Issue tracking

Our project uses JIRA, a Java EE based issue tracking and project management application.

JIRA

Issues, bugs, and feature requests should be submitted to the following issue tracking system :

Directory Sub-Project JIRA key Link to issue tracking system
Fortress FC http://issues.apache.org/jira/browse/FC



[FC-1]delPermObjs causes LDAP 80 error Created: 23/Mar/13 Updated: 23/Mar/13 Due: 29/Mar/13

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: None
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: 4 hours
Time Spent: Not Specified
Original Estimate: 4 hours
Environment:

Ubuntu-12.04.1-server-amd64

 Description   

The following error occurs during regression test with REST enabled:

junit 2013-03-22 22:24:44,671 (INFO ) DEL-OBJS TOB4
junit 2013-03-22 22:24:44,907 (ERROR) us.jts.fortress.rbac.AdminMgrImplTest.delPermObjs objectName TOB4_8 caught SecurityException rc=3005, msg=us.jts.fortress.rbac.PermDAO.deleteObj objectName TOB4_8 caught LDAPException=80 msg=entry delete failed
junit us.jts.fortress.SecurityException: us.jts.fortress.rbac.PermDAO.deleteObj objectName TOB4_8 caught LDAPException=80 msg=entry delete failed
junit at us.jts.fortress.rest.AdminMgrRestImpl.deletePermObj(AdminMgrRestImpl.java:913)
junit at us.jts.fortress.rbac.AdminMgrImplTest.delPermObjs(AdminMgrImplTest.java:1765)
junit at us.jts.fortress.rbac.AdminMgrImplTest.testDeletePermissionObj(AdminMgrImplTest.java:1740)
junit at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
junit at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)
junit at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
junit at java.lang.reflect.Method.invoke(Method.java:601)
junit at junit.framework.TestCase.runTest(TestCase.java:168)
junit at junit.framework.TestCase.runBare(TestCase.java:134)
junit at junit.framework.TestResult$1.protect(TestResult.java:110)
junit at junit.framework.TestResult.runProtected(TestResult.java:128)
junit at junit.framework.TestResult.run(TestResult.java:113)
junit at junit.framework.TestCase.run(TestCase.java:124)
junit at junit.framework.TestSuite.runTest(TestSuite.java:243)
junit at junit.framework.TestSuite.run(TestSuite.java:238)
junit at org.apache.tools.ant.taskdefs.optional.junit.JUnitTestRunner.run(JUnitTestRunner.java:518)
junit at org.apache.tools.ant.taskdefs.optional.junit.JUnitTestRunner.launch(JUnitTestRunner.java:1052)
junit at org.apache.tools.ant.taskdefs.optional.junit.JUnitTestRunner.main(JUnitTestRunner.java:906)
junit 2013-03-22 22:24:44,909 (INFO ) DEASGN-USRS TU1 TR1
junit 2013-03-22 22:24:54,723 (INFO ) DEASGN-USRS TU4 TR2
 Comments   
Comment by Shawn McKinney [Administrator] [23/Mar/13]

This exception occurs on Ubuntu 12.04 64 bit server and symas-openldap-silver.64_2.4.34-1_amd64.deb.


[FC-2] Error adding inheritance Created: 21/Apr/13 Updated: 30/Apr/13 Due: 28/Apr/13 Resolved: 30/Apr/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC25
Fix Version/s: 1.0-RC25
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: 0 minutes
Time Spent: 2 hours
Original Estimate: Not Specified
Environment:

ubuntu 32

 Description   

When adding inheritance relationships between roles, get this error. It appears to happen when a role is assigned to a user beforehand:

java
java Enter child role name:
csr
java Enter parent role name:
employee
java 2013-04-21 17:28:59,889 (INFO ) us.jts.fortress.rbac.RoleUtil.loadGraph initializing ROLE context Client123
java ConnectionPool (Sun Apr 21 17:28:59 CDT 2013) : adding a connection to pool...
java 2013-04-21 17:28:59,980 (ERROR) us.jts.fortress.AdminMgrConsole.addRoleInheritance caught SecurityException rc=5003, msg=us.jts.fortress.rbac.RoleDAO.update name CSR caught LDAPException=20 msg=modify/add: roleOccupant: value #0 already exists
java us.jts.fortress.UpdateException: us.jts.fortress.rbac.RoleDAO.update name CSR caught LDAPException=20 msg=modify/add: roleOccupant: value #0 already exists
java at us.jts.fortress.rbac.RoleDAO.update(RoleDAO.java:193)
java at us.jts.fortress.rbac.RoleP.update(RoleP.java:132)
java at us.jts.fortress.rbac.AdminMgrImpl.addInheritance(AdminMgrImpl.java:1002)
java at us.jts.fortress.AdminMgrConsole.addRoleInheritance(AdminMgrConsole.java:160)
java at us.jts.fortress.ProcessMenuCommand.processAdminFunction(ProcessMenuCommand.java:418)
java at us.jts.fortress.ProcessMenuCommand.processRbacControl(ProcessMenuCommand.java:73)
java at us.jts.fortress.FortressConsole.main(FortressConsole.java:28)
java at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
java at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)
java at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
java at java.lang.reflect.Method.invoke(Method.java:601)
java at org.apache.tools.ant.taskdefs.ExecuteJava.run(ExecuteJava.java:217)
java at java.lang.Thread.run(Thread.java:722)
java Caused by: LDAPException(resultCode=20 (attribute or value exists), errorMessage='modify/add: roleOccupant: value #0 already exists')
java at com.unboundid.ldap.sdk.migrate.ldapjdk.LDAPConnection.modify(LDAPConnection.java:1137)
java at com.unboundid.ldap.sdk.migrate.ldapjdk.LDAPConnection.modify(LDAPConnection.java:1154)
java at us.jts.fortress.ldap.DataProvider.modify(DataProvider.java:204)
java at us.jts.fortress.rbac.RoleDAO.update(RoleDAO.java:187)
java ... 12 more


 Comments   
Comment by Shawn McKinney [Administrator] [30/Apr/13]

Error fixed by adding parent role attribute and name only to entity before calling update.

Comment by Shawn McKinney [Administrator] [30/Apr/13]

method was calling update with all of the role attrs which caused failure due to adding role occupant that already existed.


[FC-3] Enhance Role Assignment Func Created: 30/Apr/13 Updated: 30/Apr/13 Due: 10/May/13

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC27
Fix Version/s: None
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: 2 days
Time Spent: Not Specified
Original Estimate: 2 days
Environment:

Linux Dev

 Description   

Measure/repair role assignment funcs to optimize for role occupants.



[FC-3] Enhance Role Assignment Func Created: 30/Apr/13 Updated: 30/Apr/13 Due: 10/May/13

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC27
Fix Version/s: None
>Fixed
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: 2 days
Time Spent: Not Specified
Original Estimate: 2 days
Environment:

Linux Dev

 Description   

Measure/repair role assignment funcs to optimize for role occupants.



[FC-4] Add ApacheDS support Created: 04/May/13 Updated: 03/Jun/13 Due: 05/May/13 Resolved: 05/May/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC25
Fix Version/s: 1.0-RC25
>Fixed
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all linux and windows platforms

 Description   

Support apacheds


 Comments   
Comment by Shawn McKinney [Administrator][05/May/13]

Regression tests running successfully


[FC-5] Test case DEL-RLS ROLES_TR5_HIER fails on delete with ApacheDS Created: 04/May/13 Updated: 05/May/13 Due: 31/May/13 Resolved: 05/May/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: 1.0-RC26
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all linux

Attachments: PNG File Screenshot20130504.png    
 Description   

test case fails:

deleteRoles("DEL-RLS ROLES_TR5_HIER", RoleTestData.ROLES_TR5_HIER);

role oamT5ROLE2 has oamT5Role1 as child and fails on delete. The previous test run removed oamT5Role1 so this error condition should not happen.

Need to figure out why this happens on ApacheDS and not OpenLDAP.


 Comments   
Comment by Shawn McKinney [Administrator][04/May/13]

Debug screenshot. ApacheDS has oamT5ROLE1 as child.

Comment by Shawn McKinney [Administrator][04/May/13]

fix problems with removing inheritance relationships from roles:

a. when deleteRole is called, remove all parents.
b. when deleteInheritance is called, check for condition of empty parent roles in which case remove the parent role attribute altogether.

Comment by Shawn McKinney [Administrator][05/May/13]

fixed


[FC-7] Add SSD Constraint check to updateRole Created: 04/May/13 Updated: 05/Oct/13 Due: 31/May/13

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: None
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

The updateRole function may modify parent attribute on role entity. This has the opportunity to circumvent role SSD policy constraint. Perform SSD constraint checks if addition role parent is added.



[FC-8] CreateSession error on ApacheDS and Ubuntu 32 Created: 05/May/13 Updated: 05/May/13 Due: 31/May/13

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: None
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

ubuntu 32 VM

 Description   

During test-full target (with teardown) on apacheds receive this error:

junit Testcase: testCreateSession took 0.019 sec
junit FAILED
junit us.jts.fortress.rbac.UserDAO.checkPassword userId jtsUser2 caught LDAPException=53 msg=ERR_732 Cannot process a Request while binding
junit junit.framework.AssertionFailedError: us.jts.fortress.rbac.UserDAO.checkPassword userId jtsUser2 caught LDAPException=53 msg=ERR_732 Cannot process a Request while binding
junit at us.jts.fortress.rbac.AccessMgrImplTest.createSessions(AccessMgrImplTest.java:331)
junit at us.jts.fortress.rbac.AccessMgrImplTest.testCreateSession(AccessMgrImplTest.java:281)
junit



[FC-9] Encode all model data Created: 17/May/13 Updated: 05/Oct/13 Due: 31/May/13

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: None
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

ALL inbound data must be encoded safe text before persisted.



[FC-10] UserDAO throws npe when password is null Created: 18/May/13 Updated: 18/May/13 Due: 20/May/13 Resolved: 18/May/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: 1.0-RC26
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: 0 minutes
Time Spent: 1 hour
Original Estimate: Not Specified
Environment:

all

Attachments: PNG File UserDAO-PW-NPE-20130517.png    
 Description   

The UserDAO createUser and updateUpdate user methods throw npe when user entity contains a null value in password field.


 Comments   
Comment by Shawn McKinney [Administrator][18/May/13]

fix npe for null password


[FC-11] Builder change to pull source from maven Created: 19/May/13 Updated: 28/Feb/14 Resolved: 28/Feb/14

Status: Closed
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: None
>Fixed
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Won't Fix Votes: 0
Labels: None
Remaining Estimate: 1 day
Time Spent: Not Specified
Original Estimate: 1 day
Environment:

all

 Description   

Change quickstart package's 'builder' target to pull fortress source from maven. Do not include source in quickstart archive.



