buildbot failure in on cxf-site-production

2019-04-03 Thread buildbot
The Buildbot has detected a new failure on builder cxf-site-production while 
building . Full details are available at:
https://ci.apache.org/builders/cxf-site-production/builds/31339

Buildbot URL: https://ci.apache.org/

Buildslave for this Build: bb-cms-slave

Build Reason: The Nightly scheduler named 'cxf-site-production' triggered this 
build
Build Source Stamp: [branch cxf/web] HEAD
Blamelist: 

BUILD FAILED: failed compile

Sincerely,
 -The Buildbot





buildbot success in on cxf-site-production

2019-04-03 Thread buildbot
The Buildbot has detected a restored build on builder cxf-site-production while 
building . Full details are available at:
https://ci.apache.org/builders/cxf-site-production/builds/31325

Buildbot URL: https://ci.apache.org/

Buildslave for this Build: bb-cms-slave

Build Reason: The Nightly scheduler named 'cxf-site-production' triggered this 
build
Build Source Stamp: [branch cxf/web] HEAD
Blamelist: 

Build succeeded!

Sincerely,
 -The Buildbot





buildbot failure in on cxf-site-production

2019-04-03 Thread buildbot
The Buildbot has detected a new failure on builder cxf-site-production while 
building . Full details are available at:
https://ci.apache.org/builders/cxf-site-production/builds/31324

Buildbot URL: https://ci.apache.org/

Buildslave for this Build: bb-cms-slave

Build Reason: The Nightly scheduler named 'cxf-site-production' triggered this 
build
Build Source Stamp: [branch cxf/web] HEAD
Blamelist: 

BUILD FAILED: failed compile

Sincerely,
 -The Buildbot





[cxf] branch 3.2.x-fixes updated: Recording .gitmergeinfo Changes

2019-04-03 Thread coheigea
This is an automated email from the ASF dual-hosted git repository.

coheigea pushed a commit to branch 3.2.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.2.x-fixes by this push:
 new 4b0eef4  Recording .gitmergeinfo Changes
4b0eef4 is described below

commit 4b0eef4d0bd4da3cd790eec299b62af68261cba7
Author: Colm O hEigeartaigh 
AuthorDate: Wed Apr 3 15:27:25 2019 +0100

Recording .gitmergeinfo Changes
---
 .gitmergeinfo | 1 +
 1 file changed, 1 insertion(+)

diff --git a/.gitmergeinfo b/.gitmergeinfo
index 86668be..5631368 100644
--- a/.gitmergeinfo
+++ b/.gitmergeinfo
@@ -273,6 +273,7 @@ B acc697f1c88f392bd952e07d50a9ae2ce0b76411
 B ad27755270c649ab64f2cec0d3768772ef68fc1f
 B add43c545b831f3b763c66c4f17b8dea5e195e9e
 B ae5625e5ad94fa8da69ee9d69cb6ee89c7d59410
+B ae7c3dcfc7e70b8921f1c1c49734dc11ce0fde40
 B ae994168f50894010f1f148ec3b6f35b17e4b63b
 B af02bff7069c691539de32b361c8a0b083755144
 B af33b2a28c39504388ea370f6849a06d551b4dd1



[cxf] branch master updated: CXF-8010 - Avoid applying the SAAJInInterceptor to unsecured messages when using WS-SecurityPolicy

2019-04-03 Thread coheigea
This is an automated email from the ASF dual-hosted git repository.

coheigea pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/master by this push:
 new ae7c3dc  CXF-8010 - Avoid applying the SAAJInInterceptor to unsecured 
messages when using WS-SecurityPolicy
ae7c3dc is described below

commit ae7c3dcfc7e70b8921f1c1c49734dc11ce0fde40
Author: Colm O hEigeartaigh 
AuthorDate: Wed Apr 3 14:40:36 2019 +0100

