summaryrefslogtreecommitdiffstats
path: root/csit/run-k8s-csit-enable.sh
diff options
context:
space:
mode:
authorrameshiyer27 <ramesh.murugan.iyer@est.tech>2023-04-05 13:47:15 +0100
committerrameshiyer27 <ramesh.murugan.iyer@est.tech>2023-05-02 18:52:04 +0100
commit65fc37591b2934871e7ca4d2db4a76ad4bba7572 (patch)
treed8cb27f8796635b5e3682376ed05392079b6850b /csit/run-k8s-csit-enable.sh
parent19b753bd8d2e96364544b2f441f2f8e0fb44fd49 (diff)
Enable ACM tests in K8s CSIT
Moved all the image references to the parent chart. Updating the latest image tags during installation. Disabling charts by default and enabling only the project specific ones. Issue-ID: POLICY-4541 Signed-off-by: zrrmmua <ramesh.murugan.iyer@est.tech> Change-Id: Ie22584ff38e777379ac1ee2d61743868a8b93b5c
Diffstat (limited to 'csit/run-k8s-csit-enable.sh')
-rwxr-xr-xcsit/run-k8s-csit-enable.sh313
1 files changed, 0 insertions, 313 deletions
diff --git a/csit/run-k8s-csit-enable.sh b/csit/run-k8s-csit-enable.sh
deleted file mode 100755
index f8c56678..00000000
--- a/csit/run-k8s-csit-enable.sh
+++ /dev/null
@@ -1,313 +0,0 @@
-#!/bin/bash
-#
-# ============LICENSE_START====================================================
-# Copyright (C) 2022-2023 Nordix Foundation.
-# =============================================================================
-# Licensed under the Apache License, Version 2.0 (the "License");
-# you may not use this file except in compliance with the License.
-# You may obtain a copy of the License at
-#
-# http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS,
-# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-# See the License for the specific language governing permissions and
-# limitations under the License.
-#
-# SPDX-License-Identifier: Apache-2.0
-# ============LICENSE_END======================================================
-
-# This script spins up kubernetes cluster in Microk8s for deploying policy helm charts.
-# Runs CSITs in kubernetes.
-
-if [ -z "${WORKSPACE}" ]; then
- WORKSPACE=$(git rev-parse --show-toplevel)
- export WORKSPACE
-fi
-
-export GERRIT_BRANCH=$(awk -F= '$1 == "defaultbranch" { print $2 }' "${WORKSPACE}"/.gitreview)
-
-CSIT_SCRIPT="scripts/run-test.sh"
-ROBOT_DOCKER_IMAGE="policy-csit-robot"
-POLICY_CLAMP_ROBOT="policy-clamp-test.robot"
-POLICY_API_ROBOT="api-test.robot api-slas.robot"
-POLICY_PAP_ROBOT="pap-test.robot pap-slas.robot"
-POLICY_APEX_PDP_ROBOT="apex-pdp-test.robot apex-slas.robot"
-POLICY_XACML_PDP_ROBOT="xacml-pdp-test.robot"
-POLICY_DROOLS_PDP_ROBOT="drools-pdp-test.robot"
-POLICY_DISTRIBUTION_ROBOT="distribution-test.robot"
-
-POLICY_API_CONTAINER="policy-api"
-POLICY_PAP_CONTAINER="policy-pap"
-POLICY_CLAMP_CONTAINER="policy-clamp-runtime-acm"
-POLICY_APEX_CONTAINER="policy-apex-pdp"
-POLICY_DROOLS_CONTAINER="policy-drools-pdp"
-POLICY_XACML_CONTAINER="policy-xacml-pdp"
-POLICY_DISTRIBUTION_CONTAINER="policy-distribution"
-POLICY_K8S_PPNT_CONTAINER="policy-clamp-ac-k8s-ppnt"
-POLICY_HTTP_PPNT_CONTAINER="policy-clamp-ac-http-ppnt"
-POLICY_PF_PPNT_CONTAINER="policy-clamp-ac-pf-ppnt"
-SET_VALUES=""
-
-DISTRIBUTION_CSAR=${WORKSPACE}/csit/resources/tests/data/csar
-DIST_TEMP_FOLDER=/tmp/distribution
-
-export PROJECT=""
-export ROBOT_FILE=""
-export ROBOT_LOG_DIR=${WORKSPACE}/csit/archives
-export READINESS_CONTAINERS=()
-
-function spin_microk8s_cluster() {
- echo "Verify if Microk8s cluster is running.."
