public Object run(SecurityService param) throws PropertyVetoException, TransactionFailure { param.getAuthRealm().remove(authRealm); return null; } }, securityService);
private void createMessageSecurityConfig(SecurityService ss) throws PropertyVetoException { while (true) { try { if (parser.getLocalName().equals("message-security-config") && ss != null) { MessageSecurityConfig msc = ss.createChild(MessageSecurityConfig.class); ss.getMessageSecurityConfig().add(msc); for (int i = 0; i < parser.getAttributeCount(); i++) { String attr = parser.getAttributeLocalName(i); String val = parser.getAttributeValue(i); if (attr.equals("auth-layer")) { msc.setAuthLayer(val); } } createProviderConfig(msc); break; } } catch (TransactionFailure ex) { logger.log( Level.SEVERE, failureCreatingJaccProvider, ex); } } }
public Object run(SecurityService param) throws PropertyVetoException, TransactionFailure { AuditModule newAuditModule = param.createChild(AuditModule.class); populateAuditModuleElement(newAuditModule); param.getAuditModule().add(newAuditModule); return newAuditModule; } }, securityService);
public void postConstruct() { if (securityService == null) { //should never happen return; } //the first 3 of them below are not stored anywhere and directly //used from securityService instance available //even defaultPrincipal and defaultPrincipalPassword is directly being //read from securityService. auditEnabled = securityService.getAuditEnabled(); defaultRealm = securityService.getDefaultRealm(); jacc = securityService.getJacc(); if(jacc == null) { jacc = "default"; } activateDefaultP2RMapping = securityService.getActivateDefaultPrincipalToRoleMapping(); mappedPrincipalClassName = securityService.getMappedPrincipalClass(); }
public Object run(SecurityService param) throws PropertyVetoException, TransactionFailure { AuthRealm newAuthRealm = param.createChild(AuthRealm.class); populateAuthRealmElement(newAuthRealm); param.getAuthRealm().add(newAuthRealm); //In case of cluster instances, this is required to //avoid issues with the listener's callback method SecurityConfigListener.authRealmCreated(config, newAuthRealm); return newAuthRealm; } }, securityService);
static AuthRealm findRealm(final SecurityService securityService, String authRealmName) { // ensure we have the file authrealm if (authRealmName == null) { authRealmName = securityService.getDefaultRealm(); } for (AuthRealm authRealm : securityService.getAuthRealm()) { if (authRealm.getName().equals(authRealmName)) { return authRealm; } } return null; }
@Override public Object run(SecurityService secServ) throws PropertyVetoException, TransactionFailure { JaccProvider jacc = secServ.createChild(JaccProvider.class); //add the simple provider to the domain's security service jacc.setName("simple"); jacc.setPolicyConfigurationFactoryProvider("com.sun.enterprise.security.jacc.provider.SimplePolicyConfigurationFactory"); jacc.setPolicyProvider("com.sun.enterprise.security.jacc.provider.SimplePolicyProvider"); secServ.getJaccProvider().add(jacc); return secServ; } }, securityService);
List<AuditModule> auditModules = securitysvc.getAuditModule(); checkDuplicate(auditModules); List<AuthRealm> authrealms = securitysvc.getAuthRealm(); checkDuplicate(authrealms); List<JaccProvider> providers = securitysvc.getJaccProvider(); checkDuplicate(providers);
static MessageSecurityConfig findMessageSecurityConfig(final SecurityService securityService, final String authLayer) { List<MessageSecurityConfig> mscs = securityService.getMessageSecurityConfig(); for (MessageSecurityConfig msc : mscs) { if (msc.getAuthLayer().equals(authLayer)) { return msc; } } return null; } }
service.getMessageSecurityConfig()) { if (AUTH_LAYER.equals(msc.getAuthLayer())) { return null; service.createChild(MessageSecurityConfig.class); msConfig.setAuthLayer(AUTH_LAYER); service.getMessageSecurityConfig().add(msConfig); Config parent = service.getParent(Config.class); if (parent.getAdminListener() == null) { LogRecord lr = new LogRecord(Level.WARNING,
