summaryrefslogtreecommitdiffstats
path: root/base/java-tools/src/com/netscape/cmstools/cli
Commit message (Collapse)AuthorAgeFilesLines
* Added CLIs to inspect PKCS #12 file.Endi S. Dewata2016-02-121-0/+3
| | | | | | | The pki pkcs12-cert-find and pki pkcs12-key-find commands have been added to list the certificates and keys in a PKCS #12 file. https://fedorahosted.org/pki/ticket/1742
* Added Java client and CLI support for Feature resource.Ade Lee2015-10-021-0/+2
|
* Lightweight CAs: add ca-authority CLIFraser Tweedale2015-09-261-0/+2
| | | | | | Add CLI commands for creating, listing and showing lightweight CAs. Part of: https://fedorahosted.org/pki/ticket/1213
* Removed audit CLI from non-TPS subsystems.Endi S. Dewata2015-07-174-8/+0
| | | | | | | | | | Due to database upgrade issue the pki <subsystem>-audit CLI has been removed from all subsystems except TPS. The AuditModifyCLI has been modified to clarify that the --action and the --input parameters are mutually exclusive. https://fedorahosted.org/pki/ticket/1437
* Fixed user-cert-add --serial with remote CA.Endi S. Dewata2015-07-092-13/+45
| | | | | | | | | | | | | | | | | The user-cert-add command has been modified to ask the user for the CA server URI if the CA is not available locally. A new SubsystemClient.exists() method has been added to check whether a subsystem is deployed on the target instance. The SubsystemCLI has been modified to call logout() only if the operation is executed successfully. The certificate approval callback class has been refactored out of PKIConnection into a separate class to clean up circular dependency with PKIClient. https://fedorahosted.org/pki/ticket/1448
* Fixed NPE in key-archive CLI.Endi S. Dewata2015-07-021-13/+8
| | | | | | | | The pki CLI has been modified such that if the security database location (-d) is not specified, the config.certDatabase will be initialized with the default value (i.e. ~/.dogtag/nssdb). The config.certDatabase is needed by the CLI to prepare the client library for key archival operations.
* Fixed pki help CLI.Endi S. Dewata2015-07-023-6/+98
| | | | | | A new findModules() method has been added to the CLI class to find the list of modules handling a command. The list will be used by the pki help CLI to find the proper man page for the specified command.
* Updated CRMFPopClient parameter handling.Endi S. Dewata2015-02-271-3/+3
| | | | | | | | | | | | The CRMFPopClient has been modified to use Apache Commons CLI library to handle the parameters. The help message has been rewritten to make it more readable. The submitRequest() will now display the error reason. The options in ClientCertRequestCLI have been simplified. A new option was added to generate CRMF request without POP. https://fedorahosted.org/pki/ticket/1074
* Refactored CRMFPopClient.Endi S. Dewata2015-01-281-2/+22
| | | | | | | | | | | | | | | | | | The CRMFPopClient has been refactored such that it is easier to understand and reuse. The code has been fixed such that it can read a normal PEM transport certificate. It also has been fixed to parse the request submission result properly. The client-cert-request CLI command was modified to support CRMF requests. The MainCLI and ClientConfig were modified to accept a security token name. The pki_java_command_wrapper.in was modified to include the Apache Commons IO library. https://fedorahosted.org/pki/ticket/1074
* Added CLI to import/export certificates with private keys.Endi S. Dewata2014-10-091-1/+3
| | | | | | | New CLI commands have been added to import/export certificates and private keys into/from the client security database. The CLI can also be used to generate the file needed by Python client library for client certificate authentication.
* Added client-cert-request CLI.Endi S. Dewata2014-09-191-2/+4
| | | | | | | A new CLI has been added to simplify the process to request a user certificate for client certificate authentication. Ticket #1148
* Fixed NPE in client-cert-import.Endi S. Dewata2014-08-281-1/+1
| | | | | | | The client-cert-import command has been modified to propertly initialize the CLI environment to avoid a null pointer exception. Ticket #1126
* Fixed problems with CLI authentication parameters.Endi S. Dewata2014-08-281-77/+74
| | | | | | | | | | | | | | | | | | | | Previously specifying a security database password in the CLI would require a certificate nickname to be specified as well. While this is correct for client certificate authentication, it caused a problem for operations that do not authenticate against the server such as client-init. The CLI has been modified to require a security database password only if the nickname is specified for client certificate authentication. Similar changes have been made to require user password only if the username is specified for basic authentication. The CLI also has been modified to store all specified parameters in the config object regardless of parameter validation. The manual page has been modified accordingly. Ticket #1125
* Alternative CLI password methodsMatthew Harmsen2014-08-141-19/+176
| | | | - PKI TRAC Ticket #555 - Other ways to specify CLI password
* Add ability to create database as subtree of existing treeAde Lee2014-07-171-1/+0
| | | | | | | | | | | | | | | | This patch adds the ability to create a subsystem that uses an existing subtree to create the internal basedn. This is useful for instance, for IPA which will use the original o=ipaca as the top level DN for a KRA, which will be situated at o=ipadrm, o=ipaca. The patch also allows such a system to be cloned, but not to setup the replication agreements, on the assumption that the data is already being replicated at the top-level DN or some higher level. The patch also contains some minor cleanups - removing unused imports and removal of an invalid reference in the python code. Ticket 1051
* Renamed TPS connection to TPS connector (part 1).Endi S. Dewata2014-05-081-2/+2
| | | | | | The TPS connection CLI has been renamed to TPS connector. Ticket #977
* Fixed issue by streamlining code to be more consistent.Matthew Harmsen2014-04-292-5/+5
| | | | * PKI TRAC Ticket #843 - Incorrect CLI argument parsing
* CLI argument parsing and bad return codesMatthew Harmsen2014-04-172-4/+9
| | | | | * PKI TRAC Ticket #843 - Incorrect CLI argument parsing * PKI TRAC Ticket #918 - CLI commands does not return code '1' for the failures
* Changes to KeyClient on the java side.Abhishek Koneru2014-03-191-1/+1
| | | | | The KeyClient class on the java side is modified to have a similar design as the KeyClient class on the python side.
