Features 11020,11022-11026: Advanced cluster management

Change-Id: I348e6149326e8ba7c2c79ea7ff2ea2223ed047ca
Signed-off-by: garciadeblas <gerardo.garciadeblas@telefonica.com>
diff --git a/osm_lcm/odu_libs/common.py b/osm_lcm/odu_libs/common.py
new file mode 100644
index 0000000..179135e
--- /dev/null
+++ b/osm_lcm/odu_libs/common.py
@@ -0,0 +1,57 @@
+#######################################################################################
+# Copyright ETSI Contributors and Others.
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+#    http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
+# implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#######################################################################################
+
+
+import base64
+
+
+async def create_secret(self, secret_name, secret_namespace, secret_key, secret_value):
+    async def check_secret(secret_name, secret_namespace, secret_key, secret_value):
+        self.logger.info(f"Checking content of secret {secret_name} ...")
+        returned_secret_data = await self._kubectl.get_secret_content(
+            name=secret_name,
+            namespace=secret_namespace,
+        )
+        self.logger.debug(f"Result from async call: { returned_secret_data }")
+
+        self.logger.debug("Comparing secret values")
+        returned_secret_value = base64.b64decode(
+            returned_secret_data[secret_key]
+        ).decode("utf-8")
+        self.logger.debug(f"secret_data_original={secret_value}")
+        self.logger.debug(f"secret_data_received={returned_secret_value}")
+        self.logger.info(
+            f"Result of secret comparison: {secret_value==returned_secret_value} ..."
+        )
+
+    self.logger.info(
+        f"Creating secret {secret_name} in namespace {secret_namespace} ..."
+    )
+    secret_data = {secret_key: base64.b64encode(secret_value.encode()).decode("utf-8")}
+    self.logger.info(f"Secret name: {secret_name}")
+    self.logger.info(f"Secret data {secret_data}")
+    self.logger.info(f"Namespace: {secret_namespace}")
+    self.logger.info("Calling N2VC kubectl to create secret...")
+    await self._kubectl.create_secret(
+        name=secret_name,
+        data=secret_data,
+        namespace=secret_namespace,
+        secret_type="Opaque",
+    )
+    self.logger.info(f"Secret {secret_name} CREATED")
+
+    await check_secret(secret_name, secret_namespace, secret_key, secret_value)