options.setAction("urn:echo");
options.setTo(new EndpointReference("http://127.0.0.1:" +
PORT +
"/axis2/services/SecureService" + i));
ServiceContext context = serviceClient.getServiceContext();
context.setProperty(RampartMessageData.KEY_RAMPART_POLICY,
loadPolicy("/rampart/policy/" + i + ".xml"));
serviceClient.setOptions(options);
if (i == 31) {
OMNamespace omNamespace = OMAbstractFactory.getOMFactory().createOMNamespace(
"http://sample.com", "myNs");
SOAPHeaderBlock header = OMAbstractFactory.getSOAP12Factory()
.createSOAPHeaderBlock("VitalHeader", omNamespace);
header.addChild(AXIOMUtil.stringToOM("<foo>This is a sample Header</foo>"));
serviceClient.addHeader(header);
}
// Invoking the serive in the TestCase-28 should fail. So handling it differently..
if (i == 28) {
try {
//Blocking invocation
serviceClient.sendReceive(getOMElement());
fail("Service Should throw an error..");
} catch (AxisFault axisFault) {
assertEquals("Expected encrypted part missing", axisFault.getMessage());
}
}
else{
//Blocking invocation
serviceClient.sendReceive(getEchoElement());
}
}
System.out.println("--------------Testing negative scenarios----------------------------");
for (int i = 1; i <= 22; i++) {
if (!basic256Supported && (i == 3 || i == 4 || i == 5)) {
//Skip the Basic256 tests
continue;
}
Options options = new Options();
if (i == 13) {
continue;
}
System.out.println("Testing WS-Sec: negative scenario " + i);
options.setAction("urn:returnError");
options.setTo(new EndpointReference("http://127.0.0.1:" +
PORT +
"/axis2/services/SecureService" + i));
ServiceContext context = serviceClient.getServiceContext();
context.setProperty(RampartMessageData.KEY_RAMPART_POLICY,
loadPolicy("/rampart/policy/" + i + ".xml"));
serviceClient.setOptions(options);
try {
//Blocking invocation