Skip to content

Conversation

luk3skyw4lker
Copy link
Contributor

@luk3skyw4lker luk3skyw4lker commented Feb 26, 2024

Description

Related to #2863

Changes Introduced

Migrating the healthchecker middleware to v3, using the proposition made by @ReneWerner87 in the above mentioned PR. Here is the benchmark and successful test results:
image

Type of Change

Please delete options that are not relevant.

  • New feature (non-breaking change which adds functionality)
  • Enhancement (improvement to existing features and functionality)
  • Documentation update (changes to documentation)
  • Performance improvement (non-breaking change which improves efficiency)
  • Code consistency (non-breaking change which improves code reliability and robustness)

Checklist

Before you submit your pull request, please make sure you meet these requirements:

  • Followed the inspiration of the Express.js framework for new functionalities, making them similar in usage.
  • Conducted a self-review of the code and provided comments for complex or critical parts.
  • Updated the documentation in the /docs/ directory for Fiber's documentation.
  • Added or updated unit tests to validate the effectiveness of the changes or new features.
  • Ensured that new and existing unit tests pass locally with the changes.
  • Verified that any new dependencies are essential and have been agreed upon by the maintainers/community.
  • Aimed for optimal performance with minimal allocations in the new code.
  • Provided benchmarks for the new code to analyze and improve upon.

Summary by CodeRabbit

  • New Features
    • Enhanced customization for health check middleware in Fiber apps, allowing for custom probes for liveness and readiness checks.
  • Refactor
    • Simplified the configuration structure for health checks by consolidating probe functions.
    • Unified the approach for handling liveness and readiness checks.
  • Documentation
    • Updated documentation to reflect new customization capabilities and configuration simplifications.
  • Tests
    • Added new routes and updated tests to align with the refactored health check functionality.

ReneWerner87 and others added 30 commits December 3, 2023 10:19
* chore(encryptcookie)!: update default config

docs(encryptcookie): enhance documentation and examples

BREAKING CHANGE: removed the hardcoded "csrf_" from the Except.

* docs(encryptcookie): reads or modifies cookies

* chore(encryptcookie): csrf config example

* docs(encryptcookie): md table spacing
Bumps [actions/setup-go](https://github.com/actions/setup-go) from 4 to 5.
- [Release notes](https://github.com/actions/setup-go/releases)
- [Commits](actions/setup-go@v4...v5)

---
updated-dependencies:
- dependency-name: actions/setup-go
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
* middleware/logger: Log client IP address by default.

* Update doc.
…2751)

* Revert "Revert ":bug: requestid.Config.ContextKey is interface{} (gofiber#2369)" (gofiber#2742)"

This reverts commit 28be17f.

* fix: request ContextKey default value condition

Should check for `nil` since it is `any`.

* fix: don't constrain middlewares' context-keys to strings

`context` recommends using "unexported type" as context keys to avoid
collisions https://pkg.go.dev/github.com/gofiber/fiber/v2#Ctx.Locals.

The official go blog also recommends this https://go.dev/blog/context.

`fiber.Ctx.Locals(key any, value any)` correctly allows consumers to
use unexported types or e.g. strings.

But some fiber middlewares constrain their context-keys to `string` in
their "default config structs", making it impossible to use unexported
types.

This PR removes the `string` _constraint_ from all middlewares, allowing
to now use unexported types as per the official guidelines. However
the default value is still a string, so it's not a breaking change, and
anyone still using strings as context keys is not affected.
…#2762)

Bumps [github.com/google/uuid](https://github.com/google/uuid) from 1.4.0 to 1.5.0.
- [Release notes](https://github.com/google/uuid/releases)
- [Changelog](https://github.com/google/uuid/blob/master/CHANGELOG.md)
- [Commits](google/uuid@v1.4.0...v1.5.0)

---
updated-dependencies:
- dependency-name: github.com/google/uuid
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Bumps [github/codeql-action](https://github.com/github/codeql-action) from 2 to 3.
- [Release notes](https://github.com/github/codeql-action/releases)
- [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md)
- [Commits](github/codeql-action@v2...v3)

---
updated-dependencies:
- dependency-name: github/codeql-action
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
changing default log output

Closes gofiber#2729
fix wrong hooks signature
* redirect with query params did not work, fix it and add test for it

* redirect middleware - fix test typo
* ✨ feat: add liveness and readiness checkers

* 📝 docs: add docs for liveness and readiness

* ✨ feat: add options method for probe checkers

* ✅ tests: add tests for liveness and readiness

* ♻️ refactor: change default endpoint values

* ♻️ refactor: change default value for liveness endpoint

* 📝 docs: add return status for liveness and readiness probes

* ♻️ refactor: change probechecker to middleware

* 📝 docs: move docs to middleware session

* ♻️ refactor: apply gofumpt formatting

* ♻️ refactor: remove unused parameter

* split config and apply a review

* apply reviews and add testcases

* add benchmark

* cleanup

* rename middleware

* fix linter

* Update docs and config values

* Revert change to IsReady

* Updates based on code review

* Update docs to match other middlewares

---------

Co-authored-by: Muhammed Efe Cetin <efectn@protonmail.com>
Co-authored-by: Juan Calderon-Perez <835733+gaby@users.noreply.github.com>
Co-authored-by: Juan Calderon-Perez <jgcalderonperez@protonmail.com>
- add more Parser tests
fix default value to false in docs of QueryBool
# Conflicts:
#	.github/pull_request_template.md
#	.github/release-drafter.yml
#	app.go
#	ctx.go
#	docs/api/middleware/basicauth.md
#	docs/api/middleware/csrf.md
#	docs/api/middleware/encryptcookie.md
#	docs/api/middleware/keyauth.md
#	docs/api/middleware/logger.md
#	docs/api/middleware/requestid.md
#	go.mod
#	go.sum
#	middleware/adaptor/adaptor_test.go
#	middleware/basicauth/config.go
#	middleware/cors/cors_test.go
#	middleware/csrf/config.go
#	middleware/csrf/csrf.go
#	middleware/idempotency/idempotency.go
#	middleware/keyauth/config.go
#	middleware/logger/config.go
#	middleware/logger/logger.go
#	middleware/redirect/redirect.go
#	middleware/requestid/config.go
#	middleware/requestid/requestid_test.go
Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Review Status

Actionable comments generated: 2

Configuration used: CodeRabbit UI

Commits Files that changed from the base of the PR and between 4a1891b and 6701a93.
Files selected for processing (4)
  • docs/api/middleware/healthcheck.md (2 hunks)
  • middleware/healthcheck/config.go (1 hunks)
  • middleware/healthcheck/healthcheck.go (2 hunks)
  • middleware/healthcheck/healthcheck_test.go (7 hunks)
Additional comments: 3
middleware/healthcheck/healthcheck.go (1)
  • 20-29: > 📝 NOTE

This review was outside the diff hunks and was mapped to the diff hunk with the greatest overlap. Original lines [10-27]

The implementation of NewHealthChecker function correctly follows the new design of using a single Probe function for health checks. However, there are a few points to consider:

  • The check for c.Method() != fiber.MethodGet ensures that only GET requests are processed by the middleware, which aligns with the typical use case for health checks. However, this might limit flexibility for users who might want to use other HTTP methods for health checks. Consider making the allowed HTTP methods configurable or documenting this behavior clearly.
  • The use of c.SendStatus directly sends HTTP status codes based on the probe result, which is straightforward and efficient. Ensure that this aligns with the users' expectations in terms of response body content for health check endpoints.
  • It's good practice to include logging or metrics collection for health check failures to aid in debugging and monitoring the application's health status.

Overall, the changes are well-aligned with the objectives of simplifying and enhancing the middleware's functionality. Just ensure to consider the points mentioned for further refinement.

middleware/healthcheck/config.go (2)
  • 19-19: The consolidation of LivenessProbe and ReadinessProbe into a single Probe field in the Config struct simplifies the configuration and usage of the healthcheck middleware. This change enhances flexibility by allowing users to define custom probes more easily. Ensure that the documentation and examples are updated to clearly demonstrate how to use the new Probe field for both liveness and readiness checks.
  • 27-39: The implementation of defaultProbe as a function that always returns true is a sensible default behavior, indicating that the application is healthy by default. The defaultConfigV3 function correctly handles the case where no custom configuration is provided by the user, applying this default probe. Additionally, it ensures that a Probe is always set, preventing potential nil pointer dereferences. This approach maintains the simplicity and safety of the middleware's configuration. Good job on ensuring that the default behavior is both logical and user-friendly.

