diff options
Diffstat (limited to 'pkg/utils')
-rw-r--r-- | pkg/utils/sort.go | 41 | ||||
-rw-r--r-- | pkg/utils/utils.go | 215 | ||||
-rw-r--r-- | pkg/utils/utils_test.go | 149 |
3 files changed, 347 insertions, 58 deletions
diff --git a/pkg/utils/sort.go b/pkg/utils/sort.go new file mode 100644 index 0000000..d59ea2a --- /dev/null +++ b/pkg/utils/sort.go @@ -0,0 +1,41 @@ +// - +// ========================LICENSE_START================================= +// Copyright (C) 2025: Deutsche Telekom +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. +// SPDX-License-Identifier: Apache-2.0 +// ========================LICENSE_END=================================== + +package utils + +import ( + "strings" +) + +// Custom type for sorting +type ByDotCount struct { + Keys []string + Ascend bool +} + +// Implement sort.Interface for ByDotCount +func (a ByDotCount) Len() int { return len(a.Keys) } + +func (a ByDotCount) Swap(i, j int) { a.Keys[i], a.Keys[j] = a.Keys[j], a.Keys[i] } + +func (a ByDotCount) Less(i, j int) bool { + if a.Ascend { + return strings.Count(a.Keys[i], ".") < strings.Count(a.Keys[j], ".") + } + return strings.Count(a.Keys[i], ".") > strings.Count(a.Keys[j], ".") +} diff --git a/pkg/utils/utils.go b/pkg/utils/utils.go index 23f9cfe..fba1fb1 100644 --- a/pkg/utils/utils.go +++ b/pkg/utils/utils.go @@ -16,7 +16,7 @@ // SPDX-License-Identifier: Apache-2.0 // ========================LICENSE_END=================================== -// Package utils provides common functionalities +// Package provides common functionalities package utils @@ -30,6 +30,7 @@ import ( "policy-opa-pdp/consts" "policy-opa-pdp/pkg/log" "policy-opa-pdp/pkg/model" + "policy-opa-pdp/pkg/model/oapicodegen" "regexp" "strings" "time" @@ -41,6 +42,7 @@ type ( var ( CreateDirectoryVar CreateDirectoryFunc = CreateDirectory + removeAll = os.RemoveAll ) // validates if the given request is in valid uuid form @@ -63,42 +65,60 @@ func CreateDirectory(dirPath string) error { // Helper function to check and remove a directory func RemoveDirectory(dirPath string) error { - entries, err := os.ReadDir(dirPath) + fileDirPath := filepath.Clean(dirPath) + err := removeAll(fileDirPath) if err != nil { if os.IsNotExist(err) { - log.Warnf("Directory does not exist: %s", dirPath) + log.Warnf("Directory does not exist: %s", fileDirPath) // Directory does not exist, nothing to do return nil } - return fmt.Errorf("failed to read directory: %w", err) + return fmt.Errorf("failed to remove file: %s, error: %w", fileDirPath, err) + } - for _, entry := range entries { - entryPath := filepath.Join(dirPath, entry.Name()) + // Create a loop to check parent directories. + // Move to the parent directory + currentPath := filepath.Clean(filepath.Dir(dirPath)) + for { + // Check if we have reached the match path + if currentPath == filepath.Clean(consts.DataNode) || currentPath == filepath.Clean(consts.Policies) { + return nil // Stop if we reach the match path + } - if entry.IsDir() { - // Check if the subdirectory is empty and delete it - isEmpty, err := isDirEmpty(entryPath) - if err != nil { - return err - } - if isEmpty { - log.Debugf("Removing empty subdirectory: %s", entryPath) - if err := os.RemoveAll(entryPath); err != nil { - return fmt.Errorf("failed to remove directory: %s, error: %w", entryPath, err) - } - } - } else { - // Delete specific files in the parent directory - if entry.Name() == "data.json" || entry.Name() == "policy.rego" { - log.Debugf("Removing file: %s", entryPath) - if err := os.Remove(entryPath); err != nil { - return fmt.Errorf("failed to remove file: %s, error: %w", entryPath, err) - } - } + if currentPath == "/" || currentPath == "." { + log.Infof("Reached root orelative path: %s", currentPath) + return nil // Stop if we reach the match path + } + log.Infof("Processig Parent dir : %s", currentPath) + // Check if the parent directory exists before proceeding + if _, err := os.Stat(currentPath); os.IsNotExist(err) { + log.Debugf("directory does not exist: %s. Stopping iteration.", currentPath) + return nil // Stop if we can't find the parent path + } + // Clean the parent directory + err = isSubDirEmpty(currentPath) + if err != nil { + return err } + + // Move to the parent directory + currentPath = filepath.Dir(currentPath) } +} +func isSubDirEmpty(entryPath string) error { + + isEmpty, err := isDirEmpty(entryPath) + if err != nil { + return err + } + if isEmpty { + log.Debugf("Removing empty subdirectory: %s", entryPath) + if err := removeAll(entryPath); err != nil { + return fmt.Errorf("failed to remove directory: %s, error: %w", entryPath, err) + } + } return nil } @@ -144,7 +164,7 @@ func ValidateToscaPolicyJsonFields(policy model.ToscaPolicy) error { return fmt.Errorf("duplicate data key '%s' found, '%s'", key, emphasize) } keySeen[key] = true - if !strings.HasPrefix(key, "node." + policy.Name) { + if !strings.HasPrefix(key, "node."+policy.Name) { return fmt.Errorf("data key '%s' does not have name node.'%s' as a prefix, '%s'", key, policy.Name, emphasize) } } @@ -289,24 +309,27 @@ func IsValidCurrentTime(currentTime *string) bool { } // Custom validation function for *string type eg: OnapComponent, OnapInstance, OnapName, PolicyName -func IsValidString(name *string) bool { - if name == nil || strings.TrimSpace(*name) == "" { - return false - } else { - return true +func IsValidString(name interface{}) bool { + switch v := name.(type) { + case *string: + return v != nil && strings.TrimSpace(*v) != "" + case string: + return strings.TrimSpace(v) != "" + default: + return false // Handles cases where name is neither a string nor a *string } } func BuildBundle(cmdFunc func(string, ...string) *exec.Cmd) (string, error) { - cmd := cmdFunc( - consts.Opa, - consts.BuildBundle, - consts.V1_COMPATIBLE, - consts.Policies, - consts.Data, - consts.Output, - consts.BundleTarGzFile, - ) + cmd := cmdFunc( + consts.Opa, + consts.BuildBundle, + consts.V1Compatible, + consts.Policies, + consts.Data, + consts.Output, + consts.BundleTarGzFile, + ) log.Debugf("Before calling combinedoutput") output, err := cmd.CombinedOutput() @@ -318,3 +341,113 @@ func BuildBundle(cmdFunc func(string, ...string) *exec.Cmd) (string, error) { log.Debug("Bundle Built Sucessfully....") return string(output), nil } + +// Validation function +func ValidateOPADataRequest(request interface{}) []string { + var validationErrors []string + if updateRequest, ok := request.(*oapicodegen.OPADataUpdateRequest); ok { + if updateRequest == nil { // Check if updateRequest is nil + validationErrors = append(validationErrors, "OPADataUpdateRequest is nil") + return validationErrors // Return if the request is nil + } + // Check if required fields are populated + if updateRequest.CurrentDate != nil { + dateString := updateRequest.CurrentDate.String() + if !IsValidCurrentDate(&dateString) { + validationErrors = append(validationErrors, "CurrentDate is invalid") + } + } else { + validationErrors = append(validationErrors, "CurrentDate is required") + } + + // Validate CurrentDateTime format + if !(IsValidTime(updateRequest.CurrentDateTime)) { + validationErrors = append(validationErrors, "CurrentDateTime is invalid or missing") + } + + // Validate CurrentTime format + if !(IsValidCurrentTime(updateRequest.CurrentTime)) { + validationErrors = append(validationErrors, "CurrentTime is invalid or missing") + } + + // Validate TimeOffset format (e.g., +02:00 or -05:00) + if !(IsValidTimeOffset(updateRequest.TimeOffset)) { + validationErrors = append(validationErrors, "TimeOffset is invalid or missing") + } + + // Validate TimeZone format (e.g., 'America/New_York') + if !(IsValidTimeZone(updateRequest.TimeZone)) { + validationErrors = append(validationErrors, "TimeZone is invalid or missing") + } + + // Optionally, check if 'OnapComponent', 'OnapInstance', 'OnapName', and 'PolicyName' are provided + if !(IsValidString(updateRequest.OnapComponent)) { + validationErrors = append(validationErrors, "OnapComponent is required") + } + + if !(IsValidString(updateRequest.OnapInstance)) { + validationErrors = append(validationErrors, "OnapInstance is required") + } + + if !(IsValidString(updateRequest.OnapName)) { + validationErrors = append(validationErrors, "OnapName is required") + } + + if !