Skip to main content

mockforge_bench/conformance/
spec_driven.rs

1//! Spec-driven conformance testing
2//!
3//! Analyzes the user's OpenAPI spec to determine which features their API uses,
4//! then generates k6 conformance tests against their real endpoints.
5
6use super::generator::ConformanceConfig;
7use super::schema_validator::SchemaValidatorGenerator;
8use super::spec::ConformanceFeature;
9use crate::error::Result;
10use crate::request_gen::RequestGenerator;
11use crate::spec_parser::ApiOperation;
12use openapiv3::{
13    OpenAPI, Operation, Parameter, ParameterSchemaOrContent, ReferenceOr, RequestBody, Response,
14    Schema, SchemaKind, SecurityScheme, StringFormat, Type, VariantOrUnknownOrEmpty,
15};
16use std::collections::HashSet;
17
18/// Resolve `$ref` references against the OpenAPI components
19mod ref_resolver {
20    use super::*;
21
22    pub fn resolve_parameter<'a>(
23        param_ref: &'a ReferenceOr<Parameter>,
24        spec: &'a OpenAPI,
25    ) -> Option<&'a Parameter> {
26        match param_ref {
27            ReferenceOr::Item(param) => Some(param),
28            ReferenceOr::Reference { reference } => {
29                let name = reference.strip_prefix("#/components/parameters/")?;
30                let components = spec.components.as_ref()?;
31                match components.parameters.get(name)? {
32                    ReferenceOr::Item(param) => Some(param),
33                    ReferenceOr::Reference {
34                        reference: inner_ref,
35                    } => {
36                        // One level of recursive resolution
37                        let inner_name = inner_ref.strip_prefix("#/components/parameters/")?;
38                        match components.parameters.get(inner_name)? {
39                            ReferenceOr::Item(param) => Some(param),
40                            ReferenceOr::Reference { .. } => None,
41                        }
42                    }
43                }
44            }
45        }
46    }
47
48    pub fn resolve_request_body<'a>(
49        body_ref: &'a ReferenceOr<RequestBody>,
50        spec: &'a OpenAPI,
51    ) -> Option<&'a RequestBody> {
52        match body_ref {
53            ReferenceOr::Item(body) => Some(body),
54            ReferenceOr::Reference { reference } => {
55                let name = reference.strip_prefix("#/components/requestBodies/")?;
56                let components = spec.components.as_ref()?;
57                match components.request_bodies.get(name)? {
58                    ReferenceOr::Item(body) => Some(body),
59                    ReferenceOr::Reference {
60                        reference: inner_ref,
61                    } => {
62                        // One level of recursive resolution
63                        let inner_name = inner_ref.strip_prefix("#/components/requestBodies/")?;
64                        match components.request_bodies.get(inner_name)? {
65                            ReferenceOr::Item(body) => Some(body),
66                            ReferenceOr::Reference { .. } => None,
67                        }
68                    }
69                }
70            }
71        }
72    }
73
74    pub fn resolve_schema<'a>(
75        schema_ref: &'a ReferenceOr<Schema>,
76        spec: &'a OpenAPI,
77    ) -> Option<&'a Schema> {
78        resolve_schema_with_visited(schema_ref, spec, &mut HashSet::new())
79    }
80
81    fn resolve_schema_with_visited<'a>(
82        schema_ref: &'a ReferenceOr<Schema>,
83        spec: &'a OpenAPI,
84        visited: &mut HashSet<String>,
85    ) -> Option<&'a Schema> {
86        match schema_ref {
87            ReferenceOr::Item(schema) => Some(schema),
88            ReferenceOr::Reference { reference } => {
89                if !visited.insert(reference.clone()) {
90                    return None; // Cycle detected
91                }
92                let name = reference.strip_prefix("#/components/schemas/")?;
93                let components = spec.components.as_ref()?;
94                let nested = components.schemas.get(name)?;
95                resolve_schema_with_visited(nested, spec, visited)
96            }
97        }
98    }
99
100    /// Resolve a boxed schema reference (used by array items and object properties)
101    pub fn resolve_boxed_schema<'a>(
102        schema_ref: &'a ReferenceOr<Box<Schema>>,
103        spec: &'a OpenAPI,
104    ) -> Option<&'a Schema> {
105        match schema_ref {
106            ReferenceOr::Item(schema) => Some(schema.as_ref()),
107            ReferenceOr::Reference { reference } => {
108                // Delegate to the regular schema resolver
109                let name = reference.strip_prefix("#/components/schemas/")?;
110                let components = spec.components.as_ref()?;
111                let nested = components.schemas.get(name)?;
112                resolve_schema_with_visited(nested, spec, &mut HashSet::new())
113            }
114        }
115    }
116
117    pub fn resolve_response<'a>(
118        resp_ref: &'a ReferenceOr<Response>,
119        spec: &'a OpenAPI,
120    ) -> Option<&'a Response> {
121        match resp_ref {
122            ReferenceOr::Item(resp) => Some(resp),
123            ReferenceOr::Reference { reference } => {
124                let name = reference.strip_prefix("#/components/responses/")?;
125                let components = spec.components.as_ref()?;
126                match components.responses.get(name)? {
127                    ReferenceOr::Item(resp) => Some(resp),
128                    ReferenceOr::Reference {
129                        reference: inner_ref,
130                    } => {
131                        // One level of recursive resolution
132                        let inner_name = inner_ref.strip_prefix("#/components/responses/")?;
133                        match components.responses.get(inner_name)? {
134                            ReferenceOr::Item(resp) => Some(resp),
135                            ReferenceOr::Reference { .. } => None,
136                        }
137                    }
138                }
139            }
140        }
141    }
142}
143
144/// Resolved security scheme details for an operation
145#[derive(Debug, Clone)]
146pub enum SecuritySchemeInfo {
147    /// HTTP Bearer token
148    Bearer,
149    /// HTTP Basic auth
150    Basic,
151    /// API Key in header, query, or cookie
152    ApiKey {
153        location: ApiKeyLocation,
154        name: String,
155    },
156}
157
158/// Where an API key is transmitted
159#[derive(Debug, Clone, PartialEq)]
160pub enum ApiKeyLocation {
161    Header,
162    Query,
163    Cookie,
164}
165
166/// An API operation annotated with the conformance features it exercises
167#[derive(Debug, Clone)]
168pub struct AnnotatedOperation {
169    pub path: String,
170    pub method: String,
171    pub features: Vec<ConformanceFeature>,
172    pub request_body_content_type: Option<String>,
173    pub sample_body: Option<String>,
174    pub query_params: Vec<(String, String)>,
175    pub header_params: Vec<(String, String)>,
176    pub path_params: Vec<(String, String)>,
177    /// Response schema for validation (JSON string of the schema)
178    pub response_schema: Option<Schema>,
179    /// Security scheme details resolved from the OpenAPI spec
180    pub security_schemes: Vec<SecuritySchemeInfo>,
181}
182
183/// Generates spec-driven conformance k6 scripts
184pub struct SpecDrivenConformanceGenerator {
185    config: ConformanceConfig,
186    operations: Vec<AnnotatedOperation>,
187}
188
189impl SpecDrivenConformanceGenerator {
190    pub fn new(config: ConformanceConfig, operations: Vec<AnnotatedOperation>) -> Self {
191        Self { config, operations }
192    }
193
194    /// Annotate a list of API operations with conformance features
195    pub fn annotate_operations(
196        operations: &[ApiOperation],
197        spec: &OpenAPI,
198    ) -> Vec<AnnotatedOperation> {
199        operations.iter().map(|op| Self::annotate_operation(op, spec)).collect()
200    }
201
202    /// Analyze an operation and determine which conformance features it exercises
203    fn annotate_operation(op: &ApiOperation, spec: &OpenAPI) -> AnnotatedOperation {
204        let mut features = Vec::new();
205        let mut query_params = Vec::new();
206        let mut header_params = Vec::new();
207        let mut path_params = Vec::new();
208
209        // Detect HTTP method feature
210        match op.method.to_uppercase().as_str() {
211            "GET" => features.push(ConformanceFeature::MethodGet),
212            "POST" => features.push(ConformanceFeature::MethodPost),
213            "PUT" => features.push(ConformanceFeature::MethodPut),
214            "PATCH" => features.push(ConformanceFeature::MethodPatch),
215            "DELETE" => features.push(ConformanceFeature::MethodDelete),
216            "HEAD" => features.push(ConformanceFeature::MethodHead),
217            "OPTIONS" => features.push(ConformanceFeature::MethodOptions),
218            _ => {}
219        }
220
221        // Detect parameter features (resolves $ref)
222        for param_ref in &op.operation.parameters {
223            if let Some(param) = ref_resolver::resolve_parameter(param_ref, spec) {
224                Self::annotate_parameter(
225                    param,
226                    spec,
227                    &mut features,
228                    &mut query_params,
229                    &mut header_params,
230                    &mut path_params,
231                );
232            }
233        }
234
235        // Detect path parameters from the path template itself
236        for segment in op.path.split('/') {
237            if segment.starts_with('{') && segment.ends_with('}') {
238                let name = &segment[1..segment.len() - 1];
239                // Only add if not already found from parameters
