blob: 71452350bac5f332b38b99326ef02563f7b34546 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
|
*** Settings ***
Documentation Testing PMSH functionality
Library OperatingSystem
Library RequestsLibrary
Library String
Library Process
Resource ../../common.robot
Test Teardown Delete All Sessions
*** Variables ***
${PMSH_BASE_URL} https://${PMSH_IP}:8443
${MR_BASE_URL} http://${MR_IP_ADDRESS}:3904
${CBS_BASE_URL} https://${CBS_SIM_IP_ADDRESS}:10443
${SUBSCRIPTIONS_ENDPOINT} /subscriptions
${POLICY_PUBLISH_MR_TOPIC} /events/unauthenticated.PMSH_CL_INPUT
${AAI_MR_TOPIC} /events/AAI_EVENT
${MR_AAI_PNF_CREATED} %{WORKSPACE}/tests/dcaegen2-services-pmsh/testcases/assets/aai-pnf-create.json
${MR_AAI_PNF_REMOVED} %{WORKSPACE}/tests/dcaegen2-services-pmsh/testcases/assets/aai-pnf-delete.json
${MR_POLICY_RESPONSE_PNF_EXISTING} %{WORKSPACE}/tests/dcaegen2-services-pmsh/testcases/assets/policy-sub-created-pnf-existing.json
${CBS_EXPECTATION_ADMIN_STATE_UNLOCKED} %{WORKSPACE}/tests/dcaegen2-services-pmsh/testcases/assets/cbs-expectation-unlocked-config.json
${ADMIN_STATE_LOCKED_PATTERN} 'administrativeState': 'LOCKED'
${CLI_EXEC_GET_CBS_CONFIG_FIRST} docker exec pmsh /bin/sh -c "grep -m 1 'PMSH config from CBS' /var/log/ONAP/dcaegen2/services/pmsh/application.log"
*** Test Cases ***
Verify Administrative State in PMSH log file is LOCKED
[Tags] PMSH_01
[Documentation] Verify Administrative State as logged in PMSH log file is LOCKED
[Timeout] 10 seconds
Sleep 3 Allow time for PMSH to flush to logs
${cli_cmd_output}= Run Process ${CLI_EXEC_GET_CBS_CONFIG_FIRST} shell=yes
Should Be True ${cli_cmd_output.rc} == 0
Should Contain ${cli_cmd_output.stdout} ${ADMIN_STATE_LOCKED_PATTERN}
Verify database tables exist and are empty
[Tags] PMSH_02
[Documentation] Verify database has been created and is empty
[Timeout] 10 seconds
${resp}= GetSubsCall ${SUBSCRIPTIONS_ENDPOINT}
Should Be True ${resp.status_code} == 200
Should Contain ${resp.text} []
Verify PNF detected in AAI when administrative state unlocked
[Tags] PMSH_03
[Documentation] Verify PNF detected when administrative state unlocked
[Timeout] 60 seconds
SetAdministrativeStateToUnlocked
Sleep 31 Allow PMSH time to pick up changes in CBS config
${resp}= GetSubsCall ${SUBSCRIPTIONS_ENDPOINT}
Should Be Equal As Strings ${resp.json()[0]['subscription_status']} UNLOCKED
Should Be Equal As Strings ${resp.json()[0]['network_functions'][0]['nf_name']} pnf-existing
Should Be Equal As Strings ${resp.json()[0]['network_functions'][0]['nf_sub_status']} PENDING_CREATE
Verify Policy response on MR is handled
[Tags] PMSH_04
[Documentation] Verify policy response on MR is handled
[Timeout] 60 seconds
SimulatePolicyResponse ${MR_POLICY_RESPONSE_PNF_EXISTING}
Sleep 31 seconds Ensure Policy response on MR is picked up
${resp}= GetSubsCall ${SUBSCRIPTIONS_ENDPOINT}
Should Be Equal As Strings ${resp.json()[0]['network_functions'][0]['nf_sub_status']} CREATED
Verify AAI event on MR detailing new PNF being detected is handled
[Tags] PMSH_05
[Documentation] Verify PNF created AAI event on MR is handled
[Timeout] 60 seconds
SimulateNewPNF ${MR_AAI_PNF_CREATED}
Sleep 31 seconds Ensure AAI event on MR is picked up
${resp}= GetSubsCall ${SUBSCRIPTIONS_ENDPOINT}
Should Be Equal As Strings ${resp.json()[0]['network_functions'][1]['nf_name']} pnf_newly_discovered
Should Be Equal As Strings ${resp.json()[0]['network_functions'][1]['nf_sub_status']} PENDING_CREATE
Verify AAI event on MR detailing PNF being deleted is handled
[Tags] PMSH_06
[Documentation] Verify PNF deleted AAI event on MR is handled
[Timeout] 60 seconds
SimulateDeletedPNF ${MR_AAI_PNF_REMOVED}
Sleep 31 seconds Ensure AAI event on MR is picked up
${resp}= GetSubsCall ${SUBSCRIPTIONS_ENDPOINT}
Should Not Contain ${resp.text} pnf_newly_discovered
*** Keywords ***
SetAdministrativeStateToUnlocked
${data}= Get Data From File ${CBS_EXPECTATION_ADMIN_STATE_UNLOCKED}
Create Session cbs_sim_session ${CBS_BASE_URL} verify=false
${resp}= PUT On Session cbs_sim_session url=/clear data={"path": "/service_component_all/.*"}
Should Be True ${resp.status_code} == 200
Sleep 2 Allow CBS time to set expectation
${resp} = PUT On Session cbs_sim_session url=/expectation data=${data}
Should Be True ${resp.status_code} == 201
SimulatePolicyResponse
[Arguments] ${expected_contents}
${json_value}= json_from_file ${expected_contents}
${resp}= PostMrCall ${POLICY_PUBLISH_MR_TOPIC} ${json_value}
log ${resp.text}
Should Be Equal As Strings ${resp.status_code} 200
${count}= Evaluate $resp.json().get('count')
log 'JSON Response Code:'${resp}
SimulateNewPNF
[Arguments] ${expected_contents}
${json_value}= json_from_file ${expected_contents}
${resp}= PostMrCall ${AAI_MR_TOPIC} ${json_value}
log ${resp.text}
Should Be Equal As Strings ${resp.status_code} 200
${count}= Evaluate $resp.json().get('count')
log 'JSON Response Code:'${resp}
SimulateDeletedPNF
[Arguments] ${expected_contents}
${json_value}= json_from_file ${expected_contents}
${resp}= PostMrCall ${AAI_MR_TOPIC} ${json_value}
log ${resp.text}
Should Be Equal As Strings ${resp.status_code} 200
${count}= Evaluate $resp.json().get('count')
log 'JSON Response Code:'${resp}
PostMrCall
[Arguments] ${url} ${data}
Create Session mr_sim_session ${MR_BASE_URL} verify=false
${headers}= Create Dictionary Accept=application/json Content-Type=application/json
${resp}= POST On Session mr_sim_session url=${url} json=${data} headers=${headers}
[Return] ${resp}
GetSubsCall
[Arguments] ${url}
Create Session pmsh_session ${PMSH_BASE_URL} verify=false
${resp}= GET On Session pmsh_session url=${url}
[Return] ${resp}
|