config.getAuthProviderNames().add(GeoServerAuthenticationProvider.DEFAULT_NAME); SecurityConfigValidator validator = new SecurityConfigValidator(getSecurityManager()); validator.validateManagerConfig(config, new SecurityManagerConfig()); if (getSecurityManager().isStrongEncryptionAvailable() == false) { config.setConfigPasswordEncrypterName(getStrongPBEPasswordEncoder().getName()); try {
@Test public void testPasswordPolicy() throws IOException { SecurityConfigValidator validator = new SecurityConfigValidator(getSecurityManager()); PasswordPolicyConfig config = createPolicyConfig( validator.validateAddPasswordPolicy(config); fail("invalid max length should fail"); getSecurityManager().savePasswordPolicy(config); } catch (SecurityConfigException ex) { assertEquals(INVALID_MAX_LENGTH, ex.getId());
"default2"); SecurityConfigValidator validator = new SecurityConfigValidator(getSecurityManager()); try { config.setName("default2");
GeoServerRole.ADMIN_ROLE.getAuthority()); SecurityConfigValidator validator = new SecurityConfigValidator(getSecurityManager()); try { config.setName(null);
PasswordValidator.DEFAULT_NAME); SecurityConfigValidator validator = new SecurityConfigValidator(getSecurityManager()); if (!getSecurityManager().isStrongEncryptionAvailable()) { config.setPasswordEncoderName(getStrongPBEPasswordEncoder().getName()); validator.validateRemoveUserGroupService(config); fail("no name should fail"); getSecurityManager().removeUserGroupService(config); } catch (SecurityConfigException ex) { assertEquals(NAME_REQUIRED, ex.getId());
@Test public void testNamedServices() { SecurityConfigValidator validator = new SecurityConfigValidator(getSecurityManager()); Class<?>[] extensionPoints = new Class<?>[] {