Example usage for org.springframework.mock.web MockHttpServletRequest setParameter

List of usage examples for org.springframework.mock.web MockHttpServletRequest setParameter

Introduction

In this page you can find the example usage for org.springframework.mock.web MockHttpServletRequest setParameter.

Prototype

public void setParameter(String name, String... values) 

Source Link

Document

Set an array of values for the specified HTTP parameter.

Usage

From source file:fr.paris.lutece.portal.web.user.AdminUserJspBeanTest.java

public void testDoModifyAdminUserRolesNoToken() throws AccessDeniedException, UserNotSignedException {
    AdminUserJspBean bean = new AdminUserJspBean();
    MockHttpServletRequest request = new MockHttpServletRequest();
    AdminUser user = getUserToModify();/*w w  w.  j  a va  2  s  .c om*/
    try {
        for (Role role : RoleHome.findAll()) {
            assertFalse(AdminUserHome.hasRole(user, role.getRole()));
        }
        AdminAuthenticationService.getInstance().registerUser(request, user);
        request.setParameter("id_user", Integer.toString(user.getUserId()));
        assertFalse(RoleHome.findAll().isEmpty());
        for (Role role : RoleHome.findAll()) {
            request.addParameter("roles", role.getRole());
        }
        bean.doModifyAdminUserRoles(request);
        fail("Should have thrown");
    } catch (AccessDeniedException e) {
        assertNull(AdminMessageService.getMessage(request));
        AdminUser stored = AdminUserHome.findByPrimaryKey(user.getUserId());
        for (Role role : RoleHome.findAll()) {
            assertFalse(AdminUserHome.hasRole(stored, role.getRole()));
        }
    } finally {
        disposeOfUser(user);
    }
}

From source file:fr.paris.lutece.portal.web.user.AdminUserJspBeanTest.java

public void testDoModifyAdminUserRolesInvladidToken() throws AccessDeniedException, UserNotSignedException {
    AdminUserJspBean bean = new AdminUserJspBean();
    MockHttpServletRequest request = new MockHttpServletRequest();
    AdminUser user = getUserToModify();/* w w  w  . j  av  a 2  s  .  c o m*/
    try {
        for (Role role : RoleHome.findAll()) {
            assertFalse(AdminUserHome.hasRole(user, role.getRole()));
        }
        AdminAuthenticationService.getInstance().registerUser(request, user);
        request.setParameter("id_user", Integer.toString(user.getUserId()));
        assertFalse(RoleHome.findAll().isEmpty());
        for (Role role : RoleHome.findAll()) {
            request.addParameter("roles", role.getRole());
        }
        request.addParameter(SecurityTokenService.PARAMETER_TOKEN,
                SecurityTokenService.getInstance().getToken(request, "jsp/admin/user/ManageUserRoles.jsp")
                        + "b");
        bean.doModifyAdminUserRoles(request);
        fail("Should have thrown");
    } catch (AccessDeniedException e) {
        assertNull(AdminMessageService.getMessage(request));
        AdminUser stored = AdminUserHome.findByPrimaryKey(user.getUserId());
        for (Role role : RoleHome.findAll()) {
            assertFalse(AdminUserHome.hasRole(stored, role.getRole()));
        }
    } finally {
        disposeOfUser(user);
    }
}

From source file:org.openmrs.module.htmlformentry.WorkflowStateTagTest.java

@Test
public void shouldCreateNewProgramIfEncounterDateNotDuringProgramEnrollmentOnEdit() throws Exception {
    // first enroll the patient in the program
    enrollInProgram(START_STATE, DATE);//  w  w w .  jav  a2 s .c  o m
    new RegressionTestHelper() {

        @Override
        public String getFormName() {
            return XML_FORM_NAME;
        }

        @Override
        public String[] widgetLabels() {
            return new String[] { "Date:", "Location:", "Provider:", "State:" };
        }

