1 # Copyright (c) 2019, CMCC Technologies. Co., Ltd.
3 # Licensed under the Apache License, Version 2.0 (the "License");
4 # you may not use this file except in compliance with the License.
5 # You may obtain a copy of the License at
7 # http://www.apache.org/licenses/LICENSE-2.0
9 # Unless required by applicable law or agreed to in writing, software
10 # distributed under the License is distributed on an "AS IS" BASIS,
11 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 # See the License for the specific language governing permissions and
13 # limitations under the License.
16 from django.test import TestCase, Client
18 from rest_framework import status
20 from catalog.packages.biz.sdc_service_package import ServicePackage
21 from catalog.packages.const import PKG_STATUS
22 from catalog.pub.database.models import ServicePackageModel, VnfPackageModel, PnfPackageModel
23 from catalog.pub.exceptions import PackageNotFoundException, PackageHasExistsException, CatalogException
24 from catalog.pub.msapi import sdc
25 from catalog.pub.utils import toscaparser
27 CATALOG_BASE_URL = "/api/catalog/v1"
30 class TestServicePackage(TestCase):
31 """ Test case for Service Package operations"""
34 self.client = Client()
35 ServicePackageModel.objects.filter().delete()
38 "sdwanvpnresource_list": [
40 "sdwanvpn_topology": "",
45 "sdwansitelan_list": [
50 "description": "The device name in the site"
55 "sdwansiteresource_list": [
57 "sdwansite_controlPoint": "",
60 "description": "The control point of the site,only for sd-wan-edge"
68 "description": "The system ip of the device"
81 "request_reclassification": False,
84 "management_address": "111111",
92 "sdwansiteresource": [
95 "sdwanvpnresource": []
97 "basepath": "c:\\users\\cmcc\\appdata\\local\\temp\\tmpn79jwc\\Definitions",
100 "vnf_id": "sdwansiteresource",
103 "sdwandevice_type": "",
104 "sdwandevice_class": "PNF",
105 "multi_stage_design": "False",
106 "min_instances": "1",
107 "sdwansite_controlPoint": "",
108 "id": "cd557883-ac4b-462d-aa01-421b5fa606b1",
109 "sdwansite_longitude": "",
110 "sdwansite_latitude": "",
111 "sdwansite_postcode": "",
112 "sdwansite_type": "",
114 "ecomp_generated_naming": True
116 "sdwansite_emails": "",
117 "sdwansite_role": "",
119 "sdwansite_address": "",
120 "sdwansite_description": "",
121 "availability_zone_max_count": "1",
127 "category": "Configuration",
128 "subcategory": "Configuration",
129 "UUID": "cd557883-ac4b-462d-aa01-421b5fa606b1",
130 "invariantUUID": "c83b621e-e267-4910-a75a-a2a5957296e4",
131 "name": "sdwansiteresource",
132 "customizationUUID": "673dd6b3-3a06-4ef0-8ad0-8c26224b08f7",
133 "resourceVendorRelease": "1.0",
135 "resourceVendor": "onap",
136 "resourceVendorModelNumber": "",
138 "description": "sdwansiteresource"
144 "type": "org.openecomp.service.EnhanceService",
146 "sdwanvpnresource.sdwanvpn.dependency": [
148 "sdwanvpn.dependency"
150 "sdwansiteresource.sdwansitewan.dependency": [
152 "sdwansitewan.dependency"
154 "sdwansiteresource.sdwandevice.dependency": [
156 "sdwandevice.dependency"
158 "sdwanvpnresource.sdwansitelan.dependency": [
160 "sdwansitelan.dependency"
162 "sdwanvpnresource.sdwanvpn.device": [
166 "sdwansiteresource.sdwansite.device": [
170 "sdwansiteresource.sdwansite.dependency": [
172 "sdwansite.dependency"
174 "sdwanvpnresource.sdwansitelan.device": [
176 "sdwansitelan.device"
178 "sdwansiteresource.sdwansitewan.device": [
180 "sdwansitewan.device"
182 "sdwansiteresource.sdwandevice.device": [
188 "descriptor_id": "49ee73f4-1e31-4054-b871-eb9b1c29999b",
