Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

HV-VES collector protects both external and internal traffic using the same certificate and trusted certificates. Such are configured by properties:

Code Block
TBACurrent one is actually external one:
security.keys.keyStoreFile: /etc/ves-hv/ssl/cert.jks
security.keys.keyStorePasswordFile: /etc/ves-hv/ssl/jks.pass
security.keys.trustStoreFile: /etc/ves-hv/ssl/trust.jks
security.keys.trustStorePasswordFile: /etc/ves-hv/ssl/trust.pass


Way forward

K8s plugin

So, to implement goal of this feature, K8s plugin must be enhanced to support following new properties in tlsnew external_info cert section:

Code Block
external_cert:
	use_external_tls
	external_cert_directory
	image_tag
	request_url
	timeout
	ca_name
	common_name
	sans
	country
	organization
	state
	organizational_unit
	location


Meaning of properties is described in following table. CertService's client properties are described in details on a dedicated page.

* - property available in blueprint inputs, so can be changed every deployment

...

tlsinfoexternal_cert
GroupProperty nameType (input*/blueprint**)DefaultDescription
external_cert









use_external_tlsinputtrueA boolean that indicates whether the component uses AAF CertService to acquire operator certificate to protect external (between xNFs and ONAP) traffic. For a time being only operator certificate from CMPv2 server is supported
external_cert_directoryblueprint/opt/app/dcae-certificate/external_certDirectory where operator certificate and trusted certs should be created
image_taginputnexus3.onap.org:10001/onap/org.onap.aaf.cert.service.client:1.0.0 (question)Image name and version
request_urlblueprint

https://aaf-cert-service-service:8443/v1/certificate/

URL to Cert Service API
timeoutblueprint30000Request timeout
ca_nameinputRA_TESTName of Certificate Authority configured on CertService side (in cmpServers.json). Default RA_TEST corresponds to default CMPv2 testing configuration.
common_nameinput<Specific for every blueprint>Common name which should be present in certificate. Specific for every blueprint (e.g. dcae-ves-collector for VES)
sansinput<Specific for every blueprint>List of Subject Alternative Names (SANs) which should be present in certificate. Delimiter - : Should contain common_name value and other FQDNs under which given component is accessible, e.g. if xNFs uses ves-collector in request URL, such should be also present in SANs - e.g. dcae-ves-collector:ves-collector.
countryinputUSCountry name in ISO 3166-1 alpha-2 format, for which certificate will be created
organizationinputLinux-FoundationOrganization name, for which certificate will be created
stateinputCaliforniaState name, for which certificate will be created
organizational_unitinputONAPOrganizational unit name, for which certificate will be created
locationinputSan-FranciscoLocation name, for which certificate will be created

...


If new properties are provided by blueprint and use_external_tls

...

Additionally, K8s plugin should be enhanced to support all properties which are required by CertService's client and which are listed on a dedicated page.

In the end is set to true, K8s plugin must be able to create init containers section and within it add information about CertService's client image and pass all other variables as environment variables. Very similar to example described on a dedicated page. 

DCAE bluerprints

Cloudify blueprints must be adjusted to take advantage of new K8s plugin functionality and must provide extra properties which controls CertService's client call.

...