diff options
author | 2025-01-16 15:51:55 +0530 | |
---|---|---|
committer | 2025-01-16 15:55:55 +0530 | |
commit | 520e47ff8893872f484acb4f0f0e6f36b6a0d630 (patch) | |
tree | 6e2645ec35517f99cabaff523033e07bf72ddc93 | |
parent | f70aee5aa504b7e1db6d15666aeb31122c968c70 (diff) |
[AAI] Improve test coverage for A&AI component aai-schema-service
- to Improve test coverage for A&AI component aai-schema-service <=80%
Issue-ID: AAI-4107
Change-Id: I7e0d1fb9a013d93b2b2beefab46fe85c4d104217
Signed-off-by: nisha.gangore <nisha.gangore@accenture.com>
6 files changed, 954 insertions, 0 deletions
diff --git a/aai-schema-service/src/test/java/org/onap/aai/schemaservice/interceptors/post/InvalidResponseStatusTest.java b/aai-schema-service/src/test/java/org/onap/aai/schemaservice/interceptors/post/InvalidResponseStatusTest.java new file mode 100644 index 0000000..2bc7e34 --- /dev/null +++ b/aai-schema-service/src/test/java/org/onap/aai/schemaservice/interceptors/post/InvalidResponseStatusTest.java @@ -0,0 +1,124 @@ +/** + * ============LICENSE_START======================================================= + * org.onap.aai + * ================================================================================ + * Copyright © 2025 Deutsche Telekom. All rights reserved. + * ================================================================================ + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * ============LICENSE_END========================================================= + */ +package org.onap.aai.schemaservice.interceptors.post; + +import org.junit.jupiter.api.Assertions; +import org.junit.jupiter.api.Test; +import org.junit.jupiter.api.extension.ExtendWith; +import org.mockito.InjectMocks; +import org.mockito.Mock; +import org.mockito.junit.jupiter.MockitoExtension; +import javax.ws.rs.container.ContainerRequestContext; +import javax.ws.rs.container.ContainerResponseContext; +import java.io.IOException; +import static org.junit.Assert.assertEquals; +import static org.mockito.Mockito.*; + +@ExtendWith(MockitoExtension.class) +public class InvalidResponseStatusTest { + + @InjectMocks + private InvalidResponseStatus invalidResponseStatus; + + @Mock + private ContainerRequestContext mockRequestContext; + + @Mock + private ContainerResponseContext mockResponseContext; + + + @Test + public void testFilter_ResponseStatus405_ShouldChangeTo400() throws IOException { + when(mockResponseContext.getStatus()).thenReturn(405); + + invalidResponseStatus.filter(mockRequestContext, mockResponseContext); + + verify(mockResponseContext).setStatus(400); + + verify(mockResponseContext).setEntity(anyString()); + } + + @Test + public void testFilter_ResponseStatus405_ShouldHandleContentType() throws IOException { + String contentType = "application/json"; + when(mockResponseContext.getStatus()).thenReturn(405); + when(mockResponseContext.getHeaderString("Content-Type")).thenReturn(contentType); + + invalidResponseStatus.filter(mockRequestContext, mockResponseContext); + + verify(mockResponseContext).setStatus(400); + + verify(mockResponseContext).setEntity(anyString()); + assertEquals("application/json",mockResponseContext.getHeaderString("Content-Type")); + } + + @Test + public void testFilter_ContentTypeSetToNull_ShouldSetXmlContentType() throws IOException { + // Setup: Simulate 405 status and no Content-Type header + when(mockResponseContext.getStatus()).thenReturn(405); + when(mockResponseContext.getHeaderString("Content-Type")).thenReturn(null); + + invalidResponseStatus.filter(mockRequestContext, mockResponseContext); + + verify(mockResponseContext).setEntity(anyString()); + Assertions.assertNull(mockResponseContext.getHeaderString("Content-Type")); + } + + @Test + public void testFilter_ResponseStatus406_ContentTypeXml_ShouldSetXmlMessage() throws IOException { + when(mockResponseContext.getStatus()).thenReturn(406); + when(mockResponseContext.getHeaderString("Content-Type")).thenReturn("application/xml"); + + invalidResponseStatus.filter(mockRequestContext, mockResponseContext); + + verify(mockResponseContext).setStatus(406); + + verify(mockResponseContext).setEntity(anyString()); + assertEquals("application/xml",mockResponseContext.getHeaderString("Content-Type")); + } + + @Test + public void testFilter_ResponseStatus406_ContentTypeJson_ShouldSetJsonMessage() throws IOException { + // Setup: Simulate a 406 status and Content-Type header as "application/json" + when(mockResponseContext.getStatus()).thenReturn(406); + when(mockResponseContext.getHeaderString("Content-Type")).thenReturn("application/json"); + + invalidResponseStatus.filter(mockRequestContext, mockResponseContext); + + verify(mockResponseContext).setStatus(406); + + verify(mockResponseContext).setEntity(anyString()); + assertEquals("application/json",mockResponseContext.getHeaderString("Content-Type")); + } + + @Test + public void testFilter_ResponseStatus406_ContentTypeUnsupported_ShouldReturnErrorMessage() throws IOException { + when(mockResponseContext.getStatus()).thenReturn(406); + when(mockResponseContext.getHeaderString("Content-Type")).thenReturn("application/unsupported"); + + invalidResponseStatus.filter(mockRequestContext, mockResponseContext); + + verify(mockResponseContext).setStatus(406); + + verify(mockResponseContext).setEntity(anyString()); + assertEquals("application/unsupported",mockResponseContext.getHeaderString("Content-Type")); + + } +} diff --git