List of usage examples for org.springframework.mock.web MockHttpServletRequest setParameter
public void setParameter(String name, String... values)
From source file:fr.paris.lutece.portal.web.user.AdminUserJspBeanTest.java
public void testDoModifyAdminUserRolesNoToken() throws AccessDeniedException, UserNotSignedException { AdminUserJspBean bean = new AdminUserJspBean(); MockHttpServletRequest request = new MockHttpServletRequest(); AdminUser user = getUserToModify();/*w w w. j a va 2 s .c om*/ try { for (Role role : RoleHome.findAll()) { assertFalse(AdminUserHome.hasRole(user, role.getRole())); } AdminAuthenticationService.getInstance().registerUser(request, user); request.setParameter("id_user", Integer.toString(user.getUserId())); assertFalse(RoleHome.findAll().isEmpty()); for (Role role : RoleHome.findAll()) { request.addParameter("roles", role.getRole()); } bean.doModifyAdminUserRoles(request); fail("Should have thrown"); } catch (AccessDeniedException e) { assertNull(AdminMessageService.getMessage(request)); AdminUser stored = AdminUserHome.findByPrimaryKey(user.getUserId()); for (Role role : RoleHome.findAll()) { assertFalse(AdminUserHome.hasRole(stored, role.getRole())); } } finally { disposeOfUser(user); } }
From source file:fr.paris.lutece.portal.web.user.AdminUserJspBeanTest.java
public void testDoModifyAdminUserRolesInvladidToken() throws AccessDeniedException, UserNotSignedException { AdminUserJspBean bean = new AdminUserJspBean(); MockHttpServletRequest request = new MockHttpServletRequest(); AdminUser user = getUserToModify();/* w w w . j av a 2 s . c o m*/ try { for (Role role : RoleHome.findAll()) { assertFalse(AdminUserHome.hasRole(user, role.getRole())); } AdminAuthenticationService.getInstance().registerUser(request, user); request.setParameter("id_user", Integer.toString(user.getUserId())); assertFalse(RoleHome.findAll().isEmpty()); for (Role role : RoleHome.findAll()) { request.addParameter("roles", role.getRole()); } request.addParameter(SecurityTokenService.PARAMETER_TOKEN, SecurityTokenService.getInstance().getToken(request, "jsp/admin/user/ManageUserRoles.jsp") + "b"); bean.doModifyAdminUserRoles(request); fail("Should have thrown"); } catch (AccessDeniedException e) { assertNull(AdminMessageService.getMessage(request)); AdminUser stored = AdminUserHome.findByPrimaryKey(user.getUserId()); for (Role role : RoleHome.findAll()) { assertFalse(AdminUserHome.hasRole(stored, role.getRole())); } } finally { disposeOfUser(user); } }
From source file:org.openmrs.module.htmlformentry.WorkflowStateTagTest.java
@Test public void shouldCreateNewProgramIfEncounterDateNotDuringProgramEnrollmentOnEdit() throws Exception { // first enroll the patient in the program enrollInProgram(START_STATE, DATE);// w w w . jav a2 s .c o m new RegressionTestHelper() { @Override public String getFormName() { return XML_FORM_NAME; } @Override public String[] widgetLabels() { return new String[] { "Date:", "Location:", "Provider:", "State:" }; } @Override public void setupRequest(MockHttpServletRequest request, Map<String, String> widgets) { request.addParameter(widgets.get("Location:"), "2"); request.addParameter(widgets.get("Provider:"), "502"); request.addParameter(widgets.get("Date:"), dateAsString(DATE)); request.addParameter(widgets.get("State:"), ""); // set no state } public boolean doEditEncounter() { return true; } public String[] widgetLabelsForEdit() { return new String[] { "Date:", "Location:", "Provider:", "State:" }; } public void setupEditRequest(MockHttpServletRequest request, Map<String, String> widgets) { request.setParameter(widgets.get("Location:"), "2"); request.setParameter(widgets.get("Provider:"), "502"); request.setParameter(widgets.get("Date:"), dateAsString(PAST_DATE)); request.setParameter(widgets.get("State:"), START_STATE); } @SuppressWarnings("deprecation") public void testEditedResults(SubmissionResults