Author: prabath
Date: Sat Mar 1 08:12:24 2008
New Revision: 14394
Log:
code review fixes as suggested by findbugs
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDProvider.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDProviderData.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/persistence/dao/OpenIDUserRPDAO.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/IdentityTokenIssuer.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/OpenIDTokenIssuer.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/users/IdentityDefaultUserStoreAdmin.java
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/users/IdentityDefaultUserStoreReader.java
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/openid/OpenIDConsumer.java
trunk/solutions/identity/modules/user-ui/src/main/java/org/wso2/solutions/identity/user/ui/action/EditUserProfileAction.java
trunk/solutions/identity/modules/user-ui/src/main/java/org/wso2/solutions/identity/user/ui/action/OpenIDAuthVerificationAction.java
trunk/solutions/identity/modules/user-ui/src/main/java/org/wso2/solutions/identity/user/ui/action/OpenIDUserApprovalAction.java
trunk/solutions/identity/modules/user-ui/src/main/java/org/wso2/solutions/identity/user/ui/filter/JSPFilter.java
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDProvider.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDProvider.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDProvider.java
Sat Mar 1 08:12:24 2008
@@ -43,7 +43,7 @@
public class OpenIDProvider {
// Instantiate a ServerManager object.
- public static ServerManager manager = new OpenIDServerManager();
+ public static final ServerManager manager = new OpenIDServerManager();
private String authPage;
private static Log log = LogFactory.getLog(OpenIDProvider.class);
@@ -68,18 +68,18 @@
manager.setOPEndpointUrl(opAddress);
for (char c = 'a'; c <= 'z'; c++)
- UNRESERVED_CHARACTERS.add(new Character(c));
+ UNRESERVED_CHARACTERS.add(Character.valueOf(c));
for (char c = 'A'; c <= 'A'; c++)
- UNRESERVED_CHARACTERS.add(new Character(c));
+ UNRESERVED_CHARACTERS.add(Character.valueOf(c));
for (char c = '0'; c <= '9'; c++)
- UNRESERVED_CHARACTERS.add(new Character(c));
+ UNRESERVED_CHARACTERS.add(Character.valueOf(c));
- UNRESERVED_CHARACTERS.add(new Character('-'));
- UNRESERVED_CHARACTERS.add(new Character('.'));
- UNRESERVED_CHARACTERS.add(new Character('_'));
- UNRESERVED_CHARACTERS.add(new Character('~'));
+ UNRESERVED_CHARACTERS.add(Character.valueOf('-'));
+ UNRESERVED_CHARACTERS.add(Character.valueOf('.'));
+ UNRESERVED_CHARACTERS.add(Character.valueOf('_'));
+ UNRESERVED_CHARACTERS.add(Character.valueOf('~'));
}
/**
@@ -464,7 +464,7 @@
String str = URLDecoder.decode(percentCode, "ISO-8859-1");
char chr = str.charAt(0);
- if (UNRESERVED_CHARACTERS.contains(new Character(chr)))
+ if (UNRESERVED_CHARACTERS.contains(Character.valueOf(chr)))
normalized.append(chr);
else
normalized.append(percentCode);
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDProviderData.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDProviderData.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/openid/OpenIDProviderData.java
Sat Mar 1 08:12:24 2008
@@ -14,7 +14,6 @@
import org.wso2.solutions.identity.IdentityProviderException;
import org.wso2.solutions.identity.UserStore;
import org.wso2.solutions.identity.admin.ClaimsAdmin;
-import org.wso2.solutions.identity.persistence.IPPersistenceManager;
import org.wso2.solutions.identity.persistence.dataobject.ClaimDO;
public class OpenIDProviderData {
@@ -32,13 +31,11 @@
throws IdentityProviderException {
Map claims = null;
- IPPersistenceManager persistenceManager = null;
ClaimDO[] supportedClaims = null;
ClaimsAdmin claimsAdmin = null;
claims = new HashMap();
- persistenceManager = IPPersistenceManager.getPersistanceManager();
-
+
claimsAdmin = new ClaimsAdmin();
supportedClaims = claimsAdmin.getAllMappedEnabledClaims();
@@ -62,15 +59,13 @@
throws IdentityProviderException {
Map claims = null;
- IPPersistenceManager persistenceManager = null;
ClaimDO[] supportedClaims = null;
ClaimsAdmin claimsAdmin = null;
Iterator iterator = null;
Map map = null;
claims = new HashMap();
- persistenceManager = IPPersistenceManager.getPersistanceManager();
-
+
claimsAdmin = new ClaimsAdmin();
supportedClaims = claimsAdmin.getAllMappedEnabledClaims();
@@ -80,7 +75,7 @@
claims.put(temp.getOpenIDTag(), temp);
}
- iterator = requiredClaims.keySet().iterator();
+ iterator = requiredClaims.entrySet().iterator();
map = new HashMap();
String key = null;
@@ -188,7 +183,7 @@
String key = null;
OpenIDClaim claim = null;
- iterator = claimValues.keySet().iterator();
+ iterator = claimValues.entrySet().iterator();
while (iterator.hasNext()) {
key = (String) iterator.next();
@@ -212,7 +207,7 @@
String key = null;
OpenIDClaim claim = null;
- iterator = claimValues.keySet().iterator();
+ iterator = claimValues.entrySet().iterator();
while (iterator.hasNext()) {
key = (String) iterator.next();
@@ -239,7 +234,7 @@
/**
* Claims corresponding to OpenID.
