Refactor all python test libraries to conform to python coding guidelines
Refactor robot Test Case Suite to conform to Robot code coding guidelines

Now that I have pycharm installed in a cloned VM that I resized to allow for
development tools, I see coding issues with the original code that I had

This is mostly a cosmetic change as no fundamental changes were made
to the original code

Rebased and fixed conflicts

Change-Id: I5dc0534e92fa708b45399944994101afd7efed63
diff --git a/tests/atests/common/authentication.py b/tests/atests/common/authentication.py
index 6bbc669..5cde7b5 100644
--- a/tests/atests/common/authentication.py
+++ b/tests/atests/common/authentication.py
@@ -21,10 +21,9 @@
 import time
 import os
 import subprocess
-import commands
 import testCaseUtils
 import logging
-import signal
+
 
 class Authentication(object):
 
@@ -34,61 +33,63 @@
     AUTHENTICATE_FILENAME = 'voltha_authenticate.log'
     
     def __init__(self):
-        self.dirs = {}
-        self.dirs ['log'] = None
-        self.dirs ['root'] = None
-        self.dirs ['voltha'] = None
+        self.dirs = dict()
+        self.dirs['log'] = None
+        self.dirs['root'] = None
+        self.dirs['voltha'] = None
         
         self.__rgName = None
         self.__radiusName = None
         self.__radiusIp = None
         
-    def aSetLogDirs(self, rootDir, volthaDir, logDir):
-        testCaseUtils.configDirs(self, logDir, rootDir, volthaDir)
+    def a_set_log_dirs(self, root_dir, voltha_dir, log_dir):
+        testCaseUtils.config_dirs(self, log_dir, root_dir, voltha_dir)
 
     def discover_rg_pod_name(self):
-        self.__rgName = testCaseUtils.extractPodName('rg-').strip()
+        self.__rgName = testCaseUtils.extract_pod_name('rg-').strip()
          
     def discover_freeradius_pod_name(self):
-        self.__radiusName = testCaseUtils.extractPodName('freeradius').strip()
-        logging.info ('freeradius Name = %s' % self.__radiusName)
+        self.__radiusName = testCaseUtils.extract_pod_name('freeradius').strip()
+        logging.info('freeradius Name = %s' % self.__radiusName)
         
     def discover_freeradius_ip_addr(self):
-        ipAddr = testCaseUtils.extractRadiusIpAddr(self.__radiusName)
+        ipAddr = testCaseUtils.extract_radius_ip_addr(self.__radiusName)
         assert ipAddr, 'No IP address listed for freeradius'
         self.__radiusIp = ipAddr.strip()
         logging.info('freeradius IP = %s' % self.__radiusIp)
         
     def set_current_freeradius_ip_in_aaa_json(self):
-        status = testCaseUtils.modifyRadiusIpInJsonUsingSed(self, self.__radiusIp)
-        assertFalse = 'Setting Radius Ip in Json File did not return Success'
+        status = testCaseUtils.modify_radius_ip_in_json_using_sed(self, self.__radiusIp)
+        assert (status == 0), 'Setting Radius Ip in Json File did not return Success'
           
     def alter_aaa_application_configuration_in_onos_using_aaa_json(self):
-        logging.info ('Altering the Onos NetCfg AAA apps with Freeradius IP address')
-        logging.debug ('curl --user karaf:karaf -X POST -H "Content-Type: application/json" '
-            'http://localhost:30120/onos/v1/network/configuration/apps/ -d @%s/tests/atests/build/aaa_json'
-            % testCaseUtils.getDir(self, 'voltha'))
+        logging.info('Altering the Onos NetCfg AAA apps with Freeradius IP address')
+        logging.debug('curl --user karaf:karaf -X POST -H "Content-Type: application/json" '
+                      'http://localhost:30120/onos/v1/network/configuration/apps/ -d @%s/tests/atests/build/aaa_json'
+                      % testCaseUtils.get_dir(self, 'voltha'))
         os.system('curl --user karaf:karaf -X POST -H "Content-Type: application/json" '
-            'http://localhost:30120/onos/v1/network/configuration/apps/ -d @%s/tests/atests/build/aaa_json'
-            % testCaseUtils.getDir(self, 'voltha'))
+                  'http://localhost:30120/onos/v1/network/configuration/apps/ -d @%s/tests/atests/build/aaa_json'
+                  % testCaseUtils.get_dir(self, 'voltha'))
      
-    def execute_authenticatication_on_rg(self):
-        logging.info ('Running Radius Authentication from RG')
-        process_output = open('%s/%s' % (testCaseUtils.getDir(self, 'log'), self.AUTHENTICATE_FILENAME), 'w')
-        proc1 = subprocess.Popen(['/usr/bin/kubectl', 'exec', '-n', 'voltha', self.__rgName, '--', 'bash', '-c', \
+    def execute_authentication_on_rg(self):
+        logging.info('Running Radius Authentication from RG')
+        process_output = open('%s/%s' % (testCaseUtils.get_dir(self, 'log'), self.AUTHENTICATE_FILENAME), 'w')
+        proc1 = subprocess.Popen(['/usr/bin/kubectl', 'exec', '-n', 'voltha', self.__rgName, '--', 'bash', '-c',
                                   '/sbin/wpa_supplicant -Dwired -ieth0 -c /etc/wpa_supplicant/wpa_supplicant.conf'],
                                  stdout=process_output,
                                  stderr=process_output)
+
         time.sleep(15)
+        logging.debug('return value from supplicant subprocess = %s' % proc1.returncode)
         procPidSupplicant1 = subprocess.Popen(['/usr/bin/kubectl', 'exec', '-n', 'voltha', self.__rgName, '--', 'ps', '-ef'],
-                             stdout=subprocess.PIPE,
-                             stderr=subprocess.PIPE)
+                                              stdout=subprocess.PIPE,
+                                              stderr=subprocess.PIPE)
         procPidSupplicant2 = subprocess.Popen(['grep', '-e', '/sbin/wpa_supplicant'], stdin=procPidSupplicant1.stdout,
-                             stdout=subprocess.PIPE,
-                             stderr=subprocess.PIPE)
+                                              stdout=subprocess.PIPE,
+                                              stderr=subprocess.PIPE)
         procPidSupplicant3 = subprocess.Popen(['awk', "{print $2}"], stdin=procPidSupplicant2.stdout,
-                             stdout=subprocess.PIPE,
-                             stderr=subprocess.PIPE)
+                                              stdout=subprocess.PIPE,
+                                              stderr=subprocess.PIPE)
 
         procPidSupplicant1.stdout.close()
         procPidSupplicant2.stdout.close()
@@ -97,19 +98,20 @@
         supplicantPid = out.strip()
         
         procKillSupplicant1 = subprocess.Popen(['/usr/bin/kubectl', 'exec', '-n', 'voltha', self.__rgName, '--', 'kill', supplicantPid],
-                             stdout=subprocess.PIPE,
-                             stderr=subprocess.PIPE)
+                                               stdout=subprocess.PIPE,
+                                               stderr=subprocess.PIPE)
         out, err = procKillSupplicant1.communicate()
+        assert not err, 'Killing Supplicant returned %s' % err
 
         procPidBash1 = subprocess.Popen(['/usr/bin/kubectl', 'exec', '-n', 'voltha', self.__rgName, '--', 'ps', '-ef'],
-                             stdout=subprocess.PIPE,
-                             stderr=subprocess.PIPE)
+                                        stdout=subprocess.PIPE,
+                                        stderr=subprocess.PIPE)
         procPidBash2 = subprocess.Popen(['grep', '-e', '/bin/bash'], stdin=procPidBash1.stdout,
-                             stdout=subprocess.PIPE,
-                             stderr=subprocess.PIPE)
+                                        stdout=subprocess.PIPE,
+                                        stderr=subprocess.PIPE)
         procPidBash3 = subprocess.Popen(['awk', "{print $2}"], stdin=procPidBash2.stdout,
-                             stdout=subprocess.PIPE,
-                             stderr=subprocess.PIPE)
+                                        stdout=subprocess.PIPE,
+                                        stderr=subprocess.PIPE)
 
         procPidBash1.stdout.close()
         procPidBash2.stdout.close()
@@ -118,13 +120,14 @@
         bashPid = out.strip()
         
         procKillBash1 = subprocess.Popen(['/usr/bin/kubectl', 'exec', '-n', 'voltha', self.__rgName, '--', 'kill', '-9', bashPid],
-                             stdout=subprocess.PIPE,
-                             stderr=subprocess.PIPE)
+                                         stdout=subprocess.PIPE,
+                                         stderr=subprocess.PIPE)
         out, err = procKillBash1.communicate()
+        assert not err, 'Killing Bash returned %s' % err
 
         process_output.close()       
 
-        testCaseUtils.printLogFile(self, self.AUTHENTICATE_FILENAME)
+        testCaseUtils.print_log_file(self, self.AUTHENTICATE_FILENAME)
         
     def verify_authentication_should_have_started(self):
         statusLines = testCaseUtils.get_fields_from_grep_command(self, 'CTRL-EVENT-EAP-STARTED', self.AUTHENTICATE_FILENAME)
@@ -142,17 +145,17 @@
         statusLines = testCaseUtils.get_fields_from_grep_command(self, 'CTRL-EVENT-TERMINATING', self.AUTHENTICATE_FILENAME)
         assert statusLines, 'Authentication was not terminated'
        
-def runTest(rootDir, volthaDir, logDir):
+
+def run_test(root_dir, voltha_dir, log_dir):
     auth = Authentication()
-    auth.aSetLogDirs(rootDir, volthaDir, logDir)
+    auth.a_set_log_dirs(root_dir, voltha_dir, log_dir)
     auth.discover_rg_pod_name()
     auth.discover_freeradius_pod_name()
     auth.discover_freeradius_ip_addr()
     auth.set_current_freeradius_ip_in_aaa_json()
     auth.alter_aaa_application_configuration_in_onos_using_aaa_json()
-    auth.execute_authenticatication_on_rg()
+    auth.execute_authentication_on_rg()
     auth.verify_authentication_should_have_started()
     auth.verify_authentication_should_have_completed()
     auth.verify_authentication_should_have_disconnected()
     auth.verify_authentication_should_have_terminated()
-