2 * ============LICENSE_START=======================================================
3 * Copyright (C) 2019 Nordix Foundation.
4 * ================================================================================
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at
9 * http://www.apache.org/licenses/LICENSE-2.0
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
17 * SPDX-License-Identifier: Apache-2.0
18 * ============LICENSE_END=========================================================
21 package org.onap.policy.apex.services.onappf.rest;
23 import static org.junit.Assert.assertEquals;
24 import static org.junit.Assert.assertTrue;
27 import java.security.SecureRandom;
29 import java.util.Properties;
30 import java.util.function.Function;
32 import javax.net.ssl.SSLContext;
33 import javax.ws.rs.client.Client;
34 import javax.ws.rs.client.ClientBuilder;
35 import javax.ws.rs.client.Invocation;
36 import javax.ws.rs.client.WebTarget;
37 import javax.ws.rs.core.MediaType;
38 import javax.ws.rs.core.Response;
40 import org.glassfish.jersey.client.ClientProperties;
41 import org.glassfish.jersey.client.authentication.HttpAuthenticationFeature;
42 import org.junit.After;
43 import org.junit.AfterClass;
44 import org.junit.Before;
45 import org.junit.BeforeClass;
46 import org.onap.policy.apex.services.onappf.ApexStarterActivator;
47 import org.onap.policy.apex.services.onappf.ApexStarterConstants;
48 import org.onap.policy.apex.services.onappf.ApexStarterMain;
49 import org.onap.policy.apex.services.onappf.exception.ApexStarterException;
50 import org.onap.policy.apex.services.onappf.parameters.CommonTestData;
51 import org.onap.policy.common.gson.GsonMessageBodyHandler;
52 import org.onap.policy.common.utils.coder.Coder;
53 import org.onap.policy.common.utils.coder.StandardCoder;
54 import org.onap.policy.common.utils.network.NetworkUtil;
55 import org.onap.policy.common.utils.services.Registry;
56 import org.powermock.reflect.Whitebox;
57 import org.slf4j.Logger;
58 import org.slf4j.LoggerFactory;
61 * Class to perform unit test of {@link ApexStarterRestServer}.
63 * @author Ajith Sreekumar (ajith.sreekumar@est.tech)
65 public class CommonApexStarterRestServer {
67 private static final Logger LOGGER = LoggerFactory.getLogger(CommonApexStarterRestServer.class);
69 private static String KEYSTORE = System.getProperty("user.dir") + "/src/test/resources/ssl/policy-keystore";
71 private static Coder coder = new StandardCoder();
73 public static final String NOT_ALIVE = "not alive";
74 public static final String ALIVE = "alive";
75 public static final String SELF = "self";
76 public static final String NAME = "Policy PDP-A";
77 public static final String ENDPOINT_PREFIX = "policy/apex-pdp/v1/";
79 private static int port;
80 protected static String httpsPrefix;
82 private static ApexStarterMain main;
84 private boolean activatorWasAlive;
87 * Allocates a port for the server, writes a config file, and then starts Main.
89 * @throws Exception if an error occurs
92 public static void setUpBeforeClass() throws Exception {
93 port = NetworkUtil.allocPort();
95 httpsPrefix = "https://localhost:" + port + "/";
106 public static void teardownAfterClass() {
110 } catch (final ApexStarterException exp) {
111 LOGGER.error("cannot stop main", exp);
118 * @throws Exception if an error occurs
121 public void setUp() throws Exception {
122 // restart, if not currently running
128 Registry.get(ApexStarterConstants.REG_APEX_STARTER_ACTIVATOR, ApexStarterActivator.class).isAlive();
132 * Restores the activator's "alive" state.
135 public void tearDown() {
136 markActivator(activatorWasAlive);
140 * Verifies that an endpoint appears within the swagger response.
142 * @param endpoint the endpoint of interest
143 * @throws Exception if an error occurs
145 protected void testSwagger(final String endpoint) throws Exception {
146 final Invocation.Builder invocationBuilder = sendFqeRequest(httpsPrefix + "swagger.yaml", true);
147 final String resp = invocationBuilder.get(String.class);
149 assertTrue(resp.contains(ENDPOINT_PREFIX + endpoint + ":"));
153 * Makes a parameter configuration file.
