Skip to content

Commit e606f6b

Browse files
committed
circular $ref expansion: fixed edge cases
* fixes go-openapi#94 * now expanded $ref's are always contained in the resulting document. All circular $ref that used to resolve to a remote $ref now resolve as a json pointer inside the expanded document. Pointer resolution prefers pointers to definitions. * added additional test case for remote cyclical $ref, from azure API * schema IDs are removed from the expanded spec: schemas expanded from some schema ID reference now refer to the new expanded root document. * circular IDs are resolved against the corresponding root document. > NOTE(1): uncovered pre-existing issue with nested schema ID involving cyclical references. > This case remains unsupported and is illustrated by test case: circular_test.go#L198 ("withID") > NOTE(2): pre-existing issue with non-deterministic expansion remains unsolved, > although the election of the replacing pointer inside the root document > somewhat reduces the scope of this problem. > > This case remains illustrated by a minimal test case: circular_test.go#L46 ("minimal"), > which expands correctly, but with changing results. > NOTE(3): notice that expansion is still not an idempotent transform, in the presence > of cyclical $ref's: another run on an expanded spec with remaining cyclical $ref > will expand further down and detect again the cycle. > > The result remains functionally correct, as illustrated by test case: circular_test.go#L168 ("CircularID"). > Notice that this test case reproduces a validation fixture from jsonschema test (passed by go-openapi/validate). Signed-off-by: Frederic BIDON <[email protected]>
1 parent efe8fb3 commit e606f6b

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

49 files changed

+21619
-436
lines changed

circular_test.go

+152-46
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,11 @@ import (
44
"encoding/json"
55
"io/ioutil"
66
"net/http"
7+
"net/http/httptest"
8+
"os"
79
"path/filepath"
10+
"regexp"
11+
"sort"
812
"testing"
913
"time"
1014

@@ -16,7 +20,8 @@ func TestExpandCircular_Issue3(t *testing.T) {
1620
jazon := expandThisOrDieTrying(t, "fixtures/expansion/overflow.json")
1721
require.NotEmpty(t, jazon)
1822

19-
// TODO: assert $ref
23+
// all $ref are in the root document
24+
assertRefInJSON(t, jazon, "#/definitions/")
2025
}
2126

2227
func TestExpandCircular_RefExpansion(t *testing.T) {
@@ -33,47 +38,41 @@ func TestExpandCircular_RefExpansion(t *testing.T) {
3338
schema := spec.Definitions["car"]
3439

3540
assert.NotPanics(t, func() {
36-
_, err := expandSchema(schema, []string{"#/definitions/car"}, resolver, basePath)
41+
_, err := expandSchema(schema, []string{"#/definitions/car"}, resolver, basePath, "/definitions/car")
3742
require.NoError(t, err)
3843
}, "Calling expand schema with circular refs, should not panic!")
3944
}
4045

41-
func TestExpandCircular_Spec2Expansion(t *testing.T) {
42-
// TODO: assert repeatable results (see commented section below)
43-
46+
func TestExpandCircular_Minimal(t *testing.T) {
4447
fixturePath := filepath.Join("fixtures", "expansion", "circular-minimal.json")
4548
jazon := expandThisOrDieTrying(t, fixturePath)
4649
require.NotEmpty(t, jazon)
4750

48-
// assert stripped $ref in result
4951
assert.NotContainsf(t, jazon, "circular-minimal.json#/",
5052
"expected %s to be expanded with stripped circular $ref", fixturePath)
5153

52-
fixturePath = "fixtures/expansion/circularSpec2.json"
53-
jazon = expandThisOrDieTrying(t, fixturePath)
54-
assert.NotEmpty(t, jazon)
55-
56-
assert.NotContainsf(t, jazon, "circularSpec.json#/",
57-
"expected %s to be expanded with stripped circular $ref", fixturePath)
58-
5954
/*
60-
61-
At the moment, the result of expanding circular references is not stable,
55+
At the moment, the result of expanding circular references is not stable (issue #93),
6256
when several cycles have intersections:
6357
the spec structure is randomly walked through and mutating as expansion is carried out.
6458
detected cycles in $ref are not necessarily the shortest matches.
6559
6660
This may result in different, functionally correct expanded specs (e.g. with same validations)
67-
68-
for i := 0; i < 1; i++ {
69-
bbb := expandThisOrDieTrying(t, fixturePath)
70-
t.Log(bbb)
71-
if !assert.JSONEqf(t, jazon, bbb, "on iteration %d, we should have stable expanded spec", i) {
72-
t.FailNow()
73-
return
74-
}
75-
}
7661
*/
62+
assertRefInJSON(t, jazon, "#/definitions/node") // NOTE: we are not sure which node definition is used
63+
}
64+
65+
func TestExpandCircular_Spec2Expansion(t *testing.T) {
66+
// assert stripped $ref in result
67+
68+
fixturePath := "fixtures/expansion/circularSpec2.json"
69+
jazon := expandThisOrDieTrying(t, fixturePath)
70+
assert.NotEmpty(t, jazon)
71+
72+
assert.NotContainsf(t, jazon, "circularSpec.json#/",
73+
"expected %s to be expanded with stripped circular $ref", fixturePath)
74+
75+
assertRefInJSON(t, jazon, "#/definitions/")
7776
}
7877

