public HashLoginService(String name) { setName(name); }
public HashLoginService(String name, String config) { setName(name); setConfig(config); }
HashLoginService l = new HashLoginService(); l.setUserStore(userStore); l.setName(realm);
public HashLoginService(String name) { setName(name); }
public HashLoginService(String name) { setName(name); }
public HashLoginService(String name) { setName(name); }
public HashLoginService(String name) { setName(name); }
public HashLoginService(String name) { setName(name); }
public HashLoginService(String name) { setName(name); }
public HashLoginService(String name, String config) { setName(name); setConfig(config); }
public HashLoginService(String name, String config) { setName(name); setConfig(config); }
public HashLoginService(String name, String config) { setName(name); setConfig(config); }
public HashLoginService(String name, String config) { setName(name); setConfig(config); }
public HashLoginService(String name, String config) { setName(name); setConfig(config); }
public HashLoginService(String name, String config) { setName(name); setConfig(config); }
public HashLoginService(String name, String config) { setName(name); setConfig(config); }
public HashLoginService(String name, String config) { setName(name); setConfig(config); }
@Override public void customize(Server server) { LOG.debug("Customizing server to allow requests for {}", USER_AUTHORIZED); HashLoginService login = new HashLoginService(); login.putUser(USER_AUTHORIZED, Credential.getCredential(USER_PW), new String[] {"users"}); login.setName("users"); Constraint constraint = new Constraint(); constraint.setName(Constraint.__BASIC_AUTH); constraint.setRoles(new String[]{"users"}); constraint.setAuthenticate(true); ConstraintMapping cm = new ConstraintMapping(); cm.setConstraint(constraint); cm.setPathSpec("/*"); ConstraintSecurityHandler security = new ConstraintSecurityHandler(); security.setAuthenticator(new BasicAuthenticator()); security.setRealmName("users"); security.addConstraintMapping(cm); security.setLoginService(login); // chain the PQS handler to security security.setHandler(server.getHandlers()[0]); server.setHandler(security); } }
@Override public void addRealm(Realm realm) { HashLoginService loginService = new HashLoginService(); loginService.setName(realm.getName()); Collection<UserRole> users = realm.getUsers().values(); for (UserRole user : users) { String[] roles = user.getRoles().toArray(new String[0]); Password password = new Password(user.getPassword()); loginService.putUser(user.getUser(), password, roles); } server.addBean(loginService); }
/** * Configures a security realm for a test. */ protected LoginService configureUserRealm() { HashLoginService realm = new HashLoginService(); realm.setName("default"); // this is the magic realm name to make it effective on everywhere UserStore userStore = new UserStore(); realm.setUserStore( userStore ); userStore.addUser("alice", new Password("alice"), new String[]{"user","female"}); userStore.addUser("bob", new Password("bob"), new String[]{"user","male"}); userStore.addUser("charlie", new Password("charlie"), new String[]{"user","male"}); return realm; }