* @author Ram Krishna Verma (ram.krishna.verma@ericsson.com)
*/
public class DistributionParameterGroup implements ParameterGroup {
+ // @formatter:off
private String name;
private RestServerParameters restServerParameters;
private Map<String, ReceptionHandlerParameters> receptionHandlerParameters;
- private Map<String, ReceptionHandlerConfigurationParameterGroup> receptionHandlerConfigurationParameters =
- new LinkedHashMap<>();
- private Map<String, PolicyForwarderConfigurationParameterGroup> policyForwarderConfigurationParameters =
- new LinkedHashMap<>();
- private Map<String, PolicyDecoderConfigurationParameterGroup> policyDecoderConfigurationParameters =
- new LinkedHashMap<>();
-
-
+ private Map<String, ReceptionHandlerConfigurationParameterGroup> receptionHandlerConfigurationParameters
+ = new LinkedHashMap<>();
+ private Map<String, PolicyForwarderConfigurationParameterGroup> policyForwarderConfigurationParameters
+ = new LinkedHashMap<>();
+ private Map<String, PolicyDecoderConfigurationParameterGroup> policyDecoderConfigurationParameters
+ = new LinkedHashMap<>();
+ // @formatter:on
/**
* Create the distribution parameter group.
* @param name the parameter group name
*/
public DistributionParameterGroup(final String name, final RestServerParameters restServerParameters,
- final Map<String, ReceptionHandlerParameters> receptionHandlerParameters,
- final Map<String, ReceptionHandlerConfigurationParameterGroup> receptionHandlerConfigurationParameters,
- final Map<String, PolicyForwarderConfigurationParameterGroup> policyForwarderConfigurationParameters,
- final Map<String, PolicyDecoderConfigurationParameterGroup> policyDecoderConfigurationParameters) {
+ final Map<String, ReceptionHandlerParameters> receptionHandlerParameters,
+ final Map<String, ReceptionHandlerConfigurationParameterGroup> receptionHandlerConfigurationParameters,
+ final Map<String, PolicyForwarderConfigurationParameterGroup> policyForwarderConfigurationParameters,
+ final Map<String, PolicyDecoderConfigurationParameterGroup> policyDecoderConfigurationParameters) {
this.name = name;
this.restServerParameters = restServerParameters;
this.receptionHandlerParameters = receptionHandlerParameters;
/**
* Sets the reception handler configuration parameter map.
*
- * @param eventInputParameters the reception handler configuration parameters
+ * @param receptionHandlerConfigurationParameters the reception handler configuration parameters
*/
public void setReceptionHandlerConfigurationParameters(
- final Map<String, ReceptionHandlerConfigurationParameterGroup> receptionHandlerConfigurationParameters) {
+ final Map<String, ReceptionHandlerConfigurationParameterGroup> receptionHandlerConfigurationParameters) {
this.receptionHandlerConfigurationParameters = receptionHandlerConfigurationParameters;
}
* @param policyForwarderConfigurationParameters the policy forwarder configuration parameters
*/
public void setPolicyForwarderConfigurationParameters(
- final Map<String, PolicyForwarderConfigurationParameterGroup> policyForwarderConfigurationParameters) {
+ final Map<String, PolicyForwarderConfigurationParameterGroup> policyForwarderConfigurationParameters) {
this.policyForwarderConfigurationParameters = policyForwarderConfigurationParameters;
}
* @param policyDecoderConfigurationParameters the policyDecoderConfigurationParameters to set
*/
public void setPolicyDecoderConfigurationParameters(
- final Map<String, PolicyDecoderConfigurationParameterGroup> policyDecoderConfigurationParameters) {
+ final Map<String, PolicyDecoderConfigurationParameterGroup> policyDecoderConfigurationParameters) {
this.policyDecoderConfigurationParameters = policyDecoderConfigurationParameters;
}
}
if (restServerParameters == null) {
validationResult.setResult("restServerParameters", ValidationStatus.INVALID,
- "must have restServerParameters to configure distribution rest server");
+ "must have restServerParameters to configure distribution rest server");
} else {
validationResult.setResult("restServerParameters", restServerParameters.validate());
}
