Add sftp strict host key checking to DFC consul configs 45/110145/1
authorRemigiusz Janeczek <remigiusz.janeczek@nokia.com>
Tue, 14 Jul 2020 07:33:25 +0000 (09:33 +0200)
committerRemigiusz Janeczek <remigiusz.janeczek@nokia.com>
Tue, 14 Jul 2020 07:33:25 +0000 (09:33 +0200)
Issue-ID: DCAEGEN2-2219
Signed-off-by: Remigiusz Janeczek <remigiusz.janeczek@nokia.com>
Change-Id: I93b673bc947edaeff57a19bda822f6ed70521b87

13 files changed:
test/mocks/datafilecollector-testharness/simulator-group/consul/c12_feed1_PM.json
test/mocks/datafilecollector-testharness/simulator-group/consul/c12_feed1_PM_feed2_CTR.json
test/mocks/datafilecollector-testharness/simulator-group/consul/c12_feed2_CTR.json
test/mocks/datafilecollector-testharness/simulator-group/consul/c12_feed2_CTR_feed3_LOG_TEMP.json
test/mocks/datafilecollector-testharness/simulator-group/consul/c12_feed2_PM.json
test/mocks/datafilecollector-testharness/simulator-group/consul/c12_feed2_PM_MEAS.json
test/mocks/datafilecollector-testharness/simulator-group/consul/c12_feed2_PM_MEAS_no_strict_host_key_checking.json [new file with mode: 0644]
test/mocks/datafilecollector-testharness/simulator-group/consul/c12_feed2_PM_secureMR.json
test/mocks/datafilecollector-testharness/simulator-group/consul/c12_feed3_PM_CTR.json
test/mocks/datafilecollector-testharness/simulator-group/consul/c13_feed2_CTR.json
test/mocks/datafilecollector-testharness/simulator-group/consul/c14_feed3_LOG.json
test/mocks/datafilecollector-testharness/simulator-group/consul/c15_feed1_PM_feed4_TEST.json
test/mocks/datafilecollector-testharness/simulator-group/consul/c16_feed4_TEST_feed5_TEMP.json

index 787e6c6..2defeb0 100644 (file)
@@ -8,6 +8,7 @@
   "dmaap.security.keyStorePath": "/opt/app/datafile/etc/cert/cert.jks",
   "dmaap.security.keyStorePasswordPath": "/opt/app/datafile/etc/cert/jks.pass",
   "dmaap.security.enableDmaapCertAuth": "false",
+  "sftp.security.strictHostKeyChecking": "true",
   "streams_publishes": {
     "PM_MEAS_FILES": {
       "type": "data_router",
index c711517..dea4e2e 100644 (file)
@@ -8,6 +8,7 @@
   "dmaap.security.keyStorePath": "/opt/app/datafile/etc/cert/cert.jks",
   "dmaap.security.keyStorePasswordPath": "/opt/app/datafile/etc/cert/jks.pass",
   "dmaap.security.enableDmaapCertAuth": "false",
+  "sftp.security.strictHostKeyChecking": "true",
   "streams_publishes": {
     "PM_MEAS_FILES": {
       "type": "data_router",
index bc21a96..2cdb656 100644 (file)
@@ -8,6 +8,7 @@
   "dmaap.security.keyStorePath": "/opt/app/datafile/etc/cert/cert.jks",
   "dmaap.security.keyStorePasswordPath": "/opt/app/datafile/etc/cert/jks.pass",
   "dmaap.security.enableDmaapCertAuth": "false",
+  "sftp.security.strictHostKeyChecking": "true",
   "streams_subscribes": {
     "dmaap_subscriber": {
       "dmaap_info": {
index 90ddc25..8d76b43 100644 (file)
@@ -8,6 +8,7 @@
   "dmaap.security.keyStorePath": "/opt/app/datafile/etc/cert/cert.jks",
   "dmaap.security.keyStorePasswordPath": "/opt/app/datafile/etc/cert/jks.pass",
   "dmaap.security.enableDmaapCertAuth": "false",
+  "sftp.security.strictHostKeyChecking": "true",
   "streams_publishes": {
     "CTR_MEAS_FILES": {
       "type": "data_router",
index d54b9e5..8243ddd 100644 (file)
@@ -8,6 +8,7 @@
   "dmaap.security.keyStorePath": "/opt/app/datafile/etc/cert/cert.jks",
   "dmaap.security.keyStorePasswordPath": "/opt/app/datafile/etc/cert/jks.pass",
   "dmaap.security.enableDmaapCertAuth": "false",
+  "sftp.security.strictHostKeyChecking": "true",
   "streams_publishes": {
     "PM_MEAS_FILES": {
       "type": "data_router",
index b1e8940..d041852 100644 (file)
@@ -8,6 +8,7 @@
   "dmaap.security.keyStorePath": "/opt/app/datafile/etc/cert/cert.jks",
   "dmaap.security.keyStorePasswordPath": "/opt/app/datafile/etc/cert/jks.pass",
   "dmaap.security.enableDmaapCertAuth": "false",
+  "sftp.security.strictHostKeyChecking": "true",
   "streams_publishes": {
     "PM_MEAS_FILES": {
       "type": "data_router",
diff --git a/test/mocks/datafilecollector-testharness/simulator-group/consul/c12_feed2_PM_MEAS_no_strict_host_key_checking.json b/test/mocks/datafilecollector-testharness/simulator-group/consul/c12_feed2_PM_MEAS_no_strict_host_key_checking.json
new file mode 100644 (file)
index 0000000..2b0defb
--- /dev/null
@@ -0,0 +1,33 @@
+{
+  "dmaap.ftpesConfig.keyCert": "/opt/app/datafile/etc/cert/cert.jks",
+  "dmaap.ftpesConfig.keyPasswordPath": "/opt/app/datafile/etc/cert/jks.pass",
+  "dmaap.ftpesConfig.trustedCa": "/opt/app/datafile/etc/cert/trust.jks",
+  "dmaap.ftpesConfig.trustedCaPasswordPath": "/opt/app/datafile/etc/cert/trust.pass",
+  "dmaap.security.trustStorePath": "/opt/app/datafile/etc/cert/trust.jks",
+  "dmaap.security.trustStorePasswordPath": "/opt/app/datafile/etc/cert/trust.pass",
+  "dmaap.security.keyStorePath": "/opt/app/datafile/etc/cert/cert.jks",
+  "dmaap.security.keyStorePasswordPath": "/opt/app/datafile/etc/cert/jks.pass",
+  "dmaap.security.enableDmaapCertAuth": "false",
+  "sftp.security.strictHostKeyChecking": "false",
+  "streams_publishes": {
+    "PM_MEAS_FILES": {
+      "type": "data_router",
+      "dmaap_info": {
+        "username": "user",
+        "log_url": "https://drsim:3907/feedlog/2",
+        "publish_url": "https://drsim:3907/publish/2",
+        "location": "loc00",
+        "password": "password",
+        "publisher_id": "972.360gm"
+      }
+    }
+  },
+  "streams_subscribes": {
+    "dmaap_subscriber": {
+      "dmaap_info": {
+        "topic_url": "http://dradmin:dradmin@mrsim:2222/events/unauthenticated.VES_NOTIFICATION_OUTPUT/OpenDcae-c12/C12"
+      },
+      "type": "message_router"
+    }
+  }
+}
index 82c2f58..ace7cbb 100644 (file)
@@ -8,6 +8,7 @@
   "dmaap.security.keyStorePath": "/opt/app/datafile/etc/cert/cert.jks",
   "dmaap.security.keyStorePasswordPath": "/opt/app/datafile/etc/cert/jks.pass",
   "dmaap.security.enableDmaapCertAuth": "false",
+  "sftp.security.strictHostKeyChecking": "true",
   "streams_publishes": {
     "PM_MEAS_FILES": {
       "type": "data_router",
index 6d3f205..2fe61ee 100644 (file)
@@ -8,6 +8,7 @@
   "dmaap.security.keyStorePath": "/opt/app/datafile/etc/cert/cert.jks",
   "dmaap.security.keyStorePasswordPath": "/opt/app/datafile/etc/cert/jks.pass",
   "dmaap.security.enableDmaapCertAuth": "false",
+  "sftp.security.strictHostKeyChecking": "true",
   "streams_publishes": {
     "PM_MEAS_FILES": {
       "type": "data_router",
index 9841a24..27d3eb8 100644 (file)
@@ -8,6 +8,7 @@
   "dmaap.security.keyStorePath": "/opt/app/datafile/etc/cert/cert.jks",
   "dmaap.security.keyStorePasswordPath": "/opt/app/datafile/etc/cert/jks.pass",
   "dmaap.security.enableDmaapCertAuth": "false",
+  "sftp.security.strictHostKeyChecking": "true",
   "streams_publishes": {
     "CTR_MEAS_FILES": {
       "type": "data_router",
index c76974f..0bbd159 100644 (file)
@@ -8,6 +8,7 @@
   "dmaap.security.keyStorePath": "/opt/app/datafile/etc/cert/cert.jks",
   "dmaap.security.keyStorePasswordPath": "/opt/app/datafile/etc/cert/jks.pass",
   "dmaap.security.enableDmaapCertAuth": "false",
+  "sftp.security.strictHostKeyChecking": "true",
   "streams_publishes": {
     "LOG_FILES": {
       "type": "data_router",
index 3f43b67..6fac2c2 100644 (file)
@@ -8,6 +8,7 @@
   "dmaap.security.keyStorePath": "/opt/app/datafile/etc/cert/cert.jks",
   "dmaap.security.keyStorePasswordPath": "/opt/app/datafile/etc/cert/jks.pass",
   "dmaap.security.enableDmaapCertAuth": "false",
+  "sftp.security.strictHostKeyChecking": "true",
   "streams_publishes": {
     "PM_MEAS_FILES": {
       "type": "data_router",
index 5afee1b..7d0d9e0 100644 (file)
@@ -8,6 +8,7 @@
   "dmaap.security.keyStorePath": "/opt/app/datafile/etc/cert/cert.jks",
   "dmaap.security.keyStorePasswordPath": "/opt/app/datafile/etc/cert/jks.pass",
   "dmaap.security.enableDmaapCertAuth": "false",
+  "sftp.security.strictHostKeyChecking": "true",
   "streams_publishes": {
     "TEST_FILES": {
       "type": "data_router",