idx
int64 0
165k
| question
stringlengths 73
5.81k
| target
stringlengths 5
918
|
---|---|---|
163,500 | public void sendToMe ( SIBUuid8 targetME , int priority , AbstractMessage aMessage ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( tc , "sendToMe" , new Object [ ] { aMessage , Integer . valueOf ( priority ) , targetME } ) ; MPConnection firstChoice = findMPConnection ( targetME ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) SibTr . debug ( tc , "sendToMe" , firstChoice ) ; if ( TraceComponent . isAnyTracingEnabled ( ) ) { MECommsTrc . traceMessage ( tc , _messageProcessor , aMessage . getGuaranteedTargetMessagingEngineUUID ( ) , MECommsTrc . OP_SEND , firstChoice , aMessage ) ; } if ( firstChoice != null ) { firstChoice . send ( aMessage , priority ) ; } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( tc , "sendToMe" ) ; } | Send a ControlMessage to one specific ME |
163,501 | public void sendDownTree ( SIBUuid8 [ ] targets , int priority , AbstractMessage cMsg ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( tc , "sendDownTree" , new Object [ ] { this , cMsg , Integer . valueOf ( priority ) , targets } ) ; int length = targets . length ; MPConnection [ ] send = new MPConnection [ length ] ; int [ ] cCount = new int [ length ] ; int numSendConnections = 0 ; next : for ( int i = 0 ; i < length ; i ++ ) { SIBUuid8 targetMEUuid = targets [ i ] ; MPConnection firstChoice = findMPConnection ( targetMEUuid ) ; if ( TraceComponent . isAnyTracingEnabled ( ) ) { MECommsTrc . traceMessage ( tc , _messageProcessor , cMsg . getGuaranteedTargetMessagingEngineUUID ( ) , MECommsTrc . OP_SEND , firstChoice , cMsg ) ; } if ( firstChoice != null ) { int j = 0 ; for ( j = 0 ; ( j < i ) && ( send [ j ] != null ) ; j ++ ) { if ( send [ j ] . equals ( firstChoice ) ) { cCount [ j ] ++ ; continue next ; } } if ( j + 1 > numSendConnections ) numSendConnections = ( j + 1 ) ; send [ j ] = firstChoice ; cCount [ j ] ++ ; } } for ( int i = 0 ; i < numSendConnections ; i ++ ) { if ( send [ i ] != null ) send [ i ] . send ( cMsg , priority ) ; } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( tc , "sendDownTree" ) ; } | Send a control message to a list of MEs |
163,502 | public boolean isMEReachable ( SIBUuid8 meUuid ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( tc , "isMEReachable" , new Object [ ] { this , meUuid } ) ; boolean result = ( findMPConnection ( meUuid ) != null ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( tc , "isMEReachable" , Boolean . valueOf ( result ) ) ; return result ; } | Test whether or not a particular ME is reachable . |
163,503 | public boolean isCompatibleME ( SIBUuid8 meUuid , ProtocolVersion version ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( tc , "isCompatibleME" , new Object [ ] { meUuid } ) ; boolean result = false ; MPConnection conn = findMPConnection ( meUuid ) ; if ( conn != null ) { ProtocolVersion otherVersion = conn . getVersion ( ) ; if ( otherVersion != null && otherVersion . compareTo ( version ) >= 0 ) result = true ; } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( tc , "isCompatibleME" , Boolean . valueOf ( result ) ) ; return result ; } | Test whether or not a particular ME is of a version compatible with this one . |
163,504 | public void forceConnect ( SIBUuid8 meUuid ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( tc , "forceConnect" , meUuid ) ; if ( _routingManager != null ) _routingManager . connectToME ( meUuid ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( tc , "forceConnect" ) ; } | Can potentially block for up to 5 seconds |
163,505 | private List < SecurityConstraint > createSecurityConstraints ( SecurityMetadata securityMetadataFromDD , ServletSecurityElement servletSecurity , Collection < String > urlPatterns ) { List < SecurityConstraint > securityConstraints = new ArrayList < SecurityConstraint > ( ) ; securityConstraints . add ( getConstraintFromHttpElement ( securityMetadataFromDD , urlPatterns , servletSecurity ) ) ; securityConstraints . addAll ( getConstraintsFromHttpMethodElement ( securityMetadataFromDD , urlPatterns , servletSecurity ) ) ; return securityConstraints ; } | Constructs a list of SecurityConstraint objects from the given ServletSecurityElement and list of URL patterns . |
163,506 | private SecurityConstraint getConstraintFromHttpElement ( SecurityMetadata securityMetadataFromDD , Collection < String > urlPatterns , ServletSecurityElement servletSecurity ) { List < String > omissionMethods = new ArrayList < String > ( ) ; if ( ! servletSecurity . getMethodNames ( ) . isEmpty ( ) ) { omissionMethods . addAll ( servletSecurity . getMethodNames ( ) ) ; } WebResourceCollection webResourceCollection = new WebResourceCollection ( ( List < String > ) urlPatterns , new ArrayList < String > ( ) , omissionMethods , securityMetadataFromDD . isDenyUncoveredHttpMethods ( ) ) ; List < WebResourceCollection > webResourceCollections = new ArrayList < WebResourceCollection > ( ) ; webResourceCollections . add ( webResourceCollection ) ; return createSecurityConstraint ( securityMetadataFromDD , webResourceCollections , servletSecurity , true ) ; } | Gets the security constraint from the HttpConstraint element defined in the given ServletSecurityElement with the given list of url patterns . |
163,507 | private List < SecurityConstraint > getConstraintsFromHttpMethodElement ( SecurityMetadata securityMetadataFromDD , Collection < String > urlPatterns , ServletSecurityElement servletSecurity ) { List < SecurityConstraint > securityConstraints = new ArrayList < SecurityConstraint > ( ) ; Collection < HttpMethodConstraintElement > httpMethodConstraints = servletSecurity . getHttpMethodConstraints ( ) ; for ( HttpMethodConstraintElement httpMethodConstraint : httpMethodConstraints ) { String method = httpMethodConstraint . getMethodName ( ) ; List < String > methods = new ArrayList < String > ( ) ; methods . add ( method ) ; WebResourceCollection webResourceCollection = new WebResourceCollection ( ( List < String > ) urlPatterns , methods , new ArrayList < String > ( ) , securityMetadataFromDD . isDenyUncoveredHttpMethods ( ) ) ; List < WebResourceCollection > webResourceCollections = new ArrayList < WebResourceCollection > ( ) ; webResourceCollections . add ( webResourceCollection ) ; securityConstraints . add ( createSecurityConstraint ( securityMetadataFromDD , webResourceCollections , httpMethodConstraint , false ) ) ; } return securityConstraints ; } | Gets the security constraints from the HttpMethodConstraint elements defined in the given ServletSecurityElement with the given list of url patterns . |
163,508 | private SecurityConstraint createSecurityConstraint ( SecurityMetadata securityMetadataFromDD , List < WebResourceCollection > webResourceCollections , HttpConstraintElement httpConstraint , boolean fromHttpConstraint ) { List < String > roles = createRoles ( httpConstraint ) ; List < String > allRoles = securityMetadataFromDD . getRoles ( ) ; for ( String role : roles ) { if ( ! allRoles . contains ( role ) ) { allRoles . add ( role ) ; } } boolean sslRequired = isSSLRequired ( httpConstraint ) ; boolean accessPrecluded = isAccessPrecluded ( httpConstraint ) ; boolean accessUncovered = isAccessUncovered ( httpConstraint ) ; return new SecurityConstraint ( webResourceCollections , roles , sslRequired , accessPrecluded , fromHttpConstraint , accessUncovered ) ; } | Creates a security constraint from the given web resource collections url patterns and HttpConstraint element . |
163,509 | private boolean isSSLRequired ( HttpConstraintElement httpConstraint ) { boolean sslRequired = false ; TransportGuarantee transportGuarantee = httpConstraint . getTransportGuarantee ( ) ; if ( transportGuarantee != TransportGuarantee . NONE ) { sslRequired = true ; } return sslRequired ; } | Determines if SSL is required for the given HTTP constraint . |
163,510 | private boolean isAccessPrecluded ( HttpConstraintElement httpConstraint ) { boolean accessPrecluded = false ; String [ ] roles = httpConstraint . getRolesAllowed ( ) ; if ( roles == null || roles . length == 0 ) { if ( EmptyRoleSemantic . DENY == httpConstraint . getEmptyRoleSemantic ( ) ) accessPrecluded = true ; } return accessPrecluded ; } | Determines if access is precluded for the given HTTP constraint . |
163,511 | private boolean isAccessUncovered ( HttpConstraintElement httpConstraint ) { boolean accessUncovered = false ; String [ ] roles = httpConstraint . getRolesAllowed ( ) ; if ( roles == null || roles . length == 0 ) { if ( EmptyRoleSemantic . PERMIT == httpConstraint . getEmptyRoleSemantic ( ) ) accessUncovered = true ; } return accessUncovered ; } | Determines if access is uncovered for the given HTTP constraint . |
