Age | Commit message (Collapse) | Author | Files | Lines |
|
SO-APPC deployment is deprecated in Guilin version. Like other
component, it's then set to disabled on default deployment
Issue-ID: SO-3355
Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com>
Change-Id: Iea82ea206b9945e37146c02caff7f50f1ae27953
|
|
Some SO components are using readiness check init container. In "gating"
mode, so image and readiness image are not coming from the same
repository.
By using readinessCheck charts, we can control that.
Issue-ID: OOM-2617
Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com>
Change-Id: I44a4e9daf72d1a42d3d84b6d56b588cd7d44fb08
|
|
so-db-secrets was used to create secrets
for db creds. But now, they are being created
from secrets metaconfig. It is not needed
Issue-ID: OOM-2534
Signed-off-by: Krishna Moorthy <krishna.moorthy6@wipro.com>
Change-Id: I0f0514b0b704e4643253b793ea4bd9ad92329759
|
|
SO secret was used to give truststore to SO components.
As we're using dynamic certificate retrieval, it's not needed anymore.
Issue-ID: OOM-2534
Issue-ID: SO-3348
Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com>
Change-Id: I0eb2e052096923fc69bf5f1a1876d9a76a22102b
|
|
|
|
|
|
Add helm chart for cnf-adapter to oom
Issue-ID: SO-3164
Signed-off-by: sekharhuawei <reddi.shekhar@huawei.com>
Change-Id: I12551f8403c55b7f0d0e54dea0d003413039b6a6
Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com>
|
|
1.Update image of nslcm 2.Update annotations
Change-Id: Ib34a1596e43f08e13d1c3f691b7428e8ed103e59
Issue-ID: VFC-1763
Signed-off-by: dyh <dengyuanhong@chinamobile.com>
|
|
Limits set seemed to be to hard, loosening them in order to make it
work.
Issue-ID: REQ-362
Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com>
Change-Id: I99aa55fb2564683f4968e5831e9e7b9aaa751054
|
|
|
|
|
|
- SO-Monitoring service exposed as NodePort
- Certs are retrieved dynamically using certInitializer
Issue-ID: SO-2920
Signed-off-by: Krzysztof Gajewski <krzysztof.gajewski@nokia.com>
Change-Id: I04e6556bcddc3c67afc2a76c5b4fecb59a134911
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
* Update kubernetes/aai from branch 'master'
to bac40922e4043c632e1a8a5fe1531a640cbfe6c2
- Release the 1.7.11 docker release for the network slicing functional use case
Issue-ID: AAI-3211
Signed-off-by: wreehil <wr148d@att.com>
Change-Id: I304c09b646cdf55b848f89b0fa1f1ee08ad3acf3
|
|
Update CertServiceClient to new version (2.1.0)
Issue-ID: OOM-2580
Signed-off-by: Maciej Malewski <maciej.malewski@nokia.com>
Change-Id: I8e7f42a5edb1832932eb8b6b66950612ec33a21f
|
|
Update portal-widget HELM charts to use non-
root user access to the portal mariadb
backend
Issue-ID: OOM-2601
Signed-off-by: SandeepLinux <ss048t@att.com>
Change-Id: I434ce85f1d0922d87fca35f692064a9b5e757954
Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com>
|
|
|
|
Use trim function in order to remove the 4 first spaces that breaks
configuration when aaf add config is a multiline (a.k.a uses `|`) YAML
entry.
Issue-ID: OOM-2611
Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com>
Change-Id: Ib53a8a87f896a66ba613d542cfca833804ef1d7a
|
|
Instead of setting TLS termination at POD level, it may be interesting
to terminate it at Ingress level.
This patch add the ability to do that using "Ingress" templates.
In order to achieve it, you need to configure it this way in
`values.yaml`:
```yaml
ingress:
enabled: false
service:
- baseaddr: 'my-endpoint'
name: 'my-service'
port: 8080
config:
tls:
secret: my-service-ingress-certs
```
Secret (here `my-service-ingress-certs`) must follow Kubernetest
`kubernetes.io/tls` type: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls
Issue-ID: SO-3078
Issue-ID: SO-3237
Issue-ID: OOM-2609
Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com>
Change-Id: I76c0929d53289a581bc26d0d03cc8b9bd72d0fd1
|
|
SO BPMN infra uses "v1" version for VNF handling, which is not
compatible with multicloud.
This patch allows to choose which version to use, defaulting to "v2"
version.
Issue-ID: SO-3342
Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com>
Change-Id: I548f9f1e264ea7a21ee2d604e5de5c3b65599943
|
|
Having limits is important in order to have safe deployment.
cassandra didn't had one so let's add them.
Issue-ID: OOM-2230
Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com>
Change-Id: Id3fef8c351f1be977eab49abd111304b9edd9151
|
|
|
|
Issue-ID: MODELING-441
Change-Id: Ibcabdb9db6f9d0695f2c338a9f7d52b42f6d0723
Signed-off-by: dengyh <dengyuanhong@chinamobile.com>
|
|
It is not possible to override Cassandra backup cronjob image URL currently. This might cause the problem if non standard repository is used. This patch is fixing that issue.
Issue-ID: OOM-2608
Signed-off-by: Marat Salakhutdinov <marat.salakhutdinov@bell.ca>
Change-Id: I1eb0a97d1a852d16f8d1662f543c3f583e873a5d
|
|
-Fix for release image
Issue-ID: SO-3205
Signed-off-by: Priyadharshini <priyadharshini.b96@wipro.com>
Change-Id: Ia4942a072dcf77454f0245dc2837d7fdf60955bc
|
|
|
|
|
|
|
|
|
|
|
|
Per default, SO truststore has only one CA, the ONAP one.
But we also need MSB root CA. The process to onboard was broken and this
patch solves it
We also needs "common root CAs" in order to discuss with other
components such as the underneath OpenStack.
In this patch we also import all "known" root CA from truststoreONAPall.
Issue-ID: OOM-2606
Issue-ID: OOM-2607
Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com>
Change-Id: Ia67bd4aec7a0b122fb9fda11e1e48c4e6e55430c
|
|
|
|
|
|
|
|
Signed-off-by: Jakub Latusek <j.latusek@samsung.com>
Change-Id: I21ea78c96ff8bd5e729f2228f761df534f515358
Issue-ID: OOM-2562
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|