[FC-12] isTemporalSet does not detect changes to entity constraint values Created: 26/May/13 Updated: 26/May/13 Due: 31/May/13 Resolved: 26/May/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: 1.0-RC26
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

fix this method to detect when any of the constraint attributes changes. Currently it will only trigger if all of the attributes are not null.

public boolean isTemporalSet()

{ return (beginTime != null && endTime != null && beginDate != null && endDate != null && beginLockDate != null && endLockDate != null && dayMask != null); }
 Comments   
Comment by Shawn McKinney [Administrator][26/May/13]

Changed the && to ||


[FC-13] ReviewMgr.findUsers does not pull back pw policy subentry Created: 28/May/13 Updated: 28/May/13 Due: 29/May/13 Resolved: 28/May/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: 1.0-RC26
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: 1 hour
Time Spent: Not Specified
Original Estimate: 1 hour
Environment:

all

 Description   

Add OPENLDAP_POLICY_SUBENTRY to the result set for user search


 Comments   
Comment by Shawn McKinney [Administrator][28/May/13]

added attribute to search


[FC-14] Add bldg, dept and room attrs to user entity Created: 28/May/13 Updated: 03/Jun/13 Due: 31/May/13 Resolved: 03/Jun/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: 1.0-RC26
>Fixed
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: 4 hours
Time Spent: Not Specified
Original Estimate: 4 hours
Environment:

all

 Description   

Add inetorgperson attributes bldg, dept and room to user


 Comments   
Comment by Shawn McKinney [Administrator][03/Jun/13]

done


[FC-15] Fortress UserDAO.createUser adds openldap policy flag when server type = apache ds Created: 29/May/13 Updated: 29/May/13 Due: 30/May/13 Resolved: 29/May/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: 1.0-RC26
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

final User create(User entity)
{
add flag here:
if (VUtil.isNotNullOrEmpty(entity.getPwPolicy()))

{ String dn = GlobalIds.POLICY_NODE_TYPE + "=" + entity.getPwPolicy() + "," + getRootDn(entity.getContextId(), GlobalIds.PPOLICY_ROOT); attrs.add(createAttribute(OPENLDAP_POLICY_SUBENTRY, dn)); }
 Comments   
Comment by Shawn McKinney [Administrator][29/May/13]

added hooks to prevent pulling OL attributes when server.type = apacheds


[FC-16] MDB Error during deletion Created: 29/May/13 Updated: 03/Jun/13 Due: 07/Jun/13

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: None
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

ubuntu32

Attachments: Text File konsole-output-mdb-delete-error-20130529.txt    
 Description   

During deletion to fortress permission object:
ftObjNm=TOB4_8,ou=Permissions,ou=RBAC,dc=jts,dc=us

PermDAO.delete

This error in debug level slapd.logs, excerpt below, full log attached:

51a66b8d => index_entry_del( 911, "ftObjNm=TOB4_8,ou=Permissions,ou=RBAC,dc=jts,dc=us" )

51a66b8d mdb_idl_delete_keys: 38f 00000000
51a66b8d mdb_idl_delete_keys: 38f 0096defd
51a66b8d mdb_idl_delete_keys: 38f 3d1dea68
51a66b8d mdb_idl_delete_keys: 38f 76324484
51a66b8d mdb_idl_delete_keys: 38f 29c95ac5
51a66b8d mdb_idl_delete_keys: 38f 0e1b3d46
51a66b8d mdb_idl_delete_keys: 38f 1ccd25c5
51a66b8d <= index_entry_del( 911, "ftObjNm=TOB4_8,ou=Permissions,ou=RBAC,dc=jts,dc=us" ) success
51a66b8d <=- mdb_delete: id2entry failed: MDB_PAGE_FULL: Internal error - page has no more space (-30786)
51a66b8d send_ldap_result: conn=1000 op=3820 p=3
51a66b8d send_ldap_result: err=80 matched="" text="entry delete failed"
51a66b8d slap_queue_csn: queing 0x3bb8e308 20130529205645.303808Z#000000#000#000000
51a66b8d ==> mdb_add: reqStart=20130529205645.000000Z,cn=log
51a66b8d oc_check_required entry (reqStart=20130529205645.000000Z,cn=log), objectClass "auditDelete"
51a66b8d oc_check_allowed type "objectClass"
51a66b8d oc_check_allowed type "structuralObjectClass"
51a66b8d oc_check_allowed type "reqStart"
51a66b8d oc_check_allowed type "reqEnd"
51a66b8d oc_check_allowed type "reqType"
51a66b8d oc_check_allowed type "reqSession"
51a66b8d oc_check_allowed type "reqAuthzID"
51a66b8d oc_check_allowed type "reqDN"
51a66b8d oc_check_allowed type "reqMessage"
51a66b8d oc_check_allowed type "reqResult"
51a66b8d oc_check_allowed type "reqEntryUUID"
51a66b8d mdb_dn2entry("reqStart=20130529205645Z,cn=log")
51a66b8d => mdb_dn2id("reqStart=20130529205645Z,cn=log")
51a66b8d <= mdb_dn2id: get failed: MDB_NOTFOUND: No matching key/data pair found (-30798)
51a66b8d => mdb_entry_decode:
51a66b8d <= mdb_entry_decode
51a66b8d => access_allowed: add access to "cn=log" "children" requested
51a66b8d <= root access granted
51a66b8d => access_allowed: add access granted by manage(=mwrscxd)
51a66b8d => access_allowed: add access to "reqStart=20130529205645.000000Z,cn=log" "entry" requested
51a66b8d <= root access granted
51a66b8d => access_allowed: add access granted by manage(=mwrscxd)
51a66b8d => mdb_dn2id_add 0x4eba: "reqStart=20130529205645Z,cn=log"
51a66b8d <= mdb_dn2id_add 0x4eba: 0
51a66b8d => index_entry_add( 20154, "reqStart=20130529205645.000000Z,cn=log" )
51a66b8d mdb_idl_insert_keys: 4eba b5c866dc
51a66b8d mdb_idl_insert_keys: 4eba
51a66b8d mdb_idl_insert_keys: 4eba 86ee7ec7
51a66b8d mdb_idl_insert_keys: 4eba 7990d2ba
51a66b8d <= index_entry_add( 20154, "reqStart=20130529205645.000000Z,cn=log" ) success
51a66b8d => mdb_entry_encode(0x00004eba): reqStart=20130529205645.000000Z,cn=log
51a66b8d <= mdb_entry_encode(0x00004eba): reqStart=20130529205645.000000Z,cn=log
51a66b8d mdb_add: added id=00004eba dn="reqStart=20130529205645.000000Z,cn=log"
51a66b8d send_ldap_result: conn=1000 op=3820 p=3
51a66b8d send_ldap_result: err=0 matched="" text=""
51a66b8d slap_graduate_commit_csn: removing 0x89e6d50 20130529205645.303808Z#000000#000#000000
51a66b8d send_ldap_response: msgid=3821 tag=107 err=80
ber_flush2: 34 bytes to sd 14
0000: 30 20 02 02 0e ed 6b 1a 0a 01 50 04 00 04 13 65 0 ....k...P....e
0010: 6e 74 72 79 20 64 65 6c 65 74 65 20 66 61 69 6c ntry delete fail
0020: 65 64 ed
ldap_write: want=34, written=34
0000: 30 20 02 02 0e ed 6b 1a 0a 01 50 04 00 04 13 65 0 ....k...P....e
0010: 6e 74 72 79 20 64 65 6c 65 74 65 20 66 61 69 6c ntry delete fail
0020: 65 64 ed
51a66b8d conn=1000 op=3820 RESULT tag=107 err=80 text=entry delete failed
51a66b8d slap_graduate_commit_csn: removing 0x8a07120 20130529205645.303808Z#000000#000#000000
51a66c46 daemon: epoll: listen=7 active_threads=0 tvp=zero



[FC-17] Delete descendant role error Created: 29/May/13 Updated: 03/Jun/13 Due: 31/May/13

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: None
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

ubuntu 32 - symas-openldap-silver.32_2.4.35-2_i386.deb

 Description   

junit 2013-05-29 17:51:18,449 (INFO ) DEL-RLS-TR6-DESC
junit 2013-05-29 17:51:18,480 (ERROR) us.jts.fortress.rbac.AdminMgrImplTest.delRoleDescendant caught SecurityException rc=5004, msg=us.jts.fortress.rbac.RoleDAO.remove role name=oamT6C4B2A1 LDAPException=32 msg=no such object
junit us.jts.fortress.RemoveException: us.jts.fortress.rbac.RoleDAO.remove role name=oamT6C4B2A1 LDAPException=32 msg=no such object
junit at us.jts.fortress.rbac.RoleDAO.remove(RoleDAO.java:316)
junit at us.jts.fortress.rbac.RoleP.delete(RoleP.java:246)
junit at us.jts.fortress.rbac.AdminMgrImpl.deleteRole(AdminMgrImpl.java:434)
junit at us.jts.fortress.rbac.AdminMgrImplTest.delRoleDescendant(AdminMgrImplTest.java:670)
junit at us.jts.fortress.rbac.AdminMgrImplTest.testDelRoleDescendant(AdminMgrImplTest.java:603)
junit at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
junit at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)
junit at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
junit at java.lang.reflect.Method.invoke(Method.java:601)
junit at junit.framework.TestCase.runTest(TestCase.java:168)
junit at junit.framework.TestCase.runBare(TestCase.java:134)
junit at junit.framework.TestResult$1.protect(TestResult.java:110)
junit at junit.framework.TestResult.runProtected(TestResult.java:128)
junit at junit.framework.TestResult.run(TestResult.java:113)
junit at junit.framework.TestCase.run(TestCase.java:124)
junit at junit.framework.TestSuite.runTest(TestSuite.java:243)
junit at junit.framework.TestSuite.run(TestSuite.java:238)
junit at org.apache.tools.ant.taskdefs.optional.junit.JUnitTestRunner.run(JUnitTestRunner.java:518)
junit at org.apache.tools.ant.taskdefs.optional.junit.JUnitTestRunner.launch(JUnitTestRunner.java:1052)
junit at org.apache.tools.ant.taskdefs.optional.junit.JUnitTestRunner.main(JUnitTestRunner.java:906)
junit Caused by: LDAPException(resultCode=32 (no such object), errorMessage='no such object', matchedDN='ou=Roles,ou=RBAC,dc=jts,dc=us')
junit at com.unboundid.ldap.sdk.migrate.ldapjdk.LDAPConnection.modify(LDAPConnection.java:1137)
junit at com.unboundid.ldap.sdk.migrate.ldapjdk.LDAPConnection.modify(LDAPConnection.java:1154)
junit at us.jts.fortress.ldap.DataProvider.modify(DataProvider.java:188)
junit at us.jts.fortress.ldap.DataProvider.delete(DataProvider.java:235)
junit at us.jts.fortress.rbac.RoleDAO.remove(RoleDAO.java:311)
junit ... 19 more
junit 2013-05-29 17:51:18,483 (INFO ) DEL-RLS-TR6-ASC
junit 2013-05-29 17:51:18,487 (ERROR) us.jts.fortress.rbac.AdminMgrImplTest.delRoleAscendant caught SecurityException rc=5060, msg=us.jts.fortress.rbac.HierUtil.validateRelationship child oamT7D2C1B1A1 does not have parent oamT7C2B1A1
junit us.jts.fortress.ValidationException: us.jts.fortress.rbac.HierUtil.validateRelationship child oamT7D2C1B1A1 does not have parent oamT7C2B1A1
junit at us.jts.fortress.rbac.HierUtil.validateRelationship(HierUtil.java:127)
junit at us.jts.fortress.rbac.RoleUtil.validateRelationship(RoleUtil.java:245)
junit at us.jts.fortress.rbac.AdminMgrImpl.deleteInheritance(AdminMgrImpl.java:1046)
junit at us.jts.fortress.rbac.AdminMgrImplTest.delRoleAscendant(AdminMgrImplTest.java:764)
junit at us.jts.fortress.rbac.AdminMgrImplTest.testDelRoleAscendant(AdminMgrImplTest.java:741)
junit at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
junit at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)
junit at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
junit at java.lang.reflect.Method.invoke(Method.java:601)
junit at junit.framework.TestCase.runTest(TestCase.java:168)
junit at junit.framework.TestCase.runBare(TestCase.java:134)
junit at junit.framework.TestResult$1.protect(TestResult.java:110)
junit at junit.framework.TestResult.runProtected(TestResult.java:128)
junit at junit.framework.TestResult.run(TestResult.java:113)
junit at junit.framework.TestCase.run(TestCase.java:124)
junit at junit.framework.TestSuite.runTest(TestSuite.java:243)
junit at junit.framework.TestSuite.run(TestSuite.java:238)
junit at org.apache.tools.ant.taskdefs.optional.junit.JUnitTestRunner.run(JUnitTestRunner.java:518)
junit at org.apache.tools.ant.taskdefs.optional.junit.JUnitTestRunner.launch(JUnitTestRunner.java:1052)
junit at org.apache.tools.ant.taskdefs.optional.junit.JUnitTestRunner.main(JUnitTestRunner.java:906)
junit 2013-05-29 17:51:18,487 (INFO ) DEL-RLS TR1
junit 2013-05-29 17:51:18,502 (INFO ) DEL-RLS TR2
junit 2013-05-29 17:51:18,516 (INFO ) DEL-RLS TR3
junit 2013-05-29 17:51:18,771 (INFO ) DEL-RLS TR4
junit 2013-05-29 17:51:18,799 (INFO ) DEL-RLS ROLES_TR5_HIER
junit 2013-05-29 17:51:18,818 (INFO ) DEL-RLS ROLES_TR5B
junit 2013-05-29 17:51:18,852 (INFO ) DEL-RLS ROLES_TR8_SSD
junit 2013-05-29 17:51:18,919 (INFO ) DEL-RLS ROLES_TR9_SSD
^Csmckinn@smckinnlt-lr02:~/GIT/fortressDev/openldap-fortress-core$ sudo ./build.sh init-slapd
Buildfile: /home/smckinn/GIT/fortressDev/openldap-fortress-core/build.xml



