added das features

merge-requests/1/head
ayyoob 9 years ago
parent 6732d7b642
commit d9701885b9

@ -197,12 +197,12 @@
</includes> </includes>
</fileSet> </fileSet>
<!--data-bridge configuration--> <!--data-bridge configuration-->
<fileSet> <!--<fileSet>-->
<directory>src/repository/conf/data-bridge</directory> <!--<directory>src/repository/conf/data-bridge</directory>-->
<outputDirectory>${pom.artifactId}-${pom.version}/repository/conf/data-bridge <!--<outputDirectory>${pom.artifactId}-${pom.version}/repository/conf/data-bridge-->
</outputDirectory> <!--</outputDirectory>-->
<fileMode>755</fileMode> <!--<fileMode>755</fileMode>-->
</fileSet> <!--</fileSet>-->
<fileSet> <fileSet>
<directory> <directory>
../p2-profile-gen/target/wso2carbon-core-${carbon.kernel.version}/dbscripts/service-provider ../p2-profile-gen/target/wso2carbon-core-${carbon.kernel.version}/dbscripts/service-provider
@ -718,9 +718,9 @@
<!-- Copying application-authentication.xml --> <!-- Copying application-authentication.xml -->
<file> <file>
<source> <source>
../p2-profile-gen/target/wso2carbon-core-${carbon.kernel.version}/repository/conf/security/application-authentication.xml ../p2-profile-gen/target/wso2carbon-core-${carbon.kernel.version}/repository/conf/identity/application-authentication.xml
</source> </source>
<outputDirectory>${pom.artifactId}-${pom.version}/repository/conf/security</outputDirectory> <outputDirectory>${pom.artifactId}-${pom.version}/repository/conf/identity</outputDirectory>
<filtered>true</filtered> <filtered>true</filtered>
<fileMode>644</fileMode> <fileMode>644</fileMode>
</file> </file>
@ -729,9 +729,9 @@
<!-- Copying thrift-authentication.xml --> <!-- Copying thrift-authentication.xml -->
<file> <file>
<source> <source>
../p2-profile-gen/target/wso2carbon-core-${carbon.kernel.version}/repository/conf/thrift-authentication.xml ../p2-profile-gen/target/wso2carbon-core-${carbon.kernel.version}/repository/conf/identity/thrift-authentication.xml
</source> </source>
<outputDirectory>${pom.artifactId}-${pom.version}/repository/conf</outputDirectory> <outputDirectory>${pom.artifactId}-${pom.version}/repository/conf/identity</outputDirectory>
<filtered>true</filtered> <filtered>true</filtered>
<fileMode>644</fileMode> <fileMode>644</fileMode>
</file> </file>
@ -749,7 +749,7 @@
</file> </file>
<file> <file>
<source>src/repository/conf/identity.xml</source> <source>src/repository/conf/identity.xml</source>
<outputDirectory>${pom.artifactId}-${pom.version}/repository/conf</outputDirectory> <outputDirectory>${pom.artifactId}-${pom.version}/repository/conf/identity</outputDirectory>
<fileMode>644</fileMode> <fileMode>644</fileMode>
</file> </file>
<file> <file>
@ -792,16 +792,16 @@
<fileMode>644</fileMode> <fileMode>644</fileMode>
</file> </file>
<!-- TODO: Verify this feature is needed -->
<!--Webapp Authenticator Config file--> <!--Webapp Authenticator Config file-->
<!--<file>--> <file>
<!--<source>--> <source>
<!--../p2-profile-gen/target/wso2carbon-core-${carbon.kernel.version}/repository/conf/etc/webapp-authenticator-config.xml--> ../p2-profile-gen/target/wso2carbon-core-${carbon.kernel.version}/repository/conf/etc/webapp-authenticator-config.xml
<!--</source>--> </source>
<!--<outputDirectory>${pom.artifactId}-${pom.version}/repository/conf/etc</outputDirectory>--> <outputDirectory>${pom.artifactId}-${pom.version}/repository/conf/etc</outputDirectory>
<!--<filtered>true</filtered>--> <filtered>true</filtered>
<!--<fileMode>644</fileMode>--> <fileMode>644</fileMode>
<!--</file>--> </file>
<!--notifications config file--> <!--notifications config file-->
<file> <file>
@ -1020,25 +1020,98 @@
<!-- End of Enterprise Store Features --> <!-- End of Enterprise Store Features -->
<!-- Copying apim feature - bam.xml --> <!-- Copying apim feature - bam.xml -->
<!--<file>-->
<!--<source>-->
<!--../p2-profile-gen/target/wso2carbon-core-${carbon.kernel.version}/repository/conf/etc/bam.xml-->
<!--</source>-->
<!--<outputDirectory>${pom.artifactId}-${pom.version}/repository/conf/etc</outputDirectory>-->
<!--<filtered>true</filtered>-->
<!--<fileMode>644</fileMode>-->
<!--</file>-->
<!-- Analytics datasources -->
<file> <file>
<source> <source>
../p2-profile-gen/target/wso2carbon-core-${carbon.kernel.version}/repository/conf/etc/bam.xml ../p2-profile-gen/target/wso2carbon-core-${carbon.kernel.version}/repository/conf/datasources/analytics-datasources.xml
</source> </source>
<outputDirectory>${pom.artifactId}-${pom.version}/repository/conf/etc</outputDirectory> <outputDirectory>${pom.artifactId}-${pom.version}/repository/conf/datasources</outputDirectory>
<filtered>true</filtered> <filtered>true</filtered>
<fileMode>644</fileMode> <fileMode>644</fileMode>
</file> </file>
<!-- Analytics datasources -->
<!--DAS Files-->
<file> <file>
<source> <source>
../p2-profile-gen/target/wso2carbon-core-${carbon.kernel.version}/repository/conf/datasources/analytics-datasources.xml ../p2-profile-gen/target/wso2carbon-core-${carbon.kernel.version}/repository/conf/event-processor.xml
</source> </source>
<outputDirectory>${pom.artifactId}-${pom.version}/repository/conf/datasources</outputDirectory> <outputDirectory>${pom.artifactId}-${pom.version}/repository/conf/
</outputDirectory>
<filtered>true</filtered>
</file>
<file>
<source>
../p2-profile-gen/target/wso2carbon-core-${carbon.kernel.version}/repository/conf/output-event-adapters.xml
</source>
<outputDirectory>${pom.artifactId}-${pom.version}/repository/conf
</outputDirectory>
<filtered>true</filtered> <filtered>true</filtered>
<fileMode>644</fileMode> <fileMode>644</fileMode>
</file> </file>
<file>
<source>
../p2-profile-gen/target/wso2carbon-core-${carbon.kernel.version}/repository/conf/input-event-adapters.xml
</source>
<outputDirectory>${pom.artifactId}-${pom.version}/repository/conf
</outputDirectory>
<filtered>true</filtered>
<fileMode>644</fileMode>
</file>
<!-- ************* Data bridge related files ********** -->
<file>
<source>../p2-profile-gen/target/wso2carbon-core-${carbon.kernel.version}/repository/conf/data-bridge/data-bridge-config.xml</source>
<outputDirectory>${pom.artifactId}-${pom.version}/repository/conf/data-bridge</outputDirectory>
<filtered>true</filtered>
<fileMode>644</fileMode>
</file>
<file>
<source>src/repository/conf/data-bridge/stream-definitions.xml</source>
<outputDirectory>${pom.artifactId}-${pom.version}/repository/conf/data-bridge</outputDirectory>
</file>
<file>
<source>
../p2-profile-gen/target/wso2carbon-core-${carbon.kernel.version}/repository/conf/data-bridge/data-agent-config.xml
</source>
<outputDirectory>${pom.artifactId}-${pom.version}/repository/conf/data-bridge
</outputDirectory>
<filtered>true</filtered>
<fileMode>644</fileMode>
</file>
<!-- ************* Data bridge related files end ********** -->
<!--spark udf conf file-->
<file>
<source>
../p2-profile-gen/target/wso2carbon-core-${carbon.kernel.version}/repository/conf/spark/spark-udf-config.xml
</source>
<outputDirectory>${pom.artifactId}-${pom.version}/repository/conf/spark/
</outputDirectory>
<fileMode>755</fileMode>
</file>
<!--spark defaults file-->
<file>
<source>
../p2-profile-gen/target/wso2carbon-core-${carbon.kernel.version}/repository/conf/spark/spark-defaults.conf
</source>
<outputDirectory>${pom.artifactId}-${pom.version}/repository/conf/spark/
</outputDirectory>
<fileMode>755</fileMode>
</file>
</files> </files>

@ -1,24 +0,0 @@
<!--
~ Copyright (c) 2015, WSO2 Inc. (http:www.wso2.org) All Rights Reserved.
~
~ WSO2 Inc. licenses this file to you under the Apache License,
~ Version 2.0 (the "License"); you may not use this file except
~ in compliance with the License.
~ You may obtain a copy of the License at
~
~ http://www.apache.org/licenses/LICENSE-2.0
~
~ Unless required by applicable law or agreed to in writing,
~ software distributed under the License is distributed on an
~ "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
~ KIND, either express or implied. See the License for the
~ specific language governing permissions and limitations
~ under the License.
-->
<CassandraDataSinkConfiguration xmlns="http://wso2.org/carbon/cassandraDataSink">
<PersistedStreams>
<Include>*</Include>
<Exclude>rt_*</Exclude>
</PersistedStreams>
</CassandraDataSinkConfiguration>

@ -1,72 +0,0 @@
<!--
~ Copyright (c) 2015, WSO2 Inc. (http:www.wso2.org) All Rights Reserved.
~
~ WSO2 Inc. licenses this file to you under the Apache License,
~ Version 2.0 (the "License"); you may not use this file except
~ in compliance with the License.
