Author: prabath
Date: Fri Mar 7 09:47:54 2008
New Revision: 14589
Log:
code review fixes + interop testing fixes + added missing exception logging
Modified:
trunk/solutions/identity/modules/base/src/main/java/org/wso2/solutions/identity/IdentityConstants.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/UserStore.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDAuthenticationRequest.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDClaim.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDExtensionFactory.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDProvider.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDServerManager.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDUtil.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/UserInfoServlet.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/extensions/OpenIDAttributeExchange.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/extensions/OpenIDExtension.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/extensions/OpenIDPape.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/extensions/OpenIDSimpleReg.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/infocard/OpenIDInfoCardProviderData.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/OpenIDTokenIssuer.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/users/IdentityDefaultUserStoreAdmin.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/users/IdentityDefaultUserStoreReader.java
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/openid/OpenIDConsumer.java
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/openid/extensions/OpenIDSimpleReg.java
Modified:
trunk/solutions/identity/modules/base/src/main/java/org/wso2/solutions/identity/IdentityConstants.java
==============================================================================
---
trunk/solutions/identity/modules/base/src/main/java/org/wso2/solutions/identity/IdentityConstants.java
(original)
+++
trunk/solutions/identity/modules/base/src/main/java/org/wso2/solutions/identity/IdentityConstants.java
Fri Mar 7 09:47:54 2008
@@ -173,7 +173,7 @@
// below should be included in the Identity Provider's
// response when "openid.mode" is "id_res"
- public final static String NS_SREG =
"http://openid.net/extensions/sreg/1.1";
+ public final static String NS_SREG =
"http://openid.net/sreg/1.0";
public final static String SREG = "openid.sreg.";
public final static String OP_SREG = "openid.ns.sreg";
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/UserStore.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/UserStore.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/UserStore.java
Fri Mar 7 09:47:54 2008
@@ -207,7 +207,7 @@
* @return A map of claims with their values.
* @throws IdentityProviderException
*/
- public Map getClaimValues(String username, List propertyNames)
+ public Map<String,String> getClaimValues(String username, List<String>
propertyNames)
throws IdentityProviderException {
try {
UserStoreReader usReader = realm.getUserStoreReader();
@@ -278,8 +278,8 @@
* @return
* @throws IdentityProviderException
*/
- public Map getClaimValues(String username, String profileName,
- List propertyNames) throws IdentityProviderException {
+ public Map<String,String> getClaimValues(String username, String
profileName,
+ List<String> propertyNames) throws IdentityProviderException {
try {
IdentityUserStoreReader usReader =
((IdentityDefaultRealm)realm).getIdentityUserStoreReader();
return usReader.getUserProperties(username, profileName);
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDAuthenticationRequest.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDAuthenticationRequest.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDAuthenticationRequest.java
Fri Mar 7 09:47:54 2008
@@ -43,4 +43,4 @@
public void setAuthRequest(AuthRequest authRequest) {
this.authRequest = authRequest;
}
-}
+}
\ No newline at end of file
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDClaim.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDClaim.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDClaim.java
Fri Mar 7 09:47:54 2008
@@ -32,4 +32,4 @@
public void setClaimValue(String claimValue) {
this.claimValue = claimValue;
}
-}
+}
\ No newline at end of file
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDExtensionFactory.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDExtensionFactory.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDExtensionFactory.java
Fri Mar 7 09:47:54 2008
@@ -1,6 +1,5 @@
package org.wso2.solutions.identity.openid;
-import org.openid4java.message.AuthRequest;
import org.openid4java.message.ax.AxMessage;
import org.openid4java.message.pape.PapeMessage;
import org.openid4java.message.sreg.SRegMessage;
@@ -51,4 +50,4 @@
return null;
}
-}
+}
\ No newline at end of file
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDProvider.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDProvider.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDProvider.java
Fri Mar 7 09:47:54 2008
@@ -109,6 +109,7 @@
}
} catch (Exception e) {
+ log.error(e.getMessage());
// Error response.
message = DirectError.createDirectError(e.getMessage());
responseText = message.keyValueFormEncoding();
@@ -118,6 +119,7 @@
// Return the result to the user.
