@@ -215,9 +215,9 @@ public static ResourceDomainOwnership verifyDomainMetaResourceOwnership(Domain d
215
215
// if the object has no meta owner then we need to set it
216
216
requestOwnership .setObjectOwner (resourceOwnership .getObjectOwner ());
217
217
return requestOwnership ;
218
- } else if (!resourceOwner .equalsIgnoreCase (metaOwner )) {
218
+ } else if (!resourceOwnerWithoutForceSuffix .equalsIgnoreCase (metaOwner )) {
219
219
throw Utils .conflictError ("Invalid resource owner for domain: " + domain .getName ()
220
- + ", " + metaOwner + " vs. " + resourceOwner , caller );
220
+ + ", " + metaOwner + " vs. " + resourceOwnerWithoutForceSuffix , caller );
221
221
} else {
222
222
// no changes needed
223
223
return null ;
@@ -261,23 +261,23 @@ public static ResourceRoleOwnership verifyRoleResourceOwnership(Role role, boole
261
261
boolean bUpdateRequired = false ;
262
262
if (resourceOwnership .getObjectOwner () == null || isResourceOwnershipOverrideAllowed (resourceOwner , resourceOwnership .getObjectOwner ())) {
263
263
bUpdateRequired = true ;
264
- } else if (ownershipCheckFailure (bOwnerSpecified , resourceOwner , resourceOwnership .getObjectOwner ())) {
264
+ } else if (ownershipCheckFailure (bOwnerSpecified , resourceOwnerWithoutForceSuffix , resourceOwnership .getObjectOwner ())) {
265
265
throw Utils .conflictError ("Invalid resource owner for role: " + role .getName ()
266
- + ", " + resourceOwnership .getObjectOwner () + " vs. " + resourceOwner , caller );
266
+ + ", " + resourceOwnership .getObjectOwner () + " vs. " + resourceOwnerWithoutForceSuffix , caller );
267
267
}
268
268
269
269
if (resourceOwnership .getMembersOwner () == null || isResourceOwnershipOverrideAllowed (resourceOwner , resourceOwnership .getMembersOwner ())) {
270
270
bUpdateRequired = true ;
271
- } else if (ownershipCheckFailure (bOwnerSpecified , resourceOwner , resourceOwnership .getMembersOwner ())) {
271
+ } else if (ownershipCheckFailure (bOwnerSpecified , resourceOwnerWithoutForceSuffix , resourceOwnership .getMembersOwner ())) {
272
272
throw Utils .conflictError ("Invalid members owner for role: " + role .getName ()
273
- + ", " + resourceOwnership .getMembersOwner () + " vs. " + resourceOwner , caller );
273
+ + ", " + resourceOwnership .getMembersOwner () + " vs. " + resourceOwnerWithoutForceSuffix , caller );
274
274
}
275
275
276
276
if (resourceOwnership .getMetaOwner () == null || isResourceOwnershipOverrideAllowed (resourceOwner , resourceOwnership .getMetaOwner ())) {
277
277
bUpdateRequired = true ;
278
- } else if (ownershipCheckFailure (bOwnerSpecified , resourceOwner , resourceOwnership .getMetaOwner ())) {
278
+ } else if (ownershipCheckFailure (bOwnerSpecified , resourceOwnerWithoutForceSuffix , resourceOwnership .getMetaOwner ())) {
279
279
throw Utils .conflictError ("Invalid meta owner for role: " + role .getName ()
280
- + ", " + resourceOwnership .getMetaOwner () + " vs. " + resourceOwner , caller );
280
+ + ", " + resourceOwnership .getMetaOwner () + " vs. " + resourceOwnerWithoutForceSuffix , caller );
281
281
}
282
282
283
283
return bUpdateRequired ? requestOwnership : null ;
@@ -344,9 +344,9 @@ public static ResourceRoleOwnership verifyRoleMetaResourceOwnership(Role role, f
344
344
requestOwnership .setObjectOwner (resourceOwnership .getObjectOwner ());
345
345
requestOwnership .setMembersOwner (resourceOwnership .getMembersOwner ());
346
346
return requestOwnership ;
