From: kjaniak Date: Thu, 23 Jan 2020 19:38:41 +0000 (+0100) Subject: Update ca cert generating and correct path to certs X-Git-Tag: 6.0.0-ONAP~73^2 X-Git-Url: https://gerrit.onap.org/r/gitweb?a=commitdiff_plain;h=refs%2Fchanges%2F20%2F100720%2F4;p=integration%2Fcsit.git Update ca cert generating and correct path to certs Due to changes between java 11.0.5 and 11.0.6 older way of generating ca certs is incorrect New hv-ves image is compatible with new cfy k8s plugin (v 1.6.0). Because of that cert path need to be changed. Change-Id: If432b9b57c33caff1738500a9aa486293ba3a024 Issue-ID: DCAEGEN2-2013 Signed-off-by: kjaniak Signed-off-by: Remigiusz Janeczek --- diff --git a/plans/dcaegen2-collectors-hv-ves/testsuites/collector/configuration/secure.json b/plans/dcaegen2-collectors-hv-ves/testsuites/collector/configuration/secure.json index 018f590a..9461eeea 100644 --- a/plans/dcaegen2-collectors-hv-ves/testsuites/collector/configuration/secure.json +++ b/plans/dcaegen2-collectors-hv-ves/testsuites/collector/configuration/secure.json @@ -5,8 +5,8 @@ "server.maxPayloadSizeBytes": 1048576, "cbs.firstRequestDelaySec": 3, "cbs.requestIntervalSec": 5, - "security.keys.keyStoreFile": "/etc/hv-ves/ssl/server.p12", - "security.keys.keyStorePasswordFile": "/etc/hv-ves/ssl/server.pass", - "security.keys.trustStoreFile": "/etc/hv-ves/ssl/trust.p12", - "security.keys.trustStorePasswordFile": "/etc/hv-ves/ssl/trust.pass" + "security.keys.keyStoreFile": "/etc/ves-hv/ssl/server.p12", + "security.keys.keyStorePasswordFile": "/etc/ves-hv/ssl/server.pass", + "security.keys.trustStoreFile": "/etc/ves-hv/ssl/trust.p12", + "security.keys.trustStorePasswordFile": "/etc/ves-hv/ssl/trust.pass" } \ No newline at end of file diff --git a/plans/dcaegen2-collectors-hv-ves/testsuites/collector/ssl/gen-certs.sh b/plans/dcaegen2-collectors-hv-ves/testsuites/collector/ssl/gen-certs.sh index 33e3b32b..555590c7 100755 --- a/plans/dcaegen2-collectors-hv-ves/testsuites/collector/ssl/gen-certs.sh +++ b/plans/dcaegen2-collectors-hv-ves/testsuites/collector/ssl/gen-certs.sh @@ -48,7 +48,7 @@ function gen_key() { function gen_ca() { local ca="$1" - keytool -genkeypair ${store_opts} -alias ${ca} -dname "${DNAME_PREFIX}-${ca}" -keystore ${ca}.p12 + keytool -genkeypair ${store_opts} -alias ${ca} -dname "${DNAME_PREFIX}-${ca}" -keystore ${ca}.p12 -ext bc:c keytool -export -alias ${ca} -file ${ca}.crt ${store_opts} -keystore ${ca}.p12 } diff --git a/plans/dcaegen2-collectors-hv-ves/testsuites/docker-compose.yml b/plans/dcaegen2-collectors-hv-ves/testsuites/docker-compose.yml index 6f5f2ee1..d89e82bb 100644 --- a/plans/dcaegen2-collectors-hv-ves/testsuites/docker-compose.yml +++ b/plans/dcaegen2-collectors-hv-ves/testsuites/docker-compose.yml @@ -103,7 +103,7 @@ services: ports: - "6060:6060" - "6061:6061/tcp" - command: ["--configuration-file", "/etc/hv-ves/configuration/secure.json"] + command: ["--configuration-file", "/etc/ves-hv/configuration/secure.json"] environment: - JAVA_OPTS - HOSTNAME=${HV_VES_HOSTNAME} @@ -116,7 +116,7 @@ services: retries: 2 test: ${HV_VES_HEALTHCHECK_CMD} volumes: - - ./collector/:/etc/hv-ves/ + - ./collector/:/etc/ves-hv/ depends_on: - config-binding-service - kafka @@ -128,7 +128,7 @@ services: ports: - "7060:6060" - "7061:6061/tcp" - command: ["--configuration-file", "/etc/hv-ves/configuration/insecure.json"] + command: ["--configuration-file", "/etc/ves-hv/configuration/insecure.json"] environment: - JAVA_OPTS - HOSTNAME=${HV_VES_HOSTNAME} @@ -141,7 +141,7 @@ services: retries: 2 test: ${HV_VES_HEALTHCHECK_CMD} volumes: - - ./collector/:/etc/hv-ves/ + - ./collector/:/etc/ves-hv/ depends_on: - config-binding-service - kafka diff --git a/plans/dcaegen2-collectors-hv-ves/testsuites/env_local.sh b/plans/dcaegen2-collectors-hv-ves/testsuites/env_local.sh index 1bb70917..1bd0ba1f 100755 --- a/plans/dcaegen2-collectors-hv-ves/testsuites/env_local.sh +++ b/plans/dcaegen2-collectors-hv-ves/testsuites/env_local.sh @@ -23,10 +23,11 @@ export ROBOT_VARIABLES="--pythonpath ${WORKSPACE}/tests/dcaegen2-collectors-hv-v export JAVA_OPTS="-Dio.netty.leakDetection.level=paranoid" export CONSUL_HOST="consul-server" export CONFIG_BINDING_SERVICE="config-binding-service" +export CONFIG_BINDING_SERVICE_SERVICE_PORT="10000" export ONAP_NEXUS_REGISTRY="nexus3.onap.org:10001" -export DOCKER_REGISTRY="docker.io" -export DOCKER_REGISTRY_PREFIX="" +export DOCKER_REGISTRY=${ONAP_NEXUS_REGISTRY} +export DOCKER_REGISTRY_PREFIX="${DOCKER_REGISTRY}/" export KAFKA_IMAGE_FULL_NAME="${ONAP_NEXUS_REGISTRY}/onap/dmaap/kafka111:0.0.6" export ZOOKEEPER_IMAGE_FULL_NAME="${ONAP_NEXUS_REGISTRY}/onap/dmaap/zookeeper:4.0.0"