a/aai-schema-service/src/test/java/org/onap/aai/schemaservice/interceptors/post/ResponseHeaderManipulationTest.java b/aai-schema-service/src/test/java/org/onap/aai/schemaservice/interceptors/post/ResponseHeaderManipulationTest.java new file mode 100644 index 0000000..7aae84e --- /dev/null +++ b/aai-schema-service/src/test/java/org/onap/aai/schemaservice/interceptors/post/ResponseHeaderManipulationTest.java @@ -0,0 +1,96 @@ +/** + * ============LICENSE_START======================================================= + * org.onap.aai + * ================================================================================ + * Copyright © 2025 Deutsche Telekom. All rights reserved. + * ================================================================================ + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * ============LICENSE_END========================================================= + */ +package org.onap.aai.schemaservice.interceptors.post; + +import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.Test; +import org.junit.jupiter.api.extension.ExtendWith; +import org.mockito.InjectMocks; +import org.mockito.Mock; +import org.mockito.junit.jupiter.MockitoExtension; +import org.mockito.junit.jupiter.MockitoSettings; +import org.mockito.quality.Strictness; +import javax.ws.rs.container.ContainerRequestContext; +import javax.ws.rs.container.ContainerResponseContext; +import javax.ws.rs.core.MediaType; +import javax.ws.rs.core.MultivaluedMap; +import java.io.IOException; +import static org.junit.Assert.assertEquals; +import static org.junit.Assert.assertNull; +import static org.mockito.Mockito.when; + +@ExtendWith(MockitoExtension.class) +public class ResponseHeaderManipulationTest { + + @InjectMocks + private ResponseHeaderManipulation responseHeaderManipulation; + + @Mock + private ContainerRequestContext mockRequestContext; + + @Mock + private ContainerResponseContext mockResponseContext; + + @Mock + private MultivaluedMap<String, Object> mockResponseHeaders; + + @BeforeEach + public void setUp() { + when(mockResponseContext.getHeaders()).thenReturn(mockResponseHeaders); + } + + @Test + public void testFilterWithContentType() throws IOException { + when(mockResponseContext.getHeaderString("Content-Type")).thenReturn(MediaType.APPLICATION_JSON); + responseHeaderManipulation.filter(mockRequestContext, mockResponseContext); + + assertEquals("application/json",mockResponseContext.getHeaderString("Content-Type")); + } + + @Test + public void testFilterWithNoContentType() throws IOException { + // Arrange: Simulate Accept header with "*/*" and no Content-Type set + when(mockRequestContext.getHeaderString("Accept")).thenReturn("*/*"); + + responseHeaderManipulation.filter(mockRequestContext, mockResponseContext); + + assertEquals("*/*",mockRequestContext.getHeaderString("Accept")); + } + + @Test + public void testFilterWithNullAcceptHeader() throws IOException { + // Arrange: Simulate null Accept header + when(mockRequestContext.getHeaderString("Accept")).thenReturn(null); + responseHeaderManipulation.filter(mockRequestContext, mockResponseContext); + + assertNull(mockRequestContext.getHeaderString("Accept")); + } + + @Test + public void testFilterWithEmptyAcceptHeader() throws IOException { + // Arrange: Simulate empty Accept header and no Content-Type set + when(mockRequestContext.getHeaderString("Accept")).thenReturn(""); + when(mockResponseContext.getHeaderString("Content-Type")).thenReturn(null); + + responseHeaderManipulation.filter(mockRequestContext, mockResponseContext); + assertEquals("", mockRequestContext.getHeaderString("Accept")); + } + +} diff --git a/aai-schema-service/src/test/java/org/onap/aai/schemaservice/interceptors/pre/HeaderValidationTest.java b/aai-schema-service/src/test/java/org/onap/aai/schemaservice/interceptors/pre/HeaderValidationTest.java new file mode 100644 index 0000000..684fdc1 --- /dev/null +++ b/aai-schema-service/src/test/java/org/onap/aai/schemaservice/interceptors/pre/HeaderValidationTest.java @@ -0,0 +1,315 @@ +/** + * ============LICENSE_START======================================================= + * org.onap.aai + * ================================================================================ + * Copyright © 2025 Deutsche Telekom. All rights reserved. + * ================================================================================ + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * ============LICENSE_END========================================================= + */ +package org.onap.aai.schemaservice.interceptors.pre; + +import static org.mockito.Mockito.*; +import static org.junit.jupiter.api.Assertions.*; +import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.Test; +import org.junit.jupiter.api.extension.ExtendWith; +import org.mockito.InjectMocks; +import org.mockito.Mock; +import org.mockito.junit.jupiter.MockitoExtension; +import org.mockito.junit.jupiter.MockitoSettings; +import org.mockito.quality.Strictness; +import org.onap.aai.restcore.MediaType; +import org.onap.aai.schemaservice.interceptors.AAIHeaderProperties; +import org.onap.logging.filter.base.Constants; +import org.onap.logging.ref.slf4j.ONAPLogConstants; +import javax.ws.rs.container.ContainerRequestContext; +import javax.ws.rs.core.MultivaluedHashMap; +import javax.ws.rs.core.MultivaluedMap; +import javax.ws.rs.core.Response; +import java.io.IOException; +import java.lang.reflect.Method; +import java.util.ArrayList; +import java.util.List; +import