code
stringlengths 73
34.1k
| label
stringclasses 1
value |
---|---|
public static <T> T findFirstNextByType(FaceletHandler nextHandler, Class<T> type)
{
if (type.isAssignableFrom(nextHandler.getClass()))
{
return (T)nextHandler;
}
else if (nextHandler instanceof javax.faces.view.facelets.CompositeFaceletHandler)
{
for (FaceletHandler handler :
((javax.faces.view.facelets.CompositeFaceletHandler)nextHandler).getHandlers())
{
if (type.isAssignableFrom(handler.getClass()))
{
return (T)handler;
}
}
}
return null;
} | java |
public static boolean tryToClose(Closeable closeable) {
Object token = ThreadIdentityManager.runAsServer();
try {
if (closeable != null) {
try {
closeable.close();
return true;
} catch (IOException e) {
// ignore
}
}
} finally {
ThreadIdentityManager.reset(token);
}
return false;
} | java |
private static void setDefaultDiscoveryProperties() {
defaultDiscoveryProperties.put(KEY_OIDC_RESPONSE_TYPES_SUPP, new String[] { "code", "token", "id_token token" });
defaultDiscoveryProperties.put(KEY_OIDC_SUB_TYPES_SUPP, new String[] { "public" });
defaultDiscoveryProperties.put(KEY_OIDC_ID_TOKEN_SIGNING_ALG_VAL_SUPP, new String[] { "HS256" });
defaultDiscoveryProperties.put(KEY_OIDC_SCOPES_SUPP, new String[] { "openid", "general", "profile", "email", "address", "phone" });
defaultDiscoveryProperties.put(KEY_OIDC_CLAIMS_SUPP,
new String[] { "sub", "groupIds", "name", "preferred_username", "picture", "locale", "email", "profile" });
defaultDiscoveryProperties.put(KEY_OIDC_RESP_MODES_SUPP, new String[] { "query", "fragment", "form_post" });
defaultDiscoveryProperties.put(KEY_OIDC_GRANT_TYPES_SUPP, new String[] { "authorization_code", "implicit", "refresh_token", "client_credentials", "password",
"urn:ietf:params:oauth:grant-type:jwt-bearer" });
defaultDiscoveryProperties.put(KEY_OIDC_TOKEN_EP_AUTH_METHODS_SUPP, new String[] { "client_secret_post", "client_secret_basic" });
defaultDiscoveryProperties.put(KEY_OIDC_DISPLAY_VAL_SUPP, new String[] { "page" });
defaultDiscoveryProperties.put(KEY_OIDC_CLAIM_TYPES_SUPP, new String[] { "normal" });
defaultDiscoveryClaimsParmSupp = false;
defaultDiscoveryRequestParmSupp = false;
defaultDiscoveryRequestUriParmSupp = false;
defaultDiscoveryRequireRequestUriRegistrationSupp = false;
} | java |
public void populateCustomRequestParameterMap(ConfigurationAdmin configAdmin, HashMap<String, String> paramMapToPopulate, String[] configuredCustomRequestParams, String configAttrName, String configAttrValue) {
if (configuredCustomRequestParams == null) {
return;
}
for (String configuredParameter : configuredCustomRequestParams) {
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) {
Tr.debug(tc, "Configured custom request param [" + configuredParameter + "]");
}
Configuration config = getConfigurationFromConfigAdmin(configAdmin, configuredParameter);
if (config != null) {
addCustomRequestParameterValueToMap(config, paramMapToPopulate, configAttrName, configAttrValue);
}
}
} | java |
public void stopModule(EJBModuleMetaDataImpl mmd) {
try { //210058
uninstall(mmd, false);
} catch (Throwable t) { //210058
FFDCFilter.processException(t, CLASS_NAME + ".stop", "3059", this);
throw new ContainerEJBException("Failed to stop - caught Throwable", t);
}
} | java |
protected void bindInterfaces(NameSpaceBinder<?> binder, BeanMetaData bmd) throws Exception {
HomeWrapperSet homeSet = null;
EJSHome home = bmd.homeRecord.getHome();
if (home != null) {
homeSet = home.getWrapperSet();
}
int numRemoteInterfaces = countInterfaces(bmd, false);
int numLocalInterfaces = countInterfaces(bmd, true);
boolean singleGlobalInterface = (numRemoteInterfaces + numLocalInterfaces) == 1;
bindInterfaces(binder, bmd, homeSet, false, numRemoteInterfaces, singleGlobalInterface);
bindInterfaces(binder, bmd, homeSet, true, numLocalInterfaces, singleGlobalInterface);
} | java |
private int countInterfaces(BeanMetaData bmd, boolean local) // F743-23167
{
// Note that these variables must be kept in sync with bindInterfaces.
