diff options
author | Ram Krishna Verma <ram_krishna.verma@bell.ca> | 2021-07-29 18:09:58 -0400 |
---|---|---|
committer | Ram Krishna Verma <ram_krishna.verma@bell.ca> | 2021-07-29 18:10:05 -0400 |
commit | cfe6854e21999cf5fcb1b6ed6586323ce5c389ce (patch) | |
tree | 4a7b1752be7479f1b86ce09d2875e6b6ffca0879 /csit/pap/tests/pap-test.robot | |
parent | ee879f853121d92816945f0f6d0486af67a84439 (diff) |
Add policy audit to pap csit
Adding policy audit api's to pap csit.
However, I see that pap csit file can be refactored
and lot of duplications can be removed.
Will do it as part of next review.
Issue-ID: POLICY-3340
Change-Id: I4334ad957ae70c4bcc9f3aa18d882042ce96d57f
Signed-off-by: Ram Krishna Verma <ram_krishna.verma@bell.ca>
Diffstat (limited to 'csit/pap/tests/pap-test.robot')
-rw-r--r-- | csit/pap/tests/pap-test.robot | 32 |
1 files changed, 32 insertions, 0 deletions
diff --git a/csit/pap/tests/pap-test.robot b/csit/pap/tests/pap-test.robot index da0908d6..f31f2426 100644 --- a/csit/pap/tests/pap-test.robot +++ b/csit/pap/tests/pap-test.robot @@ -83,6 +83,22 @@ DeployPdpGroups Log Received response from policy ${resp.text} Should Be Equal As Strings ${resp.status_code} 202 +QueryPolicyAuditAfterDeploy + [Documentation] Runs Policy PAP Query Policy Audit after Deploy + ${auth}= Create List healthcheck zb!XztG34 + Log Creating session https://${POLICY_PAP_IP}:6969 + ${session}= Create Session policy https://${POLICY_PAP_IP}:6969 auth=${auth} + ${headers}= Create Dictionary Accept=application/json Content-Type=application/json + ${resp}= GET On Session policy /policy/pap/v1/policies/audit params=recordCount=1 headers=${headers} + Log Received response from policy ${resp.text} + Should Be Equal As Strings ${resp.status_code} 200 + Should Be Equal As Strings ${resp.json()[0]['pdpGroup']} create.group.request + Should Be Equal As Strings ${resp.json()[0]['pdpType']} pdpTypeA + Should Be Equal As Strings ${resp.json()[0]['policy']['name']} onap.restart.tca + Should Be Equal As Strings ${resp.json()[0]['policy']['version']} 1.0.0 + Should Be Equal As Strings ${resp.json()[0]['action']} DEPLOYMENT + Should Be Equal As Strings ${resp.json()[0]['user']} healthcheck + UndeployPolicy [Documentation] Runs Policy PAP Undeploy a Policy from PDP Groups ${auth}= Create List healthcheck zb!XztG34 @@ -105,6 +121,22 @@ QueryPdpGroupsAfterUndeploy Should Be Equal As Strings ${resp.json()['groups'][0]['name']} create.group.request Should Be Equal As Strings ${resp.json()['groups'][0]['pdpSubgroups'][0]['policies']} [] +QueryPolicyAuditAfterUnDeploy + [Documentation] Runs Policy PAP Query Policy Audit after Undeploy + ${auth}= Create List healthcheck zb!XztG34 + Log Creating session https://${POLICY_PAP_IP}:6969 + ${session}= Create Session policy https://${POLICY_PAP_IP}:6969 auth=${auth} + ${headers}= Create Dictionary Accept=application/json Content-Type=application/json + ${resp}= GET On Session policy /policy/pap/v1/policies/audit params=recordCount=1 headers=${headers} + Log Received response from policy ${resp.text} + Should Be Equal As Strings ${resp.status_code} 200 + Should Be Equal As Strings ${resp.json()[0]['pdpGroup']} create.group.request + Should Be Equal As Strings ${resp.json()[0]['pdpType']} pdpTypeA + Should Be Equal As Strings ${resp.json()[0]['policy']['name']} onap.restart.tca + Should Be Equal As Strings ${resp.json()[0]['policy']['version']} 1.0.0 + Should Be Equal As Strings ${resp.json()[0]['action']} UNDEPLOYMENT + Should Be Equal As Strings ${resp.json()[0]['user']} healthcheck + DeactivatePdpGroup [Documentation] Runs Policy PAP Change PDP Group State to PASSIVE ${auth}= Create List healthcheck zb!XztG34 |