You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@synapse.apache.org by in...@apache.org on 2009/05/13 12:05:21 UTC
svn commit: r774272 - in /synapse/trunk/java:
modules/commons/src/main/java/org/apache/synapse/commons/security/
modules/commons/src/main/java/org/apache/synapse/commons/security/secret/
repository/conf/ src/site/xdoc/
Author: indika
Date: Wed May 13 10:05:21 2009
New Revision: 774272
URL: http://svn.apache.org/viewvc?rev=774272&view=rev
Log:
Change passwordProvider in the configurations into secretProvider as secret API is just not only for password
Modified:
synapse/trunk/java/modules/commons/src/main/java/org/apache/synapse/commons/security/SecurityConstants.java
synapse/trunk/java/modules/commons/src/main/java/org/apache/synapse/commons/security/secret/SecretInformationFactory.java
synapse/trunk/java/repository/conf/synapse.properties
synapse/trunk/java/src/site/xdoc/Synapse_Samples_Setup.xml
Modified: synapse/trunk/java/modules/commons/src/main/java/org/apache/synapse/commons/security/SecurityConstants.java
URL: http://svn.apache.org/viewvc/synapse/trunk/java/modules/commons/src/main/java/org/apache/synapse/commons/security/SecurityConstants.java?rev=774272&r1=774271&r2=774272&view=diff
==============================================================================
--- synapse/trunk/java/modules/commons/src/main/java/org/apache/synapse/commons/security/SecurityConstants.java (original)
+++ synapse/trunk/java/modules/commons/src/main/java/org/apache/synapse/commons/security/SecurityConstants.java Wed May 13 10:05:21 2009
@@ -23,7 +23,7 @@
public static final String GLOBAL_PREFIX = "synapse.";
public static final String PROP_USER_NAME = "username";
public static final String PROP_PASSWORD = "password";
- public static final String PROP_PASSWORD_PROVIDER = "passwordProvider";
+ public static final String PROP_SECRET_PROVIDER = "secretProvider";
public static final String PROP_PASSWORD_PROMPT = "passwordPrompt";
public static final String PROP_SECRET_CALLBACK_HANDLER = "SharedSecretCallbackHandler";
public static final String PROP_SECURITY_ADMIN_SERVICES = "SecurityAdminServices";
Modified: synapse/trunk/java/modules/commons/src/main/java/org/apache/synapse/commons/security/secret/SecretInformationFactory.java
URL: http://svn.apache.org/viewvc/synapse/trunk/java/modules/commons/src/main/java/org/apache/synapse/commons/security/secret/SecretInformationFactory.java?rev=774272&r1=774271&r2=774272&view=diff
==============================================================================
--- synapse/trunk/java/modules/commons/src/main/java/org/apache/synapse/commons/security/secret/SecretInformationFactory.java (original)
+++ synapse/trunk/java/modules/commons/src/main/java/org/apache/synapse/commons/security/secret/SecretInformationFactory.java Wed May 13 10:05:21 2009
@@ -68,14 +68,14 @@
// set specific password provider if configured
SecretCallbackHandler passwordProvider =
SecretCallbackHandlerFactory.createSecretCallbackHandler(properties,
- configurationPrefix + SecurityConstants.PROP_PASSWORD_PROVIDER);
+ configurationPrefix + SecurityConstants.PROP_SECRET_PROVIDER);
// if no specific password provider configured, use default password provider
if (passwordProvider == null) {
passwordProvider = SecretCallbackHandlerFactory.createSecretCallbackHandler(
properties,
SecurityConstants.GLOBAL_PREFIX
- + SecurityConstants.PROP_PASSWORD_PROVIDER);
+ + SecurityConstants.PROP_SECRET_PROVIDER);
}
secretInformation.setPasswordProvider(passwordProvider);
secretInformation.setPasswordPrompt(passwordPrompt);
Modified: synapse/trunk/java/repository/conf/synapse.properties
URL: http://svn.apache.org/viewvc/synapse/trunk/java/repository/conf/synapse.properties?rev=774272&r1=774271&r2=774272&view=diff
==============================================================================
--- synapse/trunk/java/repository/conf/synapse.properties (original)
+++ synapse/trunk/java/repository/conf/synapse.properties Wed May 13 10:05:21 2009
@@ -40,12 +40,12 @@
#############################################################################
# The following property specifies a global password provider implementation
# which will be used globally if not overriden in specific configurations
-# synapse.passwordProvider=<any implementation of org.apache.synapse.commons.security.secret.SecretCallbackHandler>
+# synapse.secretProvider=<any implementation of org.apache.synapse.commons.security.secret.SecretCallbackHandler>
#Examples:
-#synapse.passwordProvider=org.apache.synapse.commons.security.secret.handler.SecretManagerSecretCallbackHandler
-#synapse.passwordProvider=org.apache.synapse.commons.security.secret.handler.JMXSecretCallbackHandler
-#synapse.passwordProvider=org.apache.synapse.commons.security.secret.handler.JlineSecretCallbackHandler
-#synapse.passwordProvider=org.apache.synapse.commons.security.secret.handler.JBossEncryptionSecretCallbackHandler
+#synapse.secretProvider=org.apache.synapse.commons.security.secret.handler.SecretManagerSecretCallbackHandler
+#synapse.secretProvider=org.apache.synapse.commons.security.secret.handler.JMXSecretCallbackHandler
+#synapse.secretProvider=org.apache.synapse.commons.security.secret.handler.JlineSecretCallbackHandler
+#synapse.secretProvider=org.apache.synapse.commons.security.secret.handler.JBossEncryptionSecretCallbackHandler
#
#secretRepositories=file
