Issue-ID: AAF-256
Change-Id: Ib44e0bc99072840a389522746983fbefbbce6744
Signed-off-by: Instrumental <jcgmisc@stl.gathman.org>
docker exec -it aaf_cass bash
docker exec -it aaf_cass bash
if [ "`docker ps -a | grep aaf_cass`" == "" ]; then
docker run --name aaf_cass -d cassandra:3.11
echo "Check for running Docker Container aaf_cass, then run again."
if [ "`docker ps -a | grep aaf_cass`" == "" ]; then
docker run --name aaf_cass -d cassandra:3.11
echo "Check for running Docker Container aaf_cass, then run again."
}
@Override
public boolean supportsRealm(final String r) {
}
@Override
public boolean supportsRealm(final String r) {
- return supportedRealms.contains(extractRealm(r)) || r.endsWith(realm);
+ if(r.endsWith(realm)) {
+ return true;
+ } else {
+ String erealm = extractRealm(r);
+ for(String sr : supportedRealms) {
+ if(erealm.startsWith(sr)) {
+ return true;
+ }
+ }
+ }
+ return false;
docker exec -it aaf_$1 bash
docker exec -it aaf_$1 bash
#
# Docker Building Script. Reads all the components generated by install, on per-version basis
#
#
# Docker Building Script. Reads all the components generated by install, on per-version basis
#
# Pull in Variables from d.props
. ./d.props
# Pull in Variables from d.props
. ./d.props
# Pull in Variables from d.props
. ./d.props
# Pull in Variables from d.props
. ./d.props
# Pull in Props
. ./d.props
# Pull in Props
. ./d.props
# Pull in Properties
. ./d.props
# Pull in Properties
. ./d.props
aaf|AAF App|AAF|Application||DL-aaf-support@att.com|a|jonathan
a2345z|AAF App|AAF|Application||DL-aaf-support@att.com|a|jonathan
aaf_authz|AAF App|AAF|Application||jonathan.gathman@att.com|a|jonathan
aaf|AAF App|AAF|Application||DL-aaf-support@att.com|a|jonathan
a2345z|AAF App|AAF|Application||DL-aaf-support@att.com|a|jonathan
aaf_authz|AAF App|AAF|Application||jonathan.gathman@att.com|a|jonathan
-kirankamieni|Kiran K Kamineni|Kiran|Kamineni|999-999=9999|kiran.k.kamineni@intel.com|ramkoya
-aaf_sms|Secret Management Service|SMS|Secret Management Service provides secure storage for sensitive information such as passwords and userIDs||kiran.k.kamineni@intel.com|a|kirankamieni
+kirank|Kiran K Kamineni|Kiran|Kamineni|999-999=9999|kiran.k.kamineni@intel.com|e|ramkoya
+aaf_sms|Secret Management Service|SMS|Secret Management Service provides secure storage for sensitive information such as passwords and userIDs||kiran.k.kamineni@intel.com|a|kirank
djtimoney|Dan Timoney|Dan|Timoney|+1 (732) 420-3226|dt5972@att.com|e|ramkoya
xuegao|Xue Gao|Xue|Gao|0032479670327|xg353y@att.com|e|clefevre
clamp|Clamp Application|clamp|Application||xg353y@att.com|a|xuegao
djtimoney|Dan Timoney|Dan|Timoney|+1 (732) 420-3226|dt5972@att.com|e|ramkoya
xuegao|Xue Gao|Xue|Gao|0032479670327|xg353y@att.com|e|clefevre
clamp|Clamp Application|clamp|Application||xg353y@att.com|a|xuegao
dglfromatt|Dominic Lunanuova|Dominic|Lunanuova|732-420-9618|dgl@research.att.com|e|ramokoya
puthenpura|Sarat Puthenpura|Sarat|Puthenpura|||e|clefevre
ruoyu|Ruoyu Ying|Ruoyu|Ying|13661960772|ruoyu.ying@intel.com|e|puthenpura
dglfromatt|Dominic Lunanuova|Dominic|Lunanuova|732-420-9618|dgl@research.att.com|e|ramokoya
puthenpura|Sarat Puthenpura|Sarat|Puthenpura|||e|clefevre
ruoyu|Ruoyu Ying|Ruoyu|Ying|13661960772|ruoyu.ying@intel.com|e|puthenpura
+sunilu|Sunil Unnava|Sunil|Unnava|6094541858|sunil.unnava@att.com|e|ramkoya
+dmaapmr|DMaap Message Router|DMaap MR|Message Router||su622b@att.com|a|sunilu
+oof|OOF|OOF|OOF||sarat@research.att.com|a|saratp
+saratp|Sarat Puthenpura|Sarat|Puthenpura|9089012067|sarat@research.att.com|e|clefevre
if [ "$1" = "" -o "$1" = "-local" ]; then
echo "Personal Certificate"
SUBJECT="/CN=$FQI/OU=V1`cat subject.aaf`"
if [ "$1" = "" -o "$1" = "-local" ]; then
echo "Personal Certificate"
SUBJECT="/CN=$FQI/OU=V1`cat subject.aaf`"
else
echo "Application Certificate"
SUBJECT="/CN=$1/OU=$FQI`cat subject.aaf`"
else
echo "Application Certificate"
SUBJECT="/CN=$1/OU=$FQI`cat subject.aaf`"
`stty echo`
# remove any previous Private key
`stty echo`
# remove any previous Private key
# Create j regaular rsa encrypted key
# Create j regaular rsa encrypted key
- openssl req -new -newkey rsa:2048 -sha256 -keyout private/$FQI.key \
- -out $FQI.csr -outform PEM -subj "$SUBJECT" \
+ openssl req -new -newkey rsa:2048 -sha256 -keyout private/$NAME.key \
+ -out $NAME.csr -outform PEM -subj "$SUBJECT" \
-passout stdin << EOF
$PASSPHRASE
EOF
-passout stdin << EOF
$PASSPHRASE
EOF
- chmod 400 private/$FQI.key
+ chmod 400 private/$NAME.key
- echo openssl req -newkey rsa:2048 -sha256 -keyout $FQI.key -out $FQI.csr -outform PEM -subj '"'$SUBJECT'"'
- echo chmod 400 $FQI.key
+ echo openssl req -newkey rsa:2048 -sha256 -keyout $NAME.key -out $NAME.csr -outform PEM -subj '"'$SUBJECT'"'
+ echo chmod 400 $NAME.key
echo "# All done, print result"
echo "# All done, print result"
- echo openssl req -verify -text -noout -in $FQI.csr
+ echo openssl req -verify -text -noout -in $NAME.csr
fi
fi
if [ "$SIGN_IT" = "true" ]; then
# Sign it
fi
fi
if [ "$SIGN_IT" = "true" ]; then
# Sign it
- openssl ca -config ../openssl.conf -extensions server_cert -out $FQI.crt \
+ openssl ca -config ../openssl.conf -extensions server_cert -out $NAME.crt \
-cert certs/ca.crt -keyfile private/ca.key \
-policy policy_loose \
-days 360 \
-cert certs/ca.crt -keyfile private/ca.key \
-policy policy_loose \
-days 360 \