From 63e13006c55617acaa4e0580cafb3dac8f95503d Mon Sep 17 00:00:00 2001 From: Mandeep Khinda Date: Mon, 21 Aug 2017 16:25:27 -0400 Subject: [PATCH] ONAP 1.1 message-router work Removed files that are not used by pods Updated pull policy to always so that the latest is used No other changes necessary Issue-ID:OOM-132 Change-Id: I3a7e98913d93d0d33066454d2bff1a5c138c1d2a Signed-off-by: Mandeep Khinda --- .../dcae-startup-vm-message-router/LICENSE.txt | 20 --- .../dcae-startup-vm-message-router/README.md | 10 -- .../dcae-startup-vm-message-router/deploy.sh | 37 ---- .../docker_files/Dockerfile | 22 --- .../docker_files/Dockerfile-local | 22 --- .../docker_files/__MsgRtrApi.properties | 140 --------------- .../docker_files/__docker-compose.yml | 52 ------ .../docker_files/apikey-APPC1.key | 8 - .../docker_files/apikey-PORTAL1.key | 8 - .../docker_files/apikey-PORTALAPP1.key | 8 - .../docker_files/apikey-PORTALDBC1.key | 8 - .../docker_files/apikey-PORTALPOL1.key | 8 - .../docker_files/apikey-PORTALSDC1.key | 8 - .../docker_files/apikey-PORTALVID1.key | 8 - .../docker_files/apikey-SDC1.key | 8 - .../docker_files/broker-list.sh | 5 - .../docker_files/cadi.properties | 21 --- .../docker_files/create-topics.sh | 32 ---- .../docker_files/download-kafka.sh | 5 - .../docker_files/dump_mr_state.sh | 10 -- .../docker_files/mykey | 27 --- .../docker_files/preconfigure-ecomp-keystopics.sh | 191 --------------------- .../docker_files/state-20170301.tar.gz | Bin 212717 -> 0 bytes .../docker_files/subscriber.sh | 4 - .../docker_files/tests/data.2.2.json | 1 - .../docker_files/tests/data.2.5.json | 1 - .../docker_files/tests/data.3.1.txt | 1 - .../docker_files/tests/data.3.3.json | 1 - .../docker_files/tests/key.req | 1 - .../docker_files/tests/out/1.1.out | 5 - .../docker_files/tests/out/2.1.out | 8 - .../docker_files/tests/out/2.2.out | 13 -- .../docker_files/tests/out/2.3.out | 6 - .../docker_files/tests/out/2.4.out | 13 -- .../docker_files/tests/out/2.5.out | 4 - .../docker_files/tests/out/2.6.out | 1 - .../docker_files/tests/out/3.1.out | 4 - .../docker_files/tests/out/3.2.out | 1 - .../docker_files/tests/out/3.3.out | 4 - .../docker_files/tests/out/3.4.out | 1 - .../docker_files/tests/regress.sh | 113 ------------ .../docker_files/tests/test.sh | 50 ------ .../docker_files/uebapikey-sdc | 8 - .../message-router/message-router-dmaap.yaml | 2 +- .../message-router/message-router-kafka.yaml | 2 +- .../message-router/message-router-zookeeper.yaml | 2 +- 46 files changed, 3 insertions(+), 901 deletions(-) delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/LICENSE.txt delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/README.md delete mode 100755 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/deploy.sh delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/Dockerfile delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/Dockerfile-local delete mode 100755 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/__MsgRtrApi.properties delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/__docker-compose.yml delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-APPC1.key delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTAL1.key delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTALAPP1.key delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTALDBC1.key delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTALPOL1.key delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTALSDC1.key delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTALVID1.key delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-SDC1.key delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/broker-list.sh delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/cadi.properties delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/create-topics.sh delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/download-kafka.sh delete mode 100755 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/dump_mr_state.sh delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/mykey delete mode 100755 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/preconfigure-ecomp-keystopics.sh delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/state-20170301.tar.gz delete mode 100755 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/subscriber.sh delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/tests/data.2.2.json delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/tests/data.2.5.json delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/tests/data.3.1.txt delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/tests/data.3.3.json delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/tests/key.req delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/tests/out/1.1.out delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/tests/out/2.1.out delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/tests/out/2.2.out delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/tests/out/2.3.out delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/tests/out/2.4.out delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/tests/out/2.5.out delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/tests/out/2.6.out delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/tests/out/3.1.out delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/tests/out/3.2.out delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/tests/out/3.3.out delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/tests/out/3.4.out delete mode 100755 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/tests/regress.sh delete mode 100755 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/tests/test.sh delete mode 100644 kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/uebapikey-sdc diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/LICENSE.txt b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/LICENSE.txt deleted file mode 100644 index fe91c7e879..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/LICENSE.txt +++ /dev/null @@ -1,20 +0,0 @@ -/*- - * ============LICENSE_START========================================== - * OPENECOMP - DCAE - * =================================================================== - * Copyright (c) 2017 AT&T Intellectual Property. All rights reserved. - * =================================================================== - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - * ============LICENSE_END============================================ - */ - diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/README.md b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/README.md deleted file mode 100644 index e5f22e20f7..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/README.md +++ /dev/null @@ -1,10 +0,0 @@ -This project hosts the configurations and start-up scripts for instantiating the Open eCOMP Message Router. - -To deploy an Open eCOMP Message Router to a host: - -0. prepare the docker host: - a. install the following software: git, docker, docker-compose -1. login to the docker host -2. git clone this project -3. edit the deploy.sh file with docker registry info and local configurations such as docker-compose -4. run the deploy.sh as root diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/deploy.sh b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/deploy.sh deleted file mode 100755 index b1f9ebdf77..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/deploy.sh +++ /dev/null @@ -1,37 +0,0 @@ -#!/bin/bash - -set -e - -# do not change this, it is already matched with the git repo file structure -DOCKER_FILE_DIR='./docker_files' - -KAFKA_VERSION='0.8.1.1' -SCALA_VERSION='2.9.2' -wget -q "http://www.namesdir.com/mirrors/apache/kafka/${KAFKA_VERSION}/kafka_${SCALA_VERSION}-${KAFKA_VERSION}.tgz" \ - -O "./docker_files/kafka_${SCALA_VERSION}-${KAFKA_VERSION}.tgz" - -# commands to run docker and docker-compose -DOCKER_COMPOSE_EXE='/opt/docker/docker-compose' - -cd "${DOCKER_FILE_DIR}" - -while ! ifconfig |grep "docker0" > /dev/null; - do sleep 1 - echo 'waiting for docker operational' -done - -echo "prep any files with local configurations" -if ls __* 1> /dev/null 2>&1; then - IP_DOCKER0=$(ifconfig docker0 |grep "inet addr" | cut -d: -f2 |cut -d" " -f1) - TEMPLATES=$(ls -1 __*) - for TEMPLATE in $TEMPLATES - do - FILENAME=${TEMPLATE//_} - if [ ! -z "${IP_DOCKER0}" ]; then - sed -e "s/{{ ip.docker0 }}/${IP_DOCKER0}/" "$TEMPLATE" > "$FILENAME" - fi - done -fi - -echo "starting docker operations" -${DOCKER_COMPOSE_EXE} up -d diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/Dockerfile b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/Dockerfile deleted file mode 100644 index 87e96ee0ad..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/Dockerfile +++ /dev/null @@ -1,22 +0,0 @@ -FROM anapsix/alpine-java - -MAINTAINER Wurstmeister - -RUN apk add --update unzip wget curl docker jq coreutils - -ENV KAFKA_VERSION="0.8.1.1" SCALA_VERSION="2.9.2" -ADD download-kafka.sh /tmp/download-kafka.sh -RUN chmod a+x /tmp/download-kafka.sh && sync && /tmp/download-kafka.sh && tar xfz /tmp/kafka_${SCALA_VERSION}-${KAFKA_VERSION}.tgz -C /opt && rm /tmp/kafka_${SCALA_VERSION}-${KAFKA_VERSION}.tgz - -VOLUME ["/kafka"] - -ENV KAFKA_HOME /opt/kafka_${SCALA_VERSION}-${KAFKA_VERSION} -ADD start-kafka.sh /usr/bin/start-kafka.sh -ADD broker-list.sh /usr/bin/broker-list.sh -ADD create-topics.sh /usr/bin/create-topics.sh -# The scripts need to have executable permission -RUN chmod a+x /usr/bin/start-kafka.sh && \ - chmod a+x /usr/bin/broker-list.sh && \ - chmod a+x /usr/bin/create-topics.sh -# Use "exec" form so that it runs as PID 1 (useful for graceful shutdown) -CMD ["start-kafka.sh"] diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/Dockerfile-local b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/Dockerfile-local deleted file mode 100644 index 4909af3b05..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/Dockerfile-local +++ /dev/null @@ -1,22 +0,0 @@ -FROM anapsix/alpine-java - -MAINTAINER Wurstmeister - -RUN apk add --update tar wget curl docker coreutils - -ENV KAFKA_VERSION="0.8.1.1" SCALA_VERSION="2.9.2" -COPY kafka_2.9.2-0.8.1.1.tgz /tmp/kafka_2.9.2-0.8.1.1.tgz -RUN tar xfz /tmp/kafka_${SCALA_VERSION}-${KAFKA_VERSION}.tgz -C /opt - -VOLUME ["/kafka"] - -ENV KAFKA_HOME /opt/kafka_2.9.2-0.8.1.1 -ADD start-kafka.sh /usr/bin/start-kafka.sh -ADD broker-list.sh /usr/bin/broker-list.sh -ADD create-topics.sh /usr/bin/create-topics.sh -# The scripts need to have executable permission -RUN chmod a+x /usr/bin/start-kafka.sh && \ - chmod a+x /usr/bin/broker-list.sh && \ - chmod a+x /usr/bin/create-topics.sh -# Use "exec" form so that it runs as PID 1 (useful for graceful shutdown) -CMD ["start-kafka.sh"] diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/__MsgRtrApi.properties b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/__MsgRtrApi.properties deleted file mode 100755 index 47293a72a2..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/__MsgRtrApi.properties +++ /dev/null @@ -1,140 +0,0 @@ -############################################################################### -## -## Cambria API Server config -## -## - Default values are shown as commented settings. -## - -############################################################################### -## -## HTTP service -## -## - 3904 is standard as of 7/29/14. -# -## Zookeeper Connection -## -## Both Cambria and Kafka make use of Zookeeper. -## -config.zk.servers=zookeeper:2181 -#config.zk.servers={{ ip.docker0 }}:2181 -#10.0.11.1:2181 -#10.208.128.229:2181 -#config.zk.root=/fe3c/cambria/config - - -############################################################################### -## -## Kafka Connection -## -## Items below are passed through to Kafka's producer and consumer -## configurations (after removing "kafka.") -## if you want to change request.required.acks it can take this one value -#kafka.metadata.broker.list=localhost:9092,localhost:9093 -kafka.metadata.broker.list=kafka:9092 -#kafka.metadata.broker.list={{ ip.docker0 }}:9092 -#10.0.11.1:9092 -#10.208.128.229:9092 -##kafka.request.required.acks=-1 -#kafka.client.zookeeper=${config.zk.servers} -consumer.timeout.ms=100 -zookeeper.connection.timeout.ms=6000 -zookeeper.session.timeout.ms=6000 -zookeeper.sync.time.ms=2000 -auto.commit.interval.ms=1000 -fetch.message.max.bytes =1000000 -auto.commit.enable=false - - -############################################################################### -## -## Secured Config -## -## Some data stored in the config system is sensitive -- API keys and secrets, -## for example. to protect it, we use an encryption layer for this section -## of the config. -## -## The key is a base64 encode AES key. This must be created/configured for -## each installation. -#cambria.secureConfig.key= -## -## The initialization vector is a 16 byte value specific to the secured store. -## This must be created/configured for each installation. -#cambria.secureConfig.iv= - -## Southfield Sandbox -cambria.secureConfig.key=b/7ouTn9FfEw2PQwL0ov/Q== -cambria.secureConfig.iv=wR9xP5k5vbz/xD0LmtqQLw== -authentication.adminSecret=fe3cCompound -#cambria.secureConfig.key[pc569h]=YT3XPyxEmKCTLI2NK+Sjbw== -#cambria.secureConfig.iv[pc569h]=rMm2jhR3yVnU+u2V9Ugu3Q== - - -############################################################################### -## -## Consumer Caching -## -## Kafka expects live connections from the consumer to the broker, which -## obviously doesn't work over connectionless HTTP requests. The Cambria -## server proxies HTTP requests into Kafka consumer sessions that are kept -## around for later re-use. Not doing so is costly for setup per request, -## which would substantially impact a high volume consumer's performance. -## -## This complicates Cambria server failover, because we often need server -## A to close its connection before server B brings up the replacement. -## - -## The consumer cache is normally enabled. -#cambria.consumer.cache.enabled=true - -## Cached consumers are cleaned up after a period of disuse. The server inspects -## consumers every sweepFreqSeconds and will clean up any connections that are -## dormant for touchFreqMs. -#cambria.consumer.cache.sweepFreqSeconds=15 -#cambria.consumer.cache.touchFreqMs=120000 - -## The cache is managed through ZK. The default value for the ZK connection -## string is the same as config.zk.servers. -#cambria.consumer.cache.zkConnect=${config.zk.servers} - -## -## Shared cache information is associated with this node's name. The default -## name is the hostname plus the HTTP service port this host runs on. (The -## hostname is determined via InetAddress.getLocalHost ().getCanonicalHostName(), -## which is not always adequate.) You can set this value explicitly here. -## -#cambria.api.node.identifier= - -############################################################################### -## -## Metrics Reporting -## -## This server can report its metrics periodically on a topic. -## -#metrics.send.cambria.enabled=true -#metrics.send.cambria.topic=cambria.apinode.metrics #msgrtr.apinode.metrics.dmaap -#metrics.send.cambria.sendEverySeconds=60 - -cambria.consumer.cache.zkBasePath=/fe3c/cambria/consumerCache - -############################################################################## -#100mb -maxcontentlength=10000 - - -############################################################################## -#AAF Properties -msgRtr.namespace.aaf=org.openecomp.dcae.dmaap.mtnje2.mr.topic -msgRtr.topicfactory.aaf=org.openecomp.dcae.dmaap.topicFactory|:org.openecomp.dcae.dmaap.mtnje2.mr.topic: -enforced.topic.name.AAF=org.openecomp -forceAAF=false -transidUEBtopicreqd=false -defaultNSforUEB=org.openecomp.dmaap.mr.ueb -############################################################################## -#Mirror Maker Agent -msgRtr.mirrormakeradmin.aaf=org.openecomp.dmaap.mr.dev.mirrormaker|*|admin -msgRtr.mirrormakeruser.aaf=org.openecomp.dmaap.mr.dev.mirrormaker|*|user -msgRtr.mirrormakeruser.aaf.create=org.openecomp.dmaap.mr.dev.topicFactory|:org.openecomp.dmaap.mr.dev.topic: -msgRtr.mirrormaker.timeout=15000 -msgRtr.mirrormaker.topic=org.openecomp.dmaap.mr.prod.mm.agent -msgRtr.mirrormaker.consumergroup=mmagentserver -msgRtr.mirrormaker.consumerid=1 diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/__docker-compose.yml b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/__docker-compose.yml deleted file mode 100644 index da83c74b69..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/__docker-compose.yml +++ /dev/null @@ -1,52 +0,0 @@ -version: '2' -services: - zookeeper: - image: wurstmeister/zookeeper - ports: - - "2181:2181" - volumes: - - ./data-zookeeper:/opt/zookeeper-3.4.9/data - logging: - driver: "json-file" - options: - max-size: "30m" - max-file: "5" - - kafka: - build: - context: . - dockerfile: Dockerfile-local - ports: - - "9092:9092" - environment: - #KAFKA_ADVERTISED_HOST_NAME: {{ ip.docker0 }} - KAFKA_ADVERTISED_HOST_NAME: kafka - KAFKA_ZOOKEEPER_CONNECT: zookeeper:2181 - KAFKA_BROKER_ID: 1 - volumes: - - /var/run/docker.sock:/var/run/docker.sock - - ./data-kafka:/kafka - - ./start-kafka.sh:/start-kafka.sh - logging: - driver: "json-file" - options: - max-size: "30m" - max-file: "5" - - dmaap: - image: attos/dmaap - ports: - - "3904:3904" - - "3905:3905" - volumes: - - ./MsgRtrApi.properties:/appl/dmaapMR1/bundleconfig/etc/appprops/MsgRtrApi.properties - - ./cadi.properties:/appl/dmaapMR1/etc/cadi.properties - - ./mykey:/appl/dmaapMR1/etc/keyfile - depends_on: - - zookeeper - - kafka - logging: - driver: "json-file" - options: - max-size: "30m" - max-file: "5" diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-APPC1.key b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-APPC1.key deleted file mode 100644 index 2f7774561a..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-APPC1.key +++ /dev/null @@ -1,8 +0,0 @@ -{ - "aux": { - "description": "API key for apikey-APPC1", - "email": "no email" - }, - "secret": "64AG2hF4pYeG2pq7CT6XwUOT", - "key": "VIlbtVl6YLhNUrtU" -} \ No newline at end of file diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTAL1.key b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTAL1.key deleted file mode 100644 index 068bed73de..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTAL1.key +++ /dev/null @@ -1,8 +0,0 @@ -{ - "aux": { - "description": "API key for apikey-PORTAL1", - "email": "no email" - }, - "secret": "uCYgKjWKK5IxPGNNZzYSSWo9", - "key": "7GkVcrO6sIDb3ngW" -} \ No newline at end of file diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTALAPP1.key b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTALAPP1.key deleted file mode 100644 index a27422f59f..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTALAPP1.key +++ /dev/null @@ -1,8 +0,0 @@ -{ - "aux": { - "description": "API key for apikey-PORTALAPP1", - "email": "no email" - }, - "secret": "P0HpqEBhKJvxjRYdw2sCTUll", - "key": "jQd4a9zVNi4ePyBp" -} \ No newline at end of file diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTALDBC1.key b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTALDBC1.key deleted file mode 100644 index f29d9597af..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTALDBC1.key +++ /dev/null @@ -1,8 +0,0 @@ -{ - "aux": { - "description": "API key for apikey-PORTALDBC1", - "email": "no email" - }, - "secret": "WB7AJICClKg9oZLsxhQnykXA", - "key": "MtRwsF16RdpHZ7eM" -} \ No newline at end of file diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTALPOL1.key b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTALPOL1.key deleted file mode 100644 index 97b39a4fd3..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTALPOL1.key +++ /dev/null @@ -1,8 +0,0 @@ -{ - "aux": { - "description": "API key for apikey-PORTALPOL1", - "email": "no email" - }, - "secret": "P7ejzF4nS3LAsMmKKTvYYFpA", - "key": "Gsd3C3hLYaUcor6l" -} \ No newline at end of file diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTALSDC1.key b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTALSDC1.key deleted file mode 100644 index 28bfb89f8e..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTALSDC1.key +++ /dev/null @@ -1,8 +0,0 @@ -{ - "aux": { - "description": "API key for apikey-PORTALSDC1", - "email": "no email" - }, - "secret": "XftIATw9Jr3VzAcPqt3NnJOu", - "key": "x9UfO7JsDn8BESVX" -} \ No newline at end of file diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTALVID1.key b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTALVID1.key deleted file mode 100644 index 3373566dac..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-PORTALVID1.key +++ /dev/null @@ -1,8 +0,0 @@ -{ - "aux": { - "description": "API key for apikey-PORTALVID1", - "email": "no email" - }, - "secret": "S31PrbOzGgL4hg4owgtx47Da", - "key": "2Re7Pvdkgw5aeAUD" -} \ No newline at end of file diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-SDC1.key b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-SDC1.key deleted file mode 100644 index 207431d88e..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/apikey-SDC1.key +++ /dev/null @@ -1,8 +0,0 @@ -{ - "aux": { - "description": "API key for apikey-SDC1", - "email": "no email" - }, - "secret": "Ehq3WyT4bkif4zwgEbvshGal", - "key": "iPIxkpAMI8qTcQj8" -} \ No newline at end of file diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/broker-list.sh b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/broker-list.sh deleted file mode 100644 index 7f046393ba..