2 # SPDX-license-identifier: Apache-2.0
3 ##############################################################################
5 # All rights reserved. This program and the accompanying materials
6 # are made available under the terms of the Apache License, Version 2.0
7 # which accompanies this distribution, and is available at
8 # http://www.apache.org/licenses/LICENSE-2.0
9 ##############################################################################
15 packetgen_deployment_name=packetgen
16 sink_deployment_name=sink
17 firewall_deployment_name=firewall
18 image_name=virtlet.cloud/ubuntu/16.04
19 multus_deployment_name=multus-deployment
20 virtlet_image=virtlet.cloud/fedora
21 virtlet_deployment_name=virtlet-deployment
22 plugin_deployment_name=plugin-deployment
23 plugin_service_name=plugin-service
24 ovn4nfv_deployment_name=ovn4nfv-deployment
25 onap_private_net=onap-private-net
26 unprotected_private_net=unprotected-private-net
27 protected_private_net=protected-private-net
28 ovn_multus_network_name=ovn-networkobj
29 rbd_metadata=rbd_metatada.json
30 rbp_metadata=rbp_metatada.json
31 rbp_instance=rbp_instance.json
34 demo_artifacts_version=1.5.0
35 vfw_private_ip_0='192.168.10.3'
36 vfw_private_ip_1='192.168.20.2'
37 vfw_private_ip_2='10.10.100.3'
38 vpg_private_ip_0='192.168.10.2'
39 vpg_private_ip_1='10.0.100.2'
40 vsn_private_ip_0='192.168.20.3'
41 vsn_private_ip_1='10.10.100.4'
42 dcae_collector_ip='10.0.4.1'
43 dcae_collector_port='8081'
44 protected_net_gw='192.168.20.100'
45 protected_net_cidr='192.168.20.0/24'
46 protected_private_net_cidr='192.168.10.0/24'
47 onap_private_net_cidr='10.10.0.0/16'
48 sink_ipaddr='192.168.20.250'
49 multus_private_net_cidr='10.20.0.0/16'
51 # populate_CSAR_containers_vFW() - This function creates the content of CSAR file
52 # required for vFirewal using only containers
53 function populate_CSAR_containers_vFW {
57 pushd ${CSAR_DIR}/${csar_id}
59 cat << META > metadata.yaml
62 - $unprotected_private_net.yaml
63 - $protected_private_net.yaml
64 - $onap_private_net.yaml
66 - $packetgen_deployment_name.yaml
67 - $firewall_deployment_name.yaml
68 - $sink_deployment_name.yaml
71 cat << NET > $unprotected_private_net.yaml
72 apiVersion: "k8s.cni.cncf.io/v1"
73 kind: NetworkAttachmentDefinition
75 name: $unprotected_private_net
78 "name": "unprotected",
82 "subnet": "$protected_private_net_cidr"
87 cat << NET > $protected_private_net.yaml
88 apiVersion: "k8s.cni.cncf.io/v1"
89 kind: NetworkAttachmentDefinition
91 name: $protected_private_net
98 "subnet": "$protected_net_cidr"
103 cat << NET > $onap_private_net.yaml
104 apiVersion: "k8s.cni.cncf.io/v1"
105 kind: NetworkAttachmentDefinition
107 name: $onap_private_net
113 "type": "host-local",
114 "subnet": "$onap_private_net_cidr"
119 cat << DEPLOYMENT > $packetgen_deployment_name.yaml
123 name: $packetgen_deployment_name
136 k8s.v1.cni.cncf.io/networks: '[
137 { "name": "$unprotected_private_net", "interfaceRequest": "eth1" },
138 { "name": "$onap_private_net", "interfaceRequest": "eth2" }
142 - name: $packetgen_deployment_name
143 image: electrocucaracha/packetgen
