blob: da3e34db12cdebcadf0f1852308775db6d9cc21f [file] [log] [blame]
#!/bin/bash
# ============LICENSE_START===============================================
# Copyright (C) 2020 Nordix Foundation. All rights reserved.
# ========================================================================
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ============LICENSE_END=================================================
#
# This is a script that contains container/service management function
# and test functions for Message Router - mr stub
################ Test engine functions ################
# Create the image var used during the test
# arg: <image-tag-suffix> (selects staging, snapshot, release etc)
# <image-tag-suffix> is present only for images with staging, snapshot,release tags
__MR_imagesetup() {
__check_and_create_image_var MR "MRSTUB_IMAGE" "MRSTUB_IMAGE_BASE" "MRSTUB_IMAGE_TAG" LOCAL "$MR_STUB_DISPLAY_NAME"
}
# Create the image var used during the test
# arg: <image-tag-suffix> (selects staging, snapshot, release etc)
# <image-tag-suffix> is present only for images with staging, snapshot,release tags
__DMAAPMR_imagesetup() {
__check_and_create_image_var DMAAPMR "ONAP_DMAAPMR_IMAGE" "ONAP_DMAAPMR_IMAGE_BASE" "ONAP_DMAAPMR_IMAGE_TAG" REMOTE_RELEASE_ONAP "DMAAP Message Router"
__check_and_create_image_var DMAAPMR "ONAP_ZOOKEEPER_IMAGE" "ONAP_ZOOKEEPER_IMAGE_BASE" "ONAP_ZOOKEEPER_IMAGE_TAG" REMOTE_RELEASE_ONAP "ZooKeeper"
__check_and_create_image_var DMAAPMR "ONAP_KAFKA_IMAGE" "ONAP_KAFKA_IMAGE_BASE" "ONAP_KAFKA_IMAGE_TAG" REMOTE_RELEASE_ONAP "Kafka"
}
# Pull image from remote repo or use locally built image
# arg: <pull-policy-override> <pull-policy-original>
# <pull-policy-override> Shall be used for images allowing overriding. For example use a local image when test is started to use released images
# <pull-policy-original> Shall be used for images that does not allow overriding
# Both var may contain: 'remote', 'remote-remove' or 'local'
__MR_imagepull() {
echo -e $RED"Image for app MR shall never be pulled from remote repo"$ERED
}
# Pull image from remote repo or use locally built image
# arg: <pull-policy-override> <pull-policy-original>
# <pull-policy-override> Shall be used for images allowing overriding. For example use a local image when test is started to use released (remote) images
# <pull-policy-original> Shall be used for images that does not allow overriding
# Both var may contain: 'remote', 'remote-remove' or 'local'
__DMAAPMR_imagepull() {
__check_and_pull_image $2 "DMAAP Message Router" $MR_DMAAP_APP_NAME ONAP_DMAAPMR_IMAGE
__check_and_pull_image $2 "ZooKeeper" $MR_ZOOKEEPER_APP_NAME ONAP_ZOOKEEPER_IMAGE
__check_and_pull_image $2 "Kafka" $MR_KAFKA_APP_NAME ONAP_KAFKA_IMAGE
}
# Build image (only for simulator or interfaces stubs owned by the test environment)
# arg: <image-tag-suffix> (selects staging, snapshot, release etc)
# <image-tag-suffix> is present only for images with staging, snapshot,release tags
__MR_imagebuild() {
cd ../mrstub
echo " Building MR - $MR_STUB_DISPLAY_NAME - image: $MRSTUB_IMAGE"
docker build --build-arg NEXUS_PROXY_REPO=$NEXUS_PROXY_REPO -t $MRSTUB_IMAGE . &> .dockererr
if [ $? -eq 0 ]; then
echo -e $GREEN" Build Ok"$EGREEN
__retag_and_push_image MRSTUB_IMAGE
if [ $? -ne 0 ]; then
exit 1
fi
else
echo -e $RED" Build Failed"$ERED
((RES_CONF_FAIL++))
cat .dockererr
echo -e $RED"Exiting...."$ERED
exit 1
fi
}
# Build image (only for simulator or interfaces stubs owned by the test environment)
# arg: <image-tag-suffix> (selects staging, snapshot, release etc)
# <image-tag-suffix> is present only for images with staging, snapshot,release tags
__DMAAPMR_imagebuild() {
echo -e $RED"Image for app DMAAPMR shall never be built"$ERED
}
# Generate a string for each included image using the app display name and a docker images format string
# If a custom image repo is used then also the source image from the local repo is listed
# arg: <docker-images-format-string> <file-to-append>
__MR_image_data() {
echo -e "$MR_STUB_DISPLAY_NAME\t$(docker images --format $1 $MRSTUB_IMAGE)" >> $2
if [ ! -z "$MRSTUB_IMAGE_SOURCE" ]; then
echo -e "-- source image --\t$(docker images --format $1 $MRSTUB_IMAGE_SOURCE)" >> $2
fi
}
# Generate a string for each included image using the app display name and a docker images format string
# If a custom image repo is used then also the source image from the local repo is listed
# arg: <docker-images-format-string> <file-to-append>
__DMAAPMR_image_data() {
echo -e "DMAAP Message Router\t$(docker images --format $1 $ONAP_DMAAPMR_IMAGE)" >> $2
if [ ! -z "$ONAP_DMAAPMR_IMAGE_SOURCE" ]; then
echo -e "-- source image --\t$(docker images --format $1 $ONAP_DMAAPMR_IMAGE_SOURCE)" >> $2
fi
echo -e "ZooKeeper\t$(docker images --format $1 $ONAP_ZOOKEEPER_IMAGE)" >> $2
if [ ! -z "$ONAP_ZOOKEEPER_IMAGE_SOURCE" ]; then
echo -e "-- source image --\t$(docker images --format $1 $ONAP_ZOOKEEPER_IMAGE_SOURCE)" >> $2
fi
echo -e "Kafka\t$(docker images --format $1 $ONAP_KAFKA_IMAGE)" >> $2
if [ ! -z "$ONAP_KAFKA_IMAGE_SOURCE" ]; then
echo -e "-- source image --\t$(docker images --format $1 $ONAP_KAFKA_IMAGE_SOURCE)" >> $2
fi
}
# Scale kubernetes resources to zero
# All resources shall be ordered to be scaled to 0, if relevant. If not relevant to scale, then do no action.
# This function is called for apps fully managed by the test script
__MR_kube_scale_zero() {
__kube_scale_all_resources $KUBE_ONAP_NAMESPACE autotest MR
}
# Scale kubernetes resources to zero
# All resources shall be ordered to be scaled to 0, if relevant. If not relevant to scale, then do no action.
# This function is called for apps fully managed by the test script
__DMAAPMR_kube_scale_zero() {
__kube_scale_all_resources $KUBE_ONAP_NAMESPACE autotest DMAAPMR
}
# Scale kubernetes resources to zero and wait until this has been accomplished, if relevant. If not relevant to scale, then do no action.
