client_test.go 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193
  1. package ifttt
  2. import (
  3. "context"
  4. "io"
  5. "net/http"
  6. "net/http/httptest"
  7. "strings"
  8. "testing"
  9. "github.com/stretchr/testify/assert"
  10. "goa.design/clue/log"
  11. )
  12. const (
  13. baseURL = "https://maker.ifttt.com"
  14. presentEvent = "presence_detected"
  15. absentEvent = "absence_detected"
  16. )
  17. var (
  18. presentValues = Values{
  19. Value1: "presence_detected_value1",
  20. Value2: "presence_detected_value2",
  21. Value3: "presence_detected_value3",
  22. }
  23. absentValues = Values{
  24. Value1: "absence_detected_value1",
  25. Value2: "absence_detected_value2",
  26. Value3: "absence_detected_value3",
  27. }
  28. )
  29. func TestNewClient(t *testing.T) {
  30. t.Run("invalid base URL", func(t *testing.T) {
  31. _, err := NewClient(http.DefaultClient, "%", "key", presentEvent, absentEvent, presentValues, absentValues, false)
  32. assert.ErrorContains(t, err, `parse "%": invalid URL escape "%"`)
  33. })
  34. }
  35. func TestClient_Trigger(t *testing.T) {
  36. ctx := log.Context(context.Background(), log.WithDebug())
  37. cases := []struct {
  38. name, key, event, err string
  39. ctx context.Context
  40. present, noDebug bool
  41. values Values
  42. handler func(t *testing.T) http.HandlerFunc
  43. }{
  44. {
  45. name: "present",
  46. key: "key",
  47. ctx: ctx,
  48. present: true,
  49. values: presentValues,
  50. handler: func(t *testing.T) http.HandlerFunc {
  51. return func(w http.ResponseWriter, r *http.Request) {
  52. assert := assert.New(t)
  53. assert.Equal(http.MethodPost, r.Method)
  54. assert.Equal("/trigger/"+presentEvent+"/with/key/key", r.URL.Path)
  55. body, err := io.ReadAll(r.Body)
  56. assert.NoError(err)
  57. assert.JSONEq(`{
  58. "value1": "presence_detected_value1",
  59. "value2": "presence_detected_value2",
  60. "value3": "presence_detected_value3"
  61. }`, string(body))
  62. }
  63. },
  64. event: presentEvent,
  65. },
  66. {
  67. name: "absent",
  68. key: "key",
  69. ctx: ctx,
  70. present: false,
  71. values: absentValues,
  72. handler: func(t *testing.T) http.HandlerFunc {
  73. return func(w http.ResponseWriter, r *http.Request) {
  74. assert := assert.New(t)
  75. assert.Equal(http.MethodPost, r.Method)
  76. assert.Equal("/trigger/"+absentEvent+"/with/key/key", r.URL.Path)
  77. body, err := io.ReadAll(r.Body)
  78. assert.NoError(err)
  79. assert.JSONEq(`{
  80. "value1": "absence_detected_value1",
  81. "value2": "absence_detected_value2",
  82. "value3": "absence_detected_value3"
  83. }`, string(body))
  84. }
  85. },
  86. event: absentEvent,
  87. },
  88. {
  89. name: "nil context",
  90. ctx: nil,
  91. key: "key",
  92. handler: func(t *testing.T) http.HandlerFunc {
  93. return func(w http.ResponseWriter, r *http.Request) {}
  94. },
  95. err: "net/http: nil Context",
  96. },
  97. {
  98. name: "closed connection",
  99. ctx: ctx,
  100. key: "key",
  101. handler: func(t *testing.T) http.HandlerFunc {
  102. return func(w http.ResponseWriter, r *http.Request) {
  103. assert := assert.New(t)
  104. hj, ok := w.(http.Hijacker)
  105. if !assert.Equal(true, ok) {
  106. assert.FailNow("server doesn't support hijacking")
  107. }
  108. conn, _, err := hj.Hijack()
  109. if !assert.NoError(err) {
  110. assert.FailNow("error hijacking")
  111. }
  112. assert.NoError(conn.Close())
  113. }
  114. },
  115. err: `Post "` + baseURL + `/trigger/` + absentEvent + `/with/key/key": EOF`,
  116. },
  117. {
  118. name: "unauthorized",
  119. ctx: ctx,
  120. key: "key",
  121. handler: func(t *testing.T) http.HandlerFunc {
  122. return func(w http.ResponseWriter, r *http.Request) {
  123. w.WriteHeader(http.StatusUnauthorized)
  124. _, _ = w.Write([]byte(`{"errors":[{"message":"You sent an invalid key."}]}`))
  125. }
  126. },
  127. err: `401 Unauthorized: {"errors":[{"message":"You sent an invalid key."}]}`,
  128. },
  129. {
  130. name: "empty body",
  131. ctx: ctx,
  132. key: "key",
  133. handler: func(t *testing.T) http.HandlerFunc {
  134. return func(w http.ResponseWriter, r *http.Request) {
  135. w.WriteHeader(http.StatusInternalServerError)
  136. }
  137. },
  138. err: "500 Internal Server Error: <empty body>",
  139. },
  140. {
  141. name: "failed to read body",
  142. ctx: ctx,
  143. key: "key",
  144. noDebug: true, // goahttp.DebugDoer interferes with this test
  145. handler: func(t *testing.T) http.HandlerFunc {
  146. return func(w http.ResponseWriter, r *http.Request) {
  147. w.Header().Set("Content-Length", "1")
  148. w.WriteHeader(http.StatusBadGateway)
  149. }
  150. },
  151. err: "502 Bad Gateway: <failed to read body: unexpected EOF>",
  152. },
  153. }
  154. for _, tc := range cases {
  155. tc := tc
  156. t.Run(tc.name, func(t *testing.T) {
  157. t.Parallel()
  158. assert := assert.New(t)
  159. ts := httptest.NewTLSServer(tc.handler(t))
  160. defer ts.Close()
  161. c, err := NewClient(ts.Client(), ts.URL, tc.key, presentEvent, absentEvent, presentValues, absentValues, !tc.noDebug)
  162. assert.NoError(err)
  163. event, values, err := c.Trigger(tc.ctx, tc.present)
  164. if tc.err != "" {
  165. tc.err = strings.ReplaceAll(tc.err, baseURL, ts.URL)
  166. assert.EqualError(err, tc.err)
  167. } else if assert.NoError(err) {
  168. assert.Equal(tc.event, event)
  169. assert.Equal(&tc.values, values)
  170. }
  171. })
  172. }
  173. }