Package org.graylog2

Examples of org.graylog2.Configuration


            preferencesRequest = objectMapper.readValue(body, TypeFactory.defaultInstance().constructMapType(Map.class, String.class, Object.class));
        } catch (IOException e) {
            throw new BadRequestException(e);
        }

        final User user = userService.load(username);
        if (user == null) {
            return status(NOT_FOUND).build();
        }
        user.setPreferences(preferencesRequest);
        try {
            userService.save(user);
        } catch (ValidationException e) {
            LOG.error("Validation error.", e);
            throw new BadRequestException("Validation error for " + username, e);
View Full Code Here


    @ApiOperation("Revoke all permissions for a user without deleting the account.")
    @ApiResponses({
            @ApiResponse(code = 500, message = "When saving the user failed.")
    })
    public Response deletePermissions(@ApiParam(name = "username", value = "The name of the user to modify.", required = true) @PathParam("username") String username) {
        final User user = userService.load(username);
        if (user == null) {
            return status(NOT_FOUND).build();
        }
        user.setPermissions(Lists.<String>newArrayList());
        try {
            userService.save(user);
        } catch (ValidationException e) {
            throw new InternalServerErrorException(e);
        }
View Full Code Here

        } catch (IOException e) {
            LOG.error("Error while parsing JSON", e);
            throw new WebApplicationException(e, BAD_REQUEST);
        }

        final User user = userService.load(username);
        if (user == null) {
            return status(NOT_FOUND).build();
        }

        if (!getSubject().isPermitted(RestPermissions.USERS_PASSWORDCHANGE + ":" + user.getName())) {
            return status(FORBIDDEN).build();
        }
        if (user.isExternalUser()) {
            LOG.error("Cannot change password for LDAP user.");
            return status(FORBIDDEN).build();
        }

        boolean checkOldPassword = true;
        // users with the wildcard permission for password change do not have to supply the old password, unless they try to change their own password.
        // the rationale is to prevent accidental or malicious change of admin passwords (e.g. to prevent locking out legitimate admins)
        if (getSubject().isPermitted(RestPermissions.USERS_PASSWORDCHANGE + ":*")) {
            if (username.equals(getSubject().getPrincipal())) {
                LOG.debug("User {} is allowed to change the password of any user, but attempts to change own password. Must supply the old password.", getSubject().getPrincipal());
                checkOldPassword = true;
            } else {
                LOG.debug("User {} is allowed to change the password for any user, including {}, ignoring old password", getSubject().getPrincipal(), username);
                checkOldPassword = false;
            }
        }

        boolean changeAllowed = false;
        final String secret = configuration.getPasswordSecret();
        if (checkOldPassword) {
            if (cr.old_password == null) {
                LOG.info("Changing password for user {} must supply the old password.", username);
                return status(BAD_REQUEST).build();
            }
            if (user.isUserPassword(cr.old_password, secret)) {
                changeAllowed = true;
            }
        } else {
            changeAllowed = true;
        }
        if (changeAllowed) {
            user.setPassword(cr.password, secret);
            try {
                userService.save(user);
            } catch (ValidationException e) {
                throw new BadRequestException("Validation error for " + username, e);
            }
View Full Code Here

    @GET
    @Path("{username}/tokens")
    @RequiresPermissions(RestPermissions.USERS_TOKENLIST)
    @ApiOperation("Retrieves the list of access tokens for a user")
    public TokenList listTokens(@ApiParam(name = "username", required = true) @PathParam("username") String username) {
        final User user = _tokensCheckAndLoadUser(username);
        final TokenList tokenList = new TokenList();
        List<AccessToken>  tokens = accessTokenService.loadAll(user.getName());
        for (AccessToken token : tokens) {
            tokenList.addToken(new Token(token));
        }
        return tokenList;
    }
View Full Code Here

      JAXBContext jc = JAXBContext.newInstance(Project.class);
      Unmarshaller um = jc.createUnmarshaller();
      Project project = ((Project) um.unmarshal(inputStream));

      Configuration configuration = project.getConfiguration();

      if (configuration != null)
      {
        Data data = configuration.getData();

        if (data != null)
        {
          ModuleDependencies moduleDependencies = data.getModuleDependencies();
View Full Code Here