private void validateReceptionHandlers(final GroupValidationResult validationResult) {
if (receptionHandlerParameters == null || receptionHandlerParameters.size() == 0) {
validationResult.setResult("receptionHandlerParameters", ValidationStatus.INVALID,
- "must have at least one reception handler");
+ "must have at least one reception handler");
} else {
for (final Entry<String, ReceptionHandlerParameters> nestedGroupEntry : receptionHandlerParameters
- .entrySet()) {
+ .entrySet()) {
validationResult.setResult("receptionHandlerParameters", nestedGroupEntry.getKey(),
- nestedGroupEntry.getValue().validate());
+ nestedGroupEntry.getValue().validate());
}
}
}
private void validateForwarderConfigurations(final GroupValidationResult validationResult) {
- for (final Entry<String, PolicyForwarderConfigurationParameterGroup> configurationParameters :
- policyForwarderConfigurationParameters.entrySet()) {
+ // @formatter:off
+ for (final Entry<String, PolicyForwarderConfigurationParameterGroup> configurationParameters :
+ policyForwarderConfigurationParameters.entrySet()) {
validationResult.setResult("policyForwarderConfigurationParameters", configurationParameters.getKey(),
- configurationParameters.getValue().validate());
+ configurationParameters.getValue().validate());
}
+ // @formatter:on
}
private void validateDecoderConfigurations(final GroupValidationResult validationResult) {
+ // @formatter:off
for (final Entry<String, PolicyDecoderConfigurationParameterGroup> configurationParameters :
- policyDecoderConfigurationParameters.entrySet()) {
+ policyDecoderConfigurationParameters.entrySet()) {
validationResult.setResult("policyDecoderConfigurationParameters", configurationParameters.getKey(),
- configurationParameters.getValue().validate());
+ configurationParameters.getValue().validate());
}
+ // @formatter:on
}
}
package org.onap.policy.distribution.main.rest;
import static org.junit.Assert.assertEquals;
-import static org.junit.Assert.assertTrue;
import java.security.KeyManagementException;
import java.security.NoSuchAlgorithmException;
import org.onap.policy.common.logging.flexlogger.FlexLogger;
import org.onap.policy.common.logging.flexlogger.Logger;
import org.onap.policy.distribution.main.PolicyDistributionException;
-import org.onap.policy.distribution.main.parameters.CommonTestData;
-import org.onap.policy.distribution.main.parameters.RestServerParameters;
import org.onap.policy.distribution.main.startstop.Main;
/**
public class TestHttpsDistributionRestServer {
private static final Logger LOGGER = FlexLogger.getLogger(TestDistributionRestServer.class);
- private static final String NOT_ALIVE = "not alive";
private static final String ALIVE = "alive";
private static final String SELF = "self";
private static final String NAME = "Policy SSD";
private static String KEYSTORE = System.getProperty("user.dir") + "/src/test/resources/ssl/policy-keystore";
@Test
- public void testHealthCheckSuccess() throws PolicyDistributionException, InterruptedException,
- KeyManagementException, NoSuchAlgorithmException {
+ public void testHealthCheckSuccess()
+ throws PolicyDistributionException, InterruptedException, KeyManagementException, NoSuchAlgorithmException {
final String reportString = "Report [name=Policy SSD, url=self, healthy=true, code=200, message=alive]";
final Main main = startDistributionService();
final HealthCheckReport report = performHealthCheck();
main.shutdown();
}
- private HealthCheckReport performHealthCheck() throws InterruptedException, KeyManagementException,
- NoSuchAlgorithmException {
+ private HealthCheckReport performHealthCheck()
+ throws InterruptedException, KeyManagementException, NoSuchAlgorithmException {
HealthCheckReport response = null;
- TrustManager[] noopTrustManager = new TrustManager[]{
- new X509TrustManager() {
+ TrustManager[] noopTrustManager = new TrustManager[] { new X509TrustManager() {
- @Override
- public X509Certificate[] getAcceptedIssuers() {
- return new X509Certificate[0];
- }
+ @Override
+ public X509Certificate[] getAcceptedIssuers() {
+ return new X509Certificate[0];
