diff options
| author | Thomas Lenz <tlenz@iaik.tugraz.at> | 2016-02-24 16:34:29 +0100 | 
|---|---|---|
| committer | Thomas Lenz <tlenz@iaik.tugraz.at> | 2016-02-24 16:34:29 +0100 | 
| commit | 897fb60b521e647e15fbca4501066b11032558b6 (patch) | |
| tree | ed03574c5fd5dca7208b6d1bac253e56baed583a /id/server/idserverlib/src | |
| parent | 8f3e8cb7c0e3bd34d64e1d7310c2eecb9cfefa9a (diff) | |
| parent | 27208e456df5723a62d83ab7dbe66f2ab0bf6b8e (diff) | |
| download | moa-id-spss-897fb60b521e647e15fbca4501066b11032558b6.tar.gz moa-id-spss-897fb60b521e647e15fbca4501066b11032558b6.tar.bz2 moa-id-spss-897fb60b521e647e15fbca4501066b11032558b6.zip | |
Merge branch 'EGIZ_project-SSO_session_transfer' of gitlab.iaik.tugraz.at:afitzek/moa-idspss into EGIZ_project-SSO_session_transfer
Conflicts:
	id/server/auth/pom.xml
	id/server/modules/moa-id-module-ssoTransfer/src/main/java/at/gv/egovernment/moa/id/auth/modules/ssotransfer/data/SSOTransferAuthenticationData.java
	id/server/modules/moa-id-module-ssoTransfer/src/main/java/at/gv/egovernment/moa/id/auth/modules/ssotransfer/data/SSOTransferOnlineApplication.java
	id/server/modules/moa-id-module-ssoTransfer/src/main/java/at/gv/egovernment/moa/id/auth/modules/ssotransfer/task/InitializeRestoreSSOSessionTask.java
	id/server/modules/moa-id-module-ssoTransfer/src/main/java/at/gv/egovernment/moa/id/auth/modules/ssotransfer/task/RestoreSSOSessionTask.java
	id/server/modules/moa-id-module-ssoTransfer/src/main/java/at/gv/egovernment/moa/id/auth/modules/ssotransfer/utils/GUIUtils.java
	id/server/modules/moa-id-module-ssoTransfer/src/main/java/at/gv/egovernment/moa/id/auth/modules/ssotransfer/utils/SSOContainerUtils.java
	id/server/modules/moa-id-module-ssoTransfer/src/main/resources/at/gv/egovernment/moa/id/auth/modules/ssotransfer/SSOTransfer.authmodule.beans.xml
	id/server/modules/moa-id-module-ssoTransfer/src/main/resources/at/gv/egovernment/moa/id/auth/modules/ssotransfer/SSOTransferAuthentication.process.xml
	id/server/modules/pom.xml
Diffstat (limited to 'id/server/idserverlib/src')
| -rw-r--r-- | id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/signer/IDPCredentialProvider.java | 43 | 
1 files changed, 36 insertions, 7 deletions
| diff --git a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/signer/IDPCredentialProvider.java b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/signer/IDPCredentialProvider.java index 8fb4ec3cf..abc4eb4a9 100644 --- a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/signer/IDPCredentialProvider.java +++ b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/signer/IDPCredentialProvider.java @@ -29,6 +29,7 @@ import org.springframework.stereotype.Service;  import at.gv.egovernment.moa.id.config.auth.AuthConfiguration;  import at.gv.egovernment.moa.util.FileUtils; +import at.gv.egovernment.moa.util.MiscUtil;  @Service("IDPCredentialProvider")  public class IDPCredentialProvider extends AbstractCredentialProvider {	 @@ -70,7 +71,11 @@ public class IDPCredentialProvider extends AbstractCredentialProvider {  		if (props == null)  			props = authConfig.getGeneralPVP2ProperiesConfig(); -		return props.getProperty(IDP_KS_PASS).trim(); +		String value = props.getProperty(IDP_KS_PASS); +		if (MiscUtil.isNotEmpty(value)) +			return value.trim(); +		else +			return null;  	}  	/* (non-Javadoc) @@ -81,7 +86,11 @@ public class IDPCredentialProvider extends AbstractCredentialProvider {  		if (props == null)  			props = authConfig.getGeneralPVP2ProperiesConfig(); -		return props.getProperty(IDP_KEYALIASMETADATA).trim(); +		String value = props.getProperty(IDP_KEYALIASMETADATA); +		if (MiscUtil.isNotEmpty(value)) +			return value.trim(); +		else +			return null;  	}  	/* (non-Javadoc) @@ -92,7 +101,11 @@ public class IDPCredentialProvider extends AbstractCredentialProvider {  		if (props == null)  			props = authConfig.getGeneralPVP2ProperiesConfig(); -		return props.getProperty(IDP_KEY_PASSMETADATA).trim(); +		String value = props.getProperty(IDP_KEY_PASSMETADATA); +		if (MiscUtil.isNotEmpty(value)) +			return value.trim(); +		else +			return null;  	}  	/* (non-Javadoc) @@ -103,7 +116,11 @@ public class IDPCredentialProvider extends AbstractCredentialProvider {  		if (props == null)  			props = authConfig.getGeneralPVP2ProperiesConfig(); -		return props.getProperty(IDP_KEYALIASASSERTION).trim(); +		String value = props.getProperty(IDP_KEYALIASASSERTION); +		if (MiscUtil.isNotEmpty(value)) +			return value.trim(); +		else +			return null;  	}  	/* (non-Javadoc) @@ -114,7 +131,11 @@ public class IDPCredentialProvider extends AbstractCredentialProvider {  		if (props == null)  			props = authConfig.getGeneralPVP2ProperiesConfig(); -		return props.getProperty(IDP_KEY_PASSASSERTION).trim(); +		String value = props.getProperty(IDP_KEY_PASSASSERTION); +		if (MiscUtil.isNotEmpty(value)) +			return value.trim(); +		else +			return null;  	}  	/* (non-Javadoc) @@ -125,7 +146,11 @@ public class IDPCredentialProvider extends AbstractCredentialProvider {  		if (props == null)  			props = authConfig.getGeneralPVP2ProperiesConfig(); -		return props.getProperty(IDP_KEYALIASENCRYTPION).trim(); +		String value = props.getProperty(IDP_KEYALIASENCRYTPION); +		if (MiscUtil.isNotEmpty(value)) +			return value.trim(); +		else +			return null;  	}  	/* (non-Javadoc) @@ -136,7 +161,11 @@ public class IDPCredentialProvider extends AbstractCredentialProvider {  		if (props == null)  			props = authConfig.getGeneralPVP2ProperiesConfig(); -		return props.getProperty(IDP_KEYALIASENCRYTPION).trim(); +		String value = props.getProperty(IDP_KEY_PASSENCRYTPION); +		if (MiscUtil.isNotEmpty(value)) +			return value.trim(); +		else +			return null;  	}  	/* (non-Javadoc) | 
