diff options
Diffstat (limited to 'tests')
10 files changed, 438 insertions, 53 deletions
diff --git a/tests/aaf/certservice/assets/invalid_client_docker.env b/tests/aaf/certservice/assets/invalid_client_docker.env index 7fbc666e..3e7d879b 100644 --- a/tests/aaf/certservice/assets/invalid_client_docker.env +++ b/tests/aaf/certservice/assets/invalid_client_docker.env @@ -1,6 +1,6 @@ #Client envs REQUEST_TIMEOUT=5000 -OUTPUT_PATH=/var/log +OUTPUT_PATH=/var/certs CA_NAME=Invalid #Csr config envs COMMON_NAME=onap.org @@ -9,4 +9,4 @@ ORGANIZATION_UNIT=ONAP LOCATION=San-Francisco STATE=California COUNTRY=US -SANS=example.com:example1.com:example3.com
\ No newline at end of file +SANS=example.com:sample.com
\ No newline at end of file diff --git a/tests/aaf/certservice/assets/valid_client_docker.env b/tests/aaf/certservice/assets/valid_client_docker.env index 7a219761..01818960 100644 --- a/tests/aaf/certservice/assets/valid_client_docker.env +++ b/tests/aaf/certservice/assets/valid_client_docker.env @@ -1,6 +1,6 @@ #Client envs REQUEST_TIMEOUT=30000 -OUTPUT_PATH=/var/log +OUTPUT_PATH=/var/certs CA_NAME=RA #Csr config envs COMMON_NAME=onap.org diff --git a/tests/aaf/certservice/libraries/CertClientManager.py b/tests/aaf/certservice/libraries/CertClientManager.py index ebacf221..792b6939 100644 --- a/tests/aaf/certservice/libraries/CertClientManager.py +++ b/tests/aaf/certservice/libraries/CertClientManager.py @@ -1,12 +1,12 @@ import docker import os import shutil -import tarfile import re from OpenSSL import crypto +from docker.types import Mount ARCHIVES_PATH = os.getenv("WORKSPACE") + "/archives/" -TMP_PATH = os.getenv("WORKSPACE") + "/tests/aaf/certservice/tmp" +MOUNT_PATH = os.getenv("WORKSPACE") + "/tests/aaf/certservice/tmp" ERROR_API_REGEX = 'Error on API response.*[0-9]{3}' RESPONSE_CODE_REGEX = '[0-9]{3}' @@ -15,11 +15,19 @@ RESPONSE_CODE_REGEX = '[0-9]{3}' class CertClientManager: def run_client_container(self, client_image, container_name, path_to_env, request_url, network): + self.create_mount_dir() client = docker.from_env() environment = self.read_list_env_from_file(path_to_env) environment.append("REQUEST_URL=" + request_url) - container = client.containers.run(image=client_image, name=container_name, detach=True, environment=environment, - network=network) + container = client.containers.run( + image=client_image, + name=container_name, + environment=environment, + network=network, + user='root', #Run container as root to avoid permission issues with volume mount access + mounts=[Mount(target='/var/certs', source=MOUNT_PATH, type='bind')], + detach=True + ) exitcode = container.wait() return exitcode @@ -39,40 +47,19 @@ class CertClientManager: text_file.write(container.logs()) text_file.close() container.remove() + self.remove_mount_dir() - def can_open_keystore_and_truststore_with_pass(self, container_name): - self.copy_jks_file_to_tmp_dir(container_name) - - keystore_pass_path = TMP_PATH + '/logs/log/keystore.pass' - keystore_jks_path = TMP_PATH + '/logs/log/keystore.jks' + def can_open_keystore_and_truststore_with_pass(self): + keystore_pass_path = MOUNT_PATH + '/keystore.pass' + keystore_jks_path = MOUNT_PATH + '/keystore.jks' can_open_keystore = self.can_open_jks_file_by_pass_file(keystore_pass_path, keystore_jks_path) - truststore_pass_path = TMP_PATH + '/logs/log/truststore.pass' - truststore_jks_path = TMP_PATH + '/logs/log/truststore.jks' + truststore_pass_path = MOUNT_PATH + '/truststore.pass' + truststore_jks_path = MOUNT_PATH + '/truststore.jks' can_open_truststore = self.can_open_jks_file_by_pass_file(truststore_pass_path, truststore_jks_path) - self.remove_tmp_dir(TMP_PATH) return can_open_keystore & can_open_truststore - def copy_jks_file_to_tmp_dir(self, container_name): - os.mkdir(TMP_PATH) - self.copy_jks_file_from_container_to_tmp_dir(container_name) - self.extract_tar_file() - - def copy_jks_file_from_container_to_tmp_dir(self, container_name): - client = docker.from_env() - container = client.containers.get(container_name) - f = open(TMP_PATH + '/var_log.tar', 'wb') - bits, stat = container.get_archive('/var/log/') - for chunk in bits: - f.write(chunk) - f.close() - - def extract_tar_file(self): - my_tar = tarfile.open(TMP_PATH + '/var_log.tar') - my_tar.extractall(TMP_PATH + '/logs') - my_tar.close() - def can_open_jks_file_by_pass_file(self, pass_file_path, jks_file_path): try: password = open(pass_file_path, 'rb').read() @@ -81,8 +68,12 @@ class CertClientManager: except: return False - def remove_tmp_dir(self, tmp_path): - shutil.rmtree(tmp_path) + def create_mount_dir(self): + if not os.path.exists(MOUNT_PATH): + os.makedirs(MOUNT_PATH) + + def remove_mount_dir(self): + shutil.rmtree(MOUNT_PATH) def can_find_api_response_in_logs(self, container_name): logs = self.get_container_logs(container_name) diff --git a/tests/aaf/certservice/resources/cert-service-keywords.robot b/tests/aaf/certservice/resources/cert-service-keywords.robot index c70cfcf4..75cebadc 100644 --- a/tests/aaf/certservice/resources/cert-service-keywords.robot +++ b/tests/aaf/certservice/resources/cert-service-keywords.robot @@ -87,7 +87,7 @@ Run Cert Service Client And Validate JKS File Creation And Client Exit Code [Documentation] Run Cert Service Client Container And Validate Exit Code [Arguments] ${env_file} ${expected_exit_code} ${exit_code}= Run Client Container ${DOCKER_CLIENT_IMAGE} ${CLIENT_CONTAINER_NAME} ${env_file} ${CERT_SERVICE_ADDRESS}${CERT_SERVICE_ENDPOINT} ${CERT_SERVICE_NETWORK} - ${can_open}= Can Open Keystore And Truststore With Pass ${CLIENT_CONTAINER_NAME} + ${can_open}= Can Open Keystore And Truststore With Pass Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} positive_path Should Be Equal As Strings ${exit_code} ${expected_exit_code} Client return: ${exitcode} exit code, but expected: ${expected_exit_code} Should Be True ${can_open} Cannot Open Keystore/TrustStore by passpshase diff --git a/tests/dcaegen2-services-pmsh/testcases/assets/cbs-expectation-unlocked-config.json b/tests/dcaegen2-services-pmsh/testcases/assets/cbs-expectation-unlocked-config.json new file mode 100644 index 00000000..6f6972f4 --- /dev/null +++ b/tests/dcaegen2-services-pmsh/testcases/assets/cbs-expectation-unlocked-config.json @@ -0,0 +1,119 @@ +[ + { + "httpRequest": { + "path": "/service_component_all/.*" + }, + "httpResponse": { + "statusCode": 200, + "headers": { + "content-type": [ + "application/json" + ] + }, + "body": { + "type": "JSON", + "json": { + "policy": { + "subscription": { + "subscriptionName": "ExtraPM-All-gNB-R2B", + "administrativeState": "UNLOCKED", + "fileBasedGP": 15, + "fileLocation": "/pm/pm.xml", + "nfFilter": { + "swVersions": [ + "1.0.0", + "1.0.1" + ], + "nfNames": [ + "^pnf.*", + "^vnf.*" + ] + }, + "measurementGroups": [ + { + "measurementGroup": { + "measurementTypes": [ + { + "measurementType": "countera" + }, + { + "measurementType": "counterb" + } + ], + "managedObjectDNsBasic": [ + { + "DN": "dna" + }, + { + "DN": "dnb" + } + ] + } + }, + { + "measurementGroup": { + "measurementTypes": [ + { + "measurementType": "counterc" + }, + { + "measurementType": "counterd" + } + ], + "managedObjectDNsBasic": [ + { + "DN": "dnc" + }, + { + "DN": "dnd" + } + ] + } + } + ] + } + }, + "config": { + "control_loop_name": "pmsh-control-loop", + "operational_policy_name": "pmsh-operational-policy", + "cert_path": "/opt/app/pmsh/etc/certs/cert.pem", + "streams_publishes": { + "policy_pm_publisher": { + "dmaap_info": { + "client_id": "1475976809466", + "client_role": "org.onap.dcae.pmPublisher", + "topic_url": "https://mr-sim:1080/events/org.onap.dmaap.mr.PM_SUBSCRIPTIONS", + "location": "san-francisco" + }, + "type": "message_router" + } + }, + "streams_subscribes": { + "aai_subscriber": { + "type": "message_router", + "dmaap_info": { + "client_id": "1575976809466", + "client_role": "org.onap.dcae.aaiSub", + "topic_url": "https://mr-sim:1080/events/AAI_EVENT", + "location": "san-francisco" + } + }, + "policy_pm_subscriber": { + "dmaap_info": { + "location": "san-francisco", + "topic_url": "https://mr-sim:1080/events/org.onap.dmaap.mr.PM_SUBSCRIPTIONS", + "client_role": "org.onap.dcae.pmSubscriber", + "client_id": "1575876809456" + }, + "type": "message_router" + } + }, + "key_path": "/opt/app/pmsh/etc/certs/key.pem", + "aaf_identity": "dcae@dcae.onap.org", + "aaf_password": "demo123456!" + } + } + } + } + } +] diff --git a/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-aai-pnf-created.json b/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-aai-pnf-created.json new file mode 100644 index 00000000..9c9dc6e5 --- /dev/null +++ b/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-aai-pnf-created.json @@ -0,0 +1,36 @@ +[ + { + "httpRequest": { + "path": "/events/AAI_EVENT/dcae_pmsh_cg/AAI-EVENT" + }, + "httpResponse": { + "statusCode": 200, + "headers": { + "content-type": [ + "application/json" + ] + }, + "body": [ + "{\"cambria.partition\":\"AAI\",\"event-header\":{\"severity\":\"NORMAL\",\"entity-type\":\"pnf\",\"top-entity-type\":\"pnf\",\"entity-link\":\"/aai/v16/network/pnfs/pnf/pnf_newly_discovered\",\"event-type\":\"AAI-EVENT\",\"domain\":\"dev\",\"action\":\"UPDATE\",\"sequence-number\":\"0\",\"id\":\"db09e090-196e-4f84-9645-e449b1cd3640\",\"source-name\":\"dcae-curl\",\"version\":\"v16\",\"timestamp\":\"20200203-15:14:08:807\"},\"entity\":{\"ipaddress-v4-oam\":\"10.10.10.37\",\"nf-role\":\"gNB\",\"equip-type\":\"val8\",\"relationship-list\":{\"relationship\":[{\"related-to\":\"service-instance\",\"relationship-data\":[{\"relationship-value\":\"Demonstration\",\"relationship-key\":\"customer.global-customer-id\"},{\"relationship-value\":\"vCPE\",\"relationship-key\":\"service-subscription.service-type\"},{\"relationship-value\":\"2c03b2a8-e31a-4749-9e99-3089ab441400\",\"relationship-key\":\"service-instance.service-instance-id\"}],\"related-link\":\"/aai/v16/business/customers/customer/Demonstration/service-subscriptions/service-subscription/vCPE/service-instances/service-instance/2c03b2a8-e31a-4749-9e99-3089ab441400\",\"relationship-label\":\"org.onap.relationships.inventory.ComposedOf\",\"related-to-property\":[{\"property-key\":\"service-instance.service-instance-name\",\"property-value\":\"Svc6_1\"}]}]},\"equip-vendor\":\"Ericsson\",\"serial-number\":\"6061ZW3\",\"ipaddress-v6-oam\":\"2001:0db8:0:0:0:0:1428:57ab\",\"equip-model\":\"val6\",\"in-maint\":false,\"resource-version\":\"1578668956804\",\"sw-version\":\"val7\",\"pnf-id\":\"eabcfaf7-b7f3-45fb-94e7-e6112fb3e8b8\",\"pnf-name\":\"pnf_newly_discovered\",\"orchestration-status\":\"Active\"}}" + ] + }, + "times": { + "remainingTimes": 1, + "unlimited": false + } + }, + { + "httpRequest": { + "path": "/events/AAI_EVENT/dcae_pmsh_cg/AAI-EVENT" + }, + "httpResponse": { + "statusCode": 200, + "headers": { + "content-type": [ + "application/json" + ] + }, + "body": "{}" + } + } +] diff --git a/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-aai-pnf-deleted.json b/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-aai-pnf-deleted.json new file mode 100644 index 00000000..c0accc8c --- /dev/null +++ b/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-aai-pnf-deleted.json @@ -0,0 +1,36 @@ +[ + { + "httpRequest": { + "path": "/events/AAI_EVENT/dcae_pmsh_cg/AAI-EVENT" + }, + "httpResponse": { + "statusCode": 200, + "headers": { + "content-type": [ + "application/json" + ] + }, + "body": [ + "{\"cambria.partition\":\"AAI\",\"event-header\":{\"severity\":\"NORMAL\",\"entity-type\":\"pnf\",\"top-entity-type\":\"pnf\",\"entity-link\":\"/aai/v16/network/pnfs/pnf/pnf_newly_discovered\",\"event-type\":\"AAI-EVENT\",\"domain\":\"dev\",\"action\":\"DELETE\",\"sequence-number\":\"0\",\"id\":\"db09e090-196e-4f84-9645-e449b1cd3640\",\"source-name\":\"dcae-curl\",\"version\":\"v16\",\"timestamp\":\"20200203-15:14:08:807\"},\"entity\":{\"ipaddress-v4-oam\":\"10.10.10.37\",\"nf-role\":\"gNB\",\"equip-type\":\"val8\",\"relationship-list\":{\"relationship\":[{\"related-to\":\"service-instance\",\"relationship-data\":[{\"relationship-value\":\"Demonstration\",\"relationship-key\":\"customer.global-customer-id\"},{\"relationship-value\":\"vCPE\",\"relationship-key\":\"service-subscription.service-type\"},{\"relationship-value\":\"2c03b2a8-e31a-4749-9e99-3089ab441400\",\"relationship-key\":\"service-instance.service-instance-id\"}],\"related-link\":\"/aai/v16/business/customers/customer/Demonstration/service-subscriptions/service-subscription/vCPE/service-instances/service-instance/2c03b2a8-e31a-4749-9e99-3089ab441400\",\"relationship-label\":\"org.onap.relationships.inventory.ComposedOf\",\"related-to-property\":[{\"property-key\":\"service-instance.service-instance-name\",\"property-value\":\"Svc6_1\"}]}]},\"equip-vendor\":\"Ericsson\",\"serial-number\":\"6061ZW3\",\"ipaddress-v6-oam\":\"2001:0db8:0:0:0:0:1428:57ab\",\"equip-model\":\"val6\",\"in-maint\":false,\"resource-version\":\"1578668956804\",\"sw-version\":\"val7\",\"pnf-id\":\"eabcfaf7-b7f3-45fb-94e7-e6112fb3e8b8\",\"pnf-name\":\"pnf_newly_discovered\",\"orchestration-status\":\"Active\"}}" + ] + }, + "times": { + "remainingTimes": 1, + "unlimited": false + } + }, + { + "httpRequest": { + "path": "/events/AAI_EVENT/dcae_pmsh_cg/AAI-EVENT" + }, + "httpResponse": { + "statusCode": 200, + "headers": { + "content-type": [ + "application/json" + ] + }, + "body": "{}" + } + } +] diff --git a/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-policy-subscription-created-pnf-existing.json b/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-policy-subscription-created-pnf-existing.json new file mode 100644 index 00000000..cc14f3c9 --- /dev/null +++ b/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-policy-subscription-created-pnf-existing.json @@ -0,0 +1,39 @@ +[ + { + "httpRequest": { + "path": "/events/org.onap.dmaap.mr.PM_SUBSCRIPTIONS/dcae_pmsh_cg/policy_response_consumer" + }, + "httpResponse": { + "statusCode": 200, + "headers": { + "content-type": [ + "application/json" + ] + }, + "body": [ + "{\"name\": \"ResponseEvent\", \"nameSpace\": \"org.onap.policy.apex.onap.pmcontrol\", \"source\": \"APEX\", \"target\": \"DCAE\", \"version\": \"0.0.1\", \"status\": {\"subscriptionName\": \"ExtraPM-All-gNB-R2B\", \"nfName\": \"pnf-existing\", \"changeType\": \"CREATE\", \"message\": \"success\"}}" + ] + }, + "times": { + "remainingTimes": 1, + "unlimited": false + } + }, + { + "httpRequest": { + "path": "/events/org.onap.dmaap.mr.PM_SUBSCRIPTIONS/dcae_pmsh_cg/policy_response_consumer" + }, + "httpResponse": { + "statusCode": 200, + "headers": { + "content-type": [ + "application/json" + ] + }, + "body": { + "type": "JSON", + "json": {} + } + } + } +] diff --git a/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-policy-subscription-created-pnf-new.json b/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-policy-subscription-created-pnf-new.json new file mode 100644 index 00000000..79bfb44f --- /dev/null +++ b/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-policy-subscription-created-pnf-new.json @@ -0,0 +1,39 @@ +[ + { + "httpRequest": { + "path": "/events/org.onap.dmaap.mr.PM_SUBSCRIPTIONS/dcae_pmsh_cg/policy_response_consumer" + }, + "httpResponse": { + "statusCode": 200, + "headers": { + "content-type": [ + "application/json" + ] + }, + "body": [ + "{\"name\": \"ResponseEvent\", \"nameSpace\": \"org.onap.policy.apex.onap.pmcontrol\", \"source\": \"APEX\", \"target\": \"DCAE\", \"version\": \"0.0.1\", \"status\": {\"subscriptionName\": \"ExtraPM-All-gNB-R2B\", \"nfName\": \"pnf_new\", \"changeType\": \"CREATE\", \"message\": \"success\"}}" + ] + }, + "times": { + "remainingTimes": 1, + "unlimited": false + } + }, + { + "httpRequest": { + "path": "/events/org.onap.dmaap.mr.PM_SUBSCRIPTIONS/dcae_pmsh_cg/policy_response_consumer" + }, + "httpResponse": { + "statusCode": 200, + "headers": { + "content-type": [ + "application/json" + ] + }, + "body": { + "type": "JSON", + "json": {} + } + } + } +] diff --git a/tests/dcaegen2-services-pmsh/testcases/pmsh.robot b/tests/dcaegen2-services-pmsh/testcases/pmsh.robot index 74a575cd..95b78c25 100644 --- a/tests/dcaegen2-services-pmsh/testcases/pmsh.robot +++ b/tests/dcaegen2-services-pmsh/testcases/pmsh.robot @@ -1,38 +1,163 @@ *** Settings *** Documentation Testing PMSH functionality + Library OperatingSystem Library RequestsLibrary Library String +Library Process + +Resource ../../common.robot -Test Setup Create Session pmsh_session ${PMSH_BASE_URL} +Test Setup CreateSessions Test Teardown Delete All Sessions *** Variables *** + ${PMSH_BASE_URL} https://${PMSH_IP}:8443 +${MR_BASE_URL} http://${MR_SIM_IP_ADDRESS}:1080 +${CBS_BASE_URL} http://${CBS_SIM_IP_ADDRESS}:1080 ${HEALTHCHECK_ENDPOINT} /healthcheck +${MR_EXPECTATION_AAI_PNF_CREATED} %{WORKSPACE}/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-aai-pnf-created.json +${MR_EXPECTATION_AAI_PNF_REMOVED} %{WORKSPACE}/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-aai-pnf-deleted.json +${MR_EXPECTATION_POLICY_RESPONSE_PNF_NEW} %{WORKSPACE}/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-policy-subscription-created-pnf-new.json +${MR_EXPECTATION_POLICY_RESPONSE_PNF_EXISTING} %{WORKSPACE}/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-policy-subscription-created-pnf-existing.json +${CBS_EXPECTATION_ADMIN_STATE_UNLOCKED} %{WORKSPACE}/tests/dcaegen2-services-pmsh/testcases/assets/cbs-expectation-unlocked-config.json + +${ADMIN_STATE_LOCKED_PATTERN} 'administrativeState': 'LOCKED' +${ADMIN_STATE_UNLOCKED_PATTERN} 'administrativeState': 'UNLOCKED' +${CLI_EXEC_GET_CBS_CONFIG_FIRST} docker exec pmsh /bin/sh -c "grep -m 1 'PMSH Configuration from Configbinding Service' /var/log/ONAP/dcaegen2/services/pmsh/debug.log" +${CLI_EXEC_GET_CBS_CONFIG_LAST} docker exec pmsh /bin/sh -c "grep 'PMSH Configuration from Configbinding Service' /var/log/ONAP/dcaegen2/services/pmsh/debug.log | tail -1" + +${DB_CMD_NETWORK_FUNCTIONS_COUNT} docker exec db bash -c "psql -U pmsh -d pmsh -A -t -c 'select count(*) from network_functions;'" +${DB_CMD_NF_TO_SUB_REL_COUNT} docker exec db bash -c "psql -U pmsh -d pmsh -A -t -c 'select count(*) from nf_to_sub_rel;'" +${DB_CMD_SUBSCRIPTIONS_COUNT} docker exec db bash -c "psql -U pmsh -d pmsh -A -t -c 'select count(*) from subscriptions;'" + +${CLI_GET_NETWORK_FUNCTIONS_DB_TABLE} docker exec db bash -c "psql -U pmsh -d pmsh -A -t -c 'select nf_name, orchestration_status from network_functions;'" +${CLI_GET_NF_TO_SUB_REL_DB_TABLE} docker exec db bash -c "psql -U pmsh -d pmsh -A -t -c 'select subscription_name, nf_name, nf_sub_status from nf_to_sub_rel;'" +${CLI_GET_SUBSCRIPTIONS_DB_TABLE} docker exec db bash -c "psql -U pmsh -d pmsh -A -t -c 'select subscription_name, status from subscriptions;'" + *** Test Cases *** -Verify Health Check returns 200 when a REST GET request to healthcheck url + +Verify PMSH health check returns 200 and has a status of healthy [Tags] PMSH_01 - [Documentation] Verify Health Check returns 200 when a REST GET request to healthcheck url - [Timeout] 1 minute + [Documentation] Verify the PMSH health check api call functions correctly + [Timeout] 10 seconds ${resp}= Get Request pmsh_session ${HEALTHCHECK_ENDPOINT} - VerifyResponse ${resp.status_code} 200 + Should Be True ${resp.status_code} == 200 + Should Match Regexp ${resp.text} healthy -Verify Health Check response includes healthy status +Verify Administrative State in PMSH log file is LOCKED [Tags] PMSH_02 - [Documentation] Verify Health Check response includes healthy status - [Timeout] 1 minute - ${resp}= Get Request pmsh_session ${HEALTHCHECK_ENDPOINT} - VerifyResponseContains ${resp.text} healthy + [Documentation] Verify Administrative State as logged in PMSH log file is LOCKED + [Timeout] 10 seconds + Sleep 3 Allow time for PMSH to flush to logs + ${cli_cmd_output}= Run Process ${CLI_EXEC_GET_CBS_CONFIG_FIRST} shell=yes + Should Be True ${cli_cmd_output.rc} == 0 + Should Contain ${cli_cmd_output.stdout} ${ADMIN_STATE_LOCKED_PATTERN} + +Verify database tables exist and are empty + [Tags] PMSH_03 + [Documentation] Verify database has been created and is empty + [Timeout] 10 seconds + VerifyDatabaseEmpty + +Verify PNF detected in AAI when administrative state unlocked + [Tags] PMSH_04 + [Documentation] Verify PNF detected when administrative state unlocked + [Timeout] 40 seconds + SetAdministrativeStateToUnlocked + Sleep 31 Allow PMSH time to pick up changes in CBS config + VerifyCommandOutputContains ${CLI_EXEC_GET_CBS_CONFIG_LAST} ${ADMIN_STATE_UNLOCKED_PATTERN} + VerifyCommandOutputIs ${cli_get_subscriptions_db_table} ExtraPM-All-gNB-R2B|UNLOCKED + VerifyCommandOutputIs ${cli_get_network_functions_db_table} pnf-existing|Active + VerifyCommandOutputIs ${cli_get_nf_to_sub_rel_db_table} ExtraPM-All-gNB-R2B|pnf-existing|PENDING_CREATE + +Verify Policy response on MR is handled + [Tags] PMSH_05 + [Documentation] Verify policy response on MR is handled + [Timeout] 40 seconds + SimulatePolicyResponse ${MR_EXPECTATION_POLICY_RESPONSE_PNF_EXISTING} + Sleep 7 seconds Ensure Policy response on MR is picked up + VerifyCommandOutputIs ${cli_get_nf_to_sub_rel_db_table} ExtraPM-All-gNB-R2B|pnf-existing|CREATED + +Verify AAI event on MR detailing new PNF being detected is handled + [Tags] PMSH_06 + [Documentation] Verify PNF created AAI event on MR is handled + [Timeout] 30 seconds + SimulateNewPNF + Sleep 12 seconds Ensure AAI event on MR is picked up + VerifyCommandOutputIs ${CLI_GET_SUBSCRIPTIONS_DB_TABLE} ExtraPM-All-gNB-R2B|UNLOCKED + VerifyCommandOutputIs ${CLI_GET_NETWORK_FUNCTIONS_DB_TABLE} pnf-existing|Active\npnf_newly_discovered|Active + VerifyCommandOutputIs ${CLI_GET_NF_TO_SUB_REL_DB_TABLE} ExtraPM-All-gNB-R2B|pnf-existing|CREATED\nExtraPM-All-gNB-R2B|pnf_newly_discovered|PENDING_CREATE + +Verify AAI event on MR detailing PNF being deleted is handled + [Tags] PMSH_07 + [Documentation] Verify PNF deleted AAI event on MR is handled + [Timeout] 30 seconds + SimulateDeletedPNF + Sleep 12 seconds Ensure AAI event on MR is picked up + VerifyNumberOfRecordsInDbTable ${DB_CMD_NETWORK_FUNCTIONS_COUNT} 1 + VerifyNumberOfRecordsInDbTable ${DB_CMD_NF_TO_SUB_REL_COUNT} 1 *** Keywords *** -VerifyResponse - [Arguments] ${actual_response_value} ${expected_response_value} - Should Be Equal As Strings ${actual_response_value} ${expected_response_value} -VerifyResponseContains - [Arguments] ${response_content} ${string_to_check_for} - Should Contain ${response_content} ${string_to_check_for} +CreateSessions + Create Session pmsh_session ${PMSH_BASE_URL} + Create Session mr_sim_session ${MR_BASE_URL} + Create Session cbs_sim_session ${CBS_BASE_URL} + +SetAdministrativeStateToUnlocked + ${data}= Get Data From File ${CBS_EXPECTATION_ADMIN_STATE_UNLOCKED} + ${resp} = Put Request cbs_sim_session /clear data={"path": "/service_component_all/.*"} + Should Be True ${resp.status_code} == 200 + Sleep 2 Allow CBS time to set expectation + ${resp} = Put Request cbs_sim_session /expectation data=${data} + Should Be True ${resp.status_code} == 201 + +VerifyCommandOutputContains + [Arguments] ${cli_command} ${string_to_check_for} + ${cli_cmd_output}= Run Process ${cli_command} shell=yes + Should Be True ${cli_cmd_output.rc} == 0 + Should Contain ${cli_cmd_output.stdout} ${string_to_check_for} + +VerifyCommandOutputIs + [Arguments] ${cli_cmd} ${expected_contents} + ${cli_cmd_output}= Run Process ${cli_cmd} shell=yes + Log ${cli_cmd_output.stdout} + Should Be True ${cli_cmd_output.rc} == 0 + Should Be Equal As Strings ${cli_cmd_output.stdout} ${expected_contents} + +SimulateNewPNF + ${data}= Get Data From File ${MR_EXPECTATION_AAI_PNF_CREATED} + ${resp} = Put Request mr_sim_session /clear data={"path": "/events/AAI_EVENT/dcae_pmsh_cg/AAI-EVENT"} + Should Be True ${resp.status_code} == 200 + ${resp} = Put Request mr_sim_session /expectation data=${data} + Should Be True ${resp.status_code} == 201 + +SimulatePolicyResponse + [Arguments] ${expected_contents} + ${data}= Get Data From File ${expected_contents} + ${resp} = Put Request mr_sim_session /clear data={"path": "/events/org.onap.dmaap.mr.PM_SUBSCRIPTIONS/dcae_pmsh_cg/policy_response_consumer"} + Should Be True ${resp.status_code} == 200 + ${resp} = Put Request mr_sim_session /expectation data=${data} + Should Be True ${resp.status_code} == 201 + +SimulateDeletedPNF + ${data}= Get Data From File ${MR_EXPECTATION_AAI_PNF_REMOVED} + ${resp} = Put Request mr_sim_session /clear data={"path": "/events/AAI_EVENT/dcae_pmsh_cg/AAI-EVENT"} + Should Be True ${resp.status_code} == 200 + ${resp} = Put Request mr_sim_session /expectation data=${data} + Should Be True ${resp.status_code} == 201 + +VerifyNumberOfRecordsInDbTable + [Arguments] ${db_query} ${expected_count} + ${db_count} Run Process ${db_query} shell=yes + Should Be True ${db_count.stdout} == ${expected_count} + +VerifyDatabaseEmpty + VerifyNumberOfRecordsInDbTable ${DB_CMD_NETWORK_FUNCTIONS_COUNT} 0 + VerifyNumberOfRecordsInDbTable ${DB_CMD_NF_TO_SUB_REL_COUNT} 0 + VerifyNumberOfRecordsInDbTable ${DB_CMD_SUBSCRIPTIONS_COUNT} 0 |