aboutsummaryrefslogtreecommitdiffstats
AgeCommit message (Collapse)AuthorFilesLines
2020-05-13Bump version of readiness imageSylvain Desbureaux7-10/+15
New readiness image proposes several new stuff: * smaller size * ability to wait for daemonset Issue-ID: OOM-2373 Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com> Change-Id: I4af9a09393c5b71214d8f4db2c1a095b260c9fbd
2020-04-20[Portal] Move (unused) readinessImage to globalSylvain Desbureaux2-2/+3
All helm charts in ONAP are setting readinessImage to global part (it can then be easy to bump version for everybody at once). Portal Job is not using it and use a local version. Move to use global one for consistency Issue-ID: OOM-2373 Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com> Change-Id: I5400ab595773ffc7111bc43f64c48b7c9a4c2dcd
2020-04-20Merge "Enable robot module in 5G Network Slicing use case override file"Sylvain Desbureaux1-1/+1
2020-04-20Merge changes I4dc6cf5c,I1ad4da22Sylvain Desbureaux6-12/+98
* changes: Add HTTPS ceritificate in CLI OOM charts Set CLI version to 5.0.4
2020-04-20Merge "Add repository for cassandra image"Sylvain Desbureaux1-1/+1
2020-04-19Merge "[POLICY] legacy PDP healtchcheck removed"Krzysztof Opasiak1-1/+1
2020-04-18Merge "Update oom with the latest release version for OOF"Jessica Wagantall17-233/+216
2020-04-17Merge "[AAF] Use common secret in sms preload"Jessica Wagantall5-30/+273
2020-04-17Update oom with the latest release version for OOFKrzysztof Opasiak17-233/+216
Fixing the configuration based on comments Updating osdf common_config.yaml Separating cmso configuration to a new review Creating secrets app_key and add substution routine Fix a typo in has-xx deployment.yaml files Adding secret.yaml files for all has deployments Fixing certificates for oof Helm chart cleanup and unification. Fixing pdx url and mount path Unsetting appkey and removing secrets Change-Id: I6fbdbd7532c73dffeb9fac65d50d3900c85cd87a Signed-off-by: vrvarma <vikas.varma@att.com> Issue-ID: OPTFRA-720 Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com>
2020-04-17[POLICY] legacy PDP healtchcheck removedjhh1-1/+1
It may be causing some flakiness with some healthchecks passing in OOM builds. Not sure the root cause, as the problem happens occassionally, may be a race condition or something else (legacy PDP and dependent components may take some time to initialize). Issue-ID: POLICY-2471 Signed-off-by: jhh <jorge.hernandez-herrero@att.com> Change-Id: I8ab7c8c563c1db13b2a99aa8cb6f3c022c625642
2020-04-17Add repository for cassandra imageafenner1-1/+1
Change-Id: I287b830f86da0fe0adc440cf9e645f8d244aefe1 Issue-ID: OOM-2368 Signed-off-by: afenner <andrew.fenner@est.tech>
2020-04-17[POLICY] Fix in brmsgw templateDominik Mizyn1-1/+0
Double volumeMounts in brmsgw template fix Issue-ID: OOM-2342 Change-Id: Ia855d18a636b19ee9aafcc8739b8c52260f611c2 Signed-off-by: Dominik Mizyn <d.mizyn@samsung.com>
2020-04-16[AAF] Use common secret in sms preloadKrzysztof Opasiak5-30/+273
Use common secret template and init container to fill config files for job that preloads secrets to SMS. Init container is prepared for temporary workaround required by the OOF team to encrypt passwords before storing them in sms. The only thing that has to be done is to instead of just assigning for example: export AAI_PASS=${AAI_PASS_PLAIN}; do export AAI_PASS=`awesomeEncryptCommand ${AAI_PASS_PLAIN}` Issue-ID: OPTFRA-720 Change-Id: I0ada7de0aa8710580ccf51cb9ab0822b81b4f46a Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com>
2020-04-16Add HTTPS ceritificate in CLI OOM chartsjitendra sharma4-0/+89
Issue-ID: CLI-265 Signed-off-by: Kanagaraj Manickam <kanagaraj.manickam@huawei.com> Change-Id: I4dc6cf5c9f7e8ec913491ea8580f414ab5ca199f
2020-04-16Set CLI version to 5.0.4Kanagaraj Manickam2-12/+9
