summaryrefslogtreecommitdiffstats
path: root/base/common/src/com
Commit message (Collapse)AuthorAgeFilesLines
...
* Reorganized CLI user commands.Endi S. Dewata2013-08-234-0/+80
| | | | | | | | New CLI modules have been added for each subsystem. The user commands have been added to these subsystems while keeping the original command for backward compatibility. Ticket #701
* Refactored client framework.Endi S. Dewata2013-08-2318-125/+267
| | | | | | | | | A new Client class was added as a base for all client classes. The SubsystemClient was added as a base for all subsystem clients. It also provides methods to authenticate against the subsystem. The DRMClient has been renamed to KRAClient to match the actual subsystem name. Ticket #701
* Added TPS installation to the web based install panels for JavaAde Lee2013-08-239-44/+709
|
* Add TPS profile ID auxilliary object to tps usersAde Lee2013-08-219-6/+254
|
* Added generic database.Endi S. Dewata2013-08-203-31/+145
| | | | | | | | A new generic database class has been added to simplify in-memory database creation. The token database has been refactored to inherit this class. Ticket #652
* Reorganized interceptors.Endi S. Dewata2013-08-202-2/+6
| | | | | | The ACLInterceptor and AuthMethodInterceptor interceptors only run on the server, so they have been moved from the base package into the server package.
* Add TPS self testsAde Lee2013-08-201-7/+10
| | | | | Added self tests analogous to the tests previously performed inthe C subsystem.
* Move security domain session classes to correct packageAde Lee2013-08-154-6/+6
| | | | cmscore classes should not depend on classes in cms.
* Initial code to configure a TPS in tomcatAde Lee2013-08-133-309/+757
| | | | | This code allows pkispawn to configure a tps in tomcat. It does not include any config using the web UI panels.
* Added skeleton for token services.Endi S. Dewata2013-08-136-0/+625
| | | | | | | | A skeleton for token service and the clients has been added. Currently it's storing the database in memory. The actual implementation using LDAP database will be added after the TPS configuration code is ready. Ticket #652
* Fixes for profile REST interface from code review.Ade Lee2013-07-314-108/+87
| | | | Simplified the inputs, outputs for ProfileData
* Add exceptions to Profile REST service.Ade Lee2013-07-311-34/+38
|
* Fix various issues with Profile InterfaceAde Lee2013-07-313-12/+32
| | | | | 1. Fixed REST API as per review. 2. Add output for profile-show and profile-find
* Storing authentication info in session.Endi S. Dewata2013-07-291-0/+5
| | | | | | | | | The authenticator configuration has been modified to store the authentication info in the session so it can be used by the servlets. An upgrade script has been added to update the configuration in existing instances. The SSLAuthenticatorWithFalback was modified to propagate the configuration to the actual authenticator handling the request.
* Bugzilla Bug #975939 - RHCS 8.1: "END CERTIFICATE" tag is not on it's own lineMatthew Harmsen2013-07-231-1/+1
|
* Bugzilla Bug #971561 - DRM - server-side key generation causesMatthew Harmsen2013-07-231-4/+5
| | | | NullPointerException if a parameter is not supplied by the caller (TPS) - cfu
* Fixed token authentication problem on RHEL.Endi S. Dewata2013-07-222-57/+10
| | | | | | | | The CryptoManager.initialize() and CryptoToken.login() invocation has been moved into the main program as a workaround for the authentication problem on RHEL and to ensure proper initialization in general. Bugzilla #985111
* Add interfaces for managing profilesAde Lee2013-07-2222-196/+1133
| | | | | This adds the initial framework for viewing and managing profiles. Also adds CLI code for viewing/adding/deleting and editing profiles.
* Fixed dependency issue on CMSRequest.Endi S. Dewata2013-07-2278-343/+439
| | | | | | | | | The CMSRequest is a server class but it's used by the ICommandQueue that belongs in the base package. To fix the dependency issue the CMSRequest has been refactored to implement a new interface ICMSRequest in the base package. Some constants in CMSRequest have also been moved into ICMSRequest. All code referencing CMSRequest has been adjusted accordingly.
