(cxf) branch CXF-9008 updated (ce34603c27 -> c3a75c76ca)

2024-05-26 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a change to branch CXF-9008
in repository https://gitbox.apache.org/repos/asf/cxf.git


 discard ce34603c27 fips support
 add ed2850d40b Update Spring Framework to 6.1.7
 add 3896935619 Bump com.sun.xml.messaging.saaj:saaj-impl from 3.0.3 to 
3.0.4 (#1878)
 add 4be33dce0c Bump jakarta.xml.ws:jakarta.xml.ws-api from 4.0.1 to 4.0.2 
(#1879)
 add b8dca12d7a Bump org.graalvm.buildtools:native-maven-plugin from 0.10.1 
to 0.10.2 (#1883)
 add ffd1a3aed2 Bump org.codehaus.mojo:build-helper-maven-plugin from 3.5.0 
to 3.6.0 (#1882)
 add a3b103fc80 Bump actions/checkout from 4.1.5 to 4.1.6 (#1880)
 add b660f71147 Bump github/codeql-action from 2.13.4 to 3.25.5 (#1881)
 add dfe8bc122f --- (#1884)
 add eea3c9b041 --- (#1885)
 add 7f33a57480 --- (#1886)
 add aa3787b4ef --- (#1887)
 add a9933e7d71 Update cxf-xjc-utils to 4.1.0-SNAPSHOT
 add 09e158b832 Update Wiremock to 3.6.0
 add d77fd08202 Update Spring Framework to 6.1.8
 add eed8283b79 Bump cxf.netty.version from 4.1.109.Final to 4.1.110.Final 
(#1888)
 add 9e49950993 Update Spring Boot to 3.3.0
 add 2b500aab12 Bump org.eclipse.persistence:org.eclipse.persistence.moxy 
(#1892)
 add 6ad50d5efb [CXF-9019] Jaxws spi unit test coverage enhancement. (#1890)
 add 7dcafef996 Remove h from ESCAPED_CHARS in JsonMapObjectReaderWriter 
(#1872)
 new c3a75c76ca fips support

This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version.  This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:

 * -- * -- B -- O -- O -- O   (ce34603c27)
\
 N -- N -- N   refs/heads/CXF-9008 (c3a75c76ca)

You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.

Any revisions marked "omit" are not gone; other references still
refer to them.  Any revisions marked "discard" are gone forever.

The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 .github/workflows/codeql-analysis.yml  |   6 +-
 .github/workflows/pull-request-build.yml   |   2 +-
 .github/workflows/scorecards.yml   |   4 +-
 .../main/release/samples/corba/hello_world/pom.xml |   2 +-
 .../release/samples/jax_rs/graalvm_basic/pom.xml   |   4 +-
 .../src/main/release/samples/jaxws_graalvm/pom.xml |   4 +-
 .../samples/jaxws_graalvm_dynamic/client/pom.xml   |   2 +-
 .../samples/jaxws_graalvm_dynamic/server/pom.xml   |   2 +-
 distribution/src/main/release/samples/pom.xml  |   6 +-
 parent/pom.xml |  20 +-
 pom.xml|   4 +-
 .../org/apache/cxf/jaxws/spi/ProviderImplTest.java | 243 -
 .../WrapperClassCreatorProxyServiceTest.java}  |  56 +++--
 .../cxf/jaxws/spi/WrapperClassLoaderTest.java  | 162 ++
 .../json/basic/JsonMapObjectReaderWriter.java  |   2 +-
 .../security/jose/jwejws/JAXRSJweJwsTest.java  |  26 ++-
 .../security/jose/jwejws/JweJwsAlgorithmTest.java  |  26 +--
 .../jaxrs/security/alice.jwk.oaep.properties   |  22 --
 .../jaxrs/security/certs/jwkPrivateSet-oaep.txt|  43 
 .../jose/jwejws/algorithms-server-fips.xml |  13 --
 .../ws/algsuite/StaxAlgorithmSuiteTest.java|  13 +-
 .../org/apache/cxf/systest/ws/gcm/MGFServer.java   |   2 +-
 .../systest/ws/security/SecurityPolicyTest.java|   8 +-
 23 files changed, 508 insertions(+), 164 deletions(-)
 copy 
rt/frontend/jaxws/src/test/java/org/apache/cxf/jaxws/{AbstractJaxWsTest.java => 
spi/WrapperClassCreatorProxyServiceTest.java} (67%)
 create mode 100644 
rt/frontend/jaxws/src/test/java/org/apache/cxf/jaxws/spi/WrapperClassLoaderTest.java
 delete mode 100644 
systests/rs-security/src/test/resources/org/apache/cxf/systest/jaxrs/security/alice.jwk.oaep.properties
 delete mode 100644 
systests/rs-security/src/test/resources/org/apache/cxf/systest/jaxrs/security/certs/jwkPrivateSet-oaep.txt



(cxf) branch CXF-9008 updated (bdf7b02c2b -> ce34603c27)

2024-05-16 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a change to branch CXF-9008
in repository https://gitbox.apache.org/repos/asf/cxf.git


 discard bdf7b02c2b fips support
 add f383915d51 CXF-9013: Move performance benchmark to distribution 
samples folder (#1867)
 add cc06da466d Bump io.swagger.core.v3:swagger-jaxrs2-jakarta from 2.2.21 
to 2.2.22 (#1877)
 add e864b59e95 Bump org.owasp:dependency-check-maven from 9.1.0 to 9.2.0 
(#1876)
 add 62495cd141 [CXF-9014]1024-bit RSA key (weak) and isn't allowed in 
modern JDK versions(SignatureWhitespaceTest failure) (#1875)
 new ce34603c27 fips support

This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version.  This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:

 * -- * -- B -- O -- O -- O   (bdf7b02c2b)
\
 N -- N -- N   refs/heads/CXF-9008 (ce34603c27)

You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.

Any revisions marked "omit" are not gone; other references still
refer to them.  Any revisions marked "discard" are gone forever.

The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 .../main/release/samples}/performance/README.txt   |   0
 .../release/samples}/performance/base/build.xml|   0
 .../main/release/samples}/performance/base/pom.xml |  21 +-
 .../org/apache/cxf/pat/internal/TestCaseBase.java  |  35 ++-
 .../org/apache/cxf/pat/internal/TestResult.java|   0
 .../org/apache/cxf/pat/internal/TestRunner.java|   0
 .../samples}/performance/basic_type/bin/run_client |   0
 .../performance/basic_type/bin/run_client.bat  |   0
 .../samples}/performance/basic_type/bin/run_server |   0
 .../performance/basic_type/bin/run_server.bat  |   0
 .../samples}/performance/basic_type/build.xml  |   0
 .../cxf/performance/basic_type/client/Client.java  |   0
 .../cxf/performance/basic_type/server/Server.java  |   0
 .../performance/basic_type/server/ServerImpl.java  |   0
 .../performance/basic_type/wsdl/basic_type.wsdl|   0
 .../performance/basic_type/wsdl/cxf-servlet.xml|   0
 .../performance/complex_type/bin/run_client|   0
 .../performance/complex_type/bin/run_client.bat|   0
 .../performance/complex_type/bin/run_server|   0
 .../performance/complex_type/bin/run_server.bat|   0
 .../samples}/performance/complex_type/build.xml|   0
 .../performance/complex_type/client/Client.java|   0
 .../performance/complex_type/server/Server.java|   0
 .../complex_type/server/ServerImpl.java|   0
 .../complex_type/wsdl/complex_type.wsdl|   0
 .../performance/complex_type/wsdl/cxf-servlet.xml  |   0
 .../samples}/performance/etc/common_build.xml  |   0
 .../release/samples/performance/jaxrs/README.txt   |  67 +
 .../main/release/samples/performance/jaxrs/pom.xml | 168 +
 .../jaxrs}/src/main/config/KeyREADME.txt   |   0
 .../jaxrs}/src/main/config/clientKeystore.jks  | Bin
 .../jaxrs}/src/main/config/serviceKeystore.jks | Bin
 .../cxf/performance/https/client/Client.java   | 224 +
 .../cxf/performance/https/common/Customer.java |  43 +---
 .../performance/https/common/CustomerService.java  |  52 
 .../https/server/CustomerServiceImpl.java  |  88 +++
 .../cxf/performance/https}/server/Server.java  |  58 ++---
 .../jaxrs}/src/main/resources/ClientConfig.xml |   0
 .../jaxrs}/src/main/resources/ServerConfig.xml |   0
 .../soap_http_doc_lit/bin/run_java_client  |   0
 .../performance/soap_http_doc_lit/bin/run_server   |   0
 .../soap_http_doc_lit/bin/run_server.bat   |   0
 .../performance/soap_http_doc_lit/build.xml|   0
 .../performance/soap_http_doc_lit/build_axis.xml   |   0
 .../performance/soap_http_doc_lit/build_ri.xml |   0
 .../samples}/performance/soap_http_doc_lit/pom.xml |  36 ++-
 .../performance/complex_type/client/Client.java|   0
 .../common/KeystorePasswordCallback.java   |   0
 .../performance/complex_type/server/Server.java|   0
 .../complex_type/server/ServerImpl.java|   0
 .../src/main/resources/etc/clientKeystore.jks  | Bin
 .../main/resources/etc/clientKeystore.properties   |   0
 .../src/main/resources/etc/https-cfg-client.xml|   0
 .../src/main/resources/etc/https-cfg-service.xml   |   0
 .../src/main/resources/etc/policy-asym.xml |   0
 .../src/main/resources/etc/policy-sym.xml  |   0
 .../src/main/resources/et

(cxf) branch main updated: [CXF-9014]1024-bit RSA key (weak) and isn't allowed in modern JDK versions(SignatureWhitespaceTest failure) (#1875)

2024-05-16 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/main by this push:
 new 62495cd141 [CXF-9014]1024-bit RSA key (weak) and isn't allowed in 
modern JDK versions(SignatureWhitespaceTest failure) (#1875)
62495cd141 is described below

commit 62495cd1415f6073b12dea8a0c4d4248188ca63f
Author: Freeman(Yue) Fang 
AuthorDate: Thu May 16 13:28:26 2024 -0400

[CXF-9014]1024-bit RSA key (weak) and isn't allowed in modern JDK 
versions(SignatureWhitespaceTest failure) (#1875)
---
 .../org/apache/cxf/systest/ws/action/bob-modified.jks | Bin 2422 -> 4546 bytes
 .../cxf/systest/ws/action/request-with-comment.xml|  12 +---
 .../ws/action/request-with-trailing-whitespace.xml|  12 +---
 3 files changed, 10 insertions(+), 14 deletions(-)

diff --git 
a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/action/bob-modified.jks
 
b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/action/bob-modified.jks
index 26df583f43..a9e207e1bb 100644
Binary files 
a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/action/bob-modified.jks
 and 
b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/action/bob-modified.jks
 differ
diff --git 
a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/action/request-with-comment.xml
 
b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/action/request-with-comment.xml
index ca4a27f723..eac43c3fe1 100644
--- 
a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/action/request-with-comment.xml
+++ 
b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/action/request-with-comment.xml
@@ -1,11 +1,9 @@
 
-http://www.example.org/schema/DoubleIt; 
xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/;>
-   http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd;
 
xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd;>http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary;
 
ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509PKIPathv1;
 wsu:Id="X509-20518CC1C45561BA3 [...]
-q0bYL9kpL9+a/+/SHR4BGXhKVLqUUrYsbU9QqV9jgHDFRLgZKAfDYL7SjAIovCyubf0fCX6vh7yW
-4gGds/56Ls0PRPx306Y=http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509PKIPathv1;
 wsu:Id="STR-20518CC1C45561BA3A139904923417218" 
xmlns:wsse11="http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd;>http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss [...]
-   http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd;>
+http://www.example.org/schema/DoubleIt; 
xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/;>
+   http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd;
 
xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd;>http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary;
 
ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509PKIPathv1;
  [...]
+   http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd;>
   
  25
   
-   
-
\ No newline at end of file
+   
+
diff --git 
a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/action/request-with-trailing-whitespace.xml
 
b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/action/request-with-trailing-whitespace.xml
index 18a996d946..93fec747a6 100644
--- 
a/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/action/request-with-trailing-whitespace.xml
+++ 
b/systests/ws-security/src/test/resources/org/apache/cxf/systest/ws/action/request-with-trailing-whitespace.xml
@@ -1,11 +1,9 @@
 
-http://www.example.org/schema/DoubleIt; 
xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/;>
-   http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd;
 
xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd;>http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary;
 
ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509PKIPathv1;
 wsu:Id="X509-20518CC1C45561BA3 [...]
-q0bYL9kpL9+a/+/SHR4BGXhKVLqUUrYsbU9QqV9jgHDFRLgZKAfDYL7SjAIovCyubf0fCX6vh7yW
-4gGds/56Ls0PRPx306Y=http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509PKIPathv1;
 wsu:Id="STR-20518CC1C45561BA3A139904923417218" 
xmlns:wsse11="http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd;>

(cxf) branch CXF-9008 updated (4527a628f3 -> bdf7b02c2b)

2024-05-15 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a change to branch CXF-9008
in repository https://gitbox.apache.org/repos/asf/cxf.git


 discard 4527a628f3 fips support
 add cbb76ba807 Update Apache Tomcat to 10.1.23
 add f816ec68c9 Bump com.fasterxml.jackson.core:jackson-databind from 
2.17.0 to 2.17.1 (#1851)
 add 0b53df25a3 Bump cxf.undertow.version from 2.3.12.Final to 2.3.13.Final 
(#1848)
 add 48cc0d2602 Bump org.mozilla:rhino from 1.7.14 to 1.7.15 (#1852)
 add 978b5b9867 Bump org.apache.maven.plugins:maven-deploy-plugin from 
3.1.1 to 3.1.2 (#1853)
 add b8156fae4f [CXF-9006] Skip WSS40 cer validation check when on Red Hat 
JDK (#1836)
 add c56b1f1c2f Update Jetty to 12.0.9
 add 4ab8fcaef7 Bump org.jboss.logging:jboss-logging from 3.5.3.Final to 
3.6.0.Final (#1855)
 add e17b6d78ec [CXF-9010] Update benchmark soap http doc lit suite for CXF 
4.1.x (#1857)
 add 17d58fb767 Use URI factory to parse WSDL location (#1858)
 add db7514f272 Bump org.apache.maven.plugins:maven-plugin-plugin from 
3.12.0 to 3.13.0 (#1860)
 add 665823648c Bump org.wildfly.common:wildfly-common from 1.7.0.Final to 
2.0.0 (#1859)
 add efa1716a5c CXF-8987: JDK 21+:  HttpClientHTTPConduit thread locked 
during shutdown (#1854)
 add 388cf563fe Bump cxf.aspectj.version from 1.9.22 to 1.9.22.1 (#1862)
 add 61ee24c505 Bump cxf.mockito.version from 5.11.0 to 5.12.0 (#1863)
 add 79fd113bae Bump ossf/scorecard-action from 2.3.1 to 2.3.3 (#1866)
 add 0d301de6b9 Bump actions/checkout from 4.1.4 to 4.1.5 (#1865)
 add 369465b324 Update Micrometer Tracing to 1.2.6
 add 039aeefd97 Update Micrometer to 1.12.6
 add fab33b61db Update Apache Tomcat to 10.1.24
 add 5d46f9c9b2 Bump cxf.hibernate.em.version from 6.5.0.Final to 
6.5.1.Final (#1871)
 add 415869c2ee Bump cxf.micrometer.version from 1.12.6 to 1.13.0 (#1869)
 add ace3b1901c Bump 
org.apache.camel.springboot:camel-spring-boot-dependencies (#1873)
 add d5cbaed011 Bump cxf.reactor.version from 3.6.5 to 3.6.6 (#1874)
 new bdf7b02c2b fips support

This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version.  This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:

 * -- * -- B -- O -- O -- O   (4527a628f3)
\
 N -- N -- N   refs/heads/CXF-9008 (bdf7b02c2b)

You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.

Any revisions marked "omit" are not gone; other references still
refer to them.  Any revisions marked "discard" are gone forever.

The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 .github/workflows/codeql-analysis.yml  |  2 +-
 .github/workflows/pull-request-build.yml   |  2 +-
 .github/workflows/scorecards.yml   |  4 ++--
 benchmark/performance/base/pom.xml |  6 ++---
 benchmark/performance/soap_http_doc_lit/pom.xml| 28 ++
 .../common/KeystorePasswordCallback.java   |  2 +-
 distribution/src/main/release/samples/pom.xml  |  8 +++
 parent/pom.xml | 28 +++---
 pom.xml|  4 ++--
 .../cxf/transport/http/HttpClientHTTPConduit.java  | 24 +++
 .../security/jose/jwejws/algorithms-server.xml |  2 +-
 .../security/jose/jwejws/reference-server.xml  |  2 +-
 .../systest/jaxrs/security/jose/jwejws/server.xml  |  2 +-
 .../cxf/systest/jaxrs/security/xml/server.xml  |  2 +-
 .../cxf/systest/jaxrs/security/xml/stax-server.xml |  2 +-
 .../wsdlto/frontend/jaxws/template/service.vm  |  3 ++-
 16 files changed, 82 insertions(+), 39 deletions(-)



(cxf) branch CXF-9008 updated (3c556188a7 -> 4527a628f3)

2024-05-14 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a change to branch CXF-9008
in repository https://gitbox.apache.org/repos/asf/cxf.git


 discard 3c556188a7 fips support
 new 4527a628f3 fips support

This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version.  This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:

 * -- * -- B -- O -- O -- O   (3c556188a7)
\
 N -- N -- N   refs/heads/CXF-9008 (4527a628f3)

You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.

Any revisions marked "omit" are not gone; other references still
refer to them.  Any revisions marked "discard" are gone forever.

The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 .../jose/jwe/JweCompactReaderWriterTest.java   |  93 +---
 .../jose/jws/JwsCompactReaderWriterTest.java   | 117 +++---
 .../security/wss4j/AbstractPolicySecurityTest.java |   1 +
 .../wss4j/DOMToStaxEncryptionIdentifierTest.java   |   1 +
 .../ws/security/wss4j/DOMToStaxRoundTripTest.java  |   9 +-
 .../cxf/ws/security/wss4j/RoundTripTest.java   |   4 +-
 .../ws/security/wss4j/StaxToDOMRoundTripTest.java  |  12 +-
 .../wss4j/UserNameTokenAuthorizationTest.java  |   5 +-
 .../ws/security/wss4j/WSS4JOutInterceptorTest.java |   2 +-
 .../asymmetric_encr/AsymmetricEncryptionTest.java  |   9 +-
 .../BinarySecurityTokenTest.java   |  17 +-
 .../cxf/systest/sts/caching/CachingTest.java   |  17 +-
 .../cxf/systest/sts/caching/ServerCachingTest.java |  21 +-
 .../sts/secure_conv/SecureConversationTest.java|  17 +-
 .../SecurityContextTokenCancelTest.java|   5 +-
 .../secure_conv/SecurityContextTokenUnitTest.java  |   9 +-
 .../sts_sender_vouches/STSSenderVouchesTest.java   |  17 +-
 .../{cxf-sts.xml => cxf-sts-fips.xml}  |   0
 .../cxf/systest/sts/asymmetric_encr/cxf-sts.xml|   4 +-
 .../{stax-cxf-sts.xml => stax-cxf-sts-fips.xml}|   0
 .../systest/sts/asymmetric_encr/stax-cxf-sts.xml   |   4 +-
 .../{DoubleIt.wsdl => DoubleIt-fips.wsdl}  |   0
 .../systest/sts/binarysecuritytoken/DoubleIt.wsdl  |   2 +-
 .../sts/binarysecuritytoken/cxf-service-fips.xml   |  70 ++
 .../binarysecuritytoken/stax-cxf-service-fips.xml  |  72 ++
 .../caching/{DoubleIt.wsdl => DoubleIt-fips.wsdl}  |   0
 .../apache/cxf/systest/sts/caching/DoubleIt.wsdl   |   2 +-
 .../sts/caching/cxf-caching-service-fips.xml   | 110 +
 .../cxf/systest/sts/caching/cxf-service-fips.xml   |  70 ++
 .../{DoubleIt.wsdl => DoubleIt-fips.wsdl}  |   0
 .../cxf/systest/sts/secure_conv/DoubleIt.wsdl  |  10 +-
 .../systest/sts/secure_conv/cxf-service-fips.xml   | 112 ++
 .../secure_conv/{cxf-sts.xml => cxf-sts-fips.xml}  |   6 +-
 .../apache/cxf/systest/sts/secure_conv/cxf-sts.xml |   4 +-
 .../{stax-cxf-sts.xml => stax-cxf-sts-fips.xml}|   6 +-
 .../cxf/systest/sts/secure_conv/stax-cxf-sts.xml   |   4 +-
 ...service.wsdl => ws-trust-1.4-service-fips.wsdl} |   0
 .../sts/secure_conv/ws-trust-1.4-service.wsdl  |   4 +-
 .../{DoubleIt.wsdl => DoubleIt-fips.wsdl}  |   0
 .../systest/sts/sts_sender_vouches/DoubleIt.wsdl   |   2 +-
 .../sts/sts_sender_vouches/cxf-service-fips.xml|  37 
 .../cxf-sts-fips.xml}  |  38 ++--
 .../stax-cxf-sts-fips.xml} |  38 ++--
 ...service.wsdl => ws-trust-1.4-service-fips.wsdl} |   0
 .../sts_sender_vouches/ws-trust-1.4-service.wsdl   |   2 +-
 .../apache/cxf/systest/sts/issuer/IssuerTest.java  |  13 +-
 .../sts/transport/TransportBindingTest.java|   5 +-
 .../username_actas/UsernameActAsCachingTest.java   |  20 +-
 .../sts/username_actas/UsernameActAsTest.java  |   8 +-
 .../UsernameOnBehalfOfCachingTest.java |  20 +-
 .../UsernameOnBehalfOfTest.java|   8 +-
 .../sts/x509/X509AsymmetricBindingTest.java|   8 +-
 .../cxf/systest/sts/deployment/sts/cxf-sts.xml |   2 +-
 .../cxf/systest/sts/issuer/cxf-client-fips.xml |  81 +++
 ...rt-policy.xml => sts-transport-policy-fips.xml} |   0
 .../systest/sts/issuer/sts-transport-policy.xml|   2 +-
 .../{DoubleIt.wsdl => DoubleIt-fips.wsdl}  |   0
 .../cxf/systest/sts/username_actas/DoubleIt.wsdl   |   2 +-
 .../sts/username_actas/cxf-service-fips.xml|  90 
 .../sts/username_actas/cxf-service2-fips.xml   |  89 
 .../{DoubleIt.wsdl => DoubleIt-fips

(cxf) branch CXF-9008 updated (3f4ee4f487 -> 3c556188a7)

2024-05-10 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a change to branch CXF-9008
in repository https://gitbox.apache.org/repos/asf/cxf.git


 discard 3f4ee4f487 fips support
 new 3c556188a7 fips support

This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version.  This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:

 * -- * -- B -- O -- O -- O   (3f4ee4f487)
\
 N -- N -- N   refs/heads/CXF-9008 (3c556188a7)

You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.

Any revisions marked "omit" are not gone; other references still
refer to them.  Any revisions marked "discard" are gone forever.

The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 .../rs/security/xml/AbstractXmlEncInHandler.java   |   3 +-
 .../wss4j/DOMToStaxEncryptionIdentifierTest.java   |   4 -
 .../cxf/ws/security/wss4j/RoundTripTest.java   |  14 +-
 .../wss4j/StaxCryptoCoverageCheckerTest.java   |  14 +-
 .../ws/security/wss4j/StaxRoundTripActionTest.java |  25 +-
 .../cxf/ws/security/wss4j/StaxRoundTripTest.java   |  25 +-
 .../wss4j/StaxToDOMEncryptionIdentifierTest.java   |  21 +-
 .../ws/security/wss4j/StaxToDOMRoundTripTest.java  |  29 +-
 .../wss4j/UserNameTokenAuthorizationTest.java  |  24 +-
 .../cxf/ws/security/wss4j/WSS4JInOutTest.java  |  15 +-
 .../ws/security/wss4j/WSS4JOutInterceptorTest.java |   4 +-
 .../security/src/test/resources/logging.properties |   2 +-
 .../cxf/sts/operation/IssueEncryptedUnitTest.java  |  43 ++-
 .../apache/cxf/sts/operation/IssueSCTUnitTest.java |   5 +-
 .../token/provider/SAMLProviderKeyTypeTest.java|  11 +-
 .../username_actas/UsernameActAsCachingTest.java   |   4 +-
 .../sts/username_actas/UsernameActAsTest.java  |   7 +-
 .../UsernameOnBehalfOfCachingTest.java |   4 +-
 .../UsernameOnBehalfOfTest.java|   7 +-
 .../sts/x509/X509AsymmetricBindingTest.java|   4 +-
 ...service.wsdl => ws-trust-1.4-service-fips.wsdl} |   0
 .../sts/delegation/ws-trust-1.4-service.wsdl   |   4 +-
 .../systest/sts/deployment/cxf-transport-fips.xml  |   4 +-
 .../sts/deployment/cxf-ut-encrypted-fips.xml   |   2 +-
 .../cxf/systest/sts/deployment/cxf-ut-fips.xml |   2 +-
 .../cxf/systest/sts/deployment/cxf-x509-fips.xml   |   2 +-
 .../sts/deployment/stax-cxf-transport-fips.xml |   4 +-
 .../sts/deployment/stax-cxf-ut-encrypted-fips.xml  |   2 +-
 .../systest/sts/deployment/stax-cxf-ut-fips.xml|   2 +-
 .../systest/sts/deployment/stax-cxf-x509-fips.xml  |   2 +-
 ...service.wsdl => ws-trust-1.4-service-fips.wsdl} |   0
 .../sts/deployment/ws-trust-1.4-service.wsdl   |  10 +-
 ...service.wsdl => ws-trust-1.4-service-fips.wsdl} |   0
 .../systest/sts/issuer/ws-trust-1.4-service.wsdl   |   2 +-
 .../security/jose/jwejws/JAXRSJweJwsTest.java  |   2 -
 .../jaxrs/security/xml/JAXRSXmlSecTest.java|  18 +-
 .../apache/cxf/systest/ws/action/ActionTest.java   |  72 +++-
 .../systest/ws/algsuite/AlgorithmSuiteTest.java|  40 +-
 .../org/apache/cxf/systest/ws/algsuite/Server.java |   5 +-
 .../ws/algsuite/StaxAlgorithmSuiteTest.java|   5 +-
 .../apache/cxf/systest/ws/algsuite/StaxServer.java |   5 +-
 .../systest/ws/basicauth/BasicAuthJAASTest.java|   6 +-
 .../cxf/systest/ws/basicauth/BasicAuthTest.java|  13 +-
 .../cxf/systest/ws/basicauth/JAASServer.java   |   5 +-
 .../apache/cxf/systest/ws/basicauth/Server.java|   5 +-
 .../systest/ws/bindings/BindingPropertiesTest.java |  45 ++-
 .../org/apache/cxf/systest/ws/bindings/Server.java |   5 +-
 .../apache/cxf/systest/ws/bindings/StaxServer.java |   5 +-
 .../apache/cxf/systest/ws/cache/CachingTest.java   |  13 +-
 .../org/apache/cxf/systest/ws/cache/Server.java|   5 +-
 .../DoubleItPortTypeImplJavaFirstFips.java}|  50 ++-
 .../org/apache/cxf/systest/ws/fault/FaultTest.java |  54 ++-
 .../systest/ws/fault/ModifiedRequestServer.java|   6 +-
 .../cxf/systest/ws/fault/ModifiedRequestTest.java  |  21 +-
 .../org/apache/cxf/systest/ws/fault/Server.java|   5 +-
 .../org/apache/cxf/systest/ws/gcm/GCMTest.java |  17 +-
 .../systest/ws/gcm/MGF256AlgorithmSuiteLoader.java |   9 +-
 .../org/apache/cxf/systest/ws/gcm/MGFServer.java   |   5 +-
 .../apache/cxf/systest/ws/gcm/MGFStaxServer.java   |   5 +-
 .../java/org/apache/cxf/systest/ws/gcm/Server.java |   5 +-
 .../org/apache/cxf/systest/ws/gcm/StaxServer.java  |   5 +-
 .../apache/cxf/systest/ws/httpget/HTTPGet

(cxf) branch main updated: [CXF-9006] Skip WSS40 cer validation check when on Red Hat JDK (#1836)

2024-05-07 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/main by this push:
 new b8156fae4f [CXF-9006] Skip WSS40 cer validation check when on Red Hat 
JDK (#1836)
b8156fae4f is described below

commit b8156fae4f76da4f1fa8d5cec438f330e2ea608b
Author: Jamie Goodyear 
AuthorDate: Tue May 7 11:49:24 2024 -0230

[CXF-9006] Skip WSS40 cer validation check when on Red Hat JDK (#1836)

* [CXF-9006] Skip WSS40 cer validation check when on Red Hat JDK

* [CXF-9006] Updated WSS40 certificates

* Restore white space count on assert wss40 valid
---
 .../test/resources/trustedAuthorityValidator/wss40.cer | Bin 956 -> 1097 bytes
 .../resources/trustedAuthorityValidator/wss40CA.cer| Bin 794 -> 1077 bytes
 .../resources/trustedAuthorityValidator/wss40CACRL.cer | Bin 345 -> 666 bytes
 .../resources/trustedAuthorityValidator/wss40rev.cer   | Bin 956 -> 1097 bytes
 4 files changed, 0 insertions(+), 0 deletions(-)

diff --git 
a/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40.cer
 
b/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40.cer
index f916206813..581309ec77 100644
Binary files 
a/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40.cer
 and 
b/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40.cer
 differ
diff --git 
a/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40CA.cer
 
b/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40CA.cer
index 0faeb68b2a..90923a0f3e 100644
Binary files 
a/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40CA.cer
 and 
b/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40CA.cer
 differ
diff --git 
a/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40CACRL.cer
 
b/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40CACRL.cer
index 0d46cca8e6..cd46d13d88 100644
Binary files 
a/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40CACRL.cer
 and 
b/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40CACRL.cer
 differ
diff --git 
a/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40rev.cer
 
b/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40rev.cer
index ef2ff551e7..70dfb44cdd 100644
Binary files 
a/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40rev.cer
 and 
b/services/xkms/xkms-x509-handlers/src/test/resources/trustedAuthorityValidator/wss40rev.cer
 differ



(cxf) branch CXF-9008 created (now 3f4ee4f487)

2024-05-05 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a change to branch CXF-9008
in repository https://gitbox.apache.org/repos/asf/cxf.git


  at 3f4ee4f487 fips support

This branch includes the following new commits:

 new 3f4ee4f487 fips support

The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.




(cxf) branch main updated: [CXF-9004]Jetty12 : always use pre-saved HTTP_REQUEST from InMessage to populate SecurityContext (#1823)

2024-04-19 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/main by this push:
 new dc08a738df [CXF-9004]Jetty12 : always use pre-saved HTTP_REQUEST from 
InMessage to populate SecurityContext (#1823)
dc08a738df is described below

commit dc08a738df3e10f133f4dc149c2cdbdf56ed8350
Author: Freeman(Yue) Fang 
AuthorDate: Fri Apr 19 16:17:40 2024 -0400

[CXF-9004]Jetty12 : always use pre-saved HTTP_REQUEST from InMessage to 
populate SecurityContext (#1823)
---
 .../cxf/transport/http/AbstractHTTPDestination.java  | 20 ++--
 1 file changed, 14 insertions(+), 6 deletions(-)

diff --git 
a/rt/transports/http/src/main/java/org/apache/cxf/transport/http/AbstractHTTPDestination.java
 
b/rt/transports/http/src/main/java/org/apache/cxf/transport/http/AbstractHTTPDestination.java
index c0771430de..566e05a1b3 100644
--- 
a/rt/transports/http/src/main/java/org/apache/cxf/transport/http/AbstractHTTPDestination.java
+++ 
b/rt/transports/http/src/main/java/org/apache/cxf/transport/http/AbstractHTTPDestination.java
@@ -408,14 +408,22 @@ public abstract class AbstractHTTPDestination
 
 SecurityContext httpSecurityContext = new SecurityContext() {
 public Principal getUserPrincipal() {
-try {
-return req.getUserPrincipal();
-} catch (Exception ex) {
-return null;
-}
+//ensure we use req from the one saved in inMessage
+//as this could be the cachedInput one in oneway and 
+//ReplyTo is specified when ws-addressing is used
+//which means we need to switch thread context
+//and underlying transport might discard any data on the 
original stream
+HttpServletRequest reqFromInMessage = 
(HttpServletRequest)exchange.getInMessage().get(HTTP_REQUEST);
+return reqFromInMessage.getUserPrincipal();
 }
 public boolean isUserInRole(String role) {
-return req.isUserInRole(role);
+//ensure we use req from the one saved in inMessage
+//as this could be the cachedInput one in oneway and 
+//ReplyTo is specified when ws-addressing is used
+//which means we need to switch thread context
+//and underlying transport might discard any data on the 
original stream
+HttpServletRequest reqFromInMessage = 
(HttpServletRequest)exchange.getInMessage().get(HTTP_REQUEST);
+return reqFromInMessage.isUserInRole(role);
 }
 };
 



svn commit: r67905 - /release/cxf/3.5.8/

2024-03-12 Thread ffang
Author: ffang
Date: Tue Mar 12 20:22:29 2024
New Revision: 67905

Log:
add CXF 3.5.8 distributions

Added:
release/cxf/3.5.8/apache-cxf-3.5.8-src.tar.gz   (with props)
release/cxf/3.5.8/apache-cxf-3.5.8-src.tar.gz.asc
release/cxf/3.5.8/apache-cxf-3.5.8-src.tar.gz.sha256
release/cxf/3.5.8/apache-cxf-3.5.8-src.zip   (with props)
release/cxf/3.5.8/apache-cxf-3.5.8-src.zip.asc
release/cxf/3.5.8/apache-cxf-3.5.8-src.zip.sha256
release/cxf/3.5.8/apache-cxf-3.5.8.tar.gz   (with props)
release/cxf/3.5.8/apache-cxf-3.5.8.tar.gz.asc
release/cxf/3.5.8/apache-cxf-3.5.8.tar.gz.sha256
release/cxf/3.5.8/apache-cxf-3.5.8.zip   (with props)
release/cxf/3.5.8/apache-cxf-3.5.8.zip.asc
release/cxf/3.5.8/apache-cxf-3.5.8.zip.sha256

Added: release/cxf/3.5.8/apache-cxf-3.5.8-src.tar.gz
==
Binary file - no diff available.

Propchange: release/cxf/3.5.8/apache-cxf-3.5.8-src.tar.gz
--
svn:mime-type = application/octet-stream

Added: release/cxf/3.5.8/apache-cxf-3.5.8-src.tar.gz.asc
==
--- release/cxf/3.5.8/apache-cxf-3.5.8-src.tar.gz.asc (added)
+++ release/cxf/3.5.8/apache-cxf-3.5.8-src.tar.gz.asc Tue Mar 12 20:22:29 2024
@@ -0,0 +1,16 @@
+-BEGIN PGP SIGNATURE-
+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+=7Sx6
+-END PGP SIGNATURE-

Added: release/cxf/3.5.8/apache-cxf-3.5.8-src.tar.gz.sha256
==
--- release/cxf/3.5.8/apache-cxf-3.5.8-src.tar.gz.sha256 (added)
+++ release/cxf/3.5.8/apache-cxf-3.5.8-src.tar.gz.sha256 Tue Mar 12 20:22:29 
2024
@@ -0,0 +1 @@
+05bacb9ae9610f9f1a2c1797d6970c162930630030bb562ba2188b3ccb117fc4  
apache-cxf-3.5.8-src.tar.gz

Added: release/cxf/3.5.8/apache-cxf-3.5.8-src.zip
==
Binary file - no diff available.

Propchange: release/cxf/3.5.8/apache-cxf-3.5.8-src.zip
--
svn:mime-type = application/octet-stream

Added: release/cxf/3.5.8/apache-cxf-3.5.8-src.zip.asc
==
--- release/cxf/3.5.8/apache-cxf-3.5.8-src.zip.asc (added)
+++ release/cxf/3.5.8/apache-cxf-3.5.8-src.zip.asc Tue Mar 12 20:22:29 2024
@@ -0,0 +1,16 @@
+-BEGIN PGP SIGNATURE-
+
+iQIzBAABCgAdFiEEqngrBKvZ42zzCWA3tZ09D5+choQFAmXqH8AACgkQtZ09D5+c
+hoTdoQ//dMXLrtbQobt2BMS90zADD5n/xt58sIAFWD081qWNOj/coOC5ZpUN0SFo
+/HiCSN6EY89a5WcS6/7QoEZYKrsuqEvgKZA/QPapfdmxrVb90tUD58z6E6P6wKzK
+G01ev+1TBdBtGIh3JfzDqgq6CU4UK1Sofzh69cOwpM6hllacvnYfdh6TiVmTbn8P
+ATypyIFm6TYh0KtlosTtMur0xSUSwN/AA/muWWsoIvv3qmioTshw4D4/LIkUURQO
+IGootbseECNzvC3Ud2XTgtaOFue0wfshAwMIRy10dvAWxBbsdxywUplZCSXxeuof
+Qvucoxt8hG56OAHFIFtoQFLtbdsp5A3v7XPkZZ948PrHaoimC1YzSqmbG9t1HxNU
+5hHFbaSnjQn4zWq9c+fiWBxcvgt+KKfR5lL5/PR5lUmRLBVTyyNBaq8bJ+SQDM5A
+0BFktvWkq5R4yzKSfzMl1VIu8dJMvbOKzFZRXNyRvV1iiXuEfE26pjpA1BbPgrbL
+GLJSVipVdjCiN4n2FQx5ObcFAqRRJk6Bl/Rqvn9gVUqmdZXWrwwDa6Se+cf04OG9
+xOPT+zKQG66Ff35AV5gIRVWMquCmX19aPLtkkazUo07pR30iK8kMVVecw2KoTELk
+JwQggdGeS3ypK/PtLNoOh6u/G1hAJJC+KSMpMbc5wTL1v3J/WpM=
+=kRoV
+-END PGP SIGNATURE-

Added: release/cxf/3.5.8/apache-cxf-3.5.8-src.zip.sha256
==
--- release/cxf/3.5.8/apache-cxf-3.5.8-src.zip.sha256 (added)
+++ release/cxf/3.5.8/apache-cxf-3.5.8-src.zip.sha256 Tue Mar 12 20:22:29 2024
@@ -0,0 +1 @@
+c57413b4e7e5a602a4d09676f42684fee08be7f2fa35763f11ed6b43baa5f368  
apache-cxf-3.5.8-src.zip

Added: release/cxf/3.5.8/apache-cxf-3.5.8.tar.gz
==
Binary file - no diff available.

