public SecurityToken getSecurityTokenFromRequest(HttpServletRequest request) { if (allowUnauthenticated) { return new AnonymousSecurityToken(); } return null; }
public SecurityToken getSecurityTokenFromRequest(HttpServletRequest request) { if (allowUnauthenticated) { return new AnonymousSecurityToken(); } return null; }
public SecurityToken getSecurityTokenFromRequest(HttpServletRequest request) { if (allowUnauthenticated) { return new AnonymousSecurityToken(); } return null; }
public SecurityToken getSecurityTokenFromRequest(HttpServletRequest request) { if (allowUnauthenticated) { return new AnonymousSecurityToken(); } return null; }
public SecurityToken getSecurityTokenFromRequest(HttpServletRequest request) { if (allowUnauthenticated) { return new AnonymousSecurityToken(); } return null; }
@Override public SecurityToken getToken() { return new AnonymousSecurityToken(); } });
@Override public SecurityToken getToken() { return new AnonymousSecurityToken(); } });
@Override public SecurityToken getToken() { return new AnonymousSecurityToken(); }
@Override public SecurityToken getToken() { return new AnonymousSecurityToken(); } });
@Override public SecurityToken getToken() { return new AnonymousSecurityToken(); } };
@Override public SecurityToken getToken() { return new AnonymousSecurityToken(); } };
@Override public SecurityToken getToken() { return new AnonymousSecurityToken(); }
@Override public SecurityToken getToken() { return new AnonymousSecurityToken(); } };
/** {@inheritDoc} */ public void contribute(Map<String,Object> config, String container, String host) { // Inject an anonymous security token TODO set TTL based on cachability of this JS? SecurityToken containerToken = new AnonymousSecurityToken(container, 0,"*", 1000L * 60 * 60 * 24); Map<String, String> authConfig = Maps.newHashMapWithExpectedSize(2); try { config.put("shindig.auth", authConfig); authConfig.put("authToken", securityTokenCodec.encodeToken(containerToken)); } catch (SecurityTokenException e) { // ignore } } }
private void expectSecurityToken() { try { EasyMock.expect( mockStore.getSecurityTokenForConsumerRequest( EasyMock.eq(FakeOAuthRequest.CONSUMER_KEY), EasyMock.eq(FakeOAuthRequest.REQUESTOR))).andReturn( new AnonymousSecurityToken()); } catch (OAuthProblemException e) { // ignore } }
private void expectSecurityToken() { try { EasyMock.expect(mockStore.getSecurityTokenForConsumerRequest( EasyMock.eq(FakeOAuthRequest.CONSUMER_KEY), EasyMock.eq(FakeOAuthRequest.REQUESTOR))). andReturn(new AnonymousSecurityToken()); } catch (OAuthProblemException e) { // ignore } }
private void expectSecurityToken() { try { EasyMock.expect( mockStore.getSecurityTokenForConsumerRequest( EasyMock.eq(FakeOAuthRequest.CONSUMER_KEY), EasyMock.eq(FakeOAuthRequest.REQUESTOR))).andReturn( new AnonymousSecurityToken()); } catch (OAuthProblemException e) { // ignore } }
@Test public void testGetSecurityToken() throws Exception { SecurityToken expected = new AnonymousSecurityToken(); expect(request.getAttribute(AuthInfoUtil.Attribute.SECURITY_TOKEN.getId())).andReturn(expected); replay(); GadgetContext context = new HttpGadgetContext(request); assertEquals(expected, context.getToken()); }
@Test public void testGetSecurityToken() throws Exception { SecurityToken expected = new AnonymousSecurityToken(); expect(request.getAttribute(AuthInfoUtil.Attribute.SECURITY_TOKEN.getId())).andReturn(expected); replay(); GadgetContext context = new HttpGadgetContext(request); assertEquals(expected, context.getToken()); }
@Test public void testGetSecurityToken() throws Exception { SecurityToken expected = new AnonymousSecurityToken(); expect(request.getAttribute(AuthInfo.Attribute.SECURITY_TOKEN.getId())).andReturn(expected); replay(); GadgetContext context = new HttpGadgetContext(request); assertEquals(expected, context.getToken()); }