summaryrefslogtreecommitdiffstats
path: root/csarvalidation/src/main/java/org
diff options
context:
space:
mode:
authorAvinashS <avinash.s@huawei.com>2017-09-20 10:13:15 +0000
committerAvinashS <avinash.s@huawei.com>2017-09-20 10:13:15 +0000
commita04f31a2b6aa49cc0646a35bf6f7f7566bb1c331 (patch)
treef03f6353a616c9e50e7e1380adb133894e1fab44 /csarvalidation/src/main/java/org
parent56c184e1622436654d9f12b1098a8020a6323a3a (diff)
Updated validation for CSIT
Lib interface for CSIT with marketplace Change-Id: I73c68b2f8f7a3940cb175cce2397abd4a4deaff4 IssueId: VNFSDK-90 Signed-off-by: AvinashS <avinash.s@huawei.com>
Diffstat (limited to 'csarvalidation/src/main/java/org')
-rw-r--r--csarvalidation/src/main/java/org/onap/validation/csar/CommonConstants.java6
-rw-r--r--csarvalidation/src/main/java/org/onap/validation/csar/CsarUtil.java13
-rw-r--r--csarvalidation/src/main/java/org/onap/validation/csar/CsarValidator.java (renamed from csarvalidation/src/main/java/org/onap/validation/csar/CsarParser.java)140
3 files changed, 118 insertions, 41 deletions
diff --git a/csarvalidation/src/main/java/org/onap/validation/csar/CommonConstants.java b/csarvalidation/src/main/java/org/onap/validation/csar/CommonConstants.java
index be709ad..03cc36a 100644
--- a/csarvalidation/src/main/java/org/onap/validation/csar/CommonConstants.java
+++ b/csarvalidation/src/main/java/org/onap/validation/csar/CommonConstants.java
@@ -41,6 +41,10 @@ public class CommonConstants {
public static final String TOSCA_META = "TOSCA.meta";
+ public static final String MAINSERV_MANIFEST = "MainServiceTemplate.mf";
+
+ public static final String MAINSERV_TEMPLATE = "MainServiceTemplate.yaml";
+
public static final String CSAR_SUFFIX = ".csar";
public static final String HTTP_HEADER_CONTENT_RANGE = "Content-Range";
@@ -61,7 +65,7 @@ public class CommonConstants {
public static final int BUFFER_SIZE = 2 * 1024 * 1024;
- private CommonConstants() {
+ private CommonConstants() {
// Cannot create instance of the class
}
diff --git a/csarvalidation/src/main/java/org/onap/validation/csar/CsarUtil.java b/csarvalidation/src/main/java/org/onap/validation/csar/CsarUtil.java
index 3708dbf..ee0110c 100644
--- a/csarvalidation/src/main/java/org/onap/validation/csar/CsarUtil.java
+++ b/csarvalidation/src/main/java/org/onap/validation/csar/CsarUtil.java
@@ -33,6 +33,7 @@ import java.util.ArrayList;
import java.util.HashMap;
import java.util.Enumeration;
+import java.util.Map;
import java.util.zip.ZipEntry;
import java.util.zip.ZipFile;
@@ -135,4 +136,16 @@ public class CsarUtil {
}
}
+ public static HashMap<String, String> csarExtract(String filePath) {
+
+ try {
+ String tempfolder = CsarUtil.getUnzipDir(filePath);
+ return CsarUtil.unzip(filePath, tempfolder);
+
+ } catch (IOException e1) {
+ logger.error("CSAR extraction error ! " + e1.getMessage());
+ }
+ return null;
+ }
+
}
diff --git a/csarvalidation/src/main/java/org/onap/validation/csar/CsarParser.java b/csarvalidation/src/main/java/org/onap/validation/csar/CsarValidator.java
index 76a7b11..7d252e1 100644
--- a/csarvalidation/src/main/java/org/onap/validation/csar/CsarParser.java
+++ b/csarvalidation/src/main/java/org/onap/validation/csar/CsarValidator.java
@@ -20,29 +20,30 @@ import org.slf4j.LoggerFactory;
import java.io.*;
-import java.nio.charset.StandardCharsets;
import java.nio.file.Files;
import java.nio.file.Paths;
-import java.text.SimpleDateFormat;
+import static java.nio.charset.StandardCharsets.*;
import java.util.*;
+import java.util.stream.Collectors;
-import static java.nio.charset.StandardCharsets.*;
+
+import org.yaml.snakeyaml.Yaml;
-public class CsarParser {
+public class CsarValidator {
- private static final Logger LOG = LoggerFactory.getLogger(CsarParser.class);
+ private static final Logger LOG = LoggerFactory.getLogger(CsarValidator.class);
// Map of CSAR file and un-zipped file indices
- private static HashMap<String, String> csarFiles;
-
- // Map of packageId and CSAR files
+ static HashMap<String, String> csarFiles;
+
+ // Map of packageId and CSAR files
private static HashMap<String, HashMap<String, String>> csar = new HashMap<String, HashMap<String, String>>();
private static final CsarUtil cUtil = new CsarUtil();
- public CsarParser(String csarWithPath) {
+ public CsarValidator(String packageId, String csarWithPath) {
try {
FileInputStream is = new FileInputStream(csarWithPath);
@@ -50,27 +51,28 @@ public class CsarParser {
LOG.error("CSAR %s is not found! ", e2);
}
try {
- boolean ret = csarExtract(csarWithPath);
- if(ret == true) {
+ csarFiles = CsarUtil.csarExtract(csarWithPath);
+ if(!csarFiles.isEmpty()) {
+ csar.put(packageId, getCsarFiles());
LOG.debug("CSAR extracted sucessfully.");
}
} catch (Exception e1) {
LOG.error("CSAR %s is not a valid CSAR/ZIP file! ", e1);
}
+
}
- /*
- * pubic static boolean validateCsar(String filePath) {
- *
- * csarExtract(filePath);
- *
- * validateCsarMeta();
- *
- * validateToscaMeta();
- *
- * validateManifest();
- * }
- */
+ public static boolean validateCsar() {
+
+ validateCsarMeta();
+
+ validateToscaMeta();
+
+ validateMainService();
+
+ //In future return the status handler object instead.
+ return true;
+ }
public static boolean validateCsarIntegrity(String csarWithPath) {
@@ -91,19 +93,7 @@ public class CsarParser {
}
}
- private static boolean csarExtract(String filePath) {
- try {
- String tempfolder = CsarUtil.getUnzipDir(filePath);
- csarFiles = CsarUtil.unzip(filePath, tempfolder);
-
- } catch (IOException e1) {
- LOG.error("CSAR extraction error ! " + e1.getMessage());
-
- return false;
- }
- return true;
- }
public static boolean validateCsarMeta() {
@@ -142,9 +132,7 @@ public class CsarParser {
return true;
}
} catch (IOException e2) {
- LOG.error("Exception cought while validateCsarMeta ! " + e2.getMessage());
- //e2.printStackTrace();
-
+ LOG.error("Exception caught while validateCsarMeta ! " + e2.getMessage());
} finally {
if (reader != null) {
try {
@@ -168,7 +156,7 @@ public class CsarParser {
try {
if (!cfile.isEmpty() && cfile.contains( System.getProperty("file.separator")+ CommonConstants.TOSCA_METADATA + System.getProperty("file.separator") + CommonConstants.TOSCA_META)) {
- String value = checkEntryFor("Entry-Definitions:", cfile);
+ String value = checkEntryFor(cfile, "Entry-Definitions:");
if (value == null) {
return false;
//Check if Entry-Defintions pointed file exists in CSAR
@@ -183,8 +171,28 @@ public class CsarParser {
return false;
}
+ private static boolean validateMainService() {
+ String key = "metadata";
+
+ // Infuture load from the respective file template/schema
+ List<String> mListMetadata = Arrays.asList("vnf_product_name", "vnf_provider_id",
+ "vnf_package_version", "vnf_release_data_time");
+ boolean mfResult = checkEntryFor(CommonConstants.MAINSERV_MANIFEST, mListMetadata, key);
+
+ List<String> tListMetadata = Arrays.asList("vendor", "csarVersion",
+ "csarProvider","id", "version", "csarType", "name", "vnfdVersion",
+ "vnfmType");
+ boolean tResult = checkEntryFor(CommonConstants.MAINSERV_TEMPLATE, tListMetadata, key);
+
+ if (tResult && mfResult) {
+ return true;
+ }
+ else {
+ return false;
+ }
+ }
- private static String checkEntryFor(String attribute, String fileWithPath) throws IOException {
+ private static String checkEntryFor(String fileWithPath, String attribute) throws IOException {
List<String> lines = Files.readAllLines(Paths.get(fileWithPath), UTF_8);
@@ -195,5 +203,57 @@ public class CsarParser {
}
return null;
}
+
+ private static boolean checkEntryFor(String cFile, List<String> attributes, String key) {
+ String tFileWithPath = csarFiles.get(cFile);
+
+ Yaml yaml = new Yaml();
+ Map<String, ?> values = null;
+ try {
+ values = (Map<String, ?>) yaml.load(new FileInputStream(new File(tFileWithPath)));
+ } catch (FileNotFoundException e) {
+ return false;
+ }
+
+ Map<String, String> subValues = (Map<String, String>) values.get(key);
+
+ //1. Check for empty values in map and if number of mandatory attributes presence
+ Map<String, String> mResult = subValues.entrySet()
+ .stream()
+ .filter(e -> e.getValue() != null)
+ .collect(Collectors.toMap(p -> p.getKey(), p -> p.getValue()));
+ if (mResult.size() != attributes.size())
+ {
+ return false;
+ }
+
+ //2. Validate the exact mandatory attributes with expected attributes list
+ List<String> lResult = subValues.values().stream()
+ .filter(attributes::contains)
+ .collect(Collectors.toList());
+
+ // System.out.println(result);
+ if (lResult.size() != attributes.size()) {
+ return false;
+ }
+ return true;
+
+ }
+
+ public static HashMap<String, HashMap<String, String>> getCsar() {
+ return csar;
+ }
+
+ public static void setCsar(HashMap<String, HashMap<String, String>> csar) {
+ CsarValidator.csar = csar;
+ }
+
+ public static HashMap<String, String> getCsarFiles() {
+ return csarFiles;
+ }
+
+ public static void setCsarFiles(HashMap<String, String> csarFiles) {
+ CsarValidator.csarFiles = csarFiles;
+ }
}