Bug 1325323 - [Docs] [Java SDK] Configuring SSL example for Java-sdk is incorrect
Summary: [Docs] [Java SDK] Configuring SSL example for Java-sdk is incorrect
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat Enterprise Virtualization Manager
Classification: Red Hat
Component: Documentation
Version: 3.5.7
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: ovirt-3.6.7
: ---
Assignee: Andrew Dahms
QA Contact: Lucy Bopf
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-04-08 12:49 UTC by Roman Hodain
Modified: 2019-11-14 07:49 UTC (History)
8 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-05-30 22:57:42 UTC
oVirt Team: Docs
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Roman Hodain 2016-04-08 12:49:59 UTC
Description of problem:
The documentation 

     https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Virtualization/3.5/html/Technical_Guide/Working_with_SSL_Secure_Socket_Layer.html

Says that the following should be used in order to pass the trust store to the Api:

     Api api = new Api(url, user, password, "/path/server.truststore");

There is no constructor like this for Api. The only possible way to do this it to use the following constructor:

public Api(String url, String username, String password, String sessionid, Integer port, Integer requestTimeout, Integer sessionTimeout, Boolean persistentAuth, String keyStorePath, String keyStorePassword, Boolean filter, Boolean debug) throws ClientProtocolException, ServerException, UnsecuredConnectionAttemptError, IOException

url - oVirt api url
username - oVirt api username
password - oVirt api password
sessionid - oVirt api sessionid to authenticate the user with (used as SSO solution instead of username+password)
port - oVirt api portrequestTimeout - request timeout (preserved for future use)
sessionTimeout - authentication session inactivity timeout in minutes (if persistentAuth is enabled)
persistentAuth - disable persistent authentication (will be used auth. per request)
keyStorePath - path to CA certificate 
KeyStorekeyStorePassword - password for the CA certificate KeyStorefilter - enables filtering based on user's permissions
debug - enables debug mode

Version-Release number of selected component (if applicable):
    Technical_Guide for 3.5 The way of doing this is different in 3.6.

Comment 1 Andrew Dahms 2016-04-26 13:02:28 UTC
Taking this to address initially in the RHEV 3.6 documentation.

Comment 5 Andrew Dahms 2016-05-20 01:58:38 UTC
It has been over one week since the last comment on this bug, and because I have tested the changes, I am placing this bug on QA.

Assigning Lucy as the QA contact.

Lucy - would you be able to take a look at the changes for this bug, as outlined in the above comments?

Comment 6 Lucy Bopf 2016-05-23 03:53:52 UTC
Thanks, Andrew. I've reviewed the changes for both 3.5 and 3.6, and everything looks good to me.

Moving to VERIFIED.


Note You need to log in before you can comment on or make changes to this bug.