refactor: Update plugins
Change-Id: I1eadfed6aeaa7ab54a5350582418fde3e93b0e44
Signed-off-by: Baily Robers <Baily.Roberts@boeing.com>
diff --git a/features/org.eclipse.osee.core.server.external.feature/feature.xml b/features/org.eclipse.osee.core.server.external.feature/feature.xml
index c70a8c0..4daf749 100644
--- a/features/org.eclipse.osee.core.server.external.feature/feature.xml
+++ b/features/org.eclipse.osee.core.server.external.feature/feature.xml
@@ -1368,12 +1368,12 @@
install-size="0"
version="0.0.0"
unpack="false"/>
-
+ <!--
<plugin
id="org.xerial.sqlite"
download-size="0"
install-size="0"
version="0.0.0"
unpack="false"/>
-
+ -->
</feature>
diff --git a/plugins/org.eclipse.osee.jaxrs.server/src/org/eclipse/osee/jaxrs/server/internal/security/oauth2/OseeOAuthContextProvider.java b/plugins/org.eclipse.osee.jaxrs.server/src/org/eclipse/osee/jaxrs/server/internal/security/oauth2/OseeOAuthContextProvider.java
index 37bfb82..e3c1bb3 100644
--- a/plugins/org.eclipse.osee.jaxrs.server/src/org/eclipse/osee/jaxrs/server/internal/security/oauth2/OseeOAuthContextProvider.java
+++ b/plugins/org.eclipse.osee.jaxrs.server/src/org/eclipse/osee/jaxrs/server/internal/security/oauth2/OseeOAuthContextProvider.java
@@ -160,7 +160,7 @@
@Override
public boolean isDefault() {
- return permission.isDefault();
+ return permission.isDefaultPermission();
}
@Override
diff --git a/plugins/org.eclipse.osee.jaxrs.server/src/org/eclipse/osee/jaxrs/server/internal/security/oauth2/provider/adapters/OAuthEncryption.java b/plugins/org.eclipse.osee.jaxrs.server/src/org/eclipse/osee/jaxrs/server/internal/security/oauth2/provider/adapters/OAuthEncryption.java
index c9dfa8e..6daf173 100644
--- a/plugins/org.eclipse.osee.jaxrs.server/src/org/eclipse/osee/jaxrs/server/internal/security/oauth2/provider/adapters/OAuthEncryption.java
+++ b/plugins/org.eclipse.osee.jaxrs.server/src/org/eclipse/osee/jaxrs/server/internal/security/oauth2/provider/adapters/OAuthEncryption.java
@@ -51,7 +51,8 @@
return encryptCodeGrant(grant, secretKey, null);
}
- private static String encryptCodeGrant(ServerAuthorizationCodeGrant grant, Key secretKey, KeyProperties props) throws SecurityException {
+ private static String encryptCodeGrant(ServerAuthorizationCodeGrant grant, Key secretKey, KeyProperties props)
+ throws SecurityException {
String tokenSequence = tokenizeCodeGrant(grant);
return CryptoUtils.encryptSequence(tokenSequence, secretKey, props);
@@ -102,7 +103,8 @@
return encryptAccessToken(token, secretKey, null);
}
- private static String encryptAccessToken(ServerAccessToken token, Key secretKey, KeyProperties props) throws SecurityException {
+ private static String encryptAccessToken(ServerAccessToken token, Key secretKey, KeyProperties props)
+ throws SecurityException {
String tokenSequence = tokenizeServerToken(token);
return CryptoUtils.encryptSequence(tokenSequence, secretKey, props);
}
@@ -111,7 +113,8 @@
return encryptRefreshToken(refreshToken, secretKey, null);
}
- private static String encryptRefreshToken(RefreshToken token, Key secretKey, KeyProperties props) throws SecurityException {
+ private static String encryptRefreshToken(RefreshToken token, Key secretKey, KeyProperties props)
+ throws SecurityException {
String tokenSequence = tokenizeRefreshToken(token);
return CryptoUtils.encryptSequence(tokenSequence, secretKey, props);
@@ -121,12 +124,14 @@
return decryptCodeGrant(provider, grant, secretKey, null);
}
- private static ServerAuthorizationCodeGrant decryptCodeGrant(OAuthDataProvider provider, String encodedData, Key key, KeyProperties props) throws SecurityException {