# This function is called for prestarted apps not managed by the test script.
__MR_kube_scale_zero_and_wait() {
echo -e " MR replicas kept as is"
}
# Scale kubernetes resources to zero and wait until this has been accomplished, if relevant. If not relevant to scale, then do no action.
# This function is called for prestarted apps not managed by the test script.
__DMAAPMR_kube_scale_zero_and_wait() {
echo -e " DMAAP replicas kept as is"
}
# Delete all kube resouces for the app
# This function is called for apps managed by the test script.
__MR_kube_delete_all() {
__kube_delete_all_resources $KUBE_ONAP_NAMESPACE autotest MR
}
# Delete all kube resouces for the app
# This function is called for apps managed by the test script.
__DMAAPMR_kube_delete_all() {
__kube_delete_all_resources $KUBE_ONAP_NAMESPACE autotest DMAAPMR
}
# Store docker logs
# This function is called for apps managed by the test script.
# args: <log-dir> <file-prexix>
__MR_store_docker_logs() {
if [ $RUNMODE == "KUBE" ]; then
kubectl logs -l "autotest=MR" -n $KUBE_ONAP_NAMESPACE --tail=-1 > $1$2_mr_stub.log 2>&1
else
docker logs $MR_STUB_APP_NAME > $1$2_mr_stub.log 2>&1
fi
}
# Store docker logs
# This function is called for apps managed by the test script.
# args: <log-dir> <file-prexix>
__DMAAPMR_store_docker_logs() {
if [ $RUNMODE == "KUBE" ]; then
for podname in $(kubectl get pods -n $KUBE_ONAP_NAMESPACE -l "autotest=DMAAPMR" -o custom-columns=":metadata.name"); do
kubectl logs -n $KUBE_ONAP_NAMESPACE $podname --tail=-1 > $1$2_$podname.log 2>&1
done
else
docker logs $MR_DMAAP_APP_NAME > $1$2mr.log 2>&1
docker logs $MR_KAFKA_APP_NAME > $1$2_mr_kafka.log 2>&1
docker logs $MR_ZOOKEEPER_APP_NAME > $1$2_mr_zookeeper.log 2>&1
fi
}
# Initial setup of protocol, host and ports
# This function is called for apps managed by the test script.
# args: -
__MR_initial_setup() {
use_mr_http
}
# Initial setup of protocol, host and ports
# This function is called for apps managed by the test script.
# args: -
__DMAAPMR_initial_setup() {
: # handle by __MR_initial_setup
}
# Set app short-name, app name and namespace for logging runtime statistics of kubernets pods or docker containers
# For docker, the namespace shall be excluded
# This function is called for apps managed by the test script as well as for prestarted apps.
# args: -
__MR_statisics_setup() {
if [ $RUNMODE == "KUBE" ]; then
echo "MR $MR_STUB_APP_NAME $KUBE_ONAP_NAMESPACE"
else
echo "MR $MR_STUB_APP_NAME"
fi
}
# Set app short-name, app name and namespace for logging runtime statistics of kubernets pods or docker containers
# For docker, the namespace shall be excluded
# This function is called for apps managed by the test script as well as for prestarted apps.
# args: -
__DMAAPMR_statisics_setup() {
if [ $RUNMODE == "KUBE" ]; then
echo ""
else
echo ""
fi
}
#######################################################
# Description of port mappings when running MR-STUB only or MR-STUB + MESSAGE-ROUTER
#
# 'MR-STUB only' is started when only 'MR' is included in the test script. Both the test scripts and app will then use MR-STUB as a message-router simulator.
#
# 'MR-STUB + MESSAGE-ROUTER' is started when 'MR' and 'DMAAPMR' is included in the testscripts. DMAAPMR is the real message router including kafka and zookeeper.
# In this configuration, MR-STUB is used by the test-script as frontend to the message-router while app are using the real message-router.
#
# DOCKER KUBE
# ---------------------------------------------------------------------------------------------------------------------------------------------------
# MR-STUB MR-STUB
# +++++++ +++++++
# localhost container service pod
# ==============================================================================================================================================
# 10 MR_STUB_LOCALHOST_PORT -> 13 MR_INTERNAL_PORT 15 MR_EXTERNAL_PORT -> 17 MR_INTERNAL_PORT
# 12 MR_STUB_LOCALHOST_SECURE_PORT -> 14 MR_INTERNAL_SECURE_PORT 16 MR_EXTERNAL_SECURE_PORT -> 18 MR_INTERNAL_SECURE_PORT
# MESSAGE-ROUTER MESSAGE-ROUTER
# ++++++++++++++ ++++++++++++++
# localhost container service pod
# ===================================================================================================================================================
# 20 MR_DMAAP_LOCALHOST_PORT -> 23 MR_INTERNAL_PORT 25 MR_EXTERNAL_PORT -> 27 MR_INTERNAL_PORT
# 22 MR_DMAAP_LOCALHOST_SECURE_PORT -> 24 MR_INTERNAL_SECURE_PORT 26 MR_EXTERNAL_SECURE_PORT -> 28 MR_INTERNAL_SECURE_PORT
# Running only the MR-STUB - apps using MR-STUB
# DOCKER KUBE
# localhost: 10 and 12 -
# via proxy (script): 13 and 14 via proxy (script): 15 and 16
# apps: 13 and 14 apps: 15 and 16
# Running MR-STUB (as frontend for test script) and MESSAGE-ROUTER - apps using MESSAGE-ROUTER
# DOCKER KUBE
# localhost: 10 and 12 -
# via proxy (script): 13 and 14 via proxy (script): 15 and 16
# apps: 23 and 24 apps: 25 and 26
#
use_mr_http() {
__mr_set_protocoll "http" $MR_INTERNAL_PORT $MR_EXTERNAL_PORT $MR_INTERNAL_SECURE_PORT $MR_EXTERNAL_SECURE_PORT
}
use_mr_https() {
__mr_set_protocoll "https" $MR_INTERNAL_PORT $MR_EXTERNAL_PORT $MR_INTERNAL_SECURE_PORT $MR_EXTERNAL_SECURE_PORT
}
# Setup paths to svc/container for internal and external access
# args: <protocol> <internal-port> <external-port> <internal-secure-port> <external-secure-port>
__mr_set_protocoll() {
echo -e $BOLD"$MR_STUB_DISPLAY_NAME and $MR_DMAAP_DISPLAY_NAME protocol setting"$EBOLD
echo -e " Using $BOLD http $EBOLD towards $MR_STUB_DISPLAY_NAME and $MR_DMAAP_DISPLAY_NAME"
## Access to Dmaap mediator
MR_HTTPX=$1
if [ $MR_HTTPX == "http" ]; then
INT_PORT=$2
EXT_PORT=$3
else
INT_PORT=$4
EXT_PORT=$5
fi
# Access via test script
MR_STUB_PATH=$MR_HTTPX"://"$MR_STUB_APP_NAME":"$INT_PORT # access from script via proxy, docker
MR_DMAAP_PATH=$MR_HTTPX"://"$MR_DMAAP_APP_NAME":"$INT_PORT # access from script via proxy, docker
MR_DMAAP_ADAPTER_HTTP="" # Access to dmaap mr via proyx - set only if app is included
MR_SERVICE_PATH=$MR_STUB_PATH # access container->container, docker - access pod->svc, kube
MR_KAFKA_SERVICE_PATH=""
__check_included_image "DMAAPMR"
if [ $? -eq 0 ]; then
MR_SERVICE_PATH=$MR_DMAAP_PATH # access container->container, docker - access pod->svc, kube
MR_DMAAP_ADAPTER_HTTP=$MR_DMAAP_PATH
MR_KAFKA_SERVICE_PATH=$MR_KAFKA_APP_NAME":"$MR_KAFKA_PORT
fi
# For directing calls from script to e.g.PMS via message rounter
# These cases shall always go though the mr-stub
MR_ADAPTER_HTTP="http://"$MR_STUB_APP_NAME":"$2
MR_ADAPTER_HTTPS="https://"$MR_STUB_APP_NAME":"$4
MR_DMAAP_ADAPTER_TYPE="REST"
if [ $RUNMODE == "KUBE" ]; then
MR_STUB_PATH=$MR_HTTPX"://"$MR_STUB_APP_NAME.$KUBE_ONAP_NAMESPACE":"$EXT_PORT # access from script via proxy, kube
MR_DMAAP_PATH=$MR_HTTPX"://"$MR_DMAAP_APP_NAME.$KUBE_ONAP_NAMESPACE":"$EXT_PORT # access from script via proxy, kube
MR_SERVICE_PATH=$MR_STUB_PATH
__check_included_image "DMAAPMR"
if [ $? -eq 0 ]; then
MR_SERVICE_PATH=$MR_DMAAP_PATH
MR_DMAAP_ADAPTER_HTTP=$MR_DMAAP_PATH
MR_KAFKA_SERVICE_PATH=$MR_KAFKA_APP_NAME"."$KUBE_ONAP_NAMESPACE":"$MR_KAFKA_PORT
fi
__check_prestarted_image "DMAAPMR"
if [ $? -eq 0 ]; then
MR_SERVICE_PATH=$MR_DMAAP_PATH
MR_DMAAP_ADAPTER_HTTP=$MR_DMAAP_PATH
MR_KAFKA_SERVICE_PATH=$MR_KAFKA_APP_NAME"."$KUBE_ONAP_NAMESPACE":"$MR_KAFKA_PORT
fi
# For directing calls from script to e.g.PMS, via message rounter
# These calls shall always go though the mr-stub
MR_ADAPTER_HTTP="http://"$MR_STUB_APP_NAME.$KUBE_ONAP_NAMESPACE":"$3
MR_ADAPTER_HTTPS="https://"$MR_STUB_APP_NAME.$KUBE_ONAP_NAMESPACE":"$5
fi
# For calls from script to the mr-stub
MR_STUB_ADAPTER=$MR_STUB_PATH
MR_STUB_ADAPTER_TYPE="REST"
echo ""
}
