Interesting. I'd be in favor of commenting those tests out and merging the
PR, if you think the rest of it is in shape. If the spec says there should
be a deployment exception, then that makes sense. The TCK should probably
start its own little embedded http server to supply these keys instead. We
could contribute a PR there for consideration there.

Jon

On Mon, Dec 3, 2018 at 4:39 PM Roberto Cortez <radcor...@yahoo.com.invalid>
wrote:

> Yes,
>
> I think that the current state of the TCK is actually wrong. Look here:
> https://github.com/eclipse/microprofile-jwt-auth/issues/118 <
> https://github.com/eclipse/microprofile-jwt-auth/issues/118>
>
> And also from the spec:
> MicroProfile JWT implementations are required to throw a
> `DeploymentException` when given
> a public key that cannot be parsed using either the standardly supported or
> vendor-specific key formats.
>
> My understanding of this is that the load / parsing of the key is part of
> the application deployment, so if you fail to load the key you should fail
> with DeploymentException. It doesn’t make sense to defer the loading of the
> key when you need it and then fail with the DeploymentException, when the
> application is already deployed.
>
> Now, the issue is a chicken / egg. The TCK test exposes the key to load
> from an endpoint in the actual test app that we are testing. I believe the
> correct behaviour should be to have a separate test app that exposes the
> test keys and then have a separate app to test the behaviour.
>
> I think we can implement our own tests like these and then contribute them
> back / fix the TCK.
>
> Cheers,
> Roberto
>
> > On 3 Dec 2018, at 16:24, Jonathan Gallimore <
> jonathan.gallim...@gmail.com> wrote:
> >
> > Thanks for asking. There are 3 tests I can't get passing. These are the
> > ones where the key is referred to by a HTTP url, which isn't available at
> > deployment time where the keys are actually read. I spent quite a lot of
> > time trying to make this happen later in lifecycle (like on first load,
> or
> > something like that). I ended up getting lost in a complete maze of
> > lambdas. I am stuck and in need of help. I think this class is the issue:
> >
> https://github.com/jgallimore/tomee/blob/jwt-1.1/mp-jwt/src/main/java/org/apache/tomee/microprofile/jwt/config/ConfigurableJWTAuthContextInfo.java
> ,
> > and this piece of functionality will probably need some design discussion
> > to enable these tests to pass.
> >
> > I had tried flip the storage to Map<String,Supplier> with a supplier that
> > does a lazy lookup and caches the value. The issue there is the JWKS
> keys,
> > where you appear to get multiple keys in one file. Wrapping the whole
> thing
> > a supplier might work too - you'd effectively then have run that logic on
> > first login, or find something else that can trigger it.
> >
> > Do you have any thoughts?
> >
> > Jon
> >
> > On Mon, Dec 3, 2018 at 3:27 PM Roberto Cortez
> <radcor...@yahoo.com.invalid>
> > wrote:
> >
> >> Hi Jon,
> >>
> >> I’ve seen you made some changes in your branch. What is the current
> >> status? I would like to start pushing for MP 2.0 specs.
> >>
> >> Cheers,
> >> Roberto
> >>
> >>> On 21 Nov 2018, at 17:57, Jonathan Gallimore <
> >> jonathan.gallim...@gmail.com> wrote:
> >>>
> >>> Was going to have another look at those tests over the next couple of
> >> days.
> >>>
> >>> Jon
> >>>
> >>> On Wed, 21 Nov 2018, 17:53 Roberto Cortez <radcor...@yahoo.com.invalid
> >>> wrote:
> >>>
> >>>> Hi Jon,
> >>>>
> >>>> What it the status of this?
> >>>>
> >>>> For the remaining failing tests, the issues are related with this:
> >>>> https://github.com/eclipse/microprofile-jwt-auth/issues/118 <
> >>>> https://github.com/eclipse/microprofile-jwt-auth/issues/118>
> >>>>
> >>>> I don’t think there is a way to fix it on our side, so se could just
> >>>> ignore those specific methods and build a specific test for this with
> 2
> >>>> apps deployment so we can reach out then public key endpoint from the
> >> test.
> >>>> Then we should be good to go with this!
> >>>>
> >>>> Cheers,
> >>>> Roberto
> >>>>
> >>>>> On 20 Nov 2018, at 15:28, Jean-Louis Monteiro <
> >> jlmonte...@tomitribe.com>
> >>>> wrote:
> >>>>>
> >>>>> Ok, yes I see it.
