alvinalexander.com | career | drupal | java | mac | mysql | perl | scala | uml | unix  

Glassfish example source code file (LogStrings.properties)

This example Glassfish source code file (LogStrings.properties) is included in the DevDaily.com "Java Source Code Warehouse" project. The intent of this project is to help you "Learn Java by Example" TM.

Java - Glassfish tags/keywords

configuration, error, error, exception, exception, gpl, license, license, policy, provider, security, security, securitycontext, will

The Glassfish LogStrings.properties source code

#
# DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
#
# Copyright (c) 2004-2011 Oracle and/or its affiliates. All rights reserved.
#
# The contents of this file are subject to the terms of either the GNU
# General Public License Version 2 only ("GPL") or the Common Development
# and Distribution License("CDDL") (collectively, the "License").  You
# may not use this file except in compliance with the License.  You can
# obtain a copy of the License at
# https://glassfish.dev.java.net/public/CDDL+GPL_1_1.html
# or packager/legal/LICENSE.txt.  See the License for the specific
# language governing permissions and limitations under the License.
#
# When distributing the software, include this License Header Notice in each
# file and include the License file at packager/legal/LICENSE.txt.
#
# GPL Classpath Exception:
# Oracle designates this particular file as subject to the "Classpath"
# exception as provided by Oracle in the GPL Version 2 section of the License
# file that accompanied this code.
#
# Modifications:
# If applicable, add the following below the License Header, with the fields
# enclosed by brackets [] replaced by your own identifying information:
# "Portions Copyright [year] [name of copyright owner]"
#
# Contributor(s):
# If you wish your version of this file to be governed by only the CDDL or
# only the GPL Version 2, indicate your decision by adding "[Contributor]
# elects to include this software in this distribution under the [CDDL or GPL
# Version 2] license."  If you don't indicate a single choice of license, a
# recipient has the option to distribute your version of this file under
# either the CDDL, the GPL Version 2 or to extend the choice of license to
# its licensees as provided above.  However, if you add GPL Version 2 code
# and therefore, elected the GPL Version 2 license, then the option applies
# only if the new code is made subject to such option by the copyright
# holder.
#


# Common iAS security messages.
security.exception=SEC1000: Caught exception.
security.secmgron=SEC1001: Security Manager is ON.
security.secmgroff=SEC1002: Security Manager is OFF.
security.secmgr.could.not.override=SEC1003: Could not override SecurityManager.

#Security Service messages
sec.service.startup.enter=SEC1010: Entering Security Startup Service
sec.service.startup.exit=SEC1011: Security Service(s) Started Successfully

# General login processing messages: start 1050
certlogin.badrealm=SEC1050: Certificate authentication requires certificate realm. Check server configuration.


# Realms and Login Modules: start at 1100

realmconfig.disable=SEC1100: Disabled realm [{0}] due to errors.
realmconfig.nogood=SEC1101: No realms available. Authentication services disabled.
realmconfig.noctx=SEC1102: Incomplete configuration, login module not specified.
iasrealm.noauth=SEC1103: No AuthenticationHandler available for this realm.
passwordlm.nocreds=SEC1104: Error while obtaining private subject credentials.
passwordlm.nopwdcred=SEC1105: A PasswordCredential was required but not provided.
ldaprealm.searcherror=SEC1106: Error during LDAP search with filter [{0}].
filerealm.readerror=SEC1109: Error reading file realm data.
certrealm.nojaas=SEC1110: JAAS context requested from certificate realm. Configuration error is likely.
jdbcrealm.grouperror=SEC1111: Cannot load group for JDBC realm user [{0}].
jdbcrealm.invaliduser=SEC1112: Cannot validate user [{0}] for JDBC realm.
ldaprealm.exception=SEC1113: Exception in LdapRealm when trying to authenticate user.
ldaprealm.groupsearcherror=SEC1114: Exception in LdapRealm when trying to locate groups for user.
realm.loaded.successfully=SEC1115: Realm [{0}] of classtype [{1}] successfully created.
cannot.locate.realm.class=SEC1116: Unable to locate Realm class [{0}]
realm.updated.successfully=SEC1117: Realm [{0}] successfully updated.
ldaprealm.pwd.dealiasing.failed=SEC1118: Error while de-aliasing the aliased password

