diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..85e7c1d --- /dev/null +++ b/.gitignore @@ -0,0 +1 @@ +/.idea/ diff --git a/antifraud-validation-service/.gitignore b/antifraud-validation-service/.gitignore new file mode 100644 index 0000000..549e00a --- /dev/null +++ b/antifraud-validation-service/.gitignore @@ -0,0 +1,33 @@ +HELP.md +target/ +!.mvn/wrapper/maven-wrapper.jar +!**/src/main/**/target/ +!**/src/test/**/target/ + +### STS ### +.apt_generated +.classpath +.factorypath +.project +.settings +.springBeans +.sts4-cache + +### IntelliJ IDEA ### +.idea +*.iws +*.iml +*.ipr + +### NetBeans ### +/nbproject/private/ +/nbbuild/ +/dist/ +/nbdist/ +/.nb-gradle/ +build/ +!**/src/main/**/build/ +!**/src/test/**/build/ + +### VS Code ### +.vscode/ diff --git a/antifraud-validation-service/.mvn/wrapper/maven-wrapper.properties b/antifraud-validation-service/.mvn/wrapper/maven-wrapper.properties new file mode 100644 index 0000000..aeccdfd --- /dev/null +++ b/antifraud-validation-service/.mvn/wrapper/maven-wrapper.properties @@ -0,0 +1,18 @@ +# Licensed to the Apache Software Foundation (ASF) under one +# or more contributor license agreements. See the NOTICE file +# distributed with this work for additional information +# regarding copyright ownership. The ASF licenses this file +# to you under the Apache License, Version 2.0 (the +# "License"); you may not use this file except in compliance +# with the License. You may obtain a copy of the License at +# +# https://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, +# software distributed under the License is distributed on an +# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +# KIND, either express or implied. See the License for the +# specific language governing permissions and limitations +# under the License. +wrapperVersion=3.3.1 +distributionUrl=https://repo.maven.apache.org/maven2/org/apache/maven/apache-maven/3.9.6/apache-maven-3.9.6-bin.zip diff --git a/antifraud-validation-service/README.md b/antifraud-validation-service/README.md new file mode 100644 index 0000000..3672425 --- /dev/null +++ b/antifraud-validation-service/README.md @@ -0,0 +1,32 @@ +# Anti-Fraud Validation Service (AFVAL) + +## Description + +The Anti-Fraud Validation Service (AFVAL) is a microservice that evaluates the potential fraud level in newly created financial transactions. If the transaction amount exceeds 1000 (considered an anomalous case), the transaction is dismissed and automatically rejected. + +## Tech Details +This project utilizes several technologies and design patterns to achieve its objectives: + +- **EDA**: The service employs Event-Driven Architecture (EDA) to handle the transaction validation process. The service listens to events from the transaction management service and processes them accordingly. +- **Debezium**: Debezium, used with Kafka, captures when a transaction is created and propagates it to the anti-fraud validation service in real-time. +- **Kafka**: Kafka is used for event-driven architecture. The service produces events to notify the transaction management service about the transaction status. + +## Requisites and Pre-configurations +Before running the Anti-Fraud Validation Service, you need to ensure that the necessary services and configurations are set up. If not, follow these steps: +1. **Start the Docker Services**: The application requires several services to run, which are defined in the `docker-compose.yml` file. To start these services, navigate to the directory containing the `docker-compose.yml` file and run the following command: +```bash +docker-compose up +``` +2. **Configure Debezium**: After starting the docker services, debezium must be configured, this configuration is done by requesting the debezium connector to the Kafka Connect API. To do this, you can use the following command: +```bash +./init-debezium.sh +``` +3. **Start the Anti-Fraud Validation Service**: With the services running and Debezium configured, you can start the Anti-Fraud Validation Service in spring boot. +## Usage +The service does not provide a direct API for external access. It listens to events from the transaction management service and processes them accordingly, then it produces events to notify the transaction management service about the transaction status. + +# Diagram +![anti-fraud-validation-service](diagrams/antifraud_validation_path_diagram.png) + +# Glossary +**AFVAL**: Anti Fraud Validation Service feature code diff --git a/antifraud-validation-service/diagrams/antifraud_validation_path_diagram.png b/antifraud-validation-service/diagrams/antifraud_validation_path_diagram.png new file mode 100644 index 0000000..d6f79c1 Binary files /dev/null and b/antifraud-validation-service/diagrams/antifraud_validation_path_diagram.png differ diff --git a/antifraud-validation-service/mvnw b/antifraud-validation-service/mvnw new file mode 100644 index 0000000..ba9212a --- /dev/null +++ b/antifraud-validation-service/mvnw @@ -0,0 +1,250 @@ +#!/bin/sh +# ---------------------------------------------------------------------------- +# Licensed to the Apache Software Foundation (ASF) under one +# or more contributor license agreements. See the NOTICE file +# distributed with this work for additional information +# regarding copyright ownership. The ASF licenses this file +# to you under the Apache License, Version 2.0 (the +# "License"); you may not use this file except in compliance +# with the License. You may obtain a copy of the License at +# +# https://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, +# software distributed under the License is distributed on an +# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +# KIND, either express or implied. See the License for the +# specific language governing permissions and limitations +# under the License. +# ---------------------------------------------------------------------------- + +# ---------------------------------------------------------------------------- +# Apache Maven Wrapper startup batch script, version 3.3.1 +# +# Optional ENV vars +# ----------------- +# JAVA_HOME - location of a JDK home dir, required when download maven via java source +# MVNW_REPOURL - repo url base for downloading maven distribution +# MVNW_USERNAME/MVNW_PASSWORD - user and password for downloading maven +# MVNW_VERBOSE - true: enable verbose log; debug: trace the mvnw script; others: silence the output +# ---------------------------------------------------------------------------- + +set -euf +[ "${MVNW_VERBOSE-}" != debug ] || set -x + +# OS specific support. +native_path() { printf %s\\n "$1"; } +case "$(uname)" in +CYGWIN* | MINGW*) + [ -z "${JAVA_HOME-}" ] || JAVA_HOME="$(cygpath --unix "$JAVA_HOME")" + native_path() { cygpath --path --windows "$1"; } + ;; +esac + +# set JAVACMD and JAVACCMD +set_java_home() { + # For Cygwin and MinGW, ensure paths are in Unix format before anything is touched + if [ -n "${JAVA_HOME-}" ]; then + if [ -x "$JAVA_HOME/jre/sh/java" ]; then + # IBM's JDK on AIX uses strange locations for the executables + JAVACMD="$JAVA_HOME/jre/sh/java" + JAVACCMD="$JAVA_HOME/jre/sh/javac" + else + JAVACMD="$JAVA_HOME/bin/java" + JAVACCMD="$JAVA_HOME/bin/javac" + + if [ ! -x "$JAVACMD" ] || [ ! -x "$JAVACCMD" ]; then + echo "The JAVA_HOME environment variable is not defined correctly, so mvnw cannot run." >&2 + echo "JAVA_HOME is set to \"$JAVA_HOME\", but \"\$JAVA_HOME/bin/java\" or \"\$JAVA_HOME/bin/javac\" does not exist." >&2 + return 1 + fi + fi + else + JAVACMD="$( + 'set' +e + 'unset' -f command 2>/dev/null + 'command' -v java + )" || : + JAVACCMD="$( + 'set' +e + 'unset' -f command 2>/dev/null + 'command' -v javac + )" || : + + if [ ! -x "${JAVACMD-}" ] || [ ! -x "${JAVACCMD-}" ]; then + echo "The java/javac command does not exist in PATH nor is JAVA_HOME set, so mvnw cannot run." >&2 + return 1 + fi + fi +} + +# hash string like Java String::hashCode +hash_string() { + str="${1:-}" h=0 + while [ -n "$str" ]; do + char="${str%"${str#?}"}" + h=$(((h * 31 + $(LC_CTYPE=C printf %d "'$char")) % 4294967296)) + str="${str#?}" + done + printf %x\\n $h +} + +verbose() { :; } +[ "${MVNW_VERBOSE-}" != true ] || verbose() { printf %s\\n "${1-}"; } + +die() { + printf %s\\n "$1" >&2 + exit 1 +} + +# parse distributionUrl and optional distributionSha256Sum, requires .mvn/wrapper/maven-wrapper.properties +while IFS="=" read -r key value; do + case "${key-}" in + distributionUrl) distributionUrl="${value-}" ;; + distributionSha256Sum) distributionSha256Sum="${value-}" ;; + esac +done <"${0%/*}/.mvn/wrapper/maven-wrapper.properties" +[ -n "${distributionUrl-}" ] || die "cannot read distributionUrl property in ${0%/*}/.mvn/wrapper/maven-wrapper.properties" + +case "${distributionUrl##*/}" in +maven-mvnd-*bin.*) + MVN_CMD=mvnd.sh _MVNW_REPO_PATTERN=/maven/mvnd/ + case "${PROCESSOR_ARCHITECTURE-}${PROCESSOR_ARCHITEW6432-}:$(uname -a)" in + *AMD64:CYGWIN* | *AMD64:MINGW*) distributionPlatform=windows-amd64 ;; + :Darwin*x86_64) distributionPlatform=darwin-amd64 ;; + :Darwin*arm64) distributionPlatform=darwin-aarch64 ;; + :Linux*x86_64*) distributionPlatform=linux-amd64 ;; + *) + echo "Cannot detect native platform for mvnd on $(uname)-$(uname -m), use pure java version" >&2 + distributionPlatform=linux-amd64 + ;; + esac + distributionUrl="${distributionUrl%-bin.*}-$distributionPlatform.zip" + ;; +maven-mvnd-*) MVN_CMD=mvnd.sh _MVNW_REPO_PATTERN=/maven/mvnd/ ;; +*) MVN_CMD="mvn${0##*/mvnw}" _MVNW_REPO_PATTERN=/org/apache/maven/ ;; +esac + +# apply MVNW_REPOURL and calculate MAVEN_HOME +# maven home pattern: ~/.m2/wrapper/dists/{apache-maven-,maven-mvnd--}/ +[ -z "${MVNW_REPOURL-}" ] || distributionUrl="$MVNW_REPOURL$_MVNW_REPO_PATTERN${distributionUrl#*"$_MVNW_REPO_PATTERN"}" +distributionUrlName="${distributionUrl##*/}" +distributionUrlNameMain="${distributionUrlName%.*}" +distributionUrlNameMain="${distributionUrlNameMain%-bin}" +MAVEN_HOME="$HOME/.m2/wrapper/dists/${distributionUrlNameMain-}/$(hash_string "$distributionUrl")" + +exec_maven() { + unset MVNW_VERBOSE MVNW_USERNAME MVNW_PASSWORD MVNW_REPOURL || : + exec "$MAVEN_HOME/bin/$MVN_CMD" "$@" || die "cannot exec $MAVEN_HOME/bin/$MVN_CMD" +} + +if [ -d "$MAVEN_HOME" ]; then + verbose "found existing MAVEN_HOME at $MAVEN_HOME" + exec_maven "$@" +fi + +case "${distributionUrl-}" in +*?-bin.zip | *?maven-mvnd-?*-?*.zip) ;; +*) die "distributionUrl is not valid, must match *-bin.zip or maven-mvnd-*.zip, but found '${distributionUrl-}'" ;; +esac + +# prepare tmp dir +if TMP_DOWNLOAD_DIR="$(mktemp -d)" && [ -d "$TMP_DOWNLOAD_DIR" ]; then + clean() { rm -rf -- "$TMP_DOWNLOAD_DIR"; } + trap clean HUP INT TERM EXIT +else + die "cannot create temp dir" +fi + +mkdir -p -- "${MAVEN_HOME%/*}" + +# Download and Install Apache Maven +verbose "Couldn't find MAVEN_HOME, downloading and installing it ..." +verbose "Downloading from: $distributionUrl" +verbose "Downloading to: $TMP_DOWNLOAD_DIR/$distributionUrlName" + +# select .zip or .tar.gz +if ! command -v unzip >/dev/null; then + distributionUrl="${distributionUrl%.zip}.tar.gz" + distributionUrlName="${distributionUrl##*/}" +fi + +# verbose opt +__MVNW_QUIET_WGET=--quiet __MVNW_QUIET_CURL=--silent __MVNW_QUIET_UNZIP=-q __MVNW_QUIET_TAR='' +[ "${MVNW_VERBOSE-}" != true ] || __MVNW_QUIET_WGET='' __MVNW_QUIET_CURL='' __MVNW_QUIET_UNZIP='' __MVNW_QUIET_TAR=v + +# normalize http auth +case "${MVNW_PASSWORD:+has-password}" in +'') MVNW_USERNAME='' MVNW_PASSWORD='' ;; +has-password) [ -n "${MVNW_USERNAME-}" ] || MVNW_USERNAME='' MVNW_PASSWORD='' ;; +esac + +if [ -z "${MVNW_USERNAME-}" ] && command -v wget >/dev/null; then + verbose "Found wget ... using wget" + wget ${__MVNW_QUIET_WGET:+"$__MVNW_QUIET_WGET"} "$distributionUrl" -O "$TMP_DOWNLOAD_DIR/$distributionUrlName" || die "wget: Failed to fetch $distributionUrl" +elif [ -z "${MVNW_USERNAME-}" ] && command -v curl >/dev/null; then + verbose "Found curl ... using curl" + curl ${__MVNW_QUIET_CURL:+"$__MVNW_QUIET_CURL"} -f -L -o "$TMP_DOWNLOAD_DIR/$distributionUrlName" "$distributionUrl" || die "curl: Failed to fetch $distributionUrl" +elif set_java_home; then + verbose "Falling back to use Java to download" + javaSource="$TMP_DOWNLOAD_DIR/Downloader.java" + targetZip="$TMP_DOWNLOAD_DIR/$distributionUrlName" + cat >"$javaSource" <<-END + public class Downloader extends java.net.Authenticator + { + protected java.net.PasswordAuthentication getPasswordAuthentication() + { + return new java.net.PasswordAuthentication( System.getenv( "MVNW_USERNAME" ), System.getenv( "MVNW_PASSWORD" ).toCharArray() ); + } + public static void main( String[] args ) throws Exception + { + setDefault( new Downloader() ); + java.nio.file.Files.copy( java.net.URI.create( args[0] ).toURL().openStream(), java.nio.file.Paths.get( args[1] ).toAbsolutePath().normalize() ); + } + } + END + # For Cygwin/MinGW, switch paths to Windows format before running javac and java + verbose " - Compiling Downloader.java ..." + "$(native_path "$JAVACCMD")" "$(native_path "$javaSource")" || die "Failed to compile Downloader.java" + verbose " - Running Downloader.java ..." + "$(native_path "$JAVACMD")" -cp "$(native_path "$TMP_DOWNLOAD_DIR")" Downloader "$distributionUrl" "$(native_path "$targetZip")" +fi + +# If specified, validate the SHA-256 sum of the Maven distribution zip file +if [ -n "${distributionSha256Sum-}" ]; then + distributionSha256Result=false + if [ "$MVN_CMD" = mvnd.sh ]; then + echo "Checksum validation is not supported for maven-mvnd." >&2 + echo "Please disable validation by removing 'distributionSha256Sum' from your maven-wrapper.properties." >&2 + exit 1 + elif command -v sha256sum >/dev/null; then + if echo "$distributionSha256Sum $TMP_DOWNLOAD_DIR/$distributionUrlName" | sha256sum -c >/dev/null 2>&1; then + distributionSha256Result=true + fi + elif command -v shasum >/dev/null; then + if echo "$distributionSha256Sum $TMP_DOWNLOAD_DIR/$distributionUrlName" | shasum -a 256 -c >/dev/null 2>&1; then + distributionSha256Result=true + fi + else + echo "Checksum validation was requested but neither 'sha256sum' or 'shasum' are available." >&2 + echo "Please install either command, or disable validation by removing 'distributionSha256Sum' from your maven-wrapper.properties." >&2 + exit 1 + fi + if [ $distributionSha256Result = false ]; then + echo "Error: Failed to validate Maven distribution SHA-256, your Maven distribution might be compromised." >&2 + echo "If you updated your Maven version, you need to update the specified distributionSha256Sum property." >&2 + exit 1 + fi +fi + +# unzip and move +if command -v unzip >/dev/null; then + unzip ${__MVNW_QUIET_UNZIP:+"$__MVNW_QUIET_UNZIP"} "$TMP_DOWNLOAD_DIR/$distributionUrlName" -d "$TMP_DOWNLOAD_DIR" || die "failed to unzip" +else + tar xzf${__MVNW_QUIET_TAR:+"$__MVNW_QUIET_TAR"} "$TMP_DOWNLOAD_DIR/$distributionUrlName" -C "$TMP_DOWNLOAD_DIR" || die "failed to untar" +fi +printf %s\\n "$distributionUrl" >"$TMP_DOWNLOAD_DIR/$distributionUrlNameMain/mvnw.url" +mv -- "$TMP_DOWNLOAD_DIR/$distributionUrlNameMain" "$MAVEN_HOME" || [ -d "$MAVEN_HOME" ] || die "fail to move MAVEN_HOME" + +clean || : +exec_maven "$@" diff --git a/antifraud-validation-service/mvnw.cmd b/antifraud-validation-service/mvnw.cmd new file mode 100644 index 0000000..406932d --- /dev/null +++ b/antifraud-validation-service/mvnw.cmd @@ -0,0 +1,146 @@ +<# : batch portion +@REM ---------------------------------------------------------------------------- +@REM Licensed to the Apache Software Foundation (ASF) under one +@REM or more contributor license agreements. See the NOTICE file +@REM distributed with this work for additional information +@REM regarding copyright ownership. The ASF licenses this file +@REM to you under the Apache License, Version 2.0 (the +@REM "License"); you may not use this file except in compliance +@REM with the License. You may obtain a copy of the License at +@REM +@REM https://www.apache.org/licenses/LICENSE-2.0 +@REM +@REM Unless required by applicable law or agreed to in writing, +@REM software distributed under the License is distributed on an +@REM "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +@REM KIND, either express or implied. See the License for the +@REM specific language governing permissions and limitations +@REM under the License. +@REM ---------------------------------------------------------------------------- + +@REM ---------------------------------------------------------------------------- +@REM Apache Maven Wrapper startup batch script, version 3.3.1 +@REM +@REM Optional ENV vars +@REM MVNW_REPOURL - repo url base for downloading maven distribution +@REM MVNW_USERNAME/MVNW_PASSWORD - user and password for downloading maven +@REM MVNW_VERBOSE - true: enable verbose log; others: silence the output +@REM ---------------------------------------------------------------------------- + +@IF "%__MVNW_ARG0_NAME__%"=="" (SET __MVNW_ARG0_NAME__=%~nx0) +@SET __MVNW_CMD__= +@SET __MVNW_ERROR__= +@SET __MVNW_PSMODULEP_SAVE=%PSModulePath% +@SET PSModulePath= +@FOR /F "usebackq tokens=1* delims==" %%A IN (`powershell -noprofile "& {$scriptDir='%~dp0'; $script='%__MVNW_ARG0_NAME__%'; icm -ScriptBlock ([Scriptblock]::Create((Get-Content -Raw '%~f0'))) -NoNewScope}"`) DO @( + IF "%%A"=="MVN_CMD" (set __MVNW_CMD__=%%B) ELSE IF "%%B"=="" (echo %%A) ELSE (echo %%A=%%B) +) +@SET PSModulePath=%__MVNW_PSMODULEP_SAVE% +@SET __MVNW_PSMODULEP_SAVE= +@SET __MVNW_ARG0_NAME__= +@SET MVNW_USERNAME= +@SET MVNW_PASSWORD= +@IF NOT "%__MVNW_CMD__%"=="" (%__MVNW_CMD__% %*) +@echo Cannot start maven from wrapper >&2 && exit /b 1 +@GOTO :EOF +: end batch / begin powershell #> + +$ErrorActionPreference = "Stop" +if ($env:MVNW_VERBOSE -eq "true") { + $VerbosePreference = "Continue" +} + +# calculate distributionUrl, requires .mvn/wrapper/maven-wrapper.properties +$distributionUrl = (Get-Content -Raw "$scriptDir/.mvn/wrapper/maven-wrapper.properties" | ConvertFrom-StringData).distributionUrl +if (!