All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.wildfly.swarm.config.security.security_domain.ClassicJSSE Maven / Gradle / Ivy

package org.wildfly.swarm.config.security.security_domain;

import org.wildfly.swarm.config.runtime.AttributeDocumentation;
import org.wildfly.swarm.config.runtime.ResourceDocumentation;
import org.wildfly.swarm.config.runtime.SingletonResource;
import org.wildfly.swarm.config.runtime.Address;
import org.wildfly.swarm.config.runtime.ResourceType;
import org.wildfly.swarm.config.runtime.Implicit;
import java.beans.PropertyChangeSupport;
import java.beans.PropertyChangeListener;
import org.wildfly.swarm.config.runtime.ModelNodeBinding;
import java.util.Map;

/**
 * JSSE configuration. Configures attributes for keystores that can be used for
 * setting up SSL.
 */
@Address("/subsystem=security/security-domain=*/jsse=classic")
@ResourceType("jsse")
@Implicit
public class ClassicJSSE>
		implements
			org.wildfly.swarm.config.runtime.Keyed {

	private String key;
	private PropertyChangeSupport pcs;
	@AttributeDocumentation("Additional properties that may be necessary to configure JSSE.")
	private Map additionalProperties;
	@AttributeDocumentation("Comma separated list of cipher suites to enable on SSLSockets.")
	private String cipherSuites;
	@AttributeDocumentation("Preferred alias to use when the KeyManager chooses the client alias.")
	private String clientAlias;
	@AttributeDocumentation("Boolean attribute to indicate if client's certificates should also be authenticated on the server side.")
	private Boolean clientAuth;
	@AttributeDocumentation("JSEE Key Manager factory")
	private Map keyManager;
	@AttributeDocumentation("Configures a JSSE key store")
	private Map keystore;
	@AttributeDocumentation("Comma separated list of protocols to enable on SSLSockets.")
	private String protocols;
	@AttributeDocumentation("Preferred alias to use when the KeyManager chooses the server alias.")
	private String serverAlias;
	@AttributeDocumentation("Token to retrieve PrivateKeys from the KeyStore.")
	private String serviceAuthToken;
	@AttributeDocumentation("JSEE Trust Manager factory")
	private Map trustManager;
	@AttributeDocumentation("Configures a JSSE trust store")
	private Map truststore;

	public ClassicJSSE() {
		super();
		this.key = "classic";
		this.pcs = new PropertyChangeSupport(this);
	}

	public String getKey() {
		return this.key;
	}

	/**
	 * Adds a property change listener
	 */
	public void addPropertyChangeListener(PropertyChangeListener listener) {
		if (null == this.pcs)
			this.pcs = new PropertyChangeSupport(this);
		this.pcs.addPropertyChangeListener(listener);
	}

	/**
	 * Removes a property change listener
	 */
	public void removePropertyChangeListener(
			java.beans.PropertyChangeListener listener) {
		if (this.pcs != null)
			this.pcs.removePropertyChangeListener(listener);
	}

	/**
	 * Additional properties that may be necessary to configure JSSE.
	 */
	@ModelNodeBinding(detypedName = "additional-properties")
	public Map additionalProperties() {
		return this.additionalProperties;
	}

	/**
	 * Additional properties that may be necessary to configure JSSE.
	 */
	@SuppressWarnings("unchecked")
	public T additionalProperties(java.util.Map value) {
		Object oldValue = this.additionalProperties;
		this.additionalProperties = value;
		if (this.pcs != null)
			this.pcs.firePropertyChange("additionalProperties", oldValue, value);
		return (T) this;
	}

	/**
	 * Additional properties that may be necessary to configure JSSE.
	 */
	@SuppressWarnings("unchecked")
	public T additionalProperty(java.lang.String key, java.lang.Object value) {
		if (this.additionalProperties == null) {
			this.additionalProperties = new java.util.HashMap<>();
		}
		this.additionalProperties.put(key, value);
		return (T) this;
	}

	/**
	 * Comma separated list of cipher suites to enable on SSLSockets.
	 */
	@ModelNodeBinding(detypedName = "cipher-suites")
	public String cipherSuites() {
		return this.cipherSuites;
	}

	/**
	 * Comma separated list of cipher suites to enable on SSLSockets.
	 */
	@SuppressWarnings("unchecked")
	public T cipherSuites(java.lang.String value) {
		Object oldValue = this.cipherSuites;
		this.cipherSuites = value;
		if (this.pcs != null)
			this.pcs.firePropertyChange("cipherSuites", oldValue, value);
		return (T) this;
	}

	/**
	 * Preferred alias to use when the KeyManager chooses the client alias.
	 */
	@ModelNodeBinding(detypedName = "client-alias")
	public String clientAlias() {
		return this.clientAlias;
	}

	/**
	 * Preferred alias to use when the KeyManager chooses the client alias.
	 */
	@SuppressWarnings("unchecked")
	public T clientAlias(java.lang.String value) {
		Object oldValue = this.clientAlias;
		this.clientAlias = value;
		if (this.pcs != null)
			this.pcs.firePropertyChange("clientAlias", oldValue, value);
		return (T) this;
	}

	/**
	 * Boolean attribute to indicate if client's certificates should also be
	 * authenticated on the server side.
	 */
	@ModelNodeBinding(detypedName = "client-auth")
	public Boolean clientAuth() {
		return this.clientAuth;
	}

	/**
	 * Boolean attribute to indicate if client's certificates should also be
	 * authenticated on the server side.
	 */
	@SuppressWarnings("unchecked")
	public T clientAuth(java.lang.Boolean value) {
		Object oldValue = this.clientAuth;
		this.clientAuth = value;
		if (this.pcs != null)
			this.pcs.firePropertyChange("clientAuth", oldValue, value);
		return (T) this;
	}

	/**
	 * JSEE Key Manager factory
	 */
	@ModelNodeBinding(detypedName = "key-manager")
	public Map keyManager() {
		return this.keyManager;
	}

	/**
	 * JSEE Key Manager factory
	 */
	@SuppressWarnings("unchecked")
	public T keyManager(java.util.Map value) {
		Object oldValue = this.keyManager;
		this.keyManager = value;
		if (this.pcs != null)
			this.pcs.firePropertyChange("keyManager", oldValue, value);
		return (T) this;
	}

	/**
	 * JSEE Key Manager factory
	 */
	@SuppressWarnings("unchecked")
	public T keyManager(java.lang.String key, java.lang.Object value) {
		if (this.keyManager == null) {
			this.keyManager = new java.util.HashMap<>();
		}
		this.keyManager.put(key, value);
		return (T) this;
	}

	/**
	 * Configures a JSSE key store
	 */
	@ModelNodeBinding(detypedName = "keystore")
	public Map keystore() {
		return this.keystore;
	}

	/**
	 * Configures a JSSE key store
	 */
	@SuppressWarnings("unchecked")
	public T keystore(java.util.Map value) {
		Object oldValue = this.keystore;
		this.keystore = value;
		if (this.pcs != null)
			this.pcs.firePropertyChange("keystore", oldValue, value);
		return (T) this;
	}

	/**
	 * Configures a JSSE key store
	 */
	@SuppressWarnings("unchecked")
	public T keystore(java.lang.String key, java.lang.Object value) {
		if (this.keystore == null) {
			this.keystore = new java.util.HashMap<>();
		}
		this.keystore.put(key, value);
		return (T) this;
	}

	/**
	 * Comma separated list of protocols to enable on SSLSockets.
	 */
	@ModelNodeBinding(detypedName = "protocols")
	public String protocols() {
		return this.protocols;
	}

	/**
	 * Comma separated list of protocols to enable on SSLSockets.
	 */
	@SuppressWarnings("unchecked")
	public T protocols(java.lang.String value) {
		Object oldValue = this.protocols;
		this.protocols = value;
		if (this.pcs != null)
			this.pcs.firePropertyChange("protocols", oldValue, value);
		return (T) this;
	}

	/**
	 * Preferred alias to use when the KeyManager chooses the server alias.
	 */
	@ModelNodeBinding(detypedName = "server-alias")
	public String serverAlias() {
		return this.serverAlias;
	}

	/**
	 * Preferred alias to use when the KeyManager chooses the server alias.
	 */
	@SuppressWarnings("unchecked")
	public T serverAlias(java.lang.String value) {
		Object oldValue = this.serverAlias;
		this.serverAlias = value;
		if (this.pcs != null)
			this.pcs.firePropertyChange("serverAlias", oldValue, value);
		return (T) this;
	}

	/**
	 * Token to retrieve PrivateKeys from the KeyStore.
	 */
	@ModelNodeBinding(detypedName = "service-auth-token")
	public String serviceAuthToken() {
		return this.serviceAuthToken;
	}

	/**
	 * Token to retrieve PrivateKeys from the KeyStore.
	 */
	@SuppressWarnings("unchecked")
	public T serviceAuthToken(java.lang.String value) {
		Object oldValue = this.serviceAuthToken;
		this.serviceAuthToken = value;
		if (this.pcs != null)
			this.pcs.firePropertyChange("serviceAuthToken", oldValue, value);
		return (T) this;
	}

	/**
	 * JSEE Trust Manager factory
	 */
	@ModelNodeBinding(detypedName = "trust-manager")
	public Map trustManager() {
		return this.trustManager;
	}

	/**
	 * JSEE Trust Manager factory
	 */
	@SuppressWarnings("unchecked")
	public T trustManager(java.util.Map value) {
		Object oldValue = this.trustManager;
		this.trustManager = value;
		if (this.pcs != null)
			this.pcs.firePropertyChange("trustManager", oldValue, value);
		return (T) this;
	}

	/**
	 * JSEE Trust Manager factory
	 */
	@SuppressWarnings("unchecked")
	public T trustManager(java.lang.String key, java.lang.Object value) {
		if (this.trustManager == null) {
			this.trustManager = new java.util.HashMap<>();
		}
		this.trustManager.put(key, value);
		return (T) this;
	}

	/**
	 * Configures a JSSE trust store
	 */
	@ModelNodeBinding(detypedName = "truststore")
	public Map truststore() {
		return this.truststore;
	}

	/**
	 * Configures a JSSE trust store
	 */
	@SuppressWarnings("unchecked")
	public T truststore(java.util.Map value) {
		Object oldValue = this.truststore;
		this.truststore = value;
		if (this.pcs != null)
			this.pcs.firePropertyChange("truststore", oldValue, value);
		return (T) this;
	}

	/**
	 * Configures a JSSE trust store
	 */
	@SuppressWarnings("unchecked")
	public T truststore(java.lang.String key, java.lang.Object value) {
		if (this.truststore == null) {
			this.truststore = new java.util.HashMap<>();
		}
		this.truststore.put(key, value);
		return (T) this;
	}
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy