NONRTRIC-946: Add support for Kong routes
[nonrtric/plt/sme.git] / servicemanager / internal / providermanagement / providermanagement_test.go
diff --git a/servicemanager/internal/providermanagement/providermanagement_test.go b/servicemanager/internal/providermanagement/providermanagement_test.go
new file mode 100644 (file)
index 0000000..f00afd0
--- /dev/null
@@ -0,0 +1,290 @@
+// -
+//   ========================LICENSE_START=================================
+//   O-RAN-SC
+//   %%
+//   Copyright (C) 2024: OpenInfra Foundation Europe
+//   %%
+//   Licensed under the Apache License, Version 2.0 (the "License");
+//   you may not use this file except in compliance with the License.
+//   You may obtain a copy of the License at
+//
+//        http://www.apache.org/licenses/LICENSE-2.0
+//
+//   Unless required by applicable law or agreed to in writing, software
+//   distributed under the License is distributed on an "AS IS" BASIS,
+//   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+//   See the License for the specific language governing permissions and
+//   limitations under the License.
+//   ========================LICENSE_END===================================
+//
+
+package providermanagement
+
+import (
+       "fmt"
+       "net/http"
+       "os"
+       "strings"
+       "testing"
+
+       echo "github.com/labstack/echo/v4"
+
+       "oransc.org/nonrtric/servicemanager/internal/common29122"
+       "oransc.org/nonrtric/servicemanager/internal/envreader"
+       "oransc.org/nonrtric/servicemanager/internal/kongclear"
+       provapi "oransc.org/nonrtric/servicemanager/internal/providermanagementapi"
+       "oransc.org/nonrtric/servicemanager/internal/publishservice"
+       publishapi "oransc.org/nonrtric/servicemanager/internal/publishserviceapi"
+
+       "github.com/deepmap/oapi-codegen/pkg/middleware"
+       "github.com/deepmap/oapi-codegen/pkg/testutil"
+       echomiddleware "github.com/labstack/echo/v4/middleware"
+       log "github.com/sirupsen/logrus"
+       "github.com/stretchr/testify/assert"
+)
+
+var (
+       domainID = "domain_id_Kong"
+       domainInfo  = "Kong"
+       funcInfoAPF = "rApp Kong as APF"
+       funcIdAPF   = "APF_id_rApp_Kong_as_APF"
+       funcInfoAEF = "rApp Kong as AEF"
+       funcIdAEF   = "AEF_id_rApp_Kong_as_AEF"
+)
+
+var requestHandler *echo.Echo
+
+func TestMain(m *testing.M) {
+       err := setupTest()
+       if err != nil {
+               return
+       }
+
+       ret := m.Run()
+       if ret == 0 {
+               teardown()
+       }
+       os.Exit(ret)
+}
+
+func setupTest() error {
+       myEnv, myPorts, err := envreader.ReadDotEnv()
+       if err != nil {
+               log.Fatal("error loading environment file on setupTest")
+               return err
+       }
+
+       requestHandler, err = getEcho(myEnv, myPorts)
+       if err != nil {
+               log.Fatal("getEcho fatal error on setupTest")
+               return err
+       }
+       return err
+}
+
+func teardown() error {
+       log.Trace("entering teardown")
+
+       t := new(testing.T) // Create a new testing.T instance for teardown
+
+       // Delete the invoker
+       invokerInfo := "invoker a"
+       invokerId := "api_invoker_id_" + strings.Replace(invokerInfo, " ", "_", 1)
+
+       result := testutil.NewRequest().Delete("/api-invoker-management/v1/onboardedInvokers/"+invokerId).Go(t, requestHandler)
+       assert.Equal(t, http.StatusNoContent, result.Code())
+
+       // Delete the original published service
+       apfId := "APF_id_rApp_Kong_as_APF"
+       apiName := "apiName"
+       apiId := "api_id_" + apiName
+
+       result = testutil.NewRequest().Delete("/published-apis/v1/"+apfId+"/service-apis/"+apiId).Go(t, requestHandler)
+       assert.Equal(t, http.StatusNoContent, result.Code())
+
+       // Delete the first published service
+       apfId = "APF_id_rApp_Kong_as_APF"
+       apiName = "apiName1"
+       apiId = "api_id_" + apiName
+