$distributionUrl) { + Write-Error "cannot read distributionUrl property in $scriptDir/.mvn/wrapper/maven-wrapper.properties" +} + +switch -wildcard -casesensitive ( $($distributionUrl -replace '^.*/','') ) { + "maven-mvnd-*" { + $USE_MVND = $true + $distributionUrl = $distributionUrl -replace '-bin\.[^.]*$',"-windows-amd64.zip" + $MVN_CMD = "mvnd.cmd" + break + } + default { + $USE_MVND = $false + $MVN_CMD = $script -replace '^mvnw','mvn' + break + } +} + +# apply MVNW_REPOURL and calculate MAVEN_HOME +# maven home pattern: ~/.m2/wrapper/dists/{apache-maven-,maven-mvnd--}/ +if ($env:MVNW_REPOURL) { + $MVNW_REPO_PATTERN = if ($USE_MVND) { "/org/apache/maven/" } else { "/maven/mvnd/" } + $distributionUrl = "$env:MVNW_REPOURL$MVNW_REPO_PATTERN$($distributionUrl -replace '^.*'+$MVNW_REPO_PATTERN,'')" +} +$distributionUrlName = $distributionUrl -replace '^.*/','' +$distributionUrlNameMain = $distributionUrlName -replace '\.[^.]*$','' -replace '-bin$','' +$MAVEN_HOME_PARENT = "$HOME/.m2/wrapper/dists/$distributionUrlNameMain" +$MAVEN_HOME_NAME = ([System.Security.Cryptography.MD5]::Create().ComputeHash([byte[]][char[]]$distributionUrl) | ForEach-Object {$_.ToString("x2")}) -join '' +$MAVEN_HOME = "$MAVEN_HOME_PARENT/$MAVEN_HOME_NAME" + +if (Test-Path -Path "$MAVEN_HOME" -PathType Container) { + Write-Verbose "found existing MAVEN_HOME at $MAVEN_HOME" + Write-Output "MVN_CMD=$MAVEN_HOME/bin/$MVN_CMD" + exit $? +} + +if (! $distributionUrlNameMain -or ($distributionUrlName -eq $distributionUrlNameMain)) { + Write-Error "distributionUrl is not valid, must end with *-bin.zip, but found $distributionUrl" +} + +# prepare tmp dir +$TMP_DOWNLOAD_DIR_HOLDER = New-TemporaryFile +$TMP_DOWNLOAD_DIR = New-Item -Itemtype Directory -Path "$TMP_DOWNLOAD_DIR_HOLDER.dir" +$TMP_DOWNLOAD_DIR_HOLDER.Delete() | Out-Null +trap { + if ($TMP_DOWNLOAD_DIR.Exists) { + try { Remove-Item $TMP_DOWNLOAD_DIR -Recurse -Force | Out-Null } + catch { Write-Warning "Cannot remove $TMP_DOWNLOAD_DIR" } + } +} + +New-Item -Itemtype Directory -Path "$MAVEN_HOME_PARENT" -Force | Out-Null + +# Download and Install Apache Maven +Write-Verbose "Couldn't find MAVEN_HOME, downloading and installing it ..." +Write-Verbose "Downloading from: $distributionUrl" +Write-Verbose "Downloading to: $TMP_DOWNLOAD_DIR/$distributionUrlName" + +$webclient = New-Object System.Net.WebClient +if ($env:MVNW_USERNAME -and $env:MVNW_PASSWORD) { + $webclient.Credentials = New-Object System.Net.NetworkCredential($env:MVNW_USERNAME, $env:MVNW_PASSWORD) +} +[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 +$webclient.DownloadFile($distributionUrl, "$TMP_DOWNLOAD_DIR/$distributionUrlName") | Out-Null + +# If specified, validate the SHA-256 sum of the Maven distribution zip file +$distributionSha256Sum = (Get-Content -Raw "$scriptDir/.mvn/wrapper/maven-wrapper.properties" | ConvertFrom-StringData).distributionSha256Sum +if ($distributionSha256Sum) { + if ($USE_MVND) { + Write-Error "Checksum validation is not supported for maven-mvnd. `nPlease disable validation by removing 'distributionSha256Sum' from your maven-wrapper.properties." + } + Import-Module $PSHOME\Modules\Microsoft.PowerShell.Utility -Function Get-FileHash + if ((Get-FileHash "$TMP_DOWNLOAD_DIR/$distributionUrlName" -Algorithm SHA256).Hash.ToLower() -ne $distributionSha256Sum) { + Write-Error "Error: Failed to validate Maven distribution SHA-256, your Maven distribution might be compromised. If you updated your Maven version, you need to update the specified distributionSha256Sum property." + } +} + +# unzip and move +Expand-Archive "$TMP_DOWNLOAD_DIR/$distributionUrlName" -DestinationPath "$TMP_DOWNLOAD_DIR" | Out-Null +Rename-Item -Path "$TMP_DOWNLOAD_DIR/$distributionUrlNameMain" -NewName $MAVEN_HOME_NAME | Out-Null +try { + Move-Item -Path "$TMP_DOWNLOAD_DIR/$MAVEN_HOME_NAME" -Destination $MAVEN_HOME_PARENT | Out-Null +} catch { + if (! (Test-Path -Path "$MAVEN_HOME" -PathType Container)) { + Write-Error "fail to move MAVEN_HOME" + } +} finally { + try { Remove-Item $TMP_DOWNLOAD_DIR -Recurse -Force | Out-Null } + catch { Write-Warning "Cannot remove $TMP_DOWNLOAD_DIR" } +} + +Write-Output "MVN_CMD=$MAVEN_HOME/bin/$MVN_CMD" diff --git a/antifraud-validation-service/pom.xml b/antifraud-validation-service/pom.xml new file mode 100644 index 0000000..d34fc55 --- /dev/null +++ b/antifraud-validation-service/pom.xml @@ -0,0 +1,57 @@ + + + 4.0.0 + + org.springframework.boot + spring-boot-starter-parent + 3.3.0 + + + com.yape.codechallenge + antifraud-validation-service + 0.0.1-SNAPSHOT + antifraud-validation-service + antifraud-validation-service + + 17 + + + + org.springframework.boot + spring-boot-starter + + + + org.springframework.kafka + spring-kafka + + + + org.projectlombok + lombok + 1.18.32 + provided + + + + org.springframework.boot + spring-boot-starter-test + test + + + com.fasterxml.jackson.core + jackson-databind + + + + + + + org.springframework.boot + spring-boot-maven-plugin + + + + + diff --git a/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/AntifraudValidationServiceApplication.java b/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/AntifraudValidationServiceApplication.java new file mode 100644 index 0000000..b0f1164 --- /dev/null +++ b/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/AntifraudValidationServiceApplication.java @@ -0,0 +1,13 @@ +package com.yape.codechallenge.antifraudvalidationservice; + +import org.springframework.boot.SpringApplication; +import org.springframework.boot.autoconfigure.SpringBootApplication; + +@SpringBootApplication +public class AntifraudValidationServiceApplication { + + public static void main(String[] args) { + SpringApplication.run(AntifraudValidationServiceApplication.class, args); + } + +} diff --git a/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/config/KafkaConfig.java b/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/config/KafkaConfig.java new file mode 100644 index 0000000..708b220 --- /dev/null +++ b/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/config/KafkaConfig.java @@ -0,0 +1,35 @@ +package com.yape.codechallenge.antifraudvalidationservice.config; + +import com.yape.codechallenge.antifraudvalidationservice.util.ConstantsUtils; +import org.apache.kafka.clients.producer.ProducerConfig; +import org.apache.kafka.common.serialization.StringSerializer; +import org.springframework.context.annotation.Bean; +import org.springframework.context.annotation.Configuration; +import org.springframework.kafka.core.DefaultKafkaProducerFactory; +import org.springframework.kafka.core.KafkaTemplate; +import org.springframework.kafka.core.ProducerFactory; + +import java.util.HashMap; +import java.util.Map; + +public class KafkaConfig { + private KafkaConfig() { + } + @Configuration + public static class KafkaProducerConfig { + + @Bean + public ProducerFactory producerFactory() { + Map configProps = new HashMap<>(); + configProps.put(ProducerConfig.BOOTSTRAP_SERVERS_CONFIG, ConstantsUtils.EventConstants.KAFKA_BOOSTRAP_SERVERS); + configProps.put(ProducerConfig.KEY_SERIALIZER_CLASS_CONFIG, StringSerializer.class); + configProps.put(ProducerConfig.VALUE_SERIALIZER_CLASS_CONFIG, StringSerializer.class); + return new DefaultKafkaProducerFactory<>(configProps); + } + + @Bean + public KafkaTemplate kafkaTemplate() { + return new KafkaTemplate<>(producerFactory()); + } + } +} diff --git a/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/event/IncomingCreationEvent.java b/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/event/IncomingCreationEvent.java new file mode 100644 index 0000000..27a5acb --- /dev/null +++ b/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/event/IncomingCreationEvent.java @@ -0,0 +1,14 @@ +package com.yape.codechallenge.antifraudvalidationservice.event; + +import lombok.Data; + +import java.math.BigDecimal; + +@Data +public class IncomingCreationEvent { + private String transactionExternalId; + private String transactionReceiptStatus; + private BigDecimal transactionReceiptValue; + private String operationType; + private String origin; +} diff --git a/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/event/OutComingUpdatingEvent.java b/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/event/OutComingUpdatingEvent.java new file mode 100644 index 0000000..370520a --- /dev/null +++ b/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/event/OutComingUpdatingEvent.java @@ -0,0 +1,11 @@ +package com.yape.codechallenge.antifraudvalidationservice.event; + +import lombok.AllArgsConstructor; +import lombok.Data; + +@Data +@AllArgsConstructor +public class OutComingUpdatingEvent { + private String transactionExternalId; + private String evaluationResult; +} diff --git a/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/listener/TransactionEventListener.java b/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/listener/TransactionEventListener.java new file mode 100644 index 0000000..b96ab98 --- /dev/null +++ b/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/listener/TransactionEventListener.java @@ -0,0 +1,36 @@ +package com.yape.codechallenge.antifraudvalidationservice.listener; + +import com.yape.codechallenge.antifraudvalidationservice.event.IncomingCreationEvent; +import com.yape.codechallenge.antifraudvalidationservice.event.OutComingUpdatingEvent; +import com.yape.codechallenge.antifraudvalidationservice.service.AntiFraudValidationService; +import com.yape.codechallenge.antifraudvalidationservice.util.ConstantsUtils; +import com.yape.codechallenge.antifraudvalidationservice.util.ConvertUtils; +import org.springframework.kafka.annotation.KafkaListener; +import org.springframework.kafka.core.KafkaTemplate; +import org.springframework.stereotype.Service; + +import java.util.Map; + +@Service +public class TransactionEventListener { + private final AntiFraudValidationService antiFraudValidationService; + private final KafkaTemplate kafkaTemplate; + + public TransactionEventListener(AntiFraudValidationService antiFraudValidationService, KafkaTemplate kafkaTemplate) { + this.antiFraudValidationService = antiFraudValidationService; + this.kafkaTemplate = kafkaTemplate; + } + + @KafkaListener(topicPattern = ConstantsUtils.EventConstants.CONSUMER_TOPIC, groupId = ConstantsUtils.EventConstants.GROUP_ID) + public void consumeEvent(String eventMsg) { + Map eventMap = ConvertUtils.convertJsonStringToMap(eventMsg); + IncomingCreationEvent incomingCreationEvent = ConvertUtils.messageMapToTransactionEvent(eventMap); + OutComingUpdatingEvent outComingUpdatingEvent = antiFraudValidationService.evaluateTransactionFraudRisk(incomingCreationEvent); + + String convertedJsonString = ConvertUtils.outcomingEventToJsonString(outComingUpdatingEvent); + if(incomingCreationEvent.getOperationType().equals(ConstantsUtils.TRANSACTION_DB_OPERATION_CREATE)) { + kafkaTemplate.send(ConstantsUtils.EventConstants.PRODUCER_TOPIC, convertedJsonString); + } + } + +} diff --git a/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/service/AntiFraudValidationService.java b/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/service/AntiFraudValidationService.java new file mode 100644 index 0000000..f71430e --- /dev/null +++ b/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/service/AntiFraudValidationService.java @@ -0,0 +1,16 @@ +package com.yape.codechallenge.antifraudvalidationservice.service; + +import com.yape.codechallenge.antifraudvalidationservice.event.IncomingCreationEvent; +import com.yape.codechallenge.antifraudvalidationservice.event.OutComingUpdatingEvent; +import com.yape.codechallenge.antifraudvalidationservice.util.ConstantsUtils; +import org.springframework.stereotype.Service; + +import java.math.BigDecimal; + +@Service +public class AntiFraudValidationService { + public OutComingUpdatingEvent evaluateTransactionFraudRisk(IncomingCreationEvent incomingCreationEvent){ + return new OutComingUpdatingEvent(incomingCreationEvent.getTransactionExternalId(), ConstantsUtils.TRANSACTION_DB_OPERATION_CREATE.equals(incomingCreationEvent.getOperationType()) + && incomingCreationEvent.getTransactionReceiptValue().compareTo(new BigDecimal(1000)) < 0? ConstantsUtils.TRANSACTION_STATUS_ACCEPTED : ConstantsUtils.TRANSACTION_STATUS_REJECTED); + } +} \ No newline at end of file diff --git a/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/util/ConstantsUtils.java b/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/util/ConstantsUtils.java new file mode 100644 index 0000000..f3c8a4d --- /dev/null +++ b/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/util/ConstantsUtils.java @@ -0,0 +1,32 @@ +package com.yape.codechallenge.antifraudvalidationservice.util; + +public class ConstantsUtils { + private ConstantsUtils() { + } + public static class TransactionMapper { + public static final String MAP_TRANSACTION_EXTERNAL_ID = "transactionexternalid"; + public static final String MAP_TRANSACTION_STATUS = "transactionstatus"; + public static final String MAP_VALUE = "value"; + public static final String MAP_SCALE = "scale"; + public static final String MAP_OP = "op"; + public static final String MAP_SOURCE = "source"; + public static final String MAP_TABLE = "table"; + public static final String MAP_PAYLOAD = "payload"; + public static final String MAP_AFTER = "after"; + private TransactionMapper() { + } + } + + public static class EventConstants { + public static final String KAFKA_BOOSTRAP_SERVERS = "127.0.0.1:29092"; + public static final String PRODUCER_TOPIC = "transaction-status"; + public static final String CONSUMER_TOPIC = "cqrs-.public.*"; + public static final String GROUP_ID = "group2"; + private EventConstants() { + } + } + + public static final String TRANSACTION_STATUS_ACCEPTED = "ACCEPTED"; + public static final String TRANSACTION_STATUS_REJECTED = "REJECTED"; + public static final String TRANSACTION_DB_OPERATION_CREATE = "c"; +} diff --git a/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/util/ConvertUtils.java b/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/util/ConvertUtils.java new file mode 100644 index 0000000..64a47af --- /dev/null +++ b/antifraud-validation-service/src/main/java/com/yape/codechallenge/antifraudvalidationservice/util/ConvertUtils.java @@ -0,0 +1,63 @@ +package com.yape.codechallenge.antifraudvalidationservice.util; +import com.fasterxml.jackson.core.JsonProcessingException; +import com.fasterxml.jackson.databind.ObjectMapper; +import com.yape.codechallenge.antifraudvalidationservice.event.IncomingCreationEvent; +import com.yape.codechallenge.antifraudvalidationservice.event.OutComingUpdatingEvent; +import lombok.extern.slf4j.Slf4j; + +import java.math.BigDecimal; +import java.math.BigInteger; +import java.util.Base64; +import java.util.HashMap; +import java.util.Map; +import java.util.Optional; + +@Slf4j +public class ConvertUtils { + private ConvertUtils() { + } + private static final ObjectMapper objectMapper = new ObjectMapper(); + public static Map convertJsonStringToMap(String jsonString) { + return Optional.ofNullable(jsonString) + .map(ConvertUtils::tryConvertJsonToMap) + .orElseGet(ConvertUtils::createEmptyMap); + } + + private static Map tryConvertJsonToMap(String jsonString) { + try { + return objectMapper.readValue(jsonString, Map.class); + } catch (JsonProcessingException e) { + log.error("Error while converting JSON to Map", e); + return createEmptyMap(); + } + } + + private static Map createEmptyMap() { + return new HashMap<>(); + } + public static String outcomingEventToJsonString(OutComingUpdatingEvent outComingUpdatingEvent) { + try { + return objectMapper.writeValueAsString(outComingUpdatingEvent); + } catch (JsonProcessingException e) { + log.error("Error while converting OutComingUpdatingEvent to JSON", e); + return null; + } + } + + public static IncomingCreationEvent messageMapToTransactionEvent(Map messageMap) { + Map payload = (Map) messageMap.get(ConstantsUtils.TransactionMapper.MAP_PAYLOAD); + Map messagePayload = (Map) payload.get(ConstantsUtils.TransactionMapper.MAP_AFTER); + + IncomingCreationEvent incomingCreationEvent = new IncomingCreationEvent(); + incomingCreationEvent.setTransactionExternalId((String) messagePayload.get(ConstantsUtils.TransactionMapper.MAP_TRANSACTION_EXTERNAL_ID)); + incomingCreationEvent.setTransactionReceiptStatus((String) messagePayload.get(ConstantsUtils.TransactionMapper.MAP_TRANSACTION_STATUS)); + incomingCreationEvent.setTransactionReceiptValue(getBigDecimalValueFromMap((Map) messagePayload.get(ConstantsUtils.TransactionMapper.MAP_VALUE))); + incomingCreationEvent.setOperationType(payload.get(ConstantsUtils.TransactionMapper.MAP_OP).toString()); + incomingCreationEvent.setOrigin((String) ((Map) payload.get(ConstantsUtils.TransactionMapper.MAP_SOURCE)).get(ConstantsUtils.TransactionMapper.MAP_TABLE)); + return incomingCreationEvent; + } + + private static BigDecimal getBigDecimalValueFromMap(Map base64Valuemap) { + return new BigDecimal(new BigInteger(Base64.getDecoder().decode(base64Valuemap.get(ConstantsUtils.TransactionMapper.MAP_VALUE).toString())), (Integer) base64Valuemap.get(ConstantsUtils.TransactionMapper.MAP_SCALE)); + } +} diff --git a/antifraud-validation-service/src/main/resources/application.properties b/antifraud-validation-service/src/main/resources/application.properties new file mode 100644 index 0000000..fda759c --- /dev/null +++ b/antifraud-validation-service/src/main/resources/application.properties @@ -0,0 +1,7 @@ +spring.application.name=antifraud-validation-ms + + +spring.kafka.consumer.bootstrap-servers=127.0.0.1:29092 +spring.kafka.producer.bootstrap-servers=127.0.0.1:29092 +spring.kafka.consumer.group-id=group2 +spring.kafka.consumer.auto-offset-reset=earliest \ No newline at end of file diff --git a/antifraud-validation-service/src/test/java/com/yape/codechallenge/antifraudvalidationservice/AntiFraudValidationServiceTest.java b/antifraud-validation-service/src/test/java/com/yape/codechallenge/antifraudvalidationservice/AntiFraudValidationServiceTest.java new file mode 100644 index 0000000..b37560e --- /dev/null +++ b/antifraud-validation-service/src/test/java/com/yape/codechallenge/antifraudvalidationservice/AntiFraudValidationServiceTest.java @@ -0,0 +1,62 @@ +package com.yape.codechallenge.antifraudvalidationservice; + +import com.yape.codechallenge.antifraudvalidationservice.event.IncomingCreationEvent; +import com.yape.codechallenge.antifraudvalidationservice.event.OutComingUpdatingEvent; +import com.yape.codechallenge.antifraudvalidationservice.service.AntiFraudValidationService; +import com.yape.codechallenge.antifraudvalidationservice.util.ConstantsUtils; +import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.DisplayName; +import org.junit.jupiter.api.Test; + +import java.math.BigDecimal; + +import static org.junit.jupiter.api.Assertions.assertEquals; + +class AntiFraudValidationServiceTest { + + private AntiFraudValidationService antiFraudValidationService; + + @BeforeEach + void setUp() { + antiFraudValidationService = new AntiFraudValidationService(); + } + + @Test + @DisplayName("Should return accepted status for valid transaction") + void shouldReturnAcceptedStatusForValidTransaction() { + IncomingCreationEvent incomingCreationEvent = new IncomingCreationEvent(); + incomingCreationEvent.setTransactionExternalId("TX123"); + incomingCreationEvent.setOperationType(ConstantsUtils.TRANSACTION_DB_OPERATION_CREATE); + incomingCreationEvent.setTransactionReceiptValue(new BigDecimal(500)); + + OutComingUpdatingEvent result = antiFraudValidationService.evaluateTransactionFraudRisk(incomingCreationEvent); + + assertEquals(ConstantsUtils.TRANSACTION_STATUS_ACCEPTED, result.getEvaluationResult()); + } + + @Test + @DisplayName("Should return rejected status for high value transaction") + void shouldReturnRejectedStatusForHighValueTransaction() { + IncomingCreationEvent incomingCreationEvent = new IncomingCreationEvent(); + incomingCreationEvent.setTransactionExternalId("TX123"); + incomingCreationEvent.setOperationType(ConstantsUtils.TRANSACTION_DB_OPERATION_CREATE); + incomingCreationEvent.setTransactionReceiptValue(new BigDecimal(1500)); + + OutComingUpdatingEvent result = antiFraudValidationService.evaluateTransactionFraudRisk(incomingCreationEvent); + + assertEquals(ConstantsUtils.TRANSACTION_STATUS_REJECTED, result.getEvaluationResult()); + } + + @Test + @DisplayName("Should return rejected status for non-create operation") + void shouldReturnRejectedStatusForNonCreateOperation() { + IncomingCreationEvent incomingCreationEvent = new IncomingCreationEvent(); + incomingCreationEvent.setTransactionExternalId("TX123"); + incomingCreationEvent.setOperationType("update"); + incomingCreationEvent.setTransactionReceiptValue(new BigDecimal(500)); + + OutComingUpdatingEvent result = antiFraudValidationService.evaluateTransactionFraudRisk(incomingCreationEvent); + + assertEquals(ConstantsUtils.TRANSACTION_STATUS_REJECTED, result.getEvaluationResult()); + } +} \ No newline at end of file diff --git a/antifraud-validation-service/src/test/java/com/yape/codechallenge/antifraudvalidationservice/AntifraudValidationServiceApplicationTests.java b/antifraud-validation-service/src/test/java/com/yape/codechallenge/antifraudvalidationservice/AntifraudValidationServiceApplicationTests.java new file mode 100644 index 0000000..fb748d1 --- /dev/null +++ b/antifraud-validation-service/src/test/java/com/yape/codechallenge/antifraudvalidationservice/AntifraudValidationServiceApplicationTests.java @@ -0,0 +1,13 @@ +package com.yape.codechallenge.antifraudvalidationservice; + +import org.junit.jupiter.api.Test; +import org.springframework.boot.test.context.SpringBootTest; + +@SpringBootTest +class AntifraudValidationServiceApplicationTests { + + @Test + void applicationStarts() { + AntifraudValidationServiceApplication.main(new String[]{}); + } +} diff --git a/antifraud-validation-service/src/test/java/com/yape/codechallenge/antifraudvalidationservice/KafkaProducerConfigTest.java b/antifraud-validation-service/src/test/java/com/yape/codechallenge/antifraudvalidationservice/KafkaProducerConfigTest.java new file mode 100644 index 0000000..c3e5433 --- /dev/null +++ b/antifraud-validation-service/src/test/java/com/yape/codechallenge/antifraudvalidationservice/KafkaProducerConfigTest.java @@ -0,0 +1,53 @@ +package com.yape.codechallenge.antifraudvalidationservice; + +import com.yape.codechallenge.antifraudvalidationservice.config.KafkaConfig; +import com.yape.codechallenge.antifraudvalidationservice.util.ConstantsUtils; +import org.apache.kafka.clients.producer.ProducerConfig; +import org.apache.kafka.common.serialization.StringSerializer; +import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.DisplayName; +import org.junit.jupiter.api.Test; +import org.mockito.InjectMocks; +import org.mockito.Mock; +import org.mockito.MockitoAnnotations; +import org.springframework.kafka.core.DefaultKafkaProducerFactory; +import org.springframework.kafka.core.KafkaTemplate; +import org.springframework.kafka.core.ProducerFactory; + +import java.util.Map; + +import static org.junit.jupiter.api.Assertions.*; +import static org.mockito.Mockito.when; + +public class KafkaProducerConfigTest { + + @InjectMocks + private KafkaConfig.KafkaProducerConfig kafkaProducerConfig; + + @Mock + private Map configProps; + + @BeforeEach + void setUp() { + MockitoAnnotations.openMocks(this); + } + + @Test + void shouldReturnProducerFactoryWithCorrectConfiguration() { + when(configProps.get(ProducerConfig.BOOTSTRAP_SERVERS_CONFIG)).thenReturn(ConstantsUtils.EventConstants.KAFKA_BOOSTRAP_SERVERS); + when(configProps.get(ProducerConfig.KEY_SERIALIZER_CLASS_CONFIG)).thenReturn(StringSerializer.class); + when(configProps.get(ProducerConfig.VALUE_SERIALIZER_CLASS_CONFIG)).thenReturn(StringSerializer.class); + + ProducerFactory producerFactory = kafkaProducerConfig.producerFactory(); + + assertInstanceOf(DefaultKafkaProducerFactory.class, producerFactory); + } + + @Test + void shouldReturnKafkaTemplateWithCorrectProducerFactory() { + KafkaTemplate kafkaTemplate = kafkaProducerConfig.kafkaTemplate(); + ProducerFactory producerFactory = kafkaTemplate.getProducerFactory(); + + assertEquals(producerFactory, kafkaTemplate.getProducerFactory()); + } +} \ No newline at end of file diff --git a/antifraud-validation-service/src/test/java/com/yape/codechallenge/antifraudvalidationservice/TransactionEventListenerTest.java b/antifraud-validation-service/src/test/java/com/yape/codechallenge/antifraudvalidationservice/TransactionEventListenerTest.java new file mode 100644 index 0000000..c4355fe --- /dev/null +++ b/antifraud-validation-service/src/test/java/com/yape/codechallenge/antifraudvalidationservice/TransactionEventListenerTest.java @@ -0,0 +1,59 @@ +package com.yape.codechallenge.antifraudvalidationservice; + +import com.yape.codechallenge.antifraudvalidationservice.event.IncomingCreationEvent; +import com.yape.codechallenge.antifraudvalidationservice.event.OutComingUpdatingEvent; +import com.yape.codechallenge.antifraudvalidationservice.listener.TransactionEventListener; +import com.yape.codechallenge.antifraudvalidationservice.service.AntiFraudValidationService; + +import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.DisplayName; +import org.junit.jupiter.api.Test; +import org.mockito.InjectMocks; +import org.mockito.Mock; +import org.mockito.MockitoAnnotations; +import org.springframework.kafka.core.KafkaTemplate; + +import static org.junit.jupiter.api.Assertions.assertThrows; +import static org.mockito.ArgumentMatchers.anyString; +import static org.mockito.Mockito.*; + +class TransactionEventListenerTest { + + @InjectMocks + private TransactionEventListener transactionEventListener; + + @Mock + private AntiFraudValidationService antiFraudValidationService; + + @Mock + private KafkaTemplate kafkaTemplate; + + @BeforeEach + void setUp() { + MockitoAnnotations.openMocks(this); + } + + @Test + void ProcessIncomingEventWhenOperationIsCreate() { + String eventMsg = "{\"schema\":{\"type\":\"struct\",\"fields\":[{\"type\":\"struct\",\"fields\":[{\"type\":\"string\",\"optional\":false,\"field\":\"transactionexternalid\"},{\"type\":\"string\",\"optional\":false,\"field\":\"accountexternaliddebit\"},{\"type\":\"string\",\"optional\":false,\"field\":\"accountexternalidcredit\"},{\"type\":\"int32\",\"optional\":false,\"field\":\"transfertypeid\"},{\"type\":\"struct\",\"fields\":[{\"type\":\"int32\",\"optional\":false,\"field\":\"scale\"},{\"type\":\"bytes\",\"optional\":false,\"field\":\"value\"}],\"optional\":false,\"name\":\"io.debezium.data.VariableScaleDecimal\",\"version\":1,\"doc\":\"Variable scaled decimal\",\"field\":\"value\"},{\"type\":\"string\",\"optional\":true,\"field\":\"transactiontype\"},{\"type\":\"string\",\"optional\":false,\"field\":\"transactionstatus\"},{\"type\":\"int64\",\"optional\":false,\"name\":\"io.debezium.time.MicroTimestamp\",\"version\":1,\"field\":\"createdat\"}],\"optional\":true,\"name\":\"cqrs-.public.transactions.Value\",\"field\":\"before\"},{\"type\":\"struct\",\"fields\":[{\"type\":\"string\",\"optional\":false,\"field\":\"transactionexternalid\"},{\"type\":\"string\",\"optional\":false,\"field\":\"accountexternaliddebit\"},{\"type\":\"string\",\"optional\":false,\"field\":\"accountexternalidcredit\"},{\"type\":\"int32\",\"optional\":false,\"field\":\"transfertypeid\"},{\"type\":\"struct\",\"fields\":[{\"type\":\"int32\",\"optional\":false,\"field\":\"scale\"},{\"type\":\"bytes\",\"optional\":false,\"field\":\"value\"}],\"optional\":false,\"name\":\"io.debezium.data.VariableScaleDecimal\",\"version\":1,\"doc\":\"Variable scaled decimal\",\"field\":\"value\"},{\"type\":\"string\",\"optional\":true,\"field\":\"transactiontype\"},{\"type\":\"string\",\"optional\":false,\"field\":\"transactionstatus\"},{\"type\":\"int64\",\"optional\":false,\"name\":\"io.debezium.time.MicroTimestamp\",\"version\":1,\"field\":\"createdat\"}],\"optional\":true,\"name\":\"cqrs-.public.transactions.Value\",\"field\":\"after\"},{\"type\":\"struct\",\"fields\":[{\"type\":\"string\",\"optional\":false,\"field\":\"version\"},{\"type\":\"string\",\"optional\":false,\"field\":\"connector\"},{\"type\":\"string\",\"optional\":false,\"field\":\"name\"},{\"type\":\"int64\",\"optional\":false,\"field\":\"ts_ms\"},{\"type\":\"string\",\"optional\":true,\"name\":\"io.debezium.data.Enum\",\"version\":1,\"parameters\":{\"allowed\":\"true,last,false,incremental\"},\"default\":\"false\",\"field\":\"snapshot\"},{\"type\":\"string\",\"optional\":false,\"field\":\"db\"},{\"type\":\"string\",\"optional\":true,\"field\":\"sequence\"},{\"type\":\"string\",\"optional\":false,\"field\":\"schema\"},{\"type\":\"string\",\"optional\":false,\"field\":\"table\"},{\"type\":\"int64\",\"optional\":true,\"field\":\"txId\"},{\"type\":\"int64\",\"optional\":true,\"field\":\"lsn\"},{\"type\":\"int64\",\"optional\":true,\"field\":\"xmin\"}],\"optional\":false,\"name\":\"io.debezium.connector.postgresql.Source\",\"field\":\"source\"},{\"type\":\"string\",\"optional\":false,\"field\":\"op\"},{\"type\":\"int64\",\"optional\":true,\"field\":\"ts_ms\"},{\"type\":\"struct\",\"fields\":[{\"type\":\"string\",\"optional\":false,\"field\":\"id\"},{\"type\":\"int64\",\"optional\":false,\"field\":\"total_order\"},{\"type\":\"int64\",\"optional\":false,\"field\":\"data_collection_order\"}],\"optional\":true,\"name\":\"event.block\",\"version\":1,\"field\":\"transaction\"}],\"optional\":false,\"name\":\"cqrs-.public.transactions.Envelope\",\"version\":1},\"payload\":{\"before\":null,\"after\":{\"transactionexternalid\":\"TX13187f74-0305-4b03-91ba-f7be5a54e8\",\"accountexternaliddebit\":\"PE2212310230111231023012\",\"accountexternalidcredit\":\"PE2212310230111231023011\",\"transfertypeid\":1,\"value\":{\"scale\":0,\"value\":\"aQ==\"},\"transactiontype\":\"TRANSFER\",\"transactionstatus\":\"PENDING\",\"createdat\":1718042912576072},\"source\":{\"version\":\"2.5.0.Final\",\"connector\":\"postgresql\",\"name\":\"cqrs-\",\"ts_ms\":1718060912765,\"snapshot\":\"false\",\"db\":\"postgres\",\"sequence\":\"[\\\"24339856\\\",\\\"24340144\\\"]\",\"schema\":\"public\",\"table\":\"transactions\",\"txId\":774,\"lsn\":24340144,\"xmin\":null},\"op\":\"c\",\"ts_ms\":1718060913008,\"transaction\":null}}"; + transactionEventListener.consumeEvent(eventMsg); + + verify(kafkaTemplate, times(1)).send(anyString(), anyString()); + } + + @Test + void ProcessIncomingEventWhenOperationIsNotCreate() { + String eventMsg = "{\"schema\":{\"type\":\"struct\",\"fields\":[{\"type\":\"struct\",\"fields\":[{\"type\":\"string\",\"optional\":false,\"field\":\"transactionexternalid\"},{\"type\":\"string\",\"optional\":false,\"field\":\"accountexternaliddebit\"},{\"type\":\"string\",\"optional\":false,\"field\":\"accountexternalidcredit\"},{\"type\":\"int32\",\"optional\":false,\"field\":\"transfertypeid\"},{\"type\":\"struct\",\"fields\":[{\"type\":\"int32\",\"optional\":false,\"field\":\"scale\"},{\"type\":\"bytes\",\"optional\":false,\"field\":\"value\"}],\"optional\":false,\"name\":\"io.debezium.data.VariableScaleDecimal\",\"version\":1,\"doc\":\"Variable scaled decimal\",\"field\":\"value\"},{\"type\":\"string\",\"optional\":true,\"field\":\"transactiontype\"},{\"type\":\"string\",\"optional\":false,\"field\":\"transactionstatus\"},{\"type\":\"int64\",\"optional\":false,\"name\":\"io.debezium.time.MicroTimestamp\",\"version\":1,\"field\":\"createdat\"}],\"optional\":true,\"name\":\"cqrs-.public.transactions.Value\",\"field\":\"before\"},{\"type\":\"struct\",\"fields\":[{\"type\":\"string\",\"optional\":false,\"field\":\"transactionexternalid\"},{\"type\":\"string\",\"optional\":false,\"field\":\"accountexternaliddebit\"},{\"type\":\"string\",\"optional\":false,\"field\":\"accountexternalidcredit\"},{\"type\":\"int32\",\"optional\":false,\"field\":\"transfertypeid\"},{\"type\":\"struct\",\"fields\":[{\"type\":\"int32\",\"optional\":false,\"field\":\"scale\"},{\"type\":\"bytes\",\"optional\":false,\"field\":\"value\"}],\"optional\":false,\"name\":\"io.debezium.data.VariableScaleDecimal\",\"version\":1,\"doc\":\"Variable scaled decimal\",\"field\":\"value\"},{\"type\":\"string\",\"optional\":true,\"field\":\"transactiontype\"},{\"type\":\"string\",\"optional\":false,\"field\":\"transactionstatus\"},{\"type\":\"int64\",\"optional\":false,\"name\":\"io.debezium.time.MicroTimestamp\",\"version\":1,\"field\":\"createdat\"}],\"optional\":true,\"name\":\"cqrs-.public.transactions.Value\",\"field\":\"after\"},{\"type\":\"struct\",\"fields\":[{\"type\":\"string\",\"optional\":false,\"field\":\"version\"},{\"type\":\"string\",\"optional\":false,\"field\":\"connector\"},{\"type\":\"string\",\"optional\":false,\"field\":\"name\"},{\"type\":\"int64\",\"optional\":false,\"field\":\"ts_ms\"},{\"type\":\"string\",\"optional\":true,\"name\":\"io.debezium.data.Enum\",\"version\":1,\"parameters\":{\"allowed\":\"true,last,false,incremental\"},\"default\":\"false\",\"field\":\"snapshot\"},{\"type\":\"string\",\"optional\":false,\"field\":\"db\"},{\"type\":\"string\",\"optional\":true,\"field\":\"sequence\"},{\"type\":\"string\",\"optional\":false,\"field\":\"schema\"},{\"type\":\"string\",\"optional\":false,\"field\":\"table\"},{\"type\":\"int64\",\"optional\":true,\"field\":\"txId\"},{\"type\":\"int64\",\"optional\":true,\"field\":\"lsn\"},{\"type\":\"int64\",\"optional\":true,\"field\":\"xmin\"}],\"optional\":false,\"name\":\"io.debezium.connector.postgresql.Source\",\"field\":\"source\"},{\"type\":\"string\",\"optional\":false,\"field\":\"op\"},{\"type\":\"int64\",\"optional\":true,\"field\":\"ts_ms\"},{\"type\":\"struct\",\"fields\":[{\"type\":\"string\",\"optional\":false,\"field\":\"id\"},{\"type\":\"int64\",\"optional\":false,\"field\":\"total_order\"},{\"type\":\"int64\",\"optional\":false,\"field\":\"data_collection_order\"}],\"optional\":true,\"name\":\"event.block\",\"version\":1,\"field\":\"transaction\"}],\"optional\":false,\"name\":\"cqrs-.public.transactions.Envelope\",\"version\":1},\"payload\":{\"before\":null,\"after\":{\"transactionexternalid\":\"TX13187f74-0305-4b03-91ba-f7be5a54e8\",\"accountexternaliddebit\":\"PE2212310230111231023012\",\"accountexternalidcredit\":\"PE2212310230111231023011\",\"transfertypeid\":1,\"value\":{\"scale\":0,\"value\":\"aQ==\"},\"transactiontype\":\"TRANSFER\",\"transactionstatus\":\"PENDING\",\"createdat\":1718042912576072},\"source\":{\"version\":\"2.5.0.Final\",\"connector\":\"postgresql\",\"name\":\"cqrs-\",\"ts_ms\":1718060912765,\"snapshot\":\"false\",\"db\":\"postgres\",\"sequence\":\"[\\\"24339856\\\",\\\"24340144\\\"]\",\"schema\":\"public\",\"table\":\"transactions\",\"txId\":774,\"lsn\":24340144,\"xmin\":null},\"op\":\"u\",\"ts_ms\":1718060913008,\"transaction\":null}}"; + transactionEventListener.consumeEvent(eventMsg); + + verify(kafkaTemplate, times(0)).send(anyString(), anyString()); + } + + @Test + void ThrowExceptionWhenMsgCannotBeConverted() { + String eventMsg = "invalid message"; + assertThrows(NullPointerException.class, () -> { + transactionEventListener.consumeEvent(eventMsg); + }); + } +} \ No newline at end of file diff --git a/diagrams/services_diagram_solution.png b/diagrams/services_diagram_solution.png new file mode 100644 index 0000000..f1aae7e Binary files /dev/null and b/diagrams/services_diagram_solution.png differ diff --git a/docker-compose.yml b/docker-compose.yml index 6e9a9c5..0cac8c3 100644 --- a/docker-compose.yml +++ b/docker-compose.yml @@ -7,19 +7,47 @@ services: environment: - POSTGRES_USER=postgres - POSTGRES_PASSWORD=postgres + volumes: + - ./init.sql:/docker-entrypoint-initdb.d/init.sql + command: [ "postgres", "-c", "wal_level=logical", "-c", "max_wal_senders=1" , "-c", "max_replication_slots=1" ] zookeeper: image: confluentinc/cp-zookeeper:5.5.3 environment: ZOOKEEPER_CLIENT_PORT: 2181 + kafka: image: confluentinc/cp-enterprise-kafka:5.5.3 depends_on: [zookeeper] environment: + KAFKA_CFG_LISTENERS: PLAINTEXT://:9092,EXTERNALPLAINTEXT://:29092 KAFKA_ZOOKEEPER_CONNECT: "zookeeper:2181" - KAFKA_ADVERTISED_LISTENERS: PLAINTEXT://kafka:29092,PLAINTEXT_HOST://localhost:9092 + KAFKA_ADVERTISED_LISTENERS: PLAINTEXT://kafka:9092,PLAINTEXT_HOST://localhost:29092 KAFKA_LISTENER_SECURITY_PROTOCOL_MAP: PLAINTEXT:PLAINTEXT,PLAINTEXT_HOST:PLAINTEXT KAFKA_BROKER_ID: 1 KAFKA_OFFSETS_TOPIC_REPLICATION_FACTOR: 1 KAFKA_JMX_PORT: 9991 + ALLOW_PLAINTEXT_LISTENER: "yes" ports: - - 9092:9092 \ No newline at end of file + - "9092:9092" + - "29092:29092" + + debezium: + container_name: debezium + image: debezium/connect + environment: + GROUP_ID: 1 + CONFIG_STORAGE_TOPIC: my-connect-configs + OFFSET_STORAGE_TOPIC: my-connect-offsets + BOOTSTRAP_SERVERS: kafka:9092 + ADVERTISED_HOST_NAME: debezium + ports: + - "8083:8083" + depends_on: + - kafka + + redis: + container_name: redis + image: redis:7.0.5-alpine + ports: + - "6379:6379" + command: [ "redis-server", "--requirepass", "REDISPSWD" ] diff --git a/init-debezium.sh b/init-debezium.sh new file mode 100644 index 0000000..ad9d6a5 --- /dev/null +++ b/init-debezium.sh @@ -0,0 +1,14 @@ +curl -i -X POST -H "Accept:application/json" -H "Content-Type:application/json" http://localhost:8083/connectors/ -d '{ + "name": "cqrs-dbz-connector", + "config": { + "connector.class": "io.debezium.connector.postgresql.PostgresConnector", + "database.hostname": "postgres", + "database.port": "5432", + "database.user": "postgres", + "database.password": "postgres", + "database.dbname" : "postgres", + "database.server.name": "posgresserver", + "plugin.name": "pgoutput", + "topic.prefix": "cqrs-" + } +}' diff --git a/init.sql b/init.sql new file mode 100644 index 0000000..373b5fd --- /dev/null +++ b/init.sql @@ -0,0 +1,11 @@ +CREATE TABLE Transactions ( + transactionExternalId VARCHAR(36) PRIMARY KEY, + accountExternalIdDebit VARCHAR(255) NOT NULL, + accountExternalIdCredit VARCHAR(255) NOT NULL, + transferTypeId INT NOT NULL, + value NUMERIC NOT NULL, + transactionType VARCHAR(255) NULL, + transactionStatus VARCHAR(255) NOT NULL, + createdAt TIMESTAMP NOT NULL +); +CREATE INDEX idx_transactions_id ON Transactions (transactionExternalId); \ No newline at end of file diff --git a/transaction-management-service/.gitignore b/transaction-management-service/.gitignore new file mode 100644 index 0000000..549e00a --- /dev/null +++ b/transaction-management-service/.gitignore @@ -0,0 +1,33 @@ +HELP.md +target/ +!.mvn/wrapper/maven-wrapper.jar +!**/src/main/**/target/ +!**/src/test/**/target/ + +### STS ### +.apt_generated +.classpath +.factorypath +.project +.settings +.springBeans +.sts4-cache + +### IntelliJ IDEA ### +.idea +*.iws +*.iml +*.ipr + +### NetBeans ### +/nbproject/private/ +/nbbuild/ +/dist/ +/nbdist/ +/.nb-gradle/ +build/ +!**/src/main/**/build/ +!**/src/test/**/build/ + +### VS Code ### +.vscode/ diff --git a/transaction-management-service/.mvn/wrapper/maven-wrapper.properties b/transaction-management-service/.mvn/wrapper/maven-wrapper.properties new file mode 100644 index 0000000..aeccdfd --- /dev/null +++ b/transaction-management-service/.mvn/wrapper/maven-wrapper.properties @@ -0,0 +1,18 @@ +# Licensed to the Apache Software Foundation (ASF) under one +# or more contributor license agreements. See the NOTICE file +# distributed with this work for additional information +# regarding copyright ownership. The ASF licenses this file +# to you under the Apache License, Version 2.0 (the +# "License"); you may not use this file except in compliance +# with the License. You may obtain a copy of the License at +# +# https://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, +# software distributed under the License is distributed on an +# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +# KIND, either express or implied. See the License for the +# specific language governing permissions and limitations +# under the License. +wrapperVersion=3.3.1 +distributionUrl=https://repo.maven.apache.org/maven2/org/apache/maven/apache-maven/3.9.6/apache-maven-3.9.6-bin.zip diff --git a/transaction-management-service/README.md b/transaction-management-service/README.md new file mode 100644 index 0000000..998ad5e --- /dev/null +++ b/transaction-management-service/README.md @@ -0,0 +1,98 @@ +# Transaction Management Service (TXMNG) + +## Description + +The Transaction Management Service is a microservice that handles all operations related to financial transactions. It is responsible for creating, reading, and updating transactions, ensuring efficient and reliable transaction management. + +## Tech Details + +This project utilizes several technologies and design patterns to achieve its objectives: + +- **CQRS**: The service employs Command Query Responsibility Segregation (CQRS) to separate read and write operations, allowing efficient handling of high volumes of simultaneous operations. + +- **Hexagonal Architecture**: The service is designed using a hexagonal architecture, separating the core business logic from the external interfaces, making the system more flexible and easier to maintain. + +- **Kafka**: Kafka is used for event-driven architecture. Each write operation on the database publishes an event to a topic, this event triggers the anti-fraud validation service. + +- **Debezium**: Debezium, used with Kafka, captures database changes and propagates them to other services in real time, ensuring data consistency across the system. + +- **Redis**: Redis serves as an in-memory database to store temporary data, enhancing application performance with fast data access and caching frequently accessed data, this cache DB is used to obtain details from a transaction. + +- **GraphQL**: GraphQL provides a flexible and efficient interface for creating and retrieving transactions, allowing clients to specify exactly the data they need in a single request. + +- **PostgreSQL**: PostgreSQL is the main database, storing all transactions. It ensures reliability and supports complex queries and transactions with ACID compliance. + + +## Requisites and Pre-configurations + +Before running the Transaction Management Service, you need to set up the necessary services and configurations. Follow these steps: + +1. **Start the Docker Services**: The application requires several services to run, which are defined in the `docker-compose.yml` file. To start these services, navigate to the directory containing the `docker-compose.yml` file and run the following command: +```bash +docker-compose up +``` +2. **Configure Debezium**: After starting the docker services, debezium must be configured, this configuration is done by requesting the debezium connector to the Kafka Connect API. To do this, you can use the following command: +```bash +./init-debezium.sh +``` +3. **Start the Transaction Management Service**: With the services running and Debezium configured, you can start the Transaction Management Service in spring boot. +## Usage +The service provides a GraphQL API for creating and retrieving transactions. You can access the GraphQL playground at `http://localhost:8080/graphiql?path=/graphql`. The exposed API provides two main resources: one for creating a transaction and another for retrieving a transaction. Here's how to use them: +### Creating a Transaction +To create a transaction, you need to use the createTransaction mutation with the following arguments: + +```graphql +mutation { +createTransaction(accountExternalIdDebit: "PE9521004163442100252363", accountExternalIdCredit: "PE9532004783456100178987", transferTypeId: 1, value: 120.0) { + transactionExternalId + accountExternalIdDebit + accountExternalIdCredit + transferTypeId + value + transactionType + transactionStatus + createdAt + } +} +``` +Consider that the `accountExternalIdDebit` and `accountExternalIdCredit` are the unique identifiers for the debit and credit accounts (**PE IBAN** Format) therefore cannot be the same, respectively. The `transferTypeId` is an identifier for the type of transfer, and the `value` is the amount of the transaction. + +### Retrieving a Transaction + +To retrieve a transaction, you need to use the `getTransaction` query with the `transactionExternalId` as an argument. +```graphql +query { + getTransaction(transactionExternalId: "TX13187f74-0305-4b03-91ba-f7be5a54e8") { + transactionExternalId + accountExternalIdDebit + accountExternalIdCredit + transferTypeId + value + transactionType + transactionStatus + createdAt + } +} +``` +The `transactionExternalId` is the unique identifier for the transaction you want to retrieve. + +## Diagrams +### Create Transaction Flow +![create_transaction_flow](diagrams/create_transaction_path_diagram.png) + +### Retrieve Transaction Flow +![retrieve_transaction_flow](diagrams/retrieve_transaction_path_diagram.png) + +### Update Transaction Flow +![update_transaction_flow](diagrams/update_transaction_path_diagram.png) +## Glossary + +**IBAN**: The International Bank Account Number consist of 24 alphanumeric characters, structured as follows: +- 2 digits for the country code (PE) +- 2 digits for the check digits +- 4 digits for the entity bank code +- 4 digits for the branch code +- 2 digits for the bank control digits +- 10 digits for the account number. + +**TXMNG**: Transaction Management Service feature code \ No newline at end of file diff --git a/transaction-management-service/diagrams/create_transaction_path_diagram.png b/transaction-management-service/diagrams/create_transaction_path_diagram.png new file mode 100644 index 0000000..447297e Binary files /dev/null and b/transaction-management-service/diagrams/create_transaction_path_diagram.png differ diff --git a/transaction-management-service/diagrams/retrieve_transaction_path_diagram.png b/transaction-management-service/diagrams/retrieve_transaction_path_diagram.png new file mode 100644 index 0000000..5d5e52a Binary files /dev/null and b/transaction-management-service/diagrams/retrieve_transaction_path_diagram.png differ diff --git a/transaction-management-service/diagrams/update_transaction_path_diagram.png b/transaction-management-service/diagrams/update_transaction_path_diagram.png new file mode 100644 index 0000000..1c9f181 Binary files /dev/null and b/transaction-management-service/diagrams/update_transaction_path_diagram.png differ diff --git a/transaction-management-service/mvnw b/transaction-management-service/mvnw new file mode 100644 index 0000000..ba9212a --- /dev/null +++ b/transaction-management-service/mvnw @@ -0,0 +1,250 @@ +#!/bin/sh +# ---------------------------------------------------------------------------- +# Licensed to the Apache Software Foundation (ASF) under one +# or more contributor license agreements. See the NOTICE file +# distributed with this work for additional information +# regarding copyright ownership. The ASF licenses this file +# to you under the Apache License, Version 2.0 (the +# "License"); you may not use this file except in compliance +# with the License. You may obtain a copy of the License at +# +# https://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, +# software distributed under the License is distributed on an +# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +# KIND, either express or implied. See the License for the +# specific language governing permissions and limitations +# under the License. +# ---------------------------------------------------------------------------- + +# ---------------------------------------------------------------------------- +# Apache Maven Wrapper startup batch script, version 3.3.1 +# +# Optional ENV vars +# ----------------- +# JAVA_HOME - location of a JDK home dir, required when download maven via java source +# MVNW_REPOURL - repo url base for downloading maven distribution +# MVNW_USERNAME/MVNW_PASSWORD - user and password for downloading maven +# MVNW_VERBOSE - true: enable verbose log; debug: trace the mvnw script; others: silence the output +# ---------------------------------------------------------------------------- + +set -euf +[ "${MVNW_VERBOSE-}" != debug ] || set -x + +# OS specific support. +native_path() { printf %s\\n "$1"; } +case "$(uname)" in +CYGWIN* | MINGW*) + [ -z "${JAVA_HOME-}" ] || JAVA_HOME="$(cygpath --unix "$JAVA_HOME")" + native_path() { cygpath --path --windows "$1"; } + ;; +esac + +# set JAVACMD and JAVACCMD +set_java_home() { + # For Cygwin and MinGW, ensure paths are in Unix format before anything is touched + if [ -n "${JAVA_HOME-}" ]; then + if [ -x "$JAVA_HOME/jre/sh/java" ]; then + # IBM's JDK on AIX uses strange locations for the executables + JAVACMD="$JAVA_HOME/jre/sh/java" + JAVACCMD="$JAVA_HOME/jre/sh/javac" + else + JAVACMD="$JAVA_HOME/bin/java" + JAVACCMD="$JAVA_HOME/bin/javac" + + if [ ! -x "$JAVACMD" ] || [ ! -x "$JAVACCMD" ]; then + echo "The JAVA_HOME environment variable is not defined correctly, so mvnw cannot run." >&2 + echo "JAVA_HOME is set to \"$JAVA_HOME\", but \"\$JAVA_HOME/bin/java\" or \"\$JAVA_HOME/bin/javac\" does not exist." >&2 + return 1 + fi + fi + else + JAVACMD="$( + 'set' +e + 'unset' -f command 2>/dev/null + 'command' -v java + )" || : + JAVACCMD="$( + 'set' +e + 'unset' -f command 2>/dev/null + 'command' -v javac + )" || : + + if [ ! -x "${JAVACMD-}" ] || [ ! -x "${JAVACCMD-}" ]; then + echo "The java/javac command does not exist in PATH nor is JAVA_HOME set, so mvnw cannot run." >&2 + return 1 + fi + fi +} + +# hash string like Java String::hashCode +hash_string() { + str="${1:-}" h=0 + while [ -n "$str" ]; do + char="${str%"${str#?}"}" + h=$(((h * 31 + $(LC_CTYPE=C printf %d "'$char")) % 4294967296)) + str="${str#?}" + done + printf %x\\n $h +} + +verbose() { :; } +[ "${MVNW_VERBOSE-}" != true ] || verbose() { printf %s\\n "${1-}"; } + +die() { + printf %s\\n "$1" >&2 + exit 1 +} + +# parse distributionUrl and optional distributionSha256Sum, requires .mvn/wrapper/maven-wrapper.properties +while IFS="=" read -r key value; do + case "${key-}" in + distributionUrl) distributionUrl="${value-}" ;; + distributionSha256Sum) distributionSha256Sum="${value-}" ;; + esac +done <"${0%/*}/.mvn/wrapper/maven-wrapper.properties" +[ -n "${distributionUrl-}" ] || die "cannot read distributionUrl property in ${0%/*}/.mvn/wrapper/maven-wrapper.properties" + +case "${distributionUrl##*/}" in +maven-mvnd-*bin.*) + MVN_CMD=mvnd.sh _MVNW_REPO_PATTERN=/maven/mvnd/ + case "${PROCESSOR_ARCHITECTURE-}${PROCESSOR_ARCHITEW6432-}:$(uname -a)" in + *AMD64:CYGWIN* | *AMD64:MINGW*) distributionPlatform=windows-amd64 ;; + :Darwin*x86_64) distributionPlatform=darwin-amd64 ;; + :Darwin*arm64) distributionPlatform=darwin-aarch64 ;; + :Linux*x86_64*) distributionPlatform=linux-amd64 ;; + *) + echo "Cannot detect native platform for mvnd on $(uname)-$(uname -m), use pure java version" >&2 + distributionPlatform=linux-amd64 + ;; + esac + distributionUrl="${distributionUrl%-bin.*}-$distributionPlatform.zip" + ;; +maven-mvnd-*) MVN_CMD=mvnd.sh _MVNW_REPO_PATTERN=/maven/mvnd/ ;; +*) MVN_CMD="mvn${0##*/mvnw}" _MVNW_REPO_PATTERN=/org/apache/maven/ ;; +esac + +# apply MVNW_REPOURL and calculate MAVEN_HOME +# maven home pattern: ~/.m2/wrapper/dists/{apache-maven-,maven-mvnd--}/ +[ -z "${MVNW_REPOURL-}" ] || distributionUrl="$MVNW_REPOURL$_MVNW_REPO_PATTERN${distributionUrl#*"$_MVNW_REPO_PATTERN"}" +distributionUrlName="${distributionUrl##*/}" +distributionUrlNameMain="${distributionUrlName%.*}" +distributionUrlNameMain="${distributionUrlNameMain%-bin}" +MAVEN_HOME="$HOME/.m2/wrapper/dists/${distributionUrlNameMain-}/$(hash_string "$distributionUrl")" + +exec_maven() { + unset MVNW_VERBOSE MVNW_USERNAME MVNW_PASSWORD MVNW_REPOURL || : + exec "$MAVEN_HOME/bin/$MVN_CMD" "$@" || die "cannot exec $MAVEN_HOME/bin/$MVN_CMD" +} + +if [ -d "$MAVEN_HOME" ]; then + verbose "found existing MAVEN_HOME at $MAVEN_HOME" + exec_maven "$@" +fi + +case "${distributionUrl-}" in +*?-bin.zip | *?maven-mvnd-?*-?*.zip) ;; +*) die "distributionUrl is not valid, must match *-bin.zip or maven-mvnd-*.zip, but found '${distributionUrl-}'" ;; +esac + +# prepare tmp dir +if TMP_DOWNLOAD_DIR="$(mktemp -d)" && [ -d "$TMP_DOWNLOAD_DIR" ]; then + clean() { rm -rf -- "$TMP_DOWNLOAD_DIR"; } + trap clean HUP INT TERM EXIT +else + die "cannot create temp dir" +fi + +mkdir -p -- "${MAVEN_HOME%/*}" + +# Download and Install Apache Maven +verbose "Couldn't find MAVEN_HOME, downloading and installing it ..." +verbose "Downloading from: $distributionUrl" +verbose "Downloading to: $TMP_DOWNLOAD_DIR/$distributionUrlName" + +# select .zip or .tar.gz +if ! command -v unzip >/dev/null; then + distributionUrl="${distributionUrl%.zip}.tar.gz" + distributionUrlName="${distributionUrl##*/}" +fi + +# verbose opt +__MVNW_QUIET_WGET=--quiet __MVNW_QUIET_CURL=--silent __MVNW_QUIET_UNZIP=-q __MVNW_QUIET_TAR='' +[ "${MVNW_VERBOSE-}" != true ] || __MVNW_QUIET_WGET='' __MVNW_QUIET_CURL='' __MVNW_QUIET_UNZIP='' __MVNW_QUIET_TAR=v + +# normalize http auth +case "${MVNW_PASSWORD:+has-password}" in +'') MVNW_USERNAME='' MVNW_PASSWORD='' ;; +has-password) [ -n "${MVNW_USERNAME-}" ] || MVNW_USERNAME='' MVNW_PASSWORD='' ;; +esac + +if [ -z "${MVNW_USERNAME-}" ] && command -v wget >/dev/null; then + verbose "Found wget ... using wget" + wget ${__MVNW_QUIET_WGET:+"$__MVNW_QUIET_WGET"} "$distributionUrl" -O "$TMP_DOWNLOAD_DIR/$distributionUrlName" || die "wget: Failed to fetch $distributionUrl" +elif [ -z "${MVNW_USERNAME-}" ] && command -v curl >/dev/null; then + verbose "Found curl ... using curl" + curl ${__MVNW_QUIET_CURL:+"$__MVNW_QUIET_CURL"} -f -L -o "$TMP_DOWNLOAD_DIR/$distributionUrlName" "$distributionUrl" || die "curl: Failed to fetch $distributionUrl" +elif set_java_home; then + verbose "Falling back to use Java to download" + javaSource="$TMP_DOWNLOAD_DIR/Downloader.java" + targetZip="$TMP_DOWNLOAD_DIR/$distributionUrlName" + cat >"$javaSource" <<-END + public class Downloader extends java.net.Authenticator + { + protected java.net.PasswordAuthentication getPasswordAuthentication() + { + return new java.net.PasswordAuthentication( System.getenv( "MVNW_USERNAME" ), System.getenv( "MVNW_PASSWORD" ).toCharArray() ); + } + public static void main( String[] args ) throws Exception + { + setDefault( new Downloader() ); + java.nio.file.Files.copy( java.net.URI.create( args[0] ).toURL().openStream(), java.nio.file.Paths.get( args[1] ).toAbsolutePath().normalize() ); + } + } + END + # For Cygwin/MinGW, switch paths to Windows format before running javac and java + verbose " - Compiling Downloader.java ..." + "$(native_path "$JAVACCMD")" "$(native_path "$javaSource")" || die "Failed to compile Downloader.java" + verbose " - Running Downloader.java ..." + "$(native_path "$JAVACMD")" -cp "$(native_path "$TMP_DOWNLOAD_DIR")" Downloader "$distributionUrl" "$(native_path "$targetZip")" +fi + +# If specified, validate the SHA-256 sum of the Maven distribution zip file +if [ -n "${distributionSha256Sum-}" ]; then + distributionSha256Result=false + if [ "$MVN_CMD" = mvnd.sh ]; then + echo "Checksum validation is not supported for maven-mvnd." >&2 + echo "Please disable validation by removing 'distributionSha256Sum' from your maven-wrapper.properties." >&2 + exit 1 + elif command -v sha256sum >/dev/null; then + if echo "$distributionSha256Sum $TMP_DOWNLOAD_DIR/$distributionUrlName" | sha256sum -c >/dev/null 2>&1; then + distributionSha256Result=true + fi + elif command -v shasum >/dev/null; then + if echo "$distributionSha256Sum $TMP_DOWNLOAD_DIR/$distributionUrlName" | shasum -a 256 -c >/dev/null 2>&1; then + distributionSha256Result=true + fi + else + echo "Checksum validation was requested but neither 'sha256sum' or 'shasum' are available." >&2 + echo "Please install either command, or disable validation by removing 'distributionSha256Sum' from your maven-wrapper.properties." >&2 + exit 1 + fi + if [ $distributionSha256Result = false ]; then + echo "Error: Failed to validate Maven distribution SHA-256, your Maven distribution might be compromised." >&2 + echo "If you updated your Maven version, you need to update the specified distributionSha256Sum property." >&2 + exit 1 + fi +fi + +# unzip and move +if command -v unzip >/dev/null; then + unzip ${__MVNW_QUIET_UNZIP:+"$__MVNW_QUIET_UNZIP"} "$TMP_DOWNLOAD_DIR/$distributionUrlName" -d "$TMP_DOWNLOAD_DIR" || die "failed to unzip" +else + tar xzf${__MVNW_QUIET_TAR:+"$__MVNW_QUIET_TAR"} "$TMP_DOWNLOAD_DIR/$distributionUrlName" -C "$TMP_DOWNLOAD_DIR" || die "failed to untar" +fi +printf %s\\n "$distributionUrl" >"$TMP_DOWNLOAD_DIR/$distributionUrlNameMain/mvnw.url" +mv -- "$TMP_DOWNLOAD_DIR/$distributionUrlNameMain" "$MAVEN_HOME" || [ -d "$MAVEN_HOME" ] || die "fail to move MAVEN_HOME" + +clean || : +exec_maven "$@" diff --git a/transaction-management-service/mvnw.cmd b/transaction-management-service/mvnw.cmd new file mode 100644 index 0000000..406932d --- /dev/null +++ b/transaction-management-service/mvnw.cmd @@ -0,0 +1,146 @@ +<# : batch portion +@REM ---------------------------------------------------------------------------- +@REM Licensed to the Apache Software Foundation (ASF) under one +@REM or more contributor license agreements. See the NOTICE file +@REM distributed with this work for additional information +@REM regarding copyright ownership. The ASF licenses this file +@REM to you under the Apache License, Version 2.0 (the +@REM "License"); you may not use this file except in compliance +@REM with the License. You may obtain a copy of the License at +@REM +@REM https://www.apache.org/licenses/LICENSE-2.0 +@REM +@REM Unless required by applicable law or agreed to in writing, +@REM software distributed under the License is distributed on an +@REM "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +@REM KIND, either express or implied. See the License for the +@REM specific language governing permissions and limitations +@REM under the License. +@REM ---------------------------------------------------------------------------- + +@REM ---------------------------------------------------------------------------- +@REM Apache Maven Wrapper startup batch script, version 3.3.1 +@REM +@REM Optional ENV vars +@REM MVNW_REPOURL - repo url base for downloading maven distribution +@REM MVNW_USERNAME/MVNW_PASSWORD - user and password for downloading maven +@REM MVNW_VERBOSE - true: enable verbose log; others: silence the output +@REM ---------------------------------------------------------------------------- + +@IF "%__MVNW_ARG0_NAME__%"=="" (SET __MVNW_ARG0_NAME__=%~nx0) +@SET __MVNW_CMD__= +@SET __MVNW_ERROR__= +@SET __MVNW_PSMODULEP_SAVE=%PSModulePath% +@SET PSModulePath= +@FOR /F "usebackq tokens=1* delims==" %%A IN (`powershell -noprofile "& {$scriptDir='%~dp0'; $script='%__MVNW_ARG0_NAME__%'; icm -ScriptBlock ([Scriptblock]::Create((Get-Content -Raw '%~f0'))) -NoNewScope}"`) DO @( + IF "%%A"=="MVN_CMD" (set __MVNW_CMD__=%%B) ELSE IF "%%B"=="" (echo %%A) ELSE (echo %%A=%%B) +) +@SET PSModulePath=%__MVNW_PSMODULEP_SAVE% +@SET __MVNW_PSMODULEP_SAVE= +@SET __MVNW_ARG0_NAME__= +@SET MVNW_USERNAME= +@SET MVNW_PASSWORD= +@IF NOT "%__MVNW_CMD__%"=="" (%__MVNW_CMD__% %*) +@echo Cannot start maven from wrapper >&2 && exit /b 1 +@GOTO :EOF +: end batch / begin powershell #> + +$ErrorActionPreference = "Stop" +if ($env:MVNW_VERBOSE -eq "true") { + $VerbosePreference = "Continue" +} + +# calculate distributionUrl, requires .mvn/wrapper/maven-wrapper.properties +$distributionUrl = (Get-Content -Raw "$scriptDir/.mvn/wrapper/maven-wrapper.properties" | ConvertFrom-StringData).distributionUrl +if (!$distributionUrl) { + Write-Error "cannot read distributionUrl property in $scriptDir/.mvn/wrapper/maven-wrapper.properties" +} + +switch -wildcard -casesensitive ( $($distributionUrl -replace '^.*/','') ) { + "maven-mvnd-*" { + $USE_MVND = $true + $distributionUrl = $distributionUrl -replace '-bin\.[^.]*$',"-windows-amd64.zip" + $MVN_CMD = "mvnd.cmd" + break + } + default { + $USE_MVND = $false + $MVN_CMD = $script -replace '^mvnw','mvn' + break + } +} + +# apply MVNW_REPOURL and calculate MAVEN_HOME +# maven home pattern: ~/.m2/wrapper/dists/{apache-maven-,maven-mvnd--}/ +if ($env:MVNW_REPOURL) { + $MVNW_REPO_PATTERN = if ($USE_MVND) { "/org/apache/maven/" } else { "/maven/mvnd/" } + $distributionUrl = "$env:MVNW_REPOURL$MVNW_REPO_PATTERN$($distributionUrl -replace '^.*'+$MVNW_REPO_PATTERN,'')" +} +$distributionUrlName = $distributionUrl -replace '^.*/','' +$distributionUrlNameMain = $distributionUrlName -replace '\.[^.]*$','' -replace '-bin$','' +$MAVEN_HOME_PARENT = "$HOME/.m2/wrapper/dists/$distributionUrlNameMain" +$MAVEN_HOME_NAME = ([System.Security.Cryptography.MD5]::Create().ComputeHash([byte[]][char[]]$distributionUrl) | ForEach-Object {$_.ToString("x2")}) -join '' +$MAVEN_HOME = "$MAVEN_HOME_PARENT/$MAVEN_HOME_NAME" + +if (Test-Path -Path "$MAVEN_HOME" -PathType Container) { + Write-Verbose "found existing MAVEN_HOME at $MAVEN_HOME" + Write-Output "MVN_CMD=$MAVEN_HOME/bin/$MVN_CMD" + exit $? +} + +if (! $distributionUrlNameMain -or ($distributionUrlName -eq $distributionUrlNameMain)) { + Write-Error "distributionUrl is not valid, must end with *-bin.zip, but found $distributionUrl" +} + +# prepare tmp dir +$TMP_DOWNLOAD_DIR_HOLDER = New-TemporaryFile +$TMP_DOWNLOAD_DIR = New-Item -Itemtype Directory -Path "$TMP_DOWNLOAD_DIR_HOLDER.dir" +$TMP_DOWNLOAD_DIR_HOLDER.Delete() | Out-Null +trap { + if ($TMP_DOWNLOAD_DIR.Exists) { + try { Remove-Item $TMP_DOWNLOAD_DIR -Recurse -Force | Out-Null } + catch { Write-Warning "Cannot remove $TMP_DOWNLOAD_DIR" } + } +} + +New-Item -Itemtype Directory -Path "$MAVEN_HOME_PARENT" -Force | Out-Null + +# Download and Install Apache Maven +Write-Verbose "Couldn't find MAVEN_HOME, downloading and installing it ..." +Write-Verbose "Downloading from: $distributionUrl" +Write-Verbose "Downloading to: $TMP_DOWNLOAD_DIR/$distributionUrlName" + +$webclient = New-Object System.Net.WebClient +if ($env:MVNW_USERNAME -and $env:MVNW_PASSWORD) { + $webclient.Credentials = New-Object System.Net.NetworkCredential($env:MVNW_USERNAME, $env:MVNW_PASSWORD) +} +[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 +$webclient.DownloadFile($distributionUrl, "$TMP_DOWNLOAD_DIR/$distributionUrlName") | Out-Null + +# If specified, validate the SHA-256 sum of the Maven distribution zip file +$distributionSha256Sum = (Get-Content -Raw "$scriptDir/.mvn/wrapper/maven-wrapper.properties" | ConvertFrom-StringData).distributionSha256Sum +if ($distributionSha256Sum) { + if ($USE_MVND) { + Write-Error "Checksum validation is not supported for maven-mvnd. `nPlease disable validation by removing 'distributionSha256Sum' from your maven-wrapper.properties." + } + Import-Module $PSHOME\Modules\Microsoft.PowerShell.Utility -Function Get-FileHash + if ((Get-FileHash "$TMP_DOWNLOAD_DIR/$distributionUrlName" -Algorithm SHA256).Hash.ToLower() -ne $distributionSha256Sum) { + Write-Error "Error: Failed to validate Maven distribution SHA-256, your Maven distribution might be compromised. If you updated your Maven version, you need to update the specified distributionSha256Sum property." + } +} + +# unzip and move +Expand-Archive "$TMP_DOWNLOAD_DIR/$distributionUrlName" -DestinationPath "$TMP_DOWNLOAD_DIR" | Out-Null +Rename-Item -Path "$TMP_DOWNLOAD_DIR/$distributionUrlNameMain" -NewName $MAVEN_HOME_NAME | Out-Null +try { + Move-Item -Path "$TMP_DOWNLOAD_DIR/$MAVEN_HOME_NAME" -Destination $MAVEN_HOME_PARENT | Out-Null +} catch { + if (! (Test-Path -Path "$MAVEN_HOME" -PathType Container)) { + Write-Error "fail to move MAVEN_HOME" + } +} finally { + try { Remove-Item $TMP_DOWNLOAD_DIR -Recurse -Force | Out-Null } + catch { Write-Warning "Cannot remove $TMP_DOWNLOAD_DIR" } +} + +Write-Output "MVN_CMD=$MAVEN_HOME/bin/$MVN_CMD" diff --git a/transaction-management-service/pom.xml b/transaction-management-service/pom.xml new file mode 100644 index 0000000..9d7783d --- /dev/null +++ b/transaction-management-service/pom.xml @@ -0,0 +1,85 @@ + + + 4.0.0 + + org.springframework.boot + spring-boot-starter-parent + 3.3.0 + + + com.yape.codechallenge + transaction-management-service + 0.0.1-SNAPSHOT + transaction-management-service + transaction-management-service + + 17 + + + + org.springframework.boot + spring-boot-starter + + + + org.springframework.boot + spring-boot-starter-graphql + + + + org.springframework.boot + spring-boot-starter-web + + + + org.springframework.boot + spring-boot-starter-jdbc + + + + org.springframework.boot + spring-boot-starter-data-redis + + + + redis.clients + jedis + + + + org.springframework.kafka + spring-kafka + + + + org.springframework.boot + spring-boot-starter-test + test + + + + org.projectlombok + lombok + 1.18.32 + provided + + + + org.postgresql + postgresql + runtime + + + + + + + + org.springframework.boot + spring-boot-maven-plugin + + + + + diff --git a/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/TransactionManagementServiceApplication.java b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/TransactionManagementServiceApplication.java new file mode 100644 index 0000000..a63806c --- /dev/null +++ b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/TransactionManagementServiceApplication.java @@ -0,0 +1,29 @@ +package com.yape.codechallenge.transactionmanagementservice; + +import org.springframework.boot.SpringApplication; +import org.springframework.boot.autoconfigure.SpringBootApplication; +import org.springframework.context.annotation.Bean; +import org.springframework.context.annotation.Configuration; +import org.springframework.data.redis.connection.RedisConnectionFactory; +import org.springframework.data.redis.core.RedisTemplate; +import org.springframework.data.redis.serializer.GenericJackson2JsonRedisSerializer; +import org.springframework.data.redis.serializer.StringRedisSerializer; + +@SpringBootApplication +@Configuration +public class TransactionManagementServiceApplication { + + public static void main(String[] args) { + SpringApplication.run(TransactionManagementServiceApplication.class, args); + } + + @Bean + public RedisTemplate redisTemplate(RedisConnectionFactory factory) { + RedisTemplate template = new RedisTemplate<>(); + template.setConnectionFactory(factory); + template.setKeySerializer(new StringRedisSerializer()); + template.setValueSerializer(new GenericJackson2JsonRedisSerializer()); + return template; + } + +} diff --git a/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/application/MessageBrokerUseCase.java b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/application/MessageBrokerUseCase.java new file mode 100644 index 0000000..c3e23b8 --- /dev/null +++ b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/application/MessageBrokerUseCase.java @@ -0,0 +1,42 @@ +package com.yape.codechallenge.transactionmanagementservice.application; + +import com.yape.codechallenge.transactionmanagementservice.domain.Transactions; +import com.yape.codechallenge.transactionmanagementservice.infra.inputport.MessageBrokerInputPort; +import com.yape.codechallenge.transactionmanagementservice.infra.outputport.QueryRepository; +import com.yape.codechallenge.transactionmanagementservice.infra.utils.MapTransformUtils; +import org.springframework.stereotype.Component; + +import java.util.Map; + +@Component +public class MessageBrokerUseCase implements MessageBrokerInputPort { + final + QueryRepository queryRepository; + + Map> classes = Map.of( + "transactions", Transactions.class + ); + + public MessageBrokerUseCase(QueryRepository queryRepository) { + this.queryRepository = queryRepository; + } + + @Override + public void updateReg(String table, Map reg) { + queryRepository.save( reg, classes.get( table ) ); + + } + + @Override + public void insertReg(String table, Map reg) { + queryRepository.save( reg, classes.get( table ) ); + + } + + @Override + public Transactions getById(String table, String id) { + Map queryResult = queryRepository.getById(id, classes.get(table)); + if(queryResult == null || queryResult.isEmpty()) throw