[JBoss JIRA] Created: (TEIID-706) Deployed vdbs should have a consistent unzipped location.
by Steven Hawkins (JIRA)
Deployed vdbs should have a consistent unzipped location.
---------------------------------------------------------
Key: TEIID-706
URL: https://jira.jboss.org/jira/browse/TEIID-706
Project: Teiid
Issue Type: Sub-task
Components: Embedded, Query Engine
Affects Versions: 6.2.0
Reporter: Steven Hawkins
Assignee: Steven Hawkins
Fix For: 6.2.0
Deployed vdbs, or vdb less configurationinfo.def files should have a consistent location for their exploded form.
Under <teiid home>/deploy there will be folders <vdb name>/<vdb version> - with lower cased names. On the initial scan for vdbs and def files we will use the corresponding def file to see if the <teiid home>/deploy/<vdb name>/<vdb version> already exists. If it does not we will create the exploded location, otherwise we'll use it rather than the archive file itself.
Any changes after deployment time ConfigurationInfo, roles, etc. will only be made to the exploded location. This will make it easy to document how to modify these files without constantly zipping and unzipping them.
Ideally this exploded location should also be used by the index file logic rather than using yet another temporary location.
--
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators: https://jira.jboss.org/jira/secure/Administrators.jspa
-
For more information on JIRA, see: http://www.atlassian.com/software/jira
15 years, 4 months
[JBoss JIRA] Created: (TEIID-702) Define/Provide ways to create and use encrypted passwords in Teiid
by Ramesh Reddy (JIRA)
Define/Provide ways to create and use encrypted passwords in Teiid
------------------------------------------------------------------
Key: TEIID-702
URL: https://jira.jboss.org/jira/browse/TEIID-702
Project: Teiid
Issue Type: Task
Components: Common
Reporter: Ramesh Reddy
Fix For: 6.2.0
Teiid runtime is capable of decrypting the encrypted passwords from the Teiid Designer (when the same key certs are used), however does not provide a mechanism to provide a utility to encrypt passwords itself. Often times the Designer might be using a different certificate or may be the user did not use the Designer at all. So, Teiid needs
1) Script to create a new certificate for password encryption
2) Script to encrypt a given password
3) Integration of the this cert with runtime, such that it can decrypt password(s) at runtime.
4) Documentation as how this can be done.
--
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators: https://jira.jboss.org/jira/secure/Administrators.jspa
-
For more information on JIRA, see: http://www.atlassian.com/software/jira
15 years, 4 months