text
stringlengths 0
2.2M
|
---|
ref.addMarker(Marker("@WebService", Marker::TYPE_CLASS, MarkerHandler::collectStr(2, "location", "namespc"),
|
MarkerHandler::collectBool(2, true, false)));
|
ref.addMarker(Marker("@WebServiceMethod", Marker::TYPE_METH, MarkerHandler::collectStr(1, "outName"),
|
MarkerHandler::collectBool(1, false)));
|
ref.addMarker(Marker("@JobFunction", Marker::TYPE_METH, MarkerHandler::collectStr(3, "cron", "name", "scope,singleton"),
|
MarkerHandler::collectBool(3, true, true, false)));
|
ref.addMarker(Marker("@Secure", Marker::TYPE_CLASS, MarkerHandler::collectStr(2, "role", "providerName")));
|
ref.addMarker(Marker("@Secure", Marker::TYPE_METH, MarkerHandler::collectStr(2, "role", "providerName")));
|
ref.addMarker(Marker("@SecurityProvider", Marker::TYPE_CLASS,
|
MarkerHandler::collectStr(7, "providerName", "url", "welcomefile", "usernamefld", "usernamefrom", "passwordfld", "passwordfrom"),
|
MarkerHandler::collectBool(7, true, true, false, true, true, true, true)));
|
ref.addMarker(Marker("@Template", Marker::TYPE_CLASS, MarkerHandler::collectStr(3, "path", "file", "scope,singleton"),
|
MarkerHandler::collectBool(3, true, true, false)));
|
ref.addMarker(Marker("@Dview", Marker::TYPE_CLASS, MarkerHandler::collectStr(2, "path", "scope,singleton"),
|
MarkerHandler::collectBool(2, true, false)));
|
ref.addMarker(Marker("@Controller", Marker::TYPE_CLASS, MarkerHandler::collectStr(2, "path", "scope,singleton"),
|
MarkerHandler::collectBool(2, true, false)));
|
ref.addMarker(Marker("@AjaxInterface", Marker::TYPE_CLASS, MarkerHandler::collectStr(1, "path")));
|
ref.addMarker(Marker("@Filter", Marker::TYPE_CLASS,
|
MarkerHandler::collectStr(3, "type,,in,out,handle", "path", "scope,singleton"),
|
MarkerHandler::collectBool(3, true, true, false)));
|
ref.addMarker(Marker("@WebSocketHandler", Marker::TYPE_CLASS, MarkerHandler::collectStr(2, "path", "scope,singleton"),
|
MarkerHandler::collectBool(2, true, false)));
|
ref.addMarker(Marker("@IgnoreSer", Marker::TYPE_PROP));
|
PropFileReader pread;
|
propMap srprps = pread.getProperties(respath+"/server.prop");
|
propMultiMap srprpsMulti = pread.getPropertiesMultiMap(respath+"/server.prop");
|
if(srprpsMulti.find("STATIC_PATH_RESP")!=srprpsMulti.end()) {
|
std::vector<std::string> paths = srprpsMulti["STATIC_PATH_RESP"];
|
for(int i=0;i<(int)paths.size();i++) {
|
if(paths.at(i).find("|")!=std::string::npos) {
|
std::vector<std::string> lst = StringUtil::splitAndReturn<std::vector<std::string> >(StringUtil::trimCopy(paths.at(i)), "|");
|
if(lst.size()<3) continue;
|
std::string pth = StringUtil::trimCopy(lst.at(0));
|
std::string ctyp = StringUtil::trimCopy(lst.at(1));
|
if(ctyp=="") {
|
ctyp = "text/plain";
|
}
|
std::string resp = StringUtil::trimCopy(lst.at(2));
|
if(pth!="" && resp!="") {
|
StaticResponseData& sr = ConfigurationData::getInstance()->staticResponsesMap[pth];
|
sr.r = resp;
|
sr.t = ctyp;
|
}
|
}
|
}
|
}
|
bool isLoggingEnabled = true;
|
if(StringUtil::toLowerCopy(srprps["LOGGING_ENABLED"])!="true") {
|
isLoggingEnabled = StringUtil::toLowerCopy(srprps["LOGGING_ENABLED"])=="true";
|
}
|
Logger logger = LoggerFactory::getLogger("ConfigurationHandler");
|
strVec all,afcd,appf,wspath,handoffVec;
|
std::string includeRef;
|
StringContext cntxt;
|
std::string libs,ilibs,isrcs,iobjs,ideps,ipdobjs;
|
std::vector<bool> stat;
|
strVec vecvp,pathvec;
|
std::map<std::string, std::string, std::less<> > ajintpthMap, tpes, dcps, compnts;
|
propMap srp;
|
SimpleXmlParser parser("Parser");
|
#ifdef INC_COMP
|
ComponentGen gen;
|
#endif
|
#ifdef HAVE_SSLINC
|
if(SSLHandler::getInstance()->getIsSSL())
|
{
|
propMap sslsec = pread.getProperties(respath+"/security.prop");
|
if(sslsec.size()>0)
|
{
|
ConfigurationData::getInstance()->securityProperties.cert_file = serverRootDirectory + sslsec["CERTFILE"];
|
ConfigurationData::getInstance()->securityProperties.key_file = serverRootDirectory + sslsec["KEYFILE"];
|
ConfigurationData::getInstance()->securityProperties.dh_file = serverRootDirectory + sslsec["DHFILE"];
|
ConfigurationData::getInstance()->securityProperties.ca_list = serverRootDirectory + sslsec["CA_LIST"];
|
ConfigurationData::getInstance()->securityProperties.rand_file = serverRootDirectory + sslsec["RANDOM"];
|
ConfigurationData::getInstance()->securityProperties.sec_password = sslsec["PASSWORD"];
|
std::string tempcl = sslsec["CLIENT_SEC_LEVEL"];
|
ConfigurationData::getInstance()->securityProperties.srv_auth_prvd = sslsec["SRV_AUTH_PRVD"];
|
ConfigurationData::getInstance()->securityProperties.srv_auth_mode = sslsec["SRV_AUTH_MODE"];
|
ConfigurationData::getInstance()->securityProperties.srv_auth_file = serverRootDirectory + sslsec["SRV_AUTH_FILE"];
|
std::string alpnprotolist = sslsec["ALPN_PROTO_LIST"];
|
if(tempcl!="")
|
{
|
try
|
{
|
ConfigurationData::getInstance()->securityProperties.client_auth = CastUtil::toInt(tempcl);
|
}
|
catch(const std::exception& e)
|
{
|
logger << "Invalid client auth level defined" << std::endl;
|
ConfigurationData::getInstance()->securityProperties.client_auth = 0;
|
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.