Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migration of unmigrated content due to installation of a new plugin

...

excerptINLINE

The deploy script is used for installing, uninstalling, reinstalling, starting and stopping applications and modules

...

Usage

This command has the following syntax:

...

...

where <general_options> specify common options that apply to all commands and control how the application behaves, <command> is a command name that specifies the action to be performed, and <command_options> are options unique to the command specified.

The deploy command can also be started by using the java -jar command:

...

...

General options

This section lists all the available general options for the Geronimo deployer tool.

  • --uri <identifier>
    Where <identifier> is a Universal Resource Identifier (URI) that specifies how the deployer is to contact the server. If this flag is not specified, the deployer will attempt to contact the server using the standard port on localhost. The identifier must have the following form: No Format deployer:geronimo:jmx:rmi:///jndi/rmi://host:port/JMXConnector where <host> is replaced with the host name or TCP/IP address of the system where the server is running and <port> is replaced with the port number where the server is listening. If unspecified, localhost and the default port will be used.

...

Starting with Geronimo 2.1.2, the deployer tool can use a secure channel (SSL/TLS) to communicate with the JMX server to perform the given actions. To enable secure communication just add the --secure option. Depending on your configuration you might also need to specify some Java security properties to configure the JVM to use the right keystores and passwords. For example, on a default Geronimo installation you might need to set the following (all in one line):

...

...

Once that property is set, you can execute the following command (just as an example):

...

...

...

The secure JMX server might not be running by default. Please see Configuring secure JMX server for more information.

Back to top

Sub-commands

The available sub-commands for the Geronimo deployer tool are listed below:

...

Additionally, you can type help for further details on a given command, the syntax is as follows:

...

...

Back to top

Deploy

Use the deploy command to add and start a new module. The deploy command has the following syntax:

...

The <module> specifies the application file name and location. The <deployment_plan> specifies the file name and location of the XML with the deployment plan. Sometimes the application module already has included in the package a deployment plan or the application is so simple that does not require any deployment plan, in these cases this parameter can be omited.

...

Please note that the --inPlace option cannot be used when deploying an application to a remote server.

...

To use this option you should type:

...

...

Where <APP_HOME> indicates the home directory where you have your application (exploded).

You can also deploy applications if Geronimo is not running by using the --offline option, the syntax for this command would be:

...

...

Off course, you can also combine --offline and --inPlace

...

Back to top

Login

Use the login command to save the username and password for the current connection to the file .geronimo-deployer in the current user's home directory. Future connections to the same server will try to use this saved authentication information instead of prompting where possible.

...

The login command has the following syntax:

...

...

So, next time you run a different command that originally required user name and password, you can run the command directly, for example:

...

Similarly, you don't have to specify or re-enter the user name and password when you shut down the server using the shutdown command.

...

Even when the login information is not saved in clear text, it is not secure either. If you want to save the authentication securely, you should change the .geronimo-deployer file in your home directory so that nobody else can read or write it.

...

Use the redeploy command to stop, replace and restart a module that has been deployed before. The redeploy command has the following syntax:

...

...

Just like the deploy command, the redeploy command accepts the following modules file types:

...

Use the start command to start a previously deployed module. The start command has the following syntax:

...

...

Where <moduleIDs> is a list of one or more modules (configID) separated by blank space. The module identification (or ConfigID) is defined at deployment time in the respective deployment plan for each module previously deployed.

...

Use the stop command to stop a running module. The stop command has the following syntax:

...

...

Where <moduleIDs> is a list of one or more modules (configID) separated by blank space. The module identification (or ConfigID) is defined at deployment time in the respective deployment plan for each module previously deployed.

...

Use the undeploy command to stop and remove a module (running or not) and its deployment information from the server. The undeploy command has the following syntax:

...

...

Where <moduleIDs> is a list of one or more modules (configID) separated by blank space. The module identification (or ConfigID) is defined at deployment time in the respective deployment plan for each module previously deployed.

This command has the same ability as with deploy to uninstall applications when the server is not running, this command has the following syntax:

...

...

Back to top

Distribute

Use the distribute command to add a new module to the server. This command does not start the module nor mark it to be started in the future. The distribute command has the following syntax:

...

Just like with the deploy command, <module> specifies the application file name and location. The <deployment_plan> specifies the file name and location of the XML with the deployment plan. Sometimes the application module already has included in the package a deployment plan or the application is so simple that does not require any deployment plan, in these cases this parameter can be omitted.

...

Use this syntax to encrypt string passw0rd on an active server so that the encryption settings of that server will be used

...

Online encryption result:

...

...

Use this syntax to encrypt string passw0rd offline

...

...

Offline encryption result:

...

...

Note: Online encryption needs a running server to connect to and will use the encryption settings of that server, such as an encryption key, to do the encryption. As a result, the encrypted password usually can only be used for that particular server. Offline encryption uses the default encryption settings, and the encrypted password can be used by all servers. Offline encryption is thus less secure than online encryption.

...

Use the install-library command to install a library into server's repository. The install-library command has the following syntax:

...

...

Use the --groupId option to specify a non-default group id for the library. Otherwise, the library file will be installed with the group id named default.

Examples:

...

That command will install the mylib-1.0.jar at <geronimo_home>/repository/default/mylib/1.0/mylib-1.0.jar

...

That command will install the mylib-1.0.jar at <geronimo_home>/repository/mygroup/mylib/1.0/mylib-1.0.jar

...

Use the list-modules command to list all available modules on the server, note that for running this command the server must be running. The list-modules command has the following syntax:

...

...

  • --all : is used by default when no other option is specified. It will list all the available modules.
  • --started : this option will list only the modules that are running.
  • --stopped : this option will list only the modules that are not running.

...

Use the list-targets command to lists the targets known to the server you have connected to. The list-targets command has the following syntax:

...

...

In the case of Geronimo, each configuration store is a separate target. Geronimo does not yet support clusters as targets.

...

Note that before you can use the unlockKeystore command, you need to ensure that the following lines are added to <geronimo_home>/var/config/config-substitutions.properties:

...

...

Where

  • <keyStoreName> is the name of the keystore.
  • <keyStoreEncryptedPassword> is the encrypted password for the keystore, which can be generated by using the encrypt command. When you copy and paste the generated encrypted password to <geronimo_home>/var/config/config-substitutions.properties, there should be no space in the encrypted password string.
  • <keyAlias1>, <keyAlias2> are the names of the private keys in the keystore.
  • <keyAlias1EncryptedPassword>, <keyAlias2EncryptedPassword> are the encrypted passwords for the private keys, which can also be generated by using the encrypt command.

...

Use this syntax to unlock the keystore whose name is mykeystore

...

Use this syntax to unlock the keystore whose name is mykeystore and the private key whose alias is key1

...

...

Back to top

Install-plugin

Use the install-plugin command to install a Geronimo plugin previously exported from a Geronimo server or downloaded from a repository. A Geronimo plugin can be an application, a configuration such data sources and drivers or a combination. The install-plugin command has the following syntax:

...

...

Back to top

Search-plugins

Use the search-plugins command to list all the Geronimo plugins available in a Maven repository. The search-plugins command has the following syntax:

...

...

Back to top