userStore.addUser(username, Credential.getCredential(password), new String[]{"user"}); HashLoginService l = new HashLoginService(); l.setUserStore(userStore); l.setName(realm); Constraint constraint = new Constraint(); constraint.setName(Constraint.__BASIC_AUTH); constraint.setRoles(new String[]{"user"}); constraint.setAuthenticate(true); Constraint noConstraint = new Constraint();
String obfuscated = Password.obfuscate( password ); System.out.println( obfuscated ); System.exit( 0 );
/** * Generate constraints for the Flume HTTP Source * @return ConstraintSecurityHandler for use with Jetty servlet */ public static ConstraintSecurityHandler enforceConstraints() { Constraint c = new Constraint(); c.setAuthenticate(true); ConstraintMapping cmt = new ConstraintMapping(); cmt.setConstraint(c); cmt.setMethod("TRACE"); cmt.setPathSpec("/*"); ConstraintMapping cmo = new ConstraintMapping(); cmo.setConstraint(c); cmo.setMethod("OPTIONS"); cmo.setPathSpec("/*"); ConstraintSecurityHandler sh = new ConstraintSecurityHandler(); sh.setConstraintMappings(new ConstraintMapping[]{cmt, cmo}); return sh; } }
Constraint scBase = new Constraint(); scBase.setAuthenticate(true); roles.add(role); scBase.setRoles(roles.toArray(new String[roles.size()])); String guarantee = data.toString(false, true).toUpperCase(Locale.ENGLISH); if (guarantee == null || guarantee.length() == 0 || "NONE".equals(guarantee)) scBase.setDataConstraint(Constraint.DC_NONE); else if ("INTEGRAL".equals(guarantee)) scBase.setDataConstraint(Constraint.DC_INTEGRAL); else if ("CONFIDENTIAL".equals(guarantee)) scBase.setDataConstraint(Constraint.DC_CONFIDENTIAL); else scBase.setDataConstraint(Constraint.DC_CONFIDENTIAL); Constraint sc = (Constraint) scBase.clone(); sc.setName(name);
if(auth) LoklakInstallation.server.addBean(loginService); Constraint constraint = new Constraint(); if(redirect) constraint.setDataConstraint(Constraint.DC_CONFIDENTIAL); if(auth){ constraint.setAuthenticate(true); constraint.setRoles(new String[] { "user", "admin" });
public static Constraint createConstraint() { return new Constraint(); }
/** * Creates a new Password object. * * @param password the password string * @return the new Password object */ public Password newPassword(String password) { return new Password(password); }
/** * Returns the password object for the given realm. * * @param realm the realm * @return the Password object */ protected Password getPassword(String realm) { return Password.getPassword(realm, null, null); }
public boolean authenticate(Object credentials) { return _credential!=null && _credential.check(credentials); }
public static String crypt(String user, String pw) { return __TYPE + UnixCrypt.crypt(pw, user); } }
@Override public boolean equals(Object credential) { if (!(credential instanceof Crypt)) return false; Crypt c = (Crypt)credential; return stringEquals(_cooked, c._cooked); }
@Override public boolean equals(Object obj) { if (obj instanceof MD5) return byteEquals(_digest, ((MD5)obj)._digest); return false; }
@Override public boolean equals(Object o) { if (this == o) return true; if (null == o) return false; if (o instanceof Password) return stringEquals(_pw, ((Password)o)._pw); if (o instanceof String) return stringEquals(_pw, (String)o); return false; }
private static void addAuthHandler(Server server, String auth, LoginAuthenticator authenticator, Handler handler) { server.addBean(LOGIN_SERVICE); Constraint constraint = new Constraint(); constraint.setName(auth); constraint.setRoles(new String[]{USER, ADMIN}); constraint.setAuthenticate(true); ConstraintMapping mapping = new ConstraintMapping(); mapping.setConstraint(constraint); mapping.setPathSpec("/*"); Set<String> knownRoles = new HashSet<>(); knownRoles.add(USER); knownRoles.add(ADMIN); List<ConstraintMapping> cm = new ArrayList<>(); cm.add(mapping); ConstraintSecurityHandler security = new ConstraintSecurityHandler(); security.setConstraintMappings(cm, knownRoles); security.setAuthenticator(authenticator); security.setLoginService(LOGIN_SERVICE); security.setHandler(handler); server.setHandler(security); }
/** * Add constraints to a Jetty Context to disallow undesirable Http methods. * @param ctxHandler The context to modify * @param allowOptionsMethod if true then OPTIONS method will not be set in constraint mapping */ public static void constrainHttpMethods(ServletContextHandler ctxHandler, boolean allowOptionsMethod) { Constraint c = new Constraint(); c.setAuthenticate(true); ConstraintMapping cmt = new ConstraintMapping(); cmt.setConstraint(c); cmt.setMethod("TRACE"); cmt.setPathSpec("/*"); ConstraintSecurityHandler securityHandler = new ConstraintSecurityHandler(); if (!allowOptionsMethod) { ConstraintMapping cmo = new ConstraintMapping(); cmo.setConstraint(c); cmo.setMethod("OPTIONS"); cmo.setPathSpec("/*"); securityHandler.setConstraintMappings(new ConstraintMapping[] { cmt, cmo }); } else { securityHandler.setConstraintMappings(new ConstraintMapping[] { cmt }); } ctxHandler.setSecurityHandler(securityHandler); }
/** * @param password * The password for the trust store */ public void setTrustStorePassword(String password) { _trustStorePassword = Password.getPassword(PASSWORD_PROPERTY,password,null); }
HashLoginService loginService = new HashLoginService(); loginService.putUser(properties.getProperty("eventhubhandler.username"), new Password(properties.getProperty("eventhubhandler.password")), new String[]{"user"}); Constraint constraint = new Constraint(); constraint.setName("auth"); constraint.setAuthenticate( true ); constraint.setRoles(new String[] { "user", "admin" }); ConstraintMapping mapping = new ConstraintMapping(); mapping.setPathSpec( "/*" );
if ( !Utils.isEmpty( slaveServer.getPassword() ) ) { hashLoginService = new HashLoginService( "Kettle" ); hashLoginService.putUser( slaveServer.getUsername(), new Password( slaveServer.getPassword() ), new String[] { "default" } ); } else { Constraint constraint = new Constraint(); constraint.setName( Constraint.__BASIC_AUTH ); constraint.setRoles( roles.toArray( new String[roles.size()] ) ); constraint.setAuthenticate( true );
contextHandler.insertHandler(securityHandler); final Constraint constraint = new Constraint(); constraint.setName("auth"); constraint.setAuthenticate(true); constraint.setRoles(roles.split(","));