private boolean hasInstalledCallback(final ShallowConnectAddonBean addon) { return addon.getLifecycle() != null && !isNullOrEmpty(addon.getLifecycle().getInstalled()); } }
private boolean hasInstalledCallback(final ShallowConnectAddonBean addon) { return addon.getLifecycle() != null && !isNullOrEmpty(addon.getLifecycle().getInstalled()); } }
@Override public JsonElement serialize(LifecycleBean src, Type typeOfSrc, JsonSerializationContext context) { if (src.isEmpty()) { return null; } JsonObject job = new JsonObject(); if (!Strings.isNullOrEmpty(src.getInstalled())) { job.addProperty("installed", src.getInstalled()); } if (!Strings.isNullOrEmpty(src.getUninstalled())) { job.addProperty("uninstalled", src.getUninstalled()); } if (!Strings.isNullOrEmpty(src.getEnabled())) { job.addProperty("enabled", src.getEnabled()); } if (!Strings.isNullOrEmpty(src.getDisabled())) { job.addProperty("disabled", src.getDisabled()); } return job; } }
@Override public JsonElement serialize(LifecycleBean src, Type typeOfSrc, JsonSerializationContext context) { if (src.isEmpty()) { return null; } JsonObject job = new JsonObject(); if (!Strings.isNullOrEmpty(src.getInstalled())) { job.addProperty("installed", src.getInstalled()); } if (!Strings.isNullOrEmpty(src.getUninstalled())) { job.addProperty("uninstalled", src.getUninstalled()); } if (!Strings.isNullOrEmpty(src.getEnabled())) { job.addProperty("enabled", src.getEnabled()); } if (!Strings.isNullOrEmpty(src.getDisabled())) { job.addProperty("disabled", src.getDisabled()); } return job; } }
public LifecycleBeanBuilder(LifecycleBean defaultBean) { this.installed = defaultBean.getInstalled(); this.uninstalled = defaultBean.getUninstalled(); this.enabled = defaultBean.getEnabled(); this.disabled = defaultBean.getDisabled(); }
public LifecycleBeanBuilder(LifecycleBean defaultBean) { this.installed = defaultBean.getInstalled(); this.uninstalled = defaultBean.getUninstalled(); this.enabled = defaultBean.getEnabled(); this.disabled = defaultBean.getDisabled(); }
private void requestInstallCallback(ConnectAddonBean addon, Optional<OAuthClient> oauthClient, final boolean sign) throws ConnectAddonInstallException { final URI callbackUri = getURI(addon.getBaseUrl(), addon.getLifecycle().getInstalled()); final Optional<String> authHeader = sign ? getAuthHeader(callbackUri, remotablePluginAccessorFactory.get(addon).getAuthorizationGenerator()) : Optional.empty(); requestInstallCallback(addon, oauthClient, callbackUri, authHeader); }
private void requestInstallCallback(ConnectAddonBean addon, Optional<OAuthClient> oauthClient, String previousSharedSecret) throws ConnectAddonInstallException { final URI callbackUri = getURI(addon.getBaseUrl(), addon.getLifecycle().getInstalled()); final AuthorizationGenerator authorizationGenerator = remotablePluginAccessorFactory.get(addon).getAuthorizationGenerator(); // NB: check that the auth generator matches the request/non-request to sign with an arbitrary key on installation, not on every callback, // because signing with a previous key happens only on installation String authHeader = getAuthHeader(callbackUri, (ReKeyableAuthorizationGenerator) authorizationGenerator, previousSharedSecret); requestInstallCallback(addon, oauthClient, callbackUri, Optional.of(authHeader)); }
private void requestInstallCallback(ConnectAddonBean addon, Optional<OAuthClient> oauthClient, final boolean sign) throws ConnectAddonInstallException { final URI callbackUri = getURI(addon.getBaseUrl(), addon.getLifecycle().getInstalled()); final Optional<String> authHeader = sign ? getAuthHeader(callbackUri, remotablePluginAccessorFactory.get(addon.getKey()).getAuthorizationGenerator()) : Optional.<String>empty(); requestInstallCallback(addon, oauthClient, callbackUri, authHeader); }
private void requestInstallCallback(ConnectAddonBean addon, Optional<OAuthClient> oauthClient, String previousSharedSecret) throws ConnectAddonInstallException { final URI callbackUri = getURI(addon.getBaseUrl(), addon.getLifecycle().getInstalled()); final AuthorizationGenerator authorizationGenerator = remotablePluginAccessorFactory.get(addon.getKey()).getAuthorizationGenerator(); // NB: check that the auth generator matches the request/non-request to sign with an arbitrary key on installation, not on every callback, // because signing with a previous key happens only on installation String authHeader = getAuthHeader(callbackUri, (ReKeyableAuthorizationGenerator) authorizationGenerator, previousSharedSecret); requestInstallCallback(addon, oauthClient, callbackUri, Optional.of(authHeader)); }
if (!Strings.isNullOrEmpty(addon.getLifecycle().getInstalled())) { if (darkFeatureManager.isFeatureEnabledForAllUsers(DARK_FEATURE_DISABLE_SIGN_INSTALL_WITH_PREV_KEY)) { requestInstallCallback(addon, scopeFilteredOAuthClient, true); // sign using whatever shared secret is looked up (the old code path)
if (!Strings.isNullOrEmpty(addon.getLifecycle().getInstalled())) { if (darkFeatureManager.isFeatureEnabledForAllUsers(DARK_FEATURE_DISABLE_SIGN_INSTALL_WITH_PREV_KEY)) { requestInstallCallback(addon, newOAuthClient, true); // sign using whatever shared secret is looked up (the old code path)