spikard 0.2.5 → 0.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (92) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +34 -1
  3. data/ext/spikard_rb/Cargo.toml +3 -3
  4. data/lib/spikard/app.rb +61 -49
  5. data/lib/spikard/converters.rb +3 -75
  6. data/lib/spikard/handler_wrapper.rb +6 -9
  7. data/lib/spikard/provide.rb +14 -28
  8. data/lib/spikard/response.rb +75 -11
  9. data/lib/spikard/streaming_response.rb +24 -1
  10. data/lib/spikard/testing.rb +1 -1
  11. data/lib/spikard/version.rb +1 -1
  12. data/sig/spikard.rbs +14 -3
  13. data/vendor/bundle/ruby/3.3.0/gems/rake-compiler-dock-1.10.0/build/buildkitd.toml +2 -0
  14. metadata +3 -80
  15. data/vendor/crates/spikard-core/Cargo.toml +0 -40
  16. data/vendor/crates/spikard-core/src/bindings/mod.rs +0 -3
  17. data/vendor/crates/spikard-core/src/bindings/response.rs +0 -133
  18. data/vendor/crates/spikard-core/src/debug.rs +0 -63
  19. data/vendor/crates/spikard-core/src/di/container.rs +0 -726
  20. data/vendor/crates/spikard-core/src/di/dependency.rs +0 -273
  21. data/vendor/crates/spikard-core/src/di/error.rs +0 -118
  22. data/vendor/crates/spikard-core/src/di/factory.rs +0 -538
  23. data/vendor/crates/spikard-core/src/di/graph.rs +0 -545
  24. data/vendor/crates/spikard-core/src/di/mod.rs +0 -192
  25. data/vendor/crates/spikard-core/src/di/resolved.rs +0 -411
  26. data/vendor/crates/spikard-core/src/di/value.rs +0 -283
  27. data/vendor/crates/spikard-core/src/http.rs +0 -153
  28. data/vendor/crates/spikard-core/src/lib.rs +0 -28
  29. data/vendor/crates/spikard-core/src/lifecycle.rs +0 -422
  30. data/vendor/crates/spikard-core/src/parameters.rs +0 -719
  31. data/vendor/crates/spikard-core/src/problem.rs +0 -310
  32. data/vendor/crates/spikard-core/src/request_data.rs +0 -189
  33. data/vendor/crates/spikard-core/src/router.rs +0 -249
  34. data/vendor/crates/spikard-core/src/schema_registry.rs +0 -183
  35. data/vendor/crates/spikard-core/src/type_hints.rs +0 -304
  36. data/vendor/crates/spikard-core/src/validation.rs +0 -699
  37. data/vendor/crates/spikard-http/Cargo.toml +0 -58
  38. data/vendor/crates/spikard-http/src/auth.rs +0 -247
  39. data/vendor/crates/spikard-http/src/background.rs +0 -249
  40. data/vendor/crates/spikard-http/src/bindings/mod.rs +0 -3
  41. data/vendor/crates/spikard-http/src/bindings/response.rs +0 -1
  42. data/vendor/crates/spikard-http/src/body_metadata.rs +0 -8
  43. data/vendor/crates/spikard-http/src/cors.rs +0 -490
  44. data/vendor/crates/spikard-http/src/debug.rs +0 -63
  45. data/vendor/crates/spikard-http/src/di_handler.rs +0 -423
  46. data/vendor/crates/spikard-http/src/handler_response.rs +0 -190
  47. data/vendor/crates/spikard-http/src/handler_trait.rs +0 -228
  48. data/vendor/crates/spikard-http/src/handler_trait_tests.rs +0 -284
  49. data/vendor/crates/spikard-http/src/lib.rs +0 -529
  50. data/vendor/crates/spikard-http/src/lifecycle/adapter.rs +0 -149
  51. data/vendor/crates/spikard-http/src/lifecycle.rs +0 -428
  52. data/vendor/crates/spikard-http/src/middleware/mod.rs +0 -285
  53. data/vendor/crates/spikard-http/src/middleware/multipart.rs +0 -86
  54. data/vendor/crates/spikard-http/src/middleware/urlencoded.rs +0 -147
  55. data/vendor/crates/spikard-http/src/middleware/validation.rs +0 -287
  56. data/vendor/crates/spikard-http/src/openapi/mod.rs +0 -309
  57. data/vendor/crates/spikard-http/src/openapi/parameter_extraction.rs +0 -190
  58. data/vendor/crates/spikard-http/src/openapi/schema_conversion.rs +0 -308
  59. data/vendor/crates/spikard-http/src/openapi/spec_generation.rs +0 -195
  60. data/vendor/crates/spikard-http/src/parameters.rs +0 -1
  61. data/vendor/crates/spikard-http/src/problem.rs +0 -1
  62. data/vendor/crates/spikard-http/src/query_parser.rs +0 -369
  63. data/vendor/crates/spikard-http/src/response.rs +0 -399
  64. data/vendor/crates/spikard-http/src/router.rs +0 -1
  65. data/vendor/crates/spikard-http/src/schema_registry.rs +0 -1
  66. data/vendor/crates/spikard-http/src/server/handler.rs +0 -80
  67. data/vendor/crates/spikard-http/src/server/lifecycle_execution.rs +0 -98
  68. data/vendor/crates/spikard-http/src/server/mod.rs +0 -805
  69. data/vendor/crates/spikard-http/src/server/request_extraction.rs +0 -119
  70. data/vendor/crates/spikard-http/src/sse.rs +0 -447
  71. data/vendor/crates/spikard-http/src/testing/form.rs +0 -14
  72. data/vendor/crates/spikard-http/src/testing/multipart.rs +0 -60
  73. data/vendor/crates/spikard-http/src/testing/test_client.rs +0 -285
  74. data/vendor/crates/spikard-http/src/testing.rs +0 -377
  75. data/vendor/crates/spikard-http/src/type_hints.rs +0 -1
  76. data/vendor/crates/spikard-http/src/validation.rs +0 -1
  77. data/vendor/crates/spikard-http/src/websocket.rs +0 -324
  78. data/vendor/crates/spikard-rb/Cargo.toml +0 -42
  79. data/vendor/crates/spikard-rb/build.rs +0 -8
  80. data/vendor/crates/spikard-rb/src/background.rs +0 -63
  81. data/vendor/crates/spikard-rb/src/config.rs +0 -294
  82. data/vendor/crates/spikard-rb/src/conversion.rs +0 -392
  83. data/vendor/crates/spikard-rb/src/di.rs +0 -409
  84. data/vendor/crates/spikard-rb/src/handler.rs +0 -534
  85. data/vendor/crates/spikard-rb/src/lib.rs +0 -2020
  86. data/vendor/crates/spikard-rb/src/lifecycle.rs +0 -267
  87. data/vendor/crates/spikard-rb/src/server.rs +0 -283
  88. data/vendor/crates/spikard-rb/src/sse.rs +0 -231
  89. data/vendor/crates/spikard-rb/src/test_client.rs +0 -404
  90. data/vendor/crates/spikard-rb/src/test_sse.rs +0 -143
  91. data/vendor/crates/spikard-rb/src/test_websocket.rs +0 -221
  92. data/vendor/crates/spikard-rb/src/websocket.rs +0 -233
@@ -1,287 +0,0 @@
1
- //! JSON schema validation middleware
2
-
3
- use crate::problem::{CONTENT_TYPE_PROBLEM_JSON, ProblemDetails};
4
- use axum::http::{HeaderMap, StatusCode};
5
- use axum::response::{IntoResponse, Response};
6
- use serde_json::json;
7
-
8
- /// Check if a media type is JSON or has a +json suffix
9
- pub fn is_json_content_type(mime: &mime::Mime) -> bool {
10
- (mime.type_() == mime::APPLICATION && mime.subtype() == mime::JSON) || mime.suffix() == Some(mime::JSON)
11
- }
12
-
13
- /// Validate that Content-Type is JSON-compatible when route expects JSON
