@Extension public static class SpecificUsersAuthorizationStrategy.DescriptorImpl extends AuthorizeProjectStrategyDescriptor
Descriptor.FormException, Descriptor.PropertyType, Descriptor.Self
clazz
Constructor and Description |
---|
DescriptorImpl() |
Modifier and Type | Method and Description |
---|---|
String |
calcCheckPasswordRequestedUrl()
Helper method for computing the check password URL.
|
FormValidation |
doCheckDontRestrictJobConfiguration(boolean dontRestrictJobConfiguration)
Display warnings for
dontRestrictJobConfiguration
"Don't restrict job configuration" can cause security issues
when used with inappropriate access controls,
and display for a waning message for that. |
FormValidation |
doCheckPassword(org.kohsuke.stapler.StaplerRequest req,
String userid,
String password,
String apitoken,
boolean useApitoken)
Checks the supplied password.
|
String |
doCheckPasswordRequested(org.kohsuke.stapler.StaplerRequest req,
String userid)
Checks password field is required in configuration page.
|
FormValidation |
doCheckUserid(String userid)
Checks the userid against the blacklist of invalid users.
|
String |
getDisplayName() |
boolean |
isEnabledByDefault()
SpecificUsersAuthorizationStrategy should be disabled by default for JENKINS-28298 |
boolean |
isUseApitoken()
Checks if the current
SecurityRealm supports username/password authentication. |
configureFromGlobalSecurity, getConfigFile, getDescriptorsForGlobalSecurityConfigPage, getGlobalSecurityConfigPage, isApplicableToGlobal
addHelpFileRedirect, calcAutoCompleteSettings, calcFillSettings, configure, configure, doHelp, find, find, findByDescribableClassName, findById, getCategory, getCheckMethod, getCheckUrl, getConfigPage, getCurrentDescriptorByNameUrl, getDescriptorFullUrl, getDescriptorUrl, getGlobalConfigPage, getGlobalPropertyType, getHelpFile, getHelpFile, getHelpFile, getId, getJsonSafeClassName, getKlass, getPlugin, getPossibleViewNames, getPropertyType, getPropertyType, getPropertyTypeOrDie, getRequiredGlobalConfigPagePermission, getT, getViewPage, isInstance, isSubTypeOf, load, newInstance, newInstance, newInstancesFromHeteroList, newInstancesFromHeteroList, save, self, toArray, toList, toMap
public String getDisplayName()
getDisplayName
in class Descriptor<AuthorizeProjectStrategy>
@Restricted(value=org.kohsuke.accmod.restrictions.NoExternalUse.class) public String calcCheckPasswordRequestedUrl()
@Restricted(value=org.kohsuke.accmod.restrictions.NoExternalUse.class) public String doCheckPasswordRequested(org.kohsuke.stapler.StaplerRequest req, @QueryParameter String userid)
req
- the request.userid
- the userid.@Restricted(value=org.kohsuke.accmod.restrictions.NoExternalUse.class) public FormValidation doCheckUserid(@QueryParameter String userid)
userid
- the userid@Restricted(value=org.kohsuke.accmod.restrictions.NoExternalUse.class) public FormValidation doCheckPassword(org.kohsuke.stapler.StaplerRequest req, @QueryParameter String userid, @QueryParameter String password, @QueryParameter String apitoken, @QueryParameter boolean useApitoken)
req
- the request.userid
- the user id.password
- the password.public FormValidation doCheckDontRestrictJobConfiguration(@QueryParameter boolean dontRestrictJobConfiguration)
dontRestrictJobConfiguration
"Don't restrict job configuration" can cause security issues
when used with inappropriate access controls,
and display for a waning message for that.dontRestrictJobConfiguration
- whether not to restrict job configurationdontRestrictJobConfiguration
if it is true
SpecificUsersAuthorizationStrategy.setDontRestrictJobConfiguration(boolean)
@Restricted(value=org.kohsuke.accmod.restrictions.NoExternalUse.class) public boolean isUseApitoken()
SecurityRealm
supports username/password authentication.true
if and only if the current realm supports username/password authentication.public boolean isEnabledByDefault()
SpecificUsersAuthorizationStrategy
should be disabled by default for JENKINS-28298isEnabledByDefault
in class AuthorizeProjectStrategyDescriptor
AuthorizeProjectStrategyDescriptor.isEnabledByDefault()
Copyright © 2016–2021. All rights reserved.