.. Modifications Copyright © 2017-2018 AT&T Intellectual Property.
.. Licensed under the Creative Commons License, Attribution 4.0 Intl.
(the "License"); you may not use this documentation except in compliance
with the License. You may obtain a copy of the License at
.. https://creativecommons.org/licenses/by/4.0/
.. Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
OPNFV Verfied Program Badging for VNFs
--------------------------------------
OPNFV Verified Program Overview
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
The `OPNFV Verified Program (OVP) `__ is
an open source, community-led compliance and verification program to
demonstrate the readiness and availability of commercial NFV products and
services, including NFVI and VNFs, using OPNFV and ONAP components.
-- Source: OVP
The program currently offers verification badges for NFVI, VNFs, and Labs. The
VNF badge aims to verify that a given VNF is compatible and interoperable with
a given release of ONAP and an ONAP-compatible NFVI.
Relationship to ONAP
^^^^^^^^^^^^^^^^^^^^
The ONAP VNF Requirements project defines the mandatory and recommended
requirements for a VNF to be successfully orchestrated by ONAP. At this time,
the OPNFV VNF badge automates the verification of a subset of these
requirements with plans to expand the scope over verified requirements over
time.
Currently, the `OPNFV VNF badge `__
covers the following:
* Compliance checks of the contents of a VNF onboarding package for :ref:`Heat-based `
or :ref:`TOSCA-based ` VNFs.
* Validation of the packages are, respectively, performed by the ONAP VVP
and ONAP VNFSDK projects.
* Validation that the package can be onboarded, modeled, configured, deployed,
and instantiated on an ONAP-compatible NFVI (currently OpenStack)
How to Receive a ONPFV VNF Badge
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The ONAP platform includes a set of automated tests that can be setup and
executed for a given VNF to verify its compliance with the in-scope VNF
Requirements. This test suite will produce a result file that is compatible
for submission to the OPNFV Verified Program. Please refer to the
`OPNFV VNF Portal `__ for more details
on registering for the program and submitting your results.
The following section will describe how to setup and execute the tests.
Executing the OPNFV Verified Compliance and Validation Tests
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
The instructions related to setting up and executing the tests vary based on
whether the VNF is modeled in OpenStack Heat or in TOSCA. Please refer
to the appropriate section based on your VNF.
* :ref:`heat_vnf_validation`
* :ref:`tosca_vnf_validation`
.. _heat_vnf_validation:
Heat-based VNF Validation
~~~~~~~~~~~~~~~~~~~~~~~~~
Instructions
++++++++++++
The instructions for setting up and running the validation scripts can be found
on the `VVP Test Engine GitHub site `__.
Reporting Results
+++++++++++++++++
Once the test suite passes, the results tarball can be submitted to the
`OPNFV Verification Program VNF Portal `__.
Additional Resources
++++++++++++++++++++
- `ONAP VVP Project `_
.. _tosca_vnf_validation:
TOSCA-based VNF Testing
~~~~~~~~~~~~~~~~~~~~~~~
VNF Test Platform (VTP) provides an platform to on-board different test cases
required for OVP for various VNF testing provided by VNFSDK (for TOSCA) projects
in ONAP. And it generates the test case outputs which would be uploaded into
OVP portal for VNF badging.
TOSCA VNF Test Environment
++++++++++++++++++++++++++
As pre-requestsite steps, it is assumed that, successful ONAP, Vendor VNFM and
OpenStack cloud are already available. Below installation steps help to setup
VTP components and CLI.
.. image:: tosca_vnf_test_environment.png
:align: center
Installation
++++++++++++
Clone the VNFSDK repo.
.. code-block:: bash
git clone --branch elalto https://git.onap.org/vnfsdk/refrepo
Install the VTP by using script
``refrepo/vnfmarket-be/deployment/install/vtp_install.sh``
Follow the steps as below (in sequence):
- ``vtp_install.sh --download``: It will download all required artifacts into
``/opt/vtp_stage``
- ``vtp_install.sh --install``: It will install VTP (``/opt/controller``) and
CLI (``/opt/oclip``)
- ``vtp_install.sh --start``: It will start VTP controller as Tomcat service
and CLI as ``oclip`` service
- ``vtp_install.sh --verify``: It will verify the setup is done properly by
running some test cases.
