// for users and approvers still valid
String user = appr.getUser();
- if(org.isRevoked(trans, appr.getApprover())) {
+ if(org.isRevoked(noAvg, appr.getApprover())) {
deleteCW.comment("Approver ID is revoked");
Approval.row(deleteCW, appr);
- } else if(user!=null && !user.isEmpty() && org.isRevoked(trans, user)) {
+ } else if(user!=null && !user.isEmpty() && org.isRevoked(noAvg, user)) {
deleteCW.comment("USER ID is revoked");
Approval.row(deleteCW, appr);
} else {
if(linst!=null) {
Instance lastBath = null;
for(Instance inst : linst) {
- // if(inst.attn>0) {
- // writeAnalysis(trans, cred, inst);
- // // Special Behavior: only eval the LAST Instance
- // } else
// All Creds go through Life Cycle
if(deleteDate!=null && inst.expires.before(deleteDate)) {
writeAnalysis(noAvg, cred, inst); // will go to Delete
return existing;
}
- private Range writeAnalysis(AuthzTrans trans, UserRole ur) {
+ private Range writeAnalysis(AuthzTrans noAvg, UserRole ur) {
Range r = expireRange.getRange("ur", ur.expires());
if(r!=null) {
Date lnd = ln.lastNotified(LastNotified.newKey(ur));
// Note: lnd is NEVER null
Identity i;
try {
- i = org.getIdentity(trans, ur.user());
+ i = org.getIdentity(noAvg, ur.user());
} catch (OrganizationException e) {
i=null;
}
return r;
}
- private void writeAnalysis(AuthzTrans trans, Cred cred, Instance inst) {
+ private void writeAnalysis(AuthzTrans noAvg, Cred cred, Instance inst) {
if(cred!=null && inst!=null) {
Range r = expireRange.getRange("cred", inst.expires);
if(r!=null) {
// Note: lnd is NEVER null
Identity i;
try {
- i = org.getIdentity(trans, cred.id);
+ i = org.getIdentity(noAvg, cred.id);
} catch (OrganizationException e) {
i=null;
}
}
}
- private void writeAnalysis(AuthzTrans trans, X509 x509, X509Certificate x509Cert) throws IOException {
+ private void writeAnalysis(AuthzTrans noAvg, X509 x509, X509Certificate x509Cert) throws IOException {
Range r = expireRange.getRange("x509", x509Cert.getNotAfter());
if(r!=null) {
Date lnd = ln.lastNotified(LastNotified.newKey(x509,x509Cert));
// Note: lnd is NEVER null
Identity i;
try {
- i = org.getIdentity(trans, x509.id);
+ i = org.getIdentity(noAvg, x509.id);
} catch (OrganizationException e) {
i=null;
}
private final static String MSG = ".set(Access access) must be called before use";
public static final CharSequence ROOT_NS_TAG = "AAF_NS"; // use for certain Replacements in Location
+ private static final int ROOT_NS_TAG_LEN=ROOT_NS_TAG.length();
private static final String ROOT_NS_TAG_DOT = ROOT_NS_TAG +".";
public static String ROOT_NS() {
}
public static String varReplace(final String potential) {
- if (potential.startsWith(ROOT_NS_TAG_DOT)) {
- return ROOT_NS + potential.substring(6);
+ int idx = potential.indexOf(ROOT_NS_TAG_DOT);
+ if(idx<0) {
+ return potential;
+ } else if(idx==0) {
+ return ROOT_NS + potential.substring(ROOT_NS_TAG_LEN);
+ } else if('.'==potential.charAt(idx)) {
+ return potential.replace(ROOT_NS_TAG, ROOT_NS);
} else {
- return potential;
+ return potential;
}
}
if (e.getName()!=null) {
int idx = e.getName().indexOf('.');
if (idx<=0) {
- msg("Endpoint Name must prefixed by Namespace");
+ msg("Endpoint Name (" + e.getName() + ") must prefixed by Namespace");
}
}
nullOrBlank("Endpoint Hostname", e.getHostname());