results) { results.assertNoErrors(); ProgramWorkflowState state = Context.getProgramWorkflowService().getStateByUuid(START_STATE); // we should now have two program enrollments, one on PAST_DATE and one on DATE ProgramWorkflow workflow = Context.getProgramWorkflowService().getWorkflow(100); Assert.assertEquals(2, Context.getProgramWorkflowService() .getPatientPrograms(patient, workflow.getProgram(), null, null, null, null, false).size()); // now verify that new state is correct PatientProgram patientProgram = getPatientProgramByState(results.getPatient(), state, PAST_DATE); Assert.assertNotNull(patientProgram); Assert.assertEquals(dateAsString(PAST_DATE), dateAsString(patientProgram.getDateEnrolled())); // assert that the program has only one state Assert.assertEquals(1, patientProgram.getStates().size()); // assert that the start state of the state is correct PatientState patientState = getPatientState(patientProgram, state, PAST_DATE); Assert.assertNotNull(patientState); Assert.assertEquals(dateAsString(PAST_DATE), dateAsString(patientState.getStartDate())); Assert.assertNull(patientState.getEndDate()); } }.run(); }
From source file:fr.paris.lutece.portal.web.user.AdminUserJspBeanTest.java
public void testDoModifyEmailPatternReset() throws PasswordResetException, AccessDeniedException, UserNotSignedException { String origEmailPattern = getEmailPattern(); assertTrue("plugin-regularexpression is not there", isEmailPatternSetManually()); AdminUser user = getUserToModify();/* w ww. j a va 2 s . co m*/ try { AdminUserService.doModifyEmailPattern(origEmailPattern + "b", isEmailPatternSetManually()); assertEquals(origEmailPattern + "b", getEmailPattern()); AdminUserJspBean bean = new AdminUserJspBean(); MockHttpServletRequest request = new MockHttpServletRequest(); AdminAuthenticationService.getInstance().registerUser(request, user); bean.init(request, "CORE_USERS_MANAGEMENT"); request.addParameter(SecurityTokenService.PARAMETER_TOKEN, SecurityTokenService.getInstance().getToken(request, "ManageAdvancedParameters.jsp")); request.setParameter("reset", "reset"); bean.doModifyEmailPattern(request); assertEquals(origEmailPattern, getEmailPattern()); assertTrue(isEmailPatternSetManually()); } finally { AdminUserService.doModifyEmailPattern(origEmailPattern, isEmailPatternSetManually()); disposeOfUser(user); } }
From source file:fr.paris.lutece.portal.web.user.AdminUserJspBeanTest.java
public void testDoModifyEmailPatternResetInvalidToken() throws PasswordResetException, AccessDeniedException, UserNotSignedException { String origEmailPattern = getEmailPattern(); assertTrue("plugin-regularexpression is not there", isEmailPatternSetManually()); AdminUserService.doModifyEmailPattern(origEmailPattern + "b", isEmailPatternSetManually()); AdminUser user = getUserToModify();//from w w w . jav a 2 s. co m try { assertEquals(origEmailPattern + "b", getEmailPattern()); AdminUserJspBean bean = new AdminUserJspBean(); MockHttpServletRequest request = new MockHttpServletRequest(); AdminAuthenticationService.getInstance().registerUser(request, user); bean.init(request, "CORE_USERS_MANAGEMENT"); request.addParameter(SecurityTokenService.PARAMETER_TOKEN, SecurityTokenService.getInstance().getToken(request, "ManageAdvancedParameters.jsp") + "b"); request.setParameter("reset", "reset"); bean.doModifyEmailPattern(request); fail("Should have thrown"); } catch (AccessDeniedException e) { assertEquals(origEmailPattern + "b", getEmailPattern()); } finally { AdminUserService.doModifyEmailPattern(origEmailPattern, isEmailPatternSetManually()); disposeOfUser(user); } }
From source file:fr.paris.lutece.portal.web.user.AdminUserJspBeanTest.java
