3212f981741cc42ff42d545e362a2f6a4169721f
[sdnc/oam.git] / csit / plans / sdnc / setup.sh
1 #!/bin/bash
2 #
3 # Copyright 2016-2017 Huawei Technologies Co., Ltd.
4 #
5 # Licensed under the Apache License, Version 2.0 (the "License");
6 # you may not use this file except in compliance with the License.
7 # You may obtain a copy of the License at
8 #
9 #     http://www.apache.org/licenses/LICENSE-2.0
10 #
11 # Unless required by applicable law or agreed to in writing, software
12 # distributed under the License is distributed on an "AS IS" BASIS,
13 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 # See the License for the specific language governing permissions and
15 # limitations under the License.
16 #
17 # Modifications copyright (c) 2020-2021 Samsung Electronics Co., Ltd.
18 # Modifications copyright (c) 2021 AT&T Intellectual Property
19 #
20
21 # Remove all dangling images and cleanup /w/workspace and /tmp
22 docker image prune -f
23 echo "Remove onap repository artifacts"
24 rm -r /tmp/r/org/onap
25 echo "Remove all target folders from workspace"
26 rm -r $(find /w/workspace -name target)
27
28 ###################### Netconf Simulator Setup ######################
29
30 echo "Clean"
31 sudo apt clean
32
33 # Get integration/simulators
34 if [ -d ${WORKSPACE}/archives/pnf-simulator ]
35 then
36     rm -rf ${WORKSPACE}/archives/pnf-simulator
37 fi
38 mkdir ${WORKSPACE}/archives/pnf-simulator
39 git clone "https://gerrit.onap.org/r/integration/simulators/pnf-simulator" ${WORKSPACE}/archives/pnf-simulator
40
41 # Fix docker-compose to add nexus repo for onap dockers
42 PNF_SIM_REGISTRY=nexus3.onap.org:10001
43 PNF_SIM_VERSION=1.0.5
44 mv ${WORKSPACE}/archives/pnf-simulator/netconfsimulator/docker-compose.yml ${WORKSPACE}/archives/pnf-simulator/netconfsimulator/docker-compose.yml.orig
45 cat ${WORKSPACE}/archives/pnf-simulator/netconfsimulator/docker-compose.yml.orig | sed -re "s/image: onap\/org.onap.integration.simulators.(.*$)/image: $PNF_SIM_REGISTRY\/onap\/org.onap.integration.simulators.\1:$PNF_SIM_VERSION/"  > ${WORKSPACE}/archives/pnf-simulator/netconfsimulator/docker-compose.yml
46
47 # Remove carriage returns (if any) from netopeer start script
48 mv ${WORKSPACE}/archives/pnf-simulator/netconfsimulator/netconf/initialize_netopeer.sh ${WORKSPACE}/archives/pnf-simulator/netconfsimulator/netconf/initialize_netopeer.sh.orig
49 cat ${WORKSPACE}/archives/pnf-simulator/netconfsimulator/netconf/initialize_netopeer.sh.orig | sed -e "s/\r$//g" > ${WORKSPACE}/archives/pnf-simulator/netconfsimulator/netconf/initialize_netopeer.sh
50 chmod 755 ${WORKSPACE}/archives/pnf-simulator/netconfsimulator/netconf/initialize_netopeer.sh
51
52
53 # Start Netconf Simulator Container with docker-compose and configuration from docker-compose.yml
54 docker-compose -f "${WORKSPACE}"/archives/pnf-simulator/netconfsimulator/docker-compose.yml up -d
55
56 # Add test user in netopeer container
57 sleep 60
58 docker exec netconfsimulator_netopeer_1 useradd --system test
59
60 ############################## SDNC Setup ##############################
61
62 # Copy client certs from netconf simulator to SDNC certs directory
63 mkdir /tmp/keys0
64 cp ${WORKSPACE}/archives/pnf-simulator/netconfsimulator/tls/client.crt /tmp/keys0
65 cp ${WORKSPACE}/archives/pnf-simulator/netconfsimulator/tls/client.key /tmp/keys0
66 cp ${WORKSPACE}/archives/pnf-simulator/netconfsimulator/tls/ca.crt /tmp/keys0/trustedCertificates.crt
67 cwd=$(pwd)
68 cd /tmp
69 if [ ! -d ${SDNC_CERT_PATH} ]
70 then
71     mkdir -p ${SDNC_CERT_PATH}
72 fi
73 chmod -f go+w $SDNC_CERT_PATH
74 cat > $SDNC_CERT_PATH/certs.properties <<-END
75 keys0.zip
