diff options
Diffstat (limited to 'id/server/idserverlib')
18 files changed, 111 insertions, 54 deletions
| diff --git a/id/server/idserverlib/pom.xml b/id/server/idserverlib/pom.xml index 1fd6b3695..67a5a6e68 100644 --- a/id/server/idserverlib/pom.xml +++ b/id/server/idserverlib/pom.xml @@ -175,12 +175,21 @@              </exclusions>
          </dependency>
 -				<dependency>
 -					<groupId>commons-collections</groupId>
 -					<artifactId>commons-collections</artifactId>
 -				</dependency>
 +		<dependency>
 +			<groupId>commons-collections</groupId>
 +			<artifactId>commons-collections</artifactId>
 +		</dependency>
 -		  <dependency>
 +		<dependency>				
 +			<groupId>javax.xml.ws</groupId>
 +    		<artifactId>jaxws-api</artifactId>
 +		</dependency>
 +		<dependency>
 +			<groupId>javax.jws</groupId>
 +    		<artifactId>javax.jws-api</artifactId>
 +		</dependency>
 +				
 +		<dependency>
          	<groupId>org.apache.cxf</groupId>
          	<artifactId>cxf-rt-frontend-jaxws</artifactId>
      	</dependency>
 diff --git a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/advancedlogging/MOAIDEventConstants.java b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/advancedlogging/MOAIDEventConstants.java index d654eb359..f6d116198 100644 --- a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/advancedlogging/MOAIDEventConstants.java +++ b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/advancedlogging/MOAIDEventConstants.java @@ -97,6 +97,12 @@ public interface MOAIDEventConstants extends EventConstants {  	public static final int AUTHPROCESS_EIDAS_AT_CONNECTOR_RECEIVED = 6202;  	public static final int AUTHPROCESS_EIDAS_AT_CONNECTOR_RECEIVED_ERROR = 6203;  	public static final int AUTHPROCESS_EIDAS_AT_CONNECTOR_MDS_VALID = 6204; + +	public static final int AUTHPROCESS_EID_SERVICE_SELECTED = 6300; +	public static final int AUTHPROCESS_EID_SERVICE_REQUESTED = 6301; +	public static final int AUTHPROCESS_EID_SERVICE_RECEIVED = 6302; +	public static final int AUTHPROCESS_EID_SERVICE_RECEIVED_ERROR = 6303; +	public static final int AUTHPROCESS_EID_SERVICE_ATTRIBUTES_VALID = 6304;  	//person information  	public static final int PERSONAL_INFORMATION_PROF_REPRESENTATIVE_BPK = 5000; diff --git a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/auth/MOAIDAuthInitializer.java b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/auth/MOAIDAuthInitializer.java index a35b45af2..b0f452861 100644 --- a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/auth/MOAIDAuthInitializer.java +++ b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/auth/MOAIDAuthInitializer.java @@ -158,7 +158,7 @@ public class MOAIDAuthInitializer {          fixJava8_141ProblemWithSSLAlgorithms(); -        if (!authConf.getBasicMOAIDConfigurationBoolean(ConfigurationProviderImpl.VALIDATION_AUTHBLOCK_TARGETFRIENDLYNAME, true)) +        if (!authConf.getBasicConfigurationBoolean(ConfigurationProviderImpl.VALIDATION_AUTHBLOCK_TARGETFRIENDLYNAME, true))          	Logger.info("AuthBlock 'TargetFriendlyName' validation deactivated"); diff --git a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/auth/builder/AuthenticationDataBuilder.java b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/auth/builder/AuthenticationDataBuilder.java index 25a508687..09d517f5a 100644 --- a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/auth/builder/AuthenticationDataBuilder.java +++ b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/auth/builder/AuthenticationDataBuilder.java @@ -117,7 +117,7 @@ public class AuthenticationDataBuilder extends AbstractAuthenticationDataBuilder  	@PostConstruct  	private void initialize() { -		 Map<String, String> pubKeyMap = authConfig.getBasicMOAIDConfigurationWithPrefix(CONFIGURATION_PROP_FOREIGN_BPK_ENC_KEYS); +		 