String homeInterfaceClassName = local ? bmd.localHomeInterfaceClassName : bmd.homeInterfaceClassName;
boolean hasLocalBean = local && bmd.ivLocalBean;
String[] businessInterfaceNames = local ? bmd.ivBusinessLocalInterfaceClassNames : bmd.ivBusinessRemoteInterfaceClassNames;
int result = (homeInterfaceClassName == null ? 0 : 1) +
(hasLocalBean ? 1 : 0) +
(businessInterfaceNames == null ? 0 : businessInterfaceNames.length);
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled())
Tr.debug(tc, "countInterfaces: " + bmd.j2eeName + ", local=" + local + ", result=" + result);
return result;
} | java |
private void bindInterfaces(NameSpaceBinder<?> binder,
BeanMetaData bmd,
HomeWrapperSet homeSet,
boolean local,
int numInterfaces,
boolean singleGlobalInterface) // F743-23167
throws NamingException, RemoteException, CreateException {
final boolean isTraceOn = TraceComponent.isAnyTracingEnabled();
if (isTraceOn && tc.isEntryEnabled())
Tr.entry(tc, "bindInterfaces: " + bmd.j2eeName +
", deferred=" + (homeSet == null) +
", local=" + local);
// Note that these variables must be kept in sync with countInterfaces.
String homeInterfaceClassName = local ? bmd.localHomeInterfaceClassName : bmd.homeInterfaceClassName;
boolean hasLocalBean = local && bmd.ivLocalBean;
String[] businessInterfaceNames = local ? bmd.ivBusinessLocalInterfaceClassNames : bmd.ivBusinessRemoteInterfaceClassNames;
// If we have multiple interfaces (e.g., a home and one business
// interface, or multiple business interfaces), and simple binding name
// was specified, then issue a warning message that simple binding name
// is misused.
if (numInterfaces > 1 && bmd.simpleJndiBindingName != null) {
Tr.warning(tc, "SIMPLE_BINDING_NAME_MISSUSED_CNTR0168W",
new Object[] { bmd.enterpriseBeanName, bmd._moduleMetaData.ivName, bmd._moduleMetaData.ivAppName });
}
HomeRecord hr = bmd.homeRecord;
// Bind the home interface, if any.
if (homeInterfaceClassName != null) {
bindInterface(binder, hr, homeSet, numInterfaces, singleGlobalInterface,
homeInterfaceClassName, -1, local);
}
// Bind the no-interface view, if any.
int interfaceIndex = 0;
if (hasLocalBean) {
bindInterface(binder, hr, homeSet, numInterfaces, singleGlobalInterface,
bmd.enterpriseBeanClassName, interfaceIndex, local);
interfaceIndex++;
}
// Bind business interfaces, if any.
if (businessInterfaceNames != null) {
for (String businessInterfaceName : businessInterfaceNames) {
bindInterface(binder, hr, homeSet, numInterfaces, singleGlobalInterface,
businessInterfaceName, interfaceIndex, local);
interfaceIndex++;
}
}
if (isTraceOn && tc.isEntryEnabled())
Tr.exit(tc, "bindInterfaces");
} | java |
private <T> void bindInterface(NameSpaceBinder<T> binder,
HomeRecord hr,
HomeWrapperSet homeSet,
int numInterfaces,
boolean singleGlobalInterface,
String interfaceName,
int interfaceIndex,
boolean local) throws NamingException, RemoteException, CreateException {
final boolean isTraceOn = TraceComponent.isAnyTracingEnabled();
if (isTraceOn && tc.isEntryEnabled())
Tr.entry(tc, "bindInterface: " + hr.getJ2EEName() +
", " + interfaceIndex +
", " + interfaceName +
", local=" + local);
// Create the object to be bound.
