mirror of
https://repository.entgra.net/community/device-mgt-core.git
synced 2025-10-06 02:01:45 +00:00
Merge branch 'master' of https://github.com/wso2/carbon-device-mgt
This commit is contained in:
commit
34edbce1a0
@ -9,8 +9,8 @@ import org.wso2.carbon.certificate.mgt.cert.jaxrs.api.beans.EnrollmentCertificat
|
|||||||
import org.wso2.carbon.certificate.mgt.cert.jaxrs.api.beans.ErrorResponse;
|
import org.wso2.carbon.certificate.mgt.cert.jaxrs.api.beans.ErrorResponse;
|
||||||
import org.wso2.carbon.certificate.mgt.cert.jaxrs.api.util.DeviceMgtAPIUtils;
|
import org.wso2.carbon.certificate.mgt.cert.jaxrs.api.util.DeviceMgtAPIUtils;
|
||||||
import org.wso2.carbon.certificate.mgt.cert.jaxrs.api.util.RequestValidationUtil;
|
import org.wso2.carbon.certificate.mgt.cert.jaxrs.api.util.RequestValidationUtil;
|
||||||
import org.wso2.carbon.certificate.mgt.core.dao.CertificateManagementDAOException;
|
|
||||||
import org.wso2.carbon.certificate.mgt.core.dto.CertificateResponse;
|
import org.wso2.carbon.certificate.mgt.core.dto.CertificateResponse;
|
||||||
|
import org.wso2.carbon.certificate.mgt.core.exception.CertificateManagementException;
|
||||||
import org.wso2.carbon.certificate.mgt.core.exception.KeystoreException;
|
import org.wso2.carbon.certificate.mgt.core.exception.KeystoreException;
|
||||||
import org.wso2.carbon.certificate.mgt.core.service.CertificateManagementService;
|
import org.wso2.carbon.certificate.mgt.core.service.CertificateManagementService;
|
||||||
import org.wso2.carbon.context.PrivilegedCarbonContext;
|
import org.wso2.carbon.context.PrivilegedCarbonContext;
|
||||||
@ -76,7 +76,7 @@ public class CertificateManagementAdminServiceImpl implements CertificateManagem
|
|||||||
try {
|
try {
|
||||||
certificateResponse = certificateService.searchCertificates(serialNumber);
|
certificateResponse = certificateService.searchCertificates(serialNumber);
|
||||||
return Response.status(Response.Status.OK).entity(certificateResponse).build();
|
return Response.status(Response.Status.OK).entity(certificateResponse).build();
|
||||||
} catch (CertificateManagementDAOException e) {
|
} catch (CertificateManagementException e) {
|
||||||
String msg = "Error occurred while converting PEM file to X509Certificate";
|
String msg = "Error occurred while converting PEM file to X509Certificate";
|
||||||
log.error(msg, e);
|
log.error(msg, e);
|
||||||
throw new UnexpectedServerErrorException(
|
throw new UnexpectedServerErrorException(
|
||||||
@ -106,7 +106,7 @@ public class CertificateManagementAdminServiceImpl implements CertificateManagem
|
|||||||
certificates.setCount(result.getRecordsTotal());
|
certificates.setCount(result.getRecordsTotal());
|
||||||
certificates.setList((List<CertificateResponse>) result.getData());
|
certificates.setList((List<CertificateResponse>) result.getData());
|
||||||
return Response.status(Response.Status.OK).entity(certificates).build();
|
return Response.status(Response.Status.OK).entity(certificates).build();
|
||||||
} catch (CertificateManagementDAOException e) {
|
} catch (CertificateManagementException e) {
|
||||||
String msg = "Error occurred while fetching all certificates.";
|
String msg = "Error occurred while fetching all certificates.";
|
||||||
log.error(msg, e);
|
log.error(msg, e);
|
||||||
throw new UnexpectedServerErrorException(
|
throw new UnexpectedServerErrorException(
|
||||||
@ -128,7 +128,7 @@ public class CertificateManagementAdminServiceImpl implements CertificateManagem
|
|||||||
}
|
}
|
||||||
return Response.status(Response.Status.OK).entity("Certificate that carries the serial number '" +
|
return Response.status(Response.Status.OK).entity("Certificate that carries the serial number '" +
|
||||||
serialNumber + "' has been removed").build();
|
serialNumber + "' has been removed").build();
|
||||||
} catch (CertificateManagementDAOException e) {
|
} catch (CertificateManagementException e) {
|
||||||
String msg = "Error occurred while converting PEM file to X509Certificate";
|
String msg = "Error occurred while converting PEM file to X509Certificate";
|
||||||
log.error(msg, e);
|
log.error(msg, e);
|
||||||
throw new UnexpectedServerErrorException(
|
throw new UnexpectedServerErrorException(
|
||||||
|
|||||||
@ -18,11 +18,11 @@
|
|||||||
|
|
||||||
package org.wso2.carbon.certificate.mgt.core.dao;
|
package org.wso2.carbon.certificate.mgt.core.dao;
|
||||||
|
|
||||||
|
import org.wso2.carbon.certificate.mgt.core.bean.Certificate;
|
||||||
import org.wso2.carbon.certificate.mgt.core.dto.CertificateResponse;
|
import org.wso2.carbon.certificate.mgt.core.dto.CertificateResponse;
|
||||||
import org.wso2.carbon.device.mgt.common.PaginationRequest;
|
import org.wso2.carbon.device.mgt.common.PaginationRequest;
|
||||||
import org.wso2.carbon.device.mgt.common.PaginationResult;
|
import org.wso2.carbon.device.mgt.common.PaginationResult;
|
||||||
|
|
||||||
import java.io.ByteArrayInputStream;
|
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -37,8 +37,9 @@ public interface CertificateDAO {
|
|||||||
*
|
*
|
||||||
* @param certificate Holds the certificate and relevant details.
|
* @param certificate Holds the certificate and relevant details.
|
||||||
* @throws CertificateManagementDAOException
|
* @throws CertificateManagementDAOException
|
||||||
|
*
|
||||||
*/
|
*/
|
||||||
void addCertificate(List<org.wso2.carbon.certificate.mgt.core.bean.Certificate> certificate)
|
void addCertificate(List<Certificate> certificate)
|
||||||
throws CertificateManagementDAOException;
|
throws CertificateManagementDAOException;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -47,31 +48,37 @@ public interface CertificateDAO {
|
|||||||
* @param serialNumber Serial number of the certificate.
|
* @param serialNumber Serial number of the certificate.
|
||||||
* @return representation of the certificate.
|
* @return representation of the certificate.
|
||||||
* @throws CertificateManagementDAOException
|
* @throws CertificateManagementDAOException
|
||||||
|
*
|
||||||
*/
|
*/
|
||||||
org.wso2.carbon.certificate.mgt.core.dto.CertificateResponse retrieveCertificate(String serialNumber
|
CertificateResponse retrieveCertificate(String serialNumber) throws CertificateManagementDAOException;
|
||||||
) throws CertificateManagementDAOException;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Get all the certificates in a paginated manner.
|
* Get all the certificates in a paginated manner.
|
||||||
|
*
|
||||||
* @param request Request mentioning pagination details such as length and stating index.
|
* @param request Request mentioning pagination details such as length and stating index.
|
||||||
* @return Pagination result with data and the count of results.
|
* @return Pagination result with data and the count of results.
|
||||||
* @throws CertificateManagementDAOException
|
* @throws CertificateManagementDAOException
|
||||||
|
*
|
||||||
*/
|
*/
|
||||||
PaginationResult getAllCertificates(PaginationRequest request) throws CertificateManagementDAOException;
|
PaginationResult getAllCertificates(PaginationRequest request) throws CertificateManagementDAOException;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Get all the certificates.
|
* Get all the certificates.
|
||||||
|
*
|
||||||
* @return List of certificates
|
* @return List of certificates
|
||||||
* @throws CertificateManagementDAOException
|
* @throws CertificateManagementDAOException
|
||||||
|
*
|
||||||
*/
|
*/
|
||||||
public List<CertificateResponse> getAllCertificates() throws CertificateManagementDAOException;
|
public List<CertificateResponse> getAllCertificates() throws CertificateManagementDAOException;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Delete a certificate identified by a serial number()
|
* Delete a certificate identified by a serial number()
|
||||||
|
*
|
||||||
* @param serialNumber serial number
|
* @param serialNumber serial number
|
||||||
* @return whether the certificate was removed or not.
|
* @return whether the certificate was removed or not.
