+#
+# Copyright 2018 EveryUP Srl
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+import errno
import requests
import logging
-import json
import tarfile
import yaml
-import pyaml
import StringIO
from lib.util import Util
import hashlib
import os
+import re
+from requests.packages.urllib3.exceptions import InsecureRequestWarning
-logging.basicConfig(level=logging.DEBUG)
+requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
+
+logging.basicConfig(level=logging.INFO)
log = logging.getLogger('helper.py')
+logging.getLogger("urllib3").setLevel(logging.INFO)
class Client(object):
self._user_endpoint = 'admin/v1/users'
self._host = os.getenv('OSM_SERVER', "localhost")
self._so_port = 9999
- self._base_path = "https://{0}:{1}/osm".format(self._host, self._so_port)
+ self._base_path = 'https://{0}:{1}/osm'.format(
+ self._host, self._so_port)
def auth(self, args):
result = {'error': True, 'data': ''}
token_url = "{0}/{1}".format(self._base_path, self._token_endpoint)
- headers = {"Content-Type": "application/yaml", "accept": "application/json"}
+ headers = {"Content-Type": "application/yaml",
+ "accept": "application/json"}
try:
- r = requests.post(token_url, json=args, verify=False, headers=headers)
+ r = requests.post(token_url, json=args,
+ verify=False, headers=headers)
except Exception as e:
- print "saltata"
log.exception(e)
result['data'] = str(e)
return result
- if r.status_code == requests.codes.ok:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
result['data'] = Util.json_loads_byteified(r.text)
return result
- def nsd_list(self, token):
+ def switch_project(self, args):
result = {'error': True, 'data': ''}
- headers = {"Content-Type": "application/yaml", "accept": "application/json",
- 'Authorization': 'Bearer {}'.format(token['id'])}
-
- _url = "{0}/nsd/v1/ns_descriptors_content".format(self._base_path)
+ token_url = "{0}/{1}".format(self._base_path, self._token_endpoint)
+ headers = {"Content-Type": "application/yaml",
+ "accept": "application/json"}
try:
- r = requests.get(_url, params=None, verify=False, stream=True, headers=headers)
+ r = requests.post(token_url, json=args,
+ verify=False, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- if r.status_code == requests.codes.ok:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
+
result['data'] = Util.json_loads_byteified(r.text)
return result
- def vnfd_list(self, token):
+ def role_list(self, token):
result = {'error': True, 'data': ''}
- headers = {"Content-Type": "application/yaml", "accept": "application/json",
+ headers = {"Content-Type": "application/json", "accept": "application/json",
'Authorization': 'Bearer {}'.format(token['id'])}
- _url = "{0}/vnfpkgm/v1/vnf_packages_content".format(self._base_path)
+ _url = "{0}/admin/v1/roles".format(self._base_path)
try:
- r = requests.get(_url, params=None, verify=False, stream=True, headers=headers)
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- if r.status_code == requests.codes.ok:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
result['data'] = Util.json_loads_byteified(r.text)
return result
- def ns_list(self, token):
+ def role_create(self, token, role_data):
result = {'error': True, 'data': ''}
- headers = {"Content-Type": "application/yaml", "accept": "application/json",
+ headers = {"Content-Type": "application/json", "accept": "application/json",
'Authorization': 'Bearer {}'.format(token['id'])}
- _url = "{0}/nslcm/v1/ns_instances_content".format(self._base_path)
+ _url = "{0}/admin/v1/roles".format(self._base_path)
+
try:
- r = requests.get(_url, params=None, verify=False, stream=True, headers=headers)
+ r = requests.post(_url, json=role_data,
+ verify=False, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- if r.status_code == requests.codes.ok:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
result['data'] = Util.json_loads_byteified(r.text)
-
return result
- def vnf_list(self, token):
+ def role_update(self, token, role_id, role_data):
result = {'error': True, 'data': ''}
- headers = {"Content-Type": "application/yaml", "accept": "application/json",
+ headers = {"Content-Type": "application/json", "accept": "application/json",
'Authorization': 'Bearer {}'.format(token['id'])}
- _url = "{0}/nslcm/v1/vnfrs".format(self._base_path)
+ _url = "{0}/admin/v1/roles/{1}".format(self._base_path, role_id)
try:
- r = requests.get(_url, params=None, verify=False, stream=True, headers=headers)
+ r = requests.patch(_url, json=role_data,
+ verify=False, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- if r.status_code == requests.codes.ok:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
- result['data'] = Util.json_loads_byteified(r.text)
+ else:
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+ def role_delete(self, token, id, force=None):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/json", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ query_path = ''
+ if force:
+ query_path = '?FORCE=true'
+ _url = "{0}/admin/v1/roles/{1}{2}".format(
+ self._base_path, id, query_path)
+ try:
+ r = requests.delete(_url, params=None,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ else:
+ result['data'] = Util.json_loads_byteified(r.text)
return result
- def nsd_delete(self, token, id):
+ def role_get(self, token, id):
result = {'error': True, 'data': ''}
- headers = {"Content-Type": "application/yaml", "accept": "application/json",
+ headers = {"Content-Type": "application/json", "accept": "application/json",
'Authorization': 'Bearer {}'.format(token['id'])}
- _url = "{0}/nsd/v1/ns_descriptors_content/{1}".format(self._base_path, id)
+ _url = "{0}/admin/v1/roles/{1}".format(self._base_path, id)
try:
- r = requests.delete(_url, params=None, verify=False,headers=headers)
+ r = requests.get(_url, params=None, verify=False, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- if r.status_code == requests.codes.ok:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
