buildbot failure in on cxf-site-production
The Buildbot has detected a new failure on builder cxf-site-production while building . Full details are available at: https://ci.apache.org/builders/cxf-site-production/builds/31339 Buildbot URL: https://ci.apache.org/ Buildslave for this Build: bb-cms-slave Build Reason: The Nightly scheduler named 'cxf-site-production' triggered this build Build Source Stamp: [branch cxf/web] HEAD Blamelist: BUILD FAILED: failed compile Sincerely, -The Buildbot
buildbot success in on cxf-site-production
The Buildbot has detected a restored build on builder cxf-site-production while building . Full details are available at: https://ci.apache.org/builders/cxf-site-production/builds/31325 Buildbot URL: https://ci.apache.org/ Buildslave for this Build: bb-cms-slave Build Reason: The Nightly scheduler named 'cxf-site-production' triggered this build Build Source Stamp: [branch cxf/web] HEAD Blamelist: Build succeeded! Sincerely, -The Buildbot
buildbot failure in on cxf-site-production
The Buildbot has detected a new failure on builder cxf-site-production while building . Full details are available at: https://ci.apache.org/builders/cxf-site-production/builds/31324 Buildbot URL: https://ci.apache.org/ Buildslave for this Build: bb-cms-slave Build Reason: The Nightly scheduler named 'cxf-site-production' triggered this build Build Source Stamp: [branch cxf/web] HEAD Blamelist: BUILD FAILED: failed compile Sincerely, -The Buildbot
[cxf] branch 3.2.x-fixes updated: Recording .gitmergeinfo Changes
This is an automated email from the ASF dual-hosted git repository. coheigea pushed a commit to branch 3.2.x-fixes in repository https://gitbox.apache.org/repos/asf/cxf.git The following commit(s) were added to refs/heads/3.2.x-fixes by this push: new 4b0eef4 Recording .gitmergeinfo Changes 4b0eef4 is described below commit 4b0eef4d0bd4da3cd790eec299b62af68261cba7 Author: Colm O hEigeartaigh AuthorDate: Wed Apr 3 15:27:25 2019 +0100 Recording .gitmergeinfo Changes --- .gitmergeinfo | 1 + 1 file changed, 1 insertion(+) diff --git a/.gitmergeinfo b/.gitmergeinfo index 86668be..5631368 100644 --- a/.gitmergeinfo +++ b/.gitmergeinfo @@ -273,6 +273,7 @@ B acc697f1c88f392bd952e07d50a9ae2ce0b76411 B ad27755270c649ab64f2cec0d3768772ef68fc1f B add43c545b831f3b763c66c4f17b8dea5e195e9e B ae5625e5ad94fa8da69ee9d69cb6ee89c7d59410 +B ae7c3dcfc7e70b8921f1c1c49734dc11ce0fde40 B ae994168f50894010f1f148ec3b6f35b17e4b63b B af02bff7069c691539de32b361c8a0b083755144 B af33b2a28c39504388ea370f6849a06d551b4dd1
[cxf] branch master updated: CXF-8010 - Avoid applying the SAAJInInterceptor to unsecured messages when using WS-SecurityPolicy
This is an automated email from the ASF dual-hosted git repository. coheigea pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/cxf.git The following commit(s) were added to refs/heads/master by this push: new ae7c3dc CXF-8010 - Avoid applying the SAAJInInterceptor to unsecured messages when using WS-SecurityPolicy ae7c3dc is described below commit ae7c3dcfc7e70b8921f1c1c49734dc11ce0fde40 Author: Colm O hEigeartaigh AuthorDate: Wed Apr 3 14:40:36 2019 +0100 CXF-8010 - Avoid applying the SAAJInInterceptor to unsecured messages when using WS-SecurityPolicy --- .../security/wss4j/AbstractWSS4JInterceptor.java | 4 ++ .../wss4j/PolicyBasedWSS4JInInterceptor.java | 77 +- .../security/wss4j/AbstractPolicySecurityTest.java | 10 +++ .../ws/security/wss4j/AbstractSecurityTest.java| 8 +++ .../wss4j/PluggablePolicyValidatorTest.java| 11 .../security/wss4j/saml/PolicyBasedSamlTest.java | 13 .../ws/policy/operation/PolicyOperationTest.java | 2 +- 7 files changed, 123 insertions(+), 2 deletions(-) diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractWSS4JInterceptor.