aboutsummaryrefslogtreecommitdiffstats
path: root/tests
diff options
context:
space:
mode:
Diffstat (limited to 'tests')
-rw-r--r--tests/aaf/certservice/assets/invalid_client_docker.env4
-rw-r--r--tests/aaf/certservice/assets/valid_client_docker.env2
-rw-r--r--tests/aaf/certservice/libraries/CertClientManager.py57
-rw-r--r--tests/aaf/certservice/resources/cert-service-keywords.robot2
-rw-r--r--tests/dcaegen2-services-pmsh/testcases/assets/cbs-expectation-unlocked-config.json119
-rw-r--r--tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-aai-pnf-created.json36
-rw-r--r--tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-aai-pnf-deleted.json36
-rw-r--r--tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-policy-subscription-created-pnf-existing.json39
-rw-r--r--tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-policy-subscription-created-pnf-new.json39
-rw-r--r--tests/dcaegen2-services-pmsh/testcases/pmsh.robot157
10 files changed, 438 insertions, 53 deletions
diff --git a/tests/aaf/certservice/assets/invalid_client_docker.env b/tests/aaf/certservice/assets/invalid_client_docker.env
index 7fbc666e..3e7d879b 100644
--- a/tests/aaf/certservice/assets/invalid_client_docker.env
+++ b/tests/aaf/certservice/assets/invalid_client_docker.env
@@ -1,6 +1,6 @@
#Client envs
REQUEST_TIMEOUT=5000
-OUTPUT_PATH=/var/log
+OUTPUT_PATH=/var/certs
CA_NAME=Invalid
#Csr config envs
COMMON_NAME=onap.org
@@ -9,4 +9,4 @@ ORGANIZATION_UNIT=ONAP
LOCATION=San-Francisco
STATE=California
COUNTRY=US
-SANS=example.com:example1.com:example3.com \ No newline at end of file
+SANS=example.com:sample.com \ No newline at end of file
diff --git a/tests/aaf/certservice/assets/valid_client_docker.env b/tests/aaf/certservice/assets/valid_client_docker.env
index 7a219761..01818960 100644
--- a/tests/aaf/certservice/assets/valid_client_docker.env
+++ b/tests/aaf/certservice/assets/valid_client_docker.env
@@ -1,6 +1,6 @@
#Client envs
REQUEST_TIMEOUT=30000
-OUTPUT_PATH=/var/log
+OUTPUT_PATH=/var/certs
CA_NAME=RA
#Csr config envs
COMMON_NAME=onap.org
diff --git a/tests/aaf/certservice/libraries/CertClientManager.py b/tests/aaf/certservice/libraries/CertClientManager.py
index ebacf221..792b6939 100644
--- a/tests/aaf/certservice/libraries/CertClientManager.py
+++ b/tests/aaf/certservice/libraries/CertClientManager.py
@@ -1,12 +1,12 @@
import docker
import os
import shutil
-import tarfile
import re
from OpenSSL import crypto
+from docker.types import Mount
ARCHIVES_PATH = os.getenv("WORKSPACE") + "/archives/"
-TMP_PATH = os.getenv("WORKSPACE") + "/tests/aaf/certservice/tmp"
+MOUNT_PATH = os.getenv("WORKSPACE") + "/tests/aaf/certservice/tmp"
ERROR_API_REGEX = 'Error on API response.*[0-9]{3}'
RESPONSE_CODE_REGEX = '[0-9]{3}'
@@ -15,11 +15,19 @@ RESPONSE_CODE_REGEX = '[0-9]{3}'
class CertClientManager:
def run_client_container(self, client_image, container_name, path_to_env, request_url, network):
+ self.create_mount_dir()
client = docker.from_env()
environment = self.read_list_env_from_file(path_to_env)
environment.append("REQUEST_URL=" + request_url)