java.util.Optional; + +@ExtendWith(MockitoExtension.class) +@MockitoSettings(strictness = Strictness.LENIENT) +public class HeaderValidationTest { + + @InjectMocks + private HeaderValidation headerValidation; + + @Mock + private ContainerRequestContext requestContext; + + private MultivaluedMap<String, String> headers; + + @BeforeEach + public void setUp() { + headers = new MultivaluedHashMap<>(); + when(requestContext.getHeaders()).thenReturn(headers); + } + + @Test + public void testGetPartnerName_withEmptyPartnerName() { + when(requestContext.getHeaderString("X-ONAP-PartnerName")).thenReturn(""); + when(requestContext.getHeaderString("X-FromAppId")).thenReturn("testAppId"); + + String partnerName = headerValidation.getPartnerName(requestContext); + + assertEquals("testAppId", partnerName); + } + + @Test + public void testGetPartnerName_withNullPartnerNameAndFromAppId() { + // Mock behavior of getHeaderString to return null for both PARTNER_NAME and FROM_APP_ID + when(requestContext.getHeaderString("X-ONAP-PartnerName")).thenReturn(null); + when(requestContext.getHeaderString("X-FromAppId")).thenReturn("testAppId"); + + String partnerName = headerValidation.getPartnerName(requestContext); + + assertEquals("testAppId", partnerName); + } + + @Test + public void testGetPartnerName_withMissingPartnerNameAndFromAppId() { + // Mock behavior of getHeaderString to return null for both PARTNER_NAME and FROM_APP_ID + when(requestContext.getHeaderString("X-ONAP-PartnerName")).thenReturn(null); + + String partnerName = headerValidation.getPartnerName(requestContext); + + assertNull(partnerName); + } + + @Test + public void testGetRequestId_withValidRequestId() { + // Mock behavior of getHeaderString to return a valid request ID + when(requestContext.getHeaderString("X-ONAP-RequestID")).thenReturn("testRequestId"); + + String requestId = headerValidation.getRequestId(requestContext); + + assertEquals("testRequestId", requestId); + } + + @Test + public void testFilter_withMissingPartnerName() throws IOException { + // Mock behavior for missing PartnerName header + when(requestContext.getHeaderString("X-ONAP-PartnerName")).thenReturn(""); + when(requestContext.getHeaderString("X-FromAppId")).thenReturn("testAppId"); + when(requestContext.getHeaderString("X-ONAP-RequestId")).thenReturn("testRequestId"); + + headerValidation.filter(requestContext); + + // Verify that the method calls abortWith due to the missing partner name + verify(requestContext).abortWith(argThat(response -> response.getStatus() == 400)); + } + + @Test + void testGetRequestId_ClearsExistingHeaders() { + // Arrange + String expectedRequestId = "test-request-id"; + headers.put(ONAPLogConstants.Headers.REQUEST_ID, new ArrayList<>()); + headers.put(Constants.HttpHeaders.TRANSACTION_ID, new ArrayList<>()); + headers.put(Constants.HttpHeaders.HEADER_REQUEST_ID, new ArrayList<>()); + headers.put(Constants.HttpHeaders.ECOMP_REQUEST_ID, new ArrayList<>()); + + when(requestContext.getHeaderString(ONAPLogConstants.Headers.REQUEST_ID)) + .thenReturn(expectedRequestId); + + String actualRequestId = headerValidation.getRequestId(requestContext); + + assertEquals(expectedRequestId, actualRequestId); + verify(requestContext, atLeastOnce()).getHeaders(); + assertTrue(headers.get(ONAPLogConstants.Headers.REQUEST_ID).isEmpty()); + assertTrue(headers.get(Constants.HttpHeaders.TRANSACTION_ID).contains(expectedRequestId)); + assertTrue(headers.get(Constants.HttpHeaders.HEADER_REQUEST_ID).isEmpty()); + assertTrue(headers.get(Constants.HttpHeaders.ECOMP_REQUEST_ID).isEmpty()); + } + + @Test + void testGetRequestId_WhenEcompRequestIdExists() { + String expectedRequestId = "ecomp-123"; + when(requestContext.getHeaderString(ONAPLogConstants.Headers.REQUEST_ID)) + .thenReturn(null); + when(requestContext.getHeaderString(Constants.HttpHeaders.HEADER_REQUEST_ID)) + .thenReturn(null); + when(requestContext.getHeaderString(Constants.HttpHeaders.TRANSACTION_ID)) + .thenReturn(null); + when(requestContext.getHeaderString(Constants.HttpHeaders.ECOMP_REQUEST_ID)) + .thenReturn(expectedRequestId); + + String result = headerValidation.getRequestId(requestContext); + + assertEquals(expectedRequestId, result); + } + + @Test + void whenPartnerNameHasValidComponents_shouldReturnFirstComponent() { + when(requestContext.getHeaderString(ONAPLogConstants.Headers.PARTNER_NAME)).thenReturn("TEST.COMPONENT"); + + String result = headerValidation.getPartnerName(requestContext); + + assertEquals("TEST.COMPONENT", result); + } + + @Test + void whenPartnerNameStartsWithAAI_shouldUseFromAppId() { + when(requestContext.getHeaderString(ONAPLogConstants.Headers.PARTNER_NAME)).thenReturn("AAI.COMPONENT"); + + String result = headerValidation.getPartnerName(requestContext); + + assertEquals("AAI.COMPONENT", result); + } + + @Test + void shouldClearAndUpdateHeaders() { + List<String> oldValues = new ArrayList<>(); + oldValues.add("OLD-VALUE"); + headers.put(ONAPLogConstants.Headers.PARTNER_NAME, oldValues); + headers.put(AAIHeaderProperties.FROM_APP_ID, oldValues); + + when(requestContext.getHeaderString(ONAPLogConstants.Headers.PARTNER_NAME)).thenReturn("NEW-SOT"); + + String result = headerValidation.getPartnerName(requestContext); + + assertEquals("NEW-SOT", result); + assertEquals("NEW-SOT", headers.getFirst(AAIHeaderProperties.FROM_APP_ID)); + } + + + @Test + public void testGetRequestId_withValidHeaderRequestId() { + when(requestContext.getHeaderString(ONAPLogConstants.Headers.REQUEST_ID)).thenReturn(""); + when(requestContext.getHeaderString(Constants.HttpHeaders.HEADER_REQUEST_ID)).thenReturn("validHeaderRequestId"); + + String result = headerValidation.getRequestId(requestContext); + + assertEquals("validHeaderRequestId",result); + } + + @Test + public void testGetRequestIdNull_withValidTransactionId() { + when(requestContext.getHeaderString(ONAPLogConstants.Headers.REQUEST_ID)).thenReturn(null); + when(requestContext.getHeaderString(Constants.HttpHeaders.HEADER_REQUEST_ID)).thenReturn(null); + when(requestContext.getHeaderString(Constants.HttpHeaders.TRANSACTION_ID)).thenReturn("validTransactionId"); + + String result = headerValidation.getRequestId(requestContext); + + assertEquals("validTransactionId",result); + } + + @Test + public void testGetRequestIdEmpty_withValidTransactionId() { + when(requestContext.getHeaderString(ONAPLogConstants.Headers.REQUEST_ID)).thenReturn(""); + when(requestContext.getHeaderString(Constants.HttpHeaders.HEADER_REQUEST_ID)).thenReturn(""); + when(requestContext.getHeaderString(Constants.HttpHeaders.TRANSACTION_ID)).thenReturn("validTransactionId"); + + String result = headerValidation.getRequestId(requestContext); + + assertEquals("validTransactionId",result); + } + + @Test + public void testGetRequestId_withValidEcompRequestId() { + + when(requestContext.getHeaderString(ONAPLogConstants.Headers.REQUEST_ID)).thenReturn(null); + when(requestContext.getHeaderString(Constants.HttpHeaders.HEADER_REQUEST_ID)).thenReturn(null); + when(requestContext.getHeaderString(Constants.HttpHeaders.TRANSACTION_ID)).thenReturn(null); + when(requestContext.getHeaderString(Constants.HttpHeaders.ECOMP_REQUEST_ID)).thenReturn("validEcompRequestId"); + + String result = headerValidation.getRequestId(requestContext); + + assertEquals("validEcompRequestId",result); + } + + @Test + public void testGetRequestId_withValidEcompRequestIdAfterEmptyTransactionId() { + when(requestContext.getHeaderString(ONAPLogConstants.Headers.REQUEST_ID)).thenReturn(null); + when(requestContext.getHeaderString(Constants.HttpHeaders.HEADER_REQUEST_ID)).thenReturn(null); + when(requestContext.getHeaderString(Constants.HttpHeaders.TRANSACTION_ID)).thenReturn(""); + when(requestContext.getHeaderString(Constants.HttpHeaders.ECOMP_REQUEST_ID)).thenReturn("validEcompRequestId"); + + String result = headerValidation.getRequestId(requestContext); + + assertEquals("validEcompRequestId",result); + } + + @Test + public void testGetRequestId_withMultipleHeadersValid() { + when(requestContext.getHeaderString(ONAPLogConstants.Headers.REQUEST_ID)).thenReturn("validRequestId"); + when(requestContext.getHeaderString(Constants.HttpHeaders.HEADER_REQUEST_ID)).thenReturn("anotherRequestId"); + + String result = headerValidation.getRequestId(requestContext); + assertEquals("validRequestId", result, "Expected validRequestId to be returned as it's the first non-null value"); + + } + @Test + public void testGetPartnerName_withNullPartnerNameAndNullFromAppId() { + when(requestContext.getHeaderString(ONAPLogConstants.Headers.PARTNER_NAME)).thenReturn(null); + when(requestContext.getHeaderString(AAIHeaderProperties.FROM_APP_ID)).thenReturn(null); + + String partnerName = headerValidation.getPartnerName(requestContext); + assertNull(partnerName, "Expected null partner name when both PARTNER_NAME and FROM_APP_ID are null"); + } + + @Test + public void testGetPartnerName_withNonEmptyPartnerName() { + when(requestContext.getHeaderString(ONAPLogConstants.Headers.PARTNER_NAME)).thenReturn("partnerName"); + when(requestContext.getHeaderString(AAIHeaderProperties.FROM_APP_ID)).thenReturn("testAppId"); + String partnerName = headerValidation.getPartnerName(requestContext); + + assertEquals("partnerName", partnerName, "Expected partner name to be used directly when PARTNER_NAME is not empty"); + } + + @Test + public void testGetPartnerName_withNullPartnerNameAndNonEmptyFromAppId() { + when(requestContext.getHeaderString(ONAPLogConstants.Headers.PARTNER_NAME)).thenReturn(null); + when(requestContext.getHeaderString(AAIHeaderProperties.FROM_APP_ID)).thenReturn("testAppId"); + + String partnerName = headerValidation.getPartnerName(requestContext); + assertEquals("testAppId", partnerName, "Expected partner name to fall back to FROM_APP_ID when PARTNER_NAME is null"); + } + + @Test + public void testGetPartnerName_withEmptyFromAppId() { + when(requestContext.getHeaderString(ONAPLogConstants.Headers.PARTNER_NAME)).thenReturn("validPartnerName"); + when(requestContext.getHeaderString(AAIHeaderProperties.FROM_APP_ID)).thenReturn(""); + String partnerName = headerValidation.getPartnerName(requestContext); + + assertEquals("validPartnerName", partnerName, "Expected valid PARTNER_NAME to be used even when FROM_APP_ID is empty"); + } + + @Test + public void testGetPartnerName_withValidPartnerNameWithDot() { + when(requestContext.getHeaderString(ONAPLogConstants.Headers.PARTNER_NAME)).thenReturn("TEST.COMPONENT"); + when(requestContext.getHeaderString(AAIHeaderProperties.FROM_APP_ID)).thenReturn("testAppId"); + + String partnerName = headerValidation.getPartnerName(requestContext); + + assertEquals("TEST.COMPONENT", partnerName, "Expected partner name to return 'TEST.COMPONENT' when PARTNER_NAME is valid"); + } + @Test + public void testValidateHeaderValuePresence_usingReflection() throws Exception { + + Method method = HeaderValidation.class.getDeclaredMethod("validateHeaderValuePresence", String.class, String.class, List.class); + method.setAccessible(true); + String