How to deploy the AFS Tools - ARCAD-Software/AFS GitHub Wiki
The AFS tools allow to help the user in the configuration and test of the application installation. These tools are not intended to stay in the production environment when they are not required any more. Then when needed a new fresh installation of theses tools may be required.
Automatic/Original installation
The installation package of the application should include the following tool installation process to ease the first installation or the update of the application. Again, when the stage is completed, when the application is ready to work, these tools must be uninstalled.
The automatic installation should perform the same process as the manual installation, by convention the following constraints should be respected:
- The user executing the installation of the tools must be the local user which will run the application.
- The JVM used to run the installation should be the same as the one used by the application.
- The folder where the tools are installed should be called /tools and must be located in the home directory of the application.
Manual installation
To install the AFS tools proceed as follow:
- Get the archive com.arcadsoftware.tools_XXX.jar, where XXX is the tools version number provided with your application. Notes that the tools version number is not the same as the application one.
- Create a folder under the home directory of your application, by convention we use the folder name /tools.
- Copy the JAR archive into this folder.
- Execute the following java command:
java -jar com.arcadsoftware.tools_XXX.jar
This command will deploy the tools script according to your host exploitation system.
If another version of the tools are already installed you can uninstall them before the installation of the new ones, or delete the folder containing them. The new installation will override the tools scripts so in any case the older archive will not be used anymore.
Uninstallation of the tools
The AFS tools may include legavy and insecure programs which may be exploited during an attack against your installation. So we recommend to uninstall them as soon as their presence is not required any more. If necessary they may be reinstalled with one of the above procedures.