347
- } else if (!resourceOwner .equalsIgnoreCase (metaOwner )) {
347
+ } else if (!resourceOwnerWithoutForceSuffix .equalsIgnoreCase (metaOwner )) {
348
348
throw Utils .conflictError ("Invalid resource meta owner for role: " + role .getName ()
349
- + ", " + metaOwner + " vs. " + resourceOwner , caller );
349
+ + ", " + metaOwner + " vs. " + resourceOwnerWithoutForceSuffix , caller );
350
350
} else {
351
351
// no changes needed
352
352
return null ;
@@ -389,9 +389,9 @@ public static ResourceRoleOwnership verifyRoleMembersResourceOwnership(Role role
389
389
requestOwnership .setObjectOwner (resourceOwnership .getObjectOwner ());
390
390
requestOwnership .setMetaOwner (resourceOwnership .getMetaOwner ());
391
391
return requestOwnership ;
392
- } else if (!resourceOwner .equalsIgnoreCase (membersOwner )) {
392
+ } else if (!resourceOwnerWithoutForceSuffix .equalsIgnoreCase (membersOwner )) {
393
393
throw Utils .conflictError ("Invalid resource member owner for role: " + role .getName ()
394
- + ", " + membersOwner + " vs. " + resourceOwner , caller );
394
+ + ", " + membersOwner + " vs. " + resourceOwnerWithoutForceSuffix , caller );
395
395
} else {
396
396
// no changes needed
397
397
return null ;
@@ -434,23 +434,23 @@ public static ResourceGroupOwnership verifyGroupResourceOwnership(Group group, b
434
434
boolean bUpdateRequired = false ;
435
435
if (resourceOwnership .getObjectOwner () == null || isResourceOwnershipOverrideAllowed (resourceOwner , resourceOwnership .getObjectOwner ())) {
436
436
bUpdateRequired = true ;
437
- } else if (ownershipCheckFailure (bOwnerSpecified , resourceOwner , resourceOwnership .getObjectOwner ())) {
437
+ } else if (ownershipCheckFailure (bOwnerSpecified , resourceOwnerWithoutForceSuffix , resourceOwnership .getObjectOwner ())) {
438
438
throw Utils .conflictError ("Invalid resource owner for group: " + group .getName ()
439
439
+ ", " + resourceOwnership .getObjectOwner () + " vs. " + resourceOwner , caller );
440
440
}
441
441
442
442
if (resourceOwnership .getMembersOwner () == null || isResourceOwnershipOverrideAllowed (resourceOwner , resourceOwnership .getMembersOwner ())) {
443
443
bUpdateRequired = true ;
444
- } else if (ownershipCheckFailure (bOwnerSpecified , resourceOwner , resourceOwnership .getMembersOwner ())) {
444
+ } else if (ownershipCheckFailure (bOwnerSpecified , resourceOwnerWithoutForceSuffix , resourceOwnership .getMembersOwner ())) {
445
445
throw Utils .conflictError ("Invalid members owner for group: " + group .getName ()
446
446
+ ", " + resourceOwnership .getMembersOwner () + " vs. " + resourceOwner , caller );
447
447
}
448
448
449
449
if (resourceOwnership .getMetaOwner () == null || isResourceOwnershipOverrideAllowed (resourceOwner , resourceOwnership .getMetaOwner ())) {
450
450
bUpdateRequired = true ;
451
- } else if (ownershipCheckFailure (bOwnerSpecified , resourceOwner , resourceOwnership .getMetaOwner ())) {
451
+ } else if (ownershipCheckFailure (bOwnerSpecified , resourceOwnerWithoutForceSuffix , resourceOwnership .getMetaOwner ())) {
452
452
throw Utils .conflictError ("Invalid meta owner for group: " + group .getName ()
453
- + ", " + resourceOwnership .getMetaOwner () + " vs. " + resourceOwner , caller );
453
+ + ", " + resourceOwnership .getMetaOwner () + " vs. " + resourceOwnerWithoutForceSuffix , caller );
454
454
}
455
455
456
456
return bUpdateRequired ? requestOwnership : null ;