Issue-ID: CLI-255 Change-Id: I1ad4da223a56262db4d86f0ba03a76b3e763d448 Signed-off-by: Kanagaraj Manickam <kanagaraj.manickam@huawei.com>
2020-04-16Merge "Update sparky-be server cert"Krzysztof Opasiak1-0/+2
2020-04-16Merge "[Contrib] Add EJBCA Server"Krzysztof Opasiak14-11/+363
2020-04-16[POLICY] Use common secret template in brmsgwDominik Mizyn3-6/+59
Use common secret template in brmsgw module instead of hardcoding them in config map. For now creds are hardcoded but this will be remove in further commits. Issue-ID: OOM-2342 Signed-off-by: Dominik Mizyn <d.mizyn@samsung.com> Change-Id: Ic6ea25004d87d993b40df838dd30a71e25386b2c
2020-04-16Enable robot module in 5G Network Slicing use case override filezhangqingjie1-1/+1
Issue-ID: OOM-2365 Signed-off-by: zhangqingjie <zhangqingjie@huawei.com> Change-Id: I18b1c3198c669e7a7bda368f8d9ce8ba5790555b
2020-04-16Update git submodulesBrian Freeman1-0/+0
* Update kubernetes/robot from branch 'master' to 431689c7879a92be54477f13f8e39908db5f07f2 - Handle less than /16 oam network Matching changes in testsuite and demo Issue-ID: INT-1527 Change-Id: Iac7cdb735c4544e0d6bc79c444ba9de32b79fc32 Signed-off-by: Brian Freeman <bf1936@att.com>
2020-04-16Merge "[POLICY] legacy pdp health + new image versions"Sylvain Desbureaux10-10/+10
2020-04-15Merge "[DOC] Update documentation for Frankfurt"Krzysztof Opasiak1-9/+21
2020-04-15[POLICY] legacy pdp health + new image versionsjhh10-10/+10
Issue-ID: POLICY-2471 Signed-off-by: jhh <jorge.hernandez-herrero@att.com> Change-Id: Ia05d2c52e99757dafff4ac8bbcc7ef4269734707 Signed-off-by: jhh <jorge.hernandez-herrero@att.com>
2020-04-15[DOC] Update documentation for FrankfurtSylvain Desbureaux1-9/+21
Initial documentation update with the following changes: * Remove last old release references * Explain the "masterPassword" mandatory parameter Issue-ID: OOM-2324 Issue-ID: OOM-1960 Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com> Change-Id: Ib3b1ba7c585c7e27793329ec5eb43d797e23da99
2020-04-15Update sparky-be server certJimmy Forsyth1-0/+2
Issue-ID: AAI-2869 Signed-off-by: Jimmy Forsyth <jf2512@att.com> Change-Id: I4a4b5f05ae149149137369cfb588b1c27e156281
2020-04-15Merge "Add APPC to cert table"Sylvain Desbureaux1-0/+4
2020-04-15[Contrib] Add EJBCA ServerSylvain Desbureaux14-11/+363
EJBCA Server is used to test that CMPv2 Certificate handling is well done in ONAP. Issue-ID: AAF-1083 Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com> Change-Id: I5e2d25b68b5cd80d3c7bf282ce871dd81e711ff6
2020-04-15Merge "[COMMON] Remove hardcoded mariadb-galera password"Sylvain Desbureaux1-1/+1
2020-04-15Merge "Updated SDNC version"Sylvain Desbureaux5-5/+5
2020-04-15Update VFC nslcm & vnflcm & gvnfm component version to 1.3.9yangyan3-3/+3
Change-Id: I7f432f2db6df8912b874a2bd11c0424ea9e2389d Issue-ID: VFC-1644 Signed-off-by: yangyan <yangyanyj@chinamobile.com>
2020-04-14Merge "[COMMON] Allow use of second Node Port Prefix"Krzysztof Opasiak1-1/+32
2020-04-14Merge "test DMaaP connection via https"Krzysztof Opasiak2-6/+3
2020-04-14Merge "Update Portal with release artifacts"Sylvain Desbureaux4-4/+4
2020-04-14[COMMON] Allow use of second Node Port PrefixSylvain Desbureaux1-1/+32
OOM uses two node port prefix. Templates were not able to use the second one. This patch allows templates to use the second node port prefix and also to override on a per chart basis the value of the node port prefix. Issue-ID: OOM-1971 Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com> Change-Id: I05f43e3dad93d6f0fbf575657ea41082e7c91053
2020-04-14Merge "Add dmaap-listener prop files"Krzysztof Opasiak7-3/+117
2020-04-14Update git submodulesMorgan Richomme1-0/+0
* Update kubernetes/aai from branch 'master' to 0c4cd899d53538202c23030ab278984897aede94 - Merge "Use released schema-service 1.6.7 container" - Use released schema-service 1.6.7 container Issue-ID: AAI-2838 Signed-off-by: Jimmy Forsyth <jf2512@att.com> Change-Id: Id996c09778a2209ed938cca4b64876e6221210d3
