2019-10-07 08:14:47 -06:00
|
|
|
// Copyright (c) Mainflux
|
2019-01-09 15:42:23 +01:00
|
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
|
|
|
|
package api_test
|
|
|
|
|
NOISSUE - Switch to Google Zanzibar Access control approach (#1919)
* Return Auth service
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Update Compose to run with SpiceDB and Auth svc
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Update auth gRPC API
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Remove Users' policies
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Move Groups to internal
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Use shared groups in Users
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Remove unused code
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Use pkg Groups in Things
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Remove Things groups
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Make imports consistent
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Update Groups networking
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Remove things groups-specific API
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Move Things Clients to the root
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Move Clients to Users root
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Temporarily remove tracing
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Fix imports
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Add buffer config for gRPC
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Update auth type for Things
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Use Auth for login
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Add temporary solution for refresh token
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Update Tokenizer interface
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Updade tokens issuing
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Fix token issuing
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Update JWT validator and refactor Tokenizer
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Rename access timeout
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Rename login to authenticate
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Update Identify to use SubjectID
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Add Auth to Groups
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Use the Auth service for Groups
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Update auth schema
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Fix Auth for Groups
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Add auth for addons (#14)
Signed-off-by: Arvindh <arvindh91@gmail.com>
Speparate Login and Refresh tokens
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Merge authN and authZ requests for things
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Add connect and disconnect
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Update sharing
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Fix policies addition and removal
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Update relation with roels
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Add gRPC to Things
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Assign and Unassign members to group and Listing of Group members (#15)
* add auth for addons
Signed-off-by: Arvindh <arvindh91@gmail.com>
* add assign and unassign to group
Signed-off-by: Arvindh <arvindh91@gmail.com>
* add group incomplete repo implementation
Signed-off-by: Arvindh <arvindh91@gmail.com>
* groups for users
Signed-off-by: Arvindh <arvindh91@gmail.com>
* groups for users
Signed-off-by: Arvindh <arvindh91@gmail.com>
* groups for users
Signed-off-by: Arvindh <arvindh91@gmail.com>
* groups for users
Signed-off-by: Arvindh <arvindh91@gmail.com>
---------
Signed-off-by: Arvindh <arvindh91@gmail.com>
Move coap mqtt and ws policies to spicedb (#16)
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
Remove old policies
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
NOISSUE - Things authorize to return thingID (#18)
This commit modifies the authorize endpoint to the grpc endpoint to return thingID. The authorize endpoint allows adapters to get the publisher of the message.
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
Add Groups to users service (#17)
* add assign and unassign to group
Signed-off-by: Arvindh <arvindh91@gmail.com>
* add group incomplete repo implementation
Signed-off-by: Arvindh <arvindh91@gmail.com>
* groups for users
Signed-off-by: Arvindh <arvindh91@gmail.com>
* groups for users
Signed-off-by: Arvindh <arvindh91@gmail.com>
* groups for users
Signed-off-by: Arvindh <arvindh91@gmail.com>
* groups for users
Signed-off-by: Arvindh <arvindh91@gmail.com>
* groups for users stable 1
Signed-off-by: Arvindh <arvindh91@gmail.com>
* groups for users stable 2
Signed-off-by: Arvindh <arvindh91@gmail.com>
* groups for users & things
Signed-off-by: Arvindh <arvindh91@gmail.com>
* Amend signature
Signed-off-by: Arvindh <arvindh91@gmail.com>
* fix merge error
Signed-off-by: Arvindh <arvindh91@gmail.com>
---------
Signed-off-by: Arvindh <arvindh91@gmail.com>
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
* NOISSUE - Fix es code (#21)
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
* NOISSUE - Fix Bugs (#20)
* fix bugs
Signed-off-by: Arvindh <arvindh91@gmail.com>
* fix bugs
Signed-off-by: Arvindh <arvindh91@gmail.com>
---------
Signed-off-by: Arvindh <arvindh91@gmail.com>
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
* NOISSUE - Test e2e (#19)
* fix: connect method
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
* fix: e2e
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
* fix changes in sdk and e2e
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
* feat(docker): remove unnecessary port mapping
Remove the port mapping for MQTT broker in the docker-compose.yml file.
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
* Enable group listing
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
* feat(responses): update ChannelsPage struct
The ChannelsPage struct in the responses.go file has been updated. The "Channels" field has been renamed to "Groups" to provide more accurate naming. This change ensures consistency and clarity in the codebase.
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
* feat(things): add UpdateClientSecret method
Add the UpdateClientSecret method to the things service. This method allows updating the client secret for a specific client identified by the provided token, id, and key parameters.
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
---------
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
* Use smaller buffers for gRPC
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
* Clean up tests (#22)
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
* Add Connect Disconnect endpoints (#23)
* fix bugs
Signed-off-by: Arvindh <arvindh91@gmail.com>
* fix bugs
Signed-off-by: Arvindh <arvindh91@gmail.com>
* fix list of things in a channel and Add connect disconnect endpoint
Signed-off-by: Arvindh <arvindh91@gmail.com>
* fix list of things in a channel and Add connect disconnect endpoint
Signed-off-by: Arvindh <arvindh91@gmail.com>
---------
Signed-off-by: Arvindh <arvindh91@gmail.com>
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
* Add: Things share with users (#25)
* fix list of things in a channel and Add connect disconnect endpoint
Signed-off-by: Arvindh <arvindh91@gmail.com>
* add: things share with other users
Signed-off-by: Arvindh <arvindh91@gmail.com>
---------
Signed-off-by: Arvindh <arvindh91@gmail.com>
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
* NOISSUE - Rename gRPC Services (#24)
* Rename things and users auth service
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
* docs: add authorization docs for gRPC services
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
* Rename things and users grpc services
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
* Remove mainflux.env package
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
---------
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
* Add: Listing of things, channels, groups, users (#26)
* add: listing of channels, users, groups, things
Signed-off-by: Arvindh <arvindh91@gmail.com>
* add: listing of channels, users, groups, things
Signed-off-by: Arvindh <arvindh91@gmail.com>
* add: listing of channels, users, groups, things
Signed-off-by: Arvindh <arvindh91@gmail.com>
* add: listing of channels, users, groups, things
Signed-off-by: Arvindh <arvindh91@gmail.com>
---------
Signed-off-by: Arvindh <arvindh91@gmail.com>
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
* NOISSUE - Clean Up Users (#27)
* feat(groups): rename redis package to events
- Renamed the `redis` package to `events` in the `internal/groups` directory.
- Updated the file paths and names accordingly.
- This change reflects the more accurate purpose of the package and improves code organization.
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
* feat(auth): Modify identity method
Change request and response of identity method
Add accessToken and refreshToken to Token response
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
* clean up users, remove dead code
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
* feat(users): add unit tests for user service
This commit adds unit tests for the user service in the `users` package. The tests cover various scenarios and ensure the correct behavior of the service.
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
---------
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
* Add: List of user groups & removed repeating code in groups (#29)
* removed repeating code in list groups
Signed-off-by: Arvindh <arvindh91@gmail.com>
* add: list of user group
Signed-off-by: Arvindh <arvindh91@gmail.com>
* fix: otel handler operator name for endpoints
Signed-off-by: Arvindh <arvindh91@gmail.com>
---------
Signed-off-by: Arvindh <arvindh91@gmail.com>
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
* NOISSUE - Clean Up Things Service (#28)
* Rework things service
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
* add tests
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
---------
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
* NOISSUE - Clean Up Auth Service (#30)
* clean up auth service
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
* feat(auth): remove unused import
Remove the unused import of `emptypb` in `auth.pb.go`. This import is not being used in the codebase and can be safely removed.
