Author: dimuthul
Date: Fri Feb 29 02:26:51 2008
New Revision: 14349
Log:
Adding the card issuer log and token issuer logs.
Modified:
trunk/solutions/identity/modules/identity-provider/conf/log4j.properties
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/IdentityProviderConstants.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/cards/CardIssuer.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/resources.properties
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/IdentityTokenIssuer.java
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML1TokenBuilderSimulator.java
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML1TokenBuilderTest.java
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML2TokenBuilderSimulator.java
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML2TokenBuilderTest.java
Modified:
trunk/solutions/identity/modules/identity-provider/conf/log4j.properties
==============================================================================
--- trunk/solutions/identity/modules/identity-provider/conf/log4j.properties
(original)
+++ trunk/solutions/identity/modules/identity-provider/conf/log4j.properties
Fri Feb 29 02:26:51 2008
@@ -25,6 +25,10 @@
log4j.rootLogger=INFO, WSO2WSAS_CONSOLE, WSO2WSAS_LOGFILE, WSO2WSAS_MEMORY,
WSO2WSAS_SYS_LOG
+log4j.logger.org.wso2.solutions.identity.card=DEBUG, CARDISSUER_LOGFILE
+log4j.logger.org.wso2.solutions.identity.token=DEBUG, TOKENISSUER_LOGFILE
+
+log4j.logger.org.wso2.solutions.identity.error=ERROR, WSO2WSAS_LOGFILE,
WSO2WSAS_MEMORY
log4j.logger.org.apache.axis2.wsdl.codegen.writer.PrettyPrinter=ERROR,
WSO2WSAS_LOGFILE, WSO2WSAS_MEMORY
log4j.logger.org.apache.axis2.clustering=DEBUG, WSO2WSAS_CONSOLE,
WSO2WSAS_LOGFILE
log4j.logger.org.apache=ERROR, WSO2WSAS_LOGFILE, WSO2WSAS_MEMORY
@@ -59,6 +63,29 @@
log4j.appender.WSO2WSAS_MEMORY.layout.ConversionPattern=%5p [%d] %x %m%n
log4j.appender.WSO2WSAS_MEMORY.threshold=DEBUG
+
+# TOKENISSUER_LOGFILE is set to be a DailyRollingFileAppender using a
PatternLayout.
+log4j.appender.TOKENISSUER_LOGFILE=org.apache.log4j.DailyRollingFileAppender
+# Log file will be overridden by the configuration setting in the DB
+# This path should be relative to WSO2 WSAS Home
+log4j.appender.TOKENISSUER_LOGFILE.File=logs/token_issuer.log
+log4j.appender.TOKENISSUER_LOGFILE.Append=true
+log4j.appender.TOKENISSUER_LOGFILE.layout=org.apache.log4j.PatternLayout
+# ConversionPattern will be overridden by the configuration setting in the DB
+log4j.appender.TOKENISSUER_LOGFILE.layout.ConversionPattern=%5p [%d] %x %m%n
+log4j.appender.TOKENISSUER_LOGFILE.threshold=DEBUG
+
+# CARDISSUER_LOGFILE is set to be a DailyRollingFileAppender using a
PatternLayout.
+log4j.appender.CARDISSUER_LOGFILE=org.apache.log4j.DailyRollingFileAppender
+# Log file will be overridden by the configuration setting in the DB
+# This path should be relative to WSO2 WSAS Home
+log4j.appender.CARDISSUER_LOGFILE.File=logs/card_issuer.log
+log4j.appender.CARDISSUER_LOGFILE.Append=true
+log4j.appender.CARDISSUER_LOGFILE.layout=org.apache.log4j.PatternLayout
+# ConversionPattern will be overridden by the configuration setting in the DB
+log4j.appender.CARDISSUER_LOGFILE.layout.ConversionPattern=%5p [%d] %x %m%n
+log4j.appender.CARDISSUER_LOGFILE.threshold=DEBUG
+
# WSO2WSAS_LOGFILE is set to be a DailyRollingFileAppender using a
PatternLayout.