result['data'] = Util.json_loads_byteified(r.text)
return result
- def vnfd_delete(self, token, id):
+ def user_list(self, token):
result = {'error': True, 'data': ''}
- headers = {"Content-Type": "application/yaml", "accept": "application/json",
+ headers = {"Content-Type": "application/json", "accept": "application/json",
'Authorization': 'Bearer {}'.format(token['id'])}
- _url = "{0}/vnfpkgm/v1/vnf_packages_content/{1}".format(self._base_path, id)
+ _url = "{0}/admin/v1/users".format(self._base_path)
try:
- r = requests.delete(_url, params=None, verify=False, headers=headers)
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- if r.status_code == requests.codes.ok:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
result['data'] = Util.json_loads_byteified(r.text)
+
return result
- def nsd_onboard(self, token, package):
+ def user_create(self, token, user_data):
result = {'error': True, 'data': ''}
- headers = {"Content-Type": "application/gzip", "accept": "application/json",
+ headers = {"Content-Type": "application/json", "accept": "application/json",
'Authorization': 'Bearer {}'.format(token['id'])}
- with open('/tmp/'+package.name, 'wb+') as destination:
- for chunk in package.chunks():
- destination.write(chunk)
- headers['Content-File-MD5'] = self.md5(open('/tmp/'+package.name, 'rb'))
- _url = "{0}/nsd/v1/ns_descriptors_content/".format(self._base_path)
+
+ _url = "{0}/admin/v1/users".format(self._base_path)
+
try:
- r = requests.post(_url, data=open('/tmp/'+package.name, 'rb'), verify=False, headers=headers)
+ r = requests.post(_url, json=user_data,
+ verify=False, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- if r.status_code == requests.codes.created:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
result['data'] = Util.json_loads_byteified(r.text)
return result
- def vnfd_onboard(self, token, package):
+ def user_update(self, token, id, user_data):
result = {'error': True, 'data': ''}
- headers = {"Content-Type": "application/gzip", "accept": "application/json",
+ headers = {"Content-Type": "application/json", "accept": "application/json",
'Authorization': 'Bearer {}'.format(token['id'])}
- with open('/tmp/'+package.name, 'wb+') as destination:
- for chunk in package.chunks():
- destination.write(chunk)
- headers['Content-File-MD5'] = self.md5(open('/tmp/'+package.name, 'rb'))
- _url = "{0}/vnfpkgm/v1/vnf_packages_content".format(self._base_path)
+
+ _url = "{0}/admin/v1/users/{1}".format(self._base_path, id)
try:
- r = requests.post(_url, data=open('/tmp/'+package.name, 'rb'), verify=False, headers=headers)
+ r = requests.patch(_url, json=user_data,
+ verify=False, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- if r.status_code == requests.codes.created:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
- result['data'] = Util.json_loads_byteified(r.text)
+ else:
+ result['data'] = Util.json_loads_byteified(r.text)
return result
- def nsd_update(self, token, id, data):
+ def user_delete(self, token, id):
result = {'error': True, 'data': ''}
- headers = {"Content-Type": "application/gzip", "accept": "application/json",
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
'Authorization': 'Bearer {}'.format(token['id'])}
- # get the package onboarded
- tar_pkg = self.get_nsd_pkg(token, id)
- tarf = tarfile.open(fileobj=tar_pkg)
+ _url = "{0}/admin/v1/users/{1}".format(self._base_path, id)
+ try:
+ r = requests.delete(_url, params=None,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ else:
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
- tarf = self._descriptor_update(tarf, data)
- headers['Content-File-MD5'] = self.md5(open('/tmp/' + tarf.getnames()[0] + ".tar.gz", 'rb'))
+ def get_user_info(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/admin/v1/users/{1}".format(self._base_path, id)
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
- _url = "{0}/nsd/v1/ns_descriptors/{1}/nsd_content".format(self._base_path, id)
+ def get_domains(self, token):
+ result = {'error': False, 'data': ''}
+ headers = {"accept": "application/json", 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/admin/v1/domains".format(self._base_path)
try:
- r = requests.put(_url, data=open('/tmp/' + tarf.getnames()[0] + ".tar.gz", 'rb'), verify=False,
- headers=headers)
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- if r.status_code == requests.codes.no_content:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
return result
- def vnfd_update(self, token, id, data):
- result = {'error': True, 'data': ''}
- headers = {"Content-Type": "application/gzip", "accept": "application/json",
+ def get_projects(self, token, uuids):
+ result = {'error': False, 'data': ''}
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
'Authorization': 'Bearer {}'.format(token['id'])}
- # get the package onboarded
- tar_pkg = self.get_vnfd_pkg(token, id)
- tarf = tarfile.open(fileobj=tar_pkg)
-
- tarf = self._descriptor_update(tarf, data)
- headers['Content-File-MD5'] = self.md5(open('/tmp/' + tarf.getnames()[0] + ".tar.gz", 'rb'))
+ projects = []
+ try:
+ for uuid in uuids:
+ _url = "{0}/admin/v1/projects/{1}".format(
+ self._base_path, uuid)
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ if r.status_code not in (200, 201, 202, 204):
+ raise Exception()
+ projects.append(Util.json_loads_byteified(r.text))
+ except Exception as e:
+ log.exception(e)
+ result['error'] = True
+ result['data'] = str(e)
+ return result
+ result['data'] = projects
+ return result
- _url = "{0}/vnfpkgm/v1/vnf_packages/{1}/package_content".format(self._base_path, id)
+ def project_list(self, token):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/admin/v1/projects".format(self._base_path)
try:
- r = requests.put(_url, data=open('/tmp/' + tarf.getnames()[0] + ".tar.gz", 'rb'), verify=False,
- headers=headers)
