You are viewing a plain text version of this content. The canonical link for it is here.
Posted to notifications@jclouds.apache.org by "Ignasi Barrera (JIRA)" <ji...@apache.org> on 2015/03/05 14:39:38 UTC

[jira] [Commented] (JCLOUDS-838) Avoid deprecation

    [ https://issues.apache.org/jira/browse/JCLOUDS-838?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14348743#comment-14348743 ] 

Ignasi Barrera commented on JCLOUDS-838:
----------------------------------------

While the API does not implement another authentication mechanism than HTTPS client auth, a possible workaround would be to use a custom KeyManager (an in-memory one, for example), and configure the KeyStore to use it.

This gist contains a working example using the Azure SDK, but could easily be adapted and extended to work with jclouds.
https://gist.github.com/nacx/a78b0dbe246d38814adb

> Avoid deprecation
> -----------------
>
>                 Key: JCLOUDS-838
>                 URL: https://issues.apache.org/jira/browse/JCLOUDS-838
>             Project: jclouds
>          Issue Type: Sub-task
>          Components: jclouds-compute, jclouds-labs
>            Reporter: Francesco Chicchiriccò
>             Fix For: 2.0.0
>
>
> Two classes are marked as {{@Deprecated}} but still used:
>  * {{KeyStoreSupplier}}
>  * {{SSLContextWithKeysSupplier}}
> The TODO comment on top of both says
> {quote}
> this code needs to be completely refactored. It needs to stop using KeyStore of at all possible and definitely the local filesystem. Please look at oauth for examples on how to do this via PEMs.
> {quote}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)