~ You may obtain a copy of the License at
~
~ http://www.apache.org/licenses/LICENSE-2.0
~
~ Unless required by applicable law or agreed to in writing,
~ software distributed under the License is distributed on an
~ "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
~ KIND, either express or implied. See the License for the
~ specific language governing permissions and limitations
~ under the License.
-->
<dataBridgeConfiguration xmlns="http://wso2.org/carbon/databridge">
<StreamDefinitionStore>org.wso2.carbon.databridge.streamdefn.cassandra.datastore.CassandraStreamDefinitionStore</StreamDefinitionStore>
<workerThreads>10</workerThreads>
<eventBufferCapacity>10000</eventBufferCapacity>
<clientTimeoutMS>30000</clientTimeoutMS>
<keySpaceName>EVENT_KS</keySpaceName>
<!-- Default configuration for thriftDataReceiver -->
<thriftDataReceiver>
<!--<hostName>localhost</hostName>-->
<port>7611</port>
<securePort>7711</securePort>
</thriftDataReceiver>
<!--<streamDefinitions>
<streamDefinition>
{
'name':'org.wso2.esb.MediatorStatistics',
'version':'1.3.0',
'nickName': 'Stock Quote Information',
'description': 'Some Desc',
'metaData':[
{'name':'ipAdd','type':'STRING'}
],
'payloadData':[
{'name':'symbol','type':'STRING'},
{'name':'price','type':'DOUBLE'},
{'name':'volume','type':'INT'},
{'name':'max','type':'DOUBLE'},
{'name':'min','type':'Double'}
]
}
</streamDefinition>
<streamDefinition domainName="wso2">
{
'name':'org.wso2.esb.MediatorStatistics',
'version':'1.3.4',
'nickName': 'Stock Quote Information',
'description': 'Some Other Desc',
'metaData':[
{'name':'ipAdd','type':'STRING'}
],
'payloadData':[
{'name':'symbol','type':'STRING'},
{'name':'price','type':'DOUBLE'},
{'name':'volume','type':'INT'}
]
}
</streamDefinition>
</streamDefinitions>-->
</dataBridgeConfiguration>

@ -0,0 +1,23 @@
<!--
~ Copyright (c) 2005-2014, WSO2 Inc. (http://www.wso2.org) All Rights Reserved.
~
~ WSO2 Inc. licenses this file to you under the Apache License,
~ Version 2.0 (the "License"); you may not use this file except
~ in compliance with the License.
~ You may obtain a copy of the License at
~
~ http://www.apache.org/licenses/LICENSE-2.0
~
~ Unless required by applicable law or agreed to in writing,
~ software distributed under the License is distributed on an
~ "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
~ KIND, either express or implied. See the License for the
~ specific language governing permissions and limitations
~ under the License.
-->
<streamDefinitions xmlns="http://wso2.org/carbon/databridge">
</streamDefinitions>

@ -1,66 +1,44 @@
<?xml version="1.0" encoding="ISO-8859-1"?> <?xml version="1.0" encoding="ISO-8859-1"?>
<!-- <!-- ~ Copyright (c) 2005-2011, WSO2 Inc. (http://www.wso2.org) All Rights
~ Copyright (c) 2005-2011, WSO2 Inc. (http://www.wso2.org) All Rights Reserved. Reserved. ~ ~ WSO2 Inc. licenses this file to you under the Apache License,
~ ~ Version 2.0 (the "License"); you may not use this file except ~ in compliance
~ WSO2 Inc. licenses this file to you under the Apache License, with the License. ~ You may obtain a copy of the License at ~ ~ http://www.apache.org/licenses/LICENSE-2.0
~ Version 2.0 (the "License"); you may not use this file except ~ ~ Unless required by applicable law or agreed to in writing, ~ software
~ in compliance with the License. distributed under the License is distributed on an ~ "AS IS" BASIS, WITHOUT
~ You may obtain a copy of the License at WARRANTIES OR CONDITIONS OF ANY ~ KIND, either express or implied. See the
~ License for the ~ specific language governing permissions and limitations
~ http://www.apache.org/licenses/LICENSE-2.0 ~ under the License. -->
~
~ Unless required by applicable law or agreed to in writing,
~ software distributed under the License is distributed on an
~ "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
~ KIND, either express or implied. See the License for the
~ specific language governing permissions and limitations
~ under the License.
-->
<Server xmlns="http://wso2.org/projects/carbon/carbon.xml"> <Server xmlns="http://wso2.org/projects/carbon/carbon.xml">
<OpenIDServerUrl>https://localhost:9443/openidserver</OpenIDServerUrl>
<OpenIDUserPattern>https://localhost:9443/openid/</OpenIDUserPattern>
<!-- If the users must be prompted for approval -->
<OpenIDSkipUserConsent>false</OpenIDSkipUserConsent>
<!-- Expiry time of the OpenID RememberMe token in minutes -->
<OpenIDRememberMeExpiry>7200</OpenIDRememberMeExpiry>
<JDBCPersistenceManager> <JDBCPersistenceManager>
<DataSource> <DataSource>
<!-- Include a data source name (jndiConfigName) from the set of data sources defined in master-datasources.xml --> <!-- Include a data source name (jndiConfigName) from the set of data
sources defined in master-datasources.xml -->
<Name>jdbc/WSO2AM_DB</Name> <Name>jdbc/WSO2AM_DB</Name>
</DataSource> </DataSource>
<!-- If the identity database is created from another place and if it is required to skip schema initialization during the server start up, set the following <!-- If the identity database is created from another place and if it is
property to "true". --> required to skip schema initialization during the server start up, set the
<SkipDBSchemaCreation>true</SkipDBSchemaCreation> following property to "true". -->
<!-- <SkipDBSchemaCreation>false</SkipDBSchemaCreation> -->
<!--SessionDataPersist>
<Enable>true</Enable>
<EnableCleanUp>true</EnableCleanUp>
<Temporary>false</Temporary-->
<!--/SessionDataPersist-->
</JDBCPersistenceManager> </JDBCPersistenceManager>
<!-- Time configurations are in minutes -->
<TimeConfig> <TimeConfig>
<SessionIdleTimeout>120</SessionIdleTimeout><!-- Minutes --> <SessionIdleTimeout>120</SessionIdleTimeout>
<RememberMeTimeout>20160</RememberMeTimeout><!-- Minutes --> <RememberMeTimeout>20160</RememberMeTimeout>
<PersistanceCleanUpTimeout>20160</PersistanceCleanUpTimeout><!-- Minutes --> <PersistanceCleanUpTimeout>20160</PersistanceCleanUpTimeout>
<PersistanceCleanUpPeriod>1140</PersistanceCleanUpPeriod><!-- Minutes --> <PersistanceCleanUpPeriod>1140</PersistanceCleanUpPeriod>
</TimeConfig> </TimeConfig>
<!-- <!-- Security configurations -->
Security configurations
-->
<Security> <Security>
<UserTrustedRPStore> <!-- The directory under which all other KeyStore files will be stored -->
<Location>${carbon.home}/repository/resources/security/userRP.jks</Location>
<!-- Keystore type (JKS/PKCS12 etc.)-->
<Type>JKS</Type>
<!-- Keystore password-->
<Password>wso2carbon</Password>
<!-- Private Key password-->
<KeyPassword>wso2carbon</KeyPassword>
</UserTrustedRPStore>
<!--
The directory under which all other KeyStore files will be stored
-->
<KeyStoresDir>${carbon.home}/conf/keystores</KeyStoresDir> <KeyStoresDir>${carbon.home}/conf/keystores</KeyStoresDir>
</Security> </Security>
@ -76,8 +54,14 @@
</Identity> </Identity>
<OpenID> <OpenID>
<OpenIDServerUrl>https://localhost:9443/openidserver</OpenIDServerUrl> <!--
<OpenIDUserPattern>https://localhost:9443/openid/</OpenIDUserPattern> Default values for OpenIDServerUrl and OpenIDUSerPattern are built in following format
https://<HostName>:<MgtTrpProxyPort except 443>/<ProxyContextPath>/<context>
If above format doesn't satisfy uncomment the following configs and explicitly configure the values
-->
<!--OpenIDServerUrl>https://localhost:9443/openidserver</OpenIDServerUrl-->
<!--OpenIDUserPattern>https://localhost:9443/openid/</OpenIDUserPattern-->
<!-- If the users must be prompted for approval --> <!-- If the users must be prompted for approval -->
<OpenIDSkipUserConsent>false</OpenIDSkipUserConsent> <OpenIDSkipUserConsent>false</OpenIDSkipUserConsent>
<!-- Expiry time of the OpenID RememberMe token in minutes --> <!-- Expiry time of the OpenID RememberMe token in minutes -->
@ -90,7 +74,42 @@
<SessionTimeout>36000</SessionTimeout> <SessionTimeout>36000</SessionTimeout>
<!-- skips authentication if valid SAML2 Web SSO browser session available --> <!-- skips authentication if valid SAML2 Web SSO browser session available -->
<AcceptSAMLSSOLogin>false</AcceptSAMLSSOLogin> <AcceptSAMLSSOLogin>false</AcceptSAMLSSOLogin>
<ClaimsRetrieverImplClass>org.wso2.carbon.identity.provider.openid.claims.DefaultClaimsRetriever</ClaimsRetrieverImplClass> <ClaimsRetrieverImplClass>org.wso2.carbon.identity.provider.openid.claims.DefaultClaimsRetriever
</ClaimsRetrieverImplClass>
<!--
OpenID private association store is configurable from following configs.
