diff options
author | Dan Timoney <dtimoney@att.com> | 2021-05-17 10:20:29 -0400 |
---|---|---|
committer | Dan Timoney <dtimoney@att.com> | 2021-05-17 10:20:29 -0400 |
commit | 9a7128436b8d7c292dd8de849883c0cce18e5e68 (patch) | |
tree | dcd6a173ffc27eff83ac733d439443395167bf95 /plans | |
parent | de929b31c7eaeb5f8769028e4e80f265afadef39 (diff) |
Remove SDNC CSIT tests
SDNC CSIT tests have been moved to SDNC project repo (sdnc/oam),
so tests in integration/csit are no longer needed.
Change-Id: Iae8b2e5b609e50ea7f6a215e82fb8344fea0fe69
Issue-ID: SDNC-1545
Signed-off-by: Dan Timoney <dtimoney@att.com>
Diffstat (limited to 'plans')
-rw-r--r-- | plans/sdnc/healthcheck/health_check.sh | 30 | ||||
-rwxr-xr-x | plans/sdnc/healthcheck/setup.sh | 137 | ||||
-rw-r--r-- | plans/sdnc/healthcheck/teardown.sh | 27 | ||||
-rw-r--r-- | plans/sdnc/healthcheck/testplan.txt | 4 | ||||
-rw-r--r-- | plans/sdnc/sdnc_netconf_tls_post_deploy/certs/Makefile | 110 | ||||
-rw-r--r-- | plans/sdnc/sdnc_netconf_tls_post_deploy/sdnc-csit.env | 48 | ||||
-rw-r--r-- | plans/sdnc/sdnc_netconf_tls_post_deploy/setup.sh | 192 | ||||
-rw-r--r-- | plans/sdnc/sdnc_netconf_tls_post_deploy/teardown.sh | 22 | ||||
-rw-r--r-- | plans/sdnc/sdnc_netconf_tls_post_deploy/testplan.txt | 4 |
9 files changed, 0 insertions, 574 deletions
diff --git a/plans/sdnc/healthcheck/health_check.sh b/plans/sdnc/healthcheck/health_check.sh deleted file mode 100644 index e8b5056d..00000000 --- a/plans/sdnc/healthcheck/health_check.sh +++ /dev/null @@ -1,30 +0,0 @@ -#!/usr/bin/env bash -############################################################################### -# Copyright 2017 Huawei Technologies Co., Ltd. -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -############################################################################### -SCRIPTS="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )" -echo $SCRIPTS - -unset http_proxy https_proxy - -response=$(curl --write-out '%{http_code}' --silent --output /dev/null -H "Authorization: Basic YWRtaW46S3A4Yko0U1hzek0wV1hsaGFrM2VIbGNzZTJnQXc4NHZhb0dHbUp2VXkyVQ==" -X POST -H "X-FromAppId: csit-sdnc" -H "X-TransactionId: csit-sdnc" -H "Accept: application/json" -H "Content-Type: application/json" http://localhost:8282/restconf/operations/SLI-API:healthcheck ) - -if [ "$response" == "200" ]; then - echo "SDNC health check passed." - exit 0; -fi - -echo "SDNC health check failed with response code ${response}." -exit 1 diff --git a/plans/sdnc/healthcheck/setup.sh b/plans/sdnc/healthcheck/setup.sh deleted file mode 100755 index 0006621f..00000000 --- a/plans/sdnc/healthcheck/setup.sh +++ /dev/null @@ -1,137 +0,0 @@ -#!/bin/bash -# -# Copyright 2016-2017 Huawei Technologies Co., Ltd. -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Modifications copyright (c) 2017 AT&T Intellectual Property -# Modifications copyright (c) 2020 Samsung Electronics Co., Ltd. -# -# Place the scripts in run order: -set -x -export NEXUS_USERNAME=docker -export NEXUS_PASSWD=docker -export NEXUS_DOCKER_REPO=nexus3.onap.org:10001 -export DMAAP_TOPIC=AUTO -export DOCKER_IMAGE_VERSION=2.2-STAGING-latest -export CCSDK_DOCKER_IMAGE_VERSION=1.1.5 - -# Set credentials -export