14
- #[allow(clippy::result_large_err)]
15
- pub fn validate_json_content_type(headers: &HeaderMap) -> Result<(), Response> {
16
- if let Some(content_type_header) = headers.get(axum::http::header::CONTENT_TYPE)
17
- && let Ok(content_type_str) = content_type_header.to_str()
18
- && let Ok(parsed_mime) = content_type_str.parse::<mime::Mime>()
19
- {
20
- let is_json = (parsed_mime.type_() == mime::APPLICATION && parsed_mime.subtype() == mime::JSON)
21
- || parsed_mime.suffix() == Some(mime::JSON);
22
-
23
- let is_form = (parsed_mime.type_() == mime::APPLICATION && parsed_mime.subtype() == "x-www-form-urlencoded")
24
- || (parsed_mime.type_() == mime::MULTIPART && parsed_mime.subtype() == "form-data");
25
-
26
- if !is_json && !is_form {
27
- let problem = ProblemDetails::new(
28
- "https://spikard.dev/errors/unsupported-media-type",
29
- "Unsupported Media Type",
30
- StatusCode::UNSUPPORTED_MEDIA_TYPE,
31
- )
32
- .with_detail("Unsupported media type");
33
-
34
- let body = problem.to_json().unwrap_or_else(|_| "{}".to_string());
35
- return Err((
36
- StatusCode::UNSUPPORTED_MEDIA_TYPE,
37
- [(axum::http::header::CONTENT_TYPE, CONTENT_TYPE_PROBLEM_JSON)],
38
- body,
39
- )
40
- .into_response());
41
- }
42
- }
43
- Ok(())
44
- }
45
-
46
- /// Validate Content-Length header matches actual body size
47
- #[allow(clippy::result_large_err, clippy::collapsible_if)]
48
- pub fn validate_content_length(headers: &HeaderMap, actual_size: usize) -> Result<(), Response> {
49
- if let Some(content_length_header) = headers.get(axum::http::header::CONTENT_LENGTH) {
50
- if let Ok(content_length_str) = content_length_header.to_str() {
51
- if let Ok(declared_length) = content_length_str.parse::<usize>() {
52
- if declared_length != actual_size {
53
- let problem = ProblemDetails::bad_request(format!(
54
- "Content-Length header ({}) does not match actual body size ({})",
55
- declared_length, actual_size
56
- ));
57
-
58
- let body = problem.to_json().unwrap_or_else(|_| "{}".to_string());
59
- return Err((
60
- StatusCode::BAD_REQUEST,
61
- [(axum::http::header::CONTENT_TYPE, CONTENT_TYPE_PROBLEM_JSON)],
62
- body,
63
- )
64
- .into_response());
65
- }
66
- }
67
- }
68
- }
69
- Ok(())
70
- }
71
-
72
- /// Validate Content-Type header and related requirements
73
- #[allow(clippy::result_large_err)]
74
- pub fn validate_content_type_headers(headers: &HeaderMap, _declared_body_size: usize) -> Result<(), Response> {
75
- if let Some(content_type_str) = headers
76
- .get(axum::http::header::CONTENT_TYPE)
77
- .and_then(|h| h.to_str().ok())
78
- {
79
- let parsed_mime = match content_type_str.parse::<mime::Mime>() {
80
- Ok(m) => m,
81
- Err(_) => {
82
- let error_body = json!({
83
- "error": format!("Invalid Content-Type header: {}", content_type_str)
84
- });
85
- return Err((StatusCode::BAD_REQUEST, axum::Json(error_body)).into_response());
86
- }
87
- };
88
-
89
- let is_json = is_json_content_type(&parsed_mime);
90
- let is_multipart = parsed_mime.type_() == mime::MULTIPART && parsed_mime.subtype() == "form-data";
91
-
92
