use of org.jboss.hal.meta.StatementContext in project console by hal.
the class EnableSSLWizard method show.
public void show() {
Constants constants = resources.constants();
AddressTemplate template = undertowHttps ? UNDERTOW_HTTPS_LISTENER_TEMPLATE : HTTP_INTERFACE_TEMPLATE;
Wizard.Builder<EnableSSLContext, EnableSSLState> wb = new Wizard.Builder<>(constants.enableSSLManagementTitle(), new EnableSSLContext());
wb.addStep(EnableSSLState.DEFINE_STRATEGY, new DefineStrategyStep(resources, environment.isStandalone(), undertowHttps)).addStep(EnableSSLState.CONFIGURATION, new ConfigurationStep(existingResources, resources, environment, undertowHttps, template)).addStep(EnableSSLState.REVIEW, new ReviewStep(dispatcher, statementContext, resources, environment, undertowHttps, template)).onBack((context, currentState) -> {
EnableSSLState previous = null;
switch(currentState) {
case DEFINE_STRATEGY:
break;
case CONFIGURATION:
previous = EnableSSLState.DEFINE_STRATEGY;
break;
case REVIEW:
previous = EnableSSLState.CONFIGURATION;
break;
default:
break;
}
return previous;
}).onNext((context, currentState) -> {
EnableSSLState next = null;
switch(currentState) {
case DEFINE_STRATEGY:
next = EnableSSLState.CONFIGURATION;
break;
case CONFIGURATION:
next = EnableSSLState.REVIEW;
break;
case REVIEW:
break;
default:
break;
}
return next;
}).stayOpenAfterFinish().onFinish((wizard, context) -> {
ModelNode model = context.model;
ModelNode credRef = new ModelNode();
credRef.get(CLEAR_TEXT).set(asString(model, AbstractConfiguration.KEY_STORE_PASSWORD));
// use Flow tasks to run DMR operations as there are resources that must exists before next
// operations are called, as in the example of a generate-key-pair and import-certificate
// the key-store must exists. For this case, the Composite doesn't work.
List<Task<FlowContext>> tasks = new ArrayList<>();
// key-store is only created when user chooses to create all resources or create a key-store based on
// an existing JKS file
boolean createKeyStore = !context.strategy.equals(EnableSSLContext.Strategy.KEYSTORE_RESOURCE_EXISTS);
String keyStoreName = createKeyStore ? asString(model, AbstractConfiguration.KEY_STORE_NAME) : asString(model, KEY_STORE);
if (createKeyStore) {
if (context.strategy.equals(EnableSSLContext.Strategy.KEYSTORE_CREATE)) {
ResourceAddress ksAddress = keyStoreTemplate().resolve(statementContext, keyStoreName);
tasks.add(flowContext -> {
Operation.Builder builder = new Operation.Builder(ksAddress, ADD).param(PATH, asString(model, KEY_STORE_PATH)).param(CREDENTIAL_REFERENCE, credRef).param(TYPE, asString(model, AbstractConfiguration.KEY_STORE_TYPE));
if (model.hasDefined(AbstractConfiguration.KEY_STORE_RELATIVE_TO)) {
builder.param(RELATIVE_TO, asString(model, AbstractConfiguration.KEY_STORE_RELATIVE_TO));
}
Operation keyStoreOp = builder.build();
return dispatcher.execute(keyStoreOp).doOnError(exception -> wizard.showError(constants.failed(), resources.messages().addKeyStoreError(keyStoreName), exception.getMessage(), false)).toCompletable();
});
tasks.add(flowContext -> {
Composite composite = new Composite();
// the generate-key=pair can only be called on an existing key-store
String dn = "CN=" + asString(model, AbstractConfiguration.PRIVATE_KEY_DN_CN) + ", OU=" + asString(model, AbstractConfiguration.PRIVATE_KEY_DN_OU) + ", O=" + asString(model, AbstractConfiguration.PRIVATE_KEY_DN_O) + ", L=" + asString(model, AbstractConfiguration.PRIVATE_KEY_DN_L) + ", ST=" + asString(model, AbstractConfiguration.PRIVATE_KEY_DN_ST) + ", C=" + asString(model, AbstractConfiguration.PRIVATE_KEY_DN_C);
