go.etcd.io/etcd@v3.3.27+incompatible/hack/scripts-dev/docker-dns/certs/run.sh (about) 1 #!/bin/sh 2 rm -rf /tmp/m1.data /tmp/m2.data /tmp/m3.data 3 4 /etc/init.d/bind9 start 5 6 # get rid of hosts so go lookup won't resolve 127.0.0.1 to localhost 7 cat /dev/null >/etc/hosts 8 9 goreman -f /certs/Procfile start & 10 11 # TODO: remove random sleeps 12 sleep 7s 13 14 ETCDCTL_API=3 ./etcdctl \ 15 --cacert=/certs/ca.crt \ 16 --cert=/certs/server.crt \ 17 --key=/certs/server.key.insecure \ 18 --endpoints=https://m1.etcd.local:2379 \ 19 endpoint health --cluster 20 21 ETCDCTL_API=3 ./etcdctl \ 22 --cacert=/certs/ca.crt \ 23 --cert=/certs/server.crt \ 24 --key=/certs/server.key.insecure \ 25 --endpoints=https://m1.etcd.local:2379,https://m2.etcd.local:22379,https://m3.etcd.local:32379 \ 26 put abc def 27 28 ETCDCTL_API=3 ./etcdctl \ 29 --cacert=/certs/ca.crt \ 30 --cert=/certs/server.crt \ 31 --key=/certs/server.key.insecure \ 32 --endpoints=https://m1.etcd.local:2379,https://m2.etcd.local:22379,https://m3.etcd.local:32379 \ 33 get abc 34 35 printf "\nWriting v2 key...\n" 36 curl -L https://127.0.0.1:2379/v2/keys/queue \ 37 --cacert /certs/ca.crt \ 38 --cert /certs/server.crt \ 39 --key /certs/server.key.insecure \ 40 -X POST \ 41 -d value=data 42 43 printf "\nWriting v2 key...\n" 44 curl -L https://m1.etcd.local:2379/v2/keys/queue \ 45 --cacert /certs/ca.crt \ 46 --cert /certs/server.crt \ 47 --key /certs/server.key.insecure \ 48 -X POST \ 49 -d value=data 50 51 printf "\nWriting v3 key...\n" 52 curl -L https://127.0.0.1:2379/v3/kv/put \ 53 --cacert /certs/ca.crt \ 54 --cert /certs/server.crt \ 55 --key /certs/server.key.insecure \ 56 -X POST \ 57 -d '{"key": "Zm9v", "value": "YmFy"}' 58 59 printf "\n\nWriting v3 key...\n" 60 curl -L https://m1.etcd.local:2379/v3/kv/put \ 61 --cacert /certs/ca.crt \ 62 --cert /certs/server.crt \ 63 --key /certs/server.key.insecure \ 64 -X POST \ 65 -d '{"key": "Zm9v", "value": "YmFy"}' 66 67 printf "\n\nReading v3 key...\n" 68 curl -L https://m1.etcd.local:2379/v3/kv/range \ 69 --cacert /certs/ca.crt \ 70 --cert /certs/server.crt \ 71 --key /certs/server.key.insecure \ 72 -X POST \ 73 -d '{"key": "Zm9v"}' 74 75 printf "\n\nFetching 'curl https://m1.etcd.local:2379/metrics'...\n" 76 curl \ 77 --cacert /certs/ca.crt \ 78 --cert /certs/server.crt \ 79 --key /certs/server.key.insecure \ 80 -L https://m1.etcd.local:2379/metrics | grep Put | tail -3 81 82 printf "\n\nDone!!!\n\n"