@luk3skyw4lker
Copy link
Contributor Author

Seems like it wasn't only healthchecker that suffered from this:
image

@gaby
Copy link
Member

gaby commented Feb 28, 2024

Seems like it wasn't only healthchecker that suffered from this: image

Thats fine, we can address that in #2864 I'm more concern with the tests failing

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Review Status

Actionable comments generated: 3

Configuration used: CodeRabbit UI

Commits Files that changed from the base of the PR and between 6701a93 and 2aaa501.
Files selected for processing (1)
  • middleware/healthcheck/healthcheck_test.go (8 hunks)
Additional comments: 4
middleware/healthcheck/healthcheck_test.go (4)
  • 38-39: The addition of explicit routes /livez and /readyz with NewHealthChecker() in Test_HealthCheck_Strict_Routing_Default is a good practice. It ensures that the healthcheck middleware is tested under strict routing conditions, which is crucial for applications that require precise path matching. This change aligns with the PR's objective to enhance customization and simplify configuration.
  • 53-54: Replacing generic middleware usage with specific GET routes for /livez and /readyz in Test_HealthCheck_Default is a significant improvement. It directly tests the middleware's response to these endpoints, ensuring that the healthcheck functionality is accessible and behaves as expected under default routing settings. This change contributes to the overall goal of simplifying the middleware's configuration and usage.
  • 91-91: The assertions for StatusMethodNotAllowed in POST requests to /live and /ready endpoints are crucial for verifying that the middleware correctly restricts HTTP methods. This ensures that the healthcheck endpoints adhere to best practices by only responding to GET requests, aligning with the principle of using appropriate HTTP methods for specific actions. This test effectively validates the middleware's method filtering capabilities.

Also applies to: 96-96

  • 112-118: In Test_HealthCheck_Custom_Nested, the tests for nested paths /probe/live and /probe/ready are well-structured and provide valuable coverage for applications that might structure their healthcheck endpoints within a nested path. This flexibility is a key aspect of the middleware's enhanced customization capabilities. Including tests for both successful and unsuccessful probes in nested paths ensures the middleware's behavior is predictable in various configurations.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Review Status

Actionable comments generated: 0

Configuration used: CodeRabbit UI

Commits Files that changed from the base of the PR and between 2aaa501 and 4308308.
Files selected for processing (1)
  • middleware/healthcheck/healthcheck_test.go (8 hunks)
Files skipped from review as they are similar to previous changes (1)
  • middleware/healthcheck/healthcheck_test.go

@gaby
Copy link
Member

gaby commented Feb 28, 2024

Performance Diff between Sequential / Parallel:

Benchmark_HealthCheck-4            	 6781260	       179.2 ns/op	       0 B/op	       0 allocs/op
Benchmark_HealthCheck_Parallel-4   	14886872	        85.98 ns/op	       0 B/op	       0 allocs/op

@ReneWerner87 ReneWerner87 added this to the v3 milestone Feb 28, 2024
@ReneWerner87
Copy link
Member

@ReneWerner87 @gaby I don't know how to explain this, but after this commit at the v2ToV3Merge branch, the performance of the middleware dropped in half: image

Although the commit did not changed anything in the middleware itself, the performance dropped drastically, at least running locally. I'll push the changes to see what's the results

what was the performance in the v2 branch ?

its maybe related to my fix 5a0167a
for this real bug #2871 (comment)

@luk3skyw4lker
Copy link
Contributor Author

@ReneWerner87 It was around 120 ns/op according to this comment: #2863 (comment)

But the performance before the commit and with the migration was around 110 ns/op according to this PR. I'll try and run it again with @gaby commits

@luk3skyw4lker
Copy link
Contributor Author

goos: linux
goarch: amd64
pkg: github.com/gofiber/fiber/v3/middleware/healthcheck
cpu: Intel(R) Core(TM) i5-7300HQ CPU @ 2.50GHz
Benchmark_HealthCheck-4                  5853678               198.3 ns/op             0 B/op          0 allocs/op
Benchmark_HealthCheck-4                  5897978               199.9 ns/op             0 B/op          0 allocs/op
Benchmark_HealthCheck-4                  5854675               197.6 ns/op             0 B/op          0 allocs/op
Benchmark_HealthCheck-4                  5786534               197.8 ns/op             0 B/op          0 allocs/op
Benchmark_HealthCheck-4                  5776459               199.2 ns/op             0 B/op          0 allocs/op
Benchmark_HealthCheck_Parallel-4        17670471                58.34 ns/op            0 B/op          0 allocs/op
Benchmark_HealthCheck_Parallel-4        18804096                64.86 ns/op            0 B/op          0 allocs/op
Benchmark_HealthCheck_Parallel-4        19699030                63.55 ns/op            0 B/op          0 allocs/op
Benchmark_HealthCheck_Parallel-4        20749539                75.82 ns/op            0 B/op          0 allocs/op
Benchmark_HealthCheck_Parallel-4        17202957                74.76 ns/op            0 B/op          0 allocs/op
PASS
ok      github.com/gofiber/fiber/v3/middleware/healthcheck      16.499s

