genericparser seed code
[modeling/etsicatalog.git] / genericparser / packages / tests / test_servicepackage.py
1 # Copyright (c) 2019, CMCC Technologies. Co., Ltd.
2 #
3 # Licensed under the Apache License, Version 2.0 (the "License");
4 # you may not use this file except in compliance with the License.
5 # You may obtain a copy of the License at
6 #
7 #         http://www.apache.org/licenses/LICENSE-2.0
8 #
9 # Unless required by applicable law or agreed to in writing, software
10 # distributed under the License is distributed on an "AS IS" BASIS,
11 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 # See the License for the specific language governing permissions and
13 # limitations under the License.
14 import json
15
16 from django.test import TestCase, Client
17 from mock import mock
18 from rest_framework import status
19
20 from genericparser.packages.biz.sdc_service_package import ServicePackage
21 from genericparser.packages.const import PKG_STATUS
22 from genericparser.pub.database.models import ServicePackageModel, VnfPackageModel, PnfPackageModel
23 from genericparser.pub.exceptions import PackageNotFoundException, PackageHasExistsException, GenericparserException
24 from genericparser.pub.msapi import sdc
25 from genericparser.pub.utils import toscaparsers
26
27 PARSER_BASE_URL = "/api/parser/v1"
28
29
30 class TestServicePackage(TestCase):
31     """ Test case for Service Package operations"""
32
33     def setUp(self):
34         self.client = Client()
35         ServicePackageModel.objects.filter().delete()
36         self.sd_data = {
37             "inputs": {
38                 "sdwanvpnresource_list": [
39                     {
40                         "sdwanvpn_topology": "",
41                         "required": True,
42                         "type": "string"
43                     },
44                     {
45                         "sdwansitelan_list": [
46                             {
47                                 "deviceName": "",
48                                 "required": True,
49                                 "type": "string",
50                                 "description": "The device name in the site"
51                             }
52                         ]
53                     }
54                 ],
55                 "sdwansiteresource_list": [
56                     {
57                         "sdwansite_controlPoint": "",
58                         "required": False,
59                         "type": "string",
60                         "description": "The control point of the site,only for sd-wan-edge"
61                     },
62                     {
63                         "sdwandevice_list": [
64                             {
65                                 "systemIp": "",
66                                 "required": False,
67                                 "type": "string",
68                                 "description": "The system ip of the device"
69                             }
70                         ]
71                     }
72                 ]
73             },
74             "pnfs": [
75                 {
76                     "pnf_id": "m6000_s",
77                     "cps": [],
78                     "description": "",
79                     "properties": {
80                         "vendor": "zte",
81                         "request_reclassification": False,
82                         "pnf_type": "m6000s",
83                         "version": "1.0",
84                         "management_address": "111111",
85                         "id": "m6000_s",
86                         "nsh_aware": False
87                     }
88                 }
89             ],
90             "description": "",
91             "graph": {
92                 "sdwansiteresource": [
93                     "sdwanvpnresource"
94                 ],
95                 "sdwanvpnresource": []
96             },
97             "basepath": "c:\\users\\cmcc\\appdata\\local\\temp\\tmpn79jwc\\Definitions",
98             "vnfs": [
99                 {
100                     "vnf_id": "sdwansiteresource",
101                     "description": "",
102                     "properties": {
103                         "sdwandevice_type": "",
104                         "sdwandevice_class": "PNF",
105                         "multi_stage_design": "False",
106                         "min_instances": "1",
107                         "sdwansite_controlPoint": "",
108                         "id": "cd557883-ac4b-462d-aa01-421b5fa606b1",
109                         "sdwansite_longitude": "",
110                         "sdwansite_latitude": "",
111                         "sdwansite_postcode": "",
112                         "sdwansite_type": "",
113                         "nf_naming": {
114                             "ecomp_generated_naming": True
115                         },
116                         "sdwansite_emails": "",
117                         "sdwansite_role": "",
118                         "vnfm_info": "",
119                         "sdwansite_address": "",
120                         "sdwansite_description": "",
121                         "availability_zone_max_count": "1",
122                         "sdwansite_name": ""
123                     },
124                     "dependencies": [],
125                     "networks": [],
126                     "metadata": {
127                         "category": "Configuration",
128                         "subcategory": "Configuration",
129                         "UUID": "cd557883-ac4b-462d-aa01-421b5fa606b1",
130                         "invariantUUID": "c83b621e-e267-4910-a75a-a2a5957296e4",
131                         "name": "sdwansiteresource",
132                         "customizationUUID": "673dd6b3-3a06-4ef0-8ad0-8c26224b08f7",
133                         "resourceVendorRelease": "1.0",
134                         "version": "1.0",
135                         "resourceVendor": "onap",
136                         "resourceVendorModelNumber": "",
