Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
controller
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Iterations
Wiki
Requirements
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Locked files
Deploy
Releases
Package Registry
Container Registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
Repository analytics
Code review analytics
Issue analytics
Insights
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
TFS
controller
Commits
1db99e51
Commit
1db99e51
authored
1 year ago
by
Lluis Gifre Renom
Browse files
Options
Downloads
Patches
Plain Diff
Optical Attack Detector:
- Add helper script to test the component
parent
9610316e
No related branches found
No related tags found
2 merge requests
!235
Release TeraFlowSDN 3.0
,
!215
Resolve "Fix CI/CD pipeline issues"
Changes
1
Pipelines
2
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
scripts/run_tests_locally-optical-attack-detector.sh
+102
-0
102 additions, 0 deletions
scripts/run_tests_locally-optical-attack-detector.sh
with
102 additions
and
0 deletions
scripts/run_tests_locally-optical-attack-detector.sh
0 → 100755
+
102
−
0
View file @
1db99e51
#!/bin/bash
# Copyright 2022-2023 ETSI TeraFlowSDN - TFS OSG (https://tfs.etsi.org/)
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
PROJECTDIR
=
`
pwd
`
RCFILE
=
$PROJECTDIR
/coverage/.coveragerc
COVERAGEFILE
=
$PROJECTDIR
/coverage/.coverage
# Destroy old coverage file and configure the correct folder on the .coveragerc file
rm
-f
$COVERAGEFILE
cat
$PROJECTDIR
/coverage/.coveragerc.template |
sed
s+~/tfs-ctrl+
$PROJECTDIR
+g
>
$RCFILE
echo
echo
"Pre-test clean-up:"
echo
"------------------"
docker
rm
-f
redis opticalattackdetector dbscanserving
docker network
rm
tfs_br
echo
echo
"Pull Docker images:"
echo
"-------------------"
docker pull redis:7.0-alpine
echo
echo
"Build optical attack detector:"
echo
"------------------------------"
docker build
-t
"opticalattackdetector:latest"
-f
./src/opticalattackdetector/Dockerfile
.
docker images
--filter
=
"dangling=true"
--quiet
| xargs
-r
docker rmi
echo
echo
"Build dbscan serving:"
echo
"---------------------"
docker build
-t
"dbscanserving:latest"
-f
./src/dbscanserving/Dockerfile
.
docker images
--filter
=
"dangling=true"
--quiet
| xargs
-r
docker rmi
echo
echo
"Create test environment:"
echo
"------------------------"
export
REDIS_PASSWORD
=
$(
uuidgen
)
docker network create
-d
bridge
--subnet
=
172.254.254.0/24
--gateway
=
172.254.254.1
--ip-range
=
172.254.254.0/24 tfs_br
docker run
--name
redis
-d
--network
=
tfs_br
-p
16379:6379
--rm
\
--env
REDIS_PASSWORD
=
${
REDIS_PASSWORD
}
\
redis:7.0-alpine redis-server
--requirepass
${
REDIS_PASSWORD
}
docker run
--name
dbscanserving
-d
--network
=
tfs_br
-p
10008:10008
--rm
\
--env
LOG_LEVEL
=
DEBUG
\
dbscanserving:latest
"python -m dbscanserving.service"
echo
echo
"Waiting for initialization..."
echo
"-----------------------------"
while
!
docker logs redis 2>&1 |
grep
-q
'Ready to accept connections'
;
do
sleep
1
;
done
docker logs redis
#while ! docker logs dbscanserving 2>&1 | grep -q 'Server is ready'; do sleep 1; done
docker logs dbscanserving
#sleep 10
docker ps
-a
echo
echo
"Run unitary tests and analyze code coverage:"
echo
"--------------------------------------------"
export
REDIS_ADDRESS
=
$(
docker inspect redis
--format
"{{.NetworkSettings.Networks.tfs_br.IPAddress}}"
)
export
DBSCANSERVING_ADDRESS
=
$(
docker inspect dbscanserving
--format
"{{.NetworkSettings.Networks.tfs_br.IPAddress}}"
)
docker run
--name
opticalattackdetector
-d
--network
=
tfs_br
-p
10006:10006
--rm
\
--env
REDIS_PASSWORD
=
${
REDIS_PASSWORD
}
\
--env
DBSCANSERVINGSERVICE_SERVICE_HOST
=
${
DBSCANSERVING_ADDRESS
}
\
--env
CACHINGSERVICE_SERVICE_HOST
=
${
REDIS_ADDRESS
}
\
opticalattackdetector:latest
sleep
5
docker ps
-a
docker logs opticalattackdetector
docker
exec
-i
opticalattackdetector bash
-c
"coverage run -m pytest --log-level=DEBUG --verbose opticalattackdetector/tests/test_unitary.py"
docker logs redis
docker logs dbscanserving
docker logs opticalattackdetector
echo
echo
"Coverage report:"
echo
"----------------"
docker
exec
-i
opticalattackdetector bash
-c
"coverage report --include='opticalattackdetector/*' --sort cover --show-missing --skip-covered"
echo
echo
"Post-test clean-up:"
echo
"-------------------"
docker
rm
-f
redis opticalattackdetector dbscanserving
docker network
rm
tfs_br
echo
"Done!"
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment