From 523e660780e8fb0c2bdfc8420ebe8041448c1a4b Mon Sep 17 00:00:00 2001 From: Sylvain Desbureaux Date: Tue, 8 Dec 2020 10:59:12 +0100 Subject: [PATCH] [SO] Add more debug when password is not well set Sometimes, password generated by AAF is not well escaped by sh. As we don't know which characters are giving bad results, we'll temporarily show SO faulty generated passwords and check generated file exists. Issue-ID: OOM-2617 Signed-off-by: Sylvain Desbureaux Change-Id: I0b45432447a672a90cbcf96a03efd18b9ea1d6cf --- kubernetes/so/components/soHelpers/templates/_certificates.tpl | 2 ++ 1 file changed, 2 insertions(+) diff --git a/kubernetes/so/components/soHelpers/templates/_certificates.tpl b/kubernetes/so/components/soHelpers/templates/_certificates.tpl index cc22dc97c3..c5232e8f48 100644 --- a/kubernetes/so/components/soHelpers/templates/_certificates.tpl +++ b/kubernetes/so/components/soHelpers/templates/_certificates.tpl @@ -21,6 +21,8 @@ if [ "${EXIT_VALUE}" != "0" ] then echo "issue with password: $cadi_truststore_password" + ls -lh {{ $subchartDot.Values.certInitializer.credsPath }}/mycreds.prop + cat {{ $subchartDot.Values.certInitializer.credsPath }}/mycreds.prop exit $EXIT_VALUE else keytool -importkeystore -srckeystore "{{ $subchartDot.Values.certInitializer.credsPath }}/truststoreONAPall.jks" \ -- 2.16.6