X-Git-Url: https://gerrit.o-ran-sc.org/r/gitweb?a=blobdiff_plain;f=test%2Fcommon%2Fcontroller_api_functions.sh;h=9e6017518c6541479f6a3ba14bd252da3c6745f7;hb=e0b665e3ff544bb78411bdc7f6b3ba2818fdeed4;hp=378a6d45b8ecc7a47cd6f9dc2fe98d2724e81ca5;hpb=575869c5ed7533f22b0c7db05fdbbbb8e00e09fc;p=nonrtric.git diff --git a/test/common/controller_api_functions.sh b/test/common/controller_api_functions.sh index 378a6d45..9e601751 100644 --- a/test/common/controller_api_functions.sh +++ b/test/common/controller_api_functions.sh @@ -17,7 +17,178 @@ # ============LICENSE_END================================================= # -# This is a script that contains specific test functions for A1 Controller API +# This is a script that contains container/service management functions and test functions for A1 Controller API + +SDNC_HTTPX="http" +SDNC_HOST_NAME=$LOCALHOST_NAME +SDNC_PATH=$SDNC_HTTPX"://"$SDNC_HOST_NAME":"$SDNC_EXTERNAL_PORT +SDNC_API_PATH=$SDNC_HTTPX"://"$SDNC_USER":"$SDNC_PWD"@"$SDNC_HOST_NAME":"$SDNC_EXTERNAL_PORT$SDNC_API_URL +#Docker/Kube internal path +if [ $RUNMODE == "KUBE" ]; then + SDNC_SERVICE_PATH=$SDNC_HTTPX"://"$SDNC_APP_NAME":"$SDNC_EXTERNAL_PORT + #presume correct + SDNC_SERVICE_PATH=$SDNC_HTTPX"://"$SDNC_APP_NAME"."$KUBE_NONRTRIC_NAMESPACE":"$SDNC_EXTERNAL_PORT + #test + #SDNC_SERVICE_PATH=$SDNC_HTTPX"://"$SDNC_APP_NAME"."$KUBE_NONRTRIC_NAMESPACE":"$SDNC_EXTERNAL_PORT +else + SDNC_SERVICE_PATH=$SDNC_HTTPX"://"$SDNC_APP_NAME":"$SDNC_INTERNAL_PORT +fi + +use_sdnc_http() { + echo -e $BOLD"SDNC NB protocol setting"$EBOLD + echo -e " Using $BOLD http $EBOLD towards SDNC" + SDNC_HTTPX="http" + SDNC_PATH=$SDNC_HTTPX"://"$SDNC_HOST_NAME":"$SDNC_EXTERNAL_PORT + SDNC_API_PATH=$SDNC_HTTPX"://"$SDNC_USER":"$SDNC_PWD"@"$SDNC_HOST_NAME":"$SDNC_EXTERNAL_PORT$SDNC_API_URL + if [ $RUNMODE == "KUBE" ]; then + #presume correct + SDNC_SERVICE_PATH=$SDNC_HTTPX"://"$SDNC_APP_NAME"."$KUBE_NONRTRIC_NAMESPACE":"$SDNC_EXTERNAL_PORT + #test + #SDNC_SERVICE_PATH=$SDNC_HTTPX"://"$SDNC_APP_NAME":"$SDNC_EXTERNAL_PORT + else + SDNC_SERVICE_PATH=$SDNC_HTTPX"://"$SDNC_APP_NAME":"$SDNC_INTERNAL_PORT + fi + echo "" +} + +use_sdnc_https() { + echo -e $BOLD"SDNC NB protocol setting"$EBOLD + echo -e " Using $BOLD https $EBOLD towards SDNC" + SDNC_HTTPX="https" + SDNC_PATH=$SDNC_HTTPX"://"$SDNC_HOST_NAME":"$SDNC_EXTERNAL_SECURE_PORT + SDNC_API_PATH=$SDNC_HTTPX"://"$SDNC_USER":"$SDNC_PWD"@"$SDNC_HOST_NAME":"$SDNC_EXTERNAL_SECURE_PORT$SDNC_API_URL + if [ $RUNMODE == "KUBE" ]; then + #presume correct + SDNC_SERVICE_PATH=$SDNC_HTTPX"://"$SDNC_APP_NAME"."