CXF-8010 - Avoid applying the SAAJInInterceptor to unsecured messages when 
using WS-SecurityPolicy
---
 .../security/wss4j/AbstractWSS4JInterceptor.java   |  4 ++
 .../wss4j/PolicyBasedWSS4JInInterceptor.java   | 77 +-
 .../security/wss4j/AbstractPolicySecurityTest.java | 10 +++
 .../ws/security/wss4j/AbstractSecurityTest.java|  8 +++
 .../wss4j/PluggablePolicyValidatorTest.java| 11 
 .../security/wss4j/saml/PolicyBasedSamlTest.java   | 13 
 .../ws/policy/operation/PolicyOperationTest.java   |  2 +-
 7 files changed, 123 insertions(+), 2 deletions(-)

diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractWSS4JInterceptor.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractWSS4JInterceptor.java
index e222faa..e72745f 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractWSS4JInterceptor.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractWSS4JInterceptor.java
@@ -99,6 +99,10 @@ public abstract class AbstractWSS4JInterceptor extends 
WSHandler implements Soap
 }
 
 public Object getProperty(Object msgContext, String key) {
+if (msgContext == null) {
+return null;
+}
+
 Object obj = SecurityUtils.getSecurityPropertyValue(key, 
(Message)msgContext);
 if (obj == null) {
 obj = getOption(key);
diff --git 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JInInterceptor.java
 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JInInterceptor.java
index 2f054e4..767be4c 100644
--- 
a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JInInterceptor.java
+++ 
b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JInInterceptor.java
@@ -21,17 +21,24 @@ package org.apache.cxf.ws.security.wss4j;
 
 import java.util.ArrayList;
 import java.util.Collection;
+import java.util.Collections;
 import java.util.HashSet;
 import java.util.List;
 import java.util.Map;
+import java.util.logging.Logger;
 
 import javax.xml.namespace.QName;
 import javax.xml.soap.SOAPException;
 import javax.xml.stream.XMLStreamException;
 
+import org.w3c.dom.Attr;
 import org.w3c.dom.Element;
 
+import org.apache.cxf.binding.soap.SoapFault;
 import org.apache.cxf.binding.soap.SoapMessage;
+import org.apache.cxf.common.i18n.Message;
+import org.apache.cxf.common.logging.LogUtils;
+import org.apache.cxf.headers.Header;
 import org.apache.cxf.helpers.CastUtils;
 import org.apache.cxf.interceptor.Fault;
 import org.apache.cxf.message.MessageUtils;
@@ -44,6 +51,7 @@ import 
org.apache.cxf.ws.security.wss4j.policyvalidators.PolicyValidatorParamete
 import 
org.apache.cxf.ws.security.wss4j.policyvalidators.SecurityPolicyValidator;
 import org.apache.cxf.ws.security.wss4j.policyvalidators.ValidatorUtils;
 import org.apache.wss4j.common.ConfigurationConstants;
+import org.apache.wss4j.common.WSS4JConstants;
 import org.apache.wss4j.common.crypto.Crypto;
 import org.apache.wss4j.common.crypto.PasswordEncryptor;
 import org.apache.wss4j.common.ext.WSSecurityException;
@@ -53,6 +61,7 @@ import org.apache.wss4j.dom.engine.WSSecurityEngineResult;
 import org.apache.wss4j.dom.handler.RequestData;
 import org.apache.wss4j.dom.handler.WSHandlerResult;
 import org.apache.wss4j.dom.message.token.Timestamp;
+import org.apache.wss4j.dom.util.WSSecurityUtil;
 import org.apache.wss4j.policy.SP12Constants;
 import org.apache.wss4j.policy.SP13Constants;
 import org.apache.wss4j.policy.SPConstants;
@@ -65,6 +74,9 @@ import org.apache.wss4j.policy.model.Wss11;
  *
  */
 public class PolicyBasedWSS4JInInterceptor extends WSS4JInInterceptor {
+
+private static final Logger LOG = 
LogUtils.getL7dLogger(PolicyBasedWSS4JInInterceptor.class);
+
 /**
  *
  */
@@ -76,11 +88,73 @@ public class PolicyBasedWSS4JInInterceptor extends 
WSS4JInInterceptor {
 AssertionInfoMap aim = msg.get(AssertionInfoMap.class);
 boolean enableStax =
 MessageUtils.getContextualBoolean(msg, 
SecurityConstants.ENABLE_STREAMING_SECURITY);
-if (aim != null && !enableStax) {
+if (aim != null && !enableStax && !msg.containsKey(SECURITY_PROCESSED)
+&& !isGET(msg) && msg.getExchange() != null) {
+try {
+// First check to see if we have a security header before we 
apply the 

[cxf] branch master updated: cxf-rt-rs-security-oauth2: fix 'Potential null dereference' (#534)

2019-04-03 Thread buhhunyx
This is an automated email from the ASF dual-hosted git repository.