- container = client.containers.run(image=client_image, name=container_name, detach=True, environment=environment,
- network=network)
+ container = client.containers.run(
+ image=client_image,
+ name=container_name,
+ environment=environment,
+ network=network,
+ user='root', #Run container as root to avoid permission issues with volume mount access
+ mounts=[Mount(target='/var/certs', source=MOUNT_PATH, type='bind')],
+ detach=True
+ )
exitcode = container.wait()
return exitcode
@@ -39,40 +47,19 @@ class CertClientManager:
text_file.write(container.logs())
text_file.close()
container.remove()
+ self.remove_mount_dir()
- def can_open_keystore_and_truststore_with_pass(self, container_name):
- self.copy_jks_file_to_tmp_dir(container_name)
-
- keystore_pass_path = TMP_PATH + '/logs/log/keystore.pass'
- keystore_jks_path = TMP_PATH + '/logs/log/keystore.jks'
+ def can_open_keystore_and_truststore_with_pass(self):
+ keystore_pass_path = MOUNT_PATH + '/keystore.pass'
+ keystore_jks_path = MOUNT_PATH + '/keystore.jks'
can_open_keystore = self.can_open_jks_file_by_pass_file(keystore_pass_path, keystore_jks_path)
- truststore_pass_path = TMP_PATH + '/logs/log/truststore.pass'
- truststore_jks_path = TMP_PATH + '/logs/log/truststore.jks'
+ truststore_pass_path = MOUNT_PATH + '/truststore.pass'
+ truststore_jks_path = MOUNT_PATH + '/truststore.jks'
can_open_truststore = self.can_open_jks_file_by_pass_file(truststore_pass_path, truststore_jks_path)
- self.remove_tmp_dir(TMP_PATH)
return can_open_keystore & can_open_truststore
- def copy_jks_file_to_tmp_dir(self, container_name):
- os.mkdir(TMP_PATH)
- self.copy_jks_file_from_container_to_tmp_dir(container_name)
- self.extract_tar_file()
-
- def copy_jks_file_from_container_to_tmp_dir(self, container_name):
- client = docker.from_env()
- container = client.containers.get(container_name)
- f = open(TMP_PATH + '/var_log.tar', 'wb')
- bits, stat = container.get_archive('/var/log/')
- for chunk in bits:
- f.write(chunk)
- f.close()
-
- def extract_tar_file(self):
- my_tar = tarfile.open(TMP_PATH + '/var_log.tar')
- my_tar.extractall(TMP_PATH + '/logs')
- my_tar.close()
-
def can_open_jks_file_by_pass_file(self, pass_file_path, jks_file_path):
try:
password = open(pass_file_path, 'rb').read()
@@ -81,8 +68,12 @@ class CertClientManager:
except:
return False
- def remove_tmp_dir(self, tmp_path):
- shutil.rmtree(tmp_path)
+ def create_mount_dir(self):
+ if not os.path.exists(MOUNT_PATH):
+ os.makedirs(MOUNT_PATH)
+
+ def remove_mount_dir(self):
+ shutil.rmtree(MOUNT_PATH)
def can_find_api_response_in_logs(self, container_name):
logs = self.get_container_logs(container_name)
diff --git a/tests/aaf/certservice/resources/cert-service-keywords.robot b/tests/aaf/certservice/resources/cert-service-keywords.robot
index c70cfcf4..75cebadc 100644
--- a/tests/aaf/certservice/resources/cert-service-keywords.robot
+++ b/tests/aaf/certservice/resources/cert-service-keywords.robot
@@ -87,7 +87,7 @@ Run Cert Service Client And Validate JKS File Creation And Client Exit Code
[Documentation] Run Cert Service Client Container And Validate Exit Code