|
||||||
*/
|
*/
|
||||||
boolean removeCertificate(String serialNumber) throws CertificateManagementDAOException;
|
boolean removeCertificate(String serialNumber) throws CertificateManagementDAOException;
|
||||||
|
|
||||||
public List<CertificateResponse> searchCertificate(String serialNumber) throws CertificateManagementDAOException;
|
public List<CertificateResponse> searchCertificate(String serialNumber) throws CertificateManagementDAOException;
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@ -50,7 +50,7 @@ public class CertificateManagementDAOFactory {
|
|||||||
try {
|
try {
|
||||||
databaseEngine = dataSource.getConnection().getMetaData().getDatabaseProductName();
|
databaseEngine = dataSource.getConnection().getMetaData().getDatabaseProductName();
|
||||||
} catch (SQLException e) {
|
} catch (SQLException e) {
|
||||||
log.error("Error occurred while retrieving config.datasource connection", e);
|
log.error( "Error occurred while retrieving config.datasource connection", e);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -59,7 +59,7 @@ public class CertificateManagementDAOFactory {
|
|||||||
try {
|
try {
|
||||||
databaseEngine = dataSource.getConnection().getMetaData().getDatabaseProductName();
|
databaseEngine = dataSource.getConnection().getMetaData().getDatabaseProductName();
|
||||||
} catch (SQLException e) {
|
} catch (SQLException e) {
|
||||||
log.error("Error occurred while retrieving config.datasource connection", e);
|
log.error("Error occurred while retrieving a datasource connection", e);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -72,11 +72,22 @@ public class CertificateManagementDAOFactory {
|
|||||||
}
|
}
|
||||||
try {
|
try {
|
||||||
conn = dataSource.getConnection();
|
conn = dataSource.getConnection();
|
||||||
conn.setAutoCommit(false);
|
|
||||||
currentConnection.set(conn);
|
|
||||||
} catch (SQLException e) {
|
} catch (SQLException e) {
|
||||||
throw new TransactionManagementException("Error occurred while retrieving config.datasource connection", e);
|
throw new TransactionManagementException("Error occurred while retrieving a data source connection", e);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
conn.setAutoCommit(false);
|
||||||
|
} catch (SQLException e) {
|
||||||
|
try {
|
||||||
|
conn.close();
|
||||||
|
} catch (SQLException e1) {
|
||||||
|
log.warn("Error occurred while closing the borrowed connection. " +
|
||||||
|
"Transaction has ended pre-maturely", e1);
|
||||||
|
}
|
||||||
|
throw new TransactionManagementException("Error occurred while setting auto-commit to false", e);
|
||||||
|
}
|
||||||
|
currentConnection.set(conn);
|
||||||
}
|
}
|
||||||
|
|
||||||
public static void openConnection() throws SQLException {
|
public static void openConnection() throws SQLException {
|
||||||
@ -111,6 +122,8 @@ public class CertificateManagementDAOFactory {
|
|||||||
conn.commit();
|
conn.commit();
|
||||||
} catch (SQLException e) {
|
} catch (SQLException e) {
|
||||||
log.error("Error occurred while committing the transaction", e);
|
log.error("Error occurred while committing the transaction", e);
|
||||||
|
} finally {
|
||||||
|
closeConnection();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -125,6 +138,8 @@ public class CertificateManagementDAOFactory {
|
|||||||
conn.rollback();
|
conn.rollback();
|
||||||
} catch (SQLException e) {
|
} catch (SQLException e) {
|
||||||
log.warn("Error occurred while roll-backing the transaction", e);
|
log.warn("Error occurred while roll-backing the transaction", e);
|
||||||
|
} finally {
|
||||||
|
closeConnection();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -138,7 +153,7 @@ public class CertificateManagementDAOFactory {
|
|||||||
try {
|
try {
|
||||||
conn.close();
|
conn.close();
|
||||||
} catch (SQLException e) {
|
} catch (SQLException e) {
|
||||||
log.warn("Error occurred while close the connection");
|
log.warn("Error occurred while close the connection", e);
|
||||||
}
|
}
|
||||||
currentConnection.remove();
|
currentConnection.remove();
|
||||||
}
|
}
|
||||||
|
|||||||
@ -674,10 +674,7 @@ public class CertificateGenerator {
|
|||||||
} catch (TransactionManagementException e) {
|
} catch (TransactionManagementException e) {
|
||||||
String errorMsg = "Error occurred when saving the generated certificate";
|
String errorMsg = "Error occurred when saving the generated certificate";
|
||||||
log.error(errorMsg, e);
|
log.error(errorMsg, e);
|
||||||
CertificateManagementDAOFactory.rollbackTransaction();
|
|
||||||
throw new KeystoreException(errorMsg, e);
|
throw new KeystoreException(errorMsg, e);
|
||||||
} finally {
|
|
||||||
CertificateManagementDAOFactory.closeConnection();
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -738,9 +735,8 @@ public class CertificateGenerator {
|
|||||||
} catch (IOException e) {
|
} catch (IOException e) {
|
||||||
throw new KeystoreException("CSR cannot be recovered.", e);
|
throw new KeystoreException("CSR cannot be recovered.", e);
|
||||||
}
|
}
|
||||||
X509Certificate signedCertificate = generateCertificateFromCSR(privateKeyCA, certificationRequest,
|
return generateCertificateFromCSR(privateKeyCA, certificationRequest,
|
||||||
certCA.getIssuerX500Principal().getName());
|
certCA.getIssuerX500Principal().getName());
|
||||||
return signedCertificate;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
public static void extractCertificateDetails(byte[] certificateBytes, CertificateResponse certificateResponse)
|
public static void extractCertificateDetails(byte[] certificateBytes, CertificateResponse certificateResponse)
|
||||||
|
|||||||
@ -19,6 +19,7 @@ package org.wso2.carbon.certificate.mgt.core.impl;
|
|||||||
|
|
||||||
import org.apache.commons.logging.Log;
|
import org.apache.commons.logging.Log;
|
||||||
import org.apache.commons.logging.LogFactory;
|
import org.apache.commons.logging.LogFactory;
|
||||||
|
import org.wso2.carbon.certificate.mgt.core.dao.CertificateDAO;
|
||||||
import org.wso2.carbon.certificate.mgt.core.dao.CertificateManagementDAOException;
|
import org.wso2.carbon.certificate.mgt.core.dao.CertificateManagementDAOException;
|
||||||
import org.wso2.carbon.certificate.mgt.core.dao.CertificateManagementDAOFactory;
|
import org.wso2.carbon.certificate.mgt.core.dao.CertificateManagementDAOFactory;
|
||||||
import org.wso2.carbon.certificate.mgt.core.dto.CertificateResponse;
|
import org.wso2.carbon.certificate.mgt.core.dto.CertificateResponse;
|
||||||
@ -41,17 +42,21 @@ public class KeyStoreReader {
|
|||||||
|
|
||||||
private static final Log log = LogFactory.getLog(KeyStoreReader.class);
|
private static final Log log = LogFactory.getLog(KeyStoreReader.class);
|
||||||
|
|
||||||
private KeyStore loadKeyStore(String configEntryKeyStoreType, String configEntryKeyStorePath,
|
private CertificateDAO certDao;
|
||||||
|
|
||||||
|
public KeyStoreReader() {
|
||||||
|
this.certDao = CertificateManagementDAOFactory.getCertificateDAO();
|
||||||
|
}
|
||||||
|
|
||||||
|
private KeyStore loadKeyStore(
|
||||||
|
String configEntryKeyStoreType, String configEntryKeyStorePath,
|
||||||
String configEntryKeyStorePassword) throws KeystoreException {
|
String configEntryKeyStorePassword) throws KeystoreException {
|
||||||
|
InputStream is = null;
|
||||||
InputStream inputStream = null;
|
|
||||||
KeyStore keystore;
|
KeyStore keystore;
|
||||||
|
|
||||||
try {
|
try {
|
||||||
keystore = KeyStore.getInstance(ConfigurationUtil.getConfigEntry(configEntryKeyStoreType));
|
keystore = KeyStore.getInstance(ConfigurationUtil.getConfigEntry(configEntryKeyStoreType));
|
||||||
inputStream = new FileInputStream(ConfigurationUtil.getConfigEntry(configEntryKeyStorePath));
|
is = new FileInputStream(ConfigurationUtil.getConfigEntry(configEntryKeyStorePath));
|
||||||
keystore.load(inputStream, ConfigurationUtil.getConfigEntry(configEntryKeyStorePassword).toCharArray());
|
keystore.load(is, ConfigurationUtil.getConfigEntry(configEntryKeyStorePassword).toCharArray());
|
||||||
|
|
||||||
} catch (KeyStoreException e) {
|
} catch (KeyStoreException e) {
|
||||||
String errorMsg = "KeyStore issue occurred when loading KeyStore";
|
String errorMsg = "KeyStore issue occurred when loading KeyStore";
|
||||||
log.error(errorMsg, e);
|
log.error(errorMsg, e);
|
||||||
@ -74,8 +79,8 @@ public class KeyStoreReader {
|
|||||||
throw new KeystoreException(errorMsg, e);
|
throw new KeystoreException(errorMsg, e);
|
||||||
} finally {
|
} finally {
|
||||||
try {
|
try {
|
||||||
if (inputStream != null) {
|
if (is != null) {
|
||||||
inputStream.close();
|
is.close();
|
||||||
}
|
}
|
||||||
} catch (IOException e) {
|
} catch (IOException e) {
|
||||||
log.error("Error closing KeyStore input stream", e);
|
log.error("Error closing KeyStore input stream", e);
|
||||||
@ -87,15 +92,11 @@ public class KeyStoreReader {
|
|||||||
|
|
||||||
private synchronized void saveKeyStore(KeyStore keyStore, String configEntryKeyStorePath,
|
private synchronized void saveKeyStore(KeyStore keyStore, String configEntryKeyStorePath,
|
||||||
String configEntryKeyStorePassword) throws KeystoreException {
|
String configEntryKeyStorePassword) throws KeystoreException {
|
||||||
|
FileOutputStream os = null;
|
||||||
FileOutputStream outputStream = null;
|
|
||||||
|
|
||||||
try {
|
try {
|
||||||
outputStream = new FileOutputStream(
|
os = new FileOutputStream(
|
||||||
ConfigurationUtil.getConfigEntry(configEntryKeyStorePath));
|
ConfigurationUtil.getConfigEntry(configEntryKeyStorePath));
|
||||||
keyStore.store(outputStream, ConfigurationUtil.getConfigEntry(configEntryKeyStorePassword).toCharArray());
|
keyStore.store(os, ConfigurationUtil.getConfigEntry(configEntryKeyStorePassword).toCharArray());
|
||||||
outputStream.close();
|
|
||||||
|
|
||||||
} catch (KeyStoreException e) {
|
} catch (KeyStoreException e) {
|
||||||
String errorMsg = "KeyStore issue occurred when loading KeyStore";
|
String errorMsg = "KeyStore issue occurred when loading KeyStore";
|
||||||
log.error(errorMsg, e);
|
log.error(errorMsg, e);
|
||||||
@ -118,8 +119,8 @@ public class KeyStoreReader {
|
|||||||
throw new KeystoreException(errorMsg, e);
|
throw new KeystoreException(errorMsg, e);
|
||||||
} finally {
|
} finally {
|
||||||
try {
|
try {
|
||||||
if (outputStream != null) {
|
if (os != null) {
|
||||||
outputStream.close();
|
os.close();
|
||||||
}
|
}
|
||||||
} catch (IOException e) {
|
} catch (IOException e) {
|
||||||
log.error("Error closing KeyStore output stream", e);
|
log.error("Error closing KeyStore output stream", e);
|
||||||
@ -139,10 +140,8 @@ public class KeyStoreReader {
|
|||||||
}
|
}
|
||||||
|
|
||||||
public Certificate getCACertificate() throws KeystoreException {
|
public Certificate getCACertificate() throws KeystoreException {
|
||||||
|
|
||||||
KeyStore keystore = loadCertificateKeyStore();
|
KeyStore keystore = loadCertificateKeyStore();
|
||||||
Certificate caCertificate;
|
Certificate caCertificate;
|
||||||
|
|
||||||
try {
|
try {
|
||||||
caCertificate = keystore.getCertificate(ConfigurationUtil.getConfigEntry(ConfigurationUtil.CA_CERT_ALIAS));
|
caCertificate = keystore.getCertificate(ConfigurationUtil.getConfigEntry(ConfigurationUtil.CA_CERT_ALIAS));
|
||||||
} catch (KeyStoreException e) {
|
} catch (KeyStoreException e) {
|
||||||
@ -188,7 +187,6 @@ public class KeyStoreReader {
|
|||||||
}
|
}
|
||||||
|
|
||||||
public Certificate getRACertificate() throws KeystoreException {
|
public Certificate getRACertificate() throws KeystoreException {
|
||||||
|
|
||||||
KeyStore keystore = loadCertificateKeyStore();
|
KeyStore keystore = loadCertificateKeyStore();
|
||||||
Certificate raCertificate;
|
Certificate raCertificate;
|
||||||
try {
|
try {
|
||||||
@ -207,13 +205,11 @@ public class KeyStoreReader {
|
|||||||
}
|
}
|
||||||
|
|
||||||
public Certificate getCertificateByAlias(String alias) throws KeystoreException {
|
public Certificate getCertificateByAlias(String alias) throws KeystoreException {
|
||||||
|
|
||||||
Certificate raCertificate = null;
|
Certificate raCertificate = null;
|
||||||
try {
|
try {
|
||||||
CertificateManagementDAOFactory.openConnection();
|
CertificateManagementDAOFactory.openConnection();
|
||||||
CertificateResponse certificateResponse = CertificateManagementDAOFactory.getCertificateDAO().
|
CertificateResponse certificateResponse = certDao.retrieveCertificate(alias);
|
||||||
retrieveCertificate(alias);
|
if (certificateResponse != null) {
|
||||||
if(certificateResponse != null) {
|
|
||||||
raCertificate = (Certificate) Serializer.deserialize(certificateResponse.getCertificate());
|
raCertificate = (Certificate) Serializer.deserialize(certificateResponse.getCertificate());
|
||||||
}
|
}
|
||||||
} catch (CertificateManagementDAOException e) {
|
} catch (CertificateManagementDAOException e) {
|
||||||
@ -221,7 +217,7 @@ public class KeyStoreReader {
|
|||||||
log.error(errorMsg, e);
|
log.error(errorMsg, e);
|
||||||
throw new KeystoreException(errorMsg, e);
|
throw new KeystoreException(errorMsg, e);
|
||||||
} catch (ClassNotFoundException | IOException e) {
|
} catch (ClassNotFoundException | IOException e) {
|
||||||
String errorMsg = "Error when deserializing saved certificate.";
|
String errorMsg = "Error when de-serializing saved certificate.";
|
||||||
log.error(errorMsg, e);
|
log.error(errorMsg, e);
|
||||||
throw new KeystoreException(errorMsg, e);
|
throw new KeystoreException(errorMsg, e);
|
||||||
} catch (SQLException e) {
|
} catch (SQLException e) {
|
||||||
@ -234,8 +230,7 @@ public class KeyStoreReader {
|
|||||||
return raCertificate;
|
return raCertificate;
|
||||||
}
|
}
|
||||||
|
|
||||||
PrivateKey getRAPrivateKey() throws KeystoreException {
|
public PrivateKey getRAPrivateKey() throws KeystoreException {
|
||||||
|
|
||||||
KeyStore keystore = loadCertificateKeyStore();
|
KeyStore keystore = loadCertificateKeyStore();
|
||||||
PrivateKey raPrivateKey;
|
PrivateKey raPrivateKey;
|
||||||
try {
|
try {
|
||||||
@ -264,13 +259,11 @@ public class KeyStoreReader {
|
|||||||
}
|
}
|
||||||
|
|
||||||
public CertificateResponse getCertificateBySerial(String serialNumber) throws KeystoreException {
|
public CertificateResponse getCertificateBySerial(String serialNumber) throws KeystoreException {
|
||||||
|
|
||||||
CertificateResponse certificateResponse = null;
|
CertificateResponse certificateResponse = null;
|
||||||
try {
|
try {
|
||||||
CertificateManagementDAOFactory.openConnection();
|
CertificateManagementDAOFactory.openConnection();
|
||||||
certificateResponse = CertificateManagementDAOFactory.getCertificateDAO().
|
certificateResponse = certDao.retrieveCertificate(serialNumber);
|
||||||
retrieveCertificate(serialNumber);
|
if (certificateResponse != null && certificateResponse.getCertificate() != null) {
|
||||||
if(certificateResponse != null && certificateResponse.getCertificate() != null) {
|
|
||||||
Certificate certificate = (Certificate) Serializer.deserialize(certificateResponse.getCertificate());
|
Certificate certificate = (Certificate) Serializer.deserialize(certificateResponse.getCertificate());
|
||||||
if (certificate instanceof X509Certificate) {
|
if (certificate instanceof X509Certificate) {
|
||||||
X509Certificate x509cert = (X509Certificate) certificate;
|
X509Certificate x509cert = (X509Certificate) certificate;
|
||||||
@ -278,7 +271,6 @@ public class KeyStoreReader {
|
|||||||
certificateResponse.setCommonName(commonName);
|
certificateResponse.setCommonName(commonName);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
} catch (CertificateManagementDAOException e) {
|
} catch (CertificateManagementDAOException e) {
|
||||||
String errorMsg = "Error when retrieving certificate from the the database for the serial number: " +
|
String errorMsg = "Error when retrieving certificate from the the database for the serial number: " +
|
||||||
serialNumber;
|
serialNumber;
|
||||||
@ -289,7 +281,7 @@ public class KeyStoreReader {
|
|||||||
log.error(errorMsg, e);
|
log.error(errorMsg, e);
|
||||||
throw new KeystoreException(errorMsg, e);
|
throw new KeystoreException(errorMsg, e);
|
||||||
} catch (ClassNotFoundException | IOException e) {
|
} catch (ClassNotFoundException | IOException e) {
|
||||||
String errorMsg = "Error when deserializing saved certificate.";
|
String errorMsg = "Error when de-serializing saved certificate.";
|
||||||
log.error(errorMsg, e);
|
log.error(errorMsg, e);
|
||||||
throw new KeystoreException(errorMsg, e);
|
throw new KeystoreException(errorMsg, e);
|
||||||
} finally {
|
} finally {
|
||||||
|
|||||||
@ -18,7 +18,7 @@
|
|||||||
package org.wso2.carbon.certificate.mgt.core.service;
|
package org.wso2.carbon.certificate.mgt.core.service;
|
||||||
|
|
||||||
import org.bouncycastle.pkcs.PKCS10CertificationRequest;
|
import org.bouncycastle.pkcs.PKCS10CertificationRequest;
|
||||||
import org.wso2.carbon.certificate.mgt.core.dao.CertificateManagementDAOException;
|
import org.wso2.carbon.certificate.mgt.core.exception.CertificateManagementException;
|
||||||
import org.wso2.carbon.certificate.mgt.core.dto.CertificateResponse;
|
import org.wso2.carbon.certificate.mgt.core.dto.CertificateResponse;
|
||||||
import org.wso2.carbon.certificate.mgt.core.dto.SCEPResponse;
|
import org.wso2.carbon.certificate.mgt.core.dto.SCEPResponse;
|
||||||
import org.wso2.carbon.certificate.mgt.core.exception.KeystoreException;
|
import org.wso2.carbon.certificate.mgt.core.exception.KeystoreException;
|
||||||
@ -47,8 +47,8 @@ public interface CertificateManagementService {
|
|||||||
|
|
||||||
byte[] getPKIMessageSCEP(InputStream inputStream) throws KeystoreException;
|
byte[] getPKIMessageSCEP(InputStream inputStream) throws KeystoreException;
|
||||||
|
|
||||||
X509Certificate generateCertificateFromCSR(PrivateKey privateKey, PKCS10CertificationRequest request,
|
X509Certificate generateCertificateFromCSR(
|
||||||
String issueSubject) throws KeystoreException;
|
PrivateKey privateKey, PKCS10CertificationRequest request, String issueSubject) throws KeystoreException;
|
||||||
|
|
||||||
Certificate getCertificateByAlias(String alias) throws KeystoreException;
|
Certificate getCertificateByAlias(String alias) throws KeystoreException;
|
||||||
|
|
||||||
@ -71,13 +71,14 @@ public interface CertificateManagementService {
|
|||||||
|
|
||||||
public X509Certificate pemToX509Certificate(String pem) throws KeystoreException;
|
public X509Certificate pemToX509Certificate(String pem) throws KeystoreException;
|
||||||
|
|
||||||
public CertificateResponse retrieveCertificate(String serialNumber) throws CertificateManagementDAOException;
|
public CertificateResponse retrieveCertificate(String serialNumber) throws CertificateManagementException;
|
||||||
|
|
||||||
public PaginationResult getAllCertificates(PaginationRequest request) throws CertificateManagementDAOException;
|
public PaginationResult getAllCertificates(PaginationRequest request) throws CertificateManagementException;
|
||||||
|
|
||||||
boolean removeCertificate(String serialNumber) throws CertificateManagementDAOException;
|
boolean removeCertificate(String serialNumber) throws CertificateManagementException;
|
||||||
|
|
||||||
public List<CertificateResponse> getCertificates() throws CertificateManagementDAOException;
|
public List<CertificateResponse> getCertificates() throws CertificateManagementException;
|
||||||
|
|
||||||
|
public List<CertificateResponse> searchCertificates(String serialNumber) throws CertificateManagementException;
|
||||||
|
|
||||||
public List<CertificateResponse> searchCertificates(String serialNumber) throws CertificateManagementDAOException;
|
|
||||||
}
|
}
|
||||||
|
|||||||
@ -25,6 +25,7 @@ import org.wso2.carbon.certificate.mgt.core.dao.CertificateManagementDAOExceptio
|
|||||||
import org.wso2.carbon.certificate.mgt.core.dao.CertificateManagementDAOFactory;
|
import org.wso2.carbon.certificate.mgt.core.dao.CertificateManagementDAOFactory;
|
||||||
import org.wso2.carbon.certificate.mgt.core.dto.CertificateResponse;
|
import org.wso2.carbon.certificate.mgt.core.dto.CertificateResponse;
|
||||||
import org.wso2.carbon.certificate.mgt.core.dto.SCEPResponse;
|
import org.wso2.carbon.certificate.mgt.core.dto.SCEPResponse;
|
||||||
|
import org.wso2.carbon.certificate.mgt.core.exception.CertificateManagementException;
|
||||||
import org.wso2.carbon.certificate.mgt.core.exception.KeystoreException;
|
import org.wso2.carbon.certificate.mgt.core.exception.KeystoreException;
|
||||||
import org.wso2.carbon.certificate.mgt.core.impl.CertificateGenerator;
|
import org.wso2.carbon.certificate.mgt.core.impl.CertificateGenerator;
|
||||||
import org.wso2.carbon.certificate.mgt.core.impl.KeyStoreReader;
|
import org.wso2.carbon.certificate.mgt.core.impl.KeyStoreReader;
|
||||||
@ -51,7 +52,6 @@ public class CertificateManagementServiceImpl implements CertificateManagementSe
|
|||||||
}
|
}
|
||||||
|
|
||||||
public static CertificateManagementServiceImpl getInstance() {
|
public static CertificateManagementServiceImpl getInstance() {
|
||||||
|
|
||||||
if (certificateManagementServiceImpl == null) {
|
if (certificateManagementServiceImpl == null) {
|
||||||
certificateManagementServiceImpl = new CertificateManagementServiceImpl();
|
certificateManagementServiceImpl = new CertificateManagementServiceImpl();
|
||||||
keyStoreReader = new KeyStoreReader();
|
keyStoreReader = new KeyStoreReader();
|
||||||
@ -106,7 +106,8 @@ public class CertificateManagementServiceImpl implements CertificateManagementSe
|
|||||||
return certificateGenerator.verifyPEMSignature(requestCertificate);
|
return certificateGenerator.verifyPEMSignature(requestCertificate);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override public CertificateResponse verifySubjectDN(String requestDN) throws KeystoreException {
|
@Override
|
||||||
|
public CertificateResponse verifySubjectDN(String requestDN) throws KeystoreException {
|
||||||
return certificateGenerator.verifyCertificateDN(requestDN);
|
return certificateGenerator.verifyCertificateDN(requestDN);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -135,39 +136,47 @@ public class CertificateManagementServiceImpl implements CertificateManagementSe
|
|||||||
return certificateGenerator.pemToX509Certificate(pem);
|
return certificateGenerator.pemToX509Certificate(pem);
|
||||||
}
|
}
|
||||||
|
|
||||||
public CertificateResponse retrieveCertificate(String serialNumber)
|
public CertificateResponse retrieveCertificate(String serialNumber) throws CertificateManagementException {
|
||||||
throws CertificateManagementDAOException {
|
|
||||||
CertificateDAO certificateDAO;
|
CertificateDAO certificateDAO;
|
||||||
try {
|
try {
|
||||||
CertificateManagementDAOFactory.openConnection();
|
CertificateManagementDAOFactory.openConnection();
|
||||||
certificateDAO = CertificateManagementDAOFactory.getCertificateDAO();
|
certificateDAO = CertificateManagementDAOFactory.getCertificateDAO();
|
||||||
return certificateDAO.retrieveCertificate(serialNumber);
|
return certificateDAO.retrieveCertificate(serialNumber);
|
||||||
} catch (SQLException e) {
|
} catch (SQLException e) {
|
||||||
String errorMsg = "Error when opening connection";
|
String msg = "Error occurred while opening a connection to the underlying data source";
|
||||||
log.error(errorMsg, e);
|
log.error(msg, e);
|
||||||
throw new CertificateManagementDAOException(errorMsg, e);
|
throw new CertificateManagementException(msg, e);
|
||||||
|
} catch (CertificateManagementDAOException e) {
|
||||||
|
String msg = "Error occurred while looking up for the certificate carrying the serial number '" +
|
||||||
|
serialNumber + "' in the underlying certificate repository";
|
||||||
|
log.error(msg, e);
|
||||||
|
throw new CertificateManagementException(msg, e);
|
||||||
} finally {
|
} finally {
|
||||||
CertificateManagementDAOFactory.closeConnection();
|
CertificateManagementDAOFactory.closeConnection();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public PaginationResult getAllCertificates(PaginationRequest request)
|
public PaginationResult getAllCertificates(PaginationRequest request) throws CertificateManagementException {
|
||||||
throws CertificateManagementDAOException {
|
|
||||||
try {
|
try {
|
||||||
CertificateManagementDAOFactory.openConnection();
|
CertificateManagementDAOFactory.openConnection();
|
||||||
CertificateDAO certificateDAO = CertificateManagementDAOFactory.getCertificateDAO();
|
CertificateDAO certificateDAO = CertificateManagementDAOFactory.getCertificateDAO();
|
||||||
return certificateDAO.getAllCertificates(request);
|
return certificateDAO.getAllCertificates(request);
|
||||||
} catch (SQLException e) {
|
} catch (SQLException e) {
|
||||||
String errorMsg = "Error when opening connection";
|
String msg = "Error occurred while opening a connection to the underlying data source";
|
||||||
log.error(errorMsg, e);
|
log.error(msg, e);
|
||||||
throw new CertificateManagementDAOException(errorMsg, e);
|
throw new CertificateManagementException(msg, e);
|
||||||
|
} catch (CertificateManagementDAOException e) {
|
||||||
|
String msg = "Error occurred while looking up for the list of certificates managed in the underlying " +
|
||||||
|
"certificate repository";
|
||||||
|
log.error(msg, e);
|
||||||
|
throw new CertificateManagementException(msg, e);
|
||||||
} finally {
|
} finally {
|
||||||
CertificateManagementDAOFactory.closeConnection();
|
CertificateManagementDAOFactory.closeConnection();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean removeCertificate(String serialNumber) throws CertificateManagementDAOException {
|
public boolean removeCertificate(String serialNumber) throws CertificateManagementException {
|
||||||
try {
|
try {
|
||||||
CertificateManagementDAOFactory.beginTransaction();
|
CertificateManagementDAOFactory.beginTransaction();
|
||||||
CertificateDAO certificateDAO = CertificateManagementDAOFactory.getCertificateDAO();
|
CertificateDAO certificateDAO = CertificateManagementDAOFactory.getCertificateDAO();
|
||||||
@ -175,38 +184,53 @@ public class CertificateManagementServiceImpl implements CertificateManagementSe
|
|||||||
CertificateManagementDAOFactory.commitTransaction();
|
CertificateManagementDAOFactory.commitTransaction();
|
||||||
return status;
|
return status;
|
||||||
} catch (TransactionManagementException e) {
|
} catch (TransactionManagementException e) {
|
||||||
String errorMsg = "Error when deleting";
|
String msg = "Error occurred while removing certificate carrying serial number '" + serialNumber + "'";
|
||||||
log.error(errorMsg, e);
|
log.error(msg, e);
|
||||||
throw new CertificateManagementDAOException(errorMsg, e);
|
throw new CertificateManagementException(msg, e);
|
||||||
|
} catch (CertificateManagementDAOException e) {
|
||||||
|
CertificateManagementDAOFactory.rollbackTransaction();
|
||||||
|
String msg = "Error occurred while removing the certificate carrying serial number '" + serialNumber +
|
||||||
|
"' from the certificate repository";
|
||||||
|
log.error(msg, e);
|
||||||
|
throw new CertificateManagementException(msg, e);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public List<CertificateResponse> getCertificates() throws CertificateManagementException {
|
||||||
|
try {
|
||||||
|
CertificateManagementDAOFactory.openConnection();
|
||||||
|
CertificateDAO certificateDAO = CertificateManagementDAOFactory.getCertificateDAO();
|
||||||
|
return certificateDAO.getAllCertificates();
|
||||||
|
} catch (SQLException e) {
|
||||||
|
String msg = "Error occurred while opening a connection to the underlying data source";
|
||||||
|
log.error(msg, e);
|
||||||
|
throw new CertificateManagementException(msg, e);
|
||||||
|
} catch (CertificateManagementDAOException e) {
|
||||||
|
String msg = "Error occurred while looking up for the list of certificates managed in the " +
|
||||||
|
"underlying certificate repository";
|
||||||
|
log.error(msg, e);
|
||||||
|
throw new CertificateManagementException(msg, e);
|
||||||
} finally {
|
} finally {
|
||||||
CertificateManagementDAOFactory.closeConnection();
|
CertificateManagementDAOFactory.closeConnection();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public List<CertificateResponse> getCertificates() throws CertificateManagementDAOException {
|
public List<CertificateResponse> searchCertificates(String serialNumber) throws CertificateManagementException {
|
||||||
try {
|
|
||||||
CertificateManagementDAOFactory.openConnection();
|
|
||||||
CertificateDAO certificateDAO = CertificateManagementDAOFactory.getCertificateDAO();
|
|
||||||
return certificateDAO.getAllCertificates();
|
|
||||||
} catch (SQLException e) {
|
|
||||||
String errorMsg = "Error when opening connection";
|
|
||||||
log.error(errorMsg, e);
|
|
||||||
throw new CertificateManagementDAOException(errorMsg, e);
|
|
||||||
} finally {
|
|
||||||
CertificateManagementDAOFactory.closeConnection();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override public List<CertificateResponse> searchCertificates(String serialNumber) throws CertificateManagementDAOException {
|
|
||||||
try {
|
try {
|
||||||
CertificateManagementDAOFactory.openConnection();
|
CertificateManagementDAOFactory.openConnection();
|
||||||
CertificateDAO certificateDAO = CertificateManagementDAOFactory.getCertificateDAO();
|
CertificateDAO certificateDAO = CertificateManagementDAOFactory.getCertificateDAO();
|
||||||
return certificateDAO.searchCertificate(serialNumber);
|
return certificateDAO.searchCertificate(serialNumber);