buhhunyx pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/master by this push:
 new 9d363d1  cxf-rt-rs-security-oauth2: fix 'Potential null dereference' 
(#534)
9d363d1 is described below

commit 9d363d1a2b7090bb67b9b362b1b9effdec351347
Author: Alexey Markevich 
AuthorDate: Wed Apr 3 16:28:19 2019 +0300

cxf-rt-rs-security-oauth2: fix 'Potential null dereference' (#534)

* cxf-rt-rs-security-oauth2: fix 'Potential null dereference'

* typo
---
 .../oauth2/grants/code/JPACodeDataProvider.java|  4 +-
 .../oauth2/provider/JPAOAuthDataProvider.java  | 72 --
 .../security/oauth2/tokens/hawk/HmacAlgorithm.java | 11 ++--
 3 files changed, 34 insertions(+), 53 deletions(-)

diff --git 
a/rt/rs/security/oauth-parent/oauth2/src/main/java/org/apache/cxf/rs/security/oauth2/grants/code/JPACodeDataProvider.java
 
b/rt/rs/security/oauth-parent/oauth2/src/main/java/org/apache/cxf/rs/security/oauth2/grants/code/JPACodeDataProvider.java
index a0b2001..f7f01f1 100644
--- 
a/rt/rs/security/oauth-parent/oauth2/src/main/java/org/apache/cxf/rs/security/oauth2/grants/code/JPACodeDataProvider.java
+++ 
b/rt/rs/security/oauth-parent/oauth2/src/main/java/org/apache/cxf/rs/security/oauth2/grants/code/JPACodeDataProvider.java
@@ -143,13 +143,13 @@ public class JPACodeDataProvider extends 
JPAOAuthDataProvider implements Authori
 if (c == null && resourceOwnerSubject == null) {
 return em.createQuery("SELECT c FROM ServerAuthorizationCodeGrant 
c",
 ServerAuthorizationCodeGrant.class);
-} else if (c == null) {
+} else if (c == null && resourceOwnerSubject != null) {
 return em.createQuery(
 "SELECT c FROM ServerAuthorizationCodeGrant"
 + " c JOIN c.subject s"
 + " WHERE s.login = :login", 
ServerAuthorizationCodeGrant.class)
 .setParameter("login", resourceOwnerSubject.getLogin());
-} else if (resourceOwnerSubject == null) {
+} else if (c != null && resourceOwnerSubject == null) {
 return em.createQuery(
 "SELECT code FROM ServerAuthorizationCodeGrant code"
 + " JOIN code.client c"
diff --git 
a/rt/rs/security/oauth-parent/oauth2/src/main/java/org/apache/cxf/rs/security/oauth2/provider/JPAOAuthDataProvider.java
 
b/rt/rs/security/oauth-parent/oauth2/src/main/java/org/apache/cxf/rs/security/oauth2/provider/JPAOAuthDataProvider.java
index ae45789..b69b4be 100644
--- 
a/rt/rs/security/oauth-parent/oauth2/src/main/java/org/apache/cxf/rs/security/oauth2/provider/JPAOAuthDataProvider.java
+++ 
b/rt/rs/security/oauth-parent/oauth2/src/main/java/org/apache/cxf/rs/security/oauth2/provider/JPAOAuthDataProvider.java
@@ -22,6 +22,7 @@ import java.util.ArrayList;
 import java.util.HashMap;
 import java.util.LinkedList;
 import java.util.List;
+import java.util.Map;
 
 import javax.persistence.EntityManager;
 import javax.persistence.EntityManagerFactory;
@@ -324,56 +325,37 @@ public class JPAOAuthDataProvider extends 
AbstractOAuthDataProvider {
 
