- [TYNAMO-155] - Authorization cache is not cleared at logout
- [TYNAMO-143] - Create a marker annotation for SecurityConfiguration
- [TYNAMO-154] - add FirstExceptionStrategy as the default AuthenticationStrategy for projects with multiple realms
- [TYNAMO-159] - Add a NotFoundFilter
- [TYNAMO-160] - Handle no-context, no ending slash with the same wildcard rule
- [TYNAMO-161] - add a PatternMatcher field to SecurityFilterChain
- [TYNAMO-163] - Rename PageService to an internal LoginContextService
- [TYNAMO-150] - Implement the CasFilter (new in Shiro 1.2) as a tapestry-security filter
- [TYNAMO-162] - provide a configuration to block access to assets (like the AssetProtectionDispatcher)
Read more at tapestry-security guide and enjoy,
Would it not be great if you could write something like:
And be assured that EntityManager.merge() would fail even if somebody manually replaced the entity id somewhere along the way? Wouldn't it be equally cool if you could just do EntityManager.find(Account.class, null) to fetch the right Account for the currently logged-in user? If securing data instances have been causing gray hair for you before and you happen to be using JPA, you should definitely checkout Tynamo's latest module, tapestry-security-jpa.
On a related note, if you happen to live in SF Bay Area, I'll be talking about ERBAC, federated accounts, tapestry-security and using Shiro in modern Java web applications in an upcoming Shiro JUG meet-up this Wednesday, graciously sponsored by Stormpath, Inc.!
- [TYNAMO-144] - This patch broke fallbackURL functionality
- [TYNAMO-145] - TYNAMO-133 breaks SecurityUtils.logout() from within Tapestry onEvent methods
- [TYNAMO-124] - Context path duplicated when redirecting to saved request
PS: We'd like to thank Omar Carvajal for all the work he has put into this.
"Today I found myself thinking again of what I see as two distinct cultures in the development world: Hackers and Enterprise Developers. This really isn’t any kind of a rant just an observation that I’ve been thinking over lately.
Hackers are really bleeding edge. They have no problem using the commandline, using multiple languages, or contributing back to open source. They’ll find and fix bugs in the opensource software they use and issue pull requests frequently. They’ll always be willing to use new tools that help them produce better software when there might not even be any good IDE support. Finally, they’re always constantly investigating new technologies and techniques to give them a competitive edge in the world.
Now when I say hacker I don’t mean someone who just hacks lots of random shit together and calls it a day (that kind of developer isn’t good for anyone). Just someone who isn’t afraid to shake up the status quo, isn’t afraid to be a bit different and go against the grain. They’re the polar opposite of enterprise developers.
Enterprise Developers on the other hand are fairly conservative with their software development methodology. I’m not saying that a lack of standards is a good thing, but enterprise developers want standards for doing everything and they want it standardized across the company. If there isn’t IDE support for a tool they’ll refuse to use it. Want to use mongodb, riak, etc? Not unless there’s a fancy GUI client for interacting with it. If they find a bug they’ll back away from the framework they’re using and simply declare that the company shouldn’t use the framework until the bug is fixed externally. I find this group prefers to play it safe and work on solidifying their existing practices rather than explore new ideas.
Now don’t get me wrong, this isn’t another rant on IDEs or developers who don’t use the command line. But give me a couple days in any organization and I can quickly point out who the Hackers and Enterprise Developers are."
It's also noteworthy to point out that at least from my experience, the average enterprise developer typically makes much more than the average hacker. So who's really the smart one, eh? Read the whole post at: http://www.javacodegeeks.com/2012/03/tale-of-two-cultures-hackers-and.html
- [TYNAMO-124] - Context path duplicated when redirecting to saved request
- [TYNAMO-133] - ShiroHttpServletRequest isn't used if there's no chain associated with the request
- [TYNAMO-121] - Ability to plug into ExceptionPage for the same exception type
- [TYNAMO-127] - Make SubjectFactory and RememberMeManager their own services for better flexiblity
- [TYNAMO-128] - Make Authenticator its own service to allow registering authenticationlisteners
Check out the tapestry-security guide for more information and enjoy!