Map<String, String> pubKeyMap = authConfig.getBasicConfigurationWithPrefix(CONFIGURATION_PROP_FOREIGN_BPK_ENC_KEYS);  		 for (Entry<String, String> el : pubKeyMap.entrySet()) {  			 try {  				encKeyMap.put(el.getKey(), new X509Certificate(Base64Utils.decode(el.getValue(), false))); diff --git a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/auth/modules/BKUSelectionModuleImpl.java b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/auth/modules/BKUSelectionModuleImpl.java index 48d652671..bd183d906 100644 --- a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/auth/modules/BKUSelectionModuleImpl.java +++ b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/auth/modules/BKUSelectionModuleImpl.java @@ -22,9 +22,13 @@   */  package at.gv.egovernment.moa.id.auth.modules; +import org.springframework.beans.factory.annotation.Autowired; + +import at.gv.egiz.eaaf.core.api.idp.IConfiguration;  import at.gv.egiz.eaaf.core.api.idp.auth.modules.AuthModule;  import at.gv.egiz.eaaf.core.api.idp.process.ExecutionContext;  import at.gv.egovernment.moa.id.commons.MOAIDAuthConstants; +import at.gv.egovernment.moa.id.config.auth.PropertyBasedAuthConfigurationProvider;  /**   * @author tlenz @@ -32,6 +36,8 @@ import at.gv.egovernment.moa.id.commons.MOAIDAuthConstants;   */  public class BKUSelectionModuleImpl implements AuthModule { +	@Autowired(required=false) private IConfiguration configuration; +	  	/* (non-Javadoc)  	 * @see at.gv.egovernment.moa.id.auth.modules.AuthModule#getPriority()  	 */ @@ -50,7 +56,8 @@ public class BKUSelectionModuleImpl implements AuthModule {  		if (performBKUSelectionObj != null && performBKUSelectionObj instanceof Boolean)  			performBKUSelection = (boolean) performBKUSelectionObj; -		if (performBKUSelection) +		if (performBKUSelection && configuration != null +				&& configuration.getBasicConfigurationBoolean(PropertyBasedAuthConfigurationProvider.PROP_MOAID_MODE, false))  			return "BKUSelectionProcess";  		else diff --git a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/auth/servlet/IDPSingleLogOutServlet.java b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/auth/servlet/IDPSingleLogOutServlet.java index b7970e4fd..496501760 100644 --- a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/auth/servlet/IDPSingleLogOutServlet.java +++ b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/auth/servlet/IDPSingleLogOutServlet.java @@ -43,6 +43,7 @@ import at.gv.egiz.eaaf.core.api.idp.auth.services.IProtocolAuthenticationService  import at.gv.egiz.eaaf.core.api.idp.slo.ISLOInformationContainer;  import at.gv.egiz.eaaf.core.exceptions.EAAFException;  import at.gv.egiz.eaaf.core.exceptions.GUIBuildException; +import at.gv.egiz.eaaf.core.exceptions.SLOException;  import at.gv.egiz.eaaf.core.impl.idp.controller.AbstractController;  import at.gv.egiz.eaaf.core.impl.utils.HTTPUtils;  import at.gv.egiz.eaaf.core.impl.utils.Random; @@ -72,11 +73,10 @@ public class IDPSingleLogOutServlet extends AbstractController {  	@Autowired SSOManager ssoManager;  	@Autowired IAuthenticationManager authManager; -	@Autowired IAuthenticationSessionStoreage authenicationStorage; -	@Autowired SingleLogOutBuilder sloBuilder; -	@Autowired IProtocolAuthenticationService protAuthService; +	@Autowired IAuthenticationSessionStoreage authenicationStorage;	 +	@Autowired IProtocolAuthenticationService protAuthService;		  	@Autowired(required=true) private IGUIFormBuilder guiBuilder; -	 +	@Autowired(required=false) SingleLogOutBuilder sloBuilder;  	@RequestMapping(value = "/idpSingleLogout", method = {RequestMethod.GET})  	public void doGet(HttpServletRequest req, HttpServletResponse resp) @@ -150,8 +150,15 @@ public class IDPSingleLogOutServlet extends