VF-C requirements collection for E release

Requirements concerning VF-C E release

NF: Non-functional requirement

F: Functional requirement

UC: Use-case

O: Other requirements

ID

catalog

How VF-C is concerned

priority

Projects Impacted

Resource commitment

NF1.1

S3P-security

CII Silver badge(Including no critical and high known vulnerabilities > 60 days old and other requirements),plus

"All communication shall be able to be encrypted and have common rolebased access control and authorization. "( not committed)



R4 VF-C Security/Vulnerability - Full Content

The following repos still have security issue

java projects:

vfc/nfvo/driver/vnfm/svnfm/huawei

vfc/nfvo/driver/vnfm/gvnfm

vfc-nfvo-multivimproxy

vfc-nfvo-resmanagement 

vfc-nfvo-driver-ems

vfc-nfvo-driver-svnfm-nokiav2 

python projects:

vfc-gvnfm-vnflcm

vfc-gvnfm-vnfmgr

vfc-gvnfm-vnfres

vfc-nfvo-catalog

vfc-nfvo-driver-vnfm-gvnfm

vfc-nfvo-driver-vnfm-svnfm-zte

vfc-nfvo-lcm

High

VF-C

Security communication:

VFC-1426: no critical and high known vulnerabilities > 60 daysClosed

security Issue:

Components owner

vfc/nfvo/driver/vnfm/svnfm/huawei: Huawei

vfc/nfvo/driver/vnfm/gvnfm: Huawei

vfc-nfvo-multivimproxy: Huawei

vfc-nfvo-resmanagement :Huawei

vfc-nfvo-driver-ems : Boco

vfc-nfvo-driver-svnfm-nokiav2 : nokia



vfc-gvnfm-vnflcm

vfc-gvnfm-vnfmgr

vfc-gvnfm-vnfres

vfc-nfvo-catalog

vfc-nfvo-driver-vnfm-gvnfm

vfc-nfvo-driver-vnfm-svnfm-zte

vfc-nfvo-lcm

For python components,  chose one component to upgrade and test ,and then update the remaining components

ZTE

NF1.3

Remaining issue during Integration Testing-configuration

Investigate all VF-C configuration can be automatically injected through oom.

1.During the integration testing, such as SDC URL and user/pwd should be updated manually to Catalog configuration, Before that, need to turn off the livenessprobe of k8s.

2. MSB registeration flag

The Service will  register to MSB automatically by code when service start , and when pod start, the service will also register to MSB via OOM. Need to consider how to deal with the  duplicate service endpoint 



High

VF-C, OOM

CMCC

VFC-1427: Configuration injection via OOMClosed

MSB Issue need find effective solution 



NF1.4

Including VF-C to daily building testing

Investigate how to add VF-C to the daily building test case if we can leverage the CLI work



High

VF-C, Integartion, CLI

VFC-1428: Add VF-C to the daily buildingClosed

Intel

NF1.5

Start up way: uwsgi and runserver 

During the integration testing, found some issue when use uwsgi to start the service.

If add the enable-thread, the new thread can start up in component, but when the pod start, we encounter the empty reply from service 

High

VF-C

During vCPE testing, we will query the unstable reason 

Intel, ZTE, CMCC

VFC-1434: uwsgi startup verificationClosed

NF1.6

DB unstable 

During the integration testing, found the DB connection will be lost during some DB operation.

Need stable testing

High 

VF-C

During vCPE testing, we will query the unstable reason 

Intel, ZTE, CMCC

VFC-1433: DB unstable verificationClosed

NF1.7

upgrade from python2 to python3

Python 2.7 will reach the end of its life on January 1st, 2020 and won't be maintained after that date. A future version of pip will drop support for Python 2.7. 0
So we need to upgrade the python version.

Medium 

VF-C

chose one component, such as gvnfmdriver to update and test, then if we have time and resource in E release, we can update the remaining components

ZTE

VFC-1429: upgrade from python2 to python3Closed

O1

SOL005 interface alignment

need use case to verify this

The NSLCM interface have aligned with SOL005

need use case to do the integration testing, especially for SO and  VF-C integration

High

VF-C, SO, UUI

need confirm the test plan with SO and verizon guys .

SO team confirmed that as ElAlto is more like a maintenance release they wouldn't push the SOL005 SO code in E release. So the SOL005 SO code will be part of Frankfurt release

O6

OVP MVP

In OVP  MVP, have added tosca validation , VF-C will cooperate with OVP to provide the tosca-based VNF validation.

High

 VF-C, VNFSDK, Integration, CLI

We suggest to leverage the VF-C existing feature , not to add new function

Intel, Huawei, ZTE, CMCC



VNFSDK will invoke VF-C NS APIs, when a VNF onboarding to SDC, CLI will invoke SDC internal API to design VNF to a NS, we need to make sure the NS  can be associated with VNF under artifact directory.

VFC-1430: OVP VNF validation supportingClosed



O7

Code refactoring

code style refactor, including good variable, function name,... etc

const refactor

test case refactor

middle

VF-C

ZTE

VFC-1431: Code refactorClosed

O8

GVNFM Driver as SOL003 adapter 

We would like to optimize GVNFM driver to make it can integrate with multiple SOL003 VNFM. 

Need to see whether it can support now or need to do some enhancement 

middle

VF-C

xx

VFC-1432: Improve GVNFM Driver as SOL003 adapter Closed

O9