Repository: cxf
Updated Branches:
  refs/heads/master 903c81fec -> dd8025a16


Fixing build


Project: http://git-wip-us.apache.org/repos/asf/cxf/repo
Commit: http://git-wip-us.apache.org/repos/asf/cxf/commit/dd8025a1
Tree: http://git-wip-us.apache.org/repos/asf/cxf/tree/dd8025a1
Diff: http://git-wip-us.apache.org/repos/asf/cxf/diff/dd8025a1

Branch: refs/heads/master
Commit: dd8025a1695ac207e8b28e3cff38bb7df6369361
Parents: 903c81f
Author: Colm O hEigeartaigh <[email protected]>
Authored: Mon Jul 20 19:02:28 2015 +0100
Committer: Colm O hEigeartaigh <[email protected]>
Committed: Mon Jul 20 19:02:28 2015 +0100

----------------------------------------------------------------------
 .../rs/security/xml/XmlSecInInterceptor.java    | 38 ++++++++++----------
 1 file changed, 19 insertions(+), 19 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/cxf/blob/dd8025a1/rt/rs/security/xml/src/main/java/org/apache/cxf/rs/security/xml/XmlSecInInterceptor.java
----------------------------------------------------------------------
diff --git 
a/rt/rs/security/xml/src/main/java/org/apache/cxf/rs/security/xml/XmlSecInInterceptor.java
 
b/rt/rs/security/xml/src/main/java/org/apache/cxf/rs/security/xml/XmlSecInInterceptor.java
index d533a36..80f9819 100644
--- 
a/rt/rs/security/xml/src/main/java/org/apache/cxf/rs/security/xml/XmlSecInInterceptor.java
+++ 
b/rt/rs/security/xml/src/main/java/org/apache/cxf/rs/security/xml/XmlSecInInterceptor.java
@@ -241,19 +241,19 @@ public class XmlSecInInterceptor extends 
AbstractPhaseInterceptor<Message> {
         if (XMLSecurityConstants.Enc.equals(event.getAlgorithmUsage())
             && encryptionProperties.getEncryptionSymmetricKeyAlgo() != null
             && 
!encryptionProperties.getEncryptionSymmetricKeyAlgo().equals(event.getAlgorithmURI()))
 {
-            throw new XMLSecurityException("empty", "The symmetric encryption 
algorithm "
-                                           + event.getAlgorithmURI() + " is 
not allowed");
+            throw new XMLSecurityException("empty", new Object[] {"The 
symmetric encryption algorithm "
+                                           + event.getAlgorithmURI() + " is 
not allowed"});
         } else if 
((XMLSecurityConstants.Sym_Key_Wrap.equals(event.getAlgorithmUsage())
             || 
XMLSecurityConstants.Asym_Key_Wrap.equals(event.getAlgorithmUsage()))
             && encryptionProperties.getEncryptionKeyTransportAlgo() != null
             && 
!encryptionProperties.getEncryptionKeyTransportAlgo().equals(event.getAlgorithmURI()))
 {
-            throw new XMLSecurityException("empty", "The key transport 
algorithm "
-                + event.getAlgorithmURI() + " is not allowed");
+            throw new XMLSecurityException("empty", new Object[] {"The key 
transport algorithm "
+                + event.getAlgorithmURI() + " is not allowed"});
         } else if 
(XMLSecurityConstants.EncDig.equals(event.getAlgorithmUsage())
             && encryptionProperties.getEncryptionDigestAlgo() != null
             && 
!encryptionProperties.getEncryptionDigestAlgo().equals(event.getAlgorithmURI()))
 {
-            throw new XMLSecurityException("empty", "The encryption digest 
algorithm "
-                + event.getAlgorithmURI() + " is not allowed");
+            throw new XMLSecurityException("empty", new Object[] {"The 
encryption digest algorithm "
+                + event.getAlgorithmURI() + " is not allowed"});
         }
     }
     
