summaryrefslogtreecommitdiffstats
path: root/pki/base/silent/src/com/netscape/pkisilent/common/CMSConfig.java
diff options
context:
space:
mode:
Diffstat (limited to 'pki/base/silent/src/com/netscape/pkisilent/common/CMSConfig.java')
-rw-r--r--pki/base/silent/src/com/netscape/pkisilent/common/CMSConfig.java133
1 files changed, 80 insertions, 53 deletions
diff --git a/pki/base/silent/src/com/netscape/pkisilent/common/CMSConfig.java b/pki/base/silent/src/com/netscape/pkisilent/common/CMSConfig.java
index 6913a1440..88d9ac849 100644
--- a/pki/base/silent/src/com/netscape/pkisilent/common/CMSConfig.java
+++ b/pki/base/silent/src/com/netscape/pkisilent/common/CMSConfig.java
@@ -1,4 +1,5 @@
package com.netscape.pkisilent.common;
+
// --- BEGIN COPYRIGHT BLOCK ---
// This program is free software; you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
@@ -20,20 +21,17 @@ package com.netscape.pkisilent.common;
import java.io.FileInputStream;
import java.io.FileOutputStream;
-
/**
- * CMS Test framework .
- * This class reads,modifies and saves CS.cfg file
+ * CMS Test framework . This class reads,modifies and saves CS.cfg file
*/
-
-public class CMSConfig extends ServerInfo {
+public class CMSConfig extends ServerInfo {
/**
- * Constructor . Reads the CS.cfg file .Takes the parameter for Configfile ( Provide fullpath)
+ * Constructor . Reads the CS.cfg file .Takes the parameter for Configfile (
+ * Provide fullpath)
*/
-
public CMSConfig(String confFile) {
CMSConfigFile = confFile;
System.out.println(CMSConfigFile);
@@ -71,7 +69,7 @@ public class CMSConfig extends ServerInfo {
}
/**
- * Saves the config file
+ * Saves the config file
**/
public void saveCMSConfig() {
@@ -97,15 +95,16 @@ public class CMSConfig extends ServerInfo {
}
- // Authentication
-
+ // Authentication
// Enable DirectoryBased Authentication
/**
- * Takes parameters : secureConnection( true/false), basedn, ldaphostname, lapdaportnumber ( in case of secured connection give ldap secured port)
+ * Takes parameters : secureConnection( true/false), basedn, ldaphostname,
+ * lapdaportnumber ( in case of secured connection give ldap secured port)
*/
- public void EnableDirEnrollment(boolean secureConn, String ldapbase, String lhost, String lport) {
+ public void EnableDirEnrollment(boolean secureConn, String ldapbase,
+ String lhost, String lport) {
CMSprops.setProperty("auths.instance.UserDirEnrollment.dnpattern",
"UID=$attr.uid,E=$attr.mail.1,CN=$attr.cn,OU=$dn.ou.2,O=$dn.o,C=US");
CMSprops.setProperty("auths.instance.UserDirEnrollment.ldap.basedn",
@@ -128,14 +127,16 @@ public class CMSConfig extends ServerInfo {
"auths.instance.UserDirEnrollment.ldap.ldapconn.secureConn",
"true");
CMSprops.setProperty(
- "auths.instance.UserDirEnrollment.ldap.ldapconn.port", lport);
+ "auths.instance.UserDirEnrollment.ldap.ldapconn.port",
+ lport);
} else {
CMSprops.setProperty(
"auths.instance.UserDirEnrollment.ldap.ldapconn.secureConn",
"false");
CMSprops.setProperty(
- "auths.instance.UserDirEnrollment.ldap.ldapconn.port", lport);
+ "auths.instance.UserDirEnrollment.ldap.ldapconn.port",
+ lport);
}
}
@@ -145,8 +146,7 @@ public class CMSConfig extends ServerInfo {
CMSprops.remove("auths.instance.UserDirEnrollment.ldap.basedn");
CMSprops.remove("auths.instance.UserDirEnrollment.ldap.ldapconn.host");
CMSprops.remove("auths.instance.UserDirEnrollment.ldap.ldapconn.port");
- CMSprops.remove(
- "auths.instance.UserDirEnrollment.ldap.ldapconn.secureConn");
+ CMSprops.remove("auths.instance.UserDirEnrollment.ldap.ldapconn.secureConn");
CMSprops.remove("auths.instance.UserDirEnrollment.ldap.ldapconn.version");
CMSprops.remove("auths.instance.UserDirEnrollment.ldap.maxConns");
CMSprops.remove("auths.instance.UserDirEnrollment.ldap.minConns");
