diff --git a/README.md b/README.md index 0336b9f6cdb9562ccff27d73f058d6293604de6b..67f6895ceea8ea255c7c992334dd56394f67864f 100644 --- a/README.md +++ b/README.md @@ -1,10 +1,11 @@ # TeraFlowSDN Controller -[Teraflow H2020 project](https://teraflow-h2020.eu/) - Secured autonomic traffic management for a Tera of SDN Flows +[ETSI OpenSource Group for TeraFlowSDN](https://tfs.etsi.org/) +Former, [Teraflow H2020 project](https://teraflow-h2020.eu/) - Secured autonomic traffic management for a Tera of SDN Flows -Branch "master" : [](https://gitlab.com/teraflow-h2020/controller/-/commits/master) [](https://gitlab.com/teraflow-h2020/controller/-/commits/master) +Branch "master" : [](https://labs.etsi.org/rep/tfs/controller/-/commits/master) [](https://labs.etsi.org/rep/tfs/controller/-/commits/master) -Branch "develop" : [](https://gitlab.com/teraflow-h2020/controller/-/commits/develop) [](https://gitlab.com/teraflow-h2020/controller/-/commits/develop) +Branch "develop" : [](https://labs.etsi.org/rep/tfs/controller/-/commits/develop) [](https://labs.etsi.org/rep/tfs/controller/-/commits/develop) # Installation Instructions -For devel and upcoming release 2.0, we have prepared the following tutorial: [TeraFlowSDN tutorial](https://gitlab.com/teraflow-h2020/controller/-/tree/develop/tutorial). +For devel and upcoming release 2.0, check the Wiki pages: [TeraFlowSDN Wiki](https://labs.etsi.org/rep/tfs/controller/-/wikis/home). diff --git a/deploy/component.sh b/deploy/component.sh index f3cbddd8fae2915c424e3e52c095f30fb212ec13..443bee6016b48ccefe93cc5aaf95f7c92f9ee725 100755 --- a/deploy/component.sh +++ b/deploy/component.sh @@ -41,7 +41,7 @@ export TFS_GRAFANA_PASSWORD=${TFS_GRAFANA_PASSWORD:-"admin123+"} ######################################################################################################################## # Constants -GITLAB_REPO_URL="registry.gitlab.com/teraflow-h2020/controller" +GITLAB_REPO_URL="labs.etsi.org:5050/tfs/controller" TMP_FOLDER="./tmp" # Create a tmp folder for files modified during the deployment diff --git a/deploy/crdb.sh b/deploy/crdb.sh index c3cae9d40a050fdb3df1a5677d9cfa0dddbc00ea..ecec39101b1a57014d3ca438fed57105f62074c4 100755 --- a/deploy/crdb.sh +++ b/deploy/crdb.sh @@ -141,13 +141,13 @@ function crdb_deploy_single() { echo "Create secret with CockroachDB data" kubectl create secret generic ${CRDB_SECRET_NAME} --namespace ${CRDB_SECRET_NAMESPACE} --type='Opaque' \ - --from-literal=namespace=${CRDB_NAMESPACE} \ - --from-literal=sql_port=${CRDB_SQL_PORT} \ - --from-literal=gui_port=${CRDB_GUI_PORT} \ - --from-literal=database=${CRDB_DATABASE} \ - --from-literal=username=${CRDB_USERNAME} \ - --from-literal=password="'"${CRDB_PASSWORD}"'" \ - --from-literal=sslmode=require + --from-literal=CRDB_NAMESPACE=${CRDB_NAMESPACE} \ + --from-literal=CRDB_SQL_PORT=${CRDB_SQL_PORT} \ + --from-literal=CRDB_GUI_PORT=${CRDB_GUI_PORT} \ + --from-literal=CRDB_DATABASE=${CRDB_DATABASE} \ + --from-literal=CRDB_USERNAME=${CRDB_USERNAME} \ + --from-literal=CRDB_PASSWORD="'"${CRDB_PASSWORD}"'" \ + --from-literal=CRDB_SSLMODE=require kubectl get all --all-namespaces } @@ -310,13 +310,13 @@ function crdb_deploy_cluster() { echo "Create secret with CockroachDB