Hi,

I updated the test to verify the certificates: 
https://gerrit.onap.org/r/c/integration/+/109207

I see 3 possible "modes": nodeports, internal and ingress

for the moment I worked the nodeport mode, you will find attached the results 
of the test on the daily frankfurt.
I have some questions for SECCOM/OOM.

For this test, I retrieve all the ONAP services from the kubernetes client, 
then for each service I give a try to the nodeport.
then at the end I build a table, the main table includes the following fields
Component = service name | Port = node port | Expiration date  | Remaining days 
| Cluster IP = cluster IP associated with the node port | Root CA = info got 
from the certificate issuer | Root CA Validity

The other tables below correspond to specific errors (SSL, connection,..), I do 
not consider them as error criteria as the test being executed from outside the 
cluster, it is usually logical to get the error but I prefer to keep a trace in 
a table.
I should be able to test these ports in internal mode later.

Question 1: Expiration date and Remaining days are redundant: shall I keep the 
2 columns or keep only the remaining days?

I do consider 2 parameters for the test success criteria
- the certificate remaining days
- the root CA validity

The color code is as follow and can be easily amended if you have any 
recommendations or design advices

remaining days
 > 1000 => line is light blue
Question 2: 1000 is totally arbitrary, what is the recommendation to say that 
the certificates is probably too long > 365 > 1000 > ?
 30< expiration < 60 => line is orange
 expiration < 30 => line is red light
 = 364 (+ Root CA OK) => line is green light => it corresponds to 
auto-generated certificates
no color in any other case

Question 3: are you OK with the color code?

Question 4: Shall I keep the error table or is it misleading?

root CA
if I got C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9 => I consider the Root CA as 
OK => Validity is a green square
if not => red circle

Both indicators are independent
we can be red with a good certificate Root CA and we can be green and have a 
red circle if the certificate is still valid but the Root CA not correct

At the end the success criteria is False is 1 of the certificate is under 30 
days or Root CA are not correct.
It means that it will be FAIL until everything is fxed..

Question 5: success criteria => only expiration date or expiration date + root 
CA?

Question 6: shall we plan a xfail list here?

Question 7: Note I added the Cluster IP for information, any other info you 
would like to see in the table?

I started working on the integration in CI
Once open questions clarified, the code in integration repository will be merged
I will create a xtesting docker (I did already one quickly in gitlab.com, I 
will create a new patch in ONAP as xtesting and its associated docker build 
chain has be reintegrated in ONAP repositories)
I put this test in the infra-healthcheck docker (was almost ready from a 
dependency perspective)

+--------------------------------+------------------+------------------+----------------+
|   TEST CASE       |  PROJECT  | DURATION |  RESULT  |
+--------------------------------+------------------+------------------+----------------+
| nodeport_check_certs |  security   |  00:02     |  FAIL     |
+--------------------------------+------------------+------------------+----------------+


Once the new docker would be created, the test will be automatically run, I 
would 'just" need to adapt the dashboard to display the result of this test 
(daily and gating)

/Morgan






_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.

View/Reply Online (#21552): https://lists.onap.org/g/onap-discuss/message/21552
Mute This Topic: https://lists.onap.org/mt/75215203/21656
Group Owner: [email protected]
Unsubscribe: https://lists.onap.org/g/onap-discuss/unsub  
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Title: Tests results - ONAP Certificates expiration page

ONAP Certificates

Node ports

Component Port Expiration date Remaining days Cluster IP Root CA Root CA Validity
aaf-gui 30251 2021-06-30 06:59:15 364 10.233.46.149 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
aai 30233 2021-03-17 20:28:56 260 10.233.39.162 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
aai-sparky-be 30220 2021-03-17 20:28:56 260 10.233.4.158 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
appc 30230 2029-07-15 19:49:01 3302 10.233.18.92 C=US;ST=NJ;L=middletown;O=odl;OU=odl;CN=odl
appc-cdt 30289 2022-03-18 21:30:53 626 10.233.10.146 C=US;L=Default City;O=ONAP;OU=APPC;CN=cdt
appc-dgbuilder 30228 2019-09-01 14:26:24 -303 10.233.19.194 C=US;ST=Some-State;O=Internet Widgits Pty Ltd;CN=dgbuilder
cdash-kibana 30290 2021-02-04 12:23:52 218 10.233.19.0 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
cds-ui 30497 2021-02-18 10:41:56 232 10.233.62.242 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
clamp-external 30258 2021-02-04 12:23:52 218 10.233.21.230 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
cli 30260 2047-07-08 10:29:38 9868 10.233.30.226 C=IN;ST=KA;L=BLR;O=CLI;CN=onap
cli 30271 2047-07-08 10:29:38 9868 10.233.30.226 C=IN;ST=KA;L=BLR;O=CLI;CN=onap
dashboard 30418 2021-06-30 07:12:59 364 10.233.24.247 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
dmaap-bc 30242 2021-06-30 07:00:43 364 10.233.49.233 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
dmaap-dr-node-external 30494 2021-06-30 07:06:09 364 10.233.17.63 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
dmaap-dr-prov 30269 2021-06-30 07:00:41 364 10.233.38.92 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
message-router-external 30226 2021-03-25 04:23:49 267 10.233.43.28 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
msb-eag 30284 2022-05-13 02:22:27 681 10.233.24.194 C=CN;ST=sichuang;L=chengdu;O=zte;OU=zenap;CN=ZTE OpenPalette Root Certificate Authority 2017
msb-iag 30283 2022-05-13 02:22:27 681 10.233.24.59 C=CN;ST=sichuang;L=chengdu;O=zte;OU=zenap;CN=ZTE OpenPalette Root Certificate Authority 2017
music 30407 2021-02-03 16:21:00 218 10.233.35.115 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
nbi 30274 2021-06-30 07:08:38 364 10.233.46.134 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
oof-has-api 30275 2021-04-04 18:43:16 278 10.233.2.237 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
oof-osdf 30248 2021-04-04 18:43:16 278 10.233.20.99 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
pap 30219 2021-03-17 23:10:40 260 10.233.1.220 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
pap 30218 2021-03-17 23:10:40 260 10.233.1.220 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
portal-app 30225 2021-06-30 07:24:13 364 10.233.19.98 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
portal-sdk 30212 2021-06-30 07:20:07 364 10.233.53.52 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
refrepo 30297 2020-06-20 11:50:35 -11 10.233.32.33 C=IN;ST=Bangalore;L=Bangalore;O=Global Security;OU=ONAP;CN=example.com
robot 30209 2030-03-28 14:39:39 3558 10.233.40.74 C=US;ST=NJ;L=Middletown;O=ONAP;OU=robot;CN=robot-onap.onap.org;[email protected]
sdc-be-external 30204 2021-03-24 13:38:23 267 10.233.45.105 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
sdc-dcae-dt 30266 2021-03-24 13:38:23 267 10.233.59.243 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
sdc-dcae-fe 30264 2021-03-24 13:38:23 267 10.233.42.120 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
sdc-fe 30207 2021-03-24 13:38:23 267 10.233.33.94 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
sdc-wfd-be 30257 2021-03-24 13:38:23 267 10.233.11.52 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
sdc-wfd-fe 30256 2021-03-24 13:38:23 267 10.233.0.144 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
sdnc 30267 2021-06-30 07:13:58 364 10.233.49.166 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
sdnc-dgbuilder 30203 2019-09-01 14:26:24 -303 10.233.34.90 C=US;ST=Some-State;O=Internet Widgits Pty Ltd;CN=dgbuilder
so-vnfm-adapter 30406 2020-07-18 15:27:09 18 10.233.5.22 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
uui 30398 2030-03-01 08:14:29 3530 10.233.34.35 C=cn;L=Beijing;O=ChinaMobile;OU=Development;CN=Usecaseui Server
uui-server 30399 2030-01-08 14:25:51 3479 10.233.50.218 C=cn;L=Beijing;O=ChinaMobile;OU=Development;CN=Usecaseui Server
vid 30200 2021-03-17 15:13:49 260 10.233.19.179 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9
xdcae-ves-collector 30417 2021-06-30 07:18:35 364 10.233.60.221 C=US;O=ONAP;OU=OSAAF;CN=intermediateCA_9

Node ports SSL errors

Component Port
aai-babel 30279
netbox-nginx 30420
so 30277
xdcae-hv-ves-collector 30222

Node ports Connection errors

Component Port
aai-modelloader 30210
appc 30231
awx-web 30478
message-router-kafka-0 30490
message-router-kafka-1 30491
message-router-kafka-2 30492
sdnc-portal 30201

Reply via email to