MYSQL_ROOT_PASSWORD=${MYSQL_ROOT_PASSWORD:-mySecretPassword} -export MYSQL_USER=${MYSQL_USER:-sdnc} -export MYSQL_PASSWORD=${MYSQL_PASSWORD:-test123} -export MYSQL_DATABASE=${MYSQL_DATABASE:-sdncdb} -export ODL_USER=${ODL_USER:-admin} -export ODL_PASSWORD=${ODL_PASSWORD:-Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U} -export ODL_ADMIN_USER=${ODL_ADMIN_USER:-${ODL_USER}} -export ODL_ADMIN_PASSWORD=${ODL_ADMIN_PASSWORD:-${ODL_PASSWORD}} -export DMAAP_USER=${DMAAP_USER:-admin} -export DMAAP_PASSWORD=${DMAAP_PASSWORD:-admin} -export DMAAP_AUTHKEY=${DMAAP_AUTHKEY:-""} -export AAI_TRUSTSTORE_PASSWORD=${AAI_TRUSTSTORE_PASSWORD:-changeit} -export AAI_CLIENT_NAME=${AAI_CLIENT_NAME:-sdnc@sdnc.onap.org} -export AAI_CLIENT_PASSWORD=${AAI_CLIENT_PASSWORD:-demo123456!} -export ANSIBLE_TRUSTSTORE_PASSWORD=${ANSIBLE_TRUSTSTURE_PASSWORD:-changeit} -export HONEYCOMB_USER=${HONEYCOMB_USER:-admin} -export HONEYCOMB_PASSWORD=${HONEYCOMB_PASSWORD:-admin} -export TRUSTSTORE_PASSWORD=${TRUSTSTORE_PASSWORD:-changeit} -export KEYSTORE_PASSWORD=${KEYSTORE_PASSWORD:-adminadmin} -export NENG_USER=${NENG_USER:-ccsdkapps} -export NENG_PASSWORD=${NENG_PASSWORD:-ccsdkapps} -export SO_USER=${SO_USER:-sdncaBpmn} -export SO_PASSWORD=${SO_PASSWORD:-password1$} -export CDS_USER=${CDS_USER:-ccsdkapps} -export CDS_PASSWORD=${CDS_PASSWORD:-ccsdkapps} -export ANSIBLE_USER=${ANSIBLE_USER:-sdnc} -export ANSIBLE_PASSWORD=${ANSIBLE_PASSWORD:-sdnc} -export SQL_CRYPTKEY=${SQL_CRYPTKEY:-fakECryptKey} -export ASDC_USER=${ASDC_USER:-sdnc} -export ASDC_PASSWORD=${ASDC_PASSWORD:-Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U} - - -export MTU=$(/sbin/ifconfig | grep MTU | sed 's/.*MTU://' | sed 's/ .*//' | sort -n | head -1) - -if [ "$MTU" == "" ]; then - export MTU="1450" -fi - - -# Clone SDNC repo to get docker-compose for SDNC -mkdir -p $WORKSPACE/archives/sdnc -cd $WORKSPACE/archives -git clone -b master --single-branch --depth=1 http://gerrit.onap.org/r/sdnc/oam.git sdnc -cd $WORKSPACE/archives/sdnc -git pull -unset http_proxy https_proxy -cd $WORKSPACE/archives/sdnc/installation/src/main/yaml - -sed -i "s/DMAAP_TOPIC_ENV=.*/DMAAP_TOPIC_ENV="AUTO"/g" docker-compose.yml -docker login -u $NEXUS_USERNAME -p $NEXUS_PASSWD $NEXUS_DOCKER_REPO - -docker pull $NEXUS_DOCKER_REPO/onap/sdnc-image:$DOCKER_IMAGE_VERSION -docker tag $NEXUS_DOCKER_REPO/onap/sdnc-image:$DOCKER_IMAGE_VERSION onap/sdnc-image:latest - -docker pull $NEXUS_DOCKER_REPO/onap/sdnc-ansible-server-image:$DOCKER_IMAGE_VERSION -docker tag $NEXUS_DOCKER_REPO/onap/sdnc-ansible-server-image:$DOCKER_IMAGE_VERSION onap/sdnc-ansible-server-image:latest - -docker pull $NEXUS_DOCKER_REPO/onap/ccsdk-dgbuilder-image:$CCSDK_DOCKER_IMAGE_VERSION -docker tag $NEXUS_DOCKER_REPO/onap/ccsdk-dgbuilder-image:$CCSDK_DOCKER_IMAGE_VERSION onap/ccsdk-dgbuilder-image:latest - -docker pull $NEXUS_DOCKER_REPO/onap/sdnc-ueb-listener-image:$DOCKER_IMAGE_VERSION -docker tag $NEXUS_DOCKER_REPO/onap/sdnc-ueb-listener-image:$DOCKER_IMAGE_VERSION onap/sdnc-ueb-listener-image:latest - -docker pull $NEXUS_DOCKER_REPO/onap/sdnc-dmaap-listener-image:$DOCKER_IMAGE_VERSION - -docker tag $NEXUS_DOCKER_REPO/onap/sdnc-dmaap-listener-image:$DOCKER_IMAGE_VERSION