You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@tomee.apache.org by rm...@apache.org on 2014/11/11 16:47:27 UTC

tomee git commit: adding a test about a custom security context with jaxrs 2

Repository: tomee
Updated Branches:
  refs/heads/develop fca7a9f1c -> c5dea27ad


adding a test about a custom security context with jaxrs 2


Project: http://git-wip-us.apache.org/repos/asf/tomee/repo
Commit: http://git-wip-us.apache.org/repos/asf/tomee/commit/c5dea27a
Tree: http://git-wip-us.apache.org/repos/asf/tomee/tree/c5dea27a
Diff: http://git-wip-us.apache.org/repos/asf/tomee/diff/c5dea27a

Branch: refs/heads/develop
Commit: c5dea27ad20000b83391fc4bdc1b092b358f8c0c
Parents: fca7a9f
Author: Romain Manni-Bucau <rm...@apache.org>
Authored: Tue Nov 11 16:47:08 2014 +0100
Committer: Romain Manni-Bucau <rm...@apache.org>
Committed: Tue Nov 11 16:47:08 2014 +0100

----------------------------------------------------------------------
 .../openejb/testing/ApplicationComposers.java   |   2 +
 .../cxf/rs/CustomSecurityContextTest.java       | 116 +++++++++++++++++++
 2 files changed, 118 insertions(+)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/tomee/blob/c5dea27a/container/openejb-core/src/main/java/org/apache/openejb/testing/ApplicationComposers.java
----------------------------------------------------------------------
diff --git a/container/openejb-core/src/main/java/org/apache/openejb/testing/ApplicationComposers.java b/container/openejb-core/src/main/java/org/apache/openejb/testing/ApplicationComposers.java
index 8b4caea..f4d129f 100644
--- a/container/openejb-core/src/main/java/org/apache/openejb/testing/ApplicationComposers.java
+++ b/container/openejb-core/src/main/java/org/apache/openejb/testing/ApplicationComposers.java
@@ -546,6 +546,8 @@ public final class ApplicationComposers {
                         final PojoDeployment pojoDeployment = new PojoDeployment();
                         pojoDeployment.setClassName(providers.applicationName());
                         pojoDeployment.getProperties().setProperty("cxf.jaxrs.providers", Join.join(",", providersClasses).replace("class ", ""));
+                        // it is specified so skip scanning otherwise we'll get them twice
+                        pojoDeployment.getProperties().setProperty("cxf.jaxrs.skip-provider-scanning", "true");
                         openejbJar.getPojoDeployment().add(pojoDeployment);
                     }
                 } else if (obj instanceof WebModule) { // will add the ejbmodule too

http://git-wip-us.apache.org/repos/asf/tomee/blob/c5dea27a/server/openejb-cxf-rs/src/test/java/org/apache/openejb/server/cxf/rs/CustomSecurityContextTest.java
----------------------------------------------------------------------
diff --git a/server/openejb-cxf-rs/src/test/java/org/apache/openejb/server/cxf/rs/CustomSecurityContextTest.java b/server/openejb-cxf-rs/src/test/java/org/apache/openejb/server/cxf/rs/CustomSecurityContextTest.java
new file mode 100644
index 0000000..6129a06
--- /dev/null
+++ b/server/openejb-cxf-rs/src/test/java/org/apache/openejb/server/cxf/rs/CustomSecurityContextTest.java
@@ -0,0 +1,116 @@
+/*
+ *     Licensed to the Apache Software Foundation (ASF) under one or more
+ *     contributor license agreements.  See the NOTICE file distributed with
+ *     this work for additional information regarding copyright ownership.
+ *     The ASF licenses this file to You under the Apache License, Version 2.0
+ *     (the "License"); you may not use this file except in compliance with
+ *     the License.  You may obtain a copy of the License at
+ *
+ *        http://www.apache.org/licenses/LICENSE-2.0
+ *
+ *     Unless required by applicable law or agreed to in writing, software
+ *     distributed under the License is distributed on an "AS IS" BASIS,
+ *     WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ *     See the License for the specific language governing permissions and
+ *     limitations under the License.
+ */
+package org.apache.openejb.server.cxf.rs;
+
+import org.apache.openejb.jee.WebApp;
+import org.apache.openejb.junit.ApplicationComposer;
+import org.apache.openejb.loader.IO;
+import org.apache.openejb.testing.Classes;
+import org.apache.openejb.testing.Configuration;
+import org.apache.openejb.testing.EnableServices;
+import org.apache.openejb.testing.JaxrsProviders;
+import org.apache.openejb.testing.Module;
+import org.apache.openejb.testng.PropertiesBuilder;
+import org.apache.openejb.util.NetworkUtil;
+import org.junit.BeforeClass;
+import org.junit.Test;
+import org.junit.runner.RunWith;
+
+import javax.ws.rs.GET;
+import javax.ws.rs.Path;
+import javax.ws.rs.container.ContainerRequestContext;
+import javax.ws.rs.container.ContainerRequestFilter;
+import javax.ws.rs.core.Context;
+import javax.ws.rs.core.SecurityContext;
+import javax.ws.rs.ext.Provider;
+import java.io.IOException;
+import java.net.URL;
+import java.security.Principal;
+import java.util.Properties;
+
+import static org.junit.Assert.assertEquals;
+
+@EnableServices("jax-rs")
+@RunWith(ApplicationComposer.class)
+public class CustomSecurityContextTest {
+
+    private static int port = -1;
+
+    @BeforeClass
+    public static void beforeClass() {
+        port = NetworkUtil.getNextAvailablePort();
+    }
+
+    @Configuration
+    public Properties props() {
+        return new PropertiesBuilder().p("httpejbd.port", Integer.toString(port)).build();
+    }
+
+    @Module
+    @JaxrsProviders(MySecuCtx.class)
+    @Classes(Res.class)
+    public WebApp war() {
+        return new WebApp()
+            .contextRoot("foo");
+    }
+
+    @Test
+    public void check() throws IOException {
+        assertEquals("true", IO.slurp(new URL("http://localhost:" + port + "/foo/sc?role=therole")));
+        assertEquals("false", IO.slurp(new URL("http://localhost:" + port + "/foo/sc?role=another")));
+    }
+
+    @Path("sc")
+    public static class Res {
+        @Context
+        private SecurityContext sc;
+
+        @GET
+        public boolean f() {
+            return sc.isUserInRole("therole");
+        }
+    }
+
+    @Provider
+    public static class MySecuCtx implements ContainerRequestFilter {
+        @Override
+        public void filter(final ContainerRequestContext containerRequestContext) throws IOException {
+            final String role = containerRequestContext.getUriInfo().getQueryParameters().getFirst("role");
+            containerRequestContext.setSecurityContext(new SecurityContext() {
+                @Override
+                public Principal getUserPrincipal() {
+                    return null;
+                }
+
+                @Override
+                public boolean isUserInRole(final String s) {
+                    return s.equals(role);
+                }
+
+                @Override
+                public boolean isSecure() {
+                    return false;
+                }
+
+                @Override
+                public String getAuthenticationScheme() {
+                    return SecurityContext.BASIC_AUTH;
+                }
+            });
+        }
+    }
+}