You are viewing a plain text version of this content. The canonical link for it is here.
Posted to general@incubator.apache.org by "Alan D. Cabrera" <li...@toolazydogs.com> on 2008/06/02 17:05:05 UTC
[VOTE] Incubate JSecurity Project
Relevant information can be found in:
http://wiki.apache.org/incubator/JSecurityProposal
Regards,
Alan
Re: [VOTE] Incubate JSecurity Project
Posted by "Daniel S. Haischt" <da...@googlemail.com>.
+1
Cheers
Alan D. Cabrera wrote:
> Relevant information can be found in:
>
> http://wiki.apache.org/incubator/JSecurityProposal
>
>
> Regards,
> Alan
>
>
>
---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
For additional commands, e-mail: general-help@incubator.apache.org
Re: [VOTE] Incubate JSecurity Project
Posted by Alex Karasulu <ak...@apache.org>.
+1
Alex
>
> > JSecurityProposal
> >
> > JSecurity Proposal
> >
> > Project Name: JSecurity
> >
> > Introduction
> >
> > This proposal seeks to create a top-level Apache Software Foundation
> > project to continue the development and advancement of the JSecurity
> > open-source framework. It has broad backing from the JSecurity
> > Community and unanimous backing from the current development team.
> >
> > We thank you for your consideration.
> > Key Features & Goals
> >
> > *
> >
> > The simplest and easiest to understand Java Security API
> > possible.
> > *
> >
> > Authentication (log-in) across one or more pluggable Realms
> > (JDBC, LDAP, etc), providing PAM (Pluggable Authentication Module)
> > functionality.
> > *
> >
> > Authorization (access control) via one or more of said Realms.
> > *
> >
> > Dynamic security model support allowing users, roles, and
> > permissions to be changed and assigned dynamically at runtime.
> > *
> >
> > Dynamic Instance-level access control - the ability to secure
> > individual instances (files, objects, users, etc) at runtime.
> > *
> >
> > POJO-based Enterprise Session Management - access to clustered/
> > distributed/federated user sessions in web or non-web environments via
> > the same API.
> > *
> >
> > Heterogeneous client session access - access shared session
> > state across client mediums (web MVC, Swing, Flash, C#+SOAP etc).
> > *
> >
> > Simple SSO (Single Sign-On) support.
> > *
> >
> > Simple Cryptography API.
> >
> > 0. Rationale
> >
> > The current JSecurity community ([WWW] http://www.jsecurity.org)
> > fosters a positive environment of contribution, feedback and
> > supporting fellow members. Although already an open-source project for
> > the last 3+ years, the project as of late has grown quite
> > substantially over the last six months especially, and it is our
> > desire to see JSecurity be adopted by the Apache Software Foundation
> > to continue these efforts. We feel the ASF community will enable the
> > JSecurity project to reach higher adoption rates with better community
> > support beyond what we are able to accomplish ourselves.
> >
> > Furthermore, a significant number of Apache projects today could find
> > much benefit in JSecurity, as there is not currently anything in the
> > ASF that addresses its feature set as single unified project. We feel
> > that helping other Apache projects would create a symbiotic
> > relationship beneficial to the existing JSecurity community as well as
> > the ASF.
> > 0.1 Criteria
> > Meritocracy
> >
> > The JSecurity project will be meritocratic. The project will follow
> > the guidelines ([WWW]
> http://apache.org/foundation/how-it-works.html#meritocracy)
> > of the Apache Software Foundation. In order to achieve this, we plan
> > on pro actively recruiting individuals in the Community to get
> > involved in the project: specifying work that needs to be done,
> > encouraging bug fixes, enhancements, and advancements, and engaging in
> > discussion on how the code works and is structured. In the end, we are
> > committed to creating an environment to foster a meritocracy.
> > Community
> >
> > JSecurity has had a small but active community for its first couple of
> > years after inception, with a significant increase in community
> > members the last 6 months. There are hundreds of posts in the forums,
> > some dating back over 2 years old. Current mailing list activity is
> > around 100+ messages per month and growing with the accumulation of
> > new contributors and users. It is expected that community growth will
> > only continue flourish as an ASF adopted project.