\r
validator.endpoint(endpoint);\r
\r
- assertEquals("Endpoint Name must prefixed by Namespace\n", validator.errs());\r
+ assertEquals("Endpoint Name (Endpoint1) must prefixed by Namespace\n", validator.errs());\r
}\r
\r
@Test\r
--env aaf_locator_container_ns=${NAMESPACE} \
--env aaf_locator_fqdn=${HOSTNAME} \
--env aaf_locate_url=https://aaf-locate:8095 \
- --env aaf_locator_public_hostname=${HOSTNAME} \
+ --env aaf_locator_public_fqdn=${HOSTNAME} \
--env AAF_ENV=${AAF_ENV} \
--env LATITUDE=${LATITUDE} \
--env LONGITUDE=${LONGITUDE} \
--env LATITUDE=${LATITUDE} \
--env LONGITUDE=${LONGITUDE} \
--env aaf_locator_container_ns=${CONTAINER_NS} \
+ --env aaf_locator_container=docker \
--name aaf-agent-$USER \
"$PREFIX"onap/aaf/aaf_agent:$VERSION \
bash -c "bash /opt/app/aaf_config/bin/agent.sh $PARAMS"
. ./d.props
-AAF_COMPONENTS=ALL
-
# process input. originally, an optional positional parameter is used to designate a component.
# A flagged parameter has been added to optionally indicate docker pull registry. Ideally, options
# would be flagged but we're avoiding ripple effect of changing original usage
#######
# Do all the Containers related to AAF Services
#######
-if [ $AAF_COMPONENTS == "ALL" ]; then
- AAF_COMPONENTS=$(cat components)
-fi
+AAF_COMPONENTS=$(cat components)
cp ../sample/bin/pod_wait.sh ../aaf_${VERSION}/bin
for AAF_COMPONENT in ${AAF_COMPONENTS}; do
--env aaf_locator_container=docker \
--env aaf_locator_container_ns=${NAMESPACE} \
--env aaf_locator_fqdn=${HOSTNAME} \
- --env aaf_locator_public_hostname=${HOSTNAME} \
+ --env aaf_locator_public_fqdn=${HOSTNAME} \
--env LATITUDE=${LATITUDE} \
--env LONGITUDE=${LONGITUDE} \
--env CASSANDRA_CLUSTER=${CASSANDRA_CLUSTER} \
ports:
- name: aaf-hello
protocol: TCP
- port: 8130
- nodePort: 30086
+ port: {{.Values.cadi.port}}
+ nodePort: {{ .Values.cadi.public_port}}
---
apiVersion: apps/v1
kind: Deployment
spec:
volumes:
# Use this Pod Sharing dir to declare various States of starting
- - name: hello-config-vol
+ - name: aaf-hello-vol
emptyDir: {}
initContainers:
- - name: hello-config-container
+ - name: aaf-hello-config
image: {{ .Values.image.repository }}onap/aaf/aaf_agent:{{ .Values.image.version }}
imagePullPolicy: IfNotPresent
volumeMounts:
- mountPath: "/opt/app/osaaf/local"
- name: hello-config-vol
- command: ["bash","-c","cd /opt/app/osaaf/local && /opt/app/aaf_config/bin/agent.sh place aaf@aaf.osaaf.org aaf"]
+ name: aaf-hello-vol
+ command: ["bash","-c","cd /opt/app/osaaf/local && /opt/app/aaf_config/bin/agent.sh place aaf@aaf.osaaf.org aaf-hello "]
env:
- name: "AAF_ENV"
- value: "DEV"
+ value: "{{ .Values.cadi.aaf_env }}"
- name: "AAF_FQDN"
- value: "aaf-locate.onap"
+ value: "aaf-locate.{{ .Release.Namespace }}"
- name: "APP_FQDN"
- value: "aaf"
+ value: "{{ .Values.cadi.fqdn }}"
- name: "APP_FQI"
- value: "aaf@aaf.osaaf.org"
- - name: LATITUDE
+ value: "{{ .Values.cadi.fqi }}"
+ - name: "LATITUDE"
value: "{{ .Values.cadi.cadi_latitude }}"
- - name: LONGITUDE
+ - name: "LONGITUDE"
value: "{{ .Values.cadi.cadi_longitude }}"
- - name: "CONTAINER_NS"
- valueFrom:
- fieldRef:
- fieldPath: metadata.namespace
- name: "DEPLOY_FQI"
value: "deployer@people.osaaf.org"
- name: "DEPLOY_PASSWORD"
value: "demo123456!"