163,512 | private void setModuleSecurityMetaData ( Container moduleContainer , SecurityMetadata securityMetadataFromDD ) { try { WebModuleMetaData wmmd = moduleContainer . adapt ( WebModuleMetaData . class ) ; wmmd . setSecurityMetaData ( securityMetadataFromDD ) ; } catch ( UnableToAdaptException e ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "There was a problem setting the security meta data." , e ) ; } } } | Sets the given security metadata on the deployed module s web module metadata for retrieval later . |
163,513 | public void release ( ) { _applicationFactory = null ; _currentFacesContext = null ; if ( _defaultExternalContext != null ) { _defaultExternalContext . release ( ) ; _defaultExternalContext = null ; } _application = null ; _externalContext = null ; _viewRoot = null ; _renderKitFactory = null ; _elContext = null ; _exceptionHandler = null ; _cachedRenderKit = null ; _cachedRenderKitId = null ; _separatorChar = null ; if ( _attributes != null ) { _attributes . clear ( ) ; _attributes = null ; } _released = true ; FacesContext . setCurrentInstance ( null ) ; } | Releases the instance fields on FacesContextImplBase . Must be called by sub - classes when overriding it! |
163,514 | private void findMarkers ( String url , String target ) { final char [ ] data = url . toCharArray ( ) ; int i = 0 ; int lastSlash = 0 ; for ( ; i < data . length ; i ++ ) { if ( '/' == data [ i ] ) { lastSlash = i ; } else if ( '?' == data [ i ] ) { this . queryMarker = i ; break ; } } for ( i = lastSlash ; i < data . length ; i ++ ) { if ( i == this . queryMarker ) { break ; } else if ( '#' == data [ i ] ) { this . fragmentMarker = i ; break ; } else if ( ';' == data [ i ] ) { this . paramMarker = i ; if ( url . regionMatches ( i , target , 0 , target . length ( ) ) ) { this . idMarker = i ; } } } } | Scan the data for various markers including the provided session id target . |
163,515 | private void formLogout ( HttpServletRequest req , HttpServletResponse res ) throws ServletException , IOException { try { String exitPage = getValidLogoutExitPage ( req ) ; if ( exitPage != null ) { req . setAttribute ( "FormLogoutExitPage" , exitPage ) ; } authenticateApi . logout ( req , res , webAppSecurityConfig ) ; String str = null ; if ( req . getAttribute ( "SpSLOInProgress" ) == null ) { AuthenticationResult authResult = new AuthenticationResult ( AuthResult . SUCCESS , str ) ; authResult . setAuditLogoutSubject ( authenticateApi . returnSubjectOnLogout ( ) ) ; authResult . setAuditCredType ( "FORM" ) ; authResult . setAuditOutcome ( AuditEvent . OUTCOME_SUCCESS ) ; authResult . setTargetRealm ( authResult . realm ) ; Audit . audit ( Audit . EventID . SECURITY_AUTHN_TERMINATE_01 , req , authResult , Integer . valueOf ( res . getStatus ( ) ) ) ; redirectLogoutExitPage ( req , res ) ; } } catch ( ServletException se ) { String str = "ServletException: " + se . getMessage ( ) ; AuthenticationResult authResult = new AuthenticationResult ( AuthResult . FAILURE , str ) ; authResult . setAuditCredType ( "FORM" ) ; authResult . setAuditOutcome ( AuditEvent . OUTCOME_FAILURE ) ; authResult . setTargetRealm ( authResult . realm ) ; Audit . audit ( Audit . EventID . SECURITY_AUTHN_TERMINATE_01 , req , authResult , Integer . valueOf ( res . getStatus ( ) ) ) ; throw se ; } catch ( IOException ie ) { String str = "IOException: " + ie . getMessage ( ) ; AuthenticationResult authResult = new AuthenticationResult ( AuthResult . FAILURE , str ) ; authResult . setAuditCredType ( "FORM" ) ; authResult . setAuditOutcome ( AuditEvent . OUTCOME_FAILURE ) ; authResult . setTargetRealm ( authResult . realm ) ; Audit . audit ( Audit . EventID . SECURITY_AUTHN_TERMINATE_01 , req , authResult , Integer . valueOf ( res . getStatus ( ) ) ) ; throw ie ; } } | Log the user out by clearing the LTPA cookie if LTPA and SSO are enabled . Must also invalidate the http session since it contains user id and password . Finally if the user specified an exit page with a form parameter of logoutExitPage redirect to the specified page . |
163,516 | private String getValidLogoutExitPage ( HttpServletRequest req ) { boolean valid = false ; String exitPage = req . getParameter ( "logoutExitPage" ) ; if ( exitPage != null && exitPage . length ( ) != 0 ) { boolean logoutExitURLaccepted = verifyLogoutURL ( req , exitPage ) ; if ( logoutExitURLaccepted ) { exitPage = removeFirstSlash ( exitPage ) ; exitPage = compatibilityExitPage ( req , exitPage ) ; valid = true ; } } return valid == true ? exitPage : null ; } | return a logoutExitPage string suitable for redirection if one is defined and valid . else return null |
163,517 | private void useDefaultLogoutMsg ( HttpServletResponse res ) { try { PrintWriter pw = res . getWriter ( ) ; pw . println ( DEFAULT_LOGOUT_MSG ) ; } catch ( IOException e ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) Tr . debug ( tc , e . getMessage ( ) ) ; } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) Tr . debug ( tc , "No logoutExitPage specified" ) ; } | Display the default logout message . |
163,518 | private boolean isRedirectHostTheSameAsLocalHost ( String exitPage , String logoutURLhost , String hostFullName , String shortName , String ipAddress ) { String localHostIpAddress = "127.0.0.1" ; boolean acceptURL = false ; if ( logoutURLhost . equalsIgnoreCase ( "localhost" ) || logoutURLhost . equals ( localHostIpAddress ) || ( hostFullName != null && logoutURLhost . equalsIgnoreCase ( hostFullName ) ) || ( shortName != null && logoutURLhost . equalsIgnoreCase ( shortName ) ) || ( ipAddress != null && logoutURLhost . equals ( ipAddress ) ) ) { acceptURL = true ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) Tr . debug ( tc , "exitPage points to this host: all ok" ) ; } return acceptURL ; } | Check the logout URL host name with various combination of shortName full name and ipAddress . |
163,519 | private boolean isRequestURLEqualsExitPageHost ( HttpServletRequest req , String logoutURLhost ) { boolean acceptURL = false ; try { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) Tr . debug ( tc , "about to attempt matching the logout exit url with the domain of the request." ) ; StringBuffer requestURLString = req . getRequestURL ( ) ; URL requestURL = new URL ( new String ( requestURLString ) ) ; String requestURLhost = requestURL . getHost ( ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) Tr . debug ( tc , " host of the request url is: " + requestURLhost + " and the host of the logout URL is: " + logoutURLhost ) ; if ( logoutURLhost != null && requestURLhost != null && logoutURLhost . equalsIgnoreCase ( requestURLhost ) ) { acceptURL = true ; } } catch ( MalformedURLException e ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "caught Exception trying to form request URL object: " + e . getMessage ( ) ) ; } } return acceptURL ; } | Attempt to match the request URL s host with the URL for the exitPage this might be the case of a proxy URL that is used in the request . |
163,520 | public synchronized boolean makeExclusiveDependency ( int depStreamID , int exclusiveParentStreamID ) { Node depNode = root . findNode ( depStreamID ) ; Node exclusiveParentNode = root . findNode ( exclusiveParentStreamID ) ; return makeExclusiveDependency ( depNode , exclusiveParentNode ) ; } | Helper method to find the nodes given the stream IDs and then call the method that does the real work . |
163,521 | public synchronized boolean changeParent ( int depStreamID , int newPriority , int newParentStreamID , boolean exclusive ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "changeParent entry: depStreamID: " + depStreamID + " newParentStreamID: " + newParentStreamID + " exclusive: " + exclusive ) ; } Node depNode = root . findNode ( depStreamID ) ; Node newParentNode = root . findNode ( newParentStreamID ) ; if ( ( depNode == null ) || ( newParentNode == null ) ) { return false ; } if ( depNode . findNode ( newParentStreamID ) == null ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "new parent is not a dependent of the stream that is changing parents" ) ; } Node oldParent = depNode . getParent ( ) ; depNode . setParent ( newParentNode , true ) ; depNode . setPriority ( newPriority ) ; newParentNode . clearDependentsWriteCount ( ) ; newParentNode . sortDependents ( ) ; oldParent . clearDependentsWriteCount ( ) ; oldParent . sortDependents ( ) ; if ( exclusive ) { makeExclusiveDependency ( depNode , newParentNode ) ; } } else { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "new parent is a dependent of the stream that is changing parents" ) ; } Node grandParent = depNode . getParent ( ) ; Node oldDepParent = newParentNode . getParent ( ) ; newParentNode . setParent ( grandParent , true ) ; depNode . setParent ( newParentNode , true ) ; depNode . setPriority ( newPriority ) ; grandParent . clearDependentsWriteCount ( ) ; grandParent . sortDependents ( ) ; newParentNode . clearDependentsWriteCount ( ) ; newParentNode . sortDependents ( ) ; oldDepParent . clearDependentsWriteCount ( ) ; oldDepParent . sortDependents ( ) ; if ( exclusive ) { makeExclusiveDependency ( depNode , newParentNode ) ; } } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "changeParent exit: depNode on exit: " + depNode . toStringDetails ( ) ) ; } return true ; } | Implement the above spec functionality |
163,522 | private void populateTopics ( String [ ] topics ) { for ( String t : topics ) { t = t . trim ( ) ; if ( t . startsWith ( "/" ) || t . endsWith ( "/" ) || t . contains ( "//" ) || t . isEmpty ( ) ) { continue ; } checkTopicSubscribePermission ( t ) ; if ( t . equals ( "*" ) ) { wildcardTopics . add ( "" ) ; } else if ( t . endsWith ( "/*" ) ) { wildcardTopics . add ( t . substring ( 0 , t . length ( ) - 1 ) ) ; } else { discreteTopics . add ( t ) ; } } } | Parse the topic specifications into the appropriate lists . |
163,523 | private void checkTopicSubscribePermission ( String topic ) { SecurityManager sm = System . getSecurityManager ( ) ; if ( sm == null ) return ; sm . checkPermission ( new TopicPermission ( topic , SUBSCRIBE ) ) ; } | Check if the caller has permission to subscribe to events published to the specified topic . |
163,524 | void fireEvent ( ) { boolean useLock = ! isReentrant ( ) ; if ( useLock ) { lock . lock ( ) ; } EventImpl event = eventQueue . poll ( ) ; try { if ( event != null ) { fireEvent ( event ) ; } } finally { if ( useLock ) { lock . unlock ( ) ; } } } | Deliver this event to the next target handler pulled from the handlerQueue . If the handler is not reentrant the delivery will be serialized to prevent multiple threads entering the handler concurrently . |
163,525 | public Throwable getCause ( ) { if ( exceptions != null && exceptions . size ( ) > 0 ) return ( Throwable ) exceptions . get ( 0 ) ; else return null ; } | Returns the root cause exception . |
163,526 | public void addBootJars ( List < URL > urlList ) { addBootJars ( cache . getJarFiles ( kernelMf ) , urlList ) ; addBootJars ( cache . getJarFiles ( logProviderMf ) , urlList ) ; if ( osExtensionMf != null ) addBootJars ( cache . getJarFiles ( osExtensionMf ) , urlList ) ; } | Add any boot . jar resources specified by the kernel log provider or os extension definition files |
163,527 | private void addBootJars ( List < File > jarFiles , List < URL > urlList ) { for ( File jarFile : jarFiles ) { try { urlList . add ( jarFile . toURI ( ) . toURL ( ) ) ; } catch ( MalformedURLException e ) { } } } | Given the list of files add the URL for each file to the list of URLs |
163,528 | public SIMessageHandle getMessageHandle ( ) { if ( cachedMessageHandle == null ) { byte [ ] b = ( byte [ ] ) jmo . getField ( JsHdrAccess . SYSTEMMESSAGESOURCEUUID ) ; if ( b != null ) { cachedMessageHandle = new JsMessageHandleImpl ( new SIBUuid8 ( b ) , ( Long ) jmo . getField ( JsHdrAccess . SYSTEMMESSAGEVALUE ) ) ; } else { cachedMessageHandle = new JsMessageHandleImpl ( null , ( Long ) jmo . getField ( JsHdrAccess . SYSTEMMESSAGEVALUE ) ) ; } } return cachedMessageHandle ; } | Get the message handle which uniquely identifies this message . |
163,529 | final void setProducerType ( ProducerType value ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "setProducerType" , value ) ; getHdr2 ( ) . setField ( JsHdr2Access . PRODUCERTYPE , value . toByte ( ) ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "setProducerType" ) ; } | Set the value of the ProducerType field in the message header . This method is only used by message constructors so is not public final . |
163,530 | final void setJsMessageType ( MessageType value ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "setJsMessageType" , value ) ; jmo . setField ( JsHdrAccess . MESSAGETYPE , value . toByte ( ) ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "setJsMessageType" ) ; } | Set the value of the JsMessageType in the message header . This method is only used by message constructors so is not public final . |
163,531 | public final void setGuaranteedRemoteGetPrevTick ( long value ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "setGuaranteedRemoteGetPrevTick" , Long . valueOf ( value ) ) ; getHdr2 ( ) . setLongField ( JsHdr2Access . GUARANTEEDREMOTEGET_SET_PREVTICK , value ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "setGuaranteedRemoteGetPrevTick" ) ; } | Set the Guaranteed Delivery Remote Get Prev Tick value from the message . |
163,532 | final void setSubtype ( Byte value ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "setSubtype" , value ) ; jmo . setField ( JsHdrAccess . SUBTYPE , value ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "setSubtype" ) ; } | Set the Byte field which indicates the subtype of the message . |
163,533 | void copyTransients ( JsHdrsImpl copy ) { copy . cachedMessageWaitTime = cachedMessageWaitTime ; copy . cachedReliability = cachedReliability ; copy . cachedPriority = cachedPriority ; copy . cachedMessageHandle = cachedMessageHandle ; copy . flags = flags ; copy . gotFlags = gotFlags ; } | Copies any interesting transient data into the given message copy . |
163,534 | synchronized final JsMsgPart getHdr2 ( ) { if ( hdr2 == null ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) SibTr . debug ( this , tc , "getHdr2 will call getPart" ) ; hdr2 = jmo . getPart ( JsHdrAccess . HDR2 , JsHdr2Access . schema ) ; } return hdr2 ; } | Get the JsMsgPart which contains the JMF Message described by the JsHdr2 schema . Once obtained the value is cached and the cached value is returned until the cache is cleared . |
163,535 | synchronized final JsMsgPart getApi ( ) { if ( api == null ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) SibTr . debug ( this , tc , "getApi will call getPart" ) ; api = jmo . getPart ( JsHdrAccess . API_DATA , JsApiAccess . schema ) ; } return api ; } | Get the JsMsgPart which contains the JMF Message described by the JsApi schema . Once obtained the value is cached and the cached value is returned until the cache is cleared . |
163,536 | synchronized final JsMsgPart getPayload ( JMFSchema schema ) { if ( payload == null ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) SibTr . debug ( this , tc , "getPayload will call getPart" ) ; payload = jmo . getPayloadPart ( ) . getPart ( JsPayloadAccess . PAYLOAD_DATA , schema ) ; } return payload ; } | Get the JsMsgPart which contains the JMF Message described by the schema for the data field in the JsPayload Schema . Once obtained the value is cached and the cached value is returned until the cache is cleared . |
163,537 | synchronized final JsMsgPart getPayloadIfFluffed ( ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) { if ( payload == null ) SibTr . debug ( this , tc , "getPayloadIfFluffed returning null" ) ; } return payload ; } | Get the JsMsgPart which contains the JMF Message described by the schema for the data field in the JsPayload Schema if it has already been fluffed up and cached . If the part is not already fluffed and cached just return null as the caller does NOT want to fluff it up . |
163,538 | synchronized final void clearPartCaches ( ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "clearPartCaches" ) ; hdr2 = api = payload = null ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "clearPartCaches" ) ; } | Clear the cached references to other message parts . |
163,539 | private final void setFlagValue ( byte flagBit , boolean value ) { if ( value ) { flags = ( byte ) ( getFlags ( ) | flagBit ) ; } else { flags = ( byte ) ( getFlags ( ) & ( ~ flagBit ) ) ; } } | Set the boolean value of one of the flags in the FLAGS field of th message . |
163,540 | public String getValue ( FaceletContext ctx ) { if ( ( this . capabilities & EL_LITERAL ) != 0 ) { return this . value ; } else { return ( String ) this . getObject ( ctx , String . class ) ; } } | If literal then return our value otherwise delegate to getObject passing String . class . |
163,541 | public Object getObject ( FaceletContext ctx , Class type ) { if ( ( this . capabilities & EL_LITERAL ) != 0 ) { if ( String . class . equals ( type ) ) { return this . value ; } else { try { return ctx . getExpressionFactory ( ) . coerceToType ( this . value , type ) ; } catch ( Exception e ) { throw new TagAttributeException ( this , e ) ; } } } else { ValueExpression ve = this . getValueExpression ( ctx , type ) ; try { return ve . getValue ( ctx ) ; } catch ( Exception e ) { throw new TagAttributeException ( this , e ) ; } } } | If literal simply coerce our String literal value using an ExpressionFactory otherwise create a ValueExpression and evaluate it . |
163,542 | public ValueExpression getValueExpression ( FaceletContext ctx , Class type ) { AbstractFaceletContext actx = ( AbstractFaceletContext ) ctx ; Object [ ] localCachedExpression = cachedExpression ; if ( actx . isAllowCacheELExpressions ( ) && localCachedExpression != null && localCachedExpression . length == 2 ) { if ( localCachedExpression [ 0 ] == null && type == null ) { if ( ( this . capabilities & EL_CC ) != 0 ) { return ( ( LocationValueExpression ) localCachedExpression [ 1 ] ) . apply ( actx . getFaceletCompositionContext ( ) . getCompositeComponentLevel ( ) ) ; } return ( ValueExpression ) localCachedExpression [ 1 ] ; } else if ( localCachedExpression [ 0 ] != null && localCachedExpression [ 0 ] . equals ( type ) ) { if ( ( this . capabilities & EL_CC ) != 0 ) { return ( ( LocationValueExpression ) localCachedExpression [ 1 ] ) . apply ( actx . getFaceletCompositionContext ( ) . getCompositeComponentLevel ( ) ) ; } return ( ValueExpression ) localCachedExpression [ 1 ] ; } } actx . beforeConstructELExpression ( ) ; try { ExpressionFactory f = ctx . getExpressionFactory ( ) ; ValueExpression valueExpression = f . createValueExpression ( ctx , this . value , type ) ; if ( ExternalSpecifications . isUnifiedELAvailable ( ) ) { if ( actx . getFaceletCompositionContext ( ) . isWrapTagExceptionsAsContextAware ( ) ) { valueExpression = new ContextAwareTagValueExpressionUEL ( this , valueExpression ) ; } else { valueExpression = new TagValueExpressionUEL ( this , valueExpression ) ; } } else { if ( actx . getFaceletCompositionContext ( ) . isWrapTagExceptionsAsContextAware ( ) ) { valueExpression = new ContextAwareTagValueExpression ( this , valueExpression ) ; } else { valueExpression = new TagValueExpression ( this , valueExpression ) ; } } if ( ( this . capabilities & EL_CC ) != 0 ) { if ( ExternalSpecifications . isUnifiedELAvailable ( ) ) { valueExpression = new LocationValueExpressionUEL ( getLocation ( ) , valueExpression , actx . getFaceletCompositionContext ( ) . getCompositeComponentLevel ( ) ) ; } else { valueExpression = new LocationValueExpression ( getLocation ( ) , valueExpression , actx . getFaceletCompositionContext ( ) . getCompositeComponentLevel ( ) ) ; } } else if ( ( this . capabilities & EL_RESOURCE ) != 0 ) { if ( ExternalSpecifications . isUnifiedELAvailable ( ) ) { valueExpression = new ResourceLocationValueExpressionUEL ( getLocation ( ) , valueExpression ) ; } else { valueExpression = new ResourceLocationValueExpression ( getLocation ( ) , valueExpression ) ; } } if ( actx . isAllowCacheELExpressions ( ) && ! actx . isAnyFaceletsVariableResolved ( ) ) { cachedExpression = new Object [ ] { type , valueExpression } ; } return valueExpression ; } catch ( Exception e ) { throw new TagAttributeException ( this , e ) ; } finally { actx . afterConstructELExpression ( ) ; } } | Create a ValueExpression using this attribute s literal value and the passed expected type . |
163,543 | protected String stripFileSeparateAtTheEnd ( String path ) { return ( path != null && ( path . endsWith ( "/" ) || path . endsWith ( "\\" ) ) ) ? path . substring ( 0 , path . length ( ) - 1 ) : path ; } | remove separator at the end of userDir directory if exist |
163,544 | protected void renderId ( FacesContext context , UIComponent component ) throws IOException { if ( shouldRenderId ( context , component ) ) { String clientId = getClientId ( context , component ) ; context . getResponseWriter ( ) . writeAttribute ( HTML . ID_ATTR , clientId , JSFAttr . ID_ATTR ) ; } } | Renders the client ID as an id . |
163,545 | protected boolean shouldRenderId ( FacesContext context , UIComponent component ) { String id = component . getId ( ) ; if ( id == null ) { return false ; } if ( id . startsWith ( UIViewRoot . UNIQUE_ID_PREFIX ) ) { return false ; } return true ; } | Returns true if the component should render an ID . Components that deliver events should always return true . |
163,546 | static public String toUri ( Object o ) { if ( o == null ) { return null ; } String uri = o . toString ( ) ; if ( uri . startsWith ( "/" ) ) { if ( uri . startsWith ( "//" ) ) { uri = uri . substring ( 1 ) ; } else { FacesContext fContext = FacesContext . getCurrentInstance ( ) ; uri = fContext . getExternalContext ( ) . getRequestContextPath ( ) + uri ; } } return uri ; } | Coerces an object into a URI accounting for JSF rules with initial slashes . |
163,547 | public ValueExpression resolveVariable ( String variable ) { ValueExpression ve = null ; try { if ( _vars != null ) { ve = ( ValueExpression ) _vars . get ( variable ) ; if ( _trackResolveVariables && ve != null ) { _variableResolved = true ; } } if ( ve == null ) { return _target . resolveVariable ( variable ) ; } return ve ; } catch ( StackOverflowError e ) { throw new ELException ( "Could not Resolve Variable [Overflow]: " + variable , e ) ; } } | First tries to resolve agains the inner Map then the wrapped ValueExpression . |
163,548 | public String [ ] introspectSelf ( ) { List < ? > nameValuePairs = Arrays . asList ( BEGIN_TRAN_FOR_SCROLLING_APIS , beginTranForResultSetScrollingAPIs , BEGIN_TRAN_FOR_VENDOR_APIS , beginTranForVendorAPIs , COMMIT_OR_ROLLBACK_ON_CLEANUP , commitOrRollbackOnCleanup , CONNECTION_SHARING , connectionSharing , DataSourceDef . isolationLevel . name ( ) , isolationLevel , ResourceFactory . JNDI_NAME , jndiName , ENABLE_CONNECTION_CASTING , enableConnectionCasting , QUERY_TIMEOUT , queryTimeout , STATEMENT_CACHE_SIZE , statementCacheSize , SUPPLEMENTAL_JDBC_TRACE , supplementalJDBCTrace , SYNC_QUERY_TIMEOUT_WITH_TRAN_TIMEOUT , syncQueryTimeoutWithTransactionTimeout , DataSourceDef . transactional . name ( ) , transactional ) ; return new String [ ] { toString ( ) , nameValuePairs . toString ( ) , PropertyService . hidePasswords ( vendorProps ) . toString ( ) } ; } | Returns information to log on first failure . |
163,549 | public final static ControlMessageType getControlMessageType ( Byte aValue ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) SibTr . debug ( tc , "Value = " + aValue ) ; return set [ aValue . intValue ( ) ] ; } | Returns the corresponding ControlMessageType for a given integer . This method should NOT be called by any code outside the MFP component . It is only public so that it can be accessed by sub - packages . |
163,550 | public void updateDefinition ( ForeignBusDefinition foreignBusDefinition ) throws SIResourceException { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( tc , "updateDefinition" , foreignBusDefinition ) ; ForeignDestinationDefault newForeignDefault = null ; updateSendAllowed ( _foreignBusDefinition . getSendAllowed ( ) , foreignBusDefinition . getSendAllowed ( ) ) ; try { VirtualLinkDefinition vld = foreignBusDefinition . getLinkForNextHop ( ) ; updateVirtualLinkDefinition ( vld ) ; newForeignDefault = foreignBusDefinition . getDestinationDefault ( ) ; _foreignDestinationDefault = newForeignDefault ; _foreignBusDefinition = foreignBusDefinition ; } catch ( SIBExceptionObjectNotFound e ) { FFDCFilter . processException ( e , "com.ibm.ws.sib.processor.impl.BusHandler.updateDefinition" , "1:242:1.54" , this ) ; SibTr . exception ( tc , e ) ; } catch ( SIBExceptionNoLinkExists e ) { FFDCFilter . processException ( e , "com.ibm.ws.sib.processor.impl.BusHandler.updateDefinition" , "1:254:1.54" , this ) ; SibTr . exception ( tc , e ) ; } catch ( SIIncorrectCallException e ) { FFDCFilter . processException ( e , "com.ibm.ws.sib.processor.impl.BusHandler.updateDefinition" , "1:266:1.54" , this ) ; SibTr . exception ( tc , e ) ; } catch ( SIBExceptionBusNotFound e ) { FFDCFilter . processException ( e , "com.ibm.ws.sib.processor.impl.BusHandler.updateDefinition" , "1:278:1.54" , this ) ; SibTr . exception ( tc , e ) ; } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( tc , "updateDefinition" ) ; } | Dynamically update the foreignBusDefinition |
163,551 | public void updateSendAllowed ( boolean oldSendAllowed , boolean newSendAllowed ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( tc , "updateSendAllowed" , new Object [ ] { Boolean . valueOf ( oldSendAllowed ) , Boolean . valueOf ( newSendAllowed ) } ) ; if ( oldSendAllowed && ! newSendAllowed ) setForeignBusSendAllowed ( false ) ; else if ( ! oldSendAllowed && newSendAllowed ) setForeignBusSendAllowed ( true ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( tc , "updateSendAllowed" ) ; } | Update sendAllowed setting for this bus and any targetting Handlers . |
163,552 | public void updateVirtualLinkDefinition ( VirtualLinkDefinition newVirtualLinkDefinition ) throws SIIncorrectCallException , SIResourceException { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( tc , "updateVirtualLinkDefinition" , new Object [ ] { newVirtualLinkDefinition } ) ; LinkHandler lh = ( LinkHandler ) _targetDestinationHandler ; LocalTransaction transaction = txManager . createLocalTransaction ( true ) ; try { lh . updateLinkDefinition ( newVirtualLinkDefinition , transaction ) ; transaction . commit ( ) ; } catch ( SIResourceException e ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( tc , "updateVirtualLinkDefinition" , e ) ; try { transaction . rollback ( ) ; } catch ( Throwable et ) { FFDCFilter . processException ( e , "com.ibm.ws.sib.processor.impl.BusHandler.updateVirtualLinkDefinition" , "1:359:1.54" , this ) ; SibTr . exception ( tc , et ) ; } throw e ; } catch ( RuntimeException e ) { FFDCFilter . processException ( e , "com.ibm.ws.sib.processor.impl.BusHandler.updateVirtualLinkDefinition" , "1:373:1.54" , this ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) { SibTr . exception ( tc , e ) ; SibTr . exit ( tc , "updateVirtualLinkDefinition" , e ) ; } try { transaction . rollback ( ) ; } catch ( Throwable et ) { FFDCFilter . processException ( e , "com.ibm.ws.sib.processor.impl.BusHandler.updateVirtualLinkDefinition" , "1:392:1.54" , this ) ; SibTr . exception ( tc , et ) ; } throw e ; } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( tc , "updateVirtualLinkDefinition" ) ; } | Update VirtualLinkDefinition attributes such as inbound or outbound userid settings for this bus and any targetting Handlers . |
163,553 | public boolean checkDestinationAccess ( SecurityContext secContext , OperationType operation ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( tc , "checkDestinationAccess" , new Object [ ] { secContext , operation } ) ; boolean allow = false ; if ( accessChecker . checkForeignBusAccess ( secContext , getName ( ) , operation ) ) { allow = true ; } if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( tc , "checkDestinationAccess" , Boolean . valueOf ( allow ) ) ; return allow ; } | Check permission to access a Destination |
163,554 | @ FFDCIgnore ( NullPointerException . class ) private void addEventToRingBuffer ( Object event ) { if ( ringBuffer != null ) { try { ringBuffer . add ( event ) ; } catch ( NullPointerException npe ) { } } } | Method to add events to the ringBufferthat and ignores a possible NPE with ringBuffer which is due to the removeHandler method call from this same class |
163,555 | public synchronized void addSyncHandler ( SynchronousHandler syncHandler ) { if ( earlyMessageQueue != null && earlyMessageQueue . size ( ) != 0 && ! synchronousHandlerSet . contains ( syncHandler ) ) { for ( Object message : earlyMessageQueue . toArray ( ) ) { if ( message != null ) { syncHandler . synchronousWrite ( message ) ; } } } Set < SynchronousHandler > synchronousHandlerSetCopy = new HashSet < SynchronousHandler > ( synchronousHandlerSet ) ; synchronousHandlerSetCopy . add ( syncHandler ) ; Tr . event ( tc , "Added Synchronous Handler: " + syncHandler . getHandlerName ( ) ) ; synchronousHandlerSet = synchronousHandlerSetCopy ; } | Add a synchronousHandler that will receive log events directly |
163,556 | public synchronized void removeSyncHandler ( SynchronousHandler syncHandler ) { Set < SynchronousHandler > synchronousHandlerSetCopy = new HashSet < SynchronousHandler > ( synchronousHandlerSet ) ; synchronousHandlerSetCopy . remove ( syncHandler ) ; Tr . event ( tc , "Removed Synchronous Handler: " + syncHandler . getHandlerName ( ) ) ; synchronousHandlerSet = synchronousHandlerSetCopy ; } | Remove a synchronousHandler from receiving log events directly |
163,557 | public synchronized void removeHandler ( String handlerId ) { handlerEventMap . remove ( handlerId ) ; Tr . event ( tc , "Removed Asynchronous Handler: " + handlerId ) ; if ( handlerEventMap . isEmpty ( ) ) { ringBuffer = null ; Tr . event ( tc , "ringBuffer for this BufferManagerImpl has now been set to null" ) ; } } | Remove the given handlerId from this BufferManager |
163,558 | public static EJBSerializer instance ( ) { EJBSerializer theInstance ; synchronized ( CLASS_NAME ) { if ( cvInstance == null ) { try { cvInstance = ( EJBSerializer ) Class . forName ( IMPL_CLASS_NAME ) . newInstance ( ) ; } catch ( Throwable t ) { FFDCFilter . processException ( t , CLASS_NAME + ".cvInstance" , "46" ) ; } } theInstance = cvInstance ; } return theInstance ; } | Returns singleton instance . |
163,559 | public void initializeAppCounters ( String appName ) { if ( StatsFactory . isPMIEnabled ( ) ) { synchronized ( this ) { appPmi = new WebAppModule ( appName , true ) ; appPmiState = APP_PMI_WEB ; } } } | This method initialize the module instance and register it . |
163,560 | protected List < AuthorizationValue > transform ( List < AuthorizationValue > input ) { if ( input == null ) { return null ; } List < AuthorizationValue > output = new ArrayList < > ( ) ; for ( AuthorizationValue value : input ) { AuthorizationValue v = new AuthorizationValue ( ) ; v . setKeyName ( value . getKeyName ( ) ) ; v . setValue ( value . getValue ( ) ) ; v . setType ( value . getType ( ) ) ; output . add ( v ) ; } return output ; } | Transform the swagger - model version of AuthorizationValue into a parser - specific one to avoid dependencies across extensions |
163,561 | static < T > T ensureNotNull ( String msg , T t ) throws ClassLoadingConfigurationException { ensure ( msg , t != null ) ; return t ; } | Check that the parameter is not null . |
163,562 | static < T > String join ( Iterable < T > elems , String delim ) { if ( elems == null ) return "" ; StringBuilder result = new StringBuilder ( ) ; for ( T elem : elems ) result . append ( elem ) . append ( delim ) ; if ( result . length ( ) > 0 ) result . setLength ( result . length ( ) - delim . length ( ) ) ; return result . toString ( ) ; } | Join several objects into a string |
163,563 | static < T > Enumeration < T > compose ( Enumeration < T > e1 , Enumeration < T > e2 ) { return isEmpty ( e1 ) ? e2 : isEmpty ( e2 ) ? e1 : new CompositeEnumeration < T > ( e1 ) . add ( e2 ) ; } | Compose two enumerations into one . |
163,564 | public synchronized void add ( int requestId , ReceiveListener rl , SendListener s ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "add" , new Object [ ] { "" + requestId , rl , s } ) ; if ( containsId ( requestId ) ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) debugTraceTable ( "id (" + requestId + ") already in table" ) ; throw new SIErrorException ( nls . getFormattedMessage ( "REQIDTABLE_INTERNAL_SICJ0058" , null , "REQIDTABLE_INTERNAL_SICJ0058" ) ) ; } RequestIdTableEntry newEntry = new RequestIdTableEntry ( requestId , rl , s ) ; table . put ( newEntry , newEntry ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "add" ) ; } | Adds an entry to the request ID table using the specified request ID . |
163,565 | public synchronized SendListener getSendListener ( int requestId ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "getSendListener" , "" + requestId ) ; if ( ! containsId ( requestId ) ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) debugTraceTable ( "id (" + requestId + ") not in table" ) ; throw new SIErrorException ( nls . getFormattedMessage ( "REQIDTABLE_INTERNAL_SICJ0058" , null , "REQIDTABLE_INTERNAL_SICJ0058" ) ) ; } testReqIdTableEntry . requestId = requestId ; RequestIdTableEntry entry = table . get ( testReqIdTableEntry ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "getSendListener" , entry . sendListener ) ; return entry . sendListener ; } | Returns the semaphore assocaited with the specified request ID . The request ID must be present in the table otherwise a runtime exception is thrown . |
163,566 | public synchronized ReceiveListener getListener ( int requestId ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "getListener" , "" + requestId ) ; if ( ! containsId ( requestId ) ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isDebugEnabled ( ) ) debugTraceTable ( "id (" + requestId + ") not in table" ) ; throw new SIErrorException ( nls . getFormattedMessage ( "REQIDTABLE_INTERNAL_SICJ0058" , null , "REQIDTABLE_INTERNAL_SICJ0058" ) ) ; } testReqIdTableEntry . requestId = requestId ; RequestIdTableEntry entry = table . get ( testReqIdTableEntry ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "getListener" , entry . receiveListener ) ; return entry . receiveListener ; } | Returns the receive listener associated with the specified request ID . The request ID must be present in the table otherwise a runtime exception will be thrown . |
163,567 | public synchronized boolean containsId ( int requestId ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "containsId" , "" + requestId ) ; testReqIdTableEntry . requestId = requestId ; boolean result = table . containsKey ( testReqIdTableEntry ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "containsId" , "" + result ) ; return result ; } | Tests to see if the table contains a specified request ID . |
