debian/ 0000755 0000000 0000000 00000000000 12220731657 007173 5 ustar debian/build.xml 0000644 0000000 0000000 00000001205 12220731541 011002 0 ustar
debian/maven.ignoreRules 0000644 0000000 0000000 00000000472 12220731541 012514 0 ustar org.apache.maven.plugins maven-jxr-plugin * * * *
org.apache.maven.plugins maven-pmd-plugin * * * *
org.apache.maven.plugins maven-project-info-reports-plugin * * * *
org.apache.maven.plugins maven-release-plugin * * * *
org.apache.maven.plugins maven-remote-resources-plugin * * * *
org.opensaml opensaml * * * *
debian/libwss4j-java.poms 0000644 0000000 0000000 00000003205 12220731541 012543 0 ustar # List of POM files for the package
# Format of this file is:
# [option]*
# where option can be:
# --ignore: ignore this POM and its artifact if any
# --ignore-pom: don't install the POM. To use on POM files that are created
# temporarily for certain artifacts such as Javadoc jars. [mh_install, mh_installpoms]
# --no-parent: remove the tag from the POM
# --package=: an alternative package to use when installing this POM
# and its artifact
# --has-package-version: to indicate that the original version of the POM is the same as the upstream part
# of the version for the package.
# --keep-elements=: a list of XML elements to keep in the POM
# during a clean operation with mh_cleanpom or mh_installpom
# --artifact=: path to the build artifact associated with this POM,
# it will be installed when using the command mh_install. [mh_install]
# --java-lib: install the jar into /usr/share/java to comply with Debian
# packaging guidelines
# --usj-name=: name to use when installing the library in /usr/share/java
# --usj-version=: version to use when installing the library in /usr/share/java
# --no-usj-versionless: don't install the versionless link in /usr/share/java
# --dest-jar=: the destination for the real jar.
# It will be installed with mh_install. [mh_install]
# --classifier=: Optional, the classifier for the jar. Empty by default.
# --site-xml=: Optional, the location for site.xml if it needs to be installed.
# Empty by default. [mh_install]
#
pom.xml --has-package-version --java-lib
debian/maven.publishedRules 0000644 0000000 0000000 00000000075 12220731541 013207 0 ustar
org.apache.ws.security wss4j s/jar/bundle/ s/.*/debian/ * *
debian/maven.rules 0000644 0000000 0000000 00000000451 12220731541 011345 0 ustar
junit junit jar s/4\..*/4.x/ * *
org.apache apache pom s/.*/debian/ * *
org.apache.ws.security wss4j bundle s/.*/debian/ * *
commons-logging s/commons-logging-api/commons-logging/ * s/.*/debian/ * *
log4j log4j * s/1\.2\..*/1.2.x/ * *
org.bouncycastle s/bcprov-jdk15on/bcprov/ * s/.*/debian/ * *
debian/README.Debian 0000644 0000000 0000000 00000000311 12220731541 011217 0 ustar Please note that in order to reduce dependencies, the Debian WSS4J package
currently doesn't provide SAML token support.
-- Thierry Carrez Wed, 22 Jul 2009 15:29:08 +0200
debian/exclude 0000644 0000000 0000000 00000000041 12220731541 010532 0 ustar lib
specs
legal
endorsed
interop
debian/watch 0000644 0000000 0000000 00000000316 12220731541 010214 0 ustar version=3
opts=dversionmangle=s/\+svntag// \
http://svn.apache.org/repos/asf/webservices/wss4j/tags/ (\d+)_(\d+)_(\d+)/ debian debian/orig-tar.sh
#http://www.apache.org/dist/ws/wss4j/ (\d+)_(\d+)_(\d+)/
debian/rules 0000755 0000000 0000000 00000000435 12220731541 010245 0 ustar #!/usr/bin/make -f
include /usr/share/cdbs/1/rules/debhelper.mk
include /usr/share/cdbs/1/class/maven.mk
JAVA_HOME := /usr/lib/jvm/default-java
DEB_INSTALL_CHANGELOGS_ALL := ChangeLog.txt
get-orig-source:
uscan --download-version $(DEB_UPSTREAM_VERSION) --force-download --rename
debian/changelog 0000644 0000000 0000000 00000004303 12220731541 011035 0 ustar wss4j (1.6.12-1) unstable; urgency=low
* New upstream version (Closes: #724138)
- Refreshed the patches
- Updated debian/copyright
* debian/control:
- Maintenance transferred to the Debian Java Maintainers
- Updated Standards-Version to 3.9.4 (no changes)
- Removed the deprecated DM-Upload-Allowed flag
- Removed the dependency on the JRE for the binary package (not needed)
- Build depend on debhelper >= 9
* Use XZ compression for the upstream tarball
* Revamped the build system to use maven-debian-helper
* Install the Maven artifacts in /usr/share/maven-repo
-- Emmanuel Bourg Mon, 23 Sep 2013 09:18:49 +0200
wss4j (1.5.8+svntag-2) unstable; urgency=low
* Team upload.
* Imported 1.5.8+svntag-1ubuntu1.
Closes: #642747, thanks to James for the notification.
* Conforms to Debian Policy 3.9.3 (debian/control).
- Machine-readable debian/copyright file, removed mention of pack. creator.
* Team maintenance (pkg-eucalyptus group on the Alioth forge).
-- Charles Plessy Thu, 24 May 2012 13:28:37 +0900
wss4j (1.5.8+svntag-1ubuntu1) precise; urgency=low
* Fix FTBFS (LP: #935490):
- d/rules: Switched xml-security -> xmlsec to pickup jar name change
in libxml-security-java.
-- James Page Tue, 27 Mar 2012 13:13:21 +0100
wss4j (1.5.8+svntag-1) unstable; urgency=low
* Exclude more directories from the repacked upstream sources.
(debian/exclude, debian/README.source).
* Pass --no-name to gzip so that ‘orig’ tarballs have a constant message
digest. (debian/rules, debian/orig-tar.sh)
-- Charles Plessy Thu, 11 Feb 2010 19:30:49 +0900
wss4j (1.5.8-1) unstable; urgency=low
* New upstream version.
* Expressed compliance with Debian policy 3.8.4.
-- Chris Grzegorczyk Fri, 29 Jan 2010 01:28:53 +0100
wss4j (1.5.7-1) UNRELEASED; urgency=low
* Port existing ubuntu package to debian.
-- Chris Grzegorczyk Mon, 28 Dec 2009 18:12:53 -0800
wss4j (1.5.7-0ubuntu1) karmic; urgency=low
* Initial release (LP: #403003)
-- Thierry Carrez Wed, 22 Jul 2009 15:29:35 +0200
debian/upstream 0000644 0000000 0000000 00000000547 12220731541 010754 0 ustar # Various informations about Upstream in YAML format,
# See: http://wiki.debian.org/UpstreamMetadata
Archive: Apache
Homepage: http://ws.apache.org/wss4j/
Name: WSS4J
Repository: http://svn.apache.org/repos/asf/webservices/wss4j
Repository-Browse: http://svn.apache.org/viewvc/webservices/wss4j
Watch: http://www.apache.org/dist/ws/wss4j/ (\d+)_(\d+)_(\d+)/
debian/patches/ 0000755 0000000 0000000 00000000000 12220731541 010612 5 ustar debian/patches/series 0000644 0000000 0000000 00000000021 12220731541 012020 0 ustar 01-no-saml.patch
debian/patches/01-no-saml.patch 0000644 0000000 0000000 00000045156 12220731541 013432 0 ustar Description: SAML is not packaged in Debian yet (RFP #656541).
This patch disables the compilation of the SAML related code.
Author: Emmanuel Bourg
Forwarded: not-needed
--- a/pom.xml
+++ b/pom.xml
@@ -244,6 +244,11 @@
1.5
1.5
+
+ org/apache/ws/security/saml/**
+ **/*SAMLToken*
+ **/SamlAssertionValidator*
+
--- a/src/main/java/org/apache/ws/security/str/SignatureSTRParser.java
+++ b/src/main/java/org/apache/ws/security/str/SignatureSTRParser.java
@@ -20,7 +20,6 @@
package org.apache.ws.security.str;
import org.apache.ws.security.CustomTokenPrincipal;
-import org.apache.ws.security.SAMLTokenPrincipal;
import org.apache.ws.security.WSConstants;
import org.apache.ws.security.WSDerivedKeyTokenPrincipal;
import org.apache.ws.security.WSDocInfo;
@@ -37,10 +36,6 @@
import org.apache.ws.security.message.token.SecurityTokenReference;
import org.apache.ws.security.message.token.UsernameToken;
import org.apache.ws.security.processor.Processor;
-import org.apache.ws.security.saml.SAMLKeyInfo;
-import org.apache.ws.security.saml.SAMLUtil;
-import org.apache.ws.security.saml.ext.AssertionWrapper;
-import org.apache.ws.security.saml.ext.OpenSAMLUtil;
import org.apache.ws.security.util.Base64;
import org.apache.ws.security.util.WSSecurityUtil;
import org.w3c.dom.Element;
@@ -152,6 +147,7 @@
certs = (X509Certificate[])bstResult.get(0).get(WSSecurityEngineResult.TAG_X509_CERTIFICATES);
secretKey = (byte[])bstResult.get(0).get(WSSecurityEngineResult.TAG_SECRET);
principal = (Principal)bstResult.get(0).get(WSSecurityEngineResult.TAG_PRINCIPAL);
+/*
} else if (el.equals(WSSecurityEngine.SAML_TOKEN)
|| el.equals(WSSecurityEngine.SAML2_TOKEN)) {
Processor proc = data.getWssConfig().getProcessor(WSSecurityEngine.SAML_TOKEN);
@@ -185,6 +181,7 @@
}
secretKey = keyInfo.getSecret();
principal = createPrincipalFromSAML(assertion);
+*/
} else if (el.equals(WSSecurityEngine.ENCRYPTED_KEY)) {
if (bspCompliant) {
BSPEnforcer.checkEncryptedKeyBSPCompliance(secRef);
@@ -212,9 +209,11 @@
secretKey =
getSecretKeyFromToken(id, SecurityTokenReference.ENC_KEY_SHA1_URI, data);
principal = new CustomTokenPrincipal(id);
+/*
} else if (WSConstants.WSS_SAML_KI_VALUE_TYPE.equals(secRef.getKeyIdentifierValueType())
|| WSConstants.WSS_SAML2_KI_VALUE_TYPE.equals(secRef.getKeyIdentifierValueType())) {
parseSAMLKeyIdentifier(secRef, wsDocInfo, data, bspCompliant);
+*/
} else {
parseBSTKeyIdentifier(secRef, crypto, wsDocInfo, data, bspCompliant);
}
@@ -287,6 +286,7 @@
* @param assertion An AssertionWrapper object
* @return A principal
*/
+/*
private Principal createPrincipalFromSAML(
AssertionWrapper assertion
) {
@@ -301,6 +301,7 @@
}
return samlPrincipal;
}
+*/
/**
* Get the Secret Key from a CallbackHandler
@@ -341,6 +342,7 @@
/**
* Parse the KeyIdentifier for a SAML Assertion
*/
+/*
private void parseSAMLKeyIdentifier(
SecurityTokenReference secRef,
WSDocInfo wsDocInfo,
@@ -368,6 +370,7 @@
principal = createPrincipalFromSAML(assertion);
}
}
+*/
/**
* Parse the KeyIdentifier for a BinarySecurityToken
@@ -520,6 +523,7 @@
secretKey = dkt.deriveKey(keyLength, secret);
principal = dkt.createPrincipal();
((WSDerivedKeyTokenPrincipal)principal).setSecret(secret);
+/*
} else if (WSConstants.ST_UNSIGNED == action || WSConstants.ST_SIGNED == action) {
AssertionWrapper assertion =
(AssertionWrapper)result.get(WSSecurityEngineResult.TAG_SAML_ASSERTION);