- if is_multipart && parsed_mime.get_param(mime::BOUNDARY).is_none() {
93
- let error_body = json!({
94
- "error": "multipart/form-data requires 'boundary' parameter"
95
- });
96
- return Err((StatusCode::BAD_REQUEST, axum::Json(error_body)).into_response());
97
- }
98
-
99
- #[allow(clippy::collapsible_if)]
100
- if is_json {
101
- if let Some(charset) = parsed_mime.get_param(mime::CHARSET).map(|c| c.as_str()) {
102
- if !charset.eq_ignore_ascii_case("utf-8") && !charset.eq_ignore_ascii_case("utf8") {
103
- let problem = ProblemDetails::new(
104
- "https://spikard.dev/errors/unsupported-charset",
105
- "Unsupported Charset",
106
- StatusCode::UNSUPPORTED_MEDIA_TYPE,
107
- )
108
- .with_detail(format!(
109
- "Unsupported charset '{}' for JSON. Only UTF-8 is supported.",
110
- charset
111
- ));
112
-
113
- let body = problem.to_json().unwrap_or_else(|_| "{}".to_string());
114
- return Err((
115
- StatusCode::UNSUPPORTED_MEDIA_TYPE,
116
- [(axum::http::header::CONTENT_TYPE, CONTENT_TYPE_PROBLEM_JSON)],
117
- body,
118
- )
119
- .into_response());
120
- }
121
- }
122
- }
123
- }
124
-
125
- Ok(())
126
- }
127
-
128
- #[cfg(test)]
129
- mod tests {
130
- use super::*;
131
- use axum::http::HeaderValue;
132
-
133
- #[test]
134
- fn validate_content_length_accepts_matching_sizes() {
135
- let mut headers = HeaderMap::new();
136
- headers.insert(axum::http::header::CONTENT_LENGTH, HeaderValue::from_static("5"));
137
-
138
- assert!(validate_content_length(&headers, 5).is_ok());
139
- }
140
-
141
- #[test]
142
- fn validate_content_length_rejects_mismatched_sizes() {
143
- let mut headers = HeaderMap::new();
144
- headers.insert(axum::http::header::CONTENT_LENGTH, HeaderValue::from_static("10"));
145
-
146
- let err = validate_content_length(&headers, 4).expect_err("expected mismatch");
147
- assert_eq!(err.status(), StatusCode::BAD_REQUEST);
148
- assert_eq!(
149
- err.headers()
150
- .get(axum::http::header::CONTENT_TYPE)
151
- .and_then(|value| value.to_str().ok()),
152
- Some(CONTENT_TYPE_PROBLEM_JSON)
153
- );
154
- }
155
-
156
- #[test]
157
- fn test_multipart_without_boundary() {
158
- let mut headers = HeaderMap::new();
159
- headers.insert(
160
- axum::http::header::CONTENT_TYPE,
161
- HeaderValue::from_static("multipart/form-data"),
162
- );
163
-
164
- let result = validate_content_type_headers(&headers, 0);
165
- assert!(result.is_err());
166
- }
167
-
168
- #[test]
169
- fn test_multipart_with_boundary() {
170
- let mut headers = HeaderMap::new();
171
- headers.insert(
172
- axum::http::header::CONTENT_TYPE,
173
- HeaderValue::from_static("multipart/form-data; boundary=----WebKitFormBoundary"),
174
- );
175
-
176
- let result = validate_content_type_headers(&headers, 0);
177
- assert!(result.is_ok());
178
- }
179
-
180
- #[test]
181
- fn test_json_with_utf16_charset() {
182
- let mut headers = HeaderMap::new();
183
- headers.insert(
184
- axum::http::header::CONTENT_TYPE,
185
- HeaderValue::from_static("application/json; charset=utf-16"),
186
- );
187
-
188
- let result = validate_content_type_headers(&headers, 0);
189
- assert!(result.is_err());
190
- }
191
-