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractWSS4JInterceptor.java index e222faa..e72745f 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractWSS4JInterceptor.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/AbstractWSS4JInterceptor.java @@ -99,6 +99,10 @@ public abstract class AbstractWSS4JInterceptor extends WSHandler implements Soap } public Object getProperty(Object msgContext, String key) { +if (msgContext == null) { +return null; +} + Object obj = SecurityUtils.getSecurityPropertyValue(key, (Message)msgContext); if (obj == null) { obj = getOption(key); diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JInInterceptor.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JInInterceptor.java index 2f054e4..767be4c 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JInInterceptor.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JInInterceptor.java @@ -21,17 +21,24 @@ package org.apache.cxf.ws.security.wss4j; import java.util.ArrayList; import java.util.Collection; +import java.util.Collections; import java.util.HashSet; import java.util.List; import java.util.Map; +import java.util.logging.Logger; import javax.xml.namespace.QName; import javax.xml.soap.SOAPException; import javax.xml.stream.XMLStreamException; +import org.w3c.dom.Attr; import org.w3c.dom.Element; +import org.apache.cxf.binding.soap.SoapFault; import org.apache.cxf.binding.soap.SoapMessage; +import org.apache.cxf.common.i18n.Message; +import org.apache.cxf.common.logging.LogUtils; +import org.apache.cxf.headers.Header; import org.apache.cxf.helpers.CastUtils; import org.apache.cxf.interceptor.Fault; import org.apache.cxf.message.MessageUtils; @@ -44,6 +51,7 @@ import org.apache.cxf.ws.security.wss4j.policyvalidators.PolicyValidatorParamete import org.apache.cxf.ws.security.wss4j.policyvalidators.SecurityPolicyValidator; import org.apache.cxf.ws.security.wss4j.policyvalidators.ValidatorUtils; import org.apache.wss4j.common.ConfigurationConstants; +import org.apache.wss4j.common.WSS4JConstants; import org.apache.wss4j.common.crypto.Crypto; import org.apache.wss4j.common.crypto.PasswordEncryptor; import org.apache.wss4j.common.ext.WSSecurityException; @@ -53,6 +61,7 @@ import org.apache.wss4j.dom.engine.WSSecurityEngineResult; import org.apache.wss4j.dom.handler.RequestData; import org.apache.wss4j.dom.handler.WSHandlerResult; import org.apache.wss4j.dom.message.token.Timestamp; +import org.apache.wss4j.dom.util.WSSecurityUtil; import org.apache.wss4j.policy.SP12Constants; import org.apache.wss4j.policy.SP13Constants; import org.apache.wss4j.policy.SPConstants; @@ -65,6 +74,9 @@ import org.apache.wss4j.policy.model.Wss11; * */ public class PolicyBasedWSS4JInInterceptor extends WSS4JInInterceptor { + +private static final Logger LOG = LogUtils.getL7dLogger(PolicyBasedWSS4JInInterceptor.class); + /** * */ @@ -76,11 +88,73 @@ public class PolicyBasedWSS4JInInterceptor extends WSS4JInInterceptor { AssertionInfoMap aim = msg.get(AssertionInfoMap.class); boolean enableStax = MessageUtils.getContextualBoolean(msg, SecurityConstants.ENABLE_STREAMING_SECURITY); -if (aim != null && !enableStax) { +if (aim != null && !enableStax && !msg.containsKey(SECURITY_PROCESSED) +&& !isGET(msg) && msg.getExchange() != null) { +try { +// First check to see if we have a security header before we apply the
[cxf] branch master updated: cxf-rt-rs-security-oauth2: fix 'Potential null dereference' (#534)
This is an automated email from the ASF dual-hosted git repository. buhhunyx pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/cxf.git The following commit(s) were added to refs/heads/master by this push: new 9d363d1 cxf-rt-rs-security-oauth2: fix 'Potential null dereference' (#534) 9d363d1 is described below commit 9d363d1a2b7090bb67b9b362b1b9effdec351347 Author: Alexey Markevich AuthorDate: Wed Apr 3 16:28:19 2019 +0300 cxf-rt-rs-security-oauth2: fix 'Potential null dereference' (#534) * cxf-rt-rs-security-oauth2: fix 'Potential null dereference' * typo --- .../oauth2/grants/code/JPACodeDataProvider.java| 4 +- .../oauth2/provider/JPAOAuthDataProvider.java | 72 -- .../security/oauth2/tokens/hawk/HmacAlgorithm.java | 11 ++-- 3 files changed, 34 insertions(+), 53 deletions(-) diff --git a/rt/rs/security/oauth-parent/oauth2/src/main/java/org/apache/cxf/rs/security/oauth2/grants/code/JPACodeDataProvider.java b/rt/rs/security/oauth-parent/oauth2/src/main/java/org/apache/cxf/rs/security/oauth2/grants/code/JPACodeDataProvider.java index a0b2001..f7f01f1 100644 --- a/rt/rs/security/oauth-parent/oauth2/src/main/java/org/apache/cxf/rs/security/oauth2/grants/code/JPACodeDataProvider.java +++ b/rt/rs/security/oauth-parent/oauth2/src/main/java/org/apache/cxf/rs/security/oauth2/grants/code/JPACodeDataProvider.java @@ -143,13 +143,13 @@ public class JPACodeDataProvider extends JPAOAuthDataProvider implements Authori if (c == null && resourceOwnerSubject == null) { return em.createQuery("SELECT c FROM ServerAuthorizationCodeGrant c", ServerAuthorizationCodeGrant.class); -} else if (c == null) { +} else if (c == null && resourceOwnerSubject != null) { return em.createQuery( "SELECT c FROM ServerAuthorizationCodeGrant" + " c JOIN c.subject s" + " WHERE s.login = :login", ServerAuthorizationCodeGrant.class) .setParameter("login", resourceOwnerSubject.getLogin()); -} else if (resourceOwnerSubject == null) { +} else if (c != null && resourceOwnerSubject == null) { return em.createQuery( "SELECT code FROM ServerAuthorizationCodeGrant code" + " JOIN code.client c" diff --git a/rt/rs/security/oauth-parent/oauth2/src/main/java/org/apache/cxf/rs/security/oauth2/provider/JPAOAuthDataProvider.java b/rt/rs/security/oauth-parent/oauth2/src/main/java/org/apache/cxf/rs/security/oauth2/provider/JPAOAuthDataProvider.java index ae45789..b69b4be 100644 --- a/rt/rs/security/oauth-parent/oauth2/src/main/java/org/apache/cxf/rs/security/oauth2/provider/JPAOAuthDataProvider.java +++ b/rt/rs/security/oauth-parent/oauth2/src/main/java/org/apache/cxf/rs/security/oauth2/provider/JPAOAuthDataProvider.java @@ -22,6 +22,7 @@ import java.util.ArrayList; import java.util.HashMap; import java.util.LinkedList; import java.util.List; +import java.util.Map; import javax.persistence.EntityManager; import javax.persistence.EntityManagerFactory; @@ -324,56 +325,37 @@ public class JPAOAuthDataProvider extends AbstractOAuthDataProvider { protected TypedQuery getTokensQuery(Client c, UserSubject resourceOwnerSubject, EntityManager entityManager) { -if (c == null && resourceOwnerSubject == null) { -return entityManager.createQuery("SELECT t FROM BearerAccessToken t", BearerAccessToken.class); -} else if (c == null) { -return entityManager.createQuery( -"SELECT t FROM BearerAccessToken t" -+ " JOIN t.subject s" -+ " WHERE s.login = :login", BearerAccessToken.class) -.setParameter("login", resourceOwnerSubject.getLogin()); -} else