You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@cxf.apache.org by co...@apache.org on 2016/05/17 15:23:53 UTC

[5/7] cxf git commit: Fixing build

Fixing build


Project: http://git-wip-us.apache.org/repos/asf/cxf/repo
Commit: http://git-wip-us.apache.org/repos/asf/cxf/commit/ceeb1002
Tree: http://git-wip-us.apache.org/repos/asf/cxf/tree/ceeb1002
Diff: http://git-wip-us.apache.org/repos/asf/cxf/diff/ceeb1002

Branch: refs/heads/3.0.x-fixes
Commit: ceeb100203796e76254ee7d46018526933b6f637
Parents: a47efcf
Author: Colm O hEigeartaigh <co...@apache.org>
Authored: Tue May 17 16:13:14 2016 +0100
Committer: Colm O hEigeartaigh <co...@apache.org>
Committed: Tue May 17 16:14:00 2016 +0100

----------------------------------------------------------------------
 .../apache/cxf/ws/security/wss4j/saml/SamlTokenTest.java | 11 +++++------
 1 file changed, 5 insertions(+), 6 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/cxf/blob/ceeb1002/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/saml/SamlTokenTest.java
----------------------------------------------------------------------
diff --git a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/saml/SamlTokenTest.java b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/saml/SamlTokenTest.java
index a70fe51..f4b14c9 100644
--- a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/saml/SamlTokenTest.java
+++ b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/saml/SamlTokenTest.java
@@ -20,7 +20,6 @@ package org.apache.cxf.ws.security.wss4j.saml;
 
 import java.io.ByteArrayInputStream;
 import java.util.ArrayList;
-import java.util.Collections;
 import java.util.HashMap;
 import java.util.List;
 import java.util.Map;
@@ -275,14 +274,14 @@ public class SamlTokenTest extends AbstractSecurityTest {
         xpaths.add("//wsse:Security/saml1:Assertion");
         
         try {
-            makeInvocation(outProperties, xpaths, inProperties, Collections.emptyMap());
+            makeInvocation(outProperties, xpaths, inProperties, new HashMap<String, String>());
             fail("Failure expected in SAML Validator");
         } catch (Fault ex) {
             // expected
         }
         validator.setRequireSenderVouches(false);
 
-        Message message = makeInvocation(outProperties, xpaths, inProperties, Collections.emptyMap());
+        Message message = makeInvocation(outProperties, xpaths, inProperties, new HashMap<String, String>());
         final List<WSHandlerResult> handlerResults = 
             CastUtils.cast((List<?>)message.get(WSHandlerConstants.RECV_RESULTS));
         
@@ -332,7 +331,7 @@ public class SamlTokenTest extends AbstractSecurityTest {
         xpaths.add("//wsse:Security/saml2:Assertion");
         
         try {
-            makeInvocation(outProperties, xpaths, inProperties, Collections.emptyMap());
+            makeInvocation(outProperties, xpaths, inProperties, new HashMap<String, String>());
             fail("Failure expected in SAML Validator");
         } catch (Fault ex) {
             // expected
@@ -340,14 +339,14 @@ public class SamlTokenTest extends AbstractSecurityTest {
         validator.setRequireSenderVouches(false);
         
         try {
-            makeInvocation(outProperties, xpaths, inProperties, Collections.emptyMap());
+            makeInvocation(outProperties, xpaths, inProperties, new HashMap<String, String>());
             fail("Failure expected in SAML Validator");
         } catch (Fault ex) {
             // expected
         }
         validator.setRequireSAML1Assertion(false);
 
-        Message message = makeInvocation(outProperties, xpaths, inProperties, Collections.emptyMap());
+        Message message = makeInvocation(outProperties, xpaths, inProperties, new HashMap<String, String>());
         final List<WSHandlerResult> handlerResults = 
             CastUtils.cast((List<?>)message.get(WSHandlerConstants.RECV_RESULTS));