T bindingObject = binder.createBindingObject(hr, homeSet, interfaceName, interfaceIndex, local);
// Bind the object to configured locations.
boolean deferred = homeSet == null;
if (hr.bindToContextRoot()) // F743-34301
{
binder.bindBindings(bindingObject, // F69147.2
hr, numInterfaces, singleGlobalInterface,
interfaceIndex, interfaceName, local, deferred);
}
// Bind session and managed bean objects to java:global/app/module.
if (hr.bindToJavaNameSpaces()) // F743-34301, d660700
{
T javaBindingObject = binder.createJavaBindingObject(hr, homeSet, interfaceName, interfaceIndex, local, bindingObject); // F69147.2
bindObjectToJavaNameSpaces(binder, javaBindingObject, hr, singleGlobalInterface, interfaceName, interfaceIndex, local);
}
if (isTraceOn && tc.isEntryEnabled())
Tr.exit(tc, "bindInterface");
} | java |
protected void bindAllRemoteInterfacesToContextRoot() {
final boolean isTraceOn = TraceComponent.isAnyTracingEnabled();
if (isTraceOn && tc.isEntryEnabled())
Tr.entry(tc, "bindAllRemoteInterfacesToContextRoot");
Map<EJBModuleMetaDataImpl, NameSpaceBinder<?>> binders = new HashMap<EJBModuleMetaDataImpl, NameSpaceBinder<?>>();
// Start with the list of all HomeRecords. Not all of these beans may have
// started, but this is the complete set of everything that would have been
// bound into some naming context. The container may not be available yet
// if the EJB feature is just starting, but then there is nothing to do.
HomeOfHomes homeOfHomes = (ivContainer != null) ? ivContainer.getHomeOfHomes() : null;
if (homeOfHomes != null) {
List<HomeRecord> hrs = ivContainer.getHomeOfHomes().getAllHomeRecords();
for (HomeRecord hr : hrs) {
if (hr.bindToContextRoot()) {
BeanMetaData bmd = hr.getBeanMetaData();
if (isTraceOn && tc.isDebugEnabled())
Tr.debug(tc, "processing bindings for " + bmd.j2eeName);
if (bmd.homeInterfaceClassName != null) {
bindRemoteInterfaceToContextRoot(binders, hr, bmd.homeInterfaceClassName, -1);
}
if (bmd.ivBusinessRemoteInterfaceClassNames != null) {
int interfaceIndex = 0;
for (String remoteInterfaceName : bmd.ivBusinessRemoteInterfaceClassNames) {
bindRemoteInterfaceToContextRoot(binders, hr, remoteInterfaceName, interfaceIndex++);
}
}
}
}
}
if (isTraceOn && tc.isEntryEnabled())
Tr.exit(tc, "bindAllRemoteInterfacesToContextRoot");
} | java |
protected void addHome(BeanMetaData bmd) throws ContainerException {
try {
EJSContainer.homeOfHomes.addHome(bmd); //d200714 d429866.2 F743-26072
} catch (Throwable ex) {
ContainerException ex2 = new ContainerException(ex);
Tr.error(tc, "CAUGHT_EXCEPTION_THROWING_NEW_EXCEPTION_CNTR0035E",
new Object[] { ex, ex2.toString() });
throw ex2;
}
} | java |
protected EJSHome initializeDeferredEJBImpl(HomeRecord hr) throws ContainerException, EJBConfigurationException {
BeanMetaData bmd = hr.getBeanMetaData();
Object originalLoader = ThreadContextAccessor.UNCHANGED;
try {
if (!bmd.fullyInitialized) // d664917.1
{
// The server class loader must be used during metadata processing
// for XML parsing classes. d200714, PM57099
originalLoader = svThreadContextAccessor.pushContextClassLoader(getServerClassLoader()); // d278756, d334557, PK83186, d640395.1
//------------------------------------------------------------------------
// WARNING: We MUST reload WCCM object pointers here in case the module was
// unloaded. The WAS runtime code has an alarm thread which unloads
// the module after a fixed time. In the case of deferred EJB init
// processing it is up to us to "touch" the DeployedModule which will
// cause WCCM to completely reload a new set of WCCM objects for us.