*/
- public class OpenIDClaim {
+ public static class OpenIDClaim {
public String typeUri;
public String openIDTag;
public String claimValue;
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/persistence/dao/OpenIDUserRPDAO.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/persistence/dao/OpenIDUserRPDAO.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/persistence/dao/OpenIDUserRPDAO.java
Sat Mar 1 08:12:24 2008
@@ -25,13 +25,15 @@
Session session = hbConfig.getCurrentSession();
String stmt = "from OpenIDUserRPDO as c where c.rpUrl = '" + rpUrl
+ "' and c.userName='" + userName + "'";
- OpenIDUserRPDO[] rpdo = new OpenIDUserRPDO[0];
+ OpenIDUserRPDO[] rpdo = null;
try {
Query query = session.createQuery(stmt);
List lst = query.list();
rpdo = (OpenIDUserRPDO[]) lst
.toArray(new OpenIDUserRPDO[lst.size()]);
+ if (rpdo == null)
+ return new OpenIDUserRPDO[0];
} catch (Throwable e) {
String msg = messages.getMessage("errorQuerryingOpenIDUserRP");
throw new RuntimeException(msg, e);
@@ -53,13 +55,15 @@
Session session = hbConfig.getCurrentSession();
String stmt = "from OpenIDUserRPDO as c where c.userName='" + userName
+ "'";
- OpenIDUserRPDO[] rpdo = new OpenIDUserRPDO[0];
+ OpenIDUserRPDO[] rpdo = null;
try {
Query query = session.createQuery(stmt);
List lst = query.list();
rpdo = (OpenIDUserRPDO[]) lst
.toArray(new OpenIDUserRPDO[lst.size()]);
+ if (rpdo == null)
+ return new OpenIDUserRPDO[0];
} catch (Throwable e) {
String msg = messages.getMessage("errorQuerryingOpenIDUserRP");
throw new RuntimeException(msg, e);
@@ -71,7 +75,7 @@
}
/**
- * Returns the default user profile correspodning to the given user name
and
+ * Returns the default user profile corresponding to the given user name
and
* the RP url.