value = "testValue"; + String errorCode = "AAI_4009"; + List<MediaType> acceptHeaderValues = List.of(MediaType.APPLICATION_JSON_TYPE); + Optional<Response> result = (Optional<Response>) method.invoke(headerValidation, value, errorCode, acceptHeaderValues); + assertNotNull(result); + } + + +} diff --git a/aai-schema-service/src/test/java/org/onap/aai/schemaservice/interceptors/pre/HttpHeaderInterceptorTest.java b/aai-schema-service/src/test/java/org/onap/aai/schemaservice/interceptors/pre/HttpHeaderInterceptorTest.java new file mode 100644 index 0000000..4570443 --- /dev/null +++ b/aai-schema-service/src/test/java/org/onap/aai/schemaservice/interceptors/pre/HttpHeaderInterceptorTest.java @@ -0,0 +1,80 @@ +/** + * ============LICENSE_START======================================================= + * org.onap.aai + * ================================================================================ + * Copyright © 2025 Deutsche Telekom. All rights reserved. + * ================================================================================ + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * ============LICENSE_END========================================================= + */ +package org.onap.aai.schemaservice.interceptors.pre; + +import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.Test; +import org.mockito.Mock; +import org.mockito.MockitoAnnotations; +import org.onap.aai.schemaservice.interceptors.AAIHeaderProperties; +import javax.ws.rs.container.ContainerRequestContext; +import java.io.IOException; +import static org.junit.jupiter.api.Assertions.assertEquals; +import static org.mockito.Mockito.*; + +class HttpHeaderInterceptorTest { + + private HttpHeaderInterceptor httpHeaderInterceptor; + + @Mock + private ContainerRequestContext mockRequestContext; + + @BeforeEach + void setUp() { + MockitoAnnotations.openMocks(this); + httpHeaderInterceptor = new HttpHeaderInterceptor(); + } + + @Test + void testFilter_WithPostMethodAndPatchOverride_ShouldSetMethodToPatch() throws IOException { + // Setup: Mock the method to POST and the HTTP_METHOD_OVERRIDE header to PATCH + when(mockRequestContext.getHeaderString(AAIHeaderProperties.HTTP_METHOD_OVERRIDE)).thenReturn("PATCH"); + when(mockRequestContext.getMethod()).thenReturn("POST"); + + httpHeaderInterceptor.filter(mockRequestContext); + + verify(mockRequestContext).setMethod("PATCH"); + } + + @Test + void testFilter_WithPostMethodAndNoOverride_ShouldNotChangeMethod() throws IOException { + // Setup: Mock the method to POST and no HTTP_METHOD_OVERRIDE header (null or empty) + when(mockRequestContext.getMethod()).thenReturn("POST"); + when(mockRequestContext.getHeaderString(AAIHeaderProperties.HTTP_METHOD_OVERRIDE)).thenReturn(null); + + httpHeaderInterceptor.filter(mockRequestContext); + + verify(mockRequestContext, never()).setMethod(anyString()); + assertEquals("POST", mockRequestContext.getMethod()); + } + + @Test + void testFilter_WithPatchMethodAndNoOverride_ShouldNotChangeMethod() throws IOException { + // Setup: Mock the method to PATCH and no override header + when(mockRequestContext.getMethod()).thenReturn("PATCH"); + when(mockRequestContext.getHeaderString(AAIHeaderProperties.HTTP_METHOD_OVERRIDE)).thenReturn(null); + + httpHeaderInterceptor.filter(mockRequestContext); + + verify(mockRequestContext, never()).setMethod(anyString()); + assertEquals("PATCH", mockRequestContext.getMethod()); + + } +} diff --git a/aai-schema-service/src/test/java/org/onap/aai/schemaservice/interceptors/pre/RequestTransactionLoggingTest.java b/aai-schema-service/src/test/java/org/onap/aai/schemaservice/interceptors/pre/RequestTransactionLoggingTest.java new file mode 100644 index 0000000..0c701cd --- /dev/null +++ b/aai-schema-service/src/test/java/org/onap/aai/schemaservice/interceptors/pre/RequestTransactionLoggingTest.java @@ -0,0 +1,141 @@ +/** + * ============LICENSE_START======================================================= + * org.onap.aai + * ================================================================================ + * Copyright © 2025 Deutsche Telekom. All rights reserved. + * ================================================================================ + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * ============LICENSE_END========================================================= + */ +package org.onap.aai.schemaservice.interceptors.pre; + +import org.glassfish.jersey.server.ContainerException; +import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.Test; +import org.mockito.InjectMocks; +import org.mockito.Mock; +import org.mockito.MockitoAnnotations; +import org.onap.aai.schemaservice.interceptors.AAIHeaderProperties; +import javax.ws.rs.container.ContainerRequestContext; +import javax.ws.rs.core.MediaType; +import javax.ws.rs.core.MultivaluedMap; +import javax.ws.rs.core.UriInfo; +import java.io.ByteArrayInputStream; +import java.io.IOException; +import java.io.InputStream; +import java.io.UnsupportedEncodingException; +import java.net.URI; +import java.util.Arrays; +import java.util.List; +import static org.junit.jupiter.api.Assertions.*; +import static org.mockito.Mockito.*; + +class RequestTransactionLoggingTest { + + @InjectMocks + RequestTransactionLogging requestTransactionLogging; + + @Mock + ContainerRequestContext containerRequestContext; + + @Mock + UriInfo uriInfoMock; + + @Mock + private MultivaluedMap<String, String> mockHeaders; + + @BeforeEach + void setUp() { + // Initialize mocks + MockitoAnnotations.openMocks(this); + } + + @Test + public void testFilterMethod() throws UnsupportedEncodingException { + + String contentType = "application/json"; + String expectedTxId = "12345"; + String request ="request_id"; + String aaiRequestTs="aaiRequestId"; + String payload = "{\"key\":\"value\"}"; + + List<MediaType> acceptHeaderValues = Arrays.asList(MediaType.APPLICATION_JSON_TYPE); + + when(containerRequestContext.getHeaderString("Content-Type")).thenReturn(contentType); + when(containerRequestContext.getAcceptableMediaTypes()).thenReturn(acceptHeaderValues); + when(containerRequestContext.getProperty(AAIHeaderProperties.AAI_TX_ID)).thenReturn(expectedTxId); + when(containerRequestContext.getProperty(AAIHeaderProperties.AAI_REQUEST)).thenReturn(request); + when(containerRequestContext.getProperty(AAIHeaderProperties.AAI_REQUEST_TS)).thenReturn(aaiRequestTs); + + when(containerRequestContext.getHeaders()).thenReturn(mockHeaders); + + when(mockHeaders.containsKey("Content-Type")).thenReturn(false); + when(mockHeaders.containsKey("Accept")).thenReturn(true); + + // Mocking UriInfo methods + when(containerRequestContext.getUriInfo()).thenReturn(uriInfoMock); + when(uriInfoMock.getRequestUri()).thenReturn(URI.create("http://localhost/some/other/path")); + when(uriInfoMock.getPath()).thenReturn("/some/other/path"); + + InputStream inputStream = new ByteArrayInputStream(payload.getBytes("UTF-8")); + when(containerRequestContext.getEntityStream()).thenReturn(inputStream); + + requestTransactionLogging.filter(containerRequestContext); + + // Assertions for headers + assertNotNull(mockHeaders, "Headers should not be null."); + assertNull(mockHeaders.getFirst("Content-Type"), "Content-Type should initially be null."); + } + + @Test + public void testFilterMethodWithIOException() throws IOException { + + String contentType = "application/json"; + String expectedTxId = "12345"; + String request = "request_id"; + String aaiRequestTs = "aaiRequestId"; + String payload = "{\"key\":\"value\"}"; + + List<MediaType> acceptHeaderValues = Arrays.asList(MediaType.APPLICATION_JSON_TYPE); + + // Mocking containerRequestContext methods + when(containerRequestContext.getHeaderString("Content-Type")).thenReturn(contentType); + when(containerRequestContext.getAcceptableMediaTypes()).thenReturn(acceptHeaderValues); + when(containerRequestContext.getProperty(AAIHeaderProperties.AAI_TX_ID)).thenReturn(expectedTxId); + when(containerRequestContext.getProperty(AAIHeaderProperties.AAI_REQUEST)).thenReturn(request); + when(containerRequestContext.getProperty(AAIHeaderProperties.AAI_REQUEST_TS)).thenReturn(aaiRequestTs); + + // Mocking the getHeaders() method to return a non-null headers object + when(containerRequestContext.getHeaders()).thenReturn(mockHeaders); + when(mockHeaders.getFirst("Content-Type")).thenReturn(null); // This is to simulate the header being absent + when(mockHeaders.getFirst("Accept")).thenReturn("application/xml"); + + doNothing().when(mockHeaders).putSingle(anyString(), anyString()); + when(mockHeaders.containsKey("Content-Type")).thenReturn(false); + when(mockHeaders.containsKey("Accept")).thenReturn(true); + + // Mocking UriInfo methods + when(containerRequestContext.getUriInfo()).thenReturn(uriInfoMock); + when(uriInfoMock.getRequestUri()).thenReturn(URI.create("http://localhost/some/other/path")); + when(uriInfoMock.getPath()).thenReturn("/some/other/path"); + + // Mocking getEntityStream to throw an IOException + InputStream inputStream = mock(InputStream.class); + when(inputStream.available()).thenThrow(new IOException("Test IOException")); + when(containerRequestContext.getEntityStream()).thenReturn(inputStream); + + assertThrows(ContainerException.class, () -> { + requestTransactionLogging.filter(containerRequestContext); + }); + } +} diff --git a/aai-schema-service/src/test/resources/error.properties b/aai-schema-service/src/test/resources/error.properties new file mode 100644 index 0000000..52a44bc --- /dev/null +++ b/aai-schema-service/src/test/resources/error.properties @@ -0,0 +1,198 @@ +# Adding comment trying to trigger a build +#------------------------------------------------------------------------------- ---------- +#Key=Disposition:Category:Severity:Error Code:HTTP ResponseCode:RESTError Code:Error Message +#------------------------------------------------------------------------------- ---------- +# testing code, please don't change unless error utility source code changes +AAI_TESTING=5:2:WARN:0000:400:0001:Error code for testing:0 + +# General success +AAI_0000=0:0:INFO:0000:200:0000:Success:0 + +# health check success +AAI_0001=0:0:INFO:0001:200:0001:Success X-FromAppId=%1 X-TransactionId=%2 :0 +AAI_0002=0:0:INFO:0002:200:0001:Successful health check:0 + +# Success with additional info +AAI_0003=0:3:INFO:0003:202:0003:Success with additional info performing %1 on %2. Added %3 with key %4:0 +AAI_0004=0:3:INFO:0004:202:0003:Added prerequisite object to db:0 + +#--- aairest: 3000-3299 +# svc errors +AAI_3000=5:2:INFO:3000:400:3000:Invalid input performing %1 on %2:300 +AAI_3001=5:6:INFO:3001:404:3001:Resource not found for %1 using id %2:300 +AAI_3002=5:1:WARN:3002:400:3002:Error writing output performing %1 on %2:300 +AAI_3003=5:1:WARN:3003:400:3003:Failed to make edge to missing target node of type %3 with keys %4 performing %1 on %2:400 +AAI_3005=5:6:WARN:3005:404:3001:Node cannot be directly