Workaround for cert expiration 67/105567/4
authorDominic Lunanuova <dgl@research.att.com>
Wed, 8 Apr 2020 21:16:30 +0000 (21:16 +0000)
committerSylvain Desbureaux <sylvain.desbureaux@orange.com>
Tue, 19 May 2020 13:46:39 +0000 (13:46 +0000)
Issue-ID: DMAAP-1424
Signed-off-by: Dominic Lunanuova <dgl@research.att.com>
Change-Id: I27f0302f00bfbdce6f8c7d778018ee4dcdea0958

kubernetes/dmaap/components/dmaap-bc/templates/post-install-job.yaml

index 52c5566..df823b5 100644 (file)
@@ -32,8 +32,17 @@ spec:
         env:
         - name: DELAY
           value: "0"
+# hack explanation:
+# since the dmaap-bc SSL certificate is expired in this release, we
+# pass the -k flag to ignore the cert check error.
+# AFAIK, this post-install script is the only client which actually
+# uses https (against dmaap-bc API) in El Alto Release.
+# So, this workaround is the easiest way out for me.
+# Also note that the only reason to even deploy dmaap-bc is if you
+# need authenticated topics in message-router, or a feed in data-router.
+# If that is not your case, then don't even deploy dmaap-bc.
         - name: PROTO
-          value: "https"
+          value: "-k https"
         - name: PORT
           value: "8443"
         - name: REQUESTID