Skip to content
Snippets Groups Projects

Compare revisions

Changes are shown as if the source revision was being merged into the target revision. Learn more about comparing revisions.

Source

Select target project
No results found
Select Git revision
  • 12-create-a-config-generator-to-be-able-to-easily-create-topologies
  • 17-implement-qkdn-manager-dummy
  • 22-add-a-way-of-using-tracing
  • 3-create-db-connection-instead-of-using-memory-only
  • 32-enable-tls-for-all-local-settings-integration-tests-debug-etc
  • 37-improve-hostname-ip-handling
  • 44-block-incoming-keys-if-exceeding-max-key-fill-level
  • TUD-tests-real-hardware
  • add-docker-stats-script
  • add-inventory-manager
  • akms-ckms-api
  • akms-ckms-api-implementation
  • debug-ci
  • doc-update-figures-schematic
  • errors-in-chain
  • etsi-20-bordernode
  • etsi-20-bordernode-updated
  • extend-intercom-with-aes-auth-tag
  • kai_masterthesis
  • key-forwarding-and-delivery
  • ksa-key-delivery
  • martin-quipsec
  • master
  • renovate/code.fbi.h-da.de-danet-gnmi-target-digest
  • renovate/github.com-grpc-ecosystem-grpc-gateway-v2-2.x
  • renovate/github.com-openconfig-gnmi-0.x
  • renovate/golang.org-x-sys-0.x
  • renovate/golangci-golangci-lint-1.x
  • renovate/google.golang.org-genproto-googleapis-api-digest
  • renovate/google.golang.org-grpc-1.x
  • renovate/google.golang.org-protobuf-1.x
  • renovate/mongo-8.x
  • renovate/rabbitmq-4.x
  • request-health-checks-for-peers
  • scratch-container
  • telekom-ci
  • try-to-get-ltex-working-amd64
  • tud-testing
  • vustom-akms-ckms-branch
  • tud-testing-1
40 results

