idx
int64
0
165k
question
stringlengths
73
5.81k
target
stringlengths
5
918
162,200
public void modifyAttributes ( String name , ModificationItem [ ] mods ) throws NamingException , WIMException { TimedDirContext ctx = iContextManager . getDirContext ( ) ; try { try { ctx . modifyAttributes ( new LdapName ( name ) , mods ) ; } catch ( NamingException e ) { if ( ! ContextManager . isConnectionException ( e ) ) { throw e ; } ctx = iContextManager . reCreateDirContext ( ctx , e . toString ( ) ) ; ctx . modifyAttributes ( new LdapName ( name ) , mods ) ; } } catch ( NameNotFoundException e ) { String msg = Tr . formatMessage ( tc , WIMMessageKey . NAMING_EXCEPTION , WIMMessageHelper . generateMsgParms ( e . toString ( true ) ) ) ; throw new EntityNotFoundException ( WIMMessageKey . NAMING_EXCEPTION , msg , e ) ; } catch ( NamingException e ) { throw e ; } finally { iContextManager . releaseDirContext ( ctx ) ; } }
Modify the given LDAP name according to the specified modification items .
162,201
public void modifyAttributes ( String dn , int mod_op , Attributes attrs ) throws NamingException , WIMException { TimedDirContext ctx = iContextManager . getDirContext ( ) ; iContextManager . checkWritePermission ( ctx ) ; try { try { ctx . modifyAttributes ( new LdapName ( dn ) , mod_op , attrs ) ; } catch ( NamingException e ) { if ( ! ContextManager . isConnectionException ( e ) ) { throw e ; } ctx = iContextManager . reCreateDirContext ( ctx , e . toString ( ) ) ; ctx . modifyAttributes ( new LdapName ( dn ) , mod_op , attrs ) ; } } catch ( NameNotFoundException e ) { String msg = Tr . formatMessage ( tc , WIMMessageKey . NAMING_EXCEPTION , WIMMessageHelper . generateMsgParms ( e . toString ( true ) ) ) ; throw new EntityNotFoundException ( WIMMessageKey . NAMING_EXCEPTION , msg , e ) ; } catch ( NamingException e ) { throw e ; } finally { iContextManager . releaseDirContext ( ctx ) ; } }
Modify the attributes for the specified distinguished name .
162,202
public void rename ( String dn , String newDn ) throws WIMException { TimedDirContext ctx = iContextManager . getDirContext ( ) ; iContextManager . checkWritePermission ( ctx ) ; try { try { ctx . rename ( dn , newDn ) ; } catch ( NamingException e ) { if ( ! ContextManager . isConnectionException ( e ) ) { throw e ; } ctx = iContextManager . reCreateDirContext ( ctx , e . toString ( ) ) ; ctx . rename ( dn , newDn ) ; } } catch ( NamingException e ) { String msg = Tr . formatMessage ( tc , WIMMessageKey . NAMING_EXCEPTION , WIMMessageHelper . generateMsgParms ( e . toString ( true ) ) ) ; throw new WIMSystemException ( WIMMessageKey . NAMING_EXCEPTION , msg , e ) ; } finally { iContextManager . releaseDirContext ( ctx ) ; } }
Rename an entity .
162,203
protected final void addConverter ( String name , String converterId ) { _factories . put ( name , new ConverterHandlerFactory ( converterId ) ) ; }
Add a ConvertHandler for the specified converterId
162,204
protected final void addConverter ( String name , String converterId , Class < ? extends TagHandler > type ) { _factories . put ( name , new UserConverterHandlerFactory ( converterId , type ) ) ; }
Add a ConvertHandler for the specified converterId of a TagHandler type
162,205
protected final void addTagHandler ( String name , Class < ? extends TagHandler > handlerType ) { _factories . put ( name , new HandlerFactory ( handlerType ) ) ; }
Use the specified HandlerType in compiling Facelets . HandlerType must extend TagHandler .
162,206
protected final void addUserTag ( String name , URL source ) { if ( _strictJsf2FaceletsCompatibility == null ) { MyfacesConfig config = MyfacesConfig . getCurrentInstance ( FacesContext . getCurrentInstance ( ) . getExternalContext ( ) ) ; _strictJsf2FaceletsCompatibility = config . isStrictJsf2FaceletsCompatibility ( ) ; } if ( Boolean . TRUE . equals ( _strictJsf2FaceletsCompatibility ) ) { _factories . put ( name , new LegacyUserTagFactory ( source ) ) ; } else { _factories . put ( name , new UserTagFactory ( source ) ) ; } }
Add a UserTagHandler specified a the URL source .
162,207
@ Reference ( policy = ReferencePolicy . DYNAMIC , cardinality = ReferenceCardinality . MULTIPLE , target = "(!(com.ibm.ws.security.registry.type=QuickStartSecurityRegistry))" ) protected synchronized void setUserRegistry ( ServiceReference < UserRegistry > ref ) { urs . add ( ref ) ; unregisterQuickStartSecurityRegistryConfiguration ( ) ; unregisterQuickStartSecurityAdministratorRole ( ) ; }
This method will only be called for UserRegistryConfigurations that are not the one we have defined here .
162,208
@ Reference ( policy = ReferencePolicy . DYNAMIC , cardinality = ReferenceCardinality . MULTIPLE , target = "(!(com.ibm.ws.management.security.role.name=QuickStartSecurityAdministratorRole))" ) protected synchronized void setManagementRole ( ServiceReference < ManagementRole > ref ) { managementRoles . add ( ref ) ; unregisterQuickStartSecurityRegistryConfiguration ( ) ; unregisterQuickStartSecurityAdministratorRole ( ) ; }
This method will only be called for ManagementRoles that are not the one we have defined here .
162,209
protected synchronized void modify ( QuickStartSecurityConfig config ) { this . config = config ; validateConfigurationProperties ( ) ; if ( urConfigReg == null ) { registerQuickStartSecurityRegistryConfiguration ( ) ; } else { updateQuickStartSecurityRegistryConfiguration ( ) ; } unregisterQuickStartSecurityAdministratorRole ( ) ; registerQuickStartSecurityAdministratorRole ( ) ; }
Push the new user and password into the registry s configuration .
162,210
private boolean isStringValueUndefined ( Object str ) { if ( str instanceof SerializableProtectedString ) { char [ ] contents = ( ( SerializableProtectedString ) str ) . getChars ( ) ; for ( char ch : contents ) if ( ch > '\u0020' ) return false ; return true ; } else { return ( str == null || ( ( String ) str ) . trim ( ) . isEmpty ( ) ) ; } }
Check if the value is non - null not empty and not all white - space .
162,211
private Dictionary < String , Object > buildUserRegistryConfigProps ( ) { Hashtable < String , Object > properties = new Hashtable < String , Object > ( ) ; properties . put ( "config.id" , QUICK_START_SECURITY_REGISTRY_ID ) ; properties . put ( "id" , QUICK_START_SECURITY_REGISTRY_ID ) ; properties . put ( UserRegistryService . REGISTRY_TYPE , QUICK_START_SECURITY_REGISTRY_TYPE ) ; properties . put ( CFG_KEY_USER , config . userName ( ) ) ; properties . put ( "service.vendor" , "IBM" ) ; return properties ; }
Build the UserRegistryConfiguration properties based on the current user and password .
162,212
private void registerQuickStartSecurityRegistryConfiguration ( ) { if ( bc == null ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "BundleContext is null, we must be deactivated." ) ; } return ; } if ( urConfigReg != null ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "QuickStartSecurityRegistry configuration is already registered." ) ; } return ; } if ( isStringValueUndefined ( config . userName ( ) ) || isStringValueUndefined ( config . userPassword ( ) ) ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "Incomplete configuration. This should already have been reported. Will not register QuickStartSecurityRegistry configuration." ) ; } return ; } if ( config . UserRegistry ( ) != null && config . UserRegistry ( ) . length > 0 ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "Other UserRegistryConfiguration are present, will not register the QuickStartSecurityRegistry configuration." ) ; } return ; } if ( ! managementRoles . isEmpty ( ) ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "Other ManagementRole are present, will not register the QuickStartSecurityRegistry configuration." ) ; } return ; } Dictionary < String , Object > props = buildUserRegistryConfigProps ( ) ; quickStartRegistry = new QuickStartSecurityRegistry ( config . userName ( ) , Password . create ( config . userPassword ( ) ) ) ; urConfigReg = bc . registerService ( UserRegistry . class , quickStartRegistry , props ) ; }
Create register and return the ServiceRegistration for the quick start security UserRegistryConfiguration .
162,213
private void unregisterQuickStartSecurityRegistryConfiguration ( ) { if ( urConfigReg != null ) { urConfigReg . unregister ( ) ; urConfigReg = null ; quickStartRegistry = null ; } else { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "QuickStartSecurityRegistry configuration is not registered." ) ; } } }
Unregister the quick start security security UserRegistryConfiguration .
