summaryrefslogtreecommitdiffstats
path: root/base/common/src/com/netscape/cms
Commit message (Collapse)AuthorAgeFilesLines
* (fixed warning for) task #304 TMS ECC infrastructure (enrollment with ↵Christina Fu2012-09-261-2/+2
| | | | client-side and server-side key generation, and key archival)
* Use getStatus servlet to provide startup statusAde Lee2012-09-211-0/+2
| | | | Ticket 314
* Changes to use standard dbuserAde Lee2012-09-193-26/+48
| | | | | | | | | | | | | | | | | We create a user that can be used to connect to the database using the subsystem cert for client auth. We identified this user, using the seeAlso attribute and provided certmap rules to this effect. For this user, we used to reuse the uid = user CA-hostname-port, which is already created for inter-system communication. But this is problematic if more than one dbuser exists, as the directory server may bind as the incorrect user. In any replication topology, there must be only one dbuser using the subsystem cert. To simplify things, we create a new user specifically for this purpose (pkidbuser), and we remove the seeAlso attribute from the older dbusers. A script is needed to convert existing dogtag 9 istances to use the new user, and set the relevant acls. This will be done in a separate commit.
* Added DN and filter escaping in ConfigurationUtils.Endi Sukma Dewata2012-09-191-19/+19
| | | | | | | The ConfigurationUtils has been modified to escape values used in DN or filter according to LDAP standard. Ticket #193
* Removed duplicate DN escaping methods.Endi Sukma Dewata2012-09-197-127/+11
| | | | | | | | The duplicate methods to escape DN value have been removed. The codes that used the duplicate methods have been modified to use LDAPUtil.escapeDN(). Ticket #193
* https://fedorahosted.org/pki/ticket/304Christina Fu2012-09-181-1/+43
| | | | TMS ECC infrastructure (enrollment with client-side and server-side key generation, and key archival)
* Various fixes to installation servlet and pki-deployAde Lee2012-09-121-1/+4
| | | | | | | Added logging so that we can see what is passed in to server from pkispawn. Fixed incorrect dbuser specification. Added required replication config items to pkispawn. Initial refactoring of construct_pki_configuration_data in pkijython.py
* Added proxy realm.Endi Sukma Dewata2012-09-053-0/+314
| | | | | | | | | | | | | | | | | CMS engine is a singleton and it's used by PKI realm to authenticate users accessing the subsystem. Since a Tomcat instance may contain multiple subsystems, each having separate realm, the PKI JAR links need to be moved into WEB-INF/lib so that they will run inside separate class loaders. Tomcat also requires that the authenticator and realm classes be available in common/lib. To address this a new package pki-tomcat.jar has been added. The package contains the authenticator and a proxy realm. When the subsystems start running, they will register their own realms into the proxy realms such that the authentications will be forwarded to the appropriate subsystems. Ticket #89
* Fixed conflicting LDIF files.Endi Sukma Dewata2012-09-041-3/+6
| | | | | | | | | During subsystem configuration the ConfigurationUtils.importLDIFS() would generate LDIF files in <instance>/conf folder which may conflict with files belonging to other subsystems. The code has been modified to generate the files in <instance>/<subsystem>/conf folder. Ticket #89
* Moved REST CLI into pki-tools.Endi Sukma Dewata2012-08-2942-4500/+4
| | | | | | | | | | The pki-client.jar has been split and merged into pki-certsrv.jar and pki-tools.jar. The REST client classes are now packaged in com.netscape.certsrv.<component> packages. The REST CLI classes are now packaged in com.netscape.cmstools.<component> packages. The "pki" script has been moved into pki-tools RPM package. Ticket #215
* Fixed exceptions during shutdown.Endi Sukma Dewata2012-08-282-3/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | The shutdown() methods in several classes have been fixed to allow more graceful shutdown and clean restart. There are two types of object attributes that need to be handled differently. Attributes that are initialized by the constructor should not be nulled during shutdown because they won't be reinitialized during restart. If they require a cleanup (e.g. emptying collections, closing LDAP connections) it's not necessary to check for null before calling the cleanup method because they're never null. For attributes that are initialized during init(), it may not be necessary to do a cleanup or null the attribute since they might still be used by other threads and they will be reinitialized during restart so the old objects will be garbage collected. If they do need a cleanup they should be checked for null because they might still be null due to init() failure or initialization conditionals. If the attributes are initialized conditionally, the logic has been modified to ensure the attributes are either initialized or set to null. Ticket #247
* subsequent OCSPs and DRM connector protectionAndrew Wnuk2012-08-203-50/+60
| | | | | | | | | This patch corrects process of attaching OCSP subsystem to CA. It improves handling of adding subsequent OCSP subsystems to CA. This patch also prevents DRM connector to be overwritten by subsequent DRM installations. Bug 804179.
* PKI Deployment ScriptletsMatthew Harmsen2012-08-179-19/+34
| | | | | | | | | | | * TRAC Ticket #266 - for non-master CA subsystems, pkidestroy needs to contact the security domain to update the domain * Made Fedora 17 rely upon tomcatjss 7.0.0 or later * Changed Dogtag 10 build-time and runtime requirements for 'pki-deploy' * Altered PKI Package Dependency Chain (top-to-bottom): pki-ca, pki-kra, pki-ocsp, pki-tks --> pki-deploy --> pki-common * Changed TPS to require a build-time dependency of 'httpd-devel >= 2.4.2' * Clarified RPM build script's usage message
* Ticket 219 - Conversion of integer variable to BigIntegerAbhishek Koneru2012-08-171-4/+2
|
* Fixed default port number in CLI help message.Endi Sukma Dewata2012-08-171-1/+1
| | | | | The CLI help message has been fixed to show the correct default port number.
* Fixed REST common class dependency.Endi Sukma Dewata2012-08-152-2/+49
| | | | | | | | | The ConfigurationResponse previously has a method that uses a class that exists on the server only, creating a dependency issue since the ConfigurationResponse will be used by the client as well. The method now has been moved into a separate factory class. Ticket #259
* Reorganized REST common classes.Endi Sukma Dewata2012-08-1599-6995/+179
| | | | | | | The common classes used by REST client and services have been moved into the com.netscape.certsrv.<component> packages. Ticket #215
* Reorganized REST server classes.Endi Sukma Dewata2012-08-1517-30/+46
| | | | | | | The factory and DAO classes used by REST services have been moved into the com.netscape.cms.servlet.<component> packages. Ticket #215
* Reorganized REST client classes.Endi Sukma Dewata2012-08-1511-13/+287
| | | | | | | The REST client classes have been moved into the com.netscape.cms.client.<component> packages. Ticket #215
* Cleaned up REST common class names.Endi Sukma Dewata2012-08-1557-481/+482
| | | | | | | The REST common classes have been renamed for better clarity and consistency. Ticket #259
* Cleaned up REST server class names.Endi Sukma Dewata2012-08-1518-35/+35
| | | | | | | The REST server classes have been renamed for better clarity and consistency. Ticket #259
* Cleaned up REST client class names.Endi Sukma Dewata2012-08-1511-87/+22
| | | | | | | The REST client classes have been renamed for better clarity and consistency. Ticket #259
* Ticket 149 - Implementing the search functionality,server side.Abhishek Koneru2012-08-135-43/+71
| | | | | | | | | Search function call supporting various already present. Changes the ds call from searchCertificates to CertificateRepository.findCertRecords(). Added pagination using start and size options . provided in command line. Conflicts: base/common/src/com/netscape/cms/client/cert/CertRestClient.java
* Feature : Search certificate request interface in CLI.(Ticket 150)Abhishek Koneru2012-08-133-18/+322
| | | | | | | | | pki-cert-find <filename> [OPTIONS] Available search options pki-cert-find - lists all the certificates. pki-cert-find --input <filename> - reads the search criteria from the file (Unmarshalled CertSearchData object) pki-cert-find [Options] - custom build of search criteria pki-cert-find --help - shows all the available options.
* Moved REST services into separate URLs.Endi Sukma Dewata2012-08-039-65/+67
| | | | | | | | | | | To support different access control configurations the REST services have been separated by roles. Services that don't need authentication will be available under /rest. Services that require agent rights will be available under /rest/agent. Services that require admin rights will be available under /rest/admin. Ticket #107
* PKI Deployment ScriptletsMatthew Harmsen2012-08-022-2/+6
| | | | | | | | | * PKI TRAC Ticket #279 - Dogtag 10: Fix remaining 'cloning' issues in 'pkispawn' . . . * PKI TRAC Ticket #280 - Dogtag 10: Fix remaining issues in 'pkidestroy' related to deletion of more than one instance . . . * PKI TRAC Ticket #281 - Dogtag 10: Fix 'pkidaemon'/'operations' issue to handle individual instance . . .
* selinux policy changes to use standard portsAde Lee2012-07-311-1/+1
| | | | | | | Selinux policy has been changed to use standard tomcat ports. Corresponding changes have been made in the pki-deploy scripts. Minor change in config script for password check.
* Added support for basic authentication.Endi Sukma Dewata2012-07-303-15/+140
| | | | | | | | | | | | | | The CMSRestClient has been modified to support basic authentication and handle HTTP redirection. The basic authentication can be used as follows: pki -U <server uri> -u <username> -w <password> user-find Some protected REST services might require secure connection. If the user tries to call these services over HTTP the CLI will handle the redirection automatically to an HTTPS port. Ticket #107
* Added ClientConfig.Endi Sukma Dewata2012-07-3017-204/+382
| | | | | | | | A new ClientConfig class has been added to encapsulate client configuration parameters. These parameters include server URI, certificate database, certificate nickname, and password. Ticket #107
* Cert CLI - cert-request-review and cert-request-approve implementationsAbhishek Koneru2012-07-309-12/+188
|
* Merge most DAO objects into the ResourceService filesAde Lee2012-07-257-721/+519
|
* elimination of CA crashAndrew Wnuk2012-07-246-0/+30
| | | | | | This patch eliminates CA crash caused by default Android browser. Bug: 819123.
* Use only pluralized REST interface URLsAde Lee2012-07-2421-618/+341
|
* Changes for CertRequestSubmitCLI feature addition.Abhishek Koneru2012-07-193-0/+95
| | | | | | Allows the user to send a certificate request through cli. Command : pki cert-request-submit <filename>
* PKI Deployment ScriptletsMatthew Harmsen2012-07-191-1/+3
| | | | | | | | | | | | | | | | | | | | * Integration of Tomcat 7 * Introduction of dependency upon tomcatjss 7.0 * Removal of http filtering configuration mechanisms * Introduction of additional slot substitution to support revised filesystem layout * Addition of 'pkiuser' uid:gid creation methods * Inclusion of per instance '*.profile' files * Introduction of configurable 'configurationRoot' parameter * Introduction of default configuration of 'log4j' mechanism (alee) * Modify web.xml to use new Application classes to bootstrap servers (alee) * Introduction of "Wrapper" logic to support Tomcat 6 --> Tomcat 7 API change (jmagne) * Added jython helper function to allow attaching a remote java debugger (e. g. - eclipse)
* Fix compilation error in fix to Bug: 837124Ade Lee2012-07-181-1/+1
|
* CA removalAndrew Wnuk2012-07-171-5/+13
| | | | | | This patch provides fix to OCSP agent inability of removing a CA from the List of Certificate Authorities in some circumstances. Bug: 837124.
* Additional checks to avoid null pointers in Installation servletAde Lee2012-07-171-1/+5
|
* NO_HASHCODE_OVERRIDDENAbhishek Koneru2012-07-122-3/+7
|
* Fixed client cert authentication problem.Endi Sukma Dewata2012-07-122-29/+14
| | | | | | | The CertRestClient has been fixed to pass the client certificate nickname to the CMSRestClient class to configure the SSLSocket properly. Ticket #161
* Refactored ConfigurationRESTClient.Endi Sukma Dewata2012-07-121-151/+4
| | | | | | | The ConfigurationRESTClient has been modified to extend CMSRestClient to address error handling issue in ConfigurationTest. Ticket #218
* Refactored DoRevoke and DoUnrevoke servlets.Endi Sukma Dewata2012-07-112-808/+253
| | | | | | | The DoRevoke and DoUnrevoke servlets have been refactored to use the RevocationProcessor. Ticket #161
* Added cert revocation CLI.Endi Sukma Dewata2012-07-1111-3/+801
| | | | | | The cert revocation CLI provides a tool to revoke and unrevoke certificates. Ticket #161
* Added cert revocation REST service.Endi Sukma Dewata2012-07-1125-233/+1625
| | | | | | | The cert revocation REST service is based on DoRevoke and DoUnrevoke servlets. It provides an interface to manage certificate revocation. Ticket #161
* Refactored RequestStatus.Endi Sukma Dewata2012-07-107-113/+86
| | | | | | | | | The RequestStatus has been modified to use a map to convert string into RequestStatus instance. The string constants in RequestStatus are no longer needed because instances can be compared using equal sign directly or equals(). Ticket #161
* CMC revocationAndrew Wnuk2012-07-101-9/+27
| | | | | | This patch provides verification of revocation reasons and proper handling for removeFromCRLrevocation reason. Bug: 441354.
* Adding restful interface to create certificate requests and issue certificates.Ade Lee2012-07-0336-2374/+4574
| | | | | | | | | | Refactored ProfileSubmitServlet to make the flow clearer. Both the legacy servlets and the new RESTful servlets use common ProfileProcessor objects that contain the main business logic, so that the amount of duplicated code is minimized. Refactored ProfileProcessServlet to use the new common classes. Addressed review comments. Removed an unneeded class and reverted some unneeded jaxb annotations. Added factory methods.
* LeftOver Cases in Resource Leaks and NULL_RETURNSAbhishek Koneru2012-07-021-21/+48
|
* Added REST error handler.Endi Sukma Dewata2012-06-273-6/+28
| | | | | | | A new getEntity() method has been added to obtain the entity from a Response object and also map HTTP errors into exceptions. Ticket #161
* Fixes for Coverity issues of type Resource Leaks - RemainingAbhishek Koneru2012-06-251-7/+11
|