> >>>>> --
> >>>>> Jean-Louis Monteiro
> >>>>> http://twitter.com/jlouismonteiro
> >>>>> http://www.tomitribe.com
> >>>>>
> >>>>>
> >>>>> On Tue, Nov 20, 2018 at 4:11 PM Jonathan Gallimore <
> >>>>> jonathan.gallim...@gmail.com> wrote:
> >>>>>
> >>>>>> The commits are showing for me (at the bottom). Here's the latest
> one:
> >>>>>>
> >>>>>>
> >>>>
> >>
> https://github.com/apache/tomee/commit/7ce1f8033e239331cfa7843e4e5565ed0aa83345
> >>>>>>
> >>>>>> On Tue, Nov 20, 2018 at 2:44 PM Jean-Louis Monteiro <
> >>>>>> jlmonte...@tomitribe.com> wrote:
> >>>>>>
> >>>>>>> Hey Jon,
> >>>>>>>
> >>>>>>> I clicked on the link and the diff tab does not show any
> difference.
> >>>>>>> Did you push?
> >>>>>>> --
> >>>>>>> Jean-Louis Monteiro
> >>>>>>> http://twitter.com/jlouismonteiro
> >>>>>>> http://www.tomitribe.com
> >>>>>>>
> >>>>>>>
> >>>>>>> On Mon, Nov 19, 2018 at 12:36 PM Jonathan Gallimore <
> >>>>>>> jonathan.gallim...@gmail.com> wrote:
> >>>>>>>
> >>>>>>>> I now have the principal injection part of this working - thanks
> >>>> Romain
> >>>>>>> for
> >>>>>>>> your help and explanations. Progress is in my fork here:
> >>>>>>>> https://github.com/jgallimore/tomee/tree/jwt-1.1 (changes here:
> >>>>>>>>
> >>>>>>>>
> >>>>>>>
> >>>>>>
> >>>>
> >>
> https://github.com/apache/tomee/compare/master...jgallimore:jwt-1.1?expand=1
> >>>>>>>> ).
> >>>>>>>> There are still a couple of TODOs to clean up, and 3 tests to get
> >>>>>>> passing.
> >>>>>>>> Any feedback is appreciated.
> >>>>>>>>
> >>>>>>>> Jon
> >>>>>>>>
> >>>>>>>> On Sat, Nov 3, 2018 at 9:10 AM Jonathan Gallimore <
> >>>>>>>> jonathan.gallim...@gmail.com> wrote:
> >>>>>>>>
> >>>>>>>>> Yep, got it. Thanks for the feedback - makes sense now.
> >>>>>>>>>
> >>>>>>>>> Cheers
> >>>>>>>>>
> >>>>>>>>> Jon
> >>>>>>>>>
> >>>>>>>>> On Fri, 2 Nov 2018, 16:46 Romain Manni-Bucau <
> >> rmannibu...@gmail.com
> >>>>>>>> wrote:
> >>>>>>>>>
> >>>>>>>>>> Answered hopefully "long enough" on dev@geronimo so will just
> do
> >> a
> >>>>>>>> short
> >>>>>>>>>> one here and shout if not enough: ManagedSecurityService in cdi
> >>>>>>> package
> >>>>>>>> of
> >>>>>>>>>> openejb-core must make the getCurrentPrincipal contextual so
> >> hidden
> >>>>>>>> behind
> >>>>>>>>>> a proxy. The proxied API must be Principal and JsonWebToken when
> >>>>>>>> available
> >>>>>>>>>> (try { add if can load } catch { ignore } works as pattern). The
> >>>>>> proxy
> >>>>>>>>>> instance can be created once for all app using the container
> >> loader
> >>>>>> or
> >>>>>>>> per
> >>>>>>>>>> app using the app loader and avoiding to leak between apps since
> >> the
> >>>>>>> API
> >>>>>>>>>> can use different loaders.
