1 # Copyright (c) 2019, CMCC Technologies. Co., Ltd.
3 # Licensed under the Apache License, Version 2.0 (the "License");
4 # you may not use this file except in compliance with the License.
5 # You may obtain a copy of the License at
7 # http://www.apache.org/licenses/LICENSE-2.0
9 # Unless required by applicable law or agreed to in writing, software
10 # distributed under the License is distributed on an "AS IS" BASIS,
11 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 # See the License for the specific language governing permissions and
13 # limitations under the License.
16 from django.test import TestCase, Client
18 from rest_framework import status
20 from genericparser.packages.biz.sdc_service_package import ServicePackage
21 from genericparser.packages.const import PKG_STATUS
22 from genericparser.pub.database.models import ServicePackageModel, VnfPackageModel, PnfPackageModel
23 from genericparser.pub.exceptions import PackageNotFoundException, PackageHasExistsException, GenericparserException
24 from genericparser.pub.msapi import sdc
25 from genericparser.pub.utils import toscaparsers
27 PARSER_BASE_URL = "/api/parser/v1"
30 class TestServicePackage(TestCase):
31 """ Test case for Service Package operations"""
34 self.client = Client()
35 ServicePackageModel.objects.filter().delete()
38 "sdwanvpnresource_list": [
40 "sdwanvpn_topology": "",
45 "sdwansitelan_list": [
50 "description": "The device name in the site"
55 "sdwansiteresource_list": [
57 "sdwansite_controlPoint": "",
60 "description": "The control point of the site,only for sd-wan-edge"
68 "description": "The system ip of the device"
81 "request_reclassification": False,
84 "management_address": "111111",
92 "sdwansiteresource": [
95 "sdwanvpnresource": []
97 "basepath": "c:\\users\\cmcc\\appdata\\local\\temp\\tmpn79jwc\\Definitions",
100 "vnf_id": "sdwansiteresource",
103 "sdwandevice_type": "",
104 "sdwandevice_class": "PNF",
105 "multi_stage_design": "False",
106 "min_instances": "1",
107 "sdwansite_controlPoint": "",
108 "id": "cd557883-ac4b-462d-aa01-421b5fa606b1",
109 "sdwansite_longitude": "",
110 "sdwansite_latitude": "",
111 "sdwansite_postcode": "",
112 "sdwansite_type": "",
114 "ecomp_generated_naming": True
116 "sdwansite_emails": "",
117 "sdwansite_role": "",
119 "sdwansite_address": "",
120 "sdwansite_description": "",
121 "availability_zone_max_count": "1",
127 "category": "Configuration",
128 "subcategory": "Configuration",
129 "UUID": "cd557883-ac4b-462d-aa01-421b5fa606b1",
130 "invariantUUID": "c83b621e-e267-4910-a75a-a2a5957296e4",
131 "name": "sdwansiteresource",
132 "customizationUUID": "673dd6b3-3a06-4ef0-8ad0-8c26224b08f7",
133 "resourceVendorRelease": "1.0",
135 "resourceVendor": "onap",
136 "resourceVendorModelNumber": "",
138 "description": "sdwansiteresource"
144 "type": "org.openecomp.service.EnhanceService",
146 "sdwanvpnresource.sdwanvpn.dependency": [
148 "sdwanvpn.dependency"
150 "sdwansiteresource.sdwansitewan.dependency": [
152 "sdwansitewan.dependency"
154 "sdwansiteresource.sdwandevice.dependency": [
156 "sdwandevice.dependency"
158 "sdwanvpnresource.sdwansitelan.dependency": [
160 "sdwansitelan.dependency"
162 "sdwanvpnresource.sdwanvpn.device": [
166 "sdwansiteresource.sdwansite.device": [
170 "sdwansiteresource.sdwansite.dependency": [
172 "sdwansite.dependency"
174 "sdwanvpnresource.sdwansitelan.device": [
176 "sdwansitelan.device"
178 "sdwansiteresource.sdwansitewan.device": [
180 "sdwansitewan.device"
182 "sdwansiteresource.sdwandevice.device": [
188 "descriptor_id": "49ee73f4-1e31-4054-b871-eb9b1c29999b",
190 "invariant_id": "5de07996-7ff0-4ec1-b93c-e3a00bb3f207",
191 "name": "Enhance_Service",
195 "sdwansiteresource.sdwandevice.feature": [
197 "sdwandevice.feature"
199 "sdwanvpnresource.sdwanvpn.feature": [
203 "sdwanvpnresource.sdwanvpn.link": [
207 "sdwansiteresource.sdwansite.feature": [
211 "sdwansiteresource.sdwansitewan.feature": [
213 "sdwansitewan.feature"
