Merge pull request #203 from ayyoob/IoTS-1.0.0

Few fixes to configuration changes - reflecting the changes in cdmf authorization
application-manager-new
Ruwan 8 years ago committed by GitHub
commit ac2216a9bf

@ -184,7 +184,7 @@
<include>inputwebsocket.war</include>
<include>outputwebsocket.war</include>
<include>outputui.war</include>
<include>secured-outputui.war</include>
<include>secured-websocket.war</include>
</includes>
</fileSet>
<!-- END CEP -->

@ -17,13 +17,13 @@
#
#issuer of the JWT
iss=CDMF_DEFAULT_IDP
iss=iot_default
TokenEndpoint=https://localhost:${iot.core.https.port}/oauth2/token
#audience of JWT claim
#comma seperated values
aud=JwtIdentityAudience
aud=wso2.org/products/iot
#expiration time of JWT (number of minutes from the current time)
exp=1000

@ -117,7 +117,8 @@ This file is ciphertool compliant. Refer PRODUCT_HOME/repository/conf/security/c
<!--All receiving events/messages will be in this ring buffer. Ring buffer size
of MQTT inbound event disruptor. Default is set to 32768 (1024 * 32)
Having a large ring buffer will have a increase memory usage and will improve performance
Having a large ring buffer wi
ll have a increase memory usage and will improve performance
and vise versa -->
<inboundBufferSize>32768</inboundBufferSize>
@ -171,13 +172,23 @@ This file is ciphertool compliant. Refer PRODUCT_HOME/repository/conf/security/c
inherit from org.dna.mqtt.moquette.server.IAutherizer
Note: default implementation authorizes against carbon permission with the topic.
-->
<!--connectionPermission is required for a user to connect to broker-->
<!--connectionPermission is required for a user to connect to broker
subscriberPermission is needed to subscribe(subriber permission can be more than one)
publisherPermission is needed to publish(publisher permission can be more than one)
-->
<authorizer class="org.wso2.carbon.andes.extensions.device.mgt.mqtt.authorization.DeviceAccessBasedMQTTAuthorizer">
<property name="connectionPermission">/permission/admin/device-mgt/user</property>
<property name="adminPermission">/permission/admin/device-mgt/admin</property>
<property name="MQTTSubscriberScopeIdentifier">mqtt-subscriber</property>
<property name="MQTTPublisherScopeIdentifier">mqtt-subscriber</property>
<property name="devicemgtScopeIdentifier">device-mgt</property>
<!--<property name="connectionPermission">/permission/admin/device-mgt/user</property>-->
<!--topic subscription permissions which are assigned through grouping-->
<property name="subscriberPermission">/permission/device-mgt/user/groups/device_events</property>
<!--topic publisher permissions which are assigned through grouping-->
<property name="publisherPermission">/permission/device-mgt/user/groups/device_operation</property>
<property name="username">admin</property>
<property name="password">admin</property>
<property name="tokenEndpoint">https://localhost:9443/oauth2</property>
<!--offset time from expiry time to trigger refresh call - seconds -->
<property name="tokenRefreshTimeOffset">100</property>
<property name="deviceMgtServerUrl">https://localhost:9443</property>
</authorizer>
</security>
</mqtt>

@ -839,7 +839,7 @@
</file>
<file>
<source>
src/repository/conf/identity/identity-providers/CDMF_DEFAULT_IDP.xml
src/repository/conf/identity/identity-providers/iot_default.xml
</source>
<outputDirectory>${pom.artifactId}-${pom.version}/repository/conf/identity/identity-providers</outputDirectory>
<filtered>true</filtered>
@ -1153,7 +1153,7 @@
</file>
<file>
<source>
src/repository/conf/identity/identity-providers/CDMF_DEFAULT_IDP.xml
src/repository/conf/identity/identity-providers/iot_default.xml
</source>
<outputDirectory>${pom.artifactId}-${pom.version}/repository/conf/identity/identity-providers</outputDirectory>
<filtered>true</filtered>
@ -1176,15 +1176,6 @@
<filtered>true</filtered>
<fileMode>644</fileMode>
</file>
<!-- Copying remote-appmanager-config.xml -->
<file>
<source>
../p2-profile-gen/target/wso2carbon-core-${carbon.kernel.version}/repository/conf/etc/device-mgt-scopes.xml
</source>
<outputDirectory>${pom.artifactId}-${pom.version}/repository/conf/etc</outputDirectory>
<filtered>true</filtered>
<fileMode>644</fileMode>
</file>
<!-- Copying devi-appmanager-config.xml -->
<file>
<source>

@ -17,10 +17,10 @@
-->
<IdentityProvider>
<IdentityProviderName>CDMF_DEFAULT_IDP</IdentityProviderName>
<DisplayName>CDMF_DEFAULT_IDP</DisplayName>
<IdentityProviderName>iot_default</IdentityProviderName>
<DisplayName>iot_default</DisplayName>
<IdentityProviderDescription></IdentityProviderDescription>
<Alias>JwtIdentityAudience</Alias>
<Alias>wso2.org/products/iot</Alias>
<IsPrimary>true</IsPrimary>
<IsFederationHub></IsFederationHub>
<HomeRealmId></HomeRealmId>

@ -151,13 +151,8 @@
</SupportedGrantType>
<SupportedGrantType>
<GrantTypeName>urn:ietf:params:oauth:grant-type:jwt-bearer</GrantTypeName>
<GrantTypeHandlerImplClass>org.wso2.carbon.device.mgt.oauth.extensions.handlers.grant.ExtendedDeviceMgtJWTBearerGrantHandler</GrantTypeHandlerImplClass>
<GrantTypeValidatorImplClass>org.wso2.carbon.device.mgt.oauth.extensions.validators.ExtendedDeviceJWTGrantValidator</GrantTypeValidatorImplClass>
</SupportedGrantType>
<SupportedGrantType>
<GrantTypeName>device-mgt:password</GrantTypeName>
<GrantTypeHandlerImplClass>org.wso2.carbon.device.mgt.oauth.extensions.handlers.grant.ExtendedDeviceMgtPasswordGrantHandler</GrantTypeHandlerImplClass>
<GrantTypeValidatorImplClass>org.wso2.carbon.device.mgt.oauth.extensions.validators.ExtendedDevicePasswordGrantValidator</GrantTypeValidatorImplClass>
<GrantTypeHandlerImplClass>org.wso2.carbon.identity.oauth2.grant.jwt.JWTBearerGrantHandler</GrantTypeHandlerImplClass>
<GrantTypeValidatorImplClass>org.wso2.carbon.identity.oauth2.grant.jwt.JWTGrantValidator</GrantTypeValidatorImplClass>
</SupportedGrantType>
</SupportedGrantTypes>
<OAuthCallbackHandlers>

@ -47,9 +47,6 @@
-->
<Listener className="org.wso2.carbon.apimgt.webapp.publisher.lifecycle.listener.APIPublisherLifecycleListener"/>
<!-- Listener responsible for reading device features -->
<Listener className="org.wso2.carbon.device.mgt.extensions.feature.mgt.lifecycle.listener.FeatureManagementLifecycleListener"/>
<!-- WebAppDeploymentLifecycleListener listens to webapp deployment events and adds the custom permissions defined in webapps'
META-INF/permissions.xml to the permissions/admin section of registry. Given below is a sample of permissions.xml file.

Loading…
Cancel
Save