data" kubectl create secret generic ${CRDB_SECRET_NAME} --namespace ${CRDB_SECRET_NAMESPACE} --type='Opaque' \ - --from-literal=namespace=${CRDB_NAMESPACE} \ - --from-literal=sql_port=${CRDB_SQL_PORT} \ - --from-literal=gui_port=${CRDB_GUI_PORT} \ - --from-literal=database=${CRDB_DATABASE} \ - --from-literal=username=${CRDB_USERNAME} \ - --from-literal=password="'"${CRDB_PASSWORD}"'" \ - --from-literal=sslmode=require + --from-literal=CRDB_NAMESPACE=${CRDB_NAMESPACE} \ + --from-literal=CRDB_SQL_PORT=${CRDB_SQL_PORT} \ + --from-literal=CRDB_GUI_PORT=${CRDB_GUI_PORT} \ + --from-literal=CRDB_DATABASE=${CRDB_DATABASE} \ + --from-literal=CRDB_USERNAME=${CRDB_USERNAME} \ + --from-literal=CRDB_PASSWORD="'"${CRDB_PASSWORD}"'" \ + --from-literal=CRDB_SSLMODE=require kubectl get all --all-namespaces } diff --git a/deploy/mock_blockchain.sh b/deploy/mock_blockchain.sh index 066820fc0f9a1005823dd124798e4de122f206f8..f741f069f4ac87fea478cccc043951100f05e0e0 100755 --- a/deploy/mock_blockchain.sh +++ b/deploy/mock_blockchain.sh @@ -34,7 +34,7 @@ COMPONENT="mock_blockchain" ######################################################################################################################## # Constants -GITLAB_REPO_URL="registry.gitlab.com/teraflow-h2020/controller" +GITLAB_REPO_URL="labs.etsi.org:5050/tfs/controller" TMP_FOLDER="./tmp" # Create a tmp folder for files modified during the deployment diff --git a/deploy/nats.sh b/deploy/nats.sh index affae0b087f7f84d287051a6495f13b444b88c24..757b0984f5afebb0a252b3087f93d2a239a72faf 100755 --- a/deploy/nats.sh +++ b/deploy/nats.sh @@ -109,9 +109,9 @@ function nats_deploy_single() { echo "Create secret with NATS data" kubectl create secret generic ${NATS_SECRET_NAME} --namespace ${NATS_SECRET_NAMESPACE} --type='Opaque' \ - --from-literal=namespace=${NATS_NAMESPACE} \ - --from-literal=client_port=${NATS_CLIENT_PORT} \ - --from-literal=gui_port=${NATS_GUI_PORT} + --from-literal=NATS_NAMESPACE=${NATS_NAMESPACE} \ + --from-literal=NATS_CLIENT_PORT=${NATS_CLIENT_PORT} \ + --from-literal=NATS_GUI_PORT=${NATS_GUI_PORT} kubectl get all --all-namespaces } diff --git a/deploy/tfs.sh b/deploy/tfs.sh index e017ce35216bc649e4ee759fb362ab89702f4d40..efa4875c64b8e03b32f9727ecec690a6f2e060c5 100755 --- a/deploy/tfs.sh +++ b/deploy/tfs.sh @@ -47,7 +47,7 @@ export TFS_SKIP_BUILD=${TFS_SKIP_BUILD:-""} ######################################################################################################################## # Constants -GITLAB_REPO_URL="registry.gitlab.com/teraflow-h2020/controller" +GITLAB_REPO_URL="labs.etsi.org:5050/tfs/controller" TMP_FOLDER="./tmp" # Create a tmp folder for files modified during the deployment diff --git a/manifests/computeservice.yaml b/manifests/computeservice.yaml index 0c8d0a6724a49f4dec0f903570ff04e49cb4e793..89a4a39e5c1e9971b3ea496dbfa1a6595066b7f9 100644 --- a/manifests/computeservice.yaml +++ b/manifests/computeservice.yaml @@ -28,7 +28,7 @@ spec: terminationGracePeriodSeconds: 5 containers: - name: server - image: registry.gitlab.com/teraflow-h2020/controller/compute:latest + image: labs.etsi.org:5050/tfs/controller/compute:latest imagePullPolicy: Always ports: - containerPort: 8080 diff --git a/manifests/contextservice.yaml