      @Override
      public Configuration upgradeConfiguration(
          final org.sonatype.nexus.configuration.model.v2_2_0.Configuration oldConfig)
      {
        final Configuration newConfig = super.upgradeConfiguration(oldConfig);

        if (oldConfig.getGlobalHttpProxySettings() != null) {
          newConfig.setRemoteProxySettings(new CRemoteProxySettings());
          newConfig.getRemoteProxySettings().setHttpProxySettings(
              upgradeCRemoteHttpProxySettings(oldConfig.getGlobalHttpProxySettings())
          );
          newConfig.getRemoteProxySettings().setNonProxyHosts(
              oldConfig.getGlobalHttpProxySettings().getNonProxyHosts()
          );
        }

        return newConfig;
View Full Code Here

    org.sonatype.nexus.configuration.model.v2_5_0.Configuration oldc =
        (org.sonatype.nexus.configuration.model.v2_5_0.Configuration) message.getConfiguration();

    BasicVersionUpgrade versionConverter = new BasicVersionUpgrade();

    Configuration newc = versionConverter.upgradeConfiguration(oldc);
    newc.setVersion(Configuration.MODEL_VERSION);

    upgradeEmptyTrashTaskConfiguration(newc);
    updateSmtpSslTlsSettings(newc);

    message.setModelVersion(Configuration.MODEL_VERSION);
View Full Code Here

  }

  public void upgrade(UpgradeMessage message)
      throws ConfigurationIsCorruptedException
  {
    Configuration oldc = (Configuration) message.getConfiguration();

    org.sonatype.security.model.v2_0_0.Configuration newc = new org.sonatype.security.model.v2_0_0.Configuration();

    newc.setVersion(org.sonatype.security.model.v2_0_0.Configuration.MODEL_VERSION);

    for (CUser oldu : (List<CUser>) oldc.getUsers()) {
      org.sonatype.security.model.v2_0_0.CUser newu = new org.sonatype.security.model.v2_0_0.CUser();

      newu.setEmail(oldu.getEmail());
      newu.setId(oldu.getUserId());
      newu.setName(oldu.getName());
      newu.setPassword(oldu.getPassword());
      newu.setStatus(oldu.getStatus());
      newu.setRoles(oldu.getRoles());

      newc.addUser(newu);
    }

    for (CRole oldr : (List<CRole>) oldc.getRoles()) {
      org.sonatype.security.model.v2_0_0.CRole newr = new org.sonatype.security.model.v2_0_0.CRole();

      newr.setDescription(oldr.getDescription());
      newr.setId(oldr.getId());
      newr.setName(oldr.getName());
      newr.setPrivileges(oldr.getPrivileges());
      newr.setRoles(oldr.getRoles());
      newr.setSessionTimeout(oldr.getSessionTimeout());

      newc.addRole(newr);
    }

    for (CRepoTargetPrivilege oldp : (List<CRepoTargetPrivilege>) oldc.getRepositoryTargetPrivileges()) {
      org.sonatype.security.model.v2_0_0.CPrivilege newp = new org.sonatype.security.model.v2_0_0.CPrivilege();

      newp.setDescription(oldp.getDescription());
      newp.setId(oldp.getId());
      newp.setName(oldp.getName());
      newp.setType("target");

      org.sonatype.security.model.v2_0_0.CProperty prop = new org.sonatype.security.model.v2_0_0.CProperty();
      prop.setKey("method");
      prop.setValue(oldp.getMethod());
      newp.addProperty(prop);

      if (!StringUtils.isEmpty(oldp.getRepositoryId())) {
        prop = new org.sonatype.security.model.v2_0_0.CProperty();
        prop.setKey("repositoryGroupId");
        prop.setValue(oldp.getGroupId());
        newp.addProperty(prop);
      }

      if (!StringUtils.isEmpty(oldp.getRepositoryId())) {
        prop = new org.sonatype.security.model.v2_0_0.CProperty();
        prop.setKey("repositoryId");
        prop.setValue(oldp.getRepositoryId());
        newp.addProperty(prop);
      }

      prop = new org.sonatype.security.model.v2_0_0.CProperty();
      prop.setKey("repositoryTargetId");
      prop.setValue(oldp.getRepositoryTargetId());
      newp.addProperty(prop);

      newc.addPrivilege(newp);
    }

    for (CApplicationPrivilege oldp : (List<CApplicationPrivilege>) oldc.getApplicationPrivileges()) {
      org.sonatype.security.model.v2_0_0.CPrivilege newp = new org.sonatype.security.model.v2_0_0.CPrivilege();

      newp.setDescription(oldp.getDescription());
      newp.setId(oldp.getId());
      newp.setName(oldp.getName());
View Full Code Here

