Skip to content

201911 #25

merged 104 commits into from Jan 5, 2020
Merged
Changes from 8 commits
Commits
Show all changes
104 commits
Select commit Hold shift + click to select a range
52dd6e1
Update Jenkinsfile
chubing Apr 19, 2019
67961e2
Update common.bash
chubing Apr 19, 2019
f323fbf
Update Jenkinsfile
chubing Apr 19, 2019
9497c39
Update manualBuild.sh
chubing Apr 19, 2019
7729514
Update Dockerfile
chubing Apr 19, 2019
39aef68
Update Jenkinsfile
chubing Apr 19, 2019
97305d6
Update Jenkinsfile
chubing Apr 19, 2019
a442729
Update manualBuild.sh
chubing Apr 19, 2019
97fc4a9
fixed context for oddball builds. paths will stay the same.
wgthom Apr 20, 2019
2dc9ad8
added gte tag to base
wgthom Apr 20, 2019
22f216b
fixed tagging scheme for image builds
wgthom Apr 20, 2019
d53ec91
fixed typo
wgthom Apr 20, 2019
dc720ba
added version tag
wgthom Apr 20, 2019
acd82d5
added version tag
wgthom Apr 20, 2019
4fbf26a
Update Dockerfile
wgthom Apr 20, 2019
2d75fc1
Create buildVersion.sh
wgthom Apr 20, 2019
41162de
updated 101 build to use VERSION_TAG
wgthom Apr 20, 2019
26b8dde
updated to use VERSION_TAG
wgthom Apr 20, 2019
6076c4d
updated to use VERSION_TAG
wgthom Apr 20, 2019
14cdb62
updated to use VERSION_TAG
wgthom Apr 20, 2019
d06a8ed
added VERSION_TAG to jenkins build
wgthom Apr 20, 2019
05e30ea
Update manualBuild.sh
wgthom Apr 20, 2019
1c99a6c
Update Jenkinsfile
wgthom Apr 20, 2019
dd934df
add VERSION_TAG to rest of build
wgthom Apr 20, 2019
40d0ec6
Update Jenkinsfile
wgthom Apr 20, 2019
9326941
Update buildVersion.sh
wgthom Apr 20, 2019
f0a55ed
Update Jenkinsfile
wgthom Apr 23, 2019
d463a7d
updated USERTOKEN
wgthom Apr 23, 2019
d8d92ac
Update README
dima767 Apr 23, 2019
bcb35c2
Update to tier shib-idp 3.4 immage wip
dima767 Apr 23, 2019
3820f6d
polishing
dima767 Apr 24, 2019
7e1c4f2
Merge pull request #13 from docker/201906-shib-upgrade
wgthom Apr 26, 2019
4957de7
Reworked readme
wgthom Apr 26, 2019
387d0e0
markdown updates
wgthom Apr 26, 2019
3e3c897
minor updates
wgthom Apr 26, 2019
91d1ffa
polish
wgthom Apr 26, 2019
83a5bd3
minor update
wgthom Apr 26, 2019
bd00217
minor update
wgthom Apr 27, 2019
f41a015
ignore spell check
wgthom Apr 27, 2019
38bcfc9
spelling
wgthom Apr 27, 2019
4bd952c
minor update
wgthom Apr 27, 2019
b188372
disable docker HEALTHCHECK
wgthom Apr 27, 2019
9a9ba2d
Merge branch '201906' of https://github.internet2.edu/docker/grouper_…
wgthom Apr 27, 2019
d9c6ad7
ignore .vscode
wgthom Apr 27, 2019
eb28c50
updated pspng config to match new app template
wgthom May 23, 2019
e355a46
initial docs import
wgthom May 29, 2019
2622d85
ignore build
wgthom May 29, 2019
5ec39bf
Merge branch '201906' of https://github.internet2.edu/docker/grouper_…
wgthom May 29, 2019
3cbe7e5
content added to index.rst
wgthom May 29, 2019
7b7bb06
moved ref and basis groups up to 201.1.1
wgthom May 30, 2019
2893834
rabbitmq start script
wgthom May 30, 2019
cb58886
content updates for 201
wgthom May 30, 2019
f1e39d8
gte command
wgthom May 30, 2019
d74239e
Merge pull request #16 from docker/201906-201-updates
wgthom May 30, 2019
03f891f
fixed docker image tag
wgthom May 30, 2019
0a5206b
added ref and basis tags to class groups
wgthom May 30, 2019
698c393
typo fix
wgthom May 30, 2019
82a7cb3
