github.com/akamai/AkamaiOPEN-edgegrid-golang/v2@v2.17.0/pkg/appsec/malware_policy_action_test.go (about) 1 package appsec 2 3 import ( 4 "context" 5 "encoding/json" 6 "errors" 7 "net/http" 8 "net/http/httptest" 9 "testing" 10 11 "github.com/akamai/AkamaiOPEN-edgegrid-golang/v2/pkg/session" 12 "github.com/stretchr/testify/assert" 13 "github.com/stretchr/testify/require" 14 ) 15 16 func TestAppSec_ListMalwarePolicyActions(t *testing.T) { 17 18 result := GetMalwarePolicyActionsResponse{} 19 20 respData := compactJSON(loadFixtureBytes("testdata/TestMalwarePolicyAction/MalwarePolicyActions.json")) 21 json.Unmarshal([]byte(respData), &result) 22 23 tests := map[string]struct { 24 params GetMalwarePolicyActionsRequest 25 responseStatus int 26 responseBody string 27 expectedPath string 28 expectedResponse *GetMalwarePolicyActionsResponse 29 withError error 30 headers http.Header 31 }{ 32 "200 OK": { 33 params: GetMalwarePolicyActionsRequest{ 34 ConfigID: 43253, 35 Version: 15, 36 PolicyID: "AAAA_81230", 37 }, 38 headers: http.Header{ 39 "Content-Type": []string{"application/json"}, 40 }, 41 responseStatus: http.StatusOK, 42 responseBody: string(respData), 43 expectedPath: "/appsec/v1/configs/43253/versions/15/security-policies/AAAA_81230/malware-policies", 44 expectedResponse: &result, 45 }, 46 "500 internal server error": { 47 params: GetMalwarePolicyActionsRequest{ 48 ConfigID: 43253, 49 Version: 15, 50 PolicyID: "AAAA_81230", 51 }, 52 headers: http.Header{}, 53 responseStatus: http.StatusInternalServerError, 54 responseBody: ` 55 { 56 "type": "internal_error", 57 "title": "Internal Server Error", 58 "detail": "Error fetching propertys", 59 "status": 500 60 }`, 61 expectedPath: "/appsec/v1/configs/43253/versions/15/security-policies/AAAA_81230/malware-policies", 62 withError: &Error{ 63 Type: "internal_error", 64 Title: "Internal Server Error", 65 Detail: "Error fetching propertys", 66 StatusCode: http.StatusInternalServerError, 67 }, 68 }, 69 } 70 71 for name, test := range tests { 72 t.Run(name, func(t *testing.T) { 73 mockServer := httptest.NewTLSServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { 74 assert.Equal(t, test.expectedPath, r.URL.String()) 75 assert.Equal(t, http.MethodGet, r.Method) 76 w.WriteHeader(test.responseStatus) 77 _, err := w.Write([]byte(test.responseBody)) 78 assert.NoError(t, err) 79 })) 80 client := mockAPIClient(t, mockServer) 81 result, err := client.GetMalwarePolicyActions( 82 session.ContextWithOptions( 83 context.Background(), 84 session.WithContextHeaders(test.headers), 85 ), 86 test.params) 87 if test.withError != nil { 88 assert.True(t, errors.Is(err, test.withError), "want: %s; got: %s", test.withError, err) 89 return 90 } 91 require.NoError(t, err) 92 assert.Equal(t, test.expectedResponse, result) 93 }) 94 } 95 } 96 97 // Test Update MalwarePolicyAction. 98 func TestAppSec_UpdateMalwarePolicyAction(t *testing.T) { 99 reqData := compactJSON(loadFixtureBytes("testdata/TestMalwarePolicyAction/MalwarePolicyAction.json")) 100 request := UpdateMalwarePolicyActionRequest{} 101 json.Unmarshal([]byte(reqData), &request) 102 respData := compactJSON(loadFixtureBytes("testdata/TestMalwarePolicyAction/MalwarePolicyAction.json")) 103 result := UpdateMalwarePolicyActionResponse{} 104 json.Unmarshal([]byte(respData), &result) 105 106 tests := map[string]struct { 107 params UpdateMalwarePolicyActionRequest 108 responseStatus int 109 responseBody string 110 expectedPath string 111 expectedResponse *UpdateMalwarePolicyActionResponse 112 withError error 113 headers http.Header 114 }{ 115 "200 Success": { 116 params: UpdateMalwarePolicyActionRequest{ 117 ConfigID: 43253, 118 Version: 15, 119 PolicyID: "AAAA_81230", 120 MalwarePolicyID: 134644, 121 Action: "none", 122 UnscannedAction: "none", 123 }, 124 headers: http.Header{ 125 "Content-Type": []string{"application/json;charset=UTF-8"}, 126 }, 127 responseStatus: http.StatusOK, 128 responseBody: respData, 129 expectedResponse: &result, 130 expectedPath: "/appsec/v1/configs/43253/versions/15/security-policies/AAAA_81230/malware-policies/134644", 131 }, 132 "500 internal server error": { 133 params: UpdateMalwarePolicyActionRequest{ 134 ConfigID: 43253, 135 Version: 15, 136 PolicyID: "AAAA_81230", 137 MalwarePolicyID: 134644, 138 Action: "alert", 139 UnscannedAction: "deny", 140 }, 141 responseStatus: http.StatusInternalServerError, 142 responseBody: (` 143 { 144 "type": "internal_error", 145 "title": "Internal Server Error", 146 "detail": "Error creating zone" 147 }`), 148 expectedPath: "/appsec/v1/configs/43253/versions/15/security-policies/AAAA_81230/malware-policies/134644", 149 withError: &Error{ 150 Type: "internal_error", 151 Title: "Internal Server Error", 152 Detail: "Error creating zone", 153 StatusCode: http.StatusInternalServerError, 154 }, 155 }, 156 } 157 158 for name, test := range tests { 159 t.Run(name, func(t *testing.T) { 160 mockServer := httptest.NewTLSServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { 161 assert.Equal(t, http.MethodPut, r.Method) 162 w.WriteHeader(test.responseStatus) 163 if len(test.responseBody) > 0 { 164 _, err := w.Write([]byte(test.responseBody)) 165 assert.NoError(t, err) 166 } 167 })) 168 client := mockAPIClient(t, mockServer) 169 result, err := client.UpdateMalwarePolicyAction( 170 session.ContextWithOptions( 171 context.Background(), 172 session.WithContextHeaders(test.headers)), test.params) 173 if test.withError != nil { 174 assert.True(t, errors.Is(err, test.withError), "want: %s; got: %s", test.withError, err) 175 return 176 } 177 require.NoError(t, err) 178 assert.Equal(t, test.expectedResponse, result) 179 }) 180 } 181 }