private InputStream parseSAMLRequestPostBinding(String samlMessage) { InputStream is; byte[] samlBytes = SamlPostBindingUtil.base64Decode(samlMessage); logger.trace("SAML Request Document: " + new String(samlBytes)); //$NON-NLS-1$ is = new ByteArrayInputStream(samlBytes); return is; }
private static void visit(Node node, int level) { // Visit each child NodeList list = node.getChildNodes(); for (int i = 0; i < list.getLength(); i++) { // Get child node Node childNode = list.item(i); logger.trace("Node=" + childNode.getNamespaceURI() + "::" + childNode.getLocalName()); // Visit child node visit(childNode, level + 1); } }
@Override public void setConsolidatedConfigFile(InputStream is) throws ParsingException { try { super.setConsolidatedConfigFile(is); } catch (Exception e) { logger.trace("Configurations defined in picketlink.xml will be ignored."); } }
private InputStream parseSAMLRequestPostBinding(String samlMessage) { InputStream is; byte[] samlBytes = PostBindingUtil.base64Decode(samlMessage); logger.trace("SAML Request Document: " + new String(samlBytes)); is = new ByteArrayInputStream(samlBytes); return is; }
private void validate(Builder builder) { logger.trace("Checkin ServiceName:"); checkPropertyShowValue(SERVICE_NAME, serviceName); logger.trace("Checkin portName:"); checkPropertyShowValue(PORT_NAME, portName); logger.trace("Checkin endpointAddress:"); checkPropertyShowValue(ENDPOINT_ADDRESS, endpointAddress); logger.trace("Checkin username:"); checkProperty(USERNAME, username); logger.trace("password portName:"); checkProperty(PASSWORD, password); }
@Override public void setConsolidatedConfigFile(InputStream is) throws ParsingException { try { super.setConsolidatedConfigFile(is); } catch (Exception e) { logger.trace("Configurations defined in picketlink.xml will be ignored."); } } }
public void warning(SAXParseException exception) throws SAXException { StringBuilder builder = new StringBuilder(); builder.append("Line Number=").append(exception.getLineNumber()); builder.append(" Col Number=").append(exception.getColumnNumber()); builder.append(" Public ID=").append(exception.getPublicId()); builder.append(" System ID=").append(exception.getSystemId()); builder.append(" exc=").append(exception.getLocalizedMessage()); logger.trace("SAX Warn:" + builder.toString()); } });
private void logException(SAXParseException sax) { StringBuilder builder = new StringBuilder(); if (logger.isTraceEnabled()) { builder.append("[line:").append(sax.getLineNumber()).append(",").append("::col=").append(sax.getColumnNumber()) .append("]"); builder.append("[publicID:").append(sax.getPublicId()).append(",systemId=").append(sax.getSystemId()) .append("]"); builder.append(":").append(sax.getLocalizedMessage()); logger.trace(builder.toString()); } } }
protected void trace(MessageContext msgContext) { if (logger.isTraceEnabled()) { if (msgContext instanceof SOAPMessageContext) { SOAPMessageContext soapMessageContext = (SOAPMessageContext) msgContext; logger.trace("WSDL_PORT=" + soapMessageContext.get(SOAPMessageContext.WSDL_PORT)); logger.trace("WSDL_OPERATION=" + soapMessageContext.get(SOAPMessageContext.WSDL_OPERATION)); logger.trace("WSDL_INTERFACE=" + soapMessageContext.get(SOAPMessageContext.WSDL_INTERFACE)); logger.trace("WSDL_SERVICE=" + soapMessageContext.get(SOAPMessageContext.WSDL_SERVICE)); } } }
protected void trace(MessageContext msgContext) { if (logger.isTraceEnabled()) { if (msgContext instanceof SOAPMessageContext) { SOAPMessageContext soapMessageContext = (SOAPMessageContext) msgContext; logger.trace("WSDL_PORT=" + soapMessageContext.get(SOAPMessageContext.WSDL_PORT)); logger.trace("WSDL_OPERATION=" + soapMessageContext.get(SOAPMessageContext.WSDL_OPERATION)); logger.trace("WSDL_INTERFACE=" + soapMessageContext.get(SOAPMessageContext.WSDL_INTERFACE)); logger.trace("WSDL_SERVICE=" + soapMessageContext.get(SOAPMessageContext.WSDL_SERVICE)); } } }
private void forwardHosted(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { logger.trace("SAML 1.1::Proceeding to IDP index page"); RequestDispatcher dispatch = servletContext .getRequestDispatcher(this.idpConfiguration.getHostedURI()); try { includeResource(request, response, dispatch); } catch (ClassCastException cce) { throw new IOException(cce); // JBAS5.1 and 6 quirkiness //includeResource(request.getRequest(), response, dispatch); } }
@Override public void generateSAMLRequest(SAML2HandlerRequest request, SAML2HandlerResponse response) throws ProcessingException { // Generate the signature Document samlDocument = response.getResultingDocument(); if (samlDocument == null) { logger.trace("No document generated in the handler chain. Cannot generate signature"); return; } this.sign(samlDocument, request, response); }
@Override public void generateSAMLRequest(SAML2HandlerRequest request, SAML2HandlerResponse response) throws ProcessingException { // Generate the signature Document samlDocument = response.getResultingDocument(); if (samlDocument == null) { logger.trace("No document generated in the handler chain. Cannot generate signature"); return; } this.sign(samlDocument, request, response); }
@Override public void handleStatusResponseType(SAML2HandlerRequest request, SAML2HandlerResponse response) throws ProcessingException { Document responseDocument = response.getResultingDocument(); if (responseDocument == null) { logger.trace("No response document found"); return; } this.sign(responseDocument, request, response); }
@Override public boolean authenticate(Request request, Response response, LoginConfig loginConfig) throws IOException { if (handleSAML11UnsolicitedResponse(request, response, loginConfig, this)) { return true; } logger.trace("Falling back on local Form Authentication if available"); // fallback return super.authenticate(request, response, loginConfig); }
private void insantiateAttributeManager(String attribStr) throws ConfigurationException { if (attribStr != null && !"".equals(attribStr)) { try { attribManager = new DelegatedAttributeManager((AttributeManager) SecurityActions.loadClass(getClass(), attribStr).newInstance(), null); logger.trace("AttributeManager set to " + attribStr); } catch (Exception e) { logger.attributeProviderInstationError(e); throw logger.configurationError(e); } } }
@Override public boolean commit() throws LoginException { if (super.commit()) { final boolean added = subject.getPublicCredentials().add(this.credential); if (added && logger.isTraceEnabled()) { logger.trace("Added Credential " + this.credential); } return true; } else { return false; } }
@Override public boolean commit() throws LoginException { if (super.commit()) { final boolean added = subject.getPublicCredentials().add(this.credential); if (added && logger.isTraceEnabled()) { logger.trace("Added Credential " + this.credential); } return true; } else { return false; } }
@Override public boolean commit() throws LoginException { if (super.commit()) { final boolean added = subject.getPublicCredentials().add(this.credential); if (added && logger.isTraceEnabled()) { logger.trace("Added Credential " + this.credential); } return true; } else { return false; } }
private void forwardHosted(Request request, Response response) throws ServletException, IOException { logger.trace("SAML 1.1::Proceeding to IDP index page"); RequestDispatcher dispatch = getContext().getServletContext() .getRequestDispatcher(getIdpConfiguration().getHostedURI()); recycle(response); try { includeResource(request, response, dispatch); } catch (ClassCastException cce) { // JBAS5.1 and 6 quirkiness includeResource(request.getRequest(), response, dispatch); } }