Operation genKeyOp = new Operation.Builder(ksAddress, GENERATE_KEY_PAIR).param(ALIAS, asString(model, AbstractConfiguration.PRIVATE_KEY_ALIAS)).param(DISTINGUISHED_NAME, dn).param(VALIDITY, asString(model, AbstractConfiguration.PRIVATE_KEY_VALIDITY)).param(ModelDescriptionConstants.ALGORITHM, asString(model, AbstractConfiguration.PRIVATE_KEY_ALGORITHM)).build();
composite.add(genKeyOp);
Operation storeOp = new Operation.Builder(ksAddress, STORE).build();
composite.add(storeOp);
return dispatcher.execute(composite).toCompletable();
});
} else if (context.strategy.equals(EnableSSLContext.Strategy.KEYSTORE_FILE_EXISTS)) {
tasks.add(flowContext -> {
ResourceAddress ksAddress = keyStoreTemplate().resolve(statementContext, keyStoreName);
Operation.Builder builder = new Operation.Builder(ksAddress, ADD).param(PATH, asString(model, KEY_STORE_PATH)).param(CREDENTIAL_REFERENCE, credRef).param(TYPE, asString(model, AbstractConfiguration.KEY_STORE_TYPE)).param(REQUIRED, true);
if (model.hasDefined(AbstractConfiguration.KEY_STORE_RELATIVE_TO)) {
builder.param(RELATIVE_TO, asString(model, AbstractConfiguration.KEY_STORE_RELATIVE_TO));
}
Operation keyStoreOp = builder.build();
return dispatcher.execute(keyStoreOp).doOnError(exception -> wizard.showError(constants.failed(), resources.messages().addKeyStoreError(keyStoreName), exception.getMessage(), false)).toCompletable();
});
} else if (context.strategy.equals(EnableSSLContext.Strategy.KEYSTORE_OBTAIN_LETSENCRYPT)) {
ResourceAddress ksAddress = keyStoreTemplate().resolve(statementContext, keyStoreName);
tasks.add(flowContext -> {
Operation.Builder builder = new Operation.Builder(ksAddress, ADD).param(PATH, asString(model, KEY_STORE_PATH)).param(CREDENTIAL_REFERENCE, credRef).param(TYPE, asString(model, AbstractConfiguration.KEY_STORE_TYPE));
if (model.hasDefined(AbstractConfiguration.KEY_STORE_RELATIVE_TO)) {
builder.param(RELATIVE_TO, asString(model, AbstractConfiguration.KEY_STORE_RELATIVE_TO));
}
Operation keyStoreOp = builder.build();
return dispatcher.execute(keyStoreOp).doOnError(exception -> wizard.showError(constants.failed(), resources.messages().addKeyStoreError(keyStoreName), exception.getMessage(), false)).toCompletable();
});
String caaName = asString(model, CAA_NAME);
ResourceAddress caaAddress = certificateAuthorityAccountTemplate().resolve(statementContext, caaName);
tasks.add(flowContext -> {
Operation caaOp = new Operation.Builder(caaAddress, ADD).param(KEY_STORE, keyStoreName).param(ALIAS, asString(model, CAA_ALIAS)).build();
return dispatcher.execute(caaOp).doOnError(exception -> wizard.showError(constants.failed(), resources.messages().addResourceError(caaName, exception.getMessage()), false)).toCompletable();
});
tasks.add(flowContext -> {
Composite composite = new Composite();
String obtainAlias = asString(model, PRIVATE_KEY_ALIAS);
Operation obtainOp = new Operation.Builder(ksAddress, OBTAIN_CERTIFICATE).param(ALIAS, obtainAlias).param(CERTIFICATE_AUTHORITY_ACCOUNT, caaName).param("domain-names", model.get(CAA_DOMAIN_NAMES)).param("agree-to-terms-of-service", true).param("staging", asString(model, CAA_STAGING)).build();
composite.add(obtainOp);
Operation storeOp = new Operation.Builder(ksAddress, STORE).build();
composite.add(storeOp);
