aboutsummaryrefslogtreecommitdiffstats
path: root/pkg/utils
diff options
context:
space:
mode:
Diffstat (limited to 'pkg/utils')
-rw-r--r--pkg/utils/sort.go41
-rw-r--r--pkg/utils/utils.go215
-rw-r--r--pkg/utils/utils_test.go149
3 files changed, 347 insertions, 58 deletions
diff --git a/pkg/utils/sort.go b/pkg/utils/sort.go
new file mode 100644
index 0000000..d59ea2a
--- /dev/null
+++ b/pkg/utils/sort.go
@@ -0,0 +1,41 @@
+// -
+// ========================LICENSE_START=================================
+// Copyright (C) 2025: Deutsche Telekom
+//
+// Licensed under the Apache License, Version 2.0 (the "License");
+// you may not use this file except in compliance with the License.
+// You may obtain a copy of the License at
+//
+// http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing, software
+// distributed under the License is distributed on an "AS IS" BASIS,
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+// See the License for the specific language governing permissions and
+// limitations under the License.
+// SPDX-License-Identifier: Apache-2.0
+// ========================LICENSE_END===================================
+
+package utils
+
+import (
+ "strings"
+)
+
+// Custom type for sorting
+type ByDotCount struct {
+ Keys []string
+ Ascend bool
+}
+
+// Implement sort.Interface for ByDotCount
+func (a ByDotCount) Len() int { return len(a.Keys) }
+
+func (a ByDotCount) Swap(i, j int) { a.Keys[i], a.Keys[j] = a.Keys[j], a.Keys[i] }
+
+func (a ByDotCount) Less(i, j int) bool {
+ if a.Ascend {
+ return strings.Count(a.Keys[i], ".") < strings.Count(a.Keys[j], ".")
+ }
+ return strings.Count(a.Keys[i], ".") > strings.Count(a.Keys[j], ".")
+}
diff --git a/pkg/utils/utils.go b/pkg/utils/utils.go
index 23f9cfe..fba1fb1 100644
--- a/pkg/utils/utils.go
+++ b/pkg/utils/utils.go
@@ -16,7 +16,7 @@
// SPDX-License-Identifier: Apache-2.0
// ========================LICENSE_END===================================
-// Package utils provides common functionalities
+// Package provides common functionalities
package utils
@@ -30,6 +30,7 @@ import (
"policy-opa-pdp/consts"
"policy-opa-pdp/pkg/log"
"policy-opa-pdp/pkg/model"
+ "policy-opa-pdp/pkg/model/oapicodegen"
"regexp"
"strings"
"time"
@@ -41,6 +42,7 @@ type (
var (
CreateDirectoryVar CreateDirectoryFunc = CreateDirectory
+ removeAll = os.RemoveAll
)
// validates if the given request is in valid uuid form
@@ -63,42 +65,60 @@ func CreateDirectory(dirPath string) error {
// Helper function to check and remove a directory
func RemoveDirectory(dirPath string) error {
- entries, err := os.ReadDir(dirPath)
+ fileDirPath := filepath.Clean(dirPath)
+ err := removeAll(fileDirPath)
if err != nil {
if os.IsNotExist(err) {
- log.Warnf("Directory does not exist: %s", dirPath)
+ log.Warnf("Directory does not exist: %s", fileDirPath)
// Directory does not exist, nothing to do
return nil
}
- return fmt.Errorf("failed to read directory: %w", err)
+ return fmt.Errorf("failed to remove file: %s, error: %w", fileDirPath, err)
+
}
- for _, entry := range entries {
- entryPath := filepath.Join(dirPath, entry.Name())
+ // Create a loop to check parent directories.
