This is an automated email from the ASF dual-hosted git repository.

jlmonteiro pushed a commit to branch jakartaee9-tck
in repository https://gitbox.apache.org/repos/asf/tomee-tck.git

commit 53613104e78fea33adb8a6ed53dbc7b70aea54ed
Author: Jean-Louis Monteiro <jlmonte...@tomitribe.com>
AuthorDate: Fri Jan 22 09:53:57 2021 +0100

    Align with Jakarta EE Branch (aka master)
---
 pom.xml                                            |  14 +-
 .../org/apache/openejb/cts/DeploymentImpl.java     |   5 +-
 src/test/resources/ts.jtx                          |  40 +++
 .../openejb/tck/commands/JavaTestCommand.groovy    |  16 +-
 .../openejb/tck/commands/SetupCommand.groovy       |   3 +
 src/test/tomee-plume/conf/catalina.policy          | 275 +++++++++++++++++++++
 src/test/tomee-plume/conf/context.xml              |   4 +
 src/test/tomee-plume/conf/server.xml               |   3 +-
 src/test/tomee-plume/conf/system.properties        |  10 +
 src/test/tomee-plus/conf/jaspic-providers.xml      |  38 +--
 src/test/tomee-plus/conf/server.xml                |   1 +
 src/test/tomee-plus/conf/system.properties         |   6 +-
 src/test/tomee/conf/jaspic-providers.xml           |  42 ----
 src/test/tomee/conf/server.xml                     |   1 +
 src/test/tomee/conf/system.properties              |   6 +-
 15 files changed, 363 insertions(+), 101 deletions(-)

diff --git a/pom.xml b/pom.xml
index 62bff0f..39e5f58 100644
--- a/pom.xml
+++ b/pom.xml
@@ -49,7 +49,7 @@
 
     <tomcat.version>10.0.0-M10</tomcat.version>
 
-    <johnzon.version>1.2.9-SNAPSHOT</johnzon.version>
+    <johnzon.version>1.2.9</johnzon.version>
     <derby.version>10.14.2.0</derby.version>
 
     <!--
@@ -106,7 +106,7 @@
     <dependency>
       <groupId>jakarta.ejb</groupId>
       <artifactId>jakarta.ejb-api</artifactId>
-      <version>4.0.0-RC2</version>
+      <version>4.0.0</version>
     </dependency>
     <dependency>
       <groupId>jakarta.servlet</groupId>
@@ -141,14 +141,6 @@
       <artifactId>geronimo-connector</artifactId>
       <version>3.1.4</version>
     </dependency>
-
-    <dependency>
-      <groupId>org.apache.johnzon</groupId>
-      <artifactId>johnzon-jsonp-strict</artifactId>
-      <version>${johnzon.version}</version>
-      <classifier>jakarta</classifier>
-    </dependency>
-
     <dependency>
       <groupId>org.apache.activemq</groupId>
       <artifactId>activemq-client</artifactId>
@@ -851,7 +843,7 @@
               <overWriteReleases>false</overWriteReleases>
               <overWriteSnapshots>true</overWriteSnapshots>
               <excludeTransitive>true</excludeTransitive>
-              
<includeArtifactIds>tsharness,tssv,cts,whitebox,dbprocedures,geronimo-mail,openejb-derbynet,derby,derbynet,derbyclient,johnzon-jsonp-strict</includeArtifactIds>
+              
<includeArtifactIds>tsharness,tssv,cts,whitebox,dbprocedures,geronimo-mail,openejb-derbynet,derby,derbynet,derbyclient</includeArtifactIds>
             </configuration>
           </execution>
         </executions>
diff --git a/src/main/java/org/apache/openejb/cts/DeploymentImpl.java 
b/src/main/java/org/apache/openejb/cts/DeploymentImpl.java
index 970cb59..d4895a2 100644
--- a/src/main/java/org/apache/openejb/cts/DeploymentImpl.java
+++ b/src/main/java/org/apache/openejb/cts/DeploymentImpl.java
@@ -60,8 +60,7 @@ public class DeploymentImpl implements TSDeploymentInterface2 
{
         Properties overrides = new Properties();
         String containerJavaHome = System.getProperty("container.java.home");
         String containerJavaVersion = 
System.getProperty("container.java.version");
-        String containerJavaOpts = System.getProperty("container.java.opts", 
"-Dopenejb.deployer.jndiname=openejb/DeployerBusinessRemote");
-        // String containerJavaOpts = 
System.getProperty("container.java.opts", 
"-Djava.security.properties=conf/security.properties 
-Dopenejb.deployer.jndiname=openejb/DeployerBusinessRemote");
+        String containerJavaOpts = System.getProperty("container.java.opts");
         if (containerJavaVersion != null) {
             overrides.put("java.version", containerJavaVersion);
         }
@@ -71,7 +70,7 @@ public class DeploymentImpl implements TSDeploymentInterface2 
{
         }
 
         if (containerJavaOpts != null) {
-            overrides.put("java.opts", containerJavaOpts);
+            overrides.put("java.opts", containerJavaOpts + " 
-Dopenejb.deployer.jndiname=openejb/DeployerBusinessRemote");
         }
 
         final RemoteServer remoteServer = new RemoteServer(overrides, 250, 
true);
diff --git a/src/test/resources/ts.jtx b/src/test/resources/ts.jtx
index bdfec8d..cefd02b 100644
--- a/src/test/resources/ts.jtx
+++ b/src/test/resources/ts.jtx
@@ -14,6 +14,46 @@
 # SPDX-License-Identifier: EPL-2.0 OR GPL-2.0 WITH Classpath-exception-2.0
 #
 
+########################################################################################################################
+#
+# Apache TomEE excludes
+#
+# This complements what's already provided in the CTS by default when 
challenges are accepted.
+
+################
+# Servlet
+################
+
+# TCK has a bug when formatting the HTTP request
+# It's been fixed in Jakarta EE 9 with 
https://github.com/eclipse-ee4j/jakartaee-tck/commit/ae4c10127a41b08e51969e25d6bffe7ace753981
+# The following 2 tests won't pass unless we force at the JVM level 
-Dline.separator=\r\n
+# They already pass on Jakarta EE 9 with TomEE 9
+com/sun/ts/tests/servlet/api/javax_servlet_http/part/URLClient.java#getHeadersTest
+com/sun/ts/tests/servlet/api/javax_servlet_http/part/URLClient.java#getHeaderTest
+com/sun/ts/tests/servlet/api/javax_servlet_http/part/URLClient.java#getInputStreamTest
+com/sun/ts/tests/servlet/api/javax_servlet_http/part/URLClient.java#getPartsTest
+com/sun/ts/tests/servlet/api/javax_servlet_http/part/URLClient.java#getPartsTest1
+com/sun/ts/tests/servlet/api/javax_servlet_http/part/URLClient.java#getPartTest
+com/sun/ts/tests/servlet/api/javax_servlet_http/part/URLClient.java#getPartTest1
+com/sun/ts/tests/servlet/api/javax_servlet_http/part1/URLClient.java#getHeadersTest
+com/sun/ts/tests/servlet/api/javax_servlet_http/part1/URLClient.java#getHeaderTest
+com/sun/ts/tests/servlet/api/javax_servlet_http/part1/URLClient.java#getInputStreamTest
+com/sun/ts/tests/servlet/api/javax_servlet_http/part1/URLClient.java#getPartsTest
+com/sun/ts/tests/servlet/api/javax_servlet_http/part1/URLClient.java#getPartsTest1
+com/sun/ts/tests/servlet/api/javax_servlet_http/part1/URLClient.java#getPartTest
+com/sun/ts/tests/servlet/api/javax_servlet_http/part1/URLClient.java#getPartTest1
+
+# TCK has a bug with the context path
+# It's been fixed already in Jakarta EE 9 with 
https://github.com/eclipse-ee4j/jakartaee-tck/pull/126
+com/sun/ts/tests/servlet/spec/security/denyUncovered/Client.java#testAccessToMethodAllowed
+com/sun/ts/tests/servlet/spec/security/denyUncovered/Client.java#testAllMethodsAllowedAnno
+com/sun/ts/tests/servlet/spec/security/denyUncovered/Client.java#testDenySomeUncovered
+com/sun/ts/tests/servlet/spec/security/denyUncovered/Client.java#testExcludeAuthConstraint
+com/sun/ts/tests/servlet/spec/security/denyUncovered/Client.java#testPartialDDServlet
+
+# End Apache TomEE excludes
+########################################################################################################################
+
 # Exclude list for CTS 8
 
 ################
diff --git a/src/test/script/openejb/tck/commands/JavaTestCommand.groovy 
b/src/test/script/openejb/tck/commands/JavaTestCommand.groovy
index 084576b..8352e08 100644
--- a/src/test/script/openejb/tck/commands/JavaTestCommand.groovy
+++ b/src/test/script/openejb/tck/commands/JavaTestCommand.groovy
@@ -227,10 +227,22 @@ class JavaTestCommand
                 def containerJavaVersion = get('container.java.version')
                 if (containerJavaVersion != null) {
                     log.info("Using java version (container) 
${containerJavaVersion}")
-                    jvmarg(value: 
"-Dcontainer.java.version=${containerJavaVersion}")
                 }
 