190 "invariant_id": "5de07996-7ff0-4ec1-b93c-e3a00bb3f207",
191 "name": "Enhance_Service",
195 "sdwansiteresource.sdwandevice.feature": [
197 "sdwandevice.feature"
199 "sdwanvpnresource.sdwanvpn.feature": [
203 "sdwanvpnresource.sdwanvpn.link": [
207 "sdwansiteresource.sdwansite.feature": [
211 "sdwansiteresource.sdwansitewan.feature": [
213 "sdwansitewan.feature"
215 "sdwanvpnresource.sdwansitelan.feature": [
217 "sdwansitelan.feature"
221 "category": "E2E Service",
223 "description": "Enhance_Service",
224 "instantiationType": "A-la-carte",
226 "environmentContext": "General_Revenue-Bearing",
227 "serviceEcompNaming": True,
228 "UUID": "49ee73f4-1e31-4054-b871-eb9b1c29999b",
229 "ecompGeneratedNaming": True,
231 "invariantUUID": "5de07996-7ff0-4ec1-b93c-e3a00bb3f207",
233 "name": "Enhance_Service"
237 "category": "E2E Service",
239 "description": "Enhance_Service",
240 "instantiationType": "A-la-carte",
242 "environmentContext": "General_Revenue-Bearing",
243 "serviceEcompNaming": True,
244 "UUID": "49ee73f4-1e31-4054-b871-eb9b1c29999b",
245 "ecompGeneratedNaming": True,
247 "invariantUUID": "5de07996-7ff0-4ec1-b93c-e3a00bb3f207",
249 "name": "Enhance_Service"
254 "invariantUUID": "63eaec39-ffbe-411c-a838-448f2c73f7eb",
255 "name": "underlayvpn",
257 "toscaModelURL": "/sdc/v1/catalog/resources/c94490a0-f7ef-48be-b3f8-8d8662a37236/toscaModel",
259 "subCategory": "VolteVNF",
260 "resourceType": "VF",
261 "lifecycleState": "CERTIFIED",
262 "distributionStatus": "DISTRIBUTION_APPROVED",
263 "lastUpdaterUserId": "jh0003",
266 "resourceInstanceName": "contrailV2VLANSubInterface 0",
267 "resourceName": "contrailV2VLANSubInterface",
268 "resourceInvariantUUID": "4d31b775-af63-491d-89f1-254e218e7140",
269 "resourceVersion": "1.0",
270 "resoucreType": "CP",
271 "resourceUUID": "cd557883-ac4b-462d-aa01-421b5fa606b1"
274 "resourceInstanceName": "Network 0",
275 "resourceName": "Network",
276 "resourceInvariantUUID": "f90f567e-7d7d-4216-af38-6bca0637c59f",
277 "resourceVersion": "1.0",
278 "resoucreType": "VL",
279 "resourceUUID": "m6000_s"
287 ###############################################################
289 def test_service_pkg_distribute_when_pkg_exists(self):
290 ServicePackageModel(servicePackageId="1", servicedId="2").save()
293 ServicePackage().on_distribute(csar_id)
294 except PackageHasExistsException as e:
295 self.assertEqual("Service CSAR(1) already exists.", e.args[0])
297 @mock.patch.object(sdc, 'get_asset')
298 def test_service_pkg_distribute_when_fail_get_artifacts(self, mock_get_asset):
299 mock_get_asset.side_effect = CatalogException("Failed to query artifact(services,1) from sdc.")
302 ServicePackage().on_distribute(csar_id)
303 except Exception as e:
304 self.assertTrue(isinstance(e, CatalogException))
305 self.assertEqual("Failed to query artifact(services,1) from sdc.", e.args[0])
307 @mock.patch.object(sdc, 'get_asset')
308 def test_service_pkg_distribute_when_resource_not_distribute(self, mock_get_asset):
309 mock_get_asset.return_value = self.asset_data
312 ServicePackage().on_distribute(csar_id)
313 except Exception as e:
314 self.assertTrue(isinstance(e, CatalogException))
315 self.assertEqual("Resource (cd557883-ac4b-462d-aa01-421b5fa606b1) is not distributed.", e.args[0])
317 @mock.patch.object(sdc, 'get_asset')
318 @mock.patch.object(sdc, 'download_artifacts')
319 def test_service_pkg_distribute_when_fail_download_artifacts(self, mock_get_asset, mock_download_artifacts):
320 mock_get_asset.return_value = self.asset_data
321 mock_download_artifacts.side_effect = CatalogException("Failed to download 1 from sdc.")
323 VnfPackageModel(vnfPackageId="cd557883-ac4b-462d-aa01-421b5fa606b1",
324 vnfdId="cd557883-ac4b-462d-aa01-421b5fa606b1").save()
325 PnfPackageModel(pnfPackageId="m6000_s", pnfdId="m6000_s").save()
328 ServicePackage().on_distribute(csar_id)
329 except Exception as e:
330 self.assertTrue(isinstance(e, CatalogException))
331 self.assertEqual("Failed to download 1 from sdc.", e.args[0])
333 @mock.patch.object(sdc, 'get_asset')
334 @mock.patch.object(sdc, 'download_artifacts')
335 @mock.patch.object(toscaparser, 'parse_sd')
336 def test_service_pkg_distribute(self, mock_parse_sd, mock_download_artifacts, mock_get_asset):
337 mock_parse_sd.return_value = json.JSONEncoder().encode(self.sd_data)
338 mock_download_artifacts.return_value = "/test.csar"
339 mock_get_asset.return_value = self.asset_data
340 VnfPackageModel(vnfPackageId="cd557883-ac4b-462d-aa01-421b5fa606b1",
341 vnfdId="cd557883-ac4b-462d-aa01-421b5fa606b1").save()
342 PnfPackageModel(pnfPackageId="m6000_s", pnfdId="m6000_s").save()
343 ServicePackage().on_distribute(csar_id="1")
345 service_package = ServicePackageModel.objects.filter(servicePackageId="1").first()
346 self.assertEqual("5de07996-7ff0-4ec1-b93c-e3a00bb3f207", service_package.invariantId)
347 self.assertEqual("Enhance_Service", service_package.servicedName)
348 self.assertEqual(PKG_STATUS.ONBOARDED, service_package.onboardingState)
349 self.assertEqual(PKG_STATUS.ENABLED, service_package.operationalState)
350 self.assertEqual(PKG_STATUS.NOT_IN_USE, service_package.usageState)
352 def test_api_service_pkg_distribute_when_pkg_exists(self):
353 ServicePackageModel(servicePackageId="1", servicedId="2").save()
354 resp = self.client.post(
355 CATALOG_BASE_URL + "/service_packages", {"csarId": "1"}, format='json')
356 self.assertEqual(resp.status_code, status.HTTP_400_BAD_REQUEST)
357 self.assertEqual("Service CSAR(1) already exists.", resp.data["errorMessage"])
359 ###############################################################
361 def test_service_pkg_get_all(self):
363 servicePackageId="13",
365 servicedDesigner="2",
367 servicePackageUri="13.csar",
368 servicedModel="").save()
370 servicePackageId="14",
372 servicedDesigner="3",
374 servicePackageUri="14.csar",
375 servicedModel="").save()
376 csars = ServicePackage().get_csars()
377 self.assertEqual(2, len(csars))
379 def test_api_service_pkg_get_all(self):
381 servicePackageId="13",
383 servicedDesigner="2",
385 servicePackageUri="13.csar",
386 servicedModel="").save()
388 servicePackageId="14",
390 servicedDesigner="3",
392 servicePackageUri="14.csar",
393 servicedModel="").save()
394 resp = self.client.get(CATALOG_BASE_URL + "/service_packages")
395 self.assertEqual(resp.status_code, status.HTTP_200_OK)
397 ###############################################################
399 def test_service_pkg_get_one(self):
401 servicePackageId="14",
403 servicedDesigner="3",
405 servicePackageUri="14.csar",
406 servicedModel="").save()
407 csar = ServicePackage().get_csar(14)
408 self.assertEqual(14, csar['csarId'])
410 def test_service_pkg_get_one_not_found(self):
412 ServicePackage().get_csar(1000)
413 except PackageNotFoundException as e:
414 self.assertEqual("Service package[1000] not Found.", e.args[0])
416 def test_api_service_pkg_get_one(self):
418 servicePackageId="14",
420 servicedDesigner="3",
422 servicePackageUri="14.csar",
423 servicedModel="").save()
424 resp = self.client.get(CATALOG_BASE_URL + "/service_packages/14")
425 self.assertEqual(resp.status_code, status.HTTP_200_OK)
427 def test_api_service_pkg_get_one_not_found(self):
428 resp = self.client.get(CATALOG_BASE_URL + "/service_packages/22")
429 self.assertEqual(resp.status_code, status.HTTP_404_NOT_FOUND)
431 {"errorMessage": "Service package[22] not Found.", 'error': 404},
434 ###############################################################
436 def test_service_pkg_normal_delete(self):
437 ServicePackageModel(servicePackageId="8", servicedId="2").save()
438 sp = ServicePackageModel.objects.filter(servicePackageId=8)
439 self.assertEqual(1, len(sp))
440 ServicePackage().delete_csar("8")
441 sp = ServicePackageModel.objects.filter(servicePackageId=8)
442 self.assertEqual(0, len(sp))
444 def test_service_pkg_normal_delete_not_found(self):
446 ServicePackage().delete_csar("8000")
447 except PackageNotFoundException as e:
448 self.assertEqual("Service package[8000] not Found.", e.args[0])
450 def test_api_service_pkg_normal_delete(self):
451 ServicePackageModel(servicePackageId="8", servicedId="2").save()
452 resp = self.client.delete(CATALOG_BASE_URL + "/service_packages/8")
453 self.assertEqual(resp.status_code, status.HTTP_204_NO_CONTENT)
455 ###############################################################
457 @mock.patch.object(toscaparser, 'parse_sd')
458 def test_service_pkg_parser(self, mock_parse_sd):
459 ServicePackageModel(servicePackageId="8", servicedId="2").save()
460 mock_parse_sd.return_value = json.JSONEncoder().encode({"a": "b"})
463 ret = ServicePackage().parse_serviced("8", inputs)
464 self.assertTrue({"model": '{"c": "d"}'}, ret)
466 def test_service_pkg_parser_not_found(self):
470 ServicePackage().parse_serviced(csar_id, inputs)
471 except PackageNotFoundException as e:
472 self.assertEqual("Service CSAR(8000) does not exist.", e.args[0])
474 def test_api_service_pkg_parser_not_found(self):
477 "packageType": "Service",
480 resp = self.client.post(CATALOG_BASE_URL + "/parser", query_data, format='json')
481 self.assertEqual(resp.status_code, status.HTTP_404_NOT_FOUND)