76 *****
77 END
78 zip -r $SDNC_CERT_PATH/keys0.zip keys0
79 rm -rf /tmp/keys0
80
81
82 # Export default Networking bridge created on the host machine
83 export LOCAL_IP=$(ip -4 addr show docker0 | grep -Po 'inet \K[\d.]+')
84
85 unset http_proxy https_proxy
86
87 # Append test data to standard data init file to create db init script
88 cat ${WORKSPACE}/../installation/sdnc/src/main/resources/sdnctl.dump ${WORKSPACE}/scripts/csit-data.sql > ${WORKSPACE}/archives/csit-dbinit.sql
89
90 # start SDNC containers with docker compose and configuration from docker-compose.yml
91 docker-compose -f ${SCRIPTS}/docker-compose.yml up -d
92
93
94 # WAIT 5 minutes maximum and check karaf.log for readiness every 10 seconds
95
96 TIME_OUT=300
97 INTERVAL=10
98 TIME=0
99 while [ "$TIME" -lt "$TIME_OUT" ]; do
100
101 docker exec ${SDNC_CONTAINER_NAME} cat /opt/opendaylight/data/log/karaf.log | grep 'warp coils'
102
103   if [ $? == 0 ] ; then
104     echo SDNC karaf started in $TIME seconds
105     break;
106   fi
107
108   echo Sleep $INTERVAL seconds before testing if SDNC is up. Total wait time up until now is $TIME seconds. Timeout is $TIME_OUT seconds
109   sleep $INTERVAL
110   TIME=$(($TIME+$INTERVAL))
111 done
112
113 if [ "$TIME" -ge "$TIME_OUT" ]; then
114    echo TIME OUT: karaf session not started in $TIME_OUT seconds, setup failed
115    exit 1;
116 fi
117
118 num_bundles=$(docker exec -i ${SDNC_CONTAINER_NAME} sh -c "echo '' | /opt/opendaylight/current/bin/client bundle:list" | tail -1 | cut -d' ' -f1)
119
120   if [ "$num_bundles" -ge 333 ]; then
121     num_failed_bundles=$(docker exec -i ${SDNC_CONTAINER_NAME} sh -c "echo '' | /opt/opendaylight/current/bin/client bundle:list" | grep -w Failure | wc -l)
122     failed_bundles=$(docker exec -i ${SDNC_CONTAINER_NAME} sh -c "echo '' | /opt/opendaylight/current/bin/client bundle:list" | grep -w Failure)
123     echo There is/are $num_failed_bundles failed bundles out of $num_bundles installed bundles.
124   fi
125
126 if [ "$num_failed_bundles" -ge 1 ]; then
127   echo "The following bundle(s) are in a failed state: "
128   echo "  $failed_bundles"
129 fi
130
131 # Check if certificate installation is done
132 TIME_OUT=300
133 INTERVAL=10
134 TIME=0
135 while [ "$TIME" -lt "$TIME_OUT" ]; do
136
137   docker-compose -f "${SCRIPTS}"/docker-compose.yml logs sdnc | grep 'Everything OK in Certificate Installation'
138
139   if [ $? == 0 ] ; then
140     echo SDNC karaf started in $TIME seconds
141     break;
142   fi
143
144   echo Sleep: $INTERVAL seconds before testing if SDNC is up. Total wait time up now is: $TIME seconds. Timeout is: $TIME_OUT seconds
145   sleep $INTERVAL
146   TIME=$(($TIME+$INTERVAL))
147 done
148
149 if [ "$TIME" -ge "$TIME_OUT" ]; then
150    echo TIME OUT: karaf session not started in $TIME_OUT seconds, setup failed
151    exit 1;
152 fi
153
154 # Update default Networking bridge IP in mount.json file
155 cp ${REQUEST_DATA_PATH}/mount.xml.tmpl ${REQUEST_DATA_PATH}/mount.xml
156 sed -i "s/pnfaddr/${LOCAL_IP}/g" "${REQUEST_DATA_PATH}"/mount.xml
157
158
159 #########################################################################
160
161 # Export SDNC, AAF-Certservice-Cient, Netconf-Pnp-Simulator Continer Names
162 export REQUEST_DATA_PATH="${REQUEST_DATA_PATH}"
163 export SDNC_CONTAINER_NAME="${SDNC_CONTAINER_NAME}"
164 export CLIENT_CONTAINER_NAME="${CLIENT_CONTAINER_NAME}"
165 export NETCONF_PNP_SIM_CONTAINER_NAME="${NETCONF_PNP_SIM_CONTAINER_NAME}"
166
167 REPO_IP='127.0.0.1'
168 ROBOT_VARIABLES+=" -v REPO_IP:${REPO_IP} "
169 ROBOT_VARIABLES+=" -v SCRIPTS:${SCRIPTS} "
170
171 echo "Finished executing setup for SDNC"
172