waynedunican | 86c91fd | 2022-05-05 09:25:49 +0100 | [diff] [blame] | 1 | #!/usr/bin/env sh |
| 2 | # |
| 3 | # ============LICENSE_START======================================================= |
| 4 | # Copyright (C) 2022 Nordix Foundation. |
jhh | 545f221 | 2022-09-01 09:17:54 -0500 | [diff] [blame] | 5 | # Modifications Copyright (C) 2022 AT&T Intellectual Property. |
waynedunican | 86c91fd | 2022-05-05 09:25:49 +0100 | [diff] [blame] | 6 | # ================================================================================ |
| 7 | # Licensed under the Apache License, Version 2.0 (the "License"); |
| 8 | # you may not use this file except in compliance with the License. |
| 9 | # You may obtain a copy of the License at |
| 10 | # |
| 11 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 12 | # |
| 13 | # Unless required by applicable law or agreed to in writing, software |
| 14 | # distributed under the License is distributed on an "AS IS" BASIS, |
| 15 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 16 | # See the License for the specific language governing permissions and |
| 17 | # limitations under the License. |
| 18 | # |
| 19 | # SPDX-License-Identifier: Apache-2.0 |
| 20 | # ============LICENSE_END========================================================= |
| 21 | # |
| 22 | |
jhh | 545f221 | 2022-09-01 09:17:54 -0500 | [diff] [blame] | 23 | set -x |
| 24 | |
waynedunican | 86c91fd | 2022-05-05 09:25:49 +0100 | [diff] [blame] | 25 | KEYSTORE="${KEYSTORE:-$POLICY_HOME/etc/ssl/policy-keystore}" |
| 26 | TRUSTSTORE="${TRUSTSTORE:-$POLICY_HOME/etc/ssl/policy-truststore}" |
| 27 | KEYSTORE_PASSWD="${KEYSTORE_PASSWD:-Pol1cy_0nap}" |
| 28 | TRUSTSTORE_PASSWD="${TRUSTSTORE_PASSWD:-Pol1cy_0nap}" |
| 29 | |
| 30 | if [ "$#" -ge 1 ]; then |
| 31 | CONFIG_FILE=$1 |
| 32 | else |
| 33 | CONFIG_FILE=${CONFIG_FILE} |
| 34 | fi |
| 35 | |
| 36 | if [ -z "$CONFIG_FILE" ]; then |
| 37 | CONFIG_FILE="${POLICY_HOME}/etc/defaultConfig.json" |
| 38 | fi |
| 39 | |
| 40 | if [ -f "${POLICY_HOME}/etc/mounted/policy-truststore" ]; then |
| 41 | echo "overriding policy-truststore" |
| 42 | cp -f "${POLICY_HOME}"/etc/mounted/policy-truststore "${TRUSTSTORE}" |
| 43 | fi |
| 44 | |
| 45 | if [ -f "${POLICY_HOME}/etc/mounted/policy-keystore" ]; then |
| 46 | echo "overriding policy-keystore" |
| 47 | cp -f "${POLICY_HOME}"/etc/mounted/policy-keystore "${KEYSTORE}" |
| 48 | fi |
| 49 | |
| 50 | if [ -f "${POLICY_HOME}/etc/mounted/xacml.properties" ]; then |
| 51 | echo "overriding xacml.properties in guards application" |
| 52 | cp -f "${POLICY_HOME}"/etc/mounted/xacml-pg.properties "${POLICY_HOME}"/apps/guard/ |
| 53 | fi |
| 54 | |
| 55 | if [ -f "${POLICY_HOME}/etc/mounted/logback.xml" ]; then |
| 56 | echo "overriding logback.xml" |
| 57 | cp -f "${POLICY_HOME}"/etc/mounted/logback.xml "${POLICY_HOME}"/etc/ |
| 58 | fi |
| 59 | |
jhh | 545f221 | 2022-09-01 09:17:54 -0500 | [diff] [blame] | 60 | if [ -f "${POLICY_HOME}/etc/mounted/createguardtable-pg.sql" ]; then |
| 61 | echo "overriding createguardtable.sql" |
| 62 | cp -f "${POLICY_HOME}"/etc/mounted/createguardtable-pg.sql "${POLICY_HOME}"/postgress/sql/ |
| 63 | fi |
| 64 | |
| 65 | if [ -f "${POLICY_HOME}/etc/mounted/db-pg.sql" ]; then |
| 66 | echo "adding additional db-pg.sql" |
| 67 | cp -f "${POLICY_HOME}"/etc/mounted/db-pg.sql "${POLICY_HOME}"/postgress/sql/ |
| 68 | fi |
| 69 | |
jhh | f7d7430 | 2022-09-06 12:16:31 -0500 | [diff] [blame^] | 70 | if [ -f "${POLICY_HOME}/etc/mounted/guard.xacml.properties" ]; then |
| 71 | echo "overriding guard application xacml.properties" |
| 72 | cp -f "${POLICY_HOME}"/etc/mounted/guard.xacml.properties "${POLICY_HOME}"/apps/guard/xacml.properties |
| 73 | fi |
| 74 | |
waynedunican | 86c91fd | 2022-05-05 09:25:49 +0100 | [diff] [blame] | 75 | # Create operationshistory table |
| 76 | "${POLICY_HOME}"/postgres/bin/create-guard-table-pg.sh |
| 77 | |
| 78 | echo "Policy Xacml PDP config file: $CONFIG_FILE" |
| 79 | |
| 80 | $JAVA_HOME/bin/java -cp "${POLICY_HOME}/etc:${POLICY_HOME}/lib/*" -Dlogback.configurationFile="${POLICY_HOME}/etc/logback.xml" -Djavax.net.ssl.keyStore="${KEYSTORE}" -Djavax.net.ssl.keyStorePassword="${KEYSTORE_PASSWD}" -Djavax.net.ssl.trustStore="${TRUSTSTORE}" -Djavax.net.ssl.trustStorePassword="${TRUSTSTORE_PASSWD}" org.onap.policy.pdpx.main.startstop.Main -c "${CONFIG_FILE}" |