@webex/webex-core 3.8.0-next.2 → 3.8.0-next.20

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (48) hide show
  1. package/dist/index.js +43 -0
  2. package/dist/index.js.map +1 -1
  3. package/dist/lib/batcher.js +1 -1
  4. package/dist/lib/credentials/credentials.js +1 -1
  5. package/dist/lib/credentials/token.js +1 -1
  6. package/dist/lib/services/service-catalog.js +23 -68
  7. package/dist/lib/services/service-catalog.js.map +1 -1
  8. package/dist/lib/services/services.js +1 -1
  9. package/dist/lib/services-v2/constants.js +17 -0
  10. package/dist/lib/services-v2/constants.js.map +1 -0
  11. package/dist/lib/services-v2/index.js +58 -0
  12. package/dist/lib/services-v2/index.js.map +1 -0
  13. package/dist/lib/services-v2/interceptors/hostmap.js +64 -0
  14. package/dist/lib/services-v2/interceptors/hostmap.js.map +1 -0
  15. package/dist/lib/services-v2/interceptors/server-error.js +77 -0
  16. package/dist/lib/services-v2/interceptors/server-error.js.map +1 -0
  17. package/dist/lib/services-v2/interceptors/service.js +137 -0
  18. package/dist/lib/services-v2/interceptors/service.js.map +1 -0
  19. package/dist/lib/services-v2/metrics.js +12 -0
  20. package/dist/lib/services-v2/metrics.js.map +1 -0
  21. package/dist/lib/services-v2/service-catalog.js +433 -0
  22. package/dist/lib/services-v2/service-catalog.js.map +1 -0
  23. package/dist/lib/services-v2/service-fed-ramp.js +13 -0
  24. package/dist/lib/services-v2/service-fed-ramp.js.map +1 -0
  25. package/dist/lib/services-v2/service-url.js +119 -0
  26. package/dist/lib/services-v2/service-url.js.map +1 -0
  27. package/dist/lib/services-v2/services-v2.js +963 -0
  28. package/dist/lib/services-v2/services-v2.js.map +1 -0
  29. package/dist/plugins/logger.js +1 -1
  30. package/dist/webex-core.js +2 -2
  31. package/dist/webex-core.js.map +1 -1
  32. package/package.json +13 -13
  33. package/src/index.js +10 -0
  34. package/src/lib/services/service-catalog.js +14 -54
  35. package/src/lib/services-v2/README.md +3 -0
  36. package/src/lib/services-v2/constants.js +21 -0
  37. package/src/lib/services-v2/index.js +23 -0
  38. package/src/lib/services-v2/interceptors/hostmap.js +36 -0
  39. package/src/lib/services-v2/interceptors/server-error.js +48 -0
  40. package/src/lib/services-v2/interceptors/service.js +101 -0
  41. package/src/lib/services-v2/metrics.js +4 -0
  42. package/src/lib/services-v2/service-catalog.js +455 -0
  43. package/src/lib/services-v2/service-fed-ramp.js +5 -0
  44. package/src/lib/services-v2/service-url.js +124 -0
  45. package/src/lib/services-v2/services-v2.js +971 -0
  46. package/test/fixtures/host-catalog-v2.js +247 -0
  47. package/test/unit/spec/services/service-catalog.js +30 -90
  48. package/test/unit/spec/services-v2/services-v2.js +564 -0
@@ -0,0 +1,564 @@
1
+ /*!
2
+ * Copyright (c) 2015-2020 Cisco Systems, Inc. See LICENSE file.
3
+ */
4
+
5
+ import {assert} from '@webex/test-helper-chai';
6
+ import MockWebex from '@webex/test-helper-mock-webex';
7
+ import sinon from 'sinon';
8
+ import {ServicesV2} from '@webex/webex-core';
9
+ import {NewMetrics} from '@webex/internal-plugin-metrics';
10
+ import {formattedServiceHostmapV2, serviceHostmapV2} from '../../../fixtures/host-catalog-v2';
11
+
12
+ const waitForAsync = () =>
13
+ new Promise((resolve) =>
14
+ setImmediate(() => {
15
+ return resolve();
16
+ })
17
+ );
18
+
19
+ /* eslint-disable no-underscore-dangle */
20
+ describe('webex-core', () => {
21
+ describe('ServicesV2', () => {
22
+ let webex;
23
+ let services;
24
+ let catalog;
25
+
26
+ beforeEach(() => {
27
+ webex = new MockWebex({
28
+ children: {
29
+ services: ServicesV2,
30
+ newMetrics: NewMetrics,
31
+ },
32
+ });
33
+ services = webex.internal.services;
34
+ catalog = services._getCatalog();
35
+ });
36
+
37
+ // describe('#initialize', () => {
38
+ // it('initFailed is false when initialization succeeds and credentials are available', async () => {
39
+ // services.listenToOnce = sinon.stub();
40
+ // services.initServiceCatalogs = sinon.stub().returns(Promise.resolve());
41
+ // services.webex.credentials = {
42
+ // supertoken: {
43
+ // access_token: 'token',
44
+ // },
45
+ // };
46
+
47
+ // services.initialize();
48
+
49
+ // // call the onReady callback
50
+ // services.listenToOnce.getCall(1).args[2]();
51
+ // await waitForAsync();
52
+
53
+ // assert.isFalse(services.initFailed);
54
+ // });
55
+
56
+ // it('initFailed is false when initialization succeeds no credentials are available', async () => {
57
+ // services.listenToOnce = sinon.stub();
58
+ // services.collectPreauthCatalog = sinon.stub().returns(Promise.resolve());
59
+
60
+ // services.initialize();
61
+
62
+ // // call the onReady callback
63
+ // services.listenToOnce.getCall(1).args[2]();
64
+ // await waitForAsync();
65
+
66
+ // assert.isFalse(services.initFailed);
67
+ // });
68
+
69
+ // it.each([
70
+ // {error: new Error('failed'), expectedMessage: 'failed'},
71
+ // {error: undefined, expectedMessage: undefined},
72
+ // ])(
73
+ // 'sets initFailed to true when collectPreauthCatalog errors',
74
+ // async ({error, expectedMessage}) => {
75
+ // services.collectPreauthCatalog = sinon.stub().callsFake(() => {
76
+ // return Promise.reject(error);
77
+ // });
78
+
79
+ // services.listenToOnce = sinon.stub();
80
+ // services.logger.error = sinon.stub();
81
+
82
+ // services.initialize();
83
+
84
+ // // call the onReady callback
85
+ // services.listenToOnce.getCall(1).args[2]();
86
+
87
+ // await waitForAsync();
88
+
89
+ // assert.isTrue(services.initFailed);
90
+ // sinon.assert.calledWith(
91
+ // services.logger.error,
92
+ // `services: failed to init initial services when no credentials available, ${expectedMessage}`
93
+ // );
94
+ // }
95
+ // );
96
+
97
+ // it.each([
98
+ // {error: new Error('failed'), expectedMessage: 'failed'},
99
+ // {error: undefined, expectedMessage: undefined},
100
+ // ])(
101
+ // 'sets initFailed to true when initServiceCatalogs errors',
102
+ // async ({error, expectedMessage}) => {
103
+ // services.initServiceCatalogs = sinon.stub().callsFake(() => {
104
+ // return Promise.reject(error);
105
+ // });
106
+ // services.webex.credentials = {
107
+ // supertoken: {
108
+ // access_token: 'token',
109
+ // },
110
+ // };
111
+
112
+ // services.listenToOnce = sinon.stub();
113
+ // services.logger.error = sinon.stub();
114
+
115
+ // services.initialize();
116
+
117
+ // // call the onReady callback
118
