You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@cxf.apache.org by bu...@apache.org on 2020/08/26 08:18:58 UTC
[cxf-fediz] 02/02: Replace deprecated api usage
This is an automated email from the ASF dual-hosted git repository.
buhhunyx pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cxf-fediz.git
commit 250b42b05e1c7e6a56fa058707263b18ebba9498
Author: Alexey Markevich <bu...@gmail.com>
AuthorDate: Wed Aug 26 11:18:05 2020 +0300
Replace deprecated api usage
---
.../core/samlsso/SAMLEncryptedResponseTest.java | 32 -----------------
.../WEB-INF/views/oAuthAuthorizationData.jsp | 4 +--
.../systests/custom/CustomParametersTest.java | 18 +++++-----
.../cxf/fediz/systests/cxf/FederationTest.java | 36 +++++++++----------
.../cxf/fediz/systests/cxf/TokenExpiryTest.java | 36 +++++++++----------
.../WEB-INF/views/oAuthAuthorizationData.jsp | 4 +--
.../systests/federation/samlsso/SAMLSSOTest.java | 18 +++++-----
.../systests/federation/unknown/WSFedTest.java | 18 +++++-----
.../fediz/systests/federation/wsfed/WSFedTest.java | 18 +++++-----
.../org/apache/cxf/fediz/systests/idp/IdpTest.java | 42 +++++++++++-----------
.../cxf/fediz/systests/jetty9/TomcatUtils.java | 18 +++++-----
.../cxf/fediz/systests/kerberos/KerberosTest.java | 18 +++++-----
.../apache/cxf/fediz/systests/ldap/LDAPTest.java | 18 +++++-----
.../cxf/fediz/systests/oidc/AbstractOIDCTest.java | 16 ++++-----
.../apache/cxf/fediz/systests/samlsso/CXFTest.java | 18 +++++-----
.../apache/cxf/fediz/systests/samlsso/IdpTest.java | 18 +++++-----
.../cxf/fediz/systests/samlsso/JettyTest.java | 18 +++++-----
.../cxf/fediz/systests/samlsso/SpringTest.java | 18 +++++-----
.../fediz/systests/samlsso/TomcatPluginTest.java | 18 +++++-----
.../cxf/fediz/systests/spring/SpringTest.java | 18 +++++-----
.../cxf/fediz/systests/spring/TokenExpiryTest.java | 18 +++++-----
.../cxf/fediz/systests/tomcat/TomcatLauncher.java | 14 ++++----
.../fediz/systests/websphere/WebsphereTest.java | 18 +++++-----
23 files changed, 211 insertions(+), 243 deletions(-)
diff --git a/plugins/core/src/test/java/org/apache/cxf/fediz/core/samlsso/SAMLEncryptedResponseTest.java b/plugins/core/src/test/java/org/apache/cxf/fediz/core/samlsso/SAMLEncryptedResponseTest.java
index fb1e001..2c2b20a 100644
--- a/plugins/core/src/test/java/org/apache/cxf/fediz/core/samlsso/SAMLEncryptedResponseTest.java
+++ b/plugins/core/src/test/java/org/apache/cxf/fediz/core/samlsso/SAMLEncryptedResponseTest.java
@@ -371,38 +371,6 @@ public class SAMLEncryptedResponseTest {
return encodeResponse(response);
}
- private Element createSamlResponse(SamlAssertionWrapper assertion, String alias,
- boolean sign, String requestID)
- throws IOException, UnsupportedCallbackException, WSSecurityException, Exception {
- WSPasswordCallback[] cb = {
- new WSPasswordCallback(alias, WSPasswordCallback.SIGNATURE)
- };
- cbPasswordHandler.handle(cb);
- String password = cb[0].getPassword();
-
- if (sign) {
- assertion.signAssertion(alias, password, crypto, false);
- }
-
- DocumentBuilder docBuilder = docBuilderFactory.newDocumentBuilder();
-
- Status status =
- SAML2PResponseComponentBuilder.createStatus(
- "urn:oasis:names:tc:SAML:2.0:status:Success", null
- );
- Response response =
- SAML2PResponseComponentBuilder.createSAMLResponse(requestID,
- assertion.getIssuerString(),
- status);
- response.getAssertions().add(assertion.getSaml2());
-
- Document doc = docBuilder.newDocument();
- Element policyElement = OpenSAMLUtil.toDom(response, doc);
- doc.appendChild(policyElement);
-
- return policyElement;
- }
-
private Element createEncryptedSamlResponse(SamlAssertionWrapper assertion, String alias,
boolean sign, String requestID)
throws IOException, UnsupportedCallbackException, WSSecurityException, Exception {
diff --git a/services/oidc/src/main/webapp/WEB-INF/views/oAuthAuthorizationData.jsp b/services/oidc/src/main/webapp/WEB-INF/views/oAuthAuthorizationData.jsp
index 6fc7065..e1dace4 100644
--- a/services/oidc/src/main/webapp/WEB-INF/views/oAuthAuthorizationData.jsp
+++ b/services/oidc/src/main/webapp/WEB-INF/views/oAuthAuthorizationData.jsp
@@ -87,7 +87,7 @@
<td>
<input type="checkbox"
<%
- if (perm.isDefault() || authorizedScopes.contains(perm.getPermission())) {
+ if (perm.isDefaultPermission() || authorizedScopes.contains(perm.getPermission())) {
%>
disabled="disabled"
<%
@@ -98,7 +98,7 @@
value="allow"
><big><big><%= perm.getDescription() %></big></big></input>
<%
- if (perm.isDefault()) {
+ if (perm.isDefaultPermission()) {
%>
<input type="hidden" name="<%= perm.getPermission()%>_status" value="allow" />
<%
diff --git a/systests/custom/src/test/java/org/apache/cxf/fediz/systests/custom/CustomParametersTest.java b/systests/custom/src/test/java/org/apache/cxf/fediz/systests/custom/CustomParametersTest.java
index f21d9bd..6a38a20 100644
--- a/systests/custom/src/test/java/org/apache/cxf/fediz/systests/custom/CustomParametersTest.java
+++ b/systests/custom/src/test/java/org/apache/cxf/fediz/systests/custom/CustomParametersTest.java
@@ -86,20 +86,20 @@ public class CustomParametersTest {
httpsConnector.setPort(Integer.parseInt(port));
httpsConnector.setSecure(true);
httpsConnector.setScheme("https");
- httpsConnector.setAttribute("sslProtocol", "TLS");
- httpsConnector.setAttribute("SSLEnabled", true);
-// httpsConnector.setAttribute("keyAlias", "mytomidpkey");
- httpsConnector.setAttribute("keystorePass", "tompass");
- httpsConnector.setAttribute("keystoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("sslProtocol", "TLS");
