gluu
公開メンバ関数 | 非公開メンバ関数 | 非公開変数類 | 静的非公開変数類 | 全メンバ一覧
org.gluu.oxtrust.ldap.service.ProfileConfigurationService クラス
org.gluu.oxtrust.ldap.service.ProfileConfigurationService の継承関係図
Inheritance graph
org.gluu.oxtrust.ldap.service.ProfileConfigurationService 連携図
Collaboration graph

公開メンバ関数

List< ProfileConfigurationgetAvailableProfileConfigurations ()
 
List< ProfileConfigurationgetProfileConfigurationsList (GluuSAMLTrustRelationship trustRelationship)
 
void parseProfileConfigurations (GluuSAMLTrustRelationship trustRelationship) throws SAXException, IOException, ParserConfigurationException, FactoryConfigurationError, XPathExpressionException
 
boolean isProfileConfigurationPresent (GluuSAMLTrustRelationship trustRelationship, ProfileConfiguration profileConfiguration)
 
void updateProfileConfiguration (GluuSAMLTrustRelationship trustRelationship, ProfileConfiguration profileConfiguration)
 
void removeProfileConfiguration (GluuSAMLTrustRelationship trustRelationship, ProfileConfiguration profileConfiguration)
 
void saveProfileConfigurations (GluuSAMLTrustRelationship trustRelationship, Map< String, FileUploadWrapper > fileWrappers)
 
String saveProfileConfigurationCert (String profileConfigurationCertFileName, InputStream stream)
 

非公開メンバ関数

ProfileConfiguration createProfileConfiguration (String profileConfigurationName)
 
void saveCertificate (GluuSAMLTrustRelationship trustRelationship, Map< String, FileUploadWrapper > fileWrappers, String name)
 

非公開変数類

Logger log
 
TemplateService templateService
 
XmlService xmlService
 
ConfigurationFactory configurationFactory
 
AppConfiguration appConfiguration
 

静的非公開変数類

static final long serialVersionUID = -4691360522345319673L
 
static final String SHIBBOLETH_SSO = "ShibbolethSSO"
 
static final String SAML1_ARTIFACT_RESOLUTION = "SAML1ArtifactResolution"
 
static final String SAML1_ATTRIBUTE_QUERY = "SAML1AttributeQuery"
 
static final String SAML2_SSO = "SAML2SSO"
 
static final String SAML2_ARTIFACT_RESOLUTION = "SAML2ArtifactResolution"
 
static final String SAML2_ATTRIBUTE_QUERY = "SAML2AttributeQuery"
 

詳解

Provides operations with metadata filters

関数詳解

◆ createProfileConfiguration()

ProfileConfiguration org.gluu.oxtrust.ldap.service.ProfileConfigurationService.createProfileConfiguration ( String  profileConfigurationName)
inlineprivate
98  {
99  ProfileConfiguration profileConfiguration = new ProfileConfiguration();
100  profileConfiguration.setName(profileConfigurationName);
101  if (SHIBBOLETH_SSO.equals(profileConfigurationName)) {
102  profileConfiguration.setIncludeAttributeStatement(false);
103  profileConfiguration.setAssertionLifetime(300000);
104  profileConfiguration.setSignResponses("conditional");
105  profileConfiguration.setSignAssertions("never");
106  profileConfiguration.setSignRequests("conditional");
107  }
108 
109  if (SAML1_ARTIFACT_RESOLUTION.equals(profileConfigurationName)) {
110  profileConfiguration.setSignResponses("conditional");
111  profileConfiguration.setSignAssertions("never");
112  profileConfiguration.setSignRequests("conditional");
113  }
114 
115  if (SAML1_ATTRIBUTE_QUERY.equals(profileConfigurationName)) {
116  profileConfiguration.setAssertionLifetime(300000);
117  profileConfiguration.setSignResponses("conditional");
118  profileConfiguration.setSignAssertions("never");
119  profileConfiguration.setSignRequests("conditional");
120  }
121 
122  if (SAML2_SSO.equals(profileConfigurationName)) {
123  profileConfiguration.setIncludeAttributeStatement(true);
124  profileConfiguration.setAssertionLifetime(300000);
125  profileConfiguration.setAssertionProxyCount(0);
126  profileConfiguration.setSignResponses("conditional");
127  profileConfiguration.setSignAssertions("never");
128  profileConfiguration.setSignRequests("conditional");
129  profileConfiguration.setEncryptAssertions("conditional");
130  profileConfiguration.setEncryptNameIds("never");
131  }
132 
133  if (SAML2_ARTIFACT_RESOLUTION.equals(profileConfigurationName)) {
134  profileConfiguration.setSignResponses("conditional");
135  profileConfiguration.setSignAssertions("never");
136  profileConfiguration.setSignRequests("conditional");
137  profileConfiguration.setEncryptAssertions("conditional");
138  profileConfiguration.setEncryptNameIds("never");
139  }
140 
141  if (SAML2_ATTRIBUTE_QUERY.equals(profileConfigurationName)) {
142  profileConfiguration.setAssertionLifetime(300000);
143  profileConfiguration.setAssertionProxyCount(0);
144  profileConfiguration.setSignResponses("conditional");
145  profileConfiguration.setSignAssertions("never");
146  profileConfiguration.setSignRequests("conditional");
147  profileConfiguration.setEncryptAssertions("conditional");
148  profileConfiguration.setEncryptNameIds("never");
149  }
150 
151  return profileConfiguration;
152  }
static final String SAML1_ATTRIBUTE_QUERY
Definition: ProfileConfigurationService.java:56
static final String SAML2_SSO
Definition: ProfileConfigurationService.java:57
static final String SAML2_ATTRIBUTE_QUERY
Definition: ProfileConfigurationService.java:59
static final String SAML1_ARTIFACT_RESOLUTION
Definition: ProfileConfigurationService.java:55
static final String SHIBBOLETH_SSO
Definition: ProfileConfigurationService.java:54
static final String SAML2_ARTIFACT_RESOLUTION
Definition: ProfileConfigurationService.java:58

◆ getAvailableProfileConfigurations()

List<ProfileConfiguration> org.gluu.oxtrust.ldap.service.ProfileConfigurationService.getAvailableProfileConfigurations ( )
inline
76  {
77  String idpTemplatesLocation = configurationFactory.getIDPTemplatesLocation();
78  // File profileConfigurationFolder = new File(configurationFactory.DIR + "shibboleth3" + File.separator + "idp" + File.separator + "ProfileConfiguration");
79  File profileConfigurationFolder = new File(idpTemplatesLocation + "shibboleth3" + File.separator + "idp" + File.separator + "ProfileConfiguration");
80 
81  File[] profileConfigurationTemplates = null;
82  List<ProfileConfiguration> profileConfigurations = new ArrayList<ProfileConfiguration>();
83 
84  if (profileConfigurationFolder.exists() && profileConfigurationFolder.isDirectory()) {
85  profileConfigurationTemplates = profileConfigurationFolder.listFiles(new FilenameFilter() {
86  public boolean accept(File dir, String name) {
87  return name.endsWith("ProfileConfiguration.xml.vm");
88  }
89  });
90  for (File profileConfigurationTemplate : profileConfigurationTemplates) {
91  profileConfigurations.add(createProfileConfiguration(profileConfigurationTemplate.getName().split("ProfileConfiguration")[0]));
92  }
93  }
94 
95  return profileConfigurations;
96  }
String getIDPTemplatesLocation()
Definition: ConfigurationFactory.java:542
ProfileConfiguration createProfileConfiguration(String profileConfigurationName)
Definition: ProfileConfigurationService.java:98
ConfigurationFactory configurationFactory
Definition: ProfileConfigurationService.java:71

◆ getProfileConfigurationsList()

List<ProfileConfiguration> org.gluu.oxtrust.ldap.service.ProfileConfigurationService.getProfileConfigurationsList ( GluuSAMLTrustRelationship  trustRelationship)
inline
154  {
155  List<ProfileConfiguration> profileConfigurations = new ArrayList<ProfileConfiguration>();
156  for (String profileConfigurationName : trustRelationship.getProfileConfigurations().keySet()) {
157  profileConfigurations.add(trustRelationship.getProfileConfigurations().get(profileConfigurationName));
158  }
159  return profileConfigurations;
160  }

◆ isProfileConfigurationPresent()

boolean org.gluu.oxtrust.ldap.service.ProfileConfigurationService.isProfileConfigurationPresent ( GluuSAMLTrustRelationship  trustRelationship,
ProfileConfiguration  profileConfiguration 
)
inline
308  {
309  if(trustRelationship.getProfileConfigurations().keySet().contains(profileConfiguration.getName())){
310  ProfileConfiguration storedConfiguration = trustRelationship.getProfileConfigurations().get(profileConfiguration.getName());
311  return profileConfiguration.equals(storedConfiguration);
312  }
313  return false;
314  }

◆ parseProfileConfigurations()

void org.gluu.oxtrust.ldap.service.ProfileConfigurationService.parseProfileConfigurations ( GluuSAMLTrustRelationship  trustRelationship) throws SAXException, IOException, ParserConfigurationException, FactoryConfigurationError, XPathExpressionException
inline
163  {
164  if (trustRelationship.getGluuProfileConfiguration() != null) {
165  for (String profileConfigurationXML : trustRelationship.getGluuProfileConfiguration()) {
166  Document xmlDocument = xmlService.getXmlDocument(profileConfigurationXML.getBytes(), true);
167  if (xmlDocument.getFirstChild().getAttributes().getNamedItem("xsi:type").getNodeValue().contains(SHIBBOLETH_SSO)) {
168  ProfileConfiguration profileConfiguration = createProfileConfiguration(SHIBBOLETH_SSO);
169 
170  profileConfiguration.setIncludeAttributeStatement(Boolean.parseBoolean(xmlDocument.getFirstChild().getAttributes()
171  .getNamedItem("includeAttributeStatement").getNodeValue()));
172  profileConfiguration.setAssertionLifetime(Integer.parseInt(xmlDocument.getFirstChild().getAttributes()
173  .getNamedItem("assertionLifetime").getNodeValue()));
174  profileConfiguration.setSignResponses(xmlDocument.getFirstChild().getAttributes().getNamedItem("signResponses")
175  .getNodeValue());
176  profileConfiguration.setSignAssertions(xmlDocument.getFirstChild().getAttributes().getNamedItem("signAssertions")
177  .getNodeValue());
178  profileConfiguration.setSignRequests(xmlDocument.getFirstChild().getAttributes().getNamedItem("signRequests")
179  .getNodeValue());
180  Node attribute = xmlDocument.getFirstChild().getAttributes().getNamedItem("signingCredentialRef");
181  if (attribute != null) {
182  profileConfiguration.setProfileConfigurationCertFileName(attribute.getNodeValue());
183  }
184 
185  trustRelationship.getProfileConfigurations().put(SHIBBOLETH_SSO, profileConfiguration);
186  continue;
187  }
188 
189  if (xmlDocument.getFirstChild().getAttributes().getNamedItem("xsi:type").getNodeValue().contains(SAML1_ARTIFACT_RESOLUTION)) {
190  ProfileConfiguration profileConfiguration = createProfileConfiguration(SAML1_ARTIFACT_RESOLUTION);
191 
192  profileConfiguration.setSignResponses(xmlDocument.getFirstChild().getAttributes().getNamedItem("signResponses")
193  .getNodeValue());
194  profileConfiguration.setSignAssertions(xmlDocument.getFirstChild().getAttributes().getNamedItem("signAssertions")
195  .getNodeValue());
196  profileConfiguration.setSignRequests(xmlDocument.getFirstChild().getAttributes().getNamedItem("signRequests")
197  .getNodeValue());
198  Node attribute = xmlDocument.getFirstChild().getAttributes().getNamedItem("signingCredentialRef");
199  if (attribute != null) {
200  profileConfiguration.setProfileConfigurationCertFileName(attribute.getNodeValue());
201  }
202 
203  trustRelationship.getProfileConfigurations().put(SAML1_ARTIFACT_RESOLUTION, profileConfiguration);
204  continue;
205  }
206 
207  if (xmlDocument.getFirstChild().getAttributes().getNamedItem("xsi:type").getNodeValue().contains(SAML1_ATTRIBUTE_QUERY)) {
208  ProfileConfiguration profileConfiguration = createProfileConfiguration(SAML1_ATTRIBUTE_QUERY);
209 
210  profileConfiguration.setAssertionLifetime(Integer.parseInt(xmlDocument.getFirstChild().getAttributes()
211  .getNamedItem("assertionLifetime").getNodeValue()));
212  profileConfiguration.setSignResponses(xmlDocument.getFirstChild().getAttributes().getNamedItem("signResponses")
213  .getNodeValue());
214  profileConfiguration.setSignAssertions(xmlDocument.getFirstChild().getAttributes().getNamedItem("signAssertions")
215  .getNodeValue());
216  profileConfiguration.setSignRequests(xmlDocument.getFirstChild().getAttributes().getNamedItem("signRequests")
217  .getNodeValue());
218  Node attribute = xmlDocument.getFirstChild().getAttributes().getNamedItem("signingCredentialRef");
219  if (attribute != null) {
220  profileConfiguration.setProfileConfigurationCertFileName(attribute.getNodeValue());
221  }
222 
223  trustRelationship.getProfileConfigurations().put(SAML1_ATTRIBUTE_QUERY, profileConfiguration);
224  continue;
225  }
226 
227  if (xmlDocument.getFirstChild().getAttributes().getNamedItem("xsi:type").getNodeValue().contains(SAML2_SSO)) {
228  ProfileConfiguration profileConfiguration = createProfileConfiguration(SAML2_SSO);
229 
230  profileConfiguration.setIncludeAttributeStatement(Boolean.parseBoolean(xmlDocument.getFirstChild().getAttributes()
231  .getNamedItem("includeAttributeStatement").getNodeValue()));
232  profileConfiguration.setAssertionLifetime(Integer.parseInt(xmlDocument.getFirstChild().getAttributes()
233  .getNamedItem("assertionLifetime").getNodeValue()));
234  profileConfiguration.setAssertionProxyCount(Integer.parseInt(xmlDocument.getFirstChild().getAttributes()
