Java Code Examples for org.eclipse.jetty.security.ConstraintMapping#setConstraint()
The following examples show how to use
org.eclipse.jetty.security.ConstraintMapping#setConstraint() .
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example. You may check out the related API usage on the sidebar.
Example 1
Source File: AuthUtil.java From rest-utils with Apache License 2.0 | 6 votes |
/** * Build a secure or unsecure constraint using standard RestConfig for a path. * * @param restConfig the rest app's config. * @param authenticate authentication flag. * @param pathSpec path for constraint. * @return the constraint mapping. */ private static ConstraintMapping createConstraint( final RestConfig restConfig, final boolean authenticate, final String pathSpec ) { final Constraint constraint = new Constraint(); constraint.setAuthenticate(authenticate); if (authenticate) { final List<String> roles = restConfig.getList(RestConfig.AUTHENTICATION_ROLES_CONFIG); constraint.setRoles(roles.toArray(new String[0])); } final ConstraintMapping mapping = new ConstraintMapping(); mapping.setConstraint(constraint); mapping.setMethod("*"); if (authenticate && AuthUtil.isCorsEnabled(restConfig)) { mapping.setMethodOmissions(new String[]{"OPTIONS"}); } mapping.setPathSpec(pathSpec); return mapping; }
Example 2
Source File: InMemoryIdentityManager.java From crnk-framework with Apache License 2.0 | 6 votes |
public InMemoryIdentityManager() { loginService = new HashLoginService(); loginService.setName(realm); securityHandler = new ConstraintSecurityHandler(); securityHandler.setAuthenticator(new BasicAuthenticator()); securityHandler.setRealmName(realm); securityHandler.setLoginService(loginService); Constraint constraint = new Constraint(); constraint.setName(Constraint.__BASIC_AUTH); // constraint.setRoles(new String[] { "getRole", "postRole", "allRole" }); constraint.setRoles(new String[]{Constraint.ANY_AUTH, "getRole", "postRole", "allRole"}); constraint.setAuthenticate(true); ConstraintMapping cm = new ConstraintMapping(); cm.setConstraint(constraint); cm.setPathSpec("/*"); securityHandler.addConstraintMapping(cm); }
Example 3
Source File: CustomInitTest.java From rest-utils with Apache License 2.0 | 6 votes |
@Override public void accept(final ServletContextHandler context) { final List<String> roles = config.getList(RestConfig.AUTHENTICATION_ROLES_CONFIG); final Constraint constraint = new Constraint(); constraint.setAuthenticate(true); constraint.setRoles(roles.toArray(new String[0])); final ConstraintMapping constraintMapping = new ConstraintMapping(); constraintMapping.setConstraint(constraint); constraintMapping.setMethod("*"); constraintMapping.setPathSpec("/*"); final ConstraintSecurityHandler securityHandler = new ConstraintSecurityHandler(); securityHandler.addConstraintMapping(constraintMapping); securityHandler.setAuthenticator(new BasicAuthenticator()); securityHandler.setLoginService(new TestLoginService()); securityHandler.setRealmName("TestRealm"); context.setSecurityHandler(securityHandler); }
Example 4
Source File: HttpProtocolServer.java From gitflow-incremental-builder with MIT License | 6 votes |
private void addBasicAuth(Server server) { ConstraintSecurityHandler security = new ConstraintSecurityHandler(); security.setAuthenticator(new BasicAuthenticator()); Constraint constraint = new Constraint(); constraint.setAuthenticate(true); constraint.setRoles(ROLES); ConstraintMapping mapping = new ConstraintMapping(); mapping.setPathSpec("/*"); mapping.setConstraint(constraint); security.setConstraintMappings(Collections.singletonList(mapping)); HashLoginService loginService = new HashLoginService(); loginService.setUserStore(buildUserStore()); server.addBean(loginService); security.setLoginService(loginService); security.setHandler(server.getHandler()); server.setHandler(security); }
Example 5
Source File: BaleenWebApi.java From baleen with Apache License 2.0 | 6 votes |