updated content for 2.1.2
wgthom May 31, 2019
6b9c6d9
updated gte for 201.2
wgthom May 31, 2019
58e9a1f
Merge branch '201906-201-updates' of https://github.internet2.edu/doc…
wgthom May 31, 2019
14448df
added gte version folders
wgthom May 31, 2019
ef92a1f
content update for 201.3
wgthom May 31, 2019
9ef07c2
added gte version folder
wgthom May 31, 2019
7bb5970
gte update for 201.3
wgthom May 31, 2019
0535d6c
Merge pull request #17 from docker/201906-201-updates
wgthom May 31, 2019
15eadaa
update headings
wgthom Jun 1, 2019
b2a62bf
content and gte updates for 201.4
wgthom Jun 1, 2019
1b6e586
Merge pull request #18 from docker/201906-201-updates
wgthom Jun 1, 2019
a934c58
content and gte updates for 201.5
wgthom Jun 2, 2019
df4b2b5
Merge pull request #19 from docker/201906-201-updates
wgthom Jun 2, 2019
604dde4
401.1 updates WIP
wgthom Jun 3, 2019
686644c
401 updates
wgthom Jun 6, 2019
8c80828
updates for 401 gte
wgthom Jun 6, 2019
db80bcc
Merge pull request #20 from docker/201906-201-updates
wgthom Jun 6, 2019
5b7d16c
content and gte updates for 401.2
wgthom Jun 7, 2019
6241645
Merge pull request #21 from docker/201906-201-updates
wgthom Jun 7, 2019
95c7d3b
401.3 content and gte updates
wgthom Jun 8, 2019
cd4cb48
401.5.7 updates
wgthom Jun 8, 2019
6cefbad
updates for 401.3
wgthom Jun 8, 2019
2adc619
updates for 401.3
wgthom Jun 8, 2019
59f9271
Merge pull request #22 from docker/201906-201-updates
wgthom Jun 8, 2019
01335e7
gte and content updates for 401.4
wgthom Jun 8, 2019
42680ba
Merge pull request #23 from docker/201906-201-updates
wgthom Jun 8, 2019
6a86074
gte helper scripts
wgthom Jun 9, 2019
fdf8fec
shib idp branding
wgthom Jun 9, 2019
3df83f2
updates for 201.1 and 201.2
wgthom Jun 10, 2019
fa3e0d9
updates for 201.3
wgthom Jun 10, 2019
2538c22
updates for 201.4
wgthom Jun 10, 2019
88437a0
201.5 updates
wgthom Jun 10, 2019
cb1ff40
404.4 update
wgthom Jun 10, 2019
2b188dd
Merge pull request #24 from docker/201906-201-updates
wgthom Jun 10, 2019
caf0648
cleaned up readme a bit
wgthom Jun 10, 2019
a98f774
readme fix
wgthom Jun 10, 2019
dc80644
added gdg folders, groups, and subjects to 101.1.1
wgthom Jun 10, 2019
31e9d88
added gdg folders, ref/basis groups, subjects
wgthom Jun 10, 2019
7eb4a39
grouper version at 2.4.0-a47-u25-w5-p6-20190611
wgthom Jun 12, 2019
a5c7fdb
grouper 2.4a64 101/201 updates
wgthom Jun 13, 2019
9c33823
updates for 401
wgthom Jun 13, 2019
7d70be3
only build setup and end for each module
wgthom Jun 13, 2019
80b9a9f
update for 201911 build
wgthom Oct 5, 2019
aa25e9e
updates for 201911 build
wgthom Oct 5, 2019
7f58304
update to grouper:latest and fix mysql install
wgthom Oct 9, 2019
2741016
enable config in ui for any IP address
wgthom Oct 29, 2019
9314d1f
grouper build for temple
wgthom Nov 1, 2019
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
3 changes: 2 additions & 1 deletion base/Dockerfile
@@ -83,7 +83,8 @@ COPY container_files/var-www-html/ /var/www/html/
RUN cp /opt/tier-support/grouper.xml /opt/tier-support/grouper-ws.xml /opt/tomcat/conf/Catalina/localhost/ \
&& chown -R tomcat /opt/shibboleth-idp/ \
&& chmod -R 700 /opt/shibboleth-idp/ \
&& chmod +rx /var/www/html/app/index.py
&& chmod +rx /var/www/html/app/index.py \
&& /opt/shibboleth-idp/bin/build.sh