return directResponse(httpResp, responseText);
} catch (IOException e) {
+ log.error(e.getMessage());
throw new IdentityProviderException(
IdentityConstants.ErrorCodes.OPENID_DIRECT_RESP_FAILED);
}
@@ -253,6 +255,8 @@
req.setAuthRequest(authReq);
for (Object alias : authReq.getExtensions()) {
+ if (log.isDebugEnabled())
+ log.info("Found extension in the OpenID request: " +
alias);
req.setExtensionAlias((String) alias);
extension = OpenIDExtensionFactory.getInstance().getExtension(
req);
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDServerManager.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDServerManager.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDServerManager.java
Fri Mar 7 09:47:54 2008
@@ -68,4 +68,4 @@
}
}
}
-}
+}
\ No newline at end of file
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDUtil.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDUtil.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDUtil.java
Fri Mar 7 09:47:54 2008
@@ -53,7 +53,7 @@
IdentityProviderException {
UserStore userStore = null;
- List users = null;
+ List<String> users = null;
userStore = UserStore.getInstance();
users = userStore.getAllUserNames();
@@ -62,14 +62,14 @@
throw new IdentityProviderException(
IdentityConstants.ErrorCodes.NO_USERS_FOUND);
- Map mapValues = null;
- Iterator iterator = null;
+ Map<String, String> mapValues = null;
+ Iterator<String> iterator = null;
iterator = users.iterator();
while (iterator.hasNext()) {
- String user = (String) iterator.next();
+ String user = iterator.next();
mapValues = userStore.getClaimValues(user, null);
if (mapValues != null && !mapValues.isEmpty()) {
@@ -131,6 +131,36 @@
}
/**
+ * Check whether the given user exists in the system.
+ * @param userName User name.
+ * @return
+ */
+ public static boolean isUserExist(String userName) {
+
+ UserStore userStore = null;
+ List<String> users = null;
+ Iterator<String> iterator = null;
+
+ try {
+ userStore = UserStore.getInstance();
+ users = userStore.getAllUserNames();
+ iterator = users.iterator();
+
+ String user = null;
+
+ while (iterator.hasNext()) {
+ user = iterator.next();
+ if (user.equals(userName))
+ return true;
+ }
+ } catch (IdentityProviderException e) {
+ return false;
+ }
+
+ return false;
+ }
+
+ /**
* @param text
* @return
*/
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/UserInfoServlet.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/UserInfoServlet.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/UserInfoServlet.java
Fri Mar 7 09:47:54 2008
@@ -2,17 +2,12 @@
import java.io.IOException;
import java.io.PrintWriter;
-import java.util.Iterator;
-import java.util.List;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
-import org.wso2.solutions.identity.IdentityProviderException;
-import org.wso2.solutions.identity.UserStore;
-
public class UserInfoServlet extends HttpServlet {
private static final long serialVersionUID = -2306630174647697559L;
@@ -31,7 +26,7 @@
caller = req.getRequestURI().substring(req.getServletPath().length());
- if (!isUserExist(caller.substring(1))) {
+ if (!OpenIDUtil.isUserExist(caller.substring(1))) {
resp.setContentType("text/html");
back = "<html><head>\n"
+ "</head><body><h1>You are trying to do something fishy
!!!</h1></body></html>";
@@ -60,34 +55,4 @@
PrintWriter out = resp.getWriter();
out.write(back);
}
-
- /**
- * Check whether the given user exists in the system.
- * @param userName User name.
- * @return
- */
- private boolean isUserExist(String userName) {
-
- UserStore userStore = null;
- List users = null;
- Iterator iterator = null;
-
- try {
- userStore = UserStore.getInstance();
- users = userStore.getAllUserNames();
- iterator = users.iterator();
-
- String user = null;
-
- while (iterator.hasNext()) {
- user = (String) iterator.next();
- if (user.equals(userName))
- return true;
- }
- } catch (IdentityProviderException e) {
- return false;
- }
-
- return false;
- }
}
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/extensions/OpenIDAttributeExchange.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/extensions/OpenIDAttributeExchange.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/extensions/OpenIDAttributeExchange.java
Fri Mar 7 09:47:54 2008
@@ -53,15 +53,29 @@
if (extensions instanceof FetchRequest) {
Map required = null;
+ Map optional = null;
FetchRequest fetchRequest = null;
FetchResponse fetchResponse = null;
- Map claimValues = null;
+ Map<String, OpenIDClaim> claimValues = null;
fetchRequest = (FetchRequest) extensions;
// Get the required attributes as requested by the
// RP.
required = fetchRequest.getAttributes(true);
+ optional = fetchRequest.getAttributes();
+
+ if (optional != null && !optional.isEmpty()) {
+ Iterator iterator = optional.entrySet().iterator();
+ Entry entry = null;
+ while (iterator.hasNext()) {
+ entry = (Entry) iterator.next();
+ if (!required.containsKey(entry.getKey())) {
+ required.put(entry.getKey(), entry.getValue());
+ }
+ }
+ }
+
fetchResponse = FetchResponse.createFetchResponse(fetchRequest,
new HashMap());
claimValues = populateAttributeValues(required, userId,
@@ -88,17 +102,18 @@
* @return A map, populated with required claim values.