@@ -263,24 +263,24 @@ public class XmlSecInInterceptor extends 
AbstractPhaseInterceptor<Message> {
             || XMLSecurityConstants.Sym_Sig.equals(event.getAlgorithmUsage()))
             && sigProps.getSignatureAlgo() != null
             && !sigProps.getSignatureAlgo().equals(event.getAlgorithmURI())) {
-            throw new XMLSecurityException("empty", "The signature algorithm "
-                                           + event.getAlgorithmURI() + " is 
not allowed");
+            throw new XMLSecurityException("empty", new Object[] {"The 
signature algorithm "
+                                           + event.getAlgorithmURI() + " is 
not allowed"});
         } else if 
(XMLSecurityConstants.SigDig.equals(event.getAlgorithmUsage())
             && sigProps.getSignatureDigestAlgo() != null
             && 
!sigProps.getSignatureDigestAlgo().equals(event.getAlgorithmURI())) {
-            throw new XMLSecurityException("empty", "The signature digest 
algorithm "
-                + event.getAlgorithmURI() + " is not allowed");
+            throw new XMLSecurityException("empty", new Object[] {"The 
signature digest algorithm "
+                + event.getAlgorithmURI() + " is not allowed"});
         } else if 
(XMLSecurityConstants.SigC14n.equals(event.getAlgorithmUsage())
             && sigProps.getSignatureC14nMethod() != null
             && 
!sigProps.getSignatureC14nMethod().equals(event.getAlgorithmURI())) {
-            throw new XMLSecurityException("empty", "The signature c14n 
algorithm "
-                + event.getAlgorithmURI() + " is not allowed");
+            throw new XMLSecurityException("empty", new Object[] {"The 
signature c14n algorithm "
+                + event.getAlgorithmURI() + " is not allowed"});
         } else if 
(XMLSecurityConstants.SigTransform.equals(event.getAlgorithmUsage())
             && 
!XMLSecurityConstants.NS_XMLDSIG_ENVELOPED_SIGNATURE.equals(event.getAlgorithmURI())
             && sigProps.getSignatureC14nTransform() != null
             && 
!sigProps.getSignatureC14nTransform().equals(event.getAlgorithmURI())) {
-            throw new XMLSecurityException("empty", "The signature 
transformation algorithm "
-                + event.getAlgorithmURI() + " is not allowed");
+            throw new XMLSecurityException("empty", new Object[] {"The 
signature transformation algorithm "
+                + event.getAlgorithmURI() + " is not allowed"});
         }
     }
     
@@ -301,8 +301,8 @@ public class XmlSecInInterceptor extends 
AbstractPhaseInterceptor<Message> {
                 new TrustValidator().validateTrust(sigCrypto, cert, publicKey, 
                                                    getSubjectContraints(msg));
             } catch (WSSecurityException e) {
-                throw new XMLSecurityException("empty", "Error during 
Signature Trust "
-                                               + "validation: " + 
e.getMessage());
+                throw new XMLSecurityException("empty", new Object[] {"Error 
during Signature Trust "
+                                               + "validation: " + 
e.getMessage()});
             }
             
             if (persistSignature) {
@@ -427,7 +427,7 @@ public class XmlSecInInterceptor extends 
AbstractPhaseInterceptor<Message> {
             if (incomingSecurityEventList == null) {
                 LOG.warning("Security processing failed (actions mismatch)");
                 XMLSecurityException ex = 
-                    new XMLSecurityException("empty", "The request was not 
signed or encrypted");
+                    new XMLSecurityException("empty", new Object[] {"The 
request was not signed or encrypted"});
                 throwFault(ex.getMessage(), ex);
             }
             
@@ -436,7 +436,7 @@ public class XmlSecInInterceptor extends 
AbstractPhaseInterceptor<Message> {
                 if (!isEventInResults(requiredEvent, 
incomingSecurityEventList)) {
                     LOG.warning("The request was not signed");
                     XMLSecurityException ex = 
-                        new XMLSecurityException("empty", "The request was not 
signed");
+                        new XMLSecurityException("empty", new Object[] {"The 
request was not signed"});
                     throwFault(ex.getMessage(), ex);
                 }
             }
@@ -447,7 +447,7 @@ public class XmlSecInInterceptor extends 
AbstractPhaseInterceptor<Message> {
                 if (!foundEncryptionPart) {
                     LOG.warning("The request was not encrypted");
                     XMLSecurityException ex = 
-                        new XMLSecurityException("empty", "The request was not 
encrypted");
+                        new XMLSecurityException("empty", new Object[] {"The 
request was not encrypted"});
                     throwFault(ex.getMessage(), ex);
                 }
             }

Reply via email to