From 35bfb0303b1d7bb7d234aa2fb20ed95a146adfb0 Mon Sep 17 00:00:00 2001 From: Joshua Ramon Enslin Date: Sun, 23 Feb 2025 03:56:00 +0100 Subject: [PATCH] Add functions: ValidateInstitutionId, ValidateUploadDir --- src/configloader/ValidateInstitutionId.go | 32 +++++++++ .../ValidateInstitutionId_test.go | 28 ++++++++ src/configloader/ValidateUploadDir.go | 35 ++++++++++ src/configloader/ValidateUploadDir_test.go | 61 +++++++++++++++++ src/configloader/configloader.go | 67 +++++++++++++++++++ 5 files changed, 223 insertions(+) create mode 100644 src/configloader/ValidateInstitutionId.go create mode 100644 src/configloader/ValidateInstitutionId_test.go create mode 100644 src/configloader/ValidateUploadDir.go create mode 100644 src/configloader/ValidateUploadDir_test.go create mode 100644 src/configloader/configloader.go diff --git a/src/configloader/ValidateInstitutionId.go b/src/configloader/ValidateInstitutionId.go new file mode 100644 index 0000000..fc3e40c --- /dev/null +++ b/src/configloader/ValidateInstitutionId.go @@ -0,0 +1,32 @@ +package configloader + +import ( + "errors" + "net/http" + "strconv" +) + +// Validates an institution ID. +// A valid institution ID returns a HTTP 200 response code when queried +// + "/institution/" + institution_id. +// Returns either the entered instance URL or an error. +func ValidateInstitutionId(institutionId int, instanceUrl string) (int, error) { + + if institutionId < 1 { + return 0, errors.New("Institution ID cannot be negative") + } + + resp, err := http.Get(instanceUrl + "/institution/" + strconv.Itoa(institutionId)) + if err != nil { + return 0, err + } + + if resp.StatusCode != 200 { + return 0, errors.New("The institution page does not respond with HTTP 200, the institution does not seem to exist") + } + + + + return institutionId, nil + +} diff --git a/src/configloader/ValidateInstitutionId_test.go b/src/configloader/ValidateInstitutionId_test.go new file mode 100644 index 0000000..2593442 --- /dev/null +++ b/src/configloader/ValidateInstitutionId_test.go @@ -0,0 +1,28 @@ +package configloader + +import ( + "testing" +) + +// Ensures institution ID cannot be negative. +// does not exist. +func TestValidateInstitutionIdReturnsErrorOnNegativeInput(t *testing.T) { + + _, err := ValidateInstitutionId(-1, "https://hessen.museum-digital.de") + + if err == nil { + t.Fatalf("ValidateInstitutionId() accepts should not accept negative IDs (test input: -1)") + } + +} + +// Ensures non-existing IDs are rejected. +func TestValidateInstitutionIdReturnsErrorOnNonExistingId(t *testing.T) { + + _, err := ValidateInstitutionId(300000, "https://hessen.museum-digital.de") + + if err == nil { + t.Fatalf("An institution 300000 should not exist in museum-digital:hessen (otherwise, adjust the test). A non-existing ID should be rejected.") + } + +} diff --git a/src/configloader/ValidateUploadDir.go b/src/configloader/ValidateUploadDir.go new file mode 100644 index 0000000..3323f89 --- /dev/null +++ b/src/configloader/ValidateUploadDir.go @@ -0,0 +1,35 @@ +package configloader + +import ( + "os" + "io/fs" + "errors" + "path/filepath" +) + +// Checks if a directory is the entered +// directory can be used as an source directory +// for export data. As such, it does need to +// exist, and it needs to not contain unexpected files. +// Returns the directory name or an error. +func ValidateUploadDir(path string) (string, error) { + + // Check the path actually exists + pathInfo, err := os.Stat(path) + if errors.Is(err, fs.ErrNotExist) { + return "", err + } + + // Check the input path is a directory + if !pathInfo.IsDir() { + return "", errors.New("The upload directory " + path + " is not a directory") + } + + // Return absolute path + absPath, absPathErr := filepath.Abs(path) + if (absPathErr != nil) { + return "", errors.New("Invalid