        @Override
        public void setupRequest(MockHttpServletRequest request, Map<String, String> widgets) {
            request.addParameter(widgets.get("Location:"), "2");
            request.addParameter(widgets.get("Provider:"), "502");
            request.addParameter(widgets.get("Date:"), dateAsString(DATE));
            request.addParameter(widgets.get("State:"), ""); // set no state
        }

        public boolean doEditEncounter() {
            return true;
        }

        public String[] widgetLabelsForEdit() {
            return new String[] { "Date:", "Location:", "Provider:", "State:" };
        }

        public void setupEditRequest(MockHttpServletRequest request, Map<String, String> widgets) {
            request.setParameter(widgets.get("Location:"), "2");
            request.setParameter(widgets.get("Provider:"), "502");
            request.setParameter(widgets.get("Date:"), dateAsString(PAST_DATE));
            request.setParameter(widgets.get("State:"), START_STATE);
        }

        @SuppressWarnings("deprecation")
        public void testEditedResults(SubmissionResults results) {
            results.assertNoErrors();

            ProgramWorkflowState state = Context.getProgramWorkflowService().getStateByUuid(START_STATE);

            // we should now have two program enrollments, one on PAST_DATE and one on DATE
            ProgramWorkflow workflow = Context.getProgramWorkflowService().getWorkflow(100);
            Assert.assertEquals(2, Context.getProgramWorkflowService()
                    .getPatientPrograms(patient, workflow.getProgram(), null, null, null, null, false).size());

            // now verify that new state is correct
            PatientProgram patientProgram = getPatientProgramByState(results.getPatient(), state, PAST_DATE);
            Assert.assertNotNull(patientProgram);
            Assert.assertEquals(dateAsString(PAST_DATE), dateAsString(patientProgram.getDateEnrolled()));

            // assert that the program has only one state
            Assert.assertEquals(1, patientProgram.getStates().size());

            // assert that the start state of the state is correct
            PatientState patientState = getPatientState(patientProgram, state, PAST_DATE);
            Assert.assertNotNull(patientState);
            Assert.assertEquals(dateAsString(PAST_DATE), dateAsString(patientState.getStartDate()));
            Assert.assertNull(patientState.getEndDate());
        }

    }.run();
}

From source file:fr.paris.lutece.portal.web.user.AdminUserJspBeanTest.java

public void testDoModifyEmailPatternReset()
        throws PasswordResetException, AccessDeniedException, UserNotSignedException {
    String origEmailPattern = getEmailPattern();
    assertTrue("plugin-regularexpression is not there", isEmailPatternSetManually());
    AdminUser user = getUserToModify();/* w ww.  j  a va 2 s . co  m*/
    try {
        AdminUserService.doModifyEmailPattern(origEmailPattern + "b", isEmailPatternSetManually());
        assertEquals(origEmailPattern + "b", getEmailPattern());
        AdminUserJspBean bean = new AdminUserJspBean();
        MockHttpServletRequest request = new MockHttpServletRequest();
        AdminAuthenticationService.getInstance().registerUser(request, user);
        bean.init(request, "CORE_USERS_MANAGEMENT");
        request.addParameter(SecurityTokenService.PARAMETER_TOKEN,
                SecurityTokenService.getInstance().getToken(request, "ManageAdvancedParameters.jsp"));
        request.setParameter("reset", "reset");
        bean.doModifyEmailPattern(request);
        assertEquals(origEmailPattern, getEmailPattern());
        assertTrue(isEmailPatternSetManually());
    } finally {
        AdminUserService.doModifyEmailPattern(origEmailPattern, isEmailPatternSetManually());
        disposeOfUser(user);
    }
}

