RMR handler for A1-EI Query all
[ric-plt/a1.git] / a1-go / pkg / resthooks / resthooks_test.go
index 4466927..8003df7 100644 (file)
@@ -51,13 +51,24 @@ func TestMain(m *testing.M) {
                "a1.policy_type.20000",
                "a1.policy_inst_metadata.1006001.qos",
        }, nil)
-       RMRclient = new(RMRClientMock)
+       rmrSenderInst = new(RmrSenderMock)
        a1.Init()
-       rh = createResthook(sdlInst, RMRclient)
+       rh = createResthook(sdlInst, rmrSenderInst)
        code := m.Run()
        os.Exit(code)
 }
 
+func TestHealth(t *testing.T) {
+       resp := rh.GetA1Health()
+       if resp == true {
+               a1.Logger.Debug("A1 is healthy ")
+               assert.Equal(t, true, resp)
+       } else {
+               a1.Logger.Debug("A1 is unhealthy")
+               assert.Equal(t, false, resp)
+       }
+}
+
 func TestGetAllPolicyType(t *testing.T) {
        resp := rh.GetAllPolicyType()
        assert.Equal(t, 2, len(resp))
@@ -144,7 +155,7 @@ func TestCreatePolicyTypeInstance(t *testing.T) {
        a1.Logger.Debug("metadatainstancekey   : %+v", metadatainstancekey)
        metadatainstancearr := []interface{}{metadatainstancekey, string(metadata)}
        sdlInst.On("Set", "A1m_ns", metadatainstancearr).Return(nil)
-       rmrSenderInst.On("RmrSendToXapp", "httpBodyString").Return(true)
+       rmrSenderInst.On("RmrSendToXapp", "httpBodyString", 20010).Return(true)
 
        errresp := rh.CreatePolicyInstance(policyTypeId, policyInstanceID, instancedata)
 
@@ -187,6 +198,132 @@ func TestGetAllPolicyIntances(t *testing.T) {
        assert.Equal(t, 2, len(resp))
 }
 
+func TestDeletePolicyType(t *testing.T) {
+
+       policyTypeId := models.PolicyTypeID(20001)
+       key := a1PolicyPrefix + strconv.FormatInt((int64(policyTypeId)), 10)
+       var keys [1]string
+       keys[0] = key
+
+       //Setup Expectations
+       sdlInst.On("Remove", a1MediatorNs, keys[:]).Return(nil)
+
+       errresp := rh.DeletePolicyType(policyTypeId)
+
+       assert.Nil(t, errresp)
+       sdlInst.AssertExpectations(t)
+}
+
+func TestGetPolicyInstanceStatus(t *testing.T) {
+       var policyTypeId models.PolicyTypeID
+       policyTypeId = 20001
+       var policyInstanceID models.PolicyInstanceID
+       policyInstanceID = "123456"
+       httpBody := `{
+               "created_at":"0001-01-01T00:00:00.000Z",
+               "instance_status":"NOT IN EFFECT"
+               }`
+       instancekey := a1InstanceMetadataPrefix + strconv.FormatInt(20001, 10) + "." + string(policyInstanceID)
+       a1.Logger.Debug("httpBody String : %+v", httpBody)
+       a1.Logger.Debug("key   : %+v", instancekey)
+       var keys [1]string
+       keys[0] = instancekey
+       sdlInst.On("Get", a1MediatorNs, keys[:]).Return(httpBody)
+
+       resp := rh.GetPolicyInstanceStatus(policyTypeId, policyInstanceID)
+
+       assert.NotNil(t, resp)
+       sdlInst.AssertExpectations(t)
+}
+
+func TestDeletePolicyInstance(t *testing.T) {
+       var policyTypeId models.PolicyTypeID
+       policyTypeId = 20001
+       var policyInstanceID models.PolicyInstanceID
+       policyInstanceID = "123456"
+       var policyTypeSchema models.PolicyTypeSchema
+       name := "admission_control_policy_mine"
+       policyTypeSchema.Name = &name
+       policytypeid := int64(20001)
+       policyTypeSchema.PolicyTypeID = &policytypeid
+       description := "various parameters to control admission of dual connection"
+       policyTypeSchema.Description = &description
+       schema := `{"$schema": "http://json-schema.org/draft-07/schema#","type":"object","properties": {"enforce": {"type":"boolean","default":"true",},"window_length": {"type":        "integer","default":1,"minimum":1,"maximum":60,"description": "Sliding window length (in minutes)",},
+"blocking_rate": {"type":"number","default":10,"minimum":1,"maximum":100,"description": "% Connections to block",},"additionalProperties": false,},}`
+       policyTypeSchema.CreateSchema = schema
+
+       key := a1PolicyPrefix + strconv.FormatInt((int64(policyTypeId)), 10)
+       var policytypekeys [1]string
+       policytypekeys[0] = key
+
+       sdlInst.On("Get", a1MediatorNs, policytypekeys[:]).Return(map[string]interface{}{key: policyTypeSchema}, nil)
+
+       httpBody := `{
+               "enforce":true,
+               "window_length":20,
+          "blocking_rate":20,
+               "trigger_threshold":10
+               }`
+       instancekey := a1InstancePrefix + strconv.FormatInt(20001, 10) + "." + string(policyInstanceID)
+       var instancekeys [1]string
+       instancekeys[0] = instancekey
+
+       sdlInst.On("Get", a1MediatorNs, instancekeys[:]).Return(httpBody, nil)
+
+       var instanceMetadataKeys [1]string
+       instanceMetadataKey := a1InstanceMetadataPrefix + strconv.FormatInt((int64(policyTypeId)), 10) + "." + string(policyInstanceID)
+       instanceMetadataKeys[0] = instanceMetadataKey
+       httpBody = `{
+               "created_at":"2022-11-02 10:30:20",
+                       "instance_status":"NOT IN EFFECT"
+               }`
+
+       sdlInst.On("Get", a1MediatorNs, instanceMetadataKeys[:]).Return(httpBody, nil)
+
+       sdlInst.On("Remove", a1MediatorNs, instanceMetadataKeys[:]).Return(nil)
+
+       var metadatainstancekeys [1]string
+       metadatainstancekeys[0] = instancekey
+
+       sdlInst.On("Remove", a1MediatorNs, metadatainstancekeys[:]).Return(nil)
+
+       metadatainstancekey := a1InstanceMetadataPrefix + strconv.FormatInt(20001, 10) + "." + string(policyInstanceID)
+       deleted_timestamp := time.Now()
+       var metadatajson interface{}
+       metadatajson = map[string]string{"created_at": "2022-11-02 10:30:20", "deleted_at": deleted_timestamp.Format("2006-01-02 15:04:05"), "has_been_deleted": "True"}
+       metadata, _ := json.Marshal(metadatajson)
+       metadatainstancearr := []interface{}{metadatainstancekey, string(metadata)}
+
+       sdlInst.On("Set", "A1m_ns", metadatainstancearr).Return(nil)
+
+       httpBodyString := `{"operation":"DELETE","payload":"","policy_instance_id":"123456","policy_type_id":"20001"}`
+
+       rmrSenderInst.On("RmrSendToXapp", httpBodyString, 20010).Return(true)
+
+       errresp := rh.DeletePolicyInstance(policyTypeId, policyInstanceID)
+
+       assert.Nil(t, errresp)
+       sdlInst.AssertExpectations(t)
+}
+func TestDataDelivery(t *testing.T) {
+
+       httpBody := `{
+               "job":"1",
+               "payload":"payload"
+               }
+               `
+       var instancedata interface{}
+
+       json.Unmarshal([]byte(httpBody), &instancedata)
+       a1.Logger.Debug("Marshaled data : %+v", (instancedata))
+       httpBodyString := `{"ei_job_id":"1","payload":"payload"}`
+       rmrSenderInst.On("RmrSendToXapp", httpBodyString, 20017).Return(true)
+       errresp := rh.DataDelivery(instancedata)
+
+       assert.Nil(t, errresp)
+       sdlInst.AssertExpectations(t)
+}
+
 type SdlMock struct {
        mock.Mock
 }
@@ -199,7 +336,7 @@ func (s *SdlMock) GetAll(ns string) ([]string, error) {
 func (s *SdlMock) Get(ns string, keys []string) (map[string]interface{}, error) {
        a1.Logger.Debug("Get Called ")
        args := s.MethodCalled("Get", ns, keys)
-       a1.Logger.Debug("keys :%+v", args.Get(1))
+       a1.Logger.Debug("ns :%+v", args.Get(0))
        policytypeid := int64(20001)
        policyInstanceID := "123456"
        var policySchemaString string
@@ -215,6 +352,12 @@ func (s *SdlMock) Get(ns string, keys []string) (map[string]interface{}, error)
        } else if keys[0] == "a1.policy_type.20001" {
                policySchemaString = `{"create_schema":{"$schema":"http://json-schema.org/draft-07/schema#","properties":{"additionalProperties":false,"blocking_rate":{"default":10,"description":"% Connections to block","maximum":1001,"minimum":1,"type":"number"},"enforce":{"default":"true","type":"boolean"},"window_length":{"default":1,"description":"Sliding window length (in minutes)","maximum":60,"minimum":1,"type":"integer"}},"type":"object"},"description":"various parameters to control admission of dual connection","name":"admission_control_policy_mine","policy_type_id":20001}`
                key = a1PolicyPrefix + strconv.FormatInt((policytypeid), 10)
+       } else if keys[0] == "a1.policy_inst_metadata.20001.123456" {
+               policySchemaString = `{
+                       "created_at":"2022-11-02 10:30:20",
+                       "instance_status":"NOT IN EFFECT"
+                       }`
+               key = a1InstanceMetadataPrefix + strconv.FormatInt(policytypeid, 10) + "." + string(policyInstanceID)
        }
        a1.Logger.Debug(" policy SchemaString %+v", policySchemaString)
        policyTypeSchema, _ := json.Marshal((policySchemaString))
@@ -223,10 +366,8 @@ func (s *SdlMock) Get(ns string, keys []string) (map[string]interface{}, error)
        a1.Logger.Debug(" key for policy type %+v", key)
        mp := map[string]interface{}{key: string(policySchemaString)}
        a1.Logger.Debug("Get Called and mp return %+v ", mp)
-
        return mp, nil
 }
-
 func (s *SdlMock) SetIfNotExists(ns string, key string, data interface{}) (bool, error) {
        args := s.MethodCalled("SetIfNotExists", ns, key, data)
        return args.Bool(0), args.Error(1)
@@ -241,7 +382,18 @@ func (s *SdlMock) SetIf(ns string, key string, oldData, newData interface{}) (bo
        return args.Bool(0), args.Error(1)
 }
 
-func (rmr *RmrSenderMock) RmrSendToXapp(httpBodyString string) bool {
-       args := rmr.MethodCalled("RmrSendToXapp", httpBodyString)
-       return args.Bool(0)
+func (rmr *RmrSenderMock) RmrSendToXapp(httpBodyString string, mtype int) bool {
+       if httpBodyString == `{"blocking_rate":20,"enforce":true,"trigger_threshold":10,"window_length":20}` {
+               args := rmr.MethodCalled("RmrSendToXapp", httpBodyString, mtype)
+               return args.Bool(0)
+       } else if httpBodyString == `{"ei_job_id":"1","payload":"payload"}` {
+               args := rmr.MethodCalled("RmrSendToXapp", httpBodyString, mtype)
+               return args.Bool(0)
+       }
+       return true
+}
+
+func (s *SdlMock) Remove(ns string, keys []string) error {
+       args := s.MethodCalled("Remove", ns, keys)
+       return args.Error(0)
 }