[Arguments] ${env_file} ${expected_exit_code}
${exit_code}= Run Client Container ${DOCKER_CLIENT_IMAGE} ${CLIENT_CONTAINER_NAME} ${env_file} ${CERT_SERVICE_ADDRESS}${CERT_SERVICE_ENDPOINT} ${CERT_SERVICE_NETWORK}
- ${can_open}= Can Open Keystore And Truststore With Pass ${CLIENT_CONTAINER_NAME}
+ ${can_open}= Can Open Keystore And Truststore With Pass
Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} positive_path
Should Be Equal As Strings ${exit_code} ${expected_exit_code} Client return: ${exitcode} exit code, but expected: ${expected_exit_code}
Should Be True ${can_open} Cannot Open Keystore/TrustStore by passpshase
diff --git a/tests/dcaegen2-services-pmsh/testcases/assets/cbs-expectation-unlocked-config.json b/tests/dcaegen2-services-pmsh/testcases/assets/cbs-expectation-unlocked-config.json
new file mode 100644
index 00000000..6f6972f4
--- /dev/null
+++ b/tests/dcaegen2-services-pmsh/testcases/assets/cbs-expectation-unlocked-config.json
@@ -0,0 +1,119 @@
+[
+ {
+ "httpRequest": {
+ "path": "/service_component_all/.*"
+ },
+ "httpResponse": {
+ "statusCode": 200,
+ "headers": {
+ "content-type": [
+ "application/json"
+ ]
+ },
+ "body": {
+ "type": "JSON",
+ "json": {
+ "policy": {
+ "subscription": {
+ "subscriptionName": "ExtraPM-All-gNB-R2B",
+ "administrativeState": "UNLOCKED",
+ "fileBasedGP": 15,
+ "fileLocation": "/pm/pm.xml",
+ "nfFilter": {
+ "swVersions": [
+ "1.0.0",
+ "1.0.1"
+ ],
+ "nfNames": [
+ "^pnf.*",
+ "^vnf.*"
+ ]
+ },
+ "measurementGroups": [
+ {
+ "measurementGroup": {
+ "measurementTypes": [
+ {
+ "measurementType": "countera"
+ },
+ {
+ "measurementType": "counterb"
+ }
+ ],
+ "managedObjectDNsBasic": [
+ {
+ "DN": "dna"
+ },
+ {
+ "DN": "dnb"
+ }
+ ]
+ }
+ },
+ {
+ "measurementGroup": {
+ "measurementTypes": [
+ {
+ "measurementType": "counterc"
+ },
+ {
+ "measurementType": "counterd"
+ }
+ ],
+ "managedObjectDNsBasic": [
+ {
+ "DN": "dnc"
+ },
+ {
+ "DN": "dnd"
+ }
+ ]
+ }
+ }
+ ]
+ }
+ },
+ "config": {
+ "control_loop_name": "pmsh-control-loop",
+ "operational_policy_name": "pmsh-operational-policy",
+ "cert_path": "/opt/app/pmsh/etc/certs/cert.pem",
+ "streams_publishes": {
+ "policy_pm_publisher": {
+ "dmaap_info": {
+ "client_id": "1475976809466",
+ "client_role": "org.onap.dcae.pmPublisher",
+ "topic_url": "https://mr-sim:1080/events/org.onap.dmaap.mr.PM_SUBSCRIPTIONS",
+ "location": "san-francisco"
+ },
+ "type": "message_router"
+ }
+ },
+ "streams_subscribes": {
+ "aai_subscriber": {
+ "type": "message_router",
+ "dmaap_info": {
+ "client_id": "1575976809466",
+ "client_role": "org.onap.dcae.aaiSub",
+ "topic_url": "https://mr-sim:1080/events/AAI_EVENT",
+ "location": "san-francisco"
+ }
+ },
+ "policy_pm_subscriber": {
+ "dmaap_info": {
+ "location": "san-francisco",
+ "topic_url": "https://mr-sim:1080/events/org.onap.dmaap.mr.PM_SUBSCRIPTIONS",
+ "client_role": "org.onap.dcae.pmSubscriber",
+ "client_id": "1575876809456"
+ },
+ "type": "message_router"
+ }
+ },
+ "key_path": "/opt/app/pmsh/etc/certs/key.pem",
+ "aaf_identity": "dcae@dcae.onap.org",
+ "aaf_password": "demo123456!"