144 imagePullPolicy: IfNotPresent
152 cat << DEPLOYMENT > $firewall_deployment_name.yaml
156 name: $firewall_deployment_name
169 k8s.v1.cni.cncf.io/networks: '[
170 { "name": "$unprotected_private_net", "interfaceRequest": "eth1" },
171 { "name": "$protected_private_net", "interfaceRequest": "eth2" },
172 { "name": "$onap_private_net", "interfaceRequest": "eth3" }
176 - name: $firewall_deployment_name
177 image: electrocucaracha/firewall
178 imagePullPolicy: IfNotPresent
183 cat << DEPLOYMENT > $sink_deployment_name.yaml
187 name: $sink_deployment_name
202 k8s.v1.cni.cncf.io/networks: '[
203 { "name": "$protected_private_net", "interfaceRequest": "eth1" },
204 { "name": "$onap_private_net", "interfaceRequest": "eth2" }
208 - name: $sink_deployment_name
209 image: electrocucaracha/sink
210 imagePullPolicy: IfNotPresent
216 image: electrocucaracha/darkstat
217 imagePullPolicy: IfNotPresent
226 # populate_CSAR_vms_containers_vFW() - This function creates the content of CSAR file
227 # required for vFirewal using an hybrid combination between virtual machines and
229 function populate_CSAR_vms_containers_vFW {
231 ssh_key=$(cat $HOME/.ssh/id_rsa.pub)
233 _checks_args $csar_id
234 pushd ${CSAR_DIR}/${csar_id}
236 cat << META > metadata.yaml
239 - onap-ovn4nfvk8s-network.yaml
241 - $unprotected_private_net.yaml
242 - $protected_private_net.yaml
243 - $onap_private_net.yaml
245 - $packetgen_deployment_name.yaml
246 - $firewall_deployment_name.yaml
247 - $sink_deployment_name.yaml
252 cat << SERVICE > sink-service.yaml
267 cat << MULTUS_NET > onap-ovn4nfvk8s-network.yaml
268 apiVersion: "k8s.cni.cncf.io/v1"
269 kind: NetworkAttachmentDefinition
271 name: $ovn_multus_network_name
274 "cniVersion": "0.3.1",
275 "name": "ovn4nfv-k8s-plugin",
276 "type": "ovn4nfvk8s-cni"
280 cat << NET > $unprotected_private_net.yaml
281 apiVersion: k8s.plugin.opnfv.org/v1alpha1
285 name: $unprotected_private_net
289 - subnet: $protected_private_net_cidr
291 gateway: 192.168.10.1/24
294 cat << NET > $protected_private_net.yaml
295 apiVersion: k8s.plugin.opnfv.org/v1alpha1
298 name: $protected_private_net
302 - subnet: $protected_net_cidr
304 gateway: $protected_net_gw/24
307 cat << NET > $onap_private_net.yaml
308 apiVersion: k8s.plugin.opnfv.org/v1alpha1
311 name: $onap_private_net
315 - subnet: $onap_private_net_cidr
317 gateway: 10.10.0.1/16
322 - export demo_artifacts_version=$demo_artifacts_version
323 - export vfw_private_ip_0=$vfw_private_ip_0
324 - export vsn_private_ip_0=$vsn_private_ip_0
325 - export protected_net_cidr=$protected_net_cidr
326 - export dcae_collector_ip=$dcae_collector_ip
327 - export dcae_collector_port=$dcae_collector_port
328 - export protected_net_gw=$protected_net_gw
329 - export protected_private_net_cidr=$protected_private_net_cidr
330 - export sink_ipaddr=$sink_ipaddr
332 if [[ -n "${http_proxy+x}" ]]; then
334 http_proxy: $http_proxy"
336 - export http_proxy=$http_proxy"
338 if [[ -n "${https_proxy+x}" ]]; then
340 https_proxy: $https_proxy"
342 - export https_proxy=$https_proxy"
344 if [[ -n "${no_proxy+x}" ]]; then
346 - export no_proxy=$no_proxy"