Propchange: release/cxf/3.5.8/apache-cxf-3.5.8.tar.gz
--
svn:mime-type = application/octet-stream

Added: release/cxf/3.5.8/apache-cxf-3.5.8.tar.gz.asc

svn commit: r67904 - /release/cxf/3.6.3/

2024-03-12 Thread ffang
Author: ffang
Date: Tue Mar 12 20:19:44 2024
New Revision: 67904

Log:
add CXF 3.6.3 distributions

Added:
release/cxf/3.6.3/apache-cxf-3.6.3-src.tar.gz   (with props)
release/cxf/3.6.3/apache-cxf-3.6.3-src.tar.gz.asc
release/cxf/3.6.3/apache-cxf-3.6.3-src.tar.gz.sha256
release/cxf/3.6.3/apache-cxf-3.6.3-src.zip   (with props)
release/cxf/3.6.3/apache-cxf-3.6.3-src.zip.asc
release/cxf/3.6.3/apache-cxf-3.6.3-src.zip.sha256
release/cxf/3.6.3/apache-cxf-3.6.3.tar.gz   (with props)
release/cxf/3.6.3/apache-cxf-3.6.3.tar.gz.asc
release/cxf/3.6.3/apache-cxf-3.6.3.tar.gz.sha256
release/cxf/3.6.3/apache-cxf-3.6.3.zip   (with props)
release/cxf/3.6.3/apache-cxf-3.6.3.zip.asc
release/cxf/3.6.3/apache-cxf-3.6.3.zip.sha256

Added: release/cxf/3.6.3/apache-cxf-3.6.3-src.tar.gz
==
Binary file - no diff available.

Propchange: release/cxf/3.6.3/apache-cxf-3.6.3-src.tar.gz
--
svn:mime-type = application/octet-stream

Added: release/cxf/3.6.3/apache-cxf-3.6.3-src.tar.gz.asc
==
--- release/cxf/3.6.3/apache-cxf-3.6.3-src.tar.gz.asc (added)
+++ release/cxf/3.6.3/apache-cxf-3.6.3-src.tar.gz.asc Tue Mar 12 20:19:44 2024
@@ -0,0 +1,16 @@
+-BEGIN PGP SIGNATURE-
+
+iQIzBAABCgAdFiEEqngrBKvZ42zzCWA3tZ09D5+choQFAmXqA4cACgkQtZ09D5+c
+hoS4LA//XbGAIPoY7mBrTuu5eSXkO4xIVJ7uG7pVyF51u4CRMSp6f2EF/1XlrVm7
+xq+A5lZwFIBWFYg2Vwflrv5I7im7qZv42j5ZVmoWaUBHTytuv6lBMIoR7Lf4j2PV
+5meaqs9YXcYG2Uu4uFVbTlmlLS7rIuzvNC35L/9xDWea2+6p8cTcgM6QhlbJ6uO5
+rxBxOoEyzGNJ8kWNzrwYPwntnVGpO8sKEUP2uuMgkbSa8Vk2bzowMvoE0HHUcs8T
+GZbGYItEQgHh5u/g99vcmNkV4ksJpg1sBvAKDHxiJKhW3SyP6ryiLWkkt5BLSiad
+kXyuFjmszBm1EMU9lQ+nhygG36eu/x+XIvzWpyKje7gyRW7zPkVJwpM4WVJle/jH
+ok0QhWtvPi6PGfZN9CbIQsgs7Wmy94pEGXg2iRLUcEErqVnn9JRdg9LGA9AOAfJ8
+dTlMfg7tLcvIwBjxcv4Iw1hOd3okvd1DWIlmeg+KlDnZv99qm04YXgYiW1+HcEy8
+RAJFVAddqF4VD8g6mZqpfM4wP9P5w5pHOmyZlowaU4IbXplVlfQPRVTtk/3wxcY6
+VZuNGme5yAS43e0nW9loGmUiPhE9zHOGgXbO9TpYDsgm+GmJ9duslpfApg7DjDxN
+IkIpUn+nVChPwL0nUIVxSCGQPu1iAoSvAnwLNeSyk1ikJtq79MI=
+=6cS2
+-END PGP SIGNATURE-

Added: release/cxf/3.6.3/apache-cxf-3.6.3-src.tar.gz.sha256
==
--- release/cxf/3.6.3/apache-cxf-3.6.3-src.tar.gz.sha256 (added)
+++ release/cxf/3.6.3/apache-cxf-3.6.3-src.tar.gz.sha256 Tue Mar 12 20:19:44 
2024
@@ -0,0 +1 @@
+4fced4afa41c7137b6ac8e836680026a7d43bf43896f313a04c07f573c9b9235  
apache-cxf-3.6.3-src.tar.gz

Added: release/cxf/3.6.3/apache-cxf-3.6.3-src.zip
==
Binary file - no diff available.

Propchange: release/cxf/3.6.3/apache-cxf-3.6.3-src.zip
--
svn:mime-type = application/octet-stream

Added: release/cxf/3.6.3/apache-cxf-3.6.3-src.zip.asc
==
--- release/cxf/3.6.3/apache-cxf-3.6.3-src.zip.asc (added)
+++ release/cxf/3.6.3/apache-cxf-3.6.3-src.zip.asc Tue Mar 12 20:19:44 2024
@@ -0,0 +1,16 @@
+-BEGIN PGP SIGNATURE-
+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+=11fa
+-END PGP SIGNATURE-

Added: release/cxf/3.6.3/apache-cxf-3.6.3-src.zip.sha256
==
--- release/cxf/3.6.3/apache-cxf-3.6.3-src.zip.sha256 (added)
+++ release/cxf/3.6.3/apache-cxf-3.6.3-src.zip.sha256 Tue Mar 12 20:19:44 2024
@@ -0,0 +1 @@
+db7505b2f79fab235da95818e83817b77e5484e221c555d4ebaac735cd7bae8e  
apache-cxf-3.6.3-src.zip

Added: release/cxf/3.6.3/apache-cxf-3.6.3.tar.gz
==
Binary file - no diff available.

Propchange: release/cxf/3.6.3/apache-cxf-3.6.3.tar.gz
--
svn:mime-type = application/octet-stream

Added: release/cxf/3.6.3/apache-cxf-3.6.3.tar.gz.asc

svn commit: r67903 - /release/cxf/3.5.8/

2024-03-12 Thread ffang
Author: ffang
Date: Tue Mar 12 19:26:15 2024
New Revision: 67903

Log:
create CXF 3.5.8 distributions folder

Added:
release/cxf/3.5.8/



svn commit: r67902 - /release/cxf/3.6.3/

2024-03-12 Thread ffang
Author: ffang
Date: Tue Mar 12 19:25:51 2024
New Revision: 67902

Log:
create CXF 3.6.3 distributions folder

Added:
release/cxf/3.6.3/



svn commit: r67894 - in /release/cxf/4.0.4: apache-cxf-4.0.4-src.tar.gz.sha256 apache-cxf-4.0.4-src.zip.sha256 apache-cxf-4.0.4.tar.gz.sha256 apache-cxf-4.0.4.zip.sha256

2024-03-11 Thread ffang
Author: ffang
Date: Tue Mar 12 00:52:22 2024
New Revision: 67894

Log:
add sha256 checksum for distributions

Added:
release/cxf/4.0.4/apache-cxf-4.0.4-src.tar.gz.sha256
release/cxf/4.0.4/apache-cxf-4.0.4-src.zip.sha256
release/cxf/4.0.4/apache-cxf-4.0.4.tar.gz.sha256
release/cxf/4.0.4/apache-cxf-4.0.4.zip.sha256

Added: release/cxf/4.0.4/apache-cxf-4.0.4-src.tar.gz.sha256
==
--- release/cxf/4.0.4/apache-cxf-4.0.4-src.tar.gz.sha256 (added)
+++ release/cxf/4.0.4/apache-cxf-4.0.4-src.tar.gz.sha256 Tue Mar 12 00:52:22 
2024
@@ -0,0 +1 @@
+910247ba967ff8e501c80d423156cca888285f12b2e6866d86e216aeb9bd6cf6  
apache-cxf-4.0.4-src.tar.gz

Added: release/cxf/4.0.4/apache-cxf-4.0.4-src.zip.sha256
==
--- release/cxf/4.0.4/apache-cxf-4.0.4-src.zip.sha256 (added)
+++ release/cxf/4.0.4/apache-cxf-4.0.4-src.zip.sha256 Tue Mar 12 00:52:22 2024
@@ -0,0 +1 @@
+fca65234f1f6a41c0a2b65c2f8af3e389f3c4e313347265be35c31123af2437b  
apache-cxf-4.0.4-src.zip

Added: release/cxf/4.0.4/apache-cxf-4.0.4.tar.gz.sha256
==
--- release/cxf/4.0.4/apache-cxf-4.0.4.tar.gz.sha256 (added)
+++ release/cxf/4.0.4/apache-cxf-4.0.4.tar.gz.sha256 Tue Mar 12 00:52:22 2024
@@ -0,0 +1 @@
+b66422ed2e1701238b583a3e9bb3359e569b9a3a8c081fc420338c4234c3d851  
apache-cxf-4.0.4.tar.gz

Added: release/cxf/4.0.4/apache-cxf-4.0.4.zip.sha256
==
--- release/cxf/4.0.4/apache-cxf-4.0.4.zip.sha256 (added)
+++ release/cxf/4.0.4/apache-cxf-4.0.4.zip.sha256 Tue Mar 12 00:52:22 2024
@@ -0,0 +1 @@
+c99b97dd7858cbe07bc5c9e4610eb48c073aaa78a3542f7a431502d6a78be0be  
apache-cxf-4.0.4.zip




svn commit: r67893 - /release/cxf/4.0.4/

2024-03-11 Thread ffang
Author: ffang
Date: Tue Mar 12 00:45:03 2024
New Revision: 67893

Log:
remove md5 and sha1

Removed:
release/cxf/4.0.4/apache-cxf-4.0.4-src.tar.gz.md5
release/cxf/4.0.4/apache-cxf-4.0.4-src.tar.gz.sha1
release/cxf/4.0.4/apache-cxf-4.0.4-src.zip.md5
release/cxf/4.0.4/apache-cxf-4.0.4-src.zip.sha1
release/cxf/4.0.4/apache-cxf-4.0.4.tar.gz.md5
release/cxf/4.0.4/apache-cxf-4.0.4.tar.gz.sha1
release/cxf/4.0.4/apache-cxf-4.0.4.zip.md5
release/cxf/4.0.4/apache-cxf-4.0.4.zip.sha1



svn commit: r67892 - /release/cxf/4.0.4/

2024-03-11 Thread ffang
Author: ffang
Date: Tue Mar 12 00:41:33 2024
New Revision: 67892

Log:
add CXF 4.0.4 distribution

Added:
release/cxf/4.0.4/apache-cxf-4.0.4-src.tar.gz   (with props)
release/cxf/4.0.4/apache-cxf-4.0.4-src.tar.gz.asc
release/cxf/4.0.4/apache-cxf-4.0.4-src.tar.gz.md5
release/cxf/4.0.4/apache-cxf-4.0.4-src.tar.gz.sha1
release/cxf/4.0.4/apache-cxf-4.0.4-src.zip   (with props)
release/cxf/4.0.4/apache-cxf-4.0.4-src.zip.asc
release/cxf/4.0.4/apache-cxf-4.0.4-src.zip.md5
release/cxf/4.0.4/apache-cxf-4.0.4-src.zip.sha1
release/cxf/4.0.4/apache-cxf-4.0.4.tar.gz   (with props)
release/cxf/4.0.4/apache-cxf-4.0.4.tar.gz.asc
release/cxf/4.0.4/apache-cxf-4.0.4.tar.gz.md5
release/cxf/4.0.4/apache-cxf-4.0.4.tar.gz.sha1
release/cxf/4.0.4/apache-cxf-4.0.4.zip   (with props)
release/cxf/4.0.4/apache-cxf-4.0.4.zip.asc
release/cxf/4.0.4/apache-cxf-4.0.4.zip.md5
release/cxf/4.0.4/apache-cxf-4.0.4.zip.sha1

Added: release/cxf/4.0.4/apache-cxf-4.0.4-src.tar.gz
==
Binary file - no diff available.

Propchange: release/cxf/4.0.4/apache-cxf-4.0.4-src.tar.gz
--
svn:mime-type = application/octet-stream

Added: release/cxf/4.0.4/apache-cxf-4.0.4-src.tar.gz.asc
==
--- release/cxf/4.0.4/apache-cxf-4.0.4-src.tar.gz.asc (added)
+++ release/cxf/4.0.4/apache-cxf-4.0.4-src.tar.gz.asc Tue Mar 12 00:41:33 2024
@@ -0,0 +1,16 @@
+-BEGIN PGP SIGNATURE-
+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+=x2tV
+-END PGP SIGNATURE-

Added: release/cxf/4.0.4/apache-cxf-4.0.4-src.tar.gz.md5
==
--- release/cxf/4.0.4/apache-cxf-4.0.4-src.tar.gz.md5 (added)
+++ release/cxf/4.0.4/apache-cxf-4.0.4-src.tar.gz.md5 Tue Mar 12 00:41:33 2024
@@ -0,0 +1 @@
+84d214de500c5f5801e8360b0cf781a9
\ No newline at end of file

Added: release/cxf/4.0.4/apache-cxf-4.0.4-src.tar.gz.sha1
==
--- release/cxf/4.0.4/apache-cxf-4.0.4-src.tar.gz.sha1 (added)
+++ release/cxf/4.0.4/apache-cxf-4.0.4-src.tar.gz.sha1 Tue Mar 12 00:41:33 2024
@@ -0,0 +1 @@
+1e16ebc0f072d37b85fcacaa1edcda63b7847e55
\ No newline at end of file

Added: release/cxf/4.0.4/apache-cxf-4.0.4-src.zip
==
Binary file - no diff available.

Propchange: release/cxf/4.0.4/apache-cxf-4.0.4-src.zip
--
svn:mime-type = application/octet-stream

Added: release/cxf/4.0.4/apache-cxf-4.0.4-src.zip.asc
==
--- release/cxf/4.0.4/apache-cxf-4.0.4-src.zip.asc (added)
+++ release/cxf/4.0.4/apache-cxf-4.0.4-src.zip.asc Tue Mar 12 00:41:33 2024
@@ -0,0 +1,16 @@
+-BEGIN PGP SIGNATURE-
+
+iQIzBAABCgAdFiEEqngrBKvZ42zzCWA3tZ09D5+choQFAmXpAYYACgkQtZ09D5+c
+hoRcSRAAoWAXrbiPFjRmizQ3i84E3alUGYh+pty+7XNL5oKTQkT0YODG15pTNwDM
+GFZhtRc4l7txVgJIR5XntqHYPctLODIP7lrCg161M2KJS1hg3z/DIN+7+cCm4rQY
+akTCWSbsyx5JqLDh/z5wJG1Kqv835zuLgvY//1QSX1OMe/faPfhZGPhyFRaR2X3Y
+Q/Qwsmvw1C2KKjuKd30frymB29aCb+CAqIbFNdPHqXi3rj+gFPiyyf92jGEyBntw
+QCCV1rcIk81Z86u8MupPlYen7R5cZkcPQSCmQHLUVD8lBmGf7G1m3PJpVWzlKLmI
+4cruUQTzaeQyaG8hcBx3ZbciT2qJNWM//XVynY0OveesUg4GccLLsKAvwDO6GV8F
+Pjj1/8OfgID14zO0gjIF416eZEDKkmMO6vu5tupVQQ6GgPA5jv3cf9rJxEsw29gh
+N7cZbaW31xV9SbYl2NbeNiMEPOo1iLyh1MG1aDLy4/rPg41QrWAaD+qXmrSkhqu1
+tpl+gSZ8pYVmAKqPslcJqkceXIS4eAdGHW5NhMtPRRIx5zhCPzPpemIQhVHL/CUC
+euIwrWjJki86h22FBWRF+279/mRiLMatcKqUaGvMDNrkkna0zebQXNZON3J20ndN
+Br817raB30HCsq0oN+fRt7jIJionSfc0rQjOy4sCxF0a5gkP6io=
+=7GWZ
+-END PGP SIGNATURE-

Added: release/cxf/4.0.4/apache-cxf-4.0.4-src.zip.md5
==
--- release/cxf/4.0.4/apache-cxf-4.0.4-src.zip.md5 (added)
+++ release/cxf/4.0.4/apache-cxf-4.0.4-src.zip.md5 Tue Mar 12 00:41:33 2024
@@ -0,0 +1 @@
+3e3fe3585bde8b99800d3aa2e9955fd1
\ No newline at end of file

svn commit: r67891 - /release/cxf/4.0.4/

2024-03-11 Thread ffang
Author: ffang
Date: Tue Mar 12 00:14:26 2024
New Revision: 67891

Log:
release CXF 4.0.4

Added:
release/cxf/4.0.4/



(cxf) annotated tag cxf-3.5.8 created (now d88e25425d)

2024-03-07 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a change to annotated tag cxf-3.5.8
in repository https://gitbox.apache.org/repos/asf/cxf.git


  at d88e25425d (tag)
 tagging 1593a5e0e48a67f75c60a64add52b0be57bb5eb0 (commit)
 replaces cxf-3.5.7
  by Freeman Fang
  on Thu Mar 7 13:35:22 2024 -0500

- Log -
[maven-release-plugin] copy for tag cxf-3.5.8
---

No new revisions were added by this update.



(cxf) annotated tag cxf-3.6.3 created (now c770a41979)

2024-03-07 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a change to annotated tag cxf-3.6.3
in repository https://gitbox.apache.org/repos/asf/cxf.git


  at c770a41979 (tag)
 tagging d6c36b4dcabade57d0266313ab3745bedf5fb57c (commit)
 replaces cxf-3.6.2
  by Freeman Fang
  on Thu Mar 7 12:20:37 2024 -0500

- Log -
[maven-release-plugin] copy for tag cxf-3.6.3
---

No new revisions were added by this update.



(cxf) branch 3.5.x-fixes updated: update CXF 3.5.8 release notes

2024-03-07 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.5.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.5.x-fixes by this push:
 new b8cb2905fe update CXF 3.5.8 release notes
b8cb2905fe is described below

commit b8cb2905fe844df558f65b273d81a4c80c48bb01
Author: Freeman Fang 
AuthorDate: Thu Mar 7 10:40:47 2024 -0500

update CXF 3.5.8 release notes
---
 distribution/src/main/release/release_notes.txt | 37 +
 1 file changed, 20 insertions(+), 17 deletions(-)

diff --git a/distribution/src/main/release/release_notes.txt 
b/distribution/src/main/release/release_notes.txt
index 6a72300e97..c82dc13cd1 100644
--- a/distribution/src/main/release/release_notes.txt
+++ b/distribution/src/main/release/release_notes.txt
@@ -1,4 +1,4 @@
-Apache CXF 3.5.7 Release Notes
+Apache CXF 3.5.8 Release Notes
 
 1. Overview
 
@@ -31,7 +31,7 @@ for further information and requirements for upgrading from 
earlier
 versions of CXF.
 
 
-3.5.7 fixes over 12 JIRA issues reported by users and the community.
+3.5.8 fixes over 13 JIRA issues reported by users and the community.
 
 
 2. Installation Prerequisites 
@@ -73,24 +73,27 @@ for caveats when upgrading.
 
 7. Specific issues, features, and improvements fixed in this version
 
-** Sub-task
-* [CXF-8606] - Introduce HTTP/2 Transport: client-side support (Netty & 
HttpClient 5)
-* [CXF-8877] - Get rid of EasyMock in cxf-rt-transports-http-netty-client
-
 ** Bug
-* [CXF-8881] - WSDLValidator link doesn't work
-* [CXF-8882] - Apache HttpClient 5 async conduit does not handle 
authentication
-* [CXF-8884] - Update commons-jexl3 to 3.3
-* [CXF-8886] - JavaDocProvider does not work with JDK 17 and beyond
-* [CXF-8907] -  java.lang.NullPointerException at 
AsymmetricBindingHandler.java
-* [CXF-8918] - Upgrade xnio-nio jar to latest version (3.8.8+) to get rid 
of CVE-2022-0084
-* [CXF-8920] - Can't filter when collection has attribute of type 
LocalDate or LocalDateTime
-* [CXF-8925] - Logging twice in case of faults happening after pre-stream 
phase in out-chain
+* [CXF-8812] - Content-Type header created with collection containing 
"null" value
+* [CXF-8834] - "Operation [{.../wsdl}Issue] already exists" when calling 
JaxWsServerFactoryBean.create() for SecurityTokenService
+* [CXF-8939] - java.lang.NullPointerException: Cannot invoke 
"java.util.List.size()" because the return value of 
"java.util.Map$Entry.getValue()" is null
+* [CXF-8940] - ws-security.must-understand works only if 
security.enable.streaming is true
+* [CXF-8945] - [JAX-WS] The client out interceptor chain is not called in 
case of oneway operation
+* [CXF-8955] - Custom timeout with Message.RECEIVE_TIMEOUT not working 
with hc5 / hc
+* [CXF-8959] - Detect order dependent flakiness in AttachmentUtilTest.java 
in core module
+* [CXF-8964] - Update Bouncycastle from unsupported xxx-jdk15on to 
xxx-jdk18on
+* [CXF-8965] - Apache CXF Netty Integration, URI not encoded
+
+
+** New Feature
+* [CXF-8911] - Allow creating a custom CXFHttpAsyncResponseConsumer
+
 
 ** Improvement
-* [CXF-8457] - Provide OpenTelemetry support
-* [CXF-8802] - Update to Maven Remote Resources Plugin 3.1.0
-* [CXF-8901] - Update Guava to 32.1.1 (solving CVE-2023-2976)
+* [CXF-8928] - Reduce code quality warnings in generated code
+* [CXF-8953] - Better support of the HTTPS protocol versions used by 
client/server conduits
+* [CXF-8968] - OpenTelemetryClientFeature cannot be used as a CDI bean 
unless it has a no-args constructor
+
 
 
 



(cxf) branch 3.6.x-fixes updated: update CXF 3.6.3 release notes

2024-03-07 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.6.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.6.x-fixes by this push:
 new e00f92dc76 update CXF 3.6.3 release notes
e00f92dc76 is described below

commit e00f92dc768cec07b6fb76463bb15c2dc16db720
Author: Freeman Fang 
AuthorDate: Thu Mar 7 09:45:01 2024 -0500

update CXF 3.6.3 release notes
---
 distribution/src/main/release/release_notes.txt | 88 +
 1 file changed, 31 insertions(+), 57 deletions(-)

diff --git a/distribution/src/main/release/release_notes.txt 
b/distribution/src/main/release/release_notes.txt
index 0fe545b9dc..b3d049114c 100644
--- a/distribution/src/main/release/release_notes.txt
+++ b/distribution/src/main/release/release_notes.txt
@@ -1,4 +1,4 @@
-Apache CXF 3.6.2 Release Notes
+Apache CXF 3.6.3 Release Notes
 
 1. Overview
 
@@ -24,7 +24,7 @@ http://cxf.apache.org/docs/36-migration-guide.html
 for further information and requirements for upgrading from earlier
 versions of CXF.
 
-3.6.2 fixes over 53 issues/tasks reported by users.
+3.6.3 fixes over 22 issues/tasks reported by users.
 
 
 2. Installation Prerequisites 
@@ -66,66 +66,40 @@ for caveats when upgrading.
 
 7. Release Notes
 
-** Sub-task
-* [CXF-8842] - Get rid of EasyMock in cxf-core
-* [CXF-8843] - Get rid of EasyMock in cxf-integration-jca
-* [CXF-8844] - Get rid of EasyMock in cxf-rt-bindings-coloc
-* [CXF-8845] - Get rid of EasyMock in cxf-rt-bindings-corba
-* [CXF-8846] - Get rid of EasyMock in cxf-rt-bindings-soap
-* [CXF-8847] - Get rid of EasyMock in cxf-rt-databinding-aegis
-* [CXF-8848] - Get rid of EasyMock in cxf-rt-databinding-jaxb
-* [CXF-8849] - Get rid of EasyMock in cxf-rt-features-clustering
-* [CXF-8850] - Get rid of EasyMock in cxf-rt-features-logging
-* [CXF-8851] - Get rid of EasyMock in cxf-rt-features-throttling
-* [CXF-8852] - Get rid of EasyMock in cxf-services-xkms-x509-repo-ldap
-* [CXF-8853] - Get rid of EasyMock in cxf-services-xkms-x509-handlers
-* [CXF-8854] - Get rid of EasyMock in cxf-rt-wsdl
-* [CXF-8855] - Get rid of EasyMock in cxf-rt-ws-transfer
-* [CXF-8856] - Get rid of EasyMock in cxf-rt-frontend-jaxrs
-* [CXF-8857] - Get rid of EasyMock in cxf-rt-frontend-jaxws
-* [CXF-8858] - Get rid of EasyMock in cxf-rt-frontend-js
-* [CXF-8859] - Get rid of EasyMock in cxf-rt-ws-security
-* [CXF-8860] - Get rid of EasyMock in cxf-rt-ws-rm
-* [CXF-8861] - Get rid of EasyMock in cxf-rt-ws-policy
-* [CXF-8862] - Get rid of EasyMock in cxf-rt-ws-addr
-* [CXF-8863] - Get rid of EasyMock in cxf-rt-transports-websocket
-* [CXF-8864] - Get rid of EasyMock in cxf-rt-transports-jms
-* [CXF-8865] - Get rid of EasyMock in cxf-rt-management
-* [CXF-8866] - Get rid of EasyMock in cxf-rt-rs-service-description
-* [CXF-8867] - Get rid of EasyMock in cxf-rt-rs-client
-* [CXF-8868] - Get rid of EasyMock in cxf-rt-rs-extension-providers
-* [CXF-8869] - Get rid of EasyMock in cxf-rt-rs-extension-search
-* [CXF-8870] - Get rid of EasyMock in cxf-rt-transports-http-undertow
-* [CXF-8871] - Get rid of EasyMock in cxf-rt-rs-mp-client
-* [CXF-8872] - Get rid of EasyMock in cxf-rt-rs-security-oauth2
-* [CXF-8873] - Get rid of EasyMock in cxf-rt-rs-security-oauth2-saml
-* [CXF-8874] - Get rid of EasyMock in cxf-rt-rs-security-sso-oidc
-* [CXF-8876] - Get rid of EasyMock in cxf-rt-transports-http-jetty
-* [CXF-8877] - Get rid of EasyMock in cxf-rt-transports-http-netty-client
-* [CXF-8878] - Get rid of EasyMock in cxf-rt-transports-http-netty-server
-* [CXF-8890] - Get rid of EasyMock in cxf-rt-transports-http
-* [CXF-8917] - Get rid of EasyMock in cxf-rt-transports-http-hc
-* [CXF-8921] - Get rid of EasyMock in cxf-rt-rs-service-description-swagger
-
 ** Bug
-* [CXF-8885] - HttpClient SelectorManager threads run indefinitely causing 
OOM
-* [CXF-8886] - JavaDocProvider does not work with JDK 17 and beyond
-* [CXF-8892] - CXF build on Windows is broken (test failures)
-* [CXF-8895] - Deadlock instead of timeout with new HttpClientHTTPConduit 
using large payloads
-* [CXF-8903] - Too many open files error in HttpClientHTTPConduit
-* [CXF-8905] - TransportURIResolver doesn't honor the property setting in 
bus
-* [CXF-8907] -  java.lang.NullPointerException at 
AsymmetricBindingHandler.java
-* [CXF-8914] - No content-length header after upgrade CXF from 3.5.6 to 
3.6.1
-* [CXF-8918] - Upgrade xnio-nio jar to latest version (3.8.8+) to get rid 
of CVE-2022-0084
-* [CXF-8920] - Can't filter when collection has attribute of type 
LocalDate or LocalDateTime
-* [CXF-8925] - Logging twice in case of faults happening after pre-stream 
phase in out-chain
+* [CXF-8812] - Content-Type header created with collection containing

(cxf) branch 3.6.x-fixes updated: [CXF-8984] Check for null before closing input stream (#1728)

2024-03-06 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.6.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.6.x-fixes by this push:
 new 66d5b9efd0 [CXF-8984] Check for null before closing input stream 
(#1728)
66d5b9efd0 is described below

commit 66d5b9efd02243c13018fd3fcb652c8ceb037315
Author: Thomas Egli <38955561+the...@users.noreply.github.com>
AuthorDate: Wed Mar 6 19:47:18 2024 +0100

[CXF-8984] Check for null before closing input stream (#1728)

(cherry picked from commit 08fea2ea2ecb326b84a60ceb3066e6cfe3ccd83c)
---
 .../java/org/apache/cxf/transport/http/HttpClientHTTPConduit.java| 5 -
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git 
a/rt/transports/http/src/main/java/org/apache/cxf/transport/http/HttpClientHTTPConduit.java
 
b/rt/transports/http/src/main/java/org/apache/cxf/transport/http/HttpClientHTTPConduit.java
index 5f4d4653d4..b25777eeb3 100644
--- 
a/rt/transports/http/src/main/java/org/apache/cxf/transport/http/HttpClientHTTPConduit.java
+++ 
b/rt/transports/http/src/main/java/org/apache/cxf/transport/http/HttpClientHTTPConduit.java
@@ -817,7 +817,10 @@ public class HttpClientHTTPConduit extends 
URLConnectionHTTPConduit {
 
 @Override
 protected void closeInputStream() throws IOException {
-getInputStream().close();
+InputStream is = getInputStream();
+if (is != null) {
+is.close();
+}
 }
 
 @Override



(cxf) annotated tag cxf-4.0.4 created (now c1e0b9ee38)

2024-03-06 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a change to annotated tag cxf-4.0.4
in repository https://gitbox.apache.org/repos/asf/cxf.git


  at c1e0b9ee38 (tag)
 tagging 40ad2263e5c080bf3b55542bf3ee052fa7465733 (commit)
 replaces cxf-4.0.3
  by Freeman Fang
  on Wed Mar 6 18:13:23 2024 -0500

- Log -
[maven-release-plugin] copy for tag cxf-4.0.4
---

No new revisions were added by this update.



(cxf) 01/02: Revert "rollback version from previous failed release:prepare build"

2024-03-06 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git

commit 3bb96d88dbdf6a82ae8281de51662599785ebba4
Author: Freeman Fang 
AuthorDate: Wed Mar 6 16:32:05 2024 -0500

Revert "rollback version from previous failed release:prepare build"

This reverts commit 80e51f015c1165cf5c1c0b436d8c5caa35a98155.
---
 distribution/javadoc/pom.xml   |  46 
 distribution/manifest/pom.xml  |  94 
 distribution/pom.xml   | 120 ++---
 .../src/main/release/samples/aegis/pom.xml |   8 +-
 .../main/release/samples/aegis_standalone/pom.xml  |   2 +-
 .../src/main/release/samples/callback/pom.xml  |   8 +-
 .../samples/configuration_interceptor/pom.xml  |   8 +-
 .../src/main/release/samples/corba/bank/pom.xml|   2 +-
 .../samples/corba/bank_ws_addressing/pom.xml   |   2 +-
 .../main/release/samples/corba/hello_world/pom.xml |  10 +-
 .../release/samples/groovy_spring_support/pom.xml  |   6 +-
 .../main/release/samples/in_jvm_transport/pom.xml  |  10 +-
 .../main/release/samples/java_first_jaxws/pom.xml  |   6 +-
 .../samples/java_first_jaxws_factory_bean/pom.xml  |   6 +-
 .../main/release/samples/java_first_jms/pom.xml|   4 +-
 .../main/release/samples/java_first_pojo/pom.xml   |   6 +-
 .../samples/java_first_spring_support/pom.xml  |   6 +-
 .../src/main/release/samples/jax_rs/basic/pom.xml  |   6 +-
 .../samples/jax_rs/basic_http2_jetty/pom.xml   |   4 +-
 .../samples/jax_rs/basic_http2_netty/pom.xml   |   4 +-
 .../samples/jax_rs/basic_http2_undertow/pom.xml|   4 +-
 .../release/samples/jax_rs/basic_https/pom.xml |   6 +-
 .../main/release/samples/jax_rs/basic_oidc/pom.xml |   8 +-
 .../main/release/samples/jax_rs/big_query/pom.xml  |  12 +--
 .../samples/jax_rs/content_negotiation/pom.xml |   8 +-
 .../src/main/release/samples/jax_rs/odata/pom.xml  |   4 +-
 .../src/main/release/samples/jax_rs/search/pom.xml |  12 +--
 .../release/samples/jax_rs/spring_boot/pom.xml |   6 +-
 .../jax_rs/spring_boot_scan/application/pom.xml|   4 +-
 .../samples/jax_rs/spring_boot_scan/client/pom.xml |   4 +-
 .../release/samples/jax_rs/spring_security/pom.xml |   6 +-
 .../main/release/samples/jax_rs/sse_cdi/pom.xml|   6 +-
 .../main/release/samples/jax_rs/sse_client/pom.xml |   6 +-
 .../main/release/samples/jax_rs/sse_spring/pom.xml |   4 +-
 .../main/release/samples/jax_rs/sse_tomcat/pom.xml |   4 +-
 .../release/samples/jax_rs/tracing_brave/pom.xml   |   2 +-
 .../samples/jax_rs/tracing_micrometer/pom.xml  |  12 +--
 .../samples/jax_rs/tracing_opentelemetry/pom.xml   |  12 +--
 .../samples/jax_rs/tracing_opentracing/pom.xml |  12 +--
 .../main/release/samples/jax_rs/websocket/pom.xml  |   8 +-
 .../samples/jax_server_aegis_client/pom.xml|   8 +-
 .../src/main/release/samples/jaxws_async/pom.xml   |  12 +--
 .../samples/jaxws_dispatch_provider/pom.xml|   8 +-
 .../src/main/release/samples/jaxws_graalvm/pom.xml |   2 +-
 .../samples/jaxws_graalvm_dynamic/server/pom.xml   |   2 +-
 .../main/release/samples/jaxws_handlers/pom.xml|   8 +-
 .../main/release/samples/jaxws_spring_boot/pom.xml |   4 +-
 .../src/main/release/samples/jms_pubsub/pom.xml|   2 +-
 .../src/main/release/samples/jms_queue/pom.xml |   6 +-
 .../src/main/release/samples/jms_spec_demo/pom.xml |   6 +-
 .../main/release/samples/jms_spring_config/pom.xml |   2 +-
 .../samples/js_browser_client_java_first/pom.xml   |   8 +-
 .../samples/js_browser_client_simple/pom.xml   |  10 +-
 .../src/main/release/samples/js_client/pom.xml |  10 +-
 .../src/main/release/samples/js_provider/pom.xml   |   8 +-
 distribution/src/main/release/samples/mtom/pom.xml |   8 +-
 distribution/src/main/release/samples/pom.xml  |   4 +-
 .../main/release/samples/restful_dispatch/pom.xml  |   8 +-
 .../release/samples/ruby_spring_support/pom.xml|   6 +-
 .../src/main/release/samples/soap_header/pom.xml   |   8 +-
 distribution/src/main/release/samples/sts/pom.xml  |  16 +--
 .../src/main/release/samples/throttling/pom.xml|  14 +--
 .../src/main/release/samples/ws_addressing/pom.xml |   8 +-
 .../src/main/release/samples/ws_discovery/pom.xml  |  12 +--
 .../src/main/release/samples/ws_eventing/pom.xml   |  10 +-
 .../src/main/release/samples/ws_policy/pom.xml |   8 +-
 .../src/main/release/samples/ws_rm/pom.xml |  10 +-
 .../release/samples/ws_security/sign_enc/pom.xml   |  16 +--
 .../samples/ws_security/sign_enc_policy/pom.xml|  12 +--
 .../main/release/samples/ws_security/ut/pom.xml|  10 +-
 .../release/samples/ws_security/ut_policy/pom.xml  |  12 +--
 .../main/release/samples/ws_transaction/pom.xml|   4 +-
 .../src/main/release/samples/wsdl_first/pom.xml|  18 ++--
 .../samples/wsdl_first_dynamic_client/pom.xml 

(cxf) branch main updated (80e51f015c -> f63251ca18)

2024-03-06 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a change to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git


from 80e51f015c rollback version from previous failed release:prepare build
 new 3bb96d88db Revert "rollback version from previous failed 
release:prepare build"
 new f63251ca18 correct messed up version from previous build

The 2 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 distribution/javadoc/pom.xml| 2 +-
 distribution/manifest/pom.xml   | 2 +-
 distribution/pom.xml| 2 +-
 distribution/src/main/release/samples/aegis/pom.xml | 2 +-
 distribution/src/main/release/samples/aegis_standalone/pom.xml  | 2 +-
 distribution/src/main/release/samples/callback/pom.xml  | 2 +-
 distribution/src/main/release/samples/configuration_interceptor/pom.xml | 2 +-
 distribution/src/main/release/samples/corba/bank/pom.xml| 2 +-
 distribution/src/main/release/samples/corba/bank_ws_addressing/pom.xml  | 2 +-
 distribution/src/main/release/samples/corba/hello_world/pom.xml | 2 +-
 distribution/src/main/release/samples/groovy_spring_support/pom.xml | 2 +-
 distribution/src/main/release/samples/in_jvm_transport/pom.xml  | 2 +-
 distribution/src/main/release/samples/java_first_jaxws/pom.xml  | 2 +-
 .../src/main/release/samples/java_first_jaxws_factory_bean/pom.xml  | 2 +-
 distribution/src/main/release/samples/java_first_jms/pom.xml| 2 +-
 distribution/src/main/release/samples/java_first_pojo/pom.xml   | 2 +-
 distribution/src/main/release/samples/java_first_spring_support/pom.xml | 2 +-
 distribution/src/main/release/samples/jax_rs/basic/pom.xml  | 2 +-
 distribution/src/main/release/samples/jax_rs/basic_http2_jetty/pom.xml  | 2 +-
 distribution/src/main/release/samples/jax_rs/basic_http2_netty/pom.xml  | 2 +-
 .../src/main/release/samples/jax_rs/basic_http2_undertow/pom.xml| 2 +-
 distribution/src/main/release/samples/jax_rs/basic_https/pom.xml| 2 +-
 distribution/src/main/release/samples/jax_rs/basic_oidc/pom.xml | 2 +-
 distribution/src/main/release/samples/jax_rs/big_query/pom.xml  | 2 +-
 .../src/main/release/samples/jax_rs/content_negotiation/pom.xml | 2 +-
 .../samples/jax_rs/description_openapi_microprofile_spring/pom.xml  | 2 +-
 .../src/main/release/samples/jax_rs/description_openapi_v3/pom.xml  | 2 +-
 .../main/release/samples/jax_rs/description_openapi_v3_spring/pom.xml   | 2 +-
 .../src/main/release/samples/jax_rs/description_openapi_v3_web/pom.xml  | 2 +-
 distribution/src/main/release/samples/jax_rs/graalvm_basic/pom.xml  | 2 +-
 distribution/src/main/release/samples/jax_rs/odata/pom.xml  | 2 +-
 distribution/src/main/release/samples/jax_rs/search/pom.xml | 2 +-
 distribution/src/main/release/samples/jax_rs/spring_boot/pom.xml| 2 +-
 .../main/release/samples/jax_rs/spring_boot_scan/application/pom.xml| 2 +-
 .../src/main/release/samples/jax_rs/spring_boot_scan/client/pom.xml | 2 +-
 .../release/samples/jax_rs/spring_boot_scan/eureka-registry/pom.xml | 2 +-
 distribution/src/main/release/samples/jax_rs/spring_security/pom.xml| 2 +-
 distribution/src/main/release/samples/jax_rs/sse_cdi/pom.xml| 2 +-
 distribution/src/main/release/samples/jax_rs/sse_client/pom.xml | 2 +-
 distribution/src/main/release/samples/jax_rs/sse_spring/pom.xml | 2 +-
 distribution/src/main/release/samples/jax_rs/sse_tomcat/pom.xml | 2 +-
 distribution/src/main/release/samples/jax_rs/tracing_brave/pom.xml  | 2 +-
 distribution/src/main/release/samples/jax_rs/tracing_micrometer/pom.xml | 2 +-
 .../src/main/release/samples/jax_rs/tracing_opentelemetry/pom.xml   | 2 +-
 .../src/main/release/samples/jax_rs/tracing_opentelemetry_camel/pom.xml | 2 +-
 .../src/main/release/samples/jax_rs/tracing_opentracing/pom.xml | 2 +-
 distribution/src/main/release/samples/jax_rs/websocket/pom.xml  | 2 +-
 distribution/src/main/release/samples/jax_rs/websocket_web/pom.xml  | 2 +-
 distribution/src/main/release/samples/jax_server_aegis_client/pom.xml   | 2 +-
 distribution/src/main/release/samples/jaxws_async/pom.xml   | 2 +-
 distribution/src/main/release/samples/jaxws_dispatch_provider/pom.xml   | 2 +-
 distribution/src/main/release/samples/jaxws_graalvm/pom.xml | 2 +-
 .../src/main/release/samples/jaxws_graalvm_dynamic/client/pom.xml   | 2 +-
 .../src/main/release/samples/jaxws_graalvm_dynamic/server/pom.xml  

(cxf) branch main updated: rollback version from previous failed release:prepare build

2024-03-06 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/main by this push:
 new 80e51f015c rollback version from previous failed release:prepare build
80e51f015c is described below

commit 80e51f015c1165cf5c1c0b436d8c5caa35a98155
Author: Freeman Fang 
AuthorDate: Wed Mar 6 16:23:16 2024 -0500

rollback version from previous failed release:prepare build
---
 distribution/javadoc/pom.xml   |  46 
 distribution/manifest/pom.xml  |  94 
 distribution/pom.xml   | 120 ++---
 .../src/main/release/samples/aegis/pom.xml |   8 +-
 .../main/release/samples/aegis_standalone/pom.xml  |   2 +-
 .../src/main/release/samples/callback/pom.xml  |   8 +-
 .../samples/configuration_interceptor/pom.xml  |   8 +-
 .../src/main/release/samples/corba/bank/pom.xml|   2 +-
 .../samples/corba/bank_ws_addressing/pom.xml   |   2 +-
 .../main/release/samples/corba/hello_world/pom.xml |  10 +-
 .../release/samples/groovy_spring_support/pom.xml  |   6 +-
 .../main/release/samples/in_jvm_transport/pom.xml  |  10 +-
 .../main/release/samples/java_first_jaxws/pom.xml  |   6 +-
 .../samples/java_first_jaxws_factory_bean/pom.xml  |   6 +-
 .../main/release/samples/java_first_jms/pom.xml|   4 +-
 .../main/release/samples/java_first_pojo/pom.xml   |   6 +-
 .../samples/java_first_spring_support/pom.xml  |   6 +-
 .../src/main/release/samples/jax_rs/basic/pom.xml  |   6 +-
 .../samples/jax_rs/basic_http2_jetty/pom.xml   |   4 +-
 .../samples/jax_rs/basic_http2_netty/pom.xml   |   4 +-
 .../samples/jax_rs/basic_http2_undertow/pom.xml|   4 +-
 .../release/samples/jax_rs/basic_https/pom.xml |   6 +-
 .../main/release/samples/jax_rs/basic_oidc/pom.xml |   8 +-
 .../main/release/samples/jax_rs/big_query/pom.xml  |  12 +--
 .../samples/jax_rs/content_negotiation/pom.xml |   8 +-
 .../src/main/release/samples/jax_rs/odata/pom.xml  |   4 +-
 .../src/main/release/samples/jax_rs/search/pom.xml |  12 +--
 .../release/samples/jax_rs/spring_boot/pom.xml |   6 +-
 .../jax_rs/spring_boot_scan/application/pom.xml|   4 +-
 .../samples/jax_rs/spring_boot_scan/client/pom.xml |   4 +-
 .../release/samples/jax_rs/spring_security/pom.xml |   6 +-
 .../main/release/samples/jax_rs/sse_cdi/pom.xml|   6 +-
 .../main/release/samples/jax_rs/sse_client/pom.xml |   6 +-
 .../main/release/samples/jax_rs/sse_spring/pom.xml |   4 +-
 .../main/release/samples/jax_rs/sse_tomcat/pom.xml |   4 +-
 .../release/samples/jax_rs/tracing_brave/pom.xml   |   2 +-
 .../samples/jax_rs/tracing_micrometer/pom.xml  |  12 +--
 .../samples/jax_rs/tracing_opentelemetry/pom.xml   |  12 +--
 .../samples/jax_rs/tracing_opentracing/pom.xml |  12 +--
 .../main/release/samples/jax_rs/websocket/pom.xml  |   8 +-
 .../samples/jax_server_aegis_client/pom.xml|   8 +-
 .../src/main/release/samples/jaxws_async/pom.xml   |  12 +--
 .../samples/jaxws_dispatch_provider/pom.xml|   8 +-
 .../src/main/release/samples/jaxws_graalvm/pom.xml |   2 +-
 .../samples/jaxws_graalvm_dynamic/server/pom.xml   |   2 +-
 .../main/release/samples/jaxws_handlers/pom.xml|   8 +-
 .../main/release/samples/jaxws_spring_boot/pom.xml |   4 +-
 .../src/main/release/samples/jms_pubsub/pom.xml|   2 +-
 .../src/main/release/samples/jms_queue/pom.xml |   6 +-
 .../src/main/release/samples/jms_spec_demo/pom.xml |   6 +-
 .../main/release/samples/jms_spring_config/pom.xml |   2 +-
 .../samples/js_browser_client_java_first/pom.xml   |   8 +-
 .../samples/js_browser_client_simple/pom.xml   |  10 +-
 .../src/main/release/samples/js_client/pom.xml |  10 +-
 .../src/main/release/samples/js_provider/pom.xml   |   8 +-
 distribution/src/main/release/samples/mtom/pom.xml |   8 +-
 distribution/src/main/release/samples/pom.xml  |   4 +-
 .../main/release/samples/restful_dispatch/pom.xml  |   8 +-
 .../release/samples/ruby_spring_support/pom.xml|   6 +-
 .../src/main/release/samples/soap_header/pom.xml   |   8 +-
 distribution/src/main/release/samples/sts/pom.xml  |  16 +--
 .../src/main/release/samples/throttling/pom.xml|  14 +--
 .../src/main/release/samples/ws_addressing/pom.xml |   8 +-
 .../src/main/release/samples/ws_discovery/pom.xml  |  12 +--
 .../src/main/release/samples/ws_eventing/pom.xml   |  10 +-
 .../src/main/release/samples/ws_policy/pom.xml |   8 +-
 .../src/main/release/samples/ws_rm/pom.xml |  10 +-
 .../release/samples/ws_security/sign_enc/pom.xml   |  16 +--
 .../samples/ws_security/sign_enc_policy/pom.xml|  12 +--
 .../main/release/samples/ws_security/ut/pom.xml|  10 +-
 .../release/samples/ws_security/ut_policy/pom.xml  |  12 +--
 .../main/release/samples/ws_transaction/pom.xml|   4 +-
 .../src/main/release/samples

(cxf) branch main updated: Disallowing DTDs for Aegis SourceType (#1729)

2024-03-06 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/main by this push:
 new 667cf979a2 Disallowing DTDs for Aegis SourceType (#1729)
667cf979a2 is described below

commit 667cf979a29782191b942747da2ae6f260101003
Author: Colm O hEigeartaigh 
AuthorDate: Wed Mar 6 20:31:50 2024 +

Disallowing DTDs for Aegis SourceType (#1729)
---
 .../aegis/src/main/java/org/apache/cxf/aegis/type/xml/SourceType.java   | 2 ++
 1 file changed, 2 insertions(+)

diff --git 
a/rt/databinding/aegis/src/main/java/org/apache/cxf/aegis/type/xml/SourceType.java
 
b/rt/databinding/aegis/src/main/java/org/apache/cxf/aegis/type/xml/SourceType.java
index 81e9827412..587fe82080 100644
--- 
a/rt/databinding/aegis/src/main/java/org/apache/cxf/aegis/type/xml/SourceType.java
+++ 
b/rt/databinding/aegis/src/main/java/org/apache/cxf/aegis/type/xml/SourceType.java
@@ -104,6 +104,8 @@ public class SourceType extends AegisType {
 protected XMLReader createXMLReader() throws SAXException, 
ParserConfigurationException {
 SAXParserFactory spf = SAXParserFactory.newInstance();
 spf.setNamespaceAware(true);
+// Disable DTDs
+spf.setFeature("http://apache.org/xml/features/disallow-doctype-decl;, 
true);
 return spf.newSAXParser().getXMLReader();
 }
 



(cxf) annotated tag cxf-4.0.4 deleted (was 5956dd292b)

2024-03-06 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a change to annotated tag cxf-4.0.4
in repository https://gitbox.apache.org/repos/asf/cxf.git


*** WARNING: tag cxf-4.0.4 was deleted! ***

   tag was  5956dd292b

The revisions that were on this annotated tag are still contained in
other references; therefore, this change does not discard any commits
from the repository.



(cxf) branch main updated: [maven-release-plugin] rollback the release of cxf-4.0.4

2024-03-06 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/main by this push:
 new 3d88bbb9cc [maven-release-plugin] rollback the release of cxf-4.0.4
3d88bbb9cc is described below

commit 3d88bbb9cc51ac141d83dcefea4ab307c09d525f
Author: Freeman Fang 
AuthorDate: Wed Mar 6 15:31:06 2024 -0500

[maven-release-plugin] rollback the release of cxf-4.0.4
---
 bom/pom.xml  | 6 +++---
 core/pom.xml | 2 +-
 integration/cdi/pom.xml  | 2 +-
 integration/jca/pom.xml  | 2 +-
 integration/pom.xml  | 2 +-
 integration/spring-boot/autoconfigure/pom.xml| 2 +-
 integration/spring-boot/pom.xml  | 2 +-
 integration/spring-boot/starter-jaxrs/pom.xml| 2 +-
 integration/spring-boot/starter-jaxws/pom.xml| 2 +-
 integration/tracing/tracing-brave/pom.xml| 2 +-
 integration/tracing/tracing-micrometer/pom.xml   | 2 +-
 integration/tracing/tracing-opentelemetry/pom.xml| 2 +-
 integration/tracing/tracing-opentracing/pom.xml  | 2 +-
 maven-plugins/archetypes/cxf-jaxrs-service/pom.xml   | 2 +-
 maven-plugins/archetypes/cxf-jaxws-javafirst/pom.xml | 4 ++--
 maven-plugins/archetypes/cxf-jaxws-wsdlfirst/pom.xml | 2 +-
 maven-plugins/archetypes/pom.xml | 2 +-
 maven-plugins/codegen-plugin/pom.xml | 2 +-
 maven-plugins/corba/pom.xml  | 2 +-
 maven-plugins/java2wadl-plugin/pom.xml   | 4 ++--
 maven-plugins/java2ws-plugin/pom.xml | 2 +-
 maven-plugins/pom.xml| 2 +-
 maven-plugins/wadl2java-plugin/pom.xml   | 2 +-
 maven-plugins/wsdl-validator-plugin/pom.xml  | 2 +-
 parent/pom.xml   | 2 +-
 pom.xml  | 2 +-
 rt/bindings/coloc/pom.xml| 2 +-
 rt/bindings/corba/pom.xml| 2 +-
 rt/bindings/pom.xml  | 2 +-
 rt/bindings/soap/pom.xml | 2 +-
 rt/bindings/xml/pom.xml  | 2 +-
 rt/databinding/aegis/pom.xml | 2 +-
 rt/databinding/jaxb/pom.xml  | 2 +-
 rt/databinding/pom.xml   | 2 +-
 rt/features/clustering/pom.xml   | 2 +-
 rt/features/logging/pom.xml  | 2 +-
 rt/features/metrics/pom.xml  | 2 +-
 rt/features/pom.xml  | 2 +-
 rt/features/throttling/pom.xml   | 2 +-
 rt/frontend/jaxrs/pom.xml| 2 +-
 rt/frontend/jaxws/pom.xml| 2 +-
 rt/frontend/js/pom.xml   | 2 +-
 rt/frontend/pom.xml  | 2 +-
 rt/frontend/simple/pom.xml   | 2 +-
 rt/javascript/javascript-rt/pom.xml  | 2 +-
 rt/javascript/javascript-tests/pom.xml   | 2 +-
 rt/javascript/pom.xml| 2 +-
 rt/management/pom.xml| 2 +-
 rt/pom.xml   | 2 +-
 rt/rs/client/pom.xml | 2 +-
 rt/rs/description-common-openapi/pom.xml | 2 +-
 rt/rs/description-microprofile-openapi/pom.xml   | 2 +-
 rt/rs/description-openapi-v3/pom.xml | 2 +-
 rt/rs/description-swagger-ui/pom.xml | 2 +-
 rt/rs/description/pom.xml| 2 +-
 rt/rs/extensions/json-basic/pom.xml  | 2 +-
 rt/rs/extensions/providers/pom.xml   | 2 +-
 rt/rs/extensions/reactivestreams/pom.xml | 2 +-
 rt/rs/extensions/reactor/pom.xml | 2 +-
 rt/rs/extensions/rx/pom.xml  | 2 +-
 rt/rs/extensions/rx2/pom.xml | 2 +-
 rt/rs/extensions/rx3/pom.xml | 2 +-
 rt/rs/extensions/search/pom.xml  | 2 +-
 rt/rs/http-sci/pom.xml   | 2 +-
 rt/rs/microprofile-client/pom.xml| 2 +-
 rt/rs/pom.xml| 2 +-
 rt/rs/security/cors/pom.xml  | 2 +-
 rt/rs/security/http-signature/pom.xml| 2 +-
 rt/rs/security/jose-parent/jose-jaxrs/pom.xml| 2 +-
 rt/rs/security/jose-parent/jose/pom.xml  | 2 +-
 rt/rs/security/jose-parent/pom.xml   | 2 +-
 rt/rs/security/oauth-parent/oauth2-saml/pom.xml  | 2 +-
 rt/rs/security/oauth-parent/oauth2/pom.xml   | 2 +-
 rt/rs/security

(cxf) annotated tag cxf-4.0.4 created (now 5956dd292b)

2024-03-06 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a change to annotated tag cxf-4.0.4
in repository https://gitbox.apache.org/repos/asf/cxf.git


  at 5956dd292b (tag)
 tagging 52f98447a2068f9446e91e7189c2c440f2e90570 (commit)
 replaces cxf-4.0.3
  by Freeman Fang
  on Wed Mar 6 15:30:16 2024 -0500

- Log -
[maven-release-plugin] copy for tag cxf-4.0.4
---

No new revisions were added by this update.



(cxf) branch main updated: [maven-release-plugin] prepare release cxf-4.0.4

2024-03-06 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/main by this push:
 new 52f98447a2 [maven-release-plugin] prepare release cxf-4.0.4
52f98447a2 is described below

commit 52f98447a2068f9446e91e7189c2c440f2e90570
Author: Freeman Fang 
AuthorDate: Wed Mar 6 15:30:10 2024 -0500

[maven-release-plugin] prepare release cxf-4.0.4
---
 bom/pom.xml  | 2 +-
 core/pom.xml | 2 +-
 integration/cdi/pom.xml  | 2 +-
 integration/jca/pom.xml  | 2 +-
 integration/pom.xml  | 2 +-
 integration/spring-boot/autoconfigure/pom.xml| 2 +-
 integration/spring-boot/pom.xml  | 2 +-
 integration/spring-boot/starter-jaxrs/pom.xml| 2 +-
 integration/spring-boot/starter-jaxws/pom.xml| 2 +-
 integration/tracing/tracing-brave/pom.xml| 2 +-
 integration/tracing/tracing-micrometer/pom.xml   | 2 +-
 integration/tracing/tracing-opentelemetry/pom.xml| 2 +-
 integration/tracing/tracing-opentracing/pom.xml  | 2 +-
 maven-plugins/archetypes/cxf-jaxrs-service/pom.xml   | 2 +-
 maven-plugins/archetypes/cxf-jaxws-javafirst/pom.xml | 4 ++--
 maven-plugins/archetypes/cxf-jaxws-wsdlfirst/pom.xml | 2 +-
 maven-plugins/archetypes/pom.xml | 2 +-
 maven-plugins/codegen-plugin/pom.xml | 2 +-
 maven-plugins/corba/pom.xml  | 2 +-
 maven-plugins/java2wadl-plugin/pom.xml   | 4 ++--
 maven-plugins/java2ws-plugin/pom.xml | 2 +-
 maven-plugins/pom.xml| 2 +-
 maven-plugins/wadl2java-plugin/pom.xml   | 2 +-
 maven-plugins/wsdl-validator-plugin/pom.xml  | 2 +-
 parent/pom.xml   | 2 +-
 pom.xml  | 4 ++--
 rt/bindings/coloc/pom.xml| 2 +-
 rt/bindings/corba/pom.xml| 2 +-
 rt/bindings/pom.xml  | 2 +-
 rt/bindings/soap/pom.xml | 2 +-
 rt/bindings/xml/pom.xml  | 2 +-
 rt/databinding/aegis/pom.xml | 2 +-
 rt/databinding/jaxb/pom.xml  | 2 +-
 rt/databinding/pom.xml   | 2 +-
 rt/features/clustering/pom.xml   | 2 +-
 rt/features/logging/pom.xml  | 2 +-
 rt/features/metrics/pom.xml  | 2 +-
 rt/features/pom.xml  | 2 +-
 rt/features/throttling/pom.xml   | 2 +-
 rt/frontend/jaxrs/pom.xml| 2 +-
 rt/frontend/jaxws/pom.xml| 2 +-
 rt/frontend/js/pom.xml   | 2 +-
 rt/frontend/pom.xml  | 2 +-
 rt/frontend/simple/pom.xml   | 2 +-
 rt/javascript/javascript-rt/pom.xml  | 2 +-
 rt/javascript/javascript-tests/pom.xml   | 2 +-
 rt/javascript/pom.xml| 2 +-
 rt/management/pom.xml| 2 +-
 rt/pom.xml   | 2 +-
 rt/rs/client/pom.xml | 2 +-
 rt/rs/description-common-openapi/pom.xml | 2 +-
 rt/rs/description-microprofile-openapi/pom.xml   | 2 +-
 rt/rs/description-openapi-v3/pom.xml | 2 +-
 rt/rs/description-swagger-ui/pom.xml | 2 +-
 rt/rs/description/pom.xml| 2 +-
 rt/rs/extensions/json-basic/pom.xml  | 2 +-
 rt/rs/extensions/providers/pom.xml   | 2 +-
 rt/rs/extensions/reactivestreams/pom.xml | 2 +-
 rt/rs/extensions/reactor/pom.xml | 2 +-
 rt/rs/extensions/rx/pom.xml  | 2 +-
 rt/rs/extensions/rx2/pom.xml | 2 +-
 rt/rs/extensions/rx3/pom.xml | 2 +-
 rt/rs/extensions/search/pom.xml  | 2 +-
 rt/rs/http-sci/pom.xml   | 2 +-
 rt/rs/microprofile-client/pom.xml| 2 +-
 rt/rs/pom.xml| 2 +-
 rt/rs/security/cors/pom.xml  | 2 +-
 rt/rs/security/http-signature/pom.xml| 2 +-
 rt/rs/security/jose-parent/jose-jaxrs/pom.xml| 2 +-
 rt/rs/security/jose-parent/jose/pom.xml  | 2 +-
 rt/rs/security/jose-parent/pom.xml   | 2 +-
 rt/rs/security/oauth-parent/oauth2-saml/pom.xml  | 2 +-
 rt/rs/security/oauth-parent/oauth2/pom.xml   | 2 +-
 rt/rs/security/oauth-parent

(cxf) branch main updated: [maven-release-plugin] rollback the release of cxf-4.0.4

2024-03-06 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/main by this push:
 new fabe346b8c [maven-release-plugin] rollback the release of cxf-4.0.4
fabe346b8c is described below

commit fabe346b8c16eebb27e097ec04bea5a3d0e60f9c
Author: Freeman Fang 
AuthorDate: Wed Mar 6 14:55:24 2024 -0500

[maven-release-plugin] rollback the release of cxf-4.0.4
---
 bom/pom.xml  | 2 +-
 core/pom.xml | 2 +-
 integration/cdi/pom.xml  | 2 +-
 integration/jca/pom.xml  | 2 +-
 integration/pom.xml  | 2 +-
 integration/spring-boot/autoconfigure/pom.xml| 2 +-
 integration/spring-boot/pom.xml  | 2 +-
 integration/spring-boot/starter-jaxrs/pom.xml| 2 +-
 integration/spring-boot/starter-jaxws/pom.xml| 2 +-
 integration/tracing/tracing-brave/pom.xml| 2 +-
 integration/tracing/tracing-micrometer/pom.xml   | 2 +-
 integration/tracing/tracing-opentelemetry/pom.xml| 2 +-
 integration/tracing/tracing-opentracing/pom.xml  | 2 +-
 maven-plugins/archetypes/cxf-jaxrs-service/pom.xml   | 2 +-
 maven-plugins/archetypes/cxf-jaxws-javafirst/pom.xml | 4 ++--
 maven-plugins/archetypes/cxf-jaxws-wsdlfirst/pom.xml | 2 +-
 maven-plugins/archetypes/pom.xml | 2 +-
 maven-plugins/codegen-plugin/pom.xml | 2 +-
 maven-plugins/corba/pom.xml  | 2 +-
 maven-plugins/java2wadl-plugin/pom.xml   | 4 ++--
 maven-plugins/java2ws-plugin/pom.xml | 2 +-
 maven-plugins/pom.xml| 2 +-
 maven-plugins/wadl2java-plugin/pom.xml   | 2 +-
 maven-plugins/wsdl-validator-plugin/pom.xml  | 2 +-
 parent/pom.xml   | 2 +-
 pom.xml  | 4 ++--
 rt/bindings/coloc/pom.xml| 2 +-
 rt/bindings/corba/pom.xml| 2 +-
 rt/bindings/pom.xml  | 2 +-
 rt/bindings/soap/pom.xml | 2 +-
 rt/bindings/xml/pom.xml  | 2 +-
 rt/databinding/aegis/pom.xml | 2 +-
 rt/databinding/jaxb/pom.xml  | 2 +-
 rt/databinding/pom.xml   | 2 +-
 rt/features/clustering/pom.xml   | 2 +-
 rt/features/logging/pom.xml  | 2 +-
 rt/features/metrics/pom.xml  | 2 +-
 rt/features/pom.xml  | 2 +-
 rt/features/throttling/pom.xml   | 2 +-
 rt/frontend/jaxrs/pom.xml| 2 +-
 rt/frontend/jaxws/pom.xml| 2 +-
 rt/frontend/js/pom.xml   | 2 +-
 rt/frontend/pom.xml  | 2 +-
 rt/frontend/simple/pom.xml   | 2 +-
 rt/javascript/javascript-rt/pom.xml  | 2 +-
 rt/javascript/javascript-tests/pom.xml   | 2 +-
 rt/javascript/pom.xml| 2 +-
 rt/management/pom.xml| 2 +-
 rt/pom.xml   | 2 +-
 rt/rs/client/pom.xml | 2 +-
 rt/rs/description-common-openapi/pom.xml | 2 +-
 rt/rs/description-microprofile-openapi/pom.xml   | 2 +-
 rt/rs/description-openapi-v3/pom.xml | 2 +-
 rt/rs/description-swagger-ui/pom.xml | 2 +-
 rt/rs/description/pom.xml| 2 +-
 rt/rs/extensions/json-basic/pom.xml  | 2 +-
 rt/rs/extensions/providers/pom.xml   | 2 +-
 rt/rs/extensions/reactivestreams/pom.xml | 2 +-
 rt/rs/extensions/reactor/pom.xml | 2 +-
 rt/rs/extensions/rx/pom.xml  | 2 +-
 rt/rs/extensions/rx2/pom.xml | 2 +-
 rt/rs/extensions/rx3/pom.xml | 2 +-
 rt/rs/extensions/search/pom.xml  | 2 +-
 rt/rs/http-sci/pom.xml   | 2 +-
 rt/rs/microprofile-client/pom.xml| 2 +-
 rt/rs/pom.xml| 2 +-
 rt/rs/security/cors/pom.xml  | 2 +-
 rt/rs/security/http-signature/pom.xml| 2 +-
 rt/rs/security/jose-parent/jose-jaxrs/pom.xml| 2 +-
 rt/rs/security/jose-parent/jose/pom.xml  | 2 +-
 rt/rs/security/jose-parent/pom.xml   | 2 +-
 rt/rs/security/oauth-parent/oauth2-saml/pom.xml  | 2 +-
 rt/rs/security/oauth-parent/oauth2/pom.xml   | 2 +-
 rt/rs/security

(cxf) branch main updated: update release_notes

2024-03-06 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/main by this push:
 new 89db1096de update release_notes
89db1096de is described below

commit 89db1096de8842a084a58714dafc068fd4a11fbd
Author: Freeman Fang 
AuthorDate: Wed Mar 6 14:07:18 2024 -0500

update release_notes
---
 distribution/src/main/release/release_notes.txt | 1 +
 1 file changed, 1 insertion(+)

diff --git a/distribution/src/main/release/release_notes.txt 
b/distribution/src/main/release/release_notes.txt
index b365944190..b5ea85fdd2 100644
--- a/distribution/src/main/release/release_notes.txt
+++ b/distribution/src/main/release/release_notes.txt
@@ -84,6 +84,7 @@ for caveats when upgrading.
 * [CXF-8965] - Apache CXF Netty Integration, URI not encoded
 * [CXF-8978] - Codegen plugin fails with IBM JDK
 * [CXF-8983] - cxf-services-sts-core should depend on 
cxf-rt-rs-security-jose instead of cxf-rt-rs-security-jose-jaxrs
+* [CXF-8984] - HttpClientHTTPConduit.HttpClientWrappedOutputStream throws 
NPE in closeInputStream()
 
 
 ** New Feature



(cxf) branch main updated: [CXF-8984] Check for null before closing input stream (#1728)

2024-03-06 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/main by this push:
 new 08fea2ea2e [CXF-8984] Check for null before closing input stream 
(#1728)
08fea2ea2e is described below

commit 08fea2ea2ecb326b84a60ceb3066e6cfe3ccd83c
Author: Thomas Egli <38955561+the...@users.noreply.github.com>
AuthorDate: Wed Mar 6 19:47:18 2024 +0100

[CXF-8984] Check for null before closing input stream (#1728)
---
 .../java/org/apache/cxf/transport/http/HttpClientHTTPConduit.java| 5 -
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git 
a/rt/transports/http/src/main/java/org/apache/cxf/transport/http/HttpClientHTTPConduit.java
 
b/rt/transports/http/src/main/java/org/apache/cxf/transport/http/HttpClientHTTPConduit.java
index 5f4d4653d4..b25777eeb3 100644
--- 
a/rt/transports/http/src/main/java/org/apache/cxf/transport/http/HttpClientHTTPConduit.java
+++ 
b/rt/transports/http/src/main/java/org/apache/cxf/transport/http/HttpClientHTTPConduit.java
@@ -817,7 +817,10 @@ public class HttpClientHTTPConduit extends 
URLConnectionHTTPConduit {
 
 @Override
 protected void closeInputStream() throws IOException {
-getInputStream().close();
+InputStream is = getInputStream();
+if (is != null) {
+is.close();
+}
 }
 
 @Override



(cxf) branch main updated (ea25bfc07e -> 65ed0403a0)

2024-03-06 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a change to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git


from ea25bfc07e update release notes
 new c252e7cd86 Revert "[maven-release-plugin] prepare for next development 
iteration"
 new 65ed0403a0 Revert "[maven-release-plugin] prepare release cxf-4.0.4"

The 2 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 bom/pom.xml  |  2 +-
 core/pom.xml |  2 +-
 distribution/javadoc/pom.xml |  2 +-
 distribution/manifest/pom.xml|  2 +-
 distribution/pom.xml |  2 +-
 distribution/src/main/release/samples/aegis/pom.xml  | 10 +-
 .../src/main/release/samples/aegis_standalone/pom.xml|  4 ++--
 distribution/src/main/release/samples/callback/pom.xml   |  8 
 .../release/samples/configuration_interceptor/pom.xml|  8 
 distribution/src/main/release/samples/corba/bank/pom.xml |  2 +-
 .../release/samples/corba/bank_ws_addressing/pom.xml |  2 +-
 .../src/main/release/samples/corba/hello_world/pom.xml   |  8 
 .../main/release/samples/groovy_spring_support/pom.xml   |  2 +-
 .../src/main/release/samples/in_jvm_transport/pom.xml| 10 +-
 .../src/main/release/samples/java_first_jaxws/pom.xml|  2 +-
 .../samples/java_first_jaxws_factory_bean/pom.xml|  8 
 .../src/main/release/samples/java_first_jms/pom.xml  |  6 +++---
 .../src/main/release/samples/java_first_pojo/pom.xml |  8 
 .../release/samples/java_first_spring_support/pom.xml|  2 +-
 .../src/main/release/samples/jax_rs/basic/pom.xml|  8 
 .../release/samples/jax_rs/basic_http2_jetty/pom.xml |  2 +-
 .../release/samples/jax_rs/basic_http2_netty/pom.xml |  2 +-
 .../release/samples/jax_rs/basic_http2_undertow/pom.xml  |  2 +-
 .../src/main/release/samples/jax_rs/basic_https/pom.xml  |  2 +-
 .../src/main/release/samples/jax_rs/basic_oidc/pom.xml   |  2 +-
 .../src/main/release/samples/jax_rs/big_query/pom.xml|  2 +-
 .../release/samples/jax_rs/content_negotiation/pom.xml   | 10 +-
 .../description_openapi_microprofile_spring/pom.xml  |  2 +-
 .../samples/jax_rs/description_openapi_v3/pom.xml|  2 +-
 .../samples/jax_rs/description_openapi_v3_spring/pom.xml |  2 +-
 .../samples/jax_rs/description_openapi_v3_web/pom.xml|  2 +-
 .../main/release/samples/jax_rs/graalvm_basic/pom.xml|  2 +-
 .../src/main/release/samples/jax_rs/odata/pom.xml|  2 +-
 .../src/main/release/samples/jax_rs/search/pom.xml   | 14 +++---
 .../src/main/release/samples/jax_rs/spring_boot/pom.xml  |  2 +-
 .../samples/jax_rs/spring_boot_scan/application/pom.xml  |  2 +-
 .../samples/jax_rs/spring_boot_scan/client/pom.xml   |  2 +-
 .../jax_rs/spring_boot_scan/eureka-registry/pom.xml  |  2 +-
 .../main/release/samples/jax_rs/spring_security/pom.xml  |  8 
 .../src/main/release/samples/jax_rs/sse_cdi/pom.xml  |  2 +-
 .../src/main/release/samples/jax_rs/sse_client/pom.xml   |  2 +-
 .../src/main/release/samples/jax_rs/sse_spring/pom.xml   |  2 +-
 .../src/main/release/samples/jax_rs/sse_tomcat/pom.xml   |  2 +-
 .../main/release/samples/jax_rs/tracing_brave/pom.xml|  4 ++--
 .../release/samples/jax_rs/tracing_micrometer/pom.xml| 14 +++---
 .../release/samples/jax_rs/tracing_opentelemetry/pom.xml | 14 +++---
 .../samples/jax_rs/tracing_opentelemetry_camel/pom.xml   |  2 +-
 .../release/samples/jax_rs/tracing_opentracing/pom.xml   | 14 +++---
 .../src/main/release/samples/jax_rs/websocket/pom.xml| 10 +-
 .../main/release/samples/jax_rs/websocket_web/pom.xml|  2 +-
 .../main/release/samples/jax_server_aegis_client/pom.xml | 10 +-
 .../src/main/release/samples/jaxws_async/pom.xml | 10 +-
 .../main/release/samples/jaxws_dispatch_provider/pom.xml |  8 
 .../src/main/release/samples/jaxws_graalvm/pom.xml   |  2 +-
 .../release/samples/jaxws_graalvm_dynamic/client/pom.xml |  2 +-
 .../release/samples/jaxws_graalvm_dynamic/server/pom.xml |  2 +-
 .../src/main/release/samples/jaxws_handlers/pom.xml  |  8 
 .../src/main/release/samples/jaxws_spring_boot/pom.xml   |  2 +-
 distribution/src/main/release/samples/jms_pubsub/pom.xml |  4 ++--
 distribution/src/main/release/samples/jms_queue/pom.xml  |  6 +++---
 .../src/main/release/samples/jms_spec_demo/pom.xml   |  6 +++---
 .../src/main/release/samples/jms_spring_config/pom.xml   |  2 +-
 .../release/samples/js_browser_client_java_first/pom.

(cxf) annotated tag cxf-4.0.4 deleted (was 1a9b73469e)

2024-03-06 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a change to annotated tag cxf-4.0.4
in repository https://gitbox.apache.org/repos/asf/cxf.git


*** WARNING: tag cxf-4.0.4 was deleted! ***

   tag was  1a9b73469e

The revisions that were on this annotated tag are still contained in
other references; therefore, this change does not discard any commits
from the repository.



(cxf) branch main updated: update release notes

2024-03-06 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/main by this push:
 new ea25bfc07e update release notes
ea25bfc07e is described below

commit ea25bfc07ebaca6f10e32bd04ad4d7683f98746b
Author: Freeman Fang 
AuthorDate: Wed Mar 6 11:13:05 2024 -0500

update release notes
---
 distribution/src/main/release/release_notes.txt | 1 +
 1 file changed, 1 insertion(+)

diff --git a/distribution/src/main/release/release_notes.txt 
b/distribution/src/main/release/release_notes.txt
index cb09902bbf..b365944190 100644
--- a/distribution/src/main/release/release_notes.txt
+++ b/distribution/src/main/release/release_notes.txt
@@ -83,6 +83,7 @@ for caveats when upgrading.
 * [CXF-8964] - Update Bouncycastle from unsupported xxx-jdk15on to 
xxx-jdk18on
 * [CXF-8965] - Apache CXF Netty Integration, URI not encoded
 * [CXF-8978] - Codegen plugin fails with IBM JDK
+* [CXF-8983] - cxf-services-sts-core should depend on 
cxf-rt-rs-security-jose instead of cxf-rt-rs-security-jose-jaxrs
 
 
 ** New Feature



(cxf) annotated tag cxf-4.0.4 created (now 1a9b73469e)

2024-03-05 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a change to annotated tag cxf-4.0.4
in repository https://gitbox.apache.org/repos/asf/cxf.git


  at 1a9b73469e (tag)
 tagging f88b9bf2bc5121a8b8ed0629ff7685c2b1b447a1 (commit)
 replaces cxf-4.0.3
  by Freeman Fang
  on Tue Mar 5 14:59:41 2024 -0500

- Log -
[maven-release-plugin] copy for tag cxf-4.0.4
---

No new revisions were added by this update.



(cxf) branch main updated: make release preparation goals configurable

2024-03-05 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/main by this push:
 new 9730f744e6 make release preparation goals configurable
9730f744e6 is described below

commit 9730f744e655d4c9ec2011876d287875d4a7e285
Author: Freeman Fang 
AuthorDate: Tue Mar 5 14:00:50 2024 -0500

make release preparation goals configurable
---
 pom.xml | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/pom.xml b/pom.xml
index 515cc73b9c..6de8883129 100644
--- a/pom.xml
+++ b/pom.xml
@@ -46,6 +46,7 @@
 UTF-8
 
scp://people.apache.org/www/cxf.apache.org/maven-site
 9.0.9
+clean install
 
 
 
@@ -456,7 +457,7 @@
 3.0.1
 
 false
-clean install
+
${preparationGoals}
 deploy
 -Prelease,deploy
 true



(cxf) branch main updated: remove SNAPSHOT version

2024-03-05 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/main by this push:
 new 7a503ee7c7 remove SNAPSHOT version
7a503ee7c7 is described below

commit 7a503ee7c7a9cdb3068930a24f9f2b1dd4992825
Author: Freeman Fang 
AuthorDate: Tue Mar 5 10:24:55 2024 -0500

remove SNAPSHOT version
---
 rt/ws/security/pom.xml | 1 -
 1 file changed, 1 deletion(-)

diff --git a/rt/ws/security/pom.xml b/rt/ws/security/pom.xml
index 1279ef0ff1..535e3dc289 100644
--- a/rt/ws/security/pom.xml
+++ b/rt/ws/security/pom.xml
@@ -114,7 +114,6 @@
 
 org.apache.wss4j
 wss4j-policy
-3.0.3-SNAPSHOT
 
  
  org.codehaus.woodstox



(cxf) branch main updated: Update release notes for 4.0.4

2024-03-05 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/main by this push:
 new bd1d7aef9a Update release notes for 4.0.4
bd1d7aef9a is described below

commit bd1d7aef9a66b19ae04db0d355273c49dee29cdd
Author: Freeman Fang 
AuthorDate: Tue Mar 5 08:59:40 2024 -0500

Update release notes for 4.0.4
---
 distribution/src/main/release/release_notes.txt | 97 ++---
 1 file changed, 39 insertions(+), 58 deletions(-)

diff --git a/distribution/src/main/release/release_notes.txt 
b/distribution/src/main/release/release_notes.txt
index 49bd7a522a..cb09902bbf 100644
--- a/distribution/src/main/release/release_notes.txt
+++ b/distribution/src/main/release/release_notes.txt
@@ -1,4 +1,4 @@
-Apache CXF 4.0.3 Release Notes
+Apache CXF 4.0.4 Release Notes
 
 1. Overview
 
@@ -21,7 +21,7 @@ for further information and requirements for upgrading from 
earlier
 versions of CXF.
 
 
-4.0.3 fixes over 54 JIRA issues reported by users and the community.
+4.0.4 fixes over 28 JIRA issues reported by users and the community.
 
 
 2. Installation Prerequisites 
@@ -63,67 +63,48 @@ for caveats when upgrading.
 
 7. Specific issues, features, and improvements fixed in this version
 
-** Sub-task
-* [CXF-8842] - Get rid of EasyMock in cxf-core
-* [CXF-8843] - Get rid of EasyMock in cxf-integration-jca
-* [CXF-8844] - Get rid of EasyMock in cxf-rt-bindings-coloc
-* [CXF-8845] - Get rid of EasyMock in cxf-rt-bindings-corba
-* [CXF-8846] - Get rid of EasyMock in cxf-rt-bindings-soap
-* [CXF-8847] - Get rid of EasyMock in cxf-rt-databinding-aegis
-* [CXF-8848] - Get rid of EasyMock in cxf-rt-databinding-jaxb
-* [CXF-8849] - Get rid of EasyMock in cxf-rt-features-clustering
-* [CXF-8850] - Get rid of EasyMock in cxf-rt-features-logging
-* [CXF-8851] - Get rid of EasyMock in cxf-rt-features-throttling
-* [CXF-8852] - Get rid of EasyMock in cxf-services-xkms-x509-repo-ldap
-* [CXF-8853] - Get rid of EasyMock in cxf-services-xkms-x509-handlers
-* [CXF-8854] - Get rid of EasyMock in cxf-rt-wsdl
-* [CXF-8855] - Get rid of EasyMock in cxf-rt-ws-transfer
-* [CXF-8856] - Get rid of EasyMock in cxf-rt-frontend-jaxrs
-* [CXF-8857] - Get rid of EasyMock in cxf-rt-frontend-jaxws
-* [CXF-8858] - Get rid of EasyMock in cxf-rt-frontend-js
-* [CXF-8859] - Get rid of EasyMock in cxf-rt-ws-security
-* [CXF-8860] - Get rid of EasyMock in cxf-rt-ws-rm
-* [CXF-8861] - Get rid of EasyMock in cxf-rt-ws-policy
-* [CXF-8862] - Get rid of EasyMock in cxf-rt-ws-addr
-* [CXF-8863] - Get rid of EasyMock in cxf-rt-transports-websocket
-* [CXF-8864] - Get rid of EasyMock in cxf-rt-transports-jms
-* [CXF-8865] - Get rid of EasyMock in cxf-rt-management
-* [CXF-8866] - Get rid of EasyMock in cxf-rt-rs-service-description
-* [CXF-8867] - Get rid of EasyMock in cxf-rt-rs-client
-* [CXF-8868] - Get rid of EasyMock in cxf-rt-rs-extension-providers
-* [CXF-8869] - Get rid of EasyMock in cxf-rt-rs-extension-search
-* [CXF-8870] - Get rid of EasyMock in cxf-rt-transports-http-undertow
-* [CXF-8871] - Get rid of EasyMock in cxf-rt-rs-mp-client
-* [CXF-8872] - Get rid of EasyMock in cxf-rt-rs-security-oauth2
-* [CXF-8873] - Get rid of EasyMock in cxf-rt-rs-security-oauth2-saml
-* [CXF-8874] - Get rid of EasyMock in cxf-rt-rs-security-sso-oidc
-* [CXF-8876] - Get rid of EasyMock in cxf-rt-transports-http-jetty
-* [CXF-8877] - Get rid of EasyMock in cxf-rt-transports-http-netty-client
-* [CXF-8878] - Get rid of EasyMock in cxf-rt-transports-http-netty-server
-* [CXF-8890] - Get rid of EasyMock in cxf-rt-transports-http
 
 ** Bug
-* [CXF-8885] - HttpClient SelectorManager threads run indefinitely causing 
OOM
-* [CXF-8886] - JavaDocProvider does not work with JDK 17 and beyond
-* [CXF-8889] - Compilation of CXF fails due to a "jakarta..." vs. 
"javax..." issue.
-* [CXF-8892] - CXF build on Windows is broken (test failures)
-* [CXF-8895] - Deadlock instead of timeout with new HttpClientHTTPConduit 
using large payloads
-* [CXF-8896] - http client sends some strange HTTP/1.1 and HTTP/2 mix 
headers
-* [CXF-8903] - Too many open files error in HttpClientHTTPConduit
-* [CXF-8905] - TransportURIResolver doesn't honor the property setting in 
bus
-* [CXF-8907] -  java.lang.NullPointerException at 
AsymmetricBindingHandler.java
-* [CXF-8914] - No content-length header after upgrade CXF from 3.5.6 to 
3.6.1
-* [CXF-8919] - JAXRSUtils references javax.activation.Datasource
-* [CXF-8920] - Can't filter when collection has attribute of type 
LocalDate or LocalDateTime
-* [CXF-8925] - Logging twice in case of faults happening after pre-stream 
phase in out-chain
+* [CXF-8812] - Content

(cxf) branch main updated: [CXF-8981] Added unit tests for key agreement method (#1715)

2024-03-05 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/main by this push:
 new 354f09f05e [CXF-8981] Added unit tests for key agreement method  
(#1715)
354f09f05e is described below

commit 354f09f05ef61722e9d62f5c6c4fb777d7ef9c97
Author: jrihtarsic 
AuthorDate: Tue Mar 5 14:55:06 2024 +0100

[CXF-8981] Added unit tests for key agreement method  (#1715)

* [CXF-8981] Added unit tests for key agreement method with WSS4j 
interceptors

* Add documentation to  WSS4JInOutWithAttachmentsTest

* Ensure that added tests builds with JDK 11+

-

Co-authored-by: RIHTARSIC Joze 
---
 .../ws/security/wss4j/AbstractSecurityTest.java|   9 +
 .../cxf/ws/security/wss4j/TestPwdCallback.java |   5 +
 .../cxf/ws/security/wss4j/WSS4JInOutTest.java  |  86 ++
 .../wss4j/WSS4JInOutWithAttachmentsTest.java   | 289 +
 .../cxf/ws/security/wss4j/edeliver-as4-clean.xml   |  62 +
 rt/ws/security/src/test/resources/wss-ecdh.p12 | Bin 0 -> 8299 bytes
 .../src/test/resources/wss-ecdh.properties |   4 +
 7 files changed, 455 insertions(+)

diff --git 
a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/AbstractSecurityTest.java
 
b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/AbstractSecurityTest.java
index 3e06e36783..d62b314520 100644
--- 
a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/AbstractSecurityTest.java
+++ 
b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/AbstractSecurityTest.java
@@ -171,4 +171,13 @@ public abstract class AbstractSecurityTest extends 
AbstractCXFTest {
 }
 }
 }
+
+protected int getJDKVersion() {
+try {
+return Integer.getInteger("java.specification.version", 0);
+} catch (NumberFormatException ex) {
+// ignore
+}
+return 0;
+}
 }
diff --git 
a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/TestPwdCallback.java
 
b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/TestPwdCallback.java
index eb233a9ab6..1ad166fcd8 100644
--- 
a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/TestPwdCallback.java
+++ 
b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/TestPwdCallback.java
@@ -36,6 +36,11 @@ public class TestPwdCallback implements CallbackHandler {
 passwords.put("myalias", "myAliasPassword");
 passwords.put("alice", "alicePassword");
 passwords.put("username", "myAliasPassword");
+passwords.put("x448", "security");
+passwords.put("x25519", "security");
+passwords.put("secp256r1", "security");
+passwords.put("secp384r1", "security");
+passwords.put("secp521r1", "security");
 }
 
 public void handle(Callback[] callbacks) throws IOException, 
UnsupportedCallbackException {
diff --git 
a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/WSS4JInOutTest.java
 
b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/WSS4JInOutTest.java
index bd3488a6b3..9404bfd78f 100644
--- 
a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/WSS4JInOutTest.java
+++ 
b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/WSS4JInOutTest.java
@@ -55,7 +55,10 @@ import org.apache.wss4j.dom.WSDataRef;
 import org.apache.wss4j.dom.engine.WSSecurityEngineResult;
 import org.apache.wss4j.dom.handler.WSHandlerConstants;
 import org.apache.wss4j.dom.handler.WSHandlerResult;
+import org.apache.xml.security.utils.Constants;
+import org.apache.xml.security.utils.EncryptionConstants;
 
+import org.junit.Assume;
 import org.junit.Test;
 
 import static org.junit.Assert.assertEquals;
@@ -70,6 +73,9 @@ import static org.junit.Assert.fail;
 public class WSS4JInOutTest extends AbstractSecurityTest {
 
 public WSS4JInOutTest() {
+// add xenc11 and dsig11 namespaces
+testUtilities.addNamespace("xenc11", 
EncryptionConstants.EncryptionSpec11NS);
+testUtilities.addNamespace("dsig11", Constants.SignatureSpec11NS);
 }
 
 @Test
@@ -191,6 +197,86 @@ public class WSS4JInOutTest extends AbstractSecurityTest {
 );
 }
 
+@Test
+public void testEncryptionWithAgreementMethodsX448() throws Exception {
+Assume.assumeTrue(getJDKVersion() >= 16);
+testEncryptionWithAgreementMethod("x448", 
"//dsig11:DEREncodedKeyValue");
+}
+
+@Test
+public void testEncryptionWithAgreementMethodsX25519() throws Exception {
+Assume.assumeTrue(getJDKVersion() >= 16);
+testEncryptionWithAgreem

(cxf) branch 3.6.x-fixes updated: correct wrong package name

2024-03-04 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.6.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.6.x-fixes by this push:
 new 1a13214e84 correct wrong package name
1a13214e84 is described below

commit 1a13214e84bcc48e2a893acfb0127a370d75406d
Author: Freeman Fang 
AuthorDate: Mon Mar 4 21:55:35 2024 -0500

correct wrong package name
---
 .../test/java/org/apache/cxf/systest/jaxrs/EmptyBookStore.java | 10 +-
 .../cxf/systest/jaxrs/JAXRSClientServerEmptyBookTest.java  |  3 ++-
 2 files changed, 7 insertions(+), 6 deletions(-)

diff --git 
a/systests/jaxrs/src/test/java/org/apache/cxf/systest/jaxrs/EmptyBookStore.java 
b/systests/jaxrs/src/test/java/org/apache/cxf/systest/jaxrs/EmptyBookStore.java
index e0131aa855..02a2872a2e 100644
--- 
a/systests/jaxrs/src/test/java/org/apache/cxf/systest/jaxrs/EmptyBookStore.java
+++ 
b/systests/jaxrs/src/test/java/org/apache/cxf/systest/jaxrs/EmptyBookStore.java
@@ -19,11 +19,11 @@
 
 package org.apache.cxf.systest.jaxrs;
 
-import jakarta.ws.rs.DELETE;
-import jakarta.ws.rs.GET;
-import jakarta.ws.rs.Path;
-import jakarta.ws.rs.core.Context;
-import jakarta.ws.rs.core.HttpHeaders;
+import javax.ws.rs.DELETE;
+import javax.ws.rs.GET;
+import javax.ws.rs.Path;
+import javax.ws.rs.core.Context;
+import javax.ws.rs.core.HttpHeaders;
 
 @Path("/bookstore")
 public class EmptyBookStore {
diff --git 
a/systests/jaxrs/src/test/java/org/apache/cxf/systest/jaxrs/JAXRSClientServerEmptyBookTest.java
 
b/systests/jaxrs/src/test/java/org/apache/cxf/systest/jaxrs/JAXRSClientServerEmptyBookTest.java
index 04859f4351..77e2ee6177 100644
--- 
a/systests/jaxrs/src/test/java/org/apache/cxf/systest/jaxrs/JAXRSClientServerEmptyBookTest.java
+++ 
b/systests/jaxrs/src/test/java/org/apache/cxf/systest/jaxrs/JAXRSClientServerEmptyBookTest.java
@@ -19,7 +19,8 @@
 
 package org.apache.cxf.systest.jaxrs;
 
-import jakarta.ws.rs.core.Response;
+import javax.ws.rs.core.Response;
+
 import org.apache.cxf.Bus;
 import org.apache.cxf.jaxrs.client.WebClient;
 import org.apache.cxf.jaxrs.model.AbstractResourceInfo;



(cxf) branch 3.6.x-fixes updated: CXF-8962: HttpClientHTTPConduit sets Content-Type Header for DELETE requests with empty body (#1699)

2024-03-04 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.6.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.6.x-fixes by this push:
 new 445ef65a57 CXF-8962: HttpClientHTTPConduit sets Content-Type Header 
for DELETE requests with empty body (#1699)
445ef65a57 is described below

commit 445ef65a572e13e94b38e3087449fdb7a1eea1a1
Author: Andriy Redko 
AuthorDate: Mon Mar 4 20:10:56 2024 -0500

CXF-8962: HttpClientHTTPConduit sets Content-Type Header for DELETE 
requests with empty body (#1699)

(cherry picked from commit d0ac9fb5d4717c77134764cf45eb72292f3e7f5f)
---
 .../org/apache/cxf/transport/http/Headers.java |  2 +-
 .../cxf/transport/http/HttpClientHTTPConduit.java  | 21 +++-
 .../apache/cxf/systest/jaxrs/EmptyBookServer.java  | 46 
 .../apache/cxf/systest/jaxrs/EmptyBookStore.java   | 46 
 .../jaxrs/JAXRSClientServerEmptyBookTest.java  | 63 ++
 5 files changed, 175 insertions(+), 3 deletions(-)

diff --git 
a/rt/transports/http/src/main/java/org/apache/cxf/transport/http/Headers.java 
b/rt/transports/http/src/main/java/org/apache/cxf/transport/http/Headers.java
index 59ba141089..fccd803cdc 100644
--- 
a/rt/transports/http/src/main/java/org/apache/cxf/transport/http/Headers.java
+++ 
b/rt/transports/http/src/main/java/org/apache/cxf/transport/http/Headers.java
@@ -67,7 +67,7 @@ public class Headers {
 public static final String HTTP_HEADERS_LINK = "Link";
 public static final String EMPTY_REQUEST_PROPERTY = 
"org.apache.cxf.empty.request";
 public static final String USER_AGENT = initUserAgent();
-private static final String SET_EMPTY_REQUEST_CT_PROPERTY = 
"set.content.type.for.empty.request";
+public static final String SET_EMPTY_REQUEST_CT_PROPERTY = 
"set.content.type.for.empty.request";
 private static final TimeZone TIME_ZONE_GMT = TimeZone.getTimeZone("GMT");
 private static final Logger LOG = LogUtils.getL7dLogger(Headers.class);
 
diff --git 
a/rt/transports/http/src/main/java/org/apache/cxf/transport/http/HttpClientHTTPConduit.java
 
b/rt/transports/http/src/main/java/org/apache/cxf/transport/http/HttpClientHTTPConduit.java
index e5d26d2c60..5f4d4653d4 100644
--- 
a/rt/transports/http/src/main/java/org/apache/cxf/transport/http/HttpClientHTTPConduit.java
+++ 
b/rt/transports/http/src/main/java/org/apache/cxf/transport/http/HttpClientHTTPConduit.java
@@ -567,9 +567,26 @@ public class HttpClientHTTPConduit extends 
URLConnectionHTTPConduit {
 }
 if (!h.headerMap().containsKey("User-Agent")) {
 rb.header("User-Agent", Headers.USER_AGENT);
-}   
+}
+
 if (hasCT || 
!KNOWN_HTTP_VERBS_WITH_NO_CONTENT.contains(outMessage.get(Message.HTTP_REQUEST_METHOD)))
 {
-rb.header(HttpHeaderHelper.CONTENT_TYPE, 
h.determineContentType());
+boolean dropContentType = false;
+boolean emptyRequest = 
PropertyUtils.isTrue(outMessage.get(Headers.EMPTY_REQUEST_PROPERTY));
+
+// If it is an empty request (without a request body) then 
check further if CT still needs be set
+if (emptyRequest) {
+final Object setCtForEmptyRequestProp = outMessage
+
.getContextualProperty(Headers.SET_EMPTY_REQUEST_CT_PROPERTY);
+if (setCtForEmptyRequestProp != null) {
+// If SET_EMPTY_REQUEST_CT_PROPERTY is set then do as 
a user prefers.
+// CT will be dropped if setting CT for empty requests 
was explicitly disabled
+dropContentType = 
PropertyUtils.isFalse(setCtForEmptyRequestProp);
+}
+}
+
+if (!dropContentType) {
+rb.header(HttpHeaderHelper.CONTENT_TYPE, 
h.determineContentType());
+}
 }
 }
 
diff --git 
a/systests/jaxrs/src/test/java/org/apache/cxf/systest/jaxrs/EmptyBookServer.java
 
b/systests/jaxrs/src/test/java/org/apache/cxf/systest/jaxrs/EmptyBookServer.java
new file mode 100644
index 00..e22b8ff883
--- /dev/null
+++ 
b/systests/jaxrs/src/test/java/org/apache/cxf/systest/jaxrs/EmptyBookServer.java
@@ -0,0 +1,46 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless re

(cxf) branch main updated: Introduction of CustomAlgorithmSuite (CXF-8971) (#1660)

2024-02-26 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/main by this push:
 new 4b3960caec Introduction of CustomAlgorithmSuite (CXF-8971) (#1660)
4b3960caec is described below

commit 4b3960caec2a05084bc965976a30b8ddcc513233
Author: JiriOndrusek 
AuthorDate: Mon Feb 26 15:52:20 2024 +0100

Introduction of CustomAlgorithmSuite (CXF-8971) (#1660)
---
 parent/pom.xml |   2 +-
 rt/ws/security/pom.xml |   1 +
 .../apache/cxf/ws/security/SecurityConstants.java  | 103 ++-
 .../policy/custom/DefaultAlgorithmSuiteLoader.java | 128 +
 .../security/wss4j/AlgorithmSuiteTranslater.java   |  49 +++--
 .../wss4j/PolicyBasedWSS4JInInterceptor.java   |   9 +-
 .../wss4j/PolicyBasedWSS4JOutInterceptor.java  |  15 ++
 .../wss4j/PolicyBasedWSS4JStaxInInterceptor.java   |  32 +++-
 .../StaxAsymmetricBindingHandler.java  |   5 +
 .../StaxSymmetricBindingHandler.java   |   5 +
 .../AlgorithmSuitePolicyValidator.java |   5 +
 .../policy/custom/CustomAlgorithmLoaderTest.java   | 169 ++
 systests/ws-security/generate-certs.sh |  53 ++
 .../WSSecurity10CustomAlgorithmSuiteTest.java  | 198 +
 .../ws/wssec10/server/Custom10SignEncrypt01.java   |  30 
 .../wssec10/server/ServerCustomAlgorithmSuite.java |  39 
 .../server/StaxServerCustomAlgorithmSuite.java |  40 +
 .../test/resources/alice-customAlgSuite.properties |  21 +++
 .../test/resources/bob-customAlgSuite.properties   |  21 +++
 .../src/test/resources/certs/alice.pkcs12  | Bin 0 -> 5737 bytes
 .../src/test/resources/certs/bob.pkcs12| Bin 0 -> 5733 bytes
 .../ws/wssec10/client_customAlgorithmSuite.xml |  92 ++
 .../ws/wssec10/server_customAlgorithmSuite.xml | 115 
 .../wssec10/stax-server_customAlgorithmSuite.xml   | 119 +
 .../wssec10/WsSecurity10_customAlgorithmSuite.wsdl |  66 +++
 .../wssec10/WsSecurity10_policy.wsdl   |   2 +-
 .../WsSecurity10_policy_customAlgorithmSuite.wsdl  | 178 ++
 systests/ws-security/v3.ext|   3 +
 28 files changed, 1476 insertions(+), 24 deletions(-)

diff --git a/parent/pom.xml b/parent/pom.xml
index 893dbe8582..e175a432b7 100644
--- a/parent/pom.xml
+++ b/parent/pom.xml
@@ -235,7 +235,7 @@
 6.6.0
 4.2.1
 1.6.3
-3.0.2
+3.0.3-SNAPSHOT
 2.3.1
 3.8.13.Final
 2.1
diff --git a/rt/ws/security/pom.xml b/rt/ws/security/pom.xml
index 535e3dc289..1279ef0ff1 100644
--- a/rt/ws/security/pom.xml
+++ b/rt/ws/security/pom.xml
@@ -114,6 +114,7 @@
 
 org.apache.wss4j
 wss4j-policy
+3.0.3-SNAPSHOT
 
  
  org.codehaus.woodstox
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/SecurityConstants.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/SecurityConstants.java
index 687a141e29..56848594f9 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/SecurityConstants.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/SecurityConstants.java
@@ -202,7 +202,7 @@ public final class SecurityConstants extends 
org.apache.cxf.rt.security.Security
  * default instance that is used is the EHCacheReplayCache.
  */
 public static final String NONCE_CACHE_INSTANCE =
-"ws-security.nonce.cache.instance";
+"ws-security.nonce.cache.instance";
 
 /**
  * This holds a reference to a ReplayCache instance used to cache 
Timestamp Created Strings. The
@@ -406,6 +406,94 @@ public final class SecurityConstants extends 
org.apache.cxf.rt.security.Security
  */
 public static final String KERBEROS_CLIENT = "ws-security.kerberos.client";
 
+/**
+ * Prefix of all constants meant to change customAlgSuite.
+ */
+public static final String CUSTOM_ALG_SUITE_PREFIX = 
"ws-security.custom.alg.suite.";
+
+/**
+ * Default value is: http://www.w3.org/2001/04/xmlenc#sha256
+ */
+public static final String CUSTOM_ALG_SUITE_DIGEST_ALGORITHM = 
"ws-security.custom.alg.suite.digest.algorithm";
+
+/**
+ * Default value is: http://www.w3.org/2009/xmlenc11#aes256-gcm
+ */
+public static final String CUSTOM_ALG_SUITE_ENCRYPTION_ALGORITHM =
+"ws-security.custom.alg.suite.encryption.algorithm";
+
+/**
+ * Default value is: http://www.w3.org/2001/04/xmlenc#kw-aes256
+ */
+public static final String 
CUSTOM_ALG_SUITE_SYMMETRIC_KEY_ENCRYPTION_ALGORITHM =
+"ws-security.custom.alg.suite.symmetric.key.encryption.algorithm";
+

(cxf) branch main updated (cfac6ce7e1 -> 5fafb851e3)

2024-01-22 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a change to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git


from cfac6ce7e1 Bump actions/upload-artifact from 4.1.0 to 4.2.0 (#1658)
 add 5fafb851e3 [CXF-8970]ensure we can build and run without bouncycastle 
dependencies (#1645)

No new revisions were added by this update.

Summary of changes:
 distribution/javadoc/pom.xml   |   4 -
 .../src/main/release/samples/jax_rs/search/pom.xml |   6 +
 parent/pom.xml |   9 +-
 rt/rs/extensions/search/pom.xml|   6 +
 rt/rs/security/jose-parent/jose/pom.xml|   6 -
 .../cxf/rs/security/jose/common/JoseUtils.java |  24 +++
 .../cxf/rs/security/jose/jwa/AlgorithmUtils.java   |  12 +-
 .../cxf/rs/security/jose/jwa/ContentAlgorithm.java |   6 +-
 .../rs/security/jose/jwa/SignatureAlgorithm.java   |   6 +-
 .../jwe/PbesHmacAesWrapKeyEncryptionAlgorithm.java |  40 ++---
 .../jose/jwe/WrappedKeyDecryptionAlgorithm.java|   2 +-
 .../jose/jws/PrivateKeyJwsSignatureProvider.java   |   8 +
 .../jose/jws/PublicKeyJwsSignatureVerifier.java|  17 +++
 .../cxf/rs/security/jose/common/HexUtils.java} |  32 ++--
 .../jose/cookbook/JwsJoseCookBookTest.java | 165 +---
 .../cxf/rs/security/jose/jwa/AbstractJwaTest.java  |  17 +--
 .../rs/security/jose/jwa/CxfDecryptRfcTest.java|   2 +
 .../rs/security/jose/jwa/CxfEncryptRfcTest.java|   3 +
 .../rs/security/jose/jwe/JwaSpecTestCasesTest.java |  43 ++
 .../jose/jwe/JweCompactReaderWriterTest.java   |  18 +--
 .../rs/security/jose/jwe/JweJsonConsumerTest.java  |  22 +--
 .../rs/security/jose/jwe/JweJsonProducerTest.java  |  24 +--
 .../security/jose/jwe/JwePbeHmacAesWrapTest.java   |  13 +-
 .../cxf/rs/security/jose/jwk/JsonWebKeyTest.java   |  66 
 .../cxf/rs/security/jose/jwk/JwkUtilsTest.java |   1 +
 .../jose/jws/JwsCompactReaderWriterTest.java   |  37 ++---
 rt/security-saml/pom.xml   |   6 +
 .../rt/security/crypto/BouncyCastleInstaller.java  |  31 
 .../apache/cxf/rt/security/crypto/CryptoUtils.java |  19 +--
 rt/ws/security/pom.xml |   9 +-
 services/sts/sts-core/pom.xml  |   2 +-
 .../sts/token/provider/JWTTokenProviderTest.java   | 168 ++---
 services/sts/systests/advanced/pom.xml |   5 -
 systests/jaxrs/pom.xml |  11 +-
 systests/kerberos/pom.xml  |   5 -
 systests/ldap/pom.xml  |   5 -
 systests/rs-security/pom.xml   |   5 -
 .../systest/jaxrs/security/jcs/JAXRSJcsTest.java   |  14 +-
 .../security/jose/jwejws/JAXRSJweJsonTest.java |  12 +-
 .../security/jose/jwejws/JAXRSJweJwsTest.java  |  14 +-
 .../security/jose/jwejws/JAXRSJwsJsonTest.java |  14 +-
 .../jose/jwejws/JAXRSJwsMultipartTest.java |  13 --
 .../security/jose/jwejws/JweJwsAlgorithmTest.java  |  15 +-
 .../security/jose/jwejws/JweJwsReferenceTest.java  |  15 +-
 .../jaxrs/security/jose/jwt/JWTAlgorithmTest.java  |  15 +-
 systests/transports/pom.xml|   6 -
 systests/ws-security/pom.xml   |   5 -
 47 files changed, 368 insertions(+), 610 deletions(-)
 copy 
rt/rs/security/jose-parent/jose/src/{main/java/org/apache/cxf/rs/security/jose/common/JoseException.java
 => test/java/org/apache/cxf/rs/security/jose/common/HexUtils.java} (67%)
 delete mode 100644 
rt/security/src/main/java/org/apache/cxf/rt/security/crypto/BouncyCastleInstaller.java



(cxf) branch servlet-6 created (now 19030eac37)

2023-11-03 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a change to branch servlet-6
in repository https://gitbox.apache.org/repos/asf/cxf.git


  at 19030eac37 Update to servlet-api 6.0/Jetty 12/Undertow 2.3

This branch includes the following new commits:

 new 19030eac37 Update to servlet-api 6.0/Jetty 12/Undertow 2.3

The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.




[cxf] branch 3.6.x-fixes updated: [CXF-8940]ensure ws-security.must-understand property can be honoured

2023-10-25 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.6.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.6.x-fixes by this push:
 new f147ec60a0 [CXF-8940]ensure ws-security.must-understand property can 
be honoured
f147ec60a0 is described below

commit f147ec60a0e76ef0acf41e6a631d43d00bd88a74
Author: Freeman Fang 
AuthorDate: Fri Oct 13 17:16:33 2023 -0400

[CXF-8940]ensure ws-security.must-understand property can be honoured

(cherry picked from commit 802dc02039930a92f229497ff0a475c30e36e66b)
---
 .../security/wss4j/AbstractTokenInterceptor.java   |  6 ++-
 .../cxf/systest/ws/ut/UsernameTokenPolicyTest.java | 62 +-
 .../apache/cxf/systest/ws/ut/DoubleItUtPolicy.wsdl |  3 ++
 .../org/apache/cxf/systest/ws/ut/policy-client.xml | 13 -
 .../org/apache/cxf/systest/ws/ut/policy-server.xml | 12 -
 .../cxf/systest/ws/ut/stax-policy-server.xml   | 13 -
 .../systest/ws/ut/utonly-plaintext-pass-policy.xml | 16 ++
 .../cxf/systest/ws/wssec10/server_authorized.xml   |  2 +-
 8 files changed, 121 insertions(+), 6 deletions(-)

diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractTokenInterceptor.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractTokenInterceptor.java
index 3a563a73f5..742c72be20 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractTokenInterceptor.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractTokenInterceptor.java
@@ -169,7 +169,11 @@ public abstract class AbstractTokenInterceptor extends 
AbstractSoapInterceptor {
 el.setAttributeNS(WSS4JConstants.XMLNS_NS, "xmlns:wsse", 
WSS4JConstants.WSSE_NS);
 
 SoapHeader sh = new SoapHeader(new QName(WSS4JConstants.WSSE_NS, 
"Security"), el);
-sh.setMustUnderstand(true);
+boolean mustUnderstand =
+MessageUtils.getContextualBoolean(
+message, SecurityConstants.MUST_UNDERSTAND, true
+);
+sh.setMustUnderstand(mustUnderstand);
 if (actor != null && actor.length() > 0) {
 sh.setActor(actor);
 }
diff --git 
a/systests/ws-security/src/test/java/org/apache/cxf/systest/ws/ut/UsernameTokenPolicyTest.java
 
b/systests/ws-security/src/test/java/org/apache/cxf/systest/ws/ut/UsernameTokenPolicyTest.java
index 9944b4da57..898eee20e8 100644
--- 
a/systests/ws-security/src/test/java/org/apache/cxf/systest/ws/ut/UsernameTokenPolicyTest.java
+++ 
b/systests/ws-security/src/test/java/org/apache/cxf/systest/ws/ut/UsernameTokenPolicyTest.java
@@ -28,10 +28,21 @@ import javax.xml.ws.Service;
 
 import org.apache.cxf.Bus;
 import org.apache.cxf.BusFactory;
+import org.apache.cxf.binding.soap.SoapHeader;
+import org.apache.cxf.binding.soap.SoapMessage;
+import org.apache.cxf.binding.soap.interceptor.AbstractSoapInterceptor;
+import 
org.apache.cxf.binding.soap.interceptor.SoapOutInterceptor.SoapOutEndingInterceptor;
 import org.apache.cxf.bus.spring.SpringBusFactory;
+import org.apache.cxf.endpoint.Client;
+import org.apache.cxf.ext.logging.LoggingOutInterceptor;
+import org.apache.cxf.frontend.ClientProxy;
+import org.apache.cxf.interceptor.Fault;
+import org.apache.cxf.message.MessageUtils;
+import org.apache.cxf.phase.Phase;
 import org.apache.cxf.systest.ws.common.SecurityTestUtil;
 import org.apache.cxf.systest.ws.common.TestParam;
 import org.apache.cxf.testutil.common.AbstractBusClientServerTestBase;
+import org.apache.cxf.ws.security.SecurityConstants;
 import org.example.contract.doubleit.DoubleItPortType;
 
 import org.junit.BeforeClass;
@@ -195,6 +206,33 @@ public class UsernameTokenPolicyTest extends 
AbstractBusClientServerTestBase {
 ((java.io.Closeable)port).close();
 bus.shutdown(true);
 }
+
+@org.junit.Test
+public void testOnlyHasUsernameTokenWithoutMustUnderstand() throws 
Exception {
+
+SpringBusFactory bf = new SpringBusFactory();
+URL busFile = 
UsernameTokenPolicyTest.class.getResource("policy-client.xml");
+
+Bus bus = bf.createBus(busFile.toString());
+BusFactory.setDefaultBus(bus);
+BusFactory.setThreadDefaultBus(bus);
+
+URL wsdl = 
UsernameTokenPolicyTest.class.getResource("DoubleItUtPolicy.wsdl");
+Service service = Service.create(wsdl, SERVICE_QNAME);
+QName portQName = new QName(NAMESPACE, "DoubleItPlaintextPort4");
+DoubleItPortType port =
+service.getPort(portQName, DoubleItPortType.class);
+updateAddressPort(port, test.getPort());
+Client client = ClientProxy.getClient(port);
+client.getRequestContext().put(SecurityConstants.MUST_UNDERSTAND, 
false);
+client.getOutInterceptors().add(new CheckMustUnderstandHeader());
+

[cxf] branch main updated: [CXF-8940]ensure ws-security.must-understand property can be honoured

2023-10-25 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/main by this push:
 new 802dc02039 [CXF-8940]ensure ws-security.must-understand property can 
be honoured
 new e8cc4610d6 Merge pull request #1473 from ffang/CXF-8940
802dc02039 is described below

commit 802dc02039930a92f229497ff0a475c30e36e66b
Author: Freeman Fang 
AuthorDate: Fri Oct 13 17:16:33 2023 -0400

[CXF-8940]ensure ws-security.must-understand property can be honoured
---
 .../security/wss4j/AbstractTokenInterceptor.java   |  6 ++-
 .../cxf/systest/ws/ut/UsernameTokenPolicyTest.java | 62 +-
 .../apache/cxf/systest/ws/ut/DoubleItUtPolicy.wsdl |  3 ++
 .../org/apache/cxf/systest/ws/ut/policy-client.xml | 13 -
 .../org/apache/cxf/systest/ws/ut/policy-server.xml | 12 -
 .../cxf/systest/ws/ut/stax-policy-server.xml   | 13 -
 .../systest/ws/ut/utonly-plaintext-pass-policy.xml | 16 ++
 .../cxf/systest/ws/wssec10/server_authorized.xml   |  2 +-
 8 files changed, 121 insertions(+), 6 deletions(-)

diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractTokenInterceptor.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractTokenInterceptor.java
index 3a563a73f5..742c72be20 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractTokenInterceptor.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractTokenInterceptor.java
@@ -169,7 +169,11 @@ public abstract class AbstractTokenInterceptor extends 
AbstractSoapInterceptor {
 el.setAttributeNS(WSS4JConstants.XMLNS_NS, "xmlns:wsse", 
WSS4JConstants.WSSE_NS);
 
 SoapHeader sh = new SoapHeader(new QName(WSS4JConstants.WSSE_NS, 
"Security"), el);
-sh.setMustUnderstand(true);
+boolean mustUnderstand =
+MessageUtils.getContextualBoolean(
+message, SecurityConstants.MUST_UNDERSTAND, true
+);
+sh.setMustUnderstand(mustUnderstand);
 if (actor != null && actor.length() > 0) {
 sh.setActor(actor);
 }
diff --git 
a/systests/ws-security/src/test/java/org/apache/cxf/systest/ws/ut/UsernameTokenPolicyTest.java
 
b/systests/ws-security/src/test/java/org/apache/cxf/systest/ws/ut/UsernameTokenPolicyTest.java
index 00e9b9639a..f990946bcd 100644
--- 
a/systests/ws-security/src/test/java/org/apache/cxf/systest/ws/ut/UsernameTokenPolicyTest.java
+++ 
b/systests/ws-security/src/test/java/org/apache/cxf/systest/ws/ut/UsernameTokenPolicyTest.java
@@ -28,10 +28,21 @@ import javax.xml.namespace.QName;
 import jakarta.xml.ws.Service;
 import org.apache.cxf.Bus;
 import org.apache.cxf.BusFactory;
+import org.apache.cxf.binding.soap.SoapHeader;
+import org.apache.cxf.binding.soap.SoapMessage;
+import org.apache.cxf.binding.soap.interceptor.AbstractSoapInterceptor;
+import 
org.apache.cxf.binding.soap.interceptor.SoapOutInterceptor.SoapOutEndingInterceptor;
 import org.apache.cxf.bus.spring.SpringBusFactory;
+import org.apache.cxf.endpoint.Client;
+import org.apache.cxf.ext.logging.LoggingOutInterceptor;
+import org.apache.cxf.frontend.ClientProxy;
+import org.apache.cxf.interceptor.Fault;
+import org.apache.cxf.message.MessageUtils;
+import org.apache.cxf.phase.Phase;
 import org.apache.cxf.systest.ws.common.SecurityTestUtil;
 import org.apache.cxf.systest.ws.common.TestParam;
 import org.apache.cxf.testutil.common.AbstractBusClientServerTestBase;
+import org.apache.cxf.ws.security.SecurityConstants;
 import org.example.contract.doubleit.DoubleItPortType;
 
 import org.junit.BeforeClass;
@@ -195,6 +206,33 @@ public class UsernameTokenPolicyTest extends 
AbstractBusClientServerTestBase {
 ((java.io.Closeable)port).close();
 bus.shutdown(true);
 }
+
+@org.junit.Test
+public void testOnlyHasUsernameTokenWithoutMustUnderstand() throws 
Exception {
+
+SpringBusFactory bf = new SpringBusFactory();
+URL busFile = 
UsernameTokenPolicyTest.class.getResource("policy-client.xml");
+
+Bus bus = bf.createBus(busFile.toString());
+BusFactory.setDefaultBus(bus);
+BusFactory.setThreadDefaultBus(bus);
+
+URL wsdl = 
UsernameTokenPolicyTest.class.getResource("DoubleItUtPolicy.wsdl");
+Service service = Service.create(wsdl, SERVICE_QNAME);
+QName portQName = new QName(NAMESPACE, "DoubleItPlaintextPort4");
+DoubleItPortType port =
+service.getPort(portQName, DoubleItPortType.class);
+updateAddressPort(port, test.getPort());
+Client client = ClientProxy.getClient(port);
+client.getRequestContext().put(SecurityConstants.MUST_UNDERSTAND, 
false);
+client.getOutInterceptors().add(new CheckMustUnderstandHeader());
+

