/** Helper method for creating a proper {@link SecurityConfigException} object */ protected SecurityConfigException createSecurityException(String errorid, Object... args) { return new SecurityConfigException(errorid, args); } }
void handleException(Exception e, Component target) { Serializable msg = null; if (e instanceof SecurityConfigException) { SecurityConfigException sce = (SecurityConfigException)e; msg = new StringResourceModel("security."+sce.getId(),null,sce.getArgs()).getObject(); } else { msg = e; } (target != null ? target : getPage()).error(msg); }
getSecurityManager().saveAuthenticationProvider(config); } catch (SecurityConfigException ex) { assertEquals( DRIVER_CLASSNAME_REQUIRED,ex.getId()); assertEquals(0,ex.getArgs().length); LOGGER.info(ex.getMessage()); fail=true; getSecurityManager().saveAuthenticationProvider(config); } catch (SecurityConfigException ex) { assertEquals( DRIVER_CLASS_NOT_FOUND_$1,ex.getId()); assertEquals("a.b.c",ex.getArgs()[0]); LOGGER.info(ex.getMessage()); fail=true; getSecurityManager().saveAuthenticationProvider(config); } catch (SecurityConfigException ex) { assertEquals( JDBCURL_REQUIRED,ex.getId()); assertEquals(0,ex.getArgs().length); LOGGER.info(ex.getMessage()); fail=true;
void handleException(Exception e, Component target) { Serializable msg = null; if (e instanceof SecurityConfigException) { SecurityConfigException sce = (SecurityConfigException)e; msg = new StringResourceModel("security."+sce.getErrorId(),null,sce.getArgs()).getObject(); } else { msg = e; } (target != null ? target : getPage()).error(msg); }
void handleException(Exception e, Component target) { Serializable msg = null; if (e instanceof SecurityConfigException) { SecurityConfigException sce = (SecurityConfigException) e; msg = new StringResourceModel("security." + sce.getId()) .setParameters(sce.getArgs()) .getObject(); } else { msg = e; } (target != null ? target : getPage()).error(msg); }
getSecurityManager().saveUserGroupService(configJNDI); } catch (SecurityConfigException ex) { assertEquals(JNDINAME_REQUIRED,ex.getId()); assertEquals(0,ex.getArgs().length); LOGGER.info(ex.getMessage()); fail=true; getSecurityManager().saveUserGroupService(config); } catch (SecurityConfigException ex) { assertEquals( DRIVER_CLASSNAME_REQUIRED,ex.getId()); assertEquals(0,ex.getArgs().length); LOGGER.info(ex.getMessage()); fail=true; getSecurityManager().saveUserGroupService(config); } catch (SecurityConfigException ex) { assertEquals( USERNAME_REQUIRED,ex.getId()); assertEquals(0,ex.getArgs().length); LOGGER.info(ex.getMessage()); fail=true; getSecurityManager().saveUserGroupService(config); } catch (SecurityConfigException ex) { assertEquals( JDBCURL_REQUIRED,ex.getId()); assertEquals(0,ex.getArgs().length); LOGGER.info(ex.getMessage()); fail=true; getSecurityManager().saveUserGroupService(config);
@Override @Test public void testAuthenticationProvider() throws IOException { super.testAuthenticationProvider(); SecurityAuthProviderConfig config = createAuthConfig("default2", UsernamePasswordAuthenticationProvider.class, null); XMLSecurityConfigValidator validator = new XMLSecurityConfigValidator(getSecurityManager()); try { // getSecurityManager().saveAuthenticationProvider(config/*, false*/); validator.validateAddAuthProvider(config); fail("no user group service should fail"); } catch (SecurityConfigException ex) { assertEquals(USERGROUP_SERVICE_REQUIRED, ex.getId()); assertEquals(0, ex.getArgs().length); } } }
getSecurityManager().saveRoleService(configJNDI); } catch (SecurityConfigException ex) { assertEquals( JNDINAME_REQUIRED,ex.getId()); assertEquals(0,ex.getArgs().length); LOGGER.info(ex.getMessage()); fail=true; getSecurityManager().saveRoleService(config); } catch (SecurityConfigException ex) { assertEquals( DRIVER_CLASSNAME_REQUIRED,ex.getId()); assertEquals(0,ex.getArgs().length); LOGGER.info(ex.getMessage()); fail=true; getSecurityManager().saveRoleService(config); } catch (SecurityConfigException ex) { assertEquals( USERNAME_REQUIRED,ex.getId()); assertEquals(0,ex.getArgs().length); LOGGER.info(ex.getMessage()); fail=true; getSecurityManager().saveRoleService(config); } catch (SecurityConfigException ex) { assertEquals( JDBCURL_REQUIRED,ex.getId()); assertEquals(0,ex.getArgs().length); LOGGER.info(ex.getMessage()); fail=true; getSecurityManager().saveRoleService(config);
/** * Get the proper {@link SecurityConfigValidator} object * * @param serviceClass * @param className */ public static SecurityConfigValidator getConfigurationValiator( Class<?> serviceClass, String className) throws SecurityConfigException { if (className == null) throw new SecurityConfigException(CLASSNAME_REQUIRED, new Object[] {}); GeoServerSecurityProvider prov = GeoServerSecurityProvider.getProvider(serviceClass, className); if (prov == null) { throw new SecurityConfigException(CLASS_NOT_FOUND, new Object[] {className}); } // TODO: remove the call to extensions, have teh security manager be passed in return prov.createConfigurationValidator( GeoServerExtensions.bean(GeoServerSecurityManager.class)); }
assertEquals(USERGROUP_SERVICE_NOT_FOUND_$1, ex.getId()); assertEquals("default2", ex.getArgs()[0]); assertEquals(USERGROUP_SERVICE_NOT_FOUND_$1, ex.getId()); assertEquals("default2", ex.getArgs()[0]); assertEquals(NAME_REQUIRED, ex.getId()); assertEquals(0, ex.getArgs().length); assertEquals(AUTH_PROVIDER_ACTIVE_$1, ex.getId()); assertEquals(GeoServerAuthenticationProvider.DEFAULT_NAME, ex.getArgs()[0]);
assertEquals(CHECK_INTERVAL_INVALID, ex.getId()); assertEquals(0, ex.getArgs().length); assertEquals(CHECK_INTERVAL_INVALID, ex.getId()); assertEquals(0, ex.getArgs().length); fail("Should work but got: " + ex.getMessage()); assertEquals(FILE_CREATE_FAILED_$1, ex.getId()); assertEquals(invalidPath, ex.getArgs()[0]); fail("Should work but got: " + ex.getMessage()); assertEquals(ROLE_SERVICE_NOT_EMPTY_$1, ex.getId()); assertEquals("test2", ex.getArgs()[0]); assertEquals(FILENAME_CHANGE_INVALID_$2, ex.getId()); assertEquals("testModify.xml", ex.getArgs()[0]); assertEquals("xyz.xml", ex.getArgs()[1]);
fail(); } catch (SecurityConfigException ex) { assertEquals(DRIVER_CLASSNAME_REQUIRED, ex.getId()); assertEquals(0, ex.getArgs().length); fail(); } catch (SecurityConfigException ex) { assertEquals(DRIVER_CLASS_NOT_FOUND_$1, ex.getId()); assertEquals("a.b.c", ex.getArgs()[0]); fail(); } catch (SecurityConfigException ex) { assertEquals(JDBCURL_REQUIRED, ex.getId()); assertEquals(0, ex.getArgs().length);