7978
func TestExpandCircular_MoreCircular(t *testing.T) {
@@ -89,22 +88,22 @@ func TestExpandCircular_MoreCircular(t *testing.T) {
8988
fixturePath := "fixtures/more_circulars/spec.json"
9089
jazon := expandThisOrDieTrying(t, fixturePath)
9190
require.NotEmpty(t, jazon)
92-
assertRefInJSON(t, jazon, "item.json#/item")
91+
assertRefInJSON(t, jazon, "#/responses/itemResponse/schema")
9392

9493
fixturePath = "fixtures/more_circulars/spec2.json"
9594
jazon = expandThisOrDieTrying(t, fixturePath)
9695
require.NotEmpty(t, jazon)
97-
assertRefInJSON(t, jazon, "item2.json#/item")
96+
assertRefInJSON(t, jazon, "#/responses/itemResponse/schema")
9897

9998
fixturePath = "fixtures/more_circulars/spec3.json"
10099
jazon = expandThisOrDieTrying(t, fixturePath)
101100
require.NotEmpty(t, jazon)
102-
assertRefInJSON(t, jazon, "item.json#/item")
101+
assertRefInJSON(t, jazon, "#/definitions/myItems")
103102

104103
fixturePath = "fixtures/more_circulars/spec4.json"
105104
jazon = expandThisOrDieTrying(t, fixturePath)
106105
require.NotEmpty(t, jazon)
107-
assertRefInJSON(t, jazon, "item4.json#/item")
106+
assertRefInJSON(t, jazon, "#/parameters/itemParameter/schema")
108107
}
109108

110109
func TestExpandCircular_Issue957(t *testing.T) {
@@ -175,30 +174,137 @@ func TestExpandCircular_RemoteCircularID(t *testing.T) {
175174
}()
176175
time.Sleep(100 * time.Millisecond)
177176

178-
fixturePath := "http://localhost:1234/tree"
179-
jazon := expandThisSchemaOrDieTrying(t, fixturePath)
177+
t.Run("CircularID", func(t *testing.T) {
178+
fixturePath := "http://localhost:1234/tree"
179+
jazon := expandThisSchemaOrDieTrying(t, fixturePath)
180+
181+
// all $ref are now in the single root
182+
assertRefInJSONRegexp(t, jazon, "(^#/definitions/node$)|(^#?$)") // root $ref should be '#' or ""
180183

181-
sch := new(Schema)
182-
require.NoError(t, json.Unmarshal([]byte(jazon), sch))
184+
sch := new(Schema)
185+
require.NoError(t, json.Unmarshal([]byte(jazon), sch))
183186

184-
require.NotPanics(t, func() {
185-
assert.NoError(t, ExpandSchemaWithBasePath(sch, nil, &ExpandOptions{}))
187+
// expand already expanded: this is not an idempotent operation: circular $ref
188+
// are expanded again until a (deeper) cycle is detected
189+
require.NoError(t, ExpandSchema(sch, nil, nil))
190+
191+
// expand already expanded
192+
require.NoError(t, ExpandSchema(sch, nil, nil))
193+
194+
// Empty base path fails:
195+
require.Error(t, ExpandSchemaWithBasePath(sch, nil, &ExpandOptions{}))
186196
})
187197

188-
fixturePath = "fixtures/more_circulars/with-id.json"
189-
jazon = expandThisOrDieTrying(t, fixturePath)
198+
t.Run("withID", func(t *testing.T) {
199+
// This test exhibits a broken feature when using nested schema ID
200+
const fixturePath = "fixtures/more_circulars/with-id.json"
201+
jazon := expandThisOrDieTrying(t, fixturePath)
202+
203+
// TODO(fred): the $ref expanded as: "$ref": "" is incorrect.
204+
assertRefInJSONRegexp(t, jazon, "(^#/definitions/)|(^#?$)")
205+
206+
// cannot guarantee that the circular will always hook on the same $ref
207+
// but we can assert that thre is only one
208+
//
209+
// TODO(fred): the expansion is incorrect (it was already, with an undetected empty $ref)
210+
// At the moment there is one single non-empty $ref (which is correct)
211+
// and one empty $ref (which is invalid)
212+
nonEmptyRef := regexp.MustCompile(`"\$ref":\s*"(.+)"`)
213+
m := nonEmptyRef.FindAllStringSubmatch(jazon, -1)
214+
require.NotEmpty(t, m)
215+
216+
refs := make(map[string]struct{}, 2)
217+
for _, matched := range m {
218+
subMatch := matched[1]
219+
refs[subMatch] = struct{}{}
220+
}
190221

191-
// cannot guarantee that the circular will always hook on the same $ref
192-
// but we can assert that there is only one
193-
m := rex.FindAllStringSubmatch(jazon, -1)
194-
require.NotEmpty(t, m)
222+
require.Len(t, refs, 1)
223+
})
224+
}
195225

196-
refs := make(map[string]struct{}, 5)
197-
for _, matched := range m {
198-
subMatch := matched[1]
199-
refs[subMatch] = struct{}{}
226+
func TestSortRefTracker(t *testing.T) {
227+
tracked := refTrackers{
228+
refTracker{Pointer: "/c/d/e"},
229+
refTracker{Pointer: "/definitions/x"},
230+
refTracker{Pointer: "/a/b/c/d"},
231+
refTracker{Pointer: "/b"},
232+
refTracker{Pointer: "/z"},
233+
refTracker{Pointer: "/definitions/a"},
200234
}
235+
sort.Sort(tracked)
236+
require.EqualValues(t, refTrackers{
237+
refTracker{Pointer: "/definitions/a"},
238+
refTracker{Pointer: "/definitions/x"},
239+
refTracker{Pointer: "/b"},
240+
refTracker{Pointer: "/z"},
241+
refTracker{Pointer: "/c/d/e"},
242+
refTracker{Pointer: "/a/b/c/d"},
243+
}, tracked)
244+
}
245+
246+
func TestRemoteExpandAzure(t *testing.T) {
247+
// local copy of : https://raw.githubusercontent.com/Azure/azure-rest-api-specs/master/specification/network/resource-manager/Microsoft.Network/stable/2020-04-01/publicIpAddress.json
248+
server := httptest.NewServer(http.FileServer(http.Dir("fixtures/azure")))
249+
defer server.Close()
250+
251+
jazon := expandThisOrDieTrying(t, server.URL+"/publicIpAddress.json")
252+
253+
assertRefInJSONRegexp(t, jazon, `^(#/definitions/)|(#/paths/.+/get/default/schema/properties/error)|(\./examples/)`)
254+
}
255+
256+
func TestDocRef(t *testing.T) {
257+
doc := []byte(`{
258+
"description": "root pointer ref",
259+
"schema": {
260+
"properties": {
261+
"foo": {"$ref": "#"}
262+
},
263+
"additionalProperties": false
264+
}
265+
}`)
266+
var schema Schema
267+
268+
require.NoError(t, json.Unmarshal(doc, &schema))
269+
270+
// expand from root
271+
require.NoError(t, ExpandSchema(&schema, &schema, nil))
272+
273+
jazon, err := json.MarshalIndent(schema, "", " ")
274+
require.NoError(t, err)
275+
276+
assertRefInJSONRegexp(t, string(jazon), `(^#$)|(^$)`)
201277

202-
// TODO(fred): the expansion is incorrect (it was already, with an undetected empty $ref)
203-
// require.Len(t, refs, 1)
278+
// expand from self
279+
require.NoError(t, ExpandSchema(&schema, nil, nil))
280+
281+
jazon, err = json.MarshalIndent(schema, "", " ")
282+
require.NoError(t, err)
283+
284+
assertRefInJSONRegexp(t, string(jazon), `(^#$)|(^$)`)
285+
286+
// expand from file
287+
temp, err := ioutil.TempFile(".", "test_doc_ref*.json")
288+
require.NoError(t, err)
289+
290+
file := temp.Name()
291+
defer func() {
292+
_ = os.Remove(file)
293+
}()
294+
_, err = temp.Write(doc)
295+
require.NoError(t, err)
296+
require.NoError(t, temp.Close())
297+
298+
require.NoError(t, ExpandSchemaWithBasePath(&schema, nil, &ExpandOptions{RelativeBase: file}))
299+
300+
jazon, err = json.MarshalIndent(schema, "", " ")
301+
require.NoError(t, err)
302+
303+
assertRefInJSONRegexp(t, string(jazon), `(^#$)|(^$)`)
304+
305+
ref := RefSchema("#")
306+
require.NoError(t, ExpandSchema(ref, &schema, nil))
307+
jazon, err = json.MarshalIndent(ref, "", " ")
308+
require.NoError(t, err)
309+
assertRefInJSONRegexp(t, string(jazon), `(^#$)|(^$)`)
204310
}

errors.go

+3
Original file line numberDiff line numberDiff line change
@@ -15,4 +15,7 @@ var (
1515

1616
// ErrExpandUnsupportedType indicates that $ref expansion is attempted on some invalid type
1717
ErrExpandUnsupportedType = errors.New("expand: unsupported type. Input should be of type *Parameter or *Response")
18+
19+
// ErrInternalRef indicates an internal error with $ref track. Signal this as a bug.
20+
ErrInternalRef = errors.New("circular $ref: expected circular to be found in tracker")
1821
)

0 commit comments

Comments
 (0)