mirror of
https://github.com/miniflux/v2.git
synced 2025-09-15 18:57:04 +00:00
test(integration): add tests for wallabag integration
This commit is contained in:
parent
622232bed1
commit
41611d6239
1 changed files with 321 additions and 0 deletions
321
internal/integration/wallabag/wallabag_test.go
Normal file
321
internal/integration/wallabag/wallabag_test.go
Normal file
|
@ -0,0 +1,321 @@
|
|||
// SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
|
||||
// SPDX-License-Identifier: Apache-2.0
|
||||
|
||||
package wallabag
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"io"
|
||||
"net/http"
|
||||
"net/http/httptest"
|
||||
"strings"
|
||||
"testing"
|
||||
)
|
||||
|
||||
func TestCreateEntry(t *testing.T) {
|
||||
entryURL := "https://example.com"
|
||||
entryTitle := "title"
|
||||
entryContent := "content"
|
||||
tags := "tag1,tag2,tag3"
|
||||
|
||||
tests := []struct {
|
||||
name string
|
||||
username string
|
||||
password string
|
||||
clientID string
|
||||
clientSecret string
|
||||
tags string
|
||||
onlyURL bool
|
||||
entryURL string
|
||||
entryTitle string
|
||||
entryContent string
|
||||
serverResponse func(w http.ResponseWriter, r *http.Request)
|
||||
wantErr bool
|
||||
errContains string
|
||||
}{
|
||||
{
|
||||
name: "successful entry creation with url only",
|
||||
wantErr: false,
|
||||
onlyURL: true,
|
||||
username: "username",
|
||||
password: "password",
|
||||
clientID: "clientId",
|
||||
clientSecret: "clientSecret",
|
||||
tags: tags,
|
||||
entryURL: entryURL,
|
||||
entryTitle: entryTitle,
|
||||
entryContent: entryContent,
|
||||
serverResponse: func(w http.ResponseWriter, r *http.Request) {
|
||||
if strings.Contains(r.URL.Path, "/oauth/v2/token") {
|
||||
// Return success response
|
||||
w.WriteHeader(http.StatusOK)
|
||||
json.NewEncoder(w).Encode(map[string]any{
|
||||
"access_token": "test-token",
|
||||
"expires_in": 3600,
|
||||
"refresh_token": "token",
|
||||
"scope": "scope",
|
||||
"token_type": "token_type",
|
||||
})
|
||||
return
|
||||
}
|
||||
// Verify authorization header
|
||||
auth := r.Header.Get("Authorization")
|
||||
if auth != "Bearer test-token" {
|
||||
t.Errorf("Expected Authorization header 'Bearer test-token', got %s", auth)
|
||||
}
|
||||
// Verify content type
|
||||
contentType := r.Header.Get("Content-Type")
|
||||
if contentType != "application/json" {
|
||||
t.Errorf("Expected Content-Type 'application/json', got %s", contentType)
|
||||
}
|
||||
// Parse and verify request
|
||||
body, _ := io.ReadAll(r.Body)
|
||||
var req map[string]any
|
||||
if err := json.Unmarshal(body, &req); err != nil {
|
||||
t.Errorf("Failed to parse request body: %v", err)
|
||||
}
|
||||
if requstEntryURL := req["url"]; requstEntryURL != entryURL {
|
||||
t.Errorf("Expected entryURL %s, got %s", entryURL, requstEntryURL)
|
||||
}
|
||||
if requestEntryTitle := req["title"]; requestEntryTitle != entryTitle {
|
||||
t.Errorf("Expected entryTitle %s, got %s", entryTitle, requestEntryTitle)
|
||||
}
|
||||
if _, ok := req["content"]; ok {
|
||||
t.Errorf("Expected entryContent to be empty, got value")
|
||||
}
|
||||
if requestTags := req["tags"]; requestTags != tags {
|
||||
t.Errorf("Expected tags %s, got %s", tags, requestTags)
|
||||
} // Return success response
|
||||
w.WriteHeader(http.StatusOK)
|
||||
},
|
||||
errContains: "",
|
||||
},
|
||||
{
|
||||
name: "successful entry creation with content",
|
||||
wantErr: false,
|
||||
onlyURL: false,
|
||||
username: "username",
|
||||
password: "password",
|
||||
clientID: "clientId",
|
||||
clientSecret: "clientSecret",
|
||||
tags: tags,
|
||||
entryURL: entryURL,
|
||||
entryTitle: entryTitle,
|
||||
entryContent: entryContent,