Oh and btw, we had also previously released but hadn't announced a bug-fix release 0.1.2 for the exceptionpage module, that tapestry-security uses for exception handling. The lone issue was:
- [TYNAMO-126] - Exceptionpage doesn't work for page contributions
Read more about the exceptionpage module from tapestry-exceptionpage guide
Hey XXX, somehow our conversation from the other day got stuck in my head. First, I have to say that it looks to me you are putting too much emphasis on technologies. You should let your engineers and the business needs guide your technological choices, not the other way around. It's going to be expensive to rewrite your application later if you need to, but so what, it's going to be much more expensive to change the business if your current one doesn't work, and yet you are still doing it. Unless you want to make it your core competency to implement the solutions using the chosen technologies, you have to trust and rely on your engineers to make the right choices for the given problems. What you primarily need from your engineers is motivation and experience with one of the reasonably good technological choices and leave it at that. It's difficult to predict the future so whether you pick RoR, Django, Play or some other hot technology today, you don't know if it'll be a success anymore a few years down the road.
On the popularity of Tapestry, you asked "so how come nobody uses it?" By many measures, Java is the most popular language in the world but very few think of it as cool or hype it. The hyped Java is today pronounced "Android" or "Scala". Tapestry is a good example of what's left after the hype has deflated. Ruby on Rails is a fairly successful and popular framework, yet it was much, much more popular six years ago than it is today. In the world of Java, Tapestry, Play or Lift are still newcomers compared to such behemoths as Struts (one of the original web frameworks in Java). Java is just popular and old enough that the space is fragmented. The good news is that beyond "just" the web layer, you have libraries implemented in Java for almost any imaginable purpose you can simply take into use. Tapestry, or Java are not always good choices for web applications, because the needs for most of the websites are simple, so a simpler language and a simpler framework will not only suffice, but work better because more people are more productive with it and there may be less room for grave mistakes. For lots of applications you simply don't need all of the power Java or the JVM has to offer, but when you do, you really need it. The classic example for this is a highly threaded back-end application - if you have a need for it, a typical RoR or Python-based architecture implements the web layer in the given language, but the back-end architecture with a different language. Few other languages and platforms besides Java are comprehensive enough to implement everything from web to the database with the the same language (although certain Microsoft language comes to mind as an alternative). With RoR, Python or PHP, you pair it with MongoDB (implemented in C++) or perhaps MySQL (in C++ as well). A Java web framework, you pair with Cassandra, Hadoop, hsqldb or any of the other strong alternatives based on need, all implemented in Java. It makes it all more complex, which is also reflected in the pay grade between a typical Java developer and a php developer, or any of the other languages in between. What makes this even more interesting to you, is that as a business owner you have to consider the costs so the best solution for you might be finding the most inexpensive developers that are highly productive with their language of choice.
*** UPDATE ***: A bit after my email, my friend sent me a link to this great blog post by the Tumblr guys, to which I just had to reply. Again, I've re-posted the unedited follow-up below. Keep in mind that I'm purposefully making some simplifications to make my point clear (after all, I'm talking to a business dude). Anybody who's battled with scalability issues knows that while theoretical numbers might justify more modest hardware, it's all about building for the worst-case scenario with plenty of reserve capacity.
Nicely proves my point, no? :) Anyway, it's a surprisingly honest read about their architecture, and shows how most of the time it's all organically grown. They are getting reasonable results with their infrastructure, but still, paying a heavy penalty for the suboptimally performing web layer - 500 web servers versus 200 database servers, where most of the latter are used for stand-by high availability. In a typical scenario, the bottleneck should almost always be the database layer, not the web layer. Sharding is a way to get scalability out of MySQL, but it's far, far away from the highest performing SQL databases. Now, imagine if you could serve the whole database layer with 20 servers instead of 200.
For an all Java implementation with an embedded database, it's not uncommon to require 90th percentile response time within 10ms with at least 1 million page views a day from a single server. Performance matters (http://docs.codehaus.org/pages/viewpage.action?pageId=190316696).
At long last, we've gotten off our collective lazy ass and worked harder than ever for free to bring you tapesty-federatedaccounts 0.1.0, with twitter as the new authentication provider. Some jokesters might question why it took so long since we are just using the super-great twitter4j library, which is almost as good as RestFB that we use for Facebook integration. We are first to admit that twitter4j takes all the pain away from Oauth 1.0a's obnoxious request signing business, so we decided to spend our time refactoring the code to support the Oauth 1.0a/Oauth 2.0 call flows with the same base classes, as well as modularizing the whole implementation because one size just doesn't fit all. Now of course, you my dear don't even have to know any of the these details but just check out tynamo-federatedaccounts guide and open the gates for all of the Facebook and Twitter users to flock to your website
- [TYNAMO-92] - Twitter realm for federatedaccounts
[TYNAMO-120] - FallbackURL is no longer honored
You should upgrade.
Tapestry-security, the comprehensive security package for Tapestry just got a bit more comprehensive with the new 0.4.1 release! 0.4.x is tested with and meant both for T5.2 and T5.3.
We picked up the brand new Apache Shiro 1.2.0 release of which development snapshots we've been running against for months now. We also decided it's time to start eating our own dog food, so we delegated tapestry-security's exception handling to another module from tynamo.org, tapestry-exceptionpage, in order to gracefully handle security responses as redirects, ajax or not. Read more about what tapestry-security can do for you from tapestry-security guide. Special thanks to Lenny Primak for relentlessly bugging us until we just had to get the 0.4.1 out the door
- [TYNAMO-102] - Specify id for RequestExceptionHandler advice for preventing unintentional override
- [TYNAMO-103] - @Security, tapestry.secure-enabled, MetaDataConstants.SECURE_PAGE not honored by Tapestry security
- [TYNAMO-105] - Warning is issued in the log file on every startup
- [TYNAMO-87] - Redirects should honor localization
- [TYNAMO-106] - Login screen background file (login-bg.png) is too large for the web - smaller file attached
- [TYNAMO-109] - Allow Unauthorized and Login page to be a single page
- [TYNAMO-110] - redirect to login page for pages secured with @RequiresXXX annotations
- [TYNAMO-113] - Test for ajax in the AccessControlFilter.issueRedirect and issue a client-side "soft" redirect if so
- [TYNAMO-117] - Add symbol for disabling redirect to saved request
- [TYNAMO-118] - Store savedrequest into a cookie instead of session
- [TYNAMO-119] - In SecurityFilterChainFactoryImpl, use componentClassResolver to resolve pageclasses to urls
- [TYNAMO-111] - Add support for SslFilter & PortFilter
Winter is still in full swing, but the hibernation period for Tynamo is clearly over. I don't want to steal any of Alex' thunder from his JDO release, but on the heels of it we quickly shipped another release from our module warehouse. Tapestry-exceptionpage 0.1.1 is particularly useful, so handy in fact that we even started using it ourselves Tapestry-exceptionpage forms the foundation for handling exceptions in our upcoming tapestry-security 0.4.1 release. Read more from tapestry-exceptionpage guide.
- [TYNAMO-97] - tynamo-exceptionpage doesn't handle operationexceptions
This module has been a long time in the making - the initial commit of the basic functionality was added about 6 months ago when I had just finished working on a JDO based app running on Google App Engine. The module was inspired by the tapestry-jpa module at Tynamo.
JDO as a standard is a curious beast. It was the first attempt at building solid ORM functionality for the Java platform, there were a bunch of solid implementations out there (Apache JDO, Kodo, etc); however, it somehow never managed to catch fire like Hibernate. For a while, at least for me, it felt like the standard was on its way out, giving way to JPA; yet, it keeps coming back: Google App Engine JDO support, MongoDB JDO API through DataNucleus, etc.