aboutsummaryrefslogtreecommitdiffstats
path: root/plans
diff options
context:
space:
mode:
authorDan Timoney <dtimoney@att.com>2021-05-17 10:20:29 -0400
committerDan Timoney <dtimoney@att.com>2021-05-17 10:20:29 -0400
commit9a7128436b8d7c292dd8de849883c0cce18e5e68 (patch)
treedcd6a173ffc27eff83ac733d439443395167bf95 /plans
parentde929b31c7eaeb5f8769028e4e80f265afadef39 (diff)
Remove SDNC CSIT tests
SDNC CSIT tests have been moved to SDNC project repo (sdnc/oam), so tests in integration/csit are no longer needed. Change-Id: Iae8b2e5b609e50ea7f6a215e82fb8344fea0fe69 Issue-ID: SDNC-1545 Signed-off-by: Dan Timoney <dtimoney@att.com>
Diffstat (limited to 'plans')
-rw-r--r--plans/sdnc/healthcheck/health_check.sh30
-rwxr-xr-xplans/sdnc/healthcheck/setup.sh137
-rw-r--r--plans/sdnc/healthcheck/teardown.sh27
-rw-r--r--plans/sdnc/healthcheck/testplan.txt4
-rw-r--r--plans/sdnc/sdnc_netconf_tls_post_deploy/certs/Makefile110
-rw-r--r--plans/sdnc/sdnc_netconf_tls_post_deploy/sdnc-csit.env48
-rw-r--r--plans/sdnc/sdnc_netconf_tls_post_deploy/setup.sh192
-rw-r--r--plans/sdnc/sdnc_netconf_tls_post_deploy/teardown.sh22
-rw-r--r--plans/sdnc/sdnc_netconf_tls_post_deploy/testplan.txt4
9 files changed, 0 insertions, 574 deletions
diff --git a/plans/sdnc/healthcheck/health_check.sh b/plans/sdnc/healthcheck/health_check.sh
deleted file mode 100644
index e8b5056d..00000000
--- a/plans/sdnc/healthcheck/health_check.sh
+++ /dev/null
@@ -1,30 +0,0 @@
-#!/usr/bin/env bash
-###############################################################################
-# Copyright 2017 Huawei Technologies Co., Ltd.
-#
-# Licensed under the Apache License, Version 2.0 (the "License");
-# you may not use this file except in compliance with the License.
-# You may obtain a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS,
-# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-# See the License for the specific language governing permissions and
-# limitations under the License.
-###############################################################################
-SCRIPTS="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )"
-echo $SCRIPTS
-
-unset http_proxy https_proxy
-
-response=$(curl --write-out '%{http_code}' --silent --output /dev/null -H "Authorization: Basic YWRtaW46S3A4Yko0U1hzek0wV1hsaGFrM2VIbGNzZTJnQXc4NHZhb0dHbUp2VXkyVQ==" -X POST -H "X-FromAppId: csit-sdnc" -H "X-TransactionId: csit-sdnc" -H "Accept: application/json" -H "Content-Type: application/json" http://localhost:8282/restconf/operations/SLI-API:healthcheck )
-
-if [ "$response" == "200" ]; then
- echo "SDNC health check passed."
- exit 0;
-fi
-
-echo "SDNC health check failed with response code ${response}."
-exit 1
diff --git a/plans/sdnc/healthcheck/setup.sh b/plans/sdnc/healthcheck/setup.sh
deleted file mode 100755
index 0006621f..00000000
--- a/plans/sdnc/healthcheck/setup.sh
+++ /dev/null
@@ -1,137 +0,0 @@
-#!/bin/bash
-#
-# Copyright 2016-2017 Huawei Technologies Co., Ltd.
-#
-# Licensed under the Apache License, Version 2.0 (the "License");
-# you may not use this file except in compliance with the License.
-# You may obtain a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS,
-# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-# See the License for the specific language governing permissions and
-# limitations under the License.
-#
-# Modifications copyright (c) 2017 AT&T Intellectual Property
-# Modifications copyright (c) 2020 Samsung Electronics Co., Ltd.
-#
-# Place the scripts in run order:
-set -x
-export NEXUS_USERNAME=docker
-export NEXUS_PASSWD=docker
-export NEXUS_DOCKER_REPO=nexus3.onap.org:10001
-export DMAAP_TOPIC=AUTO
-export DOCKER_IMAGE_VERSION=2.2-STAGING-latest
-export CCSDK_DOCKER_IMAGE_VERSION=1.1.5
-
-# Set credentials
-export MYSQL_ROOT_PASSWORD=${MYSQL_ROOT_PASSWORD:-mySecretPassword}
-export MYSQL_USER=${MYSQL_USER:-sdnc}
-export MYSQL_PASSWORD=${MYSQL_PASSWORD:-test123}
-export MYSQL_DATABASE=${MYSQL_DATABASE:-sdncdb}
-export ODL_USER=${ODL_USER:-admin}
-export ODL_PASSWORD=${ODL_PASSWORD:-Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U}
-export ODL_ADMIN_USER=${ODL_ADMIN_USER:-${ODL_USER}}
-export ODL_ADMIN_PASSWORD=${ODL_ADMIN_PASSWORD:-${ODL_PASSWORD}}
-export DMAAP_USER=${DMAAP_USER:-admin}
-export DMAAP_PASSWORD=${DMAAP_PASSWORD:-admin}
-export DMAAP_AUTHKEY=${DMAAP_AUTHKEY:-""}
-export AAI_TRUSTSTORE_PASSWORD=${AAI_TRUSTSTORE_PASSWORD:-changeit}
-export AAI_CLIENT_NAME=${AAI_CLIENT_NAME:-sdnc@sdnc.onap.org}
-export AAI_CLIENT_PASSWORD=${AAI_CLIENT_PASSWORD:-demo123456!}
-export ANSIBLE_TRUSTSTORE_PASSWORD=${ANSIBLE_TRUSTSTURE_PASSWORD:-changeit}
-export HONEYCOMB_USER=${HONEYCOMB_USER:-admin}
-export HONEYCOMB_PASSWORD=${HONEYCOMB_PASSWORD:-admin}
-export TRUSTSTORE_PASSWORD=${TRUSTSTORE_PASSWORD:-changeit}
-export KEYSTORE_PASSWORD=${KEYSTORE_PASSWORD:-adminadmin}
-export NENG_USER=${NENG_USER:-ccsdkapps}
-export NENG_PASSWORD=${NENG_PASSWORD:-ccsdkapps}
-export SO_USER=${SO_USER:-sdncaBpmn}
-export SO_PASSWORD=${SO_PASSWORD:-password1$}
-export CDS_USER=${CDS_USER:-ccsdkapps}
-export CDS_PASSWORD=${CDS_PASSWORD:-ccsdkapps}
-export ANSIBLE_USER=${ANSIBLE_USER:-sdnc}
-export ANSIBLE_PASSWORD=${ANSIBLE_PASSWORD:-sdnc}
-export SQL_CRYPTKEY=${SQL_CRYPTKEY:-fakECryptKey}
-export ASDC_USER=${ASDC_USER:-sdnc}
-export ASDC_PASSWORD=${ASDC_PASSWORD:-Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U}
-
-
-export MTU=$(/sbin/ifconfig | grep MTU | sed 's/.*MTU://' | sed 's/ .*//' | sort -n | head -1)
-
-if [ "$MTU" == "" ]; then
- export MTU="1450"
-fi
-
-
-# Clone SDNC repo to get docker-compose for SDNC
-mkdir -p $WORKSPACE/archives/sdnc
-cd $WORKSPACE/archives
-git clone -b master --single-branch --depth=1 http://gerrit.onap.org/r/sdnc/oam.git sdnc
-cd $WORKSPACE/archives/sdnc
-git pull
-unset http_proxy https_proxy
-cd $WORKSPACE/archives/sdnc/installation/src/main/yaml
-
-sed -i "s/DMAAP_TOPIC_ENV=.*/DMAAP_TOPIC_ENV="AUTO"/g" docker-compose.yml
-docker login -u $NEXUS_USERNAME -p $NEXUS_PASSWD $NEXUS_DOCKER_REPO
-
-docker pull $NEXUS_DOCKER_REPO/onap/sdnc-image:$DOCKER_IMAGE_VERSION
-docker tag $NEXUS_DOCKER_REPO/onap/sdnc-image:$DOCKER_IMAGE_VERSION onap/sdnc-image:latest
-
-docker pull $NEXUS_DOCKER_REPO/onap/sdnc-ansible-server-image:$DOCKER_IMAGE_VERSION
-docker tag $NEXUS_DOCKER_REPO/onap/sdnc-ansible-server-image:$DOCKER_IMAGE_VERSION onap/sdnc-ansible-server-image:latest
-
-docker pull $NEXUS_DOCKER_REPO/onap/ccsdk-dgbuilder-image:$CCSDK_DOCKER_IMAGE_VERSION
-docker tag $NEXUS_DOCKER_REPO/onap/ccsdk-dgbuilder-image:$CCSDK_DOCKER_IMAGE_VERSION onap/ccsdk-dgbuilder-image:latest
-
-docker pull $NEXUS_DOCKER_REPO/onap/sdnc-ueb-listener-image:$DOCKER_IMAGE_VERSION
-docker tag $NEXUS_DOCKER_REPO/onap/sdnc-ueb-listener-image:$DOCKER_IMAGE_VERSION onap/sdnc-ueb-listener-image:latest
-
-docker pull $NEXUS_DOCKER_REPO/onap/sdnc-dmaap-listener-image:$DOCKER_IMAGE_VERSION
-
-docker tag $NEXUS_DOCKER_REPO/onap/sdnc-dmaap-listener-image:$DOCKER_IMAGE_VERSION onap/sdnc-dmaap-listener-image:latest
-
-
-# start SDNC containers with docker compose and configuration from docker-compose.yml
-docker-compose up -d
-
-# WAIT 5 minutes maximum and check karaf.log for readiness every 10 seconds
-
-TIME_OUT=300
-INTERVAL=10
-
-TIME=0
-while [ "$TIME" -lt "$TIME_OUT" ]; do
-
-docker exec sdnc_controller_container cat /opt/opendaylight/data/log/karaf.log | grep 'warp coils'
-
- if [ $? == 0 ] ; then
- echo SDNC karaf started in $TIME seconds
- break;
- fi
-
- echo Sleep: $INTERVAL seconds before testing if SDNC is up. Total wait time up now is: $TIME seconds. Timeout is: $TIME_OUT seconds
- sleep $INTERVAL
- TIME=$(($TIME+$INTERVAL))
-done
-
-if [ "$TIME" -ge "$TIME_OUT" ]; then
- echo TIME OUT: karaf session not started in $TIME_OUT seconds, setup failed
- exit 1;
-fi
-
-num_bundles=$(docker exec -i sdnc_controller_container /opt/opendaylight/current/bin/client bundle:list | tail -1 | cut -d' ' -f1)
-num_failed_bundles=$(docker exec -i sdnc_controller_container /opt/opendaylight/current/bin/client bundle:list | grep Failure | wc -l)
-failed_bundles=$(docker exec -i sdnc_controller_container /opt/opendaylight/current/bin/client bundle:list | grep Failure)
-echo There is/are $num_failed_bundles failed bundles out of $num_bundles installed bundles.
-
-if [ "$num_failed_bundles" -ge 1 ]; then
- echo "The following bundle(s) are in a failed state: "
- echo " $failed_bundles"
-fi
-
-# Pass any variables required by Robot test suites in ROBOT_VARIABLES
-ROBOT_VARIABLES="-v SCRIPTS:${SCRIPTS}"
diff --git a/plans/sdnc/healthcheck/teardown.sh b/plans/sdnc/healthcheck/teardown.sh
deleted file mode 100644
index dd465bb3..00000000
--- a/plans/sdnc/healthcheck/teardown.sh
+++ /dev/null
@@ -1,27 +0,0 @@
-#!/bin/bash
-#
-# Copyright 2016-2017 Huawei Technologies Co., Ltd.
-#
-# Licensed under the Apache License, Version 2.0 (the "License");
-# you may not use this file except in compliance with the License.
-# You may obtain a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS,
-# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-# See the License for the specific language governing permissions and
-# limitations under the License.
-#
-# Modifications copyright (c) 2017 AT&T Intellectual Property
-#
-
-kill-instance.sh sdnc_controller_container
-kill-instance.sh sdnc_dgbuilder_container
-kill-instance.sh sdnc_portal_container
-kill-instance.sh sdnc_db_container
-kill-instance.sh sdnc_ueblistener_container
-kill-instance.sh sdnc_dmaaplistener_container
-
-# $WORKSPACE/archives/appc deleted with archives folder when tests starts so we keep it at the end for debugging
diff --git a/plans/sdnc/healthcheck/testplan.txt b/plans/sdnc/healthcheck/testplan.txt
deleted file mode 100644
index 789104a9..00000000
--- a/plans/sdnc/healthcheck/testplan.txt
+++ /dev/null
@@ -1,4 +0,0 @@
-# Test suites are relative paths under [integration/csit.git]/tests/.
-# Place the suites in run order.
-sdnc/healthcheck
-
diff --git a/plans/sdnc/sdnc_netconf_tls_post_deploy/certs/Makefile b/plans/sdnc/sdnc_netconf_tls_post_deploy/certs/Makefile
deleted file mode 100644
index b284e61e..00000000
--- a/plans/sdnc/sdnc_netconf_tls_post_deploy/certs/Makefile
+++ /dev/null
@@ -1,110 +0,0 @@
-all: step_1 step_2 step_3 step_4 step_5 step_6 step_7 step_8 step_9 step_10 step_11 step_12 step_13 step_14 step_15
-.PHONY: all
-#Clear certificates
-clear:
- @echo "***** Clear certificates *****"
- rm -f certServiceClient-keystore.jks certServiceServer-keystore.jks root.crt truststore.jks certServiceServer-keystore.p12
- @echo "***** done *****"
-
-#Generate root private and public keys
-step_1:
- @echo "***** Generate root private and public keys *****"
- keytool -genkeypair -v -alias root -keyalg RSA -keysize 4096 -validity 3650 -keystore root-keystore.jks \
- -dname "CN=root.com, OU=Root Org, O=Root Company, L=Wroclaw, ST=Dolny Slask, C=PL" -keypass secret \
- -storepass secret -ext BasicConstraints:critical="ca:true"
- @echo "***** done *****"
-
-#Export public key as certificate
-step_2:
- @echo "***** Export public key as certificate *****"
- keytool -exportcert -alias root -keystore root-keystore.jks -storepass secret -file root.crt -rfc
- @echo "***** done *****"
-
-#Self-signed root (import root certificate into truststore)
-step_3:
- @echo "***** Self-signed root import root certificate into truststore *****"
- keytool -importcert -alias root -keystore truststore.jks -file root.crt -storepass secret -noprompt
- @echo "***** done *****"
-
-#Generate certService's client private and public keys
-step_4:
- @echo "***** Generate certService's client private and public keys *****"
- keytool -genkeypair -v -alias certServiceClient -keyalg RSA -keysize 2048 -validity 730 \
- -keystore certServiceClient-keystore.jks -storetype JKS \
- -dname "CN=certServiceClient.com,OU=certServiceClient company,O=certServiceClient org,L=Wroclaw,ST=Dolny Slask,C=PL" \
- -keypass secret -storepass secret
- @echo "***** done *****"
-
-#Generate certificate signing request for certService's client
-step_5:
- @echo "***** Generate certificate signing request for certService's client *****"
- keytool -certreq -keystore certServiceClient-keystore.jks -alias certServiceClient -storepass secret -file certServiceClient.csr
- @echo "***** done *****"
-
-#Sign certService's client certificate by root CA
-step_6:
- @echo "***** Sign certService's client certificate by root CA *****"
- keytool -gencert -v -keystore root-keystore.jks -storepass secret -alias root -infile certServiceClient.csr \
- -outfile certServiceClientByRoot.crt -rfc -ext bc=0 -ext ExtendedkeyUsage="serverAuth,clientAuth"
- @echo "***** done *****"
-
-#Import root certificate into client
-step_7:
- @echo "***** Import root certificate into intermediate *****"
- cat root.crt >> certServiceClientByRoot.crt
- @echo "***** done *****"
-
-#Import signed certificate into certService's client
-step_8:
- @echo "***** Import signed certificate into certService's client *****"
- keytool -importcert -file certServiceClientByRoot.crt -destkeystore certServiceClient-keystore.jks -alias certServiceClient -storepass secret -noprompt
- @echo "***** done *****"
-
-#Generate certService private and public keys
-step_9:
- @echo "***** Generate certService private and public keys *****"
- keytool -genkeypair -v -alias aaf-cert-service -keyalg RSA -keysize 2048 -validity 730 \
- -keystore certServiceServer-keystore.jks -storetype JKS \
- -dname "CN=aaf-cert-service,OU=certServiceServer company,O=certServiceServer org,L=Wroclaw,ST=Dolny Slask,C=PL" \
- -keypass secret -storepass secret -ext BasicConstraints:critical="ca:false"
- @echo "***** done *****"
-
-#Generate certificate signing request for certService
-step_10:
- @echo "***** Generate certificate signing request for certService***** "
- keytool -certreq -keystore certServiceServer-keystore.jks -alias aaf-cert-service -storepass secret -file certServiceServer.csr
- @echo "***** done *****"
-
-#Sign certService certificate by root CA
-step_11:
- @echo "***** Sign certService certificate by root CA *****"
- keytool -gencert -v -keystore root-keystore.jks -storepass secret -alias root -infile certServiceServer.csr \
- -outfile certServiceServerByRoot.crt -rfc -ext bc=0 -ext ExtendedkeyUsage="serverAuth,clientAuth" \
- -ext SubjectAlternativeName:="DNS:aaf-cert-service,DNS:localhost"
- @echo "***** done *****"
-
-#Import root certificate into server
-step_12:
- @echo "***** Import root certificate into intermediate *****"
- cat root.crt >> certServiceServerByRoot.crt
- @echo "***** done *****"
-
-#Import signed certificate into certService
-step_13:
- @echo "***** Import signed certificate into certService *****"
- keytool -importcert -file certServiceServerByRoot.crt -destkeystore certServiceServer-keystore.jks -alias aaf-cert-service \
- -storepass secret -noprompt
- @echo "***** done *****"
-
-#Convert certServiceServer-keystore(.jks) to PCKS12 format(.p12)
-step_14:
- @echo "***** Convert certServiceServer-keystore(.jks) to PCKS12 format(.p12) *****"
- keytool -importkeystore -srckeystore certServiceServer-keystore.jks -srcstorepass secret \
- -destkeystore certServiceServer-keystore.p12 -deststoretype PKCS12 -deststorepass secret
- @echo "***** done *****"
-
-#Clear unused certificates
-step_15:
- @echo "***** Clear unused certificates *****"
- rm -f certServiceClientByRoot.crt certServiceClient.csr root-keystore.jks certServiceServerByRoot.crt certServiceServer.csr
- @echo "***** done *****"
diff --git a/plans/sdnc/sdnc_netconf_tls_post_deploy/sdnc-csit.env b/plans/sdnc/sdnc_netconf_tls_post_deploy/sdnc-csit.env
deleted file mode 100644
index d10b9b1c..00000000
--- a/plans/sdnc/sdnc_netconf_tls_post_deploy/sdnc-csit.env
+++ /dev/null
@@ -1,48 +0,0 @@
-GERRIT_BRANCH=master
-NEXUS_USERNAME=docker
-NEXUS_PASSWD=docker
-SDNC_CONTAINER_NAME=sdnc
-SDNC_IMAGE_TAG=2.1-STAGING-latest
-NEXUS_DOCKER_REPO=nexus3.onap.org:10001
-CLIENT_CONTAINER_NAME=CertServiceClient
-SDNC_CERT_PATH=${SCRIPTS}/sdnc/sdnc/certs
-REQUEST_DATA_PATH=${SCRIPTS}/sdnc/sdnc/config
-NETCONF_PNP_SIM_CONTAINER_NAME=netconf-simulator
-EJBCA_CERTPROFILE_PATH=${SCRIPTS}/sdnc/certservice/certprofile
-AAF_CERTSERVICE_SCRIPTS_PATH=${SCRIPTS}/sdnc/certservice/scripts
-TEMP_DIR_PATH=${WORKSPACE}/tests/sdnc/sdnc_netconf_tls_post_deploy/tmp
-NETCONF_CONFIG_PATH=${SCRIPTS}/sdnc/netconf-pnp-simulator/netconf-config
-AAF_INITIAL_CERTS=${WORKSPACE}/plans/sdnc/sdnc_netconf_tls_post_deploy/certs
-AAF_CERTSERVICE_CONFIG_PATH=${SCRIPTS}/sdnc/certservice/config/cmpServers.json
-
-# Set vars with default credentials
-export MYSQL_ROOT_PASSWORD=${MYSQL_ROOT_PASSWORD:-mySecretPassword}
-export MYSQL_USER=${MYSQL_USER:-sdnc}
-export MYSQL_PASSWORD=${MYSQL_PASSWORD:-test123}
-export MYSQL_DATABASE=${MYSQL_DATABASE:-sdncdb}
-export ODL_USER=${ODL_USER:-admin}
-export ODL_PASSWORD=${ODL_PASSWORD:-Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U}
-export ODL_ADMIN_USER=${ODL_ADMIN_USER:-${ODL_USER}}
-export ODL_ADMIN_PASSWORD=${ODL_ADMIN_PASSWORD:-${ODL_PASSWORD}}
-export DMAAP_USER=${DMAAP_USER:-admin}
-export DMAAP_PASSWORD=${DMAAP_PASSWORD:-admin}
-export DMAAP_AUTHKEY=${DMAAP_AUTHKEY:-""}
-export AAI_TRUSTSTORE_PASSWORD=${AAI_TRUSTSTORE_PASSWORD:-changeit}
-export AAI_CLIENT_NAME=${AAI_CLIENT_NAME:-sdnc@sdnc.onap.org}
-export AAI_CLIENT_PASSWORD=${AAI_CLIENT_PASSWORD:-demo123456!}
-export ANSIBLE_TRUSTSTORE_PASSWORD=${ANSIBLE_TRUSTSTURE_PASSWORD:-changeit}
-export HONEYCOMB_USER=${HONEYCOMB_USER:-admin}
-export HONEYCOMB_PASSWORD=${HONEYCOMB_PASSWORD:-admin}
-export TRUSTSTORE_PASSWORD=${TRUSTSTORE_PASSWORD:-changeit}
-export KEYSTORE_PASSWORD=${KEYSTORE_PASSWORD:-adminadmin}
-export NENG_USER=${NENG_USER:-ccsdkapps}
-export NENG_PASSWORD=${NENG_PASSWORD:-ccsdkapps}
-export SO_USER=${SO_USER:-sdncaBpmn}
-export SO_PASSWORD=${SO_PASSWORD:-password1$}
-export CDS_USER=${CDS_USER:-ccsdkapps}
-export CDS_PASSWORD=${CDS_PASSWORD:-ccsdkapps}
-export ANSIBLE_USER=${ANSIBLE_USER:-sdnc}
-export ANSIBLE_PASSWORD=${ANSIBLE_PASSWORD:-sdnc}
-export SQL_CRYPTKEY=${SQL_CRYPTKEY:-fakECryptKey}
-export ASDC_USER=${ASDC_USER:-sdnc}
-export ASDC_PASSWORD=${ASDC_PASSWORD:-Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U}
diff --git a/plans/sdnc/sdnc_netconf_tls_post_deploy/setup.sh b/plans/sdnc/sdnc_netconf_tls_post_deploy/setup.sh
deleted file mode 100644
index 6f4e547e..00000000
--- a/plans/sdnc/sdnc_netconf_tls_post_deploy/setup.sh
+++ /dev/null
@@ -1,192 +0,0 @@
-#!/bin/bash
-#
-# ============LICENSE_START=======================================================
-# Copyright (C) 2020 Nordix Foundation.
-# Modification copyright (C) 2021 Samsung Electronics, Co., Ltd.
-# ================================================================================
-# Licensed under the Apache License, Version 2.0 (the "License");
-# you may not use this file except in compliance with the License.
-# You may obtain a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS,
-# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-# See the License for the specific language governing permissions and
-# limitations under the License.
-#
-# SPDX-License-Identifier: Apache-2.0
-# ============LICENSE_END=========================================================
-
-# @author Ajay Deep Singh (ajay.deep.singh@est.tech)
-
-# Source SDNC, AAF-CertService, Netconf-Pnp-Simulator config env
-source "${WORKSPACE}"/plans/sdnc/sdnc_netconf_tls_post_deploy/sdnc-csit.env
-
-chmod +x "${WORKSPACE}"/tests/sdnc/sdnc_netconf_tls_post_deploy/libraries/config.sh
-chmod +x "${WORKSPACE}"/tests/sdnc/sdnc_netconf_tls_post_deploy/libraries/config_tls.sh
-
-# Export temp directory
-export TEMP_DIR_PATH=${TEMP_DIR_PATH}
-
-
-export MTU=$(/sbin/ifconfig | grep MTU | sed 's/.*MTU://' | sed 's/ .*//' | sort -n | head -1)
-
-if [ "$MTU" == "" ]; then
- export MTU="1450"
-fi
-
-# Export default Networking bridge created on the host machine
-export LOCAL_IP=$(ip -4 addr show docker0 | grep -Po 'inet \K[\d.]+')
-
-# Prepare enviroment
-echo "Uninstall docker-py and reinstall docker."
-pip uninstall -y docker-py
-pip uninstall -y docker
-pip install -U docker==2.7.0
-
-# Reinstall pyOpenSSL library
-echo "Reinstall pyOpenSSL library."
-pip uninstall pyopenssl -y
-pip install pyopenssl==17.5.0
-
-# Install PYJKS for .jks files management
-pip install pyjks
-
-# Disable Proxy - for local run
-unset http_proxy https_proxy
-
-###################### Netconf Simulator Setup ######################
-
-# Get integration/simulators
-if [ -d ${SCRIPTS}/sdnc/pnf-simulator ]
-then
- rm -rf ${SCRIPTS}/sdnc/pnf-simulator
-fi
-mkdir ${SCRIPTS}/sdnc/pnf-simulator
-git clone "https://gerrit.onap.org/r/integration/simulators/pnf-simulator" ${SCRIPTS}/sdnc/pnf-simulator
-
-# Fix docker-compose to add nexus repo for onap dockers
-mv ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/docker-compose.yml ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/docker-compose.yml.orig
-cat ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/docker-compose.yml.orig | sed -e "s/image: onap/image: nexus3.onap.org:10001\/onap/" > ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/docker-compose.yml
-
-# Remove carriage returns (if any) from netopeer start script
-mv ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/netconf/initialize_netopeer.sh ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/netconf/initialize_netopeer.sh.orig
-cat ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/netconf/initialize_netopeer.sh.orig | sed -e "s/\r$//g" > ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/netconf/initialize_netopeer.sh
-chmod 755 ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/netconf/initialize_netopeer.sh
-
-
-# Start Netconf Simulator Container with docker-compose and configuration from docker-compose.yml
-docker-compose -f "${SCRIPTS}"/sdnc/pnf-simulator/netconfsimulator/docker-compose.yml up -d
-
-# Add test user in netopeer container
-sleep 60
-docker exec netconfsimulator_netopeer_1 useradd --system test
-
-
-############################## SDNC Setup ##############################
-
-# Copy client certs from netconf simulator to SDNC certs directory
-mkdir /tmp/keys0
-cp ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/tls/client.crt /tmp/keys0
-cp ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/tls/client.key /tmp/keys0
-cp ${SCRIPTS}/sdnc/pnf-simulator/netconfsimulator/tls/ca.crt /tmp/keys0/trustedCertificates.crt
-cwd=$(pwd)
-cd /tmp
-zip -r $SDNC_CERT_PATH/keys0.zip keys0
-rm -rf /tmp/keys0
-
-# Export Mariadb, SDNC tmp, cert directory path
-export SDNC_CERT_PATH=${SDNC_CERT_PATH}
-
-docker pull "${NEXUS_DOCKER_REPO}"/onap/sdnc-image:"${SDNC_IMAGE_TAG}"
-docker tag "${NEXUS_DOCKER_REPO}"/onap/sdnc-image:"${SDNC_IMAGE_TAG}" onap/sdnc-image:latest
-
-# Fix permissions on certs directory to guarantee directory is read/
-# writable and that files are readable
-chmod ugo+rwx ${SCRIPTS}/sdnc/sdnc/certs
-chmod ugo+r ${SCRIPTS}/sdnc/sdnc/certs/*
-
-# Start Mariadb, SDNC Containers with docker-compose and configuration from docker-compose.yml
-docker-compose -f "${SCRIPTS}"/sdnc/sdnc/docker-compose.yml up -d
-
-# Check if SDNC Service is healthy and ready
-for i in {1..10}; do
- SDNC_IP=$(get-instance-ip.sh sdnc)
- RESP_CODE=$(curl --write-out '%{http_code}' --silent --output /dev/null -H "Authorization: Basic YWRtaW46S3A4Yko0U1hzek0wV1hsaGFrM2VIbGNzZTJnQXc4NHZhb0dHbUp2VXkyVQ==" -X POST -H "X-FromAppId: csit-sdnc" -H "X-TransactionId: csit-sdnc" -H "Accept: application/json" -H "Content-Type: application/json" http://localhost:8282/restconf/operations/SLI-API:healthcheck)
- if [[ "${RESP_CODE}" == '200' ]]; then
- echo "SDNC Service is Ready."
- break
- fi
- echo "Waiting for SDNC Service to Start Up..."
- sleep 30s
-done
-
-if [[ "${SDNC_IP}" == 'none' || "${SDNC_IP}" == '' || "${RESP_CODE}" != '200' ]]; then
- echo "SDNC Service not started, setup failed"
- exit 1
-fi
-
-# Check if SDNC-ODL Karaf Session started
-TIME_OUT=300
-INTERVAL=10
-TIME=0
-while [ "$TIME" -lt "$TIME_OUT" ]; do
-
- docker exec sdnc cat /opt/opendaylight/data/log/karaf.log | grep 'warp coils'
-
- if [ $? == 0 ] ; then
- echo SDNC karaf started in $TIME seconds
- break;
- fi
-
- echo Sleep: $INTERVAL seconds before testing if SDNC is up. Total wait time up now is: $TIME seconds. Timeout is: $TIME_OUT seconds
- sleep $INTERVAL
- TIME=$(($TIME+$INTERVAL))
-done
-
-if [ "$TIME" -ge "$TIME_OUT" ]; then
- echo TIME OUT: karaf session not started in $TIME_OUT seconds, setup failed
- exit 1;
-fi
-
-# Check if certificate installation is done
-TIME_OUT=300
-INTERVAL=10
-TIME=0
-while [ "$TIME" -lt "$TIME_OUT" ]; do
-
- docker-compose -f "${SCRIPTS}"/sdnc/sdnc/docker-compose.yml logs sdnc | grep 'Everything OK in Certificate Installation'
-
- if [ $? == 0 ] ; then
- echo SDNC karaf started in $TIME seconds
- break;
- fi
-
- echo Sleep: $INTERVAL seconds before testing if SDNC is up. Total wait time up now is: $TIME seconds. Timeout is: $TIME_OUT seconds
- sleep $INTERVAL
- TIME=$(($TIME+$INTERVAL))
-done
-
-if [ "$TIME" -ge "$TIME_OUT" ]; then
- echo TIME OUT: karaf session not started in $TIME_OUT seconds, setup failed
- exit 1;
-fi
-
-# Update default Networking bridge IP in mount.json file
-sed -i "s/pnfaddr/${LOCAL_IP}/g" "${REQUEST_DATA_PATH}"/mount.xml
-
-#########################################################################
-
-# Export SDNC, AAF-Certservice-Cient, Netconf-Pnp-Simulator Continer Names
-export REQUEST_DATA_PATH="${REQUEST_DATA_PATH}"
-export SDNC_CONTAINER_NAME="${SDNC_CONTAINER_NAME}"
-export CLIENT_CONTAINER_NAME="${CLIENT_CONTAINER_NAME}"
-export NETCONF_PNP_SIM_CONTAINER_NAME="${NETCONF_PNP_SIM_CONTAINER_NAME}"
-
-REPO_IP='127.0.0.1'
-ROBOT_VARIABLES+=" -v REPO_IP:${REPO_IP} "
-ROBOT_VARIABLES+=" -v SCRIPTS:${SCRIPTS} "
-
-echo "Finished executing setup for SDNC-Netconf-TLS-Post-Deploy"
diff --git a/plans/sdnc/sdnc_netconf_tls_post_deploy/teardown.sh b/plans/sdnc/sdnc_netconf_tls_post_deploy/teardown.sh
deleted file mode 100644
index bbf4d075..00000000
--- a/plans/sdnc/sdnc_netconf_tls_post_deploy/teardown.sh
+++ /dev/null
@@ -1,22 +0,0 @@
-#!/bin/bash
-#
-# Copyright 2017 ZTE, Inc. and others.
-#
-# Licensed under the Apache License, Version 2.0 (the "License");
-# you may not use this file except in compliance with the License.
-# You may obtain a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS,
-# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-# See the License for the specific language governing permissions and
-# limitations under the License.
-#
-
-
-docker-compose -f "${SCRIPTS}"/sdnc/sdnc/docker-compose.yml down -v
-docker-compose -f "${SCRIPTS}"/sdnc/pnf-simulator/netconfsimulator/docker-compose.yml down -v
-
-
diff --git a/plans/sdnc/sdnc_netconf_tls_post_deploy/testplan.txt b/plans/sdnc/sdnc_netconf_tls_post_deploy/testplan.txt
deleted file mode 100644
index a0bffe5c..00000000
--- a/plans/sdnc/sdnc_netconf_tls_post_deploy/testplan.txt
+++ /dev/null
@@ -1,4 +0,0 @@
-# Test suites are relative paths under [integration/csit.git]/tests/.
-# Place the suites in run order.
-sdnc/sdnc_netconf_tls_post_deploy
-