Renames all 11 projects (5 src + 6 tests), the .slnx solution file, all source-file namespaces, all axaml namespace references, and all v1 documentation references in CLAUDE.md and docs/*.md (excluding docs/v2/ which is already in OtOpcUa form). Also updates the TopShelf service registration name from "LmxOpcUa" to "OtOpcUa" per Phase 0 Task 0.6.
Preserves runtime identifiers per Phase 0 Out-of-Scope rules to avoid breaking v1/v2 client trust during coexistence: OPC UA `ApplicationUri` defaults (`urn:{GalaxyName}:LmxOpcUa`), server `EndpointPath` (`/LmxOpcUa`), `ServerName` default (feeds cert subject CN), `MxAccessConfiguration.ClientName` default (defensive — stays "LmxOpcUa" for MxAccess audit-trail consistency), client OPC UA identifiers (`ApplicationName = "LmxOpcUaClient"`, `ApplicationUri = "urn:localhost:LmxOpcUaClient"`, cert directory `%LocalAppData%\LmxOpcUaClient\pki\`), and the `LmxOpcUaServer` class name (class rename out of Phase 0 scope per Task 0.5 sed pattern; happens in Phase 1 alongside `LmxNodeManager → GenericDriverNodeManager` Core extraction). 23 LmxOpcUa references retained, all enumerated and justified in `docs/v2/implementation/exit-gate-phase-0.md`.
Build clean: 0 errors, 30 warnings (lower than baseline 167). Tests at strict improvement over baseline: 821 passing / 1 failing vs baseline 820 / 2 (one flaky pre-existing failure passed this run; the other still fails — both pre-existing and unrelated to the rename). `Client.UI.Tests`, `Historian.Aveva.Tests`, `Client.Shared.Tests`, `IntegrationTests` all match baseline exactly. Exit gate compliance results recorded in `docs/v2/implementation/exit-gate-phase-0.md` with all 7 checks PASS or DEFERRED-to-PR-review (#7 service install verification needs Windows service permissions on the reviewer's box).
Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
41 lines
1.4 KiB
C#
41 lines
1.4 KiB
C#
using System.Collections.Generic;
|
|
|
|
namespace ZB.MOM.WW.OtOpcUa.Host.Domain
|
|
{
|
|
/// <summary>
|
|
/// Pluggable interface for validating user credentials. Implement for different backing stores (config file, LDAP,
|
|
/// etc.).
|
|
/// </summary>
|
|
public interface IUserAuthenticationProvider
|
|
{
|
|
/// <summary>
|
|
/// Validates a username/password combination.
|
|
/// </summary>
|
|
bool ValidateCredentials(string username, string password);
|
|
}
|
|
|
|
/// <summary>
|
|
/// Extended interface for providers that can resolve application-level roles for authenticated users.
|
|
/// When the auth provider implements this interface, OnImpersonateUser uses the returned roles
|
|
/// to control write and alarm-ack permissions.
|
|
/// </summary>
|
|
public interface IRoleProvider
|
|
{
|
|
/// <summary>
|
|
/// Returns the set of application-level roles granted to the user.
|
|
/// </summary>
|
|
IReadOnlyList<string> GetUserRoles(string username);
|
|
}
|
|
|
|
/// <summary>
|
|
/// Well-known application-level role names used for permission enforcement.
|
|
/// </summary>
|
|
public static class AppRoles
|
|
{
|
|
public const string ReadOnly = "ReadOnly";
|
|
public const string WriteOperate = "WriteOperate";
|
|
public const string WriteTune = "WriteTune";
|
|
public const string WriteConfigure = "WriteConfigure";
|
|
public const string AlarmAck = "AlarmAck";
|
|
}
|
|
} |