* Cleaned up CLI command list.Endi S. Dewata2014-03-071-26/+7
| | | | | | | The CLI help message has been simplified to show the commands as a single list. Ticket #839
* Added CLI help command.Endi S. Dewata2014-03-072-0/+92
| | | | | | | | A new help command has been added to display the manual page of the specified command. If the manual page doesn't exist it will try to display the manual page of the parent command. Ticket #519
* Added CLI parameter to select message format.Endi S. Dewata2014-03-041-0/+8
| | | | | | | | | | | A new CLI parameter has been added to allow the user select the REST message format. This is done by setting the default consumes and produces when creating the client proxy. For this to work the hard-coded @Consumes and @Produces annotations need to be removed from the interface definition. A new interceptor has been added to validate the message format before executing the operation. Ticket #554
* Updated pki CLI man page.Endi S. Dewata2013-11-191-9/+9
| | | | | The man page for pki CLI has been updated to include the commands for managing the client security database.
* Fixed client-cert-import command.Endi S. Dewata2013-11-191-1/+2
| | | | | | | | | | | | Previously client-cert-import uses a JSS method that calls NSS function PK11_ImportDERCertForKey(). To import certificate without key it should use PK11_ImportCert but it's only available via certutil. So for now the client-cert-import has been modified to call certutil until the interface is added to JSS. The MainCLI has been modified not to call CryptoManager.initialize() to avoid locking up the security database while importing the certificate using certutil.
* Added client-init command.Endi S. Dewata2013-11-151-63/+70
| | | | | A new CLI command has been added to simplify the creation of client certificate database.
* Fixed CLI command parsing.Endi S. Dewata2013-11-142-13/+38
| | | | | | | | The CLI command parsing has been fixed such that it consumes all parts of the commands. If there's unprocessed component it means it is an invalid command. Ticket #787
* Renamed CLI commands.Endi S. Dewata2013-11-053-4/+6
| | | | | | | | | | | | | | | | | | The following commands have been renamed. The old commands will no longer work. * profile -> ca-profile * kraconnector -> ca-kraconnector The following commands have also been renamed, but the old commands will continue to work: * cert -> ca-cert * key -> kra-key The user and group commands have already been renamed to <subsytem>- user and <subsystem>-group. The old commands will continue to work and will use CA subsystem by default. Ticket #701
* Added mechanism to deprecate CLI commands.Endi S. Dewata2013-11-011-2/+39
| | | | | The CLI framework has been modified to support deprecating CLI commands by adding @Deprecated to the class name.
* Added audit resource.Endi S. Dewata2013-10-085-0/+10
| | | | | | | A new REST service and clients have been added to manage the audit configuration in all subsystems. Ticket #652
* Added CA certificate CLI.Endi S. Dewata2013-10-081-0/+2
| | | | | The ca-cert-* commands have been added to eventually replace cert-*. The CATest has been updated to use the CertClient directly.
* Added selftest resource.Endi S. Dewata2013-10-085-0/+10
| | | | | | | New REST service and clients have been added for managing selftests in all subsystems. Ticket #652
* Fixed CLI authentication issue.Endi S. Dewata2013-10-013-90/+187
| | | | | | | Previously the CLI authentication could fail because it's using a fixed default subsystem which may not match the command it's trying to execute. The CLI has now been modified to use the appropriate default subsystem depending on the command to be executed.
* Added TPS profile mapping resource.Endi S. Dewata2013-10-011-0/+2
| | | | | | | A new REST service and clients have been added to manage the profile mappings in the TPS configuration file. Ticket #652
* Refactored CLI framework.Endi S. Dewata2013-10-013-43/+58
| | | | | The CLI framework has been modified to remove duplicate code in various CLI modules.
* Add service to generate and retrieve a shared secretAde Lee2013-09-301-0/+2
| | | | | | | | | | | | | | | | A new REST service has been added to the TKS to manage shared secrets. The shared secret is tied to the TKS-TPS connector, and is created at the end of the TPS configuration. At this point, the TPS contacts the TKS and requests that the shared secret be generated. The secret is returned to the TPS, wrapped using the subsystem certificate of the TPS. The TPS should then decrypt the shared secret and store it in its certificate database. This operations requires JSS changes, though, and so will be deferred to a later patch. For now, though, if the TPS and TKS share the same certdb, then it is sufficient to generate the shared secret. Clients and CLI are also provided. The CLI in particular is used to remove the TPSConnector entries and the shared secret when the TPS is pkidestroyed.
* Added TPS config resource.Endi S. Dewata2013-09-201-0/+2
| | | | | | | | A new REST service and clients have been added to manage the TPS configuration in CS.cfg. When the configuration is updated, the previous configuration will be stored as a backup. Ticket #652
* Added TPS authenticator resource.Endi S. Dewata2013-09-011-0/+2
| | | | | | | A skeleton for TPS authenticator services and the clients have been added. The service implementation will be added later. Ticket #652
* Added TPS connection resource.Endi S. Dewata2013-09-011-0/+2
| | | | | | | A skeleton for TPS connection services and the clients have been added. The service implementation will be added later. Ticket #652
* Reorganized TPS classes.Endi S. Dewata2013-09-011-1/+1
| | | | | | | | | | | The TPS classes have been reorganized as follows: * common: com.netscape.certsrv.tps * CLI: com.netscape.cmstools.tps * server: org.dogtagpki.server.tps TPSConnection and TPSMessage were moved from server package into common package. The build script and configuration files have been modified accordingly.
* Added TPS certificate resource.Endi S. Dewata2013-08-241-0/+2
| | | | | | | | New TPS services and clients have been added for TPS certificates. The certificate database is currently implemented as in-memory database with some sample data. Later it will be converted into LDAP database. Ticket #652
* Added subsystem group commands.Endi S. Dewata2013-08-245-0/+10
| | | | | | | The group client and CLI has been added into each subsystem (e.g. ca-group-*) while keeping the original command for backward compatibility. Ticket #652
* Added TPS user CLI.Endi S. Dewata2013-08-241-0/+2
| | | | | | | | The TPS client has been modified to include user client. The TPS CLI has also been modified to provide user commands. New ACL entries have been added to grant access rights to TPS administrators. Ticket #652
* Added TPS activities resource.Endi S. Dewata2013-08-241-0/+2
| | | | | | | | New REST services and clients have been added for TPS activities. The activity database is currently implemented as in-memory database with some sample data. Later it will be converted into LDAP database. Ticket #652
* Reorganized CLI user commands.Endi S. Dewata2013-08-235-0/+220
| | | | | | | | New CLI modules have been added for each subsystem. The user commands have been added to these subsystems while keeping the original command for backward compatibility. Ticket #701
* Refactored CLI framework.Endi S. Dewata2013-08-234-78/+172
| | | | | | | | | | Some common CLI methods and attributes have been refactored into the CLI base class. A new SubsystemCLI class was added as the base for subsystem CLI modules. The MainCLI was modified such that it will only perform authentication if the subsystem is specified in the server URI. If no subsystem is specified in the URI, the authentication will be done by the subsystem CLI module. Ticket #701
* Added skeleton for token services.Endi S. Dewata2013-08-133-1/+127
| | | | | | | | A skeleton for token service and the clients has been added. Currently it's storing the database in memory. The actual implementation using LDAP database will be added after the TPS configuration code is ready. Ticket #652
* Fixed token authentication problem on RHEL.Endi S. Dewata2013-07-221-5/+39
| | | | | | | | The CryptoManager.initialize() and CryptoToken.login() invocation has been moved into the main program as a workaround for the authentication problem on RHEL and to ensure proper initialization in general. Bugzilla #985111
* Add interfaces for managing profilesAde Lee2013-07-221-0/+2
| | | | | This adds the initial framework for viewing and managing profiles. Also adds CLI code for viewing/adding/deleting and editing profiles.
* Reverting to old CLI behavior on client database initialization.Endi Sukma Dewata2013-04-281-43/+7
| | | | | | | | | Recently the CLI was changed to initialize the default client database automatically which will create it if it did not exist before. This was causing a problem since the database was not created with a password. To create the database properly a separate command is needed. For now the CLI is reverted to the old behavior where it initializes the database only if it requires for SSL connection and/or client authentication.
* Added separate CLI option for client database password.Endi Sukma Dewata2013-04-281-2/+10
| | | | | | | | Previously the -w option is used to specify the password for either the username/password authentication or client database password to do client certificate authentication. Since the passwords now may be used at the same time, a new -c option has been added for the client database password.