log4j.appender.WSO2WSAS_LOGFILE=org.apache.log4j.DailyRollingFileAppender
# Log file will be overridden by the configuration setting in the DB
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/IdentityProviderConstants.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/IdentityProviderConstants.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/IdentityProviderConstants.java
Fri Feb 29 02:26:51 2008
@@ -61,9 +61,9 @@
public final static String ATTR_NS_WORK_PHONE = IdentityConstants.NS
+ "/claims/otherphone";
-
+
public final static String ATTR_NS_NICKNAME = IdentityConstants.NS
- + "/claims/nickname";
+ + "/claims/nickname";
public final static String ATTR_NS_MOBILE_PHONE = IdentityConstants.NS
+ "/claims/mobile";
@@ -93,6 +93,12 @@
public final static String ISSUER_SELF = "Self";
+ public final static String CARD_ISSUSER_LOG =
+ "org.wso2.solutions.identity.card";
+
+ public final static String TOKEN_ISSUSER_LOG =
+ "org.wso2.solutions.identity.token";
+
/**
* Local names of the identity provider constants
*/
@@ -126,7 +132,7 @@
public final static String X509V3_AUTNENTICATE = "X509V3Authenticate";
public final static String IDENTITY = "Identity";
-
+
public final static String OPEN_ID_TOKEN = "OpenIDToken";
}
@@ -172,27 +178,26 @@
public final static String PARAM_NAME_EMAIL_PASSWORD = "email_password";
public final static String PARAM_NAME_EMAIL_VERIFICATION_EPR = "email_epr";
-
+
public final static String DEFAULT_IDENTITY_KEYSTORE_NAME = "wso2is.jks";
public final static String USER_TRUSTED_RP_KEYSTORE_NAME = "userRP.jks";
-
+
public final static String PARAM_NAME_ENABLE_OPENID_REGISTRATION =
"enableOpenIDReg";
-
+
/**
* Server Config data retrieval Strings.
*/
- public static class ServerConfig{
-
+ public static class ServerConfig {
+
public final static String USER_TRUSTED_RP_STORE_LOCATION =
"Security.UserTrustedRPStore.Location";
-
+
public final static String USER_TRUSTED_RP_STORE_PASSWORD =
"Security.UserTrustedRPStore.Password";
-
+
public final static String USER_TRUSTED_RP_STORE_TYPE =
"Security.UserTrustedRPStore.Type";
-
-
-
+
}
+
/**
* Sample related constants of the identity provider
*/
@@ -228,23 +233,22 @@
public final static String DRIVER =
"org.apache.derby.jdbc.EmbeddedDriver";
public final static String SQL_STATEMENTS_FILE_PATH =
"user.default.sql.properties";
-
}
/**
* OpenID related constants of the identity provider
*/
- public static class OpenId {
-
+ public static class OpenId {
+
public final static String PASSWORD = "password";
-
+
public static final String SERVICE_NAME_STS_OPENID = "sts-openid-ut";
-
- public static final String SERVICE_NAME_MEX_OPENID = "mex-openid-ut" ;
-
+
+ public static final String SERVICE_NAME_MEX_OPENID = "mex-openid-ut";
+
public static final String SERVICE_NAME_MEX_IC_OPENID =
"mex-openid-ic";
-
+
public static final String SERVICE_NAME_STS_IC_OPENID =
"sts-openid-ic";
}
}
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/cards/CardIssuer.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/cards/CardIssuer.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/cards/CardIssuer.java
Fri Feb 29 02:26:51 2008
@@ -70,6 +70,9 @@
private static Log log = LogFactory.getLog(CardIssuer.class);
+ private static Log cardIssuerLog = LogFactory
+ .getLog(IdentityProviderConstants.CARD_ISSUSER_LOG);
+
private static Messages messages = Messages
.getInstance(IdentityProviderConstants.RESOURCES);
@@ -77,15 +80,22 @@
// an InfoCard based on SAML token type.