new IllegalArgumentException("Transaction not found with provided id"); + return MapTransformUtils.mapToTransaction(queryResult); + } +} diff --git a/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/application/TransactionsUseCase.java b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/application/TransactionsUseCase.java new file mode 100644 index 0000000..cf1ab65 --- /dev/null +++ b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/application/TransactionsUseCase.java @@ -0,0 +1,60 @@ +package com.yape.codechallenge.transactionmanagementservice.application; + +import com.yape.codechallenge.transactionmanagementservice.domain.TransactionStatus; +import com.yape.codechallenge.transactionmanagementservice.domain.TransactionType; +import com.yape.codechallenge.transactionmanagementservice.domain.Transactions; +import com.yape.codechallenge.transactionmanagementservice.infra.inputport.TransactionsInputPort; +import com.yape.codechallenge.transactionmanagementservice.infra.outputport.CommandRepository; +import org.springframework.jdbc.core.JdbcTemplate; +import org.springframework.stereotype.Component; + +import java.math.BigDecimal; +import java.time.LocalDateTime; +import java.util.UUID; + +@Component +public class TransactionsUseCase implements TransactionsInputPort { + final + CommandRepository entityRepository; + private final JdbcTemplate jdbcTemplate; + + public TransactionsUseCase(CommandRepository entityRepository, JdbcTemplate jdbcTemplate) { + this.entityRepository = entityRepository; + this.jdbcTemplate = jdbcTemplate; + } + + @Override + public Transactions createTransaction(String externalIdDebit, String externalIdCredit, int transferTypeId, BigDecimal value) { + Transactions transaction = Transactions.builder() + .transactionExternalId(generateTXId()) + .accountExternalIdDebit(externalIdDebit) + .accountExternalIdCredit(externalIdCredit) + .transferTypeId(transferTypeId) + .transactionStatus(TransactionStatus.PENDING) + .createdAt(LocalDateTime.now()) + .transactionType(TransactionType.TRANSFER) + .value(value) + .build(); + return entityRepository.save(transaction); + } + + public String generateTXId() { + String uuid = UUID.randomUUID().toString(); + String truncatedUuid = uuid.substring(0, 34); + return "TX" + truncatedUuid; + } + + @Override + public Transactions updateTransaction(String externalTransactionId, String status) { + Transactions transaction = entityRepository.getById(externalTransactionId, Transactions.class); + if (transaction != null) { + transaction.setTransactionStatus(TransactionStatus.valueOf(status)); + String sql = "UPDATE Transactions SET transactionStatus = ? WHERE transactionExternalId = ?"; + jdbcTemplate.update(sql, status, externalTransactionId); + }else{ + throw new IllegalArgumentException("Transaction not found"); + } + return transaction; + } + +} diff --git a/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/application/ValidatorUseCase.java b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/application/ValidatorUseCase.java new file mode 100644 index 0000000..a38afd6 --- /dev/null +++ b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/application/ValidatorUseCase.java @@ -0,0 +1,43 @@ +package com.yape.codechallenge.transactionmanagementservice.application; + +import com.yape.codechallenge.transactionmanagementservice.infra.inputport.ValidatorInputPort; +import org.springframework.stereotype.Component; + +import java.math.BigDecimal; +@Component +public class ValidatorUseCase implements ValidatorInputPort { + private static final String IBAN_REGEX = "^PE[0-9]{2}[a-zA-Z0-9]{20}$"; + + @Override + public void validateTransactionInputs(String accountExternalIdDebit, String accountExternalIdCredit, int transferTypeId, BigDecimal value) { + validateIban(accountExternalIdDebit); + validateIban(accountExternalIdCredit); + validateDuplicateIban(accountExternalIdDebit, accountExternalIdCredit); + validateTransferTypeId(transferTypeId); + validateValue(value); + } + + private void validateIban(String accountId) { + if (!accountId.matches(IBAN_REGEX)) { + throw new IllegalArgumentException("Account External Id does not Match IBAN Standard: " + accountId); + } + } + + private void validateDuplicateIban(String accountIdDebit, String accountIdCredit) { + if (accountIdDebit.equals(accountIdCredit)) { + throw new IllegalArgumentException("Account External Id Debit and Credit are the same: " + accountIdDebit); + } + } + + private void validateTransferTypeId(int transferTypeId) { + if (transferTypeId <= 0) { + throw new IllegalArgumentException("Invalid transferTypeId: " + transferTypeId); + } + } + + private void validateValue(BigDecimal value) { + if (value == null || value.compareTo(BigDecimal.ZERO) <= 0) { + throw new IllegalArgumentException("Invalid value: " + value); + } + } +} diff --git a/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/domain/TransactionStatus.java b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/domain/TransactionStatus.java new file mode 100644 index 0000000..b6655d5 --- /dev/null +++ b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/domain/TransactionStatus.java @@ -0,0 +1,7 @@ +package com.yape.codechallenge.transactionmanagementservice.domain; + +public enum TransactionStatus { + PENDING, + REJECTED, + ACCEPTED +} diff --git a/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/domain/TransactionType.java b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/domain/TransactionType.java new file mode 100644 index 0000000..b6e2019 --- /dev/null +++ b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/domain/TransactionType.java @@ -0,0 +1,11 @@ +package com.yape.codechallenge.transactionmanagementservice.domain; + +public enum TransactionType { + TRANSFER, + REFUND, + PAYMENT, + DEPOSIT, + CHARGE, + CHARGE_BACK, + OTHERS +} \ No newline at end of file diff --git a/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/domain/Transactions.java b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/domain/Transactions.java new file mode 100644 index 0000000..1dcfeb8 --- /dev/null +++ b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/domain/Transactions.java @@ -0,0 +1,21 @@ +package com.yape.codechallenge.transactionmanagementservice.domain; + +import lombok.Builder; +import lombok.Data; + +import java.math.BigDecimal; +import java.time.LocalDateTime; + +@Data +@Builder +public class Transactions { + private String transactionExternalId; + private String accountExternalIdDebit; + private String accountExternalIdCredit; + private int transferTypeId; + private BigDecimal value; + private TransactionType transactionType; + private TransactionStatus transactionStatus; + private LocalDateTime createdAt; + +} \ No newline at end of file diff --git a/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/exception/CommonExceptionHandler.java b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/exception/CommonExceptionHandler.java new file mode 100644 index 0000000..5d08da0 --- /dev/null +++ b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/exception/CommonExceptionHandler.java @@ -0,0 +1,23 @@ +package com.yape.codechallenge.transactionmanagementservice.exception; + +import graphql.GraphQLError; +import org.springframework.graphql.data.method.annotation.GraphQlExceptionHandler; +import org.springframework.web.bind.annotation.ControllerAdvice; + +@ControllerAdvice +public class CommonExceptionHandler { + @GraphQlExceptionHandler + public GraphQLError handleIllegalArgumentException(IllegalArgumentException e) { + return GraphQLError.newError() + .message(e.getMessage()) + .build(); + } + + @GraphQlExceptionHandler + public GraphQLError handleRuntimeException(RuntimeException e) { + return GraphQLError.newError() + .message(e.getMessage()) + .build(); + } + +} diff --git a/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/inputadapter/graphql/TransactionsAPI.java b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/inputadapter/graphql/TransactionsAPI.java new file mode 100644 index 0000000..bfacd9e --- /dev/null +++ b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/inputadapter/graphql/TransactionsAPI.java @@ -0,0 +1,41 @@ +package com.yape.codechallenge.transactionmanagementservice.infra.inputadapter.graphql; + +import com.yape.codechallenge.transactionmanagementservice.domain.Transactions; +import com.yape.codechallenge.transactionmanagementservice.infra.inputport.MessageBrokerInputPort; +import com.yape.codechallenge.transactionmanagementservice.infra.inputport.TransactionsInputPort; +import com.yape.codechallenge.transactionmanagementservice.infra.inputport.ValidatorInputPort; +import com.yape.codechallenge.transactionmanagementservice.infra.utils.ConstantsUtils; +import org.springframework.graphql.data.method.annotation.Argument; +import org.springframework.graphql.data.method.annotation.MutationMapping; +import org.springframework.graphql.data.method.annotation.QueryMapping; +import org.springframework.stereotype.Controller; + +import java.math.BigDecimal; + +@Controller +public class TransactionsAPI { + final + TransactionsInputPort transactionsInputPort; + final + MessageBrokerInputPort messageBrokerInputPort; + final + ValidatorInputPort validatorInputPort; + + public TransactionsAPI(TransactionsInputPort transactionsInputPort, MessageBrokerInputPort messageBrokerInputPort, ValidatorInputPort validatorInputPort) { + this.transactionsInputPort = transactionsInputPort; + this.messageBrokerInputPort = messageBrokerInputPort; + this.validatorInputPort = validatorInputPort; + } + + @MutationMapping + public Transactions createTransaction(@Argument String accountExternalIdDebit,@Argument String accountExternalIdCredit, @Argument int transferTypeId, @Argument BigDecimal value) { + validatorInputPort.validateTransactionInputs(accountExternalIdDebit, accountExternalIdCredit, transferTypeId, value); + return transactionsInputPort.createTransaction(accountExternalIdDebit, accountExternalIdCredit, transferTypeId, value); + } + + @QueryMapping + public Transactions getTransaction(@Argument String transactionExternalId) { + return messageBrokerInputPort.getById(ConstantsUtils.TRANSACTIONS_NAME, transactionExternalId); + } + +} diff --git a/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/inputadapter/message/KafkaAntiFraudMessage.java b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/inputadapter/message/KafkaAntiFraudMessage.java new file mode 100644 index 0000000..2981507 --- /dev/null +++ b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/inputadapter/message/KafkaAntiFraudMessage.java @@ -0,0 +1,36 @@ +package com.yape.codechallenge.transactionmanagementservice.infra.inputadapter.message; + +import com.yape.codechallenge.transactionmanagementservice.domain.Transactions; +import com.yape.codechallenge.transactionmanagementservice.infra.inputport.TransactionsInputPort; +import com.yape.codechallenge.transactionmanagementservice.infra.utils.ConstantsUtils; +import com.yape.codechallenge.transactionmanagementservice.infra.utils.ConvertUtils; +import lombok.extern.slf4j.Slf4j; +import org.springframework.kafka.annotation.KafkaListener; +import org.springframework.stereotype.Service; + +import java.util.Map; + +@Service +@Slf4j +public class KafkaAntiFraudMessage { + + final + TransactionsInputPort transactionsInputPort; + + public KafkaAntiFraudMessage(TransactionsInputPort transactionsInputPort) { + this.transactionsInputPort = transactionsInputPort; + } + + @KafkaListener(topics = ConstantsUtils.EventConstants.CONSUMER_AF_TOPIC, groupId = ConstantsUtils.EventConstants.GROUP_ID_3) + public void listen(String message) { + try { + log.info("Received message: {}", message); + Map eventMap = ConvertUtils.jsonstring2Map(message); + Transactions updatedTransaction = transactionsInputPort.updateTransaction(eventMap.get("transactionExternalId").toString(), eventMap.get("evaluationResult").toString()); + log.info("Transaction updated: {}", updatedTransaction); + } catch (Exception e) { + log.error("Error updating transaction: {}", message, e); + } + } + +} diff --git a/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/inputadapter/message/KafkaDBMessage.java b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/inputadapter/message/KafkaDBMessage.java new file mode 100644 index 0000000..59d9782 --- /dev/null +++ b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/inputadapter/message/KafkaDBMessage.java @@ -0,0 +1,42 @@ +package com.yape.codechallenge.transactionmanagementservice.infra.inputadapter.message; + +import com.yape.codechallenge.transactionmanagementservice.infra.inputport.MessageBrokerInputPort; +import com.yape.codechallenge.transactionmanagementservice.infra.utils.ConstantsUtils; +import com.yape.codechallenge.transactionmanagementservice.infra.utils.ConvertUtils; +import org.springframework.kafka.annotation.KafkaListener; +import org.springframework.messaging.handler.annotation.Payload; +import org.springframework.stereotype.Service; + +import java.util.Map; + +@Service +public class KafkaDBMessage { + + final + MessageBrokerInputPort messageBrokerInputPort; + + public KafkaDBMessage(MessageBrokerInputPort messageBrokerInputPort) { + this.messageBrokerInputPort = messageBrokerInputPort; + } + + @KafkaListener(topicPattern = ConstantsUtils.EventConstants.CONSUMER_DB_TOPIC, groupId = ConstantsUtils.EventConstants.GROUP_ID_1) + public void messageHandler(@Payload( required = false) String eventMsg) { + if ( eventMsg == null ) return; + + Map event = ConvertUtils.jsonstring2Map( eventMsg ); + + Map payload = (Map) event.get("payload"); + String operation = (String) payload.get("op"); + String table = (String) ((Map) payload.get("source")).get("table"); + + if ( operation.equals("u") ) { + messageBrokerInputPort.updateReg(table, (Map) payload.get("after")); + } else if ( operation.equals("c") ) { + messageBrokerInputPort.insertReg(table, (Map) payload.get("after")); + } + + } + + + +} diff --git a/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/inputport/MessageBrokerInputPort.java b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/inputport/MessageBrokerInputPort.java new file mode 100644 index 0000000..d0168d0 --- /dev/null +++ b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/inputport/MessageBrokerInputPort.java @@ -0,0 +1,11 @@ +package com.yape.codechallenge.transactionmanagementservice.infra.inputport; + +import com.yape.codechallenge.transactionmanagementservice.domain.Transactions; + +import java.util.Map; + +public interface MessageBrokerInputPort { + void updateReg( String table, Map reg ); + void insertReg( String table, Map reg ); + Transactions getById(String table, String id ); +} diff --git a/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/inputport/TransactionsInputPort.java b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/inputport/TransactionsInputPort.java new file mode 100644 index 0000000..2f2cffe --- /dev/null +++ b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/inputport/TransactionsInputPort.java @@ -0,0 +1,11 @@ +package com.yape.codechallenge.transactionmanagementservice.infra.inputport; + +import com.yape.codechallenge.transactionmanagementservice.domain.Transactions; + +import java.math.BigDecimal; + + +public interface TransactionsInputPort { + Transactions createTransaction(String externalIdDebit, String externalIdCredit, int transferTypeId, BigDecimal value); + Transactions updateTransaction(String externalTransactionId, String status); +} diff --git a/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/inputport/ValidatorInputPort.java b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/inputport/ValidatorInputPort.java new file mode 100644 index 0000000..3bdd30f --- /dev/null +++ b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/inputport/ValidatorInputPort.java @@ -0,0 +1,7 @@ +package com.yape.codechallenge.transactionmanagementservice.infra.inputport; + +import java.math.BigDecimal; + +public interface ValidatorInputPort { + void validateTransactionInputs(String accountExternalIdDebit, String accountExternalIdCredit, int transferTypeId, BigDecimal value); +} diff --git a/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/outputadapter/postgresrepository/PostgresRepository.java b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/outputadapter/postgresrepository/PostgresRepository.java new file mode 100644 index 0000000..6b13275 --- /dev/null +++ b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/outputadapter/postgresrepository/PostgresRepository.java @@ -0,0 +1,147 @@ +package com.yape.codechallenge.transactionmanagementservice.infra.outputadapter.postgresrepository; + +import com.yape.codechallenge.transactionmanagementservice.domain.TransactionStatus; +import com.yape.codechallenge.transactionmanagementservice.domain.TransactionType; +import com.yape.codechallenge.transactionmanagementservice.infra.outputport.CommandRepository; +import lombok.extern.slf4j.Slf4j; +import org.springframework.dao.EmptyResultDataAccessException; +import org.springframework.jdbc.core.JdbcTemplate; +import org.springframework.jdbc.core.RowMapper; +import