235  .getNamedItem("assertionProxyCount").getNodeValue()));
236  profileConfiguration.setSignResponses(xmlDocument.getFirstChild().getAttributes().getNamedItem("signResponses")
237  .getNodeValue());
238  profileConfiguration.setSignAssertions(xmlDocument.getFirstChild().getAttributes().getNamedItem("signAssertions")
239  .getNodeValue());
240  profileConfiguration.setSignRequests(xmlDocument.getFirstChild().getAttributes().getNamedItem("signRequests")
241  .getNodeValue());
242  profileConfiguration.setEncryptAssertions(xmlDocument.getFirstChild().getAttributes().getNamedItem("encryptAssertions")
243  .getNodeValue());
244  profileConfiguration.setEncryptNameIds(xmlDocument.getFirstChild().getAttributes().getNamedItem("encryptNameIds")
245  .getNodeValue());
246  Node attribute = xmlDocument.getFirstChild().getAttributes().getNamedItem("signingCredentialRef");
247  if (attribute != null) {
248  profileConfiguration.setProfileConfigurationCertFileName(attribute.getNodeValue());
249  }
250 
251  trustRelationship.getProfileConfigurations().put(SAML2_SSO, profileConfiguration);
252  continue;
253  }
254 
255  if (xmlDocument.getFirstChild().getAttributes().getNamedItem("xsi:type").getNodeValue().contains(SAML2_ARTIFACT_RESOLUTION)) {
256  ProfileConfiguration profileConfiguration = createProfileConfiguration(SAML2_ARTIFACT_RESOLUTION);
257 
258  profileConfiguration.setSignResponses(xmlDocument.getFirstChild().getAttributes().getNamedItem("signResponses")
259  .getNodeValue());
260  profileConfiguration.setSignAssertions(xmlDocument.getFirstChild().getAttributes().getNamedItem("signAssertions")
261  .getNodeValue());
262  profileConfiguration.setSignRequests(xmlDocument.getFirstChild().getAttributes().getNamedItem("signRequests")
263  .getNodeValue());
264  profileConfiguration.setEncryptAssertions(xmlDocument.getFirstChild().getAttributes().getNamedItem("encryptNameIds")
265  .getNodeValue());
266  profileConfiguration.setEncryptNameIds(xmlDocument.getFirstChild().getAttributes().getNamedItem("encryptNameIds")
267  .getNodeValue());
268  Node attribute = xmlDocument.getFirstChild().getAttributes().getNamedItem("signingCredentialRef");
269  if (attribute != null) {
270  profileConfiguration.setProfileConfigurationCertFileName(attribute.getNodeValue());
271  }
272 
273  trustRelationship.getProfileConfigurations().put(SAML2_ARTIFACT_RESOLUTION, profileConfiguration);
274  continue;
275  }
276 
277  if (xmlDocument.getFirstChild().getAttributes().getNamedItem("xsi:type").getNodeValue().contains(SAML2_ATTRIBUTE_QUERY)) {
278  ProfileConfiguration profileConfiguration = createProfileConfiguration(SAML2_ATTRIBUTE_QUERY);
279 
280  profileConfiguration.setAssertionLifetime(Integer.parseInt(xmlDocument.getFirstChild().getAttributes()
281  .getNamedItem("assertionLifetime").getNodeValue()));
282  profileConfiguration.setAssertionProxyCount(Integer.parseInt(xmlDocument.getFirstChild().getAttributes()
283  .getNamedItem("assertionProxyCount").getNodeValue()));
284  profileConfiguration.setSignResponses(xmlDocument.getFirstChild().getAttributes().getNamedItem("signResponses")
285  .getNodeValue());
286  profileConfiguration.setSignAssertions(xmlDocument.getFirstChild().getAttributes().getNamedItem("signAssertions")
287  .getNodeValue());
288  profileConfiguration.setSignRequests(xmlDocument.getFirstChild().getAttributes().getNamedItem("signRequests")
289  .getNodeValue());
290  profileConfiguration.setEncryptAssertions(xmlDocument.getFirstChild().getAttributes().getNamedItem("encryptNameIds")
291  .getNodeValue());
292  profileConfiguration.setEncryptNameIds(xmlDocument.getFirstChild().getAttributes().getNamedItem("encryptNameIds")
293  .getNodeValue());
294  Node attribute = xmlDocument.getFirstChild().getAttributes().getNamedItem("signingCredentialRef");
295  if (attribute != null) {
296  profileConfiguration.setProfileConfigurationCertFileName(attribute.getNodeValue());
297  }
298 
299  trustRelationship.getProfileConfigurations().put(SAML2_ATTRIBUTE_QUERY, profileConfiguration);
300  continue;
301  }
302 
303  }
304  }
305 
306  }
static final String SAML1_ATTRIBUTE_QUERY
Definition: ProfileConfigurationService.java:56
static final String SAML2_SSO
Definition: ProfileConfigurationService.java:57
static final String SAML2_ATTRIBUTE_QUERY
Definition: ProfileConfigurationService.java:59
ProfileConfiguration createProfileConfiguration(String profileConfigurationName)
Definition: ProfileConfigurationService.java:98
static final String SAML1_ARTIFACT_RESOLUTION
Definition: ProfileConfigurationService.java:55
static final String SHIBBOLETH_SSO
Definition: ProfileConfigurationService.java:54
static final String SAML2_ARTIFACT_RESOLUTION
Definition: ProfileConfigurationService.java:58
XmlService xmlService
Definition: ProfileConfigurationService.java:68