public void testDoModifyEmailPattern() throws PasswordResetException, AccessDeniedException, UserNotSignedException { String origEmailPattern = getEmailPattern(); assertTrue("plugin-regularexpression is not there", isEmailPatternSetManually()); AdminUserJspBean bean = new AdminUserJspBean(); MockHttpServletRequest request = new MockHttpServletRequest(); AdminUser user = getUserToModify();//www. java 2s.c o m AdminAuthenticationService.getInstance().registerUser(request, user); bean.init(request, "CORE_USERS_MANAGEMENT"); request.addParameter(SecurityTokenService.PARAMETER_TOKEN, SecurityTokenService.getInstance().getToken(request, "ManageAdvancedParameters.jsp")); request.setParameter("is_email_pattern_set_manually", Boolean.FALSE.toString()); request.setParameter("email_pattern", origEmailPattern + "b"); try { bean.doModifyEmailPattern(request); assertEquals(origEmailPattern + "b", getEmailPattern()); assertTrue(isEmailPatternSetManually()); } finally { AdminUserService.doModifyEmailPattern(origEmailPattern, isEmailPatternSetManually()); disposeOfUser(user); } }
From source file:fr.paris.lutece.portal.web.user.AdminUserJspBeanTest.java
public void testDoModifyEmailPatternInvalidToken() throws PasswordResetException, AccessDeniedException, UserNotSignedException { String origEmailPattern = getEmailPattern(); assertTrue("plugin-regularexpression is not there", isEmailPatternSetManually()); AdminUserJspBean bean = new AdminUserJspBean(); MockHttpServletRequest request = new MockHttpServletRequest(); AdminUser user = getUserToModify();/*from www. j a v a2s .co m*/ AdminAuthenticationService.getInstance().registerUser(request, user); bean.init(request, "CORE_USERS_MANAGEMENT"); request.addParameter(SecurityTokenService.PARAMETER_TOKEN, SecurityTokenService.getInstance().getToken(request, "ManageAdvancedParameters.jsp") + "b"); request.setParameter("is_email_pattern_set_manually", Boolean.FALSE.toString()); request.setParameter("email_pattern", origEmailPattern + "b"); try { bean.doModifyEmailPattern(request); fail("Should have thrown"); } catch (AccessDeniedException e) { assertEquals(origEmailPattern, getEmailPattern()); assertTrue(isEmailPatternSetManually()); } finally { AdminUserService.doModifyEmailPattern(origEmailPattern, isEmailPatternSetManually()); disposeOfUser(user); } }
From source file:fr.paris.lutece.portal.web.user.AdminUserJspBeanTest.java
public void testDoModifyEmailPatternNoToken() throws PasswordResetException, AccessDeniedException, UserNotSignedException { String origEmailPattern = getEmailPattern(); assertTrue("plugin-regularexpression is not there", isEmailPatternSetManually()); AdminUserJspBean bean = new AdminUserJspBean(); MockHttpServletRequest request = new MockHttpServletRequest(); AdminUser user = getUserToModify();//from ww w . j a v a2 s. c o m AdminAuthenticationService.getInstance().registerUser(request, user); bean.init(request, "CORE_USERS_MANAGEMENT"); request.addParameter(SecurityTokenService.PARAMETER_TOKEN, SecurityTokenService.getInstance().getToken(request, "ManageAdvancedParameters.jsp") + "b"); request.setParameter("is_email_pattern_set_manually", Boolean.FALSE.toString()); request.setParameter("email_pattern", origEmailPattern + "b"); try { bean.doModifyEmailPattern(request); fail("Should have thrown"); } catch (AccessDeniedException e) { assertEquals(origEmailPattern, getEmailPattern()); assertTrue(isEmailPatternSetManually()); } finally { AdminUserService.doModifyEmailPattern(origEmailPattern, isEmailPatternSetManually()); disposeOfUser(user); } }
From source file:fr.paris.lutece.portal.web.user.AdminUserJspBeanTest.java
public void testDoModifyDefaultUserSecurityValues() throws AccessDeniedException, UserNotSignedException { assertFalse("Test does not account for advanced security parameters", AdminUserService .getBooleanSecurityParameter(AdminUserService.DSKEY_USE_ADVANCED_SECURITY_PARAMETERS)); boolean origForceChangePasswordReinit = Boolean.parseBoolean( DefaultUserParameterHome.findByKey(AdminUserService.DSKEY_FORCE_CHANGE_PASSWORD_REINIT)); int origPasswordMinimumLength = AdminUserService .getIntegerSecurityParameter(AdminUserService.DSKEY_PASSWORD_MINIMUM_LENGTH); int origResetTokenValidity = AdminUserService .getIntegerSecurityParameter(AdminUserService.DSKEY_RESET_TOKEN_VALIDITY); boolean origLockResetTokenToSession = AdminUserService .getBooleanSecurityParameter(AdminUserService.DSKEY_LOCK_RESET_TOKEN_TO_SESSION); int origAccountLifeTime = AdminUserService .getIntegerSecurityParameter(AdminUserService.DSKEY_ACCOUNT_LIFE_TIME); int origTimeBeforeAlertAccount = AdminUserService .getIntegerSecurityParameter(AdminUserService.DSKEY_TIME_BEFORE_ALERT_ACCOUNT); int origNbAlertAccount = AdminUserService .getIntegerSecurityParameter(AdminUserService.DSKEY_NB_ALERT_ACCOUNT); int origTimeBetweenAlertsAccount = AdminUserService .getIntegerSecurityParameter(AdminUserService.DSKEY_TIME_BETWEEN_ALERTS_ACCOUNT); int origAccessFailuresMax = AdminUserService .getIntegerSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_MAX); int origAccessFailuresInterval = AdminUserService .getIntegerSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_INTERVAL); String origBannedDomainNames = AdminUserService .getLargeSecurityParameter(AdminUserService.DSKEY_BANNED_DOMAIN_NAMES); AdminUserJspBean bean = new AdminUserJspBean(); MockHttpServletRequest request = new MockHttpServletRequest(); AdminUser user = getUserToModify();//www. j a v a 2 s. c o m AdminAuthenticationService.getInstance().registerUser(request, user); bean.init(request, "CORE_USERS_MANAGEMENT"); request.addParameter(SecurityTokenService.PARAMETER_TOKEN, SecurityTokenService.getInstance().getToken(request, "ManageAdvancedParameters.jsp")); request.setParameter("force_change_password_reinit", origForceChangePasswordReinit ? Boolean.FALSE.toString() : Boolean.TRUE.toString()); request.setParameter("password_minimum_length", Integer.toString(origPasswordMinimumLength + 1)); request.setParameter("reset_token_validity", Integer.toString(origResetTokenValidity + 1)); request.setParameter("lock_reset_token_to_session", origLockResetTokenToSession ? Boolean.FALSE.toString() : Boolean.TRUE.toString()); request.setParameter("account_life_time", Integer.toString(origAccountLifeTime + 1)); request.setParameter("time_before_alert_account", Integer.toString(origTimeBeforeAlertAccount + 1)); request.setParameter("nb_alert_account", Integer.toString(origNbAlertAccount + 1)); request.setParameter("time_between_alerts_account", Integer.toString(origTimeBetweenAlertsAccount + 1)); request.setParameter("access_failures_max", Integer.toString(origAccessFailuresMax + 1)); request.setParameter("access_failures_interval", Integer.toString(origAccessFailuresInterval + 1)); request.setParameter("banned_domain_names", origBannedDomainNames + "b"); try { bean.doModifyDefaultUserSecurityValues(request); assertEquals(!origForceChangePasswordReinit, Boolean.parseBoolean( DefaultUserParameterHome.findByKey(AdminUserService.DSKEY_FORCE_CHANGE_PASSWORD_REINIT))); assertEquals(origPasswordMinimumLength + 1, AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_PASSWORD_MINIMUM_LENGTH)); assertEquals(origResetTokenValidity + 1, AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_RESET_TOKEN_VALIDITY)); assertEquals(!origLockResetTokenToSession, AdminUserService .getBooleanSecurityParameter(AdminUserService.DSKEY_LOCK_RESET_TOKEN_TO_SESSION)); assertEquals(origAccountLifeTime + 1, AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_ACCOUNT_LIFE_TIME)); assertEquals(origTimeBeforeAlertAccount + 1, AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_TIME_BEFORE_ALERT_ACCOUNT)); assertEquals(origNbAlertAccount + 1, AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_NB_ALERT_ACCOUNT)); assertEquals(origTimeBetweenAlertsAccount + 1, AdminUserService .getIntegerSecurityParameter(AdminUserService.DSKEY_TIME_BETWEEN_ALERTS_ACCOUNT)); assertEquals(origAccessFailuresMax + 1, AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_MAX)); assertEquals(origAccessFailuresInterval + 1, AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_INTERVAL)); assertEquals(origBannedDomainNames + "b", AdminUserService.getLargeSecurityParameter(AdminUserService.DSKEY_BANNED_DOMAIN_NAMES)); } finally { DefaultUserParameterHome.update(AdminUserService.DSKEY_FORCE_CHANGE_PASSWORD_REINIT, Boolean.toString(origForceChangePasswordReinit)); AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_PASSWORD_MINIMUM_LENGTH, Integer.toString(origPasswordMinimumLength)); AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_RESET_TOKEN_VALIDITY, Integer.toString(origResetTokenValidity)); AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_LOCK_RESET_TOKEN_TO_SESSION, Boolean.toString(origLockResetTokenToSession)); AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_ACCOUNT_LIFE_TIME, Integer.toString(origAccountLifeTime)); AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_TIME_BEFORE_ALERT_ACCOUNT, Integer.toString(origTimeBeforeAlertAccount)); AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_NB_ALERT_ACCOUNT, Integer.toString(origNbAlertAccount)); AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_TIME_BETWEEN_ALERTS_ACCOUNT, Integer.toString(origTimeBetweenAlertsAccount)); AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_MAX, Integer.toString(origAccessFailuresMax)); AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_INTERVAL, Integer.toString(origAccessFailuresInterval)); AdminUserService.updateLargeSecurityParameter(AdminUserService.DSKEY_BANNED_DOMAIN_NAMES, origBannedDomainNames); disposeOfUser(user); } }
From source file:fr.paris.lutece.portal.web.user.AdminUserJspBeanTest.java
public void testDoModifyDefaultUserSecurityValuesInvalidToken() throws AccessDeniedException, UserNotSignedException { assertFalse("Test does not account for advanced security parameters", AdminUserService .getBooleanSecurityParameter(AdminUserService.DSKEY_USE_ADVANCED_SECURITY_PARAMETERS)); boolean origForceChangePasswordReinit = Boolean.parseBoolean( DefaultUserParameterHome.findByKey(AdminUserService.DSKEY_FORCE_CHANGE_PASSWORD_REINIT)); int origPasswordMinimumLength = AdminUserService .getIntegerSecurityParameter(AdminUserService.DSKEY_PASSWORD_MINIMUM_LENGTH); int origResetTokenValidity = AdminUserService .getIntegerSecurityParameter(AdminUserService.DSKEY_RESET_TOKEN_VALIDITY); boolean origLockResetTokenToSession = AdminUserService .getBooleanSecurityParameter(AdminUserService.DSKEY_LOCK_RESET_TOKEN_TO_SESSION); int origAccountLifeTime = AdminUserService .getIntegerSecurityParameter(AdminUserService.DSKEY_ACCOUNT_LIFE_TIME); int origTimeBeforeAlertAccount = AdminUserService .getIntegerSecurityParameter(AdminUserService.DSKEY_TIME_BEFORE_ALERT_ACCOUNT); int origNbAlertAccount = AdminUserService .getIntegerSecurityParameter(AdminUserService.DSKEY_NB_ALERT_ACCOUNT); int origTimeBetweenAlertsAccount = AdminUserService .getIntegerSecurityParameter(AdminUserService.DSKEY_TIME_BETWEEN_ALERTS_ACCOUNT); int origAccessFailuresMax = AdminUserService .getIntegerSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_MAX); int origAccessFailuresInterval = AdminUserService .getIntegerSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_INTERVAL); String origBannedDomainNames = AdminUserService .getLargeSecurityParameter(AdminUserService.DSKEY_BANNED_DOMAIN_NAMES); AdminUserJspBean bean = new AdminUserJspBean(); MockHttpServletRequest request = new MockHttpServletRequest(); AdminUser user = getUserToModify();/* w ww . j a v a2s . c o m*/ AdminAuthenticationService.getInstance().registerUser(request, user); bean.init(request, "CORE_USERS_MANAGEMENT"); request.addParameter(SecurityTokenService.PARAMETER_TOKEN, SecurityTokenService.getInstance().getToken(request, "ManageAdvancedParameters.jsp") + "b"); request.setParameter("force_change_password_reinit", origForceChangePasswordReinit ? Boolean.FALSE.toString() : Boolean.TRUE.toString()); request.setParameter("password_minimum_length", Integer.toString(origPasswordMinimumLength + 1)); request.setParameter("reset_token_validity", Integer.toString(origResetTokenValidity + 1)); request.setParameter("lock_reset_token_to_session", origLockResetTokenToSession ? Boolean.FALSE.toString() : Boolean.TRUE.toString()); request.setParameter("account_life_time", Integer.toString(origAccountLifeTime + 1)); request.setParameter("time_before_alert_account", Integer.toString(origTimeBeforeAlertAccount + 1)); request.setParameter("nb_alert_account", Integer.toString(origNbAlertAccount + 1)); request.setParameter("time_between_alerts_account", Integer.toString(origTimeBetweenAlertsAccount + 1)); request.setParameter("access_failures_max", Integer.toString(origAccessFailuresMax + 1)); request.setParameter("access_failures_interval", Integer.toString(origAccessFailuresInterval + 1)); request.setParameter("banned_domain_names", origBannedDomainNames + "b"); try { bean.doModifyDefaultUserSecurityValues(request); fail("Should have thrown"); } catch (AccessDeniedException e) { assertEquals(origForceChangePasswordReinit, Boolean.parseBoolean( DefaultUserParameterHome.findByKey(AdminUserService.DSKEY_FORCE_CHANGE_PASSWORD_REINIT))); assertEquals(origPasswordMinimumLength, AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_PASSWORD_MINIMUM_LENGTH)); assertEquals(origResetTokenValidity, AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_RESET_TOKEN_VALIDITY)); assertEquals(origLockResetTokenToSession, AdminUserService .getBooleanSecurityParameter(AdminUserService.DSKEY_LOCK_RESET_TOKEN_TO_SESSION)); assertEquals(origAccountLifeTime, AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_ACCOUNT_LIFE_TIME)); assertEquals(origTimeBeforeAlertAccount, AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_TIME_BEFORE_ALERT_ACCOUNT)); assertEquals(origNbAlertAccount, AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_NB_ALERT_ACCOUNT)); assertEquals(origTimeBetweenAlertsAccount, AdminUserService .getIntegerSecurityParameter(AdminUserService.DSKEY_TIME_BETWEEN_ALERTS_ACCOUNT)); assertEquals(origAccessFailuresMax, AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_MAX)); assertEquals(origAccessFailuresInterval, AdminUserService.getIntegerSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_INTERVAL)); assertEquals(origBannedDomainNames, AdminUserService.getLargeSecurityParameter(AdminUserService.DSKEY_BANNED_DOMAIN_NAMES)); } finally { DefaultUserParameterHome.update(AdminUserService.DSKEY_FORCE_CHANGE_PASSWORD_REINIT, Boolean.toString(origForceChangePasswordReinit)); AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_PASSWORD_MINIMUM_LENGTH, Integer.toString(origPasswordMinimumLength)); AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_RESET_TOKEN_VALIDITY, Integer.toString(origResetTokenValidity)); AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_LOCK_RESET_TOKEN_TO_SESSION, Boolean.toString(origLockResetTokenToSession)); AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_ACCOUNT_LIFE_TIME, Integer.toString(origAccountLifeTime)); AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_TIME_BEFORE_ALERT_ACCOUNT, Integer.toString(origTimeBeforeAlertAccount)); AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_NB_ALERT_ACCOUNT, Integer.toString(origNbAlertAccount)); AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_TIME_BETWEEN_ALERTS_ACCOUNT, Integer.toString(origTimeBetweenAlertsAccount)); AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_MAX, Integer.toString(origAccessFailuresMax)); AdminUserService.updateSecurityParameter(AdminUserService.DSKEY_ACCES_FAILURES_INTERVAL, Integer.toString(origAccessFailuresInterval)); AdminUserService.updateLargeSecurityParameter(AdminUserService.DSKEY_BANNED_DOMAIN_NAMES, origBannedDomainNames); disposeOfUser(user); } }