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/broker-list.sh +++ /dev/null @@ -1,5 +0,0 @@ -#!/bin/bash - -CONTAINERS=$(docker ps | grep 9092 | awk '{print $1}') -BROKERS=$(for CONTAINER in $CONTAINERS; do docker port $CONTAINER 9092 | sed -e "s/0.0.0.0:/$HOST_IP:/g"; done) -echo $BROKERS | sed -e 's/ /,/g' diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/cadi.properties b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/cadi.properties deleted file mode 100644 index 1cb00a5cda..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/cadi.properties +++ /dev/null @@ -1,21 +0,0 @@ -basic_realm=openecomp.org -basic_warn=TRUE - -cadi_loglevel=DEBUG -#cadi_keyfile=target/swm/package/nix/dist_files/appl/${artifactId}/etc/keyfile2 -cadi_keyfile=/appl/dmaapMR1/etc/keyfile -# Configure AAF -aaf_url=https://DME2RESOLVE/service=org.openecomp.authz.AuthorizationService/version=2.0/envContext=DEV/routeOffer=BAU_SE - -aaf_id=dgl@openecomp.org -aaf_password=enc:f2u5br1mh29M02- -aaf_timeout=5000 -aaf_clean_interval=1200000 -aaf_user_expires=60000 -aaf_high_count=1000000 - - -# The following properties are being set by the AJSC Container and should NOT need to be set here. -AFT_LATITUDE=33.823589 -AFT_LONGITUDE=-84.366982 -AFT_ENVIRONMENT=AFTUAT diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/create-topics.sh b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/create-topics.sh deleted file mode 100644 index e07bf06f9e..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/create-topics.sh +++ /dev/null @@ -1,32 +0,0 @@ -#!/bin/bash - - -if [[ -z "$START_TIMEOUT" ]]; then - START_TIMEOUT=600 -fi - -start_timeout_exceeded=false -count=0 -step=10 -while netstat -lnt | awk '$4 ~ /:'$KAFKA_PORT'$/ {exit 1}'; do - echo "waiting for kafka to be ready" - sleep $step; - count=$(expr $count + $step) - if [ $count -gt $START_TIMEOUT ]; then - start_timeout_exceeded=true - break - fi -done - -if $start_timeout_exceeded; then - echo "Not able to auto-create topic (waited for $START_TIMEOUT sec)" - exit 1 -fi - -if [[ -n $KAFKA_CREATE_TOPICS ]]; then - IFS=','; for topicToCreate in $KAFKA_CREATE_TOPICS; do - echo "creating topics: $topicToCreate" - IFS=':' read -a topicConfig <<< "$topicToCreate" - JMX_PORT='' $KAFKA_HOME/bin/kafka-topics.sh --create --zookeeper $KAFKA_ZOOKEEPER_CONNECT --replication-factor ${topicConfig[2]} --partition ${topicConfig[1]} --topic "${topicConfig[0]}" - done -fi diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/download-kafka.sh b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/download-kafka.sh deleted file mode 100644 index 2ddc911ea4..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/download-kafka.sh +++ /dev/null @@ -1,5 +0,0 @@ -#!/bin/sh - -mirror=$(curl --stderr /dev/null https://www.apache.org/dyn/closer.cgi\?as_json\=1 | jq -r '.preferred') -url="${mirror}kafka/${KAFKA_VERSION}/kafka_${SCALA_VERSION}-${KAFKA_VERSION}.tgz" -wget -q "${url}" -O "/tmp/kafka_${SCALA_VERSION}-${KAFKA_VERSION}.tgz" diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/dump_mr_state.sh b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/dump_mr_state.sh deleted file mode 100755 index 75c16d631a..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/dump_mr_state.sh +++ /dev/null @@ -1,10 +0,0 @@ -#!/bin/bash - - -TIMESTAMP=`date +%Y%m%d%H%M` -CONTAINERID=`docker ps |grep kafka |cut -b1-12` -docker cp $CONTAINERID:/kafka ./data-kafka-$TIMESTAMP -tar zcvf ./data-kafka-$TIMESTAMP.tgz ./data-kafka-$TIMESTAMP -CONTAINERID=`docker ps |grep zookeeper |cut -b1-12` -docker cp $CONTAINERID:/opt/zookeeper-3.4.9/data ./data-zookeeper-$TIMESTAMP -tar zcvf ./data-zookeeper-$TIMESTAMP.tgz ./data-zookeeper-$TIMESTAMP diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/mykey b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/mykey deleted file mode 100644 index c2b8b8779b..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/mykey +++ /dev/null @@ -1,27 +0,0 @@ -_sNOLphPzrU7L0L3oWv0pYwgV_ddGF1XoBsQEIAp34jfP-fGJFPfFYaMpDEZ3gwH59rNw6qyMZHk -k-4irklvVcWk36lC3twNvc0DueRCVrws1bkuhOLCXdxHJx-YG-1xM8EJfRmzh79WPlPkbAdyPmFF -Ah44V0GjAnInPOFZA6MHP9rNx9B9qECHRfmvzU13vJCcgTsrmOr-CEiWfRsnzPjsICxpq9OaVT_D -zn6rNaroGm1OiZNCrCgvRkCUHPOOCw3j9G1GeaImoZNYtozbz9u4sj13PU-MxIIAa64b1bMMMjpz -Upc8lVPI4FnJKg6axMmEGn5zJ6JUq9mtOVyPj__2GEuDgpx5H4AwodXXVjFsVgR8UJwI_BvS2JVp -JoQk0J1RqXmAXVamlsMAfzmmbARXgmrBfnuhveZnh9ymFVU-YZeujdANniXAwBGI7c6hG_BXkH7i -Eyf4Fn41_SV78PskP6qgqJahr9r3bqdjNbKBztIKCOEVrE_w3IM5r02l-iStk_NBRkj6cq_7VCpG -afxZ2CtZMwuZMiypO_wOgbdpCSKNzsL-NH2b4b08OlKiWb263gz634KJmV5WEfCl-6eH-JUFbWOS -JwQfActLNT2ZQPl2MyZQNBzJEWoJRgS6k7tPRO-zqeUtYYHGHVMCxMuMHGQcoilNNHEFeBCG_fBh -yAKb9g9F86Cbx9voMLiyTX2T3rwVHiSJFOzfNxGmfN5JWOthIun_c5hEY1tLQ15BomzkDwk7BAj7 -VbRCrVD45B6xrmSTMBSWYmLyr6mnQxQqeh9cMbD-0ZAncE3roxRnRvPKjFFa208ykYUp2V83r_PJ -fV5I9ZPKSjk9DwFyrjkcQQEYDhdK6IFqcd6nEthjYVkmunu2fsX0bIOm9GGdIbKGqBnpdgBO5hyT -rBr9HSlZrHcGdti1R823ckDF0Ekcl6kioDr5NLIpLtg9zUEDRm3QrbX2mv5Zs8W0pYnOqglxy3lz -bJZTN7oR7VasHUtjmp0RT9nLZkUs5TZ6MHhlIq3ZsQ6w_Q9Rv1-ofxfwfCC4EBrWKbWAGCf6By4K -Ew8321-2YnodhmsK5BrT4zQ1DZlmUvK8BmYjZe7wTljKjgYcsLTBfX4eMhJ7MIW1kpnl8AbiBfXh -QzN56Mki51Q8PSQWHm0W9tnQ0z6wKdck6zBJ8JyNzewZahFKueDTn-9DOqIDfr3YHvQLLzeXyJ8e -h4AgjW-hvlLzRGtkCknjLIgXVa3rMTycseAwbW-mgdCqqkw3SdEG8feAcyntmvE8j2jbtSDStQMB -9JdvyNLuQdNG4pxpusgvVso0-8NQF0YVa9VFwg9U6IPSx5p8FcW68OAHt_fEgT4ZtiH7o9aur4o9 -oYqUh2lALCY-__9QLq1KkNjMKs33Jz9E8LbRerG9PLclkTrxCjYAeUWBjCwSI7OB7xkuaYDSjkjj -a46NLpdBN1GNcsFFcZ79GFAK0_DsyxGLX8Tq6q0Bvhs8whD8wlSxpTGxYkyqNX-vcb7SDN_0WkCE -XSdZWkqTHXcYbOvoCOb_e6SFAztuMenuHWY0utX0gBfx_X5lPDFyoYXErxFQHiA7t27keshXNa6R -ukQRRS8kMjre1U74sc-fRNXkXpl57rG4rgxaEX0eBeowa53KAsVvUAoSac2aC_nfzXrDvoyf9Xi3 -JpEZNhUDLpFCEycV4I7jGQ9wo9qNaosvlsr6kbLDNdb_1xrGVgjT3xEvRNJNPqslSAu-yD-UFhC3 -AmCdYUnugw_eEFqXCHTARcRkdPPvl2XsmEKY2IqEeO5tz4DyXQFaL-5hEVh6lYEU1EOWHk3UGIXe -Vc5_Ttp82qNLmlJPbZvgmNTJzYTHDQ_27KBcp7IVVZgPDjVKdWqQvZ18KhxvfF3Idgy82LBZniFV -IbtxllXiPRxoPQriSXMnXjh3XkvSDI2pFxXfEvLRn1tvcFOwPNCz3QfPIzYg8uYXN5bRt3ZOrR_g -ZhIlrc7HO0VbNbeqEVPKMZ-cjkqGj4VAuDKoQc0eQ6X_wCoAGO78nPpLeIvZPx1X3z5YoqNA \ No newline at end of file diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/preconfigure-ecomp-keystopics.sh b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/preconfigure-ecomp-keystopics.sh deleted file mode 100755 index 03cf45c7cc..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/preconfigure-ecomp-keystopics.sh +++ /dev/null @@ -1,191 +0,0 @@ -#!/bin/bash - -HOSTPORT="127.0.0.1:3904" -KEYDIR="." - - -# dictionary of API Keys and the tpics owned by each API key -declare -A topics -topics=( \ -["anonymous"]="APPC-CL APPC-TEST2 PDPD-CONFIGURATION POLICY-CL-MGT DCAE-CL-EVENT unauthenticated.SEC_MEASUREMENT_OUTPUT unauthenticated.TCA_EVENT_OUTPUT " \ -["apikey-SDC1"]="SDC-DISTR-NOTIF-TOPIC-SDC-OPENSOURCE-ENV1 SDC-DISTR-STATUS-TOPIC-SDC-OPENSOURCE-ENV1" \ -["apikey-APPC1"]="APPC-TEST1" \ -["apikey-PORTAL1"]="ECOMP-PORTAL-INBOX" \ -["apikey-PORTALAPP1"]="ECOMP-PORTAL-OUTBOX-APP1" \ -["apikey-PORTALDBC1"]="ECOMP-PORTAL-OUTBOX-DBC1" \ -["apikey-PORTALSDC1"]="ECOMP-PORTAL-OUTBOX-SDC1" \ -["apikey-PORTALVID1"]="ECOMP-PORTAL-OUTBOX-VID1" \ -["apikey-PORTALPOL1"]="ECOMP-PORTAL-OUTBOX-POL1" \ -) - -# dictionary of producers for each topic -declare -A acl_producers -acl_producers=(\ -["SDC-DISTR-NOTIF-TOPIC-SDC-OPENSOURCE-ENV1"]="apikey-sdc1" \ -["SDC-DISTR-STATUS-TOPIC-SDC-OPENSOURCE-ENV1"]="apikey-sdc1" \ -["ECOMP-PORTAL-INBOX"]="apikey-PORTALAPP1 apikey-PORTALDBC1 apikey-PORTALSDC1 apikey-PORTALVID1 apikey-PORTALPOL1" \ -["ECOMP-PORTAL-OUTBOX-APP1"]="apikey-PORTAL1" \ -["ECOMP-PORTAL-OUTBOX-DBC1"]="apikey-PORTAL1" \ -["ECOMP-PORTAL-OUTBOX-SDC1"]="apikey-PORTAL1" \ -["ECOMP-PORTAL-OUTBOX-VID1"]="apikey-PORTAL1" \ -["ECOMP-PORTAL-OUTBOX-POL1"]="apikey-PORTAL1" \ -["APPC-TEST1"]="apikey-APPC1" \ -) - -# dictionary of consumers for each topic -declare -A acl_consumers -acl_consumers=(\ -["SDC-DISTR-NOTIF-TOPIC-SDC-OPENSOURCE-ENV1"]="apikey-sdc1" \ -["SDC-DISTR-STATUS-TOPIC-SDC-OPENSOURCE-ENV1"]="apikey-sdc1" \ -["ECOMP-PORTAL-INBOX"]="apikey-PORTAL1" \ -["ECOMP-PORTAL-OUTBOX-APP1"]="apikey-PORTALAPP1" \ -["ECOMP-PORTAL-OUTBOX-DBC1"]="apikey-PORTALDBC1" \ -["ECOMP-PORTAL-OUTBOX-SDC1"]="apikey-PORTALSDC1" \ -["ECOMP-PORTAL-OUTBOX-VID1"]="apikey-PORTALVID1" \ -["ECOMP-PORTAL-OUTBOX-POL1"]="apikey-PORTALPOL1" \ -["APPC-TEST1"]="apikey-APPC1" \ -) - -myrun () { - CMD="$1" - echo "CMD:[$CMD]" - eval $CMD -} - -getowner () { - local -n outowner=$2 - target_topic="$1" - echo "look for owner for $target_topic" - for o in "${!topics[@]}"; do - keytopics=${topics[$o]} - for topic in ${keytopics}; do - if [ "$topic" == "-" ]; then - continue - fi - if [ "$topic" == "$target_topic" ]; then - echo "found owner $o" - outowner=$o - return - fi - done - done -} - -add_acl () { - acl_group="$1" - topic="$2" - client="$3" - echo " adding $client to group $acl_group for topic $2" - - getowner "$topic" owner - echo "==owner for $topic is $owner" - - - if [ -z "$owner" ]; then - echo "No owner API key found for topic $topic" - #exit - fi - OWNER_API_KEYFILE="${KEYDIR}/${owner}.key" - if [ ! -e $API_KEYFILE ]; then - echo "No API key file $OWNER_API_KEYFILE for owner $owner of topic $topic, exit " - #exit - fi - - CLIENT_API_KEYFILE="${KEYDIR}/${client}.key" - if [ ! -e $CLIENT_API_KEYFILE ]; then - echo "No API key file $CLIENT_API_KEYFILE for client $client, exit " - #exit - else - CLIENTKEY=`cat ${CLIENT_API_KEYFILE} |jq -r ".key"` - UEBAPIKEYSECRET=`cat ${OWNER_API_KEYFILE} |jq -r ".secret"` - UEBAPIKEYKEY=`cat ${OWNER_API_KEYFILE} |jq -r ".key"` - time=`date --iso-8601=seconds` - signature=$(echo -n "$time" | openssl sha1 -hmac $UEBAPIKEYSECRET -binary | openssl base64) - xAuth=$UEBAPIKEYKEY:$signature - xDate="$time" - CMD="curl -i -H \"Content-Type: application/json\" -H \"X-CambriaAuth:$xAuth\" -H \"X-CambriaDate:$xDate\" -X PUT http://${HOSTPORT}/topics/${topic}/${acl_group}/${CLIENTKEY}" - myrun "$CMD" - fi -} - - -for key in "${!topics[@]}"; do - # try to create key if no such key exists - API_KEYFILE="${KEYDIR}/${key}.key" - if [ "$key" != "anonymous" ]; then - if [ -e ${API_KEYFILE} ]; then - echo "API key for $key already exists, no need to create new" - else - echo "generating API key $key" - echo '{"email":"no email","description":"API key for '$key'"}' > /tmp/input.txt - - CMD="curl -s -o ${API_KEYFILE} -H \"Content-Type: application/json\" -X POST -d @/tmp/input.txt http://${HOSTPORT}/apiKeys/create" - myrun "$CMD" - echo "API key for $key has been created: "; cat ${API_KEYFILE} - echo "generating API key $key done"; echo - fi - fi - - # create the topics for this key - keytopics=${topics[$key]} - for topic in ${keytopics}; do - if [ "$topic" == "-" ]; then - continue - fi - if [ "$key" == "anonymous" ]; then - echo "creating anonymous topic $topic" - CMD="curl -H \"Content-Type:text/plain\" -X POST -d @/tmp/sample.txt http://${HOSTPORT}/events/${topic}" - myrun "$CMD" - echo "done creating anonymous topic $topic"; echo - else - echo "creating API key secured topic $topic for API key $key" - UEBAPIKEYSECRET=`cat ${API_KEYFILE} |jq -r ".secret"` - UEBAPIKEYKEY=`cat ${API_KEYFILE} |jq -r ".key"` - echo '{"topicName":"'${topic}'","topicDescription":"'$key' API Key secure topic","partitionCount":"1","replicationCount":"1","transactionEnabled":"true"}' > /tmp/topicname.txt - time=`date --iso-8601=seconds` - signature=$(echo -n "$time" | openssl sha1 -hmac $UEBAPIKEYSECRET -binary | openssl base64) - xAuth=$UEBAPIKEYKEY:$signature - xDate="$time" - CMD="curl -i -H \"Content-Type: application/json\" -H \"X-CambriaAuth: $xAuth\" -H \"X-CambriaDate: $xDate\" -X POST -d @/tmp/topicname.txt http://${HOSTPORT}/topics/create" - myrun "$CMD" - echo "done creating api key topic $topic" - echo - fi - done -done - - -echo -echo "============ post loading state of topics =================" -CMD="curl http://${HOSTPORT}/topics" -myrun "$CMD" -for key in "${!topics[@]}"; do - keytopics=${topics[$key]} - echo "---------- key: ${key} " - for topic in ${keytopics}; do - if [ "$topic" == "-" ]; then - continue - fi - CMD="curl http://${HOSTPORT}/topics/${topic}" - myrun "$CMD" - echo - done - echo "end of key: ${key} secured topics" -done - - -# adding publisher and subscriber ACL -for topic in "${!acl_consumers[@]}"; do - consumers=${acl_consumers[$topic]} - for consumer in ${consumers}; do - add_acl "consumers" "$topic" "$consumer" - done -done - -for topic in "${!acl_producers[@]}"; do - producers=${acl_producers[$topic]} - for producer in ${producers}; do - add_acl "producers" "$topic" "$producer" - done -done - diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/state-20170301.tar.gz b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/state-20170301.tar.gz deleted file mode 100644 index b36b05a54c4696342c2604bfecb9d75f82310b5a..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 212717 zcmeF)^-~;6_$d6vLh#@aEChl(1a}f3A-Dwy?(QxNA-IJkxI+l;?iSoFxCeK4_T`-K zt+(#|2X57=+xx@TR&VumKcAj`rhBSumLlxwQz%Z&M+kzWlfIKNGY1NJByRP z17t4+YDYDt-5L{?($CjCKm7MVIvD@;-*1b(vr7#Qj&Ny(j!vdBp|5TaKFlUnRaQG! zze=IL^|2rLS;;2a6ZMUww<_fem!FZDQaS?qT^stVSFa>Y+aVI~O?^KQ^;9;A(|%X* z`Ej(k(>oiZR^VNJX`a<+t9h7uaesAidvM!$IJa;(x1yj{l-u^o+2%uih%RBPS{tg&9alID8PYLfDH^mv> z{_Diw!&|3Nx<726`C(uF4Yw7vOFU2vJCJ`_{u^~=bxRM=wC-O$n5i^ZtJM6%6XNlL#B=lru5Fq((3mqaXPFxnSI zdugOHkw{b_S7p;zXA@@pvB3f)yG4jgub53TQH{Xib@!6 zY{tpoC2z$g|1}XpH6x7`e8rQ5ZrHBgSdfiCt*wyxpsF4(g)_deQTg$ME&1copm(Nk z#WL^HzVM#I#-c|#M~UYXpsJjOnE^o{?%8&matm{092iL`;V6b=zgy z#3j0a{lJkhf9_?ml?$xqRiC3;Wrahtgk$($KA};`X2q z{Clu{+WRMM6fokzMHm%T(O!#^4xQ@z4h!};R->vF{34}3fWtLKfBl3J=8CTcNW(BeyL_L*mP;k6}du5O~1Xdy`PEb;kMa@PvOtW zj9FQ-CesfFKkTE!$r$`9Cw4X*y+C3S!JVm4W0(-rnr`oU|K$@*yh*kpdf@&#?W47#>5T5gdk-H&Z|SKJai2CdRhU8V&m5m? zDOC5bVvO02jGFpYN;Y(DPb*T}-OT)zB7X*6haoh{ln%rlFvR5pH-wOn_f9Kz_|Rw zs*U~}kGGDEfY-9s9wqq`FR7X!y4(yO@4B;{jo-2t%(di!)7_54%YWLpg5G-A@4Mmv zjt$1pub(WR$JL5x>@>|c@a+Pv+lUY7?Lv8%@gzUGw$a1e1qz|db@K7XINRx9(F~L{ z)o#XQGw>SACMdVh6mrq#F8A~of3A2<=ZO`@%)Ui)w)bL_@~5*Yj&eh#?4E>}Z=zc7vs4fxdjSwo8Cwjz1@?tw=t4fYJ%#1|JiGy1m? zNBoBm*;2HhL$=RGf9EZKunIrt^f5{2!