349 cat << DEPLOYMENT > $packetgen_deployment_name.yaml
353 name: $packetgen_deployment_name
366 VirtletLibvirtCPUSetting: |
368 VirtletCloudInitUserData: |
375 sudo: ALL=(ALL) NOPASSWD:ALL
377 # the password is "admin"
378 passwd: "\$6\$rounds=4096\$QA5OCKHTE41\$jRACivoPMJcOjLRgxl3t.AMfU7LhCFwOWv2z66CQX.TSxBy50JoYtycJXSPr2JceG.8Tq/82QN9QYt3euYEZW/"
384 - wget -O - https://git.onap.org/multicloud/k8s/plain/kud/tests/vFW/$packetgen_deployment_name | sudo -E bash
387 VirtletRootVolumeSize: 5Gi
388 k8s.v1.cni.cncf.io/networks: '[{ "name": "$ovn_multus_network_name"}]'
389 k8s.plugin.opnfv.org/nfn-network: '{ "type": "ovn4nfv", "interface": [
390 { "name": "$unprotected_private_net", "ipAddress": "$vpg_private_ip_0", "interface": "eth1" , "defaultGateway": "false"},
391 { "name": "$onap_private_net", "ipAddress": "$vpg_private_ip_1", "interface": "eth2" , "defaultGateway": "false"}
393 kubernetes.io/target-runtime: virtlet.cloud
397 requiredDuringSchedulingIgnoredDuringExecution:
405 - name: $packetgen_deployment_name
407 imagePullPolicy: IfNotPresent
411 - containerPort: 8183
417 cat << DEPLOYMENT > $firewall_deployment_name.yaml
421 name: $firewall_deployment_name
434 VirtletLibvirtCPUSetting: |
436 VirtletCloudInitUserData: |
443 sudo: ALL=(ALL) NOPASSWD:ALL
445 # the password is "admin"
446 passwd: "\$6\$rounds=4096\$QA5OCKHTE41\$jRACivoPMJcOjLRgxl3t.AMfU7LhCFwOWv2z66CQX.TSxBy50JoYtycJXSPr2JceG.8Tq/82QN9QYt3euYEZW/"
452 - wget -O - https://git.onap.org/multicloud/k8s/plain/kud/tests/vFW/$firewall_deployment_name | sudo -E bash
455 VirtletRootVolumeSize: 5Gi
456 k8s.v1.cni.cncf.io/networks: '[{ "name": "$ovn_multus_network_name"}]'
457 k8s.plugin.opnfv.org/nfn-network: '{ "type": "ovn4nfv", "interface": [
458 { "name": "$unprotected_private_net", "ipAddress": "$vfw_private_ip_0", "interface": "eth1" , "defaultGateway": "false"},
459 { "name": "$protected_private_net", "ipAddress": "$vfw_private_ip_1", "interface": "eth2", "defaultGateway": "false" },
460 { "name": "$onap_private_net", "ipAddress": "$vfw_private_ip_2", "interface": "eth3" , "defaultGateway": "false"}
462 kubernetes.io/target-runtime: virtlet.cloud
466 requiredDuringSchedulingIgnoredDuringExecution:
474 - name: $firewall_deployment_name
476 imagePullPolicy: IfNotPresent
484 cat << CONFIGMAP > sink_configmap.yaml
490 protected_net_gw: $protected_net_gw
491 protected_private_net_cidr: $protected_private_net_cidr
494 cat << DEPLOYMENT > $sink_deployment_name.yaml
498 name: $sink_deployment_name
513 k8s.v1.cni.cncf.io/networks: '[{ "name": "$ovn_multus_network_name"}]'
514 k8s.plugin.opnfv.org/nfn-network: '{ "type": "ovn4nfv", "interface": [
515 { "name": "$protected_private_net", "ipAddress": "$vsn_private_ip_0", "interface": "eth1", "defaultGateway": "false" },
516 { "name": "$onap_private_net", "ipAddress": "$vsn_private_ip_1", "interface": "eth2" , "defaultGateway": "false"}
520 - name: $sink_deployment_name
521 image: rtsood/onap-vfw-demo-sink:0.2.0
525 imagePullPolicy: Always
532 image: electrocucaracha/darkstat
533 imagePullPolicy: IfNotPresent
542 # populate_CSAR_vms_vFW() - This function creates the content of CSAR file
543 # required for vFirewal using only virtual machines
544 function populate_CSAR_vms_vFW {
546 ssh_key=$(cat $HOME/.ssh/id_rsa.pub)
548 _checks_args $csar_id
549 pushd ${CSAR_DIR}/${csar_id}
551 cat << META > metadata.yaml
554 - $unprotected_private_net.yaml
555 - $protected_private_net.yaml
556 - $onap_private_net.yaml
558 - $packetgen_deployment_name.yaml
559 - $firewall_deployment_name.yaml
560 - $sink_deployment_name.yaml
563 cat << NET > $unprotected_private_net.yaml
564 apiVersion: "k8s.cni.cncf.io/v1"
565 kind: NetworkAttachmentDefinition
567 name: $unprotected_private_net
570 "name": "unprotected",
573 "type": "host-local",
574 "subnet": "$protected_private_net_cidr"
579 cat << NET > $protected_private_net.yaml
580 apiVersion: "k8s.cni.cncf.io/v1"
581 kind: NetworkAttachmentDefinition
583 name: $protected_private_net
589 "type": "host-local",
590 "subnet": "$protected_net_cidr"
595 cat << NET > $onap_private_net.yaml
596 apiVersion: "k8s.cni.cncf.io/v1"
597 kind: NetworkAttachmentDefinition
599 name: $onap_private_net
605 "type": "host-local",
606 "subnet": "$onap_private_net_cidr"
613 - export demo_artifacts_version=$demo_artifacts_version
614 - export vfw_private_ip_0=$vfw_private_ip_0
615 - export vsn_private_ip_0=$vsn_private_ip_0
616 - export protected_net_cidr=$protected_net_cidr
617 - export dcae_collector_ip=$dcae_collector_ip
618 - export dcae_collector_port=$dcae_collector_port
619 - export protected_net_gw=$protected_net_gw
620 - export protected_private_net_cidr=$protected_private_net_cidr
622 if [[ -n "${http_proxy+x}" ]]; then
624 http_proxy: $http_proxy"
626 - export http_proxy=$http_proxy"
628 if [[ -n "${https_proxy+x}" ]]; then
630 https_proxy: $https_proxy"
632 - export https_proxy=$https_proxy"
634 if [[ -n "${no_proxy+x}" ]]; then
636 - export no_proxy=$no_proxy"
639 cat << DEPLOYMENT > $packetgen_deployment_name.yaml
643 name: $packetgen_deployment_name
656 VirtletLibvirtCPUSetting: |
658 VirtletCloudInitUserData: |
665 sudo: ALL=(ALL) NOPASSWD:ALL
667 # the password is "admin"
668 passwd: "\$6\$rounds=4096\$QA5OCKHTE41\$jRACivoPMJcOjLRgxl3t.AMfU7LhCFwOWv2z66CQX.TSxBy50JoYtycJXSPr2JceG.8Tq/82QN9QYt3euYEZW/"
674 - wget -O - https://git.onap.org/multicloud/k8s/plain/kud/tests/vFW/$packetgen_deployment_name | sudo -E bash
677 VirtletRootVolumeSize: 5Gi
678 k8s.v1.cni.cncf.io/networks: '[
679 { "name": "$unprotected_private_net", "interfaceRequest": "eth1" },
680 { "name": "$onap_private_net", "interfaceRequest": "eth2" }
682 kubernetes.io/target-runtime: virtlet.cloud
686 requiredDuringSchedulingIgnoredDuringExecution:
694 - name: $packetgen_deployment_name
696 imagePullPolicy: IfNotPresent
700 - containerPort: 8183
706 cat << DEPLOYMENT > $firewall_deployment_name.yaml
710 name: $firewall_deployment_name
723 VirtletLibvirtCPUSetting: |
725 VirtletCloudInitUserData: |
732 sudo: ALL=(ALL) NOPASSWD:ALL
734 # the password is "admin"
735 passwd: "\$6\$rounds=4096\$QA5OCKHTE41\$jRACivoPMJcOjLRgxl3t.AMfU7LhCFwOWv2z66CQX.TSxBy50JoYtycJXSPr2JceG.8Tq/82QN9QYt3euYEZW/"
741 - wget -O - https://git.onap.org/multicloud/k8s/plain/kud/tests/vFW/$firewall_deployment_name | sudo -E bash
744 VirtletRootVolumeSize: 5Gi
745 k8s.v1.cni.cncf.io/networks: '[
746 { "name": "$unprotected_private_net", "interfaceRequest": "eth1" },
747 { "name": "$protected_private_net", "interfaceRequest": "eth2" },
748 { "name": "$onap_private_net", "interfaceRequest": "eth3" }
750 kubernetes.io/target-runtime: virtlet.cloud
754 requiredDuringSchedulingIgnoredDuringExecution:
762 - name: $firewall_deployment_name
764 imagePullPolicy: IfNotPresent
772 cat << DEPLOYMENT > $sink_deployment_name.yaml
776 name: $sink_deployment_name
789 VirtletLibvirtCPUSetting: |
791 VirtletCloudInitUserData: |
798 sudo: ALL=(ALL) NOPASSWD:ALL
800 # the password is "admin"
801 passwd: "\$6\$rounds=4096\$QA5OCKHTE41\$jRACivoPMJcOjLRgxl3t.AMfU7LhCFwOWv2z66CQX.TSxBy50JoYtycJXSPr2JceG.8Tq/82QN9QYt3euYEZW/"
807 - wget -O - https://git.onap.org/multicloud/k8s/plain/kud/tests/vFW/$sink_deployment_name | sudo -E bash
810 VirtletRootVolumeSize: 5Gi
811 k8s.v1.cni.cncf.io/networks: '[
812 { "name": "$protected_private_net", "interfaceRequest": "eth1" },
813 { "name": "$onap_private_net", "interfaceRequest": "eth2" }
815 kubernetes.io/target-runtime: virtlet.cloud
819 requiredDuringSchedulingIgnoredDuringExecution:
827 - name: $sink_deployment_name
829 imagePullPolicy: IfNotPresent
841 # populate_CSAR_multus() - This function creates the content of CSAR file
842 # required for testing Multus feature
843 function populate_CSAR_multus {
846 _checks_args $csar_id
847 pushd ${CSAR_DIR}/${csar_id}
849 cat << META > metadata.yaml
852 - bridge-network.yaml
854 - $multus_deployment_name.yaml
857 cat << NET > bridge-network.yaml
858 apiVersion: "k8s.cni.cncf.io/v1"
859 kind: NetworkAttachmentDefinition
864 "cniVersion": "0.3.0",
868 "type": "host-local",
869 "subnet": "$onap_private_net_cidr"
874 cat << DEPLOYMENT > $multus_deployment_name.yaml
878 name: $multus_deployment_name
891 k8s.v1.cni.cncf.io/networks: '[
892 { "name": "bridge-conf", "interfaceRequest": "eth1" },
893 { "name": "bridge-conf", "interfaceRequest": "eth2" }
897 - name: $multus_deployment_name
906 # populate_CSAR_virtlet() - This function creates the content of CSAR file
907 # required for testing Virtlet feature
908 function populate_CSAR_virtlet {
911 _checks_args $csar_id
912 pushd ${CSAR_DIR}/${csar_id}
914 cat << META > metadata.yaml
917 - $virtlet_deployment_name.yaml
920 cat << DEPLOYMENT > $virtlet_deployment_name.yaml
924 name: $virtlet_deployment_name
937 VirtletLibvirtCPUSetting: |
938 mode: host-passthrough
939 # This tells CRI Proxy that this pod belongs to Virtlet runtime
940 kubernetes.io/target-runtime: virtlet.cloud
941 VirtletCloudInitUserData: |
946 primary-group: testuser
950 # the password is "testuser"
951 passwd: "\$6\$rounds=4096\$wPs4Hz4tfs\$a8ssMnlvH.3GX88yxXKF2cKMlVULsnydoOKgkuStTErTq2dzKZiIx9R/pPWWh5JLxzoZEx7lsSX5T2jW5WISi1"
952 sudo: ALL=(ALL) NOPASSWD:ALL
958 requiredDuringSchedulingIgnoredDuringExecution:
966 - name: $virtlet_deployment_name
967 # This specifies the image to use.
968 # virtlet.cloud/ prefix is used by CRI proxy, the remaining part
969 # of the image name is prepended with https:// and used to download the image
970 image: $virtlet_image
971 imagePullPolicy: IfNotPresent
972 # tty and stdin required for "kubectl attach -t" to work
977 # This memory limit is applied to the libvirt domain definition
983 # populate_CSAR_plugin()- Creates content used for Plugin functional tests
984 function populate_CSAR_plugin {
987 _checks_args $csar_id
988 pushd ${CSAR_DIR}/${csar_id}
990 cat << META > metadata.yaml
993 - $plugin_deployment_name.yaml
998 cat << DEPLOYMENT > $plugin_deployment_name.yaml
1002 name: $plugin_deployment_name
1014 - name: $plugin_deployment_name
1021 cat << SERVICE > service.yaml
1025 name: $plugin_service_name
1036 # populate_CSAR_ovn4nfv() - Create content used for OVN4NFV functional test
1037 function populate_CSAR_ovn4nfv {
1040 _checks_args $csar_id
1041 pushd ${CSAR_DIR}/${csar_id}
1043 cat << META > metadata.yaml
1049 - onap-ovn4nfvk8s-network.yaml
1051 - $ovn4nfv_deployment_name.yaml
1054 cat << MULTUS_NET > onap-ovn4nfvk8s-network.yaml
1055 apiVersion: "k8s.cni.cncf.io/v1"
1056 kind: NetworkAttachmentDefinition
1058 name: $ovn_multus_network_name
1061 "cniVersion": "0.3.1",
1062 "name": "ovn4nfv-k8s-plugin",
1063 "type": "ovn4nfvk8s-cni"
1067 cat << NETWORK > ovn-port-net.yaml
1068 apiVersion: k8s.plugin.opnfv.org/v1alpha1
1075 - subnet: 172.16.33.0/24
1077 gateway: 172.16.33.1/24
1080 cat << NETWORK > ovn-priv-net.yaml
1081 apiVersion: k8s.plugin.opnfv.org/v1alpha1
1088 - subnet: 172.16.44.0/24
1090 gateway: 172.16.44.1/24
1093 cat << DEPLOYMENT > $ovn4nfv_deployment_name.yaml
1097 name: $ovn4nfv_deployment_name
1110 k8s.v1.cni.cncf.io/networks: '[{ "name": "$ovn_multus_network_name"}]'
1111 k8s.plugin.opnfv.org/nfn-network: '{ "type": "ovn4nfv", "interface": [{ "name": "ovn-port-net", "interface": "net2" , "defaultGateway": "false"},
1112 { "name": "ovn-priv-net", "interface": "net3" , "defaultGateway": "false"}]}'
1115 - name: $ovn4nfv_deployment_name
1124 # populate_CSAR_rbdefinition() - Function that populates CSAR folder
1125 # for testing resource bundle definition
1126 function populate_CSAR_rbdefinition {
1128 pushd "${CSAR_DIR}/$1"
1129 print_msg "Create Helm Chart Archives"
1131 tar -czf rb_profile.tar.gz -C $test_folder/vnfs/testrb/helm/profile .
1132 #Creates vault-consul-dev-0.0.0.tgz
1133 helm package $test_folder/vnfs/testrb/helm/vault-consul-dev --version 0.0.0
1137 # populate_CSAR_edgex_rbdefinition() - Function that populates CSAR folder
1138 # for testing resource bundle definition of edgex scenario
1139 function populate_CSAR_edgex_rbdefinition {
1141 pushd "${CSAR_DIR}/$1"
1142 print_msg "Create Helm Chart Archives"
1144 tar -czf rb_profile.tar.gz -C $test_folder/vnfs/edgex/profile .