Target

Select target project
  • danet/quant
1 result
Select Git revision
  • 12-create-a-config-generator-to-be-able-to-easily-create-topologies
  • 17-implement-qkdn-manager-dummy
  • 22-add-a-way-of-using-tracing
  • 3-create-db-connection-instead-of-using-memory-only
  • 32-enable-tls-for-all-local-settings-integration-tests-debug-etc
  • 37-improve-hostname-ip-handling
  • 44-block-incoming-keys-if-exceeding-max-key-fill-level
  • TUD-tests-real-hardware
  • add-docker-stats-script
  • add-inventory-manager
  • akms-ckms-api
  • akms-ckms-api-implementation
  • debug-ci
  • doc-update-figures-schematic
  • errors-in-chain
  • etsi-20-bordernode
  • etsi-20-bordernode-updated
  • extend-intercom-with-aes-auth-tag
  • kai_masterthesis
  • key-forwarding-and-delivery
  • ksa-key-delivery
  • martin-quipsec
  • master
  • renovate/code.fbi.h-da.de-danet-gnmi-target-digest
  • renovate/github.com-grpc-ecosystem-grpc-gateway-v2-2.x
  • renovate/github.com-openconfig-gnmi-0.x
  • renovate/golang.org-x-sys-0.x
  • renovate/golangci-golangci-lint-1.x
  • renovate/google.golang.org-genproto-googleapis-api-digest
  • renovate/google.golang.org-grpc-1.x
  • renovate/google.golang.org-protobuf-1.x
  • renovate/mongo-8.x
  • renovate/rabbitmq-4.x
  • request-health-checks-for-peers
  • scratch-container
  • telekom-ci
  • try-to-get-ltex-working-amd64
  • tud-testing
  • vustom-akms-ckms-branch
  • tud-testing-1
40 results
Show changes
Id: "5e41c291-6121-4335-84f6-41e04b8bdaa2"
Name: kms02
InterComAddr: 0.0.0.0:50910
QuantumAddr: 0.0.0.0:50911
AKMS:
RemoteAddress: "https://akms-simulator_2:4444/api/v1/keys/push_ksa_key"
ServerPort: "9696"
ClientTLS:
Active: true
CAFile: "config/ssl/ca.crt"
CertFile: "config/ssl/kms/kms2-selfsigned.crt"
KeyFile: "config/ssl/kms/kms2-selfsigned.key"
ServerTLS:
Active: true
CAFile: "config/ssl/ca.crt"
CertFile: "config/ssl/kms/kms2-selfsigned.crt"
KeyFile: "config/ssl/kms/kms2-selfsigned.key"
GRPCTimeoutInSeconds: 600
KSACryptoAlgorithm: OTP
KmsTLS:
Active: false
CAFile: "config/ssl/ca.crt"
CertFile: "config/ssl/kms/kms2-selfsigned.crt"
KeyFile: "config/ssl/kms/kms2-selfsigned.key"
Peers:
# peer to kms01
- PeerId: "0ff33c82-7fe1-482b-a0ca-67565806ee4b"
PeerInterComAddr: kms01:50910
CryptoAlgorithm: OTP
Type: danet
# quantum module of type emulated at the given address
QuantumModule:
Type: emulated
Hostname: quantumlayer_2
ETSI14Server:
Address: ":1414"
RemoteCKMSID: "0ff33c82-7fe1-482b-a0ca-67565806ee4b"
services:
kms01:
image: gokms
command:
["--log", "debug", "--kms_config", "/tmp/kms/config/kms_1_otp.yaml"]
volumes:
- ./config/kms/kms_1_otp.yaml:/tmp/kms/config/kms_1_otp.yaml
- ../artifacts/integration-tests/ssl:/config/ssl
ports:
- "127.0.0.1:7030:7030"
- "127.0.0.1:9696:9696"
- "127.0.0.1:1414:1414"
kms02:
image: gokms
command:
["--log", "debug", "--kms_config", "/tmp/kms/config/kms_2_otp.yaml"]
volumes:
- ./config/kms/kms_2_otp.yaml:/tmp/kms/config/kms_2_otp.yaml
- ../artifacts/integration-tests/ssl:/config/ssl
ports:
- "127.0.0.1:7031:7030"
- "127.0.0.1:1415:1414"
quantumlayer_1:
image: quantumlayer
command:
[
"--log",
"debug",
"--config",
"/tmp/quantumlayer/config/quantumlayer_1.yaml",
]
volumes:
- ./config/quantumlayer/quantumlayer_1.yaml:/tmp/quantumlayer/config/quantumlayer_1.yaml
quantumlayer_2:
image: quantumlayer
command:
[
"--log",
"debug",
"--config",
"/tmp/quantumlayer/config/quantumlayer_2.yaml",
]
volumes:
- ./config/quantumlayer/quantumlayer_2.yaml:/tmp/quantumlayer/config/quantumlayer_2.yaml
akms-simulator_1:
image: akms-simulator
ports:
- "127.0.0.1:4444:4444"
volumes:
- ../artifacts/integration-tests/ssl:/config/ssl
command:
[
"--ca",
"config/ssl/ca.crt",
"--cert",
"config/ssl/kms/kms2-selfsigned.crt",
"--key",
"config/ssl/kms/kms2-selfsigned.key",
]
akms-simulator_2:
image: akms-simulator
volumes:
- ../artifacts/integration-tests/ssl:/config/ssl
ports:
- "127.0.0.1:4445:4444"
command:
[
"--ca",
"config/ssl/ca.crt",
"--cert",
"config/ssl/kms/kms1-selfsigned.crt",
"--key",
"config/ssl/kms/kms1-selfsigned.key",
]
qkdn-controller:
image: registry.code.fbi.h-da.de/demoquandt/qkdn-controller:qkdn-main
volumes:
- ./config/controller/qkdn-gosdn.toml:/app/configs/qkdn-gosdn.toml
- ./config/controller/gNMISubscriptions.txt:/app/configs/gNMISubscriptions.txt
command: --config ./configs/qkdn-gosdn.toml
ports:
- 0.0.0.0:55055:55055
- 127.0.0.1:8080:8080
- 127.0.0.1:40000:40000
environment:
GOSDN_ADMIN_PASSWORD: TestPassword
plugin-registry:
image: registry.code.fbi.h-da.de/demoquandt/qkdn-controller/plugin-registry:qkdn-main
mongo:
image: mongo:7
environment:
MONGO_INITDB_ROOT_USERNAME: root
MONGO_INITDB_ROOT_PASSWORD: example
rabbitmq:
image: rabbitmq:3-management
routing-app:
image: registry.code.fbi.h-da.de/demoquandt/qkdn-controller/routing-app:qkdn-main
entrypoint: ["./start_ra_sleep.sh"]
volumes:
- ./config/controller/start_ra_sleep.sh:/app/start_ra_sleep.sh
- ./config/controller/routing-config.yaml:/new/routing-config.yaml