b/manifests/contextservice.yaml index f5844d81b683f9297f25d0099a55e6082d3644c2..3bb1a01d98dbccbe19a90c7f2e9dbaf607e7f031 100644 --- a/manifests/contextservice.yaml +++ b/manifests/contextservice.yaml @@ -29,20 +29,21 @@ spec: terminationGracePeriodSeconds: 5 containers: - name: server - image: registry.gitlab.com/teraflow-h2020/controller/context:latest + image: labs.etsi.org:5050/tfs/controller/context:latest imagePullPolicy: Always ports: - containerPort: 1010 - containerPort: 9192 env: - - name: CRDB_URI - value: "cockroachdb://tfs:tfs123@cockroachdb-public.crdb.svc.cluster.local:26257/tfs?sslmode=require" - name: MB_BACKEND - value: "inmemory" - #- name: NATS_URI - # value: "nats://tfs:tfs123@nats-public.nats.svc.cluster.local:4222" + value: "nats" - name: LOG_LEVEL value: "DEBUG" + envFrom: + - secretRef: + name: crdb-data + - secretRef: + name: nats-data readinessProbe: exec: command: ["/bin/grpc_health_probe", "-addr=:1010"] diff --git a/manifests/dbscanservingservice.yaml b/manifests/dbscanservingservice.yaml index 9553ed556bddaa437d89881f0c4220ae6e418239..e1f73a237c2a2a4d78b58778e83d88a0d3516eae 100644 --- a/manifests/dbscanservingservice.yaml +++ b/manifests/dbscanservingservice.yaml @@ -28,7 +28,7 @@ spec: terminationGracePeriodSeconds: 5 containers: - name: server - image: registry.gitlab.com/teraflow-h2020/controller/dbscanserving:latest + image: labs.etsi.org:5050/tfs/controller/dbscanserving:latest imagePullPolicy: Always ports: - containerPort: 10006 diff --git a/manifests/deviceservice.yaml b/manifests/deviceservice.yaml index 960096b93f20a608abf46fe626fe876f6566fb87..5c72263eb08f9cb46061fadbbb54861b98891396 100644 --- a/manifests/deviceservice.yaml +++ b/manifests/deviceservice.yaml @@ -29,7 +29,7 @@ spec: terminationGracePeriodSeconds: 5 containers: - name: server - image: registry.gitlab.com/teraflow-h2020/controller/device:latest + image: labs.etsi.org:5050/tfs/controller/device:latest imagePullPolicy: Always ports: - containerPort: 2020 diff --git a/manifests/dltservice.yaml b/manifests/dltservice.yaml index 0f6b5bb9df1ccfc6057c0746058da6754233376a..c067960b791cc4211118904dc60c23dbe8ab013b 100644 --- a/manifests/dltservice.yaml +++ b/manifests/dltservice.yaml @@ -28,7 +28,7 @@ spec: terminationGracePeriodSeconds: 5 containers: - name: connector - image: registry.gitlab.com/teraflow-h2020/controller/dlt-connector:latest + image: labs.etsi.org:5050/tfs/controller/dlt-connector:latest imagePullPolicy: Always ports: - containerPort: 8080 @@ -55,7 +55,7 @@ spec: cpu: 500m memory: 512Mi - name: gateway - image: registry.gitlab.com/teraflow-h2020/controller/dlt-gateway:latest + image: labs.etsi.org:5050/tfs/controller/dlt-gateway:latest imagePullPolicy: Always ports: - containerPort: 50051 diff --git a/manifests/interdomainservice.yaml b/manifests/interdomainservice.yaml index b275035f62c68eeb8d28f1892909650ca10defee..b214343614626936b8c43bfaef6310ba21fed3cf 100644 --- a/manifests/interdomainservice.yaml +++ b/manifests/interdomainservice.yaml @@ -28,7 +28,7 @@ spec: terminationGracePeriodSeconds: 5 containers: - name: server - image: registry.gitlab.com/teraflow-h2020/controller/interdomain:latest + image: labs.etsi.org:5050/tfs/controller/interdomain:latest