[jira] Updated: (CXF-3064) JAX-RS SSL on Google App Engine

2010-12-29 Thread Sergey Beryozkin (JIRA)

 [ 
https://issues.apache.org/jira/browse/CXF-3064?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sergey Beryozkin updated CXF-3064:
--

Component/s: Transports

> JAX-RS SSL on Google App Engine
> ---
>
> Key: CXF-3064
> URL: https://issues.apache.org/jira/browse/CXF-3064
> Project: CXF
>  Issue Type: Improvement
>  Components: JAX-RS, Transports
>Affects Versions: 2.2.11
>Reporter: Gary Rudolph
>
> I've been using JAX-RS with CXF with Google App Engine with success as a 
> service provider as well as client proxies. Unfortunately, when a jaxrs 
> spring injected client needs https I run into issues as the GAE 
> {{HttpURLConnection}} is non-standard and doesn't contain the method 
> {{getSSLSocketFactory}}.
> I noticed that {{TLSClientParameters}} now contains a 
> {{setSSLSocketFactory}}, but it's not exposed through the spring xsd. Can we 
> please change the {{}} xsd to support injecting the 
> {{sslSocketFactory}}? Then I could get it from GAE and do it myself.
> The other option is to have {{HttpsURLConnectionFactory.decorateWithTLS}} 
> attempt to get the {{SSLSocketFactory}} using 
> {{SSLSocketFactory.getSSLSocketFactory}}.
> Note, I'm doing the following in a spring config:
> {code:xml}
> https://api.twilio.com/*";>
>   
>useHttpsURLConnectionDefaultSslSocketFactory="true" disableCNCheck="true"/>
>   
>   foo
>   bar
>   
> 
>  address="https://api.twilio.com/2008-08-01"; 
> serviceClass="com.lolay.where.service.support.TwilioResource">
>   
>   
>   
> 
> {code}
> Then, I'm receiving the following error:
> {noformat}
> Oct 13, 2010 4:05:56 PM org.apache.cxf.transport.https.SSLUtils 
> getCiphersuites
> INFO: The cipher suites have not been configured, falling back to cipher 
> suite filters.
> Oct 13, 2010 4:05:56 PM org.apache.cxf.transport.https.SSLUtils 
> getCiphersuites
> INFO: The cipher suite filters have not been configured, falling back to 
> default filters.
> Oct 13, 2010 4:05:56 PM org.apache.cxf.transport.https.SSLUtils 
> getCiphersFromList
> INFO: The cipher suites have been set to SSL_RSA_WITH_RC4_128_MD5, 
> SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, 
> TLS_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, 
> TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, 
> TLS_DHE_DSS_WITH_AES_256_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, 
> SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, 
> SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, 
> SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, 
> SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, 
> SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_KRB5_WITH_RC4_128_SHA, 
> TLS_KRB5_WITH_RC4_128_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, 
> TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, 
> TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_RC4_40_SHA, 
> TLS_KRB5_EXPORT_WITH_RC4_40_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, 
> TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5.  
> Oct 13, 2010 4:05:56 PM org.apache.cxf.phase.PhaseInterceptorChain 
> doDefaultLogging
> WARNING: Interceptor for 
> {http://support.service.where.lolay.com/}TwilioResource has thrown exception, 
> unwinding now
> org.apache.cxf.interceptor.Fault: Could not send Message.
>   at 
> org.apache.cxf.interceptor.MessageSenderInterceptor.handleMessage(MessageSenderInterceptor.java:48)
>   at 
> org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:243)
>   at 
> org.apache.cxf.jaxrs.client.ClientProxyImpl.doChainedInvocation(ClientProxyImpl.java:438)
>   at 
> org.apache.cxf.jaxrs.client.ClientProxyImpl.invoke(ClientProxyImpl.java:177)
>   at $Proxy43.sendSmsMessage(Unknown Source)
>   at 
> com.lolay.where.service.resources.BaseResourceImpl.sendSms(BaseResourceImpl.java:497)
>   at 
> com.lolay.where.service.resources.TokenResourceImpl.passwordReset(TokenResourceImpl.java:333)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
>   at java.lang.reflect.Method.invoke(Method.java:597)
>   at 
> com.google.appengine.tools.development.agent.runtime.Runtime.invoke(Runtime.java:100)
>   at 
> org.apache.cxf.service.invoker.AbstractInvoker.performInvocation(AbstractInvoker.java:173)
>   at 
> org.apache.cxf.service.invoker.AbstractInvoker.invoke(AbstractInvoker.java:89)
>   at org.apache.cxf.jaxrs.JAXRSInvoker.invoke(JAXRSInvoker.java:133)
>   at org.apache.cxf.jaxrs.JAXRSInvoker.invoke(JAXRSInvoker.java:82)
>   at 
> org.apache.cxf.interceptor.ServiceInvokerInterceptor$1.run(S

[jira] Commented: (CXF-3064) JAX-RS SSL on Google App Engine

2010-12-29 Thread Sergey Beryozkin (JIRA)

[ 
https://issues.apache.org/jira/browse/CXF-3064?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12975760#action_12975760
 ] 

Sergey Beryozkin commented on CXF-3064:
---

Hi 

Is there a chance that you can attach a simple test project, zip, or maven 
based ?
Alternatively, can you please try CXF 2.3.1 and post the exception stack trace, 
if it still occurs ?

thanks, Sergey


> JAX-RS SSL on Google App Engine
> ---
>
> Key: CXF-3064
> URL: https://issues.apache.org/jira/browse/CXF-3064
> Project: CXF
>  Issue Type: Improvement
>  Components: JAX-RS, Transports
>Affects Versions: 2.2.11
>Reporter: Gary Rudolph
>
> I've been using JAX-RS with CXF with Google App Engine with success as a 
> service provider as well as client proxies. Unfortunately, when a jaxrs 
> spring injected client needs https I run into issues as the GAE 
> {{HttpURLConnection}} is non-standard and doesn't contain the method 
> {{getSSLSocketFactory}}.
> I noticed that {{TLSClientParameters}} now contains a 
> {{setSSLSocketFactory}}, but it's not exposed through the spring xsd. Can we 
> please change the {{}} xsd to support injecting the 
> {{sslSocketFactory}}? Then I could get it from GAE and do it myself.
> The other option is to have {{HttpsURLConnectionFactory.decorateWithTLS}} 
> attempt to get the {{SSLSocketFactory}} using 
> {{SSLSocketFactory.getSSLSocketFactory}}.
> Note, I'm doing the following in a spring config:
> {code:xml}
> https://api.twilio.com/*";>
>   
>useHttpsURLConnectionDefaultSslSocketFactory="true" disableCNCheck="true"/>
>   
>   foo
>   bar
>   
> 
>  address="https://api.twilio.com/2008-08-01"; 
> serviceClass="com.lolay.where.service.support.TwilioResource">
>   
>   
>   
> 
> {code}
> Then, I'm receiving the following error:
> {noformat}
> Oct 13, 2010 4:05:56 PM org.apache.cxf.transport.https.SSLUtils 
> getCiphersuites
> INFO: The cipher suites have not been configured, falling back to cipher 
> suite filters.
> Oct 13, 2010 4:05:56 PM org.apache.cxf.transport.https.SSLUtils 
> getCiphersuites
> INFO: The cipher suite filters have not been configured, falling back to 
> default filters.
> Oct 13, 2010 4:05:56 PM org.apache.cxf.transport.https.SSLUtils 
> getCiphersFromList
> INFO: The cipher suites have been set to SSL_RSA_WITH_RC4_128_MD5, 
> SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, 
> TLS_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, 
> TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, 
> TLS_DHE_DSS_WITH_AES_256_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, 
> SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, 
> SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, 
> SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, 
> SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, 
> SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_KRB5_WITH_RC4_128_SHA, 
> TLS_KRB5_WITH_RC4_128_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, 
> TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, 
> TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_RC4_40_SHA, 
> TLS_KRB5_EXPORT_WITH_RC4_40_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, 
> TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5.  
> Oct 13, 2010 4:05:56 PM org.apache.cxf.phase.PhaseInterceptorChain 
> doDefaultLogging
> WARNING: Interceptor for 
> {http://support.service.where.lolay.com/}TwilioResource has thrown exception, 
> unwinding now
> org.apache.cxf.interceptor.Fault: Could not send Message.
>   at 
> org.apache.cxf.interceptor.MessageSenderInterceptor.handleMessage(MessageSenderInterceptor.java:48)
>   at 
> org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:243)
>   at 
> org.apache.cxf.jaxrs.client.ClientProxyImpl.doChainedInvocation(ClientProxyImpl.java:438)
>   at 
> org.apache.cxf.jaxrs.client.ClientProxyImpl.invoke(ClientProxyImpl.java:177)
>   at $Proxy43.sendSmsMessage(Unknown Source)
>   at 
> com.lolay.where.service.resources.BaseResourceImpl.sendSms(BaseResourceImpl.java:497)
>   at 
> com.lolay.where.service.resources.TokenResourceImpl.passwordReset(TokenResourceImpl.java:333)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
>   at java.lang.reflect.Method.invoke(Method.java:597)
>   at 
> com.google.appengine.tools.development.agent.runtime.Runtime.invoke(Runtime.java:100)
>   at 
> org.apache.cxf.service.invoker.AbstractInvoker.performInvocation(AbstractInvoker.java:173)
>   at 
> org.apache.cxf.service.invoker.AbstractInvoker.invoke(AbstractInvo

[jira] Resolved: (CXF-3154) Add extraClass property to JAXBElementProvider in order to avoid @XmlSeeAlso annotations

2010-12-29 Thread Sergey Beryozkin (JIRA)

 [ 
https://issues.apache.org/jira/browse/CXF-3154?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sergey Beryozkin resolved CXF-3154.
---

   Resolution: Fixed
Fix Version/s: 2.4
   2.3.2
 Assignee: Sergey Beryozkin

Example :


  
  
 
   org.apache.cxf.jaxrs.resources.SuperBook
   org.apache.cxf.jaxrs.resources.SuperBook2
 
  
  

> Add extraClass property to JAXBElementProvider in order to avoid @XmlSeeAlso 
> annotations
> 
>
> Key: CXF-3154
> URL: https://issues.apache.org/jira/browse/CXF-3154
> Project: CXF
>  Issue Type: Improvement
>  Components: JAX-RS
>Affects Versions: 2.2.11
> Environment: Spring 3, Apache CXF, JAXB
>Reporter: Ivan Vitoria
>Assignee: Sergey Beryozkin
> Fix For: 2.3.2, 2.4
>
>
> As Sergey suggested to me through mailing list, it would be appreciate if 
> JAXBElementProvider had the extraClass property, which currently belongs to 
> JAXBDataBinding, because it is quite interesting in order to avoid the 
> annotation @XmlSeeAlso in inheritance scenery.
> Thanks,
> Ivan

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.



[jira] Created: (CXF-3223) introduce a threshold system property for staxutils to avoid parsing message with unreasonable inner element level

2010-12-29 Thread Freeman Fang (JIRA)
introduce a threshold system property for staxutils to avoid parsing message 
with unreasonable inner element level 
---

 Key: CXF-3223
 URL: https://issues.apache.org/jira/browse/CXF-3223
 Project: CXF
  Issue Type: Improvement
Reporter: Freeman Fang
Assignee: Freeman Fang
 Fix For: 2.3.2, 2.4


if the incoming message like
..
"n" here could be very huge, then it will take long time(a 500k size message 
with only element tag but no real content will take minutes) for staxutils to 
parse this message. In some case, this kind of message with unreasonable inner 
element level should be considered as vulnerability, so we need introduce inner 
element level threshold property for staxutils, so that we get chance that if 
it reach the threshold, just throw exception and stop parsing, this way ensure 
release resource soon in case of vulnerability.

The default value of this property should be -1 which means no inner element 
limit, for backward compatible.


-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.



[jira] Updated: (CXF-3129) wsdl2java: place @Generated annotation on generated code

2010-12-29 Thread Nithya Sivasubramaniam (JIRA)

 [ 
https://issues.apache.org/jira/browse/CXF-3129?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Nithya Sivasubramaniam updated CXF-3129:


Attachment: Patch for CXF 3129 - version 2.patch

(1) Added a new option, '-mark-generated' to wsdl2java, as discussed in the dev 
mailing list. When this option is set, all generated java files will have 
@Generated annotation set on classes, fields, constructors and methods.
(1.1) Passes the mark-generated flag to jaxb xjc so that all classes generated 
by jaxb include the annotation.
(1.2) Modified velocity templates to support adding the mark-generated flag for 
classes directly generated by CXF.
(2) Added CodeGenOptionTest.testMarkGeneratedOption() that exercises the new 
-mark-generated option. This test requires a newer version of jaxb xjc (version 
2.2.3). So the test is commented out and should be uncommented once we move to 
using the newer version of jaxb.


> wsdl2java: place @Generated annotation on generated code
> 
>
> Key: CXF-3129
> URL: https://issues.apache.org/jira/browse/CXF-3129
> Project: CXF
>  Issue Type: New Feature
>  Components: Tooling
>Affects Versions: 2.3.0
>Reporter: Andrew Spencer
>Priority: Minor
> Attachments: Patch for CXF 3129 - version 2.patch, Patch for CXF 
> 3129.txt
>
>
> It would be considerate on the part of CXF to place @Generated on the Java 
> source generated by wsdl2java.
> @Generated is in the javax.annotation package and is a marker for generated 
> code.  It allows code quality tools to ignore the generated code, as 
> described in this feature request for Sonar: 
> http://jira.codehaus.org/browse/SONAR-1042

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.