//------------------------------------------------------------------------
bmd.wccm.reload(); // F743-18775
finishBMDInit(bmd); //497153
}
//d200714 start
// We must ensure that the application classloader is in force prior to starting
// the home.
originalLoader = svThreadContextAccessor.repushContextClassLoader(originalLoader, hr.getClassLoader());
//d200714 end
return fireMetaDataCreatedAndStartBean(bmd); // d648522, d739043
} finally {
svThreadContextAccessor.popContextClassLoader(originalLoader);
// d659020 - If an error occurs while initializing, then the wccm
// field will not be cleared, so we need to unload its references.
// The next attempt to initialize the bean will reload them again.
if (bmd.wccm != null) {
bmd.wccm.unload();
}
}
} | java |
protected ReferenceContext createReferenceContext(BeanMetaData bmd) // F743-29417
{
final boolean isTraceOn = TraceComponent.isAnyTracingEnabled();
if (isTraceOn && tc.isEntryEnabled())
Tr.entry(tc, "createReferenceContext: " + bmd.j2eeName);
if (bmd.ivReferenceContext == null) {
bmd.ivReferenceContext = getInjectionEngine().createReferenceContext();
bmd.ivReferenceContext.add(new ComponentNameSpaceConfigurationProviderImpl(bmd, this)); // F85115
}
if (isTraceOn && tc.isEntryEnabled())
Tr.exit(tc, "createReferenceContext", bmd.ivReferenceContext);
return bmd.ivReferenceContext;
} | java |
private void finishBMDInit(BeanMetaData bmd) throws ContainerException, EJBConfigurationException {
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
Tr.entry(tc, "finishBMDInit: " + bmd.j2eeName); // d640935.1
// First, create the reference context for the bean if we haven't already
// done so.
createReferenceContext(bmd); // F743-29417
ivEJBMDOrchestrator.finishBMDInitWithReferenceContext(bmd);
// Free resources in EJBModuleMetaData if all beans have been initialized.
bmd._moduleMetaData.freeResourcesAfterAllBeansInitialized(bmd); //d462512
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
Tr.exit(tc, "finishBMDInit");
} | java |
public ComponentNameSpaceConfiguration finishBMDInitForReferenceContext(BeanMetaData bmd) throws EJBConfigurationException, ContainerException {
return ivEJBMDOrchestrator.finishBMDInitForReferenceContext(bmd,
ivDefaultDataSourceJNDIName,
ivWebServicesHandlerResolver);
} | java |
private EJSHome fireMetaDataCreatedAndStartBean(BeanMetaData bmd) // d648522
throws ContainerException {
if (!bmd.isManagedBean()) // F743-34301.1
{
try {
// Fire the ComponentMetaData event to the listeners
// (ie. we have loaded a new bean folks... )
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled())
Tr.debug(tc, "startBean: Fire Component Metadata created event to listeners for: " + bmd.j2eeName);
bmd.ivMetaDataDestroyRequired = true; //d505055
fireMetaDataCreated(bmd);
} catch (Throwable t) //197547
{
FFDCFilter.processException(t, CLASS_NAME + "startBean", "445", this);
throw new ContainerException("Failed to start " + bmd.j2eeName, t);
}
}
return startBean(bmd); // d739043
} | java |
protected int createNonPersistentAutomaticTimers(String appName, String moduleName, List<AutomaticTimerBean> timerBeans) {
final boolean isTraceOn = TraceComponent.isAnyTracingEnabled();
if (isTraceOn && tc.isEntryEnabled())
Tr.entry(tc, "createNonPersistentAutomaticTimers: " + moduleName);
int numCreated = 0;
for (AutomaticTimerBean timerBean : timerBeans) {
if (timerBean.getNumNonPersistentTimers() != 0) {
for (TimerMethodData timerMethod : timerBean.getMethods()) {
for (TimerMethodData.AutomaticTimer timer : timerMethod.getAutomaticTimers()) {
if (!timer.isPersistent()) {
if (isTraceOn && tc.isDebugEnabled())
Tr.debug(tc, "creating non-persistent automatic timer " + timer);
createNonPersistentAutomaticTimer(timerBean, timer, timerMethod);
numCreated++;
}
}
}
}
}
if (isTraceOn && tc.isEntryEnabled())
Tr.exit(tc, "createNonPersistentAutomaticTimers: " + numCreated);
return numCreated;
} | java |
protected Timer createNonPersistentCalendarTimer(BeanO beanO, ParsedScheduleExpression parsedExpr, Serializable info) {
final boolean isTraceOn = TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled();
if (isTraceOn && tc.isDebugEnabled())
Tr.entry(tc, "createNonPersistentCalendarTimer : " + beanO);
// create the non-persistent Timer
TimerNpImpl timer = new TimerNpImpl(beanO.getId(), parsedExpr, info);
// queue timer to start (or start immediately if not in a global tran)
queueOrStartNpTimer(beanO, timer);
if (isTraceOn && tc.isEntryEnabled())
Tr.exit(tc, "createNonPersistentCalendarTimer : " + timer);
return timer;
} | java |
private synchronized final boolean _declareDiscardable()
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(this, tc, "_declareDiscardable");
boolean linkHasBecomeReleasable = false;
// Only discardable if storage managed (items and item references only).