+ }
+ }
+ }
+ }
+ }
+]
diff --git a/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-aai-pnf-created.json b/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-aai-pnf-created.json
new file mode 100644
index 00000000..9c9dc6e5
--- /dev/null
+++ b/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-aai-pnf-created.json
@@ -0,0 +1,36 @@
+[
+ {
+ "httpRequest": {
+ "path": "/events/AAI_EVENT/dcae_pmsh_cg/AAI-EVENT"
+ },
+ "httpResponse": {
+ "statusCode": 200,
+ "headers": {
+ "content-type": [
+ "application/json"
+ ]
+ },
+ "body": [
+ "{\"cambria.partition\":\"AAI\",\"event-header\":{\"severity\":\"NORMAL\",\"entity-type\":\"pnf\",\"top-entity-type\":\"pnf\",\"entity-link\":\"/aai/v16/network/pnfs/pnf/pnf_newly_discovered\",\"event-type\":\"AAI-EVENT\",\"domain\":\"dev\",\"action\":\"UPDATE\",\"sequence-number\":\"0\",\"id\":\"db09e090-196e-4f84-9645-e449b1cd3640\",\"source-name\":\"dcae-curl\",\"version\":\"v16\",\"timestamp\":\"20200203-15:14:08:807\"},\"entity\":{\"ipaddress-v4-oam\":\"10.10.10.37\",\"nf-role\":\"gNB\",\"equip-type\":\"val8\",\"relationship-list\":{\"relationship\":[{\"related-to\":\"service-instance\",\"relationship-data\":[{\"relationship-value\":\"Demonstration\",\"relationship-key\":\"customer.global-customer-id\"},{\"relationship-value\":\"vCPE\",\"relationship-key\":\"service-subscription.service-type\"},{\"relationship-value\":\"2c03b2a8-e31a-4749-9e99-3089ab441400\",\"relationship-key\":\"service-instance.service-instance-id\"}],\"related-link\":\"/aai/v16/business/customers/customer/Demonstration/service-subscriptions/service-subscription/vCPE/service-instances/service-instance/2c03b2a8-e31a-4749-9e99-3089ab441400\",\"relationship-label\":\"org.onap.relationships.inventory.ComposedOf\",\"related-to-property\":[{\"property-key\":\"service-instance.service-instance-name\",\"property-value\":\"Svc6_1\"}]}]},\"equip-vendor\":\"Ericsson\",\"serial-number\":\"6061ZW3\",\"ipaddress-v6-oam\":\"2001:0db8:0:0:0:0:1428:57ab\",\"equip-model\":\"val6\",\"in-maint\":false,\"resource-version\":\"1578668956804\",\"sw-version\":\"val7\",\"pnf-id\":\"eabcfaf7-b7f3-45fb-94e7-e6112fb3e8b8\",\"pnf-name\":\"pnf_newly_discovered\",\"orchestration-status\":\"Active\"}}"
+ ]
+ },
+ "times": {
+ "remainingTimes": 1,
+ "unlimited": false
+ }
+ },
+ {
+ "httpRequest": {
+ "path": "/events/AAI_EVENT/dcae_pmsh_cg/AAI-EVENT"
+ },
+ "httpResponse": {
+ "statusCode": 200,
+ "headers": {
+ "content-type": [
+ "application/json"
+ ]
+ },
+ "body": "{}"
+ }
+ }
+]
diff --git a/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-aai-pnf-deleted.json b/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-aai-pnf-deleted.json
new file mode 100644
index 00000000..c0accc8c
--- /dev/null
+++ b/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-aai-pnf-deleted.json
@@ -0,0 +1,36 @@
+[
+ {
+ "httpRequest": {
+ "path": "/events/AAI_EVENT/dcae_pmsh_cg/AAI-EVENT"
+ },
+ "httpResponse": {
+ "statusCode": 200,
+ "headers": {
+ "content-type": [
+ "application/json"
+ ]
+ },
+ "body": [