# use_mr_http() { 2 3 4 5 6 7
# __mr_set_protocoll "http" $MR_INTERNAL_PORT $MR_EXTERNAL_PORT $MR_INTERNAL_PORT $MR_EXTERNAL_PORT $MR_INTERNAL_SECURE_PORT $MR_EXT_SECURE_PORT
# }
# use_mr_https() {
# __mr_set_protocoll "https" $MR_INTERNAL_SECURE_PORT $MR_EXTERNAL_SECURE_PORT
# }
# # Setup paths to svc/container for internal and external access
# # args: <protocol> <internal-port> <external-port> <mr-stub-internal-port> <mr-stub-external-port> <mr-stub-internal-secure-port> <mr-stub-external-secure-port>
# __mr_set_protocoll() {
# echo -e $BOLD"$MR_STUB_DISPLAY_NAME and $MR_DMAAP_DISPLAY_NAME protocol setting"$EBOLD
# echo -e " Using $BOLD http $EBOLD towards $MR_STUB_DISPLAY_NAME and $MR_DMAAP_DISPLAY_NAME"
# ## Access to Dmaap mediator
# MR_HTTPX=$1
# # Access via test script
# MR_STUB_PATH=$MR_HTTPX"://"$MR_STUB_APP_NAME":"$2 # access from script via proxy, docker
# MR_DMAAP_PATH=$MR_HTTPX"://"$MR_DMAAP_APP_NAME":"$2 # access from script via proxy, docker
# MR_DMAAP_ADAPTER_HTTP="" # Access to dmaap mr via proyx - set only if app is included
# MR_SERVICE_PATH=$MR_STUB_PATH # access container->container, docker - access pod->svc, kube
# __check_included_image "DMAAPMR"
# if [ $? -eq 0 ]; then
# MR_SERVICE_PATH=$MR_DMAAP_PATH # access container->container, docker - access pod->svc, kube
# MR_DMAAP_ADAPTER_HTTP=$MR_DMAAP_PATH
# fi
# # For directing calls from script to e.g.PMS via message rounter
# # These cases shall always go though the mr-stub
# MR_ADAPTER_HTTP="http://"$MR_STUB_APP_NAME":"$4
# MR_ADAPTER_HTTPS="https://"$MR_STUB_APP_NAME":"$6
# MR_DMAAP_ADAPTER_TYPE="REST"
# if [ $RUNMODE == "KUBE" ]; then
# MR_STUB_PATH=$MR_HTTPX"://"$MR_STUB_APP_NAME.$KUBE_ONAP_NAMESPACE":"$3 # access from script via proxy, kube
# MR_DMAAP_PATH=$MR_HTTPX"://"$MR_DMAAP_APP_NAME.$KUBE_ONAP_NAMESPACE":"$3 # access from script via proxy, kube
# MR_SERVICE_PATH=$MR_STUB_PATH
# __check_included_image "DMAAPMR"
# if [ $? -eq 0 ]; then
# MR_SERVICE_PATH=$MR_DMAAP_PATH
# MR_DMAAP_ADAPTER_HTTP=$MR_DMAAP_PATH
# fi
# __check_prestarted_image "DMAAPMR"
# if [ $? -eq 0 ]; then
# MR_SERVICE_PATH=$MR_DMAAP_PATH
# MR_DMAAP_ADAPTER_HTTP=$MR_DMAAP_PATH
# fi
# # For directing calls from script to e.g.PMS, via message rounter
# # These calls shall always go though the mr-stub
# MR_ADAPTER_HTTP="http://"$MR_STUB_APP_NAME":"$5
# MR_ADAPTER_HTTPS="https://"$MR_STUB_APP_NAME":"$7
# fi
# # For calls from script to the mr-stub
# MR_STUB_ADAPTER=$MR_STUB_PATH
# MR_STUB_ADAPTER_TYPE="REST"
# echo ""
# }
# Export env vars for config files, docker compose and kube resources
# args: -
__dmaapmr_export_vars() {
#Docker only
export DOCKER_SIM_NWNAME
export ONAP_ZOOKEEPER_IMAGE
export MR_ZOOKEEPER_APP_NAME
export ONAP_KAFKA_IMAGE
export MR_KAFKA_APP_NAME
export ONAP_DMAAPMR_IMAGE
export MR_DMAAP_APP_NAME
export MR_DMAAP_LOCALHOST_PORT
export MR_INTERNAL_PORT
export MR_DMAAP_LOCALHOST_SECURE_PORT
export MR_INTERNAL_SECURE_PORT
export MR_DMAAP_HOST_MNT_DIR
export KUBE_ONAP_NAMESPACE
export MR_EXTERNAL_PORT
export MR_EXTERNAL_SECURE_PORT
export MR_KAFKA_PORT
export MR_ZOOKEEPER_PORT
export MR_KAFKA_SERVICE_PATH
}
# Export env vars for config files, docker compose and kube resources
# args: -
__mr_export_vars() {
#Docker only
export DOCKER_SIM_NWNAME
export MR_STUB_APP_NAME
export MRSTUB_IMAGE
export MR_INTERNAL_PORT
export MR_INTERNAL_SECURE_PORT
export MR_EXTERNAL_PORT
export MR_EXTERNAL_SECURE_PORT
export MR_STUB_LOCALHOST_PORT
export MR_STUB_LOCALHOST_SECURE_PORT
export MR_STUB_CERT_MOUNT_DIR
export MR_STUB_DISPLAY_NAME
export KUBE_ONAP_NAMESPACE
export MR_EXTERNAL_PORT
export MR_KAFKA_SERVICE_PATH
}
# Start the Message Router stub interface in the simulator group
# args: -
# (Function for test scripts)
start_mr() {
echo -e $BOLD"Starting $MR_DMAAP_DISPLAY_NAME and/or $MR_STUB_DISPLAY_NAME"$EBOLD
if [ $RUNMODE == "KUBE" ]; then
# Table of possible combinations of included mr and included/prestarted dmaap-mr
# mr can never be prestarted
# mr can be used stand alone
# if dmaapmr is included/prestarted, then mr is needed as well as frontend
# Inverted logic - 0 mean true, 1 means false
# mr prestarted 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1
# mr included 0 0 1 1 0 0 1 1 0 0 1 1 0 0 1 1
# dmaap prestarted 0 0 0 0 1 1 1 1 0 0 0 0 1 1 1 1
# dmaap included 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1
# ==================================================
# OK 1 1 1 1 1 0 1 1 1 0 1 1 1 0 1 1
__check_prestarted_image 'MR'
retcode_prestarted_mr=$?
__check_included_image 'MR'
retcode_included_mr=$?
__check_prestarted_image 'DMAAPMR'
retcode_prestarted_dmaapmr=$?
