aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authoradheli.tavares <adheli.tavares@est.tech>2024-09-10 09:17:27 +0100
committeradheli.tavares <adheli.tavares@est.tech>2024-09-12 11:42:16 +0100
commit8ea8fb5c9cfcf82f5f1fcdabbf8751add12a9fa8 (patch)
tree0f07961aa094378f80313ab8f2ddb3a40ec091fb
parent3b11f334df61e239c2a3e14b28afd0dc0e55153b (diff)
Increase code coverage in policy-management
Issue-ID: POLICY-5068 Change-Id: Ie7ac44a948fe559306b1aa3a403d888c352be7f2 Signed-off-by: adheli.tavares <adheli.tavares@est.tech>
-rw-r--r--policy-management/src/main/java/org/onap/policy/drools/controller/IndexedDroolsControllerFactory.java27
-rw-r--r--policy-management/src/main/java/org/onap/policy/drools/controller/internal/MavenDroolsController.java5
-rw-r--r--policy-management/src/main/java/org/onap/policy/drools/features/PolicyControllerFeatureApi.java3
-rw-r--r--policy-management/src/main/java/org/onap/policy/drools/persistence/FileSystemPersistence.java3
-rw-r--r--policy-management/src/main/java/org/onap/policy/drools/protocol/coders/EventProtocolCoder.java13
-rw-r--r--policy-management/src/main/java/org/onap/policy/drools/protocol/coders/GenericEventProtocolCoder.java322
-rw-r--r--policy-management/src/main/java/org/onap/policy/drools/protocol/coders/GsonProtocolCoderToolset.java37
-rw-r--r--policy-management/src/main/java/org/onap/policy/drools/protocol/coders/MultiplexorEventProtocolCoder.java47
-rw-r--r--policy-management/src/main/java/org/onap/policy/drools/protocol/coders/ProtocolCoderToolset.java10
-rw-r--r--policy-management/src/main/java/org/onap/policy/drools/protocol/coders/TopicCoderFilterConfiguration.java34
-rw-r--r--policy-management/src/test/java/org/onap/policy/drools/controller/IndexedDroolsControllerFactoryTest.java154
-rw-r--r--policy-management/src/test/java/org/onap/policy/drools/controller/internal/MavenDroolsControllerUpgradesTest.java56
-rw-r--r--policy-management/src/test/java/org/onap/policy/drools/features/DroolsControllerFeatureApiTest.java83
-rw-r--r--policy-management/src/test/java/org/onap/policy/drools/features/PolicyControllerFeatureApiTest.java171
-rw-r--r--policy-management/src/test/java/org/onap/policy/drools/features/PolicyEngineFeatureApiTest.java174
-rw-r--r--policy-management/src/test/java/org/onap/policy/drools/persistence/FileSystemPersistenceTest.java78
-rw-r--r--policy-management/src/test/java/org/onap/policy/drools/protocol/coders/EventProtocolCoderTest.java27
-rw-r--r--policy-management/src/test/java/org/onap/policy/drools/protocol/coders/GenericProtocolCoderTest.java651
-rw-r--r--policy-management/src/test/java/org/onap/policy/drools/protocol/coders/GsonProtocolCoderToolsetTest.java197
-rw-r--r--policy-management/src/test/java/org/onap/policy/drools/protocol/coders/MultiplexorEventProtocolCoderTest.java308
-rw-r--r--policy-management/src/test/java/org/onap/policy/drools/protocol/coders/ProtocolCoderToolsetTest.java95
-rw-r--r--policy-management/src/test/java/org/onap/policy/drools/protocol/coders/TopicCoderFilterConfigurationTest.java75
-rw-r--r--policy-management/src/test/java/org/onap/policy/drools/server/restful/test/RestManagerTest.java252
-rw-r--r--policy-management/src/test/java/org/onap/policy/drools/stats/PolicyStatsManagerTest.java14
-rw-r--r--policy-management/src/test/java/org/onap/policy/drools/stats/PolicyStatsTest.java9
-rw-r--r--policy-management/src/test/java/org/onap/policy/drools/system/PolicyControllerFactoryTest.java7
-rw-r--r--policy-management/src/test/java/org/onap/policy/drools/system/PolicyEngineManagerTest.java25
-rw-r--r--policy-management/src/test/java/org/onap/policy/drools/system/internal/FeatureLockImplTest.java16
28 files changed, 2392 insertions, 501 deletions
diff --git a/policy-management/src/main/java/org/onap/policy/drools/controller/IndexedDroolsControllerFactory.java b/policy-management/src/main/java/org/onap/policy/drools/controller/IndexedDroolsControllerFactory.java
index 7f28f9bb..a6459d67 100644
--- a/policy-management/src/main/java/org/onap/policy/drools/controller/IndexedDroolsControllerFactory.java
+++ b/policy-management/src/main/java/org/onap/policy/drools/controller/IndexedDroolsControllerFactory.java
@@ -28,6 +28,7 @@ import java.util.List;
import java.util.Map;
import java.util.Properties;
import lombok.NonNull;
+import org.apache.commons.lang3.StringUtils;
import org.onap.policy.common.endpoints.event.comm.Topic;
import org.onap.policy.common.endpoints.event.comm.Topic.CommInfrastructure;
import org.onap.policy.common.endpoints.event.comm.TopicSink;
@@ -62,7 +63,7 @@ class IndexedDroolsControllerFactory implements DroolsControllerFactory {
/**
* Null Drools Controller.
*/
- protected NullDroolsController nullDroolsController = new NullDroolsController();
+ protected NullDroolsController nullDroolsController;
/**
* Constructs the object.
@@ -71,11 +72,11 @@ class IndexedDroolsControllerFactory implements DroolsControllerFactory {
/* Add a NULL controller which will always be present in the hash */
- DroolsController controller = new NullDroolsController();
- String controllerId = controller.getGroupId() + ":" + controller.getArtifactId();
+ nullDroolsController = new NullDroolsController();
+ String controllerId = nullDroolsController.getGroupId() + ":" + nullDroolsController.getArtifactId();
synchronized (this) {
- droolsControllers.put(controllerId, controller);
+ droolsControllers.put(controllerId, nullDroolsController);
}
}
@@ -84,17 +85,17 @@ class IndexedDroolsControllerFactory implements DroolsControllerFactory {
List<? extends TopicSink> eventSinks) throws LinkageError {
String groupId = properties.getProperty(DroolsPropertyConstants.RULES_GROUPID);
- if (groupId == null || groupId.isEmpty()) {
+ if (StringUtils.isBlank(groupId)) {
groupId = DroolsControllerConstants.NO_GROUP_ID;
}
String artifactId = properties.getProperty(DroolsPropertyConstants.RULES_ARTIFACTID);
- if (artifactId == null || artifactId.isEmpty()) {
+ if (StringUtils.isBlank(artifactId)) {
artifactId = DroolsControllerConstants.NO_ARTIFACT_ID;
}
String version = properties.getProperty(DroolsPropertyConstants.RULES_VERSION);
- if (version == null || version.isEmpty()) {
+ if (StringUtils.isBlank(version)) {
version = DroolsControllerConstants.NO_VERSION;
}
@@ -110,15 +111,15 @@ class IndexedDroolsControllerFactory implements DroolsControllerFactory {
List<TopicCoderFilterConfiguration> decoderConfigurations,
List<TopicCoderFilterConfiguration> encoderConfigurations) throws LinkageError {
- if (newGroupId == null || newGroupId.isEmpty()) {
+ if (StringUtils.isBlank(newGroupId)) {
throw new IllegalArgumentException("Missing maven group-id coordinate");
}
- if (newArtifactId == null || newArtifactId.isEmpty()) {
+ if (StringUtils.isBlank(newArtifactId)) {
throw new IllegalArgumentException("Missing maven artifact-id coordinate");
}
- if (newVersion == null || newVersion.isEmpty()) {
+ if (StringUtils.isBlank(newVersion)) {
throw new IllegalArgumentException("Missing maven version coordinate");
}
@@ -240,7 +241,7 @@ class IndexedDroolsControllerFactory implements DroolsControllerFactory {
String eventClasses = properties
.getProperty(propertyTopicEntityPrefix + PolicyEndPointProperties.PROPERTY_TOPIC_EVENTS_SUFFIX);
- if (eventClasses == null || eventClasses.isEmpty()) {
+ if (StringUtils.isBlank(eventClasses)) {
logger.warn("There are no event classes for topic {}", firstTopic);
continue;
}
@@ -280,7 +281,7 @@ class IndexedDroolsControllerFactory implements DroolsControllerFactory {
+ PolicyEndPointProperties.PROPERTY_TOPIC_EVENTS_CUSTOM_MODEL_CODER_GSON_SUFFIX);
CustomGsonCoder customGsonCoder = null;
- if (customGson != null && !customGson.isEmpty()) {
+ if (StringUtils.isNotBlank(customGson)) {
try {
customGsonCoder = new CustomGsonCoder(customGson);
} catch (IllegalArgumentException e) {
@@ -375,7 +376,7 @@ class IndexedDroolsControllerFactory implements DroolsControllerFactory {
@Override
public DroolsController get(String groupId, String artifactId, String version) {
- if (groupId == null || artifactId == null || groupId.isEmpty() || artifactId.isEmpty()) {
+ if (StringUtils.isBlank(groupId) || StringUtils.isBlank(artifactId)) {
throw new IllegalArgumentException("Missing maven coordinates: " + groupId + ":" + artifactId);
}
diff --git a/policy-management/src/main/java/org/onap/policy/drools/controller/internal/MavenDroolsController.java b/policy-management/src/main/java/org/onap/policy/drools/controller/internal/MavenDroolsController.java
index 68a69159..aa701dfd 100644
--- a/policy-management/src/main/java/org/onap/policy/drools/controller/internal/MavenDroolsController.java
+++ b/policy-management/src/main/java/org/onap/policy/drools/controller/internal/MavenDroolsController.java
@@ -3,7 +3,7 @@
* ONAP
* ================================================================================
* Copyright (C) 2017-2021 AT&T Intellectual Property. All rights reserved.
- * Modifications Copyright (C) 2023 Nordix Foundation.
+ * Modifications Copyright (C) 2023-2024 Nordix Foundation.
* ================================================================================
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
@@ -31,6 +31,7 @@ import java.util.stream.Collectors;
import lombok.Getter;
import lombok.NonNull;
import org.apache.commons.collections4.queue.CircularFifoQueue;
+import org.apache.commons.lang3.StringUtils;
import org.drools.core.ClassObjectFilter;
import org.kie.api.definition.KiePackage;
import org.kie.api.definition.rule.Query;
@@ -219,7 +220,7 @@ public class MavenDroolsController implements DroolsController {
}
private void validateText(String text, String errorMessage) {
- if (text == null || text.isEmpty()) {
+ if (StringUtils.isBlank(text)) {
throw new IllegalArgumentException(errorMessage);
}
}
diff --git a/policy-management/src/main/java/org/onap/policy/drools/features/PolicyControllerFeatureApi.java b/policy-management/src/main/java/org/onap/policy/drools/features/PolicyControllerFeatureApi.java
index f022bf1d..15b48a5c 100644
--- a/policy-management/src/main/java/org/onap/policy/drools/features/PolicyControllerFeatureApi.java
+++ b/policy-management/src/main/java/org/onap/policy/drools/features/PolicyControllerFeatureApi.java
@@ -3,6 +3,7 @@
* ONAP
* ================================================================================
* Copyright (C) 2017-2020 AT&T Intellectual Property. All rights reserved.
+ * Modifications Copyright (C) 2024 Nordix Foundation.
* ================================================================================
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
@@ -32,7 +33,7 @@ public interface PolicyControllerFeatureApi extends OrderedService {
* called before creating a controller with name 'name' and
* properties 'properties'.
*
- * @param name name of the the controller
+ * @param name name of the controller
* @param properties configuration properties
*
* @return a policy controller. A take over of the creation operation
diff --git a/policy-management/src/main/java/org/onap/policy/drools/persistence/FileSystemPersistence.java b/policy-management/src/main/java/org/onap/policy/drools/persistence/FileSystemPersistence.java
index 9fb76d87..717a6f58 100644
--- a/policy-management/src/main/java/org/onap/policy/drools/persistence/FileSystemPersistence.java
+++ b/policy-management/src/main/java/org/onap/policy/drools/persistence/FileSystemPersistence.java
@@ -35,6 +35,7 @@ import java.util.List;
import java.util.Properties;
import java.util.function.BiPredicate;
import lombok.Getter;
+import lombok.NonNull;
import lombok.ToString;
import org.onap.policy.drools.properties.DroolsPropertyConstants;
import org.onap.policy.drools.utils.PropertyUtil;
@@ -151,7 +152,7 @@ public class FileSystemPersistence implements SystemPersistence {
}
}
- protected Properties getProperties(Path propertiesPath) {
+ protected Properties getProperties(@NonNull Path propertiesPath) {
if (!Files.exists(propertiesPath)) {
throw new IllegalArgumentException("properties for " + propertiesPath + " are not persisted.");
}
diff --git a/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/EventProtocolCoder.java b/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/EventProtocolCoder.java
index 88b25255..7cfa5a3a 100644
--- a/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/EventProtocolCoder.java
+++ b/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/EventProtocolCoder.java
@@ -4,6 +4,7 @@
* ================================================================================
* Copyright (C) 2017-2019,2022 AT&T Intellectual Property. All rights reserved.
* Modifications Copyright(C) 2018 Samsung Electronics Co., Ltd.
+ * Modifications Copyright (C) 2024 Nordix Foundation.
* ================================================================================
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
@@ -35,7 +36,7 @@ public interface EventProtocolCoder {
@Getter
@Setter
@AllArgsConstructor
- public static class CoderFilters {
+ class CoderFilters {
/**
* coder class.
@@ -54,13 +55,9 @@ public interface EventProtocolCoder {
@Override
public String toString() {
- return "CoderFilters [factClass="
- + factClass
- + ", filter="
- + filter
- + ", modelClassLoaderHash="
- + modelClassLoaderHash
- + "]";
+ return "CoderFilters [factClass=" + factClass
+ + ", filter=" + filter
+ + ", modelClassLoaderHash=" + modelClassLoaderHash + "]";
}
}
diff --git a/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/GenericEventProtocolCoder.java b/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/GenericEventProtocolCoder.java
index 0729c706..6fe1648a 100644
--- a/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/GenericEventProtocolCoder.java
+++ b/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/GenericEventProtocolCoder.java
@@ -3,6 +3,7 @@
* ONAP
* ================================================================================
* Copyright (C) 2019-2020, 2021 AT&T Intellectual Property. All rights reserved.
+ * Modifications Copyright (C) 2024 Nordix Foundation.
* ================================================================================
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
@@ -21,15 +22,19 @@
package org.onap.policy.drools.protocol.coders;
import java.util.ArrayList;
+import java.util.Collections;
import java.util.HashMap;
import java.util.Iterator;
import java.util.List;
import java.util.Map;
+import java.util.Objects;
import lombok.AccessLevel;
import lombok.NoArgsConstructor;
+import org.apache.commons.lang3.StringUtils;
import org.onap.policy.drools.controller.DroolsController;
import org.onap.policy.drools.controller.DroolsControllerConstants;
import org.onap.policy.drools.protocol.coders.EventProtocolCoder.CoderFilters;
+import org.onap.policy.drools.system.PolicyDroolsPdpRuntimeException;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
@@ -43,7 +48,7 @@ abstract class GenericEventProtocolCoder {
private static final String INVALID_GROUP_ID_MSG = "Invalid group id";
private static final String INVALID_TOPIC_MSG = "Invalid Topic";
private static final String UNSUPPORTED_MSG = "Unsupported";
- private static final String UNSUPPORTED_EX_MSG = "Unsupported:";
+ private static final String UNSUPPORTED_EX_MSG = "Unsupported: ";
private static final String MISSING_CLASS = "class must be provided";
private static final Logger logger = LoggerFactory.getLogger(GenericEventProtocolCoder.class);
@@ -52,37 +57,26 @@ abstract class GenericEventProtocolCoder {
* Mapping topic:controller-id -> /<protocol-decoder-toolset/> where protocol-coder-toolset contains
* a gson-protocol-coder-toolset.
*/
- protected final HashMap<String, ProtocolCoderToolset> coders =
- new HashMap<>();
+ protected final HashMap<String, ProtocolCoderToolset> coders = new HashMap<>();
/**
* Mapping topic + classname -> Protocol Set.
*/
- protected final HashMap<String, List<ProtocolCoderToolset>>
- reverseCoders = new HashMap<>();
+ protected final HashMap<String, List<ProtocolCoderToolset>> reverseCoders = new HashMap<>();
/**
* Index a new coder.
*/
public void add(EventProtocolParams eventProtocolParams) {
- if (eventProtocolParams.getGroupId() == null || eventProtocolParams.getGroupId().isEmpty()) {
- throw new IllegalArgumentException(INVALID_GROUP_ID_MSG);
- }
- if (eventProtocolParams.getArtifactId() == null || eventProtocolParams.getArtifactId().isEmpty()) {
- throw new IllegalArgumentException(INVALID_ARTIFACT_ID_MSG);
- }
+ validateKeyParameters(eventProtocolParams.getGroupId(),
+ eventProtocolParams.getArtifactId(),
+ eventProtocolParams.getTopic());
- if (eventProtocolParams.getTopic() == null || eventProtocolParams.getTopic().isEmpty()) {
- throw new IllegalArgumentException(INVALID_TOPIC_MSG);
- }
-
- if (eventProtocolParams.getEventClass() == null) {
- throw new IllegalArgumentException("Invalid Event Class");
- }
+ validateStringParameter(eventProtocolParams.getEventClass(), "Invalid Event Class");
String key = this.codersKey(eventProtocolParams.getGroupId(), eventProtocolParams.getArtifactId(),
- eventProtocolParams.getTopic());
+ eventProtocolParams.getTopic());
String reverseKey = this.reverseCodersKey(eventProtocolParams.getTopic(), eventProtocolParams.getEventClass());
synchronized (this) {
@@ -91,22 +85,16 @@ abstract class GenericEventProtocolCoder {
logger.info("{}: adding coders for existing {}: {}", this, key, toolset);
- toolset
- .addCoder(
- eventProtocolParams.getEventClass(),
- eventProtocolParams.getProtocolFilter(),
- eventProtocolParams.getModelClassLoaderHash());
+ toolset.addCoder(
+ eventProtocolParams.getEventClass(),
+ eventProtocolParams.getProtocolFilter(),
+ eventProtocolParams.getModelClassLoaderHash());
if (!reverseCoders.containsKey(reverseKey)) {
- logger.info(
- "{}: adding new reverse coders (multiple classes case) for {}:{}: {}",
- this,
- reverseKey,
- key,
- toolset);
-
- List<ProtocolCoderToolset> reverseMappings =
- new ArrayList<>();
+ logger.info("{}: adding new reverse coders (multiple classes case) for {}:{}: {}",
+ this, reverseKey, key, toolset);
+
+ List<ProtocolCoderToolset> reverseMappings = new ArrayList<>();
reverseMappings.add(toolset);
reverseCoders.put(reverseKey, reverseMappings);
}
@@ -128,20 +116,15 @@ abstract class GenericEventProtocolCoder {
// There is another controller (different group id/artifact id/topic)
// that shares the class and the topic.
- List<ProtocolCoderToolset> toolsets =
- reverseCoders.get(reverseKey);
+ List<ProtocolCoderToolset> toolsets = reverseCoders.get(reverseKey);
var present = false;
for (ProtocolCoderToolset parserSet : toolsets) {
- // just doublecheck
+ // just double check
present = parserSet.getControllerId().equals(key);
if (present) {
/* anomaly */
- logger.error(
- "{}: unexpected toolset reverse mapping found for {}:{}: {}",
- this,
- reverseKey,
- key,
- parserSet);
+ logger.error("{}: unexpected toolset reverse mapping found for {}:{}: {}",
+ this, reverseKey, key, parserSet);
}
}
@@ -191,17 +174,7 @@ abstract class GenericEventProtocolCoder {
*/
public void remove(String groupId, String artifactId, String topic) {
- if (groupId == null || groupId.isEmpty()) {
- throw new IllegalArgumentException(INVALID_GROUP_ID_MSG);
- }
-
- if (artifactId == null || artifactId.isEmpty()) {
- throw new IllegalArgumentException(INVALID_ARTIFACT_ID_MSG);
- }
-
- if (topic == null || topic.isEmpty()) {
- throw new IllegalArgumentException(INVALID_TOPIC_MSG);
- }
+ validateKeyParameters(groupId, artifactId, topic);
String key = this.codersKey(groupId, artifactId, topic);
@@ -225,23 +198,23 @@ abstract class GenericEventProtocolCoder {
return;
}
- List<ProtocolCoderToolset> toolsets =
- this.reverseCoders.get(reverseKey);
- Iterator<ProtocolCoderToolset> toolsetsIter =
- toolsets.iterator();
+ List<ProtocolCoderToolset> toolsets = this.reverseCoders.getOrDefault(reverseKey, Collections.emptyList());
+
+ if (toolsets.isEmpty()) {
+ logger.info("{}: removing reverse mapping for {}: ", this, reverseKey);
+ this.reverseCoders.remove(reverseKey);
+ return;
+ }
+
+ Iterator<ProtocolCoderToolset> toolsetsIter = toolsets.iterator();
+
while (toolsetsIter.hasNext()) {
ProtocolCoderToolset toolset = toolsetsIter.next();
if (toolset.getControllerId().equals(key)) {
- logger.info(
- "{}: removed coder from toolset for {} from reverse mapping", this, reverseKey);
+ logger.info("{}: removed coder from toolset for {} from reverse mapping", this, reverseKey);
toolsetsIter.remove();
}
}
-
- if (this.reverseCoders.get(reverseKey).isEmpty()) {
- logger.info("{}: removing reverse mapping for {}: ", this, reverseKey);
- this.reverseCoders.remove(reverseKey);
- }
}
/**
@@ -250,23 +223,14 @@ abstract class GenericEventProtocolCoder {
* @param groupId group id
* @param artifactId artifact id
* @param topic topic
- * @return true if its is codable
+ * @return true if it's supported to be coded
*/
public boolean isCodingSupported(String groupId, String artifactId, String topic) {
- if (groupId == null || groupId.isEmpty()) {
- throw new IllegalArgumentException(INVALID_GROUP_ID_MSG);
- }
-
- if (artifactId == null || artifactId.isEmpty()) {
- throw new IllegalArgumentException(INVALID_ARTIFACT_ID_MSG);
- }
-
- if (topic == null || topic.isEmpty()) {
- throw new IllegalArgumentException(INVALID_TOPIC_MSG);
- }
+ validateKeyParameters(groupId, artifactId, topic);
String key = this.codersKey(groupId, artifactId, topic);
+
synchronized (this) {
return coders.containsKey(key);
}
@@ -280,14 +244,14 @@ abstract class GenericEventProtocolCoder {
* @param topic topic
* @param json json string to convert to object
* @return the decoded object
- * @throws IllegalArgumentException if invalid argument is provided
- * @throws UnsupportedOperationException if the operation cannot be performed
+ * @throws IllegalArgumentException if invalid argument is provided
+ * @throws PolicyDroolsPdpRuntimeException if the operation cannot be performed
*/
public Object decode(String groupId, String artifactId, String topic, String json) {
if (!isCodingSupported(groupId, artifactId, topic)) {
throw new IllegalArgumentException(
- UNSUPPORTED_EX_MSG + codersKey(groupId, artifactId, topic) + " for encoding");
+ UNSUPPORTED_EX_MSG + codersKey(groupId, artifactId, topic) + " for encoding");
}
String key = this.codersKey(groupId, artifactId, topic);
@@ -321,9 +285,7 @@ abstract class GenericEventProtocolCoder {
throw new IllegalArgumentException(UNSUPPORTED_EX_MSG + codersKey(groupId, artifactId, topic));
}
- if (event == null) {
- throw new IllegalArgumentException("Unsupported topic:" + topic);
- }
+ validateObjectParameter(event, "Event cannot be null or empty");
// reuse the decoder set, since there must be affinity in the model
String key = this.codersKey(groupId, artifactId, topic);
@@ -341,25 +303,18 @@ abstract class GenericEventProtocolCoder {
*/
public String encode(String topic, Object event) {
- if (event == null) {
- throw new IllegalArgumentException("Invalid encoded class");
- }
+ validateObjectParameter(event, "Event cannot be null or empty");
- if (topic == null || topic.isEmpty()) {
- throw new IllegalArgumentException("Invalid topic");
- }
+ validateStringParameter(topic, INVALID_TOPIC_MSG);
String reverseKey = this.reverseCodersKey(topic, event.getClass().getName());
if (!this.reverseCoders.containsKey(reverseKey)) {
throw new IllegalArgumentException("no reverse coder has been found");
}
- List<ProtocolCoderToolset> toolsets =
- this.reverseCoders.get(reverseKey);
+ List<ProtocolCoderToolset> toolsets = this.reverseCoders.get(reverseKey);
- String key =
- codersKey(
- toolsets.get(0).getGroupId(), toolsets.get(0).getArtifactId(), topic);
+ String key = codersKey(toolsets.get(0).getGroupId(), toolsets.get(0).getArtifactId(), topic);
return this.encodeInternal(key, event);
}
@@ -374,13 +329,9 @@ abstract class GenericEventProtocolCoder {
*/
public String encode(String topic, Object encodedClass, DroolsController droolsController) {
- if (encodedClass == null) {
- throw new IllegalArgumentException("Invalid encoded class");
- }
+ validateObjectParameter(encodedClass, "Invalid encoded class");
- if (topic == null || topic.isEmpty()) {
- throw new IllegalArgumentException("Invalid topic");
- }
+ validateStringParameter(topic, INVALID_TOPIC_MSG);
String key = codersKey(droolsController.getGroupId(), droolsController.getArtifactId(), topic);
return this.encodeInternal(key, encodedClass);
@@ -397,31 +348,19 @@ abstract class GenericEventProtocolCoder {
*/
protected String encodeInternal(String key, Object event) {
- logger.debug("{}: encode for {}: {}", this, key, event); // NOSONAR
-
- /*
- * It seems that sonar declares the previous logging line as a security vulnerability
- * when logging the topic variable. The static code analysis indicates that
- * the path starts in org.onap.policy.drools.server.restful.RestManager::decode(),
- * but the request is rejected if the topic contains invalid characters (the sonar description
- * mentions "/r/n/t" characters) all of which are validated against in the checkValidNameInput(topic).
- * Furthermore production instances are assumed not to have debug enabled, nor the REST telemetry API
- * should be published externally. An additional note is that Path URLs containing spaces and newlines
- * will be rejected earlier in the HTTP protocol libraries (jetty) so an URL of the form
- * "https://../to\npic" won't even make it here.
- */
+ logger.debug("{}: encode for {}: {}", this, key, event);
ProtocolCoderToolset coderTools = coders.get(key);
try {
String json = coderTools.encode(event);
- if (json != null && !json.isEmpty()) {
+ if (!StringUtils.isBlank(json)) {
return json;
}
} catch (Exception e) {
logger.warn("{}: cannot encode (first) for {}: {}", this, key, event, e);
}
- throw new UnsupportedOperationException("Cannot decode with gson");
+ throw new UnsupportedOperationException("Cannot encode with gson");
}
/**
@@ -443,50 +382,37 @@ abstract class GenericEventProtocolCoder {
return droolsControllers;
}
- List<ProtocolCoderToolset> toolsets =
- this.reverseCoders.get(reverseKey);
+ List<ProtocolCoderToolset> toolsets = this.reverseCoders.getOrDefault(reverseKey, Collections.emptyList());
// There must be multiple toolsets associated with <topic,classname> reverseKey
// case 2 different controllers use the same models and register the same encoder for
// the same topic. This is assumed not to occur often but for the purpose of encoding
- // but there should be no side-effects. Ownership is crosscheck against classname and
+ // but there should be no side effects. Ownership is crosscheck against classname and
// classloader reference.
- if (toolsets == null || toolsets.isEmpty()) {
- throw new IllegalStateException(
- "No Encoders toolsets available for topic "
- + topic
- + " encoder "
- + encodedClass.getClass().getName());
- }
-
for (ProtocolCoderToolset encoderSet : toolsets) {
addToolsetControllers(droolsControllers, encodedClass, encoderSet);
}
if (droolsControllers.isEmpty()) {
- throw new IllegalStateException(
- "No Encoders toolsets available for "
- + topic
- + ":"
- + encodedClass.getClass().getName());
+ throw new IllegalStateException("No Encoders toolsets available for " + topic + ":"
+ + encodedClass.getClass().getName());
}
return droolsControllers;
}
private void addToolsetControllers(List<DroolsController> droolsControllers, Object encodedClass,
- ProtocolCoderToolset encoderSet) {
+ ProtocolCoderToolset encoderSet) {
// figure out the right toolset
String groupId = encoderSet.getGroupId();
String artifactId = encoderSet.getArtifactId();
List<CoderFilters> coderFilters = encoderSet.getCoders();
for (CoderFilters coder : coderFilters) {
if (coder.getFactClass().equals(encodedClass.getClass().getName())) {
- var droolsController =
- DroolsControllerConstants.getFactory().get(groupId, artifactId, "");
+ var droolsController = DroolsControllerConstants.getFactory().get(groupId, artifactId, "");
if (droolsController.ownsCoder(
- encodedClass.getClass(), coder.getModelClassLoaderHash())) {
+ encodedClass.getClass(), coder.getModelClassLoaderHash())) {
droolsControllers.add(droolsController);
}
}
@@ -523,19 +449,13 @@ abstract class GenericEventProtocolCoder {
*/
public List<CoderFilters> getFilters(String groupId, String artifactId) {
- if (groupId == null || groupId.isEmpty()) {
- throw new IllegalArgumentException(INVALID_GROUP_ID_MSG);
- }
-
- if (artifactId == null || artifactId.isEmpty()) {
- throw new IllegalArgumentException(INVALID_ARTIFACT_ID_MSG);
- }
+ validateStringParameter(groupId, INVALID_GROUP_ID_MSG);
+ validateStringParameter(artifactId, INVALID_ARTIFACT_ID_MSG);
String key = this.codersKey(groupId, artifactId, "");
List<CoderFilters> codersFilters = new ArrayList<>();
- for (Map.Entry<String, ProtocolCoderToolset> entry :
- coders.entrySet()) {
+ for (Map.Entry<String, ProtocolCoderToolset> entry : coders.entrySet()) {
if (entry.getKey().startsWith(key)) {
codersFilters.addAll(entry.getValue().getCoders());
}
@@ -555,15 +475,13 @@ abstract class GenericEventProtocolCoder {
* @throws IllegalArgumentException if invalid input
*/
public CoderFilters getFilters(
- String groupId, String artifactId, String topic, String classname) {
+ String groupId, String artifactId, String topic, String classname) {
if (!isCodingSupported(groupId, artifactId, topic)) {
throw new IllegalArgumentException(UNSUPPORTED_EX_MSG + codersKey(groupId, artifactId, topic));
}
- if (classname == null || classname.isEmpty()) {
- throw new IllegalArgumentException("classname must be provided");
- }
+ validateStringParameter(classname, "classname must be provided");
String key = this.codersKey(groupId, artifactId, topic);
ProtocolCoderToolset coderTools = coders.get(key);
@@ -580,7 +498,7 @@ abstract class GenericEventProtocolCoder {
* @throws IllegalArgumentException if invalid input
*/
public ProtocolCoderToolset getCoders(
- String groupId, String artifactId, String topic) {
+ String groupId, String artifactId, String topic) {
if (!isCodingSupported(groupId, artifactId, topic)) {
throw new IllegalArgumentException(UNSUPPORTED_EX_MSG + codersKey(groupId, artifactId, topic));
@@ -598,22 +516,16 @@ abstract class GenericEventProtocolCoder {
* @return list of coders
* @throws IllegalArgumentException if invalid input
*/
- public List<ProtocolCoderToolset> getCoders(
- String groupId, String artifactId) {
+ public List<ProtocolCoderToolset> getCoders(String groupId, String artifactId) {
- if (groupId == null || groupId.isEmpty()) {
- throw new IllegalArgumentException(INVALID_GROUP_ID_MSG);
- }
+ validateStringParameter(groupId, INVALID_GROUP_ID_MSG);
- if (artifactId == null || artifactId.isEmpty()) {
- throw new IllegalArgumentException(INVALID_ARTIFACT_ID_MSG);
- }
+ validateStringParameter(artifactId, INVALID_ARTIFACT_ID_MSG);
String key = this.codersKey(groupId, artifactId, "");
List<ProtocolCoderToolset> coderToolset = new ArrayList<>();
- for (Map.Entry<String, ProtocolCoderToolset> entry :
- coders.entrySet()) {
+ for (Map.Entry<String, ProtocolCoderToolset> entry : coders.entrySet()) {
if (entry.getKey().startsWith(key)) {
coderToolset.add(entry.getValue());
}
@@ -631,19 +543,12 @@ abstract class GenericEventProtocolCoder {
*/
public List<CoderFilters> getReverseFilters(String topic, String codedClass) {
- if (topic == null || topic.isEmpty()) {
- throw new IllegalArgumentException(UNSUPPORTED_MSG);
- }
+ validateStringParameter(topic, INVALID_TOPIC_MSG);
- if (codedClass == null) {
- throw new IllegalArgumentException(MISSING_CLASS);
- }
+ validateStringParameter(codedClass, MISSING_CLASS);
String key = this.reverseCodersKey(topic, codedClass);
- List<ProtocolCoderToolset> toolsets = this.reverseCoders.get(key);
- if (toolsets == null) {
- throw new IllegalArgumentException("No Coder found for " + key);
- }
+ List<ProtocolCoderToolset> toolsets = this.reverseCoders.getOrDefault(key, Collections.emptyList());
List<CoderFilters> coderFilters = new ArrayList<>();
for (ProtocolCoderToolset toolset : toolsets) {
@@ -656,79 +561,70 @@ abstract class GenericEventProtocolCoder {
/**
* returns group and artifact id of the creator of the encoder.
*
- * @param topic topic
- * @param fact fact
+ * @param topic topic
+ * @param encodedClass class encoder
* @return the drools controller
*/
- DroolsController getDroolsController(String topic, Object fact) {
-
- if (topic == null || topic.isEmpty()) {
- throw new IllegalArgumentException(UNSUPPORTED_MSG);
- }
-
- if (fact == null) {
- throw new IllegalArgumentException(MISSING_CLASS);
- }
-
- List<DroolsController> droolsControllers = droolsCreators(topic, fact);
+ DroolsController getDroolsController(String topic, Object encodedClass) {
+ List<DroolsController> droolsControllers = getDroolsControllers(topic, encodedClass);
if (droolsControllers.isEmpty()) {
- throw new IllegalArgumentException("Invalid Topic: " + topic);
+ throw new IllegalArgumentException(UNSUPPORTED_MSG + " topic " + topic
+ + " and encodedClass " + encodedClass.getClass());
}
- if (droolsControllers.size() > 1) {
- logger.warn(
- "{}: multiple drools-controller {} for {}:{} ",
- this,
- droolsControllers,
- topic,
- fact.getClass().getName());
- // continue
- }
return droolsControllers.get(0);
}
/**
* returns group and artifact id of the creator of the encoder.
*
- * @param topic topic
- * @param fact fact
+ * @param topic topic
+ * @param encodedClass class encoder
* @return list of drools controllers
*/
- List<DroolsController> getDroolsControllers(String topic, Object fact) {
+ List<DroolsController> getDroolsControllers(String topic, Object encodedClass) {
- if (topic == null || topic.isEmpty()) {
- throw new IllegalArgumentException(UNSUPPORTED_MSG);
- }
+ validateStringParameter(topic, INVALID_TOPIC_MSG);
- if (fact == null) {
- throw new IllegalArgumentException(MISSING_CLASS);
- }
+ validateObjectParameter(encodedClass, MISSING_CLASS);
- List<DroolsController> droolsControllers = droolsCreators(topic, fact);
+ List<DroolsController> droolsControllers = droolsCreators(topic, encodedClass);
if (droolsControllers.size() > 1) {
// unexpected
- logger.warn(
- "{}: multiple drools-controller {} for {}:{} ",
- this,
- droolsControllers,
- topic,
- fact.getClass().getName());
+ logger.warn("{}: multiple drools-controller {} for {}:{} ",
+ this, droolsControllers, topic, encodedClass.getClass().getName());
// continue
}
return droolsControllers;
}
+ private void validateKeyParameters(String groupId, String artifactId, String topic) {
+ validateStringParameter(groupId, INVALID_GROUP_ID_MSG);
+ validateStringParameter(artifactId, INVALID_ARTIFACT_ID_MSG);
+ validateStringParameter(topic, INVALID_TOPIC_MSG);
+ }
+
+ private static void validateStringParameter(String value, String errorMessage) {
+ if (StringUtils.isBlank(value)) {
+ throw new IllegalArgumentException(errorMessage);
+ }
+ }
+
+ private static void validateObjectParameter(Object object, String errorMessage) {
+ if (Objects.isNull(object)) {
+ throw new IllegalArgumentException(errorMessage);
+ }
+ }
+
/*
- * Note: this only logs the KEYSETS, thus lombok ToString annotation is not used.
+ * Note: this only logs the KEY SETS, thus lombok ToString annotation is not used.
* Otherwise, it results in too much verbosity.
*/
@Override
public String toString() {
- return "GenericEventProtocolCoder [coders="
- + coders.keySet()
- + ", reverseCoders="
- + reverseCoders.keySet()
- + "]";
+ return "GenericEventProtocolCoder "
+ + "[coders=" + coders.keySet() + ", "
+ + "reverseCoders=" + reverseCoders.keySet() + "]";
}
}
diff --git a/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/GsonProtocolCoderToolset.java b/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/GsonProtocolCoderToolset.java
index 80844612..18fcb1a3 100644
--- a/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/GsonProtocolCoderToolset.java
+++ b/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/GsonProtocolCoderToolset.java
@@ -3,6 +3,7 @@
* ONAP
* ================================================================================
* Copyright (C) 2019-2022 AT&T Intellectual Property. All rights reserved.
+ * Modifications Copyright (C) 2024 Nordix Foundation.
* ================================================================================
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
@@ -62,7 +63,7 @@ class GsonProtocolCoderToolset extends ProtocolCoderToolset {
public static class GsonUtcAdapter implements JsonSerializer<ZonedDateTime>, JsonDeserializer<ZonedDateTime> {
@Override
public ZonedDateTime deserialize(JsonElement element, Type type,
- JsonDeserializationContext context) {
+ JsonDeserializationContext context) {
try {
return ZonedDateTime.parse(element.getAsString(), format);
} catch (final Exception e) {
@@ -73,7 +74,7 @@ class GsonProtocolCoderToolset extends ProtocolCoderToolset {
@Override
public JsonElement serialize(ZonedDateTime datetime, Type type,
- JsonSerializationContext context) {
+ JsonSerializationContext context) {
return new JsonPrimitive(datetime.format(format));
}
}
@@ -112,7 +113,7 @@ class GsonProtocolCoderToolset extends ProtocolCoderToolset {
* Toolset to encode/decode tools associated with a topic.
*
* @param eventProtocolParams parameter object for event encoder
- * @param controllerId controller id
+ * @param controllerId controller id
*/
public GsonProtocolCoderToolset(EventProtocolParams eventProtocolParams, String controllerId) {
super(eventProtocolParams, controllerId);
@@ -145,7 +146,7 @@ class GsonProtocolCoderToolset extends ProtocolCoderToolset {
public Object decode(String json) {
final var droolsController =
- DroolsControllerConstants.getFactory().get(this.groupId, this.artifactId, "");
+ DroolsControllerConstants.getFactory().get(this.groupId, this.artifactId, "");
if (droolsController == null) {
logger.warn("{}: no drools-controller to process {}", this, json);
throw new IllegalStateException("no drools-controller to process event");
@@ -163,35 +164,36 @@ class GsonProtocolCoderToolset extends ProtocolCoderToolset {
if (decoderClass == null) {
logger.warn(CANNOT_FETCH_CLASS, this, decoderFilter.getFactClass());
throw new IllegalStateException(
- FETCH_CLASS_EX_MSG + decoderFilter.getFactClass());
+ FETCH_CLASS_EX_MSG + decoderFilter.getFactClass());
}
} catch (final Exception e) {
logger.warn(CANNOT_FETCH_CLASS, this, decoderFilter.getFactClass());
throw new UnsupportedOperationException(
- FETCH_CLASS_EX_MSG + decoderFilter.getFactClass(), e);
+ FETCH_CLASS_EX_MSG + decoderFilter.getFactClass(), e);
}
if (this.customCoder != null) {
try {
final var gsonClassContainer =
- droolsController.fetchModelClass(this.customCoder.getClassContainer());
+ droolsController.fetchModelClass(this.customCoder.getClassContainer());
final var gsonField = gsonClassContainer.getField(this.customCoder.staticCoderField);
final var gsonObject = gsonField.get(null);
final var fromJsonMethod = gsonObject.getClass().getDeclaredMethod("fromJson",
- String.class, Class.class);
+ String.class, Class.class);
return fromJsonMethod.invoke(gsonObject, json, decoderClass);
} catch (final Exception e) {
logger.warn(CANNOT_FETCH_CLASS, this, decoderFilter.getFactClass());
- throw new UnsupportedOperationException(
- FETCH_CLASS_EX_MSG + decoderFilter.getFactClass(), e);
+ throw new UnsupportedOperationException("cannot decode with customCoder: "
+ + customCoder.getClassContainer()
+ + " using application class " + decoderFilter.getFactClass(), e);
}
} else {
try {
- return this.decoder.fromJson(json, decoderClass);
+ return this.getDecoder().fromJson(json, decoderClass);
} catch (final Exception e) {
logger.warn("{} cannot decode {} into {}", this, json, decoderClass.getName());
throw new UnsupportedOperationException(
- "cannot decode into " + decoderFilter.getFactClass(), e);
+ "cannot decode into " + decoderFilter.getFactClass(), e);
}
}
}
@@ -205,21 +207,20 @@ class GsonProtocolCoderToolset extends ProtocolCoderToolset {
if (this.customCoder != null) {
try {
final var droolsController =
- DroolsControllerConstants.getFactory().get(this.groupId, this.artifactId, null);
+ DroolsControllerConstants.getFactory().get(this.groupId, this.artifactId, null);
final Class<?> gsonClassContainer =
- droolsController.fetchModelClass(this.customCoder.getClassContainer());
+ droolsController.fetchModelClass(this.customCoder.getClassContainer());
final var gsonField = gsonClassContainer.getField(this.customCoder.staticCoderField);
final var gsonObject = gsonField.get(null);
- final var toJsonMethod =
- gsonObject.getClass().getDeclaredMethod("toJson", Object.class);
+ final var toJsonMethod = gsonObject.getClass().getDeclaredMethod("toJson", Object.class);
return (String) toJsonMethod.invoke(gsonObject, event);
} catch (final Exception e) {
logger.warn("{} cannot custom-encode {}", this, event);
- throw new UnsupportedOperationException("event cannot be encoded", e);
+ throw new UnsupportedOperationException("event cannot be custom encoded", e);
}
} else {
try {
- return this.encoder.toJson(event);
+ return this.getEncoder().toJson(event);
} catch (final Exception e) {
logger.warn("{} cannot encode {}", this, event);
throw new UnsupportedOperationException("event cannot be encoded", e);
diff --git a/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/MultiplexorEventProtocolCoder.java b/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/MultiplexorEventProtocolCoder.java
index 3fea6821..cfbf2e4f 100644
--- a/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/MultiplexorEventProtocolCoder.java
+++ b/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/MultiplexorEventProtocolCoder.java
@@ -3,6 +3,7 @@
* ONAP
* ================================================================================
* Copyright (C) 2019, 2021 AT&T Intellectual Property. All rights reserved.
+ * Modifications Copyright (C) 2024 Nordix Foundation.
* ================================================================================
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
@@ -20,7 +21,6 @@
package org.onap.policy.drools.protocol.coders;
-import java.util.ArrayList;
import java.util.List;
import lombok.ToString;
import org.onap.policy.drools.controller.DroolsController;
@@ -126,19 +126,7 @@ class MultiplexorEventProtocolCoder implements EventProtocolCoder {
*/
@Override
public Object decode(String groupId, String artifactId, String topic, String json) {
- logger.debug("{}: decode {}:{}:{}:{}", this, groupId, artifactId, topic, json); // NOSONAR
-
- /*
- * It seems that sonar declares the previous logging line as a security vulnerability
- * when logging the topic variable. The static code analysis indicates that
- * the path starts in org.onap.policy.drools.server.restful.RestManager::decode(),
- * but the request is rejected if the topic contains invalid characters (the sonar description
- * mentions "/r/n/t" characters) which are validated against in the checkValidNameInput(topic).
- * Furthermore production instances are assumed not to have debug enabled, nor the REST telemetry API
- * should be published externally. An additional note is that Path URLs containing spaces and newlines
- * will be failed earlier at the HTTP protocol libraries (jetty, etc ..) so an URL of the form
- * "https://../to\npic" won't even make it here.
- */
+ logger.debug("{}: decode {}:{}:{}:{}", this, groupId, artifactId, topic, json);
return this.decoders.decode(groupId, artifactId, topic, json);
}
@@ -156,13 +144,7 @@ class MultiplexorEventProtocolCoder implements EventProtocolCoder {
*/
@Override
public String encode(String topic, Object event) {
- logger.debug("{}: encode {}:{}", this, topic, event); // NOSONAR
-
- /*
- * See explanation for decode(String groupId, String artifactId, String topic, String json).
- * The same applies here as it is called from
- * org.onap.policy.drools.server.restful.RestManager::encode(),
- */
+ logger.debug("{}: encode {}:{}", this, topic, event);
return this.encoders.encode(topic, event);
}
@@ -187,8 +169,7 @@ class MultiplexorEventProtocolCoder implements EventProtocolCoder {
* {@inheritDoc}.
*/
@Override
- public CoderFilters getDecoderFilters(
- String groupId, String artifactId, String topic, String classname) {
+ public CoderFilters getDecoderFilters(String groupId, String artifactId, String topic, String classname) {
return this.decoders.getFilters(groupId, artifactId, topic, classname);
}
@@ -205,18 +186,11 @@ class MultiplexorEventProtocolCoder implements EventProtocolCoder {
*/
@Override
public ProtocolCoderToolset getDecoders(String groupId, String artifactId, String topic) {
- ProtocolCoderToolset decoderToolsets =
- this.decoders.getCoders(groupId, artifactId, topic);
- if (decoderToolsets == null) {
- throw new IllegalArgumentException(
- "Decoders not found for " + groupId + ":" + artifactId + ":" + topic);
- }
-
- return decoderToolsets;
+ return this.decoders.getCoders(groupId, artifactId, topic);
}
/**
- * get all deocders by maven coordinates and topic.
+ * get all decoders by maven coordinates and topic.
*
* @param groupId group id
* @param artifactId artifact id
@@ -225,14 +199,7 @@ class MultiplexorEventProtocolCoder implements EventProtocolCoder {
*/
@Override
public List<ProtocolCoderToolset> getDecoders(String groupId, String artifactId) {
-
- List<ProtocolCoderToolset> decoderToolsets =
- this.decoders.getCoders(groupId, artifactId);
- if (decoderToolsets == null) {
- throw new IllegalArgumentException("Decoders not found for " + groupId + ":" + artifactId);
- }
-
- return new ArrayList<>(decoderToolsets);
+ return this.decoders.getCoders(groupId, artifactId);
}
/**
diff --git a/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/ProtocolCoderToolset.java b/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/ProtocolCoderToolset.java
index 277c4ed3..5cd68709 100644
--- a/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/ProtocolCoderToolset.java
+++ b/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/ProtocolCoderToolset.java
@@ -4,6 +4,7 @@
* ================================================================================
* Copyright (C) 2017-2022 AT&T Intellectual Property. All rights reserved.
* Modifications Copyright (C) 2018 Samsung Electronics Co., Ltd.
+ * Modifications Copyright (C) 2024 Nordix Foundation.
* ================================================================================
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
@@ -26,6 +27,7 @@ import java.util.List;
import java.util.concurrent.CopyOnWriteArrayList;
import lombok.Getter;
import lombok.Setter;
+import org.apache.commons.lang3.StringUtils;
import org.onap.policy.drools.protocol.coders.EventProtocolCoder.CoderFilters;
import org.onap.policy.drools.protocol.coders.TopicCoderFilterConfiguration.CustomCoder;
import org.slf4j.Logger;
@@ -82,7 +84,7 @@ public abstract class ProtocolCoderToolset {
*/
protected ProtocolCoderToolset(EventProtocolParams eventProtocolParams, String controllerId) {
- if (eventProtocolParams == null || controllerId == null) {
+ if (eventProtocolParams == null || StringUtils.isBlank(controllerId)) {
throw new IllegalArgumentException("Invalid input");
}
@@ -104,7 +106,7 @@ public abstract class ProtocolCoderToolset {
* @return the decoder filters or null if not found
*/
public CoderFilters getCoder(String classname) {
- if (classname == null || classname.isEmpty()) {
+ if (StringUtils.isBlank(classname)) {
throw new IllegalArgumentException("no classname provided");
}
@@ -132,7 +134,7 @@ public abstract class ProtocolCoderToolset {
* @param filter filter
*/
public void addCoder(String eventClass, JsonProtocolFilter filter, int modelClassLoaderHash) {
- if (eventClass == null || eventClass.isEmpty()) {
+ if (StringUtils.isBlank(eventClass)) {
throw new IllegalArgumentException("no event class provided");
}
@@ -152,7 +154,7 @@ public abstract class ProtocolCoderToolset {
* @param eventClass event class
*/
public void removeCoders(String eventClass) {
- if (eventClass == null || eventClass.isEmpty()) {
+ if (StringUtils.isBlank(eventClass)) {
throw new IllegalArgumentException("no event class provided");
}
diff --git a/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/TopicCoderFilterConfiguration.java b/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/TopicCoderFilterConfiguration.java
index 4dd132b9..69bc0527 100644
--- a/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/TopicCoderFilterConfiguration.java
+++ b/policy-management/src/main/java/org/onap/policy/drools/protocol/coders/TopicCoderFilterConfiguration.java
@@ -3,6 +3,7 @@
* policy-management
* ================================================================================
* Copyright (C) 2017-2021 AT&T Intellectual Property. All rights reserved.
+ * Modifications Copyright (C) 2024 Nordix Foundation.
* ================================================================================
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
@@ -25,6 +26,7 @@ import lombok.AllArgsConstructor;
import lombok.Getter;
import lombok.Setter;
import lombok.ToString;
+import org.apache.commons.lang3.StringUtils;
@Getter
@ToString
@@ -51,19 +53,21 @@ public class TopicCoderFilterConfiguration {
* @param rawCustomCoder with format: &lt;class-containing-custom-coder&gt;,&lt;static-coder-field&gt.
*/
protected CustomCoder(String rawCustomCoder) {
- if (rawCustomCoder != null && !rawCustomCoder.isEmpty()) {
-
- this.classContainer = rawCustomCoder.substring(0, rawCustomCoder.indexOf(','));
- if (this.classContainer == null || this.classContainer.isEmpty()) {
- throw new IllegalArgumentException(
- "No classname to create CustomCoder cannot be created");
- }
-
- this.staticCoderField = rawCustomCoder.substring(rawCustomCoder.indexOf(',') + 1);
- if (this.staticCoderField == null || this.staticCoderField.isEmpty()) {
- throw new IllegalArgumentException(
- "No staticCoderField to create CustomCoder cannot be created for class " + classContainer);
- }
+ if (StringUtils.isBlank(rawCustomCoder)) {
+ throw new IllegalArgumentException("Constructor argument cannot be empty. "
+ + "Use format \"customCoderClass,staticCoderField\"");
+ }
+
+ this.classContainer = rawCustomCoder.substring(0, rawCustomCoder.indexOf(','));
+ if (StringUtils.isBlank(this.classContainer)) {
+ throw new IllegalArgumentException(
+ "No classname to create CustomCoder cannot be created");
+ }
+
+ this.staticCoderField = rawCustomCoder.substring(rawCustomCoder.indexOf(',') + 1);
+ if (StringUtils.isBlank(this.staticCoderField)) {
+ throw new IllegalArgumentException(
+ "No staticCoderField to create CustomCoder cannot be created for class " + classContainer);
}
}
@@ -74,11 +78,11 @@ public class TopicCoderFilterConfiguration {
* @param staticCoderField static coder field
*/
protected CustomCoder(String className, String staticCoderField) {
- if (className == null || className.isEmpty()) {
+ if (StringUtils.isBlank(className)) {
throw new IllegalArgumentException("No classname to create CustomCoder cannot be created");
}
- if (staticCoderField == null || staticCoderField.isEmpty()) {
+ if (StringUtils.isBlank(staticCoderField)) {
throw new IllegalArgumentException(
"No staticCoderField to create CustomCoder cannot be created for class " + className);
}
diff --git a/policy-management/src/test/java/org/onap/policy/drools/controller/IndexedDroolsControllerFactoryTest.java b/policy-management/src/test/java/org/onap/policy/drools/controller/IndexedDroolsControllerFactoryTest.java
new file mode 100644
index 00000000..39a03db3
--- /dev/null
+++ b/policy-management/src/test/java/org/onap/policy/drools/controller/IndexedDroolsControllerFactoryTest.java
@@ -0,0 +1,154 @@
+/*-
+ * ============LICENSE_START===============================================
+ * ONAP
+ * ========================================================================
+ * Copyright (C) 2024 Nordix Foundation.
+ * ========================================================================
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ * ============LICENSE_END=================================================
+ */
+
+package org.onap.policy.drools.controller;
+
+import static org.assertj.core.api.Assertions.assertThatThrownBy;
+import static org.junit.jupiter.api.Assertions.assertDoesNotThrow;
+import static org.junit.jupiter.api.Assertions.assertEquals;
+import static org.junit.jupiter.api.Assertions.assertFalse;
+import static org.junit.jupiter.api.Assertions.assertNotNull;
+import static org.junit.jupiter.api.Assertions.assertTrue;
+import static org.mockito.Mockito.doCallRealMethod;
+import static org.mockito.Mockito.doNothing;
+import static org.mockito.Mockito.mock;
+import static org.mockito.Mockito.when;
+
+import java.util.HashMap;
+import java.util.List;
+import java.util.Map;
+import java.util.Properties;
+import org.junit.jupiter.api.BeforeEach;
+import org.junit.jupiter.api.Test;
+import org.onap.policy.drools.protocol.coders.TopicCoderFilterConfiguration;
+import org.springframework.test.util.ReflectionTestUtils;
+
+class IndexedDroolsControllerFactoryTest {
+
+ IndexedDroolsControllerFactory factory;
+ static final String GROUP_ID = "groupId";
+ static final String ARTIFACT_ID = "artifactId";
+ static final String VERSION = "version";
+ static final String OTHER_VERSION = "otherVersion";
+
+ @BeforeEach
+ void setUp() {
+ this.factory = new IndexedDroolsControllerFactory();
+ }
+
+ @Test
+ void build_EmptyArguments() {
+ var props = new Properties();
+ List<TopicCoderFilterConfiguration> decoderConfigs = List.of();
+ List<TopicCoderFilterConfiguration> encoderConfigs = List.of();
+
+ assertThatThrownBy(() -> factory.build(props, "", ARTIFACT_ID, VERSION, decoderConfigs, encoderConfigs))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Missing maven group-id coordinate");
+
+ assertThatThrownBy(() -> factory.build(props, GROUP_ID, "", VERSION, decoderConfigs, encoderConfigs))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Missing maven artifact-id coordinate");
+
+ assertThatThrownBy(() -> factory.build(props, GROUP_ID, ARTIFACT_ID, "", decoderConfigs, encoderConfigs))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Missing maven version coordinate");
+ }
+
+ @Test
+ void testBuild_CheckControllerCopy() {
+ var props = new Properties();
+ List<TopicCoderFilterConfiguration> decoderConfigs = List.of();
+ List<TopicCoderFilterConfiguration> encoderConfigs = List.of();
+
+ var mockFactory = mock(IndexedDroolsControllerFactory.class);
+ when(mockFactory.build(props, GROUP_ID, ARTIFACT_ID, VERSION, decoderConfigs, encoderConfigs))
+ .thenCallRealMethod();
+
+ var controller = mock(DroolsController.class);
+ doNothing().when(controller).updateToVersion(GROUP_ID, ARTIFACT_ID, VERSION, decoderConfigs, encoderConfigs);
+ when(controller.getVersion()).thenReturn(OTHER_VERSION);
+ Map<String, DroolsController> controllers = new HashMap<>();
+ controllers.put(GROUP_ID + ":" + ARTIFACT_ID, controller);
+ ReflectionTestUtils.setField(mockFactory, "droolsControllers", controllers);
+
+ assertNotNull(mockFactory.build(props, GROUP_ID, ARTIFACT_ID, VERSION, decoderConfigs, encoderConfigs));
+ }
+
+ @Test
+ void unmanage() {
+ assertThatThrownBy(() -> factory.unmanage(null))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("No controller provided");
+
+ var mockController = mock(DroolsController.class);
+ when(mockController.isBrained()).thenReturn(false)
+ .thenReturn(true).thenReturn(true);
+ when(mockController.getGroupId()).thenReturn(GROUP_ID);
+ when(mockController.getArtifactId()).thenReturn(ARTIFACT_ID);
+
+ var mockFactory = mock(IndexedDroolsControllerFactory.class);
+ doCallRealMethod().when(mockFactory).unmanage(mockController);
+ when(mockFactory.toString()).thenCallRealMethod();
+
+ Map<String, DroolsController> controllers = new HashMap<>();
+ controllers.put(GROUP_ID + ":" + ARTIFACT_ID, mockController);
+ ReflectionTestUtils.setField(mockFactory, "droolsControllers", controllers);
+
+ // should return after isBrained returns false
+ assertDoesNotThrow(() -> mockFactory.unmanage(mockController));
+ assertFalse(mockFactory.droolsControllers.isEmpty());
+ assertEquals("IndexedDroolsControllerFactory [#droolsControllers=1]", mockFactory.toString());
+
+ // should go ahead and remove controller from hash map
+ assertDoesNotThrow(() -> mockFactory.unmanage(mockController));
+ assertTrue(mockFactory.droolsControllers.isEmpty());
+ assertEquals("IndexedDroolsControllerFactory [#droolsControllers=0]", mockFactory.toString());
+
+ controllers.put("anotherKey", mockController);
+ ReflectionTestUtils.setField(mockFactory, "droolsControllers", controllers);
+
+ // should return after comparing the key in the hash map (does not match)
+ assertDoesNotThrow(() -> mockFactory.unmanage(mockController));
+ assertFalse(mockFactory.droolsControllers.isEmpty());
+ assertEquals("IndexedDroolsControllerFactory [#droolsControllers=1]", mockFactory.toString());
+ }
+
+ @Test
+ void shutdown() {
+ var mockController = mock(DroolsController.class);
+ doNothing().when(mockController).shutdown();
+
+ var mockFactory = mock(IndexedDroolsControllerFactory.class);
+ doNothing().when(mockFactory).unmanage(mockController);
+
+ assertDoesNotThrow(() -> mockFactory.shutdown(mockController));
+ }
+
+ @Test
+ void get_EmptyParameters() {
+ assertThatThrownBy(() -> factory.get("", ARTIFACT_ID, VERSION))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Missing maven coordinates");
+ assertThatThrownBy(() -> factory.get(GROUP_ID, "", VERSION))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Missing maven coordinates");
+ }
+} \ No newline at end of file
diff --git a/policy-management/src/test/java/org/onap/policy/drools/controller/internal/MavenDroolsControllerUpgradesTest.java b/policy-management/src/test/java/org/onap/policy/drools/controller/internal/MavenDroolsControllerUpgradesTest.java
index 38b38a8c..753296a8 100644
--- a/policy-management/src/test/java/org/onap/policy/drools/controller/internal/MavenDroolsControllerUpgradesTest.java
+++ b/policy-management/src/test/java/org/onap/policy/drools/controller/internal/MavenDroolsControllerUpgradesTest.java
@@ -88,7 +88,7 @@ public class MavenDroolsControllerUpgradesTest {
KieUtils.installArtifact(
Paths.get(DROOLS_RESOURCES_DIR + RULES_BASE + KMODULE_EXT).toFile(),
Paths.get(DROOLS_RESOURCES_DIR + name + POM_EXT).toFile(),
- DROOLS_KJAR_RESOURCES_DIR + KBNAME_RULES + "/" + KBPACKAGE_RULES + "/",
+ DROOLS_KJAR_RESOURCES_DIR + KBNAME_RULES + "/" + KBPACKAGE_RULES + "/",
drls);
}
@@ -105,8 +105,8 @@ public class MavenDroolsControllerUpgradesTest {
rulesDescriptor2 =
install("rules2",
Stream.of(path.toFile(),
- Paths.get(DROOLS_RESOURCES_DIR + "rules2" + DRL_EXT).toFile())
- .collect(Collectors.toList()));
+ Paths.get(DROOLS_RESOURCES_DIR + "rules2" + DRL_EXT).toFile())
+ .collect(Collectors.toList()));
LoggerUtils.setLevel("ROOT", "WARN");
LoggerUtils.setLevel("org.onap.policy.drools.controller.internal", "INFO");
@@ -169,13 +169,13 @@ public class MavenDroolsControllerUpgradesTest {
private void summary() {
logger.info("~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~");
- logger.info("Controller: " + controller.getGroupId() + ":" + controller.getArtifactId()
- + ":" + controller.getVersion());
+ logger.info("Controller: {}:{}:{}", controller.getGroupId(), controller.getArtifactId(),
+ controller.getVersion());
logger.info(".....................................................................");
- logger.info("KIE-BASES: " + KieUtils.getBases(controller.getContainer().getKieContainer()));
- logger.info("KIE-PACKAGE-NAMES: " + KieUtils.getPackageNames(controller.getContainer().getKieContainer()));
- logger.info("KIE-RULE-NAMES: " + KieUtils.getRuleNames(controller.getContainer().getKieContainer()));
- logger.info("FACTS: " + controller.facts(KBSESSION_RULES, Object.class));
+ logger.info("KIE-BASES: {}", KieUtils.getBases(controller.getContainer().getKieContainer()));
+ logger.info("KIE-PACKAGE-NAMES: {}", KieUtils.getPackageNames(controller.getContainer().getKieContainer()));
+ logger.info("KIE-RULE-NAMES: {}", KieUtils.getRuleNames(controller.getContainer().getKieContainer()));
+ logger.info("FACTS: {}", controller.facts(KBSESSION_RULES, Object.class));
logger.info("~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~");
}
@@ -190,25 +190,25 @@ public class MavenDroolsControllerUpgradesTest {
controller.getContainer()
.getPolicySession(KBSESSION_RULES)
.getKieSession()
- .addEventListener(new RuleRuntimeEventListener() {
- @Override
- public void objectInserted(ObjectInsertedEvent objectInsertedEvent) {
- logger.info("RULE {}: inserting {}",
- objectInsertedEvent.getRule().getName(), objectInsertedEvent.getObject());
- }
-
- @Override
- public void objectUpdated(ObjectUpdatedEvent objectUpdatedEvent) {
- logger.info("RULE {}: updating {}",
- objectUpdatedEvent.getRule().getName(), objectUpdatedEvent.getObject());
- }
-
- @Override
- public void objectDeleted(ObjectDeletedEvent objectDeletedEvent) {
- logger.info("RULE {}: deleting {}",
- objectDeletedEvent.getRule().getName(), objectDeletedEvent.getOldObject());
- }
- });
+ .addEventListener(new RuleRuntimeEventListener() {
+ @Override
+ public void objectInserted(ObjectInsertedEvent objectInsertedEvent) {
+ logger.info("RULE {}: inserting {}",
+ objectInsertedEvent.getRule().getName(), objectInsertedEvent.getObject());
+ }
+
+ @Override
+ public void objectUpdated(ObjectUpdatedEvent objectUpdatedEvent) {
+ logger.info("RULE {}: updating {}",
+ objectUpdatedEvent.getRule().getName(), objectUpdatedEvent.getObject());
+ }
+
+ @Override
+ public void objectDeleted(ObjectDeletedEvent objectDeletedEvent) {
+ logger.info("RULE {}: deleting {}",
+ objectDeletedEvent.getRule().getName(), objectDeletedEvent.getOldObject());
+ }
+ });
controller.getContainer()
.getPolicySession(KBSESSION_RULES)
diff --git a/policy-management/src/test/java/org/onap/policy/drools/features/DroolsControllerFeatureApiTest.java b/policy-management/src/test/java/org/onap/policy/drools/features/DroolsControllerFeatureApiTest.java
new file mode 100644
index 00000000..83171dae
--- /dev/null
+++ b/policy-management/src/test/java/org/onap/policy/drools/features/DroolsControllerFeatureApiTest.java
@@ -0,0 +1,83 @@
+/*-
+ * ============LICENSE_START===============================================
+ * ONAP
+ * ========================================================================
+ * Copyright (C) 2024 Nordix Foundation.