+ // services.listenToOnce.getCall(1).args[2]();
119
+
120
+ // await waitForAsync();
121
+
122
+ // assert.isTrue(services.initFailed);
123
+ // sinon.assert.calledWith(
124
+ // services.logger.error,
125
+ // `services: failed to init initial services when credentials available, ${expectedMessage}`
126
+ // );
127
+ // }
128
+ // );
129
+ // });
130
+
131
+ // describe('#initServiceCatalogs', () => {
132
+ // it('does not set initFailed to true when updateServices succeeds', async () => {
133
+ // services.webex.credentials = {
134
+ // getOrgId: sinon.stub().returns('orgId'),
135
+ // canAuthorize: true,
136
+ // };
137
+
138
+ // services.collectPreauthCatalog = sinon.stub().callsFake(() => {
139
+ // return Promise.resolve();
140
+ // });
141
+
142
+ // services.updateServices = sinon.stub().callsFake(() => {
143
+ // return Promise.resolve();
144
+ // });
145
+
146
+ // services.logger.error = sinon.stub();
147
+
148
+ // await services.initServiceCatalogs();
149
+
150
+ // assert.isFalse(services.initFailed);
151
+
152
+ // sinon.assert.calledWith(services.collectPreauthCatalog, {orgId: 'orgId'});
153
+ // sinon.assert.notCalled(services.logger.warn);
154
+ // });
155
+
156
+ // it('sets initFailed to true when updateServices errors', async () => {
157
+ // const error = new Error('failed');
158
+
159
+ // services.webex.credentials = {
160
+ // getOrgId: sinon.stub().returns('orgId'),
161
+ // canAuthorize: true,
162
+ // };
163
+
164
+ // services.collectPreauthCatalog = sinon.stub().callsFake(() => {
165
+ // return Promise.resolve();
166
+ // });
167
+
168
+ // services.updateServices = sinon.stub().callsFake(() => {
169
+ // return Promise.reject(error);
170
+ // });
171
+
172
+ // services.logger.error = sinon.stub();
173
+
174
+ // await services.initServiceCatalogs();
175
+
176
+ // assert.isTrue(services.initFailed);
177
+
178
+ // sinon.assert.calledWith(services.collectPreauthCatalog, {orgId: 'orgId'});
179
+ // sinon.assert.calledWith(services.logger.warn, 'services: cannot retrieve postauth catalog');
180
+ // });
181
+ // });
182
+
183
+ // describe('class members', () => {
184
+ // describe('#registries', () => {
185
+ // it('should be a weakmap', () => {
186
+ // assert.instanceOf(services.registries, WeakMap);
187
+ // });
188
+ // });
189
+
190
+ // describe('#states', () => {
191
+ // it('should be a weakmap', () => {
192
+ // assert.instanceOf(services.states, WeakMap);
193
+ // });
194
+ // });
195
+ // });
196
+
197
+ // describe('class methods', () => {
198
+ // describe('#getRegistry', () => {
199
+ // it('should be a service registry', () => {
200
+ // assert.instanceOf(services.getRegistry(), ServiceRegistry);
201
+ // });
202
+ // });
203
+
204
+ // describe('#getState', () => {
205
+ // it('should be a service state', () => {
206
+ // assert.instanceOf(services.getState(), ServiceState);
207
+ // });
208
+ // });
209
+ // });
210
+
211
+ // describe('#namespace', () => {
212
+ // it('is accurate to plugin name', () => {
213
+ // assert.equal(services.namespace, 'Services');
214
+ // });
215
+ // });
216
+
217
+ // describe('#_catalogs', () => {
218
+ // it('is a weakmap', () => {
219
+ // assert.typeOf(services._catalogs, 'weakmap');
220
+ // });
221
+ // });
222
+
223
+ // describe('#validateDomains', () => {
224
+ // it('is a boolean', () => {
225
+ // assert.isBoolean(services.validateDomains);
226
+ // });
227
+ // });
228
+
229
+ // describe('#initFailed', () => {
230
+ // it('is a boolean', () => {
231
+ // assert.isFalse(services.initFailed);
232
+ // });
233
+ // });
234
+
235