[cxf] branch main updated: [CXF-8948]wsdlto tool should throw exception when bindingFiles is invalid

2023-10-23 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/main by this push:
 new 3fda9e5c56 [CXF-8948]wsdlto tool should throw exception when 
bindingFiles is invalid
3fda9e5c56 is described below

commit 3fda9e5c5695fa6a715660e99e8973250f64404b
Author: Freeman Fang 
AuthorDate: Mon Oct 23 14:35:13 2023 -0400

[CXF-8948]wsdlto tool should throw exception when bindingFiles is invalid
---
 .../tools/wsdlto/frontend/jaxws/customization/CustomizationParser.java | 3 +++
 .../cxf/tools/wsdlto/frontend/jaxws/customization/Messages.properties  | 1 +
 2 files changed, 4 insertions(+)

diff --git 
a/tools/wsdlto/frontend/jaxws/src/main/java/org/apache/cxf/tools/wsdlto/frontend/jaxws/customization/CustomizationParser.java
 
b/tools/wsdlto/frontend/jaxws/src/main/java/org/apache/cxf/tools/wsdlto/frontend/jaxws/customization/CustomizationParser.java
index 940085d888..9fe8a3620f 100644
--- 
a/tools/wsdlto/frontend/jaxws/src/main/java/org/apache/cxf/tools/wsdlto/frontend/jaxws/customization/CustomizationParser.java
+++ 
b/tools/wsdlto/frontend/jaxws/src/main/java/org/apache/cxf/tools/wsdlto/frontend/jaxws/customization/CustomizationParser.java
@@ -535,6 +535,9 @@ public final class CustomizationParser {
 } else {
 jaxbBindings.add(new InputSource(bindingFile));
 }
+} else {
+Message msg = new Message("INVALID_BINDING_FILE", LOG);
+throw new ToolException(msg);
 }
 }
 
diff --git 
a/tools/wsdlto/frontend/jaxws/src/main/java/org/apache/cxf/tools/wsdlto/frontend/jaxws/customization/Messages.properties
 
b/tools/wsdlto/frontend/jaxws/src/main/java/org/apache/cxf/tools/wsdlto/frontend/jaxws/customization/Messages.properties
index 5f78ab391b..d9889f15f8 100644
--- 
a/tools/wsdlto/frontend/jaxws/src/main/java/org/apache/cxf/tools/wsdlto/frontend/jaxws/customization/Messages.properties
+++ 
b/tools/wsdlto/frontend/jaxws/src/main/java/org/apache/cxf/tools/wsdlto/frontend/jaxws/customization/Messages.properties
@@ -34,3 +34,4 @@ FAILED_RESOLVE_CATALOG = Failed to resolve catalog {0}
 MISSING_WSDL = Unable to read {0}.
 OLD_JAXWS_NAMESPACE = Old JAXWS binding file namespace 
\"https://java.sun.com/xml/ns/jaxws\; is used.This binding file will be 
ignored. Please use \"https://jakarta.ee/xml/ns/jaxws\; instead
 OLD_JAXB_NAMESPACE = Old JAXB binding file namespace 
\"https://java.sun.com/xml/ns/jaxb\; is used.This binding file will be ignored. 
Please use \"https://jakarta.ee/xml/ns/jaxb\; instead
+INVALID_BINDING_FILE = Not a valid jaxb or jaxws binding file, please check 
the namespace



[cxf] branch main updated: [CXF-8880]print warning message if old jaxws/jaxb binding namespace is used other than ignoring the binding file silently

2023-06-01 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/main by this push:
 new 6266242cb5 [CXF-8880]print warning message if old jaxws/jaxb binding 
namespace is used other than ignoring the binding file silently
6266242cb5 is described below

commit 6266242cb5e720efdd0add51842ea953376494f9
Author: Freeman Fang 
AuthorDate: Thu Jun 1 11:28:11 2023 -0400

[CXF-8880]print warning message if old jaxws/jaxb binding namespace is used 
other than ignoring the binding file silently
---
 .../org/apache/cxf/tools/common/ToolConstants.java |  4 ++
 .../jaxws/customization/CustomizationParser.java   | 43 --
 .../jaxws/customization/Messages.properties|  2 +
 3 files changed, 37 insertions(+), 12 deletions(-)

diff --git 
a/tools/common/src/main/java/org/apache/cxf/tools/common/ToolConstants.java 
b/tools/common/src/main/java/org/apache/cxf/tools/common/ToolConstants.java
index e050aec896..d1d1613bd7 100644
--- a/tools/common/src/main/java/org/apache/cxf/tools/common/ToolConstants.java
+++ b/tools/common/src/main/java/org/apache/cxf/tools/common/ToolConstants.java
@@ -171,9 +171,13 @@ public final class ToolConstants {
 
 // Binding namespace
 public static final String NS_JAXWS_BINDINGS = 
"https://jakarta.ee/xml/ns/jaxws;;
+public static final String OLD_NS_JAXWS_BINDINGS = 
"https://java.sun.com/xml/ns/jaxws;;
 public static final String NS_JAXB_BINDINGS = 
"https://jakarta.ee/xml/ns/jaxb;;
+public static final String OLD_NS_JAXB_BINDINGS = 
"https://java.sun.com/xml/ns/jaxb;;
 public static final QName  JAXWS_BINDINGS = new QName(NS_JAXWS_BINDINGS, 
"bindings");
+public static final QName  OLD_JAXWS_BINDINGS = new 
QName(OLD_NS_JAXWS_BINDINGS, "bindings");
 public static final QName  JAXB_BINDINGS = new QName(NS_JAXB_BINDINGS, 
"bindings");
+public static final QName  OLD_JAXB_BINDINGS = new 
QName(OLD_NS_JAXB_BINDINGS, "bindings");
 public static final QName SCHEMA = new QName(SCHEMA_URI, "schema");
 public static final String JAXWS_BINDINGS_WSDL_LOCATION = "wsdlLocation";
 public static final String JAXWS_BINDING_NODE = "node";
diff --git 
a/tools/wsdlto/frontend/jaxws/src/main/java/org/apache/cxf/tools/wsdlto/frontend/jaxws/customization/CustomizationParser.java
 
b/tools/wsdlto/frontend/jaxws/src/main/java/org/apache/cxf/tools/wsdlto/frontend/jaxws/customization/CustomizationParser.java
index fbed951e8f..173dd10926 100644
--- 
a/tools/wsdlto/frontend/jaxws/src/main/java/org/apache/cxf/tools/wsdlto/frontend/jaxws/customization/CustomizationParser.java
+++ 
b/tools/wsdlto/frontend/jaxws/src/main/java/org/apache/cxf/tools/wsdlto/frontend/jaxws/customization/CustomizationParser.java
@@ -30,17 +30,6 @@ import java.util.List;
 import java.util.Map;
 import java.util.logging.Logger;
 
-import javax.xml.XMLConstants;
-import javax.xml.stream.XMLStreamException;
-import javax.xml.stream.XMLStreamReader;
-
-import org.w3c.dom.Attr;
-import org.w3c.dom.Document;
-import org.w3c.dom.Element;
-import org.w3c.dom.NamedNodeMap;
-import org.w3c.dom.Node;
-import org.w3c.dom.NodeList;
-
 import org.xml.sax.InputSource;
 
 import org.apache.cxf.Bus;
@@ -59,6 +48,16 @@ import org.apache.cxf.tools.common.ToolConstants;
 import org.apache.cxf.tools.common.ToolContext;
 import org.apache.cxf.tools.common.ToolException;
 import 
org.apache.cxf.tools.wsdlto.frontend.jaxws.processor.internal.ProcessorUtil;
+import org.w3c.dom.Attr;
+import org.w3c.dom.Document;
+import org.w3c.dom.Element;
+import org.w3c.dom.NamedNodeMap;
+import org.w3c.dom.Node;
+import org.w3c.dom.NodeList;
+
+import javax.xml.XMLConstants;
+import javax.xml.stream.XMLStreamException;
+import javax.xml.stream.XMLStreamReader;
 
 public final class CustomizationParser {
 // For WSDL1.1
@@ -342,6 +341,9 @@ public final class CustomizationParser {
 }
 
 protected void internalizeBinding(Element bindings, Element targetNode, 
String expression) {
+if (isOldJAXWSBindings(bindings)) {
+LOG.warning(new Message("OLD_JAXWS_NAMESPACE", LOG).toString());
+}
 if (bindings.getAttributeNode("wsdlLocation") != null) {
 expression = "/";
 }
@@ -489,6 +491,7 @@ public final class CustomizationParser {
 }
 XMLStreamReader reader = StaxUtils.createXMLStreamReader(root);
 StaxUtils.toNextTag(reader);
+
 if (isValidJaxwsBindingFile(bindingFile, reader)) {
 
 String wsdlLocation = root.getAttribute("wsdlLocation");
@@ -589,14 +592,24 @@ public final class CustomizationParser {
 }
 
 private boolean isValidJaxbBindingFile(XMLStreamReader reader) {
+if (ToolConstants.OLD_JAXB_BINDINGS.

[cxf] branch main updated: [CXF-8766]avoid NPE warning message by removing tryOSGI

2022-11-25 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/main by this push:
 new f8d9f35ba6 [CXF-8766]avoid NPE warning message by removing tryOSGI
f8d9f35ba6 is described below

commit f8d9f35ba6986a13fb65eadd50b701b7cbf70113
Author: Freeman Fang 
AuthorDate: Fri Nov 25 10:30:55 2022 -0500

[CXF-8766]avoid NPE warning message by removing tryOSGI
---
 core/src/main/java/org/apache/cxf/bus/spring/SpringBeanLocator.java | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git 
a/core/src/main/java/org/apache/cxf/bus/spring/SpringBeanLocator.java 
b/core/src/main/java/org/apache/cxf/bus/spring/SpringBeanLocator.java
index e1a15e85c7..61f5d38f3f 100644
--- a/core/src/main/java/org/apache/cxf/bus/spring/SpringBeanLocator.java
+++ b/core/src/main/java/org/apache/cxf/bus/spring/SpringBeanLocator.java
@@ -152,9 +152,10 @@ public class SpringBeanLocator implements 
ConfiguredBeanLocator {
 lst.add(type.cast(context.getBean(n, type)));
 }
 lst.addAll(orig.getBeansOfType(type));
-if (lst.isEmpty()) {
+//TODO: [OSGi+Jakarta] Uncomment this when osgi comes back
+/*if (lst.isEmpty()) {
 tryOSGI(lst, type);
-}
+}*/
 return lst;
 }
 private  void tryOSGI(Collection lst, Class type) {



[cxf] branch 3.4.x-fixes updated: [CXF-8647]add DisallowedMethodsHandler for cxf http-undertow transport

2022-01-27 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.4.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.4.x-fixes by this push:
 new 45a23f7  [CXF-8647]add DisallowedMethodsHandler for cxf http-undertow 
transport
45a23f7 is described below

commit 45a23f77c35892b6e771df7836fb90388d215137
Author: Freeman Fang 
AuthorDate: Thu Jan 27 16:08:23 2022 -0500

[CXF-8647]add DisallowedMethodsHandler for cxf http-undertow transport

(cherry picked from commit 445fd07abc572f110d08c1172a5bda5e305f942c)
(cherry picked from commit d72504360419f605619fcf7d62cb7b5ea3e19fa0)
---
 .../handlers/CxfDisallowedMethodsHandler.java  | 80 ++
 .../http_undertow/UndertowBasicAuthServer.java | 10 +++
 .../http_undertow/UndertowBasicAuthTest.java   | 22 ++
 .../http_undertow/undertowBasicAuthServer.xml  | 12 
 4 files changed, 124 insertions(+)

diff --git 
a/rt/transports/http-undertow/src/main/java/org/apache/cxf/transport/http_undertow/handlers/CxfDisallowedMethodsHandler.java
 
b/rt/transports/http-undertow/src/main/java/org/apache/cxf/transport/http_undertow/handlers/CxfDisallowedMethodsHandler.java
new file mode 100644
index 000..77620f1
--- /dev/null
+++ 
b/rt/transports/http-undertow/src/main/java/org/apache/cxf/transport/http_undertow/handlers/CxfDisallowedMethodsHandler.java
@@ -0,0 +1,80 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+package org.apache.cxf.transport.http_undertow.handlers;
+
+import org.apache.cxf.transport.http_undertow.CXFUndertowHttpHandler;
+
+import io.undertow.server.HttpHandler;
+import io.undertow.server.HttpServerExchange;
+import io.undertow.server.handlers.DisallowedMethodsHandler;
+import io.undertow.util.HttpString;
+
+public class CxfDisallowedMethodsHandler implements CXFUndertowHttpHandler {
+
+private HttpHandler next;
+private DisallowedMethodsHandler buildDisallowedMethodHandler;
+private String[] methods; 
+
+
+public CxfDisallowedMethodsHandler(String[] methods) {
+this.setMethods(methods);
+}
+
+
+@Override
+public void handleRequest(HttpServerExchange exchange) throws Exception {
+
+if (buildDisallowedMethodHandler == null) {
+buildDisallowedMethodHandler();
+}
+this.buildDisallowedMethodHandler.handleRequest(exchange);
+}
+
+@Override
+public void setNext(HttpHandler nextHandler) {
+this.next = nextHandler;
+
+}
+
+private void buildDisallowedMethodHandler() {
+HttpString[] strings = new HttpString[methods.length];
+for (int i = 0; i < methods.length; ++i) {
+strings[i] = new HttpString(methods[i]);
+}
+
+HttpHandler handler = this.next;
+this.buildDisallowedMethodHandler = 
+new DisallowedMethodsHandler(handler, strings);
+
+}
+
+
+public String[] getMethods() {
+return methods;
+}
+
+
+public void setMethods(String[] methods) {
+this.methods = methods;
+}
+
+
+
+}
+
diff --git 
a/systests/transport-undertow/src/test/java/org/apache/cxf/systest/http_undertow/UndertowBasicAuthServer.java
 
b/systests/transport-undertow/src/test/java/org/apache/cxf/systest/http_undertow/UndertowBasicAuthServer.java
index 7db5b5f..7254027 100644
--- 
a/systests/transport-undertow/src/test/java/org/apache/cxf/systest/http_undertow/UndertowBasicAuthServer.java
+++ 
b/systests/transport-undertow/src/test/java/org/apache/cxf/systest/http_undertow/UndertowBasicAuthServer.java
@@ -30,13 +30,18 @@ import org.apache.cxf.bus.spring.SpringBusFactory;
 import org.apache.cxf.ext.logging.LoggingInInterceptor;
 import org.apache.cxf.ext.logging.LoggingOutInterceptor;
 import org.apache.cxf.testutil.common.AbstractBusTestServerBase;
+import org.apache.cxf.testutil.common.TestUtil;
 
 
 public class UndertowBasicAuthServer extends AbstractBusTestServerBase  {
 static final String PORT = allocatePort(UndertowBasicAuthServer.class);
 static final String ADDRESS = "http://localhost:; + PO

[cxf] branch master updated: [CXF-8647]add DisallowedMethodsHandler for cxf http-undertow transport

2022-01-27 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/master by this push:
 new 445fd07  [CXF-8647]add DisallowedMethodsHandler for cxf http-undertow 
transport
445fd07 is described below

commit 445fd07abc572f110d08c1172a5bda5e305f942c
Author: Freeman Fang 
AuthorDate: Thu Jan 27 16:08:23 2022 -0500

[CXF-8647]add DisallowedMethodsHandler for cxf http-undertow transport
---
 .../handlers/CxfDisallowedMethodsHandler.java  | 80 ++
 .../http_undertow/UndertowBasicAuthServer.java | 10 +++
 .../http_undertow/UndertowBasicAuthTest.java   | 22 ++
 .../http_undertow/undertowBasicAuthServer.xml  | 12 
 4 files changed, 124 insertions(+)

diff --git 
a/rt/transports/http-undertow/src/main/java/org/apache/cxf/transport/http_undertow/handlers/CxfDisallowedMethodsHandler.java
 
b/rt/transports/http-undertow/src/main/java/org/apache/cxf/transport/http_undertow/handlers/CxfDisallowedMethodsHandler.java
new file mode 100644
index 000..77620f1
--- /dev/null
+++ 
b/rt/transports/http-undertow/src/main/java/org/apache/cxf/transport/http_undertow/handlers/CxfDisallowedMethodsHandler.java
@@ -0,0 +1,80 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+package org.apache.cxf.transport.http_undertow.handlers;
+
+import org.apache.cxf.transport.http_undertow.CXFUndertowHttpHandler;
+
+import io.undertow.server.HttpHandler;
+import io.undertow.server.HttpServerExchange;
+import io.undertow.server.handlers.DisallowedMethodsHandler;
+import io.undertow.util.HttpString;
+
+public class CxfDisallowedMethodsHandler implements CXFUndertowHttpHandler {
+
+private HttpHandler next;
+private DisallowedMethodsHandler buildDisallowedMethodHandler;
+private String[] methods; 
+
+
+public CxfDisallowedMethodsHandler(String[] methods) {
+this.setMethods(methods);
+}
+
+
+@Override
+public void handleRequest(HttpServerExchange exchange) throws Exception {
+
+if (buildDisallowedMethodHandler == null) {
+buildDisallowedMethodHandler();
+}
+this.buildDisallowedMethodHandler.handleRequest(exchange);
+}
+
+@Override
+public void setNext(HttpHandler nextHandler) {
+this.next = nextHandler;
+
+}
+
+private void buildDisallowedMethodHandler() {
+HttpString[] strings = new HttpString[methods.length];
+for (int i = 0; i < methods.length; ++i) {
+strings[i] = new HttpString(methods[i]);
+}
+
+HttpHandler handler = this.next;
+this.buildDisallowedMethodHandler = 
+new DisallowedMethodsHandler(handler, strings);
+
+}
+
+
+public String[] getMethods() {
+return methods;
+}
+
+
+public void setMethods(String[] methods) {
+this.methods = methods;
+}
+
+
+
+}
+
diff --git 
a/systests/transport-undertow/src/test/java/org/apache/cxf/systest/http_undertow/UndertowBasicAuthServer.java
 
b/systests/transport-undertow/src/test/java/org/apache/cxf/systest/http_undertow/UndertowBasicAuthServer.java
index 7db5b5f..7254027 100644
--- 
a/systests/transport-undertow/src/test/java/org/apache/cxf/systest/http_undertow/UndertowBasicAuthServer.java
+++ 
b/systests/transport-undertow/src/test/java/org/apache/cxf/systest/http_undertow/UndertowBasicAuthServer.java
@@ -30,13 +30,18 @@ import org.apache.cxf.bus.spring.SpringBusFactory;
 import org.apache.cxf.ext.logging.LoggingInInterceptor;
 import org.apache.cxf.ext.logging.LoggingOutInterceptor;
 import org.apache.cxf.testutil.common.AbstractBusTestServerBase;
+import org.apache.cxf.testutil.common.TestUtil;
 
 
 public class UndertowBasicAuthServer extends AbstractBusTestServerBase  {
 static final String PORT = allocatePort(UndertowBasicAuthServer.class);
 static final String ADDRESS = "http://localhost:; + PORT + 
"/SoapContext/SoapPort";
+
+static final String PORT1 = 
TestUtil.getPortNumber("UndertowBasicAuthServer1");
+static fin

[cxf] branch 3.5.x-fixes updated: [CXF-8647]add DisallowedMethodsHandler for cxf http-undertow transport

2022-01-27 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.5.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.5.x-fixes by this push:
 new d725043  [CXF-8647]add DisallowedMethodsHandler for cxf http-undertow 
transport
d725043 is described below

commit d72504360419f605619fcf7d62cb7b5ea3e19fa0
Author: Freeman Fang 
AuthorDate: Thu Jan 27 16:08:23 2022 -0500

[CXF-8647]add DisallowedMethodsHandler for cxf http-undertow transport

(cherry picked from commit 445fd07abc572f110d08c1172a5bda5e305f942c)
---
 .../handlers/CxfDisallowedMethodsHandler.java  | 80 ++
 .../http_undertow/UndertowBasicAuthServer.java | 10 +++
 .../http_undertow/UndertowBasicAuthTest.java   | 22 ++
 .../http_undertow/undertowBasicAuthServer.xml  | 12 
 4 files changed, 124 insertions(+)

diff --git 
a/rt/transports/http-undertow/src/main/java/org/apache/cxf/transport/http_undertow/handlers/CxfDisallowedMethodsHandler.java
 
b/rt/transports/http-undertow/src/main/java/org/apache/cxf/transport/http_undertow/handlers/CxfDisallowedMethodsHandler.java
new file mode 100644
index 000..77620f1
--- /dev/null
+++ 
b/rt/transports/http-undertow/src/main/java/org/apache/cxf/transport/http_undertow/handlers/CxfDisallowedMethodsHandler.java
@@ -0,0 +1,80 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+package org.apache.cxf.transport.http_undertow.handlers;
+
+import org.apache.cxf.transport.http_undertow.CXFUndertowHttpHandler;
+
+import io.undertow.server.HttpHandler;
+import io.undertow.server.HttpServerExchange;
+import io.undertow.server.handlers.DisallowedMethodsHandler;
+import io.undertow.util.HttpString;
+
+public class CxfDisallowedMethodsHandler implements CXFUndertowHttpHandler {
+
+private HttpHandler next;
+private DisallowedMethodsHandler buildDisallowedMethodHandler;
+private String[] methods; 
+
+
+public CxfDisallowedMethodsHandler(String[] methods) {
+this.setMethods(methods);
+}
+
+
+@Override
+public void handleRequest(HttpServerExchange exchange) throws Exception {
+
+if (buildDisallowedMethodHandler == null) {
+buildDisallowedMethodHandler();
+}
+this.buildDisallowedMethodHandler.handleRequest(exchange);
+}
+
+@Override
+public void setNext(HttpHandler nextHandler) {
+this.next = nextHandler;
+
+}
+
+private void buildDisallowedMethodHandler() {
+HttpString[] strings = new HttpString[methods.length];
+for (int i = 0; i < methods.length; ++i) {
+strings[i] = new HttpString(methods[i]);
+}
+
+HttpHandler handler = this.next;
+this.buildDisallowedMethodHandler = 
+new DisallowedMethodsHandler(handler, strings);
+
+}
+
+
+public String[] getMethods() {
+return methods;
+}
+
+
+public void setMethods(String[] methods) {
+this.methods = methods;
+}
+
+
+
+}
+
diff --git 
a/systests/transport-undertow/src/test/java/org/apache/cxf/systest/http_undertow/UndertowBasicAuthServer.java
 
b/systests/transport-undertow/src/test/java/org/apache/cxf/systest/http_undertow/UndertowBasicAuthServer.java
index 7db5b5f..7254027 100644
--- 
a/systests/transport-undertow/src/test/java/org/apache/cxf/systest/http_undertow/UndertowBasicAuthServer.java
+++ 
b/systests/transport-undertow/src/test/java/org/apache/cxf/systest/http_undertow/UndertowBasicAuthServer.java
@@ -30,13 +30,18 @@ import org.apache.cxf.bus.spring.SpringBusFactory;
 import org.apache.cxf.ext.logging.LoggingInInterceptor;
 import org.apache.cxf.ext.logging.LoggingOutInterceptor;
 import org.apache.cxf.testutil.common.AbstractBusTestServerBase;
+import org.apache.cxf.testutil.common.TestUtil;
 
 
 public class UndertowBasicAuthServer extends AbstractBusTestServerBase  {
 static final String PORT = allocatePort(UndertowBasicAuthServer.class);
 static final String ADDRESS = "http://localhost:; + PORT + 
"/SoapContext/SoapPort";
+
+static final 

[cxf] branch 3.4.x-fixes updated: [CXF-8644]introduce a cache for AbstractJAXBProvider to avoid unnecessary ObjectFactory.class|jaxb.index availability check

2022-01-25 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.4.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.4.x-fixes by this push:
 new 6d7cb14  [CXF-8644]introduce a cache for AbstractJAXBProvider to avoid 
unnecessary ObjectFactory.class|jaxb.index availability check
6d7cb14 is described below

commit 6d7cb14fffe9a6e310ad39578e1f671a378ebf98
Author: Freeman Fang 
AuthorDate: Tue Jan 25 10:47:02 2022 -0500

[CXF-8644]introduce a cache for AbstractJAXBProvider to avoid unnecessary 
ObjectFactory.class|jaxb.index availability check

(cherry picked from commit 02c81854625e2e362e66b4af41f53341df4c4fb7)
(cherry picked from commit 0fbafc05632f475a4080f6c0c1da44f60f7f72ea)
---
 .../org/apache/cxf/jaxrs/provider/AbstractJAXBProvider.java   | 11 ++-
 1 file changed, 10 insertions(+), 1 deletion(-)

diff --git 
a/rt/frontend/jaxrs/src/main/java/org/apache/cxf/jaxrs/provider/AbstractJAXBProvider.java
 
b/rt/frontend/jaxrs/src/main/java/org/apache/cxf/jaxrs/provider/AbstractJAXBProvider.java
index ff5353d..a273402 100644
--- 
a/rt/frontend/jaxrs/src/main/java/org/apache/cxf/jaxrs/provider/AbstractJAXBProvider.java
+++ 
b/rt/frontend/jaxrs/src/main/java/org/apache/cxf/jaxrs/provider/AbstractJAXBProvider.java
@@ -101,6 +101,7 @@ public abstract class AbstractJAXBProvider extends 
AbstractConfigurableProvid
 protected Set> collectionContextClasses = 
ConcurrentHashMap.newKeySet();
 
 protected Map jaxbElementClassMap = Collections.emptyMap();
+protected Map objectFactoryOrIndexMap = new 
ConcurrentHashMap<>();
 protected boolean unmarshalAsJaxbElement;
 protected boolean marshalAsJaxbElement;
 protected boolean xmlTypeAsJaxbElementOnly;
@@ -594,8 +595,15 @@ public abstract class AbstractJAXBProvider extends 
AbstractConfigurableProvid
 }
 
 protected boolean objectFactoryOrIndexAvailable(Class type) {
-return type.getResource("ObjectFactory.class") != null
+if (this.objectFactoryOrIndexMap.get(type.getName()) != null) {
+return this.objectFactoryOrIndexMap.get(type.getName());
+} else {
+boolean ret = type.getResource("ObjectFactory.class") != null
|| type.getResource("jaxb.index") != null;
+this.objectFactoryOrIndexMap.put(type.getName(), ret);
+return ret;
+}
+
 }
 
 private boolean objectFactoryForType(Type genericType) {
@@ -704,6 +712,7 @@ public abstract class AbstractJAXBProvider extends 
AbstractConfigurableProvid
 public void clearContexts() {
 classContexts.clear();
 packageContexts.clear();
+objectFactoryOrIndexMap.clear();
 }
 
 //TODO: move these methods into the dedicated utility class


[cxf] branch 3.5.x-fixes updated: [CXF-8644]introduce a cache for AbstractJAXBProvider to avoid unnecessary ObjectFactory.class|jaxb.index availability check

2022-01-25 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.5.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.5.x-fixes by this push:
 new 0fbafc0  [CXF-8644]introduce a cache for AbstractJAXBProvider to avoid 
unnecessary ObjectFactory.class|jaxb.index availability check
0fbafc0 is described below

commit 0fbafc05632f475a4080f6c0c1da44f60f7f72ea
Author: Freeman Fang 
AuthorDate: Tue Jan 25 10:47:02 2022 -0500

[CXF-8644]introduce a cache for AbstractJAXBProvider to avoid unnecessary 
ObjectFactory.class|jaxb.index availability check

(cherry picked from commit 02c81854625e2e362e66b4af41f53341df4c4fb7)
---
 .../org/apache/cxf/jaxrs/provider/AbstractJAXBProvider.java   | 11 ++-
 1 file changed, 10 insertions(+), 1 deletion(-)

diff --git 
a/rt/frontend/jaxrs/src/main/java/org/apache/cxf/jaxrs/provider/AbstractJAXBProvider.java
 
b/rt/frontend/jaxrs/src/main/java/org/apache/cxf/jaxrs/provider/AbstractJAXBProvider.java
index f2bee17..5510438 100644
--- 
a/rt/frontend/jaxrs/src/main/java/org/apache/cxf/jaxrs/provider/AbstractJAXBProvider.java
+++ 
b/rt/frontend/jaxrs/src/main/java/org/apache/cxf/jaxrs/provider/AbstractJAXBProvider.java
@@ -101,6 +101,7 @@ public abstract class AbstractJAXBProvider extends 
AbstractConfigurableProvid
 protected Set> collectionContextClasses = 
ConcurrentHashMap.newKeySet();
 
 protected Map jaxbElementClassMap = Collections.emptyMap();
+protected Map objectFactoryOrIndexMap = new 
ConcurrentHashMap<>();
 protected boolean unmarshalAsJaxbElement;
 protected boolean marshalAsJaxbElement;
 protected boolean xmlTypeAsJaxbElementOnly;
@@ -594,8 +595,15 @@ public abstract class AbstractJAXBProvider extends 
AbstractConfigurableProvid
 }
 
 protected boolean objectFactoryOrIndexAvailable(Class type) {
-return type.getResource("ObjectFactory.class") != null
+if (this.objectFactoryOrIndexMap.get(type.getName()) != null) {
+return this.objectFactoryOrIndexMap.get(type.getName());
+} else {
+boolean ret = type.getResource("ObjectFactory.class") != null
|| type.getResource("jaxb.index") != null;
+this.objectFactoryOrIndexMap.put(type.getName(), ret);
+return ret;
+}
+
 }
 
 private boolean objectFactoryForType(Type genericType) {
@@ -704,6 +712,7 @@ public abstract class AbstractJAXBProvider extends 
AbstractConfigurableProvid
 public void clearContexts() {
 classContexts.clear();
 packageContexts.clear();
+objectFactoryOrIndexMap.clear();
 }
 
 //TODO: move these methods into the dedicated utility class


[cxf] branch master updated: [CXF-8644]introduce a cache for AbstractJAXBProvider to avoid unnecessary ObjectFactory.class|jaxb.index availability check

2022-01-25 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/master by this push:
 new 02c8185  [CXF-8644]introduce a cache for AbstractJAXBProvider to avoid 
unnecessary ObjectFactory.class|jaxb.index availability check
02c8185 is described below

commit 02c81854625e2e362e66b4af41f53341df4c4fb7
Author: Freeman Fang 
AuthorDate: Tue Jan 25 10:47:02 2022 -0500

[CXF-8644]introduce a cache for AbstractJAXBProvider to avoid unnecessary 
ObjectFactory.class|jaxb.index availability check
---
 .../org/apache/cxf/jaxrs/provider/AbstractJAXBProvider.java   | 11 ++-
 1 file changed, 10 insertions(+), 1 deletion(-)

diff --git 
a/rt/frontend/jaxrs/src/main/java/org/apache/cxf/jaxrs/provider/AbstractJAXBProvider.java
 
b/rt/frontend/jaxrs/src/main/java/org/apache/cxf/jaxrs/provider/AbstractJAXBProvider.java
index f2bee17..5510438 100644
--- 
a/rt/frontend/jaxrs/src/main/java/org/apache/cxf/jaxrs/provider/AbstractJAXBProvider.java
+++ 
b/rt/frontend/jaxrs/src/main/java/org/apache/cxf/jaxrs/provider/AbstractJAXBProvider.java
@@ -101,6 +101,7 @@ public abstract class AbstractJAXBProvider extends 
AbstractConfigurableProvid
 protected Set> collectionContextClasses = 
ConcurrentHashMap.newKeySet();
 
 protected Map jaxbElementClassMap = Collections.emptyMap();
+protected Map objectFactoryOrIndexMap = new 
ConcurrentHashMap<>();
 protected boolean unmarshalAsJaxbElement;
 protected boolean marshalAsJaxbElement;
 protected boolean xmlTypeAsJaxbElementOnly;
@@ -594,8 +595,15 @@ public abstract class AbstractJAXBProvider extends 
AbstractConfigurableProvid
 }
 
 protected boolean objectFactoryOrIndexAvailable(Class type) {
-return type.getResource("ObjectFactory.class") != null
+if (this.objectFactoryOrIndexMap.get(type.getName()) != null) {
+return this.objectFactoryOrIndexMap.get(type.getName());
+} else {
+boolean ret = type.getResource("ObjectFactory.class") != null
|| type.getResource("jaxb.index") != null;
+this.objectFactoryOrIndexMap.put(type.getName(), ret);
+return ret;
+}
+
 }
 
 private boolean objectFactoryForType(Type genericType) {
@@ -704,6 +712,7 @@ public abstract class AbstractJAXBProvider extends 
AbstractConfigurableProvid
 public void clearContexts() {
 classContexts.clear();
 packageContexts.clear();
+objectFactoryOrIndexMap.clear();
 }
 
 //TODO: move these methods into the dedicated utility class


[cxf] branch 3.4.x-fixes updated: CXF-8641 NPE on NamePasswordCallbackHandler

2022-01-18 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.4.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.4.x-fixes by this push:
 new 098c807  CXF-8641 NPE on NamePasswordCallbackHandler
098c807 is described below

commit 098c80771d9dccac074084995fcbd92921b04f2f
Author: Jan Filipski 
AuthorDate: Tue Jan 18 11:24:32 2022 +0100

CXF-8641
NPE on NamePasswordCallbackHandler

(cherry picked from commit b4f45e7ece7d5f6bdda6df6284decbccc00817af)
(cherry picked from commit 299a294adbeb413f76edc0686c00df0096f00085)
---
 .../security/NameDigestPasswordCallbackHandler.java   |  2 +-
 .../cxf/interceptor/security/NamePasswordCallbackHandler.java |  4 ++--
 .../interceptor/security/NamePasswordCallbackHandlerTest.java | 11 +++
 .../servlet/servicelist/ServiceListJAASAuthenticator.java |  5 +++--
 4 files changed, 17 insertions(+), 5 deletions(-)

diff --git 
a/core/src/main/java/org/apache/cxf/interceptor/security/NameDigestPasswordCallbackHandler.java
 
b/core/src/main/java/org/apache/cxf/interceptor/security/NameDigestPasswordCallbackHandler.java
index a8e242d..97e0563 100644
--- 
a/core/src/main/java/org/apache/cxf/interceptor/security/NameDigestPasswordCallbackHandler.java
+++ 
b/core/src/main/java/org/apache/cxf/interceptor/security/NameDigestPasswordCallbackHandler.java
@@ -72,7 +72,7 @@ public class NameDigestPasswordCallbackHandler implements 
CallbackHandler {
 ((NameCallback) callback).setName(username);
 } else if (callback instanceof PasswordCallback) {
 PasswordCallback pwCallback = (PasswordCallback) callback;
-pwCallback.setPassword(password.toCharArray());
+pwCallback.setPassword(password == null ? null : 
password.toCharArray());
 } else if (!invokePasswordCallback(callback)) {
 org.apache.cxf.common.i18n.Message errorMsg =
 new 
org.apache.cxf.common.i18n.Message("UNSUPPORTED_CALLBACK_TYPE",
diff --git 
a/core/src/main/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandler.java
 
b/core/src/main/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandler.java
index a5c7e81..c66bc72 100644
--- 
a/core/src/main/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandler.java
+++ 
b/core/src/main/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandler.java
@@ -64,7 +64,7 @@ public class NamePasswordCallbackHandler implements 
CallbackHandler {
 ((NameCallback) callback).setName(username);
 } else if (callback instanceof PasswordCallback) {
 PasswordCallback pwCallback = (PasswordCallback) callback;
-pwCallback.setPassword(password.toCharArray());
+pwCallback.setPassword(password == null ? null : 
password.toCharArray());
 } else if (!invokePasswordCallback(callback)) {
 org.apache.cxf.common.i18n.Message errorMsg =
 new 
org.apache.cxf.common.i18n.Message("UNSUPPORTED_CALLBACK_TYPE",
@@ -83,7 +83,7 @@ public class NamePasswordCallbackHandler implements 
CallbackHandler {
 /*
  * This method is called from the handle(Callback[]) method when the 
specified callback
  * did not match any of the known callback classes. It looks for the 
callback method
- * having the specified method name with one of the suppported parameter 
types.
+ * having the specified method name with one of the supported parameter 
types.
  * If found, it invokes the callback method on the object and returns true.
  * If not, it returns false.
  */
diff --git 
a/core/src/test/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandlerTest.java
 
b/core/src/test/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandlerTest.java
index ab21a15..047cab4 100755
--- 
a/core/src/test/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandlerTest.java
+++ 
b/core/src/test/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandlerTest.java
@@ -26,6 +26,7 @@ import javax.security.auth.callback.PasswordCallback;
 import org.junit.Test;
 
 import static org.junit.Assert.assertEquals;
+import static org.junit.Assert.assertNull;
 import static org.junit.Assert.assertTrue;
 
 /**
@@ -75,6 +76,16 @@ public class NamePasswordCallbackHandlerTest {
 assertEquals("dog", new 
String(((CharArrayCallback)callbacks[1]).getValue()));
 }
 
+@Test
+public void testHandleCallbackNullPassword() throws Exception {
+NamePasswordCallbackHandler handler = new 
NamePasswordCallbackHandler("Barry", null);
+Callback[] callbacks =
+new Callback[]{new NameCallback("name"), new 
PasswordCallback("password", false)};
+handler.handle(callbac

[cxf] branch 3.5.x-fixes updated: CXF-8641 NPE on NamePasswordCallbackHandler

2022-01-18 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.5.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.5.x-fixes by this push:
 new 299a294  CXF-8641 NPE on NamePasswordCallbackHandler
299a294 is described below

commit 299a294adbeb413f76edc0686c00df0096f00085
Author: Jan Filipski 
AuthorDate: Tue Jan 18 11:24:32 2022 +0100

