summaryrefslogtreecommitdiffstats
path: root/base/server/cms/src
diff options
context:
space:
mode:
authorEndi S. Dewata <edewata@redhat.com>2014-04-22 14:22:51 -0400
committerEndi S. Dewata <edewata@redhat.com>2014-04-25 19:03:35 -0400
commit8a6935ba8587ece5e5fcf8b65448c1b57d5ac463 (patch)
tree76df51348828d3f8c2f33a70a4eec2fd498ac44d /base/server/cms/src
parent5baa286e2104dee77bdc54ac1ad0bb73dfa1b769 (diff)
Refactored SystemConfigService (part 12).
Subsystem-specific configuration codes have been moved from the SystemConfigService into the subsystem-specific installer. Ticket #890
Diffstat (limited to 'base/server/cms/src')
-rw-r--r--base/server/cms/src/org/dogtagpki/server/rest/SystemConfigService.java130
1 files changed, 3 insertions, 127 deletions
diff --git a/base/server/cms/src/org/dogtagpki/server/rest/SystemConfigService.java b/base/server/cms/src/org/dogtagpki/server/rest/SystemConfigService.java
index ffa18412e..902dc88f0 100644
--- a/base/server/cms/src/org/dogtagpki/server/rest/SystemConfigService.java
+++ b/base/server/cms/src/org/dogtagpki/server/rest/SystemConfigService.java
@@ -57,7 +57,6 @@ import com.netscape.certsrv.base.IConfigStore;
import com.netscape.certsrv.base.PKIException;
import com.netscape.certsrv.ca.ICertificateAuthority;
import com.netscape.certsrv.dbs.certdb.ICertificateRepository;
-import com.netscape.certsrv.ocsp.IOCSPAuthority;
import com.netscape.certsrv.system.ConfigurationRequest;
import com.netscape.certsrv.system.ConfigurationResponse;
import com.netscape.certsrv.system.SystemCertData;
@@ -239,28 +238,14 @@ public class SystemConfigService extends PKIService implements SystemConfigResou
throw new PKIException("Error while updating security domain: " + e);
}
- if (csType.equals("KRA")) {
- finalizeKRAConfiguration(data);
- }
-
- if (csType.equals("OCSP")) {
- finalizeOCSPConfiguration(data);
- }
-
- if (csType.equals("CA")) {
- finalizeCAConfiguration(data);
- }
-
try {
if (!data.getSharedDB()) ConfigurationUtils.setupDBUser();
} catch (Exception e) {
- e.printStackTrace();
+ CMS.debug(e);
throw new PKIException("Errors in creating or updating dbuser: " + e);
}
- if (csType.equals("TPS")) {
- finalizeTPSConfiguration(data);
- }
+ finalizeConfiguration(data);
cs.putInteger("cs.state", 1);
@@ -550,116 +535,7 @@ public class SystemConfigService extends PKIService implements SystemConfigResou
}
}
- public void finalizeCAConfiguration(ConfigurationRequest request) {
- try {
- if (!request.getIsClone().equals("true")) {
- ConfigurationUtils.updateNextRanges();
- }
-
- } catch (Exception e) {
- CMS.debug(e);
- throw new PKIException("Errors in updating next serial number ranges in DB: " + e);
- }
-
- try {
- if (request.getIsClone().equals("true") && ConfigurationUtils.isSDHostDomainMaster(cs)) {
- // cloning a domain master CA, the clone is also master of its domain
- cs.putString("securitydomain.host", CMS.getEEHost());
- cs.putString("securitydomain.httpport", CMS.getEENonSSLPort());
- cs.putString("securitydomain.httpsadminport", CMS.getAdminPort());
- cs.putString("securitydomain.httpsagentport", CMS.getAgentPort());
- cs.putString("securitydomain.httpseeport", CMS.getEESSLPort());
- cs.putString("securitydomain.select", "new");
- }
-
- } catch (Exception e) {
- CMS.debug(e);
- throw new PKIException("Errors in determining if security domain host is a master CA");
- }
- }
-
- public void finalizeKRAConfiguration(ConfigurationRequest request) {
- try {
- String ca_host = cs.getString("preop.ca.hostname", "");
-
- // need to push connector information to the CA
- if (!request.getStandAlone() && !ca_host.equals("")) {
- ConfigurationUtils.updateConnectorInfo(CMS.getAgentHost(), CMS.getAgentPort());
- ConfigurationUtils.setupClientAuthUser();
- }
-
- } catch (Exception e) {
- CMS.debug(e);
- throw new PKIException("Errors in pushing KRA connector information to the CA: " + e);
- }
-
- try {
- if (!request.getIsClone().equals("true")) {
- ConfigurationUtils.updateNextRanges();
- }
-
- } catch (Exception e) {
- CMS.debug(e);
- throw new PKIException("Errors in updating next serial number ranges in DB: " + e);
- }
- }
-
- public void finalizeOCSPConfiguration(ConfigurationRequest request) {
- try {
- String ca_host = cs.getString("preop.ca.hostname", "");
-
- // import the CA certificate into the OCSP
- // configure the CRL Publishing to OCSP in CA
- if (!ca_host.equals("")) {
- CMS.reinit(IOCSPAuthority.ID);
- ConfigurationUtils.importCACertToOCSP();
-
- if (!request.getStandAlone()) {
- ConfigurationUtils.updateOCSPConfig();
- ConfigurationUtils.setupClientAuthUser();
- }
- }
-
- } catch (Exception e) {
- CMS.debug(e);
- throw new PKIException("Errors in configuring CA publishing to OCSP: " + e);
- }
- }
-
- public void finalizeTPSConfiguration(ConfigurationRequest request) {
- try {
- ConfigurationUtils.addProfilesToTPSUser(request.getAdminUID());
-
- URI secdomainURI = new URI(request.getSecurityDomainUri());
-
- // register TPS with CA
- URI caURI = new URI(request.getCaUri());
- ConfigurationUtils.registerUser(secdomainURI, caURI, "ca");
-
- // register TPS with TKS
- URI tksURI = new URI(request.getTksUri());
- ConfigurationUtils.registerUser(secdomainURI, tksURI, "tks");
-
- if (request.getEnableServerSideKeyGen().equalsIgnoreCase("true")) {
- URI kraURI = new URI(request.getKraUri());
- ConfigurationUtils.registerUser(secdomainURI, kraURI, "kra");
- String transportCert = ConfigurationUtils.getTransportCert(secdomainURI, kraURI);
- ConfigurationUtils.exportTransportCert(secdomainURI, tksURI, transportCert);
- }
-
- // generate shared secret from the tks
- ConfigurationUtils.getSharedSecret(
- tksURI.getHost(),
- tksURI.getPort(),
- Boolean.getBoolean(request.getImportSharedSecret()));
-
- } catch (URISyntaxException e) {
- throw new BadRequestException("Invalid URI for CA, TKS or KRA");
-
- } catch (Exception e) {
- CMS.debug(e);
- throw new PKIException("Errors in registering TPS to CA, TKS or KRA: " + e);
- }
+ public void finalizeConfiguration(ConfigurationRequest request) {
}
public void configureAdministrator(ConfigurationRequest data, ConfigurationResponse response) {