  @SuppressWarnings("unchecked")
  public void upgrade(UpgradeMessage message)
      throws ConfigurationIsCorruptedException
  {
    Configuration oldc = (Configuration) message.getConfiguration();

    org.sonatype.security.model.v2_0_1.Configuration newc = new org.sonatype.security.model.v2_0_1.Configuration();

    newc.setVersion(org.sonatype.security.model.v2_0_1.Configuration.MODEL_VERSION);

    for (CUser oldu : (List<CUser>) oldc.getUsers()) {
      org.sonatype.security.model.v2_0_1.CUser newu = new org.sonatype.security.model.v2_0_1.CUser();

      newu.setEmail(oldu.getEmail());
      newu.setId(oldu.getId());
      newu.setName(oldu.getName());
      newu.setPassword(oldu.getPassword());
      newu.setStatus(oldu.getStatus());
      newu.setRoles(oldu.getRoles());

      newc.addUser(newu);
    }

    List<RoleMap> roleMapList = new ArrayList<RoleMap>();

    for (CRole oldr : (List<CRole>) oldc.getRoles()) {
      // Simplest case, not an internal role, just copy
      if (!getRolesToRemove().contains(oldr.getId())) {
        org.sonatype.security.model.v2_0_1.CRole newr = new org.sonatype.security.model.v2_0_1.CRole();

        newr.setDescription(oldr.getDescription());
        newr.setId(oldr.getId());
        newr.setName(oldr.getName());
        newr.setPrivileges(oldr.getPrivileges());
        newr.setRoles(oldr.getRoles());
        newr.setSessionTimeout(oldr.getSessionTimeout());

        newc.addRole(newr);
      }
      // If we have internally, and the user has changed the role previously (as read only is new in this version)
      else if (shouldArchiveRole(oldr)) {
        org.sonatype.security.model.v2_0_1.CRole newr = new org.sonatype.security.model.v2_0_1.CRole();

        newr.setDescription(oldr.getDescription());
        newr.setId(oldr.getId() + "-customized");
        newr.setName(oldr.getName() + " (Customized)");
        newr.setPrivileges(oldr.getPrivileges());
        newr.setRoles(oldr.getRoles());
        newr.setSessionTimeout(oldr.getSessionTimeout());

        newc.addRole(newr);

        roleMapList.add(new RoleMap(oldr.getId(), newr.getId()));
      }
      // else the role will be removed, if it is now internal, and the user hasn't changed it
    }

    for (CPrivilege oldp : (List<CPrivilege>) oldc.getPrivileges()) {
      if (!getPrivsToRemove().contains(oldp.getId())) {
        org.sonatype.security.model.v2_0_1.CPrivilege newp =
            new org.sonatype.security.model.v2_0_1.CPrivilege();

        newp.setDescription(oldp.getDescription());
View Full Code Here

  }

  public void upgrade(UpgradeMessage message)
      throws ConfigurationIsCorruptedException
  {
    Configuration oldc = (Configuration) message.getConfiguration();

    org.sonatype.security.model.v2_0_2.Configuration newc = new org.sonatype.security.model.v2_0_2.Configuration();

    newc.setVersion(org.sonatype.security.model.Configuration.MODEL_VERSION);

    for (CUser oldu : (List<CUser>) oldc.getUsers()) {
      org.sonatype.security.model.v2_0_2.CUser newu = new org.sonatype.security.model.v2_0_2.CUser();

      newu.setEmail(oldu.getEmail());
      newu.setId(oldu.getId());
      newu.setName(oldu.getName());
      newu.setPassword(oldu.getPassword());
      newu.setStatus(oldu.getStatus());

      // convert the old roles mapping to the new one
      this.migrateOldRolesToUserRoleMapping(oldu.getId(), DEFAULT_SOURCE, oldu.getRoles(), newc);

      newc.addUser(newu);
    }

    Map<String, String> roleIdMap = new HashMap<String, String>();

    for (CRole oldr : (List<CRole>) oldc.getRoles()) {
      org.sonatype.security.model.v2_0_2.CRole newr = new org.sonatype.security.model.v2_0_2.CRole();

      newr.setDescription(oldr.getDescription());
      newr.setId(oldr.getId());
      newr.setName(oldr.getName());
      newr.setPrivileges(oldr.getPrivileges());
      newr.setRoles(oldr.getRoles());
      newr.setSessionTimeout(oldr.getSessionTimeout());

      newc.addRole(newr);

    }

    for (CPrivilege oldp : (List<CPrivilege>) oldc.getPrivileges()) {
      org.sonatype.security.model.v2_0_2.CPrivilege newp = new org.sonatype.security.model.v2_0_2.CPrivilege();

      newp.setDescription(oldp.getDescription());
      newp.setId(oldp.getId());
      newp.setName(oldp.getName());
View Full Code Here

TOP

Related Classes of org.graylog2.Configuration

Copyright © 2018 www.massapicom. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.