You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@ranger.apache.org by ma...@apache.org on 2014/12/16 03:44:31 UTC
[01/12] incubator-ranger git commit: RANGER-194: Rename classes under
web-admin project
Repository: incubator-ranger
Updated Branches:
refs/heads/master ef7b11da4 -> 06ca85385
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/test/java/org/apache/ranger/biz/TestXABizUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/test/java/org/apache/ranger/biz/TestXABizUtil.java b/security-admin/src/test/java/org/apache/ranger/biz/TestXABizUtil.java
deleted file mode 100644
index b56ceda..0000000
--- a/security-admin/src/test/java/org/apache/ranger/biz/TestXABizUtil.java
+++ /dev/null
@@ -1,548 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one or more
- * contributor license agreements. See the NOTICE file distributed with
- * this work for additional information regarding copyright ownership.
- * The ASF licenses this file to You under the Apache License, Version 2.0
- * (the "License"); you may not use this file except in compliance with
- * the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-package org.apache.ranger.biz;
-
-import java.io.File;
-import java.util.ArrayList;
-import java.util.List;
-
-import org.apache.ranger.biz.XABizUtil;
-import org.apache.ranger.common.AppConstants;
-import org.apache.ranger.common.ContextUtil;
-import org.apache.ranger.common.StringUtil;
-import org.apache.ranger.common.UserSessionBase;
-import org.apache.ranger.common.XACommonEnums;
-import org.apache.ranger.common.XAConstants;
-import org.apache.ranger.common.db.BaseDao;
-import org.apache.ranger.db.XADaoManager;
-import org.apache.ranger.db.XXAssetDao;
-import org.apache.ranger.db.XXPortalUserDao;
-import org.apache.ranger.db.XXResourceDao;
-import org.apache.ranger.db.XXUserDao;
-import org.apache.ranger.entity.XXAsset;
-import org.apache.ranger.entity.XXDBBase;
-import org.apache.ranger.entity.XXPortalUser;
-import org.apache.ranger.entity.XXResource;
-import org.apache.ranger.entity.XXUser;
-import org.apache.ranger.security.context.XAContextHolder;
-import org.apache.ranger.security.context.XASecurityContext;
-import org.apache.ranger.view.VXAsset;
-import org.apache.ranger.view.VXDataObject;
-import org.apache.ranger.view.VXPortalUser;
-import org.apache.ranger.view.VXResource;
-import org.apache.ranger.view.VXResponse;
-import org.junit.Assert;
-import org.junit.Before;
-import org.junit.Test;
-import org.junit.runner.RunWith;
-import org.mockito.InjectMocks;
-import org.mockito.Mock;
-import org.mockito.Mockito;
-import org.mockito.runners.MockitoJUnitRunner;
-
-@RunWith(MockitoJUnitRunner.class)
-public class TestXABizUtil {
-
- private Long id = 1L;
- private String resourceName = "hadoopdev";
-
- @InjectMocks
- XABizUtil xABizUtil = new XABizUtil();
-
- @Mock
- XADaoManager daoManager;
-
- @Mock
- StringUtil stringUtil;
-
- @Before
- public void setup(){
- XASecurityContext context = new XASecurityContext();
- context.setUserSession(new UserSessionBase());
- XAContextHolder.setSecurityContext(context);
- }
-
- @Test
- public void testHasPermission_When_disableAccessControl(){
- VXResource vXResource = null;
- xABizUtil.enableResourceAccessControl = false;
- VXResponse resp = xABizUtil.hasPermission(vXResource, AppConstants.XA_PERM_TYPE_UNKNOWN);
- Assert.assertNotNull(resp);
- }
-
- @Test
- public void testHasPermission_When_NoResource(){
- VXResource vXResource = null;
- VXResponse resp = xABizUtil.hasPermission(vXResource, AppConstants.XA_PERM_TYPE_UNKNOWN);
- Assert.assertNotNull(resp);
- Assert.assertEquals(VXResponse.STATUS_ERROR, resp.getStatusCode());
- Assert.assertEquals("Please provide valid policy.", resp.getMsgDesc());
- }
-
- @Test
- public void testHasPermission_emptyResourceName(){
- VXResource vXResource = new VXResource();
- XXPortalUser portalUser = new XXPortalUser();
- XXUserDao xxUserDao = Mockito.mock(XXUserDao.class);
- XXPortalUserDao userDao = Mockito.mock(XXPortalUserDao.class);
- XXUser xxUser = new XXUser();
- XXAsset xxAsset = new XXAsset();
- List<XXResource> lst = new ArrayList<XXResource>();
- XXResourceDao xxResourceDao = Mockito.mock(XXResourceDao.class);
- XXAssetDao xxAssetDao = Mockito.mock(XXAssetDao.class);
- Mockito.when(daoManager.getXXPortalUser()).thenReturn(userDao);
- Mockito.when(userDao.getById(Mockito.anyLong())).thenReturn(portalUser);
- Mockito.when(daoManager.getXXUser()).thenReturn(xxUserDao);
- Mockito.when(xxUserDao.findByUserName(Mockito.anyString())).thenReturn(xxUser);
- Mockito.when(daoManager.getXXResource()).thenReturn(xxResourceDao);
- Mockito.when(xxResourceDao.findByAssetIdAndResourceStatus(Mockito.anyLong(),Mockito.anyInt())).thenReturn(lst);
- Mockito.when(daoManager.getXXAsset()).thenReturn(xxAssetDao);
- Mockito.when(xxAssetDao.getById(Mockito.anyLong())).thenReturn(xxAsset);
- VXResponse resp = xABizUtil.hasPermission(vXResource, AppConstants.XA_PERM_TYPE_UNKNOWN);
- Mockito.verify(daoManager).getXXPortalUser();
- Mockito.verify(userDao).getById(Mockito.anyLong());
- Mockito.verify(daoManager).getXXUser();
- Mockito.verify(xxUserDao).findByUserName(Mockito.anyString());
- Assert.assertNotNull(resp);
- Assert.assertEquals(VXResponse.STATUS_ERROR, resp.getStatusCode());
- Assert.assertEquals("Permission Denied !", resp.getMsgDesc());
- }
-
- @Test
- public void testHasPermission_isAdmin(){
- VXResource vXResource = new VXResource();
- vXResource.setName(resourceName);
- vXResource.setAssetId(id);
- UserSessionBase currentUserSession = ContextUtil.getCurrentUserSession();
- currentUserSession.setUserAdmin(true);
- VXResponse resp = xABizUtil.hasPermission(vXResource, AppConstants.XA_PERM_TYPE_UNKNOWN);
- Assert.assertNotNull(resp);
- Assert.assertEquals(VXResponse.STATUS_SUCCESS, resp.getStatusCode());
- }
-
- @Test
- public void testIsNotAdmin(){
- boolean isAdminChk = xABizUtil.isAdmin();
- Assert.assertFalse(isAdminChk);
- }
-
- @Test
- public void testIsAdmin(){
- UserSessionBase currentUserSession = ContextUtil.getCurrentUserSession();
- currentUserSession.setUserAdmin(true);
- boolean isAdminChk = xABizUtil.isAdmin();
- Assert.assertTrue(isAdminChk);
- }
-
- @Test
- public void testUserSessionNull_forIsAdmin(){
- XAContextHolder.setSecurityContext(null);
- boolean isAdminChk = xABizUtil.isAdmin();
- Assert.assertFalse(isAdminChk);
- }
-
- @Test
- public void testGetXUserId_NoUserSession(){
- XAContextHolder.setSecurityContext(null);
- Long chk = xABizUtil.getXUserId();
- Assert.assertNull(chk);
- }
-
- @Test
- public void testGetXUserId_NoUser(){
- XASecurityContext context = new XASecurityContext();
- context.setUserSession(new UserSessionBase());
- XAContextHolder.setSecurityContext(context);
- XXPortalUser xxPortalUser = new XXPortalUser();
- XXUser xxUser = new XXUser();
- XXUserDao xxUserDao = Mockito.mock(XXUserDao.class);
- XXPortalUserDao xxPortalUserDao = Mockito.mock(XXPortalUserDao.class);
- Mockito.when(daoManager.getXXPortalUser()).thenReturn(xxPortalUserDao);
- Mockito.when(xxPortalUserDao.getById(Mockito.anyLong())).thenReturn(xxPortalUser);
- Mockito.when(daoManager.getXXUser()).thenReturn(xxUserDao);
- Mockito.when(xxUserDao.findByUserName(Mockito.anyString())).thenReturn(xxUser);
- Long chk = xABizUtil.getXUserId();
- Mockito.verify(daoManager).getXXPortalUser();
- Mockito.verify(xxPortalUserDao).getById(Mockito.anyLong());
- Mockito.verify(daoManager).getXXUser();
- Mockito.verify(xxUserDao).findByUserName(Mockito.anyString());
- Assert.assertNull(chk);
- }
-
- @Test
- public void testGetXUserId(){
- XXPortalUser xxPortalUser = new XXPortalUser();
- xxPortalUser.setId(id);
- XXUser xxUser = new XXUser();
- xxUser.setId(id);
- XXPortalUserDao xxPortalUserDao = Mockito.mock(XXPortalUserDao.class);
- XXUserDao xxUserDao = Mockito.mock(XXUserDao.class);
- XASecurityContext context = new XASecurityContext();
- UserSessionBase userSessionBase = new UserSessionBase();
- userSessionBase.setUserAdmin(true);
- context.setUserSession(userSessionBase);
- userSessionBase.setXXPortalUser(xxPortalUser);
- XAContextHolder.setSecurityContext(context);
- Mockito.when(daoManager.getXXPortalUser()).thenReturn(xxPortalUserDao);
- Mockito.when(xxPortalUserDao.getById(Mockito.anyLong())).thenReturn(xxPortalUser);
- Mockito.when(daoManager.getXXUser()).thenReturn(xxUserDao);
- Mockito.when(xxUserDao.findByUserName(Mockito.anyString())).thenReturn(xxUser);
- Long chk = xABizUtil.getXUserId();
- Mockito.verify(daoManager).getXXPortalUser();
- Mockito.verify(xxPortalUserDao).getById(Mockito.anyLong());
- Mockito.verify(daoManager).getXXUser();
- Mockito.verify(xxUserDao).findByUserName(Mockito.anyString());
- Assert.assertEquals(chk, id);
- }
-
- @Test
- public void testReplaceMetaChars_PathEmpty(){
- String path = "";
- String pathChk = xABizUtil.replaceMetaChars(path);
- Assert.assertFalse(pathChk.contains("\\*"));
- Assert.assertFalse(pathChk.contains("\\?"));
- }
-
- @Test
- public void testReplaceMetaChars_NoMetaChars(){
- String path = "\\Demo\\Test";
- String pathChk = xABizUtil.replaceMetaChars(path);
- Assert.assertFalse(pathChk.contains("\\*"));
- Assert.assertFalse(pathChk.contains("\\?"));
- }
-
- @Test
- public void testReplaceMetaChars_PathNull(){
- String path = null;
- String pathChk = xABizUtil.replaceMetaChars(path);
- Assert.assertNull(pathChk);
- }
-
- @Test
- public void testReplaceMetaChars(){
- String path = "\\Demo\\Test\\*\\?";
- String pathChk = xABizUtil.replaceMetaChars(path);
- Assert.assertFalse(pathChk.contains("\\*"));
- Assert.assertFalse(pathChk.contains("\\?"));
- }
-
- @Test
- public void testGeneratePublicName(){
- String firstName = "Test123456789123456789";
- String lastName = "Unit";
- String publicNameChk = xABizUtil.generatePublicName(firstName, lastName);
- Assert.assertEquals("Test12345678... U.", publicNameChk);
- }
-
- @Test
- public void testGeneratePublicName_fNameLessThanMax(){
- String firstName = "Test";
- String lastName = "";
- String publicNameChk = xABizUtil.generatePublicName(firstName, lastName);
- Assert.assertNull(publicNameChk);
- }
-
- @Test
- public void testGeneratePublicName_withPortalUser(){
- VXPortalUser vXPortalUser = new VXPortalUser();
- vXPortalUser.setFirstName("Test");
- vXPortalUser.setLastName(null);
- String publicNameChk = xABizUtil.generatePublicName(vXPortalUser, null);
- Assert.assertNull(publicNameChk);
- }
-
- @Test
- public void testGetDisplayName_EmptyName() {
- String displayNameChk = xABizUtil.getDisplayName(null);
- Assert.assertEquals(xABizUtil.EMPTY_CONTENT_DISPLAY_NAME, displayNameChk);
- }
-
- @Test
- public void testGetDisplayName_AssetName() {
- XXAsset obj = new XXAsset();
- obj.setDescription(resourceName);
- String displayNameChk = xABizUtil.getDisplayName(obj);
- Assert.assertEquals(resourceName, displayNameChk);
- }
-
- @Test
- public void testGetDisplayName_MoreThanMaxLen() {
- XXAsset obj = new XXAsset();
- String name = resourceName;
- for(int i=0;i<16;i++){
- name = name + "_" + name + "1";
- }
- obj.setDescription(name);
- String displayNameChk = xABizUtil.getDisplayName(obj);
- Assert.assertEquals(displayNameChk.length(), 150);
- }
-
- @Test
- public void testGetDisplayNameForClassName(){
- XXAsset obj = new XXAsset();
- String displayNameChk = xABizUtil.getDisplayNameForClassName(obj);
- Assert.assertEquals("Asset",displayNameChk);
- }
-
- @Test
- public void testGetFileNameWithoutExtension(){
- File file = new File("test.txt");
- String fileNameChk = xABizUtil.getFileNameWithoutExtension(file);
- Assert.assertEquals("test",fileNameChk);
- }
-
- @Test
- public void testGetFileNameWithoutExtension_NoFile(){
- String fileNameChk = xABizUtil.getFileNameWithoutExtension(null);
- Assert.assertNull(fileNameChk);
- }
-
- @Test
- public void testGetFileNameWithoutExtension_noExt(){
- File file = new File("test");
- String fileNameChk = xABizUtil.getFileNameWithoutExtension(file);
- Assert.assertEquals("test",fileNameChk);
- }
-
- @Test
- public void testGetImageExtension_TestJPG(){
- String contentType = "img.JPG";
- String extChk = xABizUtil.getImageExtension(contentType);
- Assert.assertEquals("jpg",extChk);
- }
-
- @Test
- public void testGetImageExtension_TestJPEG(){
- String contentType = "img.JPEG";
- String extChk = xABizUtil.getImageExtension(contentType);
- Assert.assertEquals("jpg",extChk);
- }
-
- @Test
- public void testGetImageExtension_TestPNG(){
- String contentType = "img.PNG";
- String extChk = xABizUtil.getImageExtension(contentType);
- Assert.assertEquals("png",extChk);
- }
-
- @Test
- public void testGetImageExtension_NoExt(){
- String contentType = "img";
- String extChk = xABizUtil.getImageExtension(contentType);
- Assert.assertEquals("",extChk);
- }
-
- @Test
- public void testGetMimeType_ForJPG(){
- String mimeTypeChk = xABizUtil.getMimeType(XAConstants.MIME_JPEG);
- Assert.assertEquals("jpg",mimeTypeChk);
- }
-
- @Test
- public void testGetMimeType_ForPNG(){
- String mimeTypeChk = xABizUtil.getMimeType(XAConstants.MIME_PNG);
- Assert.assertEquals("png",mimeTypeChk);
- }
-
- @Test
- public void testGetMimeType_ForEmpty(){
- String mimeTypeChk = xABizUtil.getMimeType(1);
- Assert.assertEquals("",mimeTypeChk);
- }
-
- @Test
- public void testGetMimeTypeInt_ForUnknow(){
- int mimeTypeChk = xABizUtil.getMimeTypeInt("");
- Assert.assertEquals(XAConstants.MIME_UNKNOWN, mimeTypeChk);
- }
-
- @Test
- public void testGetMimeTypeInt_Forjpg(){
- int mimeTypeChk = xABizUtil.getMimeTypeInt("jpg");
- Assert.assertEquals(XAConstants.MIME_JPEG, mimeTypeChk);
- }
-
- @Test
- public void testGetMimeTypeInt_ForJPEG(){
- int mimeTypeChk = xABizUtil.getMimeTypeInt("JPEG");
- Assert.assertEquals(XAConstants.MIME_JPEG, mimeTypeChk);
- }
-
- @Test
- public void testGetMimeTypeInt_EndsWithJPEG(){
- int mimeTypeChk = xABizUtil.getMimeTypeInt("txt.jpeg");
- Assert.assertEquals(XAConstants.MIME_JPEG, mimeTypeChk);
- }
-
- @Test
- public void testGetMimeTypeInt_EndsWithJPG(){
- int mimeTypeChk = xABizUtil.getMimeTypeInt("txt.jpg");
- Assert.assertEquals(XAConstants.MIME_JPEG, mimeTypeChk);
- }
-
- @Test
- public void testGetMimeTypeInt_EndsWithPNG(){
- int mimeTypeChk = xABizUtil.getMimeTypeInt("txt.png");
- Assert.assertEquals(XAConstants.MIME_PNG, mimeTypeChk);
- }
-
- @Test
- public void testGetMimeTypeInt_ForPNG(){
- int mimeTypeChk = xABizUtil.getMimeTypeInt("png");
- Assert.assertEquals(XAConstants.MIME_PNG, mimeTypeChk);
- }
-
- @SuppressWarnings({ "unchecked", "rawtypes" })
- @Test
- public void testGetMObject(){
- BaseDao baseDao = Mockito.mock(BaseDao.class);
- Mockito.when(daoManager.getDaoForClassType(XACommonEnums.CLASS_TYPE_USER_PROFILE)).thenReturn(baseDao);
- Mockito.when(baseDao.getById(id)).thenReturn(new XXAsset());
- XXDBBase mObjChk = xABizUtil.getMObject(XACommonEnums.CLASS_TYPE_USER_PROFILE,id);
- Assert.assertNotNull(mObjChk);
- }
-
- @Test
- public void testGetMObject_NoObjId(){
- XXDBBase mObjChk = xABizUtil.getMObject(XACommonEnums.CLASS_TYPE_USER_PROFILE,null);
- Assert.assertNull(mObjChk);
- }
-
- @SuppressWarnings({ "rawtypes", "unchecked" })
- @Test
- public void testGetMObject_VXDataObject(){
- VXAsset vXDataObject = new VXAsset();
- vXDataObject.setId(id);
- BaseDao baseDao = Mockito.mock(BaseDao.class);
- Mockito.when(daoManager.getDaoForClassType(vXDataObject.getMyClassType())).thenReturn(baseDao);
- Mockito.when(baseDao.getById(vXDataObject.getId())).thenReturn(new XXAsset());
- XXDBBase xXDBaseChk = xABizUtil.getMObject(vXDataObject);
- Assert.assertNotNull(xXDBaseChk);
- }
-
- @Test
- public void testGetMObject_NOVXDataObject(){
- XXDBBase xXDBaseChk = xABizUtil.getMObject(null);
- Assert.assertNull(xXDBaseChk);
- }
-
- @Test
- public void testGetVObject_NOObjId(){
- VXDataObject objchk = xABizUtil.getVObject(XAConstants.CLASS_TYPE_USER_PROFILE, null);
- Assert.assertNull(objchk);
- }
-
- @Test
- public void testMatchHdfsPolicy_NoResourceName(){
- boolean bnlChk = xABizUtil.matchHbasePolicy(null, null, null, id, AppConstants.XA_PERM_TYPE_UNKNOWN);
- Assert.assertFalse(bnlChk);
- }
-
- @Test
- public void testMatchHdfsPolicy_NoResourceList(){
- boolean bnlChk = xABizUtil.matchHbasePolicy(resourceName, null, null, id, AppConstants.XA_PERM_TYPE_UNKNOWN);
- Assert.assertFalse(bnlChk);
- }
-
- @Test
- public void testMatchHdfsPolicy_NoUserId(){
- VXResponse vXResponse = new VXResponse();
- List<XXResource> xResourceList = new ArrayList<XXResource>();
- XXResource xXResource = new XXResource();
- xXResource.setId(id);
- xXResource.setName(resourceName);
- xXResource.setIsRecursive(AppConstants.BOOL_TRUE);
- xXResource.setResourceStatus(AppConstants.STATUS_ENABLED);
- xResourceList.add(xXResource);
- boolean bnlChk = xABizUtil.matchHbasePolicy(resourceName, xResourceList, vXResponse, null, AppConstants.XA_PERM_TYPE_UNKNOWN);
- Assert.assertFalse(bnlChk);
- }
-
- @Test
- public void testMatchHdfsPolicy_NoPremission(){
- VXResponse vXResponse = new VXResponse();
- List<XXResource> xResourceList = new ArrayList<XXResource>();
- XXResource xXResource = new XXResource();
- xXResource.setId(id);
- xXResource.setName(resourceName);
- xXResource.setIsRecursive(AppConstants.BOOL_TRUE);
- xXResource.setResourceStatus(AppConstants.STATUS_ENABLED);
- xResourceList.add(xXResource);
- Mockito.when(stringUtil.isEmpty(resourceName)).thenReturn(true);
- Mockito.when(stringUtil.split(Mockito.anyString(), Mockito.anyString())).thenReturn(new String[0]);
- boolean bnlChk = xABizUtil.matchHbasePolicy("/*/*/*", xResourceList, vXResponse, id, AppConstants.XA_PERM_TYPE_UNKNOWN);
- Mockito.verify(stringUtil).split(Mockito.anyString(), Mockito.anyString());
- Assert.assertFalse(bnlChk);
- }
-
- @Test
- public void testMatchHivePolicy_NoResourceName(){
- boolean bnlChk = xABizUtil.matchHivePolicy(null, null, null, 0);
- Assert.assertFalse(bnlChk);
-
- }
-
- @Test
- public void testMatchHivePolicy_NoResourceList(){
- boolean bnlChk = xABizUtil.matchHivePolicy(resourceName, null, null, 0);
- Assert.assertFalse(bnlChk);
-
- }
-
- @Test
- public void testMatchHivePolicy_NoUserId(){
- List<XXResource> xResourceList = new ArrayList<XXResource>();
- XXResource xXResource = new XXResource();
- xXResource.setId(id);
- xXResource.setName(resourceName);
- xXResource.setIsRecursive(AppConstants.BOOL_TRUE);
- xXResource.setResourceStatus(AppConstants.STATUS_ENABLED);
- xResourceList.add(xXResource);
- boolean bnlChk = xABizUtil.matchHivePolicy(resourceName, xResourceList, null, 0);
- Assert.assertFalse(bnlChk);
-
- }
-
- @Test
- public void testMatchHivePolicy_NoPremission(){
- List<XXResource> xResourceList = new ArrayList<XXResource>();
- XXResource xXResource = new XXResource();
- xXResource.setId(id);
- xXResource.setName(resourceName);
- xXResource.setIsRecursive(AppConstants.BOOL_TRUE);
- xXResource.setResourceStatus(AppConstants.STATUS_ENABLED);
- xResourceList.add(xXResource);
- Mockito.when(stringUtil.split(Mockito.anyString(), Mockito.anyString())).thenReturn(new String[0]);
- boolean bnlChk = xABizUtil.matchHivePolicy("/*/*/*", xResourceList, id, 0);
- Assert.assertFalse(bnlChk);
- }
-
- @Test
- public void testMatchHivePolicy(){
- List<XXResource> xResourceList = new ArrayList<XXResource>();
- XXResource xXResource = new XXResource();
- xXResource.setId(5L);
- xXResource.setName(resourceName);
- xXResource.setIsRecursive(AppConstants.BOOL_TRUE);
- xXResource.setResourceStatus(AppConstants.STATUS_ENABLED);
- xResourceList.add(xXResource);
- Mockito.when(stringUtil.split(Mockito.anyString(), Mockito.anyString())).thenReturn(new String[0]);
- boolean bnlChk = xABizUtil.matchHivePolicy("/*/*/*", xResourceList, id, 17);
- Mockito.verify(stringUtil).split(Mockito.anyString(), Mockito.anyString());
- Assert.assertFalse(bnlChk);
- }
-}
\ No newline at end of file
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/test/java/org/apache/ranger/biz/TestXUserMgr.java
----------------------------------------------------------------------
diff --git a/security-admin/src/test/java/org/apache/ranger/biz/TestXUserMgr.java b/security-admin/src/test/java/org/apache/ranger/biz/TestXUserMgr.java
index 336d7eb..972e7b7 100644
--- a/security-admin/src/test/java/org/apache/ranger/biz/TestXUserMgr.java
+++ b/security-admin/src/test/java/org/apache/ranger/biz/TestXUserMgr.java
@@ -19,21 +19,18 @@ package org.apache.ranger.biz;
import java.util.ArrayList;
import java.util.Collection;
-import org.apache.ranger.biz.UserMgr;
-import org.apache.ranger.biz.XABizUtil;
-import org.apache.ranger.biz.XUserMgr;
import org.apache.ranger.common.ContextUtil;
import org.apache.ranger.common.RESTErrorUtil;
import org.apache.ranger.common.SearchCriteria;
import org.apache.ranger.common.StringUtil;
import org.apache.ranger.common.UserSessionBase;
-import org.apache.ranger.db.XADaoManager;
+import org.apache.ranger.db.RangerDaoManager;
import org.apache.ranger.db.XXGroupDao;
import org.apache.ranger.db.XXGroupUserDao;
import org.apache.ranger.db.XXUserDao;
import org.apache.ranger.entity.XXGroup;
-import org.apache.ranger.security.context.XAContextHolder;
-import org.apache.ranger.security.context.XASecurityContext;
+import org.apache.ranger.security.context.RangerContextHolder;
+import org.apache.ranger.security.context.RangerSecurityContext;
import org.apache.ranger.service.XGroupService;
import org.apache.ranger.service.XGroupUserService;
import org.apache.ranger.service.XUserService;
@@ -69,7 +66,7 @@ public class TestXUserMgr {
XGroupService xGroupService;
@Mock
- XADaoManager daoManager;
+ RangerDaoManager daoManager;
@Mock
RESTErrorUtil restErrorUtil;
@@ -81,7 +78,7 @@ public class TestXUserMgr {
StringUtil stringUtil;
@Mock
- XABizUtil msBizUtil;
+ RangerBizUtil msBizUtil;
@Mock
UserMgr userMgr;
@@ -93,9 +90,9 @@ public class TestXUserMgr {
public ExpectedException thrown = ExpectedException.none();
public void setup() {
- XASecurityContext context = new XASecurityContext();
+ RangerSecurityContext context = new RangerSecurityContext();
context.setUserSession(new UserSessionBase());
- XAContextHolder.setSecurityContext(context);
+ RangerContextHolder.setSecurityContext(context);
UserSessionBase currentUserSession = ContextUtil
.getCurrentUserSession();
currentUserSession.setUserAdmin(true);
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/test/java/org/apache/ranger/common/TestDateUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/test/java/org/apache/ranger/common/TestDateUtil.java b/security-admin/src/test/java/org/apache/ranger/common/TestDateUtil.java
index d7adb26..0d330df 100644
--- a/security-admin/src/test/java/org/apache/ranger/common/TestDateUtil.java
+++ b/security-admin/src/test/java/org/apache/ranger/common/TestDateUtil.java
@@ -19,7 +19,6 @@ package org.apache.ranger.common;
import java.text.SimpleDateFormat;
import java.util.Date;
-import org.apache.ranger.common.DateUtil;
import org.junit.Assert;
import org.junit.Test;
import org.springframework.beans.factory.annotation.Autowired;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/test/java/org/apache/ranger/common/TestJSONUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/test/java/org/apache/ranger/common/TestJSONUtil.java b/security-admin/src/test/java/org/apache/ranger/common/TestJSONUtil.java
index 948dbc9..5b4787d 100644
--- a/security-admin/src/test/java/org/apache/ranger/common/TestJSONUtil.java
+++ b/security-admin/src/test/java/org/apache/ranger/common/TestJSONUtil.java
@@ -19,19 +19,13 @@ package org.apache.ranger.common;
import java.util.HashMap;
import java.util.Map;
-import org.apache.ranger.common.JSONUtil;
import org.junit.Assert;
import org.junit.FixMethodOrder;
import org.junit.Rule;
import org.junit.Test;
import org.junit.rules.ExpectedException;
-import org.junit.runner.RunWith;
import org.junit.runners.MethodSorters;
import org.springframework.beans.factory.annotation.Autowired;
-import org.springframework.test.context.ContextConfiguration;
-import org.springframework.test.context.junit4.SpringJUnit4ClassRunner;
-import org.springframework.test.context.transaction.TransactionConfiguration;
-import org.springframework.transaction.annotation.Transactional;
@FixMethodOrder(MethodSorters.NAME_ASCENDING)
public class TestJSONUtil {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/test/java/org/apache/ranger/common/TestPropertiesUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/test/java/org/apache/ranger/common/TestPropertiesUtil.java b/security-admin/src/test/java/org/apache/ranger/common/TestPropertiesUtil.java
index 9c4c46c..7abed8e 100644
--- a/security-admin/src/test/java/org/apache/ranger/common/TestPropertiesUtil.java
+++ b/security-admin/src/test/java/org/apache/ranger/common/TestPropertiesUtil.java
@@ -16,15 +16,11 @@
*/
package org.apache.ranger.common;
-import org.apache.ranger.common.PropertiesUtil;
import org.junit.Assert;
import org.junit.Rule;
import org.junit.Test;
import org.junit.rules.ExpectedException;
-import org.junit.runner.RunWith;
import org.springframework.beans.factory.annotation.Autowired;
-import org.springframework.test.context.ContextConfiguration;
-import org.springframework.test.context.junit4.SpringJUnit4ClassRunner;
public class TestPropertiesUtil {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/test/java/org/apache/ranger/common/TestRangerConfigUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/test/java/org/apache/ranger/common/TestRangerConfigUtil.java b/security-admin/src/test/java/org/apache/ranger/common/TestRangerConfigUtil.java
new file mode 100644
index 0000000..19297f8
--- /dev/null
+++ b/security-admin/src/test/java/org/apache/ranger/common/TestRangerConfigUtil.java
@@ -0,0 +1,51 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements. See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.ranger.common;
+
+import org.junit.Assert;
+import org.junit.Test;
+import org.springframework.beans.factory.annotation.Autowired;
+
+public class TestRangerConfigUtil {
+
+ @Autowired
+ RangerConfigUtil xaConfigUtil = new RangerConfigUtil();
+
+ @Test
+ public void testGetDefaultMaxRows() {
+ int maxrow = xaConfigUtil.getDefaultMaxRows();
+ Assert.assertEquals(maxrow,xaConfigUtil.defaultMaxRows );
+ }
+
+ @Test
+ public void testIsAccessFilterEnabled() {
+ boolean value = xaConfigUtil.isAccessFilterEnabled();
+ Assert.assertTrue(value);
+ }
+
+ @Test
+ public void testGetWebAppRootURL(){
+ String returnValue = xaConfigUtil.getWebAppRootURL();
+ Assert.assertEquals(returnValue,xaConfigUtil.webappRootURL);
+ }
+
+ @Test
+ public void testGetRoles(){
+ String[] str=xaConfigUtil.getRoles();
+ Assert.assertArrayEquals(str, xaConfigUtil.roles);
+ }
+}
\ No newline at end of file
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/test/java/org/apache/ranger/common/TestStringUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/test/java/org/apache/ranger/common/TestStringUtil.java b/security-admin/src/test/java/org/apache/ranger/common/TestStringUtil.java
index 6652bff..044aebb 100644
--- a/security-admin/src/test/java/org/apache/ranger/common/TestStringUtil.java
+++ b/security-admin/src/test/java/org/apache/ranger/common/TestStringUtil.java
@@ -19,13 +19,9 @@
import java.util.ArrayList;
import java.util.List;
-import org.apache.ranger.common.StringUtil;
import org.junit.Assert;
import org.junit.Test;
-import org.junit.runner.RunWith;
import org.springframework.beans.factory.annotation.Autowired;
-import org.springframework.test.context.ContextConfiguration;
-import org.springframework.test.context.junit4.SpringJUnit4ClassRunner;
public class TestStringUtil {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/test/java/org/apache/ranger/common/TestXAConfigUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/test/java/org/apache/ranger/common/TestXAConfigUtil.java b/security-admin/src/test/java/org/apache/ranger/common/TestXAConfigUtil.java
deleted file mode 100644
index b6787f5..0000000
--- a/security-admin/src/test/java/org/apache/ranger/common/TestXAConfigUtil.java
+++ /dev/null
@@ -1,55 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one or more
- * contributor license agreements. See the NOTICE file distributed with
- * this work for additional information regarding copyright ownership.
- * The ASF licenses this file to You under the Apache License, Version 2.0
- * (the "License"); you may not use this file except in compliance with
- * the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-package org.apache.ranger.common;
-
-import org.apache.ranger.common.XAConfigUtil;
-import org.junit.Assert;
-import org.junit.Test;
-import org.junit.runner.RunWith;
-import org.springframework.beans.factory.annotation.Autowired;
-import org.springframework.test.context.ContextConfiguration;
-import org.springframework.test.context.junit4.SpringJUnit4ClassRunner;
-
-public class TestXAConfigUtil {
-
- @Autowired
- XAConfigUtil xaConfigUtil = new XAConfigUtil();
-
- @Test
- public void testGetDefaultMaxRows() {
- int maxrow = xaConfigUtil.getDefaultMaxRows();
- Assert.assertEquals(maxrow,xaConfigUtil.defaultMaxRows );
- }
-
- @Test
- public void testIsAccessFilterEnabled() {
- boolean value = xaConfigUtil.isAccessFilterEnabled();
- Assert.assertTrue(value);
- }
-
- @Test
- public void testGetWebAppRootURL(){
- String returnValue = xaConfigUtil.getWebAppRootURL();
- Assert.assertEquals(returnValue,xaConfigUtil.webappRootURL);
- }
-
- @Test
- public void testGetRoles(){
- String[] str=xaConfigUtil.getRoles();
- Assert.assertArrayEquals(str, xaConfigUtil.roles);
- }
-}
\ No newline at end of file
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/test/java/org/apache/ranger/rest/TestPublicAPIs.java
----------------------------------------------------------------------
diff --git a/security-admin/src/test/java/org/apache/ranger/rest/TestPublicAPIs.java b/security-admin/src/test/java/org/apache/ranger/rest/TestPublicAPIs.java
index f815e8f..c5b8a0f 100644
--- a/security-admin/src/test/java/org/apache/ranger/rest/TestPublicAPIs.java
+++ b/security-admin/src/test/java/org/apache/ranger/rest/TestPublicAPIs.java
@@ -23,11 +23,10 @@ import javax.servlet.http.HttpServletRequest;
import org.apache.ranger.biz.AssetMgr;
import org.apache.ranger.common.RESTErrorUtil;
+import org.apache.ranger.common.RangerSearchUtil;
import org.apache.ranger.common.SearchCriteria;
import org.apache.ranger.common.StringUtil;
-import org.apache.ranger.common.XASearchUtil;
-import org.apache.ranger.db.XADaoManager;
-import org.apache.ranger.rest.PublicAPIs;
+import org.apache.ranger.db.RangerDaoManager;
import org.apache.ranger.service.AbstractBaseResourceService;
import org.apache.ranger.service.XAssetService;
import org.apache.ranger.service.XPolicyService;
@@ -63,7 +62,7 @@ public class TestPublicAPIs {
PublicAPIs publicAPIs = new PublicAPIs();
@Mock
- XASearchUtil searchUtil;
+ RangerSearchUtil searchUtil;
@Mock
AssetMgr assetMgr;
@@ -87,7 +86,7 @@ public class TestPublicAPIs {
StringUtil stringUtil;
@Mock
- XADaoManager xaDaoMgr;
+ RangerDaoManager xaDaoMgr;
@Test
public void testGetRepository(){
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/test/java/org/apache/ranger/util/BaseTest.java
----------------------------------------------------------------------
diff --git a/security-admin/src/test/java/org/apache/ranger/util/BaseTest.java b/security-admin/src/test/java/org/apache/ranger/util/BaseTest.java
index 3847113..7d56691 100644
--- a/security-admin/src/test/java/org/apache/ranger/util/BaseTest.java
+++ b/security-admin/src/test/java/org/apache/ranger/util/BaseTest.java
@@ -22,13 +22,12 @@
*/
package org.apache.ranger.util;
-import org.apache.ranger.util.CLIUtil;
import org.junit.runner.RunWith;
-import org.springframework.test.context.junit4.SpringJUnit4ClassRunner;
import org.springframework.mock.web.MockHttpServletRequest;
import org.springframework.mock.web.MockHttpSession;
import org.springframework.test.context.ContextConfiguration;
import org.springframework.test.context.TestExecutionListeners;
+import org.springframework.test.context.junit4.SpringJUnit4ClassRunner;
import org.springframework.test.context.support.DependencyInjectionTestExecutionListener;
import org.springframework.test.context.support.DirtiesContextTestExecutionListener;
import org.springframework.test.context.transaction.TransactionConfiguration;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/test/java/org/apache/ranger/util/TestRangerEnumUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/test/java/org/apache/ranger/util/TestRangerEnumUtil.java b/security-admin/src/test/java/org/apache/ranger/util/TestRangerEnumUtil.java
new file mode 100644
index 0000000..fa27cf3
--- /dev/null
+++ b/security-admin/src/test/java/org/apache/ranger/util/TestRangerEnumUtil.java
@@ -0,0 +1,125 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements. See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.ranger.util;
+
+import java.util.ArrayList;
+import java.util.List;
+
+import org.apache.ranger.common.view.VEnum;
+import org.apache.ranger.common.view.VEnumElement;
+import org.junit.Assert;
+import org.junit.Rule;
+import org.junit.Test;
+import org.junit.rules.ExpectedException;
+import org.springframework.beans.factory.annotation.Autowired;
+
+public class TestRangerEnumUtil {
+
+ @Autowired
+ RangerEnumUtil xaEnumUtil = new RangerEnumUtil();
+
+ @Rule
+ public ExpectedException thrown = ExpectedException.none();
+
+ @Test
+ public void testGetEnums() {
+
+ VEnumElement VEnumElement = new VEnumElement();
+ VEnumElement.setEnumName("test1");
+ VEnumElement.setElementName("test2");
+ VEnumElement.setElementLabel("test3");
+ VEnumElement.setElementValue(0);
+ VEnumElement.setRbKey("11");
+ List<VEnumElement> listVEnumElement = new ArrayList<VEnumElement>();
+
+ VEnum vEnum = new VEnum();
+ vEnum.setEnumName("test");
+ vEnum.setElementList(listVEnumElement);
+ xaEnumUtil.enumList.add(vEnum);
+ List<VEnum> dbvEnum= xaEnumUtil.getEnums();
+ Assert.assertNotNull(dbvEnum);
+ }
+
+ @Test
+ public void testGetEnumEmpty() {
+
+ String enumName = "";
+ xaEnumUtil.getEnum(enumName);
+ Assert.assertNotNull(xaEnumUtil.enumList.size() > 0);
+ }
+
+ @Test
+ public void testGetEnum() {
+
+ String enumName = "enumtest";
+
+ VEnumElement vEnumElement1 = new VEnumElement();
+ vEnumElement1.setEnumName(enumName);
+ vEnumElement1.setElementName("test12");
+ vEnumElement1.setElementLabel("test13");
+ vEnumElement1.setElementValue(1);
+ vEnumElement1.setRbKey("11");
+ List<VEnumElement> VEnumElement = new ArrayList<VEnumElement>();
+ VEnumElement.add(vEnumElement1);
+
+ VEnum vEnum = new VEnum();
+ vEnum.setEnumName(enumName);
+ vEnum.setElementList(VEnumElement);
+
+ xaEnumUtil.enumMap.put(enumName, vEnum);
+
+ VEnum dbvEnum = xaEnumUtil.getEnum(enumName);
+
+ Assert.assertNotNull(dbvEnum);
+ Assert.assertEquals(enumName, dbvEnum.getEnumName());
+ }
+
+ @Test
+ public void testGetLabelIsNUll() {
+ String enumName = "CommonEnums.ActiveStatus";
+ int enumValue = 1;
+ String value = xaEnumUtil.getLabel(enumName, enumValue);
+ boolean checkValue=value.isEmpty();
+ Assert.assertFalse(checkValue);
+ }
+
+ @Test
+ public void testGetLabel() {
+ testGetEnum();
+ String enumName = "CommonEnums.ActiveStatus";
+ int enumValue = 1;
+ String value = xaEnumUtil.getLabel(enumName, enumValue);
+ Assert.assertNotNull(value);
+ }
+
+ @Test
+ public void testgetValueIsNull() {
+ String enumName = "CommonEnums.BooleanValue";
+ String elementName = "BOOL_NONE";
+ int value = xaEnumUtil.getValue(enumName, elementName);
+ Assert.assertEquals(0, value);
+ }
+
+ @Test
+ public void testgetValue() {
+ testGetEnum();
+ String enumName = "CommonEnums.ActivationStatus";
+ String elementName = "ACT_STATUS_DISABLED";
+ int value = xaEnumUtil.getValue(enumName, elementName);
+ Assert.assertEquals(0, value);
+ }
+}
\ No newline at end of file
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/test/java/org/apache/ranger/util/TestXAEnumUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/test/java/org/apache/ranger/util/TestXAEnumUtil.java b/security-admin/src/test/java/org/apache/ranger/util/TestXAEnumUtil.java
deleted file mode 100644
index e85cbb3..0000000
--- a/security-admin/src/test/java/org/apache/ranger/util/TestXAEnumUtil.java
+++ /dev/null
@@ -1,126 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one or more
- * contributor license agreements. See the NOTICE file distributed with
- * this work for additional information regarding copyright ownership.
- * The ASF licenses this file to You under the Apache License, Version 2.0
- * (the "License"); you may not use this file except in compliance with
- * the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-package org.apache.ranger.util;
-
-import java.util.ArrayList;
-import java.util.List;
-
-import org.apache.ranger.common.view.VEnum;
-import org.apache.ranger.common.view.VEnumElement;
-import org.apache.ranger.util.XAEnumUtil;
-import org.junit.Assert;
-import org.junit.Rule;
-import org.junit.Test;
-import org.junit.rules.ExpectedException;
-import org.springframework.beans.factory.annotation.Autowired;
-
-public class TestXAEnumUtil {
-
- @Autowired
- XAEnumUtil xaEnumUtil = new XAEnumUtil();
-
- @Rule
- public ExpectedException thrown = ExpectedException.none();
-
- @Test
- public void testGetEnums() {
-
- VEnumElement VEnumElement = new VEnumElement();
- VEnumElement.setEnumName("test1");
- VEnumElement.setElementName("test2");
- VEnumElement.setElementLabel("test3");
- VEnumElement.setElementValue(0);
- VEnumElement.setRbKey("11");
- List<VEnumElement> listVEnumElement = new ArrayList<VEnumElement>();
-
- VEnum vEnum = new VEnum();
- vEnum.setEnumName("test");
- vEnum.setElementList(listVEnumElement);
- xaEnumUtil.enumList.add(vEnum);
- List<VEnum> dbvEnum= xaEnumUtil.getEnums();
- Assert.assertNotNull(dbvEnum);
- }
-
- @Test
- public void testGetEnumEmpty() {
-
- String enumName = "";
- xaEnumUtil.getEnum(enumName);
- Assert.assertNotNull(xaEnumUtil.enumList.size() > 0);
- }
-
- @Test
- public void testGetEnum() {
-
- String enumName = "enumtest";
-
- VEnumElement vEnumElement1 = new VEnumElement();
- vEnumElement1.setEnumName(enumName);
- vEnumElement1.setElementName("test12");
- vEnumElement1.setElementLabel("test13");
- vEnumElement1.setElementValue(1);
- vEnumElement1.setRbKey("11");
- List<VEnumElement> VEnumElement = new ArrayList<VEnumElement>();
- VEnumElement.add(vEnumElement1);
-
- VEnum vEnum = new VEnum();
- vEnum.setEnumName(enumName);
- vEnum.setElementList(VEnumElement);
-
- xaEnumUtil.enumMap.put(enumName, vEnum);
-
- VEnum dbvEnum = xaEnumUtil.getEnum(enumName);
-
- Assert.assertNotNull(dbvEnum);
- Assert.assertEquals(enumName, dbvEnum.getEnumName());
- }
-
- @Test
- public void testGetLabelIsNUll() {
- String enumName = "CommonEnums.ActiveStatus";
- int enumValue = 1;
- String value = xaEnumUtil.getLabel(enumName, enumValue);
- boolean checkValue=value.isEmpty();
- Assert.assertFalse(checkValue);
- }
-
- @Test
- public void testGetLabel() {
- testGetEnum();
- String enumName = "CommonEnums.ActiveStatus";
- int enumValue = 1;
- String value = xaEnumUtil.getLabel(enumName, enumValue);
- Assert.assertNotNull(value);
- }
-
- @Test
- public void testgetValueIsNull() {
- String enumName = "CommonEnums.BooleanValue";
- String elementName = "BOOL_NONE";
- int value = xaEnumUtil.getValue(enumName, elementName);
- Assert.assertEquals(0, value);
- }
-
- @Test
- public void testgetValue() {
- testGetEnum();
- String enumName = "CommonEnums.ActivationStatus";
- String elementName = "ACT_STATUS_DISABLED";
- int value = xaEnumUtil.getValue(enumName, elementName);
- Assert.assertEquals(0, value);
- }
-}
\ No newline at end of file
[03/12] incubator-ranger git commit: RANGER-194: Rename classes under
web-admin project
Posted by ma...@apache.org.
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/util/XAEnumUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/util/XAEnumUtil.java b/security-admin/src/main/java/org/apache/ranger/util/XAEnumUtil.java
deleted file mode 100644
index c5ba2d5..0000000
--- a/security-admin/src/main/java/org/apache/ranger/util/XAEnumUtil.java
+++ /dev/null
@@ -1,2024 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing,
- * software distributed under the License is distributed on an
- * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
- * KIND, either express or implied. See the License for the
- * specific language governing permissions and limitations
- * under the License.
- */
-
- package org.apache.ranger.util;
-
-/**
- *
- */
-
-import java.util.*;
-
-import org.apache.log4j.Logger;
-import org.apache.ranger.common.view.*;
-import org.apache.ranger.util.*;
-import org.apache.ranger.view.*;
-import org.springframework.stereotype.Component;
-
-@Component
-public class XAEnumUtil {
-
- static final Logger logger = Logger.getLogger(XAEnumUtil.class);
- public final static String ENUM_CommonEnums_ActiveStatus = "CommonEnums.ActiveStatus";
- public final static String ENUM_CommonEnums_ActivationStatus = "CommonEnums.ActivationStatus";
- public final static String ENUM_CommonEnums_BooleanValue = "CommonEnums.BooleanValue";
- public final static String ENUM_CommonEnums_DataType = "CommonEnums.DataType";
- public final static String ENUM_CommonEnums_DeviceType = "CommonEnums.DeviceType";
- public final static String ENUM_CommonEnums_DiffLevel = "CommonEnums.DiffLevel";
- public final static String ENUM_CommonEnums_FileType = "CommonEnums.FileType";
- public final static String ENUM_CommonEnums_FreqType = "CommonEnums.FreqType";
- public final static String ENUM_CommonEnums_MimeType = "CommonEnums.MimeType";
- public final static String ENUM_CommonEnums_NumberFormat = "CommonEnums.NumberFormat";
- public final static String ENUM_CommonEnums_ObjectStatus = "CommonEnums.ObjectStatus";
- public final static String ENUM_CommonEnums_PasswordResetStatus = "CommonEnums.PasswordResetStatus";
- public final static String ENUM_CommonEnums_PriorityType = "CommonEnums.PriorityType";
- public final static String ENUM_CommonEnums_ProgressStatus = "CommonEnums.ProgressStatus";
- public final static String ENUM_CommonEnums_RelationType = "CommonEnums.RelationType";
- public final static String ENUM_CommonEnums_UserSource = "CommonEnums.UserSource";
- public final static String ENUM_CommonEnums_AssetType = "CommonEnums.AssetType";
- public final static String ENUM_CommonEnums_AccessResult = "CommonEnums.AccessResult";
- public final static String ENUM_CommonEnums_PolicyType = "CommonEnums.PolicyType";
- public final static String ENUM_CommonEnums_XAAuditType = "CommonEnums.XAAuditType";
- public final static String ENUM_CommonEnums_ResourceType = "CommonEnums.ResourceType";
- public final static String ENUM_CommonEnums_XAGroupType = "CommonEnums.XAGroupType";
- public final static String ENUM_CommonEnums_XAPermForType = "CommonEnums.XAPermForType";
- public final static String ENUM_CommonEnums_XAPermType = "CommonEnums.XAPermType";
- public final static String ENUM_CommonEnums_ClassTypes = "CommonEnums.ClassTypes";
- public final static String ENUM_XXAuthSession_AuthStatus = "XXAuthSession.AuthStatus";
- public final static String ENUM_XXAuthSession_AuthType = "XXAuthSession.AuthType";
- public final static String ENUM_XResponse_ResponseStatus = "XResponse.ResponseStatus";
-
- protected Hashtable<String, VEnum> enumMap = new Hashtable<String, VEnum>();
- protected List<VEnum> enumList = new ArrayList<VEnum>();
-
- public List<VEnum> getEnums() {
- if (enumList.size() == 0) {
- init();
- }
- return enumList;
- }
-
- public VEnum getEnum(String enumName) {
- if (enumList.size() == 0) {
- init();
- }
- return enumMap.get(enumName);
- }
-
- public String getLabel(String enumName, int enumValue) {
- VEnum vEnum = getEnum(enumName);
- if (vEnum == null) {
- logger.error("Enum " + enumName + " not found.", new Throwable());
- return "";
- }
- for (VEnumElement vEnumElement : vEnum.getElementList()) {
- if (vEnumElement.getElementValue() == enumValue) {
- return vEnumElement.getElementLabel();
- }
- }
- logger.error("Enum value not found. enum=" + enumName + ", value="
- + enumValue, new Throwable());
- return "";
- }
-
- public int getValue(String enumName, String elementName) {
- VEnum vEnum = getEnum(enumName);
- if (vEnum == null) {
- logger.error("Enum " + enumName + " not found.", new Throwable());
- return -1;
- }
- for (VEnumElement vEnumElement : vEnum.getElementList()) {
- if (vEnumElement.getElementName().equalsIgnoreCase(elementName)) {
- return vEnumElement.getElementValue();
- }
- }
- logger.error("Enum value not found. enum=" + enumName
- + ", elementName=" + elementName, new Throwable());
- return -1;
- }
-
- protected void init() {
- VEnum vEnum;
- VEnumElement vElement;
-
- ///////////////////////////////////
- // CommonEnums::ActiveStatus
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_ActiveStatus);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("STATUS_DISABLED");
- vElement.setElementValue(0);
- vElement.setElementLabel("Disabled");
- vElement.setRbKey("xa.enum.ActiveStatus.STATUS_DISABLED");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("STATUS_ENABLED");
- vElement.setElementValue(1);
- vElement.setElementLabel("Enabled");
- vElement.setRbKey("xa.enum.ActiveStatus.STATUS_ENABLED");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("STATUS_DELETED");
- vElement.setElementValue(2);
- vElement.setElementLabel("Deleted");
- vElement.setRbKey("xa.enum.ActiveStatus.STATUS_DELETED");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // CommonEnums::ActivationStatus
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_ActivationStatus);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("ACT_STATUS_DISABLED");
- vElement.setElementValue(0);
- vElement.setElementLabel("Disabled");
- vElement.setRbKey("xa.enum.ActivationStatus.ACT_STATUS_DISABLED");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("ACT_STATUS_ACTIVE");
- vElement.setElementValue(1);
- vElement.setElementLabel("Active");
- vElement.setRbKey("xa.enum.ActivationStatus.ACT_STATUS_ACTIVE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("ACT_STATUS_PENDING_APPROVAL");
- vElement.setElementValue(2);
- vElement.setElementLabel("Pending Approval");
- vElement.setRbKey("xa.enum.ActivationStatus.ACT_STATUS_PENDING_APPROVAL");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("ACT_STATUS_PENDING_ACTIVATION");
- vElement.setElementValue(3);
- vElement.setElementLabel("Pending Activation");
- vElement.setRbKey("xa.enum.ActivationStatus.ACT_STATUS_PENDING_ACTIVATION");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("ACT_STATUS_REJECTED");
- vElement.setElementValue(4);
- vElement.setElementLabel("Rejected");
- vElement.setRbKey("xa.enum.ActivationStatus.ACT_STATUS_REJECTED");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("ACT_STATUS_DEACTIVATED");
- vElement.setElementValue(5);
- vElement.setElementLabel("Deactivated");
- vElement.setRbKey("xa.enum.ActivationStatus.ACT_STATUS_DEACTIVATED");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("ACT_STATUS_PRE_REGISTRATION");
- vElement.setElementValue(6);
- vElement.setElementLabel("Registration Pending");
- vElement.setRbKey("xa.enum.ActivationStatus.ACT_STATUS_PRE_REGISTRATION");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("ACT_STATUS_NO_LOGIN");
- vElement.setElementValue(7);
- vElement.setElementLabel("No login privilege");
- vElement.setRbKey("xa.enum.ActivationStatus.ACT_STATUS_NO_LOGIN");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // CommonEnums::BooleanValue
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_BooleanValue);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("BOOL_NONE");
- vElement.setElementValue(0);
- vElement.setElementLabel("None");
- vElement.setRbKey("xa.enum.BooleanValue.BOOL_NONE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("BOOL_TRUE");
- vElement.setElementValue(1);
- vElement.setElementLabel("True");
- vElement.setRbKey("xa.enum.BooleanValue.BOOL_TRUE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("BOOL_FALSE");
- vElement.setElementValue(2);
- vElement.setElementLabel("False");
- vElement.setRbKey("xa.enum.BooleanValue.BOOL_FALSE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // CommonEnums::DataType
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_DataType);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("DATA_TYPE_UNKNOWN");
- vElement.setElementValue(0);
- vElement.setElementLabel("Unknown");
- vElement.setRbKey("xa.enum.DataType.DATA_TYPE_UNKNOWN");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("DATA_TYPE_INTEGER");
- vElement.setElementValue(1);
- vElement.setElementLabel("Integer");
- vElement.setRbKey("xa.enum.DataType.DATA_TYPE_INTEGER");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("DATA_TYPE_DOUBLE");
- vElement.setElementValue(2);
- vElement.setElementLabel("Double");
- vElement.setRbKey("xa.enum.DataType.DATA_TYPE_DOUBLE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("DATA_TYPE_STRING");
- vElement.setElementValue(3);
- vElement.setElementLabel("String");
- vElement.setRbKey("xa.enum.DataType.DATA_TYPE_STRING");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("DATA_TYPE_BOOLEAN");
- vElement.setElementValue(4);
- vElement.setElementLabel("Boolean");
- vElement.setRbKey("xa.enum.DataType.DATA_TYPE_BOOLEAN");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("DATA_TYPE_DATE");
- vElement.setElementValue(5);
- vElement.setElementLabel("Date");
- vElement.setRbKey("xa.enum.DataType.DATA_TYPE_DATE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("DATA_TYPE_STRING_ENUM");
- vElement.setElementValue(6);
- vElement.setElementLabel("String enumeration");
- vElement.setRbKey("xa.enum.DataType.DATA_TYPE_STRING_ENUM");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("DATA_TYPE_LONG");
- vElement.setElementValue(7);
- vElement.setElementLabel("Long");
- vElement.setRbKey("xa.enum.DataType.DATA_TYPE_LONG");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("DATA_TYPE_INTEGER_ENUM");
- vElement.setElementValue(8);
- vElement.setElementLabel("Integer enumeration");
- vElement.setRbKey("xa.enum.DataType.DATA_TYPE_INTEGER_ENUM");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // CommonEnums::DeviceType
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_DeviceType);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("DEVICE_UNKNOWN");
- vElement.setElementValue(0);
- vElement.setElementLabel("Unknown");
- vElement.setRbKey("xa.enum.DeviceType.DEVICE_UNKNOWN");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("DEVICE_BROWSER");
- vElement.setElementValue(1);
- vElement.setElementLabel("Browser");
- vElement.setRbKey("xa.enum.DeviceType.DEVICE_BROWSER");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("DEVICE_IPHONE");
- vElement.setElementValue(2);
- vElement.setElementLabel("iPhone");
- vElement.setRbKey("xa.enum.DeviceType.DEVICE_IPHONE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("DEVICE_IPAD");
- vElement.setElementValue(3);
- vElement.setElementLabel("iPad");
- vElement.setRbKey("xa.enum.DeviceType.DEVICE_IPAD");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("DEVICE_IPOD");
- vElement.setElementValue(4);
- vElement.setElementLabel("iPod");
- vElement.setRbKey("xa.enum.DeviceType.DEVICE_IPOD");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("DEVICE_ANDROID");
- vElement.setElementValue(5);
- vElement.setElementLabel("Android");
- vElement.setRbKey("xa.enum.DeviceType.DEVICE_ANDROID");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // CommonEnums::DiffLevel
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_DiffLevel);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("DIFF_UNKNOWN");
- vElement.setElementValue(0);
- vElement.setElementLabel("Unknown");
- vElement.setRbKey("xa.enum.DiffLevel.DIFF_UNKNOWN");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("DIFF_LOW");
- vElement.setElementValue(1);
- vElement.setElementLabel("Low");
- vElement.setRbKey("xa.enum.DiffLevel.DIFF_LOW");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("DIFF_MEDIUM");
- vElement.setElementValue(2);
- vElement.setElementLabel("Medium");
- vElement.setRbKey("xa.enum.DiffLevel.DIFF_MEDIUM");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("DIFF_HIGH");
- vElement.setElementValue(3);
- vElement.setElementLabel("High");
- vElement.setRbKey("xa.enum.DiffLevel.DIFF_HIGH");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // CommonEnums::FileType
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_FileType);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("FILE_FILE");
- vElement.setElementValue(0);
- vElement.setElementLabel("File");
- vElement.setRbKey("xa.enum.FileType.FILE_FILE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("FILE_DIR");
- vElement.setElementValue(1);
- vElement.setElementLabel("Directory");
- vElement.setRbKey("xa.enum.FileType.FILE_DIR");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // CommonEnums::FreqType
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_FreqType);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("FREQ_NONE");
- vElement.setElementValue(0);
- vElement.setElementLabel("None");
- vElement.setRbKey("xa.enum.FreqType.FREQ_NONE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("FREQ_MANUAL");
- vElement.setElementValue(1);
- vElement.setElementLabel("Manual");
- vElement.setRbKey("xa.enum.FreqType.FREQ_MANUAL");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("FREQ_HOURLY");
- vElement.setElementValue(2);
- vElement.setElementLabel("Hourly");
- vElement.setRbKey("xa.enum.FreqType.FREQ_HOURLY");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("FREQ_DAILY");
- vElement.setElementValue(3);
- vElement.setElementLabel("Daily");
- vElement.setRbKey("xa.enum.FreqType.FREQ_DAILY");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("FREQ_WEEKLY");
- vElement.setElementValue(4);
- vElement.setElementLabel("Weekly");
- vElement.setRbKey("xa.enum.FreqType.FREQ_WEEKLY");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("FREQ_BI_WEEKLY");
- vElement.setElementValue(5);
- vElement.setElementLabel("Bi Weekly");
- vElement.setRbKey("xa.enum.FreqType.FREQ_BI_WEEKLY");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("FREQ_MONTHLY");
- vElement.setElementValue(6);
- vElement.setElementLabel("Monthly");
- vElement.setRbKey("xa.enum.FreqType.FREQ_MONTHLY");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // CommonEnums::MimeType
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_MimeType);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("MIME_UNKNOWN");
- vElement.setElementValue(0);
- vElement.setElementLabel("Unknown");
- vElement.setRbKey("xa.enum.MimeType.MIME_UNKNOWN");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("MIME_TEXT");
- vElement.setElementValue(1);
- vElement.setElementLabel("Text");
- vElement.setRbKey("xa.enum.MimeType.MIME_TEXT");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("MIME_HTML");
- vElement.setElementValue(2);
- vElement.setElementLabel("Html");
- vElement.setRbKey("xa.enum.MimeType.MIME_HTML");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("MIME_PNG");
- vElement.setElementValue(3);
- vElement.setElementLabel("png");
- vElement.setRbKey("xa.enum.MimeType.MIME_PNG");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("MIME_JPEG");
- vElement.setElementValue(4);
- vElement.setElementLabel("jpeg");
- vElement.setRbKey("xa.enum.MimeType.MIME_JPEG");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // CommonEnums::NumberFormat
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_NumberFormat);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("NUM_FORMAT_NONE");
- vElement.setElementValue(0);
- vElement.setElementLabel("None");
- vElement.setRbKey("xa.enum.NumberFormat.NUM_FORMAT_NONE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("NUM_FORMAT_NUMERIC");
- vElement.setElementValue(1);
- vElement.setElementLabel("Numeric");
- vElement.setRbKey("xa.enum.NumberFormat.NUM_FORMAT_NUMERIC");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("NUM_FORMAT_ALPHA");
- vElement.setElementValue(2);
- vElement.setElementLabel("Alphabhet");
- vElement.setRbKey("xa.enum.NumberFormat.NUM_FORMAT_ALPHA");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("NUM_FORMAT_ROMAN");
- vElement.setElementValue(3);
- vElement.setElementLabel("Roman");
- vElement.setRbKey("xa.enum.NumberFormat.NUM_FORMAT_ROMAN");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // CommonEnums::ObjectStatus
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_ObjectStatus);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("OBJ_STATUS_ACTIVE");
- vElement.setElementValue(0);
- vElement.setElementLabel("Active");
- vElement.setRbKey("xa.enum.ObjectStatus.OBJ_STATUS_ACTIVE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("OBJ_STATUS_DELETED");
- vElement.setElementValue(1);
- vElement.setElementLabel("Deleted");
- vElement.setRbKey("xa.enum.ObjectStatus.OBJ_STATUS_DELETED");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("OBJ_STATUS_ARCHIVED");
- vElement.setElementValue(2);
- vElement.setElementLabel("Archived");
- vElement.setRbKey("xa.enum.ObjectStatus.OBJ_STATUS_ARCHIVED");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // CommonEnums::PasswordResetStatus
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_PasswordResetStatus);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("PWD_RESET_ACTIVE");
- vElement.setElementValue(0);
- vElement.setElementLabel("Active");
- vElement.setRbKey("xa.enum.PasswordResetStatus.PWD_RESET_ACTIVE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("PWD_RESET_USED");
- vElement.setElementValue(1);
- vElement.setElementLabel("Used");
- vElement.setRbKey("xa.enum.PasswordResetStatus.PWD_RESET_USED");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("PWD_RESET_EXPIRED");
- vElement.setElementValue(2);
- vElement.setElementLabel("Expired");
- vElement.setRbKey("xa.enum.PasswordResetStatus.PWD_RESET_EXPIRED");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("PWD_RESET_DISABLED");
- vElement.setElementValue(3);
- vElement.setElementLabel("Disabled");
- vElement.setRbKey("xa.enum.PasswordResetStatus.PWD_RESET_DISABLED");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // CommonEnums::PriorityType
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_PriorityType);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("PRIORITY_NORMAL");
- vElement.setElementValue(0);
- vElement.setElementLabel("Normal");
- vElement.setRbKey("xa.enum.PriorityType.PRIORITY_NORMAL");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("PRIORITY_LOW");
- vElement.setElementValue(1);
- vElement.setElementLabel("Low");
- vElement.setRbKey("xa.enum.PriorityType.PRIORITY_LOW");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("PRIORITY_MEDIUM");
- vElement.setElementValue(2);
- vElement.setElementLabel("Medium");
- vElement.setRbKey("xa.enum.PriorityType.PRIORITY_MEDIUM");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("PRIORITY_HIGH");
- vElement.setElementValue(3);
- vElement.setElementLabel("High");
- vElement.setRbKey("xa.enum.PriorityType.PRIORITY_HIGH");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // CommonEnums::ProgressStatus
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_ProgressStatus);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("PROGRESS_PENDING");
- vElement.setElementValue(0);
- vElement.setElementLabel("Pending");
- vElement.setRbKey("xa.enum.ProgressStatus.PROGRESS_PENDING");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("PROGRESS_IN_PROGRESS");
- vElement.setElementValue(1);
- vElement.setElementLabel("In Progress");
- vElement.setRbKey("xa.enum.ProgressStatus.PROGRESS_IN_PROGRESS");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("PROGRESS_COMPLETE");
- vElement.setElementValue(2);
- vElement.setElementLabel("Complete");
- vElement.setRbKey("xa.enum.ProgressStatus.PROGRESS_COMPLETE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("PROGRESS_ABORTED");
- vElement.setElementValue(3);
- vElement.setElementLabel("Aborted");
- vElement.setRbKey("xa.enum.ProgressStatus.PROGRESS_ABORTED");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("PROGRESS_FAILED");
- vElement.setElementValue(4);
- vElement.setElementLabel("Failed");
- vElement.setRbKey("xa.enum.ProgressStatus.PROGRESS_FAILED");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // CommonEnums::RelationType
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_RelationType);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("REL_NONE");
- vElement.setElementValue(0);
- vElement.setElementLabel("None");
- vElement.setRbKey("xa.enum.RelationType.REL_NONE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("REL_SELF");
- vElement.setElementValue(1);
- vElement.setElementLabel("Self");
- vElement.setRbKey("xa.enum.RelationType.REL_SELF");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // CommonEnums::UserSource
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_UserSource);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("USER_APP");
- vElement.setElementValue(0);
- vElement.setElementLabel("Application");
- vElement.setRbKey("xa.enum.UserSource.USER_APP");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("USER_GOOGLE");
- vElement.setElementValue(1);
- vElement.setElementLabel("Google");
- vElement.setRbKey("xa.enum.UserSource.USER_GOOGLE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("USER_FB");
- vElement.setElementValue(2);
- vElement.setElementLabel("FaceBook");
- vElement.setRbKey("xa.enum.UserSource.USER_FB");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // CommonEnums::AssetType
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_AssetType);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("ASSET_UNKNOWN");
- vElement.setElementValue(0);
- vElement.setElementLabel("Unknown");
- vElement.setRbKey("xa.enum.AssetType.ASSET_UNKNOWN");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("ASSET_HDFS");
- vElement.setElementValue(1);
- vElement.setElementLabel("HDFS");
- vElement.setRbKey("xa.enum.AssetType.ASSET_HDFS");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("ASSET_HBASE");
- vElement.setElementValue(2);
- vElement.setElementLabel("HBase");
- vElement.setRbKey("xa.enum.AssetType.ASSET_HBASE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("ASSET_HIVE");
- vElement.setElementValue(3);
- vElement.setElementLabel("Hive");
- vElement.setRbKey("xa.enum.AssetType.ASSET_HIVE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("ASSET_AGENT");
- vElement.setElementValue(4);
- vElement.setElementLabel("Agent");
- vElement.setRbKey("xa.enum.AssetType.ASSET_AGENT");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("ASSET_KNOX");
- vElement.setElementValue(5);
- vElement.setElementLabel("Knox");
- vElement.setRbKey("xa.enum.AssetType.ASSET_KNOX");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- vElement = new VEnumElement();
- vElement.setElementName("ASSET_STORM");
- vElement.setElementValue(6);
- vElement.setElementLabel("Storm");
- vElement.setRbKey("xa.enum.AssetType.ASSET_STORM");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
- ///////////////////////////////////
- // CommonEnums::AccessResult
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_AccessResult);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("ACCESS_RESULT_DENIED");
- vElement.setElementValue(0);
- vElement.setElementLabel("Denied");
- vElement.setRbKey("xa.enum.AccessResult.ACCESS_RESULT_DENIED");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("ACCESS_RESULT_ALLOWED");
- vElement.setElementValue(1);
- vElement.setElementLabel("Allowed");
- vElement.setRbKey("xa.enum.AccessResult.ACCESS_RESULT_ALLOWED");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // CommonEnums::PolicyType
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_PolicyType);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("POLICY_INCLUSION");
- vElement.setElementValue(0);
- vElement.setElementLabel("Inclusion");
- vElement.setRbKey("xa.enum.PolicyType.POLICY_INCLUSION");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("POLICY_EXCLUSION");
- vElement.setElementValue(1);
- vElement.setElementLabel("Exclusion");
- vElement.setRbKey("xa.enum.PolicyType.POLICY_EXCLUSION");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // CommonEnums::XAAuditType
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_XAAuditType);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_AUDIT_TYPE_UNKNOWN");
- vElement.setElementValue(0);
- vElement.setElementLabel("Unknown");
- vElement.setRbKey("xa.enum.XAAuditType.XA_AUDIT_TYPE_UNKNOWN");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_AUDIT_TYPE_ALL");
- vElement.setElementValue(1);
- vElement.setElementLabel("All");
- vElement.setRbKey("xa.enum.XAAuditType.XA_AUDIT_TYPE_ALL");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_AUDIT_TYPE_READ");
- vElement.setElementValue(2);
- vElement.setElementLabel("Read");
- vElement.setRbKey("xa.enum.XAAuditType.XA_AUDIT_TYPE_READ");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_AUDIT_TYPE_WRITE");
- vElement.setElementValue(3);
- vElement.setElementLabel("Write");
- vElement.setRbKey("xa.enum.XAAuditType.XA_AUDIT_TYPE_WRITE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_AUDIT_TYPE_CREATE");
- vElement.setElementValue(4);
- vElement.setElementLabel("Create");
- vElement.setRbKey("xa.enum.XAAuditType.XA_AUDIT_TYPE_CREATE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_AUDIT_TYPE_DELETE");
- vElement.setElementValue(5);
- vElement.setElementLabel("Delete");
- vElement.setRbKey("xa.enum.XAAuditType.XA_AUDIT_TYPE_DELETE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_AUDIT_TYPE_LOGIN");
- vElement.setElementValue(6);
- vElement.setElementLabel("Login");
- vElement.setRbKey("xa.enum.XAAuditType.XA_AUDIT_TYPE_LOGIN");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // CommonEnums::ResourceType
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_ResourceType);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("RESOURCE_UNKNOWN");
- vElement.setElementValue(0);
- vElement.setElementLabel("Unknown");
- vElement.setRbKey("xa.enum.ResourceType.RESOURCE_UNKNOWN");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("RESOURCE_PATH");
- vElement.setElementValue(1);
- vElement.setElementLabel("Path");
- vElement.setRbKey("xa.enum.ResourceType.RESOURCE_PATH");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("RESOURCE_DB");
- vElement.setElementValue(2);
- vElement.setElementLabel("Database");
- vElement.setRbKey("xa.enum.ResourceType.RESOURCE_DB");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("RESOURCE_TABLE");
- vElement.setElementValue(3);
- vElement.setElementLabel("Table");
- vElement.setRbKey("xa.enum.ResourceType.RESOURCE_TABLE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("RESOURCE_COL_FAM");
- vElement.setElementValue(4);
- vElement.setElementLabel("Column Family");
- vElement.setRbKey("xa.enum.ResourceType.RESOURCE_COL_FAM");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("RESOURCE_COLUMN");
- vElement.setElementValue(5);
- vElement.setElementLabel("Column");
- vElement.setRbKey("xa.enum.ResourceType.RESOURCE_COLUMN");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("RESOURCE_VIEW");
- vElement.setElementValue(6);
- vElement.setElementLabel("VIEW");
- vElement.setRbKey("xa.enum.ResourceType.RESOURCE_VIEW");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("RESOURCE_UDF");
- vElement.setElementValue(7);
- vElement.setElementLabel("UDF");
- vElement.setRbKey("xa.enum.ResourceType.RESOURCE_UDF");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("RESOURCE_VIEW_COL");
- vElement.setElementValue(8);
- vElement.setElementLabel("View Column");
- vElement.setRbKey("xa.enum.ResourceType.RESOURCE_VIEW_COL");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("RESOURCE_TOPOLOGY");
- vElement.setElementValue(9);
- vElement.setElementLabel("Topology");
- vElement.setRbKey("xa.enum.ResourceType.RESOURCE_TOPOLOGY");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("RESOURCE_SERVICE");
- vElement.setElementValue(10);
- vElement.setElementLabel("Service");
- vElement.setRbKey("xa.enum.ResourceType.RESOURCE_SERVICE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // CommonEnums::XAGroupType
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_XAGroupType);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_GROUP_UNKNOWN");
- vElement.setElementValue(0);
- vElement.setElementLabel("Unknown");
- vElement.setRbKey("xa.enum.XAGroupType.XA_GROUP_UNKNOWN");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_GROUP_USER");
- vElement.setElementValue(1);
- vElement.setElementLabel("User");
- vElement.setRbKey("xa.enum.XAGroupType.XA_GROUP_USER");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_GROUP_GROUP");
- vElement.setElementValue(2);
- vElement.setElementLabel("Group");
- vElement.setRbKey("xa.enum.XAGroupType.XA_GROUP_GROUP");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_GROUP_ROLE");
- vElement.setElementValue(3);
- vElement.setElementLabel("Role");
- vElement.setRbKey("xa.enum.XAGroupType.XA_GROUP_ROLE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // CommonEnums::XAPermForType
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_XAPermForType);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_FOR_UNKNOWN");
- vElement.setElementValue(0);
- vElement.setElementLabel("Unknown");
- vElement.setRbKey("xa.enum.XAPermForType.XA_PERM_FOR_UNKNOWN");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_FOR_USER");
- vElement.setElementValue(1);
- vElement.setElementLabel("Permission for Users");
- vElement.setRbKey("xa.enum.XAPermForType.XA_PERM_FOR_USER");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_FOR_GROUP");
- vElement.setElementValue(2);
- vElement.setElementLabel("Permission for Groups");
- vElement.setRbKey("xa.enum.XAPermForType.XA_PERM_FOR_GROUP");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // CommonEnums::XAPermType
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_XAPermType);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_UNKNOWN");
- vElement.setElementValue(0);
- vElement.setElementLabel("Unknown");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_UNKNOWN");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_RESET");
- vElement.setElementValue(1);
- vElement.setElementLabel("Reset");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_RESET");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_READ");
- vElement.setElementValue(2);
- vElement.setElementLabel("Read");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_READ");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_WRITE");
- vElement.setElementValue(3);
- vElement.setElementLabel("Write");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_WRITE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_CREATE");
- vElement.setElementValue(4);
- vElement.setElementLabel("Create");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_CREATE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_DELETE");
- vElement.setElementValue(5);
- vElement.setElementLabel("Delete");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_DELETE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_ADMIN");
- vElement.setElementValue(6);
- vElement.setElementLabel("Admin");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_ADMIN");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_OBFUSCATE");
- vElement.setElementValue(7);
- vElement.setElementLabel("Obfuscate");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_OBFUSCATE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_MASK");
- vElement.setElementValue(8);
- vElement.setElementLabel("Mask");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_MASK");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_EXECUTE");
- vElement.setElementValue(9);
- vElement.setElementLabel("Execute");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_EXECUTE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_SELECT");
- vElement.setElementValue(10);
- vElement.setElementLabel("Select");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_SELECT");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_UPDATE");
- vElement.setElementValue(11);
- vElement.setElementLabel("Update");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_UPDATE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_DROP");
- vElement.setElementValue(12);
- vElement.setElementLabel("Drop");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_DROP");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_ALTER");
- vElement.setElementValue(13);
- vElement.setElementLabel("Alter");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_ALTER");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_INDEX");
- vElement.setElementValue(14);
- vElement.setElementLabel("Index");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_INDEX");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_LOCK");
- vElement.setElementValue(15);
- vElement.setElementLabel("Lock");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_LOCK");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_ALL");
- vElement.setElementValue(16);
- vElement.setElementLabel("All");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_ALL");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_ALLOW");
- vElement.setElementValue(17);
- vElement.setElementLabel("Allow");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_ALLOW");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_SUBMIT_TOPOLOGY");
- vElement.setElementValue(18);
- vElement.setElementLabel("Submit Topology");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_SUBMIT_TOPOLOGY");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_FILE_UPLOAD");
- vElement.setElementValue(19);
- vElement.setElementLabel("File Upload");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_FILE_UPLOAD");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_GET_NIMBUS");
- vElement.setElementValue(20);
- vElement.setElementLabel("Get Nimbus Conf");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_GET_NIMBUS");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_GET_CLUSTER_INFO");
- vElement.setElementValue(21);
- vElement.setElementLabel("Get Cluster Info");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_GET_CLUSTER_INFO");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_FILE_DOWNLOAD");
- vElement.setElementValue(22);
- vElement.setElementLabel("File Download");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_FILE_DOWNLOAD");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_KILL_TOPOLOGY");
- vElement.setElementValue(23);
- vElement.setElementLabel("Kill Topology");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_KILL_TOPOLOGY");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_REBALANCE");
- vElement.setElementValue(24);
- vElement.setElementLabel("Rebalance");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_REBALANCE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_ACTIVATE");
- vElement.setElementValue(25);
- vElement.setElementLabel("Activate");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_ACTIVATE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_DEACTIVATE");
- vElement.setElementValue(26);
- vElement.setElementLabel("Deactivate");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_DEACTIVATE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_GET_TOPOLOGY_CONF");
- vElement.setElementValue(27);
- vElement.setElementLabel("Get Topology Conf");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_GET_TOPOLOGY_CONF");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_GET_TOPOLOGY");
- vElement.setElementValue(28);
- vElement.setElementLabel("Get Topology");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_GET_TOPOLOGY");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_GET_USER_TOPOLOGY");
- vElement.setElementValue(29);
- vElement.setElementLabel("Get User Topology");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_GET_USER_TOPOLOGY");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_GET_TOPOLOGY_INFO");
- vElement.setElementValue(30);
- vElement.setElementLabel("Get Topology Info");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_GET_TOPOLOGY_INFO");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("XA_PERM_TYPE_UPLOAD_NEW_CREDENTIAL");
- vElement.setElementValue(31);
- vElement.setElementLabel("Upload New Credential");
- vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_UPLOAD_NEW_CREDENTIAL");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // CommonEnums::ClassTypes
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_CommonEnums_ClassTypes);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_NONE");
- vElement.setElementValue(0);
- vElement.setElementLabel("None");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_NONE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_MESSAGE");
- vElement.setElementValue(1);
- vElement.setElementLabel("Message");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_MESSAGE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_USER_PROFILE");
- vElement.setElementValue(2);
- vElement.setElementLabel("User Profile");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_USER_PROFILE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_AUTH_SESS");
- vElement.setElementValue(3);
- vElement.setElementLabel("Authentication Session");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_AUTH_SESS");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_DATA_OBJECT");
- vElement.setElementValue(4);
- vElement.setElementLabel("CLASS_TYPE_DATA_OBJECT");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_DATA_OBJECT");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_NAMEVALUE");
- vElement.setElementValue(5);
- vElement.setElementLabel("CLASS_TYPE_NAMEVALUE");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_NAMEVALUE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_LONG");
- vElement.setElementValue(6);
- vElement.setElementLabel("CLASS_TYPE_LONG");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_LONG");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_PASSWORD_CHANGE");
- vElement.setElementValue(7);
- vElement.setElementLabel("CLASS_TYPE_PASSWORD_CHANGE");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_PASSWORD_CHANGE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_STRING");
- vElement.setElementValue(8);
- vElement.setElementLabel("CLASS_TYPE_STRING");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_STRING");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_ENUM");
- vElement.setElementValue(9);
- vElement.setElementLabel("CLASS_TYPE_ENUM");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_ENUM");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_ENUM_ELEMENT");
- vElement.setElementValue(10);
- vElement.setElementLabel("CLASS_TYPE_ENUM_ELEMENT");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_ENUM_ELEMENT");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_RESPONSE");
- vElement.setElementValue(11);
- vElement.setElementLabel("Response");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_RESPONSE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_XA_ASSET");
- vElement.setElementValue(1000);
- vElement.setElementLabel("Asset");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_ASSET");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_XA_RESOURCE");
- vElement.setElementValue(1001);
- vElement.setElementLabel("Resource");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_RESOURCE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_XA_GROUP");
- vElement.setElementValue(1002);
- vElement.setElementLabel("XA Group");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_GROUP");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_XA_USER");
- vElement.setElementValue(1003);
- vElement.setElementLabel("XA User");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_USER");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_XA_GROUP_USER");
- vElement.setElementValue(1004);
- vElement.setElementLabel("XA Group of Users");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_GROUP_USER");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_XA_GROUP_GROUP");
- vElement.setElementValue(1005);
- vElement.setElementLabel("XA Group of groups");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_GROUP_GROUP");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_XA_PERM_MAP");
- vElement.setElementValue(1006);
- vElement.setElementLabel("XA permissions for resource");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_PERM_MAP");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_XA_AUDIT_MAP");
- vElement.setElementValue(1007);
- vElement.setElementLabel("XA audits for resource");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_AUDIT_MAP");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_XA_CRED_STORE");
- vElement.setElementValue(1008);
- vElement.setElementLabel("XA credential store");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_CRED_STORE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_XA_POLICY_EXPORT_AUDIT");
- vElement.setElementValue(1009);
- vElement.setElementLabel("XA Policy Export Audit");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_POLICY_EXPORT_AUDIT");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_TRX_LOG");
- vElement.setElementValue(1010);
- vElement.setElementLabel("Transaction log");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_TRX_LOG");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_XA_ACCESS_AUDIT");
- vElement.setElementValue(1011);
- vElement.setElementLabel("Access Audit");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_ACCESS_AUDIT");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("CLASS_TYPE_XA_TRANSACTION_LOG_ATTRIBUTE");
- vElement.setElementValue(1012);
- vElement.setElementLabel("Transaction log attribute");
- vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_TRANSACTION_LOG_ATTRIBUTE");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // XXAuthSession::AuthStatus
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_XXAuthSession_AuthStatus);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("AUTH_STATUS_UNKNOWN");
- vElement.setElementValue(0);
- vElement.setElementLabel("Unknown");
- vElement.setRbKey("xa.enum.AuthStatus.AUTH_STATUS_UNKNOWN");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("AUTH_STATUS_SUCCESS");
- vElement.setElementValue(1);
- vElement.setElementLabel("Success");
- vElement.setRbKey("xa.enum.AuthStatus.AUTH_STATUS_SUCCESS");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("AUTH_STATUS_WRONG_PASSWORD");
- vElement.setElementValue(2);
- vElement.setElementLabel("Wrong Password");
- vElement.setRbKey("xa.enum.AuthStatus.AUTH_STATUS_WRONG_PASSWORD");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("AUTH_STATUS_DISABLED");
- vElement.setElementValue(3);
- vElement.setElementLabel("Account Disabled");
- vElement.setRbKey("xa.enum.AuthStatus.AUTH_STATUS_DISABLED");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("AUTH_STATUS_LOCKED");
- vElement.setElementValue(4);
- vElement.setElementLabel("Locked");
- vElement.setRbKey("xa.enum.AuthStatus.AUTH_STATUS_LOCKED");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("AUTH_STATUS_PASSWORD_EXPIRED");
- vElement.setElementValue(5);
- vElement.setElementLabel("Password Expired");
- vElement.setRbKey("xa.enum.AuthStatus.AUTH_STATUS_PASSWORD_EXPIRED");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("AUTH_STATUS_USER_NOT_FOUND");
- vElement.setElementValue(6);
- vElement.setElementLabel("User not found");
- vElement.setRbKey("xa.enum.AuthStatus.AUTH_STATUS_USER_NOT_FOUND");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // XXAuthSession::AuthType
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_XXAuthSession_AuthType);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("AUTH_TYPE_UNKNOWN");
- vElement.setElementValue(0);
- vElement.setElementLabel("Unknown");
- vElement.setRbKey("xa.enum.AuthType.AUTH_TYPE_UNKNOWN");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("AUTH_TYPE_PASSWORD");
- vElement.setElementValue(1);
- vElement.setElementLabel("Username/Password");
- vElement.setRbKey("xa.enum.AuthType.AUTH_TYPE_PASSWORD");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- ///////////////////////////////////
- // XResponse::ResponseStatus
- ///////////////////////////////////
- vEnum = new VEnum();
- vEnum.setEnumName(ENUM_XResponse_ResponseStatus);
- vEnum.setElementList(new ArrayList<VEnumElement>());
- enumList.add(vEnum);
- enumMap.put(vEnum.getEnumName(), vEnum);
-
- vElement = new VEnumElement();
- vElement.setElementName("STATUS_SUCCESS");
- vElement.setElementValue(0);
- vElement.setElementLabel("Success");
- vElement.setRbKey("xa.enum.ResponseStatus.STATUS_SUCCESS");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("STATUS_ERROR");
- vElement.setElementValue(1);
- vElement.setElementLabel("Error");
- vElement.setRbKey("xa.enum.ResponseStatus.STATUS_ERROR");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("STATUS_VALIDATION");
- vElement.setElementValue(2);
- vElement.setElementLabel("Validation Error");
- vElement.setRbKey("xa.enum.ResponseStatus.STATUS_VALIDATION");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("STATUS_WARN");
- vElement.setElementValue(3);
- vElement.setElementLabel("Warning");
- vElement.setRbKey("xa.enum.ResponseStatus.STATUS_WARN");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("STATUS_INFO");
- vElement.setElementValue(4);
- vElement.setElementLabel("Information");
- vElement.setRbKey("xa.enum.ResponseStatus.STATUS_INFO");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
- vElement = new VEnumElement();
- vElement.setElementName("STATUS_PARTIAL_SUCCESS");
- vElement.setElementValue(5);
- vElement.setElementLabel("Partial Success");
- vElement.setRbKey("xa.enum.ResponseStatus.STATUS_PARTIAL_SUCCESS");
- vElement.setEnumName(vEnum.getEnumName());
-
- vEnum.getElementList().add(vElement);
-
-
- }
-
-}
-
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/util/XARestUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/util/XARestUtil.java b/security-admin/src/main/java/org/apache/ranger/util/XARestUtil.java
deleted file mode 100644
index a934c5c..0000000
--- a/security-admin/src/main/java/org/apache/ranger/util/XARestUtil.java
+++ /dev/null
@@ -1,156 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing,
- * software distributed under the License is distributed on an
- * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
- * KIND, either express or implied. See the License for the
- * specific language governing permissions and limitations
- * under the License.
- */
-
- package org.apache.ranger.util;
-
-import java.util.ArrayList;
-import java.util.Collection;
-import java.util.List;
-
-import org.apache.log4j.Logger;
-import org.apache.ranger.common.MessageEnums;
-import org.apache.ranger.common.RESTErrorUtil;
-import org.apache.ranger.common.StringUtil;
-import org.apache.ranger.common.XAConfigUtil;
-import org.apache.ranger.entity.XXPortalUser;
-import org.apache.ranger.view.VXMessage;
-import org.apache.ranger.view.VXPortalUser;
-import org.apache.ranger.view.VXResponse;
-import org.springframework.beans.factory.annotation.Autowired;
-import org.springframework.stereotype.Component;
-
-@Component
-public class XARestUtil {
- static final Logger logger = Logger.getLogger(XARestUtil.class);
-
- @Autowired
- StringUtil stringUtil;
-
- @Autowired
- RESTErrorUtil restErrorUtil;
-
- @Autowired
- XAConfigUtil configUtil;
-
- void splitUserRoleList(Collection<String> collection) {
- Collection<String> newCollection = new ArrayList<String>();
- for (String role : collection) {
- String roles[] = role.split(",");
- for (int i = 0; i < roles.length; i++) {
- String str = roles[i];
- newCollection.add(str);
- }
- }
- collection.clear();
- collection.addAll(newCollection);
- }
-
- /**
- * This method cleans up the data provided by the user for update
- *
- * @param userProfile
- * @return
- */
- public void validateVUserProfileForUpdate(XXPortalUser gjUser,
- VXPortalUser userProfile) {
-
- List<VXMessage> messageList = new ArrayList<VXMessage>();
-
- // Email Update is allowed.
- // if (userProfile.getEmailAddress() != null
- // && !userProfile.getEmailAddress().equalsIgnoreCase(
- // gjUser.getEmailAddress())) {
- // throw restErrorUtil.createRESTException(
- // "Email address can't be updated",
- // MessageEnums.DATA_NOT_UPDATABLE, null, "emailAddress",
- // userProfile.getEmailAddress());
- // }
-
- // Login Id can't be changed
- if (userProfile.getLoginId() != null
- && !gjUser.getLoginId().equalsIgnoreCase(
- userProfile.getLoginId())) {
- throw restErrorUtil.createRESTException(
- "Username can't be updated",
- MessageEnums.DATA_NOT_UPDATABLE, null, "loginId",
- userProfile.getLoginId());
- }
- // }
- userProfile.setFirstName(restErrorUtil.validateStringForUpdate(
- userProfile.getFirstName(), gjUser.getFirstName(),
- StringUtil.VALIDATION_NAME, "Invalid first name",
- MessageEnums.INVALID_INPUT_DATA, null, "firstName"));
-
- userProfile.setFirstName(restErrorUtil.validateStringForUpdate(
- userProfile.getFirstName(), gjUser.getFirstName(),
- StringUtil.VALIDATION_NAME, "Invalid first name",
- MessageEnums.INVALID_INPUT_DATA, null, "firstName"));
-
- userProfile.setLastName(restErrorUtil.validateStringForUpdate(
- userProfile.getLastName(), gjUser.getLastName(),
- StringUtil.VALIDATION_NAME, "Invalid last name",
- MessageEnums.INVALID_INPUT_DATA, null, "lastName"));
-
- // firstName
- if (!stringUtil.isValidName(userProfile.getFirstName())) {
- logger.info("Invalid first name." + userProfile);
- messageList.add(MessageEnums.INVALID_INPUT_DATA.getMessage(null,
- "firstName"));
- }
-
- // lastName
- if (!stringUtil.isValidName(userProfile.getLastName())) {
- logger.info("Invalid last name." + userProfile);
- messageList.add(MessageEnums.INVALID_INPUT_DATA.getMessage(null,
- "lastName"));
- }
-
- // create the public screen name
- userProfile.setPublicScreenName(userProfile.getFirstName() + " "
- + userProfile.getLastName());
-
- userProfile.setNotes(restErrorUtil.validateStringForUpdate(
- userProfile.getNotes(), gjUser.getNotes(),
- StringUtil.VALIDATION_NAME, "Invalid notes",
- MessageEnums.INVALID_INPUT_DATA, null, "notes"));
-
- // validate user roles
- if (userProfile.getUserRoleList() != null) {
- // First let's normalize it
- splitUserRoleList(userProfile.getUserRoleList());
- for (String userRole : userProfile.getUserRoleList()) {
- restErrorUtil.validateStringList(userRole,
- configUtil.getRoles(), "Invalid role", null,
- "userRoleList");
- }
-
- }
- if (messageList.size() > 0) {
- VXResponse gjResponse = new VXResponse();
- gjResponse.setStatusCode(VXResponse.STATUS_ERROR);
- gjResponse.setMsgDesc("Validation failure");
- gjResponse.setMessageList(messageList);
- logger.info("Validation Error in updateUser() userProfile="
- + userProfile + ", error=" + gjResponse);
- throw restErrorUtil.createRESTException(gjResponse);
- }
-
- }
-
-}
\ No newline at end of file
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXAccessAudit.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXAccessAudit.java b/security-admin/src/main/java/org/apache/ranger/view/VXAccessAudit.java
index 1a00d29..f46bc26 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXAccessAudit.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXAccessAudit.java
@@ -24,14 +24,14 @@
*
*/
-import java.util.*;
+import java.util.Date;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.view.*;
+import org.apache.ranger.common.AppConstants;
+import org.apache.ranger.common.DateUtil;
+import org.apache.ranger.common.RangerConstants;
import org.apache.ranger.json.JsonDateSerializer;
-import org.apache.ranger.view.*;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.annotate.JsonIgnoreProperties;
@@ -53,7 +53,7 @@ public class VXAccessAudit extends VXDataObject implements java.io.Serializable
* Access Result
* This attribute is of type enum CommonEnums::AccessResult
*/
- protected int accessResult = XAConstants.ACCESS_RESULT_DENIED;
+ protected int accessResult = RangerConstants.ACCESS_RESULT_DENIED;
/**
* Access Type
*/
@@ -124,7 +124,7 @@ public class VXAccessAudit extends VXDataObject implements java.io.Serializable
* Default constructor. This will set all the attributes to default value.