private void addServlet(final Servlet servlet, final String path, WebPermission... permissions) { servletContextHandler.addServlet(new ServletHolder(servlet), path); if (permissions != null && permissions.length > 0) { for (WebPermission p : permissions) { Constraint constraint = getConstraintForPermission(p); ConstraintMapping mapping = new ConstraintMapping(); mapping.setPathSpec(servletContextHandler.getContextPath() + path); mapping.setConstraint(constraint); if (p.hasMethod()) { mapping.setMethod(p.getMethod().name()); } constraintMappings.add(mapping); } } LOGGER.info("Servlet added on path {}", path); }
Example 6
Source File: JettySecurity.java From camelinaction2 with Apache License 2.0 | 6 votes |
@Produces @Named("securityHandler") public static ConstraintSecurityHandler createSecurityHandler() { Constraint constraint = new Constraint("BASIC", "customer"); constraint.setAuthenticate(true); ConstraintMapping mapping = new ConstraintMapping(); mapping.setConstraint(constraint); mapping.setPathSpec("/*"); ConstraintSecurityHandler handler = new ConstraintSecurityHandler(); handler.addConstraintMapping(mapping); handler.setAuthenticator(new BasicAuthenticator()); handler.setLoginService(new HashLoginService("RiderAutoParts", "src/main/resources/users.properties")); return handler; }
Example 7
Source File: HttpServer.java From sensorhub with Mozilla Public License 2.0 | 5 votes |
public void addServletSecurity(String pathSpec, String... roles) { if (securityHandler != null) { Constraint constraint = new Constraint(); constraint.setName(Constraint.__DIGEST_AUTH); constraint.setRoles(roles); constraint.setAuthenticate(true); ConstraintMapping cm = new ConstraintMapping(); cm.setConstraint(constraint); cm.setPathSpec(pathSpec); securityHandler.addConstraintMapping(cm); } }
Example 8
Source File: DigestAuthSupplierJettyTest.java From cxf with Apache License 2.0 | 5 votes |
@Override protected void run() { server = new Server(PORT); HashLoginService loginService = new HashLoginService(); loginService.setName("My Realm"); UserStore userStore = new UserStore(); String[] roles = new String[] {"user"}; userStore.addUser(USER, Credential.getCredential(PWD), roles); loginService.setUserStore(userStore); Constraint constraint = new Constraint(); constraint.setName(Constraint.__DIGEST_AUTH); constraint.setRoles(roles); constraint.setAuthenticate(true); ConstraintMapping cm = new ConstraintMapping(); cm.setConstraint(constraint); cm.setPathSpec("/*"); ConstraintSecurityHandler csh = new ConstraintSecurityHandler(); csh.setAuthenticator(new DigestAuthenticator()); csh.addConstraintMapping(cm); csh.setLoginService(loginService); ServletContextHandler context = new ServletContextHandler(ServletContextHandler.SESSIONS); context.setSecurityHandler(csh); context.setContextPath("/"); server.setHandler(context); context.addServlet(new ServletHolder(new TestServlet()), "/*"); try { server.start(); } catch (Exception e) { throw new RuntimeException(e); } }
Example 9
Source File: HttpReceiverServerPush.java From datacollector with Apache License 2.0 | 5 votes |
public static SecurityHandler getBasicAuthHandler(HttpSourceConfigs httpCourceConf) { List<CredentialValueUserPassBean> basicAuthUsers = httpCourceConf.getBasicAuthUsers(); HashLoginService loginService = new HashLoginService(); UserStore userStore = new UserStore(); boolean empty = true; for (CredentialValueUserPassBean userPassBean : basicAuthUsers) { String username = userPassBean.getUsername(); String password = userPassBean.get(); if(StringUtils.isNotEmpty(username) && StringUtils.isNotEmpty(password)) { userStore.addUser(username, new Password(password), new String[]{"sdc"}); empty = false; } } if(empty) { return null; } loginService.setUserStore(userStore); Constraint constraint = new Constraint(Constraint.__BASIC_AUTH,"sdc"); constraint.setAuthenticate(true); ConstraintMapping mapping = new ConstraintMapping(); mapping.setConstraint(constraint); mapping.setPathSpec("/*"); ConstraintSecurityHandler handler = new ConstraintSecurityHandler(); handler.setAuthenticator(new BasicAuthenticator()); handler.addConstraintMapping(mapping); handler.setLoginService(loginService); return handler; }
Example 10
Source File: StandaloneAdminWeb.java From chipster with MIT License | 5 votes |
