\r
import junit.framework.Assert;\r
\r
+import static org.junit.Assert.assertFalse;\r
+import static org.junit.Assert.assertTrue;\r
+\r
+import java.io.ByteArrayInputStream;\r
+import java.io.ByteArrayOutputStream;\r
+import java.io.File;\r
+import java.io.OutputStream;\r
+\r
+import javax.crypto.CipherInputStream;\r
+import javax.crypto.CipherOutputStream;\r
+\r
+import org.junit.Test;\r
+import org.onap.aaf.cadi.AES;\r
+import org.onap.aaf.cadi.Symm;\r
+\r
+import junit.framework.Assert;\r
+\r
public class JU_AES {\r
\r
@Test\r
passin = aes.decrypt(encrypted);\r
Assert.assertEquals(orig, new String(passin));\r
}\r
-\r
- @Test\r
- public void testInputStream() throws Exception {\r
- AES aes = new AES();\r
- String orig = "I'm a password, really";\r
- ByteArrayInputStream bais = new ByteArrayInputStream(orig.getBytes());\r
- CipherInputStream cis = aes.inputStream(bais, true);\r
- ByteArrayOutputStream baos = new ByteArrayOutputStream();\r
- Symm.base64.encode(cis, baos);\r
- cis.close();\r
-\r
- byte[] b64encrypted;\r
- System.out.println(new String(b64encrypted=baos.toByteArray()));\r
- \r
- \r
- baos.reset();\r
- CipherOutputStream cos = aes.outputStream(baos, false);\r
- Symm.base64.decode(new ByteArrayInputStream(b64encrypted),cos);\r
- cos.close();\r
- Assert.assertEquals(orig, new String(baos.toByteArray()));\r
- }\r
-\r
- @Test\r
- public void testObtain() throws Exception {\r
- byte[] keygen = Symm.baseCrypt().keygen();\r
- \r
- Symm symm = Symm.obtain(new ByteArrayInputStream(keygen));\r
- \r
- String orig ="Another Password, please";\r
- String encrypted = symm.enpass(orig);\r
- System.out.println(encrypted);\r
- String decrypted = symm.depass(encrypted);\r
- System.out.println(decrypted);\r
- Assert.assertEquals(orig, decrypted);\r
- }\r
\r
@Test\r
- public void test1() throws Exception {\r
- AES aes = new AES();\r
- String orig = "I'm a password, really Cool";\r
+ public void testAESFileStream() throws Exception {\r
+ File fi = new File("test/AESKeyFile");\r
+ AES aes = new AES(fi);\r
+ \r
+ String orig = "I'm a password, really";\r
byte[] passin = orig.getBytes();\r
byte[] encrypted = aes.encrypt(passin);\r
byte[] b64enc = Symm.base64.encode(encrypted);\r
encrypted = Symm.base64.decode(b64enc);\r
passin = aes.decrypt(encrypted);\r
Assert.assertEquals(orig, new String(passin));\r
+ \r
+ File temp = new File("tempFile");\r
+ try {\r
+ assertFalse(temp.exists());\r
+ aes.save(temp);\r
+ assertTrue(temp.exists());\r
+ } catch (Exception e) {\r
+ } finally {\r
+ temp.delete();\r
+ } \r
+ \r
}\r
\r
@Test\r
- public void testInputStream1() throws Exception {\r
+ public void testInputStream() throws Exception {\r
AES aes = new AES();\r
- String orig = "I'm a password, really cool";\r
+ String orig = "I'm a password, really";\r
ByteArrayInputStream bais = new ByteArrayInputStream(orig.getBytes());\r
CipherInputStream cis = aes.inputStream(bais, true);\r
ByteArrayOutputStream baos = new ByteArrayOutputStream();\r
\r