(IsValidString(updateRequest.PolicyName)) { + validationErrors = append(validationErrors, "PolicyName is required and cannot be empty") + } + } + + if decisionRequest, ok := request.(*oapicodegen.OPADecisionRequest); ok { + + if decisionRequest == nil { // Check if decisionRequest is nil + validationErrors = append(validationErrors, "OPADecisionRequest is nil") + return validationErrors // Return if the request is nil + } + // Check if required fields are populated + if decisionRequest.CurrentDate != nil { + dateString := decisionRequest.CurrentDate.String() + if !IsValidCurrentDate(&dateString) { + validationErrors = append(validationErrors, "CurrentDate is invalid") + } + } + + // Validate CurrentDateTime format + if (decisionRequest.CurrentDateTime != nil) && !(IsValidTime(decisionRequest.CurrentDateTime)) { + validationErrors = append(validationErrors, "CurrentDateTime is invalid or missing") + } + + // Validate CurrentTime format + if (decisionRequest.CurrentTime != nil) && !(IsValidCurrentTime(decisionRequest.CurrentTime)) { + validationErrors = append(validationErrors, "CurrentTime is invalid or missing") + } + + // Validate TimeOffset format (e.g., +02:00 or -05:00) + if (decisionRequest.TimeOffset != nil) && !(IsValidTimeOffset(decisionRequest.TimeOffset)) { + validationErrors = append(validationErrors, "TimeOffset is invalid or missing") + } + + // Validate TimeZone format (e.g., 'America/New_York') + if (decisionRequest.TimeZone != nil) && !(IsValidTimeZone(decisionRequest.TimeZone)) { + validationErrors = append(validationErrors, "TimeZone is invalid or missing") + } + + // Optionally, check if 'OnapComponent', 'OnapInstance', 'OnapName', and 'PolicyName' are provided + if (decisionRequest.OnapComponent != nil) && !(IsValidString(decisionRequest.OnapComponent)) { + validationErrors = append(validationErrors, "OnapComponent is required") + } + + if (decisionRequest.OnapInstance != nil) && !(IsValidString(decisionRequest.OnapInstance)) { + validationErrors = append(validationErrors, "OnapInstance is required") + } + + if (decisionRequest.OnapName != nil) && !(IsValidString(decisionRequest.OnapName)) { + validationErrors = append(validationErrors, "OnapName is required") + } + + if !(IsValidString(decisionRequest.PolicyName)) { + validationErrors = append(validationErrors, "PolicyName is required and cannot be empty") + } + } + return validationErrors +} diff --git a/pkg/utils/utils_test.go b/pkg/utils/utils_test.go index 3a4948d..a76a435 100644 --- a/pkg/utils/utils_test.go +++ b/pkg/utils/utils_test.go @@ -19,12 +19,16 @@ package utils import ( + "fmt" "github.com/google/uuid" + openapi_types "github.com/oapi-codegen/runtime/types" "github.com/stretchr/testify/assert" + "github.com/stretchr/testify/require" "os" "os/exec" "path/filepath" "policy-opa-pdp/pkg/model" + "policy-opa-pdp/pkg/model/oapicodegen" "testing" "time" ) @@ -117,16 +121,12 @@ func TestRemoveDirectory_Positive(t *testing.T) { _, err = os.Stat(filePath) assert.True(t, os.IsNotExist(err), "Fle should be removed") - _, err = os.Stat(tempDir) - assert.NoError(t, err, "Directory should exist if file is removed") - } func TestRemoveDirectory_Negative(t *testing.T) { nonExistentDirectory := filepath.Join(os.TempDir(), "non_existent_directory") _, err := os.Stat(nonExistentDirectory) - assert.True(t, os.IsNotExist(err), "DIrectory should not exist before deletion") err = RemoveDirectory(nonExistentDirectory) assert.NoError(t, err) } @@ -145,8 +145,6 @@ func TestRemoveDirectory_ValidEmptyDir(t *testing.T) { _, err = os.Stat(subDir) assert.True(t, os.IsNotExist(err), "Expected directory to be deleted") - _, err = os.Stat(tempDir) - assert.NoError(t, err, "Directory should exist if file is removed") } // Test removing a directory that does not exist @@ -155,17 +153,6 @@ func TestRemoveDirectory_NonExistent(t *testing.T) { assert.NoError(t, err, "Expected no error when removing a non-existent directory") } -// Test failure scenario where ReadDir fails -func TestRemoveDirectory_ReadDirFailure(t *testing.T) { - // Create a file instead