public static void main(String args[]) throws Exception { org.eclipse.jetty.server.Server adminServer = new org.eclipse.jetty.server.Server(); ServerConnector connector = new ServerConnector(adminServer); connector.setPort(8083); adminServer.setConnectors(new Connector[]{ connector }); Constraint constraint = new Constraint(); constraint.setName(Constraint.__BASIC_AUTH); constraint.setRoles(new String[] {"admin_role"}); constraint.setAuthenticate(true); ConstraintMapping cm = new ConstraintMapping(); cm.setConstraint(constraint); cm.setPathSpec("/*"); HashLoginService loginService = new HashLoginService("Please enter Chipster Admin username and password"); loginService.update("chipster", new Password("chipster"), new String[] {"admin_role"}); ConstraintSecurityHandler sh = new ConstraintSecurityHandler(); sh.setLoginService(loginService); sh.addConstraintMapping(cm); WebAppContext context = new WebAppContext(); File war = new File("../chipster/dist/admin-web.war"); //File war = new File("webapps/admin-web.war"); context.setWar(war.getAbsolutePath()); System.out.println(war.getAbsolutePath()); context.setContextPath("/"); context.setHandler(sh); HandlerCollection handlers = new HandlerCollection(); handlers.setHandlers(new Handler[] {context, new DefaultHandler()}); adminServer.setHandler(handlers); adminServer.start(); }
Example 11
Source File: JettySecurity.java From camelinaction2 with Apache License 2.0 | 5 votes |
public static ConstraintSecurityHandler createSecurityHandler() { Constraint constraint = new Constraint("BASIC", "customer"); constraint.setAuthenticate(true); ConstraintMapping mapping = new ConstraintMapping(); mapping.setConstraint(constraint); mapping.setPathSpec("/*"); ConstraintSecurityHandler handler = new ConstraintSecurityHandler(); handler.addConstraintMapping(mapping); handler.setAuthenticator(new BasicAuthenticator()); handler.setLoginService(new HashLoginService("RiderAutoParts", "src/main/resources/users.properties")); return handler; }
Example 12
Source File: AppEngineAuthenticationTest.java From appengine-java-vm-runtime with Apache License 2.0 | 5 votes |
private void addConstraint( ConstraintSecurityHandler handler, String path, String name, String... roles) { Constraint constraint = new Constraint(); constraint.setName(name); constraint.setRoles(roles); constraint.setAuthenticate(true); ConstraintMapping mapping = new ConstraintMapping(); mapping.setMethod("GET"); mapping.setPathSpec(path); mapping.setConstraint(constraint); handler.addConstraintMapping(mapping); }
Example 13
Source File: JavaxServletSyncServerITest.java From hawkular-apm with Apache License 2.0 | 5 votes |
@BeforeClass public static void initClass() throws Exception { server = new Server(8180); LoginService loginService = new HashLoginService("MyRealm", "src/test/resources/realm.properties"); server.addBean(loginService); ConstraintSecurityHandler security = new ConstraintSecurityHandler(); server.setHandler(security); Constraint constraint = new Constraint(); constraint.setName("auth"); constraint.setAuthenticate(true); constraint.setRoles(new String[] { "user", "admin" }); ConstraintMapping mapping = new ConstraintMapping(); mapping.setPathSpec("/*"); mapping.setConstraint(constraint); security.setConstraintMappings(Collections.singletonList(mapping)); security.setAuthenticator(new BasicAuthenticator()); security.setLoginService(loginService); ServletContextHandler context = new ServletContextHandler(); context.setContextPath("/"); context.addServlet(EmbeddedServlet.class, "/hello"); security.setHandler(context); server.start(); }
Example 14
Source File: WebServerTestCase.java From htmlunit with Apache License 2.0 | 5 votes |
/** * Starts the web server delivering response from the provided connection. * @param mockConnection the sources for responses * @throws Exception if a problem occurs */ protected void startWebServer(final MockWebConnection mockConnection) throws Exception { if (STATIC_SERVER_ == null) { final Server server = buildServer(PORT); final WebAppContext context = new WebAppContext(); context.setContextPath("/"); context.setResourceBase("./"); if (isBasicAuthentication()) { final Constraint constraint = new Constraint(); constraint.setName(Constraint.__BASIC_AUTH); constraint.setRoles(new String[]{"user"}); constraint.setAuthenticate(true); final ConstraintMapping constraintMapping = new ConstraintMapping(); constraintMapping.setConstraint(constraint); constraintMapping.setPathSpec("/*"); final ConstraintSecurityHandler handler = (ConstraintSecurityHandler) context.getSecurityHandler(); handler.setLoginService(new HashLoginService("MyRealm", "./src/test/resources/realm.properties")); handler.setConstraintMappings(new ConstraintMapping[]{constraintMapping}); } context.addServlet(MockWebConnectionServlet.class, "/*"); server.setHandler(context); tryStart(PORT, server); STATIC_SERVER_ = server; } MockWebConnectionServlet.setMockconnection(mockConnection); }
