X-Git-Url: https://gerrit.o-ran-sc.org/r/gitweb?a=blobdiff_plain;f=a1-go%2Fpkg%2Fresthooks%2Fresthooks_test.go;h=8003df7b00b3f6553283b4cfc10e9ccedeb60d1f;hb=refs%2Fchanges%2F96%2F9896%2F6;hp=34bf97a23b90961175084d33141f491d0a4442ad;hpb=dd7944b7069298a8c162c5dd0be6b7c9defd231d;p=ric-plt%2Fa1.git diff --git a/a1-go/pkg/resthooks/resthooks_test.go b/a1-go/pkg/resthooks/resthooks_test.go index 34bf97a..8003df7 100644 --- a/a1-go/pkg/resthooks/resthooks_test.go +++ b/a1-go/pkg/resthooks/resthooks_test.go @@ -51,13 +51,24 @@ func TestMain(m *testing.M) { "a1.policy_type.20000", "a1.policy_inst_metadata.1006001.qos", }, nil) - RMRclient = new(RMRClientMock) + rmrSenderInst = new(RmrSenderMock) a1.Init() - rh = createResthook(sdlInst, RMRclient) + rh = createResthook(sdlInst, rmrSenderInst) code := m.Run() os.Exit(code) } +func TestHealth(t *testing.T) { + resp := rh.GetA1Health() + if resp == true { + a1.Logger.Debug("A1 is healthy ") + assert.Equal(t, true, resp) + } else { + a1.Logger.Debug("A1 is unhealthy") + assert.Equal(t, false, resp) + } +} + func TestGetAllPolicyType(t *testing.T) { resp := rh.GetAllPolicyType() assert.Equal(t, 2, len(resp)) @@ -144,7 +155,7 @@ func TestCreatePolicyTypeInstance(t *testing.T) { a1.Logger.Debug("metadatainstancekey : %+v", metadatainstancekey) metadatainstancearr := []interface{}{metadatainstancekey, string(metadata)} sdlInst.On("Set", "A1m_ns", metadatainstancearr).Return(nil) - rmrSenderInst.On("RmrSendToXapp", "httpBodyString").Return(true) + rmrSenderInst.On("RmrSendToXapp", "httpBodyString", 20010).Return(true) errresp := rh.CreatePolicyInstance(policyTypeId, policyInstanceID, instancedata) @@ -225,6 +236,94 @@ func TestGetPolicyInstanceStatus(t *testing.T) { sdlInst.AssertExpectations(t) } +func TestDeletePolicyInstance(t *testing.T) { + var policyTypeId models.PolicyTypeID + policyTypeId = 20001 + var policyInstanceID models.PolicyInstanceID + policyInstanceID = "123456" + var policyTypeSchema models.PolicyTypeSchema + name := "admission_control_policy_mine" + policyTypeSchema.Name = &name + policytypeid := int64(20001) + policyTypeSchema.PolicyTypeID = &policytypeid + description := "various parameters to control admission of dual connection" + policyTypeSchema.Description = &description + schema := `{"$schema": "http://json-schema.org/draft-07/schema#","type":"object","properties": {"enforce": {"type":"boolean","default":"true",},"window_length": {"type": "integer","default":1,"minimum":1,"maximum":60,"description": "Sliding window length (in minutes)",}, +"blocking_rate": {"type":"number","default":10,"minimum":1,"maximum":100,"description": "% Connections to block",},"additionalProperties": false,},}` + policyTypeSchema.CreateSchema = schema + + key := a1PolicyPrefix + strconv.FormatInt((int64(policyTypeId)), 10) + var policytypekeys [1]string + policytypekeys[0] = key + + sdlInst.On("Get", a1MediatorNs, policytypekeys[:]).Return(map[string]interface{}{key: policyTypeSchema}, nil) + + httpBody := `{ + "enforce":true, + "window_length":20, + "blocking_rate":20, + "trigger_threshold":10 + }` + instancekey := a1InstancePrefix + strconv.FormatInt(20001, 10) + "." + string(policyInstanceID) + var instancekeys [1]string + instancekeys[0] = instancekey + + sdlInst.On("Get", a1MediatorNs, instancekeys[:]).Return(httpBody, nil) + + var