apigeelint
Version:
Node module and tool to lint a bundle for an Apigee API Proxy or sharedflow.
233 lines (214 loc) • 6.9 kB
JavaScript
/*
Copyright 2019-2025 Google LLC
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
https://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
/* global describe, it, configuration */
const assert = require("node:assert"),
testID = "TD006",
util = require("node:util"),
debug = require("debug")("apigeelint:" + testID),
Bundle = require("../../lib/package/Bundle.js"),
bl = require("../../lib/package/bundleLinter.js"),
Endpoint = require("../../lib/package/Endpoint.js"),
plugin = require(bl.resolvePlugin(testID)),
Dom = require("@xmldom/xmldom").DOMParser,
testBase = function (caseNum, profile, desc, targetDef, messages) {
it(`case ${caseNum} ${desc} [profile=${profile}]`, function () {
const tDoc = new Dom().parseFromString(targetDef),
target = new Endpoint(tDoc.documentElement, this, "");
plugin.onTargetEndpoint(target, function (e, result) {
assert.equal(e, undefined, e ? " error " : " no error");
debug(`result: ${result}`);
if (messages && messages.length) {
debug(`messages: ${util.format(messages)}`);
assert.equal(result, true);
assert.equal(
target.report.messages.length,
messages.length,
util.format(target.report.messages),
);
messages.forEach((msg, ix) => {
debug(`check msg ${ix}: ${msg}`);
assert.ok(
target.report.messages.find((m) => m.message == msg),
`index ${ix} ${util.format(target.report.messages)}`,
);
});
} else {
assert.equal(result, false, util.format(target.report.messages));
assert.equal(
target.report.messages.length,
0,
util.format(target.report.messages),
);
}
});
});
};
const test = function (caseNum, desc, targetDef, messages) {
["apigee", "apigeex"].forEach((profile) =>
testBase(caseNum, profile, desc, targetDef, messages),
);
};
describe(`${testID} - ${plugin.plugin.name}`, function () {
test(
10,
"missing SSLInfo",
`<TargetEndpoint name="default">
<HTTPTargetConnection>
<URL>https://foo.com/apis/{api_name}/maskconfigs</URL>
</HTTPTargetConnection>
</TargetEndpoint>`,
[],
);
test(
20,
"empty SSLInfo with https url",
`<TargetEndpoint name="default">
<HTTPTargetConnection>
<SSLInfo/>
<URL>https://foo.com/apis/{api_name}/maskconfigs</URL>
</HTTPTargetConnection>
</TargetEndpoint>`,
[],
);
test(
23,
"no SSLInfo, using http url",
`<TargetEndpoint name="default">
<HTTPTargetConnection>
<URL>http://foo.com/apis/{api_name}/maskconfigs</URL>
</HTTPTargetConnection>
</TargetEndpoint>`,
null /* http URL does not require SSLInfo */,
);
test(
30,
"SSLInfo Enabled = false, no truststore",
`<TargetEndpoint name="default">
<HTTPTargetConnection>
<SSLInfo>
<Enabled>false</Enabled>
</SSLInfo>
<URL>https://foo.com/apis/{api_name}/maskconfigs</URL>
</HTTPTargetConnection>
</TargetEndpoint>`,
[],
);
test(
40,
"SSLInfo Enabled = true, no truststore",
`<TargetEndpoint name="default">
<HTTPTargetConnection>
<SSLInfo>
<Enabled>true</Enabled>
</SSLInfo>
<URL>https://foo.com/apis/{api_name}/maskconfigs</URL>
</HTTPTargetConnection>
</TargetEndpoint>`,
[],
);
test(
41,
"SSLInfo Enabled = true, with TrustStore",
`<TargetEndpoint name="default">
<HTTPTargetConnection>
<SSLInfo>
<Enabled>true</Enabled>
<TrustStore>truststore1</TrustStore>
</SSLInfo>
<URL>https://foo.com/apis/{api_name}/maskconfigs</URL>
</HTTPTargetConnection>
</TargetEndpoint>`,
null,
);
test(
42,
"SSLInfo Enabled = true, ignoreerrors = false",
`<TargetEndpoint name="default">
<HTTPTargetConnection>
<SSLInfo>
<Enabled>true</Enabled>
<IgnoreValidationErrors>false</IgnoreValidationErrors>
<TrustStore>truststore1</TrustStore>
</SSLInfo>
<URL>https://foo.com/apis/{api_name}/maskconfigs</URL>
</HTTPTargetConnection>
</TargetEndpoint>`,
null,
);
test(
43,
"SSLInfo Enabled = true, with LoadBalancer",
`<TargetEndpoint name="default">
<HTTPTargetConnection>
<SSLInfo>
<Enabled>true</Enabled>
<IgnoreValidationErrors>false</IgnoreValidationErrors>
<TrustStore>truststore1</TrustStore>
</SSLInfo>
<LoadBalancer>
<Server name="server1"/>
<Server name="server2"/>
</LoadBalancer>
</HTTPTargetConnection>
</TargetEndpoint>`,
[
"When using a LoadBalancer, configure SSLInfo in the TargetServer, even if SSLInfo is also present under HTTPTargetConnection",
],
);
test(
50,
"SSLInfo IgnoreValidationErrors = true",
`<TargetEndpoint name="default">
<HTTPTargetConnection>
<SSLInfo>
<Enabled>true</Enabled>
<IgnoreValidationErrors>true</IgnoreValidationErrors>
</SSLInfo>
<URL>https://foo.com/apis/{api_name}/maskconfigs</URL>
</HTTPTargetConnection>
</TargetEndpoint>`,
[],
);
test(
60,
"SSLInfo IgnoreValidationErrors = true and Enabled = false",
`<TargetEndpoint name="default">
<HTTPTargetConnection>
<SSLInfo>
<Enabled>false</Enabled>
<IgnoreValidationErrors>true</IgnoreValidationErrors>
<TrustStore>truststore1</TrustStore>
</SSLInfo>
<URL>https://foo.com/apis/{api_name}/maskconfigs</URL>
</HTTPTargetConnection>
</TargetEndpoint>`,
[],
);
});
describe(`${testID} - Print plugin results`, function () {
it("should create a report object with valid schema", function () {
debug("test configuration: " + JSON.stringify(configuration));
const bundle = new Bundle(configuration);
bl.executePlugin(testID, bundle);
const report = bundle.getReport();
assert.ok(report);
const formatter = bl.getFormatter("json.js");
assert.ok(formatter);
const schema = require("./../fixtures/reportSchema.js"),
Validator = require("jsonschema").Validator,
v = new Validator(),
jsonReport = JSON.parse(formatter(report)),
validationResult = v.validate(jsonReport, schema);
assert.equal(validationResult.errors.length, 0, validationResult.errors);
});
});