> > Core Developers
> >
> > All developers who have ever committed to the existing code repository
> > are still active on the current JSecurity team and will continue to
> > participate. They are:
> >
> > *
> >
> > Les Hazlewood
> > *
> >
> > Jeremy Haile
> > *
> >
> > Tim Veil
> > *
> >
> > Peter Ledbrook
> > *
> >
> > Allan Ditzel
> >
> > Alignment
> >
> > JSecurity is aligned well with Apache in terms of technologies and
> > licensing. It fits in well technologically with other Apache projects,
> > which also focus on clustering, web frameworks, and Java technolgies.
> >
> > We are sure there are quite a few ASF projects that could find utility
> > in JSecurity. Apache Tomcat might wish to enhance or simplify its
> > Realm functionality by using JSecurity's native support for multiple
> > back-end datasources. There has also already been mention of interest
> > by the Apache Directory TripleSec team in using JSecurity to support
> > LDAP integration as well as enable dynamic runtime support for
> > security users, roles, and permissions.
> >
> > Essentially any Apache project that utilizes log-ins, access control,
> > time-based Session access (in both web and non web environments), or
> > cryptography would find JSecurity beneficial.
> > 0.2 Warning Signs
> > Orphaned products
> >
> > JSecurity is already a 3+ year old open-source project with a long
> > history and currently in use in many open-source and commercial
> > software products. The interest from the respective communities that
> > use JSecurity (grails.org, et. al.) have continuously grown over the
> > last few years, with very heavy growth in the last 6 months. It is
> > expected that this community growth will only increase with the
> > adoption of the ASF, and the commercial products that use JSecurity
> > will continue to encourage and ensure its longevity.
> > Inexperience with open source
> >
> > The current committers have varying degrees of experience contributing
> > and/or committing to open source projects, including Spring ([WWW]
> http://www.springframework.org
> > ), Hibernate ([WWW] http://www.hibernate.org), Grails ([WWW]
> http://www.grails.org
> > ), and others. All have been involved with source code that has been
> > released under an open source license using an open source development
> > process to varying degrees. All current committers are comfortable
> > with normal meritocracy rules, as that is how the development team
> > informally operates now. We do not in any way expect any difficulty in
> > executing under normal ASF meritocracy rules.
> > Homogeneous developers
> >
> > All 5 current JSecurity committers works for different companies, with
> > no overlap. They live in different parts of the world, in the United
> > States and Europe.
> > Reliance on salaried developers
> >
> > The current committers are not compensated by their employers to
> > contribute to the project. One committer works for G2One ([WWW]
> http://www.g2one.com/)
> > , the company behind the Apache 2.0 open-source Grails platform and
> > may contribute to the project on company time. Any such contributions
> > are provided with full knowledge and support of the company, with a
> > valid CCLA on file.
> > No ties to other Apache products
> >
> > Currently JSecurity has a required dependency on Apache Commons
> > Logging, with an optional dependency on Apache Commons BeanUtils Core.
> >
> > Also based on the above Alignment section, JSecurity could very
> > quickly become a part of many other ASF projects, ensuring a
> > successful future within the ASF.
> > A fascination with the Apache brand
> >
> > JSecurity started outside of the ASF under the LGPL license. The
> > development team voted unanimously to switch to the Apache 2.0 license
> > to foster a more open community, provide flexible options for
> > commercial deployment, and also to be eligible as an ASF project.
> >
> > 1. Project Scope
> >
> > The scope of the JSecurity project would be the continued development
> > of JSecurity technology core infrastructure software, including the
> > related utilities and tools. The development would include adding new
> > features and improving performance, scalability, quality, and
> > extensibility.
> >
> > 2. Initial Population Source
> >
> > The initial resources would be garnered from:
> >
> > *
> >
> > JSecurity SourceForge repository
> > o
> >
> > ([WWW] http://sourceforge.net/projects/jsecurity/)
> >
> > 3. ASF Resources Requested
> > 3.1 Mailing lists
> >
> > *
> >
> > jsec-private (with moderated subscriptions)
> > *
> >
> > jsec-user
> > *
> >
> > jsec-dev
> > *
> >
> > jsec-commits (scm = Software Configuration Management for SVN
> > commits, automated build notifications, et. al.)