* @throws IdentityProviderException
*/
- protected Map populateAttributeValues(Map requiredClaims, String userId,
+ protected Map<String, OpenIDClaim> populateAttributeValues(
+ Map<String, String> requiredClaims, String userId,
String profileName) throws IdentityProviderException {
- Map claims = null;
+ Map<String, ClaimDO> claims = null;
ClaimDO[] supportedClaims = null;
ClaimsAdmin claimsAdmin = null;
- Iterator iterator = null;
- Map map = null;
- Entry entry = null;
+ Iterator<Entry<String, String>> iterator = null;
+ Map<String, String> map = null;
+ Entry<String, String> entry = null;
- claims = new HashMap();
+ claims = new HashMap<String, ClaimDO>();
claimsAdmin = new ClaimsAdmin();
supportedClaims = claimsAdmin.getAllMappedEnabledClaims();
@@ -110,15 +125,15 @@
}
iterator = requiredClaims.entrySet().iterator();
- map = new HashMap();
+ map = new HashMap<String, String>();
- String key = null;
String val = null;
while (iterator.hasNext()) {
- entry = (Entry) iterator.next();
+ entry = iterator.next();
val = (String) entry.getValue();
- map.put(claimsAdmin.getMappedOpenIDTag(val), entry.getKey());
+ map.put(claimsAdmin.getMappedOpenIDTag(val), (String) entry
+ .getKey());
}
return populateAttributeValues(map.keySet(), userId, claims, map,
@@ -133,19 +148,19 @@
* @throws MessageException
*/
protected void setAttributeExchangeValues(FetchResponse response,
- Map claimValues) throws MessageException {
+ Map<String, OpenIDClaim> claimValues) throws MessageException {
- Iterator iterator = null;
- Entry entry = null;
+ Iterator<Entry<String, OpenIDClaim>> iterator = null;
+ Entry<String, OpenIDClaim> entry = null;
OpenIDClaim claim = null;
iterator = claimValues.entrySet().iterator();
while (iterator.hasNext()) {
- entry = (Entry) iterator.next();
+ entry = iterator.next();
claim = (OpenIDClaim) entry.getValue();
response.addAttribute(claim.getOpenIDTag(), claim.getTypeUri(),
claim.getClaimValue());
}
}
-}
+}
\ No newline at end of file
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/extensions/OpenIDExtension.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/extensions/OpenIDExtension.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/extensions/OpenIDExtension.java
Fri Mar 7 09:47:54 2008
@@ -34,20 +34,21 @@
* is OpenID supported claims.
* @throws IdentityProviderException
*/
- protected Map populateAttributeValues(Collection requiredClaims,
- String userId, Map claims, Map openIDTagMapping, String
profileName)
- throws IdentityProviderException {
+ protected Map<String, OpenIDClaim> populateAttributeValues(
+ Collection<String> requiredClaims, String userId,
+ Map<String, ClaimDO> claims, Map<String, String> openIDTagMapping,
+ String profileName) throws IdentityProviderException {
UserStore connector = null;
- Map<String,OpenIDClaim> claimValues = null;
- Iterator iterator = null;
- List list = null;
+ Map<String, OpenIDClaim> claimValues = null;
+ Iterator<String> iterator = null;
+ List<String> list = null;
connector = UserStore.getInstance();
// Get the column names for the URIs
iterator = requiredClaims.iterator();
- list = new ArrayList();
+ list = new ArrayList<String>();
String tag = null;
ClaimDO claim = null;
@@ -64,7 +65,7 @@
}
}
- Map mapValues = null;
+ Map<String,String> mapValues = null;
OpenIDClaim openIDClaim = null;
String profile = null;
@@ -76,24 +77,22 @@
// Get the claims values corresponding to the user from the user store.
mapValues = connector.getClaimValues(userId, profile, list);
- claimValues = new HashMap<String,OpenIDClaim> ();
+ claimValues = new HashMap<String, OpenIDClaim>();
iterator = requiredClaims.iterator();
// Iterate through the claim values retrieved and requestedClaims will
// be populated with the corresponding values.
