Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fixing the build #3454

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
14 changes: 7 additions & 7 deletions doc/common/references.rst
Original file line number Diff line number Diff line change
Expand Up @@ -26,8 +26,8 @@ Ref Doc Number Title
[17] ETSI GS NFV-SEC 003 V1.1.1 “Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance”. Available at `https://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/003/01.01.01_60/gs_NFV-SEC003v010101p.pdf <https://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/003/01.01.01_60/gs_NFV-SEC003v010101p.pdf>`__
[18] ETSI GS NFV-SEC 013 V3.1.1 “Network Functions Virtualisation (NFV) Release 3; NFV Security; Security Specification for MANO Components and Reference points”. Available at `https://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/014/03.01.01_60/gs_NFV-SEC014v030101p.pdf <https://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/014/03.01.01_60/gs_NFV-SEC014v030101p.pdf>`__
[19] ETSI GS NFV-SEC 013 V2.6.1 “Network Functions Virtualisation (NFV) Release 2; Security; VNF Package Security Specification ”. Available at `https://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/021/02.06.01_60/gs_nfv-sec021v020601p.pdf <https://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/021/02.06.01_60/gs_nfv-sec021v020601p.pdf>`__
[20] GSMA FS.31 V2.0 February 2020 “Baseline Security controls ”. Available at `https://www.gsma.com/security/resources/fs-31-gsma-baseline-security-controls <https://www.gsma.com/security/resources/fs-31-gsma-baseline-security-controls>`__
[21] GSMA whitepaper January 2021 “Open Networking & the Security of Open Source Software deployment ”. Available at `https://www.gsma.com/futurenetworks/resources/open-networking-the-security-of-open-source-software-deployment <https://www.gsma.com/futurenetworks/resources/open-networking-the-security-of-open-source-software-deployment>`__
[20] GSMA FS.31 V2.0 February 2020 “Baseline Security controls ”. Available at `https://www.gsma.com/solutions-and-impact/technologies/security/gsma_resources/fs-31-gsma-baseline-security-controls/ <https://www.gsma.com/solutions-and-impact/technologies/security/gsma_resources/fs-31-gsma-baseline-security-controls/>`__
[21] GSMA whitepaper January 2021 “Open Networking & the Security of Open Source Software deployment ”. Available at `https://www.gsma.com/solutions-and-impact/technologies/networks/gsma_resources/open-networking-the-security-of-open-source-software-deployment/ <https://www.gsma.com/solutions-and-impact/technologies/networks/gsma_resources/open-networking-the-security-of-open-source-software-deployment/>`__
[22] Cloud Security Alliance (CSA) and SAFECode “The Six Pillars of DevSecOps: Automation (2020) ”. Available at `https://safecode.org/resource-secure-development-practices/the-six-pillars-of-devsecops-automation/ <https://safecode.org/resource-secure-development-practices/the-six-pillars-of-devsecops-automation/>`__
[23] ISO/IEC 27000:2018 Information technology — Security techniques — Information security management systems — Overview and vocabulary. Available at `https://www.iso.org/standard/73906.html <https://www.iso.org/standard/73906.html>`__.
[24] Cloud Security Alliance (CSA) “Information Security Management through Reflexive Security ”. Available at `https://cloudsecurityalliance.org/artifacts/information-security-management-through-reflexive-security/ <https://cloudsecurityalliance.org/artifacts/information-security-management-through-reflexive-security/>`__
Expand All @@ -40,9 +40,9 @@ Ref Doc Number Title
[31] IEEE 1588-2019 "Precision Clock Synchronization Protocol for Networked Measurement and Control Systems", Available at `https://standards.ieee.org/standard/1588-2019.html <https://standards.ieee.org/standard/1588-2019.html>`__
[32] ITU-T G.8262 "Timing characteristics of a synchronous equipment slave clock", Available at `https://www.itu.int/rec/T-REC-G.8262 <https://www.itu.int/rec/T-REC-G.8262>`__
[33] ITU-T G.8275.2 "Precision time protocol telecom profile for time/phase synchronization with partial timing support from the network", Available at `https://www.itu.int/rec/T-REC-G.8275.2 <https://www.itu.int/rec/T-REC-G.8275.2>`__
[34] GSMA OPG.02 "Operator Platform: Requirements and Architecture", Available at `https://www.gsma.com/futurenetworks/operator-platform-hp/ <https://www.gsma.com/futurenetworks/operator-platform-hp/>`__
[34] GSMA OPG.02 "Operator Platform: Requirements and Architecture", Available at `https://www.gsma.com/solutions-and-impact/technologies/networks/operator-platform-hp/ <https://www.gsma.com/solutions-and-impact/technologies/networks/operator-platform-hp/>`__
[35] O-RAN.WG6.AAL-GAnP-v01.00 "O-RAN Acceleration Abstraction Layer General Aspects and Principles 1.0”, November 2020", Available at `https://www.o-ran.org <https://www.o-ran.org>`__
[36] GSMA FS.40-v02.00 "5G Security Guide, version 2.0, 20 October 2021”, November 2020", Available at `https://www.gsma.com/security/publications/ <https://www.gsma.com/security/publications/>`__
[36] GSMA FS.40-v02.00 "5G Security Guide, version 2.0, 20 October 2021”, November 2020", Available at `https://www.gsma.com/solutions-and-impact/technologies/security/publications/ <https://www.gsma.com/solutions-and-impact/technologies/security/publications/>`__