+ private static ServerAuthorizationCodeGrant decryptCodeGrant(OAuthDataProvider provider, String encodedData, Key key,
+ KeyProperties props) throws SecurityException {
String decryptedSequence = CryptoUtils.decryptSequence(encodedData, key, props);
return recreateCodeGrant(provider, decryptedSequence);
}
- private static ServerAuthorizationCodeGrant recreateCodeGrant(OAuthDataProvider provider, String decryptedSequence) throws SecurityException {
+ private static ServerAuthorizationCodeGrant recreateCodeGrant(OAuthDataProvider provider, String decryptedSequence)
+ throws SecurityException {
return recreateCodeGrantInternal(provider, decryptedSequence);
}
@@ -204,16 +209,19 @@
return accessToken;
}
- private static ServerAccessToken decryptAccessToken(OAuthDataProvider provider, String encodedData, Key secretKey, KeyProperties props) throws SecurityException {
+ private static ServerAccessToken decryptAccessToken(OAuthDataProvider provider, String encodedData, Key secretKey,
+ KeyProperties props) throws SecurityException {
String decryptedSequence = CryptoUtils.decryptSequence(encodedData, secretKey, props);
return recreateAccessToken(provider, encodedData, decryptedSequence);
}
- private static ServerAccessToken recreateAccessToken(OAuthDataProvider provider, String newTokenKey, String decryptedSequence) throws SecurityException {
+ private static ServerAccessToken recreateAccessToken(OAuthDataProvider provider, String newTokenKey,
+ String decryptedSequence) throws SecurityException {
return recreateAccessToken(provider, newTokenKey, getParts(decryptedSequence));
}
- private static ServerAccessToken recreateAccessToken(OAuthDataProvider provider, String newTokenKey, String[] parts) {
+ private static ServerAccessToken recreateAccessToken(OAuthDataProvider provider, String newTokenKey,
+ String[] parts) {
final ServerAccessToken newToken = new ServerAccessToken(provider.getClient(parts[4]), parts[1],
newTokenKey == null ? parts[0] : newTokenKey, Long.valueOf(parts[2]), Long.valueOf(parts[3])) {
@@ -252,12 +260,14 @@
return decryptRefreshToken(provider, token, secretKey, null);
}
- private static RefreshToken decryptRefreshToken(OAuthDataProvider provider, String encodedData, Key key, KeyProperties props) throws SecurityException {
+ private static RefreshToken decryptRefreshToken(OAuthDataProvider provider, String encodedData, Key key,
+ KeyProperties props) throws SecurityException {
String decryptedSequence = CryptoUtils.decryptSequence(encodedData, key, props);
return recreateRefreshToken(provider, encodedData, decryptedSequence);
}
- private static RefreshToken recreateRefreshToken(OAuthDataProvider provider, String newTokenKey, String decryptedSequence) throws SecurityException {
+ private static RefreshToken recreateRefreshToken(OAuthDataProvider provider, String newTokenKey,
+ String decryptedSequence) throws SecurityException {
String[] parts = getParts(decryptedSequence);
ServerAccessToken token = recreateAccessToken(provider, newTokenKey, parts);
return new RefreshToken(token, newTokenKey, parseSimpleList(parts[parts.length - 1]));
@@ -345,7 +355,7 @@
state.append(tokenizeString(p.getDescription()));
state.append(".");
// 9.3
- state.append(p.isDefault());
+ state.append(p.isDefaultPermission());
state.append(".");
// 9.4
state.append(p.getHttpVerbs().toString());
diff --git a/plugins/org.eclipse.osee.jaxrs.server/src/org/eclipse/osee/jaxrs/server/internal/security/oauth2/provider/writers/AuthorizationDataHtmlWriter.java b/plugins/org.eclipse.osee.jaxrs.server/src/org/eclipse/osee/jaxrs/server/internal/security/oauth2/provider/writers/AuthorizationDataHtmlWriter.java
index 2da47cf..e64a317 100644
--- a/plugins/org.eclipse.osee.jaxrs.server/src/org/eclipse/osee/jaxrs/server/internal/security/oauth2/provider/writers/AuthorizationDataHtmlWriter.java
+++ b/plugins/org.eclipse.osee.jaxrs.server/src/org/eclipse/osee/jaxrs/server/internal/security/oauth2/provider/writers/AuthorizationDataHtmlWriter.java
@@ -97,7 +97,8 @@
private void addItem(InputFields input, OAuthPermission perm) {
String permissionName = perm.getPermission();
String key = String.format("%s_status", permissionName);
- input.add(key, InputType.checkbox, permissionName, perm.getDescription(), "", "allow", perm.isDefault());
+ input.add(key, InputType.checkbox, permissionName, perm.getDescription(), "", "allow",
+ perm.isDefaultPermission());
}
}
diff --git a/plugins/org.eclipse.osee.jaxrs/src/org/eclipse/osee/jaxrs/OAuth2Flows.java b/plugins/org.eclipse.osee.jaxrs/src/org/eclipse/osee/jaxrs/OAuth2Flows.java
index 9dc5b18..c6e6287 100644
--- a/plugins/org.eclipse.osee.jaxrs/src/org/eclipse/osee/jaxrs/OAuth2Flows.java
+++ b/plugins/org.eclipse.osee.jaxrs/src/org/eclipse/osee/jaxrs/OAuth2Flows.java
@@ -76,7 +76,8 @@
return OAuthUtils.generateRandomTokenKey();
}
- public ClientAccessToken authorizationCodeFlow(JaxRsConfirmAccessHandler handler, String state, String scope, String redirectUri) {
+ public ClientAccessToken authorizationCodeFlow(JaxRsConfirmAccessHandler handler, String state, String scope,
+ String redirectUri) {
String sessionCookie = null;
AuthFlowResponse response = requestAuthorizationGrant(state, scope, redirectUri);
if (response.isAuthData()) {
@@ -111,7 +112,7 @@
}
protected AuthFlowResponse requestAuthorizationGrant(String state, String scope, String redirectUri) {
- UriBuilder builder = OAuthClientUtils.getAuthorizationURIBuilder(authorizeUri, client.getKey(), scope);
+ UriBuilder builder = OAuthClientUtils.getAuthorizationURIBuilder(authorizeUri, client.getClientId(), scope);
if (redirectUri != null) {
builder.queryParam(OAuthConstants.REDIRECT_URI, redirectUri);
}
@@ -119,7 +120,7 @@
builder.queryParam(OAuthConstants.STATE, state);
}
// confidential clients
- builder.queryParam(OAuthConstants.CLIENT_SECRET, client.getSecret());
+ builder.queryParam(OAuthConstants.CLIENT_SECRET, client.getClientSecret());
URI authorizationURI = builder.build();
Response response = transport.sendAuthorizationCodeRequest(owner, authorizationURI);
@@ -145,7 +146,8 @@
}
}
- protected AuthFlowResponse confirmAccess(JaxRsConfirmAccessHandler handler, OAuthAuthorizationData authData, String sessionCookie) {
+ protected AuthFlowResponse confirmAccess(JaxRsConfirmAccessHandler handler, OAuthAuthorizationData authData,
+ String sessionCookie) {
ConfirmAccessRequest request = newAccessConfirmRequest(authData);
ConfirmAccessResponse ownerResponse = handler.onConfirmAccess(request);
Form form = newAccessConfirmForm(authData, ownerResponse);
@@ -181,7 +183,8 @@
}
}
- protected ClientAccessToken exchangeCodeForToken(String sessionCookie, String authCode, String state, String scope, String redirectUri) {
+ protected ClientAccessToken exchangeCodeForToken(String sessionCookie, String authCode, String state, String scope,
+ String redirectUri) {
Map<String, String> extraParams = new HashMap<>();
if (state != null) {
extraParams.put(OAuthConstants.STATE, state);
@@ -339,7 +342,7 @@
@Override
public boolean isDefault() {
- return perm.isDefault();
+ return perm.isDefaultPermission();
}
@Override