*/
public VXAccessAudit ( ) {
- accessResult = XAConstants.ACCESS_RESULT_DENIED;
+ accessResult = RangerConstants.ACCESS_RESULT_DENIED;
}
/**
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXAccessAuditList.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXAccessAuditList.java b/security-admin/src/main/java/org/apache/ranger/view/VXAccessAuditList.java
index e039416..09f5120 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXAccessAuditList.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXAccessAuditList.java
@@ -24,11 +24,14 @@
*
*/
-import java.util.*;
+import java.util.ArrayList;
+import java.util.List;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlAccessType;
+import javax.xml.bind.annotation.XmlAccessorType;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.view.*;
+import org.apache.ranger.common.view.VList;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.map.annotate.JsonSerialize;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXAsset.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXAsset.java b/security-admin/src/main/java/org/apache/ranger/view/VXAsset.java
index f7ddaca..0d44f5e 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXAsset.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXAsset.java
@@ -24,14 +24,9 @@
*
*/
-import java.util.*;
+import javax.xml.bind.annotation.XmlRootElement;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.view.*;
-import org.apache.ranger.json.JsonDateSerializer;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.AppConstants;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.annotate.JsonIgnoreProperties;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXAssetList.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXAssetList.java b/security-admin/src/main/java/org/apache/ranger/view/VXAssetList.java
index 6d7e012..46d61ac 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXAssetList.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXAssetList.java
@@ -24,11 +24,14 @@
*
*/
-import java.util.*;
+import java.util.ArrayList;
+import java.util.List;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlAccessType;
+import javax.xml.bind.annotation.XmlAccessorType;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.view.*;
+import org.apache.ranger.common.view.VList;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.map.annotate.JsonSerialize;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXAuditMap.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXAuditMap.java b/security-admin/src/main/java/org/apache/ranger/view/VXAuditMap.java
index 61c3355..dc94e28 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXAuditMap.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXAuditMap.java
@@ -24,14 +24,9 @@
*
*/
-import java.util.*;
+import javax.xml.bind.annotation.XmlRootElement;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.view.*;
-import org.apache.ranger.json.JsonDateSerializer;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.AppConstants;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.annotate.JsonIgnoreProperties;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXAuditMapList.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXAuditMapList.java b/security-admin/src/main/java/org/apache/ranger/view/VXAuditMapList.java
index f7ff5da..499d8f4 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXAuditMapList.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXAuditMapList.java
@@ -24,11 +24,14 @@
*
*/
-import java.util.*;
+import java.util.ArrayList;
+import java.util.List;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlAccessType;
+import javax.xml.bind.annotation.XmlAccessorType;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.view.*;
+import org.apache.ranger.common.view.VList;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.map.annotate.JsonSerialize;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXAuditRecordList.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXAuditRecordList.java b/security-admin/src/main/java/org/apache/ranger/view/VXAuditRecordList.java
index ccc524a..42ff4d1 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXAuditRecordList.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXAuditRecordList.java
@@ -19,7 +19,8 @@
package org.apache.ranger.view;
-import java.util.*;
+import java.util.ArrayList;
+import java.util.List;
import javax.xml.bind.annotation.XmlAccessType;
import javax.xml.bind.annotation.XmlAccessorType;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXAuthSession.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXAuthSession.java b/security-admin/src/main/java/org/apache/ranger/view/VXAuthSession.java
index 4c237d2..6835456 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXAuthSession.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXAuthSession.java
@@ -24,14 +24,12 @@
*
*/
-import java.util.*;
+import java.util.Date;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.view.*;
+import org.apache.ranger.common.AppConstants;
import org.apache.ranger.json.JsonDateSerializer;
-import org.apache.ranger.view.*;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.annotate.JsonIgnoreProperties;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXAuthSessionList.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXAuthSessionList.java b/security-admin/src/main/java/org/apache/ranger/view/VXAuthSessionList.java
index 963b34f..a20c07a 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXAuthSessionList.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXAuthSessionList.java
@@ -24,11 +24,14 @@
*
*/
-import java.util.*;
+import java.util.ArrayList;
+import java.util.List;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlAccessType;
+import javax.xml.bind.annotation.XmlAccessorType;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.view.*;
+import org.apache.ranger.common.view.VList;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.map.annotate.JsonSerialize;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXCredentialStore.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXCredentialStore.java b/security-admin/src/main/java/org/apache/ranger/view/VXCredentialStore.java
index 2ed03cb..9a9aac2 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXCredentialStore.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXCredentialStore.java
@@ -24,14 +24,9 @@
*/
-import java.util.*;
+import javax.xml.bind.annotation.XmlRootElement;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.view.*;
-import org.apache.ranger.json.JsonDateSerializer;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.AppConstants;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.annotate.JsonIgnoreProperties;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXCredentialStoreList.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXCredentialStoreList.java b/security-admin/src/main/java/org/apache/ranger/view/VXCredentialStoreList.java
index fef0fa0..fe992a7 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXCredentialStoreList.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXCredentialStoreList.java
@@ -24,11 +24,14 @@
*/
-import java.util.*;
+import java.util.ArrayList;
+import java.util.List;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlAccessType;
+import javax.xml.bind.annotation.XmlAccessorType;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.view.*;
+import org.apache.ranger.common.view.VList;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.map.annotate.JsonSerialize;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXDataObject.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXDataObject.java b/security-admin/src/main/java/org/apache/ranger/view/VXDataObject.java
index 34c508a..476b054 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXDataObject.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXDataObject.java
@@ -24,14 +24,13 @@
*
*/
-import java.util.*;
+import java.util.Date;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.view.*;
+import org.apache.ranger.common.AppConstants;
+import org.apache.ranger.common.view.ViewBaseBean;
import org.apache.ranger.json.JsonDateSerializer;
-import org.apache.ranger.view.*;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.annotate.JsonIgnoreProperties;
[07/12] incubator-ranger git commit: RANGER-194: Rename classes under
web-admin project
Posted by ma...@apache.org.
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/db/RangerDaoManagerBase.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/db/RangerDaoManagerBase.java b/security-admin/src/main/java/org/apache/ranger/db/RangerDaoManagerBase.java
new file mode 100644
index 0000000..61bcca5
--- /dev/null
+++ b/security-admin/src/main/java/org/apache/ranger/db/RangerDaoManagerBase.java
@@ -0,0 +1,213 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+ package org.apache.ranger.db;
+
+/**
+ *
+ */
+
+import javax.persistence.EntityManager;
+
+import org.apache.log4j.Logger;
+import org.apache.ranger.common.AppConstants;
+import org.apache.ranger.common.RESTErrorUtil;
+import org.apache.ranger.common.db.BaseDao;
+import org.springframework.beans.factory.annotation.Autowired;
+
+
+public abstract class RangerDaoManagerBase {
+ final static Logger logger = Logger.getLogger(RangerDaoManagerBase.class);
+
+ @Autowired
+ protected RESTErrorUtil restErrorUtil;
+ abstract public EntityManager getEntityManager();
+
+ public RangerDaoManagerBase() {
+ }
+
+ public BaseDao<?> getDaoForClassType(int classType) {
+ if (classType == AppConstants.CLASS_TYPE_AUTH_SESS) {
+ return getXXAuthSession();
+ }
+ if (classType == AppConstants.CLASS_TYPE_USER_PROFILE) {
+ return getXXPortalUser();
+ }
+ if (classType == AppConstants.CLASS_TYPE_XA_ASSET) {
+ return getXXAsset();
+ }
+ if (classType == AppConstants.CLASS_TYPE_XA_RESOURCE) {
+ return getXXResource();
+ }
+ if (classType == AppConstants.CLASS_TYPE_XA_CRED_STORE) {
+ return getXXCredentialStore();
+ }
+ if (classType == AppConstants.CLASS_TYPE_XA_GROUP) {
+ return getXXGroup();
+ }
+ if (classType == AppConstants.CLASS_TYPE_XA_USER) {
+ return getXXUser();
+ }
+ if (classType == AppConstants.CLASS_TYPE_XA_GROUP_USER) {
+ return getXXGroupUser();
+ }
+ if (classType == AppConstants.CLASS_TYPE_XA_GROUP_GROUP) {
+ return getXXGroupGroup();
+ }
+ if (classType == AppConstants.CLASS_TYPE_XA_PERM_MAP) {
+ return getXXPermMap();
+ }
+ if (classType == AppConstants.CLASS_TYPE_XA_AUDIT_MAP) {
+ return getXXAuditMap();
+ }
+ if (classType == AppConstants.CLASS_TYPE_XA_POLICY_EXPORT_AUDIT) {
+ return getXXPolicyExportAudit();
+ }
+ if (classType == AppConstants.CLASS_TYPE_TRX_LOG) {
+ return getXXTrxLog();
+ }
+ if (classType == AppConstants.CLASS_TYPE_XA_ACCESS_AUDIT) {
+ return getXXAccessAudit();
+ }
+
+ logger.error("No DaoManager found for classType=" + classType, new Throwable());
+ return null;
+ }
+
+ public BaseDao<?> getDaoForClassName(String className) {
+ if (className.equals("XXDBBase")) {
+ return getXXDBBase();
+ }
+ if (className.equals("XXAuthSession")) {
+ return getXXAuthSession();
+ }
+ if (className.equals("XXPortalUser")) {
+ return getXXPortalUser();
+ }
+ if (className.equals("XXPortalUserRole")) {
+ return getXXPortalUserRole();
+ }
+ if (className.equals("XXAsset")) {
+ return getXXAsset();
+ }
+ if (className.equals("XXResource")) {
+ return getXXResource();
+ }
+ if (className.equals("XXCredentialStore")) {
+ return getXXCredentialStore();
+ }
+ if (className.equals("XXGroup")) {
+ return getXXGroup();
+ }
+ if (className.equals("XXUser")) {
+ return getXXUser();
+ }
+ if (className.equals("XXGroupUser")) {
+ return getXXGroupUser();
+ }
+ if (className.equals("XXGroupGroup")) {
+ return getXXGroupGroup();
+ }
+ if (className.equals("XXPermMap")) {
+ return getXXPermMap();
+ }
+ if (className.equals("XXAuditMap")) {
+ return getXXAuditMap();
+ }
+ if (className.equals("XXPolicyExportAudit")) {
+ return getXXPolicyExportAudit();
+ }
+ if (className.equals("XXTrxLog")) {
+ return getXXTrxLog();
+ }
+ if (className.equals("XXAccessAudit")) {
+ return getXXAccessAudit();
+ }
+
+ logger.error("No DaoManager found for className=" + className, new Throwable());
+ return null;
+ }
+
+ public XXDBBaseDao getXXDBBase() {
+ return new XXDBBaseDao(this);
+ }
+
+ public XXAuthSessionDao getXXAuthSession() {
+ return new XXAuthSessionDao(this);
+ }
+
+ public XXPortalUserDao getXXPortalUser() {
+ return new XXPortalUserDao(this);
+ }
+
+ public XXPortalUserRoleDao getXXPortalUserRole() {
+ return new XXPortalUserRoleDao(this);
+ }
+
+ public XXAssetDao getXXAsset() {
+ return new XXAssetDao(this);
+ }
+
+ public XXResourceDao getXXResource() {
+ return new XXResourceDao(this);
+ }
+
+ public XXCredentialStoreDao getXXCredentialStore() {
+ return new XXCredentialStoreDao(this);
+ }
+
+ public XXGroupDao getXXGroup() {
+ return new XXGroupDao(this);
+ }
+
+ public XXUserDao getXXUser() {
+ return new XXUserDao(this);
+ }
+
+ public XXGroupUserDao getXXGroupUser() {
+ return new XXGroupUserDao(this);
+ }
+
+ public XXGroupGroupDao getXXGroupGroup() {
+ return new XXGroupGroupDao(this);
+ }
+
+ public XXPermMapDao getXXPermMap() {
+ return new XXPermMapDao(this);
+ }
+
+ public XXAuditMapDao getXXAuditMap() {
+ return new XXAuditMapDao(this);
+ }
+
+ public XXPolicyExportAuditDao getXXPolicyExportAudit() {
+ return new XXPolicyExportAuditDao(this);
+ }
+
+ public XXTrxLogDao getXXTrxLog() {
+ return new XXTrxLogDao(this);
+ }
+
+ public XXAccessAuditDao getXXAccessAudit() {
+ return new XXAccessAuditDao(this);
+ }
+
+
+}
+
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/db/XADaoManager.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/db/XADaoManager.java b/security-admin/src/main/java/org/apache/ranger/db/XADaoManager.java
deleted file mode 100644
index 64f2148..0000000
--- a/security-admin/src/main/java/org/apache/ranger/db/XADaoManager.java
+++ /dev/null
@@ -1,77 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing,
- * software distributed under the License is distributed on an
- * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
- * KIND, either express or implied. See the License for the
- * specific language governing permissions and limitations
- * under the License.
- */
-
- package org.apache.ranger.db;
-
-
-
-import javax.persistence.*;
-
-import org.apache.log4j.Logger;
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.db.BaseDao;
-import org.springframework.stereotype.Component;
-import org.springframework.beans.factory.annotation.Autowired;
-
-@Component
-public class XADaoManager extends XADaoManagerBase {
- final static Logger logger = Logger.getLogger(XADaoManager.class);
-
- @PersistenceContext(unitName = "defaultPU")
- private EntityManager em;
-
- @PersistenceContext(unitName = "loggingPU")
- private EntityManager loggingEM;
-
- @Autowired
- StringUtil stringUtil;
-
- @Override
- public EntityManager getEntityManager() {
- return em;
- }
-
- public EntityManager getEntityManager(String persistenceContextUnit) {
- logger.error("XADaoManager.getEntityManager(" + persistenceContextUnit + ")");
- if (persistenceContextUnit.equalsIgnoreCase("loggingPU")) {
- return loggingEM;
- }
- return getEntityManager();
- }
-
-
- /**
- * @return the stringUtil
- */
- public StringUtil getStringUtil() {
- return stringUtil;
- }
-
- /*
- * (non-Javadoc)
- */
- @Override
- public BaseDao<?> getDaoForClassType(int classType) {
- if (classType == XAConstants.CLASS_TYPE_NONE) {
- return null;
- }
- return super.getDaoForClassType(classType);
- }
-
-}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/db/XADaoManagerBase.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/db/XADaoManagerBase.java b/security-admin/src/main/java/org/apache/ranger/db/XADaoManagerBase.java
deleted file mode 100644
index e908447..0000000
--- a/security-admin/src/main/java/org/apache/ranger/db/XADaoManagerBase.java
+++ /dev/null
@@ -1,216 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing,
- * software distributed under the License is distributed on an
- * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
- * KIND, either express or implied. See the License for the
- * specific language governing permissions and limitations
- * under the License.
- */
-
- package org.apache.ranger.db;
-
-/**
- *
- */
-
-import javax.persistence.*;
-
-import java.util.*;
-
-import org.apache.log4j.Logger;
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.db.*;
-import org.apache.ranger.entity.*;
-import org.springframework.stereotype.Component;
-import org.springframework.beans.factory.annotation.Autowired;
-
-
-public abstract class XADaoManagerBase {
- final static Logger logger = Logger.getLogger(XADaoManagerBase.class);
-
- @Autowired
- protected RESTErrorUtil restErrorUtil;
- abstract public EntityManager getEntityManager();
-
- public XADaoManagerBase() {
- }
-
- public BaseDao<?> getDaoForClassType(int classType) {
- if (classType == AppConstants.CLASS_TYPE_AUTH_SESS) {
- return getXXAuthSession();
- }
- if (classType == AppConstants.CLASS_TYPE_USER_PROFILE) {
- return getXXPortalUser();
- }
- if (classType == AppConstants.CLASS_TYPE_XA_ASSET) {
- return getXXAsset();
- }
- if (classType == AppConstants.CLASS_TYPE_XA_RESOURCE) {
- return getXXResource();
- }
- if (classType == AppConstants.CLASS_TYPE_XA_CRED_STORE) {
- return getXXCredentialStore();
- }
- if (classType == AppConstants.CLASS_TYPE_XA_GROUP) {
- return getXXGroup();
- }
- if (classType == AppConstants.CLASS_TYPE_XA_USER) {
- return getXXUser();
- }
- if (classType == AppConstants.CLASS_TYPE_XA_GROUP_USER) {
- return getXXGroupUser();
- }
- if (classType == AppConstants.CLASS_TYPE_XA_GROUP_GROUP) {
- return getXXGroupGroup();
- }
- if (classType == AppConstants.CLASS_TYPE_XA_PERM_MAP) {
- return getXXPermMap();
- }
- if (classType == AppConstants.CLASS_TYPE_XA_AUDIT_MAP) {
- return getXXAuditMap();
- }
- if (classType == AppConstants.CLASS_TYPE_XA_POLICY_EXPORT_AUDIT) {
- return getXXPolicyExportAudit();
- }
- if (classType == AppConstants.CLASS_TYPE_TRX_LOG) {
- return getXXTrxLog();
- }
- if (classType == AppConstants.CLASS_TYPE_XA_ACCESS_AUDIT) {
- return getXXAccessAudit();
- }
-
- logger.error("No DaoManager found for classType=" + classType, new Throwable());
- return null;
- }
-
- public BaseDao<?> getDaoForClassName(String className) {
- if (className.equals("XXDBBase")) {
- return getXXDBBase();
- }
- if (className.equals("XXAuthSession")) {
- return getXXAuthSession();
- }
- if (className.equals("XXPortalUser")) {
- return getXXPortalUser();
- }
- if (className.equals("XXPortalUserRole")) {
- return getXXPortalUserRole();
- }
- if (className.equals("XXAsset")) {
- return getXXAsset();
- }
- if (className.equals("XXResource")) {
- return getXXResource();
- }
- if (className.equals("XXCredentialStore")) {
- return getXXCredentialStore();
- }
- if (className.equals("XXGroup")) {
- return getXXGroup();
- }
- if (className.equals("XXUser")) {
- return getXXUser();
- }
- if (className.equals("XXGroupUser")) {
- return getXXGroupUser();
- }
- if (className.equals("XXGroupGroup")) {
- return getXXGroupGroup();
- }
- if (className.equals("XXPermMap")) {
- return getXXPermMap();
- }
- if (className.equals("XXAuditMap")) {
- return getXXAuditMap();
- }
- if (className.equals("XXPolicyExportAudit")) {
- return getXXPolicyExportAudit();
- }
- if (className.equals("XXTrxLog")) {
- return getXXTrxLog();
- }
- if (className.equals("XXAccessAudit")) {
- return getXXAccessAudit();
- }
-
- logger.error("No DaoManager found for className=" + className, new Throwable());
- return null;
- }
-
- public XXDBBaseDao getXXDBBase() {
- return new XXDBBaseDao(this);
- }
-
- public XXAuthSessionDao getXXAuthSession() {
- return new XXAuthSessionDao(this);
- }
-
- public XXPortalUserDao getXXPortalUser() {
- return new XXPortalUserDao(this);
- }
-
- public XXPortalUserRoleDao getXXPortalUserRole() {
- return new XXPortalUserRoleDao(this);
- }
-
- public XXAssetDao getXXAsset() {
- return new XXAssetDao(this);
- }
-
- public XXResourceDao getXXResource() {
- return new XXResourceDao(this);
- }
-
- public XXCredentialStoreDao getXXCredentialStore() {
- return new XXCredentialStoreDao(this);
- }
-
- public XXGroupDao getXXGroup() {
- return new XXGroupDao(this);
- }
-
- public XXUserDao getXXUser() {
- return new XXUserDao(this);
- }
-
- public XXGroupUserDao getXXGroupUser() {
- return new XXGroupUserDao(this);
- }
-
- public XXGroupGroupDao getXXGroupGroup() {
- return new XXGroupGroupDao(this);
- }
-
- public XXPermMapDao getXXPermMap() {
- return new XXPermMapDao(this);
- }
-
- public XXAuditMapDao getXXAuditMap() {
- return new XXAuditMapDao(this);
- }
-
- public XXPolicyExportAuditDao getXXPolicyExportAudit() {
- return new XXPolicyExportAuditDao(this);
- }
-
- public XXTrxLogDao getXXTrxLog() {
- return new XXTrxLogDao(this);
- }
-
- public XXAccessAuditDao getXXAccessAudit() {
- return new XXAccessAuditDao(this);
- }
-
-
-}
-
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/db/XXAccessAuditDao.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/db/XXAccessAuditDao.java b/security-admin/src/main/java/org/apache/ranger/db/XXAccessAuditDao.java
index 614cea9..cd1add6 100644
--- a/security-admin/src/main/java/org/apache/ranger/db/XXAccessAuditDao.java
+++ b/security-admin/src/main/java/org/apache/ranger/db/XXAccessAuditDao.java
@@ -19,13 +19,12 @@
package org.apache.ranger.db;
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.db.*;
-import org.apache.ranger.entity.*;
+import org.apache.ranger.common.db.BaseDao;
+import org.apache.ranger.entity.XXAccessAudit;
public class XXAccessAuditDao extends BaseDao<XXAccessAudit> {
- public XXAccessAuditDao( XADaoManagerBase daoManager ) {
+ public XXAccessAuditDao( RangerDaoManagerBase daoManager ) {
super(daoManager, "loggingPU");
}
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/db/XXAssetDao.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/db/XXAssetDao.java b/security-admin/src/main/java/org/apache/ranger/db/XXAssetDao.java
index 08a1d2a..7aea48c 100644
--- a/security-admin/src/main/java/org/apache/ranger/db/XXAssetDao.java
+++ b/security-admin/src/main/java/org/apache/ranger/db/XXAssetDao.java
@@ -22,14 +22,14 @@
import javax.persistence.NoResultException;
import org.apache.log4j.Logger;
-import org.apache.ranger.common.XACommonEnums;
-import org.apache.ranger.common.db.*;
+import org.apache.ranger.common.RangerCommonEnums;
+import org.apache.ranger.common.db.BaseDao;
import org.apache.ranger.entity.XXAsset;
public class XXAssetDao extends BaseDao<XXAsset> {
static final Logger logger = Logger.getLogger(XXAssetDao.class);
- public XXAssetDao( XADaoManagerBase daoManager ) {
+ public XXAssetDao( RangerDaoManagerBase daoManager ) {
super(daoManager);
}
@@ -42,7 +42,7 @@ public class XXAssetDao extends BaseDao<XXAsset> {
return getEntityManager()
.createNamedQuery("XXAsset.findByAssetName", XXAsset.class)
.setParameter("name", name.trim())
- .setParameter("status",XACommonEnums.STATUS_DELETED)
+ .setParameter("status",RangerCommonEnums.STATUS_DELETED)
.getSingleResult();
} catch (NoResultException e) {
// ignore
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/db/XXAuditMapDao.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/db/XXAuditMapDao.java b/security-admin/src/main/java/org/apache/ranger/db/XXAuditMapDao.java
index 2b1a95f..481e486 100644
--- a/security-admin/src/main/java/org/apache/ranger/db/XXAuditMapDao.java
+++ b/security-admin/src/main/java/org/apache/ranger/db/XXAuditMapDao.java
@@ -25,14 +25,13 @@ import java.util.List;
import javax.persistence.NoResultException;
import org.apache.log4j.Logger;
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.db.*;
-import org.apache.ranger.entity.*;
+import org.apache.ranger.common.db.BaseDao;
+import org.apache.ranger.entity.XXAuditMap;
public class XXAuditMapDao extends BaseDao<XXAuditMap> {
static final Logger logger = Logger.getLogger(XXAssetDao.class);
- public XXAuditMapDao( XADaoManagerBase daoManager ) {
+ public XXAuditMapDao( RangerDaoManagerBase daoManager ) {
super(daoManager);
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/db/XXAuthSessionDao.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/db/XXAuthSessionDao.java b/security-admin/src/main/java/org/apache/ranger/db/XXAuthSessionDao.java
index 4e592f4..4c9bdc5 100644
--- a/security-admin/src/main/java/org/apache/ranger/db/XXAuthSessionDao.java
+++ b/security-admin/src/main/java/org/apache/ranger/db/XXAuthSessionDao.java
@@ -28,7 +28,7 @@ import org.apache.ranger.entity.XXAuthSession;
public class XXAuthSessionDao extends BaseDao<XXAuthSession> {
- public XXAuthSessionDao( XADaoManagerBase daoManager ) {
+ public XXAuthSessionDao( RangerDaoManagerBase daoManager ) {
super(daoManager);
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/db/XXCredentialStoreDao.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/db/XXCredentialStoreDao.java b/security-admin/src/main/java/org/apache/ranger/db/XXCredentialStoreDao.java
index 1ed278e..d95bfb4 100644
--- a/security-admin/src/main/java/org/apache/ranger/db/XXCredentialStoreDao.java
+++ b/security-admin/src/main/java/org/apache/ranger/db/XXCredentialStoreDao.java
@@ -19,13 +19,12 @@
package org.apache.ranger.db;
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.db.*;
-import org.apache.ranger.entity.*;
+import org.apache.ranger.common.db.BaseDao;
+import org.apache.ranger.entity.XXCredentialStore;
public class XXCredentialStoreDao extends BaseDao<XXCredentialStore> {
- public XXCredentialStoreDao( XADaoManagerBase daoManager ) {
+ public XXCredentialStoreDao( RangerDaoManagerBase daoManager ) {
super(daoManager);
}
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/db/XXDBBaseDao.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/db/XXDBBaseDao.java b/security-admin/src/main/java/org/apache/ranger/db/XXDBBaseDao.java
index 3913f3d..d20fbff 100644
--- a/security-admin/src/main/java/org/apache/ranger/db/XXDBBaseDao.java
+++ b/security-admin/src/main/java/org/apache/ranger/db/XXDBBaseDao.java
@@ -20,11 +20,11 @@
package org.apache.ranger.db;
import org.apache.ranger.common.db.BaseDao;
-import org.apache.ranger.entity.*;
+import org.apache.ranger.entity.XXDBBase;
public class XXDBBaseDao extends BaseDao<XXDBBase> {
- public XXDBBaseDao( XADaoManagerBase daoManager ) {
+ public XXDBBaseDao( RangerDaoManagerBase daoManager ) {
super(daoManager);
}
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/db/XXGroupDao.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/db/XXGroupDao.java b/security-admin/src/main/java/org/apache/ranger/db/XXGroupDao.java
index e0b7735..4736305 100644
--- a/security-admin/src/main/java/org/apache/ranger/db/XXGroupDao.java
+++ b/security-admin/src/main/java/org/apache/ranger/db/XXGroupDao.java
@@ -23,16 +23,12 @@
import java.util.ArrayList;
import java.util.List;
-
-
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.db.*;
-import org.apache.ranger.entity.*;
+import org.apache.ranger.common.db.BaseDao;
+import org.apache.ranger.entity.XXGroup;
public class XXGroupDao extends BaseDao<XXGroup> {
- public XXGroupDao(XADaoManagerBase daoManager) {
+ public XXGroupDao(RangerDaoManagerBase daoManager) {
super(daoManager);
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/db/XXGroupGroupDao.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/db/XXGroupGroupDao.java b/security-admin/src/main/java/org/apache/ranger/db/XXGroupGroupDao.java
index 5b831a2..df2796c 100644
--- a/security-admin/src/main/java/org/apache/ranger/db/XXGroupGroupDao.java
+++ b/security-admin/src/main/java/org/apache/ranger/db/XXGroupGroupDao.java
@@ -19,13 +19,12 @@
package org.apache.ranger.db;
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.db.*;
-import org.apache.ranger.entity.*;
+import org.apache.ranger.common.db.BaseDao;
+import org.apache.ranger.entity.XXGroupGroup;
public class XXGroupGroupDao extends BaseDao<XXGroupGroup> {
- public XXGroupGroupDao( XADaoManagerBase daoManager ) {
+ public XXGroupGroupDao( RangerDaoManagerBase daoManager ) {
super(daoManager);
}
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/db/XXGroupUserDao.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/db/XXGroupUserDao.java b/security-admin/src/main/java/org/apache/ranger/db/XXGroupUserDao.java
index 8b27c7f..9f5abfb 100644
--- a/security-admin/src/main/java/org/apache/ranger/db/XXGroupUserDao.java
+++ b/security-admin/src/main/java/org/apache/ranger/db/XXGroupUserDao.java
@@ -26,14 +26,13 @@ import java.util.List;
import javax.persistence.NoResultException;
import org.apache.log4j.Logger;
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.db.*;
-import org.apache.ranger.entity.*;
+import org.apache.ranger.common.db.BaseDao;
+import org.apache.ranger.entity.XXGroupUser;
public class XXGroupUserDao extends BaseDao<XXGroupUser> {
static final Logger logger = Logger.getLogger(XXGroupUserDao.class);
- public XXGroupUserDao(XADaoManagerBase daoManager) {
+ public XXGroupUserDao(RangerDaoManagerBase daoManager) {
super(daoManager);
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/db/XXPermMapDao.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/db/XXPermMapDao.java b/security-admin/src/main/java/org/apache/ranger/db/XXPermMapDao.java
index 659b9be..23c5c48 100644
--- a/security-admin/src/main/java/org/apache/ranger/db/XXPermMapDao.java
+++ b/security-admin/src/main/java/org/apache/ranger/db/XXPermMapDao.java
@@ -25,14 +25,13 @@ import java.util.List;
import javax.persistence.NoResultException;
import org.apache.log4j.Logger;
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.db.*;
-import org.apache.ranger.entity.*;
+import org.apache.ranger.common.db.BaseDao;
+import org.apache.ranger.entity.XXPermMap;
public class XXPermMapDao extends BaseDao<XXPermMap> {
static final Logger logger = Logger.getLogger(XXResourceDao.class);
- public XXPermMapDao( XADaoManagerBase daoManager ) {
+ public XXPermMapDao( RangerDaoManagerBase daoManager ) {
super(daoManager);
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/db/XXPolicyExportAuditDao.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/db/XXPolicyExportAuditDao.java b/security-admin/src/main/java/org/apache/ranger/db/XXPolicyExportAuditDao.java
index 9ac89b7..5f917cc 100644
--- a/security-admin/src/main/java/org/apache/ranger/db/XXPolicyExportAuditDao.java
+++ b/security-admin/src/main/java/org/apache/ranger/db/XXPolicyExportAuditDao.java
@@ -19,13 +19,12 @@
package org.apache.ranger.db;
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.db.*;
-import org.apache.ranger.entity.*;
+import org.apache.ranger.common.db.BaseDao;
+import org.apache.ranger.entity.XXPolicyExportAudit;
public class XXPolicyExportAuditDao extends BaseDao<XXPolicyExportAudit> {
- public XXPolicyExportAuditDao( XADaoManagerBase daoManager ) {
+ public XXPolicyExportAuditDao( RangerDaoManagerBase daoManager ) {
super(daoManager);
}
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/db/XXPortalUserDao.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/db/XXPortalUserDao.java b/security-admin/src/main/java/org/apache/ranger/db/XXPortalUserDao.java
index ac11431..9069f29 100644
--- a/security-admin/src/main/java/org/apache/ranger/db/XXPortalUserDao.java
+++ b/security-admin/src/main/java/org/apache/ranger/db/XXPortalUserDao.java
@@ -22,12 +22,12 @@
import java.util.List;
-import org.apache.ranger.common.db.*;
+import org.apache.ranger.common.db.BaseDao;
import org.apache.ranger.entity.XXPortalUser;
public class XXPortalUserDao extends BaseDao<XXPortalUser> {
- public XXPortalUserDao(XADaoManagerBase daoManager) {
+ public XXPortalUserDao(RangerDaoManagerBase daoManager) {
super(daoManager);
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/db/XXPortalUserRoleDao.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/db/XXPortalUserRoleDao.java b/security-admin/src/main/java/org/apache/ranger/db/XXPortalUserRoleDao.java
index cf41d59..99d0fe2 100644
--- a/security-admin/src/main/java/org/apache/ranger/db/XXPortalUserRoleDao.java
+++ b/security-admin/src/main/java/org/apache/ranger/db/XXPortalUserRoleDao.java
@@ -25,12 +25,12 @@ import java.util.List;
import javax.persistence.NoResultException;
-import org.apache.ranger.common.db.*;
+import org.apache.ranger.common.db.BaseDao;
import org.apache.ranger.entity.XXPortalUserRole;
public class XXPortalUserRoleDao extends BaseDao<XXPortalUserRole> {
- public XXPortalUserRoleDao(XADaoManagerBase daoManager) {
+ public XXPortalUserRoleDao(RangerDaoManagerBase daoManager) {
super(daoManager);
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/db/XXResourceDao.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/db/XXResourceDao.java b/security-admin/src/main/java/org/apache/ranger/db/XXResourceDao.java
index 0aa3f75..020a76c 100644
--- a/security-admin/src/main/java/org/apache/ranger/db/XXResourceDao.java
+++ b/security-admin/src/main/java/org/apache/ranger/db/XXResourceDao.java
@@ -20,21 +20,21 @@
package org.apache.ranger.db;
-import java.util.Date;
import java.sql.Timestamp;
import java.util.ArrayList;
+import java.util.Date;
import java.util.List;
import javax.persistence.NoResultException;
import org.apache.log4j.Logger;
-import org.apache.ranger.common.db.*;
+import org.apache.ranger.common.db.BaseDao;
import org.apache.ranger.entity.XXResource;
public class XXResourceDao extends BaseDao<XXResource> {
static final Logger logger = Logger.getLogger(XXResourceDao.class);
- public XXResourceDao(XADaoManagerBase daoManager) {
+ public XXResourceDao(RangerDaoManagerBase daoManager) {
super(daoManager);
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/db/XXTrxLogDao.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/db/XXTrxLogDao.java b/security-admin/src/main/java/org/apache/ranger/db/XXTrxLogDao.java
index e5729fa..df73d72 100644
--- a/security-admin/src/main/java/org/apache/ranger/db/XXTrxLogDao.java
+++ b/security-admin/src/main/java/org/apache/ranger/db/XXTrxLogDao.java
@@ -25,13 +25,13 @@ import java.util.List;
import javax.persistence.NoResultException;
import org.apache.log4j.Logger;
-import org.apache.ranger.common.db.*;
+import org.apache.ranger.common.db.BaseDao;
import org.apache.ranger.entity.XXTrxLog;
public class XXTrxLogDao extends BaseDao<XXTrxLog> {
private static Logger logger = Logger.getLogger(XXTrxLogDao.class);
- public XXTrxLogDao( XADaoManagerBase daoManager ) {
+ public XXTrxLogDao( RangerDaoManagerBase daoManager ) {
super(daoManager);
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/db/XXUserDao.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/db/XXUserDao.java b/security-admin/src/main/java/org/apache/ranger/db/XXUserDao.java
index 4d2cec4..fb5af98 100644
--- a/security-admin/src/main/java/org/apache/ranger/db/XXUserDao.java
+++ b/security-admin/src/main/java/org/apache/ranger/db/XXUserDao.java
@@ -23,13 +23,13 @@
import javax.persistence.NoResultException;
import org.apache.log4j.Logger;
-import org.apache.ranger.common.db.*;
+import org.apache.ranger.common.db.BaseDao;
import org.apache.ranger.entity.XXUser;
public class XXUserDao extends BaseDao<XXUser> {
static final Logger logger = Logger.getLogger(XXResourceDao.class);
- public XXUserDao(XADaoManagerBase daoManager) {
+ public XXUserDao(RangerDaoManagerBase daoManager) {
super(daoManager);
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/entity/XXAccessAudit.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/entity/XXAccessAudit.java b/security-admin/src/main/java/org/apache/ranger/entity/XXAccessAudit.java
index 1e8f6e7..5696080 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXAccessAudit.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXAccessAudit.java
@@ -24,13 +24,22 @@
*
*/
-import java.util.*;
+import java.util.Date;
-import javax.persistence.*;
-import javax.xml.bind.annotation.*;
+import javax.persistence.Column;
+import javax.persistence.Entity;
+import javax.persistence.GeneratedValue;
+import javax.persistence.GenerationType;
+import javax.persistence.Id;
+import javax.persistence.SequenceGenerator;
+import javax.persistence.Table;
+import javax.persistence.Temporal;
+import javax.persistence.TemporalType;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
+import org.apache.ranger.common.AppConstants;
+import org.apache.ranger.common.DateUtil;
+import org.apache.ranger.common.RangerConstants;
@Entity
@@ -71,7 +80,7 @@ public class XXAccessAudit extends XXDBBase implements java.io.Serializable {
*
*/
@Column(name="ACCESS_RESULT" )
- protected int accessResult = XAConstants.ACCESS_RESULT_DENIED;
+ protected int accessResult = RangerConstants.ACCESS_RESULT_DENIED;
/**
* Access Type
@@ -236,7 +245,7 @@ public class XXAccessAudit extends XXDBBase implements java.io.Serializable {
*/
public XXAccessAudit ( ) {
auditType = AppConstants.ASSET_UNKNOWN;
- accessResult = XAConstants.ACCESS_RESULT_DENIED;
+ accessResult = RangerConstants.ACCESS_RESULT_DENIED;
}
@Override
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/entity/XXAsset.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/entity/XXAsset.java b/security-admin/src/main/java/org/apache/ranger/entity/XXAsset.java
index f203cf6..3a40f01 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXAsset.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXAsset.java
@@ -24,13 +24,17 @@
*
*/
-import java.util.*;
+import javax.persistence.Column;
+import javax.persistence.Entity;
+import javax.persistence.GeneratedValue;
+import javax.persistence.GenerationType;
+import javax.persistence.Id;
+import javax.persistence.SequenceGenerator;
+import javax.persistence.Table;
+import javax.xml.bind.annotation.XmlRootElement;
-import javax.persistence.*;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
+import org.apache.ranger.common.AppConstants;
+import org.apache.ranger.common.RangerConstants;
@Entity
@@ -81,7 +85,7 @@ public class XXAsset extends XXDBBase implements java.io.Serializable {
*
*/
@Column(name="ACT_STATUS" , nullable=false )
- protected int activeStatus = XAConstants.STATUS_DISABLED;
+ protected int activeStatus = RangerConstants.STATUS_DISABLED;
/**
* Type of asset
@@ -116,7 +120,7 @@ public class XXAsset extends XXDBBase implements java.io.Serializable {
* Default constructor. This will set all the attributes to default value.
*/
public XXAsset ( ) {
- activeStatus = XAConstants.STATUS_DISABLED;
+ activeStatus = RangerConstants.STATUS_DISABLED;
assetType = AppConstants.ASSET_UNKNOWN;
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/entity/XXAuditMap.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/entity/XXAuditMap.java b/security-admin/src/main/java/org/apache/ranger/entity/XXAuditMap.java
index dd14898..719d472 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXAuditMap.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXAuditMap.java
@@ -24,13 +24,16 @@
*
*/
-import java.util.*;
-
-import javax.persistence.*;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
+import javax.persistence.Column;
+import javax.persistence.Entity;
+import javax.persistence.GeneratedValue;
+import javax.persistence.GenerationType;
+import javax.persistence.Id;
+import javax.persistence.SequenceGenerator;
+import javax.persistence.Table;
+import javax.xml.bind.annotation.XmlRootElement;
+
+import org.apache.ranger.common.AppConstants;
@Entity
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/entity/XXAuthSession.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/entity/XXAuthSession.java b/security-admin/src/main/java/org/apache/ranger/entity/XXAuthSession.java
index d54ce72..f5c44ad 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXAuthSession.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXAuthSession.java
@@ -24,13 +24,22 @@
*
*/
-import java.util.*;
+import java.util.Date;
-import javax.persistence.*;
-import javax.xml.bind.annotation.*;
+import javax.persistence.Column;
+import javax.persistence.Entity;
+import javax.persistence.GeneratedValue;
+import javax.persistence.GenerationType;
+import javax.persistence.Id;
+import javax.persistence.SequenceGenerator;
+import javax.persistence.Table;
+import javax.persistence.Temporal;
+import javax.persistence.TemporalType;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
+import org.apache.ranger.common.AppConstants;
+import org.apache.ranger.common.DateUtil;
+import org.apache.ranger.common.RangerConstants;
@Entity
@@ -187,7 +196,7 @@ public class XXAuthSession extends XXDBBase implements java.io.Serializable {
*
*/
@Column(name="DEVICE_TYPE" , nullable=false )
- protected int deviceType = XAConstants.DEVICE_UNKNOWN;
+ protected int deviceType = RangerConstants.DEVICE_UNKNOWN;
/**
* IP where the request came from
@@ -216,7 +225,7 @@ public class XXAuthSession extends XXDBBase implements java.io.Serializable {
authStatus = AUTH_STATUS_UNKNOWN;
authType = AUTH_TYPE_UNKNOWN;
authProvider = AUTH_TYPE_UNKNOWN;
- deviceType = XAConstants.DEVICE_UNKNOWN;
+ deviceType = RangerConstants.DEVICE_UNKNOWN;
}
@Override
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/entity/XXCredentialStore.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/entity/XXCredentialStore.java b/security-admin/src/main/java/org/apache/ranger/entity/XXCredentialStore.java
index b300071..1b06d6e 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXCredentialStore.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXCredentialStore.java
@@ -24,13 +24,16 @@
*
*/
-import java.util.*;
-
-import javax.persistence.*;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
+import javax.persistence.Column;
+import javax.persistence.Entity;
+import javax.persistence.GeneratedValue;
+import javax.persistence.GenerationType;
+import javax.persistence.Id;
+import javax.persistence.SequenceGenerator;
+import javax.persistence.Table;
+import javax.xml.bind.annotation.XmlRootElement;
+
+import org.apache.ranger.common.AppConstants;
@Entity
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/entity/XXDBBase.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/entity/XXDBBase.java b/security-admin/src/main/java/org/apache/ranger/entity/XXDBBase.java
index 666f0f5..c5e7c9c 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXDBBase.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXDBBase.java
@@ -24,13 +24,17 @@
*
*/
-import java.util.*;
+import java.util.Date;
-import javax.persistence.*;
-import javax.xml.bind.annotation.*;
+import javax.persistence.Column;
+import javax.persistence.EntityListeners;
+import javax.persistence.MappedSuperclass;
+import javax.persistence.Temporal;
+import javax.persistence.TemporalType;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
+import org.apache.ranger.common.AppConstants;
+import org.apache.ranger.common.DateUtil;
@MappedSuperclass @EntityListeners( org.apache.ranger.common.db.JPABeanCallbacks.class)
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/entity/XXGroup.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/entity/XXGroup.java b/security-admin/src/main/java/org/apache/ranger/entity/XXGroup.java
index 1e25eb6..4224cc4 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXGroup.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXGroup.java
@@ -24,13 +24,18 @@
*
*/
-import java.util.*;
+import javax.persistence.Column;
+import javax.persistence.Entity;
+import javax.persistence.GeneratedValue;
+import javax.persistence.GenerationType;
+import javax.persistence.Id;
+import javax.persistence.SequenceGenerator;
+import javax.persistence.Table;
+import javax.xml.bind.annotation.XmlRootElement;
-import javax.persistence.*;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
+import org.apache.ranger.common.AppConstants;
+import org.apache.ranger.common.RangerCommonEnums;
+import org.apache.ranger.common.RangerConstants;
@Entity
@@ -80,7 +85,7 @@ public class XXGroup extends XXDBBase implements java.io.Serializable {
*
*/
@Column(name="STATUS" , nullable=false )
- protected int status = XAConstants.STATUS_DISABLED;
+ protected int status = RangerConstants.STATUS_DISABLED;
/**
* Type of group
@@ -93,7 +98,7 @@ public class XXGroup extends XXDBBase implements java.io.Serializable {
protected int groupType = AppConstants.XA_GROUP_UNKNOWN;
@Column(name="GROUP_SRC" , nullable=false )
- protected int groupSource = XACommonEnums.GROUP_INTERNAL;
+ protected int groupSource = RangerCommonEnums.GROUP_INTERNAL;
/**
* Id of the credential store
@@ -109,9 +114,9 @@ public class XXGroup extends XXDBBase implements java.io.Serializable {
* Default constructor. This will set all the attributes to default value.
*/
public XXGroup ( ) {
- status = XAConstants.STATUS_DISABLED;
+ status = RangerConstants.STATUS_DISABLED;
groupType = AppConstants.XA_GROUP_UNKNOWN;
- groupSource = XACommonEnums.GROUP_INTERNAL;
+ groupSource = RangerCommonEnums.GROUP_INTERNAL;
}
@Override
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/entity/XXGroupGroup.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/entity/XXGroupGroup.java b/security-admin/src/main/java/org/apache/ranger/entity/XXGroupGroup.java
index d7997cb..f4e501b 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXGroupGroup.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXGroupGroup.java
@@ -24,13 +24,16 @@
*
*/
-import java.util.*;
-
-import javax.persistence.*;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
+import javax.persistence.Column;
+import javax.persistence.Entity;
+import javax.persistence.GeneratedValue;
+import javax.persistence.GenerationType;
+import javax.persistence.Id;
+import javax.persistence.SequenceGenerator;
+import javax.persistence.Table;
+import javax.xml.bind.annotation.XmlRootElement;
+
+import org.apache.ranger.common.AppConstants;
@Entity
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/entity/XXGroupUser.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/entity/XXGroupUser.java b/security-admin/src/main/java/org/apache/ranger/entity/XXGroupUser.java
index 0c05f15..fef7caa 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXGroupUser.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXGroupUser.java
@@ -24,13 +24,16 @@
*
*/
-import java.util.*;
-
-import javax.persistence.*;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
+import javax.persistence.Column;
+import javax.persistence.Entity;
+import javax.persistence.GeneratedValue;
+import javax.persistence.GenerationType;
+import javax.persistence.Id;
+import javax.persistence.SequenceGenerator;
+import javax.persistence.Table;
+import javax.xml.bind.annotation.XmlRootElement;
+
+import org.apache.ranger.common.AppConstants;
@Entity
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/entity/XXPermMap.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/entity/XXPermMap.java b/security-admin/src/main/java/org/apache/ranger/entity/XXPermMap.java
index ecf22f7..d229f8c 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXPermMap.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXPermMap.java
@@ -24,13 +24,17 @@
*
*/
-import java.util.*;
+import javax.persistence.Column;
+import javax.persistence.Entity;
+import javax.persistence.GeneratedValue;
+import javax.persistence.GenerationType;
+import javax.persistence.Id;
+import javax.persistence.SequenceGenerator;
+import javax.persistence.Table;
+import javax.xml.bind.annotation.XmlRootElement;
-import javax.persistence.*;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
+import org.apache.ranger.common.AppConstants;
+import org.apache.ranger.common.RangerConstants;
@Entity
@@ -123,7 +127,7 @@ public class XXPermMap extends XXDBBase implements java.io.Serializable {
*
*/
@Column(name="IS_RECURSIVE" , nullable=false )
- protected int isRecursive = XAConstants.BOOL_NONE;
+ protected int isRecursive = RangerConstants.BOOL_NONE;
/**
* Is wild card
@@ -158,7 +162,7 @@ public class XXPermMap extends XXDBBase implements java.io.Serializable {
public XXPermMap ( ) {
permFor = AppConstants.XA_PERM_FOR_UNKNOWN;
permType = AppConstants.XA_PERM_TYPE_UNKNOWN;
- isRecursive = XAConstants.BOOL_NONE;
+ isRecursive = RangerConstants.BOOL_NONE;
}
@Override
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/entity/XXPolicyExportAudit.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/entity/XXPolicyExportAudit.java b/security-admin/src/main/java/org/apache/ranger/entity/XXPolicyExportAudit.java
index fe0e542..6743b6a 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXPolicyExportAudit.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXPolicyExportAudit.java
@@ -24,13 +24,20 @@
*
*/
-import java.util.*;
-
-import javax.persistence.*;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
+import java.util.Date;
+
+import javax.persistence.Column;
+import javax.persistence.Entity;
+import javax.persistence.GeneratedValue;
+import javax.persistence.GenerationType;
+import javax.persistence.Id;
+import javax.persistence.SequenceGenerator;
+import javax.persistence.Table;
+import javax.persistence.Temporal;
+import javax.persistence.TemporalType;
+import javax.xml.bind.annotation.XmlRootElement;
+
+import org.apache.ranger.common.AppConstants;
@Entity
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/entity/XXPortalUser.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/entity/XXPortalUser.java b/security-admin/src/main/java/org/apache/ranger/entity/XXPortalUser.java
index 2a2b938..71458d8 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXPortalUser.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXPortalUser.java
@@ -24,13 +24,17 @@
*
*/
-import java.util.*;
+import javax.persistence.Column;
+import javax.persistence.Entity;
+import javax.persistence.GeneratedValue;
+import javax.persistence.GenerationType;
+import javax.persistence.Id;
+import javax.persistence.SequenceGenerator;
+import javax.persistence.Table;
+import javax.xml.bind.annotation.XmlRootElement;
-import javax.persistence.*;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
+import org.apache.ranger.common.AppConstants;
+import org.apache.ranger.common.RangerConstants;
@Entity
@@ -121,7 +125,7 @@ public class XXPortalUser extends XXDBBase implements java.io.Serializable {
*
*/
@Column(name="STATUS" , nullable=false )
- protected int status = XAConstants.ACT_STATUS_DISABLED;
+ protected int status = RangerConstants.ACT_STATUS_DISABLED;
/**
* Source of the user
@@ -131,7 +135,7 @@ public class XXPortalUser extends XXDBBase implements java.io.Serializable {
*
*/
@Column(name="USER_SRC" , nullable=false )
- protected int userSource = XAConstants.USER_APP;
+ protected int userSource = RangerConstants.USER_APP;
/**
* Note
@@ -147,8 +151,8 @@ public class XXPortalUser extends XXDBBase implements java.io.Serializable {
* Default constructor. This will set all the attributes to default value.
*/
public XXPortalUser ( ) {
- status = XAConstants.ACT_STATUS_DISABLED;
- userSource = XAConstants.USER_APP;
+ status = RangerConstants.ACT_STATUS_DISABLED;
+ userSource = RangerConstants.USER_APP;
}
@Override
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/entity/XXPortalUserRole.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/entity/XXPortalUserRole.java b/security-admin/src/main/java/org/apache/ranger/entity/XXPortalUserRole.java
index b2e4d67..d0fb38d 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXPortalUserRole.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXPortalUserRole.java
@@ -24,13 +24,16 @@
*
*/
-import java.util.*;
+import javax.persistence.Column;
+import javax.persistence.Entity;
+import javax.persistence.GeneratedValue;
+import javax.persistence.GenerationType;
+import javax.persistence.Id;
+import javax.persistence.SequenceGenerator;
+import javax.persistence.Table;
+import javax.xml.bind.annotation.XmlRootElement;
-import javax.persistence.*;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
+import org.apache.ranger.common.RangerConstants;
@Entity
@@ -81,13 +84,13 @@ public class XXPortalUserRole extends XXDBBase implements java.io.Serializable {
*
*/
@Column(name="STATUS" , nullable=false )
- protected int status = XAConstants.STATUS_DISABLED;
+ protected int status = RangerConstants.STATUS_DISABLED;
/**
* Default constructor. This will set all the attributes to default value.
*/
public XXPortalUserRole ( ) {
- status = XAConstants.STATUS_DISABLED;
+ status = RangerConstants.STATUS_DISABLED;
}
/**
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/entity/XXResource.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/entity/XXResource.java b/security-admin/src/main/java/org/apache/ranger/entity/XXResource.java
index 0247ee7..c19f4df 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXResource.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXResource.java
@@ -24,13 +24,17 @@
*
*/
-import java.util.*;
+import javax.persistence.Column;
+import javax.persistence.Entity;
+import javax.persistence.GeneratedValue;
+import javax.persistence.GenerationType;
+import javax.persistence.Id;
+import javax.persistence.SequenceGenerator;
+import javax.persistence.Table;
+import javax.xml.bind.annotation.XmlRootElement;
-import javax.persistence.*;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
+import org.apache.ranger.common.AppConstants;
+import org.apache.ranger.common.RangerConstants;
@Entity
@@ -123,7 +127,7 @@ public class XXResource extends XXDBBase implements java.io.Serializable {
*
*/
@Column(name="IS_ENCRYPT" , nullable=false )
- protected int isEncrypt = XAConstants.BOOL_FALSE;
+ protected int isEncrypt = RangerConstants.BOOL_FALSE;
/**
* Is recursive
@@ -133,7 +137,7 @@ public class XXResource extends XXDBBase implements java.io.Serializable {
*
*/
@Column(name="IS_RECURSIVE" , nullable=false )
- protected int isRecursive = XAConstants.BOOL_NONE;
+ protected int isRecursive = RangerConstants.BOOL_NONE;
/**
* Group to which this resource belongs to
@@ -203,7 +207,7 @@ public class XXResource extends XXDBBase implements java.io.Serializable {
*
*/
@Column(name="RES_STATUS" , nullable=false )
- protected int resourceStatus = XAConstants.STATUS_ENABLED;
+ protected int resourceStatus = RangerConstants.STATUS_ENABLED;
/**
* Table Type
@@ -248,9 +252,9 @@ public class XXResource extends XXDBBase implements java.io.Serializable {
*/
public XXResource ( ) {
resourceType = AppConstants.RESOURCE_PATH;
- isEncrypt = XAConstants.BOOL_FALSE;
- isRecursive = XAConstants.BOOL_NONE;
- resourceStatus = XAConstants.STATUS_ENABLED;
+ isEncrypt = RangerConstants.BOOL_FALSE;
+ isRecursive = RangerConstants.BOOL_NONE;
+ resourceStatus = RangerConstants.STATUS_ENABLED;
tableType = AppConstants.POLICY_INCLUSION;
columnType = AppConstants.POLICY_INCLUSION;
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/entity/XXTrxLog.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/entity/XXTrxLog.java b/security-admin/src/main/java/org/apache/ranger/entity/XXTrxLog.java
index 731cf6a..117ab54 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXTrxLog.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXTrxLog.java
@@ -24,13 +24,17 @@
*
*/
-import java.util.*;
+import javax.persistence.Column;
+import javax.persistence.Entity;
+import javax.persistence.GeneratedValue;
+import javax.persistence.GenerationType;
+import javax.persistence.Id;
+import javax.persistence.SequenceGenerator;
+import javax.persistence.Table;
+import javax.xml.bind.annotation.XmlRootElement;
-import javax.persistence.*;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
+import org.apache.ranger.common.AppConstants;
+import org.apache.ranger.common.RangerConstants;
@Entity
@@ -60,7 +64,7 @@ public class XXTrxLog extends XXDBBase implements java.io.Serializable {
*
*/
@Column(name="CLASS_TYPE" , nullable=false )
- protected int objectClassType = XAConstants.CLASS_TYPE_NONE;
+ protected int objectClassType = RangerConstants.CLASS_TYPE_NONE;
/**
* Id of the object to which this notes refers to
@@ -191,7 +195,7 @@ public class XXTrxLog extends XXDBBase implements java.io.Serializable {
* Default constructor. This will set all the attributes to default value.
*/
public XXTrxLog ( ) {
- objectClassType = XAConstants.CLASS_TYPE_NONE;
+ objectClassType = RangerConstants.CLASS_TYPE_NONE;
}
@Override
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/entity/XXUser.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/entity/XXUser.java b/security-admin/src/main/java/org/apache/ranger/entity/XXUser.java
index 91bad2e..af339d2 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/XXUser.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/XXUser.java
@@ -24,13 +24,17 @@
*
*/
-import java.util.*;
+import javax.persistence.Column;
+import javax.persistence.Entity;
+import javax.persistence.GeneratedValue;
+import javax.persistence.GenerationType;
+import javax.persistence.Id;
+import javax.persistence.SequenceGenerator;
+import javax.persistence.Table;
+import javax.xml.bind.annotation.XmlRootElement;
-import javax.persistence.*;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
+import org.apache.ranger.common.AppConstants;
+import org.apache.ranger.common.RangerConstants;
@Entity
@@ -81,7 +85,7 @@ public class XXUser extends XXDBBase implements java.io.Serializable {
*
*/
@Column(name="STATUS" , nullable=false )
- protected int status = XAConstants.STATUS_DISABLED;
+ protected int status = RangerConstants.STATUS_DISABLED;
/**
* Id of the credential store
@@ -97,7 +101,7 @@ public class XXUser extends XXDBBase implements java.io.Serializable {
* Default constructor. This will set all the attributes to default value.
*/
public XXUser ( ) {
- status = XAConstants.STATUS_DISABLED;
+ status = RangerConstants.STATUS_DISABLED;
}
@Override
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/entity/view/VXXTrxLog.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/entity/view/VXXTrxLog.java b/security-admin/src/main/java/org/apache/ranger/entity/view/VXXTrxLog.java
index 37cc62d..c38efad 100644
--- a/security-admin/src/main/java/org/apache/ranger/entity/view/VXXTrxLog.java
+++ b/security-admin/src/main/java/org/apache/ranger/entity/view/VXXTrxLog.java
@@ -22,11 +22,19 @@
import java.util.Date;
-import javax.persistence.*;
-import javax.xml.bind.annotation.*;
+import javax.persistence.Column;
+import javax.persistence.Entity;
+import javax.persistence.GeneratedValue;
+import javax.persistence.GenerationType;
+import javax.persistence.Id;
+import javax.persistence.SequenceGenerator;
+import javax.persistence.Table;
+import javax.persistence.Temporal;
+import javax.persistence.TemporalType;
+import javax.xml.bind.annotation.XmlRootElement;
import org.apache.ranger.common.DateUtil;
-import org.apache.ranger.common.XAConstants;
+import org.apache.ranger.common.RangerConstants;
@Entity
@Table(name="vx_trx_log")
@@ -58,7 +66,7 @@ public class VXXTrxLog implements java.io.Serializable {
protected Long updatedByUserId;
@Column(name="CLASS_TYPE" , nullable=false )
- protected int objectClassType = XAConstants.CLASS_TYPE_NONE;
+ protected int objectClassType = RangerConstants.CLASS_TYPE_NONE;
@Column(name="OBJECT_ID" )
protected Long objectId;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/patch/BaseLoader.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/patch/BaseLoader.java b/security-admin/src/main/java/org/apache/ranger/patch/BaseLoader.java
index f18cff9..61b46af 100644
--- a/security-admin/src/main/java/org/apache/ranger/patch/BaseLoader.java
+++ b/security-admin/src/main/java/org/apache/ranger/patch/BaseLoader.java
@@ -23,7 +23,6 @@
package org.apache.ranger.patch;
import java.text.DecimalFormat;
-import java.util.Date;
import org.apache.log4j.Logger;
import org.apache.ranger.common.DateUtil;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/patch/PatchPasswordEncryption_J10001.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/patch/PatchPasswordEncryption_J10001.java b/security-admin/src/main/java/org/apache/ranger/patch/PatchPasswordEncryption_J10001.java
index 08ace6c..832e963 100644
--- a/security-admin/src/main/java/org/apache/ranger/patch/PatchPasswordEncryption_J10001.java
+++ b/security-admin/src/main/java/org/apache/ranger/patch/PatchPasswordEncryption_J10001.java
@@ -20,7 +20,7 @@ import java.util.List;
import org.apache.log4j.Logger;
import org.apache.ranger.common.StringUtil;
-import org.apache.ranger.db.XADaoManager;
+import org.apache.ranger.db.RangerDaoManager;
import org.apache.ranger.entity.XXAsset;
import org.apache.ranger.service.XAssetService;
import org.apache.ranger.util.CLIUtil;
@@ -33,7 +33,7 @@ public class PatchPasswordEncryption_J10001 extends BaseLoader {
int lineCount = 0;
@Autowired
- XADaoManager xaDaoManager;
+ RangerDaoManager xaDaoManager;
@Autowired
StringUtil stringUtil;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/rest/AssetREST.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/rest/AssetREST.java b/security-admin/src/main/java/org/apache/ranger/rest/AssetREST.java
index ca373e6..27c3119 100644
--- a/security-admin/src/main/java/org/apache/ranger/rest/AssetREST.java
+++ b/security-admin/src/main/java/org/apache/ranger/rest/AssetREST.java
@@ -23,7 +23,6 @@ import java.io.File;
import java.security.cert.X509Certificate;
import java.util.ArrayList;
import java.util.Collection;
-import java.util.List;
import javax.servlet.http.HttpServletRequest;
import javax.ws.rs.DELETE;
@@ -40,15 +39,15 @@ import javax.ws.rs.core.Response;
import org.apache.log4j.Logger;
import org.apache.ranger.biz.AssetMgr;
-import org.apache.ranger.biz.XABizUtil;
+import org.apache.ranger.biz.RangerBizUtil;
import org.apache.ranger.common.PropertiesUtil;
import org.apache.ranger.common.RESTErrorUtil;
+import org.apache.ranger.common.RangerCommonEnums;
+import org.apache.ranger.common.RangerSearchUtil;
import org.apache.ranger.common.SearchCriteria;
import org.apache.ranger.common.StringUtil;
-import org.apache.ranger.common.XACommonEnums;
-import org.apache.ranger.common.XASearchUtil;
-import org.apache.ranger.common.annotation.XAAnnotationClassName;
-import org.apache.ranger.common.annotation.XAAnnotationJSMgrName;
+import org.apache.ranger.common.annotation.RangerAnnotationClassName;
+import org.apache.ranger.common.annotation.RangerAnnotationJSMgrName;
import org.apache.ranger.service.AbstractBaseResourceService;
import org.apache.ranger.service.XAccessAuditService;
import org.apache.ranger.service.XAgentService;
@@ -64,13 +63,11 @@ import org.apache.ranger.view.VXAssetList;
import org.apache.ranger.view.VXCredentialStore;
import org.apache.ranger.view.VXCredentialStoreList;
import org.apache.ranger.view.VXLong;
-import org.apache.ranger.view.VXPermMap;
import org.apache.ranger.view.VXPolicy;
import org.apache.ranger.view.VXPolicyExportAuditList;
import org.apache.ranger.view.VXResource;
import org.apache.ranger.view.VXResourceList;
import org.apache.ranger.view.VXResponse;
-import org.apache.ranger.view.VXString;
import org.apache.ranger.view.VXStringList;
import org.apache.ranger.view.VXTrxLogList;
import org.springframework.beans.factory.annotation.Autowired;
@@ -83,13 +80,13 @@ import org.springframework.transaction.annotation.Transactional;
@Path("assets")
@Component
@Scope("request")
-@XAAnnotationJSMgrName("AssetMgr")
+@RangerAnnotationJSMgrName("AssetMgr")
@Transactional(propagation = Propagation.REQUIRES_NEW)
public class AssetREST {
static Logger logger = Logger.getLogger(AssetREST.class);
@Autowired
- XASearchUtil searchUtil;
+ RangerSearchUtil searchUtil;
@Autowired
AssetMgr assetMgr;
@@ -119,7 +116,7 @@ public class AssetREST {
XTrxLogService xTrxLogService;
@Autowired
- XABizUtil msBizUtil;
+ RangerBizUtil msBizUtil;
@Autowired
XAccessAuditService xAccessAuditService;
@@ -148,7 +145,7 @@ public class AssetREST {
@DELETE
@Path("/assets/{id}")
@PreAuthorize("hasRole('ROLE_SYS_ADMIN')")
- @XAAnnotationClassName(class_name = VXAsset.class)
+ @RangerAnnotationClassName(class_name = VXAsset.class)
public void deleteXAsset(@PathParam("id") Long id,
@Context HttpServletRequest request) {
boolean force = true;
@@ -177,8 +174,8 @@ public class AssetREST {
Object status = searchCriteria.getParamValue("status");
if (status == null || ((Collection) status).size() == 0) {
ArrayList<Integer> valueList = new ArrayList<Integer>();
- valueList.add(XACommonEnums.STATUS_DISABLED);
- valueList.add(XACommonEnums.STATUS_ENABLED);
+ valueList.add(RangerCommonEnums.STATUS_DISABLED);
+ valueList.add(RangerCommonEnums.STATUS_ENABLED);
searchCriteria.addParam("status", valueList);
}
return assetMgr.searchXAssets(searchCriteria);
@@ -196,8 +193,8 @@ public class AssetREST {
Object status = searchCriteria.getParamValue("status");
if (status == null || ((Collection) status).size() == 0) {
ArrayList<Integer> valueList = new ArrayList<Integer>();
- valueList.add(XACommonEnums.STATUS_DISABLED);
- valueList.add(XACommonEnums.STATUS_ENABLED);
+ valueList.add(RangerCommonEnums.STATUS_DISABLED);
+ valueList.add(RangerCommonEnums.STATUS_ENABLED);
searchCriteria.addParam("status", valueList);
}
return assetMgr.getXAssetSearchCount(searchCriteria);
@@ -229,7 +226,7 @@ public class AssetREST {
@DELETE
@Path("/resources/{id}")
@PreAuthorize("hasRole('ROLE_SYS_ADMIN')")
- @XAAnnotationClassName(class_name = VXResource.class)
+ @RangerAnnotationClassName(class_name = VXResource.class)
public void deleteXResource(@PathParam("id") Long id,
@Context HttpServletRequest request) {
boolean force = false;
@@ -425,7 +422,7 @@ public class AssetREST {
@DELETE
@Path("/credstores/{id}")
@PreAuthorize("hasRole('ROLE_SYS_ADMIN')")
- @XAAnnotationClassName(class_name = VXCredentialStore.class)
+ @RangerAnnotationClassName(class_name = VXCredentialStore.class)
public void deleteXCredentialStore(@PathParam("id") Long id,
@Context HttpServletRequest request) {
boolean force = false;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/rest/PublicAPIs.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/rest/PublicAPIs.java b/security-admin/src/main/java/org/apache/ranger/rest/PublicAPIs.java
index e5d9254..0a62f8e 100644
--- a/security-admin/src/main/java/org/apache/ranger/rest/PublicAPIs.java
+++ b/security-admin/src/main/java/org/apache/ranger/rest/PublicAPIs.java
@@ -37,14 +37,14 @@ import org.apache.ranger.biz.AssetMgr;
import org.apache.ranger.common.AppConstants;
import org.apache.ranger.common.MessageEnums;
import org.apache.ranger.common.RESTErrorUtil;
+import org.apache.ranger.common.RangerCommonEnums;
+import org.apache.ranger.common.RangerConstants;
+import org.apache.ranger.common.RangerSearchUtil;
import org.apache.ranger.common.SearchCriteria;
import org.apache.ranger.common.StringUtil;
-import org.apache.ranger.common.XACommonEnums;
-import org.apache.ranger.common.XAConstants;
-import org.apache.ranger.common.XASearchUtil;
-import org.apache.ranger.common.annotation.XAAnnotationClassName;
-import org.apache.ranger.common.annotation.XAAnnotationJSMgrName;
-import org.apache.ranger.db.XADaoManager;
+import org.apache.ranger.common.annotation.RangerAnnotationClassName;
+import org.apache.ranger.common.annotation.RangerAnnotationJSMgrName;
+import org.apache.ranger.db.RangerDaoManager;
import org.apache.ranger.service.AbstractBaseResourceService;
import org.apache.ranger.service.XAssetService;
import org.apache.ranger.service.XPolicyService;
@@ -70,13 +70,13 @@ import org.springframework.transaction.annotation.Transactional;
@Path("public")
@Component
@Scope("request")
-@XAAnnotationJSMgrName("PublicMgr")
+@RangerAnnotationJSMgrName("PublicMgr")
@Transactional(propagation = Propagation.REQUIRES_NEW)
public class PublicAPIs {
static Logger logger = Logger.getLogger(PublicAPIs.class);
@Autowired
- XASearchUtil searchUtil;
+ RangerSearchUtil searchUtil;
@Autowired
AssetMgr assetMgr;
@@ -100,7 +100,7 @@ public class PublicAPIs {
StringUtil stringUtil;
@Autowired
- XADaoManager xaDaoMgr;
+ RangerDaoManager xaDaoMgr;
@GET
@Path("/api/repository/{id}")
@@ -133,7 +133,7 @@ public class PublicAPIs {
@DELETE
@Path("/api/repository/{id}")
@PreAuthorize("hasRole('ROLE_SYS_ADMIN')")
- @XAAnnotationClassName(class_name = VXAsset.class)
+ @RangerAnnotationClassName(class_name = VXAsset.class)
public void deleteRepository(@PathParam("id") Long id,
@Context HttpServletRequest request) {
@@ -182,8 +182,8 @@ public class PublicAPIs {
request, xAssetService.sortFields);
ArrayList<Integer> valueList = new ArrayList<Integer>();
- valueList.add(XAConstants.STATUS_DISABLED);
- valueList.add(XAConstants.STATUS_ENABLED);
+ valueList.add(RangerConstants.STATUS_DISABLED);
+ valueList.add(RangerConstants.STATUS_ENABLED);
searchCriteria.addParam("status", valueList);
return assetMgr.getXAssetSearchCount(searchCriteria);
@@ -224,7 +224,7 @@ public class PublicAPIs {
@DELETE
@Path("/api/policy/{id}")
@PreAuthorize("hasRole('ROLE_SYS_ADMIN')")
- @XAAnnotationClassName(class_name = VXResource.class)
+ @RangerAnnotationClassName(class_name = VXResource.class)
public void deletePolicy(@PathParam("id") Long id,
@Context HttpServletRequest request) {
String forceStr = request.getParameter("force");
@@ -272,8 +272,8 @@ public class PublicAPIs {
boolean isRecursiveBool = restErrorUtil.parseBoolean(isRec,
"Invalid value for " + "isRecursive",
MessageEnums.INVALID_INPUT_DATA, null, "isRecursive");
- int isRecursive = (isRecursiveBool == true) ? XAConstants.BOOL_TRUE
- : XAConstants.BOOL_FALSE;
+ int isRecursive = (isRecursiveBool == true) ? RangerConstants.BOOL_TRUE
+ : RangerConstants.BOOL_FALSE;
searchCriteria.getParamList().put("isRecursive", isRecursive);
}
@@ -285,14 +285,14 @@ public class PublicAPIs {
String resStatus = request.getParameter("isEnabled");
List<Integer> resList = new ArrayList<Integer>();
if (stringUtil.isEmpty(resStatus)) {
- resList.add(XACommonEnums.STATUS_ENABLED);
- resList.add(XACommonEnums.STATUS_DISABLED);
+ resList.add(RangerCommonEnums.STATUS_ENABLED);
+ resList.add(RangerCommonEnums.STATUS_DISABLED);
} else {
boolean policyStatus = restErrorUtil.parseBoolean(resStatus,
"Invalid value for " + "isEnabled",
MessageEnums.INVALID_INPUT_DATA, null, "isEnabled");
- int policyStat = (policyStatus) ? XACommonEnums.STATUS_ENABLED
- : XACommonEnums.STATUS_DISABLED;
+ int policyStat = (policyStatus) ? RangerCommonEnums.STATUS_ENABLED
+ : RangerCommonEnums.STATUS_DISABLED;
resList.add(policyStat);
}
searchCriteria.getParamList().put("resourceStatus", resList);
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/rest/UserREST.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/rest/UserREST.java b/security-admin/src/main/java/org/apache/ranger/rest/UserREST.java
index 16c401f..0bcba7d 100644
--- a/security-admin/src/main/java/org/apache/ranger/rest/UserREST.java
+++ b/security-admin/src/main/java/org/apache/ranger/rest/UserREST.java
@@ -34,17 +34,17 @@ import org.apache.log4j.Logger;
import org.apache.ranger.biz.UserMgr;
import org.apache.ranger.common.MessageEnums;
import org.apache.ranger.common.RESTErrorUtil;
+import org.apache.ranger.common.RangerConfigUtil;
+import org.apache.ranger.common.RangerConstants;
import org.apache.ranger.common.SearchCriteria;
import org.apache.ranger.common.SearchUtil;
import org.apache.ranger.common.StringUtil;
-import org.apache.ranger.common.XAConfigUtil;
-import org.apache.ranger.common.XAConstants;
-import org.apache.ranger.common.annotation.XAAnnotationClassName;
-import org.apache.ranger.common.annotation.XAAnnotationJSMgrName;
-import org.apache.ranger.common.annotation.XAAnnotationRestAPI;
-import org.apache.ranger.db.XADaoManager;
+import org.apache.ranger.common.annotation.RangerAnnotationClassName;
+import org.apache.ranger.common.annotation.RangerAnnotationJSMgrName;
+import org.apache.ranger.common.annotation.RangerAnnotationRestAPI;
+import org.apache.ranger.db.RangerDaoManager;
import org.apache.ranger.entity.XXPortalUser;
-import org.apache.ranger.util.XARestUtil;
+import org.apache.ranger.util.RangerRestUtil;
import org.apache.ranger.view.VXPasswordChange;
import org.apache.ranger.view.VXPortalUser;
import org.apache.ranger.view.VXPortalUserList;
@@ -61,7 +61,7 @@ import org.springframework.transaction.annotation.Transactional;
@Path("users")
@Component
@Scope("request")
-@XAAnnotationJSMgrName("UserMgr")
+@RangerAnnotationJSMgrName("UserMgr")
@Transactional(propagation = Propagation.REQUIRES_NEW)
public class UserREST {
static Logger logger = Logger.getLogger(UserREST.class);
@@ -70,10 +70,10 @@ public class UserREST {
StringUtil stringUtil;
@Autowired
- XADaoManager daoManager;
+ RangerDaoManager daoManager;
@Autowired
- XAConfigUtil configUtil;
+ RangerConfigUtil configUtil;
@Autowired
RESTErrorUtil restErrorUtil;
@@ -85,7 +85,7 @@ public class UserREST {
UserMgr userManager;
@Autowired
- XARestUtil msRestUtil;
+ RangerRestUtil msRestUtil;
/**
* Implements the traditional search functionalities for UserProfile
@@ -125,7 +125,7 @@ public class UserREST {
// status
searchUtil.extractEnum(request, searchCriteria, "status", "Status",
- "statusList", XAConstants.ActivationStatus_MAX);
+ "statusList", RangerConstants.ActivationStatus_MAX);
// publicScreenName
searchUtil.extractString(request, searchCriteria, "publicScreenName",
@@ -191,7 +191,7 @@ public class UserREST {
@PUT
@Consumes({ "application/json", "application/xml" })
@Produces({ "application/xml", "application/json" })
- @XAAnnotationRestAPI(updates_classes = "VUserProfile")
+ @RangerAnnotationRestAPI(updates_classes = "VUserProfile")
public VXPortalUser update(VXPortalUser userProfile,
@Context HttpServletRequest servletRequest) {
logger.info("update:" + userProfile.getEmailAddress());
@@ -232,7 +232,7 @@ public class UserREST {
@Path("{userId}/deactivate")
@Produces({ "application/xml", "application/json" })
@PreAuthorize("hasRole('ROLE_SYS_ADMIN')")
- @XAAnnotationClassName(class_name = VXPortalUser.class)
+ @RangerAnnotationClassName(class_name = VXPortalUser.class)
public VXPortalUser deactivateUser(@PathParam("userId") Long userId) {
XXPortalUser gjUser = daoManager.getXXPortalUser().getById(userId);
if (gjUser == null) {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/rest/XAuditREST.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/rest/XAuditREST.java b/security-admin/src/main/java/org/apache/ranger/rest/XAuditREST.java
index 124bc43..531f395 100644
--- a/security-admin/src/main/java/org/apache/ranger/rest/XAuditREST.java
+++ b/security-admin/src/main/java/org/apache/ranger/rest/XAuditREST.java
@@ -20,18 +20,27 @@
package org.apache.ranger.rest;
import javax.servlet.http.HttpServletRequest;
-import javax.ws.rs.*;
-import javax.ws.rs.core.*;
+import javax.ws.rs.DELETE;
+import javax.ws.rs.GET;
+import javax.ws.rs.POST;
+import javax.ws.rs.PUT;
+import javax.ws.rs.Path;
+import javax.ws.rs.PathParam;
+import javax.ws.rs.Produces;
+import javax.ws.rs.core.Context;
import org.apache.log4j.Logger;
-import org.apache.ranger.biz.*;
+import org.apache.ranger.biz.XAuditMgr;
import org.apache.ranger.common.SearchCriteria;
import org.apache.ranger.common.SearchUtil;
-import org.apache.ranger.common.annotation.XAAnnotationClassName;
-import org.apache.ranger.common.annotation.XAAnnotationJSMgrName;
-import org.apache.ranger.rest.*;
-import org.apache.ranger.service.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.annotation.RangerAnnotationClassName;
+import org.apache.ranger.common.annotation.RangerAnnotationJSMgrName;
+import org.apache.ranger.service.XAccessAuditService;
+import org.apache.ranger.service.XTrxLogService;
+import org.apache.ranger.view.VXAccessAuditList;
+import org.apache.ranger.view.VXLong;
+import org.apache.ranger.view.VXTrxLog;
+import org.apache.ranger.view.VXTrxLogList;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.context.annotation.Scope;
import org.springframework.security.access.prepost.PreAuthorize;
@@ -42,7 +51,7 @@ import org.springframework.transaction.annotation.Transactional;
@Path("xaudit")
@Component
@Scope("request")
-@XAAnnotationJSMgrName("XAuditMgr")
+@RangerAnnotationJSMgrName("XAuditMgr")
@Transactional(propagation = Propagation.REQUIRES_NEW)
public class XAuditREST {
static Logger logger = Logger.getLogger(XAuditREST.class);
@@ -84,7 +93,7 @@ public class XAuditREST {
@DELETE
@Path("/trx_log/{id}")
@PreAuthorize("hasRole('ROLE_SYS_ADMIN')")
- @XAAnnotationClassName(class_name = VXTrxLog.class)
+ @RangerAnnotationClassName(class_name = VXTrxLog.class)
public void deleteXTrxLog(@PathParam("id") Long id,
@Context HttpServletRequest request) {
boolean force = false;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/rest/XUserREST.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/rest/XUserREST.java b/security-admin/src/main/java/org/apache/ranger/rest/XUserREST.java
index 7d8b3a7..5e6243e 100644
--- a/security-admin/src/main/java/org/apache/ranger/rest/XUserREST.java
+++ b/security-admin/src/main/java/org/apache/ranger/rest/XUserREST.java
@@ -20,24 +20,47 @@
package org.apache.ranger.rest;
import javax.servlet.http.HttpServletRequest;
-import javax.ws.rs.*;
-import javax.ws.rs.core.*;
+import javax.ws.rs.DELETE;
+import javax.ws.rs.GET;
+import javax.ws.rs.POST;
+import javax.ws.rs.PUT;
+import javax.ws.rs.Path;
+import javax.ws.rs.PathParam;
+import javax.ws.rs.Produces;
+import javax.ws.rs.core.Context;
import org.apache.log4j.Logger;
-import org.apache.ranger.biz.*;
-import org.apache.ranger.common.DateUtil;
+import org.apache.ranger.biz.SessionMgr;
+import org.apache.ranger.biz.XUserMgr;
import org.apache.ranger.common.RESTErrorUtil;
import org.apache.ranger.common.SearchCriteria;
-import org.apache.ranger.common.SearchField;
import org.apache.ranger.common.SearchUtil;
import org.apache.ranger.common.StringUtil;
-import org.apache.ranger.common.XAConstants;
-import org.apache.ranger.common.annotation.XAAnnotationClassName;
-import org.apache.ranger.common.annotation.XAAnnotationJSMgrName;
-import org.apache.ranger.db.XADaoManager;
-import org.apache.ranger.entity.XXAuthSession;
-import org.apache.ranger.service.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.annotation.RangerAnnotationClassName;
+import org.apache.ranger.common.annotation.RangerAnnotationJSMgrName;
+import org.apache.ranger.db.RangerDaoManager;
+import org.apache.ranger.service.AuthSessionService;
+import org.apache.ranger.service.XAuditMapService;
+import org.apache.ranger.service.XGroupGroupService;
+import org.apache.ranger.service.XGroupService;
+import org.apache.ranger.service.XGroupUserService;
+import org.apache.ranger.service.XPermMapService;
+import org.apache.ranger.service.XUserService;
+import org.apache.ranger.view.VXAuditMap;
+import org.apache.ranger.view.VXAuditMapList;
+import org.apache.ranger.view.VXAuthSession;
+import org.apache.ranger.view.VXAuthSessionList;
+import org.apache.ranger.view.VXGroup;
+import org.apache.ranger.view.VXGroupGroup;
+import org.apache.ranger.view.VXGroupGroupList;
+import org.apache.ranger.view.VXGroupList;
+import org.apache.ranger.view.VXGroupUser;
+import org.apache.ranger.view.VXGroupUserList;
+import org.apache.ranger.view.VXLong;
+import org.apache.ranger.view.VXPermMap;
+import org.apache.ranger.view.VXPermMapList;
+import org.apache.ranger.view.VXUser;
+import org.apache.ranger.view.VXUserList;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.context.annotation.Scope;
import org.springframework.security.access.prepost.PreAuthorize;
@@ -48,7 +71,7 @@ import org.springframework.transaction.annotation.Transactional;
@Path("xusers")
@Component
@Scope("request")
-@XAAnnotationJSMgrName("XUserMgr")
+@RangerAnnotationJSMgrName("XUserMgr")
@Transactional(propagation = Propagation.REQUIRES_NEW)
public class XUserREST {
static Logger logger = Logger.getLogger(XUserREST.class);
@@ -81,7 +104,7 @@ public class XUserREST {
RESTErrorUtil restErrorUtil;
@Autowired
- XADaoManager xADaoManager;
+ RangerDaoManager rangerDaoManager;
@Autowired
SessionMgr sessionMgr;
@@ -136,7 +159,7 @@ public class XUserREST {
@DELETE
@Path("/groups/{id}")
@PreAuthorize("hasRole('ROLE_SYS_ADMIN')")
- @XAAnnotationClassName(class_name = VXGroup.class)
+ @RangerAnnotationClassName(class_name = VXGroup.class)
public void deleteXGroup(@PathParam("id") Long id,
@Context HttpServletRequest request) {
boolean force = true;
@@ -218,7 +241,7 @@ public class XUserREST {
@DELETE
@Path("/users/{id}")
@PreAuthorize("hasRole('ROLE_SYS_ADMIN')")
- @XAAnnotationClassName(class_name = VXUser.class)
+ @RangerAnnotationClassName(class_name = VXUser.class)
public void deleteXUser(@PathParam("id") Long id,
@Context HttpServletRequest request) {
boolean force = true;
@@ -283,7 +306,7 @@ public class XUserREST {
@DELETE
@Path("/groupusers/{id}")
@PreAuthorize("hasRole('ROLE_SYS_ADMIN')")
- @XAAnnotationClassName(class_name = VXGroupUser.class)
+ @RangerAnnotationClassName(class_name = VXGroupUser.class)
public void deleteXGroupUser(@PathParam("id") Long id,
@Context HttpServletRequest request) {
boolean force = true;
@@ -340,7 +363,7 @@ public class XUserREST {
@DELETE
@Path("/groupgroups/{id}")
@PreAuthorize("hasRole('ROLE_SYS_ADMIN')")
- @XAAnnotationClassName(class_name = VXGroupGroup.class)
+ @RangerAnnotationClassName(class_name = VXGroupGroup.class)
public void deleteXGroupGroup(@PathParam("id") Long id,
@Context HttpServletRequest request) {
boolean force = false;
@@ -398,7 +421,7 @@ public class XUserREST {
@DELETE
@Path("/permmaps/{id}")
@PreAuthorize("hasRole('ROLE_SYS_ADMIN')")
- @XAAnnotationClassName(class_name = VXPermMap.class)
+ @RangerAnnotationClassName(class_name = VXPermMap.class)
public void deleteXPermMap(@PathParam("id") Long id,
@Context HttpServletRequest request) {
boolean force = false;
@@ -455,7 +478,7 @@ public class XUserREST {
@DELETE
@Path("/auditmaps/{id}")
@PreAuthorize("hasRole('ROLE_SYS_ADMIN')")
- @XAAnnotationClassName(class_name = VXAuditMap.class)
+ @RangerAnnotationClassName(class_name = VXAuditMap.class)
public void deleteXAuditMap(@PathParam("id") Long id,
@Context HttpServletRequest request) {
boolean force = false;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/security/context/RangerContextHolder.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/security/context/RangerContextHolder.java b/security-admin/src/main/java/org/apache/ranger/security/context/RangerContextHolder.java
new file mode 100644
index 0000000..a0969af
--- /dev/null
+++ b/security-admin/src/main/java/org/apache/ranger/security/context/RangerContextHolder.java
@@ -0,0 +1,45 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+ /**
+ *
+ */
+package org.apache.ranger.security.context;
+
+public class RangerContextHolder {
+
+ private static final ThreadLocal<RangerSecurityContext> securityContextThreadLocal = new ThreadLocal<RangerSecurityContext>();
+
+ private RangerContextHolder() {
+
+ }
+
+ public static RangerSecurityContext getSecurityContext(){
+ return securityContextThreadLocal.get();
+ }
+
+ public static void setSecurityContext(RangerSecurityContext context){
+ securityContextThreadLocal.set(context);
+ }
+
+ public static void resetSecurityContext(){
+ securityContextThreadLocal.remove();
+ }
+
+}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/security/context/RangerSecurityContext.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/security/context/RangerSecurityContext.java b/security-admin/src/main/java/org/apache/ranger/security/context/RangerSecurityContext.java
new file mode 100644
index 0000000..b654c32
--- /dev/null
+++ b/security-admin/src/main/java/org/apache/ranger/security/context/RangerSecurityContext.java
@@ -0,0 +1,58 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+ /**
+ *
+ */
+package org.apache.ranger.security.context;
+
+import java.io.Serializable;
+
+import org.apache.ranger.common.RequestContext;
+import org.apache.ranger.common.UserSessionBase;
+
+public class RangerSecurityContext implements Serializable{
+ private static final long serialVersionUID = 1L;
+ private UserSessionBase userSession;
+ private RequestContext requestContext;
+
+ public UserSessionBase getUserSession() {
+ return userSession;
+ }
+
+ public void setUserSession(UserSessionBase userSession) {
+ this.userSession = userSession;
+ }
+
+ /**
+ * @return the requestContext
+ */
+ public RequestContext getRequestContext() {
+ return requestContext;
+ }
+
+ /**
+ * @param requestContext the requestContext to set
+ */
+ public void setRequestContext(RequestContext requestContext) {
+ this.requestContext = requestContext;
+ }
+
+
+}
[11/12] incubator-ranger git commit: RANGER-194: Rename classes under
web-admin project
Posted by ma...@apache.org.