137                         "type": "VF",
138                         "description": "sdwansiteresource"
139                     }
140                 }
141             ],
142             "vls": [],
143             "service": {
144                 "type": "org.openecomp.service.EnhanceService",
145                 "requirements": {
146                     "sdwanvpnresource.sdwanvpn.dependency": [
147                         "sdwanvpnresource",
148                         "sdwanvpn.dependency"
149                     ],
150                     "sdwansiteresource.sdwansitewan.dependency": [
151                         "sdwansiteresource",
152                         "sdwansitewan.dependency"
153                     ],
154                     "sdwansiteresource.sdwandevice.dependency": [
155                         "sdwansiteresource",
156                         "sdwandevice.dependency"
157                     ],
158                     "sdwanvpnresource.sdwansitelan.dependency": [
159                         "sdwanvpnresource",
160                         "sdwansitelan.dependency"
161                     ],
162                     "sdwanvpnresource.sdwanvpn.device": [
163                         "sdwanvpnresource",
164                         "sdwanvpn.device"
165                     ],
166                     "sdwansiteresource.sdwansite.device": [
167                         "sdwansiteresource",
168                         "sdwansite.device"
169                     ],
170                     "sdwansiteresource.sdwansite.dependency": [
171                         "sdwansiteresource",
172                         "sdwansite.dependency"
173                     ],
174                     "sdwanvpnresource.sdwansitelan.device": [
175                         "sdwanvpnresource",
176                         "sdwansitelan.device"
177                     ],
178                     "sdwansiteresource.sdwansitewan.device": [
179                         "sdwansiteresource",
180                         "sdwansitewan.device"
181                     ],
182                     "sdwansiteresource.sdwandevice.device": [
183                         "sdwansiteresource",
184                         "sdwandevice.device"
185                     ]
186                 },
187                 "properties": {
188                     "descriptor_id": "49ee73f4-1e31-4054-b871-eb9b1c29999b",
189                     "designer": "",
190                     "invariant_id": "5de07996-7ff0-4ec1-b93c-e3a00bb3f207",
191                     "name": "Enhance_Service",
192                     "verison": ""
193                 },
194                 "capabilities": {
195                     "sdwansiteresource.sdwandevice.feature": [
196                         "sdwansiteresource",
197                         "sdwandevice.feature"
198                     ],
199                     "sdwanvpnresource.sdwanvpn.feature": [
200                         "sdwanvpnresource",
201                         "sdwanvpn.feature"
202                     ],
203                     "sdwanvpnresource.sdwanvpn.link": [
204                         "sdwanvpnresource",
205                         "sdwanvpn.link"
206                     ],
207                     "sdwansiteresource.sdwansite.feature": [
208                         "sdwansiteresource",
209                         "sdwansite.feature"
210                     ],
211                     "sdwansiteresource.sdwansitewan.feature": [
212                         "sdwansiteresource",
213                         "sdwansitewan.feature"
214                     ],
215                     "sdwanvpnresource.sdwansitelan.feature": [
216                         "sdwanvpnresource",
217                         "sdwansitelan.feature"
218                     ]
219                 },
220                 "metadata": {
221                     "category": "E2E Service",
222                     "serviceType": "",
223                     "description": "Enhance_Service",
224                     "instantiationType": "A-la-carte",
225                     "type": "Service",
226                     "environmentContext": "General_Revenue-Bearing",
227                     "serviceEcompNaming": True,
228                     "UUID": "49ee73f4-1e31-4054-b871-eb9b1c29999b",
229                     "ecompGeneratedNaming": True,
230                     "serviceRole": "",
231                     "invariantUUID": "5de07996-7ff0-4ec1-b93c-e3a00bb3f207",
232                     "namingPolicy": "",
233                     "name": "Enhance_Service"
234                 }
235             },
236             "metadata": {
237                 "category": "E2E Service",
238                 "serviceType": "",
239                 "description": "Enhance_Service",
240                 "instantiationType": "A-la-carte",
241                 "type": "Service",
242                 "environmentContext": "General_Revenue-Bearing",
243                 "serviceEcompNaming": True,
244                 "UUID": "49ee73f4-1e31-4054-b871-eb9b1c29999b",
245                 "ecompGeneratedNaming": True,
246                 "serviceRole": "",
247                 "invariantUUID": "5de07996-7ff0-4ec1-b93c-e3a00bb3f207",
248                 "namingPolicy": "",
249                 "name": "Enhance_Service"
250             }
251         }
252
253     def tearDown(self):
254         pass
255
256     ###############################################################
257
258     def test_service_pkg_distribute_when_pkg_exists(self):
259         ServicePackageModel(servicePackageId="1", servicedId="2").save()
260         csar_id = "1"
261         try:
262             ServicePackage().on_distribute(csar_id)
263         except PackageHasExistsException as e:
264             self.assertEqual("Service CSAR(1) already exists.", e.message)
265
266     @mock.patch.object(sdc, 'get_artifact')
267     def test_service_pkg_distribute_when_fail_get_artifacts(self, mock_get_artifact):
268         mock_get_artifact.side_effect = GenericparserException("Failed to query artifact(services,1) from sdc.")
269         csar_id = "1"
270         try:
271             ServicePackage().on_distribute(csar_id)
272         except Exception as e:
273             self.assertTrue(isinstance(e, GenericparserException))
274             self.assertEqual("Failed to query artifact(services,1) from sdc.", e.message)
275
276     @mock.patch.object(sdc, 'get_artifact')
277     @mock.patch.object(sdc, 'download_artifacts')
278     def test_service_pkg_distribute_when_fail_download_artifacts(self, mock_get_artifact, mock_download_artifacts):
279         mock_get_artifact.return_value = {
280             "uuid": "1",
281             "invariantUUID": "63eaec39-ffbe-411c-a838-448f2c73f7eb",
282             "name": "underlayvpn",
283             "version": "2.0",
284             "toscaModelURL": "/sdc/v1/genericparser/resources/c94490a0-f7ef-48be-b3f8-8d8662a37236/toscaModel",
285             "category": "Volte",
286             "subCategory": "VolteVNF",
287             "resourceType": "VF",
288             "lifecycleState": "CERTIFIED",
289             "distributionStatus": "DISTRIBUTION_APPROVED",
290             "lastUpdaterUserId": "jh0003"
291         }
292         mock_download_artifacts.side_effect = GenericparserException("Failed to download 1 from sdc.")
293         csar_id = "1"
294         try:
295             ServicePackage().on_distribute(csar_id)
296         except Exception as e:
297             self.assertTrue(isinstance(e, GenericparserException))
298             self.assertEqual("Failed to download 1 from sdc.", e.message)
299
300     @mock.patch.object(sdc, 'get_artifact')
301     @mock.patch.object(sdc, 'download_artifacts')
302     @mock.patch.object(toscaparsers, 'parse_sd')
303     def test_service_pkg_distribute(self, mock_parse_sd, mock_download_artifacts, mock_get_artifact):
304         mock_parse_sd.return_value = json.JSONEncoder().encode(self.sd_data)
305         mock_download_artifacts.return_value = "/test.csar"
306         mock_get_artifact.return_value = {
307             "uuid": "1",
308             "invariantUUID": "63eaec39-ffbe-411c-a838-448f2c73f7eb",
309             "name": "underlayvpn",
310             "version": "2.0",
311             "toscaModelURL": "/sdc/v1/genericparser/resources/c94490a0-f7ef-48be-b3f8-8d8662a37236/toscaModel",
312             "category": "Volte",
313             "subCategory": "VolteVNF",
314             "resourceType": "VF",
315             "lifecycleState": "CERTIFIED",
316             "distributionStatus": "DISTRIBUTION_APPROVED",
317             "lastUpdaterUserId": "jh0003"
318         }
319         VnfPackageModel(vnfPackageId="1", vnfdId="cd557883-ac4b-462d-aa01-421b5fa606b1").save()
320         PnfPackageModel(pnfPackageId="1", pnfdId="m6000_s").save()
321         ServicePackage().on_distribute(csar_id="1")
322
323         service_package = ServicePackageModel.objects.filter(servicePackageId="1").first()
324         self.assertEqual("5de07996-7ff0-4ec1-b93c-e3a00bb3f207", service_package.invariantId)
325         self.assertEqual("Enhance_Service", service_package.servicedName)
326         self.assertEqual(PKG_STATUS.ONBOARDED, service_package.onboardingState)
327         self.assertEqual(PKG_STATUS.ENABLED, service_package.operationalState)
328         self.assertEqual(PKG_STATUS.NOT_IN_USE, service_package.usageState)
329
330     def test_api_service_pkg_distribute_when_pkg_exists(self):
331         ServicePackageModel(servicePackageId="1", servicedId="2").save()
332         resp = self.client.post(
333             PARSER_BASE_URL + "/service_packages", {"csarId": "1"}, format='json')
334         self.assertEqual(resp.status_code, status.HTTP_400_BAD_REQUEST)
335         self.assertEqual("Service CSAR(1) already exists.", resp.data["errorMessage"])
336
337     ###############################################################
338
339     def test_service_pkg_get_all(self):
340         ServicePackageModel(
341             servicePackageId="13",
342             servicedId="2",
343             servicedDesigner="2",
344             servicedVersion="2",
345             servicePackageUri="13.csar",
346             servicedModel="").save()
347         ServicePackageModel(
348             servicePackageId="14",
349             servicedId="3",
350             servicedDesigner="3",
351             servicedVersion="3",
352             servicePackageUri="14.csar",
353             servicedModel="").save()
354         csars = ServicePackage().get_csars()
355         self.assertEqual(2, len(csars))
