遵循以下最佳实践的项目将能够自愿的自我认证,并显示他们已经实现了核心基础设施计划(OpenSSF)徽章。 显示详细资料
[](https://www.bestpractices.dev/projects/1771)
<a href="https://www.bestpractices.dev/projects/1771"><img src="https://www.bestpractices.dev/projects/1771/badge"></a>
ONAP External APIs expose the capabilities of ONAP. They allow ONAP to be viewed as a “black box” by providing an abstracted view of the ONAP capabilities.
There is no javascript, mainly java code, code style is defined here https://wiki.onap.org/display/DW/Java+code+style
ONAP adheres to the Linux Foundation Code of Conduct, found at https://lfprojects.org/policies/code-of-conduct
Jira is used to track issues. https://wiki.onap.org/display/DW/Tracking+Issues+with+JIRA
For each pull request, the project needs to be built successfully before the Merge option becomes activated. The test will be run automatically during the building process as well. Once build successfully and all tests has past, the Merge option will be activated.
Fix warning or « suppress » false positive warning + Sonar audit https://sonar.onap.org/dashboard?id=org.onap.externalapi-nbi%3Anbi-rest-services
[2020/01/13]
Usage of HTTPS with TLS 1.2 with SHA-2
https://jira.onap.org/browse/EXTAPI-255
[2020/01/13] Override default conf with Onap OOM deployment https://wiki.onap.org/display/DW/ONAP+Operations+Manager+Project https://docs.onap.org/en/latest/submodules/externalapi/nbi.git/docs/configuration/configuration.html
[2020/01/13] by default NBI exposes HTTPS with self signed certificates https://jira.onap.org/browse/EXTAPI-255
For Frankfurt Release both HTTP and HTTPS port are enable ( in order to no break functional usecase implementation for this release, HTTP will be switched off for the next release ) https://jira.onap.org/browse/EXTAPI-379
NBI consumes all inernal HTTP API, msb, dmaap, so, sdc, aai with HTTPS TLS 1.2
[2020/01/13] AAF_RootCA.cer used as Root CA to check all server certificates ( msb, aai, sdc, so, dmaap ). Root certificate imported in java keystore while building docker image
https://git.onap.org/externalapi/nbi/tree/Dockerfile
RUN for cert in $(ls -d /certs/*); do \ echo "adding $cert to java keystore..."; \ keytool -import \ -file "$cert" \ -storepass "${CERT_PASS}" \ -keystore $JAVA_HOME/lib/security/cacerts \ -alias "$(basename $cert)" \ --noprompt; \ done
Fortinet provides this level of support
警告:需要更长的理由。
后退