blob: 99ed2793f3c51f126560e3a4b1ccae1a4ddd3b15 [file] [log] [blame]
#!/bin/bash
# This script is run when starting aaf_config Container.
# It needs to cover the cases where the initial data doesn't exist, and when it has already been configured (don't overwrite)
#
JAVA=/usr/bin/java
AAF_INTERFACE_VERSION=2.1
# Extract Name, Domain and NS from FQI
FQIA=($(echo ${APP_FQI} | tr '@' '\n'))
FQI_SHORT=${FQIA[0]}
FQI_DOMAIN=${FQIA[1]}
# Reverse DOMAIN for NS
FQIA_E=($(echo ${FQI_DOMAIN} | tr '.' '\n'))
for (( i=( ${#FQIA_E[@]} -1 ); i>0; i-- )); do
NS=${NS}${FQIA_E[i]}'.'
done
NS=${NS}${FQIA_E[0]}
CONFIG="/opt/app/aaf_config"
OSAAF="/opt/app/osaaf"
LOCAL="$OSAAF/local"
DOT_AAF="$HOME/.aaf"
SSO="$DOT_AAF/sso.props"
# Check for local dir
if [ ! -d $LOCAL ]; then
mkdir -p $LOCAL
for D in bin logs; do
rsync -avzh --exclude=.gitignore $CONFIG/$D/* /opt/app/osaaf/$D
done
fi
# Setup Bash, first time only
if [ ! -e "$HOME/.bash_aliases" ] || [ -z "$(grep aaf_config $HOME/.bash_aliases)" ]; then
echo "alias cadi='$OSAAF/bin/agent.sh EMPTY cadi \$*'" >>$HOME/.bash_aliases
echo "alias agent='$OSAAF/bin/agent.sh EMPTY \$*'" >>$HOME/.bash_aliases
chmod a+x $OSAAF/bin/agent.sh
. $HOME/.bash_aliases
fi
# Setup SSO info for Deploy ID
function sso_encrypt() {
$JAVA -cp $CONFIG/bin/aaf-cadi-aaf-*-full.jar org.onap.aaf.cadi.CmdLine digest ${1} $DOT_AAF/keyfile
}
# Create Deployer Info, located at /root/.aaf
if [ ! -e "$DOT_AAF/keyfile" ]; then
mkdir -p $DOT_AAF
$JAVA -cp $CONFIG/bin/aaf-cadi-aaf-*-full.jar org.onap.aaf.cadi.CmdLine keygen $DOT_AAF/keyfile
chmod 400 $DOT_AAF/keyfile
echo cadi_latitude=${LATITUDE} > ${SSO}
echo cadi_longitude=${LONGITUDE} >> ${SSO}
echo aaf_id=${DEPLOY_FQI} >> ${SSO}
if [ ! "${DEPLOY_PASSWORD}" = "" ]; then
echo aaf_password=enc:$(sso_encrypt ${DEPLOY_PASSWORD}) >> ${SSO}
fi
echo aaf_locate_url=https://${AAF_FQDN}:8095 >> ${SSO}
echo aaf_url=https://AAF_LOCATE_URL/AAF_NS.service:${AAF_INTERFACE_VERSION} >> ${SSO}
base64 -d $CONFIG/cert/truststoreONAPall.jks.b64 > $DOT_AAF/truststoreONAPall.jks