onap/sdnc-dmaap-listener-image:latest - - -# start SDNC containers with docker compose and configuration from docker-compose.yml -docker-compose up -d - -# WAIT 5 minutes maximum and check karaf.log for readiness every 10 seconds - -TIME_OUT=300 -INTERVAL=10 - -TIME=0 -while [ "$TIME" -lt "$TIME_OUT" ]; do - -docker exec sdnc_controller_container cat /opt/opendaylight/data/log/karaf.log | grep 'warp coils' - - if [ $? == 0 ] ; then - echo SDNC karaf started in $TIME seconds - break; - fi - - echo Sleep: $INTERVAL seconds before testing if SDNC is up. Total wait time up now is: $TIME seconds. Timeout is: $TIME_OUT seconds - sleep $INTERVAL - TIME=$(($TIME+$INTERVAL)) -done - -if [ "$TIME" -ge "$TIME_OUT" ]; then - echo TIME OUT: karaf session not started in $TIME_OUT seconds, setup failed - exit 1; -fi - -num_bundles=$(docker exec -i sdnc_controller_container /opt/opendaylight/current/bin/client bundle:list | tail -1 | cut -d' ' -f1) -num_failed_bundles=$(docker exec -i sdnc_controller_container /opt/opendaylight/current/bin/client bundle:list | grep Failure | wc -l) -failed_bundles=$(docker exec -i sdnc_controller_container /opt/opendaylight/current/bin/client bundle:list | grep Failure) -echo There is/are $num_failed_bundles failed bundles out of $num_bundles installed bundles. - -if [ "$num_failed_bundles" -ge 1 ]; then - echo "The following bundle(s) are in a failed state: " - echo " $failed_bundles" -fi - -# Pass any variables required by Robot test suites in ROBOT_VARIABLES -ROBOT_VARIABLES="-v SCRIPTS:${SCRIPTS}" diff --git a/plans/sdnc/healthcheck/teardown.sh b/plans/sdnc/healthcheck/teardown.sh deleted file mode 100644 index dd465bb3..00000000 --- a/plans/sdnc/healthcheck/teardown.sh +++ /dev/null @@ -1,27 +0,0 @@ -#!/bin/bash -# -# Copyright 2016-2017 Huawei Technologies Co., Ltd. -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# Modifications copyright (c) 2017 AT&T Intellectual Property -# - -kill-instance.sh sdnc_controller_container -kill-instance.sh sdnc_dgbuilder_container -kill-instance.sh sdnc_portal_container -kill-instance.sh sdnc_db_container -kill-instance.sh sdnc_ueblistener_container -kill-instance.sh sdnc_dmaaplistener_container - -# $WORKSPACE/archives/appc deleted with archives folder when tests starts so we keep it at the end for debugging diff --git a/plans/sdnc/healthcheck/testplan.txt b/plans/sdnc/healthcheck/testplan.txt deleted file mode 100644 index 789104a9..00000000 --- a/plans/sdnc/healthcheck/testplan.txt +++ /dev/null @@ -1,4 +0,0 @@ -# Test suites are relative paths under [integration/csit.git]/tests/. -# Place the suites in run order. -sdnc/healthcheck - diff --git a/plans/sdnc/sdnc_netconf_tls_post_deploy/certs/Makefile b/plans/sdnc/sdnc_netconf_tls_post_deploy/certs/Makefile deleted file mode 100644 index b284e61e..00000000 --- a/plans/sdnc/sdnc_netconf_tls_post_deploy/certs/Makefile +++ /dev/null @@ -1,110 +0,0 @@ -all: step_1 step_2 step_3 step_4 step_5 step_6 step_7 step_8 step_9 step_10 step_11 step_12 step_13 step_14 step_15 -.PHONY: all -#Clear certificates -clear: - @echo "***** Clear certificates *****" - rm -f certServiceClient-keystore.jks certServiceServer-keystore.jks root.crt