AbstractController {  					if(MiscUtil.isNotEmpty(internalSSOId)) {  						ISLOInformationContainer sloInfoContainer = authManager.performSingleLogOut(req, resp, null, internalSSOId); -						Logger.debug("Starting technical SLO process ... "); -						sloBuilder.toTechnicalLogout(sloInfoContainer, req, resp, authURL);						 +						if (sloBuilder != null) { +							Logger.debug("Starting technical SLO process ... "); +							sloBuilder.toTechnicalLogout(sloInfoContainer, req, resp, authURL); +							 +						} else { +							Logger.warn("Can NOT perfom Single LogOut process! NO SLOBuilder in ClassPath"); +							throw new SLOException("init.05", new Object[] {"Missing depentency or modul not active"}); +							 +						}  						return;  					} @@ -180,7 +187,7 @@ public class IDPSingleLogOutServlet extends AbstractController {  						String redirectURL = null;  						IRequest sloReq = sloContainer.getSloRequest(); -						if (sloReq != null && sloReq instanceof PVPSProfilePendingRequest) { +						if (sloBuilder != null && sloReq != null && sloReq instanceof PVPSProfilePendingRequest) {  							//send SLO response to SLO request issuer  							SingleLogoutService sloService = sloBuilder.getResponseSLODescriptor((PVPSProfilePendingRequest)sloContainer.getSloRequest());  							LogoutResponse message = sloBuilder.buildSLOResponseMessage(sloService, (PVPSProfilePendingRequest)sloContainer.getSloRequest(), sloContainer.getSloFailedOAs()); diff --git a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/config/auth/PropertyBasedAuthConfigurationProvider.java b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/config/auth/PropertyBasedAuthConfigurationProvider.java index fff019ae7..eae7aae9d 100644 --- a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/config/auth/PropertyBasedAuthConfigurationProvider.java +++ b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/config/auth/PropertyBasedAuthConfigurationProvider.java @@ -51,6 +51,8 @@ import iaik.pki.revocation.RevocationSourceTypes;  public class PropertyBasedAuthConfigurationProvider extends ConfigurationProviderImpl implements AuthConfiguration { +	public static final String PROP_MOAID_MODE = "general.moaidmode.active"; +	  	private static final boolean TRUST_MANAGER_REVOCATION_CHECKING_DEFAULT = true;  	private MOAIDConfiguration configuration;  @@ -231,7 +233,9 @@ public class PropertyBasedAuthConfigurationProvider extends ConfigurationProvide  			allowedProtcols.setSAML1Active(  					configuration.getBooleanValue(MOAIDConfigurationConstants.GENERAL_PROTOCOLS_SAML1_ENABLED, false));  			allowedProtcols.setPVP21Active( -					configuration.getBooleanValue(MOAIDConfigurationConstants.GENERAL_PROTOCOLS_PVP2X_ENABLED, true)); +					configuration.getBooleanValue( +							MOAIDConfigurationConstants.GENERAL_PROTOCOLS_PVP2X_ENABLED, true)  +					&& getBasicConfigurationBoolean(PROP_MOAID_MODE, false));  			return allowedProtcols; @@ -1307,5 +1311,4 @@ public class PropertyBasedAuthConfigurationProvider extends ConfigurationProvide  			}					  		}  	} -  } diff --git a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/data/IMOAAuthData.java b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/data/IMOAAuthData.java index af4cf6fa7..1e42b1e1b 100644 --- a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/data/IMOAAuthData.java +++ b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/data/IMOAAuthData.java @@ -4,11 +4,11 @@ import java.util.List;  import org.w3c.dom.Element; -import at.gv.egiz.eaaf.core.api.idp.IAuthData; +import at.gv.egiz.eaaf.core.api.idp.IEidAuthData;  import at.gv.egiz.eaaf.core.impl.data.Pair;  import at.gv.egovernment.moa.id.commons.api.data.IMISMandate; -public interface IMOAAuthData extends IAuthData{ +public interface