@@ -539,6 +543,7 @@
secretKey = keyInfo.getSecret();
publicKey = keyInfo.getPublicKey();
principal = createPrincipalFromSAML(assertion);
+*/
}
}
--- a/src/main/java/org/apache/ws/security/str/SecurityTokenRefSTRParser.java
+++ b/src/main/java/org/apache/ws/security/str/SecurityTokenRefSTRParser.java
@@ -33,9 +33,6 @@
import org.apache.ws.security.message.token.SecurityTokenReference;
import org.apache.ws.security.message.token.UsernameToken;
import org.apache.ws.security.processor.Processor;
-import org.apache.ws.security.saml.SAMLKeyInfo;
-import org.apache.ws.security.saml.SAMLUtil;
-import org.apache.ws.security.saml.ext.AssertionWrapper;
import org.apache.ws.security.util.WSSecurityUtil;
import org.w3c.dom.Element;
@@ -132,6 +129,7 @@
}
} else if (secRef.containsKeyIdentifier()) {
String valueType = secRef.getKeyIdentifierValueType();
+/*
if (WSConstants.WSS_SAML_KI_VALUE_TYPE.equals(valueType)
|| WSConstants.WSS_SAML2_KI_VALUE_TYPE.equals(valueType)) {
secretKey =
@@ -145,7 +143,7 @@
secretKey =
getSecretKeyFromAssertion(assertion, secRef, data, wsDocInfo, bspCompliant);
}
- } else if (WSConstants.WSS_KRB_KI_VALUE_TYPE.equals(valueType)) {
+ } else */ if (WSConstants.WSS_KRB_KI_VALUE_TYPE.equals(valueType)) {
secretKey =
getSecretKeyFromToken(secRef.getKeyIdentifierValue(), valueType, data);
if (secretKey == null) {
@@ -276,6 +274,7 @@
/**
* Get a SecretKey from a SAML Assertion
*/
+/*
private byte[] getSecretKeyFromAssertion(
AssertionWrapper assertion,
SecurityTokenReference secRef,
@@ -295,6 +294,7 @@
}
return samlKi.getSecret();
}
+*/
/**
* Process a previous security result
@@ -321,11 +321,13 @@
String algorithm = (String)parameters.get(SIGNATURE_METHOD);
secretKey = dkt.deriveKey(WSSecurityUtil.getKeyLength(algorithm), secret);
principal = dkt.createPrincipal();
+/*
} else if (WSConstants.ST_UNSIGNED == action || WSConstants.ST_SIGNED == action) {
AssertionWrapper assertion =
(AssertionWrapper)result.get(WSSecurityEngineResult.TAG_SAML_ASSERTION);
secretKey =
getSecretKeyFromAssertion(assertion, secRef, data, wsDocInfo, bspCompliant);
+*/
} else if (WSConstants.SCT == action || WSConstants.BST == action) {
secretKey = (byte[])result.get(WSSecurityEngineResult.TAG_SECRET);
} else if (WSConstants.UT_NOPASSWORD == action || WSConstants.UT == action) {
--- a/src/main/java/org/apache/ws/security/str/EncryptedKeySTRParser.java
+++ b/src/main/java/org/apache/ws/security/str/EncryptedKeySTRParser.java
@@ -30,9 +30,6 @@
import org.apache.ws.security.message.token.BinarySecurity;
import org.apache.ws.security.message.token.SecurityTokenReference;
import org.apache.ws.security.message.token.X509Security;
-import org.apache.ws.security.saml.SAMLKeyInfo;
-import org.apache.ws.security.saml.SAMLUtil;
-import org.apache.ws.security.saml.ext.AssertionWrapper;
import org.w3c.dom.Element;
import java.security.Principal;
@@ -99,6 +96,7 @@
if (result != null) {
processPreviousResult(result, secRef, data, wsDocInfo, bspCompliant);
} else if (secRef.containsKeyIdentifier()) {
+/*
if (WSConstants.WSS_SAML_KI_VALUE_TYPE.equals(secRef.getKeyIdentifierValueType())
|| WSConstants.WSS_SAML2_KI_VALUE_TYPE.equals(secRef.getKeyIdentifierValueType())) {
AssertionWrapper assertion =
@@ -112,7 +110,7 @@
SAMLUtil.getCredentialFromSubject(assertion,
data, wsDocInfo, bspCompliant);
certs = samlKi.getCerts();
- } else {
+ } else */ {
if (bspCompliant) {
BSPEnforcer.checkBinarySecurityBSPCompliance(secRef, null);
}
@@ -221,6 +219,7 @@
(X509Certificate[])result.get(
WSSecurityEngineResult.TAG_X509_CERTIFICATES
);
+/*
} else if (WSConstants.ST_UNSIGNED == action || WSConstants.ST_SIGNED == action) {
AssertionWrapper assertion =
(AssertionWrapper)result.get(WSSecurityEngineResult.TAG_SAML_ASSERTION);
@@ -232,6 +231,7 @@
data,
wsDocInfo, bspCompliant);
certs = keyInfo.getCerts();
+*/
} else {
throw new WSSecurityException(
WSSecurityException.UNSUPPORTED_SECURITY_TOKEN,
--- a/src/main/java/org/apache/ws/security/processor/BinarySecurityTokenProcessor.java
+++ b/src/main/java/org/apache/ws/security/processor/BinarySecurityTokenProcessor.java
@@ -19,7 +19,6 @@
package org.apache.ws.security.processor;
-import org.apache.ws.security.SAMLTokenPrincipal;
import org.apache.ws.security.WSConstants;
import org.apache.ws.security.WSDocInfo;
import org.apache.ws.security.WSSConfig;
@@ -92,6 +91,7 @@
result.put(WSSecurityEngineResult.TAG_VALIDATED_TOKEN, Boolean.TRUE);
result.put(WSSecurityEngineResult.TAG_SECRET, returnedCredential.getSecretKey());
+/*
if (returnedCredential.getTransformedToken() != null) {
result.put(
WSSecurityEngineResult.TAG_TRANSFORMED_TOKEN,
@@ -100,7 +100,7 @@
SAMLTokenPrincipal samlPrincipal =
new SAMLTokenPrincipal(credential.getTransformedToken());
result.put(WSSecurityEngineResult.TAG_PRINCIPAL, samlPrincipal);
- } else if (credential.getPrincipal() != null) {
+ } else */ if (credential.getPrincipal() != null) {
result.put(WSSecurityEngineResult.TAG_PRINCIPAL, credential.getPrincipal());
} else if (certs != null && certs[0] != null) {
result.put(WSSecurityEngineResult.TAG_PRINCIPAL, certs[0].getSubjectX500Principal());
--- a/src/main/java/org/apache/ws/security/validate/Credential.java
+++ b/src/main/java/org/apache/ws/security/validate/Credential.java
@@ -28,7 +28,6 @@
import org.apache.ws.security.message.token.SecurityContextToken;
import org.apache.ws.security.message.token.Timestamp;
import org.apache.ws.security.message.token.UsernameToken;
-import org.apache.ws.security.saml.ext.AssertionWrapper;
/**
* This class stores various Credential types that can be validated and/or returned by a
@@ -42,8 +41,6 @@
private Timestamp timestamp;
private UsernameToken usernametoken;
private BinarySecurity binarySecurityToken;
- private AssertionWrapper assertion;
- private AssertionWrapper transformedToken;
private SecurityContextToken securityContextToken;
private Principal principal;
private byte[] secretKey;
@@ -166,33 +163,41 @@
* Set an AssertionWrapper to be validated
* @param assertion an AssertionWrapper to be validated
*/
+/*
public void setAssertion(AssertionWrapper assertion) {
this.assertion = assertion;
}
+*/
/**
* Get an AssertionWrapper to be validated
* @return an AssertionWrapper to be validated
*/
+/*
public AssertionWrapper getAssertion() {
return assertion;
}
+*/
/**
* Set an AssertionWrapper instance which corresponds to a Transformed Token.
