X-Git-Url: https://gerrit.o-ran-sc.org/r/gitweb?a=blobdiff_plain;f=test%2Fcommon%2Fagent_api_functions.sh;h=0c2e48a33337f40cf5235fc95cc94a903702fd5e;hb=7682abb5a05160aeb83004a4e56c36e302eded1e;hp=2f1f543a2b48ef3fd5744ff22c097cfcb9cc593b;hpb=366e36aa247ed4c5d1b95437bcd0798c9d945231;p=nonrtric.git diff --git a/test/common/agent_api_functions.sh b/test/common/agent_api_functions.sh index 2f1f543a..0c2e48a3 100644 --- a/test/common/agent_api_functions.sh +++ b/test/common/agent_api_functions.sh @@ -19,6 +19,68 @@ # This is a script that contains management and test functions for Policy Agent +################ Test engine functions ################ + +# Create the image var used during the test +# arg: (selects staging, snapshot, release etc) +# is present only for images with staging, snapshot,release tags +__PA_imagesetup() { + __check_and_create_image_var PA "POLICY_AGENT_IMAGE" "POLICY_AGENT_IMAGE_BASE" "POLICY_AGENT_IMAGE_TAG" $1 "$POLICY_AGENT_DISPLAY_NAME" +} + +# Pull image from remote repo or use locally built image +# arg: +# Shall be used for images allowing overriding. For example use a local image when test is started to use released images +# Shall be used for images that does not allow overriding +# Both var may contain: 'remote', 'remote-remove' or 'local' +__PA_imagepull() { + __check_and_pull_image $1 "$POLICY_AGENT_DISPLAY_NAME" $POLICY_AGENT_APP_NAME POLICY_AGENT_IMAGE +} + +# Build image (only for simulator or interfaces stubs owned by the test environment) +# arg: (selects staging, snapshot, release etc) +# is present only for images with staging, snapshot,release tags +__PA_imagebuild() { + echo -e $RED" Image for app PA shall never be built"$ERED +} + +# Generate a string for each included image using the app display name and a docker images format string +# If a custom image repo is used then also the source image from the local repo is listed +# arg: +__PA_image_data() { + echo -e "$POLICY_AGENT_DISPLAY_NAME\t$(docker images --format $1 $POLICY_AGENT_IMAGE)" >> $2 + if [ ! -z "$POLICY_AGENT_IMAGE_SOURCE" ]; then + echo -e "-- source image --\t$(docker images --format $1 $POLICY_AGENT_IMAGE_SOURCE)" >> $2 + fi +} + +# Scale kubernetes resources to zero +# All resources shall be ordered to be scaled to 0, if relevant. If not relevant to scale, then do no action. +# This function is called for apps fully managed by the test script +__PA_kube_scale_zero() { + __kube_scale_all_resources $KUBE_NONRTRIC_NAMESPACE autotest PA +} + +# Scale kubernetes resources to zero and wait until this has been accomplished, if relevant. If not relevant to scale, then do no action. +# This function is called for prestarted apps not managed by the test script. +__PA_kube_scale_zero_and_wait() { + __kube_scale_and_wait_all_resources $KUBE_NONRTRIC_NAMESPACE app nonrtric-policymanagementservice +} + +# Delete all kube resouces for the app +# This function is called for apps managed by the test script. +__PA_kube_delete_all() { + __kube_delete_all_resources $KUBE_NONRTRIC_NAMESPACE autotest PA +} + +# Store docker logs +# This function is called for apps managed by the test script. +# args: +__PA_store_docker_logs() { + docker logs $POLICY_AGENT_APP_NAME > $1$2_policy-agent.log 2>&1 +} + +####################################################### ## Access to Policy agent # Host name may be changed if app started by kube @@ -228,6 +290,7 @@ start_policy_agent() { export POLICY_AGENT_CONFIG_MOUNT_PATH export POLICY_AGENT_CONFIG_FILE export POLICY_AGENT_PKG_NAME + export POLICY_AGENT_DISPLAY_NAME if [ $1 == "PROXY" ]; then AGENT_HTTP_PROXY_CONFIG_PORT=$HTTP_PROXY_CONFIG_PORT #Set if proxy is started @@ -249,7 +312,7 @@ start_policy_agent() { envsubst < $2 > $dest_file - __start_container $POLICY_AGENT_COMPOSE_DIR NODOCKERARGS 1 $POLICY_AGENT_APP_NAME + __start_container $POLICY_AGENT_COMPOSE_DIR "" NODOCKERARGS 1 $POLICY_AGENT_APP_NAME __check_service_start $POLICY_AGENT_APP_NAME $PA_PATH$POLICY_AGENT_ALIVE_URL fi @@ -264,6 +327,7 @@ agent_load_config() { cp $1 $data_json output_yaml=$PWD/tmp/pa_cfd.yaml __kube_create_configmap $POLICY_AGENT_APP_NAME"-data" $KUBE_NONRTRIC_NAMESPACE autotest PA $data_json $output_yaml + echo "" } @@ -309,6 +373,13 @@ use_agent_retries() { return } +# Check the agent logs for WARNINGs and ERRORs +# args: - +# (Function for test scripts) +check_policy_agent_logs() { + __check_container_logs "Policy Agent" $POLICY_AGENT_APP_NAME $POLICY_AGENT_LOGPATH WARN ERR +} + ######################################################### #### Test case functions A1 Policy management service ######################################################### @@ -859,6 +930,13 @@ api_put_policy_parallel() { urlbase=${PA_ADAPTER}${query} + httpproxy="NOPROXY" + if [ $RUNMODE == "KUBE" ]; then + if [ ! -z "$KUBE_PROXY_PATH" ]; then + httpproxy=$KUBE_PROXY_PATH + fi + fi + for ((i=1; i<=$pids; i++)) do uuid=$UUID @@ -867,9 +945,9 @@ api_put_policy_parallel() { fi echo "" > "./tmp/.pid${i}.res.txt" if [ "$PMS_VERSION" == "V2" ]; then - echo $resp_code $urlbase $ric_base $num_rics $uuid $start_id $serv $type $transient $noti $template $count $pids $i > "./tmp/.pid${i}.txt" + echo $resp_code $urlbase $ric_base $num_rics $uuid $start_id $serv $type $transient $noti $template $count $pids $i $httpproxy > "./tmp/.pid${i}.txt" else - echo $resp_code $urlbase $ric_base $num_rics $uuid $start_id $template $count $pids $i > "./tmp/.pid${i}.txt" + echo $resp_code $urlbase $ric_base $num_rics $uuid $start_id $template $count $pids $i $httpproxy > "./tmp/.pid${i}.txt" fi echo $i done | xargs -n 1 -I{} -P $pids bash -c '{ @@ -1047,6 +1125,13 @@ api_delete_policy_parallel() { urlbase=${PA_ADAPTER}${query} + httpproxy="NOPROXY" + if [ $RUNMODE == "KUBE" ]; then + if [ ! -z "$KUBE_PROXY_PATH" ]; then + httpproxy=$KUBE_PROXY_PATH + fi + fi + for ((i=1; i<=$pids; i++)) do uuid=$UUID @@ -1054,7 +1139,7 @@ api_delete_policy_parallel() { uuid="NOUUID" fi echo "" > "./tmp/.pid${i}.del.res.txt" - echo $resp_code $urlbase $num_rics $uuid $start_id $count $pids $i > "./tmp/.pid${i}.del.txt" + echo $resp_code $urlbase $num_rics $uuid $start_id $count $pids $i $httpproxy> "./tmp/.pid${i}.del.txt" echo $i done | xargs -n 1 -I{} -P $pids bash -c '{ arg=$(echo {})