+ - name: "aaf_locator_container"
+ value: "helm"
+ - name: "aaf_locator_port"
+ value: "{{ .Values.cadi.port }}"
+ - name: "aaf_locator_fqdn.helm"
+ value: "{{ .Values.cadi.fqdn }}.{{.Release.Namespace}}"
+ - name: "aaf_locator_public_hostname"
+ value: "{{ .Values.cadi.public_fqdn }}"
+ - name: "aaf_locator_public_port"
+ value: "{{ .Values.cadi.public_port }}"
+ - name: "aaf_locator_container_ns"
+ value: "{{ .Release.Namespace }}"
+ - name: "aaf_locator_name"
+ value: "{{.Values.cadi.app_ns}}.hello"
+ - name: "aaf_locator_name.helm"
+ value: "{{ .Release.Namespace}}.{{.Values.cadi.app_ns}}.hello"
###
### AAF-HELLO
command: ["/bin/bash","-c","cd /opt/app/aaf && exec bin/hello"]
volumeMounts:
- mountPath: "/opt/app/osaaf/local"
- name: hello-config-vol
+ name: aaf-hello-vol
ports:
- name: aaf-hello
protocol: TCP
containerPort: 8130
-
# Declare variables to be passed into your templates.
global:
- persistence:
- enabled: true
common:
namespace: "onap"
replicas:
hello: 1
-ingress:
- enabled: false
-
cadi:
- hostname: "aaf.onap"
+ fqdn: "aaf-hello"
+ port: 8130
+ public_fqdn: "aaf.osaaf.org"
+ public_port: 30086
+ fqi: "aaf@aaf.osaaf.org"
+ app_ns: "org.osaaf.aaf"
cadi_latitude: "38.0"
cadi_longitude: "-72.0"
aaf_env: "DEV"
-persistence:
- # Note: Minikube will persist to /data on your host machine
- mountPath: "/data/aaf"
- hello:
- volumeReclaimPolicy: Retain
- accessMode: ReadWriteOnce
- size: 1Gi
- mountSubPath: "config"
- storageClass: "manual"
+persistence: {}
image:
# When using locally built Docker Container, set Repository to ""
fieldPath: metadata.namespace
- name: aaf_locate_url
value: "https://aaf-locate.onap:8095"
- - name: aaf_locator_public_hostname
+ - name: aaf_locator_public_fqdn
value: "aaf.osaaf.org"
- name: CASSANDRA_CLUSTER
value: "aaf-cass"
fieldPath: metadata.namespace
- name: aaf_locate_url
value: "https://aaf-locate.onap:8095"
- - name: aaf_locator_public_hostname
+ - name: aaf_locator_public_fqdn
value: "aaf.osaaf.org"
fieldPath: metadata.namespace
- name: aaf_locate_url
value: "https://aaf-locate.onap:8095"
- - name: aaf_locator_public_hostname
+ - name: aaf_locator_public_fqdn
value: "aaf.osaaf.org"
- name: CASSANDRA_CLUSTER
value: "aaf-cass"
fieldPath: metadata.namespace
- name: aaf_locate_url
value: "https://aaf-locate.onap:8095"
- - name: aaf_locator_public_hostname
+ - name: aaf_locator_public_fqdn
value: "aaf.osaaf.org"
- name: CASSANDRA_CLUSTER
value: "aaf-cass"
fieldPath: metadata.namespace
- name: aaf_locate_url
value: "https://aaf-locate.onap:8095"
- - name: aaf_locator_public_hostname
+ - name: aaf_locator_public_fqdn
value: "aaf.osaaf.org"
- name: CASSANDRA_CLUSTER
value: "aaf-cass"
fieldPath: metadata.namespace
- name: aaf_locate_url
value: "https://aaf-locate.onap:8095"
- - name: aaf_locator_public_hostname
+ - name: aaf_locator_public_fqdn
value: "aaf.osaaf.org"
- name: CASSANDRA_CLUSTER
value: "aaf-cass"
enabled: false
cadi:
- hostname: "aaf.onap"
+ public_fqdn: "aaf.osaaf.org"
cadi_latitude: "38.0"
cadi_longitude: "-72.0"
aaf_env: "DEV"
LOCAL="$OSAAF/local"
DOT_AAF="$HOME/.aaf"
SSO="$DOT_AAF/sso.props"
-
-JAVA_CADI="$JAVA -cp $CONFIG/bin/aaf-auth-cmd-*-full.jar org.onap.aaf.cadi.CmdLine"
-JAVA_AGENT="$JAVA -cp $CONFIG/bin/aaf-auth-cmd-*-full.jar -Dcadi_prop_files=$SSO org.onap.aaf.cadi.configure.Agent"
-JAVA_AGENT_SELF="$JAVA -cp $CONFIG/bin/aaf-auth-cmd-*-full.jar -Dcadi_prop_files=$LOCAL/${NS}.props org.onap.aaf.cadi.configure.Agent"
-JAVA_AAFCLI="$JAVA -cp $CONFIG/bin/aaf-auth-cmd-*-full.jar -Dcadi_prop_files=$LOCAL/org.osaaf.aaf.props org.onap.aaf.auth.cmd.AAFcli"
+
+if [ -e "$CONFIG" ]; then
+ CONFIG_BIN="$CONFIG/bin"
+else
+ CONFIG_BIN="."
+fi
+
+CLPATH="$CONFIG_BIN/aaf-auth-cmd-*-full.jar"
+
+JAVA_CADI="$JAVA -cp $CLPATH org.onap.aaf.cadi.CmdLine"
+JAVA_AGENT="$JAVA -cp $CLPATH -Dcadi_prop_files=$SSO org.onap.aaf.cadi.configure.Agent"
+JAVA_AGENT_SELF="$JAVA -cp $CLPATH -Dcadi_prop_files=$LOCAL/${NS}.props org.onap.aaf.cadi.configure.Agent"
+JAVA_AAFCLI="$JAVA -cp $CLPATH -Dcadi_prop_files=$LOCAL/org.osaaf.aaf.props org.onap.aaf.auth.cmd.AAFcli"
# Check for local dir
if [ ! -d $LOCAL ]; then
# Setup Bash, first time only
if [ ! -e "$HOME/.bashrc" ] || [ -z "$(grep cadi $HOME/.bashrc)" ]; then
echo "alias cadi='$JAVA_CADI \$*'" >>$HOME/.bashrc
- echo "alias agent='$CONFIG/bin/agent.sh agent \$*'" >>$HOME/.bashrc
+ echo "alias agent='$CONFIG_BIN/agent.sh agent \$*'" >>$HOME/.bashrc
echo "alias aafcli='$JAVA_AAFCLI \$*'" >>$HOME/.bashrc
- chmod a+x $CONFIG/bin/agent.sh
+ chmod a+x $CONFIG_BIN/agent.sh
. $HOME/.bashrc
fi
if [ ! "${DEPLOY_PASSWORD}" = "" ]; then
echo aaf_password=enc:$(sso_encrypt ${DEPLOY_PASSWORD}) >> ${SSO}
fi
- if [ ! -z "${CONTAINER_NS}" ]; then
- echo "aaf_locator_container_ns=${CONTAINER_NS}" >> ${SSO}
+
+ if [ ! -z "${aaf_locator_container}" ]; then
+ echo "aaf_locator_container=${aaf_locator_container}" >> ${SSO}
+ fi
+ if [ -z "${aaf_locator_container_ns}" ]; then
+ if [ !-z "${CONTAINER_NS}" ]; then
+ echo "aaf_locator_container_ns=${CONTAINER_NS}" >> ${SSO}
+ fi
+ else
+ echo "aaf_locator_container_ns=${aaf_locator_container_ns}" >> ${SSO}
fi
if [ ! -z "${AAF_ENV}" ]; then
echo "aaf_env=${AAF_ENV}" >> ${SSO}
fi
echo aaf_locate_url=https://${AAF_FQDN}:8095 >> ${SSO}
- echo aaf_url=https://AAF_LOCATE_URL/AAF_NS.service:${AAF_INTERFACE_VERSION} >> ${SSO}
+ echo aaf_url=https://AAF_LOCATE_URL/%CNS.%AAF_NS.service:${AAF_INTERFACE_VERSION} >> ${SSO}
base64 -d $CONFIG/cert/truststoreONAPall.jks.b64 > $DOT_AAF/truststoreONAPall.jks
echo "cadi_truststore=$DOT_AAF/truststoreONAPall.jks" >> ${SSO}
# Only initialize once, automatically...
if [ ! -e $LOCAL/${NS}.props ]; then
+ if [ -e '/opt/app/aaf_config/bin' ]; then
+ cp /opt/app/aaf_config/bin/*.jar $LOCAL
+ echo "#!/bin/bash" > agent
+ echo 'case "$1" in' >> agent
+ echo ' ""|-?|--help)CMD="";FQI="";FQDN="";;' >> agent
+ echo ' validate)CMD="$1";FQI="";FQDN="${2:-'"$NS.props"'}";;' >> agent
+ echo ' *)CMD="$1";FQI="${2:-'"$APP_FQI"'}";FQDN="${3:-'"$APP_FQDN"'}";;' >> agent
+ echo 'esac' >> agent
+ echo 'java -cp '$(ls aaf-auth-cmd-*-full.jar)' -Dcadi_prop_files='"$NS"'.props org.onap.aaf.cadi.configure.Agent $CMD $FQI $FQDN' >> agent
+
+ echo "#!/bin/bash" > cadi
+ echo "java -cp $(ls aaf-auth-cmd-*-full.jar) -Dcadi_prop_files=$NS.props org.onap.aaf.cadi.CmdLine " '$*' >> cadi
+ # echo "#!/bin/bash" > aafcli
+ # echo "java -cp $(ls aaf-auth-cmd-*-full.jar) -Dcadi_prop_files=$NS.props org.onap.aaf.auth.cmd.AAFcli " '$*' >> aafcli
+
+ echo "#!/bin/bash" > testConnectivity
+ echo "java -cp $(ls aaf-auth-cmd-*-full.jar) org.onap.aaf.cadi.aaf.TestConnectivity $NS.props" >> testConnectivity
+ chmod ug+x agent cadi testConnectivity
+ fi
echo "#### Create Configuration files "
$JAVA_AGENT config $APP_FQI \
aaf_url=https://AAF_LOCATE_URL/AAF_NS.locate:${AAF_INTERFACE_VERSION} \
cadi_etc_dir=$LOCAL
+# Grab all properties passed in that start with "aaf_" or "cadi_"
+ for E in $(env); do
+ if [[ $E == aaf_* ]] || [[ $E == cadi_* ]]; then
+ if [ -z "$(grep $E $LOCAL/$NS.props)" ]; then
+ echo "${E}" >> $LOCAL/$NS.props
+ fi
+ fi
+ done
cat $LOCAL/$NS.props
echo
cadi_etc_dir=$LOCAL
echo "#### Validate Configuration and Certificate with live call"
- $JAVA_AGENT_SELF validate
echo "Obtained Certificates"
INITIALIZED="true"
else
;;
testConnectivity|testconnectivity)
echo "--- Test Connectivity ---"
- $JAVA -cp $CONFIG/bin/aaf-auth-cmd-*-full.jar org.onap.aaf.cadi.aaf.TestConnectivity $LOCAL/org.osaaf.aaf.props
+ $JAVA -cp $CONFIG_BIN/aaf-auth-cmd-*-full.jar org.onap.aaf.cadi.aaf.TestConnectivity $LOCAL/org.osaaf.aaf.props
;;
--help | -?)