|
||||||
} catch (SQLException e) {
|
} catch (SQLException e) {
|
||||||
String errorMsg = "Error when opening connection";
|
String msg = "Error occurred while opening a connection to the underlying data source";
|
||||||
log.error(errorMsg, e);
|
log.error(msg, e);
|
||||||
throw new CertificateManagementDAOException(errorMsg, e);
|
throw new CertificateManagementException(msg, e);
|
||||||
|
} catch (CertificateManagementDAOException e) {
|
||||||
|
String msg = "Error occurred while searching for the list of certificates carrying the serial number '" +
|
||||||
|
serialNumber + "' in the underlying certificate repository";
|
||||||
|
log.error(msg, e);
|
||||||
|
throw new CertificateManagementException(msg, e);
|
||||||
} finally {
|
} finally {
|
||||||
CertificateManagementDAOFactory.closeConnection();
|
CertificateManagementDAOFactory.closeConnection();
|
||||||
}
|
}
|
||||||
|
|||||||
@ -209,14 +209,27 @@ public class OperationManagerImpl implements OperationManager {
|
|||||||
throw new UnauthorizedDeviceAccessException("User '" + getUser() + "' is not authorized to " +
|
throw new UnauthorizedDeviceAccessException("User '" + getUser() + "' is not authorized to " +
|
||||||
"fetch operations on device '" + deviceId.getId() + "'");
|
"fetch operations on device '" + deviceId.getId() + "'");
|
||||||
}
|
}
|
||||||
try {
|
} catch (DeviceAccessAuthorizationException e) {
|
||||||
|
throw new OperationManagementException("Error occurred while authorizing access to the devices for user : " +
|
||||||
|
this.getUser(), e);
|
||||||
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
DeviceManagementDAOFactory.openConnection();
|
DeviceManagementDAOFactory.openConnection();
|
||||||
int tenantId = CarbonContext.getThreadLocalCarbonContext().getTenantId();
|
int tenantId = CarbonContext.getThreadLocalCarbonContext().getTenantId();
|
||||||
enrolmentId = deviceDAO.getEnrolmentByStatus(deviceId, EnrolmentInfo.Status.ACTIVE, tenantId);
|
enrolmentId = deviceDAO.getEnrolmentByStatus(deviceId, EnrolmentInfo.Status.ACTIVE, tenantId);
|
||||||
|
} catch (DeviceManagementDAOException e) {
|
||||||
|
throw new OperationManagementException("Error occurred while retrieving metadata of '" +
|
||||||
|
deviceId.getType() + "' device carrying the identifier '" +
|
||||||
|
deviceId.getId() + "'");
|
||||||
|
} catch (SQLException e) {
|
||||||
|
throw new OperationManagementException(
|
||||||
|
"Error occurred while opening a connection to the data source", e);
|
||||||
} finally {
|
} finally {
|
||||||
DeviceManagementDAOFactory.closeConnection();
|
DeviceManagementDAOFactory.closeConnection();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
if (enrolmentId < 0) {
|
if (enrolmentId < 0) {
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
@ -233,20 +246,12 @@ public class OperationManagerImpl implements OperationManager {
|
|||||||
throw new OperationManagementException("Error occurred while retrieving the list of " +
|
throw new OperationManagementException("Error occurred while retrieving the list of " +
|
||||||
"operations assigned for '" + deviceId.getType() +
|
"operations assigned for '" + deviceId.getType() +
|
||||||
"' device '" + deviceId.getId() + "'", e);
|
"' device '" + deviceId.getId() + "'", e);
|
||||||
} catch (DeviceManagementDAOException e) {
|
|
||||||
throw new OperationManagementException("Error occurred while retrieving metadata of '" +
|
|
||||||
deviceId.getType() + "' device carrying the identifier '" +
|
|
||||||
deviceId.getId() + "'");
|
|
||||||
} catch (SQLException e) {
|
} catch (SQLException e) {
|
||||||
throw new OperationManagementException(
|
throw new OperationManagementException(
|
||||||
"Error occurred while opening a connection to the data source", e);
|
"Error occurred while opening a connection to the data source", e);
|
||||||
} finally {
|
} finally {
|
||||||
OperationManagementDAOFactory.closeConnection();
|
OperationManagementDAOFactory.closeConnection();
|
||||||
}
|
}
|
||||||
} catch (DeviceAccessAuthorizationException e) {
|
|
||||||
throw new OperationManagementException("Error occurred while authorizing access to the devices for user : " +
|
|
||||||
this.getUser(), e);
|
|
||||||
}
|
|
||||||
return operations;
|
return operations;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -259,16 +264,31 @@ public class OperationManagerImpl implements OperationManager {
|
|||||||
try {
|
try {
|
||||||
boolean isUserAuthorized = DeviceManagementDataHolder.getInstance().getDeviceAccessAuthorizationService().
|
boolean isUserAuthorized = DeviceManagementDataHolder.getInstance().getDeviceAccessAuthorizationService().
|
||||||
isUserAuthorized(deviceId, DeviceGroupConstants.Permissions.DEFAULT_OPERATOR_PERMISSIONS);
|
isUserAuthorized(deviceId, DeviceGroupConstants.Permissions.DEFAULT_OPERATOR_PERMISSIONS);
|
||||||
if (isUserAuthorized) {
|
if (!isUserAuthorized) {
|
||||||
try {
|
log.error("User : " + getUser() + " is not authorized to fetch operations on device : " +
|
||||||
|
deviceId.getId());
|
||||||
|
}
|
||||||
|
} catch (DeviceAccessAuthorizationException e) {
|
||||||
|
throw new OperationManagementException("Error occurred while authorizing access to the devices for user : " +
|
||||||
|
this.getUser(), e);
|
||||||
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
DeviceManagementDAOFactory.openConnection();
|
DeviceManagementDAOFactory.openConnection();
|
||||||
int tenantId = CarbonContext.getThreadLocalCarbonContext().getTenantId();
|
int tenantId = CarbonContext.getThreadLocalCarbonContext().getTenantId();
|
||||||
enrolmentId = deviceDAO.getEnrolmentByStatus(deviceId, EnrolmentInfo.Status.ACTIVE, tenantId);
|
enrolmentId = deviceDAO.getEnrolmentByStatus(deviceId, EnrolmentInfo.Status.ACTIVE, tenantId);
|
||||||
|
} catch (SQLException e) {
|
||||||
|
throw new OperationManagementException(
|
||||||
|
"Error occurred while opening a connection to the data source", e);
|
||||||
|
} catch (DeviceManagementDAOException e) {
|
||||||
|
throw new OperationManagementException("Error occurred while retrieving metadata of '" +
|
||||||
|
deviceId.getType() + "' device carrying the identifier '" +
|
||||||
|
deviceId.getId() + "'");
|
||||||
} finally {
|
} finally {
|
||||||
DeviceManagementDAOFactory.closeConnection();
|
DeviceManagementDAOFactory.closeConnection();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
OperationManagementDAOFactory.openConnection();
|
OperationManagementDAOFactory.openConnection();
|
||||||
if (enrolmentId < 0) {
|
if (enrolmentId < 0) {
|
||||||
throw new OperationManagementException("Device not found for given device " +
|
throw new OperationManagementException("Device not found for given device " +
|
||||||
@ -290,23 +310,12 @@ public class OperationManagerImpl implements OperationManager {
|
|||||||
throw new OperationManagementException("Error occurred while retrieving the list of " +
|
throw new OperationManagementException("Error occurred while retrieving the list of " +
|
||||||
"operations assigned for '" + deviceId.getType() +
|
"operations assigned for '" + deviceId.getType() +
|
||||||
"' device '" + deviceId.getId() + "'", e);
|
"' device '" + deviceId.getId() + "'", e);
|
||||||
} catch (DeviceManagementDAOException e) {
|
|
||||||
throw new OperationManagementException("Error occurred while retrieving metadata of '" +
|
|
||||||
deviceId.getType() + "' device carrying the identifier '" +
|
|
||||||
deviceId.getId() + "'");
|
|
||||||
} catch (SQLException e) {
|
} catch (SQLException e) {
|
||||||
throw new OperationManagementException(
|
throw new OperationManagementException(
|
||||||
"Error occurred while opening a connection to the data source", e);
|
"Error occurred while opening a connection to the data source", e);
|
||||||
} finally {
|
} finally {
|
||||||
OperationManagementDAOFactory.closeConnection();
|
OperationManagementDAOFactory.closeConnection();
|
||||||
}
|
}
|
||||||
} else {
|
|
||||||
log.info("User : " + getUser() + " is not authorized to fetch operations on device : " + deviceId.getId());
|
|
||||||
}
|
|
||||||
} catch (DeviceAccessAuthorizationException e) {
|
|
||||||
throw new OperationManagementException("Error occurred while authorizing access to the devices for user : " +
|
|
||||||
this.getUser(), e);
|
|
||||||
}
|
|
||||||
|
|
||||||
return paginationResult;
|
return paginationResult;
|
||||||
}
|
}
|
||||||
@ -323,15 +332,31 @@ public class OperationManagerImpl implements OperationManager {
|
|||||||
try {
|
try {
|
||||||
boolean isUserAuthorized = DeviceManagementDataHolder.getInstance().getDeviceAccessAuthorizationService().
