public static IdentityConfigParser getInstance(String filePath) { configFilePath = filePath; return getInstance(); }
public static IdentityConfigParser getInstance(String filePath) { configFilePath = filePath; return getInstance(); }
public static IdentityConfigParser getInstance(String filePath) { configFilePath = filePath; return getInstance(); }
public static void populateProperties() { configuration = IdentityConfigParser.getInstance().getConfiguration(); eventListenerConfiguration = IdentityConfigParser.getInstance().getEventListenerConfiguration(); identityCacheConfigurationHolder = IdentityConfigParser.getInstance().getIdentityCacheConfigurationHolder(); identityCookiesConfigurationHolder = IdentityConfigParser.getIdentityCookieConfigurationHolder(); }
public static void populateProperties() { configuration = IdentityConfigParser.getInstance().getConfiguration(); eventListenerConfiguration = IdentityConfigParser.getInstance().getEventListenerConfiguration(); identityCacheConfigurationHolder = IdentityConfigParser.getInstance().getIdentityCacheConfigurationHolder(); identityCookiesConfigurationHolder = IdentityConfigParser.getIdentityCookieConfigurationHolder(); }
public static void populateProperties() { configuration = IdentityConfigParser.getInstance().getConfiguration(); eventListenerConfiguration = IdentityConfigParser.getInstance().getEventListenerConfiguration(); identityCacheConfigurationHolder = IdentityConfigParser.getInstance().getIdentityCacheConfigurationHolder(); identityCookiesConfigurationHolder = IdentityConfigParser.getIdentityCookieConfigurationHolder(); }
public void initializeConfigsWithServerConfig() { IdentityConfigParser configParser = IdentityConfigParser.getInstance(); initializeConfigs(configParser.getConfigElement(CONTEXT_MAPPINGS)); }
public void initializeConfigsWithServerConfig() { IdentityConfigParser configParser = IdentityConfigParser.getInstance(); initializeConfigs(configParser.getConfigElement(CONTEXT_MAPPINGS)); }
/** * Check if audiences are enabled by reading configuration file at server startup. * * @return */ public static boolean checkAudienceEnabled() { boolean isAudienceEnabled = false; IdentityConfigParser configParser = IdentityConfigParser.getInstance(); OMElement oauthElem = configParser.getConfigElement(CONFIG_ELEM_OAUTH); if (oauthElem == null) { log.warn("Error in OAuth Configuration. OAuth element is not available."); return isAudienceEnabled; } OMElement configOpenIDConnect = oauthElem.getFirstChildWithName(new QName(IdentityCoreConstants.IDENTITY_DEFAULT_NAMESPACE, OPENID_CONNECT)); if (configOpenIDConnect == null) { log.warn("Error in OAuth Configuration. OpenID element is not available."); return isAudienceEnabled; } OMElement configAudience = configOpenIDConnect.getFirstChildWithName(new QName(IdentityCoreConstants.IDENTITY_DEFAULT_NAMESPACE, ENABLE_OPENID_CONNECT_AUDIENCES)); if (configAudience != null) { String configAudienceValue = configAudience.getText(); if (StringUtils.isNotBlank(configAudienceValue)) { isAudienceEnabled = Boolean.parseBoolean(configAudienceValue); } } return isAudienceEnabled; }
private List<RewriteContext> getContextsToRewrite() { List<RewriteContext> rewriteContexts = new ArrayList<>(); Map<String, Object> configuration = IdentityConfigParser.getInstance().getConfiguration(); Object webAppContexts = configuration.get("TenantContextsToRewrite.WebApp.Context"); if (webAppContexts != null) { if (webAppContexts instanceof ArrayList) { for (String context : (ArrayList<String>) webAppContexts) { rewriteContexts.add(new RewriteContext(true, context)); } } else { rewriteContexts.add(new RewriteContext(true, webAppContexts.toString())); } } Object servletContexts = configuration.get("TenantContextsToRewrite.Servlet.Context"); if (servletContexts != null) { if (servletContexts instanceof ArrayList) { for (String context : (ArrayList<String>) servletContexts) { rewriteContexts.add(new RewriteContext(false, context)); } } else { rewriteContexts.add(new RewriteContext(false, servletContexts.toString())); } } return rewriteContexts; }
private void readSSOConsentEnabledConfig() { IdentityConfigParser identityConfigParser = IdentityConfigParser.getInstance(); OMElement consentElement = identityConfigParser.getConfigElement(CONFIG_ELEM_CONSENT); if (consentElement != null) { OMElement ssoConsentEnabledElem = consentElement.getFirstChildWithName( new QName(IDENTITY_DEFAULT_NAMESPACE, CONFIG_ELEM_ENABLE_SSO_CONSENT_MANAGEMENT)); if (ssoConsentEnabledElem != null) { String ssoConsentEnabledElemText = ssoConsentEnabledElem.getText(); if (isNotBlank(ssoConsentEnabledElemText)) { ssoConsentEnabled = Boolean.parseBoolean(ssoConsentEnabledElemText); if (isDebugEnabled()) { logDebug("Consent management for SSO is set to " + ssoConsentEnabled + " from configurations."); } return; } } } ssoConsentEnabled = true; }
private void readSSOConsentEnabledConfig() { IdentityConfigParser identityConfigParser = IdentityConfigParser.getInstance(); OMElement consentElement = identityConfigParser.getConfigElement(CONFIG_ELEM_CONSENT); if (consentElement != null) { OMElement ssoConsentEnabledElem = consentElement.getFirstChildWithName( new QName(IDENTITY_DEFAULT_NAMESPACE, CONFIG_ELEM_ENABLE_SSO_CONSENT_MANAGEMENT)); if (ssoConsentEnabledElem != null) { String ssoConsentEnabledElemText = ssoConsentEnabledElem.getText(); if (isNotBlank(ssoConsentEnabledElemText)) { ssoConsentEnabled = Boolean.parseBoolean(ssoConsentEnabledElemText); if (isDebugEnabled()) { logDebug("Consent management for SSO is set to " + ssoConsentEnabled + " from configurations."); } return; } } } ssoConsentEnabled = true; }
OMElement intermediateCertValidationElement = IdentityConfigParser.getInstance().getConfigElement(Constants .INTERMEDIATE_CERT_VALIDATION_ELE); if (intermediateCertValidationElement != null) {
private void initDataSource() { OMElement persistenceManagerConfigElem = IdentityConfigParser.getInstance() .getConfigElement("JDBCPersistenceManager"); try { if (persistenceManagerConfigElem == null) { String errorMsg = "Identity Persistence Manager configuration is not available in " + "identity.xml file. Terminating the JDBC Persistence Manager " + "initialization. This may affect certain functionality."; throw IdentityRuntimeException.error(errorMsg); } OMElement dataSourceElem = persistenceManagerConfigElem.getFirstChildWithName( new QName(IdentityCoreConstants.IDENTITY_DEFAULT_NAMESPACE, "DataSource")); if (dataSourceElem == null) { String errorMsg = "DataSource Element is not available for JDBC Persistence " + "Manager in identity.xml file. Terminating the JDBC Persistence Manager " + "initialization. This might affect certain features."; throw IdentityRuntimeException.error(errorMsg); } OMElement dataSourceNameElem = dataSourceElem.getFirstChildWithName( new QName(IdentityCoreConstants.IDENTITY_DEFAULT_NAMESPACE, "Name")); if (dataSourceNameElem != null) { String dataSourceName = dataSourceNameElem.getText(); Context ctx = new InitialContext(); dataSource = (DataSource) ctx.lookup(dataSourceName); } } catch (NamingException e) { String errorMsg = "Error when looking up the Identity Data Source."; throw IdentityRuntimeException.error(errorMsg, e); } }
/** * Build rest api resource control config. */ public void buildClientAuthenticationHandlerControlData() { OMElement resourceAccessControl = IdentityConfigParser.getInstance().getConfigElement(Constants .CLIENT_APP_AUTHENTICATION_ELE); if ( resourceAccessControl != null ) { Iterator<OMElement> applications = resourceAccessControl.getChildrenWithName( new QName(IdentityCoreConstants.IDENTITY_DEFAULT_NAMESPACE, Constants.APPLICATION_ELE)); if ( applications != null ) { while ( applications.hasNext() ) { OMElement resource = applications.next(); SecretResolver secretResolver = SecretResolverFactory.create(resource, true); String appName = resource.getAttributeValue(new QName(Constants.APPLICATION_NAME_ATTR)); String hash = resource.getAttributeValue(new QName(Constants.APPLICATION_HASH_ATTR)); String secretAlias = resource.getAttributeValue (new QName(SECRET_ALIAS_NAMESPACE_URI, SECRET_ALIAS, SECRET_ALIAS_PREFIX)); if (secretAlias != null && secretResolver.isInitialized() && secretResolver.isTokenProtected(secretAlias)) { if (log.isDebugEnabled()) { log.debug("Resolving and replacing secret for " + secretAlias); } hash = secretResolver.resolve(secretAlias); } applicationConfigMap.put(appName, hash); } } } }
private void initDataSource() { OMElement persistenceManagerConfigElem = IdentityConfigParser.getInstance() .getConfigElement("JDBCPersistenceManager"); try { if (persistenceManagerConfigElem == null) { String errorMsg = "Identity Persistence Manager configuration is not available in " + "identity.xml file. Terminating the JDBC Persistence Manager " + "initialization. This may affect certain functionality."; throw IdentityRuntimeException.error(errorMsg); } OMElement dataSourceElem = persistenceManagerConfigElem.getFirstChildWithName( new QName(IdentityCoreConstants.IDENTITY_DEFAULT_NAMESPACE, "DataSource")); if (dataSourceElem == null) { String errorMsg = "DataSource Element is not available for JDBC Persistence " + "Manager in identity.xml file. Terminating the JDBC Persistence Manager " + "initialization. This might affect certain features."; throw IdentityRuntimeException.error(errorMsg); } OMElement dataSourceNameElem = dataSourceElem.getFirstChildWithName( new QName(IdentityCoreConstants.IDENTITY_DEFAULT_NAMESPACE, "Name")); if (dataSourceNameElem != null) { String dataSourceName = dataSourceNameElem.getText(); Context ctx = new InitialContext(); dataSource = (DataSource) ctx.lookup(dataSourceName); } } catch (NamingException e) { String errorMsg = "Error when looking up the Identity Data Source."; throw IdentityRuntimeException.error(errorMsg, e); } }
private void initDataSource() { OMElement persistenceManagerConfigElem = IdentityConfigParser.getInstance() .getConfigElement("JDBCPersistenceManager"); try { if (persistenceManagerConfigElem == null) { String errorMsg = "Identity Persistence Manager configuration is not available in " + "identity.xml file. Terminating the JDBC Persistence Manager " + "initialization. This may affect certain functionality."; throw IdentityRuntimeException.error(errorMsg); } OMElement dataSourceElem = persistenceManagerConfigElem.getFirstChildWithName( new QName(IdentityCoreConstants.IDENTITY_DEFAULT_NAMESPACE, "DataSource")); if (dataSourceElem == null) { String errorMsg = "DataSource Element is not available for JDBC Persistence " + "Manager in identity.xml file. Terminating the JDBC Persistence Manager " + "initialization. This might affect certain features."; throw IdentityRuntimeException.error(errorMsg); } OMElement dataSourceNameElem = dataSourceElem.getFirstChildWithName( new QName(IdentityCoreConstants.IDENTITY_DEFAULT_NAMESPACE, "Name")); if (dataSourceNameElem != null) { String dataSourceName = dataSourceNameElem.getText(); Context ctx = new InitialContext(); dataSource = (DataSource) ctx.lookup(dataSourceName); } } catch (NamingException e) { String errorMsg = "Error when looking up the Identity Data Source."; throw IdentityRuntimeException.error(errorMsg, e); } }
public void init() throws IdentityOAuth2Exception { super.init(); IdentityConfigParser configParser; configParser = IdentityConfigParser.getInstance(); OMElement oauthElem = configParser.getConfigElement(CONFIG_ELEM_OAUTH); // Get the required claim uris that needs to be included in the response. parseRequiredHeaderClaimUris(oauthElem.getFirstChildWithName(getQNameWithIdentityNS(REQUIRED_CLAIM_URIS))); // read login config parseLoginConfig(oauthElem); userClaimsCache = new BaseCache<String, Claim[]>("UserClaimsCache"); if (log.isDebugEnabled()) { log.debug("Successfully created UserClaimsCache under " + OAuthConstants.OAUTH_CACHE_MANAGER); } }
IdentityConfigParser identityConfigParser = IdentityConfigParser.getInstance(); Map<UserDeletionEventRecorder, Map<String, String>> userDeleteEventRecorders = readDeletionEventRecorders(identityConfigParser);
private List<String> getOIDCAudiences() { List<String> audiences = new ArrayList<String>(); IdentityConfigParser configParser = IdentityConfigParser.getInstance(); OMElement oauthElem = configParser.getConfigElement(CONFIG_ELEM_OAUTH);