192
- #[test]
193
- fn test_json_with_utf8_charset() {
194
- let mut headers = HeaderMap::new();
195
- headers.insert(
196
- axum::http::header::CONTENT_TYPE,
197
- HeaderValue::from_static("application/json; charset=utf-8"),
198
- );
199
-
200
- let result = validate_content_type_headers(&headers, 0);
201
- assert!(result.is_ok());
202
- }
203
-
204
- #[test]
205
- fn test_json_without_charset() {
206
- let mut headers = HeaderMap::new();
207
- headers.insert(
208
- axum::http::header::CONTENT_TYPE,
209
- HeaderValue::from_static("application/json"),
210
- );
211
-
212
- let result = validate_content_type_headers(&headers, 0);
213
- assert!(result.is_ok());
214
- }
215
-
216
- #[test]
217
- fn test_vendor_json_accepted() {
218
- let mut headers = HeaderMap::new();
219
- headers.insert(
220
- axum::http::header::CONTENT_TYPE,
221
- HeaderValue::from_static("application/vnd.api+json"),
222
- );
223
-
224
- let result = validate_content_type_headers(&headers, 0);
225
- assert!(result.is_ok());
226
- }
227
-
228
- #[test]
229
- fn test_problem_json_accepted() {
230
- let mut headers = HeaderMap::new();
231
- headers.insert(
232
- axum::http::header::CONTENT_TYPE,
233
- HeaderValue::from_static("application/problem+json"),
234
- );
235
-
236
- let result = validate_content_type_headers(&headers, 0);
237
- assert!(result.is_ok());
238
- }
239
-
240
- #[test]
241
- fn test_vendor_json_with_utf16_charset_rejected() {
242
- let mut headers = HeaderMap::new();
243
- headers.insert(
244
- axum::http::header::CONTENT_TYPE,
245
- HeaderValue::from_static("application/vnd.api+json; charset=utf-16"),
246
- );
247
-
248
- let result = validate_content_type_headers(&headers, 0);
249
- assert!(result.is_err());
250
- }
251
-
252
- #[test]
253
- fn test_vendor_json_with_utf8_charset_accepted() {
254
- let mut headers = HeaderMap::new();
255
- headers.insert(
256
- axum::http::header::CONTENT_TYPE,
257
- HeaderValue::from_static("application/vnd.api+json; charset=utf-8"),
258
- );
259
-
260
- let result = validate_content_type_headers(&headers, 0);
261
- assert!(result.is_ok());
262
- }
263
-
264
- #[test]
265
- fn test_is_json_content_type() {
266
- let mime = "application/json".parse::<mime::Mime>().unwrap();
267
- assert!(is_json_content_type(&mime));
268
-
269
- let mime = "application/vnd.api+json".parse::<mime::Mime>().unwrap();
270
- assert!(is_json_content_type(&mime));
271
-
272
- let mime = "application/problem+json".parse::<mime::Mime>().unwrap();
273
- assert!(is_json_content_type(&mime));
274
-
275
- let mime = "application/hal+json".parse::<mime::Mime>().unwrap();
276
- assert!(is_json_content_type(&mime));
277
-
278
- let mime = "text/plain".parse::<mime::Mime>().unwrap();
279
- assert!(!is_json_content_type(&mime));
280
-
281
- let mime = "application/xml".parse::<mime::Mime>().unwrap();
282
- assert!(!is_json_content_type(&mime));
283
-
284
- let mime = "application/x-www-form-urlencoded".parse::<mime::Mime>().unwrap();
285
- assert!(!is_json_content_type(&mime));
286
- }
287
- }
@@ -1,309 +0,0 @@
1
- //! OpenAPI 3.1.0 specification generation
2
- //!