assertEquals(CHECK_INTERVAL_INVALID, ex.getId()); assertEquals(0, ex.getArgs().length); assertEquals(CHECK_INTERVAL_INVALID, ex.getId()); assertEquals(0, ex.getArgs().length); Assert.fail("Should work but got: " + ex.getMessage()); Assert.fail("Should work but got: " + ex.getMessage()); assertEquals(FILENAME_REQUIRED, ex.getId()); assertEquals(0, ex.getArgs().length); assertEquals(FILE_CREATE_FAILED_$1, ex.getId()); assertEquals(invalidPath, ex.getArgs()[0]); fail("Should work but got: " + ex.getMessage()); assertEquals(USERGROUP_SERVICE_NOT_EMPTY_$1, ex.getId()); assertEquals("test2", ex.getArgs()[0]); Assert.fail("Should work but got: " + ex.getMessage()); Assert.fail("Should work but got: " + ex.getMessage()); assertEquals(FILENAME_CHANGE_INVALID_$2, ex.getId()); assertEquals("testModify.xml", ex.getArgs()[0]); assertEquals("xyz.xml", ex.getArgs()[1]);
assertEquals(INVALID_MIN_LENGTH, ex.getId()); assertEquals(0, ex.getArgs().length); assertEquals(INVALID_MIN_LENGTH, ex.getId()); assertEquals(0, ex.getArgs().length); getSecurityManager().savePasswordPolicy(config); } catch (SecurityConfigException ex) { assertEquals(INVALID_MAX_LENGTH, ex.getId()); assertEquals(0, ex.getArgs().length); fail("invalid max length should fail"); } catch (SecurityConfigException ex) { assertEquals(INVALID_MAX_LENGTH, ex.getId()); assertEquals(0, ex.getArgs().length); assertEquals(NAME_REQUIRED, ex.getId()); assertEquals(0, ex.getArgs().length); assertEquals(PASSWD_POLICY_ACTIVE_$2, ex.getId()); assertEquals(PasswordValidator.DEFAULT_NAME, ex.getArgs()[0]); assertEquals(XMLUserGroupService.DEFAULT_NAME, ex.getArgs()[1]); assertEquals(PASSWD_POLICY_MASTER_DELETE, ex.getId()); assertEquals(0, ex.getArgs().length);
assertEquals(NAME_REQUIRED, ex.getId()); assertEquals(0, ex.getArgs().length); assertEquals(RESERVED_ROLE_NAME, ex.getId()); assertEquals(role.getAuthority(), ex.getArgs()[0]); assertEquals(RESERVED_ROLE_NAME, ex.getId()); assertEquals(role.getAuthority(), ex.getArgs()[0]); assertEquals(ROLE_SERVICE_ACTIVE_$1, ex.getId()); assertEquals(XMLRoleService.DEFAULT_NAME, ex.getArgs()[0]);
fail("unknown class should fail"); } catch (SecurityConfigException ex) { assertEquals(ex.getId(), CLASS_NOT_FOUND_$1); assertEquals(ex.getArgs()[0], "a.b.c"); fail("wrong class should fail"); } catch (SecurityConfigException ex) { assertEquals(ex.getId(), CLASS_WRONG_TYPE_$2); assertEquals(ex.getArgs()[0], ep); assertEquals(ex.getArgs()[1], "java.lang.String"); fail("no class should fail"); } catch (SecurityConfigException ex) { assertEquals(ex.getId(), CLASSNAME_REQUIRED); assertEquals(0, ex.getArgs().length); fail("no name should fail"); } catch (SecurityConfigException ex) { assertEquals(ex.getId(), NAME_REQUIRED); assertEquals(0, ex.getArgs().length); fail("passwd policy already exists should fail"); } catch (SecurityConfigException ex) { assertEquals(PASSWD_POLICY_ALREADY_EXISTS_$1, ex.getId()); assertEquals(ex.getArgs()[0], PasswordValidator.DEFAULT_NAME); fail("unknown passwd policy should fail"); } catch (SecurityConfigException ex) { assertEquals(PASSWD_POLICY_NOT_FOUND_$1, ex.getId());
