From 4417db47c936fef9402cef4040a9382b327ce7c6 Mon Sep 17 00:00:00 2001 From: Niranjan-K Date: Wed, 3 Dec 2014 16:55:00 +0530 Subject: [PATCH] removed cipher-tool.properties and wso2.emm.jks from pack --- .../repository/conf/cipher-tool.properties | 36 ------------------ .../src/repository/conf/wso2emm.jks | Bin 3180 -> 0 bytes 2 files changed, 36 deletions(-) delete mode 100644 product/modules/distribution/src/repository/conf/cipher-tool.properties delete mode 100644 product/modules/distribution/src/repository/conf/wso2emm.jks diff --git a/product/modules/distribution/src/repository/conf/cipher-tool.properties b/product/modules/distribution/src/repository/conf/cipher-tool.properties deleted file mode 100644 index 2f0878a5499..00000000000 --- a/product/modules/distribution/src/repository/conf/cipher-tool.properties +++ /dev/null @@ -1,36 +0,0 @@ -# This properties file contains all the aliases to be used in carbon components. If any property need to be secured, you need to add alias name and the value. This value is described as follows. -# The value goes as, the file name//xpath to the property value to be secured,true if xml elements start with capital letter. Please check existing property values below. - -transports.https.keystorePass=mgt-transports.xml//transports/transport[@name='https']/parameter[@name='keystorePass'],false -Carbon.Security.KeyStore.Password=carbon.xml//Server/Security/KeyStore/KeyPassword,true -Carbon.Security.KeyStore.KeyPassword=carbon.xml//Server/Security/KeyStore/Password,true -Carbon.Security.TrustStore.Password=carbon.xml//Server/Security/TrustStore/Password,true -UserManager.AdminUser.Password=user-mgt.xml//UserManager/Realm/Configuration/AdminUser/Password,true -Datasources.WSO2_CARBON_DB.Configuration.Password=master-datasources.xml//datasources-configuration/datasources/datasource[name='WSO2_CARBON_DB']/definition[@type='RDBMS']/configuration/password,false -#Datasource.WSO2AM_DB.configuration.password=master-datasources.xml//datasources-configuration/datasources/datasource[name='WSO2AM_DB']/definition[@type='RDBMS']/configuration/password,false -#Datasource.WSO2AM_STATS_DB.configuration.password=master-datasources.xml//datasources-configuration/datasources/datasource[name='WSO2AM_STATS_DB']/definition[@type='RDBMS']/configuration/password,false -#UserStoreManager.Property.ConnectionPassword=user-mgt.xml//UserManager/Realm/UserStoreManager/Property[@name='ConnectionPassword'],true -#UserStoreManager.Property.password=user-mgt.xml//UserManager/Realm/UserStoreManager/Property[@name='password'],true -#AuthManager.Password=api-manager.xml//APIManager/AuthManager/Password,true -#APIGateway.Password=api-manager.xml//APIManager/APIGateway/Environments/Environment/Password,true -#APIUsageTracking.BAMPassword=api-manager.xml//APIManager/APIUsageTracking/BAMPassword,true -#APIUsageTracking.JDBCPassword=api-manager.xml//APIManager/APIUsageTracking/JDBCPassword,true -#APIKeyManager.Password=api-manager.xml//APIManager/APIKeyManager/Password,true -#Database.Password=api-manager.xml//APIManager/Database/Password,true -#Security.UserTrustedRPStore.Password=identity.xml//Server/Security/UserTrustedRPStore/Password -#Security.UserTrustedRPStore.KeyPassword=identity.xml//Server/Security/UserTrustedRPStore/KeyPassword -#Identity.System.StorePass=identity.xml//Server/Identity/System/StorePass -#MultifactorAuthentication.XMPPSettings.XMPPConfig.XMPPPassword=identity.xml//MultifactorAuthentication/XMPPSettings/XMPPConfig/XMPPPassword -#BPELEPR.Password=securedinvoke.epr//EndpointReference/Metadata/transport/authorization-password,false -Axis2.Https.Listener.TrustStore.Password=axis2.xml//axisconfig/transportReceiver[@name='https']/parameter[@name='truststore']/TrustStore/Password,false -Axis2.Https.Listener.KeyStore.Password=axis2.xml//axisconfig/transportReceiver[@name='https']/parameter[@name='keystore']/KeyStore/Password,false -Axis2.Https.Listener.KeyStore.KeyPassword=axis2.xml//axisconfig/transportReceiver[@name='https']/parameter[@name='keystore']/KeyStore/KeyPassword,false -Axis2.Https.Sender.TrustStore.Password=axis2.xml//axisconfig/transportSender[@name='https']/parameter[@name='truststore']/TrustStore/Password,false -Axis2.Https.Sender.KeyStore.Password=axis2.xml//axisconfig/transportSender[@name='https']/parameter[@name='keystore']/KeyStore/Password,false -Axis2.Https.Sender.KeyStore.KeyPassword=axis2.xml//axisconfig/transportSender[@name='https']/parameter[@name='keystore']/KeyStore/KeyPassword,false -Axis2.Mailto.Parameter.Password=axis2.xml//axisconfig/transportSender[@name='mailto']/parameter[@name='mail.smtp.password'],false -eventBrokerConfig.eventBroker.deliveryManager.remoteMessageBroker.password=event-broker.xml//eventBrokerConfig/eventBroker/deliveryManager/remoteMessageBroker/password,false - - - - diff --git a/product/modules/distribution/src/repository/conf/wso2emm.jks b/product/modules/distribution/src/repository/conf/wso2emm.jks deleted file mode 100644 index ab02772790f6bcd11ff0b2dfa0c7b1d6981c7cb4..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 3180 zcmeH|c{J4h9>-@h#u^PX7llD~p5F{+2p7#1*_W}Wv4?rG&t#23gh(s0R6|HeYLKO* zsHdh)gsf%X*TiG#PTl9++v(hM&pqefbN_n&_@3|id_I4C-rw){^?iSK=62>lAQ0q_ z1qQ)GJ-mEE!$BbMAq^wRYEG#ENPyG=f^c3HI2Z<2h6sbfTp(BigsJO9jyWC4JjQRi zuTJ%nr=@5!#BJSjmHTNGK1A2hh&OAlPdfCB!G;$Xl0>>LOCdTf21VhQ@W%(%0 z+{VLEF9S}Z0_1WHOi0Z%)sn2pDp110Hb#bMsf8*DHs-^eoClF?oG&0!p(|4EbnQy} zR&^#Xb)v{Im=(9fboBG@lr)ON4}a41Sd^o*9k`XG#(L8=@UHy>%_{DIqav%1+HY_{ zfQM%CWVys*Ui{M=+s$l2GvN^juhfan{OD#&v1kc-dU|2Oro&WIxVLvkC55meYVAMW z1baOCM&&kQw1BpJkzZ?mzwa@O+Elato-B`5w)Dm2XM(zit>!_seP_ro)n5)2&5V;Z zm6ms9=@5-kk)4GX2F{erT@Y~Rg%7#Z$-Rcls22#25TokIhdVz9m=6tC9_gT4wlpY% z&zd+mdn>7;Y66AIpQfl_X7OYnri8YIUg5CXeHjl=mYDOAJcJ7nA=Y{hpDr3X=-w-v zcO1nmkdJG5+{>QxGJkM(Bl>W|g7NGGdMIkWuAHeqeu_S+F}RkbIz%1nN5>2y{FK&pRXIQ z;bO{bHwKtoX_Zzj`s{f!^*G7)_9nY;w)0x2x|A2qTQMfD z`GEv5?HUvUhCsmHfB>9FIoTxnivR~{E)ZaW6#)3)PH&vM^gMz}PiAK_jIvO4XZ>$HPhSdN()iiOQ+G?Jj-gq?vPTQB@h1J#|c=;*;l4t== z9S>*&cpQMmxo|?wA3{L>=XRn1^6%~Vzqhj^9<-LWH3Aq{e-z63d{9OP2w#qNnunhioymsGS0vZu7T@_rcymAzK40 z0;10LeuI-%BDHC6<(1)kDW@$O5EarTHz*V@=e{RJw-lCP#P~FOX%R8Q8HwrG0fI;i z{=qq>mYq>&p@M;%%5JAbYjMzh2SG;&6bu3v$pRQ)7f1SDBpCb^#sxq*8^#K$;iOA{=&HxWasnIQ@38SaP_hB2SYg=!GooQy5k;G4W1|e5SSp`-abYnwBbSO!z zgYR$*dgi&3gN{QrrKUtQDgr9B5A^ZHSz>v+3Gz~sE^h^W8uSk|2plvtIB4Ymfd=>| zwf}E4{>LQ#JA&Am^Q~2n%zYPX>@(6N8cHjih0XInZNKT#H4qEl?a>|kFr9Aeil!4K zr$FWz9^5MycE?fbr|RWxxEcek)gI#HCb^E_rwNinPM3>AI+X3CM$G9q6(k*=A}QQx z_;Y35*`s_1my~+fgIGpB!}{orKDSNfrPA&hQvPI1!M^{LAaL?eZ}N>Gg#bs{$R!ea zI@f^os{!IPW##lDGpqEic#qS8(%%>1CzILZ1@h!q>|O!t40ge;Kxl zKlJQK^^3x;^Y`I|g-9IiVLw4A@I15Z@k3X!sli4>E@?*QPJv;1LLAr>%9BXRi&ff1 zJ8un3l&!Witjfq+<#F9{=BP+_W6zf5r9brtb0L@iH!{vrPW%knKr&lXdx;(6CWA(Tp= ztT1A&$-Gx8`l z6nD3(TO-@|9LJZ&zTQi#;x5h&TiK=r$QmpV^|w|;>pt5}zwg^C*d09F0f?Z}{u1hl z>W4&Nsw@v~yQ)RJGrDIRlxvktY#J2tM0v=h?>W(}X`j17$QjjFFXz6w$S0PItuQq? z!h^`PExYZ;?2k+K+X!){&)cT7A-lUu@PmtCEMl1~Gr;$V%+h?XA3RjcLs`PRse9Tq zzNT@_fnRrkYdEkd!VKR5JH60sYC2QWbC=-q_Bpz}XLN`6rbu&>ewxB_X+(?tsiExG zxtp;$$;@NL8y_y*pbZ4MKOILI1_?B$^9-zxt6Y-VJ*yK(=p(1NES{Pgjeh;vtIi8* zuT+z+XD>p=?&$PzFMWxCXSAH@l)X`|h1<{FXcnn^hVs6Ib$9Lq{IWL}>Xntxym_H0 z)ZLf+_J+m&T}?^#v(TA&43w!AV|>@_e9lh8`IthvPz+0>T0S#>fEuX^j7cF%CMs WTu-<|bB(W<&GwyPi{a7_c>E3HRNo~4