From 61b9eb1be03fc03a9f4bb0013a08ff44a1059503 Mon Sep 17 00:00:00 2001
From: Jean-Noël Rouvignac <jean-noel.rouvignac@forgerock.com>
Date: Wed, 20 Apr 2016 14:25:46 +0000
Subject: [PATCH] opendj-server-legacy: added @Override + Autorefactor'ed comments
---
opendj-server-legacy/src/main/java/org/opends/server/extensions/FingerprintCertificateMapper.java | 29 -----------------------------
1 files changed, 0 insertions(+), 29 deletions(-)
diff --git a/opendj-server-legacy/src/main/java/org/opends/server/extensions/FingerprintCertificateMapper.java b/opendj-server-legacy/src/main/java/org/opends/server/extensions/FingerprintCertificateMapper.java
index a59ff9e..b8cc14e 100644
--- a/opendj-server-legacy/src/main/java/org/opends/server/extensions/FingerprintCertificateMapper.java
+++ b/opendj-server-legacy/src/main/java/org/opends/server/extensions/FingerprintCertificateMapper.java
@@ -77,7 +77,6 @@
/** The set of attributes to return in search result entries. */
private LinkedHashSet<String> requestedAttributes;
-
/**
* Creates a new instance of this certificate mapper. Note that all actual
* initialization should be done in the
@@ -88,9 +87,6 @@
super();
}
-
-
- /** {@inheritDoc} */
@Override
public void initializeCertificateMapper(
FingerprintCertificateMapperCfg configuration)
@@ -111,7 +107,6 @@
break;
}
-
// Make sure that the fingerprint attribute is configured for equality in
// all appropriate backends.
Set<DN> cfgBaseDNs = configuration.getUserBaseDN();
@@ -136,18 +131,12 @@
requestedAttributes = newLinkedHashSet("*", "+");
}
-
-
- /** {@inheritDoc} */
@Override
public void finalizeCertificateMapper()
{
currentConfig.removeFingerprintChangeListener(this);
}
-
-
- /** {@inheritDoc} */
@Override
public Entry mapCertificateToUser(Certificate[] certificateChain)
throws DirectoryException
@@ -163,7 +152,6 @@
throw new DirectoryException(ResultCode.INVALID_CREDENTIALS, message);
}
-
// Get the first certificate in the chain. It must be an X.509 certificate.
X509Certificate peerCertificate;
try
@@ -179,7 +167,6 @@
throw new DirectoryException(ResultCode.INVALID_CREDENTIALS, message);
}
-
// Get the signature from the peer certificate and create a digest of it
// using the configured algorithm.
String fingerprintString;
@@ -201,13 +188,11 @@
throw new DirectoryException(ResultCode.INVALID_CREDENTIALS, message);
}
-
// Create the search filter from the fingerprint.
ByteString value = ByteString.valueOfUtf8(fingerprintString);
SearchFilter filter =
SearchFilter.createEqualityFilter(fingerprintAttributeType, value);
-
// If we have an explicit set of base DNs, then use it. Otherwise, use the
// set of public naming contexts in the server.
Collection<DN> baseDNs = config.getUserBaseDN();
@@ -216,7 +201,6 @@
baseDNs = DirectoryServer.getPublicNamingContexts().keySet();
}
-
// For each base DN, issue an internal search in an attempt to map the
// certificate.
Entry userEntry = null;
@@ -247,7 +231,6 @@
throw new DirectoryException(
ResultCode.INVALID_CREDENTIALS, message);
-
case TIME_LIMIT_EXCEEDED:
case ADMIN_LIMIT_EXCEEDED:
// The search criteria was too inefficient.
@@ -277,15 +260,11 @@
}
}
-
// If we've gotten here, then we either found exactly one user entry or we
// didn't find any. Either way, return the entry or null to the caller.
return userEntry;
}
-
-
- /** {@inheritDoc} */
@Override
public boolean isConfigurationAcceptable(CertificateMapperCfg configuration,
List<LocalizableMessage> unacceptableReasons)
@@ -295,9 +274,6 @@
return isConfigurationChangeAcceptable(config, unacceptableReasons);
}
-
-
- /** {@inheritDoc} */
@Override
public boolean isConfigurationChangeAcceptable(
FingerprintCertificateMapperCfg configuration,
@@ -306,16 +282,12 @@
return true;
}
-
-
- /** {@inheritDoc} */
@Override
public ConfigChangeResult applyConfigurationChange(
FingerprintCertificateMapperCfg configuration)
{
final ConfigChangeResult ccr = new ConfigChangeResult();
-
// Get the algorithm that will be used to generate the fingerprint.
String newFingerprintAlgorithm = null;
switch (configuration.getFingerprintAlgorithm())
@@ -328,7 +300,6 @@
break;
}
-
if (ccr.getResultCode() == ResultCode.SUCCESS)
{
fingerprintAlgorithm = newFingerprintAlgorithm;
--
Gitblit v1.10.0