Package org.omg.CORBA

Examples of org.omg.CORBA.NO_PERMISSION


            mappedException = new OBJECT_NOT_EXIST(MAPEXCEPTION_CODE,
                CompletionStatus.COMPLETED_MAYBE);
        } else if ( exception instanceof java.rmi.AccessException
            || exception instanceof javax.ejb.AccessLocalException )
        {
            mappedException = new NO_PERMISSION(MAPEXCEPTION_CODE,
                CompletionStatus.COMPLETED_MAYBE);
        } else if ( exception instanceof java.rmi.MarshalException ) {
            mappedException = new MARSHAL(MAPEXCEPTION_CODE,
                CompletionStatus.COMPLETED_MAYBE);
        } else if ( exception instanceof javax.transaction.TransactionRolledbackException
View Full Code Here


                                        logger); //no locate reply

            logger.debug("About to reject request because connection is not SSL.");

            SystemExceptionHelper.write( out,
                                         new NO_PERMISSION( 3, CompletionStatus.COMPLETED_NO ));

            try
            {
                connection.sendReply( out );
            }
View Full Code Here

          + get_uid());
    }

    if (ArjunaTransactionImple._checkedTransactions && !checkAccess())
    {
      throw new NO_PERMISSION(0, CompletionStatus.COMPLETED_NO);
    }

    int outcome = super.status();

    if ((outcome == ActionStatus.RUNNING)
View Full Code Here

          + get_uid());
    }

    if (ArjunaTransactionImple._checkedTransactions && !checkAccess())
    {
      throw new NO_PERMISSION(0, CompletionStatus.COMPLETED_NO);
    }

    int status = super.status();

    if ((status == ActionStatus.RUNNING)
View Full Code Here

            } catch (NoSuchObjectException e) {
                log.debug("NoSuchObjectException", e);
                throw new OBJECT_NOT_EXIST(e.toString());
            } catch (AccessException e) {
                log.debug("AccessException", e);
                throw new NO_PERMISSION(e.toString());
            } catch (MarshalException e) {
                log.debug("MarshalException", e);
                throw new MARSHAL(e.toString());
            } catch (RemoteException e) {
                log.debug("RemoteException", e);
View Full Code Here

        return result;
    }

    public Subject check(SSLSession session) throws SASException {
        if (session == null && requires != 0) throw new NO_PERMISSION("Missing required SSL session");

        try {
            if (log.isDebugEnabled()) log.debug("Scraping principal from SSL session");

            X509Certificate link = session.getPeerCertificateChain()[0];
View Full Code Here

         if (contextBody.discriminator() == MTContextError.value)
         {
            // should not happen
            log.warn("Unexpected ContextError in SAS reply");
            throw new NO_PERMISSION("Unexpected ContextError in SAS reply",
               MinorCodes.SAS_CSS_FAILURE,
               CompletionStatus.COMPLETED_YES);
         }
      }
      catch (BAD_PARAM e)
View Full Code Here

         if (contextBody.discriminator() == MTContextError.value)
         {
            // should not happen
            log.warn("Unexpected ContextError in SAS reply");
            throw new NO_PERMISSION("Unexpected ContextError in SAS reply",
               MinorCodes.SAS_CSS_FAILURE,
               CompletionStatus.COMPLETED_YES);
         }
      }
      catch (BAD_PARAM e)
View Full Code Here

            long contextId =
               contextBody.in_context_msg().client_context_id;
            threadLocal.sasReply = 
               createMsgCtxError(contextId,
                                 4 /* major status: no context */);
            throw new NO_PERMISSION("SAS context does not exist.");
         }
         else if (contextBody.discriminator() == MTEstablishContext.value)
         {
            EstablishContext message = contextBody.establish_msg();
            threadLocal.contextId = message.client_context_id;
            threadLocal.sasContextReceived = true;
           
            if (message.client_authentication_token != null
                && message.client_authentication_token.length > 0)
            {
               if (traceEnabled)
                  log.trace("received client authentication token");
               InitialContextToken authToken =
                  CSIv2Util.decodeInitialContextToken(
                                          message.client_authentication_token,
                                          codec);
               if (authToken == null)
               {
                  threadLocal.sasReply = 
                     createMsgCtxError(message.client_context_id,
                                       2 /* major status:
                                            invalid mechanism */);
                  throw new NO_PERMISSION("Could not decode " +
                                          "initial context token.");
               }
               threadLocal.incomingUsername = authToken.username;
               threadLocal.incomingPassword = authToken.password;
               threadLocal.incomingTargetName =
                  CSIv2Util.decodeGssExportedName(authToken.target_name);
               if (threadLocal.incomingTargetName == null)
               {
                  threadLocal.sasReply = 
                     createMsgCtxError(message.client_context_id,
                                       2 /* major status:
                                            invalid mechanism */);
                  throw new NO_PERMISSION("Could not decode target name " +
                                          "in initial context token.");
               }
              
              
               threadLocal.authenticationTokenReceived = true;
            }
            if (message.identity_token != null)
            {
               if (traceEnabled)
                  log.trace("received identity token");
               threadLocal.incomingIdentity = message.identity_token;
               if (message.identity_token.discriminator() == ITTPrincipalName.value)
               {
                  // Extract the RFC2743-encoded name
                  // from CDR encapsulation
                  Any a = codec.decode_value(
                                       message.identity_token.principal_name(),
                                       GSS_NT_ExportedNameHelper.type());
                  byte[] encodedName = GSS_NT_ExportedNameHelper.extract(a);
                 
                  // Decode the principal name
                  threadLocal.incomingPrincipalName =
                     CSIv2Util.decodeGssExportedName(encodedName);
                 
                  if (threadLocal.incomingPrincipalName == null)
                  {
                     threadLocal.sasReply = 
                        createMsgCtxError(message.client_context_id,
                                          2 /* major status:
                                               invalid mechanism */);
                     throw new NO_PERMISSION("Could not decode " +
                                             "incoming principal name.");
                  }
               }
            }
            threadLocal.sasReply = (threadLocal.contextId == 0) ?
View Full Code Here

          + get_uid());
    }

    if (ArjunaTransactionImple._checkedTransactions && !checkAccess())
    {
      throw new NO_PERMISSION(0, CompletionStatus.COMPLETED_NO);
    }

    int outcome = super.status();

    if ((outcome == ActionStatus.RUNNING)
View Full Code Here

TOP

Related Classes of org.omg.CORBA.NO_PERMISSION

Copyright © 2018 www.massapicom. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.