> >
> > 3.2 Revision Control System
> >
> > JSecurity would like to use a Subversion repository: [WWW]
> https://svn.apache.org/repos/asf/incubator/jsecurity
> > 3.3 Issue Tracking
> >
> > Since JSecurity would have its own release cycle, it should have its
> > own JIRA project
> >
> > *
> >
> > Project Name: JSecurity
> > *
> >
> > Project Key: JSEC
> >
> > 4. Initial Comitters
> >
> > *
> >
> > Alan Cabrera ([MAILTO] adc@apache.org)
> > *
> >
> > Les Hazlewood
> > *
> >
> > Jeremy Haile
> > *
> >
> > Tim Veil
> > *
> >
> > Peter Ledbrook
> > *
> >
> > Allan Ditzel
> >
> > 5. Sponsoring Individual
> >
> > We kindly request the Apache Incubator PMC to be the sponsor for this
> > project.
> > Champion
> >
> > *
> >
> > Alan D. Cabrera
> >
> > Mentors
> >
> > *
> >
> > Alan D. Cabrera
> > *
> >
> > Paul Fremantle
> > *
> >
> > Alex Karasulu
> > *
> >
> > Emmanuel Lecharny
> > *
> >
> > Craig Russell
> >
> >
> > ---------------------------------------------------------------------
> > To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
> > For additional commands, e-mail: general-help@incubator.apache.org
> >
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
> For additional commands, e-mail: general-help@incubator.apache.org
>
>
Re: [VOTE] Incubate JSecurity Project
Posted by Upayavira <uv...@odoko.co.uk>.
Thank you.
And here's my +1.
Upayavira
On Mon, 2008-06-02 at 08:47 -0700, Alan D. Cabrera wrote:
> On Jun 2, 2008, at 8:18 AM, Upayavira wrote:
>
> > Please include proposal in this thread so that people don't have to go
> > externally to see it.
> >
> > Regards, Upayavira
>
>
> JSecurityProposal
>
> JSecurity Proposal
>
> Project Name: JSecurity
>
> Introduction
>
> This proposal seeks to create a top-level Apache Software Foundation
> project to continue the development and advancement of the JSecurity
> open-source framework. It has broad backing from the JSecurity
> Community and unanimous backing from the current development team.
>
> We thank you for your consideration.
> Key Features & Goals
>
> *
>
> The simplest and easiest to understand Java Security API
> possible.
> *
>
> Authentication (log-in) across one or more pluggable Realms
> (JDBC, LDAP, etc), providing PAM (Pluggable Authentication Module)
> functionality.
> *
>
> Authorization (access control) via one or more of said Realms.
> *
>
> Dynamic security model support allowing users, roles, and
> permissions to be changed and assigned dynamically at runtime.
> *
>
> Dynamic Instance-level access control - the ability to secure
> individual instances (files, objects, users, etc) at runtime.
> *
>
> POJO-based Enterprise Session Management - access to clustered/
> distributed/federated user sessions in web or non-web environments via
> the same API.
> *
>
> Heterogeneous client session access - access shared session
> state across client mediums (web MVC, Swing, Flash, C#+SOAP etc).
> *
>
> Simple SSO (Single Sign-On) support.
> *
>
> Simple Cryptography API.
>
> 0. Rationale
>
> The current JSecurity community ([WWW] http://www.jsecurity.org)
> fosters a positive environment of contribution, feedback and
> supporting fellow members. Although already an open-source project for
> the last 3+ years, the project as of late has grown quite
> substantially over the last six months especially, and it is our
> desire to see JSecurity be adopted by the Apache Software Foundation
> to continue these efforts. We feel the ASF community will enable the
> JSecurity project to reach higher adoption rates with better community
> support beyond what we are able to accomplish ourselves.
>
> Furthermore, a significant number of Apache projects today could find
> much benefit in JSecurity, as there is not currently anything in the
> ASF that addresses its feature set as single unified project. We feel
> that helping other Apache projects would create a symbiotic
> relationship beneficial to the existing JSecurity community as well as
> the ASF.
> 0.1 Criteria
> Meritocracy
>
> The JSecurity project will be meritocratic. The project will follow
> the guidelines ([WWW] http://apache.org/foundation/how-it-works.html#meritocracy)
> of the Apache Software Foundation. In order to achieve this, we plan
> on pro actively recruiting individuals in the Community to get
> involved in the project: specifying work that needs to be done,
> encouraging bug fixes, enhancements, and advancements, and engaging in
> discussion on how the code works and is structured. In the end, we are
> committed to creating an environment to foster a meritocracy.