@@ -163,10 +163,13 @@ public class CMSConfig extends ServerInfo {
}
/**
- * Takes parameters : secureConnection( true/false), ldapbinddn, ldapbindnpassword,ldaphostname, lapdaportnumber ( in case of secured connection give ldap secured port), basedn (e.g ou=people,o=mcom.com)
+ * Takes parameters : secureConnection( true/false), ldapbinddn,
+ * ldapbindnpassword,ldaphostname, lapdaportnumber ( in case of secured
+ * connection give ldap secured port), basedn (e.g ou=people,o=mcom.com)
*/
- void EnablePortalAuth(boolean secureConn, String ldaprootDN, String ldaprootDNPW, String lhost, String lport, String lbsuffix) {
+ void EnablePortalAuth(boolean secureConn, String ldaprootDN,
+ String ldaprootDNPW, String lhost, String lport, String lbsuffix) {
String certnickname = null;
CMSprops.setProperty("auths.instance.PortalEnrollment.pluginName",
@@ -179,7 +182,8 @@ public class CMSConfig extends ServerInfo {
"3");
CMSprops.setProperty("auths.instance.PortalEnrollment.ldap.minConns",
"2");
- CMSprops.setProperty("auths.instance.PortalEnrollment.ldap.objectclass",
+ CMSprops.setProperty(
+ "auths.instance.PortalEnrollment.ldap.objectclass",
"inetOrgPerson");
CMSprops.setProperty(
"auths.instance.PortalEnrollment.ldap.ldapauth.bindDN",
@@ -221,12 +225,15 @@ public class CMSConfig extends ServerInfo {
}
- // Publishing
+ // Publishing
/**
- * Takes parameters : secureConnection( true/false), ldapbinddn, ldapbindnpassword,ldaphostname, lapdaportnumber ( in case of secured connection give ldap secured port)
+ * Takes parameters : secureConnection( true/false), ldapbinddn,
+ * ldapbindnpassword,ldaphostname, lapdaportnumber ( in case of secured
+ * connection give ldap secured port)
*/
- public void EnablePublishing(boolean secureConn, String ldaprootDN, String ldaprootDNPW, String lhost, String lport) {
+ public void EnablePublishing(boolean secureConn, String ldaprootDN,
+ String ldaprootDNPW, String lhost, String lport) {
CMSprops.setProperty("ca.publish.enable", "true");
CMSprops.setProperty("ca.publish.ldappublish.enable", "true");
@@ -236,27 +243,32 @@ public class CMSConfig extends ServerInfo {
CMSprops.setProperty("ca.publish.ldappublish.ldap.ldapconn.port",
lport);
- CMSprops.setProperty("ca.publish.ldappublish.ldap.ldapauth.authtype",
+ CMSprops.setProperty(
+ "ca.publish.ldappublish.ldap.ldapauth.authtype",
"SslClientAuth");
} else {
CMSprops.setProperty(
"ca.publish.ldappublish.ldap.ldapconn.secureConn", "false");
CMSprops.setProperty("ca.publish.ldappublish.ldap.ldapconn.port",
lport);
- CMSprops.setProperty("ca.publish.ldappublish.ldap.ldapauth.authtype",
+ CMSprops.setProperty(
+ "ca.publish.ldappublish.ldap.ldapauth.authtype",
"BasicAuth");
}
CMSprops.setProperty("ca.publish.ldappublish.ldap.ldapauth.bindDN",
ldaprootDN);
- CMSprops.setProperty("ca.publish.ldappublish.ldap.ldapauth.bindPassword",
+ CMSprops.setProperty(
+ "ca.publish.ldappublish.ldap.ldapauth.bindPassword",
ldaprootDNPW);
- CMSprops.setProperty("ca.publish.ldappublish.ldap.ldapauth.bindPWPrompt",
+ CMSprops.setProperty(
+ "ca.publish.ldappublish.ldap.ldapauth.bindPWPrompt",
"CA LDAP Publishing");
// set the hostname with fully qulified name if you are using SSL
CMSprops.setProperty("ca.publish.ldappublish.ldap.ldapconn.host", lhost);
- CMSprops.setProperty("ca.publish.ldappublish.ldap.ldapconn.version", "3");
+ CMSprops.setProperty("ca.publish.ldappublish.ldap.ldapconn.version",
+ "3");
CMSprops.setProperty("ca.publish.mapper.impl.LdapCaSimpleMap.class",
"com.netscape.cms.publish.mappers.LdapCaSimpleMap");
CMSprops.setProperty("ca.publish.mapper.impl.LdapDNCompsMap.class",
@@ -270,7 +282,8 @@ public class CMSConfig extends ServerInfo {
CMSprops.setProperty("ca.publish.mapper.impl.LdapSubjAttrMap.class",
"com.netscape.cms.publish.mappers.LdapCertSubjMap");
CMSprops.setProperty(
- "ca.publish.mapper.instance.LdapCaCertMap.createCAEntry", "true");
+ "ca.publish.mapper.instance.LdapCaCertMap.createCAEntry",
+ "true");
CMSprops.setProperty(
"ca.publish.mapper.instance.LdapCaCertMap.dnPattern",
"UID=CManager,OU=people,O=mcom.com");
@@ -281,7 +294,8 @@ public class CMSConfig extends ServerInfo {
"ca.publish.mapper.instance.LdapCrlMap.createCAEntry", "true");
CMSprops.setProperty("ca.publish.mapper.instance.LdapCrlMap.dnPattern",
"UID=CManager,OU=people,O=mcom.com");
- CMSprops.setProperty("ca.publish.mapper.instance.LdapCrlMap.pluginName",
+ CMSprops.setProperty(
+ "ca.publish.mapper.instance.LdapCrlMap.pluginName",
"LdapCaSimpleMap");
CMSprops.setProperty(
"ca.publish.mapper.instance.LdapUserCertMap.dnPattern",
@@ -295,7 +309,8 @@ public class CMSConfig extends ServerInfo {
CMSprops.setProperty(
"ca.publish.publisher.impl.LdapCaCertPublisher.class",
"com.netscape.cms.publish.publishers.LdapCaCertPublisher");
- CMSprops.setProperty("ca.publish.publisher.impl.LdapCrlPublisher.class",
+ CMSprops.setProperty(
+ "ca.publish.publisher.impl.LdapCrlPublisher.class",
"com.netscape.cms.publish.publishers.LdapCrlPublisher");
CMSprops.setProperty(
"ca.publish.publisher.impl.LdapUserCertPublisher.class",
@@ -325,7 +340,8 @@ public class CMSConfig extends ServerInfo {
"LdapUserCertPublisher");
}
- public void DisablePublishing(boolean secureConn, String ldaprootDN, String ldaprootDNPW, String lhost, String lport, String base) {
+ public void DisablePublishing(boolean secureConn, String ldaprootDN,
+ String ldaprootDNPW, String lhost, String lport, String base) {
CMSprops.setProperty("ca.publish.enable", "false");
CMSprops.setProperty("ca.publish.ldappublish.enable", "false");
@@ -335,27 +351,32 @@ public class CMSConfig extends ServerInfo {
CMSprops.setProperty("ca.publish.ldappublish.ldap.ldapconn.port",
lport);
- CMSprops.setProperty("ca.publish.ldappublish.ldap.ldapauth.authtype",
+ CMSprops.setProperty(
+ "ca.publish.ldappublish.ldap.ldapauth.authtype",
"SslClientAuth");
} else {
CMSprops.setProperty(
"ca.publish.ldappublish.ldap.ldapconn.secureConn", "false");
CMSprops.setProperty("ca.publish.ldappublish.ldap.ldapconn.port",
lport);
- CMSprops.setProperty("ca.publish.ldappublish.ldap.ldapauth.authtype",
+ CMSprops.setProperty(
+ "ca.publish.ldappublish.ldap.ldapauth.authtype",
"BasicAuth");
}
CMSprops.setProperty("ca.publish.ldappublish.ldap.ldapauth.bindDN",
ldaprootDN);
- CMSprops.setProperty("ca.publish.ldappublish.ldap.ldapauth.bindPassword",
+ CMSprops.setProperty(
+ "ca.publish.ldappublish.ldap.ldapauth.bindPassword",
ldaprootDNPW);
- CMSprops.setProperty("ca.publish.ldappublish.ldap.ldapauth.bindPWPrompt",
+ CMSprops.setProperty(
+ "ca.publish.ldappublish.ldap.ldapauth.bindPWPrompt",
"CA LDAP Publishing");
// set the hostname with fully qulified name if you are using SSL
CMSprops.setProperty("ca.publish.ldappublish.ldap.ldapconn.host", lhost);
- CMSprops.setProperty("ca.publish.ldappublish.ldap.ldapconn.version", "3");
+ CMSprops.setProperty("ca.publish.ldappublish.ldap.ldapconn.version",
+ "3");
CMSprops.setProperty("ca.publish.mapper.impl.LdapCaSimpleMap.class",
"com.netscape.cms.publish.mappers.LdapCaSimpleMap");
CMSprops.setProperty("ca.publish.mapper.impl.LdapDNCompsMap.class",
@@ -381,7 +402,8 @@ public class CMSConfig extends ServerInfo {
"ca.publish.mapper.instance.LdapCrlMap.createCAEntry", "false");
CMSprops.setProperty("ca.publish.mapper.instance.LdapCrlMap.dnPattern",
"UID=CManager,OU=people," + base);
- CMSprops.setProperty("ca.publish.mapper.instance.LdapCrlMap.pluginName",
+ CMSprops.setProperty(
+ "ca.publish.mapper.instance.LdapCrlMap.pluginName",
"LdapCaSimpleMap");
CMSprops.setProperty(
"ca.publish.mapper.instance.LdapUserCertMap.dnPattern",
@@ -395,7 +417,8 @@ public class CMSConfig extends ServerInfo {
CMSprops.setProperty(
"ca.publish.publisher.impl.LdapCaCertPublisher.class",
"com.netscape.cms.publish.publishers.LdapCaCertPublisher");
- CMSprops.setProperty("ca.publish.publisher.impl.LdapCrlPublisher.class",
+ CMSprops.setProperty(
+ "ca.publish.publisher.impl.LdapCrlPublisher.class",
"com.netscape.cms.publish.publishers.LdapCrlPublisher");
CMSprops.setProperty(
"ca.publish.publisher.impl.LdapUserCertPublisher.class",
@@ -425,8 +448,9 @@ public class CMSConfig extends ServerInfo {
"LdapUserCertPublisher");
}
- public void CreateOCSPPublisher(String OCSPHost, String OCSPPort, String OCSPEEPort) {
- // Set host nmae with fully qualified hostname
+ public void CreateOCSPPublisher(String OCSPHost, String OCSPPort,
+ String OCSPEEPort) {
+ // Set host nmae with fully qualified hostname
String location = "http://" + OCSPHost + ":" + OCSPEEPort + "/ocsp";
CMSprops.setProperty("ca.crl.MasterCRL.alwaysUpdate", "true");
@@ -445,14 +469,15 @@ public class CMSConfig extends ServerInfo {
CMSprops.setProperty(
"ca.publish.rule.instance.OCSPPublishingRule.mapper", "");
CMSprops.setProperty(
- "ca.publish.rule.instance.OCSPPublishingRule.pluginName", "Rule");
+ "ca.publish.rule.instance.OCSPPublishingRule.pluginName",
+ "Rule");
CMSprops.setProperty(
"ca.publish.rule.instance.OCSPPublishingRule.predicate", "");
CMSprops.setProperty(
"ca.publish.rule.instance.OCSPPublishingRule.publisher",
"CAOCSPPublisher");
- CMSprops.setProperty("ca.publish.rule.instance.OCSPPublishingRule.type",
- "crl");
+ CMSprops.setProperty(
+ "ca.publish.rule.instance.OCSPPublishingRule.type", "crl");
CMSprops.setProperty("ca.Policy.rule.AuthInfoAccessExt.ad0_location",
location);
CMSprops.setProperty(
@@ -500,7 +525,8 @@ public class CMSConfig extends ServerInfo {
}
- public void SetupKRAConnectorInCA(String certInstanceID, String KRAHost, String KRAPort) {
+ public void SetupKRAConnectorInCA(String certInstanceID, String KRAHost,
+ String KRAPort) {
String certNickName = "Server-Cert " + certInstanceID;
CMSprops.setProperty("ca.connector.KRA.enable", "true");
@@ -562,8 +588,9 @@ public class CMSConfig extends ServerInfo {
}
- // Policies
- public void DefaultValidityRule(String SubsystemType, String lagtime, String leadtime, String maxValidity) {
+ // Policies
+ public void DefaultValidityRule(String SubsystemType, String lagtime,
+ String leadtime, String maxValidity) {
if (SubsystemType.equals("ca")) {
CMSprops.setProperty("ca.Policy.rule.DefaultValidityRule.enable",
"true");
@@ -580,8 +607,8 @@ public class CMSConfig extends ServerInfo {
"ca.Policy.rule.DefaultValidityRule.minValidity", "1");
CMSprops.setProperty(
"ca.Policy.rule.DefaultValidityRule.notBeforeSkew", "5");
- CMSprops.setProperty("ca.Policy.rule.DefaultValidityRule.predicate",
- null);
+ CMSprops.setProperty(
+ "ca.Policy.rule.DefaultValidityRule.predicate", null);
} else {
CMSprops.setProperty("ra.Policy.rule.DefaultValidityRule.enable",
@@ -599,8 +626,8 @@ public class CMSConfig extends ServerInfo {
"ra.Policy.rule.DefaultValidityRule.minValidity", "1");
CMSprops.setProperty(
"ra.Policy.rule.DefaultValidityRule.notBeforeSkew", "5");
- CMSprops.setProperty("ra.Policy.rule.DefaultValidityRule.predicate",
- null);
+ CMSprops.setProperty(
+ "ra.Policy.rule.DefaultValidityRule.predicate", null);
}
}
@@ -617,10 +644,10 @@ public class CMSConfig extends ServerInfo {
CMSConfig s = new CMSConfig(args[0]);
boolean secureC = false;
- // s.EnableDirEnrollment(secureC);
+ // s.EnableDirEnrollment(secureC);
s.saveCMSConfig();
-
+
}// end of function main
-} // end of class
+} // end of class