Schema validation is well known for XML content. Since JSON has become very popular in combination with REST services the need for JSON schema validation has also increased.
JSON schema validation is available since Camel 2.20.0 matching Talend Studio version 7.0.1.
This article describes how JSON schema validation can be used for Talend Studio route development.
This blog focuses on technical solutions around security and application integration tasks
Showing posts with label Testing. Show all posts
Showing posts with label Testing. Show all posts
28 September 2018
06 February 2017
Kerberos Debugging in Java
Working with Kerberos can easily cause a lot of trouble. Troubleshooting can take several hours.
In this blog I'll show you what will help you best when using Kerberos with Java for example to secure a Hadoop cluster.
When Kerberos is not working as expected it is important to understand why. Enabling Kerberos debug logging is a very valuable resource to understand what is happening.
To enable Kerberos debugging you need to set the following JVM property:
Usually you will define your Kerberos configuration within your
There are also a few other JVM properties that are usually not required, but can be useful to override/define your configuration at application startup:
Here are some more shell commands that are very helpful to test if Kerberos is working in general (outside of your Java application):
In this blog I'll show you what will help you best when using Kerberos with Java for example to secure a Hadoop cluster.
When Kerberos is not working as expected it is important to understand why. Enabling Kerberos debug logging is a very valuable resource to understand what is happening.
To enable Kerberos debugging you need to set the following JVM property:
-Dsun.security.krb5.debug=trueNow read your log file very carefully. This will help you to understand what is missing.
Usually you will define your Kerberos configuration within your
C:\Windows\krb5.ini
or /etc/krb5.conf
file. Make sure that your hostname mapping to your Kerberos realm is correct in here.There are also a few other JVM properties that are usually not required, but can be useful to override/define your configuration at application startup:
-Djava.security.krb5.kdc=hostname.of-your.kerberos.server -Djava.security.krb5.realm=YOUR.KERBEROS.REALM -Djava.security.auth.login.config=file:/C:/Programme/Tomcat-IDP/conf/kerberos.jaas
Kerberos is very sensitive to DNS configuration.
Here are some more shell commands that are very helpful to test if Kerberos is working in general (outside of your Java application):
# Login with a specific keytab file kinit -k -t /path/to/your/keytab # List all local available tokens. After kinit there should be at least your tgt token. klist # Request a ticket for a specific service. Check if the service is registered correctly at your Kerberos server. kvno service/hostname@domainhttps://web.mit.edu/kerberos/krb5-1.12/doc/user/user_commands/kvno.html
22 September 2016
How to enable Fediz Plugin Logging
If you are using the Apache Fediz plugin to enable WS-Federation Support for your Tomcat container, you will not see any log statements from the Fediz Plugin by default. Especially when testing or analyzing issues with the plugin you will be interested in actually seeing some log statements from the plugin.
In this blog post I'll explain to you what need to be done to get all DEBUG log level statements from the Apache Fediz Tomcat Plugin using Log4J.
In this blog post I'll explain to you what need to be done to get all DEBUG log level statements from the Apache Fediz Tomcat Plugin using Log4J.
16 October 2014
Integration Testing for STS Extensions with Jetty
Recently I had to develop some extensions (ClaimHandler, Validator) to the CXF STS. My problem at first was, how to write an integration test that proves the correct implementation of my extensions.
At first I placed my Mockup classes and web config in the
In this post I'll explain how to setup you maven pom file so that you can use Jetty in your integration test phase if your packaging goal is not a war file but a simple jar file instead and all your web configuration and classes are located in your test folder.
At first I placed my Mockup classes and web config in the
src/main
folder from my maven project and added the jetty plugin to my pom.xml
file. This way I was able to start my REST MockupService simply by typing mvn jetty:run
on the console. After starting the service I was able to execute my test classes directly from Eclipse. But this approach did not satisfy me at all, because now I had lots of files in my main project folder, which would not be needed once I build and deploy my STS extensions to another STS installation. Somehow I needed to move all files (Mockup Service, Spring beans.xml, web.xml, etc.) to the test project folder.In this post I'll explain how to setup you maven pom file so that you can use Jetty in your integration test phase if your packaging goal is not a war file but a simple jar file instead and all your web configuration and classes are located in your test folder.
Subscribe to:
Posts (Atom)