cxf-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From cohei...@apache.org
Subject cxf git commit: Fixing build
Date Mon, 20 Jul 2015 18:02:38 GMT
Repository: cxf
Updated Branches:
  refs/heads/master 903c81fec -> dd8025a16


Fixing build


Project: http://git-wip-us.apache.org/repos/asf/cxf/repo
Commit: http://git-wip-us.apache.org/repos/asf/cxf/commit/dd8025a1
Tree: http://git-wip-us.apache.org/repos/asf/cxf/tree/dd8025a1
Diff: http://git-wip-us.apache.org/repos/asf/cxf/diff/dd8025a1

Branch: refs/heads/master
Commit: dd8025a1695ac207e8b28e3cff38bb7df6369361
Parents: 903c81f
Author: Colm O hEigeartaigh <coheigea@apache.org>
Authored: Mon Jul 20 19:02:28 2015 +0100
Committer: Colm O hEigeartaigh <coheigea@apache.org>
Committed: Mon Jul 20 19:02:28 2015 +0100

----------------------------------------------------------------------
 .../rs/security/xml/XmlSecInInterceptor.java    | 38 ++++++++++----------
 1 file changed, 19 insertions(+), 19 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/cxf/blob/dd8025a1/rt/rs/security/xml/src/main/java/org/apache/cxf/rs/security/xml/XmlSecInInterceptor.java
----------------------------------------------------------------------
diff --git a/rt/rs/security/xml/src/main/java/org/apache/cxf/rs/security/xml/XmlSecInInterceptor.java
b/rt/rs/security/xml/src/main/java/org/apache/cxf/rs/security/xml/XmlSecInInterceptor.java
index d533a36..80f9819 100644
--- a/rt/rs/security/xml/src/main/java/org/apache/cxf/rs/security/xml/XmlSecInInterceptor.java
+++ b/rt/rs/security/xml/src/main/java/org/apache/cxf/rs/security/xml/XmlSecInInterceptor.java
@@ -241,19 +241,19 @@ public class XmlSecInInterceptor extends AbstractPhaseInterceptor<Message>
{
         if (XMLSecurityConstants.Enc.equals(event.getAlgorithmUsage())
             && encryptionProperties.getEncryptionSymmetricKeyAlgo() != null
             && !encryptionProperties.getEncryptionSymmetricKeyAlgo().equals(event.getAlgorithmURI()))
{
-            throw new XMLSecurityException("empty", "The symmetric encryption algorithm "
-                                           + event.getAlgorithmURI() + " is not allowed");
+            throw new XMLSecurityException("empty", new Object[] {"The symmetric encryption
algorithm "
+                                           + event.getAlgorithmURI() + " is not allowed"});
         } else if ((XMLSecurityConstants.Sym_Key_Wrap.equals(event.getAlgorithmUsage())
             || XMLSecurityConstants.Asym_Key_Wrap.equals(event.getAlgorithmUsage()))
             && encryptionProperties.getEncryptionKeyTransportAlgo() != null
             && !encryptionProperties.getEncryptionKeyTransportAlgo().equals(event.getAlgorithmURI()))
{
-            throw new XMLSecurityException("empty", "The key transport algorithm "
-                + event.getAlgorithmURI() + " is not allowed");
+            throw new XMLSecurityException("empty", new Object[] {"The key transport algorithm
"
+                + event.getAlgorithmURI() + " is not allowed"});
         } else if (XMLSecurityConstants.EncDig.equals(event.getAlgorithmUsage())
             && encryptionProperties.getEncryptionDigestAlgo() != null
             && !encryptionProperties.getEncryptionDigestAlgo().equals(event.getAlgorithmURI()))
{
-            throw new XMLSecurityException("empty", "The encryption digest algorithm "
-                + event.getAlgorithmURI() + " is not allowed");
+            throw new XMLSecurityException("empty", new Object[] {"The encryption digest
algorithm "
+                + event.getAlgorithmURI() + " is not allowed"});
         }
     }
     
