@Override public String getPassword() { return passwordProvider == null ? null : passwordProvider.getPassword(); } };
public String getPassword() { return passwordProvider == null ? null : passwordProvider.getPassword(); }
public String getZkPwd() { return zkPwd.getPassword(); }
public String getPassword() { return sslPasswordProvider == null ? null : sslPasswordProvider.getPassword(); }
public String getTrustCertificateKeyStorePassword() { return trustCertificateKeyStorePasswordProvider == null ? null : trustCertificateKeyStorePasswordProvider.getPassword(); }
public String getClientCertificateKeyStorePassword() { return clientCertificateKeyStorePasswordProvider == null ? null : clientCertificateKeyStorePasswordProvider.getPassword(); }
public static void addConsumerPropertiesFromConfig( Properties properties, ObjectMapper configMapper, Map<String, Object> consumerProperties ) { // Extract passwords before SSL connection to Kafka for (Map.Entry<String, Object> entry : consumerProperties.entrySet()) { String propertyKey = entry.getKey(); if (propertyKey.equals(KafkaSupervisorIOConfig.TRUST_STORE_PASSWORD_KEY) || propertyKey.equals(KafkaSupervisorIOConfig.KEY_STORE_PASSWORD_KEY) || propertyKey.equals(KafkaSupervisorIOConfig.KEY_PASSWORD_KEY)) { PasswordProvider configPasswordProvider = configMapper.convertValue( entry.getValue(), PasswordProvider.class ); properties.setProperty(propertyKey, configPasswordProvider.getPassword()); } else { properties.setProperty(propertyKey, String.valueOf(entry.getValue())); } } }
@Override public AWSCredentials getCredentials() { final String key = config.getAccessKey().getPassword(); final String secret = config.getSecretKey().getPassword(); if (!Strings.isNullOrEmpty(key) && !Strings.isNullOrEmpty(secret)) { return new AWSCredentials() { @Override public String getAWSAccessKeyId() { return key; } @Override public String getAWSSecretKey() { return secret; } }; } throw new AmazonClientException("Unable to load AWS credentials from druid AWSCredentialsConfig"); }
trustStore.load( new FileInputStream(trustStorePath), trustStorePasswordProvider == null ? null : trustStorePasswordProvider.getPassword().toCharArray() ); TrustManagerFactory trustManagerFactory = TrustManagerFactory.getInstance(trustStoreAlgorithm == null keyStore.load( new FileInputStream(keyStorePath), keyStorePasswordProvider == null ? null : keyStorePasswordProvider.getPassword().toCharArray() ); keyManagerFactory.init( keyStore, keyManagerFactoryPasswordProvider == null ? null : keyManagerFactoryPasswordProvider.getPassword().toCharArray() ); keyManagers = createAliasedKeyManagers(keyManagerFactory.getKeyManagers(), certAlias);
@Override public HttpClient createEscalatedClient(HttpClient baseClient) { return new CredentialedHttpClient( new BasicCredentials(internalClientUsername, internalClientPassword.getPassword()), baseClient ); }
@Test public void testDeserializationFromJson() throws Exception { PasswordProvider pp = jsonMapper.readValue( "{\"type\": \"default\", \"password\": \"" + pwd + "\"}", PasswordProvider.class); Assert.assertEquals(pwd, pp.getPassword()); } }
@Test public void testDeserializationFromJsonString() throws Exception { PasswordProvider pp = jsonMapper.readValue("\"" + pwd + "\"", PasswordProvider.class); Assert.assertEquals(pwd, pp.getPassword()); }
BasicAuthUtils.ADMIN_NAME, new BasicAuthenticatorCredentialUpdate( dbConfig.getInitialAdminPassword().getPassword(), BasicAuthUtils.DEFAULT_KEY_ITERATIONS BasicAuthUtils.INTERNAL_USER_NAME, new BasicAuthenticatorCredentialUpdate( dbConfig.getInitialInternalClientPassword().getPassword(), BasicAuthUtils.DEFAULT_KEY_ITERATIONS
sslContextFactory.setKeyStorePassword(tlsServerConfig.getKeyStorePasswordProvider().getPassword()); sslContextFactory.setCertAlias(tlsServerConfig.getCertAlias()); sslContextFactory.setKeyManagerFactoryAlgorithm(tlsServerConfig.getKeyManagerFactoryAlgorithm() == null : tlsServerConfig.getKeyManagerFactoryAlgorithm()); sslContextFactory.setKeyManagerPassword(tlsServerConfig.getKeyManagerPasswordProvider() == null ? null : tlsServerConfig.getKeyManagerPasswordProvider().getPassword()); if (tlsServerConfig.getIncludeCipherSuites() != null) { sslContextFactory.setIncludeCipherSuites( tlsServerConfig.getTrustStorePasswordProvider() == null ? null : tlsServerConfig.getTrustStorePasswordProvider().getPassword() );
public String getTrustCertificateKeyStorePassword() { return trustCertificateKeyStorePasswordProvider == null ? null : trustCertificateKeyStorePasswordProvider.getPassword(); }
public String getPassword() { return passwordProvider == null ? null : passwordProvider.getPassword(); }
public String getZkPwd() { return zkPwd.getPassword(); }
public String getClientCertificateKeyStorePassword() { return clientCertificateKeyStorePasswordProvider == null ? null : clientCertificateKeyStorePasswordProvider.getPassword(); }
@Override public String getPassword() { return passwordProvider == null ? null : passwordProvider.getPassword(); } };
@Override public HttpClient createEscalatedClient(HttpClient baseClient) { return new CredentialedHttpClient( new BasicCredentials(internalClientUsername, internalClientPassword.getPassword()), baseClient ); }