if (resourceOwnerSubject == null) { -return entityManager.createQuery( -"SELECT t FROM BearerAccessToken t" -+ " JOIN t.client c" -+ " WHERE c.clientId = :clientId", BearerAccessToken.class) -.setParameter("clientId", c.getClientId()); -} else { -return entityManager.createQuery( -"SELECT t FROM BearerAccessToken t" -+ " JOIN t.subject s" -+ " JOIN t.client c" -+ " WHERE s.login = :login AND c.clientId = :clientId", BearerAccessToken.class) -.setParameter("login", resourceOwnerSubject.getLogin()) -.setParameter("clientId", c.getClientId()); -} +return getQuery("BearerAccessToken", c, resourceOwnerSubject, entityManager, BearerAccessToken.class); } protected
[cxf] branch 3.2.x-fixes updated: Recording .gitmergeinfo Changes
This is an automated email from the ASF dual-hosted git repository. coheigea pushed a commit to branch 3.2.x-fixes in repository https://gitbox.apache.org/repos/asf/cxf.git The following commit(s) were added to refs/heads/3.2.x-fixes by this push: new 290491f Recording .gitmergeinfo Changes 290491f is described below commit 290491f91fc8153eb3a8445af64dc6989502da2e Author: Colm O hEigeartaigh AuthorDate: Wed Apr 3 13:58:37 2019 +0100 Recording .gitmergeinfo Changes --- .gitmergeinfo | 1 + 1 file changed, 1 insertion(+) diff --git a/.gitmergeinfo b/.gitmergeinfo index a14b98b..86668be 100644 --- a/.gitmergeinfo +++ b/.gitmergeinfo @@ -17,6 +17,7 @@ B 0861dd6eefeb15cd3f642ff6144159d047445c97 B 09037464d824392060b7816ea6a4d1b7433466f5 B 0a84f64aed1a79585cb59ff589be95440e6a8480 B 0af01b0a9ded128d72c216b52e2560d5c9450b18 +B 0b808a68b71b5dec8c72355ef5d8aaf614f1636a B 0cdc4bb5e37fabbf6afeef47ce7c9913f3282103 B 0ce4b232981790ca52bd7b636b4d1ceb5fc31d8a B 0e51d1ff3f7a9e835b42e45257743770b8c28cd1
[cxf] branch master updated: Fixing test
This is an automated email from the ASF dual-hosted git repository. coheigea pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/cxf.git The following commit(s) were added to refs/heads/master by this push: new 0b808a6 Fixing test 0b808a6 is described below commit 0b808a68b71b5dec8c72355ef5d8aaf614f1636a Author: Colm O hEigeartaigh AuthorDate: Wed Apr 3 13:58:20 2019 +0100 Fixing test --- .../tools/java2wsdl/processor/JavaToProcessorTest.java | 18 ++ 1 file changed, 14 insertions(+), 4 deletions(-) diff --git a/tools/javato/ws/src/test/java/org/apache/cxf/tools/java2wsdl/processor/JavaToProcessorTest.java b/tools/javato/ws/src/test/java/org/apache/cxf/tools/java2wsdl/processor/JavaToProcessorTest.java index 00ab62d..404911c 100644 --- a/tools/javato/ws/src/test/java/org/apache/cxf/tools/java2wsdl/processor/JavaToProcessorTest.java +++ b/tools/javato/ws/src/test/java/org/apache/cxf/tools/java2wsdl/processor/JavaToProcessorTest.java @@ -30,6 +30,9 @@ import java.util.Map; import javax.wsdl.Definition; import javax.wsdl.Port; import javax.wsdl.Service; +import javax.wsdl.WSDLException; +import javax.wsdl.factory.WSDLFactory; +import javax.wsdl.xml.WSDLReader; import javax.xml.bind.JAXBContext; import javax.xml.bind.Marshaller; import javax.xml.namespace.QName; @@ -59,7 +62,6 @@ import org.apache.cxf.tools.wsdlto.core.FrontEndProfile; import org.apache.cxf.tools.wsdlto.core.PluginLoader; import org.apache.cxf.tools.wsdlto.frontend.jaxws.JAXWSContainer; import org.apache.cxf.wsdl.WSDLConstants; -import org.apache.cxf.wsdl.WSDLHelper; import org.junit.After; import org.junit.Before; @@ -75,7 +77,6 @@ import static org.junit.Assert.fail; public class JavaToProcessorTest extends