//%2006//////////////////////////////////////////////////////////////////////// // // Copyright (c) 2000, 2001, 2002 BMC Software; Hewlett-Packard Development // Company, L.P.; IBM Corp.; The Open Group; Tivoli Systems. // Copyright (c) 2003 BMC Software; Hewlett-Packard Development Company, L.P.; // IBM Corp.; EMC Corporation, The Open Group. // Copyright (c) 2004 BMC Software; Hewlett-Packard Development Company, L.P.; // IBM Corp.; EMC Corporation; VERITAS Software Corporation; The Open Group. // Copyright (c) 2005 Hewlett-Packard Development Company, L.P.; IBM Corp.; // EMC Corporation; VERITAS Software Corporation; The Open Group. // Copyright (c) 2006 Hewlett-Packard Development Company, L.P.; IBM Corp.; // EMC Corporation; Symantec Corporation; The Open Group. // // Permission is hereby granted, free of charge, to any person obtaining a copy // of this software and associated documentation files (the "Software"), to // deal in the Software without restriction, including without limitation the // rights to use, copy, modify, merge, publish, distribute, sublicense, and/or // sell copies of the Software, and to permit persons to whom the Software is // furnished to do so, subject to the following conditions: // // THE ABOVE COPYRIGHT NOTICE AND THIS PERMISSION NOTICE SHALL BE INCLUDED IN // ALL COPIES OR SUBSTANTIAL PORTIONS OF THE SOFTWARE. THE SOFTWARE IS PROVIDED // "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT // LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR // PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT // HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN // ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION // WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. // //============================================================================== // //%///////////////////////////////////////////////////////////////////////////// /////////////////////////////////////////////////////////////////////////////// // // This file has implementation for the security property owner class. // /////////////////////////////////////////////////////////////////////////////// #include "ConfigManager.h" #include "SecurityPropertyOwner.h" #include #include PEGASUS_USING_STD; PEGASUS_NAMESPACE_BEGIN /////////////////////////////////////////////////////////////////////////////// // SecurityPropertyOwner /////////////////////////////////////////////////////////////////////////////// static struct ConfigPropertyRow properties[] = { /////////////////////////////////////////////////////////////////////////////// // For z/OS, the follwing securtiy properties are fixed properties due to // listed in the FixedPropertyTablezOS.h . Because they are fixed, they // are hidden also: // // enableAuthentication // passwordFilePath // sslCertificateFilePath // sslKeyFilePath // sslTrustStore // crlStore // sslClientVerificationMode // sslTrustStoreUserName // enableNamespaceAuthorization // kerberosServiceName // enableSubscriptionsForNonprivilegedUsers // authorizedUserGroups /////////////////////////////////////////////////////////////////////////////// #ifdef PEGASUS_OS_PASE {"enableAuthentication", "true", IS_STATIC, 0, 0, IS_VISIBLE}, {"httpAuthType", "Basic", IS_STATIC, 0, 0, IS_VISIBLE}, {"passwordFilePath", "cimserver.passwd", IS_STATIC, 0, 0, IS_VISIBLE}, {"sslCertificateFilePath", "ssl/keystore/servercert.pem", IS_STATIC, 0, 0, IS_VISIBLE}, {"sslKeyFilePath", "ssl/keystore/serverkey.pem", IS_STATIC, 0, 0, IS_VISIBLE}, {"sslTrustStore", "ssl/truststore/", IS_STATIC, 0, 0, IS_VISIBLE}, # ifdef PEGASUS_ENABLE_SSL_CRL_VERIFICATION {"crlStore", "ssl/crlstore/", IS_STATIC, 0, 0, IS_VISIBLE}, # endif {"sslClientVerificationMode", "optional", IS_STATIC, 