Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance. Project price only 1 $
You can buy this project and download/modify it how often you want.
/*
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
*
* Copyright (c) 1997-2012 Oracle and/or its affiliates. All rights reserved.
*
* The contents of this file are subject to the terms of either the GNU
* General Public License Version 2 only ("GPL") or the Common Development
* and Distribution License("CDDL") (collectively, the "License"). You
* may not use this file except in compliance with the License. You can
* obtain a copy of the License at
* https://glassfish.dev.java.net/public/CDDL+GPL_1_1.html
* or packager/legal/LICENSE.txt. See the License for the specific
* language governing permissions and limitations under the License.
*
* When distributing the software, include this License Header Notice in each
* file and include the License file at packager/legal/LICENSE.txt.
*
* GPL Classpath Exception:
* Oracle designates this particular file as subject to the "Classpath"
* exception as provided by Oracle in the GPL Version 2 section of the License
* file that accompanied this code.
*
* Modifications:
* If applicable, add the following below the License Header, with the fields
* enclosed by brackets [] replaced by your own identifying information:
* "Portions Copyright [year] [name of copyright owner]"
*
* Contributor(s):
* If you wish your version of this file to be governed by only the CDDL or
* only the GPL Version 2, indicate your decision by adding "[Contributor]
* elects to include this software in this distribution under the [CDDL or GPL
* Version 2] license." If you don't indicate a single choice of license, a
* recipient has the option to distribute your version of this file under
* either the CDDL, the GPL Version 2 or to extend the choice of license to
* its licensees as provided above. However, if you add GPL Version 2 code
* and therefore, elected the GPL Version 2 license, then the option applies
* only if the new code is made subject to such option by the copyright
* holder.
*/
package org.glassfish.connectors.admin.cli;
import com.sun.enterprise.config.serverbeans.Domain;
import com.sun.enterprise.config.serverbeans.Resources;
import com.sun.enterprise.util.LocalStringManagerImpl;
import com.sun.enterprise.util.SystemPropertyConstants;
import org.glassfish.api.ActionReport;
import org.glassfish.api.I18n;
import org.glassfish.api.Param;
import org.glassfish.api.admin.AdminCommand;
import org.glassfish.api.admin.AdminCommandContext;
import org.glassfish.connectors.config.BackendPrincipal;
import org.glassfish.connectors.config.ConnectorConnectionPool;
import org.glassfish.connectors.config.SecurityMap;
import org.jvnet.hk2.annotations.Service;
import org.glassfish.hk2.api.PerLookup;
import org.jvnet.hk2.config.ConfigBeanProxy;
import org.jvnet.hk2.config.ConfigCode;
import org.jvnet.hk2.config.ConfigSupport;
import org.jvnet.hk2.config.TransactionFailure;
import java.beans.PropertyVetoException;
import java.util.ArrayList;
import java.util.Collection;
import java.util.List;
import org.glassfish.api.admin.RestEndpoint;
import org.glassfish.api.admin.RestEndpoints;
import jakarta.inject.Inject;
/**
* Update Connector SecurityMap command
*/
@Service(name="update-connector-security-map")
@PerLookup
@I18n("update.connector.security.map")
@RestEndpoints({
@RestEndpoint(configBean=Resources.class,
opType=RestEndpoint.OpType.POST,
path="update-connector-security-map",
description="update-connector-security-map")
})
public class UpdateConnectorSecurityMap extends ConnectorSecurityMap implements AdminCommand {
final private static LocalStringManagerImpl localStrings = new LocalStringManagerImpl(UpdateConnectorSecurityMap.class);
@Param(optional = true)
String target = SystemPropertyConstants.DEFAULT_SERVER_INSTANCE_NAME;
@Param(name="poolname")
String poolName;
@Param(name="addprincipals", optional=true)
List addPrincipals;
@Param(name="addusergroups", optional=true)
List addUserGroups;
@Param(name="removeprincipals", optional=true)
List removePrincipals;
@Param(name="removeusergroups", optional=true)
List removeUserGroups;
@Param(name="mappedusername", optional=true)
String mappedusername;
@Param(name="mappedpassword", password=true, optional=true)
String mappedpassword;
@Param(name="mapname", primary=true)
String securityMapName;
@Inject
private Domain domain;
/**
* Executes the command with the command parameters passed as Properties
* where the keys are the paramter names and the values the parameter values
*
* @param context information
*/
public void execute(AdminCommandContext context) {
final ActionReport report = context.getActionReport();
if (securityMapName == null) {
report.setMessage(localStrings.getLocalString("create.connector.security.map.noSecurityMapName",
"No security map name specified"));
report.setActionExitCode(ActionReport.ExitCode.FAILURE);
return;
}
Collection ccPools = domain.getResources().getResources(ConnectorConnectionPool.class);
if (!doesPoolNameExist(poolName, ccPools)) {
report.setMessage(localStrings.getLocalString("create.connector.security.map.noSuchPoolFound",
"Connector connection pool {0} does not exist. Please specify a valid pool name.", poolName));
report.setActionExitCode(ActionReport.ExitCode.FAILURE);
return;
}
if (!doesMapNameExist(poolName, securityMapName, ccPools)) {
report.setMessage(localStrings.getLocalString("update.connector.security.map.map_does_not_exist",
"Security map {0} does not exist for connector connection pool {1}. Please give a valid map name.",
securityMapName, poolName));
report.setActionExitCode(ActionReport.ExitCode.FAILURE);
return;
}
//get all the security maps for this pool.....