imagePullPolicy: Always ports: - containerPort: 10010 diff --git a/manifests/l3_attackmitigatorservice.yaml b/manifests/l3_attackmitigatorservice.yaml index 2240776ebb2e234b58febe9520a4b9e07d42b6d4..592143089c326c6bf06eaad982f725bacc48717d 100644 --- a/manifests/l3_attackmitigatorservice.yaml +++ b/manifests/l3_attackmitigatorservice.yaml @@ -28,7 +28,7 @@ spec: terminationGracePeriodSeconds: 5 containers: - name: server - image: registry.gitlab.com/teraflow-h2020/controller/l3_attackmitigator:latest + image: labs.etsi.org:5050/tfs/controller/l3_attackmitigator:latest imagePullPolicy: Always ports: - containerPort: 10002 diff --git a/manifests/l3_centralizedattackdetectorservice.yaml b/manifests/l3_centralizedattackdetectorservice.yaml index fa7ee9dccd99982d35d7f7705e463ecee30c7c9b..8672cab9554a5def10c46f75935cea9c45c03529 100644 --- a/manifests/l3_centralizedattackdetectorservice.yaml +++ b/manifests/l3_centralizedattackdetectorservice.yaml @@ -28,7 +28,7 @@ spec: terminationGracePeriodSeconds: 5 containers: - name: server - image: registry.gitlab.com/teraflow-h2020/controller/l3_centralizedattackdetector:latest + image: labs.etsi.org:5050/tfs/controller/l3_centralizedattackdetector:latest imagePullPolicy: Always ports: - containerPort: 10001 diff --git a/manifests/l3_distributedattackdetectorservice.yaml b/manifests/l3_distributedattackdetectorservice.yaml index 6b28f68dd5e08561eb29e4512af330b26f6408cf..8765b7171c174b9cf4a0ad8854dc29b61839114f 100644 --- a/manifests/l3_distributedattackdetectorservice.yaml +++ b/manifests/l3_distributedattackdetectorservice.yaml @@ -28,7 +28,7 @@ spec: terminationGracePeriodSeconds: 5 containers: - name: server - image: registry.gitlab.com/teraflow-h2020/controller/l3_distributedattackdetector:latest + image: labs.etsi.org:5050/tfs/controller/l3_distributedattackdetector:latest imagePullPolicy: Always ports: - containerPort: 10000 diff --git a/manifests/load_generatorservice.yaml b/manifests/load_generatorservice.yaml index 88b1fa397a2708408b7a7ea5b9be28a984e938aa..4d7b32d1bc6e608bdcecf290367aff8ad729a19e 100644 --- a/manifests/load_generatorservice.yaml +++ b/manifests/load_generatorservice.yaml @@ -29,7 +29,7 @@ spec: terminationGracePeriodSeconds: 5 containers: - name: server - image: registry.gitlab.com/teraflow-h2020/controller/load_generator:latest + image: labs.etsi.org:5050/tfs/controller/load_generator:latest imagePullPolicy: Always ports: - containerPort: 50052 diff --git a/manifests/mock_blockchain.yaml b/manifests/mock_blockchain.yaml index bf9abac703b263ad6a843f0d70848dde94a4ab97..17b32a47ed1a4b61bf83a12344a8ef1d6e2c336e 100644 --- a/manifests/mock_blockchain.yaml +++ b/manifests/mock_blockchain.yaml @@ -28,7 +28,7 @@ spec: terminationGracePeriodSeconds: 5 containers: - name: server - image: registry.gitlab.com/teraflow-h2020/controller/mock_blockchain:latest + image: labs.etsi.org:5050/tfs/controller/mock_blockchain:latest imagePullPolicy: Always ports: - containerPort: 50051 diff --git a/manifests/monitoringservice.yaml b/manifests/monitoringservice.yaml index aed8d1c51e5e84abec11dcc272c786b208dd9556..b5f3042ba068153856d42f15c174a80ebdc6f266 100644 --- a/manifests/monitoringservice.yaml +++ b/manifests/monitoringservice.yaml @@ -66,7 +66,7 @@ spec: restartPolicy: Always containers: - name: server - image: registry.gitlab.com/teraflow-h2020/controller/monitoring:latest + image: labs.etsi.org:5050/tfs/controller/monitoring:latest imagePullPolicy: Always ports: - name: grpc diff --git a/manifests/opticalattackmitigatorservice.yaml b/manifests/opticalattackmitigatorservice.yaml index afe2e4069fbae2fd3b5300da614b4deb5d785fab..0252eec219306a22f4fba7c4509639a41fc9803e 100644 --- a/manifests/opticalattackmitigatorservice.yaml +++ b/manifests/opticalattackmitigatorservice.yaml @@ -28,7 +28,7 @@ spec: terminationGracePeriodSeconds: 5 containers: - name: server - image: registry.gitlab.com/teraflow-h2020/controller/opticalattackmitigator:latest + image: labs.etsi.org:5050/tfs/controller/opticalattackmitigator:latest imagePullPolicy: Always ports: - containerPort: 10007 diff --git a/manifests/opticalcentralizedattackdetectorservice.yaml b/manifests/opticalcentralizedattackdetectorservice.yaml index 664bcb54348e533ff40c7f882b5668f727a39053..4a49f8b13c09617caaf3c170ee265e9166802a71 100644 --- a/manifests/opticalcentralizedattackdetectorservice.yaml +++ b/manifests/opticalcentralizedattackdetectorservice.yaml @@ -28,7 +28,7 @@ spec: terminationGracePeriodSeconds: 5 containers: - name: server - image: registry.gitlab.com/teraflow-h2020/controller/opticalcentralizedattackdetector:latest + image: labs.etsi.org:5050/tfs/controller/opticalcentralizedattackdetector:latest imagePullPolicy: Always ports: - containerPort: 10005 diff --git a/manifests/pathcompservice.yaml b/manifests/pathcompservice.yaml index e9b890e76ca45cb2e56e87570d2dd01285f3fc50..4f7a65c45bb0902f1f9800c0bd3613a3b25b440a 100644 --- a/manifests/pathcompservice.yaml +++ b/manifests/pathcompservice.yaml @@ -29,7 +29,7 @@ spec: terminationGracePeriodSeconds: 5 containers: - name: frontend - image: registry.gitlab.com/teraflow-h2020/controller/pathcomp-frontend:latest + image: labs.etsi.org:5050/tfs/controller/pathcomp-frontend:latest imagePullPolicy: Always ports: - containerPort: 10020 @@ -51,7 +51,7 @@ spec: cpu: 500m memory: 512Mi - name: backend - image: registry.gitlab.com/teraflow-h2020/controller/pathcomp-backend:latest + image: labs.etsi.org:5050/tfs/controller/pathcomp-backend:latest imagePullPolicy: Always #readinessProbe: # httpGet: diff --git a/manifests/serviceservice.yaml b/manifests/serviceservice.yaml index b24bf13f07f4f520c83ffc332d7c304a9d479b75..561b204cbfc9767c9af79eb9ebaea8e9f3ec0685 100644 --- a/manifests/serviceservice.yaml +++ b/manifests/serviceservice.yaml @@ -29,7 +29,7 @@ spec: terminationGracePeriodSeconds: 5 containers: - name: server - image: registry.gitlab.com/teraflow-h2020/controller/service:latest + image: labs.etsi.org:5050/tfs/controller/service:latest imagePullPolicy: Always ports: - containerPort: 3030 diff --git a/manifests/sliceservice.yaml b/manifests/sliceservice.yaml index 375344a97d4c667acec81e455cf86209bd1ec1a7..ca7641de37fd57cd4e1cfe9493aad5dd4763fe4e 100644 --- a/manifests/sliceservice.yaml +++ b/manifests/sliceservice.yaml @@ -29,7 +29,7 @@ spec: terminationGracePeriodSeconds: 5 containers: - name: server - image: registry.gitlab.com/teraflow-h2020/controller/slice:latest + image: labs.etsi.org:5050/tfs/controller/slice:latest imagePullPolicy: Always ports: - containerPort: 4040 diff --git a/manifests/webuiservice.yaml b/manifests/webuiservice.yaml index dd8004ad83586eae7a2ed23961035262411b434a..3828ee419941fcfac00e005ec3eac7b2d4df4dfb 100644 --- a/manifests/webuiservice.yaml +++ b/manifests/webuiservice.yaml @@ -32,7 +32,7 @@ spec: - 0 containers: - name: server - image: registry.gitlab.com/teraflow-h2020/controller/webui:latest + image: labs.etsi.org:5050/tfs/controller/webui:latest imagePullPolicy: Always ports: - containerPort: 8004 diff --git a/scripts/old/deploy_in_kubernetes.sh b/scripts/old/deploy_in_kubernetes.sh index 89f45a5484f95f065f6656249f3fb04bf507a782..c85354137462e259de787df46ec2d1b8f40331c6 100755 --- a/scripts/old/deploy_in_kubernetes.sh +++ b/scripts/old/deploy_in_kubernetes.sh @@ -43,7 +43,7 @@ export EXTRA_MANIFESTS=${EXTRA_MANIFESTS:-""} ######################################################################################################################## # Constants -GITLAB_REPO_URL="registry.gitlab.com/teraflow-h2020/controller" +GITLAB_REPO_URL="labs.etsi.org:5050/tfs/controller" TMP_FOLDER="./tmp" # Create a tmp folder for files modified during the deployment diff --git a/src/automation/src/main/resources/application.yml b/src/automation/src/main/resources/application.yml index bc89d4348dfdfc5dc3f9159fb167d00509a8e4dc..62cf8fc8ec394bb374817c9153eb9b4552af28ba 100644 --- a/src/automation/src/main/resources/application.yml +++ b/src/automation/src/main/resources/application.yml @@ -33,9 +33,9 @@ quarkus: port: 8080 container-image: - group: teraflow-h2020 + group: tfs name: controller/automation - registry: registry.gitlab.com + registry: labs.etsi.org:5050 kubernetes: name: automationservice diff --git a/src/automation/target/kubernetes/kubernetes.yml b/src/automation/target/kubernetes/kubernetes.yml index 8bc14b935b4e4f4a18ed03f10cca0b74f480dcf0..f4f1c7dae70109792339c54b6dc7c3c9fdec786a 100644 --- a/src/automation/target/kubernetes/kubernetes.yml +++ b/src/automation/target/kubernetes/kubernetes.yml @@ -52,7 +52,7 @@ spec: value: contextservice - name: DEVICE_SERVICE_HOST value: deviceservice - image: registry.gitlab.com/teraflow-h2020/controller/automation:0.2.0 + image: labs.etsi.org:5050/tfs/controller/automation:0.2.0 imagePullPolicy: Always livenessProbe: failureThreshold: 3 diff --git a/src/common/message_broker/backend/nats/NatsBackend.py b/src/common/message_broker/backend/nats/NatsBackend.py index 197bc863328affc90fbf125645343e729d5ec08c..6c644a0a815cb737211af1e00db5828da0120db5 100644 --- a/src/common/message_broker/backend/nats/NatsBackend.py +++ b/src/common/message_broker/backend/nats/NatsBackend.py @@ -20,10 +20,17 @@ from .._Backend import _Backend from .NatsBackendThread import NatsBackendThread DEFAULT_NATS_URI = 'nats://127.0.0.1:4222' +#NATS_URI_TEMPLATE = 'nats://{:s}:{:s}@nats.{:s}.svc.cluster.local:{:s}' # with authentication +NATS_URI_TEMPLATE = 'nats://nats.