Skip to content

Commit b92c699

Browse files
authored
Merge pull request #78 from adkumar3/future
Future
2 parents 082acd1 + c084b83 commit b92c699

File tree

4 files changed

+4
-4
lines changed

4 files changed

+4
-4
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ You do not need to download and build the source to use the SDK but if you want
6060
- `serverURL` config parameter will take precedence over `sendToProduction` and `sendToAkamai` config parameters. By default the `serverURL` configuration is commented out.
6161
- if `enablejdkcert` parameter is set to true, certificates will be read from the JKS file specified at keysDirectory location. The JKS file should be of the same name as specified in keyFilename.
6262
- To know how to convert p12 to JKS refer the JKS creation section of this document.
63-
- `cacerts` property is considered only if `enablejdkcert` is set to true. If `cacerts` is set to true, certificates will be read from the cacerts folder under the JDK.
63+
- `enableCacerts` property is considered only if `enablejdkcert` is set to true. If `enableCacerts` is set to true, certificates will be read from the cacerts folder under the JDK.
6464
- `allowRetry` config parameter will only work for HttpClient. Set `allowRetry` config parameter to "true" to enable retry mechanism and set merchant specific values for the retry.
6565
- Set integer values for config parameter `numberOfRetries` *and* `retryInterval`. Retry Interval is time delay for next retry in seconds.
6666
- Number of retry parameter should be set between 1 to 5. Any other value will throw an Error Message.

java/src/main/java/com/cybersource/ws/client/SecurityUtil.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -265,7 +265,7 @@ public static void readJdkCert(MerchantConfig merchantConfig, Logger logger) thr
265265
String pass=merchantConfig.getKeyPassword();
266266

267267
if (merchantConfig.isCacertEnabled()){
268-
path = System.getProperty("java.home") + "jre/lib/security/cacerts".replace('/', File.separatorChar);
268+
path = System.getProperty("java.home") + "/lib/security/cacerts".replace('/', File.separatorChar);
269269
loadJavaKeystore(path, merchantConfig,logger);
270270

271271
}

samples/nvp/cybs.properties

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ enableJdkCert=false
3434

3535
# if Cacert property is enabled then it means the certificates are kept under the cacert folder of JDK
3636
# And it will read from JDK cert. This property will be considered only if enableJDKcert is set to true.
37-
cacert=false
37+
enableCacert=false
3838
# Enter the password for cacert file. Default password for JDK cacert is changeit
3939
cacertPassword=
4040
# Mechanism to differentiate whether Payload is encrypted or not

samples/xml/cybs.properties

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ enableJdkCert=false
3434

3535
# if Cacert property is enabled then it means the certificates are kept under the cacert folder of JDK
3636
# And it will read from JDK cert. This property will be considered only if enableJDKcert is set to true.
37-
cacert=false
37+
enableCacert=false
3838
# Enter the password for cacert file. Default password for JDK cacert is changeit
3939
cacertPassword=
4040
# Mechanism to differentiate whether Payload is encrypted or not

0 commit comments

Comments
 (0)