debian/0000755000000000000000000000000012220731657007173 5ustar debian/build.xml0000644000000000000000000000120512220731541011002 0ustar debian/maven.ignoreRules0000644000000000000000000000047212220731541012514 0ustar org.apache.maven.plugins maven-jxr-plugin * * * * org.apache.maven.plugins maven-pmd-plugin * * * * org.apache.maven.plugins maven-project-info-reports-plugin * * * * org.apache.maven.plugins maven-release-plugin * * * * org.apache.maven.plugins maven-remote-resources-plugin * * * * org.opensaml opensaml * * * * debian/libwss4j-java.poms0000644000000000000000000000320512220731541012543 0ustar # List of POM files for the package # Format of this file is: # [option]* # where option can be: # --ignore: ignore this POM and its artifact if any # --ignore-pom: don't install the POM. To use on POM files that are created # temporarily for certain artifacts such as Javadoc jars. [mh_install, mh_installpoms] # --no-parent: remove the tag from the POM # --package=: an alternative package to use when installing this POM # and its artifact # --has-package-version: to indicate that the original version of the POM is the same as the upstream part # of the version for the package. # --keep-elements=: a list of XML elements to keep in the POM # during a clean operation with mh_cleanpom or mh_installpom # --artifact=: path to the build artifact associated with this POM, # it will be installed when using the command mh_install. [mh_install] # --java-lib: install the jar into /usr/share/java to comply with Debian # packaging guidelines # --usj-name=: name to use when installing the library in /usr/share/java # --usj-version=: version to use when installing the library in /usr/share/java # --no-usj-versionless: don't install the versionless link in /usr/share/java # --dest-jar=: the destination for the real jar. # It will be installed with mh_install. [mh_install] # --classifier=: Optional, the classifier for the jar. Empty by default. # --site-xml=: Optional, the location for site.xml if it needs to be installed. # Empty by default. [mh_install] # pom.xml --has-package-version --java-lib debian/maven.publishedRules0000644000000000000000000000007512220731541013207 0ustar org.apache.ws.security wss4j s/jar/bundle/ s/.*/debian/ * * debian/maven.rules0000644000000000000000000000045112220731541011345 0ustar junit junit jar s/4\..*/4.x/ * * org.apache apache pom s/.*/debian/ * * org.apache.ws.security wss4j bundle s/.*/debian/ * * commons-logging s/commons-logging-api/commons-logging/ * s/.*/debian/ * * log4j log4j * s/1\.2\..*/1.2.x/ * * org.bouncycastle s/bcprov-jdk15on/bcprov/ * s/.*/debian/ * * debian/README.Debian0000644000000000000000000000031112220731541011217 0ustar Please note that in order to reduce dependencies, the Debian WSS4J package currently doesn't provide SAML token support. -- Thierry Carrez Wed, 22 Jul 2009 15:29:08 +0200 debian/exclude0000644000000000000000000000004112220731541010532 0ustar lib specs legal endorsed interop debian/watch0000644000000000000000000000031612220731541010214 0ustar version=3 opts=dversionmangle=s/\+svntag// \ http://svn.apache.org/repos/asf/webservices/wss4j/tags/ (\d+)_(\d+)_(\d+)/ debian debian/orig-tar.sh #http://www.apache.org/dist/ws/wss4j/ (\d+)_(\d+)_(\d+)/ debian/rules0000755000000000000000000000043512220731541010245 0ustar #!/usr/bin/make -f include /usr/share/cdbs/1/rules/debhelper.mk include /usr/share/cdbs/1/class/maven.mk JAVA_HOME := /usr/lib/jvm/default-java DEB_INSTALL_CHANGELOGS_ALL := ChangeLog.txt get-orig-source: uscan --download-version $(DEB_UPSTREAM_VERSION) --force-download --rename debian/changelog0000644000000000000000000000430312220731541011035 0ustar wss4j (1.6.12-1) unstable; urgency=low * New upstream version (Closes: #724138) - Refreshed the patches - Updated debian/copyright * debian/control: - Maintenance transferred to the Debian Java Maintainers - Updated Standards-Version to 3.9.4 (no changes) - Removed the deprecated DM-Upload-Allowed flag - Removed the dependency on the JRE for the binary package (not needed) - Build depend on debhelper >= 9 * Use XZ compression for the upstream tarball * Revamped the build system to use maven-debian-helper * Install the Maven artifacts in /usr/share/maven-repo -- Emmanuel Bourg Mon, 23 Sep 2013 09:18:49 +0200 wss4j (1.5.8+svntag-2) unstable; urgency=low * Team upload. * Imported 1.5.8+svntag-1ubuntu1. Closes: #642747, thanks to James for the notification. * Conforms to Debian Policy 3.9.3 (debian/control). - Machine-readable debian/copyright file, removed mention of pack. creator. * Team maintenance (pkg-eucalyptus group on the Alioth forge). -- Charles Plessy Thu, 24 May 2012 13:28:37 +0900 wss4j (1.5.8+svntag-1ubuntu1) precise; urgency=low * Fix FTBFS (LP: #935490): - d/rules: Switched xml-security -> xmlsec to pickup jar name change in libxml-security-java. -- James Page Tue, 27 Mar 2012 13:13:21 +0100 wss4j (1.5.8+svntag-1) unstable; urgency=low * Exclude more directories from the repacked upstream sources. (debian/exclude, debian/README.source). * Pass --no-name to gzip so that ‘orig’ tarballs have a constant message digest. (debian/rules, debian/orig-tar.sh) -- Charles Plessy Thu, 11 Feb 2010 19:30:49 +0900 wss4j (1.5.8-1) unstable; urgency=low * New upstream version. * Expressed compliance with Debian policy 3.8.4. -- Chris Grzegorczyk Fri, 29 Jan 2010 01:28:53 +0100 wss4j (1.5.7-1) UNRELEASED; urgency=low * Port existing ubuntu package to debian. -- Chris Grzegorczyk Mon, 28 Dec 2009 18:12:53 -0800 wss4j (1.5.7-0ubuntu1) karmic; urgency=low * Initial release (LP: #403003) -- Thierry Carrez Wed, 22 Jul 2009 15:29:35 +0200 debian/upstream0000644000000000000000000000054712220731541010754 0ustar # Various informations about Upstream in YAML format, # See: http://wiki.debian.org/UpstreamMetadata Archive: Apache Homepage: http://ws.apache.org/wss4j/ Name: WSS4J Repository: http://svn.apache.org/repos/asf/webservices/wss4j Repository-Browse: http://svn.apache.org/viewvc/webservices/wss4j Watch: http://www.apache.org/dist/ws/wss4j/ (\d+)_(\d+)_(\d+)/ debian/patches/0000755000000000000000000000000012220731541010612 5ustar debian/patches/series0000644000000000000000000000002112220731541012020 0ustar 01-no-saml.patch debian/patches/01-no-saml.patch0000644000000000000000000004515612220731541013432 0ustar Description: SAML is not packaged in Debian yet (RFP #656541). This patch disables the compilation of the SAML related code. Author: Emmanuel Bourg Forwarded: not-needed --- a/pom.xml +++ b/pom.xml @@ -244,6 +244,11 @@ 1.5 1.5 + + org/apache/ws/security/saml/** + **/*SAMLToken* + **/SamlAssertionValidator* + --- a/src/main/java/org/apache/ws/security/str/SignatureSTRParser.java +++ b/src/main/java/org/apache/ws/security/str/SignatureSTRParser.java @@ -20,7 +20,6 @@ package org.apache.ws.security.str; import org.apache.ws.security.CustomTokenPrincipal; -import org.apache.ws.security.SAMLTokenPrincipal; import org.apache.ws.security.WSConstants; import org.apache.ws.security.WSDerivedKeyTokenPrincipal; import org.apache.ws.security.WSDocInfo; @@ -37,10 +36,6 @@ import