240                if !path_params.iter().any(|(n, _)| n == name) {
241                    path_params.push((name.to_string(), "test-value".to_string()));
242                    // Determine type from path params we didn't already handle
243                    if !features.contains(&ConformanceFeature::PathParamString)
244                        && !features.contains(&ConformanceFeature::PathParamInteger)
245                    {
246                        features.push(ConformanceFeature::PathParamString);
247                    }
248                }
249            }
250        }
251
252        // Detect request body features (resolves $ref)
253        let mut request_body_content_type = None;
254        let mut sample_body = None;
255
256        let resolved_body = op
257            .operation
258            .request_body
259            .as_ref()
260            .and_then(|b| ref_resolver::resolve_request_body(b, spec));
261
262        if let Some(body) = resolved_body {
263            for (content_type, _media) in &body.content {
264                match content_type.as_str() {
265                    "application/json" => {
266                        features.push(ConformanceFeature::BodyJson);
267                        request_body_content_type = Some("application/json".to_string());
268                        // Generate sample body from schema
269                        if let Ok(template) = RequestGenerator::generate_template(op) {
270                            if let Some(body_val) = &template.body {
271                                sample_body = Some(body_val.to_string());
272                            }
273                        }
274                    }
275                    "application/x-www-form-urlencoded" => {
276                        features.push(ConformanceFeature::BodyFormUrlencoded);
277                        request_body_content_type =
278                            Some("application/x-www-form-urlencoded".to_string());
279                    }
280                    "multipart/form-data" => {
281                        features.push(ConformanceFeature::BodyMultipart);
282                        request_body_content_type = Some("multipart/form-data".to_string());
283                    }
284                    _ => {}
285                }
286            }
287
288            // Detect schema features in request body (resolves $ref in schema)
289            if let Some(media) = body.content.get("application/json") {
290                if let Some(schema_ref) = &media.schema {
291                    if let Some(schema) = ref_resolver::resolve_schema(schema_ref, spec) {
292                        Self::annotate_schema(schema, spec, &mut features);
293                    }
294                }
295            }
296        }
297
298        // Detect response code features
299        Self::annotate_responses(&op.operation, spec, &mut features);
300
301        // Extract response schema for validation (resolves $ref)
302        let response_schema = Self::extract_response_schema(&op.operation, spec);
303        if response_schema.is_some() {
304            features.push(ConformanceFeature::ResponseValidation);
305        }
306
307        // Detect content negotiation (response with multiple content types)
308        Self::annotate_content_negotiation(&op.operation, spec, &mut features);
309
310        // Detect security features and resolve scheme details
311        let mut security_schemes = Vec::new();
312        Self::annotate_security(&op.operation, spec, &mut features, &mut security_schemes);
313
314        // Deduplicate features
315        features.sort_by_key(|f| f.check_name());
316        features.dedup_by_key(|f| f.check_name());
317
318        AnnotatedOperation {
319            path: op.path.clone(),
320            method: op.method.to_uppercase(),
321            features,
322            request_body_content_type,
323            sample_body,
324            query_params,
325            header_params,
326            path_params,
327            response_schema,
328            security_schemes,
329        }
330    }
331
332    /// Annotate parameter features
333    fn annotate_parameter(
334        param: &Parameter,
335        spec: &OpenAPI,
336        features: &mut Vec<ConformanceFeature>,
337        query_params: &mut Vec<(String, String)>,
338        header_params: &mut Vec<(String, String)>,
339        path_params: &mut Vec<(String, String)>,
340    ) {
341        let (location, data) = match param {
342            Parameter::Query { parameter_data, .. } => ("query", parameter_data),
343            Parameter::Path { parameter_data, .. } => ("path", parameter_data),
344            Parameter::Header { parameter_data, .. } => ("header", parameter_data),
345            Parameter::Cookie { .. } => {
346                features.push(ConformanceFeature::CookieParam);
347                return;
348            }
349        };
350
351        // Detect type from schema
352        let is_integer = Self::param_schema_is_integer(data, spec);
353        let is_array = Self::param_schema_is_array(data, spec);
354
355        // Generate sample value
356        let sample = if is_integer {
357            "42".to_string()
358        } else if is_array {
359            "a,b".to_string()
360        } else {
361            "test-value".to_string()
362        };
363
364        match location {
365            "path" => {
366                if is_integer {
367                    features.push(ConformanceFeature::PathParamInteger);
368                } else {
369                    features.push(ConformanceFeature::PathParamString);
370                }
371                path_params.push((data.name.clone(), sample));
372            }
373            "query" => {
374                if is_array {
375                    features.push(ConformanceFeature::QueryParamArray);
376                } else if is_integer {
377                    features.push(ConformanceFeature::QueryParamInteger);
378                } else {
379                    features.push(ConformanceFeature::QueryParamString);
380                }
381                query_params.push((data.name.clone(), sample));
382            }
383            "header" => {
384                features.push(ConformanceFeature::HeaderParam);
385                header_params.push((data.name.clone(), sample));
386            }
387            _ => {}
388        }
389
390        // Check for constraint features on the parameter (resolves $ref)
391        if let ParameterSchemaOrContent::Schema(schema_ref) = &data.format {
392            if let Some(schema) = ref_resolver::resolve_schema(schema_ref, spec) {
393                Self::annotate_schema(schema, spec, features);
394            }
395        }
396
397        // Required/optional
398        if data.required {
399            features.push(ConformanceFeature::ConstraintRequired);
400        } else {
401            features.push(ConformanceFeature::ConstraintOptional);
402        }
403    }
404
405    fn param_schema_is_integer(data: &openapiv3::ParameterData, spec: &OpenAPI) -> bool {
406        if let ParameterSchemaOrContent::Schema(schema_ref) = &data.format {
407            if let Some(schema) = ref_resolver::resolve_schema(schema_ref, spec) {
408                return matches!(&schema.schema_kind, SchemaKind::Type(Type::Integer(_)));
409            }
410        }
411        false
412    }
413
414    fn param_schema_is_array(data: &openapiv3::ParameterData, spec: &OpenAPI) -> bool {
415        if let ParameterSchemaOrContent::Schema(schema_ref) = &data.format {
416            if let Some(schema) = ref_resolver::resolve_schema(schema_ref, spec) {
417                return matches!(&schema.schema_kind, SchemaKind::Type(Type::Array(_)));
418            }
419        }
420        false
421    }
422
423    /// Annotate schema-level features (types, composition, formats, constraints)
424    fn annotate_schema(schema: &Schema, spec: &OpenAPI, features: &mut Vec<ConformanceFeature>) {
425        match &schema.schema_kind {
426            SchemaKind::Type(Type::String(s)) => {
427                features.push(ConformanceFeature::SchemaString);
428                // Check format
429                match &s.format {
430                    VariantOrUnknownOrEmpty::Item(StringFormat::Date) => {
431                        features.push(ConformanceFeature::FormatDate);
432                    }
433                    VariantOrUnknownOrEmpty::Item(StringFormat::DateTime) => {
434                        features.push(ConformanceFeature::FormatDateTime);
435                    }
436                    VariantOrUnknownOrEmpty::Unknown(fmt) => match fmt.as_str() {
437                        "email" => features.push(ConformanceFeature::FormatEmail),
438                        "uuid" => features.push(ConformanceFeature::FormatUuid),
439                        "uri" | "url" => features.push(ConformanceFeature::FormatUri),
440                        "ipv4" => features.push(ConformanceFeature::FormatIpv4),
441                        "ipv6" => features.push(ConformanceFeature::FormatIpv6),
442                        _ => {}
443                    },
444                    _ => {}
445                }
446                // Check constraints
447                if s.pattern.is_some() {
448                    features.push(ConformanceFeature::ConstraintPattern);
449                }
450                if !s.enumeration.is_empty() {
451                    features.push(ConformanceFeature::ConstraintEnum);
452                }
453                if s.min_length.is_some() || s.max_length.is_some() {
454                    features.push(ConformanceFeature::ConstraintMinMax);
455                }
456            }
457            SchemaKind::Type(Type::Integer(i)) => {
458                features.push(ConformanceFeature::SchemaInteger);