-3olU`)fc58v>aw`x44lGwQ8m7F$AbV(Q2r z^l;tMN@m_`i%vCUzi(=q3BwFAsRyM&Z5tOzv5hoOs zSco+81#LUj?<6hQD)ycy0oM58`Y}ZS zLX+3Q zQ-{U2UMQ`YSMq5vTpX#3rR8TM?_fE@uwLoS3s+&p$A%tHmamoNE!#5-Pl9|guUOyx z)1bWtECLL(@idaL5W2(H z=5_YNEI+o&lxksBvs(`{TN*As-#9m5e%?`aZn!^Tp(FoCydvsijJFH(t&utDg7;<& zx6E3PSRe+6S7MALqWc%sdClj@<{j)Q#TVIxtvyAtUF@mIg7~LnymS?e{nR_V{muM! zH)JQvM(nZgtlrN#E?3%OoZgfZM6Ar-l)G5GE@8FINKkK`NjW!eK#)VhO8(ri`~$*k zjOAaEWsFmE<>fs^&gbAVkDBZam6(cq^+b+Dp&muj^O?s}uLTW?YJp|6HD7uAIYV?$ zQZN0@Wi*nhpnX%@6K_hJZT5q#WvZIeYQv~9`n&=(%Qd%fwM2KMWF}J?IlJ1RkzNP4 zEvG3{#923z6s9imN-OVIv%*h@%hJYuQrj!~kA9?dRIukI9aSn95T_C(x<5(H6cX%A z{hSkwFkIU2Lp##7c4Wl9+*{mHLD60Ty*;j>7i>V6@7>5!#yGP2utOvGXc(9iV3O*W zV}K=}owJ;`+%|4JtbEKb$cOIcuzS=9*M6F`H0}Mly<+ajs3ZJE39PCPI`d;f)onJ{ z7;e~Pun}H9vMPXl`}41`K)h&F?=CLpD7;rcVDRaNE{g;t0Aw!Ad>wNEIcC>QHX?&8fs3hU0aHr6G74 zI_)f4yOnRithQ(3|EPM+(wnr&qb&#`jBu}r3E@-xUi*z4lH9*YJM2l8P6Q`zB_zH@ zlU8!rG_1qeY;&D?>q;lu3paroUkqQ4@vI3^^p=gHIcL?&Et!`BA{r+oUDADBO5`VO zB{XLGOs+-5S?S)K|Nejjg7ns8{pdz_C@?7E-NNsz6wSfP%8>!iqe?9NRZj-B;O-E7 z9QT?gsgiEgGNQJ}b~Viel6`bvl)xrAyQjf?Y?KvYVj zh;Td@45V8_h~WQ$#cL#I|E>Q9-Tpi{BPrwZI^yvDCMWlD#@d%3y4}Q{S8(;)V|zjT z5q4bIKzb`Lm=ccGKpOAUg)mZy6uLbTw!|kP12g0=n_CU?f*)39tlhX9kIayV1Ai8` zk4rM6xp7-=5WCGvp`!@lvr{j>L5Fjz-*fj6G6?PnCR*LWmJnE(xK9vCtPPM`Xuy=G zDP;4CH+=gpns?@)*IilD_1HWs9$zHM`4m<3?QJe)Sx#o)o5EbmQR749FNzYOad4s7 zuYXTw1-gj&3Oo5+sMCu!V2nH|Yr6bruzVi}3r^vm!BY4?>SC#!c}zSD`d>9Ae4CRR zE$;uO!2ft5>i!m8Mm&CR0lr1A(Zkiyyz!1_vl?QhyFL-E3yBt7|M-`|1<4(_h3EDfIDE?Kp%*a}giP0iR^j((J1?=-HK`aF~oG-K;^!jh{ zh!b$Bb*fY9d46SIIenJDt)r+kXsmT;0#n?3s~QkNt$(@>Dy}@%VO=svShz z5u$Wovag)gRf(4-cVtfCN`0v^A03YG`u8F()TpGJ?3l=2%1h|rsZ5}RMpfpMa{|n5 zsDFPzfP-0fqeA|Vz)1rZ-5!gMo}d3t+M%FbL1KjgSf zkSY|13bp*NA+MN`TUy%o-!FE?_}p1bhg!n@s7zD*+6`+II@_n$7tLGaE$nuO6~f+4 z#kUkE+sBr9mGaOa!{Z)rp7c5gzHehb2MS8j{}yw4LKj&gGEg zCRP8T`}kYb5X?iJdjhtQ1bc@gb^AC?F@{Yx)@y1^oWy*REHax}aWXm!_hC+k8`5)l z-v6qV9LA^iZTnQ@WjWlffD6jw;?R#U4<@e}n7TiwyFU?lth>5(zoZj8cmPvlfqS@O zmB#UYka=7?io7O3iR@I`&eIc&jwD0-h1>g)`YBYFI_p@)z=Ht?LvoE%&gQ8r$HOVd zzZ1XdmK3THG1w;YEG#70@`48)G36-jaYhs(&3GF{^F3ORKk>a|ir_IP8aGTM8kyvu zSbHA!Axn}+w;~-+arR-5;y@ZOJ<`^Wd+FMi!mEL%vVTcx*RXwhWqt4c7ug z`z*cmIMfF-Ey6FC=X4S2bMN0hM&o~wq%r%G|M9*9YUaQFG(Aou@k9(3dg!=<^24ZJ z%Izx5Yx4&(uc%YDfoJ)VbXT?XANmQG7PvSk*|NiKDI0VNV78lGlL&0oL@t6DXeQQk% zBq?z=&3Ag5A{?P(&tzgW5hgx)^J)BEB(e+kEqVqQcTKON^J>ntxzYNG)j|Ei8Ny-A z#)sY#1Qr@@>t*(&HdTo;hl2nJ0gzxFC6p1 z99~G1jrfUf!ZpjH3A^Xzhf#a(Su0Gj{HDtDRLn zrIy3aZp9}lT0Xq5SCfC}U5+C8U=J~`LNGtC@5QTuT^GMDO?Yioi(xz+!f}V6?;f|p zHMEuH<%c}YUF7VqGiaDb9L}@l{7ki?Kyz@%_gx8v5A4O4!LUH|AjQB1x{ihBSz}9I z*{3_4&U|(*>+K1d4{+If{U#VP4(T`6FODjNkpc9AtkLvu;|MO$zm=&veOy>MiurBBwv3}efO^Gd9r_l<|wOhIkUOh zq-L1-b%@2=sQV9-Huf#4EBiH<;_b%h#MPPTH5urRxf^qdTm{g36k~g~0U@3%EezB@ zfn#%)=adytx#6S6a+q^z@AE_(lD?zwbP^b*HCnH=rI|NkE5nAauP@U?jtHiih!_en ze!HflwuBTvn?u!qt6R6RTXJ>bcpc_I>2#+M88$4>^7hBtwPQ{WK_sb0$?0`~z_QDv zf~hqVY5t#UizoCHl?9yCQLKYT?@{tdNs`u1(P+uis_c%NIrUDN{htVYed6=eFL3C& zJi^xuCF{VL_3Y7r3ff=YzvMU69ckl29Sb&5mDa!5*$Xzh>HG=ZG$73Wo-klV9h1td zqGx2y^70e9=`d$EMX-FtCS$irY}L$OMu@mLpU;h(ILYz`%NJe^Vyu*KW`?W+nbY;G zx7%-y+h!EA7prSp+;2o$eOm2Is{AhHoJ{KEhWA(tOfQ^OHItHr+q&h=86B}A!}5?L z&9m1hEcp1@EBIB3hfO)NEZ*}A70Gc1ZLpdJu`uJYNN)VWH2zUnHABClV0JL!Zn9x! zZ?f?hhtt`@L(g1QJM}4H4h3&gGhJkAGj-=$P&_h)AW4MUkm=O)GhIHlW;Vx0B28iU zo2}LPZQSo+%5^x7#nd{|$tkG`X^G53IVNu?31uRR`;-S-Q60II)reg#CQzLD`(tBS z@?^p)q63)X1iMrCkC#1=y^Xr7mpGk9o*QH!DmZEv;rv~e6Y5YtopZz>wwS&q>N{ek z`6_aLc476H^q5^U&|wzht(KQdijX9E5{`+hJ7v0#mW;4Fxr!V!`*A#Ke!UCFd_H)p zxRPm%U+2Xq?cE4=>FyKhau^$~RL;#osHj{6PYTcL`U~Y1nN=N*=3H;OH{)A-hRf5O za%Wd*tHsi0Z54_nPyMB8$7;I()7JGa^d+`P zU2mf6xNTN5e2aW=o5biUx@0w|u;in%)UD_Z3qgHeoj060N@mD@>Okb-sLPY9;HZT~ ziT{A69U0FcYN@)Np@WGxv{{97cVUEJ;5(;Ymp&=%_mRHHA_zgFD4Bje6#w1~l#?eN&J7i!Lm$+JipP0n zo0S~;g7EaXAw$Tmh%9Fwgtd6Z&%#W>isdonYhZ^&ol2>Gv2k)s5T zcBpixaFoKjrrw##g_w+4nXP1-O{%xgO!%iGzjaQh8*+c9CXbs>?+XXvfKc-(F0S(J zYUMA4L%t%UljNp~ofo$iMSGBNhK>wLCV!6#cERw{mbYVrLq@Wb?uZ!rIk!&~lF%Kt z>FggP{N47Gse6&ei*V(b8N|jPt(NRL7gJWaF3ONQiD(80(+Z?GS%AEAmI%%cP87qJ zBwqi?YXzNmrVB0?S3ysjSKpM`&{dO%Hlf&XIsY|y<=lw2NcTM>c3uo`&+qeVg`+{c ztkWwzLCFP&ec_eYDgr$I;b@{=3~~a8wU&1*`R!T|HZ({Nl=?wE| zNW+1jr+z4|7~&&OL7C>oRj=N@FvMhBo3TztU9t;2l0&s)hit$v>&ubeF|nb@nh`$p zm4UEfL890s8WzUVo*GGF)A|pSQcxi=spLA$yyUhhwq*5~AXQHZAru$Q2rAcmaLUm-q0-3wN47 z#>65c?e+8^Pf9pDY7^Hu=sG5eNnS=Cm!hUpUB$O+|)`IP7}q1dtP09%U7)oM3` z!Gi*a>nAh=mM82ia{Yw!xN(mWU_#;`t;&yKM#bwMs(sAu)5Yr4MeXE?)4n#uXRp~S zu8YsVlYK$+)S!7yTJ+yt-E8PNw~4OZKVC8 zO2)8SI+?z?2$UdapWBvzB?p29NhgEMPZ6A|jE@#Da+vRkL7X6ZFBK-$)YxMXmpaEy z&=EC;9L^+K^Km~;wnv<0nW%QHZoexT7P4I4W&S+Hy^N2fb9Ek=joR2nXE0wUJ}ocw zW=_l)T}5tP@QqAM5_Wdtu0F&G4w4h7no)Pf+VtQsGjFcqCwWG<3 zNAw*!X}1H(70AsOxZyhRl6-n!rmCdEKXw~)NwVt~PdKGU38zP+mxI^z^TifNmc+p5yr`fpSciBzD#r%cNNRU ziBRk+{l2^K3Tn{U=&up@;0_gB&Ew=-FEcO=%V$Y3NAJ9|as8z=H$Rc$;Q1=!vyR^0 zw@OBwrd2EM0`*yvvz_KYI{qwpA)4CVN))mMUb>v~6W#RbR>E}sD*1()c~Qr;QwwG& z=dX%1@+PKo39p<|_7zpi##76RJQU3ZaEUGO!cMpOmxp#w+G-sa)fm-eVvn!96WWd1WOv7;H{2LoIzMM3$Qt|gX)w;ob3U`g7 zcgwlL?sMzTK;sz@M;r5e`qGWDZ&LKHjTtO7I6YKf!20TA7v(}l{{ZisOEUUxyWPm= z{Dj-gBhDCGvwhpIv|4iCDf`yIl|F-D*+HZTWF^hRPf=P0AhiS#EOFePYvHdkM1lzp z9GYoVQv*v#wnI2W{tmF4C;^{+EKPjN!qMDXABZCgW6 zV~;Uu4PPekn6Q@p)%-?5X=~8(^Bh>tC>pbZV;jdUw8^{6YI-`JFid${ zw3H}#f@j?zwUlOGaeI}rOwFcv*u_M)>}w_CbDOXH#vaP=H_MRg`S08ds`921MyqS+ zW%;2sqx1RCCh+|u@{2L^#;^x(zFRxIE$ucqV*FY6b-b97e*_+jq*&bz$>>Kr)r%XZ zz#aYpd$e6Bm7p|Ssn$n$U)aW%s&nEMWIRYi014#CHB##-VopXJdkr>ZkH7}872B<6 zH&4v}vP6a>s}yVPiN@lV0Abnuo6_GguDGRl&uxBY7%KB|6|B&H?CL#+{}IFRlE_e` z437xvI3YhE#4GEc_+v{Fwf4%S_R5oP(ydWHxkhC%L*{Hl@GSGp`7^Qbh#@iCEgX5m z4jW0W;+Op^LJCJxC#U6o-Yd5VPZ6BvZo8rmv9GnsF}0g-~L3j5Jt$6qZx)or@ZZ}jgG_kK(!j17r|uk28@2w@9e0QUkAsmNWxcD zL|1snrMnR2E}%}x1(M9#?l>Zu zKZqzRNLL7#xY-`TLiB*W(pK?23tooL#fY>|9S8e|y?+T(-)dG?`xSyR7IqVEr%vOk z1=%MizF7hH&c*1;ldTl1p`|v@4Ijay^Cw~$hsT;&6F-k8R6?GgvQiLM3oA-oaGvqO zKj-n4eC>*P;~nt@-V4b$0y1I;X&ss4^Y ztbjr)eDt`{Y>bLgD>x(rTRb+>%dwu#H^bQ^`OcBnMmN2m?=myvb=sl+p)Wf0sVd!x zlkPQ#mq{^)>zn<7pay=_KD{?{2FnY>6iv36nz2--#r%49v}|mgUK_6eBAy{4S+A%^@dW-Vrqw8FEv3Y|xXnF}F;LfiF}fl%Q9~fHp%Rt<+R{FZ*}3dzPKnNl z5f?#+bNLt5P1)QrX4I0lPiK}Vfgf}{tTqxG#x8MRJ9cUzAHo~QzK>D0Oc7X-Hw#zH z(l~I;^_Wd^_{`#-`_B9+_s57LB>SfBd>qE{Cyp7#CH;vOtWLCl_fcx5up_z~xpzf> z+r2izUkvQhGp)|jK2#3vcp{})WKqpK=T#TKu&jdm^P)6|-X_E>@%Mv`R<-P}$?89o z^yBUgT&50H={0nF1J2j)KEqxZkO)H&ybl6*LLEN!B~m3jKmK4?*2y22A#Ha1ZbSS$ z@Op74$Pg#TPkkx6p(F7X!4SQ;awG_SAdJ6e%77?__PX;$-XzJdmrDI8O4Hxx(S9D; zDCq3Yx8^^`{PHTEElMIQKKSt@?(r67^PKS8+rrM6p{N_O_6s`<3Ogp|GG=9^G8SBY zmc-tm!bzh2rr1%-uZO}*2w9@?~VVZXjsjvQA%*fYd zbc_4CpRP3u;s$}J+e2uDIqOnZiXCByzQ}NPua&#_d6ZN`vZh7EzWhr3&3}m^im;x8 zaZ(#dZW}dy-btN_f3LMg#Q8-c=O9iE zg8{pH%1U6NT;BJ(l)%znno@KA?>CEXQB5_&W0_C;=e)5U|BU{bH)Q%v>P%C)*jpbE z6NE(n^8HFj&B&&_g7zGrjXo8X;G4%BJPqfYl3ZGSEVv@|PY#xXJEHDp-op)6=<0e2 z@4L{R26u$lvBYeaGNf1+p#0>WP>Uq|l-A8LAtc`>(pEz; z?Dw|R^X({CzSB8yrD^mX%r8`9Y6B>Ke;>7c@;I~|Mrm;5yuDxJw9?&vtPrRbt3x~O z7Ct|V--D+qVK=S~z@ahxOP~^}S$Uo2gm$G6YAQB$i%wCaH}qxQ!#!t^!V1MXN7a6@ zX`)Pz#e?Wwjjw#&GzPk`(N%cfV}3!b`MS-OjgFH*onLxcrFFU>}LePC=n3{(aMyF)~WCoAM?sB>X76mm?&cf!X+bWnaRH)A}Yy7%`V$@$?p95}dnO{B@G(Pp^BzmxE zn=vAZ(RzmYt=?o`1#c)0_h+e=8;W#F@8ekbs=l6wmtk8W3E~zAe){>b4mu*#dxBZe zsruFjF9xd$)zE0dG8~p`5{n!