+ httpsConnector.setProperty("SSLEnabled", "true");
+// httpsConnector.setProperty("keyAlias", "mytomidpkey");
+ httpsConnector.setProperty("keystorePass", "tompass");
+ httpsConnector.setProperty("keystoreFile", "test-classes/server.jks");
server.getService().addConnector(httpsConnector);
if (idp) {
server.getHost().setAppBase("tomcat/idp/webapps");
- httpsConnector.setAttribute("truststorePass", "tompass");
- httpsConnector.setAttribute("truststoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("clientAuth", "want");
+ httpsConnector.setProperty("truststorePass", "tompass");
+ httpsConnector.setProperty("truststoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("clientAuth", "want");
Path stsWebapp = targetDir.resolve(server.getHost().getAppBase()).resolve("fediz-idp-sts");
server.addWebapp("/fediz-idp-sts", stsWebapp.toString());
@@ -109,7 +109,7 @@ public class CustomParametersTest {
} else {
server.getHost().setAppBase("tomcat/rp/webapps");
- httpsConnector.setAttribute("clientAuth", "false");
+ httpsConnector.setProperty("clientAuth", "false");
Path rpWebapp = targetDir.resolve(server.getHost().getAppBase()).resolve("simpleWebapp");
Context cxt = server.addWebapp("/fedizhelloworld", rpWebapp.toString());
diff --git a/systests/cxf/src/test/java/org/apache/cxf/fediz/systests/cxf/FederationTest.java b/systests/cxf/src/test/java/org/apache/cxf/fediz/systests/cxf/FederationTest.java
index 30153c7..84cc44e 100644
--- a/systests/cxf/src/test/java/org/apache/cxf/fediz/systests/cxf/FederationTest.java
+++ b/systests/cxf/src/test/java/org/apache/cxf/fediz/systests/cxf/FederationTest.java
@@ -78,15 +78,15 @@ public class FederationTest extends AbstractTests {
httpsConnector.setPort(Integer.parseInt(idpHttpsPort));
httpsConnector.setSecure(true);
httpsConnector.setScheme("https");
- httpsConnector.setAttribute("keyAlias", "mytomidpkey");
- httpsConnector.setAttribute("keystorePass", "tompass");
- httpsConnector.setAttribute("keystoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("truststorePass", "tompass");
- httpsConnector.setAttribute("truststoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("clientAuth", "want");
- // httpsConnector.setAttribute("clientAuth", "false");
- httpsConnector.setAttribute("sslProtocol", "TLS");
- httpsConnector.setAttribute("SSLEnabled", true);
+ httpsConnector.setProperty("keyAlias", "mytomidpkey");
+ httpsConnector.setProperty("keystorePass", "tompass");
+ httpsConnector.setProperty("keystoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("truststorePass", "tompass");
+ httpsConnector.setProperty("truststoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("clientAuth", "want");
+ // httpsConnector.setProperty("clientAuth", "false");
+ httpsConnector.setProperty("sslProtocol", "TLS");
+ httpsConnector.setProperty("SSLEnabled", "true");
idpServer.getService().addConnector(httpsConnector);
@@ -114,15 +114,15 @@ public class FederationTest extends AbstractTests {
httpsConnector.setPort(Integer.parseInt(rpHttpsPort));
httpsConnector.setSecure(true);
httpsConnector.setScheme("https");
- httpsConnector.setAttribute("keyAlias", "mytomidpkey");
- httpsConnector.setAttribute("keystorePass", "tompass");
- httpsConnector.setAttribute("keystoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("truststorePass", "tompass");
- httpsConnector.setAttribute("truststoreFile", "test-classes/server.jks");
- // httpsConnector.setAttribute("clientAuth", "false");
- httpsConnector.setAttribute("clientAuth", "want");
- httpsConnector.setAttribute("sslProtocol", "TLS");
- httpsConnector.setAttribute("SSLEnabled", true);
+ httpsConnector.setProperty("keyAlias", "mytomidpkey");
+ httpsConnector.setProperty("keystorePass", "tompass");
+ httpsConnector.setProperty("keystoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("truststorePass", "tompass");
+ httpsConnector.setProperty("truststoreFile", "test-classes/server.jks");
+ // httpsConnector.setProperty("clientAuth", "false");
+ httpsConnector.setProperty("clientAuth", "want");
+ httpsConnector.setProperty("sslProtocol", "TLS");
+ httpsConnector.setProperty("SSLEnabled", "true");
rpServer.getService().addConnector(httpsConnector);
diff --git a/systests/cxf/src/test/java/org/apache/cxf/fediz/systests/cxf/TokenExpiryTest.java b/systests/cxf/src/test/java/org/apache/cxf/fediz/systests/cxf/TokenExpiryTest.java
index 835d61a..5e2218e 100644
--- a/systests/cxf/src/test/java/org/apache/cxf/fediz/systests/cxf/TokenExpiryTest.java
+++ b/systests/cxf/src/test/java/org/apache/cxf/fediz/systests/cxf/TokenExpiryTest.java
@@ -68,15 +68,15 @@ public class TokenExpiryTest extends AbstractExpiryTests {
httpsConnector.setPort(Integer.parseInt(idpHttpsPort));
httpsConnector.setSecure(true);
httpsConnector.setScheme("https");
- httpsConnector.setAttribute("keyAlias", "mytomidpkey");
- httpsConnector.setAttribute("keystorePass", "tompass");
- httpsConnector.setAttribute("keystoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("truststorePass", "tompass");
- httpsConnector.setAttribute("truststoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("clientAuth", "want");
- // httpsConnector.setAttribute("clientAuth", "false");
- httpsConnector.setAttribute("sslProtocol", "TLS");
- httpsConnector.setAttribute("SSLEnabled", true);
+ httpsConnector.setProperty("keyAlias", "mytomidpkey");
+ httpsConnector.setProperty("keystorePass", "tompass");
+ httpsConnector.setProperty("keystoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("truststorePass", "tompass");
