What is Petals ESB ?

compared with
Key
This line was removed.
This word was removed. This word was added.
This line was added.

Changes (9)

View Page History
Petals ESB implements and extends the management requirement of the specification in the way that additional JMX operations have been added to the specification ones. This is possible by extending the Managed Beans (MBeans) and adding new ones.

{note:title=Note}
Must group all the MBeans in a specific package ({{org.ow2.petals.core.kernel.management}}) and list them.
{note}

h2. Monitoring

Petals ESB is not a simple distributed JBI container where all services can be accessed by all the consumers. To add some visiblity control containers can be classified by domains and subdomains.

!worddav281e19eb5ca3e0f6a8c903db7c9480c9.png|height=360,width=481!
!Domains.jpg!

* Petals ESB containers can only communicate with containers which belong to the same domain.

{note:title=Note}
The strategies are defined at the code level and there is no way to add user ones. This code has to be refactored to define strategy in a configuration file in order to give the user the possibility to ad dits own strategies.
{note}

{warning:Warning}
The current javadoc need to be updated to match the current strategies.
{warning}

h2. Router Module

In Petals ESB v2.x, the technologies used to transport messages are OW2-JORAM (open source JMS), OW2-Dream (open source Extensible Messaging Framework, used in TCP/IP mode) and 'InVM' (Memory transport in the same Java Virtual Machine).

h2. Security
Since Petals ESB v3.x, the transporter has been completely rewriten to take advantage of the Java New I/O features, to speed up inter-node communication.

h3. Transport level security

Since messages are exchanged between nodes, there is a need of securing the data transmission. This is actually possible by using a SSL channel in the OW2-Dream based message transporter.

h3. Authorization

It is possible to define authorizations at the service operation level.

A router module is in charge of the authorization; it checks that the user (which belongs to a group of users, and which is sending a message to the JBI service) is authorized. This is possible by using the JAAS technology (http://java.sun.com/javase/technologies/security/) in adition to the JBI message exchange security subject.

The default implementation of the JAAS authorization login module is based on a simple configuration file. This router module is configurable and developers can define their own authorization login module based on other users repositories (LDAP for example).

h2. Hot Deployment


Behind the scenes, the kernel calls the JMX management operations needed to process all these steps.

These hot deployment/undeployment features are similar to the web application deployment feature you can find when copying a WAR file into the webapps folder of an Apache Tomcat container.