fail("invalid password encoder should fail"); } catch (SecurityConfigException ex) { assertEquals(INVALID_PASSWORD_ENCODER_$1, ex.getId()); fail("no password encoder should fail"); } catch (SecurityConfigException ex) { assertEquals(PASSWORD_ENCODER_REQUIRED, ex.getId()); fail("invalid strong password encoder should fail"); } catch (SecurityConfigException ex) { assertEquals(INVALID_STRONG_CONFIG_PASSWORD_ENCODER, ex.getId()); fail("unknown role service should fail"); } catch (SecurityConfigException ex) { assertEquals(ROLE_SERVICE_NOT_FOUND_$1, ex.getId()); fail("null role service should fail"); } catch (SecurityConfigException ex) { assertEquals(ROLE_SERVICE_NOT_FOUND_$1, ex.getId()); fail("unknown auth provider should fail"); } catch (SecurityConfigException ex) { assertEquals(AUTH_PROVIDER_NOT_FOUND_$1, ex.getId()); fail("chain with no name should fail"); } catch (SecurityConfigException ex) { assertEquals(FILTER_CHAIN_NAME_MANDATORY, ex.getId()); assertEquals(0, ex.getArgs().length);
assertEquals(INVALID_CONFIG_PASSWORD_ENCODER_$1, ex.getId()); assertEquals("xxx", ex.getArgs()[0]); assertEquals(INVALID_STRONG_PASSWORD_ENCODER, ex.getId()); assertEquals(INVALID_CONFIG_PASSWORD_ENCODER_$1, ex.getId()); assertEquals("xxx", ex.getArgs()[0]); assertEquals(PASSWD_ENCODER_REQUIRED_$1, ex.getId()); assertEquals("default2", ex.getArgs()[0]); fail("no password encoder should fail"); } catch (SecurityConfigException ex) { assertEquals(PASSWD_ENCODER_REQUIRED_$1, ex.getId()); assertEquals("default3", ex.getArgs()[0]); assertEquals(PASSWD_POLICY_NOT_FOUND_$1, ex.getId()); assertEquals("default2", ex.getArgs()[0]); assertEquals(PASSWD_POLICY_NOT_FOUND_$1, ex.getId()); assertEquals("default2", ex.getArgs()[0]); fail("no password policy should fail"); } catch (SecurityConfigException ex) { assertEquals(PASSWD_POLICY_REQUIRED_$1, ex.getId()); assertEquals("default2", ex.getArgs()[0]); assertEquals(PASSWD_POLICY_REQUIRED_$1, ex.getId()); assertEquals("default3", ex.getArgs()[0]);
assertEquals(JNDINAME_REQUIRED, ex.getId()); assertEquals(0, ex.getArgs().length); assertEquals(DRIVER_CLASSNAME_REQUIRED, ex.getId()); assertEquals(0, ex.getArgs().length); assertEquals(USERNAME_REQUIRED, ex.getId()); assertEquals(0, ex.getArgs().length); assertEquals(JDBCURL_REQUIRED, ex.getId()); assertEquals(0, ex.getArgs().length); assertEquals(DRIVER_CLASS_NOT_FOUND_$1, ex.getId()); assertEquals("a.b.c", ex.getArgs()[0]); fail(); } catch (SecurityConfigException ex) { assertEquals(DML_FILE_REQUIRED, ex.getId()); assertEquals(0, ex.getArgs().length); fail(); } catch (SecurityConfigException ex) { assertEquals(DDL_FILE_INVALID, ex.getId()); assertEquals(invalidPath, ex.getArgs()[0]); fail(); } catch (SecurityConfigException ex) { assertEquals(DML_FILE_INVALID, ex.getId()); assertEquals(invalidPath, ex.getArgs()[0]);
fail(); } catch (SecurityConfigException ex) { assertEquals(JNDINAME_REQUIRED, ex.getId()); assertEquals(0, ex.getArgs().length); fail(); } catch (SecurityConfigException ex) { assertEquals(DRIVER_CLASSNAME_REQUIRED, ex.getId()); assertEquals(0, ex.getArgs().length); fail(); } catch (SecurityConfigException ex) { assertEquals(USERNAME_REQUIRED, ex.getId()); assertEquals(0, ex.getArgs().length); fail(); } catch (SecurityConfigException ex) { assertEquals(JDBCURL_REQUIRED, ex.getId()); assertEquals(0, ex.getArgs().length); fail(); } catch (SecurityConfigException ex) { assertEquals(DRIVER_CLASS_NOT_FOUND_$1, ex.getId()); assertEquals("a.b.c", ex.getArgs()[0]); fail(); } catch (SecurityConfigException ex) { assertEquals(DML_FILE_REQUIRED, ex.getId()); assertEquals(0, ex.getArgs().length);