3
- //! Generates OpenAPI specs from route definitions using existing JSON Schema infrastructure.
4
- //! OpenAPI 3.1.0 is fully compatible with JSON Schema Draft 2020-12.
5
-
6
- pub mod parameter_extraction;
7
- pub mod schema_conversion;
8
- pub mod spec_generation;
9
-
10
- use crate::SchemaRegistry;
11
- use serde::{Deserialize, Serialize};
12
- use std::collections::HashMap;
13
- use utoipa::openapi::security::SecurityScheme;
14
-
15
- /// OpenAPI configuration
16
- #[derive(Debug, Clone, Serialize, Deserialize)]
17
- pub struct OpenApiConfig {
18
- /// Enable OpenAPI generation (default: false for zero overhead)
19
- pub enabled: bool,
20
-
21
- /// API title
22
- pub title: String,
23
-
24
- /// API version
25
- pub version: String,
26
-
27
- /// API description (supports markdown)
28
- #[serde(default)]
29
- pub description: Option<String>,
30
-
31
- /// Path to serve Swagger UI (default: "/docs")
32
- #[serde(default = "default_swagger_path")]
33
- pub swagger_ui_path: String,
34
-
35
- /// Path to serve Redoc (default: "/redoc")
36
- #[serde(default = "default_redoc_path")]
37
- pub redoc_path: String,
38
-
39
- /// Path to serve OpenAPI JSON spec (default: "/openapi.json")
40
- #[serde(default = "default_openapi_json_path")]
41
- pub openapi_json_path: String,
42
-
43
- /// Contact information
44
- #[serde(default)]
45
- pub contact: Option<ContactInfo>,
46
-
47
- /// License information
48
- #[serde(default)]
49
- pub license: Option<LicenseInfo>,
50
-
51
- /// Server definitions
52
- #[serde(default)]
53
- pub servers: Vec<ServerInfo>,
54
-
55
- /// Security schemes (auto-detected from middleware if not provided)
56
- #[serde(default)]
57
- pub security_schemes: HashMap<String, SecuritySchemeInfo>,
58
- }
59
-
60
- impl Default for OpenApiConfig {
61
- fn default() -> Self {
62
- Self {
63
- enabled: false,
64
- title: "API".to_string(),
65
- version: "1.0.0".to_string(),
66
- description: None,
67
- swagger_ui_path: default_swagger_path(),
68
- redoc_path: default_redoc_path(),
69
- openapi_json_path: default_openapi_json_path(),
70
- contact: None,
71
- license: None,
72
- servers: Vec::new(),
73
- security_schemes: HashMap::new(),
74
- }
75
- }
76
- }
77
-
78
- fn default_swagger_path() -> String {
79
- "/docs".to_string()
80
- }
81
-
82
- fn default_redoc_path() -> String {
83
- "/redoc".to_string()
84
- }
85
-
86
- fn default_openapi_json_path() -> String {
87
- "/openapi.json".to_string()
88
- }
89
-
90
- /// Contact information
91
- #[derive(Debug, Clone, Serialize, Deserialize)]
92
- pub struct ContactInfo {
93
- pub name: Option<String>,
94
- pub email: Option<String>,
95
- pub url: Option<String>,
96
- }
97
-
98
- /// License information
99
- #[derive(Debug, Clone, Serialize, Deserialize)]
100
- pub struct LicenseInfo {
101
- pub name: String,
102
- pub url: Option<String>,
103
- }
104
-
105
- /// Server information
106
- #[derive(Debug, Clone, Serialize, Deserialize)]
107
- pub struct ServerInfo {
108
- pub url: String,
109
- pub description: Option<String>,
110
- }
111
-
112
- /// Security scheme types
113
- #[derive(Debug, Clone, Serialize, Deserialize)]
114
- #[serde(tag = "type", rename_all = "lowercase")]
115
- pub enum SecuritySchemeInfo {