> >>>>>>>>>>
> >>>>>>>>>> Le ven. 2 nov. 2018 14:44, Jonathan Gallimore <
> >>>>>>>>>> jonathan.gallim...@gmail.com>
> >>>>>>>>>> a écrit :
> >>>>>>>>>>
> >>>>>>>>>>> Thanks for the reply, but I am confused by your response. The
> PR
> >> I
> >>>>>>>>>>> referenced adds a single test to the geronimo-jwt-auth project
> (
> >>>>>>>>>>> https://github.com/apache/geronimo-jwt-auth/pull/3), based on
> >>>>>>>>>>>
> >>>>>>>>
> >>>>
> org.eclipse.microprofile.jwt.tck.container.jaxrs.PrincipalInjectionTest
> >>>>>>>>>>> from the TCK. It fails at present (hopefully we agree on that -
> >> my
> >>>>>>>>>> results
> >>>>>>>>>>> attached). The geronimo-jwt-auth project doesn't touch TomEE at
> >>>>>> all
> >>>>>>> -
> >>>>>>>> it
> >>>>>>>>>>> uses OWB/Meecrowave to run the MicroProfile JWT TCK. I have not
> >>>>>>>> modified
> >>>>>>>>>>> the project config at all, so it is using the SecurityService
> >> code
> >>>>>>> you
> >>>>>>>>>>> previously posted. If this additional test were part of the
> >>>>>>>> MicroProfile
> >>>>>>>>>>> JWT TCK (and I'm going to propose it), the Geronimo JWT Auth
> >>>>>>>>>> implementation
> >>>>>>>>>>> would *not* pass the TCK.
> >>>>>>>>>>>
> >>>>>>>>>>> I posted this here as I originally found the issue when
> >> continuing
> >>>>>>>>>>> Roberto's efforts, but this has probably contributed to some
> >>>>>>>> confusion.
> >>>>>>>>>> I
> >>>>>>>>>>> would suggest we continue this over on the Geronimo and OWB
> lists
> >>>>>> to
> >>>>>>>>>> avoid
> >>>>>>>>>>> further confusion.
> >>>>>>>>>>>
> >>>>>>>>>>> Jon
> >>>>>>>>>>>
> >>>>>>>>>>> On Fri, Nov 2, 2018 at 12:46 PM Romain Manni-Bucau <
> >>>>>>>>>> rmannibu...@gmail.com>
> >>>>>>>>>>> wrote:
> >>>>>>>>>>>
> >>>>>>>>>>>> Hi
> >>>>>>>>>>>>
> >>>>>>>>>>>> Yes this is an owb misconfiguration/integration
> >>>>>>>>>>>>
> >>>>>>>>>>>> Geronimo is fine here so likely tomee owb spi to update as in
> >>>>>>>> geronimo
> >>>>>>>>>> tck
> >>>>>>>>>>>>
> >>>>>>>>>>>> Le ven. 2 nov. 2018 10:42, Jonathan Gallimore <
> >>>>>>>>>>>> jonathan.gallim...@gmail.com>
> >>>>>>>>>>>> a écrit :
> >>>>>>>>>>>>
> >>>>>>>>>>>>> Thanks for the reply. I am still sure there is some sort of
> >>>>>>> issue.
> >>>>>>>>>>>> Putting
> >>>>>>>>>>>>> TomEE to one side for the moment, I am able to reproduce this
> >>>>>> in
> >>>>>>>> the
> >>>>>>>>>>>>> Geronimo JWT auth library as well. This PR includes a test to
> >>>>>>> show
> >>>>>>>>>> what
> >>>>>>>>>>>> I
> >>>>>>>>>>>>> mean: https://github.com/apache/geronimo-jwt-auth/pull/3.
> >>>>>>>>>>>>>
> >>>>>>>>>>>>> I can confirm that this change:
> >>>>>>>>>>>>> https://github.com/apache/openwebbeans/pull/12 enables that
> >>>>>> new
> >>>>>>>>>> test to
> >>>>>>>>>>>>> pass.
> >>>>>>>>>>>>>
> >>>>>>>>>>>>> In short, if you @Inject JsonWebToken, or individual claims,
> or
> >>>>>>>>>>>>> use @RolesAllowed, I think you're ok, but if you @Inject
> >>>>>>> Principal,
> >>>>>>>>>> you
> >>>>>>>>>>>>> will most likely get the wrong principal because the instance
> >>>>>> is
> >>>>>>>>>> cache
> >>>>>>>>>>>> in a
> >>>>>>>>>>>>> field in the
> org.apache.webbeans.portable.ProviderBasedProducer
> >>>>>>>>>> class,
> >>>>>>>>>>>> and
> >>>>>>>>>>>>> that looks like a security issue.
