Author: prabath
Date: Tue Dec 11 03:09:41 2007
New Revision: 10955

Log:

Initialize OpenID related properties

Modified:
   
branches/solutions/identity/openid-poc/modules/identity-provider/src/main/java/org/wso2/solutions/identity/Initializer.java

Modified: 
branches/solutions/identity/openid-poc/modules/identity-provider/src/main/java/org/wso2/solutions/identity/Initializer.java
==============================================================================
--- 
branches/solutions/identity/openid-poc/modules/identity-provider/src/main/java/org/wso2/solutions/identity/Initializer.java
 (original)
+++ 
branches/solutions/identity/openid-poc/modules/identity-provider/src/main/java/org/wso2/solutions/identity/Initializer.java
 Tue Dec 11 03:09:41 2007
@@ -55,329 +55,318 @@
  */
 public class Initializer implements ServerInitializer {
 
-    private static Log log = LogFactory.getLog(Initializer.class);
+       private static Log log = LogFactory.getLog(Initializer.class);
 
-    private static Messages messages = Messages
-            .getInstance(IdentityProviderConstants.RESOURCES);
+       private static Messages messages = Messages
+                       .getInstance(IdentityProviderConstants.RESOURCES);
 
-    /**
-     * [EMAIL PROTECTED] Here we carry out all initialization work of the 
identity
-     * solution : identity provider
-     */
-    public void init(ConfigurationContext ctx) throws AxisFault,
-            ServerException {
-        log.info(messages.getMessage("initStart"));
-
-        ConfigurationContextHolder.setConfigurationContext(ctx);
-
-        
-        try {
-            IPPersistenceManager db = IPPersistenceManager
-                    .getPersistanceManager();
-
-            // Checking whether the initial startup - at least one dialect 
must be there
-            DialectDO[] dialectDOs = db.getAllSupportedDialects();
-            boolean isInitial = false;
-            if (dialectDOs.length == 0) {
-                isInitial = true;
-            }
-
-            STSConfigAdmin.configuraServices(isInitial);
-            
-            if(isInitial){
-                addDialectsAndClaims();
-                setupRelyingPartyUserAccounts();
-                addParameters();
-                setupAllRealms();
-                addActions();
-                // Add the globally trusted relying party
-                RelyingPartyDO rp = new RelyingPartyDO();
-                rp = new RelyingPartyDO();
-
-                ServerConfiguration serverConfig = ServerConfiguration
-                        .getInstance();
-                rp.setHostName(serverConfig.getFirstProperty("HostName"));
-                rp.setAlias(serverConfig
-                        .getFirstProperty("Security.KeyStore.KeyAlias"));
-                db.create(rp);
-
-                
-                
-                //// remove the below 4 lines after dumindoo's fix
-                VerifierServiceIdpDO idp = new VerifierServiceIdpDO();
-                idp.setHostName("localhost");
-                idp.setGlobal(true);
-                db.create(idp);
-
-            }
-
-               
-        } catch (Exception e) {
-            throw new AxisFault(e.getMessage(), e);
-        }
-
-
-        log.info(messages.getMessage("initDone"));
-
-    }
-
-    private void setupAllRealms()
-            throws Exception {
-        IPPersistenceManager db = IPPersistenceManager.getPersistanceManager();
-     // Add JDBC realm
-        RealmDO jdbcRealm = new RealmDO();
-        jdbcRealm.setClassName(JDBCRealm.class.getName());
-        jdbcRealm.setConfigClassName(JDBCRealmConfig.class.getName());
-        db.create(jdbcRealm);
-
-        // Add LDAP realm
-        RealmDO ldapRealm = new RealmDO();
-        ldapRealm.setClassName(LDAPRealm.class.getName());
-        ldapRealm.setConfigClassName(LDAPRealmConfig.class.getName());
-        db.create(ldapRealm);
-
-        RealmDO wsasRealm = new RealmDO();
-        wsasRealm.setClassName(WSASRealm.class.getName());
-        wsasRealm.setConfigClassName(null);
-        db.create(wsasRealm);
-
-
-        RealmConfigurationDO wsasRealmConfig = new RealmConfigurationDO();
-        wsasRealmConfig.setName("wsasRealmForAccessControlSample");
-        wsasRealmConfig.setRealm(wsasRealm);
-        db.create(wsasRealmConfig);
-        
-        RealmDO defaultRalm = new RealmDO();
-        defaultRalm.setClassName(DefaultRealm.class.getName());
-        defaultRalm.setConfigClassName(DefaultRealmConfig.class
-                .getName());
-        db.create(defaultRalm);
-        
-        
-        // Add default realm configuration
-        RealmConfigurationDO realmConfig = new RealmConfigurationDO();
-        realmConfig.setName("defaultRealm");
-        realmConfig.setRealm(defaultRalm);
-        realmConfig.setEffective(true);
-        db.create(realmConfig);
-
-        RealmConfigurationPropertyDO prop = new RealmConfigurationPropertyDO();
-        prop.setConfig(realmConfig);
-        prop.setName("ConnectionURL");
-        prop.setValue(IdentityProviderConstants.Default.CONNECTION_URL);
-        db.create(prop);
-
-        prop = new RealmConfigurationPropertyDO();
-        prop.setConfig(realmConfig);
-        prop.setName("ConnectionUserName");
-        prop.setValue(IdentityProviderConstants.Default.CONNECTION_USER_NAME);
-        db.create(prop);
-
-        prop = new RealmConfigurationPropertyDO();
-        prop.setConfig(realmConfig);
-        prop.setName("ConnectionPassword");
-        prop.setValue(IdentityProviderConstants.Sample.CONNECTION_PASSWORD);
-        db.create(prop);
-
-        prop = new RealmConfigurationPropertyDO();
-        prop.setConfig(realmConfig);
-        prop.setName("DriverName");
-        prop.setValue(IdentityProviderConstants.Default.DRIVER);
-        db.create(prop);
-
-        prop = new RealmConfigurationPropertyDO();
-        prop.setConfig(realmConfig);
-        prop.setName("SqlFile");
-        prop.setValue(System.getProperty(ServerConstants.WSO2WSAS_HOME)
-                + "/conf/"
-                + IdentityProviderConstants.Default.SQL_STATEMENTS_FILE_PATH);
-        db.create(prop);
-        
-        this.setupSampleRealmConfig(db, jdbcRealm);
-    }
-
-    /**
-     * Setup the user store for the identity provider sample.
-     * 
-     * @param db
-     * @param jdbcRealm
-     * @throws Exception
-     */
-    private void setupSampleRealmConfig(IPPersistenceManager db,
-            RealmDO jdbcRealm) throws Exception {
-       
-        // Add sample realm configuration
-        RealmConfigurationDO realmConfig = new RealmConfigurationDO();
-        realmConfig.setName("sampleRealm");
-        realmConfig.setRealm(jdbcRealm);
-        db.create(realmConfig);
-
-        RealmConfigurationPropertyDO prop = new RealmConfigurationPropertyDO();
-        prop.setConfig(realmConfig);
-        prop.setName("ConnectionURL");
-        prop.setValue(IdentityProviderConstants.Sample.CONNECTION_URL);
-        db.create(prop);
-
-        prop = new RealmConfigurationPropertyDO();
-        prop.setConfig(realmConfig);
-        prop.setName("ConnectionUserName");
-        prop.setValue(IdentityProviderConstants.Sample.CONNECTION_USER_NAME);
-        db.create(prop);
-
-        prop = new RealmConfigurationPropertyDO();
-        prop.setConfig(realmConfig);
-        prop.setName("ConnectionPassword");
-        prop.setValue(IdentityProviderConstants.Sample.CONNECTION_PASSWORD);
-        db.create(prop);
-
-        prop = new RealmConfigurationPropertyDO();
-        prop.setConfig(realmConfig);
-        prop.setName("DriverName");
-        prop.setValue(IdentityProviderConstants.Sample.DRIVER);
-        db.create(prop);
