Age | Commit message (Collapse) | Author | Files | Lines |
|
Use Certinitializer in order to retrieve needed certificates.
It'll also do the retrieval for graphadmin as both microservices are
working together.
Issue-ID: OOM-2691
Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com>
Change-Id: Iad790cc14361cf15d5a6bf4fcad6fd9f4048a1a7
|
|
Use Certinitializer in order to retrieve needed certificates.
Change ModelLoader also as it needs valid certificate to communicate
with Babel.
Issue-ID: OOM-2693
Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com>
Change-Id: I64b8ede24643f942dc99956030c202c50d41ad1e
|
|
Ability to turn off filebeat is needed as it is being deprecated. To
achieve that existing log helper template is used.
Issue-ID: OOM-1
Signed-off-by: Maciej Wereski <m.wereski@partner.samsung.com>
Change-Id: I730b5463fea750594a23ce391c352959d166195e
|
|
|
|
pre-commit is now enforced by the CI chain.
Meanwhile, trailing blanks were introduced in the code base and must
be fixed so that gate pass.
Issue-ID: OOM-2643
Signed-off-by: guillaume.lambert <guillaume.lambert@orange.com>
Change-Id: I54daa27a1fdf019a6777e9b90274d0ef4f1ba08e
|
|
Use version 9.0.0 for Istanbul
Also update the doc.
Issue-ID: OOM-1
Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com>
Change-Id: I03e11799bf487226784c98b04116f005c89d1e70
|
|
|
|
- create a .pre-commit-config.yaml configuration file with
* gitlint
* trailing blanks linter
* tabs removal linter
- exclude .git folder from it
- exclude Makefiles since tabs are mandatory by default in them
- create a tox pre-commit profile to run it from tox
note gitlint is not runnable at this pre-commit stage
- create pre-commit-install and pre-commit-uninstall tox profiles to
(un)install hooks locally and (un)perform tests at each "git commit"
call (i.e. without calling manually the pre-commit tox profile)
- precise pre-commit stages/types in the pre-commit configuration file
so that hooks are installed correctly. This avoids messages about
skipped tests when they are run at a wrong stage.
Issue-ID: OOM-2643
Signed-off-by: guillaume.lambert <guillaume.lambert@orange.com>
Change-Id: Ie95bb4f6f90be80b05a1398973caffeff7936881
|
|
The 1.9.2 schema-service docker with cnf updates is being used
Issue-ID: AAI-3385
Signed-off-by: wr148d <wr148d@att.com>
Change-Id: Id5b585883433549aae3ce43f394862e158c5632b
|
|
Included changes are global requirement, schema, and security updates
Issue-ID: AAI-3375
Change-Id: I3e064fef882dc2593e85f1cef75320404338a626
Signed-off-by: wr148d <wr148d@att.com>
|
|
|
|
This patch makes AAI to work on service mesh by removing https calls
from everywhere.
It allows also to use AAI on an environment without need of TLS.
Issue-ID: OOM-2670
Signed-off-by: Ondrej Frindrich <ondrej1.frindrich@orange.com>
Change-Id: I19adabc7b33c1ada243ec16f77dbf8fde19b1386
|
|
|
|
|
|
Addded preStop hook to let long-running tasks be finished
before the SIGTERM is invoked
Issue-ID: AAI-3368
Signed-off-by: Mohammad Hosnidokht <mohammad.hosnidokht@yoppworks.com>
Change-Id: Ie5d0c5b454bd99022e5a2307e5813a92a8713ebd
|
|
Addded preStop hook to let long-running tasks be finished
before the SIGTERM is invoked
Issue-ID: AAI-3368
Signed-off-by: Mohammad Hosnidokht <mohammad.hosnidokht@yoppworks.com>
Change-Id: I7925c622f29b800c19cc7931a951f29083561cc1
|
|
Addded preStop hook to let long-running tasks be finished
before the SIGTERM is invoked
Issue-ID: AAI-3368
Signed-off-by: Mohammad Hosnidokht <mohammad.hosnidokht@yoppworks.com>
Change-Id: I02cc0068a3588d94b3da9414685e6cd798e9976f
|
|
Add service account to requirements.yaml, values.yaml and deployment/statefulset
Issue-ID: OOM-2704
Signed-off-by: farida azmy <farida.azmy.ext@orange.com>
Co-authored-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com>
Change-Id: Id03799f7a7ed1a031c7d819999496b18bac80881
|
|
|
|
In order to save some space
Issue-ID: OOM-2763
Signed-off-by: andreasgeissler <andreas-geissler@telekom.de>
Change-Id: Ibbd8d5f713307ada76a0d04ede57d3c7696bcfe5
|
|
After the change to use the generated certificate
the path to where the truststoreONAPAll.jks is changed
so updating location to match that
Issue-ID: AAI-3350
Change-Id: Ic20cd2c87eb66ca098dcc232d8629fd7d25d8413
Signed-off-by: Harish Venkata Kajur <vk250x@att.com>
|
|
In order to support multi-tenancy, keycloak(https://www.keycloak.org/)
as Identity and Access Management has been integrated into aai-traversal
and needs to be configured accordignly based on created instance
Issue-ID: AAI-3300
Signed-off-by: Sam Huang <sam.huang@yoppworks.com>
Change-Id: I393fb98ef6ac9cc6f4bf9d476cd682531d15011e
|
|
fix Keycloak integration into aai-resources PR by
replacing all hard coded values
with reference values in values.yaml file.
Issue-ID: AAI-3326
Signed-off-by: Roger Yuan <roger.yuan@yoppworks.com>
Change-Id: Ie8bd900d6512ad171ed3a5977a2f7e9e1c1da5ab
|
|
It seems that for PKCS12 stores there is no keypassword so we are
getting this error in our logs:
keytool error: java.lang.UnsupportedOperationException:
-keypasswd commands not supported if -storetype is PKCS12
Let's fix this by just not trying to set key password for PKCS12 stores.
Issue-ID: OOM-1
Change-Id: I8f4cc5a0b54029b3c1baa83b61092942e34ffab2
Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com>
|
|
|
|
Deployment of aai-resources sometimes fails with exception:
org.springframework.expression.ParseException:
Expression [BH#{XS@*#xoUULIO)eQkxaBA] @2: No ending suffix
'}' for expression starting at character 2: #{XS@*#xoUULIO)eQkxaBA
which basically means that aai-resources (and probably aai-traversal)
are unable to handle special characters that AAF is putting into cert
passwords. To avoid random AAI failures let's use a know method
proposed by Sylvain Desbureaux and just set passwords that contains
only alphanumeric characters.
Issue-ID: OOM-1
Change-Id: I248c2de6e59e4fc073b5a06f6409802634b254cf
Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com>
|
|
Instead of using hardcoded certificates, use certInitializer in order to
retrieve them automatically.
Issue-ID: OOM-2683
Change-Id: I1bd3fe575c1d3450905bdc5876b442fdb43660a9
Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com>
|
|
As retrieving values is now done via a generic script, let's clean a
little bit cert retrieval in order to be faster.
Issue-ID: OOM-2688
Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com>
Change-Id: I98dc2add27f39f615f34b319ea88edeeac987334
|
|
Updating the documentation and bumping version to 8.0.0
Issue-ID: OOM-1
Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com>
Change-Id: I6f942f1466fed64264c44fb8fc0e1ffc93a98f18
|
|
Updating the oom repo to use the java 11
docker images for the above microservices listed
Issue-ID: AAI-2996
Issue-ID: AAI-3011
Issue-ID: AAI-3004
Change-Id: I1f575922e9107195da51d648cd1b733c82498bad
Signed-off-by: Harish Venkata Kajur <vk250x@att.com>
|
|
|
|
Currently updating the sparky and generic
certificates to be valid until jan 2022
Issue-ID: AAI-2841
Change-Id: I2591c8c7c629e5642c9e6c28070c2666542ad4f3
Signed-off-by: Kajur, Harish (vk250x) <vk250x@att.com>
Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com>
|
|
In order for the aai ui to work properly in honolulu
the portal profile is being turned off. Portal
does not have the support needed and the future of
the component in ONAP is uncertain. The AAI UI will
still work in the portal with the profile turned off.
