summaryrefslogtreecommitdiffstats
path: root/base/server/cms/src/com/netscape/cms
diff options
context:
space:
mode:
authorEndi S. Dewata <edewata@redhat.com>2014-02-10 13:46:10 -0500
committerEndi S. Dewata <edewata@redhat.com>2014-02-27 13:48:07 -0500
commit819fd31d34b3159e895f15bfad41bf483adca79e (patch)
treebe301599ff49da7d1ca951bc78a7f54fd1045c5a /base/server/cms/src/com/netscape/cms
parente924e834c4388e9f563bae23dc61344f1405962c (diff)
downloadpki-819fd31d34b3159e895f15bfad41bf483adca79e.tar.gz
pki-819fd31d34b3159e895f15bfad41bf483adca79e.tar.xz
pki-819fd31d34b3159e895f15bfad41bf483adca79e.zip
Upgraded RESTEasy client library.
The Dogtag client library has been modified to use RESTEasy 3.0 client library. A new upgrade script has been added to update existing servers. The JAXB annotation in ResourceMessage has been modified to require explicit property mapping. Ticket #554
Diffstat (limited to 'base/server/cms/src/com/netscape/cms')
-rw-r--r--base/server/cms/src/com/netscape/cms/servlet/csadmin/ConfigurationUtils.java25
-rw-r--r--base/server/cms/src/com/netscape/cms/servlet/csadmin/GetCookie.java23
-rw-r--r--base/server/cms/src/com/netscape/cms/servlet/csadmin/SystemConfigService.java19
3 files changed, 52 insertions, 15 deletions
diff --git a/base/server/cms/src/com/netscape/cms/servlet/csadmin/ConfigurationUtils.java b/base/server/cms/src/com/netscape/cms/servlet/csadmin/ConfigurationUtils.java
index 30d908f2e..ded7c1eed 100644
--- a/base/server/cms/src/com/netscape/cms/servlet/csadmin/ConfigurationUtils.java
+++ b/base/server/cms/src/com/netscape/cms/servlet/csadmin/ConfigurationUtils.java
@@ -54,6 +54,8 @@ import java.util.Vector;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
+import javax.ws.rs.core.MultivaluedHashMap;
+import javax.ws.rs.core.MultivaluedMap;
import javax.ws.rs.core.Response;
import javax.xml.parsers.ParserConfigurationException;
@@ -78,7 +80,6 @@ import netscape.security.x509.X509CertImpl;
import netscape.security.x509.X509Key;
import org.apache.velocity.context.Context;
-import org.jboss.resteasy.client.ClientResponse;
import org.jboss.resteasy.client.ClientResponseFailure;
import org.mozilla.jss.CryptoManager;
import org.mozilla.jss.CryptoManager.NicknameConflictException;
@@ -213,8 +214,8 @@ public class ConfigurationUtils {
return getHttpResponse(hostname, port, secure, uri, content, clientnickname, null);
}
- public static ClientResponse<String> getClientResponse(String hostname, int port, boolean secure,
- String path, String content, String clientnickname,
+ public static String post(String hostname, int port, boolean secure,
+ String path, MultivaluedMap<String, String> map, String clientnickname,
SSLCertificateApprovalCallback certApprovalCallback)
throws Exception {
@@ -225,9 +226,7 @@ public class ConfigurationUtils {
PKIClient client = new PKIClient(config);
PKIConnection connection = client.getConnection();
- ClientResponse<String> response = connection.post(content);
-
- return response;
+ return connection.post(map);
}
//TODO - replace with Jack's connector code
@@ -328,6 +327,7 @@ public class ConfigurationUtils {
boolean oldtoken = cs.getBoolean("cs.useOldTokenInterface", false);
if (oldtoken) {
+ CMS.debug("Getting old token");
return ConfigurationUtils.getOldToken(sdhost, sdport, user, passwd);
}
@@ -361,9 +361,11 @@ public class ConfigurationUtils {
return token.getToken();
} catch (ClientResponseFailure e) {
+
if (e.getResponse().getResponseStatus() == Response.Status.NOT_FOUND) {
// try the old servlet
String tokenString = getOldCookie(sdhost, sdport, user, passwd);
+ CMS.debug("Token: " + tokenString);
return tokenString;
}
@@ -378,12 +380,13 @@ public class ConfigurationUtils {
+ CMS.getAdminPort() + "/ca/admin/console/config/wizard" +
"?p=5&subsystem=" + cs.getString("cs.type");
- String content = "uid=" + URLEncoder.encode(user, "UTF-8") + "&pwd=" + URLEncoder.encode(passwd, "UTF-8") +
- "&url=" + URLEncoder.encode(subca_url, "UTF-8");
+ MultivaluedMap<String, String> map = new MultivaluedHashMap<String, String>();
+ map.putSingle("uid", user);
+ map.putSingle("pwd", passwd);
+ map.putSingle("url", subca_url);
- ClientResponse<String> response = getClientResponse(sdhost, sdport, true, "/ca/admin/ca/getCookie",
- content, null, null);
- String body = response.getEntity();
+ String body = post(sdhost, sdport, true, "/ca/admin/ca/getCookie",
+ map, null, null);
return getContentValue(body, "header.session_id");
}
diff --git a/base/server/cms/src/com/netscape/cms/servlet/csadmin/GetCookie.java b/base/server/cms/src/com/netscape/cms/servlet/csadmin/GetCookie.java
index b8030f01a..f86f2498c 100644
--- a/base/server/cms/src/com/netscape/cms/servlet/csadmin/GetCookie.java
+++ b/base/server/cms/src/com/netscape/cms/servlet/csadmin/GetCookie.java
@@ -78,6 +78,15 @@ public class GetCookie extends CMSServlet {
* @param cmsReq the object holding the request and response information
*/
protected void process(CMSRequest cmsReq) throws EBaseException {
+ try {
+ processImpl(cmsReq);
+ } catch (Throwable t) {
+ CMS.debug(t);
+ throw t;
+ }
+ }
+
+ protected void processImpl(CMSRequest cmsReq) throws EBaseException {
HttpServletRequest httpReq = cmsReq.getHttpReq();
HttpServletResponse httpResp = cmsReq.getHttpResp();
@@ -93,7 +102,12 @@ public class GetCookie extends CMSServlet {
Locale[] locale = new Locale[1];
String url = httpReq.getParameter("url");
- CMS.debug("GetCookie before auth, url =" + url);
+ CMS.debug("GetCookie before auth, url = " + url);
+ if (url == null) {
+ throw new ECMSGWException(
+ "GetCookie missing parameter: url");
+ }
+
String url_e = "";
URL u = null;
try {
@@ -101,7 +115,7 @@ public class GetCookie extends CMSServlet {
u = new URL(url_e);
} catch (Exception eee) {
throw new ECMSGWException(
- "GetCookie missing parameter: url");
+ "Unable to parse URL: " + url);
}
int index2 = url_e.indexOf("subsystem=");
@@ -165,11 +179,13 @@ public class GetCookie extends CMSServlet {
if (authToken != null) {
String uid = authToken.getInString("uid");
+ CMS.debug("UID: " + uid);
String addr = "";
try {
addr = u.getHost();
} catch (Exception e) {
+ CMS.debug(e);
}
try {
@@ -177,6 +193,7 @@ public class GetCookie extends CMSServlet {
InstallToken installToken = processor.getInstallToken(uid, addr, subsystem);
String cookie = installToken.getToken();
+ CMS.debug("Cookie: " + cookie);
if (!url.startsWith("$")) {
try {
@@ -210,7 +227,7 @@ public class GetCookie extends CMSServlet {
}
} catch (Exception e) {
- e.printStackTrace();
+ CMS.debug(e);
}
}
}
diff --git a/base/server/cms/src/com/netscape/cms/servlet/csadmin/SystemConfigService.java b/base/server/cms/src/com/netscape/cms/servlet/csadmin/SystemConfigService.java
index 252a58472..a2c7b525b 100644
--- a/base/server/cms/src/com/netscape/cms/servlet/csadmin/SystemConfigService.java
+++ b/base/server/cms/src/com/netscape/cms/servlet/csadmin/SystemConfigService.java
@@ -118,7 +118,17 @@ public class SystemConfigService extends PKIService implements SystemConfigResou
* @see com.netscape.cms.servlet.csadmin.SystemConfigurationResource#configure(com.netscape.cms.servlet.csadmin.data.ConfigurationData)
*/
@Override
- public ConfigurationResponse configure(ConfigurationRequest data){
+ public ConfigurationResponse configure(ConfigurationRequest data) {
+ try {
+ return configureImpl(data);
+ } catch (Throwable t) {
+ CMS.debug(t);
+ throw t;
+ }
+ }
+
+ public ConfigurationResponse configureImpl(ConfigurationRequest data) {
+
if (csState.equals("1")) {
throw new BadRequestException("System is already configured");
}
@@ -915,6 +925,7 @@ public class SystemConfigService extends PKIService implements SystemConfigResou
String securityDomainURL = data.getSecurityDomainUri();
if (securityDomainType.equals(ConfigurationRequest.NEW_DOMAIN)) {
+ CMS.debug("Creating new security domain");
cs.putString("preop.securitydomain.select", "new");
cs.putString("securitydomain.select", "new");
cs.putString("preop.securitydomain.name", securityDomainName);
@@ -931,12 +942,15 @@ public class SystemConfigService extends PKIService implements SystemConfigResou
cs.putString("preop.cert.subsystem.type", "local");
}
cs.putString("preop.cert.subsystem.profile", "subsystemCert.profile");
+
} else {
+ CMS.debug("Joining existing security domain");
cs.putString("preop.securitydomain.select", "existing");
cs.putString("securitydomain.select", "existing");
cs.putString("preop.cert.subsystem.type", "remote");
cs.putString("preop.cert.subsystem.profile", "caInternalAuthSubsystemCert");
+ CMS.debug("Getting certificate chain");
// contact and log onto security domain
URL secdomainURL;
String host;
@@ -953,6 +967,7 @@ public class SystemConfigService extends PKIService implements SystemConfigResou
throw new PKIException("Failed to import certificate chain from security domain master: " + e);
}
+ CMS.debug("Getting install token");
// log onto security domain and get token
String user = data.getSecurityDomainUser();
String pass = data.getSecurityDomainPassword();
@@ -965,10 +980,12 @@ public class SystemConfigService extends PKIService implements SystemConfigResou
}
if (installToken == null) {
+ CMS.debug("Install token is null");
throw new PKIException("Failed to obtain installation token from security domain");
}
CMS.setConfigSDSessionId(installToken);
+ CMS.debug("Getting domain XML");
try {
domainXML = ConfigurationUtils.getDomainXML(host, port, true);
ConfigurationUtils.getSecurityDomainPorts(domainXML, host, port);