Index: mediator-service/branches/DS-801_JSON_Login/grails-app/conf/Config.groovy =================================================================== diff -u -r8645 -r8647 --- mediator-service/branches/DS-801_JSON_Login/grails-app/conf/Config.groovy (.../Config.groovy) (revision 8645) +++ mediator-service/branches/DS-801_JSON_Login/grails-app/conf/Config.groovy (.../Config.groovy) (revision 8647) @@ -15,18 +15,18 @@ grails.mime.file.extensions = true // enables the parsing of file extensions from URLs into the request format grails.mime.use.accept.header = false grails.mime.types = [ html: ['text/html','application/xhtml+xml'], - xml: ['text/xml', 'application/xml'], - text: 'text/plain', - js: 'text/javascript', - rss: 'application/rss+xml', - atom: 'application/atom+xml', - css: 'text/css', - csv: 'text/csv', - all: '*/*', - json: ['application/json','text/json'], - form: 'application/x-www-form-urlencoded', - multipartForm: 'multipart/form-data' - ] + xml: ['text/xml', 'application/xml'], + text: 'text/plain', + js: 'text/javascript', + rss: 'application/rss+xml', + atom: 'application/atom+xml', + css: 'text/css', + csv: 'text/csv', + all: '*/*', + json: ['application/json','text/json'], + form: 'application/x-www-form-urlencoded', + multipartForm: 'multipart/form-data' +] grails.controllers.defaultScope = 'prototype' // for emphasis - kk! @@ -78,18 +78,46 @@ // set per-environment serverURL stem for creating absolute links environments { - production { - grails.serverURL = "http://www.changeme.com" - grails.logging.jul.usebridge = false - } + production { + grails.serverURL = "http://www.changeme.com" + grails.logging.jul.usebridge = false + grails.plugin.springsecurity.providerNames = [ + 'lemansExternalAuthenticationProvider', + 'rememberMeAuthenticationProvider', + 'kerberosServiceAuthenticationProvider' + ] + } - development { - grails.logging.jul.usebridge = true - } + development { + grails.logging.jul.usebridge = true + grails.plugin.springsecurity.providerNames = [ + 'lemansExternalAuthenticationProvider', + 'rememberMeAuthenticationProvider', + ] + } + test { + grails.plugin.springsecurity.providerNames = [ + 'lemansExternalAuthenticationProvider', + 'rememberMeAuthenticationProvider', + ] + } + local { grails.tomcat.jvmArgs=["-Dcom.sun.management.jmxremote", "-Dcom.sun.management.jmxremote.port=1090", "-Dcom.sun.management.jmxremote.ssl=false", "-Dcom.sun.management.jmxremote.authenticate=false"] + grails.plugin.springsecurity.providerNames = [ + 'lemansExternalAuthenticationProvider', + 'rememberMeAuthenticationProvider', + ] } + + krblocal { + grails.plugin.springsecurity.providerNames = [ + 'lemansExternalAuthenticationProvider', + 'rememberMeAuthenticationProvider', + 'kerberosServiceAuthenticationProvider' + ] + } } @@ -166,16 +194,16 @@ //def logLayoutPattern = new PatternLayout("%d [%t] %-5p %c %x - %m%n") warn 'org.codehaus.groovy.grails.web.servlet', // controllers - 'org.codehaus.groovy.grails.web.pages', // GSP - 'org.codehaus.groovy.grails.web.sitemesh', // layouts - 'org.codehaus.groovy.grails.web.mapping.filter', // URL mapping - 'org.codehaus.groovy.grails.web.mapping', // URL mapping - 'org.codehaus.groovy.grails.commons', // core / classloading - 'org.codehaus.groovy.grails.plugins', // plugins - 'org.codehaus.groovy.grails.orm.hibernate', // hibernate integration - 'org.springframework', - 'org.hibernate', - 'net.sf.ehcache.hibernate' + 'org.codehaus.groovy.grails.web.pages', // GSP + 'org.codehaus.groovy.grails.web.sitemesh', // layouts + 'org.codehaus.groovy.grails.web.mapping.filter', // URL mapping + 'org.codehaus.groovy.grails.web.mapping', // URL mapping + 'org.codehaus.groovy.grails.commons', // core / classloading + 'org.codehaus.groovy.grails.plugins', // plugins + 'org.codehaus.groovy.grails.orm.hibernate', // hibernate integration + 'org.springframework', + 'org.hibernate', + 'net.sf.ehcache.hibernate' warn 'org.springframework.http.converter.json' @@ -258,8 +286,8 @@ grails.plugin.springsecurity.fii.rejectPublicInvocations = false - grails.plugin.springsecurity.filterChain.filterNames = [ - 'lemansLoggingFilter', +grails.plugin.springsecurity.filterChain.filterNames = [ + 'lemansLoggingFilter', 'securityContextPersistenceFilter', 'logoutFilter', 'formProcessingFilter', @@ -268,9 +296,9 @@ 'anonymousAuthenticationFilter', 'exceptionTranslationFilter', 'filterInvocationInterceptor' - ] +] - grails.plugin.springsecurity.filterChain.chainMap = [ +grails.plugin.springsecurity.filterChain.chainMap = [ '/login/form': 'lemansLoggingFilter,anonymousAuthenticationFilter', '/images/**': 'lemansLoggingFilter,anonymousAuthenticationFilter', '/js/**': 'lemansLoggingFilter,anonymousAuthenticationFilter', @@ -282,19 +310,19 @@ '/grails/loginpage/**': 'lemansLoggingFilter,anonymousAuthenticationFilter', '/': 'lemansLoggingFilter,anonymousAuthenticationFilter', '/**': 'JOINED_FILTERS' - ] +] - environments { - production { - grails.plugin.springsecurity.kerberos.ticketValidator.servicePrincipal = "HTTP/${InetAddress.getLocalHost().getCanonicalHostName()}@LEMANSCORP.COM" - grails.plugin.springsecurity.kerberos.ticketValidator.keyTabLocation = '/etc/apache2/http.ktb' - grails.plugin.springsecurity.kerberos.ticketValidator.debug = false - } - //for local kerberos - comment if not running on krb machine locally - //FIXME: Kill the krblocal environment. - krblocal { - grails.plugin.springsecurity.kerberos.ticketValidator.servicePrincipal = "HTTP/${InetAddress.getLocalHost().getCanonicalHostName()}@LEMANSCORP.COM" - grails.plugin.springsecurity.kerberos.ticketValidator.keyTabLocation = '/etc/apache2/http.ktb' - grails.plugin.springsecurity.kerberos.ticketValidator.debug = false - } +environments { + production { + grails.plugin.springsecurity.kerberos.ticketValidator.servicePrincipal = "HTTP/${InetAddress.getLocalHost().getCanonicalHostName()}@LEMANSCORP.COM" + grails.plugin.springsecurity.kerberos.ticketValidator.keyTabLocation = '/etc/apache2/http.ktb' + grails.plugin.springsecurity.kerberos.ticketValidator.debug = false } + //for local kerberos - comment if not running on krb machine locally + //FIXME: Kill the krblocal environment. + krblocal { + grails.plugin.springsecurity.kerberos.ticketValidator.servicePrincipal = "HTTP/${InetAddress.getLocalHost().getCanonicalHostName()}@LEMANSCORP.COM" + grails.plugin.springsecurity.kerberos.ticketValidator.keyTabLocation = '/etc/apache2/http.ktb' + grails.plugin.springsecurity.kerberos.ticketValidator.debug = false + } +}