It will just not use its authentication integration
due to numerous issues dating back to Frankfurt.
Issue-ID: AAI-2905
Signed-off-by: wr148d <wr148d@att.com>
Change-Id: I7e120a16ced18b174c20bd9098883cd0e0e5d717
|
|
This reverts commit a9a41d84026f059aae70f9042c0b99af5b72e619.
aai-sparky-be with this patch fails often in the gate.
I expect this to be related to this patch as the stack trace contains
below error message:
java.io.IOException: keystore password was incorrect
Issue-ID: OOM-2683
Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com>
Change-Id: I53650671eae700ef553b2f9158744ab72d881820
|
|
|
|
Instead of using hardcoded certificates, use certInitializer in order to
retrieve them automatically.
Issue-ID: OOM-2683
Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com>
Change-Id: I63ce5d1bb2e9c287729425f2fd7146e7b69c33f7
|
|
Update schema service, resources, traversal
and graphadmin to use the latest released
artifacts for the honolulu release
Issue-ID: AAI-3269
Change-Id: Iba9deb226586e751cdd1631b9cb9c4f4500a0ff9
Signed-off-by: Harish Venkata Kajur <vk250x@att.com>
|
|
Remove Elastic Search
Remove Data Router
Remove Search Data
Remove Sparky dependencies on the above
Issue-ID: AAI-3181
Signed-off-by: wr148d <wr148d@att.com>
Change-Id: I9efb1c89d1f2196bc0cc82e394cd9a12098b14c7
|
|
Sparky config updated to 2.0.2
Issue-ID: AAI-3250
Signed-off-by: wr148d <wr148d@att.com>
Change-Id: I677358720234e576234582267b65b3a377c8cd6f
|
|
Use Certinitializer in order to retrieve needed certificates.
Issue-ID: OOM-2680
Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com>
Change-Id: I1ec295d863f8f6c0d11e64173b474e82f63e6b17
|
|
Use Certinitializer in order to retrieve needed certificates.
Issue-ID: OOM-2655
Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com>
Change-Id: Ie05936be0f513c76ea4dce31b8a460056b79a4b0
|
|
Update schema service to add v23 api
Also use java 11 for schema service
Issue-ID: AAI-3009
Change-Id: I44834fcbd900705dc3fb7707f8e3d5ddd8182284
Signed-off-by: Harish Venkata Kajur <vk250x@att.com>
|
|
|
|
Sparky config updated to no longer run a sync to elastic
Sparky config updated to 2.0.0
Issue-ID: AAI-3250
Change-Id: Iccae63830032ca7454b8127a605236f208699a7b
Signed-off-by: wr148d <wr148d@att.com>
|
|
Issue-ID: AAI-3274
Signed-off-by: Santos, Eric <eric.santos@yoppworks.com>
Change-Id: I783ad95fb44def2e0fb08c606e4b1728d1152d25
|
|
|
|
|
|
|
|
Instead of using an harcoded certificate for AAI Haproxy, let's use
certInitializer in order to have a fresh one.
Issue-ID: OOM-2654
Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com>
Change-Id: Id07af4084ae714bc7ba7132b218434229a0ba866
|
|
Updating the resources microservice to
trust the onap certificates to fix the
issue where the A&AI is unable to publish
to AAI-EVENT topic because A&AI is not trusting
the message router certificate
Issue-ID: AAI-3219
Change-Id: I33d52a1f4593154ce123e7c67aee6dcdeedaf889
Signed-off-by: Harish Venkata Kajur <vk250x@att.com>
|