Compatibility with mariadb 10.x and mysql 8.x
[policy/xacml-pdp.git] / packages / policy-xacmlpdp-docker / src / main / docker / policy-pdpx.sh
1 #!/usr/bin/env sh
2 #
3 # ============LICENSE_START=======================================================
4 #  Copyright (C) 2019-2022 AT&T Intellectual Property. All rights reserved.
5 #  Modifications Copyright (C) 2019-2022 Nordix Foundation.
6 # ================================================================================
7 # Licensed under the Apache License, Version 2.0 (the "License");
8 # you may not use this file except in compliance with the License.
9 # You may obtain a copy of the License at
10 #
11 #      http://www.apache.org/licenses/LICENSE-2.0
12 #
13 # Unless required by applicable law or agreed to in writing, software
14 # distributed under the License is distributed on an "AS IS" BASIS,
15 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 # See the License for the specific language governing permissions and
17 # limitations under the License.
18 #
19 # SPDX-License-Identifier: Apache-2.0
20 # ============LICENSE_END=========================================================
21 #
22
23 set -x
24
25 KEYSTORE="${KEYSTORE:-$POLICY_HOME/etc/ssl/policy-keystore}"
26 TRUSTSTORE="${TRUSTSTORE:-$POLICY_HOME/etc/ssl/policy-truststore}"
27 KEYSTORE_PASSWD="${KEYSTORE_PASSWD:-Pol1cy_0nap}"
28 TRUSTSTORE_PASSWD="${TRUSTSTORE_PASSWD:-Pol1cy_0nap}"
29
30 if [ "$#" -ge 1 ]; then
31     CONFIG_FILE=$1
32 else
33     CONFIG_FILE=${CONFIG_FILE}
34 fi
35
36 if [ -z "$CONFIG_FILE" ]; then
37     CONFIG_FILE="${POLICY_HOME}/etc/defaultConfig.json"
38 fi
39
40 if [ -f "${POLICY_HOME}/etc/mounted/policy-truststore" ]; then
41     echo "overriding policy-truststore"
42     cp -f "${POLICY_HOME}"/etc/mounted/policy-truststore "${TRUSTSTORE}"
43 fi
44
45 if [ -f "${POLICY_HOME}/etc/mounted/policy-keystore" ]; then
46     echo "overriding policy-keystore"
47     cp -f "${POLICY_HOME}"/etc/mounted/policy-keystore "${KEYSTORE}"
48 fi
49
50 if [ -f "${POLICY_HOME}/etc/mounted/xacml.properties" ]; then
51     echo "overriding xacml.properties in guards application"
52     cp -f "${POLICY_HOME}"/etc/mounted/xacml.properties "${POLICY_HOME}"/apps/guard/
53 fi
54
55 if [ -f "${POLICY_HOME}/etc/mounted/logback.xml" ]; then
56     echo "overriding logback.xml"
57     cp -f "${POLICY_HOME}"/etc/mounted/logback.xml "${POLICY_HOME}"/etc/
58 fi
59
60 if [ -f "${POLICY_HOME}/etc/mounted/createguardtable.sql" ]; then
61     echo "overriding createguardtable.sql"
62     cp -f "${POLICY_HOME}"/etc/mounted/createguardtable.sql "${POLICY_HOME}"/mysql/sql/
63 fi
64
65 if [ -f "${POLICY_HOME}/etc/mounted/db.sql" ]; then
66     echo "adding additional db.sql"
67     cp -f "${POLICY_HOME}"/etc/mounted/db.sql "${POLICY_HOME}"/mysql/sql/
68 fi
69
70 # Create operationshistory table
71 "${POLICY_HOME}"/mysql/bin/create-guard-table.sh
72
73 echo "Policy Xacml PDP config file: $CONFIG_FILE"
74
75 $JAVA_HOME/bin/java -cp "${POLICY_HOME}/etc:${POLICY_HOME}/lib/*" -Dlogback.configurationFile="${POLICY_HOME}/etc/logback.xml" -Djavax.net.ssl.keyStore="${KEYSTORE}" -Djavax.net.ssl.keyStorePassword="${KEYSTORE_PASSWD}" -Djavax.net.ssl.trustStore="${TRUSTSTORE}" -Djavax.net.ssl.trustStorePassword="${TRUSTSTORE_PASSWD}" org.onap.policy.pdpx.main.startstop.Main -c "${CONFIG_FILE}"