# Audit: start at 1120
audit.badinit=SEC1120: Error reading audit configuration.
audit.enabled=SEC1122: Audit enabled.
audit.string_private_audit=SEC1123: Audit: principal=
# Note- these are partial strings, no message code.
audit.denied= DENIED
audit.ok= OK
audit.methodname= method=
audit.session= session=

# Programmatic Login: start at 1130
proglogin.noperm=SEC1130: Code does not have permission to invoke programmatic login mechanism.
prologout.noperm=SEC1131: Code does not have permission to invoke programmatic logout mechanism.
prologin.web.badclass=SEC1132: Bad runtime object type. Programmatic login failed.
prologin.web.badcall=SEC1133: Application does not have permission to call web programmatic login.

# JACC and policy: start at 1140
policy.propoverride=SEC1140: Policy provider configuration overridden by property {0} with value {1}
policy.nosuchname=SEC1141: Requested jacc-provider [{0}] is not configured in domain.xml.
policy.errorreading=SEC1142: Error while reading policy-provider in domain.xml.
policy.loading=SEC1143: Loading policy provider {0}.
policy.installerror=SEC1144: Error while installing policy provider: 
policy.notloading=SEC1145: No policy provider defined. Will use the default JDK Policy implementation.
policy.factoryoverride=SEC1146: Policy configuration factory overridden by property {0} with value {1}
policy.nofactory=SEC1147: Policy configuration factory not defined.
policy.configure=SEC1148: Cannot load policy file for Application.
# JMAC: start at 1200 : The JASPIC Provider Framework has some of these, need to cleanup
jmac.unexpandedproperty=SEC1200: Unable to expand provider property value, unexpanded value passed to provider.
jmac.loginfail=SEC1201: Login failed for user: {0}
jmac.unsupportreadprinciple=SEC1202: No support to read Principals in SecretKeyCallback.
jmac.factory_unable_to_load_provider=SEC1203: GFAuthConfigFactory unable to load Provider: {0}, reason: {1}
jmac.factory_auth_config_loader_failure=SEC1204: GFAuthConfigFactory loader failure.
jmac.factory_cannot_write_file=SEC1205: Cannot write to file {0}. Updated provider list will not be persisted.
jmac.factory_could_not_persist=SEC1206: Could not persist updated provider list due to {0},  Will use default providers when reloaded.
jmac.factory_could_not_read=SEC1207: Could not read auth configuration file due to {0} Will use default providers.
jmac.factory_file_not_found=SEC1208: Configuration file does not exist at {0}. Will use default providers.
jmac.provider_unable_load_authmodule=SEC1209: GFAuthConfigProvider is unable to load AuthModule: {0}, reason: {1}

# WS Security: start at 2000
ws.process_request=SEC2000: Container-auth: ServletSystemHandlerDelegate: processRequest.
ws.process_response=SEC2001: Container-auth: ServletSystemHandlerDelegate: processResponse.
ws.error_validate_request=SEC2002: Container-auth: wss: Error validating request 
ws.error_secure_response=SEC2003: Container-auth: wss: Error securing response 
ws.error_secure_request=SEC2004: Container-auth: wss: Error securing request
ws.error_validate_response=SEC2005: Container-auth: wss: Error validating response
ws.error_not_soap=SEC2006: Container-auth: wss: Not a SOAP message context.