private boolean isOpenIdInfoCard = false;
+ private boolean isCardLogDebug = false;
private static CardIssuerConfig issuerConfig = null;
public CardIssuer() throws IdentityProviderException {
issuerConfig = CardIssuerConfig.getInstance();
+ isCardLogDebug = cardIssuerLog.isDebugEnabled();
}
public Element issueCardForUsername(String username,
boolean requireAppliesTo) throws IdentityProviderException {
+ if (isCardLogDebug) {
+ cardIssuerLog.debug(messages.getMessage("startCardIssue",
+ new String[] { "usernameToken", username }));
+ }
+
UsernamePasswordCredential passCred = new UsernamePasswordCredential();
passCred.setUsername(username);
UserCredential cred = new UserCredential(passCred);
@@ -95,6 +105,12 @@
public Element issueCardForSelfIssuedCard(String ppid,
boolean requireAppliesTo) throws IdentityProviderException {
+
+ if (isCardLogDebug) {
+ cardIssuerLog.debug(messages.getMessage("startCardIssue",
+ new String[] { "selfIssuedCard", ppid }));
+ }
+
Element cardElement = null;
SelfIssuedCredential selfCred = new SelfIssuedCredential(ppid);
RegisteredInfoCardInfoAdmin registerAdmin = new
RegisteredInfoCardInfoAdmin();
@@ -139,18 +155,29 @@
Identity id = new Identity();
id.setCertificate((X509Certificate) store.getCertificate(alias));
-
+
InformationCard infoCard = getInfoCard(credential, id,
requireAppliesTo);
-
+
+ if (isCardLogDebug) {
+ cardIssuerLog.debug(messages.getMessage("cardElementGenerated",
+ new String[]
{infoCard.getInformationCardReference().getCardId()}));
+ }
+
storeCard(infoCard, primaryUserId);
Element elem = gen.signCard(infoCard);
+ if (isCardLogDebug) {
+
cardIssuerLog.debug(messages.getMessage("cardSignedSuccessfully",
+ new String[]
{infoCard.getInformationCardReference().getCardId()}));
+ }
+
String cardId = infoCard.getInformationCardReference().getCardId();
ReportAdmin.record(primaryUserId,
ActionDO.ACTION_USER_DOWNLOAD_CARD, "CardId=" + cardId);
+
return elem;
} catch (CardModelException e) {
throw new IdentityProviderException("cardModelError", e);
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/resources.properties
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/resources.properties
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/resources.properties
Fri Feb 29 02:26:51 2008
@@ -86,4 +86,13 @@
errorAccessActions = Error in accessing user actions from database
errorQuerryingOpenIDUserRP = Error reading OpenID user RPs from database
+#card Generation Log
+startCardIssue = Card requested by user. User gave {0} and identified by {1}
+cardElementGenerated = Card element generated. New card Id : {0}
+cardSignedSuccessfully = Successfully signed and issued card Id {0}
+#token Generation Log
+validInfoCard = Valid Token request by infocard {0}
+startSAMLTokenCreation = Start creation of SAML Token for InfoCard {0}
+finishSAMLTokenCreation = Successfully created SAML Token for InfoCard {0}
+RSTRCreationDone = Successfully created RSTR for InfoCard {0}
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/IdentityTokenIssuer.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/IdentityTokenIssuer.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/IdentityTokenIssuer.java
Fri Feb 29 02:26:51 2008
@@ -66,9 +66,11 @@
import org.w3c.dom.Element;
import org.w3c.dom.Node;
import org.wso2.solutions.identity.IdentityConstants;
+import org.wso2.solutions.identity.IdentityProviderConstants;
import org.wso2.solutions.identity.IdentityProviderException;
import org.wso2.solutions.identity.admin.ParameterAdmin;
import org.wso2.solutions.identity.admin.ReportAdmin;
+import org.wso2.solutions.identity.i18n.Messages;
import org.wso2.solutions.identity.persistence.IPPersistenceManager;
import org.wso2.solutions.identity.persistence.dataobject.ActionDO;
import org.wso2.solutions.identity.persistence.dataobject.InfoCardDO;
@@ -108,6 +110,18 @@
public final static String ISSUER_SELF = IdentityConstants.NS
+ "/issuer/self";
+ private static Log tokenIssuerLog = LogFactory
+ .getLog(IdentityProviderConstants.TOKEN_ISSUSER_LOG);
+
+ private static Messages messages = Messages
+ .getInstance(IdentityProviderConstants.RESOURCES);
+
+ private boolean isTokenLogDebug = false;
+
+ public IdentityTokenIssuer() {
+ isTokenLogDebug = tokenIssuerLog.isDebugEnabled();
+ }
+
/**
* [EMAIL PROTECTED]
*/
@@ -148,6 +162,11 @@
}
+ if (isTokenLogDebug) {