◆ removeProfileConfiguration()

void org.gluu.oxtrust.ldap.service.ProfileConfigurationService.removeProfileConfiguration ( GluuSAMLTrustRelationship  trustRelationship,
ProfileConfiguration  profileConfiguration 
)
inline
321  {
322  trustRelationship.getProfileConfigurations().remove(profileConfiguration.getName());
323 
324  }

◆ saveCertificate()

void org.gluu.oxtrust.ldap.service.ProfileConfigurationService.saveCertificate ( GluuSAMLTrustRelationship  trustRelationship,
Map< String, FileUploadWrapper >  fileWrappers,
String  name 
)
inlineprivate
431  {
432  if (fileWrappers.get(name) != null && fileWrappers.get(name).getStream() != null) {
433  String profileConfigurationCertFileName = StringHelper.removePunctuation(name + trustRelationship.getInum());
434  saveProfileConfigurationCert(profileConfigurationCertFileName, fileWrappers.get(name).getStream());
435  trustRelationship.getProfileConfigurations().get(name)
436  .setProfileConfigurationCertFileName(StringHelper.removePunctuation(profileConfigurationCertFileName));
437  }
438 
439  }
String saveProfileConfigurationCert(String profileConfigurationCertFileName, InputStream stream)
Definition: ProfileConfigurationService.java:441

◆ saveProfileConfigurationCert()

