summaryrefslogtreecommitdiffstats
path: root/base/java-tools/src
Commit message (Collapse)AuthorAgeFilesLines
* Added audit resource.Endi S. Dewata2013-10-088-0/+282
| | | | | | | A new REST service and clients have been added to manage the audit configuration in all subsystems. Ticket #652
* Fixed problem getting client object.Endi S. Dewata2013-10-083-5/+5
| | | | | Some recently added CLI modules need to be fixed to get the client object properly from the parent module.
* Added CA certificate CLI.Endi S. Dewata2013-10-082-5/+11
| | | | | The ca-cert-* commands have been added to eventually replace cert-*. The CATest has been updated to use the CertClient directly.
* Fixed user and group commands.Endi S. Dewata2013-10-0816-135/+273
| | | | | | The commands for user certificates, user memberships, and group members have been renamed to be more consistent such that they can be parsed correctly.
* Added selftest resource.Endi S. Dewata2013-10-089-0/+320
| | | | | | | New REST service and clients have been added for managing selftests in all subsystems. Ticket #652
* Fixed CLI authentication issue.Endi S. Dewata2013-10-0111-104/+237
| | | | | | | Previously the CLI authentication could fail because it's using a fixed default subsystem which may not match the command it's trying to execute. The CLI has now been modified to use the appropriate default subsystem depending on the command to be executed.
* Added TPS profile mapping resource.Endi S. Dewata2013-10-018-0/+546
| | | | | | | A new REST service and clients have been added to manage the profile mappings in the TPS configuration file. Ticket #652
* Added TPS connection service implementation.Endi S. Dewata2013-10-015-104/+52
| | | | | | | The implementation of the TPS connection service has been modified to use the configuration database to read and write the configuration file. Ticket #652
* Added TPS authenticator service implementation.Endi S. Dewata2013-10-015-105/+53
| | | | | | | The implementation of the TPS authenticator service has been modified to use the configuration database to read and write the configuration file. Ticket #652
* Refactored TPS configuration resource.Endi S. Dewata2013-10-014-134/+22
| | | | | | | | The REST interface for TPS configuration has been modified to provide access to TPS general configuration as originally designed. The configuration database has been modified such that it can be reused by other configuration resources. Ticket #652
* Refactored CLI framework.Endi S. Dewata2013-10-0114-307/+69
| | | | | The CLI framework has been modified to remove duplicate code in various CLI modules.
* Added method to modify connectorAde Lee2013-09-302-0/+65
| | | | | Also changed permissions to allow admin users to delete a connector and its associated shared secret.
* Changes to TPSConnectorService based on reviewAde Lee2013-09-304-14/+63
|
* Add service to generate and retrieve a shared secretAde Lee2013-09-305-0/+289
| | | | | | | | | | | | | | | | A new REST service has been added to the TKS to manage shared secrets. The shared secret is tied to the TKS-TPS connector, and is created at the end of the TPS configuration. At this point, the TPS contacts the TKS and requests that the shared secret be generated. The secret is returned to the TPS, wrapped using the subsystem certificate of the TPS. The TPS should then decrypt the shared secret and store it in its certificate database. This operations requires JSS changes, though, and so will be deferred to a later patch. For now, though, if the TPS and TKS share the same certdb, then it is sufficient to generate the shared secret. Clients and CLI are also provided. The CLI in particular is used to remove the TPSConnector entries and the shared secret when the TPS is pkidestroyed.
* Added TPS config resource.Endi S. Dewata2013-09-205-0/+383
| | | | | | | | A new REST service and clients have been added to manage the TPS configuration in CS.cfg. When the configuration is updated, the previous configuration will be stored as a backup. Ticket #652
* Provide enrollment template per profileAde Lee2013-09-034-0/+161
| | | | | | | | | | | This adds an API call to get a template which can be used to generate an enrollment request which can be passed into the REST API. The template is simply a CertRequest with the relevant inputs for that profile added in. Per code review comments, have added the templates interface to CertRequestResource instead. This patch now includes /certrequests/profiles and /certrequests/profiles/{id}. In a subsequent patch, all calls in ProfileResource will be restricted to admins and agents.
* Bug 986831 - Some tools are broken for ECC with NSS token aloneChristina Fu2013-09-012-2/+4
|
* Added TPS authenticator resource.Endi S. Dewata2013-09-017-0/+558
| | | | | | | A skeleton for TPS authenticator services and the clients have been added. The service implementation will be added later. Ticket #652
* Added TPS connection resource.Endi S. Dewata2013-09-018-3/+561
| | | | | | | A skeleton for TPS connection services and the clients have been added. The service implementation will be added later. Ticket #652
* Reorganized TPS classes.Endi S. Dewata2013-09-017-14/+14
| | | | | | | | | | | The TPS classes have been reorganized as follows: * common: com.netscape.certsrv.tps * CLI: com.netscape.cmstools.tps * server: org.dogtagpki.server.tps TPSConnection and TPSMessage were moved from server package into common package. The build script and configuration files have been modified accordingly.
* CRMFPopClient updateAndrew Wnuk2013-08-281-10/+84
| | | | | | This patch provides enhancement to CRMFPopClient allowing to control encoding for components of the subject name. Ticket #676
* PKCS10Client updateAndrew Wnuk2013-08-261-9/+85
| | | | | | This patch provides enhancement to PKCS10Client allowing to control encoding for components of the subject name. Ticket #677
* Added TPS certificate resource.Endi S. Dewata2013-08-244-0/+240
| | | | | | | | New TPS services and clients have been added for TPS certificates. The certificate database is currently implemented as in-memory database with some sample data. Later it will be converted into LDAP database. Ticket #652
* Added subsystem group commands.Endi S. Dewata2013-08-247-4/+18
| | | | | | | The group client and CLI has been added into each subsystem (e.g. ca-group-*) while keeping the original command for backward compatibility. Ticket #652
* Added TPS user CLI.Endi S. Dewata2013-08-241-0/+2
| | | | | | | | The TPS client has been modified to include user client. The TPS CLI has also been modified to provide user commands. New ACL entries have been added to grant access rights to TPS administrators. Ticket #652
* Added TPS activities resource.Endi S. Dewata2013-08-244-0/+235
| | | | | | | | New REST services and clients have been added for TPS activities. The activity database is currently implemented as in-memory database with some sample data. Later it will be converted into LDAP database. Ticket #652
* Reorganized CLI user commands.Endi S. Dewata2013-08-236-1/+226
| | | | | | | | New CLI modules have been added for each subsystem. The user commands have been added to these subsystems while keeping the original command for backward compatibility. Ticket #701
* Refactored CLI framework.Endi S. Dewata2013-08-2359-636/+584
| | | | | | | | | | Some common CLI methods and attributes have been refactored into the CLI base class. A new SubsystemCLI class was added as the base for subsystem CLI modules. The MainCLI was modified such that it will only perform authentication if the subsystem is specified in the server URI. If no subsystem is specified in the URI, the authentication will be done by the subsystem CLI module. Ticket #701
* Refactored client framework.Endi S. Dewata2013-08-231-1/+1
| | | | | | | | | A new Client class was added as a base for all client classes. The SubsystemClient was added as a base for all subsystem clients. It also provides methods to authenticate against the subsystem. The DRMClient has been renamed to KRAClient to match the actual subsystem name. Ticket #701
* Add TPS profile ID auxilliary object to tps usersAde Lee2013-08-211-0/+9
|
* Added generic database.Endi S. Dewata2013-08-201-1/+1
| | | | | | | | A new generic database class has been added to simplify in-memory database creation. The token database has been refactored to inherit this class. Ticket #652
* Added skeleton for token services.Endi S. Dewata2013-08-139-1/+628
| | | | | | | | A skeleton for token service and the clients has been added. Currently it's storing the database in memory. The actual implementation using LDAP database will be added after the TPS configuration code is ready. Ticket #652
* Fixes for profile REST interface from code review.Ade Lee2013-07-311-38/+31
| | | | Simplified the inputs, outputs for ProfileData
* Fix various issues with Profile InterfaceAde Lee2013-07-312-13/+62
| | | | | 1. Fixed REST API as per review. 2. Add output for profile-show and profile-find
* Fixed token authentication problem on RHEL.Endi S. Dewata2013-07-221-5/+39
| | | | | | | | The CryptoManager.initialize() and CryptoToken.login() invocation has been moved into the main program as a workaround for the authentication problem on RHEL and to ensure proper initialization in general. Bugzilla #985111
* Add interfaces for managing profilesAde Lee2013-07-229-0/+451
| | | | | This adds the initial framework for viewing and managing profiles. Also adds CLI code for viewing/adding/deleting and editing profiles.