 protected TypedQuery getTokensQuery(Client c, 
UserSubject resourceOwnerSubject,
EntityManager 
entityManager) {
-if (c == null && resourceOwnerSubject == null) {
-return entityManager.createQuery("SELECT t FROM BearerAccessToken 
t", BearerAccessToken.class);
-} else if (c == null) {
-return entityManager.createQuery(
-"SELECT t FROM BearerAccessToken t"
-+ " JOIN t.subject s"
-+ " WHERE s.login = :login", 
BearerAccessToken.class)
-.setParameter("login", resourceOwnerSubject.getLogin());
-} else if (resourceOwnerSubject == null) {
-return entityManager.createQuery(
-"SELECT t FROM BearerAccessToken t"
-+ " JOIN t.client c"
-+ " WHERE c.clientId = :clientId", 
BearerAccessToken.class)
-.setParameter("clientId", c.getClientId());
-} else {
-return entityManager.createQuery(
-"SELECT t FROM BearerAccessToken t"
-+ " JOIN t.subject s"
-+ " JOIN t.client c"
-+ " WHERE s.login = :login AND c.clientId = 
:clientId", BearerAccessToken.class)
-.setParameter("login", resourceOwnerSubject.getLogin())
-.setParameter("clientId", c.getClientId());
-}
+return getQuery("BearerAccessToken", c, resourceOwnerSubject, 
entityManager, BearerAccessToken.class);
 }
 
 protected 

[cxf] branch 3.2.x-fixes updated: Recording .gitmergeinfo Changes

2019-04-03 Thread coheigea
This is an automated email from the ASF dual-hosted git repository.

coheigea pushed a commit to branch 3.2.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.2.x-fixes by this push:
 new 290491f  Recording .gitmergeinfo Changes
290491f is described below

commit 290491f91fc8153eb3a8445af64dc6989502da2e
Author: Colm O hEigeartaigh 
AuthorDate: Wed Apr 3 13:58:37 2019 +0100

Recording .gitmergeinfo Changes
---
 .gitmergeinfo | 1 +
 1 file changed, 1 insertion(+)

diff --git a/.gitmergeinfo b/.gitmergeinfo
index a14b98b..86668be 100644
--- a/.gitmergeinfo
+++ b/.gitmergeinfo
@@ -17,6 +17,7 @@ B 0861dd6eefeb15cd3f642ff6144159d047445c97
 B 09037464d824392060b7816ea6a4d1b7433466f5
 B 0a84f64aed1a79585cb59ff589be95440e6a8480
 B 0af01b0a9ded128d72c216b52e2560d5c9450b18
+B 0b808a68b71b5dec8c72355ef5d8aaf614f1636a
 B 0cdc4bb5e37fabbf6afeef47ce7c9913f3282103
 B 0ce4b232981790ca52bd7b636b4d1ceb5fc31d8a
 B 0e51d1ff3f7a9e835b42e45257743770b8c28cd1



[cxf] branch master updated: Fixing test

2019-04-03 Thread coheigea
This is an automated email from the ASF dual-hosted git repository.

coheigea pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/master by this push:
 new 0b808a6  Fixing test
0b808a6 is described below

commit 0b808a68b71b5dec8c72355ef5d8aaf614f1636a
Author: Colm O hEigeartaigh 
AuthorDate: Wed Apr 3 13:58:20 2019 +0100

Fixing test
---
 .../tools/java2wsdl/processor/JavaToProcessorTest.java | 18 ++
 1 file changed, 14 insertions(+), 4 deletions(-)

diff --git 
a/tools/javato/ws/src/test/java/org/apache/cxf/tools/java2wsdl/processor/JavaToProcessorTest.java
 
b/tools/javato/ws/src/test/java/org/apache/cxf/tools/java2wsdl/processor/JavaToProcessorTest.java
index 00ab62d..404911c 100644
--- 
a/tools/javato/ws/src/test/java/org/apache/cxf/tools/java2wsdl/processor/JavaToProcessorTest.java
+++ 
b/tools/javato/ws/src/test/java/org/apache/cxf/tools/java2wsdl/processor/JavaToProcessorTest.java
@@ -30,6 +30,9 @@ import java.util.Map;
 import javax.wsdl.Definition;
 import javax.wsdl.Port;
 import javax.wsdl.Service;
+import javax.wsdl.WSDLException;
+import javax.wsdl.factory.WSDLFactory;
+import javax.wsdl.xml.WSDLReader;
 import javax.xml.bind.JAXBContext;
 import javax.xml.bind.Marshaller;
 import javax.xml.namespace.QName;
@@ -59,7 +62,6 @@ import org.apache.cxf.tools.wsdlto.core.FrontEndProfile;
 import org.apache.cxf.tools.wsdlto.core.PluginLoader;
 import org.apache.cxf.tools.wsdlto.frontend.jaxws.JAXWSContainer;
 import org.apache.cxf.wsdl.WSDLConstants;
-import org.apache.cxf.wsdl.WSDLHelper;
 
 import org.junit.After;
 import org.junit.Before;
@@ -75,7 +77,6 @@ import static org.junit.Assert.fail;
 public class JavaToProcessorTest extends ProcessorTestBase {
 JavaToWSDLProcessor processor = new JavaToWSDLProcessor();
 String classPath = "";
-private WSDLHelper wsdlHelper = new WSDLHelper();
 @Before
 public void startUp() throws Exception {
 env = new ToolContext();
@@ -119,7 +120,8 @@ public class JavaToProcessorTest extends ProcessorTestBase {
 assertTrue("Fail to generate wsdl file: " + wsdlFile.toString(), 
wsdlFile.exists());
 
