diff options
| author | Thomas <thomas.lenz@egiz.gv.at> | 2020-02-02 19:32:21 +0100 | 
|---|---|---|
| committer | Thomas <thomas.lenz@egiz.gv.at> | 2020-02-02 19:32:21 +0100 | 
| commit | 41ea2fdf782cd64d7d29f73c2e83f9c255810818 (patch) | |
| tree | 9710ca3937ae82391c6a2a0e5176923e0a49a5af /eaaf_modules/eaaf_module_pvp2_idp | |
| parent | d41afe91ee59daf6b5f5037cecac52900fe2ccb2 (diff) | |
| download | EAAF-Components-41ea2fdf782cd64d7d29f73c2e83f9c255810818.tar.gz EAAF-Components-41ea2fdf782cd64d7d29f73c2e83f9c255810818.tar.bz2 EAAF-Components-41ea2fdf782cd64d7d29f73c2e83f9c255810818.zip | |
some more OpenSAML3 refactoring stuff
Diffstat (limited to 'eaaf_modules/eaaf_module_pvp2_idp')
2 files changed, 20 insertions, 21 deletions
| diff --git a/eaaf_modules/eaaf_module_pvp2_idp/src/main/java/at/gv/egiz/eaaf/modules/pvp2/idp/impl/AuthenticationAction.java b/eaaf_modules/eaaf_module_pvp2_idp/src/main/java/at/gv/egiz/eaaf/modules/pvp2/idp/impl/AuthenticationAction.java index 74224dbe..200d98c4 100644 --- a/eaaf_modules/eaaf_module_pvp2_idp/src/main/java/at/gv/egiz/eaaf/modules/pvp2/idp/impl/AuthenticationAction.java +++ b/eaaf_modules/eaaf_module_pvp2_idp/src/main/java/at/gv/egiz/eaaf/modules/pvp2/idp/impl/AuthenticationAction.java @@ -23,6 +23,19 @@ import javax.annotation.PostConstruct;  import javax.servlet.http.HttpServletRequest;  import javax.servlet.http.HttpServletResponse; +import org.joda.time.DateTime; +import org.opensaml.saml.common.xml.SAMLConstants; +import org.opensaml.saml.saml2.core.Assertion; +import org.opensaml.saml.saml2.core.AuthnRequest; +import org.opensaml.saml.saml2.core.Response; +import org.opensaml.saml.saml2.metadata.AssertionConsumerService; +import org.opensaml.saml.saml2.metadata.EntityDescriptor; +import org.slf4j.Logger; +import org.slf4j.LoggerFactory; +import org.springframework.beans.factory.annotation.Autowired; +import org.springframework.context.ApplicationContext; +import org.springframework.stereotype.Service; +  import at.gv.egiz.eaaf.core.api.IRequest;  import at.gv.egiz.eaaf.core.api.idp.IAction;  import at.gv.egiz.eaaf.core.api.idp.IAuthData; @@ -44,20 +57,6 @@ import at.gv.egiz.eaaf.modules.pvp2.impl.message.PvpSProfileRequest;  import at.gv.egiz.eaaf.modules.pvp2.impl.utils.AbstractCredentialProvider;  import at.gv.egiz.eaaf.modules.pvp2.impl.utils.Saml2Utils; -import org.joda.time.DateTime; -import org.opensaml.messaging.encoder.MessageEncodingException; -import org.opensaml.saml.common.xml.SAMLConstants; -import org.opensaml.saml.saml2.core.Assertion; -import org.opensaml.saml.saml2.core.AuthnRequest; -import org.opensaml.saml.saml2.core.Response; -import org.opensaml.saml.saml2.metadata.AssertionConsumerService; -import org.opensaml.saml.saml2.metadata.EntityDescriptor; -import org.slf4j.Logger; -import org.slf4j.LoggerFactory; -import org.springframework.beans.factory.annotation.Autowired; -import org.springframework.context.ApplicationContext; -import org.springframework.stereotype.Service; -  @Service("PVPAuthenticationRequestAction")  public class AuthenticationAction implements IAction {    private static final Logger log = LoggerFactory.getLogger(AuthenticationAction.class); @@ -142,7 +141,7 @@ public class AuthenticationAction implements IAction {        sloInformation.setSpEntityID(req.getServiceProviderConfiguration().getUniqueIdentifier());        return sloInformation; -    } catch (MessageEncodingException | SecurityException e) { +    } catch (SecurityException e) {        log.warn("Message Encoding exception", e);        throw new ResponderErrorException("pvp2.01", null, e); diff --git a/eaaf_modules/eaaf_module_pvp2_idp/src/main/java/at/gv/egiz/eaaf/modules/pvp2/idp/impl/builder/AuthResponseBuilder.java b/eaaf_modules/eaaf_module_pvp2_idp/src/main/java/at/gv/egiz/eaaf/modules/pvp2/idp/impl/builder/AuthResponseBuilder.java index ac551612..8cafebb9 100644 --- a/eaaf_modules/eaaf_module_pvp2_idp/src/main/java/at/gv/egiz/eaaf/modules/pvp2/idp/impl/builder/AuthResponseBuilder.java +++ b/eaaf_modules/eaaf_module_pvp2_idp/src/main/java/at/gv/egiz/eaaf/modules/pvp2/idp/impl/builder/AuthResponseBuilder.java @@ -22,10 +22,6 @@ package at.gv.egiz.eaaf.modules.pvp2.idp.impl.builder;  import java.util.ArrayList;  import java.util.List; -import at.gv.egiz.eaaf.modules.pvp2.PvpConstants; -import at.gv.egiz.eaaf.modules.pvp2.idp.exception.InvalidAssertionEncryptionException; -import at.gv.egiz.eaaf.modules.pvp2.impl.utils.Saml2Utils; -  import org.joda.time.DateTime;  import org.opensaml.core.criterion.EntityIdCriterion;  import org.opensaml.saml.common.xml.SAMLConstants; @@ -38,17 +34,21 @@ import org.opensaml.saml.saml2.core.Response;  import org.opensaml.saml.saml2.encryption.Encrypter.KeyPlacement;  import org.opensaml.saml.saml2.metadata.SPSSODescriptor;  import org.opensaml.saml.security.impl.MetadataCredentialResolver; -import org.opensaml.saml2.metadata.provider.MetadataProvider;  import org.opensaml.security.MetadataCriteria;  import org.opensaml.security.credential.UsageType;  import org.opensaml.security.criteria.UsageCriterion;  import org.opensaml.security.x509.X509Credential;  import org.opensaml.xmlsec.EncryptionParameters; +import org.opensaml.xmlsec.encryption.support.EncryptionException;  import org.opensaml.xmlsec.encryption.support.KeyEncryptionParameters;  import org.opensaml.xmlsec.keyinfo.KeyInfoGeneratorFactory;  import org.slf4j.Logger;  import org.slf4j.LoggerFactory; +import at.gv.egiz.eaaf.modules.pvp2.PvpConstants; +import at.gv.egiz.eaaf.modules.pvp2.api.metadata.IPvp2MetadataProvider; +import at.gv.egiz.eaaf.modules.pvp2.idp.exception.InvalidAssertionEncryptionException; +import at.gv.egiz.eaaf.modules.pvp2.impl.utils.Saml2Utils;  import net.shibboleth.utilities.java.support.resolver.CriteriaSet;  /** @@ -73,7 +73,7 @@ public class AuthResponseBuilder {     * @return PVP2 S-Profile authentication response     * @throws InvalidAssertionEncryptionException In case of an error     */ -  public static Response buildResponse(final MetadataProvider metadataProvider, +  public static Response buildResponse(final IPvp2MetadataProvider metadataProvider,        final String issuerEntityID, final RequestAbstractType req, final DateTime date,        final Assertion assertion, final boolean enableEncryption)        throws InvalidAssertionEncryptionException { | 
