[JBoss JIRA] (WFLY-8091) Fix Elytron Enabled attributes at DataSources subsystem
by Flavia Rainone (JIRA)
[ https://issues.jboss.org/browse/WFLY-8091?page=com.atlassian.jira.plugin.... ]
Flavia Rainone updated WFLY-8091:
---------------------------------
Summary: Fix Elytron Enabled attributes at DataSources subsystem (was: Remove alternatives from Elytron Enabled attributes at DataSources subsystem)
> Fix Elytron Enabled attributes at DataSources subsystem
> -------------------------------------------------------
>
> Key: WFLY-8091
> URL: https://issues.jboss.org/browse/WFLY-8091
> Project: WildFly
> Issue Type: Bug
> Components: JCA
> Reporter: Flavia Rainone
> Assignee: Flavia Rainone
>
> If elytron-enabled is set to false,we cannot use the other alternatives:
> /profile=full/subsystem=datasources/xa-data-source=H2XADS:add(driver-name=h2,
> jndi-name="java:/H2XADS",user-name=sa,password=sa)
> /profile=full/subsystem=datasources/xa-data-source=H2XADS:undefine-attribute(name=password)
> /profile=full/subsystem=datasources/xa-data-source=H2XADS:undefine-attribute(name=user-name)
> /profile=full/subsystem=datasources/xa-data-source=H2XADS:write-attribute(name=elytron-enabled,value=false)
> /profile=full/subsystem=datasources/xa-data-source=H2XADS:write-attribute(name=user-name,value=sa)
> The last command fails with:
> /profile=full/subsystem=datasources/xa-data-source=H2XADS:write-attribute(name=user-name,value=sa)
> {
> "outcome" => "failed",
> "failure-description" => {"domain-failure-description" =>
> "WFLYCTL0105: user-name is invalid in combination with
> elytron-enabled"},
> "rolled-back" => true
> }
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
9 years, 2 months
[JBoss JIRA] (WFLY-8092) Fix Elytron Enabled attributes at ResourceAdapters subsystem
by Flavia Rainone (JIRA)
[ https://issues.jboss.org/browse/WFLY-8092?page=com.atlassian.jira.plugin.... ]
Flavia Rainone updated WFLY-8092:
---------------------------------
Summary: Fix Elytron Enabled attributes at ResourceAdapters subsystem (was: Fix Elytron Enabled attribute at ResourceAdapters subsystem)
> Fix Elytron Enabled attributes at ResourceAdapters subsystem
> ------------------------------------------------------------
>
> Key: WFLY-8092
> URL: https://issues.jboss.org/browse/WFLY-8092
> Project: WildFly
> Issue Type: Bug
> Components: JCA
> Reporter: Flavia Rainone
> Assignee: Flavia Rainone
>
> This Jira is for all ELYTRON_ENABLED attributes defined in resource adapters subsystem.
> The attribute definition has two bugs:
> - alternatives defined:
> The alternative prevents the user from setting an ELYTRON_ENABLED attribute to false and using one of the alternative attributes, such as SECURITY_DOMAIN because the model will be considered invalid.
> The correct is using alternatives at the AUTHENTICATION_CONTEXT attributes instead and doing an extra validation at RaAdd.
> - marshalling of the attribute, we need to follow the same standard as other boolean attributes in the module, the attribute must be marshalled as a <elytron-enabled>true</elytron-enabled> instead of <elytron-enabled/>, which is the current form being used now
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
9 years, 2 months
[JBoss JIRA] (WFLY-8092) Fix Elytron Enabled attribute at ResourceAdapters subsystem
by Flavia Rainone (JIRA)
[ https://issues.jboss.org/browse/WFLY-8092?page=com.atlassian.jira.plugin.... ]
Flavia Rainone updated WFLY-8092:
---------------------------------
Description:
This Jira is for all ELYTRON_ENABLED attributes defined in resource adapters subsystem.
The attribute definition has two bugs:
- alternatives defined:
The alternative prevents the user from setting an ELYTRON_ENABLED attribute to false and using one of the alternative attributes, such as SECURITY_DOMAIN because the model will be considered invalid.
The correct is using alternatives at the AUTHENTICATION_CONTEXT attributes instead and doing an extra validation at RaAdd.