#secretRepositories.file.provider=org.apache.synapse.commons.security.secret.repository.filebased.FileBaseSecretRepositoryProvider
@@ -55,16 +55,16 @@
#keystore.identity.type=JKS
#keystore.identity.alias=synapse
#keystore.identity.store.password=password
-#keystore.identity.store.passwordProvider=<any implementation of org.apache.synapse.commons.security.secret.SecretCallbackHandler>
+#keystore.identity.store.secretProvider=<any implementation of org.apache.synapse.commons.security.secret.SecretCallbackHandler>
#keystore.identity.key.password=password
-#keystore.identity.key.passwordProvider=<any implementation of org.apache.synapse.commons.security.secret.SecretCallbackHandler>
+#keystore.identity.key.secretProvider=<any implementation of org.apache.synapse.commons.security.secret.SecretCallbackHandler>
##keystore.identity.parameters=enableHostnameVerifier=false;keyStoreCertificateFilePath=/home/esb.cer
#
#keystore.trust.location=lib/trust.jks
#keystore.trust.type=JKS
#keystore.trust.alias=synapse
#keystore.trust.store.password=password
-#keystore.trust.store.passwordProvider=<any implementation of org.apache.synapse.commons.security.secret.SecretCallbackHandler>
+#keystore.trust.store.secretProvider=<any implementation of org.apache.synapse.commons.security.secret.SecretCallbackHandler>
#
################################################################################
# DataSources Configuration
@@ -80,7 +80,7 @@
#synapse.datasources.lookupds.driverClassName=org.apache.derby.jdbc.ClientDriver
#synapse.datasources.lookupds.url=jdbc:derby://localhost:1527/lookupdb;create=false
# Optionally you can specifiy a specific password provider implementation which overrides any globally configured provider
-#synapse.datasources.lookupds.passwordProvider=org.apache.synapse.commons.security.secret.handler.JBossEncryptionSecretCallbackHandler
+#synapse.datasources.lookupds.secretProvider=org.apache.synapse.commons.security.secret.handler.JBossEncryptionSecretCallbackHandler
#synapse.datasources.lookupds.username=synapse
# Depending on the password provider used, you may have to use an encrypted password here!
#synapse.datasources.lookupds.password=synapse
@@ -98,7 +98,7 @@
#synapse.datasources.reportds.driverClassName=org.apache.derby.jdbc.ClientDriver
#synapse.datasources.reportds.url=jdbc:derby://localhost:1527/reportdb;create=false
# Optionally you can specifiy a specific password provider implementation which overrides any globally configured provider
-#synapse.datasources.reportds.passwordProvider=org.apache.synapse.commons.security.secret.handler.JBossEncryptionSecretCallbackHandler
+#synapse.datasources.reportds.secretProvider=org.apache.synapse.commons.security.secret.handler.JBossEncryptionSecretCallbackHandler
#synapse.datasources.reportds.username=synapse
# Depending on the password provider used, you may have to use an encrypted password here!
#synapse.datasources.reportds.password=synapse
@@ -115,11 +115,11 @@
#synapse.jmx.rmiPort=1101
# By default the hostname will be detected, but you can force to use another network interface
#synapse.jmx.hostname=
-# Optionally you can specifiy a specific password provider implementation which overrides any globally configured provider
-#synapse.jmx.passwordProvider=org.apache.synapse.commons.security.secret.handler.JBossEncryptionSecretCallbackHandler
+# Optionally you can specifiy a specific secret provider implementation which overrides any globally configured provider
+#synapse.jmx.secretProvider=org.apache.synapse.commons.security.secret.handler.JBossEncryptionSecretCallbackHandler
# By default no authentication is required, but you may enforce this by specifying a username and password
#synapse.jmx.username=admin
-# Depending on the password provider used, you may have to use an encrypted password here!
+# Depending on the secret provider used, you may have to use an encrypted password here!
#synapse.jmx.password=admin
# Optionally you may want to specify the location of an remote access file to restrict access
#synapse.jmx.remote.access.file=
Modified: synapse/trunk/java/src/site/xdoc/Synapse_Samples_Setup.xml
URL: http://svn.apache.org/viewvc/synapse/trunk/java/src/site/xdoc/Synapse_Samples_Setup.xml?rev=774272&r1=774271&r2=774272&view=diff
==============================================================================
--- synapse/trunk/java/src/site/xdoc/Synapse_Samples_Setup.xml (original)
+++ synapse/trunk/java/src/site/xdoc/Synapse_Samples_Setup.xml Wed May 13 10:05:21 2009
@@ -834,11 +834,11 @@
<strong>password provider</strong>
for each keystore.
This can be done by adding property called
- <strong>passwordProvider= any implementation of org.apache.synapse.commons.security.secret.SecretCallbackHandler
+ <strong>secretProvider= any implementation of org.apache.synapse.commons.security.secret.SecretCallbackHandler
</strong>
Example
<pre>
- keystore.identity.store.passwordProvider=org.apache.synapse.commons.security.secret.handler.JMXSecretCallbackHandler
+ keystore.identity.store.secretProvider=org.apache.synapse.commons.security.secret.handler.JMXSecretCallbackHandler
</pre>
</p>
<p>
@@ -995,7 +995,7 @@
</strong>
</p>
<pre>
- synapse.datasources.lookupds.passwordProvider=org.apache.synapse.commons.security.secret.handler.SecretManagerSecretCallbackHandler
+ synapse.datasources.lookupds.secretProvider=org.apache.synapse.commons.security.secret.handler.SecretManagerSecretCallbackHandler
</pre>
</div>
<h2>Using CipherTool</h2>