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/biz/RangerBizUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/biz/RangerBizUtil.java b/security-admin/src/main/java/org/apache/ranger/biz/RangerBizUtil.java
new file mode 100644
index 0000000..b8659aa
--- /dev/null
+++ b/security-admin/src/main/java/org/apache/ranger/biz/RangerBizUtil.java
@@ -0,0 +1,1311 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+ package org.apache.ranger.biz;
+
+import java.io.File;
+import java.util.ArrayList;
+import java.util.Arrays;
+import java.util.HashMap;
+import java.util.HashSet;
+import java.util.List;
+import java.util.Map;
+import java.util.Random;
+import java.util.Set;
+
+import org.apache.commons.io.FilenameUtils;
+import org.apache.commons.io.IOCase;
+import org.apache.log4j.Logger;
+import org.apache.ranger.common.AppConstants;
+import org.apache.ranger.common.ContextUtil;
+import org.apache.ranger.common.GUIDUtil;
+import org.apache.ranger.common.PropertiesUtil;
+import org.apache.ranger.common.RESTErrorUtil;
+import org.apache.ranger.common.RangerCommonEnums;
+import org.apache.ranger.common.RangerConstants;
+import org.apache.ranger.common.StringUtil;
+import org.apache.ranger.common.UserSessionBase;
+import org.apache.ranger.common.db.BaseDao;
+import org.apache.ranger.db.RangerDaoManager;
+import org.apache.ranger.entity.XXAsset;
+import org.apache.ranger.entity.XXDBBase;
+import org.apache.ranger.entity.XXGroup;
+import org.apache.ranger.entity.XXPermMap;
+import org.apache.ranger.entity.XXPortalUser;
+import org.apache.ranger.entity.XXResource;
+import org.apache.ranger.entity.XXTrxLog;
+import org.apache.ranger.entity.XXUser;
+import org.apache.ranger.service.AbstractBaseResourceService;
+import org.apache.ranger.view.VXDataObject;
+import org.apache.ranger.view.VXPortalUser;
+import org.apache.ranger.view.VXResource;
+import org.apache.ranger.view.VXResponse;
+import org.apache.ranger.view.VXString;
+import org.apache.ranger.view.VXStringList;
+import org.springframework.beans.factory.annotation.Autowired;
+import org.springframework.stereotype.Component;
+
+@Component
+public class RangerBizUtil {
+ static final Logger logger = Logger.getLogger(RangerBizUtil.class);
+
+ @Autowired
+ RESTErrorUtil restErrorUtil;
+
+ @Autowired
+ RangerDaoManager daoManager;
+
+ @Autowired
+ StringUtil stringUtil;
+
+ @Autowired
+ UserMgr userMgr;
+
+ Set<Class<?>> groupEditableClasses;
+ private Class<?>[] groupEditableClassesList = {};
+
+ Map<String, Integer> classTypeMappings = new HashMap<String, Integer>();
+ private int maxFirstNameLength;
+ int maxDisplayNameLength = 150;
+ boolean defaultAutoApprove = true;
+ boolean showBlockedContent = true;
+ public final String EMPTY_CONTENT_DISPLAY_NAME = "...";
+ boolean enableResourceAccessControl;
+ private Random random;
+ private static final String PATH_CHARS = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrst0123456789-_.";
+ private static char[] PATH_CHAR_SET = PATH_CHARS.toCharArray();
+ private static int PATH_CHAR_SET_LEN = PATH_CHAR_SET.length;
+
+ static String fileSeparator = PropertiesUtil.getProperty(
+ "xa.file.separator", "/");
+
+ public RangerBizUtil() {
+ maxFirstNameLength = Integer.parseInt(PropertiesUtil.getProperty(
+ "xa.user.firstname.maxlength", "16"));
+ maxDisplayNameLength = PropertiesUtil.getIntProperty(
+ "xa.bookmark.name.maxlen", maxDisplayNameLength);
+ showBlockedContent = PropertiesUtil.getBooleanProperty(
+ "xa.content.show_blocked", showBlockedContent);
+ defaultAutoApprove = PropertiesUtil.getBooleanProperty(
+ "xa.mod.default", defaultAutoApprove);
+
+ groupEditableClasses = new HashSet<Class<?>>(
+ Arrays.asList(groupEditableClassesList));
+ enableResourceAccessControl = PropertiesUtil.getBooleanProperty(
+ "xa.resource.accessControl.enabled", true);
+ random = new Random();
+ }
+
+ public <T extends XXDBBase> List<? extends XXDBBase> getParentObjects(T object) {
+ List<XXDBBase> parentObjectList = null;
+ // if (checkParentAcess.contains(object.getMyClassType())) {
+ // parentObjectList = new ArrayList<MBase>();
+ // }
+ return parentObjectList;
+ }
+
+ public int getClassType(Class<?> klass) {
+ String className = klass.getName();
+ // See if this mapping is already in the database
+ Integer classType = classTypeMappings.get(className);
+ if (classType == null) {
+ // Instantiate the class and call the getClassType method
+ if (XXDBBase.class.isAssignableFrom(klass)) {
+ try {
+ XXDBBase gjObj = (XXDBBase) klass.newInstance();
+ classType = gjObj.getMyClassType();
+ classTypeMappings.put(className, classType);
+ } catch (Throwable ex) {
+ logger.error("Error instantiating object for class "
+ + className, ex);
+ }
+ }
+ }
+ if (classType == null) {
+ return RangerCommonEnums.CLASS_TYPE_NONE;
+ } else {
+ return classType;
+ }
+ }
+
+ // Access control methods
+ public void checkSystemAdminAccess() {
+ UserSessionBase currentUserSession = ContextUtil
+ .getCurrentUserSession();
+ if (currentUserSession != null && currentUserSession.isUserAdmin()) {
+ return;
+ }
+ throw restErrorUtil
+ .create403RESTException("Only System Administrators can add accounts");
+ }
+
+ /**
+ * @param contentType
+ * @return
+ */
+ public int getMimeTypeInt(String contentType) {
+ if (contentType.equalsIgnoreCase("JPEG")
+ || contentType.equalsIgnoreCase("JPG")
+ || contentType.endsWith("jpg") || contentType.endsWith("jpeg")) {
+ return RangerConstants.MIME_JPEG;
+ }
+ if (contentType.equalsIgnoreCase("PNG") || contentType.endsWith("png")) {
+ return RangerConstants.MIME_PNG;
+ }
+ return RangerConstants.MIME_UNKNOWN;
+ }
+
+ /**
+ * @param mimeType
+ * @return
+ */
+ public String getMimeType(int mimeType) {
+ switch (mimeType) {
+ case RangerConstants.MIME_JPEG:
+ return "jpg";
+ case RangerConstants.MIME_PNG:
+ return "png";
+ }
+ return "";
+ }
+
+ /**
+ * @param contentType
+ * @return
+ */
+ public String getImageExtension(String contentType) {
+ if (contentType.toLowerCase().endsWith("jpg")
+ || contentType.toLowerCase().endsWith("jpeg")) {
+ return "jpg";
+ } else if (contentType.toLowerCase().endsWith("png")) {
+ return "png";
+ }
+ return "";
+ }
+
+ /**
+ * @param file
+ * @return
+ */
+ public String getFileNameWithoutExtension(File file) {
+ if (file != null) {
+ String fileName = file.getName();
+ if (fileName.indexOf(".") > 0) {
+ return fileName.substring(0, fileName.indexOf("."));
+ }
+ return fileName;
+
+ }
+ return null;
+ }
+
+ public String getDisplayNameForClassName(XXDBBase obj) {
+ String classTypeDisplayName = RangerConstants.getLabelFor_ClassTypes(obj
+ .getMyClassType());
+ if (classTypeDisplayName == null) {
+ logger.error(
+ "Error get name for class type. obj=" + obj.toString(),
+ new Throwable());
+ }
+ return classTypeDisplayName;
+ }
+
+ public String getDisplayName(XXDBBase obj) {
+ if (obj != null) {
+ return handleGetDisplayName(obj.getMyDisplayValue());
+ } else {
+ return handleGetDisplayName(null);
+ }
+ }
+
+ /**
+ * @param displayValue
+ * @return
+ */
+ private String handleGetDisplayName(String displayValue) {
+ if (displayValue == null || displayValue.trim().isEmpty()) {
+ return EMPTY_CONTENT_DISPLAY_NAME;
+ }
+
+ if (displayValue.length() > maxDisplayNameLength) {
+ displayValue = displayValue.substring(0, maxDisplayNameLength - 3)
+ .concat("...");
+ }
+ return displayValue;
+ }
+
+ /**
+ * @param userProfile
+ * @return
+ */
+ public String generatePublicName(VXPortalUser userProfile, XXPortalUser gjUser) {
+ return generatePublicName(userProfile.getFirstName(),
+ userProfile.getLastName());
+ }
+
+ public String generatePublicName(String firstName, String lastName) {
+ String publicName = null;
+ String fName = firstName;
+ if (firstName.length() > maxFirstNameLength) {
+ fName = firstName.substring(0, maxFirstNameLength - (1 + 3))
+ + "...";
+ }
+ if (lastName != null && lastName.length() > 0) {
+ publicName = fName + " " + lastName.substring(0, 1) + ".";
+ }
+ return publicName;
+ }
+
+ public void updateCloneReferences(XXDBBase obj) {
+ if (obj == null) {
+ return;
+ }
+ }
+
+ public Long getForUserId(XXDBBase resource) {
+ return null;
+ }
+
+ public XXDBBase getMObject(int objClassType, Long objId) {
+ XXDBBase obj = null;
+
+ if (objId != null) {
+ BaseDao<?> dao = daoManager.getDaoForClassType(objClassType);
+
+ if (dao != null) {
+ obj = (XXDBBase) dao.getById(objId);
+ }
+ }
+
+ return obj;
+ }
+
+ public XXDBBase getMObject(VXDataObject vXDataObject) {
+ if (vXDataObject != null) {
+ return getMObject(vXDataObject.getMyClassType(), vXDataObject.getId());
+ }
+ return null;
+ }
+
+ public VXDataObject getVObject(int objClassType, Long objId) {
+ if (objId == null) {
+ return null;
+ }
+ if (objClassType == RangerConstants.CLASS_TYPE_USER_PROFILE) {
+ return userMgr.mapXXPortalUserVXPortalUser(daoManager.getXXPortalUser().getById(
+ objId));
+ }
+ try {
+ AbstractBaseResourceService<?, ?> myService = AbstractBaseResourceService
+ .getService(objClassType);
+ if (myService != null) {
+ return myService.readResource(objId);
+ }
+ } catch (Throwable t) {
+ logger.error("Error reading resource. objectClassType="
+ + objClassType + ", objectId=" + objId, t);
+ }
+ return null;
+ }
+
+ public void deleteReferencedObjects(XXDBBase obj) {
+
+ if (obj == null) {
+ return;
+ }
+ if (obj.getMyClassType() == RangerConstants.CLASS_TYPE_NONE) {
+ return;
+ }
+
+ }
+
+ /**
+ * @param obj
+ */
+ void deleteObjects(List<XXDBBase> objs) {
+
+ }
+
+ void deleteObject(XXDBBase obj) {
+ AbstractBaseResourceService<?, ?> myService = AbstractBaseResourceService
+ .getService(obj.getMyClassType());
+ if (myService != null) {
+ myService.deleteResource(obj.getId());
+ } else {
+ logger.error("Service not found for obj=" + obj, new Throwable());
+ }
+ }
+
+ public <T extends XXDBBase> Class<? extends XXDBBase> getContextObject(
+ int objectClassType, Long objectId) {
+ return null;
+ }
+
+ public VXStringList mapStringListToVStringList(List<String> stringList) {
+ if (stringList == null) {
+ return null;
+ }
+
+ List<VXString> vStringList = new ArrayList<VXString>();
+ for (String str : stringList) {
+ VXString vXString = new VXString();
+ vXString.setValue(str);
+ vStringList.add(vXString);
+ }
+
+ return new VXStringList(vStringList);
+ }
+
+ /**
+ * return response object if users is having permission on given resource
+ *
+ * @param vXResource
+ * @param permission
+ * @return
+ */
+ public VXResponse hasPermission(VXResource vXResource, int permission) {
+
+ VXResponse vXResponse = new VXResponse();
+ if (!enableResourceAccessControl) {
+ logger.debug("Resource Access Control is disabled !!!");
+ return vXResponse;
+ }
+
+ if (vXResource == null) {
+ vXResponse.setStatusCode(VXResponse.STATUS_ERROR);
+ vXResponse.setMsgDesc("Please provide valid policy.");
+ return vXResponse;
+ }
+
+ String resourceNames = vXResource.getName();
+ if (stringUtil.isEmpty(resourceNames)) {
+ vXResponse.setStatusCode(VXResponse.STATUS_ERROR);
+ vXResponse.setMsgDesc("Please provide valid policy.");
+ return vXResponse;
+ }
+
+ if (isAdmin()) {
+ return vXResponse;
+ }
+
+ Long xUserId = getXUserId();
+ Long assetId = vXResource.getAssetId();
+ List<XXResource> xResourceList = daoManager.getXXResource()
+ .findByAssetIdAndResourceStatus(assetId,
+ AppConstants.STATUS_ENABLED);
+
+ XXAsset xAsset = daoManager.getXXAsset().getById(assetId);
+ int assetType = xAsset.getAssetType();
+
+ vXResponse.setStatusCode(VXResponse.STATUS_ERROR);
+ vXResponse.setMsgDesc("Permission Denied !");
+
+ if (assetType == AppConstants.ASSET_HIVE) {
+ String[] requestResNameList = resourceNames.split(",");
+ if (stringUtil.isEmpty(vXResource.getUdfs())) {
+ int reqTableType = vXResource.getTableType();
+ int reqColumnType = vXResource.getColumnType();
+ for (String resourceName : requestResNameList) {
+ boolean matchFound = matchHivePolicy(resourceName,
+ xResourceList, xUserId, permission, reqTableType,
+ reqColumnType, false);
+ if (!matchFound) {
+ vXResponse.setMsgDesc("You're not permitted to perform "
+ + "the action for resource path : "
+ + resourceName);
+ vXResponse.setStatusCode(VXResponse.STATUS_ERROR);
+ return vXResponse;
+ }
+ }
+ } else {
+ for (String resourceName : requestResNameList) {
+ boolean matchFound = matchHivePolicy(resourceName,
+ xResourceList, xUserId, permission);
+ if (!matchFound) {
+ vXResponse.setMsgDesc("You're not permitted to perform "
+ + "the action for resource path : "
+ + resourceName);
+ vXResponse.setStatusCode(VXResponse.STATUS_ERROR);
+ return vXResponse;
+ }
+ }
+ }
+ vXResponse.setStatusCode(VXResponse.STATUS_SUCCESS);
+ return vXResponse;
+ } else if (assetType == AppConstants.ASSET_HBASE) {
+ String[] requestResNameList = resourceNames.split(",");
+ for (String resourceName : requestResNameList) {
+ boolean matchFound = matchHbasePolicy(resourceName,
+ xResourceList, vXResponse, xUserId, permission);
+ if (!matchFound) {
+ vXResponse.setMsgDesc("You're not permitted to perform "
+ + "the action for resource path : " + resourceName);
+ vXResponse.setStatusCode(VXResponse.STATUS_ERROR);
+ return vXResponse;
+ }
+ }
+ vXResponse.setStatusCode(VXResponse.STATUS_SUCCESS);
+ return vXResponse;
+ } else if (assetType == AppConstants.ASSET_HDFS) {
+ String[] requestResNameList = resourceNames.split(",");
+ for (String resourceName : requestResNameList) {
+ boolean matchFound = matchHdfsPolicy(resourceName,
+ xResourceList, xUserId, permission);
+ if (!matchFound) {
+ vXResponse.setMsgDesc("You're not permitted to perform "
+ + "the action for resource path : " + resourceName);
+ vXResponse.setStatusCode(VXResponse.STATUS_ERROR);
+ return vXResponse;
+ }
+ }
+ vXResponse.setStatusCode(VXResponse.STATUS_SUCCESS);
+ return vXResponse;
+ } else if (assetType == AppConstants.ASSET_KNOX) {
+ String[] requestResNameList = resourceNames.split(",");
+ for (String resourceName : requestResNameList) {
+ boolean matchFound = matchKnoxPolicy(resourceName,
+ xResourceList, vXResponse, xUserId, permission);
+ if (!matchFound) {
+ vXResponse.setMsgDesc("You're not permitted to perform "
+ + "the action for resource path : " + resourceName);
+ vXResponse.setStatusCode(VXResponse.STATUS_ERROR);
+ return vXResponse;
+ }
+ }
+ vXResponse.setStatusCode(VXResponse.STATUS_SUCCESS);
+ return vXResponse;
+ } else if (assetType == AppConstants.ASSET_STORM) {
+ String[] requestResNameList = resourceNames.split(",");
+ for (String resourceName : requestResNameList) {
+ boolean matchFound = matchStormPolicy(resourceName,
+ xResourceList, vXResponse, xUserId, permission);
+ if (!matchFound) {
+ vXResponse.setMsgDesc("You're not permitted to perform "
+ + "the action for resource path : " + resourceName);
+ vXResponse.setStatusCode(VXResponse.STATUS_ERROR);
+ return vXResponse;
+ }
+ }
+ vXResponse.setStatusCode(VXResponse.STATUS_SUCCESS);
+ return vXResponse;
+ }
+ return vXResponse;
+ }
+
+ /**
+ * return true id current logged in session is owned by admin
+ *
+ * @return
+ */
+ public boolean isAdmin() {
+ UserSessionBase currentUserSession = ContextUtil
+ .getCurrentUserSession();
+ if (currentUserSession == null) {
+ logger.debug("Unable to find session.");
+ return false;
+ }
+
+ if (currentUserSession.isUserAdmin()) {
+ return true;
+ }
+ return false;
+ }
+
+ /**
+ * returns current user's userID from active user sessions
+ *
+ * @return
+ */
+ public Long getXUserId() {
+
+ UserSessionBase currentUserSession = ContextUtil
+ .getCurrentUserSession();
+ if (currentUserSession == null) {
+ logger.debug("Unable to find session.");
+ return null;
+ }
+
+ XXPortalUser user = daoManager.getXXPortalUser().getById(
+ currentUserSession.getUserId());
+ if (user == null) {
+ logger.debug("XXPortalUser not found with logged in user id : "
+ + currentUserSession.getUserId());
+ return null;
+ }
+
+ XXUser xUser = daoManager.getXXUser().findByUserName(user.getLoginId());
+ if (xUser == null) {
+ logger.debug("XXPortalUser not found for user id :" + user.getId()
+ + " with name " + user.getFirstName());
+ return null;
+ }
+
+ return xUser.getId();
+ }
+
+ /**
+ * returns true if user is having required permission on given Hdfs resource
+ *
+ * @param resourceName
+ * @param xResourceList
+ * @param xUserId
+ * @param permission
+ * @return
+ */
+ private boolean matchHdfsPolicy(String resourceName,
+ List<XXResource> xResourceList, Long xUserId, int permission) {
+ boolean matchFound = false;
+ resourceName = replaceMetaChars(resourceName);
+
+ for (XXResource xResource : xResourceList) {
+ if (xResource.getResourceStatus() != AppConstants.STATUS_ENABLED) {
+ continue;
+ }
+ Long resourceId = xResource.getId();
+ matchFound = checkUsrPermForPolicy(xUserId, permission, resourceId);
+ if (matchFound) {
+ matchFound = false;
+ String resource = xResource.getName();
+ String[] dbResourceNameList = resource.split(",");
+ for (String dbResourceName : dbResourceNameList) {
+ if (comparePathsForExactMatch(resourceName, dbResourceName)) {
+ matchFound = true;
+ } else {
+ if (xResource.getIsRecursive() == AppConstants.BOOL_TRUE) {
+ matchFound = isRecursiveWildCardMatch(resourceName,
+ dbResourceName);
+ } else {
+ matchFound = nonRecursiveWildCardMatch(
+ resourceName, dbResourceName);
+ }
+ }
+ if (matchFound) {
+ break;
+ }
+ }
+ if (matchFound) {
+ break;
+ }
+ }
+ }
+ return matchFound;
+ }
+
+ /**
+ * returns true if user is having required permission on given Hbase
+ * resource
+ *
+ * @param resourceName
+ * @param xResourceList
+ * @param vXResponse
+ * @param xUserId
+ * @param permission
+ * @return
+ */
+ public boolean matchHbasePolicy(String resourceName,
+ List<XXResource> xResourceList, VXResponse vXResponse, Long xUserId,
+ int permission) {
+ if(stringUtil.isEmpty(resourceName) || xResourceList==null || xUserId==null){
+ return false;
+ }
+
+ String[] splittedResources = stringUtil.split(resourceName, fileSeparator);
+ if (splittedResources.length < 1 || splittedResources.length > 3) {
+ logger.debug("Invalid resourceName name : " + resourceName);
+ return false;
+ }
+
+ String tblName = splittedResources.length > 0 ? splittedResources[0] : StringUtil.WILDCARD_ASTERISK;
+ String colFamName = splittedResources.length > 1 ? splittedResources[1] : StringUtil.WILDCARD_ASTERISK;
+ String colName = splittedResources.length > 2 ? splittedResources[2] : StringUtil.WILDCARD_ASTERISK;
+
+ boolean policyMatched = false;
+ // check all resources whether Hbase policy is enabled in any resource
+ // of provided resource list
+ for (XXResource xResource : xResourceList) {
+ if (xResource.getResourceStatus() != AppConstants.STATUS_ENABLED) {
+ continue;
+ }
+ Long resourceId = xResource.getId();
+ boolean hasPermission = checkUsrPermForPolicy(xUserId, permission, resourceId);
+ // if permission is enabled then load Tables,column family and
+ // columns list from resource
+ if (! hasPermission) {
+ continue;
+ }
+
+ // 1. does the policy match the table?
+ String[] xTables = stringUtil.isEmpty(xResource.getTables()) ? null : stringUtil.split(xResource.getTables(), ",");
+
+ boolean matchFound = (xTables == null || xTables.length == 0) ? true : matchPath(tblName, xTables);
+
+ if(matchFound) {
+ // 2. does the policy match the column?
+ String[] xColumnFamilies = stringUtil.isEmpty(xResource.getColumnFamilies()) ? null : stringUtil.split(xResource.getColumnFamilies(), ",");
+
+ matchFound = (xColumnFamilies == null || xColumnFamilies.length == 0) ? true : matchPath(colFamName, xColumnFamilies);
+
+ if(matchFound) {
+ // 3. does the policy match the columnFamily?
+ String[] xColumns = stringUtil.isEmpty(xResource.getColumns()) ? null : stringUtil.split(xResource.getColumns(), ",");
+
+ matchFound = (xColumns == null || xColumns.length == 0) ? true : matchPath(colName, xColumns);
+ }
+ }
+
+ if (matchFound) {
+ policyMatched = true;
+ break;
+ }
+ }
+ return policyMatched;
+ }
+
+ public boolean matchHivePolicy(String resourceName,
+ List<XXResource> xResourceList, Long xUserId, int permission) {
+ return matchHivePolicy(resourceName, xResourceList, xUserId,
+ permission, 0, 0, true);
+ }
+
+ /**
+ * returns true if user is having required permission on given Hive resource
+ *
+ * @param resourceName
+ * @param xResourceList
+ * @param xUserId
+ * @param permission
+ * @param reqTableType
+ * @param reqColumnType
+ * @param isUdfPolicy
+ * @return
+ */
+ public boolean matchHivePolicy(String resourceName,
+ List<XXResource> xResourceList, Long xUserId, int permission,
+ int reqTableType, int reqColumnType, boolean isUdfPolicy) {
+
+ if(stringUtil.isEmpty(resourceName) || xResourceList==null || xUserId==null){
+ return false;
+ }
+
+ String[] splittedResources = stringUtil.split(resourceName, fileSeparator);// get list of resources
+ if (splittedResources.length < 1 || splittedResources.length > 3) {
+ logger.debug("Invalid resource name : " + resourceName);
+ return false;
+ }
+
+ String dbName = splittedResources.length > 0 ? splittedResources[0] : StringUtil.WILDCARD_ASTERISK;
+ String tblName = splittedResources.length > 1 ? splittedResources[1] : StringUtil.WILDCARD_ASTERISK;
+ String colName = splittedResources.length > 2 ? splittedResources[2] : StringUtil.WILDCARD_ASTERISK;
+
+ boolean policyMatched = false;
+ for (XXResource xResource : xResourceList) {
+ if (xResource.getResourceStatus() != AppConstants.STATUS_ENABLED) {
+ continue;
+ }
+
+ Long resourceId = xResource.getId();
+ boolean hasPermission = checkUsrPermForPolicy(xUserId, permission, resourceId);
+
+ if (! hasPermission) {
+ continue;
+ }
+
+ // 1. does the policy match the database?
+ String[] xDatabases = stringUtil.isEmpty(xResource.getDatabases()) ? null : stringUtil.split(xResource.getDatabases(), ",");
+
+ boolean matchFound = (xDatabases == null || xDatabases.length == 0) ? true : matchPath(dbName, xDatabases);
+
+ if (! matchFound) {
+ continue;
+ }
+
+ // Type(either UDFs policy or non-UDFs policy) of current policy
+ // should be of same as type of policy being iterated
+ if (!stringUtil.isEmpty(xResource.getUdfs()) && !isUdfPolicy) {
+ continue;
+ }
+
+ if (isUdfPolicy) {
+ // 2. does the policy match the UDF?
+ String[] xUdfs = stringUtil.isEmpty(xResource.getUdfs()) ? null : stringUtil.split(xResource.getUdfs(), ",");
+
+ if(! matchPath(tblName, xUdfs)) {
+ continue;
+ } else {
+ policyMatched = true;
+ break;
+ }
+ } else {
+ // 2. does the policy match the table?
+ String[] xTables = stringUtil.isEmpty(xResource.getTables()) ? null : stringUtil.split(xResource.getTables(), ",");
+
+ matchFound = (xTables == null || xTables.length == 0) ? true : matchPath(tblName, xTables);
+
+ if(xResource.getTableType() == AppConstants.POLICY_EXCLUSION) {
+ matchFound = !matchFound;
+ }
+
+ if (!matchFound) {
+ continue;
+ }
+
+ // 3. does current policy match the column?
+ String[] xColumns = stringUtil.isEmpty(xResource.getColumns()) ? null : stringUtil.split(xResource.getColumns(), ",");
+
+ matchFound = (xColumns == null || xColumns.length == 0) ? true : matchPath(colName, xColumns);
+
+ if(xResource.getColumnType() == AppConstants.POLICY_EXCLUSION) {
+ matchFound = !matchFound;
+ }
+
+ if (!matchFound) {
+ continue;
+ } else {
+ policyMatched = true;
+ break;
+ }
+ }
+ }
+ return policyMatched;
+ }
+ /**
+ * returns true if user is having required permission on given Hbase
+ * resource
+ *
+ * @param resourceName
+ * @param xResourceList
+ * @param vXResponse
+ * @param xUserId
+ * @param permission
+ * @return
+ */
+ private boolean matchKnoxPolicy(String resourceName,
+ List<XXResource> xResourceList, VXResponse vXResponse, Long xUserId,
+ int permission) {
+
+ String[] splittedResources = stringUtil.split(resourceName,
+ fileSeparator);
+ int numberOfResources = splittedResources.length;
+ if (numberOfResources < 1 || numberOfResources > 3) {
+ logger.debug("Invalid policy name : " + resourceName);
+ return false;
+ }
+
+ boolean policyMatched = false;
+ // check all resources whether Knox policy is enabled in any resource
+ // of provided resource list
+ for (XXResource xResource : xResourceList) {
+ if (xResource.getResourceStatus() != AppConstants.STATUS_ENABLED) {
+ continue;
+ }
+ Long resourceId = xResource.getId();
+ boolean hasPermission = checkUsrPermForPolicy(xUserId, permission,
+ resourceId);
+ // if permission is enabled then load Topologies,services list from resource
+ if (hasPermission) {
+ String[] xTopologies = (xResource.getTopologies() == null || xResource
+ .getTopologies().equalsIgnoreCase("")) ? null : stringUtil
+ .split(xResource.getTopologies(), ",");
+ String[] xServices = (xResource.getServices() == null || xResource
+ .getServices().equalsIgnoreCase("")) ? null
+ : stringUtil.split(xResource.getServices(), ",");
+
+ boolean matchFound = false;
+
+ for (int index = 0; index < numberOfResources; index++) {
+ matchFound = false;
+ // check whether given table resource matches with any
+ // existing topology resource
+ if (index == 0) {
+ if(xTopologies!=null){
+ for (String xTopology : xTopologies) {
+ if (matchPath(splittedResources[index], xTopology)) {
+ matchFound = true;
+ continue;
+ }
+ }
+ }
+ if(!matchFound) {
+ break;
+ }
+ } // check whether given service resource matches with
+ // any existing service resource
+ else if (index == 1) {
+ if(xServices!=null){
+ for (String xService : xServices) {
+ if (matchPath(splittedResources[index],
+ xService)) {
+ matchFound = true;
+ continue;
+ }
+ }
+ }
+ if(!matchFound) {
+ break;
+ }
+ }
+ }
+ if (matchFound) {
+ policyMatched = true;
+ break;
+ }
+ }
+ }
+ return policyMatched;
+ }
+
+ /**
+ * returns true if user is having required permission on given STORM
+ * resource
+ *
+ * @param resourceName
+ * @param xResourceList
+ * @param vXResponse
+ * @param xUserId
+ * @param permission
+ * @return
+ */
+ private boolean matchStormPolicy(String resourceName,
+ List<XXResource> xResourceList, VXResponse vXResponse, Long xUserId,
+ int permission) {
+
+ String[] splittedResources = stringUtil.split(resourceName,
+ fileSeparator);
+ int numberOfResources = splittedResources.length;
+ if (numberOfResources < 1 || numberOfResources > 3) {
+ logger.debug("Invalid policy name : " + resourceName);
+ return false;
+ }
+
+ boolean policyMatched = false;
+ // check all resources whether Knox policy is enabled in any resource
+ // of provided resource list
+ for (XXResource xResource : xResourceList) {
+ if (xResource.getResourceStatus() != AppConstants.STATUS_ENABLED) {
+ continue;
+ }
+ Long resourceId = xResource.getId();
+ boolean hasPermission = checkUsrPermForPolicy(xUserId, permission,
+ resourceId);
+ // if permission is enabled then load Topologies,services list from resource
+ if (hasPermission) {
+ String[] xTopologies = (xResource.getTopologies() == null || xResource
+ .getTopologies().equalsIgnoreCase("")) ? null : stringUtil
+ .split(xResource.getTopologies(), ",");
+ /*String[] xServices = (xResource.getServices() == null || xResource
+ .getServices().equalsIgnoreCase("")) ? null
+ : stringUtil.split(xResource.getServices(), ",");*/
+
+ boolean matchFound = false;
+
+ for (int index = 0; index < numberOfResources; index++) {
+ matchFound = false;
+ // check whether given table resource matches with any
+ // existing topology resource
+ if (index == 0) {
+ if(xTopologies!=null){
+ for (String xTopology : xTopologies) {
+ if (matchPath(splittedResources[index], xTopology)) {
+ matchFound = true;
+ continue;
+ }
+ }
+ }
+ } // check whether given service resource matches with
+ // any existing service resource
+ /*else if (index == 1) {
+ if(xServices!=null){
+ for (String xService : xServices) {
+ if (matchPath(splittedResources[index],
+ xService)) {
+ matchFound = true;
+ continue;
+ }
+ }
+ }
+ }*/
+ }
+ if (matchFound) {
+ policyMatched = true;
+ break;
+ }
+ }
+ }
+ return policyMatched;
+ }
+
+ /**
+ * returns path without meta characters
+ *
+ * @param path
+ * @return
+ */
+ public String replaceMetaChars(String path) {
+ if (path == null || path.isEmpty()) {
+ return path;
+ }
+
+ if (path.contains("*")) {
+ String replacement = getRandomString(5, 60);
+ path = path.replaceAll("\\*", replacement);
+ }
+ if (path.contains("?")) {
+ String replacement = getRandomString(1, 1);
+ path = path.replaceAll("\\?", replacement);
+ }
+ return path;
+ }
+
+ /**
+ * returns random String of given length range
+ *
+ * @param minLen
+ * @param maxLen
+ * @return
+ */
+ private String getRandomString(int minLen, int maxLen) {
+ StringBuilder sb = new StringBuilder();
+ int len = getRandomInt(minLen, maxLen);
+ for (int i = 0; i < len; i++) {
+ int charIdx = random.nextInt(PATH_CHAR_SET_LEN);
+ sb.append(PATH_CHAR_SET[charIdx]);
+ }
+ return sb.toString();
+ }
+
+ /**
+ * return random integer number for given range
+ *
+ * @param min
+ * @param max
+ * @return
+ */
+ private int getRandomInt(int min, int max) {
+ if (min == max) {
+ return min;
+ } else {
+ int interval = max - min;
+ int randomNum = random.nextInt();
+ return ((Math.abs(randomNum) % interval) + min);
+ }
+ }
+
+ /**
+ * returns true if given userID is having specified permission on specified
+ * resource
+ *
+ * @param xUserId
+ * @param permission
+ * @param resourceId
+ * @return
+ */
+ private boolean checkUsrPermForPolicy(Long xUserId, int permission,
+ Long resourceId) {
+ // this snippet load user groups and permission map list from DB
+ List<XXGroup> userGroups = new ArrayList<XXGroup>();
+ List<XXPermMap> permMapList = new ArrayList<XXPermMap>();
+ userGroups = daoManager.getXXGroup().findByUserId(xUserId);
+ permMapList = daoManager.getXXPermMap().findByResourceId(resourceId);
+ Long publicGroupId = getPublicGroupId();
+ boolean matchFound = false;
+ for (XXPermMap permMap : permMapList) {
+ if (permMap.getPermType() == permission) {
+ if (permMap.getPermFor() == AppConstants.XA_PERM_FOR_GROUP) {
+ // check whether permission is enabled for public group or a group to which user belongs
+ matchFound = (publicGroupId != null && publicGroupId == permMap.getGroupId()) || isGroupInList(permMap.getGroupId(), userGroups);
+ } else if (permMap.getPermFor() == AppConstants.XA_PERM_FOR_USER) {
+ // check whether permission is enabled to user
+ matchFound = permMap.getUserId().equals(xUserId);
+ }
+ }
+ if (matchFound) {
+ break;
+ }
+ }
+ return matchFound;
+ }
+
+ public Long getPublicGroupId() {
+ XXGroup xXGroupPublic = daoManager.getXXGroup().findByGroupName(RangerConstants.GROUP_PUBLIC);
+
+ return xXGroupPublic != null ? xXGroupPublic.getId() : null;
+ }
+
+ /**
+ * returns true is given group id is in given group list
+ *
+ * @param groupId
+ * @param xGroupList
+ * @return
+ */
+ public boolean isGroupInList(Long groupId, List<XXGroup> xGroupList) {
+ for (XXGroup xGroup : xGroupList) {
+ if (xGroup.getId().equals(groupId)) {
+ return true;
+ }
+ }
+ return false;
+ }
+
+ /**
+ * returns true if given path matches in same level or sub directories with
+ * given wild card pattern
+ *
+ * @param pathToCheck
+ * @param wildcardPath
+ * @return
+ */
+ public boolean isRecursiveWildCardMatch(String pathToCheck,
+ String wildcardPath) {
+ if (pathToCheck != null) {
+ if (wildcardPath != null && wildcardPath.equals(fileSeparator)) {
+ return true;
+ }
+ StringBuilder sb = new StringBuilder();
+ for (String p : pathToCheck.split(fileSeparator)) {
+ sb.append(p);
+ boolean matchFound = FilenameUtils.wildcardMatch(sb.toString(),
+ wildcardPath);
+ if (matchFound) {
+ return true;
+ }
+ sb.append(fileSeparator);
+ }
+ sb = null;
+ }
+ return false;
+ }
+
+ /**
+ * return List<Integer>
+ *
+ * List of all possible parent return type for some specific resourceType
+ *
+ * @param resourceType
+ * , assetType
+ *
+ */
+ public List<Integer> getResorceTypeParentHirearchy(int resourceType,
+ int assetType) {
+ List<Integer> resourceTypeList = new ArrayList<Integer>();
+
+ if (assetType == AppConstants.ASSET_HDFS) {
+ resourceTypeList.add(AppConstants.RESOURCE_PATH);
+ } else if (assetType == AppConstants.ASSET_HIVE) {
+ resourceTypeList.add(AppConstants.RESOURCE_DB);
+ if (resourceType == AppConstants.RESOURCE_TABLE) {
+ resourceTypeList.add(AppConstants.RESOURCE_TABLE);
+ } else if (resourceType == AppConstants.RESOURCE_UDF) {
+ resourceTypeList.add(AppConstants.RESOURCE_UDF);
+ } else if (resourceType == AppConstants.RESOURCE_COLUMN) {
+ resourceTypeList.add(AppConstants.RESOURCE_TABLE);
+ resourceTypeList.add(AppConstants.RESOURCE_COLUMN);
+ }
+ } else if (assetType == AppConstants.ASSET_HBASE) {
+ resourceTypeList.add(AppConstants.RESOURCE_TABLE);
+ if (resourceType == AppConstants.RESOURCE_COL_FAM) {
+ resourceTypeList.add(AppConstants.RESOURCE_COL_FAM);
+ } else if (resourceType == AppConstants.RESOURCE_COLUMN) {
+ resourceTypeList.add(AppConstants.RESOURCE_COL_FAM);
+ resourceTypeList.add(AppConstants.RESOURCE_COLUMN);
+ }
+ }
+
+ return resourceTypeList;
+ }
+
+ /**
+ * return true if both path matches exactly, wild card matching is not
+ * checked
+ *
+ * @param path1
+ * @param path2
+ * @return
+ */
+ public boolean comparePathsForExactMatch(String path1, String path2) {
+ String pathSeparator = fileSeparator;
+ if (!path1.endsWith(pathSeparator)) {
+ path1 = path1.concat(pathSeparator);
+ }
+ if (!path2.endsWith(pathSeparator)) {
+ path2 = path2.concat(pathSeparator);
+ }
+ return path1.equalsIgnoreCase(path2);
+ }
+
+ /**
+ * return true if both path matches at same level path, this function does
+ * not match sub directories
+ *
+ * @param pathToCheck
+ * @param wildcardPath
+ * @return
+ */
+ public boolean nonRecursiveWildCardMatch(String pathToCheck,
+ String wildcardPath) {
+ if (pathToCheck != null && wildcardPath != null) {
+
+ List<String> pathToCheckArray = new ArrayList<String>();
+ List<String> wildcardPathArray = new ArrayList<String>();
+
+ for (String p : pathToCheck.split(fileSeparator)) {
+ pathToCheckArray.add(p);
+ }
+ for (String w : wildcardPath.split(fileSeparator)) {
+ wildcardPathArray.add(w);
+ }
+
+ if (pathToCheckArray.size() == wildcardPathArray.size()) {
+ boolean match = false;
+ for (int index = 0; index < pathToCheckArray.size(); index++) {
+ match = matchPath(pathToCheckArray.get(index),
+ wildcardPathArray.get(index));
+ if (!match)
+ return match;
+ }
+ return match;
+ }
+ }
+ return false;
+ }
+
+ /**
+ * returns true if first and second path are same
+ *
+ * @param pathToCheckFragment
+ * @param wildCardPathFragment
+ * @return
+ */
+ private boolean matchPath(String pathToCheckFragment,
+ String wildCardPathFragment) {
+ if(pathToCheckFragment == null || wildCardPathFragment == null) {
+ return false;
+ }
+
+ if (pathToCheckFragment.contains("*")
+ || pathToCheckFragment.contains("?")) {
+ pathToCheckFragment = replaceMetaChars(pathToCheckFragment);
+
+ if (wildCardPathFragment.contains("*")
+ || wildCardPathFragment.contains("?")) {
+ return FilenameUtils.wildcardMatch(pathToCheckFragment,
+ wildCardPathFragment, IOCase.SENSITIVE);
+ } else {
+ return false;
+ }
+ } else {
+ if (wildCardPathFragment.contains("*")
+ || wildCardPathFragment.contains("?")) {
+ return FilenameUtils.wildcardMatch(pathToCheckFragment,
+ wildCardPathFragment, IOCase.SENSITIVE);
+ } else {
+ return pathToCheckFragment.trim().equals(
+ wildCardPathFragment.trim());
+ }
+ }
+ }
+
+ private boolean matchPath(String pathToCheck, String[] wildCardPaths) {
+ if (pathToCheck != null && wildCardPaths != null) {
+ for (String wildCardPath : wildCardPaths) {
+ if (matchPath(pathToCheck, wildCardPath)) {
+ return true;
+ }
+ }
+ }
+
+ return false;
+ }
+
+ /**
+ * This method returns true if first parameter value is equal to others
+ * argument value passed
+ *
+ * @param checkValue
+ * @param otherValues
+ * @return
+ */
+ public static boolean areAllEqual(int checkValue, int... otherValues) {
+ for (int value : otherValues) {
+ if (value != checkValue) {
+ return false;
+ }
+ }
+ return true;
+ }
+
+ public void createTrxLog(List<XXTrxLog> trxLogList) {
+ if (trxLogList == null) {
+ return;
+ }
+
+ UserSessionBase usb = ContextUtil.getCurrentUserSession();
+ Long authSessionId = null;
+ if (usb != null) {
+ authSessionId = ContextUtil.getCurrentUserSession().getSessionId();
+ }
+ Long trxId = GUIDUtil.genLong();
+
+ for (XXTrxLog xTrxLog : trxLogList) {
+ xTrxLog.setTransactionId(trxId.toString());
+ if (authSessionId != null) {
+ xTrxLog.setSessionId("" + authSessionId);
+ }
+ xTrxLog.setSessionType("Spring Authenticated Session");
+ xTrxLog.setRequestId(trxId.toString());
+ daoManager.getXXTrxLog().create(xTrxLog);
+ }
+ }
+
+ public static int getDBFlavor() {
+
+ String dbFlavor = "";
+ boolean dbFlavorPropFound = true;
+
+ dbFlavor = PropertiesUtil.getProperty("xa.db.flavor");
+ if (dbFlavor == null || dbFlavor.trim().isEmpty()) {
+ dbFlavor = PropertiesUtil.getProperty("jdbc.dialect");
+ dbFlavorPropFound = false;
+ }
+
+ if (dbFlavor != null && !dbFlavor.trim().isEmpty()) {
+ if (dbFlavorPropFound) {
+ if ("MYSQL".equalsIgnoreCase(dbFlavor)) {
+ return AppConstants.DB_FLAVOR_MYSQL;
+ } else if ("ORACLE".equalsIgnoreCase(dbFlavor)) {
+ return AppConstants.DB_FLAVOR_ORACLE;
+ } else {
+ return AppConstants.DB_FLAVOR_UNKNOWN;
+ }
+ } else {
+ if (dbFlavor.toUpperCase().contains("MYSQL")) {
+ return AppConstants.DB_FLAVOR_MYSQL;
+ } else if (dbFlavor.toUpperCase().contains("ORACLE")) {
+ return AppConstants.DB_FLAVOR_ORACLE;
+ } else {
+ return AppConstants.DB_FLAVOR_UNKNOWN;
+ }
+ }
+ } else {
+ logger.error("Property : xa.db.flavor or jdbc.dialect, not found");
+ return AppConstants.DB_FLAVOR_UNKNOWN;
+ }
+ }
+
+}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/biz/SessionMgr.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/biz/SessionMgr.java b/security-admin/src/main/java/org/apache/ranger/biz/SessionMgr.java
index f273f2b..fb918c5 100644
--- a/security-admin/src/main/java/org/apache/ranger/biz/SessionMgr.java
+++ b/security-admin/src/main/java/org/apache/ranger/biz/SessionMgr.java
@@ -29,17 +29,17 @@ import org.apache.ranger.common.DateUtil;
import org.apache.ranger.common.HTTPUtil;
import org.apache.ranger.common.MessageEnums;
import org.apache.ranger.common.RESTErrorUtil;
+import org.apache.ranger.common.RangerCommonEnums;
+import org.apache.ranger.common.RangerConstants;
import org.apache.ranger.common.SearchCriteria;
import org.apache.ranger.common.StringUtil;
import org.apache.ranger.common.UserSessionBase;
-import org.apache.ranger.common.XACommonEnums;
-import org.apache.ranger.common.XAConstants;
-import org.apache.ranger.db.XADaoManager;
+import org.apache.ranger.db.RangerDaoManager;
import org.apache.ranger.entity.XXAuthSession;
import org.apache.ranger.entity.XXPortalUser;
import org.apache.ranger.entity.XXPortalUserRole;
-import org.apache.ranger.security.context.XAContextHolder;
-import org.apache.ranger.security.context.XASecurityContext;
+import org.apache.ranger.security.context.RangerContextHolder;
+import org.apache.ranger.security.context.RangerSecurityContext;
import org.apache.ranger.service.AuthSessionService;
import org.apache.ranger.util.RestUtil;
import org.apache.ranger.view.VXAuthSession;
@@ -63,7 +63,7 @@ public class SessionMgr {
RESTErrorUtil restErrorUtil;
@Autowired
- XADaoManager daoManager;
+ RangerDaoManager daoManager;
@Autowired
AuthSessionService authSessionService;
@@ -87,7 +87,7 @@ public class SessionMgr {
boolean newSessionCreation = true;
UserSessionBase userSession = null;
- XASecurityContext context = XAContextHolder.getSecurityContext();
+ RangerSecurityContext context = RangerContextHolder.getSecurityContext();
if (context != null) {
userSession = context.getUserSession();
}
@@ -177,7 +177,7 @@ public class SessionMgr {
String userRole = gjUserRole.getUserRole();
strRoleList.add(userRole);
- if (userRole.equals(XAConstants.ROLE_SYS_ADMIN)) {
+ if (userRole.equals(RangerConstants.ROLE_SYS_ADMIN)) {
userSession.setUserAdmin(true);
}
}
@@ -192,7 +192,7 @@ public class SessionMgr {
gjAuthSession.setAuthTime(DateUtil.getUTCDate());
gjAuthSession.setAuthStatus(authStatus);
gjAuthSession.setAuthType(authType);
- gjAuthSession.setDeviceType(XACommonEnums.DEVICE_UNKNOWN);
+ gjAuthSession.setDeviceType(RangerCommonEnums.DEVICE_UNKNOWN);
gjAuthSession.setExtSessionId(sessionId);
gjAuthSession.setRequestIP(remoteAddr);
gjAuthSession.setRequestUserAgent(null);
@@ -246,7 +246,7 @@ public class SessionMgr {
gjAuthSession.setAuthTime(DateUtil.getUTCDate());
gjAuthSession.setAuthStatus(XXAuthSession.AUTH_STATUS_SUCCESS);
gjAuthSession.setAuthType(authType);
- gjAuthSession.setDeviceType(XACommonEnums.DEVICE_UNKNOWN);
+ gjAuthSession.setDeviceType(RangerCommonEnums.DEVICE_UNKNOWN);
gjAuthSession.setExtSessionId(null);
gjAuthSession.setRequestIP(ipAddress);
gjAuthSession.setRequestUserAgent(null);
@@ -258,9 +258,9 @@ public class SessionMgr {
userSession.setXXAuthSession(gjAuthSession);
// create context with user-session and set in thread-local
- XASecurityContext context = new XASecurityContext();
+ RangerSecurityContext context = new RangerSecurityContext();
context.setUserSession(userSession);
- XAContextHolder.setSecurityContext(context);
+ RangerContextHolder.setSecurityContext(context);
resetUserSessionForProfiles(userSession);
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/biz/UserMgr.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/biz/UserMgr.java b/security-admin/src/main/java/org/apache/ranger/biz/UserMgr.java
index 648d80a..c4997ab 100644
--- a/security-admin/src/main/java/org/apache/ranger/biz/UserMgr.java
+++ b/security-admin/src/main/java/org/apache/ranger/biz/UserMgr.java
@@ -33,14 +33,14 @@ import org.apache.ranger.common.DateUtil;
import org.apache.ranger.common.GUIDUtil;
import org.apache.ranger.common.MessageEnums;
import org.apache.ranger.common.RESTErrorUtil;
+import org.apache.ranger.common.RangerCommonEnums;
+import org.apache.ranger.common.RangerConfigUtil;
+import org.apache.ranger.common.RangerConstants;
import org.apache.ranger.common.SearchCriteria;
import org.apache.ranger.common.SearchUtil;
import org.apache.ranger.common.StringUtil;
import org.apache.ranger.common.UserSessionBase;
-import org.apache.ranger.common.XACommonEnums;
-import org.apache.ranger.common.XAConfigUtil;
-import org.apache.ranger.common.XAConstants;
-import org.apache.ranger.db.XADaoManager;
+import org.apache.ranger.db.RangerDaoManager;
import org.apache.ranger.entity.XXPortalUser;
import org.apache.ranger.entity.XXPortalUserRole;
import org.apache.ranger.entity.XXTrxLog;
@@ -65,7 +65,7 @@ public class UserMgr {
private static final Md5PasswordEncoder md5Encoder = new Md5PasswordEncoder();
@Autowired
- XADaoManager daoManager;
+ RangerDaoManager daoManager;
@Autowired
RESTErrorUtil restErrorUtil;
@@ -77,7 +77,7 @@ public class UserMgr {
SearchUtil searchUtil;
@Autowired
- XABizUtil msBizUtil;
+ RangerBizUtil msBizUtil;
@Autowired
SessionMgr sessionMgr;
@@ -90,13 +90,13 @@ public class UserMgr {
DateUtil dateUtil;
@Autowired
- XAConfigUtil configUtil;
+ RangerConfigUtil configUtil;
@Autowired
XPortalUserService xPortalUserService;
- String publicRoles[] = new String[] { XAConstants.ROLE_USER,
- XAConstants.ROLE_OTHER };
+ String publicRoles[] = new String[] { RangerConstants.ROLE_USER,
+ RangerConstants.ROLE_OTHER };
private static final List<String> DEFAULT_ROLE_LIST = new ArrayList<String>(
1);
@@ -104,9 +104,9 @@ public class UserMgr {
private static final List<String> VALID_ROLE_LIST = new ArrayList<String>(2);
static {
- DEFAULT_ROLE_LIST.add(XAConstants.ROLE_USER);
- VALID_ROLE_LIST.add(XAConstants.ROLE_SYS_ADMIN);
- VALID_ROLE_LIST.add(XAConstants.ROLE_USER);
+ DEFAULT_ROLE_LIST.add(RangerConstants.ROLE_USER);
+ VALID_ROLE_LIST.add(RangerConstants.ROLE_SYS_ADMIN);
+ VALID_ROLE_LIST.add(RangerConstants.ROLE_USER);
}
public UserMgr() {
@@ -153,7 +153,7 @@ public class UserMgr {
roleList.add(role);
}
}else{
- roleList.add(XAConstants.ROLE_USER);
+ roleList.add(RangerConstants.ROLE_USER);
}
return createUser(userProfile, userStatus, roleList);
@@ -483,9 +483,9 @@ public class UserMgr {
*/
public VXPortalUser deactivateUser(XXPortalUser gjUser) {
if (gjUser != null
- && gjUser.getStatus() != XAConstants.ACT_STATUS_DEACTIVATED) {
+ && gjUser.getStatus() != RangerConstants.ACT_STATUS_DEACTIVATED) {
logger.info("Marking user " + gjUser.getLoginId() + " as deleted");
- gjUser.setStatus(XAConstants.ACT_STATUS_DEACTIVATED);
+ gjUser.setStatus(RangerConstants.ACT_STATUS_DEACTIVATED);
gjUser = daoManager.getXXPortalUser().update(gjUser);
return mapXXPortalUserVXPortalUser(gjUser);
}
@@ -883,7 +883,7 @@ public class UserMgr {
}
public boolean deleteUserRole(Long userId, XXPortalUserRole gjUserRole) {
- /*if (XAConstants.ROLE_USER.equals(gjUserRole.getUserRole())) {
+ /*if (RangerConstants.ROLE_USER.equals(gjUserRole.getUserRole())) {
return false;
}*/
boolean publicRole = false;
@@ -937,12 +937,12 @@ public class UserMgr {
XXPortalUserRole userRoleObj = new XXPortalUserRole();
userRoleObj.setUserRole(userRole.toUpperCase());
userRoleObj.setUserId(userId);
- userRoleObj.setStatus(XAConstants.STATUS_ENABLED);
+ userRoleObj.setStatus(RangerConstants.STATUS_ENABLED);
daoManager.getXXPortalUserRole().create(userRoleObj);
// If role is not OTHER, then remove OTHER
- if (!XAConstants.ROLE_OTHER.equalsIgnoreCase(userRole)) {
- deleteUserRole(userId, XAConstants.ROLE_OTHER);
+ if (!RangerConstants.ROLE_OTHER.equalsIgnoreCase(userRole)) {
+ deleteUserRole(userId, RangerConstants.ROLE_OTHER);
}
sessionMgr.resetUserSessionForProfiles(ContextUtil
@@ -1024,13 +1024,13 @@ public class UserMgr {
public VXPortalUser createUser(VXPortalUser userProfile) {
XXPortalUser xXPortalUser = this
- .createUser(userProfile, XACommonEnums.STATUS_ENABLED);
+ .createUser(userProfile, RangerCommonEnums.STATUS_ENABLED);
return mapXXPortalUserVXPortalUser(xXPortalUser);
}
public VXPortalUser createDefaultAccountUser(VXPortalUser userProfile) {
if(userProfile.getPassword()==null||userProfile.getPassword().trim().isEmpty()){
- userProfile.setUserSource(XACommonEnums.USER_EXTERNAL);
+ userProfile.setUserSource(RangerCommonEnums.USER_EXTERNAL);
}
// access control
UserSessionBase session = ContextUtil.getCurrentUserSession();
@@ -1056,7 +1056,7 @@ public class UserMgr {
xXPortalUser = this.findByEmailAddress(emailAddress);
if (xXPortalUser == null) {
xXPortalUser = this.createUser(userProfile,
- XACommonEnums.STATUS_ENABLED);
+ RangerCommonEnums.STATUS_ENABLED);
} else {
throw restErrorUtil
.createRESTException(
@@ -1070,7 +1070,7 @@ public class UserMgr {
String randomEmail = GUIDUtil.genGUI();
userProfile.setEmailAddress(randomEmail);
xXPortalUser = this.createUser(userProfile,
- XACommonEnums.STATUS_ENABLED);
+ RangerCommonEnums.STATUS_ENABLED);
}
} else {
/*throw restErrorUtil
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/biz/UserMgrBase.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/biz/UserMgrBase.java b/security-admin/src/main/java/org/apache/ranger/biz/UserMgrBase.java
index 568da26..6e3bb76 100644
--- a/security-admin/src/main/java/org/apache/ranger/biz/UserMgrBase.java
+++ b/security-admin/src/main/java/org/apache/ranger/biz/UserMgrBase.java
@@ -19,9 +19,13 @@
package org.apache.ranger.biz;
-import org.apache.ranger.common.*;
-import org.apache.ranger.service.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.MessageEnums;
+import org.apache.ranger.common.RESTErrorUtil;
+import org.apache.ranger.common.SearchCriteria;
+import org.apache.ranger.service.XPortalUserService;
+import org.apache.ranger.view.VXLong;
+import org.apache.ranger.view.VXPortalUser;
+import org.apache.ranger.view.VXPortalUserList;
import org.springframework.beans.factory.annotation.Autowired;
public class UserMgrBase {
[06/12] incubator-ranger git commit: RANGER-194: Rename classes under
web-admin project
Posted by ma...@apache.org.
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/security/context/XAContextHolder.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/security/context/XAContextHolder.java b/security-admin/src/main/java/org/apache/ranger/security/context/XAContextHolder.java
deleted file mode 100644
index 28ebc24..0000000
--- a/security-admin/src/main/java/org/apache/ranger/security/context/XAContextHolder.java
+++ /dev/null
@@ -1,45 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing,
- * software distributed under the License is distributed on an
- * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
- * KIND, either express or implied. See the License for the
- * specific language governing permissions and limitations
- * under the License.
- */
-
- /**
- *
- */
-package org.apache.ranger.security.context;
-
-public class XAContextHolder {
-
- private static final ThreadLocal<XASecurityContext> securityContextThreadLocal = new ThreadLocal<XASecurityContext>();
-
- private XAContextHolder() {
-
- }
-
- public static XASecurityContext getSecurityContext(){
- return securityContextThreadLocal.get();
- }
-
- public static void setSecurityContext(XASecurityContext context){
- securityContextThreadLocal.set(context);
- }
-
- public static void resetSecurityContext(){
- securityContextThreadLocal.remove();
- }
-
-}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/security/context/XASecurityContext.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/security/context/XASecurityContext.java b/security-admin/src/main/java/org/apache/ranger/security/context/XASecurityContext.java
deleted file mode 100644
index 3de282b..0000000
--- a/security-admin/src/main/java/org/apache/ranger/security/context/XASecurityContext.java
+++ /dev/null
@@ -1,58 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing,
- * software distributed under the License is distributed on an
- * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
- * KIND, either express or implied. See the License for the
- * specific language governing permissions and limitations
- * under the License.
- */
-
- /**
- *
- */
-package org.apache.ranger.security.context;
-
-import java.io.Serializable;
-
-import org.apache.ranger.common.RequestContext;
-import org.apache.ranger.common.UserSessionBase;
-
-public class XASecurityContext implements Serializable{
- private static final long serialVersionUID = 1L;
- private UserSessionBase userSession;
- private RequestContext requestContext;
-
- public UserSessionBase getUserSession() {
- return userSession;
- }
-
- public void setUserSession(UserSessionBase userSession) {
- this.userSession = userSession;
- }
-
- /**
- * @return the requestContext
- */
- public RequestContext getRequestContext() {
- return requestContext;
- }
-
- /**
- * @param requestContext the requestContext to set
- */
- public void setRequestContext(RequestContext requestContext) {
- this.requestContext = requestContext;
- }
-
-
-}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/security/handler/RangerDomainObjectSecurityHandler.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/security/handler/RangerDomainObjectSecurityHandler.java b/security-admin/src/main/java/org/apache/ranger/security/handler/RangerDomainObjectSecurityHandler.java
new file mode 100644
index 0000000..f9fea3f
--- /dev/null
+++ b/security-admin/src/main/java/org/apache/ranger/security/handler/RangerDomainObjectSecurityHandler.java
@@ -0,0 +1,112 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+ package org.apache.ranger.security.handler;
+
+/**
+ *
+ */
+
+import java.io.Serializable;
+
+import org.apache.log4j.Logger;
+import org.apache.ranger.biz.RangerBizUtil;
+import org.apache.ranger.common.ContextUtil;
+import org.apache.ranger.common.PropertiesUtil;
+import org.apache.ranger.common.UserSessionBase;
+import org.apache.ranger.db.RangerDaoManager;
+import org.apache.ranger.entity.XXDBBase;
+import org.springframework.beans.factory.annotation.Autowired;
+import org.springframework.stereotype.Component;
+
+@Component
+public class RangerDomainObjectSecurityHandler {
+
+ public static Logger logger = Logger
+ .getLogger(RangerDomainObjectSecurityHandler.class);
+
+ @Autowired
+ public RangerDaoManager daoManager;
+
+ @Autowired
+ RangerBizUtil msBizUtil;
+
+ boolean checkParentObject = false;
+
+ public RangerDomainObjectSecurityHandler() {
+ checkParentObject = PropertiesUtil.getBooleanProperty(
+ "xa.db.access.filter.check.parentobject", checkParentObject);
+ }
+
+ /**
+ * @return the daoManager
+ */
+ public RangerDaoManager getDaoManager() {
+ return daoManager;
+ }
+
+ public <T extends XXDBBase> boolean hasAccess(T targetDomainObject,
+ Permission.permissionType permission) {
+ //TODO: Need to review this method and reimplement it properly
+ return true;
+ }
+
+ public boolean hasAccess(String targetType, Serializable targetId,
+ Permission.permissionType permission) {
+ try {
+ Class<?> clazz = Class.forName(targetType);
+ Class<? extends XXDBBase> gjClazz = clazz.asSubclass(XXDBBase.class);
+ return hasAccess(gjClazz, targetId, permission);
+
+ } catch (ClassNotFoundException cfe) {
+ logger.error("class not found:" + targetType, cfe);
+ } catch (Exception e) {
+ logger.error("Excepion targetType:" + targetType + " targetId:"
+ + targetId, e);
+ }
+
+ return false;
+ }
+
+ public boolean hasAccess(Class<? extends XXDBBase> targetClass,
+ Serializable targetId, Permission.permissionType permission) {
+ try {
+ Class<? extends XXDBBase> gjClazz = targetClass
+ .asSubclass(XXDBBase.class);
+ XXDBBase base = getDaoManager().getEntityManager().find(gjClazz,
+ targetId);
+ return hasAccess(base, permission);
+
+ } catch (Exception e) {
+ logger.error("Excepion targetType:" + targetClass + " targetId:"
+ + targetId, e);
+ }
+
+ return false;
+ }
+
+ public boolean hasModeratorPermission() {
+ UserSessionBase sess = ContextUtil.getCurrentUserSession();
+ if (sess != null && sess.isUserAdmin()) {
+ return true;
+ }
+ return false;
+ }
+
+}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/security/handler/XADomainObjectSecurityHandler.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/security/handler/XADomainObjectSecurityHandler.java b/security-admin/src/main/java/org/apache/ranger/security/handler/XADomainObjectSecurityHandler.java
deleted file mode 100644
index 04e681f..0000000
--- a/security-admin/src/main/java/org/apache/ranger/security/handler/XADomainObjectSecurityHandler.java
+++ /dev/null
@@ -1,112 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing,
- * software distributed under the License is distributed on an
- * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
- * KIND, either express or implied. See the License for the
- * specific language governing permissions and limitations
- * under the License.
- */
-
- package org.apache.ranger.security.handler;
-
-/**
- *
- */
-
-import java.io.Serializable;
-
-import org.apache.log4j.Logger;
-import org.apache.ranger.biz.XABizUtil;
-import org.apache.ranger.common.ContextUtil;
-import org.apache.ranger.common.PropertiesUtil;
-import org.apache.ranger.common.UserSessionBase;
-import org.apache.ranger.db.XADaoManager;
-import org.apache.ranger.entity.XXDBBase;
-import org.springframework.beans.factory.annotation.Autowired;
-import org.springframework.stereotype.Component;
-
-@Component
-public class XADomainObjectSecurityHandler {
-
- public static Logger logger = Logger
- .getLogger(XADomainObjectSecurityHandler.class);
-
- @Autowired
- public XADaoManager daoManager;
-
- @Autowired
- XABizUtil msBizUtil;
-
- boolean checkParentObject = false;
-
- public XADomainObjectSecurityHandler() {
- checkParentObject = PropertiesUtil.getBooleanProperty(
- "xa.db.access.filter.check.parentobject", checkParentObject);
- }
-
- /**
- * @return the daoManager
- */
- public XADaoManager getDaoManager() {
- return daoManager;
- }
-
- public <T extends XXDBBase> boolean hasAccess(T targetDomainObject,
- Permission.permissionType permission) {
- //TODO: Need to review this method and reimplement it properly
- return true;
- }
-
- public boolean hasAccess(String targetType, Serializable targetId,
- Permission.permissionType permission) {
- try {
- Class<?> clazz = Class.forName(targetType);
- Class<? extends XXDBBase> gjClazz = clazz.asSubclass(XXDBBase.class);
- return hasAccess(gjClazz, targetId, permission);
-
- } catch (ClassNotFoundException cfe) {
- logger.error("class not found:" + targetType, cfe);
- } catch (Exception e) {
- logger.error("Excepion targetType:" + targetType + " targetId:"
- + targetId, e);
- }
-
- return false;
- }
-
- public boolean hasAccess(Class<? extends XXDBBase> targetClass,
- Serializable targetId, Permission.permissionType permission) {
- try {
- Class<? extends XXDBBase> gjClazz = targetClass
- .asSubclass(XXDBBase.class);
- XXDBBase base = getDaoManager().getEntityManager().find(gjClazz,
- targetId);
- return hasAccess(base, permission);
-
- } catch (Exception e) {
- logger.error("Excepion targetType:" + targetClass + " targetId:"
- + targetId, e);
- }
-
- return false;
- }
-
- public boolean hasModeratorPermission() {
- UserSessionBase sess = ContextUtil.getCurrentUserSession();
- if (sess != null && sess.isUserAdmin()) {
- return true;
- }
- return false;
- }
-
-}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/security/listener/SpringEventListener.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/security/listener/SpringEventListener.java b/security-admin/src/main/java/org/apache/ranger/security/listener/SpringEventListener.java
index 1d0623c..ebdabed 100644
--- a/security-admin/src/main/java/org/apache/ranger/security/listener/SpringEventListener.java
+++ b/security-admin/src/main/java/org/apache/ranger/security/listener/SpringEventListener.java
@@ -19,17 +19,17 @@
package org.apache.ranger.security.listener;
-import org.apache.log4j.Logger;
+import org.apache.log4j.Logger;
import org.apache.ranger.biz.SessionMgr;
import org.apache.ranger.entity.XXAuthSession;
-import org.springframework.beans.factory.annotation.Autowired;
-import org.springframework.context.ApplicationListener;
-import org.springframework.security.authentication.event.AbstractAuthenticationEvent;
-import org.springframework.security.authentication.event.AuthenticationFailureBadCredentialsEvent;
-import org.springframework.security.authentication.event.AuthenticationFailureDisabledEvent;
-import org.springframework.security.authentication.event.AuthenticationSuccessEvent;
-import org.springframework.security.core.Authentication;
-import org.springframework.security.web.authentication.WebAuthenticationDetails;
+import org.springframework.beans.factory.annotation.Autowired;
+import org.springframework.context.ApplicationListener;
+import org.springframework.security.authentication.event.AbstractAuthenticationEvent;
+import org.springframework.security.authentication.event.AuthenticationFailureBadCredentialsEvent;
+import org.springframework.security.authentication.event.AuthenticationFailureDisabledEvent;
+import org.springframework.security.authentication.event.AuthenticationSuccessEvent;
+import org.springframework.security.core.Authentication;
+import org.springframework.security.web.authentication.WebAuthenticationDetails;
public class SpringEventListener implements
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/security/standalone/StandaloneSecurityHandler.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/security/standalone/StandaloneSecurityHandler.java b/security-admin/src/main/java/org/apache/ranger/security/standalone/StandaloneSecurityHandler.java
index 3c1cbdc..ee275d3 100644
--- a/security-admin/src/main/java/org/apache/ranger/security/standalone/StandaloneSecurityHandler.java
+++ b/security-admin/src/main/java/org/apache/ranger/security/standalone/StandaloneSecurityHandler.java
@@ -22,23 +22,23 @@
*/
package org.apache.ranger.security.standalone;
-import java.net.InetAddress;
-import java.util.ArrayList;
-import java.util.Collection;
+import java.net.InetAddress;
+import java.util.ArrayList;
+import java.util.Collection;
import org.apache.ranger.biz.SessionMgr;
-import org.apache.ranger.common.XAConstants;
+import org.apache.ranger.common.RangerConstants;
import org.apache.ranger.entity.XXAuthSession;
-import org.springframework.beans.factory.annotation.Autowired;
-import org.springframework.context.ApplicationContext;
-import org.springframework.security.access.ConfigAttribute;
-import org.springframework.security.access.SecurityConfig;
-import org.springframework.security.access.vote.AffirmativeBased;
-import org.springframework.security.authentication.AuthenticationManager;
-import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
-import org.springframework.security.core.Authentication;
-import org.springframework.security.core.context.SecurityContextHolder;
-import org.springframework.stereotype.Component;
+import org.springframework.beans.factory.annotation.Autowired;
+import org.springframework.context.ApplicationContext;
+import org.springframework.security.access.ConfigAttribute;
+import org.springframework.security.access.SecurityConfig;
+import org.springframework.security.access.vote.AffirmativeBased;
+import org.springframework.security.authentication.AuthenticationManager;
+import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
+import org.springframework.security.core.Authentication;
+import org.springframework.security.core.context.SecurityContextHolder;
+import org.springframework.stereotype.Component;
@Component
public class StandaloneSecurityHandler {
@@ -63,7 +63,7 @@ public class StandaloneSecurityHandler {
AffirmativeBased accessDecisionManager = (AffirmativeBased) context
.getBean(ACCESS_DECISION_MANAGER_BEAN_NAME);
Collection<ConfigAttribute> list = new ArrayList<ConfigAttribute>();
- SecurityConfig config = new SecurityConfig(XAConstants.ROLE_SYS_ADMIN);
+ SecurityConfig config = new SecurityConfig(RangerConstants.ROLE_SYS_ADMIN);
list.add(config);
accessDecisionManager.decide(token, null, list);
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthFailureHandler.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthFailureHandler.java b/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthFailureHandler.java
new file mode 100644
index 0000000..d3c188b
--- /dev/null
+++ b/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthFailureHandler.java
@@ -0,0 +1,108 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+ /**
+ *
+ */
+package org.apache.ranger.security.web.authentication;
+
+import java.io.IOException;
+
+import javax.servlet.ServletException;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+import org.apache.log4j.Logger;
+import org.apache.ranger.common.JSONUtil;
+import org.apache.ranger.common.PropertiesUtil;
+import org.apache.ranger.view.VXResponse;
+import org.springframework.beans.factory.annotation.Autowired;
+import org.springframework.security.core.AuthenticationException;
+import org.springframework.security.web.authentication.ExceptionMappingAuthenticationFailureHandler;
+
+/**
+ *
+ *
+ */
+public class RangerAuthFailureHandler extends
+ExceptionMappingAuthenticationFailureHandler {
+ static Logger logger = Logger.getLogger(RangerAuthFailureHandler.class);
+
+ String ajaxLoginfailurePage = null;
+
+ @Autowired
+ JSONUtil jsonUtil;
+
+ public RangerAuthFailureHandler() {
+ super();
+ if (ajaxLoginfailurePage == null) {
+ ajaxLoginfailurePage = PropertiesUtil.getProperty(
+ "xa.ajax.auth.failure.page", "/ajax_failure.jsp");
+ }
+ }
+
+ /*
+ * (non-Javadoc)
+ *
+ * @see org.springframework.security.web.authentication.
+ * ExceptionMappingAuthenticationFailureHandler
+ * #onAuthenticationFailure(javax.servlet.http.HttpServletRequest,
+ * javax.servlet.http.HttpServletResponse,
+ * org.springframework.security.core.AuthenticationException)
+ */
+ @Override
+ public void onAuthenticationFailure(HttpServletRequest request,
+ HttpServletResponse response, AuthenticationException exception)
+ throws IOException, ServletException {
+ String ajaxRequestHeader = request.getHeader("X-Requested-With");
+ if (logger.isDebugEnabled()) {
+ logger.debug("commence() X-Requested-With=" + ajaxRequestHeader);
+ }
+
+ response.setContentType("application/json;charset=UTF-8");
+ response.setHeader("Cache-Control", "no-cache");
+ String jsonResp = "";
+ try {
+ VXResponse vXResponse = new VXResponse();
+ vXResponse.setStatusCode(HttpServletResponse.SC_UNAUTHORIZED);
+ vXResponse.setMsgDesc("Bad Credentials");
+
+ jsonResp = jsonUtil.writeObjectAsString(vXResponse);
+ response.getWriter().write(jsonResp);
+ response.setStatus(HttpServletResponse.SC_UNAUTHORIZED);
+ } catch (IOException e) {
+ logger.info("Error while writing JSON in HttpServletResponse");
+ }
+
+ if (ajaxRequestHeader != null && ajaxRequestHeader.equalsIgnoreCase("XMLHttpRequest")) {
+// if (logger.isDebugEnabled()) {
+// logger.debug("Forwarding AJAX login request failure to "
+// + ajaxLoginfailurePage);
+// }
+// request.getRequestDispatcher(ajaxLoginfailurePage).forward(request,
+// response);
+ if (logger.isDebugEnabled()) {
+ logger.debug("Sending login failed response : " + jsonResp);
+ }
+ } else {
+// super.onAuthenticationFailure(request, response, exception);
+ }
+ }
+
+}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthSuccessHandler.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthSuccessHandler.java b/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthSuccessHandler.java
new file mode 100644
index 0000000..0900cf0
--- /dev/null
+++ b/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthSuccessHandler.java
@@ -0,0 +1,161 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+ /**
+ *
+ */
+package org.apache.ranger.security.web.authentication;
+
+import java.io.IOException;
+
+import javax.servlet.ServletException;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+import org.apache.log4j.Logger;
+import org.apache.ranger.biz.SessionMgr;
+import org.apache.ranger.common.JSONUtil;
+import org.apache.ranger.common.PropertiesUtil;
+import org.apache.ranger.entity.XXAuthSession;
+import org.apache.ranger.view.VXResponse;
+import org.springframework.beans.factory.annotation.Autowired;
+import org.springframework.security.core.Authentication;
+import org.springframework.security.web.authentication.SavedRequestAwareAuthenticationSuccessHandler;
+import org.springframework.security.web.authentication.WebAuthenticationDetails;
+
+/**
+ *
+ *
+ */
+public class RangerAuthSuccessHandler extends
+SavedRequestAwareAuthenticationSuccessHandler {
+ static Logger logger = Logger.getLogger(RangerAuthSuccessHandler.class);
+
+ String ajaxLoginSuccessPage = null;
+
+ @Autowired
+ SessionMgr sessionMgr;
+
+ @Autowired
+ JSONUtil jsonUtil;
+
+ public RangerAuthSuccessHandler() {
+ super();
+ if (ajaxLoginSuccessPage == null) {
+ ajaxLoginSuccessPage = PropertiesUtil.getProperty(
+ "xa.ajax.auth.success.page", "/ajax_success.html");
+ }
+ }
+
+ /*
+ * (non-Javadoc)
+ *
+ * @see org.springframework.security.web.authentication.
+ * SavedRequestAwareAuthenticationSuccessHandler
+ * #onAuthenticationSuccess(javax.servlet.http.HttpServletRequest,
+ * javax.servlet.http.HttpServletResponse,
+ * org.springframework.security.core.Authentication)
+ */
+ @Override
+ public void onAuthenticationSuccess(HttpServletRequest request,
+ HttpServletResponse response, Authentication authentication)
+ throws ServletException, IOException {
+
+ WebAuthenticationDetails details = (WebAuthenticationDetails) authentication
+ .getDetails();
+ String remoteAddress = details != null ? details.getRemoteAddress()
+ : "";
+ String sessionId = details != null ? details.getSessionId() : "";
+
+ boolean isValidUser = sessionMgr.isValidXAUser(authentication.getName());
+
+ response.setContentType("application/json;charset=UTF-8");
+ response.setHeader("Cache-Control", "no-cache");
+
+ VXResponse vXResponse = new VXResponse();
+
+ if(!isValidUser) {
+ sessionMgr.processFailureLogin(
+ XXAuthSession.AUTH_STATUS_USER_NOT_FOUND,
+ XXAuthSession.AUTH_TYPE_PASSWORD, authentication.getName(),
+ remoteAddress, sessionId);
+ authentication.setAuthenticated(false);
+
+ vXResponse.setStatusCode(HttpServletResponse.SC_PRECONDITION_FAILED);
+ vXResponse.setMsgDesc("Auth Succeeded but user is not synced yet for " + authentication.getName());
+
+ response.setStatus(HttpServletResponse.SC_PRECONDITION_FAILED);
+ response.getWriter().write(jsonUtil.writeObjectAsString(vXResponse));
+
+ // response.sendError(HttpServletResponse.SC_PRECONDITION_FAILED);
+ logger.info("Auth Succeeded but user is not synced yet for "
+ + authentication.getName());
+
+ } else {
+
+ String ajaxRequestHeader = request.getHeader("X-Requested-With");
+ if (logger.isDebugEnabled()) {
+ logger.debug("commence() X-Requested-With=" + ajaxRequestHeader);
+ }
+ if (ajaxRequestHeader != null && ajaxRequestHeader.equalsIgnoreCase("XMLHttpRequest")) {
+ // if (logger.isDebugEnabled()) {
+ // logger.debug("Forwarding AJAX login request success to "
+ // + ajaxLoginSuccessPage + " for user "
+ // + authentication.getName());
+ // }
+ // request.getRequestDispatcher(ajaxLoginSuccessPage).forward(request,
+ // response);
+
+ String jsonResp = "";
+ try {
+ vXResponse.setStatusCode(HttpServletResponse.SC_OK);
+ vXResponse.setMsgDesc("Login Successful");
+
+ response.setStatus(HttpServletResponse.SC_OK);
+ jsonResp = jsonUtil.writeObjectAsString(vXResponse);
+ response.getWriter().write(jsonResp);
+ } catch (IOException e) {
+ logger.info("Error while writing JSON in HttpServletResponse");
+ }
+ if (logger.isDebugEnabled()) {
+ logger.debug("Sending login success response : " + jsonResp);
+ }
+ clearAuthenticationAttributes(request);
+ } else {
+ String jsonResp = "";
+ try {
+ vXResponse.setStatusCode(HttpServletResponse.SC_OK);
+ vXResponse.setMsgDesc("Login Successful");
+
+ response.setStatus(HttpServletResponse.SC_OK);
+ jsonResp = jsonUtil.writeObjectAsString(vXResponse);
+ response.getWriter().write(jsonResp);
+ } catch (IOException e) {
+ logger.info("Error while writing JSON in HttpServletResponse");
+ }
+ if (logger.isDebugEnabled()) {
+ logger.debug("Sending login success response : " + jsonResp);
+ }
+ // super.onAuthenticationSuccess(request, response,
+ // authentication);
+ }
+ }
+ }
+
+}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthenticationEntryPoint.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthenticationEntryPoint.java b/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthenticationEntryPoint.java
new file mode 100644
index 0000000..4ac24e8
--- /dev/null
+++ b/security-admin/src/main/java/org/apache/ranger/security/web/authentication/RangerAuthenticationEntryPoint.java
@@ -0,0 +1,106 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+ /**
+ *
+ */
+package org.apache.ranger.security.web.authentication;
+
+import java.io.IOException;
+
+import javax.servlet.ServletException;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpServletResponse;
+
+import org.apache.log4j.Logger;
+import org.apache.ranger.common.JSONUtil;
+import org.apache.ranger.common.PropertiesUtil;
+import org.apache.ranger.common.RangerConfigUtil;
+import org.apache.ranger.view.VXResponse;
+import org.springframework.beans.factory.annotation.Autowired;
+import org.springframework.security.core.AuthenticationException;
+import org.springframework.security.web.authentication.LoginUrlAuthenticationEntryPoint;
+
+
+/**
+ *
+ *
+ */
+public class RangerAuthenticationEntryPoint extends
+LoginUrlAuthenticationEntryPoint {
+ static Logger logger = Logger.getLogger(RangerAuthenticationEntryPoint.class);
+ static int ajaxReturnCode = -1;
+
+ @Autowired
+ RangerConfigUtil configUtil;
+
+ @Autowired
+ JSONUtil jsonUtil;
+
+ public RangerAuthenticationEntryPoint() {
+ super();
+ if (logger.isDebugEnabled()) {
+ logger.debug("AjaxAwareAuthenticationEntryPoint(): constructor");
+ }
+
+ if (ajaxReturnCode < 0) {
+ ajaxReturnCode = PropertiesUtil.getIntProperty(
+ "xa.ajax.auth.required.code", 401);
+ }
+ }
+
+ @Override
+ public void commence(HttpServletRequest request,
+ HttpServletResponse response, AuthenticationException authException)
+ throws IOException, ServletException {
+ String ajaxRequestHeader = request.getHeader("X-Requested-With");
+ if (logger.isDebugEnabled()) {
+ logger.debug("commence() X-Requested-With=" + ajaxRequestHeader);
+ }
+
+ String requestURL = (request.getRequestURL() != null) ? request.getRequestURL().toString() : "";
+ String servletPath = PropertiesUtil.getProperty("xa.servlet.mapping.url.pattern", "service");
+ String reqServletPath = configUtil.getWebAppRootURL() + "/" + servletPath;
+
+ response.setContentType("application/json;charset=UTF-8");
+ response.setHeader("Cache-Control", "no-cache");
+ try {
+
+ VXResponse vXResponse = new VXResponse();
+
+ vXResponse.setStatusCode(HttpServletResponse.SC_UNAUTHORIZED);
+ vXResponse.setMsgDesc("Authentication Failed");
+
+ response.setStatus(HttpServletResponse.SC_UNAUTHORIZED);
+ response.getWriter().write(jsonUtil.writeObjectAsString(vXResponse));
+ } catch (IOException e) {
+ logger.info("Error while writing JSON in HttpServletResponse");
+ }
+
+ if (ajaxRequestHeader != null && ajaxRequestHeader.equalsIgnoreCase("XMLHttpRequest")) {
+ if (logger.isDebugEnabled()) {
+ logger.debug("commence() AJAX request. Authentication required. Returning "
+ + ajaxReturnCode + ". URL=" + request.getRequestURI());
+ }
+ response.sendError(ajaxReturnCode, "");
+ } else if(!(requestURL.startsWith(reqServletPath))) {
+ super.commence(request, response, authException);
+ }
+ }
+}
\ No newline at end of file
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/security/web/authentication/XAAuthFailureHandler.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/security/web/authentication/XAAuthFailureHandler.java b/security-admin/src/main/java/org/apache/ranger/security/web/authentication/XAAuthFailureHandler.java
deleted file mode 100644
index 720cfc4..0000000
--- a/security-admin/src/main/java/org/apache/ranger/security/web/authentication/XAAuthFailureHandler.java
+++ /dev/null
@@ -1,108 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing,
- * software distributed under the License is distributed on an
- * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
- * KIND, either express or implied. See the License for the
- * specific language governing permissions and limitations
- * under the License.
- */
-
- /**
- *
- */
-package org.apache.ranger.security.web.authentication;
-
-import java.io.IOException;
-
-import javax.servlet.ServletException;
-import javax.servlet.http.HttpServletRequest;
-import javax.servlet.http.HttpServletResponse;
-
-import org.apache.log4j.Logger;
-import org.apache.ranger.common.JSONUtil;
-import org.apache.ranger.common.PropertiesUtil;
-import org.apache.ranger.view.VXResponse;
-import org.springframework.beans.factory.annotation.Autowired;
-import org.springframework.security.core.AuthenticationException;
-import org.springframework.security.web.authentication.ExceptionMappingAuthenticationFailureHandler;
-
-/**
- *
- *
- */
-public class XAAuthFailureHandler extends
-ExceptionMappingAuthenticationFailureHandler {
- static Logger logger = Logger.getLogger(XAAuthFailureHandler.class);
-
- String ajaxLoginfailurePage = null;
-
- @Autowired
- JSONUtil jsonUtil;
-
- public XAAuthFailureHandler() {
- super();
- if (ajaxLoginfailurePage == null) {
- ajaxLoginfailurePage = PropertiesUtil.getProperty(
- "xa.ajax.auth.failure.page", "/ajax_failure.jsp");
- }
- }
-
- /*
- * (non-Javadoc)
- *
- * @see org.springframework.security.web.authentication.
- * ExceptionMappingAuthenticationFailureHandler
- * #onAuthenticationFailure(javax.servlet.http.HttpServletRequest,
- * javax.servlet.http.HttpServletResponse,
- * org.springframework.security.core.AuthenticationException)
- */
- @Override
- public void onAuthenticationFailure(HttpServletRequest request,
- HttpServletResponse response, AuthenticationException exception)
- throws IOException, ServletException {
- String ajaxRequestHeader = request.getHeader("X-Requested-With");
- if (logger.isDebugEnabled()) {
- logger.debug("commence() X-Requested-With=" + ajaxRequestHeader);
- }
-
- response.setContentType("application/json;charset=UTF-8");
- response.setHeader("Cache-Control", "no-cache");
- String jsonResp = "";
- try {
- VXResponse vXResponse = new VXResponse();
- vXResponse.setStatusCode(HttpServletResponse.SC_UNAUTHORIZED);
- vXResponse.setMsgDesc("Bad Credentials");
-
- jsonResp = jsonUtil.writeObjectAsString(vXResponse);
- response.getWriter().write(jsonResp);
- response.setStatus(HttpServletResponse.SC_UNAUTHORIZED);
- } catch (IOException e) {
- logger.info("Error while writing JSON in HttpServletResponse");
- }
-
- if (ajaxRequestHeader != null && ajaxRequestHeader.equalsIgnoreCase("XMLHttpRequest")) {
-// if (logger.isDebugEnabled()) {
-// logger.debug("Forwarding AJAX login request failure to "
-// + ajaxLoginfailurePage);
-// }
-// request.getRequestDispatcher(ajaxLoginfailurePage).forward(request,
-// response);
- if (logger.isDebugEnabled()) {
- logger.debug("Sending login failed response : " + jsonResp);
- }
- } else {
-// super.onAuthenticationFailure(request, response, exception);
- }
- }
-
-}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/security/web/authentication/XAAuthSuccessHandler.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/security/web/authentication/XAAuthSuccessHandler.java b/security-admin/src/main/java/org/apache/ranger/security/web/authentication/XAAuthSuccessHandler.java
deleted file mode 100644
index 9d42aca..0000000
--- a/security-admin/src/main/java/org/apache/ranger/security/web/authentication/XAAuthSuccessHandler.java
+++ /dev/null
@@ -1,161 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing,
- * software distributed under the License is distributed on an
- * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
- * KIND, either express or implied. See the License for the
- * specific language governing permissions and limitations
- * under the License.
- */
-
- /**
- *
- */
-package org.apache.ranger.security.web.authentication;
-
-import java.io.IOException;
-
-import javax.servlet.ServletException;
-import javax.servlet.http.HttpServletRequest;
-import javax.servlet.http.HttpServletResponse;
-
-import org.apache.log4j.Logger;
-import org.apache.ranger.biz.SessionMgr;
-import org.apache.ranger.common.JSONUtil;
-import org.apache.ranger.common.PropertiesUtil;
-import org.apache.ranger.entity.XXAuthSession;
-import org.apache.ranger.view.VXResponse;
-import org.springframework.beans.factory.annotation.Autowired;
-import org.springframework.security.core.Authentication;
-import org.springframework.security.web.authentication.SavedRequestAwareAuthenticationSuccessHandler;
-import org.springframework.security.web.authentication.WebAuthenticationDetails;
-
-/**
- *
- *
- */
-public class XAAuthSuccessHandler extends
-SavedRequestAwareAuthenticationSuccessHandler {
- static Logger logger = Logger.getLogger(XAAuthSuccessHandler.class);
-
- String ajaxLoginSuccessPage = null;
-
- @Autowired
- SessionMgr sessionMgr;
-
- @Autowired
- JSONUtil jsonUtil;
-
- public XAAuthSuccessHandler() {
- super();
- if (ajaxLoginSuccessPage == null) {
- ajaxLoginSuccessPage = PropertiesUtil.getProperty(
- "xa.ajax.auth.success.page", "/ajax_success.html");
- }
- }
-
- /*
- * (non-Javadoc)
- *
- * @see org.springframework.security.web.authentication.
- * SavedRequestAwareAuthenticationSuccessHandler
- * #onAuthenticationSuccess(javax.servlet.http.HttpServletRequest,
- * javax.servlet.http.HttpServletResponse,
- * org.springframework.security.core.Authentication)
- */
- @Override
- public void onAuthenticationSuccess(HttpServletRequest request,
- HttpServletResponse response, Authentication authentication)
- throws ServletException, IOException {
-
- WebAuthenticationDetails details = (WebAuthenticationDetails) authentication
- .getDetails();
- String remoteAddress = details != null ? details.getRemoteAddress()
- : "";
- String sessionId = details != null ? details.getSessionId() : "";
-
- boolean isValidUser = sessionMgr.isValidXAUser(authentication.getName());
-
- response.setContentType("application/json;charset=UTF-8");
- response.setHeader("Cache-Control", "no-cache");
-
- VXResponse vXResponse = new VXResponse();
-
- if(!isValidUser) {
- sessionMgr.processFailureLogin(
- XXAuthSession.AUTH_STATUS_USER_NOT_FOUND,
- XXAuthSession.AUTH_TYPE_PASSWORD, authentication.getName(),
- remoteAddress, sessionId);
- authentication.setAuthenticated(false);
-
- vXResponse.setStatusCode(HttpServletResponse.SC_PRECONDITION_FAILED);
- vXResponse.setMsgDesc("Auth Succeeded but user is not synced yet for " + authentication.getName());
-
- response.setStatus(HttpServletResponse.SC_PRECONDITION_FAILED);
- response.getWriter().write(jsonUtil.writeObjectAsString(vXResponse));
-
- // response.sendError(HttpServletResponse.SC_PRECONDITION_FAILED);
- logger.info("Auth Succeeded but user is not synced yet for "
- + authentication.getName());
-
- } else {
-
- String ajaxRequestHeader = request.getHeader("X-Requested-With");
- if (logger.isDebugEnabled()) {
- logger.debug("commence() X-Requested-With=" + ajaxRequestHeader);
- }
- if (ajaxRequestHeader != null && ajaxRequestHeader.equalsIgnoreCase("XMLHttpRequest")) {
- // if (logger.isDebugEnabled()) {
- // logger.debug("Forwarding AJAX login request success to "
- // + ajaxLoginSuccessPage + " for user "
- // + authentication.getName());
- // }
- // request.getRequestDispatcher(ajaxLoginSuccessPage).forward(request,
- // response);
-
- String jsonResp = "";
- try {
- vXResponse.setStatusCode(HttpServletResponse.SC_OK);
- vXResponse.setMsgDesc("Login Successful");
-
- response.setStatus(HttpServletResponse.SC_OK);
- jsonResp = jsonUtil.writeObjectAsString(vXResponse);
- response.getWriter().write(jsonResp);
- } catch (IOException e) {
- logger.info("Error while writing JSON in HttpServletResponse");
- }
- if (logger.isDebugEnabled()) {
- logger.debug("Sending login success response : " + jsonResp);
- }
- clearAuthenticationAttributes(request);
- } else {
- String jsonResp = "";
- try {
- vXResponse.setStatusCode(HttpServletResponse.SC_OK);
- vXResponse.setMsgDesc("Login Successful");
-
- response.setStatus(HttpServletResponse.SC_OK);
- jsonResp = jsonUtil.writeObjectAsString(vXResponse);
- response.getWriter().write(jsonResp);
- } catch (IOException e) {
- logger.info("Error while writing JSON in HttpServletResponse");
- }
- if (logger.isDebugEnabled()) {
- logger.debug("Sending login success response : " + jsonResp);
- }
- // super.onAuthenticationSuccess(request, response,
- // authentication);
- }
- }
- }
-
-}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/security/web/authentication/XAAuthenticationEntryPoint.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/security/web/authentication/XAAuthenticationEntryPoint.java b/security-admin/src/main/java/org/apache/ranger/security/web/authentication/XAAuthenticationEntryPoint.java
deleted file mode 100644
index 3a460bc..0000000
--- a/security-admin/src/main/java/org/apache/ranger/security/web/authentication/XAAuthenticationEntryPoint.java
+++ /dev/null
@@ -1,106 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing,
- * software distributed under the License is distributed on an
- * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
- * KIND, either express or implied. See the License for the
- * specific language governing permissions and limitations
- * under the License.
- */
-
- /**
- *
- */
-package org.apache.ranger.security.web.authentication;
-
-import java.io.IOException;
-
-import javax.servlet.ServletException;
-import javax.servlet.http.HttpServletRequest;
-import javax.servlet.http.HttpServletResponse;
-
-import org.apache.log4j.Logger;
-import org.apache.ranger.common.JSONUtil;
-import org.apache.ranger.common.PropertiesUtil;
-import org.apache.ranger.common.XAConfigUtil;
-import org.apache.ranger.view.VXResponse;
-import org.springframework.beans.factory.annotation.Autowired;
-import org.springframework.security.core.AuthenticationException;
-import org.springframework.security.web.authentication.LoginUrlAuthenticationEntryPoint;
-
-
-/**
- *
- *
- */
-public class XAAuthenticationEntryPoint extends
-LoginUrlAuthenticationEntryPoint {
- static Logger logger = Logger.getLogger(XAAuthenticationEntryPoint.class);
- static int ajaxReturnCode = -1;
-
- @Autowired
- XAConfigUtil configUtil;
-
- @Autowired
- JSONUtil jsonUtil;
-
- public XAAuthenticationEntryPoint() {
- super();
- if (logger.isDebugEnabled()) {
- logger.debug("AjaxAwareAuthenticationEntryPoint(): constructor");
- }
-
- if (ajaxReturnCode < 0) {
- ajaxReturnCode = PropertiesUtil.getIntProperty(
- "xa.ajax.auth.required.code", 401);
- }
- }
-
- @Override
- public void commence(HttpServletRequest request,
- HttpServletResponse response, AuthenticationException authException)
- throws IOException, ServletException {
- String ajaxRequestHeader = request.getHeader("X-Requested-With");
- if (logger.isDebugEnabled()) {
- logger.debug("commence() X-Requested-With=" + ajaxRequestHeader);
- }
-
- String requestURL = (request.getRequestURL() != null) ? request.getRequestURL().toString() : "";
- String servletPath = PropertiesUtil.getProperty("xa.servlet.mapping.url.pattern", "service");
- String reqServletPath = configUtil.getWebAppRootURL() + "/" + servletPath;
-
- response.setContentType("application/json;charset=UTF-8");
- response.setHeader("Cache-Control", "no-cache");
- try {
-
- VXResponse vXResponse = new VXResponse();
-
- vXResponse.setStatusCode(HttpServletResponse.SC_UNAUTHORIZED);
- vXResponse.setMsgDesc("Authentication Failed");
-
- response.setStatus(HttpServletResponse.SC_UNAUTHORIZED);
- response.getWriter().write(jsonUtil.writeObjectAsString(vXResponse));
- } catch (IOException e) {
- logger.info("Error while writing JSON in HttpServletResponse");
- }
-
- if (ajaxRequestHeader != null && ajaxRequestHeader.equalsIgnoreCase("XMLHttpRequest")) {
- if (logger.isDebugEnabled()) {
- logger.debug("commence() AJAX request. Authentication required. Returning "
- + ajaxReturnCode + ". URL=" + request.getRequestURI());
- }
- response.sendError(ajaxReturnCode, "");
- } else if(!(requestURL.startsWith(reqServletPath))) {
- super.commence(request, response, authException);
- }
- }
-}
\ No newline at end of file
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerSecurityContextFormationFilter.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerSecurityContextFormationFilter.java b/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerSecurityContextFormationFilter.java
new file mode 100644
index 0000000..9febc23
--- /dev/null
+++ b/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerSecurityContextFormationFilter.java
@@ -0,0 +1,137 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+ /**
+ *
+ */
+package org.apache.ranger.security.web.filter;
+
+import java.io.IOException;
+
+import javax.servlet.FilterChain;
+import javax.servlet.ServletException;
+import javax.servlet.ServletRequest;
+import javax.servlet.ServletResponse;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.HttpSession;
+
+import org.apache.log4j.Logger;
+import org.apache.ranger.biz.SessionMgr;
+import org.apache.ranger.common.GUIDUtil;
+import org.apache.ranger.common.HTTPUtil;
+import org.apache.ranger.common.PropertiesUtil;
+import org.apache.ranger.common.RequestContext;
+import org.apache.ranger.common.UserSessionBase;
+import org.apache.ranger.entity.XXAuthSession;
+import org.apache.ranger.security.context.RangerContextHolder;
+import org.apache.ranger.security.context.RangerSecurityContext;
+import org.apache.ranger.util.RestUtil;
+import org.springframework.beans.factory.annotation.Autowired;
+import org.springframework.security.authentication.AnonymousAuthenticationToken;
+import org.springframework.security.core.Authentication;
+import org.springframework.security.core.context.SecurityContextHolder;
+import org.springframework.web.filter.GenericFilterBean;
+
+public class RangerSecurityContextFormationFilter extends GenericFilterBean {
+
+ static Logger logger = Logger
+ .getLogger(RangerSecurityContextFormationFilter.class);
+
+ public static final String AKA_SC_SESSION_KEY = "AKA_SECURITY_CONTEXT";
+ public static final String USER_AGENT = "User-Agent";
+
+ @Autowired
+ SessionMgr sessionMgr;
+
+ @Autowired
+ HTTPUtil httpUtil;
+
+ String testIP = null;
+
+ public RangerSecurityContextFormationFilter() {
+ testIP = PropertiesUtil.getProperty("xa.env.ip");
+ }
+
+ /*
+ * (non-Javadoc)
+ *
+ * @see javax.servlet.Filter#doFilter(javax.servlet.ServletRequest,
+ * javax.servlet.ServletResponse, javax.servlet.FilterChain)
+ */
+ @Override
+ public void doFilter(ServletRequest request, ServletResponse response,
+ FilterChain chain) throws IOException, ServletException {
+
+ try {
+ Authentication auth = SecurityContextHolder.getContext()
+ .getAuthentication();
+
+ if (auth instanceof AnonymousAuthenticationToken) {
+ // ignore
+ } else {
+ HttpServletRequest httpRequest = (HttpServletRequest) request;
+ HttpSession httpSession = httpRequest.getSession(false);
+
+ // [1]get the context from session
+ RangerSecurityContext context = (RangerSecurityContext) httpSession.getAttribute(AKA_SC_SESSION_KEY);
+ int clientTimeOffset = 0;
+ if (context == null) {
+ context = new RangerSecurityContext();
+ httpSession.setAttribute(AKA_SC_SESSION_KEY, context);
+ }
+ String userAgent = httpRequest.getHeader(USER_AGENT);
+ if(httpRequest!=null){
+ clientTimeOffset=RestUtil.getTimeOffset(httpRequest);
+
+ }
+ // Get the request specific info
+ RequestContext requestContext = new RequestContext();
+ String reqIP = testIP;
+ if (testIP == null) {
+ reqIP = httpRequest.getRemoteAddr();
+ }
+ requestContext.setIpAddress(reqIP);
+ requestContext.setUserAgent(userAgent);
+ requestContext.setDeviceType(httpUtil
+ .getDeviceType(httpRequest));
+ requestContext.setServerRequestId(GUIDUtil.genGUI());
+ requestContext.setRequestURL(httpRequest.getRequestURI());
+
+ requestContext.setClientTimeOffsetInMinute(clientTimeOffset);
+ context.setRequestContext(requestContext);
+
+ RangerContextHolder.setSecurityContext(context);
+
+ UserSessionBase userSession = sessionMgr.processSuccessLogin(
+ XXAuthSession.AUTH_TYPE_PASSWORD, userAgent);
+
+ if(userSession!=null && userSession.getClientTimeOffsetInMinute()==0){
+ userSession.setClientTimeOffsetInMinute(clientTimeOffset);
+ }
+
+ context.setUserSession(userSession);
+ }
+ chain.doFilter(request, response);
+
+ } finally {
+ // [4]remove context from thread-local
+ RangerContextHolder.resetSecurityContext();
+ }
+ }
+}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerUsernamePasswordAuthenticationFilter.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerUsernamePasswordAuthenticationFilter.java b/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerUsernamePasswordAuthenticationFilter.java
new file mode 100644
index 0000000..b3fcbf2
--- /dev/null
+++ b/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerUsernamePasswordAuthenticationFilter.java
@@ -0,0 +1,52 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+ /**
+ *
+ */
+package org.apache.ranger.security.web.filter;
+
+import org.apache.log4j.Logger;
+import org.springframework.security.web.authentication.RememberMeServices;
+import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;
+
+public class RangerUsernamePasswordAuthenticationFilter extends
+ UsernamePasswordAuthenticationFilter {
+
+ static Logger logger = Logger
+ .getLogger(RangerUsernamePasswordAuthenticationFilter.class);
+
+ /*
+ * (non-Javadoc)
+ *
+ * @see org.springframework.security.web.authentication.