It includes two new replication stores,
i. OpenIDServerAssociationStore (Default association store)
ii. PrivateAssociationCryptoStore
iii. PrivateAssociationReplicationStore
-->
<!-- Specify full qualified class name of the class which going to use as private association store -->
<!--
<OpenIDPrivateAssociationStoreClass>org.wso2.carbon.identity.provider.openid.PrivateAssociationCryptoStore</OpenIDPrivateAssociationStoreClass>
-->
<!-- The exiration time (in minutes) for the OpenID association -->
<!--
<OpenIDAssociationExpiryTime>15</OpenIDAssociationExpiryTime>
-->
<!-- Configs specific to PrivateAssociationCryptoStore -->
<!-- Server secret. This value should be the same in all nodes in the cluster -->
<!--
<OpenIDPrivateAssociationServerKey>qewlj324lmasc</OpenIDPrivateAssociationServerKey>
-->
<!-- Configs specific to PrivateAssociationCryptoStore -->
<!-- This enable private association cleanup task which cleans expired private associations -->
<!--
<EnableOpenIDAssociationCleanupTask>true</EnableOpenIDAssociationCleanupTask>
-->
<!-- Time Period (in minutes) that cleanup task would run -->
<!--
<OpenIDAssociationCleanupPeriod>15</OpenIDAssociationCleanupPeriod>
-->
</OpenID> </OpenID>
<OAuth> <OAuth>
@ -98,46 +117,42 @@
<AuthorizationGrantCacheTimeout>-1</AuthorizationGrantCacheTimeout> <AuthorizationGrantCacheTimeout>-1</AuthorizationGrantCacheTimeout>
<SessionDataCacheTimeout>-1</SessionDataCacheTimeout> <SessionDataCacheTimeout>-1</SessionDataCacheTimeout>
<ClaimCacheTimeout>-1</ClaimCacheTimeout> <ClaimCacheTimeout>-1</ClaimCacheTimeout>
<RequestTokenUrl>https://localhost:9443/oauth/request-token</RequestTokenUrl>
<AccessTokenUrl>https://localhost:9443/oauth/access-token</AccessTokenUrl>
<AuthorizeUrl>https://localhost:9443/oauth/authorize-url</AuthorizeUrl>
<!-- Commented whilst adding ES Features -->
<!--
<RequestTokenUrl>https://10.100.5.3:9443/oauth/request-token</RequestTokenUrl>
<AccessTokenUrl>https://10.100.5.3:9443/oauth/access-token</AccessTokenUrl>
<AuthorizeUrl>https://10.100.5.3:9443/oauth/authorize-url</AuthorizeUrl>
-->
<!--
Default values for OAuth1RequestTokenUrl, OAuth1AccessTokenUrl, OAuth1AuthorizeUrl
OAuth2AuthzEPUrl, OAuth2TokenEPUrl and OAuth2UserInfoEPUrl are built in following format
https://<HostName>:<MgtTrpProxyPort except 443>/<ProxyContextPath>/<context>/<path>
If above format doesn't satisfy uncomment the following configs and explicitly configure the values
-->
<OAuth1RequestTokenUrl>https://localhost:9443/oauth/request-token</OAuth1RequestTokenUrl>
<OAuth1AuthorizeUrl>https://localhost:9443/oauth/authorize-url</OAuth1AuthorizeUrl>
<OAuth1AccessTokenUrl>https://localhost:9443/oauth/access-token</OAuth1AccessTokenUrl>
<!--OAuth2AuthzEPUrl>https://localhost:9443/oauth2/authorize</OAuth2AuthzEPUrl-->
<!--OAuth2TokenEPUrl>https://localhost:9443/oauth2/token</OAuth2TokenEPUrl-->
<!--OAuth2UserInfoEPUrl>https://localhost:9443/oauth2/userinfo</OAuth2UserInfoEPUrl-->
<!-- Default validity period for Authorization Code in seconds --> <!-- Default validity period for Authorization Code in seconds -->
<AuthorizationCodeDefaultValidityPeriod>300</AuthorizationCodeDefaultValidityPeriod> <AuthorizationCodeDefaultValidityPeriod>300</AuthorizationCodeDefaultValidityPeriod>
<!-- Default validity period for Access Token in seconds --> <!-- Default validity period for application access tokens in seconds -->
<AccessTokenDefaultValidityPeriod>3600</AccessTokenDefaultValidityPeriod> <AccessTokenDefaultValidityPeriod>3600</AccessTokenDefaultValidityPeriod>
<!-- Default validity period for Application Access Token in seconds-If want to set this as never expired,set the value as <0 --> <!-- Default validity period for user access tokens in seconds -->
<ApplicationAccessTokenDefaultValidityPeriod>3600</ApplicationAccessTokenDefaultValidityPeriod>
<!-- Default validity period for User Access Token in seconds-->
<UserAccessTokenDefaultValidityPeriod>3600</UserAccessTokenDefaultValidityPeriod> <UserAccessTokenDefaultValidityPeriod>3600</UserAccessTokenDefaultValidityPeriod>
<!-- Validity period for refresh token --> <!-- Validity period for refresh token -->
<RefreshTokenValidityPeriod>84600</RefreshTokenValidityPeriod> <RefreshTokenValidityPeriod>84600</RefreshTokenValidityPeriod>
<!-- Timestamp skew in seconds --> <!-- Timestamp skew in seconds -->
<TimestampSkew>300</TimestampSkew> <TimestampSkew>300</TimestampSkew>
<!-- Enable OAuth caching. This cache has the replication support. --> <!-- Enable OAuth caching -->
<EnableOAuthCache>true</EnableOAuthCache> <EnableOAuthCache>true</EnableOAuthCache>
<!-- Enable renewal of refresh token for refresh_token grant --> <!-- Enable renewal of refresh token for refresh_token grant -->
<RenewRefreshTokenForRefreshGrant>true</RenewRefreshTokenForRefreshGrant> <RenewRefreshTokenForRefreshGrant>true</RenewRefreshTokenForRefreshGrant>
<!-- Process the token before storing it in database, e.g. encrypting --> <!-- Process the token before storing it in database, e.g. encrypting -->
<TokenPersistenceProcessor>org.wso2.carbon.identity.oauth.tokenprocessor.PlainTextPersistenceProcessor</TokenPersistenceProcessor> <TokenPersistenceProcessor>org.wso2.carbon.identity.oauth.tokenprocessor.PlainTextPersistenceProcessor</TokenPersistenceProcessor>
<!-- Supported Client Autnetication Methods --> <!-- Supported Client Authentication Methods -->
<ClientAuthHandlers> <ClientAuthHandlers>
<ClientAuthHandler Class="org.wso2.carbon.identity.oauth2.token.handlers.clientauth.BasicAuthClientAuthHandler"> <ClientAuthHandler Class="org.wso2.carbon.identity.oauth2.token.handlers.clientauth.BasicAuthClientAuthHandler">
<Property Name="StrictClientCredentialValidation">false</Property> <Property Name="StrictClientCredentialValidation">false</Property>
</ClientAuthHandler> </ClientAuthHandler>
</ClientAuthHandlers> </ClientAuthHandlers>
<!--TokenPersistenceProcessor>
org.wso2.carbon.identity.oauth.tokenprocessor.EncryptionDecryptionPersistenceProcessor
</TokenPersistenceProcessor-->
<!-- Supported Response Types --> <!-- Supported Response Types -->
<SupportedResponseTypes> <SupportedResponseTypes>
<SupportedResponseType> <SupportedResponseType>
@ -157,8 +172,7 @@
</SupportedGrantType> </SupportedGrantType>
<SupportedGrantType> <SupportedGrantType>
<GrantTypeName>password</GrantTypeName> <GrantTypeName>password</GrantTypeName>
<!-- Was found in file whilst adding ES Features --> <!-- <GrantTypeHandlerImplClass>org.wso2.carbon.identity.oauth2.token.handlers.grant.PasswordGrantHandler</GrantTypeHandlerImplClass> -->
<!-- <GrantTypeHandlerImplClass>org.wso2.carbon.identity.oauth2.token.handlers.grant.PasswordGrantHandler</GrantTypeHandlerImplClass> -->
<GrantTypeHandlerImplClass>org.wso2.carbon.apimgt.keymgt.handlers.ExtendedPasswordGrantHandler</GrantTypeHandlerImplClass> <GrantTypeHandlerImplClass>org.wso2.carbon.apimgt.keymgt.handlers.ExtendedPasswordGrantHandler</GrantTypeHandlerImplClass>
</SupportedGrantType> </SupportedGrantType>
<SupportedGrantType> <SupportedGrantType>
@ -184,48 +198,39 @@
<!--TokenValidators> <!--TokenValidators>
<TokenValidator type="bearer" class="org.wso2.carbon.identity.oauth2.validators.DefaultOAuth2TokenValidator"/> <TokenValidator type="bearer" class="org.wso2.carbon.identity.oauth2.validators.DefaultOAuth2TokenValidator"/>
</TokenValidators--> </TokenValidators-->
<!-- Assertions can be used to embedd parameters into access token. -->
<EnableAssertions>
<UserName>false</UserName>
</EnableAssertions>
<!-- Add custom user headers to the response--> <!-- This should be set to true when using multiple user stores and keys
<!--<RequiredRespHeaderClaimUris> should saved into different tables according to the user store. By default
<ClaimUri>http://wso2.org/claims/emailaddress</ClaimUri> all the application keys are saved in to the same table. UserName Assertion
<ClaimUri>http://wso2.org/claims/gender</ClaimUri> should be 'true' to use this. -->
</RequiredRespHeaderClaimUris>--> <EnableAccessTokenPartitioning>false</EnableAccessTokenPartitioning>
<!-- user store domain names and mapping to new table name. eg: if you
<!-- Enable/Disable OAuth Caching--> provide 'A:foo.com', foo.com should be the user store domain name and 'A'
<!--<EnableCache>true</EnableCache>--> represent the relavant mapping of token store table, i.e. tokens will be
added to a table called IDN_OAUTH2_ACCESS_TOKEN_A. -->
<!-- Assertions can be used to embedd parameters into access token.--> <AccessTokenPartitioningDomains><!-- A:foo.com, B:bar.com --></AccessTokenPartitioningDomains>
<EnableAssertions> <AuthorizationContextTokenGeneration>
<UserName>false</UserName> <Enabled>false</Enabled>
</EnableAssertions> <TokenGeneratorImplClass>org.wso2.carbon.identity.oauth2.authcontext.JWTTokenGenerator</TokenGeneratorImplClass>
<ClaimsRetrieverImplClass>org.wso2.carbon.identity.oauth2.authcontext.DefaultClaimsRetriever</ClaimsRetrieverImplClass>
<!-- This should be set to true when using multiple user stores and keys should saved <ConsumerDialectURI>http://wso2.org/claims</ConsumerDialectURI>
into different tables according to the user store. By default all the application keys are saved in to the same table. <SignatureAlgorithm>SHA256withRSA</SignatureAlgorithm>
UserName Assertion should be 'true' to use this.--> <AuthorizationContextTTL>15</AuthorizationContextTTL>
<EnableAccessTokenPartitioning>false</EnableAccessTokenPartitioning> </AuthorizationContextTokenGeneration>
<!-- user store domain names and mappings to new table names.
eg: if you provide 'A:foo.com', foo.com should be the user store domain name and 'A' represent the relavant mapping of
token storing table, i.e. tokens relevant to the users comming from foo.com user store will be added to a table called
IDN_OAUTH2_ACCESS_TOKEN_A. -->
<AccessTokenPartitioningDomains><!-- A:foo.com, B:bar.com --></AccessTokenPartitioningDomains>
<AuthorizationContextTokenGeneration>
<Enabled>false</Enabled>
<TokenGeneratorImplClass>org.wso2.carbon.identity.oauth2.authcontext.JWTTokenGenerator</TokenGeneratorImplClass>
<ClaimsRetrieverImplClass>org.wso2.carbon.identity.oauth2.authcontext.DefaultClaimsRetriever</ClaimsRetrieverImplClass>
<ConsumerDialectURI>http://wso2.org/claims</ConsumerDialectURI>
<SignatureAlgorithm>SHA256withRSA</SignatureAlgorithm>
<AuthorizationContextTTL>15</AuthorizationContextTTL>
</AuthorizationContextTokenGeneration>
<SAML2Grant> <SAML2Grant>
<!--SAML2TokenHandler></SAML2TokenHandler--> <!--SAML2TokenHandler></SAML2TokenHandler-->
</SAML2Grant> </SAML2Grant>
<OpenIDConnect>
<OpenIDConnect>
<IDTokenBuilder>org.wso2.carbon.identity.openidconnect.DefaultIDTokenBuilder</IDTokenBuilder> <IDTokenBuilder>org.wso2.carbon.identity.openidconnect.DefaultIDTokenBuilder</IDTokenBuilder>
<IDTokenIssuerID>https://localhost:9443/oauth2endpoints/token</IDTokenIssuerID> <!--
Default value for IDTokenIssuerID, is OAuth2TokenEPUrl.
If that doesn't satisfy uncomment the following config and explicitly configure the value
-->
<!--IDTokenIssuerID>https://localhost:9443/oauth2/token</IDTokenIssuerID-->
<IDTokenSubjectClaim>http://wso2.org/claims/givenname</IDTokenSubjectClaim> <IDTokenSubjectClaim>http://wso2.org/claims/givenname</IDTokenSubjectClaim>
<IDTokenCustomClaimsCallBackHandler>org.wso2.carbon.identity.openidconnect.SAMLAssertionClaimsCallback</IDTokenCustomClaimsCallBackHandler> <IDTokenCustomClaimsCallBackHandler>org.wso2.carbon.identity.openidconnect.SAMLAssertionClaimsCallback</IDTokenCustomClaimsCallBackHandler>
<IDTokenExpiration>3600</IDTokenExpiration> <IDTokenExpiration>3600</IDTokenExpiration>
@ -239,6 +244,7 @@
</OAuth> </OAuth>
<MultifactorAuthentication> <MultifactorAuthentication>
<!--Enable>false</Enable-->
<XMPPSettings> <XMPPSettings>
<XMPPConfig> <XMPPConfig>
<XMPPProvider>gtalk</XMPPProvider> <XMPPProvider>gtalk</XMPPProvider>
@ -255,11 +261,18 @@
<PersistanceCacheTimeout>157680000</PersistanceCacheTimeout> <PersistanceCacheTimeout>157680000</PersistanceCacheTimeout>
<SessionIndexCacheTimeout>157680000</SessionIndexCacheTimeout> <SessionIndexCacheTimeout>157680000</SessionIndexCacheTimeout>
<EntityId>localhost</EntityId> <EntityId>localhost</EntityId>
<IdentityProviderURL>https://localhost:9443/samlsso</IdentityProviderURL> <!--
Default value for IdentityProviderURL is built in following format
https://<HostName>:<MgtTrpProxyPort except 443>/<ProxyContextPath>/samlsso
If that doesn't satisfy uncomment the following config and explicitly configure the value
-->
<!--IdentityProviderURL>https://localhost:9443/samlsso</IdentityProviderURL-->
<SingleLogoutRetryCount>5</SingleLogoutRetryCount> <SingleLogoutRetryCount>5</SingleLogoutRetryCount>
<SingleLogoutRetryInterval>60000</SingleLogoutRetryInterval> <!-- in milli seconds --> <SingleLogoutRetryInterval>60000</SingleLogoutRetryInterval>
<!-- in milli seconds -->
<TenantPartitioningEnabled>false</TenantPartitioningEnabled> <TenantPartitioningEnabled>false</TenantPartitioningEnabled>
<SessionTimeout>36000</SessionTimeout> <!-- remember me session timeout in seconds --> <SessionTimeout>36000</SessionTimeout>
<!-- remember me session timeout in seconds -->
<!-- skips authentication if valid SAML2 Web SSO browser session available --> <!-- skips authentication if valid SAML2 Web SSO browser session available -->
<AttributeStatementBuilder>org.wso2.carbon.identity.sso.saml.attributes.UserAttributeStatementBuilder</AttributeStatementBuilder> <AttributeStatementBuilder>org.wso2.carbon.identity.sso.saml.attributes.UserAttributeStatementBuilder</AttributeStatementBuilder>
<AttributesClaimDialect>http://wso2.org/claims</AttributesClaimDialect> <AttributesClaimDialect>http://wso2.org/claims</AttributesClaimDialect>
@ -276,12 +289,28 @@
<UseAuthenticatedUserDomainCrypto>false</UseAuthenticatedUserDomainCrypto> <UseAuthenticatedUserDomainCrypto>false</UseAuthenticatedUserDomainCrypto>
</SSOService> </SSOService>
<SecurityTokenService>
<!--
Default value for IdentityProviderURL is built in following format
https://<HostName>:<MgtTrpProxyPort except 443>/<ProxyContextPath>/services/wso2carbon-sts
If that doesn't satisfy uncomment the following config and explicitly configure the value
-->
<!--IdentityProviderURL>https://localhost:9443/services/wso2carbon-sts</IdentityProviderURL-->
</SecurityTokenService>
<PassiveSTS>
<!--
Default value for IdentityProviderURL is built in following format
https://<HostName>:<MgtTrpProxyPort except 443>/<ProxyContextPath>/passivests
If that doesn't satisfy uncomment the following config and explicitly configure the value
-->
<!--IdentityProviderURL>https://localhost:9443/passivests</IdentityProviderURL-->
</PassiveSTS>
<EntitlementSettings> <EntitlementSettings>
<!-- Uncomment this to enable on-demand policy loading --> <!-- Uncomment this to enable on-demand policy loading -->
<!--OnDemandPolicyLoading> <!--OnDemandPolicyLoading> <Enable>true</Enable> <MaxInMemoryPolicies>100</MaxInMemoryPolicies>
<Enable>true</Enable> </OnDemandPolicyLoading -->
<MaxInMemoryPolicies>100</MaxInMemoryPolicies>
</OnDemandPolicyLoading-->
<DecisionCaching> <DecisionCaching>
<Enable>true</Enable> <Enable>true</Enable>
<CachingInterval>36000</CachingInterval> <CachingInterval>36000</CachingInterval>
@ -290,7 +319,7 @@
<Enable>true</Enable> <Enable>true</Enable>
</AttributeCaching> </AttributeCaching>
<ThirftBasedEntitlementConfig> <ThirftBasedEntitlementConfig>
<EnableThriftService>true</EnableThriftService> <EnableThriftService>false</EnableThriftService>
<ReceivePort>${Ports.ThriftEntitlementReceivePort}</ReceivePort> <ReceivePort>${Ports.ThriftEntitlementReceivePort}</ReceivePort>
<ClientTimeout>10000</ClientTimeout> <ClientTimeout>10000</ClientTimeout>
<KeyStore> <KeyStore>
@ -302,23 +331,42 @@
</ThirftBasedEntitlementConfig> </ThirftBasedEntitlementConfig>
</EntitlementSettings> </EntitlementSettings>
<SCIMAuthenticators> <SCIM>
<Authenticator class="org.wso2.carbon.identity.scim.provider.auth.BasicAuthHandler"> <!--
<Property name="Priority">5</Property> Default value for UserEPUrl and GroupEPUrl are built in following format
</Authenticator> https://<HostName>:<MgtTrpProxyPort except 443>/<ProxyContextPath>/<context>/<path>
<Authenticator class="org.wso2.carbon.identity.scim.provider.auth.OAuthHandler"> If that doesn't satisfy uncomment the following config and explicitly configure the value
<Property name="Priority">10</Property> -->
<Property name="AuthorizationServer">local://services</Property> <!--UserEPUrl>https://localhost:9443/wso2/scim/Users</UserEPUrl-->
<!--Property name="AuthorizationServer">https://localhost:9443/services</Property> <!--GroupEPUrl>https://localhost:9443/wso2/scim/Groups</GroupEPUrl-->
<Property name="UserName">admin</Property> <SCIMAuthenticators>
<Property name="Password">admin</Property--> <Authenticator class="org.wso2.carbon.identity.scim.provider.auth.BasicAuthHandler">
</Authenticator> <Property name="Priority">5</Property>
</SCIMAuthenticators> </Authenticator>
<Authenticator class="org.wso2.carbon.identity.scim.provider.auth.OAuthHandler">
<Property name="Priority">10</Property>
<Property name="AuthorizationServer">local://services</Property>
<!--Property name="AuthorizationServer">https://localhost:9443/services</Property>
<Property name="UserName">admin</Property>
<Property name="Password">admin</Property-->
</Authenticator>
</SCIMAuthenticators>
</SCIM>
<!--SessionContextCache> <!--SessionContextCache>
<Enable>true</Enable> <Enable>true</Enable>
<Capacity>100000</Capacity> <Capacity>100000</Capacity>
</SessionContextCache--> </SessionContextCache-->
<!--To do OSGI invocations to OAuth2Service,when the entire server is in one JVM --> <EventListeners>
