Add setting up consul configuration to cloud performance test shell scripts 21/97321/2
authorRemigiusz Janeczek <remigiusz.janeczek@nokia.com>
Fri, 18 Oct 2019 16:11:29 +0000 (18:11 +0200)
committerRemigiusz Janeczek <remigiusz.janeczek@nokia.com>
Fri, 18 Oct 2019 16:15:47 +0000 (16:15 +0000)
Issue-ID: DCAEGEN2-1783
Signed-off-by: Remigiusz Janeczek <remigiusz.janeczek@nokia.com>
Change-Id: I8b1b2c68578e52898af0596a039ecebf764560a0

tools/performance/cloud/cloud-based-performance-test.sh
tools/performance/cloud/configure-consul.sh [new file with mode: 0755]

index f444584..b9267a9 100755 (executable)
@@ -68,6 +68,9 @@ function clean() {
     echo "Attempting to delete client certs secret"
     kubectl delete secret cert -n ${ONAP_NAMESPACE}
 
+    echo "Attempting to turn off SSL"
+    ./configure-consul.sh true
+
     echo "Environment clean up finished!"
 }
 
@@ -132,6 +135,9 @@ function setup_environment() {
     kubectl create secret generic cert --from-file=./client.p12 --from-file=./client.pass -n ${ONAP_NAMESPACE}
     cd ${SCRIPT_DIRECTORY}
 
+    echo "Turning on SSL"
+    ./configure-consul.sh false
+
     echo "Creating test properties ConfigMap from: $PROPERTIES_FILE"
     kubectl create configmap performance-test-config --from-env-file=${PROPERTIES_FILE} -n ${ONAP_NAMESPACE}
 
diff --git a/tools/performance/cloud/configure-consul.sh b/tools/performance/cloud/configure-consul.sh
new file mode 100755 (executable)
index 0000000..3ab298e
--- /dev/null
@@ -0,0 +1,61 @@
+#!/usr/bin/env bash
+# ============LICENSE_START=======================================================
+# dcaegen2-collectors-veshv
+# ================================================================================
+# Copyright (C) 2019 NOKIA
+# ================================================================================
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+#      http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+# ============LICENSE_END=========================================================
+
+SSL=$1
+if [ "$SSL" != "true" ] && [ "$SSL" != "false" ] ; then
+  SSL=true
+fi
+IP=$(kubectl config view -o jsonpath='{.clusters[].cluster.server}')
+HTTPS="https://"
+IP=${IP[@]//${HTTPS}}
+IP=${IP[@]//:*}
+
+STATUS=$(curl -s --header "Content-Type: application/json" \
+  --request PUT \
+  --data '{"security.sslDisable": '${SSL}',
+"logLevel": "INFO",
+"server.listenPort": 6061,
+"server.idleTimeoutSec": 300,
+"cbs.requestIntervalSec": 5,
+"streams_publishes": {
+    "perf3gpp": {
+        "type": "kafka",
+        "aaf_credentials": {
+            "username": "admin",
+            "password": "admin_secret"
+            },
+        "kafka_info": {
+            "bootstrap_servers": "message-router-kafka:9092",
+            "topic_name": "HV_VES_PERF3GPP"
+            }
+        }
+    },
+"security.keys.trustStoreFile": "/etc/ves-hv/ssl/trust.p12",
+"security.keys.keyStoreFile": "/etc/ves-hv/ssl/server.p12",
+"security.keys.trustStorePasswordFile":"/etc/ves-hv/ssl/trust.pass",
+"security.keys.keyStorePasswordFile": "/etc/ves-hv/ssl/server.pass"}' \
+${IP}:30270/v1/kv/dcae-hv-ves-collector?dc=dc1&token=)
+
+if [ "$STATUS" = "true" ] ; then
+  if [ "$SSL" = "true" ] ; then
+    echo "SSL turned off"
+  else
+    echo "SSL turned on"
+  fi
+fi
\ No newline at end of file