Correct.

2012/12/8 Max Spring <m2spr...@springdot.org>

> I'm merging the activiti-explorer branch to master.
> These two artifactItems should not actually be in the POM any more, right?
> https://github.com/jenkinsci/**jenkow-plugin/blob/activiti-**
> explorer/jenkow-plugin/pom.**xml#L206<https://github.com/jenkinsci/jenkow-plugin/blob/activiti-explorer/jenkow-plugin/pom.xml#L206>
> Thanks!
> -Max
>
>
>
> On 12/07/2012 07:02 PM, Kohsuke Kawaguchi wrote:
>
>>
>> As we discussed in IRC, I moved the activiti explorer part to a separate
>> plugin and the activiti-explorer branch in the jenkow-plugin repository is
>> now ready to be merged to the trunk.
>>
>> The merge is virtually conflict free, so I'll let you pick the timing to
>> merge this back into the trunk.
>>
>> On 11/28/2012 12:01 PM, Kohsuke Kawaguchi wrote:
>>
>>>
>>> This is mainly to Max,
>>>
>>> Over the Thanksgiving break, I hacked more on the Jenkow plugin (in the
>>> activiti-explorer branch.)
>>>
>>> I successfully embedded Activiti Explorer (AE) inside the plugin. You
>>> load the plugin, you hit 
>>> http://localhost:8080/**activiti-explorer/<http://localhost:8080/activiti-explorer/>and
>>> you'll see AE embedded within.
>>>
>>> I've also created database-plugin [1,2] that defines a common
>>> abstraction for connecting database (more about this in a separate
>>> post.) I've used that in this branch to let the administrator configure
>>> the backend database for Activiti.
>>>
>>> Both the embedded AE and the activiti engine that the Jenkow plugin uses
>>> honor this configuration.
>>>
>>> I've also took a stub at integrating authentication between Jenkins and
>>> AE --- if you run AE stand-alone, you'll see that it asks you to login
>>> to the app. But in the embedded code, I alter the way AE wires the
>>> components to inject our own code that relies on Jenkins to do the
>>> authentication. So in effect it creates a single sign-on.
>>>
>>> The good thing about AE is that it has a contract interface for the
>>> identity/authentication service separated from its default
>>> implementation, and this is how I was able to swap in Jenkins auth as
>>> the backend.
>>>
>>> However, the bad thing about AE is that the assumption that AE makes
>>> about the identity/authentication service is so strict that even if I go
>>> all the way of implementing this contract (with Jenkins SecurityRealm as
>>> the real backend), we won't be able to avoid some clunkiness --- for
>>> example, it has methods like changePassword.
>>>
>>> So another conceivable approach is to do federation --- we have
>>> administrators define uses and groups in AE as it is today, then we let
>>> Jenkins users to be linked with AE users, so that once you login to
>>> Jenkins, you automatically login as the corresponding linked user in AE.
>>>
>>>
>>> Also, now that I've done it, I think it might make more sense for the
>>> embedded AE to be in a separate plugin from Jenkow. Or maybe not, given
>>> that presumably it doesn't prevent other AE instances to run elsewhere
>>> that connects to the same database.
>>>
>>>
>>>
>>> This act of embedding a real web application inside another web
>>> application was an interesting work that I really had fun with.
>>>
>>> Your thoughts would be appreciated.
>>>
>>>
>>>
>>> [1] 
>>> https://wiki.jenkins-ci.org/**display/JENKINS/Database+**Plugin<https://wiki.jenkins-ci.org/display/JENKINS/Database+Plugin>
>>> [2] 
>>> https://github.com/jenkinsci/**database-plugin<https://github.com/jenkinsci/database-plugin>
>>>
>>>
>>
>>
>


-- 
Kohsuke Kawaguchi

Reply via email to