// Putting this check in here liberates the logic which changes the state of the
// items from knowing about storage management
if (_isStorageManaged)
{
if (!_itemIsDiscardableIfPersistentRepresentationStable)
{
// if we have become non-discardable, and we were
// releasable (stable) then we must notify the cache
linkHasBecomeReleasable = _persistentRepresentationIsStable;
// 274012
if (linkHasBecomeReleasable)
{
// Defect 601995
_strongReferenceToItem = NULL_STRONG_REF;
}
// This flag must not be set if the item is not storage managed.
// Otherwise, we could inadvertently start discarding and restoring
// streams.
_itemIsDiscardableIfPersistentRepresentationStable = true;
}
}
else
{
// Just to make sure :-)
_itemIsDiscardableIfPersistentRepresentationStable = false;
}
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(this, tc, "_declareDiscardable", Boolean.valueOf(linkHasBecomeReleasable));
return linkHasBecomeReleasable;
} | java |
private synchronized final boolean _declareNotDiscardable(AbstractItem item)
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(this, tc, "_declareNotDiscardable");
boolean notifyRequired = false;
// we are going to need the item in memory, so we make sure that
// we pin it with a hard reference
_strongReferenceToItem = item;
if (_itemIsDiscardableIfPersistentRepresentationStable)
{
// if we have become discardable, and we were
// releasable (stable) then we must notify the cache
notifyRequired = _persistentRepresentationIsStable;
_itemIsDiscardableIfPersistentRepresentationStable = false;
}
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(this, tc, "_declareNotDiscardable", Boolean.valueOf(notifyRequired));
return notifyRequired;
} | java |
private final AbstractItem _getAndAssertItem() throws SevereMessageStoreException
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(tc, "_getAndAssertItem");
AbstractItem item = null;
synchronized (this)
{
item = _strongReferenceToItem;
}
// Defect 601995
if (item == NULL_STRONG_REF)
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(tc, "_getAndAssertItem");
throw new SevereMessageStoreException("_getAndAssertItem");
}
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(tc, "_getAndAssertItem", item);
return item;
} | java |
@Override
public final void persistRedeliveredCount(int redeliveredCount) throws SevereMessageStoreException
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(this, tc, "persistRedeliveredCount");
PersistentTransaction msTran = (PersistentTransaction) getMessageStore().getTransactionFactory().createAutoCommitTransaction();
// Set the value in the Persistable
Persistable perTuple = getTuple();
perTuple.setRedeliveredCount(redeliveredCount);
// Create the persist task
final Task persistTask = new PersistRedeliveredCount(this);
// Add the task to worklist. Since this is an auto-commit transaction,
// the task is run immediately and value is persisted.
try {
msTran.addWork(persistTask);
} catch (Exception e) {
FFDCFilter.processException(e, "com.ibm.ws.sib.msgstore.cache.links.AbstractItemLink.persistRedeliveredCount", "1:1198:1.241", this);
if (TraceComponent.isAnyTracingEnabled() && tc.isEventEnabled())
SibTr.event(this, tc, "Exception caught persisting redelivery count!", e);
}
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(this, tc, "persistRedeliveredCount");
} | java |
final void cmdAdd(final LinkOwner stream, long lockID, final PersistentTransaction transaction) throws StreamIsFull, ProtocolException, TransactionException, SevereMessageStoreException
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(this, tc, "cmdAdd", new Object[] { "Item Link: " + this, "Stream Link: " + stream, formatLockId(lockID), "Transaction: " + transaction });
synchronized (this)
{
if (ItemLinkState.STATE_NOT_STORED == _itemLinkState)
{
ListStatistics stats = getParentStatistics();
stream._assertCanAddChild(transaction, stats);
// Defect 510343.1
stats.incrementAdding(_inMemoryItemSize);
_lockID = lockID;
_transactionId = transaction.getPersistentTranId();
if (NO_LOCK_ID == lockID)
{
_itemLinkState = ItemLinkState.STATE_ADDING_UNLOCKED;
}
else
{
_itemLinkState = ItemLinkState.STATE_ADDING_LOCKED;
}
}
else
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEventEnabled())
SibTr.event(this, tc, "Invalid Item state: " + _itemLinkState);
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(this, tc, "cmdAdd");
throw new StateException(_itemLinkState.toString());
}
}
final Task task = new AddTask(this);
transaction.addWork(task);
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(this, tc, "cmdAdd");
} | java |
final void cmdRemoveExpiring(final long lockId, final PersistentTransaction transaction) throws ProtocolException, TransactionException, SevereMessageStoreException
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(this, tc, "cmdRemoveExpiring", new Object[] { "Item Link: " + this, "Stream Link: " + _owningStreamLink, formatLockId(lockId),
"Transaction: " + transaction });
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled())
SibTr.debug(this, tc, "expiring item " + _tuple.getUniqueId());
synchronized (this)
{
if (ItemLinkState.STATE_LOCKED_FOR_EXPIRY == _itemLinkState)
{
if (_lockID != lockId)
{
throw new LockIdMismatch(_lockID, lockId);
}
ListStatistics stats = getParentStatistics();
synchronized (stats)
{
stats.decrementExpiring();
stats.incrementRemoving();
}
_transactionId = transaction.getPersistentTranId();
_itemLinkState = ItemLinkState.STATE_REMOVING_EXPIRING;
}
else
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEventEnabled())
SibTr.event(this, tc, "Invalid Item state: " + _itemLinkState);
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(this, tc, "cmdRemoveExpiring");
throw new StateException(_itemLinkState.toString());
}
}
final Task task = new RemoveLockedTask(this);
transaction.addWork(task);
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(this, tc, "cmdRemoveExpiring");
} | java |
private synchronized final boolean isStateLocked()
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
{
SibTr.entry(this, tc, "isStateLocked");
SibTr.exit(this, tc, "isStateLocked", _itemLinkState);
}
if (_itemLinkState == ItemLinkState.STATE_LOCKED)
{
return true;
}
else
{
return false;
}
} | java |
public final AbstractItem getItem() throws SevereMessageStoreException
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(this, tc, "getItem");
AbstractItem item = _getItemNoRestore();
synchronized (this)
{
if (isExpired())
{
item = null;
}
else
{
// if we did not have a reference to the item then we try to recreate
if (null == item)
{
try
{
item = _restoreItem();
} catch (SevereMessageStoreException e)
{
// No FFDC Code Needed.
// PK54812 Ensure we dump a suitable FFDC containing all of the message store
// information required in order to identify the rows etc. related to this entry.
try
{
StringWriter stringWriter = new StringWriter();
FormattedWriter writer = new FormattedWriter(stringWriter);
this.xmlWriteOn(writer);
FFDCFilter.processException(e, "com.ibm.ws.sib.msgstore.cache.links.AbstractItemLink.getItem", "1:2252:1.241", this, new Object[] { stringWriter });
writer.close();
} catch (IOException ioe)
{
FFDCFilter.processException(ioe, "com.ibm.ws.sib.msgstore.cache.links.AbstractItemLink.getItem", "1:2257:1.241", this);
}
if (TraceComponent.isAnyTracingEnabled() && tc.isEventEnabled())
SibTr.event(this, tc, "RuntimeException caught restoring Item!", e);
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(this, tc, "getItem");
throw e;
} catch (RuntimeException re)
{
// No FFDC Code Needed.