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
---------
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
* NOISSUE - Update API docs (#31)
Signed-off-by: rodneyosodo <blackd0t@protonmail.com>
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
* Remove TODO comments and cleanup the code
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
* Update dependenices
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
---------
Signed-off-by: Arvindh <arvindh91@gmail.com>
Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com>
Signed-off-by: Rodney Osodo <28790446+rodneyosodo@users.noreply.github.com>
Signed-off-by: rodneyosodo <blackd0t@protonmail.com>
Co-authored-by: b1ackd0t <28790446+rodneyosodo@users.noreply.github.com>
Co-authored-by: Arvindh <30824765+arvindh123@users.noreply.github.com>
2023-10-15 22:02:13 +02:00
|
|
|
// import (
|
|
|
|
// "context"
|
|
|
|
// "crypto/aes"
|
|
|
|
// "crypto/cipher"
|
|
|
|
// "crypto/rand"
|
|
|
|
// "encoding/hex"
|
|
|
|
// "encoding/json"
|
|
|
|
// "fmt"
|
|
|
|
// "io"
|
|
|
|
// "net/http"
|
|
|
|
// "net/http/httptest"
|
|
|
|
// "strconv"
|
|
|
|
// "strings"
|
|
|
|
// "testing"
|
|
|
|
|
|
|
|
// "github.com/go-zoo/bone"
|
|
|
|
// "github.com/mainflux/mainflux/bootstrap"
|
|
|
|
// bsapi "github.com/mainflux/mainflux/bootstrap/api"
|
|
|
|
// "github.com/mainflux/mainflux/bootstrap/mocks"
|
|
|
|
// "github.com/mainflux/mainflux/internal/apiutil"
|
|
|
|
// mflog "github.com/mainflux/mainflux/logger"
|
|
|
|
// mfclients "github.com/mainflux/mainflux/pkg/clients"
|
|
|
|
// "github.com/mainflux/mainflux/pkg/errors"
|
|
|
|
// mfgroups "github.com/mainflux/mainflux/pkg/groups"
|
|
|
|
// mfsdk "github.com/mainflux/mainflux/pkg/sdk/go"
|
|
|
|
// "github.com/mainflux/mainflux/things/clients"
|
|
|
|
// capi "github.com/mainflux/mainflux/things/clients/api"
|
|
|
|
// "github.com/mainflux/mainflux/things/groups"
|
|
|
|
// gapi "github.com/mainflux/mainflux/things/groups/api"
|
|
|
|
// tpolicies "github.com/mainflux/mainflux/things/policies"
|
|
|
|
// papi "github.com/mainflux/mainflux/things/policies/api/http"
|
|
|
|
// upolicies "github.com/mainflux/mainflux/users/policies"
|
|
|
|
// "github.com/stretchr/testify/assert"
|
|
|
|
// "github.com/stretchr/testify/require"
|
|
|
|
// )
|
|
|
|
|
|
|
|
// const (
|
|
|
|
// validToken = "validToken"
|
|
|
|
// invalidToken = "invalidToken"
|
|
|
|
// email = "test@example.com"
|
|
|
|
// unknown = "unknown"
|
|
|
|
// channelsNum = 3
|
|
|
|
// contentType = "application/json"
|
|
|
|
// wrongID = "wrong_id"
|
|
|
|
// addExternalID = "external-id"
|
|
|
|
// addExternalKey = "external-key"
|
|
|
|
// addName = "name"
|
|
|
|
// addContent = "config"
|
|
|
|
// instanceID = "5de9b29a-feb9-11ed-be56-0242ac120002"
|
|
|
|
// )
|
|
|
|
|
|
|
|
// var (
|
|
|
|
// encKey = []byte("1234567891011121")
|
|
|
|
// metadata = map[string]interface{}{"meta": "data"}
|
|
|
|
// addReq = struct {
|
|
|
|
// ThingID string `json:"thing_id"`
|
|
|
|
// ExternalID string `json:"external_id"`
|
|
|
|
// ExternalKey string `json:"external_key"`
|
|
|
|
// Channels []string `json:"channels"`
|
|
|
|
// Name string `json:"name"`
|
|
|
|
// Content string `json:"content"`
|
|
|
|
// }{
|
|
|
|
// ExternalID: "external-id",
|
|
|
|
// ExternalKey: "external-key",
|
|
|
|
// Channels: []string{"1"},
|
|
|
|
// Name: "name",
|
|
|
|
// Content: "config",
|
|
|
|
// }
|
|
|
|
|
|
|
|
// updateReq = struct {
|
|
|
|
// Channels []string `json:"channels,omitempty"`
|
|
|
|
// Content string `json:"content,omitempty"`
|
|
|
|
// State bootstrap.State `json:"state,omitempty"`
|
|
|
|
// ClientCert string `json:"client_cert,omitempty"`
|
|
|
|
// ClientKey string `json:"client_key,omitempty"`
|
|
|
|
// CACert string `json:"ca_cert,omitempty"`
|
|
|
|
// }{
|
|
|
|
// Channels: []string{"2", "3"},
|
|
|
|
// Content: "config update",
|
|
|
|
// State: 1,
|
|
|
|
// ClientCert: "newcert",
|
|
|
|
// ClientKey: "newkey",
|
|
|
|
// CACert: "newca",
|
|
|
|
// }
|
|
|
|
|
|
|
|
// missingIDRes = toJSON(apiutil.ErrorRes{Err: apiutil.ErrMissingID.Error(), Msg: apiutil.ErrValidation.Error()})
|
|
|
|
// missingKeyRes = toJSON(apiutil.ErrorRes{Err: apiutil.ErrBearerKey.Error(), Msg: apiutil.ErrValidation.Error()})
|
|
|
|
// bsErrorRes = toJSON(apiutil.ErrorRes{Err: errors.ErrNotFound.Error(), Msg: bootstrap.ErrBootstrap.Error()})
|
|
|
|
// extKeyRes = toJSON(apiutil.ErrorRes{Msg: bootstrap.ErrExternalKey.Error()})
|
|
|
|
// extSecKeyRes = toJSON(apiutil.ErrorRes{Err: "encoding/hex: invalid byte: U+0078 'x'", Msg: bootstrap.ErrExternalKeySecure.Error()})
|
|
|
|
// )
|
|
|
|
|
|
|
|
// type testRequest struct {
|
|
|
|
// client *http.Client
|
|
|
|
// method string
|
|
|
|
// url string
|
|
|
|
// contentType string
|
|
|
|
// token string
|
|
|
|
// key string
|
|
|
|
// body io.Reader
|
|
|
|
// }
|
|
|
|
|
|
|
|
// func newConfig(channels []bootstrap.Channel) bootstrap.Config {
|
|
|
|
// return bootstrap.Config{
|
|
|
|
// ExternalID: addExternalID,
|
|
|
|
// ExternalKey: addExternalKey,
|
|
|
|
// Channels: channels,
|
|
|
|
// Name: addName,
|
|
|
|
// Content: addContent,
|
|
|
|
// ClientCert: "newcert",
|
|
|
|
// ClientKey: "newkey",
|
|
|
|
// CACert: "newca",
|
|
|
|
// }
|
|
|
|
// }
|
|
|
|
|
|
|
|
// func (tr testRequest) make() (*http.Response, error) {
|
|
|
|
// req, err := http.NewRequest(tr.method, tr.url, tr.body)
|
|
|
|
// if err != nil {
|
|
|
|
// return nil, err
|
|
|
|
// }
|
|
|
|
|
|
|
|
// if tr.token != "" {
|
|
|
|
// req.Header.Set("Authorization", apiutil.BearerPrefix+tr.token)
|
|
|
|
// }
|
|
|
|
// if tr.key != "" {
|
|
|
|
// req.Header.Set("Authorization", apiutil.ThingPrefix+tr.key)
|
|
|
|
// }
|
|
|
|
|
|
|
|
// if tr.contentType != "" {
|
|
|
|
// req.Header.Set("Content-Type", tr.contentType)
|
|
|
|
// }
|
|
|
|
|
|
|
|
// return tr.client.Do(req)
|
|
|
|
// }
|
|
|
|
|
|
|
|
// func enc(in []byte) ([]byte, error) {
|
|
|
|
// block, err := aes.NewCipher(encKey)
|
|
|
|
// if err != nil {
|
|
|
|
// return nil, err
|
|
|
|
// }
|
|
|
|
// ciphertext := make([]byte, aes.BlockSize+len(in))
|
|
|
|
// iv := ciphertext[:aes.BlockSize]
|
|
|
|
// if _, err := io.ReadFull(rand.Reader, iv); err != nil {
|
|
|
|
// return nil, err
|
|
|
|
// }
|
|
|
|
// stream := cipher.NewCFBEncrypter(block, iv)
|
|
|
|
// stream.XORKeyStream(ciphertext[aes.BlockSize:], in)
|
|
|
|
// return ciphertext, nil
|
|
|
|
// }
|
|
|
|
|
|
|
|
// func dec(in []byte) ([]byte, error) {
|
|
|
|
// block, err := aes.NewCipher(encKey)
|
|
|
|
// if err != nil {
|
|
|
|
// return nil, err
|
|
|
|
// }
|
|
|
|
// if len(in) < aes.BlockSize {
|
|
|
|
// return nil, errors.ErrMalformedEntity