List maps = getAllSecurityMapsForPool(poolName, ccPools);
//check if addPrincipals and removePrincipals have the same value
if (addPrincipals != null && removePrincipals != null) {
for (String ap : addPrincipals) {
for (String rp : removePrincipals) {
if (rp.equals(ap)) {
report.setMessage(localStrings.getLocalString(
"update.connector.security.map.same_principal_values",
"This value {0} is given in both --addprincipals and --removeprincipals. The same value cannot given for these options.",
ap));
report.setActionExitCode(ActionReport.ExitCode.FAILURE);
return;
}
}
}
}
//check if addUserGroups and removeUserGroups have the same value
if (addUserGroups != null && removeUserGroups != null) {
for (String aug : addUserGroups) {
for (String rug : removeUserGroups) {
if (rug.equals(aug)) {
report.setMessage(localStrings.getLocalString(
"update.connector.security.map.same_usergroup_values",
"This value {0} is given in both --addusergroups and --removeusergroups. The same value cannot given for these options.",
aug));
report.setActionExitCode(ActionReport.ExitCode.FAILURE);
return;
}
}
}
}
// make sure that the principals to be added are not existing in any map ...
if (addPrincipals != null) {
for (String principal : addPrincipals) {
if (isPrincipalExisting(principal, maps)) {
report.setMessage(localStrings.getLocalString("create.connector.security.map.principal_exists",
"The principal {0} already exists in connector connection pool {1}. Please give a different principal name.",
principal, poolName));
report.setActionExitCode(ActionReport.ExitCode.FAILURE);
return;
}
}
}
// make sure that the user groups to be added are not existing in any map ...
if (addUserGroups != null) {
for (String userGroup : addUserGroups) {
if (isUserGroupExisting(userGroup, maps)) {
report.setMessage(localStrings.getLocalString("create.connector.security.map.usergroup_exists",
"The user-group {0} already exists in connector connection pool {1}. Please give a different user-group name.",
userGroup, poolName));
report.setActionExitCode(ActionReport.ExitCode.FAILURE);
return;
}
}
}
SecurityMap map = getSecurityMap(securityMapName, poolName, ccPools);
final List existingPrincipals = new ArrayList(map.getPrincipal());
final List existingUserGroups = new ArrayList(map.getUserGroup());
//check if there is any invalid principal in removePrincipals.
if (removePrincipals != null) {
boolean principalExists = true;
String principal = null;
for (String p : removePrincipals) {
if (!existingPrincipals.contains(p)) {
principalExists = false;
principal = p;
break;
}
}
if (!principalExists) {
report.setMessage(localStrings.getLocalString("update.connector.security.map.principal_does_not_exists",
"The principal {0} that you want to delete does not exist in connector connection pool {1}. Please give a valid principal name.",
principal, poolName));
report.setActionExitCode(ActionReport.ExitCode.FAILURE);
return;
}
}
//check if there is any invalid usergroup in removeUserGroups.
if (removeUserGroups != null) {
boolean userGroupExists = true;
String userGroup = null;
for (String ug : removeUserGroups) {
if (!existingUserGroups.contains(ug)) {
userGroupExists = false;
userGroup = ug;
break;
}
}
if (!userGroupExists) {
report.setMessage(localStrings.getLocalString("update.connector.security.map.usergroup_does_not_exists",
"The usergroup {0} that you want to delete does not exist in connector connection pool {1}. Please give a valid user-group name.",
userGroup, poolName));
report.setActionExitCode(ActionReport.ExitCode.FAILURE);
return;
}
}
//FIX : Bug 4914883.
//The user should not delete all principals and usergroups in the map.
// Atleast one principal or usergroup must exist.
if (addPrincipals == null && addUserGroups == null) {
boolean principalsEmpty = false;
boolean userGroupsEmpty = false;
if (removePrincipals == null && existingPrincipals.isEmpty()) {
principalsEmpty = true;
}
if (removeUserGroups == null && existingUserGroups.isEmpty()) {
userGroupsEmpty = true;
}
if ((removePrincipals != null) &&
(removePrincipals.size() == existingPrincipals.size())) {
principalsEmpty = true;
}
if ((removeUserGroups != null) &&
(removeUserGroups.size() == existingUserGroups.size())) {
userGroupsEmpty = true;
}
if (userGroupsEmpty && principalsEmpty) {
report.setMessage(localStrings.getLocalString("update.connector.security.map.principals_usergroups_will_be_null",
"The values in your command will delete all principals and usergroups. You cannot delete all principals and usergroups. Atleast one of them must exist."));
report.setActionExitCode(ActionReport.ExitCode.FAILURE);
return;
}
}
//add principals to the existingPrincipals arraylist.
if (addPrincipals != null) {
for (String principal : addPrincipals) {
if (!existingPrincipals.contains(principal)) {
existingPrincipals.add(principal);
} else {
report.setMessage(localStrings.getLocalString("create.connector.security.map.principal_exists",
"The principal {0} already exists in connector connection pool {1}. Please give a different principal name.",
principal, poolName));
report.setActionExitCode(ActionReport.ExitCode.FAILURE);
return;
}
}
}
//removing principals from existingPrincipals arraylist.
if (removePrincipals != null) {
for (String principal : removePrincipals) {
existingPrincipals.remove(principal);
}
}
//adding user-groups....
if (addUserGroups != null) {
for (String userGroup : addUserGroups) {
if (!existingUserGroups.contains(userGroup)) {
existingUserGroups.add(userGroup);
} else {
report.setMessage(localStrings.getLocalString("create.connector.security.map.usergroup_exists",
"The user-group {0} already exists in connector connection pool {1}. Please give a different user-group name.",
userGroup, poolName));
report.setActionExitCode(ActionReport.ExitCode.FAILURE);
return;
}
}
}
//removing user-groups....
if (removeUserGroups != null) {
for (String userGroup : removeUserGroups) {
existingUserGroups.remove(userGroup);
}
}
//ensure that only user-groups or only principals exist in the security map after considering add/remove user-groups/principals option in
//the update-connector-security-map command.
if (!hasOnlyPrincipalsOrOnlyUserGroups(report, existingPrincipals, existingUserGroups)) {
return;
}
BackendPrincipal backendPrincipal = map.getBackendPrincipal();
try {
ConfigSupport.apply(new ConfigCode() {
public Object run(ConfigBeanProxy... params) throws PropertyVetoException, TransactionFailure {
SecurityMap sm = (SecurityMap) params[0];
BackendPrincipal bp = (BackendPrincipal) params[1];
//setting the updated principal user-group arrays....
if (existingPrincipals != null) {
sm.getPrincipal().clear();
for (String principal : existingPrincipals) {
sm.getPrincipal().add(principal);
}
}
if (existingUserGroups != null) {
sm.getUserGroup().clear();
for (String userGroup : existingUserGroups) {
sm.getUserGroup().add(userGroup);
}
}
//updating the backend-principal.......
//get the backend principal for the given security map and pool...
if (mappedusername != null && !mappedusername.isEmpty()) {
bp.setUserName(mappedusername);
}
if (mappedpassword != null) {
if(mappedpassword.isEmpty()) {
bp.setPassword(null);
} else {
bp.setPassword(mappedpassword);
}
}
return sm;
}
}, map, backendPrincipal);
report.setActionExitCode(ActionReport.ExitCode.SUCCESS);
} catch (TransactionFailure tfe) {
Object params[] = {securityMapName, poolName};
report.setMessage(localStrings.getLocalString("update.connector.security.map.fail",
"Unable to update security map {0} for connector connection pool {1}.", params) +
" " + tfe.getLocalizedMessage());
report.setActionExitCode(ActionReport.ExitCode.FAILURE);
report.setFailureCause(tfe);
}
}
/**
* A security map can have either a set of principals or a set of
* user-groups but not a mix of both. Validation to check whether only
* principals are present in the security map or only user-groups are
* present in the security map.
*
* @param report ActionReport
* @param existingPrincipals principals
* @param existingUserGroups user-groups
* @return boolean true - if it is a homogeneous security map, false
* otherwise.
*/
private boolean hasOnlyPrincipalsOrOnlyUserGroups(ActionReport report,
List existingPrincipals, List existingUserGroups) {
if (existingPrincipals.isEmpty() && addPrincipals != null) {
report.setMessage(localStrings.getLocalString("update.connector.security.map."
+ "addPrincipalToExistingUserGroupsWorkSecurityMap",
"Failed to add principals to a security map with user groups."));
report.setActionExitCode(ActionReport.ExitCode.FAILURE);
return false;
}
if (existingUserGroups.isEmpty() && addUserGroups != null) {
report.setMessage(localStrings.getLocalString("update.connector.security.map."
+ "addUserGroupsToExistingPrincipalsWorkSecurityMap",
"Failed to add user groups to a security map with principals."));
report.setActionExitCode(ActionReport.ExitCode.FAILURE);
return false;
}
return true;
}
}