* @param transformedToken a transformed AssertionWrapper instance
*/
+/*
public void setTransformedToken(AssertionWrapper transformedToken) {
this.transformedToken = transformedToken;
}
+*/
/**
* Get an AssertionWrapper instance which corresponds to a Transformed Token.
* @return a transformed AssertionWrapper instance
*/
+/*
public AssertionWrapper getTransformedToken() {
return transformedToken;
}
+*/
/**
* Set the principal that supplies context information to the validators.
--- a/src/main/java/org/apache/ws/security/str/BSPEnforcer.java
+++ b/src/main/java/org/apache/ws/security/str/BSPEnforcer.java
@@ -26,7 +26,6 @@
import org.apache.ws.security.message.token.PKIPathSecurity;
import org.apache.ws.security.message.token.SecurityTokenReference;
import org.apache.ws.security.message.token.X509Security;
-import org.apache.ws.security.saml.ext.AssertionWrapper;
/**
* This class enforces processing rules for SecurityTokenReferences to various token elements,
@@ -125,6 +124,7 @@
* @param assertion The SAML Token AssertionWrapper object
* @throws WSSecurityException
*/
+/*
public static void checkSamlTokenBSPCompliance(
SecurityTokenReference secRef,
AssertionWrapper assertion
@@ -187,6 +187,7 @@
}
}
}
+*/
/**
* Check that the Username token referenced by the SecurityTokenReference argument
--- a/src/main/java/org/apache/ws/security/WSSecurityEngineResult.java
+++ b/src/main/java/org/apache/ws/security/WSSecurityEngineResult.java
@@ -24,7 +24,6 @@
import org.apache.ws.security.message.token.SignatureConfirmation;
import org.apache.ws.security.message.token.Timestamp;
import org.apache.ws.security.message.token.UsernameToken;
-import org.apache.ws.security.saml.ext.AssertionWrapper;
import java.security.Principal;
import java.security.cert.X509Certificate;
@@ -233,6 +232,7 @@
put(TAG_ACTION, Integer.valueOf(act));
}
+/*
public WSSecurityEngineResult(
int act,
AssertionWrapper ass
@@ -242,6 +242,7 @@
put(TAG_VALIDATED_TOKEN, Boolean.FALSE);
put(TAG_TOKEN_ELEMENT, ass.getElement());
}
+*/
public WSSecurityEngineResult(
int act,
--- a/src/main/java/org/apache/ws/security/processor/UsernameTokenProcessor.java
+++ b/src/main/java/org/apache/ws/security/processor/UsernameTokenProcessor.java
@@ -19,7 +19,6 @@
package org.apache.ws.security.processor;
-import org.apache.ws.security.SAMLTokenPrincipal;
import org.apache.ws.security.WSConstants;
import org.apache.ws.security.WSDocInfo;
import org.apache.ws.security.WSSConfig;
@@ -82,6 +81,7 @@
if (validator != null) {
result.put(WSSecurityEngineResult.TAG_VALIDATED_TOKEN, Boolean.TRUE);
+/*
if (credential.getTransformedToken() != null) {
result.put(
WSSecurityEngineResult.TAG_TRANSFORMED_TOKEN, credential.getTransformedToken()
@@ -89,7 +89,7 @@
SAMLTokenPrincipal samlPrincipal =
new SAMLTokenPrincipal(credential.getTransformedToken());
result.put(WSSecurityEngineResult.TAG_PRINCIPAL, samlPrincipal);
- } else {
+ } else */ {
WSUsernameTokenPrincipal principal =
new WSUsernameTokenPrincipal(token.getName(), token.isHashed());
principal.setNonce(token.getNonce());
