Package org.apache.servicemix.soap

Examples of org.apache.servicemix.soap.SoapFault


                throw retry;
            } catch (SoapFault fault) {
                sendFault(fault, request, response);
                return;
            } catch (Exception e) {
                SoapFault fault = new SoapFault(e);
                sendFault(fault, request, response);
                return;
            }
        } else {
            String id = (String) request.getAttribute(MessageExchange.class.getName());
View Full Code Here


            writer.write(response.getOutputStream());
        }
    }

    private void processFault(MessageExchange exchange, HttpServletRequest request, HttpServletResponse response) throws Exception {
        SoapFault fault = new SoapFault(
                        (QName) exchange.getFault().getProperty(JBIMarshaler.SOAP_FAULT_CODE),
                        (QName) exchange.getFault().getProperty(JBIMarshaler.SOAP_FAULT_SUBCODE),
                        (String) exchange.getFault().getProperty(JBIMarshaler.SOAP_FAULT_REASON),
                        (URI) exchange.getFault().getProperty(JBIMarshaler.SOAP_FAULT_NODE),
                        (URI) exchange.getFault().getProperty(JBIMarshaler.SOAP_FAULT_ROLE),
View Full Code Here

        } else if (exchange.getStatus() == ExchangeStatus.ACTIVE) {
            // check for fault
            Fault jbiFault = exchange.getFault();
            if (jbiFault != null) {
                // convert fault to SOAP message
                SoapFault fault = new SoapFault(SoapFault.RECEIVER, null, null, null, jbiFault.getContent());
                SoapMessage soapFault = soapHelper.onFault(ctx, fault);
                Map headers = (Map) jbiFault.getProperty(JbiConstants.PROTOCOL_HEADERS);
                response = endpoint.getMarshaler().toJMS(soapFault, headers, session);
            } else {
                NormalizedMessage outMsg = exchange.getMessage("out");
View Full Code Here

    protected void testWriteSoap11(boolean useDom) throws Exception {
        SoapMarshaler marshaler = new SoapMarshaler(true, useDom);
        marshaler.setSoapUri(SoapMarshaler.SOAP_11_URI);
        SoapMessage msg = new SoapMessage();
        SoapFault fault = new SoapFault(new QName("my:urn", "code"), null, "My reason", null, null, new StringSource("<ns1:hello xmlns:ns1='my:urn'>world</ns1:hello>"));
        msg.setFault(fault);
        ByteArrayOutputStream baos = new ByteArrayOutputStream();
        marshaler.createWriter(msg).write(baos);
        log.info(baos.toString());
View Full Code Here

   
    protected void testWriteSoap12(boolean useDom) throws Exception {
        SoapMarshaler marshaler = new SoapMarshaler(true, useDom);
        marshaler.setSoapUri(SoapMarshaler.SOAP_12_URI);
        SoapMessage msg = new SoapMessage();
        SoapFault fault = new SoapFault(new QName("my:urn", "code"), null, "My reason", null, null,
                                        new StringSource("<ns1:hello xmlns:ns1='my:urn'>world</ns1:hello>"));
        msg.setFault(fault);
        ByteArrayOutputStream baos = new ByteArrayOutputStream();
        marshaler.createWriter(msg).write(baos);
        log.info(baos.toString());
View Full Code Here

          Object value = headers.get(qname);
                if (isWSANamespace(qname.getNamespaceURI())) {
            if (nsUri == null) {
              nsUri = qname.getNamespaceURI();
            } else if (!nsUri.equals(qname.getNamespaceURI())) {
              throw new SoapFault(SoapFault.SENDER, "Inconsistent use of wsa namespaces");
            }
            if (WSAddressingConstants.EL_ACTION.equals(qname.getLocalPart())) {
              action = getHeaderText(value);
                String[] parts = URIResolver.split3(action);
                context.setProperty(Context.INTERFACE, new QName(parts[0], parts[1]));
View Full Code Here

                wsResult = secEngine.processSecurityHeader(
                                doc, actor, handler,
                                reqData.getSigCrypto(),
                                reqData.getDecCrypto());
            } catch (WSSecurityException ex) {
                throw new SoapFault(ex);
            }

            if (wsResult == null) { // no security header found
                if (doAction == WSConstants.NO_SECURITY) {
                    return;
                } else {
                    throw new SoapFault(new WSSecurityException(
                                    "WSSecurityHandler: Request does not contain required Security header"));
                }
            }

            if (reqData.getWssConfig().isEnableSignatureConfirmation()) {
                checkSignatureConfirmation(reqData, wsResult);
            }