From source file:fr.paris.lutece.portal.web.user.AdminUserJspBeanTest.java

public void testDoModifyEmailPatternResetInvalidToken()
        throws PasswordResetException, AccessDeniedException, UserNotSignedException {
    String origEmailPattern = getEmailPattern();
    assertTrue("plugin-regularexpression is not there", isEmailPatternSetManually());
    AdminUserService.doModifyEmailPattern(origEmailPattern + "b", isEmailPatternSetManually());
    AdminUser user = getUserToModify();//from w  w w  .  jav a 2  s.  co  m
    try {
        assertEquals(origEmailPattern + "b", getEmailPattern());
        AdminUserJspBean bean = new AdminUserJspBean();
        MockHttpServletRequest request = new MockHttpServletRequest();
        AdminAuthenticationService.getInstance().registerUser(request, user);
        bean.init(request, "CORE_USERS_MANAGEMENT");
        request.addParameter(SecurityTokenService.PARAMETER_TOKEN,
                SecurityTokenService.getInstance().getToken(request, "ManageAdvancedParameters.jsp") + "b");
        request.setParameter("reset", "reset");
        bean.doModifyEmailPattern(request);
        fail("Should have thrown");
    } catch (AccessDeniedException e) {
        assertEquals(origEmailPattern + "b", getEmailPattern());
    } finally {
        AdminUserService.doModifyEmailPattern(origEmailPattern, isEmailPatternSetManually());
        disposeOfUser(user);
    }
}

From source file:fr.paris.lutece.portal.web.user.AdminUserJspBeanTest.java

public void testDoModifyEmailPattern()
        throws PasswordResetException, AccessDeniedException, UserNotSignedException {
    String origEmailPattern = getEmailPattern();
    assertTrue("plugin-regularexpression is not there", isEmailPatternSetManually());
    AdminUserJspBean bean = new AdminUserJspBean();
    MockHttpServletRequest request = new MockHttpServletRequest();
    AdminUser user = getUserToModify();//www.  java 2s.c o  m
    AdminAuthenticationService.getInstance().registerUser(request, user);
    bean.init(request, "CORE_USERS_MANAGEMENT");
    request.addParameter(SecurityTokenService.PARAMETER_TOKEN,
            SecurityTokenService.getInstance().getToken(request, "ManageAdvancedParameters.jsp"));
    request.setParameter("is_email_pattern_set_manually", Boolean.FALSE.toString());
    request.setParameter("email_pattern", origEmailPattern + "b");
    try {
        bean.doModifyEmailPattern(request);
        assertEquals(origEmailPattern + "b", getEmailPattern());
        assertTrue(isEmailPatternSetManually());
    } finally {
        AdminUserService.doModifyEmailPattern(origEmailPattern, isEmailPatternSetManually());
        disposeOfUser(user);
    }
}

From source file:fr.paris.lutece.portal.web.user.AdminUserJspBeanTest.java

public void testDoModifyEmailPatternInvalidToken()
        throws PasswordResetException, AccessDeniedException, UserNotSignedException {
    String origEmailPattern = getEmailPattern();
    assertTrue("plugin-regularexpression is not there", isEmailPatternSetManually());
    AdminUserJspBean bean = new AdminUserJspBean();
    MockHttpServletRequest request = new MockHttpServletRequest();
    AdminUser user = getUserToModify();/*from   www.  j  a v  a2s  .co m*/
    AdminAuthenticationService.getInstance().registerUser(request, user);
    bean.init(request, "CORE_USERS_MANAGEMENT");
    request.addParameter(SecurityTokenService.PARAMETER_TOKEN,
            SecurityTokenService.getInstance().getToken(request, "ManageAdvancedParameters.jsp") + "b");
    request.setParameter("is_email_pattern_set_manually", Boolean.FALSE.toString());
    request.setParameter("email_pattern", origEmailPattern + "b");
    try {
        bean.doModifyEmailPattern(request);
        fail("Should have thrown");
    } catch (AccessDeniedException e) {
        assertEquals(origEmailPattern, getEmailPattern());
        assertTrue(isEmailPatternSetManually());
    } finally {
        AdminUserService.doModifyEmailPattern(origEmailPattern, isEmailPatternSetManually());
        disposeOfUser(user);
    }
}