+ httpsConnector.setProperty("truststoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("clientAuth", "want");
+ // httpsConnector.setProperty("clientAuth", "false");
+ httpsConnector.setProperty("sslProtocol", "TLS");
+ httpsConnector.setProperty("SSLEnabled", "true");
idpServer.getService().addConnector(httpsConnector);
@@ -104,15 +104,15 @@ public class TokenExpiryTest extends AbstractExpiryTests {
httpsConnector.setPort(Integer.parseInt(rpHttpsPort));
httpsConnector.setSecure(true);
httpsConnector.setScheme("https");
- httpsConnector.setAttribute("keyAlias", "mytomidpkey");
- httpsConnector.setAttribute("keystorePass", "tompass");
- httpsConnector.setAttribute("keystoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("truststorePass", "tompass");
- httpsConnector.setAttribute("truststoreFile", "test-classes/server.jks");
- // httpsConnector.setAttribute("clientAuth", "false");
- httpsConnector.setAttribute("clientAuth", "want");
- httpsConnector.setAttribute("sslProtocol", "TLS");
- httpsConnector.setAttribute("SSLEnabled", true);
+ httpsConnector.setProperty("keyAlias", "mytomidpkey");
+ httpsConnector.setProperty("keystorePass", "tompass");
+ httpsConnector.setProperty("keystoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("truststorePass", "tompass");
+ httpsConnector.setProperty("truststoreFile", "test-classes/server.jks");
+ // httpsConnector.setProperty("clientAuth", "false");
+ httpsConnector.setProperty("clientAuth", "want");
+ httpsConnector.setProperty("sslProtocol", "TLS");
+ httpsConnector.setProperty("SSLEnabled", "true");
rpServer.getService().addConnector(httpsConnector);
diff --git a/systests/federation/oidcIdpWebapp/src/main/webapp/WEB-INF/views/oAuthAuthorizationData.jsp b/systests/federation/oidcIdpWebapp/src/main/webapp/WEB-INF/views/oAuthAuthorizationData.jsp
index 1a71624..aac46e7 100644
--- a/systests/federation/oidcIdpWebapp/src/main/webapp/WEB-INF/views/oAuthAuthorizationData.jsp
+++ b/systests/federation/oidcIdpWebapp/src/main/webapp/WEB-INF/views/oAuthAuthorizationData.jsp
@@ -86,7 +86,7 @@
<td>
<input type="checkbox"
<%
- if (perm.isDefault() || authorizedScopes.contains(perm.getPermission())) {
+ if (perm.isDefaultPermission() || authorizedScopes.contains(perm.getPermission())) {
%>
disabled="disabled"
<%
@@ -97,7 +97,7 @@
value="allow"
><big><big><%= perm.getDescription() %></big></big></input>
<%
- if (perm.isDefault()) {
+ if (perm.isDefaultPermission()) {
%>
<input type="hidden" name="<%= perm.getPermission()%>_status" value="allow" />
<%
diff --git a/systests/federation/samlsso/src/test/java/org/apache/cxf/fediz/systests/federation/samlsso/SAMLSSOTest.java b/systests/federation/samlsso/src/test/java/org/apache/cxf/fediz/systests/federation/samlsso/SAMLSSOTest.java
index dbec2c3..d94033a 100644
--- a/systests/federation/samlsso/src/test/java/org/apache/cxf/fediz/systests/federation/samlsso/SAMLSSOTest.java
+++ b/systests/federation/samlsso/src/test/java/org/apache/cxf/fediz/systests/federation/samlsso/SAMLSSOTest.java
@@ -116,15 +116,15 @@ public class SAMLSSOTest {
httpsConnector.setPort(Integer.parseInt(port));
httpsConnector.setSecure(true);
httpsConnector.setScheme("https");
- httpsConnector.setAttribute("keyAlias", "mytomidpkey");
- httpsConnector.setAttribute("keystorePass", "tompass");
- httpsConnector.setAttribute("keystoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("truststorePass", "tompass");
- httpsConnector.setAttribute("truststoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("clientAuth", "want");
- // httpsConnector.setAttribute("clientAuth", "false");
- httpsConnector.setAttribute("sslProtocol", "TLS");
- httpsConnector.setAttribute("SSLEnabled", true);
+ httpsConnector.setProperty("keyAlias", "mytomidpkey");
+ httpsConnector.setProperty("keystorePass", "tompass");
+ httpsConnector.setProperty("keystoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("truststorePass", "tompass");
+ httpsConnector.setProperty("truststoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("clientAuth", "want");
+ // httpsConnector.setProperty("clientAuth", "false");
+ httpsConnector.setProperty("sslProtocol", "TLS");
+ httpsConnector.setProperty("SSLEnabled", "true");
server.getService().addConnector(httpsConnector);
diff --git a/systests/federation/unknown-subject/src/test/java/org/apache/cxf/fediz/systests/federation/unknown/WSFedTest.java b/systests/federation/unknown-subject/src/test/java/org/apache/cxf/fediz/systests/federation/unknown/WSFedTest.java
index 96d64e0..85c9ab3 100644
--- a/systests/federation/unknown-subject/src/test/java/org/apache/cxf/fediz/systests/federation/unknown/WSFedTest.java
+++ b/systests/federation/unknown-subject/src/test/java/org/apache/cxf/fediz/systests/federation/unknown/WSFedTest.java
@@ -105,15 +105,15 @@ public class WSFedTest {
httpsConnector.setPort(Integer.parseInt(port));
httpsConnector.setSecure(true);
httpsConnector.setScheme("https");
- httpsConnector.setAttribute("keyAlias", "mytomidpkey");
- httpsConnector.setAttribute("keystorePass", "tompass");
- httpsConnector.setAttribute("keystoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("truststorePass", "tompass");
- httpsConnector.setAttribute("truststoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("clientAuth", "want");
- // httpsConnector.setAttribute("clientAuth", "false");
- httpsConnector.setAttribute("sslProtocol", "TLS");
- httpsConnector.setAttribute("SSLEnabled", true);
+ httpsConnector.setProperty("keyAlias", "mytomidpkey");
+ httpsConnector.setProperty("keystorePass", "tompass");