org.springframework.stereotype.Component; + +import java.lang.reflect.Field; +import java.lang.reflect.InvocationTargetException; +import java.lang.reflect.Method; +import java.sql.ResultSet; +import java.sql.SQLException; +import java.sql.Timestamp; +import java.time.LocalDateTime; +import java.util.ArrayList; +import java.util.Collections; +import java.util.List; +import java.util.stream.Stream; + +@Slf4j +@Component +public class PostgresRepository implements CommandRepository { + + final + JdbcTemplate jdbcTemplate; + + public PostgresRepository(JdbcTemplate jdbcTemplate) { + this.jdbcTemplate = jdbcTemplate; + } + + @Override + public T save(T reg) { + Field[] entityFields = reg.getClass().getDeclaredFields(); + + List fields; + List list = new ArrayList<>(); + for (Field entityField : entityFields) { + String name = entityField.getName(); + list.add(name); + } + fields = list; + + List fieldValues = Stream.of(entityFields) + .map(field -> { + try { + field.setAccessible(true); + Object value = field.get(reg); + + if (value instanceof TransactionStatus || value instanceof TransactionType) { + value = value.toString(); + } + + return value; + } catch (IllegalAccessException e) { + log.error("Error saving entity", e); + return null; + } + }) + .toList(); + + String sql = String.format("INSERT INTO %s (%s) VALUES (%s)", + reg.getClass().getSimpleName(), + String.join(",", fields), + String.join(",", Collections.nCopies(fields.size(), "?"))); + + jdbcTemplate.update(sql, fieldValues.toArray()); + + return reg; + } + + @Override + public T getById(String id, Class clazz) { + String sql = "SELECT * FROM " + clazz.getSimpleName() + " WHERE transactionexternalid = ?"; + try { + return jdbcTemplate.queryForObject(sql, new LombokRowMapper(clazz), id); + } catch (EmptyResultDataAccessException e) { + return null; + } + } + + private static class LombokRowMapper implements RowMapper { + private Class clazz = null; + + public LombokRowMapper(Class clazz) { + this.clazz = clazz; + } + + @Override + public T mapRow(ResultSet rs, int rowNum) throws SQLException { + try { + Object row = createBuilderInstance(); + Method[] methods = row.getClass().getDeclaredMethods(); + for (Method method : methods) { + String columnName = method.getName(); + if (isColumnPresent(rs, columnName)) { + Object fieldValue = getFieldValue(rs, method, columnName); + method.invoke(row, fieldValue); + } + } + return buildRow(row); + } catch (IllegalAccessException | IllegalArgumentException | InvocationTargetException + | NoSuchMethodException | SecurityException e) { log.error("Error mapping row", e); } + return null; + } + + private Object createBuilderInstance() throws NoSuchMethodException, IllegalAccessException, InvocationTargetException { + Method builderMethod = clazz.getMethod("builder"); + return builderMethod.invoke(null); + } + + private boolean isColumnPresent(ResultSet rs, String columnName) { + try { + rs.findColumn(columnName); + return true; + } catch (SQLException ex) { + return false; + } + } + + private Object getFieldValue(ResultSet rs, Method method, String columnName) throws SQLException { + Object fieldValue = rs.getObject(columnName); + Class[] parameterTypes = method.getParameterTypes(); + + if (parameterTypes.length > 0) { + if (parameterTypes[0].isEnum()) { + fieldValue = Enum.valueOf((Class) parameterTypes[0], (String) fieldValue); + } else if (parameterTypes[0].equals(LocalDateTime.class)) { + fieldValue = convertToDateTime(rs, columnName); + } + } + return fieldValue; + } + + private LocalDateTime convertToDateTime(ResultSet rs, String columnName) throws SQLException { + Timestamp timestamp = rs.getTimestamp(columnName); + return timestamp != null ? timestamp.toLocalDateTime() : null; + } + + private T buildRow(Object row) throws NoSuchMethodException, InvocationTargetException, IllegalAccessException { + return (T) row.getClass().getMethod("build").invoke(row); + } + } +} diff --git a/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/outputadapter/redisrepository/RedisRepository.java b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/outputadapter/redisrepository/RedisRepository.java new file mode 100644 index 0000000..7118bfb --- /dev/null +++ b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/outputadapter/redisrepository/RedisRepository.java @@ -0,0 +1,41 @@ +package com.yape.codechallenge.transactionmanagementservice.infra.outputadapter.redisrepository; + +import com.yape.codechallenge.transactionmanagementservice.infra.outputport.QueryRepository; +import com.yape.codechallenge.transactionmanagementservice.infra.utils.ConstantsUtils; +import com.yape.codechallenge.transactionmanagementservice.infra.utils.ConvertUtils; +import org.springframework.data.redis.core.RedisTemplate; +import org.springframework.stereotype.Component; + +import java.util.Map; +@Component +public class RedisRepository implements QueryRepository { + final + RedisTemplate redisTemplate; + + public RedisRepository(RedisTemplate redisTemplate) { + this.redisTemplate = redisTemplate; + } + + @Override + public void save(Map reg, Class clazz) { + redisTemplate.opsForHash().put( + getHashFromClass( clazz ), + reg.get(ConstantsUtils.TransactionMapper.TRANSACTION_EXTERNAL_ID), + ConvertUtils.map2Jsonstring( reg ) + ); + } + + @Override + public Map getById(String id, Class clazz) { + return ConvertUtils.jsonstring2Map( + (String) redisTemplate.opsForHash().get( + getHashFromClass( clazz ), + id + ) + ); + } + + private String getHashFromClass( Class clazz ) { + return clazz.getName().replace('.', '_'); + } +} diff --git a/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/outputport/CommandRepository.java b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/outputport/CommandRepository.java new file mode 100644 index 0000000..7aacf13 --- /dev/null +++ b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/outputport/CommandRepository.java @@ -0,0 +1,7 @@ +package com.yape.codechallenge.transactionmanagementservice.infra.outputport; + +public interface CommandRepository { + public T save( T reg ); + + public T getById( String id, Class clazz ); +} diff --git a/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/outputport/QueryRepository.java b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/outputport/QueryRepository.java new file mode 100644 index 0000000..676c97f --- /dev/null +++ b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/outputport/QueryRepository.java @@ -0,0 +1,10 @@ +package com.yape.codechallenge.transactionmanagementservice.infra.outputport; + +import java.util.Map; + +public interface QueryRepository { + + void save(Map reg, Class clazz ); + + Map getById( String id, Class clazz ); +} diff --git a/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/utils/ConstantsUtils.java b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/utils/ConstantsUtils.java new file mode 100644 index 0000000..beab113 --- /dev/null +++ b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/utils/ConstantsUtils.java @@ -0,0 +1,26 @@ +package com.yape.codechallenge.transactionmanagementservice.infra.utils; + +public class ConstantsUtils { + private ConstantsUtils() { + } + public static final String TRANSACTIONS_NAME = "transactions"; + + public static class TransactionMapper { + public static final String TRANSACTION_EXTERNAL_ID = "transactionexternalid"; + public static final String CREATED_AT = "createdat"; + public static final String TRANSACTION_STATUS = "transactionstatus"; + public static final String TRANSACTION_TYPE = "transactiontype"; + public static final String VALUE = "value"; + private TransactionMapper() { + } + } + public static class EventConstants { + public static final String CONSUMER_AF_TOPIC = "transaction-status"; + public static final String CONSUMER_DB_TOPIC = "cqrs-.public.*"; + public static final String GROUP_ID_1 = "group1"; + public static final String GROUP_ID_3 = "group3"; + + private EventConstants() { + } + } +} diff --git a/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/utils/ConvertUtils.java b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/utils/ConvertUtils.java new file mode 100644 index 0000000..3584b3e --- /dev/null +++ b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/utils/ConvertUtils.java @@ -0,0 +1,54 @@ +package com.yape.codechallenge.transactionmanagementservice.infra.utils; + +import com.fasterxml.jackson.core.JsonProcessingException; +import com.fasterxml.jackson.databind.ObjectMapper; + +import java.math.BigDecimal; +import java.math.BigInteger; +import java.time.Instant; +import java.time.LocalDateTime; +import java.time.ZoneId; +import java.util.Base64; +import java.util.HashMap; +import java.util.Map; + +public class ConvertUtils { + + private static ObjectMapper objectMapper = new ObjectMapper(); + + private ConvertUtils() {} + + public static String map2Jsonstring( Map map ) { + if ( map == null ) return "{}"; + + try { + return objectMapper.writeValueAsString( map ); + } catch (JsonProcessingException e) { + e.printStackTrace(); + } + + return "{}"; + } + + public static Map jsonstring2Map( String json ) { + if ( json == null ) return new HashMap<>(); + + try { + return objectMapper.readValue( json, Map.class); + } catch (JsonProcessingException e) { + e.printStackTrace(); + } + + return new HashMap<>(); + } + + public static LocalDateTime unixLongToLocalDateTime(long unixTimeSeg) { + long unixTime = unixTimeSeg /1000; + Instant instant = Instant.ofEpochMilli(unixTime); + return LocalDateTime.ofInstant(instant, ZoneId.systemDefault()); + } + + public static BigDecimal getBigDecimalValueFromMap(Map base64Valuemap) { + return new BigDecimal(new BigInteger(Base64.getDecoder().decode(base64Valuemap.get("value").toString())), (Integer) base64Valuemap.get("scale")); + } +} diff --git a/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/utils/MapTransformUtils.java b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/utils/MapTransformUtils.java new file mode 100644 index 0000000..15a5a1e --- /dev/null +++ b/transaction-management-service/src/main/java/com/yape/codechallenge/transactionmanagementservice/infra/utils/MapTransformUtils.java @@ -0,0 +1,21 @@ +package com.yape.codechallenge.transactionmanagementservice.infra.utils; + +import com.yape.codechallenge.transactionmanagementservice.domain.TransactionStatus; +import com.yape.codechallenge.transactionmanagementservice.domain.TransactionType; +import com.yape.codechallenge.transactionmanagementservice.domain.Transactions; + +import java.util.Map; + +public class MapTransformUtils { + private MapTransformUtils() { + } + public static Transactions mapToTransaction(Map map) { + return Transactions.builder() + .transactionExternalId((String) map.get(ConstantsUtils.TransactionMapper.TRANSACTION_EXTERNAL_ID)) + .value(ConvertUtils.getBigDecimalValueFromMap((Map) map.get(ConstantsUtils.TransactionMapper.VALUE))) + .transactionType(TransactionType.valueOf(map.get(ConstantsUtils.TransactionMapper.TRANSACTION_TYPE).toString())) + .transactionStatus(TransactionStatus.valueOf(map.get(ConstantsUtils.TransactionMapper.TRANSACTION_STATUS).toString())) + .createdAt(ConvertUtils.unixLongToLocalDateTime((long)map.get(ConstantsUtils.TransactionMapper.CREATED_AT))) + .build(); + } +} diff --git a/transaction-management-service/src/main/resources/application.properties b/transaction-management-service/src/main/resources/application.properties new file mode 100644 index 0000000..cfe221e --- /dev/null +++ b/transaction-management-service/src/main/resources/application.properties @@ -0,0 +1,13 @@ +spring.application.name=transaction-management-ms + +spring.datasource.url=jdbc:postgresql://localhost:5432/postgres +spring.datasource.username=postgres +spring.datasource.password=postgres + +spring.graphql.graphiql.enabled=true + +spring.data.redis.host= localhost +spring.data.redis.port = 6379 +spring.data.redis.password = REDISPSWD + +spring.kafka.consumer.bootstrap-servers=127.0.0.1:29092 diff --git a/transaction-management-service/src/main/resources/graphql/schema.graphqls b/transaction-management-service/src/main/resources/graphql/schema.graphqls new file mode 100644 index 0000000..56251c7 --- /dev/null +++ b/transaction-management-service/src/main/resources/graphql/schema.graphqls @@ -0,0 +1,34 @@ +type Transactions { + transactionExternalId: ID! + accountExternalIdDebit: String! + accountExternalIdCredit: String! + transferTypeId: Int! + value: Float! + transactionType: TransactionType! + transactionStatus: TransactionStatus! + createdAt: String! +} + +enum TransactionType { + TRANSFER, + REFUND, + PAYMENT, + DEPOSIT, + CHARGE, + CHARGE_BACK, + OTHERS +} + +enum TransactionStatus { + PENDING + REJECTED + ACCEPTED +} + +type Query { + getTransaction(transactionExternalId: String!): Transactions +} + +type Mutation { + createTransaction(accountExternalIdDebit: ID!, accountExternalIdCredit: ID!, transferTypeId: Int!, value: Float!): Transactions +} \ No newline at end of file diff --git a/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/CommonExceptionHandlerTest.java b/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/CommonExceptionHandlerTest.java new file mode 100644 index 0000000..55b99fa --- /dev/null +++ b/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/CommonExceptionHandlerTest.java @@ -0,0 +1,40 @@ +package com.yape.codechallenge.transactionmanagementservice; + +import com.yape.codechallenge.transactionmanagementservice.exception.CommonExceptionHandler; +import graphql.GraphQLError; +import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.Test; +import org.mockito.InjectMocks; +import org.mockito.MockitoAnnotations; + +import static org.junit.jupiter.api.Assertions.assertEquals; + +public class CommonExceptionHandlerTest { + @InjectMocks + private CommonExceptionHandler commonExceptionHandler; + + @BeforeEach + public void setup() { + MockitoAnnotations.openMocks(this); + } + + @Test + void handleIllegalArgumentExceptionShouldReturnGraphQLErrorWithCorrectMessage() { + String exceptionMessage = "Illegal argument exception message"; + IllegalArgumentException exception = new IllegalArgumentException(exceptionMessage); + + GraphQLError error = commonExceptionHandler.handleIllegalArgumentException(exception); + + assertEquals(exceptionMessage, error.getMessage()); + } + + @Test + void handleRuntimeExceptionShouldReturnGraphQLErrorWithCorrectMessage() { + String exceptionMessage = "Runtime exception message"; + RuntimeException exception = new RuntimeException(exceptionMessage); + + GraphQLError error = commonExceptionHandler.handleRuntimeException(exception); + + assertEquals(exceptionMessage, error.getMessage()); + } +} diff --git a/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/KafkaAntiFraudMessageTest.java b/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/KafkaAntiFraudMessageTest.java new file mode 100644 index 0000000..39d9290 --- /dev/null +++ b/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/KafkaAntiFraudMessageTest.java @@ -0,0 +1,52 @@ +package com.yape.codechallenge.transactionmanagementservice; + +import com.yape.codechallenge.transactionmanagementservice.infra.inputadapter.message.KafkaAntiFraudMessage; +import com.yape.codechallenge.transactionmanagementservice.infra.inputport.TransactionsInputPort; +import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.Test; +import org.mockito.InjectMocks; +import org.mockito.Mock; +import org.mockito.MockitoAnnotations; + +import static org.mockito.ArgumentMatchers.anyString; +import static org.mockito.Mockito.*; + +public class KafkaAntiFraudMessageTest { + + @Mock + private TransactionsInputPort transactionsInputPort; + + @InjectMocks + private KafkaAntiFraudMessage kafkaAntiFraudMessage; + + @BeforeEach + public void setup() { + MockitoAnnotations.openMocks(this); + } + + @Test + void listenShouldUpdateTransactionWhenMessageIsValid() { + String validMessage = "{\"transactionExternalId\":\"123\",\"evaluationResult\":\"PASS\"}"; + + kafkaAntiFraudMessage.listen(validMessage); + + verify(transactionsInputPort, times(1)).updateTransaction(anyString(), anyString()); + } + + @Test + void listenShouldNotUpdateTransactionWhenMessageIsInvalid() { + String invalidMessage = "Invalid message"; + + kafkaAntiFraudMessage.listen(invalidMessage); + + verify(transactionsInputPort, never()).updateTransaction(anyString(), anyString()); + } + + @Test + void listenShouldNotUpdateTransactionWhenMessageIsNull() { + kafkaAntiFraudMessage.listen(null); + + verify(transactionsInputPort, never()).updateTransaction(anyString(), anyString()); + } + +} diff --git a/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/KafkaDBMessageTest.java b/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/KafkaDBMessageTest.java new file mode 100644 index 0000000..4aa5d33 --- /dev/null +++ b/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/KafkaDBMessageTest.java @@ -0,0 +1,63 @@ +package com.yape.codechallenge.transactionmanagementservice; + +import com.yape.codechallenge.transactionmanagementservice.infra.inputadapter.message.KafkaDBMessage; +import com.yape.codechallenge.transactionmanagementservice.infra.inputport.MessageBrokerInputPort; +import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.Test; +import org.mockito.InjectMocks; +import org.mockito.Mock; +import org.mockito.MockitoAnnotations; + +import static org.mockito.ArgumentMatchers.anyMap; +import static org.mockito.ArgumentMatchers.anyString; +import static org.mockito.Mockito.