From source file:fr.paris.lutece.portal.web.user.AdminUserJspBeanTest.java

public void testDoModifyEmailPatternNoToken()
        throws PasswordResetException, AccessDeniedException, UserNotSignedException {
    String origEmailPattern = getEmailPattern();
    assertTrue("plugin-regularexpression is not there", isEmailPatternSetManually());
    AdminUserJspBean bean = new AdminUserJspBean();
    MockHttpServletRequest request = new MockHttpServletRequest();
    AdminUser user = getUserToModify();//from  ww w . j a  v a2 s.  c  o m
    AdminAuthenticationService.getInstance().registerUser(request, user);
    bean.init(request, "CORE_USERS_MANAGEMENT");
    request.addParameter(SecurityTokenService.PARAMETER_TOKEN,
            SecurityTokenService.getInstance().getToken(request, "ManageAdvancedParameters.jsp") + "b");
    request.setParameter("is_email_pattern_set_manually", Boolean.FALSE.toString());
    request.setParameter("email_pattern", origEmailPattern + "b");
    try {
        bean.doModifyEmailPattern(request);
        fail("Should have thrown");
    } catch (AccessDeniedException e) {
        assertEquals(origEmailPattern, getEmailPattern());
        assertTrue(isEmailPatternSetManually());
    } finally {
        AdminUserService.doModifyEmailPattern(origEmailPattern, isEmailPatternSetManually());
        disposeOfUser(user);
    }
}

From source file:fr.paris.lutece.portal.web.user.AdminUserJspBeanTest.java

public void testDoModifyDefaultUserSecurityValues() throws AccessDeniedException, UserNotSignedException {
    assertFalse("Test does not account for advanced security parameters", AdminUserService
            .getBooleanSecurityParameter(AdminUserService.DSKEY_USE_ADVANCED_SECURITY_PARAMETERS));
    boolean origForceChangePasswordReinit = Boolean.parseBoolean(
            DefaultUserParameterHome.findByKey(AdminUserService.DSKEY_FORCE_CHANGE_PASSWORD_REINIT));
    int origPasswordMinimumLength = AdminUserService
            .getIntegerSecurityParameter(AdminUserService.DSKEY_PASSWORD_MINIMUM_LENGTH);
    int origResetTokenValidity = AdminUserService
            .getIntegerSecurityParameter(AdminUserService.DSKEY_RESET_TOKEN_VALIDITY);
    boolean origLockResetTokenToSession = AdminUserService
            .getBooleanSecurityParameter(AdminUserService.DSKEY_LOCK_RESET_TOKEN_TO_SESSION);
    int origAccountLifeTime = AdminUserService
            .getIntegerSecurityParameter(AdminUserService.DSKEY_ACCOUNT_LIFE_TIME);
    int origTimeBeforeAlertAccount = AdminUserService
            .getIntegerSecurityParameter(AdminUserService.DSKEY_TIME_BEFORE_ALERT_ACCOUNT);
    int origNbAlertAccount = AdminUserService
            .getIntegerSecurityParameter(AdminUserService.DSKEY_NB_ALERT_ACCOUNT);
    int origTimeBetweenAlertsAccount = AdminUserService
            .getIntegerSecurityParameter(AdminUserService.DSKEY_TIME_BETWEEN_ALERTS_ACCOUNT);
    int origAccessFailuresMax = AdminUserService
            .getIntegerSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_MAX);
    int origAccessFailuresInterval = AdminUserService
            .getIntegerSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_INTERVAL);
    String origBannedDomainNames = AdminUserService
            .getLargeSecurityParameter(AdminUserService.DSKEY_BANNED_DOMAIN_NAMES);
    AdminUserJspBean bean = new AdminUserJspBean();
    MockHttpServletRequest request = new MockHttpServletRequest();
    AdminUser user = getUserToModify();//www.  j a v a 2  s.  c  o  m
    AdminAuthenticationService.getInstance().registerUser(request, user);
    bean.init(request, "CORE_USERS_MANAGEMENT");
    request.addParameter(SecurityTokenService.PARAMETER_TOKEN,
            SecurityTokenService.getInstance().getToken(request, "ManageAdvancedParameters.jsp"));
    request.setParameter("force_change_password_reinit",
            origForceChangePasswordReinit ? Boolean.FALSE.toString() : Boolean.TRUE.toString());
    request.setParameter("password_minimum_length", Integer.toString(origPasswordMinimumLength + 1));
    request.setParameter("reset_token_validity", Integer.toString(origResetTokenValidity + 1));
    request.setParameter("lock_reset_token_to_session",
            origLockResetTokenToSession ? Boolean.FALSE.toString() : Boolean.TRUE.toString());
    request.setParameter("account_life_time", Integer.toString(origAccountLifeTime + 1));
    request.setParameter("time_before_alert_account", Integer.toString(origTimeBeforeAlertAccount + 1));
    request.setParameter("nb_alert_account", Integer.toString(origNbAlertAccount + 1));
    request.setParameter("time_between_alerts_account", Integer.toString(origTimeBetweenAlertsAccount + 1));
    request.setParameter("access_failures_max", Integer.toString(origAccessFailuresMax + 1));
    request.setParameter("access_failures_interval", Integer.toString(origAccessFailuresInterval + 1));
    request.setParameter("banned_domain_names", origBannedDomainNames + "b");
    try {
        bean.doModifyDefaultUserSecurityValues(request);
        assertEquals(!origForceChangePasswordReinit, Boolean.parseBoolean(
                DefaultUserParameterHome.findByKey(AdminUserService.DSKEY_FORCE_CHANGE_PASSWORD_REINIT)));
        assertEquals(origPasswordMinimumLength + 1,
                AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_PASSWORD_MINIMUM_LENGTH));
        assertEquals(origResetTokenValidity + 1,
                AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_RESET_TOKEN_VALIDITY));
        assertEquals(!origLockResetTokenToSession, AdminUserService
                .getBooleanSecurityParameter(AdminUserService.DSKEY_LOCK_RESET_TOKEN_TO_SESSION));
        assertEquals(origAccountLifeTime + 1,
                AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_ACCOUNT_LIFE_TIME));
        assertEquals(origTimeBeforeAlertAccount + 1,
                AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_TIME_BEFORE_ALERT_ACCOUNT));
        assertEquals(origNbAlertAccount + 1,
                AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_NB_ALERT_ACCOUNT));
        assertEquals(origTimeBetweenAlertsAccount + 1, AdminUserService
                .getIntegerSecurityParameter(AdminUserService.DSKEY_TIME_BETWEEN_ALERTS_ACCOUNT));
        assertEquals(origAccessFailuresMax + 1,
                AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_MAX));
        assertEquals(origAccessFailuresInterval + 1,
                AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_INTERVAL));
        assertEquals(origBannedDomainNames + "b",
                AdminUserService.getLargeSecurityParameter(AdminUserService.DSKEY_BANNED_DOMAIN_NAMES));
    } finally {
        DefaultUserParameterHome.update(AdminUserService.DSKEY_FORCE_CHANGE_PASSWORD_REINIT,
                Boolean.toString(origForceChangePasswordReinit));
        AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_PASSWORD_MINIMUM_LENGTH,
                Integer.toString(origPasswordMinimumLength));
        AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_RESET_TOKEN_VALIDITY,
                Integer.toString(origResetTokenValidity));
        AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_LOCK_RESET_TOKEN_TO_SESSION,
                Boolean.toString(origLockResetTokenToSession));
        AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_ACCOUNT_LIFE_TIME,
                Integer.toString(origAccountLifeTime));
        AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_TIME_BEFORE_ALERT_ACCOUNT,
                Integer.toString(origTimeBeforeAlertAccount));
        AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_NB_ALERT_ACCOUNT,
                Integer.toString(origNbAlertAccount));
        AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_TIME_BETWEEN_ALERTS_ACCOUNT,
                Integer.toString(origTimeBetweenAlertsAccount));
        AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_MAX,
                Integer.toString(origAccessFailuresMax));
        AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_INTERVAL,
                Integer.toString(origAccessFailuresInterval));
        AdminUserService.updateLargeSecurityParameter(AdminUserService.DSKEY_BANNED_DOMAIN_NAMES,
                origBannedDomainNames);
        disposeOfUser(user);
    }
}