|
|
|
|
// }
|
|
|
|
// iv := in[:aes.BlockSize]
|
|
|
|
// in = in[aes.BlockSize:]
|
|
|
|
// stream := cipher.NewCFBDecrypter(block, iv)
|
|
|
|
// stream.XORKeyStream(in, in)
|
|
|
|
// return in, nil
|
|
|
|
// }
|
|
|
|
|
|
|
|
// func newService(auth upolicies.AuthServiceClient, url string) bootstrap.Service {
|
|
|
|
// things := mocks.NewConfigsRepository()
|
|
|
|
// config := mfsdk.Config{
|
|
|
|
// ThingsURL: url,
|
|
|
|
// }
|
|
|
|
|
|
|
|
// sdk := mfsdk.NewSDK(config)
|
|
|
|
// return bootstrap.New(auth, things, sdk, encKey)
|
|
|
|
// }
|
|
|
|
|
|
|
|
// func generateChannels() map[string]mfgroups.Group {
|
|
|
|
// channels := make(map[string]mfgroups.Group, channelsNum)
|
|
|
|
// for i := 0; i < channelsNum; i++ {
|
|
|
|
// id := strconv.Itoa(i + 1)
|
|
|
|
// channels[id] = mfgroups.Group{
|
|
|
|
// ID: id,
|
|
|
|
// Owner: email,
|
|
|
|
// Metadata: metadata,
|
|
|
|
// }
|
|
|
|
// }
|
|
|
|
// return channels
|
|
|
|
// }
|
|
|
|
|
|
|
|
// func newThingsService(auth upolicies.AuthServiceClient) (clients.Service, groups.Service, tpolicies.Service) {
|
|
|
|
// csvc := mocks.NewThingsService(map[string]mfclients.Client{}, auth)
|
|
|
|
// gsvc := mocks.NewChannelsService(generateChannels(), auth)
|
|
|
|
// psvc := mocks.NewPoliciesService(auth)
|
|
|
|
// return csvc, gsvc, psvc
|
|
|
|
// }
|
|
|
|
|
|
|
|
// func newThingsServer(csvc clients.Service, gsvc groups.Service, psvc tpolicies.Service) *httptest.Server {
|
|
|
|
// logger := mflog.NewMock()
|
|
|
|
// mux := bone.New()
|
|
|
|
// capi.MakeHandler(csvc, mux, logger, instanceID)
|
|
|
|
// gapi.MakeHandler(gsvc, mux, logger)
|
|
|
|
// papi.MakeHandler(csvc, psvc, mux, logger)
|
|
|
|
|
|
|
|
// return httptest.NewServer(mux)
|
|
|
|
// }
|
|
|
|
|
|
|
|
// func newBootstrapServer(svc bootstrap.Service) *httptest.Server {
|
|
|
|
// logger := mflog.NewMock()
|
|
|
|
// mux := bsapi.MakeHandler(svc, bootstrap.NewConfigReader(encKey), logger, instanceID)
|
|
|
|
// return httptest.NewServer(mux)
|
|
|
|
// }
|
|
|
|
|
|
|
|
// func toJSON(data interface{}) string {
|
|
|
|
// jsonData, _ := json.Marshal(data)
|
|
|
|
// return string(jsonData)
|
|
|
|
// }
|
|
|
|
|
|
|
|
// func TestAdd(t *testing.T) {
|
|
|
|
// auth := mocks.NewAuthClient(map[string]string{validToken: email})
|
|
|
|
|
|
|
|
// ts := newThingsServer(newThingsService(auth))
|
|
|
|
// svc := newService(auth, ts.URL)
|
|
|
|
// bs := newBootstrapServer(svc)
|
|
|
|
|
|
|
|
// data := toJSON(addReq)
|
|
|
|
|
|
|
|
// neID := addReq
|
|
|
|
// neID.ThingID = "non-existent"
|
|
|
|
// neData := toJSON(neID)
|
|
|
|
|
|
|
|
// invalidChannels := addReq
|
|
|
|
// invalidChannels.Channels = []string{wrongID}
|
|
|
|
// wrongData := toJSON(invalidChannels)
|
|
|
|
|
|
|
|
// cases := []struct {
|
|
|
|
// desc string
|
|
|
|
// req string
|
|
|
|
// auth string
|
|
|
|
// contentType string
|
|
|
|
// status int
|
|
|
|
// location string
|
|
|
|
// }{
|
|
|
|
// {
|
|
|
|
// desc: "add a config with invalid token",
|
|
|
|
// req: data,
|
|
|
|
// auth: invalidToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusUnauthorized,
|
|
|
|
// location: "",
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "add a valid config",
|
|
|
|
// req: data,
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusCreated,
|
|
|
|
// location: "/things/configs/1",
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "add a config with wring content type",
|
|
|
|
// req: data,
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: "",
|
|
|
|
// status: http.StatusUnsupportedMediaType,
|
|
|
|
// location: "",
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "add an existing config",
|
|
|
|
// req: data,
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusConflict,
|
|
|
|
// location: "",
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "add a config with non-existent ID",
|
|
|
|
// req: neData,
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusNotFound,
|
|
|
|
// location: "",
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "add a config with invalid channels",
|
|
|
|
// req: wrongData,
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusBadRequest,
|
|
|
|
// location: "",
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "add a config with wrong JSON",
|
|
|
|
// req: "{\"external_id\": 5}",
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusBadRequest,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "add a config with invalid request format",
|
|
|
|
// req: "}",
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusBadRequest,
|
|
|
|
// location: "",
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "add a config with empty JSON",
|
|
|
|
// req: "{}",
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusBadRequest,
|
|
|
|
// location: "",
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "add a config with an empty request",
|
|
|
|
// req: "",
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusBadRequest,
|
|
|
|
// location: "",
|
|
|
|
// },
|
|
|
|
// }
|
|
|
|
|
|
|
|
// for _, tc := range cases {
|
|
|
|
// req := testRequest{
|
|
|
|
// client: bs.Client(),
|
|
|
|
// method: http.MethodPost,
|
|
|
|
// url: fmt.Sprintf("%s/things/configs", bs.URL),
|
|
|
|
// contentType: tc.contentType,
|
|
|
|
// token: tc.auth,
|
|
|
|
// body: strings.NewReader(tc.req),
|
|
|
|
// }
|
|
|
|
|
|
|
|
// res, err := req.make()
|
|
|
|
// assert.Nil(t, err, fmt.Sprintf("%s: unexpected error %s", tc.desc, err))
|
|
|
|
|
|
|
|
// location := res.Header.Get("Location")
|
|
|
|
// assert.Equal(t, tc.status, res.StatusCode, fmt.Sprintf("%s: expected status code %d got %d", tc.desc, tc.status, res.StatusCode))
|
|
|
|
// assert.Equal(t, tc.location, location, fmt.Sprintf("%s: expected location '%s' got '%s'", tc.desc, tc.location, location))
|
|
|
|
// }
|
|
|
|
// }
|
|
|
|
|
|
|
|
// func TestView(t *testing.T) {
|
|
|
|
// auth := mocks.NewAuthClient(map[string]string{validToken: email})
|
|
|
|
|
|
|
|
// ts := newThingsServer(newThingsService(auth))
|
|
|
|
// svc := newService(auth, ts.URL)
|
|
|
|
// bs := newBootstrapServer(svc)
|
|
|
|
// c := newConfig([]bootstrap.Channel{})
|
|
|
|
|
|
|
|
// mfChs := generateChannels()
|
|
|
|
// for id, ch := range mfChs {
|
|
|
|
// c.Channels = append(c.Channels, bootstrap.Channel{
|
|
|
|
// ID: ch.ID,
|
|
|
|
// Name: fmt.Sprintf("%s%s", "name ", id),
|
|
|
|
// Metadata: map[string]interface{}{"type": fmt.Sprintf("some type %s", id)},
|
|
|
|
// })
|
|
|
|
// }
|
|
|
|
|
|
|
|
// saved, err := svc.Add(context.Background(), validToken, c)
|
|
|
|
// assert.Nil(t, err, fmt.Sprintf("Saving config expected to succeed: %s.\n", err))