-
-        prop = new RealmConfigurationPropertyDO();
-        prop.setConfig(realmConfig);
-        prop.setName("UserTable");
-        prop.setValue(IdentityProviderConstants.Sample.USER_TABLE);
-        db.create(prop);
-
-        prop = new RealmConfigurationPropertyDO();
-        prop.setConfig(realmConfig);
-        prop.setName("UserNameColumn");
-        prop.setValue(IdentityProviderConstants.Sample.USER_NAME_COLUMN);
-        db.create(prop);
-
-        prop = new RealmConfigurationPropertyDO();
-        prop.setConfig(realmConfig);
-        prop.setName("UserNameColumn");
-        prop.setValue(IdentityProviderConstants.Sample.USER_NAME_COLUMN);
-        db.create(prop);
-
-        prop = new RealmConfigurationPropertyDO();
-        prop.setConfig(realmConfig);
-        prop.setName("UserCredentialColumn");
-        prop.setValue(IdentityProviderConstants.Sample.PASSWORD_COLUMN);
-        db.create(prop);
-
-        prop = new RealmConfigurationPropertyDO();
-        prop.setConfig(realmConfig);
-        prop.setName("ColumnNames");
-        prop.setValue(IdentityProviderConstants.Sample.COLUMN_NAME_EMAIL + ","
-                + IdentityProviderConstants.Sample.COLUMN_NAME_FIRSTNAME + ","
-                + IdentityProviderConstants.Sample.COLUMN_NAME_LASTNAME);
-        db.create(prop);
-
-    }
-    
-    
-    private void addDialectsAndClaims() throws IdentityProviderException, 
AxisFault{
-        IPPersistenceManager db = IPPersistenceManager.getPersistanceManager();
-        if (log.isDebugEnabled()) {
-            log.debug(messages.getMessage("addingInitialClaimsInfo"));
-        }
-
-        InitialClaimsProcessor claimsProcessor = new InitialClaimsProcessor();
-        claimsProcessor
-                .process(IdentityProviderConstants.INITIAL_CLAIMS_FILE_PATH);
-        ArrayList dialects = claimsProcessor.getDialectList();
-        for (Iterator iter = dialects.iterator(); iter.hasNext();) {
-            DialectDO dialect = (DialectDO) iter.next();
-            db.create(dialect);
-        }
-
-        ArrayList claims = claimsProcessor.getClaimList();
-        for (Iterator iter = claims.iterator(); iter.hasNext();) {
-            ClaimDO claim = (ClaimDO) iter.next();
-            if (claim.getUri().equals(IdentityConstants.CLAIM_PPID)) {
-                claim.setUserEditable(false);
-            }
-            db.create(claim);
-        }
-
-        // Setup claims for the sample
-        ClaimsAdmin claimsAdmin = new ClaimsAdmin();
-        ClaimDO[] claimDOs = claimsAdmin.getAllClaims();
-        // Set supported
-        for (int i = 0; i < claimDOs.length; i++) {
-
-            if (log.isDebugEnabled()) {
-                log.debug(messages.getMessage("enableClaimsForSample"));
-            }
-
-            ClaimDO claim = claimDOs[i];
-            if (claim.getUri().equals(
-                    IdentityConstants.CLAIM_EMAIL_ADDRESS)) {
-                claim.setAttrId(IdentityConstants.CLAIM_EMAIL_ADDRESS);
-            } else if (claim.getUri().equals(
-                    IdentityConstants.CLAIM_GIVEN_NAME)) {
-                claim.setAttrId(IdentityConstants.CLAIM_GIVEN_NAME);
-            } else if (claim.getUri().equals(
-                    IdentityConstants.CLAIM_SURNAME)) {
-                claim.setAttrId(IdentityConstants.CLAIM_SURNAME);
-            }
-
-            if (claim.getUri().equals(
-                    IdentityConstants.CLAIM_EMAIL_ADDRESS)
-                    || claim.getUri().equals(
-                            IdentityConstants.CLAIM_GIVEN_NAME)
-                    || claim.getUri().equals(
-                            IdentityConstants.CLAIM_SURNAME)
-                    || claim.getUri().equals(
-                            IdentityConstants.CLAIM_PPID)) {
-                claim.setSupported(true);
-                claimsAdmin.updateClaim(claim);
-            }
-        }       
-        
-    }
-    
-    
-    /**
-     * Called only when the Identity Solution is coming up for the first time
-     */
-    private void setupRelyingPartyUserAccounts() throws Exception {
-        UserAdmin admin = new UserAdmin();
-        String[] roleNames = admin.getRoleNames();
-        boolean found = false;
-        for (int i = 0; i < roleNames.length; i++) {
-            if (IdentityProviderConstants.RP_USER_ROLE.equals(roleNames[i])) {
-                found = true;
-                break;
-            }
-        }
-        if (!found) {
-            admin.addRole(IdentityProviderConstants.RP_USER_ROLE,
-                    "Relying Party Users");
-        }
-
-    }
-
-   /**
-     * Called only when the Identity Solution is coming up for the first time
-     */
-    private void addParameters() throws Exception {
-        ParameterAdmin admin = new ParameterAdmin();
-        
admin.createOrUpdatearameter(IdentityConstants.PARAM_SUPPORTED_TOKEN_TYPES,
-                IdentityConstants.SAML10_URL + ","
-                        + IdentityConstants.SAML11_URL);
-        admin.createOrUpdatearameter(IdentityConstants.PARAM_CARD_NAME,
-                IdentityConstants.PARAM_VALUE_CARD_NAME);
-        admin.createOrUpdatearameter(IdentityConstants.PARAM_VALID_PERIOD,
-                IdentityConstants.PARAM_VALUE_VALID_PERIOD);
-        
-    }
-    
-    private void addActions() throws Exception{
-        
-      
-        
-        IPPersistenceManager db = IPPersistenceManager.getPersistanceManager();
-        for(int i=0;i<ActionDO.actions.length; i++){
-            ActionDO act = new ActionDO();
-            act.setActionId(ActionDO.actions[i]);
-            db.create(act);
-        }
-    }
+       /**
+        * [EMAIL PROTECTED] Here we carry out all initialization work of the 
identity
+        * solution : identity provider
+        */
+       public void init(ConfigurationContext ctx) throws AxisFault,
+                       ServerException {
+               log.info(messages.getMessage("initStart"));
+
+               ConfigurationContextHolder.setConfigurationContext(ctx);
+
+               try {
+                       IPPersistenceManager db = IPPersistenceManager
+                                       .getPersistanceManager();
+
+                       // Checking whether the initial startup - at least one 
dialect must
+                       // be there
+                       DialectDO[] dialectDOs = db.getAllSupportedDialects();
+                       boolean isInitial = false;
+                       if (dialectDOs.length == 0) {
+                               isInitial = true;
+                       }
+
+                       STSConfigAdmin.configuraServices(isInitial);
+
+                       if (isInitial) {
+                               addDialectsAndClaims();
+                               setupRelyingPartyUserAccounts();
+                               addParameters();
+                               setupAllRealms();
+                               addActions();
+                               // Add the globally trusted relying party
+                               RelyingPartyDO rp = new RelyingPartyDO();
+                               rp = new RelyingPartyDO();
+
+                               ServerConfiguration serverConfig = 
ServerConfiguration
+                                               .getInstance();
+                               
rp.setHostName(serverConfig.getFirstProperty("HostName"));
+                               rp.setAlias(serverConfig
+                                               
.getFirstProperty("Security.KeyStore.KeyAlias"));
+                               db.create(rp);
+
+                               // // remove the below 4 lines after dumindoo's 
fix