+ // describe('#list()', () => {
236
+ // let serviceList;
237
+
238
+ // beforeEach(() => {
239
+ // serviceList = services.list();
240
+ // });
241
+
242
+ // it('must return an object', () => {
243
+ // assert.typeOf(serviceList, 'object');
244
+ // });
245
+
246
+ // it('returned list must be of shape {Record<string, string>}', () => {
247
+ // Object.keys(serviceList).forEach((key) => {
248
+ // assert.typeOf(key, 'string');
249
+ // assert.typeOf(serviceList[key], 'string');
250
+ // });
251
+ // });
252
+ // });
253
+
254
+ // describe('#fetchClientRegionInfo', () => {
255
+ // beforeEach(() => {
256
+ // services.webex.config = {
257
+ // services: {
258
+ // discovery: {
259
+ // sqdiscovery: 'https://test.ciscospark.com/v1/region',
260
+ // },
261
+ // },
262
+ // };
263
+ // });
264
+
265
+ // it('successfully resolves with undefined if fetch request failed', () => {
266
+ // webex.request = sinon.stub().returns(Promise.reject());
267
+
268
+ // return services.fetchClientRegionInfo().then((r) => {
269
+ // assert.isUndefined(r);
270
+ // });
271
+ // });
272
+
273
+ // it('successfully resolves with true if fetch request succeeds', () => {
274
+ // webex.request = sinon.stub().returns(Promise.resolve({body: true}));
275
+
276
+ // return services.fetchClientRegionInfo().then((r) => {
277
+ // assert.equal(r, true);
278
+ // assert.calledWith(webex.request, {
279
+ // uri: 'https://test.ciscospark.com/v1/region',
280
+ // addAuthHeader: false,
281
+ // headers: {'spark-user-agent': null},
282
+ // timeout: 5000,
283
+ // });
284
+ // });
285
+ // });
286
+ // });
287
+
288
+ // describe('#getMeetingPreferences', () => {
289
+ // it('Fetch login users information ', async () => {
290
+ // const userPreferences = {userPreferences: 'userPreferences'};
291
+
292
+ // webex.request = sinon.stub().returns(Promise.resolve({body: userPreferences}));
293
+
294
+ // const res = await services.getMeetingPreferences();
295
+
296
+ // assert.calledWith(webex.request, {
297
+ // method: 'GET',
298
+ // service: 'hydra',
299
+ // resource: 'meetingPreferences',
300
+ // });
301
+ // assert.isDefined(res);
302
+ // assert.equal(res, userPreferences);
303
+ // });
304
+
305
+ // it('Resolve getMeetingPreferences if the api request fails ', async () => {
306
+ // webex.request = sinon.stub().returns(Promise.reject());
307
+
308
+ // const res = await services.getMeetingPreferences();
309
+
310
+ // assert.calledWith(webex.request, {
311
+ // method: 'GET',
312
+ // service: 'hydra',
313
+ // resource: 'meetingPreferences',
314
+ // });
315
+ // assert.isUndefined(res);
316
+ // });
317
+ // });
318
+
319
+ // describe('#updateCatalog', () => {
320
+ // it('updates the catalog', async () => {
321
+ // const serviceGroup = 'postauth';
322
+ // const hostmap = {hostmap: 'hostmap'};
323
+
324
+ // services._formatReceivedHostmap = sinon.stub().returns({some: 'hostmap'});
325
+
326
+ // catalog.updateServiceUrls = sinon.stub().returns(Promise.resolve({some: 'value'}));
327
+
328
+ // const result = await services.updateCatalog(serviceGroup, hostmap);
329
+
330
+ // assert.calledWith(services._formatReceivedHostmap, hostmap);
331
+
332
+ // assert.calledWith(catalog.updateServiceUrls, serviceGroup, {some: 'hostmap'});
333
+
334
+ // assert.deepEqual(result, {some: 'value'});
335
+ // });
336
+ // });
337
+
338
+ // describe('#_fetchNewServiceHostmap()', () => {
339
+ // beforeEach(() => {
340
+ // sinon.spy(webex.internal.newMetrics.callDiagnosticLatencies, 'measureLatency');
341
+ // });
342
+
343
+ // afterEach(() => {
344
+ // sinon.restore();