# Existing RI: start at 5001
java_security.unknown_credential=SEC5019:ERROR: Unknown credential provided. Class: [{0}]
java_security.anonymous_role_reading_exception=SEC5022: Error reading anonymous role.
java_security.retrieving_group_membership_exception=SEC5023: Exception retrieving group membership for [{0}] 
java_security.credential_exception=SEC5024: Exception getting security credential 
java_security.gen_security_context=SEC5026: Exception generating security context 
java_security.KeyStore_load_exception=SEC5028: Exception loading keystore
java_security.KeyStore_store_exception=SEC5029: Exception storing keystore
java_security.provider_exception=SEC5030: Exception loading security provider
java_security.getName_exception=SEC5031: Exception getting security provider name 
java_security.main_exception=SEC5032: Security main exception
java_security.create_realms_exception=SEC5034: Exception creating security realm
java_security.realm_manager_exception=SEC5035: Exception in security realm manager
java_security.security_context_exception=SEC5036: Exception in getting security context
java_security.principal_configuration_exception=SEC5037: Exception configuring security principal
java_security.default_user_login_Exception=SEC5038: Default user login exception.
java_security.name_password_entry_exception=SEC5039: Exception entering name and password for security
java_security.initkeystore_exception=SEC5040: Exception initing keystore 
java_security.realm_initialization_exception=SEC5041: Exception initializing security realm
java_security.realm_instantiation_exception=SEC5042: Exception instantiating security realm
java_security.accesscontroller_action_exception=SEC5043: Exception in security accesscontroller action
java_security.login_exception=SEC5044:Security login exception
java_security.audit_auth_refused=SEC5046: Audit: Authentication refused for [{0}].
java_security.audit_auth_accepted=SEC5047: Audit: Authentication granted for [{0}].
java_security.security_context_permission_exception=SEC5048: doAsPrivileged AuthPermission required to set SecurityContext.
java_security.security_context_unexpected_exception=SEC5049: Unexpected exception while attempting to set SecurityContext.
java_security.security_context_nochange=SEC5050: Current Context unchanged.
java_security.setRemoteHost_exception=SEC5051: Cannot setRemoteHost.
java_security.null_subject=SEC5052: null Subject used in SecurityContext construction.
java_security.bsm_audit_failure=SEC5053: BSM audit failure on {0}: {1}.
java_security.role_mapping_conflict=SEC5055: Role mapping conflicts found in application {0}. Some roles may not be mapped.

java_security.acl_nonegative=SEC5100: A negative access control entry presented for role {0} will be ignored.
java_security.init_securitylifecycle_fail=SEC5101: Fail to instantiate the SecurityLifecycle.


# EE specific: start at 8001
nss.init_SunPKCS11_failed=SEC8001: Exception in initializing SunPKCS11.
nss.rename_alias=SEC8002: Alias {0} in slot {1} has been renamed to {2}.
nss.cantloadcert=SEC8003: Can''t load cert: {0}. 

#ACC specific: start at 9001
main.jmac_default_factory=SEC9001: ACC: Error in initializing JSR 196 Default Factory
acc.secmgron=SEC9002: ACC: Security Manager is ON
acc.secmgroff=SEC9003: ACC: Security Manager is OFF

#programmatic login specific
prog.login.failed=SEC9050: Programmatic login failed
prog.logout.failed=SEC9051: Programmatic logout failed

#ejb.security log messages
iiop.createcontextsec_exception=IIOP1000: Exception creating ASContext
iiop.user_password_exception=IIOP1001: Exception getting username and password
iiop.principal_error=IIOP1002: Principal propagation: Cannot find principal information in subject
iiop.credential_error=IIOP1003: Principal propagation: Cannot find credential information in subject.
iiop.cannot_find_keyalias=IIOP1004: Key alias {0} not found in keystore
iiop.Exception=IIOP1005: An exception has occured in the ejb security initialization.


#Diagnostic messages for security/core

SEC1105.diag.cause.1=PasswordCredential was required, but not supplied.
SEC1105.diag.check.1=Please check if the password is provided
SEC1104.diag.cause.1=Private Credentials of Subject not available
SEC1104.diag.check.1=Please check if the private credentials are available
SEC5028.diag.cause.1=There was an exception while loading keystore
SEC5028.diag.check.1=Please check the if the file path and password are correct
SEC5029.diag.cause.1=There was an exception while storing the keystore
SEC5029.diag.check.1=Please check the if the file path and password are correct
SEC5030.diag.cause.1=There was an exception while loading the security provider
SEC5030.diag.check.1=Please check the if the Provider classname is correct.
SEC5031.diag.cause.1=There was an exception while obtaining the name of the Provider.
SEC5031.diag.check.1=Please check the if the Provider name is correct.
SEC1114.diag.cause.1=There was an exception while installing the Policy Provider.
SEC1114.diag.check.1=Please check the if the Policy Provider is correct
SEC1118.diag.cause.1=There was an exception while de-aliasing the aliased password provided as the ldaprealm property.
SEC1118.diag.check.1=Please check the if the alias and the password configured are correct
SEC1146.diag.cause.1=Policy Configuration Factory overridden
SEC1146.diag.check.1=Please check if the system property javax.security.jacc.PolicyConfigurationFactory.provider has not been set.
SEC1147.diag.cause.1=Policy Configuration Factory not defined
SEC1147.diag.check.1=Please check if the Policy Configuration Factory has been defined.
SEC1145.diag.cause.1=No policy provider defined. Will use the default JDK Policy implementation.
SEC1145.diag.check.1=No policy provider defined. Will use the default JDK Policy implementation.
SEC1142.diag.cause.1=Error while reading policy-provider in domain.xml.
SEC1142.diag.check.1=Please check if the policy provider defined is correct.
SEC1140.diag.cause.1=Policy Provider Configuration Property is overridden by property javax.security.jacc.auth.policy.provider.
SEC1140.diag.check.1=Policy Provider Configuration Property is overridden by property javax.security.jacc.auth.policy.provider.
SEC1141.diag.cause.1=JaccProvider class not found for name defined.
SEC1141.diag.check.1=Please check if the name of the Jacc provider is defined correctly.
SEC5038.diag.cause.1=There was an exception while authenticating the default caller principal
SEC5038.diag.check.1=There was an exception while authenticating the default caller principal
SEC5036.diag.cause.1=There was an exception obtaining the default security context.
SEC5036.diag.check.1=There was an exception obtaining the default security context.
SEC5048.diag.cause.1=AuthPermission required to set SecurityContext,
SEC5048.diag.check.1=AuthPermission required to set SecurityContext,
SEC5049.diag.cause.1=There was an unexpected exception while setting the security context
SEC5049.diag.check.1=There was an unexpected exception while setting the security context
SEC5051.diag.cause.1=null Subject used in SecurityContext construction.
SEC5051.diag.check.1=null Subject used in SecurityContext construction.
SEC5039.diag.cause.1=An exception occurred while processing username and password for security
SEC5039.diag.check.1=An exception occurred while processing username and password for security
SEC5055.diag.cause.1=Principal-Group-Role Mapping conflicts in the application
SEC5055.diag.check.1=Please check if the roles have been mapped to the same principals/groups consistently in all the descriptors.
SEC1103.diag.cause.1=The Realm configured is not an instance of CertificateRealm, Certificate authentication requires certificate realm. 
SEC1103.diag.check.1=Please check if the realm class is an instance of CertificateRealm
SEC1112.diag.cause.1=Cannot obtain the password for the user provided.
SEC1112.diag.check.1=Please check the JDBC configuration, encoding algorithm and the password for the user.
SEC1111.diag.cause.1=Exception while obtaining groups for the users.
SEC1111.diag.check.1=Please check the JDBC configuration, encoding algorithm and the groups for the user.
SEC5043.diag.cause.1=Exception while extracting username and realm from the subject post login
SEC5043.diag.check.1=Exception while extracting username and realm from the subject post login
SEC1130.diag.cause.1=Code does not have permission to invoke programmatic login mechanism.
SEC1130.diag.check.1=Code does not have permission to invoke programmatic login mechanism.
SEC1103.diag.cause.1=No AuthenticationHandler available for this realm.
SEC1103.diag.check.1=Check of the Realm has been configured correctly. This is the base class method that has to be overridden
SEC1110.diag.cause.1=JAAS context requested from certificate realm. 
SEC1110.diag.check.1=Certificate Realm does not have a JAAS context. Please check the configuration
SEC1109.diag.cause.1=Error reading keyfile of filerealm
SEC1109.diag.check.1=Please check if the keyfile for the filerealm is configured correctly and is in place.
SEC1000.diag.cause.1=A Security Exception has been  thrown
SEC1000.diag.check.1=A Security Exception has been  thrown
SEC1106.diag.cause.1=Error during LDAP search
SEC1106.diag.check.1=Please check the LDAP configuration
SEC1102.diag.cause.1=Error during SolarisRealm initialization. LoginModule not specified
SEC1102.diag.check.1=Please provide the jaas-context in the SolarisRealm configuration
SEC1203.diag.cause.1=Error while loading ConfigProvider.
SEC1203.diag.check.1=Please check if the configprovider has been configured correctly.
SEC1204.diag.cause.1=Error while loading the persisted entries of GFAuthConfigFactory
SEC1204.diag.check.1=Error while loading the persisted entries of GFAuthConfigFactory
SEC1207.diag.cause.1=Could not read auth configuration file. The default provider will be used.
SEC1207.diag.check.1=Could not read auth configuration file. The default provider will be used.
SEC1206.diag.cause.1=Could not persist updated provider list due to {0}. Will use default providers when reloaded.
SEC1206.diag.check.1=Could not persist updated provider list due to {0}. Will use default providers when reloaded.
SEC1205.diag.cause.1=Cannot write to file. Updated provider list will not be persisted.
SEC1205.diag.check.1=Cannot write to file. Updated provider list will not be persisted.
SEC1003.diag.cause.1=Could not override SecurityManager.
SEC1003.diag.check.1=Could not override SecurityManager.
SEC9001.diag.cause.1=GFAuthConfigFactory not in classpath or not enough permissions to call Security.setProperty
SEC9001.diag.check.1=Please check if appclient classpath has GFAuthConfigFactory class and ensure required permissions are given.
SEC1114.diag.cause.1=Invalid user or improper LDAPRealm configuration
SEC1114.diag.check.1=Check the LDAPRealm Configuration in GlassFish.

SEC9050.diag.cause=Check the exception stack-trace for more details
SEC9050.diag.check=Check if the credential username/password/certificate was a valid one
SEC9051.diag.cause=Check the exception stack-trace for more details
SEC9051.diag.check=Check the exception stack-trace, could be an internal server error or a bug.


#ejb.security Diagnostic messages

IIOP1000.diag.cause.1=An error occured while creating the ASContext or SASContext
IIOP1000.diag.check.1=Please check the values provided in the descriptor for the IOR security config
IIOP1001.diag.cause.1=An exception occured while obtaining the username and password
IIOP1001.diag.check.1=Please check the username and password provided
IIOP1002.diag.cause.1=The principal information is not found in the subject
IIOP1002.diag.check.1=Please check the config settings for identity propagation
IIOP1003.diag.cause.1=Credential information is not found in the subject
IIOP1003.diag.check.1=Please check the config settings for identity propogation
IIOP1004.diag.cause.1=Alias key is not found in the keystore
IIOP1004.diag.check.1=Please check the if the name of the alias is right and of the keystore contains the key of the alias
IIOP1005.diag.cause.1=An Exception has occured in the ejb security initialization
IIOP1005.diag.check.1=Please check the if the IOR security configuration of the ejb is correct


Other Glassfish examples (source code examples)

Here is a short list of links related to this Glassfish LogStrings.properties source code file:

... this post is sponsored by my books ...

#1 New Release!

FP Best Seller

 

new blog posts

 

Copyright 1998-2021 Alvin Alexander, alvinalexander.com
All Rights Reserved.

A percentage of advertising revenue from
pages under the /java/jwarehouse URI on this website is
paid back to open source projects.