116
- #[serde(rename = "http")]
117
- Http {
118
- scheme: String,
119
- #[serde(rename = "bearerFormat")]
120
- bearer_format: Option<String>,
121
- },
122
- #[serde(rename = "apiKey")]
123
- ApiKey {
124
- #[serde(rename = "in")]
125
- location: String,
126
- name: String,
127
- },
128
- }
129
-
130
- /// Convert SecuritySchemeInfo to OpenAPI SecurityScheme
131
- pub fn security_scheme_info_to_openapi(info: &SecuritySchemeInfo) -> SecurityScheme {
132
- match info {
133
- SecuritySchemeInfo::Http { scheme, bearer_format } => {
134
- let mut http_scheme = SecurityScheme::Http(utoipa::openapi::security::Http::new(
135
- utoipa::openapi::security::HttpAuthScheme::Bearer,
136
- ));
137
- if let (SecurityScheme::Http(http), "bearer") = (&mut http_scheme, scheme.as_str()) {
138
- http.scheme = utoipa::openapi::security::HttpAuthScheme::Bearer;
139
- if let Some(format) = bearer_format {
140
- http.bearer_format = Some(format.clone());
141
- }
142
- }
143
- http_scheme
144
- }
145
- SecuritySchemeInfo::ApiKey { location, name } => {
146
- use utoipa::openapi::security::ApiKey;
147
-
148
- let api_key = match location.as_str() {
149
- "header" => ApiKey::Header(utoipa::openapi::security::ApiKeyValue::new(name)),
150
- "query" => ApiKey::Query(utoipa::openapi::security::ApiKeyValue::new(name)),
151
- "cookie" => ApiKey::Cookie(utoipa::openapi::security::ApiKeyValue::new(name)),
152
- _ => ApiKey::Header(utoipa::openapi::security::ApiKeyValue::new(name)),
153
- };
154
- SecurityScheme::ApiKey(api_key)
155
- }
156
- }
157
- }
158
-
159
- /// Generate OpenAPI specification from routes with auto-detection of security schemes
160
- pub fn generate_openapi_spec(
161
- routes: &[crate::RouteMetadata],
162
- config: &OpenApiConfig,
163
- _schema_registry: &SchemaRegistry,
164
- server_config: Option<&crate::ServerConfig>,
165
- ) -> Result<utoipa::openapi::OpenApi, String> {
166
- spec_generation::assemble_openapi_spec(routes, config, server_config)
167
- }
168
-
169
- #[cfg(test)]
170
- mod tests {
171
- use super::*;
172
-
173
- #[test]
174
- fn test_openapi_config_default() {
175
- let config = OpenApiConfig::default();
176
- assert!(!config.enabled);
177
- assert_eq!(config.title, "API");
178
- assert_eq!(config.version, "1.0.0");
179
- assert_eq!(config.swagger_ui_path, "/docs");
180
- assert_eq!(config.redoc_path, "/redoc");
181
- assert_eq!(config.openapi_json_path, "/openapi.json");
182
- }
183
-
184
- #[test]
185
- fn test_generate_minimal_spec() {
186
- let config = OpenApiConfig {
187
- enabled: true,
188
- title: "Test API".to_string(),
189
- version: "1.0.0".to_string(),
190
- ..Default::default()
191
- };
192
-
193
- let routes = vec![];
194
- let registry = SchemaRegistry::new();
195
-
196
- let spec = generate_openapi_spec(&routes, &config, &registry, None).unwrap();
197
- assert_eq!(spec.info.title, "Test API");
198
- assert_eq!(spec.info.version, "1.0.0");
199
- }
200
-
201
- #[test]
202
- fn test_generate_spec_with_contact() {
203
- let config = OpenApiConfig {
204
- enabled: true,
205
- title: "Test API".to_string(),
206
- version: "1.0.0".to_string(),
207
- contact: Some(ContactInfo {
208
- name: Some("API Team".to_string()),
209