 String tns = "http://simple.fortest.tools.cxf.apache.org/;;
-Definition def = wsdlHelper.getDefinition(wsdlFile);
+
+Definition def = getDefinition(wsdlFile.getPath());
 assertNotNull(def);
 Service wsdlService = def.getService(new QName(tns, "Hello"));
 assertNotNull("Generate WSDL Service Error", wsdlService);
@@ -215,7 +217,7 @@ public class JavaToProcessorTest extends ProcessorTestBase {
 JavaToWS.main(args);
 File wsdlFile = new File(output, "java2wsdl.wsdl");
 assertTrue("Generate Wsdl Fail", wsdlFile.exists());
-Definition def = wsdlHelper.getDefinition(wsdlFile);
+Definition def = getDefinition(wsdlFile.getPath());
 Service wsdlService = def.getService(new QName(tns, serviceName));
 assertNotNull("Generate WSDL Service Error", wsdlService);
 
@@ -1043,4 +1045,12 @@ public class JavaToProcessorTest extends 
ProcessorTestBase {
 assertEquals(-1, sw.getBuffer().indexOf("Exception Message"));
 }
 
+private Definition getDefinition(String wsdl) throws WSDLException {
+WSDLFactory wsdlFactory = WSDLFactory.newInstance();
+WSDLReader wsdlReader = wsdlFactory.newWSDLReader();
+wsdlReader.setFeature("javax.wsdl.verbose", false);
+return wsdlReader.readWSDL(wsdl);
+
+}
+
 }



[cxf] branch 3.2.x-fixes updated: Recording .gitmergeinfo Changes

2019-04-03 Thread coheigea
This is an automated email from the ASF dual-hosted git repository.

coheigea pushed a commit to branch 3.2.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/3.2.x-fixes by this push:
 new 7a404bf  Recording .gitmergeinfo Changes
7a404bf is described below

commit 7a404bf9d14f907ffb17136560aa0fcedaf4a3b7
Author: Colm O hEigeartaigh 
AuthorDate: Wed Apr 3 13:19:47 2019 +0100

Recording .gitmergeinfo Changes
---
 .gitmergeinfo | 1 +
 1 file changed, 1 insertion(+)

diff --git a/.gitmergeinfo b/.gitmergeinfo
index 1669193..a14b98b 100644
--- a/.gitmergeinfo
+++ b/.gitmergeinfo
@@ -227,6 +227,7 @@ B 8c740b8f03fc72cd6c8a273a06f677313795f3e1
 B 8e4bf18e224a96d2f362c890566278510eb14876
 B 8f90e00177d464541e99ed61238cbc52cff0846d
 B 8fa0216240e42d62cca60723c23402c6df022dfd
+B 90057038bf23efc12df254795ad80c4766c0d2dd
 B 90832dcab359e04b4c9c8adde630252509d87b9e
 B 91244e84e02c7d01410b347bb14efca27d2ec2b1
 B 9185a35ad95d74be43b23905e3ed45f0444eba94



[cxf] branch master updated: Adding an (empty) HTTP Digest test

2019-04-03 Thread coheigea
This is an automated email from the ASF dual-hosted git repository.

coheigea pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git


The following commit(s) were added to refs/heads/master by this push:
 new 9005703  Adding an (empty) HTTP Digest test
9005703 is described below

commit 90057038bf23efc12df254795ad80c4766c0d2dd
Author: Colm O hEigeartaigh 
AuthorDate: Wed Apr 3 13:14:32 2019 +0100