[FC-18] DAO Updates enhancement Created: 30/May/13 Updated: 17/Jun/13 Due: 30/Jun/13

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: None
>Fixed
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

09:15:48 AM emmanuel lecharny: I may have a few q regarding the update methods
09:16:08 AM emmanuel lecharny: it seems that you remove an Attribute before adding some new values
09:18:43 AM emmanuel lecharny: something like :
09:18:44 AM emmanuel lecharny: LDAPModification(type=replace, attr=ftRoles, values={}),
LDAPModification(type=add, attr=ftRoles, values=

{'oamT10SSDR1'})]

09:19:16 AM emmanuel lecharny: which results in two modification bing done on the entry, instead of one
09:19:22 AM emmanuel lecharny: not a big deal though
09:19:47 AM emmanuel lecharny: I assume that all the ftRoles get removed first, then you inject one new one
09:20:06 AM * emmanuel lecharny out for 5 mins
09:33:24 AM smckinney: so you are saying two roundtrips for those operations?
09:34:22 AM smckinney: the intent is yes to replace the old with the new
09:40:49 AM emmanuel lecharny: smckinney: no, this will be done in one single rountrip. This is why t's not a big deal
09:41:00 AM smckinney: yes that was my assumption as well
09:41:16 AM smckinney: but having your eyes in there will be good
09:42:23 AM smckinney: how would you have done this?
09:44:55 AM emmanuel lecharny: a replace with thevalues will blank the existing data, and inject the added values
09:45:10 AM emmanuel lecharny: so no eed to do LDAPModification(type=replace, attr=ftRoles, values={}),

09:45:39 AM emmanuel lecharny: doing LDAPModification(type=replace, attr=ftRoles, values={'oamT10SSDR1'}

)] should be enough

09:46:27 AM smckinney: yes agreed. wondering why I did not do that to begin with...
09:47:28 AM smckinney: will create an issue to take another look at it.



[FC-19] Add toString() methods for the base objects (Role, Permissions...) Created: 30/May/13 Updated: 03/Jun/13

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: 1.0
>Fixed
Type: Improvement Priority: Major
Reporter: Emmanuel Lecharny Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

It would be very comfy to have toString() methods added to the base classes, especially for debugging and logging purpose.



[FC-20] Add cache name to ehcache config Created: 30/May/13 Updated: 31/May/13 Due: 28/Jun/13 Resolved: 31/May/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: 1.0-RC26
>Fixed
Type: Improvement Priority: Minor
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

Add name to ehcache as Emmanuel specifies via the fortress list server:

yesterday, I spent a couple of hours trying to understand why I get a
failure in the tests. I finally found the pb : the EhCache CacheManager
is initialized using a factory, and the configuration file does not have
a name, which leads the cache to be a singleton. If you are embedding
fortress into another application using EhCache, or if Fortress embed an
application using EhCache, it's very likely that you face some issue if
this cache is also a singleton.

Bottom line, I added a name="fortress" in the ehcache.xml file, and this
solved my pb :

<?xml version="1.0" encoding="UTF-8"?>

<!--
Fortress CacheManager Configuration
==========================
This ehcache.xml corresponds to a single CacheManager.
-->
<ehcache name="fortress"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"


 Comments   
Comment by Shawn McKinney [Administrator][31/May/13]

changed ehcache.xml's header to include the name fortress:

<ehcache name="fortress" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"


[FC-21] Alter DAO LDAP connection managment Created: 30/May/13 Updated: 31/May/13 Due: 31/May/13 Resolved: 31/May/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: 1.0-RC26
>Fixed
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

Another from Emmanuel:

>
> On 05/25/2013 04:24 PM, Emmanuel Lecharny wrote:
>> 2) It would be better to get the connection immediately before using it,
>> and to release it as soon as you are done with it. For instance, the
>> connection could be get just before calling the dataProvider and
>> released just after. Not really a huge improvment, but assuming that
>> you may have thousands of requests per second, this may become an
>> issue.
>>
>
> The current pattern followed in the Fortress DAO's is as follows:
>
> // inside any DAO method:
> try
>

{ > 1. getAdminConnection(); > 2. build up the ldap attribute set or search filter > 3. perform the ldap operation > }

> catch (LDAPException e)
>

{ > // perform error handling > }

> finally
>

{ > 4. closeAdminConnection(ld); > }

>
> This change you are suggesting is to delay opening the connection
> until the beginning of step 3?
Yes. Basically :

try
{
1. build up the ldap attribute set or search filter
2. getAdminConnection();
3. perform the ldap operation

Now, it's questionable if the connection should be grab in (2) instead
in the method that performs the operation. The only rationnal I see is
for a non-admin connection to be used, but this is not the case in teh
DAO, AFAICS.


 Comments   
Comment by Shawn McKinney [Administrator][31/May/13]

Moved getting connections from the pools until just before the call to DAO base util apis. In other words, moved it until when it was needed.


[FC-22] We should be able to clear the cache through the API Created: 31/May/13 Updated: 20/Aug/13 Resolved: 20/Aug/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: 1.0
Type: Task Priority: Major
Reporter: Emmanuel Lecharny Assignee: Emmanuel Lecharny
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

There are some cases where we would like to clear all or one single cache. For instance, when running atomic tests, teh cache should be cleared before the test, or after the test.

Currently, this is not possible.


 Comments   
Comment by Emmanuel Lecharny[31/May/13]

I suggest to add :

/**

  • Clear all the caches
    */
    public void clearAll() { m_ehCacheImpl.clearAll(); }

in the CacheMgr class. That does the trick, and it does not expose the underlying EhCache instance.

Comment by Shawn McKinney [Administrator][31/May/13]

OK that is fine we can do it. But this property needs to be changed to true inside fortress.properties:

  1. If for any reason echcache must be DISABLED for DSD, make sure this parameter is set to 'true' which is the default. Otherwise performance penalty will be incurred during multi-role activations.
    disable.dsd.cache=false

As part of the code change we will all this setting to be made through the build.properties.

Comment by Shawn McKinney [Administrator][20/Aug/13]

resolved


[FC-23] Constraint not correctly processing delimiters Created: 03/Jun/13 Updated: 03/Jun/13 Due: 04/Jun/13 Resolved: 03/Jun/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: 1.0-RC26
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

The CUtil.setConstraint utility is not correctly processing the multi attribute string input. Modify string parsing to allow for empty subattributes within constraint data struct.


 Comments   
Comment by Shawn McKinney [Administrator][03/Jun/13]

changed call to tokenizer to return delimiters as tokens:

StringTokenizer tkn = new StringTokenizer(inputString, GlobalIds.DELIMITER, true);

which enables the correct placement to be maintained - even with empty constraint sub attrs.


[FC-24] Strip name from pw policy DN for User inquiry Created: 03/Jun/13 Updated: 03/Jun/13 Due: 04/Jun/13 Resolved: 03/Jun/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: 1.0-RC27
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

the pw policy subentry is stored in ldap as a DN. This creates problems with the client on inquiries. Strip the rDn from the dn and set that value in pwpolicy attribute on user entity during retrieval.


 Comments   
Comment by Shawn McKinney [Administrator][03/Jun/13]

strip rDN from policy DN before loading into entity and returning to caller.

String szPolicy = getAttribute(le, OPENLDAP_POLICY_SUBENTRY);
if(VUtil.isNotNullOrEmpty(szPolicy))

{ entity.setPwPolicy(getRdn(szPolicy)); }


[FC-25] Remove role assignment from UserDAO add and update Created: 04/Jun/13 Updated: 17/Jun/13 Due: 05/Jun/13 Resolved: 17/Jun/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: 1.0-RC27
>Fixed
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

Fortress role assignments effect both user and role entities. The UserDAO only changes user entity and does not update role. This leaves role assignment in inconsistent state. Remove capability to assign roles from add/update user and only allow in assignuser.



[FC-26] Cleanup test data Created: 05/Jun/13 Updated: 17/Jun/13 Due: 05/Jun/13 Resolved: 17/Jun/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: 1.0-RC27
>Fixed
Type: Improvement Priority: Trivial
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

cleanup test data



[FC-27] Rename constant for user policy violation Created: 06/Jun/13 Updated: 17/Jun/13 Due: 06/Jun/13 Resolved: 17/Jun/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: 1.0-RC27
>Fixed
Type: Improvement Priority: Trivial
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

rename constant for user system policy violation.



[FC-28] ReviewMgr - Add search SDSets by name Created: 13/Jun/13 Updated: 17/Jun/13 Resolved: 17/Jun/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: 1.0-RC27
Type: New Feature Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

Commander need ability to search SDSets by name.



[FC-29] Add jpeg photo to User Created: 17/Jun/13 Updated: 17/Jun/13 Resolved: 17/Jun/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: 1.0-RC27
>Fixed
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

add jpeg photo to userdao



[FC-30] AdminMgr Update S/DSD method Created: 25/Jun/13 Updated: 28/Jun/13 Resolved: 28/Jun/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC26
Fix Version/s: 1.0-RC27
>Fixed
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

Issue Links:
Relates
relates to EN-3 AdminMgr Update S/DSD method Resolved
 Description   

needed for commander



[FC-31] Add ApacheDS regression tests Created: 26/Jun/13 Updated: 28/Jun/13 Resolved: 28/Jun/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC26
Fix Version/s: 1.0-RC27
>Fixed
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

add Apache DS regression junit test suite



[FC-32] Bump up heap space on fortress junit tests Created: 27/Jun/13 Updated: 28/Jun/13 Resolved: 28/Jun/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC26
Fix Version/s: 1.0-RC27
>Fixed
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

bump up heap allocation to 1024M



[FC-33] Add JMX counters to Fortress DAO calls Created: 27/Jun/13 Updated: 28/Aug/13

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: None
Type: New Feature Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

add counter to lower level fortress dao utils to measure the numbers of the various ldap ops - add, mod, delete, search, etc



[FC-34] Replace the use of Log4j by SLF4j Created: 28/Jun/13 Updated: 30/Jun/13 Resolved: 30/Jun/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC26
Fix Version/s: 1.0-RC27
>Fixed
Type: Improvement Priority: Major
Reporter: Emmanuel Lecharny Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

The idea is to abstract the lib from the logger used by the application that embeds Fortress.