of a directory - tempFile, err := os.CreateTemp("", "testfile") - assert.NoError(t, err) - defer os.Remove(tempFile.Name()) - - err = RemoveDirectory(tempFile.Name()) // Should fail because it's a file, not a directory - assert.Error(t, err, "Expected an error when trying to remove a file as a directory") -} - // Test removing a directory containing only data.json and policy.rego func TestRemoveDirectory_WithSpecificFiles(t *testing.T) { tempDir, err := os.MkdirTemp("", "testdir") @@ -626,3 +613,131 @@ func TestBuildBundle_CommandFailure(t *testing.T) { t.Errorf("BuildBundle() error = nil, wantErr %v", output) } } + +// Test function for isSubDirEmpty using real directories +func TestIsSubDirEmpty(t *testing.T) { + // Create a temporary directory for testing + t.Run("Empty Directory - Should be removed", func(t *testing.T) { + tempDir, err := os.MkdirTemp("", "emptyDir") + require.NoError(t, err) + + // Call the function + err = isSubDirEmpty(tempDir) + + // Assert no error and directory should be removed + assert.NoError(t, err) + _, err = os.Stat(tempDir) + assert.True(t, os.IsNotExist(err)) // Directory should be gone + }) + + t.Run("Non-Empty Directory - Should not be removed", func(t *testing.T) { + tempDir, err := os.MkdirTemp("", "nonEmptyDir") + require.NoError(t, err) + + // Create a file inside to make the directory non-empty + _, err = os.CreateTemp(tempDir, "file") + require.NoError(t, err) + + // Call the function + err = isSubDirEmpty(tempDir) + + // Assert directory still exists + assert.NoError(t, err) + _, err = os.Stat(tempDir) + assert.NoError(t, err) // Directory should still exist + + // Clean up + os.RemoveAll(tempDir) + }) + + t.Run("Non-Existent Directory - Should return an error", func(t *testing.T) { + tempDir := "/path/that/does/not/exist" + + err := isSubDirEmpty(tempDir) + + // Assert error + assert.Error(t, err) + // assert.True(t, os.IsNotExist(err)) + }) + + t.Run("Error Removing Directory - Should return an error", func(t *testing.T) { + // Create a temporary directory + tempDir, err := os.MkdirTemp("", "errorDir") + require.NoError(t, err) + + // Mock removeAll to return an error + originalRemoveAll := removeAll + defer func() { removeAll = originalRemoveAll }() // Restore after test + + removeAll = func(path string) error { + return fmt.Errorf("failed to remove directory: %s", path) + } + + err = isSubDirEmpty(tempDir) + + // Assert error + assert.Error(t, err) + assert.Contains(t, err.Error(), "failed to remove directory") + + // Clean up + os.RemoveAll(tempDir) + }) +} + +func TestValidateOPADataRequest(t *testing.T) { + ctime := "08:26:41.857Z" + onapComp := "COMPONENT" + onapIns := "INSTANCE" + onapName := "ONAP" + policyName := "s3" + parsedDate, err := time.Parse("2006-01-02", "2024-02-12") + if err != nil { + fmt.Println("error in parsedDate") + } + currentDate := openapi_types.Date{Time: parsedDate} + currentDateTime, err := time.Parse(time.RFC3339, "2024-02-12T12:00:00Z") + if err != nil { + fmt.Println("error in currentDateTime") + } + + inValidDecisionRequest := &oapicodegen.OPADecisionRequest{ + CurrentDate: ¤tDate, + CurrentDateTime: ¤tDateTime, + } + + var data []map[string]interface{} + + data = nil + + inValidRequest := &oapicodegen.OPADataUpdateRequest{ + CurrentDate: ¤tDate, + CurrentDateTime: ¤tDateTime, + CurrentTime: &ctime, + OnapComponent: &onapComp, + OnapInstance: &onapIns, + OnapName: &onapName, + PolicyName: &policyName, + Data: &data, + } + + inValidErr := []string{"TimeOffset is invalid or missing", "TimeZone is invalid or missing"} + + inValidDecisionErrs := []string{"PolicyName is required and cannot be empty"} + tests := []struct { + name string + request interface{} + expectedErr []string + }{ + {"Valid Request", inValidRequest, inValidErr}, + {"Invalid OPADecisionRequest", inValidDecisionRequest, inValidDecisionErrs}, + } + + for _, tt := range tests { + t.Run(tt.name, func(t *testing.T) { + errors := ValidateOPADataRequest(tt.request) + fmt.Printf("error : %s", errors) + fmt.Printf("error len : %d", len(errors)) + assert.Equal(t, tt.expectedErr, errors) + }) + } +} |