Return-Path: Delivered-To: apmail-openjpa-dev-archive@www.apache.org Received: (qmail 81048 invoked from network); 3 Aug 2009 17:09:40 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.3) by minotaur.apache.org with SMTP; 3 Aug 2009 17:09:40 -0000 Received: (qmail 51525 invoked by uid 500); 3 Aug 2009 17:09:45 -0000 Delivered-To: apmail-openjpa-dev-archive@openjpa.apache.org Received: (qmail 51472 invoked by uid 500); 3 Aug 2009 17:09:45 -0000 Mailing-List: contact dev-help@openjpa.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@openjpa.apache.org Delivered-To: mailing list dev@openjpa.apache.org Received: (qmail 51462 invoked by uid 99); 3 Aug 2009 17:09:45 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 03 Aug 2009 17:09:45 +0000 X-ASF-Spam-Status: No, hits=-2000.0 required=10.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.140] (HELO brutus.apache.org) (140.211.11.140) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 03 Aug 2009 17:09:35 +0000 Received: from brutus (localhost [127.0.0.1]) by brutus.apache.org (Postfix) with ESMTP id D5A55234C04C for ; Mon, 3 Aug 2009 10:09:14 -0700 (PDT) Message-ID: <1576339346.1249319354874.JavaMail.jira@brutus> Date: Mon, 3 Aug 2009 10:09:14 -0700 (PDT) From: "Michael Dick (JIRA)" To: dev@openjpa.apache.org Subject: [jira] Updated: (OPENJPA-1089) Provide for password encryption within persistence.xml In-Reply-To: <1506569694.1242399405521.JavaMail.jira@brutus> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 X-Virus-Checked: Checked by ClamAV on apache.org [ https://issues.apache.org/jira/browse/OPENJPA-1089?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Michael Dick updated OPENJPA-1089: ---------------------------------- Affects Version/s: (was: 2.0.0-M2) Fix Version/s: (was: 2.0.0) Assignee: Michael Dick (was: Donald Woods) Remaining Estimate: 0h Original Estimate: 0h I ran into a problem with the testcase: TestPersistenceProductDerivation:109 assertTrue(actual.containsAll(Arrays.asList(expectedPUs))); // fails assertTrue(actual.containsAll(expectedPUs)); // passes Otherwise the patch looks good, running the full regression bucket now. > Provide for password encryption within persistence.xml > ------------------------------------------------------ > > Key: OPENJPA-1089 > URL: https://issues.apache.org/jira/browse/OPENJPA-1089 > Project: OpenJPA > Issue Type: New Feature > Components: jpa > Affects Versions: 1.3.0 > Reporter: Kevin Sutter > Assignee: Michael Dick > Attachments: OPENJPA-1089-2.patch, OPENJPA-1089.PATCH > > Original Estimate: 0h > Remaining Estimate: 0h > > A recent discussion on our users forum [1] has surfaced (again) the need to encrypt the password fields in the persistence.xml. In the particular scenario outlined in the posting, this user wanted to encrypt the password sent into Apache DBCP via the url string. In my mind, that's a separate problem related to DBCP. > But, OpenJPA has openjpa.Connection*Password properties that could be encrypted. And, the new JPA 2 spec outlines a javax.persistence.jdbc.password property that would be nice to encrypt. > I'm opening this Issue as a Feature request, but it could also be considered a bug since a non-jndi environment is crippled from a security standpoint. > [1] http://n2.nabble.com/How-to-encrypt-DB-password-in-persistence.xml-td2868212.html -- This message is automatically generated by JIRA. - You can reply to this email to add a comment to the issue online.