0, 0, IS_VISIBLE}, {"sslTrustStoreUserName", "", IS_STATIC, 0, 0, IS_VISIBLE}, {"enableNamespaceAuthorization", "true", IS_STATIC, 0, 0, IS_VISIBLE}, # ifdef PEGASUS_KERBEROS_AUTHENTICATION {"kerberosServiceName", "cimom", IS_STATIC, 0, 0, IS_VISIBLE}, # endif {"enableSubscriptionsForNonprivilegedUsers", "false", IS_STATIC, 0, 0, IS_VISIBLE}, {"enableRemotePrivilegedUserAccess", "true", IS_STATIC, 0, 0, IS_VISIBLE}, {"authorizedUserGroups", "", IS_STATIC, 0, 0, IS_VISIBLE}, #else // PEGASUS_OS_PASE {"enableAuthentication", "false", IS_STATIC, 0, 0, IS_VISIBLE}, {"httpAuthType", "Basic", IS_STATIC, 0, 0, IS_VISIBLE}, {"passwordFilePath", "cimserver.passwd", IS_STATIC, 0, 0, IS_VISIBLE}, #ifdef PEGASUS_OS_HPUX {"sslCertificateFilePath", "cert.pem", IS_STATIC, 0, 0, IS_VISIBLE}, #else {"sslCertificateFilePath", "server.pem", IS_STATIC, 0, 0, IS_VISIBLE}, #endif {"sslKeyFilePath", "file.pem", IS_STATIC, 0, 0, IS_VISIBLE}, {"sslTrustStore", "cimserver_trust", IS_STATIC, 0, 0, IS_VISIBLE}, #ifdef PEGASUS_ENABLE_SSL_CRL_VERIFICATION {"crlStore", "crl", IS_STATIC, 0, 0, IS_VISIBLE}, #endif {"sslClientVerificationMode", "disabled", IS_STATIC, 0, 0, IS_VISIBLE}, {"sslTrustStoreUserName", "", IS_STATIC, 0, 0, IS_VISIBLE}, {"enableNamespaceAuthorization", "false", IS_STATIC, 0, 0, IS_VISIBLE}, #ifdef PEGASUS_KERBEROS_AUTHENTICATION {"kerberosServiceName", "cimom", IS_STATIC, 0, 0, IS_VISIBLE}, #endif #if defined(PEGASUS_OS_HPUX) || defined(PEGASUS_OS_LINUX) # ifdef PEGASUS_USE_RELEASE_CONFIG_OPTIONS {"enableSubscriptionsForNonprivilegedUsers", "false", IS_STATIC, 0, 0, IS_VISIBLE}, # else {"enableSubscriptionsForNonprivilegedUsers", "true", IS_STATIC, 0, 0, IS_VISIBLE}, # endif #else {"enableSubscriptionsForNonprivilegedUsers", "true", IS_STATIC, 0, 0, IS_HIDDEN}, #endif #ifdef PEGASUS_OS_ZOS {"enableRemotePrivilegedUserAccess", "false", IS_STATIC, 0, 0, IS_VISIBLE}, {"enableCFZAPPLID", "true", IS_STATIC, 0, 0, IS_VISIBLE}, #else {"enableRemotePrivilegedUserAccess", "true", IS_STATIC, 0, 0, IS_VISIBLE}, #endif #ifdef PEGASUS_ENABLE_USERGROUP_AUTHORIZATION {"authorizedUserGroups", "", IS_STATIC, 0, 0, IS_VISIBLE}, #endif #endif }; const Uint32 NUM_PROPERTIES = sizeof(properties) / sizeof(properties[0]); /** Constructors */ SecurityPropertyOwner::SecurityPropertyOwner() { _enableAuthentication.reset(new ConfigProperty()); _enableNamespaceAuthorization.reset(new ConfigProperty()); _httpAuthType.reset(new ConfigProperty()); _passwordFilePath.reset(new ConfigProperty()); _certificateFilePath.reset(new ConfigProperty()); _keyFilePath.reset(new ConfigProperty()); _trustStore.reset(new ConfigProperty()); #ifdef PEGASUS_ENABLE_SSL_CRL_VERIFICATION _crlStore.reset(new ConfigProperty()); #endif _sslClientVerificationMode.reset(new ConfigProperty()); _sslTrustStoreUserName.reset(new ConfigProperty()); _enableRemotePrivilegedUserAccess.reset(new ConfigProperty()); _enableSubscriptionsForNonprivilegedUsers.reset(new ConfigProperty()); #ifdef PEGASUS_ENABLE_USERGROUP_AUTHORIZATION _authorizedUserGroups.reset(new ConfigProperty()); #endif #ifdef PEGASUS_KERBEROS_AUTHENTICATION _kerberosServiceName.reset(new ConfigProperty()); #endif #ifdef PEGASUS_OS_ZOS _enableCFZAPPLID.reset(new ConfigProperty()); #endif } /** Initialize the config properties. */ void SecurityPropertyOwner::initialize() { for (Uint32 i = 0; i < NUM_PROPERTIES; i++) { // // Initialize the properties with default values // if (String::equalNoCase( properties[i].propertyName, "enableAuthentication")) { _enableAuthentication->propertyName = properties[i].propertyName; _enableAuthentication->defaultValue = properties[i].defaultValue; _enableAuthentication->currentValue = properties[i].defaultValue; _enableAuthentication->plannedValue = properties[i].defaultValue; _enableAuthentication->dynamic = properties[i].dynamic; _enableAuthentication->domain = properties[i].domain; _enableAuthentication->domainSize = properties[i].domainSize; _enableAuthentication->externallyVisible = properties[i].externallyVisible; } else if (String::equalNoCase( properties[i].propertyName, "enableNamespaceAuthorization")) { _enableNamespaceAuthorization->propertyName = properties[i].propertyName; _enableNamespaceAuthorization->defaultValue = properties[i].defaultValue; _enableNamespaceAuthorization->currentValue = properties[i].defaultValue; _enableNamespaceAuthorization->plannedValue = properties[i].defaultValue; _enableNamespaceAuthorization->dynamic = properties[i].dynamic; _enableNamespaceAuthorization->domain = properties[i].domain; _enableNamespaceAuthorization->domainSize = properties[i].domainSize; _enableNamespaceAuthorization->externallyVisible = properties[i].externallyVisible; } else if (String::equalNoCase( properties[i].propertyName, "httpAuthType")) { _httpAuthType->propertyName = properties[i].propertyName; _httpAuthType->defaultValue = properties[i].defaultValue; _httpAuthType->currentValue = properties[i].defaultValue; _httpAuthType->plannedValue = properties[i].defaultValue; _httpAuthType->dynamic = properties[i].dynamic; _httpAuthType->domain = properties[i].domain; _httpAuthType->domainSize = properties[i].domainSize; _httpAuthType->externallyVisible = properties[i].externallyVisible; } else if (String::equalNoCase( properties[i].propertyName, "passwordFilePath")) { _passwordFilePath->propertyName = properties[i].propertyName; _passwordFilePath->defaultValue = properties[i].defaultValue; _passwordFilePath->currentValue = properties[i].defaultValue; _passwordFilePath->plannedValue = properties[i].defaultValue; _passwordFilePath->dynamic = properties[i].dynamic; _passwordFilePath->domain = properties[i].domain; _passwordFilePath->domainSize = properties[i].domainSize; _passwordFilePath->externallyVisible = properties[i].externallyVisible; } else if (String::equalNoCase( properties[i].propertyName, "sslCertificateFilePath")) { _certificateFilePath->propertyName = properties[i].propertyName; _certificateFilePath->defaultValue = properties[i].defaultValue; _certificateFilePath->currentValue = properties[i].defaultValue; _certificateFilePath->plannedValue = properties[i].defaultValue; _certificateFilePath->dynamic = properties[i].dynamic; _certificateFilePath->domain = properties[i].domain; _certificateFilePath->domainSize = properties[i].domainSize; _certificateFilePath->externallyVisible = properties[i].externallyVisible; } else if (String::equalNoCase( properties[i].propertyName, "sslKeyFilePath")) { _keyFilePath->propertyName = properties[i].propertyName; _keyFilePath->defaultValue = properties[i].defaultValue; _keyFilePath->currentValue = properties[i].defaultValue; _keyFilePath->plannedValue = properties[i].defaultValue; _keyFilePath->dynamic = properties[i].dynamic; _keyFilePath->domain = properties[i].domain; _keyFilePath->domainSize = properties[i].domainSize; _keyFilePath->externallyVisible = properties[i].externallyVisible; } else if (String::equalNoCase( properties[i].propertyName, "sslTrustStore")) { _trustStore->propertyName = properties[i].propertyName; _trustStore->defaultValue = properties[i].defaultValue; _trustStore->currentValue = properties[i].defaultValue; _trustStore->plannedValue = properties[i].defaultValue; _trustStore->dynamic = properties[i].dynamic; _trustStore->domain = properties[i].domain; _trustStore->domainSize = properties[i].domainSize; _trustStore->externallyVisible = properties[i].externallyVisible; // do not initialize trustpath; a truststore