truststore.jks certServiceServer-keystore.p12 - @echo "***** done *****" - -#Generate root private and public keys -step_1: - @echo "***** Generate root private and public keys *****" - keytool -genkeypair -v -alias root -keyalg RSA -keysize 4096 -validity 3650 -keystore root-keystore.jks \ - -dname "CN=root.com, OU=Root Org, O=Root Company, L=Wroclaw, ST=Dolny Slask, C=PL" -keypass secret \ - -storepass secret -ext BasicConstraints:critical="ca:true" - @echo "***** done *****" - -#Export public key as certificate -step_2: - @echo "***** Export public key as certificate *****" - keytool -exportcert -alias root -keystore root-keystore.jks -storepass secret -file root.crt -rfc - @echo "***** done *****" - -#Self-signed root (import root certificate into truststore) -step_3: - @echo "***** Self-signed root import root certificate into truststore *****" - keytool -importcert -alias root -keystore truststore.jks -file root.crt -storepass secret -noprompt - @echo "***** done *****" - -#Generate certService's client private and public keys -step_4: - @echo "***** Generate certService's client private and public keys *****" - keytool -genkeypair -v -alias certServiceClient -keyalg RSA -keysize 2048 -validity 730 \ - -keystore certServiceClient-keystore.jks -storetype JKS \ - -dname "CN=certServiceClient.com,OU=certServiceClient company,O=certServiceClient org,L=Wroclaw,ST=Dolny Slask,C=PL" \ - -keypass secret -storepass secret - @echo "***** done *****" - -#Generate certificate signing request for certService's client -step_5: - @echo "***** Generate certificate signing request for certService's client *****" - keytool -certreq -keystore certServiceClient-keystore.jks -alias certServiceClient -storepass secret -file certServiceClient.csr - @echo "***** done *****" - -#Sign certService's client certificate by root CA -step_6: - @echo "***** Sign certService's client certificate by root CA *****" - keytool -gencert -v -keystore root-keystore.jks -storepass secret -alias root -infile certServiceClient.csr \ - -outfile certServiceClientByRoot.crt -rfc -ext bc=0 -ext ExtendedkeyUsage="serverAuth,clientAuth" - @echo "***** done *****" - -#Import root certificate into client -step_7: - @echo "***** Import root certificate into intermediate *****" - cat root.crt >> certServiceClientByRoot.crt - @echo "***** done *****" - -#Import signed certificate into certService's client -step_8: - @echo "***** Import signed certificate into certService's client *****" - keytool -importcert -file certServiceClientByRoot.crt -destkeystore certServiceClient-keystore.jks -alias certServiceClient -storepass secret -noprompt - @echo "***** done *****" - -#Generate certService private and public keys -step_9: - @echo "***** Generate certService private and public keys *****" - keytool -genkeypair -v -alias aaf-cert-service -keyalg RSA -keysize 2048 -validity 730 \ - -keystore certServiceServer-keystore.jks -storetype JKS \ - -dname "CN=aaf-cert-service,OU=certServiceServer company,O=certServiceServer org,L=Wroclaw,ST=Dolny Slask,C=PL" \ - -keypass secret -storepass secret -ext BasicConstraints:critical="ca:false" - @echo "***** done *****" - -#Generate certificate signing request for certService -step_10: - @echo "***** Generate certificate signing request for certService***** " - keytool -certreq -keystore certServiceServer-keystore.jks -alias aaf-cert-service -storepass secret -file certServiceServer.csr - @echo "***** done *****" - -#Sign certService certificate by root CA -step_11: - @echo "***** Sign certService certificate by root CA *****" - keytool -gencert -v -keystore root-keystore.jks -storepass secret -alias root -infile certServiceServer.csr \ - -outfile certServiceServerByRoot.crt -rfc -ext bc=0 -ext ExtendedkeyUsage="serverAuth,clientAuth" \ - -ext SubjectAlternativeName:="DNS:aaf-cert-service,DNS:localhost" - @echo "***** done *****" - -#Import root certificate into server -step_12: - @echo "***** Import root certificate into intermediate *****" - cat root.crt >> certServiceServerByRoot.crt - @echo "***** done *****" - -#Import signed certificate into certService -step_13: - @echo "***** Import signed certificate into certService *****" - keytool -importcert -file certServiceServerByRoot.crt -destkeystore certServiceServer-keystore.jks -alias aaf-cert-service \ - -storepass secret -noprompt - @echo "***** done *****" - -#Convert certServiceServer-keystore(.jks) to PCKS12 format(.p12) -step_14: - @echo "***** Convert certServiceServer-keystore(.jks) to PCKS12 format(.p12) *****" - keytool -importkeystore -srckeystore certServiceServer-keystore.jks -srcstorepass secret \ - -destkeystore certServiceServer-keystore.p12 -deststoretype PKCS12 -deststorepass secret - @echo "***** done *****" - -#Clear unused certificates -step_15: - @echo "***** Clear unused certificates *****" - rm -f certServiceClientByRoot.crt certServiceClient.csr root-keystore.jks certServiceServerByRoot.crt certServiceServer.csr - @echo "***** done *****" diff --git a/plans/sdnc/sdnc_netconf_tls_post_deploy/sdnc-csit.env b/plans/sdnc/sdnc_netconf_tls_post_deploy/sdnc-csit.env deleted file mode 100644 index d10b9b1c..00000000 --- a/plans/sdnc/sdnc_netconf_tls_post_deploy/sdnc-csit.env +++ /dev/null @@ -1,48 +0,0 @@ -GERRIT_BRANCH=master -NEXUS_USERNAME=docker -NEXUS_PASSWD=docker -SDNC_CONTAINER_NAME=sdnc -SDNC_IMAGE_TAG=2.1-STAGING-latest -NEXUS_DOCKER_REPO=nexus3.onap.org:10001 -CLIENT_CONTAINER_NAME=CertServiceClient -SDNC_CERT_PATH=${SCRIPTS}/sdnc/sdnc/certs -REQUEST_DATA_PATH=${SCRIPTS}/sdnc/sdnc/config -NETCONF_PNP_SIM_CONTAINER_NAME=netconf-simulator -EJBCA_CERTPROFILE_PATH=${SCRIPTS}/sdnc/certservice/certprofile -AAF_CERTSERVICE_SCRIPTS_PATH=${SCRIPTS}/sdnc/certservice/scripts -TEMP_DIR_PATH=${WORKSPACE}/tests/sdnc/sdnc_netconf_tls_post_deploy/tmp -NETCONF_CONFIG_PATH=${SCRIPTS}/sdnc/netconf-pnp-simulator/netconf-config -AAF_INITIAL_CERTS=${WORKSPACE}/plans/sdnc/sdnc_netconf_tls_post_deploy/certs -AAF_CERTSERVICE_CONFIG_PATH=${SCRIPTS}/sdnc/certservice/config/cmpServers.json - -# Set vars with default credentials -export MYSQL_ROOT_PASSWORD=${MYSQL_ROOT_PASSWORD:-mySecretPassword} -export MYSQL_USER=${MYSQL_USER:-sdnc} -export MYSQL_PASSWORD=${MYSQL_PASSWORD:-test123} -export MYSQL_DATABASE=${MYSQL_DATABASE:-sdncdb} -export ODL_USER=${ODL_USER:-admin} -export ODL_PASSWORD=${ODL_PASSWORD:-Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U} -export ODL_ADMIN_USER=${ODL_ADMIN_USER:-${ODL_USER}} -export ODL_ADMIN_PASSWORD=${ODL_ADMIN_PASSWORD:-${ODL_PASSWORD}} -export DMAAP_USER=${DMAAP_USER:-admin} -export DMAAP_PASSWORD=${DMAAP_PASSWORD:-admin} -export DMAAP_AUTHKEY=${DMAAP_AUTHKEY:-""} -export AAI_TRUSTSTORE_PASSWORD=${AAI_TRUSTSTORE_PASSWORD:-changeit} -export AAI_CLIENT_NAME=${AAI_CLIENT_NAME:-sdnc@sdnc.onap.org} -export AAI_CLIENT_PASSWORD=${AAI_CLIENT_PASSWORD:-demo123456!} -export ANSIBLE_TRUSTSTORE_PASSWORD=${ANSIBLE_TRUSTSTURE_PASSWORD:-changeit} -export HONEYCOMB_USER=${HONEYCOMB_USER:-admin} -export HONEYCOMB_PASSWORD=${HONEYCOMB_PASSWORD:-admin} -export TRUSTSTORE_PASSWORD=${TRUSTSTORE_PASSWORD:-changeit} -export KEYSTORE_PASSWORD=${KEYSTORE_PASSWORD:-adminadmin} -export NENG_USER=${NENG_USER:-ccsdkapps} -export NENG_PASSWORD=${NENG_PASSWORD:-ccsdkapps} -export SO_USER=${SO_USER:-sdncaBpmn} -export SO_PASSWORD=${SO_PASSWORD:-password1$} -export CDS_USER=${CDS_USER:-ccsdkapps} -export CDS_PASSWORD=${CDS_PASSWORD:-ccsdkapps} -export ANSIBLE_USER=${ANSIBLE_USER:-sdnc} -export ANSIBLE_PASSWORD=${ANSIBLE_PASSWORD:-sdnc} -export SQL_CRYPTKEY=${SQL_CRYPTKEY:-fakECryptKey} -export ASDC_USER=${ASDC_USER:-sdnc} -export ASDC_PASSWORD=${ASDC_PASSWORD:-Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U} diff --git a/plans/sdnc/sdnc_netconf_tls_post_deploy/setup.sh b/plans/sdnc/sdnc_netconf_tls_post_deploy/setup.sh deleted file mode 100644 index 6f4e547e..00000000 --- a/plans/sdnc/sdnc_netconf_tls_post_deploy/setup.sh +++ /dev/null @@ -1,192 +0,0 @@ -#!/bin/bash -# -# ============LICENSE_START======================================================= -# Copyright (C) 2020 Nordix Foundation. -# Modification copyright (C) 2021 Samsung Electronics, Co., Ltd. -# ================================================================================ -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -# SPDX-License-Identifier: Apache-2.0 -# ============LICENSE_END========================================================= - -# @author Ajay Deep Singh (ajay.deep.singh@est.tech) - -# Source SDNC, AAF-CertService, Netconf-Pnp-Simulator config env -source "${WORKSPACE}"/plans/sdnc/sdnc_netconf_tls_post_deploy/sdnc-csit.env - -chmod +x "${WORKSPACE}"/tests/sdnc/sdnc_netconf_tls_post_deploy/libraries/config.sh -chmod +x "${WORKSPACE}"/tests/sdnc/sdnc_netconf_tls_post_deploy/libraries/config_tls.sh - -# Export temp directory -export TEMP_DIR_PATH=${TEMP_DIR_PATH} - - -export MTU=$(/sbin/ifconfig | grep MTU | sed 's/.*MTU://' | sed 's/ .*//' | sort -n | head -1) - -if [ "$MTU" == "" ]; then - export MTU="1450" -fi - -# Export default Networking bridge created on the host machine -export LOCAL_IP=$(ip -4 addr show docker0 | grep -Po 'inet \K[\d.]