<SeparateBackEnd>false</SeparateBackEnd> <EventListener type="org.wso2.carbon.user.core.listener.UserOperationEventListener"
name="org.wso2.carbon.identity.workflow.mgt.impl.userstore.UserStoreActionListener"
orderId="10" enable="false"/>
<EventListener type="org.wso2.carbon.user.core.listener.UserOperationEventListener" name="org.wso2.carbon.identity.mgt.IdentityMgtEventListener"
orderId="50" enable="false"/>
<EventListener type="org.wso2.carbon.user.core.listener.UserOperationEventListener" name="org.wso2.carbon.identity.oauth.listener.IdentityOathEventListener"
orderId="60" enable="false"/>
<EventListener type="org.wso2.carbon.user.core.listener.UserOperationEventListener" name="org.wso2.carbon.identity.provider.openid.listener.IdentityOpenIDUserEventListener"
orderId="70" enable="false"/>
</EventListeners>
</Server> </Server>

@ -17,7 +17,7 @@
--> -->
<!-- The contents of this file will be loaded for each web application --> <!-- The contents of this file will be loaded for each web application -->
<Context crossContext="true"> <Context crossContext="true">
<!-- Default set of monitored resources --> <!-- Default set of monitored resources -->
@ -34,17 +34,40 @@
<!-- <!--
<Valve className="org.apache.catalina.valves.CometConnectionManagerValve" /> <Valve className="org.apache.catalina.valves.CometConnectionManagerValve" />
--> -->
<!-- APIPublisherLifecycleListener listens to webapp deployment events and publish JAX-RS services packaged into each of the aforesaid <!-- APIPublisherLifecycleListener listens to webapp deployment events and publish JAX-RS services packaged into each of the aforesaid
web applications that are configured to be made available as 'Managed APIs'. Given below are the parameters that need to be congigured web applications that are configured to be made available as 'Managed APIs'. Given below are the parameters that need to be congigured
in the form of 'context-param's in web.xml of each applicable web application. in the form of 'context-param's in web.xml of each applicable web application.
'managed-api-enabled' - Indicates that the web application being processed needs to be published as a 'Managed API'. 'managed-api-enabled' - Indicates that the web application being processed needs to be published as a 'Managed API'.
'managed-api-context' - Context of the 'Managed API'. 'managed-api-context' - Context of the 'Managed API'.
'managed-api-version' - Version of the 'Managed API'. 'managed-api-version' - Version of the 'Managed API'.
'managed-api-owner' - Owner of the 'Managed API'. 'managed-api-owner' - Owner of the 'Managed API'.
'managed-api-isSecured' - Indicates if the 'Managed API' needs to be exposed over a secured channel. 'managed-api-isSecured' - Indicates if the 'Managed API' needs to be exposed over a secured channel.
'managed-api-transports' - Transports through which the 'Managed API' is exposed. 'managed-api-transports' - Transports through which the 'Managed API' is exposed.
--> -->
<Listener className="org.wso2.carbon.apimgt.webapp.publisher.lifecycle.listener.APIPublisherLifecycleListener"/> <Listener className="org.wso2.carbon.apimgt.webapp.publisher.lifecycle.listener.APIPublisherLifecycleListener"/>
</Context>
<!-- WebAppDeploymentLifecycleListener listens to webapp deployment events and adds the custom permissions defined in webapps'
META-INF/permissions.xml to the permissions/admin section of registry. Given below is a sample of permissions.xml file.
<PermissionConfiguration>
<Permission>
<name>Device Management</name>
<path>/device-mgt</path>
</Permission>
<Permission>
<name>Administrator</name>
<path>/device-mgt/admin</path>
</Permission>
<Permission>
<name>Dashboard</name>
<path>/device-mgt/admin/dashboard</path>
</Permission>
<Permission>
<name>Lock</name>
<path>/device-mgt/admin/operation/lock</path>
</Permission>
</PermissionConfiguration>
-->
<Listener className="org.wso2.carbon.device.mgt.core.config.permission.lifecycle.WebAppDeploymentLifecycleListener"/>
</Context>

@ -0,0 +1,144 @@
<?xml version="1.0" encoding="utf-8"?>
<!--
~ Copyright (c) 2014, WSO2 Inc. (http://www.wso2.org) All Rights Reserved.
~
~ WSO2 Inc. licenses this file to you under the Apache License,
~ Version 2.0 (the "License"); you may not use this file except
~ in compliance with the License.
~ You may obtain a copy of the License at
~
~ http://www.apache.org/licenses/LICENSE-2.0
~
~ Unless required by applicable law or agreed to in writing,
~ software distributed under the License is distributed on an
~ "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
~ KIND, either express or implied. See the License for the
~ specific language governing permissions and limitations
~ under the License.
-->
<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/maven-v4_0_0.xsd">
<parent>
<groupId>org.wso2.iot</groupId>
<artifactId>wso2iot-parent</artifactId>
<version>1.0.0-SNAPSHOT</version>
<relativePath>../../pom.xml</relativePath>
</parent>
<modelVersion>4.0.0</modelVersion>
<artifactId>org.wso2.carbon.device.mgt.iot.util.feature</artifactId>
<version>1.0.0-SNAPSHOT</version>
<packaging>pom</packaging>
<name>WSO2 IoT Server - Util Featue</name>
<description>WSO2 IoT Server Util Feature</description>
<dependencies>
<dependency>
<groupId>org.wso2.carbon.device.mgt.iot</groupId>
<artifactId>org.wso2.carbon.device.mgt.iot.common</artifactId>
</dependency>
<dependency>
<groupId>org.wso2.carbon.device.mgt.iot</groupId>
<artifactId>org.wso2.carbon.device.mgt.iot.common.api</artifactId>
<type>war</type>
</dependency>
<dependency>
<groupId>org.json.wso2</groupId>
<artifactId>json</artifactId>
</dependency>
</dependencies>
<build>
<plugins>
<plugin>
<artifactId>maven-resources-plugin</artifactId>
<executions>
<execution>
<id>copy-resources</id>
<phase>generate-resources</phase>
<goals>
<goal>copy-resources</goal>
</goals>
<configuration>
<outputDirectory>src/main/resources</outputDirectory>
<resources>
<resource>
<directory>resources</directory>
<includes>
<include>build.properties</include>
<include>p2.inf</include>
</includes>
</resource>
</resources>
</configuration>
</execution>
</executions>
</plugin>
<plugin>
<groupId>org.apache.maven.plugins</groupId>
<artifactId>maven-dependency-plugin</artifactId>
<executions>
<execution>
<id>copy</id>
<phase>package</phase>
<goals>
<goal>copy</goal>
</goals>
<configuration>
<artifactItems>
<artifactItem>
<groupId>org.wso2.carbon.device.mgt.iot</groupId>
<artifactId>org.wso2.carbon.device.mgt.iot.common.api</artifactId>
<type>war</type>
<overWrite>true</overWrite>
<outputDirectory>${basedir}/src/main/resources/webapps/</outputDirectory>
<destFileName>common.war</destFileName>
</artifactItem>
</artifactItems>
</configuration>
</execution>
</executions>
</plugin>
<plugin>
<groupId>org.wso2.maven</groupId>
<artifactId>carbon-p2-plugin</artifactId>
<executions>
<execution>
<id>p2-feature-generation</id>
<phase>package</phase>
<goals>
<goal>p2-feature-gen</goal>
</goals>
<configuration>
<id>org.wso2.carbon.device.mgt.iot</id>
<propertiesFile>../../../features/etc/feature.properties</propertiesFile>
<adviceFile>
<properties>
<propertyDef>org.wso2.carbon.p2.category.type:server</propertyDef>
<propertyDef>org.eclipse.equinox.p2.type.group:false</propertyDef>
</properties>
</adviceFile>
<bundles>
<bundleDef>
org.wso2.carbon.device.mgt.iot:org.wso2.carbon.device.mgt.iot.common:${carbon.iot.device.mgt.version}
</bundleDef>
<bundleDef>
org.wso2.carbon.devicemgt:org.wso2.carbon.device.mgt.common:${carbon.device.mgt.version}
</bundleDef>
<bundleDef>
org.json.wso2:json:${commons-json.version}
</bundleDef>
</bundles>
</configuration>
</execution>
</executions>
</plugin>
</plugins>
</build>
</project>

@ -125,10 +125,9 @@
<featureArtifactDef> <featureArtifactDef>
org.wso2.carbon.devicemgt:org.wso2.carbon.device.mgt.group.server.feature:${carbon.device.mgt.version} org.wso2.carbon.devicemgt:org.wso2.carbon.device.mgt.group.server.feature:${carbon.device.mgt.version}
</featureArtifactDef> </featureArtifactDef>
<!-- TODO: Verify this feature is needed --> <featureArtifactDef>
<!--<featureArtifactDef>--> org.wso2.carbon.devicemgt:org.wso2.carbon.webapp.authenticator.framework.server.feature:${carbon.device.mgt.version}
