+ policyTypeSchema.CreateSchema = schema
+
+ key := a1PolicyPrefix + strconv.FormatInt((int64(policyTypeId)), 10)
+ var policytypekeys [1]string
+ policytypekeys[0] = key
+
+ sdlInst.On("Get", a1MediatorNs, policytypekeys[:]).Return(map[string]interface{}{key: policyTypeSchema}, nil)
+
+ httpBody := `{
+ "enforce":true,
+ "window_length":20,
+ "blocking_rate":20,
+ "trigger_threshold":10
+ }`
+ instancekey := a1InstancePrefix + strconv.FormatInt(20001, 10) + "." + string(policyInstanceID)
+ var instancekeys [1]string
+ instancekeys[0] = instancekey
+
+ sdlInst.On("Get", a1MediatorNs, instancekeys[:]).Return(httpBody, nil)
+
+ var instanceMetadataKeys [1]string
+ instanceMetadataKey := a1InstanceMetadataPrefix + strconv.FormatInt((int64(policyTypeId)), 10) + "." + string(policyInstanceID)
+ instanceMetadataKeys[0] = instanceMetadataKey
+ httpBody = `{
+ "created_at":"2022-11-02 10:30:20",
+ "instance_status":"NOT IN EFFECT"
+ }`
+
+ sdlInst.On("Get", a1MediatorNs, instanceMetadataKeys[:]).Return(httpBody, nil)
+
+ sdlInst.On("Remove", a1MediatorNs, instanceMetadataKeys[:]).Return(nil)
+
+ var metadatainstancekeys [1]string
+ metadatainstancekeys[0] = instancekey
+
+ sdlInst.On("Remove", a1MediatorNs, metadatainstancekeys[:]).Return(nil)
+
+ metadatainstancekey := a1InstanceMetadataPrefix + strconv.FormatInt(20001, 10) + "." + string(policyInstanceID)
+ deleted_timestamp := time.Now()
+ var metadatajson interface{}
+ metadatajson = map[string]string{"created_at": "2022-11-02 10:30:20", "deleted_at": deleted_timestamp.Format("2006-01-02 15:04:05"), "has_been_deleted": "True"}
+ metadata, _ := json.Marshal(metadatajson)
+ metadatainstancearr := []interface{}{metadatainstancekey, string(metadata)}
+
+ sdlInst.On("Set", "A1m_ns", metadatainstancearr).Return(nil)
+
+ httpBodyString := `{"operation":"DELETE","payload":"","policy_instance_id":"123456","policy_type_id":"20001"}`
+
+ rmrSenderInst.On("RmrSendToXapp", httpBodyString, 20010).Return(true)
+
+ errresp := rh.DeletePolicyInstance(policyTypeId, policyInstanceID)
+
+ assert.Nil(t, errresp)
+ sdlInst.AssertExpectations(t)
+}
+func TestDataDelivery(t *testing.T) {
+
+ httpBody := `{
+ "job":"1",
+ "payload":"payload"
+ }
+ `
+ var instancedata interface{}
+
+ json.Unmarshal([]byte(httpBody), &instancedata)
+ a1.Logger.Debug("Marshaled data : %+v", (instancedata))
+ httpBodyString := `{"ei_job_id":"1","payload":"payload"}`
+ rmrSenderInst.On("RmrSendToXapp", httpBodyString, 20017).Return(true)
+ errresp := rh.DataDelivery(instancedata)
+
+ assert.Nil(t, errresp)
+ sdlInst.AssertExpectations(t)
+}
+
+func TestGetMetaData(t *testing.T) {
+ var policyTypeId models.PolicyTypeID
+ policyTypeId = 20001
+ var policyInstanceID models.PolicyInstanceID
+ policyInstanceID = "123456"
+ instanceMetadataKey := a1InstanceMetadataPrefix + strconv.FormatInt((int64(policyTypeId)), 10) + "." + string(policyInstanceID)
+ a1.Logger.Debug("key : %+v", instanceMetadataKey)
+
+ var keys [1]string
+ keys[0] = instanceMetadataKey
+
+ policySchemaString := `{
+ "created_at":"2022-11-02 10:30:20",
+ "instance_status":"NOT IN EFFECT"
+ }`
+
+ sdlInst.On("Get", a1MediatorNs, keys[:]).Return(map[string]interface{}{instanceMetadataKey: policySchemaString}, nil)
+
+ resp, errresp := rh.getMetaData(policyTypeId, policyInstanceID)
+
+ assert.Nil(t, errresp)
+ assert.NotNil(t, resp)
+ sdlInst.AssertExpectations(t)
+}
+
+type SdlMock struct {
+ mock.Mock
+}
+
+func (s *SdlMock) GetAll(ns string) ([]string, error) {
+ args := s.MethodCalled("GetAll", ns)
+ return args.Get(0).([]string), nil
+}
+
+func (s *SdlMock) Get(ns string, keys []string) (map[string]interface{}, error) {
+ a1.Logger.Debug("Get Called ")
+ args := s.MethodCalled("Get", ns, keys)
+ a1.Logger.Debug("ns :%+v", args.Get(0))
+ policytypeid := int64(20001)
+ policyInstanceID := "123456"
+ var policySchemaString string
+ var key string
+ if keys[0] == "a1.policy_instance.20001.123456" {
+ policySchemaString = `{
+ "enforce":true,
+ "window_length":20,
+ "blocking_rate":20,
+ "trigger_threshold":10
+ }`
+ key = a1InstancePrefix + strconv.FormatInt(policytypeid, 10) + "." + string(policyInstanceID)
+ } else if keys[0] == "a1.policy_type.20001" {
+ policySchemaString = `{"create_schema":{"$schema":"http://json-schema.org/draft-07/schema#","properties":{"additionalProperties":false,"blocking_rate":{"default":10,"description":"% Connections to block","maximum":1001,"minimum":1,"type":"number"},"enforce":{"default":"true","type":"boolean"},"window_length":{"default":1,"description":"Sliding window length (in minutes)","maximum":60,"minimum":1,"type":"integer"}},"type":"object"},"description":"various parameters to control admission of dual connection","name":"admission_control_policy_mine","policy_type_id":20001}`
+ key = a1PolicyPrefix + strconv.FormatInt((policytypeid), 10)
+ } else if keys[0] == "a1.policy_inst_metadata.20001.123456" {
+ policySchemaString = `{
+ "created_at":"2022-11-02 10:30:20",
+ "instance_status":"NOT IN EFFECT"
+ }`
+ key = a1InstanceMetadataPrefix + strconv.FormatInt(policytypeid, 10) + "." + string(policyInstanceID)
+ }
+ a1.Logger.Debug(" policy SchemaString %+v", policySchemaString)
+ policyTypeSchema, _ := json.Marshal((policySchemaString))
+ a1.Logger.Debug(" policyTypeSchema %+v", string(policyTypeSchema))
+
+ a1.Logger.Debug(" key for policy type %+v", key)
+ mp := map[string]interface{}{key: string(policySchemaString)}