Fixing build

Project: http://git-wip-us.apache.org/repos/asf/cxf/repo
Commit: http://git-wip-us.apache.org/repos/asf/cxf/commit/0d3318d2
Tree: http://git-wip-us.apache.org/repos/asf/cxf/tree/0d3318d2
Diff: http://git-wip-us.apache.org/repos/asf/cxf/diff/0d3318d2

Branch: refs/heads/3.0.x-fixes
Commit: 0d3318d2cb5fc0e7c20e14dcc242865ef11175d5
Parents: 418a19b
Author: Colm O hEigeartaigh <cohei...@apache.org>
Authored: Wed Jul 15 17:15:55 2015 +0100
Committer: Colm O hEigeartaigh <cohei...@apache.org>
Committed: Wed Jul 15 17:15:55 2015 +0100

----------------------------------------------------------------------
 .../rs/security/xml/XmlSecInInterceptor.java    | 38 ++++++++++----------
 1 file changed, 19 insertions(+), 19 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/cxf/blob/0d3318d2/rt/rs/security/xml/src/main/java/org/apache/cxf/rs/security/xml/XmlSecInInterceptor.java
----------------------------------------------------------------------
diff --git 
a/rt/rs/security/xml/src/main/java/org/apache/cxf/rs/security/xml/XmlSecInInterceptor.java
 
b/rt/rs/security/xml/src/main/java/org/apache/cxf/rs/security/xml/XmlSecInInterceptor.java
index 03c4dd9..21b431b 100644
--- 
a/rt/rs/security/xml/src/main/java/org/apache/cxf/rs/security/xml/XmlSecInInterceptor.java
+++ 
b/rt/rs/security/xml/src/main/java/org/apache/cxf/rs/security/xml/XmlSecInInterceptor.java
@@ -240,19 +240,19 @@ public class XmlSecInInterceptor extends 
AbstractPhaseInterceptor<Message> {
         if (XMLSecurityConstants.Enc.equals(event.getAlgorithmUsage())
             && encryptionProperties.getEncryptionSymmetricKeyAlgo() != null
             && 
!encryptionProperties.getEncryptionSymmetricKeyAlgo().equals(event.getAlgorithmURI()))
 {
-            throw new XMLSecurityException("empty", "The symmetric encryption 
algorithm "
-                                           + event.getAlgorithmURI() + " is 
not allowed");
+            throw new XMLSecurityException("empty", new Object[] {"The 
symmetric encryption algorithm "
+                                           + event.getAlgorithmURI() + " is 
not allowed"});
         } else if 
((XMLSecurityConstants.Sym_Key_Wrap.equals(event.getAlgorithmUsage())
             || 
XMLSecurityConstants.Asym_Key_Wrap.equals(event.getAlgorithmUsage()))
             && encryptionProperties.getEncryptionKeyTransportAlgo() != null
             && 
!encryptionProperties.getEncryptionKeyTransportAlgo().equals(event.getAlgorithmURI()))
 {
-            throw new XMLSecurityException("empty", "The key transport 
algorithm "
-                + event.getAlgorithmURI() + " is not allowed");
+            throw new XMLSecurityException("empty", new Object[] {"The key 
transport algorithm "
+                    + event.getAlgorithmURI() + " is not allowed"});
         } else if 
(XMLSecurityConstants.EncDig.equals(event.getAlgorithmUsage())
             && encryptionProperties.getEncryptionDigestAlgo() != null
             && 
!encryptionProperties.getEncryptionDigestAlgo().equals(event.getAlgorithmURI()))
 {
-            throw new XMLSecurityException("empty", "The encryption digest 
algorithm "
-                + event.getAlgorithmURI() + " is not allowed");
+            throw new XMLSecurityException("empty", new Object[] {"The 
encryption digest algorithm "
+                    + event.getAlgorithmURI() + " is not allowed"});
         }
     }
     
@@ -262,24 +262,24 @@ public class XmlSecInInterceptor extends 
AbstractPhaseInterceptor<Message> {
             || XMLSecurityConstants.Sym_Sig.equals(event.getAlgorithmUsage()))
             && sigProps.getSignatureAlgo() != null
             && !sigProps.getSignatureAlgo().equals(event.getAlgorithmURI())) {
-            throw new XMLSecurityException("empty", "The signature algorithm "
-                                           + event.getAlgorithmURI() + " is 
not allowed");
+            throw new XMLSecurityException("empty", new Object[] {"The 
signature algorithm "
+                                           + event.getAlgorithmURI() + " is 
not allowed"});
         } else if 
(XMLSecurityConstants.SigDig.equals(event.getAlgorithmUsage())
             && sigProps.getSignatureDigestAlgo() != null
             && 
!sigProps.getSignatureDigestAlgo().equals(event.getAlgorithmURI())) {
-            throw new XMLSecurityException("empty", "The signature digest 
algorithm "
-                + event.getAlgorithmURI() + " is not allowed");
+            throw new XMLSecurityException("empty", new Object[] {"The 
signature digest algorithm "
+                    + event.getAlgorithmURI() + " is not allowed"});
         } else if 
(XMLSecurityConstants.SigC14n.equals(event.getAlgorithmUsage())
             && sigProps.getSignatureC14nMethod() != null
             && 
!sigProps.getSignatureC14nMethod().equals(event.getAlgorithmURI())) {
-            throw new XMLSecurityException("empty", "The signature c14n 
algorithm "
-                + event.getAlgorithmURI() + " is not allowed");
+            throw new XMLSecurityException("empty", new Object[] {"The 
signature c14n algorithm "
+                    + event.getAlgorithmURI() + " is not allowed"});
         } else if 
(XMLSecurityConstants.SigTransform.equals(event.getAlgorithmUsage())
             && 
!XMLSecurityConstants.NS_XMLDSIG_ENVELOPED_SIGNATURE.equals(event.getAlgorithmURI())
             && sigProps.getSignatureC14nTransform() != null
             && 
!sigProps.getSignatureC14nTransform().equals(event.getAlgorithmURI())) {
-            throw new XMLSecurityException("empty", "The signature 
transformation algorithm "
-                + event.getAlgorithmURI() + " is not allowed");
+            throw new XMLSecurityException("empty", new Object[] {"The 
signature transformation algorithm "
+                    + event.getAlgorithmURI() + " is not allowed"});
         }
     }
     
@@ -299,8 +299,8 @@ public class XmlSecInInterceptor extends 
AbstractPhaseInterceptor<Message> {
             try {
                 new TrustValidator().validateTrust(sigCrypto, cert, publicKey, 
subjectDNPatterns);
             } catch (WSSecurityException e) {
-                throw new XMLSecurityException("empty", "Error during 
Signature Trust "
-                                               + "validation: " + 
e.getMessage());
+                throw new XMLSecurityException("empty", new Object[] {"Error 
during Signature Trust "
+                                               + "validation: " + 
e.getMessage()});
             }
             
             if (persistSignature) {
@@ -408,7 +408,7 @@ public class XmlSecInInterceptor extends 
AbstractPhaseInterceptor<Message> {
             if (incomingSecurityEventList == null) {
                 LOG.warning("Security processing failed (actions mismatch)");
                 XMLSecurityException ex = 
-                    new XMLSecurityException("empty", "The request was not 
signed or encrypted");
+                    new XMLSecurityException("empty", new Object[] {"The 
request was not signed or encrypted"});
                 throwFault(ex.getMessage(), ex);
             }
             
@@ -417,7 +417,7 @@ public class XmlSecInInterceptor extends 
AbstractPhaseInterceptor<Message> {
                 if (!isEventInResults(requiredEvent, 
incomingSecurityEventList)) {
                     LOG.warning("The request was not signed");
                     XMLSecurityException ex = 
-                        new XMLSecurityException("empty", "The request was not 
signed");
+                        new XMLSecurityException("empty", new Object[] {"The 
request was not signed"});
                     throwFault(ex.getMessage(), ex);
                 }
             }
@@ -428,7 +428,7 @@ public class XmlSecInInterceptor extends 
AbstractPhaseInterceptor<Message> {
                 if (!foundEncryptionPart) {
                     LOG.warning("The request was not encrypted");
                     XMLSecurityException ex = 
-                        new XMLSecurityException("empty", "The request was not 
encrypted");
+                        new XMLSecurityException("empty", new Object[] {"The 
request was not encrypted"});
                     throwFault(ex.getMessage(), ex);
                 }
             }

Reply via email to