459                if i.minimum.is_some() || i.maximum.is_some() {
460                    features.push(ConformanceFeature::ConstraintMinMax);
461                }
462                if !i.enumeration.is_empty() {
463                    features.push(ConformanceFeature::ConstraintEnum);
464                }
465            }
466            SchemaKind::Type(Type::Number(n)) => {
467                features.push(ConformanceFeature::SchemaNumber);
468                if n.minimum.is_some() || n.maximum.is_some() {
469                    features.push(ConformanceFeature::ConstraintMinMax);
470                }
471            }
472            SchemaKind::Type(Type::Boolean(_)) => {
473                features.push(ConformanceFeature::SchemaBoolean);
474            }
475            SchemaKind::Type(Type::Array(arr)) => {
476                features.push(ConformanceFeature::SchemaArray);
477                if let Some(item_ref) = &arr.items {
478                    if let Some(item_schema) = ref_resolver::resolve_boxed_schema(item_ref, spec) {
479                        Self::annotate_schema(item_schema, spec, features);
480                    }
481                }
482            }
483            SchemaKind::Type(Type::Object(obj)) => {
484                features.push(ConformanceFeature::SchemaObject);
485                // Check required fields
486                if !obj.required.is_empty() {
487                    features.push(ConformanceFeature::ConstraintRequired);
488                }
489                // Walk properties (resolves $ref)
490                for (_name, prop_ref) in &obj.properties {
491                    if let Some(prop_schema) = ref_resolver::resolve_boxed_schema(prop_ref, spec) {
492                        Self::annotate_schema(prop_schema, spec, features);
493                    }
494                }
495            }
496            SchemaKind::OneOf { .. } => {
497                features.push(ConformanceFeature::CompositionOneOf);
498            }
499            SchemaKind::AnyOf { .. } => {
500                features.push(ConformanceFeature::CompositionAnyOf);
501            }
502            SchemaKind::AllOf { .. } => {
503                features.push(ConformanceFeature::CompositionAllOf);
504            }
505            _ => {}
506        }
507    }
508
509    /// Detect response code features (resolves $ref in responses)
510    fn annotate_responses(
511        operation: &Operation,
512        spec: &OpenAPI,
513        features: &mut Vec<ConformanceFeature>,
514    ) {
515        for (status_code, resp_ref) in &operation.responses.responses {
516            // Only count features for responses that actually resolve
517            if ref_resolver::resolve_response(resp_ref, spec).is_some() {
518                match status_code {
519                    openapiv3::StatusCode::Code(200) => {
520                        features.push(ConformanceFeature::Response200)
521                    }
522                    openapiv3::StatusCode::Code(201) => {
523                        features.push(ConformanceFeature::Response201)
524                    }
525                    openapiv3::StatusCode::Code(204) => {
526                        features.push(ConformanceFeature::Response204)
527                    }
528                    openapiv3::StatusCode::Code(400) => {
529                        features.push(ConformanceFeature::Response400)
530                    }
531                    openapiv3::StatusCode::Code(404) => {
532                        features.push(ConformanceFeature::Response404)
533                    }
534                    _ => {}
535                }
536            }
537        }
538    }
539
540    /// Extract the response schema for the primary success response (200 or 201)
541    /// Resolves $ref for both the response and the schema within it.
542    fn extract_response_schema(operation: &Operation, spec: &OpenAPI) -> Option<Schema> {
543        // Try 200 first, then 201
544        for code in [200u16, 201] {
545            if let Some(resp_ref) =
546                operation.responses.responses.get(&openapiv3::StatusCode::Code(code))
547            {
548                if let Some(response) = ref_resolver::resolve_response(resp_ref, spec) {
549                    if let Some(media) = response.content.get("application/json") {
550                        if let Some(schema_ref) = &media.schema {
551                            if let Some(schema) = ref_resolver::resolve_schema(schema_ref, spec) {
552                                return Some(schema.clone());
553                            }
554                        }
555                    }
556                }
557            }
558        }
559        None
560    }
561
562    /// Detect content negotiation: response supports multiple content types
563    fn annotate_content_negotiation(
564        operation: &Operation,
565        spec: &OpenAPI,
566        features: &mut Vec<ConformanceFeature>,
567    ) {
568        for (_status_code, resp_ref) in &operation.responses.responses {
569            if let Some(response) = ref_resolver::resolve_response(resp_ref, spec) {
570                if response.content.len() > 1 {
571                    features.push(ConformanceFeature::ContentNegotiation);
572                    return; // Only need to detect once per operation
573                }
574            }
575        }
576    }
577
578    /// Detect security scheme features.
579    /// Checks operation-level security first, falling back to global security requirements.
580    /// Resolves scheme names against SecurityScheme definitions in components.
581    fn annotate_security(
582        operation: &Operation,
583        spec: &OpenAPI,
584        features: &mut Vec<ConformanceFeature>,
585        security_schemes: &mut Vec<SecuritySchemeInfo>,
586    ) {
587        // Use operation-level security if present, otherwise fall back to global
588        let security_reqs = operation.security.as_ref().or(spec.security.as_ref());
589
590        if let Some(security) = security_reqs {
591            for security_req in security {
592                for scheme_name in security_req.keys() {
593                    // Try to resolve the scheme from components for accurate type detection
594                    if let Some(resolved) = Self::resolve_security_scheme(scheme_name, spec) {
595                        match resolved {
596                            SecurityScheme::HTTP { ref scheme, .. } => {
597                                if scheme.eq_ignore_ascii_case("bearer") {
598                                    features.push(ConformanceFeature::SecurityBearer);
599                                    security_schemes.push(SecuritySchemeInfo::Bearer);
600                                } else if scheme.eq_ignore_ascii_case("basic") {
601                                    features.push(ConformanceFeature::SecurityBasic);
602                                    security_schemes.push(SecuritySchemeInfo::Basic);
603                                }
604                            }
605                            SecurityScheme::APIKey { location, name, .. } => {
606                                features.push(ConformanceFeature::SecurityApiKey);
607                                let loc = match location {
608                                    openapiv3::APIKeyLocation::Query => ApiKeyLocation::Query,
609                                    openapiv3::APIKeyLocation::Header => ApiKeyLocation::Header,
610                                    openapiv3::APIKeyLocation::Cookie => ApiKeyLocation::Cookie,
611                                };
612                                security_schemes.push(SecuritySchemeInfo::ApiKey {
613                                    location: loc,
614                                    name: name.clone(),
615                                });
616                            }
617                            // OAuth2 and OpenIDConnect don't map to our current feature set
618                            _ => {}
619                        }
620                    } else {
621                        // Fallback: heuristic name matching for unresolvable schemes
622                        let name_lower = scheme_name.to_lowercase();
623                        if name_lower.contains("bearer") || name_lower.contains("jwt") {
624                            features.push(ConformanceFeature::SecurityBearer);
625                            security_schemes.push(SecuritySchemeInfo::Bearer);
626                        } else if name_lower.contains("api") && name_lower.contains("key") {
627                            features.push(ConformanceFeature::SecurityApiKey);
628                            security_schemes.push(SecuritySchemeInfo::ApiKey {
629                                location: ApiKeyLocation::Header,
630                                name: "X-API-Key".to_string(),
631                            });
632                        } else if name_lower.contains("basic") {
633                            features.push(ConformanceFeature::SecurityBasic);
634                            security_schemes.push(SecuritySchemeInfo::Basic);
635                        }
636                    }
637                }
638            }
639        }
640    }
641
642    /// Resolve a security scheme name to its SecurityScheme definition
643    fn resolve_security_scheme<'a>(name: &str, spec: &'a OpenAPI) -> Option<&'a SecurityScheme> {
644        let components = spec.components.as_ref()?;
645        match components.security_schemes.get(name)? {
646            ReferenceOr::Item(scheme) => Some(scheme),
647            ReferenceOr::Reference { .. } => None,
648        }
649    }
650
651    /// Returns the number of operations being tested
652    pub fn operation_count(&self) -> usize {
653        self.operations.len()
654    }
655
656    /// Generate the k6 conformance script.