+ }
- @Override
- public void checkClientTrusted(java.security.cert.X509Certificate[] certs, String authType) {
- }
+ @Override
+ public void checkClientTrusted(java.security.cert.X509Certificate[] certs, String authType) {
+ }
- @Override
- public void checkServerTrusted(java.security.cert.X509Certificate[] certs, String authType) {
- }
+ @Override
+ public void checkServerTrusted(java.security.cert.X509Certificate[] certs, String authType) {
}
- };
+ } };
SSLContext sc = SSLContext.getInstance("TLSv1.2");
sc.init(null, noopTrustManager, new SecureRandom());
- final ClientBuilder clientBuilder =
- ClientBuilder.newBuilder().sslContext(sc).hostnameVerifier((host, session) -> true);
+ final ClientBuilder clientBuilder = ClientBuilder.newBuilder().sslContext(sc)
+ .hostnameVerifier((host, session) -> true);
final Client client = clientBuilder.build();
final HttpAuthenticationFeature feature = HttpAuthenticationFeature.basic("healthcheck", "zb!XztG34");
client.register(feature);
}
private void validateReport(final String name, final String url, final boolean healthy, final int code,
- final String message, final String reportString, final HealthCheckReport report) {
+ final String message, final String reportString, final HealthCheckReport report) {
assertEquals(name, report.getName());
assertEquals(url, report.getUrl());
assertEquals(healthy, report.isHealthy());
package org.onap.policy.distribution.main.rest;
import static org.junit.Assert.assertEquals;
-import static org.junit.Assert.assertTrue;
import java.security.KeyManagementException;
import java.security.NoSuchAlgorithmException;
import org.onap.policy.common.logging.flexlogger.FlexLogger;
import org.onap.policy.common.logging.flexlogger.Logger;
import org.onap.policy.distribution.main.PolicyDistributionException;
-import org.onap.policy.distribution.main.parameters.CommonTestData;
-import org.onap.policy.distribution.main.parameters.RestServerParameters;
import org.onap.policy.distribution.main.startstop.Main;
/**
private static String KEYSTORE = System.getProperty("user.dir") + "/src/test/resources/ssl/policy-keystore";
@Test
- public void testHealthCheckSuccess() throws PolicyDistributionException, InterruptedException,
- KeyManagementException, NoSuchAlgorithmException {
+ public void testHealthCheckSuccess()
+ throws PolicyDistributionException, InterruptedException, KeyManagementException, NoSuchAlgorithmException {
final String reportString = "StatisticsReport [code=200, totalDistributionCount=0, distributionSuccessCount=0, "
- + "distributionFailureCount=0, totalDownloadCount=0, "
- + "downloadSuccessCount=0, downloadFailureCount=0]";
+ + "distributionFailureCount=0, totalDownloadCount=0, " + "downloadSuccessCount=0, downloadFailureCount=0]";
final Main main = startDistributionService();
final StatisticsReport report = performStatisticCheck();
validateReport(200, 0, 0, 0, 0, 0, 0, reportString, report);
main.shutdown();
}
- private StatisticsReport performStatisticCheck() throws InterruptedException, KeyManagementException,
- NoSuchAlgorithmException {
+ private StatisticsReport performStatisticCheck()
+ throws InterruptedException, KeyManagementException, NoSuchAlgorithmException {
StatisticsReport response = null;
- TrustManager[] noopTrustManager = new TrustManager[]{
- new X509TrustManager() {
+ TrustManager[] noopTrustManager = new TrustManager[] { new X509TrustManager() {
- @Override
- public X509Certificate[] getAcceptedIssuers() {
- return new X509Certificate[0];
- }
+ @Override
+ public X509Certificate[] getAcceptedIssuers() {
+ return new X509Certificate[0];
+ }
- @Override
- public void checkClientTrusted(java.security.cert.X509Certificate[] certs, String authType) {
- }
+ @Override
+ public void checkClientTrusted(java.security.cert.X509Certificate[] certs, String authType) {
+ }
- @Override
- public void checkServerTrusted(java.security.cert.X509Certificate[] certs, String authType) {
- }
+ @Override
+ public void checkServerTrusted(java.security.cert.X509Certificate[] certs, String authType) {
}
- };
+ } };
SSLContext sc = SSLContext.getInstance("TLSv1.2");
sc.init(null, noopTrustManager, new SecureRandom());
- final ClientBuilder clientBuilder =
- ClientBuilder.newBuilder().sslContext(sc).hostnameVerifier((host, session) -> true);
+ final ClientBuilder clientBuilder = ClientBuilder.newBuilder().sslContext(sc)
+ .hostnameVerifier((host, session) -> true);
final Client client = clientBuilder.build();
final HttpAuthenticationFeature feature = HttpAuthenticationFeature.basic("healthcheck", "zb!XztG34");
client.register(feature);
}
private void validateReport(final int code, final int total, final int successCount, final int failureCount,
- final int download, final int downloadSuccess, final int downloadFailure, final String reportString,
- final StatisticsReport report) {
+ final int download, final int downloadSuccess, final int downloadFailure, final String reportString,
+ final StatisticsReport report) {
assertEquals(code, report.getCode());
assertEquals(total, report.getTotalDistributionCount());
assertEquals(successCount, report.getDistributionSuccessCount());
package org.onap.policy.distribution.reception.handling.sdc.exceptions;
-
/**
* Exception during download from Pssd.
*/
*/
public ArtifactDownloadException(final String message) {
super(message);
-
+
}
-
+
/**
* Constructor for creating PssdDownloadException using message and exception.
*
* @param message The message to dump
- * @param e the exception that caused this exception to be thrown
+ * @param ex the exception that caused this exception to be thrown
*/
public ArtifactDownloadException(final String message, final Exception ex) {
super(message, ex);
-
+
}
}
package org.onap.policy.distribution.reception.handling.sdc.exceptions;
-
/**
* Exception during artifact installation.
*/
*/
public ArtifactInstallerException(final String message) {
super(message);
-
+
}
-
+
/**
* Constructor for creating ArtifactInstallerException using message and exception.
*
* @param message The message to dump
- * @param e the exception that caused this exception to be thrown
+ * @param ex the exception that caused this exception to be thrown
*/
public ArtifactInstallerException(final String message, final Exception ex) {
super(message, ex);
-
+
}
}
package org.onap.policy.distribution.reception.handling.sdc.exceptions;
-
/**
* Exception of the Pssd controller.
*/
*/
public PssdControllerException(final String message) {
super(message);
-
+
}
-
+
/**
* Constructor for creating PssdControllerException using message and exception.
*
* @param message The message to dump
- * @param e the exception that caused this exception to be thrown
+ * @param ex the exception that caused this exception to be thrown
*/
public PssdControllerException(final String message, final Exception ex) {
super(message, ex);
-
+
}
}
package org.onap.policy.distribution.reception.handling.sdc.exceptions;
-
/**
* Exception of the Pssd controller.
*/
*/
public PssdParametersException(final String message) {
super(message);
-
+
}
-
+
/**
* Constructor for creating PssdParametersException using message and exception.
*
* @param message The message to dump
- * @param e the exception that caused this exception to be thrown
+ * @param ex the exception that caused this exception to be thrown
*/
public PssdParametersException(final String message, final Exception ex) {
super(message, ex);
-
+
}
}
import org.junit.Test;
/**
- * Class to perform unit test of {@link PluginTerminationException}
+ * Class to perform unit test of {@link PluginTerminationException}.
*
* @author Ram Krishna Verma (ram.krishna.verma@ericsson.com)
*/
@Test
public void testPluginTerminationExceptionStringThrowable() {
final Exception cause = new IllegalArgumentException();
- final PluginTerminationException pluginTerminationException =
- new PluginTerminationException("error message", cause);
+ final PluginTerminationException pluginTerminationException = new PluginTerminationException("error message",
+ cause);
assertEquals("error message", pluginTerminationException.getMessage());
assertEquals(cause, pluginTerminationException.getCause());
}