is not required // for SSL handshakes a server may wish to connect on HTTPS // but not verify clients } #ifdef PEGASUS_ENABLE_SSL_CRL_VERIFICATION else if (String::equalNoCase( properties[i].propertyName, "crlStore")) { _crlStore->propertyName = properties[i].propertyName; _crlStore->defaultValue = properties[i].defaultValue; _crlStore->currentValue = properties[i].defaultValue; _crlStore->plannedValue = properties[i].defaultValue; _crlStore->dynamic = properties[i].dynamic; _crlStore->domain = properties[i].domain; _crlStore->domainSize = properties[i].domainSize; _crlStore->externallyVisible = properties[i].externallyVisible; } #endif else if (String::equalNoCase( properties[i].propertyName, "sslClientVerificationMode")) { _sslClientVerificationMode->propertyName = properties[i].propertyName; _sslClientVerificationMode->defaultValue = properties[i].defaultValue; _sslClientVerificationMode->currentValue = properties[i].defaultValue; _sslClientVerificationMode->plannedValue = properties[i].defaultValue; _sslClientVerificationMode->dynamic = properties[i].dynamic; _sslClientVerificationMode->domain = properties[i].domain; _sslClientVerificationMode->domainSize = properties[i].domainSize; _sslClientVerificationMode->externallyVisible = properties[i].externallyVisible; } else if (String::equalNoCase( properties[i].propertyName, "sslTrustStoreUserName")) { _sslTrustStoreUserName->propertyName = properties[i].propertyName; _sslTrustStoreUserName->defaultValue = properties[i].defaultValue; _sslTrustStoreUserName->currentValue = properties[i].defaultValue; _sslTrustStoreUserName->plannedValue = properties[i].defaultValue; _sslTrustStoreUserName->dynamic = properties[i].dynamic; _sslTrustStoreUserName->domain = properties[i].domain; _sslTrustStoreUserName->domainSize = properties[i].domainSize; _sslTrustStoreUserName->externallyVisible = properties[i].externallyVisible; } else if (String::equalNoCase( properties[i].propertyName, "enableRemotePrivilegedUserAccess")) { _enableRemotePrivilegedUserAccess->propertyName = properties[i].propertyName; _enableRemotePrivilegedUserAccess->defaultValue = properties[i].defaultValue; _enableRemotePrivilegedUserAccess->currentValue = properties[i].defaultValue; _enableRemotePrivilegedUserAccess->plannedValue = properties[i].defaultValue; _enableRemotePrivilegedUserAccess->dynamic = properties[i].dynamic; _enableRemotePrivilegedUserAccess->domain = properties[i].domain; _enableRemotePrivilegedUserAccess->domainSize = properties[i].domainSize; _enableRemotePrivilegedUserAccess->externallyVisible = properties[i].externallyVisible; } else if (String::equalNoCase(properties[i].propertyName, "enableSubscriptionsForNonprivilegedUsers")) { _enableSubscriptionsForNonprivilegedUsers->propertyName = properties[i].propertyName; _enableSubscriptionsForNonprivilegedUsers->defaultValue = properties[i].defaultValue; _enableSubscriptionsForNonprivilegedUsers->currentValue = properties[i].defaultValue; _enableSubscriptionsForNonprivilegedUsers->plannedValue = properties[i].defaultValue; _enableSubscriptionsForNonprivilegedUsers->dynamic = properties[i].dynamic; _enableSubscriptionsForNonprivilegedUsers->domain = properties[i].domain; _enableSubscriptionsForNonprivilegedUsers->domainSize = properties[i].domainSize; _enableSubscriptionsForNonprivilegedUsers->externallyVisible = properties[i].externallyVisible; } #ifdef PEGASUS_ENABLE_USERGROUP_AUTHORIZATION else if (String::equalNoCase( properties[i].propertyName, "authorizedUserGroups")) { _authorizedUserGroups->propertyName = properties[i].propertyName; _authorizedUserGroups->defaultValue = properties[i].defaultValue; _authorizedUserGroups->currentValue = properties[i].defaultValue; _authorizedUserGroups->plannedValue = properties[i].defaultValue; _authorizedUserGroups->dynamic = properties[i].dynamic; _authorizedUserGroups->domain = properties[i].domain; _authorizedUserGroups->domainSize = properties[i].domainSize; _authorizedUserGroups->externallyVisible = properties[i].externallyVisible; } #endif #ifdef PEGASUS_KERBEROS_AUTHENTICATION else if (String::equalNoCase( properties[i].propertyName, "kerberosServiceName")) { _kerberosServiceName->propertyName = properties[i].propertyName; _kerberosServiceName->defaultValue = properties[i].defaultValue; _kerberosServiceName->currentValue = properties[i].defaultValue; _kerberosServiceName->plannedValue = properties[i].defaultValue; _kerberosServiceName->dynamic = properties[i].dynamic; _kerberosServiceName->domain = properties[i].domain; _kerberosServiceName->domainSize = properties[i].domainSize; _kerberosServiceName->externallyVisible = properties[i].externallyVisible; } #endif #ifdef PEGASUS_OS_ZOS else if (String::equalNoCase( properties[i].propertyName, "enableCFZAPPLID")) { _enableCFZAPPLID->propertyName = properties[i].propertyName; _enableCFZAPPLID->defaultValue = properties[i].defaultValue; _enableCFZAPPLID->currentValue = properties[i].defaultValue; _enableCFZAPPLID->plannedValue = properties[i].defaultValue; _enableCFZAPPLID->dynamic = properties[i].dynamic; _enableCFZAPPLID->domain = properties[i].domain; _enableCFZAPPLID->domainSize = properties[i].domainSize; _enableCFZAPPLID->externallyVisible = properties[i].externallyVisible; } #endif } } struct ConfigProperty* SecurityPropertyOwner::_lookupConfigProperty( const String& name) const { if (String::equalNoCase(_enableAuthentication->propertyName, name)) { return _enableAuthentication.get(); } else if (String::equalNoCase( _enableNamespaceAuthorization->propertyName, name)) { return _enableNamespaceAuthorization.get(); } else if (String::equalNoCase(_httpAuthType->propertyName, name)) { return _httpAuthType.get(); } else if (String::equalNoCase(_passwordFilePath->propertyName, name)) { return _passwordFilePath.get(); } else if (String::equalNoCase(_certificateFilePath->propertyName, name)) { return _certificateFilePath.get(); } else if (String::equalNoCase(_keyFilePath->propertyName, name)) { return _keyFilePath.get(); } else if (String::equalNoCase(_trustStore->propertyName, name)) { return _trustStore.get(); } #ifdef PEGASUS_ENABLE_SSL_CRL_VERIFICATION else if (String::equalNoCase(_crlStore->propertyName, name)) { return _crlStore.get(); } #endif else if (String::equalNoCase( _sslClientVerificationMode->propertyName, name)) { return _sslClientVerificationMode.get(); } else if (String::equalNoCase( _sslTrustStoreUserName->propertyName, name)) { return _sslTrustStoreUserName.get(); } else if (String::equalNoCase( _enableRemotePrivilegedUserAccess->propertyName, name)) { return _enableRemotePrivilegedUserAccess.get(); } else if (String::equalNoCase( _enableSubscriptionsForNonprivilegedUsers->propertyName, name)) { return _enableSubscriptionsForNonprivilegedUsers.get(); } #ifdef PEGASUS_ENABLE_USERGROUP_AUTHORIZATION else if (String::equalNoCase(_authorizedUserGroups->propertyName, name)) { return _authorizedUserGroups.get(); } #endif #ifdef PEGASUS_KERBEROS_AUTHENTICATION else if (String::equalNoCase(_kerberosServiceName->propertyName, name)) { return _kerberosServiceName.get(); } #endif #ifdef PEGASUS_OS_ZOS else if (String::equalNoCase(_enableCFZAPPLID->propertyName, name)) { return _enableCFZAPPLID.get(); } #endif else { throw UnrecognizedConfigProperty(name); } } /** Get information about the specified property. */ void SecurityPropertyOwner::getPropertyInfo( const String& name, Array& propertyInfo) const { propertyInfo.clear(); struct ConfigProperty * configProperty = _lookupConfigProperty(name); propertyInfo.append(configProperty->propertyName); propertyInfo.append(configProperty->defaultValue); propertyInfo.append(configProperty->currentValue); propertyInfo.append(configProperty->plannedValue); if (configProperty->dynamic) { propertyInfo.append(STRING_TRUE); } else { propertyInfo.append(STRING_FALSE); } if (configProperty->externallyVisible) { propertyInfo.append(STRING_TRUE); } else { propertyInfo.append(STRING_FALSE); } } /** Get default value of the specified property. */ String SecurityPropertyOwner::getDefaultValue(const String& name) const { struct ConfigProperty * configProperty = _lookupConfigProperty(name); return configProperty->defaultValue; } /** Get current value of the specified property. */ String SecurityPropertyOwner::getCurrentValue(const String& name) const { struct ConfigProperty * configProperty = _lookupConfigProperty(name); return configProperty->currentValue; } /** Get planned value of the specified property. */ String SecurityPropertyOwner::getPlannedValue(const String& name) const { struct ConfigProperty * configProperty = _lookupConfigProperty(name); return configProperty->plannedValue; } /** Init current value of the specified property to the specified value. */ void SecurityPropertyOwner::initCurrentValue( const String& name, const String& value) { struct ConfigProperty* configProperty = _lookupConfigProperty(name); configProperty->currentValue = value; } /** Init planned value of the specified property to the specified value. */ void SecurityPropertyOwner::initPlannedValue( const String& name, const String& value) { struct ConfigProperty* configProperty = _lookupConfigProperty(name); configProperty->plannedValue = value; } /** Update current value of the specified property to the specified value. */ void SecurityPropertyOwner::updateCurrentValue( const String& name, const String& value) { // // make sure the property is dynamic before updating the value. // if (!isDynamic(name)) { throw NonDynamicConfigProperty(name); } struct ConfigProperty* configProperty = _lookupConfigProperty(name); configProperty->currentValue = value; } /** Update planned value of the specified property to the specified value. */ void SecurityPropertyOwner::updatePlannedValue( const String& name, const String& value) { struct ConfigProperty* configProperty = _lookupConfigProperty(name); configProperty->plannedValue = value; } /** Checks to see if the given value is valid or not. */ Boolean SecurityPropertyOwner::isValid( const String& name, const String& value) const { Boolean retVal = false; // // Validate the specified value // if (String::equalNoCase(_enableAuthentication->propertyName, name)) { if (String::equal(value, "true") || String::equal(value, "false")) { retVal = true; } } else if (String::equalNoCase( _enableNamespaceAuthorization->propertyName, name)) { if (String::equal(value, "true") || String::equal(value, "false")) { retVal = true; } } else if (String::equalNoCase(_httpAuthType->propertyName, name)) { if (String::equal(value, "Basic") || String::equal(value, "Digest") #ifdef PEGASUS_KERBEROS_AUTHENTICATION || String::equal(value, "Kerberos") #endif ) { retVal = true; } } else if (String::equalNoCase(_passwordFilePath->propertyName, name)) { String fileName(value); // // Check if the file path is empty // if (fileName == String::EMPTY) { return false; } fileName = ConfigManager::getHomedPath(fileName); // // Check if the file path is a directory // FileSystem::translateSlashes(fileName); if (FileSystem::isDirectory(fileName)) { return false; } // // Check if the file exists and is writable // if (FileSystem::exists(fileName)) { if (!FileSystem::canWrite(fileName)) { return false; } else { return true; } } else { // // Check if directory is writable // Uint32 pos = fileName.reverseFind('/'); if (pos != PEG_NOT_FOUND) { String dirName = fileName.subString(0,pos); if (!FileSystem::isDirectory(dirName)) { return false; } if (!FileSystem::canWrite(dirName) ) { return false; } else { return true; } } else { String currentDir; // // Check if there is permission to write in the // current working directory // FileSystem::getCurrentDirectory(currentDir); if (!FileSystem::canWrite(currentDir)) { return false; } else { return true; } } } } else if (String::equalNoCase(_certificateFilePath->propertyName, name) || String::equalNoCase(_keyFilePath->propertyName, name)) { // // Check if the file path is empty // if (value == String::EMPTY) { return false; } String fileName = ConfigManager::getHomedPath(value); // // Check if the file path is a directory // FileSystem::translateSlashes(fileName); if (FileSystem::isDirectory(fileName)) { return false; } // // Check if the file exists and is readable and is not empty. // if (FileSystem::exists(fileName) && FileSystem::canRead(fileName)) { Uint32 size; if (FileSystem::getFileSize(fileName, size)) { if (size > 0) { return true; } } } return false; } else if (String::equalNoCase(_trustStore->propertyName, name) #ifdef PEGASUS_ENABLE_SSL_CRL_VERIFICATION || String::equalNoCase(_crlStore->propertyName, name) #endif ) { // // Allow the file path to be empty // if (value == String::EMPTY) { return true; } String fileName = ConfigManager::getHomedPath(value); // // Check if the file path is a directory // FileSystem::translateSlashes(fileName); if (FileSystem::isDirectory(fileName)) { // // Truststore can be a directory, congruent with OpenSSL standards // Check if the directoy has read and write permissions // if (FileSystem::canRead(fileName) && FileSystem::canWrite(fileName)) { return true; } } // // Check if the file exists and is readable // else if (FileSystem::exists(fileName) && FileSystem::canRead(fileName)) { return true; } return false; } else if (String::equalNoCase( _sslClientVerificationMode->propertyName, name)) { if (String::equal(value, "disabled") || String::equal(value, "required") || String::equal(value, "optional")) { retVal = true; } } else if (String::equalNoCase(_sslTrustStoreUserName->propertyName, name)) { if (System::isSystemUser((const char*)value.getCString())) { return true; } } else if (String::equalNoCase( _enableRemotePrivilegedUserAccess->propertyName, name)) { if (String::equal(value, "true") || String::equal(value, "false")) { retVal = true; } } else if (String::equalNoCase( _enableSubscriptionsForNonprivilegedUsers->propertyName, name)) { if (String::equal(value, "true") || String::equal(value, "false")) { retVal = true; } } #ifdef PEGASUS_ENABLE_USERGROUP_AUTHORIZATION else if (String::equalNoCase(_authorizedUserGroups->propertyName, name)) { retVal = true; } #endif #ifdef PEGASUS_KERBEROS_AUTHENTICATION else if (String::equalNoCase(_kerberosServiceName->propertyName, name)) { String serviceName(value); // // Check if the service name is empty // if (serviceName == String::EMPTY || serviceName== "") { retVal = false; } else { retVal = true; } } #endif #ifdef PEGASUS_OS_ZOS else if (String::equalNoCase(_enableCFZAPPLID->propertyName, name)) { if (String::equalNoCase(value, "true") || String::equalNoCase(value, "false")) { retVal = true; } } #endif else { throw UnrecognizedConfigProperty(name); } return retVal; } /** Checks to see if the specified property is dynamic or not. */ Boolean SecurityPropertyOwner::isDynamic(const String& name) const { struct ConfigProperty* configProperty =_lookupConfigProperty(name); return (configProperty->dynamic == IS_DYNAMIC); } PEGASUS_NAMESPACE_END