Last step (verify) would check the health of VTP components and TOSCA VNF
compliance and validation test cases.
Check Available Test Cases
++++++++++++++++++++++++++
VTP supports to check the compliance of VNF and PNF based on ONAP VNFRQTS.
To check:
- Go to command console
- Run command ``oclip``
- Now it will provide a command prompt:
``oclip:open-cli>``
Now run command as below and check the supported compliance test cases for
VNFRQTS.
- ``csar-validate`` - Helps to validate given VNF CSAR for all configured
VNFRQTS.
- ``csar-validate-rxxx`` - Helps to validate given VNF CSAR for a given
VNFRQTS requirement number.
.. code-block:: bash
oclip:open-cli>schema-list --product onap-dublin --service vnf-compliance
+--------------+----------------+------------------------+--------------+----------+------+
|product |service |command |ocs-version |enabled |rpc |
+--------------+----------------+------------------------+--------------+----------+------+
|onap-dublin |vnf-compliance |csar-validate-r10087 |1.0 |true | |
+--------------+----------------+------------------------+--------------+----------+------+
|onap-dublin |vnf-compliance |csar-validate |1.0 |true | |
+--------------+----------------+------------------------+--------------+----------+------+
|onap-dublin |vnf-compliance |csar-validate-r26885 |1.0 |true | |
+--------------+----------------+------------------------+--------------+----------+------+
|onap-dublin |vnf-compliance |csar-validate-r54356 |1.0 |true | |
...
To know the details of each VNFRQTS, run as below.
.. code-block:: bash
oclip:open-cli>use onap-dublin
oclip:onap-dublin>csar-validate-r54356 --help
usage: oclip csar-validate-r54356
Data types used by NFV node and is based on TOSCA/YAML constructs specified in draft GS NFV-SOL 001.
The node data definitions/attributes used in VNFD MUST comply.
Now run command as below and check the supported validation testcases
.. code-block:: bash
oclip:onap-dublin>use open-cli
oclip:open-cli>schema-list --product onap-dublin --service vnf-validation
+--------------+----------------+----------------------+--------------+----------+------+
|product |service |command |ocs-version |enabled |rpc |
+--------------+----------------+----------------------+--------------+----------+------+
|onap-dublin |vnf-validation |vnf-tosca-provision |1.0 |true | |
+--------------+----------------+----------------------+--------------+----------+------+
Configure ONAP with required VNFM and cloud details
+++++++++++++++++++++++++++++++++++++++++++++++++++
**1. Setup the OCOMP profile onap-dublin**
Run following command to configure the ONAP service URL and credentials as
given below, which will be used by VTP while executing the test cases
.. code-block:: bash
oclip:open-cli>use onap-dublin
oclip:onap-dublin>profile onap-dublin
oclip:onap-dublin>set sdc.onboarding:host-url=http://159.138.8.8:30280
oclip:onap-dublin>set sdc.onboarding:host-username=cs0008
oclip:onap-dublin>set sdc.onboarding:host-password=demo123456!
oclip:onap-dublin>set sdc.catalog:host-url=http://159.138.8.8:30205
oclip:onap-dublin>set sdc.catalog:host-password=demo123456\!
oclip:onap-dublin>set sdc.catalog:host-username=cs0008
oclip:onap-dublin>set sdc.catalog:service-model-approve:host-username=gv0001
oclip:onap-dublin>set sdc.catalog:service-model-distribute:host-username=op0001
oclip:onap-dublin>set sdc.catalog:service-model-test-start:host-username=jm0007
oclip:onap-dublin>set sdc.catalog:service-model-test-accept:host-username=jm0007
oclip:onap-dublin>set sdc.catalog:service-model-add-artifact:host-username=ocomp
oclip:onap-dublin>set sdc.catalog:vf-model-add-artifact:host-username=ocomp
oclip:onap-dublin>set aai:host-url=https://159.138.8.8:30233
oclip:onap-dublin>set aai:host-username=AAI
oclip:onap-dublin>set aai:host-password=AAI
oclip:onap-dublin>set vfc:host-url=http://159.138.8.8:30280
oclip:onap-dublin>set multicloud:host-url=http://159.138.8.8:30280
NOTE: Mostly all above entries value would be same except the IP address used
in the URL, which would be ONAP Kubernetes cluster IP.