while (iterator.hasNext()) {
- tag = (String) iterator.next();
- claim = (ClaimDO) claims.get(tag);
-
+ tag = iterator.next();
+ claim = claims.get(tag);
if (claim != null && claim.isSupported()) {
openIDClaim = new OpenIDClaim();
- openIDClaim.setClaimValue((String) mapValues.get(claim
- .getAttrId()));
+ openIDClaim.setClaimValue(mapValues.get(claim.getAttrId()));
openIDClaim.setTypeUri(claim.getUri());
if (openIDTagMapping != null)
- openIDClaim.setOpenIDTag((String) openIDTagMapping
- .get(claim.getOpenIDTag()));
+ openIDClaim.setOpenIDTag(openIDTagMapping.get(claim
+ .getOpenIDTag()));
else
openIDClaim.setOpenIDTag(claim.getOpenIDTag());
if (openIDClaim.getClaimValue() != null)
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/extensions/OpenIDPape.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/extensions/OpenIDPape.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/extensions/OpenIDPape.java
Fri Mar 7 09:47:54 2008
@@ -1,7 +1,5 @@
package org.wso2.solutions.identity.openid.extensions;
-import java.util.List;
-
import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;
import org.openid4java.message.AuthRequest;
@@ -39,9 +37,9 @@
String profileName) throws IdentityProviderException {
MessageExtension message = null;
- PapeRequest papeRequest = null;
+ //PapeRequest papeRequest = null;
PapeResponse papeResponse = null;
- List preferredPolicies = null;
+ //List preferredPolicies = null;
AuthRequest authRequest = null;
try {
@@ -49,11 +47,11 @@
message = authRequest.getExtension(PapeMessage.OPENID_NS_PAPE);
if (message instanceof PapeRequest) {
- papeRequest = (PapeRequest) message;
- preferredPolicies = papeRequest.getPreferredAuthPoliciesList();
+ //papeRequest = (PapeRequest) message;
+ //preferredPolicies =
papeRequest.getPreferredAuthPoliciesList();
papeResponse = PapeResponse.createPapeResponse();
papeResponse.setNistAuthLevel(1);
- papeResponse.setAuthAge(1);
+ //TODO: papeResponse.setAuthAge(1);
if (request.isPhishingResistanceLogin())
papeResponse
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/extensions/OpenIDSimpleReg.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/extensions/OpenIDSimpleReg.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/extensions/OpenIDSimpleReg.java
Fri Mar 7 09:47:54 2008
@@ -53,12 +53,19 @@
extension = authRequest
.getExtension(IdentityConstants.OpenId.SimpleRegAttributes.NS_SREG);
- if (extension instanceof SRegRequest) {
+ if (log.isDebugEnabled()) {
+ if (extension == null)
+ log.info("SReg extension is null");
+ else
+ log.info("SReg extension: " + extension.getTypeUri());
+ }
+ if (extension instanceof SRegRequest) {
SRegRequest sregReq = null;
List required = null;
+ List optional = null;
Map userDataSReg = null;
- Map claimValues = null;
+ Map<String, OpenIDClaim> claimValues = null;
SRegResponse response = null;
sregReq = (SRegRequest) extension;
@@ -66,6 +73,19 @@
// Get the required attributes as requested by the
// RP.
required = sregReq.getAttributes(true);
+ optional = sregReq.getAttributes();
+
+ if (optional != null && !optional.isEmpty()) {
+ for (Object attr : optional) {
+ if (!required.contains(attr)) {
+ required.add(attr);
+ }
+ }
+ }
+
+ if (log.isDebugEnabled())
+ log.info("Required attributes for SReg request: "
+ + required.toString());
userDataSReg = new HashMap();
response = SRegResponse.createSRegResponse(sregReq,
@@ -75,7 +95,6 @@
setSimpleAttributeRegistrationValues(response, claimValues);
return response;
-
} else {
log.error("Unsupported request type");
throw new UnsupportedOperationException("TODO");
@@ -96,17 +115,17 @@
* @throws MessageException
*/
protected void setSimpleAttributeRegistrationValues(SRegResponse response,
- Map claimValues) throws MessageException {
+ Map<String, OpenIDClaim> claimValues) throws MessageException {
- Iterator iterator = null;
+ Iterator<Entry<String, OpenIDClaim>> iterator = null;
OpenIDClaim claim = null;
- Entry entry = null;
+ Entry<String, OpenIDClaim> entry = null;
iterator = claimValues.entrySet().iterator();
while (iterator.hasNext()) {
- entry = (Entry) iterator.next();
- claim = (OpenIDClaim) entry.getValue();
+ entry = iterator.next();
+ claim = entry.getValue();
response.addAttribute(claim.getOpenIDTag(), claim.getClaimValue());
}
}
@@ -118,14 +137,15 @@
* @return A map, populated with required claim values.
