Variables %{ROBOT_DEVOPS_FOLDER}/resources/basic_08-disable_port_security_network_level_data.py
+Force Tags basic_08 cluster_main daily regression
+
Suite Teardown Run Keyword And Ignore Error Suite Cleanup
*** Test Cases ***
Create VIM With Port Security Disabled
- [Tags] disable_port_security sanity regression
${created_vim_account_id}= Create VIM Target ${vim_name} ${vim_user} ${vim_password} ${vim_auth_url} ${vim_tenant} ${vim_account_type} config=${vim_config}
Check for VIM Target Status ${vim_name} ${prometheus_host} ${prometheus_port}
Create VNF Descriptor
- [Tags] disable_port_security sanity regression
Create VNFD '%{PACKAGES_FOLDER}/${vnfd_pkg}'
Create NS Descriptor
- [Tags] disable_port_security sanity regression
Create NSD '%{PACKAGES_FOLDER}/${nsd_pkg}'
Instantiate Network Service
- [Tags] disable_port_security sanity regression
${id}= Create Network Service ${nsd_name} ${vim_name} ${ns_name} ${ns_config} ${publickey}
Set Suite Variable ${ns_id} ${id}
Check Port Security Is Disabled
- [Tags] disable_port_security sanity regression
- ${rc} ${disabled_ports}= Run and Return RC and Output osm ns-show ${ns_name} | grep -c '${port_disabled_msg}'
- Run Keyword Unless ${disabled_ports} > 6 Fail msg=Found only '${disabled_ports}' matches for '${port_disabled_msg}'
+ ${rc} ${disabled_ports}= Run and Return RC and Output osm ns-show ${ns_name} --literal | grep -c '${port_disabled_msg}'
+ Run Keyword Unless ${disabled_ports} > 0 Fail msg=Found '${disabled_ports}' matches for '${port_disabled_msg}'
Delete NS Instance
- [Tags] disable_port_security sanity regression cleanup
+ [Tags] cleanup
Delete NS ${ns_name}
Delete NS Descriptor
- [Tags] disable_port_security sanity regression cleanup
+ [Tags] cleanup
Delete NSD ${nsd_name}
Delete VNF Descriptor
- [Tags] disable_port_security sanity regression cleanup
+ [Tags] cleanup
Delete VNFD ${vnfd_name}
Delete VIM
- [Tags] disable_port_security sanity regression cleanup
+ [Tags] cleanup
Delete VIM Target ${vim_name}