--- a/src/main/java/org/apache/ws/security/WSSConfig.java
+++ b/src/main/java/org/apache/ws/security/WSSConfig.java
@@ -75,6 +75,7 @@
Integer.valueOf(WSConstants.SIGN),
org.apache.ws.security.action.SignatureAction.class
);
+/*
tmp.put(
Integer.valueOf(WSConstants.ST_SIGNED),
org.apache.ws.security.action.SAMLTokenSignedAction.class
@@ -83,6 +84,7 @@
Integer.valueOf(WSConstants.ST_UNSIGNED),
org.apache.ws.security.action.SAMLTokenUnsignedAction.class
);
+*/
tmp.put(
Integer.valueOf(WSConstants.TS),
org.apache.ws.security.action.TimestampAction.class
@@ -110,6 +112,7 @@
static {
final Map> tmp = new HashMap>();
try {
+/*
tmp.put(
WSSecurityEngine.SAML_TOKEN,
org.apache.ws.security.processor.SAMLTokenProcessor.class
@@ -118,6 +121,7 @@
WSSecurityEngine.SAML2_TOKEN,
org.apache.ws.security.processor.SAMLTokenProcessor.class
);
+*/
tmp.put(
WSSecurityEngine.ENCRYPTED_KEY,
org.apache.ws.security.processor.EncryptedKeyProcessor.class
@@ -181,6 +185,7 @@
static {
final Map> tmp = new HashMap>();
try {
+/*
tmp.put(
WSSecurityEngine.SAML_TOKEN,
org.apache.ws.security.validate.SamlAssertionValidator.class
@@ -189,6 +194,7 @@
WSSecurityEngine.SAML2_TOKEN,
org.apache.ws.security.validate.SamlAssertionValidator.class
);
+*/
tmp.put(
WSSecurityEngine.SIGNATURE,
org.apache.ws.security.validate.SignatureTrustValidator.class
--- a/src/main/java/org/apache/ws/security/str/DerivedKeyTokenSTRParser.java
+++ b/src/main/java/org/apache/ws/security/str/DerivedKeyTokenSTRParser.java
@@ -29,9 +29,6 @@
import org.apache.ws.security.handler.RequestData;
import org.apache.ws.security.message.token.BinarySecurity;
import org.apache.ws.security.message.token.SecurityTokenReference;
-import org.apache.ws.security.saml.SAMLKeyInfo;
-import org.apache.ws.security.saml.SAMLUtil;
-import org.apache.ws.security.saml.ext.AssertionWrapper;
import org.apache.ws.security.util.WSSecurityUtil;
import org.w3c.dom.Element;
@@ -265,6 +262,7 @@
secretKey = (byte[])result.get(WSSecurityEngineResult.TAG_SECRET);
} else if (WSConstants.SCT == action || WSConstants.BST == action) {
secretKey = (byte[])result.get(WSSecurityEngineResult.TAG_SECRET);
+/*
} else if (WSConstants.ST_UNSIGNED == action || WSConstants.ST_SIGNED == action) {
AssertionWrapper assertion =
(AssertionWrapper)result.get(WSSecurityEngineResult.TAG_SAML_ASSERTION);
@@ -277,6 +275,7 @@
// TODO Handle malformed SAML tokens where they don't have the
// secret in them
secretKey = keyInfo.getSecret();
+*/
} else {
throw new WSSecurityException(
WSSecurityException.FAILED_CHECK, "unsupportedKeyId"
debian/maven.properties 0000644 0000000 0000000 00000000025 12220731541 012404 0 ustar maven.test.skip=true
debian/docs 0000644 0000000 0000000 00000000007 12220731541 010033 0 ustar NOTICE
debian/orig-tar.sh 0000755 0000000 0000000 00000001420 12220731541 011243 0 ustar #!/bin/bash -e
# The fake --upstream-version is there to be callable by uscan(1).
if [ -z $2 ]; then
echo "usage: ./debian/orig-tar.sh --upstream-version "
exit 1
fi
if [ -r .svn/deb-layout ]; then
. .svn/deb-layout
fi
if [ -z "$origDir" ]; then
origDir=".."