+ httpsConnector.setProperty("keystoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("truststorePass", "tompass");
+ httpsConnector.setProperty("truststoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("clientAuth", "want");
+ // httpsConnector.setProperty("clientAuth", "false");
+ httpsConnector.setProperty("sslProtocol", "TLS");
+ httpsConnector.setProperty("SSLEnabled", "true");
server.getService().addConnector(httpsConnector);
diff --git a/systests/federation/wsfed/src/test/java/org/apache/cxf/fediz/systests/federation/wsfed/WSFedTest.java b/systests/federation/wsfed/src/test/java/org/apache/cxf/fediz/systests/federation/wsfed/WSFedTest.java
index 0d5808d..81ade30 100644
--- a/systests/federation/wsfed/src/test/java/org/apache/cxf/fediz/systests/federation/wsfed/WSFedTest.java
+++ b/systests/federation/wsfed/src/test/java/org/apache/cxf/fediz/systests/federation/wsfed/WSFedTest.java
@@ -113,14 +113,14 @@ public class WSFedTest {
httpsConnector.setPort(Integer.parseInt(port));
httpsConnector.setSecure(true);
httpsConnector.setScheme("https");
- httpsConnector.setAttribute("sslProtocol", "TLS");
- httpsConnector.setAttribute("SSLEnabled", true);
- httpsConnector.setAttribute("keystorePass", "tompass");
- httpsConnector.setAttribute("keystoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("keyAlias", "mytomidpkey");
- httpsConnector.setAttribute("truststorePass", "tompass");
- httpsConnector.setAttribute("truststoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("clientAuth", "want");
+ httpsConnector.setProperty("sslProtocol", "TLS");
+ httpsConnector.setProperty("SSLEnabled", "true");
+ httpsConnector.setProperty("keystorePass", "tompass");
+ httpsConnector.setProperty("keystoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("keyAlias", "mytomidpkey");
+ httpsConnector.setProperty("truststorePass", "tompass");
+ httpsConnector.setProperty("truststoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("clientAuth", "want");
if (serverType == ServerType.IDP) {
server.getHost().setAppBase("tomcat/idp/webapps");
@@ -151,7 +151,7 @@ public class WSFedTest {
} else {
server.getHost().setAppBase("tomcat/rp/webapps");
- httpsConnector.setAttribute("clientAuth", "false");
+ httpsConnector.setProperty("clientAuth", "false");
FederationAuthenticator fa = new FederationAuthenticator();
fa.setConfigFile(targetDir.resolve("test-classes").resolve("fediz_config_wsfed.xml").toString());
diff --git a/systests/idp/src/test/java/org/apache/cxf/fediz/systests/idp/IdpTest.java b/systests/idp/src/test/java/org/apache/cxf/fediz/systests/idp/IdpTest.java
index 53eca9a..59dcf81 100644
--- a/systests/idp/src/test/java/org/apache/cxf/fediz/systests/idp/IdpTest.java
+++ b/systests/idp/src/test/java/org/apache/cxf/fediz/systests/idp/IdpTest.java
@@ -99,15 +99,15 @@ public class IdpTest {
httpsConnector.setPort(Integer.parseInt(port));
httpsConnector.setSecure(true);
httpsConnector.setScheme("https");
- httpsConnector.setAttribute("keyAlias", "mytomidpkey");
- httpsConnector.setAttribute("keystorePass", "tompass");
- httpsConnector.setAttribute("keystoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("truststorePass", "tompass");
- httpsConnector.setAttribute("truststoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("clientAuth", "want");
- // httpsConnector.setAttribute("clientAuth", "false");
- httpsConnector.setAttribute("sslProtocol", "TLS");
- httpsConnector.setAttribute("SSLEnabled", true);
+ httpsConnector.setProperty("keyAlias", "mytomidpkey");
+ httpsConnector.setProperty("keystorePass", "tompass");
+ httpsConnector.setProperty("keystoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("truststorePass", "tompass");
+ httpsConnector.setProperty("truststoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("clientAuth", "want");
+ // httpsConnector.setProperty("clientAuth", "false");
+ httpsConnector.setProperty("sslProtocol", "TLS");
+ httpsConnector.setProperty("SSLEnabled", "true");
server.getService().addConnector(httpsConnector);
@@ -811,13 +811,13 @@ public class IdpTest {
// Send a query parameter that's too big
@org.junit.Test
public void testLargeQueryParameterRejected() throws Exception {
- String url = "https://localhost:" + getIdpHttpsPort() + "/fediz-idp/federation?";
- url += "wa=wsignin1.0";
- url += "&whr=urn:org:apache:cxf:fediz:idp:realm-A";
- url += "&wtrealm=urn:org:apache:cxf:fediz:fedizhelloworld";
+ String url = "https://localhost:" + getIdpHttpsPort() + "/fediz-idp/federation?"
+ + "wa=wsignin1.0"
+ + "&whr=urn:org:apache:cxf:fediz:idp:realm-A"
+ + "&wtrealm=urn:org:apache:cxf:fediz:fedizhelloworld";
- StringBuilder sb = new StringBuilder("https://localhost:" + getRpHttpsPort() + "/"
- + getServletContextName() + "/secure/fedservlet");
+ StringBuilder sb = new StringBuilder("https://localhost:").append(getRpHttpsPort()).append('/')
+ .append(getServletContextName()).append("/secure/fedservlet");
for (int i = 0; i < 100; i++) {
sb.append("aaaaaaaaaa");
}
@@ -847,13 +847,13 @@ public class IdpTest {
// Send a query parameter that's bigger than the accepted default, but is allowed by configuration
@org.junit.Test
public void testLargeQueryParameterAccepted() throws Exception {
- String url = "https://localhost:" + getIdpHttpsPort() + "/fediz-idp/federation?";
- url += "wa=wsignin1.0";
- url += "&whr=urn:org:apache:cxf:fediz:idp:realm-A";
- url += "&wtrealm=urn:org:apache:cxf:fediz:fedizhelloworld";
+ String url = "https://localhost:" + getIdpHttpsPort() + "/fediz-idp/federation?"
