- 27 Nov, 2013 1 commit
-
-
Dave Syer authored
-
- 26 Nov, 2013 8 commits
-
-
Dave Syer authored
-
Dave Syer authored
-
Dave Syer authored
-
Dave Syer authored
-
Dave Syer authored
-
Phillip Webb authored
-
Phillip Webb authored
-
Phillip Webb authored
-
- 25 Nov, 2013 11 commits
-
-
Dave Syer authored
-
Dave Syer authored
-
Dave Syer authored
-
Dave Syer authored
-
Dave Syer authored
-
Dave Syer authored
-
Dave Syer authored
* Underscores are allowed as nested property field separators * System and env vars are only considered for binding if they look like they apply to a given bean when ignoreUnknownFields is false
-
Christian Dupuis authored
In case Spring Security is missing from the class path, shell auto configuration will now fall back gracefully to simple authentication and emit warning to the console. fixes #114
-
Christian Dupuis authored
fixes #133
-
Christian Dupuis authored
fixed typos in Exception messages
-
Dave Syer authored
@ConfigurationProperties(ignoreUnkownFields=false,ignoreNestedFields=true) is now a useful option for binding to "top-level" command line options (without a prefix). In that case we don't try to bind to `server.*` and other common prefixed property values (at the cost of not being able to bind to nested beans).
-
- 24 Nov, 2013 2 commits
- 23 Nov, 2013 1 commit
-
-
Dave Syer authored
This leverages existing capabilities of teh JDK and the OS to grab a port at random and not have it stolen by another process. It's very hard to avoid that race condition in pure Java code, so why bother? User can set port<0 to disable autoStart of connectors (e.g. to start a web application context but not have it listen on any port). In that case the actual socket port will be set to 0 (and therefore if it ever starts up the local port will be random).
-
- 22 Nov, 2013 11 commits
-
-
Dave Syer authored
-
Christian Dupuis authored
-
Christian Dupuis authored
Make shell username and password configuration properties consistent with general security properties Now simple authentication for the crsh shell can we configured using shell.auth.simple.user.name and shell.auth.simple.user.password. This is consistent with security.user.name and security.user.password. fixes #113
-
Christian Dupuis authored
-
Christian Dupuis authored
-
Christian Dupuis authored
-
Christian Dupuis authored
Previously a management endpoint was either GET or POST. That requirement seems limited.
-
Christian Dupuis authored
-
Christian Dupuis authored
If crsh auto configuration happens too early a AuthenticationManager contributed by SecurityAutoConfiguration will not be detected
-
Dave Syer authored
Also moved ServerProperties to autoconfigure project.
-
Dave Syer authored
-
- 21 Nov, 2013 2 commits
-
-
Dave Syer authored
So spring-security + a web app is secure by default (you don't need the actuator).
-
Dave Syer authored
The AutoConfigurationReportLoggingInitializer wasn't working in non-GenericApplicationContext becasue teh BeanFatcory wasn't available for registering its listener during initialization. Instead of relying on that rather fragile state I decided to give any ApplicationContextInitializer that was itself an ApplicationListener an explicit callback with a ContextRefreshedEvent, and move that interface up a level in the logging initializer. Works much better.
-
- 20 Nov, 2013 4 commits
-
-
Christian Dupuis authored
Polish and rework default authentication method if a Spring Security AuthenticationManager is available In case a Spring Security AuthenticationManager is found in the app context the auto configuration will change default shell authentication method to auth against Spring Security. In addition shell access will get protected by the specific role configured in SecurityProperties.Management. Certainly this can be overridden by providing shell.auth and shell.auth.spring.roles.
-
Christian Dupuis authored
-
Christian Dupuis authored
-
Dave Syer authored
-