cnf-conformance release-0.6.2-snapshot1

📞📱☎️📡🌐Preliminary initiative for Cloud native Network Function Conformance
  • release-0.6.2-snapshot1 - May 18, 2020
  • v0.6.1-snapshot1 - May 6, 2020
  • v0.6.0 - May 4, 2020
  • v0.5.0 - April 23, 2020
  • test-master-20200402.1 - April 2, 2020

CNF Conformance

Master
Build Status

The CNF Conformance program enables interoperability of Cloud native Network Functions (CNFs) from multiple vendors running on top of Kubernetes supplied by different vendors. The goal is to provide an open source test suite to demonstrate conformance and implementation of best practices for both open and closed source Cloud native Network Functions.

The CNF Conformance Test Suite will inspect CNFs for the following characteristics:

  • Compatibility - CNFs should work with any Certified Kubernetes product and any CNI-compatible network that meet their functionality requirements.
  • Statelessness - The CNF's state should be stored in a custom resource definition or a separate database (e.g. etcd) rather than requiring local storage. The CNF should also be resilient to node failure.
  • Security - CNF containers should be isolated from one another and the host.
  • Microservice - The CNF should be developed and delivered as a microservice.
  • Scalability - CNFs should support horizontal scaling (across multiple machines) and vertical scaling (between sizes of machines).
  • Configuration and Lifecycle - The CNF's configuration and lifecycle should be managed in a declarative manner, using ConfigMaps, Operators, or other declarative interfaces.
  • Observability - CNFs should externalize their internal states in a way that supports metrics, tracing, and logging.
  • Installable and Upgradeable - CNFs should use standard, in-band deployment tools such as Helm (version 3) charts.
  • Hardware Resources and Scheduling - The CNF container should access all hardware and schedule to specific worker nodes by using a device plugin.
  • Resilience - CNFs should be resilient to failures inevitable in cloud environments. CNF Resilience should be tested to ensure CNFs are designed to deal with non-carrier-grade shared cloud HW/SW platform.

See the Conformance Test Categories Documentation for a complete overview of the tests.

Implementation overview

The CNF Conformance Test Suite leverages upstream tools such as OPA Gatekeeper, Helm linter, and Promtool for testing CNFs. The upstream tool installation, configuration and versioning has been made repeatable.

The test framework and tests (using the upstream tools) are written in the human readable, compiled language, Crystal. Common capabilities like dependencies between tests and categories are supported.

Setup of vanilla upstream K8s on Packet is done with the CNF Testbed platform tool chain, which includes k8s-infra, Kubespray. To add support for other providers, please submit a Pull Request to the CNF Testbed repo.

Installation

See the installation guide for more details on installing and running the CNF Conformance Test Suite.

Contributing

  1. Fork it (https://github.com/cncf/cnf-conformance/fork)
  2. Create your feature branch (git checkout -b my-new-feature)
  3. Commit your changes (git commit -am 'Add some feature')
  4. Push to the branch (git push origin my-new-feature)
  5. Create a new Pull Request

Get involved

License terms

CNF Conformance is available under the Apache 2 license.

Owner
github statistic
  • 16
  • 0
  • 11
  • 59
  • about 5 hours ago
  • January 17, 2020
License

Apache License 2.0

Links
Synced at

Tue, 02 Jun 2020 06:36:52 GMT