adding vth code as well as aaf and cert config

Change-Id: Ib137099ccac3109b9b38deab1c42ffade5d6a303
Signed-off-by: Rohan Patel <rp5811@att.com>
diff --git a/otf-ssh-test-head/ssh_test_head.py b/otf-ssh-test-head/ssh_test_head.py
new file mode 100644
index 0000000..132bcfc
--- /dev/null
+++ b/otf-ssh-test-head/ssh_test_head.py
@@ -0,0 +1,161 @@
+#   Copyright (c) 2019 AT&T Intellectual Property.                             #

+#                                                                              #

+#   Licensed under the Apache License, Version 2.0 (the "License");            #

+#   you may not use this file except in compliance with the License.           #

+#   You may obtain a copy of the License at                                    #

+#                                                                              #

+#       http://www.apache.org/licenses/LICENSE-2.0                             #

+#                                                                              #

+#   Unless required by applicable law or agreed to in writing, software        #

+#   distributed under the License is distributed on an "AS IS" BASIS,          #

+#   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.   #

+#   See the License for the specific language governing permissions and        #

+#   limitations under the License.                                             #

+################################################################################

+

+

+from flask import Flask, request, make_response, jsonify, g

+import json

+import paramiko

+import datetime

+import logging

+import os

+from logging import FileHandler

+

+# redirect http to https

+app = Flask(__name__)

+

+

+# Prevents print statement every time an endpoint is triggered.

+logging.getLogger("werkzeug").setLevel(logging.WARNING)

+

+

+def unix_time_millis(dt):

+	epoch = datetime.datetime.utcfromtimestamp(0)

+	return (dt - epoch).total_seconds() * 1000.0

+

+

+@app.route("/otf/vth/ssh/v1/health", methods = ['GET'])

+def getHealth():

+	return "UP"

+

+

+@app.route('/otf/vth/ssh/v1', methods = ['POST'])

+def remoteSSH():

+	responseData = {

+		"vthResponse": {

+			"testDurationMS": "",

+			"dateTimeUTC": "",

+			"abstractMessage": "",

+			"resultData": {}

+		}

+	}

+

+	responseData['vthResponse']['dateTimeUTC'] = str(datetime.datetime.now())

+	start_time = unix_time_millis(datetime.datetime.now())

+

+	try:

+		if not request.is_json:

+			raise ValueError('Request must be a valid JSON object.')

+

+		request_data = request.get_json()

+

+		if 'vthInput' in request_data:

+			vth_input = request_data['vthInput']

+			expected_keys = ['vthName', 'testConfig', 'testData']

+			received_keys = vth_input.keys();

+			test_data = ""

+			test_config = ""

+

+			if sorted(expected_keys) == sorted(received_keys):

+				test_data = vth_input['testData']

+

+				if 'command' not in test_data:

+					raise ValueError('Must supply value testData.command')

+

+			else:

+				raise ValueError('Missing one or more expected keys: {expectedKeys}.'.format(expectedKeys=expected_keys))

+

+			test_config = vth_input['testConfig']

+

+			if 'jumpServer' not in test_config:

+				raise KeyError('Cannot use jump server when jumpServer key is missing.')

+

+			jump_server = test_config['jumpServer']

+

+			if 'host' not in test_config['jumpServer']:

+				raise KeyError('Missing host value in jumpServer.')

+

+			host = test_config['jumpServer']['host']

+

+			if 'credentials' not in jump_server:

+				raise KeyError('Missing credentials in jumpServer.')

+

+			credentials = jump_server['credentials']

+

+			if 'username' not in credentials:

+				raise KeyError('Missing username in credentials.')

+

+			username = credentials['username']

+

+			if 'password' not in credentials:

+				raise KeyError('Missing password in credentials.')

+

+			password = credentials['password']

+

+			ssh = paramiko.SSHClient()

+			ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())

+

+			if 'usePrivateKey' in test_config:

+				if test_config['usePrivateKey']:

+					key_passphrase = os.environ.get('id_otf_key_passphrase')

+					app.logger.info(key_passphrase)

+					ssh.connect(host, username=username, passphrase='passphrase', key_filename='./ssh/id_otf.key')

+					with open('./ssh/id_otf.key', 'r') as myfile:

+						data = myfile.read().replace('\n', '')

+

+					app.logger.info(data)

+			else:

+				ssh.connect(host, username=username, password=password)

+			command = test_data['command']

+			ssh_stdin, ssh_stdout, ssh_stderr = ssh.exec_command(command)

+

+			responseData['vthResponse']['resultData']['output'] = str(ssh_stdout.read()).replace('"', '\\"').replace('\n', '\\n')

+			responseData['vthResponse']['resultData']['error'] = str(ssh_stderr.read()).replace('"', '\\"').replace('\n', '\\n')

+

+		else:

+			raise KeyError('Missing vthInput parameter(s)')

+

+		# record the end time of the test

+		endTime = unix_time_millis(datetime.datetime.now())

+

+		# Calculate the total duration of the test

+		totalTime = endTime - start_time

+

+		# Set the test duration in the result

+		responseData['vthResponse']['testDurationMS'] = totalTime

+

+		responseData['vthResponse']['abstractMessage'] = 'done'

+

+		app.logger.info(str(responseData))

+

+		return jsonify(responseData)

+	except Exception as e:

+		app.logger.info(e)

+		responseData['vthResponse']['abstractMessage'] = str(e)

+		resp = make_response(json.dumps(responseData))

+		endTime = unix_time_millis(datetime.datetime.now())

+

+		totalTime = endTime - start_time

+		return resp

+

+

+if __name__ == '__main__':

+	logHandler = FileHandler('otf/logs/sshVTH.log', mode='a')

+	# logHandler = FileHandler('sshVTH.log', mode='a')

+	logHandler.setLevel(logging.INFO)

+	app.logger.setLevel(logging.INFO)

+	app.logger.addHandler(logHandler)

+	context = ('opt/cert/otf.pem', 'opt/cert/privateKey.pem')

+	app.run(debug = False, host = '0.0.0.0', port = 5000, ssl_context = context)

+	# app.run(debug = False, host = '0.0.0.0', port=5000)