-
Notifications
You must be signed in to change notification settings - Fork 67
/
test_server.go
160 lines (139 loc) · 4.13 KB
/
test_server.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
package test_helpers
import (
"bytes"
"encoding/json"
"fmt"
"github.com/sogko/slumber-sessions"
sessionsDomain "github.com/sogko/slumber-sessions/domain"
"github.com/sogko/slumber/domain"
"github.com/sogko/slumber/middlewares/context"
"github.com/sogko/slumber/middlewares/mongodb"
"github.com/sogko/slumber/middlewares/renderer"
"github.com/sogko/slumber/server"
"net/http"
"net/http/httptest"
)
type TestServerOptions struct {
RequestAcceptHeader string
PrivateSigningKey []byte
PublicSigningKey []byte
TokenAuthority sessionsDomain.ITokenAuthority
Database domain.IDatabase
Renderer domain.IRenderer
Resources []domain.IResource
Middlewares []interface{}
}
type TestServer struct {
Options *TestServerOptions
Server *server.Server
Router *server.Router
TokenAuthority sessionsDomain.ITokenAuthority
Database domain.IDatabase
Renderer domain.IRenderer
}
type AuthOptions struct {
APIUser domain.IUser
Token string
}
func NewTestServer(options *TestServerOptions) *TestServer {
// set up basic needs for a test server
ta := options.TokenAuthority
if ta == nil {
if options.PrivateSigningKey == nil {
panic("TestServer.options.PrivateSigningKey is required")
}
if options.PublicSigningKey == nil {
panic("TestServer.options.PublicSigningKey is required")
}
ta = sessions.NewTokenAuthority(&sessions.TokenAuthorityOptions{
PrivateSigningKey: options.PrivateSigningKey,
PublicSigningKey: options.PublicSigningKey,
})
}
ctx := context.New()
// init server
s := server.NewServer(&server.Config{
Context: ctx,
})
// set up DB session if not specified
db := options.Database
if options.Database == nil {
db = mongodb.New(&mongodb.Options{
ServerName: "localhost",
DatabaseName: "test-go-app",
})
_ = db.(*mongodb.MongoDB).NewSession()
}
// set up Renderer (unrolled_render)
r := options.Renderer
if r == nil {
r = renderer.New(&renderer.Options{
IndentJSON: true,
}, renderer.JSON)
}
// set up router
ac := server.NewAccessController(ctx, r)
router := server.NewRouter(s.Context, ac)
// init test server
ts := TestServer{options, s, router, ta, db, r}
// add REST resources to router
for _, resource := range options.Resources {
ts.AddResources(resource)
}
// add middlewares
for _, middleware := range options.Middlewares {
ts.AddMiddlewares(middleware)
}
return &ts
}
func (ts *TestServer) AddResources(resources ...domain.IResource) {
for _, resource := range resources {
ts.Router.AddResources(resource)
}
}
func (ts *TestServer) AddMiddlewares(middlewares ...interface{}) {
for _, middleware := range middlewares {
switch v := middleware.(type) {
case domain.IMiddleware:
ts.Server.UseMiddleware(middleware.(domain.IMiddleware))
case domain.IContextMiddleware:
ts.Server.UseContextMiddleware(middleware.(domain.IContextMiddleware))
default:
fmt.Println("Unknown middleware, skipping", v)
}
}
}
func (ts *TestServer) Run() {
ts.Server.UseRouter(ts.Router)
}
func (ts *TestServer) Request(method string, urlStr string, body interface{}, targetResponse interface{}, authOptions *AuthOptions) *httptest.ResponseRecorder {
recorder := httptest.NewRecorder()
var request *http.Request
// request for version 0.0
if body != nil {
jsonBytes, _ := json.Marshal(body)
request, _ = http.NewRequest(method, urlStr, bytes.NewReader(jsonBytes))
} else {
request, _ = http.NewRequest(method, urlStr, nil)
}
// set API version through accept header
request.Header.Set("Accept", ts.Options.RequestAcceptHeader)
if authOptions == nil {
authOptions = &AuthOptions{nil, ""}
}
if authOptions.APIUser != nil {
// set Authorization header
token, _ := ts.TokenAuthority.CreateNewSessionToken(&sessions.TokenClaims{
UserID: authOptions.APIUser.GetID(),
})
request.Header.Set("Authorization", fmt.Sprintf("Bearer %v", token))
} else {
if authOptions.Token != "" {
request.Header.Set("Authorization", fmt.Sprintf("Bearer %v", authOptions.Token))
}
}
// serve request
ts.Server.ServeHTTP(recorder, request)
DecodeResponseToType(recorder, &targetResponse)
return recorder
}