You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@karaf.apache.org by ff...@apache.org on 2019/03/26 05:33:40 UTC
[karaf] branch jdk12 updated: [KARAF-6203]ensure karaf can build
and run with JDK12-fix Krb5LoginModuleTest
This is an automated email from the ASF dual-hosted git repository.
ffang pushed a commit to branch jdk12
in repository https://gitbox.apache.org/repos/asf/karaf.git
The following commit(s) were added to refs/heads/jdk12 by this push:
new 6355199 [KARAF-6203]ensure karaf can build and run with JDK12-fix Krb5LoginModuleTest
6355199 is described below
commit 6355199ee2d7992339552cdf36d5def5b695d61b
Author: Freeman Fang <fr...@gmail.com>
AuthorDate: Tue Mar 26 13:33:21 2019 +0800
[KARAF-6203]ensure karaf can build and run with JDK12-fix Krb5LoginModuleTest
---
.../apache/karaf/jaas/modules/krb5/Krb5LoginModuleTest.java | 10 +++++-----
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/jaas/modules/src/test/java/org/apache/karaf/jaas/modules/krb5/Krb5LoginModuleTest.java b/jaas/modules/src/test/java/org/apache/karaf/jaas/modules/krb5/Krb5LoginModuleTest.java
index 59293e8..b60df15 100644
--- a/jaas/modules/src/test/java/org/apache/karaf/jaas/modules/krb5/Krb5LoginModuleTest.java
+++ b/jaas/modules/src/test/java/org/apache/karaf/jaas/modules/krb5/Krb5LoginModuleTest.java
@@ -52,7 +52,6 @@ import org.apache.karaf.jaas.modules.NamePasswordCallbackHandler;
import org.junit.After;
import org.junit.Assert;
import org.junit.Before;
-import org.junit.Ignore;
import org.junit.Test;
import org.junit.runner.RunWith;
@@ -134,10 +133,11 @@ public class Krb5LoginModuleTest extends KarafKerberosITest {
super.setUp();
// Set up a partition for EXAMPLE.COM and add user and service principals to test authentication with.
+ setupEnv(TcpTransport.class,
+ EncryptionType.AES128_CTS_HMAC_SHA1_96, ChecksumType.HMAC_SHA1_96_AES128);
KerberosTestUtils.fixServicePrincipalName(
"ldap/" + KerberosTestUtils.getHostName() + "@EXAMPLE.COM", null, getLdapServer());
- setupEnv(TcpTransport.class,
- EncryptionType.AES128_CTS_HMAC_SHA1_96, ChecksumType.HMAC_SHA1_96_AES128);
+
kdcServer.getConfig().setPaEncTimestampRequired(false);
// Use our custom configuration to avoid reliance on external config
@@ -149,7 +149,7 @@ public class Krb5LoginModuleTest extends KarafKerberosITest {
super.tearDown();
}
- @Ignore
+ @Test
public void testKeytabSuccess() throws Exception {
Map<String, Object> props = new HashMap<>();
props.put("debug", "true");
@@ -202,7 +202,7 @@ public class Krb5LoginModuleTest extends KarafKerberosITest {
}
- @Ignore
+ @Test
public void testLoginSuccess() throws Exception {
Subject subject = new Subject();
Krb5LoginModule module = new Krb5LoginModule();