=EhaCUnru1DwIaZCSmrM!}ui7>^$6^Tz7`)(+X`dY$UKGcCdn3;zao{e&(M(hc9PV9TWSkbAK8K{u z%FmC?9-HFzNM7-yyXi6=NA_qJg$-ZXC-df4R3t>n%1#fmMN);4_w!#YzzYv-Vd$}i zt#JMtLyyOv7nk}q{q1y}%$XTSS0&G?0L@i1H1v~em{cK_#cq{`v8Q2r4f~dB&vWll zx3L#BJa2CsoimKWS_yNplB|1!CumTlg{+nG`j=8Kv>M>8yB@QPZ3FMR_MAh@rFQW5A(V-C*o^gvir7kY7oru3D{^VHSK@Ucd%bqfQ zU*kR*p|7Pb^(R4zr%FR20;B6g#q1yE3Vd9-mQR^zBmzwt9~&6c!fSpa>DSB=nwuRz zDO}k8`ble|o|Ipv>yo%qrHOnj8C^wBrlg{+r%vQWoZX!snHY?VU zFMRse9Rcm0bPyM`Lr8kc8bS4|H)bi8*l>?uYeSsa?iN0a@zjUkwh2WHEQIA`uD7fs z((e&qLh|JPx76Z^WF}SmcqLkB_Y`IGm|$*vE&oOBhjh(Xzp$mCu(b~XHgNQ7*g@0Y z@B-f|Mi2eI+EAjs5r(`(`6XThQT?<-u$8L)OH1_eI>bDGTy$g|C~zhJM4RGsF;h<5 zSy%uvT`L~M3(=Pp+3rv|Q;VoriBM zeUnxcb$hi9N@M;UPpFjH$PZc4haB{`0|*C`anOykuAk1uu%z*2e~mPe@jWxnWtpaY zcbR|u^8KNA`la%Sr*^i-%Dz$FBITkSW>L-GcE#O$w{PS{F%&P(Ryk=f{T7)&WYZ?c zF_5i(In9WP{lsgL%_zt55MePxmVU-YN4Edo;jyyXx1c{-4lB9mHXOuQiXN_?7hC)m zC1Q30>g*oB-DsECWv;WE@L2Nvb3~nesWEa(TyVJ#El^<%-^lg|A{zW(wK+C56&HW= ze9`erZrx0G?V_VPWiDJKc?gJh{~H-);kz(0;$oTQoA2kXfS@ai@sXhjE_gEg^%0D` zpg+&A150CM#a{P;!qfFoNtLJ@j+Bg=GA}sTjQv{=deCPsGR>D;NQs#l?-Vk{7#(|G zI_73%h)@>hiL?%8XPU_bKS4pyr19UIT;v=U64{-1L~5F<2^==9dvRCXvgygPDJ-}t zxM_kz6o$Ac316`^w4T-^)7`vhdU!4G59@lcx!*g?yg!Y@aX%dHhV~jrM9kVPx^G8O6)W<4_6Dgun~0 z7>OjqvGOl`zbsSt2fJPVHW&PQ*&P+Vwztvn-ZU+HbJsY{JN8uD+2_Pe*e@-*HHXV@ zv?we&Dwd{n?{w4wr`88{d%{eiK80#IVDFP;9bc{mUC6xUzK0vvKj4dx4LxE?81uWtFGPl!9GQ1G*0s=q)2mk>f z00e*l5C8%|00;m9AOHk_01yBIKmZ5;0U!VbfB+Bx0zd!=00AHX1pY4zv{GCwi~ieY z53CAXMHRe&01yBIKmZ5;0U!VbfB+Bx0zd!=00AHX1b_e#00KY&2mk>f00e*l5C8%| z00;nq|GL1mKLXr8n*m%oBj0|6ia1b_e#00KY&2mk>f00e*l5C8%|00;m9 zAOHk_01yBIKmZ5;0U!VbfB+Bx0;>90n27)E1@OJoB@qK2KmZ5;0U!VbfB+Bx0zd!= z00AHX1b_e#00KY&2mk>f00e*l5C8%|00;m9AOHk_z<*vKK#2F*KYIZnCs1p||9mtc z03ZMafB+Bx0zd!=00AHX1b_e#00KY&2mk>f00e*l5C8%|00;m9AOHk_01yBIKmh+@ zS@hq%06nlOY!%=E1b_e#00KY&2mk>f00e*l5C8%|00;m9AOHk_01yBIKmZ5;0U!Vb zfB+Bx0zd!={O1Lx{Sn~)*$nUkHYKU>pN|Fv00e*l5C8%|00;m9AOHk_01yBIKmZ5; z0U!VbfB+Bx0zd!=00AHX1b_e#00KY&2RloVp2##@o=9`2}uc8_QYt2eA949day?3)#{egIlrEnzm2NJV1 z#O2i=;S6P}oyjirwfwC`%e+6LqRVWOeJip47DCk@!i9cy4_Wzm=6>~%7I#>;^*{el z@b7~Oz#9+%0zd!=00AHX1b_e#00KY&2mk>f00e*l5C8%|00;m9AOHk_01yBIKmZ8* zzbD|!I5EwY(wFmG&bY#H`^FE_D{)(!{<6w50bVRgy+0jCOZIct^xHaXXm;0-9Y;9^2IUB$y~9H} zSy-k%?9H!Jtro_{W*13|Vum&%uM&<-D589dg;NKOe`P_vUR2p}G<;=gY|e6y^Vp|61rU@>ArimZnI>bU`A{@}wRs-(1C|m2= zi4Sk2KD^YS5J}b!y$Bu7HrY@bEm^P7@bDip>r+cCEeOqs^7>i9CdT?B;NjC#Z_}su z6>RzlgyNeOVHL_Uvi)dz>vt<>;yx}6G4k>}k>@TH)01q+C=tUm> zbk!&~KX&(~^4h;#jvO<^3Nz(Sed}-Wj+{qBkZS~2IC@m1D+c$QvKov-OQPLvxmZ*A zLj4Qa!$Ma(>u`)Q%%Dd{x9{QPR{Y|P^F{PZo8Lii;6YoU_Wjx}{#63ZN;i@lszh)l zLun`R)Jyj1eA8Gt@!eZat|_XG9$GvX{meCbd3Zbxv03_(6|NPUH({ zZW$@byu)ZJS@^n23FLe(~(Qc_;T&CdlFXlc9yZ3#CAcO|tx^<7j`x_-Wq6s)wxeK4Zwj z=mv@Lb<6XUn!q~@O6Z)H+_n&v5XM4>gg3%HZkF~MLWjg|jK}ynhPo>A*Cq74Iq{uX zRi>|1;Wr_--)z;$g5-m8_bGQ`CrN`8@0cE^s-oT1jdaA0bW}5HEn6n=J67LYRbK08>}*Qx41M+RlotA!!e38iwM9%sLSaqx zoSb6Il8Azwc#CD8mK#0l3^M{lKHTM!`wVkmqsG|juqF{#HK>(Gf>TR^Q=)(mF;lD8 zxj&UR&h4kg^__l?k9v==Pu{w6w6`8zXtPe^hYFZwu?+G_-41?Hfc+?#0)_>=#gI;PuIL;8K{j*Hb0jhV+dGB_3!Ty%2$>93C2Z zudQ2MVfr4ivaCAYmBHJ#I6`hxM#kFwLOrd#<-<)GBnjv2O^z1bq!3l%IQLh0PK0RH zIyF_RbpzuilS3-_ckXmsC`hgWpO@%_-rS6IwX-|s7cSpsr1Rk66%PgUUYV^>jt%T( zgnFhQFP0s*cT`5H32!m%6EAt(3{uy>Iq?VxTZcJ~?Fz4*O_#(sch>oh*M z7?v`usGG31Iu=s?`+KK+qi`yn_emV#{_fP2PnE@c7{{AktWg>UVgHiDT<`q+ z3x(2}%;h}j^p!$o0xP52YdrKXpS>w}isEdV_t@wg&rzEu@uY-rXCj~k*5$@jEd-K_ z*pjK}wobRk5%WK4_sVoVGV6}citeI+>jss%29{k0@mSOjlr1HFm&iQ%Tk1eN?9+I0 zosT6bs9H>np5m3iiU6(hUYp4`hs`OJGU5r=)|<=gbXCR;If(3;`!rh2LP@*GQ4J|R zE>yNismH6z-#+Zx_|VKU#ijThqNbq7@n5gkqooY|)cTe9OX(EZu_EtuvutaYFHX2_ zqSEw*BU=mYxGq0UdQoOW!u))d2h_#{m$t07I1kLiD?vxwLcFv z^MS%HsHhOErCdHNI_lf##?RlbY%Lv^4;`ST>|>@ZxM!!_r%%ktBR z%r7i)S2wYy^oKLEo?{+pkPlw6evo(0?wX~gRl;RnlZuo(8_e+(@W2_D{mxlYQ6wvr zK$cLgEg@%Wt>^-1bBK zoR(tSng$2G>n>&%nDf?{$Lkh{0wNbj|89(SC`+-DszgD&}i=m37|0D5O;YhkOplK~4shOm~O&jj++_=UujPFk<|03@Ljb~%& zB8A&-&PST7FuSKmiw~b0({qKesJ=vm$0Hu8>yyppQxscw^a4PS~@V zW(MM8EEduSKi?Trhq%s-dPZU>ca)(@6`^e`X;jZHT3FvJCpxE20?@a*hI~3*MEE+-hJ41-+a03dU)x%+09}lur$%Co_x4+;CEe?mmO8#cir3@ z*+0IPhn5A;eEj{SY@Q+nzN#WVL}9t9i69vBhyyK|h~60ss+OGA?BkH>WKn552cPGM zL3i{{i;|zor=_^nHKWytj*SSF)O#I%a=&$uQEjabR{#2Pf@jX=pg~T*q0V%IjE+!X z$Z5dK&ECLir%!3BeM8EBO0qcaHp(>ukI<3AHSP(INTPuHUh-BQJ2%&y#`EH2o%uVn zDJ`}gBG|eP$q+QP_IooHS&n$OjAzsLOy%eS0s1vY)2R;_R;?*#t8bgX(H$AmDWD_S z98`%`(x+;?Sj!n?`TBg?7oKG8di0IoZH6d4o?Gn{{3wdEiC?$?UxTQH9s+71#eS5_ zcIp(q8y>3HbJV+&mZ^cWWRhl+10Q{^&8z*Qnx($WS3c+KY@6F`n=MJs_zSwsb|v3z z-{Iww5f1!Dnw@(ri$I&d%D1B_3w^*t9SDT4QYSCUOdwm6>Zh>5H^C*doZENISo<0& z;4G-HUwdM`qL#TfK4LHI^l8LCCla}U45q=%M9cqYh>}3OyTo}u&rqvsEjqRRFeI`i zATmz88=3!L;#i?-Ev{y``TIw6b&2l&jI|0A@4jI5SpkYEcRIUQcpq*5C@ ze(%1X!a;gKMIu;(w{0FRlqa_LOOPm9+AFa6vB}Ng3OlWDpHx`h>5n*>=_nGJ!YGD% z8qkx^-**04{f00e*l5C8%|00;m9AOHk_01yBIK;Zwrz=JUsCgMNM z`rhf1h=E6Z0RbQY1b_e#00KY&2mk>f00e*l5C8%|00;m9AOHk_01yBIKmZ5;0U!Vb zfB+Bx0{?k|03qK0`ID&=s5Rn$J{k}J5C8%|00;m9AOHk_01yBIKmZ5;0U!VbfB+Bx z0zd!=00AHX1b_e#00KY&2mk>ffPb+p`tRcidSF%9D!>B>00AHX1b_e#00KY&2mk>f z00e*l5C8%|00;m9AOHk_01yBIKmZ5;0U!VbfB+Eq&kIcZBf$N$8Q=wMN>brJ9}Nfq z2mk>f00e*l5C8%|00;m9AOHk_01yBIKmZ5;0U!VbfB+Bx0zd!=00AHX1b_e#(8t0= z{AVwK@0~7*7~lW`KmZ5;0U!VbfB+Bx0zd!=00AHX1b_e#00KY&2mk>f00e*l5C8%| z00;m9AOHmZ^8x`vywCpG3jjHRS|k4FqX7W`0U!VbfB+Bx0zd!=00AHX1b_e#00KY& z2mk>f00e*l5C8%|00;m9AOHk_01yBI_%3@Q+(Y$|2v^QMlExpf5%s^vI4ZLLf9>2^ zRMTe~2JqJEh@jZQOht-BMn#G&p%7G73)na!WgTFO7-eZFi=iL_L4wdGNEM_y>}3-{ z0U<0RYY2!(pcIisktHyApvWdwNg(`5GA-BB`{A7DyLd0YtM~a`d{@u;8pk{bNps|e z*Tab?2TK>it~@rX75WH<&+x{M8Pkmvv^3Vzm96$G?LVQ$ycW5A+&pa@|72uX6}iZnNb$Vb&v1TyG#?KmY;|fB*y_ z009U<00Izz00bZa0SG_<0uX=z1Rwwb2tWV=5P$##{zSmln$B!+*DXp)?TWW8WIG** z4lk}c;+$h2R!Hv(5Bu71L{Gx-`8$s%s4*BBR3zhE${!zZet zT9AO``8=ZOCUx0*%5~e&e@J+*Ydty zy!pm$SnsNOZ*M_uu4Rl=X!CNF?OD^tAFdEj`9Y|JO4dh zn(}r&uvp1_!8~>Qjcc zq}fk_p-XjZIU&9mO;+27U#{_{#7+wC7%ueIkRH6&*jECvxOLZox z{w4PvEP^YHOGW2vpVslC63s(KldK?_~G-gl?^JZ-s6>C9EGoTK9ZqN&*)FH%hWxajRoc4em(GvB@ViA%v{$HJMrxBWjg847B@(LIto z+FL_8>Y@E*nzqpCr7uO1Pti9aSF6~qo)*1pPaESBjCrP}>X+@>_4+P->e`VOE+GM- z2dwMY#wrKgSxsc}jUT)ge~!_l7^HVSuBN*h5c}wT<5xIz?;*Z=72njya!(aKv-peGSkG2dvZI+FaOaIkY>_#k8 zYNX%gbAg-%lWr0aN=pkzdRXs1X>ZL{}sBq=y@6&+=Ny~V0JIy?H(GsVBKx{ho}%h3ya zl2VfLDtLP7bYQb&LH^4uc5kD~a{Q$Q-?{infSw>G#W6_MsC2bp?v5kZ{S>C3_>MCy|E{Y_S zZztNP4K)bDS~RG<*wQ}jeT$+DXDgLw zzPhzio07{OILsLs)O1}9@}&@xr#t&d4EZ%Lxh8|nWA{)0$5%$L%#5|qepR;RTFmR* zZLx>hEgni~EA{+LaZk{El$k1Pcb9A~S@xZVOjkoTHpL(-vtu7lK9Wfl-@R%OxhXMZ za($`peHWbzG8qejYdRP9JJW(gZcDmf#Jymg3d(AWD^~c}Y^_~Hcq`~#)qUls6LHDe zyVZ{x-MZ8%@+ipP$DBFsE8C)Q{=81aOn+}&sIaqedYG@0rPh-hc#2iFBAQGaDXr{$ zGf$GgxvX#3Ot&Wl=iYiOz8fM(+D5<4^025f+WjX_+*FxVdg5P$##AOHafKmY;|fB*y_009U<00Izz00bZa0SG_<0uX=z1Rwx`68Wg$ zz3W|oN!hR*JRkr82tWV=5P$##AOHafKmY;|fB*y_009U<00Izz00bZa0SG_<0ub2n z0^0MfvFlxcWLdzzyBj_Z0zd!)5P$##AOHafKmY;|fB*y_009U<00Izz00bZa0SG_< z0uX=z1Rzkcb?c@-$^gft+{8R^KmY;|fB*y_009U<00Izz00bZa0SG_<0uX=z1Rwwb z2tWV=5P$##Ah6*D9;&O!t$z$4<{QUt_%sLr0SG_<0uX=z1Rwwb2tWV=5P$##AOHaf zKmY;|fB*y_009U<00IzzfP7T&-t{iPq- key.req -rc=`curl -s -w "%{http_code}" -o out/$TC.out -X POST -H "Content-Type: application/json" -d @key.req $URL/apiKeys/create` -results $rc $expect $SUITE.$TN "gen apikey " -TN=$((TN + 1)) -TC=$SUITE.