path") + } + return absPath, nil + +} diff --git a/src/configloader/ValidateUploadDir_test.go b/src/configloader/ValidateUploadDir_test.go new file mode 100644 index 0000000..ffe612f --- /dev/null +++ b/src/configloader/ValidateUploadDir_test.go @@ -0,0 +1,61 @@ +package configloader + +import ( + "testing" + "os" + "path/filepath" +) + +// ValidateUploadDir() should return an error if the entered directory +// does not exist. +func TestValidateUploadDirFailsNonExistentDir(t *testing.T) { + + returnVal, err := ValidateUploadDir("/this-directory-surely-does-not-exist") + + if err == nil { + t.Fatalf("ValidateUploadDir() accepts non-existent directory") + } + if returnVal != "" { + t.Fatalf("Return valid must be empty on failure") + } + +} + +// Test to ensure that an error is thrown if a file is entered, not a directory. +func TestValidateUploadDirFailsWithDirContainingUnexpectedFiles(t *testing.T) { + + tmpDir := os.TempDir() + os.OpenFile(tmpDir + "/empty-file-for-testing-that-dirs-are-not-accepted.txt", os.O_RDONLY|os.O_CREATE, 0666) + + returnVal, err := ValidateUploadDir(tmpDir + "/empty-file-for-testing-that-dirs-are-not-accepted.txt") + + if err == nil { + t.Fatalf("ValidateUploadDir() accepts fails as upload directory") + } + if returnVal != "" { + t.Fatalf("Return valid must be empty on failure") + } + +} + +func TestValidateUploadDirSucceedsWithValidDir(t *testing.T) { + + tmpDir := os.TempDir() + testDir := filepath.Join(tmpDir, "/existing-dir-for-import") + mkdirErr := os.MkdirAll(testDir, os.ModePerm) + + if mkdirErr != nil { + panic("Test failure: Failed to create test dir") + } + + returnVal, err := ValidateUploadDir(tmpDir + "/existing-dir-for-import") + + if err != nil { + t.Fatalf("ValidateUploadDir() fails with an existing, valid directory") + } + if returnVal == "" { + t.Fatalf("Return valid must be empty on failure") + } + +} + diff --git a/src/configloader/configloader.go b/src/configloader/configloader.go new file mode 100644 index 0000000..9b18e33 --- /dev/null +++ b/src/configloader/configloader.go @@ -0,0 +1,67 @@ +package configloader + +type MDWebDavUploaderConfig struct { + InstanceLink string `json:"instance"` + Mail string `json:"mail"` + WebDavAuthToken string `json:"token"` + InstitutionId int `json:"institution_id"` + Parser string `json:"parser"` + MetadataFolder string `json:"metadata_folder"` + MediaFolder string `json:"media_folder"` + PublishOnImport bool `json:"visible"` +} + +type ParserListItem struct { + name string + +} + +// Returns a uniform filepath for the configuration of this tool. +// To be compatible across operating systems, this will be a JSON +// file in the same directory as the current programm. +func getConfigFilepath() string { + +} + +// Returns a uniform filepath for the cache for the list of +// available parsers. +func getParserCacheFilepath() string { + +} + +// Loads configuration from the configuration file (located using +// getConfigFilepath()). +func LoadFromFile() MDWebDavUploaderConfig { + +} + +// Stores a parser list to a cache file (located via +// getParserCacheFilepath()). +func StoreParserList(parserList []ParserListItem) { + +} + +// Returns a list of the available parsers. +func ListParsers() []ParserListItem { + +} + + +// Checks if inputParser is in the list of available parsers. +// Returns the parser name or an error. +func ValidateParser(inputParser string) (string, error) { + +} + +// Validates an input mail address. +// Returns the valid mail address or an eQueries therror. +func ValidateMail(mail string) (string, error) { + +} + +// Validates an entered instance URL. +// Returns the entered URL in a unified form (minus optional +// trailing slashes and the /musdb suffix) or an error. +func ValidateInstanceLink(instanceUrl string) (string, error) { + +}