+ "{\"cambria.partition\":\"AAI\",\"event-header\":{\"severity\":\"NORMAL\",\"entity-type\":\"pnf\",\"top-entity-type\":\"pnf\",\"entity-link\":\"/aai/v16/network/pnfs/pnf/pnf_newly_discovered\",\"event-type\":\"AAI-EVENT\",\"domain\":\"dev\",\"action\":\"DELETE\",\"sequence-number\":\"0\",\"id\":\"db09e090-196e-4f84-9645-e449b1cd3640\",\"source-name\":\"dcae-curl\",\"version\":\"v16\",\"timestamp\":\"20200203-15:14:08:807\"},\"entity\":{\"ipaddress-v4-oam\":\"10.10.10.37\",\"nf-role\":\"gNB\",\"equip-type\":\"val8\",\"relationship-list\":{\"relationship\":[{\"related-to\":\"service-instance\",\"relationship-data\":[{\"relationship-value\":\"Demonstration\",\"relationship-key\":\"customer.global-customer-id\"},{\"relationship-value\":\"vCPE\",\"relationship-key\":\"service-subscription.service-type\"},{\"relationship-value\":\"2c03b2a8-e31a-4749-9e99-3089ab441400\",\"relationship-key\":\"service-instance.service-instance-id\"}],\"related-link\":\"/aai/v16/business/customers/customer/Demonstration/service-subscriptions/service-subscription/vCPE/service-instances/service-instance/2c03b2a8-e31a-4749-9e99-3089ab441400\",\"relationship-label\":\"org.onap.relationships.inventory.ComposedOf\",\"related-to-property\":[{\"property-key\":\"service-instance.service-instance-name\",\"property-value\":\"Svc6_1\"}]}]},\"equip-vendor\":\"Ericsson\",\"serial-number\":\"6061ZW3\",\"ipaddress-v6-oam\":\"2001:0db8:0:0:0:0:1428:57ab\",\"equip-model\":\"val6\",\"in-maint\":false,\"resource-version\":\"1578668956804\",\"sw-version\":\"val7\",\"pnf-id\":\"eabcfaf7-b7f3-45fb-94e7-e6112fb3e8b8\",\"pnf-name\":\"pnf_newly_discovered\",\"orchestration-status\":\"Active\"}}"
+ ]
+ },
+ "times": {
+ "remainingTimes": 1,
+ "unlimited": false
+ }
+ },
+ {
+ "httpRequest": {
+ "path": "/events/AAI_EVENT/dcae_pmsh_cg/AAI-EVENT"
+ },
+ "httpResponse": {
+ "statusCode": 200,
+ "headers": {
+ "content-type": [
+ "application/json"
+ ]
+ },
+ "body": "{}"
+ }
+ }
+]
diff --git a/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-policy-subscription-created-pnf-existing.json b/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-policy-subscription-created-pnf-existing.json
new file mode 100644
index 00000000..cc14f3c9
--- /dev/null
+++ b/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-policy-subscription-created-pnf-existing.json
@@ -0,0 +1,39 @@
+[
+ {
+ "httpRequest": {
+ "path": "/events/org.onap.dmaap.mr.PM_SUBSCRIPTIONS/dcae_pmsh_cg/policy_response_consumer"
+ },
+ "httpResponse": {
+ "statusCode": 200,
+ "headers": {
+ "content-type": [
+ "application/json"
+ ]
+ },
+ "body": [
+ "{\"name\": \"ResponseEvent\", \"nameSpace\": \"org.onap.policy.apex.onap.pmcontrol\", \"source\": \"APEX\", \"target\": \"DCAE\", \"version\": \"0.0.1\", \"status\": {\"subscriptionName\": \"ExtraPM-All-gNB-R2B\", \"nfName\": \"pnf-existing\", \"changeType\": \"CREATE\", \"message\": \"success\"}}"
+ ]
+ },
+ "times": {
+ "remainingTimes": 1,
+ "unlimited": false
+ }
+ },
+ {
+ "httpRequest": {
+ "path": "/events/org.onap.dmaap.mr.PM_SUBSCRIPTIONS/dcae_pmsh_cg/policy_response_consumer"
+ },
+ "httpResponse": {
+ "statusCode": 200,
+ "headers": {
+ "content-type": [
+ "application/json"
+ ]
+ },
+ "body": {
+ "type": "JSON",
+ "json": {}
+ }
+ }
+ }
+]
diff --git a/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-policy-subscription-created-pnf-new.json b/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-policy-subscription-created-pnf-new.json
new file mode 100644
index 00000000..79bfb44f
--- /dev/null
+++ b/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-policy-subscription-created-pnf-new.json