$TN -SECRET=$(jq ".secret" $OUT | cut -f 2 -d \") -KEY=$(jq ".key" $OUT | cut -f 2 -d \") -TIME=`date --iso-8601=seconds` -SIG=$(echo -n "$TIME" | openssl sha1 -hmac $SECRET -binary | openssl base64) -xAUTH=$KEY:$SIG -#echo "[debug] $SECRET $KEY $TIME $SIG $xAUTH" -DATA=data.$TC.json -echo "{ \"topicName\": \"$TOPIC\", \"topicDescription\": \"topic for test $TC\", \"partitionCount\": \"1\", \"replicationCount\": \"1\", \"transactionEnabled\": \"true\" }" > $DATA -rc=`curl -s -w "%{http_code}" -o out/$TC.out -X POST -H "Content-Type: application/json" -H "X-CambriaAuth: $xAUTH" -H "X-CambriaDate: $TIME" -d @$DATA $URL/topics/create` -results $rc $expect $SUITE.$TN "create topic" -TN=$((TN + 1)) -TC=$SUITE.$TN -expect=200 -rc=`curl -s -w "%{http_code}" -o out/$TC.out $URL/topics` -results $rc $expect $TC "list " -TopicCnt=`cat out/$TC.out | wc -l` -results $TopicCnt $((StartTopicCount + 1)) $TC "topic count" -TN=$((TN + 1)) -TC=$SUITE.$TN -expect=200 -rc=`curl -s -w "%{http_code}" -o out/$TC.out $URL/topics/$TOPIC` -results $rc $expect $TC "list $TOPIC" -TN=$((TN + 1)) -TC=$SUITE.$TN -DATA=data.$TC.json -echo "{ \"datestamp\": \"`date`\", \"appkey\": \"x100\", \"appval\": \"some value\" }" > $DATA -rc=`curl -s -w "%{http_code}" -o out/$TC.out -X POST -H "Content-Type: application/json" -H "X-CambriaAuth: $xAUTH" -H "X-CambriaDate: $TIME" -d @$DATA $URL/events/$TOPIC` -results $rc $expect $SUITE.$TN "pub APIKEY topic" -TN=$((TN + 1)) -TC=$SUITE.$TN -rc=`curl -s -w "%{http_code}" -o out/$TC.out -X GET -H "Content-Type: application/json" -H "X-CambriaAuth: $xAUTH" -H "X-CambriaDate: $TIME" $URL/events/$TOPIC/g0/u1` -results $rc $expect $SUITE.$TN "sub APIKEY topic" - - -SUITE=$((SUITE + 1)) -echo -echo "SUITE $SUITE: anonymous topic" -TOPIC=$$.$SUITE -TN=0 -TN=$((TN + 1)) -TC=$SUITE.$TN -DATA=data.$TC.txt -echo "datestamp: `date`, key: $TC, value: this is a test " > $DATA -expect=200 -rc=`curl -s -w "%{http_code}" -o out/$TC.out -X POST -H "Content-Type: text/plain" -d @$DATA $URL/events/$TOPIC` -results $rc $expect $SUITE.$TN "pub text/plain" -TN=$((TN + 1)) -TC=$SUITE.$TN -expect=200 -rc=`curl -s -w "%{http_code}" -o out/$TC.out $URL/events/$TOPIC/group1/u$$?timeout=1000` -results $rc $expect $SUITE.$TN "sub text/plain" -TN=$((TN + 1)) -TC=$SUITE.$TN -DATA=data.$TC.json -echo "{ \"datestamp\": \"`date`\", \"key\": \"$TC\", \"value\": \"this is a test\" }" > $DATA -expect=200 -rc=`curl -s -w "%{http_code}" -o out/$TC.out -X POST -H "Content-Type: application/json" -d @$DATA $URL/events/$TOPIC` -results $rc $expect $SUITE.$TN "pub json" -TN=$((TN + 1)) -TC=$SUITE.$TN -expect=200 -rc=`curl -s -w "%{http_code}" -o out/$TC.out $URL/events/$TOPIC/group1/u$$?timeout=1000` -results $rc $expect $SUITE.$TN "sub json" - diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/tests/test.sh b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/tests/test.sh deleted file mode 100755 index 0e06d5a5cd..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/tests/test.sh +++ /dev/null @@ -1,50 +0,0 @@ -#!/bin/bash -# lji: this is basically what Dom has in his regtest. re-do it in bash instead of ksh - -HOSTPORT="127.0.0.1:3904" -ANONTOPIC="anon-topic-$RANDOM" -APITOPIC="api-topic-$RANDOM" -APIKEYFILE="/tmp/key" - -echo "blah" > /tmp/sample.txt - -if [ ! -e /usr/bin/jq ]; then - apt-get update && apt-get -y install jq -fi - - -# list topics -curl http://${HOSTPORT}/topics - -# publish to an anonymous topic (first publish creats the topic) -curl -H "Content-Type:text/plain" -X POST -d @/tmp/sample.txt http://${HOSTPORT}/events/$ANONTOPIC - -# subscribe to an anonymous topic -curl -H "Content-Type:text/plain" -X GET http://${HOSTPORT}/events/$ANONTOPIC/group1/C1?timeout=5000 & -curl -H "Content-Type:text/plain" -X POST -d @/tmp/sample.txt http://${HOSTPORT}/events/$ANONTOPIC - - - - -# create api key -echo '{"email":"no email","description":"API key and secret both in reponse"}' > /tmp/input.txt -curl -s -o ${APIKEYFILE} -H "Content-Type:application/json" -X POST -d @/tmp/input.txt http://${HOSTPORT}/apiKeys/create -UEBAPIKEYSECRET=`cat ${APIKEYFILE} |jq -r ".secret"` -UEBAPIKEYKEY=`cat ${APIKEYFILE} |jq -r ".key"` - -# create an api key secured topic -# pay attendtion to replication count -echo '{"topicName":"'${APITOPIC}'","topicDescription":"This is an API key securedTopic","partitionCount":"1","replicationCount":"1","transactionEnabled":"true"}' > /tmp/topicname.txt -time=`date --iso-8601=seconds` -signature=$(echo -n "$time" | openssl sha1 -hmac $UEBAPIKEYSECRET -binary | openssl base64) -xAuth=$UEBAPIKEYKEY:$signature -xDate="$time" -curl -i -H "Content-Type: application/json" -H "X-CambriaAuth:$xAuth" -H "X-CambriaDate:$xDate" -X POST -d @/tmp/topicname.txt http://${HOSTPORT}/topics/create - -# first subscribe and run it in bg. then publish. -time=`date --iso-8601=seconds` -signature=$(echo -n "$time" | openssl sha1 -hmac $UEBAPIKEYSECRET -binary | openssl base64) -xAuth=$UEBAPIKEYKEY:$signature -xDate="$time" -curl -H "X-CambriaAuth:$xAuth" -H "X-CambriaDate:$xDate" -X GET http://${HOSTPORT}/events/${APITOPIC}/g0/u1 & -curl -H "Content-Type:text/plain" -H "X-CambriaAuth:$xAuth" -H "X-CambriaDate:$xDate" -X POST -d @/tmp/sample.txt http://${HOSTPORT}/events/${APITOPIC} diff --git a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/uebapikey-sdc b/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/uebapikey-sdc deleted file mode 100644 index 0b3aa80060..0000000000 --- a/kubernetes/config/docker/init/src/config/message-router/dcae-startup-vm-message-router/docker_files/uebapikey-sdc +++ /dev/null @@ -1,8 +0,0 @@ -{ - "aux": { - "description": "API key for SDC", - "email": "no email" - }, - "secret": "KpMJB28vNduEJ0zHDWOQXBmQ", - "key": "779NflzwmkuKpqef" -} \ No newline at end of file diff --git a/kubernetes/message-router/message-router-dmaap.yaml b/kubernetes/message-router/message-router-dmaap.yaml index 43c39cde8c..8d85b8f929 100644 --- a/kubernetes/message-router/message-router-dmaap.yaml +++ b/kubernetes/message-router/message-router-dmaap.yaml @@ -42,7 +42,7 @@ spec: spec: containers: - image: attos/dmaap:latest - imagePullPolicy: IfNotPresent + imagePullPolicy: Always name: dmaap ports: - containerPort: 3904 diff --git a/kubernetes/message-router/message-router-kafka.yaml b/kubernetes/message-router/message-router-kafka.yaml index 3a2b4f06a4..91b6e29f45 100644 --- a/kubernetes/message-router/message-router-kafka.yaml +++ b/kubernetes/message-router/message-router-kafka.yaml @@ -40,7 +40,7 @@ spec: spec: containers: - image: wurstmeister/kafka:latest - imagePullPolicy: IfNotPresent + imagePullPolicy: Always name: global-kafka ports: - containerPort: 9092 diff --git a/kubernetes/message-router/message-router-zookeeper.yaml b/kubernetes/message-router/message-router-zookeeper.yaml index aca4806595..c1f9f07fac 100644 --- a/kubernetes/message-router/message-router-zookeeper.yaml +++ b/kubernetes/message-router/message-router-zookeeper.yaml @@ -14,7 +14,7 @@ spec: spec: containers: - image: wurstmeister/zookeeper:latest - imagePullPolicy: IfNotPresent + imagePullPolicy: Always name: zookeeper ports: - containerPort: 2181 -- 2.16.6