+ * ========================================================================
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ * ============LICENSE_END=================================================
+ */
+
+package org.onap.policy.drools.features;
+
+
+import static org.junit.jupiter.api.Assertions.assertFalse;
+import static org.junit.jupiter.api.Assertions.assertNull;
+
+import java.util.Collections;
+import java.util.Properties;
+import org.junit.jupiter.api.Test;
+import org.onap.policy.common.endpoints.event.comm.TopicSink;
+import org.onap.policy.drools.controller.DroolsController;
+
+/**
+ * DroolsControllerFeatureApi is implemented in other modules, therefore, coverage is not coming up in this module.
+ * This class has no intention of unit testing features, sole goal is raise coverage.
+ */
+class DroolsControllerFeatureApiTest {
+
+ DroolsControllerFeatureApi testClass = new TestDroolsControllerFeatureApi();
+ Properties props = new Properties();
+ DroolsController controller;
+ TopicSink sink;
+ Object fact;
+
+ @Test
+ void beforeInstance() {
+ assertNull(testClass.beforeInstance(props, "group", "artifact", "version",
+ Collections.emptyList(), Collections.emptyList()));
+ }
+
+ @Test
+ void afterInstance() {
+ assertFalse(testClass.afterInstance(controller, props));
+ }
+
+ @Test
+ void beforeInsert() {
+ assertFalse(testClass.beforeInsert(controller, props));
+ }
+
+ @Test
+ void afterInsert() {
+ assertFalse(testClass.afterInsert(controller, fact, false));
+ }
+
+ @Test
+ void beforeDeliver() {
+ assertFalse(testClass.beforeDeliver(controller, sink, fact));
+ }
+
+ @Test
+ void afterDeliver() {
+ assertFalse(testClass.afterDeliver(controller, sink, fact, "json", false));
+ }
+
+ static class TestDroolsControllerFeatureApi implements DroolsControllerFeatureApi {
+
+ @Override
+ public int getSequenceNumber() {
+ return 30;
+ }
+ }
+} \ No newline at end of file
diff --git a/policy-management/src/test/java/org/onap/policy/drools/features/PolicyControllerFeatureApiTest.java b/policy-management/src/test/java/org/onap/policy/drools/features/PolicyControllerFeatureApiTest.java
new file mode 100644
index 00000000..f48bf937
--- /dev/null
+++ b/policy-management/src/test/java/org/onap/policy/drools/features/PolicyControllerFeatureApiTest.java
@@ -0,0 +1,171 @@
+/*-
+ * ============LICENSE_START===============================================
+ * ONAP
+ * ========================================================================
+ * Copyright (C) 2024 Nordix Foundation.
+ * ========================================================================
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ * ============LICENSE_END=================================================
+ */
+
+package org.onap.policy.drools.features;
+
+import static org.junit.jupiter.api.Assertions.assertFalse;
+import static org.junit.jupiter.api.Assertions.assertNull;
+import static org.onap.policy.common.endpoints.event.comm.Topic.CommInfrastructure.NOOP;
+
+import java.util.Properties;
+import org.junit.jupiter.api.Test;
+import org.onap.policy.drools.protocol.configuration.DroolsConfiguration;
+import org.onap.policy.drools.system.PolicyController;
+
+/**
+ * PolicyControllerFeatureApi is implemented in other modules, therefore, coverage is not coming up in this module.
+ * This class has no intention of unit testing features, sole goal is raise coverage.
+ */
+class PolicyControllerFeatureApiTest {
+
+ PolicyControllerFeatureApi testClass = new TestPolicyControllerFeatureApi();
+ Properties props = new Properties();
+ PolicyController controller;
+ DroolsConfiguration configuration;
+
+
+ @Test
+ void beforeCreate() {
+ assertNull(testClass.beforeCreate("name", props));
+ }
+
+ @Test
+ void afterCreate() {
+ assertFalse(testClass.afterCreate(controller));
+ }
+
+ @Test
+ void beforeInstance() {
+ assertNull(testClass.beforeInstance("name", props));
+ }
+
+ @Test
+ void afterInstance() {
+ assertFalse(testClass.afterInstance(controller, props));
+ }
+
+ @Test
+ void beforeStart() {
+ assertFalse(testClass.beforeStart(controller));
+ }
+
+ @Test
+ void afterStart() {
+ assertFalse(testClass.afterStart(controller));
+ }
+
+ @Test
+ void beforeStop() {
+ assertFalse(testClass.beforeStop(controller));
+ }
+
+ @Test
+ void afterStop() {
+ assertFalse(testClass.afterStop(controller));
+ }
+
+ @Test
+ void beforePatch() {
+ assertFalse(testClass.beforePatch(controller, configuration, configuration));
+ }
+
+ @Test
+ void afterPatch() {
+ assertFalse(testClass.afterPatch(controller, configuration, configuration, true));
+ }
+
+ @Test
+ void beforeLock() {
+ assertFalse(testClass.beforeLock(controller));
+ }
+
+ @Test
+ void afterLock() {
+ assertFalse(testClass.afterLock(controller));
+ }
+
+ @Test
+ void beforeUnlock() {
+ assertFalse(testClass.beforeUnlock(controller));
+ }
+
+ @Test
+ void afterUnlock() {
+ assertFalse(testClass.afterUnlock(controller));
+ }
+
+ @Test
+ void beforeShutdown() {
+ assertFalse(testClass.beforeShutdown(controller));
+ }
+
+ @Test
+ void afterShutdown() {
+ assertFalse(testClass.afterShutdown(controller));
+ }
+
+ @Test
+ void beforeHalt() {
+ assertFalse(testClass.beforeHalt(controller));
+ }
+
+ @Test
+ void afterHalt() {
+ assertFalse(testClass.afterHalt(controller));
+ }
+
+ @Test
+ void beforeOffer() {
+ assertFalse(testClass.beforeOffer(controller, new Object()));
+ }
+
+ @Test
+ void testBeforeOffer() {
+ assertFalse(testClass.beforeOffer(controller, NOOP, "topic", "event"));
+ }
+
+ @Test
+ void afterOffer() {
+ assertFalse(testClass.afterOffer(controller, new Object(), true));
+ }
+
+ @Test
+ void testAfterOffer() {
+ assertFalse(testClass.afterOffer(controller, NOOP, "topic", "event", true));
+ }
+
+ @Test
+ void beforeDeliver() {
+ assertFalse(testClass.beforeDeliver(controller, NOOP, "topic", "event"));
+ }
+
+ @Test
+ void afterDeliver() {
+ assertFalse(testClass.afterDeliver(controller, NOOP, "topic", "event", true));
+ }
+
+ static class TestPolicyControllerFeatureApi implements PolicyControllerFeatureApi {
+
+ @Override
+ public int getSequenceNumber() {
+ return 20;
+ }
+ }
+} \ No newline at end of file
diff --git a/policy-management/src/test/java/org/onap/policy/drools/features/PolicyEngineFeatureApiTest.java b/policy-management/src/test/java/org/onap/policy/drools/features/PolicyEngineFeatureApiTest.java
new file mode 100644
index 00000000..90feeb20
--- /dev/null
+++ b/policy-management/src/test/java/org/onap/policy/drools/features/PolicyEngineFeatureApiTest.java
@@ -0,0 +1,174 @@
+/*-
+ * ============LICENSE_START===============================================
+ * ONAP
+ * ========================================================================
+ * Copyright (C) 2024 Nordix Foundation.
+ * ========================================================================
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ * ============LICENSE_END=================================================
+ */
+
+package org.onap.policy.drools.features;
+
+import static org.junit.jupiter.api.Assertions.assertFalse;
+import static org.junit.jupiter.api.Assertions.assertNull;
+import static org.mockito.Mockito.mock;
+
+import java.util.Properties;
+import org.junit.jupiter.api.Test;
+import org.onap.policy.common.endpoints.event.comm.Topic;
+import org.onap.policy.drools.core.lock.PolicyResourceLockManager;
+import org.onap.policy.drools.protocol.configuration.PdpdConfiguration;
+import org.onap.policy.drools.system.PolicyEngine;
+
+/**
+ * PolicyEngineFeatureApi is implemented in other modules, therefore, coverage is not coming up in this module.
+ * This class has no intention of unit testing features, sole goal is raise coverage.
+ */
+class PolicyEngineFeatureApiTest {
+
+ PolicyEngineFeatureApi testClass = new TestPolicyEngineFeatureApi();
+
+ PolicyEngine policyEngine = mock(PolicyEngine.class);
+ Properties props = new Properties();
+
+ @Test
+ void beforeBoot() {
+ assertFalse(testClass.beforeBoot(policyEngine, new String[] {"a", "b"}));
+ }
+
+ @Test
+ void afterBoot() {
+ assertFalse(testClass.afterBoot(policyEngine));
+ }
+
+ @Test
+ void beforeConfigure() {
+ assertFalse(testClass.beforeConfigure(policyEngine, props));
+ }
+
+ @Test
+ void afterConfigure() {
+ assertFalse(testClass.afterConfigure(policyEngine));
+ }
+
+ @Test
+ void beforeActivate() {
+ assertFalse(testClass.beforeActivate(policyEngine));
+ }
+
+ @Test
+ void afterActivate() {
+ assertFalse(testClass.afterActivate(policyEngine));
+ }
+
+ @Test
+ void beforeDeactivate() {
+ assertFalse(testClass.beforeDeactivate(policyEngine));
+ }
+
+ @Test
+ void afterDeactivate() {
+ assertFalse(testClass.afterDeactivate(policyEngine));
+ }
+
+ @Test
+ void beforeStart() {
+ assertFalse(testClass.beforeStart(policyEngine));
+ }
+
+ @Test
+ void afterStart() {
+ assertFalse(testClass.afterStart(policyEngine));
+ }
+
+ @Test
+ void beforeStop() {
+ assertFalse(testClass.beforeStop(policyEngine));
+ }
+
+ @Test
+ void afterStop() {
+ assertFalse(testClass.afterStop(policyEngine));
+ }
+
+ @Test
+ void beforeLock() {
+ assertFalse(testClass.beforeLock(policyEngine));
+ }
+
+ @Test
+ void afterLock() {
+ assertFalse(testClass.afterLock(policyEngine));
+ }
+
+ @Test
+ void beforeUnlock() {
+ assertFalse(testClass.beforeUnlock(policyEngine));
+ }
+
+ @Test
+ void afterUnlock() {
+ assertFalse(testClass.afterUnlock(policyEngine));
+ }
+
+ @Test
+ void beforeShutdown() {
+ assertFalse(testClass.beforeShutdown(policyEngine));
+ }
+
+ @Test
+ void afterShutdown() {
+ assertFalse(testClass.afterShutdown(policyEngine));
+ }
+
+ @Test
+ void beforeOnTopicEvent() {
+ assertFalse(testClass.beforeOnTopicEvent(policyEngine, Topic.CommInfrastructure.NOOP, "topic", "event"));
+ }
+
+ @Test
+ void afterOnTopicEvent() {
+ assertFalse(testClass.afterOnTopicEvent(policyEngine, mock(PdpdConfiguration.class),
+ Topic.CommInfrastructure.NOOP, "topic", "event"));
+ }
+
+ @Test
+ void beforeOpen() {
+ assertFalse(testClass.beforeOpen(policyEngine));
+ }
+
+ @Test
+ void afterOpen() {
+ assertFalse(testClass.afterOpen(policyEngine));
+ }
+
+ @Test
+ void beforeCreateLockManager() {
+ assertNull(testClass.beforeCreateLockManager());
+ }
+
+ @Test
+ void afterCreateLockManager() {
+ assertFalse(testClass.afterCreateLockManager(policyEngine, props, mock(PolicyResourceLockManager.class)));
+ }
+
+ static class TestPolicyEngineFeatureApi implements PolicyEngineFeatureApi {
+
+ @Override
+ public int getSequenceNumber() {
+ return 10;
+ }
+
+ }
+} \ No newline at end of file
diff --git a/policy-management/src/test/java/org/onap/policy/drools/persistence/FileSystemPersistenceTest.java b/policy-management/src/test/java/org/onap/policy/drools/persistence/FileSystemPersistenceTest.java
new file mode 100644
index 00000000..80a8dc6b
--- /dev/null
+++ b/policy-management/src/test/java/org/onap/policy/drools/persistence/FileSystemPersistenceTest.java
@@ -0,0 +1,78 @@
+/*-
+ * ============LICENSE_START===============================================
+ * ONAP
+ * ========================================================================
+ * Copyright (C) 2024 Nordix Foundation.
+ * ========================================================================
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ * ============LICENSE_END=================================================
+ */
+
+package org.onap.policy.drools.persistence;
+
+import static org.assertj.core.api.Assertions.assertThatThrownBy;
+import static org.junit.jupiter.api.Assertions.assertThrows;
+
+import java.nio.file.Path;
+import org.junit.jupiter.api.Test;
+
+class FileSystemPersistenceTest {
+
+ FileSystemPersistence persistence = new FileSystemPersistence();
+
+ @Test
+ void testSetConfiguration_FileIsNotDirectory() {
+ persistence.configurationPath = Path.of("src/test/resources/echo.drl");
+ assertThrows(IllegalStateException.class, () -> persistence.setConfigurationDir());
+ assertThatThrownBy(() -> persistence.setConfigurationDir())
+ .hasMessageContaining("config directory: src/test/resources/echo.drl is not a directory");
+ }
+
+ @Test
+ void testSetConfiguration_InvalidDir() {
+ persistence.configurationPath = Path.of("/opt/path"); // opt path needs sudo
+ assertThrows(IllegalStateException.class, () -> persistence.setConfigurationDir());
+ assertThatThrownBy(() -> persistence.setConfigurationDir())
+ .hasMessageContaining("cannot create /opt/path");
+ }
+
+ @Test
+ void testGetProperties_Exception() {
+ assertThatThrownBy(() -> persistence.getProperties(""))
+ .hasMessageContaining("properties name must be provided");
+
+ String propName = null;
+ assertThatThrownBy(() -> persistence.getProperties(propName)) // for code coverage
+ .hasMessageContaining("properties name must be provided");
+ }
+
+ @Test
+ void testGetEnvironmentProperties_Exception() {
+ assertThatThrownBy(() -> persistence.getEnvironmentProperties(""))
+ .hasMessageContaining("environment name must be provided");
+
+ String propName = null;
+ assertThatThrownBy(() -> persistence.getEnvironmentProperties(propName)) // for code coverage
+ .hasMessageContaining("environment name must be provided");
+ }
+
+ @Test
+ void testGetProperties_ByPathException() {
+ assertThatThrownBy(() -> persistence.getProperties(Path.of("/path/does/not/exist.properties")))
+ .hasMessageContaining("properties for /path/does/not/exist.properties are not persisted.");
+
+ Path pathProps = null;
+ assertThatThrownBy(() -> persistence.getProperties(pathProps)) // for code coverage
+ .hasMessageContaining("propertiesPath is marked non-null but is null");
+ }
+}
diff --git a/policy-management/src/test/java/org/onap/policy/drools/protocol/coders/EventProtocolCoderTest.java b/policy-management/src/test/java/org/onap/policy/drools/protocol/coders/EventProtocolCoderTest.java
index 6d461eef..c98467ea 100644
--- a/policy-management/src/test/java/org/onap/policy/drools/protocol/coders/EventProtocolCoderTest.java
+++ b/policy-management/src/test/java/org/onap/policy/drools/protocol/coders/EventProtocolCoderTest.java
@@ -22,6 +22,7 @@
package org.onap.policy.drools.protocol.coders;
+import static org.junit.jupiter.api.Assertions.assertDoesNotThrow;
import static org.junit.jupiter.api.Assertions.assertTrue;
import java.util.Properties;
@@ -88,4 +89,30 @@ class EventProtocolCoderTest {
EventProtocolCoderConstants.getManager().removeEncoders(ENCODER_GROUP, ENCODER_ARTIFACT, NOOP_TOPIC);
}
+
+ @Test
+ void test_extra() {
+ final Properties noopSinkProperties = new Properties();
+ noopSinkProperties.put(PolicyEndPointProperties.PROPERTY_NOOP_SINK_TOPICS, NOOP_TOPIC);
+
+ TopicEndpointManager.getManager().addTopicSinks(noopSinkProperties);
+
+ var encoder = EventProtocolParams.builder().groupId(ENCODER_GROUP).artifactId(ENCODER_ARTIFACT)
+ .topic(NOOP_TOPIC).eventClass(DroolsConfiguration.class.getName())
+ .protocolFilter(new JsonProtocolFilter()).customGsonCoder(null)
+ .modelClassLoaderHash(DroolsConfiguration.class.getName().hashCode()).build();
+
+ EventProtocolCoderConstants.getManager().addEncoder(encoder);
+
+ final String json = EventProtocolCoderConstants.getManager().encode(NOOP_TOPIC,
+ new DroolsConfiguration(ENCODER_ARTIFACT, ENCODER_GROUP, ENCODER_VERSION));
+
+ assertTrue(json.contains(ENCODER_GROUP));
+ assertTrue(json.contains(ENCODER_ARTIFACT));
+
+ // check if adding same encoder doesn't throw any exceptions as expected
+ assertDoesNotThrow(() -> EventProtocolCoderConstants.getManager().addEncoder(encoder));
+ EventProtocolCoderConstants.getManager().removeEncoders(ENCODER_GROUP, ENCODER_ARTIFACT, NOOP_TOPIC);
+ EventProtocolCoderConstants.getManager().removeEncoders("NotExistentGroup", ENCODER_ARTIFACT, NOOP_TOPIC);
+ }
}
diff --git a/policy-management/src/test/java/org/onap/policy/drools/protocol/coders/GenericProtocolCoderTest.java b/policy-management/src/test/java/org/onap/policy/drools/protocol/coders/GenericProtocolCoderTest.java
new file mode 100644
index 00000000..7a8be59e
--- /dev/null
+++ b/policy-management/src/test/java/org/onap/policy/drools/protocol/coders/GenericProtocolCoderTest.java
@@ -0,0 +1,651 @@
+/*-
+ * ============LICENSE_START===============================================
+ * ONAP
+ * ========================================================================
+ * Copyright (C) 2024 Nordix Foundation.