return dispatcher.execute(composite).doOnError(ex -> wizard.showError(constants.failed(), resources.messages().obtainCertificateError(obtainAlias, keyStoreName, ex.getMessage()), false)).toCompletable();
});
}
}
String trustManagerName = model.hasDefined(TRUST_MANAGER) ? asString(model, TRUST_MANAGER) : null;
if (context.mutualAuthentication) {
ModelNode tsCredRef = new ModelNode();
tsCredRef.get(CLEAR_TEXT).set(asString(model, AbstractConfiguration.TRUST_STORE_PASSWORD));
String trustStoreName = asString(model, AbstractConfiguration.TRUST_STORE_NAME);
ResourceAddress tsAddress = keyStoreTemplate().resolve(statementContext, trustStoreName);
tasks.add(flowContext -> {
Operation.Builder builder = new Operation.Builder(tsAddress, ADD).param(PATH, asString(model, AbstractConfiguration.TRUST_STORE_PATH)).param(CREDENTIAL_REFERENCE, tsCredRef).param(TYPE, asString(model, AbstractConfiguration.TRUST_STORE_TYPE));
if (model.hasDefined(AbstractConfiguration.TRUST_STORE_RELATIVE_TO)) {
builder.param(RELATIVE_TO, asString(model, AbstractConfiguration.TRUST_STORE_RELATIVE_TO));
}
Operation trustStoreOp = builder.build();
return dispatcher.execute(trustStoreOp).toCompletable();
});
tasks.add(flowContext -> {
Composite composite = new Composite();
Operation importCertOp = new Operation.Builder(tsAddress, IMPORT_CERTIFICATE).param(ALIAS, asString(model, AbstractConfiguration.CLIENT_CERTIFICATE_ALIAS)).param(PATH, asString(model, AbstractConfiguration.CLIENT_CERTIFICATE_PATH)).param(CREDENTIAL_REFERENCE, tsCredRef).param(VALIDATE, model.get(AbstractConfiguration.CLIENT_CERTIFICATE_VALIDATE).asBoolean(false)).param(TRUST_CACERTS, model.get(AbstractConfiguration.CLIENT_CERTIFICATE_TRUST).asBoolean(false)).build();
composite.add(importCertOp);
Operation storeOp = new Operation.Builder(tsAddress, STORE).build();
composite.add(storeOp);
ResourceAddress etmAddress = trustManagerTemplate().resolve(statementContext, trustManagerName);
Operation trustManagerOp = new Operation.Builder(etmAddress, ADD).param(KEY_STORE, trustStoreName).param(ModelDescriptionConstants.ALGORITHM, KEY_MANAGER_ALGORITHM).build();
composite.add(trustManagerOp);
return dispatcher.execute(composite).toCompletable();
});
}
Composite composite = new Composite();
String keyManager = asString(model, KEY_MANAGER);
ResourceAddress ekmAddress = keyManagerTemplate().resolve(statementContext, keyManager);
Operation keyManagerOp = new Operation.Builder(ekmAddress, ADD).param(KEY_STORE, keyStoreName).param(ModelDescriptionConstants.ALGORITHM, KEY_MANAGER_ALGORITHM).param(CREDENTIAL_REFERENCE, credRef).build();
composite.add(keyManagerOp);
ModelNode protocols = new ModelNode();
protocols.add(KEY_MANAGER_TLSV1_2);
String serverSslContext = asString(model, SERVER_SSL_CONTEXT);
ResourceAddress sslCtxAddress = sslContextTemplate().resolve(statementContext, serverSslContext);
Operation.Builder sslCtxBuilder = new Operation.Builder(sslCtxAddress, ADD).param(KEY_MANAGER, keyManager).param(PROTOCOLS, protocols);
if (context.mutualAuthentication) {
sslCtxBuilder.param(TRUST_MANAGER, trustManagerName);
sslCtxBuilder.param(WANT_CLIENT_AUTH, true);
}
Operation sslCtxOp = sslCtxBuilder.build();
composite.add(sslCtxOp);
if (undertowHttps) {
ResourceAddress httpsAddress = UNDERTOW_HTTPS_LISTENER_TEMPLATE.resolve(statementContext, undertowServer, httpsListener);
Operation writeSslCtxOp = new Operation.Builder(httpsAddress, WRITE_ATTRIBUTE_OPERATION).param(NAME, SSL_CONTEXT).param(VALUE, serverSslContext).build();
