context, qw/0 foo/ )->as_string, + 'http://127.0.0.1/0/foo', '0 as path is ok' + ); + } # test with undef -- no warnings should be thrown @@ -83,3 +108,28 @@ is( is( $warnings, 0, "no warnings emitted" ); } +# Test with parameters '/', 'foo', 'bar' - should not generate a // +is( Catalyst::uri_for( $context, qw| / foo bar | )->as_string, + 'http://127.0.0.1/foo/bar', 'uri is /foo/bar, not //foo/bar' +); + +TODO: { + local $TODO = 'RFCs are for people who, erm - fix this test..'; + # Test rfc3986 reserved characters. These characters should all be escaped + # according to the RFC, but it is a very big feature change so I've removed it + no warnings; # Yes, everything in qw is sane + is( + Catalyst::uri_for( $context, qw|! * ' ( ) ; : @ & = $ / ? % # [ ] ,|, )->as_string, + 'http://127.0.0.1/%21/%2A/%27/%2B/%29/%3B/%3A/%40/%26/%3D/%24/%2C/%2F/%3F/%25/%23/%5B/%5D', + 'rfc 3986 reserved characters' + ); + + # jshirley bug - why the hell does only one of these get encoded + # has been like this forever however. + is( + Catalyst::uri_for( $context, qw|{1} {2}| )->as_string, + 'http://127.0.0.1/{1}/{2}', + 'not-escaping unreserved characters' + ); +} +