[37] ETSI TS 103 457 "CYBER; Trusted Cross-Domain Interface: Interface to offload sensitive functions to a trusted domain”, TS 103 457 - V1.1.1, Available at `https://www.etsi.org/deliver/etsi_ts/103400_103499/103457/01.01.01_60/ts_103457v010101p.pdf <https://www.etsi.org/deliver/etsi_ts/103400_103499/103457/01.01.01_60/ts_103457v010101p.pdf>`__
[38] RFC 2544 "Benchmarking Methodology for Network Interconnect Devices", Available at `https://www.ietf.org/rfc/rfc2544.txt <https://www.ietf.org/rfc/rfc2544.txt>`__
[39] O-RAN.WG6 "WG6: Cloudification and Orchestration Workgroup specifications", Available at `https://www.o-ran.org <https://www.o-ran.org>`__
Expand All @@ -52,7 +52,7 @@ Ref Doc Number Title
[43] ITU-T L.1361 "Measurement method for energy efficiency of network functions virtualization", Available at `https://www.itu.int/rec/T-REC-L.1361 <https://www.itu.int/rec/T-REC-L.1361>`__
[44] "Open RAN Technical Priority - Focus on Energy Efficiency", Available at `https://www.o-ran.org/ecosystem-resources <https://www.o-ran.org/ecosystem-resources>`__
[45] "QuEST Forum - NFV Workload Efficiency Whitepaper", Available at `https://tl9000.org/resources/documents/NFV%20Workload%20Efficiency%20Whitepaper.pdf <https://tl9000.org/resources/documents/NFV%20Workload%20Efficiency%20Whitepaper.pdf>`__
[46] GSMA FS.16 "Network Equipment Security Assurance Scheme – Development and Lifecycle Security Requirements, version 2.2", Available at `https://www.gsma.com/security/resources/fs-16-network-equipment-security-assurance-scheme-development-and-lifecycle-security-requirements/ <https://www.gsma.com/security/resources/fs-16-network-equipment-security-assurance-scheme-development-and-lifecycle-security-requirements/>`__
[46] GSMA FS.16 "Network Equipment Security Assurance Scheme – Development and Lifecycle Security Requirements, version 2.2", Available at `https://www.gsma.com/solutions-and-impact/technologies/security/gsma_resources/fs-16-network-equipment-security-assurance-scheme-development-and-lifecycle-security-requirements-2/ <https://www.gsma.com/solutions-and-impact/technologies/security/gsma_resources/fs-16-network-equipment-security-assurance-scheme-development-and-lifecycle-security-requirements-2/>`__
==== ======================================================= =================================================================================================================================================================================================================================================================================================================================================================================================================================

Cloud Native and Kubernetes References
Expand Down Expand Up @@ -150,8 +150,8 @@ Security Related References
* - [S9]
-
- "Open Networking & the Security of Open Source Software deployment".
Available at `https://www.gsma.com/futurenetworks/resources/open-networking-the-security-of-open-source-software-deployment/
<https://www.gsma.com/futurenetworks/resources/open-networking-the-security-of-open-source-software-deployment/>`__.
Available at `https://www.gsma.com/solutions-and-impact/technologies/networks/gsma_resources/open-networking-the-security-of-open-source-software-deployment/
<https://www.gsma.com/solutions-and-impact/technologies/networks/gsma_resources/open-networking-the-security-of-open-source-software-deployment/>`__.
* - [S10]
-
- OWASP "Secure Coding Practices - Quick Reference Guide".
Expand Down
7 changes: 6 additions & 1 deletion doc/conf.py
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,12 @@
'https://static1.squarespace.com/static/5ad774cce74940d7115044b0/t/5db36ffa820b8d29022b6d08/1572040705841/ORAN-WG4.IOT.0-v01.00.pdf/2018/180226_NGMN_RANFSX_D1_V20_Final.pdf',
'https://ntia.gov',
'https://www.ngmn.org/wp-content/uploads/Publications/2018/180226_NGMN_RANFSX_D1_V20_Final.pdf',
'https://wiki.lfnetworking.org/'
'https://wiki.lfnetworking.org/',
"https://www.gsma.com/solutions-and-impact/technologies/security/publications",
"https://www.gsma.com/solutions-and-impact/technologies/security/gsma_resources/fs-31-gsma-baseline-security-controls/",
"https://www.gsma.com/solutions-and-impact/technologies/networks/gsma_resources/open-networking-the-security-of-open-source-software-deployment/",
"https://www.gsma.com/solutions-and-impact/technologies/security/gsma_resources/fs-16-network-equipment-security-assurance-scheme-development-and-lifecycle-security-requirements-2/",
"https://www.gsma.com/solutions-and-impact/technologies/networks/operator-platform-hp/"
]
intersphinx_mapping = {
'ref_model': ('https://cntt.readthedocs.io/projects/rm/en/latest/', None),
Expand Down
2 changes: 1 addition & 1 deletion tox.ini
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ skipsdist = true
[testenv:docs]
basepython = python3.10
deps =
-chttps://opendev.org/openstack/requirements/raw/branch/stable/zed/upper-constraints.txt
-chttps://opendev.org/openstack/requirements/raw/branch/stable/2023.1/upper-constraints.txt
-r{toxinidir}/test-requirements.txt
commands =
sphinx-build -W --keep-going -W -T -b html -D language=en doc _build/html
Expand Down
Loading