-                def containerJavaOpts = get('container.java.opts')
+                def containerJavaOpts = get('container.java.opts', "")
+                if (options.contains('security')) {
+                    log.info("Enabling server security manager")
+
+                    // -Djava.security.properties=conf/security.properties
+                    containerJavaOpts += "-Djava.security.manager 
-Djava.security.policy==${project.basedir}/${openejbHome}/conf/catalina.policy"
+                }
+                if (options.contains('websocket')) {
+                    log.info("Enabling Tomcat WebSockets configuration")
+                    containerJavaOpts += 
"-Dorg.apache.tomcat.websocket.DISABLE_BUILTIN_EXTENSIONS=true " +
+                            
"-Dorg.apache.tomcat.websocket.ALLOW_UNSUPPORTED_EXTENSIONS=true " +
+                            
"-Dorg.apache.tomcat.websocket.STRICT_SPEC_COMPLIANCE=true " +
+                            
"-Dorg.apache.tomcat.websocket.DEFAULT_PROCESS_PERIOD=0"
+                }
                 if (containerJavaOpts != null) {
                     log.info("Using java opts (container) 
${containerJavaOpts}")
                     jvmarg(value: "-Dcontainer.java.opts=${containerJavaOpts}")
diff --git a/src/test/script/openejb/tck/commands/SetupCommand.groovy 
b/src/test/script/openejb/tck/commands/SetupCommand.groovy
index 2e5eb08..67399f4 100644
--- a/src/test/script/openejb/tck/commands/SetupCommand.groovy
+++ b/src/test/script/openejb/tck/commands/SetupCommand.groovy
@@ -342,6 +342,9 @@ class SetupCommand
                 fileset(dir: 
"${javaeeCtsHome}/dist/com/sun/ts/tests/common/connector/whitebox/multianno") {
                     include(name: "whitebox*.rar")
                 }
+                fileset(dir: 
"${javaeeCtsHome}/dist/com/sun/ts/tests/common/connector/whitebox/permissiondd")
 {
+                    include(name: "whitebox*.rar")
+                }
             }
         }
 