*; + +public class KafkaDBMessageTest { + + @Mock + private MessageBrokerInputPort messageBrokerInputPort; + + @InjectMocks + private KafkaDBMessage kafkaDBMessage; + + @BeforeEach + public void setup() { + MockitoAnnotations.openMocks(this); + } + + @Test + void messageHandlerShouldUpdateRegWhenOperationIsU() { + String eventMsg = "{\"payload\":{\"op\":\"u\",\"after\":{\"key\":\"value\"},\"source\":{\"table\":\"table\"}}}"; + + kafkaDBMessage.messageHandler(eventMsg); + + verify(messageBrokerInputPort, times(1)).updateReg(anyString(), anyMap()); + } + + @Test + void messageHandlerShouldInsertRegWhenOperationIsC() { + String eventMsg = "{\"payload\":{\"op\":\"c\",\"after\":{\"key\":\"value\"},\"source\":{\"table\":\"table\"}}}"; + + kafkaDBMessage.messageHandler(eventMsg); + + verify(messageBrokerInputPort, times(1)).insertReg(anyString(), anyMap()); + } + + @Test + void messageHandlerShouldDoNothingWhenOperationIsNotUorC() { + String eventMsg = "{\"payload\":{\"op\":\"d\",\"after\":{\"key\":\"value\"},\"source\":{\"table\":\"table\"}}}"; + + kafkaDBMessage.messageHandler(eventMsg); + + verify(messageBrokerInputPort, never()).updateReg(anyString(), anyMap()); + verify(messageBrokerInputPort, never()).insertReg(anyString(), anyMap()); + } + + @Test + void messageHandlerShouldDoNothingWhenEventMsgIsNull() { + kafkaDBMessage.messageHandler(null); + + verify(messageBrokerInputPort, never()).updateReg(anyString(), anyMap()); + verify(messageBrokerInputPort, never()).insertReg(anyString(), anyMap()); + } +} \ No newline at end of file diff --git a/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/MessageBrokerUseCaseTest.java b/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/MessageBrokerUseCaseTest.java new file mode 100644 index 0000000..f74bc82 --- /dev/null +++ b/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/MessageBrokerUseCaseTest.java @@ -0,0 +1,78 @@ +package com.yape.codechallenge.transactionmanagementservice; + +import com.yape.codechallenge.transactionmanagementservice.application.MessageBrokerUseCase; +import com.yape.codechallenge.transactionmanagementservice.domain.Transactions; +import com.yape.codechallenge.transactionmanagementservice.infra.outputport.QueryRepository; +import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.Test; +import org.mockito.Mock; +import org.mockito.MockitoAnnotations; + +import java.util.HashMap; +import java.util.Map; + +import static org.junit.jupiter.api.Assertions.assertEquals; +import static org.mockito.ArgumentMatchers.any; +import static org.mockito.ArgumentMatchers.anyString; +import static org.mockito.Mockito.verify; +import static org.mockito.Mockito.when; + +class MessageBrokerUseCaseTest { + + @Mock + private QueryRepository queryRepository; + + private MessageBrokerUseCase messageBrokerUseCase; + + @BeforeEach + void setUp() { + MockitoAnnotations.openMocks(this); + messageBrokerUseCase = new MessageBrokerUseCase(queryRepository); + } + + @Test + void shouldUpdateRegSuccessfully() { + String table = "transactions"; + Map reg = new HashMap<>(); + reg.put("transactionExternalId", "TX1234567890"); + reg.put("transactionStatus", "PENDING"); + + messageBrokerUseCase.updateReg(table, reg); + + verify(queryRepository).save(any(), any()); + } + + @Test + void shouldInsertRegSuccessfully() { + String table = "transactions"; + Map reg = new HashMap<>(); + reg.put("transactionExternalId", "TX1234567890"); + reg.put("transactionStatus", "PENDING"); + + messageBrokerUseCase.insertReg(table, reg); + + verify(queryRepository).save(any(), any()); + } + + @Test + void shouldGetByIdSuccessfully() { + String table = "transactions"; + String id = "TX1234567890"; + Map mockTransactionMap = new HashMap<>(); + mockTransactionMap.put("transactionexternalid", "TX1234567890"); + mockTransactionMap.put("transactionstatus", "PENDING"); + mockTransactionMap.put("transactiontype", "TRANSFER"); + Map valueMap = new HashMap<>(); + valueMap.put("value", "100"); + valueMap.put("scale", 2); + mockTransactionMap.put("value", valueMap); + mockTransactionMap.put("createdat", System.currentTimeMillis()); + + when(queryRepository.getById(anyString(), any())).thenReturn(mockTransactionMap); + + Transactions result = messageBrokerUseCase.getById(table, id); + + assertEquals("TX1234567890", result.getTransactionExternalId()); + verify(queryRepository).getById(anyString(), any()); + } +} \ No newline at end of file diff --git a/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/PostgresRepositoryTest.java b/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/PostgresRepositoryTest.java new file mode 100644 index 0000000..7ef0e1e --- /dev/null +++ b/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/PostgresRepositoryTest.java @@ -0,0 +1,82 @@ +package com.yape.codechallenge.transactionmanagementservice; + +import com.yape.codechallenge.transactionmanagementservice.domain.TransactionStatus; +import com.yape.codechallenge.transactionmanagementservice.domain.TransactionType; +import com.yape.codechallenge.transactionmanagementservice.domain.Transactions; +import com.yape.codechallenge.transactionmanagementservice.infra.outputadapter.postgresrepository.PostgresRepository; +import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.Test; +import org.mockito.Mock; +import org.mockito.MockitoAnnotations; +import org.springframework.dao.EmptyResultDataAccessException; +import org.springframework.jdbc.core.JdbcTemplate; +import org.springframework.jdbc.core.RowMapper; + +import java.math.BigDecimal; +import java.time.LocalDateTime; +import java.util.HashMap; +import java.util.Map; + +import static org.junit.jupiter.api.Assertions.assertEquals; +import static org.junit.jupiter.api.Assertions.assertNull; +import static org.mockito.ArgumentMatchers.any; +import static org.mockito.ArgumentMatchers.anyString; +import static org.mockito.Mockito.verify; +import static org.mockito.Mockito.when; + +class PostgresRepositoryTest { + + @Mock + private JdbcTemplate jdbcTemplate; + + private PostgresRepository postgresRepository; + + @BeforeEach + void setUp() { + MockitoAnnotations.openMocks(this); + postgresRepository = new PostgresRepository(jdbcTemplate); + } + + @Test + void shouldSaveSuccessfully() { + Transactions mockTransaction = Transactions.builder() + .transactionExternalId("TX1234567890") + .transactionStatus(TransactionStatus.valueOf("PENDING")) + .transactionType(TransactionType.valueOf("TRANSFER")) + .value(BigDecimal.valueOf(100)) + .createdAt(LocalDateTime.now()) + .build(); + + postgresRepository.save(mockTransaction); + + verify(jdbcTemplate).update(anyString(), any(Object[].class)); + } + + @Test + void shouldGetByIdSuccessfully() { + Transactions mockTransaction = Transactions.builder() + .transactionExternalId("TX1234567890") + .transactionStatus(TransactionStatus.valueOf("PENDING")) + .transactionType(TransactionType.valueOf("TRANSFER")) + .value(BigDecimal.valueOf(100)) + .createdAt(LocalDateTime.now()) + .build(); + + when(jdbcTemplate.queryForObject(anyString(), any(RowMapper.class), anyString())).thenReturn(mockTransaction); + Transactions result = postgresRepository.getById("TX1234567890", Transactions.class); + assertEquals("TX1234567890", result.getTransactionExternalId()); + verify(jdbcTemplate).queryForObject(anyString(), (RowMapper) any(), anyString()); + } + + @Test + void shouldReturnNullWhenGetByIdFails() { + String id = "TX1234567890"; + + when(jdbcTemplate.queryForObject(anyString(), (RowMapper) any(), anyString())).thenThrow(EmptyResultDataAccessException.class); + + Transactions result = postgresRepository.getById(id, Transactions.class); + + assertNull(result); + verify(jdbcTemplate).queryForObject(anyString(), (RowMapper) any(), anyString()); + } +} diff --git a/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/TransactionManagementServiceApplicationTests.java b/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/TransactionManagementServiceApplicationTests.java new file mode 100644 index 0000000..9c3b5aa --- /dev/null +++ b/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/TransactionManagementServiceApplicationTests.java @@ -0,0 +1,13 @@ +package com.yape.codechallenge.transactionmanagementservice; + +import org.junit.jupiter.api.Test; +import org.springframework.boot.test.context.SpringBootTest; + +@SpringBootTest +class TransactionManagementServiceApplicationTests { + + @Test + void contextLoads() { + } + +} diff --git a/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/TransactionUseCaseTest.java b/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/TransactionUseCaseTest.java new file mode 100644 index 0000000..094d1ff --- /dev/null +++ b/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/TransactionUseCaseTest.java @@ -0,0 +1,65 @@ +package com.yape.codechallenge.transactionmanagementservice; + +import com.yape.codechallenge.transactionmanagementservice.application.TransactionsUseCase; +import com.yape.codechallenge.transactionmanagementservice.domain.TransactionStatus; +import com.yape.codechallenge.transactionmanagementservice.domain.Transactions; +import com.yape.codechallenge.transactionmanagementservice.infra.outputport.CommandRepository; +import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.Test; +import org.mockito.Mock; +import org.mockito.MockitoAnnotations; +import org.springframework.jdbc.core.JdbcTemplate; + +import java.math.BigDecimal; + +import static org.junit.jupiter.api.Assertions.assertEquals; +import static org.mockito.ArgumentMatchers.any; +import static org.mockito.ArgumentMatchers.anyString; +import static org.mockito.Mockito.verify; +import static org.mockito.Mockito.when; + +public class TransactionUseCaseTest { + @Mock + private CommandRepository commandRepository; + + @Mock + private JdbcTemplate jdbcTemplate; + + private TransactionsUseCase transactionsUseCase; + + @BeforeEach + void setUp() { + MockitoAnnotations.openMocks(this); + transactionsUseCase = new TransactionsUseCase(commandRepository, jdbcTemplate); + } + + @Test + void shouldCreateTransactionSuccessfully() { + String accountExternalIdDebit = "PE2212310230111231023012"; + String accountExternalIdCredit = "PE2212310230111231023011"; + int transferTypeId = 1; + BigDecimal value = BigDecimal.valueOf(100); + + Transactions mockTransaction = Transactions.builder().build(); + when(commandRepository.save(any(Transactions.class))).thenReturn(mockTransaction); + + Transactions result = transactionsUseCase.createTransaction(accountExternalIdDebit, accountExternalIdCredit, transferTypeId, value); + + assertEquals(mockTransaction, result); + verify(commandRepository).save(any(Transactions.class)); + } + + @Test + void shouldUpdateTransactionSuccessfully() { + String externalTransactionId = "TX1234567890"; + String status = "ACCEPTED"; + + Transactions mockTransaction = Transactions.builder().transactionStatus(TransactionStatus.PENDING).build(); + when(commandRepository.getById(anyString(), any())).thenReturn(mockTransaction); + + Transactions result = transactionsUseCase.updateTransaction(externalTransactionId, status); + + assertEquals(TransactionStatus.valueOf(status), result.getTransactionStatus()); + verify(jdbcTemplate).update(anyString(), anyString(), anyString()); + } +} diff --git a/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/TransactionsAPITest.java b/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/TransactionsAPITest.java new file mode 100644 index 0000000..f456bf7 --- /dev/null +++ b/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/TransactionsAPITest.java @@ -0,0 +1,68 @@ +package com.yape.codechallenge.transactionmanagementservice; + +import com.yape.codechallenge.transactionmanagementservice.domain.Transactions; +import com.yape.codechallenge.transactionmanagementservice.infra.inputadapter.graphql.TransactionsAPI; +import com.yape.codechallenge.transactionmanagementservice.infra.inputport.MessageBrokerInputPort; +import com.yape.codechallenge.transactionmanagementservice.infra.inputport.TransactionsInputPort; +import com.yape.codechallenge.transactionmanagementservice.infra.inputport.ValidatorInputPort; +import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.Test; +import org.mockito.Mock; +import org.mockito.MockitoAnnotations; + +import java.math.BigDecimal; + +import static org.junit.jupiter.api.Assertions.assertNotNull; +import static org.mockito.ArgumentMatchers.anyString; +import static org.mockito.ArgumentMatchers.eq; +import static org.mockito.Mockito.verify; +import static org.mockito.Mockito.when; + +class TransactionsAPITest { + + @Mock + private TransactionsInputPort transactionsInputPort; + + @Mock + private MessageBrokerInputPort messageBrokerInputPort; + + @Mock + private ValidatorInputPort validatorInputPort; + + private TransactionsAPI transactionsAPI; + + @BeforeEach + void setUp() { + MockitoAnnotations.openMocks(this); + transactionsAPI = new TransactionsAPI(transactionsInputPort, messageBrokerInputPort, validatorInputPort); + } + + @Test + void shouldCreateTransactionSuccessfully() { + String accountExternalIdDebit = "PE2212310230111231023012"; + String accountExternalIdCredit = "PE2212310230111231023011"; + int transferTypeId = 1; + BigDecimal value = BigDecimal.valueOf(100); + + Transactions mockTransaction = Transactions.builder().build(); + when(transactionsInputPort.createTransaction(accountExternalIdDebit, accountExternalIdCredit, transferTypeId, value)).thenReturn(mockTransaction); + + Transactions result = transactionsAPI.createTransaction(accountExternalIdDebit, accountExternalIdCredit, transferTypeId, value); + + assertNotNull(result); + verify(transactionsInputPort).createTransaction(accountExternalIdDebit, accountExternalIdCredit, transferTypeId, value); + verify(validatorInputPort).validateTransactionInputs(accountExternalIdDebit, accountExternalIdCredit, transferTypeId, value); + } + + @Test + void shouldGetTransactionSuccessfully() { + String transactionExternalId = "TX1234567890"; + Transactions mockTransaction = Transactions.builder().build(); + when(messageBrokerInputPort.getById(anyString(), anyString())).thenReturn(mockTransaction); + + Transactions result = transactionsAPI.getTransaction(transactionExternalId); + + assertNotNull(result); + verify(messageBrokerInputPort).getById(anyString(), eq(transactionExternalId)); + } +} \ No newline at end of file diff --git a/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/ValidatorUseCaseTest.java b/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/ValidatorUseCaseTest.java new file mode 100644 index 0000000..6848825 --- /dev/null +++ b/transaction-management-service/src/test/java/com/yape/codechallenge/transactionmanagementservice/ValidatorUseCaseTest.java @@ -0,0 +1,48 @@ +package com.yape.codechallenge.transactionmanagementservice; + +import com.yape.codechallenge.transactionmanagementservice.application.ValidatorUseCase; +import com.yape.codechallenge.transactionmanagementservice.exception.CommonExceptionHandler; +import graphql.GraphQLError; +import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.Test; +import org.mockito.InjectMocks; +import org.mockito.MockitoAnnotations; + +import java.math.BigDecimal; + +import static org.junit.jupiter.api.Assertions.*; +import static org.junit.jupiter.api.Assertions.assertThrows; + +public class ValidatorUseCaseTest { + private ValidatorUseCase validatorUseCase; + + @BeforeEach + public void setup() { + validatorUseCase = new ValidatorUseCase(); + } + + @Test + void validateTransactionInputsShouldNotThrowExceptionWhenInputsAreValid() { + assertDoesNotThrow(() -> validatorUseCase.validateTransactionInputs("PE2212345678901234567890", "PE2209876543210987654321", 1, BigDecimal.valueOf(100))); + } + + @Test + void validateTransactionInputsShouldThrowExceptionWhenIbanIsInvalid() { + assertThrows(IllegalArgumentException.class, () -> validatorUseCase.validateTransactionInputs("InvalidIban", "PE09876543210987654321", 1, BigDecimal.valueOf(100))); + } + + @Test + void validateTransactionInputsShouldThrowExceptionWhenIbansAreDuplicate() { + assertThrows(IllegalArgumentException.class, () -> validatorUseCase.validateTransactionInputs("PE12345678901234567890", "PE12345678901234567890", 1, BigDecimal.valueOf(100))); + } + + @Test + void validateTransactionInputsShouldThrowExceptionWhenTransferTypeIdIsInvalid() { + assertThrows(IllegalArgumentException.class, () -> validatorUseCase.validateTransactionInputs("PE12345678901234567890", "PE09876543210987654321", 0, BigDecimal.valueOf(100))); + } + + @Test + void validateTransactionInputsShouldThrowExceptionWhenValueIsInvalid() { + assertThrows(IllegalArgumentException.class, () -> validatorUseCase.validateTransactionInputs("PE12345678901234567890", "PE09876543210987654321", 1, BigDecimal.ZERO)); + } +}