- microk8s version
- exitcode="${?}"
-
- if [ "$exitcode" -ne 0 ]; then
- echo "Microk8s cluster not available, Spinning up the cluster.."
- sudo snap install microk8s --classic --channel=1.25/stable
-
- if [ "${?}" -ne 0 ]; then
- echo "Failed to install kubernetes cluster. Aborting.."
- return 1
- fi
- echo "Microk8s cluster installed successfully"
- sudo usermod -a -G microk8s $USER
- echo "Enabling DNS and helm3 plugins"
- sudo microk8s.enable dns helm3 hostpath-storage
- echo "Creating configuration file for Microk8s"
- sudo mkdir -p $HOME/.kube
- sudo chown -R $USER:$USER $HOME/.kube
- sudo microk8s kubectl config view --raw >$HOME/.kube/config
- sudo chmod 600 $HOME/.kube/config
- echo "K8s installation completed"
- echo "----------------------------------------"
- else
- echo "K8s cluster is already running"
- echo "----------------------------------------"
- return 0
- fi
-
-}
-
-function uninstall_policy() {
- echo "Removing the policy helm deployment"
- sudo microk8s helm uninstall csit-policy
- sudo microk8s helm uninstall prometheus
- sudo microk8s helm uninstall csit-robot
- rm -rf ${WORKSPACE}/helm/policy/Chart.lock
- sudo rm -rf /dockerdata-nfs/mariadb-galera/
- echo "Policy deployment deleted"
- echo "Clean up docker"
- docker image prune -f
-}
-
-function teardown_cluster() {
- echo "Removing k8s cluster and k8s configuration file"
- sudo snap remove microk8s;rm -rf $HOME/.kube/config
- echo "MicroK8s Cluster removed"
-}
-
-function build_robot_image() {
- echo "Build docker image for robot framework"
- cd ${WORKSPACE}/csit/resources || exit
- clone_models
- if [ "${PROJECT}" == "distribution" ] || [ "${PROJECT}" == "policy-distribution" ]; then
- copy_csar_file
- fi
- echo "Build robot framework docker image"
- docker login -u docker -p docker nexus3.onap.org:10001
- docker build . --file Dockerfile \
- --build-arg CSIT_SCRIPT="$CSIT_SCRIPT" \
- --build-arg ROBOT_FILE="$ROBOT_FILE" \
- --tag "${ROBOT_DOCKER_IMAGE}" --no-cache
- echo "---------------------------------------------"
-}
-
-function start_csit() {
- build_robot_image
- if [ "${?}" -eq 0 ]; then
- echo "Importing robot image into microk8s registry"
- docker save -o policy-csit-robot.tar ${ROBOT_DOCKER_IMAGE}:latest
- sudo microk8s ctr image import policy-csit-robot.tar
- rm -rf ${WORKSPACE}/csit/resources/policy-csit-robot.tar
- rm -rf ${WORKSPACE}/csit/resources/tests/models/
- echo "---------------------------------------------"
- if [ $PROJECT == "clamp" ] || [ $PROJECT == "policy-clamp" ]; then
- POD_READY_STATUS="0/1"
- while [[ ${POD_READY_STATUS} != "1/1" ]]; do
- echo "Waiting for chartmuseum pod to come up..."
- sleep 5
- POD_READY_STATUS=$(microk8s kubectl get pods | grep -e "policy-chartmuseum" | awk '{print $2}')
- done
- push_acelement_chart
- fi
- echo "Installing Robot framework pod for running CSIT"
- cd ${WORKSPACE}/helm
- mkdir -p ${ROBOT_LOG_DIR}
- sudo microk8s helm install csit-robot robot --set robot="$ROBOT_FILE" --set "readiness={${READINESS_CONTAINERS[*]}}" --set robotLogDir=$ROBOT_LOG_DIR
- print_robot_log
- teardown_cluster
- fi
-}
-
-function print_robot_log() {
- count_pods=0
- while [[ ${count_pods} -eq 0 ]]; do
- echo "Waiting for pods to come up..."