|
boolean isUserAuthorized = DeviceManagementDataHolder.getInstance().getDeviceAccessAuthorizationService().
|
||||||
isUserAuthorized(deviceId, DeviceGroupConstants.Permissions.DEFAULT_OPERATOR_PERMISSIONS);
|
isUserAuthorized(deviceId, DeviceGroupConstants.Permissions.DEFAULT_OPERATOR_PERMISSIONS);
|
||||||
if (isUserAuthorized) {
|
if (!isUserAuthorized) {
|
||||||
try {
|
log.error("User : " + getUser() + " is not authorized to fetch operations on device : "
|
||||||
|
+ deviceId.getId());
|
||||||
|
}
|
||||||
|
} catch (DeviceAccessAuthorizationException e) {
|
||||||
|
throw new OperationManagementException("Error occurred while authorizing access to the devices for user :" +
|
||||||
|
this.getUser(), e);
|
||||||
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
DeviceManagementDAOFactory.openConnection();
|
DeviceManagementDAOFactory.openConnection();
|
||||||
int tenantId = CarbonContext.getThreadLocalCarbonContext().getTenantId();
|
int tenantId = CarbonContext.getThreadLocalCarbonContext().getTenantId();
|
||||||
enrolmentId = deviceDAO.getEnrolmentByStatus(deviceId, EnrolmentInfo.Status.ACTIVE, tenantId);
|
enrolmentId = deviceDAO.getEnrolmentByStatus(deviceId, EnrolmentInfo.Status.ACTIVE, tenantId);
|
||||||
|
} catch (SQLException e) {
|
||||||
|
throw new OperationManagementException(
|
||||||
|
"Error occurred while opening a connection to the data source", e);
|
||||||
|
} catch (DeviceManagementDAOException e) {
|
||||||
|
throw new OperationManagementException("Error occurred while retrieving the device " +
|
||||||
|
"for device Identifier type -'" + deviceId.getType() +
|
||||||
|
"' and device Id '" + deviceId.getId() + "'", e);
|
||||||
} finally {
|
} finally {
|
||||||
DeviceManagementDAOFactory.closeConnection();
|
DeviceManagementDAOFactory.closeConnection();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
OperationManagementDAOFactory.openConnection();
|
OperationManagementDAOFactory.openConnection();
|
||||||
if (enrolmentId < 0) {
|
if (enrolmentId < 0) {
|
||||||
throw new OperationManagementException("Device not found for the given device Identifier:" +
|
throw new OperationManagementException("Device not found for the given device Identifier:" +
|
||||||
@ -356,24 +381,12 @@ public class OperationManagerImpl implements OperationManager {
|
|||||||
throw new OperationManagementException("Error occurred while retrieving the list of " +
|
throw new OperationManagementException("Error occurred while retrieving the list of " +
|
||||||
"pending operations assigned for '" + deviceId.getType() +
|
"pending operations assigned for '" + deviceId.getType() +
|
||||||
"' device '" + deviceId.getId() + "'", e);
|
"' device '" + deviceId.getId() + "'", e);
|
||||||
} catch (DeviceManagementDAOException e) {
|
|
||||||
throw new OperationManagementException("Error occurred while retrieving the device " +
|
|
||||||
"for device Identifier type -'" + deviceId.getType() +
|
|
||||||
"' and device Id '" + deviceId.getId() + "'", e);
|
|
||||||
} catch (SQLException e) {
|
} catch (SQLException e) {
|
||||||
throw new OperationManagementException(
|
throw new OperationManagementException(
|
||||||
"Error occurred while opening a connection to the data source", e);
|
"Error occurred while opening a connection to the data source", e);
|
||||||
} finally {
|
} finally {
|
||||||
OperationManagementDAOFactory.closeConnection();
|
OperationManagementDAOFactory.closeConnection();
|
||||||
}
|
}
|
||||||
} else {
|
|
||||||
log.info("User : " + getUser() + " is not authorized to fetch operations on device : "
|
|
||||||
+ deviceId.getId());
|
|
||||||
}
|
|
||||||
} catch (DeviceAccessAuthorizationException e) {
|
|
||||||
throw new OperationManagementException("Error occurred while authorizing access to the devices for user :" +
|
|
||||||
this.getUser(), e);
|
|
||||||
}
|
|
||||||
return operations;
|
return operations;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -387,15 +400,31 @@ public class OperationManagerImpl implements OperationManager {
|
|||||||
try {
|
try {
|
||||||
boolean isUserAuthorized = DeviceManagementDataHolder.getInstance().getDeviceAccessAuthorizationService().
|
boolean isUserAuthorized = DeviceManagementDataHolder.getInstance().getDeviceAccessAuthorizationService().
|
||||||
isUserAuthorized(deviceId, DeviceGroupConstants.Permissions.DEFAULT_OPERATOR_PERMISSIONS);
|
isUserAuthorized(deviceId, DeviceGroupConstants.Permissions.DEFAULT_OPERATOR_PERMISSIONS);
|
||||||
if (isUserAuthorized) {
|
if (!isUserAuthorized) {
|
||||||
try {
|
log.error("User : " + getUser() + " is not authorized to fetch operations on device : "
|
||||||
|
+ deviceId.getId());
|
||||||
|
}
|
||||||
|
} catch (DeviceAccessAuthorizationException e) {
|
||||||
|
throw new OperationManagementException("Error occurred while authorizing access to the devices for user : " +
|
||||||
|
this.getUser(), e);
|
||||||
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
DeviceManagementDAOFactory.openConnection();
|
DeviceManagementDAOFactory.openConnection();
|
||||||
int tenantId = CarbonContext.getThreadLocalCarbonContext().getTenantId();
|
int tenantId = CarbonContext.getThreadLocalCarbonContext().getTenantId();
|
||||||
enrolmentId = deviceDAO.getEnrolmentByStatus(deviceId, EnrolmentInfo.Status.ACTIVE, tenantId);
|
enrolmentId = deviceDAO.getEnrolmentByStatus(deviceId, EnrolmentInfo.Status.ACTIVE, tenantId);
|
||||||
|
} catch (DeviceManagementDAOException e) {
|
||||||
|
throw new OperationManagementException("Error occurred while retrieving the device " +
|
||||||
|
"for device Identifier type -'" + deviceId.getType() +
|
||||||
|
"' and device Id '" + deviceId.getId(), e);
|
||||||
|
} catch (SQLException e) {
|
||||||
|
throw new OperationManagementException(
|
||||||
|
"Error occurred while opening a connection to the data source", e);
|
||||||
} finally {
|
} finally {
|
||||||
DeviceManagementDAOFactory.closeConnection();
|
DeviceManagementDAOFactory.closeConnection();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
OperationManagementDAOFactory.openConnection();
|
OperationManagementDAOFactory.openConnection();
|
||||||
if (enrolmentId < 0) {
|
if (enrolmentId < 0) {
|
||||||
throw new OperationManagementException("Device not found for given device " +
|
throw new OperationManagementException("Device not found for given device " +
|
||||||
@ -426,24 +455,12 @@ public class OperationManagerImpl implements OperationManager {
|
|||||||
}
|
}
|
||||||
} catch (OperationManagementDAOException e) {
|
} catch (OperationManagementDAOException e) {
|
||||||
throw new OperationManagementException("Error occurred while retrieving next pending operation", e);
|
throw new OperationManagementException("Error occurred while retrieving next pending operation", e);
|
||||||
} catch (DeviceManagementDAOException e) {
|
|
||||||
throw new OperationManagementException("Error occurred while retrieving the device " +
|
|
||||||
"for device Identifier type -'" + deviceId.getType() +
|
|
||||||
"' and device Id '" + deviceId.getId(), e);
|
|
||||||
} catch (SQLException e) {
|
} catch (SQLException e) {
|
||||||
throw new OperationManagementException(
|
throw new OperationManagementException(
|
||||||
"Error occurred while opening a connection to the data source", e);
|
"Error occurred while opening a connection to the data source", e);
|
||||||
} finally {
|
} finally {
|
||||||
OperationManagementDAOFactory.closeConnection();
|
OperationManagementDAOFactory.closeConnection();
|
||||||
}
|
}
|
||||||
} else {
|
|
||||||
log.info("User : " + getUser() + " is not authorized to fetch operations on device : "
|
|
||||||
+ deviceId.getId());
|
|
||||||
}
|
|
||||||
} catch (DeviceAccessAuthorizationException e) {
|
|
||||||
throw new OperationManagementException("Error occurred while authorizing access to the devices for user : " +
|
|
||||||
this.getUser(), e);
|
|
||||||
}
|
|
||||||
return operation;
|
return operation;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -457,8 +474,15 @@ public class OperationManagerImpl implements OperationManager {
|
|||||||
try {
|
try {
|
||||||
boolean isUserAuthorized = DeviceManagementDataHolder.getInstance().getDeviceAccessAuthorizationService().