+ + "wa=wsignin1.0"
+ + "&whr=urn:org:apache:cxf:fediz:idp:realm-A"
+ + "&wtrealm=urn:org:apache:cxf:fediz:fedizhelloworld";
- StringBuilder sb = new StringBuilder("https://localhost:" + getRpHttpsPort()
- + "/" + getServletContextName() + "/secure/fedservlet");
+ StringBuilder sb = new StringBuilder("https://localhost:").append(getRpHttpsPort()).append('/')
+ .append(getServletContextName()).append("/secure/fedservlet");
for (int i = 0; i < 50; i++) {
sb.append("aaaaaaaaaa");
}
diff --git a/systests/jetty9/src/test/java/org/apache/cxf/fediz/systests/jetty9/TomcatUtils.java b/systests/jetty9/src/test/java/org/apache/cxf/fediz/systests/jetty9/TomcatUtils.java
index aff1c74..a39bdf1 100644
--- a/systests/jetty9/src/test/java/org/apache/cxf/fediz/systests/jetty9/TomcatUtils.java
+++ b/systests/jetty9/src/test/java/org/apache/cxf/fediz/systests/jetty9/TomcatUtils.java
@@ -53,15 +53,15 @@ public final class TomcatUtils {
httpsConnector.setPort(Integer.parseInt(IDP_HTTPS_PORT));
httpsConnector.setSecure(true);
httpsConnector.setScheme("https");
- httpsConnector.setAttribute("keyAlias", "mytomidpkey");
- httpsConnector.setAttribute("keystorePass", "tompass");
- httpsConnector.setAttribute("keystoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("truststorePass", "tompass");
- httpsConnector.setAttribute("truststoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("clientAuth", "want");
- // httpsConnector.setAttribute("clientAuth", "false");
- httpsConnector.setAttribute("sslProtocol", "TLS");
- httpsConnector.setAttribute("SSLEnabled", true);
+ httpsConnector.setProperty("keyAlias", "mytomidpkey");
+ httpsConnector.setProperty("keystorePass", "tompass");
+ httpsConnector.setProperty("keystoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("truststorePass", "tompass");
+ httpsConnector.setProperty("truststoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("clientAuth", "want");
+ // httpsConnector.setProperty("clientAuth", "false");
+ httpsConnector.setProperty("sslProtocol", "TLS");
+ httpsConnector.setProperty("SSLEnabled", "true");
idpServer.getService().addConnector(httpsConnector);
diff --git a/systests/kerberos/src/test/java/org/apache/cxf/fediz/systests/kerberos/KerberosTest.java b/systests/kerberos/src/test/java/org/apache/cxf/fediz/systests/kerberos/KerberosTest.java
index c2ca4a3..482341d 100644
--- a/systests/kerberos/src/test/java/org/apache/cxf/fediz/systests/kerberos/KerberosTest.java
+++ b/systests/kerberos/src/test/java/org/apache/cxf/fediz/systests/kerberos/KerberosTest.java
@@ -131,15 +131,15 @@ public class KerberosTest {
httpsConnector.setPort(Integer.parseInt(port));
httpsConnector.setSecure(true);
httpsConnector.setScheme("https");
- httpsConnector.setAttribute("keyAlias", "mytomidpkey");
- httpsConnector.setAttribute("keystorePass", "tompass");
- httpsConnector.setAttribute("keystoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("truststorePass", "tompass");
- httpsConnector.setAttribute("truststoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("clientAuth", "want");
- // httpsConnector.setAttribute("clientAuth", "false");
- httpsConnector.setAttribute("sslProtocol", "TLS");
- httpsConnector.setAttribute("SSLEnabled", true);
+ httpsConnector.setProperty("keyAlias", "mytomidpkey");
+ httpsConnector.setProperty("keystorePass", "tompass");
+ httpsConnector.setProperty("keystoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("truststorePass", "tompass");
+ httpsConnector.setProperty("truststoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("clientAuth", "want");
+ // httpsConnector.setProperty("clientAuth", "false");
+ httpsConnector.setProperty("sslProtocol", "TLS");
+ httpsConnector.setProperty("SSLEnabled", "true");
server.getService().addConnector(httpsConnector);
diff --git a/systests/ldap/src/test/java/org/apache/cxf/fediz/systests/ldap/LDAPTest.java b/systests/ldap/src/test/java/org/apache/cxf/fediz/systests/ldap/LDAPTest.java
index bf46b16..348bbda 100644
--- a/systests/ldap/src/test/java/org/apache/cxf/fediz/systests/ldap/LDAPTest.java
+++ b/systests/ldap/src/test/java/org/apache/cxf/fediz/systests/ldap/LDAPTest.java
@@ -157,15 +157,15 @@ public class LDAPTest extends AbstractLdapTestUnit {
httpsConnector.setPort(Integer.parseInt(port));
httpsConnector.setSecure(true);
httpsConnector.setScheme("https");
- httpsConnector.setAttribute("keyAlias", "mytomidpkey");
- httpsConnector.setAttribute("keystorePass", "tompass");
- httpsConnector.setAttribute("keystoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("truststorePass", "tompass");
- httpsConnector.setAttribute("truststoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("clientAuth", "want");
- // httpsConnector.setAttribute("clientAuth", "false");
- httpsConnector.setAttribute("sslProtocol", "TLS");
- httpsConnector.setAttribute("SSLEnabled", true);
+ httpsConnector.setProperty("keyAlias", "mytomidpkey");
+ httpsConnector.setProperty("keystorePass", "tompass");
+ httpsConnector.setProperty("keystoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("truststorePass", "tompass");
+ httpsConnector.setProperty("truststoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("clientAuth", "want");
+ // httpsConnector.setProperty("clientAuth", "false");
+ httpsConnector.setProperty("sslProtocol", "TLS");
+ httpsConnector.setProperty("SSLEnabled", "true");
server.getService().addConnector(httpsConnector);
diff --git a/systests/oidc/src/test/java/org/apache/cxf/fediz/systests/oidc/AbstractOIDCTest.java b/systests/oidc/src/test/java/org/apache/cxf/fediz/systests/oidc/AbstractOIDCTest.java
index a17bf39..3513cdd 100644
--- a/systests/oidc/src/test/java/org/apache/cxf/fediz/systests/oidc/AbstractOIDCTest.java
+++ b/systests/oidc/src/test/java/org/apache/cxf/fediz/systests/oidc/AbstractOIDCTest.java
@@ -143,17 +143,17 @@ abstract class AbstractOIDCTest {
httpsConnector.setPort(port);
httpsConnector.setSecure(true);
httpsConnector.setScheme("https");
- httpsConnector.setAttribute("sslProtocol", "TLS");
- httpsConnector.setAttribute("SSLEnabled", true);
- httpsConnector.setAttribute("keystoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("keystorePass", "tompass");
+ httpsConnector.setProperty("sslProtocol", "TLS");
+ httpsConnector.setProperty("SSLEnabled", "true");
+ httpsConnector.setProperty("keystoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("keystorePass", "tompass");
if (null == servletContextName) { // IDP
server.getHost().setAppBase("tomcat/idp/webapps");
- httpsConnector.setAttribute("truststoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("truststorePass", "tompass");
- httpsConnector.setAttribute("clientAuth", "want");
+ httpsConnector.setProperty("truststoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("truststorePass", "tompass");
+ httpsConnector.setProperty("clientAuth", "want");
Path stsWebapp = targetDir.resolve(server.getHost().getAppBase()).resolve("fediz-idp-sts");
server.addWebapp("/fediz-idp-sts", stsWebapp.toString());
@@ -163,7 +163,7 @@ abstract class AbstractOIDCTest {
} else { // RP
server.getHost().setAppBase("tomcat/rp/webapps");
- httpsConnector.setAttribute("clientAuth", "false");
+ httpsConnector.setProperty("clientAuth", "false");
Path rpWebapp = targetDir.resolve(server.getHost().getAppBase()).resolve(servletContextName);
Context ctx = server.addWebapp(servletContextName, rpWebapp.toString());
diff --git a/systests/samlsso/src/test/java/org/apache/cxf/fediz/systests/samlsso/CXFTest.java b/systests/samlsso/src/test/java/org/apache/cxf/fediz/systests/samlsso/CXFTest.java
index d1f2f0e..9ad76e1 100644
--- a/systests/samlsso/src/test/java/org/apache/cxf/fediz/systests/samlsso/CXFTest.java
+++ b/systests/samlsso/src/test/java/org/apache/cxf/fediz/systests/samlsso/CXFTest.java
@@ -113,15 +113,15 @@ public class CXFTest extends AbstractTests {
httpsConnector.setPort(Integer.parseInt(port));
httpsConnector.setSecure(true);
httpsConnector.setScheme("https");
- httpsConnector.setAttribute("keyAlias", "mytomidpkey");
- httpsConnector.setAttribute("keystorePass", "tompass");
- httpsConnector.setAttribute("keystoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("truststorePass", "tompass");
- httpsConnector.setAttribute("truststoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("clientAuth", "want");
- // httpsConnector.setAttribute("clientAuth", "false");
- httpsConnector.setAttribute("sslProtocol", "TLS");
- httpsConnector.setAttribute("SSLEnabled", true);
+ httpsConnector.setProperty("keyAlias", "mytomidpkey");
+ httpsConnector.setProperty("keystorePass", "tompass");
+ httpsConnector.setProperty("keystoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("truststorePass", "tompass");
+ httpsConnector.setProperty("truststoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("clientAuth", "want");
+ // httpsConnector.setProperty("clientAuth", "false");
+ httpsConnector.setProperty("sslProtocol", "TLS");
+ httpsConnector.setProperty("SSLEnabled", "true");
server.getService().addConnector(httpsConnector);
diff --git a/systests/samlsso/src/test/java/org/apache/cxf/fediz/systests/samlsso/IdpTest.java b/systests/samlsso/src/test/java/org/apache/cxf/fediz/systests/samlsso/IdpTest.java
index 5aff4ee..52eff1a 100644
--- a/systests/samlsso/src/test/java/org/apache/cxf/fediz/systests/samlsso/IdpTest.java
+++ b/systests/samlsso/src/test/java/org/apache/cxf/fediz/systests/samlsso/IdpTest.java
@@ -139,15 +139,15 @@ public class IdpTest {
httpsConnector.setPort(Integer.parseInt(port));
httpsConnector.setSecure(true);
httpsConnector.setScheme("https");
- httpsConnector.setAttribute("keyAlias", "mytomidpkey");
- httpsConnector.setAttribute("keystorePass", "tompass");
- httpsConnector.setAttribute("keystoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("truststorePass", "tompass");
- httpsConnector.setAttribute("truststoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("clientAuth", "want");
- // httpsConnector.setAttribute("clientAuth", "false");
- httpsConnector.setAttribute("sslProtocol", "TLS");
- httpsConnector.setAttribute("SSLEnabled", true);
+ httpsConnector.setProperty("keyAlias", "mytomidpkey");
+ httpsConnector.setProperty("keystorePass", "tompass");
+ httpsConnector.setProperty("keystoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("truststorePass", "tompass");
+ httpsConnector.setProperty("truststoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("clientAuth", "want");
+ // httpsConnector.setProperty("clientAuth", "false");
+ httpsConnector.setProperty("sslProtocol", "TLS");
+ httpsConnector.setProperty("SSLEnabled", "true");
server.getService().addConnector(httpsConnector);
diff --git a/systests/samlsso/src/test/java/org/apache/cxf/fediz/systests/samlsso/JettyTest.java b/systests/samlsso/src/test/java/org/apache/cxf/fediz/systests/samlsso/JettyTest.java
index 2fde8e6..e952b5d 100644
--- a/systests/samlsso/src/test/java/org/apache/cxf/fediz/systests/samlsso/JettyTest.java
+++ b/systests/samlsso/src/test/java/org/apache/cxf/fediz/systests/samlsso/JettyTest.java
@@ -79,15 +79,15 @@ public class JettyTest extends AbstractTests {
httpsConnector.setPort(Integer.parseInt(IDP_HTTPS_PORT));
httpsConnector.setSecure(true);
httpsConnector.setScheme("https");
- httpsConnector.setAttribute("keyAlias", "mytomidpkey");
- httpsConnector.setAttribute("keystorePass", "tompass");
- httpsConnector.setAttribute("keystoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("truststorePass", "tompass");
- httpsConnector.setAttribute("truststoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("clientAuth", "want");
- // httpsConnector.setAttribute("clientAuth", "false");
- httpsConnector.setAttribute("sslProtocol", "TLS");
- httpsConnector.setAttribute("SSLEnabled", true);
+ httpsConnector.setProperty("keyAlias", "mytomidpkey");
+ httpsConnector.setProperty("keystorePass", "tompass");
+ httpsConnector.setProperty("keystoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("truststorePass", "tompass");
+ httpsConnector.setProperty("truststoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("clientAuth", "want");
+ // httpsConnector.setProperty("clientAuth", "false");
+ httpsConnector.setProperty("sslProtocol", "TLS");
+ httpsConnector.setProperty("SSLEnabled", "true");
idpServer.getService().addConnector(httpsConnector);
diff --git a/systests/samlsso/src/test/java/org/apache/cxf/fediz/systests/samlsso/SpringTest.java b/systests/samlsso/src/test/java/org/apache/cxf/fediz/systests/samlsso/SpringTest.java
index ce6a4ee..470c597 100644
--- a/systests/samlsso/src/test/java/org/apache/cxf/fediz/systests/samlsso/SpringTest.java
+++ b/systests/samlsso/src/test/java/org/apache/cxf/fediz/systests/samlsso/SpringTest.java
@@ -113,15 +113,15 @@ public class SpringTest extends AbstractTests {
httpsConnector.setPort(Integer.parseInt(port));
httpsConnector.setSecure(true);
httpsConnector.setScheme("https");
- httpsConnector.setAttribute("keyAlias", "mytomidpkey");
- httpsConnector.setAttribute("keystorePass", "tompass");
- httpsConnector.setAttribute("keystoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("truststorePass", "tompass");
- httpsConnector.setAttribute("truststoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("clientAuth", "want");
- // httpsConnector.setAttribute("clientAuth", "false");
- httpsConnector.setAttribute("sslProtocol", "TLS");
- httpsConnector.setAttribute("SSLEnabled", true);
+ httpsConnector.setProperty("keyAlias", "mytomidpkey");
+ httpsConnector.setProperty("keystorePass", "tompass");
+ httpsConnector.setProperty("keystoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("truststorePass", "tompass");
+ httpsConnector.setProperty("truststoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("clientAuth", "want");
+ // httpsConnector.setProperty("clientAuth", "false");
+ httpsConnector.setProperty("sslProtocol", "TLS");
+ httpsConnector.setProperty("SSLEnabled", "true");
server.getService().addConnector(httpsConnector);
diff --git a/systests/samlsso/src/test/java/org/apache/cxf/fediz/systests/samlsso/TomcatPluginTest.java b/systests/samlsso/src/test/java/org/apache/cxf/fediz/systests/samlsso/TomcatPluginTest.java
index d67a08b..8045e50 100644
--- a/systests/samlsso/src/test/java/org/apache/cxf/fediz/systests/samlsso/TomcatPluginTest.java
+++ b/systests/samlsso/src/test/java/org/apache/cxf/fediz/systests/samlsso/TomcatPluginTest.java
@@ -97,15 +97,15 @@ public class TomcatPluginTest extends AbstractTests {
httpsConnector.setPort(Integer.parseInt(port));
httpsConnector.setSecure(true);
httpsConnector.setScheme("https");
- httpsConnector.setAttribute("keyAlias", "mytomidpkey");
- httpsConnector.setAttribute("keystorePass", "tompass");
- httpsConnector.setAttribute("keystoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("truststorePass", "tompass");
- httpsConnector.setAttribute("truststoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("clientAuth", "want");
- // httpsConnector.setAttribute("clientAuth", "false");
- httpsConnector.setAttribute("sslProtocol", "TLS");
- httpsConnector.setAttribute("SSLEnabled", true);
+ httpsConnector.setProperty("keyAlias", "mytomidpkey");
+ httpsConnector.setProperty("keystorePass", "tompass");
+ httpsConnector.setProperty("keystoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("truststorePass", "tompass");
+ httpsConnector.setProperty("truststoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("clientAuth", "want");
+ // httpsConnector.setProperty("clientAuth", "false");
+ httpsConnector.setProperty("sslProtocol", "TLS");
+ httpsConnector.setProperty("SSLEnabled", "true");
server.getService().addConnector(httpsConnector);
diff --git a/systests/spring/src/test/java/org/apache/cxf/fediz/systests/spring/SpringTest.java b/systests/spring/src/test/java/org/apache/cxf/fediz/systests/spring/SpringTest.java
index 39c5d2a..c27847a 100644
--- a/systests/spring/src/test/java/org/apache/cxf/fediz/systests/spring/SpringTest.java
+++ b/systests/spring/src/test/java/org/apache/cxf/fediz/systests/spring/SpringTest.java
@@ -104,15 +104,15 @@ public class SpringTest extends AbstractTests {
httpsConnector.setPort(Integer.parseInt(port));
httpsConnector.setSecure(true);
httpsConnector.setScheme("https");
- httpsConnector.setAttribute("keyAlias", "mytomidpkey");
- httpsConnector.setAttribute("keystorePass", "tompass");
- httpsConnector.setAttribute("keystoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("truststorePass", "tompass");
- httpsConnector.setAttribute("truststoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("clientAuth", "want");
- // httpsConnector.setAttribute("clientAuth", "false");
- httpsConnector.setAttribute("sslProtocol", "TLS");
- httpsConnector.setAttribute("SSLEnabled", true);
+ httpsConnector.setProperty("keyAlias", "mytomidpkey");
+ httpsConnector.setProperty("keystorePass", "tompass");
+ httpsConnector.setProperty("keystoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("truststorePass", "tompass");
+ httpsConnector.setProperty("truststoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("clientAuth", "want");
+ // httpsConnector.setProperty("clientAuth", "false");
+ httpsConnector.setProperty("sslProtocol", "TLS");
+ httpsConnector.setProperty("SSLEnabled", "true");
server.getService().addConnector(httpsConnector);
diff --git a/systests/spring/src/test/java/org/apache/cxf/fediz/systests/spring/TokenExpiryTest.java b/systests/spring/src/test/java/org/apache/cxf/fediz/systests/spring/TokenExpiryTest.java
index 76932a5..96c10fa 100644
--- a/systests/spring/src/test/java/org/apache/cxf/fediz/systests/spring/TokenExpiryTest.java
+++ b/systests/spring/src/test/java/org/apache/cxf/fediz/systests/spring/TokenExpiryTest.java
@@ -77,15 +77,15 @@ public class TokenExpiryTest extends AbstractExpiryTests {
httpsConnector.setPort(Integer.parseInt(port));
httpsConnector.setSecure(true);
httpsConnector.setScheme("https");
- httpsConnector.setAttribute("keyAlias", "mytomidpkey");
- httpsConnector.setAttribute("keystorePass", "tompass");
- httpsConnector.setAttribute("keystoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("truststorePass", "tompass");
- httpsConnector.setAttribute("truststoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("clientAuth", "want");
- // httpsConnector.setAttribute("clientAuth", "false");
- httpsConnector.setAttribute("sslProtocol", "TLS");
- httpsConnector.setAttribute("SSLEnabled", true);
+ httpsConnector.setProperty("keyAlias", "mytomidpkey");
+ httpsConnector.setProperty("keystorePass", "tompass");
+ httpsConnector.setProperty("keystoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("truststorePass", "tompass");
+ httpsConnector.setProperty("truststoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("clientAuth", "want");
+ // httpsConnector.setProperty("clientAuth", "false");
+ httpsConnector.setProperty("sslProtocol", "TLS");
+ httpsConnector.setProperty("SSLEnabled", "true");
server.getService().addConnector(httpsConnector);
diff --git a/systests/tomcat/src/test/java/org/apache/cxf/fediz/systests/tomcat/TomcatLauncher.java b/systests/tomcat/src/test/java/org/apache/cxf/fediz/systests/tomcat/TomcatLauncher.java
index 2f0d7c2..ff29797 100644
--- a/systests/tomcat/src/test/java/org/apache/cxf/fediz/systests/tomcat/TomcatLauncher.java
+++ b/systests/tomcat/src/test/java/org/apache/cxf/fediz/systests/tomcat/TomcatLauncher.java
@@ -67,13 +67,13 @@ public abstract class TomcatLauncher {
httpsConnector.setPort(Integer.parseInt(port));
httpsConnector.setSecure(true);
httpsConnector.setScheme("https");
- httpsConnector.setAttribute("sslProtocol", "TLS");
- httpsConnector.setAttribute("SSLEnabled", true);
- httpsConnector.setAttribute("keystoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("keystorePass", "tompass");
- httpsConnector.setAttribute("truststoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("truststorePass", "tompass");
- httpsConnector.setAttribute("clientAuth", "want");
+ httpsConnector.setProperty("sslProtocol", "TLS");
+ httpsConnector.setProperty("SSLEnabled", "true");
+ httpsConnector.setProperty("keystoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("keystorePass", "tompass");
+ httpsConnector.setProperty("truststoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("truststorePass", "tompass");
+ httpsConnector.setProperty("clientAuth", "want");
server.getService().addConnector(httpsConnector);
if (null == servletContextName) { // IDP
diff --git a/systests/websphere/src/test/java/org/apache/cxf/fediz/systests/websphere/WebsphereTest.java b/systests/websphere/src/test/java/org/apache/cxf/fediz/systests/websphere/WebsphereTest.java
index 8101641..2671257 100644
--- a/systests/websphere/src/test/java/org/apache/cxf/fediz/systests/websphere/WebsphereTest.java
+++ b/systests/websphere/src/test/java/org/apache/cxf/fediz/systests/websphere/WebsphereTest.java
@@ -72,15 +72,15 @@ public class WebsphereTest extends AbstractTests {
httpsConnector.setPort(Integer.parseInt(idpHttpsPort));
httpsConnector.setSecure(true);
httpsConnector.setScheme("https");
- // httpsConnector.setAttribute("keyAlias", keyAlias);
- httpsConnector.setAttribute("keystorePass", "tompass");
- httpsConnector.setAttribute("keystoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("truststorePass", "tompass");
- httpsConnector.setAttribute("truststoreFile", "test-classes/server.jks");
- httpsConnector.setAttribute("clientAuth", "want");
- // httpsConnector.setAttribute("clientAuth", "false");
- httpsConnector.setAttribute("sslProtocol", "TLS");
- httpsConnector.setAttribute("SSLEnabled", true);
+ // httpsConnector.setProperty("keyAlias", keyAlias);
+ httpsConnector.setProperty("keystorePass", "tompass");
+ httpsConnector.setProperty("keystoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("truststorePass", "tompass");
+ httpsConnector.setProperty("truststoreFile", "test-classes/server.jks");
+ httpsConnector.setProperty("clientAuth", "want");
+ // httpsConnector.setProperty("clientAuth", "false");
+ httpsConnector.setProperty("sslProtocol", "TLS");
+ httpsConnector.setProperty("SSLEnabled", "true");
idpServer.getService().addConnector(httpsConnector);