+ * ========================================================================
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ * ============LICENSE_END=================================================
+ */
+
+package org.onap.policy.drools.protocol.coders;
+
+import static org.assertj.core.api.Assertions.assertThatThrownBy;
+import static org.junit.jupiter.api.Assertions.assertDoesNotThrow;
+import static org.junit.jupiter.api.Assertions.assertEquals;
+import static org.junit.jupiter.api.Assertions.assertFalse;
+import static org.junit.jupiter.api.Assertions.assertNotNull;
+import static org.junit.jupiter.api.Assertions.assertNull;
+import static org.junit.jupiter.api.Assertions.assertTrue;
+import static org.mockito.ArgumentMatchers.anyString;
+import static org.mockito.Mockito.doCallRealMethod;
+import static org.mockito.Mockito.mock;
+import static org.mockito.Mockito.when;
+
+import java.util.ArrayList;
+import java.util.HashMap;
+import java.util.List;
+import org.junit.jupiter.api.Test;
+import org.mockito.MockedStatic;
+import org.mockito.Mockito;
+import org.onap.policy.drools.controller.DroolsController;
+import org.onap.policy.drools.controller.DroolsControllerConstants;
+import org.onap.policy.drools.controller.DroolsControllerFactory;
+import org.onap.policy.drools.controller.internal.NullDroolsController;
+import org.springframework.test.util.ReflectionTestUtils;
+
+class GenericProtocolCoderTest {
+
+ EventProtocolEncoder encoder = new EventProtocolEncoder();
+ EventProtocolDecoder decoder = new EventProtocolDecoder();
+
+ private static final String GROUP_ID = "groupId";
+ private static final String ARTIFACT_ID = "artifactId";
+ private static final String TOPIC = "topic";
+ private static final String VALID_KEY = GROUP_ID + ":" + ARTIFACT_ID + ":" + TOPIC;
+ private static final String INVALID_KEY = "anotherKey";
+
+ @Test
+ void testAdd_ReverseCoder() {
+ var params = new EventProtocolParams(GROUP_ID, ARTIFACT_ID, TOPIC, "java.lang.Object",
+ mock(JsonProtocolFilter.class), mock(TopicCoderFilterConfiguration.CustomGsonCoder.class), 1);
+
+ var myKey = "group:artifact:topic";
+
+ var mockEncoder = mock(EventProtocolEncoder.class);
+ // set the key to be returned when checking the hash maps
+ when(mockEncoder.codersKey(GROUP_ID, ARTIFACT_ID, TOPIC)).thenReturn(myKey);
+ when(mockEncoder.reverseCodersKey(GROUP_ID, "java.lang.Object")).thenReturn(myKey);
+ doCallRealMethod().when(mockEncoder).add(params);
+
+
+ // create the hash maps for coders/reverseCoders
+ var toolset = mock(ProtocolCoderToolset.class);
+ HashMap<String, ProtocolCoderToolset> coders = new HashMap<>();
+ coders.put(myKey, toolset);
+ ReflectionTestUtils.setField(mockEncoder, "coders", coders);
+ HashMap<String, List<ProtocolCoderToolset>> reverseCoders = new HashMap<>();
+ reverseCoders.put("group:javaClass", new ArrayList<>(List.of(toolset)));
+ ReflectionTestUtils.setField(mockEncoder, "reverseCoders", reverseCoders);
+
+ assertDoesNotThrow(() -> mockEncoder.add(params));
+ assertEquals(2, mockEncoder.reverseCoders.size());
+ assertEquals(1, mockEncoder.coders.size());
+ }
+
+ @Test
+ void testAdd_InvalidParams_GroupId() {
+ var mockEventProtocolsParams = mock(EventProtocolParams.class);
+ when(mockEventProtocolsParams.getGroupId()).thenReturn(null);
+
+ assertThatThrownBy(() -> encoder.add(mockEventProtocolsParams))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Invalid group id");
+
+ when(mockEventProtocolsParams.getGroupId()).thenReturn("");
+
+ assertThatThrownBy(() -> encoder.add(mockEventProtocolsParams))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Invalid group id");
+ }
+
+ @Test
+ void testAdd_InvalidParams_ArtifactId() {
+ var mockEventProtocolsParams = mock(EventProtocolParams.class);
+ when(mockEventProtocolsParams.getGroupId()).thenReturn(GROUP_ID);
+ when(mockEventProtocolsParams.getArtifactId()).thenReturn(null);
+
+ assertThatThrownBy(() -> encoder.add(mockEventProtocolsParams))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Invalid artifact id");
+
+ when(mockEventProtocolsParams.getArtifactId()).thenReturn("");
+
+ assertThatThrownBy(() -> encoder.add(mockEventProtocolsParams))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Invalid artifact id");
+ }
+
+ @Test
+ void testAdd_InvalidParams_Topic() {
+ var mockEventProtocolsParams = mock(EventProtocolParams.class);
+ when(mockEventProtocolsParams.getGroupId()).thenReturn(GROUP_ID);
+ when(mockEventProtocolsParams.getArtifactId()).thenReturn(ARTIFACT_ID);
+ when(mockEventProtocolsParams.getTopic()).thenReturn(null);
+
+ assertThatThrownBy(() -> encoder.add(mockEventProtocolsParams))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Invalid Topic");
+
+ when(mockEventProtocolsParams.getGroupId()).thenReturn(GROUP_ID);
+ when(mockEventProtocolsParams.getArtifactId()).thenReturn(ARTIFACT_ID);
+ when(mockEventProtocolsParams.getTopic()).thenReturn("");
+
+ assertThatThrownBy(() -> encoder.add(mockEventProtocolsParams))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Invalid Topic");
+ }
+
+ @Test
+ void testAdd_InvalidParams_EventClass() {
+ var mockEventProtocolsParams = mock(EventProtocolParams.class);
+ when(mockEventProtocolsParams.getGroupId()).thenReturn(GROUP_ID);
+ when(mockEventProtocolsParams.getArtifactId()).thenReturn(ARTIFACT_ID);
+ when(mockEventProtocolsParams.getTopic()).thenReturn(TOPIC);
+ when(mockEventProtocolsParams.getEventClass()).thenReturn(null);
+
+ assertThatThrownBy(() -> encoder.add(mockEventProtocolsParams))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Invalid Event Class");
+ }
+
+ @Test
+ void testDecode_Exceptions() {
+ var mockDecoder = mock(EventProtocolDecoder.class);
+ when(mockDecoder.isCodingSupported(GROUP_ID, ARTIFACT_ID, TOPIC))
+ .thenReturn(false);
+ when(mockDecoder.decode(GROUP_ID, ARTIFACT_ID, TOPIC, null))
+ .thenCallRealMethod();
+ when(mockDecoder.codersKey(GROUP_ID, ARTIFACT_ID, TOPIC))
+ .thenCallRealMethod();
+
+ assertThatThrownBy(() -> mockDecoder.decode(GROUP_ID, ARTIFACT_ID, TOPIC, null))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Unsupported: groupId:artifactId:topic for encoding");
+ }
+
+ @Test
+ void testDecode_ExceptionCantDecode() {
+ var mockDecoder = mock(EventProtocolDecoder.class);
+
+ HashMap<String, ProtocolCoderToolset> coders = new HashMap<>();
+ var params = mock(EventProtocolParams.class);
+ coders.put("groupId:artifactId:topic", new GsonProtocolCoderToolset(params, "controllerId"));
+ ReflectionTestUtils.setField(mockDecoder, "coders", coders);
+
+ when(mockDecoder.isCodingSupported(GROUP_ID, ARTIFACT_ID, TOPIC))
+ .thenReturn(true);
+ when(mockDecoder.decode(GROUP_ID, ARTIFACT_ID, TOPIC, null))
+ .thenCallRealMethod();
+ when(mockDecoder.codersKey(GROUP_ID, ARTIFACT_ID, TOPIC))
+ .thenCallRealMethod();
+
+ assertThatThrownBy(() -> mockDecoder.decode(GROUP_ID, ARTIFACT_ID, TOPIC, null))
+ .isInstanceOf(UnsupportedOperationException.class)
+ .hasMessageContaining("Cannot decode with gson");
+ }
+
+ @Test
+ void testDecode_Decode() {
+ var mockDecoder = mock(EventProtocolDecoder.class);
+ var myKey = "groupId:artifactId:topic";
+ var json = "{\"json\":\"true\"}";
+
+ HashMap<String, ProtocolCoderToolset> coders = new HashMap<>();
+ var mockToolset = mock(ProtocolCoderToolset.class);
+ when(mockToolset.decode(json))
+ .thenReturn(new Object()) // success case
+ .thenReturn(null); // failure case
+
+ coders.put(myKey, mockToolset);
+ ReflectionTestUtils.setField(mockDecoder, "coders", coders);
+
+ when(mockDecoder.isCodingSupported(GROUP_ID, ARTIFACT_ID, TOPIC)).thenReturn(true);
+ when(mockDecoder.codersKey(GROUP_ID, ARTIFACT_ID, TOPIC)).thenReturn(myKey);
+ when(mockDecoder.decode(GROUP_ID, ARTIFACT_ID, TOPIC, json))
+ .thenCallRealMethod();
+
+ assertNotNull(mockDecoder.decode(GROUP_ID, ARTIFACT_ID, TOPIC, json));
+
+ assertThatThrownBy(() -> mockDecoder.decode(GROUP_ID, ARTIFACT_ID, TOPIC, json))
+ .isInstanceOf(UnsupportedOperationException.class)
+ .hasMessageContaining("Cannot decode with gson");
+ }
+
+ @Test
+ void testEncode_WithGroupArtifactTopicAndEvent() {
+ var mockEncoder = mock(EventProtocolEncoder.class);
+ var event = new Object();
+ when(mockEncoder.isCodingSupported(GROUP_ID, ARTIFACT_ID, TOPIC))
+ .thenReturn(false);
+ when(mockEncoder.encode(GROUP_ID, ARTIFACT_ID, TOPIC, event))
+ .thenCallRealMethod();
+ when(mockEncoder.codersKey(GROUP_ID, ARTIFACT_ID, TOPIC))
+ .thenCallRealMethod();
+
+ assertThatThrownBy(() -> mockEncoder.encode(GROUP_ID, ARTIFACT_ID, TOPIC, event))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Unsupported: groupId:artifactId:topic");
+
+ // test with event null
+ when(mockEncoder.isCodingSupported(GROUP_ID, ARTIFACT_ID, TOPIC))
+ .thenReturn(true);
+ when(mockEncoder.codersKey(GROUP_ID, ARTIFACT_ID, TOPIC))
+ .thenCallRealMethod();
+ when(mockEncoder.encode(GROUP_ID, ARTIFACT_ID, TOPIC, null))
+ .thenCallRealMethod();
+
+ assertThatThrownBy(() -> mockEncoder.encode(GROUP_ID, ARTIFACT_ID, TOPIC, null))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Event cannot be null or empty");
+ }
+
+ @Test
+ void testEncode_WithGroupArtifactTopicAndEvent_ReturnJson() {
+ var mockEncoder = mock(EventProtocolEncoder.class);
+ var event = new Object();
+ var myKey = "group:artifact:topic";
+
+ // test with event null
+ when(mockEncoder.isCodingSupported(GROUP_ID, ARTIFACT_ID, TOPIC)).thenReturn(true);
+ when(mockEncoder.codersKey(GROUP_ID, ARTIFACT_ID, TOPIC)).thenReturn(myKey);
+ when(mockEncoder.encode(GROUP_ID, ARTIFACT_ID, TOPIC, event)).thenCallRealMethod();
+ when(mockEncoder.encodeInternal(myKey, event)).thenCallRealMethod();
+
+ var mockToolset = mock(ProtocolCoderToolset.class);
+ when(mockToolset.encode(event)).thenReturn("{\"json\":\"true\"}");
+
+ HashMap<String, ProtocolCoderToolset> coders = new HashMap<>();
+ coders.put(myKey, mockToolset);
+ ReflectionTestUtils.setField(mockEncoder, "coders", coders);
+
+ var result = mockEncoder.encode(GROUP_ID, ARTIFACT_ID, TOPIC, event);
+ assertNotNull(result);
+ assertEquals("{\"json\":\"true\"}", result);
+ }
+
+ @Test
+ void testEncode_WithTopicAndEvent() {
+ var event = new Object();
+
+ assertThatThrownBy(() -> encoder.encode(null, event))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Invalid Topic");
+
+ assertThatThrownBy(() -> encoder.encode("", event))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Invalid Topic");
+
+ assertThatThrownBy(() -> encoder.encode(TOPIC, null))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Event cannot be null or empty");
+
+ assertThatThrownBy(() -> encoder.encode(TOPIC, event))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("no reverse coder has been found");
+ }
+
+ @Test
+ void testEncode_WithTopicEncodedClassAndDroolsController() {
+ var encodedClass = new Object();
+ var droolsController = new NullDroolsController();
+
+ assertThatThrownBy(() -> encoder.encode(null, encodedClass, droolsController))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Invalid Topic");
+
+ assertThatThrownBy(() -> encoder.encode("", encodedClass, droolsController))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Invalid Topic");
+
+ assertThatThrownBy(() -> encoder.encode(TOPIC, null, droolsController))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Invalid encoded class");
+
+ assertThatThrownBy(() -> encoder.encode(TOPIC, encodedClass, droolsController))
+ .isInstanceOf(UnsupportedOperationException.class)
+ .hasMessageContaining("Cannot encode with gson");
+ }
+
+ @Test
+ void testEncode_WithTopicEncodedClassAndDroolsController_ReturnNullJson() {
+ var encodedClass = new Object();
+ var droolsController = new NullDroolsController();
+ var mockCoderTools = mock(ProtocolCoderToolset.class);
+ when(mockCoderTools.encode(encodedClass)).thenReturn(null);
+
+ var mockEncoder = mock(EventProtocolEncoder.class);
+ when(mockEncoder.codersKey(anyString(), anyString(), anyString())).thenReturn("myKey");
+ when(mockEncoder.encodeInternal("myKey", encodedClass)).thenCallRealMethod();
+ when(mockEncoder.encode(TOPIC, encodedClass, droolsController)).thenCallRealMethod();
+
+ HashMap<String, ProtocolCoderToolset> coders = new HashMap<>();
+ coders.put("myKey", mockCoderTools);
+ ReflectionTestUtils.setField(mockEncoder, "coders", coders);
+
+ assertThatThrownBy(() -> mockEncoder.encode(TOPIC, encodedClass, droolsController))
+ .isInstanceOf(UnsupportedOperationException.class)
+ .hasMessageContaining("Cannot encode with gson");
+ }
+
+ @Test
+ void droolsCreators() {
+ var encodedClass = new Object();
+ assertTrue(encoder.droolsCreators(TOPIC, encodedClass).isEmpty());
+ }
+
+ @Test
+ void droolsCreators_ContainsReverseKey() {
+ var encodedClass = new Object();
+ var mockDecoder = mock(EventProtocolDecoder.class);
+ when(mockDecoder.droolsCreators(TOPIC, encodedClass)).thenCallRealMethod();
+ when(mockDecoder.reverseCodersKey(TOPIC, encodedClass.getClass().getName()))
+ .thenReturn("topic:java.lang.Object");
+
+ HashMap<String, List<ProtocolCoderToolset>> reverseCoders = new HashMap<>();
+ reverseCoders.put("topic:java.lang.Object", List.of());
+ ReflectionTestUtils.setField(mockDecoder, "reverseCoders", reverseCoders);
+
+ assertThatThrownBy(() -> mockDecoder.droolsCreators(TOPIC, encodedClass))
+ .isInstanceOf(IllegalStateException.class)
+ .hasMessageContaining("No Encoders toolsets available for topic:java.lang.Object");
+ }
+
+ @Test
+ void droolsCreators_ContainsReverseKey_ReturnControllers() {
+ var encodedClass = new Object();
+ var mockDecoder = mock(EventProtocolDecoder.class);
+ when(mockDecoder.droolsCreators(TOPIC, encodedClass)).thenCallRealMethod();
+ when(mockDecoder.reverseCodersKey(TOPIC, encodedClass.getClass().getName()))
+ .thenReturn("group:artifact:topic");
+
+ var toolset = mock(ProtocolCoderToolset.class);
+ when(toolset.getGroupId()).thenReturn(GROUP_ID);
+ when(toolset.getArtifactId()).thenReturn(ARTIFACT_ID);
+
+ var mockCoders = mock(EventProtocolCoder.CoderFilters.class);
+ when(mockCoders.getFactClass()).thenReturn("java.lang.Object");
+ when(mockCoders.getModelClassLoaderHash()).thenReturn(1);
+ when(toolset.getCoders()).thenReturn(List.of(mockCoders));
+
+ HashMap<String, List<ProtocolCoderToolset>> reverseCoders = new HashMap<>();
+ var toolsetList = new ArrayList<ProtocolCoderToolset>();
+ toolsetList.add(toolset);
+ reverseCoders.put("group:artifact:topic", toolsetList);
+ ReflectionTestUtils.setField(mockDecoder, "reverseCoders", reverseCoders);
+
+ var mockDroolsController = mock(DroolsController.class);
+ when(mockDroolsController.ownsCoder(encodedClass.getClass(), 1)).thenReturn(true);
+
+ var mockFactory = mock(DroolsControllerFactory.class);
+ when(mockFactory.get(GROUP_ID, ARTIFACT_ID, "")).thenReturn(mockDroolsController);
+
+ try (MockedStatic<DroolsControllerConstants> factory = Mockito.mockStatic(DroolsControllerConstants.class)) {
+ factory.when(DroolsControllerConstants::getFactory).thenReturn(mockFactory);
+ assertEquals(mockFactory, DroolsControllerConstants.getFactory());
+ assertFalse(mockDecoder.droolsCreators(TOPIC, encodedClass).isEmpty());
+ }
+ }
+
+ @Test
+ void testGetFilters_WithGroupArtifactAndTopic() {
+ assertThatThrownBy(() -> encoder.getFilters(GROUP_ID, ARTIFACT_ID, TOPIC))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Unsupported: groupId:artifactId:topic");
+
+ var mockEncoder = mock(EventProtocolEncoder.class);
+ when(mockEncoder.isCodingSupported(GROUP_ID, ARTIFACT_ID, TOPIC)).thenReturn(true);
+ when((mockEncoder.codersKey(GROUP_ID, ARTIFACT_ID, TOPIC))).thenCallRealMethod();
+ when(mockEncoder.getFilters(GROUP_ID, ARTIFACT_ID, TOPIC)).thenCallRealMethod();
+
+ HashMap<String, ProtocolCoderToolset> coders = new HashMap<>();
+ var mockCoderTools = mock(ProtocolCoderToolset.class);
+ when(mockCoderTools.getCoders()).thenReturn(List.of());
+ coders.put(VALID_KEY, mockCoderTools);
+ ReflectionTestUtils.setField(mockEncoder, "coders", coders);
+
+ assertTrue(mockEncoder.getFilters(GROUP_ID, ARTIFACT_ID, TOPIC).isEmpty());
+ }
+
+ @Test
+ void testGetFilters_WithGroupAndArtifact() {
+ assertTrue(encoder.getFilters(GROUP_ID, ARTIFACT_ID).isEmpty());
+
+ assertThatThrownBy(() -> encoder.getFilters("", ARTIFACT_ID))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Invalid group");
+
+ assertThatThrownBy(() -> encoder.getFilters(GROUP_ID, ""))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Invalid artifact");
+ }
+
+ @Test
+ void testGetFilters_WithGroupArtifactTopicAndClassName() {
+ assertThatThrownBy(() -> encoder.getFilters(GROUP_ID, ARTIFACT_ID, TOPIC, "className"))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Unsupported: groupId:artifactId:topic");
+ }
+
+ @Test
+ void testGetFilters_WithGroupArtifactTopicAndClassNameNull() {
+ var mockEncoder = mock(EventProtocolEncoder.class);
+ when(mockEncoder.isCodingSupported(GROUP_ID, ARTIFACT_ID, TOPIC)).thenReturn(true);
+ when(mockEncoder.getFilters(GROUP_ID, ARTIFACT_ID, TOPIC, ""))
+ .thenCallRealMethod();
+
+ assertThatThrownBy(() -> mockEncoder.getFilters(GROUP_ID, ARTIFACT_ID, TOPIC, ""))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("classname must be provided");
+ }
+
+ @Test
+ void testGetFilters_WithGroupArtifactTopicAndClassName_ReturnValue() {
+ var mockEncoder = mock(EventProtocolEncoder.class);
+ when(mockEncoder.isCodingSupported(GROUP_ID, ARTIFACT_ID, TOPIC)).thenReturn(true);
+ when(mockEncoder.getFilters(GROUP_ID, ARTIFACT_ID, TOPIC, "className"))
+ .thenCallRealMethod();
+ when((mockEncoder.codersKey(GROUP_ID, ARTIFACT_ID, TOPIC))).thenCallRealMethod();