657    /// Returns (script, check_count) where check_count is the number of unique checks emitted.
658    pub fn generate(&self) -> Result<(String, usize)> {
659        let mut script = String::with_capacity(16384);
660
661        // Imports
662        script.push_str("import http from 'k6/http';\n");
663        script.push_str("import { check, group } from 'k6';\n\n");
664
665        // Tell k6 that all HTTP status codes are "expected" in conformance mode.
666        // Without this, k6 counts 4xx responses (e.g. intentional 404 tests) as
667        // http_req_failed errors, producing a misleading error rate percentage.
668        script.push_str(
669            "http.setResponseCallback(http.expectedStatuses({ min: 100, max: 599 }));\n\n",
670        );
671
672        // Options
673        script.push_str("export const options = {\n");
674        script.push_str("  vus: 1,\n");
675        script.push_str("  iterations: 1,\n");
676        if self.config.skip_tls_verify {
677            script.push_str("  insecureSkipTLSVerify: true,\n");
678        }
679        script.push_str("  thresholds: {\n");
680        script.push_str("    checks: ['rate>0'],\n");
681        script.push_str("  },\n");
682        script.push_str("};\n\n");
683
684        // Base URL (includes base_path if configured)
685        script.push_str(&format!("const BASE_URL = '{}';\n\n", self.config.effective_base_url()));
686        script.push_str("const JSON_HEADERS = { 'Content-Type': 'application/json' };\n\n");
687
688        // Failure detail collector — logs req/res info for failed checks via console.log
689        // (k6's handleSummary runs in a separate JS context, so we can't use module-level arrays)
690        script.push_str("function __captureFailure(checkName, res, expected) {\n");
691        script.push_str("  let bodyStr = '';\n");
692        script.push_str("  try { bodyStr = res.body ? res.body.substring(0, 2000) : ''; } catch(e) { bodyStr = '<unreadable>'; }\n");
693        script.push_str("  let reqHeaders = {};\n");
694        script.push_str(
695            "  if (res.request && res.request.headers) { reqHeaders = res.request.headers; }\n",
696        );
697        script.push_str("  let reqBody = '';\n");
698        script.push_str("  if (res.request && res.request.body) { try { reqBody = res.request.body.substring(0, 2000); } catch(e) {} }\n");
699        script.push_str("  console.log('MOCKFORGE_FAILURE:' + JSON.stringify({\n");
700        script.push_str("    check: checkName,\n");
701        script.push_str("    request: {\n");
702        script.push_str("      method: res.request ? res.request.method : 'unknown',\n");
703        script.push_str("      url: res.request ? res.request.url : res.url || 'unknown',\n");
704        script.push_str("      headers: reqHeaders,\n");
705        script.push_str("      body: reqBody,\n");
706        script.push_str("    },\n");
707        script.push_str("    response: {\n");
708        script.push_str("      status: res.status,\n");
709        script.push_str("      headers: res.headers ? Object.fromEntries(Object.entries(res.headers).slice(0, 20)) : {},\n");
710        script.push_str("      body: bodyStr,\n");
711        script.push_str("    },\n");
712        script.push_str("    expected: expected,\n");
713        script.push_str("  }));\n");
714        script.push_str("}\n\n");
715
716        // Default function
717        script.push_str("export default function () {\n");
718
719        if self.config.has_cookie_header() {
720            script.push_str(
721                "  // Clear cookie jar to prevent server Set-Cookie from duplicating custom Cookie header\n",
722            );
723            script.push_str("  http.cookieJar().clear(BASE_URL);\n\n");
724        }
725
726        // Group operations by category
727        let mut category_ops: std::collections::BTreeMap<
728            &'static str,
729            Vec<(&AnnotatedOperation, &ConformanceFeature)>,
730        > = std::collections::BTreeMap::new();
731
732        for op in &self.operations {
733            for feature in &op.features {
734                let category = feature.category();
735                if self.config.should_include_category(category) {
736                    category_ops.entry(category).or_default().push((op, feature));
737                }
738            }
739        }
740
741        // Emit grouped tests
742        let mut total_checks = 0usize;
743        for (category, ops) in &category_ops {
744            script.push_str(&format!("  group('{}', function () {{\n", category));
745
746            if self.config.all_operations {
747                // All-operations mode: test every operation, using path-qualified check names
748                let mut emitted_checks: HashSet<String> = HashSet::new();
749                for (op, feature) in ops {
750                    let qualified = format!("{}:{}", feature.check_name(), op.path);
751                    if emitted_checks.insert(qualified.clone()) {
752                        self.emit_check_named(&mut script, op, feature, &qualified);
753                        total_checks += 1;
754                    }
755                }
756            } else {
757                // Default: one representative operation per feature, with path-qualified
758                // check names so failures identify which endpoint was tested.
759                let mut emitted_features: HashSet<&str> = HashSet::new();
760                for (op, feature) in ops {
761                    if emitted_features.insert(feature.check_name()) {
762                        let qualified = format!("{}:{}", feature.check_name(), op.path);
763                        self.emit_check_named(&mut script, op, feature, &qualified);
764                        total_checks += 1;
765                    }
766                }
767            }
768
769            script.push_str("  });\n\n");
770        }
771
772        // Custom checks from YAML file
773        if let Some(custom_group) = self.config.generate_custom_group()? {
774            script.push_str(&custom_group);
775        }
776
777        script.push_str("}\n\n");
778
779        // handleSummary
780        self.generate_handle_summary(&mut script);
781
782        Ok((script, total_checks))
783    }
784
785    /// Emit a single k6 check for an operation + feature with a custom check name
786    fn emit_check_named(
787        &self,
788        script: &mut String,
789        op: &AnnotatedOperation,
790        feature: &ConformanceFeature,
791        check_name: &str,
792    ) {
793        // Escape single quotes in check name since it's embedded in JS single-quoted strings
794        let check_name = check_name.replace('\'', "\\'");
795        let check_name = check_name.as_str();
796
797        script.push_str("    {\n");
798
799        // Build the URL path with parameters substituted
800        let mut url_path = op.path.clone();
801        for (name, value) in &op.path_params {
802            url_path = url_path.replace(&format!("{{{}}}", name), value);
803        }
804
805        // Build query string
806        if !op.query_params.is_empty() {
807            let qs: Vec<String> =
808                op.query_params.iter().map(|(k, v)| format!("{}={}", k, v)).collect();
809            url_path = format!("{}?{}", url_path, qs.join("&"));
810        }
811
812        let full_url = format!("${{BASE_URL}}{}", url_path);
813
814        // Build effective headers: merge spec-derived headers with custom headers.