* Make sure only the master keys and certs are imported.Ade Lee2013-06-261-5/+27
| | | | | | | | The key import code was written for when there was only one subsystem per tomcat instance, and only one subsystems certs and keys per p12 file. We need to ensure that only the master's subsystem keys and certs are imported. Otherwise, unpredictable behavior happens, like in Ticket 665.
* Added Tomcat-based TPS instance.Endi S. Dewata2013-06-101-0/+1
| | | | | | | | | The build and deployment tools have been modified to support creating a basic Tomcat instance to run TPS. New configuration and template files for TPS have been copied from another Tomcat subsystem. The TPS functionality itself will be added in future patches. Ticket #526
* Fix Bug #963073 - rhcs81 tps crash for CN over than 64 bytesJack Magne2013-06-041-0/+108
| | | | Add checking for sane lengths of the fields in the subject dn.
* Fixed hard-coded server certificate nickname.Endi Sukma Dewata2013-06-031-4/+2
| | | | | | | | | | | Previously the server certificate name was partially hard-coded as "Server-Cert cert-[PKI_INSTANCE_NAME]". Now in Tomcat-based subsystems it can be fully configured using pki_ssl_server_nickname parameter. In Apache-based subsystems it's left unchanged. Unused serverCertNick.conf files have been removed. Ticket #631
* Option to include nextUpdate as an offset to thisUpdateAndrew Wnuk2013-05-141-0/+1
| | | | | | This patch provides an option to generate CRLs with nextUpdate calculated as sum of thisUpdate and an offset. Ticket #571
* Randomized validityAndrew Wnuk2013-05-142-0/+357
| | | | | | This patch provides plug-in randomizing validity Ticket #607
* Bug 952500 - CMCAuth fails with error "CMCAuth: ↵Christina Fu2013-05-101-2/+5
| | | | | | java.security.NoSuchAlgorithmException" when using NetHSM token - small patch to remove Eclipse warning
* Bug 952500 - CMCAuth fails with error "CMCAuth: ↵Christina Fu2013-05-021-1/+25
| | | | java.security.NoSuchAlgorithmException" when using NetHSM token
* Reverting to old CLI behavior on client database initialization.Endi Sukma Dewata2013-04-282-0/+61
| | | | | | | | | Recently the CLI was changed to initialize the default client database automatically which will create it if it did not exist before. This was causing a problem since the database was not created with a password. To create the database properly a separate command is needed. For now the CLI is reverted to the old behavior where it initializes the database only if it requires for SSL connection and/or client authentication.
* Added separate CLI option for client database password.Endi Sukma Dewata2013-04-281-0/+16
| | | | | | | | Previously the -w option is used to specify the password for either the username/password authentication or client database password to do client certificate authentication. Since the passwords now may be used at the same time, a new -c option has been added for the client database password.
* Ignoring warnings/errors during installation.Endi Sukma Dewata2013-04-283-42/+43
| | | | | | | | The code used by pkispawn and pkidestroy has been modified to ignore certificate validity warnings/errors that happens during installation. The instanceCreationMode is now redundant and has been removed from ClientConfig.
* Added method to download CA cert chain from admin interface.Endi Sukma Dewata2013-04-262-4/+9
| | | | | | | | A new method has been added to the PKIClient to download the CA certificate chain from an alternative location including the admin interface. Ticket #491
* Updated default client database location for CLI.Endi Sukma Dewata2013-04-261-25/+0
| | | | | | | | The default client database location for CLI has been changed to ~/.dogtag/nssdb. The database will always be initialized regardless whether it is actually used. Ticket #491
* Refactored code to import CA certificate.Endi Sukma Dewata2013-04-2513-161/+231
| | | | | | | | | | | | | The code to import CA certificate has been moved from PKIConnection into PKIClient to allow reuse. The Client classes have been modified such that it uses a shared PKIClient object instead of PKIConnection. The return codes in CertFindCLI has been fixed to be more consistent with other commands. Ticket #491
* cloning improvementAndrew Wnuk2013-04-251-6/+11
| | | | | | This patch improves cloning in regards to configuration of random certificate serial numbers. Bug: 922121.