ProcessorTestBase { JavaToWSDLProcessor processor = new JavaToWSDLProcessor(); String classPath = ""; -private WSDLHelper wsdlHelper = new WSDLHelper(); @Before public void startUp() throws Exception { env = new ToolContext(); @@ -119,7 +120,8 @@ public class JavaToProcessorTest extends ProcessorTestBase { assertTrue("Fail to generate wsdl file: " + wsdlFile.toString(), wsdlFile.exists()); String tns = "http://simple.fortest.tools.cxf.apache.org/;; -Definition def = wsdlHelper.getDefinition(wsdlFile); + +Definition def = getDefinition(wsdlFile.getPath()); assertNotNull(def); Service wsdlService = def.getService(new QName(tns, "Hello")); assertNotNull("Generate WSDL Service Error", wsdlService); @@ -215,7 +217,7 @@ public class JavaToProcessorTest extends ProcessorTestBase { JavaToWS.main(args); File wsdlFile = new File(output, "java2wsdl.wsdl"); assertTrue("Generate Wsdl Fail", wsdlFile.exists()); -Definition def = wsdlHelper.getDefinition(wsdlFile); +Definition def = getDefinition(wsdlFile.getPath()); Service wsdlService = def.getService(new QName(tns, serviceName)); assertNotNull("Generate WSDL Service Error", wsdlService); @@ -1043,4 +1045,12 @@ public class JavaToProcessorTest extends ProcessorTestBase { assertEquals(-1, sw.getBuffer().indexOf("Exception Message")); } +private Definition getDefinition(String wsdl) throws WSDLException { +WSDLFactory wsdlFactory = WSDLFactory.newInstance(); +WSDLReader wsdlReader = wsdlFactory.newWSDLReader(); +wsdlReader.setFeature("javax.wsdl.verbose", false); +return wsdlReader.readWSDL(wsdl); + +} + }
[cxf] branch 3.2.x-fixes updated: Recording .gitmergeinfo Changes
This is an automated email from the ASF dual-hosted git repository. coheigea pushed a commit to branch 3.2.x-fixes in repository https://gitbox.apache.org/repos/asf/cxf.git The following commit(s) were added to refs/heads/3.2.x-fixes by this push: new 7a404bf Recording .gitmergeinfo Changes 7a404bf is described below commit 7a404bf9d14f907ffb17136560aa0fcedaf4a3b7 Author: Colm O hEigeartaigh AuthorDate: Wed Apr 3 13:19:47 2019 +0100 Recording .gitmergeinfo Changes --- .gitmergeinfo | 1 + 1 file changed, 1 insertion(+) diff --git a/.gitmergeinfo b/.gitmergeinfo index 1669193..a14b98b 100644 --- a/.gitmergeinfo +++ b/.gitmergeinfo @@ -227,6 +227,7 @@ B 8c740b8f03fc72cd6c8a273a06f677313795f3e1 B 8e4bf18e224a96d2f362c890566278510eb14876 B 8f90e00177d464541e99ed61238cbc52cff0846d B 8fa0216240e42d62cca60723c23402c6df022dfd +B 90057038bf23efc12df254795ad80c4766c0d2dd B 90832dcab359e04b4c9c8adde630252509d87b9e B 91244e84e02c7d01410b347bb14efca27d2ec2b1 B 9185a35ad95d74be43b23905e3ed45f0444eba94
[cxf] branch master updated: Adding an (empty) HTTP Digest test
This is an automated email from the ASF dual-hosted git repository. coheigea pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/cxf.git The following commit(s) were added to refs/heads/master by this push: new 9005703 Adding an (empty) HTTP Digest test 9005703 is described below commit 90057038bf23efc12df254795ad80c4766c0d2dd Author: Colm O hEigeartaigh AuthorDate: Wed Apr 3 13:14:32 2019 +0100 Adding an (empty) HTTP Digest test --- .../httpsignature/JAXRSHTTPSignatureTest.java| 20 .../systest/jaxrs/security/httpsignature/server.xml | 6 ++ 2 files changed, 26 insertions(+) diff --git a/systests/rs-security/src/test/java/org/apache/cxf/systest/jaxrs/security/httpsignature/JAXRSHTTPSignatureTest.java b/systests/rs-security/src/test/java/org/apache/cxf/systest/jaxrs/security/httpsignature/JAXRSHTTPSignatureTest.java