+ tokenIssuerLog.debug(messages.getMessage("validInfoCard",
+ new String[] { ipData.getCardID() }));
+ }
+
return createResponse(data);
} catch (Exception e) {
@@ -216,13 +235,28 @@
+ (300 * 1000));
String assertionId = UUIDGenerator.getUUID();
+ if (isTokenLogDebug) {
+ tokenIssuerLog.debug(messages.getMessage(
+ "startSAMLTokenCreation", new String[] { ipData
+ .getCardID() }));
+ }
Element assertionNode = createSAMLAssertionAsDOM(ipData, rahasData,
notBefore, notAfter, assertionId);
+ if (isTokenLogDebug) {
+ tokenIssuerLog.debug(messages.getMessage(
+ "finishSAMLTokenCreation", new String[] { ipData
+ .getCardID() }));
+ }
+
OMElement rstrElem = createRSTR(rahasData, notBefore.toDate(),
notAfter.toDate(), env, doc, assertionNode, assertionId,
encryptedKey);
+ if (isTokenLogDebug) {
+ tokenIssuerLog.debug(messages.getMessage("RSTRCreationDone",
+ new String[] { ipData.getCardID() }));
+ }
if (log.isDebugEnabled()) {
log.debug("Response created");
log.debug("Response body : \n" + rstrElem.toString() + "\n\n");
@@ -250,7 +284,7 @@
}
throw new TrustException(TrustException.REQUEST_FAILED, e);
} finally {
- log.info("Response ready for : " + ipData.getCardID());
+ log.info("Response ready for : " + ipData.getCardID());
}
}
Modified:
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML1TokenBuilderSimulator.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML1TokenBuilderSimulator.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML1TokenBuilderSimulator.java
Fri Feb 29 02:26:51 2008
@@ -20,6 +20,7 @@
*/
public class SAML1TokenBuilderSimulator extends SAML1TokenBuilder {
+
public void createStatement(IdentityProviderData ipData, RahasData
rahasData)
throws IdentityProviderException {
Modified:
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML1TokenBuilderTest.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML1TokenBuilderTest.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML1TokenBuilderTest.java
Fri Feb 29 02:26:51 2008
@@ -8,6 +8,7 @@
import org.joda.time.DateTime;
import org.opensaml.DefaultBootstrap;
import org.w3c.dom.Element;
+import org.w3c.dom.NodeList;
public class SAML1TokenBuilderTest
extends TestCase {
@@ -34,11 +35,11 @@
builder.marshellAndSign();
Element elemSAML = builder.getSAMLasDOM();
- // now we have to compare something.
- // let's compare
-
- // String val = DOM2Writer.nodeToString(elemSAML);
- // System.out.println(val);
+ NodeList list =
elemSAML.getElementsByTagNameNS("http://www.w3.org/2000/09/xmldsig#",
"Signature");
+ TestCase.assertNotNull(list);
+ TestCase.assertEquals(1, list.getLength());
+
+
}
Modified:
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML2TokenBuilderSimulator.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML2TokenBuilderSimulator.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML2TokenBuilderSimulator.java
Fri Feb 29 02:26:51 2008
@@ -40,6 +40,8 @@
attribute.getAttributeValues().add(stringValue);
attributeStmt.getAttributes().add(attribute);
+
+
}
}
Modified:
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML2TokenBuilderTest.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML2TokenBuilderTest.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML2TokenBuilderTest.java
Fri Feb 29 02:26:51 2008
@@ -1,19 +1,24 @@
package org.wso2.solutions.identity.sts.saml;
+
+
+import junit.framework.TestCase;
+
import org.apache.axiom.om.util.UUIDGenerator;
import org.apache.xml.security.Init;
import org.apache.xml.security.signature.XMLSignature;
import org.joda.time.DateTime;
import org.opensaml.DefaultBootstrap;
import org.w3c.dom.Element;
+import org.w3c.dom.NodeList;
-public class SAML2TokenBuilderTest {
+public class SAML2TokenBuilderTest extends TestCase{
static {
Init.init();
}
- public void testSAML1TokenCreation() throws Exception {
+ public void testSAML2TokenCreation() throws Exception {
DefaultBootstrap.bootstrap();
@@ -31,8 +36,8 @@
builder.marshellAndSign();
Element elemSAML = builder.getSAMLasDOM();
- // String val = DOM2Writer.nodeToString(elemSAML);
- // System.out.println(val);
-
+ NodeList list =
elemSAML.getElementsByTagNameNS("http://www.w3.org/2000/09/xmldsig#",
"Signature");
+ TestCase.assertNotNull(list);
+ TestCase.assertEquals(1, list.getLength());
}
}
_______________________________________________
Identity-dev mailing list
[email protected]
http://wso2.org/cgi-bin/mailman/listinfo/identity-dev