* @throws IdentityProviderException
*/
- protected Map populateAttributeValues(List requiredClaims, String userId,
- String profileName) throws IdentityProviderException {
+ protected Map<String, OpenIDClaim> populateAttributeValues(
+ List<String> requiredClaims, String userId, String profileName)
+ throws IdentityProviderException {
- Map claims = null;
+ Map<String, ClaimDO> claims = null;
ClaimDO[] supportedClaims = null;
ClaimsAdmin claimsAdmin = null;
- claims = new HashMap();
+ claims = new HashMap<String, ClaimDO>();
claimsAdmin = new ClaimsAdmin();
supportedClaims = claimsAdmin.getAllMappedEnabledClaims();
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/infocard/OpenIDInfoCardProviderData.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/infocard/OpenIDInfoCardProviderData.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/infocard/OpenIDInfoCardProviderData.java
Fri Mar 7 09:47:54 2008
@@ -34,19 +34,20 @@
UserStore connector = null;
Iterator iterator = null;
- List list = null;
+ List<String> list = null;
OpenIDRequestedClaimData requestedClaimData = null;
String userId = null;
- Map mapValues = null;
+ Map<String, String> mapValues = null;
ClaimDO claimDO = null;
String attrId = null;
String claimVal = null;
ClaimDO claim = null;
connector = UserStore.getInstance();
+
// Get the column names for the URIs
iterator = requestedClaims.values().iterator();
- list = new ArrayList();
+ list = new ArrayList<String>();
// First we need to figure-out which attributed we need to retrieve
from
// the user store.
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/OpenIDTokenIssuer.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/OpenIDTokenIssuer.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/OpenIDTokenIssuer.java
Fri Mar 7 09:47:54 2008
@@ -222,36 +222,6 @@
}
/**
- * Set the attributes in the structure required by the Simple Registration.
- * @param params Parameter list
- */
- protected void setSimpleAttributeParams(ParameterList params) {
-
- Iterator iterator = null;
- String key = null;
- OpenIDRequestedClaimData claim = null;
-
- params.set(new Parameter(
- IdentityConstants.OpenId.SimpleRegAttributes.OP_SREG,
- IdentityConstants.OpenId.SimpleRegAttributes.NS_SREG));
-
- iterator = ipData.requestedClaims.keySet().iterator();
-
- while (iterator.hasNext()) {
- key = (String) iterator.next();
- claim = (OpenIDRequestedClaimData) ipData.requestedClaims.get(key);
-
- if (claim.openIDTag != null)
- params.set(new Parameter(
- IdentityConstants.OpenId.SimpleRegAttributes.SREG
- + claim.openIDTag, claim.value));
- }
-
- if (log.isDebugEnabled())
- log.debug("OpenID simple attribute parameters set successfully");
- }
-
- /**
* Overrides the base functionality to cater OpenID related functionality.
