// - // ========================LICENSE_START================================= // Copyright (C) 2024-2025: Deutsche Telekom // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // SPDX-License-Identifier: Apache-2.0 // ========================LICENSE_END=================================== package utils import ( "fmt" "github.com/google/uuid" openapi_types "github.com/oapi-codegen/runtime/types" "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" "os" "os/exec" "path/filepath" "policy-opa-pdp/pkg/model" "policy-opa-pdp/pkg/model/oapicodegen" "testing" "time" ) func mockCmd(command string, args ...string) *exec.Cmd { cs := []string{"-test.run=TestHelperProcess", "--", command} cs = append(cs, args...) cmd := exec.Command(os.Args[0], cs...) cmd.Env = []string{"GO_WANT_HELPER_PROCESS=1"} return cmd } // TestHelperProcess is a helper process used by mockCmd func TestHelperProcess(*testing.T) { if os.Getenv("GO_WANT_HELPER_PROCESS") != "1" { return } os.Exit(0) } // Positive Test Case: Valid UUIDs func TestIsValidUUIDPositive(t *testing.T) { // Define valid UUID strings validUUIDs := []string{ "123e4567-e89b-12d3-a456-426614174000", // Standard UUID uuid.New().String(), // Dynamically generated UUID } for _, u := range validUUIDs { t.Run("Valid UUID", func(t *testing.T) { if !IsValidUUID(u) { t.Errorf("Expected valid UUID, but got invalid for %s", u) } }) } } // Negative Test Case: Invalid UUIDs func TestIsValidUUIDNegative(t *testing.T) { // Define invalid UUID strings invalidUUIDs := []string{ "123e4567-e89b-12d3-a456-42661417400", // Invalid: missing character at the end "invalid-uuid-format", // Invalid: incorrect format "123e4567-e89b-12d3-a456-42661417400x", // Invalid: contains extra non-hex character " ", // Invalid: empty string } for _, u := range invalidUUIDs { t.Run("Invalid UUID", func(t *testing.T) { if IsValidUUID(u) { t.Errorf("Expected invalid UUID, but got valid for %s", u) } }) } } func TestCreateDirectory_Positive(t *testing.T) { tempDir := "testdir" defer os.RemoveAll(tempDir) err := CreateDirectory(tempDir) assert.NoError(t, err) assert.DirExists(t, tempDir) } func TestCreateDirectory_Negative(t *testing.T) { err := CreateDirectory("") assert.Error(t, err) } func TestCreateDirectory_InvalidPath(t *testing.T) { tempDir := "/invalid///path" defer os.RemoveAll(tempDir) err := CreateDirectory(tempDir) assert.Error(t, err) } func TestRemoveDirectory_Positive(t *testing.T) { tempDir, err := os.MkdirTemp("", "testdir") assert.NoError(t, err) filePath := filepath.Join(tempDir, "data.json") file, err := os.Create(filePath) assert.NoError(t, err) file.Close() assert.FileExists(t, filePath, "File should exist before deletion") err = RemoveDirectory(tempDir) assert.NoError(t, err) _, err = os.Stat(filePath) assert.True(t, os.IsNotExist(err), "Fle should be removed") } func TestRemoveDirectory_Negative(t *testing.T) { nonExistentDirectory := filepath.Join(os.TempDir(), "non_existent_directory") _, err := os.Stat(nonExistentDirectory) err = RemoveDirectory(nonExistentDirectory) assert.NoError(t, err) } // Test removing a valid empty directory func TestRemoveDirectory_ValidEmptyDir(t *testing.T) { tempDir, err := os.MkdirTemp("", "testdir") assert.NoError(t, err) subDir := filepath.Join(tempDir, "emptysubDir") err = os.Mkdir(subDir, 0777) assert.NoError(t, err) err = RemoveDirectory(tempDir) assert.NoError(t, err, "Expected no error when removing an empty directory") _, err = os.Stat(subDir) assert.True(t, os.IsNotExist(err), "Expected directory to be deleted") } // Test removing a directory that does not exist func TestRemoveDirectory_NonExistent(t *testing.T) { err := RemoveDirectory("/invalid/nonexistent/path") assert.NoError(t, err, "Expected no error when removing a non-existent directory") } // Test removing a directory containing only data.json and policy.rego func TestRemoveDirectory_WithSpecificFiles(t *testing.T) { tempDir, err := os.MkdirTemp("", "testdir") assert.NoError(t, err) defer os.RemoveAll(tempDir) dataFile := tempDir + "/data.json" policyFile := tempDir + "/policy.rego" os.WriteFile(dataFile, []byte("test"), 0644) os.WriteFile(policyFile, []byte("test"), 0644) err = RemoveDirectory(tempDir) assert.NoError(t, err, "Expected no error when removing specific files") _, err = os.Stat(dataFile) assert.True(t, os.IsNotExist(err), "data.json should be deleted") _, err = os.Stat(policyFile) assert.True(t, os.IsNotExist(err), "policy.rego should be deleted") } func TestIsDirEmpty_Positive(t *testing.T) { tempDir, err := os.MkdirTemp("", "testdir") assert.NoError(t, err) defer os.RemoveAll(tempDir) isEmpty, err := isDirEmpty(tempDir) assert.NoError(t, err) assert.True(t, isEmpty) } func TestIsDirEmpty_Negative(t *testing.T) { tempDir, err := os.MkdirTemp("", "testdir") assert.NoError(t, err) defer os.RemoveAll(tempDir) filePath := filepath.Join(tempDir, "data.json") file, err := os.Create(filePath) assert.NoError(t, err) file.Close() assert.FileExists(t, filePath, "File should exist before deletion") isEmpty, err := isDirEmpty(tempDir) assert.NoError(t, err) assert.False(t, isEmpty) } func TestIsDirEmpty_ValidNonEmptyDir(t *testing.T) { tempDir, err := os.MkdirTemp("", "testdir") assert.NoError(t, err, "Expected temp directory to be created") defer os.RemoveAll(tempDir) // Cleanup _, err = os.CreateTemp(tempDir, "testfile") assert.NoError(t, err, "Expected test file to be created") isEmpty, err := isDirEmpty(tempDir) assert.NoError(t, err, "Expected no error when checking non-empty directory") assert.False(t, isEmpty, "Expected directory to be non-empty") } func TestIsDirEmpty_NonExistentDir(t *testing.T) { fakeDir := "/nonexistent/path" isEmpty, err := isDirEmpty(fakeDir) assert.Error(t, err, "Expected error when checking non-existent directory") assert.False(t, isEmpty, "Expected function to return false when directory does not exist") } func TestValidateFIeldsStructs_Positive(t *testing.T) { pdpupdate := model.PdpUpdate{Source: "pap-188b80c3-48de-43b2-a2cc-3d90fbedb373", PdpHeartbeatIntervalMs: 200000, PoliciesToBeDeployed: []model.ToscaPolicy{}, MessageType: "PDP_UPDATE", RequestId: "41e6f35c-35c9-4a64-b35e-cb0f1c5b15cc", TimestampMs: 1739269698262, Name: "opa-241cca97-89df-496f-8d87-2c6d7cd5b6d7", PdpGroup: "opaGroup", PdpSubgroup: "opa"} err := ValidateFieldsStructs(pdpupdate) assert.NoError(t, err) } func TestValidateFIeldsStructs_Negative(t *testing.T) { pdpupdate := model.PdpUpdate{Source: "pap-188b80c3-48de-43b2-a2cc-3d90fbedb373", PdpHeartbeatIntervalMs: 200000, PoliciesToBeDeployed: []model.ToscaPolicy{}, MessageType: "PDP_UPDATE", RequestId: "41e6f35c-35c9-4a64-b35e-cb0f1c5b15cc", TimestampMs: 1739269698262, Name: "opa-241cca97-89df-496f-8d87-2c6d7cd5b6d7", PdpGroup: "opaGroup"} err := ValidateFieldsStructs(pdpupdate) assert.Error(t, err) } // Positive test cases for IsPolicyNameAllowed func TestIsPolicyNameAllowed_Positive(t *testing.T) { policy := model.ToscaPolicy{Name: "policy.test"} deployedPolicies := []map[string]interface{}{{"policy-id": "different.policy"}} allowed, err := IsPolicyNameAllowed(policy, deployedPolicies) assert.True(t, allowed) assert.NoError(t, err) } // Negative test cases for IsPolicyNameAllowed (Parent policy exists) func TestIsPolicyNameAllowed_Negative(t *testing.T) { policy := model.ToscaPolicy{Name: "policy.test"} deployedPolicies := []map[string]interface{}{{"policy-id": "policy"}} allowed, err := IsPolicyNameAllowed(policy, deployedPolicies) assert.False(t, allowed) assert.Error(t, err) } func TestIsPolicyNameAllowed_ParentOfExistingPolicy(t *testing.T) { policy := model.ToscaPolicy{Name: "test.policy"} deployedPolicies := []map[string]interface{}{ {"policy-id": "test.policy.1"}, } allowed, err := IsPolicyNameAllowed(policy, deployedPolicies) assert.Error(t, err) assert.False(t, allowed, "Expected validation to fail due to parent policy conflict") assert.Contains(t, err.Error(), "Policy Validation Failed : Policy-id: test.policy is parent of deployed policy, overrides existing policy: test.policy.1") } func TestIsPolicyNameAllowed_ChildOfExistingPolicy(t *testing.T) { policy := model.ToscaPolicy{Name: "test.policy.1.1"} deployedPolicies := []map[string]interface{}{ {"policy-id": "test.policy.1"}, } allowed, err := IsPolicyNameAllowed(policy, deployedPolicies) assert.Error(t, err) assert.False(t, allowed, "Expected validation to fail due to child policy conflict") assert.Contains(t, err.Error(), "Policy Validation Failed: Policy-id: test.policy.1.1 is child of deployed policy , can overwrite existing policy: test.policy.1") } func TestIsPolicyNameAllowed_NoDeployedPolicies(t *testing.T) { policy := model.ToscaPolicy{Name: "test.policy.1"} deployedPolicies := []map[string]interface{}{} allowed, err := IsPolicyNameAllowed(policy, deployedPolicies) assert.NoError(t, err) assert.True(t, allowed, "Expected policy name to be allowed when no deployed policies exist") } func TestIsPolicyNameAllowed_EmptyPolicyName(t *testing.T) { policy := model.ToscaPolicy{Name: ""} deployedPolicies := []map[string]interface{}{ {"policy-id": "test.policy.2"}, } allowed, err := IsPolicyNameAllowed(policy, deployedPolicies) assert.Error(t, err) assert.False(t, allowed, "Expected policy name validation to fail") assert.Contains(t, err.Error(), "Policy Name cannot be Empty") } // Positive test cases for isParentOfExistingPolicy func TestIsParentOfExistingPolicy_Positive(t *testing.T) { parent := []string{"policy"} child := []string{"policy", "test"} result := isParentOfExistingPolicy(parent, child) assert.True(t, result) } // Negative test cases for isParentOfExistingPolicy func TestIsParentOfExistingPolicy_Negative(t *testing.T) { parent := []string{"policy"} child := []string{"different", "test"} result := isParentOfExistingPolicy(parent, child) assert.False(t, result) } // Positive test cases for isChildOfExistingPolicy func TestIsChildOfExistingPolicy_Positive(t *testing.T) { parent := []string{"policy"} child := []string{"policy", "test"} result := isChildOfExistingPolicy(child, parent) assert.True(t, result) } // Negative test cases for isChildOfExistingPolicy func TestIsChildOfExistingPolicy_Negative(t *testing.T) { parent := []string{"policy"} child := []string{"different", "test"} result := isChildOfExistingPolicy(child, parent) assert.False(t, result) } // Positive