Commit 9ea667d3 authored by Muhammad Umair Khan's avatar Muhammad Umair Khan Committed by Giacomo Bernini
Browse files

editorial change in oauth testcase of IndividualSubscription, HealVNF, and FailOperationTask

parent 245f2a3b
Loading
Loading
Loading
Loading
+2 −2
Original line number Diff line number Diff line
@@ -111,8 +111,8 @@ POST Fail operation task with permitted authorization scope

POST Fail operation task with not permitted authorization scope
    [Documentation]    Test ID: 7.3.1.15.9
    ...    Test title: POST Fail operation task with permitted authorization scope
    ...    Test objective: The objective is to test that POST method mark as "finally failed" a VNF lifecycle operation with permitted authorization scope
    ...    Test title: POST Fail operation task with not permitted authorization scope
    ...    Test objective: The objective is to test that POST method mark as "finally failed" a VNF lifecycle operation with not permitted authorization scope
    ...    Pre-conditions: the "VNF LCM operation occurrence" resource is in "FAILED_TEMP" state.
    ...    Reference: Clause 5.4.16.3.1 - ETSI GS NFV-SOL 003 [1] v4.5.1
    ...    Config ID: Config_prod_VNFM
+1 −1
Original line number Diff line number Diff line
@@ -111,7 +111,7 @@ POST Heal a vnfInstance with permitted authorization scope

POST Heal a vnfInstance with not permitted authorization scope
    [Documentation]    Test ID: 7.3.1.8.9
    ...    Test title: POST Heal a vnfInstance with permitted authorization scope
    ...    Test title: POST Heal a vnfInstance with not permitted authorization scope
    ...    Test objective: The objective is to test that POST method heal a VNF instance with not permitted authorization scope
    ...    Pre-conditions: the VNF instance resource is not in NOT-INSTANTIATED state
    ...    Reference: Clause 5.4.9.3.1 - ETSI GS NFV-SOL 003 [1] v4.5.1
+2 −2
Original line number Diff line number Diff line
@@ -95,8 +95,8 @@ GET Individual Subscription with permitted authorization scope

GET Individual Subscription with not permitted authorization scope
    [Documentation]    Test ID: 7.3.1.18.8
    ...    Test title: GET Individual Subscription with permitted authorization scope
    ...    Test objective: The objective is to test the Get individual subscription with permitted authorization scope
    ...    Test title: GET Individual Subscription with not permitted authorization scope
    ...    Test objective: The objective is to test the Get individual subscription with not permitted authorization scope
    ...    Pre-conditions: none
    ...    Reference: Clause 5.4.19.3.2 - ETSI GS NFV-SOL 003 [1] v4.5.1
    ...    Config ID: Config_prod_VNFM
+2 −2
Original line number Diff line number Diff line
@@ -1575,7 +1575,7 @@ Post Fail operation not existing
	Set Global Variable    ${response}    ${outputResponse}

Post Fail operation with permitted authorization scope
    Log    mark as Failed a VNF lifecycle operation if that operation has experienced a temporary failure 
    Log    mark as Failed a VNF lifecycle operation if that operation has experienced a temporary failure with permitted authorization scope
    ${scopeValue}=    Create Dictionary    scopeValue=${OP_OCCS_PERMITTED_SCOPE}
    ${authorizationToken}=    JWT Encode    payload=${scopeValue}    key=${OAUTH_KEY}    algorithm=${OAUTH_ENCRYPTION_ALGORITHM}
    Run Keyword If    ${AUTH_USAGE} == 1    Set Headers    {"${AUTHORIZATION_HEADER}":"${authorizationToken}"}
@@ -1584,7 +1584,7 @@ Post Fail operation with permitted authorization scope
    ${outputResponse}=    Output    response
	Set Global Variable    ${response}    ${outputResponse}	    
Post Fail operation with not permitted authorization scope
    Log    mark as Failed a VNF lifecycle operation if that operation has experienced a temporary failure
    Log    mark as Failed a VNF lifecycle operation if that operation has experienced a temporary failure with not permitted authorization scope
    ${scopeValue}=    Create Dictionary    scopeValue=${OP_OCCS_NOT_PERMITTED_SCOPE}
    ${authorizationToken}=    JWT Encode    payload=${scopeValue}    key=${OAUTH_KEY}    algorithm=${OAUTH_ENCRYPTION_ALGORITHM}
    Run Keyword If    ${AUTH_USAGE} == 1    Set Headers    {"${AUTHORIZATION_HEADER}":"${authorizationToken}"}