byte[] b64encrypted;\r
System.out.println(new String(b64encrypted=baos.toByteArray()));\r
- \r
+\r
+ CipherInputStream cis1 = aes.inputStream(bais, false);\r
+ ByteArrayOutputStream baos1 = new ByteArrayOutputStream();\r
+ Symm.base64.encode(cis1, baos1);\r
+ cis.close();\r
+\r
+ byte[] b64encrypted1;\r
+ System.out.println(new String(b64encrypted1=baos1.toByteArray()));\r
\r
baos.reset();\r
CipherOutputStream cos = aes.outputStream(baos, false);\r
Symm.base64.decode(new ByteArrayInputStream(b64encrypted),cos);\r
cos.close();\r
Assert.assertEquals(orig, new String(baos.toByteArray()));\r
+ \r
+ OutputStream stream = aes.outputStream(System.out, true);\r
+ assertTrue(stream instanceof CipherOutputStream);\r
+\r
}\r
\r
@Test\r
- public void testObtain1() throws Exception {\r
+ public void testObtain() throws Exception {\r
byte[] keygen = Symm.baseCrypt().keygen();\r
\r
Symm symm = Symm.obtain(new ByteArrayInputStream(keygen));\r
\r
- String orig ="Another Password, please cool";\r
+ String orig ="Another Password, please";\r
String encrypted = symm.enpass(orig);\r
System.out.println(encrypted);\r
String decrypted = symm.depass(encrypted);\r
System.out.println(decrypted);\r
Assert.assertEquals(orig, decrypted);\r
}\r
-\r
\r
@Test\r
- public void test2() throws Exception {\r
+ public void test1() throws Exception {\r
AES aes = new AES();\r
- String orig = "I'm a password, really Nice";\r
+ String orig = "I'm a password, really";\r
byte[] passin = orig.getBytes();\r
byte[] encrypted = aes.encrypt(passin);\r
byte[] b64enc = Symm.base64.encode(encrypted);\r
passin = aes.decrypt(encrypted);\r
Assert.assertEquals(orig, new String(passin));\r
}\r
-\r
- @Test\r
- public void testInputStream2() throws Exception {\r
- AES aes = new AES();\r
- String orig = "I'm a password, really Nice";\r
- ByteArrayInputStream bais = new ByteArrayInputStream(orig.getBytes());\r
- CipherInputStream cis = aes.inputStream(bais, true);\r
- ByteArrayOutputStream baos = new ByteArrayOutputStream();\r
- Symm.base64.encode(cis, baos);\r
- cis.close();\r
-\r
- byte[] b64encrypted;\r
- System.out.println(new String(b64encrypted=baos.toByteArray()));\r
- \r
- \r
- baos.reset();\r
- CipherOutputStream cos = aes.outputStream(baos, false);\r
- Symm.base64.decode(new ByteArrayInputStream(b64encrypted),cos);\r
- cos.close();\r
- Assert.assertEquals(orig, new String(baos.toByteArray()));\r
- }\r
-\r
- @Test\r
- public void testObtain2() throws Exception {\r
- byte[] keygen = Symm.baseCrypt().keygen();\r
- \r
- Symm symm = Symm.obtain(new ByteArrayInputStream(keygen));\r
- \r
- String orig ="Another Password, please Nice";\r
- String encrypted = symm.enpass(orig);\r
- System.out.println(encrypted);\r
- String decrypted = symm.depass(encrypted);\r
- System.out.println(decrypted);\r
- Assert.assertEquals(orig, decrypted);\r
- }\r
-\r
\r
@Test\r
- public void test3() throws Exception {\r
- AES aes = new AES();\r
- String orig = "I'm a password, magic";\r
+ public void testAESFileStream1() throws Exception {\r
+ File fi = new File("test/AESKeyFile");\r
+ AES aes = new AES(fi);\r
+ \r
+ String orig = "I'm a password, really";\r
byte[] passin = orig.getBytes();\r
byte[] encrypted = aes.encrypt(passin);\r
byte[] b64enc = Symm.base64.encode(encrypted);\r
encrypted = Symm.base64.decode(b64enc);\r
passin = aes.decrypt(encrypted);\r
Assert.assertEquals(orig, new String(passin));\r
+ \r
+ File temp = new File("tempFile");\r
+ try {\r
+ assertFalse(temp.exists());\r
+ aes.save(temp);\r
+ assertTrue(temp.exists());\r
+ } catch (Exception e) {\r
+ } finally {\r
+ temp.delete();\r
+ } \r
+ \r
}\r
\r
@Test\r
- public void testInputStream3() throws Exception {\r
+ public void testInputStream1() throws Exception {\r
AES aes = new AES();\r
- String orig = "I'm a password, magic";\r
+ String orig = "I'm a password, really";\r
ByteArrayInputStream bais = new ByteArrayInputStream(orig.getBytes());\r
CipherInputStream cis = aes.inputStream(bais, true);\r
ByteArrayOutputStream baos = new ByteArrayOutputStream();\r
\r
byte[] b64encrypted;\r
System.out.println(new String(b64encrypted=baos.toByteArray()));\r
- \r
+\r
+ CipherInputStream cis1 = aes.inputStream(bais, false);\r
+ ByteArrayOutputStream baos1 = new ByteArrayOutputStream();\r
+ Symm.base64.encode(cis1, baos1);\r
+ cis.close();\r
+\r
+ byte[] b64encrypted1;\r
+ System.out.println(new String(b64encrypted1=baos1.toByteArray()));\r
\r
baos.reset();\r
CipherOutputStream cos = aes.outputStream(baos, false);\r
Symm.base64.decode(new ByteArrayInputStream(b64encrypted),cos);\r
cos.close();\r
Assert.assertEquals(orig, new String(baos.toByteArray()));\r
+ \r
+ OutputStream stream = aes.outputStream(System.out, true);\r
+ assertTrue(stream instanceof CipherOutputStream);\r
+\r
}\r
\r
@Test\r
- public void testObtain3() throws Exception {\r
+ public void testObtain1() throws Exception {\r
byte[] keygen = Symm.baseCrypt().keygen();\r
\r
Symm symm = Symm.obtain(new ByteArrayInputStream(keygen));\r
\r
- String orig ="Another Password, magic";\r
+ String orig ="Another Password, please";\r
String encrypted = symm.enpass(orig);\r
System.out.println(encrypted);\r
String decrypted = symm.depass(encrypted);\r
System.out.println(decrypted);\r
Assert.assertEquals(orig, decrypted);\r
}\r
-\r
}\r
--- /dev/null
+/*******************************************************************************\r
+ * ============LICENSE_START====================================================\r
+ * * org.onap.aaf\r
+ * * ===========================================================================\r
+ * * Copyright © 2017 AT&T Intellectual Property. All rights reserved.\r
+ * * ===========================================================================\r
+ * * Licensed under the Apache License, Version 2.0 (the "License");\r
+ * * you may not use this file except in compliance with the License.\r
+ * * You may obtain a copy of the License at\r
+ * * \r
+ * * http://www.apache.org/licenses/LICENSE-2.0\r
+ * * \r
+ * * Unless required by applicable law or agreed to in writing, software\r
+ * * distributed under the License is distributed on an "AS IS" BASIS,\r
+ * * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r
+ * * See the License for the specific language governing permissions and\r
+ * * limitations under the License.\r
+ * * ============LICENSE_END====================================================\r
+ * *\r
+ * * ECOMP is a trademark and service mark of AT&T Intellectual Property.\r
+ * *\r
+ ******************************************************************************/\r
+package org.onap.aaf.cadi;\r
+\r
+import static org.junit.Assert.*;\r
+\r
+import org.junit.Test;\r
+\r
+import static org.junit.Assert.*;\r
+import static org.mockito.Matchers.isA;\r
+import static org.mockito.Mockito.when;\r
+\r
+import java.security.Principal;\r
+import java.util.List;\r
+\r
+import javax.servlet.http.HttpServletRequest;\r
+\r
+import org.junit.Before;\r
+import org.junit.Test;\r
+import org.mockito.Mock;\r
+import org.mockito.Mockito;\r
+import org.mockito.MockitoAnnotations;\r
+import org.onap.aaf.cadi.CachedPrincipal.Resp;\r
+import org.onap.aaf.cadi.filter.MapPermConverter;\r
+import org.onap.aaf.cadi.lur.EpiLur;\r
+import org.onap.aaf.cadi.taf.TafResp;\r
+\r
+public class JU_CadiWrapTest {\r
+ \r
+ @Mock\r
+ private HttpServletRequest request;\r
+ \r
+ @Mock\r
+ private TafResp tafResp;\r
+ \r
+ @Mock\r
+ private Principal principle;\r
+\r
+ @Mock\r
+ private Lur lur;\r
+\r
+ @Before\r
+ public void setUp() throws Exception {\r
+ MockitoAnnotations.initMocks(this);\r
+ }\r
+\r
+ @Test\r
+ public void testInstantiate() throws CadiException {\r
+ Access a = new PropAccess();\r
+ when(tafResp.getAccess()).thenReturn(a);\r
+ \r
+ lur.fishAll(isA(Principal.class), isA(List.class));\r
+ \r
+ EpiLur lur1 = new EpiLur(lur);\r
+ \r
+ CadiWrap wrap = new CadiWrap(request, tafResp, lur1);\r
+ \r
+ assertNull(wrap.getUserPrincipal());\r
+ assertNull(wrap.getRemoteUser());\r
+ assertNull(wrap.getUser());\r
+ assertEquals(wrap.getPermissions(principle).size(), 0);\r
+ \r
+ byte[] arr = {'1','2'};\r
+ wrap.setCred(arr);\r
+ \r
+ assertEquals(arr, wrap.getCred());\r
+ \r
+ wrap.setUser("User1");\r
+ assertEquals("User1", wrap.getUser());\r
+ \r
+ wrap.invalidate("1");\r
+\r
+ assertFalse(wrap.isUserInRole(null));\r
+ \r
+ wrap.set(tafResp, lur);\r
+ \r
+ wrap.invalidate("2");\r
+ \r
+ wrap.isUserInRole("User1");\r
+ }\r
+\r
+ @Test\r
+ public void testInstantiateWithPermConverter() throws CadiException {\r
+ Access a = new PropAccess();\r
+ when(tafResp.getAccess()).thenReturn(a);\r
+ when(tafResp.getPrincipal()).thenReturn(principle);\r
+ \r
+ \r
+ CachingLur<Permission> lur1 = new CachingLur<Permission>() {\r
+\r
+ @Override\r
+ public Permission createPerm(String p) {\r
+ // TODO Auto-generated method stub\r
+ return null;\r
+ }\r
+\r
+ @Override\r
+ public boolean fish(Principal bait, Permission pond) {\r