// PK54812 Ensure we dump a suitable FFDC containing all of the message store
// information required in order to identify the rows etc. related to this entry.
try
{
StringWriter stringWriter = new StringWriter();
FormattedWriter writer = new FormattedWriter(stringWriter);
this.xmlWriteOn(writer);
FFDCFilter.processException(re, "com.ibm.ws.sib.msgstore.cache.links.AbstractItemLink.getItem", "1:2274:1.241", this, new Object[] { stringWriter });
writer.close();
} catch (IOException ioe)
{
FFDCFilter.processException(ioe, "com.ibm.ws.sib.msgstore.cache.links.AbstractItemLink.getItem", "1:2279:1.241", this);
}
if (TraceComponent.isAnyTracingEnabled() && tc.isEventEnabled())
SibTr.event(this, tc, "RuntimeException caught restoring Item!", re);
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(this, tc, "getItem");
throw re;
}
}
}
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(this, tc, "getItem", item);
}
return item;
} | java |
private final void setInMemoryItemSize(AbstractItem item)
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(this, tc, "setInMemoryItemSize", item);
// If we have an Item, we can ask it for its estimated size.
if (item != null) {
_inMemoryItemSize = item.getInMemoryDataSize();
}
// Otherwise, we just use its persisted size & our standard multiplier.
else {
_inMemoryItemSize = _tuple.getPersistentSize() * MEMORY_SIZE_MULTIPLIER;
}
// Set the value on the Tuple.
_tuple.setInMemoryByteSize(_inMemoryItemSize);
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(this, tc, "setInMemoryItemSize", _inMemoryItemSize);
} | java |
final boolean isExpired() throws SevereMessageStoreException
{ // 182086
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(this, tc, "isExpired");
if (isAvailable() && internalCanExpire())
{
// we can only expire if we are available
long expiryTime = _tuple.getExpiryTime();
if (expiryTime != 0 && expiryTime <= Expirer.timeNow())
{
// we are due to expire
boolean hasBecomeNonReleasable = false;
synchronized (this)
{
if (ItemLinkState.STATE_AVAILABLE == _itemLinkState)
{
// force item to be present
AbstractItem item = _getItemNoRestore();
if (null == item)
{
item = _restoreItem();
}
ListStatistics stats = getParentStatistics();
synchronized (stats)
{
stats.incrementExpiring();
stats.decrementAvailable();
}
_lockID = AbstractItemLink.EXPIRY_LOCK_ID;
hasBecomeNonReleasable = _declareNotDiscardable(item);
_itemLinkState = ItemLinkState.STATE_LOCKED_FOR_EXPIRY;
}
}
if (hasBecomeNonReleasable)
{
_declareNotReleasable();
}
}
}
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(this, tc, "isExpired", Boolean.valueOf(isExpiring()));
return isExpiring();
} | java |
public final AbstractItem matches(final Filter filter, boolean allowUnavailable) throws SevereMessageStoreException
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(this, tc, "matches", new Object[] { filter, Boolean.valueOf(allowUnavailable) });
AbstractItem foundItem = null;
if (allowUnavailable || isAvailable())
{
if (!isExpired())
{
AbstractItem item = getItem();
if (null == item)
{
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled())
SibTr.debug(this, tc, "item does not exist");
}
else
{
try
{
if (null == filter || filter.filterMatches(item))
{
foundItem = item;
}
} catch (Exception e)
{
//No FFDC Code Needed.
// assume exception is false return
}
}
}
}
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(this, tc, "matches", foundItem);
return foundItem;
} | java |
@Override
public final void persistLock(final Transaction transaction) throws ProtocolException, TransactionException, SevereMessageStoreException
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(this, tc, "persistLock", transaction);
if (null != transaction)
{
PersistentTransaction mstran = (PersistentTransaction) transaction;
cmdPersistLock(mstran);
getTuple().setLockID(getLockID());
final Task task = new PersistLock(this);
mstran.addWork(task);
}
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(this, tc, "persistLock");
} | java |
@Override
public final List<DataSlice> readDataFromPersistence() throws SevereMessageStoreException
{
List<DataSlice> dataSlices;
// lazy restoration only needed if the item was stored. There is
// no point trying to restore if there is no data.