+
+ HashMap<String, ProtocolCoderToolset> coders = new HashMap<>();
+ var mockCoderTools = mock(ProtocolCoderToolset.class);
+ when(mockCoderTools.getCoder("className")).thenReturn(null);
+ coders.put(VALID_KEY, mockCoderTools);
+ ReflectionTestUtils.setField(mockEncoder, "coders", coders);
+
+ assertNull(mockEncoder.getFilters(GROUP_ID, ARTIFACT_ID, TOPIC, "className"));
+ }
+
+ @Test
+ void testGetCoders_ReturnObject() {
+ var mockEncoder = mock(EventProtocolEncoder.class);
+ when(mockEncoder.isCodingSupported(GROUP_ID, ARTIFACT_ID, TOPIC)).thenReturn(true);
+ when(mockEncoder.getCoders(GROUP_ID, ARTIFACT_ID, TOPIC))
+ .thenCallRealMethod();
+ HashMap<String, ProtocolCoderToolset> coders = new HashMap<>();
+ ReflectionTestUtils.setField(mockEncoder, "coders", coders);
+
+ assertNull(mockEncoder.getCoders(GROUP_ID, ARTIFACT_ID, TOPIC));
+ }
+
+ @Test
+ void testGetCoders_ReturnList() {
+ assertThatThrownBy(() -> encoder.getCoders("", ARTIFACT_ID))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Invalid group");
+
+ assertThatThrownBy(() -> encoder.getCoders(GROUP_ID, ""))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Invalid artifact");
+
+ assertTrue(encoder.getCoders(GROUP_ID, ARTIFACT_ID).isEmpty());
+
+ // mock a successful return
+ var mockEncoder = mock(EventProtocolEncoder.class);
+ HashMap<String, ProtocolCoderToolset> coders = new HashMap<>();
+ var params = mock(EventProtocolParams.class);
+ coders.put(VALID_KEY, new GsonProtocolCoderToolset(params, "controllerId"));
+ ReflectionTestUtils.setField(mockEncoder, "coders", coders);
+ when(mockEncoder.codersKey(GROUP_ID, ARTIFACT_ID, "")).thenCallRealMethod();
+ when(mockEncoder.getCoders(GROUP_ID, ARTIFACT_ID)).thenCallRealMethod();
+
+ var resultList = mockEncoder.getCoders(GROUP_ID, ARTIFACT_ID);
+ assertFalse(resultList.isEmpty());
+ assertEquals(1, resultList.size());
+
+ var emptyResult = mockEncoder.getCoders("group2", "artifact2");
+ assertTrue(emptyResult.isEmpty());
+ }
+
+ @Test
+ void testGetReverseFilters() {
+ assertThatThrownBy(() -> decoder.getReverseFilters("", "codedClass"))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Invalid Topic");
+
+ assertThatThrownBy(() -> decoder.getReverseFilters(TOPIC, ""))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("class must be provided");
+
+ assertTrue(decoder.getReverseFilters(TOPIC, "codedClass").isEmpty());
+ }
+
+ @Test
+ void testGetReverseFilters_ReturnToolset() {
+ var mockDecoder = mock(EventProtocolDecoder.class);
+
+ // mock a successful return
+ HashMap<String, List<ProtocolCoderToolset>> reverseCoders = new HashMap<>();
+ var params = mock(EventProtocolParams.class);
+ var toolset = new GsonProtocolCoderToolset(params, "controllerId");
+ reverseCoders.put("topic:codedClass", List.of(toolset));
+ ReflectionTestUtils.setField(mockDecoder, "reverseCoders", reverseCoders);
+
+ when(mockDecoder.reverseCodersKey(TOPIC, "codedClass")).thenReturn("topic:codedClass");
+ when(mockDecoder.getReverseFilters(TOPIC, "codedClass")).thenCallRealMethod();
+
+ var resultList = mockDecoder.getReverseFilters(TOPIC, "codedClass");
+ assertFalse(resultList.isEmpty());
+ assertEquals(1, resultList.size());
+ }
+
+ @Test
+ void testGetDroolsController_Exception() {
+ var fact = new Object();
+ assertThatThrownBy(() -> decoder.getDroolsController("", fact))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Invalid Topic");
+
+ assertThatThrownBy(() -> decoder.getDroolsController(TOPIC, null))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("class must be provided");
+
+ assertThatThrownBy(() -> decoder.getDroolsController(TOPIC, fact))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Unsupported topic topic and encodedClass class java.lang.Object");
+ }
+
+ @Test
+ void testGetDroolsController_ReturnObject() {
+ var mockDecoder = mock(EventProtocolDecoder.class);
+ var droolsController = new NullDroolsController();
+ var droolsController2 = new NullDroolsController();
+ var fact = new Object();
+
+ // mock first call to return only one controller, then second call should return 2 controllers
+ when(mockDecoder.getDroolsControllers(TOPIC, fact))
+ .thenReturn(List.of(droolsController))
+ .thenReturn(List.of(droolsController, droolsController2));
+ when(mockDecoder.getDroolsController(TOPIC, fact)).thenCallRealMethod();
+
+ var result = mockDecoder.getDroolsController(TOPIC, fact);
+ assertNotNull(result);
+
+ // second call supposed to return 2 controllers internally, but still return 1 item
+ var result2 = mockDecoder.getDroolsController(TOPIC, fact);
+ assertNotNull(result2);
+ }
+
+ @Test
+ void testGetDroolsControllers_Exception() {
+ var fact = new Object();
+ assertThatThrownBy(() -> decoder.getDroolsControllers("", fact))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Invalid Topic");
+
+ assertThatThrownBy(() -> decoder.getDroolsControllers(TOPIC, null))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("class must be provided");
+
+ assertTrue(decoder.getDroolsControllers(TOPIC, fact).isEmpty());
+ }
+
+ @Test
+ void testGetDroolsControllers_ReturnValues() {
+ var mockDecoder = mock(EventProtocolDecoder.class);
+ var droolsController = new NullDroolsController();
+ var droolsController2 = new NullDroolsController();
+ var fact = new Object();
+
+ // mock first call to return only one controller, then second call should return 2 controllers
+ when(mockDecoder.droolsCreators(TOPIC, fact))
+ .thenReturn(List.of(droolsController))
+ .thenReturn(List.of(droolsController, droolsController2));
+ when(mockDecoder.getDroolsControllers(TOPIC, fact)).thenCallRealMethod();
+
+ var result = mockDecoder.getDroolsControllers(TOPIC, fact);
+ assertEquals(1, result.size());
+
+ // second call supposed to return 2 controllers
+ var result2 = mockDecoder.getDroolsControllers(TOPIC, fact);
+ assertEquals(2, result2.size());
+ }
+
+ @Test
+ void testRemove() {
+ var mockDecoder = mock(EventProtocolDecoder.class);
+ doCallRealMethod().when(mockDecoder).remove(GROUP_ID, ARTIFACT_ID, TOPIC);
+ when(mockDecoder.codersKey(GROUP_ID, ARTIFACT_ID, TOPIC)).thenCallRealMethod();
+ when(mockDecoder.reverseCodersKey(TOPIC, "className")).thenReturn(INVALID_KEY);
+
+ var toolset = mock(ProtocolCoderToolset.class);
+ var mockCoders = new EventProtocolCoder.CoderFilters("className", mock(JsonProtocolFilter.class), 1);
+ when(toolset.getCoders()).thenReturn(List.of(mockCoders));
+
+ HashMap<String, ProtocolCoderToolset> coders = new HashMap<>();
+ coders.put(VALID_KEY, toolset);
+ ReflectionTestUtils.setField(mockDecoder, "coders", coders);
+ HashMap<String, List<ProtocolCoderToolset>> reverseCoders = new HashMap<>();
+ reverseCoders.put(VALID_KEY, new ArrayList<>(List.of(toolset)));
+ ReflectionTestUtils.setField(mockDecoder, "reverseCoders", reverseCoders);
+
+ assertDoesNotThrow(() -> mockDecoder.remove(GROUP_ID, ARTIFACT_ID, TOPIC));
+ assertEquals(1, mockDecoder.reverseCoders.size());
+ assertTrue(mockDecoder.coders.isEmpty());
+ }
+
+ @Test
+ void testRemove2() {
+ var myKey = "group:artifact:topic";
+ var mockDecoder = mock(EventProtocolDecoder.class);
+ doCallRealMethod().when(mockDecoder).remove(GROUP_ID, ARTIFACT_ID, TOPIC);
+ when(mockDecoder.codersKey(GROUP_ID, ARTIFACT_ID, TOPIC)).thenReturn(myKey);
+ when(mockDecoder.reverseCodersKey(TOPIC, "className")).thenReturn(myKey);
+
+ var toolset = mock(ProtocolCoderToolset.class);
+ var mockCoders = new EventProtocolCoder.CoderFilters("className", mock(JsonProtocolFilter.class), 1);
+ when(toolset.getCoders()).thenReturn(List.of(mockCoders));
+
+ HashMap<String, ProtocolCoderToolset> coders = new HashMap<>();
+ coders.put(myKey, toolset);
+ ReflectionTestUtils.setField(mockDecoder, "coders", coders);
+ HashMap<String, List<ProtocolCoderToolset>> reverseCoders = new HashMap<>();
+ reverseCoders.put(myKey, new ArrayList<>());
+ ReflectionTestUtils.setField(mockDecoder, "reverseCoders", reverseCoders);
+
+ assertDoesNotThrow(() -> mockDecoder.remove(GROUP_ID, ARTIFACT_ID, TOPIC));
+ assertTrue(mockDecoder.reverseCoders.isEmpty());
+ assertTrue(mockDecoder.coders.isEmpty());
+ }
+
+} \ No newline at end of file
diff --git a/policy-management/src/test/java/org/onap/policy/drools/protocol/coders/GsonProtocolCoderToolsetTest.java b/policy-management/src/test/java/org/onap/policy/drools/protocol/coders/GsonProtocolCoderToolsetTest.java
new file mode 100644
index 00000000..4bd2aab2
--- /dev/null
+++ b/policy-management/src/test/java/org/onap/policy/drools/protocol/coders/GsonProtocolCoderToolsetTest.java
@@ -0,0 +1,197 @@
+/*-
+ * ============LICENSE_START===============================================
+ * ONAP
+ * ========================================================================
+ * Copyright (C) 2024 Nordix Foundation.
+ * ========================================================================
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ * ============LICENSE_END=================================================
+ */
+
+package org.onap.policy.drools.protocol.coders;
+
+import static org.assertj.core.api.Assertions.assertThatThrownBy;
+import static org.junit.jupiter.api.Assertions.assertAll;
+import static org.junit.jupiter.api.Assertions.assertEquals;
+import static org.junit.jupiter.api.Assertions.assertInstanceOf;
+import static org.junit.jupiter.api.Assertions.assertNotNull;
+import static org.junit.jupiter.api.Assertions.assertNull;
+import static org.mockito.Mockito.doCallRealMethod;
+import static org.mockito.Mockito.mock;
+import static org.mockito.Mockito.when;
+
+import com.google.gson.Gson;
+import com.google.gson.JsonDeserializationContext;
+import com.google.gson.JsonElement;
+import com.google.gson.JsonIOException;
+import com.google.gson.JsonSerializationContext;
+import com.google.gson.JsonSyntaxException;
+import java.lang.reflect.Type;
+import java.time.Instant;
+import java.time.ZonedDateTime;
+import org.junit.jupiter.api.Test;
+import org.mockito.MockedStatic;
+import org.mockito.Mockito;
+import org.mockito.stubbing.Answer;
+import org.onap.policy.drools.controller.DroolsControllerConstants;
+import org.onap.policy.drools.controller.DroolsControllerFactory;
+import org.onap.policy.drools.controller.internal.NullDroolsController;
+import org.springframework.test.util.ReflectionTestUtils;
+
+class GsonProtocolCoderToolsetTest {
+
+ @Test
+ void decode() {
+ var mockGsonToolset = mock(GsonProtocolCoderToolset.class);
+ ReflectionTestUtils.setField(mockGsonToolset, "groupId", "group");
+ ReflectionTestUtils.setField(mockGsonToolset, "artifactId", "artifact");
+ doCallRealMethod().when(mockGsonToolset).decode("json");
+
+ var decoderClass = ProtocolCoderToolsetTest.ThreeStrings.class;
+ var mockGson = mock(Gson.class);
+ when(mockGson.fromJson("json", decoderClass)).thenThrow(new JsonSyntaxException("error"));
+ when(mockGsonToolset.getDecoder()).thenReturn(mockGson);
+
+ var mockCustomCoder = mock(TopicCoderFilterConfiguration.CustomCoder.class);
+ when(mockCustomCoder.getClassContainer()).thenReturn("classContainer");
+ ReflectionTestUtils.setField(mockGsonToolset, "customCoder", mockCustomCoder);
+
+ var mockFilter = mock(EventProtocolCoder.CoderFilters.class);
+ when(mockFilter.getFactClass()).thenReturn("someClassName");
+ when(mockGsonToolset.filter("json")).thenReturn(mockFilter);
+
+ var droolsController = mock(NullDroolsController.class);
+ when(droolsController.fetchModelClass("someClassName"))
+ .thenReturn(null)
+ .thenAnswer((Answer<Class<?>>) invocation -> decoderClass)
+ .thenAnswer((Answer<Class<?>>) invocation -> decoderClass);
+ when(droolsController.fetchModelClass("classContainer")).thenReturn(null);
+
+ var mockFactory = mock(DroolsControllerFactory.class);
+ when(mockFactory.get("group", "artifact", ""))
+ .thenReturn(null)
+ .thenReturn(droolsController);
+
+ try (MockedStatic<DroolsControllerConstants> factory = Mockito.mockStatic(DroolsControllerConstants.class)) {
+ factory.when(DroolsControllerConstants::getFactory).thenReturn(mockFactory);
+ assertEquals(mockFactory, DroolsControllerConstants.getFactory());
+
+ // first call to fail when droolsController returns null
+ assertThatThrownBy(() -> mockGsonToolset.decode("json"))
+ .isInstanceOf(IllegalStateException.class)
+ .hasMessageContaining("no drools-controller to process event");
+
+ // second call to fail when droolsController.fetchModelClass returns null
+ assertThatThrownBy(() -> mockGsonToolset.decode("json"))
+ .isInstanceOf(UnsupportedOperationException.class)
+ .hasMessageContaining("cannot fetch application class someClassName");
+
+ // third call to fail when droolsController.fetchModelClass returns null when using customCoder
+ assertThatThrownBy(() -> mockGsonToolset.decode("json"))
+ .isInstanceOf(UnsupportedOperationException.class)
+ .hasMessageContaining("cannot decode with customCoder: classContainer")
+ .hasMessageContaining("using application class someClassName");
+
+ // set customCoder to null to test default decoder
+ ReflectionTestUtils.setField(mockGsonToolset, "customCoder", null);
+
+ // fourth call to fail when decoder can't parse json
+ assertThatThrownBy(() -> mockGsonToolset.decode("json"))
+ .isInstanceOf(UnsupportedOperationException.class)
+ .hasMessageContaining("cannot decode into");
+ }
+ }
+
+ @Test
+ void encode() {
+ var event = new Object();
+
+ var mockGsonToolset = mock(GsonProtocolCoderToolset.class);
+ ReflectionTestUtils.setField(mockGsonToolset, "groupId", "group");
+ ReflectionTestUtils.setField(mockGsonToolset, "artifactId", "artifact");
+ doCallRealMethod().when(mockGsonToolset).encode(event);
+
+ var mockGson = mock(Gson.class);
+ when(mockGson.toJson(event)).thenThrow(new JsonIOException("error"));
+ when(mockGsonToolset.getEncoder()).thenReturn(mockGson);
+
+ var mockCustomCoder = mock(TopicCoderFilterConfiguration.CustomCoder.class);
+ ReflectionTestUtils.setField(mockGsonToolset, "customCoder", mockCustomCoder);
+
+ var mockFactory = mock(DroolsControllerFactory.class);
+ when(mockFactory.get("group", "artifact", "")).thenReturn(null);
+
+ try (MockedStatic<DroolsControllerConstants> factory = Mockito.mockStatic(DroolsControllerConstants.class)) {
+ factory.when(DroolsControllerConstants::getFactory).thenReturn(mockFactory);
+ assertEquals(mockFactory, DroolsControllerConstants.getFactory());
+
+ // first call to encode fails with droolsController returning null, therefore, can't process event
+ assertThatThrownBy(() -> mockGsonToolset.encode(event))
+ .isInstanceOf(UnsupportedOperationException.class)
+ .hasMessageContaining("event cannot be custom encoded");
+
+ // set customCoder to null to test default encoder
+ ReflectionTestUtils.setField(mockGsonToolset, "customCoder", null);
+
+ // second call to encode fails when gson.toJson raises an exception
+ assertThatThrownBy(() -> mockGsonToolset.encode(event))
+ .isInstanceOf(UnsupportedOperationException.class)
+ .hasMessageContaining("event cannot be encoded");
+ }
+ }
+
+ @Test
+ void test_GsonInstantAdapter() {
+ var instantAdapter = new GsonProtocolCoderToolset.GsonInstantAdapter();
+
+ var currentTime = System.currentTimeMillis();
+ var json = mock(JsonElement.class);
+ when(json.getAsLong()).thenReturn(currentTime);
+
+ var result = instantAdapter.deserialize(json, mock(Type.class), mock(JsonDeserializationContext.class));
+ assertInstanceOf(Instant.class, result);
+ assertEquals(currentTime, result.toEpochMilli());
+
+ var jsonResult = instantAdapter.serialize(result, mock(Type.class), mock(JsonSerializationContext.class));
+ assertInstanceOf(JsonElement.class, jsonResult);
+ assertEquals(currentTime, jsonResult.getAsLong());
+ }
+
+ @Test
+ void test_GsonUtcAdapter() {
+ var utcAdapter = new GsonProtocolCoderToolset.GsonUtcAdapter();
+
+ var currentZone = ZonedDateTime.now();
+ var formattedCurrentZone = ZonedDateTime.now().format(GsonProtocolCoderToolset.format);
+ var json = mock(JsonElement.class);
+ when(json.getAsString()).thenReturn(formattedCurrentZone).thenReturn("invalid json");
+
+ var result = utcAdapter.deserialize(json, mock(Type.class), mock(JsonDeserializationContext.class));
+ assertNotNull(result);
+ assertAll(() -> {
+ assertEquals(currentZone.getYear(), result.getYear());
+ assertEquals(currentZone.getMonth(), result.getMonth());
+ assertEquals(currentZone.getDayOfMonth(), result.getDayOfMonth());
+ assertEquals(currentZone.getHour(), result.getHour());
+ assertEquals(currentZone.getMinute(), result.getMinute());
+ assertEquals(currentZone.getSecond(), result.getSecond());
+ });
+
+ // when json.getAsString returns invalid json, should fail and return null
+ assertNull(utcAdapter.deserialize(json, mock(Type.class), mock(JsonDeserializationContext.class)));
+
+ var result2 = utcAdapter.serialize(result, mock(Type.class), mock(JsonSerializationContext.class));
+ assertNotNull(result2);
+ assertEquals(formattedCurrentZone, result2.getAsString());
+ }
+} \ No newline at end of file
diff --git a/policy-management/src/test/java/org/onap/policy/drools/protocol/coders/MultiplexorEventProtocolCoderTest.java b/policy-management/src/test/java/org/onap/policy/drools/protocol/coders/MultiplexorEventProtocolCoderTest.java
new file mode 100644
index 00000000..c64e9bce
--- /dev/null
+++ b/policy-management/src/test/java/org/onap/policy/drools/protocol/coders/MultiplexorEventProtocolCoderTest.java
@@ -0,0 +1,308 @@
+/*-
+ * ============LICENSE_START===============================================
+ * ONAP
+ * ========================================================================
+ * Copyright (C) 2024 Nordix Foundation.
+ * ========================================================================
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ * ============LICENSE_END=================================================
+ */
+
+package org.onap.policy.drools.protocol.coders;
+
+import static org.assertj.core.api.Assertions.assertThat;
+import static org.junit.jupiter.api.Assertions.assertDoesNotThrow;
+import static org.junit.jupiter.api.Assertions.assertFalse;
+import static org.junit.jupiter.api.Assertions.assertInstanceOf;
+import static org.junit.jupiter.api.Assertions.assertNotNull;
+import static org.junit.jupiter.api.Assertions.assertThrows;
+import static org.junit.jupiter.api.Assertions.assertTrue;
+import static org.mockito.Mockito.doNothing;
+import static org.mockito.Mockito.mock;
+import static org.mockito.Mockito.when;
+
+import java.util.ArrayList;
+import java.util.HashMap;
+import org.junit.jupiter.api.AfterEach;
+import org.junit.jupiter.api.BeforeEach;
+import org.junit.jupiter.api.Test;
+import org.mockito.Mock;
+import org.mockito.MockitoAnnotations;
+import org.onap.policy.drools.controller.DroolsController;
+import org.springframework.test.util.ReflectionTestUtils;
+
+class MultiplexorEventProtocolCoderTest {
+
+ @Mock
+ EventProtocolEncoder encoder;
+
+ @Mock
+ EventProtocolDecoder decoder;
+
+ MultiplexorEventProtocolCoder coder = new MultiplexorEventProtocolCoder();
+
+ AutoCloseable closeable;
+
+ private static final String GROUP_ID = "group";
+ private static final String ARTIFACT_ID = "artifact";
+ private static final String TOPIC = "topic";
+
+ @BeforeEach
+ void setUp() {
+ closeable = MockitoAnnotations.openMocks(this);
+ ReflectionTestUtils.setField(coder, "encoders", encoder);
+ ReflectionTestUtils.setField(coder, "decoders", decoder);
+ }
+
+ @AfterEach
+ void tearDown() throws Exception {
+ closeable.close();
+ }
+
+ @Test
+ void addDecoder() {
+ var mockParams = mock(EventProtocolParams.class);
+ doNothing().when(decoder).add(mockParams);
+
+ assertDoesNotThrow(() -> coder.addDecoder(mockParams));
+ }
+
+ @Test
+ void addEncoder() {
+ var mockParams = mock(EventProtocolParams.class);
+ doNothing().when(encoder).add(mockParams);
+
+ assertDoesNotThrow(() -> coder.addEncoder(mockParams));
+ }
+
+ @Test
+ void removeDecoders() {
+ doNothing().when(decoder).remove(GROUP_ID, ARTIFACT_ID, TOPIC);
+ assertDoesNotThrow(() -> coder.removeDecoders(GROUP_ID, ARTIFACT_ID, TOPIC));
+ }
+
+ @Test
+ void removeEncoders() {
+ doNothing().when(encoder).remove(GROUP_ID, ARTIFACT_ID, TOPIC);
+ assertDoesNotThrow(() -> coder.removeEncoders(GROUP_ID, ARTIFACT_ID, TOPIC));
+ }
+
+ @Test
+ void isDecodingSupported() {
+ HashMap<String, ProtocolCoderToolset> coders = new HashMap<>();
+ coders.put("otherGroup:artifact:topic", mock(ProtocolCoderToolset.class));
+ ReflectionTestUtils.setField(decoder, "coders", coders);
+ when(decoder.codersKey(GROUP_ID, ARTIFACT_ID, TOPIC)).thenCallRealMethod();
+ when(decoder.isCodingSupported(GROUP_ID, ARTIFACT_ID, TOPIC))
+ .thenReturn(true)
+ .thenCallRealMethod();
+ assertTrue(coder.isDecodingSupported(GROUP_ID, ARTIFACT_ID, TOPIC));
+ assertFalse(coder.isDecodingSupported(GROUP_ID, ARTIFACT_ID, TOPIC));
+ }
+
+ @Test
+ void isEncodingSupported() {
+ HashMap<String, ProtocolCoderToolset> coders = new HashMap<>();
+ coders.put("otherGroup:artifact:topic", mock(ProtocolCoderToolset.class));
+ ReflectionTestUtils.setField(encoder, "coders", coders);
+ when(encoder.codersKey(GROUP_ID, ARTIFACT_ID, TOPIC)).thenCallRealMethod();
+ when(encoder.isCodingSupported(GROUP_ID, ARTIFACT_ID, TOPIC))
+ .thenReturn(true)
+ .thenCallRealMethod();
+ assertTrue(coder.isEncodingSupported(GROUP_ID, ARTIFACT_ID, TOPIC));
+ assertFalse(coder.isEncodingSupported(GROUP_ID, ARTIFACT_ID, TOPIC));
+ }
+
+ @Test
+ void decode() {
+ when(decoder.decode(GROUP_ID, ARTIFACT_ID, TOPIC, "{}"))
+ .thenReturn(new Object())
+ .thenCallRealMethod();
+ when(decoder.isCodingSupported(GROUP_ID, ARTIFACT_ID, TOPIC)).thenReturn(false);
+
+ // first mock call to return directly new Object()
+ assertNotNull(coder.decode(GROUP_ID, ARTIFACT_ID, TOPIC, "{}"));
+
+ // second mock call to check isCodingSupport return false, then throws exception
+ assertThrows(IllegalArgumentException.class,
+ () -> coder.decode(GROUP_ID, ARTIFACT_ID, TOPIC, "{}"));
+ }
+
+ @Test
+ void encode() {
+ var event = new Object();
+ when(encoder.encode(GROUP_ID, ARTIFACT_ID, TOPIC, event))
+ .thenReturn("{}")
+ .thenCallRealMethod();
+ when(encoder.isCodingSupported(GROUP_ID, ARTIFACT_ID, TOPIC)).thenReturn(false);
+
+ // first mock call to return directly new Object()
+ assertNotNull(coder.encode(GROUP_ID, ARTIFACT_ID, TOPIC, event));
+
+ // second mock call to check isCodingSupport return false, then throws exception
+ assertThrows(IllegalArgumentException.class,
+ () -> coder.encode(GROUP_ID, ARTIFACT_ID, TOPIC, event));
+ }
+
+ @Test
+ void encode_WithTopicAndEvent() {
+ var event = new Object();
+ when(encoder.encode(TOPIC, event)).thenReturn("{}");
+
+ var result = coder.encode(TOPIC, event);
+ assertNotNull(result);
+ assertInstanceOf(String.class, result);
+ }
+
+ @Test
+ void encode_WithTopicEncodedClassAndController() {
+ var event = new Object();
+ var controller = mock(DroolsController.class);
+ when(encoder.encode(TOPIC, event, controller)).thenReturn("{}");
+
+ var result = coder.encode(TOPIC, event, controller);
+ assertNotNull(result);
+ assertInstanceOf(String.class, result);
+ }
+
+ @Test
+ void getDecoderFilters() {
+ when(decoder.getFilters(GROUP_ID, ARTIFACT_ID, TOPIC))
+ .thenReturn(new ArrayList<>())
+ .thenCallRealMethod();
+ when(decoder.isCodingSupported(GROUP_ID, ARTIFACT_ID, TOPIC)).thenReturn(false);
+
+ // first mock call return a list
+ var result = coder.getDecoderFilters(GROUP_ID, ARTIFACT_ID, TOPIC);
+ assertTrue(result.isEmpty());
+
+ // second call goes for real method, with isCodingSupported mocked to false, exception is thrown
+ assertThrows(IllegalArgumentException.class,
+ () -> coder.getDecoderFilters(GROUP_ID, ARTIFACT_ID, TOPIC));
+ }
+
+ @Test
+ void testGetDecoderFilters_WithGroupArtifactTopicAndClassName() {
+ when(decoder.getFilters(GROUP_ID, ARTIFACT_ID, TOPIC, "className"))
+ .thenReturn(mock(EventProtocolCoder.CoderFilters.class))
+ .thenCallRealMethod();
+ when(decoder.isCodingSupported(GROUP_ID, ARTIFACT_ID, TOPIC)).thenReturn(false);
+
+ // first mock call return a mock object
+ assertNotNull(coder.getDecoderFilters(GROUP_ID, ARTIFACT_ID, TOPIC, "className"));
+
+ // second call goes for real method, with isCodingSupported mocked to false, exception is thrown
+ assertThrows(IllegalArgumentException.class,
+ () -> coder.getDecoderFilters(GROUP_ID, ARTIFACT_ID, TOPIC, "className"));
+ }
+
+ @Test
+ void testGetDecoderFilters_WithGroupAndArtifact() {
+ when(decoder.getFilters(GROUP_ID, ARTIFACT_ID)).thenReturn(new ArrayList<>());
+
+ assertThat(coder.getDecoderFilters(GROUP_ID, ARTIFACT_ID, TOPIC)).isEmpty();
+ }
+
+ @Test
+ void getDecoders() {
+ when(decoder.getCoders(GROUP_ID, ARTIFACT_ID, TOPIC))
+ .thenReturn(mock(ProtocolCoderToolset.class))
+ .thenCallRealMethod();
+ when(decoder.isCodingSupported(GROUP_ID, ARTIFACT_ID, TOPIC)).thenReturn(false);
+
+ assertNotNull(coder.getDecoders(GROUP_ID, ARTIFACT_ID, TOPIC));
+ assertThrows(IllegalArgumentException.class,
+ () -> coder.getDecoders(GROUP_ID, ARTIFACT_ID, TOPIC));
+ }
+
+ @Test
+ void testGetDecoders_WithGroupAndArtifact() {
+ when(decoder.getCoders(GROUP_ID, ARTIFACT_ID)).thenReturn(new ArrayList<>());
+
+ assertThat(coder.getDecoders(GROUP_ID, ARTIFACT_ID)).isEmpty();
+ }
+
+ @Test
+ void getEncoderFilters() {
+ when(encoder.getFilters(GROUP_ID, ARTIFACT_ID, TOPIC))
+ .thenReturn(new ArrayList<>())
+ .thenCallRealMethod();
+ when(encoder.isCodingSupported(GROUP_ID, ARTIFACT_ID, TOPIC)).thenReturn(false);
+
+ // first mock call return a list
+ var result = coder.getEncoderFilters(GROUP_ID, ARTIFACT_ID, TOPIC);
+ assertTrue(result.isEmpty());
+
+ // second call goes for real method, with isCodingSupported mocked to false, exception is thrown
+ assertThrows(IllegalArgumentException.class,
+ () -> coder.getEncoderFilters(GROUP_ID, ARTIFACT_ID, TOPIC));
+ }
+
+ @Test
+ void testGetEncoderFilters_WithGroupArtifactTopicAndClassName() {
+ when(encoder.getFilters(GROUP_ID, ARTIFACT_ID, TOPIC, "className"))
+ .thenReturn(mock(EventProtocolCoder.CoderFilters.class))
+ .thenCallRealMethod();
+ when(encoder.isCodingSupported(GROUP_ID, ARTIFACT_ID, TOPIC)).thenReturn(false);
+
+ // first mock call return a mock object
+ assertNotNull(coder.getEncoderFilters(GROUP_ID, ARTIFACT_ID, TOPIC, "className"));
+
+ // second call goes for real method, with isCodingSupported mocked to false, exception is thrown
+ assertThrows(IllegalArgumentException.class,
+ () -> coder.getEncoderFilters(GROUP_ID, ARTIFACT_ID, TOPIC, "className"));
+ }
+
+ @Test
+ void testGetEncoderFilters_WithGroupAndArtifact() {
+ when(encoder.getFilters(GROUP_ID, ARTIFACT_ID)).thenReturn(new ArrayList<>());
+
+ assertThat(coder.getEncoderFilters(GROUP_ID, ARTIFACT_ID, TOPIC)).isEmpty();
+ }
+
+ @Test
+ void getReverseEncoderFilters() {
+ when(encoder.getReverseFilters(TOPIC, "codedClass")).thenReturn(new ArrayList<>());
+ assertThat(coder.getReverseEncoderFilters(TOPIC, "codedClass")).isEmpty();
+ }
+
+ @Test
+ void getDroolsController() {
+ var fact = new Object();
+ // mock success
+ when(encoder.getDroolsController(TOPIC, fact))
+ .thenReturn(mock(DroolsController.class))
+ .thenCallRealMethod();
+ // mock failure
+ when(encoder.getDroolsControllers(TOPIC, fact)).thenReturn(new ArrayList<>());
+
+ // first call gets mock DroolsController - pass
+ assertNotNull(coder.getDroolsController(TOPIC, fact));
+ // second call goes through the method, then call inside method that returns empty list, throws an exception
+ assertThrows(IllegalArgumentException.class, () -> coder.getDroolsController(TOPIC, fact));
+ }
+
+ @Test
+ void getDroolsControllers() {
+ var fact = new Object();
+ when(encoder.getDroolsControllers(TOPIC, fact)).thenReturn(new ArrayList<>());
+
+ assertThat(coder.getDroolsControllers(TOPIC, fact)).isEmpty();
+ }
+
+ @Test
+ void testToString() {
+ assertThat(coder.toString())
+ .contains("MultiplexorEventProtocolCoder");
+ }
+} \ No newline at end of file
diff --git a/policy-management/src/test/java/org/onap/policy/drools/protocol/coders/ProtocolCoderToolsetTest.java b/policy-management/src/test/java/org/onap/policy/drools/protocol/coders/ProtocolCoderToolsetTest.java
index 659965f8..cb4397c8 100644
--- a/policy-management/src/test/java/org/onap/policy/drools/protocol/coders/ProtocolCoderToolsetTest.java
+++ b/policy-management/src/test/java/org/onap/policy/drools/protocol/coders/ProtocolCoderToolsetTest.java
@@ -22,11 +22,19 @@
package org.onap.policy.drools.protocol.coders;
import static org.assertj.core.api.Assertions.assertThat;
+import static org.assertj.core.api.Assertions.assertThatThrownBy;
import static org.junit.jupiter.api.Assertions.assertEquals;
import static org.junit.jupiter.api.Assertions.assertFalse;
import static org.junit.jupiter.api.Assertions.assertNotNull;
import static org.junit.jupiter.api.Assertions.assertNull;
import static org.junit.jupiter.api.Assertions.assertSame;
+import static org.junit.jupiter.api.Assertions.assertThrows;
+import static org.mockito.ArgumentMatchers.any;
+import static org.mockito.ArgumentMatchers.anyInt;
+import static org.mockito.ArgumentMatchers.anyString;
+import static org.mockito.Mockito.doCallRealMethod;
+import static org.mockito.Mockito.mock;
+import static org.mockito.Mockito.when;
import com.google.gson.Gson;
import com.google.gson.GsonBuilder;
@@ -53,6 +61,7 @@ import org.onap.policy.drools.protocol.coders.TopicCoderFilterConfiguration.Cust
import org.onap.policy.drools.util.KieUtils;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
+import org.springframework.test.util.ReflectionTestUtils;
/**
* ProtocolCoder Toolset Junits.
@@ -62,12 +71,12 @@ public class ProtocolCoderToolsetTest {
private static final String JUNIT_PROTOCOL_CODER_TOPIC = JUNIT_PROTOCOL_CODER_ARTIFACT_ID;
private static final String CONTROLLER_ID = "blah";
- private static final Logger logger = LoggerFactory.getLogger(ProtocolCoderToolset.class);
+ private static final Logger logger = LoggerFactory.getLogger(ProtocolCoderToolsetTest.class);
private static volatile ReleaseId releaseId;
// customCoder has to be public to be accessed in tests below
- public static final Gson customCoder = new GsonBuilder().create();
+ public static final Gson customCoder = new GsonBuilder().create(); // NOSONAR actually being used in the test
private DroolsController controller;
@@ -77,9 +86,9 @@ public class ProtocolCoderToolsetTest {
@BeforeAll
public static void setUpClass() throws IOException {
releaseId = KieUtils.installArtifact(Paths.get(MavenDroolsControllerTest.JUNIT_ECHO_KMODULE_PATH).toFile(),
- Paths.get(MavenDroolsControllerTest.JUNIT_ECHO_KMODULE_POM_PATH).toFile(),
- MavenDroolsControllerTest.JUNIT_ECHO_KJAR_DRL_PATH,
- Paths.get(MavenDroolsControllerTest.JUNIT_ECHO_KMODULE_DRL_PATH).toFile());
+ Paths.get(MavenDroolsControllerTest.JUNIT_ECHO_KMODULE_POM_PATH).toFile(),
+ MavenDroolsControllerTest.JUNIT_ECHO_KJAR_DRL_PATH,
+ Paths.get(MavenDroolsControllerTest.JUNIT_ECHO_KMODULE_DRL_PATH).toFile());
}
/**
@@ -105,6 +114,55 @@ public class ProtocolCoderToolsetTest {
testGsonToolset(createFilterSet());
}
+ @Test
+ void testExceptions() {
+ // should fail without params
+ assertThrows(IllegalArgumentException.class,
+ () -> new GsonProtocolCoderToolset(null, "controller"));
+
+ // should fail without controller ID
+ assertThrows(IllegalArgumentException.class,
+ () -> new GsonProtocolCoderToolset(mock(EventProtocolParams.class), ""));
+
+ // set mock under test - always call real method under test
+ var toolset = mock(GsonProtocolCoderToolset.class);
+ when(toolset.getCoder("")).thenCallRealMethod();
+
+ // should fail calling with empty classname
+ assertThatThrownBy(() -> toolset.getCoder(""))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("no classname provided");
+
+ // should fail when trying to add coder with empty event class
+ doCallRealMethod().when(toolset).addCoder(anyString(), any(JsonProtocolFilter.class), anyInt());
+ assertThatThrownBy(() -> toolset.addCoder("", mock(JsonProtocolFilter.class), 1))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("no event class provided");
+
+ // should fail when trying to remove coder with empty event
+ doCallRealMethod().when(toolset).removeCoders(anyString());
+ assertThatThrownBy(() -> toolset.removeCoders(""))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("no event class provided");
+
+ // set coders to empty list
+ when(toolset.filter(anyString())).thenCallRealMethod();
+ ReflectionTestUtils.setField(toolset, "coders", List.of());
+
+ // should fail when trying to find a filter from an empty list
+ assertThatThrownBy(() -> toolset.filter(""))
+ .isInstanceOf(IllegalStateException.class)
+ .hasMessageContaining("No coders available");
+
+ // there is a coder in the list, but can't check if accepts json when coder doesn't have filter
+ var mockCoderFilter = mock(CoderFilters.class);
+ when(mockCoderFilter.getFilter()).thenReturn(null);
+ ReflectionTestUtils.setField(toolset, "coders", List.of(mockCoderFilter));
+
+ assertNull(toolset.filter("json"));
+
+ }
+
/**
* Test the Gson toolset.
*
@@ -112,10 +170,10 @@ public class ProtocolCoderToolsetTest {
*/
private void testGsonToolset(JsonProtocolFilter protocolFilter) {
GsonProtocolCoderToolset gsonToolset =
- new GsonProtocolCoderToolset(EventProtocolParams.builder().topic(JUNIT_PROTOCOL_CODER_TOPIC)
- .groupId(releaseId.getGroupId()).artifactId(releaseId.getArtifactId())
- .eventClass(ThreeStrings.class.getName()).protocolFilter(protocolFilter)
- .customGsonCoder(null).modelClassLoaderHash(12345678).build(), CONTROLLER_ID);
+ new GsonProtocolCoderToolset(EventProtocolParams.builder().topic(JUNIT_PROTOCOL_CODER_TOPIC)
+ .groupId(releaseId.getGroupId()).artifactId(releaseId.getArtifactId())
+ .eventClass(ThreeStrings.class.getName()).protocolFilter(protocolFilter)
+ .customGsonCoder(null).modelClassLoaderHash(12345678).build(), CONTROLLER_ID);
assertNotNull(gsonToolset.getEncoder());
assertNotNull(gsonToolset.getDecoder());
@@ -154,7 +212,7 @@ public class ProtocolCoderToolsetTest {
}
private void decode(JsonProtocolFilter protocolFilter, ProtocolCoderToolset coderToolset,
- ThreeStrings triple, String tripleEncoded) {
+ ThreeStrings triple, String tripleEncoded) {
try {
coderToolset.decode(tripleEncoded);
@@ -212,7 +270,7 @@ public class ProtocolCoderToolsetTest {
assertNotNull(coderToolset.getCoder(ThreeStrings.class.getName()).getFilter().getRule());
assertEquals("[?($.third =~ /.*/)]",
- coderToolset.getCoder(ThreeStrings.class.getName()).getFilter().getRule());
+ coderToolset.getCoder(ThreeStrings.class.getName()).getFilter().getRule());
}
private void validateInitialization(JsonProtocolFilter protocolFilter, ProtocolCoderToolset coderToolset) {
@@ -241,16 +299,21 @@ public class ProtocolCoderToolsetTest {
sinkConfig.put(PolicyEndPointProperties.PROPERTY_NOOP_SINK_TOPICS, JUNIT_PROTOCOL_CODER_TOPIC);
final List<TopicSink> noopTopics = TopicEndpointManager.getManager().addTopicSinks(sinkConfig);
+ Properties droolsControllerConfig = getDroolsControllerConfig();
+
+ return DroolsControllerConstants.getFactory().build(droolsControllerConfig, null, noopTopics);
+ }
+
+ private static Properties getDroolsControllerConfig() {
Properties droolsControllerConfig = new Properties();
droolsControllerConfig.put(DroolsPropertyConstants.RULES_GROUPID, releaseId.getGroupId());
droolsControllerConfig.put(DroolsPropertyConstants.RULES_ARTIFACTID, releaseId.getArtifactId());
droolsControllerConfig.put(DroolsPropertyConstants.RULES_VERSION, releaseId.getVersion());
droolsControllerConfig.put(
- PolicyEndPointProperties.PROPERTY_NOOP_SINK_TOPICS + "." + JUNIT_PROTOCOL_CODER_TOPIC
- + PolicyEndPointProperties.PROPERTY_TOPIC_EVENTS_SUFFIX,
- ThreeStrings.class.getName());
-
- return DroolsControllerConstants.getFactory().build(droolsControllerConfig, null, noopTopics);
+ PolicyEndPointProperties.PROPERTY_NOOP_SINK_TOPICS + "." + JUNIT_PROTOCOL_CODER_TOPIC
+ + PolicyEndPointProperties.PROPERTY_TOPIC_EVENTS_SUFFIX,
+ ThreeStrings.class.getName());
+ return droolsControllerConfig;
}
private JsonProtocolFilter createFilterSet() {
diff --git a/policy-management/src/test/java/org/onap/policy/drools/protocol/coders/TopicCoderFilterConfigurationTest.java b/policy-management/src/test/java/org/onap/policy/drools/protocol/coders/TopicCoderFilterConfigurationTest.java
new file mode 100644
index 00000000..5429a94e
--- /dev/null
+++ b/policy-management/src/test/java/org/onap/policy/drools/protocol/coders/TopicCoderFilterConfigurationTest.java
@@ -0,0 +1,75 @@
+/*-
+ * ============LICENSE_START===============================================
+ * ONAP
+ * ========================================================================
+ * Copyright (C) 2024 Nordix Foundation.
+ * ========================================================================
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ * ============LICENSE_END=================================================
+ */
+
+package org.onap.policy.drools.protocol.coders;
+
+import static org.assertj.core.api.Assertions.assertThatThrownBy;
+import static org.junit.jupiter.api.Assertions.assertEquals;
+import static org.junit.jupiter.api.Assertions.assertNotNull;
+
+import java.util.List;
+import org.junit.jupiter.api.Test;
+
+class TopicCoderFilterConfigurationTest {
+
+ @Test
+ void setCustomGsonCoder() {
+ var topic = "topic";
+ var decodeFilter = new TopicCoderFilterConfiguration
+ .PotentialCoderFilter("codedClass", new JsonProtocolFilter("rule"));
+ var customCoder = new TopicCoderFilterConfiguration
+ .CustomGsonCoder("className", "staticCoderField");
+ var topicConfig = new TopicCoderFilterConfiguration(topic, List.of(decodeFilter), customCoder);
+
+ assertNotNull(topicConfig);
+ assertNotNull(topicConfig.getCoderFilters());
+ assertEquals("topic", topicConfig.getTopic());
+
+ assertEquals("className", topicConfig.getCustomGsonCoder().getClassContainer());
+
+ var customCoder2 = new TopicCoderFilterConfiguration.CustomGsonCoder("className2,staticCoderField2");
+ topicConfig.setCustomGsonCoder(customCoder2);
+
+ assertEquals("className2", topicConfig.getCustomGsonCoder().getClassContainer());
+ }
+
+ @Test
+ void setCustomCoder_Exceptions() {
+ assertThatThrownBy(() -> new TopicCoderFilterConfiguration.CustomGsonCoder("", "staticCoderField"))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("No classname to create CustomCoder cannot be created");
+
+ assertThatThrownBy(() -> new TopicCoderFilterConfiguration.CustomGsonCoder("className", ""))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("No staticCoderField to create CustomCoder cannot be created for class className");
+
+ assertThatThrownBy(() -> new TopicCoderFilterConfiguration.CustomGsonCoder(",staticCoderField"))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("No classname to create CustomCoder cannot be created");
+
+ assertThatThrownBy(() -> new TopicCoderFilterConfiguration.CustomGsonCoder("className,"))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("No staticCoderField to create CustomCoder cannot be created for class className");
+
+ assertThatThrownBy(() -> new TopicCoderFilterConfiguration.CustomGsonCoder(""))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("Constructor argument cannot be empty.");
+ }
+} \ No newline at end of file
diff --git a/policy-management/src/test/java/org/onap/policy/drools/server/restful/test/RestManagerTest.java b/policy-management/src/test/java/org/onap/policy/drools/server/restful/test/RestManagerTest.java
index 6a17f269..1ceff3d0 100644
--- a/policy-management/src/test/java/org/onap/policy/drools/server/restful/test/RestManagerTest.java
+++ b/policy-management/src/test/java/org/onap/policy/drools/server/restful/test/RestManagerTest.java
@@ -127,7 +127,6 @@ public class RestManagerTest {
Properties controllerProps = new Properties();
PolicyEngineConstants.getManager().createPolicyController(FOO_CONTROLLER, controllerProps);
- // client = HttpClients.createDefault();
CredentialsProvider provider = new BasicCredentialsProvider();
UsernamePasswordCredentials credentials = new UsernamePasswordCredentials(TELEMETRY_USER, TELEMETRY_PASSWORD);
provider.setCredentials(AuthScope.ANY, credentials);
@@ -249,7 +248,7 @@ public class RestManagerTest {
private void requestTest(HttpRequestBase request, int statusCode) throws IOException {
CloseableHttpResponse resp = client.execute(request);
- logger.info(request.getRequestLine() + "response code: {}", resp.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", request.getRequestLine(), resp.getStatusLine().getStatusCode());
assertEquals(statusCode, resp.getStatusLine().getStatusCode());
request.releaseConnection();
}
@@ -291,13 +290,13 @@ public class RestManagerTest {
CloseableHttpResponse response;
httpGet = new HttpGet(HOST_URL + "/engine/swagger");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
}
@Test
- void testGet() throws IOException {
+ void testGetEngine() throws IOException {
HttpGet httpGet;
CloseableHttpResponse response;
@@ -306,45 +305,46 @@ public class RestManagerTest {
* /engine/inputs /engine/properties /engine/environment /engine/switches
* /engine/controllers
*/
+
httpGet = new HttpGet(HOST_URL + "/engine");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/features");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/features/inventory");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/features/foobar");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(404, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/inputs");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/properties");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/environment");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
@@ -352,26 +352,32 @@ public class RestManagerTest {
httpGet = new HttpGet(HOST_URL + "/engine/environment/foo");
response = client.execute(httpGet);
String responseBody = this.getResponseBody(response);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
- logger.info(httpGet.getRequestLine() + " response body: {}", responseBody);
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
+ logger.info("{} response body: {}", httpGet.getRequestLine(), responseBody);
assertEquals(200, response.getStatusLine().getStatusCode());
assertEquals("bar", responseBody);
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/switches");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/controllers");
response = client.execute(httpGet);
responseBody = this.getResponseBody(response);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
- logger.info(httpGet.getRequestLine() + " response body: {}", responseBody);
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
+ logger.info("{} response body: {}", httpGet.getRequestLine(), responseBody);
assertEquals(200, response.getStatusLine().getStatusCode());
assertEquals("[\"" + FOO_CONTROLLER + "\"]", responseBody);
httpGet.releaseConnection();
+ }
+
+ @Test
+ void testGet_EngineControllers() throws IOException {
+ HttpGet httpGet;
+ CloseableHttpResponse response;
/*
* GET: /engine/controllers/inventory /engine/controllers/features
@@ -381,39 +387,46 @@ public class RestManagerTest {
*/
httpGet = new HttpGet(HOST_URL + "/engine/controllers/inventory");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/controllers/features");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/controllers/features/inventory");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/controllers/features/dummy");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(404, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/controllers/" + FOO_CONTROLLER);
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/controllers/nonexistantcontroller");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(404, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
+ }
+
+ @Test
+ void testGet() throws IOException {
+ HttpGet httpGet;
+ CloseableHttpResponse response;
+ String responseBody;
/*
* GET: /engine/controllers/controllerName/properties
@@ -423,52 +436,45 @@ public class RestManagerTest {
httpGet = new HttpGet(HOST_URL + "/engine/controllers/" + FOO_CONTROLLER + "/properties");
response = client.execute(httpGet);
responseBody = this.getResponseBody(response);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
- logger.info(httpGet.getRequestLine() + " response code: {}", responseBody);
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), responseBody);
assertEquals(200, response.getStatusLine().getStatusCode());
assertEquals("{}", responseBody);
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/controllers/nonexistantcontroller/properties");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(404, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/controllers/" + FOO_CONTROLLER + "/inputs");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/controllers/" + FOO_CONTROLLER + "/switches");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/controllers/" + FOO_CONTROLLER + "/drools");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/controllers/nonexistantcontroller/drools");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(404, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
-
- testGetDroolsControllers();
-
- testGetControllersDecoders();
-
- testGetTopics();
-
- testGetEngineTools();
}
- private static void testGetDroolsControllers() throws IOException {
+ @Test
+ void testGetDroolsControllers() throws IOException {
CloseableHttpResponse response;
HttpGet httpGet;
/*
@@ -480,43 +486,44 @@ public class RestManagerTest {
*/
httpGet = new HttpGet(HOST_URL + "/engine/controllers/" + FOO_CONTROLLER + "/drools/facts");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/controllers/nonexistantcontroller/drools/facts");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(404, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/controllers/" + FOO_CONTROLLER + "/drools/facts/session");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/controllers/" + FOO_CONTROLLER + "/drools/facts/session/factType");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(
HOST_URL + "/engine/controllers/" + FOO_CONTROLLER + "/drools/facts/session/query/queriedEntity");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/controllers/dummy" + "/drools/facts/session/query/queriedEntity");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(404, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
}
- private static void testGetEngineTools() throws IOException {
+ @Test
+ void testGetEngineTools() throws IOException {
CloseableHttpResponse response;
HttpGet httpGet;
/*
@@ -524,24 +531,25 @@ public class RestManagerTest {
*/
httpGet = new HttpGet(HOST_URL + "/engine/tools/uuid");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/tools/loggers");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/tools/loggers/ROOT");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
}
- private static void testGetControllersDecoders() throws IOException {
+ @Test
+ void testGetControllersDecoders() throws IOException {
HttpGet httpGet;
CloseableHttpResponse response;
/*
@@ -556,68 +564,69 @@ public class RestManagerTest {
*/
httpGet = new HttpGet(HOST_URL + "/engine/controllers/" + FOO_CONTROLLER + "/decoders");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/controllers/nonexistantcontroller/decoders");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(404, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/controllers/" + FOO_CONTROLLER + "/decoders/filters");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/controllers/nonexistantcontroller/decoders/filters");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(404, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/controllers/" + FOO_CONTROLLER + "/decoders/topic");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(404, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/controllers/" + FOO_CONTROLLER + "/decoders/topic/filters");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(404, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/controllers/" + FOO_CONTROLLER + "/decoders/topic/filters/factType");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(404, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(
HOST_URL + "/engine/controllers/" + FOO_CONTROLLER + "/decoders/topic/filters/factType/rules");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(404, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(
HOST_URL + "/engine/controllers/" + FOO_CONTROLLER + "/decoders/topic/filters/factType/rules/ruleName");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(404, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/controllers/" + FOO_CONTROLLER + "/encoders");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
}
- private static void testGetTopics() throws IOException {
+ @Test
+ void testGetKafkaTopics() throws IOException {
CloseableHttpResponse response;
HttpGet httpGet;
/*
@@ -635,169 +644,186 @@ public class RestManagerTest {
*/
httpGet = new HttpGet(HOST_URL + "/engine/topics");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/topics/switches");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/topics/sources");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/topics/sinks");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/topics/sources/kafka");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/topics/sinks/kafka");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
- httpGet = new HttpGet(HOST_URL + "/engine/topics/sources/noop");
+ httpGet = new HttpGet(HOST_URL + "/engine/topics/sources/kafka/" + KAFKA_TOPIC);
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
- httpGet = new HttpGet(HOST_URL + "/engine/topics/sinks/noop");
+ httpGet = new HttpGet(HOST_URL + "/engine/topics/sources/kafka/foobar");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
- assertEquals(200, response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
+ assertEquals(500, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
- httpGet = new HttpGet(HOST_URL + "/engine/topics/sources/kafka/" + KAFKA_TOPIC);
+ httpGet = new HttpGet(HOST_URL + "/engine/topics/sinks/kafka/" + KAFKA_TOPIC);
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
- httpGet = new HttpGet(HOST_URL + "/engine/topics/sources/kafka/foobar");
+ httpGet = new HttpGet(HOST_URL + "/engine/topics/sinks/kafka/foobar");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(500, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
- httpGet = new HttpGet(HOST_URL + "/engine/topics/sinks/kafka/" + KAFKA_TOPIC);
+ httpGet = new HttpGet(HOST_URL + "/engine/topics/sources/kafka/" + KAFKA_TOPIC + "/events");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
- httpGet = new HttpGet(HOST_URL + "/engine/topics/sinks/kafka/foobar");
+ httpGet = new HttpGet(HOST_URL + "/engine/topics/sources/kafka/foobar/events");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(500, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
- httpGet = new HttpGet(HOST_URL + "/engine/topics/sources/noop/" + NOOP_TOPIC);
+ httpGet = new HttpGet(HOST_URL + "/engine/topics/sinks/kafka/" + KAFKA_TOPIC + "/events");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
- httpGet = new HttpGet(HOST_URL + "/engine/topics/sources/noop/foobar");
+ httpGet = new HttpGet(HOST_URL + "/engine/topics/sinks/kafka/foobar/events");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(500, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
- httpGet = new HttpGet(HOST_URL + "/engine/topics/sinks/noop/" + NOOP_TOPIC);
+ httpGet = new HttpGet(HOST_URL + "/engine/topics/sources/kafka/" + KAFKA_TOPIC + "/switches");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
- httpGet = new HttpGet(HOST_URL + "/engine/topics/sinks/noop/foobar");
+ httpGet = new HttpGet(HOST_URL + "/engine/topics/sinks/kafka/" + KAFKA_TOPIC + "/switches");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
- assertEquals(500, response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
+ assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
+ }
- httpGet = new HttpGet(HOST_URL + "/engine/topics/sources/kafka/" + KAFKA_TOPIC + "/events");
+ @Test
+ void testGetNoopTopics() throws IOException {
+ CloseableHttpResponse response;
+ HttpGet httpGet;
+ /*
+ * GET: /engine/topics
+ * /engine/topics/sources/noop
+ * /engine/topics/sinks/noop
+ * /engine/topics/sources/noop/topic
+ * /engine/topics/sinks/noop/topic
+ * /engine/topics/sources/noop/topic/events
+ * /engine/topics/sinks/noop/topic/events
+ * /engine/topics/sources/noop/topic/switches
+ * /engine/topics/sinks/noop/topic/switches
+ */
+
+ httpGet = new HttpGet(HOST_URL + "/engine/topics/sources/noop");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
- httpGet = new HttpGet(HOST_URL + "/engine/topics/sources/kafka/foobar/events");
+ httpGet = new HttpGet(HOST_URL + "/engine/topics/sinks/noop");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
- assertEquals(500, response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
+ assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
- httpGet = new HttpGet(HOST_URL + "/engine/topics/sinks/kafka/" + KAFKA_TOPIC + "/events");
+ httpGet = new HttpGet(HOST_URL + "/engine/topics/sources/noop/" + NOOP_TOPIC);
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
- httpGet = new HttpGet(HOST_URL + "/engine/topics/sinks/kafka/foobar/events");
+ httpGet = new HttpGet(HOST_URL + "/engine/topics/sources/noop/foobar");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(500, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
- httpGet = new HttpGet(HOST_URL + "/engine/topics/sources/noop/" + NOOP_TOPIC + "/events");
+ httpGet = new HttpGet(HOST_URL + "/engine/topics/sinks/noop/" + NOOP_TOPIC);
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
- httpGet = new HttpGet(HOST_URL + "/engine/topics/sources/noop/foobar/events");
+ httpGet = new HttpGet(HOST_URL + "/engine/topics/sinks/noop/foobar");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(500, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
- httpGet = new HttpGet(HOST_URL + "/engine/topics/sinks/noop/" + NOOP_TOPIC + "/events");
+ httpGet = new HttpGet(HOST_URL + "/engine/topics/sources/noop/" + NOOP_TOPIC + "/events");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
- httpGet = new HttpGet(HOST_URL + "/engine/topics/sinks/noop/foobar/events");
+ httpGet = new HttpGet(HOST_URL + "/engine/topics/sources/noop/foobar/events");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(500, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
- httpGet = new HttpGet(HOST_URL + "/engine/topics/sources/kafka/" + KAFKA_TOPIC + "/switches");
+ httpGet = new HttpGet(HOST_URL + "/engine/topics/sinks/noop/" + NOOP_TOPIC + "/events");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
- httpGet = new HttpGet(HOST_URL + "/engine/topics/sources/noop/" + NOOP_TOPIC + "/switches");
+ httpGet = new HttpGet(HOST_URL + "/engine/topics/sinks/noop/foobar/events");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
- assertEquals(200, response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
+ assertEquals(500, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
- httpGet = new HttpGet(HOST_URL + "/engine/topics/sinks/kafka/" + KAFKA_TOPIC + "/switches");
+ httpGet = new HttpGet(HOST_URL + "/engine/topics/sources/noop/" + NOOP_TOPIC + "/switches");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
httpGet = new HttpGet(HOST_URL + "/engine/topics/sinks/noop/" + NOOP_TOPIC + "/switches");
response = client.execute(httpGet);
- logger.info(httpGet.getRequestLine() + " response code: {}", response.getStatusLine().getStatusCode());
+ logger.info("{} response code: {}", httpGet.getRequestLine(), response.getStatusLine().getStatusCode());
assertEquals(200, response.getStatusLine().getStatusCode());
httpGet.releaseConnection();
}
diff --git a/policy-management/src/test/java/org/onap/policy/drools/stats/PolicyStatsManagerTest.java b/policy-management/src/test/java/org/onap/policy/drools/stats/PolicyStatsManagerTest.java
index 118c4d7e..c13a4664 100644
--- a/policy-management/src/test/java/org/onap/policy/drools/stats/PolicyStatsManagerTest.java
+++ b/policy-management/src/test/java/org/onap/policy/drools/stats/PolicyStatsManagerTest.java
@@ -21,6 +21,7 @@
package org.onap.policy.drools.stats;
+import static org.assertj.core.api.Assertions.assertThatThrownBy;
import static org.junit.jupiter.api.Assertions.assertEquals;
import org.junit.jupiter.api.Test;
@@ -42,4 +43,17 @@ class PolicyStatsManagerTest {
assertEquals(1, stats.getSubgroupStats().get("foo").getPolicyExecutedFailCount());
assertEquals(2, stats.getSubgroupStats().get("blah").getPolicyExecutedFailCount());
}
+
+ @Test
+ void test_Exceptions() {
+ PolicyStatsManager stats = new PolicyStatsManager();
+ assertThatThrownBy(() -> stats.stat("foo", null))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("transaction is marked non-null but is nul");
+
+ Metric trans = new Metric();
+ assertThatThrownBy(() -> stats.stat(null, trans))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("subGroupName is marked non-null but is null");
+ }
} \ No newline at end of file
diff --git a/policy-management/src/test/java/org/onap/policy/drools/stats/PolicyStatsTest.java b/policy-management/src/test/java/org/onap/policy/drools/stats/PolicyStatsTest.java
index 3f26e82e..6b76837d 100644
--- a/policy-management/src/test/java/org/onap/policy/drools/stats/PolicyStatsTest.java
+++ b/policy-management/src/test/java/org/onap/policy/drools/stats/PolicyStatsTest.java
@@ -22,6 +22,7 @@
package org.onap.policy.drools.stats;
import static org.assertj.core.api.Assertions.assertThat;
+import static org.assertj.core.api.Assertions.assertThatThrownBy;
import static org.junit.jupiter.api.Assertions.assertEquals;
import org.junit.jupiter.api.Test;
@@ -74,6 +75,14 @@ class PolicyStatsTest {
assertThat(stats.getBirthTime()).isLessThanOrEqualTo(trans2.getStartTime().toEpochMilli());
}
+ @Test
+ void test_Exception() {
+ PolicyStats stats = new PolicyStats();
+ assertThatThrownBy(() -> stats.stat(null))
+ .isInstanceOf(IllegalArgumentException.class)
+ .hasMessageContaining("trans is marked non-null but is null");
+ }
+
private Metric createTrans() {
Metric trans = new Metric();
trans.setStartTime(null);
diff --git a/policy-management/src/test/java/org/onap/policy/drools/system/PolicyControllerFactoryTest.java b/policy-management/src/test/java/org/onap/policy/drools/system/PolicyControllerFactoryTest.java
index 615ffe2b..8a388dfc 100644
--- a/policy-management/src/test/java/org/onap/policy/drools/system/PolicyControllerFactoryTest.java
+++ b/policy-management/src/test/java/org/onap/policy/drools/system/PolicyControllerFactoryTest.java
@@ -35,7 +35,6 @@ import static org.mockito.Mockito.when;
import static org.onap.policy.drools.properties.DroolsPropertyConstants.PROPERTY_CONTROLLER_TYPE;
import java.util.Arrays;
-import java.util.Collections;
import java.util.Comparator;
import java.util.List;
import java.util.Properties;
@@ -504,9 +503,9 @@ class PolicyControllerFactoryTest {
@Override
public DroolsController beforeInstance(Properties properties,
- String groupId, String artifactId, String version,
- List<TopicCoderFilterConfiguration> decoderConfigurations,
- List<TopicCoderFilterConfiguration> encoderConfigurations) {
+ String groupId, String artifactId, String version,
+ List<TopicCoderFilterConfiguration> decoderConfigurations,
+ List<TopicCoderFilterConfiguration> encoderConfigurations) {
if (POLICY_CONTROLLER_BUILDER_TAG.equals(properties.getProperty(PROPERTY_CONTROLLER_TYPE))) {
return new NullDroolsController();
diff --git a/policy-management/src/test/java/org/onap/policy/drools/system/PolicyEngineManagerTest.java b/policy-management/src/test/java/org/onap/policy/drools/system/PolicyEngineManagerTest.java
index 8dae42e2..0b88b3f1 100644
--- a/policy-management/src/test/java/org/onap/policy/drools/system/PolicyEngineManagerTest.java
+++ b/policy-management/src/test/java/org/onap/policy/drools/system/PolicyEngineManagerTest.java
@@ -731,7 +731,7 @@ class PolicyEngineManagerTest {
}
@Test
- void testUpdatePolicyController() throws Exception {
+ void testUpdatePolicyController_Exceptions() throws Exception {
assertEquals(controller3, mgr.updatePolicyController(config3));
verify(engine).createPolicyController(CONTROLLER3, properties);
@@ -775,7 +775,10 @@ class PolicyEngineManagerTest {
setUp();
when(persist.getControllerProperties(CONTROLLER3)).thenThrow(new LinkageError(EXPECTED));
assertThatIllegalStateException().isThrownBy(() -> mgr.updatePolicyController(config3));
+ }
+ @Test
+ void testUpdatePolicyController() throws Exception {
/*
* For remaining tests, the factory will return the controller instead of creating
* one.
@@ -954,14 +957,7 @@ class PolicyEngineManagerTest {
assertTrue(mgr.stop());
verify(prov1).beforeStop(mgr);
verify(prov2).beforeStop(mgr);
- verify(controller, never()).stop();
- verify(source1, never()).stop();
- verify(sink1, never()).stop();
- verify(endpoint, never()).stop();
- verify(server1, never()).stop();
- verify(client1, never()).stop();
- verify(prov1, never()).afterStop(mgr);
- verify(prov2, never()).afterStop(mgr);
+ verifyNeverCalled();
// controller fails to stop - still does everything
testStop(false, () -> when(controller.stop()).thenReturn(false));
@@ -1999,6 +1995,17 @@ class PolicyEngineManagerTest {
assertThatThrownBy(() -> verifyAfter.accept(prov2)).isInstanceOf(AssertionError.class);
}
+ private void verifyNeverCalled() {
+ verify(controller, never()).stop();
+ verify(source1, never()).stop();
+ verify(sink1, never()).stop();
+ verify(endpoint, never()).stop();
+ verify(server1, never()).stop();
+ verify(client1, never()).stop();
+ verify(prov1, never()).afterStop(mgr);
+ verify(prov2, never()).afterStop(mgr);
+ }
+
/**
* Manager with overrides.
*/
diff --git a/policy-management/src/test/java/org/onap/policy/drools/system/internal/FeatureLockImplTest.java b/policy-management/src/test/java/org/onap/policy/drools/system/internal/FeatureLockImplTest.java
index 8a10c516..6d2380f0 100644
--- a/policy-management/src/test/java/org/onap/policy/drools/system/internal/FeatureLockImplTest.java
+++ b/policy-management/src/test/java/org/onap/policy/drools/system/internal/FeatureLockImplTest.java
@@ -213,22 +213,6 @@ class FeatureLockImplTest {
verify(callback, never()).lockUnavailable(any());
}
- /**
- * Tests doNotify() when there is no session.
- */
- @Test
- void testDoNotifyNoSession() {
- MyLock lock = new MyLock(LockState.WAITING, RESOURCE, OWNER_KEY, HOLD_SEC, callback);
- lock.grant();
-
- assertTrue(lock.isActive());
- assertEquals(1, lock.nupdates);
-
- invokeCallback();
- verify(callback).lockAvailable(any());
- verify(callback, never()).lockUnavailable(any());
- }
-
@Test
void testFreeAllowed() {
MyLock lock = new MyLock(LockState.WAITING, RESOURCE, OWNER_KEY, HOLD_SEC, callback);