mirror of
https://github.com/i2p/i2p.i2p.git
synced 2026-04-25 20:32:14 +00:00
implementing out-of-console updaters like i2psnark.
- Add new update interfaces in net.i2p.update
- All update implementations moved to routerconsole update/
- Implement an UpdateManager that registers with the RouterContext
- UpdateManager handles multiple types of things to update
(router, plugins, news, ...) and methods of updating (HTTP, ...)
- UpdateManager maintains list of installed, downloaded, and available versions of everything
- Define Updaters that can check for a new version and/or download an item
- Individual Updaters register with the UpdateManager obtained from
I2PAppContext, identifying the type of update item and
update method they can handle.
- Updaters need only core libs, no router.jar or routerconsole access required.
- All checks and updates are initiated via the UpdateManager.
- All status on checks and updates in-progress or completed are
obtained from the UpdateManager. No more use of System properties
to broadcast update state.
- All update and checker tasks are intantiated on demand and threaded;
no more static references left over.
- Split out the Runners and Checkers from the Handlers and make the inheritance more sane.
- No more permanent NewsFetcher thread; run on the SimpleScheduler queue
and thread a checker task only to fetch the news.
- No more static NewsFetcher instance in routerconsole.
All helper methods that are still required are moved to NewsHelper.
The UpdateManager implements the policy for when to check and download.
All requests go through the UpdateManager.
For each update type, there's several parts:
- The xxxUpdateHandler implements the Updater
- The xxxUpdateChecker implements the UpdateTask for checking
- The xxxUpdateRunner implements the UpdateTask for downloading
New and moved classes:
web/ update/
---- -------
new ConsoleUpdateManager.java
new PluginUpdateChecker.java from PluginUpdateChecker
PluginUpdateChecker -> PluginUpdateHandler.java
PluginUpdateHandler.java -> PluginUpdateRunner
new UnsignedUpdateHandler.java
UnsignedUpdateHandler -> UnsignedUpdateRunner.java
new UnsignedUpdateChecker from NewsFetcher
UpdateHandler.java remains
new UpdateHandler.java
new UpdateRunner.java from UpdateHandler
move NewsHandler from NewsFetcher
new NewsFetcher
new NewsTimerTask
new DummyHandler
Initial checkin. Unfinished, untested, unpolished.
789 lines
35 KiB
Java
789 lines
35 KiB
Java
package net.i2p.router.web;
|
|
|
|
import java.util.ArrayList;
|
|
import java.awt.GraphicsEnvironment;
|
|
import java.io.File;
|
|
import java.io.FilenameFilter;
|
|
import java.io.IOException;
|
|
import java.net.InetAddress;
|
|
import java.net.Inet4Address;
|
|
import java.net.InetSocketAddress;
|
|
import java.net.ServerSocket;
|
|
import java.security.KeyStore;
|
|
import java.util.HashMap;
|
|
import java.util.List;
|
|
import java.util.Map;
|
|
import java.util.Properties;
|
|
import java.util.Set;
|
|
import java.util.StringTokenizer;
|
|
import java.util.concurrent.Executors;
|
|
import java.util.concurrent.SynchronousQueue;
|
|
import java.util.concurrent.TimeUnit;
|
|
import java.util.concurrent.ThreadFactory;
|
|
import java.util.concurrent.ThreadPoolExecutor;
|
|
|
|
import net.i2p.I2PAppContext;
|
|
import net.i2p.apps.systray.SysTray;
|
|
import net.i2p.data.Base32;
|
|
import net.i2p.data.DataHelper;
|
|
import net.i2p.router.RouterContext;
|
|
import net.i2p.router.update.ConsoleUpdateManager;
|
|
import net.i2p.util.Addresses;
|
|
import net.i2p.util.FileUtil;
|
|
import net.i2p.util.I2PAppThread;
|
|
import net.i2p.util.PortMapper;
|
|
import net.i2p.util.SecureDirectory;
|
|
import net.i2p.util.SecureFileOutputStream;
|
|
import net.i2p.util.ShellCommand;
|
|
import net.i2p.util.VersionComparator;
|
|
|
|
import org.mortbay.jetty.Connector;
|
|
import org.mortbay.jetty.NCSARequestLog;
|
|
import org.mortbay.jetty.Server;
|
|
import org.mortbay.jetty.handler.ContextHandlerCollection;
|
|
import org.mortbay.jetty.handler.DefaultHandler;
|
|
import org.mortbay.jetty.handler.HandlerCollection;
|
|
import org.mortbay.jetty.handler.RequestLogHandler;
|
|
import org.mortbay.jetty.nio.SelectChannelConnector;
|
|
import org.mortbay.jetty.security.DigestAuthenticator;
|
|
import org.mortbay.jetty.security.HashUserRealm;
|
|
import org.mortbay.jetty.security.Constraint;
|
|
import org.mortbay.jetty.security.ConstraintMapping;
|
|
import org.mortbay.jetty.security.SecurityHandler;
|
|
import org.mortbay.jetty.security.SslSelectChannelConnector;
|
|
import org.mortbay.jetty.servlet.ServletHandler;
|
|
import org.mortbay.jetty.servlet.ServletHolder;
|
|
import org.mortbay.jetty.servlet.SessionHandler;
|
|
import org.mortbay.jetty.webapp.WebAppContext;
|
|
import org.mortbay.thread.QueuedThreadPool;
|
|
import org.mortbay.thread.concurrent.ThreadPool;
|
|
|
|
/**
|
|
* Start the router console.
