This is an automated email from the ASF dual-hosted git repository.
fmartelli pushed a commit to branch 3_0_X
in repository https://gitbox.apache.org/repos/asf/syncope.git
The following commit(s) were added to refs/heads/3_0_X by this push:
new 44f617ef04 [SYNCOPE-1802] provides missing configuration paramneters
(#614)
44f617ef04 is described below
commit 44f617ef048d9e1e782cc7890dc0871d5ba6a04e
Author: Fabio Martelli <[email protected]>
AuthorDate: Fri Feb 2 16:47:50 2024 +0100
[SYNCOPE-1802] provides missing configuration paramneters (#614)
---
.../common/lib/auth/SAML2IdPAuthModuleConf.java | 39 ++++++++++++++++++++++
.../mapping/AuthModulePropertySourceMapper.java | 4 +++
2 files changed, 43 insertions(+)
diff --git
a/common/am/lib/src/main/java/org/apache/syncope/common/lib/auth/SAML2IdPAuthModuleConf.java
b/common/am/lib/src/main/java/org/apache/syncope/common/lib/auth/SAML2IdPAuthModuleConf.java
index be32854221..f4a3c1e983 100644
---
a/common/am/lib/src/main/java/org/apache/syncope/common/lib/auth/SAML2IdPAuthModuleConf.java
+++
b/common/am/lib/src/main/java/org/apache/syncope/common/lib/auth/SAML2IdPAuthModuleConf.java
@@ -41,6 +41,16 @@ public class SAML2IdPAuthModuleConf extends
Pac4jAuthModuleConf implements AuthM
*/
protected SAML2BindingType destinationBinding = SAML2BindingType.REDIRECT;
+ /**
+ * The Service Provider metadata path.
+ */
+ protected String serviceProviderMetadataPath;
+
+ /**
+ * The path to the keystore.
+ */
+ protected String keystorePath;
+
/**
* The password to use when generating the SP keystore.
*/
@@ -118,6 +128,11 @@ public class SAML2IdPAuthModuleConf extends
Pac4jAuthModuleConf implements AuthM
*/
protected String nameIdPolicyFormat;
+ /**
+ * Whether metadata should be marked to request response signed.
+ */
+ protected boolean responsesSigned;
+
/**
* Whether metadata should be marked to request sign assertions.
*/
@@ -202,6 +217,22 @@ public class SAML2IdPAuthModuleConf extends
Pac4jAuthModuleConf implements AuthM
this.destinationBinding = destinationBinding;
}
+ public String getServiceProviderMetadataPath() {
+ return serviceProviderMetadataPath;
+ }
+
+ public void setServiceProviderMetadataPath(final String
serviceProviderMetadataPath) {
+ this.serviceProviderMetadataPath = serviceProviderMetadataPath;
+ }
+
+ public String getKeystorePath() {
+ return keystorePath;
+ }
+
+ public void setKeystorePath(final String keystorePath) {
+ this.keystorePath = keystorePath;
+ }
+
public String getKeystorePassword() {
return keystorePassword;
}
@@ -302,6 +333,14 @@ public class SAML2IdPAuthModuleConf extends
Pac4jAuthModuleConf implements AuthM
this.nameIdPolicyFormat = nameIdPolicyFormat;
}
+ public boolean isResponsesSigned() {
+ return responsesSigned;
+ }
+
+ public void setResponsesSigned(final boolean responsesSigned) {
+ this.responsesSigned = responsesSigned;
+ }
+
public boolean isWantsAssertionsSigned() {
return wantsAssertionsSigned;
}
diff --git
a/wa/bootstrap/src/main/java/org/apache/syncope/wa/bootstrap/mapping/AuthModulePropertySourceMapper.java
b/wa/bootstrap/src/main/java/org/apache/syncope/wa/bootstrap/mapping/AuthModulePropertySourceMapper.java
index 251e1e2318..b90e83f317 100644
---
a/wa/bootstrap/src/main/java/org/apache/syncope/wa/bootstrap/mapping/AuthModulePropertySourceMapper.java
+++
b/wa/bootstrap/src/main/java/org/apache/syncope/wa/bootstrap/mapping/AuthModulePropertySourceMapper.java
@@ -280,6 +280,10 @@ public class AuthModulePropertySourceMapper extends
PropertySourceMapper impleme
props.setBlockedSignatureSigningAlgorithms(conf.getBlockedSignatureSigningAlgorithms());
props.setDestinationBinding(conf.getDestinationBinding().getUri());
props.setIdentityProviderMetadataPath(conf.getIdentityProviderMetadataPath());
+
props.setServiceProviderMetadataPath(conf.getServiceProviderMetadataPath());
+ props.setKeystorePath(conf.getKeystorePath());
+ props.setWantsAssertionsSigned(conf.isWantsAssertionsSigned());
+ props.setWantsResponsesSigned(conf.isResponsesSigned());
props.setKeystoreAlias(conf.getKeystoreAlias());
props.setKeystorePassword(conf.getKeystorePassword());
props.setMaximumAuthenticationLifetime(conf.getMaximumAuthenticationLifetime());