> Community
>
> JSecurity has had a small but active community for its first couple of
> years after inception, with a significant increase in community
> members the last 6 months. There are hundreds of posts in the forums,
> some dating back over 2 years old. Current mailing list activity is
> around 100+ messages per month and growing with the accumulation of
> new contributors and users. It is expected that community growth will
> only continue flourish as an ASF adopted project.
> Core Developers
>
> All developers who have ever committed to the existing code repository
> are still active on the current JSecurity team and will continue to
> participate. They are:
>
> *
>
> Les Hazlewood
> *
>
> Jeremy Haile
> *
>
> Tim Veil
> *
>
> Peter Ledbrook
> *
>
> Allan Ditzel
>
> Alignment
>
> JSecurity is aligned well with Apache in terms of technologies and
> licensing. It fits in well technologically with other Apache projects,
> which also focus on clustering, web frameworks, and Java technolgies.
>
> We are sure there are quite a few ASF projects that could find utility
> in JSecurity. Apache Tomcat might wish to enhance or simplify its
> Realm functionality by using JSecurity's native support for multiple
> back-end datasources. There has also already been mention of interest
> by the Apache Directory TripleSec team in using JSecurity to support
> LDAP integration as well as enable dynamic runtime support for
> security users, roles, and permissions.
>
> Essentially any Apache project that utilizes log-ins, access control,
> time-based Session access (in both web and non web environments), or
> cryptography would find JSecurity beneficial.
> 0.2 Warning Signs
> Orphaned products
>
> JSecurity is already a 3+ year old open-source project with a long
> history and currently in use in many open-source and commercial
> software products. The interest from the respective communities that
> use JSecurity (grails.org, et. al.) have continuously grown over the
> last few years, with very heavy growth in the last 6 months. It is
> expected that this community growth will only increase with the
> adoption of the ASF, and the commercial products that use JSecurity
> will continue to encourage and ensure its longevity.
> Inexperience with open source
>
> The current committers have varying degrees of experience contributing
> and/or committing to open source projects, including Spring ([WWW] http://www.springframework.org
> ), Hibernate ([WWW] http://www.hibernate.org), Grails ([WWW] http://www.grails.org
> ), and others. All have been involved with source code that has been
> released under an open source license using an open source development
> process to varying degrees. All current committers are comfortable
> with normal meritocracy rules, as that is how the development team
> informally operates now. We do not in any way expect any difficulty in
> executing under normal ASF meritocracy rules.
> Homogeneous developers
>
> All 5 current JSecurity committers works for different companies, with
> no overlap. They live in different parts of the world, in the United
> States and Europe.
> Reliance on salaried developers
>
> The current committers are not compensated by their employers to
> contribute to the project. One committer works for G2One ([WWW] http://www.g2one.com/)
> , the company behind the Apache 2.0 open-source Grails platform and
> may contribute to the project on company time. Any such contributions
> are provided with full knowledge and support of the company, with a
> valid CCLA on file.
> No ties to other Apache products
>
> Currently JSecurity has a required dependency on Apache Commons
> Logging, with an optional dependency on Apache Commons BeanUtils Core.
>
> Also based on the above Alignment section, JSecurity could very
> quickly become a part of many other ASF projects, ensuring a
> successful future within the ASF.
> A fascination with the Apache brand
>
> JSecurity started outside of the ASF under the LGPL license. The
> development team voted unanimously to switch to the Apache 2.0 license
> to foster a more open community, provide flexible options for
> commercial deployment, and also to be eligible as an ASF project.
>
> 1. Project Scope
>
> The scope of the JSecurity project would be the continued development
> of JSecurity technology core infrastructure software, including the
> related utilities and tools. The development would include adding new
> features and improving performance, scalability, quality, and
> extensibility.
>
> 2. Initial Population Source
>
> The initial resources would be garnered from:
>
> *
>
> JSecurity SourceForge repository
> o
>
> ([WWW] http://sourceforge.net/projects/jsecurity/)
>
> 3. ASF Resources Requested
> 3.1 Mailing lists
>
> *
>
> jsec-private (with moderated subscriptions)
> *
>
> jsec-user
> *
>
> jsec-dev
> *
>
> jsec-commits (scm = Software Configuration Management for SVN
> commits, automated build notifications, et. al.)