Adding an (empty) HTTP Digest test
---
 .../httpsignature/JAXRSHTTPSignatureTest.java| 20 
 .../systest/jaxrs/security/httpsignature/server.xml  |  6 ++
 2 files changed, 26 insertions(+)

diff --git 
a/systests/rs-security/src/test/java/org/apache/cxf/systest/jaxrs/security/httpsignature/JAXRSHTTPSignatureTest.java
 
b/systests/rs-security/src/test/java/org/apache/cxf/systest/jaxrs/security/httpsignature/JAXRSHTTPSignatureTest.java
index ccaccaa..5e71ae6 100644
--- 
a/systests/rs-security/src/test/java/org/apache/cxf/systest/jaxrs/security/httpsignature/JAXRSHTTPSignatureTest.java
+++ 
b/systests/rs-security/src/test/java/org/apache/cxf/systest/jaxrs/security/httpsignature/JAXRSHTTPSignatureTest.java
@@ -74,6 +74,26 @@ public class JAXRSHTTPSignatureTest extends 
AbstractBusClientServerTestBase {
 }
 
 @Test
+public void testDigest() throws Exception {
+
+URL busFile = JAXRSHTTPSignatureTest.class.getResource("client.xml");
+
+//CreateDigestInterceptor digestFilter = new CreateDigestInterceptor();
+
+String address = "http://localhost:; + PORT + 
"/digest/bookstore/books";
+WebClient client =
+// WebClient.create(address, 
Collections.singletonList(digestFilter), busFile.toString());
+WebClient.create(address, busFile.toString());
+client.type("application/xml").accept("application/xml");
+
+Response response = client.post(new Book("CXF", 126L));
+assertEquals(response.getStatus(), 200);
+
+Book returnedBook = response.readEntity(Book.class);
+assertEquals(126L, returnedBook.getId());
+}
+
+@Test
 public void testHttpSignature() throws Exception {
 
 URL busFile = JAXRSHTTPSignatureTest.class.getResource("client.xml");
diff --git 
a/systests/rs-security/src/test/resources/org/apache/cxf/systest/jaxrs/security/httpsignature/server.xml
 
b/systests/rs-security/src/test/resources/org/apache/cxf/systest/jaxrs/security/httpsignature/server.xml
index d3e819e..9a3b0ef 100644
--- 
a/systests/rs-security/src/test/resources/org/apache/cxf/systest/jaxrs/security/httpsignature/server.xml
+++ 
b/systests/rs-security/src/test/resources/org/apache/cxf/systest/jaxrs/security/httpsignature/server.xml
@@ -34,6 +34,12 @@ under the License.
 
 
 
+http://localhost:${testutil.ports.jaxrs-httpsignature}/digest;>
+
+
+
+
+
 
 
 



[cxf] branch 3.2.x-fixes updated (c2ac625 -> 88efeed)

2019-04-03 Thread coheigea
This is an automated email from the ASF dual-hosted git repository.

coheigea pushed a change to branch 3.2.x-fixes
in repository https://gitbox.apache.org/repos/asf/cxf.git.


from c2ac625  Recording .gitmergeinfo Changes
 new 8121220  CXF-7983 - Support 204 for the other client response filters
 new 88efeed  Recording .gitmergeinfo Changes

The 14524 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 .gitmergeinfo  |  1 +
 .../rs/security/jose/jaxrs/JweJsonClientResponseFilter.java|  6 ++
 .../cxf/rs/security/jose/jaxrs/JwsClientResponseFilter.java| 10 --
 .../rs/security/jose/jaxrs/JwsJsonClientResponseFilter.java|  7 ++-
 4 files changed, 21 insertions(+), 3 deletions(-)



[cxf] branch master updated (5578e0b -> 82fafed)

2019-04-03 Thread coheigea
This is an automated email from the ASF dual-hosted git repository.

coheigea pushed a change to branch master
in repository https://gitbox.apache.org/repos/asf/cxf.git.


from 5578e0b  Adding a few more test assertions
 new add43c5  Removing unused helper method that doesn't use StaxUtils to 
parse the wsdl
 new 82fafed  CXF-7983 - Support 204 for the other client response filters

The 14840 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 .../rs/security/jose/jaxrs/JweJsonClientResponseFilter.java|  6 ++
 .../cxf/rs/security/jose/jaxrs/JwsClientResponseFilter.java| 10 --
 .../rs/security/jose/jaxrs/JwsJsonClientResponseFilter.java|  7 ++-
 rt/wsdl/src/main/java/org/apache/cxf/wsdl/WSDLHelper.java  |  9 -
 4 files changed, 20 insertions(+), 12 deletions(-)