CXF-8641
NPE on NamePasswordCallbackHandler

(cherry picked from commit b4f45e7ece7d5f6bdda6df6284decbccc00817af)
---
 .../security/NameDigestPasswordCallbackHandler.java   |  2 +-
 .../cxf/interceptor/security/NamePasswordCallbackHandler.java |  4 ++--
 .../interceptor/security/NamePasswordCallbackHandlerTest.java | 11 +++
 .../servlet/servicelist/ServiceListJAASAuthenticator.java |  5 +++--
 4 files changed, 17 insertions(+), 5 deletions(-)

diff --git 
a/core/src/main/java/org/apache/cxf/interceptor/security/NameDigestPasswordCallbackHandler.java
 
b/core/src/main/java/org/apache/cxf/interceptor/security/NameDigestPasswordCallbackHandler.java
index a8e242d..97e0563 100644
--- 
a/core/src/main/java/org/apache/cxf/interceptor/security/NameDigestPasswordCallbackHandler.java
+++ 
b/core/src/main/java/org/apache/cxf/interceptor/security/NameDigestPasswordCallbackHandler.java
@@ -72,7 +72,7 @@ public class NameDigestPasswordCallbackHandler implements 
CallbackHandler {
 ((NameCallback) callback).setName(username);
 } else if (callback instanceof PasswordCallback) {
 PasswordCallback pwCallback = (PasswordCallback) callback;
-pwCallback.setPassword(password.toCharArray());
+pwCallback.setPassword(password == null ? null : 
password.toCharArray());
 } else if (!invokePasswordCallback(callback)) {
 org.apache.cxf.common.i18n.Message errorMsg =
 new 
org.apache.cxf.common.i18n.Message("UNSUPPORTED_CALLBACK_TYPE",
diff --git 
a/core/src/main/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandler.java
 
b/core/src/main/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandler.java
index a5c7e81..c66bc72 100644
--- 
a/core/src/main/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandler.java
+++ 
b/core/src/main/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandler.java
@@ -64,7 +64,7 @@ public class NamePasswordCallbackHandler implements 
CallbackHandler {
 ((NameCallback) callback).setName(username);
 } else if (callback instanceof PasswordCallback) {
 PasswordCallback pwCallback = (PasswordCallback) callback;
-pwCallback.setPassword(password.toCharArray());
+pwCallback.setPassword(password == null ? null : 
password.toCharArray());
 } else if (!invokePasswordCallback(callback)) {
 org.apache.cxf.common.i18n.Message errorMsg =
 new 
org.apache.cxf.common.i18n.Message("UNSUPPORTED_CALLBACK_TYPE",
@@ -83,7 +83,7 @@ public class NamePasswordCallbackHandler implements 
CallbackHandler {
 /*
  * This method is called from the handle(Callback[]) method when the 
specified callback
  * did not match any of the known callback classes. It looks for the 
callback method
- * having the specified method name with one of the suppported parameter 
types.
+ * having the specified method name with one of the supported parameter 
types.
  * If found, it invokes the callback method on the object and returns true.
  * If not, it returns false.
  */
diff --git 
a/core/src/test/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandlerTest.java
 
b/core/src/test/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandlerTest.java
index ab21a15..047cab4 100755
--- 
a/core/src/test/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandlerTest.java
+++ 
b/core/src/test/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandlerTest.java
@@ -26,6 +26,7 @@ import javax.security.auth.callback.PasswordCallback;
 import org.junit.Test;
 
 import static org.junit.Assert.assertEquals;
+import static org.junit.Assert.assertNull;
 import static org.junit.Assert.assertTrue;
 
 /**
@@ -75,6 +76,16 @@ public class NamePasswordCallbackHandlerTest {
 assertEquals("dog", new 
String(((CharArrayCallback)callbacks[1]).getValue()));
 }
 
+@Test
+public void testHandleCallbackNullPassword() throws Exception {
+NamePasswordCallbackHandler handler = new 
NamePasswordCallbackHandler("Barry", null);
+Callback[] callbacks =
+new Callback[]{new NameCallback("name"), new 
PasswordCallback("password", false)};
+handler.handle(callbacks);
+assertEquals("Barry", ((NameCallback)callba

[cxf] branch master updated: CXF-8641 NPE on NamePasswordCallbackHandler

2022-01-18 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/master by this push:
 new b4f45e7  CXF-8641 NPE on NamePasswordCallbackHandler
 new 02886aa  Merge pull request #892 from globalbus/bugfix/CXF-8641
b4f45e7 is described below

commit b4f45e7ece7d5f6bdda6df6284decbccc00817af
Author: Jan Filipski 
AuthorDate: Tue Jan 18 11:24:32 2022 +0100

CXF-8641
NPE on NamePasswordCallbackHandler
---
 .../security/NameDigestPasswordCallbackHandler.java   |  2 +-
 .../cxf/interceptor/security/NamePasswordCallbackHandler.java |  4 ++--
 .../interceptor/security/NamePasswordCallbackHandlerTest.java | 11 +++
 .../servlet/servicelist/ServiceListJAASAuthenticator.java |  5 +++--
 4 files changed, 17 insertions(+), 5 deletions(-)

diff --git 
a/core/src/main/java/org/apache/cxf/interceptor/security/NameDigestPasswordCallbackHandler.java
 
b/core/src/main/java/org/apache/cxf/interceptor/security/NameDigestPasswordCallbackHandler.java
index a8e242d..97e0563 100644
--- 
a/core/src/main/java/org/apache/cxf/interceptor/security/NameDigestPasswordCallbackHandler.java
+++ 
b/core/src/main/java/org/apache/cxf/interceptor/security/NameDigestPasswordCallbackHandler.java
@@ -72,7 +72,7 @@ public class NameDigestPasswordCallbackHandler implements 
CallbackHandler {
 ((NameCallback) callback).setName(username);
 } else if (callback instanceof PasswordCallback) {
 PasswordCallback pwCallback = (PasswordCallback) callback;
-pwCallback.setPassword(password.toCharArray());
+pwCallback.setPassword(password == null ? null : 
password.toCharArray());
 } else if (!invokePasswordCallback(callback)) {
 org.apache.cxf.common.i18n.Message errorMsg =
 new 
org.apache.cxf.common.i18n.Message("UNSUPPORTED_CALLBACK_TYPE",
diff --git 
a/core/src/main/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandler.java
 
b/core/src/main/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandler.java
index a5c7e81..c66bc72 100644
--- 
a/core/src/main/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandler.java
+++ 
b/core/src/main/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandler.java
@@ -64,7 +64,7 @@ public class NamePasswordCallbackHandler implements 
CallbackHandler {
 ((NameCallback) callback).setName(username);
 } else if (callback instanceof PasswordCallback) {
 PasswordCallback pwCallback = (PasswordCallback) callback;
-pwCallback.setPassword(password.toCharArray());
+pwCallback.setPassword(password == null ? null : 
password.toCharArray());
 } else if (!invokePasswordCallback(callback)) {
 org.apache.cxf.common.i18n.Message errorMsg =
 new 
org.apache.cxf.common.i18n.Message("UNSUPPORTED_CALLBACK_TYPE",
@@ -83,7 +83,7 @@ public class NamePasswordCallbackHandler implements 
CallbackHandler {
 /*
  * This method is called from the handle(Callback[]) method when the 
specified callback
  * did not match any of the known callback classes. It looks for the 
callback method
- * having the specified method name with one of the suppported parameter 
types.
+ * having the specified method name with one of the supported parameter 
types.
  * If found, it invokes the callback method on the object and returns true.
  * If not, it returns false.
  */
diff --git 
a/core/src/test/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandlerTest.java
 
b/core/src/test/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandlerTest.java
index ab21a15..047cab4 100755
--- 
a/core/src/test/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandlerTest.java
+++ 
b/core/src/test/java/org/apache/cxf/interceptor/security/NamePasswordCallbackHandlerTest.java
@@ -26,6 +26,7 @@ import javax.security.auth.callback.PasswordCallback;
 import org.junit.Test;
 
 import static org.junit.Assert.assertEquals;
+import static org.junit.Assert.assertNull;
 import static org.junit.Assert.assertTrue;
 
 /**
@@ -75,6 +76,16 @@ public class NamePasswordCallbackHandlerTest {
 assertEquals("dog", new 
String(((CharArrayCallback)callbacks[1]).getValue()));
 }
 
+@Test
+public void testHandleCallbackNullPassword() throws Exception {
+NamePasswordCallbackHandler handler = new 
NamePasswordCallbackHandler("Barry", null);
+Callback[] callbacks =
+new Callback[]{new NameCallback("name"), new 
PasswordCallback("password", false)};
+handler.handle(callbacks);
+assertEquals("Barry", ((NameCallback)callbacks[0]).getNam

[cxf] branch 3.4.x-fixes updated: [CXF-8633]http.responseMessage gets lost in AbstractClient#setResponseBuilder

2021-12-22 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.4.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.4.x-fixes by this push:
 new 8c66020  [CXF-8633]http.responseMessage gets lost in 
AbstractClient#setResponseBuilder
8c66020 is described below

commit 8c6602049325177b0eec2a4b820578f9cf5b550d
Author: Freeman Fang 
AuthorDate: Wed Dec 22 12:38:21 2021 -0500

[CXF-8633]http.responseMessage gets lost in 
AbstractClient#setResponseBuilder

(cherry picked from commit d23ed9dc87481d9a6cabdb2b6a6e086da6fcce24)
(cherry picked from commit 785da366e7a1e5b9bcd6869d0bdb04a4429dae13)
---
 .../src/main/java/org/apache/cxf/jaxrs/client/AbstractClient.java | 8 
 1 file changed, 8 insertions(+)

diff --git 
a/rt/rs/client/src/main/java/org/apache/cxf/jaxrs/client/AbstractClient.java 
b/rt/rs/client/src/main/java/org/apache/cxf/jaxrs/client/AbstractClient.java
index bba3873..123d30f 100644
--- a/rt/rs/client/src/main/java/org/apache/cxf/jaxrs/client/AbstractClient.java
+++ b/rt/rs/client/src/main/java/org/apache/cxf/jaxrs/client/AbstractClient.java
@@ -102,6 +102,7 @@ import org.apache.cxf.phase.PhaseManager;
 import org.apache.cxf.service.Service;
 import org.apache.cxf.service.model.BindingOperationInfo;
 import org.apache.cxf.transport.MessageObserver;
+import org.apache.cxf.transport.http.HTTPConduit;
 
 /**
  * Common proxy and http-centric client implementation
@@ -438,6 +439,12 @@ public abstract class AbstractClient implements Client {
 if (responseMessage == null) {
 return currentResponseBuilder;
 }
+
+String reasonPhrase = (String)MessageUtils.getContextualProperty(
+   responseMessage, HTTPConduit.HTTP_RESPONSE_MESSAGE, null);
+if (reasonPhrase != null) {
+currentResponseBuilder.status(status, reasonPhrase);
+}
 
 Map> protocolHeaders =
 CastUtils.cast((Map)responseMessage.get(Message.PROTOCOL_HEADERS));
@@ -485,6 +492,7 @@ public abstract class AbstractClient implements Client {
 }
 InputStream mStream = responseMessage.getContent(InputStream.class);
 currentResponseBuilder.entity(mStream);
+
 
 return currentResponseBuilder;
 }


[cxf] branch 3.5.x-fixes updated: [CXF-8633]http.responseMessage gets lost in AbstractClient#setResponseBuilder

2021-12-22 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.5.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.5.x-fixes by this push:
 new 785da36  [CXF-8633]http.responseMessage gets lost in 
AbstractClient#setResponseBuilder
785da36 is described below

commit 785da366e7a1e5b9bcd6869d0bdb04a4429dae13
Author: Freeman Fang 
AuthorDate: Wed Dec 22 12:38:21 2021 -0500

[CXF-8633]http.responseMessage gets lost in 
AbstractClient#setResponseBuilder

(cherry picked from commit d23ed9dc87481d9a6cabdb2b6a6e086da6fcce24)
---
 .../src/main/java/org/apache/cxf/jaxrs/client/AbstractClient.java | 8 
 1 file changed, 8 insertions(+)

diff --git 
a/rt/rs/client/src/main/java/org/apache/cxf/jaxrs/client/AbstractClient.java 
b/rt/rs/client/src/main/java/org/apache/cxf/jaxrs/client/AbstractClient.java
index bba3873..123d30f 100644
--- a/rt/rs/client/src/main/java/org/apache/cxf/jaxrs/client/AbstractClient.java
+++ b/rt/rs/client/src/main/java/org/apache/cxf/jaxrs/client/AbstractClient.java
@@ -102,6 +102,7 @@ import org.apache.cxf.phase.PhaseManager;
 import org.apache.cxf.service.Service;
 import org.apache.cxf.service.model.BindingOperationInfo;
 import org.apache.cxf.transport.MessageObserver;
+import org.apache.cxf.transport.http.HTTPConduit;
 
 /**
  * Common proxy and http-centric client implementation
@@ -438,6 +439,12 @@ public abstract class AbstractClient implements Client {
 if (responseMessage == null) {
 return currentResponseBuilder;
 }
+
+String reasonPhrase = (String)MessageUtils.getContextualProperty(
+   responseMessage, HTTPConduit.HTTP_RESPONSE_MESSAGE, null);
+if (reasonPhrase != null) {
+currentResponseBuilder.status(status, reasonPhrase);
+}
 
 Map> protocolHeaders =
 CastUtils.cast((Map)responseMessage.get(Message.PROTOCOL_HEADERS));
@@ -485,6 +492,7 @@ public abstract class AbstractClient implements Client {
 }
 InputStream mStream = responseMessage.getContent(InputStream.class);
 currentResponseBuilder.entity(mStream);
+
 
 return currentResponseBuilder;
 }


[cxf] branch master updated: [CXF-8633]http.responseMessage gets lost in AbstractClient#setResponseBuilder

2021-12-22 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/master by this push:
 new d23ed9d  [CXF-8633]http.responseMessage gets lost in 
AbstractClient#setResponseBuilder
d23ed9d is described below

commit d23ed9dc87481d9a6cabdb2b6a6e086da6fcce24
Author: Freeman Fang 
AuthorDate: Wed Dec 22 12:38:21 2021 -0500

[CXF-8633]http.responseMessage gets lost in 
AbstractClient#setResponseBuilder
---
 .../src/main/java/org/apache/cxf/jaxrs/client/AbstractClient.java | 8 
 1 file changed, 8 insertions(+)

diff --git 
a/rt/rs/client/src/main/java/org/apache/cxf/jaxrs/client/AbstractClient.java 
b/rt/rs/client/src/main/java/org/apache/cxf/jaxrs/client/AbstractClient.java
index bba3873..123d30f 100644
--- a/rt/rs/client/src/main/java/org/apache/cxf/jaxrs/client/AbstractClient.java
+++ b/rt/rs/client/src/main/java/org/apache/cxf/jaxrs/client/AbstractClient.java
@@ -102,6 +102,7 @@ import org.apache.cxf.phase.PhaseManager;
 import org.apache.cxf.service.Service;
 import org.apache.cxf.service.model.BindingOperationInfo;
 import org.apache.cxf.transport.MessageObserver;
+import org.apache.cxf.transport.http.HTTPConduit;
 
 /**
  * Common proxy and http-centric client implementation
@@ -438,6 +439,12 @@ public abstract class AbstractClient implements Client {
 if (responseMessage == null) {
 return currentResponseBuilder;
 }
+
+String reasonPhrase = (String)MessageUtils.getContextualProperty(
+   responseMessage, HTTPConduit.HTTP_RESPONSE_MESSAGE, null);
+if (reasonPhrase != null) {
+currentResponseBuilder.status(status, reasonPhrase);
+}
 
 Map> protocolHeaders =
 CastUtils.cast((Map)responseMessage.get(Message.PROTOCOL_HEADERS));
@@ -485,6 +492,7 @@ public abstract class AbstractClient implements Client {
 }
 InputStream mStream = responseMessage.getContent(InputStream.class);
 currentResponseBuilder.entity(mStream);
+
 
 return currentResponseBuilder;
 }


[cxf] 02/02: [CXF-8627]AttachmentDataSource should always returns a valid contentType

2021-12-14 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.3.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git

commit 72268ee6651346ee0095029fd82d7c2964050d92
Author: Freeman Fang 
AuthorDate: Tue Dec 14 16:29:39 2021 -0500

[CXF-8627]AttachmentDataSource should always returns a valid contentType

(cherry picked from commit d27ad0157e49fdd601f702823155ff813880de5b)
(cherry picked from commit 34d2d42f98cfc16be6d516edca837c0b36bd406c)
---
 .../main/java/org/apache/cxf/attachment/AttachmentDataSource.java   | 6 +-
 1 file changed, 5 insertions(+), 1 deletion(-)

diff --git 
a/core/src/main/java/org/apache/cxf/attachment/AttachmentDataSource.java 
b/core/src/main/java/org/apache/cxf/attachment/AttachmentDataSource.java
index 1e2dc09..ae9ca10 100644
--- a/core/src/main/java/org/apache/cxf/attachment/AttachmentDataSource.java
+++ b/core/src/main/java/org/apache/cxf/attachment/AttachmentDataSource.java
@@ -25,6 +25,7 @@ import java.io.OutputStream;
 
 import javax.activation.DataSource;
 
+import org.apache.cxf.common.util.StringUtils;
 import org.apache.cxf.helpers.IOUtils;
 import org.apache.cxf.io.CacheSizeExceededException;
 import org.apache.cxf.io.CachedOutputStream;
@@ -32,7 +33,7 @@ import org.apache.cxf.message.Message;
 
 public class AttachmentDataSource implements DataSource {
 
-private final String ct;
+private String ct;
 private CachedOutputStream cache;
 private InputStream ins;
 private DelegatingInputStream delegate;
@@ -76,6 +77,9 @@ public class AttachmentDataSource implements DataSource {
 }
 
 public String getContentType() {
+if (StringUtils.isEmpty(ct)) {
+ct = "application/octet-stream";
+}
 return ct;
 }
 


[cxf] branch 3.3.x-fixes updated (27e2bdc -> 72268ee)

2021-12-14 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a change to branch 3.3.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git.


from 27e2bdc  Recording .gitmergeinfo Changes
 new 52ba7c0  [CXF-8626]async http client may handle response by multiple 
threads on work queue
 new 72268ee  [CXF-8627]AttachmentDataSource should always returns a valid 
contentType

The 2 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 .../cxf/attachment/AttachmentDataSource.java   |  6 -
 .../http/asyncclient/AsyncHTTPConduit.java |  2 +-
 .../http/asyncclient/AsyncHTTPConduitTest.java | 26 ++
 3 files changed, 32 insertions(+), 2 deletions(-)


[cxf] 01/02: [CXF-8626]async http client may handle response by multiple threads on work queue

2021-12-14 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.3.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git

commit 52ba7c05fb85e696544479f01f66193d47d9552b
Author: Freeman Fang 
AuthorDate: Tue Dec 14 16:18:07 2021 -0500

[CXF-8626]async http client may handle response by multiple threads on work 
queue

(cherry picked from commit b42882889c4d0c7010c65d17bae50e86bb624675)
(cherry picked from commit ef721549e4a7d0ed5a06af7d6bb4adfe7af11a69)
---
 .../http/asyncclient/AsyncHTTPConduit.java |  2 +-
 .../http/asyncclient/AsyncHTTPConduitTest.java | 26 ++
 2 files changed, 27 insertions(+), 1 deletion(-)

diff --git 
a/rt/transports/http-hc/src/main/java/org/apache/cxf/transport/http/asyncclient/AsyncHTTPConduit.java
 
b/rt/transports/http-hc/src/main/java/org/apache/cxf/transport/http/asyncclient/AsyncHTTPConduit.java
index fc71e8c..3cd8ed2 100755
--- 
a/rt/transports/http-hc/src/main/java/org/apache/cxf/transport/http/asyncclient/AsyncHTTPConduit.java
+++ 
b/rt/transports/http-hc/src/main/java/org/apache/cxf/transport/http/asyncclient/AsyncHTTPConduit.java
@@ -674,7 +674,7 @@ public class AsyncHTTPConduit extends 
URLConnectionHTTPConduit {
 }
 
 protected void handleResponseAsync() throws IOException {
-isAsync = true;
+
 }
 
 protected void closeInputStream() throws IOException {
diff --git 
a/rt/transports/http-hc/src/test/java/org/apache/cxf/transport/http/asyncclient/AsyncHTTPConduitTest.java
 
b/rt/transports/http-hc/src/test/java/org/apache/cxf/transport/http/asyncclient/AsyncHTTPConduitTest.java
index ee3ebca..f6e4ef5 100644
--- 
a/rt/transports/http-hc/src/test/java/org/apache/cxf/transport/http/asyncclient/AsyncHTTPConduitTest.java
+++ 
b/rt/transports/http-hc/src/test/java/org/apache/cxf/transport/http/asyncclient/AsyncHTTPConduitTest.java
@@ -188,6 +188,32 @@ public class AsyncHTTPConduitTest extends 
AbstractBusClientServerTestBase {
 }
 
 @Test
+public void testRetransmitAsync() throws Exception {
+
+updateAddressPort(g, PORT);
+HTTPConduit c = (HTTPConduit)ClientProxy.getClient(g).getConduit();
+HTTPClientPolicy cp = new HTTPClientPolicy();
+cp.setMaxRetransmits(2);
+cp.setChunkLength(20);
+c.setClient(cp);
+GreetMeResponse resp = (GreetMeResponse)g.greetMeAsync(request, new 
AsyncHandler() {
+public void handleResponse(Response res) {
+try {
+res.get().getResponseType();
+} catch (InterruptedException | ExecutionException e) {
+e.printStackTrace();
+}
+}
+}).get();
+assertEquals("Hello " + request, resp.getResponseType());
+
+g.greetMeLaterAsync(1000, new AsyncHandler() {
+public void handleResponse(Response res) {
+}
+}).get();
+}
+
+@Test
 public void testTimeoutAsyncWithPropertySetting() throws Exception {
 updateAddressPort(g, PORT);
 
((javax.xml.ws.BindingProvider)g).getRequestContext().put("javax.xml.ws.client.receiveTimeout",


[cxf] 01/02: [CXF-8626]async http client may handle response by multiple threads on work queue

2021-12-14 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.4.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git

commit ef721549e4a7d0ed5a06af7d6bb4adfe7af11a69
Author: Freeman Fang 
AuthorDate: Tue Dec 14 16:18:07 2021 -0500

[CXF-8626]async http client may handle response by multiple threads on work 
queue

(cherry picked from commit b42882889c4d0c7010c65d17bae50e86bb624675)
---
 .../http/asyncclient/AsyncHTTPConduit.java |  2 +-
 .../http/asyncclient/AsyncHTTPConduitTest.java | 26 ++
 2 files changed, 27 insertions(+), 1 deletion(-)

diff --git 
a/rt/transports/http-hc/src/main/java/org/apache/cxf/transport/http/asyncclient/AsyncHTTPConduit.java
 
b/rt/transports/http-hc/src/main/java/org/apache/cxf/transport/http/asyncclient/AsyncHTTPConduit.java
index fc71e8c..3cd8ed2 100755
--- 
a/rt/transports/http-hc/src/main/java/org/apache/cxf/transport/http/asyncclient/AsyncHTTPConduit.java
+++ 
b/rt/transports/http-hc/src/main/java/org/apache/cxf/transport/http/asyncclient/AsyncHTTPConduit.java
@@ -674,7 +674,7 @@ public class AsyncHTTPConduit extends 
URLConnectionHTTPConduit {
 }
 
 protected void handleResponseAsync() throws IOException {
-isAsync = true;
+
 }
 
 protected void closeInputStream() throws IOException {
diff --git 
a/rt/transports/http-hc/src/test/java/org/apache/cxf/transport/http/asyncclient/AsyncHTTPConduitTest.java
 
b/rt/transports/http-hc/src/test/java/org/apache/cxf/transport/http/asyncclient/AsyncHTTPConduitTest.java
index 6f9f3be..057a636 100644
--- 
a/rt/transports/http-hc/src/test/java/org/apache/cxf/transport/http/asyncclient/AsyncHTTPConduitTest.java
+++ 
b/rt/transports/http-hc/src/test/java/org/apache/cxf/transport/http/asyncclient/AsyncHTTPConduitTest.java
@@ -188,6 +188,32 @@ public class AsyncHTTPConduitTest extends 
AbstractBusClientServerTestBase {
 }
 
 @Test
+public void testRetransmitAsync() throws Exception {
+
+updateAddressPort(g, PORT);
+HTTPConduit c = (HTTPConduit)ClientProxy.getClient(g).getConduit();
+HTTPClientPolicy cp = new HTTPClientPolicy();
+cp.setMaxRetransmits(2);
+cp.setChunkLength(20);
+c.setClient(cp);
+GreetMeResponse resp = (GreetMeResponse)g.greetMeAsync(request, new 
AsyncHandler() {
+public void handleResponse(Response res) {
+try {
+res.get().getResponseType();
+} catch (InterruptedException | ExecutionException e) {
+e.printStackTrace();
+}
+}
+}).get();
+assertEquals("Hello " + request, resp.getResponseType());
+
+g.greetMeLaterAsync(1000, new AsyncHandler() {
+public void handleResponse(Response res) {
+}
+}).get();
+}
+
+@Test
 public void testTimeoutAsyncWithPropertySetting() throws Exception {
 updateAddressPort(g, PORT);
 
((javax.xml.ws.BindingProvider)g).getRequestContext().put("javax.xml.ws.client.receiveTimeout",


[cxf] 02/02: [CXF-8627]AttachmentDataSource should always returns a valid contentType

2021-12-14 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.4.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git

commit 34d2d42f98cfc16be6d516edca837c0b36bd406c
Author: Freeman Fang 
AuthorDate: Tue Dec 14 16:29:39 2021 -0500

[CXF-8627]AttachmentDataSource should always returns a valid contentType

(cherry picked from commit d27ad0157e49fdd601f702823155ff813880de5b)
---
 .../main/java/org/apache/cxf/attachment/AttachmentDataSource.java   | 6 +-
 1 file changed, 5 insertions(+), 1 deletion(-)

diff --git 
a/core/src/main/java/org/apache/cxf/attachment/AttachmentDataSource.java 
b/core/src/main/java/org/apache/cxf/attachment/AttachmentDataSource.java
index 1e2dc09..ae9ca10 100644
--- a/core/src/main/java/org/apache/cxf/attachment/AttachmentDataSource.java
+++ b/core/src/main/java/org/apache/cxf/attachment/AttachmentDataSource.java
@@ -25,6 +25,7 @@ import java.io.OutputStream;
 
 import javax.activation.DataSource;
 
+import org.apache.cxf.common.util.StringUtils;
 import org.apache.cxf.helpers.IOUtils;
 import org.apache.cxf.io.CacheSizeExceededException;
 import org.apache.cxf.io.CachedOutputStream;
@@ -32,7 +33,7 @@ import org.apache.cxf.message.Message;
 
 public class AttachmentDataSource implements DataSource {
 
-private final String ct;
+private String ct;
 private CachedOutputStream cache;
 private InputStream ins;
 private DelegatingInputStream delegate;
@@ -76,6 +77,9 @@ public class AttachmentDataSource implements DataSource {
 }
 
 public String getContentType() {
+if (StringUtils.isEmpty(ct)) {
+ct = "application/octet-stream";
+}
 return ct;
 }
 


[cxf] branch master updated: [CXF-8627]AttachmentDataSource should always returns a valid contentType

2021-12-14 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/master by this push:
 new d27ad01  [CXF-8627]AttachmentDataSource should always returns a valid 
contentType
 new bc59057  Merge branch 'master' of github.com:apache/cxf
d27ad01 is described below

commit d27ad0157e49fdd601f702823155ff813880de5b
Author: Freeman Fang 
AuthorDate: Tue Dec 14 16:29:39 2021 -0500

[CXF-8627]AttachmentDataSource should always returns a valid contentType
---
 .../main/java/org/apache/cxf/attachment/AttachmentDataSource.java   | 6 +-
 1 file changed, 5 insertions(+), 1 deletion(-)

diff --git 
a/core/src/main/java/org/apache/cxf/attachment/AttachmentDataSource.java 
b/core/src/main/java/org/apache/cxf/attachment/AttachmentDataSource.java
index 6e4fa1a..a10c682 100644
--- a/core/src/main/java/org/apache/cxf/attachment/AttachmentDataSource.java
+++ b/core/src/main/java/org/apache/cxf/attachment/AttachmentDataSource.java
@@ -25,6 +25,7 @@ import java.io.OutputStream;
 
 import javax.activation.DataSource;
 
+import org.apache.cxf.common.util.StringUtils;
 import org.apache.cxf.helpers.IOUtils;
 import org.apache.cxf.io.CacheSizeExceededException;
 import org.apache.cxf.io.CachedOutputStream;
@@ -32,7 +33,7 @@ import org.apache.cxf.message.Message;
 
 public class AttachmentDataSource implements DataSource {
 
-private final String ct;
+private String ct;
 private CachedOutputStream cache;
 private InputStream ins;
 private DelegatingInputStream delegate;
@@ -76,6 +77,9 @@ public class AttachmentDataSource implements DataSource {
 }
 
 public String getContentType() {
+if (StringUtils.isEmpty(ct)) {
+ct = "application/octet-stream";
+}
 return ct;
 }
 


[cxf] branch master updated (f2de9e2 -> 8039f64)

2021-12-14 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a change to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git.


from f2de9e2  Update maven-javadoc-plugin to 3.3.1 (#883)
 add b428828  [CXF-8626]async http client may handle response by multiple 
threads on work queue
 add 8039f64  Merge branch 'master' of github.com:apache/cxf

No new revisions were added by this update.

Summary of changes:
 .../http/asyncclient/AsyncHTTPConduit.java |  2 +-
 .../http/asyncclient/AsyncHTTPConduitTest.java | 26 ++
 2 files changed, 27 insertions(+), 1 deletion(-)


[cxf] branch 3.4.x-fixes updated: [CXF-8614]ensure OSGi header of cxf-core to import com.sun.codemodel.writer package

2021-11-01 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.4.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.4.x-fixes by this push:
 new b051397  [CXF-8614]ensure OSGi header of cxf-core to import 
com.sun.codemodel.writer package
b051397 is described below

commit b0513975cdd280e5d235fdda72cbfbde73ae2cb3
Author: Freeman Fang 
AuthorDate: Mon Nov 1 15:29:14 2021 -0400

[CXF-8614]ensure OSGi header of cxf-core to import com.sun.codemodel.writer 
package

(cherry picked from commit f9cf44fb1203b45833e5050688ae353bab788d32)
---
 core/pom.xml | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/core/pom.xml b/core/pom.xml
index 81124e1..a334e49 100644
--- a/core/pom.xml
+++ b/core/pom.xml
@@ -46,6 +46,7 @@
 com.sun.msv*;resolution:=optional,
 com.sun.tools*;resolution:=optional,
 com.sun.xml*;resolution:=optional,
+com.sun.codemodel.writer;resolution:=optional,
 
org.slf4j*;resolution:=optional;version="${cxf.osgi.slf4j.version}",
 
net.sf.cglib*;resolution:=optional;version="${cxf.cglib.osgi.version}",
 
org.springframework.osgi.io;resolution:=optional;version="${cxf.osgi.spring.osgi.version}",
@@ -65,8 +66,7 @@
 
org.apache.aries*;version="${cxf.aries.version.range}";resolution:=optional,
 org.apache.karaf.jaas.boot.principal;resolution:=optional,
 org.apache.commons.logging;resolution:=optional,
-!sun.misc,
-!com.sun.codemodel.writer
+!sun.misc
 
 
 
org.apache.cxf.bus,org.apache.cxf.*,com.ctc.wstx.*,org.apache.karaf.jaas.boot.principal.*


[cxf] branch master updated: [CXF-8614]ensure OSGi header of cxf-core to import com.sun.codemodel.writer package

2021-11-01 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/master by this push:
 new f9cf44f  [CXF-8614]ensure OSGi header of cxf-core to import 
com.sun.codemodel.writer package
f9cf44f is described below

commit f9cf44fb1203b45833e5050688ae353bab788d32
Author: Freeman Fang 
AuthorDate: Mon Nov 1 15:29:14 2021 -0400

[CXF-8614]ensure OSGi header of cxf-core to import com.sun.codemodel.writer 
package
---
 core/pom.xml | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/core/pom.xml b/core/pom.xml
index dd2882c..e5c4775 100644
--- a/core/pom.xml
+++ b/core/pom.xml
@@ -46,6 +46,7 @@
 com.sun.msv*;resolution:=optional,
 com.sun.tools*;resolution:=optional,
 com.sun.xml*;resolution:=optional,
+com.sun.codemodel.writer;resolution:=optional,
 
org.slf4j*;resolution:=optional;version="${cxf.osgi.slf4j.version}",
 
net.sf.cglib*;resolution:=optional;version="${cxf.cglib.osgi.version}",
 
org.springframework.osgi.io;resolution:=optional;version="${cxf.osgi.spring.osgi.version}",
@@ -65,8 +66,7 @@
 
org.apache.aries*;version="${cxf.aries.version.range}";resolution:=optional,
 org.apache.karaf.jaas.boot.principal;resolution:=optional,
 org.apache.commons.logging;resolution:=optional,
-!sun.misc,
-!com.sun.codemodel.writer
+!sun.misc
 
 
 
org.apache.cxf.bus,org.apache.cxf.*,com.ctc.wstx.*,org.apache.karaf.jaas.boot.principal.*


[cxf] branch 3.4.x-fixes updated: [CXF-8608]WSSCTest always failed with JDK8

2021-10-15 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.4.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.4.x-fixes by this push:
 new 6121317  [CXF-8608]WSSCTest always failed with JDK8
6121317 is described below

commit 612131768b984aefc1c9a0fa78327c87161986fc
Author: Freeman Fang 
AuthorDate: Fri Oct 15 15:52:41 2021 -0400

[CXF-8608]WSSCTest always failed with JDK8

(cherry picked from commit 11824047b6a9e639fd78be030b4667917836ed96)
---
 .../src/test/java/org/apache/cxf/systest/ws/wssc/WSSCTest.java  | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git 
a/systests/ws-security/src/test/java/org/apache/cxf/systest/ws/wssc/WSSCTest.java
 
b/systests/ws-security/src/test/java/org/apache/cxf/systest/ws/wssc/WSSCTest.java
index a5ffe53..934caef 100644
--- 
a/systests/ws-security/src/test/java/org/apache/cxf/systest/ws/wssc/WSSCTest.java
+++ 
b/systests/ws-security/src/test/java/org/apache/cxf/systest/ws/wssc/WSSCTest.java
@@ -120,6 +120,7 @@ public class WSSCTest extends 
AbstractBusClientServerTestBase {
 @Parameters(name = "{0}")
 public static Collection data() {
 return Arrays.asList(new TestParam[] {
+new 
TestParam("SecureConversation_UserNameOverTransport_IPingService", STAX_PORT2, 
true),
 new 
TestParam("SecureConversation_UserNameOverTransport_IPingService", PORT2, 
false),
 new 
TestParam("SecureConversation_MutualCertificate10SignEncrypt_IPingService", 
PORT, false),
 new TestParam("AC_IPingService", PORT, false),
@@ -200,7 +201,6 @@ public class WSSCTest extends 
AbstractBusClientServerTestBase {
 new TestParam("_XD-SEES_IPingService", STAX_PORT, false),
 new TestParam("_XD-ES_IPingService", STAX_PORT, false),
 
-new 
TestParam("SecureConversation_UserNameOverTransport_IPingService", STAX_PORT2, 
true),
 // TODO Endorsing derived keys not supported.
 // new 
TestParam("SecureConversation_MutualCertificate10SignEncrypt_IPingService",
 //   STAX_PORT, true),


[cxf] branch master updated: [CXF-8608]WSSCTest always failed with JDK8

2021-10-15 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/master by this push:
 new 1182404  [CXF-8608]WSSCTest always failed with JDK8
1182404 is described below

commit 11824047b6a9e639fd78be030b4667917836ed96
Author: Freeman Fang 
AuthorDate: Fri Oct 15 15:52:41 2021 -0400

[CXF-8608]WSSCTest always failed with JDK8
---
 .../src/test/java/org/apache/cxf/systest/ws/wssc/WSSCTest.java  | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git 
a/systests/ws-security/src/test/java/org/apache/cxf/systest/ws/wssc/WSSCTest.java
 
b/systests/ws-security/src/test/java/org/apache/cxf/systest/ws/wssc/WSSCTest.java
index a5ffe53..934caef 100644
--- 
a/systests/ws-security/src/test/java/org/apache/cxf/systest/ws/wssc/WSSCTest.java
+++ 
b/systests/ws-security/src/test/java/org/apache/cxf/systest/ws/wssc/WSSCTest.java
@@ -120,6 +120,7 @@ public class WSSCTest extends 
AbstractBusClientServerTestBase {
 @Parameters(name = "{0}")
 public static Collection data() {
 return Arrays.asList(new TestParam[] {
+new 
TestParam("SecureConversation_UserNameOverTransport_IPingService", STAX_PORT2, 
true),
 new 
TestParam("SecureConversation_UserNameOverTransport_IPingService", PORT2, 
false),
 new 
TestParam("SecureConversation_MutualCertificate10SignEncrypt_IPingService", 
PORT, false),
 new TestParam("AC_IPingService", PORT, false),
@@ -200,7 +201,6 @@ public class WSSCTest extends 
AbstractBusClientServerTestBase {
 new TestParam("_XD-SEES_IPingService", STAX_PORT, false),
 new TestParam("_XD-ES_IPingService", STAX_PORT, false),
 
-new 
TestParam("SecureConversation_UserNameOverTransport_IPingService", STAX_PORT2, 
true),
 // TODO Endorsing derived keys not supported.
 // new 
TestParam("SecureConversation_MutualCertificate10SignEncrypt_IPingService",
 //   STAX_PORT, true),


[cxf] branch 3.4.x-fixes updated: CXF-8607 OpenApiFeature: OpenApiCustomizer doesn´t work with runAsFilter

2021-10-13 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.4.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.4.x-fixes by this push:
 new da1fece  CXF-8607 OpenApiFeature: OpenApiCustomizer doesn´t work with 
runAsFilter
da1fece is described below

commit da1fece268c806a8d03cc204135492e99a5690af
Author: FWermelskirchen 
AuthorDate: Wed Oct 13 14:08:13 2021 +0200