diff --git a/src/test/tomee-plume/conf/catalina.policy 
b/src/test/tomee-plume/conf/catalina.policy
new file mode 100644
index 0000000..c18010f
--- /dev/null
+++ b/src/test/tomee-plume/conf/catalina.policy
@@ -0,0 +1,275 @@
+// Licensed to the Apache Software Foundation (ASF) under one or more
+// contributor license agreements.  See the NOTICE file distributed with
+// this work for additional information regarding copyright ownership.
+// The ASF licenses this file to You under the Apache License, Version 2.0
+// (the "License"); you may not use this file except in compliance with
+// the License.  You may obtain a copy of the License at
+//
+//     http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing, software
+// distributed under the License is distributed on an "AS IS" BASIS,
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+// See the License for the specific language governing permissions and
+// limitations under the License.
+
+// ============================================================================
+// catalina.policy - Security Policy Permissions for Tomcat
+//
+// This file contains a default set of security policies to be enforced (by the
+// JVM) when Catalina is executed with the "-security" option.  In addition
+// to the permissions granted here, the following additional permissions are
+// granted to each web application:
+//
+// * Read access to the web application's document root directory
+// * Read, write and delete access to the web application's working directory
+// ============================================================================
+
+
+// ========== SYSTEM CODE PERMISSIONS =========================================
+
+
+// These permissions apply to javac
+grant codeBase "file:${java.home}/lib/-" {
+        permission java.security.AllPermission;
+};
+
+// These permissions apply to all shared system extensions
+grant codeBase "file:${java.home}/jre/lib/ext/-" {
+        permission java.security.AllPermission;
+};
+
+// These permissions apply to javac when ${java.home} points at $JAVA_HOME/jre
+grant codeBase "file:${java.home}/../lib/-" {
+        permission java.security.AllPermission;
+};
+
+// These permissions apply to all shared system extensions when
+// ${java.home} points at $JAVA_HOME/jre
+grant codeBase "file:${java.home}/lib/ext/-" {
+        permission java.security.AllPermission;
+};
+
+
+// ========== CATALINA CODE PERMISSIONS =======================================
+
+
+// These permissions apply to the daemon code
+grant codeBase "file:${catalina.home}/bin/commons-daemon.jar" {
+        permission java.security.AllPermission;
+};
+
+// These permissions apply to the logging API
+// Note: If tomcat-juli.jar is in ${catalina.base} and not in ${catalina.home},
+// update this section accordingly.
+//  grant codeBase "file:${catalina.base}/bin/tomcat-juli.jar" {..}
+grant codeBase "file:${catalina.home}/bin/tomcat-juli.jar" {
+        permission java.io.FilePermission
+         
"${java.home}${file.separator}lib${file.separator}logging.properties", "read";
+
+        permission java.io.FilePermission
+         
"${catalina.base}${file.separator}conf${file.separator}logging.properties", 
"read";
+        permission java.io.FilePermission
+         "${catalina.base}${file.separator}logs", "read, write";
+        permission java.io.FilePermission
+         "${catalina.base}${file.separator}logs${file.separator}*", "read, 
write, delete";
+
+        permission java.lang.RuntimePermission "shutdownHooks";
+        permission java.lang.RuntimePermission "getClassLoader";
+        permission java.lang.RuntimePermission "setContextClassLoader";
+
+        permission java.lang.management.ManagementPermission "monitor";
+
+        permission java.util.logging.LoggingPermission "control";
+
+        permission java.util.PropertyPermission 
"java.util.logging.config.class", "read";
+        permission java.util.PropertyPermission 
"java.util.logging.config.file", "read";
+        permission java.util.PropertyPermission 
"org.apache.juli.AsyncLoggerPollInterval", "read";
+        permission java.util.PropertyPermission 
"org.apache.juli.AsyncMaxRecordCount", "read";
+        permission java.util.PropertyPermission 
"org.apache.juli.AsyncOverflowDropType", "read";
+        permission java.util.PropertyPermission 
"org.apache.juli.ClassLoaderLogManager.debug", "read";
+        permission java.util.PropertyPermission "catalina.base", "read";
+
+        // Note: To enable per context logging configuration, permit read 
access to
+        // the appropriate file. Be sure that the logging configuration is
+        // secure before enabling such access.
+        // E.g. for the examples web application (uncomment and unwrap
+        // the following to be on a single line):
+        // permission java.io.FilePermission "${catalina.base}${file.separator}
+        //  webapps${file.separator}examples${file.separator}WEB-INF
+        //  ${file.separator}classes${file.separator}logging.properties", 
"read";
+};
+
+// These permissions apply to the server startup code
+grant codeBase "file:${catalina.home}/bin/bootstrap.jar" {
+        permission java.security.AllPermission;
+};
+
+// These permissions apply to the servlet API classes
+// and those that are shared across all class loaders
+// located in the "lib" directory
+grant codeBase "file:${catalina.home}/lib/-" {
+        permission java.security.AllPermission;
+};
+
+
+// If using a per instance lib directory, i.e. ${catalina.base}/lib,
+// then the following permission will need to be uncommented
+// grant codeBase "file:${catalina.base}/lib/-" {
+//         permission java.security.AllPermission;
+// };
+
+
+// ========== WEB APPLICATION PERMISSIONS =====================================
+
+
+// These permissions are granted by default to all web applications
+// In addition, a web application will be given a read FilePermission
+// for all files and directories in its document root.
+grant {
+    // Required for JNDI lookup of named JDBC DataSource's and
+    // javamail named MimePart DataSource used to send mail
+    permission java.util.PropertyPermission "java.home", "read";
+    permission java.util.PropertyPermission "java.naming.*", "read";
+    permission java.util.PropertyPermission "javax.sql.*", "read";
+
+    // OS Specific properties to allow read access
+    permission java.util.PropertyPermission "os.name", "read";
+    permission java.util.PropertyPermission "os.version", "read";
+    permission java.util.PropertyPermission "os.arch", "read";
+    permission java.util.PropertyPermission "file.separator", "read";
+    permission java.util.PropertyPermission "path.separator", "read";
+    permission java.util.PropertyPermission "line.separator", "read";
+
+    // JVM properties to allow read access
+    permission java.util.PropertyPermission "java.version", "read";
+    permission java.util.PropertyPermission "java.vendor", "read";
+    permission java.util.PropertyPermission "java.vendor.url", "read";
+    permission java.util.PropertyPermission "java.class.version", "read";
+    permission java.util.PropertyPermission "java.specification.version", 
"read";
+    permission java.util.PropertyPermission "java.specification.vendor", 
"read";
+    permission java.util.PropertyPermission "java.specification.name", "read";
+
+    permission java.util.PropertyPermission "java.vm.specification.version", 
"read";
+    permission java.util.PropertyPermission "java.vm.specification.vendor", 
"read";
+    permission java.util.PropertyPermission "java.vm.specification.name", 
"read";
+    permission java.util.PropertyPermission "java.vm.version", "read";
+    permission java.util.PropertyPermission "java.vm.vendor", "read";
+    permission java.util.PropertyPermission "java.vm.name", "read";
+
+    // Required for OpenJMX
+    permission java.lang.RuntimePermission "getAttribute";
+
+    // Allow read of JAXP compliant XML parser debug
+    permission java.util.PropertyPermission "jaxp.debug", "read";
+
+    // All JSPs need to be able to read this package
+    permission java.lang.RuntimePermission 
"accessClassInPackage.org.apache.tomcat";
+
+    // Precompiled JSPs need access to these packages.
+    permission java.lang.RuntimePermission 
"accessClassInPackage.org.apache.jasper.el";
+    permission java.lang.RuntimePermission 
"accessClassInPackage.org.apache.jasper.runtime";
+    permission java.lang.RuntimePermission
+     "accessClassInPackage.org.apache.jasper.runtime.*";
+
+    // Applications using WebSocket need to be able to access these packages
+    permission java.lang.RuntimePermission 
"accessClassInPackage.org.apache.tomcat.websocket";
+    permission java.lang.RuntimePermission 
"accessClassInPackage.org.apache.tomcat.websocket.server";
+};
+
+
+// The Manager application needs access to the following packages to support 
the
+// session display functionality. It also requires the custom Tomcat
+// DeployXmlPermission to enable the use of META-INF/context.xml
+// These settings support the following configurations:
+// - default CATALINA_HOME == CATALINA_BASE
+// - CATALINA_HOME != CATALINA_BASE, per instance Manager in CATALINA_BASE
+// - CATALINA_HOME != CATALINA_BASE, shared Manager in CATALINA_HOME
+grant codeBase "file:${catalina.base}/webapps/manager/-" {
+    permission java.lang.RuntimePermission 
"accessClassInPackage.org.apache.catalina";
+    permission java.lang.RuntimePermission 
"accessClassInPackage.org.apache.catalina.ha.session";
+    permission java.lang.RuntimePermission 
"accessClassInPackage.org.apache.catalina.manager";
+    permission java.lang.RuntimePermission 
"accessClassInPackage.org.apache.catalina.manager.util";
+    permission java.lang.RuntimePermission 
"accessClassInPackage.org.apache.catalina.util";
+    permission org.apache.catalina.security.DeployXmlPermission "manager";
+};
+grant codeBase "file:${catalina.home}/webapps/manager/-" {
+    permission java.lang.RuntimePermission 
"accessClassInPackage.org.apache.catalina";
+    permission java.lang.RuntimePermission 
"accessClassInPackage.org.apache.catalina.ha.session";
+    permission java.lang.RuntimePermission 
"accessClassInPackage.org.apache.catalina.manager";
+    permission java.lang.RuntimePermission 
"accessClassInPackage.org.apache.catalina.manager.util";
+    permission java.lang.RuntimePermission 
"accessClassInPackage.org.apache.catalina.util";
+    permission org.apache.catalina.security.DeployXmlPermission "manager";
+};
+
+// The Host Manager application needs the custom Tomcat DeployXmlPermission to
+// enable the use of META-INF/context.xml
+// These settings support the following configurations:
+// - default CATALINA_HOME == CATALINA_BASE
+// - CATALINA_HOME != CATALINA_BASE, per instance Host Manager in CATALINA_BASE
+// - CATALINA_HOME != CATALINA_BASE, shared Host Manager in CATALINA_HOME
+grant codeBase "file:${catalina.base}/webapps/host-manager/-" {
+    permission org.apache.catalina.security.DeployXmlPermission "host-manager";
+};
+grant codeBase "file:${catalina.home}/webapps/host-manager/-" {
+    permission org.apache.catalina.security.DeployXmlPermission "host-manager";
+};
+
+
+// You can assign additional permissions to particular web applications by
+// adding additional "grant" entries here, based on the code base for that
+// application, /WEB-INF/classes/, or /WEB-INF/lib/ jar files.
+//
+// Different permissions can be granted to JSP pages, classes loaded from
+// the /WEB-INF/classes/ directory, all jar files in the /WEB-INF/lib/
+// directory, or even to individual jar files in the /WEB-INF/lib/ directory.
+//
+// For instance, assume that the standard "examples" application
+// included a JDBC driver that needed to establish a network connection to the
+// corresponding database and used the scrape taglib to get the weather from
+// the NOAA web server.  You might create a "grant" entries like this:
+//
+// The permissions granted to the context root directory apply to JSP pages.
+// grant codeBase "file:${catalina.base}/webapps/examples/-" {
+//      permission java.net.SocketPermission "dbhost.mycompany.com:5432", 
"connect";
+//      permission java.net.SocketPermission "*.noaa.gov:80", "connect";
+// };
+//
+// The permissions granted to the context WEB-INF/classes directory
+// grant codeBase "file:${catalina.base}/webapps/examples/WEB-INF/classes/-" {
+// };
+//
+// The permission granted to your JDBC driver
+// grant codeBase 
"jar:file:${catalina.base}/webapps/examples/WEB-INF/lib/driver.jar!/-" {
+//      permission java.net.SocketPermission "dbhost.mycompany.com:5432", 
"connect";
+// };
+// The permission granted to the scrape taglib
+// grant codeBase 
"jar:file:${catalina.base}/webapps/examples/WEB-INF/lib/scrape.jar!/-" {
+//      permission java.net.SocketPermission "*.noaa.gov:80", "connect";
+// };
+
+// To grant permissions for web applications using packed WAR files, use the
+// Tomcat specific WAR url scheme.
+//
+// The permissions granted to the entire web application
+// grant codeBase "war:file:${catalina.base}/webapps/examples.war*/-" {
+// };
+//
+// The permissions granted to a specific JAR
+// grant codeBase 
"war:file:${catalina.base}/webapps/examples.war*/WEB-INF/lib/foo.jar" {
+// };
+
+// ================ Apache TomEE ============== (To be refined)
+grant codeBase "jar:file:${catalina.home}/lib/*!/-" {
+    permission java.security.AllPermission;
+};
+grant codeBase "file:${catalina.home}/bin/tomcat-juli.jar" {
+    permission java.security.AllPermission;
+};
+grant codeBase "file:${catalina.base}/lib/-" {
+    permission java.security.AllPermission;
+};
+grant {
+        // "standard" properties that can be read by anyone
+        permission java.security.AllPermission ;
+};
\ No newline at end of file
diff --git a/src/test/tomee-plume/conf/context.xml 
b/src/test/tomee-plume/conf/context.xml
index 484d69a..5d42cfe 100644
--- a/src/test/tomee-plume/conf/context.xml
+++ b/src/test/tomee-plume/conf/context.xml
@@ -38,4 +38,8 @@
            
jaspicCallbackHandlerClass="org.apache.openejb.cts.CallbackHandlerImpl"
     />
     -->
+
+    <Environment name="myUrl" value="http://google.com";
+                 type="java.net.URL" override="false"/>
+
 </Context>
diff --git a/src/test/tomee-plume/conf/server.xml 
b/src/test/tomee-plume/conf/server.xml
index 554c927..5dd67c5 100644
--- a/src/test/tomee-plume/conf/server.xml
+++ b/src/test/tomee-plume/conf/server.xml
@@ -70,6 +70,7 @@
     -->
     <Connector port="%webcontainer.default.port%" protocol="HTTP/1.1"
                connectionTimeout="20000"
+               allowTrace="true"
                allowedTrailerHeaders="myTrailer, myTrailer2"
                redirectPort="%webcontainer.default.ssl.port%">
       <UpgradeProtocol className="org.apache.coyote.http2.Http2Protocol" />
@@ -106,7 +107,7 @@
     <!-- You should set jvmRoute to support load-balancing via AJP ie :
     <Engine name="Catalina" defaultHost="localhost" jvmRoute="jvm1">
     -->
-    <Engine name="Catalina" defaultHost="localhost">
+    <Engine name="Catalina" defaultHost="localhost" 
backgroundProcessorDelay="1">
 
       <!--For clustering, please take a look at documentation at:
           /docs/cluster-howto.html  (simple how to)
diff --git a/src/test/tomee-plume/conf/system.properties 
b/src/test/tomee-plume/conf/system.properties
index 1538831..89d57ed 100644
--- a/src/test/tomee-plume/conf/system.properties
+++ b/src/test/tomee-plume/conf/system.properties
@@ -20,6 +20,7 @@ 
org.apache.tomcat.util.http.ServerCookie.FWD_SLASH_IS_SEPARATOR=false
 org.apache.tomcat.websocket.DISABLE_BUILTIN_EXTENSIONS=true
 org.apache.tomcat.websocket.ALLOW_UNSUPPORTED_EXTENSIONS=true
 org.apache.tomcat.websocket.DEFAULT_PROCESS_PERIOD=0
+org.apache.tomcat.websocket.STRICT_SPEC_COMPLIANCE=true
 user.language=en
 user.country=US
 
@@ -72,6 +73,9 @@ openejb.vendor.config = glassfish
 openejb.crosscontext=true
 #openejb.web.xml.major=3
 jsp_config_general_web.openejb.web.xml.major=2
+org.apache.taglibs.standard.xml.accessExternalEntity=all
+javax.xml.accessExternalDTD=all
+javax.xml.accessExternalStylesheet=all
 
 # javax.persistence.provider=org.eclipse.persistence.jpa.PersistenceProvider
 # javax.persistence.transactionType=
@@ -98,6 +102,9 @@ old-dd-whitebox-tx.rar.moduleId=oldwhitebox-tx
 old-dd-whitebox-xa-param.rar.moduleId=oldwhitebox-xa-param
 old-dd-whitebox-xa.rar.moduleId=oldwhitebox-xa
 
+RESOURCE.global/jdbc/DB3|PortNumber=%derby.server.port%
+RESOURCE.defaultdsrepeatable|PortNumber=%derby.server.port%
+RESOURCE.defaultdsrepeatable1|PortNumber=%derby.server.port%
 
 compds.JdbcDriver=org.apache.derby.jdbc.ClientDriver
 compds.JdbcUrl=jdbc:derby://localhost:%derby.server.port%/derbydb;create=true
@@ -142,6 +149,9 @@ app/env/appds.Password=cts
 openejb.classloader.forced-load = com.sun.ts.tests.
 openejb.classloader.forced-skip=com.sun.ts.tests.jaspic.tssv.
 
+cxf.jaxrs.provider-comparator=org.apache.openejb.server.cxf.rs.CxfRsHttpListener$DefaultProviderComparator
+openejb.jaxrs.fail-on-constrainedto=false
+
 # not sure why we have to duplicate this one here
 log.file.location=%user.dir%/%openejb.home%/logs
 
vendor.authconfig.factory=org.apache.catalina.authenticator.jaspic.AuthConfigFactoryImpl
diff --git a/src/test/tomee-plus/conf/jaspic-providers.xml 
b/src/test/tomee-plus/conf/jaspic-providers.xml
index e618759..73d24c6 100644
--- a/src/test/tomee-plus/conf/jaspic-providers.xml
+++ b/src/test/tomee-plus/conf/jaspic-providers.xml
@@ -419,44 +419,10 @@
   </provider>
 
   <provider name="any"
-            
className="com.sun.ts.tests.jaspic.tssv.config.TSAuthConfigProvider"
-            layer="SOAP"
-            appContext="null"
-            description="TestSuite JSR 196 Config Provider">
-    <property name="AuthStatus_SEND_SUCCESS"
-              value="false" />
-    <property name="requestPolicy"
-              value="USER_NAME_PASSWORD" />
-  </provider>
-  <provider name="any"
-            
className="com.sun.ts.tests.jaspic.tssv.config.TSAuthConfigProvider"
-            layer="SOAP"
-            appContext="Catalina/localhost /Hello_web/Hello"
-            description="TestSuite JSR 196 Config Provider">
-    <property name="AuthStatus_SEND_SUCCESS"
-              value="false" />
-    <property name="requestPolicy"
-              value="USER_NAME_PASSWORD" />
-  </provider>
-  <provider name="any"
-            
className="com.sun.ts.tests.jaspic.tssv.config.TSAuthConfigProviderServlet"
+            
className="org.apache.tomee.security.provider.TomEESecurityAuthConfigProvider"
             layer="HttpServlet"
             appContext="Catalina/localhost /spitests_servlet_web"
-            description="Registration for TSAuthConfigProviderServlet using 
spitests_servlet_web">
-    <property name="AuthStatus_SEND_SUCCESS"
-              value="true" />
-    <property name="requestPolicy"
-              value="USER_NAME_PASSWORD" />
-  </provider>
-  <provider name="any"
-            
className="com.sun.ts.tests.jaspic.tssv.config.TSAuthConfigProviderServlet"
-            layer="HttpServlet"
-            appContext="Catalina/localhost 
/spitests_servlet_web/WrapperServlet"
-            description="Registration for TSAuthConfigProviderServlet using 
spitests_servlet_web">
-    <property name="AuthStatus_SEND_SUCCESS"
-              value="true" />
-    <property name="requestPolicy"
-              value="USER_NAME_PASSWORD" />
+            description="any">
   </provider>
 
 </jaspic-providers>
diff --git a/src/test/tomee-plus/conf/server.xml 
b/src/test/tomee-plus/conf/server.xml
index 3b80e3e..beaefb0 100644
--- a/src/test/tomee-plus/conf/server.xml
+++ b/src/test/tomee-plus/conf/server.xml
@@ -70,6 +70,7 @@
     -->
     <Connector port="%webcontainer.default.port%" protocol="HTTP/1.1"
                connectionTimeout="20000"
+               allowTrace="true"
                redirectPort="%webcontainer.default.ssl.port%"/>
     <!-- A "Connector" using the shared thread pool-->
     <!--
diff --git a/src/test/tomee-plus/conf/system.properties 
b/src/test/tomee-plus/conf/system.properties
index d57a359..4a7ca43 100644
--- a/src/test/tomee-plus/conf/system.properties
+++ b/src/test/tomee-plus/conf/system.properties
@@ -17,9 +17,6 @@
 
 org.apache.catalina.STRICT_SERVLET_COMPLIANCE=true
 org.apache.tomcat.util.http.ServerCookie.FWD_SLASH_IS_SEPARATOR=false
-org.apache.tomcat.websocket.DISABLE_BUILTIN_EXTENSIONS=true
-org.apache.tomcat.websocket.ALLOW_UNSUPPORTED_EXTENSIONS=true
-org.apache.tomcat.websocket.DEFAULT_PROCESS_PERIOD=0
 user.language=en
 user.country=US
 
@@ -135,6 +132,9 @@ app/env/appds.Password=cts
 openejb.classloader.forced-load = com.sun.ts.tests.
 openejb.classloader.forced-skip=com.sun.ts.tests.jaspic.tssv.
 
+cxf.jaxrs.provider-comparator=org.apache.openejb.server.cxf.rs.CxfRsHttpListener$DefaultProviderComparator
+openejb.jaxrs.fail-on-constrainedto=false
+
 # not sure why we have to duplicate this one here
 log.file.location=%user.dir%/%openejb.home%/logs
 
vendor.authconfig.factory=org.apache.catalina.authenticator.jaspic.AuthConfigFactoryImpl
diff --git a/src/test/tomee/conf/jaspic-providers.xml 
b/src/test/tomee/conf/jaspic-providers.xml
index e618759..fc0ebe1 100644
--- a/src/test/tomee/conf/jaspic-providers.xml
+++ b/src/test/tomee/conf/jaspic-providers.xml
@@ -417,48 +417,6 @@
             appContext="Catalina/localhost 
/securityapi_securitycontext_getprincipalsbytype_web"
             description="any">
   </provider>
-
-  <provider name="any"
-            
className="com.sun.ts.tests.jaspic.tssv.config.TSAuthConfigProvider"
-            layer="SOAP"
-            appContext="null"
-            description="TestSuite JSR 196 Config Provider">
-    <property name="AuthStatus_SEND_SUCCESS"
-              value="false" />
-    <property name="requestPolicy"
-              value="USER_NAME_PASSWORD" />
-  </provider>
-  <provider name="any"
-            
className="com.sun.ts.tests.jaspic.tssv.config.TSAuthConfigProvider"
-            layer="SOAP"
-            appContext="Catalina/localhost /Hello_web/Hello"
-            description="TestSuite JSR 196 Config Provider">
-    <property name="AuthStatus_SEND_SUCCESS"
-              value="false" />
-    <property name="requestPolicy"
-              value="USER_NAME_PASSWORD" />
-  </provider>
-  <provider name="any"
-            
className="com.sun.ts.tests.jaspic.tssv.config.TSAuthConfigProviderServlet"
-            layer="HttpServlet"
-            appContext="Catalina/localhost /spitests_servlet_web"
-            description="Registration for TSAuthConfigProviderServlet using 
spitests_servlet_web">
-    <property name="AuthStatus_SEND_SUCCESS"
-              value="true" />
-    <property name="requestPolicy"
-              value="USER_NAME_PASSWORD" />
-  </provider>
-  <provider name="any"
-            
className="com.sun.ts.tests.jaspic.tssv.config.TSAuthConfigProviderServlet"
-            layer="HttpServlet"
-            appContext="Catalina/localhost 
/spitests_servlet_web/WrapperServlet"
-            description="Registration for TSAuthConfigProviderServlet using 
spitests_servlet_web">
-    <property name="AuthStatus_SEND_SUCCESS"
-              value="true" />
-    <property name="requestPolicy"
-              value="USER_NAME_PASSWORD" />
-  </provider>
-
 </jaspic-providers>
 
 
diff --git a/src/test/tomee/conf/server.xml b/src/test/tomee/conf/server.xml
index 3b80e3e..beaefb0 100644
--- a/src/test/tomee/conf/server.xml
+++ b/src/test/tomee/conf/server.xml
@@ -70,6 +70,7 @@
     -->
     <Connector port="%webcontainer.default.port%" protocol="HTTP/1.1"
                connectionTimeout="20000"
+               allowTrace="true"
                redirectPort="%webcontainer.default.ssl.port%"/>
     <!-- A "Connector" using the shared thread pool-->
     <!--
diff --git a/src/test/tomee/conf/system.properties 
b/src/test/tomee/conf/system.properties
index 0556ad0..07676c6 100644
--- a/src/test/tomee/conf/system.properties
+++ b/src/test/tomee/conf/system.properties
@@ -17,9 +17,6 @@
 
 org.apache.catalina.STRICT_SERVLET_COMPLIANCE=true
 org.apache.tomcat.util.http.ServerCookie.FWD_SLASH_IS_SEPARATOR=false
-org.apache.tomcat.websocket.DISABLE_BUILTIN_EXTENSIONS=true
-org.apache.tomcat.websocket.ALLOW_UNSUPPORTED_EXTENSIONS=true
-org.apache.tomcat.websocket.DEFAULT_PROCESS_PERIOD=0
 user.language=en
 user.country=US
 
@@ -135,6 +132,9 @@ app/env/appds.Password=cts
 openejb.classloader.forced-load = com.sun.ts.tests.
 openejb.classloader.forced-skip=org.apache.derby.,com.sun.ts.tests.jaspic.tssv.
 
+cxf.jaxrs.provider-comparator=org.apache.openejb.server.cxf.rs.CxfRsHttpListener$DefaultProviderComparator
+openejb.jaxrs.fail-on-constrainedto=false
+
 # not sure why we have to duplicate this one here
 log.file.location=%user.dir%/%openejb.home%/logs
 
vendor.authconfig.factory=org.apache.catalina.authenticator.jaspic.AuthConfigFactoryImpl

Reply via email to