>
> 3.2 Revision Control System
>
> JSecurity would like to use a Subversion repository: [WWW] https://svn.apache.org/repos/asf/incubator/jsecurity
> 3.3 Issue Tracking
>
> Since JSecurity would have its own release cycle, it should have its
> own JIRA project
>
> *
>
> Project Name: JSecurity
> *
>
> Project Key: JSEC
>
> 4. Initial Comitters
>
> *
>
> Alan Cabrera ([MAILTO] adc@apache.org)
> *
>
> Les Hazlewood
> *
>
> Jeremy Haile
> *
>
> Tim Veil
> *
>
> Peter Ledbrook
> *
>
> Allan Ditzel
>
> 5. Sponsoring Individual
>
> We kindly request the Apache Incubator PMC to be the sponsor for this
> project.
> Champion
>
> *
>
> Alan D. Cabrera
>
> Mentors
>
> *
>
> Alan D. Cabrera
> *
>
> Paul Fremantle
> *
>
> Alex Karasulu
> *
>
> Emmanuel Lecharny
> *
>
> Craig Russell
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
> For additional commands, e-mail: general-help@incubator.apache.org
>
---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
For additional commands, e-mail: general-help@incubator.apache.org
Re: [VOTE] Incubate JSecurity Project
Posted by "Alan D. Cabrera" <li...@toolazydogs.com>.
On Jun 2, 2008, at 8:18 AM, Upayavira wrote:
> Please include proposal in this thread so that people don't have to go
> externally to see it.
>
> Regards, Upayavira
JSecurityProposal
JSecurity Proposal
Project Name: JSecurity
Introduction
This proposal seeks to create a top-level Apache Software Foundation
project to continue the development and advancement of the JSecurity
open-source framework. It has broad backing from the JSecurity
Community and unanimous backing from the current development team.
We thank you for your consideration.
Key Features & Goals
*
The simplest and easiest to understand Java Security API
possible.
*
Authentication (log-in) across one or more pluggable Realms
(JDBC, LDAP, etc), providing PAM (Pluggable Authentication Module)
functionality.
*
Authorization (access control) via one or more of said Realms.
*
Dynamic security model support allowing users, roles, and
permissions to be changed and assigned dynamically at runtime.
*
Dynamic Instance-level access control - the ability to secure
individual instances (files, objects, users, etc) at runtime.
*
POJO-based Enterprise Session Management - access to clustered/
distributed/federated user sessions in web or non-web environments via
the same API.
*
Heterogeneous client session access - access shared session
state across client mediums (web MVC, Swing, Flash, C#+SOAP etc).
*
Simple SSO (Single Sign-On) support.
*
Simple Cryptography API.
0. Rationale
The current JSecurity community ([WWW] http://www.jsecurity.org)
fosters a positive environment of contribution, feedback and
supporting fellow members. Although already an open-source project for
the last 3+ years, the project as of late has grown quite
substantially over the last six months especially, and it is our
desire to see JSecurity be adopted by the Apache Software Foundation
to continue these efforts. We feel the ASF community will enable the
JSecurity project to reach higher adoption rates with better community
support beyond what we are able to accomplish ourselves.
Furthermore, a significant number of Apache projects today could find
much benefit in JSecurity, as there is not currently anything in the
ASF that addresses its feature set as single unified project. We feel
that helping other Apache projects would create a symbiotic
relationship beneficial to the existing JSecurity community as well as
the ASF.
0.1 Criteria
Meritocracy
The JSecurity project will be meritocratic. The project will follow
the guidelines ([WWW] http://apache.org/foundation/how-it-works.html#meritocracy)
of the Apache Software Foundation. In order to achieve this, we plan
on pro actively recruiting individuals in the Community to get
involved in the project: specifying work that needs to be done,
encouraging bug fixes, enhancements, and advancements, and engaging in
discussion on how the code works and is structured. In the end, we are
committed to creating an environment to foster a meritocracy.
Community
JSecurity has had a small but active community for its first couple of
years after inception, with a significant increase in community
members the last 6 months. There are hundreds of posts in the forums,
some dating back over 2 years old. Current mailing list activity is
around 100+ messages per month and growing with the accumulation of
new contributors and users. It is expected that community growth will
only continue flourish as an ASF adopted project.
Core Developers
All developers who have ever committed to the existing code repository
are still active on the current JSecurity team and will continue to
participate. They are:
*
Les Hazlewood
*
Jeremy Haile
*
Tim Veil
*
Peter Ledbrook
*
Allan Ditzel
Alignment
JSecurity is aligned well with Apache in terms of technologies and
licensing. It fits in well technologically with other Apache projects,
which also focus on clustering, web frameworks, and Java technolgies.