345
+ // });
346
+
347
+ // it('checks service request resolves', async () => {
348
+ // const mapResponse = 'map response';
349
+
350
+ // sinon.stub(services, '_formatReceivedHostmap').resolves(mapResponse);
351
+ // sinon.stub(services, 'request').resolves({});
352
+
353
+ // const mapResult = await services._fetchNewServiceHostmap({from: 'limited'});
354
+
355
+ // assert.deepEqual(mapResult, mapResponse);
356
+
357
+ // assert.calledOnceWithExactly(services.request, {
358
+ // method: 'GET',
359
+ // service: 'u2c',
360
+ // resource: '/limited/catalog',
361
+ // qs: {format: 'hostmap'},
362
+ // });
363
+ // assert.calledOnceWithExactly(
364
+ // webex.internal.newMetrics.callDiagnosticLatencies.measureLatency,
365
+ // sinon.match.func,
366
+ // 'internal.get.u2c.time'
367
+ // );
368
+ // });
369
+
370
+ // it('checks service request rejects', async () => {
371
+ // const error = new Error('some error');
372
+
373
+ // sinon.spy(services, '_formatReceivedHostmap');
374
+ // sinon.stub(services, 'request').rejects(error);
375
+
376
+ // const promise = services._fetchNewServiceHostmap({from: 'limited'});
377
+ // const rejectedValue = await assert.isRejected(promise);
378
+
379
+ // assert.deepEqual(rejectedValue, error);
380
+
381
+ // assert.notCalled(services._formatReceivedHostmap);
382
+
383
+ // assert.calledOnceWithExactly(services.request, {
384
+ // method: 'GET',
385
+ // service: 'u2c',
386
+ // resource: '/limited/catalog',
387
+ // qs: {format: 'hostmap'},
388
+ // });
389
+ // assert.calledOnceWithExactly(
390
+ // webex.internal.newMetrics.callDiagnosticLatencies.measureLatency,
391
+ // sinon.match.func,
392
+ // 'internal.get.u2c.time'
393
+ // );
394
+ // });
395
+ // });
396
+
397
+ // describe('replaceHostFromHostmap', () => {
398
+ // it('returns the same uri if the hostmap is not set', () => {
399
+ // services._hostCatalog = null;
400
+
401
+ // const uri = 'http://example.com';
402
+
403
+ // assert.equal(services.replaceHostFromHostmap(uri), uri);
404
+ // });
405
+
406
+ // it('returns the same uri if the hostmap does not contain the host', () => {
407
+ // services._hostCatalog = {
408
+ // 'not-example.com': [
409
+ // {
410
+ // host: 'example-1.com',
411
+ // ttl: -1,
412
+ // priority: 5,
413
+ // id: '0:0:0:example',
414
+ // },
415
+ // ],
416
+ // };
417
+
418
+ // const uri = 'http://example.com';
419
+
420
+ // assert.equal(services.replaceHostFromHostmap(uri), uri);
421
+ // });
422
+
423
+ // it('returns the original uri if the hostmap has no hosts for the host', () => {
424
+ // services._hostCatalog = {
425
+ // 'example.com': [],
426
+ // };
427
+
428
+ // const uri = 'http://example.com';
429
+
430
+ // assert.equal(services.replaceHostFromHostmap(uri), uri);
431
+ // });
432
+
433
+ // it('returns the replaces the host in the uri with the host from the hostmap', () => {
434
+ // services._hostCatalog = {
435
+ // 'example.com': [
436
+ // {
437
+ // host: 'example-1.com',
438
+ // ttl: -1,
439
+ // priority: 5,
440
+ // id: '0:0:0:example',
441
+ // },
442
+ // ],
443
+ // };
444
+
445
+ // const uri = 'http://example.com/somepath';
446
+
447
+ // assert.equal(services.replaceHostFromHostmap(uri), 'http://example-1.com/somepath');
448
+ // });
449
+ // });
450
+
451
+ describe('#_formatReceivedHostmap()', () => {
452
+ let serviceHostmap;
453
+ let formattedHM;
454
+
455
+ beforeEach(() => {
456
+ serviceHostmap = serviceHostmapV2;
457
+ });
458
+
459
+ it('creates a formmatted hostmap that contains the same amount of entries as the original received hostmap', () => {
460