|
|
|
|
|
|
|
|
// var channels []channel
|
|
|
|
// for _, ch := range saved.Channels {
|
|
|
|
// channels = append(channels, channel{ID: ch.ID, Name: ch.Name, Metadata: ch.Metadata})
|
|
|
|
// }
|
|
|
|
|
|
|
|
// data := config{
|
|
|
|
// ThingID: saved.ThingID,
|
|
|
|
// ThingKey: saved.ThingKey,
|
|
|
|
// State: saved.State,
|
|
|
|
// Channels: channels,
|
|
|
|
// ExternalID: saved.ExternalID,
|
|
|
|
// ExternalKey: saved.ExternalKey,
|
|
|
|
// Name: saved.Name,
|
|
|
|
// Content: saved.Content,
|
|
|
|
// }
|
|
|
|
|
|
|
|
// cases := []struct {
|
|
|
|
// desc string
|
|
|
|
// auth string
|
|
|
|
// id string
|
|
|
|
// status int
|
|
|
|
// res config
|
|
|
|
// }{
|
|
|
|
// {
|
|
|
|
// desc: "view a config with invalid token",
|
|
|
|
// auth: invalidToken,
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// status: http.StatusUnauthorized,
|
|
|
|
// res: config{},
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "view a config",
|
|
|
|
// auth: validToken,
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// status: http.StatusOK,
|
|
|
|
// res: data,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "view a non-existing config",
|
|
|
|
// auth: validToken,
|
|
|
|
// id: wrongID,
|
|
|
|
// status: http.StatusNotFound,
|
|
|
|
// res: config{},
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "view a config with an empty token",
|
|
|
|
// auth: "",
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// status: http.StatusUnauthorized,
|
|
|
|
// res: config{},
|
|
|
|
// },
|
|
|
|
// }
|
|
|
|
|
|
|
|
// for _, tc := range cases {
|
|
|
|
// req := testRequest{
|
|
|
|
// client: bs.Client(),
|
|
|
|
// method: http.MethodGet,
|
|
|
|
// url: fmt.Sprintf("%s/things/configs/%s", bs.URL, tc.id),
|
|
|
|
// token: tc.auth,
|
|
|
|
// }
|
|
|
|
// res, err := req.make()
|
|
|
|
// assert.Nil(t, err, fmt.Sprintf("%s: unexpected error %s", tc.desc, err))
|
|
|
|
|
|
|
|
// assert.Equal(t, tc.status, res.StatusCode, fmt.Sprintf("%s: expected status code %d got %d", tc.desc, tc.status, res.StatusCode))
|
|
|
|
// var view config
|
|
|
|
// if err := json.NewDecoder(res.Body).Decode(&view); err != io.EOF {
|
|
|
|
// assert.Nil(t, err, fmt.Sprintf("Decoding expected to succeed %s: %s", tc.desc, err))
|
|
|
|
// }
|
|
|
|
|
|
|
|
// assert.ElementsMatch(t, tc.res.Channels, view.Channels, fmt.Sprintf("%s: expected response '%s' got '%s'", tc.desc, tc.res.Channels, view.Channels))
|
|
|
|
// // Empty channels to prevent order mismatch.
|
|
|
|
// tc.res.Channels = []channel{}
|
|
|
|
// view.Channels = []channel{}
|
|
|
|
// assert.Equal(t, tc.res, view, fmt.Sprintf("%s: expected response '%s' got '%s'", tc.desc, tc.res, view))
|
|
|
|
// }
|
|
|
|
// }
|
|
|
|
|
|
|
|
// func TestUpdate(t *testing.T) {
|
|
|
|
// auth := mocks.NewAuthClient(map[string]string{validToken: email})
|
|
|
|
|
|
|
|
// ts := newThingsServer(newThingsService(auth))
|
|
|
|
// svc := newService(auth, ts.URL)
|
|
|
|
// bs := newBootstrapServer(svc)
|
|
|
|
|
|
|
|
// c := newConfig([]bootstrap.Channel{{ID: "1"}})
|
|
|
|
|
|
|
|
// saved, err := svc.Add(context.Background(), validToken, c)
|
|
|
|
// assert.Nil(t, err, fmt.Sprintf("Saving config expected to succeed: %s.\n", err))
|
|
|
|
|
|
|
|
// data := toJSON(updateReq)
|
|
|
|
|
|
|
|
// cases := []struct {
|
|
|
|
// desc string
|
|
|
|
// req string
|
|
|
|
// id string
|
|
|
|
// auth string
|
|
|
|
// contentType string
|
|
|
|
// status int
|
|
|
|
// }{
|
|
|
|
// {
|
|
|
|
// desc: "update with invalid token",
|
|
|
|
// req: data,
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: invalidToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusUnauthorized,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "update with an empty token",
|
|
|
|
// req: data,
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: "",
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusUnauthorized,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "update a valid config",
|
|
|
|
// req: data,
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusOK,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "update a config with wrong content type",
|
|
|
|
// req: data,
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: "",
|
|
|
|
// status: http.StatusUnsupportedMediaType,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "update a non-existing config",
|
|
|
|
// req: data,
|
|
|
|
// id: wrongID,
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusNotFound,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "update a config with invalid request format",
|
|
|
|
// req: "}",
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusBadRequest,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "update a config with an empty request",
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// req: "",
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusBadRequest,
|
|
|
|
// },
|
|
|
|
// }
|
|
|
|
|
|
|
|
// for _, tc := range cases {
|
|
|
|
// req := testRequest{
|
|
|
|
// client: bs.Client(),
|
|
|
|
// method: http.MethodPut,
|
|
|
|
// url: fmt.Sprintf("%s/things/configs/%s", bs.URL, tc.id),
|
|
|
|
// contentType: tc.contentType,
|
|
|
|
// token: tc.auth,
|
|
|
|
// body: strings.NewReader(tc.req),
|
|
|
|
// }
|
|
|
|
// res, err := req.make()
|
|
|
|
// assert.Nil(t, err, fmt.Sprintf("%s: unexpected error %s", tc.desc, err))
|
|
|
|
// assert.Equal(t, tc.status, res.StatusCode, fmt.Sprintf("%s: expected status code %d got %d", tc.desc, tc.status, res.StatusCode))
|
|
|
|
// }
|
|
|
|
// }
|
|
|
|
|
|
|
|
// func TestUpdateCert(t *testing.T) {
|
|
|
|
// auth := mocks.NewAuthClient(map[string]string{validToken: email})
|
|
|
|
|
|
|
|
// ts := newThingsServer(newThingsService(auth))
|
|
|
|
// svc := newService(auth, ts.URL)
|
|
|
|
// bs := newBootstrapServer(svc)
|
|
|
|
|
|
|
|
// c := newConfig([]bootstrap.Channel{{ID: "1"}})
|
|
|
|
|
|
|
|
// saved, err := svc.Add(context.Background(), validToken, c)
|
|
|
|
// assert.Nil(t, err, fmt.Sprintf("Saving config expected to succeed: %s.\n", err))
|
|
|
|
|
|
|
|
// data := toJSON(updateReq)
|
|
|
|
|
|
|
|
// cases := []struct {
|
|
|
|
// desc string
|
|
|
|
// req string
|
|
|
|
// id string
|
|
|
|
// auth string
|
|
|
|
// contentType string
|
|
|
|
// status int
|
|
|
|
// }{
|
|
|
|
// {
|
|
|
|
// desc: "update with invalid token",
|
|
|
|
// req: data,
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: invalidToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusUnauthorized,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "update with an empty token",
|
|
|
|
// req: data,
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: "",
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusUnauthorized,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "update a valid config",
|
|
|
|
// req: data,
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusOK,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "update a config with wrong content type",
|
|
|
|
// req: data,
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: "",
|
|
|
|
// status: http.StatusUnsupportedMediaType,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "update a non-existing config",
|
|
|
|
// req: data,
|
|
|
|
// id: wrongID,
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusNotFound,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "update a config with invalid request format",
|
|
|
|
// req: "}",
|
|
|
|
// id: saved.ThingKey,
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusBadRequest,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "update a config with an empty request",
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// req: "",
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusBadRequest,
|
|
|
|
// },
|
|
|
|
// }
|
|
|
|
|
|
|
|
// for _, tc := range cases {
|
|
|
|
// req := testRequest{
|
|
|
|
// client: bs.Client(),
|
|
|
|
// method: http.MethodPatch,
|
|
|
|
// url: fmt.Sprintf("%s/things/configs/certs/%s", bs.URL, tc.id),
|
|
|
|
// contentType: tc.contentType,
|
|
|
|
// token: tc.auth,
|
|
|
|
// body: strings.NewReader(tc.req),
|
|
|
|
// }
|
|
|
|
// res, err := req.make()
|
|
|
|
// assert.Nil(t, err, fmt.Sprintf("%s: unexpected error %s", tc.desc, err))
|
|
|
|
// assert.Equal(t, tc.status, res.StatusCode, fmt.Sprintf("%s: expected status code %d got %d", tc.desc, tc.status, res.StatusCode))
|
|
|
|
// }
|
|
|
|
// }
|
|
|
|
|
|
|
|
// func TestUpdateConnections(t *testing.T) {
|
|
|
|
// auth := mocks.NewAuthClient(map[string]string{validToken: email})
|
|
|
|
|
|
|
|
// ts := newThingsServer(newThingsService(auth))
|
|
|
|
// svc := newService(auth, ts.URL)
|
|
|
|
// bs := newBootstrapServer(svc)
|
|
|
|
|
|
|
|
// c := newConfig([]bootstrap.Channel{{ID: "1"}})
|
|
|
|
|
|
|
|
// saved, err := svc.Add(context.Background(), validToken, c)
|
|
|
|
// assert.Nil(t, err, fmt.Sprintf("Saving config expected to succeed: %s.\n", err))
|
|
|
|
|
|
|
|
// data := toJSON(updateReq)
|
|
|
|
|
|
|
|
// invalidChannels := updateReq
|
|
|
|
// invalidChannels.Channels = []string{wrongID}
|
|
|
|
|
|
|
|
// wrongData := toJSON(invalidChannels)
|
|
|
|
|
|
|
|
// cases := []struct {
|
|
|
|
// desc string
|
|
|
|
// req string
|
|
|
|
// id string
|
|
|
|
// auth string
|
|
|
|
// contentType string
|
|
|
|
// status int
|
|
|
|
// }{
|
|
|
|
// {
|
|
|
|
// desc: "update connections with invalid token",
|
|
|
|
// req: data,
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: invalidToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusUnauthorized,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "update connections with an empty token",
|
|
|
|
// req: data,
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: "",
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusUnauthorized,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "update connections valid config",
|
|
|
|
// req: data,
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusOK,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "update connections with wrong content type",
|
|
|
|
// req: data,
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: "",
|
|
|
|
// status: http.StatusUnsupportedMediaType,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "update connections for a non-existing config",
|
|
|
|
// req: data,
|
|
|
|
// id: wrongID,
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusNotFound,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "update connections with invalid channels",
|
|
|
|
// req: wrongData,
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusBadRequest,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "update a config with invalid request format",
|
|
|
|
// req: "}",
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusBadRequest,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "update a config with an empty request",
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// req: "",
|
|
|
|
// auth: validToken,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusBadRequest,
|
|
|
|
// },
|
|
|
|
// }
|
|
|
|
|
|
|
|
// for _, tc := range cases {
|
|
|
|
// req := testRequest{
|
|
|
|
// client: bs.Client(),
|
|
|
|
// method: http.MethodPut,
|
|
|
|
// url: fmt.Sprintf("%s/things/configs/connections/%s", bs.URL, tc.id),
|
|
|
|
// contentType: tc.contentType,
|
|
|
|
// token: tc.auth,
|
|
|
|
// body: strings.NewReader(tc.req),
|
|
|
|
// }
|
|
|
|
// res, err := req.make()
|
|
|
|
// assert.Nil(t, err, fmt.Sprintf("%s: unexpected error %s", tc.desc, err))
|
|
|
|
// assert.Equal(t, tc.status, res.StatusCode, fmt.Sprintf("%s: expected status code %d got %d", tc.desc, tc.status, res.StatusCode))
|
|
|
|
// }
|
|
|
|
// }
|
|
|
|
|
|
|
|
// func TestList(t *testing.T) {
|
|
|
|
// configNum := 101
|
|
|
|
// changedStateNum := 20
|
|
|
|
// var active, inactive []config
|
|
|
|
// list := make([]config, configNum)
|
|
|
|
|
|
|
|
// auth := mocks.NewAuthClient(map[string]string{validToken: email})
|
|
|
|
// ts := newThingsServer(newThingsService(auth))
|
|
|
|
// svc := newService(auth, ts.URL)
|
|
|
|
// bs := newBootstrapServer(svc)
|
|
|
|
// path := fmt.Sprintf("%s/%s", bs.URL, "things/configs")
|
|
|
|
|
|
|
|
// c := newConfig([]bootstrap.Channel{{ID: "1"}})
|
|
|
|
|
|
|
|
// for i := 0; i < configNum; i++ {
|
|
|
|
// c.ExternalID = strconv.Itoa(i)
|
|
|
|
// c.ThingKey = c.ExternalID
|
|
|
|
// c.Name = fmt.Sprintf("%s-%d", addName, i)
|
|
|
|
// c.ExternalKey = fmt.Sprintf("%s%s", addExternalKey, strconv.Itoa(i))
|
|
|
|
|
|
|
|
// saved, err := svc.Add(context.Background(), validToken, c)
|
|
|
|
// assert.Nil(t, err, fmt.Sprintf("Saving config expected to succeed: %s.\n", err))
|
|
|
|
|
|
|
|
// var channels []channel
|
|
|
|
// for _, ch := range saved.Channels {
|
|
|
|
// channels = append(channels, channel{ID: ch.ID, Name: ch.Name, Metadata: ch.Metadata})
|
|
|
|
// }
|
|
|
|
// s := config{
|
|
|
|
// ThingID: saved.ThingID,
|
|
|
|
// ThingKey: saved.ThingKey,
|
|
|
|
// Channels: channels,
|
|
|
|
// ExternalID: saved.ExternalID,
|
|
|
|
// ExternalKey: saved.ExternalKey,
|
|
|
|
// Name: saved.Name,
|
|
|
|
// Content: saved.Content,
|
|
|
|
// State: saved.State,
|
|
|
|
// }
|
|
|
|
// list[i] = s
|
|
|
|
// }
|
|
|
|
|
|
|
|
// // Change state of first 20 elements for filtering tests.
|
|
|
|
// for i := 0; i < changedStateNum; i++ {
|
|
|
|
// state := bootstrap.Active
|
|
|
|
// if i%2 == 0 {
|
|
|
|
// state = bootstrap.Inactive
|
|
|
|
// }
|
|
|
|
// err := svc.ChangeState(context.Background(), validToken, list[i].ThingID, state)
|
|
|
|
// assert.Nil(t, err, fmt.Sprintf("Changing state expected to succeed: %s.\n", err))
|
|
|
|
// list[i].State = state
|
|
|
|
// if state == bootstrap.Inactive {
|
|
|
|
// inactive = append(inactive, list[i])
|
|
|
|
// continue
|
|
|
|
// }
|
|
|
|
// active = append(active, list[i])
|
|
|
|
// }
|
|
|
|
|
|
|
|
// cases := []struct {
|
|
|
|
// desc string
|
|
|
|
// auth string
|
|
|
|
// url string
|
|
|
|
// status int
|
|
|
|
// res configPage
|
|
|
|
// }{
|
|
|
|
// {
|
|
|
|
// desc: "view list with invalid token",
|
|
|
|
// auth: invalidToken,
|
|
|
|
// url: fmt.Sprintf("%s?offset=%d&limit=%d", path, 0, 10),
|
|
|
|
// status: http.StatusUnauthorized,
|
|
|
|
// res: configPage{},
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "view list with an empty token",
|
|
|
|
// auth: "",
|
|
|
|
// url: fmt.Sprintf("%s?offset=%d&limit=%d", path, 0, 10),
|
|
|
|
// status: http.StatusUnauthorized,
|
|
|
|
// res: configPage{},
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "view list",
|
|
|
|
// auth: validToken,
|
|
|
|
// url: fmt.Sprintf("%s?offset=%d&limit=%d", path, 0, 1),
|
|
|
|
// status: http.StatusOK,
|
|
|
|
// res: configPage{
|
|
|
|
// Total: uint64(len(list)),
|
|
|
|
// Offset: 0,
|
|
|
|
// Limit: 1,
|
|
|
|
// Configs: list[0:1],
|
|
|
|
// },
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "view list searching by name",
|
|
|
|
// auth: validToken,
|
|
|
|
// url: fmt.Sprintf("%s?offset=%d&limit=%d&name=%s", path, 0, 100, "95"),
|
|
|
|
// status: http.StatusOK,
|
|
|
|
// res: configPage{
|
|
|
|
// Total: 1,
|
|
|
|
// Offset: 0,
|
|
|
|
// Limit: 100,
|
|
|
|
// Configs: list[95:96],
|
|
|
|
// },
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "view last page",
|
|
|
|
// auth: validToken,
|
|
|
|
// url: fmt.Sprintf("%s?offset=%d&limit=%d", path, 100, 10),
|
|
|
|
// status: http.StatusOK,
|
|
|
|
// res: configPage{
|
|
|
|
// Total: uint64(len(list)),
|
|
|
|
// Offset: 100,
|
|
|
|
// Limit: 10,
|
|
|
|
// Configs: list[100:],
|
|
|
|
// },
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "view with limit greater than allowed",
|
|
|
|
// auth: validToken,
|
|
|
|
// url: fmt.Sprintf("%s?offset=%d&limit=%d", path, 0, 1000),
|
|
|
|
// status: http.StatusBadRequest,
|
|
|
|
// res: configPage{},
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "view list with no specified limit and offset",
|
|
|
|
// auth: validToken,
|
|
|
|
// url: path,
|
|
|
|
// status: http.StatusOK,
|
|
|
|
// res: configPage{
|
|
|
|
// Total: uint64(len(list)),
|
|
|
|
// Offset: 0,
|
|
|
|
// Limit: 10,
|
|
|
|
// Configs: list[0:10],
|
|
|
|
// },
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "view list with no specified limit",
|
|
|
|
// auth: validToken,
|
|
|
|
// url: fmt.Sprintf("%s?offset=%d", path, 10),
|
|
|
|
// status: http.StatusOK,
|
|
|
|
// res: configPage{
|
|
|
|
// Total: uint64(len(list)),
|
|
|
|
// Offset: 10,
|
|
|
|
// Limit: 10,
|
|
|
|
// Configs: list[10:20],
|
|
|
|
// },
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "view list with no specified offset",
|
|
|
|
// auth: validToken,
|
|
|
|
// url: fmt.Sprintf("%s?limit=%d", path, 10),
|
|
|
|
// status: http.StatusOK,
|
|
|
|
// res: configPage{
|
|
|
|
// Total: uint64(len(list)),
|
|
|
|
// Offset: 0,
|
|
|
|
// Limit: 10,
|
|
|
|
// Configs: list[0:10],
|
|
|
|
// },
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "view list with limit < 0",
|
|
|
|
// auth: validToken,
|
|
|
|
// url: fmt.Sprintf("%s?limit=%d", path, -10),
|
|
|
|
// status: http.StatusBadRequest,
|
|
|
|
// res: configPage{},
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "view list with offset < 0",
|
|
|
|
// auth: validToken,
|
|
|
|
// url: fmt.Sprintf("%s?offset=%d", path, -10),
|
|
|
|
// status: http.StatusBadRequest,
|
|
|
|
// res: configPage{},
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "view list with invalid query parameters",
|
|
|
|
// auth: validToken,
|
|
|
|
// url: fmt.Sprintf("%s?offset=%d&limit=%d&state=%d&key=%%", path, 10, 10, bootstrap.Inactive),
|
|
|
|
// status: http.StatusBadRequest,
|
|
|
|
// res: configPage{},
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "view first 10 active",
|
|
|
|
// auth: validToken,
|
|
|
|
// url: fmt.Sprintf("%s?offset=%d&limit=%d&state=%d", path, 0, 20, bootstrap.Active),
|
|
|
|
// status: http.StatusOK,
|
|
|
|
// res: configPage{
|
|
|
|
// Total: uint64(len(active)),
|
|
|
|
// Offset: 0,
|
|
|
|
// Limit: 20,
|
|
|
|
// Configs: active,
|
|
|
|
// },
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "view first 10 inactive",
|
|
|
|
// auth: validToken,
|
|
|
|
// url: fmt.Sprintf("%s?offset=%d&limit=%d&state=%d", path, 0, 20, bootstrap.Inactive),
|
|
|
|
// status: http.StatusOK,
|
|
|
|
// res: configPage{
|
|
|
|
// Total: uint64(len(list) - len(inactive)),
|
|
|
|
// Offset: 0,
|
|
|
|
// Limit: 20,
|
|
|
|
// Configs: inactive,
|
|
|
|
// },
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "view first 5 active",
|
|
|
|
// auth: validToken,
|
|
|
|
// url: fmt.Sprintf("%s?offset=%d&limit=%d&state=%d", path, 0, 10, bootstrap.Active),
|
|
|
|
// status: http.StatusOK,
|
|
|
|
// res: configPage{
|
|
|
|
// Total: uint64(len(active)),
|
|
|
|
// Offset: 0,
|
|
|
|
// Limit: 10,
|
|
|
|
// Configs: active[:5],
|
|
|
|
// },
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "view last 5 inactive",
|
|
|
|
// auth: validToken,
|
|
|
|
// url: fmt.Sprintf("%s?offset=%d&limit=%d&state=%d", path, 10, 10, bootstrap.Inactive),
|
|
|
|
// status: http.StatusOK,
|
|
|
|
// res: configPage{
|
|
|
|
// Total: uint64(len(list) - len(active)),
|
|
|
|
// Offset: 10,
|
|
|
|
// Limit: 10,
|
|
|
|
// Configs: inactive[5:],
|
|
|
|
// },
|
|
|
|
// },
|
|
|
|
// }
|
|
|
|
|
|
|
|
// for _, tc := range cases {
|
|
|
|
// req := testRequest{
|
|
|
|
// client: bs.Client(),
|
|
|
|
// method: http.MethodGet,
|
|
|
|
// url: tc.url,
|
|
|
|
// token: tc.auth,
|
|
|
|
// }
|
|
|
|
|
|
|
|
// res, err := req.make()
|
|
|
|
// assert.Nil(t, err, fmt.Sprintf("%s: unexpected error %s", tc.desc, err))
|
|
|
|
|
|
|
|
// assert.Equal(t, tc.status, res.StatusCode, fmt.Sprintf("%s: expected status code %d got %d", tc.desc, tc.status, res.StatusCode))
|
|
|
|
// var body configPage
|
|
|
|
|
|
|
|
// err = json.NewDecoder(res.Body).Decode(&body)
|
|
|
|
// assert.Nil(t, err, fmt.Sprintf("%s: unexpected error while decoding response body: %s", tc.desc, err))
|
|
|
|
|
|
|
|
// assert.Nil(t, err, fmt.Sprintf("%s: unexpected error %s", tc.desc, err))
|
|
|
|
// assert.ElementsMatch(t, tc.res.Configs, body.Configs, fmt.Sprintf("%s: expected response '%s' got '%s'", tc.desc, tc.res.Configs, body.Configs))
|
|
|
|
// assert.Equal(t, tc.res.Total, body.Total, fmt.Sprintf("%s: expected response total '%d' got '%d'", tc.desc, tc.res.Total, body.Total))
|
|
|
|
// }
|
|
|
|
// }
|
|
|
|
|
|
|
|
// func TestRemove(t *testing.T) {
|
|
|
|
// auth := mocks.NewAuthClient(map[string]string{validToken: email})
|
|
|
|
|
|
|
|
// ts := newThingsServer(newThingsService(auth))
|
|
|
|
// svc := newService(auth, ts.URL)
|
|
|
|
// bs := newBootstrapServer(svc)
|
|
|
|
|
|
|
|
// c := newConfig([]bootstrap.Channel{{ID: "1"}})
|
|
|
|
|
|
|
|
// saved, err := svc.Add(context.Background(), validToken, c)
|
|
|
|
// assert.Nil(t, err, fmt.Sprintf("Saving config expected to succeed: %s.\n", err))
|
|
|
|
|
|
|
|
// cases := []struct {
|
|
|
|
// desc string
|
|
|
|
// id string
|
|
|
|
// auth string
|
|
|
|
// status int
|
|
|
|
// }{
|
|
|
|
// {
|
|
|
|
// desc: "remove with invalid token",
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: invalidToken,
|
|
|
|
// status: http.StatusUnauthorized,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "remove with an empty token",
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: "",
|
|
|
|
// status: http.StatusUnauthorized,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "remove non-existing config",
|
|
|
|
// id: "non-existing",
|
|
|
|
// auth: validToken,
|
|
|
|
// status: http.StatusNoContent,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "remove config",
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: validToken,
|
|
|
|
// status: http.StatusNoContent,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "remove removed config",
|
|
|
|
// id: wrongID,
|
|
|
|
// auth: validToken,
|
|
|
|
// status: http.StatusNoContent,
|
|
|
|
// },
|
|
|
|
// }
|
|
|
|
|
|
|
|
// for _, tc := range cases {
|
|
|
|
// req := testRequest{
|
|
|
|
// client: bs.Client(),
|
|
|
|
// method: http.MethodDelete,
|
|
|
|
// url: fmt.Sprintf("%s/things/configs/%s", bs.URL, tc.id),
|
|
|
|
// token: tc.auth,
|
|
|
|
// }
|
|
|
|
// res, err := req.make()
|
|
|
|
// assert.Nil(t, err, fmt.Sprintf("%s: unexpected error %s", tc.desc, err))
|
|
|
|
// assert.Equal(t, tc.status, res.StatusCode, fmt.Sprintf("%s: expected status code %d got %d", tc.desc, tc.status, res.StatusCode))
|
|
|
|
// }
|
|
|
|
// }
|
|
|
|
|
|
|
|
// func TestBootstrap(t *testing.T) {
|
|
|
|
// auth := mocks.NewAuthClient(map[string]string{validToken: email})
|
|
|
|
|
|
|
|
// ts := newThingsServer(newThingsService(auth))
|
|
|
|
// svc := newService(auth, ts.URL)
|
|
|
|
// bs := newBootstrapServer(svc)
|
|
|
|
|
|
|
|
// c := newConfig([]bootstrap.Channel{{ID: "1"}})
|
|
|
|
|
|
|
|
// saved, err := svc.Add(context.Background(), validToken, c)
|
|
|
|
// assert.Nil(t, err, fmt.Sprintf("Saving config expected to succeed: %s.\n", err))
|
|
|
|
|
|
|
|
// encExternKey, err := enc([]byte(c.ExternalKey))
|
|
|
|
// assert.Nil(t, err, fmt.Sprintf("Encrypting config expected to succeed: %s.\n", err))
|
|
|
|
|
|
|
|
// var channels []channel
|
|
|
|
// for _, ch := range saved.Channels {
|
|
|
|
// channels = append(channels, channel{ID: ch.ID, Name: ch.Name, Metadata: ch.Metadata})
|
|
|
|
// }
|
|
|
|
|
|
|
|
// s := struct {
|
|
|
|
// ThingID string `json:"thing_id"`
|
|
|
|
// ThingKey string `json:"thing_key"`
|
|
|
|
// Channels []channel `json:"channels"`
|
|
|
|
// Content string `json:"content"`
|
|
|
|
// ClientCert string `json:"client_cert"`
|
|
|
|
// ClientKey string `json:"client_key"`
|
|
|
|
// CACert string `json:"ca_cert"`
|
|
|
|
// }{
|
|
|
|
// ThingID: saved.ThingID,
|
|
|
|
// ThingKey: saved.ThingKey,
|
|
|
|
// Channels: channels,
|
|
|
|
// Content: saved.Content,
|
|
|
|
// ClientCert: saved.ClientCert,
|
|
|
|
// ClientKey: saved.ClientKey,
|
|
|
|
// CACert: saved.CACert,
|
|
|
|
// }
|
|
|
|
|
|
|
|
// data := toJSON(s)
|
|
|
|
|
|
|
|
// cases := []struct {
|
|
|
|
// desc string
|
|
|
|
// externalID string
|
|
|
|
// externalKey string
|
|
|
|
// status int
|
|
|
|
// res string
|
|
|
|
// secure bool
|
|
|
|
// }{
|
|
|
|
// {
|
|
|
|
// desc: "bootstrap a Thing with unknown ID",
|
|
|
|
// externalID: unknown,
|
|
|
|
// externalKey: c.ExternalKey,
|
|
|
|
// status: http.StatusNotFound,
|
|
|
|
// res: bsErrorRes,
|
|
|
|
// secure: false,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "bootstrap a Thing with an empty ID",
|
|
|
|
// externalID: "",
|
|
|
|
// externalKey: c.ExternalKey,
|
|
|
|
// status: http.StatusBadRequest,
|
|
|
|
// res: missingIDRes,
|
|
|
|
// secure: false,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "bootstrap a Thing with unknown key",
|
|
|
|
// externalID: c.ExternalID,
|
|
|
|
// externalKey: unknown,
|
|
|
|
// status: http.StatusForbidden,
|
|
|
|
// res: extKeyRes,
|
|
|
|
// secure: false,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "bootstrap a Thing with an empty key",
|
|
|
|
// externalID: c.ExternalID,
|
|
|
|
// externalKey: "",
|
|
|
|
// status: http.StatusUnauthorized,
|
|
|
|
// res: missingKeyRes,
|
|
|
|
// secure: false,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "bootstrap known Thing",
|
|
|
|
// externalID: c.ExternalID,
|
|
|
|
// externalKey: c.ExternalKey,
|
|
|
|
