mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-07-31 17:39:05 +00:00
Merged BRANCHES/DEV/V4.0-BUG-FIX to HEAD:
35637: RemoteCredentialsService and RemoteAlfrescoTicketService, with tests git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/HEAD/root@35639 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
This commit is contained in:
@@ -0,0 +1,99 @@
|
||||
/*
|
||||
* Copyright (C) 2005-2012 Alfresco Software Limited.
|
||||
*
|
||||
* This file is part of Alfresco
|
||||
*
|
||||
* Alfresco is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU Lesser General Public License as published by
|
||||
* the Free Software Foundation, either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* Alfresco is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU Lesser General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU Lesser General Public License
|
||||
* along with Alfresco. If not, see <http://www.gnu.org/licenses/>.
|
||||
*/
|
||||
package org.alfresco.repo.remotecredentials;
|
||||
|
||||
import java.io.Serializable;
|
||||
import java.util.HashMap;
|
||||
import java.util.Map;
|
||||
|
||||
import org.alfresco.repo.node.encryption.MetadataEncryptor;
|
||||
import org.alfresco.service.cmr.remotecredentials.BaseCredentialsInfo;
|
||||
import org.alfresco.service.cmr.remotecredentials.OAuth1CredentialsInfo;
|
||||
import org.alfresco.service.cmr.repository.NodeRef;
|
||||
import org.alfresco.service.namespace.QName;
|
||||
|
||||
/**
|
||||
* The Factory for building {@link OAuth1CredentialsInfo} objects
|
||||
*
|
||||
* @author Nick Burch
|
||||
* @since Odin
|
||||
*/
|
||||
public class OAuth1CredentialsFactory implements RemoteCredentialsInfoFactory
|
||||
{
|
||||
private MetadataEncryptor metadataEncryptor;
|
||||
|
||||
public void setMetadataEncryptor(MetadataEncryptor metadataEncryptor)
|
||||
{
|
||||
this.metadataEncryptor = metadataEncryptor;
|
||||
}
|
||||
|
||||
/**
|
||||
* Creates a new {@link OAuth1CredentialsInfo} based on the details of the underlying node.
|
||||
*/
|
||||
public OAuth1CredentialsInfo createCredentials(QName type, NodeRef nodeRef, String remoteSystemName,
|
||||
NodeRef remoteSystemContainerNodeRef, Map<QName,Serializable> properties)
|
||||
{
|
||||
// Decrypt the token and secret
|
||||
String token = (String)metadataEncryptor.decrypt(
|
||||
RemoteCredentialsModel.PROP_OAUTH1_TOKEN, properties.get(RemoteCredentialsModel.PROP_OAUTH1_TOKEN));
|
||||
String secret = (String)metadataEncryptor.decrypt(
|
||||
RemoteCredentialsModel.PROP_OAUTH1_TOKEN_SECRET, properties.get(RemoteCredentialsModel.PROP_OAUTH1_TOKEN_SECRET));
|
||||
|
||||
// Build the object
|
||||
OAuth1CredentialsInfoImpl credentials =
|
||||
new OAuth1CredentialsInfoImpl(nodeRef, remoteSystemName, remoteSystemContainerNodeRef);
|
||||
|
||||
// Populate
|
||||
RemoteCredentialsInfoFactory.FactoryHelper.setCoreCredentials(credentials, properties);
|
||||
credentials.setOAuthToken(token);
|
||||
credentials.setOAuthSecret(secret);
|
||||
|
||||
// All done
|
||||
return credentials;
|
||||
}
|
||||
|
||||
/**
|
||||
* Serializes the given {@link BaseCredentialsInfo} object to node properties.
|
||||
*
|
||||
* @param info The Credentials object to serialize
|
||||
* @param coreProperties The core rc:credentialBase properties for the node
|
||||
* @return The final set of properties to be serialized for the node
|
||||
*/
|
||||
public Map<QName,Serializable> serializeCredentials(BaseCredentialsInfo info)
|
||||
{
|
||||
if (! (info instanceof OAuth1CredentialsInfo))
|
||||
{
|
||||
throw new IllegalStateException("Incorrect registration, info must be a OAuth1CredentialsInfo");
|
||||
}
|
||||
|
||||
// Encrypt the details
|
||||
OAuth1CredentialsInfo credentials = (OAuth1CredentialsInfo)info;
|
||||
|
||||
Serializable tokenEncrypted = metadataEncryptor.encrypt(
|
||||
RemoteCredentialsModel.PROP_OAUTH1_TOKEN, credentials.getOAuthToken());
|
||||
Serializable secretEncrypted = metadataEncryptor.encrypt(
|
||||
RemoteCredentialsModel.PROP_OAUTH1_TOKEN_SECRET, credentials.getOAuthSecret());
|
||||
|
||||
// Store our specific types and return
|
||||
Map<QName,Serializable> properties = new HashMap<QName, Serializable>();
|
||||
properties.put(RemoteCredentialsModel.PROP_OAUTH1_TOKEN, tokenEncrypted);
|
||||
properties.put(RemoteCredentialsModel.PROP_OAUTH1_TOKEN_SECRET, secretEncrypted);
|
||||
return properties;
|
||||
}
|
||||
}
|
Reference in New Issue
Block a user