@@ -0,0 +1,39 @@
+[
+ {
+ "httpRequest": {
+ "path": "/events/org.onap.dmaap.mr.PM_SUBSCRIPTIONS/dcae_pmsh_cg/policy_response_consumer"
+ },
+ "httpResponse": {
+ "statusCode": 200,
+ "headers": {
+ "content-type": [
+ "application/json"
+ ]
+ },
+ "body": [
+ "{\"name\": \"ResponseEvent\", \"nameSpace\": \"org.onap.policy.apex.onap.pmcontrol\", \"source\": \"APEX\", \"target\": \"DCAE\", \"version\": \"0.0.1\", \"status\": {\"subscriptionName\": \"ExtraPM-All-gNB-R2B\", \"nfName\": \"pnf_new\", \"changeType\": \"CREATE\", \"message\": \"success\"}}"
+ ]
+ },
+ "times": {
+ "remainingTimes": 1,
+ "unlimited": false
+ }
+ },
+ {
+ "httpRequest": {
+ "path": "/events/org.onap.dmaap.mr.PM_SUBSCRIPTIONS/dcae_pmsh_cg/policy_response_consumer"
+ },
+ "httpResponse": {
+ "statusCode": 200,
+ "headers": {
+ "content-type": [
+ "application/json"
+ ]
+ },
+ "body": {
+ "type": "JSON",
+ "json": {}
+ }
+ }
+ }
+]
diff --git a/tests/dcaegen2-services-pmsh/testcases/pmsh.robot b/tests/dcaegen2-services-pmsh/testcases/pmsh.robot
index 74a575cd..95b78c25 100644
--- a/tests/dcaegen2-services-pmsh/testcases/pmsh.robot
+++ b/tests/dcaegen2-services-pmsh/testcases/pmsh.robot
@@ -1,38 +1,163 @@
*** Settings ***
Documentation Testing PMSH functionality
+
Library OperatingSystem
Library RequestsLibrary
Library String
+Library Process
+
+Resource ../../common.robot
-Test Setup Create Session pmsh_session ${PMSH_BASE_URL}
+Test Setup CreateSessions
Test Teardown Delete All Sessions
*** Variables ***
+
${PMSH_BASE_URL} https://${PMSH_IP}:8443
+${MR_BASE_URL} http://${MR_SIM_IP_ADDRESS}:1080
+${CBS_BASE_URL} http://${CBS_SIM_IP_ADDRESS}:1080
${HEALTHCHECK_ENDPOINT} /healthcheck
+${MR_EXPECTATION_AAI_PNF_CREATED} %{WORKSPACE}/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-aai-pnf-created.json
+${MR_EXPECTATION_AAI_PNF_REMOVED} %{WORKSPACE}/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-aai-pnf-deleted.json
+${MR_EXPECTATION_POLICY_RESPONSE_PNF_NEW} %{WORKSPACE}/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-policy-subscription-created-pnf-new.json
+${MR_EXPECTATION_POLICY_RESPONSE_PNF_EXISTING} %{WORKSPACE}/tests/dcaegen2-services-pmsh/testcases/assets/mr-expectation-policy-subscription-created-pnf-existing.json
+${CBS_EXPECTATION_ADMIN_STATE_UNLOCKED} %{WORKSPACE}/tests/dcaegen2-services-pmsh/testcases/assets/cbs-expectation-unlocked-config.json
+
+${ADMIN_STATE_LOCKED_PATTERN} 'administrativeState': 'LOCKED'
+${ADMIN_STATE_UNLOCKED_PATTERN} 'administrativeState': 'UNLOCKED'
+${CLI_EXEC_GET_CBS_CONFIG_FIRST} docker exec pmsh /bin/sh -c "grep -m 1 'PMSH Configuration from Configbinding Service' /var/log/ONAP/dcaegen2/services/pmsh/debug.log"
+${CLI_EXEC_GET_CBS_CONFIG_LAST} docker exec pmsh /bin/sh -c "grep 'PMSH Configuration from Configbinding Service' /var/log/ONAP/dcaegen2/services/pmsh/debug.log | tail -1"
+
+${DB_CMD_NETWORK_FUNCTIONS_COUNT} docker exec db bash -c "psql -U pmsh -d pmsh -A -t -c 'select count(*) from network_functions;'"
+${DB_CMD_NF_TO_SUB_REL_COUNT} docker exec db bash -c "psql -U pmsh -d pmsh -A -t -c 'select count(*) from nf_to_sub_rel;'"
+${DB_CMD_SUBSCRIPTIONS_COUNT} docker exec db bash -c "psql -U pmsh -d pmsh -A -t -c 'select count(*) from subscriptions;'"
+
+${CLI_GET_NETWORK_FUNCTIONS_DB_TABLE} docker exec db bash -c "psql -U pmsh -d pmsh -A -t -c 'select nf_name, orchestration_status from network_functions;'"
+${CLI_GET_NF_TO_SUB_REL_DB_TABLE} docker exec db bash -c "psql -U pmsh -d pmsh -A -t -c 'select subscription_name, nf_name, nf_sub_status from nf_to_sub_rel;'"
+${CLI_GET_SUBSCRIPTIONS_DB_TABLE} docker exec db bash -c "psql -U pmsh -d pmsh -A -t -c 'select subscription_name, status from subscriptions;'"
+
*** Test Cases ***
-Verify Health Check returns 200 when a REST GET request to healthcheck url
+
+Verify PMSH health check returns 200 and has a status of healthy
[Tags] PMSH_01
- [Documentation] Verify Health Check returns 200 when a REST GET request to healthcheck url
- [Timeout] 1 minute
+ [Documentation] Verify the PMSH health check api call functions correctly
+ [Timeout] 10 seconds
${resp}= Get Request pmsh_session ${HEALTHCHECK_ENDPOINT}
- VerifyResponse ${resp.status_code} 200
+ Should Be True ${resp.status_code} == 200
+ Should Match Regexp ${resp.text} healthy
-Verify Health Check response includes healthy status
+Verify Administrative State in PMSH log file is LOCKED
[Tags] PMSH_02
- [Documentation] Verify Health Check response includes healthy status
- [Timeout] 1 minute
- ${resp}= Get Request pmsh_session ${HEALTHCHECK_ENDPOINT}
- VerifyResponseContains ${resp.text} healthy
+ [Documentation] Verify Administrative State as logged in PMSH log file is LOCKED
+ [Timeout] 10 seconds
+ Sleep 3 Allow time for PMSH to flush to logs
+ ${cli_cmd_output}= Run Process ${CLI_EXEC_GET_CBS_CONFIG_FIRST} shell=yes
+ Should Be True ${cli_cmd_output.rc} == 0
+ Should Contain ${cli_cmd_output.stdout} ${ADMIN_STATE_LOCKED_PATTERN}
+
+Verify database tables exist and are empty
+ [Tags] PMSH_03
+ [Documentation] Verify database has been created and is empty
+ [Timeout] 10 seconds
+ VerifyDatabaseEmpty
+
+Verify PNF detected in AAI when administrative state unlocked
+ [Tags] PMSH_04
+ [Documentation] Verify PNF detected when administrative state unlocked
+ [Timeout] 40 seconds
+ SetAdministrativeStateToUnlocked
+ Sleep 31 Allow PMSH time to pick up changes in CBS config
+ VerifyCommandOutputContains ${CLI_EXEC_GET_CBS_CONFIG_LAST} ${ADMIN_STATE_UNLOCKED_PATTERN}
+ VerifyCommandOutputIs ${cli_get_subscriptions_db_table} ExtraPM-All-gNB-R2B|UNLOCKED
+ VerifyCommandOutputIs ${cli_get_network_functions_db_table} pnf-existing|Active
+ VerifyCommandOutputIs ${cli_get_nf_to_sub_rel_db_table} ExtraPM-All-gNB-R2B|pnf-existing|PENDING_CREATE
+
+Verify Policy response on MR is handled
+ [Tags] PMSH_05
+ [Documentation] Verify policy response on MR is handled
+ [Timeout] 40 seconds
+ SimulatePolicyResponse ${MR_EXPECTATION_POLICY_RESPONSE_PNF_EXISTING}
+ Sleep 7 seconds Ensure Policy response on MR is picked up
+ VerifyCommandOutputIs ${cli_get_nf_to_sub_rel_db_table} ExtraPM-All-gNB-R2B|pnf-existing|CREATED
+
+Verify AAI event on MR detailing new PNF being detected is handled
+ [Tags] PMSH_06
+ [Documentation] Verify PNF created AAI event on MR is handled
+ [Timeout] 30 seconds
+ SimulateNewPNF
+ Sleep 12 seconds Ensure AAI event on MR is picked up
+ VerifyCommandOutputIs ${CLI_GET_SUBSCRIPTIONS_DB_TABLE} ExtraPM-All-gNB-R2B|UNLOCKED
+ VerifyCommandOutputIs ${CLI_GET_NETWORK_FUNCTIONS_DB_TABLE} pnf-existing|Active\npnf_newly_discovered|Active
+ VerifyCommandOutputIs ${CLI_GET_NF_TO_SUB_REL_DB_TABLE} ExtraPM-All-gNB-R2B|pnf-existing|CREATED\nExtraPM-All-gNB-R2B|pnf_newly_discovered|PENDING_CREATE
+
+Verify AAI event on MR detailing PNF being deleted is handled
+ [Tags] PMSH_07
+ [Documentation] Verify PNF deleted AAI event on MR is handled
+ [Timeout] 30 seconds
+ SimulateDeletedPNF
+ Sleep 12 seconds Ensure AAI event on MR is picked up
+ VerifyNumberOfRecordsInDbTable ${DB_CMD_NETWORK_FUNCTIONS_COUNT} 1
+ VerifyNumberOfRecordsInDbTable ${DB_CMD_NF_TO_SUB_REL_COUNT} 1
*** Keywords ***
-VerifyResponse
- [Arguments] ${actual_response_value} ${expected_response_value}
- Should Be Equal As Strings ${actual_response_value} ${expected_response_value}
-VerifyResponseContains
- [Arguments] ${response_content} ${string_to_check_for}
- Should Contain ${response_content} ${string_to_check_for}
+CreateSessions
+ Create Session pmsh_session ${PMSH_BASE_URL}
+ Create Session mr_sim_session ${MR_BASE_URL}
+ Create Session cbs_sim_session ${CBS_BASE_URL}
+
+SetAdministrativeStateToUnlocked
+ ${data}= Get Data From File ${CBS_EXPECTATION_ADMIN_STATE_UNLOCKED}
+ ${resp} = Put Request cbs_sim_session /clear data={"path": "/service_component_all/.*"}
+ Should Be True ${resp.status_code} == 200
+ Sleep 2 Allow CBS time to set expectation
+ ${resp} = Put Request cbs_sim_session /expectation data=${data}
+ Should Be True ${resp.status_code} == 201
+
+VerifyCommandOutputContains
+ [Arguments] ${cli_command} ${string_to_check_for}
+ ${cli_cmd_output}= Run Process ${cli_command} shell=yes
+ Should Be True ${cli_cmd_output.rc} == 0
+ Should Contain ${cli_cmd_output.stdout} ${string_to_check_for}
+
+VerifyCommandOutputIs
+ [Arguments] ${cli_cmd} ${expected_contents}
+ ${cli_cmd_output}= Run Process ${cli_cmd} shell=yes
+ Log ${cli_cmd_output.stdout}
+ Should Be True ${cli_cmd_output.rc} == 0
+ Should Be Equal As Strings ${cli_cmd_output.stdout} ${expected_contents}
+
+SimulateNewPNF
+ ${data}= Get Data From File ${MR_EXPECTATION_AAI_PNF_CREATED}
+ ${resp} = Put Request mr_sim_session /clear data={"path": "/events/AAI_EVENT/dcae_pmsh_cg/AAI-EVENT"}
+ Should Be True ${resp.status_code} == 200
+ ${resp} = Put Request mr_sim_session /expectation data=${data}
+ Should Be True ${resp.status_code} == 201
+
+SimulatePolicyResponse
+ [Arguments] ${expected_contents}
+ ${data}= Get Data From File ${expected_contents}
+ ${resp} = Put Request mr_sim_session /clear data={"path": "/events/org.onap.dmaap.mr.PM_SUBSCRIPTIONS/dcae_pmsh_cg/policy_response_consumer"}
+ Should Be True ${resp.status_code} == 200
+ ${resp} = Put Request mr_sim_session /expectation data=${data}
+ Should Be True ${resp.status_code} == 201
+
+SimulateDeletedPNF
+ ${data}= Get Data From File ${MR_EXPECTATION_AAI_PNF_REMOVED}
+ ${resp} = Put Request mr_sim_session /clear data={"path": "/events/AAI_EVENT/dcae_pmsh_cg/AAI-EVENT"}
+ Should Be True ${resp.status_code} == 200
+ ${resp} = Put Request mr_sim_session /expectation data=${data}
+ Should Be True ${resp.status_code} == 201
+
+VerifyNumberOfRecordsInDbTable
+ [Arguments] ${db_query} ${expected_count}
+ ${db_count} Run Process ${db_query} shell=yes
+ Should Be True ${db_count.stdout} == ${expected_count}
+
+VerifyDatabaseEmpty
+ VerifyNumberOfRecordsInDbTable ${DB_CMD_NETWORK_FUNCTIONS_COUNT} 0
+ VerifyNumberOfRecordsInDbTable ${DB_CMD_NF_TO_SUB_REL_COUNT} 0
+ VerifyNumberOfRecordsInDbTable ${DB_CMD_SUBSCRIPTIONS_COUNT} 0