composite.add(writeSslCtxOp);
// undefine the "alternatives" attributes
composite.add(undefineAttribute(httpsAddress, SECURITY_REALM));
composite.add(undefineAttribute(httpsAddress, "verify-client"));
composite.add(undefineAttribute(httpsAddress, "enabled-cipher-suites"));
composite.add(undefineAttribute(httpsAddress, "enabled-protocols"));
composite.add(undefineAttribute(httpsAddress, "ssl-session-cache-size"));
composite.add(undefineAttribute(httpsAddress, "ssl-session-timeout"));
} else {
ResourceAddress httpInterfaceAddress = HTTP_INTERFACE_TEMPLATE.resolve(statementContext);
Operation writeSslCtxOp = new Operation.Builder(httpInterfaceAddress, WRITE_ATTRIBUTE_OPERATION).param(NAME, SSL_CONTEXT).param(VALUE, serverSslContext).build();
composite.add(writeSslCtxOp);
if (environment.isStandalone()) {
Operation writeSecureSocketBinding = new Operation.Builder(httpInterfaceAddress, WRITE_ATTRIBUTE_OPERATION).param(NAME, SECURE_SOCKET_BINDING).param(VALUE, asString(model, SECURE_SOCKET_BINDING)).build();
composite.add(writeSecureSocketBinding);
} else {
Operation writeSecurePortOp = new Operation.Builder(httpInterfaceAddress, WRITE_ATTRIBUTE_OPERATION).param(NAME, SECURE_PORT).param(VALUE, asString(model, SECURE_PORT)).build();
composite.add(writeSecurePortOp);
}
}
tasks.add(flowContext -> dispatcher.execute(composite).toCompletable());
series(new FlowContext(progress.get()), tasks).subscribe(new SuccessfulOutcome<FlowContext>(eventBus, resources) {
@Override
public void onSuccess(FlowContext flowContext) {
if (undertowHttps) {
wizard.showSuccess(resources.constants().success(), resources.messages().enableSSLResultsSuccessUndertow(httpsListener, serverSslContext), context1 -> presenter.reloadView(), true);
} else {
// constructs the http management console url
String serverName = environment.isStandalone() ? Names.STANDALONE_SERVER : Names.DOMAIN_CONTROLLER;
String label = resources.constants().reload() + " " + serverName;
SafeHtml description;
StringBuilder location = new StringBuilder("https://" + window.location.getHostname() + ":");
if (environment.isStandalone()) {
location.append(context.securePort);
description = resources.messages().enableSSLResultsSuccessStandalone(location.toString());
} else {
location.append(asString(model, SECURE_PORT));
description = resources.messages().enableSSLResultsSuccessDomain(location.toString());
}
// extracts the url search path, so the url shows the view the user is located
String urlSuffix = window.location.getHref();
urlSuffix = urlSuffix.substring(urlSuffix.indexOf("//") + 2);
urlSuffix = urlSuffix.substring(urlSuffix.indexOf("/"));
location.append(urlSuffix);
wizard.showSuccess(resources.constants().success(), description, label, // reloads the server/host if user clicks on the success action
context1 -> presenter.reloadServer(host, location.toString()), // reload only the view and displays a success message
context2 -> {
presenter.reloadView();
MessageEvent.fire(eventBus, Message.success(resources.messages().enableSSLSuccess()));
}, true);
}
}
@Override
public void onError(FlowContext context, Throwable exception) {
wizard.showError(resources.constants().failed(), resources.messages().enableSSLResultsError(), exception.getMessage(), false);
}
});
});
Wizard<EnableSSLContext, EnableSSLState> wizard = wb.build();
wizard.show();
}
use of org.jboss.hal.meta.StatementContext in project console by hal.
the class OtherSettingsPresenter method addSecurityDomain.
// -------------------------------------------- Security Domain
void addSecurityDomain() {
Metadata metadata = metadataRegistry.lookup(SECURITY_DOMAIN_TEMPLATE);
// emulate capability-reference on default-realm
String capabilityReference = metadata.getDescription().findAttribute(ATTRIBUTES + "/" + REALMS + "/" + VALUE_TYPE, REALM).getValue().get(CAPABILITY_REFERENCE).asString();
String id = Ids.build(Ids.ELYTRON_SECURITY_DOMAIN, Ids.ADD);
NameItem nameItem = new NameItem();
ModelNodeForm<ModelNode> form = new ModelNodeForm.Builder<>(id, metadata).addOnly().unboundFormItem(nameItem, 0).include(DEFAULT_REALM).unsorted().build();
form.getFormItem(DEFAULT_REALM).setRequired(true);
form.getFormItem(DEFAULT_REALM).registerSuggestHandler(new SuggestCapabilitiesAutoComplete(dispatcher, statementContext, capabilityReference, metadata.getTemplate()));
new AddResourceDialog(resources.messages().addResourceTitle(Names.SECURITY_DOMAIN), form, (name, model) -> {
if (model != null) {
// add the default-realm in the list of realms
ModelNode realm = new ModelNode();
realm.get(REALM).set(model.get(DEFAULT_REALM).asString());
model.get(REALMS).add(realm);
}
ResourceAddress address = SECURITY_DOMAIN_TEMPLATE.resolve(statementContext, nameItem.getValue());
crud.add(Names.SECURITY_DOMAIN, name, address, model, (n, a) -> reload(SECURITY_DOMAIN, nodes -> getView().updateResourceElement(SECURITY_DOMAIN, nodes)));
}).show();
}
use of org.jboss.hal.meta.StatementContext in project console by hal.
the class OtherSettingsPresenter method addKeyManager.
// ------------------------------------------------------ key manager
void addKeyManager() {
Metadata metadata = metadataRegistry.lookup(KEY_MANAGER_TEMPLATE);
Metadata crMetadata = metadata.forComplexAttribute(CREDENTIAL_REFERENCE, true);
crMetadata.copyComplexAttributeAttributes(asList(STORE, ALIAS, TYPE, CLEAR_TEXT), metadata);
String id = Ids.build(Ids.ELYTRON_KEY_MANAGER, Ids.ADD);
NameItem nameItem = new NameItem();
ModelNodeForm<ModelNode> form = new ModelNodeForm.Builder<>(id, metadata).addOnly().unboundFormItem(nameItem, 0).include(STORE, ALIAS, TYPE, CLEAR_TEXT).unsorted().build();
form.addFormValidation(new RequireAtLeastOneAttributeValidation<>(asList(STORE, CLEAR_TEXT), resources));
new AddResourceDialog(resources.messages().addResourceTitle(Names.KEY_MANAGER), form, (name, model) -> {
if (model != null) {
move(model, STORE, CREDENTIAL_REFERENCE + "/" + STORE);
move(model, ALIAS, CREDENTIAL_REFERENCE + "/" + ALIAS);
move(model, TYPE, CREDENTIAL_REFERENCE + "/" + TYPE);
move(model, CLEAR_TEXT, CREDENTIAL_REFERENCE + "/" + CLEAR_TEXT);
}
ResourceAddress address = KEY_MANAGER_TEMPLATE.resolve(statementContext, nameItem.getValue());
crud.add(Names.KEY_MANAGER, name, address, model, (n, a) -> reload(KEY_MANAGER, nodes -> getView().updateResourceElement(KEY_MANAGER, nodes)));
}).show();
}
use of org.jboss.hal.meta.StatementContext in project console by hal.
the class RealmsPresenter method addPropertiesRealm.
// ------------------------------------------------------ properties realm
void addPropertiesRealm() {
Metadata metadata = metadataRegistry.lookup(PROPERTIES_REALM_TEMPLATE);
Metadata upMetadata = metadata.forComplexAttribute(USERS_PROPERTIES, true);
upMetadata.copyComplexAttributeAttributes(asList(PATH, RELATIVE_TO), metadata);
String id = Ids.build(Ids.ELYTRON_PROPERTIES_REALM, Ids.ADD);
NameItem nameItem = new NameItem();
Form<ModelNode> form = new ModelNodeForm.Builder<>(id, metadata).addOnly().unboundFormItem(nameItem, 0).include(PATH, RELATIVE_TO, GROUPS_ATTRIBUTE).build();
form.getFormItem(RELATIVE_TO).registerSuggestHandler(new PathsAutoComplete());
new AddResourceDialog(resources.messages().addResourceTitle(Names.PROPERTIES_REALM), form, (name, model) -> {
if (model != null) {
move(model, PATH, USERS_PROPERTIES + "/" + PATH);
move(model, RELATIVE_TO, USERS_PROPERTIES + "/" + RELATIVE_TO);
}
ResourceAddress address = PROPERTIES_REALM_TEMPLATE.resolve(statementContext, nameItem.getValue());
crud.add(Names.PROPERTIES_REALM, name, address, model, (n, a) -> reload(PROPERTIES_REALM, nodes -> getView().updateResourceElement(PROPERTIES_REALM, nodes)));
}).show();
}
use of org.jboss.hal.meta.StatementContext in project console by hal.
the class DeploymentResources method readChildren.
public <T extends DeploymentResource> void readChildren(String subsystem, String resource, DeploymentResourceSupplier<T> supplier, Consumer<List<T>> callback) {
// /deployment=*/subsystem=<subsystem>:read-children-resources(child-type=<resource>)
// fails with "WFLYCTL0217: Child resource '\"deployment\" => \"*\"' not found"
// That's why we use: /deployment=*/subsystem=<subsystem>/<resource>=*:read-resource()
ResourceAddress deploymentAddress = DEPLOYMENT_TEMPLATE.append(SUBSYSTEM + "=" + subsystem).append(resource + "=*").resolve(statementContext);
Operation deploymentJobOperation = new Operation.Builder(deploymentAddress, READ_RESOURCE_OPERATION).param(INCLUDE_RUNTIME, true).param(RECURSIVE, true).build();
ResourceAddress subdeploymentAddress = SUBDEPLOYMENT_TEMPLATE.append(SUBSYSTEM + "=" + subsystem).append(resource + "=*").resolve(statementContext);
Operation subdeploymentJobOperation = new Operation.Builder(subdeploymentAddress, READ_RESOURCE_OPERATION).param(INCLUDE_RUNTIME, true).param(RECURSIVE, true).build();
dispatcher.execute(new Composite(deploymentJobOperation, subdeploymentJobOperation), (CompositeResult result) -> {
List<T> nodes = new ArrayList<>();
Consumer<ModelNode> nodeConsumer = node -> {
ResourceAddress address = new ResourceAddress(node.get(ADDRESS));
nodes.add(supplier.get(address, node.get(RESULT)));
};
result.step(0).get(RESULT).asList().forEach(nodeConsumer);
result.step(1).get(RESULT).asList().forEach(nodeConsumer);
callback.accept(nodes);
}, (operation, failure) -> {
logger.error("Unable to read {}/{} deployment resources: {}", subsystem, resource, failure);
callback.accept(emptyList());
});
}
Aggregations