instanceMetadataKeys [1]string + instanceMetadataKey := a1InstanceMetadataPrefix + strconv.FormatInt((int64(policyTypeId)), 10) + "." + string(policyInstanceID) + instanceMetadataKeys[0] = instanceMetadataKey + httpBody = `{ + "created_at":"2022-11-02 10:30:20", + "instance_status":"NOT IN EFFECT" + }` + + sdlInst.On("Get", a1MediatorNs, instanceMetadataKeys[:]).Return(httpBody, nil) + + sdlInst.On("Remove", a1MediatorNs, instanceMetadataKeys[:]).Return(nil) + + var metadatainstancekeys [1]string + metadatainstancekeys[0] = instancekey + + sdlInst.On("Remove", a1MediatorNs, metadatainstancekeys[:]).Return(nil) + + metadatainstancekey := a1InstanceMetadataPrefix + strconv.FormatInt(20001, 10) + "." + string(policyInstanceID) + deleted_timestamp := time.Now() + var metadatajson interface{} + metadatajson = map[string]string{"created_at": "2022-11-02 10:30:20", "deleted_at": deleted_timestamp.Format("2006-01-02 15:04:05"), "has_been_deleted": "True"} + metadata, _ := json.Marshal(metadatajson) + metadatainstancearr := []interface{}{metadatainstancekey, string(metadata)} + + sdlInst.On("Set", "A1m_ns", metadatainstancearr).Return(nil) + + httpBodyString := `{"operation":"DELETE","payload":"","policy_instance_id":"123456","policy_type_id":"20001"}` + + rmrSenderInst.On("RmrSendToXapp", httpBodyString, 20010).Return(true) + + errresp := rh.DeletePolicyInstance(policyTypeId, policyInstanceID) + + assert.Nil(t, errresp) + sdlInst.AssertExpectations(t) +} +func TestDataDelivery(t *testing.T) { + + httpBody := `{ + "job":"1", + "payload":"payload" + } + ` + var instancedata interface{} + + json.Unmarshal([]byte(httpBody), &instancedata) + a1.Logger.Debug("Marshaled data : %+v", (instancedata)) + httpBodyString := `{"ei_job_id":"1","payload":"payload"}` + rmrSenderInst.On("RmrSendToXapp", httpBodyString, 20017).Return(true) + errresp := rh.DataDelivery(instancedata) + + assert.Nil(t, errresp) + sdlInst.AssertExpectations(t) +} + type SdlMock struct { mock.Mock } @@ -255,7 +354,7 @@ func (s *SdlMock) Get(ns string, keys []string) (map[string]interface{}, error) key = a1PolicyPrefix + strconv.FormatInt((policytypeid), 10) } else if keys[0] == "a1.policy_inst_metadata.20001.123456" { policySchemaString = `{ - "created_at":"0001-01-01T00:00:00.000Z", + "created_at":"2022-11-02 10:30:20", "instance_status":"NOT IN EFFECT" }` key = a1InstanceMetadataPrefix + strconv.FormatInt(policytypeid, 10) + "." + string(policyInstanceID) @@ -283,9 +382,15 @@ func (s *SdlMock) SetIf(ns string, key string, oldData, newData interface{}) (bo return args.Bool(0), args.Error(1) } -func (rmr *RmrSenderMock) RmrSendToXapp(httpBodyString string) bool { - args := rmr.MethodCalled("RmrSendToXapp", httpBodyString) - return args.Bool(0) +func (rmr *RmrSenderMock) RmrSendToXapp(httpBodyString string, mtype int) bool { + if httpBodyString == `{"blocking_rate":20,"enforce":true,"trigger_threshold":10,"window_length":20}` { + args := rmr.MethodCalled("RmrSendToXapp", httpBodyString, mtype) + return args.Bool(0) + } else if httpBodyString == `{"ei_job_id":"1","payload":"payload"}` { + args := rmr.MethodCalled("RmrSendToXapp", httpBodyString, mtype) + return args.Bool(0) + } + return true } func (s *SdlMock) Remove(ns string, keys []string) error {