public Object run(SecurityService param) throws PropertyVetoException, TransactionFailure { param.getJaccProvider().remove(jaccprov); return null; } }, securityService);
public Object run(SecurityService param) throws PropertyVetoException, TransactionFailure { param.getAuditModule().remove(auditModule); return null; } }, securityService);
boolean auditFlag = Boolean.parseBoolean(securityBean.getAuditEnabled()); List<com.sun.enterprise.config.serverbeans.AuditModule> am = securityBean.getAuditModule(); for (com.sun.enterprise.config.serverbeans.AuditModule it: am) {
/** * @returns the class name used for default Principal to role mapping * return null if default P2R mapping is not supported. */ private String getDefaultP2RMappingClassName() { String className = null; try { if (secService != null && Boolean.parseBoolean(secService.getActivateDefaultPrincipalToRoleMapping())) { className = secService.getMappedPrincipalClass(); if (className == null || "".equals(className)) { className = Group.class.getName(); } } if (className == null) { return null; } Class<?> clazz = Class.forName(className); Class<?>[] argClasses = new Class<?>[]{String.class}; Object[] arg = new Object[]{"anystring"}; Constructor<?> c = clazz.getConstructor(argClasses); //To avoid a failure later make sure we can instantiate now Principal principal = (Principal) c.newInstance(arg); return className; } catch (Exception e) { _logger.log(Level.SEVERE, "pc.getDefaultP2RMappingClass: " + e); return null; } }
private AuthRealm createLDAPRealm(SecurityService ss) throws TransactionFailure, PropertyVetoException { AuthRealm ar = ss.createChild(AuthRealm.class); ar.setClassname(LDAPRealm.class.getName()); ar.setName(FIXED_ADMIN_REALM_NAME); List<Property> props = ar.getProperty(); Property p = ar.createChild(Property.class); p.setName(DIR_P); p.setValue(url); props.add(p); p = ar.createChild(Property.class); p.setName(BASEDN_P); p.setValue(basedn); props.add(p); p = ar.createChild(Property.class); p.setName(JAAS_P); p.setValue(JAAS_V); props.add(p); if (ldapGroupName!= null) { p = ar.createChild(Property.class); p.setName(Realm.PARAM_GROUP_MAPPING); p.setValue(ldapGroupName +"->asadmin"); //appears as gfdomain1->asadmin in domain.xml props.add(p); } return ar; }
try final String defaultRealm = getSecurityService().getDefaultRealm(); Realm.getInstance(defaultRealm); Realm.setDefaultRealm(defaultRealm);
String defaultRealm = securityBean.getDefaultRealm(); List<AuthRealm> realms = securityBean.getAuthRealm(); assert (realms != null);
public void postConstruct() { if (securityService == null) { //should never happen return; } //the first 3 of them below are not stored anywhere and directly //used from securityService instance available //even defaultPrincipal and defaultPrincipalPassword is directly being //read from securityService. auditEnabled = securityService.getAuditEnabled(); defaultRealm = securityService.getDefaultRealm(); jacc = securityService.getJacc(); if(jacc == null) { jacc = "default"; } activateDefaultP2RMapping = securityService.getActivateDefaultPrincipalToRoleMapping(); mappedPrincipalClassName = securityService.getMappedPrincipalClass(); }
public Object run(SecurityService param) throws PropertyVetoException, TransactionFailure { AuthRealm newAuthRealm = param.createChild(AuthRealm.class); populateAuthRealmElement(newAuthRealm); param.getAuthRealm().add(newAuthRealm); //In case of cluster instances, this is required to //avoid issues with the listener's callback method SecurityConfigListener.authRealmCreated(config, newAuthRealm); return newAuthRealm; } }, securityService);
@Override public Object run(SecurityService secServ) throws PropertyVetoException, TransactionFailure { JaccProvider jacc = secServ.createChild(JaccProvider.class); //add the simple provider to the domain's security service jacc.setName("simple"); jacc.setPolicyConfigurationFactoryProvider("com.sun.enterprise.security.jacc.provider.SimplePolicyConfigurationFactory"); jacc.setPolicyProvider("com.sun.enterprise.security.jacc.provider.SimplePolicyProvider"); secServ.getJaccProvider().add(jacc); return secServ; } }, securityService);