Author: chintana Date: Fri Oct 30 11:27:38 2009 New Revision: 831269 URL: http://svn.apache.org/viewvc?rev=831269&view=rev Log: Hard coding the PPID value until we talk to the dataase and get the user from there. May be Identity Server user manager can be configured to get users from the existing MSSQL database?
Modified: incubator/stonehenge/trunk/stocktrader/wsas/identity/org.wso2.carbon.identity.stonehenge.attributeservice/src/main/java/org/wso2/carbon/identity/stonehenge/attributeservice/StonehengeAttributeService.java Modified: incubator/stonehenge/trunk/stocktrader/wsas/identity/org.wso2.carbon.identity.stonehenge.attributeservice/src/main/java/org/wso2/carbon/identity/stonehenge/attributeservice/StonehengeAttributeService.java URL: http://svn.apache.org/viewvc/incubator/stonehenge/trunk/stocktrader/wsas/identity/org.wso2.carbon.identity.stonehenge.attributeservice/src/main/java/org/wso2/carbon/identity/stonehenge/attributeservice/StonehengeAttributeService.java?rev=831269&r1=831268&r2=831269&view=diff ============================================================================== --- incubator/stonehenge/trunk/stocktrader/wsas/identity/org.wso2.carbon.identity.stonehenge.attributeservice/src/main/java/org/wso2/carbon/identity/stonehenge/attributeservice/StonehengeAttributeService.java (original) +++ incubator/stonehenge/trunk/stocktrader/wsas/identity/org.wso2.carbon.identity.stonehenge.attributeservice/src/main/java/org/wso2/carbon/identity/stonehenge/attributeservice/StonehengeAttributeService.java Fri Oct 30 11:27:38 2009 @@ -45,37 +45,18 @@ try { data = attrCallback.getData(); - userIdentifier = data.getPrincipal().getName(); - password = getUserCredentials(MessageContext.getCurrentMessageContext().getEnvelope()); - log.info("User Identifier : " + userIdentifier); - log.info("User Password : " + password); + // we're cheating and hardcoding the ppid value. + // TODO: take it from the database if (RahasConstants.TOK_TYPE_SAML_20.equals(data.getTokenType())) { - if (attrCallback.getSAML2Attributes() != null - || attrCallback.getSAML2Attributes().length > 0) { - Attribute[] attributes = attrCallback.getSAML2Attributes(); - for (int i = 0; i < attributes.length; i++) { - log.info(attributes[i].getName()); - // Overriding and filtering. - if ("First Name".equals(attributes[i].getName())) { - attributes[i].setName("New Name"); - } - } - } - attrCallback.addAttributes(getSAML2Attribute("Custom Attribute", "Sample Value", "http://wso2.org/claims/customAttribute")); + attrCallback.addAttributes(getSAML2Attribute("privatepersonalidentifier", "08C648FA-5C0E-4092-ABF8-E71785373CE8", "http://schemas.xmlsoap.org/ws/2005/05/identity/claims")); } else { - // Retrieving all attribute values set before. - if (attrCallback.getAttributes() != null || attrCallback.getAttributes().length > 0) { - SAMLAttribute[] attributes = attrCallback.getAttributes(); - for (int i = 0; i < attributes.length; i++) { - log.info(attributes[i].toString()); - // Overriding and filtering. - if ("First Name".equals(attributes[i].getName())) { - attributes[i].setValues(Arrays.asList(new String[]{"New Name"})); - } - } - } - } + SAMLAttribute attribute = null; + attribute = new SAMLAttribute("privatepersonalidentifier", + "http://schemas.xmlsoap.org/ws/2005/05/identity/claims", null, -1, Arrays + .asList(new String[]{"uid:0"})); + attrCallback.addAttributes(attribute); + } } catch (Exception e) { log.error("Error occuerd while populating claim data", e); }