We are sure there are quite a few ASF projects that could find utility
in JSecurity. Apache Tomcat might wish to enhance or simplify its
Realm functionality by using JSecurity's native support for multiple
back-end datasources. There has also already been mention of interest
by the Apache Directory TripleSec team in using JSecurity to support
LDAP integration as well as enable dynamic runtime support for
security users, roles, and permissions.
Essentially any Apache project that utilizes log-ins, access control,
time-based Session access (in both web and non web environments), or
cryptography would find JSecurity beneficial.
0.2 Warning Signs
Orphaned products
JSecurity is already a 3+ year old open-source project with a long
history and currently in use in many open-source and commercial
software products. The interest from the respective communities that
use JSecurity (grails.org, et. al.) have continuously grown over the
last few years, with very heavy growth in the last 6 months. It is
expected that this community growth will only increase with the
adoption of the ASF, and the commercial products that use JSecurity
will continue to encourage and ensure its longevity.
Inexperience with open source
The current committers have varying degrees of experience contributing
and/or committing to open source projects, including Spring ([WWW] http://www.springframework.org
), Hibernate ([WWW] http://www.hibernate.org), Grails ([WWW] http://www.grails.org
), and others. All have been involved with source code that has been
released under an open source license using an open source development
process to varying degrees. All current committers are comfortable
with normal meritocracy rules, as that is how the development team
informally operates now. We do not in any way expect any difficulty in
executing under normal ASF meritocracy rules.
Homogeneous developers
All 5 current JSecurity committers works for different companies, with
no overlap. They live in different parts of the world, in the United
States and Europe.
Reliance on salaried developers
The current committers are not compensated by their employers to
contribute to the project. One committer works for G2One ([WWW] http://www.g2one.com/)
, the company behind the Apache 2.0 open-source Grails platform and
may contribute to the project on company time. Any such contributions
are provided with full knowledge and support of the company, with a
valid CCLA on file.
No ties to other Apache products
Currently JSecurity has a required dependency on Apache Commons
Logging, with an optional dependency on Apache Commons BeanUtils Core.
Also based on the above Alignment section, JSecurity could very
quickly become a part of many other ASF projects, ensuring a
successful future within the ASF.
A fascination with the Apache brand
JSecurity started outside of the ASF under the LGPL license. The
development team voted unanimously to switch to the Apache 2.0 license
to foster a more open community, provide flexible options for
commercial deployment, and also to be eligible as an ASF project.
1. Project Scope
The scope of the JSecurity project would be the continued development
of JSecurity technology core infrastructure software, including the
related utilities and tools. The development would include adding new
features and improving performance, scalability, quality, and
extensibility.
2. Initial Population Source
The initial resources would be garnered from:
*
JSecurity SourceForge repository
o
([WWW] http://sourceforge.net/projects/jsecurity/)
3. ASF Resources Requested
3.1 Mailing lists
*
jsec-private (with moderated subscriptions)
*
jsec-user
*
jsec-dev
*
jsec-commits (scm = Software Configuration Management for SVN
commits, automated build notifications, et. al.)
3.2 Revision Control System
JSecurity would like to use a Subversion repository: [WWW] https://svn.apache.org/repos/asf/incubator/jsecurity
3.3 Issue Tracking
Since JSecurity would have its own release cycle, it should have its
own JIRA project
*
Project Name: JSecurity
*
Project Key: JSEC
4. Initial Comitters
*
Alan Cabrera ([MAILTO] adc@apache.org)
*
Les Hazlewood
*
Jeremy Haile
*
Tim Veil
*
Peter Ledbrook
*
Allan Ditzel
5. Sponsoring Individual
We kindly request the Apache Incubator PMC to be the sponsor for this
project.
Champion
*
Alan D. Cabrera
Mentors
*
Alan D. Cabrera
*
Paul Fremantle
*
Alex Karasulu
*
Emmanuel Lecharny
*
Craig Russell
---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
For additional commands, e-mail: general-help@incubator.apache.org
Re: [VOTE] Incubate JSecurity Project
Posted by Upayavira <uv...@odoko.co.uk>.
Please include proposal in this thread so that people don't have to go
externally to see it.