@@ -263,24 +263,24 @@ public class XmlSecInInterceptor extends AbstractPhaseInterceptor<Message>
{
             || XMLSecurityConstants.Sym_Sig.equals(event.getAlgorithmUsage()))
             && sigProps.getSignatureAlgo() != null
             && !sigProps.getSignatureAlgo().equals(event.getAlgorithmURI())) {
-            throw new XMLSecurityException("empty", "The signature algorithm "
-                                           + event.getAlgorithmURI() + " is not allowed");
+            throw new XMLSecurityException("empty", new Object[] {"The signature algorithm
"
+                                           + event.getAlgorithmURI() + " is not allowed"});
         } else if (XMLSecurityConstants.SigDig.equals(event.getAlgorithmUsage())
             && sigProps.getSignatureDigestAlgo() != null
             && !sigProps.getSignatureDigestAlgo().equals(event.getAlgorithmURI()))
{
-            throw new XMLSecurityException("empty", "The signature digest algorithm "
-                + event.getAlgorithmURI() + " is not allowed");
+            throw new XMLSecurityException("empty", new Object[] {"The signature digest algorithm
"
+                + event.getAlgorithmURI() + " is not allowed"});
         } else if (XMLSecurityConstants.SigC14n.equals(event.getAlgorithmUsage())
             && sigProps.getSignatureC14nMethod() != null
             && !sigProps.getSignatureC14nMethod().equals(event.getAlgorithmURI()))
{
-            throw new XMLSecurityException("empty", "The signature c14n algorithm "
-                + event.getAlgorithmURI() + " is not allowed");
+            throw new XMLSecurityException("empty", new Object[] {"The signature c14n algorithm
"
+                + event.getAlgorithmURI() + " is not allowed"});
         } else if (XMLSecurityConstants.SigTransform.equals(event.getAlgorithmUsage())
             && !XMLSecurityConstants.NS_XMLDSIG_ENVELOPED_SIGNATURE.equals(event.getAlgorithmURI())
             && sigProps.getSignatureC14nTransform() != null
             && !sigProps.getSignatureC14nTransform().equals(event.getAlgorithmURI()))
{
-            throw new XMLSecurityException("empty", "The signature transformation algorithm
"
-                + event.getAlgorithmURI() + " is not allowed");
+            throw new XMLSecurityException("empty", new Object[] {"The signature transformation
algorithm "
+                + event.getAlgorithmURI() + " is not allowed"});
         }
     }
     
@@ -301,8 +301,8 @@ public class XmlSecInInterceptor extends AbstractPhaseInterceptor<Message>
{
                 new TrustValidator().validateTrust(sigCrypto, cert, publicKey, 
                                                    getSubjectContraints(msg));
             } catch (WSSecurityException e) {
-                throw new XMLSecurityException("empty", "Error during Signature Trust "
-                                               + "validation: " + e.getMessage());
+                throw new XMLSecurityException("empty", new Object[] {"Error during Signature
Trust "
+                                               + "validation: " + e.getMessage()});
             }
             
             if (persistSignature) {
@@ -427,7 +427,7 @@ public class XmlSecInInterceptor extends AbstractPhaseInterceptor<Message>
{
             if (incomingSecurityEventList == null) {
                 LOG.warning("Security processing failed (actions mismatch)");
                 XMLSecurityException ex = 
-                    new XMLSecurityException("empty", "The request was not signed or encrypted");
+                    new XMLSecurityException("empty", new Object[] {"The request was not
signed or encrypted"});
                 throwFault(ex.getMessage(), ex);
             }
             
@@ -436,7 +436,7 @@ public class XmlSecInInterceptor extends AbstractPhaseInterceptor<Message>
{
                 if (!isEventInResults(requiredEvent, incomingSecurityEventList)) {
                     LOG.warning("The request was not signed");
                     XMLSecurityException ex = 
-                        new XMLSecurityException("empty", "The request was not signed");
+                        new XMLSecurityException("empty", new Object[] {"The request was
not signed"});
                     throwFault(ex.getMessage(), ex);
                 }
             }
@@ -447,7 +447,7 @@ public class XmlSecInInterceptor extends AbstractPhaseInterceptor<Message>
{
                 if (!foundEncryptionPart) {
                     LOG.warning("The request was not encrypted");
                     XMLSecurityException ex = 
-                        new XMLSecurityException("empty", "The request was not encrypted");
+                        new XMLSecurityException("empty", new Object[] {"The request was
not encrypted"});
                     throwFault(ex.getMessage(), ex);
                 }
             }


Mime
View raw message