|
|
*/
|
|
public class RouterConsoleRunner {
|
|
private static Server _server;
|
|
private String _listenPort;
|
|
private String _listenHost;
|
|
private String _sslListenPort;
|
|
private String _sslListenHost;
|
|
private String _webAppsDir;
|
|
|
|
private static final String DEFAULT_WEBAPP_CONFIG_FILENAME = "webapps.config";
|
|
private static final DigestAuthenticator authenticator = new DigestAuthenticator();
|
|
public static final String ROUTERCONSOLE = "routerconsole";
|
|
public static final String PREFIX = "webapps.";
|
|
public static final String ENABLED = ".startOnLoad";
|
|
private static final String PROP_KEYSTORE_PASSWORD = "routerconsole.keystorePassword";
|
|
private static final String DEFAULT_KEYSTORE_PASSWORD = "changeit";
|
|
private static final String PROP_KEY_PASSWORD = "routerconsole.keyPassword";
|
|
private static final String DEFAULT_LISTEN_PORT = "7657";
|
|
private static final String DEFAULT_LISTEN_HOST = "127.0.0.1";
|
|
private static final String DEFAULT_WEBAPPS_DIR = "./webapps/";
|
|
private static final String USAGE = "Bad RouterConsoleRunner arguments, check clientApp.0.args in your clients.config file! " +
|
|
"Usage: [[port host[,host]] [-s sslPort [host[,host]]] [webAppsDir]]";
|
|
|
|
private static final int MIN_THREADS = 1;
|
|
private static final int MAX_THREADS = 24;
|
|
private static final int MAX_IDLE_TIME = 90*1000;
|
|
private static final String THREAD_NAME = "RouterConsole Jetty";
|
|
|
|
static {
|
|
System.setProperty("org.mortbay.http.Version.paranoid", "true");
|
|
}
|
|
|
|
/**
|
|
* <pre>
|
|
* non-SSL:
|
|
* RouterConsoleRunner
|
|
* RouterConsoleRunner 7657
|
|
* RouterConsoleRunner 7657 127.0.0.1
|
|
* RouterConsoleRunner 7657 127.0.0.1,::1
|
|
* RouterConsoleRunner 7657 127.0.0.1,::1 ./webapps/
|
|
*
|
|
* SSL:
|
|
* RouterConsoleRunner -s 7657
|
|
* RouterConsoleRunner -s 7657 127.0.0.1
|
|
* RouterConsoleRunner -s 7657 127.0.0.1,::1
|
|
* RouterConsoleRunner -s 7657 127.0.0.1,::1 ./webapps/
|
|
*
|
|
* If using both, non-SSL must be first:
|
|
* RouterConsoleRunner 7657 127.0.0.1 -s 7667
|
|
* RouterConsoleRunner 7657 127.0.0.1 -s 7667 127.0.0.1
|
|
* RouterConsoleRunner 7657 127.0.0.1,::1 -s 7667 127.0.0.1,::1
|
|
* RouterConsoleRunner 7657 127.0.0.1,::1 -s 7667 127.0.0.1,::1 ./webapps/
|
|
* </pre>
|
|
*
|
|
* @param args second arg may be a comma-separated list of bind addresses,
|
|
* for example ::1,127.0.0.1
|
|
* On XP, the other order (127.0.0.1,::1) fails the IPV6 bind,
|
|
* because 127.0.0.1 will bind ::1 also. But even though it's bound
|
|
* to both, we can't connect to [::1]:7657 for some reason.
|
|
* So the wise choice is ::1,127.0.0.1
|
|
*/
|
|
public RouterConsoleRunner(String args[]) {
|
|
if (args.length == 0) {
|
|
// _listenHost and _webAppsDir are defaulted below
|
|
_listenPort = DEFAULT_LISTEN_PORT;
|
|
} else {
|
|
boolean ssl = false;
|
|
for (int i = 0; i < args.length; i++) {
|
|
if (args[i].equals("-s"))
|
|
ssl = true;
|
|
else if ((!ssl) && _listenPort == null)
|
|
_listenPort = args[i];
|
|
else if ((!ssl) && _listenHost == null)
|
|
_listenHost = args[i];
|
|
else if (ssl && _sslListenPort == null)
|
|
_sslListenPort = args[i];
|
|
else if (ssl && _sslListenHost == null)
|
|
_sslListenHost = args[i];
|
|
else if (_webAppsDir == null)
|
|
_webAppsDir = args[i];
|
|
else {
|
|
System.err.println(USAGE);
|
|
throw new IllegalArgumentException(USAGE);
|
|
}
|
|
}
|
|
}
|
|
if (_listenHost == null)
|
|
_listenHost = DEFAULT_LISTEN_HOST;
|
|
if (_sslListenHost == null)
|
|
_sslListenHost = _listenHost;
|
|
if (_webAppsDir == null)
|
|
_webAppsDir = DEFAULT_WEBAPPS_DIR;
|
|
// _listenPort and _sslListenPort are not defaulted, if one or the other is null, do not enable
|
|
if (_listenPort == null && _sslListenPort == null) {
|
|
System.err.println(USAGE);
|
|
throw new IllegalArgumentException(USAGE);
|
|
}
|
|
}
|
|
|
|
public static void main(String args[]) {
|
|
startTrayApp();
|
|
RouterConsoleRunner runner = new RouterConsoleRunner(args);
|
|
runner.startConsole();
|
|
}
|
|
|
|
/**
|
|
* SInce _server is now static
|
|
* @return may be null or stopped perhaps
|
|
* @since Jetty 6 since it doesn't have Server.getServers()
|
|
*/
|
|
static Server getConsoleServer() {
|
|
return _server;
|
|
}
|
|
|
|
private static void startTrayApp() {
|
|
try {
|
|
//TODO: move away from routerconsole into a separate application.
|
|
//ApplicationManager?
|
|
VersionComparator v = new VersionComparator();
|
|
boolean recentJava = v.compare(System.getProperty("java.runtime.version"), "1.6") >= 0;
|
|
// default false for now
|
|
boolean desktopguiEnabled = I2PAppContext.getGlobalContext().getBooleanProperty("desktopgui.enabled");
|
|
if (recentJava && desktopguiEnabled) {
|
|
//Check if we are in a headless environment, set properties accordingly
|
|
System.setProperty("java.awt.headless", Boolean.toString(GraphicsEnvironment.isHeadless()));
|
|
String[] args = new String[0];
|
|
net.i2p.desktopgui.Main.beginStartup(args);
|
|
} else {
|
|
// required true for jrobin to work
|
|
System.setProperty("java.awt.headless", "true");
|
|
SysTray.getInstance();
|
|
}
|
|
} catch (Throwable t) {
|
|
t.printStackTrace();
|
|
}
|
|
}
|
|
|
|
/**
|
|
* http://irc.codehaus.org/display/JETTY/Porting+to+jetty6
|
|
*
|
|
*<pre>
|
|
* Server
|
|
* HandlerCollection
|
|
* ContextHandlerCollection
|
|
* WebAppContext (i.e. ContextHandler)
|
|
* SessionHandler
|
|
* SecurityHandler
|
|
* ServletHandler
|
|
* servlets...
|
|
* WebAppContext
|
|
* ...
|
|
* DefaultHandler
|
|
* RequestLogHandler (opt)
|
|
*</pre>
|
|
*/
|
|
public void startConsole() {
|
|
File workDir = new SecureDirectory(I2PAppContext.getGlobalContext().getTempDir(), "jetty-work");
|
|
boolean workDirRemoved = FileUtil.rmdir(workDir, false);
|
|
if (!workDirRemoved)
|
|
System.err.println("ERROR: Unable to remove Jetty temporary work directory");
|
|
boolean workDirCreated = workDir.mkdirs();
|
|
if (!workDirCreated)
|
|
System.err.println("ERROR: Unable to create Jetty temporary work directory");
|
|
|
|
//try {
|
|
// Log.setLog(new I2PLogger(I2PAppContext.getGlobalContext()));
|
|
//} catch (Throwable t) {
|
|
// System.err.println("INFO: I2P Jetty logging class not found, logging to wrapper log");
|
|
//}
|
|
// This way it doesn't try to load Slf4jLog first
|
|
System.setProperty("org.mortbay.log.class", "net.i2p.jetty.I2PLogger");
|
|
|
|
// so Jetty can find WebAppConfiguration
|
|
System.setProperty("jetty.class.path", I2PAppContext.getGlobalContext().getBaseDir() + "/lib/routerconsole.jar");
|
|
_server = new Server();
|
|
_server.setGracefulShutdown(1000);
|
|
|
|
try {
|
|
ThreadPool ctp = new CustomThreadPoolExecutor();
|
|
ctp.prestartAllCoreThreads();
|
|
_server.setThreadPool(ctp);
|
|
} catch (Throwable t) {
|
|
// class not found...