*/
protected IdentityProviderData getIdentityProviderData(RahasData rahasData)
@@ -259,4 +229,4 @@
return new OpenIDInfoCardProviderData(rahasData);
}
-}
+}
\ No newline at end of file
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/users/IdentityDefaultUserStoreAdmin.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/users/IdentityDefaultUserStoreAdmin.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/users/IdentityDefaultUserStoreAdmin.java
Fri Mar 7 09:47:54 2008
@@ -44,7 +44,7 @@
}
/**
- *
+ * [EMAIL PROTECTED]
*/
public void setUserProperties(String userName, Map properties)
throws UserManagerException {
@@ -52,7 +52,7 @@
}
/**
- *
+ * [EMAIL PROTECTED]
*/
public void setUserProperties(String userName,
Map<String, String> properties, String profileName)
@@ -208,7 +208,7 @@
}
/**
- *
+ * [EMAIL PROTECTED]
*/
public void updateUserProperties(String userName,
Map<String, String> properties, String profileName)
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/users/IdentityDefaultUserStoreReader.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/users/IdentityDefaultUserStoreReader.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/users/IdentityDefaultUserStoreReader.java
Fri Mar 7 09:47:54 2008
@@ -44,7 +44,7 @@
}
/**
- *
+ * [EMAIL PROTECTED]
*/
public Map<String,String> getUserProperties(String userName) throws
UserManagerException {
@@ -96,7 +96,7 @@
}
/**
- *
+ * [EMAIL PROTECTED]
*/
public String[] getUserPropertyNames() throws UserManagerException {
@@ -148,7 +148,7 @@
}
/**
- *
+ * [EMAIL PROTECTED]
*/
public String getDefaultUserProfileName(String userName)
throws UserManagerException {
@@ -198,7 +198,7 @@
}
/**
- *
+ * [EMAIL PROTECTED]
*/
public List<String> getUserProfileNames(String userName)
throws UserManagerException {
@@ -248,7 +248,7 @@
}
/**
- *
+ * [EMAIL PROTECTED]
*/
public Map<String,String> getUserProperties(String userName, String
profileName)
throws UserManagerException {
@@ -301,7 +301,7 @@
}
/**
- *
+ * [EMAIL PROTECTED]
*/
public boolean isExistingUserProfile(String userName, String profileName)
throws UserManagerException {
Modified:
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/openid/OpenIDConsumer.java
==============================================================================
---
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/openid/OpenIDConsumer.java
(original)
+++
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/openid/OpenIDConsumer.java
Fri Mar 7 09:47:54 2008
@@ -6,6 +6,8 @@
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpSession;
+import org.apache.commons.logging.Log;
+import org.apache.commons.logging.LogFactory;
import org.openid4java.OpenIDException;
import org.openid4java.consumer.ConsumerException;
import org.openid4java.consumer.ConsumerManager;
@@ -29,6 +31,8 @@
private ConsumerManager manager;
private static OpenIDConsumer consumer;
+ private static Log log = LogFactory.getLog(OpenIDConsumer.class);
+
/**
* Creates an instance of OpenIDConsumer
* @throws RelyingPartyException
@@ -39,6 +43,7 @@
try {
manager = new ConsumerManager();
} catch (ConsumerException e) {
+ log.error(e.getMessage());
// Present error to the user
throw new RelyingPartyException(
IdentityConstants.ErrorCodes.RP_INITIATION_FAILED, e);
@@ -111,9 +116,9 @@
request.setAttribute(IdentityConstants.OpenId.OPENID_IDENTIFIER,
authSuccess.getIdentity());
- for (Object alias : authSuccess.getExtensions()) {
+ for (Object alias : authSuccess.getExtensions()) {
extension = OpenIDExtensionFactory.getInstance().getExtension(
- (String)alias,authSuccess);
+ (String) alias, authSuccess);
if (extension != null)
extension.setSessionAttributes(request);
}
@@ -122,6 +127,7 @@
TokenVerifierConstants.STATE_SUCCESS);
} catch (OpenIDException e) {
+ log.error(e.getMessage());
// Present error to the user.
throw new RelyingPartyException(
IdentityConstants.ErrorCodes.OPENID_AUTHENTICATION_FAILED,
@@ -221,10 +227,12 @@
request.getReponse().sendRedirect(
authReq.getDestinationUrl(true));
} catch (IOException e) {
+ log.error(e.getMessage());
throw new RelyingPartyException(e.getMessage(), e);
}
} catch (OpenIDException e) {
+ log.error(e.getMessage());
// Present error to the user
throw new RelyingPartyException(
IdentityConstants.ErrorCodes.INVALID_OPENID, e);
Modified:
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/openid/extensions/OpenIDSimpleReg.java
==============================================================================
---
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/openid/extensions/OpenIDSimpleReg.java
(original)
+++
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/openid/extensions/OpenIDSimpleReg.java
Fri Mar 7 09:47:54 2008
@@ -56,7 +56,7 @@
} else {
// When RP does not set any required parameters we stick to
// the default parameter set.
- setDefaultRequestParams(sregReq);
+ //setDefaultRequestParams(sregReq);
}
return sregReq;
@@ -108,7 +108,7 @@
* default we set all the attributes.
* @param request Simple registration request
*/
- private void setDefaultRequestParams(SRegRequest request) {
+ protected void setDefaultRequestParams(SRegRequest request) {
request.addAttribute(
IdentityConstants.OpenId.SimpleRegAttributes.NICK_NAME, true);
request.addAttribute(
_______________________________________________
Identity-dev mailing list
[email protected]
http://wso2.org/cgi-bin/mailman/listinfo/identity-dev