+ formattedHM = services._formatReceivedHostmap(serviceHostmap);
461
+
462
+ assert(
463
+ serviceHostmap.services.length >= formattedHM.length,
464
+ 'length is not equal or less than'
465
+ );
466
+ });
467
+
468
+ it('has all keys in host map hosts', () => {
469
+ formattedHM = services._formatReceivedHostmap(serviceHostmap);
470
+
471
+ formattedHM.forEach((service) => {
472
+ assert.hasAllKeys(
473
+ service,
474
+ ['id', 'serviceName', 'serviceUrls'],
475
+ `${service.serviceName} has an invalid host shape`
476
+ );
477
+ service.serviceUrls.forEach((serviceUrl) => {
478
+ assert.hasAllKeys(
479
+ serviceUrl,
480
+ ['host', 'baseUrl', 'priority'],
481
+ `${service.serviceName} has an invalid host shape`
482
+ );
483
+ });
484
+ });
485
+ });
486
+
487
+ it('creates a formmated host map containing all received host map service entries', () => {
488
+ formattedHM = services._formatReceivedHostmap(serviceHostmap);
489
+
490
+ formattedHM.forEach((service) => {
491
+ const foundServiceKey = Object.keys(serviceHostmap.activeServices).find(
492
+ (key) => service.serviceName === key
493
+ );
494
+
495
+ assert.isDefined(foundServiceKey);
496
+ });
497
+ });
498
+
499
+ it('creates the expected formatted host map', () => {
500
+ formattedHM = services._formatReceivedHostmap(serviceHostmap);
501
+
502
+ assert.deepEqual(formattedHM, formattedServiceHostmapV2);
503
+ });
504
+
505
+ it('has hostCatalog updated', () => {
506
+ services._services = [
507
+ {id: 'urn:TEAM:us-east-2_a:conversation'},
508
+ {id: 'test-left-over-services'},
509
+ ];
510
+ services._formatReceivedHostmap(serviceHostmap);
511
+
512
+ assert.deepStrictEqual(services._services, [
513
+ ...serviceHostmapV2.services,
514
+ {id: 'test-left-over-services'},
515
+ ]);
516
+ });
517
+ });
518
+
519
+ // describe('#updateCredentialsConfig()', () => {
520
+ // // updateCredentialsConfig must remove `/` if exist. so expected serviceList must be.
521
+ // const expectedServiceList = {
522
+ // idbroker: 'https://idbroker.webex.com',
523
+ // identity: 'https://identity.webex.com',
524
+ // };
525
+
526
+ // beforeEach(async () => {
527
+ // const servicesList = {
528
+ // idbroker: 'https://idbroker.webex.com',
529
+ // identity: 'https://identity.webex.com/',
530
+ // };
531
+
532
+ // catalog.list = sinon.stub().returns(servicesList);
533
+ // await services.updateCredentialsConfig();
534
+ // });
535
+
536
+ // it('sets the idbroker url properly when trailing slash is not present', () => {
537
+ // assert.equal(webex.config.credentials.idbroker.url, expectedServiceList.idbroker);
538
+ // });
539
+
540
+ // it('sets the identity url properly when a trailing slash is present', () => {
541
+ // assert.equal(webex.config.credentials.identity.url, expectedServiceList.identity);
542
+ // });
543
+
544
+ // it('sets the authorize url properly when authorization string is not provided', () => {
545
+ // assert.equal(
546
+ // webex.config.credentials.authorizeUrl,
547
+ // `${expectedServiceList.idbroker}/idb/oauth2/v1/authorize`
548
+ // );
549
+ // });
550
+
551
+ // it('should retain the authorize url property when authorization string is provided', () => {
552
+ // const authUrl = 'http://example-auth-url.com/resource';
553
+
554
+ // webex.config.credentials.authorizationString = authUrl;
555
+ // webex.config.credentials.authorizeUrl = authUrl;
556
+
557
+ // services.updateCredentialsConfig();
558
+
559
+ // assert.equal(webex.config.credentials.authorizeUrl, authUrl);
560
+ // });
561
+ // });
562
+ });
563
+ });
564
+ /* eslint-enable no-underscore-dangle */