Skip to content

Latest commit

 

History

History
69 lines (49 loc) · 2.54 KB

README.md

File metadata and controls

69 lines (49 loc) · 2.54 KB

Jetty-couchdb

This jetty extension provides:

  • A CouchDB based AppProvider
  • Single-sign-on authenticator between jetty and CouchDB
  • Jetty login module authenticating against CouchDB

See camelback for simple example using both jetty-couchdb and jetty-hazelcast.

AppProvider

org.signaut.jetty.deploy.providers.couchdb.CouchDbAppProvider)

This enables you to deploy apps stored in a CouchDB database. Basically you provide it an URL to a CouchDB database and a filter function and all matching documents with an attached war-file and a context path will be deployed. Note that this is a very simple way of deploying the same webapp to multiple jetty instances. (See jetty-hazelcast if you need clustering of web-session data as well). Note that apps are redeployed on document changes automatically, thanks to the excellent change notification API in CouchDB.

One of the nice features of this AppProvider is that is supports replacement of the underlying connector's thread-pool. While this in itself does not sound exciting, the consequence of this is that most cases of perm-gen leaks are eliminated by this feature. This is because most perm-gen leaks are caused by frameworks putting all sorts of things in thread-local variables without cleaning up after themselves. Normally this is not a problem since these variables will die along with the thread. However, some of the threads in a thread-pool will never terminate, and so the thread-local variables will live on as long as the pool. By replacing the pool and stopping the old one, we kill off any lingering thread-local variables.

Single-Sign-On

org.signaut.jetty.server.security.authentication.CouchDbSSOAuthenticator

Single-sign-on between CouchDB and Jetty based on the AuthSession cookie set by CouchDB's HTTP authentication. In short this allows you to do a request.getUserPrincipal() in your servlet and get what you would expect. This also means that you can specify security constraints in your web.xml using CouchDB roles.

It also supports normal basic HTTP authentication, where the user is authenticated against CouchDB.

A use case for this is to allow you to access a Java webapp from a CouchApp for instance.

Login Service

org.signaut.jetty.server.security.CouchDbLoginService

Jetty login service, which authenticates against CouchDB. Can be used if one wishes to use normal Java web security like form login.