Author: prabath
Date: Tue Dec 11 03:09:41 2007
New Revision: 10955
Log:
Initialize OpenID related properties
Modified:
branches/solutions/identity/openid-poc/modules/identity-provider/src/main/java/org/wso2/solutions/identity/Initializer.java
Modified:
branches/solutions/identity/openid-poc/modules/identity-provider/src/main/java/org/wso2/solutions/identity/Initializer.java
==============================================================================
---
branches/solutions/identity/openid-poc/modules/identity-provider/src/main/java/org/wso2/solutions/identity/Initializer.java
(original)
+++
branches/solutions/identity/openid-poc/modules/identity-provider/src/main/java/org/wso2/solutions/identity/Initializer.java
Tue Dec 11 03:09:41 2007
@@ -55,329 +55,318 @@
*/
public class Initializer implements ServerInitializer {
- private static Log log = LogFactory.getLog(Initializer.class);
+ private static Log log = LogFactory.getLog(Initializer.class);
- private static Messages messages = Messages
- .getInstance(IdentityProviderConstants.RESOURCES);
+ private static Messages messages = Messages
+ .getInstance(IdentityProviderConstants.RESOURCES);
- /**
- * [EMAIL PROTECTED] Here we carry out all initialization work of the
identity
- * solution : identity provider
- */
- public void init(ConfigurationContext ctx) throws AxisFault,
- ServerException {
- log.info(messages.getMessage("initStart"));
-
- ConfigurationContextHolder.setConfigurationContext(ctx);
-
-
- try {
- IPPersistenceManager db = IPPersistenceManager
- .getPersistanceManager();
-
- // Checking whether the initial startup - at least one dialect
must be there
- DialectDO[] dialectDOs = db.getAllSupportedDialects();
- boolean isInitial = false;
- if (dialectDOs.length == 0) {
- isInitial = true;
- }
-
- STSConfigAdmin.configuraServices(isInitial);
-
- if(isInitial){
- addDialectsAndClaims();
- setupRelyingPartyUserAccounts();
- addParameters();
- setupAllRealms();
- addActions();
- // Add the globally trusted relying party
- RelyingPartyDO rp = new RelyingPartyDO();
- rp = new RelyingPartyDO();
-
- ServerConfiguration serverConfig = ServerConfiguration
- .getInstance();
- rp.setHostName(serverConfig.getFirstProperty("HostName"));
- rp.setAlias(serverConfig
- .getFirstProperty("Security.KeyStore.KeyAlias"));
- db.create(rp);
-
-
-
- //// remove the below 4 lines after dumindoo's fix
- VerifierServiceIdpDO idp = new VerifierServiceIdpDO();
- idp.setHostName("localhost");
- idp.setGlobal(true);
- db.create(idp);
-
- }
-
-
- } catch (Exception e) {
- throw new AxisFault(e.getMessage(), e);
- }
-
-
- log.info(messages.getMessage("initDone"));
-
- }
-
- private void setupAllRealms()
- throws Exception {
- IPPersistenceManager db = IPPersistenceManager.getPersistanceManager();
- // Add JDBC realm
- RealmDO jdbcRealm = new RealmDO();
- jdbcRealm.setClassName(JDBCRealm.class.getName());
- jdbcRealm.setConfigClassName(JDBCRealmConfig.class.getName());
- db.create(jdbcRealm);
-
- // Add LDAP realm
- RealmDO ldapRealm = new RealmDO();
- ldapRealm.setClassName(LDAPRealm.class.getName());
- ldapRealm.setConfigClassName(LDAPRealmConfig.class.getName());
- db.create(ldapRealm);
-
- RealmDO wsasRealm = new RealmDO();
- wsasRealm.setClassName(WSASRealm.class.getName());
- wsasRealm.setConfigClassName(null);
- db.create(wsasRealm);
-
-
- RealmConfigurationDO wsasRealmConfig = new RealmConfigurationDO();
- wsasRealmConfig.setName("wsasRealmForAccessControlSample");
- wsasRealmConfig.setRealm(wsasRealm);
- db.create(wsasRealmConfig);
-
- RealmDO defaultRalm = new RealmDO();
- defaultRalm.setClassName(DefaultRealm.class.getName());
- defaultRalm.setConfigClassName(DefaultRealmConfig.class
- .getName());
