private SecurityService chooseSecurityService(final ActionReport report) { config = CLIUtil.chooseConfig(domain, target, report); if (config == null) { return null; } return config.getSecurityService(); } }
@Override public boolean preAuthorization(AdminCommandContext context) { securityService = chooseSecurityService(context.getActionReport()); return (securityService != null); }
@Override public boolean preAuthorization(AdminCommandContext context) { securityService = chooseSecurityService(context.getActionReport()); return true; }
private void configure(StringBuilder sb) throws TransactionFailure, PropertyVetoException { Server s = ConfigBeansUtilities.getServerNamed(ADMIN_SERVER); String ac = s.getConfigRef(); Config asc = null; //admin server config, that needs the configuration for (Config cfg : allConfigs.getConfig()) { if (cfg.getName().equals(ac)) { asc = cfg; break; } } //following things should happen transactionally - TODO replace SingleConfigCode by ConfigCode ... //createBackupRealm(sb, getAdminRealm(asc.getSecurityService()), getNewRealmName(asc.getSecurityService())); deleteRealm(asc.getSecurityService(), sb); createRealm(asc.getSecurityService(), sb); configureAdminService(asc.getAdminService()); //configure(asc.getSecurityService(), asc.getAdminService(), sb); }
@Override public boolean preAuthorization(AdminCommandContext context) { config = CLIUtil.chooseConfig(domain, target, context.getActionReport()); if (config == null) { return false; } securityService = config.getSecurityService(); if ( ! ensureRealmIsNew(context.getActionReport())) { return false; } return true; }
@Override public boolean preAuthorization(AdminCommandContext context) { config = CLIUtil.chooseConfig(domain, target, context.getActionReport()); if (config == null) { return false; } securityService = config.getSecurityService(); authRealm = findRealm(); if (authRealm == null) { final ActionReport report = context.getActionReport(); report.setMessage(localStrings.getLocalString( "delete.auth.realm.notfound", "Authrealm named {0} not found", authRealmName)); report.setActionExitCode(ActionReport.ExitCode.FAILURE); } return (authRealm != null); }
@Override public boolean preAuthorization(AdminCommandContext context) { config = CLIUtil.chooseConfig(domain, target, context.getActionReport()); if (config == null) { return false; } securityService = config.getSecurityService(); JaccProvider jaccProvider = CLIUtil.findJaccProvider(securityService, jaccProviderName); if (jaccProvider != null) { final ActionReport report = context.getActionReport(); report.setMessage(localStrings.getLocalString( "create.jacc.provider.duplicatefound", "JaccProvider named {0} exists. Cannot add duplicate JaccProvider.", jaccProviderName)); report.setActionExitCode(ActionReport.ExitCode.FAILURE); return false; } return true; }
@Override public boolean preAuthorization(AdminCommandContext context) { config = CLIUtil.chooseConfig(domain, target, context.getActionReport()); if (config == null) { return false; } secService = config.getSecurityService(); msgSecCfg = CLIUtil.findMessageSecurityConfig(secService, authLayer); if (msgSecCfg == null) { final ActionReport report = context.getActionReport(); report.setMessage(localStrings.getLocalString( "delete.message.security.provider.confignotfound", "A Message security config does not exist for the layer {0}", authLayer)); report.setActionExitCode(ActionReport.ExitCode.FAILURE); return false; } return true; }
@Override public boolean preAuthorization(AdminCommandContext context) { config = CLIUtil.chooseConfig(domain, target, context.getActionReport()); if (config == null) { return false; } securityService = config.getSecurityService(); fileAuthRealm = CLIUtil.findRealm(securityService, authRealmName); if (fileAuthRealm == null) { final ActionReport report = context.getActionReport(); report.setMessage(localStrings.getLocalString( "list.file.user.filerealmnotfound", "File realm {0} does not exist", authRealmName)); report.setActionExitCode(ActionReport.ExitCode.FAILURE); return false; } /* * The realm might have been defaulted, so capture the actual name. */ authRealmName = fileAuthRealm.getName(); return true; }
/** * Executes the command with the command parameters passed as Properties * where the keys are paramter names and the values the parameter values * * @param context information */ public void execute(AdminCommandContext context) { final ActionReport report = context.getActionReport(); try { domainPasswordAliasStore.remove(aliasName); } catch (Exception ex) { ex.printStackTrace(); reportFailure(report, ex); return; } report.setActionExitCode(ActionReport.ExitCode.SUCCESS); /*report.setMessage(localStrings.getLocalString( "delete.password.alias.success", "Password alias for the alias {0} deleted successfully", aliasName));*/ }
@Override public boolean preAuthorization(AdminCommandContext context) { auditModule = chooseAuditModule(context.getActionReport()); return true; }
private boolean ensureRealmIsNew(final ActionReport report){ if ( ! CLIUtil.isRealmNew(securityService, authRealmName)) { report.setMessage(localStrings.getLocalString( "create.auth.realm.duplicatefound", "Authrealm named {0} exists. Cannot add duplicate AuthRealm.", authRealmName)); report.setActionExitCode(ActionReport.ExitCode.FAILURE); return false; } return true; } }
private SecurityService chooseSecurityService(final ActionReport report) { config = CLIUtil.chooseConfig(domain, target, report); if (config == null) { return null; } return config.getSecurityService(); }
@Override public boolean preAuthorization(AdminCommandContext context) { final ActionReport report = context.getActionReport(); try { if ( ! domainPasswordAliasStore.containsKey(aliasName)) { report.setMessage(localStrings.getLocalString( "delete.password.alias.notfound", "Password alias for the alias {0} does not exist.", aliasName)); report.setActionExitCode(ActionReport.ExitCode.FAILURE); return false; } } catch (Exception ex) { reportFailure(context.getActionReport(), ex); return false; } return true; }
@Override public boolean preAuthorization(AdminCommandContext context) { config = CLIUtil.chooseConfig(domain, target, context.getActionReport()); if (config == null) { return false; } secService = config.getSecurityService(); return true; }
@Override public boolean preAuthorization(AdminCommandContext context) { final ActionReport report = context.getActionReport(); config = CLIUtil.chooseConfig(domain, target, report); if (config == null) { return false; } securityService = config.getSecurityService(); return true; }
@Override public boolean preAuthorization(AdminCommandContext context) { config = CLIUtil.chooseConfig(domain, target, context.getActionReport()); if (config == null) { return false; } secService = config.getSecurityService(); return true; }
@Override public boolean preAuthorization(AdminCommandContext context) { config = CLIUtil.chooseConfig(domain, target, context.getActionReport()); if (config == null) { return false; } securityService = config.getSecurityService(); return true; }
static Config chooseConfig(final Domain domain, final String target, final ActionReport report) { final Config config = chooseConfig(domain, target); if (config == null) { report.setMessage(localStrings.getLocalString( "util.noconfigfortarget", "Configuration for target {0} not found.", target)); report.setActionExitCode(ActionReport.ExitCode.FAILURE); } return config; }
private AuditModule chooseAuditModule(final ActionReport report) { config = CLIUtil.chooseConfig(domain, target, report); if (config == null) { return null; } securityService = config.getSecurityService(); for (AuditModule am : securityService.getAuditModule()) { if (am.getName().equals(auditModuleName)) { return am; } } return null; } }