 Comments   
Comment by Emmanuel Lecharny[28/Jun/13]

There are a few steps to migrate the logger usage :

  • first of all, add the dependencies on the SLFJ jars in build.xml/pom.xml
  • Replace the folowing line :
    private static final Logger log = Logger.getLogger(CLS_NM);
    by
    private static final Logger LOG = LoggerFactory.getLogger( CLS_NM );

(note that as its a static final field, it's uppercase)

  • Add the following imports, in place of the Log4j imports :
    import org.slf4j.Logger;
    import org.slf4j.LoggerFactory;
  • At this point, this is pretty much done. One more step though : remove the CLS_NM constant, when it's not useful. That also means it has to be removed from the LOG.blah() calls.
  • Use the new syntax :
    LOG.debug( "this is a log : {}", the Log );
Comment by Shawn McKinney [Administrator][28/Jun/13]

Removed log4j as compile dependency. Removed CLS_NM constant from log statements.

Comment by Shawn McKinney [Administrator][30/Jun/13]

Closing issue, still need to go with new log syntax.


[FC-35] Add toString() methods to classes containing data structures Created: 28/Jun/13 Updated: 28/Aug/13 Resolved: 04/Jul/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC26
Fix Version/s: 1.0-RC30
>Fixed
Type: Improvement Priority: Major
Reporter: Emmanuel Lecharny Assignee: Shawn McKinney [Administrator]
Resolution: Duplicate Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

It's convenient when debugging to have the classes to implement toString()


 Comments   
Comment by Emmanuel Lecharny[29/Jun/13]

The following classes have to be modified :

  • rbac.Address
  • rbac.AdminRole
  • rbac.AdminRoleRelationship
  • rbac.Bind
  • rbac.Context
  • rbac.Hier
  • rbac.Mod
  • rbac.OrgUnit
  • rbac.OrgUnitRelationship
  • rbac.PermGrant
  • rbac.Permission
  • rbac.PermObj
  • rbac.Props
  • rbac.PwPolicy
  • rbac.Relationship
  • rbac.Role
  • rbac.RolePerm
  • rbac.RoleRelationship
  • rbac.SDSet
  • rbac.Session
  • rbac.User
  • rbac.UserAdminRole
  • rbac.UserAudit
  • rbac.UserRole
Comment by Emmanuel Lecharny[02/Jul/13]

The User class already has a toString() method which simply returns the User's userId field.

Is it intended, or could we improve what it produces ?

Comment by Shawn McKinney [Administrator][02/Jul/13]

it can be improved. are you suggesting all of the fields from user comprise tostring?

Comment by Emmanuel Lecharny[04/Jul/13]

That's an option...

Comment by Emmanuel Lecharny[04/Jul/13]

There is already an issue for that : FC-19


[FC-36] Create sub-packages for DAO, POJOs, Process modules Created: 28/Jun/13 Updated: 28/Jun/13

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: None
>Fixed
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Break fortress modules in rbac package into separate packages.



[FC-37] Create sub-modules for REST, LDAP, API, CLI, CONFIG, Ant Created: 28/Jun/13 Updated: 28/Jun/13

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: None
>Fixed
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Break fortress core into multiple jars. One for CLI, Ant, Rest, etc



[FC-38] Convert Config to non-singleton Created: 28/Jun/13 Updated: 28/Jun/13

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: None
>Fixed
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

This task is to determine how to convert the Fortress Config component to not be a singleton.



[FC-39] Mavenize Fortress Build Created: 28/Jun/13 Updated: 28/Jun/13

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: None
>Fixed
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Convert the build and packaging tasks to use Maven rather than Ant. Use maven for releasing source code from GIT. Automatic publish artifacts using Maven.



[FC-40] Configurable LDAP connection (network or direct) Created: 28/Jun/13 Updated: 28/Jun/13

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: None
>Fixed
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Convert the Fortress ldap connections to be over network or to use local mode.



[FC-41] Switch to Apache LDAP API Created: 28/Jun/13 Updated: 28/Aug/13 Resolved: 20/Aug/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: 1.0-RC29
>Fixed
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Emmanuel Lecharny
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Use Apache LDAP API for fortress. Daotutil should provide abstraction layer to use unbound or apache.


 Comments   
Comment by Emmanuel Lecharny[04/Jul/13]

On progress...

I'm currently able to add users using the Apache LDAP API.

There is more to come.

Comment by Shawn McKinney [Administrator][20/Aug/13]

still experimental


[FC-42] Add annotations to run OpenLDAP tests Created: 28/Jun/13 Updated: 28/Jun/13

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: None
>Fixed
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Use annotations for OpenLDAP junit tests. Break the tests into standalone mode. Follow the apacheds model.



[FC-43] Switch to junit 4.11 Created: 28/Jun/13 Updated: 01/Jul/13

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: None
>Fixed
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

fortress to use junit 4.11


 Comments   
Comment by Shawn McKinney [Administrator][01/Jul/13]

This version requires that you add a dependency on |hamcrest-core.jar|
<http://search.maven.org/#search%7Cgav%7C1%7Cg%3A%22org.hamcrest%22%20AND%20a%3A%22hamcrest-core%22>
(with ant, it has to be added to the classpath)

See https://github.com/junit-team/junit/wiki/Download-and-Install


[FC-44] Fortress 1.0-RC27 Release Created: 30/Jun/13 Updated: 30/Jun/13 Resolved: 30/Jun/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: 1.0-RC27
Type: Task Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

release 27



[FC-45] Make the PasswordPolicy code to work with ApacheDS Created: 01/Jul/13 Updated: 01/Jul/13

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC27
Fix Version/s: 1.0
Type: Task Priority: Major
Reporter: Emmanuel Lecharny Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified


[FC-46] Add the missing serialVersionUID for Serializable classes Created: 01/Jul/13 Updated: 01/Jul/13

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC27
Fix Version/s: 1.0
Type: Task Priority: Major
Reporter: Emmanuel Lecharny Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified


[FC-47] Improve the way Factories create instances Created: 02/Jul/13 Updated: 02/Jul/13

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC27
Fix Version/s: 1.0
>Fixed
Type: Improvement Priority: Major
Reporter: Emmanuel Lecharny Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Currently, the various Mgr factories are creating instances for Mgr depending on the type of access we want (basically, direct access or via REST).

We can imagine that we may have more kind of access in the future (remote, SOAP yukkk, ... )

But in any case, I think we can simplify the way we create instances :

accessClassName = AccessMgrImpl.class.getName();
AccessMgr accessMgr =
(AccessMgr)ClassUtil.createInstance(accessClassName);

could be written :

AccessMgr accessMgr = new AccessMgrImpl();

We know everything about the class, and we don't even have to pull a constructor FQCN from the configuration, the only thing is that we will create a new instance depending on some configuration parameter.

(this is of course when the config does not provide the class name to instanciate)

I also have some concern about the fact that we may want to mix REST and other kind of access. Atm, either we have a REST access, or not, but it's global and can't be changed, as the IS_EST flag is static and final. Each context might access the Mgr in different ways (at least, this is my understanding, even if I'm pushing it a bit too far).

Does it sound reasonnable ?



[FC-48] UserDAO employeeType incorrectly mapped Created: 03/Jul/13 Updated: 28/Aug/13 Resolved: 20/Aug/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC27
Fix Version/s: 1.0-RC29
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

fix this code in UserDAO:

final User update( User entity )

if ( VUtil.isNotNullOrEmpty( entity.getEmployeeType() ) )

{ LDAPAttribute employeeType = new LDAPAttribute( EMPLOYEE_TYPE, entity.getSn() ); mods.add( LDAPModification.REPLACE, employeeType ); }
 Comments   
Comment by Shawn McKinney [Administrator][20/Aug/13]

fixed


[FC-49] Make it possible to programatically configure Fortress Created: 04/Jul/13 Updated: 04/Jul/13

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC27
Fix Version/s: 1.0
Type: New Feature Priority: Major
Reporter: Emmanuel Lecharny Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Currently, all the fortress configuration is done though a configuration file.

It would be very convenient to be able to configure Fortress without depending on a configuration file.



[FC-50] UserDAO loadUserRoles & loadUserAdminRoles not properly setting USER_ASSIGN attribute Created: 04/Jul/13 Updated: 28/Aug/13 Resolved: 20/Aug/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC27
Fix Version/s: 1.0-RC29
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

these methods:
private void loadUserRoles( List<UserRole> list, LDAPModificationSet mods )
private void loadUserAdminRoles( List<UserAdminRole> list, LDAPModificationSet mods )

need this added:

if ( attr != null )

{ mods.add( LDAPModification.REPLACE, attr ); add this-> mods.add( LDAPModification.REPLACE, attrNm ); }

}
}


 Comments   
Comment by Shawn McKinney [Administrator][20/Aug/13]

done


[FC-51] RoleDAO update should not update role occupants Created: 04/Jul/13 Updated: 28/Aug/13 Resolved: 20/Aug/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC27
Fix Version/s: 1.0-RC29
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

Do not update roleOccupants attribute in RoleDAO.update method


 Comments   
Comment by Shawn McKinney [Administrator][20/Aug/13]

removed occupant update from method


[FC-52] Create unit tests for DAOs Created: 05/Jul/13 Updated: 05/Jul/13

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC27
Fix Version/s: 1.0
Type: Task Priority: Major
Reporter: Emmanuel Lecharny Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

We are currently testing the API though the existing managers. It would be good to also test the DAO themselves, as we may have different implementations.



[FC-53] Add a way to use different DAO implementations Created: 05/Jul/13 Updated: 28/Aug/13 Resolved: 20/Aug/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC27
Fix Version/s: 1.0-RC29
Type: New Feature Priority: Major
Reporter: Emmanuel Lecharny Assignee: Emmanuel Lecharny
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

We currently have one single implementation for the DAOs, using the UnboundID API. It would be interesting to have a way to instanciate some other implementation (like one using the Apache LDAP API, or a relational database)


 Comments   
Comment by Shawn McKinney [Administrator][20/Aug/13]

added dao interface


[FC-54] Upgrade default OpenLDAP installation to 2.4.35-2 Created: 05/Jul/13 Updated: 28/Aug/13 Resolved: 20/Aug/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC27
Fix Version/s: 1.0-RC29
Type: Task Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

flip switch in build.properties to 2.4.35-2


 Comments   
Comment by Shawn McKinney [Administrator][20/Aug/13]

done


[FC-56] PermDAO update incorrectly processes admin roles Created: 29/Jul/13 Updated: 28/Aug/13 Resolved: 20/Aug/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC27
Fix Version/s: 1.0-RC29
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

The PermDAO updatePerm incorrectly process administrative roles. For example it validates against the non admin role tree and causes this exception when roles is non-null:

SecurityException=us.jts.fortress.FinderException: getRole Obj COULD NOT FIND ENTRY for dn cn=oamAdmin8,ou=Roles,ou=RBAC,dc=jts,dc=us


 Comments   
Comment by Shawn McKinney [Administrator][20/Aug/13]

This was fixed by adding code to PermP validate to check for admin role presence.


[FC-57] User Add NPE when ou is null Created: 04/Aug/13 Updated: 28/Aug/13 Resolved: 20/Aug/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: 1.0-RC29
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

The function should throw a checked security exceptoin


 Comments   
Comment by Shawn McKinney [Administrator][20/Aug/13]

add null check in userp.validation method


[FC-59] add method DelAccessMgr.sessionPermissions Created: 04/Aug/13 Updated: 28/Aug/13 Resolved: 20/Aug/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: 1.0-RC29
>Fixed
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

DelAccessMgr needs sessionPermissions method


 Comments   
Comment by Shawn McKinney [Administrator][20/Aug/13]

This was resolved by using the isAdmin flag in permission and passing it down into PermDAO.


[FC-60] Delegated Policy Load Created: 19/Aug/13 Updated: 28/Aug/13 Resolved: 20/Aug/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC27
Fix Version/s: 1.0-RC29
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

Add load script for delegated policy. Change fortress junit test to work if delegated policy is loaded beforehand.