accessed for read, must be accessed via ancestor(s):100 +AAI_3006=5:6:WARN:3006:404:3001:Node cannot be directly accessed for write, must be accessed via ancestor(s)100 +AAI_3007=5:6:INFO:3007:410:3007:This version (%1) of the API is retired, please migrate to %2:500 +AAI_3008=5:6:WARN:3008:400:3008:URI is not encoded in UTF-8:300 +AAI_3009=5:6:WARN:3009:400:3002:Malformed URL:300 +AAI_3010=5:6:WARN:3010:400:3002:Cannot write via this URL:100 +AAI_3011=5:6:WARN:3011:400:3000:Unknown XML namespace used in payload:300 +AAI_3012=5:6:WARN:3012:400:3012:Unrecognized AAI function:300 +AAI_3013=5:6:WARN:3013:400:3013:Query payload missing required parameters %1:300 +AAI_3014=5:6:WARN:3014:400:3014:Query payload is invalid %1:300 +AAI_3016=5:6:INFO:3007:400:3016:Request uri is not valid, please check the version %1:500 +AAI_3017=5:6:INFO:3007:400:3016:Request uri is not valid, please check the uri %1:500 +AAI_3018=5:6:WARN:3018:400:3018:Query URI missing required parameters:300 +AAI_3019=5:6:WARN:3019:400:3019:Query URI sending conflicting parameters:300 +AAI_3020=5:6:WARN:3020:400:3020:Query URI parameters outside bounds:300 +AAI_3021=5:6:WARN:3021:400:3021:Invalid parameters to Recents API:300 +AAI_3022=5:6:WARN:3022:400:3022:Query payload includes extra/unrecognized parameters %1:300 +AAI_3025=5:4:FATAL:3025:500:3025:Error connecting to Schema Service:400 +AAI_3026=5:4:FATAL:3026:500:3026:Error reading OXM from Schema Service:400 +AAI_3027=5:4:FATAL:3026:500:3026:Error reading EdgeRules from Schema Service:400 +AAI_3028=5:4:FATAL:3026:500:3026:Error reading stored-queries from Schema Service:400 + +# pol errors +AAI_3100=5:1:WARN:3100:400:3100:Unsupported operation %1:300 +AAI_3101=5:1:WARN:3101:403:3101:Attempt by client %1 to execute API %2:100 +AAI_3102=5:1:WARN:3102:400:3102:Error parsing input performing %1 on %2:300 +AAI_3300=5:1:WARN:3300:403:3300:Unauthorized:100 +AAI_3301=5:1:WARN:3301:401:3301:Stale credentials:100 +AAI_3302=5:1:WARN:3302:401:3301:Not authenticated:100 +AAI_3303=5:1:WARN:3303:403:3300:Too many objects would be returned by this request, please refine your request and retry:500 + +#--- aaigen: 4000-4099 +AAI_4000=5:4:ERROR:4000:500:3002:Internal Error:500 +AAI_4001=5:4:FATAL:4001:500:3002:Configuration file not found:500 +AAI_4002=5:4:FATAL:4002:500:3002:Error reading Configuration file:500 +AAI_4003=5:4:ERROR:4003:500:3002:Error writing to log file:500 +AAI_4004=5:4:FATAL:4004:500:3002:Error reading/parsing the error properties file:500 +AAI_4005=5:4:FATAL:4005:500:3002:Missing or invalid configuration parameter:500 +AAI_4006=5:4:FATAL:4006:500:3002:Unexpected error in service:500 +AAI_4007=5:4:WARN:4007:500:3102:Input parsing error:500 +AAI_4008=5:4:ERROR:4008:500:3002:Output parsing error:500 +AAI_4009=4:0:WARN:4009:400:3000:Invalid X-FromAppId in header:300 +AAI_4010=4:0:WARN:4010:400:3000:Invalid X-TransactionId in header:300 +AAI_4011=5:4:ERROR:4011:500:3002:Missing data for REST error response:500 +AAI_4014=4:0:WARN:4014:400:3000:Invalid Accept header:300 +AAI_4015=4:0:WARN:4015:400:3000:You must provide at least one indexed property:400 +AAI_4016=4:0:WARN:4016:400:3000:The depth parameter must be a number or the string "all":300 +AAI_4017=5:2:INFO:4017:400:3000:Could not set property:300 +AAI_4018=5:2:WARN:4018:400:3000:Unable to convert the string to integer:300 +AAI_4019=5:4:ERROR:4018:400:3000:Invalid start time sent to history formats:300 +AAI_4020=5:4:ERROR:4020:400:3002:Unexpected data type for property key:400 + +#--- aaidbmap: 5102-5199 +AAI_5102=5:4:FATAL:5102:500:3002:Graph database is null after open:400 +AAI_5105=5:4:ERROR:5105:500:3002:Unexpected error reading/updating database:300 +AAI_5106=5:4:WARN:5106:404:3001:Node not found:300 +AAI_5107=5:2:WARN:5107:400:3000:Required information missing:300 +AAI_5108=5:2:WARN:5108:200:0:Unexpected information in request being ignored:300 + +#--- aaidbgen: 6101-6199 +AAI_6101=5:4:ERROR:6101:500:3002:null JanusGraph object passed:400 +AAI_6102=5:4:WARN:6102:400:3000:Passed-in property is not valid for this nodeType:400 +AAI_6103=5:4:WARN:6103:400:3000:Required Node-property not found in input data:400 +AAI_6104=5:4:WARN:6104:400:3000:Required Node-property was passed with no data:400 +AAI_6105=5:4:WARN:6105:400:3000:Node-Key-Property not defined in DbMaps:400 +AAI_6106=5:4:WARN:6106:400:3000:Passed-in property is not valid for this edgeType:400 +AAI_6107=5:4:WARN:6107:400:3000:Required Edge-property not found in input data:400 +AAI_6108=5:4:WARN:6108:400:3000:Required Edge-property was passed with no data:400 +AAI_6109=5:4:WARN:6109:400:3000:Bad dependent Node value:400 +AAI_6110=5:4:ERROR:6110:400:3100:Node cannot be deleted:500 +AAI_6111=5:4:WARN:6111:400:3000:JSON processing error:300 +AAI_6112=5:4:ERROR:6112:400:3000:More than one node found by getUniqueNode():400 +AAI_6114=5:4:WARN:6114:404:3001:Node Not Found:300 +AAI_6115=5:4:ERROR:6115:400:3000:Unrecognized NodeType:400 +AAI_6116=5:4:ERROR:6116:400:3000:Unrecognized Property:400 +AAI_6117=5:4:ERROR:6117:400:3000:Uniqueness constraint violated:400 +AAI_6118=5:4:WARN:6118:400:3000:Required Field not passed.:400 +AAI_6120=5:4:WARN:6120:400:3000:Bad Parameter Passed:300 +AAI_6121=5:4:ERROR:6121:400:3000:Problem with internal AAI reference data:400 +AAI_6122=5:4:ERROR:6122:400:3000:Data Set not complete in DB for this request:400 +AAI_6123=5:4:ERROR:6123:500:3000:Bad Data found by DataGrooming Tool - Investigate:300 +AAI_6124=5:4:ERROR:6124:500:3000:File read/write error:500 +AAI_6125=5:4:WARN:6125:500:3000:Problem Pulling Data Set:500 +AAI_6126=5:4:ERROR:6126:400:3000:Edge cannot be deleted:400 +AAI_6127=5:4:INFO:6127:404:3001:Edge Not Found:400 +AAI_6128=5:4:INFO:6128:500:3000:Unexpected error:900 +AAI_6129=5:4:INFO:6129:404:3003:Error making edge to target node:400 +AAI_6130=5:4:WARN:6130:412:3000:Precondition Required:300 +AAI_6131=5:4:WARN:6131:412:3000:Precondition Failed:300 +AAI_6132=5:4:WARN:6132:400:3000:Bad Model Definition:500 +AAI_6133=5:4:WARN:6133:400:3000:Bad Named Query Definition:500 +AAI_6134=5:4:ERROR:6134:500:6134:Could not persist transaction to storage back end. Exhausted retry amount:500 +AAI_6135=5:4:WARN:6135:412:3000:Resource version specified on create:300 +AAI_6136=5:4:ERROR:6136:400:3000:Object cannot hold multiple items:400 +AAI_6137=5:4:ERROR:6137:400:3000:Cannot perform writes on multiple vertices:400 +AAI_6138=5:4:ERROR:6138:400:3000:Cannot delete multiple vertices:400 +AAI_6139=5:4:ERROR:6139:404:3000:Attempted to add edge to vertex that does not exist:400 +AAI_6140=5:4:ERROR:6140:400:3000:Edge multiplicity violated:400 +AAI_6141=5:4:WARN:6141:400:3000:Please Refine Query:400 +AAI_6142=5:4:INFO:6142:400:3000:Retrying transaction:900 +AAI_6143=5:4:INFO:6143:400:3000:Ghost vertex found:400 +AAI_6144=5:4:WARN:6144:400:3000:Cycle found in graph:400 +AAI_6145=5:4:ERROR:6145:400:3000:Cannot create a nested/containment edge via relationship:400 +AAI_6146=5:4:ERROR:6146:400:3000:Ambiguous identity map found, use a URI instead:300 +AAI_6147=5:4:ERROR:6147:400:3000:Payload Limit Reached, reduce payload:300 +AAI_6148=5:4:INFO:6148:404:3001:Node Not Found. Start URI returned no vertexes, please check the start URI:400 +AAI_6149=5:4:INFO:6149:400:6149:DSL Query/Schema Error:400 +AAI_6150=5:4:INFO:6150:404:6150:Pagination Error:500 +AAI_6151=5:4:INFO:6151:400:6151:DSL Validation Error:500 +AAI_6152=5:4:INFO:6152:400:6152:DSL Generic Error:900 +AAI_6153=5:4:INFO:6153:400:6153:DSL Syntax Error:300 +AAI_6154=5:4:WARN:6134:500:3000:Delete Error:300 + +#--- aaicsvp: 7101-7199 +AAI_7101=5:4:ERROR:7101:500:3002:Unexpected error in CSV file processing:900 +AAI_7102=5:4:ERROR:7102:500:3002:Error in cleanup temporary directory:500 +#AAI_7103=4:2:ERROR:7103:500:3002:Unsupported user:100 +AAI_7104=5:4:ERROR:7104:500:3002:Failed to create directory:500 +AAI_7105=5:4:ERROR:7105:500:3002:Temporary directory exists:500 +AAI_7106=5:4:ERROR:7106:500:3002:Cannot delete:500 +AAI_7107=5:4:ERROR:7107:500:3002:Input file does not exist:500 +AAI_7108=5:4:ERROR:7108:500:3002:Output file does not exist:500 +AAI_7109=5:4:ERROR:7109:500:3002:Error closing file:500 +AAI_7110=5:4:ERROR:7110:500:3002:Error loading/reading properties file:500 +AAI_7111=5:4:ERROR:7111:500:3002:Error executing shell script:900 +AAI_7112=5:4:ERROR:7112:500:3002:Error creating output file:500 +AAI_7113=5:4:ERROR:7113:500:3002:Trailer record error:300 +AAI_7114=5:4:ERROR:7114:500:3002:Input file error:300 +AAI_7115=5:4:ERROR:7115:500:3002:Unexpected error:900 +AAI_7116=5:4:ERROR:7116:500:3002:Request error:900 +AAI_7117=5:4:ERROR:7117:500:3002:Error in get http client object:500 +AAI_7118=5:4:ERROR:7118:500:3002:Script Error:900 +AAI_7119=5:4:ERROR:7119:500:3002:Unknown host:900 + +#--- aaisdnc: 7201-7299 +AAI_7202=5:4:ERROR:7202:500:3002:Error getting connection to odl:200 +AAI_7203=5:4:ERROR:7203:500:3002:Unexpected error calling DataChangeNotification API:900 +AAI_7204=5:4:ERROR:7204:500:3002:Error returned by DataChangeNotification API:200 +#AAI_7206=5:4:ERROR:7206:500:3002:Invalid data returned from ODL:300 + +#--- NotificationEvent, using UEB space +AAI_7304=4:5:ERROR:7304:500:3002:Error reaching DMaaP to send event:200 +AAI_7350=5:4:ERROR:7305:500:3002:Notification event creation failed:500 + +#--- aairestctlr: 7401-7499 +AAI_7401=5:4:ERROR:7401:500:3002:Error connecting to AAI REST API:200 +AAI_7402=5:4:ERROR:7402:500:3002:Unexpected error:900 +AAI_7403=5:4:WARN:7403:400:3001:Request error:900 +AAI_7404=5:4:INFO:7404:404:3001:Node not found:300 +AAI_7405=5:4:WARN:7405:200:0:UUID not formatted correctly, generating UUID:300 +AAI_7406=5:4:ERROR:7406:400:7406:Request Timed Out:200 + +#--- aaicsiovals: 7501-7599 +#AAI_7501=5:4:WARN:7501:500:3002:Error getting connection to CSI-OVALS:200 +AAI_7502=5:4:WARN:7502:500:3002:Bad parameter when trying to build request for CSI-OVALS:300 +AAI_7503=5:4:WARN:7503:500:3002:Error returned by CSI-OVALS:500 + +#--- aaiauth: 9101-9199 +AAI_9101=5:0:WARN:9101:403:3300:User is not authorized to perform function:100 +#AAI_9102=5:0:WARN:9102:401:3301:Refresh credentials from source +#AAI_9103=5:0:WARN:9103:403:3300:User not found +#AAI_9104=5:0:WARN:9104:401:3302:Authentication error +#AAI_9105=5:0:WARN:9105:403:3300:Authorization error +#AAI_9106=5:0:WARN:9106:403:3300:Invalid AppId +#AAI_9107=5:0:WARN:9107:403:3300:No Username in Request +AAI_9107=5:0:WARN:9107:403:3300:SSL is not provided in request, please contact admin:100 + +#--- aaiinstar: 9201-9299 +#AAI_9201=5:4:ERROR:9201:500:3002:Unable to send notification +AAI_9202=5:4:ERROR:9202:500:3002:Unable to start a thread:500 +#--- GRM DME2: 9501-9599 +AAI_9501=5:4:WARN:9501:500:3002:Unable to register with GRM retrying:200 +AAI_9502=5:4:ERROR:9502:500:3002:Unable to register with GRM after exhausting all retries:200 +AAI_9503=5:4:WARN:9503:500:3002:Unable to successfully unpublish with GRM, recommend manual cleanup but not necessary:200 |