- email: Some("api@example.com".to_string()),
210
- url: Some("https://example.com".to_string()),
211
- }),
212
- ..Default::default()
213
- };
214
-
215
- let routes = vec![];
216
- let registry = SchemaRegistry::new();
217
-
218
- let spec = generate_openapi_spec(&routes, &config, &registry, None).unwrap();
219
- assert!(spec.info.contact.is_some());
220
- let contact = spec.info.contact.unwrap();
221
- assert_eq!(contact.name, Some("API Team".to_string()));
222
- assert_eq!(contact.email, Some("api@example.com".to_string()));
223
- }
224
-
225
- #[test]
226
- fn test_generate_spec_with_license() {
227
- let config = OpenApiConfig {
228
- enabled: true,
229
- title: "Test API".to_string(),
230
- version: "1.0.0".to_string(),
231
- license: Some(LicenseInfo {
232
- name: "MIT".to_string(),
233
- url: Some("https://opensource.org/licenses/MIT".to_string()),
234
- }),
235
- ..Default::default()
236
- };
237
-
238
- let routes = vec![];
239
- let registry = SchemaRegistry::new();
240
-
241
- let spec = generate_openapi_spec(&routes, &config, &registry, None).unwrap();
242
- assert!(spec.info.license.is_some());
243
- let license = spec.info.license.unwrap();
244
- assert_eq!(license.name, "MIT");
245
- }
246
-
247
- #[test]
248
- fn test_generate_spec_with_servers() {
249
- let config = OpenApiConfig {
250
- enabled: true,
251
- title: "Test API".to_string(),
252
- version: "1.0.0".to_string(),
253
- servers: vec![
254
- ServerInfo {
255
- url: "https://api.example.com".to_string(),
256
- description: Some("Production".to_string()),
257
- },
258
- ServerInfo {
259
- url: "http://localhost:8080".to_string(),
260
- description: Some("Development".to_string()),
261
- },
262
- ],
263
- ..Default::default()
264
- };
265
-
266
- let routes = vec![];
267
- let registry = SchemaRegistry::new();
268
-
269
- let spec = generate_openapi_spec(&routes, &config, &registry, None).unwrap();
270
- assert!(spec.servers.is_some());
271
- let servers = spec.servers.unwrap();
272
- assert_eq!(servers.len(), 2);
273
- assert_eq!(servers[0].url, "https://api.example.com");
274
- assert_eq!(servers[1].url, "http://localhost:8080");
275
- }
276
-
277
- #[test]
278
- fn test_security_scheme_http_bearer() {
279
- let scheme_info = SecuritySchemeInfo::Http {
280
- scheme: "bearer".to_string(),
281
- bearer_format: Some("JWT".to_string()),
282
- };
283
-
284
- let scheme = security_scheme_info_to_openapi(&scheme_info);
285
- match scheme {
286
- SecurityScheme::Http(http) => {
287
- assert!(matches!(http.scheme, utoipa::openapi::security::HttpAuthScheme::Bearer));
288
- assert_eq!(http.bearer_format, Some("JWT".to_string()));
289
- }
290
- _ => panic!("Expected Http security scheme"),
291
- }
292
- }
293
-
294
- #[test]
295
- fn test_security_scheme_api_key() {
296
- let scheme_info = SecuritySchemeInfo::ApiKey {
297
- location: "header".to_string(),
298
- name: "X-API-Key".to_string(),
299
- };
300
-
301
- let scheme = security_scheme_info_to_openapi(&scheme_info);
302
- match scheme {
303
- SecurityScheme::ApiKey(api_key) => {
304
- assert!(matches!(api_key, utoipa::openapi::security::ApiKey::Header(_)));
305
- }
306
- _ => panic!("Expected ApiKey security scheme"),
307
- }
308
- }
309
- }