815        // Custom headers override spec-derived ones with the same name.
816        let mut effective_headers = self.effective_headers(&op.header_params);
817
818        // For non-default response code checks, add header to tell the mock server
819        // which status code to return (the server defaults to the first declared status)
820        if matches!(feature, ConformanceFeature::Response400 | ConformanceFeature::Response404) {
821            let expected_code = match feature {
822                ConformanceFeature::Response400 => "400",
823                ConformanceFeature::Response404 => "404",
824                _ => unreachable!(),
825            };
826            effective_headers
827                .push(("X-Mockforge-Response-Status".to_string(), expected_code.to_string()));
828        }
829
830        // For security checks AND for all requests on endpoints with security requirements,
831        // inject auth credentials so the server doesn't reject with 401.
832        // Only inject if the user hasn't already provided the header via --custom-headers.
833        let needs_auth = matches!(
834            feature,
835            ConformanceFeature::SecurityBearer
836                | ConformanceFeature::SecurityBasic
837                | ConformanceFeature::SecurityApiKey
838        ) || !op.security_schemes.is_empty();
839
840        if needs_auth {
841            self.inject_security_headers(&op.security_schemes, &mut effective_headers);
842        }
843
844        let has_headers = !effective_headers.is_empty();
845        let headers_obj = if has_headers {
846            Self::format_headers(&effective_headers)
847        } else {
848            String::new()
849        };
850
851        // Determine HTTP method and emit request
852        match op.method.as_str() {
853            "GET" => {
854                if has_headers {
855                    script.push_str(&format!(
856                        "      let res = http.get(`{}`, {{ headers: {} }});\n",
857                        full_url, headers_obj
858                    ));
859                } else {
860                    script.push_str(&format!("      let res = http.get(`{}`);\n", full_url));
861                }
862            }
863            "POST" => {
864                self.emit_request_with_body(script, "post", &full_url, op, &effective_headers);
865            }
866            "PUT" => {
867                self.emit_request_with_body(script, "put", &full_url, op, &effective_headers);
868            }
869            "PATCH" => {
870                self.emit_request_with_body(script, "patch", &full_url, op, &effective_headers);
871            }
872            "DELETE" => {
873                if has_headers {
874                    script.push_str(&format!(
875                        "      let res = http.del(`{}`, null, {{ headers: {} }});\n",
876                        full_url, headers_obj
877                    ));
878                } else {
879                    script.push_str(&format!("      let res = http.del(`{}`);\n", full_url));
880                }
881            }
882            "HEAD" => {
883                if has_headers {
884                    script.push_str(&format!(
885                        "      let res = http.head(`{}`, {{ headers: {} }});\n",
886                        full_url, headers_obj
887                    ));
888                } else {
889                    script.push_str(&format!("      let res = http.head(`{}`);\n", full_url));
890                }
891            }
892            "OPTIONS" => {
893                if has_headers {
894                    script.push_str(&format!(
895                        "      let res = http.options(`{}`, null, {{ headers: {} }});\n",
896                        full_url, headers_obj
897                    ));
898                } else {
899                    script.push_str(&format!("      let res = http.options(`{}`);\n", full_url));
900                }
901            }
902            _ => {
903                if has_headers {
904                    script.push_str(&format!(
905                        "      let res = http.get(`{}`, {{ headers: {} }});\n",
906                        full_url, headers_obj
907                    ));
908                } else {
909                    script.push_str(&format!("      let res = http.get(`{}`);\n", full_url));
910                }
911            }
912        }
913
914        // Check: emit assertion based on feature type, with failure detail capture
915        if matches!(
916            feature,
917            ConformanceFeature::Response200
918                | ConformanceFeature::Response201
919                | ConformanceFeature::Response204
920                | ConformanceFeature::Response400
921                | ConformanceFeature::Response404
922        ) {
923            let expected_code = match feature {
924                ConformanceFeature::Response200 => 200,
925                ConformanceFeature::Response201 => 201,
926                ConformanceFeature::Response204 => 204,
927                ConformanceFeature::Response400 => 400,
928                ConformanceFeature::Response404 => 404,
929                _ => 200,
930            };
931            script.push_str(&format!(
932                "      {{ let ok = check(res, {{ '{}': (r) => r.status === {} }}); if (!ok) __captureFailure('{}', res, 'status === {}'); }}\n",
933                check_name, expected_code, check_name, expected_code
934            ));
935        } else if matches!(feature, ConformanceFeature::ResponseValidation) {
936            // Response schema validation — validate the response body against the schema
937            if let Some(schema) = &op.response_schema {
938                let validation_js = SchemaValidatorGenerator::generate_validation(schema);
939                script.push_str(&format!(
940                    "      try {{ let body = res.json(); {{ let ok = check(res, {{ '{}': (r) => ( {} ) }}); if (!ok) __captureFailure('{}', res, 'schema validation'); }} }} catch(e) {{ check(res, {{ '{}': () => false }}); __captureFailure('{}', res, 'JSON parse failed: ' + e.message); }}\n",
941                    check_name, validation_js, check_name, check_name, check_name
942                ));
943            }
944        } else if matches!(
945            feature,
946            ConformanceFeature::SecurityBearer
947                | ConformanceFeature::SecurityBasic
948                | ConformanceFeature::SecurityApiKey
949        ) {
950            // Security checks verify the server accepts the auth credentials (not 401/403)
951            script.push_str(&format!(
952                "      {{ let ok = check(res, {{ '{}': (r) => r.status >= 200 && r.status < 400 }}); if (!ok) __captureFailure('{}', res, 'status >= 200 && status < 400 (auth accepted)'); }}\n",
953                check_name, check_name
954            ));
955        } else {
956            script.push_str(&format!(
957                "      {{ let ok = check(res, {{ '{}': (r) => r.status >= 200 && r.status < 500 }}); if (!ok) __captureFailure('{}', res, 'status >= 200 && status < 500'); }}\n",
958                check_name, check_name
959            ));
960        }
961
962        // Clear cookie jar after each request to prevent Set-Cookie leaking
963        let has_cookie = self.config.has_cookie_header()
964            || effective_headers.iter().any(|(h, _)| h.eq_ignore_ascii_case("Cookie"));
965        if has_cookie {
966            script.push_str("      http.cookieJar().clear(BASE_URL);\n");
967        }
968
969        script.push_str("    }\n");
970    }
971
972    /// Emit an HTTP request with a body
973    fn emit_request_with_body(
974        &self,
975        script: &mut String,
976        method: &str,
977        url: &str,
978        op: &AnnotatedOperation,
979        effective_headers: &[(String, String)],
980    ) {
981        if let Some(body) = &op.sample_body {
982            let escaped_body = body.replace('\'', "\\'");
983            let headers = if !effective_headers.is_empty() {
984                format!(
985                    "Object.assign({{}}, JSON_HEADERS, {})",
986                    Self::format_headers(effective_headers)
987                )
988            } else {
989                "JSON_HEADERS".to_string()
990            };
991            script.push_str(&format!(
992                "      let res = http.{}(`{}`, '{}', {{ headers: {} }});\n",
993                method, url, escaped_body, headers
994            ));
995        } else if !effective_headers.is_empty() {
996            script.push_str(&format!(
997                "      let res = http.{}(`{}`, null, {{ headers: {} }});\n",
998                method,
999                url,
1000                Self::format_headers(effective_headers)
1001            ));
1002        } else {
1003            script.push_str(&format!("      let res = http.{}(`{}`, null);\n", method, url));
1004        }
1005    }
1006
1007    /// Build effective headers by merging spec-derived headers with custom headers.
1008    /// Custom headers override spec-derived ones with the same name (case-insensitive).
1009    /// Custom headers not in the spec are appended.
