// - // ========================LICENSE_START================================= // Copyright (C) 2024-2025: Deutsche Telekom // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // SPDX-License-Identifier: Apache-2.0 // ========================LICENSE_END=================================== // package decision import ( "bytes" "context" "encoding/json" "errors" "fmt" openapi_types "github.com/oapi-codegen/runtime/types" "github.com/open-policy-agent/opa/sdk" "github.com/stretchr/testify/assert" "net/http" "net/http/httptest" "os" "policy-opa-pdp/consts" "policy-opa-pdp/pkg/model" "policy-opa-pdp/pkg/model/oapicodegen" "policy-opa-pdp/pkg/pdpstate" "policy-opa-pdp/pkg/policymap" "testing" "time" ) // Test for Invalid request method func TestOpaDecision_MethodNotAllowed(t *testing.T) { originalGetState := pdpstate.GetCurrentState pdpstate.GetCurrentState = func() model.PdpState { return model.Active } defer func() { pdpstate.GetCurrentState = originalGetState }() req := httptest.NewRequest(http.MethodGet, "/", nil) rec := httptest.NewRecorder() OpaDecision(rec, req) assert.Equal(t, http.StatusMethodNotAllowed, rec.Code) assert.Contains(t, rec.Body.String(), "MethodNotAllowed") } // Test for invalid JSON request func TestOpaDecision_InvalidJSON(t *testing.T) { originalGetState := pdpstate.GetCurrentState pdpstate.GetCurrentState = func() model.PdpState { return model.Active } defer func() { pdpstate.GetCurrentState = originalGetState }() req := httptest.NewRequest(http.MethodPost, "/", bytes.NewBuffer([]byte("invalid json"))) rec := httptest.NewRecorder() OpaDecision(rec, req) assert.Equal(t, http.StatusBadRequest, rec.Code) } // Test for Missing Policy func TestOpaDecision_MissingPolicyPath(t *testing.T) { ctime := "08:26:41.857Z" timeZone := "America/New_York" timeOffset := "+02:00" onapComp := "COMPONENT" onapIns := "INSTANCE" onapName := "ONAP" policyFilter := []string{"filter1", "filter2"} parsedDate, err := time.Parse("2006-01-02", "2024-02-12") if err != nil { fmt.Println("error in parsedDate") } currentDate := openapi_types.Date{Time: parsedDate} currentDateTime, err := time.Parse(time.RFC3339, "2024-02-12T12:00:00Z") if err != nil { fmt.Println("error in currentDateTime") } originalGetState := pdpstate.GetCurrentState pdpstate.GetCurrentState = func() model.PdpState { return model.Active } defer func() { pdpstate.GetCurrentState = originalGetState }() validRequest := &oapicodegen.OPADecisionRequest{ CurrentDate: ¤tDate, CurrentDateTime: ¤tDateTime, CurrentTime: &ctime, TimeOffset: &timeOffset, TimeZone: &timeZone, OnapComponent: &onapComp, OnapInstance: &onapIns, OnapName: &onapName, PolicyFilter: policyFilter, } jsonBody, _ := json.Marshal(validRequest) req := httptest.NewRequest(http.MethodPost, "/", bytes.NewBuffer(jsonBody)) rec := httptest.NewRecorder() OpaDecision(rec, req) assert.Equal(t, http.StatusBadRequest, rec.Code) assert.Contains(t, rec.Body.String(), "PolicyName is required and cannot be empty") } // Test for Missing Policy Filter func TestOpaDecision_MissingPolicyFilter(t *testing.T) { ctime := "08:26:41.857Z" timeZone := "America/New_York" timeOffset := "+02:00" onapComp := "COMPONENT" onapIns := "INSTANCE" onapName := "ONAP" policyName := "ONAP" parsedDate, err := time.Parse("2006-01-02", "2024-02-12") if err != nil { fmt.Println("error in parsedDate") } currentDate := openapi_types.Date{Time: parsedDate} currentDateTime, err := time.Parse(time.RFC3339, "2024-02-12T12:00:00Z") if err != nil { fmt.Println("error in currentDateTime") } originalGetState := pdpstate.GetCurrentState pdpstate.GetCurrentState = func() model.PdpState { return model.Active } defer func() { pdpstate.GetCurrentState = originalGetState }() validRequest := &oapicodegen.OPADecisionRequest{ CurrentDate: ¤tDate, CurrentDateTime: ¤tDateTime, CurrentTime: &ctime, TimeOffset: &timeOffset, TimeZone: &timeZone, OnapComponent: &onapComp, OnapInstance: &onapIns, OnapName: &onapName, PolicyName: policyName, } jsonBody, _ := json.Marshal(validRequest) req := httptest.NewRequest(http.MethodPost, "/", bytes.NewBuffer(jsonBody)) rec := httptest.NewRecorder() OpaDecision(rec, req) assert.Equal(t, http.StatusBadRequest, rec.Code) assert.Contains(t, rec.Body.String(), "PolicyFilter is required") } // Test for OPA Instance Error func TestOpaDecision_GetInstanceError(t *testing.T) { ctime := "08:26:41.857Z" timeZone := "America/New_York" timeOffset := "+02:00" onapComp := "COMPONENT" onapIns := "INSTANCE" onapName := "ONAP" policyName := "data.policy" policyFilter := []string{"filter1", "filter2"} parsedDate, err := time.Parse("2006-01-02", "2024-02-12") if err != nil { fmt.Println("error in parsedDate") } currentDate := openapi_types.Date{Time: parsedDate} currentDateTime, err := time.Parse(time.RFC3339, "2024-02-12T12:00:00Z") if err != nil { fmt.Println("error in currentDateTime") } originalGetState := pdpstate.GetCurrentState pdpstate.GetCurrentState = func() model.PdpState { return model.Active } defer func() { pdpstate.GetCurrentState = originalGetState }() validRequest := &oapicodegen.OPADecisionRequest{ CurrentDate: ¤tDate, CurrentDateTime: ¤tDateTime, CurrentTime: &ctime, TimeOffset: &timeOffset, TimeZone: &timeZone, OnapComponent: &onapComp, OnapInstance: &onapIns, OnapName: &onapName, PolicyName: policyName, PolicyFilter: policyFilter, } jsonBody, _ := json.Marshal(validRequest) req := httptest.NewRequest(http.MethodPost, "/", bytes.NewBuffer(jsonBody)) rec := httptest.NewRecorder() OpaDecision(rec, req) assert.Equal(t, http.StatusBadRequest, rec.Code) } // Test for OPA decision Error func TestOpaDecision_OPADecisionError(t *testing.T) { ctime := "08:26:41.857Z" timeZone := "America/New_York" timeOffset := "+02:00" onapComp := "COMPONENT" onapIns := "INSTANCE" onapName := "ONAP" policyName := "data.policy" policyFilter := []string{"filter1", "filter2"} parsedDate, err := time.Parse("2006-01-02", "2024-02-12") if err != nil { fmt.Println("error in parsedDate") } currentDate := openapi_types.Date{Time: parsedDate} currentDateTime, err := time.Parse(time.RFC3339, "2024-02-12T12:00:00Z") if err != nil { fmt.Println("error in currentDateTime") } originalGetState := pdpstate.GetCurrentState pdpstate.GetCurrentState = func() model.PdpState { return model.Active } defer func() { pdpstate.GetCurrentState = originalGetState }() validRequest := &oapicodegen.OPADecisionRequest{ CurrentDate: ¤tDate, CurrentDateTime: ¤tDateTime, CurrentTime: &ctime, TimeOffset: &timeOffset, TimeZone: &timeZone, OnapComponent: &onapComp, OnapInstance: &onapIns, OnapName: &onapName, PolicyName: policyName, PolicyFilter: policyFilter, } jsonBody, _ := json.Marshal(validRequest) req := httptest.NewRequest(http.MethodPost, "/", bytes.NewBuffer(jsonBody)) rec := httptest.NewRecorder() tmpFile, err := os.CreateTemp("", "config.json") if err != nil { t.Fatalf("Failed to create temp file: %v", err) } defer os.Remove(tmpFile.Name()) consts.OpasdkConfigPath = tmpFile.Name() OpaDecision(rec, req) assert.Equal(t, http.StatusBadRequest, rec.Code) } // Test for system in passive State func TestOpaDecision_PassiveState(t *testing.T) { originalGetState := pdpstate.GetCurrentState pdpstate.GetCurrentState = func() model.PdpState { return model.Passive } defer func() { pdpstate.GetCurrentState = originalGetState }() req := httptest.NewRequest(http.MethodPost, "/opa/decision", nil) rec := httptest.NewRecorder() OpaDecision(rec, req) assert.Equal(t, http.StatusInternalServerError, rec.Code) assert.Contains(t, rec.Body.String(), "System Is In PASSIVE State") } // TestOpaDecision_ValidRequest tests if the request is handled correctly // Utility function to return a pointer to a string func ptrString(s string) string { return s } func ptrStringEx(s string) *string { return &s } // Utility function to return a pointer to a map func ptrMap(m map[string]interface{}) map[string]interface{} { return m } // Utility function to return a pointer to a OPADecisionResponseDecision func TestWriteOpaJSONResponse(t *testing.T) { rec := httptest.NewRecorder() data := &oapicodegen.OPADecisionResponse{ PolicyName: ptrString("test-policy"), Output: ptrMap(map[string]interface{}{"key": "value"}), } writeOpaJSONResponse(rec, http.StatusOK, *data) assert.Equal(t, http.StatusOK, rec.Code) assert.Contains(t, rec.Body.String(), `"policyName":"test-policy"`) } // Test for JSON response error func TestWriteErrorJSONResponse(t *testing.T) { rec := httptest.NewRecorder() // ErrorResponse struct uses pointers for string fields, so we use ptrString() errorResponse := oapicodegen.ErrorResponse{ ErrorMessage: ptrStringEx("Bad Request"), } writeErrorJSONResponse(rec, http.StatusBadRequest, "Bad Request", errorResponse) assert.Equal(t, http.StatusBadRequest, rec.Code) assert.Contains(t, rec.Body.String(), `"errorMessage":"Bad Request"`) } // Test for Success Decision Response func TestCreateSuccessDecisionResponse(t *testing.T) { // Input values for creating the response policyName := "policy-name" output := map[string]interface{}{"key": "value"} // Call the createSuccessDecisionResponse function response := createSuccessDecisionResponse( policyName, output) // Assertions // Check the PolicyName field assert.Equal(t, response.PolicyName, policyName, "PolicyName should match") // Check the Output field assert.Equal(t, response.Output, output, "Output should match") } // Test for policy filter func TestApplyPolicyFilter(t *testing.T) { originalPolicy := map[string]interface{}{ "policy1": map[string]interface{}{"key1": "value1"}, "policy2": map[string]interface{}{"key2": "value2"}, } filter := []string{"policy1"} result, _, _ := applyPolicyFilter(originalPolicy, filter) assert.NotNil(t, result) assert.Len(t, result, 1) assert.Contains(t, result, "policy1") } // Test for Opa response error func TestWriteOpaJSONResponse_Error(t *testing.T) { rec := httptest.NewRecorder() // Simulate an error response policyName := "error-policy" output := map[string]interface{}{"errorDetail": "Invalid input"} // Create a response object for error scenario data := &oapicodegen.OPADecisionResponse{ PolicyName: ptrString(policyName), Output: ptrMap(output), } writeOpaJSONResponse(rec, http.StatusBadRequest, *data) // Assertions assert.Equal(t, http.StatusBadRequest, rec.Code, "Expected HTTP 400 status code") assert.Contains(t, rec.Body.String(), `"policyName":"error-policy"`, "Response should contain the policy name") assert.Contains(t, rec.Body.String(), `"errorDetail":"Invalid input"`, "Response should contain the error detail") } // Test for JSON response success func TestWriteOpaJSONResponse_Success(t *testing.T) { // Prepare test data decisionRes := oapicodegen.OPADecisionResponse{ PolicyName: ptrString("TestPolicy"), Output: map[string]interface{}{"key": "value"}, } // Create a mock HTTP response writer res := httptest.NewRecorder() // Call the function writeOpaJSONResponse(res, http.StatusOK, decisionRes) // Assert HTTP status if res.Code != http.StatusOK { t.Errorf("Expected status %d, got %d", http.StatusOK, res.Code) } // Assert headers if res.Header().Get("Content-Type") != "application/json" { t.Errorf("Expected Content-Type 'application/json', got '%s'", res.Header().Get("Content-Type")) } // Assert body var result oapicodegen.OPADecisionResponse if err := json.NewDecoder(res.Body).Decode(&result); err != nil { t.Fatalf("Failed to decode response body: %v", err) } } // Test for JSON encoding errors func TestWriteOpaJSONResponse_EncodingError(t *testing.T) { // Prepare invalid test data to trigger JSON encoding error decisionRes := oapicodegen.OPADecisionResponse{ // Introducing an invalid type to cause encoding failure Output: map[string]interface{}{"key": make(chan int)}, } // Create a mock HTTP response writer res := httptest.NewRecorder() // Call the function writeOpaJSONResponse(res, http.StatusInternalServerError, decisionRes) // Assert HTTP status if res.Code != http.StatusInternalServerError { t.Errorf("Expected status %d, got %d", http.StatusInternalServerError, res.Code) } // Assert error message in body if !bytes.Contains(res.Body.Bytes(), []byte("json: unsupported type")) { t.Errorf("Expected encoding error message, got '%s'", res.Body.String()) } } // Mocks for test cases //var GetOPASingletonInstance = opasdk.GetOPASingletonInstance var mockDecisionResult = &sdk.DecisionResult{ Result: map[string]interface{}{ "allow": "true", }, } var mockDecisionResultUnexp = &sdk.DecisionResult{ Result: map[int]interface{}{ 123: 123, }, } var mockDecisionResultBool = &sdk.DecisionResult{ Result: true, } var mockDecisionReq = oapicodegen.OPADecisionRequest{ PolicyName: ptrString("mockPolicy"), PolicyFilter: []string{"filter1", "filter2"}, } var mockDecisionReq2 = oapicodegen.OPADecisionRequest{ PolicyName: ptrString("mockPolicy"), PolicyFilter: []string{"allow", "filter2"}, } var mockDecisionReq3 = oapicodegen.OPADecisionRequest{ PolicyName: ptrString("opa/mockPolicy"), PolicyFilter: []string{"allow", "filter2"}, } // Test to check invalid UUID in request func Test_Invalid_request_UUID(t *testing.T) { policymap.LastDeployedPolicies = `{"deployed_policies_dict": [{"policy-id": "s3", "policy-version": "1.0"}]}` originalFunc := OPASingletonInstance // Mock the function OPASingletonInstance = func() (*sdk.OPA, error) { return &sdk.OPA{}, nil // Mocked OPA instance } defer func() { OPASingletonInstance = originalFunc }() jsonString := `{"onapName":"CDS","onapComponent":"CDS","onapInstance":"CDS", "currentDate": "2024-11-22", "currentTime": "2024-11-22T11:34:56Z", "timeZone": "UTC", "timeOffset": "+05:30", "currentDateTime": "2024-11-22T12:08:00Z","policyName":"s3","policyFilter":["allow"],"input":{"content" : "content"}}` var decisionReq oapicodegen.OPADecisionRequest json.Unmarshal([]byte(jsonString), &decisionReq) body := map[string]interface{}{"PolicyName": decisionReq.PolicyName, "PolicyFilter": decisionReq.PolicyFilter} jsonBody, _ := json.Marshal(body) req := httptest.NewRequest(http.MethodPost, "/opa/decision", bytes.NewBuffer(jsonBody)) req.Header.Set("X-ONAP-RequestID", "invalid-uuid") res := httptest.NewRecorder() OpaDecision(res, req) assert.Equal(t, http.StatusInternalServerError, res.Code) } // Test to check UUID is valid func Test_valid_UUID(t *testing.T) { req := httptest.NewRequest(http.MethodPost, "/opa/decision", nil) req.Header.Set("X-ONAP-RequestID", "123e4567-e89b-12d3-a456-426614174000") res := httptest.NewRecorder() OpaDecision(res, req) assert.Equal(t, "123e4567-e89b-12d3-a456-426614174000", res.Header().Get("X-ONAP-RequestID"), "X-ONAP-RequestID header mismatch") } // Test for PASSIVE system state func Test_passive_system_state(t *testing.T) { req := httptest.NewRequest(http.MethodPost, "/opa/decision", nil) res := httptest.NewRecorder() OpaDecision(res, req) assert.Equal(t, http.StatusInternalServerError, res.Code) assert.Contains(t, res.Body.String(), "System Is In PASSIVE State") } // Test for valid HTTP Method (POST) func Test_valid_HTTP_method(t *testing.T) { ctime := "08:26:41.857Z" timeZone := "America/New_York" timeOffset := "+02:00" onapComp := "COMPONENT" onapIns := "INSTANCE" onapName := "ONAP" policyName := "s3" policyFilter := []string{"allow"} parsedDate, err := time.Parse("2006-01-02", "2024-02-12") if err != nil { fmt.Println("error in parsedDate") } currentDate := openapi_types.Date{Time: parsedDate} currentDateTime, err := time.Parse(time.RFC3339, "2024-02-12T12:00:00Z") if err != nil { fmt.Println("error in currentDateTime") } originalGetState := pdpstate.GetCurrentState pdpstate.GetCurrentState = func() model.PdpState { return model.Active } defer func() { pdpstate.GetCurrentState = originalGetState }() validRequest := &oapicodegen.OPADecisionRequest{ CurrentDate: ¤tDate, CurrentDateTime: ¤tDateTime, CurrentTime: &ctime, TimeOffset: &timeOffset, TimeZone: &timeZone, OnapComponent: &onapComp, OnapInstance: &onapIns, OnapName: &onapName, PolicyName: policyName, PolicyFilter: policyFilter, } originalOPADecision := OPADecision OPADecision = func(_ *sdk.OPA, _ context.Context, _ sdk.DecisionOptions) (*sdk.DecisionResult, error) { return mockDecisionResult, nil } defer func() { OPADecision = originalOPADecision }() policymap.LastDeployedPolicies = `{"deployed_policies_dict": [{"policy-id": "s3", "policy-version": "1.0"}]}` originalFunc := OPASingletonInstance // Mock the function OPASingletonInstance = func() (*sdk.OPA, error) { return &sdk.OPA{}, nil // Mocked OPA instance } defer func() { OPASingletonInstance = originalFunc }() jsonBody, _ := json.Marshal(validRequest) req := httptest.NewRequest(http.MethodPost, "/opa/decision", bytes.NewBuffer(jsonBody)) res := httptest.NewRecorder() OpaDecision(res, req) assert.Equal(t, http.StatusOK, res.Code) } // Test for Marshalling error in Decision Result func Test_Error_Marshalling(t *testing.T) { ctime := "08:26:41.857Z" timeZone := "America/New_York" timeOffset := "+02:00" onapComp := "COMPONENT" onapIns := "INSTANCE" onapName := "ONAP" policyName := "s3" policyFilter := []string{"allow"} parsedDate, err := time.Parse("2006-01-02", "2024-02-12") if err != nil { fmt.Println("error in parsedDate") } currentDate := openapi_types.Date{Time: parsedDate} currentDateTime, err := time.Parse(time.RFC3339, "2024-02-12T12:00:00Z") if err != nil { fmt.Println("error in currentDateTime") } originalGetState := pdpstate.GetCurrentState pdpstate.GetCurrentState = func() model.PdpState { return model.Active } defer func() { pdpstate.GetCurrentState = originalGetState }() validRequest := &oapicodegen.OPADecisionRequest{ CurrentDate: ¤tDate, CurrentDateTime: ¤tDateTime, CurrentTime: &ctime, TimeOffset: &timeOffset, TimeZone: &timeZone, OnapComponent: &onapComp, OnapInstance: &onapIns, OnapName: &onapName, PolicyName: policyName, PolicyFilter: policyFilter, } originalOPADecision := OPADecision OPADecision = func(_ *sdk.OPA, _ context.Context, _ sdk.DecisionOptions) (*sdk.DecisionResult, error) { return mockDecisionResult, nil } defer func() { OPADecision = originalOPADecision }() policymap.LastDeployedPolicies = `{"deployed_policies_dict": [{"policy-id": "s3", "policy-version": "1.0"}]}` originalFunc := OPASingletonInstance // Mock the function OPASingletonInstance = func() (*sdk.OPA, error) { return &sdk.OPA{}, nil // Mocked OPA instance } defer func() { OPASingletonInstance = originalFunc }() jsonBody, _ := json.Marshal(validRequest) req := httptest.NewRequest(http.MethodPost, "/opa/decision", bytes.NewBuffer(jsonBody)) res := httptest.NewRecorder() OpaDecision(res, req) assert.Equal(t, http.StatusOK, res.Code) } func mockGetOpaInstance() (*sdk.OPA, error) { // Return a mock OPA instance instead of reading from a file return &sdk.OPA{}, nil } // Test for Invalid Decision error in Decision Result func Test_Invalid_Decision(t *testing.T) { ctime := "08:26:41.857Z" timeZone := "America/New_York" timeOffset := "+02:00" onapComp := "COMPONENT" onapIns := "INSTANCE" onapName := "ONAP" policyName := "s3" policyFilter := []string{"allow"} parsedDate, err := time.Parse("2006-01-02", "2024-02-12") if err != nil { fmt.Println("error in parsedDate") } currentDate := openapi_types.Date{Time: parsedDate} currentDateTime, err := time.Parse(time.RFC3339, "2024-02-12T12:00:00Z") if err != nil { fmt.Println("error in currentDateTime") } originalGetState := pdpstate.GetCurrentState pdpstate.GetCurrentState = func() model.PdpState { return model.Active } defer func() { pdpstate.GetCurrentState = originalGetState }() validRequest := &oapicodegen.OPADecisionRequest{ CurrentDate: ¤tDate, CurrentDateTime: ¤tDateTime, CurrentTime: &ctime, TimeOffset: &timeOffset, TimeZone: &timeZone, OnapComponent: &onapComp, OnapInstance: &onapIns, OnapName: &onapName, PolicyName: policyName, PolicyFilter: policyFilter, } originalOPADecision := OPADecision OPADecision = func(_ *sdk.OPA, _ context.Context, _ sdk.DecisionOptions) (*sdk.DecisionResult, error) { return nil, fmt.Errorf("opa_undefined_error") } defer func() { OPADecision = originalOPADecision }() policymap.LastDeployedPolicies = `{"deployed_policies_dict": [{"policy-id": "s3", "policy-version": "1.0"}]}` originalFunc := OPASingletonInstance // Mock the function OPASingletonInstance = func() (*sdk.OPA, error) { return &sdk.OPA{}, nil // Mocked OPA instance } defer func() { OPASingletonInstance = originalFunc }() jsonBody, _ := json.Marshal(validRequest) // Create a test HTTP request req := httptest.NewRequest(http.MethodPost, "/opa/decision", bytes.NewBuffer(jsonBody)) req.Header.Set("Content-Type", "application/json") res := httptest.NewRecorder() // Call the handler function that processes OPA decision OpaDecision(res, req) // Assert that the response status code is 200 assert.Equal(t, 500, res.Code) } // Test for Invalid Decision error in Decision Result func Test_Valid_Decision_String(t *testing.T) { ctime := "08:26:41.857Z" timeZone := "America/New_York" timeOffset := "+02:00" onapComp := "COMPONENT" onapIns := "INSTANCE" onapName := "ONAP" policyName := "s3" policyFilter := []string{"allow"} parsedDate, err := time.Parse("2006-01-02", "2024-02-12") if err != nil { fmt.Println("error in parsedDate") } currentDate := openapi_types.Date{Time: parsedDate} currentDateTime, err := time.Parse(time.RFC3339, "2024-02-12T12:00:00Z") if err != nil { fmt.Println("error in currentDateTime") } validRequest := &oapicodegen.OPADecisionRequest{ CurrentDate: ¤tDate, CurrentDateTime: ¤tDateTime, CurrentTime: &ctime, TimeOffset: &timeOffset, TimeZone: &timeZone, OnapComponent: &onapComp, OnapInstance: &onapIns, OnapName: &onapName, PolicyName: policyName, PolicyFilter: policyFilter, } // Mock PDP state originalGetState := pdpstate.GetCurrentState pdpstate.GetCurrentState = func() model.PdpState { return model.Active } defer func() { pdpstate.GetCurrentState = originalGetState }() // Patch the OPA Decision method to return an error originalOPADecision := OPADecision OPADecision = func(_ *sdk.OPA, _ context.Context, _ sdk.DecisionOptions) (*sdk.DecisionResult, error) { // Return an explicit error mockDecisionResult := &sdk.DecisionResult{ Result: map[string]interface{}{ "allowed": "true", }, } return mockDecisionResult, nil } defer func() { OPADecision = originalOPADecision }() policymap.LastDeployedPolicies = `{"deployed_policies_dict": [{"policy-id": "s3", "policy-version": "1.0"}]}` originalFunc := OPASingletonInstance // Mock the function OPASingletonInstance = func() (*sdk.OPA, error) { return &sdk.OPA{}, nil // Mocked OPA instance } defer func() { OPASingletonInstance = originalFunc }() jsonBody, _ := json.Marshal(validRequest) // Create a test HTTP request req := httptest.NewRequest(http.MethodPost, "/opa/decision", bytes.NewBuffer(jsonBody)) req.Header.Set("Content-Type", "application/json") res := httptest.NewRecorder() // Call the handler function that processes OPA decision OpaDecision(res, req) // Assert that the response status code is 400 assert.Equal(t, 200, res.Code) } // Test with OPA Decision of boolean type true func Test_with_boolean_OPA_Decision(t *testing.T) { ctime := "08:26:41.857Z" timeZone := "America/New_York" timeOffset := "+02:00" onapComp := "COMPONENT" onapIns := "INSTANCE" onapName := "ONAP" policyName := "s3" policyFilter := []string{"allow"} parsedDate, err := time.Parse("2006-01-02", "2024-02-12") if err != nil { fmt.Println("error in parsedDate") } currentDate := openapi_types.Date{Time: parsedDate} currentDateTime, err := time.Parse(time.RFC3339, "2024-02-12T12:00:00Z") if err != nil { fmt.Println("error in currentDateTime") } validRequest := &oapicodegen.OPADecisionRequest{ CurrentDate: ¤tDate, CurrentDateTime: ¤tDateTime, CurrentTime: &ctime, TimeOffset: &timeOffset, TimeZone: &timeZone, OnapComponent: &onapComp, OnapInstance: &onapIns, OnapName: &onapName, PolicyName: policyName, PolicyFilter: policyFilter, } originalGetState := pdpstate.GetCurrentState pdpstate.GetCurrentState = func() model.PdpState { return model.Active } defer func() { pdpstate.GetCurrentState = originalGetState }() originalOPADecision := OPADecision OPADecision = func(_ *sdk.OPA, _ context.Context, _ sdk.DecisionOptions) (*sdk.DecisionResult, error) { return mockDecisionResultBool, nil } defer func() { OPADecision = originalOPADecision }() policymap.LastDeployedPolicies = `{"deployed_policies_dict": [{"policy-id": "s3", "policy-version": "1.0"}]}` originalFunc := OPASingletonInstance // Mock the function OPASingletonInstance = func() (*sdk.OPA, error) { return &sdk.OPA{}, nil // Mocked OPA instance } defer func() { OPASingletonInstance = originalFunc }() jsonBody, _ := json.Marshal(validRequest) req := httptest.NewRequest(http.MethodPost, "/opa/decision", bytes.NewBuffer(jsonBody)) res := httptest.NewRecorder() OpaDecision(res, req) assert.Equal(t, http.StatusOK, res.Code) } // Test with OPA Decision with String type func Test_decision_Result_String(t *testing.T) { ctime := "08:26:41.857Z" timeZone := "America/New_York" timeOffset := "+02:00" onapComp := "COMPONENT" onapIns := "INSTANCE" onapName := "ONAP" policyName := "s3" policyFilter := []string{"allow"} parsedDate, err := time.Parse("2006-01-02", "2024-02-12") if err != nil { fmt.Println("error in parsedDate") } currentDate := openapi_types.Date{Time: parsedDate} currentDateTime, err := time.Parse(time.RFC3339, "2024-02-12T12:00:00Z") if err != nil { fmt.Println("error in currentDateTime") } validRequest := &oapicodegen.OPADecisionRequest{ CurrentDate: ¤tDate, CurrentDateTime: ¤tDateTime, CurrentTime: &ctime, TimeOffset: &timeOffset, TimeZone: &timeZone, OnapComponent: &onapComp, OnapInstance: &onapIns, OnapName: &onapName, PolicyName: policyName, PolicyFilter: policyFilter, } originalGetState := pdpstate.GetCurrentState pdpstate.GetCurrentState = func() model.PdpState { return model.Active } defer func() { pdpstate.GetCurrentState = originalGetState }() originalOPADecision := OPADecision OPADecision = func(_ *sdk.OPA, _ context.Context, _ sdk.DecisionOptions) (*sdk.DecisionResult, error) { mockDecisionResult := &sdk.DecisionResult{ Result: map[string]interface{}{ "allowed": "true", }, } return mockDecisionResult, nil } defer func() { OPADecision = originalOPADecision }() policymap.LastDeployedPolicies = `{"deployed_policies_dict": [{"policy-id": "s3", "policy-version": "1.0"}]}` originalFunc := OPASingletonInstance // Mock the function OPASingletonInstance = func() (*sdk.OPA, error) { return &sdk.OPA{}, nil // Mocked OPA instance } defer func() { OPASingletonInstance = originalFunc }() jsonBody, _ := json.Marshal(validRequest) req := httptest.NewRequest(http.MethodPost, "/opa/decision", bytes.NewBuffer(jsonBody)) res := httptest.NewRecorder() OpaDecision(res, req) assert.Equal(t, http.StatusOK, res.Code) } var mockPoliciesMap string func mockLastDeployedPolicies() { policymap.LastDeployedPolicies = mockPoliciesMap } // Test case: No policies deployed func TestHandlePolicyValidation_NoPoliciesDeployed(t *testing.T) { mockPoliciesMap = "" mockLastDeployedPolicies() req := &oapicodegen.OPADecisionRequest{} res := httptest.NewRecorder() var errorDtls string var httpStatus int var policyId string handlePolicyValidation(res, req, &errorDtls, &httpStatus, &policyId) assert.Equal(t, "No policies are deployed.", errorDtls) assert.Equal(t, http.StatusBadRequest, httpStatus) } // Test case: Policy name does not exist func TestHandlePolicyValidation_PolicyDoesNotExist(t *testing.T) { mockPoliciesMap = `{"deployed_policies_dict":[{"policy-id":"test-policy","policy-version":"1.0"}]}` mockLastDeployedPolicies() req := &oapicodegen.OPADecisionRequest{PolicyName: "non-existent-policy"} res := httptest.NewRecorder() var errorDtls string var httpStatus int var policyId string handlePolicyValidation(res, req, &errorDtls, &httpStatus, &policyId) assert.Equal(t, "Policy Name non-existent-policy does not exist", errorDtls) assert.Equal(t, http.StatusBadRequest, httpStatus) } // Test case: OPA instance failure func TestHandlePolicyValidation_OPAInstanceFailure(t *testing.T) { mockPoliciesMap = `{"deployed_policies_dict":[{"policy-id":"test-policy","policy-version":"1.0"}]}` mockLastDeployedPolicies() req := &oapicodegen.OPADecisionRequest{PolicyName: "test-policy"} res := httptest.NewRecorder() var errorDtls string var httpStatus int var policyId string originalFunc := OPASingletonInstance // Mock the function OPASingletonInstance = func() (*sdk.OPA, error) { return nil, errors.New("failed to get OPA instance") } defer func() { OPASingletonInstance = originalFunc }() handlePolicyValidation(res, req, &errorDtls, &httpStatus, &policyId) }