IMOAAuthData extends IEidAuthData{  	 @Deprecated  	 /** @@ -34,7 +34,6 @@ public interface IMOAAuthData extends IAuthData{  	  */  	 List<Pair<String, String>> getEncMandateNaturalPersonbPKList(); -     byte[] getSignerCertificate();  	 String getAuthBlock();	   	 boolean isPublicAuthority();  	 String getPublicAuthorityCode(); diff --git a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/data/MOAAuthenticationData.java b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/data/MOAAuthenticationData.java index 897a06e62..9b6de0f29 100644 --- a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/data/MOAAuthenticationData.java +++ b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/data/MOAAuthenticationData.java @@ -30,7 +30,7 @@ import org.w3c.dom.Element;  import at.gv.egiz.eaaf.core.api.data.ILoALevelMapper;  import at.gv.egiz.eaaf.core.impl.data.Pair; -import at.gv.egiz.eaaf.core.impl.idp.AuthenticationData; +import at.gv.egiz.eaaf.core.impl.idp.EidAuthenticationData;  import at.gv.egiz.eaaf.core.impl.utils.DOMUtils;  import at.gv.egiz.eaaf.modules.pvp2.sp.exception.AssertionAttributeExtractorExeption;  import at.gv.egovernment.moa.id.commons.api.data.IMISMandate; @@ -45,14 +45,13 @@ import at.gv.egovernment.moa.util.MiscUtil;   * @author tlenz   *   */ -public class MOAAuthenticationData extends AuthenticationData implements IMOAAuthData, Serializable { +public class MOAAuthenticationData extends EidAuthenticationData implements IMOAAuthData, Serializable {  	private static final long serialVersionUID = 1L;  	private boolean qualifiedCertificate;  	private boolean publicAuthority;  	private String publicAuthorityCode;  	private String bkuURL; -	private byte[] signerCertificate = null;  	private String authBlock = null;	  	private String QAALevel = null; @@ -116,21 +115,6 @@ public class MOAAuthenticationData extends AuthenticationData implements IMOAAut  		return this.encbPKList;  	} -	 -	@Override -	public byte[] getSignerCertificate() { -		return signerCertificate; -	} - - -	/** -	 * @param signerCertificate the signerCertificate to set -	 */ -	public void setSignerCertificate(byte[] signerCertificate) { -		this.signerCertificate = signerCertificate; -	} - -  	@Override  	public String getAuthBlock() {  		return authBlock; diff --git a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/moduls/AuthenticationManager.java b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/moduls/AuthenticationManager.java index 77abe07af..9beeb6cc2 100644 --- a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/moduls/AuthenticationManager.java +++ b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/moduls/AuthenticationManager.java @@ -67,7 +67,7 @@ public class AuthenticationManager extends AbstractAuthenticationManager {  	public static final String MOA_AUTHENTICATED = "MoaAuthenticated";  	@Autowired private IAuthenticationSessionStoreage authenticatedSessionStore;	 -	@Autowired private SingleLogOutBuilder sloBuilder;; +	@Autowired(required=false) private SingleLogOutBuilder sloBuilder;;  	@Override @@ -118,8 +118,18 @@ public class AuthenticationManager extends AbstractAuthenticationManager {  		sloContainer.setSessionID(uniqueSessionIdentifier);  		sloContainer.setSloRequest(pvpReq); -		sloBuilder.parseActiveIDPs(sloContainer, dbIDPs, pvpSLOIssuer); -		sloBuilder.parseActiveOAs(sloContainer, dbOAs, pvpSLOIssuer); +		if (sloBuilder != null) { +			Logger.trace("Parse active SPs into SLOContainer ... "); +			sloBuilder.parseActiveIDPs(sloContainer, dbIDPs, pvpSLOIssuer); +			sloBuilder.parseActiveOAs(sloContainer, dbOAs, pvpSLOIssuer); +			 +		} else { +			Logger.warn("NO SLOBuilder in ClassPath / Single LogOut NOT possible! Mark SLO as FAILED"); +			sloContainer.putFailedOA(pvpReq.getAuthURL()); +			 +			Logger.info("Only the IDP session will be closed soon ..."); +						 +		}  		Logger.debug("Active SSO Service-Provider: "   				 + " BackChannel:" + sloContainer.getActiveBackChannelOAs().size() diff --git a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/metadata/MOAMetadataProvider.java b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/metadata/MOAMetadataProvider.java index 4fc37d88f..ff5379498 100644 --- a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/metadata/MOAMetadataProvider.java +++ b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/metadata/MOAMetadataProvider.java @@ -146,14 +146,14 @@ public class MOAMetadataProvider extends AbstractChainingMetadataProvider {  				//FIX: change hostname validation default flag to true when httpClient is updated to > 4.4  				MOAHttpProtocolSocketFactory protoSocketFactory = new MOAHttpProtocolSocketFactory(  						PVPConstants.SSLSOCKETFACTORYNAME, -						moaAuthConfig.getBasicMOAIDConfigurationBoolean( +						moaAuthConfig.getBasicConfigurationBoolean(  								AuthConfiguration.PROP_KEY_SSL_USE_JVM_TRUSTSTORE, false),  						moaAuthConfig.getTrustedCACertificates(),  						null,  						AuthConfiguration.DEFAULT_X509_CHAININGMODE,   						moaAuthConfig.isTrustmanagerrevoationchecking(),  						moaAuthConfig.getRevocationMethodOrder(), -						moaAuthConfig.getBasicMOAIDConfigurationBoolean( +						moaAuthConfig.getBasicConfigurationBoolean(  								AuthConfiguration.PROP_KEY_SSL_HOSTNAME_VALIDATION, false));  				httpClient.setCustomSSLTrustStore(metadataURL, protoSocketFactory); @@ -173,7 +173,7 @@ public class MOAMetadataProvider extends AbstractChainingMetadataProvider {  		filterChain.getFilters().add(new SchemaValidationFilter(moaAuthConfig.isPVPSchemaValidationActive()));  		filterChain.getFilters().add(new MetadataSignatureFilter(metadataURL, certificate));  		filterChain.getFilters().add( -				new PVPEntityCategoryFilter(authConfig.getBasicMOAIDConfigurationBoolean( +				new PVPEntityCategoryFilter(authConfig.getBasicConfigurationBoolean(  						AuthConfiguration.PROP_KEY_PROTOCOL_PVP_METADATA_ENTITYCATEGORY_RESOLVER,   						false))); diff --git a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/signer/IDPCredentialProvider.java b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/signer/IDPCredentialProvider.java index 389d97b18..ad7328433 100644 --- a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/signer/IDPCredentialProvider.java +++ b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/signer/IDPCredentialProvider.java @@ -25,6 +25,7 @@ package at.gv.egovernment.moa.id.protocols.pvp2x.signer;  import java.util.Properties;  import org.springframework.beans.factory.annotation.Autowired; +import org.springframework.stereotype.Service;  import at.gv.egiz.eaaf.core.exceptions.EAAFException;  import at.gv.egiz.eaaf.core.impl.utils.FileUtils; @@ -32,7 +33,7 @@ import at.gv.egiz.eaaf.modules.pvp2.impl.utils.AbstractCredentialProvider;  import at.gv.egovernment.moa.id.commons.api.AuthConfiguration;  import at.gv.egovernment.moa.util.MiscUtil; -//@Service("PVPIDPCredentialProvider") +@Service("PVPIDPCredentialProvider")  public class IDPCredentialProvider extends AbstractCredentialProvider {	  	public static final String IDP_JAVAKEYSTORE = "idp.ks.file";  	public static final String IDP_KS_PASS = "idp.ks.kspassword"; diff --git a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/utils/MOASAMLSOAPClient.java b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/utils/MOASAMLSOAPClient.java index bd908f894..534f6797b 100644 --- a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/utils/MOASAMLSOAPClient.java +++ b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/utils/MOASAMLSOAPClient.java @@ -76,14 +76,14 @@ public class MOASAMLSOAPClient {  				SecureProtocolSocketFactory sslprotocolsocketfactory =   						new MOAHttpProtocolSocketFactory(  								PVPConstants.SSLSOCKETFACTORYNAME, -								AuthConfigurationProviderFactory.getInstance().getBasicMOAIDConfigurationBoolean( +								AuthConfigurationProviderFactory.getInstance().getBasicConfigurationBoolean(  										AuthConfiguration.PROP_KEY_SSL_USE_JVM_TRUSTSTORE, false),  								AuthConfigurationProviderFactory.getInstance().getTrustedCACertificates(),  								null,  								AuthConfigurationProviderFactory.getInstance().getDefaultChainingMode(),   								AuthConfigurationProviderFactory.getInstance().isTrustmanagerrevoationchecking(),  								AuthConfigurationProviderFactory.getInstance().getRevocationMethodOrder(), -								AuthConfigurationProviderFactory.getInstance().getBasicMOAIDConfigurationBoolean( +								AuthConfigurationProviderFactory.getInstance().getBasicConfigurationBoolean(  										AuthConfiguration.PROP_KEY_SSL_HOSTNAME_VALIDATION, false));  				clientBuilder.setHttpsProtocolSocketFactory(sslprotocolsocketfactory ); diff --git a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/util/SSLUtils.java b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/util/SSLUtils.java index 6bf44a527..e84bca330 100644 --- a/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/util/SSLUtils.java +++ b/id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/util/SSLUtils.java @@ -94,7 +94,7 @@ public class SSLUtils {  		    ConfigurationProvider conf, String url )  		    throws IOException, GeneralSecurityException, ConfigurationException, PKIException { -	  			boolean useStandardJavaTrustStore = conf.getBasicMOAIDConfigurationBoolean( +	  			boolean useStandardJavaTrustStore = conf.getBasicConfigurationBoolean(  	  					AuthConfiguration.PROP_KEY_SSL_USE_JVM_TRUSTSTORE,   	  					false); @@ -154,7 +154,7 @@ public class SSLUtils {      ConnectionParameterInterface connParam)      throws IOException, GeneralSecurityException, ConfigurationException, PKIException { -	  boolean useStandardJavaTrustStore = conf.getBasicMOAIDConfigurationBoolean( +	  boolean useStandardJavaTrustStore = conf.getBasicConfigurationBoolean(  			  AuthConfiguration.PROP_KEY_SSL_USE_JVM_TRUSTSTORE,   			  false); diff --git a/id/server/idserverlib/src/main/resources/META-INF/services/at.gv.egiz.eaaf.core.api.idp.auth.modules.AuthModule b/id/server/idserverlib/src/main/resources/META-INF/services/at.gv.egiz.eaaf.core.api.idp.auth.modules.AuthModule index 5116c2a08..65452db3c 100644 --- a/id/server/idserverlib/src/main/resources/META-INF/services/at.gv.egiz.eaaf.core.api.idp.auth.modules.AuthModule +++ b/id/server/idserverlib/src/main/resources/META-INF/services/at.gv.egiz.eaaf.core.api.idp.auth.modules.AuthModule @@ -1,2 +1 @@ -at.gv.egovernment.moa.id.auth.modules.BKUSelectionModuleImpl  at.gv.egovernment.moa.id.auth.modules.SingleSignOnConsentsModuleImpl
\ No newline at end of file diff --git a/id/server/idserverlib/src/main/resources/moaid.authentication.beans.xml b/id/server/idserverlib/src/main/resources/moaid.authentication.beans.xml index 794b62477..598376261 100644 --- a/id/server/idserverlib/src/main/resources/moaid.authentication.beans.xml +++ b/id/server/idserverlib/src/main/resources/moaid.authentication.beans.xml @@ -22,6 +22,32 @@  	<context:component-scan base-package="at.gv.egovernment.moa.id.auth.servlet" />  	<context:component-scan base-package="at.gv.egovernment.moa.id.protocols" /> +   	<bean 	id="bkuSelectionProcess" +   			class="at.gv.egovernment.moa.id.auth.modules.BKUSelectionModuleImpl"/> +    +   	<bean 	id="eaafProtocolAuthenticationService" +			class="at.gv.egiz.eaaf.core.impl.idp.auth.services.ProtocolAuthenticationService"> +		