162,214
private void registerQuickStartSecurityAdministratorRole ( ) { if ( bc == null ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "BundleContext is null, we must be deactivated." ) ; } return ; } if ( managementRoleReg != null ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "QuickStartSecurityAdministratorRole is already registered." ) ; } return ; } if ( urConfigReg == null ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "QuickStartSecurityRegistry configuration is not registered, will not register QuickStartSecurityAdministratorRole." ) ; } return ; } if ( isStringValueUndefined ( config . userName ( ) ) ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "User is not set, can not register the QuickStartSecurityAdministratorRole" ) ; } return ; } if ( ! managementRoles . isEmpty ( ) ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "Other managment roles are present, will not register the QuickStartSecurityAdministratorRole" ) ; } return ; } Dictionary < String , Object > props = new Hashtable < String , Object > ( ) ; props . put ( ManagementRole . MANAGEMENT_ROLE_NAME , QUICK_START_ADMINISTRATOR_ROLE_NAME ) ; props . put ( "service.vendor" , "IBM" ) ; managementRole = new QuickStartSecurityAdministratorRole ( config . userName ( ) ) ; managementRoleReg = bc . registerService ( ManagementRole . class , managementRole , props ) ; }
Register the quick start security management role .
162,215
static long roundUpDelay ( long delay , TimeUnit unit , long now ) { if ( delay < 0 ) { delay = 0 ; } long target = now + unit . toMillis ( delay ) ; if ( target < now ) { return delay ; } long remainder = target % PERIOD_MILLISECONDS ; if ( remainder == 0 ) { return delay ; } long extra = PERIOD_MILLISECONDS - remainder ; long newDelay = delay + unit . convert ( extra , TimeUnit . MILLISECONDS ) ; if ( newDelay < delay ) { return delay ; } return newDelay ; }
Round up delays so that all tasks fire at approximately with approximately the same 15s period .
162,216
public static void copyStream ( InputStream from , OutputStream to ) throws IOException { byte buffer [ ] = new byte [ 2048 ] ; int bytesRead ; while ( ( bytesRead = from . read ( buffer ) ) != - 1 ) { to . write ( buffer , 0 , bytesRead ) ; } from . close ( ) ; }
Copy the given InputStream to the given OutputStream .
162,217
public static void copyReader ( Reader from , Writer to ) throws IOException { char buffer [ ] = new char [ 2048 ] ; int charsRead ; while ( ( charsRead = from . read ( buffer ) ) != - 1 ) { to . write ( buffer , 0 , charsRead ) ; } from . close ( ) ; to . flush ( ) ; }
Copy the given Reader to the given Writer .
162,218
public void activate ( ) { if ( this . numHandlersInFlight . getInt ( ) == 0 ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "Activating result handler: " + this . completionPort ) ; } startHandler ( ) ; } }
Activate the result handler when the channel starts .
162,219
public static void setConnectionHandle ( VirtualConnection vc , ConnectionHandle handle ) { if ( vc == null || handle == null ) { return ; } Map < Object , Object > map = vc . getStateMap ( ) ; Object vcLock = vc . getLockObject ( ) ; synchronized ( vcLock ) { Object tmpHandle = map . get ( CONNECTION_HANDLE_VC_KEY ) ; if ( tmpHandle != null ) { throw new IllegalStateException ( "Connection " + tmpHandle + " has already been created" ) ; } map . put ( CONNECTION_HANDLE_VC_KEY , handle ) ; } }
Set the connection handle on the virtual connection .
162,220
protected void setConnectionType ( VirtualConnection vc ) { if ( this . myType == 0 || vc == null ) { ConnectionType newType = ConnectionType . getVCConnectionType ( vc ) ; this . myType = ( newType == null ) ? 0 : newType . export ( ) ; } }
Set ConnectionType based on the input virtual connection .
162,221
public static void processException ( Throwable th , String sourceId , String probeId , Object callerThis ) { FFDCConfigurator . getDelegate ( ) . processException ( th , sourceId , probeId , callerThis ) ; }
Write a first failure data capture record for the provided throwable
162,222
void close ( ) { if ( logger . isLoggable ( Level . FINER ) ) { logger . logp ( Level . FINER , logger . getName ( ) , "close" , "Close called for " + RESTClientMessagesUtil . getObjID ( this ) + " within connection: " + connector . getConnectionId ( ) ) ; } closePollingThread ( ) ; if ( notificationRegistry != null ) { notificationRegistry . close ( ) ; } if ( connector . logFailovers ( ) ) { String disconnectMsg = RESTClientMessagesUtil . getMessage ( RESTClientMessagesUtil . MEMBER_DISCONNECT , connector . getCurrentEndpoint ( ) ) ; logger . logp ( Level . INFO , logger . getName ( ) , "close" , disconnectMsg ) ; } disconnect ( ) ; }
do the proper cleaning procedures .
162,223
private File getArchiveFile ( ) { String methodName = "getArchiveFile" ; if ( archiveFileLock != null ) { synchronized ( archiveFileLock ) { if ( ( archiveFile == null ) && ! archiveFileFailed ) { try { archiveFile = extractEntry ( entryInEnclosingContainer , getCacheDir ( ) ) ; if ( archiveFile != null ) { archiveFilePath = archiveFile . getAbsolutePath ( ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , methodName + " Archive file [ " + archiveFilePath + " ]" ) ; } } else { archiveFileFailed = true ; Tr . error ( tc , "extract.cache.null" , entryInEnclosingContainer . getPath ( ) ) ; } } catch ( IOException e ) { archiveFileFailed = true ; Tr . error ( tc , "extract.cache.fail" , e . getMessage ( ) ) ; } } } } return archiveFile ; }
Answer the archive file . Extract it if necessary . Answer null if extraction fails .
162,224
private String getArchiveFilePath ( ) { if ( archiveFileLock == null ) { return archiveFilePath ; } else { synchronized ( archiveFileLock ) { @ SuppressWarnings ( "unused" ) File useArchiveFile = getArchiveFile ( ) ; return archiveFilePath ; } } }
Answer the absolute path to the archive file . Do an extraction if this is a nested archive and the file is not yet extracted . Answer null if extraction fails .
162,225
ZipFileHandle getZipFileHandle ( ) throws IOException { synchronized ( zipFileHandleLock ) { if ( zipFileHandleFailed ) { return null ; } else if ( zipFileHandle != null ) { return zipFileHandle ; } File useArchiveFile = getArchiveFile ( ) ; if ( useArchiveFile == null ) { zipFileHandleFailed = true ; throw new FileNotFoundException ( entryInEnclosingContainer . getPath ( ) ) ; } try { String useCanonicalPath = getCanonicalPath ( useArchiveFile ) ; zipFileHandle = getZipFileHandle ( useCanonicalPath ) ; } catch ( IOException e ) { zipFileHandleFailed = true ; throw e ; } return zipFileHandle ; } }
Answer the handle to the archive file of this container .
162,226
protected ZipFileEntry createEntry ( String entryName , String a_entryPath ) { ZipEntryData [ ] useZipEntries = getZipEntryData ( ) ; if ( useZipEntries . length == 0 ) { return null ; } String r_entryPath = a_entryPath . substring ( 1 ) ; int location = locatePath ( r_entryPath ) ; ZipEntryData entryData ; if ( location < 0 ) { location = ( ( location + 1 ) * - 1 ) ; entryData = null ; } else { entryData = useZipEntries [ location ] ; } return createEntry ( null , entryName , a_entryPath , entryData ) ; }
Answer the zip entry for the zip file entry at the specified path . The zip file entry may be virtual .
162,227
URI createEntryUri ( String r_entryPath , File useArchiveFile ) { URI archiveUri = getURI ( useArchiveFile ) ; if ( archiveUri == null ) { return null ; } if ( r_entryPath . isEmpty ( ) ) { return null ; } String encodedUriText = getProtocol ( ) + ":" + archiveUri . toString ( ) + "!/" + ParserUtils . encode ( r_entryPath ) ; try { return new URI ( encodedUriText ) ; } catch ( URISyntaxException e ) { return null ; } }
Create and return a URI for an entry of an archive .
162,228
private static URI getURI ( final File file ) { return AccessController . doPrivileged ( new PrivilegedAction < URI > ( ) { public URI run ( ) { return file . toURI ( ) ; } } ) ; }
File utility ...
162,229
private ExtractionGuard placeExtractionGuard ( String path ) { boolean isPrimary ; CountDownLatch completionLatch ; synchronized ( extractionsLock ) { completionLatch = extractionLocks . get ( path ) ; if ( completionLatch != null ) { isPrimary = false ; } else { isPrimary = true ; completionLatch = new CountDownLatch ( 1 ) ; extractionLocks . put ( path , completionLatch ) ; } } return new ExtractionGuard ( path , isPrimary , completionLatch ) ; }
Make sure a completion latch exists for a specified path .
162,230
private void releaseExtractionGuard ( ExtractionGuard extractionLatch ) { synchronized ( extractionsLock ) { extractionLocks . remove ( extractionLatch . path ) ; } extractionLatch . completionLatch . countDown ( ) ; }
unblocking secondary extractions .
162,231
private boolean isModified ( ArtifactEntry entry , File file ) { long fileLastModified = FileUtils . fileLastModified ( file ) ; long entryLastModified = entry . getLastModified ( ) ; return ( Math . abs ( fileLastModified - entryLastModified ) >= 1010L ) ; }
Tell if an entry is modified relative to a file . That is if the last modified times are different .
