Age | Commit message (Collapse) | Author | Files | Lines |
|
'validation-after-inactivity' for ConnectionPool
|
|
Before, it was only supported in case of SSL client authentication
|
|
|
|
|
|
|
|
'idle-connection-evictor' threads
|
|
configuration values
|
|
|
|
|
|
|
|
|
|
|
|
IMPORTEND: Is not finished because that contains a braking change, like
javax.servlet.* --> jakarta.servket.*
as one example and we miss some third-party libs that use the new API.
# Conflicts:
# eaaf_core_api/checks/spotbugs-exclude.xml
# eaaf_core_api/pom.xml
# eaaf_core_utils/checks/spotbugs-exclude.xml
# pom.xml
|
|
The check can be disabled by using the configuration property: modules.sl20.security.truststore.need.valid.certificate
|
|
initialization
|
|
|
|
|
|
|
|
serializable
|
|
|
|
serialization for storage
|
|
|
|
|
|
|
|
The keystore type 'inline' can be used to build a keystore by using
PEM encoded certificate and key files.
Example: pkcs12:keystore?private=certs/key.pem&cert=certs/certificate.pem
|
|
|
|
|
|
|
|
wrote log messages on level 'debug' if no message property was found
|
|
pendingRequestId's
|
|
|
|
|
|
|
|
|
|
INFO:
SSL Client-Authentication with keys from HSM-Facade only works with
BCJSSE Provider >= 1.70 and SystemD Parameter: -Dorg.bouncycastle.jsse.client.acceptRenegotiation=true
if HTTP Server requires re-negotiation.
Hint: do not enable SSL Debugging in BCJSSE Probider, because it throws
a NullPointerException with HSM-Facade keys!!!!
|
|
|
|
factory
|
|
|
|
|
|
'AuthenticatedEncryptionPendingRequestIdGenerationStrategy' that allows generation of already expired tokens
|
|
|
|
|
|
does not responde
|
|
|
|
deadline, see https://grpc.io/blog/deadlines/
|
|
|
|
|
|
|
|
Use custom SSLContext builder to generate BouncyCastle specific TrustManager...
See merge request egiz/eaaf_components!23
|
|
|