diff options
| author | gregor <gregor@d688527b-c9ab-4aba-bd8d-4036d912da1d> | 2005-07-13 09:46:39 +0000 | 
|---|---|---|
| committer | gregor <gregor@d688527b-c9ab-4aba-bd8d-4036d912da1d> | 2005-07-13 09:46:39 +0000 | 
| commit | 29c80b52bf13f3646a02d4d3cd17beaf11fecf66 (patch) | |
| tree | d2026a8450ba9ecdb6062e51459b16fd7055904e | |
| parent | 246ab430e61374d6d23b1b30a8ffe614c5589b5f (diff) | |
| download | moa-id-spss-29c80b52bf13f3646a02d4d3cd17beaf11fecf66.tar.gz moa-id-spss-29c80b52bf13f3646a02d4d3cd17beaf11fecf66.tar.bz2 moa-id-spss-29c80b52bf13f3646a02d4d3cd17beaf11fecf66.zip | |
Bug 224 behoben.
git-svn-id: https://joinup.ec.europa.eu/svn/moa-idspss/trunk@377 d688527b-c9ab-4aba-bd8d-4036d912da1d
| -rw-r--r-- | spss.server/history.txt | 4 | ||||
| -rw-r--r-- | spss.server/src/at/gv/egovernment/moa/spss/server/config/ConfigurationProvider.java | 13 | 
2 files changed, 17 insertions, 0 deletions
| diff --git a/spss.server/history.txt b/spss.server/history.txt index 42930a943..cae539a6a 100644 --- a/spss.server/history.txt +++ b/spss.server/history.txt @@ -2,6 +2,10 @@  	Current  ############## +- MOA SS Webservice Clients, die sich mit einem Zertifikat ausweisen, können nun +  auch auf die Key-Groups des anonymen Key-Group-Mappings zugreifen. +  Siehe https://forge.cio.gv.at/bugzilla/show_bug.cgi?id=224. +  - MOA SS fit für Mehrfachsignaturen, d.h. mehrere XML-Signaturen in einem XML-    Dokument gemacht. Bisher scheiterte das an den fix vergebenen Id-Attributen    innerhalb der dsig:Signature-Struktur. diff --git a/spss.server/src/at/gv/egovernment/moa/spss/server/config/ConfigurationProvider.java b/spss.server/src/at/gv/egovernment/moa/spss/server/config/ConfigurationProvider.java index c3ba9fe23..4927bb9b0 100644 --- a/spss.server/src/at/gv/egovernment/moa/spss/server/config/ConfigurationProvider.java +++ b/spss.server/src/at/gv/egovernment/moa/spss/server/config/ConfigurationProvider.java @@ -496,6 +496,19 @@ public class ConfigurationProvider {          return keyGroup.getKeyGroupEntries();        }      } +     +    // If no key group is available for a client identified by a certificate, +    // try to find a key group in the anonymous key group mapping +    if (issuer != null || serial != null) +    { +      mapping = (Map) keyGroupMappings.get(ANONYMOUS_ISSUER_SERIAL); +      if (mapping != null) +      { +        KeyGroup keyGroup = (KeyGroup) mapping.get(keyGroupId); +        if (keyGroup != null) return keyGroup.getKeyGroupEntries(); +      } +    } +          return null;    } | 