$KUBE_NONRTRIC_NAMESPACE":"$SDNC_EXTERNAL_SECURE_PORT + #test + #SDNC_SERVICE_PATH=$SDNC_HTTPX"://"$SDNC_APP_NAME":"$SDNC_EXTERNAL_SECURE_PORT + else + SDNC_SERVICE_PATH=$SDNC_HTTPX"://"$SDNC_APP_NAME":"$SDNC_INTERNAL_SECURE_PORT + fi + echo "" +} + +################## +### SDNC functions +################## + +# Start the SDNC A1 Controller +# args: - +# (Function for test scripts) +start_sdnc() { + + echo -e $BOLD"Starting $SDNC_DISPLAY_NAME"$EBOLD + + if [ $RUNMODE == "KUBE" ]; then + + # Check if app shall be fully managed by the test script + __check_included_image "SDNC" + retcode_i=$? + + # Check if app shall only be used by the testscipt + __check_prestarted_image "SDNC" + retcode_p=$? + + if [ $retcode_i -ne 0 ] && [ $retcode_p -ne 0 ]; then + echo -e $RED"The $SDNC_APP_NAME app is not included as managed nor prestarted in this test script"$ERED + echo -e $RED"The $SDNC_APP_NAME will not be started"$ERED + exit + fi + if [ $retcode_i -eq 0 ] && [ $retcode_p -eq 0 ]; then + echo -e $RED"The $SDNC_APP_NAME app is included both as managed and prestarted in this test script"$ERED + echo -e $RED"The $SDNC_APP_NAME will not be started"$ERED + exit + fi + + + if [ $retcode_p -eq 0 ]; then + echo -e " Using existing $SDNC_APP_NAME deployment and service" + echo " Setting SDNC replicas=1" + __kube_scale deployment $SDNC_APP_NAME $KUBE_NONRTRIC_NAMESPACE 1 + fi + + # Check if app shall be fully managed by the test script + if [ $retcode_i -eq 0 ]; then + + echo -e " Creating $SDNC_APP_NAME app and expose service" + + #Check if nonrtric namespace exists, if not create it + __kube_create_namespace $KUBE_NONRTRIC_NAMESPACE + + export KUBE_NONRTRIC_NAMESPACE + export SDNC_APP_NAME + export SDNC_A1_CONTROLLER_IMAGE + export SDNC_INTERNAL_PORT + export SDNC_EXTERNAL_PORT + export SDNC_INTERNAL_SECURE_PORT + export SDNC_EXTERNAL_SECURE_PORT + export SDNC_A1_TRUSTSTORE_PASSWORD + export SDNC_DB_APP_NAME + export SDNC_DB_IMAGE + + # Create service + input_yaml=$SIM_GROUP"/"$SDNC_COMPOSE_DIR"/"svc.yaml + output_yaml=$PWD/tmp/sdnc_svc.yaml + __kube_create_instance service $SDNC_APP_NAME $input_yaml $output_yaml + + # Create app + input_yaml=$SIM_GROUP"/"$SDNC_COMPOSE_DIR"/"app.yaml + output_yaml=$PWD/tmp/sdnc_app.yaml + __kube_create_instance app $SDNC_APP_NAME $input_yaml $output_yaml + + fi + + echo " Retrieving host and ports for service..." + SDNC_HOST_NAME=$(__kube_get_service_host $SDNC_APP_NAME $KUBE_NONRTRIC_NAMESPACE) + SDNC_EXTERNAL_PORT=$(__kube_get_service_port $SDNC_APP_NAME $KUBE_NONRTRIC_NAMESPACE "http") + SDNC_EXTERNAL_SECURE_PORT=$(__kube_get_service_port $SDNC_APP_NAME $KUBE_NONRTRIC_NAMESPACE "https") + + echo " Host IP, http port, https port: $SDNC_HOST_NAME $SDNC_EXTERNAL_PORT $SDNC_EXTERNAL_SECURE_PORT" + + if [ $SDNC_HTTPX == "http" ]; then + SDNC_PATH=$SDNC_HTTPX"://"$SDNC_HOST_NAME":"$SDNC_EXTERNAL_PORT + SDNC_API_PATH=$SDNC_HTTPX"://"$SDNC_USER":"$SDNC_PWD"@"$SDNC_HOST_NAME":"$SDNC_EXTERNAL_PORT$SDNC_API_URL + #presume correct + SDNC_SERVICE_PATH=$SDNC_HTTPX"://"$SDNC_APP_NAME"."