|
boolean isUserAuthorized = DeviceManagementDataHolder.getInstance().getDeviceAccessAuthorizationService().
|
||||||
isUserAuthorized(deviceId, DeviceGroupConstants.Permissions.DEFAULT_OPERATOR_PERMISSIONS);
|
isUserAuthorized(deviceId, DeviceGroupConstants.Permissions.DEFAULT_OPERATOR_PERMISSIONS);
|
||||||
if (isUserAuthorized) {
|
if (!isUserAuthorized) {
|
||||||
try {
|
log.error("User : " + getUser() + " is not authorized to update operations on device : "
|
||||||
|
+ deviceId.getId());
|
||||||
|
}
|
||||||
|
} catch (DeviceAccessAuthorizationException e) {
|
||||||
|
throw new OperationManagementException("Error occurred while authorizing access to the devices for user :" +
|
||||||
|
this.getUser(), e);
|
||||||
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
DeviceManagementDAOFactory.openConnection();
|
DeviceManagementDAOFactory.openConnection();
|
||||||
int tenantId = CarbonContext.getThreadLocalCarbonContext().getTenantId();
|
int tenantId = CarbonContext.getThreadLocalCarbonContext().getTenantId();
|
||||||
@ -466,9 +490,16 @@ public class OperationManagerImpl implements OperationManager {
|
|||||||
} catch (SQLException e) {
|
} catch (SQLException e) {
|
||||||
throw new OperationManagementException("Error occurred while opening a connection to the" +
|
throw new OperationManagementException("Error occurred while opening a connection to the" +
|
||||||
" data source", e);
|
" data source", e);
|
||||||
|
} catch (DeviceManagementDAOException e) {
|
||||||
|
OperationManagementDAOFactory.rollbackTransaction();
|
||||||
|
throw new OperationManagementException(
|
||||||
|
"Error occurred while fetching the device for device identifier: " + deviceId.getId() +
|
||||||
|
"type:" + deviceId.getType(), e);
|
||||||
} finally {
|
} finally {
|
||||||
DeviceManagementDAOFactory.closeConnection();
|
DeviceManagementDAOFactory.closeConnection();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
OperationManagementDAOFactory.beginTransaction();
|
OperationManagementDAOFactory.beginTransaction();
|
||||||
boolean isUpdated = false;
|
boolean isUpdated = false;
|
||||||
if (operation.getStatus() != null) {
|
if (operation.getStatus() != null) {
|
||||||
@ -485,24 +516,11 @@ public class OperationManagerImpl implements OperationManager {
|
|||||||
throw new OperationManagementException(
|
throw new OperationManagementException(
|
||||||
"Error occurred while updating the operation: " + operationId + " status:" +
|
"Error occurred while updating the operation: " + operationId + " status:" +
|
||||||
operation.getStatus(), e);
|
operation.getStatus(), e);
|
||||||
} catch (DeviceManagementDAOException e) {
|
|
||||||
OperationManagementDAOFactory.rollbackTransaction();
|
|
||||||
throw new OperationManagementException(
|
|
||||||
"Error occurred while fetching the device for device identifier: " + deviceId.getId() +
|
|
||||||
"type:" + deviceId.getType(), e);
|
|
||||||
} catch (TransactionManagementException e) {
|
} catch (TransactionManagementException e) {
|
||||||
throw new OperationManagementException("Error occurred while initiating a transaction", e);
|
throw new OperationManagementException("Error occurred while initiating a transaction", e);
|
||||||
} finally {
|
} finally {
|
||||||
OperationManagementDAOFactory.closeConnection();
|
OperationManagementDAOFactory.closeConnection();
|
||||||
}
|
}
|
||||||
} else {
|
|
||||||
log.info("User : " + getUser() + " is not authorized to update operations on device : "
|
|
||||||
+ deviceId.getId());
|
|
||||||
}
|
|
||||||
} catch (DeviceAccessAuthorizationException e) {
|
|
||||||
throw new OperationManagementException("Error occurred while authorizing access to the devices for user :" +
|
|
||||||
this.getUser(), e);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
@ -538,16 +556,31 @@ public class OperationManagerImpl implements OperationManager {
|
|||||||
try {
|
try {
|
||||||
boolean isUserAuthorized = DeviceManagementDataHolder.getInstance().getDeviceAccessAuthorizationService().
|
boolean isUserAuthorized = DeviceManagementDataHolder.getInstance().getDeviceAccessAuthorizationService().
|
||||||
isUserAuthorized(deviceId, DeviceGroupConstants.Permissions.DEFAULT_OPERATOR_PERMISSIONS);
|
isUserAuthorized(deviceId, DeviceGroupConstants.Permissions.DEFAULT_OPERATOR_PERMISSIONS);
|
||||||
if (isUserAuthorized) {
|
if (!isUserAuthorized) {
|
||||||
try {
|
log.error("User : " + getUser() + " is not authorized to fetch operations on device : "
|
||||||
|
+ deviceId.getId());
|
||||||
|
}
|
||||||
|
} catch (DeviceAccessAuthorizationException e) {
|
||||||
|
throw new OperationManagementException("Error occurred while authorizing access to the devices for user :" +
|
||||||
|
this.getUser(), e);
|
||||||
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
DeviceManagementDAOFactory.openConnection();
|
DeviceManagementDAOFactory.openConnection();
|
||||||
int tenantId = CarbonContext.getThreadLocalCarbonContext().getTenantId();
|
int tenantId = CarbonContext.getThreadLocalCarbonContext().getTenantId();
|
||||||
enrolmentId = deviceDAO.getEnrolmentByStatus(deviceId, EnrolmentInfo.Status.ACTIVE, tenantId);
|
enrolmentId = deviceDAO.getEnrolmentByStatus(deviceId, EnrolmentInfo.Status.ACTIVE, tenantId);
|
||||||
|
} catch (DeviceManagementDAOException e) {
|
||||||
|
throw new OperationManagementException("Error occurred while retrieving the device " +
|
||||||
|
"for device Identifier type -'" + deviceId.getType() +
|
||||||
|
"' and device Id '" + deviceId.getId() + "'", e);
|
||||||
|
} catch (SQLException e) {
|
||||||
|
throw new OperationManagementException("Error occurred while opening connection to the data source",
|
||||||
|
e);
|
||||||
} finally {
|
} finally {
|
||||||
DeviceManagementDAOFactory.closeConnection();
|
DeviceManagementDAOFactory.closeConnection();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
OperationManagementDAOFactory.openConnection();
|
OperationManagementDAOFactory.openConnection();
|
||||||
if (enrolmentId < 0) {
|
if (enrolmentId < 0) {
|
||||||
throw new OperationManagementException("Device not found for given device identifier: " +
|
throw new OperationManagementException("Device not found for given device identifier: " +
|
||||||
@ -582,24 +615,13 @@ public class OperationManagerImpl implements OperationManager {
|
|||||||
throw new OperationManagementException("Error occurred while retrieving the list of " +
|
throw new OperationManagementException("Error occurred while retrieving the list of " +
|
||||||
"operations assigned for '" + deviceId.getType() +
|
"operations assigned for '" + deviceId.getType() +
|
||||||
"' device '" + deviceId.getId() + "'", e);
|
"' device '" + deviceId.getId() + "'", e);
|
||||||
} catch (DeviceManagementDAOException e) {
|
|
||||||
throw new OperationManagementException("Error occurred while retrieving the device " +
|
|
||||||
"for device Identifier type -'" + deviceId.getType() +
|
|
||||||
"' and device Id '" + deviceId.getId() + "'", e);
|
|
||||||
} catch (SQLException e) {
|
} catch (SQLException e) {
|
||||||
throw new OperationManagementException("Error occurred while opening connection to the data source",
|
throw new OperationManagementException("Error occurred while opening connection to the data source",
|
||||||
e);
|
e);
|
||||||
} finally {
|
} finally {
|
||||||
OperationManagementDAOFactory.closeConnection();
|
OperationManagementDAOFactory.closeConnection();
|
||||||
}
|
}
|
||||||
} else {
|
|
||||||
log.info("User : " + getUser() + " is not authorized to fetch operations on device : "
|
|
||||||
+ deviceId.getId());
|
|
||||||
}
|
|
||||||
} catch (DeviceAccessAuthorizationException e) {
|
|
||||||
throw new OperationManagementException("Error occurred while authorizing access to the devices for user :" +
|
|
||||||
this.getUser(), e);
|
|
||||||
}
|
|
||||||
return operation;
|
return operation;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -612,15 +634,31 @@ public class OperationManagerImpl implements OperationManager {
|
|||||||
try {
|
try {
|
||||||
boolean isUserAuthorized = DeviceManagementDataHolder.getInstance().getDeviceAccessAuthorizationService().
|
boolean isUserAuthorized = DeviceManagementDataHolder.getInstance().getDeviceAccessAuthorizationService().