162,232
private boolean deleteAll ( File rootFile ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "Delete [ " + rootFile . getAbsolutePath ( ) + " ]" ) ; } if ( FileUtils . fileIsFile ( rootFile ) ) { boolean didDelete = FileUtils . fileDelete ( rootFile ) ; if ( ! didDelete ) { Tr . error ( tc , "Could not delete file [ " + rootFile . getAbsolutePath ( ) + " ]" ) ; } else { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "Deleted" ) ; } } return didDelete ; } else { boolean didDeleteAll = true ; int deleteCount = 0 ; File childFiles [ ] = FileUtils . listFiles ( rootFile ) ; int childCount ; if ( childFiles != null ) { childCount = childFiles . length ; for ( File childFile : childFiles ) { if ( ! deleteAll ( childFile ) ) { didDeleteAll = false ; } else { deleteCount ++ ; } } } else { childCount = 0 ; deleteCount = 0 ; } if ( didDeleteAll ) { didDeleteAll = FileUtils . fileDelete ( rootFile ) ; } if ( ! didDeleteAll ) { Tr . error ( tc , "Could not delete directory [ " + rootFile . getAbsolutePath ( ) + " ]" ) ; } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "Deleted [ " + Integer . valueOf ( deleteCount ) + " ]" + " of [ " + Integer . valueOf ( childCount ) + " ]" ) ; } return didDeleteAll ; } }
a single consolidated wrapper .
162,233
public void startRecovery ( RecoveryLogFactory fac ) { if ( tc . isEntryEnabled ( ) ) Tr . entry ( tc , "startRecovery" , fac ) ; RecoveryDirector director = null ; try { director = RecoveryDirectorFactory . recoveryDirector ( ) ; director . setRecoveryLogFactory ( fac ) ; ( ( RecoveryDirectorImpl ) director ) . driveLocalRecovery ( ) ; } catch ( RecoveryFailedException exc ) { FFDCFilter . processException ( exc , "com.ibm.ws.recoverylog.spi.RecLogServiceImpl.startRecovery" , "421" , this ) ; if ( tc . isDebugEnabled ( ) ) Tr . debug ( tc , "Local recovery failed." ) ; } catch ( InternalLogException ile ) { FFDCFilter . processException ( ile , "com.ibm.ws.recoverylog.spi.RecLogServiceImpl.startRecovery" , "478" , this ) ; if ( tc . isDebugEnabled ( ) ) Tr . debug ( tc , "Local recovery not attempted." , ile ) ; } if ( director != null && _isPeerRecoverySupported ) { if ( checkPeersAtStartup ( ) ) { try { if ( director instanceof LibertyRecoveryDirectorImpl ) { ( ( LibertyRecoveryDirectorImpl ) director ) . drivePeerRecovery ( ) ; } } catch ( RecoveryFailedException exc ) { FFDCFilter . processException ( exc , "com.ibm.ws.recoverylog.spi.RecLogServiceImpl.startRecovery" , "421" , this ) ; if ( tc . isDebugEnabled ( ) ) Tr . debug ( tc , "Local peer failed." ) ; } } } if ( tc . isEntryEnabled ( ) ) Tr . exit ( tc , "startRecovery" ) ; }
Driven by the runtime during server startup . This hook is used to perform recovery log service initialization .
162,234
private boolean checkPeersAtStartup ( ) { if ( tc . isEntryEnabled ( ) ) Tr . entry ( tc , "checkPeersAtStartup" ) ; boolean checkAtStartup ; try { checkAtStartup = AccessController . doPrivileged ( new PrivilegedExceptionAction < Boolean > ( ) { public Boolean run ( ) { return Boolean . getBoolean ( "com.ibm.ws.recoverylog.spi.CheckPeersAtStartup" ) ; } } ) ; } catch ( PrivilegedActionException e ) { if ( tc . isDebugEnabled ( ) ) Tr . debug ( tc , "checkPeersAtStartup" , e ) ; checkAtStartup = false ; } if ( tc . isEntryEnabled ( ) ) Tr . exit ( tc , "checkPeersAtStartup" , checkAtStartup ) ; return checkAtStartup ; }
This method retrieves a system property named com . ibm . ws . recoverylog . spi . CheckPeersAtStartup which allows the check to see if peer servers are stale to be bypassed at server startup . The checks will subsequently be performed through the spun - off timer thread .
162,235
public synchronized void writeHeader ( long timestamp ) throws IOException { if ( writer == null && headerBytes != null ) { writer = createNewWriter ( manager . startNewFile ( timestamp ) ) ; writer . write ( headerBytes ) ; manager . notifyOfFileAction ( LogEventListener . EVENTTYPEROLL ) ; } }
Publishes header if it wasn t done yet .
162,236
public synchronized void stop ( ) { if ( writer != null ) { try { writer . close ( headerBytes ) ; writer = null ; } catch ( IOException ex ) { } } disableFileSwitch ( ) ; headerBytes = null ; }
Stops this writer and close its output stream .
162,237
public void enableFileSwitch ( int switchHour ) { if ( fileSwitchTimer == null ) { fileSwitchTimer = AccessHelper . createTimer ( ) ; } if ( switchHour < MIN_SWITCH_HOUR || switchHour > MAX_SWITCH_HOUR ) { logger . logp ( Level . WARNING , className , "enableFileSwitch" , "HPEL_IncorrectSwitchHour" , new Object [ ] { switchHour , MIN_SWITCH_HOUR , MAX_SWITCH_HOUR , MIN_SWITCH_HOUR } ) ; switchHour = MIN_SWITCH_HOUR ; } Calendar currentTime = Calendar . getInstance ( ) ; Calendar switchTime = currentTime ; switchTime . set ( Calendar . HOUR_OF_DAY , switchHour ) ; switchTime . set ( Calendar . MINUTE , 00 ) ; switchTime . set ( Calendar . SECOND , 00 ) ; if ( currentTime . after ( switchTime ) ) { switchTime . add ( Calendar . DATE , 1 ) ; } fileSwitchTime . setTime ( switchTime . getTimeInMillis ( ) ) ; fileSwitchTimer . scheduleAtFixedRate ( fileSwitchTask , fileSwitchTime , SWITCH_PERIOD ) ; }
Enables file switching for the writer by configuring the timer to set a trigger based on the switchHour parm
162,238
private X509TrustManager createPromptingTrustManager ( ) { TrustManager [ ] trustManagers = null ; try { String defaultAlg = TrustManagerFactory . getDefaultAlgorithm ( ) ; TrustManagerFactory tmf = TrustManagerFactory . getInstance ( defaultAlg ) ; tmf . init ( ( KeyStore ) null ) ; trustManagers = tmf . getTrustManagers ( ) ; } catch ( KeyStoreException e ) { } catch ( NoSuchAlgorithmException e ) { } boolean autoAccept = Boolean . valueOf ( System . getProperty ( SYS_PROP_AUTO_ACCEPT , "false" ) ) ; return new PromptX509TrustManager ( stdin , stdout , trustManagers , autoAccept ) ; }
Create a custom trust manager which will prompt for trust acceptance .
162,239
private SSLSocketFactory setUpSSLContext ( ) throws NoSuchAlgorithmException , KeyManagementException { SSLContext ctx = SSLContext . getInstance ( "SSL" ) ; ctx . init ( null , new TrustManager [ ] { createPromptingTrustManager ( ) } , null ) ; return ctx . getSocketFactory ( ) ; }
Set up the common SSL context for the outbound connection .
162,240
private HashMap < String , Object > createJMXEnvironment ( final String user , final String password , final SSLSocketFactory sslSF ) { HashMap < String , Object > environment = new HashMap < String , Object > ( ) ; environment . put ( "jmx.remote.protocol.provider.pkgs" , "com.ibm.ws.jmx.connector.client" ) ; environment . put ( JMXConnector . CREDENTIALS , new String [ ] { user , password } ) ; environment . put ( ClientProvider . READ_TIMEOUT , 2 * 60 * 1000 ) ; environment . put ( ConnectorSettings . DISABLE_HOSTNAME_VERIFICATION , Boolean . TRUE ) ; environment . put ( ConnectorSettings . CUSTOM_SSLSOCKETFACTORY , sslSF ) ; environment . put ( "isCollectiveUtil" , Boolean . TRUE ) ; return environment ; }
Creates the common JMX environment used to connect to the controller .
162,241
private JMXConnector getMBeanServerConnection ( String controllerHost , int controllerPort , HashMap < String , Object > environment ) throws MalformedURLException , IOException { JMXServiceURL serviceURL = new JMXServiceURL ( "REST" , controllerHost , controllerPort , "/IBMJMXConnectorREST" ) ; return new ClientProvider ( ) . newJMXConnector ( serviceURL , environment ) ; }
Get the MBeanServerConnection for the target controller host and port .