case "$1" in
### Possible Dublin
# sample)
# echo "--- run Sample Servlet App ---"
- # $JAVA -Dcadi_prop_files=$LOCAL/${NS}.props -cp $CONFIG/bin/aaf-auth-cmd-*-full.jar:$CONFIG/bin/aaf-cadi-servlet-sample-*-sample.jar org.onap.aaf.sample.cadi.jetty.JettyStandalone ${NS}.props
+ # $JAVA -Dcadi_prop_files=$LOCAL/${NS}.props -cp $CONFIG_BIN/aaf-auth-cmd-*-full.jar:$CONFIG_BIN/aaf-cadi-servlet-sample-*-sample.jar org.onap.aaf.sample.cadi.jetty.JettyStandalone ${NS}.props
# ;;
*)
$JAVA_AGENT "$CMD" "$@"
##
cadi_prop_files=/opt/app/osaaf/local/org.osaaf.aaf.props:/opt/app/osaaf/etc/org.osaaf.aaf.log4j.props:/opt/app/osaaf/local/org.osaaf.aaf.cassandra.props
aaf_locator_entries=oauth,token,introspect
-aaf_locator_fqdn.helm=%CNS.aaf-oauth
-aaf_locator_fqdn.oom=%CNS.aaf-oauth
+aaf_locator_fqdn.helm=aaf-oauth.%CNS
+aaf_locator_fqdn.oom=aaf-oauth.%CNS
port=8140
aaf_locator_public_port.helm=30082
aaf_locator_public_port.oom=31112
aaf_locator_name=%NS.%N\r
aaf_locator_name.docker=%CNS.%NS.%N\r
aaf_locator_name.helm=%CNS.%NS.%N\r
-aaf_locator_name.oom=%CNS.%NS.%N\r
+aaf_locator_name.oom=%CNS%.%NS.%N\r
aaf_locator_fqdn.docker=aaf-%N\r
aaf_locator_fqdn.helm=aaf-%N.%CNS\r
aaf_locator_fqdn.oom=aaf-%N.%CNS\r
}
private static URI uri(PropAccess access, String ms) throws URISyntaxException {
- String aaf_root_ns = access.getProperty(Config.AAF_ROOT_NS,"AAF_NS");
+ String aaf_root_ns = access.getProperty(Config.AAF_ROOT_NS,Config.AAF_ROOT_NS_DEF);
String aaf_api_version = access.getProperty(Config.AAF_API_VERSION,Config.AAF_DEFAULT_API_VERSION);
String aaf_locate_url = access.getProperty(Config.AAF_LOCATE_URL,Defaults.AAF_LOCATE_CONST);
+ String aaf_container = access.getProperty(Config.AAF_LOCATOR_CONTAINER,null);
+ if(aaf_container!=null) {
+ String ns = access.getProperty(Config.AAF_LOCATOR_CONTAINER_NS+'.'+aaf_container,null);
+ if(ns==null) {
+ ns = access.getProperty(Config.AAF_LOCATOR_CONTAINER_NS,null);
+ }
+ if(ns!=null) {
+ aaf_root_ns=ns + '.' + aaf_root_ns;
+ }
+ }
if("cm".equals(ms) && "2.0".equals(aaf_api_version)) {
ms = "certman";
}
if (tokenURL==null || (tokenURL.contains("/locate/") && locateURL!=null)) {
tokenURL=Config.OAUTH2_TOKEN_URL_DEF;
}
+
try {
HRenewingTokenSS hrtss = new HRenewingTokenSS(access, tokenURL);
import org.onap.aaf.cadi.LocatorException;
import org.onap.aaf.cadi.PropAccess;
import org.onap.aaf.cadi.Symm;
-import org.onap.aaf.cadi.aaf.Defaults;
import org.onap.aaf.cadi.aaf.client.ErrMessage;
import org.onap.aaf.cadi.aaf.v2_0.AAFCon;
import org.onap.aaf.cadi.aaf.v2_0.AAFConHttp;
pw.println(System.getProperty("user.name"));
pw.print("# on ");
pw.println(Chrono.dateStamp());
- pw.println("# @copyright 2016, AT&T");
+ pw.println("# @copyright 2019, AT&T");
for (int i=0;i<60;++i) {
pw.print('#');
}
for (Map.Entry<String,String> me : props.entrySet()) {
String key = me.getKey();
- //if ( key.startsWith("cm_")
-// || key.startsWith(Config.HOSTNAME)
-// || key.startsWith("aaf")
-// || key.startsWith("cadi")
-// || key.startsWith("Challenge")
-// ) {
pw.print(key);
pw.print('=');
pw.println(me.getValue());
-// }
}
} finally {
pw.close();
String k8s_public_hostname="k8s.public.com";
int public_port = 30001;
- pa.setProperty(Config.AAF_LOCATOR_PUBLIC_HOSTNAME,k8s_public_hostname);
+ pa.setProperty(Config.AAF_LOCATOR_PUBLIC_FQDN,k8s_public_hostname);
pa.setProperty(Config.AAF_LOCATOR_PUBLIC_PORT+DOT_OOM,Integer.toString(public_port));
pa.setProperty(Config.AAF_LOCATOR_APP_NS, Config.AAF_ROOT_NS_DEF);
rc = new RegistrationCreator(pa);
public static final String AAF_LOCATOR_FQDN = "aaf_locator_fqdn";
public static final String AAF_LOCATOR_NAME = "aaf_locator_name";
public static final String AAF_LOCATOR_PUBLIC_PORT = "aaf_locator_public_port";
- public static final String AAF_LOCATOR_PUBLIC_HOSTNAME = "aaf_locator_public_hostname";
+ public static final String AAF_LOCATOR_PUBLIC_FQDN = "aaf_locator_public_fqdn";
public static final String AAF_APPID = "aaf_id";
public static final String AAF_APPPASS = "aaf_password";
private final Access access;
public String hostname;
private int port;
- public String public_hostname;
+ public String public_fqdn;
private Integer public_port;
public Float latitude;
public Float longitude;
access.printf(Level.INIT, REGI,"hostname",hostname);
}
- public_hostname = access.getProperty(Config.AAF_LOCATOR_PUBLIC_HOSTNAME, hostname);
+ public_fqdn = access.getProperty(Config.AAF_LOCATOR_PUBLIC_FQDN, hostname);
if(firstlog) {
- access.printf(Level.INIT, REGI,"public_hostname",public_hostname);
+ access.printf(Level.INIT, REGI,"public_fqdn",public_fqdn);
}
default_name = access.getProperty(Config.AAF_LOCATOR_NAME, PUBLIC_NAME);
// Note: only one of the ports can be public... Therefore, only the last
for(String le : Split.splitTrim(',', lcontainer)) {
dot_le = le.isEmpty()?le :"."+le;
- str = access.getProperty(Config.AAF_LOCATOR_PUBLIC_HOSTNAME+dot_le,null);
+ str = access.getProperty(Config.AAF_LOCATOR_PUBLIC_FQDN+dot_le,null);
if( str != null && !str.isEmpty()) {
- public_hostname=str;
+ public_fqdn=str;
if(firstlog) {
- access.printf(Level.INIT, "RegistrationProperty: public_hostname(overloaded by %s)='%s'",dot_le,public_hostname);
+ access.printf(Level.INIT, "RegistrationProperty: public_hostname(overloaded by %s)='%s'",dot_le,public_fqdn);
}
}
}
public String getEntryFQDN(final String entry, final String dot_le) {
String str;
- if(public_hostname!=null && dot_le.isEmpty()) {
- str = public_hostname;
+ if(public_fqdn!=null && dot_le.isEmpty()) {
+ str = public_fqdn;
} else {
str = access.getProperty(Config.AAF_LOCATOR_FQDN+dot_le, default_fqdn);
}
public String getEntryName(final String entry, final String dot_le) {
String str;
if(dot_le.isEmpty()) {
- str = PUBLIC_NAME;
+ str = default_name;
} else {
str = access.getProperty(Config.AAF_LOCATOR_NAME+dot_le, default_name);
}
// aaf_root_ns
if(value.indexOf("AAF_NS")>=0) {
- str = access.getProperty(Config.AAF_ROOT_NS, Config.AAF_ROOT_NS_DEF);
- String temp = value.replace("%AAF_NS", str);
+ str = access.getProperty(Config.AAF_ROOT_NS, Config.AAF_ROOT_NS_DEF) + '.';
+ String temp = value.replace("%AAF_NS.", str);
if(temp.equals(value)) { // intended
- value = value.replace("AAF_NS", str); // Backward Compatibility
+ value = value.replace("AAF_NS.", str); // Backward Compatibility
} else {
value = temp;
}
if(default_fqdn!=null) {
value = value.replace("%DF", default_fqdn);
}
- if(public_hostname!=null) {
- value = value.replace("%PH", public_hostname);
+ if(public_fqdn!=null) {
+ value = value.replace("%PH", public_fqdn);
}
}
access.printf(Level.DEBUG,
for(String dot_le : new String[] {"",".helm"}) {
assertEquals(rph.hostname,rph.default_fqdn);
assertEquals("",rph.lcontainer);
- assertEquals(rph.hostname,rph.public_hostname);
+ assertEquals(rph.hostname,rph.public_fqdn);
assertEquals(ju_port,rph.getEntryPort(dot_le));
assertEquals(rph.hostname,rph.getEntryFQDN("",dot_le));
}
for(String dot_le : new String[] {"",".helm"}) {
assertEquals(rph.hostname,rph.default_fqdn);
assertEquals("",rph.lcontainer);
- assertEquals(rph.hostname,rph.public_hostname);
+ assertEquals(rph.hostname,rph.public_fqdn);
assertEquals(ju_port,rph.getEntryPort(dot_le));
assertEquals(rph.hostname,rph.getEntryFQDN("",dot_le));
}
for(String dot_le : new String[] {"",".helm"}) {
assertEquals(rph.hostname,rph.default_fqdn);
assertEquals("",rph.lcontainer);
- assertEquals(rph.hostname,rph.public_hostname);
+ assertEquals(rph.hostname,rph.public_fqdn);
assertEquals(ju_port,rph.getEntryPort(dot_le));
assertEquals(rph.hostname,rph.getEntryFQDN("",dot_le));
}
////////////////
String public_hostname = "com.public.hostname";
int public_port = 999;
- pa.setProperty(Config.AAF_LOCATOR_PUBLIC_HOSTNAME, public_hostname);
+ pa.setProperty(Config.AAF_LOCATOR_PUBLIC_FQDN, public_hostname);
pa.setProperty(Config.AAF_LOCATOR_PUBLIC_PORT,Integer.toString(public_port));
RegistrationPropHolder pubRPH = new RegistrationPropHolder(pa,ju_port);
- assertEquals(public_hostname,pubRPH.public_hostname);
+ assertEquals(public_hostname,pubRPH.public_fqdn);
assertEquals(public_port,pubRPH.getEntryPort(""));