From source file:fr.paris.lutece.portal.web.user.AdminUserJspBeanTest.java

public void testDoModifyDefaultUserSecurityValuesInvalidToken()
        throws AccessDeniedException, UserNotSignedException {
    assertFalse("Test does not account for advanced security parameters", AdminUserService
            .getBooleanSecurityParameter(AdminUserService.DSKEY_USE_ADVANCED_SECURITY_PARAMETERS));
    boolean origForceChangePasswordReinit = Boolean.parseBoolean(
            DefaultUserParameterHome.findByKey(AdminUserService.DSKEY_FORCE_CHANGE_PASSWORD_REINIT));
    int origPasswordMinimumLength = AdminUserService
            .getIntegerSecurityParameter(AdminUserService.DSKEY_PASSWORD_MINIMUM_LENGTH);
    int origResetTokenValidity = AdminUserService
            .getIntegerSecurityParameter(AdminUserService.DSKEY_RESET_TOKEN_VALIDITY);
    boolean origLockResetTokenToSession = AdminUserService
            .getBooleanSecurityParameter(AdminUserService.DSKEY_LOCK_RESET_TOKEN_TO_SESSION);
    int origAccountLifeTime = AdminUserService
            .getIntegerSecurityParameter(AdminUserService.DSKEY_ACCOUNT_LIFE_TIME);
    int origTimeBeforeAlertAccount = AdminUserService
            .getIntegerSecurityParameter(AdminUserService.DSKEY_TIME_BEFORE_ALERT_ACCOUNT);
    int origNbAlertAccount = AdminUserService
            .getIntegerSecurityParameter(AdminUserService.DSKEY_NB_ALERT_ACCOUNT);
    int origTimeBetweenAlertsAccount = AdminUserService
            .getIntegerSecurityParameter(AdminUserService.DSKEY_TIME_BETWEEN_ALERTS_ACCOUNT);
    int origAccessFailuresMax = AdminUserService
            .getIntegerSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_MAX);
    int origAccessFailuresInterval = AdminUserService
            .getIntegerSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_INTERVAL);
    String origBannedDomainNames = AdminUserService
            .getLargeSecurityParameter(AdminUserService.DSKEY_BANNED_DOMAIN_NAMES);
    AdminUserJspBean bean = new AdminUserJspBean();
    MockHttpServletRequest request = new MockHttpServletRequest();
    AdminUser user = getUserToModify();/* w ww  . j  a  v a2s . c  o m*/
    AdminAuthenticationService.getInstance().registerUser(request, user);
    bean.init(request, "CORE_USERS_MANAGEMENT");
    request.addParameter(SecurityTokenService.PARAMETER_TOKEN,
            SecurityTokenService.getInstance().getToken(request, "ManageAdvancedParameters.jsp") + "b");
    request.setParameter("force_change_password_reinit",
            origForceChangePasswordReinit ? Boolean.FALSE.toString() : Boolean.TRUE.toString());
    request.setParameter("password_minimum_length", Integer.toString(origPasswordMinimumLength + 1));
    request.setParameter("reset_token_validity", Integer.toString(origResetTokenValidity + 1));
    request.setParameter("lock_reset_token_to_session",
            origLockResetTokenToSession ? Boolean.FALSE.toString() : Boolean.TRUE.toString());
    request.setParameter("account_life_time", Integer.toString(origAccountLifeTime + 1));
    request.setParameter("time_before_alert_account", Integer.toString(origTimeBeforeAlertAccount + 1));
    request.setParameter("nb_alert_account", Integer.toString(origNbAlertAccount + 1));
    request.setParameter("time_between_alerts_account", Integer.toString(origTimeBetweenAlertsAccount + 1));
    request.setParameter("access_failures_max", Integer.toString(origAccessFailuresMax + 1));
    request.setParameter("access_failures_interval", Integer.toString(origAccessFailuresInterval + 1));
    request.setParameter("banned_domain_names", origBannedDomainNames + "b");
    try {
        bean.doModifyDefaultUserSecurityValues(request);
        fail("Should have thrown");
    } catch (AccessDeniedException e) {
        assertEquals(origForceChangePasswordReinit, Boolean.parseBoolean(
                DefaultUserParameterHome.findByKey(AdminUserService.DSKEY_FORCE_CHANGE_PASSWORD_REINIT)));
        assertEquals(origPasswordMinimumLength,
                AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_PASSWORD_MINIMUM_LENGTH));
        assertEquals(origResetTokenValidity,
                AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_RESET_TOKEN_VALIDITY));
        assertEquals(origLockResetTokenToSession, AdminUserService
                .getBooleanSecurityParameter(AdminUserService.DSKEY_LOCK_RESET_TOKEN_TO_SESSION));
        assertEquals(origAccountLifeTime,
                AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_ACCOUNT_LIFE_TIME));
        assertEquals(origTimeBeforeAlertAccount,
                AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_TIME_BEFORE_ALERT_ACCOUNT));
        assertEquals(origNbAlertAccount,
                AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_NB_ALERT_ACCOUNT));
        assertEquals(origTimeBetweenAlertsAccount, AdminUserService
                .getIntegerSecurityParameter(AdminUserService.DSKEY_TIME_BETWEEN_ALERTS_ACCOUNT));
        assertEquals(origAccessFailuresMax,
                AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_MAX));
        assertEquals(origAccessFailuresInterval,
                AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_INTERVAL));
        assertEquals(origBannedDomainNames,
                AdminUserService.getLargeSecurityParameter(AdminUserService.DSKEY_BANNED_DOMAIN_NAMES));
    } finally {
        DefaultUserParameterHome.update(AdminUserService.DSKEY_FORCE_CHANGE_PASSWORD_REINIT,
                Boolean.toString(origForceChangePasswordReinit));
        AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_PASSWORD_MINIMUM_LENGTH,
                Integer.toString(origPasswordMinimumLength));
        AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_RESET_TOKEN_VALIDITY,
                Integer.toString(origResetTokenValidity));
        AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_LOCK_RESET_TOKEN_TO_SESSION,
                Boolean.toString(origLockResetTokenToSession));
        AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_ACCOUNT_LIFE_TIME,
                Integer.toString(origAccountLifeTime));
        AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_TIME_BEFORE_ALERT_ACCOUNT,
                Integer.toString(origTimeBeforeAlertAccount));
        AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_NB_ALERT_ACCOUNT,
                Integer.toString(origNbAlertAccount));
        AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_TIME_BETWEEN_ALERTS_ACCOUNT,
                Integer.toString(origTimeBetweenAlertsAccount));
        AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_MAX,
                Integer.toString(origAccessFailuresMax));
        AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_INTERVAL,
                Integer.toString(origAccessFailuresInterval));
        AdminUserService.updateLargeSecurityParameter(AdminUserService.DSKEY_BANNED_DOMAIN_NAMES,
                origBannedDomainNames);
        disposeOfUser(user);
    }
}