fi
echo "Creating orig.tar.gz in '$origDir'."
# $2 = version
VERSION=$2
TAR=$origDir/wss4j_$VERSION.orig.tar.xz
# See Developers Reference § 6.7.8.2.4
DIR=wss4j-$VERSION.orig
if [ -d "$DIR" ]; then
echo "Cannot export upstream sources to '$DIR', directory is already existing."
exit 1
fi
# clean up the upstream tarball
svn export http://svn.apache.org/repos/asf/webservices/wss4j/tags/${2//\./\_}/ $DIR
XZ_OPT="--best" tar --exclude-vcs --exclude-from=debian/exclude -c -J -f $TAR $DIR
rm -rf $DIR
debian/source/ 0000755 0000000 0000000 00000000000 12220731541 010463 5 ustar debian/source/format 0000644 0000000 0000000 00000000014 12220731541 011671 0 ustar 3.0 (quilt)
debian/README.source 0000644 0000000 0000000 00000000620 12220731541 011340 0 ustar Directories specified in debian/exclude contained .doc, .pdf, .jar and other
files that are either not relevant for the functionality of this package
and/or that are not shipped with their sources. Those were omitted
from a redistribution with Debian.
-- Steffen Moeller Wed, 10 Feb 2010 17:07:52 +0100
-- Charles Plessy Fri, 12 Feb 2010 12:51:16 +0900
debian/compat 0000644 0000000 0000000 00000000002 12220731541 010361 0 ustar 9
debian/copyright 0000644 0000000 0000000 00000001242 12220731541 011115 0 ustar Format: http://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
Upstream-Name: Apache WSS4J
Source: http://svn.apache.org/repos/asf/webservices/wss4j/tags/
Files: *
Copyright: 2003-2013, The Apache Software Foundation
License: Apache-2.0
On Debian systems, the complete text of the Apache 2.0 License
can be found in the /usr/share/common-licenses/Apache-2.0 file.
Notice:
This product includes software Copyright University of Southampton IT
Innovation Centre, 2006 (http://www.it-innovation.soton.ac.uk).
Authors:
Davanum Srinivas
Werner Dittmann
Ias
Ruchith Fernando
Fred Dushin
Colm O hEigeartaigh
Nandana Mihindukulasooriya
debian/control 0000644 0000000 0000000 00000002057 12220731541 010572 0 ustar Source: wss4j
Section: java
Priority: optional
Maintainer: Debian Java Maintainers
Uploaders: Emmanuel Bourg ,
tony mancill
Build-Depends-Indep: default-jdk,
libaxis-java,
libbcprov-java (>= 1.49),
libcommons-logging-java,
libmaven-bundle-plugin-java,
libxalan2-java,
libxml-security-java
Build-Depends: ant, cdbs (>= 0.4.5.3), debhelper (>= 9), maven-debian-helper
Standards-Version: 3.9.4
Vcs-Git: git://anonscm.debian.org/pkg-java/wss4j.git
Vcs-Browser: http://anonscm.debian.org/gitweb/?p=pkg-java/wss4j.git
Homepage: http://ws.apache.org/wss4j/
Package: libwss4j-java
Architecture: all
Depends: ${misc:Depends}
Description: Apache WSS4J WS-Security implementation
Apache WSS4J is an implementation of the OASIS Web Services Security
framework (WS-Security). It can be used to sign and verify SOAP Messages
with WS-Security information.