echo "cadi_truststore=$DOT_AAF/truststoreONAPall.jks" >> ${SSO}
echo cadi_truststore_password=enc:$(sso_encrypt changeit) >> ${SSO}
fi
# Only initialize once, automatically...
if [ ! -e $LOCAL/${NS}.props ]; then
# setup Configs
$JAVA -jar $CONFIG/bin/aaf-cadi-aaf-*-full.jar config $APP_FQI \
aaf_url=https://AAF_LOCATE_URL/AAF_NS.locate:${AAF_INTERFACE_VERSION} \
cadi_etc_dir=$LOCAL
cat $LOCAL/$NS.props
# Read Certificate info (by deployer)
$JAVA -jar $CONFIG/bin/aaf-cadi-aaf-*-full.jar read ${APP_FQI} ${APP_FQDN} \
cadi_prop_files=${SSO} \
cadi_etc_dir=$LOCAL
# Place Certificates (by deployer)
$JAVA -jar $CONFIG/bin/aaf-cadi-aaf-*-full.jar place ${APP_FQI} ${APP_FQDN} \
cadi_prop_files=${SSO} \
cadi_etc_dir=$LOCAL
# Validate
$JAVA -jar $CONFIG/bin/aaf-cadi-aaf-*-full.jar validate \
cadi_prop_files=$LOCAL/${NS}.props
fi
# Now run a command
CMD=$2
if [ ! "$CMD" = "" ]; then
shift
shift
case "$CMD" in
ls)
echo ls requested
find /opt/app/osaaf -depth
;;
cat)
if [ "$1" = "" ]; then
echo "usage: cat <file... ONLY files ending in .props>"
else
if [[ $1 == *.props ]]; then
echo
echo "## CONTENTS OF $3"
echo
cat "$1"
else
echo "### ERROR ####"
echo " \"cat\" may only be used with files ending with \".props\""
fi
fi
;;
update)
for D in bin logs; do
rsync -uh --exclude=.gitignore $CONFIG/$D/* /opt/app/osaaf/$D
done
;;
showpass)
echo "## Show Passwords"
$JAVA -jar $CONFIG/bin/aaf-cadi-aaf-*-full.jar showpass ${APP_FQI} ${APP_FQDN}
;;
check)
$JAVA -Dcadi_prop_files=$LOCAL/${NS}.props -jar $CONFIG/bin/aaf-cadi-aaf-*-full.jar check ${APP_FQI} ${APP_FQDN}
;;
validate)
echo "## validate requested"
$JAVA -jar $CONFIG/bin/aaf-cadi-aaf-*-full.jar validate $LOCAL/${NS}.props
;;
bash)
#if [ ! -e $HOME/bash_aliases ]; then
# echo "alias cadi='$JAVA -cp $CONFIG/bin/aaf-cadi-aaf-*-full.jar org.onap.aaf.cadi.CmdLine \$*'" >$HOME/bash_aliases
# echo "alias agent='/bin/bash $CONFIG/bin/agent.sh no-op \$*'" >>$HOME/bash_aliases
#fi
shift
cd $LOCAL || exit
/bin/bash "$@"
;;
setProp)
cd $LOCAL || exit
FILES=$(grep -l "$1" ./*.props)
if [ "$FILES" = "" ]; then
FILES="$3"
ADD=Y
fi
for F in $FILES; do
echo "Changing $1 in $F"
if [ "$ADD" = "Y" ]; then
echo $2 >> $F
else
sed -i.backup -e "s/\\(${1}.*=\\).*/\\1${2}/" $F
fi
cat $F
done
;;
encrypt)
cd $LOCAL || exit
echo $1
FILES=$(grep -l "$1" ./*.props)
if [ "$FILES" = "" ]; then
FILES=$LOCAL/${NS}.cred.props
ADD=Y
fi
for F in $FILES; do
echo "Changing $1 in $F"
if [ "$2" = "" ]; then
read -r -p "Password (leave blank to cancel): " -s ORIG_PW
echo " "
if [ "$ORIG_PW" = "" ]; then
echo canceling...
break
fi
else
ORIG_PW="$2"
fi
PWD=$("$JAVA" -jar $CONFIG/bin/aaf-cadi-aaf-*-full.jar cadi digest "$ORIG_PW" $LOCAL/${NS}.keyfile)
if [ "$ADD" = "Y" ]; then
echo "$1=enc:$PWD" >> $F
else
sed -i.backup -e "s/\\($1.*enc:\\).*/\\1$PWD/" $F
fi
cat $F
done
;;
taillog)
sh /opt/app/osaaf/logs/taillog
;;
--help | -?)
case "$1" in
"")
echo "--- Agent Container Comands ---"
echo " ls - Lists all files in Configuration"
echo " cat <file.props>> - Shows the contents (Prop files only)"
echo " validate - Runs a test using Configuration"
echo " setProp <tag> [<value>] - set value on 'tag' (if no value, it will be queried from config)"
echo " encrypt <tag> [<pass>] - set passwords on Configuration (if no pass, it will be queried)"
echo " bash - run bash in Container"
echo " Note: the following aliases are preset"
echo " cadi - CADI CmdLine tool"
echo " agent - Agent Java tool (see above help)"
echo ""
echo " --help|-? [cadi|agent] - This help, cadi help or agent help"
;;
cadi)
echo "--- cadi Tool Comands ---"
$JAVA -Dcadi_prop_files=$LOCAL/${NS}.props -jar $CONFIG/bin/aaf-cadi-aaf-*-full.jar cadi | tail -n +6
;;
agent)
echo "--- agent Tool Comands ---"
$JAVA -Dcadi_prop_files=$LOCAL/${NS}.props -jar $CONFIG/bin/aaf-cadi-aaf-*-full.jar
;;
esac
echo ""
;;
*)
$JAVA -Dcadi_prop_files=$LOCAL/${NS}.props -jar $CONFIG/bin/aaf-cadi-aaf-*-full.jar "$CMD" "$@"
;;
esac
fi