summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSuren A. Chilingaryan <csa@suren.me>2021-12-22 00:14:47 +0100
committerSuren A. Chilingaryan <csa@suren.me>2021-12-22 00:14:47 +0100
commita359e094b56faec63a22eb7376ce2b5222885453 (patch)
tree971c389355666af8a2534638e00b84ff765323e7
parentef5216a66f5887ba0e4d7db40f275d7e74dc42ab (diff)
downloadands-a359e094b56faec63a22eb7376ce2b5222885453.tar.gz
ands-a359e094b56faec63a22eb7376ce2b5222885453.tar.bz2
ands-a359e094b56faec63a22eb7376ce2b5222885453.tar.xz
ands-a359e094b56faec63a22eb7376ce2b5222885453.zip
Archive rocketchat configuration
-rw-r--r--docs/samples/external_services/info.txt12
-rw-r--r--docs/samples/external_services/rocketchat-external-ep.yml15
-rw-r--r--docs/samples/external_services/rocketchat-external-service-externalname.yml8
-rw-r--r--docs/samples/external_services/rocketchat-external-service.yml17
-rw-r--r--docs/services/rocketchat.txt9
5 files changed, 61 insertions, 0 deletions
diff --git a/docs/samples/external_services/info.txt b/docs/samples/external_services/info.txt
new file mode 100644
index 0000000..3ee716d
--- /dev/null
+++ b/docs/samples/external_services/info.txt
@@ -0,0 +1,12 @@
+Integrating External Services
+=============================
+ - Sample EP and services are included here.
+ * There is 2 ways to generate server using 'ip/port' or using DNS name. The second is easier to maintain
+ if the resource only used internally. However, it is not supported by OpenShift HARouter and can't be used
+ to expose external services trough OpenShift domain (*.kaas.kit.edu).
+
+ - Exposing external service trough OpenShift domain (*.kaas.kit.edu)
+ * It is better to use reencrypt termination if remote service running HTTPS. Passthrough will work, but result in the mistmatch between certificate
+ and address. The dest-ca-cert is mandatory parameter for reencrypt.
+ oc -n services create route reencrypt rocketchat --hostname rocketchat.kaas.kit.edu --service rocketchat-external --dest-ca-cert telesec.crt --port 443
+ \ No newline at end of file
diff --git a/docs/samples/external_services/rocketchat-external-ep.yml b/docs/samples/external_services/rocketchat-external-ep.yml
new file mode 100644
index 0000000..7080e9d
--- /dev/null
+++ b/docs/samples/external_services/rocketchat-external-ep.yml
@@ -0,0 +1,15 @@
+apiVersion: v1
+kind: Endpoints
+metadata:
+ name: rocketchat-external
+subsets:
+ - addresses:
+ - ip: 141.52.13.74
+ ports:
+ - port: 80
+ name: "http"
+ - port: 443
+ name: "https"
+
+
+ \ No newline at end of file
diff --git a/docs/samples/external_services/rocketchat-external-service-externalname.yml b/docs/samples/external_services/rocketchat-external-service-externalname.yml
new file mode 100644
index 0000000..bbcf7ff
--- /dev/null
+++ b/docs/samples/external_services/rocketchat-external-service-externalname.yml
@@ -0,0 +1,8 @@
+kind: "Service"
+apiVersion: "v1"
+metadata:
+ name: "rocketchat-external"
+spec:
+ type: ExternalName
+ externalName: iap-katrin-chat.iap.kit.edu
+selector: {}
diff --git a/docs/samples/external_services/rocketchat-external-service.yml b/docs/samples/external_services/rocketchat-external-service.yml
new file mode 100644
index 0000000..a26fe1a
--- /dev/null
+++ b/docs/samples/external_services/rocketchat-external-service.yml
@@ -0,0 +1,17 @@
+apiVersion: v1
+kind: Service
+metadata:
+ name: rocketchat-external
+spec:
+ selector: {}
+ ports:
+ - protocol: TCP
+ port: 80
+ targetPort: 80
+ name: "http"
+ - protocol: TCP
+ port: 443
+ targetPort: 443
+ name: "https"
+
+ \ No newline at end of file
diff --git a/docs/services/rocketchat.txt b/docs/services/rocketchat.txt
new file mode 100644
index 0000000..99ec03a
--- /dev/null
+++ b/docs/services/rocketchat.txt
@@ -0,0 +1,9 @@
+- Recovering rocketchat from failed update
+ mongo -u userRBS -p <...> --authenticationDatabase "rocketchatdb"
+ use rocketchatdb
+ show collections
+ db.migrations.find({})
+ # This is version corresponding to 0.71.1 (a68a2527b6c1) running on KaaS.
+ db.migrations.update({ _id: 'control' }, { $set: { locked: false, version: 135 } });
+ db.migrations.renameCollection("migrations_disable")
+