@Override public void filter(ClientRequestContext requestContext, ClientResponseContext responseContext) throws IOException { if (!responseContext.getStatusInfo().getFamily().equals(Response.Status.Family.REDIRECTION)) { return; } Response resp = requestContext.getClient().target(responseContext.getLocation()).request() .method(requestContext.getMethod()); responseContext.setEntityStream((InputStream) resp.getEntity()); responseContext.setStatusInfo(resp.getStatusInfo()); responseContext.setStatus(resp.getStatus()); } }
@Override public void filter(ClientRequestContext requestContext, ClientResponseContext responseContext) throws IOException { if (!responseContext.getStatusInfo().getFamily().equals(Response.Status.Family.REDIRECTION)) { return; } Response resp = requestContext.getClient().target(responseContext.getLocation()).request() .method(requestContext.getMethod()); responseContext.setEntityStream((InputStream) resp.getEntity()); responseContext.setStatusInfo(resp.getStatusInfo()); responseContext.setStatus(resp.getStatus()); } }
/** * Verify that an administrator can write to the child of a default ACL resource. */ @Test @DisplayName("Verify that an administrator can write to the child of a default ACL resource") default void testCanWriteDefaultAclResourceChild() { try (final Response res = target(getDefaultContainerChild()).request() .header(AUTHORIZATION, getAuthorizationHeader()) .method(PATCH, entity(INSERT_PROP_FOO, APPLICATION_SPARQL_UPDATE))) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }
/** * Verify that an administrator can write to a protected resource. */ @Test @DisplayName("Verify that an administrator can write to a protected resource") default void testAdminCanWriteProtectedResource() { try (final Response res = target(getProtectedContainer()).request() .header(AUTHORIZATION, getAuthorizationHeader()) .method(PATCH, entity(INSERT_PROP_FOO, APPLICATION_SPARQL_UPDATE))) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }
/** * Verify that another user cannot write to a group-controlled resource. */ @Test @DisplayName("Verify that another user cannot write to a group-controlled resource") default void testOtherUserCanWriteGroupResource() { try (final Response res = target(getGroupContainer()).request() .header(AUTHORIZATION, getAuthorizationHeader()) .method(PATCH, entity(INSERT_PROP_FOO, APPLICATION_SPARQL_UPDATE))) { assertEquals(FORBIDDEN, fromStatusCode(res.getStatus()), FORBIDDEN_RESPONSE); } }
/** * Verify that another user cannot write to the child of a protected resource. */ @Test @DisplayName("Verify that another user cannot write to the child of a protected resource") default void testOtherUserCanWriteProtectedResourceChild() { try (final Response res = target(getProtectedContainerChild()).request() .header(AUTHORIZATION, getAuthorizationHeader()) .method(PATCH, entity(INSERT_PROP_BAR, APPLICATION_SPARQL_UPDATE))) { assertEquals(FORBIDDEN, fromStatusCode(res.getStatus()), FORBIDDEN_RESPONSE); } }
/** * Verify that another user cannot write to a protected resource. */ @Test @DisplayName("Verify that another user cannot write to a protected resource") default void testOtherUserCanWriteProtectedResource() { try (final Response res = target(getProtectedContainer()).request() .header(AUTHORIZATION, getAuthorizationHeader()) .method(PATCH, entity(INSERT_PROP_BAR, APPLICATION_SPARQL_UPDATE))) { assertEquals(FORBIDDEN, fromStatusCode(res.getStatus()), FORBIDDEN_RESPONSE); } }
/** * Verify that an anonymous user cannot write to a public resource. */ @Test @DisplayName("Verify that an anonymous user cannot write to a public resource") default void testCanWritePublicResource() { try (final Response res = target(getPublicContainer()).request().method(PATCH, entity(INSERT_PROP_BAR, APPLICATION_SPARQL_UPDATE))) { assertEquals(UNAUTHORIZED, fromStatusCode(res.getStatus()), UNAUTHORIZED_RESPONSE); } }
/** * Verify that a user can write to a group-controlled resource. */ @Test @DisplayName("Verify that a user can write to a group-controlled resource") default void testUserCanWriteGroupResource() { try (final Response res = target(getGroupContainer()).request() .header(AUTHORIZATION, getAuthorizationHeader()) .method(PATCH, entity(INSERT_PROP_FOO, APPLICATION_SPARQL_UPDATE))) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }
/** * Verify that a user cannot write to the child of a private resource. */ @Test @DisplayName("Verify that a user cannot write to the child of a private resource") default void testUserCannotWritePrivateResourceChild() { try (final Response res = target(getPrivateContainerChild()).request() .header(AUTHORIZATION, getAuthorizationHeader()) .method(PATCH, entity(INSERT_PROP_FOO, APPLICATION_SPARQL_UPDATE))) { assertEquals(FORBIDDEN, fromStatusCode(res.getStatus()), FORBIDDEN_RESPONSE); } }
/** * Verify that a user cannot write to a private resource. */ @Test @DisplayName("Verify that a user cannot write to a private resource") default void testUserCannotWritePrivateResource() { try (final Response res = target(getPrivateContainer()).request() .header(AUTHORIZATION, getAuthorizationHeader()) .method(PATCH, entity(INSERT_PROP_FOO, APPLICATION_SPARQL_UPDATE))) { assertEquals(FORBIDDEN, fromStatusCode(res.getStatus()), FORBIDDEN_RESPONSE); } }
/** * Verify that a user can write to a public resource. */ @Test @DisplayName("Verify that a user can write to a public resource") default void testUserCanWritePublicResource() { try (final Response res = target(getPublicContainer()).request() .header(AUTHORIZATION, getAuthorizationHeader()) .method(PATCH, entity(INSERT_PROP_BAR, APPLICATION_SPARQL_UPDATE))) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }
@Override public <T> T method(String name, Entity<?> entity, GenericType<T> responseType) { return builder.method(name, entity, responseType); } }
/** * Verify that an administrator can write to the child of a protected resource. */ @Test @DisplayName("Verify that an administrator can write to the child of a protected resource") default void testAdminCanWriteProtectedResourceChild() { try (final Response res = target(getProtectedContainerChild()).request() .header(AUTHORIZATION, getAuthorizationHeader()) .method(PATCH, entity(INSERT_PROP_FOO, APPLICATION_SPARQL_UPDATE))) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }
/** * Verify that an administrator can write to a protected resource. */ @Test @DisplayName("Verify that an administrator can write to a protected resource") default void testAdminCanWriteProtectedResource() { try (final Response res = target(getProtectedContainer()).request() .header(AUTHORIZATION, getAuthorizationHeader()) .method(PATCH, entity(INSERT_PROP_FOO, APPLICATION_SPARQL_UPDATE))) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }
/** * Verify that a user can write to a non-inheritable ACL resource. */ @Test @DisplayName("Verify that a user can write to a non-inheritable ACL resource") default void testUserCanWriteDefaultAclResource() { try (final Response res = target(getDefaultContainer()).request() .header(AUTHORIZATION, getAuthorizationHeader()) .method(PATCH, entity(INSERT_PROP_FOO, APPLICATION_SPARQL_UPDATE))) { assertEquals(SUCCESSFUL, res.getStatusInfo().getFamily(), OK_RESPONSE); } }
/** * Verify that an anonymous user cannot write to a private resource. */ @Test @DisplayName("Verify that an anonymous user cannot write to a private resource") default void testCanWritePrivateResource() { try (final Response res = target(getPrivateContainer()).request().method(PATCH, entity(INSERT_PROP_FOO, APPLICATION_SPARQL_UPDATE))) { assertEquals(UNAUTHORIZED, fromStatusCode(res.getStatus()), UNAUTHORIZED_RESPONSE); } }
/** * Verify that an anonymous user cannot write to a public resource. */ @Test @DisplayName("Verify that an anonymous user cannot write to a public resource") default void testCanWritePublicResource() { try (final Response res = target(getPublicContainer()).request().method(PATCH, entity(INSERT_PROP_BAR, APPLICATION_SPARQL_UPDATE))) { assertEquals(UNAUTHORIZED, fromStatusCode(res.getStatus()), UNAUTHORIZED_RESPONSE); } }
private Response _handleResponse( String httpMethod, Invocation.Builder builder, Entity<String> entity) { boolean followRedirects = _liferayConnectionProperties.followRedirects.getValue(); Response response; if (entity == null) { if (followRedirects) { response = _follow3Redirects(builder.method(httpMethod)); } else { response = builder.method(httpMethod); } } else { if (followRedirects) { response = _follow3Redirects( builder.method(httpMethod, entity)); } else { response = builder.method(httpMethod, entity); } } return response; }