Regards, Upayavira
On Mon, 2008-06-02 at 08:11 -0700, Alan D. Cabrera wrote:
> +1
>
> On Jun 2, 2008, at 8:05 AM, Alan D. Cabrera wrote:
>
> > Relevant information can be found in:
> >
> > http://wiki.apache.org/incubator/JSecurityProposal
> >
> >
> > Regards,
> > Alan
> >
> >
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
> For additional commands, e-mail: general-help@incubator.apache.org
>
---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
For additional commands, e-mail: general-help@incubator.apache.org
Re: [VOTE] Incubate JSecurity Project
Posted by "Alan D. Cabrera" <li...@toolazydogs.com>.
+1
On Jun 2, 2008, at 8:05 AM, Alan D. Cabrera wrote:
> Relevant information can be found in:
>
> http://wiki.apache.org/incubator/JSecurityProposal
>
>
> Regards,
> Alan
>
>
---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
For additional commands, e-mail: general-help@incubator.apache.org
[RESULT][VOTE] Incubate JSecurity Project
Posted by "Alan D. Cabrera" <li...@toolazydogs.com>.
The vote passes with ten binding +1 votes, six non-binding +1 votes,
and no 0 or -1 votes.
Regards,
Alan
On Jun 2, 2008, at 8:05 AM, Alan D. Cabrera wrote:
> Relevant information can be found in:
>
> http://wiki.apache.org/incubator/JSecurityProposal
>
>
> Regards,
> Alan
>
>
---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
For additional commands, e-mail: general-help@incubator.apache.org
Re: [VOTE] Incubate JSecurity Project
Posted by Martijn Dashorst <ma...@gmail.com>.
+1
On Mon, Jun 2, 2008 at 5:05 PM, Alan D. Cabrera <li...@toolazydogs.com> wrote:
> Relevant information can be found in:
>
> http://wiki.apache.org/incubator/JSecurityProposal
>
>
> Regards,
> Alan
>
>
>
--
Become a Wicket expert, learn from the best: http://wicketinaction.com
Apache Wicket 1.3.3 is released
Get it now: http://www.apache.org/dyn/closer.cgi/wicket/1.3.3
---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
For additional commands, e-mail: general-help@incubator.apache.org
Re: [VOTE] Incubate JSecurity Project
Posted by Luciano Resende <lu...@gmail.com>.
+1 (non-binding)
On Wed, Jun 4, 2008 at 9:23 AM, James Carman <ja...@carmanconsulting.com> wrote:
> +1 (non-binding)
>
> On Mon, Jun 2, 2008 at 11:05 AM, Alan D. Cabrera <li...@toolazydogs.com> wrote:
>> Relevant information can be found in:
>>
>> http://wiki.apache.org/incubator/JSecurityProposal
>>
>>
>> Regards,
>> Alan
>>
>>
>>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
> For additional commands, e-mail: general-help@incubator.apache.org
>
>
--
Luciano Resende
Apache Tuscany Committer
http://people.apache.org/~lresende
http://lresende.blogspot.com/
---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
For additional commands, e-mail: general-help@incubator.apache.org
Re: [VOTE] Incubate JSecurity Project
Posted by James Carman <ja...@carmanconsulting.com>.
+1 (non-binding)
On Mon, Jun 2, 2008 at 11:05 AM, Alan D. Cabrera <li...@toolazydogs.com> wrote:
> Relevant information can be found in:
>
> http://wiki.apache.org/incubator/JSecurityProposal
>
>
> Regards,
> Alan
>
>
>
---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
For additional commands, e-mail: general-help@incubator.apache.org
Re: [VOTE] Incubate JSecurity Project
Posted by Paul Fremantle <pz...@gmail.com>.
+1
pAUL
On Mon, Jun 2, 2008 at 4:16 PM, Craig L Russell <Cr...@sun.com> wrote:
> +1
>
> Craig
>
> On Jun 2, 2008, at 8:05 AM, Alan D. Cabrera wrote:
>
>> Relevant information can be found in:
>>
>> http://wiki.apache.org/incubator/JSecurityProposal
>>
>>
>> Regards,
>> Alan
>>
>>
>
> Craig Russell
> Architect, Sun Java Enterprise System http://java.sun.com/products/jdo
> 408 276-5638 mailto:Craig.Russell@sun.com
> P.S. A good JDO? O, Gasp!
