172 lines
4.8 KiB
Go
172 lines
4.8 KiB
Go
// Copyright (c) Mainflux
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
package sdk_test
|
|
|
|
import (
|
|
"fmt"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"testing"
|
|
|
|
"github.com/mainflux/mainflux"
|
|
authmocks "github.com/mainflux/mainflux/auth/mocks"
|
|
adapter "github.com/mainflux/mainflux/http"
|
|
"github.com/mainflux/mainflux/http/api"
|
|
"github.com/mainflux/mainflux/http/mocks"
|
|
"github.com/mainflux/mainflux/internal/apiutil"
|
|
"github.com/mainflux/mainflux/logger"
|
|
"github.com/mainflux/mainflux/pkg/errors"
|
|
sdk "github.com/mainflux/mainflux/pkg/sdk/go"
|
|
mproxy "github.com/mainflux/mproxy/pkg/http"
|
|
"github.com/mainflux/mproxy/pkg/session"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/mock"
|
|
)
|
|
|
|
func newMessageService(cc mainflux.AuthzServiceClient) session.Handler {
|
|
pub := mocks.NewPublisher()
|
|
|
|
return adapter.NewHandler(pub, logger.NewMock(), cc)
|
|
}
|
|
|
|
func newTargetHTTPServer() *httptest.Server {
|
|
mux := api.MakeHandler("")
|
|
return httptest.NewServer(mux)
|
|
}
|
|
|
|
func newProxyHTTPServer(svc session.Handler, targetServer *httptest.Server) (*httptest.Server, error) {
|
|
mp, err := mproxy.NewProxy("", targetServer.URL, svc, logger.NewMock())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return httptest.NewServer(http.HandlerFunc(mp.Handler)), nil
|
|
}
|
|
|
|
func TestSendMessage(t *testing.T) {
|
|
chanID := "1"
|
|
atoken := "auth_token"
|
|
invalidToken := "invalid_token"
|
|
msg := `[{"n":"current","t":-1,"v":1.6}]`
|
|
auth := new(authmocks.Service)
|
|
pub := newMessageService(auth)
|
|
target := newTargetHTTPServer()
|
|
ts, err := newProxyHTTPServer(pub, target)
|
|
assert.Nil(t, err, fmt.Sprintf("failed to create proxy server with err: %v", err))
|
|
defer ts.Close()
|
|
sdkConf := sdk.Config{
|
|
HTTPAdapterURL: ts.URL,
|
|
MsgContentType: "application/senml+json",
|
|
TLSVerification: false,
|
|
}
|
|
|
|
mfsdk := sdk.NewSDK(sdkConf)
|
|
|
|
auth.On("Authorize", mock.Anything, &mainflux.AuthorizeReq{
|
|
Subject: atoken,
|
|
Object: chanID,
|
|
Namespace: "",
|
|
SubjectType: "thing",
|
|
Permission: "publish",
|
|
ObjectType: "group"}).Return(&mainflux.AuthorizeRes{Authorized: true, Id: ""}, nil)
|
|
auth.On("Authorize", mock.Anything, &mainflux.AuthorizeReq{
|
|
Subject: invalidToken,
|
|
Object: chanID,
|
|
Namespace: "",
|
|
SubjectType: "thing",
|
|
Permission: "publish",
|
|
ObjectType: "group"}).Return(&mainflux.AuthorizeRes{Authorized: true, Id: ""}, errors.ErrAuthentication)
|
|
auth.On("Authorize", mock.Anything, mock.Anything).Return(&mainflux.AuthorizeRes{Authorized: false, Id: ""}, nil)
|
|
|
|
cases := map[string]struct {
|
|
chanID string
|
|
msg string
|
|
auth string
|
|
err errors.SDKError
|
|
}{
|
|
"publish message": {
|
|
chanID: chanID,
|
|
msg: msg,
|
|
auth: atoken,
|
|
err: nil,
|
|
},
|
|
"publish message without authorization token": {
|
|
chanID: chanID,
|
|
msg: msg,
|
|
auth: "",
|
|
err: errors.NewSDKErrorWithStatus(errors.ErrAuthorization, http.StatusBadRequest),
|
|
},
|
|
"publish message with invalid authorization token": {
|
|
chanID: chanID,
|
|
msg: msg,
|
|
auth: invalidToken,
|
|
err: errors.NewSDKErrorWithStatus(errors.ErrAuthentication, http.StatusBadRequest),
|
|
},
|
|
"publish message with wrong content type": {
|
|
chanID: chanID,
|
|
msg: "text",
|
|
auth: atoken,
|
|
err: nil,
|
|
},
|
|
"publish message to wrong channel": {
|
|
chanID: "",
|
|
msg: msg,
|
|
auth: atoken,
|
|
err: errors.NewSDKErrorWithStatus(errors.Wrap(adapter.ErrFailedPublish, adapter.ErrMalformedTopic), http.StatusBadRequest),
|
|
},
|
|
"publish message unable to authorize": {
|
|
chanID: chanID,
|
|
msg: msg,
|
|
auth: "invalid-token",
|
|
err: errors.NewSDKErrorWithStatus(errors.ErrAuthorization, http.StatusBadRequest),
|
|
},
|
|
}
|
|
for desc, tc := range cases {
|
|
err := mfsdk.SendMessage(tc.chanID, tc.msg, tc.auth)
|
|
switch tc.err {
|
|
case nil:
|
|
assert.Nil(t, err, fmt.Sprintf("%s: got unexpected error: %s", desc, err))
|
|
default:
|
|
assert.Equal(t, tc.err.Error(), err.Error(), fmt.Sprintf("%s: expected error %s, got %s", desc, tc.err, err))
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestSetContentType(t *testing.T) {
|
|
auth := new(authmocks.Service)
|
|
|
|
pub := newMessageService(auth)
|
|
target := newTargetHTTPServer()
|
|
ts, err := newProxyHTTPServer(pub, target)
|
|
assert.Nil(t, err, fmt.Sprintf("failed to create proxy server with err: %v", err))
|
|
defer ts.Close()
|
|
|
|
sdkConf := sdk.Config{
|
|
HTTPAdapterURL: ts.URL,
|
|
MsgContentType: "application/senml+json",
|
|
TLSVerification: false,
|
|
}
|
|
mfsdk := sdk.NewSDK(sdkConf)
|
|
|
|
cases := []struct {
|
|
desc string
|
|
cType sdk.ContentType
|
|
err errors.SDKError
|
|
}{
|
|
{
|
|
desc: "set senml+json content type",
|
|
cType: "application/senml+json",
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: "set invalid content type",
|
|
cType: "invalid",
|
|
err: errors.NewSDKError(apiutil.ErrUnsupportedContentType),
|
|
},
|
|
}
|
|
for _, tc := range cases {
|
|
err := mfsdk.SetContentType(tc.cType)
|
|
assert.Equal(t, tc.err, err, fmt.Sprintf("%s: expected error %s, got %s", tc.desc, tc.err, err))
|
|
}
|
|
}
|