* @param userName Unique user name
* @param rpUrl Relying party url
@@ -82,7 +86,7 @@
Session session = hbConfig.getCurrentSession();
String stmt = "select c.defaultProfileName from OpenIDUserRPDO as c
where c.userName='"
+ userName + "' and c.rpUrl='" + rpUrl + "'";
- String[] profileId = new String[0];
+ String[] profileId = null;
try {
Query query = session.createQuery(stmt);
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/IdentityTokenIssuer.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/IdentityTokenIssuer.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/IdentityTokenIssuer.java
Sat Mar 1 08:12:24 2008
@@ -346,7 +346,7 @@
appliesToEpr = (OMElement) doc.importNode(eprDoc
.getDocumentElement(), true);
} catch (Exception e) {
- new TrustException(TrustException.REQUEST_FAILED, e);
+ throw new TrustException(TrustException.REQUEST_FAILED, e);
}
OMElement appliesToElem = rstrElem
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/OpenIDTokenIssuer.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/OpenIDTokenIssuer.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/sts/OpenIDTokenIssuer.java
Sat Mar 1 08:12:24 2008
@@ -73,7 +73,6 @@
throws TrustException, SAMLException, IdentityProviderException {
int wstVersion = data.getVersion();
- MessageContext inMsgCtx = data.getInMessageContext();
OMElement rstrElem = TrustUtil
.createRequestSecurityTokenResponseElement(wstVersion, env
@@ -105,7 +104,7 @@
appliesToEpr = (OMElement) doc.importNode(eprDoc
.getDocumentElement(), true);
} catch (Exception e) {
- new TrustException(TrustException.REQUEST_FAILED, e);
+ throw new TrustException(TrustException.REQUEST_FAILED, e);
}
OMElement appliesToElem = rstrElem
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/users/IdentityDefaultUserStoreAdmin.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/users/IdentityDefaultUserStoreAdmin.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/users/IdentityDefaultUserStoreAdmin.java
Sat Mar 1 08:12:24 2008
@@ -104,6 +104,8 @@
}
}
}
+
+ sqlStatement.close();
sqlStatement = dbConnection
.prepareStatement("select * from user_profile where
user_id=? AND is_default=?");
@@ -121,6 +123,8 @@
if (profileName == null && isDefaultProfile)
profileName = "Default Profile";
+
+ sqlStatement.close();
dbConnection.commit();
@@ -175,6 +179,8 @@
sqlStatement.setString(5, UUIDGenerator.getUUID());
sqlStatement.executeUpdate();
+
+ sqlStatement.close();
dbConnection.commit();
@@ -244,6 +250,8 @@
if (profileId == null)
throw new UserManagerException("errorModifyingUserStore");
+ sqlStatement.close();
+
sqlStatement = dbConnection
.prepareStatement("delete from user_profile_values where
profile_id=?");
@@ -251,6 +259,8 @@
sqlStatement.executeUpdate();
+ sqlStatement.close();
+
sqlStatement = dbConnection
.prepareStatement("insert into user_profile_values
(attr_name, attr_value, profile_id, id) values (?, ?, ?, ?)");
@@ -261,21 +271,18 @@
String key = (String) entry.getKey();
String value = (String) entry.getValue();
if (value != null) {
- if (!key
-
.equalsIgnoreCase(IdentityConstants.PROFILE_NAME)) {
- String idUserAttribute = UUIDGenerator.getUUID();
- sqlStatement.setString(1, key);
- sqlStatement.setString(2, value);
- sqlStatement.setString(3, profileId);
- sqlStatement.setString(4, idUserAttribute);
- sqlStatement.executeUpdate();
- } else {
- profileName = value;
- }
+ String idUserAttribute = UUIDGenerator.getUUID();
+ sqlStatement.setString(1, key);
+ sqlStatement.setString(2, value);
+ sqlStatement.setString(3, profileId);
+ sqlStatement.setString(4, idUserAttribute);
+ sqlStatement.executeUpdate();
}
}
}
+ sqlStatement.close();
+
dbConnection.commit();
} catch (SQLException e) {
Modified:
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/users/IdentityDefaultUserStoreReader.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/users/IdentityDefaultUserStoreReader.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/main/java/org/wso2/solutions/identity/users/IdentityDefaultUserStoreReader.java
Sat Mar 1 08:12:24 2008
@@ -112,7 +112,6 @@
}
dbConnection.setAutoCommit(false);
- propNames = new String[0];
sqlStatement = dbConnection
.prepareStatement("select distinct attr_name from
user_profile_values");
@@ -123,10 +122,14 @@
while (rs.next()) {
lst.add(rs.getString(1));
}
+
propNames = (String[]) lst.toArray(new String[lst.size()]);
sqlStatement.close();
+ if (propNames == null)
+ return new String[0];
+
} catch (SQLException e) {
log.debug(e);
throw new UserManagerException("errorReadingFromUserStore", e);
Modified:
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/openid/OpenIDConsumer.java