>
>
--
Paul Fremantle
Co-Founder and CTO, WSO2
Apache Synapse PMC Chair
OASIS WS-RX TC Co-chair
blog: http://pzf.fremantle.org
paul@wso2.com
"Oxygenating the Web Service Platform", www.wso2.com
---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
For additional commands, e-mail: general-help@incubator.apache.org
Re: [VOTE] Incubate JSecurity Project
Posted by Craig L Russell <Cr...@Sun.COM>.
+1
Craig
On Jun 2, 2008, at 8:05 AM, Alan D. Cabrera wrote:
> Relevant information can be found in:
>
> http://wiki.apache.org/incubator/JSecurityProposal
>
>
> Regards,
> Alan
>
>
Craig Russell
Architect, Sun Java Enterprise System http://java.sun.com/products/jdo
408 276-5638 mailto:Craig.Russell@sun.com
P.S. A good JDO? O, Gasp!
Re: [VOTE] Incubate JSecurity Project
Posted by Niklas Gustavsson <ni...@protocol7.com>.
+1
/niklas
---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
For additional commands, e-mail: general-help@incubator.apache.org
Re: [VOTE] Incubate JSecurity Project
Posted by Bertrand Delacretaz <bd...@apache.org>.
+1
-Bertrand
---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
For additional commands, e-mail: general-help@incubator.apache.org
Re: [VOTE] Incubate JSecurity Project
Posted by Emmanuel Lecharny <el...@apache.org>.
+1
Alan D. Cabrera wrote:
> Relevant information can be found in:
>
> http://wiki.apache.org/incubator/JSecurityProposal
>
>
> Regards,
> Alan
>
>
>
--
--
cordialement, regards,
Emmanuel Lécharny
www.iktek.com
directory.apache.org
---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
For additional commands, e-mail: general-help@incubator.apache.org
Re: [VOTE] Incubate JSecurity Project
Posted by Kevan Miller <ke...@gmail.com>.
+1
--kevan
On Jun 2, 2008, at 11:05 AM, Alan D. Cabrera wrote:
> Relevant information can be found in:
>
> http://wiki.apache.org/incubator/JSecurityProposal
>
>
> Regards,
> Alan
>
>
Re: [VOTE] Incubate JSecurity Project
Posted by Mohammad Nour El-Din <no...@gmail.com>.
+1
Nice project
On Wed, Jun 4, 2008 at 4:12 PM, Davanum Srinivas <da...@gmail.com> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> +1
>
> Niclas Hedhman wrote:
> | On Monday 02 June 2008 23:05, Alan D. Cabrera wrote:
> |> Relevant information can be found in:
> |>
> |> http://wiki.apache.org/incubator/JSecurityProposal
> |
> | +1
> |
> |
> | Cheers
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.5 (Cygwin)
>
> iD8DBQFIRpTLgNg6eWEDv1kRAmGCAJoC7bFu96kODp0dqt6RFRlxrB+XegCgogz0
> tCmG6VHIY4uCjsTcbQiiq8A=
> =Jqga
> -----END PGP SIGNATURE-----
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
> For additional commands, e-mail: general-help@incubator.apache.org
>
>
--
Thanks
- Mohammad Nour
---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
For additional commands, e-mail: general-help@incubator.apache.org
Re: [VOTE] Incubate JSecurity Project
Posted by Davanum Srinivas <da...@gmail.com>.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
+1
Niclas Hedhman wrote:
| On Monday 02 June 2008 23:05, Alan D. Cabrera wrote:
|> Relevant information can be found in:
|>
|> http://wiki.apache.org/incubator/JSecurityProposal
|
| +1
|
|
| Cheers
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (Cygwin)
iD8DBQFIRpTLgNg6eWEDv1kRAmGCAJoC7bFu96kODp0dqt6RFRlxrB+XegCgogz0
tCmG6VHIY4uCjsTcbQiiq8A=
=Jqga
-----END PGP SIGNATURE-----
---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
For additional commands, e-mail: general-help@incubator.apache.org
Re: [VOTE] Incubate JSecurity Project
Posted by Niclas Hedhman <ni...@hedhman.org>.
On Monday 02 June 2008 23:05, Alan D. Cabrera wrote:
> Relevant information can be found in:
>
> http://wiki.apache.org/incubator/JSecurityProposal
+1
Cheers
--
Niclas Hedhman, Software Developer
I live here; http://tinyurl.com/2qq9er
I work here; http://tinyurl.com/2ymelc
I relax here; http://tinyurl.com/2cgsug
---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org
For additional commands, e-mail: general-help@incubator.apache.org