|
|
System.out.println("INFO: Jetty concurrent ThreadPool unavailable, using QueuedThreadPool");
|
|
QueuedThreadPool qtp = new QueuedThreadPool(MAX_THREADS);
|
|
qtp.setMinThreads(MIN_THREADS);
|
|
qtp.setMaxIdleTimeMs(MAX_IDLE_TIME);
|
|
_server.setThreadPool(qtp);
|
|
}
|
|
|
|
HandlerCollection hColl = new HandlerCollection();
|
|
ContextHandlerCollection chColl = new ContextHandlerCollection();
|
|
_server.addHandler(hColl);
|
|
hColl.addHandler(chColl);
|
|
hColl.addHandler(new DefaultHandler());
|
|
|
|
String log = I2PAppContext.getGlobalContext().getProperty("routerconsole.log");
|
|
if (log != null) {
|
|
File logFile = new File(log);
|
|
if (!logFile.isAbsolute())
|
|
logFile = new File(I2PAppContext.getGlobalContext().getLogDir(), "logs/" + log);
|
|
try {
|
|
RequestLogHandler rhl = new RequestLogHandler();
|
|
rhl.setRequestLog(new NCSARequestLog(logFile.getAbsolutePath()));
|
|
hColl.addHandler(rhl);
|
|
} catch (Exception ioe) {
|
|
System.err.println("ERROR: Unable to create Jetty log: " + ioe);
|
|
}
|
|
}
|
|
boolean rewrite = false;
|
|
Properties props = webAppProperties();
|
|
if (props.isEmpty()) {
|
|
props.setProperty(PREFIX + ROUTERCONSOLE + ENABLED, "true");
|
|
rewrite = true;
|
|
}
|
|
|
|
// Get an absolute path with a trailing slash for the webapps dir
|
|
// We assume relative to the base install dir for backward compatibility
|
|
File app = new File(_webAppsDir);
|
|
if (!app.isAbsolute()) {
|
|
app = new File(I2PAppContext.getGlobalContext().getBaseDir(), _webAppsDir);
|
|
try {
|
|
_webAppsDir = app.getCanonicalPath();
|
|
} catch (IOException ioe) {}
|
|
}
|
|
if (!_webAppsDir.endsWith("/"))
|
|
_webAppsDir += '/';
|
|
|
|
WebAppContext rootWebApp = null;
|
|
ServletHandler rootServletHandler = null;
|
|
List<Connector> connectors = new ArrayList(4);
|
|
try {
|
|
int boundAddresses = 0;
|
|
Set addresses = Addresses.getAllAddresses();
|
|
boolean hasIPV4 = addresses.contains("0.0.0.0");
|
|
boolean hasIPV6 = addresses.contains("0:0:0:0:0:0:0:0");
|
|
|
|
// add standard listeners
|
|
int lport = 0;
|
|
if (_listenPort != null) {
|
|
try {
|
|
lport = Integer.parseInt(_listenPort);
|
|
} catch (NumberFormatException nfe) {}
|
|
if (lport <= 0)
|
|
System.err.println("Bad routerconsole port " + _listenPort);
|
|
}
|
|
if (lport > 0) {
|
|
StringTokenizer tok = new StringTokenizer(_listenHost, " ,");
|
|
while (tok.hasMoreTokens()) {
|
|
String host = tok.nextToken().trim();
|
|
try {
|
|
// Test before we add the connector, because Jetty 6 won't start if any of the
|
|
// connectors are bad
|
|
InetAddress test = InetAddress.getByName(host);
|
|
if ((!hasIPV6) && (!(test instanceof Inet4Address)))
|
|
throw new IOException("IPv6 addresses unsupported");
|
|
if ((!hasIPV4) && (test instanceof Inet4Address))
|
|
throw new IOException("IPv4 addresses unsupported");
|
|
ServerSocket testSock = null;
|
|
try {
|
|
// On Windows, this was passing and Jetty was still failing,
|
|
// possibly due to %scope_id ???
|
|
// https://issues.apache.org/jira/browse/ZOOKEEPER-667
|
|
//testSock = new ServerSocket(0, 0, test);
|
|
// so do exactly what Jetty does in SelectChannelConnector.open()
|
|
testSock = new ServerSocket();
|
|
InetSocketAddress isa = new InetSocketAddress(host, 0);
|
|
testSock.bind(isa);
|
|
} finally {
|
|
if (testSock != null) try { testSock.close(); } catch (IOException ioe) {}
|
|
}
|
|
//if (host.indexOf(":") >= 0) // IPV6 - requires patched Jetty 5
|
|
// _server.addListener('[' + host + "]:" + _listenPort);
|
|
//else
|
|
// _server.addListener(host + ':' + _listenPort);
|
|
SelectChannelConnector lsnr = new SelectChannelConnector();
|
|
lsnr.setHost(host);
|
|
lsnr.setPort(lport);
|
|
lsnr.setMaxIdleTime(90*1000); // default 10 sec
|
|
lsnr.setName("ConsoleSocket"); // all with same name will use the same thread pool
|
|
//_server.addConnector(lsnr);
|
|
connectors.add(lsnr);
|
|
boundAddresses++;
|
|
} catch (Exception ioe) {
|
|
System.err.println("Unable to bind routerconsole to " + host + " port " + _listenPort + ": " + ioe);
|
|
System.err.println("You may ignore this warning if the console is still available at http://localhost:" + _listenPort);
|
|
}
|
|
}
|
|
// XXX: what if listenhosts do not include 127.0.0.1? (Should that ever even happen?)
|
|
I2PAppContext.getGlobalContext().portMapper().register(PortMapper.SVC_CONSOLE,lport);
|
|
}
|
|
|
|
// add SSL listeners
|
|
int sslPort = 0;
|
|
if (_sslListenPort != null) {
|
|
try {
|
|
sslPort = Integer.parseInt(_sslListenPort);
|
|
} catch (NumberFormatException nfe) {}
|
|
if (sslPort <= 0)
|
|
System.err.println("Bad routerconsole SSL port " + _sslListenPort);
|
|
}
|
|
if (sslPort > 0) {
|
|
I2PAppContext ctx = I2PAppContext.getGlobalContext();
|
|
File keyStore = new File(ctx.getConfigDir(), "keystore/console.ks");
|
|
if (verifyKeyStore(keyStore)) {
|
|
StringTokenizer tok = new StringTokenizer(_sslListenHost, " ,");
|
|
while (tok.hasMoreTokens()) {
|
|
String host = tok.nextToken().trim();
|
|
// doing it this way means we don't have to escape an IPv6 host with []
|
|
try {
|
|
// Test before we add the connector, because Jetty 6 won't start if any of the
|
|
// connectors are bad
|
|
InetAddress test = InetAddress.getByName(host);
|
|
if ((!hasIPV6) && (!(test instanceof Inet4Address)))
|
|
throw new IOException("IPv6 addresses unsupported");
|
|
if ((!hasIPV4) && (test instanceof Inet4Address))
|
|
throw new IOException("IPv4 addresses unsupported");
|
|
ServerSocket testSock = null;
|
|
try {
|
|
// see comments above
|
|
//testSock = new ServerSocket(0, 0, test);
|
|
testSock = new ServerSocket();
|
|
InetSocketAddress isa = new InetSocketAddress(host, 0);
|
|
testSock.bind(isa);
|
|
} finally {
|
|
if (testSock != null) try { testSock.close(); } catch (IOException ioe) {}
|
|
}
|
|
// TODO if class not found use SslChannelConnector
|
|
// Sadly there's no common base class with the ssl methods in it
|
|
SslSelectChannelConnector ssll = new SslSelectChannelConnector();
|
|
ssll.setHost(host);
|
|
ssll.setPort(sslPort);
|
|
// the keystore path and password
|
|
ssll.setKeystore(keyStore.getAbsolutePath());
|
|
ssll.setPassword(ctx.getProperty(PROP_KEYSTORE_PASSWORD, DEFAULT_KEYSTORE_PASSWORD));
|
|
// the X.509 cert password (if not present, verifyKeyStore() returned false)
|
|
ssll.setKeyPassword(ctx.getProperty(PROP_KEY_PASSWORD, "thisWontWork"));
|
|
ssll.setMaxIdleTime(90*1000); // default 10 sec
|
|
ssll.setName("ConsoleSocket"); // all with same name will use the same thread pool
|
|
//_server.addConnector(ssll);
|
|
connectors.add(ssll);
|
|
boundAddresses++;
|
|
} catch (Exception e) {
|
|
System.err.println("Unable to bind routerconsole to " + host + " port " + sslPort + " for SSL: " + e);
|
|
System.err.println("You may ignore this warning if the console is still available at https://localhost:" + sslPort);
|
|
}
|
|
}
|
|
I2PAppContext.getGlobalContext().portMapper().register(PortMapper.SVC_HTTPS_CONSOLE,sslPort);
|
|
} else {
|
|
System.err.println("Unable to create or access keystore for SSL: " + keyStore.getAbsolutePath());
|
|
}
|
|
}
|
|
|
|
if (boundAddresses <= 0) {
|
|
System.err.println("Unable to bind routerconsole to any address on port " + _listenPort + (sslPort > 0 ? (" or SSL port " + sslPort) : ""));
|
|
return;
|
|
}
|
|
|
|
rootWebApp = new LocaleWebAppHandler(I2PAppContext.getGlobalContext(),
|
|
"/", _webAppsDir + ROUTERCONSOLE + ".war");
|
|
File tmpdir = new SecureDirectory(workDir, ROUTERCONSOLE + "-" +
|
|
(_listenPort != null ? _listenPort : _sslListenPort));
|
|
tmpdir.mkdir();
|
|
rootWebApp.setTempDirectory(tmpdir);
|
|
rootWebApp.setExtractWAR(false);
|
|
rootWebApp.setSessionHandler(new SessionHandler());
|
|
rootServletHandler = new ServletHandler();
|
|
rootWebApp.setServletHandler(rootServletHandler);
|
|
initialize(rootWebApp);
|
|
chColl.addHandler(rootWebApp);
|
|
|
|
} catch (Exception ioe) {
|
|
ioe.printStackTrace();
|
|
}
|
|
|
|
try {
|
|
// start does a mapContexts()
|
|
_server.start();
|
|
} catch (Throwable me) {
|
|
// NoClassFoundDefError from a webapp is a throwable, not an exception
|
|
System.err.println("Error starting the Router Console server: " + me);
|
|
me.printStackTrace();
|
|
}
|
|
|
|
if (_server.isRunning()) {
|
|
// Add and start the connectors one-by-one
|
|
boolean error = false;
|
|
for (Connector conn : connectors) {
|
|
try {
|
|
_server.addConnector(conn);
|
|
// start after adding so it gets the right thread pool
|
|
conn.start();
|
|
} catch (Throwable me) {
|
|
try {
|
|
_server.removeConnector(conn);
|
|
} catch (Throwable t) {
|
|
t.printStackTrace();
|
|
}
|
|
System.err.println("WARNING: Error starting " + conn + ": " + me);
|
|
me.printStackTrace();
|
|
error = true;
|
|
}
|
|
}
|
|
if (error) {
|
|
System.err.println("WARNING: Error starting one or more listeners of the Router Console server.\n" +
|
|
"If your console is still accessible at http://127.0.0.1:7657/,\n" +
|
|
"this may be a problem only with binding to the IPV6 address ::1.\n" +
|
|
"If so, you may ignore this error, or remove the\n" +
|
|
"\"::1,\" in the \"clientApp.0.args\" line of the clients.config file.");
|
|
}
|
|
}
|
|
|
|
// Start all the other webapps after the server is up,
|
|
// so things start faster.
