Refine search
l.setName(realm); Constraint constraint = new Constraint(); constraint.setName(Constraint.__BASIC_AUTH); constraint.setRoles(new String[]{"user"}); constraint.setAuthenticate(true); Constraint noConstraint = new Constraint(); ConstraintMapping healthcheckConstraintMapping = new ConstraintMapping(); healthcheckConstraintMapping.setConstraint(noConstraint); healthcheckConstraintMapping.setPathSpec("/api/v1/health/check"); ConstraintMapping cm = new ConstraintMapping(); cm.setPathSpec("/*"); ConstraintSecurityHandler csh = new ConstraintSecurityHandler(); csh.setAuthenticator(new BasicAuthenticator()); csh.setRealmName("myrealm"); csh.addConstraintMapping(healthcheckConstraintMapping); csh.addConstraintMapping(cm);
Constraint scBase = new Constraint(); scBase.setAuthenticate(true); roles.add(role); scBase.setRoles(roles.toArray(new String[roles.size()])); String guarantee = data.toString(false, true).toUpperCase(Locale.ENGLISH); if (guarantee == null || guarantee.length() == 0 || "NONE".equals(guarantee)) scBase.setDataConstraint(Constraint.DC_NONE); else if ("INTEGRAL".equals(guarantee)) scBase.setDataConstraint(Constraint.DC_INTEGRAL); else if ("CONFIDENTIAL".equals(guarantee)) scBase.setDataConstraint(Constraint.DC_CONFIDENTIAL); else scBase.setDataConstraint(Constraint.DC_CONFIDENTIAL); Constraint sc = (Constraint) scBase.clone(); sc.setName(name); ConstraintMapping mapping = new ConstraintMapping(); mapping.setMethod(method); mapping.setPathSpec(url); mapping.setConstraint(sc); ((ConstraintAware)context.getSecurityHandler()).addConstraintMapping(mapping);
/** * Generate constraints for the Flume HTTP Source * @return ConstraintSecurityHandler for use with Jetty servlet */ public static ConstraintSecurityHandler enforceConstraints() { Constraint c = new Constraint(); c.setAuthenticate(true); ConstraintMapping cmt = new ConstraintMapping(); cmt.setConstraint(c); cmt.setMethod("TRACE"); cmt.setPathSpec("/*"); ConstraintMapping cmo = new ConstraintMapping(); cmo.setConstraint(c); cmo.setMethod("OPTIONS"); cmo.setPathSpec("/*"); ConstraintSecurityHandler sh = new ConstraintSecurityHandler(); sh.setConstraintMappings(new ConstraintMapping[]{cmt, cmo}); return sh; } }
protected void configureTraceMethod(ConstraintSecurityHandler securityHandler, boolean enableTrace) { Constraint constraint = new Constraint(); constraint.setName("trace-security"); //If enableTrace is true, then we want to set authenticate to false to allow it constraint.setAuthenticate(!enableTrace); ConstraintMapping mapping = new ConstraintMapping(); mapping.setConstraint(constraint); mapping.setMethod("TRACE"); mapping.setPathSpec("/"); securityHandler.addConstraintMapping(mapping); }
final ConstraintSecurityHandler securityHandler = new ConstraintSecurityHandler(); contextHandler.insertHandler(securityHandler); final Constraint constraint = new Constraint(); constraint.setName("auth"); constraint.setAuthenticate(true); constraint.setRoles(roles.split(",")); final ConstraintMapping constraintMapping = new ConstraintMapping(); constraintMapping.setPathSpec(context.getProperty(AUTH_PATH_SPEC).evaluateAttributeExpressions().getValue()); constraintMapping.setConstraint(constraint); securityHandler.setAuthenticatorFactory(authenticatorFactory); securityHandler.setAuthMethod(Constraint.__BASIC_AUTH); securityHandler.setRealmName(getClass().getSimpleName()); securityHandler.setConstraintMappings(Collections.singletonList(constraintMapping));
private void auth(ServletContextHandler ctx, Authenticator authType) { final String role = "can-access"; MappedLoginService users = new MappedLoginService() { @Override protected UserIdentity loadUser(String who) { return null; } @Override protected void loadUsers() throws IOException { putUser(username, new Password(password), new String[] { role }); } }; ConstraintMapping cm = new ConstraintMapping(); cm.setConstraint(new Constraint()); cm.getConstraint().setAuthenticate(true); cm.getConstraint().setDataConstraint(Constraint.DC_NONE); cm.getConstraint().setRoles(new String[] { role }); cm.setPathSpec("/*"); ConstraintSecurityHandler sec = new ConstraintSecurityHandler(); sec.setStrict(false); sec.setRealmName(realm); sec.setAuthenticator(authType); sec.setLoginService(users); sec.setConstraintMappings(new ConstraintMapping[] { cm }); sec.setHandler(ctx); contexts.removeHandler(ctx); contexts.addHandler(sec); }
static ConstraintSecurityHandler createSecurityHandler(String realm, List<String> roles) { final ConstraintSecurityHandler securityHandler = new ConstraintSecurityHandler(); Constraint constraint = new Constraint(); constraint.setAuthenticate(true); constraint.setRoles(roles.toArray(new String[0])); ConstraintMapping constraintMapping = new ConstraintMapping(); constraintMapping.setConstraint(constraint); constraintMapping.setMethod("*"); constraintMapping.setPathSpec("/*"); securityHandler.addConstraintMapping(constraintMapping); securityHandler.setAuthenticator(new BasicAuthenticator()); securityHandler.setLoginService(new JAASLoginService(realm)); securityHandler.setIdentityService(new DefaultIdentityService()); securityHandler.setRealmName(realm); return securityHandler; }
