Package org.hornetq.utils

Examples of org.hornetq.utils.DefaultSensitiveStringCodec


   private void initPasswords() throws HornetQException
   {
      if (useMaskedPassword)
      {
         SensitiveDataCodec<String> codecInstance = new DefaultSensitiveStringCodec();

         if (passwordCodec != null)
         {
            codecInstance = PasswordMaskingUtil.getCodec(passwordCodec);
         }

         try
         {
            if (this.sourcePassword != null)
            {
               sourcePassword = codecInstance.decode(sourcePassword);
            }
           
            if (this.targetPassword != null)
            {
               targetPassword = codecInstance.decode(targetPassword);
            }
         }
         catch (Exception e)
         {
            throw new HornetQException(HornetQException.ILLEGAL_STATE, "Error decoding password using codec instance", e);
View Full Code Here


      if (initialized)
         return;

      if (useMaskedPassword)
      {
         codecInstance = new DefaultSensitiveStringCodec();

         if (passwordCodec != null)
         {
            codecInstance = PasswordMaskingUtil.getCodec(passwordCodec);
         }
View Full Code Here

   private void initPasswords() throws HornetQException
   {
      if (useMaskedPassword)
      {
         SensitiveDataCodec<String> codecInstance = new DefaultSensitiveStringCodec();

         if (passwordCodec != null)
         {
            codecInstance = PasswordMaskingUtil.getCodec(passwordCodec);
         }

         try
         {
            if (this.sourcePassword != null)
            {
               sourcePassword = codecInstance.decode(sourcePassword);
            }

            if (this.targetPassword != null)
            {
               targetPassword = codecInstance.decode(targetPassword);
            }
         }
         catch (Exception e)
         {
            throw HornetQJMSServerBundle.BUNDLE.errorDecodingPassword(e);
View Full Code Here

   private void initPasswords() throws HornetQException
   {
      if (useMaskedPassword)
      {
         SensitiveDataCodec<String> codecInstance = new DefaultSensitiveStringCodec();

         if (passwordCodec != null)
         {
            codecInstance = PasswordMaskingUtil.getCodec(passwordCodec);
         }

         try
         {
            if (this.sourcePassword != null)
            {
               sourcePassword = codecInstance.decode(sourcePassword);
            }

            if (this.targetPassword != null)
            {
               targetPassword = codecInstance.decode(targetPassword);
            }
         }
         catch (Exception e)
         {
            throw HornetQJMSServerBundle.BUNDLE.errorDecodingPassword(e);
View Full Code Here

   {
      HornetQResourceAdapter qResourceAdapter = new HornetQResourceAdapter();
      qResourceAdapter.setConnectorClassName(UnitTestCase.INVM_CONNECTOR_FACTORY);
      HornetQRATestBase.MyBootstrapContext ctx = new HornetQRATestBase.MyBootstrapContext();
    
      DefaultSensitiveStringCodec codec = new DefaultSensitiveStringCodec();
      String mask = (String)codec.encode("helloworld");

      qResourceAdapter.setUseMaskedPassword(true);
      qResourceAdapter.setPassword(mask);
     
      qResourceAdapter.setTransactionManagerLocatorClass("");
      qResourceAdapter.start(ctx);
     
      assertEquals("helloworld", qResourceAdapter.getPassword());
     
      HornetQActivationSpec spec = new HornetQActivationSpec();
      spec.setResourceAdapter(qResourceAdapter);
      spec.setUseJNDI(false);
      spec.setDestinationType("javax.jms.Queue");
      spec.setDestination(MDBQUEUE);

      mask = (String)codec.encode("mdbpassword");
      spec.setPassword(mask);
      qResourceAdapter.setConnectorClassName(INVM_CONNECTOR_FACTORY);
      CountDownLatch latch = new CountDownLatch(1);
      DummyMessageEndpoint endpoint = new DummyMessageEndpoint(latch);
      DummyMessageEndpointFactory endpointFactory = new DummyMessageEndpointFactory(endpoint, false);
View Full Code Here

      HornetQRATestBase.MyBootstrapContext ctx = new HornetQRATestBase.MyBootstrapContext();
    
      qResourceAdapter.setUseMaskedPassword(true);
      qResourceAdapter.setPasswordCodec(DefaultSensitiveStringCodec.class.getName() + ";key=anotherkey");

      DefaultSensitiveStringCodec codec = new DefaultSensitiveStringCodec();
      Map<String, String> prop = new HashMap<String, String>();
     
      prop.put("key", "anotherkey");
      codec.init(prop);
     
      String mask = (String)codec.encode("helloworld");

      qResourceAdapter.setPassword(mask);
     
      qResourceAdapter.setTransactionManagerLocatorClass("");
      qResourceAdapter.start(ctx);
     
      assertEquals("helloworld", qResourceAdapter.getPassword());
     
      HornetQActivationSpec spec = new HornetQActivationSpec();
      spec.setResourceAdapter(qResourceAdapter);
      spec.setUseJNDI(false);
      spec.setDestinationType("javax.jms.Queue");
      spec.setDestination(MDBQUEUE);

      mask = (String)codec.encode("mdbpassword");
      spec.setPassword(mask);
      qResourceAdapter.setConnectorClassName(INVM_CONNECTOR_FACTORY);
      CountDownLatch latch = new CountDownLatch(1);
      DummyMessageEndpoint endpoint = new DummyMessageEndpoint(latch);
      DummyMessageEndpointFactory endpointFactory = new DummyMessageEndpointFactory(endpoint, false);
View Full Code Here

      config = parser.parseMainConfig(new ByteArrayInputStream(configStr.getBytes("UTF-8")));
     
      assertEquals("helloworld", config.getClusterPassword());

      //if we add mask, it should be able to decode correctly
      DefaultSensitiveStringCodec codec = new DefaultSensitiveStringCodec();
      String mask = (String)codec.encode("helloworld");
     
      String maskPasswordPart = "<mask-password>true</mask-password>";
      clusterPasswordPart = "<cluster-password>" + mask + "</cluster-password>";
     
      configStr = firstPart + clusterPasswordPart + maskPasswordPart + lastPart;
     
      config = parser.parseMainConfig(new ByteArrayInputStream(configStr.getBytes("UTF-8")));
     
      assertEquals("helloworld", config.getClusterPassword());
     
      //if we change key, it should be able to decode correctly
      codec = new DefaultSensitiveStringCodec();
      Map<String, String> prop = new HashMap<String, String>();
      prop.put("key", "newkey");
      codec.init(prop);
     
      mask = (String)codec.encode("newpassword");
     
      clusterPasswordPart = "<cluster-password>" + mask + "</cluster-password>";
     
      String codecPart = "<password-codec>" + "org.hornetq.utils.DefaultSensitiveStringCodec" +
                         ";key=newkey</password-codec>";
View Full Code Here

      Connection connSource = null;

      Connection connTarget = null;
     
      DefaultSensitiveStringCodec codec = new DefaultSensitiveStringCodec();
      String mask = (String)codec.encode("guest");

      try
      {
         final int NUM_MESSAGES = 10;
View Full Code Here

      Connection connSource = null;

      Connection connTarget = null;
     
      DefaultSensitiveStringCodec codec = new DefaultSensitiveStringCodec();
      Map<String, String> prop = new HashMap<String, String>();
      prop.put("key", "bridgekey");
      codec.init(prop);
     
      String mask = (String)codec.encode("guest");

      try
      {
         final int NUM_MESSAGES = 10;

         bridge = new JMSBridgeImpl(cff0,
                                    cff1,
                                    sourceQueueFactory,
                                    targetQueueFactory,
                                    "guest",
                                    mask,
                                    "guest",
                                    mask,
                                    null,
                                    5000,
                                    10,
                                    QualityOfServiceMode.AT_MOST_ONCE,
                                    1,
                                    -1,
                                    null,
                                    null,
                                    false);
         bridge.setTransactionManager(newTransactionManager());
        
         bridge.setUseMaskedPassword(true);
         bridge.setPasswordCodec(codec.getClass().getName() + ";key=bridgekey");

         bridge.start();

         connSource = cf0.createConnection();
View Full Code Here

   private void initPasswords() throws HornetQException
   {
      if (useMaskedPassword)
      {
         SensitiveDataCodec<String> codecInstance = new DefaultSensitiveStringCodec();

         if (passwordCodec != null)
         {
            codecInstance = PasswordMaskingUtil.getCodec(passwordCodec);
         }

         try
         {
            if (this.sourcePassword != null)
            {
               sourcePassword = codecInstance.decode(sourcePassword);
            }

            if (this.targetPassword != null)
            {
               targetPassword = codecInstance.decode(targetPassword);
            }
         }
         catch (Exception e)
         {
            throw HornetQJMSServerBundle.BUNDLE.errorDecodingPassword(e);
View Full Code Here

TOP

Related Classes of org.hornetq.utils.DefaultSensitiveStringCodec

Copyright © 2018 www.massapicom. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.