Looks the same as before to me, but since @gaby said it can be addressed in #2864 which also has other affected benchmarks

@gaby
Copy link
Member

gaby commented Feb 28, 2024

@luk3skyw4lker It's also 3-4x faster in the Parallel benchmarks which simulates real world concurrent users. Something about single sequential requests slowed down in V3

@luk3skyw4lker
Copy link
Contributor Author

@gaby yep, noticed that too, I'm gonna be taking care of some code rabbit comments right now and the PR should be good to go, do you guys have any other ideas for changes/improvements?

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Review Status

Actionable comments generated: 3

Configuration used: CodeRabbit UI

Commits Files that changed from the base of the PR and between 4308308 and 08904d1.
Files selected for processing (3)
  • docs/api/middleware/healthcheck.md (2 hunks)
  • middleware/healthcheck/config.go (2 hunks)
  • middleware/healthcheck/healthcheck_test.go (7 hunks)
Files skipped from review as they are similar to previous changes (1)
  • docs/api/middleware/healthcheck.md
Additional comments: 7
middleware/healthcheck/config.go (2)
  • 29-29: The defaultProbe function provides a sensible default behavior by always returning true. This is a good practice for a health check middleware, ensuring that the service is considered healthy by default unless explicitly configured otherwise.
  • 31-41: The defaultConfigV3 function correctly handles the case where no configuration is provided by the user, applying a default probe. This approach ensures backward compatibility and ease of use for developers integrating the health check middleware into their applications.
middleware/healthcheck/healthcheck_test.go (5)
  • 38-39: Adding explicit routes for /livez and /readyz with NewHealthChecker() in the Test_HealthCheck_Strict_Routing_Default function is a good practice. It ensures that the health check endpoints are correctly set up and respond as expected under strict routing configurations.
  • 53-54: The updates in Test_HealthCheck_Default to use NewHealthChecker() for /livez and /readyz endpoints are appropriate and reflect the middleware's intended usage. This ensures that the health check functionality works as expected with the framework's default routing behavior.
  • 91-96: The tests for method restrictions (POST requests resulting in StatusMethodNotAllowed) are important for ensuring that the health check endpoints adhere to the intended HTTP method constraints. This helps in maintaining the security and integrity of the health check mechanism.
  • 112-118: The Test_HealthCheck_Custom_Nested function correctly tests health check endpoints with nested paths, ensuring that the middleware functions correctly in more complex routing scenarios. This is crucial for applications that may organize health checks within a nested route structure.
  • 153-163: The use of the Next function in Test_HealthCheck_Next to simulate a scenario where the middleware is skipped is well-implemented. This test ensures that the middleware behaves as expected when the Next function condition is met, providing flexibility in routing decisions.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Review Status

Actionable comments generated: 0

Configuration used: CodeRabbit UI

Commits Files that changed from the base of the PR and between 08904d1 and 7fc5469.
Files selected for processing (1)
  • middleware/healthcheck/healthcheck_test.go (7 hunks)
Files skipped from review as they are similar to previous changes (1)
  • middleware/healthcheck/healthcheck_test.go

Copy link
Member

@gaby gaby left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@gaby gaby changed the title ♻️ refactor: migrate healthchecker to v3 ♻️ refactor: Migrate HealthChecker to v3 Feb 28, 2024
@ReneWerner87 ReneWerner87 changed the base branch from v2ToV3Merge to main February 29, 2024 07:30
…thchecker

# Conflicts:
#	ctx_interface.go
#	docs/api/middleware/healthcheck.md
#	log/default_test.go
#	middleware/healthcheck/config.go
#	middleware/healthcheck/healthcheck.go
#	middleware/healthcheck/healthcheck_test.go
@ReneWerner87 ReneWerner87 merged commit 708e86b into gofiber:main Feb 29, 2024
@luk3skyw4lker luk3skyw4lker deleted the feat/migrating-healthchecker branch March 7, 2024 17:48
grivera64 added a commit to grivera64/fiber that referenced this pull request Mar 16, 2024
* Update pull_request_template.md

* Update v3-changes.md

* Update CONTRIBUTING.md (gofiber#2752)

Grammar correction.

* chore(encryptcookie)!: update default config (gofiber#2753)

* chore(encryptcookie)!: update default config

docs(encryptcookie): enhance documentation and examples

BREAKING CHANGE: removed the hardcoded "csrf_" from the Except.

* docs(encryptcookie): reads or modifies cookies

* chore(encryptcookie): csrf config example

* docs(encryptcookie): md table spacing

* build(deps): bump actions/setup-go from 4 to 5 (gofiber#2754)

Bumps [actions/setup-go](https://github.com/actions/setup-go) from 4 to 5.
- [Release notes](https://github.com/actions/setup-go/releases)
- [Commits](actions/setup-go@v4...v5)

---
updated-dependencies:
- dependency-name: actions/setup-go
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

* 🩹 middleware/logger/: log client IP address by default (gofiber#2755)

* middleware/logger: Log client IP address by default.

* Update doc.

* fix: don't constrain middlewares' context-keys to strings 🐛 (gofiber#2751)

* Revert "Revert ":bug: requestid.Config.ContextKey is interface{} (gofiber#2369)" (gofiber#2742)"

This reverts commit 28be17f.

* fix: request ContextKey default value condition

Should check for `nil` since it is `any`.

* fix: don't constrain middlewares' context-keys to strings

`context` recommends using "unexported type" as context keys to avoid
collisions https://pkg.go.dev/github.com/gofiber/fiber/v2#Ctx.Locals.

The official go blog also recommends this https://go.dev/blog/context.

`fiber.Ctx.Locals(key any, value any)` correctly allows consumers to
use unexported types or e.g. strings.

But some fiber middlewares constrain their context-keys to `string` in
their "default config structs", making it impossible to use unexported
types.

This PR removes the `string` _constraint_ from all middlewares, allowing
to now use unexported types as per the official guidelines. However
the default value is still a string, so it's not a breaking change, and
anyone still using strings as context keys is not affected.

* 📚 Update app.md for indentation (gofiber#2761)

Update app.md for indentation

* build(deps): bump github.com/google/uuid from 1.4.0 to 1.5.0 (gofiber#2762)

Bumps [github.com/google/uuid](https://github.com/google/uuid) from 1.4.0 to 1.5.0.
- [Release notes](https://github.com/google/uuid/releases)
- [Changelog](https://github.com/google/uuid/blob/master/CHANGELOG.md)
- [Commits](google/uuid@v1.4.0...v1.5.0)

---
updated-dependencies:
- dependency-name: github.com/google/uuid
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

* build(deps): bump github/codeql-action from 2 to 3 (gofiber#2763)

Bumps [github/codeql-action](https://github.com/github/codeql-action) from 2 to 3.
- [Release notes](https://github.com/github/codeql-action/releases)
- [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md)
- [Commits](github/codeql-action@v2...v3)

---
updated-dependencies:
- dependency-name: github/codeql-action
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

* Changing default log output (gofiber#2730)

changing default log output

Closes gofiber#2729

* Update hooks.md

fix wrong hooks signature

* 🩹 Fix: CORS middleware should use the defined AllowedOriginsFunc config when AllowedOrigins is empty (gofiber#2771)

* 🐛 [Bug]: Adaptator + otelfiber issue gofiber#2641 (gofiber#2772)

* 🩹🚨 - fix for redirect with query params (gofiber#2748)

* redirect with query params did not work, fix it and add test for it

* redirect middleware - fix test typo

* ♻️ logger/middleware colorize logger error message gofiber#2593 (gofiber#2773)

* ✨ feat: add liveness and readiness checks (gofiber#2509)