|
|
// Jetty 6 starts the connector before the router console is ready
|
|
// This also prevents one webapp from breaking the whole thing
|
|
List<String> notStarted = new ArrayList();
|
|
if (_server.isRunning()) {
|
|
File dir = new File(_webAppsDir);
|
|
String fileNames[] = dir.list(WarFilenameFilter.instance());
|
|
if (fileNames != null) {
|
|
for (int i = 0; i < fileNames.length; i++) {
|
|
String appName = fileNames[i].substring(0, fileNames[i].lastIndexOf(".war"));
|
|
String enabled = props.getProperty(PREFIX + appName + ENABLED);
|
|
if (! "false".equals(enabled)) {
|
|
try {
|
|
String path = new File(dir, fileNames[i]).getCanonicalPath();
|
|
WebAppStarter.startWebApp(I2PAppContext.getGlobalContext(), chColl, appName, path);
|
|
if (enabled == null) {
|
|
// do this so configclients.jsp knows about all apps from reading the config
|
|
props.setProperty(PREFIX + appName + ENABLED, "true");
|
|
rewrite = true;
|
|
}
|
|
} catch (Throwable t) {
|
|
System.err.println("ERROR: Failed to start " + appName + ' ' + t);
|
|
t.printStackTrace();
|
|
notStarted.add(appName);
|
|
}
|
|
} else {
|
|
notStarted.add(appName);
|
|
}
|
|
}
|
|
}
|
|
} else {
|
|
System.err.println("ERROR: Router console did not start, not starting webapps");
|
|
}
|
|
|
|
if (rewrite)
|
|
storeWebAppProperties(props);
|
|
|
|
if (rootServletHandler != null && notStarted.size() > 0) {
|
|
// map each not-started webapp to the error page
|
|
ServletHolder noWebApp = rootServletHandler.getServlet("net.i2p.router.web.jsp.nowebapp_jsp");
|
|
for (int i = 0; i < notStarted.size(); i++) {
|
|
// we want a new handler for each one since if the webapp is started we remove the handler???
|
|
try {
|
|
if (noWebApp != null) {
|
|
String path = '/' + notStarted.get(i);
|
|
// LocaleWebAppsHandler adds a .jsp
|
|
rootServletHandler.addServletWithMapping(noWebApp, path + ".jsp");
|
|
rootServletHandler.addServletWithMapping(noWebApp, path + "/*");
|
|
} else {
|
|
System.err.println("Can't find nowebapp.jsp?");
|
|
}
|
|
} catch (Throwable me) {
|
|
System.err.println(me);
|
|
me.printStackTrace();
|
|
}
|
|
}
|
|
}
|
|
|
|
Thread t = new I2PAppThread(new StatSummarizer(), "StatSummarizer", true);
|
|
t.setPriority(Thread.NORM_PRIORITY - 1);
|
|
t.start();
|
|
|
|
List<RouterContext> contexts = RouterContext.listContexts();
|
|
if (contexts != null) {
|
|
RouterContext ctx = contexts.get(0);
|
|
|
|
ConsoleUpdateManager um = new ConsoleUpdateManager(ctx);
|
|
um.start();
|
|
|
|
if (PluginStarter.pluginsEnabled(ctx)) {
|
|
t = new I2PAppThread(new PluginStarter(ctx), "PluginStarter", true);
|
|
t.setPriority(Thread.NORM_PRIORITY - 1);
|
|
t.start();
|
|
ctx.addShutdownTask(new PluginStopper(ctx));
|
|
}
|
|
// stat summarizer registers its own hook
|
|
ctx.addShutdownTask(new ServerShutdown());
|
|
ConfigServiceHandler.registerSignalHandler(ctx);
|
|
} // else log CRIT ?
|
|
}
|
|
|
|
/**
|
|
* @return success if it exists and we have a password, or it was created successfully.