// status: http.StatusOK,
|
|
|
|
// res: data,
|
|
|
|
// secure: false,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "bootstrap secure",
|
|
|
|
// externalID: fmt.Sprintf("secure/%s", c.ExternalID),
|
|
|
|
// externalKey: hex.EncodeToString(encExternKey),
|
|
|
|
// status: http.StatusOK,
|
|
|
|
// res: data,
|
|
|
|
// secure: true,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "bootstrap secure with unencrypted key",
|
|
|
|
// externalID: fmt.Sprintf("secure/%s", c.ExternalID),
|
|
|
|
// externalKey: c.ExternalKey,
|
|
|
|
// status: http.StatusForbidden,
|
|
|
|
// res: extSecKeyRes,
|
|
|
|
// secure: true,
|
|
|
|
// },
|
|
|
|
// }
|
|
|
|
|
|
|
|
// for _, tc := range cases {
|
|
|
|
// req := testRequest{
|
|
|
|
// client: bs.Client(),
|
|
|
|
// method: http.MethodGet,
|
|
|
|
// url: fmt.Sprintf("%s/things/bootstrap/%s", bs.URL, tc.externalID),
|
|
|
|
// key: tc.externalKey,
|
|
|
|
// }
|
|
|
|
// res, err := req.make()
|
|
|
|
// assert.Nil(t, err, fmt.Sprintf("%s: unexpected error %s", tc.desc, err))
|
|
|
|
|
|
|
|
// assert.Equal(t, tc.status, res.StatusCode, fmt.Sprintf("%s: expected status code %d got %d", tc.desc, tc.status, res.StatusCode))
|
|
|
|
// body, err := io.ReadAll(res.Body)
|
|
|
|
// assert.Nil(t, err, fmt.Sprintf("%s: unexpected error %s", tc.desc, err))
|
|
|
|
// if tc.secure && tc.status == http.StatusOK {
|
|
|
|
// body, err = dec(body)
|
|
|
|
// assert.Nil(t, err, fmt.Sprintf("%s: unexpected error while decoding body: %s", tc.desc, err))
|
|
|
|
// }
|
|
|
|
|
|
|
|
// data := strings.Trim(string(body), "\n")
|
|
|
|
// assert.Equal(t, tc.res, data, fmt.Sprintf("%s: expected response '%s' got '%s'", tc.desc, tc.res, data))
|
|
|
|
// }
|
|
|
|
// }
|
|
|
|
|
|
|
|
// func TestChangeState(t *testing.T) {
|
|
|
|
// auth := mocks.NewAuthClient(map[string]string{validToken: email})
|
|
|
|
|
|
|
|
// ts := newThingsServer(newThingsService(auth))
|
|
|
|
// svc := newService(auth, ts.URL)
|
|
|
|
// bs := newBootstrapServer(svc)
|
|
|
|
|
|
|
|
// c := newConfig([]bootstrap.Channel{{ID: "1"}})
|
|
|
|
|
|
|
|
// saved, err := svc.Add(context.Background(), validToken, c)
|
|
|
|
// require.Nil(t, err, fmt.Sprintf("Saving config expected to succeed: %s.\n", err))
|
|
|
|
|
|
|
|
// inactive := fmt.Sprintf("{\"state\": %d}", bootstrap.Inactive)
|
|
|
|
// active := fmt.Sprintf("{\"state\": %d}", bootstrap.Active)
|
|
|
|
|
|
|
|
// cases := []struct {
|
|
|
|
// desc string
|
|
|
|
// id string
|
|
|
|
// auth string
|
|
|
|
// state string
|
|
|
|
// contentType string
|
|
|
|
// status int
|
|
|
|
// }{
|
|
|
|
// {
|
|
|
|
// desc: "change state with invalid token",
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: invalidToken,
|
|
|
|
// state: active,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusUnauthorized,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "change state with an empty token",
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: "",
|
|
|
|
// state: active,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusUnauthorized,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "change state with invalid content type",
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: validToken,
|
|
|
|
// state: active,
|
|
|
|
// contentType: "",
|
|
|
|
// status: http.StatusUnsupportedMediaType,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "change state to active",
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: validToken,
|
|
|
|
// state: active,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusOK,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "change state to inactive",
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: validToken,
|
|
|
|
// state: inactive,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusOK,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "change state of non-existing config",
|
|
|
|
// id: wrongID,
|
|
|
|
// auth: validToken,
|
|
|
|
// state: active,
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusNotFound,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "change state to invalid value",
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: validToken,
|
|
|
|
// state: fmt.Sprintf("{\"state\": %d}", -3),
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusBadRequest,
|
|
|
|
// },
|
|
|
|
// {
|
|
|
|
// desc: "change state with invalid data",
|
|
|
|
// id: saved.ThingID,
|
|
|
|
// auth: validToken,
|
|
|
|
// state: "",
|
|
|
|
// contentType: contentType,
|
|
|
|
// status: http.StatusBadRequest,
|
|
|
|
// },
|
|
|
|
// }
|
|
|
|
|
|
|
|
// for _, tc := range cases {
|
|
|
|
// req := testRequest{
|
|
|
|
// client: bs.Client(),
|
|
|
|
// method: http.MethodPut,
|
|
|
|
// url: fmt.Sprintf("%s/things/state/%s", bs.URL, tc.id),
|
|
|
|
// token: tc.auth,
|
|
|
|
// contentType: tc.contentType,
|
|
|
|
// body: strings.NewReader(tc.state),
|
|
|
|
// }
|
|
|
|
// res, err := req.make()
|
|
|
|
// assert.Nil(t, err, fmt.Sprintf("%s: unexpected error %s", tc.desc, err))
|
|
|
|
// assert.Equal(t, tc.status, res.StatusCode, fmt.Sprintf("%s: expected status code %d got %d", tc.desc, tc.status, res.StatusCode))
|
|
|
|
// }
|
|
|
|
// }
|
|
|
|
|
|
|
|
// type channel struct {
|
|
|
|
// ID string `json:"id"`
|
|
|
|
// Name string `json:"name,omitempty"`
|
|
|
|
// Metadata interface{} `json:"metadata,omitempty"`
|
|
|
|
// }
|
|
|
|
|
|
|
|
// type config struct {
|
|
|
|
// ThingID string `json:"thing_id,omitempty"`
|
|
|
|
// ThingKey string `json:"thing_key,omitempty"`
|
|
|
|
// Channels []channel `json:"channels,omitempty"`
|
|
|
|
// ExternalID string `json:"external_id"`
|
|
|
|
// ExternalKey string `json:"external_key,omitempty"`
|
|
|
|
// Content string `json:"content,omitempty"`
|
|
|
|
// Name string `json:"name"`
|
|
|
|
// State bootstrap.State `json:"state"`
|
|
|
|
// }
|
|
|
|
|
|
|
|
// type configPage struct {
|
|
|
|
// Total uint64 `json:"total"`
|
|
|
|
// Offset uint64 `json:"offset"`
|
|
|
|
// Limit uint64 `json:"limit"`
|
|
|
|
// Configs []config `json:"configs"`
|
|
|
|
// }
|