+ // Move to the parent directory
+ currentPath := filepath.Clean(filepath.Dir(dirPath))
+ for {
+ // Check if we have reached the match path
+ if currentPath == filepath.Clean(consts.DataNode) || currentPath == filepath.Clean(consts.Policies) {
+ return nil // Stop if we reach the match path
+ }
- if entry.IsDir() {
- // Check if the subdirectory is empty and delete it
- isEmpty, err := isDirEmpty(entryPath)
- if err != nil {
- return err
- }
- if isEmpty {
- log.Debugf("Removing empty subdirectory: %s", entryPath)
- if err := os.RemoveAll(entryPath); err != nil {
- return fmt.Errorf("failed to remove directory: %s, error: %w", entryPath, err)
- }
- }
- } else {
- // Delete specific files in the parent directory
- if entry.Name() == "data.json" || entry.Name() == "policy.rego" {
- log.Debugf("Removing file: %s", entryPath)
- if err := os.Remove(entryPath); err != nil {
- return fmt.Errorf("failed to remove file: %s, error: %w", entryPath, err)
- }
- }
+ if currentPath == "/" || currentPath == "." {
+ log.Infof("Reached root orelative path: %s", currentPath)
+ return nil // Stop if we reach the match path
+ }
+ log.Infof("Processig Parent dir : %s", currentPath)
+ // Check if the parent directory exists before proceeding
+ if _, err := os.Stat(currentPath); os.IsNotExist(err) {
+ log.Debugf("directory does not exist: %s. Stopping iteration.", currentPath)
+ return nil // Stop if we can't find the parent path
+ }
+ // Clean the parent directory
+ err = isSubDirEmpty(currentPath)
+ if err != nil {
+ return err
}
+
+ // Move to the parent directory
+ currentPath = filepath.Dir(currentPath)
}
+}
+func isSubDirEmpty(entryPath string) error {
+
+ isEmpty, err := isDirEmpty(entryPath)
+ if err != nil {
+ return err
+ }
+ if isEmpty {
+ log.Debugf("Removing empty subdirectory: %s", entryPath)
+ if err := removeAll(entryPath); err != nil {
+ return fmt.Errorf("failed to remove directory: %s, error: %w", entryPath, err)
+ }
+ }
return nil
}
@@ -144,7 +164,7 @@ func ValidateToscaPolicyJsonFields(policy model.ToscaPolicy) error {
return fmt.Errorf("duplicate data key '%s' found, '%s'", key, emphasize)
}
keySeen[key] = true
- if !strings.HasPrefix(key, "node." + policy.Name) {
+ if !strings.HasPrefix(key, "node."+policy.Name) {
return fmt.Errorf("data key '%s' does not have name node.'%s' as a prefix, '%s'", key, policy.Name, emphasize)
}
}
@@ -289,24 +309,27 @@ func IsValidCurrentTime(currentTime *string) bool {
}
// Custom validation function for *string type eg: OnapComponent, OnapInstance, OnapName, PolicyName
-func IsValidString(name *string) bool {
- if name == nil || strings.TrimSpace(*name) == "" {
- return false
- } else {
- return true
+func IsValidString(name interface{}) bool {
+ switch v := name.(type) {
+ case *string:
+ return v != nil && strings.TrimSpace(*v) != ""
+ case string:
+ return strings.TrimSpace(v) != ""
+ default:
+ return false // Handles cases where name is neither a string nor a *string
}
}
func BuildBundle(cmdFunc func(string, ...string) *exec.Cmd) (string, error) {
- cmd := cmdFunc(
- consts.Opa,
- consts.BuildBundle,
- consts.V1_COMPATIBLE,
- consts.Policies,
- consts.Data,
- consts.Output,
- consts.BundleTarGzFile,
- )
+ cmd := cmdFunc(
+ consts.Opa,
+ consts.BuildBundle,
+ consts.V1Compatible,
+ consts.Policies,
+ consts.Data,
+ consts.Output,
+ consts.BundleTarGzFile,
+ )
log.Debugf("Before calling combinedoutput")
output, err := cmd.CombinedOutput()
@@ -318,3 +341,113 @@ func BuildBundle(cmdFunc func(string, ...string) *exec.Cmd) (string, error) {
log.Debug("Bundle Built Sucessfully....")