 Comments   
Comment by Shawn McKinney [Administrator][20/Aug/13]

script name is DelegatedAdminManagerLoad.xml. Code added to junit tests to work if this policy has been preloaded


[FC-61] User incorrect mapping of displayName attribute Created: 21/Aug/13 Updated: 28/Aug/13 Resolved: 28/Aug/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC27
Fix Version/s: 1.0-RC29
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

Issue Links:
Relates
relates to COM-45 User Detail Commit is mapping userId ... Resolved
 Description   

correctly map user displayName to displayName in fortress



[FC-63] Add REST DelegatedAdminMgr.sessionPermissions Created: 26/Aug/13 Updated: 28/Aug/13 Resolved: 28/Aug/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: 1.0-RC29
Type: New Feature Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

implement this method:

Caused by: java.lang.UnsupportedOperationException
at us.jts.fortress.rest.DelAccessMgrRestImpl.sessionPermissions(DelAccessMgrRestImpl.java:384)



[FC-64] RC29 Release Created: 28/Aug/13 Updated: 28/Aug/13 Resolved: 28/Aug/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: None
Type: Task Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified


[FC-65] createSession with Roles improperly loads activated roles into the session Created: 17/Sep/13 Updated: 05/Oct/13 Resolved: 05/Oct/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC29
Fix Version/s: 1.0-RC30
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

during the role activation step the user role selection is improperly loaded into the session.



[FC-66] SoD add type DSD fails for Ant admin Created: 17/Sep/13 Updated: 05/Oct/13 Resolved: 05/Oct/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC29
Fix Version/s: 1.0-RC30
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

to fox:
if(sd.getType() == SDSet.SDType.STATIC)
adminMgr.createSsdSet( sd );
else
adminMgr.createDsdSet( sd );


[FC-67] Add User properties to Ant admin Created: 18/Sep/13 Updated: 05/Oct/13 Resolved: 05/Oct/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC29
Fix Version/s: 1.0-RC30
Type: New Feature Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all

 Description   

add the ability to set user properties in ant:

<user ... userProps="fortressdemo1:ROLE_TEST1"/>



[FC-68] RC30 Release Created: 19/Sep/13 Updated: 05/Oct/13 Resolved: 05/Oct/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: 1.0-RC30
Type: Task Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

all


[FC-69] Use global class.path in ant load scripts Created: 01/Oct/13 Updated: 06/Oct/13 Resolved: 06/Oct/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC30
Fix Version/s: 1.0-RC31
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

convert load scripts to use global classpath set in the build.xml rather than from local properties in the ant build file.



[FC-70] Improvements to Apache LDAP client API usage Created: 01/Oct/13 Updated: 06/Oct/13 Resolved: 06/Oct/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: None
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Minor bug fixes and improvements in configuration of apache ldap api usage.



[FC-71] Enmasse & Commander demo on windows platform Created: 05/Oct/13 Updated: 06/Oct/13 Resolved: 06/Oct/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC30
Fix Version/s: 1.0-RC31
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Add windows support for commander and enmasse demos



[FC-72] RC31 Release Created: 05/Oct/13 Updated: 06/Oct/13 Resolved: 06/Oct/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC30
Fix Version/s: 1.0-RC31
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

The two improvements made:

1. minor bug fixes to enable the apache ldap api to work correctly

2. tweaks to enable win platform support on enmasse & commander demo web applications



[FC-73] Add debug mode for Ant admin scripts Created: 13/Oct/13 Updated: 10/Nov/13 Resolved: 10/Nov/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC31
Fix Version/s: 1.0-RC32
Type: New Feature Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

add switch to allow xml load utility to be attached by remote debugger



[FC-74] Pass warnings in session for role constraint and pw policy violations Created: 19/Oct/13 Updated: 10/Nov/13 Resolved: 10/Nov/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC31
Fix Version/s: 1.0-RC32
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified


[FC-75] Make jpgphoto xmltransient Created: 19/Oct/13 Updated: 10/Nov/13 Resolved: 10/Nov/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC31
Fix Version/s: 1.0-RC32
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

For now make the jpegphoto transient so that enmasse doesn't try to xml serialize.



[FC-76] Fix local.mode Created: 03/Nov/13 Updated: 10/Nov/13 Resolved: 10/Nov/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC31
Fix Version/s: 1.0-RC32
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

remove local.mode from the resolve target.



[FC-77] RC32 Release Created: 03/Nov/13 Updated: 10/Nov/13 Resolved: 10/Nov/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC31
Fix Version/s: 1.0-RC32
Type: Task Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified


[FC-78] Remove extra attribute values from constraints Created: 07/Nov/13 Updated: 29/Dec/13 Resolved: 29/Dec/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC32,1.0-RC33
Fix Version/s: 1.0-RC34
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

remove 'none', 'all' and any other values from constraints. Use empty value to indicate that constraint is not enforced.



[FC-79] RC32 Cleanup Created: 10/Nov/13 Updated: 11/Nov/13 Resolved: 11/Nov/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC32
Fix Version/s: 1.0-RC33
Type: Task Priority: Minor
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified


[FC-80] Add tenant and thread IDs to log statement Created: 10/Nov/13 Updated: 11/Nov/13 Resolved: 11/Nov/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC32
Fix Version/s: 1.0-RC33
Type: Improvement Priority: Minor
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Add the thread id to log4j messages. Add the tenant id to log statements in junit output.



[FC-81] addActiveRole not validating temporal constraints Created: 10/Nov/13 Updated: 11/Nov/13 Resolved: 11/Nov/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC32
Fix Version/s: 1.0-RC33
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
<br/>

 Description   

The addActiveRole method is not checking time/date constraints on roles being activated into session.



[FC-82] User-Role Temporal constraints improperly parsing raw data Created: 10/Nov/13 Updated: 11/Nov/13 Resolved: 11/Nov/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC32
Fix Version/s: 1.0-RC33
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

When user-role constraint data is being converted from raw (as stored in ldap) to entity format it is not handling empty params correctly. Change the way the string is being parsed in order to handle empty values.



[FC-83] Add Multitenant Demo Created: 10/Nov/13 Updated: 11/Nov/13 Resolved: 11/Nov/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC32
Fix Version/s: 1.0-RC33
Type: New Feature Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Add new ant & bash scripts to kick off multi-tenant batch test/demo.



[FC-84] Remove extraneous admin bind during user authN Created: 11/Nov/13 Updated: 11/Nov/13 Resolved: 11/Nov/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC32
Fix Version/s: 1.0-RC33
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

The connection pool fortress uses ConnectionPool class from Mozilla java ldap sdk. The code performs a bind on connections that are being put back in the pool (ostensibly to clear the previous credentials). This creates unnecessary extra bind during user authentication flow.

Change the ConnectionPool class to not bind before returning to pool



[FC-85] Add jpegphoto to ant ldap load util Created: 11/Nov/13 Updated: 11/Nov/13 Resolved: 11/Nov/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC32
Fix Version/s: 1.0-RC33
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Add jpeg photo to ant load utility.



[FC-86] RC33 Release Created: 11/Nov/13 Updated: 11/Nov/13 Resolved: 11/Nov/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC32
Fix Version/s: 1.0-RC33
Type: Task Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified


[FC-87] Change user dao bind error mapping Created: 18/Dec/13 Updated: 28/Dec/13 Resolved: 28/Dec/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC33
Fix Version/s: 1.0-RC34
Type: Improvement Priority: Trivial
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

change error mapping on bind to use

/**

  • The User bind operation failed on server.
    */
    public final static int USER_BIND_FAILED = 1037;


[FC-88] ARBAC Role Assign/Deassign raw data mapping error Created: 20/Dec/13 Updated: 28/Dec/13 Resolved: 28/Dec/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC33
Fix Version/s: 1.0-RC34
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Problem description submitted via the fortress mailing list. Issue resolved by fixing UserAdminRole.getRawData()

Assign A user to a role-- Works fine
Call Deassign User from a role - Leads to exception the trace is mentioned as follows

LDAPException(resultCode=16 (no such attribute), errorMessage='modify/delete: ftARC: no such value')
at com.unboundid.ldap.sdk.migrate.ldapjdk.LDAPConnection.modify(LDAPConnection.java:1137)
at com.unboundid.ldap.sdk.migrate.ldapjdk.LDAPConnection.modify(LDAPConnection.java:1154)
at us.jts.fortress.ldap.UnboundIdDataProvider.modify(UnboundIdDataProvider.java:241)
at us.jts.fortress.rbac.dao.unboundid.UserDAO.deassign(UserDAO.java:1683)
at us.jts.fortress.rbac.UserP.deassign(UserP.java:728)
at us.jts.fortress.rbac.DelAdminMgrImpl.deassignUser(DelAdminMgrImpl.java:296)

Things i have verified
1. User Exists
2. Role Exists
3. User is a role occupant of the mentioned role.

Any clues as to why this is happening.

Relevant piece of code.
//assign user
delAdminMgr = createAndGetDelAdminMgr();
UserAdminRole role = new UserAdminRole(userName, roleName);
try

{ delAdminMgr.assignUser(role); }

catch (SecurityException e) {

}
//remove user

delAdminMgr = createAndGetDelAdminMgr();
UserAdminRole role = new UserAdminRole(userName, roleName);
try

{ delAdminMgr.deassignUser(role); }

catch (SecurityException e) {



[FC-89] PoolMgr use of uninitialized variables Created: 20/Dec/13 Updated: 28/Dec/13 Resolved: 28/Dec/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC33
Fix Version/s: 1.0-RC34
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Correct PoolMgr usage of uninitialized variables:

private static String hostName;
private static int portId;



[FC-90] Administrative Permissions and Objects in search result set admin flag not set on return Created: 28/Dec/13 Updated: 29/Dec/13 Resolved: 29/Dec/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC33
Fix Version/s: 1.0-RC34
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

The isAdmin flag must be set on administrative permissions and objects returned from search.



[FC-91] Update copyright to 2014 Created: 28/Dec/13 Updated: 28/Dec/13 Resolved: 28/Dec/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC33
Fix Version/s: 1.0-RC34
Type: Task Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified


[FC-92] Simplify fortress openldap acls Created: 29/Dec/13 Updated: 29/Dec/13 Resolved: 29/Dec/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC33
Fix Version/s: 1.0-RC34
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Remove the following unnecessary ACL's from OL config file:

      1. Allow users to read permission records (needed for OAM authorization):
        access to dn.sub="ou=Permissions,ou=RBAC,@SUFFIX@" by users read
        access to dn.sub="ou=AdminPerms,ou=ARBAC,@SUFFIX@" by users read

access to dn.sub="ou=Permissions,ou=RBAC,ou=client123,@SUFFIX@" by users read
access to dn.sub="ou=AdminPerms,ou=ARBAC,ou=client123,@SUFFIX@" by users read

access to dn.sub="ou=Permissions,ou=RBAC,ou=client456,@SUFFIX@" by users read
access to dn.sub="ou=AdminPerms,ou=ARBAC,ou=client456,@SUFFIX@" by users read

access to dn.sub="ou=Permissions,ou=RBAC,ou=client789,@SUFFIX@" by users read
access to dn.sub="ou=AdminPerms,ou=ARBAC,ou=client789,@SUFFIX@" by users read



[FC-93] Factory createInstance for default HOME context Created: 29/Dec/13 Updated: 29/Dec/13 Resolved: 29/Dec/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC33
Fix Version/s: 1.0-RC34
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Add simplified methods for constructing fortress managers that do not require passing HOME tenant. This is useful when multitenancy is not needed.

for example:

/**

  • Create and return a reference to {@link us.jts.fortress.ReviewMgr} object using HOME context.
    *
    * @return instance of {@link us.jts.fortress.ReviewMgr}

    .

  • @throws SecurityException in the event of failure during instantiation.
    */
    public static us.jts.fortress.ReviewMgr createInstance()
    throws SecurityException { return createInstance( GlobalIds.HOME ); }


[FC-94] RC34 Release Created: 29/Dec/13 Updated: 29/Dec/13 Resolved: 29/Dec/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC33
Fix Version/s: 1.0-RC34
Type: Task Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified


[FC-95] PermDAO does not set DN on returned entity for Add/Update operations Created: 31/Dec/13 Updated: 20/Feb/14 Resolved: 20/Feb/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC34
Fix Version/s: 1.0-RC35
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Set DN to returned entity for add, update operations in PermDAO



[FC-96] RC34 Cleanup Created: 31/Dec/13 Updated: 31/Dec/13 Resolved: 31/Dec/13

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC34
Fix Version/s: None
Type: Task Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

update ivy xml to include the 34 released artifiacts



[FC-97] Support 3 part domain component for suffix Created: 19/Jan/14 Updated: 20/Feb/14 Resolved: 20/Feb/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC34
Fix Version/s: 1.0-RC35
Type: New Feature Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Add support for 3 part suffix - i.e. - dc=name1, dc=name2, dc=org



[FC-98] Change ACL to disallow user from all but user password Created: 24/Jan/14 Updated: 20/Feb/14 Resolved: 20/Feb/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC34
Fix Version/s: 1.0-RC35
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

The ACL setting in slapd.conf for user is currently defined:
access to attrs=userpassword,ftModCode,ftModId,ftModifier
by self write
by * auth

change to:
access to attrs=userpassword
by self write
by * auth



[FC-99] Update comments on init-slapd ant target Created: 08/Feb/14 Updated: 20/Feb/14 Resolved: 20/Feb/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC34
Fix Version/s: 1.0-RC35
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Environment:

Provide detailed comments on ant init-slapd target.


[FC-100] Store JAXB context in cache Created: 10/Feb/14 Updated: 20/Feb/14 Resolved: 20/Feb/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC34
Fix Version/s: 1.0-RC35
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Utilize cache for JAXB context for improved performance.



[FC-101] Integrate RBAC Accelerator Overlay Created: 18/Feb/14 Updated: 20/Feb/14 Resolved: 20/Feb/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC34
Fix Version/s: 1.0-RC35
Type: New Feature Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified


 Description   

Integrate RBAC Accelerator Overlay into Fortress



[FC-102] Normalize permission attributes Created: 19/Feb/14 Updated: 20/Feb/14 Resolved: 20/Feb/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC34
Fix Version/s: 1.0-RC35
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Issue Links:
Relates
relates to COM-91 Normalize permission attributes Resolved


 Description   

Change perm entities to use standardized attribute names for:
objName, objId



[FC-103] Fix parsing of Admin Role raw data Created: 19/Feb/14 Updated: 20/Feb/14 Resolved: 20/Feb/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC34
Fix Version/s: 1.0-RC35
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Fix Admin Role parsing alignment issue with constraint raw data.



[FC-104] RC35 Release Created: 19/Feb/14 Updated: 20/Feb/14 Resolved: 20/Feb/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC34
Fix Version/s: 1.0-RC35
Type: Task Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

RC35 Release



[FC-105] RC35 Cleanup Created: 22/Feb/14 Updated: 28/Feb/14 Resolved: 28/Feb/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: None
Fix Version/s: None
Type: Task Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Update ivy xml to include the RC35 artifacts. Update build properties to include latest symas openldap bulds.



[FC-106] Warning class needs to implement Serializable Created: 20/Mar/14 Updated: 20/Mar/14 Resolved: 20/Mar/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC35
Fix Version/s: 1.0-RC36
Type: Bug Priority: Minor
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

This is needed for Fortress session serialization.



[FC-107] Some tests are failing with JAVA 8 (due to the Map order being different) Created: 23/Apr/14 Updated: 25/Apr/14 Resolved: 25/Apr/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC35
Fix Version/s: 1.0-RC36
Type: Bug Priority: Blocker
Reporter: Emmanuel Lecharny Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

When running the tests with Java 8 instead of Java 7, we get a few errors, which boil down to some Map being ordered in a different way in Java 8.

In any case, no assumption should be made on a Map ordering, so this is clearly a bug that is likely to happen in the near future.

The failing test is in FortressJUnitApachedsTest.testAddActiveRole


 Comments   
Comment by Shawn McKinney [Administrator][23/Apr/14]

More info:

This test case fails:
assignUsersSSD( "ASGN-USRS_SSDT6B TU11 SSD_T6_B", UserTestData.USERS_TU11_SSD_HIER, RoleTestData.SSD_T6_B );

The following data entries correspond to what should be present inside SdUtil.validateSSD:

User

{userId='jtsTU11User3', internalId='null', roles=null, adminRoles=null, pwPolicy='null', cn='null', sn='null', dn='null', ou='null', description='null', beginTime='null', endTime='null', beginDate='null', endDate='null', beginLockDate='null', endLockDate='null', dayMask='null', name='null', employeeType='null', title='null', timeout=0, reset=false, locked=false, system=null, props=us.jts.fortress.rbac.Props@42ebaace, address=null, phones=null, mobiles=null, emails=null}

RoleoamT13SSD10, date : <null, null>, time : <null, null>, lock date : <null, null>, timeout : 0, daymask : null

Set<String> rls = rMgr.authorizedRoles(user);
oamT13SSD1

List<SDSet> ssdSets = getSsdCache(role.getName(), user.getContextId());
oamT6Ssd1

Set<String> map = ssd.getMembers();
oamT13SSD1, oamT13SSD6, oamT13SSD9

First time through this should throw an exception:

if (map.contains(authRole))
{
matchCount++;
// does the match count exceed the cardinality allowed for this particular SSD set?
if (matchCount >= ssd.getCardinality() - 1)

{ String error = "validateSSD new role [" + role.getName() + "] validates SSD Set Name:" + ssd.getName() + " Cardinality:" + ssd.getCardinality(); throw new SecurityException(GlobalErrIds.SSD_VALIDATION_FAILED, error); }

}

This is what is present in Java 8 env:

the map contains oamT13SSD1, oamT13SSD6, oamT13SSD9
the authRole is OAMT13SSD4, which is upper case

for some reason the call to Set<String> rls = rMgr.authorizedRoles(user);

returns OAMT13SSD4 instead of oamT13SSD1

Comment by Emmanuel Lecharny[23/Apr/14]

In Java 7, the call to Set<String> rls = rMgr.authorizedRoles(user); returns oamT13SSD1
In Java 8, the call to Set<String> rls = rMgr.authorizedRoles(user); returns OAMT13SSD4, oamT13SSD5

There is something wrong in the way we build the authz roles.

Comment by Shawn McKinney [Administrator][24/Apr/14]

Test failures running the FortressJunitTest suite under Java 8

junit Testcase: createSessionsDSD took 0.001 sec
junit FAILED
junit us.jts.fortress.rbac.AccessMgrImplTest.createSessionsDSD role cardinality check failed user-role list size user jtsTU12User1 dsd set oamDsdTest1 card 2 listsize 0 expected:<1> but was:<0>
junit junit.framework.AssertionFailedError: us.jts.fortress.rbac.AccessMgrImplTest.createSessionsDSD role cardinality check failed user-role list size user jtsTU12User1 dsd set oamDsdTest1 card 2 listsize 0 expected:<1> but was:<0>
junit at us.jts.fortress.rbac.AccessMgrImplTest.createSessionsDSD(AccessMgrImplTest.java:602)
junit at us.jts.fortress.rbac.AccessMgrImplTest.createSessionsDSD(AccessMgrImplTest.java:559)
junit
junit Testcase: createSessionsDSD took 0.001 sec
junit FAILED
junit us.jts.fortress.rbac.AccessMgrImplTest.createSessionsDSD role cardinality check failed user-role list size user jtsTU12User1 dsd set oamDsdTest1 card 2 listsize 0 expected:<1> but was:<0>
junit junit.framework.AssertionFailedError: us.jts.fortress.rbac.AccessMgrImplTest.createSessionsDSD role cardinality check failed user-role list size user jtsTU12User1 dsd set oamDsdTest1 card 2 listsize 0 expected:<1> but was:<0>
junit at us.jts.fortress.rbac.AccessMgrImplTest.createSessionsDSD(AccessMgrImplTest.java:602)
junit at us.jts.fortress.rbac.AccessMgrImplTest.createSessionsDSD(AccessMgrImplTest.java:559)
junit
junit Testcase: testSessionRole took 0.034 sec
junit Testcase: testCheckAccess took 1.872 sec
junit Testcase: testAddActiveRole took 0.217 sec
junit FAILED
junit us.jts.fortress.rbac.AccessMgrImplTest.addActiveRolesDSD cardinality test failed user jtsTU8User1 role oamDSDR1 ssd oamDsdTest1 cardinality 2 count 1
junit junit.framework.AssertionFailedError: us.jts.fortress.rbac.AccessMgrImplTest.addActiveRolesDSD cardinality test failed user jtsTU8User1 role oamDSDR1 ssd oamDsdTest1 cardinality 2 count 1
junit at us.jts.fortress.rbac.AccessMgrImplTest.addActiveRolesDSD(AccessMgrImplTest.java:1216)
junit at us.jts.fortress.rbac.AccessMgrImplTest.testAddActiveRole(AccessMgrImplTest.java:983)
junit
junit Testcase: testDropActiveRole took 0.03 sec

Comment by Shawn McKinney [Administrator][24/Apr/14]

Problem 1:

The hierarchical SSD test case depended on a faulty test dataset:

{ "oamT6Ssd3", /* NAME_COL */ "Test Case T6B", /* DESC_COL */ "2", /* CARDINALITY */ "oamT13SSD10,oamT13SSD5,oamT13SSD1", /* RELATIONSHIP_COL */}

};

The test case iterates on roles in relationship col and depends on assignment of 2nd role in set to fail due to SSD constraint. There is problem in dataset because only two of the three roles listed are constrained. The 3rd one (oamT13SS5) is OK. This problem was masked because previously (before Java 8) the roles were iterated in this order:
oamT13SSD1, oamT13SSD10, oamT13SSD5

When it hit the 2nd role, oamT13SSD10 an SSD constraint would throw an exception on assignUser which is the expected condition for this test case.

Under Java 8 the list is returned in this order:
oamT13SSD5, oamT13SSD10, oamT13SSD1

Because oamT13SSD5 isn't a member of the SSD dataset, when it hits the 2nd role oamT13SSD10, an exception is not thrown and the test case fails.

Because the members of SSD are a set, and a set is by its very definition an unordered list of elements, we cannot predetermine the order. This means every member must be in the SSD set (or inherited by a role in the SSD set). There is not a 3rd role that can be selected from the role test set that provides this condition.

The workaround is to remove the 3rd role from the test data set which means only 2 roles will be returned, and since these two roles always satisfy the test case, it fixes the problem while maintaining the test conditions.

Comment by Shawn McKinney [Administrator][25/Apr/14]

similarly this test case:

addActiveRolesDSD( "ADD-ACT-RLS-USRS_DSDT6B TU11 DSD_T6_B", UserTestData.USERS_TU11_SSD_HIER,
RoleTestData.DSD_T6_D );

was failing because this dataset was wrong but was masked because before java 7 returned in an order that ensured success due to mismatching role not getting called:

{ "oamT6Dsd3", /* NAME_COL */ "Test Case T6D", /* DESC_COL */ "2", /* WORKS FOR ADD ACTIVE ROLE DSD TESTS */ "oamT13DSD10,oamT13DSD5,oamT13DSD1", /* RELATIONSHIP_COL */ }

change dataset to remove the role that does not violate constraint:

{ "oamT6Dsd3", /* NAME_COL */ "Test Case T6D", /* DESC_COL */ "2", /* WORKS FOR ADD ACTIVE ROLE DSD TESTS */ "oamT13DSD10,oamT13DSD1", /* RELATIONSHIP_COL */ }

and test case passes under Java 8

Comment by Emmanuel Lecharny[25/Apr/14]

Excellent ! I would not be able to find the cause of those problems...


[FC-108] Add RBAC Accelerator client to Fortress Created: 23/Apr/14 Updated: 25/Apr/14 Resolved: 25/Apr/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC35
Fix Version/s: 1.0-RC36
Type: New Feature Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Add the Fortress Accelerator interface to Fortress so that it can call the extended LDAP operations for createSession, checkAccess, addActiveRole, etc.



[FC-109] Review the LOG statement for better performances Created: 24/Apr/14 Updated: 25/Apr/14 Resolved: 25/Apr/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC35
Fix Version/s: None
Type: Improvement Priority: Major
Reporter: Emmanuel Lecharny Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Currently, we have a lot of logs like :
LOG.debug( "addOrgUnits ou [" + entity.getName() + "] successful" );

Even if the debug level is not set, a String will be constructed and the getName() method will be callse. We can have a more efficient LOG by using :

LOG.debug( "addOrgUnits ou {} successful", entity.getName() );



 Comments   
Comment by Shawn McKinney [Administrator][24/Apr/14]

Just to make sure I have this right, statements like this:
LOG.debug( "toGraph child=" + child + ", parent=" + parent );

will be changed to this:
LOG.debug( "toGraph child={}, parent={}", child, parent );

Comment by Shawn McKinney [Administrator][24/Apr/14]

But what about this:

LOG.info( "loadGraph initializing ADMIN ROLE context [" + inHier.getContextId() + "]" );

If log level is set to info, there isn't any value in converting to this:

LOG.info( "loadGraph initializing ADMIN ROLE context {}", inHier.getContextId());

right?

or what about this one:

LOG.debug( "toGraph" );

any value in changing to:

LOG.debug( "{}", "toGraph" );

Comment by Shawn McKinney [Administrator][24/Apr/14]

And one more.

are there any benefit to doing this:

if ( LOG.isDebugEnabled() )
{
LOG.debug( "{} controls{}={}", methodName, i, controlsi );
}

over simply this?

LOG.debug( "{} controls{}={}", methodName, i, controlsi );

Comment by Emmanuel Lecharny[24/Apr/14]

Each parameter is injected in {}, in the order they appear. The limit is 2.

When you have no parameter, you can just do that :
LOG.debug( "toGraph" );

Comment by Emmanuel Lecharny[24/Apr/14]

In any case, it's still valuable to convert the LOG to use {}. If someone wants to disable info, why would we construct a String that will never be exposed ?

When you have more than 2 parameters, you have no other ways than doing something like :

if (LOG.isDebugEnabled())

{ LOG.debug( ... ) }

This way, you avoid building the String if debug is disabled.

Comment by Shawn McKinney [Administrator][24/Apr/14]

Was concerned a limit of two and ran a test:

Logger LOG = LoggerFactory.getLogger( FortressConsole.class );
Logger LOG = LoggerFactory.getLogger( FortressConsole.class );
LOG.info( "test log 1, 1:{}", "one" );
LOG.info( "test log 2, 1:{}, 2:{}", "one", "two");
LOG.info( "test log 3, 1:{}, 2:{}, 3:{}", "one", "two", "three");
LOG.info( "test log 4, 1:{}, 2:{}, 3:{}, 4:{}", "one", "two", "three", "four" );
LOG.info( "test log 4, 1:{}, 2:{}, 3:{}, 4:{}, 5:{}", "one", "two", "three", "four", "five" );
LOG.info( "test log 4, 1:{}, 2:{}, 3:{}, 4:{}, 5:{}, 6:{}", "one", "two", "three", "four", "five", "six" );
LOG.info( "test log 4, 1:{}, 2:{}, 3:{}, 4:{}, 5:{}, 6:{}, 7:{}", "one", "two", "three", "four", "five", "six", "seven" );
LOG.info( "test log 4, 1:{}, 2:{}, 3:{}, 4:{}, 5:{}, 6:{}, 7:{}, 8:{}", "one", "two", "three", "four", "five", "six", "seven", "eight" );
LOG.info( "test log 4, 1:{}, 2:{}, 3:{}, 4:{}, 5:{}, 6:{}, 7:{}, 8:{}, 9:{}", "one", "two", "three", "four", "five", "six", "seven", "eight", "nine" );
LOG.info( "test log 4, 1:{}, 2:{}, 3:{}, 4:{}, 5:{}, 6:{}, 7:{}, 8:{}, 9:{}, 10:{}", "one", "two", "three", "four", "five", "six", "seven", "eight", "nine", "ten" );

produced the hoped for output:

main (INFO ) test log 1, 1:one
main (INFO ) test log 2, 1:one, 2:two
main (INFO ) test log 3, 1:one, 2:two, 3:three
main (INFO ) test log 4, 1:one, 2:two, 3:three, 4:four
main (INFO ) test log 4, 1:one, 2:two, 3:three, 4:four, 5:five
main (INFO ) test log 4, 1:one, 2:two, 3:three, 4:four, 5:five, 6:six
main (INFO ) test log 4, 1:one, 2:two, 3:three, 4:four, 5:five, 6:six, 7:seven
main (INFO ) test log 4, 1:one, 2:two, 3:three, 4:four, 5:five, 6:six, 7:seven, 8:eight
main (INFO ) test log 4, 1:one, 2:two, 3:three, 4:four, 5:five, 6:six, 7:seven, 8:eight, 9:nine
main (INFO ) test log 4, 1:one, 2:two, 3:three, 4:four, 5:five, 6:six, 7:seven, 8:eight, 9:nine, 10:ten

Comment by Emmanuel Lecharny[24/Apr/14]

Ah, great, they fixed the limited number of arguments ! Probably because they now use the ellipsis notation, when they weren't in a previous version.


[FC-110] ObjectClass description in Javadoc could use different tags Created: 26/Apr/14 Updated: 28/Apr/14 Resolved: 28/Apr/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC35
Fix Version/s: 1.0-RC36
Type: Improvement Priority: Trivial
Reporter: Emmanuel Lecharny Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Many of the ObjectClass in Javadoc are using this formatting :

  • <ul>
  • <li> ------------------------------------------
  • <li> <code>objectclass ( 1.3.6.1.4.1.38088.3.2</code>
  • <li> <code>NAME 'ftProperties'</code>
  • <li> <code>DESC 'Fortress Properties AUX Object Class'</code>
  • <li> <code>AUXILIARY</code>
  • <li> <code>MAY ( ftProps ) ) </code>
  • <li> ------------------------------------------
  • </ul>

It results in a presentation which is not really what one would expect.

It would be better to use <pre>...</pre> like this :

  • <pre>
  • ------------------------------------------
  • objectclass ( 1.3.6.1.4.1.38088.3.2
  • NAME 'ftProperties'
  • DESC 'Fortress Properties AUX Object Class'
  • AUXILIARY
  • MAY ( ftProps )
  • )
  • ------------------------------------------
  • </pre>


[FC-111] The safeText method is probably not useful, and can be faster Created: 26/Apr/14 Updated: 29/Apr/14

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC35
Fix Version/s: None
Type: Improvement Priority: Major
Reporter: Emmanuel Lecharny Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

When we want to validate an entity before injecting it in the server, we call the RegExUtil.safeText() method.

It's checking something the server will already check (each value injected in the server will be controlled). Of course, we can set limits like the max length, but this can be done when defining the AttributeType (using the

{NNN}

notation).

Otherwise, the way the regexp is evaluated is costly : we compile the gexep every time, when it could be done only once.

Pattern safeTextPattern = Pattern.compile(safeTextPatternStr);

can be done globally.


 Comments   
Comment by Shawn McKinney [Administrator][27/Apr/14]

When I move to static

Pattern safeTextPattern = Pattern.compile(safeTextPatternStr);

Get this exception at runtime. Not opposed to moving away from regx to attribute type notation. How would that work here?

nt]
startAnt BUILD FAILED
startAnt /home/smckinn/GIT/fortressDev/openldap-fortress-core/ldap/setup/refreshLDAPData.xml:11: java.lang.ExceptionInInitiFortressAdmin 2014-04-27 09:55:47,507 (INFO ) DEBUG MODE 1
startAnt FortressAdmin 2014-04-27 09:55:47,507 (INFO ) addSuffixes name=jts description=JoshuaTree Software
startAnt alizerError
startAnt at org.openldap.fortress.util.attr.VUtil.safeText(VUtil.java:173)
startAnt at org.openldap.fortress.ldap.suffix.SuffixP.validate(SuffixP.java:135)
startAnt at org.openldap.fortress.ldap.suffix.SuffixP.add(SuffixP.java:70)
startAnt at org.openldap.fortress.ant.FortressAntTask.addSuffixes(FortressAntTask.java:1602)
startAnt at org.openldap.fortress.ant.FortressAntTask.execute(FortressAntTask.java:802)
startAnt at org.apache.tools.ant.UnknownElement.execute(UnknownElement.java:291)
startAnt at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
startAnt at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)
startAnt at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
startAnt at java.lang.reflect.Method.invoke(Method.java:601)
startAnt at org.apache.tools.ant.dispatch.DispatchUtils.execute(DispatchUtils.java:106)
startAnt at org.apache.tools.ant.Task.perform(Task.java:348)
startAnt at org.apache.tools.ant.Target.execute(Target.java:390)
startAnt at org.apache.tools.ant.Target.performTasks(Target.java:411)
startAnt at org.apache.tools.ant.Project.executeSortedTargets(Project.java:1399)
startAnt at org.apache.tools.ant.Project.executeTarget(Project.java:1368)
startAnt at org.apache.tools.ant.helper.DefaultExecutor.executeTargets(DefaultExecutor.java:41)
startAnt at org.apache.tools.ant.Project.executeTargets(Project.java:1251)
startAnt at org.apache.tools.ant.Main.runBuild(Main.java:809)
startAnt at org.apache.tools.ant.Main.startAnt(Main.java:217)
startAnt at org.apache.tools.ant.launch.Launcher.run(Launcher.java:280)
startAnt at org.apache.tools.ant.launch.Launcher.main(Launcher.java:109)
startAnt Caused by: java.lang.NullPointerException
startAnt at java.util.regex.Pattern.<init>(Pattern.java:1336)
startAnt at java.util.regex.Pattern.compile(Pattern.java:1022)
startAnt at org.openldap.fortress.util.attr.RegExUtil.<clinit>(RegExUtil.java:37)
startAnt ... 22 more
startAnt

Comment by Emmanuel Lecharny [27/Apr/14]

What is the content of safeTextPatternStr ?

Comment by Shawn McKinney [Administrator][27/Apr/14]

regXSafetext=^A-Za-z0-9-

Comment by Emmanuel Lecharny[29/Apr/14]

It should be ^[A-Za-z0-9-]*, no ?


[FC-112] Convert all package names, maven group and licenses to org.openldap Created: 26/Apr/14 Updated: 28/Apr/14 Resolved: 28/Apr/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC35
Fix Version/s: 1.0-RC36
Type: Task Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Issue Links:
Relates
relates to COM-98 Convert all package names, maven grou... Resolved
relates to EN-15 Convert all package names, maven grou... Resolved


[FC-113] RC36 Release Created: 27/Apr/14 Updated: 28/Apr/14 Resolved: 28/Apr/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC35
Fix Version/s: 1.0-RC36
Type: Task Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified


[FC-114] Fix javadoc in Session Class Created: 29/Apr/14 Updated: 28/May/14 Resolved: 28/May/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC36
Fix Version/s: 1.0-RC37
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

This class has public methods that need to be documented.



[FC-115] createSession with roles has problem related to DSD policies. Created: 18/May/14 Updated: 18/May/14 Resolved: 18/May/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC36
Fix Version/s: 1.0-RC37
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Create session with roles changed to validate constraints after the requested role list has been built.

The reason is if user has been assigned two roles that conflict with a single DSD policy, on who's behalf createSession is being called with just one of those roles requested being passed in, failure occurs because the requested role 'may' have been forced deactive from user's actual list during validate constraint check.

Currently (and because) Fortress has no way of adjudicating which conflicting role 'wins' during constraint validation checking, it will simply deactivate the first role it finds that violates a particular DSD policy.



[FC-116] CreateSession with default roles Created: 18/May/14 Updated: 28/May/14 Resolved: 28/May/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC36
Fix Version/s: 1.0-RC37
Type: New Feature Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified


[FC-117] CacheMgr classloader issues Created: 20/May/14 Updated: 28/May/14 Resolved: 28/May/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC36
Fix Version/s: 1.0-RC37
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Change to following for Tomcat context realm support:
// This call will create a new CacheManager, or throw exception if the it already exists, or if the configuration file is not found on classloader.

m_ftCacheImpl = new CacheMgr( new CacheManager( ClassUtil.resourceAsStream( cacheConfig ) ) );



[FC-118] Add support for LDAP Groups Created: 23/May/14 Updated: 28/May/14 Resolved: 28/May/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC36
Fix Version/s: 1.0-RC37
Type: New Feature Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Add support for LDAP groups (CRUD) and assignments to users.



[FC-119] admin console add/update user work Created: 24/May/14 Updated: 25/May/14 Resolved: 25/May/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC36
Fix Version/s: 1.0-RC37
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

The add and update user functions in adminConsole are test functions but they still should be usable for general purpose admin. This ticket clears up a couple of minor bugs.



[FC-120] Group console problems with update Created: 25/May/14 Updated: 25/May/14 Resolved: 25/May/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC36
Fix Version/s: 1.0-RC37
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

The update user functions in group console are test functions but still should be usable for general purpose admin. This ticket fixes update problems.


[FC-121] Clean up group exception processing Created: 25/May/14 Updated: 25/May/14 Resolved: 25/May/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC36
Fix Version/s: 1.0-RC37
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified


[FC-122] Make Group object class and attribute names configurable Created: 25/May/14 Updated: 25/May/14 Resolved: 25/May/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC36
Fix Version/s: 1.0-RC37
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Add to fortress properties configurations to control LDAP group name, and attribute names.



[FC-123] Add Group unit tests Created: 26/May/14 Updated: 26/May/14 Resolved: 26/May/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC36
Fix Version/s: 1.0-RC37
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Add group test cases that use ant loader. Also cleanup ant group entity processing.



[FC-124] Add and delete group properties using ant load Created: 26/May/14 Updated: 26/May/14 Resolved: 26/May/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC36
Fix Version/s: 1.0-RC37
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

add capability for ant load to add and remove group properties



[FC-125] Control group funcs with delegated access control Created: 26/May/14 Updated: 26/May/14 Resolved: 26/May/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC36
Fix Version/s: 1.0-RC37
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Enable delegated access control over group manager functions



[FC-126] Add toString for entities Created: 26/May/14 Updated: 28/May/14 Resolved: 28/May/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC36
Fix Version/s: 1.0-RC37
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

the fortress entities should override toString for display purposes



[FC-127] Add search group by users Created: 28/May/14 Updated: 28/May/14 Resolved: 28/May/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC36
Fix Version/s: 1.0-RC37
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Add findByUsers to groupmgr. Cleanup and refine tests and entity processing.



[FC-128] Fix Accelerator test cases Created: 28/May/14 Updated: 28/May/14 Resolved: 28/May/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC36
Fix Version/s: 1.0-RC37
Type: Bug Priority: Minor
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

fix a few minor problems with accelerator test cases not keeping up with changes on the server.



[FC-129] Fortress use sentry distribution Created: 28/May/14 Updated: 28/May/14 Resolved: 28/May/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC36
Fix Version/s: 1.0-RC37
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

change the sentry distribution classification to use 'dist':

<dependency org="org.openldap" name="sentry" rev="1.0-RC37" conf="default->master">
<artifact name="sentry" e:classifier="dist" type="jar"/>
</dependency>


 Comments   
Comment by Shawn McKinney [Administrator][28/May/14]

change setting in build.xml


[FC-130] Fortress default suffix change to dc=openldap,dc=org Created: 28/May/14 Updated: 28/May/14 Resolved: 28/May/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC36
Fix Version/s: 1.0-RC37
Type: Task Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

change the default suffix name from dc=jts, dc=us to dc=openldap, dc=org



[FC-131] RC37 Release Created: 28/May/14 Updated: 28/May/14 Resolved: 28/May/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC36
Fix Version/s: 1.0-RC37
Type: Task Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified


[FC-132] RC37 Cleanup Created: 28/May/14 Updated: 09/Aug/14 Resolved: 09/Aug/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC37
Fix Version/s: None
Type: Task Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Update ivy xml to include the RC37 artifacts



[FC-133] Fix Accelerator CreateSession negative test case Created: 03/Jun/14 Updated: 03/Jun/14 Resolved: 03/Jun/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC37
Fix Version/s: 1.0-RC38
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

fix negative test case in testCreateSession()



[FC-134] replace bootstrap props with group vals Created: 14/Jun/14 Updated: 05/Jul/14 Resolved: 05/Jul/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC37
Fix Version/s: 1.0-RC38
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

use ant replacement for the following group mgr values:

1. group object class name:
<replace file="$

{dst.bootstrap.conf}" token="@GROUP_OBJECT_CLASS@" value="${group.objectclass}"/>
2. group protocol attribute name:
<replace file="${dst.bootstrap.conf}

" token="@GROUP_PROTOCOL@" value="$

{group.protocol}

"/>
3. grop props attribute name:
<replace file="$

{dst.bootstrap.conf}

" token="@GROUP_PROPERTIES@" value="$

{group.properties}

"/>



[FC-135] add objectId to accel checkAccess Created: 26/Jun/14 Updated: 26/Jun/14 Resolved: 26/Jun/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC37
Fix Version/s: 1.0-RC38
Type: New Feature Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Issue Links:
Relates
relates to RA-22 Add ObjectId to checkAccess request Done
relates to RA-26 add objectId to accelerator checkAcce... Done
 Description   

Add objectId support to RBAC accelerator checkAccess operation.



[FC-136] Add sessionRoles to AccelMgr Created: 29/Jun/14 Updated: 05/Jul/14 Resolved: 05/Jul/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC37
Fix Version/s: 1.0-RC38


Type: New Feature Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Issue Links:
Relates
relates to RA-24 create sessionRoles operations - java... Done
relates to RA-27 create sessionRoles operations - server Done
 Description   

Add the sessionRoles method to AccelMgr interface. This calls the accelerator sessionRoles extended operation.



[FC-137] Add description to Permission entity Created: 29/Jun/14 Updated: 30/Jun/14 Resolved: 30/Jun/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC37
Fix Version/s: 1.0-RC38
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Issue Links: To Do
Relates
relates to RA-25create sessionPermissions operation
 Description   

Permission names can be terse thus hard to understand what they mean during setup.

The description field will allow users of the system to place human readable permission names onto these entities. This label can then be shown on administrative interfaces to help the user understand what they granting.

For example permission:

objNm : customer
opNm : read
description : allow user to inquire the customer record


 Comments   
Comment by Shawn McKinney [Administrator][29/Jun/14]

The description must be added before the sessionPermissions extended operation can be completed.


[FC-138] Remove public default constructors from DAOs Created: 29/Jun/14 Updated: 29/Jun/14 Resolved: 29/Jun/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC37
Fix Version/s: 1.0-RC38
Type: Task Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

Was originally intent as package private default constructors to prevent outside classes from constructions. With a move towards pluggable DAO impl's (unbound and apache), this is no longer possible to do because fortress dependent classes ('P' objects) reside in a separate package.



[FC-139] AcceleratorDAO CheckAccess sending empty objectId in request Created: 30/Jun/14 Updated: 30/Jun/14 Resolved: 30/Jun/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC37
Fix Version/s: 1.0-RC38
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

The objectId should not be encoded in request if empty.



[FC-140] RBAC Overlay DB dir not setup Created: 30/Jun/14 Updated: 30/Jun/14 Resolved: 30/Jun/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC37
Fix Version/s: 1.0-RC38
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

correct RBAC accelerator setup to create RBAC db.



[FC-141] RC38 Release Created: 05/Jul/14 Updated: 05/Jul/14 Resolved: 05/Jul/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC37
Fix Version/s: 1.0-RC38
Type: Task Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified


[FC-142] RC38 Cleanup Created: 06/Jul/14 Updated: 06/Jul/14 Resolved: 06/Jul/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC38
Fix Version/s: None
Type: Task Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified


[FC-143] Add SSL to Unbound connection pool Created: 02/Aug/14 Updated: 09/Aug/14 Resolved: 09/Aug/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC38
Fix Version/s: 1.0-RC39
Type: New Feature Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Issue Links:
Relates
relates to SEN-24 Add SSL to Unbound connection pool Resolved
 Description   

Update unbound connection pool to support SSL



[FC-144] Add Tomcat SSL to demo Created: 09/Aug/14 Updated: 09/Aug/14 Resolved: 09/Aug/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC38
Fix Version/s: 1.0-RC39
Type: New Feature Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Issue Links:
Relates
relates to FC-145 Add SSL to REST client Resolved
relates to SEN-25 Add Tomcat SSL to demo Resolved


[FC-145] Add SSL to REST client Created: 09/Aug/14 Updated: 09/Aug/14 Resolved: 09/Aug/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC38
Fix Version/s: 1.0-RC39
Type: New Feature Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Issue Links:
Relates
relates to FC-144 Add Tomcat SSL to demo Resolved
 Description   

Add capability for Fortress REST client to connect SSL with EnMasse Server



[FC-146] RC39 Release Created: 09/Aug/14 Updated: 09/Aug/14 Resolved: 09/Aug/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC38
Fix Version/s: 1.0-RC39
Type: Task Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified


[FC-147] RC39 Cleanup Created: 11/Aug/14 Updated: 11/Aug/14 Resolved: 11/Aug/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC39
Fix Version/s: 1.0-RC40
Type: Task Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified


[FC-148] Extend password max age for demo users Created: 05/Sep/14 Updated: 05/Sep/14 Resolved: 05/Sep/14

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC39
Fix Version/s: 1.0-RC40
Type: Task Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
 Description   

extend to: maxAge="7776000"



 Description   

Bug fixes and enhancements to apache DAO modules in preparation for unbound replacement.


[FC-149] AuditMgr.getUserAuthZs incorrectly handles failures

Status: Resolved
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC39
Fix Version/s: 1.0-RC40
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Issue Links:
Relates
relates to COM-115 Audit AuthZ lists all as failures Resolved
 Description   

getUserAuthZs does not work in terms of success or failure. Need to remap:

Use:
private static final String REQASSERTION = "reqAssertion";

field in auditCompare objectclass. It will contain the following if authorization failed:
attributeValue = "AuthZ Failed";

Change the DAO method to compare to the attributeValue and if true, set success to false, otherwise set success to true.



[FC-150] AuditMgr.getUserAuthZ cannot pull back faileOnly Created: 18/Sep/14 Updated: 18/Sep/14

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC39
Fix Version/s: 1.0-RC40
Type: Bug Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified
Issue Links:
Relates
relates to COM-116 Disable the audit authZ list failedOn... Open
 Description   

This search filter:

filter += "(" + REQASSERTION + "=" + GlobalIds.AUTH_Z_FAILED_VALUE + ")";

in AuditDAO.getAllAuthZs does not work. It appears the reqAssertion attribute cannot be searched on within the auditCompare object class. Have tested with ldapbrowser and does not pull back entries. Will need to come up with a work around.


[FC-151] UnboundID SDK removal preparations Created: 19/Oct/14 Updated: 19/Oct/14

Status: Open
Project: Fortress Core
Component/s: None
Affects Version/s: 1.0-RC39
Fix Version/s: 1.0-RC40
Type: Improvement Priority: Major
Reporter: Shawn McKinney [Administrator] Assignee: Shawn McKinney [Administrator]
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified