You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@tomee.apache.org by rm...@apache.org on 2014/11/11 16:47:27 UTC
tomee git commit: adding a test about a custom security context with
jaxrs 2
Repository: tomee
Updated Branches:
refs/heads/develop fca7a9f1c -> c5dea27ad
adding a test about a custom security context with jaxrs 2
Project: http://git-wip-us.apache.org/repos/asf/tomee/repo
Commit: http://git-wip-us.apache.org/repos/asf/tomee/commit/c5dea27a
Tree: http://git-wip-us.apache.org/repos/asf/tomee/tree/c5dea27a
Diff: http://git-wip-us.apache.org/repos/asf/tomee/diff/c5dea27a
Branch: refs/heads/develop
Commit: c5dea27ad20000b83391fc4bdc1b092b358f8c0c
Parents: fca7a9f
Author: Romain Manni-Bucau <rm...@apache.org>
Authored: Tue Nov 11 16:47:08 2014 +0100
Committer: Romain Manni-Bucau <rm...@apache.org>
Committed: Tue Nov 11 16:47:08 2014 +0100
----------------------------------------------------------------------
.../openejb/testing/ApplicationComposers.java | 2 +
.../cxf/rs/CustomSecurityContextTest.java | 116 +++++++++++++++++++
2 files changed, 118 insertions(+)
----------------------------------------------------------------------
http://git-wip-us.apache.org/repos/asf/tomee/blob/c5dea27a/container/openejb-core/src/main/java/org/apache/openejb/testing/ApplicationComposers.java
----------------------------------------------------------------------
diff --git a/container/openejb-core/src/main/java/org/apache/openejb/testing/ApplicationComposers.java b/container/openejb-core/src/main/java/org/apache/openejb/testing/ApplicationComposers.java
index 8b4caea..f4d129f 100644
--- a/container/openejb-core/src/main/java/org/apache/openejb/testing/ApplicationComposers.java
+++ b/container/openejb-core/src/main/java/org/apache/openejb/testing/ApplicationComposers.java
@@ -546,6 +546,8 @@ public final class ApplicationComposers {
final PojoDeployment pojoDeployment = new PojoDeployment();
pojoDeployment.setClassName(providers.applicationName());
pojoDeployment.getProperties().setProperty("cxf.jaxrs.providers", Join.join(",", providersClasses).replace("class ", ""));
+ // it is specified so skip scanning otherwise we'll get them twice
+ pojoDeployment.getProperties().setProperty("cxf.jaxrs.skip-provider-scanning", "true");
openejbJar.getPojoDeployment().add(pojoDeployment);
}
} else if (obj instanceof WebModule) { // will add the ejbmodule too
http://git-wip-us.apache.org/repos/asf/tomee/blob/c5dea27a/server/openejb-cxf-rs/src/test/java/org/apache/openejb/server/cxf/rs/CustomSecurityContextTest.java
----------------------------------------------------------------------
diff --git a/server/openejb-cxf-rs/src/test/java/org/apache/openejb/server/cxf/rs/CustomSecurityContextTest.java b/server/openejb-cxf-rs/src/test/java/org/apache/openejb/server/cxf/rs/CustomSecurityContextTest.java
new file mode 100644
index 0000000..6129a06
--- /dev/null
+++ b/server/openejb-cxf-rs/src/test/java/org/apache/openejb/server/cxf/rs/CustomSecurityContextTest.java
@@ -0,0 +1,116 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements. See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.openejb.server.cxf.rs;
+
+import org.apache.openejb.jee.WebApp;
+import org.apache.openejb.junit.ApplicationComposer;
+import org.apache.openejb.loader.IO;
+import org.apache.openejb.testing.Classes;
+import org.apache.openejb.testing.Configuration;
+import org.apache.openejb.testing.EnableServices;
+import org.apache.openejb.testing.JaxrsProviders;
+import org.apache.openejb.testing.Module;
+import org.apache.openejb.testng.PropertiesBuilder;
+import org.apache.openejb.util.NetworkUtil;
+import org.junit.BeforeClass;
+import org.junit.Test;
+import org.junit.runner.RunWith;
+
+import javax.ws.rs.GET;
+import javax.ws.rs.Path;
+import javax.ws.rs.container.ContainerRequestContext;
+import javax.ws.rs.container.ContainerRequestFilter;
+import javax.ws.rs.core.Context;
+import javax.ws.rs.core.SecurityContext;
+import javax.ws.rs.ext.Provider;
+import java.io.IOException;
+import java.net.URL;
+import java.security.Principal;
+import java.util.Properties;
+
+import static org.junit.Assert.assertEquals;
+
+@EnableServices("jax-rs")
+@RunWith(ApplicationComposer.class)
+public class CustomSecurityContextTest {
+
+ private static int port = -1;
+
+ @BeforeClass
+ public static void beforeClass() {
+ port = NetworkUtil.getNextAvailablePort();
+ }
+
+ @Configuration
+ public Properties props() {
+ return new PropertiesBuilder().p("httpejbd.port", Integer.toString(port)).build();
+ }
+
+ @Module
+ @JaxrsProviders(MySecuCtx.class)
+ @Classes(Res.class)
+ public WebApp war() {
+ return new WebApp()
+ .contextRoot("foo");
+ }
+
+ @Test
+ public void check() throws IOException {
+ assertEquals("true", IO.slurp(new URL("http://localhost:" + port + "/foo/sc?role=therole")));
+ assertEquals("false", IO.slurp(new URL("http://localhost:" + port + "/foo/sc?role=another")));
+ }
+
+ @Path("sc")
+ public static class Res {
+ @Context
+ private SecurityContext sc;
+
+ @GET
+ public boolean f() {
+ return sc.isUserInRole("therole");
+ }
+ }
+
+ @Provider
+ public static class MySecuCtx implements ContainerRequestFilter {
+ @Override
+ public void filter(final ContainerRequestContext containerRequestContext) throws IOException {
+ final String role = containerRequestContext.getUriInfo().getQueryParameters().getFirst("role");
+ containerRequestContext.setSecurityContext(new SecurityContext() {
+ @Override
+ public Principal getUserPrincipal() {
+ return null;
+ }
+
+ @Override
+ public boolean isUserInRole(final String s) {
+ return s.equals(role);
+ }
+
+ @Override
+ public boolean isSecure() {
+ return false;
+ }
+
+ @Override
+ public String getAuthenticationScheme() {
+ return SecurityContext.BASIC_AUTH;
+ }
+ });
+ }
+ }
+}