> >>>>>>>>>>>>>
> >>>>>>>>>>>>> Jon
> >>>>>>>>>>>>>
> >>>>>>>>>>>>> On Tue, Oct 30, 2018 at 5:56 AM Romain Manni-Bucau <
> >>>>>>>>>>>> rmannibu...@gmail.com>
> >>>>>>>>>>>>> wrote:
> >>>>>>>>>>>>>
> >>>>>>>>>>>>>> Hi Jon,
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>> yes and no, idea is to be fast and for all producers it
> works
> >>>>>>>>>> except
> >>>>>>>>>>>> the
> >>>>>>>>>>>>>> principal which is broken anyway in CDI 1.x so guess this
> was
> >>>>>>> not
> >>>>>>>>>>>> fixed
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>> in CDI 2 (tomee 8) we can impl it this way:
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>
> >>>>>>>>>>>>
> >>>>>>>>>>
> >>>>>>>>
> >>>>>>>
> >>>>>>
> >>>>
> >>
> https://github.com/apache/geronimo-jwt-auth/blob/master/src/test/java/org/apache/geronimo/microprofile/impl/jwtauth/tck/TckSecurityService.java
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>> Romain Manni-Bucau
> >>>>>>>>>>>>>> @rmannibucau <https://twitter.com/rmannibucau> |  Blog
> >>>>>>>>>>>>>> <https://rmannibucau.metawerx.net/> | Old Blog
> >>>>>>>>>>>>>> <http://rmannibucau.wordpress.com> | Github <
> >>>>>>>>>>>>>> https://github.com/rmannibucau> |
> >>>>>>>>>>>>>> LinkedIn <https://www.linkedin.com/in/rmannibucau> | Book
> >>>>>>>>>>>>>> <
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>
> >>>>>>>>>>>>
> >>>>>>>>>>
> >>>>>>>>
> >>>>>>>
> >>>>>>
> >>>>
> >>
> https://www.packtpub.com/application-development/java-ee-8-high-performance
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>> Le mar. 30 oct. 2018 à 00:58, Jonathan Gallimore <
> >>>>>>>>>>>>>> jonathan.gallim...@gmail.com> a écrit :
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>>> Here's a question, probably for Mark or Romain. If I turn
> >>>>>> the
> >>>>>>>>>> proxy
> >>>>>>>>>>>>> *off*
> >>>>>>>>>>>>>>> in org.apache.webbeans.component.PrincipalBean, I'm finding
> >>>>>>>> that
> >>>>>>>>>> I
> >>>>>>>>>>>> get
> >>>>>>>>>>>>>> the
> >>>>>>>>>>>>>>> wrong principal injected sometimes. Specifically, I get the
> >>>>>>>>>>>> whatever is
> >>>>>>>>>>>>>> on
> >>>>>>>>>>>>>>> the proxyInstance field here:
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>
> >>>>>>>>>>>>
> >>>>>>>>>>
> >>>>>>>>
> >>>>>>>
> >>>>>>
> >>>>
> >>
> https://github.com/apache/openwebbeans/blob/trunk/webbeans-impl/src/main/java/org/apache/webbeans/portable/ProviderBasedProducer.java#L51
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>> Should this line (line 66)
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>
> >>>>>>>>>>>>
> >>>>>>>>>>
> >>>>>>>>
> >>>>>>>
> >>>>>>
> >>>>
> >>
> https://github.com/apache/openwebbeans/blob/trunk/webbeans-impl/src/main/java/org/apache/webbeans/portable/ProviderBasedProducer.java#L66
> >>>>>>>>>>>>>>> ,
> >>>>>>>>>>>>>>> not simply be:
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>> return provider.get();
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>> as opposed to
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>> proxyInstance = provider.get(); ?
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>> That way, the proxyInstance field would never get set if
> >>>>>>> proxy
> >>>>>>>>>> mode
> >>>>>>>>>>>> is
> >>>>>>>>>>>>>> set
> >>>>>>>>>>>>>>> to false. When proxy is true, this seems to work correctly
> >>>>>>>>>>>> (although I
> >>>>>>>>>>>>>> have
> >>>>>>>>>>>>>>> other unrelated issues in TomEE).
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>> I can probably work around this some other way, but it
> >>>>>> seems
> >>>>>>> to
> >>>>>>>>>> me
> >>>>>>>>>>>> like
> >>>>>>>>>>>>>>> that behaviour isn't quite right.