* ✨ feat: add liveness and readiness checkers

* 📝 docs: add docs for liveness and readiness

* ✨ feat: add options method for probe checkers

* ✅ tests: add tests for liveness and readiness

* ♻️ refactor: change default endpoint values

* ♻️ refactor: change default value for liveness endpoint

* 📝 docs: add return status for liveness and readiness probes

* ♻️ refactor: change probechecker to middleware

* 📝 docs: move docs to middleware session

* ♻️ refactor: apply gofumpt formatting

* ♻️ refactor: remove unused parameter

* split config and apply a review

* apply reviews and add testcases

* add benchmark

* cleanup

* rename middleware

* fix linter

* Update docs and config values

* Revert change to IsReady

* Updates based on code review

* Update docs to match other middlewares

---------

Co-authored-by: Muhammed Efe Cetin <efectn@protonmail.com>
Co-authored-by: Juan Calderon-Perez <835733+gaby@users.noreply.github.com>
Co-authored-by: Juan Calderon-Perez <jgcalderonperez@protonmail.com>

* prepare release v2.52.0
- add more Parser tests

* fix healthcheck.md

* configure workflows for V2 branch

* configure workflows for V2 branch

* Fix default value to false in docs of QueryBool (gofiber#2811)

fix default value to false in docs of QueryBool

* update queryParser config

* Update ctx.md

* Update routing.md

* merge v2 in v3

* merge v2 in v3

* lint fixes

* 📚 Doc: Fix code snippet indentation in /docs/api/middleware/keyauth.md

Removes an an extra level of indentation in line 51 of
`keyauth.md` [here](https://github.com/gofiber/fiber/blob/v2/docs/api/middleware/keyauth.md?plain=1#L51)

* fix: healthcheck middleware not working with route group (gofiber#2863)

* fix: healthcheck middleware not working with route group

* perf: change verification method to improve perf

* Update healthcheck_test.go

* test: add not matching route test for strict routing

* add more test cases

* correct tests

* correct test helpers

* correct tests

* correct tests

---------

Co-authored-by: Juan Calderon-Perez <835733+gaby@users.noreply.github.com>
Co-authored-by: René Werner <rene@gofiber.io>

* merge v2 in v3

* Merge pull request from GHSA-fmg4-x8pw-hjhg

* Enforce Wildcard Origins with AllowCredentials check

* Expand unit-tests, fix issues with subdomains logic, update docs

* Update cors.md

* Added test using localhost, ipv4, and ipv6 address

* improve documentation markdown

---------

Co-authored-by: René Werner <rene@gofiber.io>

* Update app.go

prepare release v2.52.1

* fix cors domain normalize

* fix sync-docs workflow

* test: fix failing tests

* fix sync-docs workflow

* test: cors middleware use testify require

* chore: fix lint warnings

* chore: revert test isolation.

* feat: migrate healthchecker to v3

* fix: use Get instead of Use for better router matching

* docs: update docs to v3 info

* fixed the fasthttp ctx race condition problem

* Update middleware/cors/utils.go

Co-authored-by: Renan Bastos <renanbastos.tec@gmail.com>

* fix sync_docs.sh

* fix review comments/hints

* fix review comments/hints

* stabilize Test_Proxy_Timeout_Slow_Server test

* stabilize Test_Proxy_.* tests

* ignore bodyclose linter for tests
use http.NoBody instead of nil

* Add parallel benchmark

* Update healthcheck_test.go

* docs: add comments for next behavior when there are no other handlers defined

* revert(tests): undo http.NoBody usage

---------

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: RW <rene@gofiber.io>
Co-authored-by: tokelo-12 <113810058+tokelo-12@users.noreply.github.com>
Co-authored-by: Jason McNeil <sixcolors@mac.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: iRedMail <2048991+iredmail@users.noreply.github.com>
Co-authored-by: Benjamin Grosse <ste3ls@gmail.com>
Co-authored-by: Mehmet Firat KOMURCU <mehmetfiratkomurcu@hotmail.com>
Co-authored-by: Bruno <bdm2943@icloud.com>
Co-authored-by: Muhammad Kholid B <muhammadkholidb@gmail.com>
Co-authored-by: gilwo <gilwo@users.noreply.github.com>
Co-authored-by: Muhammed Efe Cetin <efectn@protonmail.com>
Co-authored-by: Juan Calderon-Perez <835733+gaby@users.noreply.github.com>
Co-authored-by: Juan Calderon-Perez <jgcalderonperez@protonmail.com>
Co-authored-by: Jongmin Kim <kjongmin26@gmail.com>
Co-authored-by: Giovanni Rivera <rivera.giovanni271@gmail.com>
Co-authored-by: Renan Bastos <renanbastos.tec@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: Done
Development

Successfully merging this pull request may close these issues.