$KUBE_NONRTRIC_NAMESPACE":"$SDNC_EXTERNAL_PORT + #test + #SDNC_SERVICE_PATH=$SDNC_HTTPX"://"$SDNC_APP_NAME":"$SDNC_EXTERNAL_PORT + else + SDNC_PATH=$SDNC_HTTPX"://"$SDNC_HOST_NAME":"$SDNC_EXTERNAL_SECURE_PORT + SDNC_API_PATH=$SDNC_HTTPX"://"$SDNC_USER":"$SDNC_PWD"@"$SDNC_HOST_NAME":"$SDNC_EXTERNAL_SECURE_PORT$SDNC_API_URL + #presume correct + SDNC_SERVICE_PATH=$SDNC_HTTPX"://"$SDNC_APP_NAME"."$KUBE_NONRTRIC_NAMESPACE":"$SDNC_EXTERNAL_SECURE_PORT + #test + #SDNC_SERVICE_PATH=$SDNC_HTTPX"://"$SDNC_APP_NAME":"$SDNC_EXTERNAL_SECURE_PORT + fi + + __check_service_start $SDNC_APP_NAME $SDNC_PATH$SDNC_ALIVE_URL + else + + __check_included_image 'SDNC' + if [ $? -eq 1 ]; then + echo -e $RED"The SDNC A1 Controller app is not included in this test script"$ERED + echo -e $RED"The Policy Agent will not be started"$ERED + exit + fi + + export SDNC_DB_APP_NAME + export SDNC_APP_NAME + export SDNC_INTERNAL_PORT + export SDNC_EXTERNAL_PORT + export SDNC_INTERNAL_SECURE_PORT + export SDNC_EXTERNAL_SECURE_PORT + export SDNC_A1_TRUSTSTORE_PASSWORD + export DOCKER_SIM_NWNAME + + __start_container $SDNC_COMPOSE_DIR NODOCKERARGS 1 $SDNC_APP_NAME + + __check_service_start $SDNC_APP_NAME $SDNC_PATH$SDNC_ALIVE_URL + fi + echo "" + return 0 +} + + # Generic function to query the RICs via the A1-controller API. # args: [] @@ -41,9 +212,10 @@ __do_curl_to_controller() { body=$(echo "$3" | sed 's/"/\\"/g') json='{"input":{"near-rt-ric-url":"'$2'","body":"'"$body"'"}}' fi - echo "$json" > .sdnc.payload.json - echo " FILE: $json" >> $HTTPLOG - curlString="curl -skw %{http_code} -X POST $SDNC_HTTPX://$SDNC_USER:$SDNC_PWD@localhost:$SDNC_LOCAL_PORT$SDNC_API_URL$1 -H accept:application/json -H Content-Type:application/json --data-binary @.sdnc.payload.json" + payload="./tmp/.sdnc.payload.json" + echo "$json" > $payload + echo " FILE ($payload) : $json" >> $HTTPLOG + curlString="curl -skw %{http_code} -X POST $SDNC_API_PATH$1 -H accept:application/json -H Content-Type:application/json --data-binary @$payload" echo " CMD: "$curlString >> $HTTPLOG res=$($curlString) retcode=$? @@ -62,8 +234,9 @@ __do_curl_to_controller() { fi body=${res:0:${#res}-3} echo " JSON: "$body >> $HTTPLOG - echo "$body" > .sdnc-reply.json - res=$(python3 ../common/extract_sdnc_reply.py .sdnc-reply.json) + reply="./tmp/.sdnc-reply.json" + echo "$body" > $reply + res=$(python3 ../common/extract_sdnc_reply.py $reply) echo " EXTRACED BODY+CODE: "$res >> $HTTPLOG echo "$res" return 0 @@ -73,16 +246,18 @@ __do_curl_to_controller() { # arg: (OSC [ []* ]) | ( STD [ []* ] ) # (Function for test