==============================================================================
---
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/openid/OpenIDConsumer.java
(original)
+++
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/openid/OpenIDConsumer.java
Sat Mar 1 08:12:24 2008
@@ -524,7 +524,7 @@
String key = null;
attributes = response.getAttributes();
- iterator = attributes.keySet().iterator();
+ iterator = attributes.entrySet().iterator();
while (iterator.hasNext()) {
key = (String) iterator.next();
Modified:
trunk/solutions/identity/modules/user-ui/src/main/java/org/wso2/solutions/identity/user/ui/action/EditUserProfileAction.java
==============================================================================
---
trunk/solutions/identity/modules/user-ui/src/main/java/org/wso2/solutions/identity/user/ui/action/EditUserProfileAction.java
(original)
+++
trunk/solutions/identity/modules/user-ui/src/main/java/org/wso2/solutions/identity/user/ui/action/EditUserProfileAction.java
Sat Mar 1 08:12:24 2008
@@ -1,7 +1,6 @@
package org.wso2.solutions.identity.user.ui.action;
import java.util.ArrayList;
-import java.util.Collection;
import java.util.List;
import java.util.Map;
Modified:
trunk/solutions/identity/modules/user-ui/src/main/java/org/wso2/solutions/identity/user/ui/action/OpenIDAuthVerificationAction.java
==============================================================================
---
trunk/solutions/identity/modules/user-ui/src/main/java/org/wso2/solutions/identity/user/ui/action/OpenIDAuthVerificationAction.java
(original)
+++
trunk/solutions/identity/modules/user-ui/src/main/java/org/wso2/solutions/identity/user/ui/action/OpenIDAuthVerificationAction.java
Sat Mar 1 08:12:24 2008
@@ -207,16 +207,14 @@
IdentityDefaultRealm realm = null;
IdentityUserStoreReader reader = null;
IPPersistenceManager db = null;
- RelyingPartyAdmin admin = null;
- profile = new ArrayList();
try {
+ profile = new ArrayList();
realm = (IdentityDefaultRealm) UserStore.getInstance().getRealm();
reader = realm.getIdentityUserStoreReader();
profile = reader.getUserProfileNames(userName);
db = IPPersistenceManager.getPersistanceManager();
- admin = new RelyingPartyAdmin();
defaultUserProfileName = db.getOpenIDDefaultUserProfile(userName,
rpUrl);
@@ -263,7 +261,7 @@
OpenIDUserRPDO[] rpdos = null;
OpenIDUserRPDO rpdo = null;
-
+
try {
db = IPPersistenceManager.getPersistanceManager();
} catch (IdentityProviderException e) {
Modified:
trunk/solutions/identity/modules/user-ui/src/main/java/org/wso2/solutions/identity/user/ui/action/OpenIDUserApprovalAction.java
==============================================================================
---
trunk/solutions/identity/modules/user-ui/src/main/java/org/wso2/solutions/identity/user/ui/action/OpenIDUserApprovalAction.java
(original)
+++
trunk/solutions/identity/modules/user-ui/src/main/java/org/wso2/solutions/identity/user/ui/action/OpenIDUserApprovalAction.java
Sat Mar 1 08:12:24 2008
@@ -33,9 +33,6 @@
public String execute() throws Exception {
ActionContext context = null;
HttpServletRequest request = null;
- Map map = null;
- IdentityDefaultRealm realm = null;
- IdentityUserStoreReader reader = null;
String authenticatedAndApproved = null;
String action = null;
String submitAction = null;
@@ -45,8 +42,6 @@
request = (HttpServletRequest) context
.get(StrutsStatics.HTTP_REQUEST);
- map = ActionContext.getContext().getSession();
-
ParameterList requestp = (ParameterList) request.getSession()
.getAttribute(IdentityConstants.OpenId.PARAM_LIST);
@@ -77,10 +72,7 @@
}
String userName = UserUtil.getUserName(openididentity);
-
- realm = (IdentityDefaultRealm) UserStore.getInstance().getRealm();
- reader = realm.getIdentityUserStoreReader();
-
+
OpenIDUserRPDO rpdo = null;
rpdo = new OpenIDUserRPDO();
Modified:
trunk/solutions/identity/modules/user-ui/src/main/java/org/wso2/solutions/identity/user/ui/filter/JSPFilter.java
==============================================================================
---
trunk/solutions/identity/modules/user-ui/src/main/java/org/wso2/solutions/identity/user/ui/filter/JSPFilter.java
(original)
+++
trunk/solutions/identity/modules/user-ui/src/main/java/org/wso2/solutions/identity/user/ui/filter/JSPFilter.java
Sat Mar 1 08:12:24 2008
@@ -66,8 +66,7 @@
}
} catch (Exception e) {
- // TODO : need to work on exception handling
- //e.printStackTrace();
+ // TODO : need to work on exception handling
}
} else if (path.indexOf(UIConstants.OPENID_USER_PAGE) >= 0) {
chain.doFilter(req, resp);
_______________________________________________
Identity-dev mailing list
[email protected]
http://wso2.org/cgi-bin/mailman/listinfo/identity-dev