|
|
* @since 0.8.3
|
|
*/
|
|
private static boolean verifyKeyStore(File ks) {
|
|
if (ks.exists()) {
|
|
I2PAppContext ctx = I2PAppContext.getGlobalContext();
|
|
boolean rv = ctx.getProperty(PROP_KEY_PASSWORD) != null;
|
|
if (!rv)
|
|
System.err.println("Console SSL error, must set " + PROP_KEY_PASSWORD + " in " + (new File(ctx.getConfigDir(), "router.config")).getAbsolutePath());
|
|
return rv;
|
|
}
|
|
File dir = ks.getParentFile();
|
|
if (!dir.exists()) {
|
|
File sdir = new SecureDirectory(dir.getAbsolutePath());
|
|
if (!sdir.mkdir())
|
|
return false;
|
|
}
|
|
return createKeyStore(ks);
|
|
}
|
|
|
|
|
|
/**
|
|
* Call out to keytool to create a new keystore with a keypair in it.
|
|
* Trying to do this programatically is a nightmare, requiring either BouncyCastle
|
|
* libs or using proprietary Sun libs, and it's a huge mess.
|
|
*
|
|
* @return success
|
|
* @since 0.8.3
|
|
*/
|
|
private static boolean createKeyStore(File ks) {
|
|
I2PAppContext ctx = I2PAppContext.getGlobalContext();
|
|
// make a random 48 character password (30 * 8 / 5)
|
|
byte[] rand = new byte[30];
|
|
ctx.random().nextBytes(rand);
|
|
String keyPassword = Base32.encode(rand);
|
|
// and one for the cname
|
|
ctx.random().nextBytes(rand);
|
|
String cname = Base32.encode(rand) + ".console.i2p.net";
|
|
|
|
String keytool = (new File(System.getProperty("java.home"), "bin/keytool")).getAbsolutePath();
|
|
String[] args = new String[] {
|
|
keytool,
|
|
"-genkey", // -genkeypair preferred in newer keytools, but this works with more
|
|
"-storetype", KeyStore.getDefaultType(),
|
|
"-keystore", ks.getAbsolutePath(),
|
|
"-storepass", DEFAULT_KEYSTORE_PASSWORD,
|
|
"-alias", "console",
|
|
"-dname", "CN=" + cname + ",OU=Console,O=I2P Anonymous Network,L=XX,ST=XX,C=XX",
|
|
"-validity", "3652", // 10 years
|
|
"-keyalg", "DSA",
|
|
"-keysize", "1024",
|
|
"-keypass", keyPassword};
|
|
boolean success = (new ShellCommand()).executeSilentAndWaitTimed(args, 30); // 30 secs
|
|
if (success) {
|
|
success = ks.exists();
|
|
if (success) {
|
|
SecureFileOutputStream.setPerms(ks);
|
|
try {
|
|
RouterContext rctx = (RouterContext) ctx;
|
|
Map<String, String> changes = new HashMap();
|
|
changes.put(PROP_KEYSTORE_PASSWORD, DEFAULT_KEYSTORE_PASSWORD);
|
|
changes.put(PROP_KEY_PASSWORD, keyPassword);
|
|
rctx.router().saveConfig(changes, null);
|
|
} catch (Exception e) {} // class cast exception
|
|
}
|
|
}
|
|
if (success) {
|
|
System.err.println("Created self-signed certificate for " + cname + " in keystore: " + ks.getAbsolutePath() + "\n" +
|
|
"The certificate name was generated randomly, and is not associated with your " +
|
|
"IP address, host name, router identity, or destination keys.");
|
|
} else {
|
|
System.err.println("Failed to create console SSL keystore using command line:");
|
|
StringBuilder buf = new StringBuilder(256);
|
|
for (int i = 0; i < args.length; i++) {
|
|
buf.append('"').append(args[i]).append("\" ");
|
|
}
|
|
System.err.println(buf.toString());
|
|
System.err.println("This is for the Sun/Oracle keytool, others may be incompatible.\n" +
|
|
"If you create the keystore manually, you must add " + PROP_KEYSTORE_PASSWORD + " and " + PROP_KEY_PASSWORD +
|
|
" to " + (new File(ctx.getConfigDir(), "router.config")).getAbsolutePath());
|
|
}
|
|
return success;
|
|
}
|
|
|
|
static void initialize(WebAppContext context) {
|
|
SecurityHandler sec = new SecurityHandler();
|
|
List<ConstraintMapping> constraints = new ArrayList(4);
|
|
String password = getPassword();
|
|
if (password != null) {
|
|
HashUserRealm realm = new HashUserRealm("i2prouter");
|
|
realm.put("admin", password);
|
|
realm.addUserToRole("admin", "routerAdmin");
|
|
sec.setUserRealm(realm);
|
|
sec.setAuthenticator(authenticator);
|
|
Constraint constraint = new Constraint("admin", "routerAdmin");
|
|
constraint.setAuthenticate(true);
|
|
ConstraintMapping cm = new ConstraintMapping();
|
|
cm.setConstraint(constraint);
|
|
cm.setPathSpec("/");
|
|
constraints.add(cm);
|
|
}
|
|
|
|
// This forces a '403 Forbidden' response for TRACE and OPTIONS unless the
|
|
// WAC handler handles it.
|
|
// (LocaleWebAppHandler returns a '405 Method Not Allowed')
|
|
// TRACE and OPTIONS aren't really security issues...