return string(output), nil
}
+
+// Validation function
+func ValidateOPADataRequest(request interface{}) []string {
+ var validationErrors []string
+ if updateRequest, ok := request.(*oapicodegen.OPADataUpdateRequest); ok {
+ if updateRequest == nil { // Check if updateRequest is nil
+ validationErrors = append(validationErrors, "OPADataUpdateRequest is nil")
+ return validationErrors // Return if the request is nil
+ }
+ // Check if required fields are populated
+ if updateRequest.CurrentDate != nil {
+ dateString := updateRequest.CurrentDate.String()
+ if !IsValidCurrentDate(&dateString) {
+ validationErrors = append(validationErrors, "CurrentDate is invalid")
+ }
+ } else {
+ validationErrors = append(validationErrors, "CurrentDate is required")
+ }
+
+ // Validate CurrentDateTime format
+ if !(IsValidTime(updateRequest.CurrentDateTime)) {
+ validationErrors = append(validationErrors, "CurrentDateTime is invalid or missing")
+ }
+
+ // Validate CurrentTime format
+ if !(IsValidCurrentTime(updateRequest.CurrentTime)) {
+ validationErrors = append(validationErrors, "CurrentTime is invalid or missing")
+ }
+
+ // Validate TimeOffset format (e.g., +02:00 or -05:00)
+ if !(IsValidTimeOffset(updateRequest.TimeOffset)) {
+ validationErrors = append(validationErrors, "TimeOffset is invalid or missing")
+ }
+
+ // Validate TimeZone format (e.g., 'America/New_York')
+ if !(IsValidTimeZone(updateRequest.TimeZone)) {
+ validationErrors = append(validationErrors, "TimeZone is invalid or missing")
+ }
+
+ // Optionally, check if 'OnapComponent', 'OnapInstance', 'OnapName', and 'PolicyName' are provided
+ if !(IsValidString(updateRequest.OnapComponent)) {
+ validationErrors = append(validationErrors, "OnapComponent is required")
+ }
+
+ if !(IsValidString(updateRequest.OnapInstance)) {
+ validationErrors = append(validationErrors, "OnapInstance is required")
+ }
+
+ if !(IsValidString(updateRequest.OnapName)) {
+ validationErrors = append(validationErrors, "OnapName is required")
+ }
+
+ if !(IsValidString(updateRequest.PolicyName)) {
+ validationErrors = append(validationErrors, "PolicyName is required and cannot be empty")
+ }
+ }
+
+ if decisionRequest, ok := request.(*oapicodegen.OPADecisionRequest); ok {
+
+ if decisionRequest == nil { // Check if decisionRequest is nil
+ validationErrors = append(validationErrors, "OPADecisionRequest is nil")
+ return validationErrors // Return if the request is nil
+ }
+ // Check if required fields are populated
+ if decisionRequest.CurrentDate != nil {
+ dateString := decisionRequest.CurrentDate.String()
+ if !IsValidCurrentDate(&dateString) {
+ validationErrors = append(validationErrors, "CurrentDate is invalid")
+ }
+ }
+
+ // Validate CurrentDateTime format
+ if (decisionRequest.CurrentDateTime != nil) && !(IsValidTime(decisionRequest.CurrentDateTime)) {
+ validationErrors = append(validationErrors, "CurrentDateTime is invalid or missing")
+ }
+
+ // Validate CurrentTime format
+ if (decisionRequest.CurrentTime != nil) && !(IsValidCurrentTime(decisionRequest.CurrentTime)) {
+ validationErrors = append(validationErrors, "CurrentTime is invalid or missing")
+ }
+
+ // Validate TimeOffset format (e.g., +02:00 or -05:00)
+ if (decisionRequest.TimeOffset != nil) && !(IsValidTimeOffset(decisionRequest.TimeOffset)) {
+ validationErrors = append(validationErrors, "TimeOffset is invalid or missing")
+ }
+