+       result = testutil.NewRequest().Delete("/published-apis/v1/"+apfId+"/service-apis/"+apiId).Go(t, requestHandler)
+       assert.Equal(t, http.StatusNoContent, result.Code())
+
+       // Delete the second published service
+       apiName = "apiName2"
+       apiId = "api_id_" + apiName
+
+       result = testutil.NewRequest().Delete("/published-apis/v1/"+apfId+"/service-apis/"+apiId).Go(t, requestHandler)
+       assert.Equal(t, http.StatusNoContent, result.Code())
+
+       // Delete the provider
+       result = testutil.NewRequest().Delete("/api-provider-management/v1/registrations/"+domainID).Go(t, requestHandler)
+       assert.Equal(t, http.StatusNoContent, result.Code())
+
+       myEnv, myPorts, err := envreader.ReadDotEnv()
+       if err != nil {
+               log.Fatal("error loading environment file")
+               return err
+       }
+
+       err = kongclear.KongClear(myEnv, myPorts)
+       if err != nil {
+               log.Fatal("error clearing Kong on teardown")
+       }
+       return err
+}
+
+func TestRegisterValidProvider(t *testing.T) {
+       teardown()
+
+       // Register a valid provider
+       newProvider := getProvider()
+       result := testutil.NewRequest().Post("/api-provider-management/v1/registrations").WithJsonBody(newProvider).Go(t, requestHandler)
+       assert.Equal(t, http.StatusCreated, result.Code())
+
+       var resultProvider provapi.APIProviderEnrolmentDetails
+       err := result.UnmarshalBodyToObject(&resultProvider)
+       assert.NoError(t, err, "error unmarshaling response")
+
+       assert.NotNil(t, resultProvider.ApiProvDomId, "error reading resultProvider")
+
+       if resultProvider.ApiProvDomId != nil {
+               assert.Equal(t, *resultProvider.ApiProvDomId, domainID)
+
+               apiProvFuncAPF := (*resultProvider.ApiProvFuncs)[0]
+               apiProvFuncIdAPF := *apiProvFuncAPF.ApiProvFuncId
+               assert.Equal(t, apiProvFuncIdAPF, funcIdAPF)
+
+               // We don't handle AMF
+               apiProvFuncAEF := (*resultProvider.ApiProvFuncs)[1]
+               apiProvFuncIdAEF := *apiProvFuncAEF.ApiProvFuncId
+               assert.Equal(t, apiProvFuncIdAEF, funcIdAEF)
+
+               assert.Empty(t, resultProvider.FailReason)
+               assert.Equal(t, "http://example.com/api-provider-management/v1/registrations/"+*resultProvider.ApiProvDomId, result.Recorder.Header().Get(echo.HeaderLocation))
+
+               // Register same provider again should result in Forbidden
+               result = testutil.NewRequest().Post("/api-provider-management/v1/registrations").WithJsonBody(newProvider).Go(t, requestHandler)
+
+               var errorObj common29122.ProblemDetails
+               assert.Equal(t, http.StatusForbidden, result.Code())
+
+               err = result.UnmarshalBodyToObject(&errorObj)
+               assert.NoError(t, err, "error unmarshaling response")
+               assert.Equal(t, http.StatusForbidden, *errorObj.Status)
+               assert.Contains(t, *errorObj.Cause, "already registered")
+       }
+}
+
+func TestUpdateValidProviderWithNewFunction(t *testing.T) {
+       // Modify the provider
+       updatedProvider := getProvider()
+       updatedProvider.ApiProvDomId = &domainID
+
+       newDomainInfo := "New domain info"
+       updatedProvider.ApiProvDomInfo = &newDomainInfo
+       newFunctionInfo := "New function info"
+       (*updatedProvider.ApiProvFuncs)[0].ApiProvFuncInfo = &newFunctionInfo
+       newFuncInfoAEF := "new func as AEF"
+
+       testFuncs := append(*updatedProvider.ApiProvFuncs, provapi.APIProviderFunctionDetails{
+               ApiProvFuncInfo: &newFuncInfoAEF,
+               ApiProvFuncRole: provapi.ApiProviderFuncRoleAEF,
+               RegInfo: provapi.RegistrationInformation{
+                       ApiProvPubKey: "key",
+               },
+       })
+       updatedProvider.ApiProvFuncs = &testFuncs
+
+       result := testutil.NewRequest().Put("/api-provider-management/v1/registrations/"+domainID).WithJsonBody(updatedProvider).Go(t, requestHandler)
+
+       var resultProvider provapi.APIProviderEnrolmentDetails
+       assert.Equal(t, http.StatusOK, result.Code())
+
+       err := result.UnmarshalBodyToObject(&resultProvider)
+       assert.NoError(t, err, "error unmarshaling response")
+
+       assert.Equal(t, newDomainInfo, *resultProvider.ApiProvDomInfo)
+       assert.Equal(t, newFunctionInfo, *(*resultProvider.ApiProvFuncs)[0].ApiProvFuncInfo)
+       assert.Equal(t, *(*resultProvider.ApiProvFuncs)[2].ApiProvFuncId, "AEF_id_new_func_as_AEF")
+       assert.Empty(t, resultProvider.FailReason)
+}
+
+func TestDeleteProvider(t *testing.T) {
+       provider := getProvider()
+       provider.ApiProvDomId = &domainID
+       (*provider.ApiProvFuncs)[0].ApiProvFuncId = &funcIdAPF
+       result := testutil.NewRequest().Delete("/api-provider-management/v1/registrations/"+domainID).Go(t, requestHandler)
+       assert.Equal(t, http.StatusNoContent, result.Code())
+       teardown()
+}
+
+func getProvider() provapi.APIProviderEnrolmentDetails {
+       testFuncs := []provapi.APIProviderFunctionDetails{
+               {
+                       ApiProvFuncInfo: &funcInfoAPF,
+                       ApiProvFuncRole: provapi.ApiProviderFuncRoleAPF,
+                       RegInfo: provapi.RegistrationInformation{
+                               ApiProvPubKey: "APF-PublicKey",
+                       },
+               },
+               {
+                       ApiProvFuncInfo: &funcInfoAEF,
+                       ApiProvFuncRole: provapi.ApiProviderFuncRoleAEF,
+                       RegInfo: provapi.RegistrationInformation{
+                               ApiProvPubKey: "AEF-PublicKey",
+                       },
+               },
+       }
+       return provapi.APIProviderEnrolmentDetails{
+               RegSec:         "sec",
+               ApiProvDomInfo: &domainInfo,
+               ApiProvFuncs:   &testFuncs,
+       }
+}
+
+func getEcho(myEnv map[string]string, myPorts map[string]int) (*echo.Echo, error) {
+       capifProtocol := myEnv["CAPIF_PROTOCOL"]
+       capifIPv4 := common29122.Ipv4Addr(myEnv["CAPIF_IPV4"])
+       capifPort := common29122.Port(myPorts["CAPIF_PORT"])
+       kongDomain := myEnv["KONG_DOMAIN"]
+       kongProtocol := myEnv["KONG_PROTOCOL"]
+       kongIPv4 := common29122.Ipv4Addr(myEnv["KONG_IPV4"])
+       kongDataPlanePort := common29122.Port(myPorts["KONG_DATA_PLANE_PORT"])
+       kongControlPlanePort := common29122.Port(myPorts["KONG_CONTROL_PLANE_PORT"])
+
+       e := echo.New()
+
+       // Register ProviderManagement
+       providerManagerSwagger, err := provapi.GetSwagger()
+       if err != nil {
+               log.Fatalf("Error loading ProviderManagement swagger spec\n: %s", err)
+               return nil, err
+       }
+       providerManagerSwagger.Servers = nil
+       providerManager := NewProviderManager(capifProtocol, capifIPv4, capifPort)
+
+       var group *echo.Group
+
+       group = e.Group("/api-provider-management/v1")
+       group.Use(middleware.OapiRequestValidator(providerManagerSwagger))
+       provapi.RegisterHandlersWithBaseURL(e, providerManager, "/api-provider-management/v1")
+
+       publishServiceSwagger, err := publishapi.GetSwagger()
+       if err != nil {
+               fmt.Fprintf(os.Stderr, "Error loading PublishService swagger spec\n: %s", err)
+               return nil, err
+       }
+
+       publishServiceSwagger.Servers = nil
+
+       ps := publishservice.NewPublishService(kongDomain, kongProtocol, kongIPv4, kongDataPlanePort, kongControlPlanePort, capifProtocol, capifIPv4, capifPort)
+
+       group = e.Group("/published-apis/v1")
+       group.Use(echomiddleware.Logger())
+       group.Use(middleware.OapiRequestValidator(publishServiceSwagger))
+       publishapi.RegisterHandlersWithBaseURL(e, ps, "/published-apis/v1")
+
+       // return ps, eventChannel, e
+       return e, err
+}