From 8b9ba8597428c807205e049612cafb8d2886c1e2 Mon Sep 17 00:00:00 2001 From: Taka Cho Date: Fri, 26 Feb 2021 10:42:44 -0500 Subject: move xacml csit to xacml repo move tests/plans to from csit repo to xacml repo Issue-ID: POLICY-2895 Change-Id: If8840f286c35136ae76314a6557cf186a9bf8a4a Signed-off-by: Taka Cho --- .../data/onap.policy.guard.decision.request.json | 16 ++ .../onap.policy.monitoring.decision.request.json | 9 + .../data/onap.policy.naming.decision.request.json | 13 ++ .../onap.policy.optimization.decision.request.json | 15 ++ .../tests/data/vCPE.policy.input.tosca.deploy.json | 5 + csit/tests/xacml-pdp-test.robot | 217 +++++++++++++++++++++ 6 files changed, 275 insertions(+) create mode 100644 csit/tests/data/onap.policy.guard.decision.request.json create mode 100644 csit/tests/data/onap.policy.monitoring.decision.request.json create mode 100644 csit/tests/data/onap.policy.naming.decision.request.json create mode 100644 csit/tests/data/onap.policy.optimization.decision.request.json create mode 100644 csit/tests/data/vCPE.policy.input.tosca.deploy.json create mode 100644 csit/tests/xacml-pdp-test.robot (limited to 'csit/tests') diff --git a/csit/tests/data/onap.policy.guard.decision.request.json b/csit/tests/data/onap.policy.guard.decision.request.json new file mode 100644 index 00000000..ee90feaa --- /dev/null +++ b/csit/tests/data/onap.policy.guard.decision.request.json @@ -0,0 +1,16 @@ +{ + "ONAPName": "Guard", + "ONAPComponent": "Guard-component", + "ONAPInstance": "Guard-component-instance", + "requestId": "unique-request-guard-1", + "action": "guard", + "resource": { + "guard": { + "actor": "APPC", + "operation": "ModifyConfig", + "target": "f17face5-69cb-4c88-9e0b-7426db7edddd", + "requestId": "c7c6a4aa-bb61-4a15-b831-ba1472dd4a65", + "clname": "ControlLoop-vFirewall-d0a1dfc6-94f5-4fd4-a5b5-4630b438850a" + } + } +} diff --git a/csit/tests/data/onap.policy.monitoring.decision.request.json b/csit/tests/data/onap.policy.monitoring.decision.request.json new file mode 100644 index 00000000..f79f4eb6 --- /dev/null +++ b/csit/tests/data/onap.policy.monitoring.decision.request.json @@ -0,0 +1,9 @@ +{ + "ONAPName": "DCAE", + "ONAPComponent": "PolicyHandler", + "ONAPInstance": "622431a4-9dea-4eae-b443-3b2164639c64", + "action": "configure", + "resource": { + "policy-id": "onap.restart.tca" + } +} \ No newline at end of file diff --git a/csit/tests/data/onap.policy.naming.decision.request.json b/csit/tests/data/onap.policy.naming.decision.request.json new file mode 100644 index 00000000..3833a241 --- /dev/null +++ b/csit/tests/data/onap.policy.naming.decision.request.json @@ -0,0 +1,13 @@ +{ + "ONAPName": "SDNC", + "ONAPComponent": "SDNC-component", + "ONAPInstance": "SDNC-component-instance", + "requestId": "unique-request-sdnc-1", + "action": "naming", + "resource": { + "nfRole": [], + "naming-type": [], + "property-name": [], + "policy-type": ["onap.policies.Naming"] + } +} diff --git a/csit/tests/data/onap.policy.optimization.decision.request.json b/csit/tests/data/onap.policy.optimization.decision.request.json new file mode 100644 index 00000000..d997099c --- /dev/null +++ b/csit/tests/data/onap.policy.optimization.decision.request.json @@ -0,0 +1,15 @@ +{ + "ONAPName": "OOF", + "ONAPComponent": "OOF-component", + "ONAPInstance": "OOF-component-instance", + "context" : { + "subscriberName": [] + }, + "action": "optimize", + "resource": { + "scope": [], + "services": [], + "resources": [], + "geography": [] + } +} diff --git a/csit/tests/data/vCPE.policy.input.tosca.deploy.json b/csit/tests/data/vCPE.policy.input.tosca.deploy.json new file mode 100644 index 00000000..7ace047b --- /dev/null +++ b/csit/tests/data/vCPE.policy.input.tosca.deploy.json @@ -0,0 +1,5 @@ +{"policies":[ + {"policy-id":"onap.restart.tca"}, + {"policy-id":"OSDF_CASABLANCA.Affinity_Default"} + ] +} diff --git a/csit/tests/xacml-pdp-test.robot b/csit/tests/xacml-pdp-test.robot new file mode 100644 index 00000000..03b0ca7a --- /dev/null +++ b/csit/tests/xacml-pdp-test.robot @@ -0,0 +1,217 @@ +*** Settings *** +Library Collections +Library RequestsLibrary +Library OperatingSystem +Library Process +Library json + +*** Test Cases *** +Healthcheck + [Documentation] Runs Policy Xacml PDP Health check + ${auth}= Create List healthcheck zb!XztG34 + Log Creating session https://${POLICY_PDPX_IP}:6969 + ${session}= Create Session policy https://${POLICY_PDPX_IP}:6969 auth=${auth} + ${headers}= Create Dictionary Accept=application/json Content-Type=application/json + ${resp}= Get Request policy /policy/pdpx/v1/healthcheck headers=${headers} + Log Received response from policy ${resp.text} + Should Be Equal As Strings ${resp.status_code} 200 + Should Be Equal As Strings ${resp.json()['code']} 200 + +Statistics + [Documentation] Runs Policy Xacml PDP Statistics + ${auth}= Create List healthcheck zb!XztG34 + Log Creating session https://${POLICY_PDPX_IP}:6969 + ${session}= Create Session policy https://${POLICY_PDPX_IP}:6969 auth=${auth} + ${headers}= Create Dictionary Accept=application/json Content-Type=application/json + ${resp}= Get Request policy /policy/pdpx/v1/statistics headers=${headers} + Log Received response from policy ${resp.text} + Should Be Equal As Strings ${resp.status_code} 200 + Should Be Equal As Strings ${resp.json()['code']} 200 + +MakeTopics + [Documentation] Creates the Policy topics + ${result}= Run Process ${SCR_DMAAP}/make_topic.sh POLICY-PDP-PAP + Should Be Equal As Integers ${result.rc} 0 + +ExecuteXacmlPolicy + Wait Until Keyword Succeeds 0 min 15 sec CreateMonitorPolicy + Wait Until Keyword Succeeds 0 min 15 sec CreateOptimizationPolicy + Wait Until Keyword Succeeds 0 min 15 sec GetDefaultDecision + Wait Until Keyword Succeeds 0 min 15 sec DeployPolicies + Wait Until Keyword Succeeds 0 min 15 sec GetAbbreviatedDecisionResult + Wait Until Keyword Succeeds 0 min 15 sec GetMonitoringDecision + Wait Until Keyword Succeeds 0 min 15 sec GetNamingDecision + Wait Until Keyword Succeeds 0 min 15 sec GetOptimizationDecision + +*** Keywords *** + +CreateMonitorPolicy + [Documentation] Create a Monitoring policy + ${auth}= Create List healthcheck zb!XztG34 + ${postjson}= Get file ${DATA2}/vCPE.policy.monitoring.input.tosca.json + Log Creating session https://${POLICY_API_IP}:6969 + ${session}= Create Session policy https://${POLICY_API_IP}:6969 auth=${auth} + ${headers}= Create Dictionary Accept=application/json Content-Type=application/json + ${resp}= Post Request policy /policy/api/v1/policytypes/onap.policies.monitoring.tcagen2/versions/1.0.0/policies data=${postjson} headers=${headers} + Log Received response from policy4 ${resp.text} + ${postjsonobject} To Json ${postjson} + Should Be Equal As Strings ${resp.status_code} 200 + Dictionary Should Contain Key ${resp.json()} tosca_definitions_version + Dictionary Should Contain Key ${postjsonobject} tosca_definitions_version + +CreateOptimizationPolicy + [Documentation] Create an Optimization policy + ${auth}= Create List healthcheck zb!XztG34 + ${postjson}= Get file ${DATA2}/vCPE.policies.optimization.input.tosca.json + Log Creating session https://${POLICY_API_IP}:6969 + ${session}= Create Session policy https://${POLICY_API_IP}:6969 auth=${auth} + ${headers}= Create Dictionary Accept=application/json Content-Type=application/json + ${resp}= Post Request policy /policy/api/v1/policytypes/onap.policies.optimization.resource.AffinityPolicy/versions/1.0.0/policies data=${postjson} headers=${headers} + Log Received response from policy4 ${resp.text} + ${postjsonobject} To Json ${postjson} + Should Be Equal As Strings ${resp.status_code} 200 + Dictionary Should Contain Key ${resp.json()} tosca_definitions_version + Dictionary Should Contain Key ${postjsonobject} tosca_definitions_version + +DeployPolicies + [Documentation] Runs Policy PAP to deploy a policy + ${auth}= Create List healthcheck zb!XztG34 + ${postjson}= Get file ${CURDIR}/data/vCPE.policy.input.tosca.deploy.json + Log Creating session https://${POLICY_PAP_IP}:6969 + ${session}= Create Session policy https://${POLICY_PAP_IP}:6969 auth=${auth} + ${headers}= Create Dictionary Accept=application/json Content-Type=application/json + ${resp}= Post Request policy /policy/pap/v1/pdps/policies data=${postjson} headers=${headers} + Log Received response from policy5 ${resp.text} + ${postjsonobject} To Json ${postjson} + Should Be Equal As Strings ${resp.status_code} 202 + ${result}= Run Process ${SCR_DMAAP}/wait_topic.sh POLICY-PDP-PAP + ... responseTo xacml ACTIVE onap.restart.tca + +GetStatisticsAfterDeployed + [Documentation] Runs Policy Xacml PDP Statistics after policy is deployed + ${auth}= Create List healthcheck zb!XztG34 + Log Creating session https://${POLICY_PDPX_IP}:6969 + ${session}= Create Session policy https://${POLICY_PDPX_IP}:6969 auth=${auth} + ${headers}= Create Dictionary Accept=application/json Content-Type=application/json + ${resp}= Get Request policy /policy/pdpx/v1/statistics headers=${headers} + Log Received response from policy ${resp.text} + Should Be Equal As Strings ${resp.status_code} 200 + Should Be Equal As Strings ${resp.json()['code']} 200 + Should Be Equal As Strings ${resp.json()['totalPoliciesCount'] 1 + +GetDefaultDecision + [Documentation] Get Default Decision with no policies in Xacml PDP + ${auth}= Create List healthcheck zb!XztG34 + ${postjson}= Get file ${CURDIR}/data/onap.policy.guard.decision.request.json + Log Creating session https://${POLICY_PDPX_IP}:6969 + ${session}= Create Session policy https://${POLICY_PDPX_IP}:6969 auth=${auth} + ${headers}= Create Dictionary Accept=application/json Content-Type=application/json + ${params}= Create Dictionary abbrev=true + ${resp}= Post Request policy /policy/pdpx/v1/decision params=${params} data=${postjson} headers=${headers} + Log Received response from policy ${resp.text} + ${status}= Get From Dictionary ${resp.json()} status + Should Be Equal As Strings ${resp.status_code} 200 + Should Be Equal As Strings ${status} Permit + +GetAbbreviatedDecisionResult + [Documentation] Get Decision with abbreviated results from Policy Xacml PDP + ${auth}= Create List healthcheck zb!XztG34 + ${postjson}= Get file ${CURDIR}/data/onap.policy.monitoring.decision.request.json + Log Creating session https://${POLICY_PDPX_IP}:6969 + ${session}= Create Session policy https://${POLICY_PDPX_IP}:6969 auth=${auth} + ${headers}= Create Dictionary Accept=application/json Content-Type=application/json + ${params}= Create Dictionary abbrev=true + ${resp}= Post Request policy /policy/pdpx/v1/decision params=${params} data=${postjson} headers=${headers} + Log Received response from policy ${resp.text} + ${policy}= Get From Dictionary ${resp.json()['policies']} onap.restart.tca + Should Be Equal As Strings ${resp.status_code} 200 + Dictionary Should Contain Key ${policy} type + Dictionary Should Contain Key ${policy} metadata + Dictionary Should Not Contain Key ${policy} type_version + Dictionary Should Not Contain Key ${policy} properties + Dictionary Should Not Contain Key ${policy} name + Dictionary Should Not Contain Key ${policy} version + +GetMonitoringDecision + [Documentation] Get Decision from Monitoring Policy Xacml PDP + ${auth}= Create List healthcheck zb!XztG34 + ${postjson}= Get file ${CURDIR}/data/onap.policy.monitoring.decision.request.json + Log Creating session https://${POLICY_PDPX_IP}:6969 + ${session}= Create Session policy https://${POLICY_PDPX_IP}:6969 auth=${auth} + ${headers}= Create Dictionary Accept=application/json Content-Type=application/json + ${resp}= Post Request policy /policy/pdpx/v1/decision data=${postjson} headers=${headers} + Log Received response from policy ${resp.text} + ${policy}= Get From Dictionary ${resp.json()['policies']} onap.restart.tca + Should Be Equal As Strings ${resp.status_code} 200 + Dictionary Should Contain Key ${policy} type + Dictionary Should Contain Key ${policy} metadata + Dictionary Should Contain Key ${policy} type_version + Dictionary Should Contain Key ${policy} properties + Dictionary Should Contain Key ${policy} name + Dictionary Should Contain Key ${policy} version + +GetNamingDecision + [Documentation] Get Decision from Naming Policy Xacml PDP + ${auth}= Create List healthcheck zb!XztG34 + ${postjson}= Get file ${CURDIR}/data/onap.policy.naming.decision.request.json + Log Creating session https://${POLICY_PDPX_IP}:6969 + ${session}= Create Session policy https://${POLICY_PDPX_IP}:6969 auth=${auth} + ${headers}= Create Dictionary Accept=application/json Content-Type=application/json + ${resp}= Post Request policy /policy/pdpx/v1/decision data=${postjson} headers=${headers} + Log Received response from policy ${resp.text} + ${policy}= Get From Dictionary ${resp.json()['policies']} SDNC_Policy.ONAP_NF_NAMING_TIMESTAMP + Should Be Equal As Strings ${resp.status_code} 200 + Dictionary Should Contain Key ${policy} type + Dictionary Should Contain Key ${policy} type_version + Dictionary Should Contain Key ${policy} properties + Dictionary Should Contain Key ${policy} name + +GetOptimizationDecision + [Documentation] Get Decision from Optimization Policy Xacml PDP + ${auth}= Create List healthcheck zb!XztG34 + ${postjson}= Get file ${CURDIR}/data/onap.policy.optimization.decision.request.json + Log Creating session https://${POLICY_PDPX_IP}:6969 + ${session}= Create Session policy https://${POLICY_PDPX_IP}:6969 auth=${auth} + ${headers}= Create Dictionary Accept=application/json Content-Type=application/json + ${resp}= Post Request policy /policy/pdpx/v1/decision data=${postjson} headers=${headers} + Log Received response from policy ${resp.text} + ${policy}= Get From Dictionary ${resp.json()['policies']} OSDF_CASABLANCA.Affinity_Default + Should Be Equal As Strings ${resp.status_code} 200 + Dictionary Should Contain Key ${policy} type + Dictionary Should Contain Key ${policy} type_version + Dictionary Should Contain Key ${policy} properties + Dictionary Should Contain Key ${policy} name + +GetStatisticsAfterDecision + [Documentation] Runs Policy Xacml PDP Statistics after Decision request + ${auth}= Create List healthcheck zb!XztG34 + Log Creating session https://${POLICY_PDPX_IP}:6969 + ${session}= Create Session policy https://${POLICY_PDPX_IP}:6969 auth=${auth} + ${headers}= Create Dictionary Accept=application/json Content-Type=application/json + ${resp}= Get Request policy /policy/pdpx/v1/statistics headers=${headers} + Log Received response from policy ${resp.text} + Should Be Equal As Strings ${resp.status_code} 200 + Should Be Equal As Strings ${resp.json()['code']} 200 + Should Be Equal As Strings ${resp.json()['totalDecisionsCount'] 1 + +UndeployMonitorPolicy + [Documentation] Runs Policy PAP to undeploy a policy + ${auth}= Create List healthcheck zb!XztG34 + Log Creating session https://${POLICY_PAP_IP}:6969 + ${session}= Create Session policy https://${POLICY_PAP_IP}:6969 auth=${auth} + ${headers}= Create Dictionary Accept=application/json Content-Type=application/json + ${resp}= Delete Request policy /policy/pap/v1/pdps/policies/onap.restart.tca headers=${headers} + Log Received response from policy ${resp.text} + Should Be Equal As Strings ${resp.status_code} 202 + +GetStatisticsAfterUndeploy + [Documentation] Runs Policy Xacml PDP Statistics after policy is undeployed + ${auth}= Create List healthcheck zb!XztG34 + Log Creating session https://${POLICY_PDPX_IP}:6969 + ${session}= Create Session policy https://${POLICY_PDPX_IP}:6969 auth=${auth} + ${headers}= Create Dictionary Accept=application/json Content-Type=application/json + ${resp}= Get Request policy /policy/pdpx/v1/statistics headers=${headers} + Log Received response from policy ${resp.text} + Should Be Equal As Strings ${resp.status_code} 200 + Should Be Equal As Strings ${resp.json()['code']} 200 + Should Be Equal As Strings ${resp.json()['totalPoliciesCount'] 0 -- cgit 1.2.3-korg