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>> Trying to think of a way to test it - I can probably come
> >>>>>> up
> >>>>>>>> with
> >>>>>>>>>>>>>>> something, but I'd appreciate some pointers. Happy to shift
> >>>>>>>> this
> >>>>>>>>>> to
> >>>>>>>>>>>>>>> openwebbeans-dev, and submit a PR. Replying here initially
> >>>>>>> as I
> >>>>>>>>>> ran
> >>>>>>>>>>>>> into
> >>>>>>>>>>>>>>> this while hacking on the JWT code.
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>> Jon
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>> On Wed, Oct 17, 2018 at 12:41 AM Roberto Cortez
> >>>>>>>>>>>>>>> <radcor...@yahoo.com.invalid>
> >>>>>>>>>>>>>>> wrote:
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>> Please, go ahead. Let me know if need anything. Thanks!
> >>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>> On 16 Oct 2018, at 21:53, Jonathan Gallimore <
> >>>>>>>>>>>>>>>> jonathan.gallim...@gmail.com> wrote:
> >>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>> Any objection if I pick this up and have a go at the
> >>>>>> last
> >>>>>>>>>>>> tests, or
> >>>>>>>>>>>>>> is
> >>>>>>>>>>>>>>>>> someone already working on this?
> >>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>> On Thu, Sep 27, 2018 at 5:44 PM Romain Manni-Bucau <
> >>>>>>>>>>>>>>>> rmannibu...@gmail.com>
> >>>>>>>>>>>>>>>>> wrote:
> >>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>> Yep this feature. Then it must works since we support
> >>>>>>> user
> >>>>>>>>>>>>> principal
> >>>>>>>>>>>>>>> if
> >>>>>>>>>>>>>>>> the
> >>>>>>>>>>>>>>>>>> jwt filter is corretly placed in the filter chain and
> >>>>>> we
> >>>>>>>>>> must
> >>>>>>>>>>>>>> inherit
> >>>>>>>>>>>>>>>> from
> >>>>>>>>>>>>>>>>>> the request principal.
> >>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>> Le jeu. 27 sept. 2018 18:37, Roberto Cortez
> >>>>>>>>>>>>>>> <radcor...@yahoo.com.invalid
> >>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>> a
> >>>>>>>>>>>>>>>>>> écrit :
> >>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>> I guess you are referring to this, to remove the
> >>>>>> proxy?
> >>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>
> >>>>>>>>>>>>
> >>>>>>>>>>
> >>>>>>>>
> >>>>>>>
> >>>>>>
> >>>>
> >>
> https://github.com/apache/openwebbeans/commit/a21a949fb19247dcc39ee89292a1554b2cf1388e
> >>>>>>>>>>>>>>>>>>> <
> >>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>
> >>>>>>>>>>>>
> >>>>>>>>>>
> >>>>>>>>
> >>>>>>>
> >>>>>>
> >>>>
> >>
> https://github.com/apache/openwebbeans/commit/a21a949fb19247dcc39ee89292a1554b2cf1388e
> >>>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>> Yes, this one step.
> >>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>> By default, we do inject the generic Principal of
> >>>>>>> Tomcat.
> >>>>>>>>>> We
> >>>>>>>>>>>>>> probably
> >>>>>>>>>>>>>>>>>> need
> >>>>>>>>>>>>>>>>>>> to check first about the existence of a JWT Principal
> >>>>>>> and
> >>>>>>>>>> then
> >>>>>>>>>>>>>>> fallback
> >>>>>>>>>>>>>>>>>> to
> >>>>>>>>>>>>>>>>>>> the Tomcat one. I think I know how to do it, I was
> >>>>>> just
> >>>>>>>>>>>> trying to
> >>>>>>>>>>>>>>>> broaden
> >>>>>>>>>>>>>>>>>>> up the conversation about general integration with EE
> >>>>>>>>>>>> security.
> >>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>> Cheers,
> >>>>>>>>>>>>>>>>>>> Roberto
> >>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>>> On 26 Sep 2018, at 07:21, Romain Manni-Bucau <
> >>>>>>>>>>>>>> rmannibu...@gmail.com
> >>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>> wrote:
> >>>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>>> OWB enable to do it - we did it in geronimo impl to
> >>>>>>> pass
> >>>>>>>>>> tck
> >>>>>>>>>>>> of
> >>>>>>>>>>>>>> jwt
> >>>>>>>>>>>>>>>>>> auth
> >>>>>>>>>>>>>>>>>>>> spec.
> >>>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>>> Le mer. 26 sept. 2018 03:28, Roberto Cortez
> >>>>>>>>>>>>>>>>>> <radcor...@yahoo.com.invalid>
> >>>>>>>>>>>>>>>>>>> a
> >>>>>>>>>>>>>>>>>>>> écrit :
> >>>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>>>> Hi,
> >>>>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>>>> I’ve done some work to push our MP JWT
> >>>>>> implementation
> >>>>>>>>>> from
> >>>>>>>>>>>> 1.0
> >>>>>>>>>>>>> to
> >>>>>>>>>>>>>>>> 1.1.
> >>>>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>>>> You can check it here:
> >>>>>>>>>>>>>>>>>>>>> https://github.com/apache/tomee/pull/173 <
> >>>>>>>>>>>>>>>>>>>>> https://github.com/apache/tomee/pull/173>
> >>>>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>>>> There are still a couple of tests in the TCK that I
> >>>>>>>> have
> >>>>>>>>>> to
> >>>>>>>>>>>> fix
> >>>>>>>>>>>>>>> and a
> >>>>>>>>>>>>>>>>>>> few
> >>>>>>>>>>>>>>>>>>>>> things that I would like to improve, but I think
> >>>>>> the
> >>>>>>>>>>>> majority
> >>>>>>>>>>>>> of
> >>>>>>>>>>>>>>> the
> >>>>>>>>>>>>>>>>>>> work
> >>>>>>>>>>>>>>>>>>>>> is done.
> >>>>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>>>> Some time ago, there was a discussion in the list
> >>>>>>> about
> >>>>>>>>>> how
> >>>>>>>>>>>> to
> >>>>>>>>>>>>>>>>>> integrate
> >>>>>>>>>>>>>>>>>>>>> MP JWT with EE security:
> >>>>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>
> >>>>>>>>>>>>
> >>>>>>>>>>
> >>>>>>>>
> >>>>>>>
> >>>>>>
> >>>>
> >>
> http://tomee-openejb.979440.n4.nabble.com/Implementing-Microprofile-JWT-td4683212i40.html
> >>>>>>>>>>>>>>>>>>>>> <
> >>>>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>
> >>>>>>>>>>>>
> >>>>>>>>>>
> >>>>>>>>
> >>>>>>>
> >>>>>>
> >>>>
> >>
> http://tomee-openejb.979440.n4.nabble.com/Implementing-Microprofile-JWT-td4683212i40.html
> >>>>>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>>>> I believe we need to revisit that conversation and
> >>>>>>>> figure
> >>>>>>>>>>>> out
> >>>>>>>>>>>>> how
> >>>>>>>>>>>>>>> to
> >>>>>>>>>>>>>>>>>>> move
> >>>>>>>>>>>>>>>>>>>>> forward.
> >>>>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>>>> Right now for instance, we don’t support injecting
> >>>>>> a
> >>>>>>>> JWT
> >>>>>>>>>>>>>> Principal
> >>>>>>>>>>>>>>>>>> since
> >>>>>>>>>>>>>>>>>>>>> it clashes with the predefined by CDI. Most likely,
> >>>>>>> we
> >>>>>>>>>> would
> >>>>>>>>>>>>> need
> >>>>>>>>>>>>>>> to
> >>>>>>>>>>>>>>>>>>> plugin
> >>>>>>>>>>>>>>>>>>>>> the JWT Principal lookup in TomcatSecurityService.
> >>>>>>> I’m
> >>>>>>>>>> not
> >>>>>>>>>>>> sure
> >>>>>>>>>>>>>> if
> >>>>>>>>>>>>>>> we
> >>>>>>>>>>>>>>>>>>> want
> >>>>>>>>>>>>>>>>>>>>> to do it in that way, or if we want to think in
> >>>>>>>> something
> >>>>>>>>>>>> else.
> >>>>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>>>> Cheers,
> >>>>>>>>>>>>>>>>>>>>> Roberto
> >>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>
> >>>>>>>>>>>>
> >>>>>>>>>>>
> >>>>>>>>>>
> >>>>>>>>>
> >>>>>>>>
> >>>>>>>
> >>>>>>
> >>>>
> >>>>
> >>
> >>
>
>

Reply via email to