test cases for ValidateToscaPolicyJsonFields func TestValidateToscaPolicyJsonFields_Positive(t *testing.T) { policy := model.ToscaPolicy{ Name: "test-policy", Version: "1.0", Metadata: model.Metadata{ PolicyID: "test-policy", PolicyVersion: "1.0", }, Properties: model.PolicyProperties{ Data: map[string]string{"node.test-policy": "value"}, Policy: map[string]string{"test-policy-rule": "some_rule"}, }, } err := ValidateToscaPolicyJsonFields(policy) assert.NoError(t, err) } // Negative test cases for ValidateToscaPolicyJsonFields func TestValidateToscaPolicyJsonFields_Negative(t *testing.T) { invalidPolicy := model.ToscaPolicy{ Name: "wrong-policy", Version: "1.0", Metadata: model.Metadata{ PolicyID: "test-policy", PolicyVersion: "1.0", }, } err := ValidateToscaPolicyJsonFields(invalidPolicy) assert.Error(t, err) } func TestValidateToscaPolicyJsonFields_DuplicatePolicy(t *testing.T) { policy := model.ToscaPolicy{ Name: "cell.consistency", Version: "1.0", Metadata: model.Metadata{ PolicyID: "cell.consistency", PolicyVersion: "1.0", }, Properties: model.PolicyProperties{ Data: map[string]string{"test-policy-key": "value"}, Policy: map[string]string{"test-policy-rule": "some_rule"}, }, } policy.Properties.Policy["test-policy-rule"] = "duplicate-key-policy" err := ValidateToscaPolicyJsonFields(policy) assert.Error(t, err) // Expect an error due to missing fields } func TestValidateToscaPolicyJsonFields_DuplicateDataKey(t *testing.T) { policy := model.ToscaPolicy{ Name: "cell.consistency", Version: "1.0", Metadata: model.Metadata{ PolicyID: "cell.consistency", PolicyVersion: "1.0", }, Properties: model.PolicyProperties{ Data: map[string]string{"test-policy-key": "value"}, Policy: map[string]string{"test-policy-rule": "some_rule"}, }, } policy.Properties.Data["test-policy-key"] = "duplicatevalue" err := ValidateToscaPolicyJsonFields(policy) assert.Error(t, err) // Expect an error due to missing fields } func TestValidateToscaPolicyJsonFields_PolicyKeyName(t *testing.T) { policy := model.ToscaPolicy{ Name: "cell.consistency", Version: "1.0", Metadata: model.Metadata{ PolicyID: "cell.consistency", PolicyVersion: "1.0", }, Properties: model.PolicyProperties{ Data: map[string]string{"test-policy-key": "value"}, Policy: map[string]string{"test-policy-rule": "some_rule"}, }, } err := ValidateToscaPolicyJsonFields(policy) assert.Error(t, err) // Expect an error due to missing fields } func TestValidateToscaPolicyJsonFields_NameMismatch(t *testing.T) { policy := model.ToscaPolicy{ Name: "wrong-policy", Version: "1.0", Metadata: model.Metadata{ PolicyID: "test-policy", PolicyVersion: "1.0", }, } err := ValidateToscaPolicyJsonFields(policy) assert.Error(t, err, "Expected error due to name mismatch") assert.Contains(t, err.Error(), "policy name 'wrong-policy' does not match metadata policy-id 'test-policy'") } func TestValidateToscaPolicyJsonFields_VersionMismatch(t *testing.T) { policy := model.ToscaPolicy{ Name: "test-policy", Version: "2.0", Metadata: model.Metadata{ PolicyID: "test-policy", PolicyVersion: "1.0", }, } err := ValidateToscaPolicyJsonFields(policy) assert.Error(t, err, "Expected error due to version mismatch") assert.Contains(t, err.Error(), "policy version '2.0' does not match metadata policy-version '1.0'") } func TestValidateToscaPolicyJsonFields_InvalidDataKeyPrefix(t *testing.T) { policy := model.ToscaPolicy{ Name: "test-policy", Version: "1.0", Metadata: model.Metadata{ PolicyID: "test-policy", PolicyVersion: "1.0", }, Properties: model.PolicyProperties{ Data: map[string]string{ "invalid-key": "value1", }, }, } err := ValidateToscaPolicyJsonFields(policy) assert.Error(t, err, "Expected error due to invalid data key prefix") assert.Contains(t, err.Error(), "data key 'invalid-key' does not have name node.'test-policy' as a prefix") } func TestIsValidTime(t *testing.T) { now := time.Now() invalidTime := (*time.Time)(nil) if !IsValidTime(&now) { t.Errorf("Expected true for valid time") } if IsValidTime(invalidTime) { t.Errorf("Expected false for nil time") } } func TestIsValidTimeOffset(t *testing.T) { validOffsets := []string{"+02:00", "-05:00", "00:00"} invalidOffsets := []string{"25:00", "abc", "12:345", "-123:45", ""} for _, offset := range validOffsets { if !IsValidTimeOffset(&offset) { t.Errorf("Expected true for valid offset: %s", offset) } } for _, offset := range invalidOffsets { if IsValidTimeOffset(&offset) { t.Errorf("Expected false for invalid offset: %s", offset) } } } func TestIsValidTimeZone(t *testing.T) { validZones := []string{"America/New_York", "UTC", "Europe/London"} invalidZones := []string{"Invalid/Zone", "1234", "New_York/America", " "} for _, zone := range validZones { if !IsValidTimeZone(&zone) { t.Errorf("Expected true for valid time zone: %s", zone) } } for _, zone := range invalidZones { if IsValidTimeZone(&zone) { t.Errorf("Expected false for invalid time zone: %s", zone) } } } func TestIsValidData(t *testing.T) { validData := []map[string]interface{}{{"key": "value"}} invalidData := []map[string]interface{}{} if !IsValidData(&validData) { t.Errorf("Expected true for non-empty data") } if IsValidData(&invalidData) { t.Errorf("Expected false for empty data") } } func TestIsValidCurrentDate(t *testing.T) { validDates := []string{"2025-01-17", "1999-12-31"} invalidDates := []string{"20250117", "01-17-2025", "abcd-ef-gh", ""} for _, date := range validDates { if !IsValidCurrentDate(&date) { t.Errorf("Expected true for valid date: %s", date) } } for _, date := range invalidDates { if IsValidCurrentDate(&date) { t.Errorf("Expected false for invalid date: %s", date) } } } func TestIsValidCurrentTime(t *testing.T) { validTime := []string{"08:26:41.857Z", "12:35:55.873Z"} invalidTime := []string{"1:2:3:4", "", " "} for _, timeval := range validTime { if !IsValidCurrentTime(&timeval) { t.Errorf("Expected true for valid time: %s", timeval) } } for _, invalidt := range invalidTime { if IsValidCurrentTime(&invalidt) { t.Errorf("Expected false for invalid time: %s", invalidt) } } } func TestIsValidString(t *testing.T) { validStrings := []string{"test", "example"} invalidStrings := []string{"", " "} for _, str := range validStrings { if !IsValidString(&str) { t.Errorf("Expected true for valid string: %s", str) } } for _, str := range invalidStrings { if IsValidString(&str) { t.Errorf("Expected false for invalid string: %s", str) } } } func TestBuildBundle(t *testing.T) { output, err := BuildBundle(mockCmd) if err != nil { t.Errorf("BuildBundle() error = %v, wantErr %v", err, output) } } func TestBuildBundle_CommandFailure(t *testing.T) { // Mock function to simulate command failure mockCmdFail := func(command string, args ...string) *exec.Cmd { cs := []string{"-test.run=TestHelperProcess", "--", command} cs = append(cs, args...) cmd := exec.Command(os.Args[0], cs...) cmd.Env = []string{"GO_WANT_HELPER_PROCESS=1"} cmd.Stderr = os.Stderr return cmd } output, err := BuildBundle(mockCmdFail) if err == nil { t.Errorf("BuildBundle() error = nil, wantErr %v", output) } } // Test function for isSubDirEmpty using real directories func TestIsSubDirEmpty(t *testing.T) { // Create a temporary directory for testing t.Run("Empty Directory - Should be removed", func(t *testing.T) { tempDir, err := os.MkdirTemp("", "emptyDir") require.NoError(t, err) // Call the function err = isSubDirEmpty(tempDir) // Assert no error and directory should be removed assert.NoError(t, err) _, err = os.Stat(tempDir) assert.True(t, os.IsNotExist(err)) // Directory should be gone }) t.Run("Non-Empty Directory - Should not be removed", func(t *testing.T) { tempDir, err := os.MkdirTemp("", "nonEmptyDir") require.NoError(t, err) // Create a file inside to make the directory non-empty _, err = os.CreateTemp(tempDir, "file") require.NoError(t, err) // Call the function err = isSubDirEmpty(tempDir) // Assert directory still exists assert.NoError(t, err) _, err = os.Stat(tempDir) assert.NoError(t, err) // Directory should still exist // Clean up os.RemoveAll(tempDir) }) t.Run("Non-Existent Directory - Should return an error", func(t *testing.T) { tempDir := "/path/that/does/not/exist" err := isSubDirEmpty(tempDir) // Assert error assert.Error(t, err) // assert.True(t, os.IsNotExist(err)) }) t.Run("Error Removing Directory - Should return an error", func(t *testing.T) { // Create a temporary directory tempDir, err := os.MkdirTemp("", "errorDir") require.NoError(t, err) // Mock removeAll to return an error originalRemoveAll := removeAll defer func() { removeAll = originalRemoveAll }() // Restore after test removeAll = func(path string) error { return fmt.Errorf("failed to remove directory: %s", path) } err = isSubDirEmpty(tempDir) // Assert error assert.Error(t, err) assert.Contains(t, err.Error(), "failed to remove directory") // Clean up os.RemoveAll(tempDir) }) } func TestValidateOPADataRequest(t *testing.T) { ctime := "08:26:41.857Z" onapComp := "COMPONENT" onapIns := "INSTANCE" onapName := "ONAP" policyName := "s3" parsedDate, err := time.Parse("2006-01-02", "2024-02-12") if err != nil { fmt.Println("error in parsedDate") } currentDate := openapi_types.Date{Time: parsedDate} currentDateTime, err := time.Parse(time.RFC3339, "2024-02-12T12:00:00Z") if err != nil { fmt.Println("error in currentDateTime") } inValidDecisionRequest := &oapicodegen.OPADecisionRequest{ CurrentDate: ¤tDate, CurrentDateTime: ¤tDateTime, } var data []map[string]interface{} data = nil inValidRequest := &oapicodegen.OPADataUpdateRequest{ CurrentDate: ¤tDate, CurrentDateTime: ¤tDateTime, CurrentTime: &ctime, OnapComponent: &onapComp, OnapInstance: &onapIns, OnapName: &onapName, PolicyName: &policyName, Data: &data, } inValidErr := []string{"TimeOffset is invalid or missing", "TimeZone is invalid or missing"} inValidDecisionErrs := []string{"PolicyName is required and cannot be empty"} tests := []struct { name string request interface{} expectedErr []string }{ {"Valid Request", inValidRequest, inValidErr}, {"Invalid OPADecisionRequest", inValidDecisionRequest, inValidDecisionErrs}, } for _, tt := range tests { t.Run(tt.name, func(t *testing.T) { errors := ValidateOPADataRequest(tt.request) fmt.Printf("error : %s", errors) fmt.Printf("error len : %d", len(errors)) assert.Equal(t, tt.expectedErr, errors) }) } }