- sleep 5
- count_pods=$(sudo microk8s kubectl get pods --output name | wc -l)
- done
- sudo microk8s kubectl get po
- robotpod=$(sudo microk8s kubectl get po | grep policy-csit)
- podName=$(echo "$robotpod" | awk '{print $1}')
- echo "The robot tests will begin once the policy components {${READINESS_CONTAINERS[*]}} are up and running..."
- sudo microk8s kubectl wait --for=jsonpath='{.status.phase}'=Running --timeout=10m pod/"$podName"
- sudo microk8s kubectl logs -f "$podName"
- echo "Please check the logs of policy-csit-robot pod for the test execution results"
-}
-
-
-function clone_models () {
- # download models examples
- git clone -b "${GERRIT_BRANCH}" --single-branch https://github.com/onap/policy-models.git "${WORKSPACE}"/csit/resources/tests/models
-
- # create a couple of variations of the policy definitions
- sed -e 's!Measurement_vGMUX!ADifferentValue!' \
- tests/models/models-examples/src/main/resources/policies/vCPE.policy.monitoring.input.tosca.json \
- >tests/models/models-examples/src/main/resources/policies/vCPE.policy.monitoring.input.tosca.v1_2.json
-
- sed -e 's!"version": "1.0.0"!"version": "2.0.0"!' \
- -e 's!"policy-version": 1!"policy-version": 2!' \
- tests/models/models-examples/src/main/resources/policies/vCPE.policy.monitoring.input.tosca.json \
- >tests/models/models-examples/src/main/resources/policies/vCPE.policy.monitoring.input.tosca.v2.json
-}
-
-function copy_csar_file() {
- zip -F ${DISTRIBUTION_CSAR}/sample_csar_with_apex_policy.csar \
- --out ${DISTRIBUTION_CSAR}/csar_temp.csar -q
- # Remake temp directory
- sudo rm -rf "${DIST_TEMP_FOLDER}"
- sudo mkdir "${DIST_TEMP_FOLDER}"
- sudo cp ${DISTRIBUTION_CSAR}/csar_temp.csar ${DISTRIBUTION_CSAR}/temp.csar
- sudo mv ${DISTRIBUTION_CSAR}/temp.csar ${DIST_TEMP_FOLDER}/sample_csar_with_apex_policy.csar
-}
-
-
-function set_project_config() {
- echo "Setting project configuration for: $PROJECT"
- case $PROJECT in
-
- clamp | policy-clamp)
- export ROBOT_FILE=$POLICY_CLAMP_ROBOT
- export READINESS_CONTAINERS=($POLICY_CLAMP_CONTAINER,$POLICY_APEX_CONTAINER,$POLICY_PF_PPNT_CONTAINER,$POLICY_K8S_PPNT_CONTAINER,
- $POLICY_HTTP_PPNT_CONTAINER)
- export SET_VALUES="--set $POLICY_CLAMP_CONTAINER.enabled=true --set $POLICY_APEX_CONTAINER.enabled=true
- --set $POLICY_PF_PPNT_CONTAINER.enabled=true --set $POLICY_K8S_PPNT_CONTAINER.enabled=true --set $POLICY_HTTP_PPNT_CONTAINER.enabled=true"
- ;;
-
- api | policy-api)
- export ROBOT_FILE=$POLICY_API_ROBOT
- export READINESS_CONTAINERS=($POLICY_API_CONTAINER)
- ;;
-
- pap | policy-pap)
- export ROBOT_FILE=$POLICY_PAP_ROBOT
- export READINESS_CONTAINERS=($POLICY_APEX_CONTAINER,$POLICY_PAP_CONTAINER,$POLICY_API_CONTAINER,$POLICY_DROOLS_CONTAINER,
- $POLICY_XACML_CONTAINER)
- export SET_VALUES="--set $POLICY_APEX_CONTAINER.enabled=true --set $POLICY_DROOLS_CONTAINER.enabled=true --set $POLICY_XACML_CONTAINER.enabled=true"
- ;;
-
- apex-pdp | policy-apex-pdp)
- export ROBOT_FILE=$POLICY_APEX_PDP_ROBOT
- export READINESS_CONTAINERS=($POLICY_APEX_CONTAINER,$POLICY_API_CONTAINER,$POLICY_PAP_CONTAINER)
- export SET_VALUES="--set $POLICY_APEX_CONTAINER.enabled=true"
- ;;
-
- xacml-pdp | policy-xacml-pdp)
- export ROBOT_FILE=($POLICY_XACML_PDP_ROBOT)
- export READINESS_CONTAINERS=($POLICY_API_CONTAINER,$POLICY_PAP_CONTAINER,$POLICY_XACML_CONTAINER)