__check_included_image 'DMAAPMR'
retcode_included_dmaapmr=$?
paramerror=1
if [ $retcode_prestarted_mr -ne 0 ] && [ $retcode_included_mr -eq 0 ]; then
if [ $retcode_prestarted_dmaapmr -ne 0 ] && [ $retcode_included_dmaapmr -eq 0 ]; then
paramerror=0
fi
fi
if [ $retcode_prestarted_mr -ne 0 ] && [ $retcode_included_mr -eq 0 ]; then
if [ $retcode_prestarted_dmaapmr -eq 0 ] && [ $retcode_included_dmaapmr -ne 0 ]; then
paramerror=0
fi
fi
if [ $retcode_prestarted_mr -ne 0 ] && [ $retcode_included_mr -eq 0 ]; then
if [ $retcode_prestarted_dmaapmr -ne 0 ] && [ $retcode_included_dmaapmr -ne 0 ]; then
paramerror=0
fi
fi
if [ $paramerror -ne 0 ]; then
echo -e $RED"The Message Router apps 'MR' and/or 'DMAAPMR' are not included in this test script"$ERED
echo -e $RED"The Message Router will not be started"$ERED
echo -e $RED"Both MR and DAAMPMR - or - only MR - need to be included and/or prestarted"$ERED
exit
fi
if [ $retcode_prestarted_dmaapmr -eq 0 ]; then
echo -e " Using existing $MR_DMAAP_APP_NAME deployment and service"
__kube_scale deployment $MR_DMAAP_APP_NAME $KUBE_ONAP_NAMESPACE 1
fi
if [ $retcode_included_dmaapmr -eq 0 ]; then
__dmaapmr_export_vars
#Check if onap namespace exists, if not create it
__kube_create_namespace $KUBE_ONAP_NAMESPACE
# copy config files
MR_MNT_CONFIG_BASEPATH=$SIM_GROUP"/"$MR_DMAAP_COMPOSE_DIR$MR_DMAAP_HOST_MNT_DIR
cp -r $SIM_GROUP"/"$MR_DMAAP_COMPOSE_DIR$MR_DMAAP_HOST_CONFIG_DIR/* $MR_MNT_CONFIG_BASEPATH
# Create config maps - dmaapmr app
configfile=$MR_MNT_CONFIG_BASEPATH/mr/MsgRtrApi.properties
output_yaml=$PWD/tmp/dmaapmr_msgrtrapi_cfc.yaml
__kube_create_configmap dmaapmr-msgrtrapi.properties $KUBE_ONAP_NAMESPACE autotest DMAAPMR $configfile $output_yaml
configfile=$MR_MNT_CONFIG_BASEPATH/mr/logback.xml
output_yaml=$PWD/tmp/dmaapmr_logback_cfc.yaml
__kube_create_configmap dmaapmr-logback.xml $KUBE_ONAP_NAMESPACE autotest DMAAPMR $configfile $output_yaml
configfile=$MR_MNT_CONFIG_BASEPATH/mr/cadi.properties
output_yaml=$PWD/tmp/dmaapmr_cadi_cfc.yaml
__kube_create_configmap dmaapmr-cadi.properties $KUBE_ONAP_NAMESPACE autotest DMAAPMR $configfile $output_yaml
# Create config maps - kafka app
configfile=$MR_MNT_CONFIG_BASEPATH/kafka/zk_client_jaas.conf
output_yaml=$PWD/tmp/dmaapmr_zk_client_cfc.yaml
__kube_create_configmap dmaapmr-zk-client-jaas.conf $KUBE_ONAP_NAMESPACE autotest DMAAPMR $configfile $output_yaml
# Create config maps - zookeeper app
configfile=$MR_MNT_CONFIG_BASEPATH/zk/zk_server_jaas.conf
output_yaml=$PWD/tmp/dmaapmr_zk_server_cfc.yaml
__kube_create_configmap dmaapmr-zk-server-jaas.conf $KUBE_ONAP_NAMESPACE autotest DMAAPMR $configfile $output_yaml
# Create service
input_yaml=$SIM_GROUP"/"$MR_DMAAP_COMPOSE_DIR"/"svc.yaml
output_yaml=$PWD/tmp/dmaapmr_svc.yaml
__kube_create_instance service $MR_DMAAP_APP_NAME $input_yaml $output_yaml
# Create app
input_yaml=$SIM_GROUP"/"$MR_DMAAP_COMPOSE_DIR"/"app.yaml
output_yaml=$PWD/tmp/dmaapmr_app.yaml
__kube_create_instance app $MR_DMAAP_APP_NAME $input_yaml $output_yaml
# echo " Retrieving host and ports for service..."
# MR_DMAAP_HOST_NAME=$(__kube_get_service_host $MR_DMAAP_APP_NAME $KUBE_ONAP_NAMESPACE)
# MR_EXT_PORT=$(__kube_get_service_port $MR_DMAAP_APP_NAME $KUBE_ONAP_NAMESPACE "http")
# MR_EXT_SECURE_PORT=$(__kube_get_service_port $MR_DMAAP_APP_NAME $KUBE_ONAP_NAMESPACE "https")
# echo " Host IP, http port, https port: $MR_DMAAP_APP_NAME $MR_EXT_PORT $MR_EXT_SECURE_PORT"
# MR_SERVICE_PATH=""
# if [ $MR_HTTPX == "http" ]; then
# MR_DMAAP_PATH=$MR_HTTPX"://"$MR_DMAAP_HOST_NAME":"$MR_EXT_PORT
# MR_SERVICE_PATH=$MR_HTTPX"://"$MR_DMAAP_APP_NAME"."$KUBE_ONAP_NAMESPACE":"$MR_EXT_PORT
# else
# MR_DMAAP_PATH=$MR_HTTPX"://"$MR_DMAAP_HOST_NAME":"$MR_EXT_SECURE_PORT
# MR_SERVICE_PATH=$MR_HTTPX"://"$MR_DMAAP_APP_NAME"."$KUBE_ONAP_NAMESPACE":"$MR_EXT_SECURE_PORT
# fi
__check_service_start $MR_DMAAP_APP_NAME $MR_DMAAP_PATH$MR_DMAAP_ALIVE_URL
# Cannot create topics, returns 400 forever.....topics will be created during pipeclean below
#__create_topic $MR_READ_TOPIC "Topic for reading policy messages"