1010    fn effective_headers(&self, spec_headers: &[(String, String)]) -> Vec<(String, String)> {
1011        let custom = &self.config.custom_headers;
1012        if custom.is_empty() {
1013            return spec_headers.to_vec();
1014        }
1015
1016        let mut result: Vec<(String, String)> = Vec::new();
1017
1018        // Start with spec headers, replacing values if a custom header matches
1019        for (name, value) in spec_headers {
1020            if let Some((_, custom_val)) =
1021                custom.iter().find(|(cn, _)| cn.eq_ignore_ascii_case(name))
1022            {
1023                result.push((name.clone(), custom_val.clone()));
1024            } else {
1025                result.push((name.clone(), value.clone()));
1026            }
1027        }
1028
1029        // Append custom headers that aren't already in spec headers
1030        for (name, value) in custom {
1031            if !spec_headers.iter().any(|(sn, _)| sn.eq_ignore_ascii_case(name)) {
1032                result.push((name.clone(), value.clone()));
1033            }
1034        }
1035
1036        result
1037    }
1038
1039    /// Inject security headers based on resolved security scheme details.
1040    /// Respects user-provided custom headers (won't overwrite if already set).
1041    fn inject_security_headers(
1042        &self,
1043        schemes: &[SecuritySchemeInfo],
1044        headers: &mut Vec<(String, String)>,
1045    ) {
1046        let mut to_add: Vec<(String, String)> = Vec::new();
1047
1048        let has_header = |name: &str, headers: &[(String, String)]| {
1049            headers.iter().any(|(h, _)| h.eq_ignore_ascii_case(name))
1050                || self.config.custom_headers.iter().any(|(h, _)| h.eq_ignore_ascii_case(name))
1051        };
1052
1053        for scheme in schemes {
1054            match scheme {
1055                SecuritySchemeInfo::Bearer => {
1056                    if !has_header("Authorization", headers) {
1057                        // MockForge mock server accepts any Bearer token
1058                        to_add.push((
1059                            "Authorization".to_string(),
1060                            "Bearer mockforge-conformance-test-token".to_string(),
1061                        ));
1062                    }
1063                }
1064                SecuritySchemeInfo::Basic => {
1065                    if !has_header("Authorization", headers) {
1066                        let creds = self.config.basic_auth.as_deref().unwrap_or("test:test");
1067                        use base64::Engine;
1068                        let encoded =
1069                            base64::engine::general_purpose::STANDARD.encode(creds.as_bytes());
1070                        to_add.push(("Authorization".to_string(), format!("Basic {}", encoded)));
1071                    }
1072                }
1073                SecuritySchemeInfo::ApiKey { location, name } => match location {
1074                    ApiKeyLocation::Header => {
1075                        if !has_header(name, headers) {
1076                            let key = self
1077                                .config
1078                                .api_key
1079                                .as_deref()
1080                                .unwrap_or("mockforge-conformance-test-key");
1081                            to_add.push((name.clone(), key.to_string()));
1082                        }
1083                    }
1084                    ApiKeyLocation::Cookie => {
1085                        if !has_header("Cookie", headers) {
1086                            to_add.push((
1087                                "Cookie".to_string(),
1088                                format!("{}=mockforge-conformance-test-session", name),
1089                            ));
1090                        }
1091                    }
1092                    ApiKeyLocation::Query => {
1093                        // Query params are handled via URL, not headers — skip here
1094                    }
1095                },
1096            }
1097        }
1098
1099        headers.extend(to_add);
1100    }
1101
1102    /// Format header params as a JS object literal
1103    fn format_headers(headers: &[(String, String)]) -> String {
1104        let entries: Vec<String> = headers
1105            .iter()
1106            .map(|(k, v)| format!("'{}': '{}'", k, v.replace('\'', "\\'")))
1107            .collect();
1108        format!("{{ {} }}", entries.join(", "))
1109    }
1110
1111    /// handleSummary — same format as reference mode for report compatibility
1112    fn generate_handle_summary(&self, script: &mut String) {
1113        // Use absolute path for report output so k6 writes where the CLI expects
1114        let report_path = match &self.config.output_dir {
1115            Some(dir) => {
1116                let abs = std::fs::canonicalize(dir)
1117                    .unwrap_or_else(|_| dir.clone())
1118                    .join("conformance-report.json");
1119                abs.to_string_lossy().to_string()
1120            }
1121            None => "conformance-report.json".to_string(),
1122        };
1123
1124        script.push_str("export function handleSummary(data) {\n");
1125        script.push_str("  let checks = {};\n");
1126        script.push_str("  if (data.metrics && data.metrics.checks) {\n");
1127        script.push_str("    checks.overall_pass_rate = data.metrics.checks.values.rate;\n");
1128        script.push_str("  }\n");
1129        script.push_str("  let checkResults = {};\n");
1130        script.push_str("  function walkGroups(group) {\n");
1131        script.push_str("    if (group.checks) {\n");
1132        script.push_str("      for (let checkObj of group.checks) {\n");
1133        script.push_str("        checkResults[checkObj.name] = {\n");
1134        script.push_str("          passes: checkObj.passes,\n");
1135        script.push_str("          fails: checkObj.fails,\n");
1136        script.push_str("        };\n");
1137        script.push_str("      }\n");
1138        script.push_str("    }\n");
1139        script.push_str("    if (group.groups) {\n");
1140        script.push_str("      for (let subGroup of group.groups) {\n");
1141        script.push_str("        walkGroups(subGroup);\n");
1142        script.push_str("      }\n");
1143        script.push_str("    }\n");
1144        script.push_str("  }\n");
1145        script.push_str("  if (data.root_group) {\n");
1146        script.push_str("    walkGroups(data.root_group);\n");
1147        script.push_str("  }\n");
1148        script.push_str("  return {\n");
1149        script.push_str(&format!(
1150            "    '{}': JSON.stringify({{ checks: checkResults, overall: checks }}, null, 2),\n",
1151            report_path
1152        ));
1153        script.push_str("    stdout: textSummary(data, { indent: '  ', enableColors: true }),\n");
1154        script.push_str("  };\n");
1155        script.push_str("}\n\n");
1156        script.push_str("function textSummary(data, opts) {\n");
1157        script.push_str("  return JSON.stringify(data, null, 2);\n");
1158        script.push_str("}\n");
1159    }
1160}
1161
1162#[cfg(test)]
1163mod tests {
1164    use super::*;
1165    use openapiv3::{
1166        Operation, ParameterData, ParameterSchemaOrContent, PathStyle, Response, Schema,
1167        SchemaData, SchemaKind, StringType, Type,
1168    };
1169
1170    fn make_op(method: &str, path: &str, operation: Operation) -> ApiOperation {
1171        ApiOperation {
1172            method: method.to_string(),
1173            path: path.to_string(),
1174            operation,
1175            operation_id: None,
1176        }
1177    }
1178
1179    fn empty_spec() -> OpenAPI {
1180        OpenAPI::default()
1181    }
1182
1183    #[test]
1184    fn test_annotate_get_with_path_param() {
1185        let mut op = Operation::default();
1186        op.parameters.push(ReferenceOr::Item(Parameter::Path {
1187            parameter_data: ParameterData {
1188                name: "id".to_string(),
1189                description: None,
1190                required: true,
1191                deprecated: None,
1192                format: ParameterSchemaOrContent::Schema(ReferenceOr::Item(Schema {
1193                    schema_data: SchemaData::default(),
1194                    schema_kind: SchemaKind::Type(Type::String(StringType::default())),
1195                })),
1196                example: None,
1197                examples: Default::default(),
1198                explode: None,
1199                extensions: Default::default(),
1200            },
1201            style: PathStyle::Simple,
1202        }));
1203
1204        let api_op = make_op("get", "/users/{id}", op);
1205        let annotated = SpecDrivenConformanceGenerator::annotate_operation(&api_op, &empty_spec());