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- if r.status_code == requests.codes.no_content:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
return result
- def get_nsd_pkg(self, token, id):
+ def project_get(self, token, id):
result = {'error': True, 'data': ''}
- headers = { "accept": "application/zip",
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
'Authorization': 'Bearer {}'.format(token['id'])}
-
- _url = "{0}/nsd/v1/ns_descriptors/{1}/nsd_content".format(self._base_path, id)
+ _url = "{0}/admin/v1/projects/{1}".format(self._base_path, id)
try:
- r = requests.get(_url, params=None, verify=False, stream=True, headers=headers)
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- if r.status_code == requests.codes.ok:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
- tarf = StringIO.StringIO(r.content)
- return tarf
+ result['data'] = Util.json_loads_byteified(r.text)
return result
- def get_vnfd_pkg(self, token, id):
+ def project_create(self, token, project_data):
+
result = {'error': True, 'data': ''}
- headers = {"accept": "application/zip",
+ headers = {"Content-Type": "application/json", "accept": "application/json",
'Authorization': 'Bearer {}'.format(token['id'])}
- _url = "{0}/vnfpkgm/v1/vnf_packages/{1}/package_content".format(self._base_path, id)
+
+ _url = "{0}/admin/v1/projects".format(self._base_path)
+
try:
- r = requests.get(_url, params=None, verify=False, stream=True, headers=headers)
- print r.status_code
+ r = requests.post(_url, json=project_data,
+ verify=False, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- if r.status_code == requests.codes.ok:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
- tarf = StringIO.StringIO(r.content)
- return tarf
+ result['data'] = Util.json_loads_byteified(r.text)
return result
- def _descriptor_update(self, tarf, data):
- print tarf.getnames()
- # extract the package on a tmp directory
- tarf.extractall('/tmp')
-
- for name in tarf.getnames():
- if name.endswith(".yaml") or name.endswith(".yml"):
- with open('/tmp/' + name, 'w') as outfile:
- yaml.safe_dump(data, outfile, default_flow_style=False)
- break
-
- tarf_temp = tarfile.open('/tmp/' + tarf.getnames()[0] + ".tar.gz", "w:gz")
- # tarf_temp = tarfile.open("pippo.tar.gz", "w:gz")
- print tarf_temp.getnames()
- # tarf_temp.add('/tmp/'+tarf.getnames()[0])
- for tarinfo in tarf:
- # if tarinfo.name.startswith(tarf.getnames()[0]):
- # new_name = tarinfo.name[len(tarf.getnames()[0]):]
- tarf_temp.add('/tmp/' + tarinfo.name, tarinfo.name, recursive=False)
- print tarf_temp.getnames()
- tarf_temp.close()
- return tarf
+ def project_edit(self, token, id, project_data):
- def nsd_get(self, token, id):
result = {'error': True, 'data': ''}
- headers = {'Content-Type': 'application/yaml',
+ headers = {"Content-Type": "application/json", "accept": "application/json",
'Authorization': 'Bearer {}'.format(token['id'])}
- _url = "{0}/nsd/v1/ns_descriptors/{1}/nsd".format(self._base_path, id)
+
+ _url = "{0}/admin/v1/projects/{1}".format(self._base_path, id)
+
try:
- r = requests.get(_url, params=None, verify=False, stream=True, headers=headers)
+ r = requests.patch(_url, json=project_data,
+ verify=False, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- if r.status_code == requests.codes.ok:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
- return yaml.load(r.text)
- else:
- try:
- result['data'] = r.json()
- except Exception as e:
- result['data'] = {}
return result
- def vnfd_get(self, token, id):
+ def project_delete(self, token, id):
result = {'error': True, 'data': ''}
- headers = {'Content-Type': 'application/yaml',
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
'Authorization': 'Bearer {}'.format(token['id'])}
- _url = "{0}/vnfpkgm/v1/vnf_packages/{1}/vnfd".format(self._base_path, id)
+
+ _url = "{0}/admin/v1/projects/{1}".format(self._base_path, id)
try:
- r = requests.get(_url, params=None, verify=False, stream=True, headers=headers)
+ r = requests.delete(_url, params=None,
+ verify=False, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- if r.status_code == requests.codes.ok:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
- return yaml.load(r.text)
else:
- try:
- result['data'] = r.json()
- except Exception as e:
- result['data'] = {}
+ result['data'] = Util.json_loads_byteified(r.text)
return result
- def nsd_artifacts(self, token, id):
+ def nst_details(self, token, id):
result = {'error': True, 'data': ''}
- headers = {'Content-Type': 'application/yaml', 'accept': 'text/plain',
+ headers = {"Content-Type": "application/json", "accept": "application/json",
'Authorization': 'Bearer {}'.format(token['id'])}
- _url = "{0}/nsd/v1/ns_descriptors/{1}/artifacts".format(self._base_path, id)
+ _url = "{0}/nst/v1/netslice_templates/{1}".format(self._base_path, id)
try:
- r = requests.get(_url, params=None, verify=False, stream=True, headers=headers)
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- if r.status_code == requests.codes.ok:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
- result['data'] = r.text
- else:
- try:
- result['data'] = r.json()
- except Exception as e:
- result['data'] = {}
+ result['data'] = Util.json_loads_byteified(r.text)
return result
- def vnf_packages_artifacts(self, token, id):
+ def nst_content(self, token, id):
result = {'error': True, 'data': ''}
- headers = {'Content-Type': 'application/yaml', 'accept': 'text/plain',
+ headers = {"Content-Type": "application/json", "accept": "text/plain",
'Authorization': 'Bearer {}'.format(token['id'])}
- _url = "{0}/vnfpkgm/v1/vnf_packages/{1}/artifacts".format(self._base_path, id)
+ _url = "{0}/nst/v1/netslice_templates/{1}/nst".format(
+ self._base_path, id)
try:
- r = requests.get(_url, params=None, verify=False, stream=True, headers=headers)
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- if r.status_code == requests.codes.ok:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
- result['data'] = r.text
- else:
- try:
- result['data'] = r.json()
- except Exception as e:
- result['data'] = {}
+ result['data'] = Util.json2yaml(yaml.load(str(r.text)))
return result
- def ns_create(self, token, ns_data):
- token = self.get_token()
+ def nst_list(self, token):
result = {'error': True, 'data': ''}
headers = {"Content-Type": "application/yaml", "accept": "application/json",
'Authorization': 'Bearer {}'.format(token['id'])}
- _url = "{0}/nslcm/v1/ns_instances_content".format(self._base_path)
-
+ _url = "{0}/nst/v1/netslice_templates".format(self._base_path)
try:
- r = requests.post(_url, json=ns_data, verify=False, headers=headers)
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- if r.status_code == requests.codes.ok:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
result['data'] = Util.json_loads_byteified(r.text)
+
return result
- def ns_op_list(self, token, id):
+ def nsd_list(self, token, filter=None):
result = {'error': True, 'data': ''}
- headers = {"Content-Type": "application/json", "accept": "application/json",
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
'Authorization': 'Bearer {}'.format(token['id'])}
- _url = "{0}/nslcm/v1/ns_lcm_op_occs/?nsInstanceId={1}".format(self._base_path, id)
-
+ query_path = ''
+ if filter:
+ query_path = '?_admin.type='+filter
+ _url = "{0}/nsd/v1/ns_descriptors_content{1}".format(
+ self._base_path, query_path)
try:
- r = requests.get(_url, params=None, verify=False, stream=True, headers=headers)
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- if r.status_code == requests.codes.ok:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
result['data'] = Util.json_loads_byteified(r.text)
return result
- def ns_op(self, token, id):
+ def vnfd_list(self, token, filter=None):
result = {'error': True, 'data': ''}
- headers = {"Content-Type": "application/json", "accept": "application/json",
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
'Authorization': 'Bearer {}'.format(token['id'])}
- _url = "{0}/nslcm/v1/ns_lcm_op_occs/{1}".format(self._base_path, id)
+ query_path = ''
+ if filter:
+ query_path = '?_admin.type='+filter
+ _url = "{0}/vnfpkgm/v1/vnf_packages_content{1}".format(
+ self._base_path, query_path)
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+
+ return result
+ def nsi_list(self, token):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/nsilcm/v1/netslice_instances".format(self._base_path)
try:
- r = requests.get(_url, params=None, verify=False, stream=True, headers=headers)
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- if r.status_code == requests.codes.ok:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
result['data'] = Util.json_loads_byteified(r.text)
return result
- def ns_action(self, token, id, action_payload):
+ def ns_list(self, token):
result = {'error': True, 'data': ''}
- headers = {"Content-Type": "application/json", "accept": "application/json",
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/nslcm/v1/ns_instances_content".format(self._base_path)
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
- _url = "{0}/nslcm/v1/ns_instances/{1}/action".format(self._base_path, id)
+ return result
+ def vnf_list(self, token):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/nslcm/v1/vnfrs".format(self._base_path)
try:
- r = requests.post(_url, json=action_payload, verify=False, headers=headers)
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- print r.status_code
- if r.status_code == requests.codes.created:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
result['data'] = Util.json_loads_byteified(r.text)
+
return result
- def ns_delete(self, token, id, force=None):
+ def pdu_list(self, token):
result = {'error': True, 'data': ''}
headers = {"Content-Type": "application/yaml", "accept": "application/json",
'Authorization': 'Bearer {}'.format(token['id'])}
- query_path = ''
- if force:
- query_path = '?FORCE=true'
- _url = "{0}/nslcm/v1/ns_instances_content/{1}{2}".format(self._base_path, id, query_path)
+ _url = "{0}/pdu/v1/pdu_descriptors".format(self._base_path)
try:
- r = requests.delete(_url, params=None, verify=False, headers=headers)
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- if r.status_code == requests.codes.ok:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
result['data'] = Util.json_loads_byteified(r.text)
+
return result
- def ns_get(self, token, id):
+ def nst_delete(self, token, id):
result = {'error': True, 'data': ''}
- headers = {"Content-Type": "application/json", "accept": "application/json",
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
'Authorization': 'Bearer {}'.format(token['id'])}
- _url = "{0}/nslcm/v1/ns_instances_content/{1}".format(self._base_path, id)
+ _url = "{0}/nst/v1/netslice_templates/{1}?FORCE=True".format(
+ self._base_path, id)
try:
- r = requests.get(_url, params=None, verify=False, stream=True, headers=headers)
+ r = requests.delete(_url, params=None,
+ verify=False, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- if r.status_code == requests.codes.ok:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
- result['data'] = Util.json_loads_byteified(r.text)
+
return result
- def vnf_get(self, token, id):
+ def nsd_delete(self, token, id):
result = {'error': True, 'data': ''}
- headers = {"Content-Type": "application/json", "accept": "application/json",
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
'Authorization': 'Bearer {}'.format(token['id'])}
- _url = "{0}/nslcm/v1/vnfrs/{1}".format(self._base_path, id)
+ _url = "{0}/nsd/v1/ns_descriptors_content/{1}".format(
+ self._base_path, id)
try:
- r = requests.get(_url, params=None, verify=False, stream=True, headers=headers)
+ r = requests.delete(_url, params=None,
+ verify=False, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- if r.status_code == requests.codes.ok:
+ if r:
result['error'] = False
- result['data'] = Util.json_loads_byteified(r.text)
+ if r.status_code != requests.codes.no_content:
+ result['data'] = Util.json_loads_byteified(r.text)
return result
- def ns_alarm_create(self, token, id, alarm_payload):
+ def vnfd_delete(self, token, id):
result = {'error': True, 'data': ''}
- headers = {"Content-Type": "application/json",
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
'Authorization': 'Bearer {}'.format(token['id'])}
- _url = "{0}/test/message/alarm_request".format(self._base_path)
+
+ _url = "{0}/vnfpkgm/v1/vnf_packages_content/{1}".format(
+ self._base_path, id)
try:
- r = requests.post(_url, json=alarm_payload, verify=False, headers=headers)
+ r = requests.delete(_url, params=None,
+ verify=False, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- print r.status_code
- if r.status_code == requests.codes.ok:
+ if r:
result['error'] = False
- #result['data'] = Util.json_loads_byteified(r.text)
- result['data'] = r.text
+ if r.status_code != requests.codes.no_content:
+ result['data'] = Util.json_loads_byteified(r.text)
return result
- def ns_metric_export(self, token, id, metric_payload):
+ def nst_onboard(self, token, template):
result = {'error': True, 'data': ''}
- headers = {"Content-Type": "application/json",
+ headers = {"Content-Type": "application/gzip", "accept": "application/json",
'Authorization': 'Bearer {}'.format(token['id'])}
- _url = "{0}/test/message/metric_request".format(self._base_path)
+ _url = "{0}/nst/v1/netslice_templates_content".format(self._base_path)
try:
- r = requests.post(_url, json=metric_payload, verify=False, headers=headers)
+ fileName, fileExtension = os.path.splitext(template.name)
+ if fileExtension == '.gz':
+ headers["Content-Type"] = "application/gzip"
+ else:
+ headers["Content-Type"] = "application/yaml"
+ r = requests.post(_url, data=template,
+ verify=False, headers=headers)
except Exception as e:
log.exception(e)
result['data'] = str(e)
return result
- print r.status_code
- if r.status_code == requests.codes.ok:
+ if r.status_code in (200, 201, 202, 204):
result['error'] = False
- #result['data'] = Util.json_loads_byteified(r.text)
- result['data'] = r.text
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def nsd_onboard(self, token, package):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/gzip", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ with open('/tmp/' + package.name, 'wb+') as destination:
+ for chunk in package.chunks():
+ destination.write(chunk)
+ headers['Content-File-MD5'] = self.md5(
+ open('/tmp/' + package.name, 'rb'))
+ _url = "{0}/nsd/v1/ns_descriptors_content/".format(self._base_path)
+ try:
+ r = requests.post(_url, data=open(
+ '/tmp/' + package.name, 'rb'), verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def vnfd_onboard(self, token, package):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/gzip", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ with open('/tmp/' + package.name, 'wb+') as destination:
+ for chunk in package.chunks():
+ destination.write(chunk)
+ headers['Content-File-MD5'] = self.md5(
+ open('/tmp/' + package.name, 'rb'))
+ _url = "{0}/vnfpkgm/v1/vnf_packages_content".format(self._base_path)
+ try:
+ r = requests.post(_url, data=open(
+ '/tmp/' + package.name, 'rb'), verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def nsd_create_pkg_base(self, token, pkg_name):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/gzip", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+
+ _url = "{0}/nsd/v1/ns_descriptors_content/".format(self._base_path)
+
+ try:
+ self._create_base_pkg('nsd', pkg_name)
+ headers['Content-Filename'] = pkg_name + '.tar.gz'
+ r = requests.post(_url, data=open(
+ '/tmp/' + pkg_name + '.tar.gz', 'rb'), verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['data'] = r.json()
+ result['error'] = False
+ if r.status_code == requests.codes.conflict:
+ result['data'] = "Invalid ID."
+ return result
+
+ def vnfd_create_pkg_base(self, token, pkg_name):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/gzip", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+
+ _url = "{0}/vnfpkgm/v1/vnf_packages_content".format(self._base_path)
+
+ try:
+ self._create_base_pkg('vnfd', pkg_name)
+ r = requests.post(_url, data=open(
+ '/tmp/' + pkg_name + '.tar.gz', 'rb'), verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['data'] = r.json()
+ result['error'] = False
+ if r.status_code == requests.codes.conflict:
+ result['data'] = "Invalid ID."
+ return result
+
+ def nsd_clone(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/gzip", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+
+ # get the package onboarded
+ tar_pkg = self.get_nsd_pkg(token, id)
+ tarf = tarfile.open(fileobj=tar_pkg)
+ tarf = self._descriptor_clone(tarf, 'nsd')
+ headers['Content-File-MD5'] = self.md5(
+ open('/tmp/' + tarf.getnames()[0] + "_clone.tar.gz", 'rb'))
+
+ _url = "{0}/nsd/v1/ns_descriptors_content/".format(self._base_path)
+
+ try:
+ r = requests.post(_url, data=open('/tmp/' + tarf.getnames()[0] + "_clone.tar.gz", 'rb'), verify=False,
+ headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ if r.status_code == requests.codes.conflict:
+ result['data'] = "Invalid ID."
+
+ return result
+
+ def vnfd_clone(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/gzip", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+
+ # get the package onboarded
+ tar_pkg = self.get_vnfd_pkg(token, id)
+ tarf = tarfile.open(fileobj=tar_pkg)
+
+ tarf = self._descriptor_clone(tarf, 'vnfd')
+ headers['Content-File-MD5'] = self.md5(
+ open('/tmp/' + tarf.getnames()[0] + "_clone.tar.gz", 'rb'))
+
+ _url = "{0}/vnfpkgm/v1/vnf_packages_content".format(self._base_path)
+
+ try:
+ r = requests.post(_url, data=open('/tmp/' + tarf.getnames()[0] + "_clone.tar.gz", 'rb'), verify=False,
+ headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ if r.status_code == requests.codes.conflict:
+ result['data'] = "Invalid ID."