#__create_topic $MR_WRITE_TOPIC "Topic for writing policy messages"
# __dmaap_pipeclean $MR_READ_TOPIC "/events/$MR_READ_TOPIC" "/events/$MR_READ_TOPIC/users/policy-agent?timeout=1000&limit=100"
#
# __dmaap_pipeclean $MR_WRITE_TOPIC "/events/$MR_WRITE_TOPIC" "/events/$MR_WRITE_TOPIC/users/mr-stub?timeout=1000&limit=100"
#__dmaap_pipeclean "unauthenticated.dmaapmed.json" "/events/unauthenticated.dmaapmed.json" "/events/unauthenticated.dmaapmed.json/dmaapmediatorproducer/STD_Fault_Messages?timeout=1000&limit=100"
#__dmaap_pipeclean "unauthenticated.dmaapadp.json" "/events/unauthenticated.dmaapadp.json" "/events/unauthenticated.dmaapadp.json/dmaapadapterproducer/msgs?timeout=1000&limit=100"
if [ $# -gt 0 ]; then
if [ $(($#%3)) -eq 0 ]; then
while [ $# -gt 0 ]; do
__dmaap_pipeclean "$1" "$2/$1" "$2/$1/$3?timeout=1000&limit=100"
shift; shift; shift;
done
else
echo -e $RED" args: start_mr [<topic-name> <base-url> <group-and-user-url>]*"$ERED
echo -e $RED" Got: $@"$ERED
exit 1
fi
fi
echo " Current topics:"
curlString="$MR_DMAAP_PATH/topics"
result=$(__do_curl "$curlString")
echo $result | indent2
fi
if [ $retcode_included_mr -eq 0 ]; then
__mr_export_vars
if [ $retcode_prestarted_dmaapmr -eq 0 ] || [ $retcode_included_dmaapmr -eq 0 ]; then # Set topics for dmaap
export TOPIC_READ="http://$MR_DMAAP_APP_NAME.$KUBE_ONAP_NAMESPACE:$MR_INTERNAL_PORT/events/$MR_READ_TOPIC"
export TOPIC_WRITE="http://$MR_DMAAP_APP_NAME.$KUBE_ONAP_NAMESPACE:$MR_INTERNAL_PORT/events/$MR_WRITE_TOPIC/users/mr-stub?timeout=15000&limit=100"
export GENERIC_TOPICS_UPLOAD_BASEURL="http://$MR_DMAAP_APP_NAME.$KUBE_ONAP_NAMESPACE:$MR_INTERNAL_PORT"
else
export TOPIC_READ=""
export TOPIC_WRITE=""
export GENERIC_TOPICS_UPLOAD_BASEURL=""
fi
#Check if onap namespace exists, if not create it
__kube_create_namespace $KUBE_ONAP_NAMESPACE
# Create service
input_yaml=$SIM_GROUP"/"$MR_STUB_COMPOSE_DIR"/"svc.yaml
output_yaml=$PWD/tmp/mr_svc.yaml
__kube_create_instance service $MR_STUB_APP_NAME $input_yaml $output_yaml
# Create app
input_yaml=$SIM_GROUP"/"$MR_STUB_COMPOSE_DIR"/"app.yaml
output_yaml=$PWD/tmp/mr_app.yaml
__kube_create_instance app $MR_STUB_APP_NAME $input_yaml $output_yaml
fi
# echo " Retrieving host and ports for service..."
# MR_STUB_HOST_NAME=$(__kube_get_service_host $MR_STUB_APP_NAME $KUBE_ONAP_NAMESPACE)
# MR_EXT_PORT=$(__kube_get_service_port $MR_STUB_APP_NAME $KUBE_ONAP_NAMESPACE "http")
# MR_EXT_SECURE_PORT=$(__kube_get_service_port $MR_STUB_APP_NAME $KUBE_ONAP_NAMESPACE "https")
# echo " Host IP, http port, https port: $MR_STUB_APP_NAME $MR_EXT_PORT $MR_EXT_SECURE_PORT"
# if [ $MR_HTTPX == "http" ]; then
# MR_STUB_PATH=$MR_HTTPX"://"$MR_STUB_HOST_NAME":"$MR_EXT_PORT
# if [ -z "$MR_SERVICE_PATH" ]; then
# MR_SERVICE_PATH=$MR_HTTPX"://"$MR_STUB_APP_NAME"."$KUBE_ONAP_NAMESPACE":"$MR_EXT_PORT
# fi
# else
# MR_STUB_PATH=$MR_HTTPX"://"$MR_STUB_HOST_NAME":"$MR_EXT_SECURE_PORT
# if [ -z "$MR_SERVICE_PATH" ]; then
# MR_SERVICE_PATH=$MR_HTTPX"://"$MR_STUB_APP_NAME"."$KUBE_ONAP_NAMESPACE":"$MR_EXT_SECURE_PORT
# fi
# fi
# MR_ADAPTER_HTTP="http://"$MR_STUB_HOST_NAME":"$MR_EXT_PORT
# MR_ADAPTER_HTTPS="https://"$MR_STUB_HOST_NAME":"$MR_EXT_SECURE_PORT
# MR_STUB_ADAPTER=$MR_STUB_PATH
# MR_STUB_ADAPTER_TYPE="REST"
__check_service_start $MR_STUB_APP_NAME $MR_STUB_PATH$MR_STUB_ALIVE_URL
echo -ne " Service $MR_STUB_APP_NAME - reset "$SAMELINE
result=$(__do_curl $MR_STUB_PATH/reset)
if [ $? -ne 0 ]; then
echo -e " Service $MR_STUB_APP_NAME - reset $RED Failed $ERED - will continue"
else
echo -e " Service $MR_STUB_APP_NAME - reset $GREEN OK $EGREEN"
fi
else
__check_included_image 'DMAAPMR'
retcode_dmaapmr=$?
__check_included_image 'MR'
retcode_mr=$?