<!--org.wso2.carbon.devicemgt:org.wso2.carbon.webapp.authenticator.framework.server.feature:${carbon.device.mgt.version}--> </featureArtifactDef>
<!--</featureArtifactDef>-->
<!-- End of Device Management Features --> <!-- End of Device Management Features -->
<!-- Jaggery Features --> <!-- Jaggery Features -->
@ -150,10 +149,9 @@
<featureArtifactDef> <featureArtifactDef>
org.jaggeryjs.modules:jaggery-test.feature:${jaggery.extensions.test.version} org.jaggeryjs.modules:jaggery-test.feature:${jaggery.extensions.test.version}
</featureArtifactDef> </featureArtifactDef>
<!-- TODO: Verify this feature is needed --> <featureArtifactDef>
<!--<featureArtifactDef>--> org.jaggeryjs.modules:i18n.feature:${jaggery.extensions.version}
<!--org.jaggeryjs.modules:i18n.feature:${jaggery.extensions.version}--> </featureArtifactDef>
<!--</featureArtifactDef>-->
<!-- End of Jaggery Features --> <!-- End of Jaggery Features -->
<!-- Carbon Deployment Features --> <!-- Carbon Deployment Features -->
@ -245,9 +243,6 @@
<featureArtifactDef> <featureArtifactDef>
org.wso2.carbon.identity:org.wso2.carbon.identity.authenticator.saml2.sso.ui.feature:${carbon.identity.version} org.wso2.carbon.identity:org.wso2.carbon.identity.authenticator.saml2.sso.ui.feature:${carbon.identity.version}
</featureArtifactDef> </featureArtifactDef>
<feaureArtifactDef>
org.wso2.carbon.identity:org.wso2.carbon.identity.sso.saml.feature:${carbon.identity.version}
</feaureArtifactDef>
<!--<feaureArtifactDef>--> <!--<feaureArtifactDef>-->
<!--org.wso2.carbon:org.wso2.stratos.identity.saml2.sso.mgt.feature:${carbon.identity.version}--> <!--org.wso2.carbon:org.wso2.stratos.identity.saml2.sso.mgt.feature:${carbon.identity.version}-->
<!--</feaureArtifactDef>--> <!--</feaureArtifactDef>-->
@ -257,6 +252,9 @@
<featureArtifactDef> <featureArtifactDef>
org.wso2.carbon.identity:org.wso2.carbon.claim.mgt.feature:${carbon.identity.version} org.wso2.carbon.identity:org.wso2.carbon.claim.mgt.feature:${carbon.identity.version}
</featureArtifactDef> </featureArtifactDef>
<featureArtifactDef>
org.wso2.carbon.identity:org.wso2.carbon.identity.notification.mgt.feature:${carbon.identity.version}
</featureArtifactDef>
<!--<featureArtifactDef>--> <!--<featureArtifactDef>-->
<!--org.wso2.carbon:org.wso2.carbon.identity.user.profile.server.feature:${carbon.identity.version}--> <!--org.wso2.carbon:org.wso2.carbon.identity.user.profile.server.feature:${carbon.identity.version}-->
<!--</featureArtifactDef>--> <!--</featureArtifactDef>-->
@ -285,6 +283,10 @@
<featureArtifactDef> <featureArtifactDef>
org.wso2.carbon.identity:org.wso2.carbon.identity.application.mgt.feature:${carbon.identity.version} org.wso2.carbon.identity:org.wso2.carbon.identity.application.mgt.feature:${carbon.identity.version}
</featureArtifactDef> </featureArtifactDef>
<!-- Directory server related features -->
<featureArtifactDef>
org.wso2.carbon.identity:org.wso2.carbon.directory.service.mgr.feature:${carbon.identity.version}
</featureArtifactDef>
<!-- TODO: Verify this feature is needed --> <!-- TODO: Verify this feature is needed -->
<featureArtifactDef> <featureArtifactDef>
org.wso2.carbon.identity:org.wso2.carbon.claim.mgt.server.feature:${carbon.identity.version} org.wso2.carbon.identity:org.wso2.carbon.claim.mgt.server.feature:${carbon.identity.version}
@ -294,7 +296,7 @@
org.wso2.carbon.identity:org.wso2.carbon.identity.core.feature:${carbon.identity.version} org.wso2.carbon.identity:org.wso2.carbon.identity.core.feature:${carbon.identity.version}
</feaureArtifactDef> </feaureArtifactDef>
<featureArtifactDef> <featureArtifactDef>
org.wso2.carbon.identity:org.wso2.carbon.identity.self.registration.server.feature:${carbon.identity.version} org.wso2.carbon.identity:org.wso2.carbon.identity.user.registration.server.feature:${carbon.identity.version}
</featureArtifactDef> </featureArtifactDef>
<featureArtifactDef> <featureArtifactDef>
org.wso2.carbon.identity:org.wso2.carbon.um.ws.service.server.feature:${carbon.identity.version} org.wso2.carbon.identity:org.wso2.carbon.um.ws.service.server.feature:${carbon.identity.version}
@ -305,9 +307,9 @@
<featureArtifactDef> <featureArtifactDef>
org.wso2.carbon.identity:org.wso2.carbon.identity.provider.server.feature:${carbon.identity.version} org.wso2.carbon.identity:org.wso2.carbon.identity.provider.server.feature:${carbon.identity.version}
</featureArtifactDef> </featureArtifactDef>
<featureArtifactDef> <!--<featureArtifactDef>-->
org.wso2.carbon.identity:org.wso2.carbon.identity.relying.party.server.feature:${carbon.identity.version} <!--org.wso2.carbon.identity:org.wso2.carbon.identity.relying.party.server.feature:${carbon.identity.version}-->
</featureArtifactDef> <!--</featureArtifactDef>-->
<featureArtifactDef> <featureArtifactDef>
org.wso2.carbon.identity:org.wso2.carbon.um.ws.service.client.feature:${carbon.identity.version} org.wso2.carbon.identity:org.wso2.carbon.um.ws.service.client.feature:${carbon.identity.version}
</featureArtifactDef> </featureArtifactDef>
@ -428,9 +430,9 @@
<featureArtifactDef> <featureArtifactDef>
org.wso2.carbon.deployment:org.wso2.carbon.module.mgt.server.feature:${carbon.deployment.version} org.wso2.carbon.deployment:org.wso2.carbon.module.mgt.server.feature:${carbon.deployment.version}
</featureArtifactDef> </featureArtifactDef>
<featureArtifactDef> <!--<featureArtifactDef>-->
org.wso2.carbon.deployment:org.wso2.carbon.webapp.mgt.server.feature:${carbon.deployment.version} <!--org.wso2.carbon.deployment:org.wso2.carbon.webapp.mgt.server.feature:${carbon.deployment.version}-->
</featureArtifactDef> <!--</featureArtifactDef>-->
<!--+++++++++++++++++++++++++++++++++++++++++++++++--> <!--+++++++++++++++++++++++++++++++++++++++++++++++-->
<!-- End of Carbon Deployment Features --> <!-- End of Carbon Deployment Features -->
@ -585,9 +587,9 @@
</featureArtifactDef> </featureArtifactDef>
<!--added das features--> <!--added das features-->
<featureArtifactDef> <!--<featureArtifactDef>-->
org.wso2.carbon.analytics:org.wso2.carbon.analytics.lite.feature:${carbon.analytics.version} <!--org.wso2.carbon.analytics:org.wso2.carbon.analytics.lite.feature:${carbon.analytics.version}-->
</featureArtifactDef> <!--</featureArtifactDef>-->
<!--APIM feature--> <!--APIM feature-->
<featureArtifactDef> <featureArtifactDef>
@ -600,6 +602,108 @@
<!--org.wso2.carbon.mediation:org.wso2.carbon.mediation.initializer.feature:${carbon.mediation.version}--> <!--org.wso2.carbon.mediation:org.wso2.carbon.mediation.initializer.feature:${carbon.mediation.version}-->
<!--</featureArtifactDef>--> <!--</featureArtifactDef>-->
<!--End of APIM Feature--> <!--End of APIM Feature-->
<!--DAS Feature-->
<!--START - Analytics Features -->
<featureArtifactDef>
org.wso2.carbon.analytics:org.wso2.carbon.analytics.core.feature:${carbon.analytics.version}
</featureArtifactDef>
<featureArtifactDef>
org.wso2.carbon.analytics:org.wso2.carbon.analytics.datasource.feature:${carbon.analytics.version}
</featureArtifactDef>
<featureArtifactDef>
org.wso2.carbon.analytics:org.wso2.carbon.analytics.spark.feature:${carbon.analytics.version}
</featureArtifactDef>
<featureArtifactDef>
org.wso2.carbon.analytics:org.wso2.carbon.analytics.api.feature:${carbon.analytics.version}
</featureArtifactDef>
<featureArtifactDef>
org.wso2.carbon.analytics-common:org.wso2.carbon.spark.commons.feature:${carbon.analytics.common.version}
</featureArtifactDef>
<featureArtifactDef>
org.wso2.carbon.analytics:org.wso2.carbon.analytics.messageconsole.feature:${carbon.analytics.version}
</featureArtifactDef>
<!-- END - Analytics features -->
<!-- ************** START - Capp Management ********* -->
<featureArtifactDef>
org.wso2.carbon.commons:org.wso2.carbon.application.mgt.feature:${carbon.commons.version}
</featureArtifactDef>
<!-- ************** END - Capp Management ********* -->
<!-- ************** START - Data Bridge ************ -->
<featureArtifactDef>
org.wso2.carbon.analytics-common:org.wso2.carbon.databridge.datareceiver.feature:${carbon.analytics.common.version}
</featureArtifactDef>
<featureArtifactDef>
org.wso2.carbon.analytics-common:org.wso2.carbon.databridge.streamdefn.filesystem.server.feature:${carbon.analytics.common.version}
</featureArtifactDef>
<featureArtifactDef>
org.wso2.carbon.analytics-common:org.wso2.carbon.databridge.datapublisher.feature:${carbon.analytics.common.version}
</featureArtifactDef>
<featureArtifactDef>
org.wso2.carbon.analytics:org.wso2.carbon.analytics.eventsink.feature:${carbon.analytics.version}
</featureArtifactDef>
<featureArtifactDef>
org.wso2.carbon.analytics:org.wso2.carbon.analytics.eventtable.feature:${carbon.analytics.version}
</featureArtifactDef>
<!-- ************** END - Data Bridge ************ -->
<!-- ************** START - EVENT PROCESSING FEATURES *********** -->
<featureArtifactDef>
org.wso2.carbon.analytics-common:org.wso2.carbon.event.receiver.feature:${carbon.analytics.common.version}
</featureArtifactDef>
<featureArtifactDef>
org.wso2.carbon.analytics-common:org.wso2.carbon.event.publisher.feature:${carbon.analytics.common.version}
</featureArtifactDef>
<featureArtifactDef>
org.wso2.carbon.event-processing:org.wso2.carbon.event.processor.feature:${carbon.event-processing.version}
</featureArtifactDef>
<featureArtifactDef>
org.wso2.carbon.analytics-common:org.wso2.carbon.event.tracer.feature:${carbon.analytics.common.version}
</featureArtifactDef>
<featureArtifactDef>
org.wso2.carbon.event-processing:org.wso2.carbon.event.flow.feature:${carbon.event-processing.version}
</featureArtifactDef>
<featureArtifactDef>
org.wso2.carbon.analytics-common:org.wso2.carbon.event.statistics.feature:${carbon.analytics.common.version}
</featureArtifactDef>
<featureArtifactDef>
org.wso2.carbon.analytics-common:org.wso2.carbon.event.stream.feature:${carbon.analytics.common.version}
</featureArtifactDef>
<featureArtifactDef>
org.wso2.carbon.event-processing:org.wso2.carbon.event.simulator.feature:${carbon.event-processing.version}
</featureArtifactDef>
<featureArtifactDef>
org.wso2.carbon.analytics-common:org.wso2.carbon.event.application.deployer.feature:${carbon.analytics.common.version}
</featureArtifactDef>
<featureArtifactDef>
org.wso2.carbon.analytics-common:org.wso2.carbon.event.processor.manager.core.feature:${carbon.analytics.common.version}
</featureArtifactDef>
<featureArtifactDef>
org.wso2.carbon.analytics-common:org.wso2.carbon.event.processor.manager.commons.feature:${carbon.analytics.common.version}
</featureArtifactDef>
<featureArtifactDef>
org.wso2.carbon.analytics:org.wso2.carbon.analytics.stream.persistence.server.feature:${carbon.analytics.version}
</featureArtifactDef>
<featureArtifactDef>
org.wso2.carbon.event-processing:org.wso2.carbon.event.execution.manager.feature:${carbon.event-processing.version}
</featureArtifactDef>
<!-- START - Tools -->
<featureArtifactDef>
org.wso2.carbon.commons:org.wso2.carbon.tryit.feature:${carbon.commons.version}
</featureArtifactDef>
<featureArtifactDef>
org.wso2.carbon.event-processing:org.wso2.carbon.siddhi.tryit.feature:${carbon.event-processing.version}
</featureArtifactDef>
<featureArtifactDef>
org.wso2.ciphertool:org.wso2.ciphertool.feature:${cipher.tool.version}
</featureArtifactDef>
<!-- END - Tools -->
<!--End of DAS Feature-->
</featureArtifacts> </featureArtifacts>
</configuration> </configuration>
</execution> </execution>
@ -647,11 +751,10 @@
<id>org.wso2.carbon.device.mgt.group.server.feature.group</id> <id>org.wso2.carbon.device.mgt.group.server.feature.group</id>
<version>${carbon.device.mgt.version}</version> <version>${carbon.device.mgt.version}</version>
</feature> </feature>
<!-- TODO: Verify this feature is needed --> <feature>
<!--<feature>--> <id>org.wso2.carbon.webapp.authenticator.framework.server.feature.group</id>
<!--<id>org.wso2.carbon.webapp.authenticator.framework.server.feature.group</id>--> <version>${carbon.device.mgt.version}</version>
<!--<version>${carbon.device.mgt.version}</version>--> </feature>
<!--</feature>-->
<!-- End of Device Management Features --> <!-- End of Device Management Features -->
<!-- Jaggery Features --> <!-- Jaggery Features -->
@ -679,11 +782,10 @@
<id>org.jaggeryjs.modules.jaggery-test.feature.group</id> <id>org.jaggeryjs.modules.jaggery-test.feature.group</id>
<version>${jaggery.extensions.test.version}</version> <version>${jaggery.extensions.test.version}</version>
</feature> </feature>
<!-- TODO: Verify this feature is needed --> <feature>
<!--<feature>--> <id>org.jaggeryjs.modules.i18n.feature.group</id>
<!--<id>org.jaggeryjs.modules.i18n.feature.group</id>--> <version>${jaggery.extensions.version}</version>
<!--<version>${jaggery.extensions.version}</version>--> </feature>
<!--</feature>-->
<!-- End of Jaggery Features --> <!-- End of Jaggery Features -->
<!-- Carbon Deployment Features --> <!-- Carbon Deployment Features -->
@ -709,10 +811,10 @@
<!-- End of Carbon Utils Features --> <!-- End of Carbon Utils Features -->
<!-- Carbon Commons Features --> <!-- Carbon Commons Features -->
<feature> <!--<feature>-->
<id>org.wso2.carbon.databridge.datapublisher.feature.group</id> <!--<id>org.wso2.carbon.databridge.datapublisher.feature.group</id>-->
<version>${carbon.commons.version}</version> <!--<version>${carbon.commons.version}</version>-->
</feature> <!--</feature>-->
<feature> <feature>
<id>org.wso2.carbon.event.server.feature.group</id> <id>org.wso2.carbon.event.server.feature.group</id>
<version>${carbon.commons.version}</version> <version>${carbon.commons.version}</version>
@ -841,6 +943,10 @@
<id>org.wso2.carbon.identity.application.mgt.server.feature.group</id> <id>org.wso2.carbon.identity.application.mgt.server.feature.group</id>
<version>${carbon.identity.version}</version> <version>${carbon.identity.version}</version>
</feature> </feature>
<feature>
<id>org.wso2.carbon.directory.service.mgr.feature.group</id>
<version>${carbon.identity.version}</version>
</feature>
<feature> <feature>
<id>org.wso2.carbon.idp.mgt.server.feature.group</id> <id>org.wso2.carbon.idp.mgt.server.feature.group</id>
<version>${carbon.identity.version}</version> <version>${carbon.identity.version}</version>
@ -859,6 +965,10 @@
<id>org.wso2.carbon.claim.mgt.server.feature.group</id> <id>org.wso2.carbon.claim.mgt.server.feature.group</id>
<version>${carbon.identity.version}</version> <version>${carbon.identity.version}</version>
</feature> </feature>
<feature>
<id>org.wso2.carbon.identity.notification.mgt.feature.group</id>
<version>${carbon.identity.version}</version>
</feature>
<!-- TODO: Verify this feature is needed --> <!-- TODO: Verify this feature is needed -->
<feature> <feature>
<id>org.wso2.carbon.claim.mgt.feature.group</id> <id>org.wso2.carbon.claim.mgt.feature.group</id>
@ -866,18 +976,18 @@
</feature> </feature>
<!-- End of SSO Fix --> <!-- End of SSO Fix -->
<!--Commented to remove SAML SSO menu item--> <!--Commented to remove SAML SSO menu item-->
<!--<feature> <!--<feature>-->
<id>org.wso2.carbon.identity.sso.saml.feature.group</id> <!--<id>org.wso2.carbon.identity.sso.saml.feature.group</id>-->
<version>${carbon.platform.version}</version> <!--<version>${carbon.identity.version}</version>-->
</feature>--> <!--</feature>-->
<feature> <feature>
<id>org.wso2.carbon.identity.core.feature.group</id> <id>org.wso2.carbon.identity.core.feature.group</id>
<version>${carbon.identity.version}</version> <version>${carbon.identity.version}</version>
</feature> </feature>
<feature> <!--<feature>-->
<id>org.wso2.carbon.identity.self.registration.server.feature.group</id> <!--<id>org.wso2.carbon.identity.self.registration.server.feature.group</id>-->
<version>${carbon.identity.version}</version> <!--<version>${carbon.identity.version}</version>-->
</feature> <!--</feature>-->
<feature> <feature>
<id>org.wso2.carbon.identity.oauth.feature.group</id> <id>org.wso2.carbon.identity.oauth.feature.group</id>
<version>${carbon.identity.version}</version> <version>${carbon.identity.version}</version>
@ -886,10 +996,10 @@
<id>org.wso2.carbon.identity.provider.server.feature.group</id> <id>org.wso2.carbon.identity.provider.server.feature.group</id>
<version>${carbon.identity.version}</version> <version>${carbon.identity.version}</version>
</feature> </feature>
<feature> <!--<feature>-->
<id>org.wso2.carbon.identity.relying.party.server.feature.group</id> <!--<id>org.wso2.carbon.identity.relying.party.server.feature.group</id>-->
<version>${carbon.identity.version}</version> <!--<version>${carbon.identity.version}</version>-->
</feature> <!--</feature>-->
<feature> <feature>
<id>org.wso2.carbon.um.ws.service.server.feature.group</id> <id>org.wso2.carbon.um.ws.service.server.feature.group</id>
<version>${carbon.identity.version}</version> <version>${carbon.identity.version}</version>
@ -1134,20 +1244,145 @@
<id>org.wso2.carbon.system.statistics.feature.group</id> <id>org.wso2.carbon.system.statistics.feature.group</id>
<version>${carbon.commons.version}</version> <version>${carbon.commons.version}</version>
</feature> </feature>
<feature> <!--<feature>-->
<id>org.wso2.carbon.bam.service.agent.feature.group</id> <!--<id>org.wso2.carbon.bam.service.agent.feature.group</id>-->
<version>${carbon.deployment.version}</version> <!--<version>${carbon.deployment.version}</version>-->
</feature> <!--</feature>-->
<!--<feature>--> <!--<feature>-->
<!--<id>org.wso2.carbon.mediation.initializer.feature.group</id>--> <!--<id>org.wso2.carbon.mediation.initializer.feature.group</id>-->
<!--<version>${carbon.mediation.version}</version>--> <!--<version>${carbon.mediation.version}</version>-->
<!--</feature>--> <!--</feature>-->
<!--End of APIM Feature--> <!--End of APIM Feature-->
<!--DAS Feature--> <!--DAS Feature-->
<!--<feature>-->
<!--<id>org.wso2.carbon.analytics.lite.feature.group</id>-->
<!--<version>${carbon.analytics.version}</version>-->
<!--</feature>-->
<!-- START - Analytics Features -->
<feature>
<id>org.wso2.carbon.analytics.core.feature.group</id>
<version>${carbon.analytics.version}</version>
</feature>
<feature>
<id>org.wso2.carbon.analytics.datasource.feature.group</id>
<version>${carbon.analytics.version}</version>
</feature>
<feature>
<id>org.wso2.carbon.analytics.spark.feature.group</id>
<version>${carbon.analytics.version}</version>
</feature>
<feature>
<id>org.wso2.carbon.analytics.api.feature.group</id>
<version>${carbon.analytics.version}</version>
</feature>
<feature>
<id>org.wso2.carbon.spark.commons.feature.group</id>
<version>${carbon.analytics.common.version}</version>
</feature>
<!-- END - Analytics features -->
<feature>
<id>org.wso2.carbon.analytics.messageconsole.feature.group</id>
<version>${carbon.analytics.version}</version>
</feature>
<!-- ************** START - Capp Management ********* -->
<feature>
<id>org.wso2.carbon.application.mgt.feature.group</id>
<version>${carbon.commons.version}</version>
</feature>
<!-- ************** END - Capp Management ********* -->
<!-- ************** START - Data Bridge ************ -->
<feature>
<id>org.wso2.carbon.databridge.datareceiver.feature.group</id>
<version>${carbon.analytics.common.version}</version>
</feature>
<feature>
<id>org.wso2.carbon.databridge.streamdefn.filesystem.server.feature.group</id>
<version>${carbon.analytics.common.version}</version>
</feature>
<feature>
<id>org.wso2.carbon.databridge.datapublisher.feature.group</id>
<version>${carbon.analytics.common.version}</version>
</feature>
<feature>
<id>org.wso2.carbon.analytics.eventsink.feature.group</id>
<version>${carbon.analytics.version}</version>
</feature>
<feature>
<id>org.wso2.carbon.analytics.eventtable.feature.group</id>
<version>${carbon.analytics.version}</version>
</feature>
<!-- ************** END - Data Bridge ************ -->
<!-- ************** START - EVENT PROCESSING FEATURES ************ -->
<feature>
<id>org.wso2.carbon.event.receiver.feature.group</id>
<version>${carbon.analytics.common.version}</version>
</feature>
<feature>
<id>org.wso2.carbon.event.publisher.feature.group</id>
<version>${carbon.analytics.common.version}</version>
</feature>
<feature> <feature>
<id>org.wso2.carbon.analytics.lite.feature.group</id> <id>org.wso2.carbon.event.processor.feature.group</id>
<version>${carbon.event-processing.version}</version>
</feature>
<feature>
<id>org.wso2.carbon.event.tracer.feature.group</id>
<version>${carbon.analytics.common.version}</version>
</feature>
<feature>
<id>org.wso2.carbon.event.flow.feature.group</id>
<version>${carbon.event-processing.version}</version>
</feature>
<feature>
<id>org.wso2.carbon.event.statistics.feature.group</id>
<version>${carbon.analytics.common.version}</version>
</feature>
<feature>
<id>org.wso2.carbon.event.stream.feature.group</id>
<version>${carbon.analytics.common.version}</version>
</feature>
<feature>
<id>org.wso2.carbon.event.simulator.feature.group</id>
<version>${carbon.event-processing.version}</version>
</feature>
<feature>
<id>org.wso2.carbon.event.application.deployer.feature.group</id>
<version>${carbon.analytics.common.version}</version>
</feature>
<feature>
<id>org.wso2.carbon.event.processor.manager.core.feature.group</id>
<version>${carbon.analytics.common.version}</version>
</feature>
<feature>
<id>org.wso2.carbon.event.processor.manager.commons.feature.group</id>
<version>${carbon.analytics.common.version}</version>
</feature>
<feature>
<id>org.wso2.carbon.analytics.stream.persistence.server.feature.group</id>
<version>${carbon.analytics.version}</version> <version>${carbon.analytics.version}</version>
</feature> </feature>
<feature>
<id>org.wso2.carbon.event.execution.manager.feature.group</id>
<version>${carbon.event-processing.version}</version>
</feature>
<!-- ************** END - EVENT PROCESSING FEATURES ************ -->
<!--START - Tools-->
<feature>
<id>org.wso2.carbon.tryit.feature.group</id>
<version>${carbon.commons.version}</version>
</feature>
<feature>
<id>org.wso2.carbon.siddhi.tryit.feature.group</id>
<version>${carbon.event-processing.version}</version>
</feature>
<!--END - Tools-->
</features> </features>
</configuration> </configuration>
</execution> </execution>

@ -161,6 +161,25 @@ public class ArduinoControllerService {
response.setStatus(HttpStatus.SC_INTERNAL_SERVER_ERROR); response.setStatus(HttpStatus.SC_INTERNAL_SERVER_ERROR);
} }
} catch (UnauthorizedException e) {
response.setStatus(HttpStatus.SC_UNAUTHORIZED);
}
}
@Path("/test/{value}")
@POST
public void pushtData( @PathParam("value") String value,@Context HttpServletResponse response) {
try {
DeviceController deviceController = new DeviceController();
deviceController.pushBamData("ayyoob", "firealarm", "deviceID1",
System.currentTimeMillis(), "DeviceData" ,value, DataStreamDefinitions.StreamTypeLabel
.TEMPERATURE);
} catch (UnauthorizedException e) { } catch (UnauthorizedException e) {
response.setStatus(HttpStatus.SC_UNAUTHORIZED); response.setStatus(HttpStatus.SC_UNAUTHORIZED);

@ -852,7 +852,7 @@
<carbon.deployment.version>4.5.2</carbon.deployment.version> <carbon.deployment.version>4.5.2</carbon.deployment.version>
<!-- Carbon Identity --> <!-- Carbon Identity -->
<carbon.identity.version>4.5.6</carbon.identity.version> <carbon.identity.version>4.5.10-SNAPSHOT</carbon.identity.version>
<!-- Carbon Multi-tenancy --> <!-- Carbon Multi-tenancy -->
<carbon.multitenancy.version>4.4.1</carbon.multitenancy.version> <carbon.multitenancy.version>4.4.1</carbon.multitenancy.version>
@ -892,13 +892,13 @@
<!--DAS--> <!--DAS-->
<carbon.analytics.version>1.0.3-SNAPSHOT</carbon.analytics.version> <carbon.analytics.version>1.0.3-SNAPSHOT</carbon.analytics.version>
<carbon.analytics.common.version>5.0.1-SNAPSHOT</carbon.analytics.common.version> <carbon.analytics.common.version>5.0.2-SNAPSHOT</carbon.analytics.common.version>
<das.release.version>3.0.0-SNAPSHOT</das.release.version> <das.release.version>3.0.0-SNAPSHOT</das.release.version>
<carbon.data.version>4.3.1-SNAPSHOT</carbon.data.version> <carbon.data.version>4.3.1-SNAPSHOT</carbon.data.version>
<cipher.tool.version>1.0.0-wso2v3</cipher.tool.version> <cipher.tool.version>1.0.0-wso2v3</cipher.tool.version>
<shindig.version>1.0.0</shindig.version> <shindig.version>1.0.0</shindig.version>
<carbon.dashboard.version>1.0.1-SNAPSHOT</carbon.dashboard.version> <carbon.dashboard.version>1.0.1-SNAPSHOT</carbon.dashboard.version>
<carbon.event-processing.version>2.0.4-SNAPSHOT</carbon.event-processing.version> <carbon.event-processing.version>2.0.4</carbon.event-processing.version>
<orbit.version.commons-httpclient>3.1.0.wso2v2</orbit.version.commons-httpclient> <orbit.version.commons-httpclient>3.1.0.wso2v2</orbit.version.commons-httpclient>

Loading…
Cancel
Save