Repository: cxf Updated Branches: refs/heads/master 903c81fec -> dd8025a16
Fixing build Project: http://git-wip-us.apache.org/repos/asf/cxf/repo Commit: http://git-wip-us.apache.org/repos/asf/cxf/commit/dd8025a1 Tree: http://git-wip-us.apache.org/repos/asf/cxf/tree/dd8025a1 Diff: http://git-wip-us.apache.org/repos/asf/cxf/diff/dd8025a1 Branch: refs/heads/master Commit: dd8025a1695ac207e8b28e3cff38bb7df6369361 Parents: 903c81f Author: Colm O hEigeartaigh <[email protected]> Authored: Mon Jul 20 19:02:28 2015 +0100 Committer: Colm O hEigeartaigh <[email protected]> Committed: Mon Jul 20 19:02:28 2015 +0100 ---------------------------------------------------------------------- .../rs/security/xml/XmlSecInInterceptor.java | 38 ++++++++++---------- 1 file changed, 19 insertions(+), 19 deletions(-) ---------------------------------------------------------------------- http://git-wip-us.apache.org/repos/asf/cxf/blob/dd8025a1/rt/rs/security/xml/src/main/java/org/apache/cxf/rs/security/xml/XmlSecInInterceptor.java ---------------------------------------------------------------------- diff --git a/rt/rs/security/xml/src/main/java/org/apache/cxf/rs/security/xml/XmlSecInInterceptor.java b/rt/rs/security/xml/src/main/java/org/apache/cxf/rs/security/xml/XmlSecInInterceptor.java index d533a36..80f9819 100644 --- a/rt/rs/security/xml/src/main/java/org/apache/cxf/rs/security/xml/XmlSecInInterceptor.java +++ b/rt/rs/security/xml/src/main/java/org/apache/cxf/rs/security/xml/XmlSecInInterceptor.java @@ -241,19 +241,19 @@ public class XmlSecInInterceptor extends AbstractPhaseInterceptor<Message> { if (XMLSecurityConstants.Enc.equals(event.getAlgorithmUsage()) && encryptionProperties.getEncryptionSymmetricKeyAlgo() != null && !encryptionProperties.getEncryptionSymmetricKeyAlgo().equals(event.getAlgorithmURI())) { - throw new XMLSecurityException("empty", "The symmetric encryption algorithm " - + event.getAlgorithmURI() + " is not allowed"); + throw new XMLSecurityException("empty", new Object[] {"The symmetric encryption algorithm " + + event.getAlgorithmURI() + " is not allowed"}); } else if ((XMLSecurityConstants.Sym_Key_Wrap.equals(event.getAlgorithmUsage()) || XMLSecurityConstants.Asym_Key_Wrap.equals(event.getAlgorithmUsage())) && encryptionProperties.getEncryptionKeyTransportAlgo() != null && !encryptionProperties.getEncryptionKeyTransportAlgo().equals(event.getAlgorithmURI())) { - throw new XMLSecurityException("empty", "The key transport algorithm " - + event.getAlgorithmURI() + " is not allowed"); + throw new XMLSecurityException("empty", new Object[] {"The key transport algorithm " + + event.getAlgorithmURI() + " is not allowed"}); } else if (XMLSecurityConstants.EncDig.equals(event.getAlgorithmUsage()) && encryptionProperties.getEncryptionDigestAlgo() != null && !encryptionProperties.getEncryptionDigestAlgo().equals(event.getAlgorithmURI())) { - throw new XMLSecurityException("empty", "The encryption digest algorithm " - + event.getAlgorithmURI() + " is not allowed"); + throw new XMLSecurityException("empty", new Object[] {"The encryption digest algorithm " + + event.getAlgorithmURI() + " is not allowed"}); } } @@ -263,24 +263,24 @@ public class XmlSecInInterceptor extends AbstractPhaseInterceptor<Message> { || XMLSecurityConstants.Sym_Sig.equals(event.getAlgorithmUsage())) && sigProps.getSignatureAlgo() != null && !sigProps.getSignatureAlgo().equals(event.getAlgorithmURI())) { - throw new XMLSecurityException("empty", "The signature algorithm " - + event.getAlgorithmURI() + " is not allowed"); + throw new XMLSecurityException("empty", new Object[] {"The signature algorithm " + + event.getAlgorithmURI() + " is not allowed"}); } else if (XMLSecurityConstants.SigDig.equals(event.getAlgorithmUsage()) && sigProps.getSignatureDigestAlgo() != null && !sigProps.getSignatureDigestAlgo().equals(event.getAlgorithmURI())) { - throw new XMLSecurityException("empty", "The signature digest algorithm " - + event.getAlgorithmURI() + " is not allowed"); + throw new XMLSecurityException("empty", new Object[] {"The signature digest algorithm " + + event.getAlgorithmURI() + " is not allowed"}); } else if (XMLSecurityConstants.SigC14n.equals(event.getAlgorithmUsage()) && sigProps.getSignatureC14nMethod() != null && !sigProps.getSignatureC14nMethod().equals(event.getAlgorithmURI())) { - throw new XMLSecurityException("empty", "The signature c14n algorithm " - + event.getAlgorithmURI() + " is not allowed"); + throw new XMLSecurityException("empty", new Object[] {"The signature c14n algorithm " + + event.getAlgorithmURI() + " is not allowed"}); } else if (XMLSecurityConstants.SigTransform.equals(event.getAlgorithmUsage()) && !XMLSecurityConstants.NS_XMLDSIG_ENVELOPED_SIGNATURE.equals(event.getAlgorithmURI()) && sigProps.getSignatureC14nTransform() != null && !sigProps.getSignatureC14nTransform().equals(event.getAlgorithmURI())) { - throw new XMLSecurityException("empty", "The signature transformation algorithm " - + event.getAlgorithmURI() + " is not allowed"); + throw new XMLSecurityException("empty", new Object[] {"The signature transformation algorithm " + + event.getAlgorithmURI() + " is not allowed"}); } } @@ -301,8 +301,8 @@ public class XmlSecInInterceptor extends AbstractPhaseInterceptor<Message> { new TrustValidator().validateTrust(sigCrypto, cert, publicKey, getSubjectContraints(msg)); } catch (WSSecurityException e) { - throw new XMLSecurityException("empty", "Error during Signature Trust " - + "validation: " + e.getMessage()); + throw new XMLSecurityException("empty", new Object[] {"Error during Signature Trust " + + "validation: " + e.getMessage()}); } if (persistSignature) { @@ -427,7 +427,7 @@ public class XmlSecInInterceptor extends AbstractPhaseInterceptor<Message> { if (incomingSecurityEventList == null) { LOG.warning("Security processing failed (actions mismatch)"); XMLSecurityException ex = - new XMLSecurityException("empty", "The request was not signed or encrypted"); + new XMLSecurityException("empty", new Object[] {"The request was not signed or encrypted"}); throwFault(ex.getMessage(), ex); } @@ -436,7 +436,7 @@ public class XmlSecInInterceptor extends AbstractPhaseInterceptor<Message> { if (!isEventInResults(requiredEvent, incomingSecurityEventList)) { LOG.warning("The request was not signed"); XMLSecurityException ex = - new XMLSecurityException("empty", "The request was not signed"); + new XMLSecurityException("empty", new Object[] {"The request was not signed"}); throwFault(ex.getMessage(), ex); } } @@ -447,7 +447,7 @@ public class XmlSecInInterceptor extends AbstractPhaseInterceptor<Message> { if (!foundEncryptionPart) { LOG.warning("The request was not encrypted"); XMLSecurityException ex = - new XMLSecurityException("empty", "The request was not encrypted"); + new XMLSecurityException("empty", new Object[] {"The request was not encrypted"}); throwFault(ex.getMessage(), ex); } }