1145 tar -czf rb_definition.tar.gz -C $test_folder/vnfs/edgex/helm edgex
1149 # populate_CSAR_fw_rbdefinition() - Function that populates CSAR folder
1150 # for testing resource bundle definition of firewall scenario
1151 function populate_CSAR_fw_rbdefinition {
1153 pushd "${CSAR_DIR}/$1"
1154 print_msg "Create Helm Chart Archives for vFirewall"
1156 # Reuse profile from the edgeX case as it is an empty profile
1157 tar -czf rb_profile.tar.gz -C $test_folder/vnfs/edgex/profile .
1158 tar -czf rb_definition.tar.gz -C $test_folder/../demo firewall
1162 # populate_CSAR_eaa_rbdefinition() - Function that populates CSAR folder
1163 # for testing resource bundle definition of openness eaa scenario
1164 function populate_CSAR_eaa_rbdefinition {
1166 pushd "${CSAR_DIR}/$1"
1167 print_msg "Create Helm Chart Archives for Openness EAA"
1169 tar -czf rb_profile.tar.gz -C $test_folder/openness/eaa/profile .
1170 tar -czf rb_definition.tar.gz -C $test_folder/openness/eaa/helm eaa
1174 # populate_CSAR_eaa_sample_app_rbdefinition() - Function that populates CSAR folder
1175 # for testing resource bundle definition of openness sample-app scenario
1176 function populate_CSAR_eaa_sample_app_rbdefinition {
1178 pushd "${CSAR_DIR}/$1"
1179 print_msg "Create Helm Chart Archives for Openness EAA Sample Apps: producer and consumer"
1181 tar -czf rb_profile.tar.gz -C $test_folder/openness/sample-app/profile .
1182 tar -czf rb_definition.tar.gz -C $test_folder/openness/sample-app/helm sample-app
1186 function populate_CSAR_composite_app_helm {
1188 pushd "${CSAR_DIR}/$1"
1189 print_msg "Create Helm Chart Archives for compositeAppi with collectd and prometheus-grafana helm charts"
1191 tar -czf collectd.tar.gz -C $test_folder/vnfs/comp-app/collection/app1/helm .
1192 tar -czf prometheus-operator.tar.gz -C $test_folder/vnfs/comp-app/collection/app2/helm .
1193 tar -czf collectd_profile.tar.gz -C $test_folder/vnfs/comp-app/collection/app1/profile .
1194 tar -czf prometheus-operator_profile.tar.gz -C $test_folder/vnfs/comp-app/collection/app2/profile .
1195 export prometheus_helm_path="${CSAR_DIR}/$1/prometheus-operator.tar.gz"
1196 export collectd_helm_path="${CSAR_DIR}/$1/collectd.tar.gz"
1201 function populate_CSAR_operator_helm {
1203 pushd "${CSAR_DIR}/$1"
1204 print_msg "Create Helm Chart Archives for operators"
1206 #tar -czf operator.tar.gz -C $test_folder/vnfs/comp-app/collection/operators-latest/helm .
1207 #tar -czf operator_profile.tar.gz -C $test_folder/vnfs/comp-app/collection/operators-latest/profile .
1208 tar -czf operator.tar.gz -C $test_folder/vnfs/comp-app/collection/operators/helm .
1209 tar -czf operator_profile.tar.gz -C $test_folder/vnfs/comp-app/collection/operators/profile .
1210 export operator_helm_path="${CSAR_DIR}/$1/operator.tar.gz"
1215 function populate_CSAR_m3db_helm {
1217 pushd "${CSAR_DIR}/$1"
1218 print_msg "Create Helm Chart Archives for m3db"
1220 #tar -czf m3db.tar.gz -C $test_folder/vnfs/comp-app/collection/app3-latest/helm .
1221 #tar -czf m3db_profile.tar.gz -C $test_folder/vnfs/comp-app/collection/app3-latest/profile .
1222 tar -czf m3db.tar.gz -C $test_folder/vnfs/comp-app/collection/m3db/helm .
1223 tar -czf m3db_profile.tar.gz -C $test_folder/vnfs/comp-app/collection/m3db/profile .
1224 export m3db_helm_path="${CSAR_DIR}/$1/m3db.tar.gz"