2020-04-14Add APPC to cert tableTaka Cho1-0/+4
AAF client cert moved to APPC Helm chart, hence I added APPC portion to the table Issue-ID: APPC-1862 Change-Id: Ib84a66bbca8d818c36cfd9258d0dfbc1000f1265 Signed-off-by: Taka Cho <takamune.cho@att.com>
2020-04-14test DMaaP connection via httpsaosull012-6/+3
Issue-ID: EXTAPI-427 Signed-off-by: aosull01 <adrian.osullivan@huawei.com> Change-Id: I2a35284b9de2153b473b4bdde1d77be6a015b620
2020-04-14[COMMON] Remove hardcoded mariadb-galera passwordKrzysztof Opasiak1-1/+1
The time has come! All ONAP charts use now common secret template at least for the mariadb-galera root password (and most of them also for user part). This means that it should be now safe to remove hardcoded mariadb-galera root password and depend on common secret template to generate it for every deployment. No more secretpassword!:D Issue-ID: OOM-2342 Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com> Change-Id: Ib9d8bbcc45bfd85a4d762c716c03dba23d901009
2020-04-14Merge "[POLICY] Use common secret template in whole policy module"Krzysztof Opasiak8-29/+110
2020-04-14Merge "Addressed openstack override file missing requestDB endpoint"Sylvain Desbureaux1-0/+4
2020-04-14Merge "dcae version revision"Sylvain Desbureaux2-2/+2
2020-04-13Update Portal with release artifactsstatta4-4/+4
Issue-ID: PORTAL-842 Signed-off-by: statta <statta@research.att.com> Change-Id: I240051c30b1b71c6e7fc47bdaebe36bc519dd3fb
2020-04-13Updated SDNC versionDan Timoney5-5/+5
Update to use version 1.8.1 of SDNC images, which contain fix for SDNC-1145 (pods still running as root) Issue-ID: SDNC-1145 Signed-off-by: Dan Timoney <dtimoney@att.com> Change-Id: Ie596e45958d926e4742b688eec48b887326ddb60
2020-04-10[POLICY] Use common secret template in whole policy moduleKrzysztof Opasiak8-29/+110
All subcharts are ready so now we can remove hardcoded mariadb credentials in policy module and depend on common secret chart to generate them for us at the deployment time. Issue-ID: OOM-2342 Change-Id: I84bfc30511312be0b2e614ddff4676f36d85619b Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com> Signed-off-by: jhh <jorge.hernandez-herrero@att.com>
2020-04-10Merge "Automation adds oom_project_description.rst"Sylvain Desbureaux4-1/+4
2020-04-10Addressed openstack override file missing requestDB endpointRamesh Parthasarathy1-0/+4
integration team reported that openstack is missing request db adapter endpoint from override file. This has been addressed here. Issue-ID: SO-2801 Signed-off-by: Ramesh Parthasarathy(rp6768)<ramesh.parthasarathy@att.com> Change-Id: I1f67575fbea813587ec83c7ff88bc294c09eef71
2020-04-09dcae version revisionVijay Venkatesh Kumar2-2/+2
1.12.5 bootstrap DL 1.0.2 (non root) PMSH 1.0.3 (bug fixes) 1.0.3 MOD/runtime (bug fix) Change-Id: If5dba38f38dbafb18d310183d6ac2a481989b06f Signed-off-by: Vijay Venkatesh Kumar <vv770d@att.com> Issue-ID: DCAEGEN2-2194 Issue-ID: DCAEGEN2-2171 Issue-ID: DCAEGEN2-2181 Issue-ID: DCAEGEN2-2173 Issue-ID: DCAEGEN2-2175 Signed-off-by: Vijay Venkatesh Kumar <vv770d@att.com>
2020-04-09Automation adds oom_project_description.rstJessica Wagantall4-1/+4
Add additional labels to create consistency across all docs. Issue-ID: CIMAN-376 Signed-off-by: Jessica Wagantall <jwagantall@linuxfoundation.org> Change-Id: I6d3dd67adb6669fb897e4978cb88e3b7404d2897
2020-04-09Changing log writes location to /var/log for oof/hasIkramullah, Ikram2-6/+6
The log locaitons that the processes write to should be a common place so that a non-root that starts the process can be setup to manage the writes to that location. Chaning all log locations to /var/log where user 'onap' has been given write access to. Issue-ID: OPTFRA-711 Signed-off-by: Ikramullah, Ikram <ikram@research.att.com> Change-Id: I524534179b98c29acaf697dabdddd63b213199ba