+
+ return result
+
+ def nst_content_update(self, token, id, template):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/nst/v1/netslice_templates/{1}/nst_content".format(
+ self._base_path, id)
+ try:
+ r = requests.put(_url, data=template,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ return result
+
+ def nsd_update(self, token, id, data):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/gzip", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+
+ # get the package onboarded
+ tar_pkg = self.get_nsd_pkg(token, id)
+ tarf = tarfile.open(fileobj=tar_pkg)
+
+ tarf = self._descriptor_update(tarf, data)
+ headers['Content-File-MD5'] = self.md5(
+ open('/tmp/' + tarf.getnames()[0] + ".tar.gz", 'rb'))
+
+ _url = "{0}/nsd/v1/ns_descriptors/{1}/nsd_content".format(
+ self._base_path, id)
+
+ try:
+ r = requests.put(_url, data=open('/tmp/' + tarf.getnames()[0] + ".tar.gz", 'rb'), verify=False,
+ headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ else:
+ try:
+ result['data'] = r.json()
+ except Exception as e:
+ result['data'] = {}
+
+ return result
+
+ def vnfd_update(self, token, id, data):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/gzip", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+
+ # get the package onboarded
+ tar_pkg = self.get_vnfd_pkg(token, id)
+ tarf = tarfile.open(fileobj=tar_pkg)
+
+ tarf = self._descriptor_update(tarf, data)
+ headers['Content-File-MD5'] = self.md5(
+ open('/tmp/' + tarf.getnames()[0] + ".tar.gz", 'rb'))
+
+ _url = "{0}/vnfpkgm/v1/vnf_packages/{1}/package_content".format(
+ self._base_path, id)
+
+ try:
+ r = requests.put(_url, data=open('/tmp/' + tarf.getnames()[0] + ".tar.gz", 'rb'), verify=False,
+ headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ else:
+ try:
+ result['data'] = r.json()
+ except Exception as e:
+ result['data'] = {}
+
+ return result
+
+ def get_nsd_pkg(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {"accept": "application/zip",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+
+ _url = "{0}/nsd/v1/ns_descriptors/{1}/nsd_content".format(
+ self._base_path, id)
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ tarf = StringIO.StringIO(r.content)
+ return tarf
+ return result
+
+ def get_vnfd_pkg(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {"accept": "application/zip",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/vnfpkgm/v1/vnf_packages/{1}/package_content".format(
+ self._base_path, id)
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ tarf = StringIO.StringIO(r.content)
+ return tarf
+ return result
+
+ def _descriptor_update(self, tarf, data):
+ # extract the package on a tmp directory
+ tarf.extractall('/tmp')
+ regex = re.compile(r"^[^/]+(/[^/]+\.(yaml|yml))$", re.U)
+ for name in tarf.getnames():
+ if regex.match(name):
+ with open('/tmp/' + name, 'w') as outfile:
+ yaml.safe_dump(data, outfile, default_flow_style=False)
+ break
+
+ tarf_temp = tarfile.open(
+ '/tmp/' + tarf.getnames()[0] + ".tar.gz", "w:gz")
+
+ for tarinfo in tarf:
+ tarf_temp.add('/tmp/' + tarinfo.name,
+ tarinfo.name, recursive=False)
+ tarf_temp.close()
+ return tarf
+
+ def _create_base_pkg(self, descriptor_type, pkg_name):
+ filename = '/tmp/'+pkg_name+'/' + pkg_name + '.yaml'
+ if descriptor_type == 'nsd':
+ descriptor = {
+ "nsd:nsd-catalog": {
+ "nsd": [
+ {
+ "short-name": str(pkg_name),
+ "vendor": "OSM Composer",
+ "description": str(pkg_name) + " descriptor",
+ "vld": [],
+ "constituent-vnfd": [],
+ "version": "1.0",
+ "id": str(pkg_name),
+ "name": str(pkg_name)
+ }
+ ]
+ }
+ }
+
+ elif descriptor_type == 'vnfd':
+ descriptor = {
+ "vnfd:vnfd-catalog": {
+ "vnfd": [
+ {
+ "short-name": str(pkg_name),
+ "vdu": [],
+ "description": "",
+ "mgmt-interface": {
+ "cp": ""
+ },
+ "id": str(pkg_name),
+ "version": "1.0",
+ "internal-vld": [],
+ "connection-point": [],
+ "name": str(pkg_name)
+ }
+ ]
+ }
+ }
+
+ if not os.path.exists(os.path.dirname(filename)):
+ try:
+ os.makedirs(os.path.dirname(filename))
+ except OSError as exc: # Guard against race condition
+ if exc.errno != errno.EEXIST:
+ raise
+
+ with open('/tmp/' + pkg_name + '/' + pkg_name + '.yaml', 'w') as yaml_file:
+ yaml_file.write(yaml.dump(descriptor, default_flow_style=False))
+
+ tarf_temp = tarfile.open('/tmp/' + pkg_name + '.tar.gz', "w:gz")
+ tarf_temp.add('/tmp/'+pkg_name+'/' + pkg_name + '.yaml',
+ pkg_name + '/' + pkg_name + '.yaml', recursive=False)
+ tarf_temp.close()
+
+ def _descriptor_clone(self, tarf, descriptor_type):
+ # extract the package on a tmp directory
+ tarf.extractall('/tmp')
+
+ for name in tarf.getnames():
+ if name.endswith(".yaml") or name.endswith(".yml"):
+ with open('/tmp/' + name, 'r') as outfile:
+ yaml_object = yaml.load(outfile)
+
+ if descriptor_type == 'nsd':
+ nsd_list = yaml_object['nsd:nsd-catalog']['nsd']
+ for nsd in nsd_list:
+ nsd['id'] = 'clone_' + nsd['id']
+ nsd['name'] = 'clone_' + nsd['name']
+ nsd['short-name'] = 'clone_' + nsd['short-name']
+ elif descriptor_type == 'vnfd':
+ vnfd_list = yaml_object['vnfd:vnfd-catalog']['vnfd']
+ for vnfd in vnfd_list:
+ vnfd['id'] = 'clone_' + vnfd['id']
+ vnfd['name'] = 'clone_' + vnfd['name']
+ vnfd['short-name'] = 'clone_' + vnfd['short-name']
+
+ with open('/tmp/' + name, 'w') as yaml_file:
+ yaml_file.write(
+ yaml.dump(yaml_object, default_flow_style=False))
+ break
+
+ tarf_temp = tarfile.open(
+ '/tmp/' + tarf.getnames()[0] + "_clone.tar.gz", "w:gz")
+
+ for tarinfo in tarf:
+ tarf_temp.add('/tmp/' + tarinfo.name,
+ tarinfo.name, recursive=False)
+ tarf_temp.close()
+ return tarf
+
+ def nsd_get(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {'Content-Type': 'application/yaml',
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/nsd/v1/ns_descriptors/{1}/nsd".format(self._base_path, id)
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ return yaml.load(r.text)
+ else:
+ try:
+ result['data'] = r.json()
+ except Exception as e:
+ result['data'] = {}
+ return result
+
+ def vnfd_get(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {'Content-Type': 'application/yaml',
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/vnfpkgm/v1/vnf_packages/{1}/vnfd".format(
+ self._base_path, id)
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ return yaml.load(r.text)
+ else:
+ try:
+ result['data'] = r.json()
+ except Exception as e:
+ result['data'] = {}
+ return result
+
+ def nsd_artifacts(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {'Content-Type': 'application/yaml', 'accept': 'text/plain',
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/nsd/v1/ns_descriptors/{1}/artifacts".format(
+ self._base_path, id)
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = r.text
+ else:
+ try:
+ result['data'] = r.json()
+ except Exception as e:
+ result['data'] = {}