Example 15
Source File: Manager.java From chipster with MIT License | 4 votes |
private void startAdmin(Configuration configuration) throws IOException, Exception { org.eclipse.jetty.server.Server adminServer = new org.eclipse.jetty.server.Server(); ServerConnector connector = new ServerConnector(adminServer); connector.setPort(configuration.getInt("manager", "admin-port")); adminServer.setConnectors(new Connector[]{ connector }); Constraint constraint = new Constraint(); constraint.setName(Constraint.__BASIC_AUTH); constraint.setRoles(new String[] {ADMIN_ROLE}); constraint.setAuthenticate(true); ConstraintMapping cm = new ConstraintMapping(); cm.setConstraint(constraint); cm.setPathSpec("/*"); HashLoginService loginService = new HashLoginService("Please enter Chipster Admin username and password"); loginService.update(configuration.getString("manager", "admin-username"), new Password(configuration.getString("manager", "admin-password")), new String[] {ADMIN_ROLE}); ConstraintSecurityHandler sh = new ConstraintSecurityHandler(); sh.setLoginService(loginService); sh.addConstraintMapping(cm); WebAppContext context = new WebAppContext(); context.setWar(new File(DirectoryLayout.getInstance().getWebappsDir(), "admin-web.war").getAbsolutePath()); context.setContextPath("/"); // context.setDescriptor(new ClassPathResource("WebContent/WEB-INF/web.xml").getURI().toString()); // context.setResourceBase(new ClassPathResource("WebContent").getURI().toString()); // context.setContextPath("/"); // context.setParentLoaderPriority(true); context.setHandler(sh); HandlerCollection handlers = new HandlerCollection(); handlers.setHandlers(new Handler[] {context, new DefaultHandler()}); adminServer.setHandler(handlers); adminServer.start(); }
Example 16
Source File: LotteryApplication.java From keycloak-dropwizard-integration with Apache License 2.0 | 4 votes |
@Override public void run(LotteryConfiguration configuration, Environment environment) throws ClassNotFoundException, IOException { // tag::constraint[] ConstraintSecurityHandler securityHandler = new ConstraintSecurityHandler(); environment.getApplicationContext().setSecurityHandler(securityHandler); securityHandler.addRole("user"); ConstraintMapping constraintMapping = new ConstraintMapping(); constraintMapping.setPathSpec("/*"); Constraint constraint = new Constraint(); // end::constraint[] /* if I put false here, there will be deferred authentication. This will not work when using oAuth redirects (as they will not make it to the front end). The DeferredAuthentication will swallow them. This might be different with a bearer token?! */ // tag::constraint[] constraint.setAuthenticate(true); constraint.setRoles(new String[]{"user"}); constraintMapping.setConstraint(constraint); securityHandler.addConstraintMapping(constraintMapping); // end::constraint[] // tag::keycloak[] KeycloakJettyAuthenticator keycloak = new KeycloakJettyAuthenticator(); environment.getApplicationContext().getSecurityHandler().setAuthenticator(keycloak); keycloak.setAdapterConfig(configuration.getKeycloakConfiguration()); // end::keycloak[] // allow (stateful) sessions in Dropwizard, needed for Keycloak environment.jersey().register(HttpSessionFactory.class); environment.servlets().setSessionHandler(new SessionHandler()); // register web resources. environment.jersey().register(DrawRessource.class); // support annotation @RolesAllowed // tag::roles[] environment.jersey().register(RolesAllowedDynamicFeature.class); // end::roles[] }
Example 17
Source File: TestWebServicesFetcher.java From datacollector with Apache License 2.0 | 4 votes |