162,242
public JMXConnector getJMXConnector ( String controllerHost , int controllerPort , String user , String password ) throws NoSuchAlgorithmException , KeyManagementException , MalformedURLException , IOException { HashMap < String , Object > environment = createJMXEnvironment ( user , password , setUpSSLContext ( ) ) ; JMXConnector connector = getMBeanServerConnection ( controllerHost , controllerPort , environment ) ; connector . connect ( ) ; return connector ; }
Returns a connected JMXConnector .
162,243
public synchronized void commit ( ) throws SIIncorrectCallException , SIRollbackException , SIResourceException , SIConnectionLostException , SIErrorException { if ( tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "commit" ) ; if ( ! valid ) { throw new SIIncorrectCallException ( nls . getFormattedMessage ( "TRANSACTION_COMPLETE_SICO1022" , null , null ) ) ; } valid = false ; CommsByteBuffer request = getCommsByteBuffer ( ) ; request . putShort ( getConnectionObjectID ( ) ) ; request . putInt ( getTransactionId ( ) ) ; CommsByteBuffer reply = null ; try { reply = jfapExchange ( request , JFapChannelConstants . SEG_COMMIT_TRANSACTION , lowestPriority , true ) ; short err = reply . getCommandCompletionCode ( JFapChannelConstants . SEG_COMMIT_TRANSACTION_R ) ; if ( err != CommsConstants . SI_NO_EXCEPTION ) { checkFor_SIIncorrectCallException ( reply , err ) ; checkFor_SIRollbackException ( reply , err ) ; checkFor_SIResourceException ( reply , err ) ; checkFor_SIConnectionLostException ( reply , err ) ; checkFor_SIErrorException ( reply , err ) ; defaultChecker ( reply , err ) ; } } catch ( SIConnectionDroppedException e ) { throw new SIConnectionLostException ( e . getMessage ( ) , e ) ; } finally { if ( reply != null ) reply . release ( ) ; } if ( tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "commit" ) ; }
Commits this transaction by flowing the commit to the server and marking this transaction as invalid .
162,244
public synchronized void rollback ( ) throws SIIncorrectCallException , SIResourceException , SIConnectionLostException , SIErrorException { if ( tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "rollback" ) ; if ( ! valid ) { throw new SIIncorrectCallException ( nls . getFormattedMessage ( "TRANSACTION_COMPLETE_SICO1022" , null , null ) ) ; } valid = false ; CommsByteBuffer request = getCommsByteBuffer ( ) ; request . putShort ( getConnectionObjectID ( ) ) ; request . putInt ( getTransactionId ( ) ) ; CommsByteBuffer reply = null ; try { reply = jfapExchange ( request , JFapChannelConstants . SEG_ROLLBACK_TRANSACTION , lowestPriority , true ) ; informConsumersOfRollback ( ) ; short err = reply . getCommandCompletionCode ( JFapChannelConstants . SEG_ROLLBACK_TRANSACTION_R ) ; if ( err != CommsConstants . SI_NO_EXCEPTION ) { checkFor_SIIncorrectCallException ( reply , err ) ; checkFor_SIResourceException ( reply , err ) ; checkFor_SIConnectionLostException ( reply , err ) ; checkFor_SIErrorException ( reply , err ) ; defaultChecker ( reply , err ) ; } } catch ( SIConnectionDroppedException e ) { if ( tc . isDebugEnabled ( ) ) SibTr . debug ( this , tc , "Connection failure during rollback." ) ; } finally { if ( reply != null ) reply . release ( ) ; } if ( tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "rollback" ) ; }
Rolls back this transaction by flowing the rollback to the server and marking this transaction as invalid .
162,245
public synchronized boolean isValid ( ) { if ( tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "isValid" ) ; if ( tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "isValid" , "" + valid ) ; return valid ; }
This method will return true if the transaction has not been committed or rolled back .
162,246
public short getLowestMessagePriority ( ) { if ( tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "getLowestMessagePriority" ) ; if ( tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "getLowestMessagePriority" , "" + lowestPriority ) ; return lowestPriority ; }
This method gets the lowest message priority being used in this transaction and as such is the JFAP priority that commit and rollback will be sent as .
162,247
public void updateLowestMessagePriority ( short messagePriority ) { if ( tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "updateLowestMessagePriority" , new Object [ ] { "" + messagePriority } ) ; if ( messagePriority < this . lowestPriority ) { if ( tc . isDebugEnabled ( ) ) SibTr . debug ( this , tc , "Updating lowest priority" ) ; this . lowestPriority = messagePriority ; } if ( tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "updateLowestMessagePriority" ) ; }
This method is used to update the lowest message priority that has been sent on this transaction . The value passed in is stored if it is lower than a previous value . Otherwise it is ignored . The stored value is then used on the exchanges sent when we commit or rollback .
162,248
public void associateConsumer ( ConsumerSessionProxy consumer ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "associateConsumer" , new Object [ ] { consumer , Boolean . valueOf ( strictRedeliveryOrdering ) } ) ; if ( strictRedeliveryOrdering && consumer != null ) { synchronized ( associatedConsumersLock ) { associatedConsumers . add ( consumer ) ; } } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "associateConsumer" ) ; }
Called each time a recoverable message is deleted from a consumer using a proxy queue under this transaction to allow the transaction to callback inform the proxy queue it should purge any read - ahead messages if required .
162,249
public void informConsumersOfRollback ( ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "informConsumersOfRollback" , new Object [ ] { Boolean . valueOf ( strictRedeliveryOrdering ) } ) ; if ( strictRedeliveryOrdering ) { ConsumerSessionProxy [ ] consumersToNotify ; synchronized ( associatedConsumersLock ) { consumersToNotify = new ConsumerSessionProxy [ associatedConsumers . size ( ) ] ; consumersToNotify = ( ConsumerSessionProxy [ ] ) associatedConsumers . toArray ( consumersToNotify ) ; } for ( int i = 0 ; i < consumersToNotify . length ; i ++ ) { try { consumersToNotify [ i ] . rollbackOccurred ( ) ; } catch ( SIException e ) { FFDCFilter . processException ( e , CLASS_NAME + ".informConsumersOfRollback" , CommsConstants . TRANSACTION_INFORMCONSUMERSOFROLLBACK_01 , this ) ; if ( tc . isDebugEnabled ( ) ) SibTr . debug ( tc , "Encountered error informing consumer of rollback: " + consumersToNotify [ i ] ) ; if ( tc . isEventEnabled ( ) ) SibTr . exception ( tc , e ) ; } } } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "informConsumersOfRollback" ) ; }
Inform all associated consumers that a rollback has occurred .
162,250
static void unboundSfsbFromExtendedPC ( JPAExPcBindingContext bindingContext ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) Tr . entry ( tc , "unboundSfsbFromExtendedPC : " + bindingContext ) ; JPAPuId puIds [ ] = bindingContext . getExPcPuIds ( ) ; long bindId = bindingContext . getBindId ( ) ; ExPcBindingKey bindingKey = new ExPcBindingKey ( bindId , null ) ; for ( JPAPuId puId : puIds ) { bindingKey . puId = puId ; ExPcBindingInfo exPcBindingInfo = svExPcBindingMap . remove ( bindingKey ) ; if ( exPcBindingInfo != null ) { if ( exPcBindingInfo . removeRemovedOrDiscardedSfsb ( bindingKey ) == 0 ) { EntityManager em = exPcBindingInfo . getEntityManager ( ) ; if ( em != null ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) Tr . debug ( tc , "All SFSBs using the same extend-scoped persistence " + "context have been removed, closing EntityManager " + em ) ; if ( em . isOpen ( ) ) em . close ( ) ; } } } } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) Tr . exit ( tc , "unboundSfsbFromExtendedPC : exPcBindMap size=" + svExPcBindingMap . size ( ) ) ; }
When SFSB instances are removed or discard this method is called to unbind the SFSB from the associated persistence context . When the last SFSB is removed from the bound collection the associated EntityManager is closed .
162,251
private static final boolean parentHasSameExPc ( JPAPuId parentPuIds [ ] , JPAPuId puId ) { for ( JPAPuId parentPuId : parentPuIds ) { if ( parentPuId . equals ( puId ) ) { return true ; } } return false ; }
Returns true if the caller and callee have declared the same
162,252
public void queue ( JFapByteBuffer bufferData , int segmentType , int requestNumber , int priority , SendListener sendListener , Conversation conversation , Connection connection , int conversationId , boolean pooledBuffers , boolean partOfExchange , long size , boolean terminal , ThrottlingPolicy throttlingPolicy ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "queue" ) ; TransmissionDataIterator iterator = TransmissionDataIterator . allocateFromPool ( connection , bufferData , priority , pooledBuffers , partOfExchange , segmentType , conversationId , requestNumber , conversation , sendListener , terminal , ( int ) size ) ; if ( type == Conversation . ME ) meQueuedBytes += size ; else if ( type == Conversation . CLIENT ) clientQueuedBytes += size ; queueInternal ( iterator , throttlingPolicy , terminal ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "queue" ) ; }
Queues the specified request into the priority table .
162,253
public TransmissionData dequeue ( ) throws SIConnectionDroppedException { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "dequeue" ) ; TransmissionData retValue = null ; Queue queue = null ; synchronized ( queueMonitor ) { if ( state == CLOSED ) { throw new SIConnectionDroppedException ( TraceNLS . getFormattedMessage ( JFapChannelConstants . MSG_BUNDLE , "PRIORITY_QUEUE_PURGED_SICJ0077" , null , "PRIORITY_QUEUE_PURGED_SICJ0077" ) ) ; } else { int priority = JFapChannelConstants . MAX_PRIORITY_LEVELS - 1 ; while ( ( priority >= 0 ) && ( queueArray [ priority ] . depth == 0 ) ) -- priority ; if ( priority >= 0 ) { queue = queueArray [ priority ] ; TransmissionDataIterator iterator = queue . head ( ) ; retValue = iterator . next ( ) ; queue . bytes -= retValue . getSize ( ) ; if ( ! iterator . hasNext ( ) ) { queue . dequeue ( ) ; -- queue . depth ; -- totalQueueDepth ; } if ( ( totalQueueDepth == 0 ) && ( state == CLOSING ) ) { state = CLOSED ; closeWaitersMonitor . setActive ( false ) ; for ( int i = 0 ; i < JFapChannelConstants . MAX_PRIORITY_LEVELS ; ++ i ) queueArray [ i ] . monitor . setActive ( false ) ; } if ( ! queue . hasCapacity && ( queue . bytes < maxQueueBytes ) && queue . depth < maxQueueDepth ) { queue . hasCapacity = true ; if ( priority < lowestPriorityWithCapacity ) { int newLowestPriorityWithCapacity = priority ; while ( ( newLowestPriorityWithCapacity > 0 ) && queueArray [ newLowestPriorityWithCapacity - 1 ] . hasCapacity ) { queueArray [ newLowestPriorityWithCapacity ] . monitor . setActive ( false ) ; -- newLowestPriorityWithCapacity ; } lowestPriorityWithCapacity = newLowestPriorityWithCapacity ; queueArray [ lowestPriorityWithCapacity ] . monitor . setActive ( false ) ; } } } } } if ( retValue != null ) { if ( type == Conversation . CLIENT ) clientQueuedBytes -= retValue . getSize ( ) ; else meQueuedBytes -= retValue . getSize ( ) ; } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "dequeue" , retValue ) ; return retValue ; }
De - queues the highest priority entry from the table
162,254
public boolean hasCapacity ( int priority ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "hasCapacity" , "" + priority ) ; boolean result ; synchronized ( queueMonitor ) { result = priority >= lowestPriorityWithCapacity ; } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "hasCapacity" , "" + result ) ; return result ; }
Checks to see if a given priority level has the capacity to accept another message to be queued .
162,255
public void close ( boolean immediate ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "close" , "" + immediate ) ; synchronized ( queueMonitor ) { if ( immediate || ( totalQueueDepth == 0 ) ) { state = CLOSED ; closeWaitersMonitor . setActive ( false ) ; } else state = CLOSING ; } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "close" ) ; }
Closes the priority queue . This causes all new queue requests to be ignored . Any existing data that has been queued may be dequeued unless the immediate flag has been set in which case we consider ourselves closed .
162,256
public void purge ( ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "purge" ) ; synchronized ( queueMonitor ) { state = CLOSED ; for ( int i = 0 ; i < JFapChannelConstants . MAX_PRIORITY_LEVELS - 1 ; ++ i ) { queueArray [ i ] . monitor . setActive ( false ) ; } closeWaitersMonitor . setActive ( false ) ; } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "purge" ) ; }
Purges the content of the priority queue . This closes the queue and wakes up any blocked threads
162,257
public void waitForCloseToComplete ( ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "waitForCloseToComplete" ) ; closeWaitersMonitor . waitOn ( ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "waitForCloseToComplete" ) ; }
Blocks until a close operation has completed . I . e . the priority queue has been drained . If the queue is already closed this method returns immeidately .
162,258
public boolean isEmpty ( ) throws SIConnectionDroppedException { synchronized ( queueMonitor ) { if ( state == CLOSED ) throw new SIConnectionDroppedException ( TraceNLS . getFormattedMessage ( JFapChannelConstants . MSG_BUNDLE , "PRIORITY_QUEUE_PURGED_SICJ0077" , null , "PRIORITY_QUEUE_PURGED_SICJ0077" ) ) ; return totalQueueDepth == 0 ; } }
Returns true iff this priority queue is empty .
162,259
private static boolean isGABuild ( ) { boolean result = true ; final Properties props = new Properties ( ) ; AccessController . doPrivileged ( new PrivilegedAction < Object > ( ) { public Object run ( ) { try { final File version = new File ( getInstallDir ( ) , "lib/versions/WebSphereApplicationServer.properties" ) ; Reader r = new InputStreamReader ( new FileInputStream ( version ) , "UTF-8" ) ; props . load ( r ) ; r . close ( ) ; } catch ( IOException e ) { } return null ; } } ) ; String v = props . getProperty ( "com.ibm.websphere.productVersion" ) ; if ( v != null ) { int index = v . indexOf ( '.' ) ; if ( index != - 1 ) { try { int major = Integer . parseInt ( v . substring ( 0 , index ) ) ; if ( major > 2012 ) { result = false ; } } catch ( NumberFormatException nfe ) { } } } return result ; }
Work out whether we should generate the schema for a GA build or not .
162,260
public void setFfdcAlready ( boolean ffdcAlready ) { this . ffdcAlready = ffdcAlready ; if ( tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "ffdc already handled? " + ffdcAlready ) ; } }
set to true if FFDC already handle this exception
162,261
private static String getResource ( Bundle myBundle , String resourcePath ) { if ( myBundle == null ) return null ; String bundleShortDescription = getBundleDescription ( myBundle ) ; StringBuilder responseString = new StringBuilder ( ) ; URL bundleResource = myBundle . getResource ( resourcePath ) ; if ( bundleResource != null ) { BufferedReader br = null ; try { br = new BufferedReader ( new InputStreamReader ( bundleResource . openConnection ( ) . getInputStream ( ) , "UTF-8" ) ) ; while ( br . ready ( ) ) { responseString . append ( br . readLine ( ) ) ; } br . close ( ) ; } catch ( Exception e ) { if ( OpenAPIUtils . isEventEnabled ( tc ) ) { Tr . event ( tc , "Exception trying to read resource at " + resourcePath + " from bundle " + bundleShortDescription ) ; } } } else { if ( OpenAPIUtils . isEventEnabled ( tc ) ) { Tr . event ( tc , "Unexpected error getting resource from WAB bundle." ) ; } } return responseString . toString ( ) ; }
Return as a string the contents of a file in the bundle .
162,262
private static void harvestPackageList ( BundlePackages packages , Bundle bundle ) { if ( bundle . getLocation ( ) != null && bundle . getState ( ) != Bundle . UNINSTALLED ) { BundleManifest manifest = new BundleManifest ( bundle ) ; if ( bundle . getBundleId ( ) == 0 || IBM . equals ( manifest . getBundleVendor ( ) ) || IBM . equals ( manifest . getBundleDistributor ( ) ) ) { packages . addPackages ( manifest ) ; } } }
This method is static to avoid concurrent access issues .
162,263
public static String extractPackageFromStackTraceElement ( StackTraceElement element ) { String className = element . getClassName ( ) ; int lastDotIndex = className . lastIndexOf ( "." ) ; String packageName ; if ( lastDotIndex > 0 ) { packageName = className . substring ( 0 , lastDotIndex ) ; } else { packageName = className ; } return packageName ; }
Work out the package name from a StackTraceElement . This is easier than a stack trace line because we already know the class name .
162,264
public boolean isSpecOrThirdPartyOrBootDelegationPackage ( String packageName ) { SharedPackageInspector inspector = st . getService ( ) ; if ( inspector != null ) { PackageType type = inspector . getExportedPackageType ( packageName ) ; if ( type != null && type . isSpecApi ( ) ) { return true ; } } boolean isBundlePackage = false ; for ( Pattern pattern : bootDelegationPackages ) { isBundlePackage = pattern . matcher ( packageName ) . matches ( ) ; if ( isBundlePackage ) { return isBundlePackage ; } } return false ; }
Returns true is this package is distributed as part of the Liberty server but is external to IBM and available to user applications - that is if its exposed as a boot delegation package or a spec package or a third party API .
162,265
public static Properties jslPropertiesToJavaProperties ( final JSLProperties xmlProperties ) { final Properties props = new Properties ( ) ; for ( final Property prop : xmlProperties . getPropertyList ( ) ) { props . setProperty ( prop . getName ( ) , prop . getValue ( ) ) ; } return props ; }
Creates a java . util . Properties map from a com . ibm . jbatch . jsl . model . Properties object .
162,266
public static JSLProperties javaPropsTojslProperties ( final Properties javaProps ) { JSLProperties newJSLProps = jslFactory . createJSLProperties ( ) ; Enumeration < ? > keySet = javaProps . propertyNames ( ) ; while ( keySet . hasMoreElements ( ) ) { String key = ( String ) keySet . nextElement ( ) ; String value = javaProps . getProperty ( key ) ; Property newProperty = jslFactory . createProperty ( ) ; newProperty . setName ( key ) ; newProperty . setValue ( value ) ; newJSLProps . getPropertyList ( ) . add ( newProperty ) ; } return newJSLProps ; }
Creates a new JSLProperties list from a java . util . Properties object .
162,267
public Logger getLogger ( String name ) { Logger logger = super . getLogger ( name ) ; if ( wsLogger == null ) { return logger ; } if ( logger == null ) { boolean createNewLogger = false ; boolean foundCaller = false ; Exception ex = new Exception ( ) ; StackTraceElement [ ] ste = ex . getStackTrace ( ) ; Class < ? > caller = null ; int i = 0 ; while ( ! foundCaller && i < ste . length ) { StackTraceElement s = ste [ i ++ ] ; if ( s . getClassName ( ) . equals ( CLASS_NAME ) && s . getMethodName ( ) . equals ( "getLogger" ) ) { while ( ! foundCaller && i < ste . length ) { s = ste [ i ++ ] ; if ( s . getClassName ( ) . equals ( "java.util.logging.Logger" ) && s . getMethodName ( ) . equals ( "getLogger" ) ) { createNewLogger = true ; } else if ( createNewLogger ) { caller = StackFinderSingleton . instance . getCaller ( i , s . getClassName ( ) ) ; foundCaller = caller != null ; } } } } if ( createNewLogger ) { try { logger = ( Logger ) wsLogger . newInstance ( name , caller , null ) ; Logger checkLogger = super . getLogger ( name ) ; if ( checkLogger != null ) { logger = checkLogger ; } } catch ( Exception e ) { throw new RuntimeException ( e ) ; } } } return logger ; }
Returns an instance of WsLogger with specified name . If an instance with specified name does not exist it will be created .
162,268
public ServiceRegistration < KeyringMonitor > monitorKeyRings ( String ID , String trigger , String keyStoreLocation ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEventEnabled ( ) ) { Tr . event ( this , tc , "monitorKeyRing registration for" , ID ) ; } BundleContext bundleContext = actionable . getBundleContext ( ) ; final Hashtable < String , Object > keyRingMonitorProps = new Hashtable < String , Object > ( ) ; keyRingMonitorProps . put ( KeyringMonitor . MONITOR_KEYSTORE_CONFIG_ID , ID ) ; keyRingMonitorProps . put ( KeyringMonitor . KEYSTORE_LOCATION , keyStoreLocation ) ; if ( ! ( trigger . equalsIgnoreCase ( "disabled" ) ) && trigger . equals ( "polled" ) ) { Tr . warning ( tc , "Cannot have polled trigger for keyRing ID: " , ID ) ; } return bundleContext . registerService ( KeyringMonitor . class , this , keyRingMonitorProps ) ; }
Registers this KeyringMonitor to start monitoring the specified keyrings by mbean notification .
162,269
public void start ( ) throws SIResourceException { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( tc , "start" ) ; synchronized ( this ) { active = true ; if ( ! completedTicksInitialized ) { if ( initRequestId == - 1 ) initRequestId = parent . generateUniqueValue ( ) ; requestHighestGeneratedTickTimer = new RequestHighestGeneratedTick ( ) ; requestHighestGeneratedTickTimer . alarm ( null ) ; } if ( parent . getCardinalityOne ( ) && ! isFlushed ) { inactivityTimer = am . create ( mp . getCustomProperties ( ) . get_remote_consumer_cardinality_inactivity_interval ( ) , inactivityHandler ) ; } if ( resetRequestAckSender != null ) { boolean done = resetRequestAckSender . start ( ) ; if ( done ) resetRequestAckSender = null ; } dem . startTimer ( ) ; if ( imeRestorationHandler != null ) imeRestorationHandler . startTimer ( ) ; } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( tc , "start" ) ; }
Start the stream i . e . start sending data and control messages
162,270
public void stop ( ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( tc , "stop" ) ; synchronized ( this ) { active = false ; if ( initRepeatHandler != null ) { initRepeatHandler . cancel ( ) ; } if ( inactivityTimer != null ) { inactivityTimer . cancel ( ) ; inactivityTimer = null ; } if ( resetRequestAckSender != null ) { resetRequestAckSender . stop ( ) ; } dem . stopTimer ( ) ; if ( imeRestorationHandler != null ) imeRestorationHandler . stopTimer ( ) ; } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( tc , "stop" ) ; }
Stop the stream i . e . stop sending data and control messages
162,271
public void processTimedoutEntries ( List timedout ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( tc , "processTimedoutEntries" , new Object [ ] { this , timedout } ) ; boolean sendMsg = false ; synchronized ( this ) { if ( active && completedTicksInitialized && ! timedout . isEmpty ( ) ) { sendMsg = true ; } } if ( sendMsg ) parent . sendDecisionExpected ( remoteMEUuid , gatheringTargetDestUuid , streamId , timedout ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( tc , "processTimedoutEntries" ) ; }
Called when the DecisionExpected timeout occurs
162,272
public final void expiredRequest ( long tick ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( tc , "expiredRequest" , Long . valueOf ( tick ) ) ; expiredRequest ( tick , false ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( tc , "expiredRequest" ) ; }
Callback from JSRemoteConsumerPoint that the given tick in the stream should be changed to the completed state .
162,273
public final void removeConsumerKey ( String selector , JSRemoteConsumerPoint aock ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( tc , "removeConsumerKey" , new Object [ ] { selector , aock } ) ; synchronized ( this ) { JSRemoteConsumerPoint aock2 = ( JSRemoteConsumerPoint ) consumerKeyTable . get ( selector ) ; if ( aock2 == aock ) { consumerKeyTable . remove ( selector ) ; } } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( tc , "removeConsumerKey" ) ; }
Method to remove the given JSRemoteConsumerPoint from the consumerKeyTable
162,274
public synchronized long getNumberOfRequestsInState ( int requiredState ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( tc , "getNumberOfRequestsInState" , Integer . valueOf ( requiredState ) ) ; long requestCount = 0 ; stream . setCursor ( 0 ) ; stream . getNext ( ) ; TickRange tr = stream . getNext ( ) ; while ( tr . endstamp < RangeList . INFINITY ) { if ( ( tr . type == requiredState ) ) { requestCount ++ ; } tr = stream . getNext ( ) ; } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( tc , "getNumberOfRequestsInState" , Long . valueOf ( requestCount ) ) ; return requestCount ; }
Counts the number of requests that have been completed since reboot
162,275
public final void unlockRejectedTick ( TransactionCommon t , AOValue storedTick ) throws MessageStoreException , SIResourceException { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( tc , "unlockRejectedTick" ) ; try { SIMPMessage msg = consumerDispatcher . getMessageByValue ( storedTick ) ; Transaction msTran = mp . resolveAndEnlistMsgStoreTransaction ( t ) ; if ( msg != null ) { boolean incrementCount = false ; if ( storedTick . rmeUnlockCount > 0 ) { incrementCount = true ; msg . setRMEUnlockCount ( storedTick . rmeUnlockCount - 1 ) ; } if ( msg . getLockID ( ) == storedTick . getPLockId ( ) ) msg . unlockMsg ( storedTick . getPLockId ( ) , msTran , incrementCount ) ; } storedTick . lockItemIfAvailable ( controlItemLockID ) ; storedTick . remove ( msTran , controlItemLockID ) ; } catch ( MessageStoreException e ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( tc , "unlockRejectedTick" , e ) ; throw e ; } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( tc , "unlockRejectedTick" ) ; }
Helper method called by the AOStream when a persistent tick representing a persistently locked message should be removed since the message has been rejected . This method will also unlock the message
162,276
public final void consumeAcceptedTick ( TransactionCommon t , AOValue storedTick ) throws Exception { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( tc , "consumeAcceptedTick" , storedTick ) ; try { SIMPMessage msg = consumerDispatcher . getMessageByValue ( storedTick ) ; Transaction msTran = mp . resolveAndEnlistMsgStoreTransaction ( t ) ; if ( msg != null ) { msg . remove ( msTran , storedTick . getPLockId ( ) ) ; } storedTick . lockItemIfAvailable ( controlItemLockID ) ; storedTick . remove ( msTran , controlItemLockID ) ; } catch ( Exception e ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( tc , "consumeAcceptedTick" , e ) ; throw e ; } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( tc , "consumeAcceptedTick" ) ; }
Helper method called by the AOStream when a persistent tick representing a persistently locked message should be removed since the message has been accepted . This method will also consume the message
162,277
public FileChannel getFileChannel ( ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "getFileChannel(): " + fc ) ; } return this . fc ; }
Return the FileChannel object that is representing this WsByteBufferImpl .