* correcting JavaScript inability to handle big numbersAndrew Wnuk2013-04-243-0/+11
| | | | | | This patch corrects JavaScript inability to handle big numbers in key key recovery process. Bug: 955784.
* Check the actual result of operations cert revoke/unrevoke.Abhishek Koneru2013-04-232-2/+37
| | | | | | | | Output the actual result of a revoke/unrevoke operation in CLI. Since the actual result of the operation can be different from the cert request status. Ticket #217
* corrected JavaScript issue with big numbersAndrew Wnuk2013-04-231-0/+3
| | | | | | This patch corrects key IDs miscalculated by JavaScript for key search results and key record views. Bug: 951501.
* Added options to reject/ignore cert validity statuses.Endi Sukma Dewata2013-04-221-14/+75
| | | | | | | | New options have been added to the CLI to reject or ignore certain cert validity statuses such as UNTRUSTED_ISSUER or BAD_CERT_DOMAIN. The options can also be defined in pki.conf as a system-wide policy. Ticket #491
* Adding CLI functionality to import CA certificate.Endi Sukma Dewata2013-04-221-2/+74
| | | | | | | | | The CLI has been modified such that when it connects to an untrusted server it will ask the user whether to import the CA certificate and also ask for the location of the CA server from which to download the CA certificate. Ticket #491
* Minor fixes in a few configuration UI panels of RA and TPS.Abhishek Koneru2013-04-221-0/+1
| | | | | | | | Changed the status check and restart commands to systemctl. The text $errorString will not be seen when the security domain login panel is launched for the first time. Ticket #452
* Added servlet to return 501 for rest operations for d9 instancesAde Lee2013-04-221-0/+47
| | | | | | | | | | D9 instances run on tomcat6, which does not have support for the autheticator and realm. We are not supporting the REST operations on D9 style instances. They will need to be migrated. The migration framework has been modified to process d9 or d10 style instances, and a migration script has been added to add the new servlet to existing d9 instances.
* random certificate serial numbersAndrew Wnuk2013-04-1911-38/+623
| | | | | | This patch adds support for random certificate serial numbers. Bug 912554.
* Tracking upgrade using existing config files.Endi Sukma Dewata2013-04-171-1/+1
| | | | | | | | | | | The upgrade framework has been modified to use pki.conf to track system upgrade, tomcat.conf to track instance upgrade, and CS.cfg to track subsystem upgrade. The preop.product.version in CS.cfg has been renamed into cms.product.version and is now used to track upgrade. Ticket #544
* Added tokenAuthenticate to admin interfaceAde Lee2013-04-161-20/+50
| | | | | | | Modified code to use this interface by default. Added required migration script code. Ticket 546
* Bug 929043 - updated serverCert.profile with SAN results in ↵Christina Fu2013-04-033-3/+10
| | | | | | SubjectAltNameExtDefault gname is empty, not added in cert ext during configuration Bug 927545 - Transport Cert signing Algorithm doesn't show ECC Signing Algorithms during DRM configuration with ECC
* Bug 824920 - NSCertTypeExtDefault.java incorrectly encodes ↵Christina Fu2013-03-261-3/+4
| | | | NSCertTypeExtension bits (patch from mpoole)
* Bug 904289 - Add ECC Support to Certificate ProfilesChristina Fu2013-03-251-1/+4
|
* Added CLI option to capture HTTP messages.Endi Sukma Dewata2013-03-221-2/+106
| | | | | | | A new option has been added to the CLI to capture HTTP requests and responses and store them in the specified folder. Ticket #523
* Refactor installation code to remove dependency on jythonAde Lee2013-03-213-14/+13
| | | | | | | | | | | | | Connection is now made to the installation servlet through a python client using JSON. The code to construct the ConfgurationRequest and parse the results has been moved to pkihelper.py, and configuration.py no longer calls a separate jython process to create the Configuration object and parse the results. The jython code has therefore been removed. Also added status servlet to other java subsystems, to be tested prior to starting configuration. Trac Ticket 532
* Plug resource leaksAde Lee2013-03-0810-77/+53
|