I hereby claim:
- I am aeells on github.
- I am aeells (https://keybase.io/aeells) on keybase.
- I have a public key whose fingerprint is E82A 3E5B 119C 52EC FF3F AE2A DA2D CD0E 87F3 7539
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
@Entity | |
public class Employer | |
{ | |
@Id | |
@GeneratedValue(strategy = GenerationType.IDENTITY) | |
private Long id; | |
private String employerName; | |
@OneToMany(fetch = FetchType.EAGER, cascade = CascadeType.ALL) |
@Entity | |
public class Employer | |
{ | |
@Id | |
@GeneratedValue(strategy = GenerationType.IDENTITY) | |
private Long id; | |
private String employerName; | |
@OneToMany(fetch = FetchType.EAGER, cascade = CascadeType.ALL, mappedBy = "employer") |
sonar.jdbc.username=sonar | |
sonar.jdbc.password=sonar | |
sonar.jdbc.url=jdbc:mysql://localhost:3306/sonar?useUnicode=true&characterEncoding=utf8&rewriteBatchedStatements=true&useConfigs=maxPerformance |
sonar.host.url=http://localhost:9000 | |
sonar.jdbc.url=jdbc:mysql://localhost:3306/sonar?useUnicode=true&characterEncoding=utf8 | |
sonar.jdbc.username=sonar | |
sonar.jdbc.password=sonar | |
sonar.sourceEncoding=UTF-8 | |
sonar.login=admin | |
sonar.password=admin |
@Test | |
public void modifySecurityCredentials() throws PasswordValidationException { | |
Customer blCustomer = new CustomerImpl(); | |
blCustomer.setPassword("testpassword"); | |
when(customerService.readCustomerByUsername(any(String.class))).thenReturn(blCustomer); | |
when(customerService.isPasswordValid(any(String.class), any(String.class), any(Customer.class))).thenReturn(true); | |
PasswordChangeDTO passwordChange = new PasswordChangeDTO(); |
import javax.naming.Context; | |
import javax.naming.NamingEnumeration; | |
import javax.naming.NamingException; | |
import javax.naming.directory.Attributes; | |
import javax.naming.directory.DirContext; | |
import javax.naming.directory.InitialDirContext; | |
import javax.naming.directory.SearchControls; | |
import javax.naming.directory.SearchResult; | |
import java.util.Hashtable; |
# | |
# LDAP Defaults | |
# | |
# See ldap.conf(5) for details | |
# This file should be world readable but not world writable. | |
BASE dc=my-domain,dc=com | |
URI ldap://localhost:389 |
# | |
# See slapd.conf(5) for details on configuration options. | |
# This file should NOT be world readable. | |
# | |
include /private/etc/openldap/schema/core.schema | |
include /private/etc/openldap/schema/cosine.schema | |
include /private/etc/openldap/schema/nis.schema | |
include /private/etc/openldap/schema/inetorgperson.schema | |
dn: ou=people,dc=my-domain,dc=com | |
objectClass: organizationalUnit | |
ou: people |