+ // TODO Auto-generated method stub\r
+ return true;\r
+ }\r
+\r
+ @Override\r
+ public void fishAll(Principal bait, List<Permission> permissions) {\r
+ // TODO Auto-generated method stub\r
+ \r
+ }\r
+\r
+ @Override\r
+ public void destroy() {\r
+ // TODO Auto-generated method stub\r
+ \r
+ }\r
+\r
+ @Override\r
+ public boolean handlesExclusively(Permission pond) {\r
+ // TODO Auto-generated method stub\r
+ return false;\r
+ }\r
+\r
+ @Override\r
+ public boolean supports(String userName) {\r
+ // TODO Auto-generated method stub\r
+ return false;\r
+ }\r
+\r
+ @Override\r
+ public void remove(String user) {\r
+ // TODO Auto-generated method stub\r
+ \r
+ }\r
+\r
+ @Override\r
+ public Resp reload(User<Permission> user) {\r
+ // TODO Auto-generated method stub\r
+ return null;\r
+ }\r
+\r
+ @Override\r
+ public void setDebug(String commaDelimIDsOrNull) {\r
+ // TODO Auto-generated method stub\r
+ \r
+ }\r
+\r
+ @Override\r
+ public void clear(Principal p, StringBuilder sb) {\r
+ // TODO Auto-generated method stub\r
+ \r
+ }\r
+ };\r
+ \r
+ MapPermConverter pc = new MapPermConverter();\r
+ \r
+ CadiWrap wrap = new CadiWrap(request, tafResp, lur1, pc);\r
+ \r
+ assertNotNull(wrap.getUserPrincipal());\r
+ assertNull(wrap.getRemoteUser());\r
+ assertNull(wrap.getUser());\r
+ \r
+ byte[] arr = {'1','2'};\r
+ wrap.setCred(arr);\r
+ \r
+ assertEquals(arr, wrap.getCred());\r
+ \r
+ wrap.setUser("User1");\r
+ assertEquals("User1", wrap.getUser());\r
+ \r
+ wrap.invalidate("1");\r
+ wrap.setPermConverter(new MapPermConverter());\r
+ \r
+ assertTrue(wrap.getLur() instanceof CachingLur);\r
+ assertTrue(wrap.isUserInRole("User1"));\r
+ \r
+ wrap.set(tafResp, lur);\r
+ assertFalse(wrap.isUserInRole("Perm1"));\r
+ }\r
+}\r
\r
import junit.framework.Assert;\r
\r
+import java.io.ByteArrayOutputStream;\r
+import java.io.File;\r
+import java.io.FileInputStream;\r
+\r
+import org.junit.AfterClass;\r
+import org.junit.Test;\r
+import org.onap.aaf.cadi.CmdLine;\r
+import org.onap.aaf.cadi.Symm;\r
+\r
+import junit.framework.Assert;\r
+\r
public class JU_Passcode {\r
@Test\r
public void test() throws Exception {\r
symm = Symm.obtain(fis);\r
} finally {\r
fis.close();\r
+ fi.delete();\r
}\r
String samples[] = {"activevos","ThisIsATestPassword","I have spaces","I have 's, /s and &s and _s"};\r
ByteArrayOutputStream baos;\r
\r
\r
}\r
+ \r
+ @AfterClass\r
+ public static void tearDown() {\r
+ \r
+ }\r
\r
}\r
+++ /dev/null
-a4Ec8sSIn0w1fK5uL-BNBTwRhBGE8PGeJQqZpqS_xGrLqqlEGvgeQLBsBVUpYIBXYSEQLAcmR5Od
-1Jh4eGYGUWgCRlLOLcLDzJSWTOxyfUCBH6fHfYftKY1qFu5YqF75cWAkl8xe9U_iJIBRXhMgoK-Z
-Kzz0wCmGpZgNL-o6-wynfAiuobTomchucJTPzpRtIrw11F9SUCAEyNUEkz_bQAovGul1msyBOeY_
-OjrI0N8h6LeuFzeXhM3on2vXbWVg_tfbfYG4dPFaNXSb0Vj4OyZbx-wFEKNjZFx9SyNbamIEtt_o
-9g_4Ho8L4mNKZZmxfvkalC06Ll8MZYENghRrbPEwFT17ODYrs83_ZU0r1z5iKuSiwccGpfNoNaC7
-OHWaGPijKXxtNHULuv4azSz7sFUSP_fheLs4qf3IJw8qJpQJLbpXnAT9awcCxkDom6ic12oAoyuP
-n9S6etYv1NYumz5p3N1p5ZElHbYso-044-OYPFpBMNnsy3zcTMxH6nEEtm0FJsKFNKkP-z5fcyrc
-hbXmdZM_KxNF4i4X-UOj7g8rpT64VL_iujv4YiKwEpJBAacLkdajKQ8PD5HsMvug_-2w7Xz2EObG
-mfB07CGCCWHRs74UdXDgHl-3HD422VOY0hpV7syO_uj5CoHfvcrWydjiep-uqUQCkakbnxQLb3OO
-eJTMAgCatFRbQWDSp5zyCJDYtRgwH4gqIz8UPm-27Nthka80Tp8dQXzCzyiqNeF99e0wmjy7fgSu
-OPNmQGOvxyOo84k8ychwPAyGUmhldZ1o_P-t90s8N71DbWp0hDGmL34V8FtJYW9ZecEXM2sqnXES
-EiPOxBjesYTrPaJ26as4MYJeG82ijkPj8dN6ejP9hFSR-PY8hm0i2Xc9LZyTTC4ukNjlRdjn7JjG
-aPuPQRWNVVSdufjdn-hdVxdgv-rbqWm_jLFr-eWNVbGkPE0rhNy399YTcBPpelPlUucMwTCIU6jg
-I77TJUDvS-JQBlQgZslIs-Wv-VSg3TYZnRSUDYKDa_FITem4I2Exi2QUydYHvCfcuoNLFa7sOeFg
-W0bq32z0Djfamv-iyPJwSA3XeL4K_EAd7VuDvg0anhCNdvmXy1Ch-d-H9N0qwsj1bfa-kLwthkGE
-mjF7kWh59--W2TB2uTWr2qsKsqIwDom7ZwnJwhxNsv7NvsMUjfBiSm6t_MCxWinhWLeyUITnZKdt
-tlZW8DqzcT60sLYA13oE3r5H8HUCB3-PGwRgzTutcSFabK8s4IhGktR6lRGGTuFTtiTom7VRmGbs
-8iCilsA6qQgzuzX_Zh41AwjxPUVWhYqt5oF3GeqMrAOS4f5MR9JV5O7sr1vwSvPna27MuO2OmnwB
-vnSXHuuz3e5lnxlasb7bFuFfD4ZyHGp0mxDHtA3PQ7uloXbHCXB4kU2kXMma-9RacoCcx2B18xb9
-nvMMEK3WDlLtWUFwKVnO2soeyTBCKcIIaVjCtmS7C_s0vNIxBRXa8XHAIS4VKz8lUDMTheFXDcKm
-uSe2LZ5jqWpPnDZbaKEhWyadlwhqRUa6704_pSP1TWqh_Nh4aDnevdlVD9PLXcynnmuuh1z6zDXI
-DcTdeLVmsAniw9YqGk1wc2L7kXT2L1oMLX3Ssappu0Zii7yyyhQ4rIpel8DF4pcCA5PlOPqSgf3p
-8vsFjoZwrG6gZx3ymQqPU2HsLzarn85QCrEOA31bIvA9nOxEVZaNvJplJg3PFtuGCdIISKJ6yu4N
-eTmhXxFig-4FQO4l51spt9eWmEJnINe8qiFYgQv2AIyOtP5wSa7IlvW5jKIapVGkv34H69yqX0Ko
-hz-iu-pSLKPSdGws000j-e03tYZSH0sGRmBI-3pBBhGqU4YlDKuCx88jhWckh4hmb4gGycu8b5JZ
-vCkJfOil2tyseZcy9r59yOwuFDFJ5At6TCxfx6I9DziT4x_Vtr6StrHKP_-H-Luq5XvBa7UVMOoX
-kd4wQ6Idy8vgrxPm1CDGpl4yQMQIsb4Nwz-tLpaIHIHLe5Gd3KLCxgSennbqMCCswcaaeVoA
\ No newline at end of file
--- /dev/null
+xteeS5pA6m4SW2fMANEeF__VDm3F2wlUqyeUKDKxlSFiS_ICs0Eg7Xeqj3WqbgRqOisc1hLIbyk3\r
+2bal9qYwT59VxcZy-vrS3ytf0uu5gWwxGfo2-ut3CQTBfwVOj88RMdiyM13-dxJGOdQxT9_Czc9A\r
+it4edvcVQOTeazJ9JJ0KtO5tvsdihsaYYOVbMbMWPTzyDKY2KE7iMmPaqeGPLvxZSVvjQzjU8qMp\r
+OwzllAhRXZd0DWOullSotpt8P2VKcbnoKVA2SQvLTt5Zd9TziaaCMP88-fJQUhXvWhUPG_ZdH2R1\r
+MVyS0WrnBN6rY2h_aTiUswYZ6GGTDa_7O4AQixNR02NAbn7718Mw3bbe12d6nJZ2uYqMb9Hl1bzO\r
+-mZbJ_TUVAIUBgOb7XjScIS12JLlUuf-kIlQjfT2kfAzSuwcYHUZmB_jAfdZBjyhqVj4x7N47wb1\r
+7GbBBbECLAPMk9633_3HzadqZu6J3TmfmW2IYR9kqEF1NwfaXgJAL4I43YDSo2XyD-i9MUb3diYd\r
+LVElQP8gwMh2gbfRe_7BU49_HdbCk4n6BNgT0Z0EgtnMAA0ZZWmBTJTz5BlC0lXL-7NAWyOw1vRs\r
+ovjqc46zpQq8LYtJ2Vg5WwfpqBpyXqCdp9QYTNtN0GVB4iPBvaWRsQoZKzEESHavxKbGX2_Z7h2Q\r
+k03Okhl4Ud3MduR6pyxfxVqAdFu3xr2tEIcv_FjyD-5XiTfKcWPw-Srwy-_YiTy_io4nu2swC8Xm\r
+TsNcWtebM0W80L1nw0MwHFFIoAMBrHUjHxIrZL5JWZyaGxUdtnbKKlkVR1kDC8_pHrevwIijAEyi\r
+NnwDYaMw7tZo6f06J3yPVCVzVLLXFCCTkvdJAFBhaZI600mf7UZP2BMqomYVROoQNZDAO_GzP1sX\r
+_B4oebfYPkLk3fBkHasHPDZNy-oNHDEw8ytMXlMhyKX7UHUy28E8zpZWoRMmGPnzOSwp3P-Q08DP\r
+ja05l6vgvGtzuWNUKcFjSTdqx73JJJ1-QrZZlTd0N1gYqhRyh8YssGDYXEHh5zKuF6vNTinJwGLY\r
+P5NnOSBCbm9rcPcZGtZYer-uNUY9Z_rscfxiVork1SfnG25FwxCRkc_Nf47THAVM9T7m9Ou_g2N8\r
+eethvrQxDxEi_DVRBTJYe_9iUOec4KQY7VGhTiFbfvDPRB8yF7Znu5UPJXIeOjvcf9gi8lSwTTRx\r
+sqRpB3D5SJUSnBGzOCUvYRBbGP0olaVYyVXLcDknRTKbwkIf0tKAEFRDkvkXdlJnQ4lldFHuuHO9\r
+G7_iqEjCCNncdtLZMwe6LPe1usfJmnl3x95wkpVQdAKl7QoP5fMR2XoXwQbSO2qwIdgBwq9Zm6FW\r
+wRPStR0pS2ICjHusgmLPsdf2pVZ8q0fqjjzF4Ch7MfOWjhRsK9fCvVDXlrEOACTt7o0roXuswxKT\r
+EEbibkLsEAQOfOCYa66G37yQKRNnR8PWeRLAaZGF8ewfqF0c2KBAQuLYFlE8OthP_vFDKfVT2zMX\r
+BfneXOJNY2kZTEJA4MQOC4_Y1JJ7NJc1zqJRuPD8Ifo4oE1Qo2FE-mjm2G_Zb4XsmBEdWsiSAYum\r
+2DiGm5Io7OXQXv2zOKsBvcoG-24A4M3kTxhEH16sueTKY_DqOjjxkcVIUX_PM7TGkeRU9cnJ2sDH\r
+Y749blu8BWrRKSRiksxwwNAGW_IdElVVGd89gyGGRzZ2I4h-FXf9EBS1sqo-F_hOq_O3KOoMDFWK\r
+gdc4XIqeqmjwVTSpkKyxSCFYQW-aPBuTSdJYmPZRQQlCXwkm7SHbLRBKM4h62koA8A3hpzda3qnZ\r
+w_Wyb8u42yZpqNuUjUUOb4JApmOVCXIe4P9yfhiTbYRvGX50XjPIHBKjAzXhKLGaBaugBYhaGpXf\r
+kFjvsEF-4PrtQWORKudvlk8D7DnhxqgJdG0GoZAETBTCq_m1trg2TJ2WyAMidFUOWrgGPpshFq1F\r
+Nu7buFG6nsOsg4sfLmSm2oYhVb0TmEbBGRr_Apkg6nVJzX7DE_Rvt2slZDoIrXeKSbIJ_i5Y
\ No newline at end of file
--- /dev/null
+<!--\r
+ ============LICENSE_START====================================================\r
+ * org.onap.aaf\r
+ * ===========================================================================\r
+ * Copyright © 2017 AT&T Intellectual Property. All rights reserved.\r
+ * ===========================================================================\r
+ * Licensed under the Apache License, Version 2.0 (the "License");\r
+ * you may not use this file except in compliance with the License.\r
+ * You may obtain a copy of the License at\r
+ * \r
+ * http://www.apache.org/licenses/LICENSE-2.0\r
+ * \r
+ * Unless required by applicable law or agreed to in writing, software\r
+ * distributed under the License is distributed on an "AS IS" BASIS,\r
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r
+ * See the License for the specific language governing permissions and\r
+ * limitations under the License.\r
+ * ============LICENSE_END====================================================\r
+ *\r
+ * ECOMP is a trademark and service mark of AT&T Intellectual Property.\r
+ *\r
+-->\r
+<assembly>\r
+ <id>app</id>\r
+ <formats>\r
+ <format>jar</format>\r
+ </formats>\r
+ <includeBaseDirectory>false</includeBaseDirectory>\r
+ <dependencySets>\r
+ <dependencySet>\r
+ <outputDirectory></outputDirectory>\r
+ <outputFileNameMapping></outputFileNameMapping>\r
+ <unpack>true</unpack>\r
+ <scope>runtime</scope>\r
+ <!-- includes>\r
+ <include>web</include>\r
+ </includes -->\r
+ </dependencySet>\r
+ </dependencySets>\r
+ <fileSets>\r
+ <fileSet>\r
+ <directory>target/classes</directory>\r
+ <outputDirectory></outputDirectory>\r
+ </fileSet>\r
+ </fileSets>\r
+</assembly>\r
</includes>
<excludes>
<exclude>**/JU_LocalLur.java</exclude>
- <exclude>**/JU_BufferedServletInputStream.java</exclude>
- <exclude>**/JU_Passcode.java</exclude>
- <exclude>**/JU_XReader.java</exclude>
+ <!-- <exclude>**/JU_BufferedServletInputStream.java</exclude> -->
+ <!--<exclude>**/JU_Passcode.java</exclude> -->
+ <!--<exclude>**/JU_XReader.java</exclude> -->
<exclude>**/JU_CASS.java</exclude>
<exclude>**/JU_PropertyLocator.java</exclude>
<exclude>**/JU_PermEval.java</exclude>