protected void runServer(int port, boolean serverSsl, boolean clientSsl, String httpAuth, Callable<Void> test) throws Exception { Server server = createServer(port, serverSsl, clientSsl); ServletContextHandler contextHandler = new ServletContextHandler(); if (!httpAuth.equals("none")) { File realmFile = new File(getConfDir(), httpAuth + ".properties"); LoginService loginService = new HashLoginService(httpAuth, realmFile.getAbsolutePath()); server.addBean(loginService); ConstraintSecurityHandler securityHandler = new ConstraintSecurityHandler(); switch (httpAuth) { case "basic": securityHandler.setAuthenticator(new BasicAuthenticator()); break; case "digest": securityHandler.setAuthenticator(new DigestAuthenticator()); break; } securityHandler.setLoginService(loginService); Constraint constraint = new Constraint(); constraint.setName("auth"); constraint.setAuthenticate(true); constraint.setRoles(new String[]{"user"}); ConstraintMapping mapping = new ConstraintMapping(); mapping.setPathSpec("/*"); mapping.setConstraint(constraint); securityHandler.addConstraintMapping(mapping); contextHandler.setSecurityHandler(securityHandler); } MockCyberArkServlet servlet = new MockCyberArkServlet(); contextHandler.addServlet(new ServletHolder(servlet), "/AIMWebService/api/Accounts"); contextHandler.setContextPath("/"); server.setHandler(contextHandler); try { server.start(); test.call(); } finally { server.stop(); } }
Example 18
Source File: ODataTestServer.java From syndesis with Apache License 2.0 | 4 votes |
@SuppressWarnings( "deprecation" ) private void initServer(SSLContext sslContext, String userName) throws UnknownHostException { ServletContextHandler context = new ServletContextHandler(ServletContextHandler.SESSIONS); context.setContextPath(FORWARD_SLASH); this.setHandler(context); ServletHandler productsHandler = new ServletHandler(); productsHandler.addServletWithMapping( ProductsServlet.class, FORWARD_SLASH + PRODUCTS_SVC + FORWARD_SLASH + STAR); productsHandler.addFilterWithMapping(ODataPathFilter.class, FORWARD_SLASH + STAR, FilterMapping.REQUEST); context.insertHandler(productsHandler); if (userName != null) { LoginService loginService = new HashLoginService("MyRealm", "src/test/resources/realm.properties"); this.addBean(loginService); ConstraintSecurityHandler securityHandler = new ConstraintSecurityHandler(); Constraint constraint = new Constraint(); constraint.setName("auth"); constraint.setAuthenticate(true); constraint.setRoles(new String[] { USER, "admin" }); ConstraintMapping mapping = new ConstraintMapping(); mapping.setPathSpec(FORWARD_SLASH + PRODUCTS_SVC + FORWARD_SLASH + STAR); mapping.setConstraint(constraint); securityHandler.setConstraintMappings(Collections.singletonList(mapping)); securityHandler.setAuthenticator(new BasicAuthenticator()); context.setSecurityHandler(securityHandler); } httpConnector = new ServerConnector(this); httpConnector.setPort(httpPort); // Finds next available port if still 0 this.addConnector(httpConnector); if (sslContext != null) { // HTTPS HttpConfiguration httpConfiguration = new HttpConfiguration(); httpConfiguration.setSecureScheme("https"); httpConfiguration.setSecurePort(httpsPort); // Finds next available port if still 0 httpConfiguration.addCustomizer(new SecureRequestCustomizer()); final SslContextFactory sslContextFactory = new SslContextFactory(); sslContextFactory.setSslContext(sslContext); httpsConnector = new ServerConnector(this, sslContextFactory, new HttpConnectionFactory(httpConfiguration)); httpsConnector.setPort(httpsPort); // Finds next available port if still 0 this.addConnector(httpsConnector); } }
Example 19
Source File: JettyHttpServer.java From everrest with Eclipse Public License 2.0 | 4 votes |
