aboutsummaryrefslogtreecommitdiff
path: root/id/server/idserverlib/src/main
diff options
context:
space:
mode:
authorThomas Lenz <tlenz@iaik.tugraz.at>2016-02-24 16:34:29 +0100
committerThomas Lenz <tlenz@iaik.tugraz.at>2016-02-24 16:34:29 +0100
commit897fb60b521e647e15fbca4501066b11032558b6 (patch)
treeed03574c5fd5dca7208b6d1bac253e56baed583a /id/server/idserverlib/src/main
parent8f3e8cb7c0e3bd34d64e1d7310c2eecb9cfefa9a (diff)
parent27208e456df5723a62d83ab7dbe66f2ab0bf6b8e (diff)
downloadmoa-id-spss-897fb60b521e647e15fbca4501066b11032558b6.tar.gz
moa-id-spss-897fb60b521e647e15fbca4501066b11032558b6.tar.bz2
moa-id-spss-897fb60b521e647e15fbca4501066b11032558b6.zip
Merge branch 'EGIZ_project-SSO_session_transfer' of gitlab.iaik.tugraz.at:afitzek/moa-idspss into EGIZ_project-SSO_session_transfer
Conflicts: id/server/auth/pom.xml id/server/modules/moa-id-module-ssoTransfer/src/main/java/at/gv/egovernment/moa/id/auth/modules/ssotransfer/data/SSOTransferAuthenticationData.java id/server/modules/moa-id-module-ssoTransfer/src/main/java/at/gv/egovernment/moa/id/auth/modules/ssotransfer/data/SSOTransferOnlineApplication.java id/server/modules/moa-id-module-ssoTransfer/src/main/java/at/gv/egovernment/moa/id/auth/modules/ssotransfer/task/InitializeRestoreSSOSessionTask.java id/server/modules/moa-id-module-ssoTransfer/src/main/java/at/gv/egovernment/moa/id/auth/modules/ssotransfer/task/RestoreSSOSessionTask.java id/server/modules/moa-id-module-ssoTransfer/src/main/java/at/gv/egovernment/moa/id/auth/modules/ssotransfer/utils/GUIUtils.java id/server/modules/moa-id-module-ssoTransfer/src/main/java/at/gv/egovernment/moa/id/auth/modules/ssotransfer/utils/SSOContainerUtils.java id/server/modules/moa-id-module-ssoTransfer/src/main/resources/at/gv/egovernment/moa/id/auth/modules/ssotransfer/SSOTransfer.authmodule.beans.xml id/server/modules/moa-id-module-ssoTransfer/src/main/resources/at/gv/egovernment/moa/id/auth/modules/ssotransfer/SSOTransferAuthentication.process.xml id/server/modules/pom.xml
Diffstat (limited to 'id/server/idserverlib/src/main')
-rw-r--r--id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/signer/IDPCredentialProvider.java43
1 files changed, 36 insertions, 7 deletions
diff --git a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/signer/IDPCredentialProvider.java b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/signer/IDPCredentialProvider.java
index 8fb4ec3cf..abc4eb4a9 100644
--- a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/signer/IDPCredentialProvider.java
+++ b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/signer/IDPCredentialProvider.java
@@ -29,6 +29,7 @@ import org.springframework.stereotype.Service;
import at.gv.egovernment.moa.id.config.auth.AuthConfiguration;
import at.gv.egovernment.moa.util.FileUtils;
+import at.gv.egovernment.moa.util.MiscUtil;
@Service("IDPCredentialProvider")
public class IDPCredentialProvider extends AbstractCredentialProvider {
@@ -70,7 +71,11 @@ public class IDPCredentialProvider extends AbstractCredentialProvider {
if (props == null)
props = authConfig.getGeneralPVP2ProperiesConfig();
- return props.getProperty(IDP_KS_PASS).trim();
+ String value = props.getProperty(IDP_KS_PASS);
+ if (MiscUtil.isNotEmpty(value))
+ return value.trim();
+ else
+ return null;
}
/* (non-Javadoc)
@@ -81,7 +86,11 @@ public class IDPCredentialProvider extends AbstractCredentialProvider {
if (props == null)
props = authConfig.getGeneralPVP2ProperiesConfig();
- return props.getProperty(IDP_KEYALIASMETADATA).trim();
+ String value = props.getProperty(IDP_KEYALIASMETADATA);
+ if (MiscUtil.isNotEmpty(value))
+ return value.trim();
+ else
+ return null;
}
/* (non-Javadoc)
@@ -92,7 +101,11 @@ public class IDPCredentialProvider extends AbstractCredentialProvider {
if (props == null)
props = authConfig.getGeneralPVP2ProperiesConfig();
- return props.getProperty(IDP_KEY_PASSMETADATA).trim();
+ String value = props.getProperty(IDP_KEY_PASSMETADATA);
+ if (MiscUtil.isNotEmpty(value))
+ return value.trim();
+ else
+ return null;
}
/* (non-Javadoc)
@@ -103,7 +116,11 @@ public class IDPCredentialProvider extends AbstractCredentialProvider {
if (props == null)
props = authConfig.getGeneralPVP2ProperiesConfig();
- return props.getProperty(IDP_KEYALIASASSERTION).trim();
+ String value = props.getProperty(IDP_KEYALIASASSERTION);
+ if (MiscUtil.isNotEmpty(value))
+ return value.trim();
+ else
+ return null;
}
/* (non-Javadoc)
@@ -114,7 +131,11 @@ public class IDPCredentialProvider extends AbstractCredentialProvider {
if (props == null)
props = authConfig.getGeneralPVP2ProperiesConfig();
- return props.getProperty(IDP_KEY_PASSASSERTION).trim();
+ String value = props.getProperty(IDP_KEY_PASSASSERTION);
+ if (MiscUtil.isNotEmpty(value))
+ return value.trim();
+ else
+ return null;
}
/* (non-Javadoc)
@@ -125,7 +146,11 @@ public class IDPCredentialProvider extends AbstractCredentialProvider {
if (props == null)
props = authConfig.getGeneralPVP2ProperiesConfig();
- return props.getProperty(IDP_KEYALIASENCRYTPION).trim();
+ String value = props.getProperty(IDP_KEYALIASENCRYTPION);
+ if (MiscUtil.isNotEmpty(value))
+ return value.trim();
+ else
+ return null;
}
/* (non-Javadoc)
@@ -136,7 +161,11 @@ public class IDPCredentialProvider extends AbstractCredentialProvider {
if (props == null)
props = authConfig.getGeneralPVP2ProperiesConfig();
- return props.getProperty(IDP_KEYALIASENCRYTPION).trim();
+ String value = props.getProperty(IDP_KEY_PASSENCRYTPION);
+ if (MiscUtil.isNotEmpty(value))
+ return value.trim();
+ else
+ return null;
}
/* (non-Javadoc)