org.apache.ws.security.message.token.SecurityTokenReference; import org.apache.ws.security.message.token.UsernameToken; import org.apache.ws.security.processor.Processor; -import org.apache.ws.security.saml.SAMLKeyInfo; -import org.apache.ws.security.saml.SAMLUtil; -import org.apache.ws.security.saml.ext.AssertionWrapper; -import org.apache.ws.security.saml.ext.OpenSAMLUtil; import org.apache.ws.security.util.Base64; import org.apache.ws.security.util.WSSecurityUtil; import org.w3c.dom.Element; @@ -152,6 +147,7 @@ certs = (X509Certificate[])bstResult.get(0).get(WSSecurityEngineResult.TAG_X509_CERTIFICATES); secretKey = (byte[])bstResult.get(0).get(WSSecurityEngineResult.TAG_SECRET); principal = (Principal)bstResult.get(0).get(WSSecurityEngineResult.TAG_PRINCIPAL); +/* } else if (el.equals(WSSecurityEngine.SAML_TOKEN) || el.equals(WSSecurityEngine.SAML2_TOKEN)) { Processor proc = data.getWssConfig().getProcessor(WSSecurityEngine.SAML_TOKEN); @@ -185,6 +181,7 @@ } secretKey = keyInfo.getSecret(); principal = createPrincipalFromSAML(assertion); +*/ } else if (el.equals(WSSecurityEngine.ENCRYPTED_KEY)) { if (bspCompliant) { BSPEnforcer.checkEncryptedKeyBSPCompliance(secRef); @@ -212,9 +209,11 @@ secretKey = getSecretKeyFromToken(id, SecurityTokenReference.ENC_KEY_SHA1_URI, data); principal = new CustomTokenPrincipal(id); +/* } else if (WSConstants.WSS_SAML_KI_VALUE_TYPE.equals(secRef.getKeyIdentifierValueType()) || WSConstants.WSS_SAML2_KI_VALUE_TYPE.equals(secRef.getKeyIdentifierValueType())) { parseSAMLKeyIdentifier(secRef, wsDocInfo, data, bspCompliant); +*/ } else { parseBSTKeyIdentifier(secRef, crypto, wsDocInfo, data, bspCompliant); } @@ -287,6 +286,7 @@ * @param assertion An AssertionWrapper object * @return A principal */ +/* private Principal createPrincipalFromSAML( AssertionWrapper assertion ) { @@ -301,6 +301,7 @@ } return samlPrincipal; } +*/ /** * Get the Secret Key from a CallbackHandler @@ -341,6 +342,7 @@ /** * Parse the KeyIdentifier for a SAML Assertion */ +/* private void parseSAMLKeyIdentifier( SecurityTokenReference secRef, WSDocInfo wsDocInfo, @@ -368,6 +370,7 @@ principal = createPrincipalFromSAML(assertion); } } +*/ /** * Parse the KeyIdentifier for a BinarySecurityToken @@ -520,6 +523,7 @@ secretKey = dkt.deriveKey(keyLength, secret); principal = dkt.createPrincipal(); ((WSDerivedKeyTokenPrincipal)principal).setSecret(secret); +/* } else if (WSConstants.ST_UNSIGNED == action || WSConstants.ST_SIGNED == action) { AssertionWrapper assertion = (AssertionWrapper)result.get(WSSecurityEngineResult.TAG_SAML_ASSERTION); @@ -539,6 +543,7 @@ secretKey = keyInfo.getSecret(); publicKey = keyInfo.getPublicKey(); principal = createPrincipalFromSAML(assertion); +*/ } } --- a/src/main/java/org/apache/ws/security/str/SecurityTokenRefSTRParser.java +++ b/src/main/java/org/apache/ws/security/str/SecurityTokenRefSTRParser.java @@ -33,9 +33,6 @@ import org.apache.ws.security.message.token.SecurityTokenReference; import org.apache.ws.security.message.token.UsernameToken; import org.apache.ws.security.processor.Processor; -import org.apache.ws.security.saml.SAMLKeyInfo; -import org.apache.ws.security.saml.SAMLUtil; -import org.apache.ws.security.saml.ext.AssertionWrapper; import org.apache.ws.security.util.WSSecurityUtil; import org.w3c.dom.Element; @@ -132,6 +129,7 @@ } } else if (secRef.containsKeyIdentifier()) { String valueType = secRef.getKeyIdentifierValueType(); +/* if (WSConstants.WSS_SAML_KI_VALUE_TYPE.equals(valueType) || WSConstants.WSS_SAML2_KI_VALUE_TYPE.equals(valueType)) { secretKey = @@ -145,7 +143,7 @@ secretKey = getSecretKeyFromAssertion(assertion, secRef, data, wsDocInfo, bspCompliant); } - } else if (WSConstants.WSS_KRB_KI_VALUE_TYPE.equals(valueType)) { + } else */ if (WSConstants.WSS_KRB_KI_VALUE_TYPE.equals(valueType)) { secretKey = getSecretKeyFromToken(secRef.getKeyIdentifierValue(), valueType, data); if (secretKey == null) { @@ -276,6 +274,7 @@ /** * Get a SecretKey from a SAML Assertion */ +/* private byte[] getSecretKeyFromAssertion( AssertionWrapper assertion, SecurityTokenReference secRef, @@ -295,6 +294,7 @@ } return samlKi.getSecret(); } +*/ /** * Process a previous security result @@ -321,11 +321,13 @@ String algorithm = (String)parameters.get(SIGNATURE_METHOD); secretKey = dkt.deriveKey(WSSecurityUtil.getKeyLength(algorithm), secret); principal = dkt.createPrincipal(); +/* } else if (WSConstants.ST_UNSIGNED == action || WSConstants.ST_SIGNED == action) { AssertionWrapper assertion = (AssertionWrapper)result.get(WSSecurityEngineResult.TAG_SAML_ASSERTION); secretKey = getSecretKeyFromAssertion(assertion, secRef, data, wsDocInfo, bspCompliant); +*/ } else if (WSConstants.SCT == action || WSConstants.BST == action) { secretKey = (byte[])result.get(WSSecurityEngineResult.TAG_SECRET); } else if (WSConstants.UT_NOPASSWORD == action || WSConstants.UT == action) { --- a/src/main/java/org/apache/ws/security/str/EncryptedKeySTRParser.java +++ b/src/main/java/org/apache/ws/security/str/EncryptedKeySTRParser.java @@ -30,9 +30,6 @@ import org.apache.ws.security.message.token.BinarySecurity; import org.apache.ws.security.message.token.SecurityTokenReference; import org.apache.ws.security.message.token.X509Security; -import org.apache.ws.security.saml.SAMLKeyInfo; -import org.apache.ws.security.saml.SAMLUtil; -import org.apache.ws.security.saml.ext.AssertionWrapper; import org.w3c.dom.Element; import java.security.Principal; @@ -99,6 +96,7 @@ if (result != null) { processPreviousResult(result, secRef, data, wsDocInfo, bspCompliant); } else if (secRef.containsKeyIdentifier()) { +/* if (WSConstants.WSS_SAML_KI_VALUE_TYPE.equals(secRef.getKeyIdentifierValueType()) || WSConstants.WSS_SAML2_KI_VALUE_TYPE.equals(secRef.getKeyIdentifierValueType())) { AssertionWrapper assertion = @@ -112,7 +110,7 @@ SAMLUtil.getCredentialFromSubject(assertion, data, wsDocInfo, bspCompliant); certs = samlKi.getCerts(); - } else { + } else */ { if (bspCompliant) { BSPEnforcer.checkBinarySecurityBSPCompliance(secRef, null); } @@ -221,6 +219,7 @@ (X509Certificate[])result.get( WSSecurityEngineResult.TAG_X509_CERTIFICATES ); +/* } else if (WSConstants.ST_UNSIGNED == action || WSConstants.ST_SIGNED == action) { AssertionWrapper assertion = (AssertionWrapper)result.get(WSSecurityEngineResult.TAG_SAML_ASSERTION); @@ -232,6 +231,7 @@ data, wsDocInfo, bspCompliant); certs = keyInfo.getCerts(); +*/ } else { throw new WSSecurityException( WSSecurityException.UNSUPPORTED_SECURITY_TOKEN, --- a/src/main/java/org/apache/ws/security/processor/BinarySecurityTokenProcessor.java +++ b/src/main/java/org/apache/ws/security/processor/BinarySecurityTokenProcessor.java @@ -19,7 +19,6 @@ package org.apache.ws.security.processor; -import org.apache.ws.security.SAMLTokenPrincipal; import org.apache.ws.security.WSConstants; import org.apache.ws.security.WSDocInfo; import org.apache.ws.security.WSSConfig; @@ -92,6 +91,7 @@ result.put(WSSecurityEngineResult.TAG_VALIDATED_TOKEN, Boolean.TRUE); result.put(WSSecurityEngineResult.TAG_SECRET, returnedCredential.getSecretKey()); +/* if (returnedCredential.getTransformedToken() != null) { result.put( WSSecurityEngineResult.TAG_TRANSFORMED_TOKEN, @@ -100,7 +100,7 @@ SAMLTokenPrincipal samlPrincipal = new SAMLTokenPrincipal(credential.getTransformedToken()); result.put(WSSecurityEngineResult.TAG_PRINCIPAL, samlPrincipal); - } else if (credential.getPrincipal() != null) { + } else */ if (credential.getPrincipal() != null) { result.put(WSSecurityEngineResult.TAG_PRINCIPAL, credential.getPrincipal()); } else if (certs != null && certs[0] != null) { result.put(WSSecurityEngineResult.TAG_PRINCIPAL, certs[0].getSubjectX500Principal()); --- a/src/main/java/org/apache/ws/security/validate/Credential.java +++ b/src/main/java/org/apache/ws/security/validate/Credential.java @@ -28,7 +28,6 @@ import org.apache.ws.security.message.token.SecurityContextToken; import org.apache.ws.security.message.token.Timestamp; import org.apache.ws.security.message.token.UsernameToken; -import org.apache.ws.security.saml.ext.AssertionWrapper; /** * This class stores various Credential types that can be validated and/or returned by a @@ -42,8 +41,6 @@ private Timestamp timestamp; private UsernameToken usernametoken; private BinarySecurity binarySecurityToken; - private AssertionWrapper assertion; - private AssertionWrapper transformedToken; private SecurityContextToken securityContextToken; private Principal principal; private byte[] secretKey; @@ -166,33 +163,41 @@ * Set an AssertionWrapper to be validated * @param assertion an AssertionWrapper to be validated */ +/* public void setAssertion(AssertionWrapper assertion) { this.assertion = assertion; } +*/ /** * Get an AssertionWrapper to be validated * @return an AssertionWrapper to be validated */ +/* public AssertionWrapper getAssertion() { return assertion; } +*/ /** * Set an AssertionWrapper instance which corresponds to a Transformed Token. * @param transformedToken a transformed AssertionWrapper instance */ +/* public void setTransformedToken(AssertionWrapper transformedToken) { this.transformedToken = transformedToken; } +*/ /** * Get an AssertionWrapper instance which corresponds to a Transformed Token. * @return a transformed AssertionWrapper instance */ +/* public AssertionWrapper getTransformedToken() { return transformedToken; } +*/ /** * Set the principal that supplies context information to the validators. --- a/src/main/java/org/apache/ws/security/str/BSPEnforcer.java +++ b/src/main/java/org/apache/ws/security/str/BSPEnforcer.java @@ -26,7 +26,6 @@ import org.apache.ws.security.message.token.PKIPathSecurity; import org.apache.ws.security.message.token.SecurityTokenReference; import org.apache.ws.security.message.token.X509Security; -import org.apache.ws.security.saml.ext.AssertionWrapper; /** * This class enforces processing rules for SecurityTokenReferences to various token elements, @@ -125,6 +124,7 @@ * @param assertion The SAML Token AssertionWrapper object * @throws WSSecurityException */ +/* public static void checkSamlTokenBSPCompliance( SecurityTokenReference secRef, AssertionWrapper assertion @@ -187,6 +187,7 @@ } } } +*/ /** * Check that the Username token referenced by the SecurityTokenReference argument --- a/src/main/java/org/apache/ws/security/WSSecurityEngineResult.java +++ b/src/main/java/org/apache/ws/security/WSSecurityEngineResult.java @@ -24,7 +24,6 @@ import org.apache.ws.security.message.token.SignatureConfirmation; import org.apache.ws.security.message.token.Timestamp; import org.apache.ws.security.message.token.UsernameToken; -import org.apache.ws.security.saml.ext.AssertionWrapper; import java.security.Principal; import java.security.cert.X509Certificate; @@ -233,6 +232,7 @@ put(TAG_ACTION, Integer.valueOf(act)); } +/* public WSSecurityEngineResult( int act, AssertionWrapper ass @@ -242,6 +242,7 @@ put(TAG_VALIDATED_TOKEN, Boolean.FALSE); put(TAG_TOKEN_ELEMENT, ass.getElement()); } +*/ public WSSecurityEngineResult( int act, --- a/src/main/java/org/apache/ws/security/processor/UsernameTokenProcessor.java +++ b/src/main/java/org/apache/ws/security/processor/UsernameTokenProcessor.java @@ -19,7 +19,6 @@ package org.apache.ws.security.processor; -import org.apache.ws.security.SAMLTokenPrincipal; import org.apache.ws.security.WSConstants; import org.apache.ws.security.WSDocInfo; import org.apache.ws.security.WSSConfig; @@ -82,6 +81,7 @@ if (validator != null) { result.put(WSSecurityEngineResult.TAG_VALIDATED_TOKEN, Boolean.TRUE); +/* if (credential.getTransformedToken() != null) { result.put( WSSecurityEngineResult.TAG_TRANSFORMED_TOKEN, credential.getTransformedToken() @@ -89,7 +89,7 @@ SAMLTokenPrincipal samlPrincipal = new SAMLTokenPrincipal(credential.getTransformedToken()); result.put(WSSecurityEngineResult.TAG_PRINCIPAL, samlPrincipal); - } else { + } else */ { WSUsernameTokenPrincipal principal = new WSUsernameTokenPrincipal(token.getName(), token.isHashed()); principal.setNonce(token.getNonce()); --- a/src/main/java/org/apache/ws/security/WSSConfig.java +++ b/src/main/java/org/apache/ws/security/WSSConfig.java @@ -75,6 +75,7 @@ Integer.valueOf(WSConstants.SIGN), org.apache.ws.security.action.SignatureAction.class ); +/* tmp.put( Integer.valueOf(WSConstants.ST_SIGNED), org.apache.ws.security.action.SAMLTokenSignedAction.class @@ -83,6 +84,7 @@ Integer.valueOf(WSConstants.ST_UNSIGNED), org.apache.ws.security.action.SAMLTokenUnsignedAction.class ); +*/ tmp.put( Integer.valueOf(WSConstants.TS), org.apache.ws.security.action.TimestampAction.class @@ -110,6 +112,7 @@ static { final Map> tmp = new HashMap>(); try { +/* tmp.put( WSSecurityEngine.SAML_TOKEN, org.apache.ws.security.processor.SAMLTokenProcessor.class @@ -118,6 +121,7 @@ WSSecurityEngine.SAML2_TOKEN, org.apache.ws.security.processor.SAMLTokenProcessor.class ); +*/ tmp.put( WSSecurityEngine.ENCRYPTED_KEY, org.apache.ws.security.processor.EncryptedKeyProcessor.class @@ -181,6 +185,7 @@ static { final Map> tmp = new HashMap>(); try { +/* tmp.put( WSSecurityEngine.SAML_TOKEN, org.apache.ws.security.validate.SamlAssertionValidator.class @@ -189,6 +194,7 @@ WSSecurityEngine.SAML2_TOKEN, org.apache.ws.security.validate.SamlAssertionValidator.class ); +*/ tmp.put( WSSecurityEngine.SIGNATURE, org.apache.ws.security.validate.SignatureTrustValidator.class --- a/src/main/java/org/apache/ws/security/str/DerivedKeyTokenSTRParser.java +++ b/src/main/java/org/apache/ws/security/str/DerivedKeyTokenSTRParser.java @@ -29,9 +29,6 @@ import org.apache.ws.security.handler.RequestData; import org.apache.ws.security.message.token.BinarySecurity; import org.apache.ws.security.message.token.SecurityTokenReference; -import org.apache.ws.security.saml.SAMLKeyInfo; -import org.apache.ws.security.saml.SAMLUtil; -import org.apache.ws.security.saml.ext.AssertionWrapper; import org.apache.ws.security.util.WSSecurityUtil; import org.w3c.dom.Element; @@ -265,6 +262,7 @@ secretKey = (byte[])result.get(WSSecurityEngineResult.TAG_SECRET); } else if (WSConstants.SCT == action || WSConstants.BST == action) { secretKey = (byte[])result.get(WSSecurityEngineResult.TAG_SECRET); +/* } else if (WSConstants.ST_UNSIGNED == action || WSConstants.ST_SIGNED == action) { AssertionWrapper assertion = (AssertionWrapper)result.get(WSSecurityEngineResult.TAG_SAML_ASSERTION); @@ -277,6 +275,7 @@ // TODO Handle malformed SAML tokens where they don't have the // secret in them secretKey = keyInfo.getSecret(); +*/ } else { throw new WSSecurityException( WSSecurityException.FAILED_CHECK, "unsupportedKeyId" debian/maven.properties0000644000000000000000000000002512220731541012404 0ustar maven.test.skip=true debian/docs0000644000000000000000000000000712220731541010033 0ustar NOTICE debian/orig-tar.sh0000755000000000000000000000142012220731541011243 0ustar #!