ConstraintSecurityHandler securityHandler = new ConstraintSecurityHandler(); if(auth) LoklakServer.server.addBean(loginService); Constraint constraint = new Constraint(); if(redirect) constraint.setDataConstraint(Constraint.DC_CONFIDENTIAL); if(auth){ constraint.setAuthenticate(true); constraint.setRoles(new String[] { "user", "admin" }); ConstraintMapping mapping = new ConstraintMapping(); mapping.setPathSpec( "/*" ); mapping.setConstraint(constraint); securityHandler.addConstraintMapping(mapping); securityHandler.setAuthenticator(new BasicAuthenticator()); securityHandler.setLoginService(loginService);
/** * Create a security constraint * * @param name the name of the constraint * @param authenticate true to authenticate * @param roles list of roles * @param dataConstraint the data constraint * @return the constraint */ public static Constraint createConstraint (String name, boolean authenticate, String[] roles, int dataConstraint) { Constraint constraint = createConstraint(); if (name != null) constraint.setName(name); constraint.setAuthenticate(authenticate); constraint.setRoles(roles); constraint.setDataConstraint(dataConstraint); return constraint; }
private ConstraintMapping[] getConstraintMappings(String ... pRoles) { Constraint constraint = new Constraint(); constraint.setName(Constraint.__BASIC_AUTH); constraint.setRoles(pRoles); constraint.setAuthenticate(true); ConstraintMapping cm = new ConstraintMapping(); cm.setConstraint(constraint); cm.setPathSpec("/*"); return new ConstraintMapping[] { cm }; }
public static void addPathConstraint(ConstraintSecurityHandler securityHandler, String pathSpec, String role) { Objects.requireNonNull(securityHandler); Objects.requireNonNull(pathSpec); ConstraintMapping mapping = new ConstraintMapping(); Constraint constraint = new Constraint(); String[] roles = new String[]{role}; constraint.setRoles(roles); constraint.setName(securityHandler.getAuthenticator().getAuthMethod()); constraint.setAuthenticate(true); mapping.setConstraint(constraint); mapping.setPathSpec(pathSpec); securityHandler.addConstraintMapping(mapping); }
private ConstraintMapping createConstraintMapping() { ConstraintMapping cm = new ConstraintMapping(); cm.setConstraint(new Constraint()); cm.getConstraint().setAuthenticate(true); cm.getConstraint().setDataConstraint(Constraint.DC_NONE); cm.getConstraint().setRoles(new String[] { authRole }); cm.setPathSpec("/*"); return cm; }
public Constraint getConstraint() { Constraint constraint = new Constraint(); constraint.setAuthenticate(authenticate); if (roles != null) { constraint.setRoles(roles.toArray(new String[roles.size()])); } constraint.setName(name); constraint.setDataConstraint(dataConstraint); return constraint; } }
if (security instanceof ConstraintAware) { ConstraintAware constraint = (ConstraintAware) security; ConstraintMapping mapping = new ConstraintMapping(); mapping.setPathSpec("/*"); Constraint dc = new Constraint(); dc.setDataConstraint(Constraint.DC_CONFIDENTIAL); mapping.setConstraint(dc); constraint.addConstraintMapping(mapping); } else {
Constraint constraint = mapping.getConstraint(); boolean forbidden = constraint.isForbidden(); ri.setForbidden(forbidden); UserDataConstraint userDataConstraint = UserDataConstraint.get(mapping.getConstraint().getDataConstraint()); ri.setUserDataConstraint(userDataConstraint); boolean checked = mapping.getConstraint().getAuthenticate(); ri.setChecked(checked); if (mapping.getConstraint().isAnyRole()) ri.setAnyRole(true); else if (mapping.getConstraint().isAnyAuth()) String[] newRoles = mapping.getConstraint().getRoles(); for (String role : newRoles)
public static Constraint createConstraint() { return new Constraint(); }
if (m.getConstraint().getName()!=null) out.tag("web-resource-name",m.getConstraint().getName()); if (m.getPathSpec()!=null) out.tag("url-pattern",origin(md,"constraint.url."+m.getPathSpec()),m.getPathSpec()); if (m.getMethod()!=null) if (m.getConstraint().getAuthenticate()) String[] roles = m.getConstraint().getRoles(); if (roles!=null && roles.length>0) if (m.getConstraint().getRoles()!=null) for (String r : m.getConstraint().getRoles()) out.tag("role-name",r); out.closeTag(); switch (m.getConstraint().getDataConstraint())
protected void configureTraceMethod(ConstraintSecurityHandler securityHandler, boolean enableTrace) { Constraint constraint = new Constraint(); constraint.setName("trace-security"); //If enableTrace is true, then we want to set authenticate to false to allow it constraint.setAuthenticate(!enableTrace); ConstraintMapping mapping = new ConstraintMapping(); mapping.setConstraint(constraint); mapping.setMethod("TRACE"); mapping.setPathSpec("/"); securityHandler.addConstraintMapping(mapping); }
private void initAuthentication(String pathSpec, String authName) { authType = authName; Constraint constraint = new Constraint(); if (authName == null) { authName = Constraint.__BASIC_AUTH; } constraint.setName(authName); constraint.setRoles(new String[]{"users"}); constraint.setAuthenticate(true); ConstraintMapping cm = new ConstraintMapping(); cm.setConstraint(constraint); cm.setPathSpec(pathSpec); securityHandler.setRealmName("Test Server"); securityHandler.setAuthMethod(authName); securityHandler.setConstraintMappings(new ConstraintMapping[]{cm}); loginService = new HashLoginService("Test Server"); securityHandler.setLoginService(loginService); webappContext.setSecurityHandler(securityHandler); }