if [ $retcode_dmaapmr -ne 0 ] && [ $retcode_mr -ne 0 ]; then
echo -e $RED"The Message Router apps 'MR' and/or 'DMAAPMR' are not included in this test script"$ERED
echo -e $RED"The Message Router will not be started"$ERED
echo -e $RED"Both MR and DAAMPMR - or - only MR - need to be included"
exit
fi
if [ $retcode_dmaapmr -eq 0 ] && [ $retcode_mr -ne 0 ]; then
echo -e $RED"The Message Router apps 'MR' and/or 'DMAAPMR' are not included in this test script"$ERED
echo -e $RED"The Message Router will not be started"$ERED
echo -e $RED"Both MR and DAAMPMR - or - only MR - need to be included"
exit
fi
export TOPIC_READ=""
export TOPIC_WRITE=""
export GENERIC_TOPICS_UPLOAD_BASEURL=""
if [ $retcode_dmaapmr -eq 0 ]; then # Set topics for dmaap
export TOPIC_READ="http://$MR_DMAAP_APP_NAME:$MR_INTERNAL_PORT/events/$MR_READ_TOPIC"
export TOPIC_WRITE="http://$MR_DMAAP_APP_NAME:$MR_INTERNAL_PORT/events/$MR_WRITE_TOPIC/users/mr-stub?timeout=15000&limit=100"
export GENERIC_TOPICS_UPLOAD_BASEURL="http://$MR_DMAAP_APP_NAME:$MR_INTERNAL_PORT"
fi
__dmaapmr_export_vars
if [ $retcode_dmaapmr -eq 0 ]; then
# copy config files
MR_MNT_CONFIG_BASEPATH=$SIM_GROUP"/"$MR_DMAAP_COMPOSE_DIR$MR_DMAAP_HOST_MNT_DIR
cp -r $SIM_GROUP"/"$MR_DMAAP_COMPOSE_DIR$MR_DMAAP_HOST_CONFIG_DIR/* $MR_MNT_CONFIG_BASEPATH
# substitute vars
configfile=$MR_MNT_CONFIG_BASEPATH/mr/MsgRtrApi.properties
cp $configfile $configfile"_tmp"
envsubst < $configfile"_tmp" > $configfile
__start_container $MR_DMAAP_COMPOSE_DIR "" NODOCKERARGS 1 $MR_DMAAP_APP_NAME
__check_service_start $MR_DMAAP_APP_NAME $MR_DMAAP_PATH$MR_DMAAP_ALIVE_URL
# Cannot create topics, returns 400 forever.....topics will be created during pipeclean below
#__create_topic $MR_READ_TOPIC "Topic for reading policy messages"
#__create_topic $MR_WRITE_TOPIC "Topic for writing policy messages"
#__dmaap_pipeclean $MR_READ_TOPIC "/events/$MR_READ_TOPIC" "/events/$MR_READ_TOPIC/users/policy-agent?timeout=1000&limit=100"
#__dmaap_pipeclean $MR_WRITE_TOPIC "/events/$MR_WRITE_TOPIC" "/events/$MR_WRITE_TOPIC/users/mr-stub?timeout=1000&limit=100"
if [ $# -gt 0 ]; then
if [ $(($#%3)) -eq 0 ]; then
while [ $# -gt 0 ]; do
__dmaap_pipeclean "$1" "$2/$1" "$2/$1/$3?timeout=1000&limit=100"
shift; shift; shift;
done
else
echo -e $RED" args: start_mr [<topic-name> <base-url> <group-and-user-url>]*"$ERED
echo -e $RED" Got: $@"$ERED
exit 1
fi
fi
#__dmaap_pipeclean "unauthenticated.dmaapmed.json" "/events/unauthenticated.dmaapmed.json" "/events/unauthenticated.dmaapmed.json/dmaapmediatorproducer/STD_Fault_Messages?timeout=1000&limit=100"
#__dmaap_pipeclean "unauthenticated.dmaapadp.json" "/events/unauthenticated.dmaapadp.json" "/events/unauthenticated.dmaapadp.json/dmaapadapterproducer/msgs?timeout=1000&limit=100"
echo " Current topics:"
curlString="$MR_DMAAP_PATH/topics"
result=$(__do_curl "$curlString")
echo $result | indent2
fi
__mr_export_vars
if [ $retcode_mr -eq 0 ]; then
__start_container $MR_STUB_COMPOSE_DIR "" NODOCKERARGS 1 $MR_STUB_APP_NAME
__check_service_start $MR_STUB_APP_NAME $MR_STUB_PATH$MR_STUB_ALIVE_URL
fi
fi
echo ""
return 0
}
# Create a dmaap mr topic
# args: <topic name> <topic-description>
__create_topic() {
echo -ne " Creating topic: $1"$SAMELINE
json_topic="{\"topicName\":\"$1\",\"partitionCount\":\"2\", \"replicationCount\":\"3\", \"transactionEnabled\":\"false\",\"topicDescription\":\"$2\"}"
fname="./tmp/$1.json"
echo $json_topic > $fname
query="/topics/create"
topic_retries=10
while [ $topic_retries -gt 0 ]; do
let topic_retries=topic_retries-1
res="$(__do_curl_to_api DMAAPMR POST $query $fname)"
status=${res:${#res}-3}
if [[ $status == "2"* ]]; then
topic_retries=0
echo -e " Creating topic: $1 $GREEN OK $EGREEN"
else
if [ $topic_retries -eq 0 ]; then
echo -e " Creating topic: $1 $RED Failed $ERED"
((RES_CONF_FAIL++))
return 1
else
sleep 1
fi
fi
done
echo
return 0
}
# Do a pipeclean of a topic - to overcome dmaap mr bug...
# args: <topic> <post-url> <read-url> [<num-retries>]
__dmaap_pipeclean() {
pipeclean_retries=50
if [ $# -eq 4 ]; then
pipeclean_retries=$4
fi
echo -ne " Doing dmaap-mr pipe cleaning on topic: $1"$SAMELINE
while [ $pipeclean_retries -gt 0 ]; do
if [[ $1 == *".text" ]]; then
echo "pipeclean-$1:$pipeclean_retries" > ./tmp/__dmaap_pipeclean.txt
curlString="$MR_DMAAP_PATH$2 -X POST -H Content-Type:text/plain -d@./tmp/__dmaap_pipeclean.txt"
else
echo "{\"pipeclean-$1\":$pipeclean_retries}" > ./tmp/__dmaap_pipeclean.json
curlString="$MR_DMAAP_PATH$2 -X POST -H Content-Type:application/json -d@./tmp/__dmaap_pipeclean.json"
fi
let pipeclean_retries=pipeclean_retries-1
result=$(__do_curl "$curlString")
if [ $? -ne 0 ]; then
sleep 1
else
curlString="$MR_DMAAP_PATH$3"
result=$(__do_curl "$curlString")
if [ $? -eq 0 ]; then
if [ $result != "[]" ]; then
echo -e " Doing dmaap-mr pipe cleaning on topic: $1 $GREEN OK $EGREEN"
return 0
else
sleep 1
fi
fi
fi
done
echo -e "Doing dmaap-mr pipe cleaning on topic: $1 $RED Failed $ERED"