/bin/bash -e # The fake --upstream-version is there to be callable by uscan(1). if [ -z $2 ]; then echo "usage: ./debian/orig-tar.sh --upstream-version " exit 1 fi if [ -r .svn/deb-layout ]; then . .svn/deb-layout fi if [ -z "$origDir" ]; then origDir=".." fi echo "Creating orig.tar.gz in '$origDir'." # $2 = version VERSION=$2 TAR=$origDir/wss4j_$VERSION.orig.tar.xz # See Developers Reference § 6.7.8.2.4 DIR=wss4j-$VERSION.orig if [ -d "$DIR" ]; then echo "Cannot export upstream sources to '$DIR', directory is already existing." exit 1 fi # clean up the upstream tarball svn export http://svn.apache.org/repos/asf/webservices/wss4j/tags/${2//\./\_}/ $DIR XZ_OPT="--best" tar --exclude-vcs --exclude-from=debian/exclude -c -J -f $TAR $DIR rm -rf $DIR debian/source/0000755000000000000000000000000012220731541010463 5ustar debian/source/format0000644000000000000000000000001412220731541011671 0ustar 3.0 (quilt) debian/README.source0000644000000000000000000000062012220731541011340 0ustar Directories specified in debian/exclude contained .doc, .pdf, .jar and other files that are either not relevant for the functionality of this package and/or that are not shipped with their sources. Those were omitted from a redistribution with Debian. -- Steffen Moeller Wed, 10 Feb 2010 17:07:52 +0100 -- Charles Plessy Fri, 12 Feb 2010 12:51:16 +0900 debian/compat0000644000000000000000000000000212220731541010361 0ustar 9 debian/copyright0000644000000000000000000000124212220731541011115 0ustar Format: http://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ Upstream-Name: Apache WSS4J Source: http://svn.apache.org/repos/asf/webservices/wss4j/tags/ Files: * Copyright: 2003-2013, The Apache Software Foundation License: Apache-2.0 On Debian systems, the complete text of the Apache 2.0 License can be found in the /usr/share/common-licenses/Apache-2.0 file. Notice: This product includes software Copyright University of Southampton IT Innovation Centre, 2006 (http://www.it-innovation.soton.ac.uk). Authors: Davanum Srinivas Werner Dittmann Ias Ruchith Fernando Fred Dushin Colm O hEigeartaigh Nandana Mihindukulasooriya debian/control0000644000000000000000000000205712220731541010572 0ustar Source: wss4j Section: java Priority: optional Maintainer: Debian Java Maintainers Uploaders: Emmanuel Bourg , tony mancill Build-Depends-Indep: default-jdk, libaxis-java, libbcprov-java (>= 1.49), libcommons-logging-java, libmaven-bundle-plugin-java, libxalan2-java, libxml-security-java Build-Depends: ant, cdbs (>= 0.4.5.3), debhelper (>= 9), maven-debian-helper Standards-Version: 3.9.4 Vcs-Git: git://anonscm.debian.org/pkg-java/wss4j.git Vcs-Browser: http://anonscm.debian.org/gitweb/?p=pkg-java/wss4j.git Homepage: http://ws.apache.org/wss4j/ Package: libwss4j-java Architecture: all Depends: ${misc:Depends} Description: Apache WSS4J WS-Security implementation Apache WSS4J is an implementation of the OASIS Web Services Security framework (WS-Security). It can be used to sign and verify SOAP Messages with WS-Security information.