github.com/akamai/AkamaiOPEN-edgegrid-golang/v8@v8.1.0/pkg/appsec/security_policy_protections_test.go (about) 1 package appsec 2 3 import ( 4 "context" 5 "encoding/json" 6 "errors" 7 "net/http" 8 "net/http/httptest" 9 "testing" 10 11 "github.com/akamai/AkamaiOPEN-edgegrid-golang/v8/pkg/session" 12 "github.com/stretchr/testify/assert" 13 "github.com/stretchr/testify/require" 14 ) 15 16 // Test PolicyProtections 17 func TestAppSec_GetPolicyProtections(t *testing.T) { 18 19 result := PolicyProtectionsResponse{} 20 21 respData := compactJSON(loadFixtureBytes("testdata/TestPolicyProtections/PolicyProtections.json")) 22 err := json.Unmarshal([]byte(respData), &result) 23 require.NoError(t, err) 24 25 tests := map[string]struct { 26 params GetPolicyProtectionsRequest 27 responseStatus int 28 responseBody string 29 expectedPath string 30 expectedResponse *PolicyProtectionsResponse 31 withError error 32 }{ 33 "200 OK": { 34 params: GetPolicyProtectionsRequest{ 35 ConfigID: 43253, 36 Version: 15, 37 PolicyID: "AAAA_81230", 38 }, 39 responseStatus: http.StatusOK, 40 responseBody: respData, 41 expectedPath: "/appsec/v1/configs/43253/versions/15/security-policies/AAAA_81230/protections", 42 expectedResponse: &result, 43 }, 44 "500 internal server error": { 45 params: GetPolicyProtectionsRequest{ 46 ConfigID: 43253, 47 Version: 15, 48 PolicyID: "AAAA_81230", 49 }, 50 responseStatus: http.StatusInternalServerError, 51 responseBody: ` 52 { 53 "type": "internal_error", 54 "title": "Internal Server Error", 55 "detail": "Error fetching match target" 56 }`, 57 expectedPath: "/appsec/v1/configs/43253/versions/15/security-policies/AAAA_81230/protections", 58 withError: &Error{ 59 Type: "internal_error", 60 Title: "Internal Server Error", 61 Detail: "Error fetching match target", 62 StatusCode: http.StatusInternalServerError, 63 }, 64 }, 65 } 66 67 for name, test := range tests { 68 t.Run(name, func(t *testing.T) { 69 mockServer := httptest.NewTLSServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { 70 assert.Equal(t, test.expectedPath, r.URL.String()) 71 assert.Equal(t, http.MethodGet, r.Method) 72 w.WriteHeader(test.responseStatus) 73 _, err := w.Write([]byte(test.responseBody)) 74 assert.NoError(t, err) 75 })) 76 client := mockAPIClient(t, mockServer) 77 result, err := client.GetPolicyProtections(context.Background(), test.params) 78 if test.withError != nil { 79 assert.True(t, errors.Is(err, test.withError), "want: %s; got: %s", test.withError, err) 80 return 81 } 82 require.NoError(t, err) 83 assert.Equal(t, test.expectedResponse, result) 84 }) 85 } 86 } 87 88 // Test Update PolicyProtections. 89 func TestAppSec_UpdatePolicyProtections(t *testing.T) { 90 result := PolicyProtectionsResponse{} 91 92 respData := compactJSON(loadFixtureBytes("testdata/TestPolicyProtections/PolicyProtections.json")) 93 err := json.Unmarshal([]byte(respData), &result) 94 require.NoError(t, err) 95 96 req := UpdatePolicyProtectionsRequest{} 97 98 reqData := compactJSON(loadFixtureBytes("testdata/TestPolicyProtections/PolicyProtections.json")) 99 err = json.Unmarshal([]byte(reqData), &req) 100 require.NoError(t, err) 101 102 tests := map[string]struct { 103 params UpdatePolicyProtectionsRequest 104 responseStatus int 105 responseBody string 106 expectedPath string 107 expectedResponse *PolicyProtectionsResponse 108 withError error 109 headers http.Header 110 }{ 111 "200 Success": { 112 params: UpdatePolicyProtectionsRequest{ 113 ConfigID: 43253, 114 Version: 15, 115 PolicyID: "AAAA_81230", 116 }, 117 headers: http.Header{ 118 "Content-Type": []string{"application/json;charset=UTF-8"}, 119 }, 120 responseStatus: http.StatusCreated, 121 responseBody: respData, 122 expectedResponse: &result, 123 expectedPath: "/appsec/v1/configs/43253/versions/15/security-policies/AAAA_81230/protections", 124 }, 125 "500 internal server error": { 126 params: UpdatePolicyProtectionsRequest{ 127 ConfigID: 43253, 128 Version: 15, 129 PolicyID: "AAAA_81230", 130 }, 131 responseStatus: http.StatusInternalServerError, 132 responseBody: ` 133 { 134 "type": "internal_error", 135 "title": "Internal Server Error", 136 "detail": "Error creating zone" 137 }`, 138 expectedPath: "/appsec/v1/configs/43253/versions/15/security-policies/AAAA_81230/protections", 139 withError: &Error{ 140 Type: "internal_error", 141 Title: "Internal Server Error", 142 Detail: "Error creating zone", 143 StatusCode: http.StatusInternalServerError, 144 }, 145 }, 146 } 147 148 for name, test := range tests { 149 t.Run(name, func(t *testing.T) { 150 mockServer := httptest.NewTLSServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { 151 assert.Equal(t, http.MethodPut, r.Method) 152 w.WriteHeader(test.responseStatus) 153 if len(test.responseBody) > 0 { 154 _, err := w.Write([]byte(test.responseBody)) 155 assert.NoError(t, err) 156 } 157 })) 158 client := mockAPIClient(t, mockServer) 159 result, err := client.UpdatePolicyProtections( 160 session.ContextWithOptions( 161 context.Background(), 162 session.WithContextHeaders(test.headers)), test.params) 163 if test.withError != nil { 164 assert.True(t, errors.Is(err, test.withError), "want: %s; got: %s", test.withError, err) 165 return 166 } 167 require.NoError(t, err) 168 assert.Equal(t, test.expectedResponse, result) 169 }) 170 } 171 } 172 173 // Test Remove PolicyProtections. 174 func TestAppSec_RemovePolicyProtections(t *testing.T) { 175 result := PolicyProtectionsResponse{} 176 177 respData := compactJSON(loadFixtureBytes("testdata/TestPolicyProtections/PolicyProtections.json")) 178 err := json.Unmarshal([]byte(respData), &result) 179 require.NoError(t, err) 180 181 req := UpdatePolicyProtectionsRequest{} 182 183 reqData := compactJSON(loadFixtureBytes("testdata/TestPolicyProtections/PolicyProtections.json")) 184 err = json.Unmarshal([]byte(reqData), &req) 185 require.NoError(t, err) 186 187 tests := map[string]struct { 188 params UpdatePolicyProtectionsRequest 189 responseStatus int 190 responseBody string 191 expectedPath string 192 expectedResponse *PolicyProtectionsResponse 193 withError error 194 headers http.Header 195 }{ 196 "200 Success": { 197 params: UpdatePolicyProtectionsRequest{ 198 ConfigID: 43253, 199 Version: 15, 200 PolicyID: "AAAA_81230", 201 }, 202 headers: http.Header{ 203 "Content-Type": []string{"application/json;charset=UTF-8"}, 204 }, 205 responseStatus: http.StatusCreated, 206 responseBody: respData, 207 expectedResponse: &result, 208 expectedPath: "/appsec/v1/configs/43253/versions/15/security-policies/AAAA_81230/protections", 209 }, 210 "500 internal server error": { 211 params: UpdatePolicyProtectionsRequest{ 212 ConfigID: 43253, 213 Version: 15, 214 PolicyID: "AAAA_81230", 215 }, 216 responseStatus: http.StatusInternalServerError, 217 responseBody: ` 218 { 219 "type": "internal_error", 220 "title": "Internal Server Error", 221 "detail": "Error creating zone" 222 }`, 223 expectedPath: "/appsec/v1/configs/43253/versions/15/security-policies/AAAA_81230/protections", 224 withError: &Error{ 225 Type: "internal_error", 226 Title: "Internal Server Error", 227 Detail: "Error creating zone", 228 StatusCode: http.StatusInternalServerError, 229 }, 230 }, 231 } 232 233 for name, test := range tests { 234 t.Run(name, func(t *testing.T) { 235 mockServer := httptest.NewTLSServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { 236 assert.Equal(t, http.MethodPut, r.Method) 237 w.WriteHeader(test.responseStatus) 238 if len(test.responseBody) > 0 { 239 _, err := w.Write([]byte(test.responseBody)) 240 assert.NoError(t, err) 241 } 242 })) 243 client := mockAPIClient(t, mockServer) 244 result, err := client.RemovePolicyProtections( 245 session.ContextWithOptions( 246 context.Background(), 247 session.WithContextHeaders(test.headers)), test.params) 248 if test.withError != nil { 249 assert.True(t, errors.Is(err, test.withError), "want: %s; got: %s", test.withError, err) 250 return 251 } 252 require.NoError(t, err) 253 assert.Equal(t, test.expectedResponse, result) 254 }) 255 } 256 }