import java.util.Objects;
import java.util.Set;
import java.util.StringJoiner;
+import java.util.TreeMap;
import java.util.UUID;
import java.util.concurrent.ExecutionException;
import java.util.concurrent.ForkJoinPool;
import org.argeo.api.uuid.UuidFactory;
import org.argeo.cms.CmsDeployProperty;
import org.argeo.cms.auth.ident.IdentClient;
-import org.argeo.util.FsUtils;
+import org.argeo.cms.util.FsUtils;
+import org.argeo.cms.util.OS;
/**
* Implementation of a {@link CmsState}, initialising the required services.
}
public void start() {
-// Runtime.getRuntime().addShutdownHook(new CmsShutdown());
-
try {
+ // First init check
+ Path privateBase = getDataPath(KernelConstants.DIR_PRIVATE);
+ if (privateBase != null && !Files.exists(privateBase)) {// first init
+ firstInit();
+ Files.createDirectories(privateBase);
+ }
+
initSecurity();
// initArgeoLogger();
if (log.isTraceEnabled())
log.trace("CMS State started");
-// String stateUuidStr = KernelUtils.getFrameworkProp(Constants.FRAMEWORK_UUID);
-// this.uuid = UUID.fromString(stateUuidStr);
this.uuid = uuidFactory.timeUUID();
-// this.cleanState = stateUuid.equals(frameworkUuid);
// hostname
this.hostname = getDeployProperty(CmsDeployProperty.HOST);
log.debug("## CMS starting... (" + uuid + ")\n" + sb + "\n");
}
- Path nodeBase = getDataPath(KernelConstants.DIR_PRIVATE);
- if (nodeBase != null && !Files.exists(nodeBase)) {// first init
- firstInit();
+ if (log.isTraceEnabled()) {
+ // print system properties
+ StringJoiner sb = new StringJoiner("\n");
+ for (Object key : new TreeMap<>(System.getProperties()).keySet()) {
+ sb.add(key + "=" + System.getProperty(key.toString()));
+ }
+ log.trace("System properties:\n" + sb + "\n");
+
}
} catch (RuntimeException | IOException e) {
private void initSecurity() {
// private directory permissions
- Path privateDir = KernelUtils.getOsgiInstancePath(KernelConstants.DIR_PRIVATE);
+ Path privateDir = getDataPath(KernelConstants.DIR_PRIVATE);
if (privateDir != null) {
// TODO rather check whether we can read and write
Set<PosixFilePermission> posixPermissions = new HashSet<>();
posixPermissions.add(PosixFilePermission.OWNER_WRITE);
posixPermissions.add(PosixFilePermission.OWNER_EXECUTE);
try {
- Files.setPosixFilePermissions(privateDir, posixPermissions);
+ if (!Files.exists(privateDir))
+ Files.createDirectories(privateDir);
+ if (!OS.LOCAL.isMSWindows())
+ Files.setPosixFilePermissions(privateDir, posixPermissions);
} catch (IOException e) {
- log.error("Cannot set permissions on " + privateDir);
+ log.error("Cannot set permissions on " + privateDir, e);
}
}
// explicitly load JAAS configuration
Configuration.getConfiguration();
- boolean initSsl = getDeployProperty(CmsDeployProperty.HTTPS_PORT) != null;
- if (initSsl) {
+ boolean initCertificates = (getDeployProperty(CmsDeployProperty.HTTPS_PORT) != null)
+ || (getDeployProperty(CmsDeployProperty.SSHD_PORT) != null);
+ if (initCertificates) {
initCertificates();
}
}
log.error("Cannot trust CA certificate", e);
}
}
-
-// if (!Files.exists(keyStorePath))
-// PkiUtils.createSelfSignedKeyStore(keyStorePath, keyStorePassword, PkiUtils.PKCS12);
}
public void stop() {
return KernelUtils.getOsgiInstancePath(relativePath);
}
+ @Override
+ public Path getStatePath(String relativePath) {
+ return KernelUtils.getOsgiConfigurationPath(relativePath);
+ }
+
@Override
public Long getAvailableSince() {
return availableSince;