CXF-8607 OpenApiFeature: OpenApiCustomizer doesn´t work with runAsFilter

(cherry picked from commit 0c02781a0df19ab29e871f16a0943755cd2afb9f)
---
 .../apache/cxf/jaxrs/openapi/OpenApiFeature.java   | 56 --
 1 file changed, 53 insertions(+), 3 deletions(-)

diff --git 
a/rt/rs/description-openapi-v3/src/main/java/org/apache/cxf/jaxrs/openapi/OpenApiFeature.java
 
b/rt/rs/description-openapi-v3/src/main/java/org/apache/cxf/jaxrs/openapi/OpenApiFeature.java
index 4f51d87..ddac359 100644
--- 
a/rt/rs/description-openapi-v3/src/main/java/org/apache/cxf/jaxrs/openapi/OpenApiFeature.java
+++ 
b/rt/rs/description-openapi-v3/src/main/java/org/apache/cxf/jaxrs/openapi/OpenApiFeature.java
@@ -496,7 +496,7 @@ public class OpenApiFeature extends 
DelegatingFeature
 .getUserDefinedOptions());
 registerOpenApiResources(sfb, packages, 
context.getOpenApiConfiguration());
 registerSwaggerUiResources(sfb, combine(swaggerProps, 
userProperties), factory, bus);
-registerSwaggerContainerRequestFilter(factory, application);
+registerSwaggerContainerRequestFilter(factory, application, 
context.getOpenApiConfiguration());
 
 if (useContextBasedConfig) {
 registerServletConfigProvider(factory);
@@ -512,10 +512,13 @@ public class OpenApiFeature extends 
DelegatingFeature
 }
 }
 
-private void 
registerSwaggerContainerRequestFilter(ServerProviderFactory factory, 
Application application) {
+private void 
registerSwaggerContainerRequestFilter(ServerProviderFactory factory, 
Application application,
+   
OpenAPIConfiguration config) {
 if (isRunAsFilter()) {
 List providers = new ArrayList<>();
-providers.add(new SwaggerContainerRequestFilter(application));
+BaseOpenApiResource filter = 
createOpenApiRequestFilter(application).openApiConfiguration(config)
+.configLocation(configLocation);
+providers.add(filter);
 factory.setUserProviders(providers);
 }
 
@@ -914,6 +917,11 @@ public class OpenApiFeature extends 
DelegatingFeature
 private BaseOpenApiResource createOpenApiResource() {
 return (customizer == null) ? new OpenApiResource() : new 
OpenApiCustomizedResource(customizer);
 }
+
+private BaseOpenApiResource createOpenApiRequestFilter(Application 
application) {
+return (customizer == null) ? new 
SwaggerContainerRequestFilter(application)
+: new CustomizedSwaggerContainerRequestFilter(application, 
customizer);
+}
 }
 
 @PreMatching
@@ -955,4 +963,46 @@ public class OpenApiFeature extends 
DelegatingFeature
 }
 }
 }
+
+@PreMatching
+protected static class CustomizedSwaggerContainerRequestFilter extends 
OpenApiCustomizedResource
+implements ContainerRequestFilter {
+
+protected static final String APIDOCS_LISTING_PATH_JSON = 
"openapi.json";
+protected static final String APIDOCS_LISTING_PATH_YAML = 
"openapi.yaml";
+
+
+@Context
+protected MessageContext mc;
+
+private Application app;
+public CustomizedSwaggerContainerRequestFilter(Application app, 
OpenApiCustomizer customizer) {
+super(customizer);
+this.app = app;
+}
+
+@Override
+public void filter(ContainerRequestContext requestContext) throws 
IOException {
+UriInfo ui = mc.getUriInfo();
+
+Response response = null;
+if (ui.getPath().endsWith(APIDOCS_LISTING_PATH_JSON)) {
+try {
+response = super.getOpenApi(app, mc.getServletConfig(), 
mc.getHttpHeaders(), ui, "json");
+} catch (Exception ex) {
+throw new IOException(ex);
+}
+} else if (ui.getPath().endsWith(APIDOCS_LISTING_PATH_YAML)) {
+try {
+response = super.getOpenApi(app, mc.getServletConfig(), 
mc.getHttpHeaders(), ui, "yaml");
+} catch (Exception ex) {
+throw new IOException(ex);
+}
+}
+
+if (response != null) {
+requestContext.abortWith(response);
+}
+}
+}
 }


[cxf] branch master updated: CXF-8607 OpenApiFeature: OpenApiCustomizer doesn´t work with runAsFilter

2021-10-13 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/master by this push:
 new 0c02781  CXF-8607 OpenApiFeature: OpenApiCustomizer doesn´t work with 
runAsFilter
 new b2731a6  Merge pull request #864 from DevFlorian/master
0c02781 is described below

commit 0c02781a0df19ab29e871f16a0943755cd2afb9f
Author: FWermelskirchen 
AuthorDate: Wed Oct 13 14:08:13 2021 +0200

CXF-8607 OpenApiFeature: OpenApiCustomizer doesn´t work with runAsFilter
---
 .../apache/cxf/jaxrs/openapi/OpenApiFeature.java   | 56 --
 1 file changed, 53 insertions(+), 3 deletions(-)

diff --git 
a/rt/rs/description-openapi-v3/src/main/java/org/apache/cxf/jaxrs/openapi/OpenApiFeature.java
 
b/rt/rs/description-openapi-v3/src/main/java/org/apache/cxf/jaxrs/openapi/OpenApiFeature.java
index 4f51d87..ddac359 100644
--- 
a/rt/rs/description-openapi-v3/src/main/java/org/apache/cxf/jaxrs/openapi/OpenApiFeature.java
+++ 
b/rt/rs/description-openapi-v3/src/main/java/org/apache/cxf/jaxrs/openapi/OpenApiFeature.java
@@ -496,7 +496,7 @@ public class OpenApiFeature extends 
DelegatingFeature
 .getUserDefinedOptions());
 registerOpenApiResources(sfb, packages, 
context.getOpenApiConfiguration());
 registerSwaggerUiResources(sfb, combine(swaggerProps, 
userProperties), factory, bus);
-registerSwaggerContainerRequestFilter(factory, application);
+registerSwaggerContainerRequestFilter(factory, application, 
context.getOpenApiConfiguration());
 
 if (useContextBasedConfig) {
 registerServletConfigProvider(factory);
@@ -512,10 +512,13 @@ public class OpenApiFeature extends 
DelegatingFeature
 }
 }
 
-private void 
registerSwaggerContainerRequestFilter(ServerProviderFactory factory, 
Application application) {
+private void 
registerSwaggerContainerRequestFilter(ServerProviderFactory factory, 
Application application,
+   
OpenAPIConfiguration config) {
 if (isRunAsFilter()) {
 List providers = new ArrayList<>();
-providers.add(new SwaggerContainerRequestFilter(application));
+BaseOpenApiResource filter = 
createOpenApiRequestFilter(application).openApiConfiguration(config)
+.configLocation(configLocation);
+providers.add(filter);
 factory.setUserProviders(providers);
 }
 
@@ -914,6 +917,11 @@ public class OpenApiFeature extends 
DelegatingFeature
 private BaseOpenApiResource createOpenApiResource() {
 return (customizer == null) ? new OpenApiResource() : new 
OpenApiCustomizedResource(customizer);
 }
+
+private BaseOpenApiResource createOpenApiRequestFilter(Application 
application) {
+return (customizer == null) ? new 
SwaggerContainerRequestFilter(application)
+: new CustomizedSwaggerContainerRequestFilter(application, 
customizer);
+}
 }
 
 @PreMatching
@@ -955,4 +963,46 @@ public class OpenApiFeature extends 
DelegatingFeature
 }
 }
 }
+
+@PreMatching
+protected static class CustomizedSwaggerContainerRequestFilter extends 
OpenApiCustomizedResource
+implements ContainerRequestFilter {
+
+protected static final String APIDOCS_LISTING_PATH_JSON = 
"openapi.json";
+protected static final String APIDOCS_LISTING_PATH_YAML = 
"openapi.yaml";
+
+
+@Context
+protected MessageContext mc;
+
+private Application app;
+public CustomizedSwaggerContainerRequestFilter(Application app, 
OpenApiCustomizer customizer) {
+super(customizer);
+this.app = app;
+}
+
+@Override
+public void filter(ContainerRequestContext requestContext) throws 
IOException {
+UriInfo ui = mc.getUriInfo();
+
+Response response = null;
+if (ui.getPath().endsWith(APIDOCS_LISTING_PATH_JSON)) {
+try {
+response = super.getOpenApi(app, mc.getServletConfig(), 
mc.getHttpHeaders(), ui, "json");
+} catch (Exception ex) {
+throw new IOException(ex);
+}
+} else if (ui.getPath().endsWith(APIDOCS_LISTING_PATH_YAML)) {
+try {
+response = super.getOpenApi(app, mc.getServletConfig(), 
mc.getHttpHeaders(), ui, "yaml");
+} catch (Exception ex) {
+throw new IOException(ex);
+}
+}
+
+if (response != null) {
+requestContext.abortWith(response);
+}
+}
+}
 }


[cxf] branch 3.3.x-fixes updated: [CXF-8603]ClassLoaderUtils.setThreadContextClassloader attempts to set null class loader

2021-10-08 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.3.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.3.x-fixes by this push:
 new d675adc  [CXF-8603]ClassLoaderUtils.setThreadContextClassloader 
attempts to set null class loader
d675adc is described below

commit d675adcc13796cf81a1489f4eac6a239ea6c9382
Author: Freeman Fang 
AuthorDate: Fri Oct 8 12:56:54 2021 -0400

[CXF-8603]ClassLoaderUtils.setThreadContextClassloader attempts to set null 
class loader

(cherry picked from commit b1753fa70a86292e0965cf570fae5d81e280080a)
(cherry picked from commit c949fb0977ebde946fb5d0c942f1cca6ef7af186)
---
 core/src/main/java/org/apache/cxf/helpers/XPathUtils.java | 6 --
 1 file changed, 4 insertions(+), 2 deletions(-)

diff --git a/core/src/main/java/org/apache/cxf/helpers/XPathUtils.java 
b/core/src/main/java/org/apache/cxf/helpers/XPathUtils.java
index 7475434..77d3f41 100644
--- a/core/src/main/java/org/apache/cxf/helpers/XPathUtils.java
+++ b/core/src/main/java/org/apache/cxf/helpers/XPathUtils.java
@@ -69,8 +69,10 @@ public class XPathUtils {
 }
 
 public Object getValue(String xpathExpression, Node node, QName type) {
-ClassLoaderHolder loader
-= 
ClassLoaderUtils.setThreadContextClassloader(getClassLoader(xpath.getClass()));
+ClassLoaderHolder loader = null;
+if (getClassLoader(xpath.getClass()) != null) {
+loader = 
ClassLoaderUtils.setThreadContextClassloader(getClassLoader(xpath.getClass()));
+}
 try {
 return xpath.evaluate(xpathExpression, node, type);
 } catch (Exception e) {


[cxf] branch 3.4.x-fixes updated: [CXF-8603]ClassLoaderUtils.setThreadContextClassloader attempts to set null class loader

2021-10-08 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.4.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.4.x-fixes by this push:
 new c949fb0  [CXF-8603]ClassLoaderUtils.setThreadContextClassloader 
attempts to set null class loader
c949fb0 is described below

commit c949fb0977ebde946fb5d0c942f1cca6ef7af186
Author: Freeman Fang 
AuthorDate: Fri Oct 8 12:56:54 2021 -0400

[CXF-8603]ClassLoaderUtils.setThreadContextClassloader attempts to set null 
class loader

(cherry picked from commit b1753fa70a86292e0965cf570fae5d81e280080a)
---
 core/src/main/java/org/apache/cxf/helpers/XPathUtils.java | 6 --
 1 file changed, 4 insertions(+), 2 deletions(-)

diff --git a/core/src/main/java/org/apache/cxf/helpers/XPathUtils.java 
b/core/src/main/java/org/apache/cxf/helpers/XPathUtils.java
index 7475434..77d3f41 100644
--- a/core/src/main/java/org/apache/cxf/helpers/XPathUtils.java
+++ b/core/src/main/java/org/apache/cxf/helpers/XPathUtils.java
@@ -69,8 +69,10 @@ public class XPathUtils {
 }
 
 public Object getValue(String xpathExpression, Node node, QName type) {
-ClassLoaderHolder loader
-= 
ClassLoaderUtils.setThreadContextClassloader(getClassLoader(xpath.getClass()));
+ClassLoaderHolder loader = null;
+if (getClassLoader(xpath.getClass()) != null) {
+loader = 
ClassLoaderUtils.setThreadContextClassloader(getClassLoader(xpath.getClass()));
+}
 try {
 return xpath.evaluate(xpathExpression, node, type);
 } catch (Exception e) {


[cxf] branch master updated: [CXF-8603]ClassLoaderUtils.setThreadContextClassloader attempts to set null class loader

2021-10-08 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/master by this push:
 new b1753fa  [CXF-8603]ClassLoaderUtils.setThreadContextClassloader 
attempts to set null class loader
b1753fa is described below

commit b1753fa70a86292e0965cf570fae5d81e280080a
Author: Freeman Fang 
AuthorDate: Fri Oct 8 12:56:54 2021 -0400

[CXF-8603]ClassLoaderUtils.setThreadContextClassloader attempts to set null 
class loader
---
 core/src/main/java/org/apache/cxf/helpers/XPathUtils.java | 6 --
 1 file changed, 4 insertions(+), 2 deletions(-)

diff --git a/core/src/main/java/org/apache/cxf/helpers/XPathUtils.java 
b/core/src/main/java/org/apache/cxf/helpers/XPathUtils.java
index 7475434..77d3f41 100644
--- a/core/src/main/java/org/apache/cxf/helpers/XPathUtils.java
+++ b/core/src/main/java/org/apache/cxf/helpers/XPathUtils.java
@@ -69,8 +69,10 @@ public class XPathUtils {
 }
 
 public Object getValue(String xpathExpression, Node node, QName type) {
-ClassLoaderHolder loader
-= 
ClassLoaderUtils.setThreadContextClassloader(getClassLoader(xpath.getClass()));
+ClassLoaderHolder loader = null;
+if (getClassLoader(xpath.getClass()) != null) {
+loader = 
ClassLoaderUtils.setThreadContextClassloader(getClassLoader(xpath.getClass()));
+}
 try {
 return xpath.evaluate(xpathExpression, node, type);
 } catch (Exception e) {


[cxf] 01/02: [CXF-8590] Add synchronization to UnknownExtensibilityElement.getElement() call sites. The Element returned from getElement may not be thread safe, so we have to take precautions when acc

2021-09-02 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.4.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git

commit c7cb26832cc8cb8e9cd04b600101c22459883c0f
Author: Kim Johan Andersson 
AuthorDate: Thu Sep 2 11:42:43 2021 +0200

[CXF-8590]
Add synchronization to UnknownExtensibilityElement.getElement() call sites.
The Element returned from getElement may not be thread safe, so we have to 
take precautions when accessing the Element.
Also synchronize on the DescriptionInfo parameter in 
Wsdl11AttachmentPolicyProvider.getElementPolicy to avoid a race condition when 
registeredPolicy is not yet set.

(cherry picked from commit 73b65172322a046c36199dda289e3da6b75c001b)
---
 .../apache/cxf/jaxws/EndpointReferenceBuilder.java | 26 
 .../cxf/jaxws/support/JaxWsEndpointImpl.java   | 15 +++--
 .../cxf/ws/policy/PolicyAnnotationListener.java| 18 --
 .../LocalServiceModelReferenceResolver.java| 15 +++--
 .../wsdl11/Wsdl11AttachmentPolicyProvider.java | 72 --
 .../java/org/apache/cxf/wsdl11/SchemaUtil.java |  6 +-
 .../org/apache/cxf/wsdl11/ServiceWSDLBuilder.java  |  6 +-
 7 files changed, 95 insertions(+), 63 deletions(-)

diff --git 
a/rt/frontend/jaxws/src/main/java/org/apache/cxf/jaxws/EndpointReferenceBuilder.java
 
b/rt/frontend/jaxws/src/main/java/org/apache/cxf/jaxws/EndpointReferenceBuilder.java
index 311974d..852705e 100644
--- 
a/rt/frontend/jaxws/src/main/java/org/apache/cxf/jaxws/EndpointReferenceBuilder.java
+++ 
b/rt/frontend/jaxws/src/main/java/org/apache/cxf/jaxws/EndpointReferenceBuilder.java
@@ -59,19 +59,21 @@ public class EndpointReferenceBuilder {
 while (extensionElements.hasNext()) {
 ExtensibilityElement ext = extensionElements.next();
 if (ext instanceof UnknownExtensibilityElement && 
wsaEpr.equals(ext.getElementType())) {
-Element eprEle = 
((UnknownExtensibilityElement)ext).getElement();
-List addressElements = 
DOMUtils.getChildrenWithName(eprEle,
-   
  Names.WSA_NAMESPACE_NAME,
-   
  Names.WSA_ADDRESS_NAME);
-if (!addressElements.isEmpty()) {
-/*
- * [WSA-WSDL Binding] : in a SOAP 1.1 port described 
using WSDL 1.1, the location
- * attribute of a soap11:address element (if present) 
would have the same value as the
- * wsa:Address child element of the 
wsa:EndpointReference element.
- */
-
addressElements.get(0).setTextContent(this.endpoint.getEndpointInfo().getAddress());
+final Element eprEle = 
((UnknownExtensibilityElement)ext).getElement();
+synchronized (eprEle.getOwnerDocument()) {
+List addressElements = 
DOMUtils.getChildrenWithName(eprEle,
+   
  Names.WSA_NAMESPACE_NAME,
+   
  Names.WSA_ADDRESS_NAME);
+if (!addressElements.isEmpty()) {
+/*
+ * [WSA-WSDL Binding] : in a SOAP 1.1 port 
described using WSDL 1.1, the location
+ * attribute of a soap11:address element (if 
present) would have the same value as the
+ * wsa:Address child element of the 
wsa:EndpointReference element.
+ */
+
addressElements.get(0).setTextContent(this.endpoint.getEndpointInfo().getAddress());
+}
+return EndpointReference.readFrom(new 
DOMSource(eprEle));
 }
-return EndpointReference.readFrom(new DOMSource(eprEle));
 }
 
 }
diff --git 
a/rt/frontend/jaxws/src/main/java/org/apache/cxf/jaxws/support/JaxWsEndpointImpl.java
 
b/rt/frontend/jaxws/src/main/java/org/apache/cxf/jaxws/support/JaxWsEndpointImpl.java
index 7ff806e..c2ef3f4 100644
--- 
a/rt/frontend/jaxws/src/main/java/org/apache/cxf/jaxws/support/JaxWsEndpointImpl.java
+++ 
b/rt/frontend/jaxws/src/main/java/org/apache/cxf/jaxws/support/JaxWsEndpointImpl.java
@@ -297,12 +297,15 @@ public class JaxWsEndpointImpl extends EndpointImpl {
 while (extensionElements.hasNext()) {
 ExtensibilityElement ext = extensionElements.next();
 if (ext instanceof UnknownExtensibilityElement && 
wsaEpr.equals(ext.getElementType())) {
-DOMSource domSource = new 
DOMSource(((UnknownExtensibilityElement

[cxf] branch 3.4.x-fixes updated (41cba7f -> 7400fd2)

2021-09-02 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a change to branch 3.4.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git.


from 41cba7f  CXF-8578: Bridge methods for covariant return types cannot be 
invoked on client proxies (#842)
 new c7cb268  [CXF-8590] Add synchronization to 
UnknownExtensibilityElement.getElement() call sites. The Element returned from 
getElement may not be thread safe, so we have to take precautions when 
accessing the Element. Also synchronize on the DescriptionInfo parameter in 
Wsdl11AttachmentPolicyProvider.getElementPolicy to avoid a race condition when 
registeredPolicy is not yet set.
 new 7400fd2  [CXF-8590] Add synchronization to 
UnknownExtensibilityElement.getElement() call sites. The Element returned from 
getElement may not be thread safe, so we have to take precautions when 
accessing the Element. Also synchronize on the DescriptionInfo parameter in 
Wsdl11AttachmentPolicyProvider.getElementPolicy to avoid a race condition when 
registeredPolicy is not yet set.

The 2 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 .../apache/cxf/jaxws/EndpointReferenceBuilder.java | 26 
 .../cxf/jaxws/support/JaxWsEndpointImpl.java   | 15 +++--
 .../cxf/ws/policy/PolicyAnnotationListener.java| 18 --
 .../LocalServiceModelReferenceResolver.java| 15 +++--
 .../wsdl11/Wsdl11AttachmentPolicyProvider.java | 72 --
 .../reference/ReferenceResolverTest.java   |  5 +-
 .../java/org/apache/cxf/wsdl11/SchemaUtil.java |  6 +-
 .../org/apache/cxf/wsdl11/ServiceWSDLBuilder.java  |  6 +-
 8 files changed, 99 insertions(+), 64 deletions(-)


[cxf] 02/02: [CXF-8590] Add synchronization to UnknownExtensibilityElement.getElement() call sites. The Element returned from getElement may not be thread safe, so we have to take precautions when acc

2021-09-02 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.4.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git

commit 7400fd2119f71a49b0f3ced6ea4718441141a732
Author: Kim Johan Andersson 
AuthorDate: Thu Sep 2 15:13:21 2021 +0200

[CXF-8590]
Add synchronization to UnknownExtensibilityElement.getElement() call sites.
The Element returned from getElement may not be thread safe, so we have to 
take precautions when accessing the Element.
Also synchronize on the DescriptionInfo parameter in 
Wsdl11AttachmentPolicyProvider.getElementPolicy to avoid a race condition when 
registeredPolicy is not yet set.

(cherry picked from commit 9a4b855876e7d8ff68ca96760ab3d2ce84443a8e)
---
 .../cxf/ws/policy/attachment/reference/ReferenceResolverTest.java| 5 -
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git 
a/rt/ws/policy/src/test/java/org/apache/cxf/ws/policy/attachment/reference/ReferenceResolverTest.java
 
b/rt/ws/policy/src/test/java/org/apache/cxf/ws/policy/attachment/reference/ReferenceResolverTest.java
index c130203..dfd84ff 100644
--- 
a/rt/ws/policy/src/test/java/org/apache/cxf/ws/policy/attachment/reference/ReferenceResolverTest.java
+++ 
b/rt/ws/policy/src/test/java/org/apache/cxf/ws/policy/attachment/reference/ReferenceResolverTest.java
@@ -26,6 +26,7 @@ import java.util.List;
 import javax.wsdl.extensions.UnknownExtensibilityElement;
 import javax.xml.namespace.QName;
 
+import org.w3c.dom.Document;
 import org.w3c.dom.Element;
 
 import org.apache.cxf.service.model.DescriptionInfo;
@@ -73,10 +74,12 @@ public class ReferenceResolverTest {
 extensions.add(extension);
 
EasyMock.expect(di.getExtensors(UnknownExtensibilityElement.class)).andReturn(extensions);
 Element e = control.createMock(Element.class);
-EasyMock.expect(extension.getElement()).andReturn(e).times(2);
 QName qn = new QName(Constants.URI_POLICY_NS,
  Constants.ELEM_POLICY);
 EasyMock.expect(extension.getElementType()).andReturn(qn).anyTimes();
+EasyMock.expect(extension.getElement()).andReturn(e).times(1);
+Document ownerDocument = control.createMock(Document.class);
+EasyMock.expect(e.getOwnerDocument()).andReturn(ownerDocument);
 EasyMock.expect(e.getAttributeNS(PolicyConstants.WSU_NAMESPACE_URI,
  PolicyConstants.WSU_ID_ATTR_NAME))
 .andReturn("A");


[cxf] branch master updated (d40f53e -> 63fd560)

2021-09-02 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a change to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git.


from d40f53e  CXF-8591: Temporary queues are never deleted when the are 
used. Added a test case
 new 73b6517  [CXF-8590] Add synchronization to 
UnknownExtensibilityElement.getElement() call sites. The Element returned from 
getElement may not be thread safe, so we have to take precautions when 
accessing the Element. Also synchronize on the DescriptionInfo parameter in 
Wsdl11AttachmentPolicyProvider.getElementPolicy to avoid a race condition when 
registeredPolicy is not yet set.
 new 9a4b855  [CXF-8590] Add synchronization to 
UnknownExtensibilityElement.getElement() call sites. The Element returned from 
getElement may not be thread safe, so we have to take precautions when 
accessing the Element. Also synchronize on the DescriptionInfo parameter in 
Wsdl11AttachmentPolicyProvider.getElementPolicy to avoid a race condition when 
registeredPolicy is not yet set.
 new 63fd560  Merge pull request #845 from kimjand/CXF-8590

The 16474 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 .../apache/cxf/jaxws/EndpointReferenceBuilder.java | 26 
 .../cxf/jaxws/support/JaxWsEndpointImpl.java   | 15 +++--
 .../cxf/ws/policy/PolicyAnnotationListener.java| 18 --
 .../LocalServiceModelReferenceResolver.java| 15 +++--
 .../wsdl11/Wsdl11AttachmentPolicyProvider.java | 72 --
 .../reference/ReferenceResolverTest.java   |  5 +-
 .../java/org/apache/cxf/wsdl11/SchemaUtil.java |  6 +-
 .../org/apache/cxf/wsdl11/ServiceWSDLBuilder.java  |  6 +-
 8 files changed, 99 insertions(+), 64 deletions(-)


[cxf] branch 3.4.x-fixes updated: [CXF-8566] cxf-ws-rt-security & ehcache: OSGi classloading

2021-08-26 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.4.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.4.x-fixes by this push:
 new ec9e894  [CXF-8566] cxf-ws-rt-security & ehcache: OSGi classloading
ec9e894 is described below

commit ec9e894b86e06577e7797bad603c850822e9ddf3
Author: Julien Greffe <36693362+jgre...@users.noreply.github.com>
AuthorDate: Thu Aug 26 17:32:02 2021 +0200

[CXF-8566] cxf-ws-rt-security & ehcache: OSGi classloading

(cherry picked from commit 47db1b5843e92493b9619887588d41edb19acb84)
---
 .../apache/cxf/ws/security/tokenstore/EHCacheTokenStore.java  | 11 +--
 1 file changed, 9 insertions(+), 2 deletions(-)

diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/tokenstore/EHCacheTokenStore.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/tokenstore/EHCacheTokenStore.java
index 66d77bd..cf43d28 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/tokenstore/EHCacheTokenStore.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/tokenstore/EHCacheTokenStore.java
@@ -22,7 +22,9 @@ package org.apache.cxf.ws.security.tokenstore;
 import java.io.Closeable;
 import java.net.URL;
 import java.util.Collection;
+import java.util.HashMap;
 import java.util.HashSet;
+import java.util.Map;
 import java.util.Set;
 
 import org.apache.cxf.Bus;
@@ -34,6 +36,7 @@ import org.ehcache.CacheManager;
 import org.ehcache.Status;
 import org.ehcache.config.builders.CacheConfigurationBuilder;
 import org.ehcache.config.builders.CacheManagerBuilder;
+import org.ehcache.core.util.ClassLoading;
 import org.ehcache.xml.XmlConfiguration;
 
 /**
@@ -54,14 +57,18 @@ public class EHCacheTokenStore implements TokenStore, 
Closeable, BusLifeCycleLis
 
 this.key = key;
 try {
-XmlConfiguration xmlConfig = new XmlConfiguration(configFileURL);
-
 // Exclude the endpoint info bit added in TokenStoreUtils when 
getting the template name
 String template = key;
 if (template.contains("-")) {
 template = key.substring(0, key.lastIndexOf('-'));
 }
 
+// Set class loader cache of template object to SecurityToken 
classloader
+Map cacheClassLoaders = new HashMap<>();
+cacheClassLoaders.put(template, 
SecurityToken.class.getClassLoader());
+XmlConfiguration xmlConfig = new XmlConfiguration(configFileURL, 
ClassLoading.getDefaultClassLoader(),
+cacheClassLoaders);
+
 CacheConfigurationBuilder 
configurationBuilder =
 
xmlConfig.newCacheConfigurationBuilderFromTemplate(template,
 String.class, SecurityToken.class);


[cxf] branch master updated: [CXF-8566] cxf-ws-rt-security & ehcache: OSGi classloading

2021-08-26 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/master by this push:
 new 47db1b5  [CXF-8566] cxf-ws-rt-security & ehcache: OSGi classloading
 new 45f92e8  Merge pull request #837 from jgreffe/bugfix/master/CXF-8566
47db1b5 is described below

commit 47db1b5843e92493b9619887588d41edb19acb84
Author: Julien Greffe <36693362+jgre...@users.noreply.github.com>
AuthorDate: Thu Aug 26 17:32:02 2021 +0200

[CXF-8566] cxf-ws-rt-security & ehcache: OSGi classloading
---
 .../apache/cxf/ws/security/tokenstore/EHCacheTokenStore.java  | 11 +--
 1 file changed, 9 insertions(+), 2 deletions(-)

diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/tokenstore/EHCacheTokenStore.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/tokenstore/EHCacheTokenStore.java
index 1ddac82..80b890f 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/tokenstore/EHCacheTokenStore.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/tokenstore/EHCacheTokenStore.java
@@ -22,7 +22,9 @@ package org.apache.cxf.ws.security.tokenstore;
 import java.io.Closeable;
 import java.net.URL;
 import java.util.Collection;
+import java.util.HashMap;
 import java.util.HashSet;
+import java.util.Map;
 import java.util.Set;
 
 import org.apache.cxf.Bus;
@@ -34,6 +36,7 @@ import org.ehcache.CacheManager;
 import org.ehcache.Status;
 import org.ehcache.config.builders.CacheConfigurationBuilder;
 import org.ehcache.config.builders.CacheManagerBuilder;
+import org.ehcache.core.util.ClassLoading;
 import org.ehcache.xml.XmlConfiguration;
 
 /**
@@ -54,14 +57,18 @@ public class EHCacheTokenStore implements TokenStore, 
Closeable, BusLifeCycleLis
 
 this.key = key;
 try {
-XmlConfiguration xmlConfig = new XmlConfiguration(configFileURL);
-
 // Exclude the endpoint info bit added in TokenStoreUtils when 
getting the template name
 String template = key;
 if (template.contains("-")) {
 template = key.substring(0, key.lastIndexOf('-'));
 }
 
+// Set class loader cache of template object to SecurityToken 
classloader
+Map cacheClassLoaders = new HashMap<>();
+cacheClassLoaders.put(template, 
SecurityToken.class.getClassLoader());
+XmlConfiguration xmlConfig = new XmlConfiguration(configFileURL, 
ClassLoading.getDefaultClassLoader(),
+cacheClassLoaders);
+
 CacheConfigurationBuilder 
configurationBuilder =
 
xmlConfig.newCacheConfigurationBuilderFromTemplate(template,
 String.class, SecurityToken.class);


[cxf] branch 3.4.x-fixes updated: [CXF-8582]Add "CXF Additional Configuration" properties also as part of spring-configuration-metadata.json in cxf-spring-boot-autoconfigure.

2021-08-18 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.4.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.4.x-fixes by this push:
 new 56db0e2  [CXF-8582]Add "CXF Additional Configuration" properties also 
as part of spring-configuration-metadata.json in cxf-spring-boot-autoconfigure.
56db0e2 is described below

commit 56db0e20295f6edc140adeb631903dc7d0c66690
Author: Freeman Fang 
AuthorDate: Wed Aug 18 11:12:55 2021 -0400

[CXF-8582]Add "CXF Additional Configuration" properties also as part of 
spring-configuration-metadata.json in cxf-spring-boot-autoconfigure.

(cherry picked from commit bfb59ed997a5218156cff1b98fd6325103ff9cb4)
---
 .../spring/boot/autoconfigure/CxfProperties.java   | 94 ++
 1 file changed, 94 insertions(+)

diff --git 
a/integration/spring-boot/autoconfigure/src/main/java/org/apache/cxf/spring/boot/autoconfigure/CxfProperties.java
 
b/integration/spring-boot/autoconfigure/src/main/java/org/apache/cxf/spring/boot/autoconfigure/CxfProperties.java
index 709ada5..0dd84c7 100644
--- 
a/integration/spring-boot/autoconfigure/src/main/java/org/apache/cxf/spring/boot/autoconfigure/CxfProperties.java
+++ 
b/integration/spring-boot/autoconfigure/src/main/java/org/apache/cxf/spring/boot/autoconfigure/CxfProperties.java
@@ -44,6 +44,8 @@ public class CxfProperties {
 private final Servlet servlet = new Servlet();
 
 private final Metrics metrics = new Metrics();
+
+private final JaxrsScan jaxrs = new JaxrsScan();
 
 @NotNull
 @Pattern(regexp = "/[^?#]*", message = "Path must start with /")
@@ -62,6 +64,10 @@ public class CxfProperties {
 public Metrics getMetrics() {
 return this.metrics;
 }
+
+public JaxrsScan getJaxrs() {
+return this.jaxrs;
+}
 
 public static class Servlet {
 
@@ -205,5 +211,93 @@ public class CxfProperties {
 }
 
 }
+
+public static class JaxrsScan {
+
+
+
+/**
+ * property to create a JAX-RS endpoint from the auto-discovered 
JAX-RS 
+ * root resources and provider classes. Such classes do not have to be 
+ * annotated with Spring @Component. This property needs to be 
accompanied 
+ * by a "cxf.jaxrs.classes-scan-packages" property which sets a 
comma-separated 
+ * list of the packages to scan.
+ */
+private boolean classesScan;
+
+/**
+ * property to create a JAX-RS endpoint from the auto-discovered 
+ * JAX-RS root resources and providers which are marked as Spring 
+ * Components (annotated with Spring @Component or created and 
+ * returned from @Bean methods).
+ */
+private boolean componentScan;
+
+/**
+ * property to restrict which of the auto-discovered Spring components
+ * are accepted as JAX-RS resource or provider classes. It sets a 
+ * comma-separated list of the packages that a given bean instance's 
+ * class must be in. Note, this property, if set, is only effective
+ * if a given bean is a singleton. It can be used alongside or as
+ * an alternative to the "cxf.jaxrs.component-scan-beans" property. 
+ */
+private String componentScanPackages;
+
+/**
+ * property to restrict which of the auto-discovered Spring components 
+ * are accepted as JAX-RS resource or provider classes. It sets a 
+ * comma-separated list of the accepted bean names - the 
auto-discovered 
+ * component will only be accepted if its bean name is in this list. 
+ * It can be used alongside or as an alternative to the 
+ * "cxf.jaxrs.component-scan-packages" property.  
+ */
+private String componentScanBeans;
+
+private String classesScanPackages;
+
+
+public boolean isComponentScan() {
+return componentScan;
+}
+
+public void setComponentScan(boolean componentScan) {
+this.componentScan = componentScan;
+}
+
+public String getComponentScanPackages() {
+return componentScanPackages;
+}
+
+public void setComponentScanPackages(String componentScanPackages) {
+this.componentScanPackages = componentScanPackages;
+}
+
+public String getComponentScanBeans() {
+return componentScanBeans;
+}
+
+public void setComponentScanBeans(String componentScanBeans) {
+this.componentScanBeans = componentScanBeans;
+}
+
+public boolean isClassesScan() {
+return classesScan;
+}
+
+public void setClassesScan(boolean classesScan) {
+this.classesScan = c

[cxf] branch master updated: [CXF-8582]Add "CXF Additional Configuration" properties also as part of spring-configuration-metadata.json in cxf-spring-boot-autoconfigure.

