This is an automated email from the ASF dual-hosted git repository. coheigea pushed a commit to branch coheigea/saml-refactor-new in repository https://gitbox.apache.org/repos/asf/ws-wss4j.git
The following commit(s) were added to refs/heads/coheigea/saml-refactor-new by this push: new 51d87a15e Fixing build again 51d87a15e is described below commit 51d87a15e318cac6001143ffb513f94e8cb1b1aa Author: Colm O hEigeartaigh <cohei...@apache.org> AuthorDate: Tue Jun 17 04:07:55 2025 +0100 Fixing build again --- .../integration/test/kerberos/KerberosTest.java | 21 ++++++++++----------- 1 file changed, 10 insertions(+), 11 deletions(-) diff --git a/integration/src/test/java/org/apache/wss4j/integration/test/kerberos/KerberosTest.java b/integration/src/test/java/org/apache/wss4j/integration/test/kerberos/KerberosTest.java index 228db1f52..afef85dec 100644 --- a/integration/src/test/java/org/apache/wss4j/integration/test/kerberos/KerberosTest.java +++ b/integration/src/test/java/org/apache/wss4j/integration/test/kerberos/KerberosTest.java @@ -60,7 +60,6 @@ import org.apache.wss4j.dom.message.WSSecEncrypt; import org.apache.wss4j.dom.message.WSSecHeader; import org.apache.wss4j.dom.message.WSSecSignature; import org.apache.wss4j.dom.message.token.KerberosSecurity; -import org.apache.wss4j.dom.util.WSSecurityUtil; import org.apache.wss4j.dom.validate.KerberosTokenValidator; import org.apache.wss4j.stax.ext.WSSConstants; import org.apache.wss4j.stax.ext.WSSSecurityProperties; @@ -185,7 +184,7 @@ public class KerberosTest { } }; bst.retrieveServiceTicket("alice", callbackHandler, "b...@service.ws.apache.org"); - WSSecurityUtil.prependChildElement(secHeader.getSecurityHeaderElement(), bst.getElement()); + XMLUtils.prependChildElement(secHeader.getSecurityHeaderElement(), bst.getElement()); if (LOG.isDebugEnabled()) { String outputString = @@ -327,7 +326,7 @@ public class KerberosTest { }; bst.retrieveServiceTicket("alice", callbackHandler, "b...@service.ws.apache.org"); bst.setID("Id-" + bst.hashCode()); - WSSecurityUtil.prependChildElement(secHeader.getSecurityHeaderElement(), bst.getElement()); + XMLUtils.prependChildElement(secHeader.getSecurityHeaderElement(), bst.getElement()); WSSecSignature sign = new WSSecSignature(secHeader); sign.setSignatureAlgorithm(SignatureMethod.HMAC_SHA1); @@ -416,7 +415,7 @@ public class KerberosTest { Document signedDoc = sign.build(null); - WSSecurityUtil.prependChildElement(secHeader.getSecurityHeaderElement(), bst.getElement()); + XMLUtils.prependChildElement(secHeader.getSecurityHeaderElement(), bst.getElement()); if (LOG.isDebugEnabled()) { String outputString = @@ -478,7 +477,7 @@ public class KerberosTest { }; bst.retrieveServiceTicket("alice", callbackHandler, "b...@service.ws.apache.org"); bst.setID("Id-" + bst.hashCode()); - WSSecurityUtil.prependChildElement(secHeader.getSecurityHeaderElement(), bst.getElement()); + XMLUtils.prependChildElement(secHeader.getSecurityHeaderElement(), bst.getElement()); WSSecEncrypt builder = new WSSecEncrypt(secHeader); builder.setSymmetricEncAlgorithm(WSConstants.AES_128); @@ -559,7 +558,7 @@ public class KerberosTest { Document encryptedDoc = builder.build(null, secretKey); - WSSecurityUtil.prependChildElement(secHeader.getSecurityHeaderElement(), bst.getElement()); + XMLUtils.prependChildElement(secHeader.getSecurityHeaderElement(), bst.getElement()); if (LOG.isDebugEnabled()) { String outputString = @@ -633,7 +632,7 @@ public class KerberosTest { Document encryptedDoc = builder.build(null, secretKey); - WSSecurityUtil.prependChildElement(secHeader.getSecurityHeaderElement(), bst.getElement()); + XMLUtils.prependChildElement(secHeader.getSecurityHeaderElement(), bst.getElement()); if (LOG.isDebugEnabled()) { String outputString = @@ -785,7 +784,7 @@ public class KerberosTest { sign.setSecretKey(secretKey.getEncoded()); sign.build(null); - WSSecurityUtil.prependChildElement(secHeader.getSecurityHeaderElement(), bst.getElement()); + XMLUtils.prependChildElement(secHeader.getSecurityHeaderElement(), bst.getElement()); javax.xml.transform.Transformer transformer = TRANSFORMER_FACTORY.newTransformer(); transformer.transform(new DOMSource(doc), new StreamResult(baos)); @@ -882,7 +881,7 @@ public class KerberosTest { sign.build(null); - WSSecurityUtil.prependChildElement(secHeader.getSecurityHeaderElement(), bst.getElement()); + XMLUtils.prependChildElement(secHeader.getSecurityHeaderElement(), bst.getElement()); javax.xml.transform.Transformer transformer = TRANSFORMER_FACTORY.newTransformer(); transformer.transform(new DOMSource(doc), new StreamResult(baos)); @@ -1128,7 +1127,7 @@ public class KerberosTest { builder.setCustomReferenceValue(WSConstants.WSS_GSS_KRB_V5_AP_REQ); builder.setEncKeyId(bst.getID()); builder.build(null, secretKey); - WSSecurityUtil.prependChildElement(secHeader.getSecurityHeaderElement(), bst.getElement()); + XMLUtils.prependChildElement(secHeader.getSecurityHeaderElement(), bst.getElement()); javax.xml.transform.Transformer transformer = TRANSFORMER_FACTORY.newTransformer(); transformer.transform(new DOMSource(doc), new StreamResult(baos)); @@ -1222,7 +1221,7 @@ public class KerberosTest { builder.build(null, secretKey); - WSSecurityUtil.prependChildElement(secHeader.getSecurityHeaderElement(), bst.getElement()); + XMLUtils.prependChildElement(secHeader.getSecurityHeaderElement(), bst.getElement()); javax.xml.transform.Transformer transformer = TRANSFORMER_FACTORY.newTransformer(); transformer.transform(new DOMSource(doc), new StreamResult(baos));