Re: [Architecture] [EMM][APPM] App catalog for mobile devices

2016-04-19 Thread Kasun Dananjaya Delgolla
Hi Thilini, Thanks a lot. Currently get all apps end point return all the apps regardless of the platform type. Since we develop these catalog apps for various device types (such as Android/iOS), it's better if you can provide an API to directly get all Android apps + web apps (only android

Re: [Architecture] [EMM][APPM] App catalog for mobile devices

2016-04-19 Thread Thilini Shanika
Hi Kasun, Regarding the requested APIs from APPM. Oauth secured Rest APIs for following APIs are implemented and provided in WSO2 APP Manager 1.2.0 - Milestone 4. - Retrieving app metadata list for a particular user + device type (In this API, the list of mobile apps permitted to

Re: [Architecture] [DEV] WSO2 App Manager 1.2.0 Milestone 4 Released

2016-04-19 Thread Lahiru Cooray
[Adding architecture list] On Tue, Apr 19, 2016 at 10:14 PM, Lahiru Cooray wrote: > Hi All, > > WSO2 App Manager team pleased to announce > the WSO2 APP Manager 1.2.0 - Milestone 4 release. It contains following new > features, improvements and bug fixes. > > You can download

Re: [Architecture] [C5] Carbon Permission Model - Meeting Notes

2016-04-19 Thread Manuranga Perera
I think Azeez and Sameera are talking about 2 orthogonal problems: A) How to derive permission string Solution 01 - Via Annotation Solution 02 - From method's fully qualified name B) What is protected by the permission Model 1 - Block of code Model 2 - A resource (eg: Topic) On Tue, Apr 19,

Re: [Architecture] [C5] Artifact deployment coordination support for C5

2016-04-19 Thread Susankha Nirmala
According to the current architecture (C4 servers), as an example, If we want to add a new proxy service to ESB or update an existing proxy service and redeploy that, we can do that process without restarting the ESB server. AFAIK, if we use docker containers to run an ESB server, when we

Re: [Architecture] [C5] Carbon Permission Model - Meeting Notes

2016-04-19 Thread Afkham Azeez
Model 2 is basically saying every operation has to be represented as a resource and then use resource permissions. IMO, that is not a very good model because representing every operation as a resource is not natural. In addition, if you take Java Security, they have a model for securing code

Re: [Architecture] [C5] Artifact deployment coordination support for C5

2016-04-19 Thread Imesh Gunaratne
On Mon, Apr 18, 2016 at 9:50 AM, Susankha Nirmala wrote: > > On Sun, Apr 17, 2016 at 9:14 PM, Imesh Gunaratne wrote: >> >> >> On Fri, Apr 15, 2016 at 1:44 AM, Susankha Nirmala >> wrote: >> >>> Why we can't copy new artifacts (or updated