+ * AbstractAuthenticationProcessingFilter
+ * #setRememberMeServices(org.springframework
+ * .security.web.authentication.RememberMeServices)
+ */
+ @Override
+ public void setRememberMeServices(RememberMeServices rememberMeServices) {
+ if (logger.isDebugEnabled()) {
+ logger.debug("setRememberMeServices() enter: rememberMeServices="
+ + rememberMeServices.toString());
+ }
+ super.setRememberMeServices(rememberMeServices);
+ }
+
+}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/security/web/filter/XASecurityContextFormationFilter.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/security/web/filter/XASecurityContextFormationFilter.java b/security-admin/src/main/java/org/apache/ranger/security/web/filter/XASecurityContextFormationFilter.java
deleted file mode 100644
index 343278d..0000000
--- a/security-admin/src/main/java/org/apache/ranger/security/web/filter/XASecurityContextFormationFilter.java
+++ /dev/null
@@ -1,139 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing,
- * software distributed under the License is distributed on an
- * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
- * KIND, either express or implied. See the License for the
- * specific language governing permissions and limitations
- * under the License.
- */
-
- /**
- *
- */
-package org.apache.ranger.security.web.filter;
-
-import java.io.IOException;
-
-import javax.servlet.FilterChain;
-import javax.servlet.ServletException;
-import javax.servlet.ServletRequest;
-import javax.servlet.ServletResponse;
-import javax.servlet.http.Cookie;
-import javax.servlet.http.HttpServletRequest;
-import javax.servlet.http.HttpServletResponse;
-import javax.servlet.http.HttpSession;
-
-import org.apache.log4j.Logger;
-import org.apache.ranger.biz.SessionMgr;
-import org.apache.ranger.common.GUIDUtil;
-import org.apache.ranger.common.HTTPUtil;
-import org.apache.ranger.common.PropertiesUtil;
-import org.apache.ranger.common.RequestContext;
-import org.apache.ranger.common.UserSessionBase;
-import org.apache.ranger.entity.XXAuthSession;
-import org.apache.ranger.security.context.XAContextHolder;
-import org.apache.ranger.security.context.XASecurityContext;
-import org.apache.ranger.util.RestUtil;
-import org.springframework.beans.factory.annotation.Autowired;
-import org.springframework.security.authentication.AnonymousAuthenticationToken;
-import org.springframework.security.core.Authentication;
-import org.springframework.security.core.context.SecurityContextHolder;
-import org.springframework.web.filter.GenericFilterBean;
-
-public class XASecurityContextFormationFilter extends GenericFilterBean {
-
- static Logger logger = Logger
- .getLogger(XASecurityContextFormationFilter.class);
-
- public static final String AKA_SC_SESSION_KEY = "AKA_SECURITY_CONTEXT";
- public static final String USER_AGENT = "User-Agent";
-
- @Autowired
- SessionMgr sessionMgr;
-
- @Autowired
- HTTPUtil httpUtil;
-
- String testIP = null;
-
- public XASecurityContextFormationFilter() {
- testIP = PropertiesUtil.getProperty("xa.env.ip");
- }
-
- /*
- * (non-Javadoc)
- *
- * @see javax.servlet.Filter#doFilter(javax.servlet.ServletRequest,
- * javax.servlet.ServletResponse, javax.servlet.FilterChain)
- */
- @Override
- public void doFilter(ServletRequest request, ServletResponse response,
- FilterChain chain) throws IOException, ServletException {
-
- try {
- Authentication auth = SecurityContextHolder.getContext()
- .getAuthentication();
-
- if (auth instanceof AnonymousAuthenticationToken) {
- // ignore
- } else {
- HttpServletRequest httpRequest = (HttpServletRequest) request;
- HttpSession httpSession = httpRequest.getSession(false);
-
- // [1]get the context from session
- XASecurityContext context = (XASecurityContext) httpSession.getAttribute(AKA_SC_SESSION_KEY);
- int clientTimeOffset = 0;
- if (context == null) {
- context = new XASecurityContext();
- httpSession.setAttribute(AKA_SC_SESSION_KEY, context);
- }
- String userAgent = httpRequest.getHeader(USER_AGENT);
- if(httpRequest!=null){
- clientTimeOffset=RestUtil.getTimeOffset(httpRequest);
-
- }
- // Get the request specific info
- RequestContext requestContext = new RequestContext();
- String reqIP = testIP;
- if (testIP == null) {
- reqIP = httpRequest.getRemoteAddr();
- }
- requestContext.setIpAddress(reqIP);
- requestContext.setUserAgent(userAgent);
- requestContext.setDeviceType(httpUtil
- .getDeviceType(httpRequest));
- requestContext.setServerRequestId(GUIDUtil.genGUI());
- requestContext.setRequestURL(httpRequest.getRequestURI());
-
- requestContext.setClientTimeOffsetInMinute(clientTimeOffset);
- context.setRequestContext(requestContext);
-
- XAContextHolder.setSecurityContext(context);
-
- UserSessionBase userSession = sessionMgr.processSuccessLogin(
- XXAuthSession.AUTH_TYPE_PASSWORD, userAgent);
-
- if(userSession!=null && userSession.getClientTimeOffsetInMinute()==0){
- userSession.setClientTimeOffsetInMinute(clientTimeOffset);
- }
-
- context.setUserSession(userSession);
- }
- chain.doFilter(request, response);
-
- } finally {
- // [4]remove context from thread-local
- XAContextHolder.resetSecurityContext();
- }
- }
-}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/security/web/filter/XAUsernamePasswordAuthenticationFilter.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/security/web/filter/XAUsernamePasswordAuthenticationFilter.java b/security-admin/src/main/java/org/apache/ranger/security/web/filter/XAUsernamePasswordAuthenticationFilter.java
deleted file mode 100644
index 2b28397..0000000
--- a/security-admin/src/main/java/org/apache/ranger/security/web/filter/XAUsernamePasswordAuthenticationFilter.java
+++ /dev/null
@@ -1,52 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing,
- * software distributed under the License is distributed on an
- * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
- * KIND, either express or implied. See the License for the
- * specific language governing permissions and limitations
- * under the License.
- */
-
- /**
- *
- */
-package org.apache.ranger.security.web.filter;
-
-import org.apache.log4j.Logger;
-import org.springframework.security.web.authentication.RememberMeServices;
-import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;
-
-public class XAUsernamePasswordAuthenticationFilter extends
- UsernamePasswordAuthenticationFilter {
-
- static Logger logger = Logger
- .getLogger(XAUsernamePasswordAuthenticationFilter.class);
-
- /*
- * (non-Javadoc)
- *
- * @see org.springframework.security.web.authentication.
- * AbstractAuthenticationProcessingFilter
- * #setRememberMeServices(org.springframework
- * .security.web.authentication.RememberMeServices)
- */
- @Override
- public void setRememberMeServices(RememberMeServices rememberMeServices) {
- if (logger.isDebugEnabled()) {
- logger.debug("setRememberMeServices() enter: rememberMeServices="
- + rememberMeServices.toString());
- }
- super.setRememberMeServices(rememberMeServices);
- }
-
-}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/AbstractBaseResourceService.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/AbstractBaseResourceService.java b/security-admin/src/main/java/org/apache/ranger/service/AbstractBaseResourceService.java
index 669e1e7..0ddfb0e 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/AbstractBaseResourceService.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/AbstractBaseResourceService.java
@@ -39,27 +39,27 @@ import javax.persistence.criteria.Predicate;
import javax.persistence.criteria.Root;
import org.apache.log4j.Logger;
-import org.apache.ranger.biz.XABizUtil;
+import org.apache.ranger.biz.RangerBizUtil;
import org.apache.ranger.common.ContextUtil;
import org.apache.ranger.common.DateUtil;
import org.apache.ranger.common.MessageEnums;
import org.apache.ranger.common.RESTErrorUtil;
+import org.apache.ranger.common.RangerConfigUtil;
import org.apache.ranger.common.SearchCriteria;
import org.apache.ranger.common.SearchField;
import org.apache.ranger.common.SearchUtil;
import org.apache.ranger.common.SortField;
+import org.apache.ranger.common.SortField.SORT_ORDER;
import org.apache.ranger.common.StringUtil;
import org.apache.ranger.common.UserSessionBase;
-import org.apache.ranger.common.XAConfigUtil;
-import org.apache.ranger.common.SortField.SORT_ORDER;
import org.apache.ranger.common.db.BaseDao;
import org.apache.ranger.common.view.VList;
-import org.apache.ranger.db.XADaoManager;
+import org.apache.ranger.db.RangerDaoManager;
import org.apache.ranger.entity.XXAuthSession;
import org.apache.ranger.entity.XXDBBase;
import org.apache.ranger.entity.XXPortalUser;
import org.apache.ranger.security.handler.Permission;
-import org.apache.ranger.security.handler.XADomainObjectSecurityHandler;
+import org.apache.ranger.security.handler.RangerDomainObjectSecurityHandler;
import org.apache.ranger.view.VXDataObject;
import org.apache.ranger.view.VXLong;
import org.springframework.beans.factory.annotation.Autowired;
@@ -88,7 +88,7 @@ public abstract class AbstractBaseResourceService<T extends XXDBBase, V extends
public List<SearchField> searchFields = new ArrayList<SearchField>();
@Autowired
- XADaoManager daoManager;
+ RangerDaoManager daoManager;
protected static final HashMap<Class<?>, String> tEntityValueMap = new HashMap<Class<?>, String>();
static {
@@ -102,7 +102,7 @@ public abstract class AbstractBaseResourceService<T extends XXDBBase, V extends
StringUtil stringUtil;
@Autowired
- protected XADaoManager daoMgr;
+ protected RangerDaoManager daoMgr;
@Autowired
protected SearchUtil searchUtil;
@@ -111,13 +111,13 @@ public abstract class AbstractBaseResourceService<T extends XXDBBase, V extends
protected RESTErrorUtil restErrorUtil;
@Autowired
- XADomainObjectSecurityHandler objectSecurityHandler;
+ RangerDomainObjectSecurityHandler objectSecurityHandler;
@Autowired
- XABizUtil bizUtil;
+ RangerBizUtil bizUtil;
@Autowired
- XAConfigUtil msConfigUtil;
+ RangerConfigUtil msConfigUtil;
protected abstract void validateForCreate(V viewBaseBean);
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/AuthSessionService.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/AuthSessionService.java b/security-admin/src/main/java/org/apache/ranger/service/AuthSessionService.java
index ddab7e9..c590bbc 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/AuthSessionService.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/AuthSessionService.java
@@ -22,11 +22,11 @@
import java.util.ArrayList;
import java.util.List;
+import org.apache.ranger.common.RangerConstants;
import org.apache.ranger.common.SearchCriteria;
import org.apache.ranger.common.SearchField;
import org.apache.ranger.common.SortField;
import org.apache.ranger.common.StringUtil;
-import org.apache.ranger.common.XAConstants;
import org.apache.ranger.common.db.BaseDao;
import org.apache.ranger.entity.XXAuthSession;
import org.apache.ranger.entity.XXPortalUser;
@@ -66,7 +66,7 @@ public class AuthSessionService extends
"obj.authType", "Authentication Type",
XXAuthSession.AuthType_MAX));
AUTH_SESSION_SEARCH_FLDS.add(SearchField.createEnum("deviceType",
- "obj.deviceType", "Device Type", XAConstants.DeviceType_MAX));
+ "obj.deviceType", "Device Type", RangerConstants.DeviceType_MAX));
AUTH_SESSION_SEARCH_FLDS.add(SearchField.createString("requestIP",
"obj.requestIP", SearchField.SEARCH_TYPE.PARTIAL,
StringUtil.VALIDATION_IP_ADDRESS));
@@ -95,7 +95,7 @@ public class AuthSessionService extends
@Override
protected int getClassType() {
- return XAConstants.CLASS_TYPE_AUTH_SESS;
+ return RangerConstants.CLASS_TYPE_AUTH_SESS;
}
/*
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/UserService.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/UserService.java b/security-admin/src/main/java/org/apache/ranger/service/UserService.java
index 7af723c..5fdca49 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/UserService.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/UserService.java
@@ -26,10 +26,10 @@ import java.util.List;
import org.apache.log4j.Logger;
import org.apache.ranger.common.ContextUtil;
import org.apache.ranger.common.MessageEnums;
+import org.apache.ranger.common.RangerConfigUtil;
+import org.apache.ranger.common.RangerConstants;
import org.apache.ranger.common.StringUtil;
import org.apache.ranger.common.UserSessionBase;
-import org.apache.ranger.common.XAConfigUtil;
-import org.apache.ranger.common.XAConstants;
import org.apache.ranger.entity.XXPortalUser;
import org.apache.ranger.entity.XXPortalUserRole;
import org.apache.ranger.view.VXMessage;
@@ -47,7 +47,7 @@ public class UserService extends UserServiceBase<XXPortalUser, VXPortalUser> {
public static final String NAME = "User";
@Autowired
- XAConfigUtil configUtil;
+ RangerConfigUtil configUtil;
private static UserService instance = null;
@@ -213,7 +213,7 @@ public class UserService extends UserServiceBase<XXPortalUser, VXPortalUser> {
// validate status
restErrorUtil.validateMinMax(userProfile.getStatus(), 0,
- XAConstants.ActivationStatus_MAX, "Invalid status", null,
+ RangerConstants.ActivationStatus_MAX, "Invalid status", null,
"status");
// validate user roles
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/UserServiceBase.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/UserServiceBase.java b/security-admin/src/main/java/org/apache/ranger/service/UserServiceBase.java
index 5a87901..043358a 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/UserServiceBase.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/UserServiceBase.java
@@ -22,10 +22,10 @@
import java.util.ArrayList;
import java.util.List;
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.service.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.SearchCriteria;
+import org.apache.ranger.entity.XXPortalUser;
+import org.apache.ranger.view.VXPortalUser;
+import org.apache.ranger.view.VXPortalUserList;
public abstract class UserServiceBase<T extends XXPortalUser, V extends VXPortalUser>
extends AbstractBaseResourceService<T, V> {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XAccessAuditService.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XAccessAuditService.java b/security-admin/src/main/java/org/apache/ranger/service/XAccessAuditService.java
index 117f9ab..ef9bc46 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XAccessAuditService.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XAccessAuditService.java
@@ -20,22 +20,19 @@
package org.apache.ranger.service;
import java.util.ArrayList;
-import java.util.Collections;
import java.util.List;
-import javax.persistence.Query;
-
import org.apache.ranger.common.SearchCriteria;
import org.apache.ranger.common.SearchField;
-import org.apache.ranger.common.SearchUtil;
-import org.apache.ranger.common.SortField;
import org.apache.ranger.common.SearchField.DATA_TYPE;
import org.apache.ranger.common.SearchField.SEARCH_TYPE;
+import org.apache.ranger.common.SearchUtil;
+import org.apache.ranger.common.SortField;
import org.apache.ranger.common.SortField.SORT_ORDER;
-import org.apache.ranger.common.view.VList;
-import org.apache.ranger.db.XADaoManager;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.db.RangerDaoManager;
+import org.apache.ranger.entity.XXAccessAudit;
+import org.apache.ranger.view.VXAccessAudit;
+import org.apache.ranger.view.VXAccessAuditList;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.context.annotation.Scope;
import org.springframework.stereotype.Service;
@@ -51,7 +48,7 @@ public class XAccessAuditService extends XAccessAuditServiceBase<XXAccessAudit,
protected SearchUtil searchUtil;
@Autowired
- XADaoManager appDaoMgr;
+ RangerDaoManager appDaoMgr;
protected String queryStr;
protected final String distinctCountQueryStr;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XAccessAuditServiceBase.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XAccessAuditServiceBase.java b/security-admin/src/main/java/org/apache/ranger/service/XAccessAuditServiceBase.java
index d4535d0..2914ba1 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XAccessAuditServiceBase.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XAccessAuditServiceBase.java
@@ -26,10 +26,10 @@
import java.util.ArrayList;
import java.util.List;
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.service.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.SearchCriteria;
+import org.apache.ranger.entity.XXAccessAudit;
+import org.apache.ranger.view.VXAccessAudit;
+import org.apache.ranger.view.VXAccessAuditList;
public abstract class XAccessAuditServiceBase<T extends XXAccessAudit, V extends VXAccessAudit>
extends AbstractBaseResourceService<T, V> {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XAgentService.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XAgentService.java b/security-admin/src/main/java/org/apache/ranger/service/XAgentService.java
index 75c296d..3b43b93 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XAgentService.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XAgentService.java
@@ -19,12 +19,7 @@
package org.apache.ranger.service;
-import java.util.ArrayList;
import java.util.Date;
-import java.util.List;
-import java.util.Map;
-import java.util.concurrent.Callable;
-import java.util.concurrent.TimeUnit;
import org.apache.log4j.Logger;
import org.apache.ranger.common.AppConstants;
@@ -32,9 +27,6 @@ import org.apache.ranger.common.DateUtil;
import org.apache.ranger.common.PropertiesUtil;
import org.apache.ranger.common.SearchCriteria;
import org.apache.ranger.common.StringUtil;
-import org.apache.ranger.common.TimedEventUtil;
-import org.apache.ranger.view.VXAuditRecord;
-import org.apache.ranger.view.VXAuditRecordList;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.context.annotation.Scope;
import org.springframework.stereotype.Service;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XAssetService.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XAssetService.java b/security-admin/src/main/java/org/apache/ranger/service/XAssetService.java
index d2a8841..6c99705 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XAssetService.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XAssetService.java
@@ -26,8 +26,6 @@ import java.util.HashMap;
import java.util.List;
import java.util.Map;
import java.util.Map.Entry;
-import java.util.regex.Matcher;
-import java.util.regex.Pattern;
import org.apache.ranger.common.AppConstants;
import org.apache.ranger.common.JSONUtil;
@@ -35,14 +33,15 @@ import org.apache.ranger.common.MessageEnums;
import org.apache.ranger.common.PasswordUtils;
import org.apache.ranger.common.PropertiesUtil;
import org.apache.ranger.common.SearchField;
-import org.apache.ranger.common.StringUtil;
import org.apache.ranger.common.SearchField.DATA_TYPE;
import org.apache.ranger.common.SearchField.SEARCH_TYPE;
+import org.apache.ranger.common.StringUtil;
import org.apache.ranger.common.view.VTrxLogAttr;
-import org.apache.ranger.db.XADaoManager;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.util.XAEnumUtil;
-import org.apache.ranger.view.*;
+import org.apache.ranger.db.RangerDaoManager;
+import org.apache.ranger.entity.XXAsset;
+import org.apache.ranger.entity.XXTrxLog;
+import org.apache.ranger.util.RangerEnumUtil;
+import org.apache.ranger.view.VXAsset;
import org.codehaus.jackson.map.ObjectMapper;
import org.codehaus.jackson.type.TypeReference;
import org.springframework.beans.factory.annotation.Autowired;
@@ -57,7 +56,7 @@ public class XAssetService extends XAssetServiceBase<XXAsset, VXAsset> {
JSONUtil jsonUtil;
@Autowired
- XADaoManager appDaoMgr;
+ RangerDaoManager appDaoMgr;
@Autowired
StringUtil stringUtil;
@@ -73,7 +72,7 @@ public class XAssetService extends XAssetServiceBase<XXAsset, VXAsset> {
private String hiddenPasswordString;
@Autowired
- XAEnumUtil xaEnumUtil;
+ RangerEnumUtil xaEnumUtil;
public XAssetService(){
super();
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XAssetServiceBase.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XAssetServiceBase.java b/security-admin/src/main/java/org/apache/ranger/service/XAssetServiceBase.java
index 194634e..d3e2dc5 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XAssetServiceBase.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XAssetServiceBase.java
@@ -26,10 +26,10 @@
import java.util.ArrayList;
import java.util.List;
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.service.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.SearchCriteria;
+import org.apache.ranger.entity.XXAsset;
+import org.apache.ranger.view.VXAsset;
+import org.apache.ranger.view.VXAssetList;
public abstract class XAssetServiceBase<T extends XXAsset, V extends VXAsset>
extends AbstractBaseResourceService<T, V> {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XAuditMapService.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XAuditMapService.java b/security-admin/src/main/java/org/apache/ranger/service/XAuditMapService.java
index 10c0236..1355e95 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XAuditMapService.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XAuditMapService.java
@@ -27,10 +27,13 @@ import java.util.List;
import org.apache.ranger.common.AppConstants;
import org.apache.ranger.common.SearchField;
import org.apache.ranger.common.view.VTrxLogAttr;
-import org.apache.ranger.db.XADaoManager;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.util.XAEnumUtil;
-import org.apache.ranger.view.*;
+import org.apache.ranger.db.RangerDaoManager;
+import org.apache.ranger.entity.XXAuditMap;
+import org.apache.ranger.entity.XXPortalUser;
+import org.apache.ranger.entity.XXTrxLog;
+import org.apache.ranger.entity.XXUser;
+import org.apache.ranger.util.RangerEnumUtil;
+import org.apache.ranger.view.VXAuditMap;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.context.annotation.Scope;
import org.springframework.stereotype.Service;
@@ -41,10 +44,10 @@ public class XAuditMapService extends
XAuditMapServiceBase<XXAuditMap, VXAuditMap> {
@Autowired
- XAEnumUtil xaEnumUtil;
+ RangerEnumUtil xaEnumUtil;
@Autowired
- XADaoManager xADaoManager;
+ RangerDaoManager rangerDaoManager;
static HashMap<String, VTrxLogAttr> trxLogAttrs = new HashMap<String, VTrxLogAttr>();
static {
@@ -103,7 +106,7 @@ public class XAuditMapService extends
value = xaEnumUtil.getLabel(enumName, enumValue);
} else {
value = ""+field.get(vObj);
- XXUser xUser = xADaoManager.getXXUser().getById(Long.parseLong(value));
+ XXUser xUser = rangerDaoManager.getXXUser().getById(Long.parseLong(value));
value = xUser.getName();
}
@@ -145,7 +148,7 @@ public class XAuditMapService extends
XXPortalUser xXPortalUser=null;
if(mObj.getAddedByUserId()==null || mObj.getAddedByUserId()==0){
if(!stringUtil.isEmpty(vObj.getOwner())){
- xXPortalUser=xADaoManager.getXXPortalUser().findByLoginId(vObj.getOwner());
+ xXPortalUser=rangerDaoManager.getXXPortalUser().findByLoginId(vObj.getOwner());
if(xXPortalUser!=null){
mObj.setAddedByUserId(xXPortalUser.getId());
}
@@ -153,7 +156,7 @@ public class XAuditMapService extends
}
if(mObj.getUpdatedByUserId()==null || mObj.getUpdatedByUserId()==0){
if(!stringUtil.isEmpty(vObj.getUpdatedBy())){
- xXPortalUser= xADaoManager.getXXPortalUser().findByLoginId(vObj.getUpdatedBy());
+ xXPortalUser= rangerDaoManager.getXXPortalUser().findByLoginId(vObj.getUpdatedBy());
if(xXPortalUser!=null){
mObj.setUpdatedByUserId(xXPortalUser.getId());
}
@@ -169,13 +172,13 @@ public class XAuditMapService extends
if(mObj!=null && vObj!=null){
XXPortalUser xXPortalUser=null;
if(stringUtil.isEmpty(vObj.getOwner())){
- xXPortalUser= xADaoManager.getXXPortalUser().getById(mObj.getAddedByUserId());
+ xXPortalUser= rangerDaoManager.getXXPortalUser().getById(mObj.getAddedByUserId());
if(xXPortalUser!=null){
vObj.setOwner(xXPortalUser.getLoginId());
}
}
if(stringUtil.isEmpty(vObj.getUpdatedBy())){
- xXPortalUser= xADaoManager.getXXPortalUser().getById(mObj.getUpdatedByUserId());
+ xXPortalUser= rangerDaoManager.getXXPortalUser().getById(mObj.getUpdatedByUserId());
if(xXPortalUser!=null){
vObj.setUpdatedBy(xXPortalUser.getLoginId());
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XAuditMapServiceBase.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XAuditMapServiceBase.java b/security-admin/src/main/java/org/apache/ranger/service/XAuditMapServiceBase.java
index 9936971..9da8012 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XAuditMapServiceBase.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XAuditMapServiceBase.java
@@ -26,10 +26,10 @@
import java.util.ArrayList;
import java.util.List;
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.service.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.SearchCriteria;
+import org.apache.ranger.entity.XXAuditMap;
+import org.apache.ranger.view.VXAuditMap;
+import org.apache.ranger.view.VXAuditMapList;
public abstract class XAuditMapServiceBase<T extends XXAuditMap, V extends VXAuditMap>
extends AbstractBaseResourceService<T, V> {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XCredentialStoreService.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XCredentialStoreService.java b/security-admin/src/main/java/org/apache/ranger/service/XCredentialStoreService.java
index 82c981a..68ab44a 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XCredentialStoreService.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XCredentialStoreService.java
@@ -19,10 +19,8 @@
package org.apache.ranger.service;
-import org.apache.ranger.biz.*;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.service.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.entity.XXCredentialStore;
+import org.apache.ranger.view.VXCredentialStore;
import org.springframework.context.annotation.Scope;
import org.springframework.stereotype.Service;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XCredentialStoreServiceBase.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XCredentialStoreServiceBase.java b/security-admin/src/main/java/org/apache/ranger/service/XCredentialStoreServiceBase.java
index fc7ff5e..db85bd9 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XCredentialStoreServiceBase.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XCredentialStoreServiceBase.java
@@ -26,10 +26,10 @@
import java.util.ArrayList;
import java.util.List;
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.service.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.SearchCriteria;
+import org.apache.ranger.entity.XXCredentialStore;
+import org.apache.ranger.view.VXCredentialStore;
+import org.apache.ranger.view.VXCredentialStoreList;
public abstract class XCredentialStoreServiceBase<T extends XXCredentialStore, V extends VXCredentialStore>
extends AbstractBaseResourceService<T, V> {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XGroupGroupService.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XGroupGroupService.java b/security-admin/src/main/java/org/apache/ranger/service/XGroupGroupService.java
index c9098f3..b6a829b 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XGroupGroupService.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XGroupGroupService.java
@@ -19,10 +19,8 @@
package org.apache.ranger.service;
-import org.apache.ranger.biz.*;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.service.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.entity.XXGroupGroup;
+import org.apache.ranger.view.VXGroupGroup;
import org.springframework.context.annotation.Scope;
import org.springframework.stereotype.Service;
[04/12] incubator-ranger git commit: RANGER-194: Rename classes under
web-admin project
Posted by ma...@apache.org.
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/util/RangerEnumUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/util/RangerEnumUtil.java b/security-admin/src/main/java/org/apache/ranger/util/RangerEnumUtil.java
new file mode 100644
index 0000000..613745e
--- /dev/null
+++ b/security-admin/src/main/java/org/apache/ranger/util/RangerEnumUtil.java
@@ -0,0 +1,2025 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+ package org.apache.ranger.util;
+
+/**
+ *
+ */
+
+import java.util.ArrayList;
+import java.util.Hashtable;
+import java.util.List;
+
+import org.apache.log4j.Logger;
+import org.apache.ranger.common.view.VEnum;
+import org.apache.ranger.common.view.VEnumElement;
+import org.springframework.stereotype.Component;
+
+@Component
+public class RangerEnumUtil {
+
+ static final Logger logger = Logger.getLogger(RangerEnumUtil.class);
+ public final static String ENUM_CommonEnums_ActiveStatus = "CommonEnums.ActiveStatus";
+ public final static String ENUM_CommonEnums_ActivationStatus = "CommonEnums.ActivationStatus";
+ public final static String ENUM_CommonEnums_BooleanValue = "CommonEnums.BooleanValue";
+ public final static String ENUM_CommonEnums_DataType = "CommonEnums.DataType";
+ public final static String ENUM_CommonEnums_DeviceType = "CommonEnums.DeviceType";
+ public final static String ENUM_CommonEnums_DiffLevel = "CommonEnums.DiffLevel";
+ public final static String ENUM_CommonEnums_FileType = "CommonEnums.FileType";
+ public final static String ENUM_CommonEnums_FreqType = "CommonEnums.FreqType";
+ public final static String ENUM_CommonEnums_MimeType = "CommonEnums.MimeType";
+ public final static String ENUM_CommonEnums_NumberFormat = "CommonEnums.NumberFormat";
+ public final static String ENUM_CommonEnums_ObjectStatus = "CommonEnums.ObjectStatus";
+ public final static String ENUM_CommonEnums_PasswordResetStatus = "CommonEnums.PasswordResetStatus";
+ public final static String ENUM_CommonEnums_PriorityType = "CommonEnums.PriorityType";
+ public final static String ENUM_CommonEnums_ProgressStatus = "CommonEnums.ProgressStatus";
+ public final static String ENUM_CommonEnums_RelationType = "CommonEnums.RelationType";
+ public final static String ENUM_CommonEnums_UserSource = "CommonEnums.UserSource";
+ public final static String ENUM_CommonEnums_AssetType = "CommonEnums.AssetType";
+ public final static String ENUM_CommonEnums_AccessResult = "CommonEnums.AccessResult";
+ public final static String ENUM_CommonEnums_PolicyType = "CommonEnums.PolicyType";
+ public final static String ENUM_CommonEnums_XAAuditType = "CommonEnums.XAAuditType";
+ public final static String ENUM_CommonEnums_ResourceType = "CommonEnums.ResourceType";
+ public final static String ENUM_CommonEnums_XAGroupType = "CommonEnums.XAGroupType";
+ public final static String ENUM_CommonEnums_XAPermForType = "CommonEnums.XAPermForType";
+ public final static String ENUM_CommonEnums_XAPermType = "CommonEnums.XAPermType";
+ public final static String ENUM_CommonEnums_ClassTypes = "CommonEnums.ClassTypes";
+ public final static String ENUM_XXAuthSession_AuthStatus = "XXAuthSession.AuthStatus";
+ public final static String ENUM_XXAuthSession_AuthType = "XXAuthSession.AuthType";
+ public final static String ENUM_XResponse_ResponseStatus = "XResponse.ResponseStatus";
+
+ protected Hashtable<String, VEnum> enumMap = new Hashtable<String, VEnum>();
+ protected List<VEnum> enumList = new ArrayList<VEnum>();
+
+ public List<VEnum> getEnums() {
+ if (enumList.size() == 0) {
+ init();
+ }
+ return enumList;
+ }
+
+ public VEnum getEnum(String enumName) {
+ if (enumList.size() == 0) {
+ init();
+ }
+ return enumMap.get(enumName);
+ }
+
+ public String getLabel(String enumName, int enumValue) {
+ VEnum vEnum = getEnum(enumName);
+ if (vEnum == null) {
+ logger.error("Enum " + enumName + " not found.", new Throwable());
+ return "";
+ }
+ for (VEnumElement vEnumElement : vEnum.getElementList()) {
+ if (vEnumElement.getElementValue() == enumValue) {
+ return vEnumElement.getElementLabel();
+ }
+ }
+ logger.error("Enum value not found. enum=" + enumName + ", value="
+ + enumValue, new Throwable());
+ return "";
+ }
+
+ public int getValue(String enumName, String elementName) {
+ VEnum vEnum = getEnum(enumName);
+ if (vEnum == null) {
+ logger.error("Enum " + enumName + " not found.", new Throwable());
+ return -1;
+ }
+ for (VEnumElement vEnumElement : vEnum.getElementList()) {
+ if (vEnumElement.getElementName().equalsIgnoreCase(elementName)) {
+ return vEnumElement.getElementValue();
+ }
+ }
+ logger.error("Enum value not found. enum=" + enumName
+ + ", elementName=" + elementName, new Throwable());
+ return -1;
+ }
+
+ protected void init() {
+ VEnum vEnum;
+ VEnumElement vElement;
+
+ ///////////////////////////////////
+ // CommonEnums::ActiveStatus
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_ActiveStatus);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("STATUS_DISABLED");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("Disabled");
+ vElement.setRbKey("xa.enum.ActiveStatus.STATUS_DISABLED");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("STATUS_ENABLED");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("Enabled");
+ vElement.setRbKey("xa.enum.ActiveStatus.STATUS_ENABLED");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("STATUS_DELETED");
+ vElement.setElementValue(2);
+ vElement.setElementLabel("Deleted");
+ vElement.setRbKey("xa.enum.ActiveStatus.STATUS_DELETED");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // CommonEnums::ActivationStatus
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_ActivationStatus);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("ACT_STATUS_DISABLED");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("Disabled");
+ vElement.setRbKey("xa.enum.ActivationStatus.ACT_STATUS_DISABLED");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("ACT_STATUS_ACTIVE");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("Active");
+ vElement.setRbKey("xa.enum.ActivationStatus.ACT_STATUS_ACTIVE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("ACT_STATUS_PENDING_APPROVAL");
+ vElement.setElementValue(2);
+ vElement.setElementLabel("Pending Approval");
+ vElement.setRbKey("xa.enum.ActivationStatus.ACT_STATUS_PENDING_APPROVAL");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("ACT_STATUS_PENDING_ACTIVATION");
+ vElement.setElementValue(3);
+ vElement.setElementLabel("Pending Activation");
+ vElement.setRbKey("xa.enum.ActivationStatus.ACT_STATUS_PENDING_ACTIVATION");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("ACT_STATUS_REJECTED");
+ vElement.setElementValue(4);
+ vElement.setElementLabel("Rejected");
+ vElement.setRbKey("xa.enum.ActivationStatus.ACT_STATUS_REJECTED");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("ACT_STATUS_DEACTIVATED");
+ vElement.setElementValue(5);
+ vElement.setElementLabel("Deactivated");
+ vElement.setRbKey("xa.enum.ActivationStatus.ACT_STATUS_DEACTIVATED");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("ACT_STATUS_PRE_REGISTRATION");
+ vElement.setElementValue(6);
+ vElement.setElementLabel("Registration Pending");
+ vElement.setRbKey("xa.enum.ActivationStatus.ACT_STATUS_PRE_REGISTRATION");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("ACT_STATUS_NO_LOGIN");
+ vElement.setElementValue(7);
+ vElement.setElementLabel("No login privilege");
+ vElement.setRbKey("xa.enum.ActivationStatus.ACT_STATUS_NO_LOGIN");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // CommonEnums::BooleanValue
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_BooleanValue);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("BOOL_NONE");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("None");
+ vElement.setRbKey("xa.enum.BooleanValue.BOOL_NONE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("BOOL_TRUE");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("True");
+ vElement.setRbKey("xa.enum.BooleanValue.BOOL_TRUE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("BOOL_FALSE");
+ vElement.setElementValue(2);
+ vElement.setElementLabel("False");
+ vElement.setRbKey("xa.enum.BooleanValue.BOOL_FALSE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // CommonEnums::DataType
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_DataType);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("DATA_TYPE_UNKNOWN");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("Unknown");
+ vElement.setRbKey("xa.enum.DataType.DATA_TYPE_UNKNOWN");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("DATA_TYPE_INTEGER");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("Integer");
+ vElement.setRbKey("xa.enum.DataType.DATA_TYPE_INTEGER");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("DATA_TYPE_DOUBLE");
+ vElement.setElementValue(2);
+ vElement.setElementLabel("Double");
+ vElement.setRbKey("xa.enum.DataType.DATA_TYPE_DOUBLE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("DATA_TYPE_STRING");
+ vElement.setElementValue(3);
+ vElement.setElementLabel("String");
+ vElement.setRbKey("xa.enum.DataType.DATA_TYPE_STRING");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("DATA_TYPE_BOOLEAN");
+ vElement.setElementValue(4);
+ vElement.setElementLabel("Boolean");
+ vElement.setRbKey("xa.enum.DataType.DATA_TYPE_BOOLEAN");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("DATA_TYPE_DATE");
+ vElement.setElementValue(5);
+ vElement.setElementLabel("Date");
+ vElement.setRbKey("xa.enum.DataType.DATA_TYPE_DATE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("DATA_TYPE_STRING_ENUM");
+ vElement.setElementValue(6);
+ vElement.setElementLabel("String enumeration");
+ vElement.setRbKey("xa.enum.DataType.DATA_TYPE_STRING_ENUM");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("DATA_TYPE_LONG");
+ vElement.setElementValue(7);
+ vElement.setElementLabel("Long");
+ vElement.setRbKey("xa.enum.DataType.DATA_TYPE_LONG");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("DATA_TYPE_INTEGER_ENUM");
+ vElement.setElementValue(8);
+ vElement.setElementLabel("Integer enumeration");
+ vElement.setRbKey("xa.enum.DataType.DATA_TYPE_INTEGER_ENUM");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // CommonEnums::DeviceType
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_DeviceType);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("DEVICE_UNKNOWN");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("Unknown");
+ vElement.setRbKey("xa.enum.DeviceType.DEVICE_UNKNOWN");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("DEVICE_BROWSER");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("Browser");
+ vElement.setRbKey("xa.enum.DeviceType.DEVICE_BROWSER");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("DEVICE_IPHONE");
+ vElement.setElementValue(2);
+ vElement.setElementLabel("iPhone");
+ vElement.setRbKey("xa.enum.DeviceType.DEVICE_IPHONE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("DEVICE_IPAD");
+ vElement.setElementValue(3);
+ vElement.setElementLabel("iPad");
+ vElement.setRbKey("xa.enum.DeviceType.DEVICE_IPAD");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("DEVICE_IPOD");
+ vElement.setElementValue(4);
+ vElement.setElementLabel("iPod");
+ vElement.setRbKey("xa.enum.DeviceType.DEVICE_IPOD");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("DEVICE_ANDROID");
+ vElement.setElementValue(5);
+ vElement.setElementLabel("Android");
+ vElement.setRbKey("xa.enum.DeviceType.DEVICE_ANDROID");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // CommonEnums::DiffLevel
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_DiffLevel);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("DIFF_UNKNOWN");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("Unknown");
+ vElement.setRbKey("xa.enum.DiffLevel.DIFF_UNKNOWN");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("DIFF_LOW");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("Low");
+ vElement.setRbKey("xa.enum.DiffLevel.DIFF_LOW");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("DIFF_MEDIUM");
+ vElement.setElementValue(2);
+ vElement.setElementLabel("Medium");
+ vElement.setRbKey("xa.enum.DiffLevel.DIFF_MEDIUM");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("DIFF_HIGH");
+ vElement.setElementValue(3);
+ vElement.setElementLabel("High");
+ vElement.setRbKey("xa.enum.DiffLevel.DIFF_HIGH");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // CommonEnums::FileType
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_FileType);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("FILE_FILE");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("File");
+ vElement.setRbKey("xa.enum.FileType.FILE_FILE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("FILE_DIR");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("Directory");
+ vElement.setRbKey("xa.enum.FileType.FILE_DIR");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // CommonEnums::FreqType
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_FreqType);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("FREQ_NONE");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("None");
+ vElement.setRbKey("xa.enum.FreqType.FREQ_NONE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("FREQ_MANUAL");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("Manual");
+ vElement.setRbKey("xa.enum.FreqType.FREQ_MANUAL");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("FREQ_HOURLY");
+ vElement.setElementValue(2);
+ vElement.setElementLabel("Hourly");
+ vElement.setRbKey("xa.enum.FreqType.FREQ_HOURLY");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("FREQ_DAILY");
+ vElement.setElementValue(3);
+ vElement.setElementLabel("Daily");
+ vElement.setRbKey("xa.enum.FreqType.FREQ_DAILY");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("FREQ_WEEKLY");
+ vElement.setElementValue(4);
+ vElement.setElementLabel("Weekly");
+ vElement.setRbKey("xa.enum.FreqType.FREQ_WEEKLY");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("FREQ_BI_WEEKLY");
+ vElement.setElementValue(5);
+ vElement.setElementLabel("Bi Weekly");
+ vElement.setRbKey("xa.enum.FreqType.FREQ_BI_WEEKLY");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("FREQ_MONTHLY");
+ vElement.setElementValue(6);
+ vElement.setElementLabel("Monthly");
+ vElement.setRbKey("xa.enum.FreqType.FREQ_MONTHLY");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // CommonEnums::MimeType
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_MimeType);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("MIME_UNKNOWN");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("Unknown");
+ vElement.setRbKey("xa.enum.MimeType.MIME_UNKNOWN");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("MIME_TEXT");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("Text");
+ vElement.setRbKey("xa.enum.MimeType.MIME_TEXT");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("MIME_HTML");
+ vElement.setElementValue(2);
+ vElement.setElementLabel("Html");
+ vElement.setRbKey("xa.enum.MimeType.MIME_HTML");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("MIME_PNG");
+ vElement.setElementValue(3);
+ vElement.setElementLabel("png");
+ vElement.setRbKey("xa.enum.MimeType.MIME_PNG");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("MIME_JPEG");
+ vElement.setElementValue(4);
+ vElement.setElementLabel("jpeg");
+ vElement.setRbKey("xa.enum.MimeType.MIME_JPEG");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // CommonEnums::NumberFormat
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_NumberFormat);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("NUM_FORMAT_NONE");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("None");
+ vElement.setRbKey("xa.enum.NumberFormat.NUM_FORMAT_NONE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("NUM_FORMAT_NUMERIC");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("Numeric");
+ vElement.setRbKey("xa.enum.NumberFormat.NUM_FORMAT_NUMERIC");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("NUM_FORMAT_ALPHA");
+ vElement.setElementValue(2);
+ vElement.setElementLabel("Alphabhet");
+ vElement.setRbKey("xa.enum.NumberFormat.NUM_FORMAT_ALPHA");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("NUM_FORMAT_ROMAN");
+ vElement.setElementValue(3);
+ vElement.setElementLabel("Roman");
+ vElement.setRbKey("xa.enum.NumberFormat.NUM_FORMAT_ROMAN");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // CommonEnums::ObjectStatus
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_ObjectStatus);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("OBJ_STATUS_ACTIVE");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("Active");
+ vElement.setRbKey("xa.enum.ObjectStatus.OBJ_STATUS_ACTIVE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("OBJ_STATUS_DELETED");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("Deleted");
+ vElement.setRbKey("xa.enum.ObjectStatus.OBJ_STATUS_DELETED");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("OBJ_STATUS_ARCHIVED");
+ vElement.setElementValue(2);
+ vElement.setElementLabel("Archived");
+ vElement.setRbKey("xa.enum.ObjectStatus.OBJ_STATUS_ARCHIVED");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // CommonEnums::PasswordResetStatus
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_PasswordResetStatus);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("PWD_RESET_ACTIVE");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("Active");
+ vElement.setRbKey("xa.enum.PasswordResetStatus.PWD_RESET_ACTIVE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("PWD_RESET_USED");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("Used");
+ vElement.setRbKey("xa.enum.PasswordResetStatus.PWD_RESET_USED");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("PWD_RESET_EXPIRED");
+ vElement.setElementValue(2);
+ vElement.setElementLabel("Expired");
+ vElement.setRbKey("xa.enum.PasswordResetStatus.PWD_RESET_EXPIRED");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("PWD_RESET_DISABLED");
+ vElement.setElementValue(3);
+ vElement.setElementLabel("Disabled");
+ vElement.setRbKey("xa.enum.PasswordResetStatus.PWD_RESET_DISABLED");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // CommonEnums::PriorityType
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_PriorityType);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("PRIORITY_NORMAL");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("Normal");
+ vElement.setRbKey("xa.enum.PriorityType.PRIORITY_NORMAL");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("PRIORITY_LOW");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("Low");
+ vElement.setRbKey("xa.enum.PriorityType.PRIORITY_LOW");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("PRIORITY_MEDIUM");
+ vElement.setElementValue(2);
+ vElement.setElementLabel("Medium");
+ vElement.setRbKey("xa.enum.PriorityType.PRIORITY_MEDIUM");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("PRIORITY_HIGH");
+ vElement.setElementValue(3);
+ vElement.setElementLabel("High");
+ vElement.setRbKey("xa.enum.PriorityType.PRIORITY_HIGH");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // CommonEnums::ProgressStatus
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_ProgressStatus);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("PROGRESS_PENDING");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("Pending");
+ vElement.setRbKey("xa.enum.ProgressStatus.PROGRESS_PENDING");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("PROGRESS_IN_PROGRESS");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("In Progress");
+ vElement.setRbKey("xa.enum.ProgressStatus.PROGRESS_IN_PROGRESS");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("PROGRESS_COMPLETE");
+ vElement.setElementValue(2);
+ vElement.setElementLabel("Complete");
+ vElement.setRbKey("xa.enum.ProgressStatus.PROGRESS_COMPLETE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("PROGRESS_ABORTED");
+ vElement.setElementValue(3);
+ vElement.setElementLabel("Aborted");
+ vElement.setRbKey("xa.enum.ProgressStatus.PROGRESS_ABORTED");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("PROGRESS_FAILED");
+ vElement.setElementValue(4);
+ vElement.setElementLabel("Failed");
+ vElement.setRbKey("xa.enum.ProgressStatus.PROGRESS_FAILED");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // CommonEnums::RelationType
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_RelationType);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("REL_NONE");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("None");
+ vElement.setRbKey("xa.enum.RelationType.REL_NONE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("REL_SELF");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("Self");
+ vElement.setRbKey("xa.enum.RelationType.REL_SELF");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // CommonEnums::UserSource
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_UserSource);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("USER_APP");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("Application");
+ vElement.setRbKey("xa.enum.UserSource.USER_APP");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("USER_GOOGLE");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("Google");
+ vElement.setRbKey("xa.enum.UserSource.USER_GOOGLE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("USER_FB");
+ vElement.setElementValue(2);
+ vElement.setElementLabel("FaceBook");
+ vElement.setRbKey("xa.enum.UserSource.USER_FB");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // CommonEnums::AssetType
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_AssetType);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("ASSET_UNKNOWN");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("Unknown");
+ vElement.setRbKey("xa.enum.AssetType.ASSET_UNKNOWN");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("ASSET_HDFS");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("HDFS");
+ vElement.setRbKey("xa.enum.AssetType.ASSET_HDFS");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("ASSET_HBASE");
+ vElement.setElementValue(2);
+ vElement.setElementLabel("HBase");
+ vElement.setRbKey("xa.enum.AssetType.ASSET_HBASE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("ASSET_HIVE");
+ vElement.setElementValue(3);
+ vElement.setElementLabel("Hive");
+ vElement.setRbKey("xa.enum.AssetType.ASSET_HIVE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("ASSET_AGENT");
+ vElement.setElementValue(4);
+ vElement.setElementLabel("Agent");
+ vElement.setRbKey("xa.enum.AssetType.ASSET_AGENT");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("ASSET_KNOX");
+ vElement.setElementValue(5);
+ vElement.setElementLabel("Knox");
+ vElement.setRbKey("xa.enum.AssetType.ASSET_KNOX");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ vElement = new VEnumElement();
+ vElement.setElementName("ASSET_STORM");
+ vElement.setElementValue(6);
+ vElement.setElementLabel("Storm");
+ vElement.setRbKey("xa.enum.AssetType.ASSET_STORM");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+ ///////////////////////////////////
+ // CommonEnums::AccessResult
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_AccessResult);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("ACCESS_RESULT_DENIED");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("Denied");
+ vElement.setRbKey("xa.enum.AccessResult.ACCESS_RESULT_DENIED");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("ACCESS_RESULT_ALLOWED");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("Allowed");
+ vElement.setRbKey("xa.enum.AccessResult.ACCESS_RESULT_ALLOWED");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // CommonEnums::PolicyType
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_PolicyType);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("POLICY_INCLUSION");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("Inclusion");
+ vElement.setRbKey("xa.enum.PolicyType.POLICY_INCLUSION");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("POLICY_EXCLUSION");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("Exclusion");
+ vElement.setRbKey("xa.enum.PolicyType.POLICY_EXCLUSION");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // CommonEnums::XAAuditType
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_XAAuditType);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_AUDIT_TYPE_UNKNOWN");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("Unknown");
+ vElement.setRbKey("xa.enum.XAAuditType.XA_AUDIT_TYPE_UNKNOWN");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_AUDIT_TYPE_ALL");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("All");
+ vElement.setRbKey("xa.enum.XAAuditType.XA_AUDIT_TYPE_ALL");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_AUDIT_TYPE_READ");
+ vElement.setElementValue(2);
+ vElement.setElementLabel("Read");
+ vElement.setRbKey("xa.enum.XAAuditType.XA_AUDIT_TYPE_READ");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_AUDIT_TYPE_WRITE");
+ vElement.setElementValue(3);
+ vElement.setElementLabel("Write");
+ vElement.setRbKey("xa.enum.XAAuditType.XA_AUDIT_TYPE_WRITE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_AUDIT_TYPE_CREATE");
+ vElement.setElementValue(4);
+ vElement.setElementLabel("Create");
+ vElement.setRbKey("xa.enum.XAAuditType.XA_AUDIT_TYPE_CREATE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_AUDIT_TYPE_DELETE");
+ vElement.setElementValue(5);
+ vElement.setElementLabel("Delete");
+ vElement.setRbKey("xa.enum.XAAuditType.XA_AUDIT_TYPE_DELETE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_AUDIT_TYPE_LOGIN");
+ vElement.setElementValue(6);
+ vElement.setElementLabel("Login");
+ vElement.setRbKey("xa.enum.XAAuditType.XA_AUDIT_TYPE_LOGIN");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // CommonEnums::ResourceType
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_ResourceType);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("RESOURCE_UNKNOWN");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("Unknown");
+ vElement.setRbKey("xa.enum.ResourceType.RESOURCE_UNKNOWN");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("RESOURCE_PATH");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("Path");
+ vElement.setRbKey("xa.enum.ResourceType.RESOURCE_PATH");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("RESOURCE_DB");
+ vElement.setElementValue(2);
+ vElement.setElementLabel("Database");
+ vElement.setRbKey("xa.enum.ResourceType.RESOURCE_DB");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("RESOURCE_TABLE");
+ vElement.setElementValue(3);
+ vElement.setElementLabel("Table");
+ vElement.setRbKey("xa.enum.ResourceType.RESOURCE_TABLE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("RESOURCE_COL_FAM");
+ vElement.setElementValue(4);
+ vElement.setElementLabel("Column Family");
+ vElement.setRbKey("xa.enum.ResourceType.RESOURCE_COL_FAM");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("RESOURCE_COLUMN");
+ vElement.setElementValue(5);
+ vElement.setElementLabel("Column");
+ vElement.setRbKey("xa.enum.ResourceType.RESOURCE_COLUMN");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("RESOURCE_VIEW");
+ vElement.setElementValue(6);
+ vElement.setElementLabel("VIEW");
+ vElement.setRbKey("xa.enum.ResourceType.RESOURCE_VIEW");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("RESOURCE_UDF");
+ vElement.setElementValue(7);
+ vElement.setElementLabel("UDF");
+ vElement.setRbKey("xa.enum.ResourceType.RESOURCE_UDF");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("RESOURCE_VIEW_COL");
+ vElement.setElementValue(8);
+ vElement.setElementLabel("View Column");
+ vElement.setRbKey("xa.enum.ResourceType.RESOURCE_VIEW_COL");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("RESOURCE_TOPOLOGY");
+ vElement.setElementValue(9);
+ vElement.setElementLabel("Topology");
+ vElement.setRbKey("xa.enum.ResourceType.RESOURCE_TOPOLOGY");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("RESOURCE_SERVICE");
+ vElement.setElementValue(10);
+ vElement.setElementLabel("Service");
+ vElement.setRbKey("xa.enum.ResourceType.RESOURCE_SERVICE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // CommonEnums::XAGroupType
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_XAGroupType);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_GROUP_UNKNOWN");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("Unknown");
+ vElement.setRbKey("xa.enum.XAGroupType.XA_GROUP_UNKNOWN");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_GROUP_USER");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("User");
+ vElement.setRbKey("xa.enum.XAGroupType.XA_GROUP_USER");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_GROUP_GROUP");
+ vElement.setElementValue(2);
+ vElement.setElementLabel("Group");
+ vElement.setRbKey("xa.enum.XAGroupType.XA_GROUP_GROUP");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_GROUP_ROLE");
+ vElement.setElementValue(3);
+ vElement.setElementLabel("Role");
+ vElement.setRbKey("xa.enum.XAGroupType.XA_GROUP_ROLE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // CommonEnums::XAPermForType
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_XAPermForType);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_FOR_UNKNOWN");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("Unknown");
+ vElement.setRbKey("xa.enum.XAPermForType.XA_PERM_FOR_UNKNOWN");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_FOR_USER");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("Permission for Users");
+ vElement.setRbKey("xa.enum.XAPermForType.XA_PERM_FOR_USER");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_FOR_GROUP");
+ vElement.setElementValue(2);
+ vElement.setElementLabel("Permission for Groups");
+ vElement.setRbKey("xa.enum.XAPermForType.XA_PERM_FOR_GROUP");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // CommonEnums::XAPermType
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_XAPermType);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_UNKNOWN");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("Unknown");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_UNKNOWN");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_RESET");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("Reset");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_RESET");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_READ");
+ vElement.setElementValue(2);
+ vElement.setElementLabel("Read");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_READ");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_WRITE");
+ vElement.setElementValue(3);
+ vElement.setElementLabel("Write");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_WRITE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_CREATE");
+ vElement.setElementValue(4);
+ vElement.setElementLabel("Create");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_CREATE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_DELETE");
+ vElement.setElementValue(5);
+ vElement.setElementLabel("Delete");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_DELETE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_ADMIN");
+ vElement.setElementValue(6);
+ vElement.setElementLabel("Admin");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_ADMIN");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_OBFUSCATE");
+ vElement.setElementValue(7);
+ vElement.setElementLabel("Obfuscate");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_OBFUSCATE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_MASK");
+ vElement.setElementValue(8);
+ vElement.setElementLabel("Mask");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_MASK");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_EXECUTE");
+ vElement.setElementValue(9);
+ vElement.setElementLabel("Execute");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_EXECUTE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_SELECT");
+ vElement.setElementValue(10);
+ vElement.setElementLabel("Select");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_SELECT");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_UPDATE");
+ vElement.setElementValue(11);
+ vElement.setElementLabel("Update");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_UPDATE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_DROP");
+ vElement.setElementValue(12);
+ vElement.setElementLabel("Drop");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_DROP");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_ALTER");
+ vElement.setElementValue(13);
+ vElement.setElementLabel("Alter");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_ALTER");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_INDEX");
+ vElement.setElementValue(14);
+ vElement.setElementLabel("Index");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_INDEX");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_LOCK");
+ vElement.setElementValue(15);
+ vElement.setElementLabel("Lock");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_LOCK");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_ALL");
+ vElement.setElementValue(16);
+ vElement.setElementLabel("All");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_ALL");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_ALLOW");
+ vElement.setElementValue(17);
+ vElement.setElementLabel("Allow");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_ALLOW");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_SUBMIT_TOPOLOGY");
+ vElement.setElementValue(18);
+ vElement.setElementLabel("Submit Topology");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_SUBMIT_TOPOLOGY");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_FILE_UPLOAD");
+ vElement.setElementValue(19);
+ vElement.setElementLabel("File Upload");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_FILE_UPLOAD");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_GET_NIMBUS");
+ vElement.setElementValue(20);
+ vElement.setElementLabel("Get Nimbus Conf");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_GET_NIMBUS");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_GET_CLUSTER_INFO");
+ vElement.setElementValue(21);
+ vElement.setElementLabel("Get Cluster Info");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_GET_CLUSTER_INFO");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_FILE_DOWNLOAD");
+ vElement.setElementValue(22);
+ vElement.setElementLabel("File Download");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_FILE_DOWNLOAD");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_KILL_TOPOLOGY");
+ vElement.setElementValue(23);
+ vElement.setElementLabel("Kill Topology");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_KILL_TOPOLOGY");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_REBALANCE");
+ vElement.setElementValue(24);
+ vElement.setElementLabel("Rebalance");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_REBALANCE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_ACTIVATE");
+ vElement.setElementValue(25);
+ vElement.setElementLabel("Activate");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_ACTIVATE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_DEACTIVATE");
+ vElement.setElementValue(26);
+ vElement.setElementLabel("Deactivate");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_DEACTIVATE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_GET_TOPOLOGY_CONF");
+ vElement.setElementValue(27);
+ vElement.setElementLabel("Get Topology Conf");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_GET_TOPOLOGY_CONF");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_GET_TOPOLOGY");
+ vElement.setElementValue(28);
+ vElement.setElementLabel("Get Topology");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_GET_TOPOLOGY");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_GET_USER_TOPOLOGY");
+ vElement.setElementValue(29);
+ vElement.setElementLabel("Get User Topology");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_GET_USER_TOPOLOGY");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_GET_TOPOLOGY_INFO");
+ vElement.setElementValue(30);
+ vElement.setElementLabel("Get Topology Info");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_GET_TOPOLOGY_INFO");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("XA_PERM_TYPE_UPLOAD_NEW_CREDENTIAL");
+ vElement.setElementValue(31);
+ vElement.setElementLabel("Upload New Credential");
+ vElement.setRbKey("xa.enum.XAPermType.XA_PERM_TYPE_UPLOAD_NEW_CREDENTIAL");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // CommonEnums::ClassTypes
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_CommonEnums_ClassTypes);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_NONE");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("None");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_NONE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_MESSAGE");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("Message");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_MESSAGE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_USER_PROFILE");
+ vElement.setElementValue(2);
+ vElement.setElementLabel("User Profile");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_USER_PROFILE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_AUTH_SESS");
+ vElement.setElementValue(3);
+ vElement.setElementLabel("Authentication Session");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_AUTH_SESS");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_DATA_OBJECT");
+ vElement.setElementValue(4);
+ vElement.setElementLabel("CLASS_TYPE_DATA_OBJECT");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_DATA_OBJECT");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_NAMEVALUE");
+ vElement.setElementValue(5);
+ vElement.setElementLabel("CLASS_TYPE_NAMEVALUE");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_NAMEVALUE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_LONG");
+ vElement.setElementValue(6);
+ vElement.setElementLabel("CLASS_TYPE_LONG");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_LONG");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_PASSWORD_CHANGE");
+ vElement.setElementValue(7);
+ vElement.setElementLabel("CLASS_TYPE_PASSWORD_CHANGE");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_PASSWORD_CHANGE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_STRING");
+ vElement.setElementValue(8);
+ vElement.setElementLabel("CLASS_TYPE_STRING");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_STRING");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_ENUM");
+ vElement.setElementValue(9);
+ vElement.setElementLabel("CLASS_TYPE_ENUM");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_ENUM");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_ENUM_ELEMENT");
+ vElement.setElementValue(10);
+ vElement.setElementLabel("CLASS_TYPE_ENUM_ELEMENT");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_ENUM_ELEMENT");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_RESPONSE");
+ vElement.setElementValue(11);
+ vElement.setElementLabel("Response");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_RESPONSE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_XA_ASSET");
+ vElement.setElementValue(1000);
+ vElement.setElementLabel("Asset");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_ASSET");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_XA_RESOURCE");
+ vElement.setElementValue(1001);
+ vElement.setElementLabel("Resource");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_RESOURCE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_XA_GROUP");
+ vElement.setElementValue(1002);
+ vElement.setElementLabel("XA Group");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_GROUP");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_XA_USER");
+ vElement.setElementValue(1003);
+ vElement.setElementLabel("XA User");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_USER");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_XA_GROUP_USER");
+ vElement.setElementValue(1004);
+ vElement.setElementLabel("XA Group of Users");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_GROUP_USER");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_XA_GROUP_GROUP");
+ vElement.setElementValue(1005);
+ vElement.setElementLabel("XA Group of groups");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_GROUP_GROUP");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_XA_PERM_MAP");
+ vElement.setElementValue(1006);
+ vElement.setElementLabel("XA permissions for resource");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_PERM_MAP");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_XA_AUDIT_MAP");
+ vElement.setElementValue(1007);
+ vElement.setElementLabel("XA audits for resource");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_AUDIT_MAP");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_XA_CRED_STORE");
+ vElement.setElementValue(1008);
+ vElement.setElementLabel("XA credential store");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_CRED_STORE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_XA_POLICY_EXPORT_AUDIT");
+ vElement.setElementValue(1009);
+ vElement.setElementLabel("XA Policy Export Audit");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_POLICY_EXPORT_AUDIT");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_TRX_LOG");
+ vElement.setElementValue(1010);
+ vElement.setElementLabel("Transaction log");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_TRX_LOG");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_XA_ACCESS_AUDIT");
+ vElement.setElementValue(1011);
+ vElement.setElementLabel("Access Audit");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_ACCESS_AUDIT");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("CLASS_TYPE_XA_TRANSACTION_LOG_ATTRIBUTE");
+ vElement.setElementValue(1012);
+ vElement.setElementLabel("Transaction log attribute");
+ vElement.setRbKey("xa.enum.ClassTypes.CLASS_TYPE_XA_TRANSACTION_LOG_ATTRIBUTE");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // XXAuthSession::AuthStatus
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_XXAuthSession_AuthStatus);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("AUTH_STATUS_UNKNOWN");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("Unknown");
+ vElement.setRbKey("xa.enum.AuthStatus.AUTH_STATUS_UNKNOWN");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("AUTH_STATUS_SUCCESS");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("Success");
+ vElement.setRbKey("xa.enum.AuthStatus.AUTH_STATUS_SUCCESS");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("AUTH_STATUS_WRONG_PASSWORD");
+ vElement.setElementValue(2);
+ vElement.setElementLabel("Wrong Password");
+ vElement.setRbKey("xa.enum.AuthStatus.AUTH_STATUS_WRONG_PASSWORD");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("AUTH_STATUS_DISABLED");
+ vElement.setElementValue(3);
+ vElement.setElementLabel("Account Disabled");
+ vElement.setRbKey("xa.enum.AuthStatus.AUTH_STATUS_DISABLED");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("AUTH_STATUS_LOCKED");
+ vElement.setElementValue(4);
+ vElement.setElementLabel("Locked");
+ vElement.setRbKey("xa.enum.AuthStatus.AUTH_STATUS_LOCKED");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("AUTH_STATUS_PASSWORD_EXPIRED");
+ vElement.setElementValue(5);
+ vElement.setElementLabel("Password Expired");
+ vElement.setRbKey("xa.enum.AuthStatus.AUTH_STATUS_PASSWORD_EXPIRED");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("AUTH_STATUS_USER_NOT_FOUND");
+ vElement.setElementValue(6);
+ vElement.setElementLabel("User not found");
+ vElement.setRbKey("xa.enum.AuthStatus.AUTH_STATUS_USER_NOT_FOUND");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // XXAuthSession::AuthType
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_XXAuthSession_AuthType);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("AUTH_TYPE_UNKNOWN");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("Unknown");
+ vElement.setRbKey("xa.enum.AuthType.AUTH_TYPE_UNKNOWN");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("AUTH_TYPE_PASSWORD");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("Username/Password");
+ vElement.setRbKey("xa.enum.AuthType.AUTH_TYPE_PASSWORD");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ ///////////////////////////////////
+ // XResponse::ResponseStatus
+ ///////////////////////////////////
+ vEnum = new VEnum();
+ vEnum.setEnumName(ENUM_XResponse_ResponseStatus);
+ vEnum.setElementList(new ArrayList<VEnumElement>());
+ enumList.add(vEnum);
+ enumMap.put(vEnum.getEnumName(), vEnum);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("STATUS_SUCCESS");
+ vElement.setElementValue(0);
+ vElement.setElementLabel("Success");
+ vElement.setRbKey("xa.enum.ResponseStatus.STATUS_SUCCESS");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("STATUS_ERROR");
+ vElement.setElementValue(1);
+ vElement.setElementLabel("Error");
+ vElement.setRbKey("xa.enum.ResponseStatus.STATUS_ERROR");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("STATUS_VALIDATION");
+ vElement.setElementValue(2);
+ vElement.setElementLabel("Validation Error");
+ vElement.setRbKey("xa.enum.ResponseStatus.STATUS_VALIDATION");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("STATUS_WARN");
+ vElement.setElementValue(3);
+ vElement.setElementLabel("Warning");
+ vElement.setRbKey("xa.enum.ResponseStatus.STATUS_WARN");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("STATUS_INFO");
+ vElement.setElementValue(4);
+ vElement.setElementLabel("Information");
+ vElement.setRbKey("xa.enum.ResponseStatus.STATUS_INFO");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+ vElement = new VEnumElement();
+ vElement.setElementName("STATUS_PARTIAL_SUCCESS");
+ vElement.setElementValue(5);
+ vElement.setElementLabel("Partial Success");
+ vElement.setRbKey("xa.enum.ResponseStatus.STATUS_PARTIAL_SUCCESS");
+ vElement.setEnumName(vEnum.getEnumName());
+
+ vEnum.getElementList().add(vElement);
+
+
+ }
+
+}
+
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/util/RangerRestUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/util/RangerRestUtil.java b/security-admin/src/main/java/org/apache/ranger/util/RangerRestUtil.java
new file mode 100644
index 0000000..eb34b42
--- /dev/null
+++ b/security-admin/src/main/java/org/apache/ranger/util/RangerRestUtil.java
@@ -0,0 +1,156 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+ package org.apache.ranger.util;
+
+import java.util.ArrayList;
+import java.util.Collection;
+import java.util.List;
+
+import org.apache.log4j.Logger;
+import org.apache.ranger.common.MessageEnums;
+import org.apache.ranger.common.RESTErrorUtil;
+import org.apache.ranger.common.RangerConfigUtil;
+import org.apache.ranger.common.StringUtil;
+import org.apache.ranger.entity.XXPortalUser;
+import org.apache.ranger.view.VXMessage;
+import org.apache.ranger.view.VXPortalUser;
+import org.apache.ranger.view.VXResponse;
+import org.springframework.beans.factory.annotation.Autowired;
+import org.springframework.stereotype.Component;
+
+@Component
+public class RangerRestUtil {
+ static final Logger logger = Logger.getLogger(RangerRestUtil.class);
+
+ @Autowired
+ StringUtil stringUtil;
+
+ @Autowired
+ RESTErrorUtil restErrorUtil;
+
+ @Autowired
+ RangerConfigUtil configUtil;
+
+ void splitUserRoleList(Collection<String> collection) {
+ Collection<String> newCollection = new ArrayList<String>();
+ for (String role : collection) {
+ String roles[] = role.split(",");
+ for (int i = 0; i < roles.length; i++) {
+ String str = roles[i];
+ newCollection.add(str);
+ }
+ }
+ collection.clear();
+ collection.addAll(newCollection);
+ }
+
+ /**
+ * This method cleans up the data provided by the user for update
+ *
+ * @param userProfile
+ * @return
+ */
+ public void validateVUserProfileForUpdate(XXPortalUser gjUser,
+ VXPortalUser userProfile) {
+
+ List<VXMessage> messageList = new ArrayList<VXMessage>();
+
+ // Email Update is allowed.
+ // if (userProfile.getEmailAddress() != null
+ // && !userProfile.getEmailAddress().equalsIgnoreCase(
+ // gjUser.getEmailAddress())) {
+ // throw restErrorUtil.createRESTException(
+ // "Email address can't be updated",
+ // MessageEnums.DATA_NOT_UPDATABLE, null, "emailAddress",
+ // userProfile.getEmailAddress());
+ // }
+
+ // Login Id can't be changed
+ if (userProfile.getLoginId() != null
+ && !gjUser.getLoginId().equalsIgnoreCase(
+ userProfile.getLoginId())) {
+ throw restErrorUtil.createRESTException(
+ "Username can't be updated",
+ MessageEnums.DATA_NOT_UPDATABLE, null, "loginId",
+ userProfile.getLoginId());
+ }
+ // }
+ userProfile.setFirstName(restErrorUtil.validateStringForUpdate(
+ userProfile.getFirstName(), gjUser.getFirstName(),
+ StringUtil.VALIDATION_NAME, "Invalid first name",
+ MessageEnums.INVALID_INPUT_DATA, null, "firstName"));
+
+ userProfile.setFirstName(restErrorUtil.validateStringForUpdate(
+ userProfile.getFirstName(), gjUser.getFirstName(),
+ StringUtil.VALIDATION_NAME, "Invalid first name",
+ MessageEnums.INVALID_INPUT_DATA, null, "firstName"));
+
+ userProfile.setLastName(restErrorUtil.validateStringForUpdate(
+ userProfile.getLastName(), gjUser.getLastName(),
+ StringUtil.VALIDATION_NAME, "Invalid last name",
+ MessageEnums.INVALID_INPUT_DATA, null, "lastName"));
+
+ // firstName
+ if (!stringUtil.isValidName(userProfile.getFirstName())) {
+ logger.info("Invalid first name." + userProfile);
+ messageList.add(MessageEnums.INVALID_INPUT_DATA.getMessage(null,
+ "firstName"));
+ }
+
+ // lastName
+ if (!stringUtil.isValidName(userProfile.getLastName())) {
+ logger.info("Invalid last name." + userProfile);
+ messageList.add(MessageEnums.INVALID_INPUT_DATA.getMessage(null,
+ "lastName"));
+ }
+
+ // create the public screen name
+ userProfile.setPublicScreenName(userProfile.getFirstName() + " "
+ + userProfile.getLastName());
+
+ userProfile.setNotes(restErrorUtil.validateStringForUpdate(
+ userProfile.getNotes(), gjUser.getNotes(),
+ StringUtil.VALIDATION_NAME, "Invalid notes",
+ MessageEnums.INVALID_INPUT_DATA, null, "notes"));
+
+ // validate user roles
+ if (userProfile.getUserRoleList() != null) {
+ // First let's normalize it
+ splitUserRoleList(userProfile.getUserRoleList());
+ for (String userRole : userProfile.getUserRoleList()) {
+ restErrorUtil.validateStringList(userRole,
+ configUtil.getRoles(), "Invalid role", null,
+ "userRoleList");
+ }
+
+ }
+ if (messageList.size() > 0) {
+ VXResponse gjResponse = new VXResponse();
+ gjResponse.setStatusCode(VXResponse.STATUS_ERROR);
+ gjResponse.setMsgDesc("Validation failure");
+ gjResponse.setMessageList(messageList);
+ logger.info("Validation Error in updateUser() userProfile="
+ + userProfile + ", error=" + gjResponse);
+ throw restErrorUtil.createRESTException(gjResponse);
+ }
+
+ }
+
+}
\ No newline at end of file
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/util/RestUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/util/RestUtil.java b/security-admin/src/main/java/org/apache/ranger/util/RestUtil.java
index 9500cf8..cdb0a7d 100644
--- a/security-admin/src/main/java/org/apache/ranger/util/RestUtil.java
+++ b/security-admin/src/main/java/org/apache/ranger/util/RestUtil.java
@@ -22,7 +22,7 @@
import javax.servlet.http.Cookie;
import javax.servlet.http.HttpServletRequest;
-import org.apache.ranger.security.context.XAContextHolder;
+import org.apache.ranger.security.context.RangerContextHolder;
import org.springframework.stereotype.Component;
@Component
@@ -60,13 +60,13 @@ public class RestUtil {
public static int getClientTimeOffset(){
int clientTimeOffsetInMinute = 0;
try{
- clientTimeOffsetInMinute= XAContextHolder.getSecurityContext().getRequestContext().getClientTimeOffsetInMinute();
+ clientTimeOffsetInMinute= RangerContextHolder.getSecurityContext().getRequestContext().getClientTimeOffsetInMinute();
}catch(Exception ex){
}
if(clientTimeOffsetInMinute==0){
try{
- clientTimeOffsetInMinute= XAContextHolder.getSecurityContext().getUserSession().getClientTimeOffsetInMinute();
+ clientTimeOffsetInMinute= RangerContextHolder.getSecurityContext().getUserSession().getClientTimeOffsetInMinute();
}catch(Exception ex){
}
[05/12] incubator-ranger git commit: RANGER-194: Rename classes under
web-admin project
Posted by ma...@apache.org.
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XGroupGroupServiceBase.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XGroupGroupServiceBase.java b/security-admin/src/main/java/org/apache/ranger/service/XGroupGroupServiceBase.java
index ddbe4c6..680fa67 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XGroupGroupServiceBase.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XGroupGroupServiceBase.java
@@ -26,10 +26,10 @@
import java.util.ArrayList;
import java.util.List;
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.service.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.SearchCriteria;
+import org.apache.ranger.entity.XXGroupGroup;
+import org.apache.ranger.view.VXGroupGroup;
+import org.apache.ranger.view.VXGroupGroupList;
public abstract class XGroupGroupServiceBase<T extends XXGroupGroup, V extends VXGroupGroup>
extends AbstractBaseResourceService<T, V> {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XGroupService.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XGroupService.java b/security-admin/src/main/java/org/apache/ranger/service/XGroupService.java
index c1e8956..6a45555 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XGroupService.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XGroupService.java
@@ -24,21 +24,20 @@ import java.util.ArrayList;
import java.util.HashMap;
import java.util.List;
-import org.apache.ranger.biz.*;
import org.apache.ranger.common.AppConstants;
import org.apache.ranger.common.MessageEnums;
import org.apache.ranger.common.PropertiesUtil;
import org.apache.ranger.common.SearchField;
import org.apache.ranger.common.SortField;
import org.apache.ranger.common.StringUtil;
-import org.apache.ranger.common.XACommonEnums;
-import org.apache.ranger.common.SortField.SORT_ORDER;
import org.apache.ranger.common.view.VTrxLogAttr;
-import org.apache.ranger.db.XADaoManager;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.service.*;
-import org.apache.ranger.util.XAEnumUtil;
-import org.apache.ranger.view.*;
+import org.apache.ranger.db.RangerDaoManager;
+import org.apache.ranger.entity.XXAsset;
+import org.apache.ranger.entity.XXGroup;
+import org.apache.ranger.entity.XXPortalUser;
+import org.apache.ranger.entity.XXTrxLog;
+import org.apache.ranger.util.RangerEnumUtil;
+import org.apache.ranger.view.VXGroup;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.context.annotation.Scope;
import org.springframework.stereotype.Service;
@@ -50,10 +49,10 @@ public class XGroupService extends XGroupServiceBase<XXGroup, VXGroup> {
public static Long createdByUserId = 1L;
@Autowired
- XADaoManager xADaoManager;
+ RangerDaoManager rangerDaoManager;
@Autowired
- XAEnumUtil xaEnumUtil;
+ RangerEnumUtil xaEnumUtil;
@Autowired
StringUtil stringUtil;
@@ -77,7 +76,7 @@ public class XGroupService extends XGroupServiceBase<XXGroup, VXGroup> {
@Override
protected void validateForCreate(VXGroup vObj) {
- XXGroup xxGroup = xADaoManager.getXXGroup().findByGroupName(
+ XXGroup xxGroup = rangerDaoManager.getXXGroup().findByGroupName(
vObj.getName());
if (xxGroup != null) {
throw restErrorUtil.createRESTException("XGroup already exists",
@@ -94,7 +93,7 @@ public class XGroupService extends XGroupServiceBase<XXGroup, VXGroup> {
}
public VXGroup getGroupByGroupName(String groupName) {
- XXGroup xxGroup = xADaoManager.getXXGroup().findByGroupName(groupName);
+ XXGroup xxGroup = rangerDaoManager.getXXGroup().findByGroupName(groupName);
if (xxGroup == null) {
throw restErrorUtil.createRESTException(
@@ -104,7 +103,7 @@ public class XGroupService extends XGroupServiceBase<XXGroup, VXGroup> {
}
public VXGroup createXGroupWithOutLogin(VXGroup vxGroup) {
- XXGroup xxGroup = xADaoManager.getXXGroup().findByGroupName(
+ XXGroup xxGroup = rangerDaoManager.getXXGroup().findByGroupName(
vxGroup.getName());
boolean groupExists = true;
@@ -114,7 +113,7 @@ public class XGroupService extends XGroupServiceBase<XXGroup, VXGroup> {
}
xxGroup = mapViewToEntityBean(vxGroup, xxGroup, 0);
- XXPortalUser xXPortalUser = xADaoManager.getXXPortalUser().getById(createdByUserId);
+ XXPortalUser xXPortalUser = rangerDaoManager.getXXPortalUser().getById(createdByUserId);
if (xXPortalUser != null) {
xxGroup.setAddedByUserId(createdByUserId);
xxGroup.setUpdatedByUserId(createdByUserId);
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XGroupServiceBase.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XGroupServiceBase.java b/security-admin/src/main/java/org/apache/ranger/service/XGroupServiceBase.java
index b6cb0ca..c3eebc0 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XGroupServiceBase.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XGroupServiceBase.java
@@ -26,10 +26,10 @@
import java.util.ArrayList;
import java.util.List;
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.service.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.SearchCriteria;
+import org.apache.ranger.entity.XXGroup;
+import org.apache.ranger.view.VXGroup;
+import org.apache.ranger.view.VXGroupList;
public abstract class XGroupServiceBase<T extends XXGroup, V extends VXGroup>
extends AbstractBaseResourceService<T, V> {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XGroupUserService.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XGroupUserService.java b/security-admin/src/main/java/org/apache/ranger/service/XGroupUserService.java
index 720a389..4af9049 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XGroupUserService.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XGroupUserService.java
@@ -28,12 +28,16 @@ import org.apache.ranger.common.AppConstants;
import org.apache.ranger.common.MessageEnums;
import org.apache.ranger.common.PropertiesUtil;
import org.apache.ranger.common.SearchField;
-import org.apache.ranger.common.XACommonEnums;
import org.apache.ranger.common.view.VTrxLogAttr;
-import org.apache.ranger.db.XADaoManager;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.util.XAEnumUtil;
-import org.apache.ranger.view.*;
+import org.apache.ranger.db.RangerDaoManager;
+import org.apache.ranger.entity.XXAsset;
+import org.apache.ranger.entity.XXGroup;
+import org.apache.ranger.entity.XXGroupUser;
+import org.apache.ranger.entity.XXPortalUser;
+import org.apache.ranger.entity.XXTrxLog;
+import org.apache.ranger.entity.XXUser;
+import org.apache.ranger.util.RangerEnumUtil;
+import org.apache.ranger.view.VXGroupUser;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.context.annotation.Scope;
import org.springframework.stereotype.Service;
@@ -46,10 +50,10 @@ public class XGroupUserService extends
public static Long createdByUserId = 1L;
@Autowired
- XADaoManager xADaoManager;
+ RangerDaoManager rangerDaoManager;
@Autowired
- XAEnumUtil xaEnumUtil;
+ RangerEnumUtil xaEnumUtil;
static HashMap<String, VTrxLogAttr> trxLogAttrs = new HashMap<String, VTrxLogAttr>();
static {
@@ -84,7 +88,7 @@ public class XGroupUserService extends
XXGroup xGroup = daoManager.getXXGroup().findByGroupName(vxGroupUser.getName());
vxGroupUser.setParentGroupId(xGroup.getId());
xxGroupUser = mapViewToEntityBean(vxGroupUser, xxGroupUser, 0);
- XXPortalUser xXPortalUser = xADaoManager.getXXPortalUser().getById(createdByUserId);
+ XXPortalUser xXPortalUser = rangerDaoManager.getXXPortalUser().getById(createdByUserId);
if (xXPortalUser != null) {
xxGroupUser.setAddedByUserId(createdByUserId);
xxGroupUser.setUpdatedByUserId(createdByUserId);
@@ -117,11 +121,11 @@ public class XGroupUserService extends
// }
Long groupId = vObj.getParentGroupId();
- XXGroup xGroup = xADaoManager.getXXGroup().getById(groupId);
+ XXGroup xGroup = rangerDaoManager.getXXGroup().getById(groupId);
String groupName = xGroup.getName();
Long userId = vObj.getUserId();
- XXUser xUser = xADaoManager.getXXUser().getById(userId);
+ XXUser xUser = rangerDaoManager.getXXUser().getById(userId);
String userName = xUser.getName();
List<XXTrxLog> trxLogList = new ArrayList<XXTrxLog>();
@@ -148,7 +152,7 @@ public class XGroupUserService extends
value = xaEnumUtil.getLabel(enumName, enumValue);
} else {
value = ""+field.get(vObj);
- XXGroup xXGroup = xADaoManager.getXXGroup().getById(Long.parseLong(value));
+ XXGroup xXGroup = rangerDaoManager.getXXGroup().getById(Long.parseLong(value));
value = xXGroup.getName();
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XGroupUserServiceBase.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XGroupUserServiceBase.java b/security-admin/src/main/java/org/apache/ranger/service/XGroupUserServiceBase.java
index a27cf44..25779f2 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XGroupUserServiceBase.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XGroupUserServiceBase.java
@@ -26,10 +26,10 @@
import java.util.ArrayList;
import java.util.List;
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.service.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.SearchCriteria;
+import org.apache.ranger.entity.XXGroupUser;
+import org.apache.ranger.view.VXGroupUser;
+import org.apache.ranger.view.VXGroupUserList;
public abstract class XGroupUserServiceBase<T extends XXGroupUser, V extends VXGroupUser>
extends AbstractBaseResourceService<T, V> {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XPermMapService.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XPermMapService.java b/security-admin/src/main/java/org/apache/ranger/service/XPermMapService.java
index ce1a2a1..146a953 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XPermMapService.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XPermMapService.java
@@ -24,15 +24,21 @@ import java.util.ArrayList;
import java.util.HashMap;
import java.util.List;
-import org.apache.commons.lang.ArrayUtils;
import org.apache.ranger.common.AppConstants;
import org.apache.ranger.common.SearchCriteria;
import org.apache.ranger.common.SearchField;
import org.apache.ranger.common.view.VTrxLogAttr;
-import org.apache.ranger.db.XADaoManager;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.util.XAEnumUtil;
-import org.apache.ranger.view.*;
+import org.apache.ranger.db.RangerDaoManager;
+import org.apache.ranger.entity.XXGroup;
+import org.apache.ranger.entity.XXPermMap;
+import org.apache.ranger.entity.XXPortalUser;
+import org.apache.ranger.entity.XXTrxLog;
+import org.apache.ranger.entity.XXUser;
+import org.apache.ranger.util.RangerEnumUtil;
+import org.apache.ranger.view.VXGroup;
+import org.apache.ranger.view.VXPermMap;
+import org.apache.ranger.view.VXPermMapList;
+import org.apache.ranger.view.VXUser;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.context.annotation.Scope;
import org.springframework.stereotype.Service;
@@ -48,10 +54,10 @@ public class XPermMapService extends XPermMapServiceBase<XXPermMap, VXPermMap> {
XUserService xUserService;
@Autowired
- XAEnumUtil xaEnumUtil;
+ RangerEnumUtil xaEnumUtil;
@Autowired
- XADaoManager xADaoManager;
+ RangerDaoManager rangerDaoManager;
static HashMap<String, VTrxLogAttr> trxLogAttrs = new HashMap<String, VTrxLogAttr>();
static {
@@ -160,11 +166,11 @@ public class XPermMapService extends XPermMapServiceBase<XXPermMap, VXPermMap> {
if(isGroupPolicy){
groupId = vObj.getGroupId();
- XXGroup xGroup = xADaoManager.getXXGroup().getById(groupId);
+ XXGroup xGroup = rangerDaoManager.getXXGroup().getById(groupId);
groupName = xGroup.getName();
} else {
userId = vObj.getUserId();
- XXUser xUser = xADaoManager.getXXUser().getById(userId);
+ XXUser xUser = rangerDaoManager.getXXUser().getById(userId);
userName = xUser.getName();
}
@@ -195,8 +201,8 @@ public class XPermMapService extends XPermMapServiceBase<XXPermMap, VXPermMap> {
// }
// }
}
- Long assetId = xADaoManager.getXXResource().getById(vObj.getResourceId()).getAssetId();
- int policyType = xADaoManager.getXXAsset().getById(assetId).getAssetType();
+ Long assetId = rangerDaoManager.getXXResource().getById(vObj.getResourceId()).getAssetId();
+ int policyType = rangerDaoManager.getXXAsset().getById(assetId).getAssetType();
if(policyType != AppConstants.ASSET_KNOX){
if(fieldName.equals("ipAddress"))
continue;
@@ -215,7 +221,7 @@ public class XPermMapService extends XPermMapServiceBase<XXPermMap, VXPermMap> {
value = xaEnumUtil.getLabel(enumName, enumValue);
} else {
value = ""+field.get(vObj);
-// XXUser xUser = xADaoManager.getXXUser().getById(Long.parseLong(value));
+// XXUser xUser = rangerDaoManager.getXXUser().getById(Long.parseLong(value));
// value = xUser.getName();
if(fieldName.equals("ipAddress") && action.equalsIgnoreCase("update")){
prevValue = ""+field.get(mObj);
@@ -273,7 +279,7 @@ public class XPermMapService extends XPermMapServiceBase<XXPermMap, VXPermMap> {
XXPortalUser xXPortalUser=null;
if(mObj.getAddedByUserId()==null || mObj.getAddedByUserId()==0){
if(!stringUtil.isEmpty(vObj.getOwner())){
- xXPortalUser=xADaoManager.getXXPortalUser().findByLoginId(vObj.getOwner());
+ xXPortalUser=rangerDaoManager.getXXPortalUser().findByLoginId(vObj.getOwner());
if(xXPortalUser!=null){
mObj.setAddedByUserId(xXPortalUser.getId());
}
@@ -281,7 +287,7 @@ public class XPermMapService extends XPermMapServiceBase<XXPermMap, VXPermMap> {
}
if(mObj.getUpdatedByUserId()==null || mObj.getUpdatedByUserId()==0){
if(!stringUtil.isEmpty(vObj.getUpdatedBy())){
- xXPortalUser= xADaoManager.getXXPortalUser().findByLoginId(vObj.getUpdatedBy());
+ xXPortalUser= rangerDaoManager.getXXPortalUser().findByLoginId(vObj.getUpdatedBy());
if(xXPortalUser!=null){
mObj.setUpdatedByUserId(xXPortalUser.getId());
}
@@ -297,13 +303,13 @@ public class XPermMapService extends XPermMapServiceBase<XXPermMap, VXPermMap> {
if(mObj!=null && vObj!=null){
XXPortalUser xXPortalUser=null;
if(stringUtil.isEmpty(vObj.getOwner())){
- xXPortalUser= xADaoManager.getXXPortalUser().getById(mObj.getAddedByUserId());
+ xXPortalUser= rangerDaoManager.getXXPortalUser().getById(mObj.getAddedByUserId());
if(xXPortalUser!=null){
vObj.setOwner(xXPortalUser.getLoginId());
}
}
if(stringUtil.isEmpty(vObj.getUpdatedBy())){
- xXPortalUser= xADaoManager.getXXPortalUser().getById(mObj.getUpdatedByUserId());
+ xXPortalUser= rangerDaoManager.getXXPortalUser().getById(mObj.getUpdatedByUserId());
if(xXPortalUser!=null){
vObj.setUpdatedBy(xXPortalUser.getLoginId());
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XPermMapServiceBase.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XPermMapServiceBase.java b/security-admin/src/main/java/org/apache/ranger/service/XPermMapServiceBase.java
index 3ff0d72..afcd307 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XPermMapServiceBase.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XPermMapServiceBase.java
@@ -26,10 +26,10 @@
import java.util.ArrayList;
import java.util.List;
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.service.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.SearchCriteria;
+import org.apache.ranger.entity.XXPermMap;
+import org.apache.ranger.view.VXPermMap;
+import org.apache.ranger.view.VXPermMapList;
public abstract class XPermMapServiceBase<T extends XXPermMap, V extends VXPermMap>
extends AbstractBaseResourceService<T, V> {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XPolicyExportAuditService.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XPolicyExportAuditService.java b/security-admin/src/main/java/org/apache/ranger/service/XPolicyExportAuditService.java
index b242f0b..a8fe1de 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XPolicyExportAuditService.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XPolicyExportAuditService.java
@@ -20,12 +20,12 @@
package org.apache.ranger.service;
import org.apache.ranger.common.SearchField;
-import org.apache.ranger.common.SortField;
import org.apache.ranger.common.SearchField.DATA_TYPE;
import org.apache.ranger.common.SearchField.SEARCH_TYPE;
+import org.apache.ranger.common.SortField;
import org.apache.ranger.common.SortField.SORT_ORDER;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.entity.XXPolicyExportAudit;
+import org.apache.ranger.view.VXPolicyExportAudit;
import org.springframework.context.annotation.Scope;
import org.springframework.stereotype.Service;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XPolicyExportAuditServiceBase.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XPolicyExportAuditServiceBase.java b/security-admin/src/main/java/org/apache/ranger/service/XPolicyExportAuditServiceBase.java
index 6b05c9e..af58706 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XPolicyExportAuditServiceBase.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XPolicyExportAuditServiceBase.java
@@ -26,10 +26,10 @@
import java.util.ArrayList;
import java.util.List;
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.service.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.SearchCriteria;
+import org.apache.ranger.entity.XXPolicyExportAudit;
+import org.apache.ranger.view.VXPolicyExportAudit;
+import org.apache.ranger.view.VXPolicyExportAuditList;
public abstract class XPolicyExportAuditServiceBase<T extends XXPolicyExportAudit, V extends VXPolicyExportAudit>
extends AbstractBaseResourceService<T, V> {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XPolicyService.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XPolicyService.java b/security-admin/src/main/java/org/apache/ranger/service/XPolicyService.java
index b95a3e3..42de408 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XPolicyService.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XPolicyService.java
@@ -37,7 +37,7 @@ import org.apache.ranger.common.PropertiesUtil;
import org.apache.ranger.common.RESTErrorUtil;
import org.apache.ranger.common.SearchCriteria;
import org.apache.ranger.common.StringUtil;
-import org.apache.ranger.db.XADaoManager;
+import org.apache.ranger.db.RangerDaoManager;
import org.apache.ranger.entity.XXAsset;
import org.apache.ranger.entity.XXGroup;
import org.apache.ranger.entity.XXPermMap;
@@ -67,7 +67,7 @@ public class XPolicyService extends PublicAPIServiceBase<VXResource, VXPolicy> {
StringUtil stringUtil;
@Autowired
- XADaoManager xaDaoMgr;
+ RangerDaoManager xaDaoMgr;
@Autowired
XPermMapService xPermMapService;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XPortalUserService.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XPortalUserService.java b/security-admin/src/main/java/org/apache/ranger/service/XPortalUserService.java
index aafedfe..9dffbcb 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XPortalUserService.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XPortalUserService.java
@@ -27,9 +27,11 @@ import java.util.List;
import org.apache.ranger.common.AppConstants;
import org.apache.ranger.common.StringUtil;
import org.apache.ranger.common.view.VTrxLogAttr;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.util.XAEnumUtil;
-import org.apache.ranger.view.*;
+import org.apache.ranger.entity.XXAsset;
+import org.apache.ranger.entity.XXPortalUser;
+import org.apache.ranger.entity.XXTrxLog;
+import org.apache.ranger.util.RangerEnumUtil;
+import org.apache.ranger.view.VXPortalUser;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.context.annotation.Scope;
import org.springframework.stereotype.Service;
@@ -40,7 +42,7 @@ public class XPortalUserService extends
XPortalUserServiceBase<XXPortalUser, VXPortalUser> {
@Autowired
- XAEnumUtil xaEnumUtil;
+ RangerEnumUtil xaEnumUtil;
@Autowired
StringUtil stringUtil;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XPortalUserServiceBase.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XPortalUserServiceBase.java b/security-admin/src/main/java/org/apache/ranger/service/XPortalUserServiceBase.java
index 602e87d..c5fdec9 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XPortalUserServiceBase.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XPortalUserServiceBase.java
@@ -26,10 +26,10 @@
import java.util.ArrayList;
import java.util.List;
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.service.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.SearchCriteria;
+import org.apache.ranger.entity.XXPortalUser;
+import org.apache.ranger.view.VXPortalUser;
+import org.apache.ranger.view.VXPortalUserList;
public abstract class XPortalUserServiceBase<T extends XXPortalUser, V extends VXPortalUser>
extends AbstractBaseResourceService<T, V> {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XRepositoryService.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XRepositoryService.java b/security-admin/src/main/java/org/apache/ranger/service/XRepositoryService.java
index 5f00ced..fcaa4d8 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XRepositoryService.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XRepositoryService.java
@@ -28,8 +28,8 @@ import org.apache.ranger.common.AppConstants;
import org.apache.ranger.common.MessageEnums;
import org.apache.ranger.common.PropertiesUtil;
import org.apache.ranger.common.RESTErrorUtil;
+import org.apache.ranger.common.RangerCommonEnums;
import org.apache.ranger.common.SearchCriteria;
-import org.apache.ranger.common.XACommonEnums;
import org.apache.ranger.view.VXAsset;
import org.apache.ranger.view.VXAssetList;
import org.apache.ranger.view.VXRepository;
@@ -61,7 +61,7 @@ public class XRepositoryService extends
vRepo.setConfig(vXAsset.getConfig());
int actStatus = vXAsset.getActiveStatus();
- boolean isAct = (actStatus == XACommonEnums.STATUS_DISABLED) ? false
+ boolean isAct = (actStatus == RangerCommonEnums.STATUS_DISABLED) ? false
: true;
vRepo.setIsActive(isAct);
@@ -81,8 +81,8 @@ public class XRepositoryService extends
.getRepositoryType()));
vXAsset.setConfig(vXRepo.getConfig());
- int actStatus = (!vXRepo.getIsActive()) ? XACommonEnums.STATUS_DISABLED
- : XACommonEnums.STATUS_ENABLED;
+ int actStatus = (!vXRepo.getIsActive()) ? RangerCommonEnums.STATUS_DISABLED
+ : RangerCommonEnums.STATUS_ENABLED;
vXAsset.setActiveStatus(actStatus);
@@ -97,8 +97,8 @@ public class XRepositoryService extends
ArrayList<Integer> statusList = new ArrayList<Integer>();
if (statusObj == null) {
- statusList.add(XACommonEnums.STATUS_DISABLED);
- statusList.add(XACommonEnums.STATUS_ENABLED);
+ statusList.add(RangerCommonEnums.STATUS_DISABLED);
+ statusList.add(RangerCommonEnums.STATUS_ENABLED);
} else {
boolean status = restErrorUtil.parseBoolean(
request.getParameter("status"), "Invalid value for "
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XResourceService.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XResourceService.java b/security-admin/src/main/java/org/apache/ranger/service/XResourceService.java
index 3ee48a5..b85ae55 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XResourceService.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XResourceService.java
@@ -19,7 +19,6 @@
package org.apache.ranger.service;
-import java.io.File;
import java.lang.reflect.Field;
import java.util.ArrayList;
import java.util.Collections;
@@ -28,25 +27,36 @@ import java.util.List;
import java.util.Map.Entry;
import org.apache.commons.lang.ArrayUtils;
-import org.apache.commons.lang.StringUtils;
-import org.apache.ranger.biz.XABizUtil;
+import org.apache.ranger.biz.RangerBizUtil;
import org.apache.ranger.common.AppConstants;
import org.apache.ranger.common.ContextUtil;
import org.apache.ranger.common.MessageEnums;
import org.apache.ranger.common.PropertiesUtil;
+import org.apache.ranger.common.RangerConstants;
import org.apache.ranger.common.SearchCriteria;
import org.apache.ranger.common.SearchField;
+import org.apache.ranger.common.SearchField.DATA_TYPE;
+import org.apache.ranger.common.SearchField.SEARCH_TYPE;
import org.apache.ranger.common.SortField;
import org.apache.ranger.common.StringUtil;
import org.apache.ranger.common.UserSessionBase;
-import org.apache.ranger.common.XAConstants;
-import org.apache.ranger.common.SearchField.DATA_TYPE;
-import org.apache.ranger.common.SearchField.SEARCH_TYPE;
import org.apache.ranger.common.view.VTrxLogAttr;
-import org.apache.ranger.db.XADaoManager;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.util.XAEnumUtil;
-import org.apache.ranger.view.*;
+import org.apache.ranger.db.RangerDaoManager;
+import org.apache.ranger.entity.XXAsset;
+import org.apache.ranger.entity.XXGroup;
+import org.apache.ranger.entity.XXPermMap;
+import org.apache.ranger.entity.XXPortalUser;
+import org.apache.ranger.entity.XXResource;
+import org.apache.ranger.entity.XXTrxLog;
+import org.apache.ranger.entity.XXUser;
+import org.apache.ranger.util.RangerEnumUtil;
+import org.apache.ranger.view.VXAuditMap;
+import org.apache.ranger.view.VXAuditMapList;
+import org.apache.ranger.view.VXPermMap;
+import org.apache.ranger.view.VXPermMapList;
+import org.apache.ranger.view.VXResource;
+import org.apache.ranger.view.VXResourceList;
+import org.apache.ranger.view.VXResponse;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.context.annotation.Scope;
import org.springframework.stereotype.Service;
@@ -68,12 +78,12 @@ public class XResourceService extends
StringUtil stringUtil;
@Autowired
- XADaoManager xADaoManager;
+ RangerDaoManager rangerDaoManager;
@Autowired
- XABizUtil xaBizUtil;
+ RangerBizUtil xaBizUtil;
@Autowired
- XAEnumUtil xaEnumUtil;
+ RangerEnumUtil xaEnumUtil;
@Autowired
XPolicyService xPolicyService;
@@ -185,7 +195,7 @@ public class XResourceService extends
Long assetId = vObj.getAssetId();
int assetType;
if(assetId != null){
- XXAsset xAsset = xADaoManager.getXXAsset().getById(assetId);
+ XXAsset xAsset = rangerDaoManager.getXXAsset().getById(assetId);
if(xAsset != null){
assetType = xAsset.getAssetType();
} else {
@@ -326,7 +336,7 @@ public class XResourceService extends
}
private void populateAssetProperties(VXResource vXResource) {
- XXAsset xxAsset = xADaoManager.getXXAsset().getById(
+ XXAsset xxAsset = rangerDaoManager.getXXAsset().getById(
vXResource.getAssetId());
if (xxAsset != null) {
vXResource.setAssetName(xxAsset.getName());
@@ -420,7 +430,7 @@ public class XResourceService extends
XXPortalUser xXPortalUser= null;
if(mObj.getAddedByUserId()==null || mObj.getAddedByUserId()==0){
if(!stringUtil.isEmpty(vObj.getOwner())){
- xXPortalUser=xADaoManager.getXXPortalUser().findByLoginId(vObj.getOwner());
+ xXPortalUser=rangerDaoManager.getXXPortalUser().findByLoginId(vObj.getOwner());
if(xXPortalUser!=null){
mObj.setAddedByUserId(xXPortalUser.getId());
}
@@ -428,7 +438,7 @@ public class XResourceService extends
}
if(mObj.getUpdatedByUserId()==null || mObj.getUpdatedByUserId()==0){
if(!stringUtil.isEmpty(vObj.getUpdatedBy())){
- xXPortalUser= xADaoManager.getXXPortalUser().findByLoginId(vObj.getUpdatedBy());
+ xXPortalUser= rangerDaoManager.getXXPortalUser().findByLoginId(vObj.getUpdatedBy());
if(xXPortalUser!=null){
mObj.setUpdatedByUserId(xXPortalUser.getId());
}
@@ -447,13 +457,13 @@ public class XResourceService extends
if(mObj!=null && vObj!=null){
XXPortalUser xXPortalUser= null;
if(stringUtil.isEmpty(vObj.getOwner())){
- xXPortalUser=xADaoManager.getXXPortalUser().getById(mObj.getAddedByUserId());
+ xXPortalUser=rangerDaoManager.getXXPortalUser().getById(mObj.getAddedByUserId());
if(xXPortalUser!=null){
vObj.setOwner(xXPortalUser.getLoginId());
}
}
if(stringUtil.isEmpty(vObj.getUpdatedBy())){
- xXPortalUser= xADaoManager.getXXPortalUser().getById(mObj.getUpdatedByUserId());
+ xXPortalUser= rangerDaoManager.getXXPortalUser().getById(mObj.getUpdatedByUserId());
if(xXPortalUser!=null){
vObj.setUpdatedBy(xXPortalUser.getLoginId());
}
@@ -468,7 +478,7 @@ public class XResourceService extends
*/
public void checkAccess(VXResource vXResource) {
- XXAsset xxAsset = xADaoManager.getXXAsset().getById(
+ XXAsset xxAsset = rangerDaoManager.getXXAsset().getById(
vXResource.getAssetId());
if (xxAsset == null) {
throw restErrorUtil
@@ -531,7 +541,7 @@ public class XResourceService extends
resourceTypeList);
if (!access) {
- XXUser xxUser = xADaoManager.getXXUser().getById(
+ XXUser xxUser = rangerDaoManager.getXXUser().getById(
vxPermMap.getUserId());
throw restErrorUtil.createRESTException(
xxUser.getName() + " may not have "
@@ -553,7 +563,7 @@ public class XResourceService extends
vXResource.getIsRecursive(), assetType,
resourceTypeList);
if (!access) {
- XXGroup xxGroup = xADaoManager.getXXGroup()
+ XXGroup xxGroup = rangerDaoManager.getXXGroup()
.getById(vxPermMap.getGroupId());
throw restErrorUtil.createRESTException(xxGroup
.getName() + " may not have " + AppConstants
@@ -644,19 +654,19 @@ public class XResourceService extends
int isRecursive, List<Integer> resourceTypeList) {
HashMap<String, Object> accessMap = new HashMap<String, Object>();
boolean isAccess = false;
- List<XXGroup> xGroupList = xADaoManager.getXXGroup().findByUserId(
+ List<XXGroup> xGroupList = rangerDaoManager.getXXGroup().findByUserId(
userId);
boolean isRecursivlyAllowed = false;
List<XXResource> xXResourceList = null;
if (assetType == AppConstants.ASSET_HDFS) {
- xXResourceList = xADaoManager.getXXResource().findByAssetId(
+ xXResourceList = rangerDaoManager.getXXResource().findByAssetId(
assetId);
//this code block is to add record of 'public' group in group_user mapping list.