By default, SDC onboarding service does not provide node port, which is
available to access from external ONAP network. To enable for external access,
register the SDC onboarding service into MSB and use MSB url for
sdc.onboarding:host-url.
.. code-block:: bash
oclip:onap-dublin> microservice-create --service-name sdcob --service-version v1.0 --service-url /onboarding-api/v1.0 --path /onboarding-api/v1.0 --node-ip 172.16.1.0 --node-port 8081
NOTE: To find the node-ip and node-port, use the following steps.
Find out SDC onboarding service IP and port details as given here:
.. code-block:: bash
[root@onap-dublin-vfw-93996-50c1z ~]# kubectl get pods -n onap -o wide | grep sdc-onboarding-be
dev-sdc-sdc-onboarding-be-5564b877c8-vpwr5 2/2 Running 0 29d 172.16.1.0 192.168.2.163
dev-sdc-sdc-onboarding-be-cassandra-init-mtvz6 0/1 Completed 0 29d 172.16.0.220 192.168.2.163
[root@onap-dublin-vfw-93996-50c1z ~]#
Note down the IP address for sdc-onboarding-be 172.16.1.0
.. code-block:: bash
[root@onap-dublin-vfw-93996-50c1z ~]# kubectl get services -n onap -o wide | grep sdc-onboarding-be
sdc-onboarding-be ClusterIP 10.247.198.92 8445/TCP,8081/TCP 29d app=sdc-onboarding-be,release=dev-sdc
[root@onap-dublin-vfw-93996-50c1z ~]#
Note down the port for sdc-onboarding-be 8445 8081
Similarly, other service IP and Port could be discovered like above, in case not
know earlier :)
Verify these details once by typing 'set'
.. code-block:: bash
oclip:onap-dublin> set
This profile would be used by user while running the test cases with ONAP setup
configured in it, as below oclip --profile onap-dublin vnf-tosca-provision ....
**2. Setup SDC consumer**
SDC uses consumer concept to configure required VN model and service model
artifacts. So following commands required to run, which will create consumer
named ocomp, which is already configured in onap-dublin profile created in above
steps.
.. code-block:: bash
oclip --product onap-dublin --profile onap-dublin sdc-consumer-create --consumer-name ocomp
NOTE: command oclip could be used in scripting mode as above or in interactive
mode as used in earlier steps
**3. Update the cloud and vnfm driver details**
In the configuration file /opt/oclip/conf/vnf-tosca-provision.json, update the
cloud and VNFM details.