215 "sdwanvpnresource.sdwansitelan.feature": [
217 "sdwansitelan.feature"
221 "category": "E2E Service",
223 "description": "Enhance_Service",
224 "instantiationType": "A-la-carte",
226 "environmentContext": "General_Revenue-Bearing",
227 "serviceEcompNaming": True,
228 "UUID": "49ee73f4-1e31-4054-b871-eb9b1c29999b",
229 "ecompGeneratedNaming": True,
231 "invariantUUID": "5de07996-7ff0-4ec1-b93c-e3a00bb3f207",
233 "name": "Enhance_Service"
237 "category": "E2E Service",
239 "description": "Enhance_Service",
240 "instantiationType": "A-la-carte",
242 "environmentContext": "General_Revenue-Bearing",
243 "serviceEcompNaming": True,
244 "UUID": "49ee73f4-1e31-4054-b871-eb9b1c29999b",
245 "ecompGeneratedNaming": True,
247 "invariantUUID": "5de07996-7ff0-4ec1-b93c-e3a00bb3f207",
249 "name": "Enhance_Service"
256 ###############################################################
258 def test_service_pkg_distribute_when_pkg_exists(self):
259 ServicePackageModel(servicePackageId="1", servicedId="2").save()
262 ServicePackage().on_distribute(csar_id)
263 except PackageHasExistsException as e:
264 self.assertEqual("Service CSAR(1) already exists.", e.message)
266 @mock.patch.object(sdc, 'get_artifact')
267 def test_service_pkg_distribute_when_fail_get_artifacts(self, mock_get_artifact):
268 mock_get_artifact.side_effect = GenericparserException("Failed to query artifact(services,1) from sdc.")
271 ServicePackage().on_distribute(csar_id)
272 except Exception as e:
273 self.assertTrue(isinstance(e, GenericparserException))
274 self.assertEqual("Failed to query artifact(services,1) from sdc.", e.message)
276 @mock.patch.object(sdc, 'get_artifact')
277 @mock.patch.object(sdc, 'download_artifacts')
278 def test_service_pkg_distribute_when_fail_download_artifacts(self, mock_get_artifact, mock_download_artifacts):
279 mock_get_artifact.return_value = {
281 "invariantUUID": "63eaec39-ffbe-411c-a838-448f2c73f7eb",
282 "name": "underlayvpn",
284 "toscaModelURL": "/sdc/v1/genericparser/resources/c94490a0-f7ef-48be-b3f8-8d8662a37236/toscaModel",
286 "subCategory": "VolteVNF",
287 "resourceType": "VF",
288 "lifecycleState": "CERTIFIED",
289 "distributionStatus": "DISTRIBUTION_APPROVED",
290 "lastUpdaterUserId": "jh0003"
292 mock_download_artifacts.side_effect = GenericparserException("Failed to download 1 from sdc.")
295 ServicePackage().on_distribute(csar_id)
296 except Exception as e:
297 self.assertTrue(isinstance(e, GenericparserException))
298 self.assertEqual("Failed to download 1 from sdc.", e.message)
300 @mock.patch.object(sdc, 'get_artifact')
301 @mock.patch.object(sdc, 'download_artifacts')
302 @mock.patch.object(toscaparsers, 'parse_sd')
303 def test_service_pkg_distribute(self, mock_parse_sd, mock_download_artifacts, mock_get_artifact):
304 mock_parse_sd.return_value = json.JSONEncoder().encode(self.sd_data)
305 mock_download_artifacts.return_value = "/test.csar"
306 mock_get_artifact.return_value = {
308 "invariantUUID": "63eaec39-ffbe-411c-a838-448f2c73f7eb",
309 "name": "underlayvpn",
311 "toscaModelURL": "/sdc/v1/genericparser/resources/c94490a0-f7ef-48be-b3f8-8d8662a37236/toscaModel",
313 "subCategory": "VolteVNF",
314 "resourceType": "VF",
315 "lifecycleState": "CERTIFIED",
316 "distributionStatus": "DISTRIBUTION_APPROVED",
317 "lastUpdaterUserId": "jh0003"
319 VnfPackageModel(vnfPackageId="1", vnfdId="cd557883-ac4b-462d-aa01-421b5fa606b1").save()
320 PnfPackageModel(pnfPackageId="1", pnfdId="m6000_s").save()
321 ServicePackage().on_distribute(csar_id="1")
323 service_package = ServicePackageModel.objects.filter(servicePackageId="1").first()
324 self.assertEqual("5de07996-7ff0-4ec1-b93c-e3a00bb3f207", service_package.invariantId)
325 self.assertEqual("Enhance_Service", service_package.servicedName)
326 self.assertEqual(PKG_STATUS.ONBOARDED, service_package.onboardingState)
327 self.assertEqual(PKG_STATUS.ENABLED, service_package.operationalState)
328 self.assertEqual(PKG_STATUS.NOT_IN_USE, service_package.usageState)
330 def test_api_service_pkg_distribute_when_pkg_exists(self):
331 ServicePackageModel(servicePackageId="1", servicedId="2").save()
332 resp = self.client.post(
333 PARSER_BASE_URL + "/service_packages", {"csarId": "1"}, format='json')
334 self.assertEqual(resp.status_code, status.HTTP_400_BAD_REQUEST)
335 self.assertEqual("Service CSAR(1) already exists.", resp.data["errorMessage"])
337 ###############################################################
339 def test_service_pkg_get_all(self):
341 servicePackageId="13",
343 servicedDesigner="2",
345 servicePackageUri="13.csar",
346 servicedModel="").save()
348 servicePackageId="14",
350 servicedDesigner="3",
352 servicePackageUri="14.csar",
353 servicedModel="").save()
354 csars = ServicePackage().get_csars()
355 self.assertEqual(2, len(csars))
357 def test_api_service_pkg_get_all(self):
359 servicePackageId="13",
361 servicedDesigner="2",
363 servicePackageUri="13.csar",
364 servicedModel="").save()
366 servicePackageId="14",
368 servicedDesigner="3",
370 servicePackageUri="14.csar",
371 servicedModel="").save()
372 resp = self.client.get(PARSER_BASE_URL + "/service_packages")
373 self.assertEqual(resp.status_code, status.HTTP_200_OK)
375 ###############################################################
377 def test_service_pkg_get_one(self):
379 servicePackageId="14",
381 servicedDesigner="3",
383 servicePackageUri="14.csar",
384 servicedModel="").save()
385 csar = ServicePackage().get_csar(14)
386 self.assertEqual(14, csar['csarId'])
388 def test_service_pkg_get_one_not_found(self):
390 ServicePackage().get_csar(1000)
391 except PackageNotFoundException as e:
392 self.assertEqual("Service package[1000] not Found.", e.message)
394 def test_api_service_pkg_get_one(self):
396 servicePackageId="14",
398 servicedDesigner="3",
400 servicePackageUri="14.csar",
401 servicedModel="").save()
402 resp = self.client.get(PARSER_BASE_URL + "/service_packages/14")
403 self.assertEqual(resp.status_code, status.HTTP_200_OK)
405 def test_api_service_pkg_get_one_not_found(self):
406 resp = self.client.get(PARSER_BASE_URL + "/service_packages/22")
407 self.assertEqual(resp.status_code, status.HTTP_404_NOT_FOUND)
409 {"errorMessage": "Service package[22] not Found.", 'error': 404},
412 ###############################################################
414 def test_service_pkg_normal_delete(self):
415 ServicePackageModel(servicePackageId="8", servicedId="2").save()
416 sp = ServicePackageModel.objects.filter(servicePackageId=8)
417 self.assertEqual(1, len(sp))
418 ServicePackage().delete_csar("8")
419 sp = ServicePackageModel.objects.filter(servicePackageId=8)
420 self.assertEqual(0, len(sp))
422 def test_service_pkg_normal_delete_not_found(self):
424 ServicePackage().delete_csar("8000")
425 except PackageNotFoundException as e:
426 self.assertEqual("Service package[8000] not Found.", e.message)
428 def test_api_service_pkg_normal_delete(self):
429 ServicePackageModel(servicePackageId="8", servicedId="2").save()
430 resp = self.client.delete(PARSER_BASE_URL + "/service_packages/8")
431 self.assertEqual(resp.status_code, status.HTTP_204_NO_CONTENT)
433 ###############################################################
435 @mock.patch.object(toscaparsers, 'parse_sd')
436 def test_service_pkg_parser(self, mock_parse_sd):
437 ServicePackageModel(servicePackageId="8", servicedId="2").save()
438 mock_parse_sd.return_value = json.JSONEncoder().encode({"a": "b"})
441 ret = ServicePackage().parse_serviced("8", inputs)
442 self.assertTrue({"model": '{"c": "d"}'}, ret)
444 def test_service_pkg_parser_not_found(self):
448 ServicePackage().parse_serviced(csar_id, inputs)
449 except PackageNotFoundException as e:
450 self.assertEqual("Service CSAR(8000) does not exist.", e.message)
452 def test_api_service_pkg_parser_not_found(self):
455 "packageType": "Service",
458 resp = self.client.post(PARSER_BASE_URL + "/parser", query_data, format='json')
459 self.assertEqual(resp.status_code, status.HTTP_404_NOT_FOUND)