return 1
}
### Generic test cases for varaible checking
# Tests if a variable value in the MR stub is equal to a target value and and optional timeout.
# Arg: <variable-name> <target-value> - This test set pass or fail depending on if the variable is
# equal to the target or not.
# Arg: <variable-name> <target-value> <timeout-in-sec> - This test waits up to the timeout seconds
# before setting pass or fail depending on if the variable value becomes equal to the target
# value or not.
# (Function for test scripts)
mr_equal() {
if [ $# -eq 2 ] || [ $# -eq 3 ]; then
__var_test "MR" $MR_STUB_PATH/counter/ $1 "=" $2 $3
else
((RES_CONF_FAIL++))
__print_err "Wrong args to mr_equal, needs two or three args: <sim-param> <target-value> [ timeout ]" $@
fi
}
# Tests if a variable value in the MR stub is greater than a target value and and optional timeout.
# Arg: <variable-name> <target-value> - This test set pass or fail depending on if the variable is
# greater than the target or not.
# Arg: <variable-name> <target-value> <timeout-in-sec> - This test waits up to the timeout seconds
# before setting pass or fail depending on if the variable value becomes greater than the target
# value or not.
# (Function for test scripts)
mr_greater() {
if [ $# -eq 2 ] || [ $# -eq 3 ]; then
__var_test "MR" $MR_STUB_PATH/counter/ $1 ">" $2 $3
else
((RES_CONF_FAIL++))
__print_err "Wrong args to mr_greater, needs two or three args: <sim-param> <target-value> [ timeout ]" $@
fi
}
# Read a variable value from MR sim and send to stdout. Arg: <variable-name>
mr_read() {
echo "$(__do_curl $MR_STUB_PATH/counter/$1)"
}
# Print a variable value from the MR stub.
# arg: <variable-name>
# (Function for test scripts)
mr_print() {
if [ $# != 1 ]; then
((RES_CONF_FAIL++))
__print_err "need one arg, <mr-param>" $@
exit 1
fi
echo -e $BOLD"INFO(${BASH_LINENO[0]}): mrstub, $1 = $(__do_curl $MR_STUB_PATH/counter/$1)"$EBOLD
}
# Send json to topic in mr-stub.
# arg: <topic-url> <json-msg>
# (Function for test scripts)
mr_api_send_json() {
__log_conf_start $@
if [ $# -ne 2 ]; then
__print_err "<topic-url> <json-msg>" $@
return 1
fi
query=$1
fname=$PWD/tmp/json_payload_to_mr.json
echo $2 > $fname
res="$(__do_curl_to_api MRSTUB POST $query $fname)"
status=${res:${#res}-3}
if [ $status -ne 200 ]; then
__log_conf_fail_status_code 200 $status
return 1
fi
__log_conf_ok
return 0
}
# Send text to topic in mr-stub.
# arg: <topic-url> <text-msg>
# (Function for test scripts)
mr_api_send_text() {
__log_conf_start $@
if [ $# -ne 2 ]; then
__print_err "<topic-url> <text-msg>" $@
return 1
fi
query=$1
fname=$PWD/tmp/text_payload_to_mr.txt
echo $2 > $fname
res="$(__do_curl_to_api MRSTUB POST $query $fname text/plain)"
status=${res:${#res}-3}
if [ $status -ne 200 ]; then
__log_conf_fail_status_code 200 $status
return 1
fi
__log_conf_ok
return 0
}
# Send json file to topic in mr-stub.
# arg: <topic-url> <json-file>
# (Function for test scripts)
mr_api_send_json_file() {
__log_conf_start $@
if [ $# -ne 2 ]; then
__print_err "<topic-url> <json-file>" $@
return 1
fi
query=$1
if [ ! -f $2 ]; then
__log_test_fail_general "File $2 does not exist"
return 1
fi
#Create json array for mr
datafile="tmp/mr_api_send_json_file.json"
{ echo -n "[" ; cat $2 ; echo -n "]" ;} > $datafile
res="$(__do_curl_to_api MRSTUB POST $query $datafile)"
status=${res:${#res}-3}
if [ $status -ne 200 ]; then
__log_conf_fail_status_code 200 $status
return 1
fi
__log_conf_ok
return 0
}
# Send text file to topic in mr-stub.
# arg: <topic-url> <text-file>
# (Function for test scripts)
mr_api_send_text_file() {
__log_conf_start $@
if [ $# -ne 2 ]; then
__print_err "<topic-url> <text-file>" $@
return 1
fi
query=$1
if [ ! -f $2 ]; then
__log_test_fail_general "File $2 does not exist"
return 1
fi
res="$(__do_curl_to_api MRSTUB POST $query $2 text/plain)"
status=${res:${#res}-3}
if [ $status -ne 200 ]; then
__log_conf_fail_status_code 200 $status
return 1
fi
__log_conf_ok
return 0
}
# Create json file for payload
# arg: <size-in-kb> <filename>
mr_api_generate_json_payload_file() {
__log_conf_start $@
if [ $# -ne 2 ]; then
__print_err "<topic-url> <json-file>" $@
return 1
fi
if [ $1 -lt 1 ] || [ $1 -gt 10000 ]; then
__log_conf_fail_general "Only size between 1k and 10000k supported"
return 1
fi
echo -n "{\"a\":[" > $2
LEN=$(($1*150))
echo -n "\"a0\"" >> $2
for ((idx=1; idx<$LEN; idx++))
do
echo -n ",\"a$idx\"" >> $2
done
echo -n "]}" >> $2
__log_conf_ok
return 0
}
# Create tet file for payload
# arg: <size-in-kb> <filename>
mr_api_generate_text_payload_file() {
__log_conf_start $@
if [ $# -ne 2 ]; then
__print_err "<topic-url> <text-file>" $@
return 1
fi
if [ $1 -lt 1 ] || [ $1 -gt 10000 ]; then
__log_conf_fail_general "Only size between 1k and 10000k supported"
return 1
fi
echo -n "" > $2
LEN=$(($1*100))
for ((idx=0; idx<$LEN; idx++))
do
echo -n "ABCDEFGHIJ" >> $2
done
__log_conf_ok
return 0
}