- export SET_VALUES="--set $POLICY_XACML_CONTAINER.enabled=true"
- ;;
-
- drools-pdp | policy-drools-pdp)
- export ROBOT_FILE=($POLICY_DROOLS_PDP_ROBOT)
- export READINESS_CONTAINERS=($POLICY_DROOLS_CONTAINER)
- export SET_VALUES="--set $POLICY_DROOLS_CONTAINER.enabled=true"
- ;;
-
- distribution | policy-distribution)
- export ROBOT_FILE=($POLICY_DISTRIBUTION_ROBOT)
- export READINESS_CONTAINERS=($POLICY_APEX_CONTAINER,$POLICY_API_CONTAINER,$POLICY_PAP_CONTAINER,
- $POLICY_DISTRIBUTION_CONTAINER)
- export SET_VALUES="--set $POLICY_APEX_CONTAINER.enabled=true --set $POLICY_DISTRIBUTION_CONTAINER.enabled=true"
- ;;
-
- *)
- echo "Unknown project supplied. Enabling all policy charts for the deployment"
- export SET_VALUES="--set $POLICY_APEX_CONTAINER.enabled=true --set $POLICY_XACML_CONTAINER.enabled=true
- --set $POLICY_DISTRIBUTION_CONTAINER.enabled=true --set $POLICY_POLICY_DROOLS_CONTAINER.enabled=true
- --set $POLICY_CLAMP_CONTAINER.enabled=true --set $POLICY_PF_PPNT_CONTAINER.enabled=true
- --set $POLICY_K8S_PPNT_CONTAINER.enabled=true --set $POLICY_HTTP_PPNT_CONTAINER.enabled=true"
- ;;
- esac
-
-}
-
-function install_chartmuseum () {
- echo "Installing Chartmuseum helm repository..."
- sudo microk8s helm repo add chartmuseum-git https://chartmuseum.github.io/charts
- sudo microk8s helm repo update
- sudo microk8s helm install policy-chartmuseum chartmuseum-git/chartmuseum --set env.open.DISABLE_API=false --set service.type=NodePort --set service.nodePort=30208
- sudo microk8s helm plugin install https://github.com/chartmuseum/helm-push
-}
-
-function push_acelement_chart() {
- echo "Pushing acelement chart to the chartmuseum repo..."
- sudo microk8s helm repo add policy-chartmuseum http://localhost:30208
-
- # download clamp repo
- git clone -b "${GERRIT_BRANCH}" --single-branch https://github.com/onap/policy-clamp.git "${WORKSPACE}"/csit/resources/tests/clamp
- ACELEMENT_CHART=${WORKSPACE}/csit/resources/tests/clamp/examples/src/main/resources/clamp/acm/acelement-helm/acelement
- sudo microk8s helm cm-push $ACELEMENT_CHART policy-chartmuseum
- sudo microk8s helm repo update
- echo "-------------------------------------------"
-}
-
-
-OPERATION="$1"
-PROJECT="$2"
-
-if [ $OPERATION == "install" ]; then
- spin_microk8s_cluster
- if [ "${?}" -eq 0 ]; then
- set_project_config
- echo "Installing policy helm charts in the default namespace"
- cd ${WORKSPACE}/helm || exit
- sudo microk8s helm dependency build policy
- sudo microk8s helm install csit-policy policy ${SET_VALUES}
- sudo microk8s helm install prometheus prometheus
- echo "Policy chart installation completed"
- echo "-------------------------------------------"
- fi
-
- if [ "$PROJECT" ]; then
- export $PROJECT
- export ROBOT_LOG_DIR=${WORKSPACE}/csit/archives/${PROJECT}
- get_robot_file
- echo "CSIT will be invoked from $ROBOT_FILE"
- echo "Readiness containers: ${READINESS_CONTAINERS[*]}"
- echo "-------------------------------------------"
- start_csit
- else
- echo "No project supplied for running CSIT"
- fi
-
-elif [ $OPERATION == "uninstall" ]; then
- uninstall_policy
-
-elif [ $OPERATION == "clean" ]; then
- teardown_cluster
-else
- echo "Invalid arguments provided. Usage: $0 [option..] {install {project} | uninstall} | {clean}"
-fi