scripts) controller_api_get_A1_policy_ids() { - echo -e $BOLD"TEST(${BASH_LINENO[0]}): ${FUNCNAME[0]}" $@ $EBOLD - echo "TEST(${BASH_LINENO[0]}): ${FUNCNAME[0]}" $@ >> $HTTPLOG - ((RES_TEST++)) + __log_test_start $@ + ric_id=$3 + if [ $RUNMODE == "KUBE" ]; then + ric_id=$(get_kube_sim_host $3) + fi paramError=1 if [ $# -gt 3 ] && [ $2 == "OSC" ]; then - url="$RIC_SIM_HTTPX://$3:$RIC_SIM_PORT/a1-p/policytypes/$4/policies" + url="$RIC_SIM_HTTPX://$ric_id:$RIC_SIM_PORT/a1-p/policytypes/$4/policies" paramError=0 elif [ $# -gt 2 ] && [ $2 == "STD" ]; then - url="$RIC_SIM_HTTPX://$3:$RIC_SIM_PORT/A1-P/v1/policies" + url="$RIC_SIM_HTTPX://$ric_id:$RIC_SIM_PORT/A1-P/v1/policies" paramError=0 fi @@ -95,17 +270,13 @@ controller_api_get_A1_policy_ids() { retcode=$? status=${res:${#res}-3} - if [ $? -ne 0 ]; then - echo -e $RED" FAIL. Exepected status "$1", got "$status "(likely remote server error)"$ERED - ((RES_FAIL++)) - __check_stop_at_error + if [ $retcode -ne 0 ]; then + __log_test_fail_status_code $1 $retcode "(likely remote server error)" return 1 fi if [ $status -ne $1 ]; then - echo -e $RED" FAIL. Exepected status "$1", got "$status $ERED - ((RES_FAIL++)) - __check_stop_at_error + __log_test_fail_status_code $1 $status return 1 fi body=${res:0:${#res}-3} @@ -128,14 +299,11 @@ controller_api_get_A1_policy_ids() { res=$(python3 ../common/compare_json.py "$targetJson" "$body") if [ $res -ne 0 ]; then - echo -e $RED" FAIL, returned body not correct"$ERED - ((RES_FAIL++)) - __check_stop_at_error + __log_test_fail_body return 1 fi - ((RES_PASS++)) - echo -e $GREEN" PASS"$EGREEN + __log_test_pass return 0 } @@ -144,13 +312,15 @@ controller_api_get_A1_policy_ids() { # arg: OSC [] # (Function for test scripts) controller_api_get_A1_policy_type() { - echo -e $BOLD"TEST(${BASH_LINENO[0]}): ${FUNCNAME[0]}" $@ $EBOLD - echo "TEST(${BASH_LINENO[0]}): ${FUNCNAME[0]}" $@ >> $HTTPLOG - ((RES_TEST++)) + __log_test_start $@ + ric_id=$3 + if [ $RUNMODE == "KUBE" ]; then + ric_id=$(get_kube_sim_host $3) + fi paramError=1 if [ $# -gt 3 ] && [ $2 == "OSC" ]; then - url="$RIC_SIM_HTTPX://$3:$RIC_SIM_PORT/a1-p/policytypes/$4" + url="$RIC_SIM_HTTPX://$ric_id:$RIC_SIM_PORT/a1-p/policytypes/$4" paramError=0 fi @@ -163,17 +333,13 @@ controller_api_get_A1_policy_type() { retcode=$? status=${res:${#res}-3} - if [ $? -ne 0 ]; then - echo -e $RED" FAIL. Exepected status "$1", got "$status "(likely remote server error)"$ERED - ((RES_FAIL++)) - __check_stop_at_error + if [ $retcode -ne 0 ]; then + __log_test_fail_status_code $1 $retcode "(likely remote server error)" return 1 fi if [ $status -ne $1 ]; then - echo -e $RED" FAIL. Exepected status "$1", got "$status $ERED - ((RES_FAIL++)) - __check_stop_at_error + __log_test_fail_status_code $1 $status return 1 fi body=${res:0:${#res}-3} @@ -187,15 +353,12 @@ controller_api_get_A1_policy_type() { res=$(python3 ../common/compare_json.py "$targetJson" "$body") if [ $res -ne 0 ]; then - echo -e $RED" FAIL, returned body not correct"$ERED - ((RES_FAIL++)) - __check_stop_at_error + __log_test_fail_body return 1 fi fi - ((RES_PASS++)) - echo -e $GREEN" PASS"$EGREEN + __log_test_pass return 0 } @@ -203,16 +366,18 @@ controller_api_get_A1_policy_type() { # arg: (STD ) | (OSC ) # (Function for test scripts) controller_api_delete_A1_policy() { - echo -e $BOLD"TEST(${BASH_LINENO[0]}): ${FUNCNAME[0]}" $@ $EBOLD - echo "TEST(${BASH_LINENO[0]}): ${FUNCNAME[0]}" $@ >> $HTTPLOG - ((RES_TEST++)) + __log_test_start $@ + ric_id=$3 + if [ $RUNMODE == "KUBE" ]; then + ric_id=$(get_kube_sim_host $3) + fi paramError=1 if [ $# -eq 5 ] && [ $2 == "OSC" ]; then - url="$RIC_SIM_HTTPX://$3:$RIC_SIM_PORT/a1-p/policytypes/$4/policies/$UUID$5" + url="$RIC_SIM_HTTPX://$ric_id:$RIC_SIM_PORT/a1-p/policytypes/$4/policies/$UUID$5" paramError=0 elif [ $# -eq 4 ] && [ $2 == "STD" ]; then - url="$RIC_SIM_HTTPX://$3:$RIC_SIM_PORT/A1-P/v1/policies/$UUID$4" + url="$RIC_SIM_HTTPX://$ric_id:$RIC_SIM_PORT/A1-P/v1/policies/$UUID$4" paramError=0 fi @@ -225,22 +390,17 @@ controller_api_delete_A1_policy() { retcode=$? status=${res:${#res}-3} - if [ $? -ne 0 ]; then - echo -e $RED" FAIL. Exepected status "$1", got "$status "(likely remote server error)"$ERED - ((RES_FAIL++)) - __check_stop_at_error + if [ $retcode -ne 0 ]; then + __log_test_fail_status_code $1 $retcode "(likely remote server error)" return 1 fi if [ $status -ne $1 ]; then - echo -e $RED" FAIL. Exepected status "$1", got "$status $ERED - ((RES_FAIL++)) - __check_stop_at_error + __log_test_fail_status_code $1 $status return 1 fi - ((RES_PASS++)) - echo -e $GREEN" PASS"$EGREEN + __log_test_pass return 0 } @@ -248,18 +408,20 @@ controller_api_delete_A1_policy() { # arg: (STD ) | (OSC ) # (Function for test scripts) controller_api_put_A1_policy() { - echo -e $BOLD"TEST(${BASH_LINENO[0]}): ${FUNCNAME[0]}" $@ $EBOLD - echo "TEST(${BASH_LINENO[0]}): ${FUNCNAME[0]}" $@ >> $HTTPLOG - ((RES_TEST++)) + __log_test_start $@ + ric_id=$3 + if [ $RUNMODE == "KUBE" ]; then + ric_id=$(get_kube_sim_host $3) + fi paramError=1 if [ $# -eq 6 ] && [ $2 == "OSC" ]; then - url="$RIC_SIM_HTTPX://$3:$RIC_SIM_PORT/a1-p/policytypes/$4/policies/$UUID$5" + url="$RIC_SIM_HTTPX://$ric_id:$RIC_SIM_PORT/a1-p/policytypes/$4/policies/$UUID$5" body=$(sed 's/XXX/'${5}'/g' $6) paramError=0 elif [ $# -eq 5 ] && [ $2 == "STD" ]; then - url="$RIC_SIM_HTTPX://$3:$RIC_SIM_PORT/A1-P/v1/policies/$UUID$4" + url="$RIC_SIM_HTTPX://$ric_id:$RIC_SIM_PORT/A1-P/v1/policies/$UUID$4" body=$(sed 