diff --git a/5g-control-plane/Chart.yaml b/5g-control-plane/Chart.yaml index 5cf547a..cf4844b 100644 --- a/5g-control-plane/Chart.yaml +++ b/5g-control-plane/Chart.yaml @@ -10,7 +10,7 @@ description: SD-Core 5G control plane services name: 5g-control-plane icon: https://guide.opencord.org/logos/cord.svg -version: 2.2.0 +version: 2.2.1 dependencies: - name: mongodb @@ -21,8 +21,4 @@ dependencies: version: 20.0.4 repository: https://charts.bitnami.com/bitnami condition: kafka.deploy - - name: cert-manager - version: v1.16.2 - alias: certmanager - repository: https://charts.jetstack.io - condition: certmanager.enabled + diff --git a/5g-control-plane/templates/_helpers.tpl b/5g-control-plane/templates/_helpers.tpl index eee7edb..0bee0fe 100644 --- a/5g-control-plane/templates/_helpers.tpl +++ b/5g-control-plane/templates/_helpers.tpl @@ -120,3 +120,14 @@ Expand the name of the chart. {{- define "5g-control-plane.name" -}} {{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" }} {{- end }} + +{{/* +Generate certificates for 5GC-CP +*/}} +{{- define "5g-control-plane.gen-certs" -}} +{{- $altNames := list ( printf "%s.%s" (include "5g-control-plane.name" .) .Release.Namespace ) ( printf "%s.%s.svc" (include "5g-control-plane.name" .) .Release.Namespace ) -}} +{{- $ca := genCA "5g-control-plane-ca" 365 -}} +{{- $cert := genSignedCert ( include "5g-control-plane.name" . ) nil $altNames 365 $ca -}} +tls.crt: {{ $cert.Cert | b64enc }} +tls.key: {{ $cert.Key | b64enc }} +{{- end -}} diff --git a/5g-control-plane/templates/ca-issuer.yaml b/5g-control-plane/templates/ca-issuer.yaml deleted file mode 100644 index 8a9e533..0000000 --- a/5g-control-plane/templates/ca-issuer.yaml +++ /dev/null @@ -1,46 +0,0 @@ -{{/* -# Copyright 2024 Intel Corporation - -# SPDX-License-Identifier: Apache-2.0 -*/}} - -apiVersion: cert-manager.io/v1 -kind: ClusterIssuer -metadata: - name: selfsigned-cluster-issuer - namespace: {{ .Values.certmanager.namespace | quote }} - annotations: - helm.sh/hook: pre-install - helm.sh/hook-weight: "1" -spec: - selfSigned: {} - ---- -apiVersion: cert-manager.io/v1 -kind: Certificate -metadata: - name: ca-certificate - namespace: {{ .Values.certmanager.namespace | quote }} - annotations: - helm.sh/hook: pre-install - helm.sh/hook-weight: "2" -spec: - isCA: true - commonName: "selfsigned-ca" - secretName: ca-key-pair - issuerRef: - name: selfsigned-cluster-issuer - kind: ClusterIssuer - ---- -apiVersion: cert-manager.io/v1 -kind: ClusterIssuer -metadata: - name: ca-cluster-issuer - namespace: {{ .Values.certmanager.namespace | quote }} - annotations: - helm.sh/hook: pre-install - helm.sh/hook-weight: "3" -spec: - ca: - secretName: ca-key-pair diff --git a/5g-control-plane/templates/certificate-amf.yaml b/5g-control-plane/templates/certificate-amf.yaml deleted file mode 100644 index 2624e1e..0000000 --- a/5g-control-plane/templates/certificate-amf.yaml +++ /dev/null @@ -1,26 +0,0 @@ -{{/* -# Copyright 2024 Intel Corporation - -# SPDX-License-Identifier: Apache-2.0 -*/}} - -apiVersion: cert-manager.io/v1 -kind: Certificate -metadata: - name: amf-certificate - labels: -{{ tuple "amf" . | include "5g-control-plane.metadata_labels" | indent 4 }} - annotations: - helm.sh/hook: pre-install - helm.sh/hook-delete-policy: before-hook-creation -spec: - secretName: amf-certs - commonName: amf-certs - subject: - organizations: - - Aether SD-Core - duration: 2160h # 90d - renewBefore: 1h - issuerRef: - name: ca-cluster-issuer - kind: ClusterIssuer diff --git a/5g-control-plane/templates/certificate-ausf.yaml b/5g-control-plane/templates/certificate-ausf.yaml deleted file mode 100644 index 951a9f8..0000000 --- a/5g-control-plane/templates/certificate-ausf.yaml +++ /dev/null @@ -1,26 +0,0 @@ -{{/* -# Copyright 2024 Intel Corporation - -# SPDX-License-Identifier: Apache-2.0 -*/}} - -apiVersion: cert-manager.io/v1 -kind: Certificate -metadata: - name: ausf-certificate - labels: -{{ tuple "ausf" . | include "5g-control-plane.metadata_labels" | indent 4 }} - annotations: - helm.sh/hook: pre-install - helm.sh/hook-delete-policy: before-hook-creation -spec: - secretName: ausf-certs - commonName: ausf-certs - subject: - organizations: - - Aether SD-Core - duration: 2160h # 90d - renewBefore: 1h - issuerRef: - name: ca-cluster-issuer - kind: ClusterIssuer diff --git a/5g-control-plane/templates/certificate-nrf.yaml b/5g-control-plane/templates/certificate-nrf.yaml deleted file mode 100644 index 9af7bc3..0000000 --- a/5g-control-plane/templates/certificate-nrf.yaml +++ /dev/null @@ -1,26 +0,0 @@ -{{/* -# Copyright 2024 Intel Corporation - -# SPDX-License-Identifier: Apache-2.0 -*/}} - -apiVersion: cert-manager.io/v1 -kind: Certificate -metadata: - name: nrf-certificate - labels: -{{ tuple "nrf" . | include "5g-control-plane.metadata_labels" | indent 4 }} - annotations: - helm.sh/hook: pre-install - helm.sh/hook-delete-policy: before-hook-creation -spec: - secretName: nrf-certs - commonName: nrf-certs - subject: - organizations: - - Aether SD-Core - duration: 2160h # 90d - renewBefore: 1h - issuerRef: - name: ca-cluster-issuer - kind: ClusterIssuer diff --git a/5g-control-plane/templates/certificate-nssf.yaml b/5g-control-plane/templates/certificate-nssf.yaml deleted file mode 100644 index 41fc67d..0000000 --- a/5g-control-plane/templates/certificate-nssf.yaml +++ /dev/null @@ -1,26 +0,0 @@ -{{/* -# Copyright 2024 Intel Corporation - -# SPDX-License-Identifier: Apache-2.0 -*/}} - -apiVersion: cert-manager.io/v1 -kind: Certificate -metadata: - name: nssf-certificate - labels: -{{ tuple "nssf" . | include "5g-control-plane.metadata_labels" | indent 4 }} - annotations: - helm.sh/hook: pre-install - helm.sh/hook-delete-policy: before-hook-creation -spec: - secretName: nssf-certs - commonName: nssf-certs - subject: - organizations: - - Aether SD-Core - duration: 2160h # 90d - renewBefore: 1h - issuerRef: - name: ca-cluster-issuer - kind: ClusterIssuer diff --git a/5g-control-plane/templates/certificate-pcf.yaml b/5g-control-plane/templates/certificate-pcf.yaml deleted file mode 100644 index da6ec77..0000000 --- a/5g-control-plane/templates/certificate-pcf.yaml +++ /dev/null @@ -1,26 +0,0 @@ -{{/* -# Copyright 2024 Intel Corporation - -# SPDX-License-Identifier: Apache-2.0 -*/}} - -apiVersion: cert-manager.io/v1 -kind: Certificate -metadata: - name: pcf-certificate - labels: -{{ tuple "pcf" . | include "5g-control-plane.metadata_labels" | indent 4 }} - annotations: - helm.sh/hook: pre-install - helm.sh/hook-delete-policy: before-hook-creation -spec: - secretName: pcf-certs - commonName: pcf-certs - subject: - organizations: - - Aether SD-Core - duration: 2160h # 90d - renewBefore: 1h - issuerRef: - name: ca-cluster-issuer - kind: ClusterIssuer diff --git a/5g-control-plane/templates/certificate-smf.yaml b/5g-control-plane/templates/certificate-smf.yaml deleted file mode 100644 index 1df38c8..0000000 --- a/5g-control-plane/templates/certificate-smf.yaml +++ /dev/null @@ -1,26 +0,0 @@ -{{/* -# Copyright 2024 Intel Corporation - -# SPDX-License-Identifier: Apache-2.0 -*/}} - -apiVersion: cert-manager.io/v1 -kind: Certificate -metadata: - name: smf-certificate - labels: -{{ tuple "smf" . | include "5g-control-plane.metadata_labels" | indent 4 }} - annotations: - helm.sh/hook: pre-install - helm.sh/hook-delete-policy: before-hook-creation -spec: - secretName: smf-certs - commonName: smf-certs - subject: - organizations: - - Aether SD-Core - duration: 2160h # 90d - renewBefore: 1h - issuerRef: - name: ca-cluster-issuer - kind: ClusterIssuer diff --git a/5g-control-plane/templates/certificate-udm.yaml b/5g-control-plane/templates/certificate-udm.yaml deleted file mode 100644 index c895a83..0000000 --- a/5g-control-plane/templates/certificate-udm.yaml +++ /dev/null @@ -1,26 +0,0 @@ -{{/* -# Copyright 2024 Intel Corporation - -# SPDX-License-Identifier: Apache-2.0 -*/}} - -apiVersion: cert-manager.io/v1 -kind: Certificate -metadata: - name: udm-certificate - labels: -{{ tuple "udm" . | include "5g-control-plane.metadata_labels" | indent 4 }} - annotations: - helm.sh/hook: pre-install - helm.sh/hook-delete-policy: before-hook-creation -spec: - secretName: udm-certs - commonName: udm-certs - subject: - organizations: - - Aether SD-Core - duration: 2160h # 90d - renewBefore: 1h - issuerRef: - name: ca-cluster-issuer - kind: ClusterIssuer diff --git a/5g-control-plane/templates/certificate-udr.yaml b/5g-control-plane/templates/certificate-udr.yaml deleted file mode 100644 index 71ca70d..0000000 --- a/5g-control-plane/templates/certificate-udr.yaml +++ /dev/null @@ -1,26 +0,0 @@ -{{/* -# Copyright 2024 Intel Corporation - -# SPDX-License-Identifier: Apache-2.0 -*/}} - -apiVersion: cert-manager.io/v1 -kind: Certificate -metadata: - name: udr-certificate - labels: -{{ tuple "udr" . | include "5g-control-plane.metadata_labels" | indent 4 }} - annotations: - helm.sh/hook: pre-install - helm.sh/hook-delete-policy: before-hook-creation -spec: - secretName: udr-certs - commonName: udr-certs - subject: - organizations: - - Aether SD-Core - duration: 2160h # 90d - renewBefore: 1h - issuerRef: - name: ca-cluster-issuer - kind: ClusterIssuer diff --git a/5g-control-plane/templates/secret-amf.yaml b/5g-control-plane/templates/secret-amf.yaml new file mode 100644 index 0000000..9192cc7 --- /dev/null +++ b/5g-control-plane/templates/secret-amf.yaml @@ -0,0 +1,21 @@ +{{/* +# Copyright 2024 Intel Corporation + +# SPDX-License-Identifier: Apache-2.0 +*/}} + +apiVersion: v1 +kind: Secret +type: kubernetes.io/tls +metadata: + name: amf-certs + labels: +{{ tuple "amf" . | include "5g-control-plane.metadata_labels" | indent 4 }} + annotations: + "helm.sh/hook": "pre-install" + "helm.sh/hook-delete-policy": "before-hook-creation" +{{- with .Values.config.amf.serviceAnnotations }} + {{- toYaml . | nindent 4 }} +{{- end }} +data: +{{ ( include "5g-control-plane.gen-certs" . ) | indent 2 }} diff --git a/5g-control-plane/templates/secret-ausf.yaml b/5g-control-plane/templates/secret-ausf.yaml new file mode 100644 index 0000000..b8be259 --- /dev/null +++ b/5g-control-plane/templates/secret-ausf.yaml @@ -0,0 +1,21 @@ +{{/* +# Copyright 2024 Intel Corporation + +# SPDX-License-Identifier: Apache-2.0 +*/}} + +apiVersion: v1 +kind: Secret +type: kubernetes.io/tls +metadata: + name: ausf-certs + labels: +{{ tuple "ausf" . | include "5g-control-plane.metadata_labels" | indent 4 }} + annotations: + "helm.sh/hook": "pre-install" + "helm.sh/hook-delete-policy": "before-hook-creation" +{{- with .Values.config.ausf.serviceAnnotations }} + {{- toYaml . | nindent 4 }} +{{- end }} +data: +{{ ( include "5g-control-plane.gen-certs" . ) | indent 2 }} diff --git a/5g-control-plane/templates/secret-nrf.yaml b/5g-control-plane/templates/secret-nrf.yaml new file mode 100644 index 0000000..aa6741a --- /dev/null +++ b/5g-control-plane/templates/secret-nrf.yaml @@ -0,0 +1,21 @@ +{{/* +# Copyright 2024 Intel Corporation + +# SPDX-License-Identifier: Apache-2.0 +*/}} + +apiVersion: v1 +kind: Secret +type: kubernetes.io/tls +metadata: + name: nrf-certs + labels: +{{ tuple "nrf" . | include "5g-control-plane.metadata_labels" | indent 4 }} + annotations: + "helm.sh/hook": "pre-install" + "helm.sh/hook-delete-policy": "before-hook-creation" +{{- with .Values.config.nrf.serviceAnnotations }} + {{- toYaml . | nindent 4 }} +{{- end }} +data: +{{ ( include "5g-control-plane.gen-certs" . ) | indent 2 }} diff --git a/5g-control-plane/templates/secret-nssf.yaml b/5g-control-plane/templates/secret-nssf.yaml new file mode 100644 index 0000000..e9fe84d --- /dev/null +++ b/5g-control-plane/templates/secret-nssf.yaml @@ -0,0 +1,21 @@ +{{/* +# Copyright 2024 Intel Corporation + +# SPDX-License-Identifier: Apache-2.0 +*/}} + +apiVersion: v1 +kind: Secret +type: kubernetes.io/tls +metadata: + name: nssf-certs + labels: +{{ tuple "nssf" . | include "5g-control-plane.metadata_labels" | indent 4 }} + annotations: + "helm.sh/hook": "pre-install" + "helm.sh/hook-delete-policy": "before-hook-creation" +{{- with .Values.config.nssf.serviceAnnotations }} + {{- toYaml . | nindent 4 }} +{{- end }} +data: +{{ ( include "5g-control-plane.gen-certs" . ) | indent 2 }} diff --git a/5g-control-plane/templates/secret-pcf.yaml b/5g-control-plane/templates/secret-pcf.yaml new file mode 100644 index 0000000..477e0be --- /dev/null +++ b/5g-control-plane/templates/secret-pcf.yaml @@ -0,0 +1,21 @@ +{{/* +# Copyright 2024 Intel Corporation + +# SPDX-License-Identifier: Apache-2.0 +*/}} + +apiVersion: v1 +kind: Secret +type: kubernetes.io/tls +metadata: + name: pcf-certs + labels: +{{ tuple "pcf" . | include "5g-control-plane.metadata_labels" | indent 4 }} + annotations: + "helm.sh/hook": "pre-install" + "helm.sh/hook-delete-policy": "before-hook-creation" +{{- with .Values.config.pcf.serviceAnnotations }} + {{- toYaml . | nindent 4 }} +{{- end }} +data: +{{ ( include "5g-control-plane.gen-certs" . ) | indent 2 }} diff --git a/5g-control-plane/templates/secret-smf.yaml b/5g-control-plane/templates/secret-smf.yaml new file mode 100644 index 0000000..f0d84e3 --- /dev/null +++ b/5g-control-plane/templates/secret-smf.yaml @@ -0,0 +1,21 @@ +{{/* +# Copyright 2024 Intel Corporation + +# SPDX-License-Identifier: Apache-2.0 +*/}} + +apiVersion: v1 +kind: Secret +type: kubernetes.io/tls +metadata: + name: smf-certs + labels: +{{ tuple "smf" . | include "5g-control-plane.metadata_labels" | indent 4 }} + annotations: + "helm.sh/hook": "pre-install" + "helm.sh/hook-delete-policy": "before-hook-creation" +{{- with .Values.config.smf.serviceAnnotations }} + {{- toYaml . | nindent 4 }} +{{- end }} +data: +{{ ( include "5g-control-plane.gen-certs" . ) | indent 2 }} diff --git a/5g-control-plane/templates/secret-udm.yaml b/5g-control-plane/templates/secret-udm.yaml new file mode 100644 index 0000000..1efc512 --- /dev/null +++ b/5g-control-plane/templates/secret-udm.yaml @@ -0,0 +1,21 @@ +{{/* +# Copyright 2024 Intel Corporation + +# SPDX-License-Identifier: Apache-2.0 +*/}} + +apiVersion: v1 +kind: Secret +type: kubernetes.io/tls +metadata: + name: udm-certs + labels: +{{ tuple "udm" . | include "5g-control-plane.metadata_labels" | indent 4 }} + annotations: + "helm.sh/hook": "pre-install" + "helm.sh/hook-delete-policy": "before-hook-creation" +{{- with .Values.config.udm.serviceAnnotations }} + {{- toYaml . | nindent 4 }} +{{- end }} +data: +{{ ( include "5g-control-plane.gen-certs" . ) | indent 2 }} diff --git a/5g-control-plane/templates/secret-udr.yaml b/5g-control-plane/templates/secret-udr.yaml new file mode 100644 index 0000000..4371bbd --- /dev/null +++ b/5g-control-plane/templates/secret-udr.yaml @@ -0,0 +1,21 @@ +{{/* +# Copyright 2024 Intel Corporation + +# SPDX-License-Identifier: Apache-2.0 +*/}} + +apiVersion: v1 +kind: Secret +type: kubernetes.io/tls +metadata: + name: udr-certs + labels: +{{ tuple "udr" . | include "5g-control-plane.metadata_labels" | indent 4 }} + annotations: + "helm.sh/hook": "pre-install" + "helm.sh/hook-delete-policy": "before-hook-creation" +{{- with .Values.config.udr.serviceAnnotations }} + {{- toYaml . | nindent 4 }} +{{- end }} +data: +{{ ( include "5g-control-plane.gen-certs" . ) | indent 2 }} diff --git a/5g-control-plane/values.yaml b/5g-control-plane/values.yaml index e2601d3..0bce0d2 100644 --- a/5g-control-plane/values.yaml +++ b/5g-control-plane/values.yaml @@ -6,19 +6,19 @@ images: repository: "" #default docker hub tags: - init: omecproject/pod-init:rel-1.1.1 - amf: omecproject/5gc-amf:rel-1.6.2 - nrf: omecproject/5gc-nrf:rel-1.6.1 - smf: omecproject/5gc-smf:rel-2.0.1 - ausf: omecproject/5gc-ausf:rel-1.6.0 - nssf: omecproject/5gc-nssf:rel-1.6.0 - pcf: omecproject/5gc-pcf:rel-1.6.0 - udr: omecproject/5gc-udr:rel-1.6.1 - udm: omecproject/5gc-udm:rel-1.6.0 - webui: omecproject/5gc-webui:rel-1.8.1 - sctplb: omecproject/sctplb:rel-1.6.0 - metricfunc: omecproject/metricfunc:rel-1.6.0 - upfadapter: omecproject/upfadapter:rel-2.0.1 + init: omecproject/pod-init:rel-1.1.2 + amf: omecproject/5gc-amf:rel-1.6.3 + nrf: omecproject/5gc-nrf:rel-1.6.2 + smf: omecproject/5gc-smf:rel-2.0.2 + ausf: omecproject/5gc-ausf:rel-1.6.1 + nssf: omecproject/5gc-nssf:rel-1.6.1 + pcf: omecproject/5gc-pcf:rel-1.6.1 + udr: omecproject/5gc-udr:rel-1.6.2 + udm: omecproject/5gc-udm:rel-1.6.1 + webui: omecproject/5gc-webui:rel-1.8.3 + sctplb: omecproject/sctplb:rel-1.6.1 + metricfunc: omecproject/metricfunc:rel-1.6.1 + upfadapter: omecproject/upfadapter:rel-2.0.2 pullPolicy: IfNotPresent nodeSelectors: @@ -136,13 +136,6 @@ mongodb: architecture: replicaset replicaCount: 1 -certmanager: - enabled: true - fullnameOverride: certmanager - namespace: cert-manager - crds: - enabled: true - config: managedByConfigPod: # config comes from helm by default, if enabled true, then discard enabled: true # helm chart config and use the config from config Pod diff --git a/5g-ran-sim/Chart.yaml b/5g-ran-sim/Chart.yaml index bf91c10..86318eb 100644 --- a/5g-ran-sim/Chart.yaml +++ b/5g-ran-sim/Chart.yaml @@ -8,4 +8,4 @@ description: 5G RAN Simulator Service name: 5g-ran-sim icon: https://guide.opencord.org/logos/cord.svg -version: 2.0.0 +version: 2.0.1 diff --git a/5g-ran-sim/values.yaml b/5g-ran-sim/values.yaml index b0f44fc..bb0da4c 100644 --- a/5g-ran-sim/values.yaml +++ b/5g-ran-sim/values.yaml @@ -5,8 +5,8 @@ images: repository: "" #default docker hub tags: - init: omecproject/pod-init:rel-1.1.1 - gnbsim: omecproject/5gc-gnbsim:rel-1.6.0 + init: omecproject/pod-init:rel-1.1.2 + gnbsim: omecproject/5gc-gnbsim:rel-1.6.1 pullPolicy: IfNotPresent nodeSelectors: @@ -150,7 +150,7 @@ config: profileName: profile2 enable: true gnbName: gnb1 - execInParallel: false #run all subscribers in this profile parallel + execInParallel: true #run all subscribers in this profile parallel stepTrigger: false #wait for trigger to move to next step startImsi: 208930100007492 ueCount: 5 @@ -234,7 +234,7 @@ config: defaultAs: "192.168.250.1" #default icmp pkt destination - profileType: pdusessest profileName: profile8 - enable: true + enable: false gnbName: gnb2 execInParallel: false #run all subscribers in this profile parallel stepTrigger: false #wait for trigger to move to next step diff --git a/bess-upf/Chart.yaml b/bess-upf/Chart.yaml index c865578..950f2d9 100644 --- a/bess-upf/Chart.yaml +++ b/bess-upf/Chart.yaml @@ -7,4 +7,4 @@ description: OMEC user plane based on BESS name: bess-upf icon: https://guide.opencord.org/logos/cord.svg -version: 1.2.0 +version: 1.2.1 diff --git a/bess-upf/values.yaml b/bess-upf/values.yaml index ff13608..694b193 100644 --- a/bess-upf/values.yaml +++ b/bess-upf/values.yaml @@ -5,9 +5,9 @@ images: repository: "" #default docker hub tags: - bess: omecproject/upf-epc-bess:rel-2.0.0 - pfcpiface: omecproject/upf-epc-pfcpiface:rel-2.0.0 - tools: busybox:stable + bess: omecproject/upf-epc-bess:rel-2.0.1 + pfcpiface: omecproject/upf-epc-pfcpiface:rel-2.0.1 + tools: omecproject/pod-init:rel-1.1.2 pullPolicy: IfNotPresent # Secrets must be manually created in the namespace. pullSecrets: diff --git a/omec-sub-provision/Chart.yaml b/omec-sub-provision/Chart.yaml index 58235ca..d9e6be8 100644 --- a/omec-sub-provision/Chart.yaml +++ b/omec-sub-provision/Chart.yaml @@ -8,4 +8,4 @@ description: Mobile Sim Provisioning services name: omec-sub-provision icon: https://guide.opencord.org/logos/cord.svg -version: 2.0.0 +version: 2.0.1 diff --git a/omec-sub-provision/values.yaml b/omec-sub-provision/values.yaml index 40033dd..3e331ad 100644 --- a/omec-sub-provision/values.yaml +++ b/omec-sub-provision/values.yaml @@ -5,8 +5,8 @@ images: repository: "" #default docker hub tags: - init: omecproject/pod-init:rel-1.1.1 - simapp: omecproject/simapp:rel-1.6.0 + init: omecproject/pod-init:rel-1.1.2 + simapp: omecproject/simapp:rel-1.6.1 pullPolicy: IfNotPresent resources: diff --git a/sdcore-helm-charts/Chart.yaml b/sdcore-helm-charts/Chart.yaml index 45cb394..317e726 100644 --- a/sdcore-helm-charts/Chart.yaml +++ b/sdcore-helm-charts/Chart.yaml @@ -10,7 +10,7 @@ name: sd-core description: SD-Core control plane services icon: https://guide.opencord.org/logos/cord.svg type: application -version: 2.2.0 +version: 2.2.1 home: https://opennetworking.org/sd-core/ maintainers: - name: SD-Core Support @@ -23,22 +23,22 @@ dependencies: condition: omec-control-plane.enable4G - name: omec-sub-provision - version: 2.0.0 + version: 2.0.1 repository: "file://../omec-sub-provision" condition: omec-sub-provision.enable - name: 5g-control-plane - version: 2.2.0 + version: 2.2.1 repository: "file://../5g-control-plane" condition: 5g-control-plane.enable5G - name: bess-upf - version: 1.2.0 + version: 1.2.1 repository: "file://../bess-upf" alias: omec-user-plane condition: omec-user-plane.enable - name: 5g-ran-sim - version: 2.0.0 + version: 2.0.1 repository: "file://../5g-ran-sim" condition: 5g-ran-sim.enable