index ccaccaa..5e71ae6 100644 --- a/systests/rs-security/src/test/java/org/apache/cxf/systest/jaxrs/security/httpsignature/JAXRSHTTPSignatureTest.java +++ b/systests/rs-security/src/test/java/org/apache/cxf/systest/jaxrs/security/httpsignature/JAXRSHTTPSignatureTest.java @@ -74,6 +74,26 @@ public class JAXRSHTTPSignatureTest extends AbstractBusClientServerTestBase { } @Test +public void testDigest() throws Exception { + +URL busFile = JAXRSHTTPSignatureTest.class.getResource("client.xml"); + +//CreateDigestInterceptor digestFilter = new CreateDigestInterceptor(); + +String address = "http://localhost:; + PORT + "/digest/bookstore/books"; +WebClient client = +// WebClient.create(address, Collections.singletonList(digestFilter), busFile.toString()); +WebClient.create(address, busFile.toString()); +client.type("application/xml").accept("application/xml"); + +Response response = client.post(new Book("CXF", 126L)); +assertEquals(response.getStatus(), 200); + +Book returnedBook = response.readEntity(Book.class); +assertEquals(126L, returnedBook.getId()); +} + +@Test public void testHttpSignature() throws Exception { URL busFile = JAXRSHTTPSignatureTest.class.getResource("client.xml"); diff --git a/systests/rs-security/src/test/resources/org/apache/cxf/systest/jaxrs/security/httpsignature/server.xml b/systests/rs-security/src/test/resources/org/apache/cxf/systest/jaxrs/security/httpsignature/server.xml index d3e819e..9a3b0ef 100644 --- a/systests/rs-security/src/test/resources/org/apache/cxf/systest/jaxrs/security/httpsignature/server.xml +++ b/systests/rs-security/src/test/resources/org/apache/cxf/systest/jaxrs/security/httpsignature/server.xml @@ -34,6 +34,12 @@ under the License. +http://localhost:${testutil.ports.jaxrs-httpsignature}/digest;> + + + + +
[cxf] branch 3.2.x-fixes updated (c2ac625 -> 88efeed)
This is an automated email from the ASF dual-hosted git repository. coheigea pushed a change to branch 3.2.x-fixes in repository https://gitbox.apache.org/repos/asf/cxf.git. from c2ac625 Recording .gitmergeinfo Changes new 8121220 CXF-7983 - Support 204 for the other client response filters new 88efeed Recording .gitmergeinfo Changes The 14524 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "add" were already present in the repository and have only been added to this reference. Summary of changes: .gitmergeinfo | 1 + .../rs/security/jose/jaxrs/JweJsonClientResponseFilter.java| 6 ++ .../cxf/rs/security/jose/jaxrs/JwsClientResponseFilter.java| 10 -- .../rs/security/jose/jaxrs/JwsJsonClientResponseFilter.java| 7 ++- 4 files changed, 21 insertions(+), 3 deletions(-)
[cxf] branch master updated (5578e0b -> 82fafed)
This is an automated email from the ASF dual-hosted git repository. coheigea pushed a change to branch master in repository https://gitbox.apache.org/repos/asf/cxf.git. from 5578e0b Adding a few more test assertions new add43c5 Removing unused helper method that doesn't use StaxUtils to parse the wsdl new 82fafed CXF-7983 - Support 204 for the other client response filters The 14840 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "add" were already present in the repository and have only been added to this reference. Summary of changes: .../rs/security/jose/jaxrs/JweJsonClientResponseFilter.java| 6 ++ .../cxf/rs/security/jose/jaxrs/JwsClientResponseFilter.java| 10 -- .../rs/security/jose/jaxrs/JwsJsonClientResponseFilter.java| 7 ++- rt/wsdl/src/main/java/org/apache/cxf/wsdl/WSDLHelper.java | 9 - 4 files changed, 20 insertions(+), 12 deletions(-)