1206
1207        assert!(annotated.features.contains(&ConformanceFeature::MethodGet));
1208        assert!(annotated.features.contains(&ConformanceFeature::PathParamString));
1209        assert!(annotated.features.contains(&ConformanceFeature::ConstraintRequired));
1210        assert_eq!(annotated.path_params.len(), 1);
1211        assert_eq!(annotated.path_params[0].0, "id");
1212    }
1213
1214    #[test]
1215    fn test_annotate_post_with_json_body() {
1216        let mut op = Operation::default();
1217        let mut body = openapiv3::RequestBody {
1218            required: true,
1219            ..Default::default()
1220        };
1221        body.content
1222            .insert("application/json".to_string(), openapiv3::MediaType::default());
1223        op.request_body = Some(ReferenceOr::Item(body));
1224
1225        let api_op = make_op("post", "/items", op);
1226        let annotated = SpecDrivenConformanceGenerator::annotate_operation(&api_op, &empty_spec());
1227
1228        assert!(annotated.features.contains(&ConformanceFeature::MethodPost));
1229        assert!(annotated.features.contains(&ConformanceFeature::BodyJson));
1230    }
1231
1232    #[test]
1233    fn test_annotate_response_codes() {
1234        let mut op = Operation::default();
1235        op.responses
1236            .responses
1237            .insert(openapiv3::StatusCode::Code(200), ReferenceOr::Item(Response::default()));
1238        op.responses
1239            .responses
1240            .insert(openapiv3::StatusCode::Code(404), ReferenceOr::Item(Response::default()));
1241
1242        let api_op = make_op("get", "/items", op);
1243        let annotated = SpecDrivenConformanceGenerator::annotate_operation(&api_op, &empty_spec());
1244
1245        assert!(annotated.features.contains(&ConformanceFeature::Response200));
1246        assert!(annotated.features.contains(&ConformanceFeature::Response404));
1247    }
1248
1249    #[test]
1250    fn test_generate_spec_driven_script() {
1251        let config = ConformanceConfig {
1252            target_url: "http://localhost:3000".to_string(),
1253            api_key: None,
1254            basic_auth: None,
1255            skip_tls_verify: false,
1256            categories: None,
1257            base_path: None,
1258            custom_headers: vec![],
1259            output_dir: None,
1260            all_operations: false,
1261            custom_checks_file: None,
1262        };
1263
1264        let operations = vec![AnnotatedOperation {
1265            path: "/users/{id}".to_string(),
1266            method: "GET".to_string(),
1267            features: vec![
1268                ConformanceFeature::MethodGet,
1269                ConformanceFeature::PathParamString,
1270            ],
1271            request_body_content_type: None,
1272            sample_body: None,
1273            query_params: vec![],
1274            header_params: vec![],
1275            path_params: vec![("id".to_string(), "test-value".to_string())],
1276            response_schema: None,
1277            security_schemes: vec![],
1278        }];
1279
1280        let gen = SpecDrivenConformanceGenerator::new(config, operations);
1281        let (script, _check_count) = gen.generate().unwrap();
1282
1283        assert!(script.contains("import http from 'k6/http'"));
1284        assert!(script.contains("/users/test-value"));
1285        assert!(script.contains("param:path:string"));
1286        assert!(script.contains("method:GET"));
1287        assert!(script.contains("handleSummary"));
1288    }
1289
1290    #[test]
1291    fn test_generate_with_category_filter() {
1292        let config = ConformanceConfig {
1293            target_url: "http://localhost:3000".to_string(),
1294            api_key: None,
1295            basic_auth: None,
1296            skip_tls_verify: false,
1297            categories: Some(vec!["Parameters".to_string()]),
1298            base_path: None,
1299            custom_headers: vec![],
1300            output_dir: None,
1301            all_operations: false,
1302            custom_checks_file: None,
1303        };
1304
1305        let operations = vec![AnnotatedOperation {
1306            path: "/users/{id}".to_string(),
1307            method: "GET".to_string(),
1308            features: vec![
1309                ConformanceFeature::MethodGet,
1310                ConformanceFeature::PathParamString,
1311            ],
1312            request_body_content_type: None,
1313            sample_body: None,
1314            query_params: vec![],
1315            header_params: vec![],
1316            path_params: vec![("id".to_string(), "1".to_string())],
1317            response_schema: None,
1318            security_schemes: vec![],
1319        }];
1320
1321        let gen = SpecDrivenConformanceGenerator::new(config, operations);
1322        let (script, _check_count) = gen.generate().unwrap();
1323
1324        assert!(script.contains("group('Parameters'"));
1325        assert!(!script.contains("group('HTTP Methods'"));
1326    }
1327
1328    #[test]
1329    fn test_annotate_response_validation() {
1330        use openapiv3::ObjectType;
1331
1332        // Operation with a 200 response that has a JSON schema
1333        let mut op = Operation::default();
1334        let mut response = Response::default();
1335        let mut media = openapiv3::MediaType::default();
1336        let mut obj_type = ObjectType::default();
1337        obj_type.properties.insert(
1338            "name".to_string(),
1339            ReferenceOr::Item(Box::new(Schema {
1340                schema_data: SchemaData::default(),
1341                schema_kind: SchemaKind::Type(Type::String(StringType::default())),
1342            })),
1343        );
1344        obj_type.required = vec!["name".to_string()];
1345        media.schema = Some(ReferenceOr::Item(Schema {
1346            schema_data: SchemaData::default(),
1347            schema_kind: SchemaKind::Type(Type::Object(obj_type)),
1348        }));
1349        response.content.insert("application/json".to_string(), media);
1350        op.responses
1351            .responses
1352            .insert(openapiv3::StatusCode::Code(200), ReferenceOr::Item(response));
1353
1354        let api_op = make_op("get", "/users", op);
1355        let annotated = SpecDrivenConformanceGenerator::annotate_operation(&api_op, &empty_spec());
1356
1357        assert!(
1358            annotated.features.contains(&ConformanceFeature::ResponseValidation),
1359            "Should detect ResponseValidation when response has a JSON schema"
1360        );
1361        assert!(annotated.response_schema.is_some(), "Should extract the response schema");
1362
1363        // Verify generated script includes schema validation with try-catch
1364        let config = ConformanceConfig {
1365            target_url: "http://localhost:3000".to_string(),
1366            api_key: None,
1367            basic_auth: None,
1368            skip_tls_verify: false,
1369            categories: None,
1370            base_path: None,
1371            custom_headers: vec![],
1372            output_dir: None,
1373            all_operations: false,
1374            custom_checks_file: None,
1375        };
1376        let gen = SpecDrivenConformanceGenerator::new(config, vec![annotated]);
1377        let (script, _check_count) = gen.generate().unwrap();
1378
1379        assert!(
1380            script.contains("response:schema:validation"),
1381            "Script should contain the validation check name"
1382        );
1383        assert!(script.contains("try {"), "Script should wrap validation in try-catch");
1384        assert!(script.contains("res.json()"), "Script should parse response as JSON");
1385    }
1386
1387    #[test]
1388    fn test_annotate_global_security() {
1389        // Spec with global security requirement, operation without its own security
1390        let op = Operation::default();
1391        let mut spec = OpenAPI::default();
1392        let mut global_req = openapiv3::SecurityRequirement::new();
1393        global_req.insert("bearerAuth".to_string(), vec![]);
1394        spec.security = Some(vec![global_req]);
1395        // Define the security scheme in components
1396        let mut components = openapiv3::Components::default();
1397        components.security_schemes.insert(
1398            "bearerAuth".to_string(),
1399            ReferenceOr::Item(SecurityScheme::HTTP {
1400                scheme: "bearer".to_string(),
1401                bearer_format: Some("JWT".to_string()),
1402                description: None,
1403                extensions: Default::default(),
1404            }),
1405        );
1406        spec.components = Some(components);
1407
1408        let api_op = make_op("get", "/protected", op);
1409        let annotated = SpecDrivenConformanceGenerator::annotate_operation(&api_op, &spec);