|
||||
serverResponse: func(w http.ResponseWriter, r *http.Request) {
|
||||
if strings.Contains(r.URL.Path, "/oauth/v2/token") {
|
||||
// Return success response
|
||||
w.WriteHeader(http.StatusOK)
|
||||
json.NewEncoder(w).Encode(map[string]any{
|
||||
"access_token": "test-token",
|
||||
"expires_in": 3600,
|
||||
"refresh_token": "token",
|
||||
"scope": "scope",
|
||||
"token_type": "token_type",
|
||||
})
|
||||
return
|
||||
}
|
||||
// Verify authorization header
|
||||
auth := r.Header.Get("Authorization")
|
||||
if auth != "Bearer test-token" {
|
||||
t.Errorf("Expected Authorization header 'Bearer test-token', got %s", auth)
|
||||
}
|
||||
// Verify content type
|
||||
contentType := r.Header.Get("Content-Type")
|
||||
if contentType != "application/json" {
|
||||
t.Errorf("Expected Content-Type 'application/json', got %s", contentType)
|
||||
}
|
||||
// Parse and verify request
|
||||
body, _ := io.ReadAll(r.Body)
|
||||
var req map[string]any
|
||||
if err := json.Unmarshal(body, &req); err != nil {
|
||||
t.Errorf("Failed to parse request body: %v", err)
|
||||
}
|
||||
if requstEntryURL := req["url"]; requstEntryURL != entryURL {
|
||||
t.Errorf("Expected entryURL %s, got %s", entryURL, requstEntryURL)
|
||||
}
|
||||
if requestEntryTitle := req["title"]; requestEntryTitle != entryTitle {
|
||||
t.Errorf("Expected entryTitle %s, got %s", entryTitle, requestEntryTitle)
|
||||
}
|
||||
if requestEntryContent := req["content"]; requestEntryContent != entryContent {
|
||||
t.Errorf("Expected entryURL %s, got %s", entryContent, requestEntryContent)
|
||||
}
|
||||
if requestTags := req["tags"]; requestTags != tags {
|
||||
t.Errorf("Expected tags %s, got %s", tags, requestTags)
|
||||
} // Return success response
|
||||
w.WriteHeader(http.StatusOK)
|
||||
},
|
||||
errContains: "",
|
||||
},
|
||||
{
|
||||
name: "failed when unable to decode accessToken response",
|
||||
wantErr: true,
|
||||
onlyURL: true,
|
||||
username: "username",
|
||||
password: "password",
|
||||
clientID: "clientId",
|
||||
clientSecret: "clientSecret",
|
||||
tags: tags,
|
||||
entryURL: entryURL,
|
||||
entryTitle: entryTitle,
|
||||
entryContent: entryContent,
|
||||
serverResponse: func(w http.ResponseWriter, r *http.Request) {
|
||||
if strings.Contains(r.URL.Path, "/oauth/v2/token") {
|
||||
// Return success response
|
||||
w.WriteHeader(http.StatusOK)
|
||||
w.Write([]byte("invalid json"))
|
||||
return
|
||||
}
|
||||
t.Error("Server should not be called when failed to get accessToken")
|
||||
},
|
||||
errContains: "unable to decode token response",
|
||||
},
|
||||
{
|
||||
name: "failed when saving entry",
|
||||
wantErr: true,
|
||||
onlyURL: true,
|
||||
username: "username",
|
||||
password: "password",
|
||||
clientID: "clientId",
|
||||
clientSecret: "clientSecret",
|
||||
tags: tags,
|
||||
entryURL: entryURL,
|
||||
entryTitle: entryTitle,
|
||||
entryContent: entryContent,
|
||||
serverResponse: func(w http.ResponseWriter, r *http.Request) {
|
||||
if strings.Contains(r.URL.Path, "/oauth/v2/token") {
|
||||
// Return success response
|
||||
w.WriteHeader(http.StatusOK)
|
||||
json.NewEncoder(w).Encode(map[string]any{
|
||||
"access_token": "test-token",
|
||||
"expires_in": 3600,
|
||||
"refresh_token": "token",
|
||||
"scope": "scope",
|
||||
"token_type": "token_type",
|
||||
})
|
||||
return
|
||||
}
|
||||
w.WriteHeader(http.StatusUnauthorized)
|
||||
},
|
||||
errContains: "unable to get save entry",
|
||||
},
|
||||
{
|
||||
name: "failure due to no accessToken",
|
||||
wantErr: true,
|
||||
onlyURL: false,
|
||||
username: "username",
|
||||
password: "password",
|
||||
clientID: "clientId",
|
||||
clientSecret: "clientSecret",
|
||||
tags: tags,
|
||||
entryURL: entryURL,
|
||||
entryTitle: entryTitle,
|
||||
entryContent: entryContent,
|
||||
serverResponse: func(w http.ResponseWriter, r *http.Request) {
|
||||
if strings.Contains(r.URL.Path, "/oauth/v2/token") {
|
||||
// Return error response
|
||||
w.WriteHeader(http.StatusUnauthorized)
|
||||
return
|
||||
}
|
||||
t.Error("Server should not be called when failed to get accessToken")
|
||||
},
|
||||
errContains: "unable to get access token",
|
||||
},
|
||||
{
|
||||
name: "failure due to missing client parameters",
|
||||
wantErr: true,
|
||||
onlyURL: false,
|
||||
tags: tags,
|
||||
entryURL: entryURL,
|
||||
entryTitle: entryTitle,
|
||||
entryContent: entryContent,
|
||||
serverResponse: func(w http.ResponseWriter, r *http.Request) {
|
||||
t.Error("Server should not be called when failed to get accessToken")
|
||||
},
|
||||
errContains: "wallabag: missing base URL, client ID, client secret, username or password",
|
||||
},
|
||||
}
|
||||
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
// Create test server if we have a server response function
|
||||
var serverURL string
|
||||
if tt.serverResponse != nil {
|
||||
server := httptest.NewServer(http.HandlerFunc(tt.serverResponse))
|
||||
defer server.Close()
|
||||
serverURL = server.URL
|
||||
}
|
||||
|
||||
// Create client with test server URL
|
||||
client := NewClient(serverURL, tt.clientID, tt.clientSecret, tt.username, tt.password, tt.tags, tt.onlyURL)
|
||||
|
||||
// Call CreateBookmark
|
||||
err := client.CreateEntry(tt.entryURL, tt.entryTitle, tt.entryContent)
|
||||
|
||||
// Check error expectations
|
||||
if tt.wantErr {
|
||||
if err == nil {
|
||||
t.Errorf("Expected error but got none")
|
||||
} else if tt.errContains != "" && !strings.Contains(err.Error(), tt.errContains) {
|
||||
t.Errorf("Expected error containing '%s', got '%s'", tt.errContains, err.Error())
|
||||
}
|
||||
} else {
|
||||
if err != nil {
|
||||
t.Errorf("Unexpected error: %v", err)
|
||||
}
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func TestNewClient(t *testing.T) {
|
||||
tests := []struct {
|
||||
name string
|
||||
baseURL string
|
||||
clientID string
|
||||
clientSecret string
|
||||
username string
|
||||
password string
|
||||
tags string
|
||||
onlyURL bool
|
||||
}{
|
||||
{
|
||||
name: "with all parameters",
|
||||
baseURL: "https://wallabag.example.com",
|
||||
clientID: "clientID",
|
||||
clientSecret: "clientSecret",
|
||||
username: "wallabag",
|
||||
password: "wallabag",
|
||||
tags: "",
|
||||
onlyURL: true,
|
||||
},
|
||||
}
|
||||
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
client := NewClient(tt.baseURL, tt.clientID, tt.clientSecret, tt.username, tt.password, tt.tags, tt.onlyURL)
|
||||
|
||||
if client.baseURL != tt.baseURL {
|
||||
t.Errorf("Expected.baseURL %s, got %s", tt.baseURL, client.baseURL)
|
||||
}
|
||||
if client.username != tt.username {
|
||||
t.Errorf("Expected username %s, got %s", tt.username, client.username)
|
||||
}
|
||||
if client.password != tt.password {
|
||||
t.Errorf("Expected password %s, got %s", tt.password, client.password)
|
||||
}
|
||||
if client.clientID != tt.clientID {
|
||||
t.Errorf("Expected clientID %s, got %s", tt.clientID, client.clientID)
|
||||
}
|
||||
if client.clientSecret != tt.clientSecret {
|
||||
t.Errorf("Expected clientSecret %s, got %s", tt.clientSecret, client.clientSecret)
|
||||
}
|
||||
if client.tags != tt.tags {
|
||||
t.Errorf("Expected tags %s, got %s", tt.tags, client.tags)
|
||||
}
|
||||
if client.onlyURL != tt.onlyURL {
|
||||
t.Errorf("Expected onlyURL %v, got %v", tt.onlyURL, client.onlyURL)
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue