apigeelint
Version:
Node module and tool to lint a bundle for an Apigee API Proxy or sharedflow.
238 lines (218 loc) • 7.34 kB
JavaScript
/*
Copyright 2019-2025 Google LLC
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
https://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
/* global describe, it, configuration */
const assert = require("node:assert"),
testID = "TD004",
util = require("node:util"),
debug = require("debug")(`apigeelint:${testID}-test`),
Bundle = require("../../lib/package/Bundle.js"),
bl = require("../../lib/package/bundleLinter.js"),
Endpoint = require("../../lib/package/Endpoint.js"),
plugin = require(bl.resolvePlugin(testID)),
Dom = require("@xmldom/xmldom").DOMParser,
testBase = function (caseNum, profile, desc, targetDef, messages) {
it(`case ${caseNum} ${desc}`, function () {
const tDoc = new Dom().parseFromString(targetDef),
target = new Endpoint(tDoc.documentElement, this, "");
plugin.onBundle({ profile });
plugin.onTargetEndpoint(target, function (e, foundIssues) {
assert.equal(e, undefined, e ? " error " : " no error");
debug(`foundIssues: ${foundIssues}`);
if (messages && messages.length) {
debug(`messages: ${util.format(messages)}`);
assert.equal(foundIssues, true);
assert.equal(
target.report.messages.length,
messages.length,
util.format(target.report.messages),
);
messages.forEach((msg, ix) => {
debug(`check msg ${ix}: ${msg}`);
assert.ok(
target.report.messages.find((m) => m.message == msg),
`index ${ix} ${util.format(target.report.messages)}`,
);
});
} else {
assert.equal(foundIssues, false, util.format(target.report.messages));
assert.equal(
target.report.messages.length,
0,
util.format(target.report.messages),
);
}
});
});
};
const test = function (caseNum, desc, targetDef, messages) {
return testBase(caseNum, "apigee", desc, targetDef, messages);
};
const testApigeeX = function (caseNum, desc, targetDef, messages) {
return testBase(caseNum, "apigeex", desc, targetDef, messages);
};
describe(`${testID} - ${plugin.plugin.name}`, function () {
test(
20,
"empty SSLInfo with https url",
`<TargetEndpoint name="default">
<HTTPTargetConnection>
<SSLInfo/>
<URL>https://foo.com/apis/{api_name}/maskconfigs</URL>
</HTTPTargetConnection>
</TargetEndpoint>`,
["SSLInfo configuration does not use Enabled=true"],
);
test(
30,
"SSLInfo/Enabled = false, scheme=https",
`<TargetEndpoint name="default">
<HTTPTargetConnection>
<SSLInfo>
<Enabled>false</Enabled>
</SSLInfo>
<URL>https://foo.com/apis/{api_name}/maskconfigs</URL>
</HTTPTargetConnection>
</TargetEndpoint>`,
["SSLInfo configuration does not use Enabled=true"],
);
test(
40,
"SSLInfo/Enabled=true, no truststore (flagged by TD007), profile=apigee",
`<TargetEndpoint name="default">
<HTTPTargetConnection>
<SSLInfo>
<Enabled>true</Enabled>
</SSLInfo>
<URL>https://foo.com/apis/{api_name}/maskconfigs</URL>
</HTTPTargetConnection>
</TargetEndpoint>`,
[],
);
test(
41,
"SSLInfo/Enabled=true, with TrustStore, profile=apigee",
`<TargetEndpoint name="default">
<HTTPTargetConnection>
<SSLInfo>
<Enabled>true</Enabled>
<TrustStore>truststore1</TrustStore>
</SSLInfo>
<URL>https://foo.com/apis/{api_name}/maskconfigs</URL>
</HTTPTargetConnection>
</TargetEndpoint>`,
null,
);
test(
42,
"SSLInfo/Enabled=true, scheme=http, profile=apigee",
`<TargetEndpoint name="default">
<HTTPTargetConnection>
<SSLInfo>
<Enabled>true</Enabled>
</SSLInfo>
<URL>http://insecure.foo.com/apis/{api_name}/maskconfigs</URL>
</HTTPTargetConnection>
</TargetEndpoint>`,
["SSLInfo configuration must not use the Enabled=true with insecure URL"],
);
test(
81,
"SSLInfo/Enabled=true, scheme=variable, profile=apigee",
`<TargetEndpoint name="default">
<HTTPTargetConnection>
<SSLInfo>
<Enabled>true</Enabled>
</SSLInfo>
<URL>{variable-goes-here}</URL>
</HTTPTargetConnection>
</TargetEndpoint>`,
null,
);
testApigeeX(
90,
"SSLInfo/Enforce = true, scheme=https, profile=apigeex",
`<TargetEndpoint name="default">
<HTTPTargetConnection>
<SSLInfo>
<Enabled>true</Enabled>
<Enforce>true</Enforce>
<TrustStore>truststore1</TrustStore>
</SSLInfo>
<URL>https://foo.com/apis/{api_name}/maskconfigs</URL>
</HTTPTargetConnection>
</TargetEndpoint>`,
null,
);
testApigeeX(
91,
"SSLInfo/Enforce=false, scheme=https, profile=apigeex",
`<TargetEndpoint name="default">
<HTTPTargetConnection>
<SSLInfo>
<Enabled>true</Enabled>
<TrustStore>truststore1</TrustStore>
</SSLInfo>
<URL>https://foo.com/apis/{api_name}/maskconfigs</URL>
</HTTPTargetConnection>
</TargetEndpoint>`,
["SSLInfo configuration should use Enforce=true on profile=apigeex"],
);
testApigeeX(
92,
"SSLInfo/Enforce=true, scheme=http, profile=apigeex",
`<TargetEndpoint name="default">
<HTTPTargetConnection>
<SSLInfo>
<Enforce>true</Enforce>
<TrustStore>truststore1</TrustStore>
</SSLInfo>
<URL>http://insecure.foo.com/apis/{api_name}/maskconfigs</URL>
</HTTPTargetConnection>
</TargetEndpoint>`,
["SSLInfo configuration must not use the Enforce=true with insecure URL"],
);
test(
93,
"SSLInfo/Enforce=true, scheme=https, profile=apigee",
`<TargetEndpoint name="default">
<HTTPTargetConnection>
<SSLInfo>
<Enabled>true</Enabled>
<Enforce>true</Enforce>
<TrustStore>truststore1</TrustStore>
</SSLInfo>
<URL>https://foo.com/apis/{api_name}/maskconfigs</URL>
</HTTPTargetConnection>
</TargetEndpoint>`,
[
"SSLInfo configuration must not use the Enforce element on profile=apigee",
],
);
});
describe(`${testID} - Print plugin results`, function () {
it("should create a report object with valid schema", function () {
debug("test configuration: " + JSON.stringify(configuration));
const bundle = new Bundle(configuration);
bl.executePlugin(testID, bundle);
const report = bundle.getReport();
assert.ok(report);
const formatter = bl.getFormatter("json.js");
assert.ok(formatter);
const schema = require("./../fixtures/reportSchema.js"),
Validator = require("jsonschema").Validator,
v = new Validator(),
jsonReport = JSON.parse(formatter(report)),
validationResult = v.validate(jsonReport, schema);
assert.equal(validationResult.errors.length, 0, validationResult.errors);
});
});