155 * @throws Exception if an error occurs
157 private static void makeConfigFile() throws Exception {
158 final Map<String, Object> config =
159 new CommonTestData().getApexStarterParameterGroupMap("ApexStarterParameterGroup");
161 @SuppressWarnings("unchecked")
162 final Map<String, Object> restParams = (Map<String, Object>) config.get("restServerParameters");
163 restParams.put("port", port);
165 final File file = new File("src/test/resources/TestConfigParams.json");
168 coder.encode(file, config);
174 * @throws Exception if an error occurs
176 private static void startMain() throws Exception {
177 Registry.newRegistry();
179 // make sure port is available
180 if (NetworkUtil.isTcpPortOpen("localhost", port, 1, 1L)) {
181 throw new IllegalStateException("port " + port + " is still in use");
184 final Properties systemProps = System.getProperties();
185 systemProps.put("javax.net.ssl.keyStore", KEYSTORE);
186 systemProps.put("javax.net.ssl.keyStorePassword", "Pol1cy_0nap");
187 System.setProperties(systemProps);
190 final String[] apexStarterConfigParameters = {
191 "-c", "src/test/resources/TestConfigParams.json",
192 "-p", "src/test/resources/topic.properties"
196 main = new ApexStarterMain(apexStarterConfigParameters);
198 if (!NetworkUtil.isTcpPortOpen("localhost", port, 6, 10000L)) {
199 throw new IllegalStateException("server is not listening on port " + port);
206 * @throws Exception if an error occurs
208 private static void stopMain() throws ApexStarterException {
210 final ApexStarterMain main2 = main;
217 private void markActivator(final boolean wasAlive) {
218 final Object manager = Whitebox.getInternalState(
219 Registry.get(ApexStarterConstants.REG_APEX_STARTER_ACTIVATOR, ApexStarterActivator.class), "manager");
220 Whitebox.setInternalState(manager, "running", wasAlive);
224 * Verifies that unauthorized requests fail.
226 * @param endpoint the target end point
227 * @param sender function that sends the requests to the target
228 * @throws Exception if an error occurs
230 protected void checkUnauthRequest(final String endpoint, final Function<Invocation.Builder, Response> sender)
232 assertEquals(Response.Status.UNAUTHORIZED.getStatusCode(),
233 sender.apply(sendNoAuthRequest(endpoint)).getStatus());
237 * Sends a request to an endpoint.
239 * @param endpoint the target endpoint
240 * @return a request builder
241 * @throws Exception if an error occurs
243 protected Invocation.Builder sendRequest(final String endpoint) throws Exception {
244 return sendFqeRequest(httpsPrefix + ENDPOINT_PREFIX + endpoint, true);
248 * Sends a request to an endpoint, without any authorization header.
250 * @param endpoint the target endpoint
251 * @return a request builder
252 * @throws Exception if an error occurs
254 protected Invocation.Builder sendNoAuthRequest(final String endpoint) throws Exception {
255 return sendFqeRequest(httpsPrefix + ENDPOINT_PREFIX + endpoint, false);
259 * Sends a request to a fully qualified endpoint.
261 * @param fullyQualifiedEndpoint the fully qualified target endpoint
262 * @param includeAuth if authorization header should be included
263 * @return a request builder
264 * @throws Exception if an error occurs
266 protected Invocation.Builder sendFqeRequest(final String fullyQualifiedEndpoint, final boolean includeAuth)
268 final SSLContext sc = SSLContext.getInstance("TLSv1.2");
269 sc.init(null, NetworkUtil.getAlwaysTrustingManager(), new SecureRandom());
270 final ClientBuilder clientBuilder =
271 ClientBuilder.newBuilder().sslContext(sc).hostnameVerifier((host, session) -> true);
272 final Client client = clientBuilder.build();
274 client.property(ClientProperties.METAINF_SERVICES_LOOKUP_DISABLE, "true");
275 client.register(GsonMessageBodyHandler.class);
278 final HttpAuthenticationFeature feature = HttpAuthenticationFeature.basic("healthcheck", "zb!XztG34");
279 client.register(feature);
282 final WebTarget webTarget = client.target(fullyQualifiedEndpoint);
284 return webTarget.request(MediaType.APPLICATION_JSON);