--
Ryan Hoegg
ISIS Networks
http://www.isisnetworks.net
Andrew Evers wrote:
Myself and another coder here are looking to implement some secureWell, I'm responsible for that particular refactoring, as far as I
xml-rpc clients and services, but it looks like the current code base
is very much in flux with the recent refactoring/addition of the
XmlRpcTransport stuff. My question to the list is should we take a
crack at implementing SecureXmlRpcTransport or does someone have
something in the works already?
know noone is working on the area you mention, so by all means have
a go.
I think there were a couple of posts with proposed changes to the
secure behaviour on this list about 2 weeks ago.
If you want to start work on a SecureXmlRpcTransport and post the
extra classes to the list, then I can review them and commit them
(unless there are major objections). Alternatively, create a ticket
in bugzilla and attach them to that:
http://nagoya.apache.org/bugzilla/enter_bug.cgi
We are assuming that the secure.SecureXmlRpcClient will be depreciated
by XmlRpcClient using a transport factory that looks at the URL
protocol to decide whether to do DefaultXmlRpcClient or
SecureXmlRpcTransport (or something else), are we off the mark?
Probably ;), in that I haven't really thought that far ahead. If you develop a secure.SecureXmlRpcTransport with constructors: + URL (obvious, but check for https://), + String (as URL but for convenience) and, + Hashtable/Properties (think client certs and the like).Then we can plug this into whatever generic mechanism we use for transport creation, and leave things open enough to allow programmers to instatiate a custom transport or extend the transport to develop their own. Andrew.