Author: rsearls
Date: 2015-01-23 12:45:35 -0500 (Fri, 23 Jan 2015)
New Revision: 19418
Modified:
stack/cxf/branches/arquillian/modules/testsuite/cxf-spring-tests/src/test/scripts/jbws_testsuite_spring_default.groovy
Log:
Added JMS queues to config file
Modified:
stack/cxf/branches/arquillian/modules/testsuite/cxf-spring-tests/src/test/scripts/jbws_testsuite_spring_default.groovy
===================================================================
---
stack/cxf/branches/arquillian/modules/testsuite/cxf-spring-tests/src/test/scripts/jbws_testsuite_spring_default.groovy 2015-01-22
16:10:08 UTC (rev 19417)
+++
stack/cxf/branches/arquillian/modules/testsuite/cxf-spring-tests/src/test/scripts/jbws_testsuite_spring_default.groovy 2015-01-23
17:45:35 UTC (rev 19418)
@@ -10,7 +10,87 @@
def file = root.profile.subsystem.'periodic-rotating-file-handler'.file[0]
file.attributes()['path'] = project.properties['serverLog']
+
/**
+ * Add a https connector like this:
+ *
+ * <security-realm name="jbws-test-https-realm">
+ * <server-identities>
+ * <ssl>
+ * <keystore
path="/mnt/ssd/jbossws/stack/cxf/trunk/modules/testsuite/cxf-tests/target/test-classes/test.keystore"
keystore-password="changeit" alias="tomcat"/>
+ * </ssl>
+ * </server-identities>
+ * </security-realm>
+ *
+ */
+ /* security realm for test
org.jboss.test.ws.jaxws.samples.wsse.kerberos.KerberosTestCase and
+ * org.jboss.test.ws.jaxws.samples.wssePolicy.UsernameTestCase
+ */
+def securityRealms = root.management.'security-realms'[0]
+def securityRealm = securityRealms.appendNode('security-realm',
['name':'jbws-test-https-realm'])
+def serverIdentities = securityRealm.appendNode('server-identities')
+def ssl = serverIdentities.appendNode('ssl')
+ssl.appendNode('keystore',
['path':project.properties['keystorePath'],'keystore-password':'changeit','alias':'tomcat'])
+
+def server = root.profile.subsystem.server[0]
+server.appendNode('https-listener',
['name':'jbws-test-https-listener','socket-binding':'https','security-realm':'jbws-test-https-realm'])
+
+/**
+ * Add a security-domain block like this:
+ *
+ * <security-domain name="JBossWSDigest" cache-type="default">
+ * <authentication>
+ * <login-module code="UsersRoles" flag="required">
+ * <module-option name="hashUserPassword"
value="false"/>
+ * <module-option name="hashCharset" value="UTF-8"/>
+ * <module-option name="usersProperties"
value="/mnt/ssd/jbossws/stack/cxf/trunk/modules/testsuite/cxf-tests/target/test-resources/jaxws/samples/wsse/policy/jaas/digest/WEB-INF/jbossws-users.properties"/>
+ * <module-option name="hashAlgorithm" value="SHA"/>
+ * <module-option name="unauthenticatedIdentity"
value="anonymous"/>
+ * <module-option name="hashEncoding" value="BASE64"/>
+ * <module-option name="rolesProperties"
value="/mnt/ssd/jbossws/stack/cxf/trunk/modules/testsuite/cxf-tests/target/test-resources/jaxws/samples/wsse/policy/jaas/digest/WEB-INF/jbossws-roles.properties"/>
+ * <module-option name="storeDigestCallback"
value="org.jboss.wsf.stack.cxf.security.authentication.callback.UsernameTokenCallback"/>
+ * <module-option name="hashStorePassword"
value="true"/>
+ * </login-module>
+ * </authentication>
+ * </security-domain>
+ *
+ */
+ /* security domain for test
org.jboss.test.ws.jaxws.samples.wsseDigest.UsernameDigestTestCase */
+def securityDomains = root.profile.subsystem.'security-domains'[0]
+def securityDomainDigest = securityDomains.appendNode('security-domain',
['name':'JBossWSDigest','cache-type':'default'])
+def authenticationDigest = securityDomainDigest.appendNode('authentication')
+def loginModuleDigest = authenticationDigest.appendNode('login-module',
['code':'UsersRoles','flag':'required'])
+loginModuleDigest.appendNode('module-option',
['name':'hashUserPassword','value':'false'])
+loginModuleDigest.appendNode('module-option',
['name':'hashCharset','value':'UTF-8'])
+loginModuleDigest.appendNode('module-option',
['name':'hashAlgorithm','value':'SHA'])
+loginModuleDigest.appendNode('module-option',
['name':'hashEncoding','value':'BASE64'])
+loginModuleDigest.appendNode('module-option',
['name':'storeDigestCallback','value':'org.jboss.wsf.stack.cxf.security.authentication.callback.UsernameTokenCallback'])
+loginModuleDigest.appendNode('module-option',
['name':'hashStorePassword','value':'true'])
+loginModuleDigest.appendNode('module-option',
['name':'unauthenticatedIdentity','value':'anonymous'])
+loginModuleDigest.appendNode('module-option',
['name':'usersProperties','value':project.properties['testResourcesDir']
+ '/jaxws/samples/wsse/username-digest/WEB-INF/jbossws-users.properties'])
+loginModuleDigest.appendNode('module-option',
['name':'rolesProperties','value':project.properties['testResourcesDir']
+ '/jaxws/samples/wsse/username-digest/WEB-INF/jbossws-roles.properties'])
+
+/**
+ * Add a JMS queue like this
+ *
+ * <subsystem xmlns="urn:jboss:domain:messaging:2.0">
+ * <hornetq-server>
+ * <jms-destinations>
+ * <jms-queue name="testQueue">
+ * <entry name="queue/test"/>
+ * <entry name="java:jboss/exported/jms/queue/test"/>
+ * </jms-queue>
+ * </jms-destinations>
+ * </hornetq-server>
+ * </subsystem>
+ **/
+def hornetqServer = root.profile.subsystem.'hornetq-server'[0]
+def jmsDestinations = hornetqServer.'jms-destinations'[0]
+def jmsQueue = jmsDestinations.appendNode('jms-queue',
['name':'testQueue'])
+jmsQueue.appendNode('entry', ['name':'queue/test'])
+jmsQueue.appendNode('entry',
['name':'java:jboss/exported/jms/queue/test'])
+
+/**
* Save the configuration to a new file
*/
def writer = new StringWriter()
Show replies by date