+') - -# Prepare enviroment -echo "Uninstall docker-py and reinstall docker." -pip uninstall -y docker-py -pip uninstall -y docker -pip install -U docker==2.7.0 - -# Reinstall pyOpenSSL library -echo "Reinstall pyOpenSSL library." -pip uninstall pyopenssl -y -pip install pyopenssl==17.5.0 - -# Install PYJKS for .jks files management -pip install pyjks - -# Disable Proxy - for local run -unset http_proxy https_proxy - -###################### Netconf Simulator Setup ###################### - -# Get integration/simulators -if [ -d ${SCRIPTS}/sdnc/pnf-simulator ] -then - rm -rf ${SCRIPTS}/sdnc/pnf-simulator -fi -mkdir ${SCRIPTS}/sdnc/pnf-simulator -git clone "https://gerrit.onap.org/r/integration/simulators/pnf-simulator" ${SCRIPTS}/sdnc/pnf-simulator - -# Fix docker-compose to add nexus repo for onap dockers -mv ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/docker-compose.yml ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/docker-compose.yml.orig -cat ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/docker-compose.yml.orig | sed -e "s/image: onap/image: nexus3.onap.org:10001\/onap/" > ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/docker-compose.yml - -# Remove carriage returns (if any) from netopeer start script -mv ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/netconf/initialize_netopeer.sh ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/netconf/initialize_netopeer.sh.orig -cat ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/netconf/initialize_netopeer.sh.orig | sed -e "s/\r$//g" > ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/netconf/initialize_netopeer.sh -chmod 755 ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/netconf/initialize_netopeer.sh - - -# Start Netconf Simulator Container with docker-compose and configuration from docker-compose.yml -docker-compose -f "${SCRIPTS}"/sdnc/pnf-simulator/netconfsimulator/docker-compose.yml up -d - -# Add test user in netopeer container -sleep 60 -docker exec netconfsimulator_netopeer_1 useradd --system test - - -############################## SDNC Setup ############################## - -# Copy client certs from netconf simulator to SDNC certs directory -mkdir /tmp/keys0 -cp ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/tls/client.crt /tmp/keys0 -cp ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/tls/client.key /tmp/keys0 -cp ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/tls/ca.crt /tmp/keys0/trustedCertificates.crt -cwd=$(pwd) -cd /tmp -zip -r $SDNC_CERT_PATH/keys0.zip keys0 -rm -rf /tmp/keys0 - -# Export Mariadb, SDNC tmp, cert directory path -export SDNC_CERT_PATH=${SDNC_CERT_PATH} - -docker pull "${NEXUS_DOCKER_REPO}"/onap/sdnc-image:"${SDNC_IMAGE_TAG}" -docker tag "${NEXUS_DOCKER_REPO}"/onap/sdnc-image:"${SDNC_IMAGE_TAG}" onap/sdnc-image:latest - -# Fix permissions on certs directory to guarantee directory is read/ -# writable and that files are readable -chmod ugo+rwx ${SCRIPTS}/sdnc/sdnc/certs -chmod ugo+r ${SCRIPTS}/sdnc/sdnc/certs/* - -# Start Mariadb, SDNC Containers with docker-compose and configuration from docker-compose.yml -docker-compose -f "${SCRIPTS}"/sdnc/sdnc/docker-compose.yml up -d - -# Check if SDNC Service is healthy and ready -for i in {1..10}; do - SDNC_IP=$(get-instance-ip.sh sdnc) - RESP_CODE=$(curl --write-out '%{http_code}' --silent --output /dev/null -H "Authorization: Basic YWRtaW46S3A4Yko0U1hzek0wV1hsaGFrM2VIbGNzZTJnQXc4NHZhb0dHbUp2VXkyVQ==" -X POST -H "X-FromAppId: csit-sdnc" -H "X-TransactionId: csit-sdnc" -H "Accept: application/json" -H "Content-Type: application/json" http://localhost:8282/restconf/operations/SLI-API:healthcheck) - if [[ "${RESP_CODE}" == '200' ]]; then - echo "SDNC Service is Ready." - break - fi - echo "Waiting for SDNC Service to Start Up..." - sleep 30s -done - -if [[ "${SDNC_IP}" == 'none' || "${SDNC_IP}" == '' || "${RESP_CODE}" != '200' ]]; then - echo "SDNC Service not started, setup failed" - exit 1 -fi - -# Check if SDNC-ODL Karaf Session started -TIME_OUT=300 -INTERVAL=10 -TIME=0 -while [ "$TIME" -lt "$TIME_OUT" ]; do - - docker exec sdnc cat /opt/opendaylight/data/log/karaf.log | grep 'warp coils' - - if [ $? == 0 ] ; then - echo SDNC karaf started in $TIME seconds - break; - fi - - echo Sleep: $INTERVAL seconds before testing if SDNC is up. Total wait time up now is: $TIME seconds. Timeout is: $TIME_OUT seconds - sleep $INTERVAL - TIME=$(($TIME+$INTERVAL)) -done - -if [ "$TIME" -ge "$TIME_OUT" ]; then - echo TIME OUT: karaf session not started in $TIME_OUT seconds, setup failed - exit 1; -fi - -# Check if certificate installation is done -TIME_OUT=300 -INTERVAL=10 -TIME=0 -while [ "$TIME" -lt "$TIME_OUT" ]; do - - docker-compose -f "${SCRIPTS}"/sdnc/sdnc/docker-compose.yml logs sdnc | grep 'Everything OK in Certificate Installation' - - if [ $? == 0 ] ; then - echo SDNC karaf started in $TIME seconds - break; - fi - - echo Sleep: $INTERVAL seconds before testing if SDNC is up. Total wait time up now is: $TIME seconds. Timeout is: $TIME_OUT seconds - sleep $INTERVAL - TIME=$(($TIME+$INTERVAL)) -done - -if [ "$TIME" -ge "$TIME_OUT" ]; then - echo TIME OUT: karaf session not started in $TIME_OUT seconds, setup failed - exit 1; -fi - -# Update default Networking bridge IP in mount.json file -sed -i "s/pnfaddr/${LOCAL_IP}/g" "${REQUEST_DATA_PATH}"/mount.xml - -######################################################################### - -# Export SDNC, AAF-Certservice-Cient, Netconf-Pnp-Simulator Continer Names -export REQUEST_DATA_PATH="${REQUEST_DATA_PATH}" -export SDNC_CONTAINER_NAME="${SDNC_CONTAINER_NAME}" -export CLIENT_CONTAINER_NAME="${CLIENT_CONTAINER_NAME}" -export NETCONF_PNP_SIM_CONTAINER_NAME="${NETCONF_PNP_SIM_CONTAINER_NAME}" - -REPO_IP='127.0.0.1' -ROBOT_VARIABLES+=" -v REPO_IP:${REPO_IP} " -ROBOT_VARIABLES+=" -v SCRIPTS:${SCRIPTS} " - -echo "Finished executing setup for SDNC-Netconf-TLS-Post-Deploy" diff --git a/plans/sdnc/sdnc_netconf_tls_post_deploy/teardown.sh b/plans/sdnc/sdnc_netconf_tls_post_deploy/teardown.sh deleted file mode 100644 index bbf4d075..00000000 --- a/plans/sdnc/sdnc_netconf_tls_post_deploy/teardown.sh +++ /dev/null @@ -1,22 +0,0 @@ -#!/bin/bash -# -# Copyright 2017 ZTE, Inc. and others. -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# - - -docker-compose -f "${SCRIPTS}"/sdnc/sdnc/docker-compose.yml down -v -docker-compose -f "${SCRIPTS}"/sdnc/pnf-simulator/netconfsimulator/docker-compose.yml down -v - - diff --git a/plans/sdnc/sdnc_netconf_tls_post_deploy/testplan.txt b/plans/sdnc/sdnc_netconf_tls_post_deploy/testplan.txt deleted file mode 100644 index a0bffe5c..00000000 --- a/plans/sdnc/sdnc_netconf_tls_post_deploy/testplan.txt +++ /dev/null @@ -1,4 +0,0 @@ -# Test suites are relative paths under [integration/csit.git]/tests/. -# Place the suites in run order. -sdnc/sdnc_netconf_tls_post_deploy - |