@@ -508,9 +508,9 @@ public static ResourceGroupOwnership verifyGroupMetaResourceOwnership(Group grou
508
508
requestOwnership .setObjectOwner (resourceOwnership .getObjectOwner ());
509
509
requestOwnership .setMembersOwner (resourceOwnership .getMembersOwner ());
510
510
return requestOwnership ;
511
- } else if (!resourceOwner .equalsIgnoreCase (metaOwner )) {
511
+ } else if (!resourceOwnerWithoutForceSuffix .equalsIgnoreCase (metaOwner )) {
512
512
throw Utils .conflictError ("Invalid resource meta owner for group: " + group .getName ()
513
- + ", " + metaOwner + " vs. " + resourceOwner , caller );
513
+ + ", " + metaOwner + " vs. " + resourceOwnerWithoutForceSuffix , caller );
514
514
} else {
515
515
// no changes needed
516
516
return null ;
@@ -553,9 +553,9 @@ public static ResourceGroupOwnership verifyGroupMembersResourceOwnership(Group g
553
553
requestOwnership .setObjectOwner (resourceOwnership .getObjectOwner ());
554
554
requestOwnership .setMetaOwner (resourceOwnership .getMetaOwner ());
555
555
return requestOwnership ;
556
- } else if (!resourceOwner .equalsIgnoreCase (membersOwner )) {
556
+ } else if (!resourceOwnerWithoutForceSuffix .equalsIgnoreCase (membersOwner )) {
557
557
throw Utils .conflictError ("Invalid resource member owner for group: " + group .getName ()
558
- + ", " + membersOwner + " vs. " + resourceOwner , caller );
558
+ + ", " + membersOwner + " vs. " + resourceOwnerWithoutForceSuffix , caller );
559
559
} else {
560
560
// no changes needed
561
561
return null ;
@@ -597,16 +597,16 @@ public static ResourcePolicyOwnership verifyPolicyResourceOwnership(Policy polic
597
597
boolean bUpdateRequired = false ;
598
598
if (resourceOwnership .getObjectOwner () == null || isResourceOwnershipOverrideAllowed (resourceOwner , resourceOwnership .getObjectOwner ())) {
599
599
bUpdateRequired = true ;
600
- } else if (ownershipCheckFailure (bOwnerSpecified , resourceOwner , resourceOwnership .getObjectOwner ())) {
600
+ } else if (ownershipCheckFailure (bOwnerSpecified , resourceOwnerWithoutForceSuffix , resourceOwnership .getObjectOwner ())) {
601
601
throw Utils .conflictError ("Invalid resource owner for policy: " + policy .getName ()
602
- + ", " + resourceOwnership .getObjectOwner () + " vs. " + resourceOwner , caller );
602
+ + ", " + resourceOwnership .getObjectOwner () + " vs. " + resourceOwnerWithoutForceSuffix , caller );
603
603
}
604
604
605
605
if (resourceOwnership .getAssertionsOwner () == null || isResourceOwnershipOverrideAllowed (resourceOwner , resourceOwnership .getAssertionsOwner ())) {
606
606
bUpdateRequired = true ;
607
- } else if (ownershipCheckFailure (bOwnerSpecified , resourceOwner , resourceOwnership .getAssertionsOwner ())) {
607
+ } else if (ownershipCheckFailure (bOwnerSpecified , resourceOwnerWithoutForceSuffix , resourceOwnership .getAssertionsOwner ())) {
608
608
throw Utils .conflictError ("Invalid assertions owner for policy: " + policy .getName ()
609
- + ", " + resourceOwnership .getAssertionsOwner () + " vs. " + resourceOwner , caller );
609
+ + ", " + resourceOwnership .getAssertionsOwner () + " vs. " + resourceOwnerWithoutForceSuffix , caller );
610
610
}
611
611
612
612
return bUpdateRequired ? requestOwnership : null ;
@@ -668,9 +668,9 @@ public static ResourcePolicyOwnership verifyPolicyAssertionsResourceOwnership(Po
668
668
// if the object has no assertions owner then we need to set it
669
669
requestOwnership .setObjectOwner (resourceOwnership .getObjectOwner ());
670
670
return requestOwnership ;
671
- } else if (!resourceOwner .equalsIgnoreCase (assertionsOwner )) {
671
+ } else if (!resourceOwnerWithoutForceSuffix .equalsIgnoreCase (assertionsOwner )) {
672
672
throw Utils .conflictError ("Invalid resource member owner for policy: " + policy .getName ()
673
- + ", " + assertionsOwner + " vs. " + resourceOwner , caller );
673
+ + ", " + assertionsOwner + " vs. " + resourceOwnerWithoutForceSuffix , caller );
674
674
} else {
675
675
// no changes needed
676
676
return null ;
@@ -717,21 +717,21 @@ public static ResourceServiceIdentityOwnership verifyServiceResourceOwnership(Se
717
717
boolean bUpdateRequired = false ;
718
718
if (resourceOwnership .getObjectOwner () == null || isResourceOwnershipOverrideAllowed (resourceOwner , resourceOwnership .getObjectOwner ())) {
719
719
bUpdateRequired = true ;
720
- } else if (ownershipCheckFailure (bOwnerSpecified , resourceOwner , resourceOwnership .getObjectOwner ())) {
720
+ } else if (ownershipCheckFailure (bOwnerSpecified , resourceOwnerWithoutForceSuffix , resourceOwnership .getObjectOwner ())) {
721
721
throw Utils .conflictError ("Invalid resource owner for service: " + service .getName ()
722
722
+ ", " + resourceOwnership .getObjectOwner () + " vs. " + resourceOwner , caller );
723
723
}
724
724
725
725
if (resourceOwnership .getPublicKeysOwner () == null || isResourceOwnershipOverrideAllowed (resourceOwner , resourceOwnership .getPublicKeysOwner ())) {
726
726
bUpdateRequired = true ;
727
- } else if (ownershipCheckFailure (bOwnerSpecified , resourceOwner , resourceOwnership .getPublicKeysOwner ())) {
727
+ } else if (ownershipCheckFailure (bOwnerSpecified , resourceOwnerWithoutForceSuffix , resourceOwnership .getPublicKeysOwner ())) {
728
728
throw Utils .conflictError ("Invalid public-keys owner for service: " + service .getName ()
729
729
+ ", " + resourceOwnership .getPublicKeysOwner () + " vs. " + resourceOwner , caller );
730
730
}
731
731
732
732
if (resourceOwnership .getHostsOwner () == null || isResourceOwnershipOverrideAllowed (resourceOwner , resourceOwnership .getHostsOwner ())) {
733
733
bUpdateRequired = true ;
734
- } else if (ownershipCheckFailure (bOwnerSpecified , resourceOwner , resourceOwnership .getHostsOwner ())) {
734
+ } else if (ownershipCheckFailure (bOwnerSpecified , resourceOwnerWithoutForceSuffix , resourceOwnership .getHostsOwner ())) {
735
735
throw Utils .conflictError ("Invalid hosts owner for service: " + service .getName ()
736
736
+ ", " + resourceOwnership .getHostsOwner () + " vs. " + resourceOwner , caller );
737
737
}
@@ -788,9 +788,9 @@ public static ResourceServiceIdentityOwnership verifyServicePublicKeysResourceOw
788
788
requestOwnership .setObjectOwner (resourceOwnership .getObjectOwner ());
789
789
requestOwnership .setHostsOwner (resourceOwnership .getHostsOwner ());
790
790
return requestOwnership ;
791
- } else if (!resourceOwner .equalsIgnoreCase (publicKeysOwner )) {
791
+ } else if (!resourceOwnerWithoutForceSuffix .equalsIgnoreCase (publicKeysOwner )) {
792
792
throw Utils .conflictError ("Invalid resource member owner for service: " + service .getName ()
793
- + ", " + publicKeysOwner + " vs. " + resourceOwner , caller );
793
+ + ", " + publicKeysOwner + " vs. " + resourceOwnerWithoutForceSuffix , caller );
794
794
} else {
795
795
// no changes needed
796
796
return null ;
0 commit comments