<property name="guiBuilder" ref="guiFormBuilder" /> +	</bean> +        + 	<bean id="PVPIDPCredentialProvider" + 				class="at.gv.egovernment.moa.id.protocols.pvp2x.signer.IDPCredentialProvider" /> +  + 	<bean id="PVP2XProtocol" + 				class="at.gv.egovernment.moa.id.protocols.pvp2x.PVP2XProtocol"> +		<property name="pvpIDPCredentials" ref="PVPIDPCredentialProvider" /> + 	</bean> +  +  	<bean id="pvpMetadataService" + 				class="at.gv.egiz.eaaf.modules.pvp2.idp.impl.MetadataAction"> +		<property name="pvpIDPCredentials" ref="PVPIDPCredentialProvider" /> + 	</bean> +  +   	<bean id="PVPAuthenticationRequestAction" + 				class="at.gv.egiz.eaaf.modules.pvp2.idp.impl.AuthenticationAction"> +		<property name="pvpIDPCredentials" ref="PVPIDPCredentialProvider" /> + 	</bean> +      	<bean id="MOAAuthnRequestValidator"   			class="at.gv.egovernment.moa.id.protocols.pvp2x.validation.AuthnRequestValidator" /> diff --git a/id/server/idserverlib/src/main/resources/resources/properties/id_messages_de.properties b/id/server/idserverlib/src/main/resources/resources/properties/id_messages_de.properties index 3b636aaee..acce76689 100644 --- a/id/server/idserverlib/src/main/resources/resources/properties/id_messages_de.properties +++ b/id/server/idserverlib/src/main/resources/resources/properties/id_messages_de.properties @@ -62,6 +62,8 @@ init.00=MOA-ID-Auth wurde erfolgreich gestartet  init.01=Fehler beim Aktivieren des IAIK-JCE/JSSE/JDK1.3 Workaround\: SSL ist m\u00F6glicherweise nicht verf\u00FCgbar
  init.02=Fehler beim Starten des Service MOA-ID-Auth
  init.04=Fehler beim Datenbankzugriff mit der SessionID {0}
 +init.05=Allgemeiner interner Fehler! Ursache: '{0}'
 +
  internal.00=W\u00e4hrend des Anmeldevorgangs wurde ein nicht erlaubter Prozesszustand erreicht wodurch der Anmeldeprozess aus sicherheitsgr\u00FCnden abgebrochen wurde. 
  internal.01=W\u00e4hrend des Abmeldevorgangs wurde ein nicht erlaubter Prozesszustand erreicht wodurch der Abmeldeprozess abgebrochen wurde.
 diff --git a/id/server/idserverlib/src/test/java/at/gv/egovernment/moa/id/config/auth/data/DummyAuthConfig.java b/id/server/idserverlib/src/test/java/at/gv/egovernment/moa/id/config/auth/data/DummyAuthConfig.java index 75f704045..1ab54471c 100644 --- a/id/server/idserverlib/src/test/java/at/gv/egovernment/moa/id/config/auth/data/DummyAuthConfig.java +++ b/id/server/idserverlib/src/test/java/at/gv/egovernment/moa/id/config/auth/data/DummyAuthConfig.java @@ -113,7 +113,7 @@ public class DummyAuthConfig implements AuthConfiguration {  	}  	@Override -	public Map<String, String> getBasicMOAIDConfigurationWithPrefix(String prefix) { +	public Map<String, String> getBasicConfigurationWithPrefix(String prefix) {  		Map<String, String> result = new HashMap<String, String>();  		if (AuthenticationDataBuilder.CONFIGURATION_PROP_FOREIGN_BPK_ENC_KEYS.equals(prefix)) {  			result.put("BMI+T1", "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"); @@ -419,7 +419,7 @@ public class DummyAuthConfig implements AuthConfiguration {  	}  	@Override -	public boolean getBasicMOAIDConfigurationBoolean(String key, boolean defaultValue) { +	public boolean getBasicConfigurationBoolean(String key, boolean defaultValue) {  		if (AbstractAuthenticationDataBuilder.CONFIG_PROP_ENABLE_IDL_ATTRIBUTE_ESCAPEING.equals(key)) {  			if (isIDLEscapingEnabled == null)  				return defaultValue; @@ -459,7 +459,11 @@ public class DummyAuthConfig implements AuthConfiguration {  	public void setIsIDLEscapingEnabled(Boolean isIDLEscapingEnabled) {  		this.isIDLEscapingEnabled = isIDLEscapingEnabled;  	} -	 -	 + +	@Override +	public Boolean getBasicConfigurationBoolean(String key) { +		// TODO Auto-generated method stub +		return null; +	}  } | 
