Skip to content
Permalink
Browse files
JUDDI-241 fixing the build and cleaning up some of the logging
  • Loading branch information
spyhunter99 committed Jan 31, 2015
1 parent acd11a0 commit 30b66ba4e0d1c1918c4e4d18663f6ba7c735f6d3
Showing 3 changed files with 7 additions and 3 deletions.
@@ -186,10 +186,14 @@ private static Set<String> diffNodeList(Set<String> oldnodes, Set<String> newNod

private static UDDIPublicationImpl pub = null;

public UDDIReplicationImpl() throws ConfigurationException {
public UDDIReplicationImpl() {
super();
try{
this.interval = AppConfig.getConfiguration().getLong(Property.JUDDI_REPLICATION_INTERVAL, 5000L);
this.startBuffer = AppConfig.getConfiguration().getLong(Property.JUDDI_REPLICATION_START_BUFFER, 5000L);
}catch(Exception ex){
logger.warn("Config error!",ex);
}
if (pub == null) {
pub = new UDDIPublicationImpl();
}
@@ -232,7 +232,7 @@ private synchronized void initDigSig(Configuration config) {

String enc = config.getString(Property.JUDDI_REJECT_ENTITIES_WITH_INVALID_SIG_PREFIX + "trustStorePassword", "");
if (config.getBoolean(Property.JUDDI_REJECT_ENTITIES_WITH_INVALID_SIG_PREFIX + "trustStorePassword[@isPasswordEncrypted]", false)) {
log.info("trust password is encrypted, decrypting...");
log.debug("trust password is encrypted, decrypting...");

String prov = config.getString(Property.JUDDI_REJECT_ENTITIES_WITH_INVALID_SIG_PREFIX + "trustStorePassword[@cryptoProvider]", "");
try {
@@ -177,7 +177,7 @@
<trustStoreType>JKS</trustStoreType>
<trustStorePassword
isPasswordEncrypted="true"
cryptoProvider="org.apache.juddi.v3.client.crypto.AES128Cryptor">8133dcd169105875a711e4b8b3e03bce</trustStorePassword>
cryptoProvider="org.apache.juddi.v3.client.cryptor.AES128Cryptor">8133dcd169105875a711e4b8b3e03bce</trustStorePassword>
<!-- Test -->

<checkTimestamps>true</checkTimestamps>

0 comments on commit 30b66ba

Please sign in to comment.