162,278
private void convertBufferIfNeeded ( ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) { Tr . entry ( tc , "convertBufferIfNeeded status: " + status ) ; } if ( isFCEnabled ( ) ) { status = status & ( ~ WsByteBuffer . STATUS_TRANSFER_TO ) ; status = status | WsByteBuffer . STATUS_BUFFER ; try { int bufPosition = ( int ) fc . position ( ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "creating a MappedByteBuffer from the FileChannel. position: " + 0 + " size: " + fc . size ( ) ) ; } try { oByteBuffer = fc . map ( MapMode . PRIVATE , 0 , fc . size ( ) ) ; } catch ( NonWritableChannelException e ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "FileChannel is readonly" ) ; } oByteBuffer = fc . map ( MapMode . READ_ONLY , 0 , fc . size ( ) ) ; setReadOnly ( true ) ; } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "set MappedByteBuffer position to: " + bufPosition + " limit to: " + fcLimit ) ; } position ( bufPosition ) ; limit ( fcLimit ) ; } catch ( IOException e ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "got IOException: " + e ) ; } FFDCFilter . processException ( e , CLASS_NAME + ".convertBufferIfNeeded" , "112" , this ) ; throw new RuntimeException ( e ) ; } } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) { Tr . exit ( tc , "convertBufferIfNeeded status: " + status ) ; } }
If the buffer has not already been converted from a TRANSFER_TO buffer back to the more common base BUFFER then do so now .
162,279
public void checkType ( JSField elem , int indir ) throws JMFSchemaViolationException { if ( ! equivFields ( element , elem ) || indir != indirect ) throw new JMFSchemaViolationException ( "Incorrect list element types" ) ; }
SchemaViolationException if not
162,280
private boolean equivFields ( JSField one , JSField two ) { if ( one instanceof JSDynamic ) { return two instanceof JSDynamic ; } else if ( one instanceof JSEnum ) { return two instanceof JSEnum ; } else if ( one instanceof JSPrimitive ) { return ( two instanceof JSPrimitive ) && ( ( JSPrimitive ) one ) . getTypeCode ( ) == ( ( JSPrimitive ) two ) . getTypeCode ( ) ; } else if ( one instanceof JSVariant ) { return ( two instanceof JSVariant ) && ( ( JSVariant ) one ) . getBoxed ( ) . getID ( ) == ( ( JSVariant ) two ) . getBoxed ( ) . getID ( ) ; } else return false ; }
here is too specialized .
162,281
int reallocate ( int fieldOffset ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) JmfTr . entry ( this , tc , "reallocate" , new Object [ ] { Integer . valueOf ( offset ) } ) ; byte [ ] oldContents = contents ; int oldOffset = offset ; contents = new byte [ length ] ; System . arraycopy ( oldContents , offset , contents , 0 , length ) ; offset = 0 ; int result = fieldOffset - oldOffset ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) JmfTr . exit ( this , tc , "reallocate" , Integer . valueOf ( result ) ) ; return result ; }
Reallocate the entire contents buffer
162,282
void reallocated ( byte [ ] newContents , int newOffset ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) JmfTr . entry ( this , tc , "reallocated" , new Object [ ] { newContents , Integer . valueOf ( newOffset ) } ) ; if ( contents != null ) { contents = newContents ; offset = newOffset + 8 ; sharedContents = false ; if ( cache != null ) { for ( int i = 0 ; i < cache . length ; i ++ ) { try { Object entry = cache [ i ] ; if ( entry != null && entry instanceof JSMessageData ) { ( ( JSMessageData ) entry ) . reallocated ( newContents , getAbsoluteOffset ( i ) ) ; } } catch ( JMFUninitializedAccessException e ) { } } } } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) JmfTr . exit ( this , tc , "reallocated" ) ; }
JSMessageData items currently in the cache .
162,283
static int getSize ( Object agg ) throws JMFSchemaViolationException { if ( agg == null ) { return 0 ; } else if ( agg instanceof Collection ) { return ( ( Collection ) agg ) . size ( ) ; } else if ( agg . getClass ( ) . isArray ( ) ) { return Array . getLength ( agg ) ; } else { throw new JMFSchemaViolationException ( agg . getClass ( ) . getName ( ) ) ; } }
Get the size of an aggregate that may be either an array or a Collection
162,284
static Iterator getIterator ( Object agg ) throws JMFSchemaViolationException { if ( agg instanceof Collection ) { return ( ( Collection ) agg ) . iterator ( ) ; } else if ( agg . getClass ( ) . isArray ( ) ) { return new LiteIterator ( agg ) ; } else { throw new JMFSchemaViolationException ( agg . getClass ( ) . getName ( ) ) ; } }
Get an Iterator over an aggregate that may be either an array or a Collection
162,285
public AppValidator failsWith ( String expectedFailure ) { stringsToFind . add ( expectedFailure ) ; stringsToFind . add ( APP_FAIL_CODE ) ; server . addIgnoredErrors ( Collections . singletonList ( expectedFailure ) ) ; return this ; }
Specify that the app should fail to start and that the given failure message should be seen during app startup
162,286
private int acquireExpedite ( ) { int a ; while ( ( a = expeditesAvailable . get ( ) ) > 0 && ! expeditesAvailable . compareAndSet ( a , a - 1 ) ) ; return a ; }
Attempt to acquire a permit to expedite which involves decrementing the available expedites . Only allow decrement of a positive value and otherwise indicate there are no available expedites .
162,287
private void decrementWithheldConcurrency ( ) { int w ; while ( ( w = withheldConcurrency . get ( ) ) > 0 && ! withheldConcurrency . compareAndSet ( w , w - 1 ) ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) Tr . debug ( this , tc , "withheld concurrency " + w + " + ( w == 0 ? 0 : ( w - 1 ) ) ) ; }
Decrement the counter of withheld concurrency only if positive . This method should only ever be invoked if the caller is about to enqueue a task to the global executor . Otherwise there is a risk of a race condition where withheldConcurrency decrements to 0 with a task still on the queue .
162,288
@ FFDCIgnore ( value = { RejectedExecutionException . class } ) public < T > T invokeAny ( Collection < ? extends Callable < T > > tasks , PolicyTaskCallback [ ] callbacks ) throws InterruptedException , ExecutionException { int taskCount = tasks . size ( ) ; if ( taskCount == 1 ) { boolean havePermit = false ; if ( maxPolicy == MaxPolicy . loose || ( havePermit = maxConcurrencyConstraint . tryAcquire ( ) ) ) try { if ( state . get ( ) != State . ACTIVE ) throw new RejectedExecutionException ( Tr . formatMessage ( tc , "CWWKE1202.submit.after.shutdown" , identifier ) ) ; PolicyTaskFutureImpl < T > taskFuture = new PolicyTaskFutureImpl < T > ( this , tasks . iterator ( ) . next ( ) , callbacks == null ? null : callbacks [ 0 ] , - 1 ) ; taskFuture . accept ( true ) ; runTask ( taskFuture ) ; taskFuture . throwIfInterrupted ( ) ; return taskFuture . get ( ) ; } finally { if ( havePermit ) transferOrReleasePermit ( ) ; } } else if ( taskCount == 0 ) throw new IllegalArgumentException ( ) ; InvokeAnyLatch latch = new InvokeAnyLatch ( taskCount ) ; ArrayList < PolicyTaskFutureImpl < T > > futures = new ArrayList < PolicyTaskFutureImpl < T > > ( taskCount ) ; try { int t = 0 ; for ( Callable < T > task : tasks ) { PolicyTaskCallback callback = callbacks == null ? null : callbacks [ t ++ ] ; PolicyExecutorImpl executor = callback == null ? this : ( PolicyExecutorImpl ) callback . getExecutor ( this ) ; long startTimeoutNS = callback == null ? startTimeout : callback . getStartTimeout ( executor . startTimeout ) ; futures . add ( new PolicyTaskFutureImpl < T > ( executor , task , callback , startTimeoutNS , latch ) ) ; } for ( PolicyTaskFutureImpl < T > taskFuture : futures ) { if ( latch . getCount ( ) == 0 ) break ; taskFuture . executor . enqueue ( taskFuture , taskFuture . executor . maxWaitForEnqueueNS . get ( ) , false ) ; } return latch . await ( - 1 , futures ) ; } catch ( RejectedExecutionException x ) { if ( x . getCause ( ) instanceof InterruptedException ) { throw ( InterruptedException ) x . getCause ( ) ; } else throw x ; } catch ( TimeoutException x ) { throw new RuntimeException ( x ) ; } finally { for ( Future < ? > f : futures ) f . cancel ( true ) ; } }
Because this method is not timed we allow an optimization where if only a single task is submitted it can run on the current thread .
162,289
void runTask ( PolicyTaskFutureImpl < ? > future ) { running . add ( future ) ; int runCount = runningCount . incrementAndGet ( ) ; try { Callback callback = cbLateStart . get ( ) ; if ( callback != null ) { long delay = future . nsQueueEnd - future . nsAcceptBegin ; if ( delay > callback . threshold && cbLateStart . compareAndSet ( callback , null ) ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) Tr . debug ( this , tc , "callback: late start " + delay + "ns > " + callback . threshold + "ns" , callback . runnable ) ; globalExecutor . submit ( callback . runnable ) ; } } callback = cbConcurrency . get ( ) ; if ( callback != null && runCount > callback . threshold && cbConcurrency . compareAndSet ( callback , null ) ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) Tr . debug ( this , tc , "callback: concurrency > " + callback . threshold , callback . runnable ) ; globalExecutor . submit ( callback . runnable ) ; } if ( state . get ( ) . canStartTask ) { future . run ( ) ; } else { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) Tr . debug ( this , tc , "Cancel task due to policy executor state " + state ) ; future . nsRunEnd = System . nanoTime ( ) ; future . cancel ( false ) ; if ( future . callback != null ) future . callback . onEnd ( future . task , future , null , true , 0 , null ) ; } } catch ( Error x ) { } catch ( RuntimeException x ) { } finally { runningCount . decrementAndGet ( ) ; running . remove ( future ) ; } }
Invoked by the policy executor thread to run a task .