String org.gluu.oxtrust.ldap.service.ProfileConfigurationService.saveProfileConfigurationCert ( String  profileConfigurationCertFileName,
InputStream  stream 
)
inline
441  {
442 
443  if (appConfiguration.getShibboleth3IdpRootDir() == null) {
444  IOUtils.closeQuietly(stream);
445  throw new InvalidConfigurationException("Failed to save Profile Configuration file due to undefined IDP root folder");
446  }
447 
448  String idpMetadataFolder = appConfiguration.getShibboleth3IdpRootDir() + File.separator + SHIB3_IDP_METADATA_FOLDER + File.separator + "credentials" + File.separator;
449  File filterCertFile = new File(idpMetadataFolder + profileConfigurationCertFileName);
450 
451  FileOutputStream os = null;
452  try {
453  os = FileUtils.openOutputStream(filterCertFile);
454  IOUtils.copy(stream, os);
455  os.flush();
456  } catch (IOException ex) {
457  log.error("Failed to write Profile Configuration certificate file '{}'", filterCertFile, ex);
458  ex.printStackTrace();
459  return null;
460  } finally {
461  IOUtils.closeQuietly(os);
462  IOUtils.closeQuietly(stream);
463  }
464 
465  return filterCertFile.getAbsolutePath();
466 
467  }
AppConfiguration appConfiguration
Definition: ProfileConfigurationService.java:74
Logger log
Definition: ProfileConfigurationService.java:62

◆ saveProfileConfigurations()