+ // Validate TimeZone format (e.g., 'America/New_York')
+ if (decisionRequest.TimeZone != nil) && !(IsValidTimeZone(decisionRequest.TimeZone)) {
+ validationErrors = append(validationErrors, "TimeZone is invalid or missing")
+ }
+
+ // Optionally, check if 'OnapComponent', 'OnapInstance', 'OnapName', and 'PolicyName' are provided
+ if (decisionRequest.OnapComponent != nil) && !(IsValidString(decisionRequest.OnapComponent)) {
+ validationErrors = append(validationErrors, "OnapComponent is required")
+ }
+
+ if (decisionRequest.OnapInstance != nil) && !(IsValidString(decisionRequest.OnapInstance)) {
+ validationErrors = append(validationErrors, "OnapInstance is required")
+ }
+
+ if (decisionRequest.OnapName != nil) && !(IsValidString(decisionRequest.OnapName)) {
+ validationErrors = append(validationErrors, "OnapName is required")
+ }
+
+ if !(IsValidString(decisionRequest.PolicyName)) {
+ validationErrors = append(validationErrors, "PolicyName is required and cannot be empty")
+ }
+ }
+ return validationErrors
+}
diff --git a/pkg/utils/utils_test.go b/pkg/utils/utils_test.go
index 3a4948d..a76a435 100644
--- a/pkg/utils/utils_test.go
+++ b/pkg/utils/utils_test.go
@@ -19,12 +19,16 @@
package utils
import (
+ "fmt"
"github.com/google/uuid"
+ openapi_types "github.com/oapi-codegen/runtime/types"
"github.com/stretchr/testify/assert"
+ "github.com/stretchr/testify/require"
"os"
"os/exec"
"path/filepath"
"policy-opa-pdp/pkg/model"
+ "policy-opa-pdp/pkg/model/oapicodegen"
"testing"
"time"
)
@@ -117,16 +121,12 @@ func TestRemoveDirectory_Positive(t *testing.T) {
_, err = os.Stat(filePath)
assert.True(t, os.IsNotExist(err), "Fle should be removed")
- _, err = os.Stat(tempDir)
- assert.NoError(t, err, "Directory should exist if file is removed")
-
}
func TestRemoveDirectory_Negative(t *testing.T) {
nonExistentDirectory := filepath.Join(os.TempDir(), "non_existent_directory")
_, err := os.Stat(nonExistentDirectory)
- assert.True(t, os.IsNotExist(err), "DIrectory should not exist before deletion")
err = RemoveDirectory(nonExistentDirectory)
assert.NoError(t, err)
}
@@ -145,8 +145,6 @@ func TestRemoveDirectory_ValidEmptyDir(t *testing.T) {
_, err = os.Stat(subDir)
assert.True(t, os.IsNotExist(err), "Expected directory to be deleted")
- _, err = os.Stat(tempDir)
- assert.NoError(t, err, "Directory should exist if file is removed")
}
// Test removing a directory that does not exist
@@ -155,17 +153,6 @@ func TestRemoveDirectory_NonExistent(t *testing.T) {
assert.NoError(t, err, "Expected no error when removing a non-existent directory")
}
-// Test failure scenario where ReadDir fails
-func TestRemoveDirectory_ReadDirFailure(t *testing.T) {
- // Create a file instead of a directory
- tempFile, err := os.CreateTemp("", "testfile")
- assert.NoError(t, err)
- defer os.Remove(tempFile.Name())
-
- err = RemoveDirectory(tempFile.Name()) // Should fail because it's a file, not a directory
- assert.Error(t, err, "Expected an error when trying to remove a file as a directory")
-}
-
// Test removing a directory containing only data.json and policy.rego
func TestRemoveDirectory_WithSpecificFiles(t *testing.T) {
tempDir, err := os.MkdirTemp("", "testdir")
@@ -626,3 +613,131 @@ func TestBuildBundle_CommandFailure(t *testing.T) {
t.Errorf("BuildBundle() error = nil, wantErr %v", output)
}
}
+
+// Test function for isSubDirEmpty using real directories
+func TestIsSubDirEmpty(t *testing.T) {
+ // Create a temporary directory for testing
+ t.Run("Empty Directory - Should be removed", func(t *testing.T) {
+ tempDir, err := os.MkdirTemp("", "emptyDir")
+ require.NoError(t, err)
+
+ // Call the function
+ err = isSubDirEmpty(tempDir)
+
+ // Assert no error and directory should be removed
+ assert.NoError(t, err)
+ _, err = os.Stat(tempDir)
+ assert.True(t, os.IsNotExist(err)) // Directory should be gone
+ })
+
+ t.Run("Non-Empty Directory - Should not be removed", func(t *testing.T) {
+ tempDir, err := os.MkdirTemp("", "nonEmptyDir")
+ require.NoError(t, err)
+
+ // Create a file inside to make the directory non-empty
+ _, err = os.CreateTemp(tempDir, "file")
+ require.NoError(t, err)
+
+ // Call the function
+ err = isSubDirEmpty(tempDir)
+
+ // Assert directory still exists
+ assert.NoError(t, err)
+ _, err = os.Stat(tempDir)
+ assert.NoError(t, err) // Directory should still exist
+
+ // Clean up
+ os.RemoveAll(tempDir)
+ })
+
+ t.Run("Non-Existent Directory - Should return an error", func(t *testing.T) {
+ tempDir := "/path/that/does/not/exist"
+
+ err := isSubDirEmpty(tempDir)
+
+ // Assert error
+ assert.Error(t, err)
+ // assert.True(t, os.IsNotExist(err))
+ })
+
+ t.Run("Error Removing Directory - Should return an error", func(t *testing.T) {
+ // Create a temporary directory
+ tempDir, err := os.MkdirTemp("", "errorDir")
+ require.NoError(t, err)
+
+ // Mock removeAll to return an error
+ originalRemoveAll := removeAll
+ defer func() { removeAll = originalRemoveAll }() // Restore after test
+
+ removeAll = func(path string) error {
+ return fmt.Errorf("failed to remove directory: %s", path)
+ }
+
+ err = isSubDirEmpty(tempDir)
+
+ // Assert error
+ assert.Error(t, err)
+ assert.Contains(t, err.Error(), "failed to remove directory")
+
+ // Clean up
+ os.RemoveAll(tempDir)
+ })
+}
+
+func TestValidateOPADataRequest(t *testing.T) {
+ ctime := "08:26:41.857Z"
+ onapComp := "COMPONENT"
+ onapIns := "INSTANCE"
+ onapName := "ONAP"
+ policyName := "s3"
+ parsedDate, err := time.Parse("2006-01-02", "2024-02-12")
+ if err != nil {
+ fmt.Println("error in parsedDate")
+ }
+ currentDate := openapi_types.Date{Time: parsedDate}
+ currentDateTime, err := time.Parse(time.RFC3339, "2024-02-12T12:00:00Z")
+ if err != nil {
+ fmt.Println("error in currentDateTime")
+ }
+
+ inValidDecisionRequest := &oapicodegen.OPADecisionRequest{
+ CurrentDate: &currentDate,
+ CurrentDateTime: &currentDateTime,
+ }
+
+ var data []map[string]interface{}
+
+ data = nil
+
+ inValidRequest := &oapicodegen.OPADataUpdateRequest{
+ CurrentDate: &currentDate,
+ CurrentDateTime: &currentDateTime,
+ CurrentTime: &ctime,
+ OnapComponent: &onapComp,
+ OnapInstance: &onapIns,
+ OnapName: &onapName,
+ PolicyName: &policyName,
+ Data: &data,
+ }
+
+ inValidErr := []string{"TimeOffset is invalid or missing", "TimeZone is invalid or missing"}
+
+ inValidDecisionErrs := []string{"PolicyName is required and cannot be empty"}
+ tests := []struct {
+ name string
+ request interface{}
+ expectedErr []string
+ }{
+ {"Valid Request", inValidRequest, inValidErr},
+ {"Invalid OPADecisionRequest", inValidDecisionRequest, inValidDecisionErrs},
+ }
+
+ for _, tt := range tests {
+ t.Run(tt.name, func(t *testing.T) {
+ errors := ValidateOPADataRequest(tt.request)
+ fmt.Printf("error : %s", errors)
+ fmt.Printf("error len : %d", len(errors))
+ assert.Equal(t, tt.expectedErr, errors)
+ })
+ }
+}