162,290
private void transferOrReleasePermit ( ) { maxConcurrencyConstraint . release ( ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) Tr . debug ( this , tc , "expedites/maxConcurrency available" , expeditesAvailable , maxConcurrencyConstraint . availablePermits ( ) ) ; if ( ! queue . isEmpty ( ) && withheldConcurrency . get ( ) > 0 && maxConcurrencyConstraint . tryAcquire ( ) ) { decrementWithheldConcurrency ( ) ; if ( acquireExpedite ( ) > 0 ) expediteGlobal ( new GlobalPoolTask ( ) ) ; else enqueueGlobal ( new GlobalPoolTask ( ) ) ; } }
Releases a permit against maxConcurrency or transfers it to a worker task that runs on the global thread pool .
162,291
public void closeConnection ( ) { if ( tc . isEntryEnabled ( ) ) Tr . entry ( tc , "closeConnection" ) ; try { if ( _XAResourceFactory != null && _XARes != null ) { ( ( XAResourceFactory ) _XAResourceFactory ) . destroyXAResource ( _XARes ) ; } } catch ( Throwable t ) { FFDCFilter . processException ( t , "com.ibm.ws.Transaction.JTA.XARminst.closeConnection" , "250" , this ) ; Tr . audit ( tc , "WTRN0038_ERR_DESTROYING_XARESOURCE" , t ) ; } if ( tc . isEntryEnabled ( ) ) Tr . exit ( tc , "closeConnection" ) ; }
Close the XAConnection with the XAResource .
162,292
protected VirtualConnection readInternal ( long numBytes , TCPReadCompletedCallback readCallback , boolean forceQueue , int timeout ) { if ( timeout == IMMED_TIMEOUT ) { immediateTimeout ( ) ; return null ; } if ( timeout == ABORT_TIMEOUT ) { abort ( ) ; immediateTimeout ( ) ; return null ; } setIOAmount ( numBytes ) ; setLastIOAmt ( 0 ) ; setIODoneAmount ( 0 ) ; setReadCompletedCallback ( readCallback ) ; setForceQueue ( forceQueue ) ; setTimeoutTime ( timeout ) ; return processAsyncReadRequest ( ) ; }
internal async read entry point
162,293
public boolean isFileServingEnabled ( ) { disallowAllFileServingProp = WCCustomProperties . DISALLOW_ALL_FILE_SERVING ; if ( disallowAllFileServingProp != null && ! this . getApplicationName ( ) . equalsIgnoreCase ( "isclite" ) ) { try { if ( Boolean . valueOf ( disallowAllFileServingProp ) . booleanValue ( ) ) { this . fileServingEnabled = Boolean . FALSE ; } if ( com . ibm . ejs . ras . TraceComponent . isAnyTracingEnabled ( ) && logger . isLoggable ( Level . FINE ) ) { logger . logp ( Level . FINE , CLASS_NAME , "isFileServing" , "PK54499: disallowAllFileServingProp set to " + disallowAllFileServingProp + " for application: " + this . getApplicationName ( ) ) ; } } catch ( Exception x ) { logger . logp ( Level . SEVERE , CLASS_NAME , "isFileServing" , "Illegal value set for property com.ibm.ws.webcontainer.disallowallfileserving" ) ; } } if ( this . fileServingEnabled != null ) return this . fileServingEnabled . booleanValue ( ) ; return WCCustomProperties . FILE_SERVING_ENABLED ; }
Returns the fileServingEnabled .
162,294
public Map < String , String > getJspAttributes ( ) { if ( null == this . jspAttributes ) { this . jspAttributes = new HashMap < String , String > ( ) ; } return this . jspAttributes ; }
Returns the jspAttributes .
162,295
public IServletConfig getServletInfo ( String string ) { if ( string == null || string . isEmpty ( ) ) { Tr . debug ( tc , "getServletInfo" , "servlet name is null/empty. Use internal servlet name " + NULLSERVLETNAME ) ; string = NULLSERVLETNAME ; } return ( IServletConfig ) this . servletInfo . get ( string ) ; }
Method getServletInfo .
162,296
public boolean isServeServletsByClassnameEnabled ( ) { disallowServeServletsByClassnameProp = WCCustomProperties . DISALLOW_SERVE_SERVLETS_BY_CLASSNAME_PROP ; if ( com . ibm . ejs . ras . TraceComponent . isAnyTracingEnabled ( ) && logger . isLoggable ( Level . FINE ) ) { logger . logp ( Level . FINE , CLASS_NAME , "isServeServletsByClassnameEnabled" , "disallowServeServletsByClassnameProp = " + disallowServeServletsByClassnameProp ) ; } if ( disallowServeServletsByClassnameProp != null ) { try { if ( Boolean . valueOf ( disallowServeServletsByClassnameProp ) . booleanValue ( ) ) { this . serveServletsByClassnameEnabled = Boolean . FALSE ; } if ( com . ibm . ejs . ras . TraceComponent . isAnyTracingEnabled ( ) && logger . isLoggable ( Level . FINE ) ) { logger . logp ( Level . FINE , CLASS_NAME , "isServeServletsByClassnameEnabled" , "PK52059: disallowServeServletsByClassnameProp set to " + disallowServeServletsByClassnameProp + " for application: " + this . getApplicationName ( ) ) ; } } catch ( Exception x ) { logger . logp ( Level . SEVERE , CLASS_NAME , "isServeServletsByClassnameEnabled" , "Illegal value set for property com.ibm.ws.webcontainer.disallowserveservletsbyclassname" ) ; } } if ( com . ibm . ejs . ras . TraceComponent . isAnyTracingEnabled ( ) && logger . isLoggable ( Level . FINE ) ) { logger . logp ( Level . FINE , CLASS_NAME , "isServeServletsByClassnameEnabled" , "value = " + ( this . serveServletsByClassnameEnabled != null ? this . serveServletsByClassnameEnabled . booleanValue ( ) : WCCustomProperties . SERVE_SERVLETS_BY_CLASSNAME_ENABLED ) ) ; } if ( this . serveServletsByClassnameEnabled != null ) return this . serveServletsByClassnameEnabled . booleanValue ( ) ; return WCCustomProperties . SERVE_SERVLETS_BY_CLASSNAME_ENABLED ; }
Returns the serveServletsByClassname .
162,297
public void setMimeFilters ( HashMap mimeFilters ) { if ( mimeFilters != null && mimeFilters . size ( ) > 0 ) { this . isMimeFilteringEnabled = true ; } this . mimeFilters = mimeFilters ; }
Sets the mimeFilters .
162,298
public String getApplicationName ( ) { if ( this . applicationName != null ) return this . applicationName ; else if ( webApp != null ) return this . webApp . getApplicationName ( ) ; else return null ; }
Return the applicationName .
162,299
public void setDisableStaticMappingCache ( ) { if ( this . contextParams != null ) { String value = ( String ) this . contextParams . get ( "com.ibm.ws.webcontainer.DISABLE_STATIC_MAPPING_CACHE" ) ; if ( value != null ) { if ( value . equalsIgnoreCase ( "true" ) ) { if ( com . ibm . ejs . ras . TraceComponent . isAnyTracingEnabled ( ) && logger . isLoggable ( Level . FINE ) ) logger . logp ( Level . FINE , CLASS_NAME , "setDisableStaticMappingCache" , "cxtParam disable static mapping cache for application -> " + applicationName ) ; this . setDisableStaticMappingCache ( true ) ; } return ; } } if ( WCCustomProperties . DISABLE_STATIC_MAPPING_CACHE != null ) { String disableStaticMappingCacheApp = WCCustomProperties . DISABLE_STATIC_MAPPING_CACHE ; if ( disableStaticMappingCacheApp . equals ( "*" ) ) { if ( com . ibm . ejs . ras . TraceComponent . isAnyTracingEnabled ( ) && logger . isLoggable ( Level . FINE ) ) logger . logp ( Level . FINE , CLASS_NAME , "setDisableStaticMappingCache" , "disable static mapping cache for all apps." ) ; this . setDisableStaticMappingCache ( true ) ; return ; } else { String [ ] parsedStr = disableStaticMappingCacheApp . split ( "," ) ; for ( String toCheckStr : parsedStr ) { toCheckStr = toCheckStr . trim ( ) ; if ( applicationName != null && applicationName . equalsIgnoreCase ( toCheckStr ) ) { if ( com . ibm . ejs . ras . TraceComponent . isAnyTracingEnabled ( ) && logger . isLoggable ( Level . FINE ) ) logger . logp ( Level . FINE , CLASS_NAME , "setDisableStaticMappingCache" , "disable static mapping cache for application -> " + applicationName ) ; this . setDisableStaticMappingCache ( true ) ; return ; } } } } }
PM84305 - start