- db.create(defaultRalm);
-
-
- // Add default realm configuration
- RealmConfigurationDO realmConfig = new RealmConfigurationDO();
- realmConfig.setName("defaultRealm");
- realmConfig.setRealm(defaultRalm);
- realmConfig.setEffective(true);
- db.create(realmConfig);
-
- RealmConfigurationPropertyDO prop = new RealmConfigurationPropertyDO();
- prop.setConfig(realmConfig);
- prop.setName("ConnectionURL");
- prop.setValue(IdentityProviderConstants.Default.CONNECTION_URL);
- db.create(prop);
-
- prop = new RealmConfigurationPropertyDO();
- prop.setConfig(realmConfig);
- prop.setName("ConnectionUserName");
- prop.setValue(IdentityProviderConstants.Default.CONNECTION_USER_NAME);
- db.create(prop);
-
- prop = new RealmConfigurationPropertyDO();
- prop.setConfig(realmConfig);
- prop.setName("ConnectionPassword");
- prop.setValue(IdentityProviderConstants.Sample.CONNECTION_PASSWORD);
- db.create(prop);
-
- prop = new RealmConfigurationPropertyDO();
- prop.setConfig(realmConfig);
- prop.setName("DriverName");
- prop.setValue(IdentityProviderConstants.Default.DRIVER);
- db.create(prop);
-
- prop = new RealmConfigurationPropertyDO();
- prop.setConfig(realmConfig);
- prop.setName("SqlFile");
- prop.setValue(System.getProperty(ServerConstants.WSO2WSAS_HOME)
- + "/conf/"
- + IdentityProviderConstants.Default.SQL_STATEMENTS_FILE_PATH);
- db.create(prop);
-
- this.setupSampleRealmConfig(db, jdbcRealm);
- }
-
- /**
- * Setup the user store for the identity provider sample.
- *
- * @param db
- * @param jdbcRealm
- * @throws Exception
- */
- private void setupSampleRealmConfig(IPPersistenceManager db,
- RealmDO jdbcRealm) throws Exception {
-
- // Add sample realm configuration
- RealmConfigurationDO realmConfig = new RealmConfigurationDO();
- realmConfig.setName("sampleRealm");
- realmConfig.setRealm(jdbcRealm);
- db.create(realmConfig);
-
- RealmConfigurationPropertyDO prop = new RealmConfigurationPropertyDO();
- prop.setConfig(realmConfig);
- prop.setName("ConnectionURL");
- prop.setValue(IdentityProviderConstants.Sample.CONNECTION_URL);
- db.create(prop);
-
- prop = new RealmConfigurationPropertyDO();
- prop.setConfig(realmConfig);
- prop.setName("ConnectionUserName");
- prop.setValue(IdentityProviderConstants.Sample.CONNECTION_USER_NAME);
- db.create(prop);
-
- prop = new RealmConfigurationPropertyDO();
- prop.setConfig(realmConfig);
- prop.setName("ConnectionPassword");
- prop.setValue(IdentityProviderConstants.Sample.CONNECTION_PASSWORD);
- db.create(prop);
-
- prop = new RealmConfigurationPropertyDO();
- prop.setConfig(realmConfig);
- prop.setName("DriverName");
- prop.setValue(IdentityProviderConstants.Sample.DRIVER);
- db.create(prop);
-
- prop = new RealmConfigurationPropertyDO();
- prop.setConfig(realmConfig);
- prop.setName("UserTable");
- prop.setValue(IdentityProviderConstants.Sample.USER_TABLE);
- db.create(prop);
-
- prop = new RealmConfigurationPropertyDO();
- prop.setConfig(realmConfig);
- prop.setName("UserNameColumn");
- prop.setValue(IdentityProviderConstants.Sample.USER_NAME_COLUMN);
- db.create(prop);
-
- prop = new RealmConfigurationPropertyDO();
- prop.setConfig(realmConfig);
- prop.setName("UserNameColumn");
- prop.setValue(IdentityProviderConstants.Sample.USER_NAME_COLUMN);
- db.create(prop);
-
- prop = new RealmConfigurationPropertyDO();
- prop.setConfig(realmConfig);
- prop.setName("UserCredentialColumn");
- prop.setValue(IdentityProviderConstants.Sample.PASSWORD_COLUMN);
- db.create(prop);
-
- prop = new RealmConfigurationPropertyDO();
- prop.setConfig(realmConfig);
- prop.setName("ColumnNames");
- prop.setValue(IdentityProviderConstants.Sample.COLUMN_NAME_EMAIL + ","
- + IdentityProviderConstants.Sample.COLUMN_NAME_FIRSTNAME + ","