public void start() throws Exception { RequestLogHandler handler = new RequestLogHandler(); if (context == null) { context = new ServletContextHandler(handler, "/", ServletContextHandler.SESSIONS); } context.setEventListeners(new EventListener[]{new EverrestInitializedListener()}); ServletHolder servletHolder = new ServletHolder(new EverrestServlet()); context.addServlet(servletHolder, UNSECURE_PATH_SPEC); context.addServlet(servletHolder, SECURE_PATH_SPEC); //set up security Constraint constraint = new Constraint(); constraint.setName(Constraint.__BASIC_AUTH); constraint.setRoles(new String[]{"cloud-admin", "users", "user", "temp_user"}); constraint.setAuthenticate(true); ConstraintMapping constraintMapping = new ConstraintMapping(); constraintMapping.setConstraint(constraint); constraintMapping.setPathSpec(SECURE_PATH_SPEC); ConstraintSecurityHandler securityHandler = new ConstraintSecurityHandler(); securityHandler.addConstraintMapping(constraintMapping); HashLoginService loginService = new HashLoginService(); UserStore userStore = new UserStore(); userStore.addUser(ADMIN_USER_NAME, new Password(ADMIN_USER_PASSWORD), new String[]{"cloud-admin", "users", "user", "temp_user", "developer", "admin", "workspace/developer", "workspace/admin", "account/owner", "account/member", "system/admin", "system/manager" }); userStore.addUser(MANAGER_USER_NAME, new Password(MANAGER_USER_PASSWORD), new String[]{"cloud-admin", "user", "temp_user", "users"}); loginService.setUserStore(userStore); securityHandler.setLoginService(loginService); securityHandler.setAuthenticator(new BasicAuthenticator()); context.setSecurityHandler(securityHandler); server.setHandler(handler); server.start(); ResourceBinder binder = (ResourceBinder)context.getServletContext().getAttribute(ResourceBinder.class.getName()); DependencySupplier dependencies = (DependencySupplier)context.getServletContext().getAttribute(DependencySupplier.class.getName()); GroovyResourcePublisher groovyPublisher = new GroovyResourcePublisher(binder, dependencies); context.getServletContext().setAttribute(GroovyResourcePublisher.class.getName(), groovyPublisher); }
Example 20
Source File: WebServerTask.java From datacollector with Apache License 2.0 | 4 votes |
private List<ConstraintMapping> createConstraintMappings() { // everything under /* public Constraint noAuthConstraint = new Constraint(); noAuthConstraint.setName("auth"); noAuthConstraint.setAuthenticate(false); noAuthConstraint.setRoles(new String[]{"user"}); ConstraintMapping noAuthMapping = new ConstraintMapping(); noAuthMapping.setPathSpec("/*"); noAuthMapping.setConstraint(noAuthConstraint); // everything under /public-rest/* public Constraint publicRestConstraint = new Constraint(); publicRestConstraint.setName("auth"); publicRestConstraint.setAuthenticate(false); publicRestConstraint.setRoles(new String[] { "user"}); ConstraintMapping publicRestMapping = new ConstraintMapping(); publicRestMapping.setPathSpec("/public-rest/*"); publicRestMapping.setConstraint(publicRestConstraint); // everything under /rest/* restricted Constraint restConstraint = new Constraint(); restConstraint.setName("auth"); restConstraint.setAuthenticate(true); restConstraint.setRoles(new String[] { "user"}); ConstraintMapping restMapping = new ConstraintMapping(); restMapping.setPathSpec("/rest/*"); restMapping.setConstraint(restConstraint); // /logout is restricted Constraint logoutConstraint = new Constraint(); logoutConstraint.setName("auth"); logoutConstraint.setAuthenticate(true); logoutConstraint.setRoles(new String[] { "user"}); ConstraintMapping logoutMapping = new ConstraintMapping(); logoutMapping.setPathSpec("/logout"); logoutMapping.setConstraint(logoutConstraint); // index page is restricted to trigger login correctly when using form authentication Constraint indexConstraint = new Constraint(); indexConstraint.setName("auth"); indexConstraint.setAuthenticate(true); indexConstraint.setRoles(new String[] { "user"}); ConstraintMapping indexMapping = new ConstraintMapping(); indexMapping.setPathSpec(""); indexMapping.setConstraint(indexConstraint); // docs is restricted ConstraintMapping docMapping = new ConstraintMapping(); docMapping.setPathSpec("/docs/*"); docMapping.setConstraint(indexConstraint); // Disable TRACE method Constraint disableTraceConstraint = new Constraint(); disableTraceConstraint.setName("Disable TRACE"); disableTraceConstraint.setAuthenticate(true); ConstraintMapping disableTraceMapping = new ConstraintMapping(); disableTraceMapping.setPathSpec("/*"); disableTraceMapping.setMethod("TRACE"); disableTraceMapping.setConstraint(disableTraceConstraint); return ImmutableList.of( disableTraceMapping, restMapping, indexMapping, docMapping, logoutMapping, noAuthMapping, publicRestMapping ); }