{:s}.svc.cluster.local:{:s}' class NatsBackend(_Backend): def __init__(self, **settings) -> None: # pylint: disable=super-init-not-called - nats_uri = get_setting('NATS_URI', settings=settings, default=DEFAULT_NATS_URI) + nats_namespace = get_setting('NATS_NAMESPACE', settings=settings) + nats_client_port = get_setting('NATS_CLIENT_PORT', settings=settings) + if nats_namespace is None or nats_client_port is None: + nats_uri = get_setting('NATS_URI', settings=settings, default=DEFAULT_NATS_URI) + else: + nats_uri = NATS_URI_TEMPLATE.format(nats_namespace, nats_client_port) self._terminate = threading.Event() self._nats_backend_thread = NatsBackendThread(nats_uri) self._nats_backend_thread.start() diff --git a/src/context/service/database/Engine.py b/src/context/service/database/Engine.py index c507efc720ea75381f4f9e83c84d007fb4be5890..a37ec0c1e88f6fd8b7f46fd5f6b0383d32cde2b8 100644 --- a/src/context/service/database/Engine.py +++ b/src/context/service/database/Engine.py @@ -19,11 +19,20 @@ LOGGER = logging.getLogger(__name__) APP_NAME = 'tfs' ECHO = False # true: dump SQL commands and transactions executed +CRDB_URI_TEMPLATE = 'cockroachdb://{:s}:{:s}@cockroachdb-public.{:s}.svc.cluster.local:{:s}/{:s}?sslmode={:s}' class Engine: @staticmethod def get_engine() -> sqlalchemy.engine.Engine: - crdb_uri = get_setting('CRDB_URI') + CRDB_NAMESPACE = get_setting('CRDB_NAMESPACE') + CRDB_SQL_PORT = get_setting('CRDB_SQL_PORT') + CRDB_DATABASE = get_setting('CRDB_DATABASE') + CRDB_USERNAME = get_setting('CRDB_USERNAME') + CRDB_PASSWORD = get_setting('CRDB_PASSWORD') + CRDB_SSLMODE = get_setting('CRDB_SSLMODE') + + crdb_uri = CRDB_URI_TEMPLATE.format( + CRDB_USERNAME, CRDB_PASSWORD, CRDB_NAMESPACE, CRDB_SQL_PORT, CRDB_DATABASE, CRDB_SSLMODE) try: engine = sqlalchemy.create_engine( diff --git a/src/policy/src/main/resources/application.yml b/src/policy/src/main/resources/application.yml index 3d992763422c9044136c38f21cf6d609281f86ca..fa7dff7b20defc1c2d35e537ea66fceec79a1323 100644 --- a/src/policy/src/main/resources/application.yml +++ b/src/policy/src/main/resources/application.yml @@ -34,9 +34,9 @@ quarkus: port: 8080 container-image: - group: teraflow-h2020 + group: tfs name: controller/policy - registry: registry.gitlab.com + registry: labs.etsi.org:5050 kubernetes: name: policyservice diff --git a/src/policy/target/kubernetes/kubernetes.yml b/src/policy/target/kubernetes/kubernetes.yml index 1a2b4e26c2147273256587e5580265464be69758..51ed10e4a74b7f711cf2c8ff9b0db85fdb4e7247 100644 --- a/src/policy/target/kubernetes/kubernetes.yml +++ b/src/policy/target/kubernetes/kubernetes.yml @@ -57,7 +57,7 @@ spec: value: contextservice - name: SERVICE_SERVICE_HOST value: serviceservice - image: registry.gitlab.com/teraflow-h2020/controller/policy:0.1.0 + image: labs.etsi.org:5050/tfs/controller/policy:0.1.0 imagePullPolicy: Always livenessProbe: failureThreshold: 3 diff --git a/src/tests/oeccpsc22/deploy_in_kubernetes.sh b/src/tests/oeccpsc22/deploy_in_kubernetes.sh index 426e07e1376207065b02db3205e46dd2cbe9a39d..fffce0b768830cc68229415879ebb6795f0e4e69 100755 --- a/src/tests/oeccpsc22/deploy_in_kubernetes.sh +++ b/src/tests/oeccpsc22/deploy_in_kubernetes.sh @@ -22,7 +22,7 @@ export K8S_HOSTNAME="kubernetes-master" #export GRAFANA_PASSWORD="admin123+" # Constants -GITLAB_REPO_URL="registry.gitlab.com/teraflow-h2020/controller" +GITLAB_REPO_URL="labs.etsi.org:5050/tfs/controller" TMP_FOLDER="./tmp" # Create a tmp folder for files modified during the deployment