.. code-block:: json
{ "cloud": {
"identity-url": "http://10.12.11.1:5000/v3",
"username": "admin",
"password": "password",
"region": "RegionOVP",
"version": "ocata",
"tenant": "ocomp"
},
"vnfm":{
"hwvnfmdriver":{
"version": "v1.0",
"url": "http://159.138.8.8:38088",
"username": "admin",
"password": "xxxx"
},
"gvnfmdriver":{
"version": "v1.0",
"url": "http://159.138.8.8:30280"
}
}
}
**4.Configure the decided VNFRES (optional)**
VTP allows to configure the set of VNFRQTS to be considered while running the
VNF compliance test cases in the configuration file
``/opt/oclip/conf/VNFRQTS.properties.``
If not available, please create this file with following entries:
.. code-block:: bash
VNFRQTS.enabled=r02454,r04298,r07879,r09467,r13390,r23823,r26881,r27310,r35851,r40293,r43958,r66070,r77707,r77786,r87234,r10087,r21322,r26885,r40820,r35854,r65486,r17852,r46527,r15837,r54356,r67895,r95321,r32155,r01123,r51347,r787965,r130206
pnfreqs.enabled=r10087,r87234,r35854,r15837,r17852,r293901,r146092,r57019,r787965,r130206
# ignored all chef and ansible related tests
vnferrors.ignored=
pnferrors.ignored=
Running the TOSCA VNF Test
++++++++++++++++++++++++++
Every test provided in VTP is given with guidelines on how to use it. On every
execution of test cases, use the following additional arguments based on
requirements
- ``--product onap-dublin`` - It helps VTP choose the test cases written for
onap-dublin version
- ``--profile onap-dublin`` - It helps VTP to use the profile settings provided
by admin (optional)
- ``--request-id`` - It helps VTP to track the progress of the test cases
execution and user could use this id for same. (optional)
So, final test case execution would be as below. To find the test case
arguments details, run second command below.
.. code-block:: bash
oclip --product onap-dublin --profile onap-dublin --request-id req-1
oclip --product onap-dublin --help
Running TOSCA VNF Compliance Testing
++++++++++++++++++++++++++++++++++++
To run compliance test as below with given CSAR file
.. clode-block:: bash
oclip --product onap-dublin csar-validate --csar
It will produce the result format as below:
.. code-block:: json
{
"date": "Fri Sep 20 17:34:24 CST 2019",
"criteria": "PASS",
"contact": "ONAP VTP Team onap-discuss@lists.onap.org",
"results": [
{
"description": "V2.4.1 (2018-02)",
"passed": true,
"vnfreqName": "SOL004",
"errors": []
},
{
"description": "If the VNF or PNF CSAR Package utilizes Option 2 for package security, then the complete CSAR file MUST be digitally signed with the VNF or PNF provider private key. The VNF or PNF provider delivers one zip file consisting of the CSAR file, a signature file and a certificate file that includes the VNF or PNF provider public key. The certificate may also be included in the signature container, if the signature format allows that. The VNF or PNF provider creates a zip file consisting of the CSAR file with .csar extension, signature and certificate files. The signature and certificate files must be siblings of the CSAR file with extensions .cms and .cert respectively.\n",
"passed": true,
"vnfreqName": "r787965",
"errors": []
}
],
"platform": "VNFSDK - VNF Test Platform (VTP) 1.0",
"vnf": {
"mode": "WITH_TOSCA_META_DIR",
"vendor": "ONAP",
"name": null,
"type": "TOSCA",
"version": null
}
}
In case of errors, the errors section will have list of details as below. Each
error block, will be given with error code and error details. Error code would
be very useful to provide the troubleshooting guide in future. Note, to
generate the test result in OVP archieve format, its recommended to run this
compliance test with request-id similar to running validation test as below.
.. code-block:: bash
[
{
"vnfreqNo": "R66070",
"code": "0x1000",
"message": "MissinEntry-Definitions file",
"lineNumber": -1
}
]
Running TOSCA VNF Validation Testing
++++++++++++++++++++++++++++++++++++
VTP provides validation test case with following modes:
.. image:: tosca_vnf_test_flow.png
:align: center
* **setup**: Create requires Vendor, Service Subscription and VNF cloud in
ONAP
* **standup**: From the given VSP csar, VNF csar and NS csar, it creates VF
Model, NS Model and NS service
* **cleanup**: Remove those entries created during provision
* **provision**: Runs setup -> standup
* **validate**: Runs setup -> standup -> cleanup
* **checkup**: mode helps to verify automation is deployed properly.
For OVP badging, validate mode would be used as below:
.. code-block:: bash
oclip --request-id WkVVu9fD--product onap-dublin --profile onap-dublin vnf-tosca-provision --vsp --vnf-csar `_
for more details.
Once tar is generated, it can be used to submit into OVP portal
``_
.. References
.. _`OVP VNF portal`: https://vnf-verified.lfnetworking.org