summaryrefslogtreecommitdiffstats
path: root/kubernetes/oof/charts/oof-has/values.yaml
blob: 30ef63787301cd5ec0fd2534cbd38fb52b52a903 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
# Copyright © 2017 Amdocs, AT&T, Bell Canada, VMware
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#       http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

#################################################################
# Global configuration defaults.
#################################################################
global:
  readinessRepository: oomk8s
  readinessImage: readiness-check:2.0.0
  loggingRepository: docker.elastic.co
  loggingImage: beats/filebeat:5.5.0
  repository: nexus3.onap.org:10001
  commonConfigPrefix: onap-oof-has
  image:
    readiness: oomk8s/readiness-check:2.0.0
    optf_has: onap/optf-has:latest
    filebeat: docker.elastic.co/beats/filebeat:5.5.0

nsPrefix: onap
pullPolicy: Always
nodePortPrefix: 302
dataRootDir: /dockerdata-nfs
e6db74 } /* Literal.String */ .highlight .na { color: #a6e22e } /* Name.Attribute */ .highlight .nb { color: #f8f8f2 } /* Name.Builtin */ .highlight .nc { color: #a6e22e } /* Name.Class */ .highlight .no { color: #66d9ef } /* Name.Constant */ .highlight .nd { color: #a6e22e } /* Name.Decorator */ .highlight .ni { color: #f8f8f2 } /* Name.Entity */ .highlight .ne { color: #a6e22e } /* Name.Exception */ .highlight .nf { color: #a6e22e } /* Name.Function */ .highlight .nl { color: #f8f8f2 } /* Name.Label */ .highlight .nn { color: #f8f8f2 } /* Name.Namespace */ .highlight .nx { color: #a6e22e } /* Name.Other */ .highlight .py { color: #f8f8f2 } /* Name.Property */ .highlight .nt { color: #f92672 } /* Name.Tag */ .highlight .nv { color: #f8f8f2 } /* Name.Variable */ .highlight .ow { color: #f92672 } /* Operator.Word */ .highlight .w { color: #f8f8f2 } /* Text.Whitespace */ .highlight .mb { color: #ae81ff } /* Literal.Number.Bin */ .highlight .mf { color: #ae81ff } /* Literal.Number.Float */ .highlight .mh { color: #ae81ff } /* Literal.Number.Hex */ .highlight .mi { color: #ae81ff } /* Literal.Number.Integer */ .highlight .mo { color: #ae81ff } /* Literal.Number.Oct */ .highlight .sa { color: #e6db74 } /* Literal.String.Affix */ .highlight .sb { color: #e6db74 } /* Literal.String.Backtick */ .highlight .sc { color: #e6db74 } /* Literal.String.Char */ .highlight .dl { color: #e6db74 } /* Literal.String.Delimiter */ .highlight .sd { color: #e6db74 } /* Literal.String.Doc */ .highlight .s2 { color: #e6db74 } /* Literal.String.Double */ .highlight .se { color: #ae81ff } /* Literal.String.Escape */ .highlight .sh { color: #e6db74 } /* Literal.String.Heredoc */ .highlight .si { color: #e6db74 } /* Literal.String.Interpol */ .highlight .sx { color: #e6db74 } /* Literal.String.Other */ .highlight .sr { color: #e6db74 } /* Literal.String.Regex */ .highlight .s1 { color: #e6db74 } /* Literal.String.Single */ .highlight .ss { color: #e6db74 } /* Literal.String.Symbol */ .highlight .bp { color: #f8f8f2 } /* Name.Builtin.Pseudo */ .highlight .fm { color: #a6e22e } /* Name.Function.Magic */ .highlight .vc { color: #f8f8f2 } /* Name.Variable.Class */ .highlight .vg { color: #f8f8f2 } /* Name.Variable.Global */ .highlight .vi { color: #f8f8f2 } /* Name.Variable.Instance */ .highlight .vm { color: #f8f8f2 } /* Name.Variable.Magic */ .highlight .il { color: #ae81ff } /* Literal.Number.Integer.Long */ } @media (prefers-color-scheme: light) { .highlight .hll { background-color: #ffffcc } .highlight .c { color: #888888 } /* Comment */ .highlight .err { color: #a61717; background-color: #e3d2d2 } /* Error */ .highlight .k { color: #008800; font-weight: bold } /* Keyword */ .highlight .ch { color: #888888 } /* Comment.Hashbang */ .highlight .cm { color: #888888 } /* Comment.Multiline */ .highlight .cp { color: #cc0000; font-weight: bold } /* Comment.Preproc */ .highlight .cpf { color: #888888 } /* Comment.PreprocFile */ .highlight .c1 { color: #888888 } /* Comment.Single */ .highlight .cs { color: #cc0000; font-weight: bold; background-color: #fff0f0 } /* Comment.Special */ .highlight .gd { color: #000000; background-color: #ffdddd } /* Generic.Deleted */ .highlight .ge { font-style: italic } /* Generic.Emph */ .highlight .gr { color: #aa0000 } /* Generic.Error */ .highlight .gh { color: #333333 } /* Generic.Heading */ .highlight .gi { color: #000000; background-color: #ddffdd } /* Generic.Inserted */ .highlight .go { color: #888888 } /* Generic.Output */ .highlight .gp { color: #555555 } /* Generic.Prompt */ .highlight .gs { font-weight: bold } /* Generic.Strong */ .highlight .gu { color: #666666 } /* Generic.Subheading */ .highlight .gt { color: #aa0000 } /* Generic.Traceback */ .highlight .kc { color: #008800; font-weight: bold } /* Keyword.Constant */ .highlight .kd { color: #008800; font-weight: bold } /* Keyword.Declaration */ .highlight .kn { color: #008800; font-weight: bold } /* Keyword.Namespace */ .highlight .kp { color: #008800 } /* Keyword.Pseudo */ .highlight .kr { color: #008800; font-weight: bold } /* Keyword.Reserved */ .highlight .kt { color: #888888; font-weight: bold } /* Keyword.Type */ .highlight .m { color: #0000DD; font-weight: bold } /* Literal.Number */ .highlight .s { color: #dd2200; background-color: #fff0f0 } /* Literal.String */ .highlight .na { color: #336699 } /* Name.Attribute */ .highlight .nb { color: #003388 } /* Name.Builtin */ .highlight .nc { color: #bb0066; font-weight: bold } /* Name.Class */ .highlight .no { color: #003366; font-weight: bold } /* Name.Constant */ .highlight .nd { color: #555555 } /* Name.Decorator */ .highlight .ne { color: #bb0066; font-weight: bold } /* Name.Exception */ .highlight .nf { color: #0066bb; font-weight: bold } /* Name.Function */ .highlight .nl { color: #336699; font-style: italic } /* Name.Label */ .highlight .nn { color: #bb0066; font-weight: bold } /* Name.Namespace */ .highlight .py { color: #336699; font-weight: bold } /* Name.Property */ .highlight .nt { color: #bb0066; font-weight: bold } /* Name.Tag */ .highlight .nv { color: #336699 } /* Name.Variable */ .highlight .ow { color: #008800 } /* Operator.Word */ .highlight .w { color: #bbbbbb } /* Text.Whitespace */ .highlight .mb { color: #0000DD; font-weight: bold } /* Literal.Number.Bin */ .highlight .mf { color: #0000DD; font-weight: bold } /* Literal.Number.Float */ .highlight .mh { color: #0000DD; font-weight: bold } /* Literal.Number.Hex */ .highlight .mi { color: #0000DD; font-weight: bold } /* Literal.Number.Integer */ .highlight .mo { color: #0000DD; font-weight: bold } /* Literal.Number.Oct */ .highlight .sa { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Affix */ .highlight .sb { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Backtick */ .highlight .sc { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Char */ .highlight .dl { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Delimiter */ .highlight .sd { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Doc */ .highlight .s2 { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Double */ .highlight .se { color: #0044dd; background-color: #fff0f0 } /* Literal.String.Escape */ .highlight .sh { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Heredoc */ .highlight .si { color: #3333bb; background-color: #fff0f0 } /* Literal.String.Interpol */ .highlight .sx { color: #22bb22; background-color: #f0fff0 } /* Literal.String.Other */ .highlight .sr { color: #008800; background-color: #fff0ff } /* Literal.String.Regex */ .highlight .s1 { color: #dd2200; background-color: #fff0f0 } /* Literal.String.Single */ .highlight .ss { color: #aa6600; background-color: #fff0f0 } /* Literal.String.Symbol */ .highlight .bp { color: #003388 } /* Name.Builtin.Pseudo */ .highlight .fm { color: #0066bb; font-weight: bold } /* Name.Function.Magic */ .highlight .vc { color: #336699 } /* Name.Variable.Class */ .highlight .vg { color: #dd7700 } /* Name.Variable.Global */ .highlight .vi { color: #3333bb } /* Name.Variable.Instance */ .highlight .vm { color: #336699 } /* Name.Variable.Magic */ .highlight .il { color: #0000DD; font-weight: bold } /* Literal.Number.Integer.Long */ }
set XX@NS <pass>
set testid@aaf.att.com <pass>
set testunused@aaf.att.com <pass>
set bogus@aaf.att.com boguspass
#delay 10
set NFR 0
as testid@aaf.att.com
# TC_NS2.10.0.POS Check for Existing Data
ns list name com.test.TC_NS2.@[user.name]
** Expect 200 **

List Namespaces by Name[com.test.TC_NS2.@[THE_USER]]
--------------------------------------------------------------------------------
    *** Namespace Not Found ***

# TC_NS2.10.1.POS Create Namespace with valid IDs and Responsible Parties
ns create com.test.TC_NS2.@[user.name] @[user.name] testid@aaf.att.com
** Expect 201 **
Created Namespace

ns create com.test.TC_NS2.@[user.name].project @[user.name] testunused@aaf.att.com
** Expect 201 **
Created Namespace

# TC_NS2.10.10.POS Create role to assign mechid perm to
role create com.test.TC_NS2.@[user.name].cred_admin testid@aaf.att.com
** Expect 201 **
Created Role
Added User [testid@aaf.att.com] to Role [com.test.TC_NS2.@[THE_USER].cred_admin]

as XX@NS
# TC_NS2.10.11.POS Assign role to mechid perm
perm grant com.att.aaf.mechid com.att create com.test.TC_NS2.@[user.name].cred_admin
** Expect 201 **
Granted Permission [com.att.aaf.mechid|com.att|create] to Role [com.test.TC_NS2.@[THE_USER].cred_admin]

as testid@aaf.att.com
# TC_NS2.10.70.POS Expect Namespace to be created
ns list name com.test.TC_NS2.@[user.name] 
** Expect 200 **

List Namespaces by Name[com.test.TC_NS2.@[THE_USER]]
--------------------------------------------------------------------------------
com.test.TC_NS2.@[THE_USER]
    Administrators
        testid@aaf.att.com                                                      
    Responsible Parties
        @[THE_USER]@csp.att.com                                                      
    Roles
        com.test.TC_NS2.@[THE_USER].admin                                            
        com.test.TC_NS2.@[THE_USER].cred_admin                                       
        com.test.TC_NS2.@[THE_USER].owner                                            
    Permissions
        com.test.TC_NS2.@[THE_USER].access  *                        *              
        com.test.TC_NS2.@[THE_USER].access  *                        read           

as testid@aaf.att.com
# TC_NS2.10.70.POS Expect Namespace to be created
perm list role com.test.TC_NS2.@[user.name].admin
** Expect 200 **

List Perms by Role [com.test.TC_NS2.@[THE_USER].admin]
--------------------------------------------------------------------------------
PERM Type                      Instance                       Action    
--------------------------------------------------------------------------------
com.test.TC_NS2.@[THE_USER].access  *                              *         


as testid@aaf.att.com
# TC_NS2.10.70.POS Expect Namespace to be created
perm list role com.test.TC_NS2.@[user.name].owner
** Expect 200 **

List Perms by Role [com.test.TC_NS2.@[THE_USER].owner]
--------------------------------------------------------------------------------
PERM Type                      Instance                       Action    
--------------------------------------------------------------------------------
com.test.TC_NS2.@[THE_USER].access  *                              read      


as testid@aaf.att.com
# TC_NS2.10.70.POS Expect Namespace to be created
role list perm com.test.TC_NS2.@[user.name].access * *
** Expect 200 **

List Roles by Perm com.test.TC_NS2.@[THE_USER].access|*|*
--------------------------------------------------------------------------------
ROLE Name                                         
   PERM Type                      Instance                       Action         
--------------------------------------------------------------------------------
com.test.TC_NS2.@[THE_USER].admin                      
   com.test.TC_NS2.@[THE_USER].access  *                              *              

as testid@aaf.att.com
# TC_NS2.10.70.POS Expect Namespace to be created
role list perm com.test.TC_NS2.@[user.name].access * read
** Expect 200 **

List Roles by Perm com.test.TC_NS2.@[THE_USER].access|*|read
--------------------------------------------------------------------------------
ROLE Name                                         
   PERM Type                      Instance                       Action         
--------------------------------------------------------------------------------
com.test.TC_NS2.@[THE_USER].owner                      
   com.test.TC_NS2.@[THE_USER].access  *                              read           

as testid@aaf.att.com
# TC_NS2.10.80.POS Expect Namespace to be created
ns list name com.test.TC_NS2.@[user.name].project
** Expect 200 **

List Namespaces by Name[com.test.TC_NS2.@[THE_USER].project]
--------------------------------------------------------------------------------
com.test.TC_NS2.@[THE_USER].project
    Administrators
        testunused@aaf.att.com                                                  
    Responsible Parties
        @[THE_USER]@csp.att.com                                                      
    Roles
        com.test.TC_NS2.@[THE_USER].project.admin                                    
        com.test.TC_NS2.@[THE_USER].project.owner                                    
    Permissions
        com.test.TC_NS2.@[THE_USER].project.access *                        *              
        com.test.TC_NS2.@[THE_USER].project.access *                        read           

as testid@aaf.att.com
# TC_NS2.10.80.POS Expect Namespace to be created
perm list role com.test.TC_NS2.@[user.name].project.admin
** Expect 200 **

List Perms by Role [com.test.TC_NS2.@[THE_USER].project.admin]
--------------------------------------------------------------------------------
PERM Type                      Instance                       Action    
--------------------------------------------------------------------------------
com.test.TC_NS2.@[THE_USER].project.access *                              *         


as testid@aaf.att.com
# TC_NS2.10.80.POS Expect Namespace to be created
perm list role com.test.TC_NS2.@[user.name].project.owner
** Expect 200 **

List Perms by Role [com.test.TC_NS2.@[THE_USER].project.owner]
--------------------------------------------------------------------------------
PERM Type                      Instance                       Action    
--------------------------------------------------------------------------------
com.test.TC_NS2.@[THE_USER].project.access *                              read      


as testid@aaf.att.com
# TC_NS2.10.80.POS Expect Namespace to be created
role list perm com.test.TC_NS2.@[user.name].project.access * *
** Expect 200 **

List Roles by Perm com.test.TC_NS2.@[THE_USER].project.access|*|*
--------------------------------------------------------------------------------
ROLE Name                                         
   PERM Type                      Instance                       Action         
--------------------------------------------------------------------------------
com.test.TC_NS2.@[THE_USER].project.admin              
   com.test.TC_NS2.@[THE_USER].project.access *                              *              

as testid@aaf.att.com
# TC_NS2.10.80.POS Expect Namespace to be created
role list perm com.test.TC_NS2.@[user.name].project.access * read
** Expect 200 **

List Roles by Perm com.test.TC_NS2.@[THE_USER].project.access|*|read
--------------------------------------------------------------------------------
ROLE Name                                         
   PERM Type                      Instance                       Action         
--------------------------------------------------------------------------------
com.test.TC_NS2.@[THE_USER].project.owner              
   com.test.TC_NS2.@[THE_USER].project.access *                              read           

as testid@aaf.att.com
# TC_NS2.20.1.POS Create roles
role create com.test.TC_NS2.@[user.name].watcher
** Expect 201 **
Created Role

role create com.test.TC_NS2.@[user.name].myRole
** Expect 201 **
Created Role

# TC_NS2.20.2.POS Create permissions
perm create com.test.TC_NS2.@[user.name].myType myInstance myAction
** Expect 201 **
Created Permission

perm create com.test.TC_NS2.@[user.name].myType * *
** Expect 201 **
Created Permission

# TC_NS2.20.3.POS Create mechid
user cred add m99990@@[user.name].TC_NS2.test.com password123
** Expect 201 **
Added Credential [m99990@@[THE_USER].TC_NS2.test.com]

as XX@NS
# TC_NS2.20.10.POS Grant view perms to watcher role
perm create com.att.aaf.ns :com.test.TC_NS2.@[user.name]:ns read com.test.TC_NS2.@[user.name].watcher
** Expect 201 **
Created Permission
Granted Permission [com.att.aaf.ns|:com.test.TC_NS2.@[THE_USER]:ns|read] to Role [com.test.TC_NS2.@[THE_USER].watcher]

as testunused@aaf.att.com
# TC_NS2.40.1.NEG Non-admin, not granted user should not view
ns list name com.test.TC_NS2.@[user.name]
** Expect 403 **
Failed [SVC1403]: Forbidden - [testunused@aaf.att.com] may not read in NS [com.test.TC_NS2.@[THE_USER]]

as testid@aaf.att.com
# Tens test user granted to permission
# TC_NS2.40.10.POS Add user to watcher role
user role add testunused@aaf.att.com com.test.TC_NS2.@[user.name].watcher
** Expect 201 **
Added Role [com.test.TC_NS2.@[THE_USER].watcher] to User [testunused@aaf.att.com]

as testunused@aaf.att.com
# TC_NS2.40.11.POS Non-admin, granted user should view
ns list name com.test.TC_NS2.@[user.name]
** Expect 200 **

List Namespaces by Name[com.test.TC_NS2.@[THE_USER]]
--------------------------------------------------------------------------------
com.test.TC_NS2.@[THE_USER]
    Administrators
        testid@aaf.att.com                                                      
    Responsible Parties
        @[THE_USER]@csp.att.com                                                      
    Roles
        com.test.TC_NS2.@[THE_USER].admin                                            
        com.test.TC_NS2.@[THE_USER].cred_admin                                       
        com.test.TC_NS2.@[THE_USER].myRole                                           
        com.test.TC_NS2.@[THE_USER].owner                                            
        com.test.TC_NS2.@[THE_USER].watcher                                          
    Permissions
        com.test.TC_NS2.@[THE_USER].access  *                        *              
        com.test.TC_NS2.@[THE_USER].access  *                        read           
        com.test.TC_NS2.@[THE_USER].myType  *                        *              
        com.test.TC_NS2.@[THE_USER].myType  myInstance               myAction       
    Credentials
        m99990@@[THE_USER].TC_NS2.test.com                                           

as testid@aaf.att.com
# TC_NS2.40.19.POS Remove user from watcher role
user role del testunused@aaf.att.com com.test.TC_NS2.@[user.name].watcher
** Expect 200 **
Removed Role [com.test.TC_NS2.@[THE_USER].watcher] from User [testunused@aaf.att.com]

# Thirties test admin user 
# TC_NS2.40.20.POS Admin should be able to view
ns list name com.test.TC_NS2.@[user.name]
** Expect 200 **

List Namespaces by Name[com.test.TC_NS2.@[THE_USER]]
--------------------------------------------------------------------------------
com.test.TC_NS2.@[THE_USER]
    Administrators
        testid@aaf.att.com                                                      
    Responsible Parties
        @[THE_USER]@csp.att.com                                                      
    Roles
        com.test.TC_NS2.@[THE_USER].admin                                            
        com.test.TC_NS2.@[THE_USER].cred_admin                                       
        com.test.TC_NS2.@[THE_USER].myRole                                           
        com.test.TC_NS2.@[THE_USER].owner                                            
        com.test.TC_NS2.@[THE_USER].watcher                                          
    Permissions
        com.test.TC_NS2.@[THE_USER].access  *                        *              
        com.test.TC_NS2.@[THE_USER].access  *                        read           
        com.test.TC_NS2.@[THE_USER].myType  *                        *              
        com.test.TC_NS2.@[THE_USER].myType  myInstance               myAction       
    Credentials
        m99990@@[THE_USER].TC_NS2.test.com                                           

# TC_NS2.40.21.POS Admin of parent NS should be able to view
ns list name com.test.TC_NS2.@[user.name].project
** Expect 200 **

List Namespaces by Name[com.test.TC_NS2.@[THE_USER].project]
--------------------------------------------------------------------------------
com.test.TC_NS2.@[THE_USER].project
    Administrators
        testunused@aaf.att.com                                                  
    Responsible Parties
        @[THE_USER]@csp.att.com                                                      
    Roles
        com.test.TC_NS2.@[THE_USER].project.admin                                    
        com.test.TC_NS2.@[THE_USER].project.owner                                    
    Permissions
        com.test.TC_NS2.@[THE_USER].project.access *                        *              
        com.test.TC_NS2.@[THE_USER].project.access *                        read           

# TC_NS2.41.10.POS List by User when Same as Caller
as testunused@aaf.att.com
ns list admin testunused@aaf.att.com
** Expect 200 **

List Namespaces with admin privileges for [testunused@aaf.att.com]
--------------------------------------------------------------------------------
com.test.TC_NS2.@[THE_USER].project

# TC_NS2.41.15.POS List by User when not same as Caller, but own/admin namespace of Roles
as testid@aaf.att.com
ns list admin testunused@aaf.att.com
** Expect 200 **

List Namespaces with admin privileges for [testunused@aaf.att.com]
--------------------------------------------------------------------------------
com.test.TC_NS2.@[THE_USER].project

# TC_NS2.41.20.POS List by User when not same as Caller, but parent owner of Namespace
as XX@NS
ns list admin testunused@aaf.att.com
** Expect 200 **

List Namespaces with admin privileges for [testunused@aaf.att.com]
--------------------------------------------------------------------------------
com.test.TC_NS2.@[THE_USER].project

# TC_NS2.41.80.NEG List by User when not Caller nor associated to Namespace 
as testunused@aaf.att.com
ns list admin XX@NS
** Expect 200 **

List Namespaces with admin privileges for [XX@NS]
--------------------------------------------------------------------------------
com
com.att
com.att.aaf
com.test

as testid@aaf.att.com
# TC_NS2.99.1.POS Namespace Admin can delete Namepace defined Roles & Perms
role delete com.test.TC_NS2.@[user.name].myRole
** Expect 200,404 **
Deleted Role

role delete com.test.TC_NS2.@[user.name].watcher
** Expect 200,404 **
Deleted Role

perm delete com.test.TC_NS2.@[user.name].myType myInstance myAction
** Expect 200,404 **
Deleted Permission

perm delete com.test.TC_NS2.@[user.name].myType * *
** Expect 200,404 **
Deleted Permission

user cred del m99990@@[user.name].TC_NS2.test.com
** Expect 200,404 **
Deleted Credential [m99990@@[THE_USER].TC_NS2.test.com]

as XX@NS
force perm delete com.att.aaf.ns :com.test.TC_NS2.@[user.name]:ns read
** Expect 200,404 **
Deleted Permission

# TC_NS2.99.15.POS Remove ability to create creds
perm ungrant com.att.aaf.mechid com.att create com.test.TC_NS2.@[user.name].cred_admin
** Expect 200,404 **
UnGranted Permission [com.att.aaf.mechid|com.att|create] from Role [com.test.TC_NS2.@[THE_USER].cred_admin]

as testid@aaf.att.com
force role delete com.test.TC_NS2.@[user.name].cred_admin
** Expect 200,404 **
Deleted Role

# TC_NS2.99.90.POS Namespace Admin can delete Namespace
force ns delete com.test.TC_NS2.@[user.name].project
** Expect 200,404 **
Deleted Namespace

force ns delete com.test.TC_NS2.@[user.name]
** Expect 200,404 **
Deleted Namespace

sleep 0
# TC_NS2.99.99.POS Check Clean Namespace
ns list name com.test.TC_NS2.@[user.name]
** Expect 200,404 **

List Namespaces by Name[com.test.TC_NS2.@[THE_USER]]
--------------------------------------------------------------------------------
    *** Namespace Not Found ***