Updating keystores to work with JDK9 Conflicts: systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/alice.properties systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/bob.properties
Project: http://git-wip-us.apache.org/repos/asf/cxf/repo Commit: http://git-wip-us.apache.org/repos/asf/cxf/commit/c7720313 Tree: http://git-wip-us.apache.org/repos/asf/cxf/tree/c7720313 Diff: http://git-wip-us.apache.org/repos/asf/cxf/diff/c7720313 Branch: refs/heads/3.0.x-fixes Commit: c7720313ccf181218809afd2ff17c02cf894641a Parents: 688d411 Author: Colm O hEigeartaigh <cohei...@apache.org> Authored: Wed Sep 9 17:54:46 2015 +0100 Committer: Colm O hEigeartaigh <cohei...@apache.org> Committed: Wed Sep 9 17:56:22 2015 +0100 ---------------------------------------------------------------------- .../policyhandlers/AbstractBindingBuilder.java | 6 +- .../data/xkms/certificates/crls/wss40CACRL.cer | Bin 325 -> 345 bytes .../resources/data/xkms/certificates/wss40.cer | Bin 824 -> 956 bytes .../data/xkms/certificates/wss40rev.cer | Bin 824 -> 956 bytes .../trustedAuthorityValidator/wss40.cer | Bin 824 -> 956 bytes .../trustedAuthorityValidator/wss40CACRL.cer | Bin 325 -> 345 bytes .../trustedAuthorityValidator/wss40rev.cer | Bin 824 -> 956 bytes .../src/test/resources/keys/Bethal.cer | Bin 548 -> 0 bytes .../src/test/resources/keys/Bethal.jks | Bin 1317 -> 2202 bytes .../src/test/resources/keys/Bethal.p12 | Bin 1705 -> 2540 bytes .../src/test/resources/keys/Gordy.cer | Bin 544 -> 0 bytes .../src/test/resources/keys/Gordy.jks | Bin 1313 -> 2197 bytes .../src/test/resources/keys/Morpit.jks | Bin 1337 -> 2221 bytes .../src/test/resources/keys/Morpit.p12 | Bin 1721 -> 2564 bytes .../src/test/resources/keys/Poltim.cer | Bin 548 -> 0 bytes .../src/test/resources/keys/Poltim.jks | Bin 1318 -> 2203 bytes .../src/test/resources/keys/Tarpin.cer | Bin 548 -> 0 bytes .../src/test/resources/keys/Tarpin.jks | Bin 1319 -> 2201 bytes .../src/test/resources/keys/Truststore.jks | Bin 2942 -> 4447 bytes .../src/test/resources/keys/Truststore.pem | 126 +++++++++++-------- .../systest/ws/security/SecurityPolicyTest.java | 50 ++++---- .../apache/cxf/systest/ws/security/Bethal.cer | Bin 548 -> 0 bytes .../apache/cxf/systest/ws/security/Bethal.cxf | 83 ------------ .../apache/cxf/systest/ws/security/Bethal.jks | Bin 1317 -> 2202 bytes .../apache/cxf/systest/ws/security/Bethal.p12 | Bin 1705 -> 0 bytes .../cxf/systest/ws/security/DoubleIt.wsdl | 26 ++-- .../apache/cxf/systest/ws/security/Morpit.cxf | 73 ----------- .../apache/cxf/systest/ws/security/Morpit.jks | Bin 1337 -> 2221 bytes .../apache/cxf/systest/ws/security/Morpit.p12 | Bin 1721 -> 0 bytes .../cxf/systest/ws/security/Truststore.jks | Bin 2942 -> 4447 bytes .../cxf/systest/ws/security/Truststore.pem | 60 --------- .../apache/cxf/systest/ws/security/alice.jks | Bin 1821 -> 0 bytes .../org/apache/cxf/systest/ws/security/bob.jks | Bin 1820 -> 0 bytes .../apache/cxf/systest/ws/security/client.xml | 8 +- .../apache/cxf/systest/ws/security/server.xml | 8 +- .../cxf/systest/ws/security/stax-server.xml | 8 +- 36 files changed, 129 insertions(+), 319 deletions(-) ---------------------------------------------------------------------- http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/AbstractBindingBuilder.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/AbstractBindingBuilder.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/AbstractBindingBuilder.java index 8ffa513..c46515e 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/AbstractBindingBuilder.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/AbstractBindingBuilder.java @@ -369,9 +369,11 @@ public abstract class AbstractBindingBuilder extends AbstractCommonBindingHandle SPConstants.LAYOUT_LAX_TIMESTAMP_FIRST)); } } else if (timestampEl != null) { - ai.setAsserted(true); + if (ai != null) { + ai.setAsserted(true); + } addTopDownElement(timestampEl.getElement()); - } else { + } else if (ai != null) { ai.setAsserted(true); } http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/services/xkms/xkms-itests/src/test/resources/data/xkms/certificates/crls/wss40CACRL.cer ---------------------------------------------------------------------- diff --git a/services/xkms/xkms-itests/src/test/resources/data/xkms/certificates/crls/wss40CACRL.cer b/services/xkms/xkms-itests/src/test/resources/data/xkms/certificates/crls/wss40CACRL.cer index 44073b1..0d46cca 100644 Binary files a/services/xkms/xkms-itests/src/test/resources/data/xkms/certificates/crls/wss40CACRL.cer and b/services/xkms/xkms-itests/src/test/resources/data/xkms/certificates/crls/wss40CACRL.cer differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/services/xkms/xkms-itests/src/test/resources/data/xkms/certificates/wss40.cer ---------------------------------------------------------------------- diff --git a/services/xkms/xkms-itests/src/test/resources/data/xkms/certificates/wss40.cer b/services/xkms/xkms-itests/src/test/resources/data/xkms/certificates/wss40.cer index 955322b..f916206 100644 Binary files a/services/xkms/xkms-itests/src/test/resources/data/xkms/certificates/wss40.cer and b/services/xkms/xkms-itests/src/test/resources/data/xkms/certificates/wss40.cer differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/services/xkms/xkms-itests/src/test/resources/data/xkms/certificates/wss40rev.cer ---------------------------------------------------------------------- diff --git a/services/xkms/xkms-itests/src/test/resources/data/xkms/certificates/wss40rev.cer b/services/xkms/xkms-itests/src/test/resources/data/xkms/certificates/wss40rev.cer index 0176460..ef2ff55 100644 Binary files a/services/xkms/xkms-itests/src/test/resources/data/xkms/certificates/wss40rev.cer and b/services/xkms/xkms-itests/src/test/resources/data/xkms/certificates/wss40rev.cer differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40.cer ---------------------------------------------------------------------- diff --git a/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40.cer b/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40.cer index 955322b..f916206 100644 Binary files a/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40.cer and b/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40.cer differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40CACRL.cer ---------------------------------------------------------------------- diff --git a/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40CACRL.cer b/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40CACRL.cer index 44073b1..0d46cca 100644 Binary files a/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40CACRL.cer and b/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40CACRL.cer differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40rev.cer ---------------------------------------------------------------------- diff --git a/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40rev.cer b/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40rev.cer index 0176460..ef2ff55 100644 Binary files a/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40rev.cer and b/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40rev.cer differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/transports/src/test/resources/keys/Bethal.cer ---------------------------------------------------------------------- diff --git a/systests/transports/src/test/resources/keys/Bethal.cer b/systests/transports/src/test/resources/keys/Bethal.cer deleted file mode 100644 index 5ca8252..0000000 Binary files a/systests/transports/src/test/resources/keys/Bethal.cer and /dev/null differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/transports/src/test/resources/keys/Bethal.jks ---------------------------------------------------------------------- diff --git a/systests/transports/src/test/resources/keys/Bethal.jks b/systests/transports/src/test/resources/keys/Bethal.jks index 2bf1a9a..8da2ad0 100644 Binary files a/systests/transports/src/test/resources/keys/Bethal.jks and b/systests/transports/src/test/resources/keys/Bethal.jks differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/transports/src/test/resources/keys/Bethal.p12 ---------------------------------------------------------------------- diff --git a/systests/transports/src/test/resources/keys/Bethal.p12 b/systests/transports/src/test/resources/keys/Bethal.p12 index c47515e..5b627c5 100644 Binary files a/systests/transports/src/test/resources/keys/Bethal.p12 and b/systests/transports/src/test/resources/keys/Bethal.p12 differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/transports/src/test/resources/keys/Gordy.cer ---------------------------------------------------------------------- diff --git a/systests/transports/src/test/resources/keys/Gordy.cer b/systests/transports/src/test/resources/keys/Gordy.cer deleted file mode 100644 index 6cabd2a..0000000 Binary files a/systests/transports/src/test/resources/keys/Gordy.cer and /dev/null differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/transports/src/test/resources/keys/Gordy.jks ---------------------------------------------------------------------- diff --git a/systests/transports/src/test/resources/keys/Gordy.jks b/systests/transports/src/test/resources/keys/Gordy.jks index b067db0..8fa8847 100644 Binary files a/systests/transports/src/test/resources/keys/Gordy.jks and b/systests/transports/src/test/resources/keys/Gordy.jks differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/transports/src/test/resources/keys/Morpit.jks ---------------------------------------------------------------------- diff --git a/systests/transports/src/test/resources/keys/Morpit.jks b/systests/transports/src/test/resources/keys/Morpit.jks index 95626a7..b179baf 100644 Binary files a/systests/transports/src/test/resources/keys/Morpit.jks and b/systests/transports/src/test/resources/keys/Morpit.jks differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/transports/src/test/resources/keys/Morpit.p12 ---------------------------------------------------------------------- diff --git a/systests/transports/src/test/resources/keys/Morpit.p12 b/systests/transports/src/test/resources/keys/Morpit.p12 index f37acff..b18c8ed 100644 Binary files a/systests/transports/src/test/resources/keys/Morpit.p12 and b/systests/transports/src/test/resources/keys/Morpit.p12 differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/transports/src/test/resources/keys/Poltim.cer ---------------------------------------------------------------------- diff --git a/systests/transports/src/test/resources/keys/Poltim.cer b/systests/transports/src/test/resources/keys/Poltim.cer deleted file mode 100644 index cfb2cc5..0000000 Binary files a/systests/transports/src/test/resources/keys/Poltim.cer and /dev/null differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/transports/src/test/resources/keys/Poltim.jks ---------------------------------------------------------------------- diff --git a/systests/transports/src/test/resources/keys/Poltim.jks b/systests/transports/src/test/resources/keys/Poltim.jks index 570e071..f3b3e68 100644 Binary files a/systests/transports/src/test/resources/keys/Poltim.jks and b/systests/transports/src/test/resources/keys/Poltim.jks differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/transports/src/test/resources/keys/Tarpin.cer ---------------------------------------------------------------------- diff --git a/systests/transports/src/test/resources/keys/Tarpin.cer b/systests/transports/src/test/resources/keys/Tarpin.cer deleted file mode 100644 index 37edcac..0000000 Binary files a/systests/transports/src/test/resources/keys/Tarpin.cer and /dev/null differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/transports/src/test/resources/keys/Tarpin.jks ---------------------------------------------------------------------- diff --git a/systests/transports/src/test/resources/keys/Tarpin.jks b/systests/transports/src/test/resources/keys/Tarpin.jks index 329af6a..cf1ceb6 100644 Binary files a/systests/transports/src/test/resources/keys/Tarpin.jks and b/systests/transports/src/test/resources/keys/Tarpin.jks differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/transports/src/test/resources/keys/Truststore.jks ---------------------------------------------------------------------- diff --git a/systests/transports/src/test/resources/keys/Truststore.jks b/systests/transports/src/test/resources/keys/Truststore.jks index e76a076..0abd848 100644 Binary files a/systests/transports/src/test/resources/keys/Truststore.jks and b/systests/transports/src/test/resources/keys/Truststore.jks differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/transports/src/test/resources/keys/Truststore.pem ---------------------------------------------------------------------- diff --git a/systests/transports/src/test/resources/keys/Truststore.pem b/systests/transports/src/test/resources/keys/Truststore.pem index 1b25477..c04eaf8 100644 --- a/systests/transports/src/test/resources/keys/Truststore.pem +++ b/systests/transports/src/test/resources/keys/Truststore.pem @@ -1,60 +1,86 @@ -----BEGIN CERTIFICATE----- -MIICIDCCAYkCBEYRaYcwDQYJKoZIhvcNAQEEBQAwVzELMAkGA1UEBhMCVVMxETAPBgNVBAcTCFN5 -cmFjdXNlMRMwEQYDVQQKEwpBcGFjaGVUZXN0MQ8wDQYDVQQLEwZCZXRoYWwxDzANBgNVBAMTBkJl -dGhhbDAeFw0wNzA0MDIyMDM3MjdaFw0zNDA4MTgyMDM3MjdaMFcxCzAJBgNVBAYTAlVTMREwDwYD -VQQHEwhTeXJhY3VzZTETMBEGA1UEChMKQXBhY2hlVGVzdDEPMA0GA1UECxMGQmV0aGFsMQ8wDQYD -VQQDEwZCZXRoYWwwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAJHOyFu8tTt4g9tBv0bY8c4K -uidfMlHbFQAukIFXLkR4xu5IxG5OI53ZE0F6rqcPFve1sdEV9h+MxmzqQbo180Wyv1rUEq2AScK3 -6bo0ALuZsreQQmNVGBOjxBpTtrRErRfNJe1mvzNMz9VlGdSNWW17CrBz9kmz6G1EWg8aGfZHAgMB -AAEwDQYJKoZIhvcNAQEEBQADgYEAbw+VwP1tnBm3cFLFgONnGCozN8XqV2M0OklJ5lBDJL7BV2Ng -BtTZ8as9jTGYdjetKQXX75wWL7OS7vnkm/9tbr/vNBljT0OP0Yr2X7TAbDdhFfsk/D5mBpXdzXz2 -wqxVZjj6sm5zvwC32e4AxGG0edmY1DN9VMZzA/FrzBP0qoE= +MIIDSTCCAjGgAwIBAgIEGFcAsjANBgkqhkiG9w0BAQsFADBVMQswCQYDVQQGEwJVUzERMA8GA1UE +BxMIU3lyYWN1c2UxEzARBgNVBAoTCkFwYWNoZVRlc3QxDjAMBgNVBAsTBUdvcmR5MQ4wDAYDVQQD +EwVHb3JkeTAeFw0xNTA5MDkxNTUyMzRaFw0yNTA5MDYxNTUyMzRaMFUxCzAJBgNVBAYTAlVTMREw +DwYDVQQHEwhTeXJhY3VzZTETMBEGA1UEChMKQXBhY2hlVGVzdDEOMAwGA1UECxMFR29yZHkxDjAM +BgNVBAMTBUdvcmR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuVubnwltwu38Slqe +ANXNBFkWQ3PV4n/T5tU1PLrkg+g7AEOtaWn/3TDfcxYovDF/TWnkwcYeYDeILdXcLJgoa0mhMO2n +46JrR3NpLM5jBtw0NVBeBR+HuFfbdlLIABgD90+aalm4kB0Fq8BO1moP4NnbxccSl2vLdP6u9oLE +xXDog+FpHfwffKvgnyDh0Mc3lYJ7dJpwQNOmPO8docyePR53IbQuAXL8C5rYc+OHU/smj4rvwqP9 +S5zj/yOpl+7tTAq+0kLJetHJ03Cb+KVhpl6Gn/80a5DGjm7c1gAzlEwQpxltY0PkD62WJhPsVOkW +CtRhvUNWrxq+68i460m4ZwIDAQABoyEwHzAdBgNVHQ4EFgQUSYfZ7HYvl7iTrZaoOOwXMbR80Fow +DQYJKoZIhvcNAQELBQADggEBAAFJpi0Fu74YK0TZk96ApCgGXKU4+CyRtk5OyBeYUN746ImacDO8 +Qg2idSnOAw08sEZGN0RQnHec9r/3dhIZvULf00uDLybhN+Q9ErqI2seooJo4oF0fsd3gR4jJIU5K +fVL8UJ0mSqUVMyH7oklyN0e3btKgAjY24ycNt+WTXaX0e1K7phsX0vNc9WMp1ZQN9NjozWXW0mte +5FsrjiFAdnbRx8Bsj4E25ZkyplibBqDnKmlQxl+VDk1QEdignRexdJIBsjRguJfdyl6u//fSRhp0 +GMFO9ovDEyegHf0ZnWJthq4egYTMLmkzReE2neQDzuN8zYoZLTngbA3ynP+Ghgc= -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- -MIICHDCCAYUCBEYRaYkwDQYJKoZIhvcNAQEEBQAwVTELMAkGA1UEBhMCVVMxETAPBgNVBAcTCFN5 -cmFjdXNlMRMwEQYDVQQKEwpBcGFjaGVUZXN0MQ4wDAYDVQQLEwVHb3JkeTEOMAwGA1UEAxMFR29y -ZHkwHhcNMDcwNDAyMjAzNzI5WhcNMzQwODE4MjAzNzI5WjBVMQswCQYDVQQGEwJVUzERMA8GA1UE -BxMIU3lyYWN1c2UxEzARBgNVBAoTCkFwYWNoZVRlc3QxDjAMBgNVBAsTBUdvcmR5MQ4wDAYDVQQD -EwVHb3JkeTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAqIbNth+G4Q5tkZvoUZdQsY9RnjAA -mgKVBUaOVvv//qOniOTskLqBFyKGoMpbCfNAU7/zVKP5fLTLccLdJyCagKGrs1ZmKaNiTRcOnfkE -3dHnEIp83+hNmASGsrZcyLihtro1N3pMTuXbXzu7x3F2U7fxYFg66iviTEGF6T7dY3MCAwEAATAN -BgkqhkiG9w0BAQQFAAOBgQBPjsYFdqz0JF9shNpvke/H1eHqhyXJgPdHdCu/ewRO2wV6I9WBrGNU -cmmKZmAUsv99Y0Tpz59uEXFcM3cBZU4/obw3DlwwWmaVMoIwQ2Nd2FChC6uyKIJ0Bvpx+aDxjm48 -b8c58EHCcU2FRo/nVWctJL9xJ7oBrke5GZrBlUF+rA== +MIIDTTCCAjWgAwIBAgIEOEaECjANBgkqhkiG9w0BAQsFADBXMQswCQYDVQQGEwJVUzERMA8GA1UE +BxMIU3lyYWN1c2UxEzARBgNVBAoTCkFwYWNoZVRlc3QxDzANBgNVBAsTBkJldGhhbDEPMA0GA1UE +AxMGQmV0aGFsMB4XDTE1MDkwOTE1NTIwN1oXDTI1MDkwNjE1NTIwN1owVzELMAkGA1UEBhMCVVMx +ETAPBgNVBAcTCFN5cmFjdXNlMRMwEQYDVQQKEwpBcGFjaGVUZXN0MQ8wDQYDVQQLEwZCZXRoYWwx +DzANBgNVBAMTBkJldGhhbDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMxgwx2lxVDL +teM15IOsdgBGff42ozTaLVjr30qHsREbnZrk+1G8KscUtVYUwtCDCEErz64tu/TY2jskUi54q1j2 +tOXCz0awxDRKbE4ddyvnqSqItYC9nB+T/LLFJ65bqyleRbO+Zsqj4Gi+8lGmzgk0kCLoCJ9LTrpt +VzsHHuBsvEkcBHEX8in5umzbTy6y1jq3zsUdclgA/EV4eyvFd5+8J8XiB6Ac4q7qYJdUaOrDKk5X +Ns05WuzW3hP/qXDpmyxgS1GQLBMj8yuopVR7/FuGCeDBSJe60cyWtDTxosjTLwjTEYIEB/ySIcgK +0TU+QxU8XEwwutjMzecKd9PQdpMCAwEAAaMhMB8wHQYDVR0OBBYEFDWt03QU4rqQa91UjYCNkfx0 +tp3HMA0GCSqGSIb3DQEBCwUAA4IBAQCwObHeIssS3e1INNs67T2g0v17Z1+HDEx65dfwph6Wxbex +hb9yNKEXFUIUk+Z6ZzTmv1fc4DBZ2z0Nbk8rrS2BD6kojWVRwZVnv6pfPDjU82mFL7kHztiNPq8u +23+lTrhO9HjuQZtVnTW3+Uw9RW5mBu+8QVgze0Q1DjL5PqX3YHq16LCYp6vVjdm0o7fKDQke2Z01 +a4hYtUF17m/Sw6319ocSI2fRA2ppQ7Ts8J3GSkAyygSR52mqaC7jDgD2Oh1eRhRaTgiyxLNLnAHu +Koxbcr3sGFP2ZYwtP9DlhxwZzzpPcNWwFMqcQ79WPKmRvBMNOQDBdW77P3cxG3DF5KkO -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- -MIICNDCCAZ0CBEYRaY4wDQYJKoZIhvcNAQEEBQAwYTELMAkGA1UEBhMCVVMxETAPBgNVBAcTCFN5 -cmFjdXNlMRMwEQYDVQQKEwpBcGFjaGVUZXN0MQ8wDQYDVQQLEwZNb3JwaXQxGTAXBgNVBAMTEHdo -YXRldmVyaG9zdC5jb20wHhcNMDcwNDAyMjAzNzM0WhcNMzQwODE4MjAzNzM0WjBhMQswCQYDVQQG -EwJVUzERMA8GA1UEBxMIU3lyYWN1c2UxEzARBgNVBAoTCkFwYWNoZVRlc3QxDzANBgNVBAsTBk1v -cnBpdDEZMBcGA1UEAxMQd2hhdGV2ZXJob3N0LmNvbTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkC -gYEAk4FbJxfjllrApiECK5oRbgmTC1exx59HWck20R2AYU6kIkdZa78Ca+oc/zaPCtsVL/QZbjHE -7lnvVK55tnpGW9qzLxsAHZmYyA/4Wdmcbz/Niwsfm062z94+AKMCGum/1Ug1QZUiRKweZTRBHhmT -VsxSDEGTTi6UVim6nv47ZlcCAwEAATANBgkqhkiG9w0BAQQFAAOBgQAjWR/W+YO0I5sBlb+zNTbJ -TPs4CqM4UHQS+prOx59R134FbocgkGncm00FBrO857KJHdSCRjOUUpc3S+MP13FGqSQm2Q0lNjUV -IygvdZ+BATfgsJ92NbnuIhIVAA+i8AVZK//qPRCMz1Rdm1G994qCw3A4lQMi5eqKYYwqkRJeXw== +MIIDYTCCAkmgAwIBAgIEDV+5sjANBgkqhkiG9w0BAQsFADBhMQswCQYDVQQGEwJVUzERMA8GA1UE +BxMIU3lyYWN1c2UxEzARBgNVBAoTCkFwYWNoZVRlc3QxDzANBgNVBAsTBk1vcnBpdDEZMBcGA1UE +AxMQd2hhdGV2ZXJob3N0LmNvbTAeFw0xNTA5MDkxNTUzMTRaFw0yNTA5MDYxNTUzMTRaMGExCzAJ +BgNVBAYTAlVTMREwDwYDVQQHEwhTeXJhY3VzZTETMBEGA1UEChMKQXBhY2hlVGVzdDEPMA0GA1UE +CxMGTW9ycGl0MRkwFwYDVQQDExB3aGF0ZXZlcmhvc3QuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOC +AQ8AMIIBCgKCAQEAjKod4Ne5+B5rPhvl7Dt7//O1fRZYw5GACCgTG6F2Cy8ozF7lfQo7jy3KTjrC +xOkty6IUxcll5EKZQBfsqfKq2beEWI+tG//ZEfc1paK+4HGrqARtFXYm/azzEC8E66cVKRIej8DM +yXPHvNsSSN/T7c5QCMBAd5p+uQFCGkHcX6ywiCu5hOBDhxBTr3680lRIOjBoICd3ytlT8pnHqjm7 +VexiG5sPg32f90Tf1UCJQL41Jn1miow4xLjDw0L9pCcoLtoh1jjOwErwISeTXtfp0zMAZ1T0Cwmu +DQCL2Ek0ysmoDSQlpwL/zi/9XzeZCUY9a4KK2DV6q1WNnGJq6pMu0QIDAQABoyEwHzAdBgNVHQ4E +FgQULNllc99it0vTugh22XKUn7H3zUkwDQYJKoZIhvcNAQELBQADggEBAFnOo+ghsy59M25gjVBG +82siBQkhgl0eSzp/wVqa41F/KCY5hY8moKZARelNgOFQQxRpK6gBhj53TjF7B0w834r3S30F37qA +d+T7yfH9drN5I4mNeTHpxPKeI1KJneZUqKt1PR1iZScwPzHHIfUWRiZ8ilJwNNy2MoZONKh7lhf4 +ILfYclRmMu7UJfb2gFjvTnzUwS5YJ8U0H5EYy7oHZS+7q3GXuL953tFypr1m0kvDYW4kYwyhHRZE +XcDvDWvmO83BIk1AOQhzQ4ak4JLBpVQJnrPBhGUZOUAmIuRoV9If5WfvjVymH13VuAKoPJR3902u +Gul/3Uq+ifNDF8btPpw= -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- -MIICIDCCAYkCBEYRaYwwDQYJKoZIhvcNAQEEBQAwVzELMAkGA1UEBhMCVVMxETAPBgNVBAcTCFN5 -cmFjdXNlMRMwEQYDVQQKEwpBcGFjaGVUZXN0MQ8wDQYDVQQLEwZQb2x0aW0xDzANBgNVBAMTBlBv -bHRpbTAeFw0wNzA0MDIyMDM3MzJaFw0zNDA4MTgyMDM3MzJaMFcxCzAJBgNVBAYTAlVTMREwDwYD -VQQHEwhTeXJhY3VzZTETMBEGA1UEChMKQXBhY2hlVGVzdDEPMA0GA1UECxMGUG9sdGltMQ8wDQYD -VQQDEwZQb2x0aW0wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAL/bdivrpaR4Njvo7WB4ipEh -422V2bAyapFvgOq/tHusGR/e3wH0v9g+9xwnNyqFjhueceuWahXAvNHvknuUaelW0346Aay0fBAu -EsyowWBTVi/pU+iZleN9FD8uBalY1s6e+xqu+yckhHuBP77TcTar1hBjCIfy2Eo2YevDL6qlAgMB -AAEwDQYJKoZIhvcNAQEEBQADgYEAuT7QoNfGG7GjfQuU/oYj5vHPH7nPhLtkQBVTEi0WyzgJUXie -rNG/u4VEZtNtK4+4J5tQyb4YtP2GPUUpWrhusKUaW4eMU79rzpUbZnGUBzTbth8kBoN9xHzXiSop -ohPdOnGo5ZjThZnLEn/o9doUEX64o4eauu15SPoDLzSfLJ0= +MIIDTTCCAjWgAwIBAgIEOHEczzANBgkqhkiG9w0BAQsFADBXMQswCQYDVQQGEwJVUzERMA8GA1UE +BxMIU3lyYWN1c2UxEzARBgNVBAoTCkFwYWNoZVRlc3QxDzANBgNVBAsTBlRhcnBpbjEPMA0GA1UE +AxMGVGFycGluMB4XDTE1MDkwOTE1NTA1M1oXDTI1MDkwNjE1NTA1M1owVzELMAkGA1UEBhMCVVMx +ETAPBgNVBAcTCFN5cmFjdXNlMRMwEQYDVQQKEwpBcGFjaGVUZXN0MQ8wDQYDVQQLEwZUYXJwaW4x +DzANBgNVBAMTBlRhcnBpbjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJlWtQr06Soq +QwTIKgvrLXxcqs/i6FNep3OF5nhzi4K7GOuV88UTyD3TBCFOF/sOtnVfR+mPPSfWe0z+avMKsRiw +szzak+w2eM9cOBofO+3Ag1i9mQLpkjmkMHxflZ45C0GPcwnU/BekOKZvJ0OcJYZU6S8wszpGPinv +OPeN1V56Wj3ud/lLR3Ll14G4QdbOxbS6tstJ+olL7Xtz7CfARqCNEjGbKx4VceiIjraheqKM0kLE +RpdQ0DBgefGEI41BW1wogg92t6PQ6Em1RYeu97pDppSYoA/RYBW5xIDj7vz7aTVY6RaHZwAGNF+1 +Yzj8PVgV7Ppgf5VIhcIFiTyaUuECAwEAAaMhMB8wHQYDVR0OBBYEFMhTmGMuJOrPNTUCjKuRLGQ9 +la4gMA0GCSqGSIb3DQEBCwUAA4IBAQA86Rqp0xrNYb/M7dfk8SzVLaCMPyTslnhiZOVIWwQScwu8 +xqfiDXGg1000r/3N9/ACduiMwwmxYRT3OZOK8DhsHsmQXbY1vTBUEAQ3hx+mV7dPMi3WtmdU4vz6 +KtLPbl3G0803Jujxe0qcFk6FzOhlIiqd0jBRQqvMFWqzzRXDjhy64uLeVY2fNtX9w/b3xWUTL1kI +mR8SpQnOdWunLqZLrksnuzVGU/hutD11ge0JOQRKHhTBoLBSpqGD8PPTjJipR0p7JII8KI8LbDI6 +YesmuRQmkEbpCMqM5FGVjN7VLeLjRSWcf5dT056WjErd/1zRNFrC0Jjf++g37arTOLQn -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- -MIICIDCCAYkCBEYRaYswDQYJKoZIhvcNAQEEBQAwVzELMAkGA1UEBhMCVVMxETAPBgNVBAcTCFN5 -cmFjdXNlMRMwEQYDVQQKEwpBcGFjaGVUZXN0MQ8wDQYDVQQLEwZUYXJwaW4xDzANBgNVBAMTBlRh -cnBpbjAeFw0wNzA0MDIyMDM3MzFaFw0zNDA4MTgyMDM3MzFaMFcxCzAJBgNVBAYTAlVTMREwDwYD -VQQHEwhTeXJhY3VzZTETMBEGA1UEChMKQXBhY2hlVGVzdDEPMA0GA1UECxMGVGFycGluMQ8wDQYD -VQQDEwZUYXJwaW4wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKGG8UtWnHyWKFVDJSuSlhT/ -vKxrPjfNBtvdaiQx5gNAlc8QVL5lPOXcJljTF3dEb0QQ1ajai3kC71NE2ABOrxk7Jvk3bEma5Yfy -U3m/OBthL9H8kE3O3+bh4K2LTsRwIa2Zd1wYbj44vUxsiHhzxer3q3FDfLxsqtahsxz7WjG1AgMB -AAEwDQYJKoZIhvcNAQEEBQADgYEAE6EWRbYxGOlwmtpv0XE4FwbXYdSDArc+ArhOJWKTzoE3U9l8 -kg1wJL49VXEmVIxpipXKs7d9lpIVLPFsbBVJRZwH8sgHE39nTjfeyHNmwZcd63Lrn+2RydkAo5P9 -FYi8HFGEM5dON4PSo3Et6ycHy1IrS8htrNu+FoW84FRTKDA= +MIIDTTCCAjWgAwIBAgIEUgxbaTANBgkqhkiG9w0BAQsFADBXMQswCQYDVQQGEwJVUzERMA8GA1UE +BxMIU3lyYWN1c2UxEzARBgNVBAoTCkFwYWNoZVRlc3QxDzANBgNVBAsTBlBvbHRpbTEPMA0GA1UE +AxMGUG9sdGltMB4XDTE1MDkwOTE1NTM0NFoXDTI1MDkwNjE1NTM0NFowVzELMAkGA1UEBhMCVVMx +ETAPBgNVBAcTCFN5cmFjdXNlMRMwEQYDVQQKEwpBcGFjaGVUZXN0MQ8wDQYDVQQLEwZQb2x0aW0x +DzANBgNVBAMTBlBvbHRpbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKxyUZCjOaVe +IpptbRbdr9Ki+3W/n2G6jmEOp3LJGtQC6JbAh1IprMpC6nbWwp/W0nnBXyCpevYk6Dj5VtLV0NU/ +1pLnzaS5E/EhZKmxL2PXpMozH7js3FsP/8j9FflvIhhMybSa3otw9tmBf1+Tc6mGlcDsZlHRju91 +WdVMRUVEsOBhNPZccKRTd2QK0H83kYSXMrcGc7dmtuWUWzavbVXdq20+UrV6V8Z/aW/Um270d3Zj +9VFw6Ax4m0IlCmPM7OA/ONA/gzmsT5BVu0EueE4s9RtXCvK+vR+l2o1fwHW0gtIkQShvR8RBGZjf +9onepE27U/Uya/+CxQWb3K17g+kCAwEAAaMhMB8wHQYDVR0OBBYEFKI4clFM35A+xunrsFmmuN8i +Rc/gMA0GCSqGSIb3DQEBCwUAA4IBAQCceUMhVspIAMhA4JMdXgdowWhVEY9vhKJhoILRQ4wdorLs +pQrUZMBxB7juJ2RdOCO+17Y2gYJi4F1HYaPn0q70iZQRAH4AxiSGPpKD9Qxgs4wIHZgzZ5NwCkko +AXmSM+SyNiDDZBFd01120gmw40Ly8/3HcDR/um6/kx/YAKgJhc6fDGpzQOrLnoTxeyVV1twAmA+R +PcrmRA6NAS8baWlzUXAYu8pq/xTOl77niKdAvndmtmlEDmsj0BXeXeCURRVODYU8cMTueudHjois +tj5C6jX6xjGz1/XcXUaZX5Lr34GixSwJRzabrrGYl7S2sKHmEBUUoB4hortyb2Ufedg+ -----END CERTIFICATE----- http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/ws-security/src/test/java/org/apache/cxf/systest/ws/security/SecurityPolicyTest.java ---------------------------------------------------------------------- diff --git a/systests/ws-security/src/test/java/org/apache/cxf/systest/ws/security/SecurityPolicyTest.java b/systests/ws-security/src/test/java/org/apache/cxf/systest/ws/security/SecurityPolicyTest.java index 880c058..4ab13d7 100644 --- a/systests/ws-security/src/test/java/org/apache/cxf/systest/ws/security/SecurityPolicyTest.java +++ b/systests/ws-security/src/test/java/org/apache/cxf/systest/ws/security/SecurityPolicyTest.java @@ -206,10 +206,8 @@ public class SecurityPolicyTest extends AbstractBusClientServerTestBase { private static void setCryptoProperties(EndpointInfo ei, String sigProps, String encProps) { ei.setProperty(SecurityConstants.CALLBACK_HANDLER, new KeystorePasswordCallback()); - ei.setProperty(SecurityConstants.SIGNATURE_PROPERTIES, - SecurityPolicyTest.class.getResource(sigProps).toString()); - ei.setProperty(SecurityConstants.ENCRYPT_PROPERTIES, - SecurityPolicyTest.class.getResource(encProps).toString()); + ei.setProperty(SecurityConstants.SIGNATURE_PROPERTIES, sigProps); + ei.setProperty(SecurityConstants.ENCRYPT_PROPERTIES, encProps); } @Test @@ -233,9 +231,9 @@ public class SecurityPolicyTest extends AbstractBusClientServerTestBase { ((BindingProvider)pt).getRequestContext().put(SecurityConstants.CALLBACK_HANDLER, new KeystorePasswordCallback()); ((BindingProvider)pt).getRequestContext().put(SecurityConstants.SIGNATURE_PROPERTIES, - getClass().getResource("alice.properties")); + "alice.properties"); ((BindingProvider)pt).getRequestContext().put(SecurityConstants.ENCRYPT_PROPERTIES, - getClass().getResource("bob.properties")); + "bob.properties"); assertEquals(10, pt.doubleIt(5)); ((java.io.Closeable)pt).close(); @@ -245,9 +243,9 @@ public class SecurityPolicyTest extends AbstractBusClientServerTestBase { ((BindingProvider)pt).getRequestContext().put(SecurityConstants.CALLBACK_HANDLER, new KeystorePasswordCallback()); ((BindingProvider)pt).getRequestContext().put(SecurityConstants.SIGNATURE_PROPERTIES, - getClass().getResource("alice.properties")); + "alice.properties"); ((BindingProvider)pt).getRequestContext().put(SecurityConstants.ENCRYPT_PROPERTIES, - getClass().getResource("bob.properties")); + "bob.properties"); // DOM pt.doubleIt(5); @@ -264,9 +262,9 @@ public class SecurityPolicyTest extends AbstractBusClientServerTestBase { ((BindingProvider)pt).getRequestContext().put(SecurityConstants.CALLBACK_HANDLER, new KeystorePasswordCallback()); ((BindingProvider)pt).getRequestContext().put(SecurityConstants.SIGNATURE_PROPERTIES, - getClass().getResource("alice.properties")); + "alice.properties"); ((BindingProvider)pt).getRequestContext().put(SecurityConstants.ENCRYPT_PROPERTIES, - getClass().getResource("bob.properties")); + "bob.properties"); // DOM pt.doubleIt(5); @@ -282,9 +280,9 @@ public class SecurityPolicyTest extends AbstractBusClientServerTestBase { ((BindingProvider)pt).getRequestContext().put(SecurityConstants.CALLBACK_HANDLER, new KeystorePasswordCallback()); ((BindingProvider)pt).getRequestContext().put(SecurityConstants.SIGNATURE_PROPERTIES, - getClass().getResource("alice.properties")); + "alice.properties"); ((BindingProvider)pt).getRequestContext().put(SecurityConstants.ENCRYPT_PROPERTIES, - getClass().getResource("bob.properties")); + "bob.properties"); // DOM pt.doubleIt(5); @@ -356,9 +354,9 @@ public class SecurityPolicyTest extends AbstractBusClientServerTestBase { ((BindingProvider)pt).getRequestContext().put(SecurityConstants.CALLBACK_HANDLER, new KeystorePasswordCallback()); ((BindingProvider)pt).getRequestContext().put(SecurityConstants.SIGNATURE_PROPERTIES, - getClass().getResource("alice.properties")); + "alice.properties"); ((BindingProvider)pt).getRequestContext().put(SecurityConstants.ENCRYPT_PROPERTIES, - getClass().getResource("bob.properties")); + "bob.properties"); //This should work as it should be properly signed. // DOM @@ -415,9 +413,9 @@ public class SecurityPolicyTest extends AbstractBusClientServerTestBase { disp.getRequestContext().put(SecurityConstants.CALLBACK_HANDLER, new KeystorePasswordCallback()); disp.getRequestContext().put(SecurityConstants.SIGNATURE_PROPERTIES, - getClass().getResource("alice.properties")); + "alice.properties"); disp.getRequestContext().put(SecurityConstants.ENCRYPT_PROPERTIES, - getClass().getResource("bob.properties")); + "bob.properties"); updateAddressPort(disp, PORT); String req = "<ns2:DoubleIt xmlns:ns2=\"http://www.example.org/schema/DoubleIt\">" @@ -490,9 +488,9 @@ public class SecurityPolicyTest extends AbstractBusClientServerTestBase { ((BindingProvider)pt).getRequestContext().put(SecurityConstants.CALLBACK_HANDLER, new KeystorePasswordCallback()); ((BindingProvider)pt).getRequestContext().put(SecurityConstants.SIGNATURE_PROPERTIES, - getClass().getResource("alice.properties")); + "alice.properties"); ((BindingProvider)pt).getRequestContext().put(SecurityConstants.ENCRYPT_PROPERTIES, - getClass().getResource("bob.properties")); + "bob.properties"); // DOM assertEquals(10, pt.doubleIt(5)); @@ -525,9 +523,9 @@ public class SecurityPolicyTest extends AbstractBusClientServerTestBase { ((BindingProvider)pt).getRequestContext().put(SecurityConstants.CALLBACK_HANDLER, new KeystorePasswordCallback()); ((BindingProvider)pt).getRequestContext().put(SecurityConstants.SIGNATURE_PROPERTIES, - getClass().getResource("alice.properties")); + "alice.properties"); ((BindingProvider)pt).getRequestContext().put(SecurityConstants.ENCRYPT_PROPERTIES, - getClass().getResource("alice.properties")); + "alice.properties"); // DOM assertEquals(10, pt.doubleIt(5)); @@ -560,9 +558,9 @@ public class SecurityPolicyTest extends AbstractBusClientServerTestBase { ((BindingProvider)pt).getRequestContext().put(SecurityConstants.CALLBACK_HANDLER, new KeystorePasswordCallback()); ((BindingProvider)pt).getRequestContext().put(SecurityConstants.SIGNATURE_PROPERTIES, - getClass().getResource("alice.properties")); + "alice.properties"); ((BindingProvider)pt).getRequestContext().put(SecurityConstants.ENCRYPT_PROPERTIES, - getClass().getResource("alice.properties")); + "alice.properties"); DoubleIt di = new DoubleIt(); di.setNumberToDouble(5); @@ -592,9 +590,9 @@ public class SecurityPolicyTest extends AbstractBusClientServerTestBase { ((BindingProvider)pt).getRequestContext().put(SecurityConstants.CALLBACK_HANDLER, new KeystorePasswordCallback()); ((BindingProvider)pt).getRequestContext().put(SecurityConstants.SIGNATURE_PROPERTIES, - getClass().getResource("alice.properties")); + "alice.properties"); ((BindingProvider)pt).getRequestContext().put(SecurityConstants.ENCRYPT_PROPERTIES, - getClass().getResource("revocation.properties")); + "revocation.properties"); ((BindingProvider)pt).getRequestContext().put(SecurityConstants.ENABLE_REVOCATION, "true"); @@ -640,9 +638,9 @@ public class SecurityPolicyTest extends AbstractBusClientServerTestBase { ((BindingProvider)pt).getRequestContext().put(SecurityConstants.CALLBACK_HANDLER, new KeystorePasswordCallback()); ((BindingProvider)pt).getRequestContext().put(SecurityConstants.SIGNATURE_PROPERTIES, - getClass().getResource("revocation.properties")); + "revocation.properties"); ((BindingProvider)pt).getRequestContext().put(SecurityConstants.ENCRYPT_PROPERTIES, - getClass().getResource("bob.properties")); + "bob.properties"); // DOM try { pt.doubleIt(5); http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Bethal.cer ---------------------------------------------------------------------- diff --git a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Bethal.cer b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Bethal.cer deleted file mode 100644 index 5ca8252..0000000 Binary files a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Bethal.cer and /dev/null differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Bethal.cxf ---------------------------------------------------------------------- diff --git a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Bethal.cxf b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Bethal.cxf deleted file mode 100644 index d8d3f75..0000000 --- a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Bethal.cxf +++ /dev/null @@ -1,83 +0,0 @@ -<?xml version="1.0" encoding="UTF-8"?> -<!-- - Licensed to the Apache Software Foundation (ASF) under one - or more contributor license agreements. See the NOTICE file - distributed with this work for additional information - regarding copyright ownership. The ASF licenses this file - to you under the Apache License, Version 2.0 (the - "License"); you may not use this file except in compliance - with the License. You may obtain a copy of the License at - - http://www.apache.org/licenses/LICENSE-2.0 - - Unless required by applicable law or agreed to in writing, - software distributed under the License is distributed on an - "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY - KIND, either express or implied. See the License for the - specific language governing permissions and limitations - under the License. ---> - -<!-- - ** This file configures the Bethal Server. - ** It is an https server that conditionally responds - ** with 401s. - --> - -<beans xmlns="http://www.springframework.org/schema/beans" - xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" - xmlns:sec="http://cxf.apache.org/configuration/security" - xmlns:http="http://cxf.apache.org/transports/http/configuration" - xmlns:httpj="http://cxf.apache.org/transports/http-jetty/configuration" - xmlns:cxf="http://cxf.apache.org/core" - xmlns:jaxws="http://java.sun.com/xml/ns/jaxws" - xsi:schemaLocation=" - http://cxf.apache.org/configuration/security - http://cxf.apache.org/schemas/configuration/security.xsd - http://cxf.apache.org/core http://cxf.apache.org/schemas/core.xsd - http://cxf.apache.org/transports/http/configuration - http://cxf.apache.org/schemas/configuration/http-conf.xsd - http://cxf.apache.org/transports/http-jetty/configuration - http://cxf.apache.org/schemas/configuration/http-jetty.xsd - http://www.springframework.org/schema/beans - http://www.springframework.org/schema/beans/spring-beans.xsd"> - - <http:destination - name="{http://apache.org/hello_world}Bethal.http-destination"> - </http:destination> - - <httpj:engine-factory bus="cxf"> - <httpj:engine port="9002"> - <httpj:tlsServerParameters> - <sec:keyManagers keyPassword="password"> - <sec:keyStore type="JKS" password="password" - file="src/test/java/org/apache/cxf/systest/http/resources/Bethal.jks"/> - </sec:keyManagers> - <sec:trustManagers> - <sec:keyStore type="JKS" password="password" - file="src/test/java/org/apache/cxf/systest/http/resources/Truststore.jks"/> - </sec:trustManagers> - <sec:cipherSuitesFilter> - <!-- these filters ensure that a ciphersuite with - export-suitable or null encryption is used, - but exclude anonymous Diffie-Hellman key change as - this is vulnerable to man-in-the-middle attacks --> - <sec:include>.*_EXPORT_.*</sec:include> - <sec:include>.*_EXPORT1024_.*</sec:include> - <sec:include>.*_WITH_DES_.*</sec:include> - <sec:include>.*_WITH_AES_.*</sec:include> - <sec:include>.*_WITH_NULL_.*</sec:include> - <sec:exclude>.*_DH_anon_.*</sec:exclude> - </sec:cipherSuitesFilter> - <sec:clientAuthentication want="true" required="true"/> - </httpj:tlsServerParameters> - </httpj:engine> - </httpj:engine-factory> - - <cxf:bus> - <cxf:inInterceptors> - <bean class="org.apache.cxf.systest.http.PushBack401"/> - </cxf:inInterceptors> - </cxf:bus> - -</beans> http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Bethal.jks ---------------------------------------------------------------------- diff --git a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Bethal.jks b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Bethal.jks index 2bf1a9a..8da2ad0 100644 Binary files a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Bethal.jks and b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Bethal.jks differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Bethal.p12 ---------------------------------------------------------------------- diff --git a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Bethal.p12 b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Bethal.p12 deleted file mode 100644 index c47515e..0000000 Binary files a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Bethal.p12 and /dev/null differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/DoubleIt.wsdl ---------------------------------------------------------------------- diff --git a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/DoubleIt.wsdl b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/DoubleIt.wsdl index 30408d0..f478fa6 100644 --- a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/DoubleIt.wsdl +++ b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/DoubleIt.wsdl @@ -330,7 +330,7 @@ <wsp:Policy> <sp:X509Token sp:IncludeToken="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy/IncludeToken/AlwaysToRecipient"> <wsp:Policy> - <sp:WssX509V1Token11/> + <sp:WssX509V3Token11/> </wsp:Policy> </sp:X509Token> </wsp:Policy> @@ -339,7 +339,7 @@ <wsp:Policy> <sp:X509Token sp:IncludeToken="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy/IncludeToken/Never"> <wsp:Policy> - <sp:WssX509V1Token11/> + <sp:WssX509V3Token11/> </wsp:Policy> </sp:X509Token> </wsp:Policy> @@ -384,7 +384,7 @@ <wsp:Policy> <sp:X509Token sp:IncludeToken="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy/IncludeToken/AlwaysToRecipient"> <wsp:Policy> - <sp:WssX509V1Token11/> + <sp:WssX509V3Token11/> </wsp:Policy> </sp:X509Token> </wsp:Policy> @@ -393,7 +393,7 @@ <wsp:Policy> <sp:X509Token sp:IncludeToken="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy/IncludeToken/Never"> <wsp:Policy> - <sp:WssX509V1Token11/> + <sp:WssX509V3Token11/> </wsp:Policy> </sp:X509Token> </wsp:Policy> @@ -438,7 +438,7 @@ <wsp:Policy> <sp:X509Token sp:IncludeToken="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy/IncludeToken/AlwaysToRecipient"> <wsp:Policy> - <sp:WssX509V1Token11/> + <sp:WssX509V3Token11/> </wsp:Policy> </sp:X509Token> </wsp:Policy> @@ -447,7 +447,7 @@ <wsp:Policy> <sp:X509Token sp:IncludeToken="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy/IncludeToken/Always"> <wsp:Policy> - <sp:WssX509V1Token11/> + <sp:WssX509V3Token11/> </wsp:Policy> </sp:X509Token> </wsp:Policy> @@ -485,7 +485,7 @@ <wsp:Policy> <sp:X509Token sp:IncludeToken="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702/IncludeToken/AlwaysToRecipient"> <wsp:Policy> - <sp:WssX509V1Token11/> + <sp:WssX509V3Token11/> </wsp:Policy> </sp:X509Token> </wsp:Policy> @@ -527,7 +527,7 @@ <wsp:Policy> <sp:X509Token sp:IncludeToken="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy/IncludeToken/AlwaysToRecipient"> <wsp:Policy> - <sp:WssX509V1Token11/> + <sp:WssX509V3Token11/> <sp:RequireThumbprintReference/> <!-- needed for V1 certs --> </wsp:Policy> @@ -538,7 +538,7 @@ <wsp:Policy> <sp:X509Token sp:IncludeToken="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy/IncludeToken/Always"> <wsp:Policy> - <sp:WssX509V1Token11/> + <sp:WssX509V3Token11/> <sp:RequireThumbprintReference/> </wsp:Policy> </sp:X509Token> @@ -759,7 +759,7 @@ <wsp:Policy> <sp:X509Token sp:IncludeToken="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy/IncludeToken/AlwaysToRecipient"> <wsp:Policy> - <sp:WssX509V1Token11/> + <sp:WssX509V3Token11/> </wsp:Policy> </sp:X509Token> </wsp:Policy> @@ -768,7 +768,7 @@ <wsp:Policy> <sp:X509Token sp:IncludeToken="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy/IncludeToken/Never"> <wsp:Policy> - <sp:WssX509V1Token11/> + <sp:WssX509V3Token11/> </wsp:Policy> </sp:X509Token> </wsp:Policy> @@ -812,7 +812,7 @@ <wsp:Policy> <sp:X509Token sp:IncludeToken="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy/IncludeToken/AlwaysToRecipient"> <wsp:Policy> - <sp:WssX509V1Token11/> + <sp:WssX509V3Token11/> </wsp:Policy> </sp:X509Token> </wsp:Policy> @@ -821,7 +821,7 @@ <wsp:Policy> <sp:X509Token sp:IncludeToken="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy/IncludeToken/Never"> <wsp:Policy> - <sp:WssX509V1Token11/> + <sp:WssX509V3Token11/> </wsp:Policy> </sp:X509Token> </wsp:Policy> http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Morpit.cxf ---------------------------------------------------------------------- diff --git a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Morpit.cxf b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Morpit.cxf deleted file mode 100644 index 609139e..0000000 --- a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Morpit.cxf +++ /dev/null @@ -1,73 +0,0 @@ -<?xml version="1.0" encoding="UTF-8"?> -<!-- - Licensed to the Apache Software Foundation (ASF) under one - or more contributor license agreements. See the NOTICE file - distributed with this work for additional information - regarding copyright ownership. The ASF licenses this file - to you under the Apache License, Version 2.0 (the - "License"); you may not use this file except in compliance - with the License. You may obtain a copy of the License at - - http://www.apache.org/licenses/LICENSE-2.0 - - Unless required by applicable law or agreed to in writing, - software distributed under the License is distributed on an - "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY - KIND, either express or implied. See the License for the - specific language governing permissions and limitations - under the License. ---> - -<!-- - ** This file configures the Morpit Server. It is just an - ** Https server with a name that will kick in the HostnameVerifier. - --> - - -<beans xmlns="http://www.springframework.org/schema/beans" - xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" - xmlns:sec="http://cxf.apache.org/configuration/security" - xmlns:http="http://cxf.apache.org/transports/http/configuration" - xmlns:httpj="http://cxf.apache.org/transports/http-jetty/configuration" - xmlns:jaxws="http://java.sun.com/xml/ns/jaxws" - xsi:schemaLocation=" - http://cxf.apache.org/configuration/security - http://cxf.apache.org/schemas/configuration/security.xsd - http://cxf.apache.org/transports/http/configuration - http://cxf.apache.org/schemas/configuration/http-conf.xsd - http://cxf.apache.org/transports/http-jetty/configuration - http://cxf.apache.org/schemas/configuration/http-jetty.xsd - http://www.springframework.org/schema/beans - http://www.springframework.org/schema/beans/spring-beans.xsd"> - - <http:destination name="{http://apache.org/hello_world}GreeterImplPort.http-destination"> - </http:destination> - - <httpj:engine-factory bus="cxf"> - <httpj:engine port="9008"> - <httpj:tlsServerParameters> - <sec:keyManagers keyPassword="password"> - <sec:keyStore type="JKS" password="password" - file="src/test/java/org/apache/cxf/systest/http/resources/Morpit.jks"/> - </sec:keyManagers> - <sec:trustManagers> - <sec:keyStore type="JKS" password="password" - file="src/test/java/org/apache/cxf/systest/http/resources/Truststore.jks"/> - </sec:trustManagers> - <sec:cipherSuitesFilter> - <!-- these filters ensure that a ciphersuite with - export-suitable or null encryption is used, - but exclude anonymous Diffie-Hellman key change as - this is vulnerable to man-in-the-middle attacks --> - <sec:include>.*_EXPORT_.*</sec:include> - <sec:include>.*_EXPORT1024_.*</sec:include> - <sec:include>.*_WITH_DES_.*</sec:include> - <sec:include>.*_WITH_NULL_.*</sec:include> - <sec:exclude>.*_DH_anon_.*</sec:exclude> - </sec:cipherSuitesFilter> - <sec:clientAuthentication want="true" required="true"/> - </httpj:tlsServerParameters> - </httpj:engine> - </httpj:engine-factory> - -</beans> http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Morpit.jks ---------------------------------------------------------------------- diff --git a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Morpit.jks b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Morpit.jks index 95626a7..b179baf 100644 Binary files a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Morpit.jks and b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Morpit.jks differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Morpit.p12 ---------------------------------------------------------------------- diff --git a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Morpit.p12 b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Morpit.p12 deleted file mode 100644 index f37acff..0000000 Binary files a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Morpit.p12 and /dev/null differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Truststore.jks ---------------------------------------------------------------------- diff --git a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Truststore.jks b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Truststore.jks index e76a076..0abd848 100644 Binary files a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Truststore.jks and b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Truststore.jks differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Truststore.pem ---------------------------------------------------------------------- diff --git a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Truststore.pem b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Truststore.pem deleted file mode 100644 index 1b25477..0000000 --- a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/Truststore.pem +++ /dev/null @@ -1,60 +0,0 @@ ------BEGIN CERTIFICATE----- -MIICIDCCAYkCBEYRaYcwDQYJKoZIhvcNAQEEBQAwVzELMAkGA1UEBhMCVVMxETAPBgNVBAcTCFN5 -cmFjdXNlMRMwEQYDVQQKEwpBcGFjaGVUZXN0MQ8wDQYDVQQLEwZCZXRoYWwxDzANBgNVBAMTBkJl -dGhhbDAeFw0wNzA0MDIyMDM3MjdaFw0zNDA4MTgyMDM3MjdaMFcxCzAJBgNVBAYTAlVTMREwDwYD -VQQHEwhTeXJhY3VzZTETMBEGA1UEChMKQXBhY2hlVGVzdDEPMA0GA1UECxMGQmV0aGFsMQ8wDQYD -VQQDEwZCZXRoYWwwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAJHOyFu8tTt4g9tBv0bY8c4K -uidfMlHbFQAukIFXLkR4xu5IxG5OI53ZE0F6rqcPFve1sdEV9h+MxmzqQbo180Wyv1rUEq2AScK3 -6bo0ALuZsreQQmNVGBOjxBpTtrRErRfNJe1mvzNMz9VlGdSNWW17CrBz9kmz6G1EWg8aGfZHAgMB -AAEwDQYJKoZIhvcNAQEEBQADgYEAbw+VwP1tnBm3cFLFgONnGCozN8XqV2M0OklJ5lBDJL7BV2Ng -BtTZ8as9jTGYdjetKQXX75wWL7OS7vnkm/9tbr/vNBljT0OP0Yr2X7TAbDdhFfsk/D5mBpXdzXz2 -wqxVZjj6sm5zvwC32e4AxGG0edmY1DN9VMZzA/FrzBP0qoE= ------END CERTIFICATE----- ------BEGIN CERTIFICATE----- -MIICHDCCAYUCBEYRaYkwDQYJKoZIhvcNAQEEBQAwVTELMAkGA1UEBhMCVVMxETAPBgNVBAcTCFN5 -cmFjdXNlMRMwEQYDVQQKEwpBcGFjaGVUZXN0MQ4wDAYDVQQLEwVHb3JkeTEOMAwGA1UEAxMFR29y -ZHkwHhcNMDcwNDAyMjAzNzI5WhcNMzQwODE4MjAzNzI5WjBVMQswCQYDVQQGEwJVUzERMA8GA1UE -BxMIU3lyYWN1c2UxEzARBgNVBAoTCkFwYWNoZVRlc3QxDjAMBgNVBAsTBUdvcmR5MQ4wDAYDVQQD -EwVHb3JkeTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAqIbNth+G4Q5tkZvoUZdQsY9RnjAA -mgKVBUaOVvv//qOniOTskLqBFyKGoMpbCfNAU7/zVKP5fLTLccLdJyCagKGrs1ZmKaNiTRcOnfkE -3dHnEIp83+hNmASGsrZcyLihtro1N3pMTuXbXzu7x3F2U7fxYFg66iviTEGF6T7dY3MCAwEAATAN -BgkqhkiG9w0BAQQFAAOBgQBPjsYFdqz0JF9shNpvke/H1eHqhyXJgPdHdCu/ewRO2wV6I9WBrGNU -cmmKZmAUsv99Y0Tpz59uEXFcM3cBZU4/obw3DlwwWmaVMoIwQ2Nd2FChC6uyKIJ0Bvpx+aDxjm48 -b8c58EHCcU2FRo/nVWctJL9xJ7oBrke5GZrBlUF+rA== ------END CERTIFICATE----- ------BEGIN CERTIFICATE----- -MIICNDCCAZ0CBEYRaY4wDQYJKoZIhvcNAQEEBQAwYTELMAkGA1UEBhMCVVMxETAPBgNVBAcTCFN5 -cmFjdXNlMRMwEQYDVQQKEwpBcGFjaGVUZXN0MQ8wDQYDVQQLEwZNb3JwaXQxGTAXBgNVBAMTEHdo -YXRldmVyaG9zdC5jb20wHhcNMDcwNDAyMjAzNzM0WhcNMzQwODE4MjAzNzM0WjBhMQswCQYDVQQG -EwJVUzERMA8GA1UEBxMIU3lyYWN1c2UxEzARBgNVBAoTCkFwYWNoZVRlc3QxDzANBgNVBAsTBk1v -cnBpdDEZMBcGA1UEAxMQd2hhdGV2ZXJob3N0LmNvbTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkC -gYEAk4FbJxfjllrApiECK5oRbgmTC1exx59HWck20R2AYU6kIkdZa78Ca+oc/zaPCtsVL/QZbjHE -7lnvVK55tnpGW9qzLxsAHZmYyA/4Wdmcbz/Niwsfm062z94+AKMCGum/1Ug1QZUiRKweZTRBHhmT -VsxSDEGTTi6UVim6nv47ZlcCAwEAATANBgkqhkiG9w0BAQQFAAOBgQAjWR/W+YO0I5sBlb+zNTbJ -TPs4CqM4UHQS+prOx59R134FbocgkGncm00FBrO857KJHdSCRjOUUpc3S+MP13FGqSQm2Q0lNjUV -IygvdZ+BATfgsJ92NbnuIhIVAA+i8AVZK//qPRCMz1Rdm1G994qCw3A4lQMi5eqKYYwqkRJeXw== ------END CERTIFICATE----- ------BEGIN CERTIFICATE----- -MIICIDCCAYkCBEYRaYwwDQYJKoZIhvcNAQEEBQAwVzELMAkGA1UEBhMCVVMxETAPBgNVBAcTCFN5 -cmFjdXNlMRMwEQYDVQQKEwpBcGFjaGVUZXN0MQ8wDQYDVQQLEwZQb2x0aW0xDzANBgNVBAMTBlBv -bHRpbTAeFw0wNzA0MDIyMDM3MzJaFw0zNDA4MTgyMDM3MzJaMFcxCzAJBgNVBAYTAlVTMREwDwYD -VQQHEwhTeXJhY3VzZTETMBEGA1UEChMKQXBhY2hlVGVzdDEPMA0GA1UECxMGUG9sdGltMQ8wDQYD -VQQDEwZQb2x0aW0wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAL/bdivrpaR4Njvo7WB4ipEh -422V2bAyapFvgOq/tHusGR/e3wH0v9g+9xwnNyqFjhueceuWahXAvNHvknuUaelW0346Aay0fBAu -EsyowWBTVi/pU+iZleN9FD8uBalY1s6e+xqu+yckhHuBP77TcTar1hBjCIfy2Eo2YevDL6qlAgMB -AAEwDQYJKoZIhvcNAQEEBQADgYEAuT7QoNfGG7GjfQuU/oYj5vHPH7nPhLtkQBVTEi0WyzgJUXie -rNG/u4VEZtNtK4+4J5tQyb4YtP2GPUUpWrhusKUaW4eMU79rzpUbZnGUBzTbth8kBoN9xHzXiSop -ohPdOnGo5ZjThZnLEn/o9doUEX64o4eauu15SPoDLzSfLJ0= ------END CERTIFICATE----- ------BEGIN CERTIFICATE----- -MIICIDCCAYkCBEYRaYswDQYJKoZIhvcNAQEEBQAwVzELMAkGA1UEBhMCVVMxETAPBgNVBAcTCFN5 -cmFjdXNlMRMwEQYDVQQKEwpBcGFjaGVUZXN0MQ8wDQYDVQQLEwZUYXJwaW4xDzANBgNVBAMTBlRh -cnBpbjAeFw0wNzA0MDIyMDM3MzFaFw0zNDA4MTgyMDM3MzFaMFcxCzAJBgNVBAYTAlVTMREwDwYD -VQQHEwhTeXJhY3VzZTETMBEGA1UEChMKQXBhY2hlVGVzdDEPMA0GA1UECxMGVGFycGluMQ8wDQYD -VQQDEwZUYXJwaW4wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKGG8UtWnHyWKFVDJSuSlhT/ -vKxrPjfNBtvdaiQx5gNAlc8QVL5lPOXcJljTF3dEb0QQ1ajai3kC71NE2ABOrxk7Jvk3bEma5Yfy -U3m/OBthL9H8kE3O3+bh4K2LTsRwIa2Zd1wYbj44vUxsiHhzxer3q3FDfLxsqtahsxz7WjG1AgMB -AAEwDQYJKoZIhvcNAQEEBQADgYEAE6EWRbYxGOlwmtpv0XE4FwbXYdSDArc+ArhOJWKTzoE3U9l8 -kg1wJL49VXEmVIxpipXKs7d9lpIVLPFsbBVJRZwH8sgHE39nTjfeyHNmwZcd63Lrn+2RydkAo5P9 -FYi8HFGEM5dON4PSo3Et6ycHy1IrS8htrNu+FoW84FRTKDA= ------END CERTIFICATE----- http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/alice.jks ---------------------------------------------------------------------- diff --git a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/alice.jks b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/alice.jks deleted file mode 100644 index 5bd162b..0000000 Binary files a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/alice.jks and /dev/null differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/bob.jks ---------------------------------------------------------------------- diff --git a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/bob.jks b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/bob.jks deleted file mode 100644 index a4f49c5..0000000 Binary files a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/bob.jks and /dev/null differ http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/client.xml ---------------------------------------------------------------------- diff --git a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/client.xml b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/client.xml index 9acaa37..7f8e534 100644 --- a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/client.xml +++ b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/client.xml @@ -44,8 +44,8 @@ <entry key="action" value="Timestamp Signature Encrypt"/> <!-- <entry key="action" value="Timestamp Signature"/> --> <entry key="user" value="alice"/> - <entry key="signaturePropFile" value="org/apache/cxf/systest/ws/security/alice.properties"/> - <entry key="encryptionPropFile" value="org/apache/cxf/systest/ws/security/bob.properties"/> + <entry key="signaturePropFile" value="alice.properties"/> + <entry key="encryptionPropFile" value="bob.properties"/> <entry key="encryptionUser" value="Bob"/> <entry key="signatureKeyIdentifier" value="DirectReference"/> <entry key="passwordCallbackClass" value="org.apache.cxf.systest.ws.common.KeystorePasswordCallback"/> @@ -67,8 +67,8 @@ <constructor-arg> <map> <entry key="action" value="Timestamp Signature Encrypt"/> - <entry key="signaturePropFile" value="org/apache/cxf/systest/ws/security/bob.properties"/> - <entry key="decryptionPropFile" value="org/apache/cxf/systest/ws/security/alice.properties"/> + <entry key="signaturePropFile" value="bob.properties"/> + <entry key="decryptionPropFile" value="alice.properties"/> <entry key="passwordCallbackClass" value="org.apache.cxf.systest.ws.common.KeystorePasswordCallback"/> </map> </constructor-arg> http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/server.xml ---------------------------------------------------------------------- diff --git a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/server.xml b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/server.xml index 504b33f..35cb2a0 100644 --- a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/server.xml +++ b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/server.xml @@ -77,8 +77,8 @@ <!-- Use this action spec for WCF clients <entry key="action" value="Signature Encrypt Timestamp"/> --> - <entry key="signaturePropFile" value="org/apache/cxf/systest/ws/security/alice.properties"/> - <entry key="decryptionPropFile" value="org/apache/cxf/systest/ws/security/bob.properties"/> + <entry key="signaturePropFile" value="alice.properties"/> + <entry key="decryptionPropFile" value="bob.properties"/> <entry key="passwordCallbackClass" value="org.apache.cxf.systest.ws.common.KeystorePasswordCallback"/> </map> </constructor-arg> @@ -91,8 +91,8 @@ <map> <entry key="action" value="Timestamp Signature Encrypt"/> <entry key="user" value="bob"/> - <entry key="signaturePropFile" value="org/apache/cxf/systest/ws/security/bob.properties"/> - <entry key="encryptionPropFile" value="org/apache/cxf/systest/ws/security/alice.properties"/> + <entry key="signaturePropFile" value="bob.properties"/> + <entry key="encryptionPropFile" value="alice.properties"/> <entry key="encryptionUser" value="Alice"/> <entry key="signatureKeyIdentifier" value="DirectReference"/> <entry key="passwordCallbackClass" value="org.apache.cxf.systest.ws.common.KeystorePasswordCallback"/> http://git-wip-us.apache.org/repos/asf/cxf/blob/c7720313/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/stax-server.xml ---------------------------------------------------------------------- diff --git a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/stax-server.xml b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/stax-server.xml index 1bd2b1f..329e7ac 100644 --- a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/stax-server.xml +++ b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/security/stax-server.xml @@ -77,8 +77,8 @@ <!-- Use this action spec for WCF clients <entry key="action" value="Signature Encrypt Timestamp"/> --> - <entry key="signaturePropFile" value="org/apache/cxf/systest/ws/security/alice.properties"/> - <entry key="decryptionPropFile" value="org/apache/cxf/systest/ws/security/bob.properties"/> + <entry key="signaturePropFile" value="alice.properties"/> + <entry key="decryptionPropFile" value="bob.properties"/> <entry key="passwordCallbackClass" value="org.apache.cxf.systest.ws.common.KeystorePasswordCallback"/> </map> </constructor-arg> @@ -91,8 +91,8 @@ <map> <entry key="action" value="Timestamp Signature Encrypt"/> <entry key="user" value="bob"/> - <entry key="signaturePropFile" value="org/apache/cxf/systest/ws/security/bob.properties"/> - <entry key="encryptionPropFile" value="org/apache/cxf/systest/ws/security/alice.properties"/> + <entry key="signaturePropFile" value="bob.properties"/> + <entry key="encryptionPropFile" value="alice.properties"/> <entry key="encryptionUser" value="Alice"/> <entry key="signatureKeyIdentifier" value="DirectReference"/> <entry key="passwordCallbackClass" value="org.apache.cxf.systest.ws.common.KeystorePasswordCallback"/>