- + IdentityProviderConstants.Sample.COLUMN_NAME_LASTNAME);
- db.create(prop);
-
- }
-
-
- private void addDialectsAndClaims() throws IdentityProviderException,
AxisFault{
- IPPersistenceManager db = IPPersistenceManager.getPersistanceManager();
- if (log.isDebugEnabled()) {
- log.debug(messages.getMessage("addingInitialClaimsInfo"));
- }
-
- InitialClaimsProcessor claimsProcessor = new InitialClaimsProcessor();
- claimsProcessor
- .process(IdentityProviderConstants.INITIAL_CLAIMS_FILE_PATH);
- ArrayList dialects = claimsProcessor.getDialectList();
- for (Iterator iter = dialects.iterator(); iter.hasNext();) {
- DialectDO dialect = (DialectDO) iter.next();
- db.create(dialect);
- }
-
- ArrayList claims = claimsProcessor.getClaimList();
- for (Iterator iter = claims.iterator(); iter.hasNext();) {
- ClaimDO claim = (ClaimDO) iter.next();
- if (claim.getUri().equals(IdentityConstants.CLAIM_PPID)) {
- claim.setUserEditable(false);
- }
- db.create(claim);
- }
-
- // Setup claims for the sample
- ClaimsAdmin claimsAdmin = new ClaimsAdmin();
- ClaimDO[] claimDOs = claimsAdmin.getAllClaims();
- // Set supported
- for (int i = 0; i < claimDOs.length; i++) {
-
- if (log.isDebugEnabled()) {
- log.debug(messages.getMessage("enableClaimsForSample"));
- }
-
- ClaimDO claim = claimDOs[i];
- if (claim.getUri().equals(
- IdentityConstants.CLAIM_EMAIL_ADDRESS)) {
- claim.setAttrId(IdentityConstants.CLAIM_EMAIL_ADDRESS);
- } else if (claim.getUri().equals(
- IdentityConstants.CLAIM_GIVEN_NAME)) {
- claim.setAttrId(IdentityConstants.CLAIM_GIVEN_NAME);
- } else if (claim.getUri().equals(
- IdentityConstants.CLAIM_SURNAME)) {
- claim.setAttrId(IdentityConstants.CLAIM_SURNAME);
- }
-
- if (claim.getUri().equals(
- IdentityConstants.CLAIM_EMAIL_ADDRESS)
- || claim.getUri().equals(
- IdentityConstants.CLAIM_GIVEN_NAME)
- || claim.getUri().equals(
- IdentityConstants.CLAIM_SURNAME)
- || claim.getUri().equals(
- IdentityConstants.CLAIM_PPID)) {
- claim.setSupported(true);
- claimsAdmin.updateClaim(claim);
- }
- }
-
- }
-
-
- /**
- * Called only when the Identity Solution is coming up for the first time
- */
- private void setupRelyingPartyUserAccounts() throws Exception {
- UserAdmin admin = new UserAdmin();
- String[] roleNames = admin.getRoleNames();
- boolean found = false;
- for (int i = 0; i < roleNames.length; i++) {
- if (IdentityProviderConstants.RP_USER_ROLE.equals(roleNames[i])) {
- found = true;
- break;
- }
- }
- if (!found) {
- admin.addRole(IdentityProviderConstants.RP_USER_ROLE,
- "Relying Party Users");
- }
-
- }
-
- /**
- * Called only when the Identity Solution is coming up for the first time
- */
- private void addParameters() throws Exception {
- ParameterAdmin admin = new ParameterAdmin();
-
admin.createOrUpdatearameter(IdentityConstants.PARAM_SUPPORTED_TOKEN_TYPES,
- IdentityConstants.SAML10_URL + ","
- + IdentityConstants.SAML11_URL);
- admin.createOrUpdatearameter(IdentityConstants.PARAM_CARD_NAME,
- IdentityConstants.PARAM_VALUE_CARD_NAME);
- admin.createOrUpdatearameter(IdentityConstants.PARAM_VALID_PERIOD,
- IdentityConstants.PARAM_VALUE_VALID_PERIOD);
-
- }
-
- private void addActions() throws Exception{
-
-
-
- IPPersistenceManager db = IPPersistenceManager.getPersistanceManager();
- for(int i=0;i<ActionDO.actions.length; i++){
- ActionDO act = new ActionDO();
- act.setActionId(ActionDO.actions[i]);
- db.create(act);
- }
- }
+ /**
+ * [EMAIL PROTECTED] Here we carry out all initialization work of the
identity
+ * solution : identity provider
+ */
+ public void init(ConfigurationContext ctx) throws AxisFault,
+ ServerException {
+ log.info(messages.getMessage("initStart"));
+
+ ConfigurationContextHolder.setConfigurationContext(ctx);
+
+ try {
+ IPPersistenceManager db = IPPersistenceManager
+ .getPersistanceManager();
+
+ // Checking whether the initial startup - at least one
dialect must
+ // be there
+ DialectDO[] dialectDOs = db.getAllSupportedDialects();
+ boolean isInitial = false;
+ if (dialectDOs.length == 0) {
+ isInitial = true;
+ }
+
+ STSConfigAdmin.configuraServices(isInitial);
+
+ if (isInitial) {
+ addDialectsAndClaims();
+ setupRelyingPartyUserAccounts();
+ addParameters();
+ setupAllRealms();
+ addActions();
+ // Add the globally trusted relying party
+ RelyingPartyDO rp = new RelyingPartyDO();
+ rp = new RelyingPartyDO();
+
+ ServerConfiguration serverConfig =
ServerConfiguration
+ .getInstance();
+
rp.setHostName(serverConfig.getFirstProperty("HostName"));
+ rp.setAlias(serverConfig
+
.getFirstProperty("Security.KeyStore.KeyAlias"));
+ db.create(rp);
+
+ // // remove the below 4 lines after dumindoo's
fix
+ VerifierServiceIdpDO idp = new
VerifierServiceIdpDO();
+ idp.setHostName("localhost");
+ idp.setGlobal(true);
+ db.create(idp);
+
+ }
+
+ } catch (Exception e) {
+ throw new AxisFault(e.getMessage(), e);
+ }
+
+ log.info(messages.getMessage("initDone"));
+
+ }
+
+ private void setupAllRealms() throws Exception {
+ IPPersistenceManager db =
IPPersistenceManager.getPersistanceManager();
+ // Add JDBC realm
+ RealmDO jdbcRealm = new RealmDO();
+ jdbcRealm.setClassName(JDBCRealm.class.getName());
+ jdbcRealm.setConfigClassName(JDBCRealmConfig.class.getName());
+ db.create(jdbcRealm);
+
+ // Add LDAP realm
+ RealmDO ldapRealm = new RealmDO();
+ ldapRealm.setClassName(LDAPRealm.class.getName());
+ ldapRealm.setConfigClassName(LDAPRealmConfig.class.getName());
+ db.create(ldapRealm);
+
+ RealmDO wsasRealm = new RealmDO();
+ wsasRealm.setClassName(WSASRealm.class.getName());
+ wsasRealm.setConfigClassName(null);
+ db.create(wsasRealm);
+
+ RealmConfigurationDO wsasRealmConfig = new
RealmConfigurationDO();
+ wsasRealmConfig.setName("wsasRealmForAccessControlSample");
+ wsasRealmConfig.setRealm(wsasRealm);
+ db.create(wsasRealmConfig);
+
+ RealmDO defaultRalm = new RealmDO();
+ defaultRalm.setClassName(DefaultRealm.class.getName());
+
defaultRalm.setConfigClassName(DefaultRealmConfig.class.getName());
+ db.create(defaultRalm);
+
+ // Add default realm configuration
+ RealmConfigurationDO realmConfig = new RealmConfigurationDO();
+ realmConfig.setName("defaultRealm");
+ realmConfig.setRealm(defaultRalm);
+ realmConfig.setEffective(true);
+ db.create(realmConfig);
+
+ RealmConfigurationPropertyDO prop = new
RealmConfigurationPropertyDO();
+ prop.setConfig(realmConfig);
+ prop.setName("ConnectionURL");
+ prop.setValue(IdentityProviderConstants.Default.CONNECTION_URL);
+ db.create(prop);
+
+ prop = new RealmConfigurationPropertyDO();
+ prop.setConfig(realmConfig);
+ prop.setName("ConnectionUserName");
+
prop.setValue(IdentityProviderConstants.Default.CONNECTION_USER_NAME);
+ db.create(prop);
+
+ prop = new RealmConfigurationPropertyDO();
+ prop.setConfig(realmConfig);
+ prop.setName("ConnectionPassword");
+
prop.setValue(IdentityProviderConstants.Sample.CONNECTION_PASSWORD);
+ db.create(prop);
+
+ prop = new RealmConfigurationPropertyDO();
+ prop.setConfig(realmConfig);
+ prop.setName("DriverName");
+ prop.setValue(IdentityProviderConstants.Default.DRIVER);
+ db.create(prop);
+
+ prop = new RealmConfigurationPropertyDO();
+ prop.setConfig(realmConfig);
+ prop.setName("SqlFile");
+ prop.setValue(System.getProperty(ServerConstants.WSO2WSAS_HOME)
+ + "/conf/"
+ +
IdentityProviderConstants.Default.SQL_STATEMENTS_FILE_PATH);
+ db.create(prop);
+
+ this.setupSampleRealmConfig(db, jdbcRealm);
+ }
+
+ /**
+ * Setup the user store for the identity provider sample.
+ *
+ * @param db
+ * @param jdbcRealm
+ * @throws Exception
+ */
+ private void setupSampleRealmConfig(IPPersistenceManager db,
+ RealmDO jdbcRealm) throws Exception {
+
+ // Add sample realm configuration
+ RealmConfigurationDO realmConfig = new RealmConfigurationDO();
+ realmConfig.setName("sampleRealm");
+ realmConfig.setRealm(jdbcRealm);
+ db.create(realmConfig);
+
+ RealmConfigurationPropertyDO prop = new
RealmConfigurationPropertyDO();
+ prop.setConfig(realmConfig);
+ prop.setName("ConnectionURL");
+ prop.setValue(IdentityProviderConstants.Sample.CONNECTION_URL);
+ db.create(prop);
+
+ prop = new RealmConfigurationPropertyDO();
+ prop.setConfig(realmConfig);
+ prop.setName("ConnectionUserName");
+
prop.setValue(IdentityProviderConstants.Sample.CONNECTION_USER_NAME);
+ db.create(prop);
+
+ prop = new RealmConfigurationPropertyDO();
+ prop.setConfig(realmConfig);
+ prop.setName("ConnectionPassword");
+
prop.setValue(IdentityProviderConstants.Sample.CONNECTION_PASSWORD);
+ db.create(prop);
+
+ prop = new RealmConfigurationPropertyDO();
+ prop.setConfig(realmConfig);
+ prop.setName("DriverName");
+ prop.setValue(IdentityProviderConstants.Sample.DRIVER);
+ db.create(prop);
+
+ prop = new RealmConfigurationPropertyDO();
+ prop.setConfig(realmConfig);
+ prop.setName("UserTable");
+ prop.setValue(IdentityProviderConstants.Sample.USER_TABLE);
+ db.create(prop);
+
+ prop = new RealmConfigurationPropertyDO();
+ prop.setConfig(realmConfig);
+ prop.setName("UserNameColumn");
+
prop.setValue(IdentityProviderConstants.Sample.USER_NAME_COLUMN);
+ db.create(prop);
+
+ prop = new RealmConfigurationPropertyDO();
+ prop.setConfig(realmConfig);
+ prop.setName("UserNameColumn");
+
prop.setValue(IdentityProviderConstants.Sample.USER_NAME_COLUMN);
+ db.create(prop);
+
+ prop = new RealmConfigurationPropertyDO();
+ prop.setConfig(realmConfig);
+ prop.setName("UserCredentialColumn");
+ prop.setValue(IdentityProviderConstants.Sample.PASSWORD_COLUMN);
+ db.create(prop);
+
+ prop = new RealmConfigurationPropertyDO();
+ prop.setConfig(realmConfig);
+ prop.setName("ColumnNames");
+
prop.setValue(IdentityProviderConstants.Sample.COLUMN_NAME_EMAIL + ","
+ +
IdentityProviderConstants.Sample.COLUMN_NAME_FIRSTNAME + ","
+ +
IdentityProviderConstants.Sample.COLUMN_NAME_LASTNAME);
+ db.create(prop);
+
+ }
+
+ private void addDialectsAndClaims() throws IdentityProviderException,
+ AxisFault {
+ IPPersistenceManager db =
IPPersistenceManager.getPersistanceManager();
+ if (log.isDebugEnabled()) {
+
log.debug(messages.getMessage("addingInitialClaimsInfo"));
+ }
+
+ InitialClaimsProcessor claimsProcessor = new
InitialClaimsProcessor();
+ claimsProcessor
+
.process(IdentityProviderConstants.INITIAL_CLAIMS_FILE_PATH);
+ ArrayList dialects = claimsProcessor.getDialectList();
+ for (Iterator iter = dialects.iterator(); iter.hasNext();) {
+ DialectDO dialect = (DialectDO) iter.next();
+ db.create(dialect);
+ }
+
+ ArrayList claims = claimsProcessor.getClaimList();
+ for (Iterator iter = claims.iterator(); iter.hasNext();) {
+ ClaimDO claim = (ClaimDO) iter.next();
+ if
(claim.getUri().equals(IdentityConstants.CLAIM_PPID)) {
+ claim.setUserEditable(false);
+ }
+ db.create(claim);
+ }
+
+ // Setup claims for the sample
+ ClaimsAdmin claimsAdmin = new ClaimsAdmin();
+ ClaimDO[] claimDOs = claimsAdmin.getAllClaims();
+ // Set supported
+ for (int i = 0; i < claimDOs.length; i++) {
+
+ if (log.isDebugEnabled()) {
+
log.debug(messages.getMessage("enableClaimsForSample"));
+ }
+
+ ClaimDO claim = claimDOs[i];
+ if
(claim.getUri().equals(IdentityConstants.CLAIM_EMAIL_ADDRESS)) {
+
claim.setAttrId(IdentityConstants.CLAIM_EMAIL_ADDRESS);
+ } else if (claim.getUri()
+
.equals(IdentityConstants.CLAIM_GIVEN_NAME)) {
+
claim.setAttrId(IdentityConstants.CLAIM_GIVEN_NAME);
+ } else if
(claim.getUri().equals(IdentityConstants.CLAIM_SURNAME)) {
+
claim.setAttrId(IdentityConstants.CLAIM_SURNAME);
+ } else if
(claim.getUri().equals(IdentityConstants.CLAIM_OPENID)) {
+ claim.setAttrId(IdentityConstants.CLAIM_OPENID);
+ claim.setUserEditable(false);
+ claimsAdmin.updateClaim(claim);
+ }
+
+ if
(claim.getUri().equals(IdentityConstants.CLAIM_EMAIL_ADDRESS)
+ || claim.getUri()
+
.equals(IdentityConstants.CLAIM_GIVEN_NAME)
+ ||
claim.getUri().equals(IdentityConstants.CLAIM_SURNAME)
+ ||
claim.getUri().equals(IdentityConstants.CLAIM_PPID)) {
+ claim.setSupported(true);
+ claimsAdmin.updateClaim(claim);
+ }
+ }
+
+ }
+
+ /**
+ * Called only when the Identity Solution is coming up for the first
time
+ */
+ private void setupRelyingPartyUserAccounts() throws Exception {
+ UserAdmin admin = new UserAdmin();
+ String[] roleNames = admin.getRoleNames();
+ boolean found = false;
+ for (int i = 0; i < roleNames.length; i++) {
+ if
(IdentityProviderConstants.RP_USER_ROLE.equals(roleNames[i])) {
+ found = true;
+ break;
+ }
+ }
+ if (!found) {
+ admin.addRole(IdentityProviderConstants.RP_USER_ROLE,
+ "Relying Party Users");
+ }
+
+ }
+
+ /**
+ * Called only when the Identity Solution is coming up for the first
time
+ */
+ private void addParameters() throws Exception {
+ ParameterAdmin admin = new ParameterAdmin();
+ admin.createOrUpdatearameter(
+ IdentityConstants.PARAM_SUPPORTED_TOKEN_TYPES,
+ IdentityConstants.SAML10_URL + ","
+ + IdentityConstants.SAML11_URL);
+ admin.createOrUpdatearameter(IdentityConstants.PARAM_CARD_NAME,
+ IdentityConstants.PARAM_VALUE_CARD_NAME);
+
admin.createOrUpdatearameter(IdentityConstants.PARAM_VALID_PERIOD,
+ IdentityConstants.PARAM_VALUE_VALID_PERIOD);
+
+ }
+
+ private void addActions() throws Exception {
+
+ IPPersistenceManager db =
IPPersistenceManager.getPersistanceManager();
+ for (int i = 0; i < ActionDO.actions.length; i++) {
+ ActionDO act = new ActionDO();
+ act.setActionId(ActionDO.actions[i]);
+ db.create(act);
+ }
+ }
}
_______________________________________________
Identity-dev mailing list
[email protected]
http://wso2.org/cgi-bin/mailman/listinfo/identity-dev