356
357     def test_api_service_pkg_get_all(self):
358         ServicePackageModel(
359             servicePackageId="13",
360             servicedId="2",
361             servicedDesigner="2",
362             servicedVersion="2",
363             servicePackageUri="13.csar",
364             servicedModel="").save()
365         ServicePackageModel(
366             servicePackageId="14",
367             servicedId="3",
368             servicedDesigner="3",
369             servicedVersion="3",
370             servicePackageUri="14.csar",
371             servicedModel="").save()
372         resp = self.client.get(PARSER_BASE_URL + "/service_packages")
373         self.assertEqual(resp.status_code, status.HTTP_200_OK)
374
375     ###############################################################
376
377     def test_service_pkg_get_one(self):
378         ServicePackageModel(
379             servicePackageId="14",
380             servicedId="2",
381             servicedDesigner="3",
382             servicedVersion="4",
383             servicePackageUri="14.csar",
384             servicedModel="").save()
385         csar = ServicePackage().get_csar(14)
386         self.assertEqual(14, csar['csarId'])
387
388     def test_service_pkg_get_one_not_found(self):
389         try:
390             ServicePackage().get_csar(1000)
391         except PackageNotFoundException as e:
392             self.assertEqual("Service package[1000] not Found.", e.message)
393
394     def test_api_service_pkg_get_one(self):
395         ServicePackageModel(
396             servicePackageId="14",
397             servicedId="2",
398             servicedDesigner="3",
399             servicedVersion="4",
400             servicePackageUri="14.csar",
401             servicedModel="").save()
402         resp = self.client.get(PARSER_BASE_URL + "/service_packages/14")
403         self.assertEqual(resp.status_code, status.HTTP_200_OK)
404
405     def test_api_service_pkg_get_one_not_found(self):
406         resp = self.client.get(PARSER_BASE_URL + "/service_packages/22")
407         self.assertEqual(resp.status_code, status.HTTP_404_NOT_FOUND)
408         self.assertEqual(
409             {"errorMessage": "Service package[22] not Found.", 'error': 404},
410             resp.data)
411
412     ###############################################################
413
414     def test_service_pkg_normal_delete(self):
415         ServicePackageModel(servicePackageId="8", servicedId="2").save()
416         sp = ServicePackageModel.objects.filter(servicePackageId=8)
417         self.assertEqual(1, len(sp))
418         ServicePackage().delete_csar("8")
419         sp = ServicePackageModel.objects.filter(servicePackageId=8)
420         self.assertEqual(0, len(sp))
421
422     def test_service_pkg_normal_delete_not_found(self):
423         try:
424             ServicePackage().delete_csar("8000")
425         except PackageNotFoundException as e:
426             self.assertEqual("Service package[8000] not Found.", e.message)
427
428     def test_api_service_pkg_normal_delete(self):
429         ServicePackageModel(servicePackageId="8", servicedId="2").save()
430         resp = self.client.delete(PARSER_BASE_URL + "/service_packages/8")
431         self.assertEqual(resp.status_code, status.HTTP_204_NO_CONTENT)
432
433     ###############################################################
434
435     @mock.patch.object(toscaparsers, 'parse_sd')
436     def test_service_pkg_parser(self, mock_parse_sd):
437         ServicePackageModel(servicePackageId="8", servicedId="2").save()
438         mock_parse_sd.return_value = json.JSONEncoder().encode({"a": "b"})
439
440         inputs = []
441         ret = ServicePackage().parse_serviced("8", inputs)
442         self.assertTrue({"model": '{"c": "d"}'}, ret)
443
444     def test_service_pkg_parser_not_found(self):
445         try:
446             csar_id = "8000"
447             inputs = []
448             ServicePackage().parse_serviced(csar_id, inputs)
449         except PackageNotFoundException as e:
450             self.assertEqual("Service CSAR(8000) does not exist.", e.message)
451
452     def test_api_service_pkg_parser_not_found(self):
453         query_data = {
454             "csarId": "1",
455             "packageType": "Service",
456             "inputs": "string"
457         }
458         resp = self.client.post(PARSER_BASE_URL + "/parser", query_data, format='json')
459         self.assertEqual(resp.status_code, status.HTTP_404_NOT_FOUND)