            /*
             * Now we can check the certificate used to sign the message. In the
             * following implementation the certificate is only trusted if
             * either it itself or the certificate of the issuer is installed in
             * the keystore.
             *
             * Note: the method verifyTrust(X509Certificate) allows custom
             * implementations with other validation algorithms for subclasses.
             */

            // Extract the signature action result from the action vector
            WSSecurityEngineResult actionResult = WSSecurityUtil.fetchActionResult(wsResult, WSConstants.SIGN);

            if (actionResult != null) {
                X509Certificate returnCert = actionResult.getCertificate();

                if (returnCert != null) {
                    if (!verifyTrust(returnCert, reqData)) {
                        throw new SoapFault(new WSSecurityException(
                                        "WSSecurityHandler: the certificate used for the signature is not trusted"));
                    }
                }
            }

            /*
             * Perform further checks on the timestamp that was transmitted in
             * the header. In the following implementation the timestamp is
             * valid if it was created after (now-ttl), where ttl is set on
             * server side, not by the client.
             *
             * Note: the method verifyTimestamp(Timestamp) allows custom
             * implementations with other validation algorithms for subclasses.
             */

            // Extract the timestamp action result from the action vector
            actionResult = WSSecurityUtil.fetchActionResult(wsResult, WSConstants.TS);

            if (actionResult != null) {
                Timestamp timestamp = actionResult.getTimestamp();

                if (timestamp != null) {
                    if (!verifyTimestamp(timestamp, decodeTimeToLive(reqData))) {
                        throw new SoapFault(new WSSecurityException(
                                        "WSSecurityHandler: the timestamp could not be validated"));
                    }
                }
            }

            /*
             * now check the security actions: do they match, in right order?
             */
            if (!checkReceiverResults(wsResult, actions)) {
                throw new SoapFault(new WSSecurityException(
                                "WSSecurityHandler: security processing failed (actions mismatch)"));

            }
            /*
             * All ok up to this point. Now construct and setup the security
View Full Code Here

            }
           
            doSenderAction(doAction, doc, reqData, actions, true);
        }
        catch (WSSecurityException e) {
            throw new SoapFault(e);
        }
        finally {
            reqData.clear();
            reqData = null;
            currentHandler.set(null);
View Full Code Here

        normalizedMessage.setSecuritySubject(soapMessage.getSubject());
        if (soapMessage.getFault() != null) {
            if (normalizedMessage instanceof Fault == false) {
                throw new IllegalStateException("The soap message is a fault but the jbi message is not");
            }
            SoapFault fault = soapMessage.getFault();
            normalizedMessage.setProperty(SOAP_FAULT_CODE, fault.getCode());
            normalizedMessage.setProperty(SOAP_FAULT_SUBCODE, fault.getSubcode());
            normalizedMessage.setProperty(SOAP_FAULT_REASON, fault.getReason());
            normalizedMessage.setProperty(SOAP_FAULT_NODE, fault.getNode());
            normalizedMessage.setProperty(SOAP_FAULT_ROLE, fault.getRole());
            normalizedMessage.setContent(fault.getDetails());
        } else {
            normalizedMessage.setContent(soapMessage.getSource());
        }
  }
View Full Code Here

            QName code = (QName) normalizedMessage.getProperty(SOAP_FAULT_CODE);
            QName subcode = (QName) normalizedMessage.getProperty(SOAP_FAULT_SUBCODE);
            String reason = (String) normalizedMessage.getProperty(SOAP_FAULT_REASON);
            URI node = (URI) normalizedMessage.getProperty(SOAP_FAULT_NODE);
            URI role = (URI) normalizedMessage.getProperty(SOAP_FAULT_ROLE);
            SoapFault fault = new SoapFault(code, subcode, reason, node, role, normalizedMessage.getContent());
            soapMessage.setFault(fault);
        } else {
            soapMessage.setSource(normalizedMessage.getContent());
        }
  }
View Full Code Here

TOP

Related Classes of org.apache.servicemix.soap.SoapFault

Copyright © 2018 www.massapicom. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.