* Reverting to old CLI behavior on client database initialization.Endi Sukma Dewata2013-04-281-43/+7
| | | | | | | | | Recently the CLI was changed to initialize the default client database automatically which will create it if it did not exist before. This was causing a problem since the database was not created with a password. To create the database properly a separate command is needed. For now the CLI is reverted to the old behavior where it initializes the database only if it requires for SSL connection and/or client authentication.
* Added separate CLI option for client database password.Endi Sukma Dewata2013-04-281-2/+10
| | | | | | | | Previously the -w option is used to specify the password for either the username/password authentication or client database password to do client certificate authentication. Since the passwords now may be used at the same time, a new -c option has been added for the client database password.
* Ignoring warnings/errors during installation.Endi Sukma Dewata2013-04-281-10/+6
| | | | | | | | The code used by pkispawn and pkidestroy has been modified to ignore certificate validity warnings/errors that happens during installation. The instanceCreationMode is now redundant and has been removed from ClientConfig.
* Added method to download CA cert chain from admin interface.Endi Sukma Dewata2013-04-261-10/+18
| | | | | | | | A new method has been added to the PKIClient to download the CA certificate chain from an alternative location including the admin interface. Ticket #491
* Updated default client database location for CLI.Endi Sukma Dewata2013-04-261-23/+33
| | | | | | | | The default client database location for CLI has been changed to ~/.dogtag/nssdb. The database will always be initialized regardless whether it is actually used. Ticket #491
* Added Client CLI module.Endi Sukma Dewata2013-04-256-1/+372
| | | | | | | A new CLI module has been added to manage certificates in client security database. Ticket #491
* Refactored code to import CA certificate.Endi Sukma Dewata2013-04-257-19/+33
| | | | | | | | | | | | | The code to import CA certificate has been moved from PKIConnection into PKIClient to allow reuse. The Client classes have been modified such that it uses a shared PKIClient object instead of PKIConnection. The return codes in CertFindCLI has been fixed to be more consistent with other commands. Ticket #491
* Check the actual result of operations cert revoke/unrevoke.Abhishek Koneru2013-04-234-21/+51
| | | | | | | | Output the actual result of a revoke/unrevoke operation in CLI. Since the actual result of the operation can be different from the cert request status. Ticket #217
* Added options to reject/ignore cert validity statuses.Endi Sukma Dewata2013-04-221-2/+45
| | | | | | | | New options have been added to the CLI to reject or ignore certain cert validity statuses such as UNTRUSTED_ISSUER or BAD_CERT_DOMAIN. The options can also be defined in pki.conf as a system-wide policy. Ticket #491
* Using FQDN instead of localhost in CLIEndi Sukma Dewata2013-04-191-4/+6
| | | | | | | The CLI has been modified such that by default it will use FQDN instead of localhost to avoid SSL certificate warnings. Ticket #541
* Remove [OPTIONS] from usage in commands with no options.Abhishek Koneru2013-04-1712-12/+12
| | | | | | | Remove the text [OPTIONS]... in user-show message, which misleads that there are other optional arguements. Ticket #543
* Change calls CMS.AtoB and CMS.BtoA on client side.Abhishek Koneru2013-03-282-7/+7
| | | | | | | | The PKCS10Client and CRMFPopClient use the CMS.BtoA and CMS.Atob for encoding and decoding purposes which throws an exception. Instead using the base64decode and the base64encode methods in Utils. Ticket #549
* Added CLI option to capture HTTP messages.Endi Sukma Dewata2013-03-221-3/+16
| | | | | | | A new option has been added to the CLI to capture HTTP requests and responses and store them in the specified folder. Ticket #523
* Plug resource leaksAde Lee2013-03-086-25/+21
|