2021-08-18 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/master by this push:
 new bfb59ed  [CXF-8582]Add "CXF Additional Configuration" properties also 
as part of spring-configuration-metadata.json in cxf-spring-boot-autoconfigure.
 new d8e1317  Merge branch 'master' of github.com:apache/cxf
bfb59ed is described below

commit bfb59ed997a5218156cff1b98fd6325103ff9cb4
Author: Freeman Fang 
AuthorDate: Wed Aug 18 11:12:55 2021 -0400

[CXF-8582]Add "CXF Additional Configuration" properties also as part of 
spring-configuration-metadata.json in cxf-spring-boot-autoconfigure.
---
 .../spring/boot/autoconfigure/CxfProperties.java   | 94 ++
 1 file changed, 94 insertions(+)

diff --git 
a/integration/spring-boot/autoconfigure/src/main/java/org/apache/cxf/spring/boot/autoconfigure/CxfProperties.java
 
b/integration/spring-boot/autoconfigure/src/main/java/org/apache/cxf/spring/boot/autoconfigure/CxfProperties.java
index 709ada5..0dd84c7 100644
--- 
a/integration/spring-boot/autoconfigure/src/main/java/org/apache/cxf/spring/boot/autoconfigure/CxfProperties.java
+++ 
b/integration/spring-boot/autoconfigure/src/main/java/org/apache/cxf/spring/boot/autoconfigure/CxfProperties.java
@@ -44,6 +44,8 @@ public class CxfProperties {
 private final Servlet servlet = new Servlet();
 
 private final Metrics metrics = new Metrics();
+
+private final JaxrsScan jaxrs = new JaxrsScan();
 
 @NotNull
 @Pattern(regexp = "/[^?#]*", message = "Path must start with /")
@@ -62,6 +64,10 @@ public class CxfProperties {
 public Metrics getMetrics() {
 return this.metrics;
 }
+
+public JaxrsScan getJaxrs() {
+return this.jaxrs;
+}
 
 public static class Servlet {
 
@@ -205,5 +211,93 @@ public class CxfProperties {
 }
 
 }
+
+public static class JaxrsScan {
+
+
+
+/**
+ * property to create a JAX-RS endpoint from the auto-discovered 
JAX-RS 
+ * root resources and provider classes. Such classes do not have to be 
+ * annotated with Spring @Component. This property needs to be 
accompanied 
+ * by a "cxf.jaxrs.classes-scan-packages" property which sets a 
comma-separated 
+ * list of the packages to scan.
+ */
+private boolean classesScan;
+
+/**
+ * property to create a JAX-RS endpoint from the auto-discovered 
+ * JAX-RS root resources and providers which are marked as Spring 
+ * Components (annotated with Spring @Component or created and 
+ * returned from @Bean methods).
+ */
+private boolean componentScan;
+
+/**
+ * property to restrict which of the auto-discovered Spring components
+ * are accepted as JAX-RS resource or provider classes. It sets a 
+ * comma-separated list of the packages that a given bean instance's 
+ * class must be in. Note, this property, if set, is only effective
+ * if a given bean is a singleton. It can be used alongside or as
+ * an alternative to the "cxf.jaxrs.component-scan-beans" property. 
+ */
+private String componentScanPackages;
+
+/**
+ * property to restrict which of the auto-discovered Spring components 
+ * are accepted as JAX-RS resource or provider classes. It sets a 
+ * comma-separated list of the accepted bean names - the 
auto-discovered 
+ * component will only be accepted if its bean name is in this list. 
+ * It can be used alongside or as an alternative to the 
+ * "cxf.jaxrs.component-scan-packages" property.  
+ */
+private String componentScanBeans;
+
+private String classesScanPackages;
+
+
+public boolean isComponentScan() {
+return componentScan;
+}
+
+public void setComponentScan(boolean componentScan) {
+this.componentScan = componentScan;
+}
+
+public String getComponentScanPackages() {
+return componentScanPackages;
+}
+
+public void setComponentScanPackages(String componentScanPackages) {
+this.componentScanPackages = componentScanPackages;
+}
+
+public String getComponentScanBeans() {
+return componentScanBeans;
+}
+
+public void setComponentScanBeans(String componentScanBeans) {
+this.componentScanBeans = componentScanBeans;
+}
+
+public boolean isClassesScan() {
+return classesScan;
+}
+
+public void setClassesScan(boolean classesScan) {
+this.classesScan = classesScan;
+}
+

[cxf] branch 3.3.x-fixes updated: [CXF-8570]a test to demonstrate how to configure JAXRSClientFactoryBean with org.apache.cxf.feature.Feature to enable Client Cache

2021-07-29 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.3.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.3.x-fixes by this push:
 new 0bf9f01  [CXF-8570]a test to demonstrate how to configure 
JAXRSClientFactoryBean with org.apache.cxf.feature.Feature to enable Client 
Cache
0bf9f01 is described below

commit 0bf9f01c94cf9a73525f24545473419ac3a03c38
Author: Freeman Fang 
AuthorDate: Thu Jul 29 11:54:16 2021 -0400

[CXF-8570]a test to demonstrate how to configure JAXRSClientFactoryBean 
with org.apache.cxf.feature.Feature to enable Client Cache

(cherry picked from commit 15619e15e95a42164e146fad11a9fedf0d982a05)
(cherry picked from commit 2ef7652ea9374c85e12fea7d8beca8d114694f1a)
---
 .../jaxrs/client/cache/CXFCacheControlFeature.java | 163 +
 .../cxf/jaxrs/client/cache/ClientCacheTest.java|  38 +
 2 files changed, 201 insertions(+)

diff --git 
a/rt/rs/client/src/test/java/org/apache/cxf/jaxrs/client/cache/CXFCacheControlFeature.java
 
b/rt/rs/client/src/test/java/org/apache/cxf/jaxrs/client/cache/CXFCacheControlFeature.java
new file mode 100644
index 000..75cd17a
--- /dev/null
+++ 
b/rt/rs/client/src/test/java/org/apache/cxf/jaxrs/client/cache/CXFCacheControlFeature.java
@@ -0,0 +1,163 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+package org.apache.cxf.jaxrs.client.cache;
+
+import java.io.Closeable;
+import java.net.URI;
+import java.net.URISyntaxException;
+import java.util.ArrayList;
+import java.util.Arrays;
+import java.util.HashMap;
+import java.util.List;
+import java.util.Map;
+import java.util.Properties;
+
+import javax.annotation.PreDestroy;
+import javax.cache.Cache;
+import javax.cache.CacheManager;
+import javax.cache.Caching;
+import javax.cache.configuration.Factory;
+import javax.cache.configuration.MutableConfiguration;
+import javax.cache.expiry.ExpiryPolicy;
+import javax.cache.integration.CacheLoader;
+import javax.cache.integration.CacheWriter;
+import javax.cache.spi.CachingProvider;
+
+import org.apache.cxf.Bus;
+import org.apache.cxf.feature.AbstractFeature;
+import org.apache.cxf.interceptor.InterceptorProvider;
+
+
+public class CXFCacheControlFeature extends AbstractFeature {
+
+private static final String BUS_PROVIDERS = 
"org.apache.cxf.jaxrs.bus.providers";
+private CachingProvider provider;
+private CacheManager manager;
+private Cache cache;
+private boolean cacheResponseInputStream;
+
+public CXFCacheControlFeature(boolean cacheStream) {
+this.cacheResponseInputStream = cacheStream;
+}
+
+public CXFCacheControlFeature() {
+}
+
+protected void initializeProvider(InterceptorProvider interceptorProvider, 
Bus bus) {
+if (bus != null) {
+List providerList = new ArrayList();
+providerList.add(this.createCacheControlClientReaderInterceptor());
+providerList.add(this.createCacheControlClientRequestFilter());
+bus.setProperty(BUS_PROVIDERS, providerList);
+}
+}
+
+
+public CacheControlClientRequestFilter 
createCacheControlClientRequestFilter() {
+if (cache == null) {
+cache = createCache(new HashMap());
+}
+return new CacheControlClientRequestFilter(cache);
+}
+
+public CacheControlClientReaderInterceptor 
createCacheControlClientReaderInterceptor() {
+if (cache == null) {
+cache = createCache(new HashMap());
+}
+CacheControlClientReaderInterceptor reader = new 
CacheControlClientReaderInterceptor(cache);
+reader.setCacheResponseInputStream(cacheResponseInputStream);
+return reader;
+}
+
+@PreDestroy // TODO: check it is called
+public void close() {
+for (final Closeable c : Arrays.asList(cache, manager, provider)) {
+try {
+if (c != null) {
+c.close();
+}
+} catch (final Exception e) {
+// no-op
+}
+}
+
+}
+
+private Cache cre

[cxf] branch 3.4.x-fixes updated: [CXF-8570]a test to demonstrate how to configure JAXRSClientFactoryBean with org.apache.cxf.feature.Feature to enable Client Cache

2021-07-29 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.4.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.4.x-fixes by this push:
 new 2ef7652  [CXF-8570]a test to demonstrate how to configure 
JAXRSClientFactoryBean with org.apache.cxf.feature.Feature to enable Client 
Cache
2ef7652 is described below

commit 2ef7652ea9374c85e12fea7d8beca8d114694f1a
Author: Freeman Fang 
AuthorDate: Thu Jul 29 11:54:16 2021 -0400

[CXF-8570]a test to demonstrate how to configure JAXRSClientFactoryBean 
with org.apache.cxf.feature.Feature to enable Client Cache

(cherry picked from commit 15619e15e95a42164e146fad11a9fedf0d982a05)
---
 .../jaxrs/client/cache/CXFCacheControlFeature.java | 163 +
 .../cxf/jaxrs/client/cache/ClientCacheTest.java|  38 +
 2 files changed, 201 insertions(+)

diff --git 
a/rt/rs/client/src/test/java/org/apache/cxf/jaxrs/client/cache/CXFCacheControlFeature.java
 
b/rt/rs/client/src/test/java/org/apache/cxf/jaxrs/client/cache/CXFCacheControlFeature.java
new file mode 100644
index 000..75cd17a
--- /dev/null
+++ 
b/rt/rs/client/src/test/java/org/apache/cxf/jaxrs/client/cache/CXFCacheControlFeature.java
@@ -0,0 +1,163 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+package org.apache.cxf.jaxrs.client.cache;
+
+import java.io.Closeable;
+import java.net.URI;
+import java.net.URISyntaxException;
+import java.util.ArrayList;
+import java.util.Arrays;
+import java.util.HashMap;
+import java.util.List;
+import java.util.Map;
+import java.util.Properties;
+
+import javax.annotation.PreDestroy;
+import javax.cache.Cache;
+import javax.cache.CacheManager;
+import javax.cache.Caching;
+import javax.cache.configuration.Factory;
+import javax.cache.configuration.MutableConfiguration;
+import javax.cache.expiry.ExpiryPolicy;
+import javax.cache.integration.CacheLoader;
+import javax.cache.integration.CacheWriter;
+import javax.cache.spi.CachingProvider;
+
+import org.apache.cxf.Bus;
+import org.apache.cxf.feature.AbstractFeature;
+import org.apache.cxf.interceptor.InterceptorProvider;
+
+
+public class CXFCacheControlFeature extends AbstractFeature {
+
+private static final String BUS_PROVIDERS = 
"org.apache.cxf.jaxrs.bus.providers";
+private CachingProvider provider;
+private CacheManager manager;
+private Cache cache;
+private boolean cacheResponseInputStream;
+
+public CXFCacheControlFeature(boolean cacheStream) {
+this.cacheResponseInputStream = cacheStream;
+}
+
+public CXFCacheControlFeature() {
+}
+
+protected void initializeProvider(InterceptorProvider interceptorProvider, 
Bus bus) {
+if (bus != null) {
+List providerList = new ArrayList();
+providerList.add(this.createCacheControlClientReaderInterceptor());
+providerList.add(this.createCacheControlClientRequestFilter());
+bus.setProperty(BUS_PROVIDERS, providerList);
+}
+}
+
+
+public CacheControlClientRequestFilter 
createCacheControlClientRequestFilter() {
+if (cache == null) {
+cache = createCache(new HashMap());
+}
+return new CacheControlClientRequestFilter(cache);
+}
+
+public CacheControlClientReaderInterceptor 
createCacheControlClientReaderInterceptor() {
+if (cache == null) {
+cache = createCache(new HashMap());
+}
+CacheControlClientReaderInterceptor reader = new 
CacheControlClientReaderInterceptor(cache);
+reader.setCacheResponseInputStream(cacheResponseInputStream);
+return reader;
+}
+
+@PreDestroy // TODO: check it is called
+public void close() {
+for (final Closeable c : Arrays.asList(cache, manager, provider)) {
+try {
+if (c != null) {
+c.close();
+}
+} catch (final Exception e) {
+// no-op
+}
+}
+
+}
+
+private Cache createCache(final Map 
properties) {
+final Pro

[cxf] branch master updated: [CXF-8570]a test to demonstrate how to configure JAXRSClientFactoryBean with org.apache.cxf.feature.Feature to enable Client Cache

2021-07-29 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/master by this push:
 new 15619e1  [CXF-8570]a test to demonstrate how to configure 
JAXRSClientFactoryBean with org.apache.cxf.feature.Feature to enable Client 
Cache
15619e1 is described below

commit 15619e15e95a42164e146fad11a9fedf0d982a05
Author: Freeman Fang 
AuthorDate: Thu Jul 29 11:54:16 2021 -0400

[CXF-8570]a test to demonstrate how to configure JAXRSClientFactoryBean 
with org.apache.cxf.feature.Feature to enable Client Cache
---
 .../jaxrs/client/cache/CXFCacheControlFeature.java | 163 +
 .../cxf/jaxrs/client/cache/ClientCacheTest.java|  38 +
 2 files changed, 201 insertions(+)

diff --git 
a/rt/rs/client/src/test/java/org/apache/cxf/jaxrs/client/cache/CXFCacheControlFeature.java
 
b/rt/rs/client/src/test/java/org/apache/cxf/jaxrs/client/cache/CXFCacheControlFeature.java
new file mode 100644
index 000..75cd17a
--- /dev/null
+++ 
b/rt/rs/client/src/test/java/org/apache/cxf/jaxrs/client/cache/CXFCacheControlFeature.java
@@ -0,0 +1,163 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+package org.apache.cxf.jaxrs.client.cache;
+
+import java.io.Closeable;
+import java.net.URI;
+import java.net.URISyntaxException;
+import java.util.ArrayList;
+import java.util.Arrays;
+import java.util.HashMap;
+import java.util.List;
+import java.util.Map;
+import java.util.Properties;
+
+import javax.annotation.PreDestroy;
+import javax.cache.Cache;
+import javax.cache.CacheManager;
+import javax.cache.Caching;
+import javax.cache.configuration.Factory;
+import javax.cache.configuration.MutableConfiguration;
+import javax.cache.expiry.ExpiryPolicy;
+import javax.cache.integration.CacheLoader;
+import javax.cache.integration.CacheWriter;
+import javax.cache.spi.CachingProvider;
+
+import org.apache.cxf.Bus;
+import org.apache.cxf.feature.AbstractFeature;
+import org.apache.cxf.interceptor.InterceptorProvider;
+
+
+public class CXFCacheControlFeature extends AbstractFeature {
+
+private static final String BUS_PROVIDERS = 
"org.apache.cxf.jaxrs.bus.providers";
+private CachingProvider provider;
+private CacheManager manager;
+private Cache cache;
+private boolean cacheResponseInputStream;
+
+public CXFCacheControlFeature(boolean cacheStream) {
+this.cacheResponseInputStream = cacheStream;
+}
+
+public CXFCacheControlFeature() {
+}
+
+protected void initializeProvider(InterceptorProvider interceptorProvider, 
Bus bus) {
+if (bus != null) {
+List providerList = new ArrayList();
+providerList.add(this.createCacheControlClientReaderInterceptor());
+providerList.add(this.createCacheControlClientRequestFilter());
+bus.setProperty(BUS_PROVIDERS, providerList);
+}
+}
+
+
+public CacheControlClientRequestFilter 
createCacheControlClientRequestFilter() {
+if (cache == null) {
+cache = createCache(new HashMap());
+}
+return new CacheControlClientRequestFilter(cache);
+}
+
+public CacheControlClientReaderInterceptor 
createCacheControlClientReaderInterceptor() {
+if (cache == null) {
+cache = createCache(new HashMap());
+}
+CacheControlClientReaderInterceptor reader = new 
CacheControlClientReaderInterceptor(cache);
+reader.setCacheResponseInputStream(cacheResponseInputStream);
+return reader;
+}
+
+@PreDestroy // TODO: check it is called
+public void close() {
+for (final Closeable c : Arrays.asList(cache, manager, provider)) {
+try {
+if (c != null) {
+c.close();
+}
+} catch (final Exception e) {
+// no-op
+}
+}
+
+}
+
+private Cache createCache(final Map 
properties) {
+final Properties props = new Properties();
+props.putAll(properties);
+
+final String pr

[cxf] branch 3.3.x-fixes updated: [CXF-8569]http-undertow: ensure clear registered paths until destory an undertow server(Port)

2021-07-27 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.3.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.3.x-fixes by this push:
 new 798a02c  [CXF-8569]http-undertow: ensure clear registered paths until 
destory an undertow server(Port)
798a02c is described below

commit 798a02cab5e163257478dbb2b961c4f600c4e175
Author: Freeman Fang 
AuthorDate: Tue Jul 27 13:37:20 2021 -0400

[CXF-8569]http-undertow: ensure clear registered paths until destory an 
undertow server(Port)

(cherry picked from commit d54da7e3c6af4e6c19d712fed2f57c4cf2c54d64)
(cherry picked from commit 00108efc2643f7acb985bdb2b3fd3436ca74723b)
---
 .../apache/cxf/transport/http_undertow/UndertowHTTPServerEngine.java| 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git 
a/rt/transports/http-undertow/src/main/java/org/apache/cxf/transport/http_undertow/UndertowHTTPServerEngine.java
 
b/rt/transports/http-undertow/src/main/java/org/apache/cxf/transport/http_undertow/UndertowHTTPServerEngine.java
index 787e9c3..75b6314 100644
--- 
a/rt/transports/http-undertow/src/main/java/org/apache/cxf/transport/http_undertow/UndertowHTTPServerEngine.java
+++ 
b/rt/transports/http-undertow/src/main/java/org/apache/cxf/transport/http_undertow/UndertowHTTPServerEngine.java
@@ -463,10 +463,10 @@ public class UndertowHTTPServerEngine implements 
ServerEngine {
  * remove it from the factory's cache.
  */
 public void shutdown() {
-registedPaths.clear();
 if (shouldDestroyPort()) {
 if (servantCount == 0) {
 UndertowHTTPServerEngineFactory.destroyForPort(port);
+registedPaths.clear();
 } else {
 LOG.log(Level.WARNING, "FAILED_TO_SHUTDOWN_ENGINE_MSG", port);
 }


[cxf] branch 3.4.x-fixes updated: [CXF-8569]http-undertow: ensure clear registered paths until destory an undertow server(Port)

2021-07-27 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.4.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.4.x-fixes by this push:
 new 00108ef  [CXF-8569]http-undertow: ensure clear registered paths until 
destory an undertow server(Port)
00108ef is described below

commit 00108efc2643f7acb985bdb2b3fd3436ca74723b
Author: Freeman Fang 
AuthorDate: Tue Jul 27 13:37:20 2021 -0400

[CXF-8569]http-undertow: ensure clear registered paths until destory an 
undertow server(Port)

(cherry picked from commit d54da7e3c6af4e6c19d712fed2f57c4cf2c54d64)
---
 .../apache/cxf/transport/http_undertow/UndertowHTTPServerEngine.java| 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git 
a/rt/transports/http-undertow/src/main/java/org/apache/cxf/transport/http_undertow/UndertowHTTPServerEngine.java
 
b/rt/transports/http-undertow/src/main/java/org/apache/cxf/transport/http_undertow/UndertowHTTPServerEngine.java
index 3f3b561..e684f6f 100644
--- 
a/rt/transports/http-undertow/src/main/java/org/apache/cxf/transport/http_undertow/UndertowHTTPServerEngine.java
+++ 
b/rt/transports/http-undertow/src/main/java/org/apache/cxf/transport/http_undertow/UndertowHTTPServerEngine.java
@@ -461,10 +461,10 @@ public class UndertowHTTPServerEngine implements 
ServerEngine {
  * remove it from the factory's cache.
  */
 public void shutdown() {
-registedPaths.clear();
 if (shouldDestroyPort()) {
 if (servantCount == 0) {
 UndertowHTTPServerEngineFactory.destroyForPort(port);
+registedPaths.clear();
 } else {
 LOG.log(Level.WARNING, "FAILED_TO_SHUTDOWN_ENGINE_MSG", port);
 }


[cxf] branch master updated: [CXF-8569]http-undertow: ensure clear registered paths until destory an undertow server(Port)

2021-07-27 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/master by this push:
 new d54da7e  [CXF-8569]http-undertow: ensure clear registered paths until 
destory an undertow server(Port)
d54da7e is described below

commit d54da7e3c6af4e6c19d712fed2f57c4cf2c54d64
Author: Freeman Fang 
AuthorDate: Tue Jul 27 13:37:20 2021 -0400

[CXF-8569]http-undertow: ensure clear registered paths until destory an 
undertow server(Port)
---
 .../apache/cxf/transport/http_undertow/UndertowHTTPServerEngine.java| 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git 
a/rt/transports/http-undertow/src/main/java/org/apache/cxf/transport/http_undertow/UndertowHTTPServerEngine.java
 
b/rt/transports/http-undertow/src/main/java/org/apache/cxf/transport/http_undertow/UndertowHTTPServerEngine.java
index 3f3b561..e684f6f 100644
--- 
a/rt/transports/http-undertow/src/main/java/org/apache/cxf/transport/http_undertow/UndertowHTTPServerEngine.java
+++ 
b/rt/transports/http-undertow/src/main/java/org/apache/cxf/transport/http_undertow/UndertowHTTPServerEngine.java
@@ -461,10 +461,10 @@ public class UndertowHTTPServerEngine implements 
ServerEngine {
  * remove it from the factory's cache.
  */
 public void shutdown() {
-registedPaths.clear();
 if (shouldDestroyPort()) {
 if (servantCount == 0) {
 UndertowHTTPServerEngineFactory.destroyForPort(port);
+registedPaths.clear();
 } else {
 LOG.log(Level.WARNING, "FAILED_TO_SHUTDOWN_ENGINE_MSG", port);
 }


[cxf] branch 3.4.x-fixes updated: [CXF-8568] Added overloaded map method, added null check for sensitiveProtocolHeaders in DefaultLogEventMapper

2021-07-24 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.4.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.4.x-fixes by this push:
 new ae4d1de  [CXF-8568] Added overloaded map method, added null check for 
sensitiveProtocolHeaders in DefaultLogEventMapper
ae4d1de is described below

commit ae4d1dec77f3432c85a4a6ddcacaf4540d1a528c
Author: nrickles3 
AuthorDate: Fri Jul 23 13:37:29 2021 -0400

[CXF-8568] Added overloaded map method, added null check for 
sensitiveProtocolHeaders in DefaultLogEventMapper

(cherry picked from commit ed1f43ed348698c9efd94f2e544f06bebf15787a)
---
 .../ext/logging/event/DefaultLogEventMapper.java   |  8 ++-
 .../cxf/ext/logging/DefaultLogEventMapperTest.java | 28 ++
 2 files changed, 35 insertions(+), 1 deletion(-)

diff --git 
a/rt/features/logging/src/main/java/org/apache/cxf/ext/logging/event/DefaultLogEventMapper.java
 
b/rt/features/logging/src/main/java/org/apache/cxf/ext/logging/event/DefaultLogEventMapper.java
index 923f419..dc5b736 100644
--- 
a/rt/features/logging/src/main/java/org/apache/cxf/ext/logging/event/DefaultLogEventMapper.java
+++ 
b/rt/features/logging/src/main/java/org/apache/cxf/ext/logging/event/DefaultLogEventMapper.java
@@ -72,6 +72,10 @@ public class DefaultLogEventMapper {
 }
 }
 
+public LogEvent map(final Message message) {
+return this.map(message, Collections.emptySet());
+}
+
 public LogEvent map(final Message message, final Set 
sensitiveProtocolHeaders) {
 final LogEvent event = new LogEvent();
 event.setMessageId(getMessageId(message));
@@ -90,7 +94,9 @@ public class DefaultLogEventMapper {
 event.setContentType(safeGet(message, Message.CONTENT_TYPE));
 
 Map headerMap = getHeaders(message);
-maskSensitiveHelper.maskHeaders(headerMap, sensitiveProtocolHeaders);
+if (sensitiveProtocolHeaders != null && 
!sensitiveProtocolHeaders.isEmpty()) {
+maskSensitiveHelper.maskHeaders(headerMap, 
sensitiveProtocolHeaders);
+}
 event.setHeaders(headerMap);
 
 event.setAddress(getAddress(message, event));
diff --git 
a/rt/features/logging/src/test/java/org/apache/cxf/ext/logging/DefaultLogEventMapperTest.java
 
b/rt/features/logging/src/test/java/org/apache/cxf/ext/logging/DefaultLogEventMapperTest.java
index 08358cf..9df839e 100644
--- 
a/rt/features/logging/src/test/java/org/apache/cxf/ext/logging/DefaultLogEventMapperTest.java
+++ 
b/rt/features/logging/src/test/java/org/apache/cxf/ext/logging/DefaultLogEventMapperTest.java
@@ -119,4 +119,32 @@ public class DefaultLogEventMapperTest {
 assertEquals(MASKED_HEADER_VALUE, 
event.getHeaders().get(TEST_HEADER_NAME));
 }
 
+@Test
+public void testMapNullSensitiveProtocolHeaders() {
+DefaultLogEventMapper mapper = new DefaultLogEventMapper();
+Message message = new MessageImpl();
+message.put(Message.HTTP_REQUEST_METHOD, "POST");
+message.put(Message.REQUEST_URI, "nullTest");
+Exchange exchange = new ExchangeImpl();
+message.setExchange(exchange);
+
+LogEvent event = mapper.map(message, null);
+
+assertEquals("POST[nullTest]", event.getOperationName());
+}
+
+@Test
+public void testMap() {
+DefaultLogEventMapper mapper = new DefaultLogEventMapper();
+Message message = new MessageImpl();
+message.put(Message.HTTP_REQUEST_METHOD, "PUT");
+message.put(Message.REQUEST_URI, "test");
+Exchange exchange = new ExchangeImpl();
+message.setExchange(exchange);
+
+LogEvent event = mapper.map(message);
+
+assertEquals("PUT[test]", event.getOperationName());
+}
+
 }


[cxf] branch master updated: [CXF-8568] Added overloaded map method, added null check for sensitiveProtocolHeaders in DefaultLogEventMapper

2021-07-24 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/master by this push:
 new ed1f43e  [CXF-8568] Added overloaded map method, added null check for 
sensitiveProtocolHeaders in DefaultLogEventMapper
 new a7f190a  Merge pull request #829 from nrickles3/CXF-8568
ed1f43e is described below

commit ed1f43ed348698c9efd94f2e544f06bebf15787a
Author: nrickles3 
AuthorDate: Fri Jul 23 13:37:29 2021 -0400

[CXF-8568] Added overloaded map method, added null check for 
sensitiveProtocolHeaders in DefaultLogEventMapper
---
 .../ext/logging/event/DefaultLogEventMapper.java   |  8 ++-
 .../cxf/ext/logging/DefaultLogEventMapperTest.java | 28 ++
 2 files changed, 35 insertions(+), 1 deletion(-)

diff --git 
a/rt/features/logging/src/main/java/org/apache/cxf/ext/logging/event/DefaultLogEventMapper.java
 
b/rt/features/logging/src/main/java/org/apache/cxf/ext/logging/event/DefaultLogEventMapper.java
index d6a939f..c084e5f 100644
--- 
a/rt/features/logging/src/main/java/org/apache/cxf/ext/logging/event/DefaultLogEventMapper.java
+++ 
b/rt/features/logging/src/main/java/org/apache/cxf/ext/logging/event/DefaultLogEventMapper.java
@@ -72,6 +72,10 @@ public class DefaultLogEventMapper {
 }
 }
 
+public LogEvent map(final Message message) {
+return this.map(message, Collections.emptySet());
+}
+
 public LogEvent map(final Message message, final Set 
sensitiveProtocolHeaders) {
 final LogEvent event = new LogEvent();
 event.setMessageId(getMessageId(message));
@@ -90,7 +94,9 @@ public class DefaultLogEventMapper {
 event.setContentType(safeGet(message, Message.CONTENT_TYPE));
 
 Map headerMap = getHeaders(message);
-maskSensitiveHelper.maskHeaders(headerMap, sensitiveProtocolHeaders);
+if (sensitiveProtocolHeaders != null && 
!sensitiveProtocolHeaders.isEmpty()) {
+maskSensitiveHelper.maskHeaders(headerMap, 
sensitiveProtocolHeaders);
+}
 event.setHeaders(headerMap);
 
 event.setAddress(getAddress(message, event));
diff --git 
a/rt/features/logging/src/test/java/org/apache/cxf/ext/logging/DefaultLogEventMapperTest.java
 
b/rt/features/logging/src/test/java/org/apache/cxf/ext/logging/DefaultLogEventMapperTest.java
index 08358cf..9df839e 100644
--- 
a/rt/features/logging/src/test/java/org/apache/cxf/ext/logging/DefaultLogEventMapperTest.java
+++ 
b/rt/features/logging/src/test/java/org/apache/cxf/ext/logging/DefaultLogEventMapperTest.java
@@ -119,4 +119,32 @@ public class DefaultLogEventMapperTest {
 assertEquals(MASKED_HEADER_VALUE, 
event.getHeaders().get(TEST_HEADER_NAME));
 }
 
+@Test
+public void testMapNullSensitiveProtocolHeaders() {
+DefaultLogEventMapper mapper = new DefaultLogEventMapper();
+Message message = new MessageImpl();
+message.put(Message.HTTP_REQUEST_METHOD, "POST");
+message.put(Message.REQUEST_URI, "nullTest");
+Exchange exchange = new ExchangeImpl();
+message.setExchange(exchange);
+
+LogEvent event = mapper.map(message, null);
+
+assertEquals("POST[nullTest]", event.getOperationName());
+}
+
+@Test
+public void testMap() {
+DefaultLogEventMapper mapper = new DefaultLogEventMapper();
+Message message = new MessageImpl();
+message.put(Message.HTTP_REQUEST_METHOD, "PUT");
+message.put(Message.REQUEST_URI, "test");
+Exchange exchange = new ExchangeImpl();
+message.setExchange(exchange);
+
+LogEvent event = mapper.map(message);
+
+assertEquals("PUT[test]", event.getOperationName());
+}
+
 }


[cxf] 02/02: [CXF-8565] Add support for requests with no body to the netty client transport There were several issues with the netty client transport:

2021-07-21 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.4.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git

commit bb7754baeb5e839061249ba32a48ba5f83bcb5e3
Author: Tim Ward 
AuthorDate: Wed Jul 21 14:47:59 2021 +0100

[CXF-8565] Add support for requests with no body to the netty client 
transport
There were several issues with the netty client transport:

* Several NPE locations due to setting or removing null headers
* No call to connect when there is no OutputStream to write a body
* No call to write the request when there is no OutputStream to close

Signed-off-by: Tim Ward 
(cherry picked from commit fc5b8fd8689815ee3bff284b89ac8d9cb897e83b)
---
 .../http/netty/client/NettyHttpConduit.java| 62 +++---
 1 file changed, 54 insertions(+), 8 deletions(-)

diff --git 
a/rt/transports/http-netty/netty-client/src/main/java/org/apache/cxf/transport/http/netty/client/NettyHttpConduit.java
 
b/rt/transports/http-netty/netty-client/src/main/java/org/apache/cxf/transport/http/netty/client/NettyHttpConduit.java
index f5d4e7a..cd358d4 100644
--- 
a/rt/transports/http-netty/netty-client/src/main/java/org/apache/cxf/transport/http/netty/client/NettyHttpConduit.java
+++ 
b/rt/transports/http-netty/netty-client/src/main/java/org/apache/cxf/transport/http/netty/client/NettyHttpConduit.java
@@ -32,6 +32,8 @@ import java.net.URI;
 import java.net.URISyntaxException;
 import java.security.Principal;
 import java.security.cert.Certificate;
+import java.util.Arrays;
+import java.util.HashSet;
 import java.util.List;
 import java.util.Map;
 import java.util.Set;
@@ -78,6 +80,9 @@ public class NettyHttpConduit extends 
URLConnectionHTTPConduit implements BusLif
 public static final String MAX_RESPONSE_CONTENT_LENGTH =
 "org.apache.cxf.transport.http.netty.maxResponseContentLength";
 static final Integer DEFAULT_MAX_RESPONSE_CONTENT_LENGTH = 1048576;
+private static final Set KNOWN_HTTP_VERBS_WITH_NO_CONTENT =
+new HashSet<>(Arrays.asList(new String[]{"GET", "HEAD", "OPTIONS", 
"TRACE"}));
+
 final NettyHttpConduitFactory factory;
 private Bootstrap bootstrap;
 
@@ -197,7 +202,10 @@ public class NettyHttpConduit extends 
URLConnectionHTTPConduit implements BusLif
 entity.createRequest(out.getOutBuffer());
 // TODO need to check how to set the Chunked feature
 //request.getRequest().setChunked(true);
-entity.getRequest().headers().set(Message.CONTENT_TYPE, 
message.get(Message.CONTENT_TYPE));
+Object contentType = message.get(Message.CONTENT_TYPE);
+if (contentType != null) {
+entity.getRequest().headers().set(Message.CONTENT_TYPE, 
contentType);
+}
 return out;
 }
 return super.createOutputStream(message, needToCacheRequest, 
isChunking, chunkThreshold);
@@ -314,7 +322,7 @@ public class NettyHttpConduit extends 
URLConnectionHTTPConduit implements BusLif
 
 synchronized (entity) {
 Channel syncChannel = getChannel();
-ChannelFuture channelFuture = 
syncChannel.write(entity);
+ChannelFuture channelFuture = 
syncChannel.writeAndFlush(entity);
 channelFuture.addListener(listener);
 outputStream.close();
 }
@@ -328,6 +336,11 @@ public class NettyHttpConduit extends 
URLConnectionHTTPConduit implements BusLif
 wrappedStream = cachedStream;
 }
 }
+
+@Override
+protected void handleNoOutput() throws IOException {
+connect(false);
+}
 
 protected TLSClientParameters findTLSClientParameters() {
 TLSClientParameters clientParameters = 
outMessage.get(TLSClientParameters.class);
@@ -378,11 +391,6 @@ public class NettyHttpConduit extends 
URLConnectionHTTPConduit implements BusLif
 
 connFuture.addListener(listener);
 
-if (!output) {
-entity.getRequest().headers().remove("Transfer-Encoding");
-entity.getRequest().headers().remove("Content-Type");
-entity.getRequest().headers().remove(null);
-}
 
 // setup the CxfResponseCallBack
 CxfResponseCallBack callBack = new CxfResponseCallBack() {
@@ -398,6 +406,29 @@ public class NettyHttpConduit extends 
URLConnectionHTTPConduit implements BusLif
 };
 entity.setCxfResponseCallback(callBack);
 
+if (!output) {
+entity.getRequest().headers().remove("Transfer-Encoding");
+entity.getRequest().headers().remove("Content-Type");
+ 

[cxf] branch 3.4.x-fixes updated (f0c87b6 -> bb7754b)

2021-07-21 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a change to branch 3.4.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git.


from f0c87b6  Update Dropwizard Metrics to 4.1.25
 new 817b10b  [CXF-8565] A failing test demonstrating the Netty Transport 
NPE A simple GET request with no body triggers an NPE because there is no 
content type for the request, and CXF tries to set a null Content-Type in the 
Netty Request Also add a test with a body, to ensure that Netty works reliably 
there as well
 new bb7754b  [CXF-8565] Add support for requests with no body to the netty 
client transport There were several issues with the netty client transport:

The 2 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 .../http/netty/client/NettyHttpConduit.java| 62 +++---
 systests/jaxrs/pom.xml |  6 +++
 .../cxf/systest/jaxrs/JAXRSAsyncClientTest.java| 47 
 3 files changed, 107 insertions(+), 8 deletions(-)


[cxf] 01/02: [CXF-8565] A failing test demonstrating the Netty Transport NPE A simple GET request with no body triggers an NPE because there is no content type for the request, and CXF tries to set a

2021-07-21 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a commit to branch 3.4.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git

commit 817b10b9089f29785e5f74f33e53a49f16dde320
Author: Tim Ward 
AuthorDate: Wed Jul 21 13:52:22 2021 +0100

[CXF-8565] A failing test demonstrating the Netty Transport NPE
A simple GET request with no body triggers an NPE because there is no 
content type for the request, and CXF tries to set a null Content-Type in the 
Netty Request
Also add a test with a body, to ensure that Netty works reliably there as 
well

Signed-off-by: Tim Ward 
(cherry picked from commit e5f1c65f3bb2f0f043fb5572402a3932390b82c6)
---
 systests/jaxrs/pom.xml |  6 +++
 .../cxf/systest/jaxrs/JAXRSAsyncClientTest.java| 47 ++
 2 files changed, 53 insertions(+)

diff --git a/systests/jaxrs/pom.xml b/systests/jaxrs/pom.xml
index 6208ffb..e686094 100644
--- a/systests/jaxrs/pom.xml
+++ b/systests/jaxrs/pom.xml
@@ -259,6 +259,12 @@
 
 
 org.apache.cxf
+cxf-rt-transports-http-netty-client
+${project.version}
+test
+
+
+org.apache.cxf
 cxf-rt-features-logging
 ${project.version}
 test
diff --git 
a/systests/jaxrs/src/test/java/org/apache/cxf/systest/jaxrs/JAXRSAsyncClientTest.java
 
b/systests/jaxrs/src/test/java/org/apache/cxf/systest/jaxrs/JAXRSAsyncClientTest.java
index 3cbf337..15e4c04 100644
--- 
a/systests/jaxrs/src/test/java/org/apache/cxf/systest/jaxrs/JAXRSAsyncClientTest.java
+++ 
b/systests/jaxrs/src/test/java/org/apache/cxf/systest/jaxrs/JAXRSAsyncClientTest.java
@@ -57,9 +57,11 @@ import javax.xml.ws.Holder;
 
 import org.apache.cxf.jaxrs.client.ClientConfiguration;
 import org.apache.cxf.jaxrs.client.JAXRSClientFactory;
+import org.apache.cxf.jaxrs.client.JAXRSClientFactoryBean;
 import org.apache.cxf.jaxrs.client.WebClient;
 import org.apache.cxf.jaxrs.model.AbstractResourceInfo;
 import org.apache.cxf.testutil.common.AbstractBusClientServerTestBase;
+import org.apache.cxf.transport.http.netty.client.NettyHttpTransportFactory;
 import org.apache.cxf.transports.http.configuration.HTTPClientPolicy;
 
 import org.junit.Before;
@@ -478,6 +480,51 @@ public class JAXRSAsyncClientTest extends 
AbstractBusClientServerTestBase {
 assertThat(response.getStatus(), equalTo(404));
 }
 }
+
+@Test
+public void testNettyClientGet() throws Exception {
+final String address = "http://localhost:; + PORT + 
"/bookstore/books/wildcard";
+
+JAXRSClientFactoryBean bean = new JAXRSClientFactoryBean();
+
bean.setTransportId(NettyHttpTransportFactory.DEFAULT_NAMESPACES.get(0));
+bean.setAddress(address);
+
+WebClient webClient = bean.createWebClient();
+
+try (Response response = webClient
+.to(address, false)
+.accept("text/plain")
+.async()
+.get()
+.get(10, TimeUnit.SECONDS)) {
+assertThat(response.getStatus(), equalTo(200));
+} finally {
+webClient.close();
+}
+}
+
+@Test
+public void testNettyClientDeleteWithBody() throws Exception {
+final String address = "http://localhost:; + PORT + 
"/bookstore/deletebody";
+
+JAXRSClientFactoryBean bean = new JAXRSClientFactoryBean();
+
bean.setTransportId(NettyHttpTransportFactory.DEFAULT_NAMESPACES.get(0));
+bean.setAddress(address);
+
+WebClient webClient = bean.createWebClient();
+
+try {
+Book book = webClient
+.to(address, false)
+.accept("application/xml")
+.async()
+.method("DELETE", Entity.entity(new Book("Delete", 123L), 
"application/xml"), Book.class)
+.get(20, TimeUnit.SECONDS);
+assertEquals("Delete", book.getName());
+} finally {
+webClient.close();
+}
+}
 
 private WebClient createWebClient(String address) {
 return WebClient.create(address);


[cxf] branch master updated (2d2b644 -> 248c7da)

2021-07-21 Thread ffang
This is an automated email from the ASF dual-hosted git repository.

ffang pushed a change to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git.


from 2d2b644  [CXF-8564]upgrade to KARAF 4.3.3 to support JDK17-EA
 new e5f1c65  [CXF-8565] A failing test demonstrating the Netty Transport 
NPE A simple GET request with no body triggers an NPE because there is no 
content type for the request, and CXF tries to set a null Content-Type in the 
Netty Request Also add a test with a body, to ensure that Netty works reliably 
there as well
 new fc5b8fd  [CXF-8565] Add support for requests with no body to the netty 
client transport There were several issues with the netty client transport:
 new 248c7da  Merge pull request #828 from timothyjward/fix/netty-client

The 16434 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 .../http/netty/client/NettyHttpConduit.java| 62 +++---
 systests/jaxrs/pom.xml |  6 +++
 .../cxf/systest/jaxrs/JAXRSAsyncClientTest.java| 47 
 3 files changed, 107 insertions(+), 8 deletions(-)


  1   2   3   4   5   6   7   8   9   10   >