1410
1411        assert!(
1412            annotated.features.contains(&ConformanceFeature::SecurityBearer),
1413            "Should detect SecurityBearer from global security + components"
1414        );
1415    }
1416
1417    #[test]
1418    fn test_annotate_security_scheme_resolution() {
1419        // Test that security scheme type is resolved from components, not just name heuristic
1420        let mut op = Operation::default();
1421        // Use a generic name that wouldn't match name heuristics
1422        let mut req = openapiv3::SecurityRequirement::new();
1423        req.insert("myAuth".to_string(), vec![]);
1424        op.security = Some(vec![req]);
1425
1426        let mut spec = OpenAPI::default();
1427        let mut components = openapiv3::Components::default();
1428        components.security_schemes.insert(
1429            "myAuth".to_string(),
1430            ReferenceOr::Item(SecurityScheme::APIKey {
1431                location: openapiv3::APIKeyLocation::Header,
1432                name: "X-API-Key".to_string(),
1433                description: None,
1434                extensions: Default::default(),
1435            }),
1436        );
1437        spec.components = Some(components);
1438
1439        let api_op = make_op("get", "/data", op);
1440        let annotated = SpecDrivenConformanceGenerator::annotate_operation(&api_op, &spec);
1441
1442        assert!(
1443            annotated.features.contains(&ConformanceFeature::SecurityApiKey),
1444            "Should detect SecurityApiKey from SecurityScheme::APIKey, not name heuristic"
1445        );
1446    }
1447
1448    #[test]
1449    fn test_annotate_content_negotiation() {
1450        let mut op = Operation::default();
1451        let mut response = Response::default();
1452        // Response with multiple content types
1453        response
1454            .content
1455            .insert("application/json".to_string(), openapiv3::MediaType::default());
1456        response
1457            .content
1458            .insert("application/xml".to_string(), openapiv3::MediaType::default());
1459        op.responses
1460            .responses
1461            .insert(openapiv3::StatusCode::Code(200), ReferenceOr::Item(response));
1462
1463        let api_op = make_op("get", "/items", op);
1464        let annotated = SpecDrivenConformanceGenerator::annotate_operation(&api_op, &empty_spec());
1465
1466        assert!(
1467            annotated.features.contains(&ConformanceFeature::ContentNegotiation),
1468            "Should detect ContentNegotiation when response has multiple content types"
1469        );
1470    }
1471
1472    #[test]
1473    fn test_no_content_negotiation_for_single_type() {
1474        let mut op = Operation::default();
1475        let mut response = Response::default();
1476        response
1477            .content
1478            .insert("application/json".to_string(), openapiv3::MediaType::default());
1479        op.responses
1480            .responses
1481            .insert(openapiv3::StatusCode::Code(200), ReferenceOr::Item(response));
1482
1483        let api_op = make_op("get", "/items", op);
1484        let annotated = SpecDrivenConformanceGenerator::annotate_operation(&api_op, &empty_spec());
1485
1486        assert!(
1487            !annotated.features.contains(&ConformanceFeature::ContentNegotiation),
1488            "Should NOT detect ContentNegotiation for a single content type"
1489        );
1490    }
1491
1492    #[test]
1493    fn test_spec_driven_with_base_path() {
1494        let annotated = AnnotatedOperation {
1495            path: "/users".to_string(),
1496            method: "GET".to_string(),
1497            features: vec![ConformanceFeature::MethodGet],
1498            path_params: vec![],
1499            query_params: vec![],
1500            header_params: vec![],
1501            request_body_content_type: None,
1502            sample_body: None,
1503            response_schema: None,
1504            security_schemes: vec![],
1505        };
1506        let config = ConformanceConfig {
1507            target_url: "https://192.168.2.86/".to_string(),
1508            api_key: None,
1509            basic_auth: None,
1510            skip_tls_verify: true,
1511            categories: None,
1512            base_path: Some("/api".to_string()),
1513            custom_headers: vec![],
1514            output_dir: None,
1515            all_operations: false,
1516            custom_checks_file: None,
1517        };
1518        let gen = SpecDrivenConformanceGenerator::new(config, vec![annotated]);
1519        let (script, _check_count) = gen.generate().unwrap();
1520
1521        assert!(
1522            script.contains("const BASE_URL = 'https://192.168.2.86/api'"),
1523            "BASE_URL should include the base_path. Got: {}",
1524            script.lines().find(|l| l.contains("BASE_URL")).unwrap_or("not found")
1525        );
1526    }
1527
1528    #[test]
1529    fn test_spec_driven_with_custom_headers() {
1530        let annotated = AnnotatedOperation {
1531            path: "/users".to_string(),
1532            method: "GET".to_string(),
1533            features: vec![ConformanceFeature::MethodGet],
1534            path_params: vec![],
1535            query_params: vec![],
1536            header_params: vec![
1537                ("X-Avi-Tenant".to_string(), "test-value".to_string()),
1538                ("X-CSRFToken".to_string(), "test-value".to_string()),
1539            ],
1540            request_body_content_type: None,
1541            sample_body: None,
1542            response_schema: None,
1543            security_schemes: vec![],
1544        };
1545        let config = ConformanceConfig {
1546            target_url: "https://192.168.2.86/".to_string(),
1547            api_key: None,
1548            basic_auth: None,
1549            skip_tls_verify: true,
1550            categories: None,
1551            base_path: Some("/api".to_string()),
1552            custom_headers: vec![
1553                ("X-Avi-Tenant".to_string(), "admin".to_string()),
1554                ("X-CSRFToken".to_string(), "real-csrf-token".to_string()),
1555                ("Cookie".to_string(), "sessionid=abc123".to_string()),
1556            ],
1557            output_dir: None,
1558            all_operations: false,
1559            custom_checks_file: None,
1560        };
1561        let gen = SpecDrivenConformanceGenerator::new(config, vec![annotated]);
1562        let (script, _check_count) = gen.generate().unwrap();
1563
1564        // Custom headers should override spec-derived test-value placeholders
1565        assert!(
1566            script.contains("'X-Avi-Tenant': 'admin'"),
1567            "Should use custom value for X-Avi-Tenant, not test-value"
1568        );
1569        assert!(
1570            script.contains("'X-CSRFToken': 'real-csrf-token'"),
1571            "Should use custom value for X-CSRFToken, not test-value"
1572        );
1573        // Custom headers not in spec should be appended
1574        assert!(
1575            script.contains("'Cookie': 'sessionid=abc123'"),
1576            "Should include Cookie header from custom_headers"
1577        );
1578        // test-value should NOT appear
1579        assert!(
1580            !script.contains("'test-value'"),
1581            "test-value placeholders should be replaced by custom values"
1582        );
1583    }
1584
1585    #[test]
1586    fn test_effective_headers_merging() {
1587        let config = ConformanceConfig {
1588            target_url: "http://localhost".to_string(),
1589            api_key: None,
1590            basic_auth: None,
1591            skip_tls_verify: false,
1592            categories: None,
1593            base_path: None,
1594            custom_headers: vec![
1595                ("X-Auth".to_string(), "real-token".to_string()),
1596                ("Cookie".to_string(), "session=abc".to_string()),
1597            ],
1598            output_dir: None,
1599            all_operations: false,
1600            custom_checks_file: None,
1601        };
1602        let gen = SpecDrivenConformanceGenerator::new(config, vec![]);
1603
1604        // Spec headers with a matching custom header
1605        let spec_headers = vec![
1606            ("X-Auth".to_string(), "test-value".to_string()),
1607            ("X-Other".to_string(), "keep-this".to_string()),
1608        ];
1609        let effective = gen.effective_headers(&spec_headers);
1610
1611        // X-Auth should be overridden
1612        assert_eq!(effective[0], ("X-Auth".to_string(), "real-token".to_string()));
1613        // X-Other should be kept as-is
1614        assert_eq!(effective[1], ("X-Other".to_string(), "keep-this".to_string()));
1615        // Cookie should be appended
1616        assert_eq!(effective[2], ("Cookie".to_string(), "session=abc".to_string()));
1617    }
1618}