EXPOSE 389 3306 4443

Unable to render rich display

Invalid image source.

@@ -0,0 +1,6 @@
# You can define message properties here to override messages defined in
# system/messages/ or to add your own messages.
idp.title = InCommon Trusted Access Platform - Grouper Training Environment
idp.logo = /images/Grouper_204px.png
idp.logo.alt-text = Grouper
idp.footer = InCommon Trusted Access Platform - Grouper Training Environment
34 changes: 19 additions & 15 deletions docs/201/201.1.rst
@@ -57,13 +57,13 @@ to students.
Exercise 201.1.1 All students reference group
---------------------------------------------

*Create an all student reference group to be used in access policy and the all
students mailing list*
Create an all student reference group to be used in access policy and the "all
students" mailing list.

Reference groups for student by class year already exist. These are being used
for class year mailing lists. Membership in the class year groups are updated
automatically by the studentTermLoader job. The loader job queries the student
information system.
Reference groups for students by class year already exist in `ref:student`.
These are being used for class year mailing lists. Membership in the class year
groups are updated automatically by the studentTermLoader job. The loader job
queries the student information system.

1. Create a new group named `ref:student:students`.
(+ Create new group)
@@ -75,7 +75,7 @@ information system.

.. figure:: ../figures/201-add-ref-students.png

3. Add the following class year reference groups to `..:students`.
3. Add the following class year reference groups to `students`.
(Members -> + Add members -> ...)

* `ref:student:class2020`
@@ -84,7 +84,7 @@ information system.
* `ref:student:class2023`

4. Filter for: Has direct membership. This shows all the reference groups that
contribute to the '..:students' group.
contribute to the `students` group.

.. figure:: ../figures/201-students-direct-membership.png

@@ -140,14 +140,16 @@ Exercise 201.1.4 Transfer Students
Students who transfer to your campus often need access to systems well ahead
of SIS data being fully updated.

#. Create a new basis group, `basis:student:transfer_student`.
#. Create a new basis group `basis:student:transfer_student` and add it to
`students`

#. Add the following accounts to `transfer_student`:

* agrady901
* alee467
* ascott776
* pmartinez921
* cthompson287
* agrady901

#. Check how many students there are now. The number of students did not go
3. Check how many students there are now. The number of students did not go
up by 3 as you might have expected. Why? One of the transfer students was
already a member of `students`. Trace the membership on each of the
transfer students to determine which accounts already had the `students`
@@ -157,8 +159,8 @@ of SIS data being fully updated.
Exercise 201.1.5 Change of Status
---------------------------------

Students who leave for a variety of reasons are given a 32 day grace period
during which they retain student access. Basis groups for these already exist.
Students who leave for a variety of reasons are given a 32 day grace period,
during which they retain student access. Basis groups for these already exist.
They include:

* `basis:student:expelled_32_days`
@@ -167,6 +169,8 @@ They include:

#. Add these basis groups to `students`. How many students are there now?

.. figure:: ../figures/201-students-change-of-status.png

------------------------------------------
Exercise 201.1.6 Leave of Absence Students
------------------------------------------
24 changes: 11 additions & 13 deletions docs/201/201.2.rst
@@ -63,19 +63,17 @@ create a new structure for our VPN service policy.

3. Navigate to the `app:vpn:service:policy` folder

4. Create a new vpn_authorized policy group using the Policy Group Template
4. Create a new vpn_access policy group using the Policy Group Template
(More actions -> New template)

.. figure:: ../figures/201-new-vpn-policy.png

[ this should be replaced with policy template when ready ]
TODO: Steps 5 through 8 should be replaced with policy template when ready

5. Create `app:vpn:vpn_authorized`.
5. Create `app:vpn:vpn_access`.
6. Create `app:vpn:vpn_allow`.
7. Create `app:vpn:vpn_deny`.
8. Make `vpn_authorized` a composite of `vpn_allow` minus `vpn_deny`.

.. figure:: ../figures/201-vpn-composite.png
8. Make `vpn_access` a composite of `vpn_allow` minus `vpn_deny`.

-------------------------------------------------------------------
Exercise 201.2.2 Create digital policy from natural language policy
@@ -88,10 +86,10 @@ are already available.
#. Add `ref:employee:fac_staff` to `vpn_allow`.
#. Add `ref:security:locked_by_ciso` to `vpn_deny`.
#. Add `ref:iam:closure` to `vpn_deny`.
#. Review the `vpn_authorized` policy definition
(vpn_authorized -> More actions -> Visualization)
#. Review the `vpn_access` policy definition
(vpn_access -> More actions -> Visualization)

.. figure:: ../figures/201-vpn-authorized.png
.. figure:: ../figures/201-vpn-access.png

----------------------------------------------------------------------------
Exercise 201.2.3 Update policy to include institutional review board members
@@ -103,7 +101,7 @@ account is in a closure state".

#. Add `org:irb:ref:irb_members` to `vpn_allow`.
#. Add *jsmith* to `org:irb:ref:irb_members`.
#. Trace membership for *jsmith* from `vpn_authorized`. (jsmith -> Choose
#. Trace membership for *jsmith* from `vpn_access`. (jsmith -> Choose
action -> Actions -> Trace membership)

.. figure:: ../figures/201-jsmith-trace.png
@@ -113,10 +111,10 @@ account is in a closure state".

.. figure:: ../figures/201-vpn-allow-audit.png

5. Review policy definition for `vpn_authorized`.
(vpn_authorized -> More actions -> Visualization)
5. Review policy definition for `vpn_access`.
(vpn_access -> More actions -> Visualization)

.. figure:: ../figures/201-vpn-authorized2.png
.. figure:: ../figures/201-vpn-access2.png

------------------------------------------------------------
Exercise 201.2.4 Review Application template security groups
2 changes: 1 addition & 1 deletion docs/201/201.3.rst
@@ -108,7 +108,7 @@ The eduPerson object class specification states:
faculty, staff and students.
#. Create `app:eduPersonAffiliation:ePA_member`.
#. Add `...:ePA_faculty | staff | student` to `...:ePA_member`.
#. Add `ePA_faculty`, `ePA_staff`, and `ePA_student` to `ePA_member`.
#. Review `ePA_member` defintion (ePA_member -> More actions -> Visualization)
.. figure:: ../figures/201-ePA-member-vis.png
31 changes: 11 additions & 20 deletions docs/201/201.4.rst
@@ -19,16 +19,16 @@ Lab Components
* OpenLDAP
* Shibboleth
* `Grouper Deployment Guide`_
* `eduPerson Object Class Specification`_
* `eduPerson Object Class Specification`_

--------
Overview
--------

`Grouper Deployment Guide`_ access control model 2 (ACM2) is all about
attribute based access control (ABAC) as defined in `NIST SP 800-162`_. ACM2 is
applicable across a broad range of services where access control policy can be
based on subject attributes, policy decisions can be precomputed, and simple
attribute based access control (ABAC) as defined in `NIST SP 800-162`_. ACM2
is applicable across a broad range of services where access control policy can
be based on subject attributes, policy decisions can be precomputed, and simple
subject attributes are sufficient to drive the policy enforcement point.

In cases where the SAML Service Provider will accept an
@@ -49,20 +49,11 @@ Exercise 201.4.1 Create policy for wiki application

.. figure:: ../figures/201-wiki-app.png

[ use new policy template to create wiki_user]
`app:wiki:service:policy:wiki_authorized|allow|deny`.
Edit composite `wiki_authorized` to make it `wiki_allow` minus `wiki_deny`.

---------------------------------------------------
Exercise 201.4.2 Review application security groups
---------------------------------------------------

`app:wiki:security`

.. figure:: ../figures/201-wiki-security.png
3. Navigate to `app:wiki:service:policy:` and use the new policy template to
create `wiki_user`

-----------------------------------------------
Exercise 201.4.3 Add reference groups to policy
Exercise 201.4.2 Add reference groups to policy
-----------------------------------------------

`wiki_user` is an application-secific role. Subjects in this role have general
@@ -76,7 +67,7 @@ to the student wiki, unless they are in the global deny group".
.. figure:: ../figures/201-wiki-policy.png

-------------------------------------------------------------------------------
Exercise 201.4.4 Configure PSPNG to provision wiki_user to eduPersonEntitlement
Exercise 201.4.3 Configure PSPNG to provision wiki_user to eduPersonEntitlement
-------------------------------------------------------------------------------

#. Assign PSPNG attribute, **provision_to** to `wiki_user` with a value
@@ -92,13 +83,13 @@ Exercise 201.4.4 Configure PSPNG to provision wiki_user to eduPersonEntitlement
:caption: grouper-loader.properties
:linenos:

2. Run CHANGE_LOG_consumer_pspng_entitlements
3. Run CHANGE_LOG_consumer_pspng_entitlements
(Miscellaneous -> All daemon jobs -> Job actions -> Run job now)

.. figure:: ../figures/201-pspng-entitlements-run-job.png

---------------------------------------------------------------
Exercise 201.4.5 Configure Shib to release ePE value for our SP
Exercise 201.4.4 Configure Shib to release ePE value for our SP
---------------------------------------------------------------

The demo Shibboleth IdP has been configured to release the
@@ -119,7 +110,7 @@ is below:
.. figure:: ../figures/201-ePE-value.png

----------------------------------------------------------------
Exercise 201.4.6 Thought exercise! Create accounts at target SP?
Exercise 201.4.5 Thought exercise! Create accounts at target SP?
----------------------------------------------------------------
Can we use policy groups to create/manage accounts at target SP?

19 changes: 11 additions & 8 deletions docs/201/201.5.rst
@@ -46,8 +46,11 @@ Exercise 201.5.1 Create a `congos` application folder and group set

1. Use the Application template to create the `cognos` application folder and
group set in the `app` folder.
2. Use the Policy template to create two new policy groups in
`app:cognos:service`
2. Use the Policy template to create two new policy groups in
`app:cognos:service:policy`

* `app:cognos:service:policy:cg_fin_report_reader`
* `app:cognos:service:policy:cp_fin_report_writer`

------------------------------------------------------
Exercise 201.5.2 Implement Report Reader Access Policy
@@ -66,10 +69,10 @@ Exercise 201.5.3 Implement Report Writer Access Policy

Only employees authorized by the Finance Manager have access to write reports

This policy will require an application specific reference group the we will
use as an access control list managed by the Finanance Manager.
This policy will require an application specific reference group. It will be
will used as an access control list managed by the Finanance Manager.

1. Create a `app:congos:service:ref:finance_report_writer` group.
1. Create reference group `app:congos:service:ref:finance_report_writer`.
2. Add `finance_report_writer` to `cg_fin_report_write_allow`.

.. figure:: ../figures/201-fin-report-writer.png
@@ -114,10 +117,10 @@ Exercise 201.5.4 Add attestation for finance_report_writer
ABAC policy groups are kept in sync automatically as subject attributes change
in the underlying business systems. Access control lists, on the otherhand,
tend to drift as soon as they are created. Grouper provides an attestation
feature that reminds group managers and owners to review group memberships and
feature that reminds group managers and owners to review group memberships, and
keeps an audit of attestation actions.

#. Add attestation requirement for `advancement_report_writer`.
#. Add attestation requirement for `finance_report_writer`.
(finance_report_writer -> More actions -> Attestation ->
Attestation actions -> Edit attestation settings)

@@ -137,6 +140,6 @@ keeps an audit of attestation actions.
Congrats! Your Congos access policy is clear, consistent, automated,
delegated, auditable, and attestable!

Welcome to Grouper Guru Level 7! :)
Welcome to Grouper Guru Level 2! :)

.. _Grouper Deployment Guide: https://spaces.at.internet2.edu/display/Grouper/Grouper+Deployment+Guide+Work+-TIER+Program
2 changes: 1 addition & 1 deletion docs/401/401.4-example-solution.rst
@@ -23,4 +23,4 @@ scholars reference group.

.. figure:: ../figures/401-lms-solution.png

Congrats! You are now a certified Grouper Guru associate level 1!
Congrats! You are now a certified Grouper Guru level 4!
Binary file modified docs/figures/201-jsmith-trace.png
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/figures/201-students-change-of-status.png
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/figures/201-vpn-access.png
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/figures/201-vpn-access2.png
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file removed docs/figures/201-vpn-authorized.png
Binary file not shown.
Binary file removed docs/figures/201-vpn-authorized2.png
Binary file not shown.
Binary file removed docs/figures/201-vpn-composite.png
Binary file not shown.
Binary file removed docs/figures/201-wiki-security.png
Binary file not shown.
63 changes: 63 additions & 0 deletions ex201/ex201.1.1/container_files/seed-data/bootstrap.gsh
@@ -182,3 +182,66 @@ attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouper
addMember("basis:student:loa_4_years","jprice704");
addMember("basis:student:loa_4_years","aprice705");
addMember("basis:student:loa_4_years","aclark706");

// setup for 201.2
// should be a loader job?
addStem("ref", "employee", "employee")
fac_staff = addGroup("ref:employee", "fac_staff", "fac_staff")

// Set ref object type on fac_staff reference group
AttributeDefName typeMarker = AttributeDefNameFinder.findByName("etc:objectTypes:grouperObjectTypeMarker", true);
AttributeAssign attributeAssign = fac_staff.getAttributeDelegate().hasAttribute(typeMarker) ? fac_staff.getAttributeDelegate().retrieveAssignments(typeMarker).iterator().next() : fac_staff.getAttributeDelegate().addAttribute(typeMarker).getAttributeAssign();
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeDirectAssignment", "true");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeName", "ref");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeDataOwner",
"HR and Provost Office");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeMembersDescription",
"All faculty and staff");

addStem("ref", "security", "security")
locked_by_ciso = addGroup("ref:security", "locked_by_ciso", "locked_by_ciso")
AttributeAssign attributeAssign = locked_by_ciso.getAttributeDelegate().hasAttribute(typeMarker) ? locked_by_ciso.getAttributeDelegate().retrieveAssignments(typeMarker).iterator().next() : locked_by_ciso.getAttributeDelegate().addAttribute(typeMarker).getAttributeAssign();
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeDirectAssignment", "true");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeName", "ref");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeDataOwner",
"CISO");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeMembersDescription",
"Subjects denied access by CISO");

addStem("ref", "iam", "iam")
closure = addGroup("ref:iam", "closure", "closure")
AttributeAssign attributeAssign = closure.getAttributeDelegate().hasAttribute(typeMarker) ? closure.getAttributeDelegate().retrieveAssignments(typeMarker).iterator().next() : closure.getAttributeDelegate().addAttribute(typeMarker).getAttributeAssign();
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeDirectAssignment", "true");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeName", "ref");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeDataOwner",
"IAM");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeMembersDescription",
"Accounts in the process of being closed");

addStem("org", "irb", "irb")
addStem("org:irb", "ref", "ref")
irb_members = addGroup("org:irb:ref", "irb_members", "irb_members")
AttributeAssign attributeAssign = irb_members.getAttributeDelegate().hasAttribute(typeMarker) ? irb_members.getAttributeDelegate().retrieveAssignments(typeMarker).iterator().next() : irb_members.getAttributeDelegate().addAttribute(typeMarker).getAttributeAssign();
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeDirectAssignment", "true");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeName", "ref");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeDataOwner",
"Institutional Review Board");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeMembersDescription",
"Members of the IRB");

// setup for 201.4
global_deny = addGroup("ref:iam", "global_deny", "global_deny");
AttributeDefName typeMarker = AttributeDefNameFinder.findByName("etc:objectTypes:grouperObjectTypeMarker", true);
AttributeAssign attributeAssign = global_deny.getAttributeDelegate().hasAttribute(typeMarker) ? global_deny.getAttributeDelegate().retrieveAssignments(typeMarker).iterator().next() : global_deny.getAttributeDelegate().addAttribute(typeMarker).getAttributeAssign();
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeDirectAssignment", "true");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeName", "ref");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeDataOwner",
"Identity and Access Management");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeMembersDescription",
"Global deny group");

// setup for 201.5
// should be a loader job?
addStem("ref", "dept", "dept")
addGroup("ref:dept", "finance", "finance")
addMember("ref:dept:finance", "asmith989")
1 change: 0 additions & 1 deletion ex201/ex201.1.1/container_files/seed-data/sisData.sql
@@ -3324,7 +3324,6 @@ INSERT INTO SIS_COURSES (termId, courseId, studentId) VALUES ('201810','ACCT101'
INSERT INTO SIS_COURSES (termId, courseId, studentId) VALUES ('201810','ENGL101','80000902');
INSERT INTO SIS_COURSES (termId, courseId, studentId) VALUES ('201810','MATH100','80000902');
INSERT INTO SIS_COURSES (termId, courseId, studentId) VALUES ('201810','HIST101','80000902');
INSERT INTO SIS_STUDENT_TERMS (id, term) VALUES ('80000902','2019');
INSERT INTO SIS_STUDENT_TERMS (id, term) VALUES ('80000902','2022');
INSERT INTO HR_PEOPLE(id, surname, givenName) VALUES ('80000903','Gasper','Mark');
INSERT INTO HR_PEOPLE_ROLES(id, role) VALUES ('80000903','staff');
46 changes: 0 additions & 46 deletions ex201/ex201.2.1/container_files/seed-data/bootstrap.gsh
@@ -1,49 +1,3 @@
GrouperSession.startRootSession()
delStem("201.1.end")
addRootStem("201.2.1", "201.2.1")

// should be a loader job?
addStem("ref", "employee", "employee")
fac_staff = addGroup("ref:employee", "fac_staff", "fac_staff")

// Set ref object type on fac_staff reference group
AttributeDefName typeMarker = AttributeDefNameFinder.findByName("etc:objectTypes:grouperObjectTypeMarker", true);
AttributeAssign attributeAssign = fac_staff.getAttributeDelegate().hasAttribute(typeMarker) ? fac_staff.getAttributeDelegate().retrieveAssignments(typeMarker).iterator().next() : fac_staff.getAttributeDelegate().addAttribute(typeMarker).getAttributeAssign();
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeDirectAssignment", "true");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeName", "ref");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeDataOwner",
"HR and Provost Office");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeMembersDescription",
"All faculty and staff");

addStem("ref", "security", "security")
locked_by_ciso = addGroup("ref:security", "locked_by_ciso", "locked_by_ciso")
AttributeAssign attributeAssign = locked_by_ciso.getAttributeDelegate().hasAttribute(typeMarker) ? locked_by_ciso.getAttributeDelegate().retrieveAssignments(typeMarker).iterator().next() : locked_by_ciso.getAttributeDelegate().addAttribute(typeMarker).getAttributeAssign();
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeDirectAssignment", "true");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeName", "ref");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeDataOwner",
"CISO");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeMembersDescription",
"Subjects denied access by CISO");

addStem("ref", "iam", "iam")
closure = addGroup("ref:iam", "closure", "closure")
AttributeAssign attributeAssign = closure.getAttributeDelegate().hasAttribute(typeMarker) ? closure.getAttributeDelegate().retrieveAssignments(typeMarker).iterator().next() : closure.getAttributeDelegate().addAttribute(typeMarker).getAttributeAssign();
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeDirectAssignment", "true");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeName", "ref");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeDataOwner",
"IAM");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeMembersDescription",
"Accounts in the process of being closed");

addStem("org", "irb", "irb")
addStem("org:irb", "ref", "ref")
irb_members = addGroup("org:irb:ref", "irb_members", "irb_members")
AttributeAssign attributeAssign = irb_members.getAttributeDelegate().hasAttribute(typeMarker) ? irb_members.getAttributeDelegate().retrieveAssignments(typeMarker).iterator().next() : irb_members.getAttributeDelegate().addAttribute(typeMarker).getAttributeAssign();
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeDirectAssignment", "true");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeName", "ref");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeDataOwner",
"Institutional Review Board");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeMembersDescription",
"Members of the IRB");

8 changes: 6 additions & 2 deletions ex201/ex201.2.end/container_files/seed-data/bootstrap.gsh
@@ -9,16 +9,20 @@ addStem("app:vpn:service", "policy", "policy")
addStem("app:vpn:service", "ref", "ref")
addStem("app:vpn:service", "attributes", "attributes")

addGroup("app:vpn:service:policy", "vpn_authorized", "vpn_authorized")
addGroup("app:vpn:service:policy", "vpn_access", "vpn_access")
addGroup("app:vpn:service:policy", "vpn_allow", "vpn_allow")
addGroup("app:vpn:service:policy", "vpn_deny", "vpn_deny")
addComposite("app:vpn:service:policy:vpn_authorized", CompositeType.COMPLEMENT, "app:vpn:service:policy:vpn_allow", "app:vpn:service:policy:vpn_deny")
addComposite("app:vpn:service:policy:vpn_access", CompositeType.COMPLEMENT, "app:vpn:service:policy:vpn_allow", "app:vpn:service:policy:vpn_deny")

addGroup("app:vpn:security", "vpnAdmins", "vpnAdmins")
addGroup("app:vpn:security", "vpnReaders", "vpnReaders")
addGroup("app:vpn:security", "vpnUpdaters", "vpnUpdaters")
grantPriv("app:vpn", "app:vpn:security:vpnAdmins", NamingPrivilege.STEM)

grantPriv("app:vpn:service:policy:vpn_allow", "app:vpn:security:vpnAdmins", AccessPrivilege.ADMIN)
grantPriv("app:vpn:service:policy:vpn_allow", "app:vpn:security:vpnUpdaters", AccessPrivilege.UPDATE)
grantPriv("app:vpn:service:policy:vpn_allow", "app:vpn:security:vpnReaders", AccessPrivilege.READ)

//ex 201.2.2
addMember("app:vpn:service:policy:vpn_allow", "ref:employee:fac_staff")
addMember("app:vpn:service:policy:vpn_deny", "ref:security:locked_by_ciso")
10 changes: 0 additions & 10 deletions ex201/ex201.4.1/container_files/seed-data/bootstrap.gsh
@@ -1,13 +1,3 @@
gs = GrouperSession.startRootSession()
delStem("201.3.end")
addRootStem("201.4.1", "201.4.1")

global_deny = addGroup("ref:iam", "global_deny", "global_deny");
AttributeDefName typeMarker = AttributeDefNameFinder.findByName("etc:objectTypes:grouperObjectTypeMarker", true);
AttributeAssign attributeAssign = global_deny.getAttributeDelegate().hasAttribute(typeMarker) ? global_deny.getAttributeDelegate().retrieveAssignments(typeMarker).iterator().next() : global_deny.getAttributeDelegate().addAttribute(typeMarker).getAttributeAssign();
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeDirectAssignment", "true");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeName", "ref");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeDataOwner",
"Identity and Access Management");
attributeAssign.getAttributeValueDelegate().assignValue("etc:objectTypes:grouperObjectTypeMembersDescription",
"Global deny group");
6 changes: 0 additions & 6 deletions ex201/ex201.5.1/container_files/seed-data/bootstrap.gsh
@@ -1,9 +1,3 @@
GrouperSession.startRootSession()
delStem("201.4.end")
addRootStem("201.5.1", "201.5.1")

// should be a loader job?
addStem("ref", "dept", "dept")
addGroup("ref:dept", "finance", "finance")
addMember("ref:dept:finance", "asmith989")

9 changes: 9 additions & 0 deletions gte-gsh
@@ -0,0 +1,9 @@
#! /bin/bash

if [ -z "$1" ]
then
docker ps --format "{{.Names}} {{.Image}} {{.Status}}"
exit 0
fi

docker exec -it "$1" /opt/grouper/grouper.apiBinary/bin/gsh 2> /dev/null
9 changes: 9 additions & 0 deletions gte-shell
@@ -0,0 +1,9 @@
#! /bin/bash

if [ -z "$1" ]
then
docker ps --format "{{.Names}} {{.Image}} {{.Status}}"
exit 0
fi

docker exec -it "$1" /bin/bash 2> /dev/null