|
||||||
isUserAuthorized(deviceId, DeviceGroupConstants.Permissions.DEFAULT_OPERATOR_PERMISSIONS);
|
isUserAuthorized(deviceId, DeviceGroupConstants.Permissions.DEFAULT_OPERATOR_PERMISSIONS);
|
||||||
if (isUserAuthorized) {
|
if (!isUserAuthorized) {
|
||||||
try {
|
log.info("User : " + getUser() + " is not authorized to fetch operations on device : "
|
||||||
|
+ deviceId.getId());
|
||||||
|
}
|
||||||
|
} catch (DeviceAccessAuthorizationException e) {
|
||||||
|
throw new OperationManagementException("Error occurred while authorizing access to the devices for user :" +
|
||||||
|
this.getUser(), e);
|
||||||
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
DeviceManagementDAOFactory.openConnection();
|
DeviceManagementDAOFactory.openConnection();
|
||||||
int tenantId = CarbonContext.getThreadLocalCarbonContext().getTenantId();
|
int tenantId = CarbonContext.getThreadLocalCarbonContext().getTenantId();
|
||||||
enrolmentId = deviceDAO.getEnrolmentByStatus(deviceId, EnrolmentInfo.Status.ACTIVE, tenantId);
|
enrolmentId = deviceDAO.getEnrolmentByStatus(deviceId, EnrolmentInfo.Status.ACTIVE, tenantId);
|
||||||
|
} catch (DeviceManagementDAOException e) {
|
||||||
|
throw new OperationManagementException("Error occurred while retrieving the device " +
|
||||||
|
"for device Identifier type -'" + deviceId.getType() +
|
||||||
|
"' and device Id '" + deviceId.getId(), e);
|
||||||
|
} catch (SQLException e) {
|
||||||
|
throw new OperationManagementException(
|
||||||
|
"Error occurred while opening a connection to the data source", e);
|
||||||
} finally {
|
} finally {
|
||||||
DeviceManagementDAOFactory.closeConnection();
|
DeviceManagementDAOFactory.closeConnection();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
OperationManagementDAOFactory.openConnection();
|
OperationManagementDAOFactory.openConnection();
|
||||||
|
|
||||||
if (enrolmentId < 0) {
|
if (enrolmentId < 0) {
|
||||||
@ -651,24 +689,12 @@ public class OperationManagerImpl implements OperationManager {
|
|||||||
"operations assigned for '" + deviceId.getType() +
|
"operations assigned for '" + deviceId.getType() +
|
||||||
"' device '" +
|
"' device '" +
|
||||||
deviceId.getId() + "' and status:" + status.toString(), e);
|
deviceId.getId() + "' and status:" + status.toString(), e);
|
||||||
} catch (DeviceManagementDAOException e) {
|
|
||||||
throw new OperationManagementException("Error occurred while retrieving the device " +
|
|
||||||
"for device Identifier type -'" + deviceId.getType() +
|
|
||||||
"' and device Id '" + deviceId.getId(), e);
|
|
||||||
} catch (SQLException e) {
|
} catch (SQLException e) {
|
||||||
throw new OperationManagementException(
|
throw new OperationManagementException(
|
||||||
"Error occurred while opening a connection to the data source", e);
|
"Error occurred while opening a connection to the data source", e);
|
||||||
} finally {
|
} finally {
|
||||||
OperationManagementDAOFactory.closeConnection();
|
OperationManagementDAOFactory.closeConnection();
|
||||||
}
|
}
|
||||||
} else {
|
|
||||||
log.info("User : " + getUser() + " is not authorized to fetch operations on device : "
|
|
||||||
+ deviceId.getId());
|
|
||||||
}
|
|
||||||
} catch (DeviceAccessAuthorizationException e) {
|
|
||||||
throw new OperationManagementException("Error occurred while authorizing access to the devices for user :" +
|
|
||||||
this.getUser(), e);
|
|
||||||
}
|
|
||||||
return operations;
|
return operations;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -809,7 +835,8 @@ public class OperationManagerImpl implements OperationManager {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public List<Activity> getActivitiesUpdatedAfter(long timestamp, int limit, int offset) throws OperationManagementException {
|
public List<Activity> getActivitiesUpdatedAfter(long timestamp, int limit,
|
||||||
|
int offset) throws OperationManagementException {
|
||||||
try {
|
try {
|
||||||
OperationManagementDAOFactory.openConnection();
|
OperationManagementDAOFactory.openConnection();
|
||||||
return operationDAO.getActivitiesUpdatedAfter(timestamp, limit, offset);
|
return operationDAO.getActivitiesUpdatedAfter(timestamp, limit, offset);
|
||||||
|
|||||||
@ -19,7 +19,6 @@
|
|||||||
|
|
||||||
package org.wso2.carbon.device.mgt.core.search.util;
|
package org.wso2.carbon.device.mgt.core.search.util;
|
||||||
|
|
||||||
import org.wso2.carbon.device.mgt.common.Device;
|
|
||||||
import org.wso2.carbon.device.mgt.common.DeviceIdentifier;
|
import org.wso2.carbon.device.mgt.common.DeviceIdentifier;
|
||||||
import org.wso2.carbon.device.mgt.common.device.details.DeviceInfo;
|
import org.wso2.carbon.device.mgt.common.device.details.DeviceInfo;
|
||||||
import org.wso2.carbon.device.mgt.common.device.details.DeviceLocation;
|
import org.wso2.carbon.device.mgt.common.device.details.DeviceLocation;
|
||||||
|
|||||||
@ -49,10 +49,10 @@
|
|||||||
<artifactId>org.wso2.carbon.device.mgt.api.feature</artifactId>
|
<artifactId>org.wso2.carbon.device.mgt.api.feature</artifactId>
|
||||||
<type>zip</type>
|
<type>zip</type>
|
||||||
</dependency>
|
</dependency>
|
||||||
<dependency>
|
<!--<dependency>-->
|
||||||
<groupId>org.wso2.carbon.commons</groupId>
|
<!--<groupId>org.wso2.carbon.commons</groupId>-->
|
||||||
<artifactId>org.wso2.carbon.email.verification</artifactId>
|
<!--<artifactId>org.wso2.carbon.email.verification</artifactId>-->
|
||||||
</dependency>
|
<!--</dependency>-->
|
||||||
</dependencies>
|
</dependencies>
|
||||||
|
|
||||||
<build>
|
<build>
|
||||||
@ -114,9 +114,9 @@
|
|||||||
<bundleDef>
|
<bundleDef>
|
||||||
org.wso2.carbon.devicemgt:org.wso2.carbon.device.mgt.common:${carbon.device.mgt.version}
|
org.wso2.carbon.devicemgt:org.wso2.carbon.device.mgt.common:${carbon.device.mgt.version}
|
||||||
</bundleDef>
|
</bundleDef>
|
||||||
<bundleDef>
|
<!--<bundleDef>-->
|
||||||
org.wso2.carbon.commons:org.wso2.carbon.email.verification
|
<!--org.wso2.carbon.commons:org.wso2.carbon.email.verification-->
|
||||||
</bundleDef>
|
<!--</bundleDef>-->
|
||||||
<bundleDef>
|
<bundleDef>
|
||||||
org.wso2.carbon.identity:org.wso2.carbon.identity.oauth.stub:${carbon.identity.version}
|
org.wso2.carbon.identity:org.wso2.carbon.identity.oauth.stub:${carbon.identity.version}
|
||||||
</bundleDef>
|
</bundleDef>
|
||||||
|
|||||||
16
pom.xml
16
pom.xml
@ -757,11 +757,11 @@
|
|||||||
<version>${axiom.wso2.version}</version>
|
<version>${axiom.wso2.version}</version>
|
||||||
</dependency>
|
</dependency>
|
||||||
|
|
||||||
<dependency>
|
<!--<dependency>-->
|
||||||
<groupId>org.wso2.carbon.commons</groupId>
|
<!--<groupId>org.wso2.carbon.commons</groupId>-->
|
||||||
<artifactId>org.wso2.carbon.email.verification</artifactId>
|
<!--<artifactId>org.wso2.carbon.email.verification</artifactId>-->
|
||||||
<version>${carbon.commons.version}</version>
|
<!--<version>${carbon.commons.version}</version>-->
|
||||||
</dependency>
|
<!--</dependency>-->
|
||||||
|
|
||||||
<!-- API Management dependencies -->
|
<!-- API Management dependencies -->
|
||||||
<dependency>
|
<dependency>
|
||||||
@ -1739,7 +1739,7 @@
|
|||||||
|
|
||||||
<properties>
|
<properties>
|
||||||
<testng.version>6.1.1</testng.version>
|
<testng.version>6.1.1</testng.version>
|
||||||
<carbon.kernel.version>4.4.3</carbon.kernel.version>
|
<carbon.kernel.version>4.4.7</carbon.kernel.version>
|
||||||
<carbon.kernel.version.range>[4.4.0, 5.0.0)</carbon.kernel.version.range>
|
<carbon.kernel.version.range>[4.4.0, 5.0.0)</carbon.kernel.version.range>
|
||||||
<carbon.p2.plugin.version>1.5.4</carbon.p2.plugin.version>
|
<carbon.p2.plugin.version>1.5.4</carbon.p2.plugin.version>
|
||||||
<maven-buildnumber-plugin.version>1.3</maven-buildnumber-plugin.version>
|
<maven-buildnumber-plugin.version>1.3</maven-buildnumber-plugin.version>
|
||||||
@ -1791,8 +1791,8 @@
|
|||||||
<carbon.governance.version>4.5.8</carbon.governance.version>
|
<carbon.governance.version>4.5.8</carbon.governance.version>
|
||||||
|
|
||||||
<!-- Axiom -->
|
<!-- Axiom -->
|
||||||
<axiom.version>1.2.11-wso2v5</axiom.version>
|
<axiom.version>1.2.11-wso2v11</axiom.version>
|
||||||
<axiom.osgi.version.range>[1.2.11.wso2v5, 1.3.0)</axiom.osgi.version.range>
|
<axiom.osgi.version.range>[1.2.11, 1.3.0)</axiom.osgi.version.range>
|
||||||
<axiom.wso2.version>1.2.11.wso2v5</axiom.wso2.version>
|
<axiom.wso2.version>1.2.11.wso2v5</axiom.wso2.version>
|
||||||
|
|
||||||
<!-- Carbon Device Management -->
|
<!-- Carbon Device Management -->
|
||||||
|
|||||||
Loading…
Reference in New Issue
Block a user