|
|
// TRACE doesn't echo stuff unless you call setTrace(true)
|
|
// But it might bug some people
|
|
// The other strange methods - PUT, DELETE, MOVE - are disabled by default
|
|
// See also:
|
|
// http://old.nabble.com/Disable-HTTP-TRACE-in-Jetty-5.x-td12412607.html
|
|
|
|
Constraint sc = new Constraint();
|
|
sc.setName("No trace");
|
|
ConstraintMapping cm = new ConstraintMapping();
|
|
cm.setMethod("TRACE");
|
|
cm.setConstraint(sc);
|
|
cm.setPathSpec("/");
|
|
constraints.add(cm);
|
|
|
|
sc = new Constraint();
|
|
sc.setName("No options");
|
|
cm = new ConstraintMapping();
|
|
cm.setMethod("OPTIONS");
|
|
cm.setConstraint(sc);
|
|
cm.setPathSpec("/");
|
|
constraints.add(cm);
|
|
|
|
ConstraintMapping cmarr[] = constraints.toArray(new ConstraintMapping[constraints.size()]);
|
|
sec.setConstraintMappings(cmarr);
|
|
|
|
context.setSecurityHandler(sec);
|
|
}
|
|
|
|
static String getPassword() {
|
|
List<RouterContext> contexts = RouterContext.listContexts();
|
|
if (contexts != null) {
|
|
for (int i = 0; i < contexts.size(); i++) {
|
|
RouterContext ctx = contexts.get(i);
|
|
String password = ctx.getProperty("consolePassword");
|
|
if (password != null) {
|
|
password = password.trim();
|
|
if (password.length() > 0) {
|
|
return password;
|
|
}
|
|
}
|
|
}
|
|
// no password in any context
|
|
return null;
|
|
} else {
|
|
// no contexts?!
|
|
return null;
|
|
}
|
|
}
|
|
|
|
/** @since 0.8.8 */
|
|
private static class ServerShutdown implements Runnable {
|
|
public void run() {
|
|
try {
|
|
_server.stop();
|
|
} catch (Exception ie) {}
|
|
}
|
|
}
|
|
|
|
public static Properties webAppProperties() {
|
|
return webAppProperties(I2PAppContext.getGlobalContext().getConfigDir().getAbsolutePath());
|
|
}
|
|
|
|
public static Properties webAppProperties(String dir) {
|
|
Properties rv = new Properties();
|
|
// String webappConfigFile = ctx.getProperty(PROP_WEBAPP_CONFIG_FILENAME, DEFAULT_WEBAPP_CONFIG_FILENAME);
|
|
String webappConfigFile = DEFAULT_WEBAPP_CONFIG_FILENAME;
|
|
File cfgFile = new File(dir, webappConfigFile);
|
|
|
|
try {
|
|
DataHelper.loadProps(rv, cfgFile);
|
|
} catch (IOException ioe) {
|
|
// _log.warn("Error loading the client app properties from " + cfgFile.getName(), ioe);
|
|
}
|
|
|
|
return rv;
|
|
}
|
|
|
|
public static void storeWebAppProperties(Properties props) {
|
|
// String webappConfigFile = ctx.getProperty(PROP_WEBAPP_CONFIG_FILENAME, DEFAULT_WEBAPP_CONFIG_FILENAME);
|
|
String webappConfigFile = DEFAULT_WEBAPP_CONFIG_FILENAME;
|
|
File cfgFile = new File(I2PAppContext.getGlobalContext().getConfigDir(), webappConfigFile);
|
|
|
|
try {
|
|
DataHelper.storeProps(props, cfgFile);
|
|
} catch (IOException ioe) {
|
|
// _log.warn("Error loading the client app properties from " + cfgFile.getName(), ioe);
|
|
}
|
|
}
|
|
|
|
static class WarFilenameFilter implements FilenameFilter {
|
|
private static final WarFilenameFilter _filter = new WarFilenameFilter();
|
|
public static WarFilenameFilter instance() { return _filter; }
|
|
public boolean accept(File dir, String name) {
|
|
return (name != null) && (name.endsWith(".war") && !name.equals(ROUTERCONSOLE + ".war"));
|
|
}
|
|
}
|
|
|
|
|
|
/**
|
|
* Just to set the name and set Daemon
|
|
* @since Jetty 6
|
|
*/
|
|
private static class CustomThreadPoolExecutor extends ThreadPool {
|
|
public CustomThreadPoolExecutor() {
|
|
super(MIN_THREADS, MAX_THREADS, MAX_IDLE_TIME, TimeUnit.MILLISECONDS,
|
|
new SynchronousQueue(), new CustomThreadFactory(),
|
|
new ThreadPoolExecutor.CallerRunsPolicy());
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Just to set the name and set Daemon
|
|
* @since Jetty 6
|
|
*/
|
|
private static class CustomThreadFactory implements ThreadFactory {
|
|
|
|
public Thread newThread(Runnable r) {
|
|
Thread rv = Executors.defaultThreadFactory().newThread(r);
|
|
rv.setName(THREAD_NAME);
|
|
rv.setDaemon(true);
|
|
return rv;
|
|
}
|
|
}
|
|
|
|
}
|