- XXGroup xXGroupPublic = xADaoManager.getXXGroup().
- findByGroupName(XAConstants.GROUP_PUBLIC);
+ XXGroup xXGroupPublic = rangerDaoManager.getXXGroup().
+ findByGroupName(RangerConstants.GROUP_PUBLIC);
if (xXGroupPublic != null
&& xXGroupPublic.getName().trim()
- .equalsIgnoreCase(XAConstants.GROUP_PUBLIC)) {
+ .equalsIgnoreCase(RangerConstants.GROUP_PUBLIC)) {
if(xGroupList!=null){
xGroupList.add(xXGroupPublic);
}else{
@@ -665,7 +675,7 @@ public class XResourceService extends
}
}
} else {
- xXResourceList = xADaoManager.getXXResource()
+ xXResourceList = rangerDaoManager.getXXResource()
.findByAssetIdAndResourceTypes(assetId, resourceTypeList);
}
String expandedName = xaBizUtil.replaceMetaChars(path);
@@ -715,7 +725,7 @@ public class XResourceService extends
}
if (matchFound) {
// get the perms for this resource
- List<XXPermMap> permMapList = xADaoManager.getXXPermMap()
+ List<XXPermMap> permMapList = rangerDaoManager.getXXPermMap()
.findByResourceId(xResource.getId());
for (XXPermMap permMap : permMapList) {
if (permMap.getPermType() == permType) {
@@ -751,10 +761,10 @@ public class XResourceService extends
List<XXResource> xXResourceList = new ArrayList<XXResource>();
if (assetType == AppConstants.ASSET_HDFS) {
- xXResourceList = xADaoManager.getXXResource().findByAssetId(
+ xXResourceList = rangerDaoManager.getXXResource().findByAssetId(
assetId);
} else {
- xXResourceList = xADaoManager.getXXResource()
+ xXResourceList = rangerDaoManager.getXXResource()
.findByAssetIdAndResourceTypes(assetId, resourceTypeList);
}
@@ -805,7 +815,7 @@ public class XResourceService extends
}
if (matchFound) {
// get the perms for this resource
- List<XXPermMap> permMapList = xADaoManager.getXXPermMap()
+ List<XXPermMap> permMapList = rangerDaoManager.getXXPermMap()
.findByResourceId(xResource.getId());
for (XXPermMap permMap : permMapList) {
if (permMap.getPermType() == permType) {
@@ -945,7 +955,7 @@ public class XResourceService extends
return null;
}
- XXAsset xAsset = xADaoManager.getXXAsset().getById(vObj.getAssetId());
+ XXAsset xAsset = rangerDaoManager.getXXAsset().getById(vObj.getAssetId());
String parentObjectName = xAsset.getName();
List<XXTrxLog> trxLogList = new ArrayList<XXTrxLog>();
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XResourceServiceBase.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XResourceServiceBase.java b/security-admin/src/main/java/org/apache/ranger/service/XResourceServiceBase.java
index 39b0838..4c123ef 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XResourceServiceBase.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XResourceServiceBase.java
@@ -26,10 +26,10 @@
import java.util.ArrayList;
import java.util.List;
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.service.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.SearchCriteria;
+import org.apache.ranger.entity.XXResource;
+import org.apache.ranger.view.VXResource;
+import org.apache.ranger.view.VXResourceList;
public abstract class XResourceServiceBase<T extends XXResource, V extends VXResource>
extends AbstractBaseResourceService<T, V> {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XTrxLogService.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XTrxLogService.java b/security-admin/src/main/java/org/apache/ranger/service/XTrxLogService.java
index 8a61aea..7edce5b 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XTrxLogService.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XTrxLogService.java
@@ -26,13 +26,10 @@ import java.util.List;
import java.util.Map;
import javax.persistence.EntityManager;
-import javax.persistence.TypedQuery;
import javax.persistence.criteria.CriteriaBuilder;
import javax.persistence.criteria.CriteriaQuery;
-import javax.persistence.criteria.ParameterExpression;
import javax.persistence.criteria.Predicate;
import javax.persistence.criteria.Root;
-import javax.persistence.criteria.Subquery;
import javax.persistence.metamodel.EntityType;
import javax.persistence.metamodel.Metamodel;
import javax.persistence.metamodel.SingularAttribute;
@@ -41,10 +38,12 @@ import org.apache.ranger.common.SearchCriteria;
import org.apache.ranger.common.SearchField;
import org.apache.ranger.common.SortField;
import org.apache.ranger.common.SortField.SORT_ORDER;
-import org.apache.ranger.db.XADaoManager;
-import org.apache.ranger.entity.*;
+import org.apache.ranger.db.RangerDaoManager;
+import org.apache.ranger.entity.XXPortalUser;
+import org.apache.ranger.entity.XXTrxLog;
import org.apache.ranger.entity.view.VXXTrxLog;
-import org.apache.ranger.view.*;
+import org.apache.ranger.view.VXTrxLog;
+import org.apache.ranger.view.VXTrxLogList;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.context.annotation.Scope;
import org.springframework.stereotype.Service;
@@ -53,7 +52,7 @@ import org.springframework.stereotype.Service;
@Scope("singleton")
public class XTrxLogService extends XTrxLogServiceBase<XXTrxLog, VXTrxLog> {
@Autowired
- XADaoManager xADaoManager;
+ RangerDaoManager rangerDaoManager;
public XTrxLogService(){
searchFields.add(new SearchField("attributeName", "obj.attributeName",
SearchField.DATA_TYPE.STRING, SearchField.SEARCH_TYPE.PARTIAL));
@@ -191,7 +190,7 @@ public class XTrxLogService extends XTrxLogServiceBase<XXTrxLog, VXTrxLog> {
VXTrxLog trxLog = mapCustomViewToViewObj(xTrxLog);
xXPortalUser=null;
if(trxLog.getUpdatedBy()!=null){
- xXPortalUser= xADaoManager.getXXPortalUser().getById(
+ xXPortalUser= rangerDaoManager.getXXPortalUser().getById(
Long.parseLong(trxLog.getUpdatedBy()));
}
if(xXPortalUser!=null){
@@ -419,7 +418,7 @@ public class XTrxLogService extends XTrxLogServiceBase<XXTrxLog, VXTrxLog> {
XXPortalUser xXPortalUser=null;
if(mObj.getAddedByUserId()==null || mObj.getAddedByUserId()==0){
if(!stringUtil.isEmpty(vObj.getOwner())){
- xXPortalUser=xADaoManager.getXXPortalUser().findByLoginId(vObj.getOwner());
+ xXPortalUser=rangerDaoManager.getXXPortalUser().findByLoginId(vObj.getOwner());
if(xXPortalUser!=null){
mObj.setAddedByUserId(xXPortalUser.getId());
}
@@ -427,7 +426,7 @@ public class XTrxLogService extends XTrxLogServiceBase<XXTrxLog, VXTrxLog> {
}
if(mObj.getUpdatedByUserId()==null || mObj.getUpdatedByUserId()==0){
if(!stringUtil.isEmpty(vObj.getUpdatedBy())){
- xXPortalUser= xADaoManager.getXXPortalUser().findByLoginId(vObj.getUpdatedBy());
+ xXPortalUser= rangerDaoManager.getXXPortalUser().findByLoginId(vObj.getUpdatedBy());
if(xXPortalUser!=null){
mObj.setUpdatedByUserId(xXPortalUser.getId());
}
@@ -443,13 +442,13 @@ public class XTrxLogService extends XTrxLogServiceBase<XXTrxLog, VXTrxLog> {
if(mObj!=null && vObj!=null){
XXPortalUser xXPortalUser=null;
if(stringUtil.isEmpty(vObj.getOwner())){
- xXPortalUser= xADaoManager.getXXPortalUser().getById(mObj.getAddedByUserId());
+ xXPortalUser= rangerDaoManager.getXXPortalUser().getById(mObj.getAddedByUserId());
if(xXPortalUser!=null){
vObj.setOwner(xXPortalUser.getLoginId());
}
}
if(stringUtil.isEmpty(vObj.getUpdatedBy())){
- xXPortalUser= xADaoManager.getXXPortalUser().getById(mObj.getUpdatedByUserId());
+ xXPortalUser= rangerDaoManager.getXXPortalUser().getById(mObj.getUpdatedByUserId());
if(xXPortalUser!=null){
vObj.setUpdatedBy(xXPortalUser.getLoginId());
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XTrxLogServiceBase.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XTrxLogServiceBase.java b/security-admin/src/main/java/org/apache/ranger/service/XTrxLogServiceBase.java
index 5b5cd43..e23ee6c 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XTrxLogServiceBase.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XTrxLogServiceBase.java
@@ -26,10 +26,10 @@
import java.util.ArrayList;
import java.util.List;
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.service.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.SearchCriteria;
+import org.apache.ranger.entity.XXTrxLog;
+import org.apache.ranger.view.VXTrxLog;
+import org.apache.ranger.view.VXTrxLogList;
public abstract class XTrxLogServiceBase<T extends XXTrxLog, V extends VXTrxLog>
extends AbstractBaseResourceService<T, V> {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XUserService.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XUserService.java b/security-admin/src/main/java/org/apache/ranger/service/XUserService.java
index 1f09e61..5e4875f 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XUserService.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XUserService.java
@@ -22,25 +22,28 @@
import java.lang.reflect.Field;
import java.util.ArrayList;
import java.util.HashMap;
-import java.util.HashSet;
import java.util.LinkedHashSet;
import java.util.List;
import java.util.Set;
-import org.apache.ranger.biz.XABizUtil;
+import org.apache.ranger.biz.RangerBizUtil;
import org.apache.ranger.common.AppConstants;
import org.apache.ranger.common.MessageEnums;
import org.apache.ranger.common.PropertiesUtil;
+import org.apache.ranger.common.RangerConstants;
import org.apache.ranger.common.SearchField;
import org.apache.ranger.common.SortField;
import org.apache.ranger.common.StringUtil;
-import org.apache.ranger.common.XACommonEnums;
-import org.apache.ranger.common.XAConstants;
import org.apache.ranger.common.view.VTrxLogAttr;
-import org.apache.ranger.db.XADaoManager;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.util.XAEnumUtil;
-import org.apache.ranger.view.*;
+import org.apache.ranger.db.RangerDaoManager;
+import org.apache.ranger.entity.XXGroupUser;
+import org.apache.ranger.entity.XXPortalUser;
+import org.apache.ranger.entity.XXPortalUserRole;
+import org.apache.ranger.entity.XXTrxLog;
+import org.apache.ranger.entity.XXUser;
+import org.apache.ranger.util.RangerEnumUtil;
+import org.apache.ranger.view.VXPortalUser;
+import org.apache.ranger.view.VXUser;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.context.annotation.Scope;
import org.springframework.stereotype.Service;
@@ -52,7 +55,7 @@ public class XUserService extends XUserServiceBase<XXUser, VXUser> {
public static Long createdByUserId = 1L;
@Autowired
- XADaoManager daoManager;
+ RangerDaoManager daoManager;
@Autowired
XPermMapService xPermMapService;
@@ -61,10 +64,10 @@ public class XUserService extends XUserServiceBase<XXUser, VXUser> {
StringUtil stringUtil;
@Autowired
- XAEnumUtil xaEnumUtil;
+ RangerEnumUtil xaEnumUtil;
@Autowired
- XABizUtil xaBizUtil;
+ RangerBizUtil xaBizUtil;
String hiddenPasswordString;
@@ -242,7 +245,7 @@ public class XUserService extends XUserServiceBase<XXUser, VXUser> {
}
}
if(userRoleList==null || userRoleList.size()==0){
- userRoleList.add(XAConstants.ROLE_USER);
+ userRoleList.add(RangerConstants.ROLE_USER);
}
vObj.setUserRoleList(userRoleList);
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/XUserServiceBase.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/XUserServiceBase.java b/security-admin/src/main/java/org/apache/ranger/service/XUserServiceBase.java
index 41dfff3..b8a4487 100644
--- a/security-admin/src/main/java/org/apache/ranger/service/XUserServiceBase.java
+++ b/security-admin/src/main/java/org/apache/ranger/service/XUserServiceBase.java
@@ -26,10 +26,10 @@
import java.util.ArrayList;
import java.util.List;
-import org.apache.ranger.common.*;
-import org.apache.ranger.entity.*;
-import org.apache.ranger.service.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.SearchCriteria;
+import org.apache.ranger.entity.XXUser;
+import org.apache.ranger.view.VXUser;
+import org.apache.ranger.view.VXUserList;
public abstract class XUserServiceBase<T extends XXUser, V extends VXUser>
extends AbstractBaseResourceService<T, V> {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/filter/RangerRESTAPIFilter.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/filter/RangerRESTAPIFilter.java b/security-admin/src/main/java/org/apache/ranger/service/filter/RangerRESTAPIFilter.java
new file mode 100644
index 0000000..6087d35
--- /dev/null
+++ b/security-admin/src/main/java/org/apache/ranger/service/filter/RangerRESTAPIFilter.java
@@ -0,0 +1,278 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+ package org.apache.ranger.service.filter;
+
+import java.lang.annotation.Annotation;
+import java.lang.reflect.Method;
+import java.util.ArrayList;
+import java.util.HashMap;
+import java.util.List;
+import java.util.regex.Matcher;
+import java.util.regex.Pattern;
+
+import javax.ws.rs.DELETE;
+import javax.ws.rs.GET;
+import javax.ws.rs.POST;
+import javax.ws.rs.PUT;
+import javax.ws.rs.Path;
+
+import org.apache.log4j.Logger;
+import org.apache.ranger.common.PropertiesUtil;
+import org.springframework.beans.factory.config.BeanDefinition;
+import org.springframework.context.annotation.ClassPathScanningCandidateComponentProvider;
+
+import com.sun.jersey.api.container.filter.LoggingFilter;
+import com.sun.jersey.api.uri.UriTemplate;
+import com.sun.jersey.spi.container.ContainerRequest;
+import com.sun.jersey.spi.container.ContainerResponse;
+
+public class RangerRESTAPIFilter extends LoggingFilter {
+ Logger logger = Logger.getLogger(RangerRESTAPIFilter.class);
+ static boolean initDone = false;
+
+ boolean logStdOut = true;
+ HashMap<String, String> regexPathMap = new HashMap<String, String>();
+ HashMap<String, Pattern> regexPatternMap = new HashMap<String, Pattern>();
+ List<String> regexList = new ArrayList<String>();
+ List<String> loggedRestPathErrors = new ArrayList<String>();
+ private final Object lock = new Object();
+
+ void init() {
+ if (initDone) {
+ return;
+ }
+ synchronized (lock) {
+ if (initDone) {
+ return;
+ }
+
+ logStdOut = PropertiesUtil.getBooleanProperty(
+ "xa.restapi.log.enabled", initDone);
+
+ // Build hash map
+ try {
+ loadPathPatterns();
+ } catch (Throwable t) {
+ logger.error(
+ "Error parsing REST classes for PATH patterns. Error ignored, but should be fixed immediately",
+ t);
+ }
+ initDone = true;
+ }
+
+ }
+
+ /*
+ * (non-Javadoc)
+ *
+ * @see
+ * com.sun.jersey.spi.container.ContainerRequestFilter#filter(com.sun.jersey
+ * .spi.container.ContainerRequest)
+ */
+ @Override
+ public ContainerRequest filter(ContainerRequest request) {
+ if (!initDone) {
+ init();
+ }
+ if (logStdOut) {
+ String path = request.getRequestUri().getPath();
+
+ // mediaType=multipart/form-data;boundary=----WebKitFormBoundaryTHan76r5AkgpAuVG
+ if (request.getMediaType() != null) {
+ // logger.info("DELETE ME: mediaType=" + request.getMediaType()
+ // + ", getType()" + request.getMediaType().getType()
+ // + ", getSubType()="
+ // + request.getMediaType().getSubtype());
+ } else {
+ logger.info("DELETE ME: mediaType is null. path=" + path);
+ }
+ if ((request.getMediaType() == null || !request.getMediaType()
+ .getType().equals("multipart"))
+ && !path.endsWith("/service/general/logs")) {
+ try {
+ request = super.filter(request);
+ } catch (Throwable t) {
+ logger.error("Error FILTER logging. path=" + path, t);
+ }
+ }
+ }
+
+ return request;
+ }
+
+ /*
+ * (non-Javadoc)
+ *
+ * @see
+ * com.sun.jersey.spi.container.ContainerResponseFilter#filter(com.sun.jersey
+ * .spi.container.ContainerRequest,
+ * com.sun.jersey.spi.container.ContainerResponse)
+ */
+ @Override
+ public ContainerResponse filter(ContainerRequest request,
+ ContainerResponse response) {
+ if (logStdOut) {
+ // If it is image, then don't call super
+ if (response.getMediaType() != null) {
+ // logger.info("DELETE ME: Response= mediaType="
+ // + response.getMediaType() + ", getType()"
+ // + response.getMediaType().getType() + ", getSubType()="
+ // + response.getMediaType().getSubtype());
+ } else {
+ logger.info("DELETE ME: Response= mediaType is null");
+ }
+ if (response.getMediaType() == null
+ || !response.getMediaType().getType().equals("image")) {
+
+ response = super.filter(request, response);
+ }
+ }
+
+ return response;
+ }
+
+ private void loadPathPatterns() throws ClassNotFoundException {
+ String pkg = "org.apache.ranger.service";
+ // List<Class> cList = findClasses(new File(dir), pkg);
+ @SuppressWarnings("rawtypes")
+ List<Class> cList = findClasses(pkg);
+ for (@SuppressWarnings("rawtypes")
+ Class klass : cList) {
+ Annotation[] annotations = klass.getAnnotations();
+ for (Annotation annotation : annotations) {
+ if (!(annotation instanceof Path)) {
+ continue;
+ }
+ Path path = (Path) annotation;
+ if (path.value().startsWith("crud")) {
+ continue;
+ }
+ // logger.info("path=" + path.value());
+ // Loop over the class methods
+ for (Method m : klass.getMethods()) {
+ Annotation[] methodAnnotations = m.getAnnotations();
+ String httpMethod = null;
+ String servicePath = null;
+ for (int ma = 0; ma < methodAnnotations.length; ma++) {
+ if (methodAnnotations[ma] instanceof GET) {
+ httpMethod = "GET";
+ } else if (methodAnnotations[ma] instanceof PUT) {
+ httpMethod = "PUT";
+ } else if (methodAnnotations[ma] instanceof POST) {
+ httpMethod = "POST";
+ } else if (methodAnnotations[ma] instanceof DELETE) {
+ httpMethod = "DELETE";
+ } else if (methodAnnotations[ma] instanceof Path) {
+ servicePath = ((Path) methodAnnotations[ma])
+ .value();
+ }
+ }
+
+ if (httpMethod == null) {
+ continue;
+ }
+
+ String fullPath = path.value();
+ String regEx = httpMethod + ":" + path.value();
+ if (servicePath != null) {
+ if (!servicePath.startsWith("/")) {
+ servicePath = "/" + servicePath;
+ }
+ UriTemplate ut = new UriTemplate(servicePath);
+ regEx = httpMethod + ":" + path.value()
+ + ut.getPattern().getRegex();
+ fullPath += servicePath;
+ }
+ Pattern regexPattern = Pattern.compile(regEx);
+
+ if (regexPatternMap.containsKey(regEx)) {
+ logger.warn("Duplicate regex=" + regEx + ", fullPath="
+ + fullPath);
+ }
+ regexList.add(regEx);
+ regexPathMap.put(regEx, fullPath);
+ regexPatternMap.put(regEx, regexPattern);
+
+ logger.info("path=" + path.value() + ", servicePath="
+ + servicePath + ", fullPath=" + fullPath
+ + ", regEx=" + regEx);
+ }
+ }
+ }
+ // ReOrder list
+ int i = 0;
+ for (i = 0; i < 10; i++) {
+ boolean foundMatches = false;
+ List<String> tmpList = new ArrayList<String>();
+ for (int x = 0; x < regexList.size(); x++) {
+ boolean foundMatch = false;
+ String rX = regexList.get(x);
+ for (int y = 0; y < x; y++) {
+ String rY = regexList.get(y);
+ Matcher matcher = regexPatternMap.get(rY).matcher(rX);
+ if (matcher.matches()) {
+ foundMatch = true;
+ foundMatches = true;
+ // logger.info("rX " + rX + " matched with rY=" + rY
+ // + ". Moving rX to the top. Loop count=" + i);
+ break;
+ }
+ }
+ if (foundMatch) {
+ tmpList.add(0, rX);
+ } else {
+ tmpList.add(rX);
+ }
+ }
+ regexList = tmpList;
+ if (!foundMatches) {
+ logger.info("Done rearranging. loopCount=" + i);
+ break;
+ }
+ }
+ if (i == 10) {
+ logger.warn("Couldn't rearrange even after " + i + " loops");
+ }
+
+ logger.info("Loaded " + regexList.size() + " API methods.");
+ // for (String regEx : regexList) {
+ // logger.info("regEx=" + regEx);
+ // }
+ }
+
+ @SuppressWarnings("rawtypes")
+ private List<Class> findClasses(String packageName)
+ throws ClassNotFoundException {
+ List<Class> classes = new ArrayList<Class>();
+
+ ClassPathScanningCandidateComponentProvider scanner = new ClassPathScanningCandidateComponentProvider(
+ true);
+
+ // scanner.addIncludeFilter(new
+ // AnnotationTypeFilter(<TYPE_YOUR_ANNOTATION_HERE>.class));
+
+ for (BeanDefinition bd : scanner.findCandidateComponents(packageName)) {
+ classes.add(Class.forName(bd.getBeanClassName()));
+ }
+
+ return classes;
+ }
+
+}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/service/filter/XARESTAPIFilter.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/service/filter/XARESTAPIFilter.java b/security-admin/src/main/java/org/apache/ranger/service/filter/XARESTAPIFilter.java
deleted file mode 100644
index 300608e..0000000
--- a/security-admin/src/main/java/org/apache/ranger/service/filter/XARESTAPIFilter.java
+++ /dev/null
@@ -1,280 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing,
- * software distributed under the License is distributed on an
- * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
- * KIND, either express or implied. See the License for the
- * specific language governing permissions and limitations
- * under the License.
- */
-
- package org.apache.ranger.service.filter;
-
-import java.lang.annotation.Annotation;
-import java.lang.reflect.Method;
-import java.util.ArrayList;
-import java.util.HashMap;
-import java.util.List;
-import java.util.regex.Matcher;
-import java.util.regex.Pattern;
-
-import javax.ws.rs.DELETE;
-import javax.ws.rs.GET;
-import javax.ws.rs.POST;
-import javax.ws.rs.PUT;
-import javax.ws.rs.Path;
-import javax.ws.rs.core.MultivaluedMap;
-
-import org.apache.log4j.Logger;
-import org.apache.ranger.common.PropertiesUtil;
-import org.apache.ranger.security.context.XAContextHolder;
-import org.springframework.beans.factory.config.BeanDefinition;
-import org.springframework.context.annotation.ClassPathScanningCandidateComponentProvider;
-
-import com.sun.jersey.api.container.filter.LoggingFilter;
-import com.sun.jersey.api.uri.UriTemplate;
-import com.sun.jersey.spi.container.ContainerRequest;
-import com.sun.jersey.spi.container.ContainerResponse;
-
-public class XARESTAPIFilter extends LoggingFilter {
- Logger logger = Logger.getLogger(XARESTAPIFilter.class);
- static boolean initDone = false;
-
- boolean logStdOut = true;
- HashMap<String, String> regexPathMap = new HashMap<String, String>();
- HashMap<String, Pattern> regexPatternMap = new HashMap<String, Pattern>();
- List<String> regexList = new ArrayList<String>();
- List<String> loggedRestPathErrors = new ArrayList<String>();
- private final Object lock = new Object();
-
- void init() {
- if (initDone) {
- return;
- }
- synchronized (lock) {
- if (initDone) {
- return;
- }
-
- logStdOut = PropertiesUtil.getBooleanProperty(
- "xa.restapi.log.enabled", initDone);
-
- // Build hash map
- try {
- loadPathPatterns();
- } catch (Throwable t) {
- logger.error(
- "Error parsing REST classes for PATH patterns. Error ignored, but should be fixed immediately",
- t);
- }
- initDone = true;
- }
-
- }
-
- /*
- * (non-Javadoc)
- *
- * @see
- * com.sun.jersey.spi.container.ContainerRequestFilter#filter(com.sun.jersey
- * .spi.container.ContainerRequest)
- */
- @Override
- public ContainerRequest filter(ContainerRequest request) {
- if (!initDone) {
- init();
- }
- if (logStdOut) {
- String path = request.getRequestUri().getPath();
-
- // mediaType=multipart/form-data;boundary=----WebKitFormBoundaryTHan76r5AkgpAuVG
- if (request.getMediaType() != null) {
- // logger.info("DELETE ME: mediaType=" + request.getMediaType()
- // + ", getType()" + request.getMediaType().getType()
- // + ", getSubType()="
- // + request.getMediaType().getSubtype());
- } else {
- logger.info("DELETE ME: mediaType is null. path=" + path);
- }
- if ((request.getMediaType() == null || !request.getMediaType()
- .getType().equals("multipart"))
- && !path.endsWith("/service/general/logs")) {
- try {
- request = super.filter(request);
- } catch (Throwable t) {
- logger.error("Error FILTER logging. path=" + path, t);
- }
- }
- }
-
- return request;
- }
-
- /*
- * (non-Javadoc)
- *
- * @see
- * com.sun.jersey.spi.container.ContainerResponseFilter#filter(com.sun.jersey
- * .spi.container.ContainerRequest,
- * com.sun.jersey.spi.container.ContainerResponse)
- */
- @Override
- public ContainerResponse filter(ContainerRequest request,
- ContainerResponse response) {
- if (logStdOut) {
- // If it is image, then don't call super
- if (response.getMediaType() != null) {
- // logger.info("DELETE ME: Response= mediaType="
- // + response.getMediaType() + ", getType()"
- // + response.getMediaType().getType() + ", getSubType()="
- // + response.getMediaType().getSubtype());
- } else {
- logger.info("DELETE ME: Response= mediaType is null");
- }
- if (response.getMediaType() == null
- || !response.getMediaType().getType().equals("image")) {
-
- response = super.filter(request, response);
- }
- }
-
- return response;
- }
-
- private void loadPathPatterns() throws ClassNotFoundException {
- String pkg = "org.apache.ranger.service";
- // List<Class> cList = findClasses(new File(dir), pkg);
- @SuppressWarnings("rawtypes")
- List<Class> cList = findClasses(pkg);
- for (@SuppressWarnings("rawtypes")
- Class klass : cList) {
- Annotation[] annotations = klass.getAnnotations();
- for (Annotation annotation : annotations) {
- if (!(annotation instanceof Path)) {
- continue;
- }
- Path path = (Path) annotation;
- if (path.value().startsWith("crud")) {
- continue;
- }
- // logger.info("path=" + path.value());
- // Loop over the class methods
- for (Method m : klass.getMethods()) {
- Annotation[] methodAnnotations = m.getAnnotations();
- String httpMethod = null;
- String servicePath = null;
- for (int ma = 0; ma < methodAnnotations.length; ma++) {
- if (methodAnnotations[ma] instanceof GET) {
- httpMethod = "GET";
- } else if (methodAnnotations[ma] instanceof PUT) {
- httpMethod = "PUT";
- } else if (methodAnnotations[ma] instanceof POST) {
- httpMethod = "POST";
- } else if (methodAnnotations[ma] instanceof DELETE) {
- httpMethod = "DELETE";
- } else if (methodAnnotations[ma] instanceof Path) {
- servicePath = ((Path) methodAnnotations[ma])
- .value();
- }
- }
-
- if (httpMethod == null) {
- continue;
- }
-
- String fullPath = path.value();
- String regEx = httpMethod + ":" + path.value();
- if (servicePath != null) {
- if (!servicePath.startsWith("/")) {
- servicePath = "/" + servicePath;
- }
- UriTemplate ut = new UriTemplate(servicePath);
- regEx = httpMethod + ":" + path.value()
- + ut.getPattern().getRegex();
- fullPath += servicePath;
- }
- Pattern regexPattern = Pattern.compile(regEx);
-
- if (regexPatternMap.containsKey(regEx)) {
- logger.warn("Duplicate regex=" + regEx + ", fullPath="
- + fullPath);
- }
- regexList.add(regEx);
- regexPathMap.put(regEx, fullPath);
- regexPatternMap.put(regEx, regexPattern);
-
- logger.info("path=" + path.value() + ", servicePath="
- + servicePath + ", fullPath=" + fullPath
- + ", regEx=" + regEx);
- }
- }
- }
- // ReOrder list
- int i = 0;
- for (i = 0; i < 10; i++) {
- boolean foundMatches = false;
- List<String> tmpList = new ArrayList<String>();
- for (int x = 0; x < regexList.size(); x++) {
- boolean foundMatch = false;
- String rX = regexList.get(x);
- for (int y = 0; y < x; y++) {
- String rY = regexList.get(y);
- Matcher matcher = regexPatternMap.get(rY).matcher(rX);
- if (matcher.matches()) {
- foundMatch = true;
- foundMatches = true;
- // logger.info("rX " + rX + " matched with rY=" + rY
- // + ". Moving rX to the top. Loop count=" + i);
- break;
- }
- }
- if (foundMatch) {
- tmpList.add(0, rX);
- } else {
- tmpList.add(rX);
- }
- }
- regexList = tmpList;
- if (!foundMatches) {
- logger.info("Done rearranging. loopCount=" + i);
- break;
- }
- }
- if (i == 10) {
- logger.warn("Couldn't rearrange even after " + i + " loops");
- }
-
- logger.info("Loaded " + regexList.size() + " API methods.");
- // for (String regEx : regexList) {
- // logger.info("regEx=" + regEx);
- // }
- }
-
- @SuppressWarnings("rawtypes")
- private List<Class> findClasses(String packageName)
- throws ClassNotFoundException {
- List<Class> classes = new ArrayList<Class>();
-
- ClassPathScanningCandidateComponentProvider scanner = new ClassPathScanningCandidateComponentProvider(
- true);
-
- // scanner.addIncludeFilter(new
- // AnnotationTypeFilter(<TYPE_YOUR_ANNOTATION_HERE>.class));
-
- for (BeanDefinition bd : scanner.findCandidateComponents(packageName)) {
- classes.add(Class.forName(bd.getBeanClassName()));
- }
-
- return classes;
- }
-
-}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/util/CLIUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/util/CLIUtil.java b/security-admin/src/main/java/org/apache/ranger/util/CLIUtil.java
index dddb48f..1ed340e 100644
--- a/security-admin/src/main/java/org/apache/ranger/util/CLIUtil.java
+++ b/security-admin/src/main/java/org/apache/ranger/util/CLIUtil.java
@@ -26,9 +26,9 @@ import org.apache.log4j.Logger;
import org.apache.ranger.common.PropertiesUtil;
import org.apache.ranger.security.standalone.StandaloneSecurityHandler;
import org.springframework.beans.factory.annotation.Autowired;
-import org.springframework.stereotype.Component;
import org.springframework.context.ApplicationContext;
import org.springframework.context.support.ClassPathXmlApplicationContext;
+import org.springframework.stereotype.Component;
/**
*
[02/12] incubator-ranger git commit: RANGER-194: Rename classes under
web-admin project
Posted by ma...@apache.org.
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXGroup.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXGroup.java b/security-admin/src/main/java/org/apache/ranger/view/VXGroup.java
index 364fef4..5536b3c 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXGroup.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXGroup.java
@@ -24,15 +24,10 @@
*
*/
-import java.util.*;
+import javax.xml.bind.annotation.XmlRootElement;
-import javax.persistence.Column;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.view.*;
-import org.apache.ranger.json.JsonDateSerializer;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.AppConstants;
+import org.apache.ranger.common.RangerCommonEnums;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.annotate.JsonIgnoreProperties;
@@ -60,7 +55,7 @@ public class VXGroup extends VXDataObject implements java.io.Serializable {
*/
protected int groupType = AppConstants.XA_GROUP_UNKNOWN;
- protected int groupSource = XACommonEnums.GROUP_INTERNAL;
+ protected int groupSource = RangerCommonEnums.GROUP_INTERNAL;
/**
* Id of the credential store
*/
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXGroupGroup.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXGroupGroup.java b/security-admin/src/main/java/org/apache/ranger/view/VXGroupGroup.java
index faa6aac..37ad010 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXGroupGroup.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXGroupGroup.java
@@ -24,14 +24,9 @@
*
*/
-import java.util.*;
+import javax.xml.bind.annotation.XmlRootElement;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.view.*;
-import org.apache.ranger.json.JsonDateSerializer;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.AppConstants;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.annotate.JsonIgnoreProperties;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXGroupGroupList.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXGroupGroupList.java b/security-admin/src/main/java/org/apache/ranger/view/VXGroupGroupList.java
index 1757fbb..afc8470 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXGroupGroupList.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXGroupGroupList.java
@@ -24,11 +24,14 @@
*
*/
-import java.util.*;
+import java.util.ArrayList;
+import java.util.List;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlAccessType;
+import javax.xml.bind.annotation.XmlAccessorType;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.view.*;
+import org.apache.ranger.common.view.VList;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.map.annotate.JsonSerialize;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXGroupList.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXGroupList.java b/security-admin/src/main/java/org/apache/ranger/view/VXGroupList.java
index 83c222b..28b541f 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXGroupList.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXGroupList.java
@@ -24,11 +24,14 @@
*
*/
-import java.util.*;
+import java.util.ArrayList;
+import java.util.List;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlAccessType;
+import javax.xml.bind.annotation.XmlAccessorType;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.view.*;
+import org.apache.ranger.common.view.VList;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.map.annotate.JsonSerialize;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXGroupUser.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXGroupUser.java b/security-admin/src/main/java/org/apache/ranger/view/VXGroupUser.java
index c9da6b2..1068f3f 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXGroupUser.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXGroupUser.java
@@ -24,14 +24,9 @@
*
*/
-import java.util.*;
+import javax.xml.bind.annotation.XmlRootElement;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.view.*;
-import org.apache.ranger.json.JsonDateSerializer;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.AppConstants;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.annotate.JsonIgnoreProperties;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXGroupUserList.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXGroupUserList.java b/security-admin/src/main/java/org/apache/ranger/view/VXGroupUserList.java
index 6cb1ae1..1741b19 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXGroupUserList.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXGroupUserList.java
@@ -24,11 +24,14 @@
*
*/
-import java.util.*;
+import java.util.ArrayList;
+import java.util.List;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlAccessType;
+import javax.xml.bind.annotation.XmlAccessorType;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.view.*;
+import org.apache.ranger.common.view.VList;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.map.annotate.JsonSerialize;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXLong.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXLong.java b/security-admin/src/main/java/org/apache/ranger/view/VXLong.java
index 68df898..615371c 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXLong.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXLong.java
@@ -24,14 +24,10 @@
*
*/
-import java.util.*;
+import javax.xml.bind.annotation.XmlRootElement;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.view.*;
-import org.apache.ranger.json.JsonDateSerializer;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.AppConstants;
+import org.apache.ranger.common.view.ViewBaseBean;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.annotate.JsonIgnoreProperties;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXMessage.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXMessage.java b/security-admin/src/main/java/org/apache/ranger/view/VXMessage.java
index a28a313..f516e95 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXMessage.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXMessage.java
@@ -24,14 +24,10 @@
*
*/
-import java.util.*;
+import javax.xml.bind.annotation.XmlRootElement;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.view.*;
-import org.apache.ranger.json.JsonDateSerializer;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.AppConstants;
+import org.apache.ranger.common.view.ViewBaseBean;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.annotate.JsonIgnoreProperties;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXPasswordChange.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXPasswordChange.java b/security-admin/src/main/java/org/apache/ranger/view/VXPasswordChange.java
index d894c33..128c740 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXPasswordChange.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXPasswordChange.java
@@ -24,14 +24,10 @@
*
*/
-import java.util.*;
+import javax.xml.bind.annotation.XmlRootElement;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.view.*;
-import org.apache.ranger.json.JsonDateSerializer;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.AppConstants;
+import org.apache.ranger.common.view.ViewBaseBean;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.annotate.JsonIgnoreProperties;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXPermMap.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXPermMap.java b/security-admin/src/main/java/org/apache/ranger/view/VXPermMap.java
index a64e96a..b273da0 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXPermMap.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXPermMap.java
@@ -24,14 +24,10 @@
*
*/
-import java.util.*;
+import javax.xml.bind.annotation.XmlRootElement;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.view.*;
-import org.apache.ranger.json.JsonDateSerializer;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.AppConstants;
+import org.apache.ranger.common.RangerConstants;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.annotate.JsonIgnoreProperties;
@@ -87,7 +83,7 @@ public class VXPermMap extends VXDataObject implements java.io.Serializable {
* Is recursive
* This attribute is of type enum CommonEnums::BooleanValue
*/
- protected int isRecursive = XAConstants.BOOL_NONE;
+ protected int isRecursive = RangerConstants.BOOL_NONE;
/**
* Is wild card
*/
@@ -103,7 +99,7 @@ public class VXPermMap extends VXDataObject implements java.io.Serializable {
public VXPermMap ( ) {
permFor = AppConstants.XA_PERM_FOR_UNKNOWN;
permType = AppConstants.XA_PERM_TYPE_UNKNOWN;
- isRecursive = XAConstants.BOOL_NONE;
+ isRecursive = RangerConstants.BOOL_NONE;
}
/**
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXPermMapList.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXPermMapList.java b/security-admin/src/main/java/org/apache/ranger/view/VXPermMapList.java
index 065be19..4bf5334 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXPermMapList.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXPermMapList.java
@@ -24,11 +24,14 @@
*
*/
-import java.util.*;
+import java.util.ArrayList;
+import java.util.List;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlAccessType;
+import javax.xml.bind.annotation.XmlAccessorType;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.view.*;
+import org.apache.ranger.common.view.VList;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.map.annotate.JsonSerialize;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXPermObj.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXPermObj.java b/security-admin/src/main/java/org/apache/ranger/view/VXPermObj.java
index 2777ce4..8da18e3 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXPermObj.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXPermObj.java
@@ -26,7 +26,7 @@
import java.util.List;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlRootElement;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXPermObjList.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXPermObjList.java b/security-admin/src/main/java/org/apache/ranger/view/VXPermObjList.java
index c8d1aba..c60c2f2 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXPermObjList.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXPermObjList.java
@@ -24,11 +24,14 @@
* List wrapper class for VXPermObj
*/
-import java.util.*;
+import java.util.ArrayList;
+import java.util.List;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlAccessType;
+import javax.xml.bind.annotation.XmlAccessorType;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.view.*;
+import org.apache.ranger.common.view.VList;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.map.annotate.JsonSerialize;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXPolicy.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXPolicy.java b/security-admin/src/main/java/org/apache/ranger/view/VXPolicy.java
index 32bc6d3..10077c8 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXPolicy.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXPolicy.java
@@ -24,11 +24,11 @@
* Policy
*/
-import java.util.*;
+import java.util.List;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.*;
+import org.apache.ranger.common.AppConstants;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.annotate.JsonIgnoreProperties;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXPolicyExportAudit.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXPolicyExportAudit.java b/security-admin/src/main/java/org/apache/ranger/view/VXPolicyExportAudit.java
index 174cdca..9ac3fa1 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXPolicyExportAudit.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXPolicyExportAudit.java
@@ -24,14 +24,12 @@
*
*/
-import java.util.*;
+import java.util.Date;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.view.*;
+import org.apache.ranger.common.AppConstants;
import org.apache.ranger.json.JsonDateSerializer;
-import org.apache.ranger.view.*;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.annotate.JsonIgnoreProperties;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXPolicyExportAuditList.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXPolicyExportAuditList.java b/security-admin/src/main/java/org/apache/ranger/view/VXPolicyExportAuditList.java
index c58a720..ad740db 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXPolicyExportAuditList.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXPolicyExportAuditList.java
@@ -24,11 +24,14 @@
*
*/
-import java.util.*;
+import java.util.ArrayList;
+import java.util.List;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlAccessType;
+import javax.xml.bind.annotation.XmlAccessorType;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.view.*;
+import org.apache.ranger.common.view.VList;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.map.annotate.JsonSerialize;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXPolicyList.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXPolicyList.java b/security-admin/src/main/java/org/apache/ranger/view/VXPolicyList.java
index 54d9736..2e5f55d 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXPolicyList.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXPolicyList.java
@@ -24,11 +24,14 @@
* List wrapper class for VXPolicy
*/
-import java.util.*;
+import java.util.ArrayList;
+import java.util.List;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlAccessType;
+import javax.xml.bind.annotation.XmlAccessorType;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.view.*;
+import org.apache.ranger.common.view.VList;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.map.annotate.JsonSerialize;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXPortalUser.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXPortalUser.java b/security-admin/src/main/java/org/apache/ranger/view/VXPortalUser.java
index 84f7f55..a0c9ec8 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXPortalUser.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXPortalUser.java
@@ -19,14 +19,11 @@
package org.apache.ranger.view;
-import java.util.*;
+import java.util.Collection;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.view.*;
-import org.apache.ranger.json.JsonDateSerializer;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.AppConstants;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.annotate.JsonIgnoreProperties;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXPortalUserList.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXPortalUserList.java b/security-admin/src/main/java/org/apache/ranger/view/VXPortalUserList.java
index 7d17a99..b0840d6 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXPortalUserList.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXPortalUserList.java
@@ -24,11 +24,14 @@
*
*/
-import java.util.*;
+import java.util.ArrayList;
+import java.util.List;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlAccessType;
+import javax.xml.bind.annotation.XmlAccessorType;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.view.*;
+import org.apache.ranger.common.view.VList;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.map.annotate.JsonSerialize;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXRepository.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXRepository.java b/security-admin/src/main/java/org/apache/ranger/view/VXRepository.java
index e968e16..dae717c 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXRepository.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXRepository.java
@@ -24,9 +24,9 @@
* Repository
*/
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.*;
+import org.apache.ranger.common.AppConstants;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.annotate.JsonIgnoreProperties;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXRepositoryList.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXRepositoryList.java b/security-admin/src/main/java/org/apache/ranger/view/VXRepositoryList.java
index aae5db4..987587a 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXRepositoryList.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXRepositoryList.java
@@ -24,11 +24,14 @@
* List wrapper class for VXRepository
*/
-import java.util.*;
+import java.util.ArrayList;
+import java.util.List;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlAccessType;
+import javax.xml.bind.annotation.XmlAccessorType;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.view.*;
+import org.apache.ranger.common.view.VList;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.map.annotate.JsonSerialize;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXResource.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXResource.java b/security-admin/src/main/java/org/apache/ranger/view/VXResource.java
index d8f0226..23d3e4a 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXResource.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXResource.java
@@ -24,14 +24,12 @@
*
*/
-import java.util.*;
+import java.util.List;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.view.*;
-import org.apache.ranger.json.JsonDateSerializer;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.AppConstants;
+import org.apache.ranger.common.RangerConstants;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.annotate.JsonIgnoreProperties;
@@ -75,7 +73,7 @@ public class VXResource extends VXDataObject implements java.io.Serializable {
* Whether to encrypt this resource
* This attribute is of type enum CommonEnums::BooleanValue
*/
- protected int isEncrypt = XAConstants.BOOL_FALSE;
+ protected int isEncrypt = RangerConstants.BOOL_FALSE;
/**
* List of permissions maps
*/
@@ -88,7 +86,7 @@ public class VXResource extends VXDataObject implements java.io.Serializable {
* Is recursive
* This attribute is of type enum CommonEnums::BooleanValue
*/
- protected int isRecursive = XAConstants.BOOL_NONE;
+ protected int isRecursive = RangerConstants.BOOL_NONE;
/**
* Group to which this resource belongs to
*/
@@ -137,7 +135,7 @@ public class VXResource extends VXDataObject implements java.io.Serializable {
* Check parent permission
* This attribute is of type enum CommonEnums::BooleanValue
*/
- protected int checkParentPermission = XAConstants.BOOL_NONE;
+ protected int checkParentPermission = RangerConstants.BOOL_NONE;
/**
* Topologoies
*/
@@ -152,9 +150,9 @@ public class VXResource extends VXDataObject implements java.io.Serializable {
*/
public VXResource ( ) {
resourceType = AppConstants.RESOURCE_PATH;
- isEncrypt = XAConstants.BOOL_FALSE;
- isRecursive = XAConstants.BOOL_NONE;
- checkParentPermission = XAConstants.BOOL_NONE;
+ isEncrypt = RangerConstants.BOOL_FALSE;
+ isRecursive = RangerConstants.BOOL_NONE;
+ checkParentPermission = RangerConstants.BOOL_NONE;
}
/**
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXResourceList.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXResourceList.java b/security-admin/src/main/java/org/apache/ranger/view/VXResourceList.java
index 3a639b7..7a49c0a 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXResourceList.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXResourceList.java
@@ -24,11 +24,14 @@
*
*/
-import java.util.*;
+import java.util.ArrayList;
+import java.util.List;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlAccessType;
+import javax.xml.bind.annotation.XmlAccessorType;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.view.*;
+import org.apache.ranger.common.view.VList;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.map.annotate.JsonSerialize;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXResponse.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXResponse.java b/security-admin/src/main/java/org/apache/ranger/view/VXResponse.java
index 1176a11..2451afd 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXResponse.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXResponse.java
@@ -24,14 +24,12 @@
*
*/
-import java.util.*;
+import java.util.List;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.view.*;
-import org.apache.ranger.json.JsonDateSerializer;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.AppConstants;
+import org.apache.ranger.common.view.ViewBaseBean;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.annotate.JsonIgnoreProperties;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXString.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXString.java b/security-admin/src/main/java/org/apache/ranger/view/VXString.java
index 1515f25..bd52ff7 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXString.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXString.java
@@ -24,14 +24,10 @@
*
*/
-import java.util.*;
+import javax.xml.bind.annotation.XmlRootElement;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.view.*;
-import org.apache.ranger.json.JsonDateSerializer;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.AppConstants;
+import org.apache.ranger.common.view.ViewBaseBean;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.annotate.JsonIgnoreProperties;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXStringList.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXStringList.java b/security-admin/src/main/java/org/apache/ranger/view/VXStringList.java
index f096bfb..4d830e2 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXStringList.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXStringList.java
@@ -24,11 +24,14 @@
*
*/
-import java.util.*;
+import java.util.ArrayList;
+import java.util.List;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlAccessType;
+import javax.xml.bind.annotation.XmlAccessorType;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.view.*;
+import org.apache.ranger.common.view.VList;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.map.annotate.JsonSerialize;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXTrxLog.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXTrxLog.java b/security-admin/src/main/java/org/apache/ranger/view/VXTrxLog.java
index 00f2bf2..6ee1394 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXTrxLog.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXTrxLog.java
@@ -24,14 +24,9 @@
*
*/
-import java.util.*;
+import javax.xml.bind.annotation.XmlRootElement;
-import javax.xml.bind.annotation.*;
-
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.view.*;
-import org.apache.ranger.json.JsonDateSerializer;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.RangerConstants;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.annotate.JsonIgnoreProperties;
@@ -49,7 +44,7 @@ public class VXTrxLog extends VXDataObject implements java.io.Serializable {
* Name of the class to which the object id belongs to
* This attribute is of type enum CommonEnums::ClassTypes
*/
- protected int objectClassType = XAConstants.CLASS_TYPE_NONE;
+ protected int objectClassType = RangerConstants.CLASS_TYPE_NONE;
/**
* Id of the object to which this notes refers to
*/
@@ -107,7 +102,7 @@ public class VXTrxLog extends VXDataObject implements java.io.Serializable {
* Default constructor. This will set all the attributes to default value.
*/
public VXTrxLog ( ) {
- objectClassType = XAConstants.CLASS_TYPE_NONE;
+ objectClassType = RangerConstants.CLASS_TYPE_NONE;
}
/**
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXTrxLogList.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXTrxLogList.java b/security-admin/src/main/java/org/apache/ranger/view/VXTrxLogList.java
index 6a40118..ab4ffd0 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXTrxLogList.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXTrxLogList.java
@@ -19,11 +19,14 @@
package org.apache.ranger.view;
-import java.util.*;
+import java.util.ArrayList;
+import java.util.List;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlAccessType;
+import javax.xml.bind.annotation.XmlAccessorType;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.view.*;
+import org.apache.ranger.common.view.VList;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.map.annotate.JsonSerialize;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXUser.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXUser.java b/security-admin/src/main/java/org/apache/ranger/view/VXUser.java
index 3324986..a237377 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXUser.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXUser.java
@@ -24,14 +24,11 @@
*
*/
-import java.util.*;
+import java.util.Collection;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.*;
-import org.apache.ranger.common.view.*;
-import org.apache.ranger.json.JsonDateSerializer;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.AppConstants;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.annotate.JsonIgnoreProperties;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/view/VXUserList.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/view/VXUserList.java b/security-admin/src/main/java/org/apache/ranger/view/VXUserList.java
index a1b403e..2e5b9b1 100644
--- a/security-admin/src/main/java/org/apache/ranger/view/VXUserList.java
+++ b/security-admin/src/main/java/org/apache/ranger/view/VXUserList.java
@@ -24,11 +24,14 @@
*
*/
-import java.util.*;
+import java.util.ArrayList;
+import java.util.List;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlAccessType;
+import javax.xml.bind.annotation.XmlAccessorType;
+import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.view.*;
+import org.apache.ranger.common.view.VList;
import org.codehaus.jackson.annotate.JsonAutoDetect;
import org.codehaus.jackson.annotate.JsonAutoDetect.Visibility;
import org.codehaus.jackson.map.annotate.JsonSerialize;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/resources/conf.dist/security-applicationContext.xml
----------------------------------------------------------------------
diff --git a/security-admin/src/main/resources/conf.dist/security-applicationContext.xml b/security-admin/src/main/resources/conf.dist/security-applicationContext.xml
index 908dd6e..5a210db 100644
--- a/security-admin/src/main/resources/conf.dist/security-applicationContext.xml
+++ b/security-admin/src/main/resources/conf.dist/security-applicationContext.xml
@@ -99,30 +99,30 @@ http://www.springframework.org/schema/security/spring-security-oauth2-1.0.xsd">
</beans:property>
</beans:bean>
- <beans:bean id="customUsernamePasswordAuthenticationFilter" class="org.apache.ranger.security.web.filter.XAUsernamePasswordAuthenticationFilter">
+ <beans:bean id="customUsernamePasswordAuthenticationFilter" class="org.apache.ranger.security.web.filter.RangerUsernamePasswordAuthenticationFilter">
<beans:property name="authenticationManager" ref="authenticationManager"/>
<beans:property name="authenticationSuccessHandler" ref="ajaxAuthSuccessHandler"/>
<beans:property name="authenticationFailureHandler" ref="ajaxAuthFailureHandler"/>
<!-- beans:property name="rememberMeServices" ref="rememberMeServices"/ -->
</beans:bean>
- <beans:bean id="authenticationProcessingFilterEntryPoint" class="org.apache.ranger.security.web.authentication.XAAuthenticationEntryPoint">
+ <beans:bean id="authenticationProcessingFilterEntryPoint" class="org.apache.ranger.security.web.authentication.RangerAuthenticationEntryPoint">
<beans:property name="loginFormUrl" value="/login.jsp"/>
<beans:property name="forceHttps" value="false"/>
</beans:bean>
- <beans:bean id="ajaxAuthSuccessHandler" class="org.apache.ranger.security.web.authentication.XAAuthSuccessHandler">
+ <beans:bean id="ajaxAuthSuccessHandler" class="org.apache.ranger.security.web.authentication.RangerAuthSuccessHandler">
<beans:property name="defaultTargetUrl" value="/dashboard.jsp"/>
</beans:bean>
- <beans:bean id="ajaxAuthFailureHandler" class="org.apache.ranger.security.web.authentication.XAAuthFailureHandler">
+ <beans:bean id="ajaxAuthFailureHandler" class="org.apache.ranger.security.web.authentication.RangerAuthFailureHandler">
<beans:property name="defaultFailureUrl" value="/public/failedLogin.jsp?login_error=1"/>
</beans:bean>
<beans:bean id="customLogoutSuccessHandler" class="org.apache.ranger.security.web.authentication.CustomLogoutSuccessHandler">
</beans:bean>
- <beans:bean id="userContextFormationFilter" class="org.apache.ranger.security.web.filter.XASecurityContextFormationFilter"/>
+ <beans:bean id="userContextFormationFilter" class="org.apache.ranger.security.web.filter.RangerSecurityContextFormationFilter"/>
<security:jdbc-user-service id="userService" data-source-ref="defaultDataSource"
users-by-username-query="select LOGIN_ID,PASSWORD,STATUS from x_portal_user where LOGIN_ID=? and STATUS = 1"
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/webapp/WEB-INF/web.xml
----------------------------------------------------------------------
diff --git a/security-admin/src/main/webapp/WEB-INF/web.xml b/security-admin/src/main/webapp/WEB-INF/web.xml
index a3805c8..cbd5724 100644
--- a/security-admin/src/main/webapp/WEB-INF/web.xml
+++ b/security-admin/src/main/webapp/WEB-INF/web.xml
@@ -56,11 +56,11 @@
</init-param>
<init-param>
<param-name>com.sun.jersey.spi.container.ContainerRequestFilters</param-name>
- <param-value>org.apache.ranger.service.filter.XARESTAPIFilter</param-value>
+ <param-value>org.apache.ranger.service.filter.RangerRESTAPIFilter</param-value>
</init-param>
<init-param>
<param-name>com.sun.jersey.spi.container.ContainerResponseFilters</param-name>
- <param-value>org.apache.ranger.service.filter.XARESTAPIFilter</param-value>
+ <param-value>org.apache.ranger.service.filter.RangerRESTAPIFilter</param-value>
</init-param>
<init-param>
<param-name>com.sun.jersey.api.json.POJOMappingFeature</param-name>
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/test/java/org/apache/ranger/biz/TestAssetMgr.java
----------------------------------------------------------------------
diff --git a/security-admin/src/test/java/org/apache/ranger/biz/TestAssetMgr.java b/security-admin/src/test/java/org/apache/ranger/biz/TestAssetMgr.java
index 084a142..f6bee3b 100644
--- a/security-admin/src/test/java/org/apache/ranger/biz/TestAssetMgr.java
+++ b/security-admin/src/test/java/org/apache/ranger/biz/TestAssetMgr.java
@@ -27,19 +27,16 @@ import java.util.Map;
import javax.ws.rs.WebApplicationException;
-import org.apache.ranger.biz.AssetConnectionMgr;
-import org.apache.ranger.biz.AssetMgr;
-import org.apache.ranger.biz.XABizUtil;
import org.apache.ranger.common.AppConstants;
import org.apache.ranger.common.ContextUtil;
import org.apache.ranger.common.JSONUtil;
import org.apache.ranger.common.MessageEnums;
import org.apache.ranger.common.RESTErrorUtil;
+import org.apache.ranger.common.RangerCommonEnums;
import org.apache.ranger.common.SearchCriteria;
import org.apache.ranger.common.StringUtil;
import org.apache.ranger.common.UserSessionBase;
-import org.apache.ranger.common.XACommonEnums;
-import org.apache.ranger.db.XADaoManager;
+import org.apache.ranger.db.RangerDaoManager;
import org.apache.ranger.db.XXAssetDao;
import org.apache.ranger.db.XXResourceDao;
import org.apache.ranger.db.XXUserDao;
@@ -47,8 +44,8 @@ import org.apache.ranger.entity.XXAsset;
import org.apache.ranger.entity.XXPortalUser;
import org.apache.ranger.entity.XXResource;
import org.apache.ranger.entity.XXUser;
-import org.apache.ranger.security.context.XAContextHolder;
-import org.apache.ranger.security.context.XASecurityContext;
+import org.apache.ranger.security.context.RangerContextHolder;
+import org.apache.ranger.security.context.RangerSecurityContext;
import org.apache.ranger.service.XAssetService;
import org.apache.ranger.service.XAuditMapService;
import org.apache.ranger.service.XPermMapService;
@@ -97,7 +94,7 @@ public class TestAssetMgr {
StringUtil stringUtil;
@Mock
- XADaoManager xADaoManager;
+ RangerDaoManager rangerDaoManager;
@Mock
XResourceService xResourceService;
@@ -112,7 +109,7 @@ public class TestAssetMgr {
XAuditMapService xAuditMapService;
@Mock
- XABizUtil xaBizUtil;
+ RangerBizUtil xaBizUtil;
@Mock
AssetConnectionMgr assetConnectionMgr;
@@ -124,18 +121,18 @@ public class TestAssetMgr {
public ExpectedException thrown = ExpectedException.none();
public void setup(){
- XASecurityContext context = new XASecurityContext();
+ RangerSecurityContext context = new RangerSecurityContext();
context.setUserSession(new UserSessionBase());
- XAContextHolder.setSecurityContext(context);
+ RangerContextHolder.setSecurityContext(context);
UserSessionBase currentUserSession = ContextUtil.getCurrentUserSession();
currentUserSession.setUserAdmin(true);
}
@Test
public void testCreateXAssetForNoUserSession(){
- XASecurityContext context = new XASecurityContext();
+ RangerSecurityContext context = new RangerSecurityContext();
context.setUserSession(new UserSessionBase());
- XAContextHolder.setSecurityContext(context);
+ RangerContextHolder.setSecurityContext(context);
XXPortalUser portalUser = new XXPortalUser();
portalUser.setId(id);
UserSessionBase currentUserSession = ContextUtil.getCurrentUserSession();
@@ -171,7 +168,7 @@ public class TestAssetMgr {
vXResource.setAuditList(new ArrayList<VXAuditMap>());
Mockito.when(xResourceService.createResource((VXResource)Mockito.anyObject())).thenReturn(vXResource);
XXUserDao xxUserDao = Mockito.mock(XXUserDao.class);
- Mockito.when(xADaoManager.getXXUser()).thenReturn(xxUserDao);
+ Mockito.when(rangerDaoManager.getXXUser()).thenReturn(xxUserDao);
Mockito.when(xxUserDao.findByUserName(userName)).thenReturn(xxUser);
VXUser vxUser = new VXUser();
Mockito.when(xUserService.populateViewBean(xxUser)).thenReturn(vxUser);
@@ -201,10 +198,10 @@ public class TestAssetMgr {
XXAsset xxAsset = new XXAsset();
XXResourceDao xxResourceDao = Mockito.mock(XXResourceDao.class);
XXAssetDao xxAssetDao = Mockito.mock(XXAssetDao.class);
- Mockito.when(xADaoManager.getXXAsset()).thenReturn(xxAssetDao);
+ Mockito.when(rangerDaoManager.getXXAsset()).thenReturn(xxAssetDao);
Mockito.when(xxAssetDao.getById(vXAsset.getId())).thenReturn(xxAsset);
Mockito.when(xAssetService.updateResource((VXAsset)Mockito.anyObject())).thenReturn(vXAssetDB);
- Mockito.when(xADaoManager.getXXResource()).thenReturn(xxResourceDao);
+ Mockito.when(rangerDaoManager.getXXResource()).thenReturn(xxResourceDao);
List<XXResource> lst = new ArrayList<XXResource>();
Mockito.when(xxResourceDao.findByResourceNameAndAssetIdAndRecursiveFlag(Mockito.anyString(),Mockito.anyLong(), Mockito.anyInt())).thenReturn(lst );
@@ -235,7 +232,7 @@ public class TestAssetMgr {
vXResource.setAuditList(new ArrayList<VXAuditMap>());
Mockito.when(xResourceService.createResource((VXResource)Mockito.anyObject())).thenReturn(vXResource);
XXUserDao xxUserDao = Mockito.mock(XXUserDao.class);
- Mockito.when(xADaoManager.getXXUser()).thenReturn(xxUserDao);
+ Mockito.when(rangerDaoManager.getXXUser()).thenReturn(xxUserDao);
Mockito.when(xxUserDao.findByUserName(userName)).thenReturn(xxUser);
VXUser vxUser = new VXUser();
Mockito.when(xUserService.populateViewBean(xxUser)).thenReturn(vxUser);
@@ -278,7 +275,7 @@ public class TestAssetMgr {
vXResource.setAuditList(new ArrayList<VXAuditMap>());
Mockito.when(xResourceService.createResource((VXResource)Mockito.anyObject())).thenReturn(vXResource);
XXUserDao xxUserDao = Mockito.mock(XXUserDao.class);
- Mockito.when(xADaoManager.getXXUser()).thenReturn(xxUserDao);
+ Mockito.when(rangerDaoManager.getXXUser()).thenReturn(xxUserDao);
Mockito.when(xxUserDao.findByUserName(userName)).thenReturn(xxUser);
VXUser vxUser = new VXUser();
Mockito.when(xUserService.populateViewBean(xxUser)).thenReturn(vxUser);
@@ -321,7 +318,7 @@ public class TestAssetMgr {
vXResource.setAuditList(new ArrayList<VXAuditMap>());
Mockito.when(xResourceService.createResource((VXResource)Mockito.anyObject())).thenReturn(vXResource);
XXUserDao xxUserDao = Mockito.mock(XXUserDao.class);
- Mockito.when(xADaoManager.getXXUser()).thenReturn(xxUserDao);
+ Mockito.when(rangerDaoManager.getXXUser()).thenReturn(xxUserDao);
Mockito.when(xxUserDao.findByUserName(userName)).thenReturn(xxUser);
VXUser vxUser = new VXUser();
Mockito.when(xUserService.populateViewBean(xxUser)).thenReturn(vxUser);
@@ -364,7 +361,7 @@ public class TestAssetMgr {
vXResource.setAuditList(new ArrayList<VXAuditMap>());
Mockito.when(xResourceService.createResource((VXResource)Mockito.anyObject())).thenReturn(vXResource);
XXUserDao xxUserDao = Mockito.mock(XXUserDao.class);
- Mockito.when(xADaoManager.getXXUser()).thenReturn(xxUserDao);
+ Mockito.when(rangerDaoManager.getXXUser()).thenReturn(xxUserDao);
Mockito.when(xxUserDao.findByUserName(userName)).thenReturn(xxUser);
VXUser vxUser = new VXUser();
Mockito.when(xUserService.populateViewBean(xxUser)).thenReturn(vxUser);
@@ -402,7 +399,7 @@ public class TestAssetMgr {
XXAsset xxAsset = new XXAsset();
VXResponse vXResponse = new VXResponse();
- Mockito.when(xADaoManager.getXXAsset()).thenReturn(xxAssetDao);
+ Mockito.when(rangerDaoManager.getXXAsset()).thenReturn(xxAssetDao);
Mockito.when(xxAssetDao.getById(assetId)).thenReturn(xxAsset);
Mockito.when(stringUtil.split(vXResource.getName(), ",")).thenReturn(new String[0]);
Mockito.when(xaBizUtil.hasPermission(vXResource,AppConstants.XA_PERM_TYPE_ADMIN)).thenReturn(vXResponse);
@@ -435,7 +432,7 @@ public class TestAssetMgr {
XXResourceDao xxResourceDao = Mockito.mock(XXResourceDao.class);
XXResource xxResource = new XXResource();
Mockito.when(xResourceService.updateResource(vXResourceChkDb)).thenReturn(vXResourceChkDb);
- Mockito.when(xADaoManager.getXXResource()).thenReturn(xxResourceDao);
+ Mockito.when(rangerDaoManager.getXXResource()).thenReturn(xxResourceDao);
Mockito.when(xxResourceDao.getById(vXResource.getId())).thenReturn(xxResource);
VXResource vXResourceUpd = assetMgr.updateXResource(vXResourceChkDb);
@@ -472,7 +469,7 @@ public class TestAssetMgr {
Mockito.when(stringUtil.split("", ",")).thenReturn(new String[0]);
VXResponse vXResponse = new VXResponse();
- Mockito.when(xADaoManager.getXXAsset()).thenReturn(xxAssetDao);
+ Mockito.when(rangerDaoManager.getXXAsset()).thenReturn(xxAssetDao);
Mockito.when(xxAssetDao.getById(assetId)).thenReturn(xxAsset);
Mockito.when(stringUtil.split(vXResource.getName(), ",")).thenReturn(new String[0]);
Mockito.when(xaBizUtil.hasPermission(vXResource,AppConstants.XA_PERM_TYPE_ADMIN)).thenReturn(vXResponse);
@@ -505,7 +502,7 @@ public class TestAssetMgr {
XXResourceDao xxResourceDao = Mockito.mock(XXResourceDao.class);
XXResource xxResource = new XXResource();
Mockito.when(xResourceService.updateResource(vXResourceChkDb)).thenReturn(vXResourceChkDb);
- Mockito.when(xADaoManager.getXXResource()).thenReturn(xxResourceDao);
+ Mockito.when(rangerDaoManager.getXXResource()).thenReturn(xxResourceDao);
Mockito.when(xxResourceDao.getById(vXResource.getId())).thenReturn(xxResource);
VXResource vXResourceUpd = assetMgr.updateXResource(vXResourceChkDb);
@@ -541,7 +538,7 @@ public class TestAssetMgr {
Mockito.when(stringUtil.split("", ",")).thenReturn(new String[0]);
VXResponse vXResponse = new VXResponse();
- Mockito.when(xADaoManager.getXXAsset()).thenReturn(xxAssetDao);
+ Mockito.when(rangerDaoManager.getXXAsset()).thenReturn(xxAssetDao);
Mockito.when(xxAssetDao.getById(assetId)).thenReturn(xxAsset);
Mockito.when(stringUtil.split(vXResource.getName(), ",")).thenReturn(new String[0]);
Mockito.when(xaBizUtil.hasPermission(vXResource,AppConstants.XA_PERM_TYPE_ADMIN)).thenReturn(vXResponse);
@@ -574,7 +571,7 @@ public class TestAssetMgr {
XXResourceDao xxResourceDao = Mockito.mock(XXResourceDao.class);
XXResource xxResource = new XXResource();
Mockito.when(xResourceService.updateResource(vXResourceChkDb)).thenReturn(vXResourceChkDb);
- Mockito.when(xADaoManager.getXXResource()).thenReturn(xxResourceDao);
+ Mockito.when(rangerDaoManager.getXXResource()).thenReturn(xxResourceDao);
Mockito.when(xxResourceDao.getById(vXResource.getId())).thenReturn(xxResource);
VXResource vXResourceUpd = assetMgr.updateXResource(vXResourceChkDb);
@@ -610,7 +607,7 @@ public class TestAssetMgr {
Mockito.when(stringUtil.split("", ",")).thenReturn(new String[0]);
VXResponse vXResponse = new VXResponse();
- Mockito.when(xADaoManager.getXXAsset()).thenReturn(xxAssetDao);
+ Mockito.when(rangerDaoManager.getXXAsset()).thenReturn(xxAssetDao);
Mockito.when(xxAssetDao.getById(assetId)).thenReturn(xxAsset);
Mockito.when(stringUtil.split(vXResource.getName(), ",")).thenReturn(new String[0]);
Mockito.when(xaBizUtil.hasPermission(vXResource,AppConstants.XA_PERM_TYPE_ADMIN)).thenReturn(vXResponse);
@@ -643,7 +640,7 @@ public class TestAssetMgr {
XXResourceDao xxResourceDao = Mockito.mock(XXResourceDao.class);
XXResource xxResource = new XXResource();
Mockito.when(xResourceService.updateResource(vXResourceChkDb)).thenReturn(vXResourceChkDb);
- Mockito.when(xADaoManager.getXXResource()).thenReturn(xxResourceDao);
+ Mockito.when(rangerDaoManager.getXXResource()).thenReturn(xxResourceDao);
Mockito.when(xxResourceDao.getById(vXResource.getId())).thenReturn(xxResource);
VXResource vXResourceUpd = assetMgr.updateXResource(vXResourceChkDb);
@@ -664,10 +661,10 @@ public class TestAssetMgr {
setup();
VXAsset vXAsset = new VXAsset();
vXAsset.setId(hiveAssetId);
- vXAsset.setActiveStatus(XACommonEnums.STATUS_ENABLED);
+ vXAsset.setActiveStatus(RangerCommonEnums.STATUS_ENABLED);
Mockito.when(xAssetService.readResource(hiveAssetId)).thenReturn(vXAsset);
assetMgr.deleteXAsset(hiveAssetId, true);
- Assert.assertEquals(vXAsset.getActiveStatus(), XACommonEnums.STATUS_DELETED);
+ Assert.assertEquals(vXAsset.getActiveStatus(), RangerCommonEnums.STATUS_DELETED);
}
@Test
@@ -675,10 +672,10 @@ public class TestAssetMgr {
setup();
VXAsset vXAsset = new VXAsset();
vXAsset.setId(hbaseAssetId);
- vXAsset.setActiveStatus(XACommonEnums.STATUS_ENABLED);
+ vXAsset.setActiveStatus(RangerCommonEnums.STATUS_ENABLED);
Mockito.when(xAssetService.readResource(hiveAssetId)).thenReturn(vXAsset);
assetMgr.deleteXAsset(hbaseAssetId, true);
- Assert.assertEquals(vXAsset.getActiveStatus(), XACommonEnums.STATUS_DELETED);
+ Assert.assertEquals(vXAsset.getActiveStatus(), RangerCommonEnums.STATUS_DELETED);
}
@Test
@@ -686,10 +683,10 @@ public class TestAssetMgr {
setup();
VXAsset vXAsset = new VXAsset();
vXAsset.setId(knoxAssetId);
- vXAsset.setActiveStatus(XACommonEnums.STATUS_ENABLED);
+ vXAsset.setActiveStatus(RangerCommonEnums.STATUS_ENABLED);
Mockito.when(xAssetService.readResource(hiveAssetId)).thenReturn(vXAsset);
assetMgr.deleteXAsset(knoxAssetId, true);
- Assert.assertEquals(vXAsset.getActiveStatus(), XACommonEnums.STATUS_DELETED);
+ Assert.assertEquals(vXAsset.getActiveStatus(), RangerCommonEnums.STATUS_DELETED);
}
@Test
@@ -697,10 +694,10 @@ public class TestAssetMgr {
setup();
VXAsset vXAsset = new VXAsset();
vXAsset.setId(stormAssetId);
- vXAsset.setActiveStatus(XACommonEnums.STATUS_ENABLED);
+ vXAsset.setActiveStatus(RangerCommonEnums.STATUS_ENABLED);
Mockito.when(xAssetService.readResource(hiveAssetId)).thenReturn(vXAsset);
assetMgr.deleteXAsset(stormAssetId, true);
- Assert.assertEquals(vXAsset.getActiveStatus(), XACommonEnums.STATUS_DELETED);
+ Assert.assertEquals(vXAsset.getActiveStatus(), RangerCommonEnums.STATUS_DELETED);
}
private VXResource createVXResource(String assetTypeName, Long assetId, int assetType, int resourceType){
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/test/java/org/apache/ranger/biz/TestRangerBizUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/test/java/org/apache/ranger/biz/TestRangerBizUtil.java b/security-admin/src/test/java/org/apache/ranger/biz/TestRangerBizUtil.java
new file mode 100644
index 0000000..b7bc416
--- /dev/null
+++ b/security-admin/src/test/java/org/apache/ranger/biz/TestRangerBizUtil.java
@@ -0,0 +1,547 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements. See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.ranger.biz;
+
+import java.io.File;
+import java.util.ArrayList;
+import java.util.List;
+
+import org.apache.ranger.common.AppConstants;
+import org.apache.ranger.common.ContextUtil;
+import org.apache.ranger.common.RangerCommonEnums;
+import org.apache.ranger.common.RangerConstants;
+import org.apache.ranger.common.StringUtil;
+import org.apache.ranger.common.UserSessionBase;
+import org.apache.ranger.common.db.BaseDao;
+import org.apache.ranger.db.RangerDaoManager;
+import org.apache.ranger.db.XXAssetDao;
+import org.apache.ranger.db.XXPortalUserDao;
+import org.apache.ranger.db.XXResourceDao;
+import org.apache.ranger.db.XXUserDao;
+import org.apache.ranger.entity.XXAsset;
+import org.apache.ranger.entity.XXDBBase;
+import org.apache.ranger.entity.XXPortalUser;
+import org.apache.ranger.entity.XXResource;
+import org.apache.ranger.entity.XXUser;
+import org.apache.ranger.security.context.RangerContextHolder;
+import org.apache.ranger.security.context.RangerSecurityContext;
+import org.apache.ranger.view.VXAsset;
+import org.apache.ranger.view.VXDataObject;
+import org.apache.ranger.view.VXPortalUser;
+import org.apache.ranger.view.VXResource;
+import org.apache.ranger.view.VXResponse;
+import org.junit.Assert;
+import org.junit.Before;
+import org.junit.Test;
+import org.junit.runner.RunWith;
+import org.mockito.InjectMocks;
+import org.mockito.Mock;
+import org.mockito.Mockito;
+import org.mockito.runners.MockitoJUnitRunner;
+
+@RunWith(MockitoJUnitRunner.class)
+public class TestRangerBizUtil {
+
+ private Long id = 1L;
+ private String resourceName = "hadoopdev";
+
+ @InjectMocks
+ RangerBizUtil rangerBizUtil = new RangerBizUtil();
+
+ @Mock
+ RangerDaoManager daoManager;
+
+ @Mock
+ StringUtil stringUtil;
+
+ @Before
+ public void setup(){
+ RangerSecurityContext context = new RangerSecurityContext();
+ context.setUserSession(new UserSessionBase());
+ RangerContextHolder.setSecurityContext(context);
+ }
+
+ @Test
+ public void testHasPermission_When_disableAccessControl(){
+ VXResource vXResource = null;
+ rangerBizUtil.enableResourceAccessControl = false;
+ VXResponse resp = rangerBizUtil.hasPermission(vXResource, AppConstants.XA_PERM_TYPE_UNKNOWN);
+ Assert.assertNotNull(resp);
+ }
+
+ @Test
+ public void testHasPermission_When_NoResource(){
+ VXResource vXResource = null;
+ VXResponse resp = rangerBizUtil.hasPermission(vXResource, AppConstants.XA_PERM_TYPE_UNKNOWN);
+ Assert.assertNotNull(resp);
+ Assert.assertEquals(VXResponse.STATUS_ERROR, resp.getStatusCode());
+ Assert.assertEquals("Please provide valid policy.", resp.getMsgDesc());
+ }
+
+ @Test
+ public void testHasPermission_emptyResourceName(){
+ VXResource vXResource = new VXResource();
+ XXPortalUser portalUser = new XXPortalUser();
+ XXUserDao xxUserDao = Mockito.mock(XXUserDao.class);
+ XXPortalUserDao userDao = Mockito.mock(XXPortalUserDao.class);
+ XXUser xxUser = new XXUser();
+ XXAsset xxAsset = new XXAsset();
+ List<XXResource> lst = new ArrayList<XXResource>();
+ XXResourceDao xxResourceDao = Mockito.mock(XXResourceDao.class);
+ XXAssetDao xxAssetDao = Mockito.mock(XXAssetDao.class);
+ Mockito.when(daoManager.getXXPortalUser()).thenReturn(userDao);
+ Mockito.when(userDao.getById(Mockito.anyLong())).thenReturn(portalUser);
+ Mockito.when(daoManager.getXXUser()).thenReturn(xxUserDao);
+ Mockito.when(xxUserDao.findByUserName(Mockito.anyString())).thenReturn(xxUser);
+ Mockito.when(daoManager.getXXResource()).thenReturn(xxResourceDao);
+ Mockito.when(xxResourceDao.findByAssetIdAndResourceStatus(Mockito.anyLong(),Mockito.anyInt())).thenReturn(lst);
+ Mockito.when(daoManager.getXXAsset()).thenReturn(xxAssetDao);
+ Mockito.when(xxAssetDao.getById(Mockito.anyLong())).thenReturn(xxAsset);
+ VXResponse resp = rangerBizUtil.hasPermission(vXResource, AppConstants.XA_PERM_TYPE_UNKNOWN);
+ Mockito.verify(daoManager).getXXPortalUser();
+ Mockito.verify(userDao).getById(Mockito.anyLong());
+ Mockito.verify(daoManager).getXXUser();
+ Mockito.verify(xxUserDao).findByUserName(Mockito.anyString());
+ Assert.assertNotNull(resp);
+ Assert.assertEquals(VXResponse.STATUS_ERROR, resp.getStatusCode());
+ Assert.assertEquals("Permission Denied !", resp.getMsgDesc());
+ }
+
+ @Test
+ public void testHasPermission_isAdmin(){
+ VXResource vXResource = new VXResource();
+ vXResource.setName(resourceName);
+ vXResource.setAssetId(id);
+ UserSessionBase currentUserSession = ContextUtil.getCurrentUserSession();
+ currentUserSession.setUserAdmin(true);
+ VXResponse resp = rangerBizUtil.hasPermission(vXResource, AppConstants.XA_PERM_TYPE_UNKNOWN);
+ Assert.assertNotNull(resp);
+ Assert.assertEquals(VXResponse.STATUS_SUCCESS, resp.getStatusCode());
+ }
+
+ @Test
+ public void testIsNotAdmin(){
+ boolean isAdminChk = rangerBizUtil.isAdmin();
+ Assert.assertFalse(isAdminChk);
+ }
+
+ @Test
+ public void testIsAdmin(){
+ UserSessionBase currentUserSession = ContextUtil.getCurrentUserSession();
+ currentUserSession.setUserAdmin(true);
+ boolean isAdminChk = rangerBizUtil.isAdmin();
+ Assert.assertTrue(isAdminChk);
+ }
+
+ @Test
+ public void testUserSessionNull_forIsAdmin(){
+ RangerContextHolder.setSecurityContext(null);
+ boolean isAdminChk = rangerBizUtil.isAdmin();
+ Assert.assertFalse(isAdminChk);
+ }
+
+ @Test
+ public void testGetXUserId_NoUserSession(){
+ RangerContextHolder.setSecurityContext(null);
+ Long chk = rangerBizUtil.getXUserId();
+ Assert.assertNull(chk);
+ }
+
+ @Test
+ public void testGetXUserId_NoUser(){
+ RangerSecurityContext context = new RangerSecurityContext();
+ context.setUserSession(new UserSessionBase());
+ RangerContextHolder.setSecurityContext(context);
+ XXPortalUser xxPortalUser = new XXPortalUser();
+ XXUser xxUser = new XXUser();
+ XXUserDao xxUserDao = Mockito.mock(XXUserDao.class);
+ XXPortalUserDao xxPortalUserDao = Mockito.mock(XXPortalUserDao.class);
+ Mockito.when(daoManager.getXXPortalUser()).thenReturn(xxPortalUserDao);
+ Mockito.when(xxPortalUserDao.getById(Mockito.anyLong())).thenReturn(xxPortalUser);
+ Mockito.when(daoManager.getXXUser()).thenReturn(xxUserDao);
+ Mockito.when(xxUserDao.findByUserName(Mockito.anyString())).thenReturn(xxUser);
+ Long chk = rangerBizUtil.getXUserId();
+ Mockito.verify(daoManager).getXXPortalUser();
+ Mockito.verify(xxPortalUserDao).getById(Mockito.anyLong());
+ Mockito.verify(daoManager).getXXUser();
+ Mockito.verify(xxUserDao).findByUserName(Mockito.anyString());
+ Assert.assertNull(chk);
+ }
+
+ @Test
+ public void testGetXUserId(){
+ XXPortalUser xxPortalUser = new XXPortalUser();
+ xxPortalUser.setId(id);
+ XXUser xxUser = new XXUser();
+ xxUser.setId(id);
+ XXPortalUserDao xxPortalUserDao = Mockito.mock(XXPortalUserDao.class);
+ XXUserDao xxUserDao = Mockito.mock(XXUserDao.class);
+ RangerSecurityContext context = new RangerSecurityContext();
+ UserSessionBase userSessionBase = new UserSessionBase();
+ userSessionBase.setUserAdmin(true);
+ context.setUserSession(userSessionBase);
+ userSessionBase.setXXPortalUser(xxPortalUser);
+ RangerContextHolder.setSecurityContext(context);
+ Mockito.when(daoManager.getXXPortalUser()).thenReturn(xxPortalUserDao);
+ Mockito.when(xxPortalUserDao.getById(Mockito.anyLong())).thenReturn(xxPortalUser);
+ Mockito.when(daoManager.getXXUser()).thenReturn(xxUserDao);
+ Mockito.when(xxUserDao.findByUserName(Mockito.anyString())).thenReturn(xxUser);
+ Long chk = rangerBizUtil.getXUserId();
+ Mockito.verify(daoManager).getXXPortalUser();
+ Mockito.verify(xxPortalUserDao).getById(Mockito.anyLong());
+ Mockito.verify(daoManager).getXXUser();
+ Mockito.verify(xxUserDao).findByUserName(Mockito.anyString());
+ Assert.assertEquals(chk, id);
+ }
+
+ @Test
+ public void testReplaceMetaChars_PathEmpty(){
+ String path = "";
+ String pathChk = rangerBizUtil.replaceMetaChars(path);
+ Assert.assertFalse(pathChk.contains("\\*"));
+ Assert.assertFalse(pathChk.contains("\\?"));
+ }
+
+ @Test
+ public void testReplaceMetaChars_NoMetaChars(){
+ String path = "\\Demo\\Test";
+ String pathChk = rangerBizUtil.replaceMetaChars(path);
+ Assert.assertFalse(pathChk.contains("\\*"));
+ Assert.assertFalse(pathChk.contains("\\?"));
+ }
+
+ @Test
+ public void testReplaceMetaChars_PathNull(){
+ String path = null;
+ String pathChk = rangerBizUtil.replaceMetaChars(path);
+ Assert.assertNull(pathChk);
+ }
+
+ @Test
+ public void testReplaceMetaChars(){
+ String path = "\\Demo\\Test\\*\\?";
+ String pathChk = rangerBizUtil.replaceMetaChars(path);
+ Assert.assertFalse(pathChk.contains("\\*"));
+ Assert.assertFalse(pathChk.contains("\\?"));
+ }
+
+ @Test
+ public void testGeneratePublicName(){
+ String firstName = "Test123456789123456789";
+ String lastName = "Unit";
+ String publicNameChk = rangerBizUtil.generatePublicName(firstName, lastName);
+ Assert.assertEquals("Test12345678... U.", publicNameChk);
+ }
+
+ @Test
+ public void testGeneratePublicName_fNameLessThanMax(){
+ String firstName = "Test";
+ String lastName = "";
+ String publicNameChk = rangerBizUtil.generatePublicName(firstName, lastName);
+ Assert.assertNull(publicNameChk);
+ }
+
+ @Test
+ public void testGeneratePublicName_withPortalUser(){
+ VXPortalUser vXPortalUser = new VXPortalUser();
+ vXPortalUser.setFirstName("Test");
+ vXPortalUser.setLastName(null);
+ String publicNameChk = rangerBizUtil.generatePublicName(vXPortalUser, null);
+ Assert.assertNull(publicNameChk);
+ }
+
+ @Test
+ public void testGetDisplayName_EmptyName() {
+ String displayNameChk = rangerBizUtil.getDisplayName(null);
+ Assert.assertEquals(rangerBizUtil.EMPTY_CONTENT_DISPLAY_NAME, displayNameChk);
+ }
+
+ @Test
+ public void testGetDisplayName_AssetName() {
+ XXAsset obj = new XXAsset();
+ obj.setDescription(resourceName);
+ String displayNameChk = rangerBizUtil.getDisplayName(obj);
+ Assert.assertEquals(resourceName, displayNameChk);
+ }
+
+ @Test
+ public void testGetDisplayName_MoreThanMaxLen() {
+ XXAsset obj = new XXAsset();
+ String name = resourceName;
+ for(int i=0;i<16;i++){
+ name = name + "_" + name + "1";
+ }
+ obj.setDescription(name);
+ String displayNameChk = rangerBizUtil.getDisplayName(obj);
+ Assert.assertEquals(displayNameChk.length(), 150);
+ }
+
+ @Test
+ public void testGetDisplayNameForClassName(){
+ XXAsset obj = new XXAsset();
+ String displayNameChk = rangerBizUtil.getDisplayNameForClassName(obj);
+ Assert.assertEquals("Asset",displayNameChk);
+ }
+
+ @Test
+ public void testGetFileNameWithoutExtension(){
+ File file = new File("test.txt");
+ String fileNameChk = rangerBizUtil.getFileNameWithoutExtension(file);
+ Assert.assertEquals("test",fileNameChk);
+ }
+
+ @Test
+ public void testGetFileNameWithoutExtension_NoFile(){
+ String fileNameChk = rangerBizUtil.getFileNameWithoutExtension(null);
+ Assert.assertNull(fileNameChk);
+ }
+
+ @Test
+ public void testGetFileNameWithoutExtension_noExt(){
+ File file = new File("test");
+ String fileNameChk = rangerBizUtil.getFileNameWithoutExtension(file);
+ Assert.assertEquals("test",fileNameChk);
+ }
+
+ @Test
+ public void testGetImageExtension_TestJPG(){
+ String contentType = "img.JPG";
+ String extChk = rangerBizUtil.getImageExtension(contentType);
+ Assert.assertEquals("jpg",extChk);
+ }
+
+ @Test
+ public void testGetImageExtension_TestJPEG(){
+ String contentType = "img.JPEG";
+ String extChk = rangerBizUtil.getImageExtension(contentType);
+ Assert.assertEquals("jpg",extChk);
+ }
+
+ @Test
+ public void testGetImageExtension_TestPNG(){
+ String contentType = "img.PNG";
+ String extChk = rangerBizUtil.getImageExtension(contentType);
+ Assert.assertEquals("png",extChk);
+ }
+
+ @Test
+ public void testGetImageExtension_NoExt(){
+ String contentType = "img";
+ String extChk = rangerBizUtil.getImageExtension(contentType);
+ Assert.assertEquals("",extChk);
+ }
+
+ @Test
+ public void testGetMimeType_ForJPG(){
+ String mimeTypeChk = rangerBizUtil.getMimeType(RangerConstants.MIME_JPEG);
+ Assert.assertEquals("jpg",mimeTypeChk);
+ }
+
+ @Test
+ public void testGetMimeType_ForPNG(){
+ String mimeTypeChk = rangerBizUtil.getMimeType(RangerConstants.MIME_PNG);
+ Assert.assertEquals("png",mimeTypeChk);
+ }
+
+ @Test
+ public void testGetMimeType_ForEmpty(){
+ String mimeTypeChk = rangerBizUtil.getMimeType(1);
+ Assert.assertEquals("",mimeTypeChk);
+ }
+
+ @Test
+ public void testGetMimeTypeInt_ForUnknow(){
+ int mimeTypeChk = rangerBizUtil.getMimeTypeInt("");
+ Assert.assertEquals(RangerConstants.MIME_UNKNOWN, mimeTypeChk);
+ }
+
+ @Test
+ public void testGetMimeTypeInt_Forjpg(){
+ int mimeTypeChk = rangerBizUtil.getMimeTypeInt("jpg");
+ Assert.assertEquals(RangerConstants.MIME_JPEG, mimeTypeChk);
+ }
+
+ @Test
+ public void testGetMimeTypeInt_ForJPEG(){
+ int mimeTypeChk = rangerBizUtil.getMimeTypeInt("JPEG");
+ Assert.assertEquals(RangerConstants.MIME_JPEG, mimeTypeChk);
+ }
+
+ @Test
+ public void testGetMimeTypeInt_EndsWithJPEG(){
+ int mimeTypeChk = rangerBizUtil.getMimeTypeInt("txt.jpeg");
+ Assert.assertEquals(RangerConstants.MIME_JPEG, mimeTypeChk);
+ }
+
+ @Test
+ public void testGetMimeTypeInt_EndsWithJPG(){
+ int mimeTypeChk = rangerBizUtil.getMimeTypeInt("txt.jpg");
+ Assert.assertEquals(RangerConstants.MIME_JPEG, mimeTypeChk);
+ }
+
+ @Test
+ public void testGetMimeTypeInt_EndsWithPNG(){
+ int mimeTypeChk = rangerBizUtil.getMimeTypeInt("txt.png");
+ Assert.assertEquals(RangerConstants.MIME_PNG, mimeTypeChk);
+ }
+
+ @Test
+ public void testGetMimeTypeInt_ForPNG(){
+ int mimeTypeChk = rangerBizUtil.getMimeTypeInt("png");
+ Assert.assertEquals(RangerConstants.MIME_PNG, mimeTypeChk);
+ }
+
+ @SuppressWarnings({ "unchecked", "rawtypes" })
+ @Test
+ public void testGetMObject(){
+ BaseDao baseDao = Mockito.mock(BaseDao.class);
+ Mockito.when(daoManager.getDaoForClassType(RangerCommonEnums.CLASS_TYPE_USER_PROFILE)).thenReturn(baseDao);
+ Mockito.when(baseDao.getById(id)).thenReturn(new XXAsset());
+ XXDBBase mObjChk = rangerBizUtil.getMObject(RangerCommonEnums.CLASS_TYPE_USER_PROFILE,id);
+ Assert.assertNotNull(mObjChk);
+ }
+
+ @Test
+ public void testGetMObject_NoObjId(){
+ XXDBBase mObjChk = rangerBizUtil.getMObject(RangerCommonEnums.CLASS_TYPE_USER_PROFILE,null);
+ Assert.assertNull(mObjChk);
+ }
+
+ @SuppressWarnings({ "rawtypes", "unchecked" })
+ @Test
+ public void testGetMObject_VXDataObject(){
+ VXAsset vXDataObject = new VXAsset();
+ vXDataObject.setId(id);
+ BaseDao baseDao = Mockito.mock(BaseDao.class);
+ Mockito.when(daoManager.getDaoForClassType(vXDataObject.getMyClassType())).thenReturn(baseDao);
+ Mockito.when(baseDao.getById(vXDataObject.getId())).thenReturn(new XXAsset());
+ XXDBBase xXDBaseChk = rangerBizUtil.getMObject(vXDataObject);
+ Assert.assertNotNull(xXDBaseChk);
+ }
+
+ @Test
+ public void testGetMObject_NOVXDataObject(){
+ XXDBBase xXDBaseChk = rangerBizUtil.getMObject(null);
+ Assert.assertNull(xXDBaseChk);
+ }
+
+ @Test
+ public void testGetVObject_NOObjId(){
+ VXDataObject objchk = rangerBizUtil.getVObject(RangerConstants.CLASS_TYPE_USER_PROFILE, null);
+ Assert.assertNull(objchk);
+ }
+
+ @Test
+ public void testMatchHdfsPolicy_NoResourceName(){
+ boolean bnlChk = rangerBizUtil.matchHbasePolicy(null, null, null, id, AppConstants.XA_PERM_TYPE_UNKNOWN);
+ Assert.assertFalse(bnlChk);
+ }
+
+ @Test
+ public void testMatchHdfsPolicy_NoResourceList(){
+ boolean bnlChk = rangerBizUtil.matchHbasePolicy(resourceName, null, null, id, AppConstants.XA_PERM_TYPE_UNKNOWN);
+ Assert.assertFalse(bnlChk);
+ }
+
+ @Test
+ public void testMatchHdfsPolicy_NoUserId(){
+ VXResponse vXResponse = new VXResponse();
+ List<XXResource> xResourceList = new ArrayList<XXResource>();
+ XXResource xXResource = new XXResource();
+ xXResource.setId(id);
+ xXResource.setName(resourceName);
+ xXResource.setIsRecursive(AppConstants.BOOL_TRUE);
+ xXResource.setResourceStatus(AppConstants.STATUS_ENABLED);
+ xResourceList.add(xXResource);
+ boolean bnlChk = rangerBizUtil.matchHbasePolicy(resourceName, xResourceList, vXResponse, null, AppConstants.XA_PERM_TYPE_UNKNOWN);
+ Assert.assertFalse(bnlChk);
+ }
+
+ @Test
+ public void testMatchHdfsPolicy_NoPremission(){
+ VXResponse vXResponse = new VXResponse();
+ List<XXResource> xResourceList = new ArrayList<XXResource>();
+ XXResource xXResource = new XXResource();
+ xXResource.setId(id);
+ xXResource.setName(resourceName);
+ xXResource.setIsRecursive(AppConstants.BOOL_TRUE);
+ xXResource.setResourceStatus(AppConstants.STATUS_ENABLED);
+ xResourceList.add(xXResource);
+ Mockito.when(stringUtil.isEmpty(resourceName)).thenReturn(true);
+ Mockito.when(stringUtil.split(Mockito.anyString(), Mockito.anyString())).thenReturn(new String[0]);
+ boolean bnlChk = rangerBizUtil.matchHbasePolicy("/*/*/*", xResourceList, vXResponse, id, AppConstants.XA_PERM_TYPE_UNKNOWN);
+ Mockito.verify(stringUtil).split(Mockito.anyString(), Mockito.anyString());
+ Assert.assertFalse(bnlChk);
+ }
+
+ @Test
+ public void testMatchHivePolicy_NoResourceName(){
+ boolean bnlChk = rangerBizUtil.matchHivePolicy(null, null, null, 0);
+ Assert.assertFalse(bnlChk);
+
+ }
+
+ @Test
+ public void testMatchHivePolicy_NoResourceList(){
+ boolean bnlChk = rangerBizUtil.matchHivePolicy(resourceName, null, null, 0);
+ Assert.assertFalse(bnlChk);
+
+ }
+
+ @Test
+ public void testMatchHivePolicy_NoUserId(){
+ List<XXResource> xResourceList = new ArrayList<XXResource>();
+ XXResource xXResource = new XXResource();
+ xXResource.setId(id);
+ xXResource.setName(resourceName);
+ xXResource.setIsRecursive(AppConstants.BOOL_TRUE);
+ xXResource.setResourceStatus(AppConstants.STATUS_ENABLED);
+ xResourceList.add(xXResource);
+ boolean bnlChk = rangerBizUtil.matchHivePolicy(resourceName, xResourceList, null, 0);
+ Assert.assertFalse(bnlChk);
+
+ }
+
+ @Test
+ public void testMatchHivePolicy_NoPremission(){
+ List<XXResource> xResourceList = new ArrayList<XXResource>();
+ XXResource xXResource = new XXResource();
+ xXResource.setId(id);
+ xXResource.setName(resourceName);
+ xXResource.setIsRecursive(AppConstants.BOOL_TRUE);
+ xXResource.setResourceStatus(AppConstants.STATUS_ENABLED);
+ xResourceList.add(xXResource);
+ Mockito.when(stringUtil.split(Mockito.anyString(), Mockito.anyString())).thenReturn(new String[0]);
+ boolean bnlChk = rangerBizUtil.matchHivePolicy("/*/*/*", xResourceList, id, 0);
+ Assert.assertFalse(bnlChk);
+ }
+
+ @Test
+ public void testMatchHivePolicy(){
+ List<XXResource> xResourceList = new ArrayList<XXResource>();
+ XXResource xXResource = new XXResource();
+ xXResource.setId(5L);
+ xXResource.setName(resourceName);
+ xXResource.setIsRecursive(AppConstants.BOOL_TRUE);
+ xXResource.setResourceStatus(AppConstants.STATUS_ENABLED);
+ xResourceList.add(xXResource);
+ Mockito.when(stringUtil.split(Mockito.anyString(), Mockito.anyString())).thenReturn(new String[0]);
+ boolean bnlChk = rangerBizUtil.matchHivePolicy("/*/*/*", xResourceList, id, 17);
+ Mockito.verify(stringUtil).split(Mockito.anyString(), Mockito.anyString());
+ Assert.assertFalse(bnlChk);
+ }
+}
\ No newline at end of file
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/test/java/org/apache/ranger/biz/TestUserMgr.java
----------------------------------------------------------------------
diff --git a/security-admin/src/test/java/org/apache/ranger/biz/TestUserMgr.java b/security-admin/src/test/java/org/apache/ranger/biz/TestUserMgr.java
index 41d9c4e..c514bfb 100644
--- a/security-admin/src/test/java/org/apache/ranger/biz/TestUserMgr.java
+++ b/security-admin/src/test/java/org/apache/ranger/biz/TestUserMgr.java
@@ -24,26 +24,23 @@ import javax.persistence.EntityManager;
import javax.persistence.Query;
import javax.ws.rs.WebApplicationException;
-import org.apache.ranger.biz.UserMgr;
-import org.apache.ranger.biz.XABizUtil;
import org.apache.ranger.common.ContextUtil;
import org.apache.ranger.common.MessageEnums;
import org.apache.ranger.common.RESTErrorUtil;
import org.apache.ranger.common.SearchCriteria;
import org.apache.ranger.common.StringUtil;
import org.apache.ranger.common.UserSessionBase;
-import org.apache.ranger.db.XADaoManager;
+import org.apache.ranger.db.RangerDaoManager;
import org.apache.ranger.db.XXPortalUserDao;
import org.apache.ranger.db.XXPortalUserRoleDao;
import org.apache.ranger.entity.XXPortalUser;
import org.apache.ranger.entity.XXPortalUserRole;
-import org.apache.ranger.security.context.XAContextHolder;
-import org.apache.ranger.security.context.XASecurityContext;
+import org.apache.ranger.security.context.RangerContextHolder;
+import org.apache.ranger.security.context.RangerSecurityContext;
import org.apache.ranger.view.VXPasswordChange;
import org.apache.ranger.view.VXPortalUser;
import org.apache.ranger.view.VXPortalUserList;
import org.apache.ranger.view.VXResponse;
-import org.apache.ranger.view.VXString;
import org.junit.Assert;
import org.junit.FixMethodOrder;
import org.junit.Rule;
@@ -69,7 +66,7 @@ public class TestUserMgr {
VXPortalUser VXPortalUser;
@Mock
- XADaoManager daoManager;
+ RangerDaoManager daoManager;
@Mock
RESTErrorUtil restErrorUtil;
@@ -81,15 +78,15 @@ public class TestUserMgr {
StringUtil stringUtil;
@Mock
- XABizUtil msBizUtil;
+ RangerBizUtil msBizUtil;
@Rule
public ExpectedException thrown = ExpectedException.none();
public void setup() {
- XASecurityContext context = new XASecurityContext();
+ RangerSecurityContext context = new RangerSecurityContext();
context.setUserSession(new UserSessionBase());
- XAContextHolder.setSecurityContext(context);
+ RangerContextHolder.setSecurityContext(context);
UserSessionBase currentUserSession = ContextUtil
.getCurrentUserSession();
currentUserSession.setUserAdmin(true);
[09/12] incubator-ranger git commit: RANGER-194: Rename classes under
web-admin project
Posted by ma...@apache.org.
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/RangerCommonEnums.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/RangerCommonEnums.java b/security-admin/src/main/java/org/apache/ranger/common/RangerCommonEnums.java
new file mode 100644
index 0000000..33edc28
--- /dev/null
+++ b/security-admin/src/main/java/org/apache/ranger/common/RangerCommonEnums.java
@@ -0,0 +1,1441 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+ package org.apache.ranger.common;
+
+/**
+ *
+ */
+
+
+public class RangerCommonEnums {
+
+ /***************************************************************
+ * Enum values for ActiveStatus
+ **************************************************************/
+ /**
+ * STATUS_DISABLED is an element of enum ActiveStatus. Its value is "STATUS_DISABLED".
+ */
+ public static final int STATUS_DISABLED = 0;
+ /**
+ * STATUS_ENABLED is an element of enum ActiveStatus. Its value is "STATUS_ENABLED".
+ */
+ public static final int STATUS_ENABLED = 1;
+ /**
+ * STATUS_DELETED is an element of enum ActiveStatus. Its value is "STATUS_DELETED".
+ */
+ public static final int STATUS_DELETED = 2;
+
+ /**
+ * Max value for enum ActiveStatus_MAX
+ */
+ public static final int ActiveStatus_MAX = 2;
+
+
+ /***************************************************************
+ * Enum values for ActivationStatus
+ **************************************************************/
+ /**
+ * ACT_STATUS_DISABLED is an element of enum ActivationStatus. Its value is "ACT_STATUS_DISABLED".
+ */
+ public static final int ACT_STATUS_DISABLED = 0;
+ /**
+ * ACT_STATUS_ACTIVE is an element of enum ActivationStatus. Its value is "ACT_STATUS_ACTIVE".
+ */
+ public static final int ACT_STATUS_ACTIVE = 1;
+ /**
+ * ACT_STATUS_PENDING_APPROVAL is an element of enum ActivationStatus. Its value is "ACT_STATUS_PENDING_APPROVAL".
+ */
+ public static final int ACT_STATUS_PENDING_APPROVAL = 2;
+ /**
+ * ACT_STATUS_PENDING_ACTIVATION is an element of enum ActivationStatus. Its value is "ACT_STATUS_PENDING_ACTIVATION".
+ */
+ public static final int ACT_STATUS_PENDING_ACTIVATION = 3;
+ /**
+ * ACT_STATUS_REJECTED is an element of enum ActivationStatus. Its value is "ACT_STATUS_REJECTED".
+ */
+ public static final int ACT_STATUS_REJECTED = 4;
+ /**
+ * ACT_STATUS_DEACTIVATED is an element of enum ActivationStatus. Its value is "ACT_STATUS_DEACTIVATED".
+ */
+ public static final int ACT_STATUS_DEACTIVATED = 5;
+ /**
+ * ACT_STATUS_PRE_REGISTRATION is an element of enum ActivationStatus. Its value is "ACT_STATUS_PRE_REGISTRATION".
+ */
+ public static final int ACT_STATUS_PRE_REGISTRATION = 6;
+ /**
+ * ACT_STATUS_NO_LOGIN is an element of enum ActivationStatus. Its value is "ACT_STATUS_NO_LOGIN".
+ */
+ public static final int ACT_STATUS_NO_LOGIN = 7;
+
+ /**
+ * Max value for enum ActivationStatus_MAX
+ */
+ public static final int ActivationStatus_MAX = 7;
+
+
+ /***************************************************************
+ * Enum values for BooleanValue
+ **************************************************************/
+ /**
+ * BOOL_NONE is an element of enum BooleanValue. Its value is "BOOL_NONE".
+ */
+ public static final int BOOL_NONE = 0;
+ /**
+ * BOOL_TRUE is an element of enum BooleanValue. Its value is "BOOL_TRUE".
+ */
+ public static final int BOOL_TRUE = 1;
+ /**
+ * BOOL_FALSE is an element of enum BooleanValue. Its value is "BOOL_FALSE".
+ */
+ public static final int BOOL_FALSE = 2;
+
+ /**
+ * Max value for enum BooleanValue_MAX
+ */
+ public static final int BooleanValue_MAX = 2;
+
+
+ /***************************************************************
+ * Enum values for DataType
+ **************************************************************/
+ /**
+ * DATA_TYPE_UNKNOWN is an element of enum DataType. Its value is "DATA_TYPE_UNKNOWN".
+ */
+ public static final int DATA_TYPE_UNKNOWN = 0;
+ /**
+ * DATA_TYPE_INTEGER is an element of enum DataType. Its value is "DATA_TYPE_INTEGER".
+ */
+ public static final int DATA_TYPE_INTEGER = 1;
+ /**
+ * DATA_TYPE_DOUBLE is an element of enum DataType. Its value is "DATA_TYPE_DOUBLE".
+ */
+ public static final int DATA_TYPE_DOUBLE = 2;
+ /**
+ * DATA_TYPE_STRING is an element of enum DataType. Its value is "DATA_TYPE_STRING".
+ */
+ public static final int DATA_TYPE_STRING = 3;
+ /**
+ * DATA_TYPE_BOOLEAN is an element of enum DataType. Its value is "DATA_TYPE_BOOLEAN".
+ */
+ public static final int DATA_TYPE_BOOLEAN = 4;
+ /**
+ * DATA_TYPE_DATE is an element of enum DataType. Its value is "DATA_TYPE_DATE".
+ */
+ public static final int DATA_TYPE_DATE = 5;
+ /**
+ * DATA_TYPE_STRING_ENUM is an element of enum DataType. Its value is "DATA_TYPE_STRING_ENUM".
+ */
+ public static final int DATA_TYPE_STRING_ENUM = 6;
+ /**
+ * DATA_TYPE_LONG is an element of enum DataType. Its value is "DATA_TYPE_LONG".
+ */
+ public static final int DATA_TYPE_LONG = 7;
+ /**
+ * DATA_TYPE_INTEGER_ENUM is an element of enum DataType. Its value is "DATA_TYPE_INTEGER_ENUM".
+ */
+ public static final int DATA_TYPE_INTEGER_ENUM = 8;
+
+ /**
+ * Max value for enum DataType_MAX
+ */
+ public static final int DataType_MAX = 8;
+
+
+ /***************************************************************
+ * Enum values for DeviceType
+ **************************************************************/
+ /**
+ * DEVICE_UNKNOWN is an element of enum DeviceType. Its value is "DEVICE_UNKNOWN".
+ */
+ public static final int DEVICE_UNKNOWN = 0;
+ /**
+ * DEVICE_BROWSER is an element of enum DeviceType. Its value is "DEVICE_BROWSER".
+ */
+ public static final int DEVICE_BROWSER = 1;
+ /**
+ * DEVICE_IPHONE is an element of enum DeviceType. Its value is "DEVICE_IPHONE".
+ */
+ public static final int DEVICE_IPHONE = 2;
+ /**
+ * DEVICE_IPAD is an element of enum DeviceType. Its value is "DEVICE_IPAD".
+ */
+ public static final int DEVICE_IPAD = 3;
+ /**
+ * DEVICE_IPOD is an element of enum DeviceType. Its value is "DEVICE_IPOD".
+ */
+ public static final int DEVICE_IPOD = 4;
+ /**
+ * DEVICE_ANDROID is an element of enum DeviceType. Its value is "DEVICE_ANDROID".
+ */
+ public static final int DEVICE_ANDROID = 5;
+
+ /**
+ * Max value for enum DeviceType_MAX
+ */
+ public static final int DeviceType_MAX = 5;
+
+
+ /***************************************************************
+ * Enum values for DiffLevel
+ **************************************************************/
+ /**
+ * DIFF_UNKNOWN is an element of enum DiffLevel. Its value is "DIFF_UNKNOWN".
+ */
+ public static final int DIFF_UNKNOWN = 0;
+ /**
+ * DIFF_LOW is an element of enum DiffLevel. Its value is "DIFF_LOW".
+ */
+ public static final int DIFF_LOW = 1;
+ /**
+ * DIFF_MEDIUM is an element of enum DiffLevel. Its value is "DIFF_MEDIUM".
+ */
+ public static final int DIFF_MEDIUM = 2;
+ /**
+ * DIFF_HIGH is an element of enum DiffLevel. Its value is "DIFF_HIGH".
+ */
+ public static final int DIFF_HIGH = 3;
+
+ /**
+ * Max value for enum DiffLevel_MAX
+ */
+ public static final int DiffLevel_MAX = 3;
+
+
+ /***************************************************************
+ * Enum values for FileType
+ **************************************************************/
+ /**
+ * FILE_FILE is an element of enum FileType. Its value is "FILE_FILE".
+ */
+ public static final int FILE_FILE = 0;
+ /**
+ * FILE_DIR is an element of enum FileType. Its value is "FILE_DIR".
+ */
+ public static final int FILE_DIR = 1;
+
+ /**
+ * Max value for enum FileType_MAX
+ */
+ public static final int FileType_MAX = 1;
+
+
+ /***************************************************************
+ * Enum values for FreqType
+ **************************************************************/
+ /**
+ * FREQ_NONE is an element of enum FreqType. Its value is "FREQ_NONE".
+ */
+ public static final int FREQ_NONE = 0;
+ /**
+ * FREQ_MANUAL is an element of enum FreqType. Its value is "FREQ_MANUAL".
+ */
+ public static final int FREQ_MANUAL = 1;
+ /**
+ * FREQ_HOURLY is an element of enum FreqType. Its value is "FREQ_HOURLY".
+ */
+ public static final int FREQ_HOURLY = 2;
+ /**
+ * FREQ_DAILY is an element of enum FreqType. Its value is "FREQ_DAILY".
+ */
+ public static final int FREQ_DAILY = 3;
+ /**
+ * FREQ_WEEKLY is an element of enum FreqType. Its value is "FREQ_WEEKLY".
+ */
+ public static final int FREQ_WEEKLY = 4;
+ /**
+ * FREQ_BI_WEEKLY is an element of enum FreqType. Its value is "FREQ_BI_WEEKLY".
+ */
+ public static final int FREQ_BI_WEEKLY = 5;
+ /**
+ * FREQ_MONTHLY is an element of enum FreqType. Its value is "FREQ_MONTHLY".
+ */
+ public static final int FREQ_MONTHLY = 6;
+
+ /**
+ * Max value for enum FreqType_MAX
+ */
+ public static final int FreqType_MAX = 6;
+
+
+ /***************************************************************
+ * Enum values for MimeType
+ **************************************************************/
+ /**
+ * MIME_UNKNOWN is an element of enum MimeType. Its value is "MIME_UNKNOWN".
+ */
+ public static final int MIME_UNKNOWN = 0;
+ /**
+ * MIME_TEXT is an element of enum MimeType. Its value is "MIME_TEXT".
+ */
+ public static final int MIME_TEXT = 1;
+ /**
+ * MIME_HTML is an element of enum MimeType. Its value is "MIME_HTML".
+ */
+ public static final int MIME_HTML = 2;
+ /**
+ * MIME_PNG is an element of enum MimeType. Its value is "MIME_PNG".
+ */
+ public static final int MIME_PNG = 3;
+ /**
+ * MIME_JPEG is an element of enum MimeType. Its value is "MIME_JPEG".
+ */
+ public static final int MIME_JPEG = 4;
+
+ /**
+ * Max value for enum MimeType_MAX
+ */
+ public static final int MimeType_MAX = 4;
+
+
+ /***************************************************************
+ * Enum values for NumberFormat
+ **************************************************************/
+ /**
+ * NUM_FORMAT_NONE is an element of enum NumberFormat. Its value is "NUM_FORMAT_NONE".
+ */
+ public static final int NUM_FORMAT_NONE = 0;
+ /**
+ * NUM_FORMAT_NUMERIC is an element of enum NumberFormat. Its value is "NUM_FORMAT_NUMERIC".
+ */
+ public static final int NUM_FORMAT_NUMERIC = 1;
+ /**
+ * NUM_FORMAT_ALPHA is an element of enum NumberFormat. Its value is "NUM_FORMAT_ALPHA".
+ */
+ public static final int NUM_FORMAT_ALPHA = 2;
+ /**
+ * NUM_FORMAT_ROMAN is an element of enum NumberFormat. Its value is "NUM_FORMAT_ROMAN".
+ */
+ public static final int NUM_FORMAT_ROMAN = 3;
+
+ /**
+ * Max value for enum NumberFormat_MAX
+ */
+ public static final int NumberFormat_MAX = 3;
+
+
+ /***************************************************************
+ * Enum values for ObjectStatus
+ **************************************************************/
+ /**
+ * OBJ_STATUS_ACTIVE is an element of enum ObjectStatus. Its value is "OBJ_STATUS_ACTIVE".
+ */
+ public static final int OBJ_STATUS_ACTIVE = 0;
+ /**
+ * OBJ_STATUS_DELETED is an element of enum ObjectStatus. Its value is "OBJ_STATUS_DELETED".
+ */
+ public static final int OBJ_STATUS_DELETED = 1;
+ /**
+ * OBJ_STATUS_ARCHIVED is an element of enum ObjectStatus. Its value is "OBJ_STATUS_ARCHIVED".
+ */
+ public static final int OBJ_STATUS_ARCHIVED = 2;
+
+ /**
+ * Max value for enum ObjectStatus_MAX
+ */
+ public static final int ObjectStatus_MAX = 2;
+
+
+ /***************************************************************
+ * Enum values for PasswordResetStatus
+ **************************************************************/
+ /**
+ * PWD_RESET_ACTIVE is an element of enum PasswordResetStatus. Its value is "PWD_RESET_ACTIVE".
+ */
+ public static final int PWD_RESET_ACTIVE = 0;
+ /**
+ * PWD_RESET_USED is an element of enum PasswordResetStatus. Its value is "PWD_RESET_USED".
+ */
+ public static final int PWD_RESET_USED = 1;
+ /**
+ * PWD_RESET_EXPIRED is an element of enum PasswordResetStatus. Its value is "PWD_RESET_EXPIRED".
+ */
+ public static final int PWD_RESET_EXPIRED = 2;
+ /**
+ * PWD_RESET_DISABLED is an element of enum PasswordResetStatus. Its value is "PWD_RESET_DISABLED".
+ */
+ public static final int PWD_RESET_DISABLED = 3;
+
+ /**
+ * Max value for enum PasswordResetStatus_MAX
+ */
+ public static final int PasswordResetStatus_MAX = 3;
+
+
+ /***************************************************************
+ * Enum values for PriorityType
+ **************************************************************/
+ /**
+ * PRIORITY_NORMAL is an element of enum PriorityType. Its value is "PRIORITY_NORMAL".
+ */
+ public static final int PRIORITY_NORMAL = 0;
+ /**
+ * PRIORITY_LOW is an element of enum PriorityType. Its value is "PRIORITY_LOW".
+ */
+ public static final int PRIORITY_LOW = 1;
+ /**
+ * PRIORITY_MEDIUM is an element of enum PriorityType. Its value is "PRIORITY_MEDIUM".
+ */
+ public static final int PRIORITY_MEDIUM = 2;
+ /**
+ * PRIORITY_HIGH is an element of enum PriorityType. Its value is "PRIORITY_HIGH".
+ */
+ public static final int PRIORITY_HIGH = 3;
+
+ /**
+ * Max value for enum PriorityType_MAX
+ */
+ public static final int PriorityType_MAX = 3;
+
+
+ /***************************************************************
+ * Enum values for ProgressStatus
+ **************************************************************/
+ /**
+ * PROGRESS_PENDING is an element of enum ProgressStatus. Its value is "PROGRESS_PENDING".
+ */
+ public static final int PROGRESS_PENDING = 0;
+ /**
+ * PROGRESS_IN_PROGRESS is an element of enum ProgressStatus. Its value is "PROGRESS_IN_PROGRESS".
+ */
+ public static final int PROGRESS_IN_PROGRESS = 1;
+ /**
+ * PROGRESS_COMPLETE is an element of enum ProgressStatus. Its value is "PROGRESS_COMPLETE".
+ */
+ public static final int PROGRESS_COMPLETE = 2;
+ /**
+ * PROGRESS_ABORTED is an element of enum ProgressStatus. Its value is "PROGRESS_ABORTED".
+ */
+ public static final int PROGRESS_ABORTED = 3;
+ /**
+ * PROGRESS_FAILED is an element of enum ProgressStatus. Its value is "PROGRESS_FAILED".
+ */
+ public static final int PROGRESS_FAILED = 4;
+
+ /**
+ * Max value for enum ProgressStatus_MAX
+ */
+ public static final int ProgressStatus_MAX = 4;
+
+
+ /***************************************************************
+ * Enum values for RelationType
+ **************************************************************/
+ /**
+ * REL_NONE is an element of enum RelationType. Its value is "REL_NONE".
+ */
+ public static final int REL_NONE = 0;
+ /**
+ * REL_SELF is an element of enum RelationType. Its value is "REL_SELF".
+ */
+ public static final int REL_SELF = 1;
+
+ /**
+ * Max value for enum RelationType_MAX
+ */
+ public static final int RelationType_MAX = 1;
+
+
+ /***************************************************************
+ * Enum values for UserSource
+ **************************************************************/
+ /**
+ * USER_APP is an element of enum UserSource. Its value is "USER_APP".
+ */
+ public static final int USER_APP = 0;
+ public static final int USER_EXTERNAL = 1;
+ public static final int USER_AD= 2;
+ public static final int USER_LDAP = 3;
+ public static final int USER_UNIX = 4;
+ public static final int USER_REPO = 5;
+
+ public static final int GROUP_INTERNAL = 0;
+ public static final int GROUP_EXTERNAL = 1;
+ public static final int GROUP_AD= 2;
+ public static final int GROUP_LDAP = 3;
+ public static final int GROUP_UNIX = 4;
+ public static final int GROUP_REPO = 5;
+ /**
+ * USER_GOOGLE is an element of enum UserSource. Its value is "USER_GOOGLE".
+ */
+ //public static final int USER_GOOGLE = 1;
+ /**
+ * USER_FB is an element of enum UserSource. Its value is "USER_FB".
+ */
+ //public static final int USER_FB = 2;
+
+ /**
+ * Max value for enum UserSource_MAX
+ */
+ public static final int UserSource_MAX = 5;
+
+
+ /***************************************************************
+ * Enum values for AssetType
+ **************************************************************/
+ /**
+ * ASSET_UNKNOWN is an element of enum AssetType. Its value is "ASSET_UNKNOWN".
+ */
+ public static final int ASSET_UNKNOWN = 0;
+ /**
+ * ASSET_HDFS is an element of enum AssetType. Its value is "ASSET_HDFS".
+ */
+ public static final int ASSET_HDFS = 1;
+ /**
+ * ASSET_HBASE is an element of enum AssetType. Its value is "ASSET_HBASE".
+ */
+ public static final int ASSET_HBASE = 2;
+ /**
+ * ASSET_HIVE is an element of enum AssetType. Its value is "ASSET_HIVE".
+ */
+ public static final int ASSET_HIVE = 3;
+ /**
+ * ASSET_HIVE is an element of enum AssetType. Its value is "ASSET_HIVE".
+ */
+ public static final int ASSET_AGENT = 4;
+ /**
+ * ASSET_HIVE is an element of enum AssetType. Its value is "ASSET_HIVE".
+ */
+ public static final int ASSET_KNOX = 5;
+ /**
+ * ASSET_HIVE is an element of enum AssetType. Its value is "ASSET_HIVE".
+ */
+ public static final int ASSET_STORM = 6;
+
+ /**
+ * Max value for enum AssetType_MAX
+ */
+ public static final int AssetType_MAX = 6;
+
+
+ /***************************************************************
+ * Enum values for AccessResult
+ **************************************************************/
+ /**
+ * ACCESS_RESULT_DENIED is an element of enum AccessResult. Its value is "ACCESS_RESULT_DENIED".
+ */
+ public static final int ACCESS_RESULT_DENIED = 0;
+ /**
+ * ACCESS_RESULT_ALLOWED is an element of enum AccessResult. Its value is "ACCESS_RESULT_ALLOWED".
+ */
+ public static final int ACCESS_RESULT_ALLOWED = 1;
+
+ /**
+ * Max value for enum AccessResult_MAX
+ */
+ public static final int AccessResult_MAX = 1;
+
+
+ /***************************************************************
+ * Enum values for PolicyType
+ **************************************************************/
+ /**
+ * POLICY_INCLUSION is an element of enum PolicyType. Its value is "POLICY_INCLUSION".
+ */
+ public static final int POLICY_INCLUSION = 0;
+ /**
+ * POLICY_EXCLUSION is an element of enum PolicyType. Its value is "POLICY_EXCLUSION".
+ */
+ public static final int POLICY_EXCLUSION = 1;
+
+ /**
+ * Max value for enum PolicyType_MAX
+ */
+ public static final int PolicyType_MAX = 1;
+
+
+ /***************************************************************
+ * Enum values for XAAuditType
+ **************************************************************/
+ /**
+ * XA_AUDIT_TYPE_UNKNOWN is an element of enum XAAuditType. Its value is "XA_AUDIT_TYPE_UNKNOWN".
+ */
+ public static final int XA_AUDIT_TYPE_UNKNOWN = 0;
+ /**
+ * XA_AUDIT_TYPE_ALL is an element of enum XAAuditType. Its value is "XA_AUDIT_TYPE_ALL".
+ */
+ public static final int XA_AUDIT_TYPE_ALL = 1;
+ /**
+ * XA_AUDIT_TYPE_READ is an element of enum XAAuditType. Its value is "XA_AUDIT_TYPE_READ".
+ */
+ public static final int XA_AUDIT_TYPE_READ = 2;
+ /**
+ * XA_AUDIT_TYPE_WRITE is an element of enum XAAuditType. Its value is "XA_AUDIT_TYPE_WRITE".
+ */
+ public static final int XA_AUDIT_TYPE_WRITE = 3;
+ /**
+ * XA_AUDIT_TYPE_CREATE is an element of enum XAAuditType. Its value is "XA_AUDIT_TYPE_CREATE".
+ */
+ public static final int XA_AUDIT_TYPE_CREATE = 4;
+ /**
+ * XA_AUDIT_TYPE_DELETE is an element of enum XAAuditType. Its value is "XA_AUDIT_TYPE_DELETE".
+ */
+ public static final int XA_AUDIT_TYPE_DELETE = 5;
+ /**
+ * XA_AUDIT_TYPE_LOGIN is an element of enum XAAuditType. Its value is "XA_AUDIT_TYPE_LOGIN".
+ */
+ public static final int XA_AUDIT_TYPE_LOGIN = 6;
+
+ /**
+ * Max value for enum XAAuditType_MAX
+ */
+ public static final int XAAuditType_MAX = 6;
+
+
+ /***************************************************************
+ * Enum values for ResourceType
+ **************************************************************/
+ /**
+ * RESOURCE_UNKNOWN is an element of enum ResourceType. Its value is "RESOURCE_UNKNOWN".
+ */
+ public static final int RESOURCE_UNKNOWN = 0;
+ /**
+ * RESOURCE_PATH is an element of enum ResourceType. Its value is "RESOURCE_PATH".
+ */
+ public static final int RESOURCE_PATH = 1;
+ /**
+ * RESOURCE_DB is an element of enum ResourceType. Its value is "RESOURCE_DB".
+ */
+ public static final int RESOURCE_DB = 2;
+ /**
+ * RESOURCE_TABLE is an element of enum ResourceType. Its value is "RESOURCE_TABLE".
+ */
+ public static final int RESOURCE_TABLE = 3;
+ /**
+ * RESOURCE_COL_FAM is an element of enum ResourceType. Its value is "RESOURCE_COL_FAM".
+ */
+ public static final int RESOURCE_COL_FAM = 4;
+ /**
+ * RESOURCE_COLUMN is an element of enum ResourceType. Its value is "RESOURCE_COLUMN".
+ */
+ public static final int RESOURCE_COLUMN = 5;
+ /**
+ * RESOURCE_VIEW is an element of enum ResourceType. Its value is "RESOURCE_VIEW".
+ */
+ public static final int RESOURCE_VIEW = 6;
+ /**
+ * RESOURCE_UDF is an element of enum ResourceType. Its value is "RESOURCE_UDF".
+ */
+ public static final int RESOURCE_UDF = 7;
+ /**
+ * RESOURCE_VIEW_COL is an element of enum ResourceType. Its value is "RESOURCE_VIEW_COL".
+ */
+ public static final int RESOURCE_VIEW_COL = 8;
+
+ /**
+ * Max value for enum ResourceType_MAX
+ */
+ public static final int ResourceType_MAX = 8;
+
+
+ /***************************************************************
+ * Enum values for XAGroupType
+ **************************************************************/
+ /**
+ * XA_GROUP_UNKNOWN is an element of enum XAGroupType. Its value is "XA_GROUP_UNKNOWN".
+ */
+ public static final int XA_GROUP_UNKNOWN = 0;
+ /**
+ * XA_GROUP_USER is an element of enum XAGroupType. Its value is "XA_GROUP_USER".
+ */
+ public static final int XA_GROUP_USER = 1;
+ /**
+ * XA_GROUP_GROUP is an element of enum XAGroupType. Its value is "XA_GROUP_GROUP".
+ */
+ public static final int XA_GROUP_GROUP = 2;
+ /**
+ * XA_GROUP_ROLE is an element of enum XAGroupType. Its value is "XA_GROUP_ROLE".
+ */
+ public static final int XA_GROUP_ROLE = 3;
+
+ /**
+ * Max value for enum XAGroupType_MAX
+ */
+ public static final int XAGroupType_MAX = 3;
+
+
+ /***************************************************************
+ * Enum values for XAPermForType
+ **************************************************************/
+ /**
+ * XA_PERM_FOR_UNKNOWN is an element of enum XAPermForType. Its value is "XA_PERM_FOR_UNKNOWN".
+ */
+ public static final int XA_PERM_FOR_UNKNOWN = 0;
+ /**
+ * XA_PERM_FOR_USER is an element of enum XAPermForType. Its value is "XA_PERM_FOR_USER".
+ */
+ public static final int XA_PERM_FOR_USER = 1;
+ /**
+ * XA_PERM_FOR_GROUP is an element of enum XAPermForType. Its value is "XA_PERM_FOR_GROUP".
+ */
+ public static final int XA_PERM_FOR_GROUP = 2;
+
+ /**
+ * Max value for enum XAPermForType_MAX
+ */
+ public static final int XAPermForType_MAX = 2;
+
+
+ /***************************************************************
+ * Enum values for XAPermType
+ **************************************************************/
+ /**
+ * XA_PERM_TYPE_UNKNOWN is an element of enum XAPermType. Its value is "XA_PERM_TYPE_UNKNOWN".
+ */
+ public static final int XA_PERM_TYPE_UNKNOWN = 0;
+ /**
+ * XA_PERM_TYPE_RESET is an element of enum XAPermType. Its value is "XA_PERM_TYPE_RESET".
+ */
+ public static final int XA_PERM_TYPE_RESET = 1;
+ /**
+ * XA_PERM_TYPE_READ is an element of enum XAPermType. Its value is "XA_PERM_TYPE_READ".
+ */
+ public static final int XA_PERM_TYPE_READ = 2;
+ /**
+ * XA_PERM_TYPE_WRITE is an element of enum XAPermType. Its value is "XA_PERM_TYPE_WRITE".
+ */
+ public static final int XA_PERM_TYPE_WRITE = 3;
+ /**
+ * XA_PERM_TYPE_CREATE is an element of enum XAPermType. Its value is "XA_PERM_TYPE_CREATE".
+ */
+ public static final int XA_PERM_TYPE_CREATE = 4;
+ /**
+ * XA_PERM_TYPE_DELETE is an element of enum XAPermType. Its value is "XA_PERM_TYPE_DELETE".
+ */
+ public static final int XA_PERM_TYPE_DELETE = 5;
+ /**
+ * XA_PERM_TYPE_ADMIN is an element of enum XAPermType. Its value is "XA_PERM_TYPE_ADMIN".
+ */
+ public static final int XA_PERM_TYPE_ADMIN = 6;
+ /**
+ * XA_PERM_TYPE_OBFUSCATE is an element of enum XAPermType. Its value is "XA_PERM_TYPE_OBFUSCATE".
+ */
+ public static final int XA_PERM_TYPE_OBFUSCATE = 7;
+ /**
+ * XA_PERM_TYPE_MASK is an element of enum XAPermType. Its value is "XA_PERM_TYPE_MASK".
+ */
+ public static final int XA_PERM_TYPE_MASK = 8;
+ /**
+ * XA_PERM_TYPE_EXECUTE is an element of enum XAPermType. Its value is "XA_PERM_TYPE_EXECUTE".
+ */
+ public static final int XA_PERM_TYPE_EXECUTE = 9;
+ /**
+ * XA_PERM_TYPE_SELECT is an element of enum XAPermType. Its value is "XA_PERM_TYPE_SELECT".
+ */
+ public static final int XA_PERM_TYPE_SELECT = 10;
+ /**
+ * XA_PERM_TYPE_UPDATE is an element of enum XAPermType. Its value is "XA_PERM_TYPE_UPDATE".
+ */
+ public static final int XA_PERM_TYPE_UPDATE = 11;
+ /**
+ * XA_PERM_TYPE_DROP is an element of enum XAPermType. Its value is "XA_PERM_TYPE_DROP".
+ */
+ public static final int XA_PERM_TYPE_DROP = 12;
+ /**
+ * XA_PERM_TYPE_ALTER is an element of enum XAPermType. Its value is "XA_PERM_TYPE_ALTER".
+ */
+ public static final int XA_PERM_TYPE_ALTER = 13;
+ /**
+ * XA_PERM_TYPE_INDEX is an element of enum XAPermType. Its value is "XA_PERM_TYPE_INDEX".
+ */
+ public static final int XA_PERM_TYPE_INDEX = 14;
+ /**
+ * XA_PERM_TYPE_LOCK is an element of enum XAPermType. Its value is "XA_PERM_TYPE_LOCK".
+ */
+ public static final int XA_PERM_TYPE_LOCK = 15;
+ /**
+ * XA_PERM_TYPE_ALL is an element of enum XAPermType. Its value is "XA_PERM_TYPE_ALL".
+ */
+ public static final int XA_PERM_TYPE_ALL = 16;
+
+ /**
+ * XA_PERM_TYPE_ALL is an element of enum XAPermType. Its value is "XA_PERM_TYPE_ALLOW".
+ */
+ public static final int XA_PERM_TYPE_ALLOW = 17;
+
+ /**
+ * Max value for enum XAPermType_MAX
+ */
+ public static final int XAPermType_MAX = 17;
+
+
+ /***************************************************************
+ * Enum values for ClassTypes
+ **************************************************************/
+ /**
+ * CLASS_TYPE_NONE is an element of enum ClassTypes. Its value is "CLASS_TYPE_NONE".
+ */
+ public static final int CLASS_TYPE_NONE = 0;
+ /**
+ * CLASS_TYPE_MESSAGE is an element of enum ClassTypes. Its value is "CLASS_TYPE_MESSAGE".
+ */
+ public static final int CLASS_TYPE_MESSAGE = 1;
+ /**
+ * CLASS_TYPE_USER_PROFILE is an element of enum ClassTypes. Its value is "CLASS_TYPE_USER_PROFILE".
+ */
+ public static final int CLASS_TYPE_USER_PROFILE = 2;
+ /**
+ * CLASS_TYPE_AUTH_SESS is an element of enum ClassTypes. Its value is "CLASS_TYPE_AUTH_SESS".
+ */
+ public static final int CLASS_TYPE_AUTH_SESS = 3;
+ /**
+ * CLASS_TYPE_DATA_OBJECT is an element of enum ClassTypes. Its value is "CLASS_TYPE_DATA_OBJECT".
+ */
+ public static final int CLASS_TYPE_DATA_OBJECT = 4;
+ /**
+ * CLASS_TYPE_NAMEVALUE is an element of enum ClassTypes. Its value is "CLASS_TYPE_NAMEVALUE".
+ */
+ public static final int CLASS_TYPE_NAMEVALUE = 5;
+ /**
+ * CLASS_TYPE_LONG is an element of enum ClassTypes. Its value is "CLASS_TYPE_LONG".
+ */
+ public static final int CLASS_TYPE_LONG = 6;
+ /**
+ * CLASS_TYPE_PASSWORD_CHANGE is an element of enum ClassTypes. Its value is "CLASS_TYPE_PASSWORD_CHANGE".
+ */
+ public static final int CLASS_TYPE_PASSWORD_CHANGE = 7;
+ /**
+ * CLASS_TYPE_STRING is an element of enum ClassTypes. Its value is "CLASS_TYPE_STRING".
+ */
+ public static final int CLASS_TYPE_STRING = 8;
+ /**
+ * CLASS_TYPE_ENUM is an element of enum ClassTypes. Its value is "CLASS_TYPE_ENUM".
+ */
+ public static final int CLASS_TYPE_ENUM = 9;
+ /**
+ * CLASS_TYPE_ENUM_ELEMENT is an element of enum ClassTypes. Its value is "CLASS_TYPE_ENUM_ELEMENT".
+ */
+ public static final int CLASS_TYPE_ENUM_ELEMENT = 10;
+ /**
+ * CLASS_TYPE_RESPONSE is an element of enum ClassTypes. Its value is "CLASS_TYPE_RESPONSE".
+ */
+ public static final int CLASS_TYPE_RESPONSE = 11;
+ /**
+ * CLASS_TYPE_XA_ASSET is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_ASSET".
+ */
+ public static final int CLASS_TYPE_XA_ASSET = 1000;
+ /**
+ * CLASS_TYPE_XA_RESOURCE is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_RESOURCE".
+ */
+ public static final int CLASS_TYPE_XA_RESOURCE = 1001;
+ /**
+ * CLASS_TYPE_XA_GROUP is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_GROUP".
+ */
+ public static final int CLASS_TYPE_XA_GROUP = 1002;
+ /**
+ * CLASS_TYPE_XA_USER is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_USER".
+ */
+ public static final int CLASS_TYPE_XA_USER = 1003;
+ /**
+ * CLASS_TYPE_XA_GROUP_USER is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_GROUP_USER".
+ */
+ public static final int CLASS_TYPE_XA_GROUP_USER = 1004;
+ /**
+ * CLASS_TYPE_XA_GROUP_GROUP is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_GROUP_GROUP".
+ */
+ public static final int CLASS_TYPE_XA_GROUP_GROUP = 1005;
+ /**
+ * CLASS_TYPE_XA_PERM_MAP is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_PERM_MAP".
+ */
+ public static final int CLASS_TYPE_XA_PERM_MAP = 1006;
+ /**
+ * CLASS_TYPE_XA_AUDIT_MAP is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_AUDIT_MAP".
+ */
+ public static final int CLASS_TYPE_XA_AUDIT_MAP = 1007;
+ /**
+ * CLASS_TYPE_XA_CRED_STORE is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_CRED_STORE".
+ */
+ public static final int CLASS_TYPE_XA_CRED_STORE = 1008;
+ /**
+ * CLASS_TYPE_XA_POLICY_EXPORT_AUDIT is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_POLICY_EXPORT_AUDIT".
+ */
+ public static final int CLASS_TYPE_XA_POLICY_EXPORT_AUDIT = 1009;
+ /**
+ * CLASS_TYPE_TRX_LOG is an element of enum ClassTypes. Its value is "CLASS_TYPE_TRX_LOG".
+ */
+ public static final int CLASS_TYPE_TRX_LOG = 1010;
+ /**
+ * CLASS_TYPE_XA_ACCESS_AUDIT is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_ACCESS_AUDIT".
+ */
+ public static final int CLASS_TYPE_XA_ACCESS_AUDIT = 1011;
+ /**
+ * CLASS_TYPE_XA_TRANSACTION_LOG_ATTRIBUTE is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_TRANSACTION_LOG_ATTRIBUTE".
+ */
+ public static final int CLASS_TYPE_XA_TRANSACTION_LOG_ATTRIBUTE = 1012;
+
+ /**
+ * Max value for enum ClassTypes_MAX
+ */
+ public static final int ClassTypes_MAX = 1012;
+
+
+
+ static public String getLabelFor_ActiveStatus( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "Disabled"; //STATUS_DISABLED
+ }
+ if( elementValue == 1 ) {
+ return "Enabled"; //STATUS_ENABLED
+ }
+ if( elementValue == 2 ) {
+ return "Deleted"; //STATUS_DELETED
+ }
+ return null;
+ }
+
+ static public String getLabelFor_ActivationStatus( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "Disabled"; //ACT_STATUS_DISABLED
+ }
+ if( elementValue == 1 ) {
+ return "Active"; //ACT_STATUS_ACTIVE
+ }
+ if( elementValue == 2 ) {
+ return "Pending Approval"; //ACT_STATUS_PENDING_APPROVAL
+ }
+ if( elementValue == 3 ) {
+ return "Pending Activation"; //ACT_STATUS_PENDING_ACTIVATION
+ }
+ if( elementValue == 4 ) {
+ return "Rejected"; //ACT_STATUS_REJECTED
+ }
+ if( elementValue == 5 ) {
+ return "Deactivated"; //ACT_STATUS_DEACTIVATED
+ }
+ if( elementValue == 6 ) {
+ return "Registration Pending"; //ACT_STATUS_PRE_REGISTRATION
+ }
+ if( elementValue == 7 ) {
+ return "No login privilege"; //ACT_STATUS_NO_LOGIN
+ }
+ return null;
+ }
+
+ static public String getLabelFor_BooleanValue( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "None"; //BOOL_NONE
+ }
+ if( elementValue == 1 ) {
+ return "True"; //BOOL_TRUE
+ }
+ if( elementValue == 2 ) {
+ return "False"; //BOOL_FALSE
+ }
+ return null;
+ }
+
+ static public String getLabelFor_DataType( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "Unknown"; //DATA_TYPE_UNKNOWN
+ }
+ if( elementValue == 1 ) {
+ return "Integer"; //DATA_TYPE_INTEGER
+ }
+ if( elementValue == 2 ) {
+ return "Double"; //DATA_TYPE_DOUBLE
+ }
+ if( elementValue == 3 ) {
+ return "String"; //DATA_TYPE_STRING
+ }
+ if( elementValue == 4 ) {
+ return "Boolean"; //DATA_TYPE_BOOLEAN
+ }
+ if( elementValue == 5 ) {
+ return "Date"; //DATA_TYPE_DATE
+ }
+ if( elementValue == 6 ) {
+ return "String enumeration"; //DATA_TYPE_STRING_ENUM
+ }
+ if( elementValue == 7 ) {
+ return "Long"; //DATA_TYPE_LONG
+ }
+ if( elementValue == 8 ) {
+ return "Integer enumeration"; //DATA_TYPE_INTEGER_ENUM
+ }
+ return null;
+ }
+
+ static public String getLabelFor_DeviceType( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "Unknown"; //DEVICE_UNKNOWN
+ }
+ if( elementValue == 1 ) {
+ return "Browser"; //DEVICE_BROWSER
+ }
+ if( elementValue == 2 ) {
+ return "iPhone"; //DEVICE_IPHONE
+ }
+ if( elementValue == 3 ) {
+ return "iPad"; //DEVICE_IPAD
+ }
+ if( elementValue == 4 ) {
+ return "iPod"; //DEVICE_IPOD
+ }
+ if( elementValue == 5 ) {
+ return "Android"; //DEVICE_ANDROID
+ }
+ return null;
+ }
+
+ static public String getLabelFor_DiffLevel( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "Unknown"; //DIFF_UNKNOWN
+ }
+ if( elementValue == 1 ) {
+ return "Low"; //DIFF_LOW
+ }
+ if( elementValue == 2 ) {
+ return "Medium"; //DIFF_MEDIUM
+ }
+ if( elementValue == 3 ) {
+ return "High"; //DIFF_HIGH
+ }
+ return null;
+ }
+
+ static public String getLabelFor_FileType( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "File"; //FILE_FILE
+ }
+ if( elementValue == 1 ) {
+ return "Directory"; //FILE_DIR
+ }
+ return null;
+ }
+
+ static public String getLabelFor_FreqType( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "None"; //FREQ_NONE
+ }
+ if( elementValue == 1 ) {
+ return "Manual"; //FREQ_MANUAL
+ }
+ if( elementValue == 2 ) {
+ return "Hourly"; //FREQ_HOURLY
+ }
+ if( elementValue == 3 ) {
+ return "Daily"; //FREQ_DAILY
+ }
+ if( elementValue == 4 ) {
+ return "Weekly"; //FREQ_WEEKLY
+ }
+ if( elementValue == 5 ) {
+ return "Bi Weekly"; //FREQ_BI_WEEKLY
+ }
+ if( elementValue == 6 ) {
+ return "Monthly"; //FREQ_MONTHLY
+ }
+ return null;
+ }
+
+ static public String getLabelFor_MimeType( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "Unknown"; //MIME_UNKNOWN
+ }
+ if( elementValue == 1 ) {
+ return "Text"; //MIME_TEXT
+ }
+ if( elementValue == 2 ) {
+ return "Html"; //MIME_HTML
+ }
+ if( elementValue == 3 ) {
+ return "png"; //MIME_PNG
+ }
+ if( elementValue == 4 ) {
+ return "jpeg"; //MIME_JPEG
+ }
+ return null;
+ }
+
+ static public String getLabelFor_NumberFormat( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "None"; //NUM_FORMAT_NONE
+ }
+ if( elementValue == 1 ) {
+ return "Numeric"; //NUM_FORMAT_NUMERIC
+ }
+ if( elementValue == 2 ) {
+ return "Alphabhet"; //NUM_FORMAT_ALPHA
+ }
+ if( elementValue == 3 ) {
+ return "Roman"; //NUM_FORMAT_ROMAN
+ }
+ return null;
+ }
+
+ static public String getLabelFor_ObjectStatus( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "Active"; //OBJ_STATUS_ACTIVE
+ }
+ if( elementValue == 1 ) {
+ return "Deleted"; //OBJ_STATUS_DELETED
+ }
+ if( elementValue == 2 ) {
+ return "Archived"; //OBJ_STATUS_ARCHIVED
+ }
+ return null;
+ }
+
+ static public String getLabelFor_PasswordResetStatus( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "Active"; //PWD_RESET_ACTIVE
+ }
+ if( elementValue == 1 ) {
+ return "Used"; //PWD_RESET_USED
+ }
+ if( elementValue == 2 ) {
+ return "Expired"; //PWD_RESET_EXPIRED
+ }
+ if( elementValue == 3 ) {
+ return "Disabled"; //PWD_RESET_DISABLED
+ }
+ return null;
+ }
+
+ static public String getLabelFor_PriorityType( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "Normal"; //PRIORITY_NORMAL
+ }
+ if( elementValue == 1 ) {
+ return "Low"; //PRIORITY_LOW
+ }
+ if( elementValue == 2 ) {
+ return "Medium"; //PRIORITY_MEDIUM
+ }
+ if( elementValue == 3 ) {
+ return "High"; //PRIORITY_HIGH
+ }
+ return null;
+ }
+
+ static public String getLabelFor_ProgressStatus( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "Pending"; //PROGRESS_PENDING
+ }
+ if( elementValue == 1 ) {
+ return "In Progress"; //PROGRESS_IN_PROGRESS
+ }
+ if( elementValue == 2 ) {
+ return "Complete"; //PROGRESS_COMPLETE
+ }
+ if( elementValue == 3 ) {
+ return "Aborted"; //PROGRESS_ABORTED
+ }
+ if( elementValue == 4 ) {
+ return "Failed"; //PROGRESS_FAILED
+ }
+ return null;
+ }
+
+ static public String getLabelFor_RelationType( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "None"; //REL_NONE
+ }
+ if( elementValue == 1 ) {
+ return "Self"; //REL_SELF
+ }
+ return null;
+ }
+
+ static public String getLabelFor_UserSource( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "Application"; //USER_APP
+ }
+ if( elementValue == 1 ) {
+ return "External"; //USER_EXTERNAL
+ }
+ /*if( elementValue == 1 ) {
+ return "Google"; //USER_GOOGLE
+ }
+ if( elementValue == 2 ) {
+ return "FaceBook"; //USER_FB
+ }*/
+ return null;
+ }
+
+ static public String getLabelFor_AssetType( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "Unknown"; //ASSET_UNKNOWN
+ }
+ if( elementValue == 1 ) {
+ return "HDFS"; //ASSET_HDFS
+ }
+ if( elementValue == 2 ) {
+ return "HBase"; //ASSET_HBASE
+ }
+ if( elementValue == 3 ) {
+ return "Hive"; //ASSET_HIVE
+ }
+ if( elementValue == 4 ) {
+ return "Agent"; //ASSET_HIVE
+ }
+ if( elementValue == 5 ) {
+ return "Knox"; //ASSET_HIVE
+ }
+ if( elementValue == 6 ) {
+ return "Storm"; //ASSET_HIVE
+ }
+ return null;
+ }
+
+ static public String getLabelFor_AccessResult( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "Denied"; //ACCESS_RESULT_DENIED
+ }
+ if( elementValue == 1 ) {
+ return "Allowed"; //ACCESS_RESULT_ALLOWED
+ }
+ return null;
+ }
+
+ static public String getLabelFor_PolicyType( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "Inclusion"; //POLICY_INCLUSION
+ }
+ if( elementValue == 1 ) {
+ return "Exclusion"; //POLICY_EXCLUSION
+ }
+ return null;
+ }
+
+ static public String getLabelFor_XAAuditType( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "Unknown"; //XA_AUDIT_TYPE_UNKNOWN
+ }
+ if( elementValue == 1 ) {
+ return "All"; //XA_AUDIT_TYPE_ALL
+ }
+ if( elementValue == 2 ) {
+ return "Read"; //XA_AUDIT_TYPE_READ
+ }
+ if( elementValue == 3 ) {
+ return "Write"; //XA_AUDIT_TYPE_WRITE
+ }
+ if( elementValue == 4 ) {
+ return "Create"; //XA_AUDIT_TYPE_CREATE
+ }
+ if( elementValue == 5 ) {
+ return "Delete"; //XA_AUDIT_TYPE_DELETE
+ }
+ if( elementValue == 6 ) {
+ return "Login"; //XA_AUDIT_TYPE_LOGIN
+ }
+ return null;
+ }
+
+ static public String getLabelFor_ResourceType( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "Unknown"; //RESOURCE_UNKNOWN
+ }
+ if( elementValue == 1 ) {
+ return "Path"; //RESOURCE_PATH
+ }
+ if( elementValue == 2 ) {
+ return "Database"; //RESOURCE_DB
+ }
+ if( elementValue == 3 ) {
+ return "Table"; //RESOURCE_TABLE
+ }
+ if( elementValue == 4 ) {
+ return "Column Family"; //RESOURCE_COL_FAM
+ }
+ if( elementValue == 5 ) {
+ return "Column"; //RESOURCE_COLUMN
+ }
+ if( elementValue == 6 ) {
+ return "VIEW"; //RESOURCE_VIEW
+ }
+ if( elementValue == 7 ) {
+ return "UDF"; //RESOURCE_UDF
+ }
+ if( elementValue == 8 ) {
+ return "View Column"; //RESOURCE_VIEW_COL
+ }
+ return null;
+ }
+
+ static public String getLabelFor_XAGroupType( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "Unknown"; //XA_GROUP_UNKNOWN
+ }
+ if( elementValue == 1 ) {
+ return "User"; //XA_GROUP_USER
+ }
+ if( elementValue == 2 ) {
+ return "Group"; //XA_GROUP_GROUP
+ }
+ if( elementValue == 3 ) {
+ return "Role"; //XA_GROUP_ROLE
+ }
+ return null;
+ }
+
+ static public String getLabelFor_XAPermForType( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "Unknown"; //XA_PERM_FOR_UNKNOWN
+ }
+ if( elementValue == 1 ) {
+ return "Permission for Users"; //XA_PERM_FOR_USER
+ }
+ if( elementValue == 2 ) {
+ return "Permission for Groups"; //XA_PERM_FOR_GROUP
+ }
+ return null;
+ }
+
+ static public String getLabelFor_XAPermType( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "Unknown"; //XA_PERM_TYPE_UNKNOWN
+ }
+ if( elementValue == 1 ) {
+ return "Reset"; //XA_PERM_TYPE_RESET
+ }
+ if( elementValue == 2 ) {
+ return "Read"; //XA_PERM_TYPE_READ
+ }
+ if( elementValue == 3 ) {
+ return "Write"; //XA_PERM_TYPE_WRITE
+ }
+ if( elementValue == 4 ) {
+ return "Create"; //XA_PERM_TYPE_CREATE
+ }
+ if( elementValue == 5 ) {
+ return "Delete"; //XA_PERM_TYPE_DELETE
+ }
+ if( elementValue == 6 ) {
+ return "Admin"; //XA_PERM_TYPE_ADMIN
+ }
+ if( elementValue == 7 ) {
+ return "Obfuscate"; //XA_PERM_TYPE_OBFUSCATE
+ }
+ if( elementValue == 8 ) {
+ return "Mask"; //XA_PERM_TYPE_MASK
+ }
+ if( elementValue == 9 ) {
+ return "Execute"; //XA_PERM_TYPE_EXECUTE
+ }
+ if( elementValue == 10 ) {
+ return "Select"; //XA_PERM_TYPE_SELECT
+ }
+ if( elementValue == 11 ) {
+ return "Update"; //XA_PERM_TYPE_UPDATE
+ }
+ if( elementValue == 12 ) {
+ return "Drop"; //XA_PERM_TYPE_DROP
+ }
+ if( elementValue == 13 ) {
+ return "Alter"; //XA_PERM_TYPE_ALTER
+ }
+ if( elementValue == 14 ) {
+ return "Index"; //XA_PERM_TYPE_INDEX
+ }
+ if( elementValue == 15 ) {
+ return "Lock"; //XA_PERM_TYPE_LOCK
+ }
+ if( elementValue == 16 ) {
+ return "All"; //XA_PERM_TYPE_ALL
+ }
+ if( elementValue == 17 ) {
+ return "Allow"; //XA_PERM_TYPE_ALLOW
+ }
+ return null;
+ }
+
+ static public String getLabelFor_ClassTypes( int elementValue ) {
+ if( elementValue == 0 ) {
+ return "None"; //CLASS_TYPE_NONE
+ }
+ if( elementValue == 1 ) {
+ return "Message"; //CLASS_TYPE_MESSAGE
+ }
+ if( elementValue == 2 ) {
+ return "User Profile"; //CLASS_TYPE_USER_PROFILE
+ }
+ if( elementValue == 3 ) {
+ return "Authentication Session"; //CLASS_TYPE_AUTH_SESS
+ }
+ if( elementValue == 4 ) {
+ return null; //CLASS_TYPE_DATA_OBJECT
+ }
+ if( elementValue == 5 ) {
+ return null; //CLASS_TYPE_NAMEVALUE
+ }
+ if( elementValue == 6 ) {
+ return null; //CLASS_TYPE_LONG
+ }
+ if( elementValue == 7 ) {
+ return null; //CLASS_TYPE_PASSWORD_CHANGE
+ }
+ if( elementValue == 8 ) {
+ return null; //CLASS_TYPE_STRING
+ }
+ if( elementValue == 9 ) {
+ return null; //CLASS_TYPE_ENUM
+ }
+ if( elementValue == 10 ) {
+ return null; //CLASS_TYPE_ENUM_ELEMENT
+ }
+ if( elementValue == 11 ) {
+ return "Response"; //CLASS_TYPE_RESPONSE
+ }
+ if( elementValue == 1000 ) {
+ return "Asset"; //CLASS_TYPE_XA_ASSET
+ }
+ if( elementValue == 1001 ) {
+ return "Resource"; //CLASS_TYPE_XA_RESOURCE
+ }
+ if( elementValue == 1002 ) {
+ return "XA Group"; //CLASS_TYPE_XA_GROUP
+ }
+ if( elementValue == 1003 ) {
+ return "XA User"; //CLASS_TYPE_XA_USER
+ }
+ if( elementValue == 1004 ) {
+ return "XA Group of Users"; //CLASS_TYPE_XA_GROUP_USER
+ }
+ if( elementValue == 1005 ) {
+ return "XA Group of groups"; //CLASS_TYPE_XA_GROUP_GROUP
+ }
+ if( elementValue == 1006 ) {
+ return "XA permissions for resource"; //CLASS_TYPE_XA_PERM_MAP
+ }
+ if( elementValue == 1007 ) {
+ return "XA audits for resource"; //CLASS_TYPE_XA_AUDIT_MAP
+ }
+ if( elementValue == 1008 ) {
+ return "XA credential store"; //CLASS_TYPE_XA_CRED_STORE
+ }
+ if( elementValue == 1009 ) {
+ return "XA Policy Export Audit"; //CLASS_TYPE_XA_POLICY_EXPORT_AUDIT
+ }
+ if( elementValue == 1010 ) {
+ return "Transaction log"; //CLASS_TYPE_TRX_LOG
+ }
+ if( elementValue == 1011 ) {
+ return "Access Audit"; //CLASS_TYPE_XA_ACCESS_AUDIT
+ }
+ if( elementValue == 1012 ) {
+ return "Transaction log attribute"; //CLASS_TYPE_XA_TRANSACTION_LOG_ATTRIBUTE
+ }
+ return null;
+ }
+
+
+}
+
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/RangerConfigUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/RangerConfigUtil.java b/security-admin/src/main/java/org/apache/ranger/common/RangerConfigUtil.java
new file mode 100644
index 0000000..67ce850
--- /dev/null
+++ b/security-admin/src/main/java/org/apache/ranger/common/RangerConfigUtil.java
@@ -0,0 +1,90 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+ package org.apache.ranger.common;
+
+import org.apache.log4j.Logger;
+import org.springframework.stereotype.Component;
+
+/**
+ *
+ *
+ */
+@Component
+public class RangerConfigUtil {
+ static Logger logger = Logger.getLogger(RangerConfigUtil.class);
+
+ String webappRootURL;
+ int defaultMaxRows = 250;
+ String[] roles;
+ boolean accessFilterEnabled = true;
+ boolean isModerationEnabled = false;
+ boolean isUserPrefEnabled = false;
+
+ public RangerConfigUtil() {
+ webappRootURL = PropertiesUtil
+ .getProperty("xa.webapp.url.root");
+ if (webappRootURL == null || webappRootURL.trim().length() == 0) {
+ logger.error("webapp URL is not set. Please xa.webapp.url.root property");
+ }
+
+ defaultMaxRows = PropertiesUtil.getIntProperty(
+ "xa.db.maxrows.default", defaultMaxRows);
+
+ roles = PropertiesUtil
+ .getPropertyStringList("xa.users.roles.list");
+
+ accessFilterEnabled = PropertiesUtil.getBooleanProperty(
+ "xa.db.access.filter.enable", true);
+
+ isModerationEnabled = PropertiesUtil.getBooleanProperty(
+ "xa.moderation.enabled", isModerationEnabled);
+ isUserPrefEnabled = PropertiesUtil.getBooleanProperty(
+ "xa.userpref.enabled", isUserPrefEnabled);
+ }
+
+ /**
+ * @return the defaultMaxRows
+ */
+ public int getDefaultMaxRows() {
+ return defaultMaxRows;
+ }
+
+ /**
+ * @return the roles
+ */
+ public String[] getRoles() {
+ return roles;
+ }
+
+ /**
+ * @return the accessFilterEnabled
+ */
+ public boolean isAccessFilterEnabled() {
+ return accessFilterEnabled;
+ }
+
+ /**
+ * @return the webAppRootURL
+ */
+ public String getWebAppRootURL() {
+ return webappRootURL;
+ }
+
+}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/RangerConstants.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/RangerConstants.java b/security-admin/src/main/java/org/apache/ranger/common/RangerConstants.java
new file mode 100644
index 0000000..b09b21a
--- /dev/null
+++ b/security-admin/src/main/java/org/apache/ranger/common/RangerConstants.java
@@ -0,0 +1,169 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+ /**
+ *
+ */
+
+package org.apache.ranger.common;
+
+public class RangerConstants extends RangerCommonEnums {
+
+ // Default Roles
+ public final static String ROLE_SYS_ADMIN = "ROLE_SYS_ADMIN";
+ public final static String ROLE_ADMIN = "ROLE_ADMIN";
+ public final static String ROLE_INTEGRATOR = "ROLE_INTEGRATOR";
+ public final static String ROLE_DATA_ANALYST = "ROLE_DATA_ANALYST";
+ public final static String ROLE_BIZ_MGR = "ROLE_BIZ_MGR";
+
+ public final static String ROLE_USER = "ROLE_USER";
+ public final static String ROLE_ANON = "ROLE_ANON";
+ public final static String ROLE_OTHER = "ROLE_OTHER";
+ public final static String GROUP_PUBLIC = "public";
+ // Action constants
+ public final static String ACTION_EDIT = "edit";
+ public final static String ACTION_CHANGE = "change";
+ public final static String ACTION_DELETE = "delete";
+ public final static String ACTION_MARK_SPAM = "mark_spam";
+ public final static String ACTION_RATE = "rate";
+ public final static String ACTION_SELECT = "select";
+ public final static String ACTION_UNSELECT = "unselect";
+ public final static String ACTION_HIDE = "hide";
+ public final static String ACTION_UNHIDE = "unhide";
+ public final static String ACTION_SHARE = "share";
+ public final static String ACTION_UNSHARE = "unshare";
+ public final static String ACTION_BOOKMARK = "bookmark";
+ public final static String ACTION_UNBOOKMARK = "unbookmark";
+
+ // Sendgrid email API constants
+ public static final String SENDGRID_API_USER = "api_user";
+ public static final String SENDGRID_API_KEY = "api_key";
+ public static final String SENDGRID_TO = "to";
+ public static final String SENDGRID_TO_NAME = "toname";
+ public static final String SENDGRID_SUBJECT = "subject";
+ public static final String SENDGRID_TEXT = "text";
+ public static final String SENDGRID_HTML = "html";
+ public static final String SENDGRID_FROM_EMAIL = "from";
+ public static final String SENDGRID_FROM_NAME = "fromname";
+ public static final String SENDGRID_BCC = "bcc";
+ public static final String SENDGRID_CC = "cc";
+ public static final String SENDGRID_REPLY_TO = "replyto";
+
+ // User create validation errors
+ public enum ValidationUserProfile {
+
+ NO_EMAIL_ADDR("xa.validation.userprofile.no_email_addr",
+ "Email address not provided"), INVALID_EMAIL_ADDR(
+ "xa.validation.userprofile.userprofile.invalid_email_addr",
+ "Invalid email address"), NO_FIRST_NAME(
+ "xa.validation.userprofile.userprofile.no_first_name",
+ "First name not provided"), INVALID_FIRST_NAME(
+ "xa.validation.userprofile.invalid_first_name",
+ "Invalid first name"), NO_LAST_NAME(
+ "xa.validation.userprofile.noemailaddr",
+ "Email address not provided"), INVALID_LAST_NAME(
+ "xa.validation.userprofile.noemailaddr",
+ "Email address not provided"), NO_PUBLIC_SCREEN_NAME(
+ "xa.validation.userprofile.noemailaddr",
+ "Email address not provided"), INVALID_PUBLIC_SCREEN_NAME(
+ "xa.validation.userprofile.noemailaddr",
+ "Email address not provided");
+
+ String rbKey;
+ String message;
+
+ ValidationUserProfile(String rbKey, String message) {
+ this.rbKey = rbKey;
+ this.message = message;
+ }
+ };
+
+ // these constants will be used in setting GjResponse object.
+
+ public final static String USER_PENDING_APPROVAL_MSG = "User is yet not reviewed by Administrator. Please contact at <number>.";
+ public final static int USER_PENDING_APPROVAL_STATUS_CODE = 0;
+
+ public final static String USER_APPROVAL_MSG = "User is approved";
+ public final static int USER_APPROVAL_STATUS_CODE = 1;
+
+ public final static String USER_REJECTION_MSG = "User is rejected";
+ public final static int USER_REJECTION_STATUS_CODE = 1;
+
+ public final static String USER_STATUS_ALREADY_CHANGED_MSG = "Can not change user status. it is either already activated/approved/rejected";
+ public final static int USER_STATUS_ALREADY_CHANGED_STATUS_CODE = 0;
+
+ public final static String USER_ALREADY_ACTIVATED_MSG = "Your account is already activated. If you have forgotten your password, then from the login page, select 'Forgot Password'";
+ public final static int USER_ALREADY_ACTIVATED_STATUS_CODE = 0;
+
+ public final static String USER_STATUS_NOT_ACTIVE_MSG = "User is not in active status. Please activate your account first.";
+ public final static int USER_STATUS_NOT_ACTIVE_STATUS_CODE = 0;
+
+ public final static String INVALID_EMAIL_ADDRESS_MSG = "Invalid email address";
+ public final static int INVALID_EMAIL_ADDRESS_STATUS_CODE = 0;
+
+ public final static String WRONG_ACTIVATION_CODE_MSG = "Wrong activation code";
+ public final static int WRONG_ACTIVATION_CODE_STATUS_CODE = 0;
+
+ public final static String VALID_EMAIL_ADDRESS_MSG = "Valid email address";
+ public final static int VALID_EMAIL_ADDRESS_STATUS_CODE = 1;
+
+ public final static String NO_ACTIVATION_RECORD_FOR_USER_ERR_MSG = "No activation record found for user:";
+ public final static String NO_ACTIVATION_ENTRY = "activation entry not found";
+
+ public final static String VALIDATION_INVALID_DATA_DESC = "Invalid value for";
+ public final static int VALIDATION_INVALID_DATA_CODE = 0;
+ public static final String GROUP_MODERATORS = "GROUP_MODERATORS";
+
+ // public final static String EMAIL_WELCOME_MSG =
+ // "Welcome to iSchoolCircle";
+ // public final static String EMAIL_LINK_WELCOME_MSG =
+ // "Welcome to iSchoolCircle ! Please verify your account by clicking on the link below: ";
+ // public static final String EMAIL_EDIT_REJECTED_MSG =
+ // "Your changes not approved for public sharing.";
+ // public static final String EMAIL_APPROVAL_NEEDED_MSG =
+ // "New objects pending approval";
+ // public static final String EMAIL_PWD_RESET_CODE_MSG =
+ // "iSchoolCircle - Password Reset";
+
+ public final static String PWD_RESET_FAILED_MSG = "Invalid password reset request";
+
+ public final static String INVALID_NEW_PASSWORD_MSG = "Invalid new password";
+ public static final String EMAIL_NEW_FEEDBACK_RECEIVED = "New feedback from";
+ public static final int INITIAL_DOCUMENT_VERSION = 1;
+
+ public static final int EMAIL_TYPE_ACCOUNT_CREATE = 0;
+ public static final int EMAIL_TYPE_USER_CREATE = 1;
+ public static final int EMAIL_TYPE_USER_ACCT_ADD = 2;
+ public static final int EMAIL_TYPE_DOCUMENT_CREATE = 3;
+ public static final int EMAIL_TYPE_DISCUSSION_CREATE = 4;
+ public static final int EMAIL_TYPE_NOTE_CREATE = 5;
+ public static final int EMAIL_TYPE_TASK_CREATE = 6;
+ public static final int EMAIL_TYPE_USER_PASSWORD = 7;
+ public static final int EMAIL_TYPE_USER_ACTIVATION = 8;
+ public static final int EMAIL_TYPE_USER_ROLE_UPDATED = 9;
+ public static final int EMAIL_TYPE_USER_GRP_ADD = 10;
+
+ public static enum RBAC_PERM {
+ ALLOW_NONE,
+ ALLOW_READ,
+ ALLOW_WRITE,
+ ALLOW_DELETE
+ }
+
+}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/RangerJAXBContextResolver.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/RangerJAXBContextResolver.java b/security-admin/src/main/java/org/apache/ranger/common/RangerJAXBContextResolver.java
new file mode 100644
index 0000000..3b3260d
--- /dev/null
+++ b/security-admin/src/main/java/org/apache/ranger/common/RangerJAXBContextResolver.java
@@ -0,0 +1,71 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+ package org.apache.ranger.common;
+
+import javax.ws.rs.ext.ContextResolver;
+import javax.ws.rs.ext.Provider;
+import javax.xml.bind.JAXBContext;
+
+import com.sun.jersey.api.json.JSONConfiguration;
+import com.sun.jersey.api.json.JSONJAXBContext;
+
+/**
+ *
+ *
+ */
+@Provider
+public class RangerJAXBContextResolver implements ContextResolver<JAXBContext> {
+
+ private JAXBContext context;
+ private Class<?>[] types = {
+ org.apache.ranger.view.VXAuthSessionList.class,
+ org.apache.ranger.view.VXResponse.class,
+ org.apache.ranger.view.VXStringList.class,
+ org.apache.ranger.view.VXPortalUserList.class,
+ org.apache.ranger.view.VXAssetList.class,
+ org.apache.ranger.view.VXResourceList.class,
+ org.apache.ranger.view.VXCredentialStoreList.class,
+ org.apache.ranger.view.VXGroupList.class,
+ org.apache.ranger.view.VXUserList.class,
+ org.apache.ranger.view.VXGroupUserList.class,
+ org.apache.ranger.view.VXGroupGroupList.class,
+ org.apache.ranger.view.VXPermMapList.class,
+ org.apache.ranger.view.VXAuditMapList.class,
+ org.apache.ranger.view.VXPolicyExportAuditList.class,
+ org.apache.ranger.view.VXAccessAuditList.class
+ };
+
+ public RangerJAXBContextResolver() throws Exception {
+ JSONConfiguration config = JSONConfiguration.natural().build();
+ context = new JSONJAXBContext(config, types);
+ }
+
+ @Override
+ public JAXBContext getContext(Class<?> objectType) {
+ // return context;
+ for (Class<?> type : types) {
+ if (type.getName().equals(objectType.getName())) {
+ return context;
+ }
+ }
+ return null;
+ }
+}
+
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/RangerSearchUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/RangerSearchUtil.java b/security-admin/src/main/java/org/apache/ranger/common/RangerSearchUtil.java
new file mode 100644
index 0000000..cfdffc0
--- /dev/null
+++ b/security-admin/src/main/java/org/apache/ranger/common/RangerSearchUtil.java
@@ -0,0 +1,68 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+ package org.apache.ranger.common;
+
+import org.apache.log4j.Logger;
+import org.springframework.stereotype.Component;
+
+@Component
+public class RangerSearchUtil extends SearchUtil {
+ final static Logger logger = Logger.getLogger(RangerSearchUtil.class);
+ /*
+ @Override
+ public Query createSearchQuery(EntityManager em, String queryStr, String sortClause,
+ SearchCriteria searchCriteria, List<SearchField> searchFields,
+ int objectClassType, boolean hasAttributes, boolean isCountQuery){
+
+ // [1] Build where clause
+ StringBuilder queryClause = buildWhereClause(searchCriteria,
+ searchFields);
+
+ // [2] Add domain-object-security clause if needed
+ // if (objectClassType != -1
+ // && !ContextUtil.getCurrentUserSession().isUserAdmin()) {
+ // addDomainObjectSecuirtyClause(queryClause, hasAttributes);
+ // }
+
+ // [2] Add order by clause
+ addOrderByClause(queryClause, sortClause);
+
+ // [3] Create Query Object
+ Query query = em.createQuery(
+ queryStr + queryClause);
+
+ // [4] Resolve query parameters with values
+ resolveQueryParams(query, searchCriteria, searchFields);
+
+ // [5] Resolve domain-object-security parameters
+ // if (objectClassType != -1 &&
+ // !securityHandler.hasModeratorPermission()) {
+ // resolveDomainObjectSecuirtyParams(query, objectClassType);
+ // }
+
+ if (!isCountQuery) {
+ query.setFirstResult(searchCriteria.getStartIndex());
+ updateQueryPageSize(query, searchCriteria);
+ }
+
+ return query;
+ }
+ */
+}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/RequestContext.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/RequestContext.java b/security-admin/src/main/java/org/apache/ranger/common/RequestContext.java
index 778cc9a..62e63db 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/RequestContext.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/RequestContext.java
@@ -26,7 +26,7 @@ public class RequestContext implements Serializable {
private String ipAddress = null;
private String userAgent = null;
private String requestURL = null;
- private int deviceType = XACommonEnums.DEVICE_UNKNOWN;
+ private int deviceType = RangerCommonEnums.DEVICE_UNKNOWN;
private String serverRequestId = null;
private boolean isSync = true;
private long startTime = System.currentTimeMillis();
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/SearchCriteria.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/SearchCriteria.java b/security-admin/src/main/java/org/apache/ranger/common/SearchCriteria.java
index 6a93121..3dcd755 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/SearchCriteria.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/SearchCriteria.java
@@ -29,7 +29,7 @@ import java.util.List;
import java.util.Set;
import org.apache.log4j.Logger;
-import org.apache.ranger.biz.XABizUtil;
+import org.apache.ranger.biz.RangerBizUtil;
public class SearchCriteria {
@@ -187,7 +187,7 @@ public class SearchCriteria {
*/
public void setDistinct(boolean isDistinct) {
- int dbFlavor = XABizUtil.getDBFlavor();
+ int dbFlavor = RangerBizUtil.getDBFlavor();
if (isDistinct && dbFlavor == AppConstants.DB_FLAVOR_ORACLE) {
isDistinct = false;
logger.debug("Database flavor is `ORACLE` so ignoring DISTINCT "
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/SearchField.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/SearchField.java b/security-admin/src/main/java/org/apache/ranger/common/SearchField.java
index b232559..1891edb 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/SearchField.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/SearchField.java
@@ -23,7 +23,6 @@
package org.apache.ranger.common;
import java.util.ArrayList;
-import java.util.Date;
import java.util.List;
public class SearchField {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/SearchUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/SearchUtil.java b/security-admin/src/main/java/org/apache/ranger/common/SearchUtil.java
index d1782ce..43d3784 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/SearchUtil.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/SearchUtil.java
@@ -45,7 +45,7 @@ public class SearchUtil {
RESTErrorUtil restErrorUtil;
@Autowired
- XAConfigUtil configUtil;
+ RangerConfigUtil configUtil;
// @Autowired
// AKADomainObjectSecurityHandler securityHandler;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/TimedEventUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/TimedEventUtil.java b/security-admin/src/main/java/org/apache/ranger/common/TimedEventUtil.java
index 870b0d7..f833242 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/TimedEventUtil.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/TimedEventUtil.java
@@ -20,11 +20,6 @@
package org.apache.ranger.common;
import java.util.concurrent.Callable;
-import java.util.concurrent.ExecutionException;
-import java.util.concurrent.ExecutorService;
-import java.util.concurrent.Executors;
-import java.util.concurrent.Future;
-import java.util.concurrent.TimeoutException;
import java.util.concurrent.TimeUnit;
import org.apache.log4j.Logger;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/UserSessionBase.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/UserSessionBase.java b/security-admin/src/main/java/org/apache/ranger/common/UserSessionBase.java
index b009193..842015b 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/UserSessionBase.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/UserSessionBase.java
@@ -21,10 +21,7 @@
import java.io.Serializable;
import java.util.ArrayList;
-import java.util.HashMap;
-import java.util.HashSet;
import java.util.List;
-import java.util.Set;
import org.apache.ranger.entity.XXAuthSession;
import org.apache.ranger.entity.XXPortalUser;
@@ -36,7 +33,7 @@ public class UserSessionBase implements Serializable {
XXPortalUser xXPortalUser;
XXAuthSession xXAuthSession;
private boolean userAdmin;
- private int authProvider = XAConstants.USER_APP;
+ private int authProvider = RangerConstants.USER_APP;
private List<String> userRoleList = new ArrayList<String>();
int clientTimeOffsetInMinute = 0;
public Long getUserId() {
[10/12] incubator-ranger git commit: RANGER-194: Rename classes under
web-admin project
Posted by ma...@apache.org.
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/biz/XABizUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/biz/XABizUtil.java b/security-admin/src/main/java/org/apache/ranger/biz/XABizUtil.java
deleted file mode 100644
index 0177682..0000000
--- a/security-admin/src/main/java/org/apache/ranger/biz/XABizUtil.java
+++ /dev/null
@@ -1,1313 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing,
- * software distributed under the License is distributed on an
- * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
- * KIND, either express or implied. See the License for the
- * specific language governing permissions and limitations
- * under the License.
- */
-
- package org.apache.ranger.biz;
-
-import java.io.File;
-import java.util.ArrayList;
-import java.util.Arrays;
-import java.util.HashMap;
-import java.util.HashSet;
-import java.util.List;
-import java.util.Map;
-import java.util.Set;
-
-import org.apache.log4j.Logger;
-import org.apache.ranger.common.AppConstants;
-import org.apache.ranger.common.ContextUtil;
-import org.apache.ranger.common.GUIDUtil;
-import org.apache.ranger.common.PropertiesUtil;
-import org.apache.ranger.common.RESTErrorUtil;
-import org.apache.ranger.common.StringUtil;
-import org.apache.ranger.common.UserSessionBase;
-import org.apache.ranger.common.XACommonEnums;
-import org.apache.ranger.common.XAConstants;
-import org.apache.ranger.common.db.BaseDao;
-import org.apache.ranger.db.XADaoManager;
-import org.apache.ranger.entity.XXAsset;
-import org.apache.ranger.entity.XXDBBase;
-import org.apache.ranger.entity.XXGroup;
-import org.apache.ranger.entity.XXPermMap;
-import org.apache.ranger.entity.XXPortalUser;
-import org.apache.ranger.entity.XXResource;
-import org.apache.ranger.entity.XXTrxLog;
-import org.apache.ranger.entity.XXUser;
-import org.apache.ranger.service.AbstractBaseResourceService;
-import org.apache.ranger.view.VXDataObject;
-import org.apache.ranger.view.VXPortalUser;
-import org.apache.ranger.view.VXResource;
-import org.apache.ranger.view.VXResponse;
-import org.apache.ranger.view.VXString;
-import org.apache.ranger.view.VXStringList;
-import org.springframework.beans.factory.annotation.Autowired;
-import org.springframework.stereotype.Component;
-
-import java.util.Random;
-
-import org.apache.commons.io.FilenameUtils;
-import org.apache.commons.io.IOCase;
-
-@Component
-public class XABizUtil {
- static final Logger logger = Logger.getLogger(XABizUtil.class);
-
- @Autowired
- RESTErrorUtil restErrorUtil;
-
- @Autowired
- XADaoManager daoManager;
-
- @Autowired
- StringUtil stringUtil;
-
- @Autowired
- UserMgr userMgr;
-
- Set<Class<?>> groupEditableClasses;
- private Class<?>[] groupEditableClassesList = {};
-
- Map<String, Integer> classTypeMappings = new HashMap<String, Integer>();
- private int maxFirstNameLength;
- int maxDisplayNameLength = 150;
- boolean defaultAutoApprove = true;
- boolean showBlockedContent = true;
- public final String EMPTY_CONTENT_DISPLAY_NAME = "...";
- boolean enableResourceAccessControl;
- private Random random;
- private static final String PATH_CHARS = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrst0123456789-_.";
- private static char[] PATH_CHAR_SET = PATH_CHARS.toCharArray();
- private static int PATH_CHAR_SET_LEN = PATH_CHAR_SET.length;
-
- static String fileSeparator = PropertiesUtil.getProperty(
- "xa.file.separator", "/");
-
- public XABizUtil() {
- maxFirstNameLength = Integer.parseInt(PropertiesUtil.getProperty(
- "xa.user.firstname.maxlength", "16"));
- maxDisplayNameLength = PropertiesUtil.getIntProperty(
- "xa.bookmark.name.maxlen", maxDisplayNameLength);
- showBlockedContent = PropertiesUtil.getBooleanProperty(
- "xa.content.show_blocked", showBlockedContent);
- defaultAutoApprove = PropertiesUtil.getBooleanProperty(
- "xa.mod.default", defaultAutoApprove);
-
- groupEditableClasses = new HashSet<Class<?>>(
- Arrays.asList(groupEditableClassesList));
- enableResourceAccessControl = PropertiesUtil.getBooleanProperty(
- "xa.resource.accessControl.enabled", true);
- random = new Random();
- }
-
- public <T extends XXDBBase> List<? extends XXDBBase> getParentObjects(T object) {
- List<XXDBBase> parentObjectList = null;
- // if (checkParentAcess.contains(object.getMyClassType())) {
- // parentObjectList = new ArrayList<MBase>();
- // }
- return parentObjectList;
- }
-
- public int getClassType(Class<?> klass) {
- String className = klass.getName();
- // See if this mapping is already in the database
- Integer classType = classTypeMappings.get(className);
- if (classType == null) {
- // Instantiate the class and call the getClassType method
- if (XXDBBase.class.isAssignableFrom(klass)) {
- try {
- XXDBBase gjObj = (XXDBBase) klass.newInstance();
- classType = gjObj.getMyClassType();
- classTypeMappings.put(className, classType);
- } catch (Throwable ex) {
- logger.error("Error instantiating object for class "
- + className, ex);
- }
- }
- }
- if (classType == null) {
- return XACommonEnums.CLASS_TYPE_NONE;
- } else {
- return classType;
- }
- }
-
- // Access control methods
- public void checkSystemAdminAccess() {
- UserSessionBase currentUserSession = ContextUtil
- .getCurrentUserSession();
- if (currentUserSession != null && currentUserSession.isUserAdmin()) {
- return;
- }
- throw restErrorUtil
- .create403RESTException("Only System Administrators can add accounts");
- }
-
- /**
- * @param contentType
- * @return
- */
- public int getMimeTypeInt(String contentType) {
- if (contentType.equalsIgnoreCase("JPEG")
- || contentType.equalsIgnoreCase("JPG")
- || contentType.endsWith("jpg") || contentType.endsWith("jpeg")) {
- return XAConstants.MIME_JPEG;
- }
- if (contentType.equalsIgnoreCase("PNG") || contentType.endsWith("png")) {
- return XAConstants.MIME_PNG;
- }
- return XAConstants.MIME_UNKNOWN;
- }
-
- /**
- * @param mimeType
- * @return
- */
- public String getMimeType(int mimeType) {
- switch (mimeType) {
- case XAConstants.MIME_JPEG:
- return "jpg";
- case XAConstants.MIME_PNG:
- return "png";
- }
- return "";
- }
-
- /**
- * @param contentType
- * @return
- */
- public String getImageExtension(String contentType) {
- if (contentType.toLowerCase().endsWith("jpg")
- || contentType.toLowerCase().endsWith("jpeg")) {
- return "jpg";
- } else if (contentType.toLowerCase().endsWith("png")) {
- return "png";
- }
- return "";
- }
-
- /**
- * @param file
- * @return
- */
- public String getFileNameWithoutExtension(File file) {
- if (file != null) {
- String fileName = file.getName();
- if (fileName.indexOf(".") > 0) {
- return fileName.substring(0, fileName.indexOf("."));
- }
- return fileName;
-
- }
- return null;
- }
-
- public String getDisplayNameForClassName(XXDBBase obj) {
- String classTypeDisplayName = XAConstants.getLabelFor_ClassTypes(obj
- .getMyClassType());
- if (classTypeDisplayName == null) {
- logger.error(
- "Error get name for class type. obj=" + obj.toString(),
- new Throwable());
- }
- return classTypeDisplayName;
- }
-
- public String getDisplayName(XXDBBase obj) {
- if (obj != null) {
- return handleGetDisplayName(obj.getMyDisplayValue());
- } else {
- return handleGetDisplayName(null);
- }
- }
-
- /**
- * @param displayValue
- * @return
- */
- private String handleGetDisplayName(String displayValue) {
- if (displayValue == null || displayValue.trim().isEmpty()) {
- return EMPTY_CONTENT_DISPLAY_NAME;
- }
-
- if (displayValue.length() > maxDisplayNameLength) {
- displayValue = displayValue.substring(0, maxDisplayNameLength - 3)
- .concat("...");
- }
- return displayValue;
- }
-
- /**
- * @param userProfile
- * @return
- */
- public String generatePublicName(VXPortalUser userProfile, XXPortalUser gjUser) {
- return generatePublicName(userProfile.getFirstName(),
- userProfile.getLastName());
- }
-
- public String generatePublicName(String firstName, String lastName) {
- String publicName = null;
- String fName = firstName;
- if (firstName.length() > maxFirstNameLength) {
- fName = firstName.substring(0, maxFirstNameLength - (1 + 3))
- + "...";
- }
- if (lastName != null && lastName.length() > 0) {
- publicName = fName + " " + lastName.substring(0, 1) + ".";
- }
- return publicName;
- }
-
- public void updateCloneReferences(XXDBBase obj) {
- if (obj == null) {
- return;
- }
- }
-
- public Long getForUserId(XXDBBase resource) {
- return null;
- }
-
- public XXDBBase getMObject(int objClassType, Long objId) {
- XXDBBase obj = null;
-
- if (objId != null) {
- BaseDao<?> dao = daoManager.getDaoForClassType(objClassType);
-
- if (dao != null) {
- obj = (XXDBBase) dao.getById(objId);
- }
- }
-
- return obj;
- }
-
- public XXDBBase getMObject(VXDataObject vXDataObject) {
- if (vXDataObject != null) {
- return getMObject(vXDataObject.getMyClassType(), vXDataObject.getId());
- }
- return null;
- }
-
- public VXDataObject getVObject(int objClassType, Long objId) {
- if (objId == null) {
- return null;
- }
- if (objClassType == XAConstants.CLASS_TYPE_USER_PROFILE) {
- return userMgr.mapXXPortalUserVXPortalUser(daoManager.getXXPortalUser().getById(
- objId));
- }
- try {
- AbstractBaseResourceService<?, ?> myService = AbstractBaseResourceService
- .getService(objClassType);
- if (myService != null) {
- return myService.readResource(objId);
- }
- } catch (Throwable t) {
- logger.error("Error reading resource. objectClassType="
- + objClassType + ", objectId=" + objId, t);
- }
- return null;
- }
-
- public void deleteReferencedObjects(XXDBBase obj) {
-
- if (obj == null) {
- return;
- }
- if (obj.getMyClassType() == XAConstants.CLASS_TYPE_NONE) {
- return;
- }
-
- }
-
- /**
- * @param obj
- */
- void deleteObjects(List<XXDBBase> objs) {
-
- }
-
- void deleteObject(XXDBBase obj) {
- AbstractBaseResourceService<?, ?> myService = AbstractBaseResourceService
- .getService(obj.getMyClassType());
- if (myService != null) {
- myService.deleteResource(obj.getId());
- } else {
- logger.error("Service not found for obj=" + obj, new Throwable());
- }
- }
-
- public <T extends XXDBBase> Class<? extends XXDBBase> getContextObject(
- int objectClassType, Long objectId) {
- return null;
- }
-
- public VXStringList mapStringListToVStringList(List<String> stringList) {
- if (stringList == null) {
- return null;
- }
-
- List<VXString> vStringList = new ArrayList<VXString>();
- for (String str : stringList) {
- VXString vXString = new VXString();
- vXString.setValue(str);
- vStringList.add(vXString);
- }
-
- return new VXStringList(vStringList);
- }
-
- /**
- * return response object if users is having permission on given resource
- *
- * @param vXResource
- * @param permission
- * @return
- */
- public VXResponse hasPermission(VXResource vXResource, int permission) {
-
- VXResponse vXResponse = new VXResponse();
- if (!enableResourceAccessControl) {
- logger.debug("Resource Access Control is disabled !!!");
- return vXResponse;
- }
-
- if (vXResource == null) {
- vXResponse.setStatusCode(VXResponse.STATUS_ERROR);
- vXResponse.setMsgDesc("Please provide valid policy.");
- return vXResponse;
- }
-
- String resourceNames = vXResource.getName();
- if (stringUtil.isEmpty(resourceNames)) {
- vXResponse.setStatusCode(VXResponse.STATUS_ERROR);
- vXResponse.setMsgDesc("Please provide valid policy.");
- return vXResponse;
- }
-
- if (isAdmin()) {
- return vXResponse;
- }
-
- Long xUserId = getXUserId();
- Long assetId = vXResource.getAssetId();
- List<XXResource> xResourceList = daoManager.getXXResource()
- .findByAssetIdAndResourceStatus(assetId,
- AppConstants.STATUS_ENABLED);
-
- XXAsset xAsset = daoManager.getXXAsset().getById(assetId);
- int assetType = xAsset.getAssetType();
-
- vXResponse.setStatusCode(VXResponse.STATUS_ERROR);
- vXResponse.setMsgDesc("Permission Denied !");
-
- if (assetType == AppConstants.ASSET_HIVE) {
- String[] requestResNameList = resourceNames.split(",");
- if (stringUtil.isEmpty(vXResource.getUdfs())) {
- int reqTableType = vXResource.getTableType();
- int reqColumnType = vXResource.getColumnType();
- for (String resourceName : requestResNameList) {
- boolean matchFound = matchHivePolicy(resourceName,
- xResourceList, xUserId, permission, reqTableType,
- reqColumnType, false);
- if (!matchFound) {
- vXResponse.setMsgDesc("You're not permitted to perform "
- + "the action for resource path : "
- + resourceName);
- vXResponse.setStatusCode(VXResponse.STATUS_ERROR);
- return vXResponse;
- }
- }
- } else {
- for (String resourceName : requestResNameList) {
- boolean matchFound = matchHivePolicy(resourceName,
- xResourceList, xUserId, permission);
- if (!matchFound) {
- vXResponse.setMsgDesc("You're not permitted to perform "
- + "the action for resource path : "
- + resourceName);
- vXResponse.setStatusCode(VXResponse.STATUS_ERROR);
- return vXResponse;
- }
- }
- }
- vXResponse.setStatusCode(VXResponse.STATUS_SUCCESS);
- return vXResponse;
- } else if (assetType == AppConstants.ASSET_HBASE) {
- String[] requestResNameList = resourceNames.split(",");
- for (String resourceName : requestResNameList) {
- boolean matchFound = matchHbasePolicy(resourceName,
- xResourceList, vXResponse, xUserId, permission);
- if (!matchFound) {
- vXResponse.setMsgDesc("You're not permitted to perform "
- + "the action for resource path : " + resourceName);
- vXResponse.setStatusCode(VXResponse.STATUS_ERROR);
- return vXResponse;
- }
- }
- vXResponse.setStatusCode(VXResponse.STATUS_SUCCESS);
- return vXResponse;
- } else if (assetType == AppConstants.ASSET_HDFS) {
- String[] requestResNameList = resourceNames.split(",");
- for (String resourceName : requestResNameList) {
- boolean matchFound = matchHdfsPolicy(resourceName,
- xResourceList, xUserId, permission);
- if (!matchFound) {
- vXResponse.setMsgDesc("You're not permitted to perform "
- + "the action for resource path : " + resourceName);
- vXResponse.setStatusCode(VXResponse.STATUS_ERROR);
- return vXResponse;
- }
- }
- vXResponse.setStatusCode(VXResponse.STATUS_SUCCESS);
- return vXResponse;
- } else if (assetType == AppConstants.ASSET_KNOX) {
- String[] requestResNameList = resourceNames.split(",");
- for (String resourceName : requestResNameList) {
- boolean matchFound = matchKnoxPolicy(resourceName,
- xResourceList, vXResponse, xUserId, permission);
- if (!matchFound) {
- vXResponse.setMsgDesc("You're not permitted to perform "
- + "the action for resource path : " + resourceName);
- vXResponse.setStatusCode(VXResponse.STATUS_ERROR);
- return vXResponse;
- }
- }
- vXResponse.setStatusCode(VXResponse.STATUS_SUCCESS);
- return vXResponse;
- } else if (assetType == AppConstants.ASSET_STORM) {
- String[] requestResNameList = resourceNames.split(",");
- for (String resourceName : requestResNameList) {
- boolean matchFound = matchStormPolicy(resourceName,
- xResourceList, vXResponse, xUserId, permission);
- if (!matchFound) {
- vXResponse.setMsgDesc("You're not permitted to perform "
- + "the action for resource path : " + resourceName);
- vXResponse.setStatusCode(VXResponse.STATUS_ERROR);
- return vXResponse;
- }
- }
- vXResponse.setStatusCode(VXResponse.STATUS_SUCCESS);
- return vXResponse;
- }
- return vXResponse;
- }
-
- /**
- * return true id current logged in session is owned by admin
- *
- * @return
- */
- public boolean isAdmin() {
- UserSessionBase currentUserSession = ContextUtil
- .getCurrentUserSession();
- if (currentUserSession == null) {
- logger.debug("Unable to find session.");
- return false;
- }
-
- if (currentUserSession.isUserAdmin()) {
- return true;
- }
- return false;
- }
-
- /**
- * returns current user's userID from active user sessions
- *
- * @return
- */
- public Long getXUserId() {
-
- UserSessionBase currentUserSession = ContextUtil
- .getCurrentUserSession();
- if (currentUserSession == null) {
- logger.debug("Unable to find session.");
- return null;
- }
-
- XXPortalUser user = daoManager.getXXPortalUser().getById(
- currentUserSession.getUserId());
- if (user == null) {
- logger.debug("XXPortalUser not found with logged in user id : "
- + currentUserSession.getUserId());
- return null;
- }
-
- XXUser xUser = daoManager.getXXUser().findByUserName(user.getLoginId());
- if (xUser == null) {
- logger.debug("XXPortalUser not found for user id :" + user.getId()
- + " with name " + user.getFirstName());
- return null;
- }
-
- return xUser.getId();
- }
-
- /**
- * returns true if user is having required permission on given Hdfs resource
- *
- * @param resourceName
- * @param xResourceList
- * @param xUserId
- * @param permission
- * @return
- */
- private boolean matchHdfsPolicy(String resourceName,
- List<XXResource> xResourceList, Long xUserId, int permission) {
- boolean matchFound = false;
- resourceName = replaceMetaChars(resourceName);
-
- for (XXResource xResource : xResourceList) {
- if (xResource.getResourceStatus() != AppConstants.STATUS_ENABLED) {
- continue;
- }
- Long resourceId = xResource.getId();
- matchFound = checkUsrPermForPolicy(xUserId, permission, resourceId);
- if (matchFound) {
- matchFound = false;
- String resource = xResource.getName();
- String[] dbResourceNameList = resource.split(",");
- for (String dbResourceName : dbResourceNameList) {
- if (comparePathsForExactMatch(resourceName, dbResourceName)) {
- matchFound = true;
- } else {
- if (xResource.getIsRecursive() == AppConstants.BOOL_TRUE) {
- matchFound = isRecursiveWildCardMatch(resourceName,
- dbResourceName);
- } else {
- matchFound = nonRecursiveWildCardMatch(
- resourceName, dbResourceName);
- }
- }
- if (matchFound) {
- break;
- }
- }
- if (matchFound) {
- break;
- }
- }
- }
- return matchFound;
- }
-
- /**
- * returns true if user is having required permission on given Hbase
- * resource
- *
- * @param resourceName
- * @param xResourceList
- * @param vXResponse
- * @param xUserId
- * @param permission
- * @return
- */
- public boolean matchHbasePolicy(String resourceName,
- List<XXResource> xResourceList, VXResponse vXResponse, Long xUserId,
- int permission) {
- if(stringUtil.isEmpty(resourceName) || xResourceList==null || xUserId==null){
- return false;
- }
-
- String[] splittedResources = stringUtil.split(resourceName, fileSeparator);
- if (splittedResources.length < 1 || splittedResources.length > 3) {
- logger.debug("Invalid resourceName name : " + resourceName);
- return false;
- }
-
- String tblName = splittedResources.length > 0 ? splittedResources[0] : StringUtil.WILDCARD_ASTERISK;
- String colFamName = splittedResources.length > 1 ? splittedResources[1] : StringUtil.WILDCARD_ASTERISK;
- String colName = splittedResources.length > 2 ? splittedResources[2] : StringUtil.WILDCARD_ASTERISK;
-
- boolean policyMatched = false;
- // check all resources whether Hbase policy is enabled in any resource
- // of provided resource list
- for (XXResource xResource : xResourceList) {
- if (xResource.getResourceStatus() != AppConstants.STATUS_ENABLED) {
- continue;
- }
- Long resourceId = xResource.getId();
- boolean hasPermission = checkUsrPermForPolicy(xUserId, permission, resourceId);
- // if permission is enabled then load Tables,column family and
- // columns list from resource
- if (! hasPermission) {
- continue;
- }
-
- // 1. does the policy match the table?
- String[] xTables = stringUtil.isEmpty(xResource.getTables()) ? null : stringUtil.split(xResource.getTables(), ",");
-
- boolean matchFound = (xTables == null || xTables.length == 0) ? true : matchPath(tblName, xTables);
-
- if(matchFound) {
- // 2. does the policy match the column?
- String[] xColumnFamilies = stringUtil.isEmpty(xResource.getColumnFamilies()) ? null : stringUtil.split(xResource.getColumnFamilies(), ",");
-
- matchFound = (xColumnFamilies == null || xColumnFamilies.length == 0) ? true : matchPath(colFamName, xColumnFamilies);
-
- if(matchFound) {
- // 3. does the policy match the columnFamily?
- String[] xColumns = stringUtil.isEmpty(xResource.getColumns()) ? null : stringUtil.split(xResource.getColumns(), ",");
-
- matchFound = (xColumns == null || xColumns.length == 0) ? true : matchPath(colName, xColumns);
- }
- }
-
- if (matchFound) {
- policyMatched = true;
- break;
- }
- }
- return policyMatched;
- }
-
- public boolean matchHivePolicy(String resourceName,
- List<XXResource> xResourceList, Long xUserId, int permission) {
- return matchHivePolicy(resourceName, xResourceList, xUserId,
- permission, 0, 0, true);
- }
-
- /**
- * returns true if user is having required permission on given Hive resource
- *
- * @param resourceName
- * @param xResourceList
- * @param xUserId
- * @param permission
- * @param reqTableType
- * @param reqColumnType
- * @param isUdfPolicy
- * @return
- */
- public boolean matchHivePolicy(String resourceName,
- List<XXResource> xResourceList, Long xUserId, int permission,
- int reqTableType, int reqColumnType, boolean isUdfPolicy) {
-
- if(stringUtil.isEmpty(resourceName) || xResourceList==null || xUserId==null){
- return false;
- }
-
- String[] splittedResources = stringUtil.split(resourceName, fileSeparator);// get list of resources
- if (splittedResources.length < 1 || splittedResources.length > 3) {
- logger.debug("Invalid resource name : " + resourceName);
- return false;
- }
-
- String dbName = splittedResources.length > 0 ? splittedResources[0] : StringUtil.WILDCARD_ASTERISK;
- String tblName = splittedResources.length > 1 ? splittedResources[1] : StringUtil.WILDCARD_ASTERISK;
- String colName = splittedResources.length > 2 ? splittedResources[2] : StringUtil.WILDCARD_ASTERISK;
-
- boolean policyMatched = false;
- for (XXResource xResource : xResourceList) {
- if (xResource.getResourceStatus() != AppConstants.STATUS_ENABLED) {
- continue;
- }
-
- Long resourceId = xResource.getId();
- boolean hasPermission = checkUsrPermForPolicy(xUserId, permission, resourceId);
-
- if (! hasPermission) {
- continue;
- }
-
- // 1. does the policy match the database?
- String[] xDatabases = stringUtil.isEmpty(xResource.getDatabases()) ? null : stringUtil.split(xResource.getDatabases(), ",");
-
- boolean matchFound = (xDatabases == null || xDatabases.length == 0) ? true : matchPath(dbName, xDatabases);
-
- if (! matchFound) {
- continue;
- }
-
- // Type(either UDFs policy or non-UDFs policy) of current policy
- // should be of same as type of policy being iterated
- if (!stringUtil.isEmpty(xResource.getUdfs()) && !isUdfPolicy) {
- continue;
- }
-
- if (isUdfPolicy) {
- // 2. does the policy match the UDF?
- String[] xUdfs = stringUtil.isEmpty(xResource.getUdfs()) ? null : stringUtil.split(xResource.getUdfs(), ",");
-
- if(! matchPath(tblName, xUdfs)) {
- continue;
- } else {
- policyMatched = true;
- break;
- }
- } else {
- // 2. does the policy match the table?
- String[] xTables = stringUtil.isEmpty(xResource.getTables()) ? null : stringUtil.split(xResource.getTables(), ",");
-
- matchFound = (xTables == null || xTables.length == 0) ? true : matchPath(tblName, xTables);
-
- if(xResource.getTableType() == AppConstants.POLICY_EXCLUSION) {
- matchFound = !matchFound;
- }
-
- if (!matchFound) {
- continue;
- }
-
- // 3. does current policy match the column?
- String[] xColumns = stringUtil.isEmpty(xResource.getColumns()) ? null : stringUtil.split(xResource.getColumns(), ",");
-
- matchFound = (xColumns == null || xColumns.length == 0) ? true : matchPath(colName, xColumns);
-
- if(xResource.getColumnType() == AppConstants.POLICY_EXCLUSION) {
- matchFound = !matchFound;
- }
-
- if (!matchFound) {
- continue;
- } else {
- policyMatched = true;
- break;
- }
- }
- }
- return policyMatched;
- }
- /**
- * returns true if user is having required permission on given Hbase
- * resource
- *
- * @param resourceName
- * @param xResourceList
- * @param vXResponse
- * @param xUserId
- * @param permission
- * @return
- */
- private boolean matchKnoxPolicy(String resourceName,
- List<XXResource> xResourceList, VXResponse vXResponse, Long xUserId,
- int permission) {
-
- String[] splittedResources = stringUtil.split(resourceName,
- fileSeparator);
- int numberOfResources = splittedResources.length;
- if (numberOfResources < 1 || numberOfResources > 3) {
- logger.debug("Invalid policy name : " + resourceName);
- return false;
- }
-
- boolean policyMatched = false;
- // check all resources whether Knox policy is enabled in any resource
- // of provided resource list
- for (XXResource xResource : xResourceList) {
- if (xResource.getResourceStatus() != AppConstants.STATUS_ENABLED) {
- continue;
- }
- Long resourceId = xResource.getId();
- boolean hasPermission = checkUsrPermForPolicy(xUserId, permission,
- resourceId);
- // if permission is enabled then load Topologies,services list from resource
- if (hasPermission) {
- String[] xTopologies = (xResource.getTopologies() == null || xResource
- .getTopologies().equalsIgnoreCase("")) ? null : stringUtil
- .split(xResource.getTopologies(), ",");
- String[] xServices = (xResource.getServices() == null || xResource
- .getServices().equalsIgnoreCase("")) ? null
- : stringUtil.split(xResource.getServices(), ",");
-
- boolean matchFound = false;
-
- for (int index = 0; index < numberOfResources; index++) {
- matchFound = false;
- // check whether given table resource matches with any
- // existing topology resource
- if (index == 0) {
- if(xTopologies!=null){
- for (String xTopology : xTopologies) {
- if (matchPath(splittedResources[index], xTopology)) {
- matchFound = true;
- continue;
- }
- }
- }
- if(!matchFound) {
- break;
- }
- } // check whether given service resource matches with
- // any existing service resource
- else if (index == 1) {
- if(xServices!=null){
- for (String xService : xServices) {
- if (matchPath(splittedResources[index],
- xService)) {
- matchFound = true;
- continue;
- }
- }
- }
- if(!matchFound) {
- break;
- }
- }
- }
- if (matchFound) {
- policyMatched = true;
- break;
- }
- }
- }
- return policyMatched;
- }
-
- /**
- * returns true if user is having required permission on given STORM
- * resource
- *
- * @param resourceName
- * @param xResourceList
- * @param vXResponse
- * @param xUserId
- * @param permission
- * @return
- */
- private boolean matchStormPolicy(String resourceName,
- List<XXResource> xResourceList, VXResponse vXResponse, Long xUserId,
- int permission) {
-
- String[] splittedResources = stringUtil.split(resourceName,
- fileSeparator);
- int numberOfResources = splittedResources.length;
- if (numberOfResources < 1 || numberOfResources > 3) {
- logger.debug("Invalid policy name : " + resourceName);
- return false;
- }
-
- boolean policyMatched = false;
- // check all resources whether Knox policy is enabled in any resource
- // of provided resource list
- for (XXResource xResource : xResourceList) {
- if (xResource.getResourceStatus() != AppConstants.STATUS_ENABLED) {
- continue;
- }
- Long resourceId = xResource.getId();
- boolean hasPermission = checkUsrPermForPolicy(xUserId, permission,
- resourceId);
- // if permission is enabled then load Topologies,services list from resource
- if (hasPermission) {
- String[] xTopologies = (xResource.getTopologies() == null || xResource
- .getTopologies().equalsIgnoreCase("")) ? null : stringUtil
- .split(xResource.getTopologies(), ",");
- /*String[] xServices = (xResource.getServices() == null || xResource
- .getServices().equalsIgnoreCase("")) ? null
- : stringUtil.split(xResource.getServices(), ",");*/
-
- boolean matchFound = false;
-
- for (int index = 0; index < numberOfResources; index++) {
- matchFound = false;
- // check whether given table resource matches with any
- // existing topology resource
- if (index == 0) {
- if(xTopologies!=null){
- for (String xTopology : xTopologies) {
- if (matchPath(splittedResources[index], xTopology)) {
- matchFound = true;
- continue;
- }
- }
- }
- } // check whether given service resource matches with
- // any existing service resource
- /*else if (index == 1) {
- if(xServices!=null){
- for (String xService : xServices) {
- if (matchPath(splittedResources[index],
- xService)) {
- matchFound = true;
- continue;
- }
- }
- }
- }*/
- }
- if (matchFound) {
- policyMatched = true;
- break;
- }
- }
- }
- return policyMatched;
- }
-
- /**
- * returns path without meta characters
- *
- * @param path
- * @return
- */
- public String replaceMetaChars(String path) {
- if (path == null || path.isEmpty()) {
- return path;
- }
-
- if (path.contains("*")) {
- String replacement = getRandomString(5, 60);
- path = path.replaceAll("\\*", replacement);
- }
- if (path.contains("?")) {
- String replacement = getRandomString(1, 1);
- path = path.replaceAll("\\?", replacement);
- }
- return path;
- }
-
- /**
- * returns random String of given length range
- *
- * @param minLen
- * @param maxLen
- * @return
- */
- private String getRandomString(int minLen, int maxLen) {
- StringBuilder sb = new StringBuilder();
- int len = getRandomInt(minLen, maxLen);
- for (int i = 0; i < len; i++) {
- int charIdx = random.nextInt(PATH_CHAR_SET_LEN);
- sb.append(PATH_CHAR_SET[charIdx]);
- }
- return sb.toString();
- }
-
- /**
- * return random integer number for given range
- *
- * @param min
- * @param max
- * @return
- */
- private int getRandomInt(int min, int max) {
- if (min == max) {
- return min;
- } else {
- int interval = max - min;
- int randomNum = random.nextInt();
- return ((Math.abs(randomNum) % interval) + min);
- }
- }
-
- /**
- * returns true if given userID is having specified permission on specified
- * resource
- *
- * @param xUserId
- * @param permission
- * @param resourceId
- * @return
- */
- private boolean checkUsrPermForPolicy(Long xUserId, int permission,
- Long resourceId) {
- // this snippet load user groups and permission map list from DB
- List<XXGroup> userGroups = new ArrayList<XXGroup>();
- List<XXPermMap> permMapList = new ArrayList<XXPermMap>();
- userGroups = daoManager.getXXGroup().findByUserId(xUserId);
- permMapList = daoManager.getXXPermMap().findByResourceId(resourceId);
- Long publicGroupId = getPublicGroupId();
- boolean matchFound = false;
- for (XXPermMap permMap : permMapList) {
- if (permMap.getPermType() == permission) {
- if (permMap.getPermFor() == AppConstants.XA_PERM_FOR_GROUP) {
- // check whether permission is enabled for public group or a group to which user belongs
- matchFound = (publicGroupId != null && publicGroupId == permMap.getGroupId()) || isGroupInList(permMap.getGroupId(), userGroups);
- } else if (permMap.getPermFor() == AppConstants.XA_PERM_FOR_USER) {
- // check whether permission is enabled to user
- matchFound = permMap.getUserId().equals(xUserId);
- }
- }
- if (matchFound) {
- break;
- }
- }
- return matchFound;
- }
-
- public Long getPublicGroupId() {
- XXGroup xXGroupPublic = daoManager.getXXGroup().findByGroupName(XAConstants.GROUP_PUBLIC);
-
- return xXGroupPublic != null ? xXGroupPublic.getId() : null;
- }
-
- /**
- * returns true is given group id is in given group list
- *
- * @param groupId
- * @param xGroupList
- * @return
- */
- public boolean isGroupInList(Long groupId, List<XXGroup> xGroupList) {
- for (XXGroup xGroup : xGroupList) {
- if (xGroup.getId().equals(groupId)) {
- return true;
- }
- }
- return false;
- }
-
- /**
- * returns true if given path matches in same level or sub directories with
- * given wild card pattern
- *
- * @param pathToCheck
- * @param wildcardPath
- * @return
- */
- public boolean isRecursiveWildCardMatch(String pathToCheck,
- String wildcardPath) {
- if (pathToCheck != null) {
- if (wildcardPath != null && wildcardPath.equals(fileSeparator)) {
- return true;
- }
- StringBuilder sb = new StringBuilder();
- for (String p : pathToCheck.split(fileSeparator)) {
- sb.append(p);
- boolean matchFound = FilenameUtils.wildcardMatch(sb.toString(),
- wildcardPath);
- if (matchFound) {
- return true;
- }
- sb.append(fileSeparator);
- }
- sb = null;
- }
- return false;
- }
-
- /**
- * return List<Integer>
- *
- * List of all possible parent return type for some specific resourceType
- *
- * @param resourceType
- * , assetType
- *
- */
- public List<Integer> getResorceTypeParentHirearchy(int resourceType,
- int assetType) {
- List<Integer> resourceTypeList = new ArrayList<Integer>();
-
- if (assetType == AppConstants.ASSET_HDFS) {
- resourceTypeList.add(AppConstants.RESOURCE_PATH);
- } else if (assetType == AppConstants.ASSET_HIVE) {
- resourceTypeList.add(AppConstants.RESOURCE_DB);
- if (resourceType == AppConstants.RESOURCE_TABLE) {
- resourceTypeList.add(AppConstants.RESOURCE_TABLE);
- } else if (resourceType == AppConstants.RESOURCE_UDF) {
- resourceTypeList.add(AppConstants.RESOURCE_UDF);
- } else if (resourceType == AppConstants.RESOURCE_COLUMN) {
- resourceTypeList.add(AppConstants.RESOURCE_TABLE);
- resourceTypeList.add(AppConstants.RESOURCE_COLUMN);
- }
- } else if (assetType == AppConstants.ASSET_HBASE) {
- resourceTypeList.add(AppConstants.RESOURCE_TABLE);
- if (resourceType == AppConstants.RESOURCE_COL_FAM) {
- resourceTypeList.add(AppConstants.RESOURCE_COL_FAM);
- } else if (resourceType == AppConstants.RESOURCE_COLUMN) {
- resourceTypeList.add(AppConstants.RESOURCE_COL_FAM);
- resourceTypeList.add(AppConstants.RESOURCE_COLUMN);
- }
- }
-
- return resourceTypeList;
- }
-
- /**
- * return true if both path matches exactly, wild card matching is not
- * checked
- *
- * @param path1
- * @param path2
- * @return
- */
- public boolean comparePathsForExactMatch(String path1, String path2) {
- String pathSeparator = fileSeparator;
- if (!path1.endsWith(pathSeparator)) {
- path1 = path1.concat(pathSeparator);
- }
- if (!path2.endsWith(pathSeparator)) {
- path2 = path2.concat(pathSeparator);
- }
- return path1.equalsIgnoreCase(path2);
- }
-
- /**
- * return true if both path matches at same level path, this function does
- * not match sub directories
- *
- * @param pathToCheck
- * @param wildcardPath
- * @return
- */
- public boolean nonRecursiveWildCardMatch(String pathToCheck,
- String wildcardPath) {
- if (pathToCheck != null && wildcardPath != null) {
-
- List<String> pathToCheckArray = new ArrayList<String>();
- List<String> wildcardPathArray = new ArrayList<String>();
-
- for (String p : pathToCheck.split(fileSeparator)) {
- pathToCheckArray.add(p);
- }
- for (String w : wildcardPath.split(fileSeparator)) {
- wildcardPathArray.add(w);
- }
-
- if (pathToCheckArray.size() == wildcardPathArray.size()) {
- boolean match = false;
- for (int index = 0; index < pathToCheckArray.size(); index++) {
- match = matchPath(pathToCheckArray.get(index),
- wildcardPathArray.get(index));
- if (!match)
- return match;
- }
- return match;
- }
- }
- return false;
- }
-
- /**
- * returns true if first and second path are same
- *
- * @param pathToCheckFragment
- * @param wildCardPathFragment
- * @return
- */
- private boolean matchPath(String pathToCheckFragment,
- String wildCardPathFragment) {
- if(pathToCheckFragment == null || wildCardPathFragment == null) {
- return false;
- }
-
- if (pathToCheckFragment.contains("*")
- || pathToCheckFragment.contains("?")) {
- pathToCheckFragment = replaceMetaChars(pathToCheckFragment);
-
- if (wildCardPathFragment.contains("*")
- || wildCardPathFragment.contains("?")) {
- return FilenameUtils.wildcardMatch(pathToCheckFragment,
- wildCardPathFragment, IOCase.SENSITIVE);
- } else {
- return false;
- }
- } else {
- if (wildCardPathFragment.contains("*")
- || wildCardPathFragment.contains("?")) {
- return FilenameUtils.wildcardMatch(pathToCheckFragment,
- wildCardPathFragment, IOCase.SENSITIVE);
- } else {
- return pathToCheckFragment.trim().equals(
- wildCardPathFragment.trim());
- }
- }
- }
-
- private boolean matchPath(String pathToCheck, String[] wildCardPaths) {
- if (pathToCheck != null && wildCardPaths != null) {
- for (String wildCardPath : wildCardPaths) {
- if (matchPath(pathToCheck, wildCardPath)) {
- return true;
- }
- }
- }
-
- return false;
- }
-
- /**
- * This method returns true if first parameter value is equal to others
- * argument value passed
- *
- * @param checkValue
- * @param otherValues
- * @return
- */
- public static boolean areAllEqual(int checkValue, int... otherValues) {
- for (int value : otherValues) {
- if (value != checkValue) {
- return false;
- }
- }
- return true;
- }
-
- public void createTrxLog(List<XXTrxLog> trxLogList) {
- if (trxLogList == null) {
- return;
- }
-
- UserSessionBase usb = ContextUtil.getCurrentUserSession();
- Long authSessionId = null;
- if (usb != null) {
- authSessionId = ContextUtil.getCurrentUserSession().getSessionId();
- }
- Long trxId = GUIDUtil.genLong();
-
- for (XXTrxLog xTrxLog : trxLogList) {
- xTrxLog.setTransactionId(trxId.toString());
- if (authSessionId != null) {
- xTrxLog.setSessionId("" + authSessionId);
- }
- xTrxLog.setSessionType("Spring Authenticated Session");
- xTrxLog.setRequestId(trxId.toString());
- daoManager.getXXTrxLog().create(xTrxLog);
- }
- }
-
- public static int getDBFlavor() {
-
- String dbFlavor = "";
- boolean dbFlavorPropFound = true;
-
- dbFlavor = PropertiesUtil.getProperty("xa.db.flavor");
- if (dbFlavor == null || dbFlavor.trim().isEmpty()) {
- dbFlavor = PropertiesUtil.getProperty("jdbc.dialect");
- dbFlavorPropFound = false;
- }
-
- if (dbFlavor != null && !dbFlavor.trim().isEmpty()) {
- if (dbFlavorPropFound) {
- if ("MYSQL".equalsIgnoreCase(dbFlavor)) {
- return AppConstants.DB_FLAVOR_MYSQL;
- } else if ("ORACLE".equalsIgnoreCase(dbFlavor)) {
- return AppConstants.DB_FLAVOR_ORACLE;
- } else {
- return AppConstants.DB_FLAVOR_UNKNOWN;
- }
- } else {
- if (dbFlavor.toUpperCase().contains("MYSQL")) {
- return AppConstants.DB_FLAVOR_MYSQL;
- } else if (dbFlavor.toUpperCase().contains("ORACLE")) {
- return AppConstants.DB_FLAVOR_ORACLE;
- } else {
- return AppConstants.DB_FLAVOR_UNKNOWN;
- }
- }
- } else {
- logger.error("Property : xa.db.flavor or jdbc.dialect, not found");
- return AppConstants.DB_FLAVOR_UNKNOWN;
- }
- }
-
-}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/biz/XAuditMgrBase.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/biz/XAuditMgrBase.java b/security-admin/src/main/java/org/apache/ranger/biz/XAuditMgrBase.java
index 7031508..c1e3077 100644
--- a/security-admin/src/main/java/org/apache/ranger/biz/XAuditMgrBase.java
+++ b/security-admin/src/main/java/org/apache/ranger/biz/XAuditMgrBase.java
@@ -19,9 +19,16 @@
package org.apache.ranger.biz;
-import org.apache.ranger.common.*;
-import org.apache.ranger.service.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.MessageEnums;
+import org.apache.ranger.common.RESTErrorUtil;
+import org.apache.ranger.common.SearchCriteria;
+import org.apache.ranger.service.XAccessAuditService;
+import org.apache.ranger.service.XTrxLogService;
+import org.apache.ranger.view.VXAccessAudit;
+import org.apache.ranger.view.VXAccessAuditList;
+import org.apache.ranger.view.VXLong;
+import org.apache.ranger.view.VXTrxLog;
+import org.apache.ranger.view.VXTrxLogList;
import org.springframework.beans.factory.annotation.Autowired;
public class XAuditMgrBase {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/biz/XUserMgr.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/biz/XUserMgr.java b/security-admin/src/main/java/org/apache/ranger/biz/XUserMgr.java
index 7f0fe37..64ae9b3 100644
--- a/security-admin/src/main/java/org/apache/ranger/biz/XUserMgr.java
+++ b/security-admin/src/main/java/org/apache/ranger/biz/XUserMgr.java
@@ -26,13 +26,11 @@ import java.util.List;
import java.util.Set;
import org.apache.log4j.Logger;
-import org.apache.ranger.biz.UserMgr;
-import org.apache.ranger.biz.XABizUtil;
import org.apache.ranger.common.MessageEnums;
import org.apache.ranger.common.PropertiesUtil;
+import org.apache.ranger.common.RangerConstants;
import org.apache.ranger.common.SearchCriteria;
-import org.apache.ranger.common.XAConstants;
-import org.apache.ranger.db.XADaoManager;
+import org.apache.ranger.db.RangerDaoManager;
import org.apache.ranger.db.XXGroupUserDao;
import org.apache.ranger.entity.XXGroup;
import org.apache.ranger.entity.XXPortalUser;
@@ -54,16 +52,16 @@ public class XUserMgr extends XUserMgrBase {
@Autowired
XUserService xUserService;
@Autowired
- XABizUtil msBizUtil;
+ RangerBizUtil msBizUtil;
@Autowired
UserMgr userMgr;
@Autowired
- XADaoManager daoManager;
+ RangerDaoManager daoManager;
@Autowired
- XABizUtil xaBizUtil;
+ RangerBizUtil xaBizUtil;
static final Logger logger = Logger.getLogger(XUserMgr.class);
@@ -219,7 +217,7 @@ public class XUserMgr extends XUserMgrBase {
roleList=userMgr.getRolesForUser(xXPortalUser);
}
if(roleList==null || roleList.size()==0){
- roleList.add(XAConstants.ROLE_USER);
+ roleList.add(RangerConstants.ROLE_USER);
}
// TODO I've to get the transaction log from here.
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/biz/XUserMgrBase.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/biz/XUserMgrBase.java b/security-admin/src/main/java/org/apache/ranger/biz/XUserMgrBase.java
index 2a413d2..b20ce31 100644
--- a/security-admin/src/main/java/org/apache/ranger/biz/XUserMgrBase.java
+++ b/security-admin/src/main/java/org/apache/ranger/biz/XUserMgrBase.java
@@ -19,9 +19,28 @@
package org.apache.ranger.biz;
-import org.apache.ranger.common.*;
-import org.apache.ranger.service.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.MessageEnums;
+import org.apache.ranger.common.RESTErrorUtil;
+import org.apache.ranger.common.SearchCriteria;
+import org.apache.ranger.service.XAuditMapService;
+import org.apache.ranger.service.XGroupGroupService;
+import org.apache.ranger.service.XGroupService;
+import org.apache.ranger.service.XGroupUserService;
+import org.apache.ranger.service.XPermMapService;
+import org.apache.ranger.service.XUserService;
+import org.apache.ranger.view.VXAuditMap;
+import org.apache.ranger.view.VXAuditMapList;
+import org.apache.ranger.view.VXGroup;
+import org.apache.ranger.view.VXGroupGroup;
+import org.apache.ranger.view.VXGroupGroupList;
+import org.apache.ranger.view.VXGroupList;
+import org.apache.ranger.view.VXGroupUser;
+import org.apache.ranger.view.VXGroupUserList;
+import org.apache.ranger.view.VXLong;
+import org.apache.ranger.view.VXPermMap;
+import org.apache.ranger.view.VXPermMapList;
+import org.apache.ranger.view.VXUser;
+import org.apache.ranger.view.VXUserList;
import org.springframework.beans.factory.annotation.Autowired;
public class XUserMgrBase {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/AppConstants.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/AppConstants.java b/security-admin/src/main/java/org/apache/ranger/common/AppConstants.java
index ac47ef0..c5bfedf 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/AppConstants.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/AppConstants.java
@@ -19,11 +19,8 @@
package org.apache.ranger.common;
-import java.util.*;
-import org.apache.ranger.common.*;
-
-public class AppConstants extends XACommonEnums {
+public class AppConstants extends RangerCommonEnums {
/***************************************************************
* Enum values for AssetType
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/ContextUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/ContextUtil.java b/security-admin/src/main/java/org/apache/ranger/common/ContextUtil.java
index 026e253..eb1d573 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/ContextUtil.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/ContextUtil.java
@@ -19,8 +19,8 @@
package org.apache.ranger.common;
-import org.apache.ranger.security.context.XAContextHolder;
-import org.apache.ranger.security.context.XASecurityContext;
+import org.apache.ranger.security.context.RangerContextHolder;
+import org.apache.ranger.security.context.RangerSecurityContext;
public class ContextUtil {
@@ -31,7 +31,7 @@ public class ContextUtil {
}
public static Long getCurrentUserId() {
- XASecurityContext context = XAContextHolder.getSecurityContext();
+ RangerSecurityContext context = RangerContextHolder.getSecurityContext();
if (context != null) {
UserSessionBase userSession = context.getUserSession();
if (userSession != null) {
@@ -42,7 +42,7 @@ public class ContextUtil {
}
public static String getCurrentUserPublicName() {
- XASecurityContext context = XAContextHolder.getSecurityContext();
+ RangerSecurityContext context = RangerContextHolder.getSecurityContext();
if (context != null) {
UserSessionBase userSession = context.getUserSession();
if (userSession != null) {
@@ -55,7 +55,7 @@ public class ContextUtil {
public static UserSessionBase getCurrentUserSession() {
UserSessionBase userSession = null;
- XASecurityContext context = XAContextHolder.getSecurityContext();
+ RangerSecurityContext context = RangerContextHolder.getSecurityContext();
if (context != null) {
userSession = context.getUserSession();
}
@@ -63,7 +63,7 @@ public class ContextUtil {
}
public static RequestContext getCurrentRequestContext() {
- XASecurityContext context = XAContextHolder.getSecurityContext();
+ RangerSecurityContext context = RangerContextHolder.getSecurityContext();
if (context != null) {
return context.getRequestContext();
}
@@ -71,7 +71,7 @@ public class ContextUtil {
}
public static String getCurrentUserLoginId() {
- XASecurityContext context = XAContextHolder.getSecurityContext();
+ RangerSecurityContext context = RangerContextHolder.getSecurityContext();
if (context != null) {
UserSessionBase userSession = context.getUserSession();
if (userSession != null) {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/DateUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/DateUtil.java b/security-admin/src/main/java/org/apache/ranger/common/DateUtil.java
index a553978..b710020 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/DateUtil.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/DateUtil.java
@@ -26,6 +26,7 @@ import java.util.Calendar;
import java.util.Date;
import java.util.GregorianCalendar;
import java.util.TimeZone;
+
import org.springframework.stereotype.Component;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/HTTPUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/HTTPUtil.java b/security-admin/src/main/java/org/apache/ranger/common/HTTPUtil.java
index 29b1395..6eba2e6 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/HTTPUtil.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/HTTPUtil.java
@@ -22,8 +22,6 @@
*/
package org.apache.ranger.common;
-import java.util.Map;
-
import javax.servlet.http.HttpServletRequest;
import org.springframework.stereotype.Component;
@@ -45,19 +43,19 @@ public class HTTPUtil {
public int getDeviceType(String userAgent) {
if (userAgent == null) {
- return XACommonEnums.DEVICE_UNKNOWN;
+ return RangerCommonEnums.DEVICE_UNKNOWN;
}
if (userAgent.contains(IPHONE)) {
- return XACommonEnums.DEVICE_IPHONE;
+ return RangerCommonEnums.DEVICE_IPHONE;
} else if (userAgent.contains(IPAD)) {
- return XACommonEnums.DEVICE_IPAD;
+ return RangerCommonEnums.DEVICE_IPAD;
} else if (userAgent.contains(IPOD)) {
- return XACommonEnums.DEVICE_IPOD;
+ return RangerCommonEnums.DEVICE_IPOD;
} else if (userAgent.contains(ANDROID)) {
- return XACommonEnums.DEVICE_ANDROID;
+ return RangerCommonEnums.DEVICE_ANDROID;
} else {
- return XACommonEnums.DEVICE_BROWSER;
+ return RangerCommonEnums.DEVICE_BROWSER;
}
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/PropertiesUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/PropertiesUtil.java b/security-admin/src/main/java/org/apache/ranger/common/PropertiesUtil.java
index eeacd11..2901b0f 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/PropertiesUtil.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/PropertiesUtil.java
@@ -22,16 +22,16 @@
*/
package org.apache.ranger.common;
-import java.util.HashMap;
-import java.util.Map;
-import java.util.Properties;
-import java.util.Set;
+import java.util.HashMap;
+import java.util.Map;
+import java.util.Properties;
+import java.util.Set;
-import org.apache.log4j.Logger;
+import org.apache.log4j.Logger;
import org.apache.ranger.credentialapi.CredentialReader;
-import org.springframework.beans.BeansException;
-import org.springframework.beans.factory.config.ConfigurableListableBeanFactory;
-import org.springframework.beans.factory.config.PropertyPlaceholderConfigurer;
+import org.springframework.beans.BeansException;
+import org.springframework.beans.factory.config.ConfigurableListableBeanFactory;
+import org.springframework.beans.factory.config.PropertyPlaceholderConfigurer;
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/RESTErrorUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/RESTErrorUtil.java b/security-admin/src/main/java/org/apache/ranger/common/RESTErrorUtil.java
index 9d05ca0..8d7d96d 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/RESTErrorUtil.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/RESTErrorUtil.java
@@ -20,7 +20,6 @@
package org.apache.ranger.common;
import java.text.DateFormat;
-import java.text.ParseException;
import java.text.SimpleDateFormat;
import java.util.ArrayList;
import java.util.Date;
[08/12] incubator-ranger git commit: RANGER-194: Rename classes under
web-admin project
Posted by ma...@apache.org.
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/XACommonEnums.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/XACommonEnums.java b/security-admin/src/main/java/org/apache/ranger/common/XACommonEnums.java
deleted file mode 100644
index bc5d809..0000000
--- a/security-admin/src/main/java/org/apache/ranger/common/XACommonEnums.java
+++ /dev/null
@@ -1,1444 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing,
- * software distributed under the License is distributed on an
- * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
- * KIND, either express or implied. See the License for the
- * specific language governing permissions and limitations
- * under the License.
- */
-
- package org.apache.ranger.common;
-
-/**
- *
- */
-
-import java.util.*;
-
-import org.apache.ranger.common.*;
-
-public class XACommonEnums {
-
- /***************************************************************
- * Enum values for ActiveStatus
- **************************************************************/
- /**
- * STATUS_DISABLED is an element of enum ActiveStatus. Its value is "STATUS_DISABLED".
- */
- public static final int STATUS_DISABLED = 0;
- /**
- * STATUS_ENABLED is an element of enum ActiveStatus. Its value is "STATUS_ENABLED".
- */
- public static final int STATUS_ENABLED = 1;
- /**
- * STATUS_DELETED is an element of enum ActiveStatus. Its value is "STATUS_DELETED".
- */
- public static final int STATUS_DELETED = 2;
-
- /**
- * Max value for enum ActiveStatus_MAX
- */
- public static final int ActiveStatus_MAX = 2;
-
-
- /***************************************************************
- * Enum values for ActivationStatus
- **************************************************************/
- /**
- * ACT_STATUS_DISABLED is an element of enum ActivationStatus. Its value is "ACT_STATUS_DISABLED".
- */
- public static final int ACT_STATUS_DISABLED = 0;
- /**
- * ACT_STATUS_ACTIVE is an element of enum ActivationStatus. Its value is "ACT_STATUS_ACTIVE".
- */
- public static final int ACT_STATUS_ACTIVE = 1;
- /**
- * ACT_STATUS_PENDING_APPROVAL is an element of enum ActivationStatus. Its value is "ACT_STATUS_PENDING_APPROVAL".
- */
- public static final int ACT_STATUS_PENDING_APPROVAL = 2;
- /**
- * ACT_STATUS_PENDING_ACTIVATION is an element of enum ActivationStatus. Its value is "ACT_STATUS_PENDING_ACTIVATION".
- */
- public static final int ACT_STATUS_PENDING_ACTIVATION = 3;
- /**
- * ACT_STATUS_REJECTED is an element of enum ActivationStatus. Its value is "ACT_STATUS_REJECTED".
- */
- public static final int ACT_STATUS_REJECTED = 4;
- /**
- * ACT_STATUS_DEACTIVATED is an element of enum ActivationStatus. Its value is "ACT_STATUS_DEACTIVATED".
- */
- public static final int ACT_STATUS_DEACTIVATED = 5;
- /**
- * ACT_STATUS_PRE_REGISTRATION is an element of enum ActivationStatus. Its value is "ACT_STATUS_PRE_REGISTRATION".
- */
- public static final int ACT_STATUS_PRE_REGISTRATION = 6;
- /**
- * ACT_STATUS_NO_LOGIN is an element of enum ActivationStatus. Its value is "ACT_STATUS_NO_LOGIN".
- */
- public static final int ACT_STATUS_NO_LOGIN = 7;
-
- /**
- * Max value for enum ActivationStatus_MAX
- */
- public static final int ActivationStatus_MAX = 7;
-
-
- /***************************************************************
- * Enum values for BooleanValue
- **************************************************************/
- /**
- * BOOL_NONE is an element of enum BooleanValue. Its value is "BOOL_NONE".
- */
- public static final int BOOL_NONE = 0;
- /**
- * BOOL_TRUE is an element of enum BooleanValue. Its value is "BOOL_TRUE".
- */
- public static final int BOOL_TRUE = 1;
- /**
- * BOOL_FALSE is an element of enum BooleanValue. Its value is "BOOL_FALSE".
- */
- public static final int BOOL_FALSE = 2;
-
- /**
- * Max value for enum BooleanValue_MAX
- */
- public static final int BooleanValue_MAX = 2;
-
-
- /***************************************************************
- * Enum values for DataType
- **************************************************************/
- /**
- * DATA_TYPE_UNKNOWN is an element of enum DataType. Its value is "DATA_TYPE_UNKNOWN".
- */
- public static final int DATA_TYPE_UNKNOWN = 0;
- /**
- * DATA_TYPE_INTEGER is an element of enum DataType. Its value is "DATA_TYPE_INTEGER".
- */
- public static final int DATA_TYPE_INTEGER = 1;
- /**
- * DATA_TYPE_DOUBLE is an element of enum DataType. Its value is "DATA_TYPE_DOUBLE".
- */
- public static final int DATA_TYPE_DOUBLE = 2;
- /**
- * DATA_TYPE_STRING is an element of enum DataType. Its value is "DATA_TYPE_STRING".
- */
- public static final int DATA_TYPE_STRING = 3;
- /**
- * DATA_TYPE_BOOLEAN is an element of enum DataType. Its value is "DATA_TYPE_BOOLEAN".
- */
- public static final int DATA_TYPE_BOOLEAN = 4;
- /**
- * DATA_TYPE_DATE is an element of enum DataType. Its value is "DATA_TYPE_DATE".
- */
- public static final int DATA_TYPE_DATE = 5;
- /**
- * DATA_TYPE_STRING_ENUM is an element of enum DataType. Its value is "DATA_TYPE_STRING_ENUM".
- */
- public static final int DATA_TYPE_STRING_ENUM = 6;
- /**
- * DATA_TYPE_LONG is an element of enum DataType. Its value is "DATA_TYPE_LONG".
- */
- public static final int DATA_TYPE_LONG = 7;
- /**
- * DATA_TYPE_INTEGER_ENUM is an element of enum DataType. Its value is "DATA_TYPE_INTEGER_ENUM".
- */
- public static final int DATA_TYPE_INTEGER_ENUM = 8;
-
- /**
- * Max value for enum DataType_MAX
- */
- public static final int DataType_MAX = 8;
-
-
- /***************************************************************
- * Enum values for DeviceType
- **************************************************************/
- /**
- * DEVICE_UNKNOWN is an element of enum DeviceType. Its value is "DEVICE_UNKNOWN".
- */
- public static final int DEVICE_UNKNOWN = 0;
- /**
- * DEVICE_BROWSER is an element of enum DeviceType. Its value is "DEVICE_BROWSER".
- */
- public static final int DEVICE_BROWSER = 1;
- /**
- * DEVICE_IPHONE is an element of enum DeviceType. Its value is "DEVICE_IPHONE".
- */
- public static final int DEVICE_IPHONE = 2;
- /**
- * DEVICE_IPAD is an element of enum DeviceType. Its value is "DEVICE_IPAD".
- */
- public static final int DEVICE_IPAD = 3;
- /**
- * DEVICE_IPOD is an element of enum DeviceType. Its value is "DEVICE_IPOD".
- */
- public static final int DEVICE_IPOD = 4;
- /**
- * DEVICE_ANDROID is an element of enum DeviceType. Its value is "DEVICE_ANDROID".
- */
- public static final int DEVICE_ANDROID = 5;
-
- /**
- * Max value for enum DeviceType_MAX
- */
- public static final int DeviceType_MAX = 5;
-
-
- /***************************************************************
- * Enum values for DiffLevel
- **************************************************************/
- /**
- * DIFF_UNKNOWN is an element of enum DiffLevel. Its value is "DIFF_UNKNOWN".
- */
- public static final int DIFF_UNKNOWN = 0;
- /**
- * DIFF_LOW is an element of enum DiffLevel. Its value is "DIFF_LOW".
- */
- public static final int DIFF_LOW = 1;
- /**
- * DIFF_MEDIUM is an element of enum DiffLevel. Its value is "DIFF_MEDIUM".
- */
- public static final int DIFF_MEDIUM = 2;
- /**
- * DIFF_HIGH is an element of enum DiffLevel. Its value is "DIFF_HIGH".
- */
- public static final int DIFF_HIGH = 3;
-
- /**
- * Max value for enum DiffLevel_MAX
- */
- public static final int DiffLevel_MAX = 3;
-
-
- /***************************************************************
- * Enum values for FileType
- **************************************************************/
- /**
- * FILE_FILE is an element of enum FileType. Its value is "FILE_FILE".
- */
- public static final int FILE_FILE = 0;
- /**
- * FILE_DIR is an element of enum FileType. Its value is "FILE_DIR".
- */
- public static final int FILE_DIR = 1;
-
- /**
- * Max value for enum FileType_MAX
- */
- public static final int FileType_MAX = 1;
-
-
- /***************************************************************
- * Enum values for FreqType
- **************************************************************/
- /**
- * FREQ_NONE is an element of enum FreqType. Its value is "FREQ_NONE".
- */
- public static final int FREQ_NONE = 0;
- /**
- * FREQ_MANUAL is an element of enum FreqType. Its value is "FREQ_MANUAL".
- */
- public static final int FREQ_MANUAL = 1;
- /**
- * FREQ_HOURLY is an element of enum FreqType. Its value is "FREQ_HOURLY".
- */
- public static final int FREQ_HOURLY = 2;
- /**
- * FREQ_DAILY is an element of enum FreqType. Its value is "FREQ_DAILY".
- */
- public static final int FREQ_DAILY = 3;
- /**
- * FREQ_WEEKLY is an element of enum FreqType. Its value is "FREQ_WEEKLY".
- */
- public static final int FREQ_WEEKLY = 4;
- /**
- * FREQ_BI_WEEKLY is an element of enum FreqType. Its value is "FREQ_BI_WEEKLY".
- */
- public static final int FREQ_BI_WEEKLY = 5;
- /**
- * FREQ_MONTHLY is an element of enum FreqType. Its value is "FREQ_MONTHLY".
- */
- public static final int FREQ_MONTHLY = 6;
-
- /**
- * Max value for enum FreqType_MAX
- */
- public static final int FreqType_MAX = 6;
-
-
- /***************************************************************
- * Enum values for MimeType
- **************************************************************/
- /**
- * MIME_UNKNOWN is an element of enum MimeType. Its value is "MIME_UNKNOWN".
- */
- public static final int MIME_UNKNOWN = 0;
- /**
- * MIME_TEXT is an element of enum MimeType. Its value is "MIME_TEXT".
- */
- public static final int MIME_TEXT = 1;
- /**
- * MIME_HTML is an element of enum MimeType. Its value is "MIME_HTML".
- */
- public static final int MIME_HTML = 2;
- /**
- * MIME_PNG is an element of enum MimeType. Its value is "MIME_PNG".
- */
- public static final int MIME_PNG = 3;
- /**
- * MIME_JPEG is an element of enum MimeType. Its value is "MIME_JPEG".
- */
- public static final int MIME_JPEG = 4;
-
- /**
- * Max value for enum MimeType_MAX
- */
- public static final int MimeType_MAX = 4;
-
-
- /***************************************************************
- * Enum values for NumberFormat
- **************************************************************/
- /**
- * NUM_FORMAT_NONE is an element of enum NumberFormat. Its value is "NUM_FORMAT_NONE".
- */
- public static final int NUM_FORMAT_NONE = 0;
- /**
- * NUM_FORMAT_NUMERIC is an element of enum NumberFormat. Its value is "NUM_FORMAT_NUMERIC".
- */
- public static final int NUM_FORMAT_NUMERIC = 1;
- /**
- * NUM_FORMAT_ALPHA is an element of enum NumberFormat. Its value is "NUM_FORMAT_ALPHA".
- */
- public static final int NUM_FORMAT_ALPHA = 2;
- /**
- * NUM_FORMAT_ROMAN is an element of enum NumberFormat. Its value is "NUM_FORMAT_ROMAN".
- */
- public static final int NUM_FORMAT_ROMAN = 3;
-
- /**
- * Max value for enum NumberFormat_MAX
- */
- public static final int NumberFormat_MAX = 3;
-
-
- /***************************************************************
- * Enum values for ObjectStatus
- **************************************************************/
- /**
- * OBJ_STATUS_ACTIVE is an element of enum ObjectStatus. Its value is "OBJ_STATUS_ACTIVE".
- */
- public static final int OBJ_STATUS_ACTIVE = 0;
- /**
- * OBJ_STATUS_DELETED is an element of enum ObjectStatus. Its value is "OBJ_STATUS_DELETED".
- */
- public static final int OBJ_STATUS_DELETED = 1;
- /**
- * OBJ_STATUS_ARCHIVED is an element of enum ObjectStatus. Its value is "OBJ_STATUS_ARCHIVED".
- */
- public static final int OBJ_STATUS_ARCHIVED = 2;
-
- /**
- * Max value for enum ObjectStatus_MAX
- */
- public static final int ObjectStatus_MAX = 2;
-
-
- /***************************************************************
- * Enum values for PasswordResetStatus
- **************************************************************/
- /**
- * PWD_RESET_ACTIVE is an element of enum PasswordResetStatus. Its value is "PWD_RESET_ACTIVE".
- */
- public static final int PWD_RESET_ACTIVE = 0;
- /**
- * PWD_RESET_USED is an element of enum PasswordResetStatus. Its value is "PWD_RESET_USED".
- */
- public static final int PWD_RESET_USED = 1;
- /**
- * PWD_RESET_EXPIRED is an element of enum PasswordResetStatus. Its value is "PWD_RESET_EXPIRED".
- */
- public static final int PWD_RESET_EXPIRED = 2;
- /**
- * PWD_RESET_DISABLED is an element of enum PasswordResetStatus. Its value is "PWD_RESET_DISABLED".
- */
- public static final int PWD_RESET_DISABLED = 3;
-
- /**
- * Max value for enum PasswordResetStatus_MAX
- */
- public static final int PasswordResetStatus_MAX = 3;
-
-
- /***************************************************************
- * Enum values for PriorityType
- **************************************************************/
- /**
- * PRIORITY_NORMAL is an element of enum PriorityType. Its value is "PRIORITY_NORMAL".
- */
- public static final int PRIORITY_NORMAL = 0;
- /**
- * PRIORITY_LOW is an element of enum PriorityType. Its value is "PRIORITY_LOW".
- */
- public static final int PRIORITY_LOW = 1;
- /**
- * PRIORITY_MEDIUM is an element of enum PriorityType. Its value is "PRIORITY_MEDIUM".
- */
- public static final int PRIORITY_MEDIUM = 2;
- /**
- * PRIORITY_HIGH is an element of enum PriorityType. Its value is "PRIORITY_HIGH".
- */
- public static final int PRIORITY_HIGH = 3;
-
- /**
- * Max value for enum PriorityType_MAX
- */
- public static final int PriorityType_MAX = 3;
-
-
- /***************************************************************
- * Enum values for ProgressStatus
- **************************************************************/
- /**
- * PROGRESS_PENDING is an element of enum ProgressStatus. Its value is "PROGRESS_PENDING".
- */
- public static final int PROGRESS_PENDING = 0;
- /**
- * PROGRESS_IN_PROGRESS is an element of enum ProgressStatus. Its value is "PROGRESS_IN_PROGRESS".
- */
- public static final int PROGRESS_IN_PROGRESS = 1;
- /**
- * PROGRESS_COMPLETE is an element of enum ProgressStatus. Its value is "PROGRESS_COMPLETE".
- */
- public static final int PROGRESS_COMPLETE = 2;
- /**
- * PROGRESS_ABORTED is an element of enum ProgressStatus. Its value is "PROGRESS_ABORTED".
- */
- public static final int PROGRESS_ABORTED = 3;
- /**
- * PROGRESS_FAILED is an element of enum ProgressStatus. Its value is "PROGRESS_FAILED".
- */
- public static final int PROGRESS_FAILED = 4;
-
- /**
- * Max value for enum ProgressStatus_MAX
- */
- public static final int ProgressStatus_MAX = 4;
-
-
- /***************************************************************
- * Enum values for RelationType
- **************************************************************/
- /**
- * REL_NONE is an element of enum RelationType. Its value is "REL_NONE".
- */
- public static final int REL_NONE = 0;
- /**
- * REL_SELF is an element of enum RelationType. Its value is "REL_SELF".
- */
- public static final int REL_SELF = 1;
-
- /**
- * Max value for enum RelationType_MAX
- */
- public static final int RelationType_MAX = 1;
-
-
- /***************************************************************
- * Enum values for UserSource
- **************************************************************/
- /**
- * USER_APP is an element of enum UserSource. Its value is "USER_APP".
- */
- public static final int USER_APP = 0;
- public static final int USER_EXTERNAL = 1;
- public static final int USER_AD= 2;
- public static final int USER_LDAP = 3;
- public static final int USER_UNIX = 4;
- public static final int USER_REPO = 5;
-
- public static final int GROUP_INTERNAL = 0;
- public static final int GROUP_EXTERNAL = 1;
- public static final int GROUP_AD= 2;
- public static final int GROUP_LDAP = 3;
- public static final int GROUP_UNIX = 4;
- public static final int GROUP_REPO = 5;
- /**
- * USER_GOOGLE is an element of enum UserSource. Its value is "USER_GOOGLE".
- */
- //public static final int USER_GOOGLE = 1;
- /**
- * USER_FB is an element of enum UserSource. Its value is "USER_FB".
- */
- //public static final int USER_FB = 2;
-
- /**
- * Max value for enum UserSource_MAX
- */
- public static final int UserSource_MAX = 5;
-
-
- /***************************************************************
- * Enum values for AssetType
- **************************************************************/
- /**
- * ASSET_UNKNOWN is an element of enum AssetType. Its value is "ASSET_UNKNOWN".
- */
- public static final int ASSET_UNKNOWN = 0;
- /**
- * ASSET_HDFS is an element of enum AssetType. Its value is "ASSET_HDFS".
- */
- public static final int ASSET_HDFS = 1;
- /**
- * ASSET_HBASE is an element of enum AssetType. Its value is "ASSET_HBASE".
- */
- public static final int ASSET_HBASE = 2;
- /**
- * ASSET_HIVE is an element of enum AssetType. Its value is "ASSET_HIVE".
- */
- public static final int ASSET_HIVE = 3;
- /**
- * ASSET_HIVE is an element of enum AssetType. Its value is "ASSET_HIVE".
- */
- public static final int ASSET_AGENT = 4;
- /**
- * ASSET_HIVE is an element of enum AssetType. Its value is "ASSET_HIVE".
- */
- public static final int ASSET_KNOX = 5;
- /**
- * ASSET_HIVE is an element of enum AssetType. Its value is "ASSET_HIVE".
- */
- public static final int ASSET_STORM = 6;
-
- /**
- * Max value for enum AssetType_MAX
- */
- public static final int AssetType_MAX = 6;
-
-
- /***************************************************************
- * Enum values for AccessResult
- **************************************************************/
- /**
- * ACCESS_RESULT_DENIED is an element of enum AccessResult. Its value is "ACCESS_RESULT_DENIED".
- */
- public static final int ACCESS_RESULT_DENIED = 0;
- /**
- * ACCESS_RESULT_ALLOWED is an element of enum AccessResult. Its value is "ACCESS_RESULT_ALLOWED".
- */
- public static final int ACCESS_RESULT_ALLOWED = 1;
-
- /**
- * Max value for enum AccessResult_MAX
- */
- public static final int AccessResult_MAX = 1;
-
-
- /***************************************************************
- * Enum values for PolicyType
- **************************************************************/
- /**
- * POLICY_INCLUSION is an element of enum PolicyType. Its value is "POLICY_INCLUSION".
- */
- public static final int POLICY_INCLUSION = 0;
- /**
- * POLICY_EXCLUSION is an element of enum PolicyType. Its value is "POLICY_EXCLUSION".
- */
- public static final int POLICY_EXCLUSION = 1;
-
- /**
- * Max value for enum PolicyType_MAX
- */
- public static final int PolicyType_MAX = 1;
-
-
- /***************************************************************
- * Enum values for XAAuditType
- **************************************************************/
- /**
- * XA_AUDIT_TYPE_UNKNOWN is an element of enum XAAuditType. Its value is "XA_AUDIT_TYPE_UNKNOWN".
- */
- public static final int XA_AUDIT_TYPE_UNKNOWN = 0;
- /**
- * XA_AUDIT_TYPE_ALL is an element of enum XAAuditType. Its value is "XA_AUDIT_TYPE_ALL".
- */
- public static final int XA_AUDIT_TYPE_ALL = 1;
- /**
- * XA_AUDIT_TYPE_READ is an element of enum XAAuditType. Its value is "XA_AUDIT_TYPE_READ".
- */
- public static final int XA_AUDIT_TYPE_READ = 2;
- /**
- * XA_AUDIT_TYPE_WRITE is an element of enum XAAuditType. Its value is "XA_AUDIT_TYPE_WRITE".
- */
- public static final int XA_AUDIT_TYPE_WRITE = 3;
- /**
- * XA_AUDIT_TYPE_CREATE is an element of enum XAAuditType. Its value is "XA_AUDIT_TYPE_CREATE".
- */
- public static final int XA_AUDIT_TYPE_CREATE = 4;
- /**
- * XA_AUDIT_TYPE_DELETE is an element of enum XAAuditType. Its value is "XA_AUDIT_TYPE_DELETE".
- */
- public static final int XA_AUDIT_TYPE_DELETE = 5;
- /**
- * XA_AUDIT_TYPE_LOGIN is an element of enum XAAuditType. Its value is "XA_AUDIT_TYPE_LOGIN".
- */
- public static final int XA_AUDIT_TYPE_LOGIN = 6;
-
- /**
- * Max value for enum XAAuditType_MAX
- */
- public static final int XAAuditType_MAX = 6;
-
-
- /***************************************************************
- * Enum values for ResourceType
- **************************************************************/
- /**
- * RESOURCE_UNKNOWN is an element of enum ResourceType. Its value is "RESOURCE_UNKNOWN".
- */
- public static final int RESOURCE_UNKNOWN = 0;
- /**
- * RESOURCE_PATH is an element of enum ResourceType. Its value is "RESOURCE_PATH".
- */
- public static final int RESOURCE_PATH = 1;
- /**
- * RESOURCE_DB is an element of enum ResourceType. Its value is "RESOURCE_DB".
- */
- public static final int RESOURCE_DB = 2;
- /**
- * RESOURCE_TABLE is an element of enum ResourceType. Its value is "RESOURCE_TABLE".
- */
- public static final int RESOURCE_TABLE = 3;
- /**
- * RESOURCE_COL_FAM is an element of enum ResourceType. Its value is "RESOURCE_COL_FAM".
- */
- public static final int RESOURCE_COL_FAM = 4;
- /**
- * RESOURCE_COLUMN is an element of enum ResourceType. Its value is "RESOURCE_COLUMN".
- */
- public static final int RESOURCE_COLUMN = 5;
- /**
- * RESOURCE_VIEW is an element of enum ResourceType. Its value is "RESOURCE_VIEW".
- */
- public static final int RESOURCE_VIEW = 6;
- /**
- * RESOURCE_UDF is an element of enum ResourceType. Its value is "RESOURCE_UDF".
- */
- public static final int RESOURCE_UDF = 7;
- /**
- * RESOURCE_VIEW_COL is an element of enum ResourceType. Its value is "RESOURCE_VIEW_COL".
- */
- public static final int RESOURCE_VIEW_COL = 8;
-
- /**
- * Max value for enum ResourceType_MAX
- */
- public static final int ResourceType_MAX = 8;
-
-
- /***************************************************************
- * Enum values for XAGroupType
- **************************************************************/
- /**
- * XA_GROUP_UNKNOWN is an element of enum XAGroupType. Its value is "XA_GROUP_UNKNOWN".
- */
- public static final int XA_GROUP_UNKNOWN = 0;
- /**
- * XA_GROUP_USER is an element of enum XAGroupType. Its value is "XA_GROUP_USER".
- */
- public static final int XA_GROUP_USER = 1;
- /**
- * XA_GROUP_GROUP is an element of enum XAGroupType. Its value is "XA_GROUP_GROUP".
- */
- public static final int XA_GROUP_GROUP = 2;
- /**
- * XA_GROUP_ROLE is an element of enum XAGroupType. Its value is "XA_GROUP_ROLE".
- */
- public static final int XA_GROUP_ROLE = 3;
-
- /**
- * Max value for enum XAGroupType_MAX
- */
- public static final int XAGroupType_MAX = 3;
-
-
- /***************************************************************
- * Enum values for XAPermForType
- **************************************************************/
- /**
- * XA_PERM_FOR_UNKNOWN is an element of enum XAPermForType. Its value is "XA_PERM_FOR_UNKNOWN".
- */
- public static final int XA_PERM_FOR_UNKNOWN = 0;
- /**
- * XA_PERM_FOR_USER is an element of enum XAPermForType. Its value is "XA_PERM_FOR_USER".
- */
- public static final int XA_PERM_FOR_USER = 1;
- /**
- * XA_PERM_FOR_GROUP is an element of enum XAPermForType. Its value is "XA_PERM_FOR_GROUP".
- */
- public static final int XA_PERM_FOR_GROUP = 2;
-
- /**
- * Max value for enum XAPermForType_MAX
- */
- public static final int XAPermForType_MAX = 2;
-
-
- /***************************************************************
- * Enum values for XAPermType
- **************************************************************/
- /**
- * XA_PERM_TYPE_UNKNOWN is an element of enum XAPermType. Its value is "XA_PERM_TYPE_UNKNOWN".
- */
- public static final int XA_PERM_TYPE_UNKNOWN = 0;
- /**
- * XA_PERM_TYPE_RESET is an element of enum XAPermType. Its value is "XA_PERM_TYPE_RESET".
- */
- public static final int XA_PERM_TYPE_RESET = 1;
- /**
- * XA_PERM_TYPE_READ is an element of enum XAPermType. Its value is "XA_PERM_TYPE_READ".
- */
- public static final int XA_PERM_TYPE_READ = 2;
- /**
- * XA_PERM_TYPE_WRITE is an element of enum XAPermType. Its value is "XA_PERM_TYPE_WRITE".
- */
- public static final int XA_PERM_TYPE_WRITE = 3;
- /**
- * XA_PERM_TYPE_CREATE is an element of enum XAPermType. Its value is "XA_PERM_TYPE_CREATE".
- */
- public static final int XA_PERM_TYPE_CREATE = 4;
- /**
- * XA_PERM_TYPE_DELETE is an element of enum XAPermType. Its value is "XA_PERM_TYPE_DELETE".
- */
- public static final int XA_PERM_TYPE_DELETE = 5;
- /**
- * XA_PERM_TYPE_ADMIN is an element of enum XAPermType. Its value is "XA_PERM_TYPE_ADMIN".
- */
- public static final int XA_PERM_TYPE_ADMIN = 6;
- /**
- * XA_PERM_TYPE_OBFUSCATE is an element of enum XAPermType. Its value is "XA_PERM_TYPE_OBFUSCATE".
- */
- public static final int XA_PERM_TYPE_OBFUSCATE = 7;
- /**
- * XA_PERM_TYPE_MASK is an element of enum XAPermType. Its value is "XA_PERM_TYPE_MASK".
- */
- public static final int XA_PERM_TYPE_MASK = 8;
- /**
- * XA_PERM_TYPE_EXECUTE is an element of enum XAPermType. Its value is "XA_PERM_TYPE_EXECUTE".
- */
- public static final int XA_PERM_TYPE_EXECUTE = 9;
- /**
- * XA_PERM_TYPE_SELECT is an element of enum XAPermType. Its value is "XA_PERM_TYPE_SELECT".
- */
- public static final int XA_PERM_TYPE_SELECT = 10;
- /**
- * XA_PERM_TYPE_UPDATE is an element of enum XAPermType. Its value is "XA_PERM_TYPE_UPDATE".
- */
- public static final int XA_PERM_TYPE_UPDATE = 11;
- /**
- * XA_PERM_TYPE_DROP is an element of enum XAPermType. Its value is "XA_PERM_TYPE_DROP".
- */
- public static final int XA_PERM_TYPE_DROP = 12;
- /**
- * XA_PERM_TYPE_ALTER is an element of enum XAPermType. Its value is "XA_PERM_TYPE_ALTER".
- */
- public static final int XA_PERM_TYPE_ALTER = 13;
- /**
- * XA_PERM_TYPE_INDEX is an element of enum XAPermType. Its value is "XA_PERM_TYPE_INDEX".
- */
- public static final int XA_PERM_TYPE_INDEX = 14;
- /**
- * XA_PERM_TYPE_LOCK is an element of enum XAPermType. Its value is "XA_PERM_TYPE_LOCK".
- */
- public static final int XA_PERM_TYPE_LOCK = 15;
- /**
- * XA_PERM_TYPE_ALL is an element of enum XAPermType. Its value is "XA_PERM_TYPE_ALL".
- */
- public static final int XA_PERM_TYPE_ALL = 16;
-
- /**
- * XA_PERM_TYPE_ALL is an element of enum XAPermType. Its value is "XA_PERM_TYPE_ALLOW".
- */
- public static final int XA_PERM_TYPE_ALLOW = 17;
-
- /**
- * Max value for enum XAPermType_MAX
- */
- public static final int XAPermType_MAX = 17;
-
-
- /***************************************************************
- * Enum values for ClassTypes
- **************************************************************/
- /**
- * CLASS_TYPE_NONE is an element of enum ClassTypes. Its value is "CLASS_TYPE_NONE".
- */
- public static final int CLASS_TYPE_NONE = 0;
- /**
- * CLASS_TYPE_MESSAGE is an element of enum ClassTypes. Its value is "CLASS_TYPE_MESSAGE".
- */
- public static final int CLASS_TYPE_MESSAGE = 1;
- /**
- * CLASS_TYPE_USER_PROFILE is an element of enum ClassTypes. Its value is "CLASS_TYPE_USER_PROFILE".
- */
- public static final int CLASS_TYPE_USER_PROFILE = 2;
- /**
- * CLASS_TYPE_AUTH_SESS is an element of enum ClassTypes. Its value is "CLASS_TYPE_AUTH_SESS".
- */
- public static final int CLASS_TYPE_AUTH_SESS = 3;
- /**
- * CLASS_TYPE_DATA_OBJECT is an element of enum ClassTypes. Its value is "CLASS_TYPE_DATA_OBJECT".
- */
- public static final int CLASS_TYPE_DATA_OBJECT = 4;
- /**
- * CLASS_TYPE_NAMEVALUE is an element of enum ClassTypes. Its value is "CLASS_TYPE_NAMEVALUE".
- */
- public static final int CLASS_TYPE_NAMEVALUE = 5;
- /**
- * CLASS_TYPE_LONG is an element of enum ClassTypes. Its value is "CLASS_TYPE_LONG".
- */
- public static final int CLASS_TYPE_LONG = 6;
- /**
- * CLASS_TYPE_PASSWORD_CHANGE is an element of enum ClassTypes. Its value is "CLASS_TYPE_PASSWORD_CHANGE".
- */
- public static final int CLASS_TYPE_PASSWORD_CHANGE = 7;
- /**
- * CLASS_TYPE_STRING is an element of enum ClassTypes. Its value is "CLASS_TYPE_STRING".
- */
- public static final int CLASS_TYPE_STRING = 8;
- /**
- * CLASS_TYPE_ENUM is an element of enum ClassTypes. Its value is "CLASS_TYPE_ENUM".
- */
- public static final int CLASS_TYPE_ENUM = 9;
- /**
- * CLASS_TYPE_ENUM_ELEMENT is an element of enum ClassTypes. Its value is "CLASS_TYPE_ENUM_ELEMENT".
- */
- public static final int CLASS_TYPE_ENUM_ELEMENT = 10;
- /**
- * CLASS_TYPE_RESPONSE is an element of enum ClassTypes. Its value is "CLASS_TYPE_RESPONSE".
- */
- public static final int CLASS_TYPE_RESPONSE = 11;
- /**
- * CLASS_TYPE_XA_ASSET is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_ASSET".
- */
- public static final int CLASS_TYPE_XA_ASSET = 1000;
- /**
- * CLASS_TYPE_XA_RESOURCE is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_RESOURCE".
- */
- public static final int CLASS_TYPE_XA_RESOURCE = 1001;
- /**
- * CLASS_TYPE_XA_GROUP is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_GROUP".
- */
- public static final int CLASS_TYPE_XA_GROUP = 1002;
- /**
- * CLASS_TYPE_XA_USER is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_USER".
- */
- public static final int CLASS_TYPE_XA_USER = 1003;
- /**
- * CLASS_TYPE_XA_GROUP_USER is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_GROUP_USER".
- */
- public static final int CLASS_TYPE_XA_GROUP_USER = 1004;
- /**
- * CLASS_TYPE_XA_GROUP_GROUP is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_GROUP_GROUP".
- */
- public static final int CLASS_TYPE_XA_GROUP_GROUP = 1005;
- /**
- * CLASS_TYPE_XA_PERM_MAP is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_PERM_MAP".
- */
- public static final int CLASS_TYPE_XA_PERM_MAP = 1006;
- /**
- * CLASS_TYPE_XA_AUDIT_MAP is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_AUDIT_MAP".
- */
- public static final int CLASS_TYPE_XA_AUDIT_MAP = 1007;
- /**
- * CLASS_TYPE_XA_CRED_STORE is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_CRED_STORE".
- */
- public static final int CLASS_TYPE_XA_CRED_STORE = 1008;
- /**
- * CLASS_TYPE_XA_POLICY_EXPORT_AUDIT is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_POLICY_EXPORT_AUDIT".
- */
- public static final int CLASS_TYPE_XA_POLICY_EXPORT_AUDIT = 1009;
- /**
- * CLASS_TYPE_TRX_LOG is an element of enum ClassTypes. Its value is "CLASS_TYPE_TRX_LOG".
- */
- public static final int CLASS_TYPE_TRX_LOG = 1010;
- /**
- * CLASS_TYPE_XA_ACCESS_AUDIT is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_ACCESS_AUDIT".
- */
- public static final int CLASS_TYPE_XA_ACCESS_AUDIT = 1011;
- /**
- * CLASS_TYPE_XA_TRANSACTION_LOG_ATTRIBUTE is an element of enum ClassTypes. Its value is "CLASS_TYPE_XA_TRANSACTION_LOG_ATTRIBUTE".
- */
- public static final int CLASS_TYPE_XA_TRANSACTION_LOG_ATTRIBUTE = 1012;
-
- /**
- * Max value for enum ClassTypes_MAX
- */
- public static final int ClassTypes_MAX = 1012;
-
-
-
- static public String getLabelFor_ActiveStatus( int elementValue ) {
- if( elementValue == 0 ) {
- return "Disabled"; //STATUS_DISABLED
- }
- if( elementValue == 1 ) {
- return "Enabled"; //STATUS_ENABLED
- }
- if( elementValue == 2 ) {
- return "Deleted"; //STATUS_DELETED
- }
- return null;
- }
-
- static public String getLabelFor_ActivationStatus( int elementValue ) {
- if( elementValue == 0 ) {
- return "Disabled"; //ACT_STATUS_DISABLED
- }
- if( elementValue == 1 ) {
- return "Active"; //ACT_STATUS_ACTIVE
- }
- if( elementValue == 2 ) {
- return "Pending Approval"; //ACT_STATUS_PENDING_APPROVAL
- }
- if( elementValue == 3 ) {
- return "Pending Activation"; //ACT_STATUS_PENDING_ACTIVATION
- }
- if( elementValue == 4 ) {
- return "Rejected"; //ACT_STATUS_REJECTED
- }
- if( elementValue == 5 ) {
- return "Deactivated"; //ACT_STATUS_DEACTIVATED
- }
- if( elementValue == 6 ) {
- return "Registration Pending"; //ACT_STATUS_PRE_REGISTRATION
- }
- if( elementValue == 7 ) {
- return "No login privilege"; //ACT_STATUS_NO_LOGIN
- }
- return null;
- }
-
- static public String getLabelFor_BooleanValue( int elementValue ) {
- if( elementValue == 0 ) {
- return "None"; //BOOL_NONE
- }
- if( elementValue == 1 ) {
- return "True"; //BOOL_TRUE
- }
- if( elementValue == 2 ) {
- return "False"; //BOOL_FALSE
- }
- return null;
- }
-
- static public String getLabelFor_DataType( int elementValue ) {
- if( elementValue == 0 ) {
- return "Unknown"; //DATA_TYPE_UNKNOWN
- }
- if( elementValue == 1 ) {
- return "Integer"; //DATA_TYPE_INTEGER
- }
- if( elementValue == 2 ) {
- return "Double"; //DATA_TYPE_DOUBLE
- }
- if( elementValue == 3 ) {
- return "String"; //DATA_TYPE_STRING
- }
- if( elementValue == 4 ) {
- return "Boolean"; //DATA_TYPE_BOOLEAN
- }
- if( elementValue == 5 ) {
- return "Date"; //DATA_TYPE_DATE
- }
- if( elementValue == 6 ) {
- return "String enumeration"; //DATA_TYPE_STRING_ENUM
- }
- if( elementValue == 7 ) {
- return "Long"; //DATA_TYPE_LONG
- }
- if( elementValue == 8 ) {
- return "Integer enumeration"; //DATA_TYPE_INTEGER_ENUM
- }
- return null;
- }
-
- static public String getLabelFor_DeviceType( int elementValue ) {
- if( elementValue == 0 ) {
- return "Unknown"; //DEVICE_UNKNOWN
- }
- if( elementValue == 1 ) {
- return "Browser"; //DEVICE_BROWSER
- }
- if( elementValue == 2 ) {
- return "iPhone"; //DEVICE_IPHONE
- }
- if( elementValue == 3 ) {
- return "iPad"; //DEVICE_IPAD
- }
- if( elementValue == 4 ) {
- return "iPod"; //DEVICE_IPOD
- }
- if( elementValue == 5 ) {
- return "Android"; //DEVICE_ANDROID
- }
- return null;
- }
-
- static public String getLabelFor_DiffLevel( int elementValue ) {
- if( elementValue == 0 ) {
- return "Unknown"; //DIFF_UNKNOWN
- }
- if( elementValue == 1 ) {
- return "Low"; //DIFF_LOW
- }
- if( elementValue == 2 ) {
- return "Medium"; //DIFF_MEDIUM
- }
- if( elementValue == 3 ) {
- return "High"; //DIFF_HIGH
- }
- return null;
- }
-
- static public String getLabelFor_FileType( int elementValue ) {
- if( elementValue == 0 ) {
- return "File"; //FILE_FILE
- }
- if( elementValue == 1 ) {
- return "Directory"; //FILE_DIR
- }
- return null;
- }
-
- static public String getLabelFor_FreqType( int elementValue ) {
- if( elementValue == 0 ) {
- return "None"; //FREQ_NONE
- }
- if( elementValue == 1 ) {
- return "Manual"; //FREQ_MANUAL
- }
- if( elementValue == 2 ) {
- return "Hourly"; //FREQ_HOURLY
- }
- if( elementValue == 3 ) {
- return "Daily"; //FREQ_DAILY
- }
- if( elementValue == 4 ) {
- return "Weekly"; //FREQ_WEEKLY
- }
- if( elementValue == 5 ) {
- return "Bi Weekly"; //FREQ_BI_WEEKLY
- }
- if( elementValue == 6 ) {
- return "Monthly"; //FREQ_MONTHLY
- }
- return null;
- }
-
- static public String getLabelFor_MimeType( int elementValue ) {
- if( elementValue == 0 ) {
- return "Unknown"; //MIME_UNKNOWN
- }
- if( elementValue == 1 ) {
- return "Text"; //MIME_TEXT
- }
- if( elementValue == 2 ) {
- return "Html"; //MIME_HTML
- }
- if( elementValue == 3 ) {
- return "png"; //MIME_PNG
- }
- if( elementValue == 4 ) {
- return "jpeg"; //MIME_JPEG
- }
- return null;
- }
-
- static public String getLabelFor_NumberFormat( int elementValue ) {
- if( elementValue == 0 ) {
- return "None"; //NUM_FORMAT_NONE
- }
- if( elementValue == 1 ) {
- return "Numeric"; //NUM_FORMAT_NUMERIC
- }
- if( elementValue == 2 ) {
- return "Alphabhet"; //NUM_FORMAT_ALPHA
- }
- if( elementValue == 3 ) {
- return "Roman"; //NUM_FORMAT_ROMAN
- }
- return null;
- }
-
- static public String getLabelFor_ObjectStatus( int elementValue ) {
- if( elementValue == 0 ) {
- return "Active"; //OBJ_STATUS_ACTIVE
- }
- if( elementValue == 1 ) {
- return "Deleted"; //OBJ_STATUS_DELETED
- }
- if( elementValue == 2 ) {
- return "Archived"; //OBJ_STATUS_ARCHIVED
- }
- return null;
- }
-
- static public String getLabelFor_PasswordResetStatus( int elementValue ) {
- if( elementValue == 0 ) {
- return "Active"; //PWD_RESET_ACTIVE
- }
- if( elementValue == 1 ) {
- return "Used"; //PWD_RESET_USED
- }
- if( elementValue == 2 ) {
- return "Expired"; //PWD_RESET_EXPIRED
- }
- if( elementValue == 3 ) {
- return "Disabled"; //PWD_RESET_DISABLED
- }
- return null;
- }
-
- static public String getLabelFor_PriorityType( int elementValue ) {
- if( elementValue == 0 ) {
- return "Normal"; //PRIORITY_NORMAL
- }
- if( elementValue == 1 ) {
- return "Low"; //PRIORITY_LOW
- }
- if( elementValue == 2 ) {
- return "Medium"; //PRIORITY_MEDIUM
- }
- if( elementValue == 3 ) {
- return "High"; //PRIORITY_HIGH
- }
- return null;
- }
-
- static public String getLabelFor_ProgressStatus( int elementValue ) {
- if( elementValue == 0 ) {
- return "Pending"; //PROGRESS_PENDING
- }
- if( elementValue == 1 ) {
- return "In Progress"; //PROGRESS_IN_PROGRESS
- }
- if( elementValue == 2 ) {
- return "Complete"; //PROGRESS_COMPLETE
- }
- if( elementValue == 3 ) {
- return "Aborted"; //PROGRESS_ABORTED
- }
- if( elementValue == 4 ) {
- return "Failed"; //PROGRESS_FAILED
- }
- return null;
- }
-
- static public String getLabelFor_RelationType( int elementValue ) {
- if( elementValue == 0 ) {
- return "None"; //REL_NONE
- }
- if( elementValue == 1 ) {
- return "Self"; //REL_SELF
- }
- return null;
- }
-
- static public String getLabelFor_UserSource( int elementValue ) {
- if( elementValue == 0 ) {
- return "Application"; //USER_APP
- }
- if( elementValue == 1 ) {
- return "External"; //USER_EXTERNAL
- }
- /*if( elementValue == 1 ) {
- return "Google"; //USER_GOOGLE
- }
- if( elementValue == 2 ) {
- return "FaceBook"; //USER_FB
- }*/
- return null;
- }
-
- static public String getLabelFor_AssetType( int elementValue ) {
- if( elementValue == 0 ) {
- return "Unknown"; //ASSET_UNKNOWN
- }
- if( elementValue == 1 ) {
- return "HDFS"; //ASSET_HDFS
- }
- if( elementValue == 2 ) {
- return "HBase"; //ASSET_HBASE
- }
- if( elementValue == 3 ) {
- return "Hive"; //ASSET_HIVE
- }
- if( elementValue == 4 ) {
- return "Agent"; //ASSET_HIVE
- }
- if( elementValue == 5 ) {
- return "Knox"; //ASSET_HIVE
- }
- if( elementValue == 6 ) {
- return "Storm"; //ASSET_HIVE
- }
- return null;
- }
-
- static public String getLabelFor_AccessResult( int elementValue ) {
- if( elementValue == 0 ) {
- return "Denied"; //ACCESS_RESULT_DENIED
- }
- if( elementValue == 1 ) {
- return "Allowed"; //ACCESS_RESULT_ALLOWED
- }
- return null;
- }
-
- static public String getLabelFor_PolicyType( int elementValue ) {
- if( elementValue == 0 ) {
- return "Inclusion"; //POLICY_INCLUSION
- }
- if( elementValue == 1 ) {
- return "Exclusion"; //POLICY_EXCLUSION
- }
- return null;
- }
-
- static public String getLabelFor_XAAuditType( int elementValue ) {
- if( elementValue == 0 ) {
- return "Unknown"; //XA_AUDIT_TYPE_UNKNOWN
- }
- if( elementValue == 1 ) {
- return "All"; //XA_AUDIT_TYPE_ALL
- }
- if( elementValue == 2 ) {
- return "Read"; //XA_AUDIT_TYPE_READ
- }
- if( elementValue == 3 ) {
- return "Write"; //XA_AUDIT_TYPE_WRITE
- }
- if( elementValue == 4 ) {
- return "Create"; //XA_AUDIT_TYPE_CREATE
- }
- if( elementValue == 5 ) {
- return "Delete"; //XA_AUDIT_TYPE_DELETE
- }
- if( elementValue == 6 ) {
- return "Login"; //XA_AUDIT_TYPE_LOGIN
- }
- return null;
- }
-
- static public String getLabelFor_ResourceType( int elementValue ) {
- if( elementValue == 0 ) {
- return "Unknown"; //RESOURCE_UNKNOWN
- }
- if( elementValue == 1 ) {
- return "Path"; //RESOURCE_PATH
- }
- if( elementValue == 2 ) {
- return "Database"; //RESOURCE_DB
- }
- if( elementValue == 3 ) {
- return "Table"; //RESOURCE_TABLE
- }
- if( elementValue == 4 ) {
- return "Column Family"; //RESOURCE_COL_FAM
- }
- if( elementValue == 5 ) {
- return "Column"; //RESOURCE_COLUMN
- }
- if( elementValue == 6 ) {
- return "VIEW"; //RESOURCE_VIEW
- }
- if( elementValue == 7 ) {
- return "UDF"; //RESOURCE_UDF
- }
- if( elementValue == 8 ) {
- return "View Column"; //RESOURCE_VIEW_COL
- }
- return null;
- }
-
- static public String getLabelFor_XAGroupType( int elementValue ) {
- if( elementValue == 0 ) {
- return "Unknown"; //XA_GROUP_UNKNOWN
- }
- if( elementValue == 1 ) {
- return "User"; //XA_GROUP_USER
- }
- if( elementValue == 2 ) {
- return "Group"; //XA_GROUP_GROUP
- }
- if( elementValue == 3 ) {
- return "Role"; //XA_GROUP_ROLE
- }
- return null;
- }
-
- static public String getLabelFor_XAPermForType( int elementValue ) {
- if( elementValue == 0 ) {
- return "Unknown"; //XA_PERM_FOR_UNKNOWN
- }
- if( elementValue == 1 ) {
- return "Permission for Users"; //XA_PERM_FOR_USER
- }
- if( elementValue == 2 ) {
- return "Permission for Groups"; //XA_PERM_FOR_GROUP
- }
- return null;
- }
-
- static public String getLabelFor_XAPermType( int elementValue ) {
- if( elementValue == 0 ) {
- return "Unknown"; //XA_PERM_TYPE_UNKNOWN
- }
- if( elementValue == 1 ) {
- return "Reset"; //XA_PERM_TYPE_RESET
- }
- if( elementValue == 2 ) {
- return "Read"; //XA_PERM_TYPE_READ
- }
- if( elementValue == 3 ) {
- return "Write"; //XA_PERM_TYPE_WRITE
- }
- if( elementValue == 4 ) {
- return "Create"; //XA_PERM_TYPE_CREATE
- }
- if( elementValue == 5 ) {
- return "Delete"; //XA_PERM_TYPE_DELETE
- }
- if( elementValue == 6 ) {
- return "Admin"; //XA_PERM_TYPE_ADMIN
- }
- if( elementValue == 7 ) {
- return "Obfuscate"; //XA_PERM_TYPE_OBFUSCATE
- }
- if( elementValue == 8 ) {
- return "Mask"; //XA_PERM_TYPE_MASK
- }
- if( elementValue == 9 ) {
- return "Execute"; //XA_PERM_TYPE_EXECUTE
- }
- if( elementValue == 10 ) {
- return "Select"; //XA_PERM_TYPE_SELECT
- }
- if( elementValue == 11 ) {
- return "Update"; //XA_PERM_TYPE_UPDATE
- }
- if( elementValue == 12 ) {
- return "Drop"; //XA_PERM_TYPE_DROP
- }
- if( elementValue == 13 ) {
- return "Alter"; //XA_PERM_TYPE_ALTER
- }
- if( elementValue == 14 ) {
- return "Index"; //XA_PERM_TYPE_INDEX
- }
- if( elementValue == 15 ) {
- return "Lock"; //XA_PERM_TYPE_LOCK
- }
- if( elementValue == 16 ) {
- return "All"; //XA_PERM_TYPE_ALL
- }
- if( elementValue == 17 ) {
- return "Allow"; //XA_PERM_TYPE_ALLOW
- }
- return null;
- }
-
- static public String getLabelFor_ClassTypes( int elementValue ) {
- if( elementValue == 0 ) {
- return "None"; //CLASS_TYPE_NONE
- }
- if( elementValue == 1 ) {
- return "Message"; //CLASS_TYPE_MESSAGE
- }
- if( elementValue == 2 ) {
- return "User Profile"; //CLASS_TYPE_USER_PROFILE
- }
- if( elementValue == 3 ) {
- return "Authentication Session"; //CLASS_TYPE_AUTH_SESS
- }
- if( elementValue == 4 ) {
- return null; //CLASS_TYPE_DATA_OBJECT
- }
- if( elementValue == 5 ) {
- return null; //CLASS_TYPE_NAMEVALUE
- }
- if( elementValue == 6 ) {
- return null; //CLASS_TYPE_LONG
- }
- if( elementValue == 7 ) {
- return null; //CLASS_TYPE_PASSWORD_CHANGE
- }
- if( elementValue == 8 ) {
- return null; //CLASS_TYPE_STRING
- }
- if( elementValue == 9 ) {
- return null; //CLASS_TYPE_ENUM
- }
- if( elementValue == 10 ) {
- return null; //CLASS_TYPE_ENUM_ELEMENT
- }
- if( elementValue == 11 ) {
- return "Response"; //CLASS_TYPE_RESPONSE
- }
- if( elementValue == 1000 ) {
- return "Asset"; //CLASS_TYPE_XA_ASSET
- }
- if( elementValue == 1001 ) {
- return "Resource"; //CLASS_TYPE_XA_RESOURCE
- }
- if( elementValue == 1002 ) {
- return "XA Group"; //CLASS_TYPE_XA_GROUP
- }
- if( elementValue == 1003 ) {
- return "XA User"; //CLASS_TYPE_XA_USER
- }
- if( elementValue == 1004 ) {
- return "XA Group of Users"; //CLASS_TYPE_XA_GROUP_USER
- }
- if( elementValue == 1005 ) {
- return "XA Group of groups"; //CLASS_TYPE_XA_GROUP_GROUP
- }
- if( elementValue == 1006 ) {
- return "XA permissions for resource"; //CLASS_TYPE_XA_PERM_MAP
- }
- if( elementValue == 1007 ) {
- return "XA audits for resource"; //CLASS_TYPE_XA_AUDIT_MAP
- }
- if( elementValue == 1008 ) {
- return "XA credential store"; //CLASS_TYPE_XA_CRED_STORE
- }
- if( elementValue == 1009 ) {
- return "XA Policy Export Audit"; //CLASS_TYPE_XA_POLICY_EXPORT_AUDIT
- }
- if( elementValue == 1010 ) {
- return "Transaction log"; //CLASS_TYPE_TRX_LOG
- }
- if( elementValue == 1011 ) {
- return "Access Audit"; //CLASS_TYPE_XA_ACCESS_AUDIT
- }
- if( elementValue == 1012 ) {
- return "Transaction log attribute"; //CLASS_TYPE_XA_TRANSACTION_LOG_ATTRIBUTE
- }
- return null;
- }
-
-
-}
-
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/XAConfigUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/XAConfigUtil.java b/security-admin/src/main/java/org/apache/ranger/common/XAConfigUtil.java
deleted file mode 100644
index e50fb20..0000000
--- a/security-admin/src/main/java/org/apache/ranger/common/XAConfigUtil.java
+++ /dev/null
@@ -1,91 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing,
- * software distributed under the License is distributed on an
- * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
- * KIND, either express or implied. See the License for the
- * specific language governing permissions and limitations
- * under the License.
- */
-
- package org.apache.ranger.common;
-
-import org.apache.log4j.Logger;
-import org.apache.ranger.common.PropertiesUtil;
-import org.springframework.stereotype.Component;
-
-/**
- *
- *
- */
-@Component
-public class XAConfigUtil {
- static Logger logger = Logger.getLogger(XAConfigUtil.class);
-
- String webappRootURL;
- int defaultMaxRows = 250;
- String[] roles;
- boolean accessFilterEnabled = true;
- boolean isModerationEnabled = false;
- boolean isUserPrefEnabled = false;
-
- public XAConfigUtil() {
- webappRootURL = PropertiesUtil
- .getProperty("xa.webapp.url.root");
- if (webappRootURL == null || webappRootURL.trim().length() == 0) {
- logger.error("webapp URL is not set. Please xa.webapp.url.root property");
- }
-
- defaultMaxRows = PropertiesUtil.getIntProperty(
- "xa.db.maxrows.default", defaultMaxRows);
-
- roles = PropertiesUtil
- .getPropertyStringList("xa.users.roles.list");
-
- accessFilterEnabled = PropertiesUtil.getBooleanProperty(
- "xa.db.access.filter.enable", true);
-
- isModerationEnabled = PropertiesUtil.getBooleanProperty(
- "xa.moderation.enabled", isModerationEnabled);
- isUserPrefEnabled = PropertiesUtil.getBooleanProperty(
- "xa.userpref.enabled", isUserPrefEnabled);
- }
-
- /**
- * @return the defaultMaxRows
- */
- public int getDefaultMaxRows() {
- return defaultMaxRows;
- }
-
- /**
- * @return the roles
- */
- public String[] getRoles() {
- return roles;
- }
-
- /**
- * @return the accessFilterEnabled
- */
- public boolean isAccessFilterEnabled() {
- return accessFilterEnabled;
- }
-
- /**
- * @return the webAppRootURL
- */
- public String getWebAppRootURL() {
- return webappRootURL;
- }
-
-}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/XAConstants.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/XAConstants.java b/security-admin/src/main/java/org/apache/ranger/common/XAConstants.java
deleted file mode 100644
index 5dbebb8..0000000
--- a/security-admin/src/main/java/org/apache/ranger/common/XAConstants.java
+++ /dev/null
@@ -1,169 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing,
- * software distributed under the License is distributed on an
- * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
- * KIND, either express or implied. See the License for the
- * specific language governing permissions and limitations
- * under the License.
- */
-
- /**
- *
- */
-
-package org.apache.ranger.common;
-
-public class XAConstants extends XACommonEnums {
-
- // Default Roles
- public final static String ROLE_SYS_ADMIN = "ROLE_SYS_ADMIN";
- public final static String ROLE_ADMIN = "ROLE_ADMIN";
- public final static String ROLE_INTEGRATOR = "ROLE_INTEGRATOR";
- public final static String ROLE_DATA_ANALYST = "ROLE_DATA_ANALYST";
- public final static String ROLE_BIZ_MGR = "ROLE_BIZ_MGR";
-
- public final static String ROLE_USER = "ROLE_USER";
- public final static String ROLE_ANON = "ROLE_ANON";
- public final static String ROLE_OTHER = "ROLE_OTHER";
- public final static String GROUP_PUBLIC = "public";
- // Action constants
- public final static String ACTION_EDIT = "edit";
- public final static String ACTION_CHANGE = "change";
- public final static String ACTION_DELETE = "delete";
- public final static String ACTION_MARK_SPAM = "mark_spam";
- public final static String ACTION_RATE = "rate";
- public final static String ACTION_SELECT = "select";
- public final static String ACTION_UNSELECT = "unselect";
- public final static String ACTION_HIDE = "hide";
- public final static String ACTION_UNHIDE = "unhide";
- public final static String ACTION_SHARE = "share";
- public final static String ACTION_UNSHARE = "unshare";
- public final static String ACTION_BOOKMARK = "bookmark";
- public final static String ACTION_UNBOOKMARK = "unbookmark";
-
- // Sendgrid email API constants
- public static final String SENDGRID_API_USER = "api_user";
- public static final String SENDGRID_API_KEY = "api_key";
- public static final String SENDGRID_TO = "to";
- public static final String SENDGRID_TO_NAME = "toname";
- public static final String SENDGRID_SUBJECT = "subject";
- public static final String SENDGRID_TEXT = "text";
- public static final String SENDGRID_HTML = "html";
- public static final String SENDGRID_FROM_EMAIL = "from";
- public static final String SENDGRID_FROM_NAME = "fromname";
- public static final String SENDGRID_BCC = "bcc";
- public static final String SENDGRID_CC = "cc";
- public static final String SENDGRID_REPLY_TO = "replyto";
-
- // User create validation errors
- public enum ValidationUserProfile {
-
- NO_EMAIL_ADDR("xa.validation.userprofile.no_email_addr",
- "Email address not provided"), INVALID_EMAIL_ADDR(
- "xa.validation.userprofile.userprofile.invalid_email_addr",
- "Invalid email address"), NO_FIRST_NAME(
- "xa.validation.userprofile.userprofile.no_first_name",
- "First name not provided"), INVALID_FIRST_NAME(
- "xa.validation.userprofile.invalid_first_name",
- "Invalid first name"), NO_LAST_NAME(
- "xa.validation.userprofile.noemailaddr",
- "Email address not provided"), INVALID_LAST_NAME(
- "xa.validation.userprofile.noemailaddr",
- "Email address not provided"), NO_PUBLIC_SCREEN_NAME(
- "xa.validation.userprofile.noemailaddr",
- "Email address not provided"), INVALID_PUBLIC_SCREEN_NAME(
- "xa.validation.userprofile.noemailaddr",
- "Email address not provided");
-
- String rbKey;
- String message;
-
- ValidationUserProfile(String rbKey, String message) {
- this.rbKey = rbKey;
- this.message = message;
- }
- };
-
- // these constants will be used in setting GjResponse object.
-
- public final static String USER_PENDING_APPROVAL_MSG = "User is yet not reviewed by Administrator. Please contact at <number>.";
- public final static int USER_PENDING_APPROVAL_STATUS_CODE = 0;
-
- public final static String USER_APPROVAL_MSG = "User is approved";
- public final static int USER_APPROVAL_STATUS_CODE = 1;
-
- public final static String USER_REJECTION_MSG = "User is rejected";
- public final static int USER_REJECTION_STATUS_CODE = 1;
-
- public final static String USER_STATUS_ALREADY_CHANGED_MSG = "Can not change user status. it is either already activated/approved/rejected";
- public final static int USER_STATUS_ALREADY_CHANGED_STATUS_CODE = 0;
-
- public final static String USER_ALREADY_ACTIVATED_MSG = "Your account is already activated. If you have forgotten your password, then from the login page, select 'Forgot Password'";
- public final static int USER_ALREADY_ACTIVATED_STATUS_CODE = 0;
-
- public final static String USER_STATUS_NOT_ACTIVE_MSG = "User is not in active status. Please activate your account first.";
- public final static int USER_STATUS_NOT_ACTIVE_STATUS_CODE = 0;
-
- public final static String INVALID_EMAIL_ADDRESS_MSG = "Invalid email address";
- public final static int INVALID_EMAIL_ADDRESS_STATUS_CODE = 0;
-
- public final static String WRONG_ACTIVATION_CODE_MSG = "Wrong activation code";
- public final static int WRONG_ACTIVATION_CODE_STATUS_CODE = 0;
-
- public final static String VALID_EMAIL_ADDRESS_MSG = "Valid email address";
- public final static int VALID_EMAIL_ADDRESS_STATUS_CODE = 1;
-
- public final static String NO_ACTIVATION_RECORD_FOR_USER_ERR_MSG = "No activation record found for user:";
- public final static String NO_ACTIVATION_ENTRY = "activation entry not found";
-
- public final static String VALIDATION_INVALID_DATA_DESC = "Invalid value for";
- public final static int VALIDATION_INVALID_DATA_CODE = 0;
- public static final String GROUP_MODERATORS = "GROUP_MODERATORS";
-
- // public final static String EMAIL_WELCOME_MSG =
- // "Welcome to iSchoolCircle";
- // public final static String EMAIL_LINK_WELCOME_MSG =
- // "Welcome to iSchoolCircle ! Please verify your account by clicking on the link below: ";
- // public static final String EMAIL_EDIT_REJECTED_MSG =
- // "Your changes not approved for public sharing.";
- // public static final String EMAIL_APPROVAL_NEEDED_MSG =
- // "New objects pending approval";
- // public static final String EMAIL_PWD_RESET_CODE_MSG =
- // "iSchoolCircle - Password Reset";
-
- public final static String PWD_RESET_FAILED_MSG = "Invalid password reset request";
-
- public final static String INVALID_NEW_PASSWORD_MSG = "Invalid new password";
- public static final String EMAIL_NEW_FEEDBACK_RECEIVED = "New feedback from";
- public static final int INITIAL_DOCUMENT_VERSION = 1;
-
- public static final int EMAIL_TYPE_ACCOUNT_CREATE = 0;
- public static final int EMAIL_TYPE_USER_CREATE = 1;
- public static final int EMAIL_TYPE_USER_ACCT_ADD = 2;
- public static final int EMAIL_TYPE_DOCUMENT_CREATE = 3;
- public static final int EMAIL_TYPE_DISCUSSION_CREATE = 4;
- public static final int EMAIL_TYPE_NOTE_CREATE = 5;
- public static final int EMAIL_TYPE_TASK_CREATE = 6;
- public static final int EMAIL_TYPE_USER_PASSWORD = 7;
- public static final int EMAIL_TYPE_USER_ACTIVATION = 8;
- public static final int EMAIL_TYPE_USER_ROLE_UPDATED = 9;
- public static final int EMAIL_TYPE_USER_GRP_ADD = 10;
-
- public static enum RBAC_PERM {
- ALLOW_NONE,
- ALLOW_READ,
- ALLOW_WRITE,
- ALLOW_DELETE
- }
-
-}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/XAJAXBContextResolver.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/XAJAXBContextResolver.java b/security-admin/src/main/java/org/apache/ranger/common/XAJAXBContextResolver.java
deleted file mode 100644
index 87a7924..0000000
--- a/security-admin/src/main/java/org/apache/ranger/common/XAJAXBContextResolver.java
+++ /dev/null
@@ -1,73 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing,
- * software distributed under the License is distributed on an
- * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
- * KIND, either express or implied. See the License for the
- * specific language governing permissions and limitations
- * under the License.
- */
-
- package org.apache.ranger.common;
-
-import javax.ws.rs.ext.ContextResolver;
-import javax.ws.rs.ext.Provider;
-import javax.xml.bind.JAXBContext;
-
-import org.apache.ranger.common.*;
-
-import com.sun.jersey.api.json.JSONConfiguration;
-import com.sun.jersey.api.json.JSONJAXBContext;
-
-/**
- *
- *
- */
-@Provider
-public class XAJAXBContextResolver implements ContextResolver<JAXBContext> {
-
- private JAXBContext context;
- private Class<?>[] types = {
- org.apache.ranger.view.VXAuthSessionList.class,
- org.apache.ranger.view.VXResponse.class,
- org.apache.ranger.view.VXStringList.class,
- org.apache.ranger.view.VXPortalUserList.class,
- org.apache.ranger.view.VXAssetList.class,
- org.apache.ranger.view.VXResourceList.class,
- org.apache.ranger.view.VXCredentialStoreList.class,
- org.apache.ranger.view.VXGroupList.class,
- org.apache.ranger.view.VXUserList.class,
- org.apache.ranger.view.VXGroupUserList.class,
- org.apache.ranger.view.VXGroupGroupList.class,
- org.apache.ranger.view.VXPermMapList.class,
- org.apache.ranger.view.VXAuditMapList.class,
- org.apache.ranger.view.VXPolicyExportAuditList.class,
- org.apache.ranger.view.VXAccessAuditList.class
- };
-
- public XAJAXBContextResolver() throws Exception {
- JSONConfiguration config = JSONConfiguration.natural().build();
- context = new JSONJAXBContext(config, types);
- }
-
- @Override
- public JAXBContext getContext(Class<?> objectType) {
- // return context;
- for (Class<?> type : types) {
- if (type.getName().equals(objectType.getName())) {
- return context;
- }
- }
- return null;
- }
-}
-
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/XASearchUtil.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/XASearchUtil.java b/security-admin/src/main/java/org/apache/ranger/common/XASearchUtil.java
deleted file mode 100644
index ff1f1a4..0000000
--- a/security-admin/src/main/java/org/apache/ranger/common/XASearchUtil.java
+++ /dev/null
@@ -1,78 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing,
- * software distributed under the License is distributed on an
- * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
- * KIND, either express or implied. See the License for the
- * specific language governing permissions and limitations
- * under the License.
- */
-
- package org.apache.ranger.common;
-
-import java.util.List;
-
-import javax.persistence.EntityManager;
-import javax.persistence.Query;
-
-import org.apache.log4j.Logger;
-import org.apache.ranger.common.SearchCriteria;
-import org.apache.ranger.common.SearchField;
-import org.apache.ranger.common.SearchUtil;
-import org.apache.ranger.db.XADaoManager;
-import org.springframework.beans.factory.annotation.Autowired;
-import org.springframework.stereotype.Component;
-
-@Component
-public class XASearchUtil extends SearchUtil {
- final static Logger logger = Logger.getLogger(XASearchUtil.class);
- /*
- @Override
- public Query createSearchQuery(EntityManager em, String queryStr, String sortClause,
- SearchCriteria searchCriteria, List<SearchField> searchFields,
- int objectClassType, boolean hasAttributes, boolean isCountQuery){
-
- // [1] Build where clause
- StringBuilder queryClause = buildWhereClause(searchCriteria,
- searchFields);
-
- // [2] Add domain-object-security clause if needed
- // if (objectClassType != -1
- // && !ContextUtil.getCurrentUserSession().isUserAdmin()) {
- // addDomainObjectSecuirtyClause(queryClause, hasAttributes);
- // }
-
- // [2] Add order by clause
- addOrderByClause(queryClause, sortClause);
-
- // [3] Create Query Object
- Query query = em.createQuery(
- queryStr + queryClause);
-
- // [4] Resolve query parameters with values
- resolveQueryParams(query, searchCriteria, searchFields);
-
- // [5] Resolve domain-object-security parameters
- // if (objectClassType != -1 &&
- // !securityHandler.hasModeratorPermission()) {
- // resolveDomainObjectSecuirtyParams(query, objectClassType);
- // }
-
- if (!isCountQuery) {
- query.setFirstResult(searchCriteria.getStartIndex());
- updateQueryPageSize(query, searchCriteria);
- }
-
- return query;
- }
- */
-}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/annotation/RangerAnnotationClassName.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/annotation/RangerAnnotationClassName.java b/security-admin/src/main/java/org/apache/ranger/common/annotation/RangerAnnotationClassName.java
new file mode 100644
index 0000000..c85f3da
--- /dev/null
+++ b/security-admin/src/main/java/org/apache/ranger/common/annotation/RangerAnnotationClassName.java
@@ -0,0 +1,32 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+ /**
+ *
+ */
+package org.apache.ranger.common.annotation;
+
+import java.lang.annotation.Retention;
+import java.lang.annotation.RetentionPolicy;
+
+
+@Retention(RetentionPolicy.RUNTIME)
+public @interface RangerAnnotationClassName {
+ public Class class_name();
+}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/annotation/RangerAnnotationJSMgrName.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/annotation/RangerAnnotationJSMgrName.java b/security-admin/src/main/java/org/apache/ranger/common/annotation/RangerAnnotationJSMgrName.java
new file mode 100644
index 0000000..911b414
--- /dev/null
+++ b/security-admin/src/main/java/org/apache/ranger/common/annotation/RangerAnnotationJSMgrName.java
@@ -0,0 +1,35 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+ /**
+ *
+ */
+package org.apache.ranger.common.annotation;
+
+import java.lang.annotation.Retention;
+import java.lang.annotation.RetentionPolicy;
+
+/**
+ *
+ *
+ */
+@Retention(RetentionPolicy.RUNTIME)
+public @interface RangerAnnotationJSMgrName {
+ public String value();
+}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/annotation/RangerAnnotationRestAPI.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/annotation/RangerAnnotationRestAPI.java b/security-admin/src/main/java/org/apache/ranger/common/annotation/RangerAnnotationRestAPI.java
new file mode 100644
index 0000000..a91d9ec
--- /dev/null
+++ b/security-admin/src/main/java/org/apache/ranger/common/annotation/RangerAnnotationRestAPI.java
@@ -0,0 +1,37 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+ /**
+ *
+ */
+package org.apache.ranger.common.annotation;
+
+import java.lang.annotation.Retention;
+import java.lang.annotation.RetentionPolicy;
+
+/**
+ * Annotating the REST APIs
+ *
+ */
+@Retention(RetentionPolicy.RUNTIME)
+public @interface RangerAnnotationRestAPI {
+ public String api_name() default "";
+ public boolean updates_generic_objects() default false;
+ public String updates_classes() default "";
+}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/annotation/XAAnnotationClassName.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/annotation/XAAnnotationClassName.java b/security-admin/src/main/java/org/apache/ranger/common/annotation/XAAnnotationClassName.java
deleted file mode 100644
index dcc357d..0000000
--- a/security-admin/src/main/java/org/apache/ranger/common/annotation/XAAnnotationClassName.java
+++ /dev/null
@@ -1,32 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing,
- * software distributed under the License is distributed on an
- * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
- * KIND, either express or implied. See the License for the
- * specific language governing permissions and limitations
- * under the License.
- */
-
- /**
- *
- */
-package org.apache.ranger.common.annotation;
-
-import java.lang.annotation.Retention;
-import java.lang.annotation.RetentionPolicy;
-
-
-@Retention(RetentionPolicy.RUNTIME)
-public @interface XAAnnotationClassName {
- public Class class_name();
-}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/annotation/XAAnnotationJSMgrName.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/annotation/XAAnnotationJSMgrName.java b/security-admin/src/main/java/org/apache/ranger/common/annotation/XAAnnotationJSMgrName.java
deleted file mode 100644
index cf21848..0000000
--- a/security-admin/src/main/java/org/apache/ranger/common/annotation/XAAnnotationJSMgrName.java
+++ /dev/null
@@ -1,35 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing,
- * software distributed under the License is distributed on an
- * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
- * KIND, either express or implied. See the License for the
- * specific language governing permissions and limitations
- * under the License.
- */
-
- /**
- *
- */
-package org.apache.ranger.common.annotation;
-
-import java.lang.annotation.Retention;
-import java.lang.annotation.RetentionPolicy;
-
-/**
- *
- *
- */
-@Retention(RetentionPolicy.RUNTIME)
-public @interface XAAnnotationJSMgrName {
- public String value();
-}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/annotation/XAAnnotationRestAPI.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/annotation/XAAnnotationRestAPI.java b/security-admin/src/main/java/org/apache/ranger/common/annotation/XAAnnotationRestAPI.java
deleted file mode 100644
index 3dc62bb..0000000
--- a/security-admin/src/main/java/org/apache/ranger/common/annotation/XAAnnotationRestAPI.java
+++ /dev/null
@@ -1,36 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements. See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership. The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License. You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing,
- * software distributed under the License is distributed on an
- * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
- * KIND, either express or implied. See the License for the
- * specific language governing permissions and limitations
- * under the License.
- */
-
- /**
- *
- */
-package org.apache.ranger.common.annotation;
-
-import java.lang.annotation.*;
-
-/**
- * Annotating the REST APIs
- *
- */
-@Retention(RetentionPolicy.RUNTIME)
-public @interface XAAnnotationRestAPI {
- public String api_name() default "";
- public boolean updates_generic_objects() default false;
- public String updates_classes() default "";
-}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/db/BaseDao.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/db/BaseDao.java b/security-admin/src/main/java/org/apache/ranger/common/db/BaseDao.java
index bebe956..8ef9e08 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/db/BaseDao.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/db/BaseDao.java
@@ -32,27 +32,25 @@ import javax.persistence.Query;
import javax.persistence.TypedQuery;
import org.apache.log4j.Logger;
-import org.apache.ranger.common.ContextUtil;
-import org.apache.ranger.db.XADaoManager;
-import org.apache.ranger.db.XADaoManagerBase;
-import org.apache.ranger.entity.XXDBBase;
+import org.apache.ranger.db.RangerDaoManager;
+import org.apache.ranger.db.RangerDaoManagerBase;
public abstract class BaseDao<T> {
static final Logger logger = Logger.getLogger(BaseDao.class);
- protected XADaoManager daoManager;
+ protected RangerDaoManager daoManager;
EntityManager em;
protected Class<T> tClass;
- public BaseDao(XADaoManagerBase daoManager) {
- this.daoManager = (XADaoManager) daoManager;
+ public BaseDao(RangerDaoManagerBase daoManager) {
+ this.daoManager = (RangerDaoManager) daoManager;
this.init(daoManager.getEntityManager());
}
- public BaseDao(XADaoManagerBase daoManager, String persistenceContextUnit) {
- this.daoManager = (XADaoManager) daoManager;
+ public BaseDao(RangerDaoManagerBase daoManager, String persistenceContextUnit) {
+ this.daoManager = (RangerDaoManager) daoManager;
EntityManager em = this.daoManager.getEntityManager(persistenceContextUnit);
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/db/JPABeanCallbacks.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/db/JPABeanCallbacks.java b/security-admin/src/main/java/org/apache/ranger/common/db/JPABeanCallbacks.java
index c5176ba..ece3b6e 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/db/JPABeanCallbacks.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/db/JPABeanCallbacks.java
@@ -26,8 +26,8 @@ import org.apache.log4j.Logger;
import org.apache.ranger.common.DateUtil;
import org.apache.ranger.common.UserSessionBase;
import org.apache.ranger.entity.XXDBBase;
-import org.apache.ranger.security.context.XAContextHolder;
-import org.apache.ranger.security.context.XASecurityContext;
+import org.apache.ranger.security.context.RangerContextHolder;
+import org.apache.ranger.security.context.RangerSecurityContext;
public class JPABeanCallbacks {
static final Logger logger = Logger.getLogger(JPABeanCallbacks.class);
@@ -40,7 +40,7 @@ public class JPABeanCallbacks {
entity.setUpdateTime(DateUtil.getUTCDate());
- XASecurityContext context = XAContextHolder
+ RangerSecurityContext context = RangerContextHolder
.getSecurityContext();
if (context != null) {
UserSessionBase userSession = context.getUserSession();
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/view/VEnum.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/view/VEnum.java b/security-admin/src/main/java/org/apache/ranger/common/view/VEnum.java
index 9f31390..3d5c252 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/view/VEnum.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/view/VEnum.java
@@ -23,7 +23,7 @@ import java.util.List;
import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.XACommonEnums;
+import org.apache.ranger.common.RangerCommonEnums;
@XmlRootElement
@@ -88,7 +88,7 @@ public class VEnum extends ViewBaseBean implements java.io.Serializable {
@Override
public int getMyClassType() {
- return XACommonEnums.CLASS_TYPE_ENUM;
+ return RangerCommonEnums.CLASS_TYPE_ENUM;
}
/**
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/view/VEnumElement.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/view/VEnumElement.java b/security-admin/src/main/java/org/apache/ranger/common/view/VEnumElement.java
index 15f890d..4a73ce7 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/view/VEnumElement.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/view/VEnumElement.java
@@ -21,7 +21,7 @@
import javax.xml.bind.annotation.XmlRootElement;
-import org.apache.ranger.common.XACommonEnums;
+import org.apache.ranger.common.RangerCommonEnums;
@XmlRootElement
public class VEnumElement extends ViewBaseBean implements java.io.Serializable {
@@ -145,7 +145,7 @@ public class VEnumElement extends ViewBaseBean implements java.io.Serializable {
@Override
public int getMyClassType( ) {
- return XACommonEnums.CLASS_TYPE_ENUM_ELEMENT;
+ return RangerCommonEnums.CLASS_TYPE_ENUM_ELEMENT;
}
/**
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/view/VList.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/view/VList.java b/security-admin/src/main/java/org/apache/ranger/common/view/VList.java
index 177e7fd..4364ae6 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/view/VList.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/view/VList.java
@@ -22,7 +22,7 @@
import java.util.List;
-import javax.xml.bind.annotation.*;
+import javax.xml.bind.annotation.XmlRootElement;
@XmlRootElement
public abstract class VList extends ViewBaseBean implements
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/view/VTrxLogAttr.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/view/VTrxLogAttr.java b/security-admin/src/main/java/org/apache/ranger/common/view/VTrxLogAttr.java
index 2974e7d..eb2e0e3 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/view/VTrxLogAttr.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/view/VTrxLogAttr.java
@@ -24,8 +24,6 @@ import java.io.Serializable;
import javax.xml.bind.annotation.XmlRootElement;
import org.apache.ranger.common.AppConstants;
-import org.apache.ranger.common.XACommonEnums;
-import org.apache.ranger.common.view.ViewBaseBean;
@XmlRootElement
public class VTrxLogAttr extends ViewBaseBean implements Serializable{
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/common/view/ViewBaseBean.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/common/view/ViewBaseBean.java b/security-admin/src/main/java/org/apache/ranger/common/view/ViewBaseBean.java
index b820120..b93da50 100644
--- a/security-admin/src/main/java/org/apache/ranger/common/view/ViewBaseBean.java
+++ b/security-admin/src/main/java/org/apache/ranger/common/view/ViewBaseBean.java
@@ -21,7 +21,7 @@
import javax.xml.bind.annotation.XmlTransient;
-import org.apache.ranger.common.XACommonEnums;
+import org.apache.ranger.common.RangerCommonEnums;
import org.apache.ranger.entity.XXDBBase;
import org.codehaus.jackson.annotate.JsonIgnore;
@@ -51,6 +51,6 @@ public class ViewBaseBean implements java.io.Serializable {
@XmlTransient
@JsonIgnore
public int getMyClassType() {
- return XACommonEnums.CLASS_TYPE_NONE;
+ return RangerCommonEnums.CLASS_TYPE_NONE;
}
}
\ No newline at end of file
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/db/RangerDaoManager.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/db/RangerDaoManager.java b/security-admin/src/main/java/org/apache/ranger/db/RangerDaoManager.java
new file mode 100644
index 0000000..4227c90
--- /dev/null
+++ b/security-admin/src/main/java/org/apache/ranger/db/RangerDaoManager.java
@@ -0,0 +1,79 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+ package org.apache.ranger.db;
+
+
+
+import javax.persistence.EntityManager;
+import javax.persistence.PersistenceContext;
+
+import org.apache.log4j.Logger;
+import org.apache.ranger.common.RangerConstants;
+import org.apache.ranger.common.StringUtil;
+import org.apache.ranger.common.db.BaseDao;
+import org.springframework.beans.factory.annotation.Autowired;
+import org.springframework.stereotype.Component;
+
+@Component
+public class RangerDaoManager extends RangerDaoManagerBase {
+ final static Logger logger = Logger.getLogger(RangerDaoManager.class);
+
+ @PersistenceContext(unitName = "defaultPU")
+ private EntityManager em;
+
+ @PersistenceContext(unitName = "loggingPU")
+ private EntityManager loggingEM;
+
+ @Autowired
+ StringUtil stringUtil;
+
+ @Override
+ public EntityManager getEntityManager() {
+ return em;
+ }
+
+ public EntityManager getEntityManager(String persistenceContextUnit) {
+ logger.error("RangerDaoManager.getEntityManager(" + persistenceContextUnit + ")");
+ if (persistenceContextUnit.equalsIgnoreCase("loggingPU")) {
+ return loggingEM;
+ }
+ return getEntityManager();
+ }
+
+
+ /**
+ * @return the stringUtil
+ */
+ public StringUtil getStringUtil() {
+ return stringUtil;
+ }
+
+ /*
+ * (non-Javadoc)
+ */
+ @Override
+ public BaseDao<?> getDaoForClassType(int classType) {
+ if (classType == RangerConstants.CLASS_TYPE_NONE) {
+ return null;
+ }
+ return super.getDaoForClassType(classType);
+ }
+
+}
[12/12] incubator-ranger git commit: RANGER-194: Rename classes under
web-admin project
Posted by ma...@apache.org.
RANGER-194: Rename classes under web-admin project
Project: http://git-wip-us.apache.org/repos/asf/incubator-ranger/repo
Commit: http://git-wip-us.apache.org/repos/asf/incubator-ranger/commit/06ca8538
Tree: http://git-wip-us.apache.org/repos/asf/incubator-ranger/tree/06ca8538
Diff: http://git-wip-us.apache.org/repos/asf/incubator-ranger/diff/06ca8538
Branch: refs/heads/master
Commit: 06ca85385867ab4274afa0852268e0875c814d17
Parents: ef7b11d
Author: Alok Lal <al...@hortonworks.com>
Authored: Mon Dec 15 18:43:44 2014 -0800
Committer: Madhan Neethiraj <ma...@apache.org>
Committed: Mon Dec 15 18:43:44 2014 -0800
----------------------------------------------------------------------
.../unix/jaas/RoleUserAuthorityGranter.java | 1 -
.../apache/ranger/biz/AssetConnectionMgr.java | 12 +-
.../java/org/apache/ranger/biz/AssetMgr.java | 169 +-
.../org/apache/ranger/biz/AssetMgrBase.java | 19 +-
.../java/org/apache/ranger/biz/BaseMgr.java | 16 +-
.../java/org/apache/ranger/biz/HiveFSMgr.java | 2 -
.../org/apache/ranger/biz/RangerBizUtil.java | 1311 ++++++++++++
.../java/org/apache/ranger/biz/SessionMgr.java | 24 +-
.../java/org/apache/ranger/biz/UserMgr.java | 46 +-
.../java/org/apache/ranger/biz/UserMgrBase.java | 10 +-
.../java/org/apache/ranger/biz/XABizUtil.java | 1313 ------------
.../org/apache/ranger/biz/XAuditMgrBase.java | 13 +-
.../java/org/apache/ranger/biz/XUserMgr.java | 14 +-
.../org/apache/ranger/biz/XUserMgrBase.java | 25 +-
.../org/apache/ranger/common/AppConstants.java | 5 +-
.../org/apache/ranger/common/ContextUtil.java | 14 +-
.../java/org/apache/ranger/common/DateUtil.java | 1 +
.../java/org/apache/ranger/common/HTTPUtil.java | 14 +-
.../apache/ranger/common/PropertiesUtil.java | 16 +-
.../org/apache/ranger/common/RESTErrorUtil.java | 1 -
.../apache/ranger/common/RangerCommonEnums.java | 1441 +++++++++++++
.../apache/ranger/common/RangerConfigUtil.java | 90 +
.../apache/ranger/common/RangerConstants.java | 169 ++
.../common/RangerJAXBContextResolver.java | 71 +
.../apache/ranger/common/RangerSearchUtil.java | 68 +
.../apache/ranger/common/RequestContext.java | 2 +-
.../apache/ranger/common/SearchCriteria.java | 4 +-
.../org/apache/ranger/common/SearchField.java | 1 -
.../org/apache/ranger/common/SearchUtil.java | 2 +-
.../apache/ranger/common/TimedEventUtil.java | 5 -
.../apache/ranger/common/UserSessionBase.java | 5 +-
.../org/apache/ranger/common/XACommonEnums.java | 1444 -------------
.../org/apache/ranger/common/XAConfigUtil.java | 91 -
.../org/apache/ranger/common/XAConstants.java | 169 --
.../ranger/common/XAJAXBContextResolver.java | 73 -
.../org/apache/ranger/common/XASearchUtil.java | 78 -
.../annotation/RangerAnnotationClassName.java | 32 +
.../annotation/RangerAnnotationJSMgrName.java | 35 +
.../annotation/RangerAnnotationRestAPI.java | 37 +
.../annotation/XAAnnotationClassName.java | 32 -
.../annotation/XAAnnotationJSMgrName.java | 35 -
.../common/annotation/XAAnnotationRestAPI.java | 36 -
.../org/apache/ranger/common/db/BaseDao.java | 16 +-
.../ranger/common/db/JPABeanCallbacks.java | 6 +-
.../org/apache/ranger/common/view/VEnum.java | 4 +-
.../apache/ranger/common/view/VEnumElement.java | 4 +-
.../org/apache/ranger/common/view/VList.java | 2 +-
.../apache/ranger/common/view/VTrxLogAttr.java | 2 -
.../apache/ranger/common/view/ViewBaseBean.java | 4 +-
.../org/apache/ranger/db/RangerDaoManager.java | 79 +
.../apache/ranger/db/RangerDaoManagerBase.java | 213 ++
.../java/org/apache/ranger/db/XADaoManager.java | 77 -
.../org/apache/ranger/db/XADaoManagerBase.java | 216 --
.../org/apache/ranger/db/XXAccessAuditDao.java | 7 +-
.../java/org/apache/ranger/db/XXAssetDao.java | 8 +-
.../org/apache/ranger/db/XXAuditMapDao.java | 7 +-
.../org/apache/ranger/db/XXAuthSessionDao.java | 2 +-
.../apache/ranger/db/XXCredentialStoreDao.java | 7 +-
.../java/org/apache/ranger/db/XXDBBaseDao.java | 4 +-
.../java/org/apache/ranger/db/XXGroupDao.java | 10 +-
.../org/apache/ranger/db/XXGroupGroupDao.java | 7 +-
.../org/apache/ranger/db/XXGroupUserDao.java | 7 +-
.../java/org/apache/ranger/db/XXPermMapDao.java | 7 +-
.../ranger/db/XXPolicyExportAuditDao.java | 7 +-
.../org/apache/ranger/db/XXPortalUserDao.java | 4 +-
.../apache/ranger/db/XXPortalUserRoleDao.java | 4 +-
.../org/apache/ranger/db/XXResourceDao.java | 6 +-
.../java/org/apache/ranger/db/XXTrxLogDao.java | 4 +-
.../java/org/apache/ranger/db/XXUserDao.java | 4 +-
.../org/apache/ranger/entity/XXAccessAudit.java | 23 +-
.../java/org/apache/ranger/entity/XXAsset.java | 20 +-
.../org/apache/ranger/entity/XXAuditMap.java | 17 +-
.../org/apache/ranger/entity/XXAuthSession.java | 23 +-
.../apache/ranger/entity/XXCredentialStore.java | 17 +-
.../java/org/apache/ranger/entity/XXDBBase.java | 14 +-
.../java/org/apache/ranger/entity/XXGroup.java | 25 +-
.../org/apache/ranger/entity/XXGroupGroup.java | 17 +-
.../org/apache/ranger/entity/XXGroupUser.java | 17 +-
.../org/apache/ranger/entity/XXPermMap.java | 20 +-
.../ranger/entity/XXPolicyExportAudit.java | 21 +-
.../org/apache/ranger/entity/XXPortalUser.java | 24 +-
.../apache/ranger/entity/XXPortalUserRole.java | 19 +-
.../org/apache/ranger/entity/XXResource.java | 28 +-
.../java/org/apache/ranger/entity/XXTrxLog.java | 20 +-
.../java/org/apache/ranger/entity/XXUser.java | 20 +-
.../apache/ranger/entity/view/VXXTrxLog.java | 16 +-
.../org/apache/ranger/patch/BaseLoader.java | 1 -
.../patch/PatchPasswordEncryption_J10001.java | 4 +-
.../java/org/apache/ranger/rest/AssetREST.java | 33 +-
.../java/org/apache/ranger/rest/PublicAPIs.java | 38 +-
.../java/org/apache/ranger/rest/UserREST.java | 28 +-
.../java/org/apache/ranger/rest/XAuditREST.java | 29 +-
.../java/org/apache/ranger/rest/XUserREST.java | 63 +-
.../security/context/RangerContextHolder.java | 45 +
.../security/context/RangerSecurityContext.java | 58 +
.../security/context/XAContextHolder.java | 45 -
.../security/context/XASecurityContext.java | 58 -
.../RangerDomainObjectSecurityHandler.java | 112 +
.../handler/XADomainObjectSecurityHandler.java | 112 -
.../security/listener/SpringEventListener.java | 18 +-
.../standalone/StandaloneSecurityHandler.java | 30 +-
.../RangerAuthFailureHandler.java | 108 +
.../RangerAuthSuccessHandler.java | 161 ++
.../RangerAuthenticationEntryPoint.java | 106 +
.../authentication/XAAuthFailureHandler.java | 108 -
.../authentication/XAAuthSuccessHandler.java | 161 --
.../XAAuthenticationEntryPoint.java | 106 -
.../RangerSecurityContextFormationFilter.java | 137 ++
...gerUsernamePasswordAuthenticationFilter.java | 52 +
.../XASecurityContextFormationFilter.java | 139 --
.../XAUsernamePasswordAuthenticationFilter.java | 52 -
.../service/AbstractBaseResourceService.java | 20 +-
.../ranger/service/AuthSessionService.java | 6 +-
.../org/apache/ranger/service/UserService.java | 8 +-
.../apache/ranger/service/UserServiceBase.java | 8 +-
.../ranger/service/XAccessAuditService.java | 17 +-
.../ranger/service/XAccessAuditServiceBase.java | 8 +-
.../apache/ranger/service/XAgentService.java | 8 -
.../apache/ranger/service/XAssetService.java | 17 +-
.../ranger/service/XAssetServiceBase.java | 8 +-
.../apache/ranger/service/XAuditMapService.java | 25 +-
.../ranger/service/XAuditMapServiceBase.java | 8 +-
.../ranger/service/XCredentialStoreService.java | 6 +-
.../service/XCredentialStoreServiceBase.java | 8 +-
.../ranger/service/XGroupGroupService.java | 6 +-
.../ranger/service/XGroupGroupServiceBase.java | 8 +-
.../apache/ranger/service/XGroupService.java | 27 +-
.../ranger/service/XGroupServiceBase.java | 8 +-
.../ranger/service/XGroupUserService.java | 26 +-
.../ranger/service/XGroupUserServiceBase.java | 8 +-
.../apache/ranger/service/XPermMapService.java | 38 +-
.../ranger/service/XPermMapServiceBase.java | 8 +-
.../service/XPolicyExportAuditService.java | 6 +-
.../service/XPolicyExportAuditServiceBase.java | 8 +-
.../apache/ranger/service/XPolicyService.java | 4 +-
.../ranger/service/XPortalUserService.java | 10 +-
.../ranger/service/XPortalUserServiceBase.java | 8 +-
.../ranger/service/XRepositoryService.java | 12 +-
.../apache/ranger/service/XResourceService.java | 76 +-
.../ranger/service/XResourceServiceBase.java | 8 +-
.../apache/ranger/service/XTrxLogService.java | 23 +-
.../ranger/service/XTrxLogServiceBase.java | 8 +-
.../org/apache/ranger/service/XUserService.java | 27 +-
.../apache/ranger/service/XUserServiceBase.java | 8 +-
.../service/filter/RangerRESTAPIFilter.java | 278 +++
.../ranger/service/filter/XARESTAPIFilter.java | 280 ---
.../java/org/apache/ranger/util/CLIUtil.java | 2 +-
.../org/apache/ranger/util/RangerEnumUtil.java | 2025 ++++++++++++++++++
.../org/apache/ranger/util/RangerRestUtil.java | 156 ++
.../java/org/apache/ranger/util/RestUtil.java | 6 +-
.../java/org/apache/ranger/util/XAEnumUtil.java | 2024 -----------------
.../java/org/apache/ranger/util/XARestUtil.java | 156 --
.../org/apache/ranger/view/VXAccessAudit.java | 14 +-
.../apache/ranger/view/VXAccessAuditList.java | 9 +-
.../java/org/apache/ranger/view/VXAsset.java | 9 +-
.../org/apache/ranger/view/VXAssetList.java | 9 +-
.../java/org/apache/ranger/view/VXAuditMap.java | 9 +-
.../org/apache/ranger/view/VXAuditMapList.java | 9 +-
.../apache/ranger/view/VXAuditRecordList.java | 3 +-
.../org/apache/ranger/view/VXAuthSession.java | 8 +-
.../apache/ranger/view/VXAuthSessionList.java | 9 +-
.../apache/ranger/view/VXCredentialStore.java | 9 +-
.../ranger/view/VXCredentialStoreList.java | 9 +-
.../org/apache/ranger/view/VXDataObject.java | 9 +-
.../java/org/apache/ranger/view/VXGroup.java | 13 +-
.../org/apache/ranger/view/VXGroupGroup.java | 9 +-
.../apache/ranger/view/VXGroupGroupList.java | 9 +-
.../org/apache/ranger/view/VXGroupList.java | 9 +-
.../org/apache/ranger/view/VXGroupUser.java | 9 +-
.../org/apache/ranger/view/VXGroupUserList.java | 9 +-
.../java/org/apache/ranger/view/VXLong.java | 10 +-
.../java/org/apache/ranger/view/VXMessage.java | 10 +-
.../apache/ranger/view/VXPasswordChange.java | 10 +-
.../java/org/apache/ranger/view/VXPermMap.java | 14 +-
.../org/apache/ranger/view/VXPermMapList.java | 9 +-
.../java/org/apache/ranger/view/VXPermObj.java | 2 +-
.../org/apache/ranger/view/VXPermObjList.java | 9 +-
.../java/org/apache/ranger/view/VXPolicy.java | 6 +-
.../apache/ranger/view/VXPolicyExportAudit.java | 8 +-
.../ranger/view/VXPolicyExportAuditList.java | 9 +-
.../org/apache/ranger/view/VXPolicyList.java | 9 +-
.../org/apache/ranger/view/VXPortalUser.java | 9 +-
.../apache/ranger/view/VXPortalUserList.java | 9 +-
.../org/apache/ranger/view/VXRepository.java | 4 +-
.../apache/ranger/view/VXRepositoryList.java | 9 +-
.../java/org/apache/ranger/view/VXResource.java | 22 +-
.../org/apache/ranger/view/VXResourceList.java | 9 +-
.../java/org/apache/ranger/view/VXResponse.java | 10 +-
.../java/org/apache/ranger/view/VXString.java | 10 +-
.../org/apache/ranger/view/VXStringList.java | 9 +-
.../java/org/apache/ranger/view/VXTrxLog.java | 13 +-
.../org/apache/ranger/view/VXTrxLogList.java | 9 +-
.../java/org/apache/ranger/view/VXUser.java | 9 +-
.../java/org/apache/ranger/view/VXUserList.java | 9 +-
.../conf.dist/security-applicationContext.xml | 10 +-
security-admin/src/main/webapp/WEB-INF/web.xml | 4 +-
.../org/apache/ranger/biz/TestAssetMgr.java | 69 +-
.../apache/ranger/biz/TestRangerBizUtil.java | 547 +++++
.../java/org/apache/ranger/biz/TestUserMgr.java | 17 +-
.../org/apache/ranger/biz/TestXABizUtil.java | 548 -----
.../org/apache/ranger/biz/TestXUserMgr.java | 17 +-
.../org/apache/ranger/common/TestDateUtil.java | 1 -
.../org/apache/ranger/common/TestJSONUtil.java | 6 -
.../ranger/common/TestPropertiesUtil.java | 4 -
.../ranger/common/TestRangerConfigUtil.java | 51 +
.../apache/ranger/common/TestStringUtil.java | 4 -
.../apache/ranger/common/TestXAConfigUtil.java | 55 -
.../org/apache/ranger/rest/TestPublicAPIs.java | 9 +-
.../java/org/apache/ranger/util/BaseTest.java | 3 +-
.../apache/ranger/util/TestRangerEnumUtil.java | 125 ++
.../org/apache/ranger/util/TestXAEnumUtil.java | 126 --
211 files changed, 8627 insertions(+), 8570 deletions(-)
----------------------------------------------------------------------
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/authentication/unix/jaas/RoleUserAuthorityGranter.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/authentication/unix/jaas/RoleUserAuthorityGranter.java b/security-admin/src/main/java/org/apache/ranger/authentication/unix/jaas/RoleUserAuthorityGranter.java
index 19d08f4..efb835f 100644
--- a/security-admin/src/main/java/org/apache/ranger/authentication/unix/jaas/RoleUserAuthorityGranter.java
+++ b/security-admin/src/main/java/org/apache/ranger/authentication/unix/jaas/RoleUserAuthorityGranter.java
@@ -23,7 +23,6 @@ import java.security.Principal;
import java.util.Collections;
import java.util.Set;
-import org.apache.ranger.authentication.unix.jaas.UnixGroupPrincipal;
import org.springframework.security.authentication.jaas.AuthorityGranter;
public class RoleUserAuthorityGranter implements AuthorityGranter {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/biz/AssetConnectionMgr.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/biz/AssetConnectionMgr.java b/security-admin/src/main/java/org/apache/ranger/biz/AssetConnectionMgr.java
index c481e65..da86e1a 100644
--- a/security-admin/src/main/java/org/apache/ranger/biz/AssetConnectionMgr.java
+++ b/security-admin/src/main/java/org/apache/ranger/biz/AssetConnectionMgr.java
@@ -30,7 +30,7 @@ import org.apache.ranger.common.AppConstants;
import org.apache.ranger.common.JSONUtil;
import org.apache.ranger.common.StringUtil;
import org.apache.ranger.common.TimedEventUtil;
-import org.apache.ranger.db.XADaoManager;
+import org.apache.ranger.db.RangerDaoManager;
import org.apache.ranger.entity.XXAsset;
import org.apache.ranger.hadoop.client.HadoopFS;
import org.apache.ranger.hbase.client.HBaseClient;
@@ -62,7 +62,7 @@ public class AssetConnectionMgr {
protected StringUtil stringUtil;
@Autowired
- protected XADaoManager xADaoManager;
+ protected RangerDaoManager rangerDaoManager;
@Autowired
XAssetService xAssetService;
@@ -76,7 +76,7 @@ public class AssetConnectionMgr {
public HadoopFS getHadoopConnection(final String dataSourceName) {
HadoopFS hadoopFS = null;
- XXAsset asset = xADaoManager.getXXAsset().findByAssetName(dataSourceName);
+ XXAsset asset = rangerDaoManager.getXXAsset().findByAssetName(dataSourceName);
if (asset != null) {
// get it from the cache
synchronized (hadoopConnectionCache) {
@@ -148,7 +148,7 @@ public class AssetConnectionMgr {
public HiveClient getHiveConnection(final String dataSourceName) {
HiveClient hiveClient = null;
- XXAsset asset = xADaoManager.getXXAsset().findByAssetName(dataSourceName);
+ XXAsset asset = rangerDaoManager.getXXAsset().findByAssetName(dataSourceName);
if (asset != null) {
// get it from the cache
synchronized (hiveConnectionCache) {
@@ -196,7 +196,7 @@ public class AssetConnectionMgr {
public KnoxClient getKnoxClient(String dataSourceName) {
KnoxClient knoxClient = null;
logger.debug("Getting knoxClient for datasource: " + dataSourceName);
- XXAsset asset = xADaoManager.getXXAsset().findByAssetName(dataSourceName);
+ XXAsset asset = rangerDaoManager.getXXAsset().findByAssetName(dataSourceName);
if (asset == null) {
logger.error("Asset not found with name " + dataSourceName, new Throwable());
} else {
@@ -268,7 +268,7 @@ public class AssetConnectionMgr {
public HBaseClient getHBaseConnection(final String dataSourceName) {
HBaseClient client = null;
- XXAsset asset = xADaoManager.getXXAsset().findByAssetName(
+ XXAsset asset = rangerDaoManager.getXXAsset().findByAssetName(
dataSourceName);
if (asset != null) {
// get it from the cache
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/biz/AssetMgr.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/biz/AssetMgr.java b/security-admin/src/main/java/org/apache/ranger/biz/AssetMgr.java
index 3aebe39..2f42868 100644
--- a/security-admin/src/main/java/org/apache/ranger/biz/AssetMgr.java
+++ b/security-admin/src/main/java/org/apache/ranger/biz/AssetMgr.java
@@ -21,7 +21,6 @@
import java.io.File;
import java.io.IOException;
-import java.net.UnknownHostException;
import java.security.cert.X509Certificate;
import java.sql.Timestamp;
import java.util.ArrayList;
@@ -41,8 +40,6 @@ import javax.naming.ldap.Rdn;
import javax.servlet.http.HttpServletResponse;
import org.apache.commons.lang.StringUtils;
-import org.apache.hadoop.hive.serde2.lazybinary.LazyBinaryUtils.VLong;
-import org.apache.hive.com.esotericsoftware.minlog.Log;
import org.apache.log4j.Logger;
import org.apache.ranger.common.AppConstants;
import org.apache.ranger.common.ContextUtil;
@@ -50,13 +47,13 @@ import org.apache.ranger.common.DateUtil;
import org.apache.ranger.common.JSONUtil;
import org.apache.ranger.common.MessageEnums;
import org.apache.ranger.common.PropertiesUtil;
+import org.apache.ranger.common.RangerCommonEnums;
+import org.apache.ranger.common.RangerConstants;
import org.apache.ranger.common.SearchCriteria;
import org.apache.ranger.common.StringUtil;
import org.apache.ranger.common.TimedEventUtil;
import org.apache.ranger.common.UserSessionBase;
-import org.apache.ranger.common.XACommonEnums;
-import org.apache.ranger.common.XAConstants;
-import org.apache.ranger.db.XADaoManager;
+import org.apache.ranger.db.RangerDaoManager;
import org.apache.ranger.entity.XXAsset;
import org.apache.ranger.entity.XXAuditMap;
import org.apache.ranger.entity.XXGroup;
@@ -126,19 +123,19 @@ public class AssetMgr extends AssetMgrBase {
AssetConnectionMgr assetConnectionMgr;
@Autowired
- XABizUtil msBizUtil;
+ RangerBizUtil msBizUtil;
@Autowired
StringUtil stringUtil;
@Autowired
- XADaoManager xADaoManager;
+ RangerDaoManager rangerDaoManager;
@Autowired
XUserService xUserService;
@Autowired
- XABizUtil xaBizUtil;
+ RangerBizUtil xaBizUtil;
@Autowired
XTrxLogService xTrxLogService;
@@ -171,14 +168,14 @@ public class AssetMgr extends AssetMgrBase {
}
Long assetId = vXResource.getAssetId();
- XXAsset xAsset = xADaoManager.getXXAsset().getById(assetId);
+ XXAsset xAsset = rangerDaoManager.getXXAsset().getById(assetId);
if (xAsset == null) {
logger.error("Repository not found for assetId : " + assetId);
throw restErrorUtil.create403RESTException("Repository for which"
+ " the policy is created, doesn't exist.");
}
- if(xAsset.getActiveStatus()==XACommonEnums.ACT_STATUS_DISABLED){
+ if(xAsset.getActiveStatus()==RangerCommonEnums.ACT_STATUS_DISABLED){
if(!session.isUserAdmin()){
logger.error("Trying to create/update policy in disabled repository");
throw restErrorUtil.createRESTException("Resource "
@@ -239,7 +236,7 @@ public class AssetMgr extends AssetMgrBase {
throw restErrorUtil.createRESTException(vXResponse);
}
- if (vXResource.getCheckParentPermission() != XAConstants.BOOL_FALSE) {
+ if (vXResource.getCheckParentPermission() != RangerConstants.BOOL_FALSE) {
// check parent access for user and group
xResourceService.checkAccess(vXResource);
}
@@ -316,14 +313,14 @@ public class AssetMgr extends AssetMgrBase {
}
Long assetId = vXResource.getAssetId();
- XXAsset xAsset = xADaoManager.getXXAsset().getById(assetId);
+ XXAsset xAsset = rangerDaoManager.getXXAsset().getById(assetId);
if (xAsset == null) {
throw restErrorUtil.createRESTException("The repository for which "
+ "you're updating policy, doesn't exist.",
MessageEnums.INVALID_INPUT_DATA);
}
- if(xAsset.getActiveStatus()==XACommonEnums.STATUS_DISABLED){
+ if(xAsset.getActiveStatus()==RangerCommonEnums.STATUS_DISABLED){
if(!currentUserSession.isUserAdmin()){
logger.error("Trying to update policy in disabled repository");
throw restErrorUtil.createRESTException("Resource "
@@ -375,7 +372,7 @@ public class AssetMgr extends AssetMgrBase {
throw restErrorUtil.createRESTException(vXResponse);
}
- if (vXResource.getCheckParentPermission() != XAConstants.BOOL_FALSE) {
+ if (vXResource.getCheckParentPermission() != RangerConstants.BOOL_FALSE) {
// check parent access for user and group
xResourceService.checkAccess(vXResource);
}
@@ -446,7 +443,7 @@ public class AssetMgr extends AssetMgrBase {
//policyName creation and validation logic end here
- XXResource xResouce = xADaoManager.getXXResource().getById(
+ XXResource xResouce = rangerDaoManager.getXXResource().getById(
vXResource.getId());
List<XXTrxLog> trxLogList = xResourceService.getTransactionLog(
@@ -475,7 +472,7 @@ public class AssetMgr extends AssetMgrBase {
for (VXPermMap newObj : newPermMapList) {
if (newObj.getUserId() == null && newObj.getGroupId() == null
&& !stringUtil.isEmpty(newObj.getUserName())) {
- XXUser xxUser = xADaoManager.getXXUser().findByUserName(
+ XXUser xxUser = rangerDaoManager.getXXUser().findByUserName(
newObj.getUserName());
if (xxUser != null) {
newObj.setUserId(xxUser.getId());
@@ -634,14 +631,14 @@ public class AssetMgr extends AssetMgrBase {
}
Long assetId = vResource.getAssetId();
- XXAsset xAsset = xADaoManager.getXXAsset().getById(assetId);
+ XXAsset xAsset = rangerDaoManager.getXXAsset().getById(assetId);
if (xAsset == null) {
throw restErrorUtil.createRESTException("The repository for which "
+ "you're deleting policy, doesn't exist.",
MessageEnums.INVALID_INPUT_DATA);
}
- if(xAsset.getActiveStatus()==XACommonEnums.STATUS_DISABLED){
+ if(xAsset.getActiveStatus()==RangerCommonEnums.STATUS_DISABLED){
if(!currentUserSession.isUserAdmin()){
logger.error("Trying to delete policy in disabled repository");
throw restErrorUtil.createRESTException("Resource "
@@ -785,13 +782,13 @@ public class AssetMgr extends AssetMgrBase {
X509Certificate[] certchain, boolean httpEnabled, String epoch,
String ipAddress, boolean isSecure, String count, String agentId) {
- XXAsset xAsset = xADaoManager.getXXAsset().findByAssetName(repository);
+ XXAsset xAsset = rangerDaoManager.getXXAsset().findByAssetName(repository);
if(xAsset==null){
logger.error("Requested repository not found");
throw restErrorUtil.createRESTException("No Data Found.",
MessageEnums.DATA_NOT_FOUND);
}
- if(xAsset.getActiveStatus()==XACommonEnums.ACT_STATUS_DISABLED){
+ if(xAsset.getActiveStatus()==RangerCommonEnums.ACT_STATUS_DISABLED){
logger.error("Requested repository is disabled");
throw restErrorUtil.createRESTException("Unauthorized access.",
MessageEnums.OPER_NO_EXPORT);
@@ -923,7 +920,7 @@ public class AssetMgr extends AssetMgrBase {
// //////////////////////////////////////
// Get latest updated time of repository
// //////////////////////////////////////
- Timestamp luTime = xADaoManager.getXXResource()
+ Timestamp luTime = rangerDaoManager.getXXResource()
.getMaxUpdateTimeForAssetName(repository);
HashMap<String, Object> updatedRepo = new HashMap<String, Object>();
@@ -943,7 +940,7 @@ public class AssetMgr extends AssetMgrBase {
if(epochTime == updatedTime) {
//TODO: instead of getting entire list, get just count(*) for the given repository
- xResourceList = xADaoManager.getXXResource().findUpdatedResourcesByAssetName(repository, new Date(0L));
+ xResourceList = rangerDaoManager.getXXResource().findUpdatedResourcesByAssetName(repository, new Date(0L));
int resourceListSz = (xResourceList == null) ? 0 : xResourceList.size() ;
@@ -958,7 +955,7 @@ public class AssetMgr extends AssetMgrBase {
}
} else {
- xResourceList = xADaoManager.getXXResource().findUpdatedResourcesByAssetName(repository, new Date(0L));
+ xResourceList = rangerDaoManager.getXXResource().findUpdatedResourcesByAssetName(repository, new Date(0L));
}
@@ -970,13 +967,13 @@ public class AssetMgr extends AssetMgrBase {
resourceMap.put("resource", xResource.getName());
resourceMap.put("isRecursive",
getBooleanValue(xResource.getIsRecursive()));
- resourceMap.put("policyStatus", XACommonEnums
+ resourceMap.put("policyStatus", RangerCommonEnums
.getLabelFor_ActiveStatus(xResource
.getResourceStatus()));
// resourceMap.put("isEncrypt",
// AKAConstants.getLabelFor_BooleanValue(xResource.getIsEncrypt()));
populatePermMap(xResource, resourceMap, AppConstants.ASSET_HDFS);
- List<XXAuditMap> xAuditMaps = xADaoManager.getXXAuditMap()
+ List<XXAuditMap> xAuditMaps = rangerDaoManager.getXXAuditMap()
.findByResourceId(xResource.getId());
if (xAuditMaps.size() != 0) {
resourceMap.put("audit", 1);
@@ -991,7 +988,7 @@ public class AssetMgr extends AssetMgrBase {
HashMap<String, Object> resourceMap = new HashMap<String, Object>();
resourceMap.put("id", xResource.getId());
resourceMap.put("database_name", xResource.getDatabases());
- resourceMap.put("policyStatus", XACommonEnums
+ resourceMap.put("policyStatus", RangerCommonEnums
.getLabelFor_ActiveStatus(xResource
.getResourceStatus()));
resourceMap.put("tablePolicyType", AppConstants
@@ -1009,7 +1006,7 @@ public class AssetMgr extends AssetMgrBase {
}
populatePermMap(xResource, resourceMap, AppConstants.ASSET_HIVE);
- List<XXAuditMap> xAuditMaps = xADaoManager.getXXAuditMap()
+ List<XXAuditMap> xAuditMaps = rangerDaoManager.getXXAuditMap()
.findByResourceId(xResource.getId());
if (xAuditMaps.size() != 0) {
resourceMap.put("audit", 1);
@@ -1029,7 +1026,7 @@ public class AssetMgr extends AssetMgrBase {
resourceMap.put("column_name", xResource.getColumns());
resourceMap.put("column_families",
xResource.getColumnFamilies());
- resourceMap.put("policyStatus", XACommonEnums
+ resourceMap.put("policyStatus", RangerCommonEnums
.getLabelFor_ActiveStatus(xResource
.getResourceStatus()));
if (xResource.getIsEncrypt() == 1) {
@@ -1040,7 +1037,7 @@ public class AssetMgr extends AssetMgrBase {
// resourceMap.put("isEncrypt",
// AKAConstants.getLabelFor_BooleanValue(xResource.getIsEncrypt()));
populatePermMap(xResource, resourceMap, AppConstants.ASSET_HBASE);
- List<XXAuditMap> xAuditMaps = xADaoManager.getXXAuditMap()
+ List<XXAuditMap> xAuditMaps = rangerDaoManager.getXXAuditMap()
.findByResourceId(xResource.getId());
if (xAuditMaps.size() != 0) {
resourceMap.put("audit", 1);
@@ -1057,7 +1054,7 @@ public class AssetMgr extends AssetMgrBase {
resourceMap.put("id", xResource.getId());
resourceMap.put("topology_name", xResource.getTopologies()) ;
resourceMap.put("service_name", xResource.getServices()) ;
- resourceMap.put("policyStatus", XACommonEnums
+ resourceMap.put("policyStatus", RangerCommonEnums
.getLabelFor_ActiveStatus(xResource
.getResourceStatus()));
if (xResource.getIsEncrypt() == 1) {
@@ -1068,7 +1065,7 @@ public class AssetMgr extends AssetMgrBase {
// resourceMap.put("isEncrypt",
// AKAConstants.getLabelFor_BooleanValue(xResource.getIsEncrypt()));
populatePermMap(xResource, resourceMap, AppConstants.ASSET_KNOX);
- List<XXAuditMap> xAuditMaps = xADaoManager.getXXAuditMap()
+ List<XXAuditMap> xAuditMaps = rangerDaoManager.getXXAuditMap()
.findByResourceId(xResource.getId());
if (xAuditMaps.size() != 0) {
resourceMap.put("audit", 1);
@@ -1085,7 +1082,7 @@ public class AssetMgr extends AssetMgrBase {
resourceMap.put("id", xResource.getId());
resourceMap.put("topology_name", xResource.getTopologies()) ;
- resourceMap.put("policyStatus", XACommonEnums
+ resourceMap.put("policyStatus", RangerCommonEnums
.getLabelFor_ActiveStatus(xResource
.getResourceStatus()));
if (xResource.getIsEncrypt() == 1) {
@@ -1094,7 +1091,7 @@ public class AssetMgr extends AssetMgrBase {
resourceMap.put("encrypt", 0);
}
populatePermMap(xResource, resourceMap, AppConstants.ASSET_STORM);
- List<XXAuditMap> xAuditMaps = xADaoManager.getXXAuditMap()
+ List<XXAuditMap> xAuditMaps = rangerDaoManager.getXXAuditMap()
.findByResourceId(xResource.getId());
if (xAuditMaps.size() != 0) {
resourceMap.put("audit", 1);
@@ -1285,14 +1282,14 @@ public class AssetMgr extends AssetMgrBase {
vXResource = xResourceService.createResource(vXResource);
if (userName != null && !userName.isEmpty()) {
- XXUser xxUser = xADaoManager.getXXUser().findByUserName(userName);
+ XXUser xxUser = rangerDaoManager.getXXUser().findByUserName(userName);
VXUser vXUser;
if (xxUser != null) {
vXUser = xUserService.populateViewBean(xxUser);
} else {
vXUser = new VXUser();
vXUser.setName(userName);
- vXUser.setUserSource(XACommonEnums.USER_EXTERNAL);
+ vXUser.setUserSource(RangerCommonEnums.USER_EXTERNAL);
vXUser=xUserMgr.createXUser(vXUser);
//vXUser = xUserService.createResource(vXUser);
}
@@ -1366,10 +1363,10 @@ public class AssetMgr extends AssetMgrBase {
defaultConfig=xAssetService.getConfigWithEncryptedPassword(defaultConfig,true);
vXAsset.setConfig(defaultConfig);
}
- XXAsset xAsset = xADaoManager.getXXAsset()
+ XXAsset xAsset = rangerDaoManager.getXXAsset()
.getById(vXAsset.getId());
- if (xAsset.getActiveStatus() == XACommonEnums.STATUS_DELETED) {
+ if (xAsset.getActiveStatus() == RangerCommonEnums.STATUS_DELETED) {
logger.error("Trying to update Asset which is soft deleted");
throw restErrorUtil.createRESTException(
"Repository that you want to update does not exist.",
@@ -1400,7 +1397,7 @@ public class AssetMgr extends AssetMgrBase {
if (usb != null && usb.isUserAdmin() && force) {
VXAsset vxAsset = xAssetService.readResource(id);
- if (vxAsset.getActiveStatus() == XACommonEnums.STATUS_DELETED) {
+ if (vxAsset.getActiveStatus() == RangerCommonEnums.STATUS_DELETED) {
logger.error("Trying to delete Asset which is already soft deleted");
throw restErrorUtil.createRESTException(
"Repository not found or its already deleted, for Id : "
@@ -1416,7 +1413,7 @@ public class AssetMgr extends AssetMgrBase {
deleteXResource(resource.getId(), true);
}
}
- vxAsset.setActiveStatus(XACommonEnums.STATUS_DELETED);
+ vxAsset.setActiveStatus(RangerCommonEnums.STATUS_DELETED);
xAssetService.updateResource(vxAsset);
List<XXTrxLog> trxLogList = xAssetService.getTransactionLog(
vxAsset, "delete");
@@ -1570,7 +1567,7 @@ public class AssetMgr extends AssetMgrBase {
public VXResponse testConfig(VXAsset vXAsset) {
- if (vXAsset.getActiveStatus() == XACommonEnums.STATUS_DELETED) {
+ if (vXAsset.getActiveStatus() == RangerCommonEnums.STATUS_DELETED) {
logger.error("Trying to test Asset which is soft deleted");
throw restErrorUtil.createRESTException(
"Repository not found, Repository Name : " + vXAsset.getName(),
@@ -1592,7 +1589,7 @@ public class AssetMgr extends AssetMgrBase {
if (password != null && password.equals(hiddenPasswordString)) {
String assetName = vXAsset.getName();
if (assetName != null) {
- XXAsset existingVXAsset = xADaoManager.getXXAsset()
+ XXAsset existingVXAsset = rangerDaoManager.getXXAsset()
.findByAssetName(assetName);
if (existingVXAsset != null
&& existingVXAsset.getConfig() != null) {
@@ -1968,7 +1965,7 @@ public class AssetMgr extends AssetMgrBase {
@SuppressWarnings("unchecked")
private HashMap<String, Object> populatePermMap(XXResource xResource,
HashMap<String, Object> resourceMap, int assetType) {
- List<XXPermMap> xPermMapList = xADaoManager.getXXPermMap()
+ List<XXPermMap> xPermMapList = rangerDaoManager.getXXPermMap()
.findByResourceId(xResource.getId());
Set<Long> groupList = new HashSet<Long>();
@@ -1993,7 +1990,7 @@ public class AssetMgr extends AssetMgrBase {
if (groupId != null) {
Set<String> groups = (Set<String>) sortedPermMap
.get("groups");
- XXGroup xGroup = xADaoManager.getXXGroup()
+ XXGroup xGroup = rangerDaoManager.getXXGroup()
.getById(groupId);
if(xGroup!=null && groups != null){
groups.add(xGroup.getName());
@@ -2002,7 +1999,7 @@ public class AssetMgr extends AssetMgrBase {
} else if (userId != null) {
Set<String> users = (Set<String>) sortedPermMap
.get("users");
- XXUser xUser = xADaoManager.getXXUser().getById(
+ XXUser xUser = rangerDaoManager.getXXUser().getById(
userId);
if (users != null && xUser != null) {
users.add(xUser.getName());
@@ -2043,14 +2040,14 @@ public class AssetMgr extends AssetMgrBase {
if (groupId != null) {
Set<String> groupSet = new HashSet<String>();
- XXGroup xGroup = xADaoManager.getXXGroup().getById(
+ XXGroup xGroup = rangerDaoManager.getXXGroup().getById(
xPermMap.getGroupId());
String group = xGroup.getName();
groupSet.add(group);
sortedPermMap.put("groups", groupSet);
} else if (userId != null) {
Set<String> userSet = new HashSet<String>();
- XXUser xUser = xADaoManager.getXXUser()
+ XXUser xUser = rangerDaoManager.getXXUser()
.getById(userId);
String user = xUser.getName();
userSet.add(user);
@@ -2095,7 +2092,7 @@ public class AssetMgr extends AssetMgrBase {
public void UpdateDefaultPolicyUserAndPerm(VXResource vXResource,
String userName) {
if (userName != null && !userName.isEmpty()) {
- XXUser xxUser = xADaoManager.getXXUser().findByUserName(userName);
+ XXUser xxUser = rangerDaoManager.getXXUser().findByUserName(userName);
VXUser vXUser;
if (xxUser != null) {
vXUser = xUserService.populateViewBean(xxUser);
@@ -2108,7 +2105,7 @@ public class AssetMgr extends AssetMgrBase {
}
// fetch old permission and consider only one permission for default
// policy
- List<XXPermMap> xxPermMapList = xADaoManager.getXXPermMap()
+ List<XXPermMap> xxPermMapList = rangerDaoManager.getXXPermMap()
.findByResourceId(vXResource.getId());
VXPermMap vXPermMap = null;
if (xxPermMapList != null && xxPermMapList.size() != 0) {
@@ -2136,17 +2133,17 @@ public class AssetMgr extends AssetMgrBase {
List<XXResource> xxResourceList = new ArrayList<XXResource>();
if (assetType == AppConstants.ASSET_HDFS) {
resourceName = "/*";
- xxResourceList = xADaoManager.getXXResource()
+ xxResourceList = rangerDaoManager.getXXResource()
.findByResourceNameAndAssetIdAndRecursiveFlag(resourceName,
assetId, AppConstants.BOOL_TRUE);
} else if (assetType == AppConstants.ASSET_HIVE) {
resourceName = "/*/*/*";
- xxResourceList = xADaoManager.getXXResource()
+ xxResourceList = rangerDaoManager.getXXResource()
.findByResourceNameAndAssetIdAndResourceType(resourceName,
assetId, AppConstants.RESOURCE_UNKNOWN);
} else if (assetType == AppConstants.ASSET_HBASE) {
resourceName = "/*/*/*";
- xxResourceList = xADaoManager.getXXResource()
+ xxResourceList = rangerDaoManager.getXXResource()
.findByResourceNameAndAssetIdAndResourceType(resourceName,
assetId, AppConstants.RESOURCE_UNKNOWN);
}
@@ -2184,7 +2181,7 @@ public class AssetMgr extends AssetMgrBase {
return null;
}
}
- return xADaoManager.getXXPolicyExportAudit().create(
+ return rangerDaoManager.getXXPolicyExportAudit().create(
xXPolicyExportAudit);
}
});
@@ -2216,7 +2213,7 @@ public class AssetMgr extends AssetMgrBase {
searchCriteria.getParamList().put("endDate", temp);
}
if (searchCriteria.getParamList().containsKey("owner")) {
- XXPortalUser xXPortalUser= xADaoManager.getXXPortalUser().findByLoginId(
+ XXPortalUser xXPortalUser= rangerDaoManager.getXXPortalUser().findByLoginId(
(searchCriteria.getParamList().get("owner").toString()));
if(xXPortalUser!=null){
searchCriteria.getParamList().put("owner", xXPortalUser.getId());
@@ -2268,7 +2265,7 @@ public class AssetMgr extends AssetMgrBase {
}
public VXTrxLogList getTransactionReport(String transactionId) {
- List<XXTrxLog> xTrxLogList = xADaoManager.getXXTrxLog()
+ List<XXTrxLog> xTrxLogList = rangerDaoManager.getXXTrxLog()
.findByTransactionId(transactionId);
VXTrxLogList vXTrxLogList = new VXTrxLogList();
List<VXTrxLog> vXTrxLogs = vXTrxLogList.getVXTrxLogs();
@@ -2362,7 +2359,7 @@ public class AssetMgr extends AssetMgrBase {
VXAsset vXAsset=null;
if (currentUserSession.isUserAdmin()) {
vXAsset = xAssetService.readResource(id);
- if (vXAsset.getActiveStatus() == XACommonEnums.STATUS_DELETED) {
+ if (vXAsset.getActiveStatus() == RangerCommonEnums.STATUS_DELETED) {
logger.error("Trying to read Asset which is soft deleted");
throw restErrorUtil.createRESTException(
"Repository not found for this Id : " + id,
@@ -2370,9 +2367,9 @@ public class AssetMgr extends AssetMgrBase {
"Repository does not exist for this Id : " + id);
}
}else{
- XXAsset xXAsset=xADaoManager.getXXAsset().getById(id);
+ XXAsset xXAsset=rangerDaoManager.getXXAsset().getById(id);
- if (xXAsset.getActiveStatus() == XACommonEnums.STATUS_DELETED) {
+ if (xXAsset.getActiveStatus() == RangerCommonEnums.STATUS_DELETED) {
logger.error("Trying to read Asset which is soft deleted");
throw restErrorUtil.createRESTException(
"Repository not found for this Id : " + id,
@@ -2381,13 +2378,13 @@ public class AssetMgr extends AssetMgrBase {
}
vXAsset=xAssetService.populateViewBean(xXAsset);
- /*List<XXResource> xXResourceList=xADaoManager
+ /*List<XXResource> xXResourceList=rangerDaoManager
.getXXResource().findByAssetId(id);
for (XXResource xXResource : xXResourceList) {
VXResponse vXResponse = xaBizUtil.hasPermission(xResourceService.populateViewBean(xXResource),
AppConstants.XA_PERM_TYPE_ADMIN);
if(vXResponse.getStatusCode() == VXResponse.STATUS_SUCCESS){
- XXAsset xXAsset=xADaoManager.getXXAsset().getById(id);
+ XXAsset xXAsset=rangerDaoManager.getXXAsset().getById(id);
vXAsset=xAssetService.populateViewBean(xXAsset);
break;
}
@@ -2419,14 +2416,14 @@ public class AssetMgr extends AssetMgrBase {
}
vXResource = xResourceService.createResource(vXResource);
if (userName != null && !userName.isEmpty()) {
- XXUser xxUser = xADaoManager.getXXUser().findByUserName(userName);
+ XXUser xxUser = rangerDaoManager.getXXUser().findByUserName(userName);
VXUser vXUser;
if (xxUser != null) {
vXUser = xUserService.populateViewBean(xxUser);
} else {
vXUser = new VXUser();
vXUser.setName(userName);
- vXUser.setUserSource(XACommonEnums.USER_EXTERNAL);
+ vXUser.setUserSource(RangerCommonEnums.USER_EXTERNAL);
vXUser=xUserMgr.createXUser(vXUser);
//vXUser = xUserService.createResource(vXUser);
}
@@ -2468,13 +2465,13 @@ public class AssetMgr extends AssetMgrBase {
throw restErrorUtil.createRESTException("Unauthorized access.",
MessageEnums.OPER_NOT_ALLOWED_FOR_ENTITY);
}
- XXAsset xAsset = xADaoManager.getXXAsset().findByAssetName(repository);
+ XXAsset xAsset = rangerDaoManager.getXXAsset().findByAssetName(repository);
if(xAsset==null){
logger.error("Requested repository not found");
throw restErrorUtil.createRESTException("No Data Found.",
MessageEnums.DATA_NOT_FOUND);
}
- if(xAsset.getActiveStatus()==XACommonEnums.ACT_STATUS_DISABLED){
+ if(xAsset.getActiveStatus()==RangerCommonEnums.ACT_STATUS_DISABLED){
logger.error("Requested repository is disabled");
throw restErrorUtil.createRESTException("Unauthorized access.",
MessageEnums.OPER_NOT_ALLOWED_FOR_STATE);
@@ -2538,25 +2535,25 @@ public class AssetMgr extends AssetMgrBase {
}
//checks user exists or not
- XXUser xUser = xADaoManager.getXXUser().findByUserName(vXResource.getOwner());
+ XXUser xUser = rangerDaoManager.getXXUser().findByUserName(vXResource.getOwner());
if(xUser==null){
throw restErrorUtil.createRESTException("User " +vXResource.getOwner() + " is Not Found",
MessageEnums.DATA_NOT_FOUND);
}
- XXPortalUser xXPortalUser= xADaoManager.getXXPortalUser().findByLoginId(vXResource.getOwner());
+ XXPortalUser xXPortalUser= rangerDaoManager.getXXPortalUser().findByLoginId(vXResource.getOwner());
if(xXPortalUser==null){
throw restErrorUtil.createRESTException("User " +vXResource.getOwner() + " is Not Found",
MessageEnums.DATA_NOT_FOUND);
}
//checks repository exists or not
- XXAsset xAsset = xADaoManager.getXXAsset().findByAssetName(vXResource.getAssetName());
+ XXAsset xAsset = rangerDaoManager.getXXAsset().findByAssetName(vXResource.getAssetName());
if (xAsset == null) {
logger.error("Repository not found for asset : " + vXResource.getAssetName());
throw restErrorUtil.createRESTException("Repository for which"
+ " the policy is created, doesn't exist.",MessageEnums.DATA_NOT_FOUND);
}
//checks repository active or not
- if(xAsset.getActiveStatus()==XACommonEnums.ACT_STATUS_DISABLED){
+ if(xAsset.getActiveStatus()==RangerCommonEnums.ACT_STATUS_DISABLED){
logger.error("Trying to create/update policy in disabled repository");
throw restErrorUtil.createRESTException("Resource "
+ "creation/updation not allowed in disabled repository",MessageEnums.OPER_NO_PERMISSION);
@@ -2589,13 +2586,13 @@ public class AssetMgr extends AssetMgrBase {
}
//checks user is admin in resource or not
- List<XXResource> xResourceList=xADaoManager.getXXResource().findByAssetId(xAsset.getId());
+ List<XXResource> xResourceList=rangerDaoManager.getXXResource().findByAssetId(xAsset.getId());
if(xResourceList!=null){
boolean isAdmin=false;
- List<XXPortalUserRole> xXPortalUserRoleList = xADaoManager.getXXPortalUserRole().findByParentId(xXPortalUser.getId());
+ List<XXPortalUserRole> xXPortalUserRoleList = rangerDaoManager.getXXPortalUserRole().findByParentId(xXPortalUser.getId());
if(xXPortalUserRoleList!=null && xXPortalUserRoleList.size()>0){
for(XXPortalUserRole xXPortalUserRole: xXPortalUserRoleList){
- if(xXPortalUserRole.getUserRole().equalsIgnoreCase(XAConstants.ROLE_SYS_ADMIN)){
+ if(xXPortalUserRole.getUserRole().equalsIgnoreCase(RangerConstants.ROLE_SYS_ADMIN)){
isAdmin=true;
break;
}
@@ -2703,7 +2700,7 @@ public class AssetMgr extends AssetMgrBase {
}
if(vXPermMapTemp.getPermFor()==AppConstants.XA_PERM_FOR_USER){
if(vXPermMapTemp.getUserId()==null && !stringUtil.isEmpty(vXPermMapTemp.getUserName())){
- xxUser = xADaoManager.getXXUser().findByUserName(vXPermMapTemp.getUserName());
+ xxUser = rangerDaoManager.getXXUser().findByUserName(vXPermMapTemp.getUserName());
if (xxUser != null) {
vXPermMapTemp.setUserId(xxUser.getId());
} else{
@@ -2714,7 +2711,7 @@ public class AssetMgr extends AssetMgrBase {
}
if(vXPermMapTemp.getPermFor()==AppConstants.XA_PERM_FOR_GROUP){
if(vXPermMapTemp.getGroupId()==null && !stringUtil.isEmpty(vXPermMapTemp.getGroupName())){
- xxGroup = xADaoManager.getXXGroup().findByGroupName(
+ xxGroup = rangerDaoManager.getXXGroup().findByGroupName(
vXPermMapTemp.getGroupName());
if (xxGroup != null) {
vXPermMapTemp.setGroupId(xxGroup.getId());
@@ -2759,7 +2756,7 @@ public class AssetMgr extends AssetMgrBase {
if(vXResourceList!=null && vXResourceList.getListSize()>0){
//replace perm map if true
if(vXPolicy.isReplacePerm()){
- XXResource xXResource = xADaoManager.getXXResource().getById(vXResource.getId());
+ XXResource xXResource = rangerDaoManager.getXXResource().getById(vXResource.getId());
VXResource vXResourceDBObj=xResourceService.populateViewBean(xXResource);
List<XXTrxLog> trxLogListDelete = xResourceService.getTransactionLog(
vXResourceDBObj, xXResource, "delete");
@@ -2806,7 +2803,7 @@ public class AssetMgr extends AssetMgrBase {
//update case
if(vXResourceList!=null && vXResourceList.getListSize()>0){
- XXResource xXResource = xADaoManager.getXXResource().getById(vXResource.getId());
+ XXResource xXResource = rangerDaoManager.getXXResource().getById(vXResource.getId());
vXResource.setCreateDate(xXResource.getCreateTime());
vXResource.setUpdateDate(xXResource.getUpdateTime());
trxLogList = xResourceService.getTransactionLog(vXResource, xXResource, "update");
@@ -2912,26 +2909,26 @@ public class AssetMgr extends AssetMgrBase {
return vXResource;
}
//checks user exists or not
- XXUser xUser = xADaoManager.getXXUser().findByUserName(vXResource.getOwner());
+ XXUser xUser = rangerDaoManager.getXXUser().findByUserName(vXResource.getOwner());
if(xUser==null){
throw restErrorUtil.createRESTException("User " +vXResource.getOwner() + " is Not Found",
MessageEnums.DATA_NOT_FOUND);
}
- XXPortalUser xXPortalUser= xADaoManager.getXXPortalUser().findByLoginId(vXResource.getOwner());
+ XXPortalUser xXPortalUser= rangerDaoManager.getXXPortalUser().findByLoginId(vXResource.getOwner());
if(xXPortalUser==null){
throw restErrorUtil.createRESTException("User " +vXResource.getOwner() + " is Not Found",
MessageEnums.DATA_NOT_FOUND);
}
//checks repository exists or not
- XXAsset xAsset = xADaoManager.getXXAsset().findByAssetName(vXResource.getAssetName());
+ XXAsset xAsset = rangerDaoManager.getXXAsset().findByAssetName(vXResource.getAssetName());
if (xAsset == null) {
logger.error("Repository not found for asset : " + vXResource.getAssetName());
throw restErrorUtil.createRESTException("Repository for which"
+ " the policy is created, doesn't exist.",MessageEnums.DATA_NOT_FOUND);
}
//checks repository active or not
- if(xAsset.getActiveStatus()==XACommonEnums.ACT_STATUS_DISABLED){
+ if(xAsset.getActiveStatus()==RangerCommonEnums.ACT_STATUS_DISABLED){
logger.error("Trying to delete policy in disabled repository");
throw restErrorUtil.createRESTException("revoke "
+ " not allowed in disabled repository",MessageEnums.OPER_NO_PERMISSION);
@@ -2990,13 +2987,13 @@ public class AssetMgr extends AssetMgrBase {
}
//checks grantor is admin in resource or not
- List<XXPortalUserRole> xXPortalUserRoleList = xADaoManager.getXXPortalUserRole().findByParentId(xXPortalUser.getId());
- List<XXResource> xResourceList=xADaoManager.getXXResource().findByAssetId(xAsset.getId());
+ List<XXPortalUserRole> xXPortalUserRoleList = rangerDaoManager.getXXPortalUserRole().findByParentId(xXPortalUser.getId());
+ List<XXResource> xResourceList=rangerDaoManager.getXXResource().findByAssetId(xAsset.getId());
if(xResourceList!=null){
boolean isAdmin=false;
if(xXPortalUserRoleList!=null && xXPortalUserRoleList.size()>0){
for(XXPortalUserRole xXPortalUserRole: xXPortalUserRoleList){
- if(xXPortalUserRole.getUserRole().equalsIgnoreCase(XAConstants.ROLE_SYS_ADMIN)){
+ if(xXPortalUserRole.getUserRole().equalsIgnoreCase(RangerConstants.ROLE_SYS_ADMIN)){
isAdmin=true;
break;
}
@@ -3052,7 +3049,7 @@ public class AssetMgr extends AssetMgrBase {
}
if(vXPermMapTemp.getPermFor()==AppConstants.XA_PERM_FOR_USER){
if(vXPermMapTemp.getUserId()==null && !stringUtil.isEmpty(vXPermMapTemp.getUserName())){
- xxUser = xADaoManager.getXXUser().findByUserName(vXPermMapTemp.getUserName());
+ xxUser = rangerDaoManager.getXXUser().findByUserName(vXPermMapTemp.getUserName());
if (xxUser != null) {
vXPermMapTemp.setUserId(xxUser.getId());
} else{
@@ -3063,7 +3060,7 @@ public class AssetMgr extends AssetMgrBase {
}
if(vXPermMapTemp.getPermFor()==AppConstants.XA_PERM_FOR_GROUP){
if(vXPermMapTemp.getGroupId()==null && !stringUtil.isEmpty(vXPermMapTemp.getGroupName())){
- xxGroup = xADaoManager.getXXGroup().findByGroupName(
+ xxGroup = rangerDaoManager.getXXGroup().findByGroupName(
vXPermMapTemp.getGroupName());
if (xxGroup != null) {
vXPermMapTemp.setGroupId(xxGroup.getId());
@@ -3079,7 +3076,7 @@ public class AssetMgr extends AssetMgrBase {
vXResource.setPermMapList(permMapList);
//permission deletion preprocessing
- XXResource xResource = xADaoManager.getXXResource().getById(
+ XXResource xResource = rangerDaoManager.getXXResource().getById(
vXResource.getId());
vXResource.setCreateDate(xResource.getCreateTime());
vXResource.setUpdateDate(xResource.getUpdateTime());
@@ -3180,7 +3177,7 @@ public class AssetMgr extends AssetMgrBase {
public VXStringList getStormResources(final String dataSourceName,String topologyName) {
VXStringList ret = null ;
- XXAsset asset = xADaoManager.getXXAsset().findByAssetName(dataSourceName);
+ XXAsset asset = rangerDaoManager.getXXAsset().findByAssetName(dataSourceName);
String config = asset.getConfig() ;
if(!stringUtil.isEmpty(config)){
config=xAssetService.getConfigWithDecryptedPassword(config);
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/biz/AssetMgrBase.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/biz/AssetMgrBase.java b/security-admin/src/main/java/org/apache/ranger/biz/AssetMgrBase.java
index 55320b8..9e8a596 100644
--- a/security-admin/src/main/java/org/apache/ranger/biz/AssetMgrBase.java
+++ b/security-admin/src/main/java/org/apache/ranger/biz/AssetMgrBase.java
@@ -19,9 +19,22 @@
package org.apache.ranger.biz;
-import org.apache.ranger.common.*;
-import org.apache.ranger.service.*;
-import org.apache.ranger.view.*;
+import org.apache.ranger.common.MessageEnums;
+import org.apache.ranger.common.RESTErrorUtil;
+import org.apache.ranger.common.SearchCriteria;
+import org.apache.ranger.service.XAssetService;
+import org.apache.ranger.service.XCredentialStoreService;
+import org.apache.ranger.service.XPolicyExportAuditService;
+import org.apache.ranger.service.XResourceService;
+import org.apache.ranger.view.VXAsset;
+import org.apache.ranger.view.VXAssetList;
+import org.apache.ranger.view.VXCredentialStore;
+import org.apache.ranger.view.VXCredentialStoreList;
+import org.apache.ranger.view.VXLong;
+import org.apache.ranger.view.VXPolicyExportAudit;
+import org.apache.ranger.view.VXPolicyExportAuditList;
+import org.apache.ranger.view.VXResource;
+import org.apache.ranger.view.VXResourceList;
import org.springframework.beans.factory.annotation.Autowired;
public class AssetMgrBase {
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/biz/BaseMgr.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/biz/BaseMgr.java b/security-admin/src/main/java/org/apache/ranger/biz/BaseMgr.java
index be808de..174a56c 100644
--- a/security-admin/src/main/java/org/apache/ranger/biz/BaseMgr.java
+++ b/security-admin/src/main/java/org/apache/ranger/biz/BaseMgr.java
@@ -22,27 +22,27 @@
*/
package org.apache.ranger.biz;
-import org.apache.log4j.Logger;
+import org.apache.log4j.Logger;
import org.apache.ranger.common.MessageEnums;
import org.apache.ranger.common.RESTErrorUtil;
-import org.apache.ranger.common.XAConstants;
+import org.apache.ranger.common.RangerConstants;
import org.apache.ranger.common.db.BaseDao;
-import org.apache.ranger.db.XADaoManager;
+import org.apache.ranger.db.RangerDaoManager;
import org.apache.ranger.entity.XXDBBase;
-import org.springframework.beans.factory.annotation.Autowired;
-import org.springframework.stereotype.Component;
+import org.springframework.beans.factory.annotation.Autowired;
+import org.springframework.stereotype.Component;
@Component
public abstract class BaseMgr {
static final Logger logger = Logger.getLogger(BaseMgr.class);
@Autowired
- XADaoManager daoManager;
+ RangerDaoManager daoManager;
@Autowired
RESTErrorUtil restErrorUtil;
- public XADaoManager getDaoManager() {
+ public RangerDaoManager getDaoManager() {
return daoManager;
}
@@ -72,7 +72,7 @@ public abstract class BaseMgr {
protected void validateClassType(int objectClassType) {
// objectClassType
restErrorUtil.validateMinMax(objectClassType, 1,
- XAConstants.ClassTypes_MAX, "Invalid classType", null,
+ RangerConstants.ClassTypes_MAX, "Invalid classType", null,
"objectClassType");
}
http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/06ca8538/security-admin/src/main/java/org/apache/ranger/biz/HiveFSMgr.java
----------------------------------------------------------------------
diff --git a/security-admin/src/main/java/org/apache/ranger/biz/HiveFSMgr.java b/security-admin/src/main/java/org/apache/ranger/biz/HiveFSMgr.java
index e6924ea..8d84db7 100644
--- a/security-admin/src/main/java/org/apache/ranger/biz/HiveFSMgr.java
+++ b/security-admin/src/main/java/org/apache/ranger/biz/HiveFSMgr.java
@@ -24,8 +24,6 @@ package org.apache.ranger.biz;
import org.apache.log4j.Logger;
import org.apache.ranger.hive.client.HiveClient;
-import org.springframework.context.annotation.Scope;
-import org.springframework.stereotype.Component;
/**
*