void org.gluu.oxtrust.ldap.service.ProfileConfigurationService.saveProfileConfigurations ( GluuSAMLTrustRelationship  trustRelationship,
Map< String, FileUploadWrapper >  fileWrappers 
)
inline
326  {
327  VelocityContext context = new VelocityContext();
328 
329  if (trustRelationship.getProfileConfigurations().get(SHIBBOLETH_SSO) != null) {
330  ProfileConfiguration profileConfiguration = trustRelationship.getProfileConfigurations().get(SHIBBOLETH_SSO);
331  context.put(SHIBBOLETH_SSO + "IncludeAttributeStatement", profileConfiguration.isIncludeAttributeStatement());
332  context.put(SHIBBOLETH_SSO + "AssertionLifetime", profileConfiguration.getAssertionLifetime());
333  context.put(SHIBBOLETH_SSO + "SignResponses", profileConfiguration.getSignResponses());
334  context.put(SHIBBOLETH_SSO + "SignAssertions", profileConfiguration.getSignAssertions());
335  context.put(SHIBBOLETH_SSO + "SignRequests", profileConfiguration.getSignRequests());
336 
337  saveCertificate(trustRelationship, fileWrappers, SHIBBOLETH_SSO);
338  String certName = trustRelationship.getProfileConfigurations().get(SHIBBOLETH_SSO).getProfileConfigurationCertFileName();
339  if (StringHelper.isNotEmpty(certName)) {
340  context.put(SHIBBOLETH_SSO + "SigningCredentialRef", certName);
341  }
342  }
343 
344  if (trustRelationship.getProfileConfigurations().get(SAML1_ARTIFACT_RESOLUTION) != null) {
345  ProfileConfiguration profileConfiguration = trustRelationship.getProfileConfigurations().get(SAML1_ARTIFACT_RESOLUTION);
346  context.put(SAML1_ARTIFACT_RESOLUTION + "SignResponses", profileConfiguration.getSignResponses());
347  context.put(SAML1_ARTIFACT_RESOLUTION + "SignAssertions", profileConfiguration.getSignAssertions());
348  context.put(SAML1_ARTIFACT_RESOLUTION + "SignRequests", profileConfiguration.getSignRequests());
349  saveCertificate(trustRelationship, fileWrappers, SAML1_ARTIFACT_RESOLUTION);
350  String certName = trustRelationship.getProfileConfigurations().get(SAML1_ARTIFACT_RESOLUTION)
351  .getProfileConfigurationCertFileName();
352  if (StringHelper.isNotEmpty(certName)) {
353  context.put(SAML1_ARTIFACT_RESOLUTION + "SigningCredentialRef", certName);
354  }
355  }
356 
357  if (trustRelationship.getProfileConfigurations().get(SAML1_ATTRIBUTE_QUERY) != null) {
358  ProfileConfiguration profileConfiguration = trustRelationship.getProfileConfigurations().get(SAML1_ATTRIBUTE_QUERY);
359  context.put(SAML1_ATTRIBUTE_QUERY + "AssertionLifetime", profileConfiguration.getAssertionLifetime());
360  context.put(SAML1_ATTRIBUTE_QUERY + "SignResponses", profileConfiguration.getSignResponses());
361  context.put(SAML1_ATTRIBUTE_QUERY + "SignAssertions", profileConfiguration.getSignAssertions());
362  context.put(SAML1_ATTRIBUTE_QUERY + "SignRequests", profileConfiguration.getSignRequests());
363  saveCertificate(trustRelationship, fileWrappers, SAML1_ATTRIBUTE_QUERY);
364  String certName = trustRelationship.getProfileConfigurations().get(SAML1_ATTRIBUTE_QUERY).getProfileConfigurationCertFileName();
365  if (StringHelper.isNotEmpty(certName)) {
366  context.put(SAML1_ATTRIBUTE_QUERY + "SigningCredentialRef", certName);
367  }
368  }
369 
370  if (trustRelationship.getProfileConfigurations().get(SAML2_SSO) != null) {
371  ProfileConfiguration profileConfiguration = trustRelationship.getProfileConfigurations().get(SAML2_SSO);
372  context.put(SAML2_SSO + "IncludeAttributeStatement", profileConfiguration.isIncludeAttributeStatement());
373  context.put(SAML2_SSO + "AssertionLifetime", profileConfiguration.getAssertionLifetime());
374  context.put(SAML2_SSO + "AssertionProxyCount", profileConfiguration.getAssertionProxyCount());
375  context.put(SAML2_SSO + "SignResponses", profileConfiguration.getSignResponses());
376  context.put(SAML2_SSO + "SignAssertions", profileConfiguration.getSignAssertions());
377  context.put(SAML2_SSO + "SignRequests", profileConfiguration.getSignRequests());
378  context.put(SAML2_SSO + "EncryptNameIds", profileConfiguration.getEncryptNameIds());
379  context.put(SAML2_SSO + "EncryptAssertions", profileConfiguration.getEncryptAssertions());
380  saveCertificate(trustRelationship, fileWrappers, SAML2_SSO);
381  String certName = trustRelationship.getProfileConfigurations().get(SAML2_SSO).getProfileConfigurationCertFileName();
382  if (StringHelper.isNotEmpty(certName)) {
383  context.put(SAML2_SSO + "SigningCredentialRef", certName);
384  }
385  }
386 
387  if (trustRelationship.getProfileConfigurations().get(SAML2_ARTIFACT_RESOLUTION) != null) {
388  ProfileConfiguration profileConfiguration = trustRelationship.getProfileConfigurations().get(SAML2_ARTIFACT_RESOLUTION);
389  context.put(SAML2_ARTIFACT_RESOLUTION + "SignResponses", profileConfiguration.getSignResponses());
390  context.put(SAML2_ARTIFACT_RESOLUTION + "SignAssertions", profileConfiguration.getSignAssertions());
391  context.put(SAML2_ARTIFACT_RESOLUTION + "SignRequests", profileConfiguration.getSignRequests());
392  context.put(SAML2_ARTIFACT_RESOLUTION + "EncryptAssertions", profileConfiguration.getEncryptAssertions());
393  context.put(SAML2_ARTIFACT_RESOLUTION + "EncryptNameIds", profileConfiguration.getEncryptNameIds());
394  saveCertificate(trustRelationship, fileWrappers, SAML2_ARTIFACT_RESOLUTION);
395  String certName = trustRelationship.getProfileConfigurations().get(SAML2_ARTIFACT_RESOLUTION)
396  .getProfileConfigurationCertFileName();
397  if (StringHelper.isNotEmpty(certName)) {
398  context.put(SAML2_ARTIFACT_RESOLUTION + "SigningCredentialRef", certName);
399  }
400  }
401 
402  if (trustRelationship.getProfileConfigurations().get(SAML2_ATTRIBUTE_QUERY) != null) {
403  ProfileConfiguration profileConfiguration = trustRelationship.getProfileConfigurations().get(SAML2_ATTRIBUTE_QUERY);
404  context.put(SAML2_ATTRIBUTE_QUERY + "AssertionLifetime", profileConfiguration.getAssertionLifetime());
405  context.put(SAML2_ATTRIBUTE_QUERY + "AssertionProxyCount", profileConfiguration.getAssertionProxyCount());
406  context.put(SAML2_ATTRIBUTE_QUERY + "SignResponses", profileConfiguration.getSignResponses());
407  context.put(SAML2_ATTRIBUTE_QUERY + "SignAssertions", profileConfiguration.getSignAssertions());
408  context.put(SAML2_ATTRIBUTE_QUERY + "SignRequests", profileConfiguration.getSignRequests());
409  context.put(SAML2_ATTRIBUTE_QUERY + "EncryptAssertions", profileConfiguration.getEncryptAssertions());
410  context.put(SAML2_ATTRIBUTE_QUERY + "EncryptNameIds", profileConfiguration.getEncryptNameIds());
411  saveCertificate(trustRelationship, fileWrappers, SAML2_ATTRIBUTE_QUERY);
412  String certName = trustRelationship.getProfileConfigurations().get(SAML2_ATTRIBUTE_QUERY).getProfileConfigurationCertFileName();
413  if (StringHelper.isNotEmpty(certName)) {
414  context.put(SAML2_ATTRIBUTE_QUERY + "SigningCredentialRef", certName);
415  }
416  }
417 
418  if(! trustRelationship.getProfileConfigurations().isEmpty()){
419  trustRelationship.setGluuProfileConfiguration(new ArrayList<String>());
420 
421  for (String profileConfigurationName : trustRelationship.getProfileConfigurations().keySet()) {
422  trustRelationship.getGluuProfileConfiguration().add(
423  templateService.generateConfFile(profileConfigurationName + "ProfileConfiguration.xml", context));
424  }
425  }else{
426  trustRelationship.setGluuProfileConfiguration(null);
427  }
428 
429  }
static final String SAML1_ATTRIBUTE_QUERY
Definition: ProfileConfigurationService.java:56
static final String SAML2_SSO
Definition: ProfileConfigurationService.java:57
static final String SAML2_ATTRIBUTE_QUERY
Definition: ProfileConfigurationService.java:59
void saveCertificate(GluuSAMLTrustRelationship trustRelationship, Map< String, FileUploadWrapper > fileWrappers, String name)
Definition: ProfileConfigurationService.java:431
static final String SAML1_ARTIFACT_RESOLUTION
Definition: ProfileConfigurationService.java:55
static final String SHIBBOLETH_SSO
Definition: ProfileConfigurationService.java:54
static final String SAML2_ARTIFACT_RESOLUTION
Definition: ProfileConfigurationService.java:58
TemplateService templateService
Definition: ProfileConfigurationService.java:65
String generateConfFile(String template, VelocityContext context)
Definition: TemplateService.java:51

◆ updateProfileConfiguration()

void org.gluu.oxtrust.ldap.service.ProfileConfigurationService.updateProfileConfiguration ( GluuSAMLTrustRelationship  trustRelationship,
ProfileConfiguration  profileConfiguration 
)
inline
316  {
317  trustRelationship.getProfileConfigurations().put(profileConfiguration.getName(), profileConfiguration);
318 
319  }

メンバ詳解

◆ appConfiguration

AppConfiguration org.gluu.oxtrust.ldap.service.ProfileConfigurationService.appConfiguration
private

◆ configurationFactory

ConfigurationFactory org.gluu.oxtrust.ldap.service.ProfileConfigurationService.configurationFactory
private

◆ log

Logger org.gluu.oxtrust.ldap.service.ProfileConfigurationService.log
private

◆ SAML1_ARTIFACT_RESOLUTION

final String org.gluu.oxtrust.ldap.service.ProfileConfigurationService.SAML1_ARTIFACT_RESOLUTION = "SAML1ArtifactResolution"
staticprivate

◆ SAML1_ATTRIBUTE_QUERY

final String org.gluu.oxtrust.ldap.service.ProfileConfigurationService.SAML1_ATTRIBUTE_QUERY = "SAML1AttributeQuery"
staticprivate

◆ SAML2_ARTIFACT_RESOLUTION

final String org.gluu.oxtrust.ldap.service.ProfileConfigurationService.SAML2_ARTIFACT_RESOLUTION = "SAML2ArtifactResolution"
staticprivate

◆ SAML2_ATTRIBUTE_QUERY

final String org.gluu.oxtrust.ldap.service.ProfileConfigurationService.SAML2_ATTRIBUTE_QUERY = "SAML2AttributeQuery"
staticprivate

◆ SAML2_SSO

final String org.gluu.oxtrust.ldap.service.ProfileConfigurationService.SAML2_SSO = "SAML2SSO"
staticprivate

◆ serialVersionUID

final long org.gluu.oxtrust.ldap.service.ProfileConfigurationService.serialVersionUID = -4691360522345319673L
staticprivate

◆ SHIBBOLETH_SSO

final String org.gluu.oxtrust.ldap.service.ProfileConfigurationService.SHIBBOLETH_SSO = "ShibbolethSSO"
staticprivate

◆ templateService

TemplateService org.gluu.oxtrust.ldap.service.ProfileConfigurationService.templateService
private

◆ xmlService

XmlService org.gluu.oxtrust.ldap.service.ProfileConfigurationService.xmlService
private

このクラス詳解は次のファイルから抽出されました: