private List<String> userManagerImpls = new ArrayList<String>();
/**
- * Field authorizerImpls.
+ * Field rbacManagerImpls.
*/
- private java.util.List<String> authorizerImpls;
+ private java.util.List<String> rbacManagerImpls;
private LdapConfiguration ldapConfiguration;
this.usersCacheConfiguration = usersCacheConfiguration;
}
- public List<String> getAuthorizerImpls()
+ public List<String> getRbacManagerImpls()
{
- return authorizerImpls;
+ return rbacManagerImpls;
}
- public void setAuthorizerImpls( List<String> authorizerImpls )
+ public void setRbacManagerImpls( List<String> rbacManagerImpls )
{
- this.authorizerImpls = authorizerImpls;
+ this.rbacManagerImpls = rbacManagerImpls;
}
@Override
final StringBuilder sb = new StringBuilder();
sb.append( "RedbackRuntimeConfiguration" );
sb.append( "{userManagerImpls=" ).append( userManagerImpls );
- sb.append( ", authorizerImpls=" ).append( authorizerImpls );
+ sb.append( ", rbacManagerImpls=" ).append( rbacManagerImpls );
sb.append( ", ldapConfiguration=" ).append( ldapConfiguration );
sb.append( ", migratedFromRedbackConfiguration=" ).append( migratedFromRedbackConfiguration );
sb.append( ", configurationProperties=" ).append( configurationProperties );
}
String authorizerImpls =
- userConfiguration.getConcatenatedList( UserConfigurationKeys.AUTHORIZER_IMPL, "rbac" );
+ userConfiguration.getConcatenatedList( UserConfigurationKeys.RBAC_MANAGER_IMPL, "cached" );
if ( StringUtils.isNotEmpty( authorizerImpls ) )
{
String[] impls = StringUtils.split( authorizerImpls, ',' );
for ( String impl : impls )
{
- redbackRuntimeConfiguration.getAuthorizerImpls().add( impl );
+ redbackRuntimeConfiguration.getRbacManagerImpls().add( impl );
}
}
else
{
- redbackRuntimeConfiguration.getAuthorizerImpls().add( userManagerImpl );
+ redbackRuntimeConfiguration.getRbacManagerImpls().add( userManagerImpl );
}
}
}
// we ensure authorizerImpls is not empty if so put
- if ( redbackRuntimeConfiguration.getAuthorizerImpls().isEmpty() )
+ if ( redbackRuntimeConfiguration.getRbacManagerImpls().isEmpty() )
{
log.info(
"redbackRuntimeConfiguration with empty authorizerImpls so force at least rbac implementation !" );
- redbackRuntimeConfiguration.getAuthorizerImpls().add( "rbac" );
+ redbackRuntimeConfiguration.getRbacManagerImpls().add( "rbac" );
updateRedbackRuntimeConfiguration( redbackRuntimeConfiguration );
}
import java.util.List;
+import org.apache.archiva.redback.rbac.RbacManagerException;
import org.apache.archiva.redback.system.check.EnvironmentCheck;
import org.apache.archiva.security.common.ArchivaRoleConstants;
import org.apache.archiva.redback.rbac.RBACManager;
import javax.inject.Named;
/**
- * ArchivaStandardRolesCheck tests for the existance of expected / standard roles and permissions.
- *
- *
+ * ArchivaStandardRolesCheck tests for the existance of expected / standard roles and permissions.
*/
@Service("environmentCheck#archiva-required-roles")
public class ArchivaStandardRolesCheck
implements EnvironmentCheck
{
private Logger log = LoggerFactory.getLogger( ArchivaStandardRolesCheck.class );
-
+
/**
*
*/
- @Inject @Named(value = "rbacManager#cached")
+ @Inject
+ @Named(value = "rbacManager#cached")
private RBACManager rbacManager;
/**
{
if ( !checked )
{
- String expectedRoles[] = new String[] {
- ArchivaRoleConstants.SYSTEM_ADMINISTRATOR_ROLE,
+ String expectedRoles[] = new String[]{ ArchivaRoleConstants.SYSTEM_ADMINISTRATOR_ROLE,
ArchivaRoleConstants.GLOBAL_REPOSITORY_MANAGER_ROLE,
- ArchivaRoleConstants.GLOBAL_REPOSITORY_OBSERVER_ROLE,
- ArchivaRoleConstants.GUEST_ROLE,
- ArchivaRoleConstants.REGISTERED_USER_ROLE,
- ArchivaRoleConstants.USER_ADMINISTRATOR_ROLE };
+ ArchivaRoleConstants.GLOBAL_REPOSITORY_OBSERVER_ROLE, ArchivaRoleConstants.GUEST_ROLE,
+ ArchivaRoleConstants.REGISTERED_USER_ROLE, ArchivaRoleConstants.USER_ADMINISTRATOR_ROLE };
log.info( "Checking the existance of required roles." );
for ( String roleName : expectedRoles )
{
- if ( !rbacManager.roleExists( roleName ) )
+ try
+ {
+ if ( !rbacManager.roleExists( roleName ) )
+ {
+ violations.add( "Unable to validate the existances of the '" + roleName + "' role." );
+ }
+ }
+ catch ( RbacManagerException e )
{
+ log.warn( "fail to verify existence of role '{}'", roleName );
violations.add( "Unable to validate the existances of the '" + roleName + "' role." );
}
}
- String expectedOperations[] = new String[] {
- ArchivaRoleConstants.OPERATION_MANAGE_USERS,
- ArchivaRoleConstants.OPERATION_MANAGE_CONFIGURATION,
- ArchivaRoleConstants.OPERATION_REGENERATE_INDEX,
- ArchivaRoleConstants.OPERATION_RUN_INDEXER,
- ArchivaRoleConstants.OPERATION_ACCESS_REPORT,
- ArchivaRoleConstants.OPERATION_ADD_REPOSITORY,
- ArchivaRoleConstants.OPERATION_DELETE_REPOSITORY,
- ArchivaRoleConstants.OPERATION_REPOSITORY_ACCESS,
- ArchivaRoleConstants.OPERATION_EDIT_REPOSITORY,
- ArchivaRoleConstants.OPERATION_REPOSITORY_UPLOAD,
- ArchivaRoleConstants.OPERATION_REPOSITORY_ACCESS,
+ String expectedOperations[] = new String[]{ ArchivaRoleConstants.OPERATION_MANAGE_USERS,
+ ArchivaRoleConstants.OPERATION_MANAGE_CONFIGURATION, ArchivaRoleConstants.OPERATION_REGENERATE_INDEX,
+ ArchivaRoleConstants.OPERATION_RUN_INDEXER, ArchivaRoleConstants.OPERATION_ACCESS_REPORT,
+ ArchivaRoleConstants.OPERATION_ADD_REPOSITORY, ArchivaRoleConstants.OPERATION_DELETE_REPOSITORY,
+ ArchivaRoleConstants.OPERATION_REPOSITORY_ACCESS, ArchivaRoleConstants.OPERATION_EDIT_REPOSITORY,
+ ArchivaRoleConstants.OPERATION_REPOSITORY_UPLOAD, ArchivaRoleConstants.OPERATION_REPOSITORY_ACCESS,
"archiva-guest" };
log.info( "Checking the existance of required operations." );