+
+ return result
+
+ def vnf_packages_artifacts(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {'Content-Type': 'application/yaml', 'accept': 'text/plain',
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/vnfpkgm/v1/vnf_packages/{1}/artifacts".format(
+ self._base_path, id)
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = r.text
+ else:
+ try:
+ result['data'] = r.json()
+ except Exception as e:
+ result['data'] = {}
+
+ return result
+
+ def nsi_create(self, token, nsi_data):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+
+ _url = "{0}/nsilcm/v1/netslice_instances_content".format(
+ self._base_path)
+
+ try:
+ r = requests.post(_url, json=nsi_data,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def ns_create(self, token, ns_data):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+
+ _url = "{0}/nslcm/v1/ns_instances_content".format(self._base_path)
+
+ try:
+ r = requests.post(_url, json=ns_data,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def pdu_create(self, token, pdu_data):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+
+ _url = "{0}/pdu/v1/pdu_descriptors".format(self._base_path)
+
+ try:
+ r = requests.post(_url, json=pdu_data,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def ns_op_list(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/json", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/nslcm/v1/ns_lcm_op_occs/?nsInstanceId={1}".format(
+ self._base_path, id)
+
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+
+ return result
+
+ def nsi_op_list(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/json", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/nsilcm/v1/nsi_lcm_op_occs/?netsliceInstanceId={1}".format(
+ self._base_path, id)
+
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+
+ return result
+
+ def ns_op(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/json", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/nslcm/v1/ns_lcm_op_occs/{1}".format(self._base_path, id)
+
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+
+ return result
+
+ def ns_action(self, token, id, action_payload):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/json", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+
+ _url = "{0}/nslcm/v1/ns_instances/{1}/action".format(
+ self._base_path, id)
+
+ try:
+ r = requests.post(_url, json=action_payload,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def nsi_delete(self, token, id, force=None):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ query_path = ''
+ if force:
+ query_path = '?FORCE=true'
+ _url = "{0}/nsilcm/v1/netslice_instances_content/{1}{2}".format(
+ self._base_path, id, query_path)
+ try:
+ r = requests.delete(_url, params=None,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r:
+ result['error'] = False
+ if r.status_code != requests.codes.no_content:
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def ns_delete(self, token, id, force=None):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ query_path = ''
+ if force:
+ query_path = '?FORCE=true'
+ _url = "{0}/nslcm/v1/ns_instances_content/{1}{2}".format(
+ self._base_path, id, query_path)
+ try:
+ r = requests.delete(_url, params=None,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r:
+ result['error'] = False
+ if r.status_code != requests.codes.no_content:
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def pdu_delete(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/pdu/v1/pdu_descriptors/{1}".format(self._base_path, id)
+ try:
+ r = requests.delete(_url, params=None,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r:
+ result['error'] = False
+ if r.status_code != requests.codes.no_content:
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def nsi_get(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/json", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/nsilcm/v1/netslice_instances/{1}".format(
+ self._base_path, id)
+
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def ns_get(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/json", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/nslcm/v1/ns_instances_content/{1}".format(
+ self._base_path, id)
+
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def vnf_get(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/json", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/nslcm/v1/vnfrs/{1}".format(self._base_path, id)
+
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def pdu_get(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/json", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/pdu/v1/pdu_descriptors/{1}".format(self._base_path, id)
+
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def ns_alarm_create(self, token, id, alarm_payload):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/test/message/alarm_request".format(self._base_path)
+ try:
+ r = requests.post(_url, json=alarm_payload,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ # result['data'] = Util.json_loads_byteified(r.text)
+ result['data'] = r.text
+ return result
+
+ def ns_metric_export(self, token, id, metric_payload):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/test/message/metric_request".format(self._base_path)
+ try:
+ r = requests.post(_url, json=metric_payload,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ # result['data'] = Util.json_loads_byteified(r.text)
+ result['data'] = r.text
+ return result
+
+ def wim_list(self, token):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/admin/v1/wim_accounts".format(self._base_path)
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+
+ return result
+
+ def vim_list(self, token):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/admin/v1/vims".format(self._base_path)
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+
+ return result
+
+ def wim_delete(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {"accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/admin/v1/wim_accounts/{1}".format(self._base_path, id)
+ try:
+ r = requests.delete(_url, params=None,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ else:
+ result['data'] = r.text
+ return result
+
+ def vim_delete(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {"accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/admin/v1/vims/{1}".format(self._base_path, id)
+ try:
+ r = requests.delete(_url, params=None,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ else:
+ result['data'] = r.text
+ return result
+
+ def wim_get(self, token, id):
+
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/json", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/admin/v1/wim_accounts/{1}".format(self._base_path, id)
+
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def vim_get(self, token, id):
+
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/json", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/admin/v1/vims/{1}".format(self._base_path, id)
+
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def wim_create(self, token, wim_data):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/json", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+
+ _url = "{0}/admin/v1/wim_accounts".format(self._base_path)
+
+ try:
+ r = requests.post(_url, json=wim_data,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def vim_create(self, token, vim_data):
+
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/json", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+
+ _url = "{0}/admin/v1/vims".format(self._base_path)
+
+ try:
+ r = requests.post(_url, json=vim_data,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def sdn_list(self, token):
+ result = {'error': True, 'data': ''}
+ headers = {"accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/admin/v1/sdns".format(self._base_path)
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def sdn_delete(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {"accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/admin/v1/sdns/{1}".format(self._base_path, id)
+ try:
+ r = requests.delete(_url, params=None,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ else:
+ result['data'] = r.text
+ return result
+
+ def sdn_get(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {"accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/admin/v1/sdns/{1}".format(self._base_path, id)
+
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def sdn_create(self, token, sdn_data):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/json", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+
+ _url = "{0}/admin/v1/sdns".format(self._base_path)
+
+ try:
+ r = requests.post(_url, json=sdn_data,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def k8sc_get(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {"accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/admin/v1/k8sclusters/{1}".format(self._base_path, id)
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def k8sc_list(self, token):
+ result = {'error': True, 'data': ''}
+ headers = {"accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/admin/v1/k8sclusters".format(self._base_path)
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def k8sc_create(self, token, cluster_data):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/json", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+
+ _url = "{0}/admin/v1/k8sclusters".format(self._base_path)
+
+ try:
+ r = requests.post(_url, json=cluster_data,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def k8sc_update(self, token, id, cluster_data):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/json", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+
+ _url = "{0}/admin/v1/k8sclusters/{1}".format(self._base_path, id)
+ try:
+ r = requests.patch(_url, json=cluster_data,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ else:
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def k8sc_delete(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+
+ _url = "{0}/admin/v1/k8sclusters/{1}".format(self._base_path, id)
+ try:
+ r = requests.delete(_url, params=None,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ else:
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def k8sr_get(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {"accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/admin/v1/k8srepos/{1}".format(self._base_path, id)
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def k8sr_list(self, token):
+ result = {'error': True, 'data': ''}
+ headers = {"accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/admin/v1/k8srepos".format(self._base_path)
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def k8sr_create(self, token, cluster_data):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/json", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+
+ _url = "{0}/admin/v1/k8srepos".format(self._base_path)
+
+ try:
+ r = requests.post(_url, json=cluster_data,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def k8sr_update(self, token, id, cluster_data):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/json", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+
+ _url = "{0}/admin/v1/k8srepos/{1}".format(self._base_path, id)
+ try:
+ r = requests.patch(_url, json=cluster_data,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ else:
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def k8sr_delete(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+
+ _url = "{0}/admin/v1/k8srepos/{1}".format(self._base_path, id)
+ try:
+ r = requests.delete(_url, params=None,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ else:
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def osmr_get(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {"accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/admin/v1/osmrepos/{1}".format(self._base_path, id)
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def osmr_list(self, token):
+ result = {'error': True, 'data': ''}
+ headers = {"accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+ _url = "{0}/admin/v1/osmrepos".format(self._base_path)
+ try:
+ r = requests.get(_url, params=None, verify=False,
+ stream=True, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def osmr_create(self, token, cluster_data):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/json", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+
+ _url = "{0}/admin/v1/osmrepos".format(self._base_path)
+
+ try:
+ r = requests.post(_url, json=cluster_data,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def osmr_update(self, token, id, cluster_data):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/json", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+
+ _url = "{0}/admin/v1/osmrepos/{1}".format(self._base_path, id)
+ try:
+ r = requests.patch(_url, json=cluster_data,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ else:
+ result['data'] = Util.json_loads_byteified(r.text)
+ return result
+
+ def osmr_delete(self, token, id):
+ result = {'error': True, 'data': ''}
+ headers = {"Content-Type": "application/yaml", "accept": "application/json",
+ 'Authorization': 'Bearer {}'.format(token['id'])}
+
+ _url = "{0}/admin/v1/osmrepos/{1}".format(self._base_path, id)
+ try:
+ r = requests.delete(_url, params=None,
+ verify=False, headers=headers)
+ except Exception as e:
+ log.exception(e)
+ result['data'] = str(e)
+ return result
+ if r.status_code in (200, 201, 202, 204):
+ result['error'] = False
+ else:
+ result['data'] = Util.json_loads_byteified(r.text)
return result
@staticmethod