163,568 | public synchronized Iterator receiveListenerIterator ( ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "receiveListenerIterator" ) ; final LinkedList < ReceiveListener > linkedList = new LinkedList < ReceiveListener > ( ) ; final Iterator iterator = table . values ( ) . iterator ( ) ; while ( iterator . hasNext ( ) ) { final RequestIdTableEntry tableEntry = ( RequestIdTableEntry ) iterator . next ( ) ; if ( tableEntry . receiveListener != null ) linkedList . add ( tableEntry . receiveListener ) ; } final Iterator result = linkedList . iterator ( ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "receiveListenerIterator" , result ) ; return result ; } | Returns an iterator which iterates over receive listeners in the table . |
163,569 | public synchronized Iterator sendListenerIterator ( ) { if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . entry ( this , tc , "sendListenerIterator" ) ; final LinkedList < SendListener > linkedList = new LinkedList < SendListener > ( ) ; final Iterator iterator = table . values ( ) . iterator ( ) ; while ( iterator . hasNext ( ) ) { final RequestIdTableEntry tableEntry = ( RequestIdTableEntry ) iterator . next ( ) ; if ( tableEntry . sendListener != null ) linkedList . add ( tableEntry . sendListener ) ; } final Iterator result = linkedList . iterator ( ) ; if ( TraceComponent . isAnyTracingEnabled ( ) && tc . isEntryEnabled ( ) ) SibTr . exit ( this , tc , "sendListenerIterator" , result ) ; return result ; } | Returns an iterator which iterates over the send listeners in the table . |
163,570 | protected List < String > getFileLocationsFromSubsystemContent ( String subsystemContent ) { String sc = subsystemContent + "," ; List < String > files = new ArrayList < String > ( ) ; boolean isFile = false ; String location = null ; int strLen = sc . length ( ) ; boolean quoted = false ; for ( int i = 0 , pos = 0 ; i < strLen ; i ++ ) { char c = sc . charAt ( i ) ; if ( ! quoted && ( c == ';' || c == ',' ) ) { String str = sc . substring ( pos , i ) ; pos = i + 1 ; if ( logger . isLoggable ( Level . FINE ) ) { logger . fine ( "element : " + str ) ; } if ( str . contains ( ":=" ) ) { if ( getKey ( str ) . equals ( HDR_ATTR_LOCATION ) ) { location = getValue ( str ) ; } } else if ( str . contains ( "=" ) ) { if ( getKey ( str ) . equals ( HDR_ATTR_TYPE ) && getValue ( str ) . equals ( HDR_ATTR_VALUE_FILE ) ) { isFile = true ; } } if ( c == ',' ) { if ( isFile && location != null ) { if ( logger . isLoggable ( Level . FINE ) ) { logger . fine ( "location : " + location ) ; } files . add ( location ) ; } location = null ; isFile = false ; } } else if ( c == '\"' ) { quoted = ! quoted ; } } return files ; } | returns the list of location attribute of which type is file in the given text of Subsystem - Content . the location may or may not be an absolute path . If there is not a mathing data returns empty List . |
163,571 | protected String getValue ( String str ) { int index = str . indexOf ( '=' ) ; String value = null ; if ( index > 0 ) { value = str . substring ( index + 1 ) . trim ( ) ; if ( value . charAt ( 0 ) == '\"' ) { value = value . substring ( 1 , value . length ( ) - 1 ) ; } } return value ; } | returns the value of key = value pair . if the value is quoted the quotation characters are stripped . |
163,572 | protected String getFeatureSymbolicName ( Attributes attrs ) { String output = null ; if ( attrs != null ) { String value = attrs . getValue ( HDR_SUB_SYM_NAME ) ; if ( value != null ) { String [ ] parts = value . split ( ";" ) ; if ( parts . length > 0 ) { output = parts [ 0 ] . trim ( ) ; } } } return output ; } | returns the feature symbolic name from Attribute object . |
163,573 | protected String getFeatureName ( Attributes attrs ) { String output = null ; if ( attrs != null ) { String value = attrs . getValue ( HDR_SUB_SHORT_NAME ) ; if ( value != null ) { output = value . trim ( ) ; } else { output = getFeatureSymbolicName ( attrs ) ; } } return output ; } | returns the feature name from Attribute object . if IBM - ShortName exists use this value otherwise use the symbolic name . |
163,574 | protected String getLocalizedString ( File featureManifest , String value ) { if ( value != null && value . startsWith ( "%" ) ) { ResourceBundle res = CustomUtils . getResourceBundle ( new File ( featureManifest . getParentFile ( ) , "l10n" ) , featureSymbolicName , Locale . getDefault ( ) ) ; if ( res != null ) { String loc = res . getString ( value . substring ( 1 ) ) ; if ( loc != null ) { value = loc ; } } } return value ; } | returns the localized string of specified value . the localization file supposes to be located the l10n directory of the location where the feature manifest file exists and the name of the resource file is feature symbolic name + _ + locale + . properties . prior to call this method featureSymbolicName field needs to be set . |
163,575 | public ManagedObject injectAndPostConstruct ( final Object target ) throws InjectionException { final String METHOD_NAME = "injectAndPostConstruct" ; if ( TraceComponent . isAnyTracingEnabled ( ) && logger . isLoggable ( Level . FINE ) ) { logger . entering ( CLASS_NAME , METHOD_NAME , target ) ; } ManagedObject r = inject ( target ) ; Throwable t = this . invokeAnnotTypeOnObjectAndHierarchy ( target , ANNOT_TYPE . POST_CONSTRUCT ) ; if ( null != t ) { if ( TraceComponent . isAnyTracingEnabled ( ) && logger . isLoggable ( Level . FINE ) ) { logger . logp ( Level . FINE , CLASS_NAME , METHOD_NAME , "Exception caught during post construct processing: " + t ) ; } if ( t instanceof InjectionException ) { InjectionException ie = ( InjectionException ) t ; throw ie ; } else { RuntimeException re = new RuntimeException ( t ) ; throw re ; } } if ( TraceComponent . isAnyTracingEnabled ( ) && logger . isLoggable ( Level . FINE ) ) { logger . exiting ( CLASS_NAME , METHOD_NAME , r ) ; } return r ; } | This method injects the target object then immediately performs PostConstruct operations |
163,576 | @ FFDCIgnore ( IOException . class ) public static Map < String , Object > parseExtensions ( Extension [ ] extensions ) { final Map < String , Object > map = new HashMap < String , Object > ( ) ; for ( Extension extension : extensions ) { final String name = extension . name ( ) ; final String key = name . length ( ) > 0 ? StringUtils . prependIfMissing ( name , "x-" ) : name ; Object value = null ; try { value = Json . mapper ( ) . readTree ( extension . value ( ) ) ; } catch ( IOException e ) { value = extension . value ( ) ; } map . put ( key , value ) ; } return map ; } | Collects extensions . |
163,577 | protected String add_escapes ( String str ) { StringBuffer retval = new StringBuffer ( ) ; char ch ; for ( int i = 0 ; i < str . length ( ) ; i ++ ) { switch ( str . charAt ( i ) ) { case 0 : continue ; case '\b' : retval . append ( "\\b" ) ; continue ; case '\t' : retval . append ( "\\t" ) ; continue ; case '\n' : retval . append ( "\\n" ) ; continue ; case '\f' : retval . append ( "\\f" ) ; continue ; case '\r' : retval . append ( "\\r" ) ; continue ; case '\"' : retval . append ( "\\\"" ) ; continue ; case '\'' : retval . append ( "\\\'" ) ; continue ; case '\\' : retval . append ( "\\\\" ) ; continue ; default : if ( ( ch = str . charAt ( i ) ) < 0x20 || ch > 0x7e ) { String s = "0000" + Integer . toString ( ch , 16 ) ; retval . append ( "\\u" + s . substring ( s . length ( ) - 4 , s . length ( ) ) ) ; } else { retval . append ( ch ) ; } continue ; } } return retval . toString ( ) ; } | Used to convert raw characters to their escaped version when these raw version cannot be used as part of an ASCII string literal . |
163,578 | public void checkWritePermission ( TimedDirContext ctx ) throws OperationNotSupportedException { if ( ! iWriteToSecondary ) { String providerURL = getProviderURL ( ctx ) ; if ( ! getPrimaryURL ( ) . equalsIgnoreCase ( providerURL ) ) { String msg = Tr . formatMessage ( tc , WIMMessageKey . WRITE_TO_SECONDARY_SERVERS_NOT_ALLOWED , WIMMessageHelper . generateMsgParms ( providerURL ) ) ; throw new OperationNotSupportedException ( WIMMessageKey . WRITE_TO_SECONDARY_SERVERS_NOT_ALLOWED , msg ) ; } } } | Check whether we can write on the LDAP server the context is currently connected to . It is not permissible to write to a fail - over server if write to secondary is disabled . |
163,579 | @ FFDCIgnore ( NamingException . class ) private void closeContextPool ( List < TimedDirContext > contexts ) { final String METHODNAME = "closeContextPool" ; if ( contexts != null ) { if ( tc . isDebugEnabled ( ) ) { Tr . debug ( tc , METHODNAME + " Context pool being closed by " + Thread . currentThread ( ) + ", Context pool size=" + contexts . size ( ) ) ; } for ( int i = 0 ; i < contexts . size ( ) ; i ++ ) { TimedDirContext context = contexts . get ( i ) ; try { context . close ( ) ; iLiveContexts -- ; } catch ( NamingException e ) { if ( tc . isDebugEnabled ( ) ) Tr . debug ( tc , METHODNAME + " Can not close LDAP connection: " + e . toString ( true ) ) ; } } } } | Close the context pool . |
163,580 | private void createContextPool ( Integer poolSize , String providerURL ) throws NamingException { final String METHODNAME = "createContextPool" ; if ( providerURL == null ) { providerURL = getPrimaryURL ( ) ; } if ( poolSize == null ) { poolSize = DEFAULT_INIT_POOL_SIZE ; } if ( iContextPoolEnabled ) { long currentTimeMillisec = System . currentTimeMillis ( ) ; long currentTimeSeconds = roundToSeconds ( currentTimeMillisec ) ; if ( currentTimeMillisec - iPoolCreateTimestampMillisec > 1000 ) { List < TimedDirContext > contexts = new Vector < TimedDirContext > ( poolSize ) ; Hashtable < String , Object > env = getEnvironment ( URLTYPE_SEQUENCE , providerURL ) ; String currentURL = null ; try { for ( int i = 0 ; i < poolSize ; i ++ ) { TimedDirContext ctx = createDirContext ( env , currentTimeSeconds ) ; currentURL = getProviderURL ( ctx ) ; if ( ! providerURL . equalsIgnoreCase ( currentURL ) ) { env = getEnvironment ( URLTYPE_SEQUENCE , currentURL ) ; providerURL = currentURL ; } contexts . add ( ctx ) ; } } catch ( NamingException e ) { if ( tc . isDebugEnabled ( ) ) { Tr . debug ( tc , METHODNAME + " Context Pool creation FAILED for " + Thread . currentThread ( ) + ", iLiveContext=" + iLiveContexts , e ) ; } if ( tc . isDebugEnabled ( ) ) { Tr . debug ( tc , METHODNAME + " Cleanup contexts in temp pool: " + contexts . size ( ) ) ; } for ( int j = 0 ; j < contexts . size ( ) ; j ++ ) { try { TimedDirContext ctx = contexts . get ( j ) ; ctx . close ( ) ; } catch ( Exception ee ) { } } throw e ; } iLiveContexts += poolSize ; setActiveURL ( providerURL ) ; List < TimedDirContext > oldCtxs = iContexts ; iContexts = contexts ; iPoolCreateTimestampSeconds = currentTimeSeconds ; iPoolCreateTimestampMillisec = currentTimeMillisec ; closeContextPool ( oldCtxs ) ; if ( tc . isDebugEnabled ( ) ) { Tr . debug ( tc , METHODNAME + " Active Provider URL: " + getActiveURL ( ) ) ; Tr . debug ( tc , METHODNAME + " ContextPool: total=" + iLiveContexts + ", poolSize=" + iContexts . size ( ) , ", iPoolCreateTimestampSeconds=" + iPoolCreateTimestampSeconds ) ; } } else if ( tc . isDebugEnabled ( ) ) { Tr . debug ( tc , METHODNAME + " Pool has already been purged within past second... skipping purge" ) ; } } else { setActiveURL ( providerURL ) ; } } | Create a directory context pool of the specified size . |
163,581 | public DirContext createSubcontext ( String name , Attributes attrs ) throws OperationNotSupportedException , WIMSystemException , EntityAlreadyExistsException , EntityNotFoundException { final String METHODNAME = "createSubcontext" ; DirContext dirContext = null ; TimedDirContext ctx = getDirContext ( ) ; checkWritePermission ( ctx ) ; try { try { long startTime = System . currentTimeMillis ( ) ; dirContext = ctx . createSubcontext ( new LdapName ( name ) , attrs ) ; long endTime = System . currentTimeMillis ( ) ; if ( ( endTime - startTime ) > LDAP_CONNECT_TIMEOUT_TRACE ) { if ( tc . isDebugEnabled ( ) ) Tr . debug ( tc , METHODNAME + " **LDAPConnect time: " + ( endTime - startTime ) + " ms, lock held " + Thread . holdsLock ( iLock ) + ", principal=" + name ) ; } else { handleBindStat ( endTime - startTime ) ; } } catch ( NamingException e ) { if ( ! isConnectionException ( e ) ) { throw e ; } ctx = reCreateDirContext ( ctx , e . toString ( ) ) ; long startTime = System . currentTimeMillis ( ) ; dirContext = ctx . createSubcontext ( new LdapName ( name ) , attrs ) ; long endTime = System . currentTimeMillis ( ) ; if ( ( endTime - startTime ) > LDAP_CONNECT_TIMEOUT_TRACE ) { if ( tc . isDebugEnabled ( ) ) Tr . debug ( tc , METHODNAME + " **LDAPConnect time: " + ( endTime - startTime ) + " ms, lock held " + Thread . holdsLock ( iLock ) + ", principal=" + name ) ; } else { handleBindStat ( endTime - startTime ) ; } } } catch ( NameAlreadyBoundException e ) { String msg = Tr . formatMessage ( tc , WIMMessageKey . ENTITY_ALREADY_EXIST , WIMMessageHelper . generateMsgParms ( name ) ) ; throw new EntityAlreadyExistsException ( WIMMessageKey . ENTITY_ALREADY_EXIST , msg , e ) ; } catch ( NameNotFoundException e ) { String msg = Tr . formatMessage ( tc , WIMMessageKey . PARENT_NOT_FOUND , WIMMessageHelper . generateMsgParms ( e . toString ( true ) ) ) ; throw new EntityNotFoundException ( WIMMessageKey . PARENT_NOT_FOUND , msg , e ) ; } catch ( NamingException e ) { String msg = Tr . formatMessage ( tc , WIMMessageKey . NAMING_EXCEPTION , WIMMessageHelper . generateMsgParms ( e . toString ( true ) ) ) ; throw new WIMSystemException ( WIMMessageKey . NAMING_EXCEPTION , msg , e ) ; } finally { releaseDirContext ( ctx ) ; } return dirContext ; } | Creates and binds a new context along with associated attributes . |
163,582 | public void destroySubcontext ( String name ) throws EntityHasDescendantsException , EntityNotFoundException , WIMSystemException { TimedDirContext ctx = getDirContext ( ) ; try { try { ctx . destroySubcontext ( new LdapName ( name ) ) ; } catch ( NamingException e ) { if ( ! isConnectionException ( e ) ) { throw e ; } ctx = reCreateDirContext ( ctx , e . toString ( ) ) ; ctx . destroySubcontext ( new LdapName ( name ) ) ; } } catch ( ContextNotEmptyException e ) { String msg = Tr . formatMessage ( tc , WIMMessageKey . ENTITY_HAS_DESCENDENTS , WIMMessageHelper . generateMsgParms ( name ) ) ; throw new EntityHasDescendantsException ( WIMMessageKey . ENTITY_HAS_DESCENDENTS , msg , e ) ; } catch ( NameNotFoundException e ) { String msg = Tr . formatMessage ( tc , WIMMessageKey . LDAP_ENTRY_NOT_FOUND , WIMMessageHelper . generateMsgParms ( name , e . toString ( true ) ) ) ; throw new EntityNotFoundException ( WIMMessageKey . LDAP_ENTRY_NOT_FOUND , msg , e ) ; } catch ( NamingException e ) { String msg = Tr . formatMessage ( tc , WIMMessageKey . NAMING_EXCEPTION , WIMMessageHelper . generateMsgParms ( e . toString ( true ) ) ) ; throw new WIMSystemException ( WIMMessageKey . NAMING_EXCEPTION , msg , e ) ; } finally { releaseDirContext ( ctx ) ; } } | Delete the given name from the LDAP tree . |
163,583 | private static String formatIPv6Addr ( String host ) { if ( host == null ) { return null ; } else { return ( new StringBuilder ( ) ) . append ( "[" ) . append ( host ) . append ( "]" ) . toString ( ) ; } } | Format the given address as an IPv6 Address . |
163,584 | @ SuppressWarnings ( "unchecked" ) private Hashtable < String , Object > getEnvironment ( int type , String startingURL ) { Hashtable < String , Object > env = new Hashtable < String , Object > ( iEnvironment ) ; List < String > urlList = ( List < String > ) env . remove ( ENVKEY_URL_LIST ) ; int numURLs = urlList . size ( ) ; int startingURLIndex = getURLIndex ( startingURL , urlList ) ; String ldapUrl = null ; for ( int i = startingURLIndex ; i < startingURLIndex + numURLs ; i ++ ) { if ( i > startingURLIndex ) ldapUrl = ldapUrl + " " + urlList . get ( i % numURLs ) ; else ldapUrl = urlList . get ( i % numURLs ) ; if ( type == URLTYPE_SINGLE ) break ; } env . put ( Context . PROVIDER_URL , ldapUrl ) ; env . remove ( ENVKEY_ACTIVE_URL ) ; return env ; } | Returns LDAP environment containing specified URL sequence . |
163,585 | @ SuppressWarnings ( "unchecked" ) private List < String > getEnvURLList ( ) { return ( List < String > ) iEnvironment . get ( ENVKEY_URL_LIST ) ; } | Helper method to get the configured list of URLs . |
163,586 | private String getNextURL ( String currentURL ) { List < String > urlList = getEnvURLList ( ) ; int urlIndex = getURLIndex ( currentURL , urlList ) ; return urlList . get ( ( urlIndex + 1 ) % urlList . size ( ) ) ; } | Returns the next URL after the specified URL . |
163,587 | @ FFDCIgnore ( NamingException . class ) private String getProviderURL ( TimedDirContext ctx ) { try { return ( String ) ctx . getEnvironment ( ) . get ( Context . PROVIDER_URL ) ; } catch ( NamingException e ) { if ( tc . isDebugEnabled ( ) ) { Tr . debug ( tc , "getProviderURL" , e . toString ( true ) ) ; } return "(null)" ; } } | Get the provider URL from the given directory context . |
163,588 | private int getURLIndex ( String url , List < String > urlList ) { int urlIndex = 0 ; int numURLs = urlList . size ( ) ; if ( url != null ) for ( int i = 0 ; i < numURLs ; i ++ ) if ( ( urlList . get ( i ) ) . equalsIgnoreCase ( url ) ) { urlIndex = i ; break ; } return urlIndex ; } | Returns URL index in the URL list . |
163,589 | private void handleBindStat ( long elapsedTime ) { String METHODNAME = "handleBindStat(long)" ; if ( elapsedTime < LDAP_CONNECT_TIMEOUT_TRACE ) { QUICK_LDAP_BIND . getAndIncrement ( ) ; } long now = System . currentTimeMillis ( ) ; if ( now - LDAP_STATS_TIMER . get ( ) > 1800000 ) { long lastUpdated = LDAP_STATS_TIMER . getAndSet ( now ) ; if ( now - lastUpdated > 1800000 ) { if ( tc . isDebugEnabled ( ) ) Tr . debug ( tc , METHODNAME + " **LDAPBindStat: " + QUICK_LDAP_BIND . get ( ) + " binds took less then " + LDAP_CONNECT_TIMEOUT_TRACE + " ms" ) ; } } } | Track the count of quick binds . Dump the updated statistic to the log at most once every 30 seconds . |
163,590 | private static boolean isIPv6Addr ( String host ) { if ( host != null ) { if ( host . contains ( "[" ) && host . contains ( "]" ) ) host = host . substring ( host . indexOf ( "[" ) + 1 , host . indexOf ( "]" ) ) ; host = host . toLowerCase ( ) ; Pattern p1 = Pattern . compile ( "^(?:(?:(?:(?:[a-f0-9]{1,4}(?::[a-f0-9]{1,4}){7})|(?:(?!(?:.*[a-f0-9](?::|$)){7,})(?:[a-f0-9]{1,4}(?::[a-f0-9]{1,4}){0,5})?::(?:[a-f0-9]{1,4}(?::[a-f0-9]{1,4}){0,5})?)))|(?:(?:(?:[a-f0-9]{1,4}(?::[a-f0-9]{1,4}){5}:)|(?:(?!(?:.*[a-f0-9]:){5,})(?:[a-f0-9]{1,4}(?::[a-f0-9]{1,4}){0,3})?::(?:[a-f0-9]{1,4}(?::[a-f0-9]{1,4}){0,3}:)?))?(?:(?:25[0-5])|(?:2[0-4][0-9])|(?:1[0-9]{2})|(?:[1-9]?[0-9]))(?:\\.(?:(?:25[0-5])|(?:2[0-4][0-9])|(?:1[0-9]{2})|(?:[1-9]?[0-9]))){3}))$" ) ; Pattern p2 = Pattern . compile ( "^(\\d{1,3}\\.){3}\\d{1,3}$" ) ; Matcher m1 = p1 . matcher ( host ) ; boolean b1 = m1 . matches ( ) ; Matcher m2 = p2 . matcher ( host ) ; boolean b2 = ! m2 . matches ( ) ; return b1 && b2 ; } else { return false ; } } | Is the address an IPv6 Address . |
163,591 | public TimedDirContext reCreateDirContext ( TimedDirContext oldCtx , String errorMessage ) throws WIMSystemException { final String METHODNAME = "DirContext reCreateDirContext(String errorMessage)" ; if ( tc . isDebugEnabled ( ) ) { Tr . debug ( tc , METHODNAME + " Communication exception occurs: " + errorMessage + " Creating a new connection." ) ; } try { Long oldCreateTimeStampSeconds = oldCtx . getCreateTimestamp ( ) ; TimedDirContext ctx ; if ( oldCreateTimeStampSeconds < iPoolCreateTimestampSeconds ) { if ( tc . isDebugEnabled ( ) ) { Tr . debug ( tc , METHODNAME + " Pool refreshed, skip to getDirContext. oldCreateTimeStamp: " + oldCreateTimeStampSeconds + " iPoolCreateTimestampSeconds:" + iPoolCreateTimestampSeconds ) ; } ctx = getDirContext ( ) ; } else { String oldURL = getProviderURL ( oldCtx ) ; ctx = createDirContext ( getEnvironment ( URLTYPE_SEQUENCE , getNextURL ( oldURL ) ) ) ; String newURL = getProviderURL ( ctx ) ; synchronized ( iLock ) { if ( oldCtx . getCreateTimestamp ( ) >= iPoolCreateTimestampSeconds ) { createContextPool ( iLiveContexts - 1 , newURL ) ; ctx . setCreateTimestamp ( iPoolCreateTimestampSeconds ) ; } } } oldCtx . close ( ) ; if ( tc . isDebugEnabled ( ) ) Tr . debug ( tc , WIMMessageKey . CURRENT_LDAP_SERVER , WIMMessageHelper . generateMsgParms ( getActiveURL ( ) ) ) ; return ctx ; } catch ( NamingException e ) { String msg = Tr . formatMessage ( tc , WIMMessageKey . NAMING_EXCEPTION , WIMMessageHelper . generateMsgParms ( e . toString ( true ) ) ) ; throw new WIMSystemException ( WIMMessageKey . NAMING_EXCEPTION , msg , e ) ; } } | Recreate a Directory context where the oldContext failed with the given error message . |
163,592 | @ FFDCIgnore ( NamingException . class ) public void releaseDirContext ( TimedDirContext ctx ) throws WIMSystemException { final String METHODNAME = "releaseDirContext" ; if ( iContextPoolEnabled ) { synchronized ( iLock ) { if ( iContexts . size ( ) >= iPrefPoolSize || ( iMaxPoolSize != 0 && iLiveContexts > iMaxPoolSize ) || ctx . getCreateTimestamp ( ) < iPoolCreateTimestampSeconds || ! getProviderURL ( ctx ) . equalsIgnoreCase ( getActiveURL ( ) ) ) { try { iLiveContexts -- ; ctx . close ( ) ; } catch ( NamingException e ) { String msg = Tr . formatMessage ( tc , WIMMessageKey . NAMING_EXCEPTION , WIMMessageHelper . generateMsgParms ( e . toString ( true ) ) ) ; throw new WIMSystemException ( WIMMessageKey . NAMING_EXCEPTION , msg , e ) ; } if ( tc . isDebugEnabled ( ) ) { Tr . debug ( tc , METHODNAME + " Context is discarded." ) ; } } else { if ( iContexts != null && iContexts . size ( ) > 0 && iContexts . contains ( ctx ) ) { if ( tc . isDebugEnabled ( ) ) { Tr . debug ( tc , METHODNAME + " Context already present in Context pool. No need to add it again to context pool. ContextPool: total=" + iLiveContexts + ", poolSize=" + iContexts . size ( ) ) ; } } else { if ( iContexts != null ) iContexts . add ( ctx ) ; if ( iPoolTimeOut > 0 ) { ctx . setPoolTimeStamp ( roundToSeconds ( System . currentTimeMillis ( ) ) ) ; } if ( tc . isDebugEnabled ( ) ) { Tr . debug ( tc , METHODNAME + " Before Notifying the waiting threads and Context is back to pool. ContextPool: total=" + iLiveContexts + ", poolSize=" + iContexts . size ( ) ) ; } } iLock . notifyAll ( ) ; if ( tc . isDebugEnabled ( ) ) { Tr . debug ( tc , METHODNAME + " Context is back to pool." ) ; } } } if ( tc . isDebugEnabled ( ) ) { Tr . debug ( tc , METHODNAME + " ContextPool: total=" + iLiveContexts + ", poolSize=" + iContexts . size ( ) ) ; } } else { try { ctx . close ( ) ; } catch ( NamingException e ) { String msg = Tr . formatMessage ( tc , WIMMessageKey . NAMING_EXCEPTION , WIMMessageHelper . generateMsgParms ( e . toString ( true ) ) ) ; throw new WIMSystemException ( WIMMessageKey . NAMING_EXCEPTION , msg , e ) ; } } } | Release the given directory context . |
163,593 | public void getTraceSummaryLine ( StringBuilder buff ) { buff . append ( getControlMessageType ( ) . toString ( ) . trim ( ) ) ; buff . append ( ":flags=0x" ) ; buff . append ( Integer . toHexString ( getFlags ( ) & 0xff ) ) ; } | Get the common prefix for all control message summary lines |
163,594 | protected static void appendArray ( StringBuilder buff , String name , String [ ] values ) { buff . append ( ',' ) ; buff . append ( name ) ; buff . append ( "=[" ) ; if ( values != null ) { for ( int i = 0 ; i < values . length ; i ++ ) { if ( i != 0 ) buff . append ( ',' ) ; buff . append ( values [ i ] ) ; } } buff . append ( ']' ) ; } | Helper method to append a string array to a summary string method |
163,595 | public void init ( InputStream in ) throws IOException { if ( TraceComponent . isAnyTracingEnabled ( ) && logger . isLoggable ( Level . FINE ) ) { logger . logp ( Level . FINE , CLASS_NAME , "init" , "init" ) ; } this . in = in ; next ( ) ; obs = null ; } | Initializes the servlet input stream with the specified raw input stream . |
163,596 | public void next ( ) { if ( TraceComponent . isAnyTracingEnabled ( ) && logger . isLoggable ( Level . FINE ) ) { logger . logp ( Level . FINE , CLASS_NAME , "next" , "next" ) ; } length = - 1 ; limit = Long . MAX_VALUE ; total = 0 ; count = 0 ; pos = 0 ; } | Begins reading the next request . |
163,597 | public void finish ( ) throws IOException { if ( TraceComponent . isAnyTracingEnabled ( ) && logger . isLoggable ( Level . FINE ) ) { logger . logp ( Level . FINE , CLASS_NAME , "finish" , "finish" ) ; } WebContainerRequestState requestState = WebContainerRequestState . getInstance ( false ) ; if ( requestState != null && ( Boolean . valueOf ( ( String ) requestState . getAttribute ( "InputStreamEarlyReadCompleted" ) ) ) . booleanValue ( ) ) { if ( TraceComponent . isAnyTracingEnabled ( ) && logger . isLoggable ( Level . FINE ) ) { logger . logp ( Level . FINE , CLASS_NAME , "finish" , "Skip read because data has already been read and destroyed." ) ; } total = limit ; } else if ( ! SRTServletResponse . isSkipInputStreamRead ( ) && length != - 1 ) { long remaining = limit - total ; while ( remaining > 0 ) { long n = skip ( remaining ) ; if ( n == 0 ) { throw new IOException ( nls . getString ( "Invalid.Content.Length" , "Invalid content length" ) ) ; } remaining -= n ; } } } | Finishes reading the request without closing the underlying stream . |
163,598 | public void resets ( ) { if ( TraceComponent . isAnyTracingEnabled ( ) && logger . isLoggable ( Level . FINE ) ) { logger . logp ( Level . FINE , CLASS_NAME , "resets" , "resets" ) ; } this . in = null ; } | Resets the input stream for a new connection . |
163,599 | public void setContentLength ( long len ) { if ( TraceComponent . isAnyTracingEnabled ( ) && logger . isLoggable ( Level . FINE ) ) { logger . logp ( Level . FINE , CLASS_NAME , "setContentLength" , "setContentLength + len ) ; } if ( len < 0 ) { logger . logp ( Level . SEVERE , CLASS_NAME , "setContentLength" , "Illegal.Argument.Invalid.Content.Length" ) ; throw new IllegalArgumentException ( nls . getString ( "Illegal.Argument.Invalid.Content.Length" , "Illegal Argument: Invalid Content Length" ) ) ; } length = len ; if ( Long . MAX_VALUE - total > len ) { limit = total + len ; } } | Sets the content length for this input stream . This should be called once the headers have been read from the input stream . |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.