- marshalling of the attribute, we need to follow the same standard as other boolean attributes in the module, the attribute must be marshalled as a <elytron-enabled>true</elytron-enabled> instead of <elytron-enabled/>, which is the current form being used now
was:
The alternative prevents the user from setting an ELYTRON_ENABLED attribute to false and using one of the alternative attributes, such as SECURITY_DOMAIN because the model will be considered invalid.
The correct is using alternatives at the AUTHENTICATION_CONTEXT attributes instead and doing an extra validation at RaAdd.
> Fix Elytron Enabled attribute at ResourceAdapters subsystem
> -----------------------------------------------------------
>
> Key: WFLY-8092
> URL: https://issues.jboss.org/browse/WFLY-8092
> Project: WildFly
> Issue Type: Bug
> Components: JCA
> Reporter: Flavia Rainone
> Assignee: Flavia Rainone
>
> This Jira is for all ELYTRON_ENABLED attributes defined in resource adapters subsystem.
> The attribute definition has two bugs:
> - alternatives defined:
> The alternative prevents the user from setting an ELYTRON_ENABLED attribute to false and using one of the alternative attributes, such as SECURITY_DOMAIN because the model will be considered invalid.
> The correct is using alternatives at the AUTHENTICATION_CONTEXT attributes instead and doing an extra validation at RaAdd.
> - marshalling of the attribute, we need to follow the same standard as other boolean attributes in the module, the attribute must be marshalled as a <elytron-enabled>true</elytron-enabled> instead of <elytron-enabled/>, which is the current form being used now
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
9 years, 2 months
[JBoss JIRA] (WFLY-8092) Fix Elytron Enabled attribute at ResourceAdapters subsystem
by Flavia Rainone (JIRA)
[ https://issues.jboss.org/browse/WFLY-8092?page=com.atlassian.jira.plugin.... ]
Flavia Rainone updated WFLY-8092:
---------------------------------
Summary: Fix Elytron Enabled attribute at ResourceAdapters subsystem (was: Remove alternatives from Elytron Enabled attribute at ResourceAdapters subsystem)
> Fix Elytron Enabled attribute at ResourceAdapters subsystem
> -----------------------------------------------------------
>
> Key: WFLY-8092
> URL: https://issues.jboss.org/browse/WFLY-8092
> Project: WildFly
> Issue Type: Bug
> Components: JCA
> Reporter: Flavia Rainone
> Assignee: Flavia Rainone
>
> The alternative prevents the user from setting an ELYTRON_ENABLED attribute to false and using one of the alternative attributes, such as SECURITY_DOMAIN because the model will be considered invalid.
> The correct is using alternatives at the AUTHENTICATION_CONTEXT attributes instead and doing an extra validation at RaAdd.
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
9 years, 2 months
[JBoss JIRA] (WFLY-8095) Coverity static analysis, Dereference null return value, OAuth2CredentialSource (Elytron)
by Martin Choma (JIRA)
Martin Choma created WFLY-8095:
----------------------------------
Summary: Coverity static analysis, Dereference null return value, OAuth2CredentialSource (Elytron)
Key: WFLY-8095
URL: https://issues.jboss.org/browse/WFLY-8095
Project: WildFly
Issue Type: Bug
Components: Security
Reporter: Martin Choma
Assignee: Darran Lofthouse
Priority: Critical
Coverity found possible dereferencing of null value returned from {{resolveSSLContext()}} in {{openConnection()}}
https://scan7.coverity.com/reports.htm#v23632/p11778/fileInstanceId=95640...
{code:java|title=OAuth2CredentialSource.java}
private SSLContext resolveSSLContext() {
if (!isHttps(tokenEndpointUri)) {
return null;
}
return sslContextSupplier == null ? null : sslContextSupplier.get();
}
private HttpURLConnection openConnection() throws IOException {
log.debugf("Opening connection to [%s]", tokenEndpointUri);
HttpURLConnection connection = (HttpURLConnection) tokenEndpointUri.openConnection();
if (isHttps(tokenEndpointUri)) {
HttpsURLConnection https = (HttpsURLConnection) connection;
https.setSSLSocketFactory(resolveSSLContext().getSocketFactory());
if (hostnameVerifierSupplier != null) {
https.setHostnameVerifier(checkNotNullParam("hostnameVerifier", hostnameVerifierSupplier.get()));
}
}
return connection;
}
{code}
NPE could probably happen if {{oauth2-introspection}} is configured with no {{client-ssl-context}} and https {{introspection-url}}.
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
9 years, 2 months