spikard 0.4.0-arm64-darwin-23
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/LICENSE +1 -0
- data/README.md +659 -0
- data/ext/spikard_rb/Cargo.toml +17 -0
- data/ext/spikard_rb/extconf.rb +10 -0
- data/ext/spikard_rb/src/lib.rs +6 -0
- data/lib/spikard/app.rb +405 -0
- data/lib/spikard/background.rb +27 -0
- data/lib/spikard/config.rb +396 -0
- data/lib/spikard/converters.rb +13 -0
- data/lib/spikard/handler_wrapper.rb +113 -0
- data/lib/spikard/provide.rb +214 -0
- data/lib/spikard/response.rb +173 -0
- data/lib/spikard/schema.rb +243 -0
- data/lib/spikard/sse.rb +111 -0
- data/lib/spikard/streaming_response.rb +44 -0
- data/lib/spikard/testing.rb +221 -0
- data/lib/spikard/upload_file.rb +131 -0
- data/lib/spikard/version.rb +5 -0
- data/lib/spikard/websocket.rb +59 -0
- data/lib/spikard.rb +43 -0
- data/sig/spikard.rbs +366 -0
- data/vendor/bundle/ruby/3.4.0/gems/diff-lcs-1.6.2/mise.toml +5 -0
- data/vendor/bundle/ruby/3.4.0/gems/rake-compiler-dock-1.10.0/build/buildkitd.toml +2 -0
- data/vendor/crates/spikard-bindings-shared/Cargo.toml +63 -0
- data/vendor/crates/spikard-bindings-shared/examples/config_extraction.rs +139 -0
- data/vendor/crates/spikard-bindings-shared/src/config_extractor.rs +561 -0
- data/vendor/crates/spikard-bindings-shared/src/conversion_traits.rs +194 -0
- data/vendor/crates/spikard-bindings-shared/src/di_traits.rs +246 -0
- data/vendor/crates/spikard-bindings-shared/src/error_response.rs +403 -0
- data/vendor/crates/spikard-bindings-shared/src/handler_base.rs +274 -0
- data/vendor/crates/spikard-bindings-shared/src/lib.rs +25 -0
- data/vendor/crates/spikard-bindings-shared/src/lifecycle_base.rs +298 -0
- data/vendor/crates/spikard-bindings-shared/src/lifecycle_executor.rs +637 -0
- data/vendor/crates/spikard-bindings-shared/src/response_builder.rs +309 -0
- data/vendor/crates/spikard-bindings-shared/src/test_client_base.rs +248 -0
- data/vendor/crates/spikard-bindings-shared/src/validation_helpers.rs +355 -0
- data/vendor/crates/spikard-bindings-shared/tests/comprehensive_coverage.rs +502 -0
- data/vendor/crates/spikard-bindings-shared/tests/error_response_edge_cases.rs +389 -0
- data/vendor/crates/spikard-bindings-shared/tests/handler_base_integration.rs +413 -0
- data/vendor/crates/spikard-core/Cargo.toml +40 -0
- data/vendor/crates/spikard-core/src/bindings/mod.rs +3 -0
- data/vendor/crates/spikard-core/src/bindings/response.rs +133 -0
- data/vendor/crates/spikard-core/src/debug.rs +63 -0
- data/vendor/crates/spikard-core/src/di/container.rs +726 -0
- data/vendor/crates/spikard-core/src/di/dependency.rs +273 -0
- data/vendor/crates/spikard-core/src/di/error.rs +118 -0
- data/vendor/crates/spikard-core/src/di/factory.rs +538 -0
- data/vendor/crates/spikard-core/src/di/graph.rs +545 -0
- data/vendor/crates/spikard-core/src/di/mod.rs +192 -0
- data/vendor/crates/spikard-core/src/di/resolved.rs +411 -0
- data/vendor/crates/spikard-core/src/di/value.rs +283 -0
- data/vendor/crates/spikard-core/src/errors.rs +39 -0
- data/vendor/crates/spikard-core/src/http.rs +153 -0
- data/vendor/crates/spikard-core/src/lib.rs +29 -0
- data/vendor/crates/spikard-core/src/lifecycle.rs +422 -0
- data/vendor/crates/spikard-core/src/metadata.rs +397 -0
- data/vendor/crates/spikard-core/src/parameters.rs +723 -0
- data/vendor/crates/spikard-core/src/problem.rs +310 -0
- data/vendor/crates/spikard-core/src/request_data.rs +189 -0
- data/vendor/crates/spikard-core/src/router.rs +249 -0
- data/vendor/crates/spikard-core/src/schema_registry.rs +183 -0
- data/vendor/crates/spikard-core/src/type_hints.rs +304 -0
- data/vendor/crates/spikard-core/src/validation/error_mapper.rs +689 -0
- data/vendor/crates/spikard-core/src/validation/mod.rs +459 -0
- data/vendor/crates/spikard-http/Cargo.toml +58 -0
- data/vendor/crates/spikard-http/examples/sse-notifications.rs +147 -0
- data/vendor/crates/spikard-http/examples/websocket-chat.rs +91 -0
- data/vendor/crates/spikard-http/src/auth.rs +247 -0
- data/vendor/crates/spikard-http/src/background.rs +1562 -0
- data/vendor/crates/spikard-http/src/bindings/mod.rs +3 -0
- data/vendor/crates/spikard-http/src/bindings/response.rs +1 -0
- data/vendor/crates/spikard-http/src/body_metadata.rs +8 -0
- data/vendor/crates/spikard-http/src/cors.rs +490 -0
- data/vendor/crates/spikard-http/src/debug.rs +63 -0
- data/vendor/crates/spikard-http/src/di_handler.rs +1878 -0
- data/vendor/crates/spikard-http/src/handler_response.rs +532 -0
- data/vendor/crates/spikard-http/src/handler_trait.rs +861 -0
- data/vendor/crates/spikard-http/src/handler_trait_tests.rs +284 -0
- data/vendor/crates/spikard-http/src/lib.rs +524 -0
- data/vendor/crates/spikard-http/src/lifecycle/adapter.rs +149 -0
- data/vendor/crates/spikard-http/src/lifecycle.rs +428 -0
- data/vendor/crates/spikard-http/src/middleware/mod.rs +285 -0
- data/vendor/crates/spikard-http/src/middleware/multipart.rs +930 -0
- data/vendor/crates/spikard-http/src/middleware/urlencoded.rs +541 -0
- data/vendor/crates/spikard-http/src/middleware/validation.rs +287 -0
- data/vendor/crates/spikard-http/src/openapi/mod.rs +309 -0
- data/vendor/crates/spikard-http/src/openapi/parameter_extraction.rs +535 -0
- data/vendor/crates/spikard-http/src/openapi/schema_conversion.rs +867 -0
- data/vendor/crates/spikard-http/src/openapi/spec_generation.rs +678 -0
- data/vendor/crates/spikard-http/src/query_parser.rs +369 -0
- data/vendor/crates/spikard-http/src/response.rs +399 -0
- data/vendor/crates/spikard-http/src/server/handler.rs +1557 -0
- data/vendor/crates/spikard-http/src/server/lifecycle_execution.rs +98 -0
- data/vendor/crates/spikard-http/src/server/mod.rs +806 -0
- data/vendor/crates/spikard-http/src/server/request_extraction.rs +630 -0
- data/vendor/crates/spikard-http/src/server/routing_factory.rs +497 -0
- data/vendor/crates/spikard-http/src/sse.rs +961 -0
- data/vendor/crates/spikard-http/src/testing/form.rs +14 -0
- data/vendor/crates/spikard-http/src/testing/multipart.rs +60 -0
- data/vendor/crates/spikard-http/src/testing/test_client.rs +285 -0
- data/vendor/crates/spikard-http/src/testing.rs +377 -0
- data/vendor/crates/spikard-http/src/websocket.rs +831 -0
- data/vendor/crates/spikard-http/tests/background_behavior.rs +918 -0
- data/vendor/crates/spikard-http/tests/common/handlers.rs +308 -0
- data/vendor/crates/spikard-http/tests/common/mod.rs +21 -0
- data/vendor/crates/spikard-http/tests/di_integration.rs +202 -0
- data/vendor/crates/spikard-http/tests/doc_snippets.rs +4 -0
- data/vendor/crates/spikard-http/tests/lifecycle_execution.rs +1135 -0
- data/vendor/crates/spikard-http/tests/multipart_behavior.rs +688 -0
- data/vendor/crates/spikard-http/tests/server_config_builder.rs +324 -0
- data/vendor/crates/spikard-http/tests/sse_behavior.rs +728 -0
- data/vendor/crates/spikard-http/tests/websocket_behavior.rs +724 -0
- data/vendor/crates/spikard-rb/Cargo.toml +43 -0
- data/vendor/crates/spikard-rb/build.rs +199 -0
- data/vendor/crates/spikard-rb/src/background.rs +63 -0
- data/vendor/crates/spikard-rb/src/config/mod.rs +5 -0
- data/vendor/crates/spikard-rb/src/config/server_config.rs +283 -0
- data/vendor/crates/spikard-rb/src/conversion.rs +459 -0
- data/vendor/crates/spikard-rb/src/di/builder.rs +105 -0
- data/vendor/crates/spikard-rb/src/di/mod.rs +413 -0
- data/vendor/crates/spikard-rb/src/handler.rs +612 -0
- data/vendor/crates/spikard-rb/src/integration/mod.rs +3 -0
- data/vendor/crates/spikard-rb/src/lib.rs +1857 -0
- data/vendor/crates/spikard-rb/src/lifecycle.rs +275 -0
- data/vendor/crates/spikard-rb/src/metadata/mod.rs +5 -0
- data/vendor/crates/spikard-rb/src/metadata/route_extraction.rs +427 -0
- data/vendor/crates/spikard-rb/src/runtime/mod.rs +5 -0
- data/vendor/crates/spikard-rb/src/runtime/server_runner.rs +326 -0
- data/vendor/crates/spikard-rb/src/server.rs +283 -0
- data/vendor/crates/spikard-rb/src/sse.rs +231 -0
- data/vendor/crates/spikard-rb/src/testing/client.rs +404 -0
- data/vendor/crates/spikard-rb/src/testing/mod.rs +7 -0
- data/vendor/crates/spikard-rb/src/testing/sse.rs +143 -0
- data/vendor/crates/spikard-rb/src/testing/websocket.rs +221 -0
- data/vendor/crates/spikard-rb/src/websocket.rs +233 -0
- data/vendor/crates/spikard-rb/tests/magnus_ffi_tests.rs +14 -0
- metadata +213 -0
|
@@ -0,0 +1,678 @@
|
|
|
1
|
+
//! OpenAPI specification generation and assembly
|
|
2
|
+
|
|
3
|
+
use crate::RouteMetadata;
|
|
4
|
+
use utoipa::openapi::HttpMethod;
|
|
5
|
+
use utoipa::openapi::security::SecurityScheme;
|
|
6
|
+
use utoipa::openapi::{Components, Info, OpenApi, OpenApiBuilder, PathItem, Paths, RefOr, Response, Responses};
|
|
7
|
+
|
|
8
|
+
/// Convert route to OpenAPI PathItem
|
|
9
|
+
fn route_to_path_item(route: &RouteMetadata) -> Result<PathItem, String> {
|
|
10
|
+
let operation = route_to_operation(route)?;
|
|
11
|
+
|
|
12
|
+
let http_method = match route.method.to_uppercase().as_str() {
|
|
13
|
+
"GET" => HttpMethod::Get,
|
|
14
|
+
"POST" => HttpMethod::Post,
|
|
15
|
+
"PUT" => HttpMethod::Put,
|
|
16
|
+
"DELETE" => HttpMethod::Delete,
|
|
17
|
+
"PATCH" => HttpMethod::Patch,
|
|
18
|
+
"HEAD" => HttpMethod::Head,
|
|
19
|
+
"OPTIONS" => HttpMethod::Options,
|
|
20
|
+
_ => return Err(format!("Unsupported HTTP method: {}", route.method)),
|
|
21
|
+
};
|
|
22
|
+
|
|
23
|
+
let path_item = PathItem::new(http_method, operation);
|
|
24
|
+
|
|
25
|
+
Ok(path_item)
|
|
26
|
+
}
|
|
27
|
+
|
|
28
|
+
/// Convert route to OpenAPI Operation
|
|
29
|
+
fn route_to_operation(route: &RouteMetadata) -> Result<utoipa::openapi::path::Operation, String> {
|
|
30
|
+
let mut operation = utoipa::openapi::path::Operation::new();
|
|
31
|
+
|
|
32
|
+
if let Some(param_schema) = &route.parameter_schema {
|
|
33
|
+
let parameters =
|
|
34
|
+
crate::openapi::parameter_extraction::extract_parameters_from_schema(param_schema, &route.path)?;
|
|
35
|
+
if !parameters.is_empty() {
|
|
36
|
+
let unwrapped: Vec<_> = parameters
|
|
37
|
+
.into_iter()
|
|
38
|
+
.filter_map(|p| if let RefOr::T(param) = p { Some(param) } else { None })
|
|
39
|
+
.collect();
|
|
40
|
+
operation.parameters = Some(unwrapped);
|
|
41
|
+
}
|
|
42
|
+
}
|
|
43
|
+
|
|
44
|
+
if let Some(request_schema) = &route.request_schema {
|
|
45
|
+
let request_body = crate::openapi::schema_conversion::json_schema_to_request_body(request_schema)?;
|
|
46
|
+
operation.request_body = Some(request_body);
|
|
47
|
+
}
|
|
48
|
+
|
|
49
|
+
let mut responses = Responses::new();
|
|
50
|
+
if let Some(response_schema) = &route.response_schema {
|
|
51
|
+
let response = crate::openapi::schema_conversion::json_schema_to_response(response_schema)?;
|
|
52
|
+
responses.responses.insert("200".to_string(), RefOr::T(response));
|
|
53
|
+
} else {
|
|
54
|
+
responses
|
|
55
|
+
.responses
|
|
56
|
+
.insert("200".to_string(), RefOr::T(Response::new("Successful response")));
|
|
57
|
+
}
|
|
58
|
+
operation.responses = responses;
|
|
59
|
+
|
|
60
|
+
Ok(operation)
|
|
61
|
+
}
|
|
62
|
+
|
|
63
|
+
/// Assemble OpenAPI specification from routes with auto-detection of security schemes
|
|
64
|
+
pub fn assemble_openapi_spec(
|
|
65
|
+
routes: &[RouteMetadata],
|
|
66
|
+
config: &super::OpenApiConfig,
|
|
67
|
+
server_config: Option<&crate::ServerConfig>,
|
|
68
|
+
) -> Result<OpenApi, String> {
|
|
69
|
+
let mut info = Info::new(&config.title, &config.version);
|
|
70
|
+
if let Some(desc) = &config.description {
|
|
71
|
+
info.description = Some(desc.clone());
|
|
72
|
+
}
|
|
73
|
+
if let Some(contact_info) = &config.contact {
|
|
74
|
+
let mut contact = utoipa::openapi::Contact::default();
|
|
75
|
+
if let Some(name) = &contact_info.name {
|
|
76
|
+
contact.name = Some(name.clone());
|
|
77
|
+
}
|
|
78
|
+
if let Some(email) = &contact_info.email {
|
|
79
|
+
contact.email = Some(email.clone());
|
|
80
|
+
}
|
|
81
|
+
if let Some(url) = &contact_info.url {
|
|
82
|
+
contact.url = Some(url.clone());
|
|
83
|
+
}
|
|
84
|
+
info.contact = Some(contact);
|
|
85
|
+
}
|
|
86
|
+
if let Some(license_info) = &config.license {
|
|
87
|
+
let mut license = utoipa::openapi::License::new(&license_info.name);
|
|
88
|
+
if let Some(url) = &license_info.url {
|
|
89
|
+
license.url = Some(url.clone());
|
|
90
|
+
}
|
|
91
|
+
info.license = Some(license);
|
|
92
|
+
}
|
|
93
|
+
|
|
94
|
+
let servers = if config.servers.is_empty() {
|
|
95
|
+
None
|
|
96
|
+
} else {
|
|
97
|
+
Some(
|
|
98
|
+
config
|
|
99
|
+
.servers
|
|
100
|
+
.iter()
|
|
101
|
+
.map(|s| {
|
|
102
|
+
let mut server = utoipa::openapi::Server::new(&s.url);
|
|
103
|
+
if let Some(desc) = &s.description {
|
|
104
|
+
server.description = Some(desc.clone());
|
|
105
|
+
}
|
|
106
|
+
server
|
|
107
|
+
})
|
|
108
|
+
.collect(),
|
|
109
|
+
)
|
|
110
|
+
};
|
|
111
|
+
|
|
112
|
+
let mut paths = Paths::new();
|
|
113
|
+
for route in routes {
|
|
114
|
+
let path_item = route_to_path_item(route)?;
|
|
115
|
+
paths.paths.insert(route.path.clone(), path_item);
|
|
116
|
+
}
|
|
117
|
+
|
|
118
|
+
let mut components = Components::new();
|
|
119
|
+
let mut global_security = Vec::new();
|
|
120
|
+
|
|
121
|
+
if let Some(server_cfg) = server_config {
|
|
122
|
+
if let Some(_jwt_cfg) = &server_cfg.jwt_auth {
|
|
123
|
+
let jwt_scheme = SecurityScheme::Http(
|
|
124
|
+
utoipa::openapi::security::HttpBuilder::new()
|
|
125
|
+
.scheme(utoipa::openapi::security::HttpAuthScheme::Bearer)
|
|
126
|
+
.bearer_format("JWT")
|
|
127
|
+
.build(),
|
|
128
|
+
);
|
|
129
|
+
components.add_security_scheme("bearerAuth", jwt_scheme);
|
|
130
|
+
|
|
131
|
+
let security_req = utoipa::openapi::security::SecurityRequirement::new("bearerAuth", Vec::<String>::new());
|
|
132
|
+
global_security.push(security_req);
|
|
133
|
+
}
|
|
134
|
+
|
|
135
|
+
if let Some(api_key_cfg) = &server_cfg.api_key_auth {
|
|
136
|
+
use utoipa::openapi::security::ApiKey;
|
|
137
|
+
let api_key_scheme = SecurityScheme::ApiKey(ApiKey::Header(utoipa::openapi::security::ApiKeyValue::new(
|
|
138
|
+
&api_key_cfg.header_name,
|
|
139
|
+
)));
|
|
140
|
+
components.add_security_scheme("apiKeyAuth", api_key_scheme);
|
|
141
|
+
|
|
142
|
+
let security_req = utoipa::openapi::security::SecurityRequirement::new("apiKeyAuth", Vec::<String>::new());
|
|
143
|
+
global_security.push(security_req);
|
|
144
|
+
}
|
|
145
|
+
}
|
|
146
|
+
|
|
147
|
+
if !config.security_schemes.is_empty() {
|
|
148
|
+
for (name, scheme_info) in &config.security_schemes {
|
|
149
|
+
let scheme = crate::openapi::security_scheme_info_to_openapi(scheme_info);
|
|
150
|
+
components.add_security_scheme(name, scheme);
|
|
151
|
+
}
|
|
152
|
+
}
|
|
153
|
+
|
|
154
|
+
let mut openapi = OpenApiBuilder::new()
|
|
155
|
+
.info(info)
|
|
156
|
+
.paths(paths)
|
|
157
|
+
.components(Some(components))
|
|
158
|
+
.build();
|
|
159
|
+
|
|
160
|
+
if let Some(servers) = servers {
|
|
161
|
+
openapi.servers = Some(servers);
|
|
162
|
+
}
|
|
163
|
+
|
|
164
|
+
if !global_security.is_empty() {
|
|
165
|
+
openapi.security = Some(global_security);
|
|
166
|
+
}
|
|
167
|
+
|
|
168
|
+
Ok(openapi)
|
|
169
|
+
}
|
|
170
|
+
|
|
171
|
+
#[cfg(test)]
|
|
172
|
+
mod tests {
|
|
173
|
+
use super::*;
|
|
174
|
+
use crate::{ApiKeyConfig, JwtConfig};
|
|
175
|
+
|
|
176
|
+
fn make_route(method: &str, path: &str) -> RouteMetadata {
|
|
177
|
+
RouteMetadata {
|
|
178
|
+
method: method.to_string(),
|
|
179
|
+
path: path.to_string(),
|
|
180
|
+
handler_name: format!("{}_handler", method.to_lowercase()),
|
|
181
|
+
request_schema: None,
|
|
182
|
+
response_schema: None,
|
|
183
|
+
parameter_schema: None,
|
|
184
|
+
file_params: None,
|
|
185
|
+
is_async: true,
|
|
186
|
+
cors: None,
|
|
187
|
+
body_param_name: None,
|
|
188
|
+
#[cfg(feature = "di")]
|
|
189
|
+
handler_dependencies: None,
|
|
190
|
+
}
|
|
191
|
+
}
|
|
192
|
+
|
|
193
|
+
fn make_server_config_with_jwt() -> crate::ServerConfig {
|
|
194
|
+
crate::ServerConfig {
|
|
195
|
+
jwt_auth: Some(JwtConfig {
|
|
196
|
+
secret: "test-secret".to_string(),
|
|
197
|
+
algorithm: "HS256".to_string(),
|
|
198
|
+
audience: None,
|
|
199
|
+
issuer: None,
|
|
200
|
+
leeway: 0,
|
|
201
|
+
}),
|
|
202
|
+
..Default::default()
|
|
203
|
+
}
|
|
204
|
+
}
|
|
205
|
+
|
|
206
|
+
fn make_server_config_with_api_key() -> crate::ServerConfig {
|
|
207
|
+
crate::ServerConfig {
|
|
208
|
+
api_key_auth: Some(ApiKeyConfig {
|
|
209
|
+
keys: vec!["test-key".to_string()],
|
|
210
|
+
header_name: "X-API-Key".to_string(),
|
|
211
|
+
}),
|
|
212
|
+
..Default::default()
|
|
213
|
+
}
|
|
214
|
+
}
|
|
215
|
+
|
|
216
|
+
// HTTP Method Coverage Tests
|
|
217
|
+
#[test]
|
|
218
|
+
fn test_route_to_path_item_get() {
|
|
219
|
+
let route = make_route("GET", "/users");
|
|
220
|
+
let result = route_to_path_item(&route);
|
|
221
|
+
assert!(result.is_ok());
|
|
222
|
+
}
|
|
223
|
+
|
|
224
|
+
#[test]
|
|
225
|
+
fn test_route_to_path_item_post() {
|
|
226
|
+
let route = make_route("POST", "/users");
|
|
227
|
+
let result = route_to_path_item(&route);
|
|
228
|
+
assert!(result.is_ok());
|
|
229
|
+
}
|
|
230
|
+
|
|
231
|
+
#[test]
|
|
232
|
+
fn test_route_to_path_item_put() {
|
|
233
|
+
let route = make_route("PUT", "/users/123");
|
|
234
|
+
let result = route_to_path_item(&route);
|
|
235
|
+
assert!(result.is_ok());
|
|
236
|
+
}
|
|
237
|
+
|
|
238
|
+
#[test]
|
|
239
|
+
fn test_route_to_path_item_patch() {
|
|
240
|
+
let route = make_route("PATCH", "/users/123");
|
|
241
|
+
let result = route_to_path_item(&route);
|
|
242
|
+
assert!(result.is_ok());
|
|
243
|
+
}
|
|
244
|
+
|
|
245
|
+
#[test]
|
|
246
|
+
fn test_route_to_path_item_delete() {
|
|
247
|
+
let route = make_route("DELETE", "/users/123");
|
|
248
|
+
let result = route_to_path_item(&route);
|
|
249
|
+
assert!(result.is_ok());
|
|
250
|
+
}
|
|
251
|
+
|
|
252
|
+
#[test]
|
|
253
|
+
fn test_route_to_path_item_head() {
|
|
254
|
+
let route = make_route("HEAD", "/users");
|
|
255
|
+
let result = route_to_path_item(&route);
|
|
256
|
+
assert!(result.is_ok());
|
|
257
|
+
}
|
|
258
|
+
|
|
259
|
+
#[test]
|
|
260
|
+
fn test_route_to_path_item_options() {
|
|
261
|
+
let route = make_route("OPTIONS", "/users");
|
|
262
|
+
let result = route_to_path_item(&route);
|
|
263
|
+
assert!(result.is_ok());
|
|
264
|
+
}
|
|
265
|
+
|
|
266
|
+
#[test]
|
|
267
|
+
fn test_route_to_path_item_case_insensitive_method() {
|
|
268
|
+
let route_lower = make_route("get", "/users");
|
|
269
|
+
let route_mixed = make_route("GeT", "/users");
|
|
270
|
+
|
|
271
|
+
assert!(route_to_path_item(&route_lower).is_ok());
|
|
272
|
+
assert!(route_to_path_item(&route_mixed).is_ok());
|
|
273
|
+
}
|
|
274
|
+
|
|
275
|
+
#[test]
|
|
276
|
+
fn test_route_to_path_item_unsupported_method() {
|
|
277
|
+
let route = make_route("CONNECT", "/users");
|
|
278
|
+
let result = route_to_path_item(&route);
|
|
279
|
+
assert!(result.is_err());
|
|
280
|
+
if let Err(err) = result {
|
|
281
|
+
assert!(err.contains("Unsupported HTTP method"));
|
|
282
|
+
}
|
|
283
|
+
}
|
|
284
|
+
|
|
285
|
+
// OpenAPI Spec Assembly Tests
|
|
286
|
+
#[test]
|
|
287
|
+
fn test_assemble_openapi_spec_minimal() {
|
|
288
|
+
let config = super::super::OpenApiConfig {
|
|
289
|
+
enabled: true,
|
|
290
|
+
title: "Test API".to_string(),
|
|
291
|
+
version: "1.0.0".to_string(),
|
|
292
|
+
..Default::default()
|
|
293
|
+
};
|
|
294
|
+
|
|
295
|
+
let result = assemble_openapi_spec(&[], &config, None);
|
|
296
|
+
assert!(result.is_ok());
|
|
297
|
+
let spec = result.unwrap();
|
|
298
|
+
assert_eq!(spec.info.title, "Test API");
|
|
299
|
+
assert_eq!(spec.info.version, "1.0.0");
|
|
300
|
+
}
|
|
301
|
+
|
|
302
|
+
#[test]
|
|
303
|
+
fn test_assemble_openapi_spec_with_description() {
|
|
304
|
+
let config = super::super::OpenApiConfig {
|
|
305
|
+
enabled: true,
|
|
306
|
+
title: "Test API".to_string(),
|
|
307
|
+
version: "1.0.0".to_string(),
|
|
308
|
+
description: Some("This is a test API".to_string()),
|
|
309
|
+
..Default::default()
|
|
310
|
+
};
|
|
311
|
+
|
|
312
|
+
let result = assemble_openapi_spec(&[], &config, None);
|
|
313
|
+
assert!(result.is_ok());
|
|
314
|
+
let spec = result.unwrap();
|
|
315
|
+
assert_eq!(spec.info.description, Some("This is a test API".to_string()));
|
|
316
|
+
}
|
|
317
|
+
|
|
318
|
+
#[test]
|
|
319
|
+
fn test_assemble_openapi_spec_with_contact() {
|
|
320
|
+
let config = super::super::OpenApiConfig {
|
|
321
|
+
enabled: true,
|
|
322
|
+
title: "Test API".to_string(),
|
|
323
|
+
version: "1.0.0".to_string(),
|
|
324
|
+
contact: Some(super::super::ContactInfo {
|
|
325
|
+
name: Some("Support Team".to_string()),
|
|
326
|
+
email: Some("support@example.com".to_string()),
|
|
327
|
+
url: Some("https://example.com/support".to_string()),
|
|
328
|
+
}),
|
|
329
|
+
..Default::default()
|
|
330
|
+
};
|
|
331
|
+
|
|
332
|
+
let result = assemble_openapi_spec(&[], &config, None);
|
|
333
|
+
assert!(result.is_ok());
|
|
334
|
+
let spec = result.unwrap();
|
|
335
|
+
assert!(spec.info.contact.is_some());
|
|
336
|
+
let contact = spec.info.contact.unwrap();
|
|
337
|
+
assert_eq!(contact.name, Some("Support Team".to_string()));
|
|
338
|
+
assert_eq!(contact.email, Some("support@example.com".to_string()));
|
|
339
|
+
}
|
|
340
|
+
|
|
341
|
+
#[test]
|
|
342
|
+
fn test_assemble_openapi_spec_with_license() {
|
|
343
|
+
let config = super::super::OpenApiConfig {
|
|
344
|
+
enabled: true,
|
|
345
|
+
title: "Test API".to_string(),
|
|
346
|
+
version: "1.0.0".to_string(),
|
|
347
|
+
license: Some(super::super::LicenseInfo {
|
|
348
|
+
name: "Apache 2.0".to_string(),
|
|
349
|
+
url: Some("https://www.apache.org/licenses/LICENSE-2.0.html".to_string()),
|
|
350
|
+
}),
|
|
351
|
+
..Default::default()
|
|
352
|
+
};
|
|
353
|
+
|
|
354
|
+
let result = assemble_openapi_spec(&[], &config, None);
|
|
355
|
+
assert!(result.is_ok());
|
|
356
|
+
let spec = result.unwrap();
|
|
357
|
+
assert!(spec.info.license.is_some());
|
|
358
|
+
let license = spec.info.license.unwrap();
|
|
359
|
+
assert_eq!(license.name, "Apache 2.0");
|
|
360
|
+
assert_eq!(
|
|
361
|
+
license.url,
|
|
362
|
+
Some("https://www.apache.org/licenses/LICENSE-2.0.html".to_string())
|
|
363
|
+
);
|
|
364
|
+
}
|
|
365
|
+
|
|
366
|
+
#[test]
|
|
367
|
+
fn test_assemble_openapi_spec_with_servers() {
|
|
368
|
+
let config = super::super::OpenApiConfig {
|
|
369
|
+
enabled: true,
|
|
370
|
+
title: "Test API".to_string(),
|
|
371
|
+
version: "1.0.0".to_string(),
|
|
372
|
+
servers: vec![
|
|
373
|
+
super::super::ServerInfo {
|
|
374
|
+
url: "https://api.example.com".to_string(),
|
|
375
|
+
description: Some("Production".to_string()),
|
|
376
|
+
},
|
|
377
|
+
super::super::ServerInfo {
|
|
378
|
+
url: "http://localhost:8080".to_string(),
|
|
379
|
+
description: Some("Development".to_string()),
|
|
380
|
+
},
|
|
381
|
+
],
|
|
382
|
+
..Default::default()
|
|
383
|
+
};
|
|
384
|
+
|
|
385
|
+
let result = assemble_openapi_spec(&[], &config, None);
|
|
386
|
+
assert!(result.is_ok());
|
|
387
|
+
let spec = result.unwrap();
|
|
388
|
+
assert!(spec.servers.is_some());
|
|
389
|
+
let servers = spec.servers.unwrap();
|
|
390
|
+
assert_eq!(servers.len(), 2);
|
|
391
|
+
}
|
|
392
|
+
|
|
393
|
+
// Security Scheme Detection Tests
|
|
394
|
+
#[test]
|
|
395
|
+
fn test_assemble_openapi_spec_with_jwt_auth() {
|
|
396
|
+
let config = super::super::OpenApiConfig {
|
|
397
|
+
enabled: true,
|
|
398
|
+
title: "Test API".to_string(),
|
|
399
|
+
version: "1.0.0".to_string(),
|
|
400
|
+
..Default::default()
|
|
401
|
+
};
|
|
402
|
+
|
|
403
|
+
let server_config = make_server_config_with_jwt();
|
|
404
|
+
let result = assemble_openapi_spec(&[], &config, Some(&server_config));
|
|
405
|
+
assert!(result.is_ok());
|
|
406
|
+
let spec = result.unwrap();
|
|
407
|
+
|
|
408
|
+
// Verify JWT security scheme is added
|
|
409
|
+
assert!(spec.components.is_some());
|
|
410
|
+
let components = spec.components.unwrap();
|
|
411
|
+
assert!(components.security_schemes.get("bearerAuth").is_some());
|
|
412
|
+
|
|
413
|
+
// Verify global security requirement
|
|
414
|
+
assert!(spec.security.is_some());
|
|
415
|
+
let security_reqs = spec.security.unwrap();
|
|
416
|
+
assert!(!security_reqs.is_empty());
|
|
417
|
+
// Verify that at least one security requirement was added for bearerAuth
|
|
418
|
+
assert_eq!(security_reqs.len(), 1);
|
|
419
|
+
}
|
|
420
|
+
|
|
421
|
+
#[test]
|
|
422
|
+
fn test_assemble_openapi_spec_with_api_key_auth() {
|
|
423
|
+
let config = super::super::OpenApiConfig {
|
|
424
|
+
enabled: true,
|
|
425
|
+
title: "Test API".to_string(),
|
|
426
|
+
version: "1.0.0".to_string(),
|
|
427
|
+
..Default::default()
|
|
428
|
+
};
|
|
429
|
+
|
|
430
|
+
let server_config = make_server_config_with_api_key();
|
|
431
|
+
let result = assemble_openapi_spec(&[], &config, Some(&server_config));
|
|
432
|
+
assert!(result.is_ok());
|
|
433
|
+
let spec = result.unwrap();
|
|
434
|
+
|
|
435
|
+
// Verify API Key security scheme is added
|
|
436
|
+
assert!(spec.components.is_some());
|
|
437
|
+
let components = spec.components.unwrap();
|
|
438
|
+
assert!(components.security_schemes.get("apiKeyAuth").is_some());
|
|
439
|
+
|
|
440
|
+
// Verify global security requirement
|
|
441
|
+
assert!(spec.security.is_some());
|
|
442
|
+
let security_reqs = spec.security.unwrap();
|
|
443
|
+
assert!(!security_reqs.is_empty());
|
|
444
|
+
// Verify that at least one security requirement was added for apiKeyAuth
|
|
445
|
+
assert_eq!(security_reqs.len(), 1);
|
|
446
|
+
}
|
|
447
|
+
|
|
448
|
+
#[test]
|
|
449
|
+
fn test_assemble_openapi_spec_with_both_auth_schemes() {
|
|
450
|
+
let config = super::super::OpenApiConfig {
|
|
451
|
+
enabled: true,
|
|
452
|
+
title: "Test API".to_string(),
|
|
453
|
+
version: "1.0.0".to_string(),
|
|
454
|
+
..Default::default()
|
|
455
|
+
};
|
|
456
|
+
|
|
457
|
+
let mut server_config = make_server_config_with_jwt();
|
|
458
|
+
server_config.api_key_auth = Some(ApiKeyConfig {
|
|
459
|
+
keys: vec!["test-key".to_string()],
|
|
460
|
+
header_name: "X-API-Key".to_string(),
|
|
461
|
+
});
|
|
462
|
+
|
|
463
|
+
let result = assemble_openapi_spec(&[], &config, Some(&server_config));
|
|
464
|
+
assert!(result.is_ok());
|
|
465
|
+
let spec = result.unwrap();
|
|
466
|
+
|
|
467
|
+
// Verify both security schemes are added
|
|
468
|
+
assert!(spec.components.is_some());
|
|
469
|
+
let components = spec.components.unwrap();
|
|
470
|
+
assert!(components.security_schemes.get("bearerAuth").is_some());
|
|
471
|
+
assert!(components.security_schemes.get("apiKeyAuth").is_some());
|
|
472
|
+
}
|
|
473
|
+
|
|
474
|
+
#[test]
|
|
475
|
+
fn test_assemble_openapi_spec_with_custom_security_schemes() {
|
|
476
|
+
use std::collections::HashMap;
|
|
477
|
+
|
|
478
|
+
let mut security_schemes = HashMap::new();
|
|
479
|
+
security_schemes.insert(
|
|
480
|
+
"oauth2".to_string(),
|
|
481
|
+
super::super::SecuritySchemeInfo::Http {
|
|
482
|
+
scheme: "bearer".to_string(),
|
|
483
|
+
bearer_format: Some("OAuth2".to_string()),
|
|
484
|
+
},
|
|
485
|
+
);
|
|
486
|
+
|
|
487
|
+
let config = super::super::OpenApiConfig {
|
|
488
|
+
enabled: true,
|
|
489
|
+
title: "Test API".to_string(),
|
|
490
|
+
version: "1.0.0".to_string(),
|
|
491
|
+
security_schemes,
|
|
492
|
+
..Default::default()
|
|
493
|
+
};
|
|
494
|
+
|
|
495
|
+
let result = assemble_openapi_spec(&[], &config, None);
|
|
496
|
+
assert!(result.is_ok());
|
|
497
|
+
let spec = result.unwrap();
|
|
498
|
+
|
|
499
|
+
assert!(spec.components.is_some());
|
|
500
|
+
let components = spec.components.unwrap();
|
|
501
|
+
assert!(components.security_schemes.get("oauth2").is_some());
|
|
502
|
+
}
|
|
503
|
+
|
|
504
|
+
// Route Integration Tests
|
|
505
|
+
#[test]
|
|
506
|
+
fn test_assemble_openapi_spec_with_multiple_routes() {
|
|
507
|
+
let routes: Vec<RouteMetadata> = vec![
|
|
508
|
+
make_route("GET", "/users"),
|
|
509
|
+
make_route("POST", "/users"),
|
|
510
|
+
make_route("GET", "/users/{id}"),
|
|
511
|
+
make_route("PUT", "/users/{id}"),
|
|
512
|
+
make_route("DELETE", "/users/{id}"),
|
|
513
|
+
];
|
|
514
|
+
|
|
515
|
+
let config = super::super::OpenApiConfig {
|
|
516
|
+
enabled: true,
|
|
517
|
+
title: "User API".to_string(),
|
|
518
|
+
version: "1.0.0".to_string(),
|
|
519
|
+
..Default::default()
|
|
520
|
+
};
|
|
521
|
+
|
|
522
|
+
let result = assemble_openapi_spec(&routes, &config, None);
|
|
523
|
+
assert!(result.is_ok());
|
|
524
|
+
let spec = result.unwrap();
|
|
525
|
+
|
|
526
|
+
// Verify paths are included
|
|
527
|
+
assert!(!spec.paths.paths.is_empty());
|
|
528
|
+
assert!(spec.paths.paths.contains_key("/users"));
|
|
529
|
+
assert!(spec.paths.paths.contains_key("/users/{id}"));
|
|
530
|
+
}
|
|
531
|
+
|
|
532
|
+
#[test]
|
|
533
|
+
fn test_route_to_operation_default_response() {
|
|
534
|
+
let route = make_route("GET", "/health");
|
|
535
|
+
let result = route_to_operation(&route);
|
|
536
|
+
|
|
537
|
+
assert!(result.is_ok());
|
|
538
|
+
let operation = result.unwrap();
|
|
539
|
+
assert!(!operation.responses.responses.is_empty());
|
|
540
|
+
assert!(operation.responses.responses.contains_key("200"));
|
|
541
|
+
}
|
|
542
|
+
|
|
543
|
+
#[test]
|
|
544
|
+
fn test_assemble_openapi_spec_empty_routes() {
|
|
545
|
+
let config = super::super::OpenApiConfig {
|
|
546
|
+
enabled: true,
|
|
547
|
+
title: "Empty API".to_string(),
|
|
548
|
+
version: "0.1.0".to_string(),
|
|
549
|
+
..Default::default()
|
|
550
|
+
};
|
|
551
|
+
|
|
552
|
+
let result = assemble_openapi_spec(&[], &config, None);
|
|
553
|
+
assert!(result.is_ok());
|
|
554
|
+
let spec = result.unwrap();
|
|
555
|
+
assert!(spec.paths.paths.is_empty());
|
|
556
|
+
}
|
|
557
|
+
|
|
558
|
+
#[test]
|
|
559
|
+
fn test_assemble_openapi_spec_with_partial_contact() {
|
|
560
|
+
let config = super::super::OpenApiConfig {
|
|
561
|
+
enabled: true,
|
|
562
|
+
title: "Test API".to_string(),
|
|
563
|
+
version: "1.0.0".to_string(),
|
|
564
|
+
contact: Some(super::super::ContactInfo {
|
|
565
|
+
name: Some("Support".to_string()),
|
|
566
|
+
email: None,
|
|
567
|
+
url: None,
|
|
568
|
+
}),
|
|
569
|
+
..Default::default()
|
|
570
|
+
};
|
|
571
|
+
|
|
572
|
+
let result = assemble_openapi_spec(&[], &config, None);
|
|
573
|
+
assert!(result.is_ok());
|
|
574
|
+
let spec = result.unwrap();
|
|
575
|
+
let contact = spec.info.contact.unwrap();
|
|
576
|
+
assert_eq!(contact.name, Some("Support".to_string()));
|
|
577
|
+
assert!(contact.email.is_none());
|
|
578
|
+
}
|
|
579
|
+
|
|
580
|
+
#[test]
|
|
581
|
+
fn test_assemble_openapi_spec_without_servers() {
|
|
582
|
+
let config = super::super::OpenApiConfig {
|
|
583
|
+
enabled: true,
|
|
584
|
+
title: "Test API".to_string(),
|
|
585
|
+
version: "1.0.0".to_string(),
|
|
586
|
+
servers: vec![],
|
|
587
|
+
..Default::default()
|
|
588
|
+
};
|
|
589
|
+
|
|
590
|
+
let result = assemble_openapi_spec(&[], &config, None);
|
|
591
|
+
assert!(result.is_ok());
|
|
592
|
+
let spec = result.unwrap();
|
|
593
|
+
assert!(spec.servers.is_none());
|
|
594
|
+
}
|
|
595
|
+
|
|
596
|
+
#[test]
|
|
597
|
+
fn test_route_to_path_item_lowercase_method() {
|
|
598
|
+
let route = make_route("post", "/items");
|
|
599
|
+
let result = route_to_path_item(&route);
|
|
600
|
+
assert!(result.is_ok());
|
|
601
|
+
}
|
|
602
|
+
|
|
603
|
+
#[test]
|
|
604
|
+
fn test_route_to_path_item_mixed_case_method() {
|
|
605
|
+
let route = make_route("PoSt", "/items");
|
|
606
|
+
let result = route_to_path_item(&route);
|
|
607
|
+
assert!(result.is_ok());
|
|
608
|
+
}
|
|
609
|
+
|
|
610
|
+
#[test]
|
|
611
|
+
fn test_assemble_openapi_spec_preserves_route_order() {
|
|
612
|
+
let routes: Vec<RouteMetadata> = vec![
|
|
613
|
+
make_route("GET", "/a"),
|
|
614
|
+
make_route("GET", "/b"),
|
|
615
|
+
make_route("GET", "/c"),
|
|
616
|
+
];
|
|
617
|
+
|
|
618
|
+
let config = super::super::OpenApiConfig {
|
|
619
|
+
enabled: true,
|
|
620
|
+
title: "Test API".to_string(),
|
|
621
|
+
version: "1.0.0".to_string(),
|
|
622
|
+
..Default::default()
|
|
623
|
+
};
|
|
624
|
+
|
|
625
|
+
let result = assemble_openapi_spec(&routes, &config, None);
|
|
626
|
+
assert!(result.is_ok());
|
|
627
|
+
let spec = result.unwrap();
|
|
628
|
+
|
|
629
|
+
// All routes should be present
|
|
630
|
+
assert!(spec.paths.paths.contains_key("/a"));
|
|
631
|
+
assert!(spec.paths.paths.contains_key("/b"));
|
|
632
|
+
assert!(spec.paths.paths.contains_key("/c"));
|
|
633
|
+
}
|
|
634
|
+
|
|
635
|
+
#[test]
|
|
636
|
+
fn test_assemble_openapi_spec_with_server_config_none() {
|
|
637
|
+
let config = super::super::OpenApiConfig {
|
|
638
|
+
enabled: true,
|
|
639
|
+
title: "Test API".to_string(),
|
|
640
|
+
version: "1.0.0".to_string(),
|
|
641
|
+
..Default::default()
|
|
642
|
+
};
|
|
643
|
+
|
|
644
|
+
let result = assemble_openapi_spec(&[], &config, None);
|
|
645
|
+
assert!(result.is_ok());
|
|
646
|
+
// No security schemes should be auto-detected
|
|
647
|
+
let spec = result.unwrap();
|
|
648
|
+
if let Some(components) = spec.components {
|
|
649
|
+
assert!(!components.security_schemes.contains_key("bearerAuth"));
|
|
650
|
+
assert!(!components.security_schemes.contains_key("apiKeyAuth"));
|
|
651
|
+
}
|
|
652
|
+
}
|
|
653
|
+
|
|
654
|
+
#[test]
|
|
655
|
+
fn test_route_to_operation_with_no_schemas() {
|
|
656
|
+
let route = RouteMetadata {
|
|
657
|
+
method: "GET".to_string(),
|
|
658
|
+
path: "/endpoint".to_string(),
|
|
659
|
+
handler_name: "test_handler".to_string(),
|
|
660
|
+
request_schema: None,
|
|
661
|
+
response_schema: None,
|
|
662
|
+
parameter_schema: None,
|
|
663
|
+
file_params: None,
|
|
664
|
+
is_async: true,
|
|
665
|
+
cors: None,
|
|
666
|
+
body_param_name: None,
|
|
667
|
+
#[cfg(feature = "di")]
|
|
668
|
+
handler_dependencies: None,
|
|
669
|
+
};
|
|
670
|
+
|
|
671
|
+
let result = route_to_operation(&route);
|
|
672
|
+
assert!(result.is_ok());
|
|
673
|
+
let operation = result.unwrap();
|
|
674
|
+
assert!(operation.request_body.is_none());
|
|
675
|
+
// Default 200 response should still exist
|
|
676
|
+
assert!(operation.responses.responses.contains_key("200"));
|
|
677
|
+
}
|
|
678
|
+
}
|