Author: ruchith
Date: Sun Mar 2 05:40:08 2008
New Revision: 14410
Log:
More fixes using findbugs
Modified:
trunk/solutions/identity/modules/admin-ui/src/main/java/org/wso2/solutions/identity/admin/ui/action/ShowUserStoreEditAction.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/cards/CardIssuer.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/cards/model/InformationCard.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/IdentityProviderData.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/KeyUtil.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/saml/SignKeyDataHolder.java
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/saml/SAMLTokenConsumer.java
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/servletfilter/RelyingPartyData.java
trunk/solutions/identity/modules/user-ui/src/main/java/org/wso2/solutions/identity/user/ui/action/ShowUserVerificationAction.java
Modified:
trunk/solutions/identity/modules/admin-ui/src/main/java/org/wso2/solutions/identity/admin/ui/action/ShowUserStoreEditAction.java
==============================================================================
---
trunk/solutions/identity/modules/admin-ui/src/main/java/org/wso2/solutions/identity/admin/ui/action/ShowUserStoreEditAction.java
(original)
+++
trunk/solutions/identity/modules/admin-ui/src/main/java/org/wso2/solutions/identity/admin/ui/action/ShowUserStoreEditAction.java
Sun Mar 2 05:40:08 2008
@@ -73,7 +73,6 @@
try {
HttpServletRequest request = (HttpServletRequest) ActionContext
.getContext().get(StrutsStatics.HTTP_REQUEST);
- HttpSession session = request.getSession();
String[] values = request.getParameterValues("configName");
configName = values[0];
RealmConfigAdmin admin = new RealmConfigAdmin();
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/cards/CardIssuer.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/cards/CardIssuer.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/cards/CardIssuer.java
Sun Mar 2 05:40:08 2008
@@ -16,19 +16,6 @@
package org.wso2.solutions.identity.cards;
-import java.io.ByteArrayOutputStream;
-import java.io.FileInputStream;
-import java.security.KeyStore;
-import java.security.PrivateKey;
-import java.security.cert.Certificate;
-import java.security.cert.X509Certificate;
-import java.text.DateFormat;
-import java.text.SimpleDateFormat;
-import java.util.Calendar;
-import java.util.Date;
-import java.util.GregorianCalendar;
-import java.util.TimeZone;
-
import org.apache.axiom.om.util.Base64;
import org.apache.axiom.om.util.UUIDGenerator;
import org.apache.axis2.addressing.EndpointReference;
@@ -38,7 +25,6 @@
import org.wso2.solutions.identity.IdentityConstants;
import org.wso2.solutions.identity.IdentityProviderConstants;
import org.wso2.solutions.identity.IdentityProviderException;
-import org.wso2.solutions.identity.admin.ParameterAdmin;
import org.wso2.solutions.identity.admin.RegisteredInfoCardInfoAdmin;
import org.wso2.solutions.identity.admin.ReportAdmin;
import org.wso2.solutions.identity.cards.model.CardImage;
@@ -63,6 +49,19 @@
import org.wso2.utils.ServerConfiguration;
import org.wso2.wsas.ServerConstants;
+import java.io.ByteArrayOutputStream;
+import java.io.FileInputStream;
+import java.security.KeyStore;
+import java.security.PrivateKey;
+import java.security.cert.Certificate;
+import java.security.cert.X509Certificate;
+import java.text.DateFormat;
+import java.text.SimpleDateFormat;
+import java.util.Calendar;
+import java.util.Date;
+import java.util.GregorianCalendar;
+import java.util.TimeZone;
+
/**
* Issues information cards according to the given configuration.
*/
@@ -80,12 +79,11 @@
// an InfoCard based on SAML token type.
private boolean isOpenIdInfoCard = false;
- private boolean isCardLogDebug = false;
+ private boolean isCardLogDebug = cardIssuerLog.isDebugEnabled();
private static CardIssuerConfig issuerConfig = null;
public CardIssuer() throws IdentityProviderException {
issuerConfig = CardIssuerConfig.getInstance();
- isCardLogDebug = cardIssuerLog.isDebugEnabled();
}
public Element issueCardForUsername(String username,
@@ -333,7 +331,6 @@
private byte[] getCardImageBytes() throws CardModelException {
try {
- ParameterAdmin admin = new ParameterAdmin();
FileInputStream is = new FileInputStream(System
.getProperty(ServerConstants.WSO2WSAS_HOME)
+ IdentityConstants.CARD_IMAGE_PATH);
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/cards/model/InformationCard.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/cards/model/InformationCard.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/cards/model/InformationCard.java
Sun Mar 2 05:40:08 2008
@@ -20,7 +20,6 @@
import org.apache.axiom.om.OMConstants;
import org.apache.axiom.om.OMElement;
import org.apache.axiom.om.OMFactory;
-import org.apache.ws.security.util.XmlSchemaDateFormat;
import org.wso2.solutions.identity.IdentityConstants;
import javax.xml.namespace.QName;
@@ -134,8 +133,7 @@
OMElement issuerElem = fac.createOMElement(ISSUER, elem);
issuerElem.setText(this.issuer);
- DateFormat zulu = new XmlSchemaDateFormat();
- zulu = new SimpleDateFormat("yyyy-MM-dd'T'HH:mm:ss'Z'");
+ DateFormat zulu = new SimpleDateFormat("yyyy-MM-dd'T'HH:mm:ss'Z'");
zulu.setTimeZone(TimeZone.getTimeZone("UTC"));
OMElement timeIssuedElem = fac.createOMElement(TIME_ISSUED, elem);
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/IdentityProviderData.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/IdentityProviderData.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/IdentityProviderData.java
Sun Mar 2 05:40:08 2008
@@ -159,6 +159,7 @@
.getDefaultType());
cacerts.load(cacertsIs, "changeit"
.toCharArray());
+ cacertsIs.close();
}
// Check whether the issuer of the RP cert is
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/KeyUtil.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/KeyUtil.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/KeyUtil.java
Sun Mar 2 05:40:08 2008
@@ -15,7 +15,6 @@
*/
package org.wso2.solutions.identity.sts;
-import org.apache.axis2.AxisFault;
import org.wso2.solutions.identity.IdentityProviderException;
import org.wso2.utils.ServerConfiguration;
import org.wso2.utils.security.CryptoUtil;
@@ -30,7 +29,6 @@
import java.io.FileInputStream;
import java.security.Key;
import java.security.KeyStore;
-import java.security.KeyStoreException;
import java.security.cert.Certificate;
import java.security.cert.X509Certificate;
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/saml/SignKeyDataHolder.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/saml/SignKeyDataHolder.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/saml/SignKeyDataHolder.java
Sun Mar 2 05:40:08 2008
@@ -38,8 +38,6 @@
private SignKeyDataHolder() throws IdentityProviderException {
//do once - because this is a expensive operation
- ServerConfiguration config = ServerConfiguration.getInstance();
- String host = "http://" + config.getFirstProperty("HostName");
String keyAlias = ServerConfiguration.getInstance().getFirstProperty(
"Security.KeyStore.KeyAlias");
Modified:
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/saml/SAMLTokenConsumer.java
==============================================================================
---
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/saml/SAMLTokenConsumer.java
(original)
+++
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/saml/SAMLTokenConsumer.java
Sun Mar 2 05:40:08 2008
@@ -112,7 +112,6 @@
boolean validated = false;
String issuerName = verifier.getIssuerName();
String issuerPolicy = data.getIssuerPolicy();
- String validatePolicy = data.getValidatePolicy();
try {
if (IdentityConstants.SELF_ISSUED_ISSUER.equals(issuerName)) {
Modified:
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/servletfilter/RelyingPartyData.java
==============================================================================
---
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/servletfilter/RelyingPartyData.java
(original)
+++
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/servletfilter/RelyingPartyData.java
Sun Mar 2 05:40:08 2008
@@ -71,9 +71,11 @@
KeyStore store = KeyStore.getInstance(storeType);
String realPath = filterConfig.getServletContext().getRealPath(
keyStore);
- store.load(new FileInputStream(realPath), storePass.toCharArray());
+ FileInputStream fis = new FileInputStream(realPath);
+ store.load(fis, storePass.toCharArray());
privateKey = (PrivateKey) store.getKey(keyAlias, keyPass
.toCharArray());
+ fis.close();
} catch (Exception e) {
throw new ServletException("Cannot load the private key", e);
}
Modified:
trunk/solutions/identity/modules/user-ui/src/main/java/org/wso2/solutions/identity/user/ui/action/ShowUserVerificationAction.java
==============================================================================
---
trunk/solutions/identity/modules/user-ui/src/main/java/org/wso2/solutions/identity/user/ui/action/ShowUserVerificationAction.java
(original)
+++
trunk/solutions/identity/modules/user-ui/src/main/java/org/wso2/solutions/identity/user/ui/action/ShowUserVerificationAction.java
Sun Mar 2 05:40:08 2008
@@ -7,8 +7,9 @@
import com.opensymphony.xwork2.ActionContext;
-public class ShowUserVerificationAction
- extends ManagedAction {
+public class ShowUserVerificationAction extends ManagedAction {
+
+ private static final long serialVersionUID = 8826372963551956876L;
public String execute() throws Exception {
String result = ERROR;
@@ -18,9 +19,6 @@
String[] values = request
.getParameterValues(EmailVerifier.CONF_STRING);
- String stuff = request
- .getParameter(EmailVerifier.CONF_STRING);
-
if (values != null && values.length > 0) {
EmailVerifier verifier = new EmailVerifier();
boolean value = verifier.confirmUser(values[0]);
_______________________________________________
Identity-dev mailing list
[email protected]
http://wso2.org/cgi-bin/mailman/listinfo/identity-dev