From 40289a02204e5cdfa7123a1956e3fd47898ab84d Mon Sep 17 00:00:00 2001 From: Maduranga Siriwardena Date: Wed, 27 Nov 2024 15:03:48 +0530 Subject: [PATCH] Remove openid app building --- .../tests-integration/tests-backend/pom.xml | 15 - .../travelocity.properties | 89 ----- .../travelocity.properties | 89 ----- .../IS/openId/identity-skipuserconsent.xml | 321 ------------------ .../artifacts/IS/openId/openid-app-build.xml | 114 ------- .../travelocity.properties | 89 ----- .../travelocity.properties | 89 ----- 7 files changed, 806 deletions(-) delete mode 100644 modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/dumbconsumerwithclaims/travelocity.properties delete mode 100644 modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/dumbconsumerwithoutclaims/travelocity.properties delete mode 100644 modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/identity-skipuserconsent.xml delete mode 100644 modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/openid-app-build.xml delete mode 100644 modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/smartconsumerwithclaims/travelocity.properties delete mode 100644 modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/smartconsumerwithoutclaims/travelocity.properties diff --git a/modules/integration/tests-integration/tests-backend/pom.xml b/modules/integration/tests-integration/tests-backend/pom.xml index f2332ad58ea..27a92216776 100644 --- a/modules/integration/tests-integration/tests-backend/pom.xml +++ b/modules/integration/tests-integration/tests-backend/pom.xml @@ -446,21 +446,6 @@ run - - packaging-war-artifacts-openid - process-test-resources - - - - - - - - - - run - - packaging-war-artifacts-oauth process-test-resources diff --git a/modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/dumbconsumerwithclaims/travelocity.properties b/modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/dumbconsumerwithclaims/travelocity.properties deleted file mode 100644 index cc735665edd..00000000000 --- a/modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/dumbconsumerwithclaims/travelocity.properties +++ /dev/null @@ -1,89 +0,0 @@ -EnableSAML2SSOLogin=true -EnableOpenIDLogin=true -EnableOAuth2SAML2Grant=false - -#Url to do send SAML2 SSO AuthnRequest -SAML2SSOURL=samlsso - -#Url to do initiate OAuth2 SAML2 Grant Request -OAuth2SAML2GrantURL=token - -#Url to initiate OpenID Authentication Request -OpenIdURL=openid - -#URIs to skip SSOAgentFilter; comma separated values -SkipURIs=/travelocity.com-openid-dumbconsumerwithclaims/index.jsp - -#A unique identifier for this SAML 2.0 Service Provider application -SAML2.SPEntityId=travelocity.com-openid-dumbconsumerwithclaims - -#The URL of the SAML 2.0 Assertion Consumer -SAML2.ACSURL=http://localhost:8490/travelocity.com-openid-dumbconsumerwithclaims/home.jsp - -#A unique identifier for this SAML 2.0 Service Provider application -SAML2.IdPEntityId=localhost - -#The URL of the SAML 2.0 Identity Provider -SAML2.IdPURL=https://localhost:9853/samlsso - -#Identifier given for the Service Provider for SAML 2.0 attributes -#exchange -#SAML2.AttributeConsumingServiceIndex=1701087467 - -#Specify if SingleLogout is enabled/disabled -SAML2.EnableSLO=true - -#This is the URL that is used for SLO -SAML2.SLOURL=logout - -#Specify if SAMLResponse element is signed -SAML2.EnableResponseSigning=true - -#Specify if SAMLAssertion element is signed -SAML2.EnableAssertionSigning=true - -#Specify if SAMLAssertion element is encrypted -SAML2.EnableAssertionEncryption=false - -#Specify if AuthnRequests and LogoutRequests should be signed -SAML2.EnableRequestSigning=true - -#Password of the KeyStore for SAML and OpenID -KeyStorePassword=wso2carbon - -#Alias of the IdP's public certificate -IdPPublicCertAlias=wso2carbon - -#Alias of the SP's private key -PrivateKeyAlias=wso2carbon - -#Private key password to retrieve the private key used to sign -#AuthnRequest and LogoutRequest messages -PrivateKeyPassword=wso2carbon - -#OAuth2 token endpoint URL -SAML2.OAuth2TokenURL=https://localhost:9853/oauth2/token - -#OAuth2 Client ID -SAML2.OAuth2ClientId=Qn5DQHCYfshxeZh6R9SL1HM2lsMa - -#OAuth2 Client Secret -SAML2.OAuth2ClientSecret=cbkAs1gajdwPAMbrSR54hPAIcz0a - -#OpenId Provider Url -OpenId.ProviderURL=https://localhost:9853/openid/ - -#openid.return_to parameter -OpenId.ReturnToURL=http://localhost:8490/travelocity.com-openid-dumbconsumerwithclaims/home.jsp - -#Custom SAML post binding request page -#SAML.PostBinding.RequestPage=path/to/the/html - -#Additional request parameters -#SAML.Request.Query.Param=&forceAuth=true - -#Specify whether the consumer requests user attributes from the provider -OpenId.EnableAttributeExchange=true - -#Specify whether the consumer runs in dumb mode -OpenId.EnableDumbMode=true diff --git a/modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/dumbconsumerwithoutclaims/travelocity.properties b/modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/dumbconsumerwithoutclaims/travelocity.properties deleted file mode 100644 index 59adfa26110..00000000000 --- a/modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/dumbconsumerwithoutclaims/travelocity.properties +++ /dev/null @@ -1,89 +0,0 @@ -EnableSAML2SSOLogin=true -EnableOpenIDLogin=true -EnableOAuth2SAML2Grant=false - -#Url to do send SAML2 SSO AuthnRequest -SAML2SSOURL=samlsso - -#Url to do initiate OAuth2 SAML2 Grant Request -OAuth2SAML2GrantURL=token - -#Url to initiate OpenID Authentication Request -OpenIdURL=openid - -#URIs to skip SSOAgentFilter; comma separated values -SkipURIs=/travelocity.com-openid-dumbconsumerwithoutclaims/index.jsp - -#A unique identifier for this SAML 2.0 Service Provider application -SAML2.SPEntityId=travelocity.com-openid-dumbconsumerwithoutclaims - -#The URL of the SAML 2.0 Assertion Consumer -SAML2.ACSURL=http://localhost:8490/travelocity.com-openid-dumbconsumerwithoutclaims/home.jsp - -#A unique identifier for this SAML 2.0 Service Provider application -SAML2.IdPEntityId=localhost - -#The URL of the SAML 2.0 Identity Provider -SAML2.IdPURL=https://localhost:9853/samlsso - -#Identifier given for the Service Provider for SAML 2.0 attributes -#exchange -#SAML2.AttributeConsumingServiceIndex=1701087467 - -#Specify if SingleLogout is enabled/disabled -SAML2.EnableSLO=true - -#This is the URL that is used for SLO -SAML2.SLOURL=logout - -#Specify if SAMLResponse element is signed -SAML2.EnableResponseSigning=true - -#Specify if SAMLAssertion element is signed -SAML2.EnableAssertionSigning=true - -#Specify if SAMLAssertion element is encrypted -SAML2.EnableAssertionEncryption=false - -#Specify if AuthnRequests and LogoutRequests should be signed -SAML2.EnableRequestSigning=true - -#Password of the KeyStore for SAML and OpenID -KeyStorePassword=wso2carbon - -#Alias of the IdP's public certificate -IdPPublicCertAlias=wso2carbon - -#Alias of the SP's private key -PrivateKeyAlias=wso2carbon - -#Private key password to retrieve the private key used to sign -#AuthnRequest and LogoutRequest messages -PrivateKeyPassword=wso2carbon - -#OAuth2 token endpoint URL -SAML2.OAuth2TokenURL=https://localhost:9853/oauth2/token - -#OAuth2 Client ID -SAML2.OAuth2ClientId=Qn5DQHCYfshxeZh6R9SL1HM2lsMa - -#OAuth2 Client Secret -SAML2.OAuth2ClientSecret=cbkAs1gajdwPAMbrSR54hPAIcz0a - -#OpenId Provider Url -OpenId.ProviderURL=https://localhost:9853/openid/ - -#openid.return_to parameter -OpenId.ReturnToURL=http://localhost:8490/travelocity.com-openid-dumbconsumerwithoutclaims/home.jsp - -#Custom SAML post binding request page -#SAML.PostBinding.RequestPage=path/to/the/html - -#Additional request parameters -#SAML.Request.Query.Param=&forceAuth=true - -#Specify whether the consumer requests user attributes from the provider -OpenId.EnableAttributeExchange=false - -#Specify whether the consumer runs in dumb mode -OpenId.EnableDumbMode=true diff --git a/modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/identity-skipuserconsent.xml b/modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/identity-skipuserconsent.xml deleted file mode 100644 index 2f21a0fd86b..00000000000 --- a/modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/identity-skipuserconsent.xml +++ /dev/null @@ -1,321 +0,0 @@ - - - - - - - - - jdbc/WSO2CarbonDB - - - - - - - - - ${carbon.home}/repository/resources/security/userRP.p12 - - - PKCS12 - - wso2carbon - - wso2carbon - - - - ${carbon.home}/conf/keystores - - - - SelfAndManaged - CertValidate - - - - - - - - - - https://localhost:9853/openidserver - https://localhost:9853/openid/ - - true - - 7200 - - false - - false - - 36000 - - false - org.wso2.carbon.identity.provider.openid.claims.DefaultClaimsRetriever - - - - https://localhost:9853/oauth/request-token - https://localhost:9853/oauth/access-token - https://localhost:9853/oauth/authorize-url - - 300 - - 3600 - - 3600 - - 84600 - - 300 - - true - - true - - org.wso2.carbon.identity.oauth.tokenprocessor.PlainTextPersistenceProcessor - - - org.wso2.carbon.identity.oauth2.token.handlers.clientauth.BasicAuthClientAuthHandler - - - - - token - org.wso2.carbon.identity.oauth2.authz.handlers.TokenResponseTypeHandler - - - code - org.wso2.carbon.identity.oauth2.authz.handlers.CodeResponseTypeHandler - - - - - - authorization_code - org.wso2.carbon.identity.oauth2.token.handlers.grant.AuthorizationCodeGrantHandler - - - password - org.wso2.carbon.identity.oauth2.token.handlers.grant.PasswordGrantHandler - - - refresh_token - org.wso2.carbon.identity.oauth2.token.handlers.grant.RefreshGrantHandler - - - client_credentials - org.wso2.carbon.identity.oauth2.token.handlers.grant.ClientCredentialsGrantHandler - - - urn:ietf:params:oauth:grant-type:saml2-bearer - org.wso2.carbon.identity.oauth2.token.handlers.grant.saml.SAML2BearerGrantHandler - - - iwa:ntlm - org.wso2.carbon.identity.oauth2.token.handlers.grant.iwa.ntlm.NTLMAuthenticationGrantHandler - - - - - - - - - false - - - - false - - - - - false - org.wso2.carbon.identity.oauth2.authcontext.JWTTokenGenerator - org.wso2.carbon.identity.oauth2.authcontext.DefaultClaimsRetriever - http://wso2.org/claims - SHA256withRSA - 15 - - - - - - org.wso2.carbon.identity.openidconnect.DefaultIDTokenBuilder - https://localhost:9853/oauth2endpoints/token - http://wso2.org/claims/givenname - org.wso2.carbon.identity.openidconnect.SAMLAssertionClaimsCallback - 3600 - http://wso2.org/claims - org.wso2.carbon.identity.oauth.endpoint.user.impl.UserInfoUserStoreClaimRetriever - org.wso2.carbon.identity.oauth.endpoint.user.impl.UserInforRequestDefaultValidator - org.wso2.carbon.identity.oauth.endpoint.user.impl.UserInfoISAccessTokenValidator - org.wso2.carbon.identity.oauth.endpoint.user.impl.UserInfoJSONResponseBuilder - false - - - - - true - 0 - 5 - - - - - - - - - - - - gtalk - talk.google.com - 5222 - gmail.com - multifactor1@gmail.com - wso2carbon - - - - - - localhost - https://localhost:9853/samlsso - 5 - 60000 - false - 36000 - - org.wso2.carbon.identity.sso.saml.attributes.UserAttributeStatementBuilder - http://wso2.org/claims - false - org.wso2.carbon.identity.sso.saml.builders.claims.DefaultClaimsRetriever - org.wso2.carbon.identity.sso.saml.builders.encryption.DefaultSSOEncrypter - org.wso2.carbon.identity.sso.saml.builders.signature.DefaultSSOSigner - org.wso2.carbon.identity.sso.saml.validators.SAML2HTTPRedirectDeflateSignatureValidator - - - - 5 - false - - - - - - - true - 36000 - - - true - - - true - - ${Ports.ThriftEntitlementReceivePort} - 10000 - - ${carbon.home}/repository/resources/security/wso2carbon.p12 - wso2carbon - - - - - - - - true - - - true - - true - - - - true - true - ! - 2 - - false - 3 - - - - 3 - true - - false - false - true - - - - - true - true - - true - - - - - true - true - - true - - false - - - - - - 5 - - - 10 - local://services - - - - diff --git a/modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/openid-app-build.xml b/modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/openid-app-build.xml deleted file mode 100644 index d4adb66c448..00000000000 --- a/modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/openid-app-build.xml +++ /dev/null @@ -1,114 +0,0 @@ - - - - - - This script builds four war files for the travelocity app for combinations of consumer type and openid attribute - exchange - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \ No newline at end of file diff --git a/modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/smartconsumerwithclaims/travelocity.properties b/modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/smartconsumerwithclaims/travelocity.properties deleted file mode 100644 index 5169535a44d..00000000000 --- a/modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/smartconsumerwithclaims/travelocity.properties +++ /dev/null @@ -1,89 +0,0 @@ -EnableSAML2SSOLogin=true -EnableOpenIDLogin=true -EnableOAuth2SAML2Grant=false - -#Url to do send SAML2 SSO AuthnRequest -SAML2SSOURL=samlsso - -#Url to do initiate OAuth2 SAML2 Grant Request -OAuth2SAML2GrantURL=token - -#Url to initiate OpenID Authentication Request -OpenIdURL=openid - -#URIs to skip SSOAgentFilter; comma separated values -SkipURIs=/travelocity.com-openid-smartconsumerwithclaims/index.jsp - -#A unique identifier for this SAML 2.0 Service Provider application -SAML2.SPEntityId=travelocity.com-openid-smartconsumerwithclaims - -#The URL of the SAML 2.0 Assertion Consumer -SAML2.ACSURL=http://localhost:8490/travelocity.com-openid-smartconsumerwithclaims/home.jsp - -#A unique identifier for this SAML 2.0 Service Provider application -SAML2.IdPEntityId=localhost - -#The URL of the SAML 2.0 Identity Provider -SAML2.IdPURL=https://localhost:9853/samlsso - -#Identifier given for the Service Provider for SAML 2.0 attributes -#exchange -#SAML2.AttributeConsumingServiceIndex=1701087467 - -#Specify if SingleLogout is enabled/disabled -SAML2.EnableSLO=true - -#This is the URL that is used for SLO -SAML2.SLOURL=logout - -#Specify if SAMLResponse element is signed -SAML2.EnableResponseSigning=true - -#Specify if SAMLAssertion element is signed -SAML2.EnableAssertionSigning=true - -#Specify if SAMLAssertion element is encrypted -SAML2.EnableAssertionEncryption=false - -#Specify if AuthnRequests and LogoutRequests should be signed -SAML2.EnableRequestSigning=true - -#Password of the KeyStore for SAML and OpenID -KeyStorePassword=wso2carbon - -#Alias of the IdP's public certificate -IdPPublicCertAlias=wso2carbon - -#Alias of the SP's private key -PrivateKeyAlias=wso2carbon - -#Private key password to retrieve the private key used to sign -#AuthnRequest and LogoutRequest messages -PrivateKeyPassword=wso2carbon - -#OAuth2 token endpoint URL -SAML2.OAuth2TokenURL=https://localhost:9853/oauth2/token - -#OAuth2 Client ID -SAML2.OAuth2ClientId=Qn5DQHCYfshxeZh6R9SL1HM2lsMa - -#OAuth2 Client Secret -SAML2.OAuth2ClientSecret=cbkAs1gajdwPAMbrSR54hPAIcz0a - -#OpenId Provider Url -OpenId.ProviderURL=https://localhost:9853/openid/ - -#openid.return_to parameter -OpenId.ReturnToURL=http://localhost:8490/travelocity.com-openid-smartconsumerwithclaims/home.jsp - -#Custom SAML post binding request page -#SAML.PostBinding.RequestPage=path/to/the/html - -#Additional request parameters -#SAML.Request.Query.Param=&forceAuth=true - -#Specify whether the consumer requests user attributes from the provider -OpenId.EnableAttributeExchange=true - -#Specify whether the consumer runs in dumb mode -OpenId.EnableDumbMode=false diff --git a/modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/smartconsumerwithoutclaims/travelocity.properties b/modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/smartconsumerwithoutclaims/travelocity.properties deleted file mode 100644 index c379912c713..00000000000 --- a/modules/integration/tests-integration/tests-backend/src/test/resources/artifacts/IS/openId/smartconsumerwithoutclaims/travelocity.properties +++ /dev/null @@ -1,89 +0,0 @@ -EnableSAML2SSOLogin=true -EnableOpenIDLogin=true -EnableOAuth2SAML2Grant=false - -#Url to do send SAML2 SSO AuthnRequest -SAML2SSOURL=samlsso - -#Url to do initiate OAuth2 SAML2 Grant Request -OAuth2SAML2GrantURL=token - -#Url to initiate OpenID Authentication Request -OpenIdURL=openid - -#URIs to skip SSOAgentFilter; comma separated values -SkipURIs=/travelocity.com-openid-smartconsumerwithoutclaims/index.jsp - -#A unique identifier for this SAML 2.0 Service Provider application -SAML2.SPEntityId=travelocity.com-openid-smartconsumerwithoutclaims - -#The URL of the SAML 2.0 Assertion Consumer -SAML2.ACSURL=http://localhost:8490/travelocity.com-openid-smartconsumerwithoutclaims/home.jsp - -#A unique identifier for this SAML 2.0 Service Provider application -SAML2.IdPEntityId=localhost - -#The URL of the SAML 2.0 Identity Provider -SAML2.IdPURL=https://localhost:9853/samlsso - -#Identifier given for the Service Provider for SAML 2.0 attributes -#exchange -#SAML2.AttributeConsumingServiceIndex=1701087467 - -#Specify if SingleLogout is enabled/disabled -SAML2.EnableSLO=true - -#This is the URL that is used for SLO -SAML2.SLOURL=logout - -#Specify if SAMLResponse element is signed -SAML2.EnableResponseSigning=true - -#Specify if SAMLAssertion element is signed -SAML2.EnableAssertionSigning=true - -#Specify if SAMLAssertion element is encrypted -SAML2.EnableAssertionEncryption=false - -#Specify if AuthnRequests and LogoutRequests should be signed -SAML2.EnableRequestSigning=true - -#Password of the KeyStore for SAML and OpenID -KeyStorePassword=wso2carbon - -#Alias of the IdP's public certificate -IdPPublicCertAlias=wso2carbon - -#Alias of the SP's private key -PrivateKeyAlias=wso2carbon - -#Private key password to retrieve the private key used to sign -#AuthnRequest and LogoutRequest messages -PrivateKeyPassword=wso2carbon - -#OAuth2 token endpoint URL -SAML2.OAuth2TokenURL=https://localhost:9853/oauth2/token - -#OAuth2 Client ID -SAML2.OAuth2ClientId=Qn5DQHCYfshxeZh6R9SL1HM2lsMa - -#OAuth2 Client Secret -SAML2.OAuth2ClientSecret=cbkAs1gajdwPAMbrSR54hPAIcz0a - -#OpenId Provider Url -OpenId.ProviderURL=https://localhost:9853/openid/ - -#openid.return_to parameter -OpenId.ReturnToURL=http://localhost:8490/travelocity.com-openid-smartconsumerwithoutclaims/home.jsp - -#Custom SAML post binding request page -#SAML.PostBinding.RequestPage=path/to/the/html - -#Additional request parameters -#SAML.Request.Query.Param=&forceAuth=true - -#Specify whether the consumer requests user attributes from the provider -OpenId.EnableAttributeExchange=false - -#Specify whether the consumer runs in dumb mode -OpenId.EnableDumbMode=false