+                               VerifierServiceIdpDO idp = new 
VerifierServiceIdpDO();
+                               idp.setHostName("localhost");
+                               idp.setGlobal(true);
+                               db.create(idp);
+
+                       }
+
+               } catch (Exception e) {
+                       throw new AxisFault(e.getMessage(), e);
+               }
+
+               log.info(messages.getMessage("initDone"));
+
+       }
+
+       private void setupAllRealms() throws Exception {
+               IPPersistenceManager db = 
IPPersistenceManager.getPersistanceManager();
+               // Add JDBC realm
+               RealmDO jdbcRealm = new RealmDO();
+               jdbcRealm.setClassName(JDBCRealm.class.getName());
+               jdbcRealm.setConfigClassName(JDBCRealmConfig.class.getName());
+               db.create(jdbcRealm);
+
+               // Add LDAP realm
+               RealmDO ldapRealm = new RealmDO();
+               ldapRealm.setClassName(LDAPRealm.class.getName());
+               ldapRealm.setConfigClassName(LDAPRealmConfig.class.getName());
+               db.create(ldapRealm);
+
+               RealmDO wsasRealm = new RealmDO();
+               wsasRealm.setClassName(WSASRealm.class.getName());
+               wsasRealm.setConfigClassName(null);
+               db.create(wsasRealm);
+
+               RealmConfigurationDO wsasRealmConfig = new 
RealmConfigurationDO();
+               wsasRealmConfig.setName("wsasRealmForAccessControlSample");
+               wsasRealmConfig.setRealm(wsasRealm);
+               db.create(wsasRealmConfig);
+
+               RealmDO defaultRalm = new RealmDO();
+               defaultRalm.setClassName(DefaultRealm.class.getName());
+               
defaultRalm.setConfigClassName(DefaultRealmConfig.class.getName());
+               db.create(defaultRalm);
+
+               // Add default realm configuration
+               RealmConfigurationDO realmConfig = new RealmConfigurationDO();
+               realmConfig.setName("defaultRealm");
+               realmConfig.setRealm(defaultRalm);
+               realmConfig.setEffective(true);
+               db.create(realmConfig);
+
+               RealmConfigurationPropertyDO prop = new 
RealmConfigurationPropertyDO();
+               prop.setConfig(realmConfig);
+               prop.setName("ConnectionURL");
+               prop.setValue(IdentityProviderConstants.Default.CONNECTION_URL);
+               db.create(prop);
+
+               prop = new RealmConfigurationPropertyDO();
+               prop.setConfig(realmConfig);
+               prop.setName("ConnectionUserName");
+               
prop.setValue(IdentityProviderConstants.Default.CONNECTION_USER_NAME);
+               db.create(prop);
+
+               prop = new RealmConfigurationPropertyDO();
+               prop.setConfig(realmConfig);
+               prop.setName("ConnectionPassword");
+               
prop.setValue(IdentityProviderConstants.Sample.CONNECTION_PASSWORD);
+               db.create(prop);
+
+               prop = new RealmConfigurationPropertyDO();
+               prop.setConfig(realmConfig);
+               prop.setName("DriverName");
+               prop.setValue(IdentityProviderConstants.Default.DRIVER);
+               db.create(prop);
+
+               prop = new RealmConfigurationPropertyDO();
+               prop.setConfig(realmConfig);
+               prop.setName("SqlFile");
+               prop.setValue(System.getProperty(ServerConstants.WSO2WSAS_HOME)
+                               + "/conf/"
+                               + 
IdentityProviderConstants.Default.SQL_STATEMENTS_FILE_PATH);
+               db.create(prop);
+
+               this.setupSampleRealmConfig(db, jdbcRealm);
+       }
+
+       /**
+        * Setup the user store for the identity provider sample.
+        * 
+        * @param db
+        * @param jdbcRealm
+        * @throws Exception
+        */
+       private void setupSampleRealmConfig(IPPersistenceManager db,
+                       RealmDO jdbcRealm) throws Exception {
+
+               // Add sample realm configuration
+               RealmConfigurationDO realmConfig = new RealmConfigurationDO();
+               realmConfig.setName("sampleRealm");
+               realmConfig.setRealm(jdbcRealm);
+               db.create(realmConfig);
+
+               RealmConfigurationPropertyDO prop = new 
RealmConfigurationPropertyDO();
+               prop.setConfig(realmConfig);
+               prop.setName("ConnectionURL");
+               prop.setValue(IdentityProviderConstants.Sample.CONNECTION_URL);
+               db.create(prop);
+
+               prop = new RealmConfigurationPropertyDO();
+               prop.setConfig(realmConfig);
+               prop.setName("ConnectionUserName");
+               
prop.setValue(IdentityProviderConstants.Sample.CONNECTION_USER_NAME);
+               db.create(prop);
+
+               prop = new RealmConfigurationPropertyDO();
+               prop.setConfig(realmConfig);
+               prop.setName("ConnectionPassword");
+               
prop.setValue(IdentityProviderConstants.Sample.CONNECTION_PASSWORD);
+               db.create(prop);
+
+               prop = new RealmConfigurationPropertyDO();
+               prop.setConfig(realmConfig);
+               prop.setName("DriverName");
+               prop.setValue(IdentityProviderConstants.Sample.DRIVER);
+               db.create(prop);
+
+               prop = new RealmConfigurationPropertyDO();
+               prop.setConfig(realmConfig);
+               prop.setName("UserTable");
+               prop.setValue(IdentityProviderConstants.Sample.USER_TABLE);
+               db.create(prop);
+
+               prop = new RealmConfigurationPropertyDO();
+               prop.setConfig(realmConfig);
+               prop.setName("UserNameColumn");
+               
prop.setValue(IdentityProviderConstants.Sample.USER_NAME_COLUMN);
+               db.create(prop);
+
+               prop = new RealmConfigurationPropertyDO();
+               prop.setConfig(realmConfig);
+               prop.setName("UserNameColumn");
+               
prop.setValue(IdentityProviderConstants.Sample.USER_NAME_COLUMN);
+               db.create(prop);
+
+               prop = new RealmConfigurationPropertyDO();
+               prop.setConfig(realmConfig);
+               prop.setName("UserCredentialColumn");
+               prop.setValue(IdentityProviderConstants.Sample.PASSWORD_COLUMN);
+               db.create(prop);
+
+               prop = new RealmConfigurationPropertyDO();
+               prop.setConfig(realmConfig);
+               prop.setName("ColumnNames");
+               
prop.setValue(IdentityProviderConstants.Sample.COLUMN_NAME_EMAIL + ","
+                               + 
IdentityProviderConstants.Sample.COLUMN_NAME_FIRSTNAME + ","
+                               + 
IdentityProviderConstants.Sample.COLUMN_NAME_LASTNAME);
+               db.create(prop);
+
+       }
+
+       private void addDialectsAndClaims() throws IdentityProviderException,
+                       AxisFault {
+               IPPersistenceManager db = 
IPPersistenceManager.getPersistanceManager();
+               if (log.isDebugEnabled()) {
+                       
log.debug(messages.getMessage("addingInitialClaimsInfo"));
+               }
+
+               InitialClaimsProcessor claimsProcessor = new 
InitialClaimsProcessor();
+               claimsProcessor
+                               
.process(IdentityProviderConstants.INITIAL_CLAIMS_FILE_PATH);
+               ArrayList dialects = claimsProcessor.getDialectList();
+               for (Iterator iter = dialects.iterator(); iter.hasNext();) {
+                       DialectDO dialect = (DialectDO) iter.next();
+                       db.create(dialect);
+               }
+
+               ArrayList claims = claimsProcessor.getClaimList();
+               for (Iterator iter = claims.iterator(); iter.hasNext();) {
+                       ClaimDO claim = (ClaimDO) iter.next();
+                       if 
(claim.getUri().equals(IdentityConstants.CLAIM_PPID)) {
+                               claim.setUserEditable(false);
+                       }
+                       db.create(claim);
+               }
+
+               // Setup claims for the sample
+               ClaimsAdmin claimsAdmin = new ClaimsAdmin();
+               ClaimDO[] claimDOs = claimsAdmin.getAllClaims();
+               // Set supported
+               for (int i = 0; i < claimDOs.length; i++) {
+
+                       if (log.isDebugEnabled()) {
+                               
log.debug(messages.getMessage("enableClaimsForSample"));
+                       }
+
+                       ClaimDO claim = claimDOs[i];
+                       if 
(claim.getUri().equals(IdentityConstants.CLAIM_EMAIL_ADDRESS)) {
+                               
claim.setAttrId(IdentityConstants.CLAIM_EMAIL_ADDRESS);
+                       } else if (claim.getUri()
+                                       
.equals(IdentityConstants.CLAIM_GIVEN_NAME)) {
+                               
claim.setAttrId(IdentityConstants.CLAIM_GIVEN_NAME);
+                       } else if 
(claim.getUri().equals(IdentityConstants.CLAIM_SURNAME)) {
+                               
claim.setAttrId(IdentityConstants.CLAIM_SURNAME);
+                       } else if 
(claim.getUri().equals(IdentityConstants.CLAIM_OPENID)) {
+                               claim.setAttrId(IdentityConstants.CLAIM_OPENID);
+                               claim.setUserEditable(false);
+                               claimsAdmin.updateClaim(claim);
+                       }
+
+                       if 
(claim.getUri().equals(IdentityConstants.CLAIM_EMAIL_ADDRESS)
+                                       || claim.getUri()
+                                                       
.equals(IdentityConstants.CLAIM_GIVEN_NAME)
+                                       || 
claim.getUri().equals(IdentityConstants.CLAIM_SURNAME)
+                                       || 
claim.getUri().equals(IdentityConstants.CLAIM_PPID)) {
+                               claim.setSupported(true);
+                               claimsAdmin.updateClaim(claim);
+                       }
+               }
+
+       }
+
+       /**
+        * Called only when the Identity Solution is coming up for the first 
time
+        */
+       private void setupRelyingPartyUserAccounts() throws Exception {
+               UserAdmin admin = new UserAdmin();
+               String[] roleNames = admin.getRoleNames();
+               boolean found = false;
+               for (int i = 0; i < roleNames.length; i++) {
+                       if 
(IdentityProviderConstants.RP_USER_ROLE.equals(roleNames[i])) {
+                               found = true;
+                               break;
+                       }
+               }
+               if (!found) {
+                       admin.addRole(IdentityProviderConstants.RP_USER_ROLE,
+                                       "Relying Party Users");
+               }
+
+       }
+
+       /**
+        * Called only when the Identity Solution is coming up for the first 
time
+        */
+       private void addParameters() throws Exception {
+               ParameterAdmin admin = new ParameterAdmin();
+               admin.createOrUpdatearameter(
+                               IdentityConstants.PARAM_SUPPORTED_TOKEN_TYPES,
+                               IdentityConstants.SAML10_URL + ","
+                                               + IdentityConstants.SAML11_URL);
+               admin.createOrUpdatearameter(IdentityConstants.PARAM_CARD_NAME,
+                               IdentityConstants.PARAM_VALUE_CARD_NAME);
+               
admin.createOrUpdatearameter(IdentityConstants.PARAM_VALID_PERIOD,
+                               IdentityConstants.PARAM_VALUE_VALID_PERIOD);
+
+       }
+
+       private void addActions() throws Exception {
+
+               IPPersistenceManager db = 
IPPersistenceManager.getPersistanceManager();
+               for (int i = 0; i < ActionDO.actions.length; i++) {
+                       ActionDO act = new ActionDO();
+                       act.setActionId(ActionDO.actions[i]);
+                       db.create(act);
+               }
+       }
 
 }

_______________________________________________
Identity-dev mailing list
[email protected]
http://wso2.org/cgi-bin/mailman/listinfo/identity-dev

Reply via email to