's/XXX/'${4}'/g' $5) paramError=0 fi @@ -273,22 +435,17 @@ controller_api_put_A1_policy() { retcode=$? status=${res:${#res}-3} - if [ $? -ne 0 ]; then - echo -e $RED" FAIL. Exepected status "$1", got "$status "(likely remote server error)"$ERED - ((RES_FAIL++)) - __check_stop_at_error + if [ $retcode -ne 0 ]; then + __log_test_fail_status_code $1 $retcode "(likely remote server error)" return 1 fi if [ $status -ne $1 ]; then - echo -e $RED" FAIL. Exepected status "$1", got "$status $ERED - ((RES_FAIL++)) - __check_stop_at_error + __log_test_fail_status_code $1 $status return 1 fi - ((RES_PASS++)) - echo -e $GREEN" PASS"$EGREEN + __log_test_pass return 0 } @@ -297,14 +454,16 @@ controller_api_put_A1_policy() { # arg: (STD []) | (OSC ) # (Function for test scripts) controller_api_get_A1_policy_status() { - echo -e $BOLD"TEST(${BASH_LINENO[0]}): ${FUNCNAME[0]}" $@ $EBOLD - echo "TEST(${BASH_LINENO[0]}): ${FUNCNAME[0]}" $@ >> $HTTPLOG - ((RES_TEST++)) + __log_test_start $@ + ric_id=$3 + if [ $RUNMODE == "KUBE" ]; then + ric_id=$(get_kube_sim_host $3) + fi targetJson="" paramError=1 if [ $# -ge 5 ] && [ $2 == "OSC" ]; then - url="$RIC_SIM_HTTPX://$3:$RIC_SIM_PORT/a1-p/policytypes/$4/policies/$UUID$5/status" + url="$RIC_SIM_HTTPX://$ric_id:$RIC_SIM_PORT/a1-p/policytypes/$4/policies/$UUID$5/status" if [ $# -gt 5 ]; then targetJson="{\"instance_status\":\"$6\"" targetJson=$targetJson",\"has_been_deleted\":\"$7\"" @@ -312,7 +471,7 @@ controller_api_get_A1_policy_status() { fi paramError=0 elif [ $# -ge 4 ] && [ $2 == "STD" ]; then - url="$RIC_SIM_HTTPX://$3:$RIC_SIM_PORT/A1-P/v1/policies/$UUID$4/status" + url="$RIC_SIM_HTTPX://$ric_id:$RIC_SIM_PORT/A1-P/v1/policies/$UUID$4/status" if [ $# -gt 4 ]; then targetJson="{\"enforceStatus\":\"$5\"" if [ $# -eq 6 ]; then @@ -332,17 +491,13 @@ controller_api_get_A1_policy_status() { retcode=$? status=${res:${#res}-3} - if [ $? -ne 0 ]; then - echo -e $RED" FAIL. Exepected status "$1", got "$status "(likely remote server error)"$ERED - ((RES_FAIL++)) - __check_stop_at_error + if [ $retcode -ne 0 ]; then + __log_test_fail_status_code $1 $retcode "(likely remote server error)" return 1 fi if [ $status -ne $1 ]; then - echo -e $RED" FAIL. Exepected status "$1", got "$status $ERED - ((RES_FAIL++)) - __check_stop_at_error + __log_test_fail_status_code $1 $status return 1 fi @@ -353,14 +508,11 @@ controller_api_get_A1_policy_status() { res=$(python3 ../common/compare_json.py "$targetJson" "$body") if [ $res -ne 0 ]; then - echo -e $RED" FAIL, returned body not correct"$ERED - ((RES_FAIL++)) - __check_stop_at_error + __log_test_fail_body return 1 fi fi - ((RES_PASS++)) - echo -e $GREEN" PASS"$EGREEN + __log_test_pass return 0 } \ No newline at end of file