From 1153b6d0153344d4d92518d2ca73ecfe71dfa9d9 Mon Sep 17 00:00:00 2001 From: "adheli.tavares" Date: Tue, 28 Feb 2023 12:59:37 +0000 Subject: New Test Development - api, pap (except consolidated HC), apex and acm runtime passing on both docker and helm environment - other simulators exposed on simulator service - topics are checked on test with robot http support - apex temp engine port exposed - xacml readiness added Issue-ID: POLICY-4125 Change-Id: I39ee8c38e70dd3a4ad26ba69d7c62e61a211469e Signed-off-by: adheli.tavares --- helm/tests/common-library.robot | 121 ---------------------------------------- 1 file changed, 121 deletions(-) delete mode 100644 helm/tests/common-library.robot (limited to 'helm/tests/common-library.robot') diff --git a/helm/tests/common-library.robot b/helm/tests/common-library.robot deleted file mode 100644 index 95831b0d..00000000 --- a/helm/tests/common-library.robot +++ /dev/null @@ -1,121 +0,0 @@ -*** Settings *** -Library Collections -Library RequestsLibrary -Library OperatingSystem -Library json - -*** Keywords *** - -PolicyAdminAuth - ${policyadmin}= Create list policyadmin zb!XztG34 - [return] ${policyadmin} - -HealthCheckAuth - ${healthcheck}= Create list policyadmin zb!XztG34 - [return] ${healthcheck} - -PerformPostRequest - [Arguments] ${hostname} ${url} ${expectedstatus} ${postjson} ${params} ${auth} - Log Creating session http://${hostname}:6969 - ${session}= Create Session policy http://${hostname}:6969 auth=${auth} - ${headers}= Create Dictionary Accept=application/json Content-Type=application/json - ${resp}= POST On Session policy ${url} data=${postjson} params=${params} headers=${headers} expected_status=${expectedstatus} - Log Received response from policy ${resp.text} - [return] ${resp} - -PerformPutRequest - [Arguments] ${hostname} ${url} ${expectedstatus} ${params} ${auth} - Log Creating session http://${hostname}:6969 - ${session}= Create Session policy http://${hostname}:6969 auth=${auth} - ${headers}= Create Dictionary Accept=application/json Content-Type=application/json - ${resp}= PUT On Session policy ${url} params=${params} headers=${headers} expected_status=${expectedstatus} - Log Received response from policy ${resp.text} - [return] ${resp} - -PerformGetRequest - [Arguments] ${hostname} ${url} ${expectedstatus} ${params} ${auth} - Log Creating session http://${hostname}:6969 - ${session}= Create Session policy http://${hostname}:6969 auth=${auth} - ${headers}= Create Dictionary Accept=application/json Content-Type=application/json - ${resp}= GET On Session policy ${url} params=${params} headers=${headers} expected_status=${expectedstatus} - Log Received response from policy ${resp.text} - [return] ${resp} - -PerformDeleteRequest - [Arguments] ${hostname} ${url} ${expectedstatus} ${auth} - Log Creating session http://${hostname}:6969 - ${session}= Create Session policy http://${hostname}:6969 auth=${auth} - ${headers}= Create Dictionary Accept=application/json Content-Type=application/json - ${resp}= DELETE On Session policy ${url} headers=${headers} expected_status=${expectedstatus} - Log Received response from policy ${resp.text} - -CreatePolicy - [Arguments] ${url} ${expectedstatus} ${postjson} ${policyname} ${policyversion} - [Documentation] Create the specific policy - ${policyadmin}= PolicyAdminAuth - ${resp}= PerformPostRequest ${POLICY_API_IP} ${url} ${expectedstatus} ${postjson} null ${policyadmin} - Run Keyword If ${expectedstatus}==200 Dictionary Should Contain Key ${resp.json()['topology_template']['policies'][0]} ${policyname} - Run Keyword If ${expectedstatus}==200 Should Be Equal As Strings ${resp.json()['topology_template']['policies'][0]['${policyname}']['version']} ${policyversion} - -CreateNodeTemplate - [Arguments] ${url} ${expectedstatus} ${postjson} ${nodeTemplateListLength} - [Documentation] Create the node templates - ${policyadmin}= PolicyAdminAuth - ${resp}= PerformPostRequest ${POLICY_API_IP} ${url} ${expectedstatus} ${postjson} \ ${policyadmin} - Run Keyword If ${expectedstatus}==200 Length Should Be ${resp.json()['topology_template']['node_templates']} ${nodeTemplateListLength} - - -QueryPdpGroups - [Documentation] Verify pdp group query - supports upto 2 groups - [Arguments] ${groupsLength} ${group1Name} ${group1State} ${policiesLengthInGroup1} ${group2Name} ${group2State} ${policiesLengthInGroup2} - ${policyadmin}= PolicyAdminAuth - ${resp}= PerformGetRequest ${POLICY_PAP_IP} /policy/pap/v1/pdps 200 null ${policyadmin} - Length Should Be ${resp.json()['groups']} ${groupsLength} - Should Be Equal As Strings ${resp.json()['groups'][0]['name']} ${group1Name} - Should Be Equal As Strings ${resp.json()['groups'][0]['pdpGroupState']} ${group1State} - Length Should Be ${resp.json()['groups'][0]['pdpSubgroups'][0]['policies']} ${policiesLengthInGroup1} - Run Keyword If ${groupsLength}>1 Should Be Equal As Strings ${resp.json()['groups'][1]['name']} ${group2Name} - Run Keyword If ${groupsLength}>1 Should Be Equal As Strings ${resp.json()['groups'][1]['pdpGroupState']} ${group2State} - Run Keyword If ${groupsLength}>1 Length Should Be ${resp.json()['groups'][1]['pdpSubgroups'][0]['policies']} ${policiesLengthInGroup2} - -QueryPolicyAudit - [Arguments] ${url} ${expectedstatus} ${pdpGroup} ${pdpType} ${policyName} ${expectedAction} - ${policyadmin}= PolicyAdminAuth - ${resp}= PerformGetRequest ${POLICY_PAP_IP} ${url} ${expectedstatus} recordCount=2 ${policyadmin} - Log Received response from queryPolicyAudit ${resp.text} - FOR ${responseEntry} IN @{resp.json()} - Exit For Loop IF '${responseEntry['policy']['name']}'=='${policyName}' - END - Should Be Equal As Strings ${responseEntry['pdpGroup']} ${pdpGroup} - Should Be Equal As Strings ${responseEntry['pdpType']} ${pdpType} - Should Be Equal As Strings ${responseEntry['policy']['name']} ${policyName} - Should Be Equal As Strings ${responseEntry['policy']['version']} 1.0.0 - Should Be Equal As Strings ${responseEntry['action']} ${expectedAction} - Should Be Equal As Strings ${responseEntry['user']} policyadmin - -QueryPolicyStatus - [Documentation] Verify policy deployment status - [Arguments] ${policyName} ${pdpGroup} ${pdpType} ${pdpName} ${policyTypeName} - ${policyadmin}= PolicyAdminAuth - ${resp}= PerformGetRequest ${POLICY_PAP_IP} /policy/pap/v1/policies/status 200 null ${policyadmin} - FOR ${responseEntry} IN @{resp.json()} - Exit For Loop IF '${responseEntry['policy']['name']}'=='${policyName}' - END - Should Be Equal As Strings ${resp.status_code} 200 - Should Be Equal As Strings ${responseEntry['pdpGroup']} ${pdpGroup} - Should Be Equal As Strings ${responseEntry['pdpType']} ${pdpType} - Should Be Equal As Strings ${responseEntry['pdpId']} ${pdpName} - Should Be Equal As Strings ${responseEntry['policy']['name']} ${policyName} - Should Be Equal As Strings ${responseEntry['policy']['version']} 1.0.0 - Should Be Equal As Strings ${responseEntry['policyType']['name']} ${policyTypeName} - Should Be Equal As Strings ${responseEntry['policyType']['version']} 1.0.0 - Should Be Equal As Strings ${responseEntry['deploy']} True - Should Be Equal As Strings ${responseEntry['state']} SUCCESS - -GetMetrics - [Arguments] ${hostname} ${auth} ${context_path} - Log Creating session http://${hostname}:6969 - ${session}= Create Session policy http://${hostname}:6969 auth=${auth} - ${resp}= GET On Session policy ${context_path}metrics expected_status=200 - Log Received response from policy ${resp.text} - [return] ${resp} -- cgit 1.2.3-korg