Categories
Java JCrypTool XML Security XML Security Tools

Apache XML Security 1.5.0 released

Apache Santuario 1.5.0 has been released. As the release notes point out, this release is not binary compatible with Santuario 1.4 any more.

There are some really good updates included, of which I like that Xalan/Xerces are not required dependencies any more the most. Under the covers, support for Java 1.4 was dropped, and generics are used where possible.

The binary incompatibility will require some changes and tests until this version will be available with the JCrypTool XML Security plug-in.

Categories
JCrypTool XML Encryption XML Security XML Security Tools XML Signature

Apache Santuario 1.4.6 available

A new maintenance release (1.4.6) of Apache Santuario, the Apache XML Security project, is available. The release notes are a little bit confusing. Looks like five bugs were fixed. The new version will be available in the next JCrypTool release.

Categories
XML Security Tools

XML Security Tools in danger

Yes, the XML Security Tools are really in danger. Those of you following the improvement of the project didn‘t see much lately. Not that I'm not interested in Eclipse or XML Security any more. But my free time is very limited and I desperately need a co-developer supporting me and the project.

As a first step, I have integrated the XML Security Tools into JCrypTool, and moved the adapted code into our Crypto GitHub repository. The XML Security Tools are located in the org.jcryptool.crypto.xml projects there. This code differs from the code at eclipse.org to match the JCrypTool requirements and extension points. Integration is by far not complete, and the code needs some love – feel free to contact me and join the JCrypTool project.

On Eclipse side, Dave Carver will be separating the XML Security Tools code into a separate Git repository. If no one steps up, the code will be archived there.

Categories
XML Encryption XML Security XML Security Tools XML Signature

XML Security tutorials now on GitHub

The German XML Security tutorials are now developed on GitHub. This does not affect the Eclipse XML Security Tools at all; the German tutorials will never be integrated there. The sources are only used to generate the tutorials available on my home page.

I'm working on some content updates. As soon as this will be finished I'll provide a new html version.

Categories
JCrypTool XML Security Tools

Integrating XML Security Tools into JCrypTool – chapter 2

More updates for the XML Security Tools in JCrypTool: download our latest pre release candidate 5 build and enjoy a working Digital Signature wizard! Most of the other stuff is working too, at least partly.

Feel free to report bugs or missing features, your feedback is always welcome.

Categories
JCrypTool XML Security Tools

Integrating XML Security Tools into JCrypTool – chapter 1

The first commands of the XML Security Tools are running in JCrypTool! Download our latest pre release candidate 5 build and have a first look. There is still a lot to do, only the XML Canonicalization is fully working so far. And most of the documentation is available. The integrated Apache XML Security library has been updated to version 1.4.5, the latest available. Even more modern than the official Eclipse XML Security Tools (since there is no IP-check at JCrypTool)…

Categories
Eclipse XML Security Tools

Developers wanted

As you might know, I‘m the component lead for the Eclipse XML Security Tools. Since my time is very limited, I haven‘t done much lately. Which is sad, since XML Security is an important topic in the ever growing web services world. And Eclipse is a great platform!
That‘s the reason why I‘m looking for new developers and testers or normal users providing feedback. There is no fast way becoming an Eclipse Committer, and it is not my intention to create one. But what‘s about getting started by filling out some bug reports, providing patches or other feedback?

Interested? Please do not hesitate contacting me or leaving a comment! Or fill out a bug report right away…

Categories
XML Security Tools

First steps with EGit

I have pushed my first bug fix with EGit today (bug 319343, which occurred when canceling an XML Security Tools wizard). Developing the fix was easy, using EGit not (OK, some rookie trouble):

The commit to my local repo worked fine. But the push failed. I dropped over bug 317389. Every push failed with the error message ,Can‘t connect to any URI‘. Fortunately, the described work around (editing the Git config manually) worked, and I was able to finally push my changes to the XML Security branch.

The next surprise was provided by the index web site. The timestamp for my push was far too old. As it turns out, this timestamp is based on the commit time to your local repository. Seems a little bit strange to me, I would expect the commit and push timestamp to be different. I imagine developers are using this timestamp to check what is already contained in their local repository (via pull) and what is new. And an old timestamp could be misleading, letting someone think this change is already available locally…

Categories
XML Security Tools

XML Security Tools updates

Quite a few things are happening around the XML Security Tools at the moment. For one thing, Eric Fu (Canada) is supporting me with bug reports and (much more important) their fixes. He is not an official committer yet, but I very much welcome his support! And a new developer requires me to set up a project/ release plan, so stay tuned to this blog…

The other thing is Git or EGit. Since all Web Tools Platform incubator projects decided to switch to Git, CVS usage will be discontinued. The migration was successful, Hudson is already up and running again. At the moment I‘m dangling my feet in Git/EGit.

Categories
XML Security Tools

XML Security Tools with Hudson builds and update site

XML Security Tools now builds on Hudson! One nice side effect is the update site support, which makes installations much easier for you. Simply add the URL to your update sites and you can receive every update easily.

With special thanks to Dave Carver for the setup work.