PersistentMessageStore pm = getMessageStoreImpl().getPersistentMessageStore();
try
{
dataSlices = pm.readDataOnly(getTuple());
} catch (PersistenceException pe)
{
com.ibm.ws.ffdc.FFDCFilter.processException(pe, "com.ibm.ws.sib.msgstore.cache.links.AbstractItemLink.readDataFromPersistence", "1:3271:1.241", this);
throw new SevereMessageStoreException(pe);
}
return dataSlices;
} | java |
public final void releaseItem() throws SevereMessageStoreException
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(tc, "releaseItem");
synchronized (this)
{
_strongReferenceToItem = NULL_STRONG_REF;
}
if (_softReferenceToItem != null)
{
_softReferenceToItem.clear();
}
// Defect 601995
if (_isStorageManaged && (_itemCacheManagedReference != NULL_CACHE_REF))
{
_itemCache.unmanage(this);
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled())
{
SibTr.debug(this, tc, "release item(" + getID() + ":" + _inMemoryItemSize + ") new cacheSize = " + _itemCache.getCurrentSize());
}
}
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(tc, "releaseItem");
} | java |
@Override
public final void releaseIfDiscardable() throws SevereMessageStoreException
{
boolean unlink = false; // flag so we can unlink outside sync block
if (isStoreNever())
{
synchronized (this)
{
if (ItemLinkState.STATE_AVAILABLE == _itemLinkState)
{
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled())
SibTr.debug(this, tc, "removing STORE_NEVER item as a result of discard");
ListStatistics stats = getParentStatistics();
synchronized (stats)
{
stats.decrementAvailable();
stats.decrementTotal(_inMemoryItemSize);
}
_itemLinkState = ItemLinkState.STATE_NOT_STORED;
unlink = true;
}
}
}
if (unlink)
{
getMessageStoreImpl().unregister(this);
unlink();
}
} | java |
public final AbstractItem removeIfMatches(final Filter filter, PersistentTransaction transaction) throws ProtocolException, TransactionException, SevereMessageStoreException
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(this, tc, "removeIfMatches", new Object[] { filter, transaction });
AbstractItem foundItem = cmdRemoveIfMatches(filter, transaction);
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(this, tc, "removeIfMatches", foundItem);
return foundItem;
} | java |
private Lifecycle _getLifecycle(FacesContext facesContext)
{
LifecycleFactory factory = (LifecycleFactory) FactoryFinder.getFactory(FactoryFinder.LIFECYCLE_FACTORY);
String id = facesContext.getExternalContext().getInitParameter(FacesServlet.LIFECYCLE_ID_ATTR);
if (id == null)
{
id = LifecycleFactory.DEFAULT_LIFECYCLE;
}
return factory.getLifecycle(id);
} | java |
private boolean locationInOutputDir(String location) {
String expandedOutputLocation = cfgSvc.resolveString(LibertyConstants.DEFAULT_OUTPUT_LOCATION);
return location.startsWith(LibertyConstants.DEFAULT_OUTPUT_LOCATION)
|| location.startsWith(expandedOutputLocation);
} | java |
private void setLocation(String _location) {
String res = null;
File resFile = null;
boolean relativePath = true;
boolean defaultPath = false;
// try as "absolute" resource (contains symbol, or absolute path)
try {
res = cfgSvc.resolveString(_location);
resFile = new File(res);
relativePath = !resFile.isAbsolute();
} catch (IllegalStateException e) {
// ignore
}
if (resFile == null || (!resFile.isFile() && relativePath)) {
// look for resource in server config location
try {
res = cfgSvc.resolveString(LibertyConstants.DEFAULT_CONFIG_LOCATION + _location);
resFile = new File(res);
} catch (IllegalStateException e) {
// ignore
}
if (resFile == null || !resFile.isFile()) {
// fall back to creating for resource in shared output location
try {
res = cfgSvc.resolveString(LibertyConstants.DEFAULT_OUTPUT_LOCATION + _location);
resFile = new File(res);
defaultPath = true;
} catch (IllegalStateException e) {
// ignore
}
}
}
// Work against the symbol in the original location
// The original location may be been
if (isDefault && (defaultPath || locationInOutputDir(_location))) {
this.initializeAtStartup = true;
}
// reset location w/ resolved value
// isDefault tested because the default path's file may not exists (and that's OK)
if ((res != null && resFile.isFile()) || isDefault) {
this.location = res;
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) {
Tr.debug(tc, "Found store under [" + location + "]");
}
} else {
// If it wasn't found then it's likely going to trigger
// the load.error later. Issue a warning to explain the file
// could not be found.
Tr.warning(tc, "ssl.keystore.not.found.warning", res, name);
}
} | java |
private void setFileBased(Boolean flag) {
this.fileBased = flag;
setProperty(Constants.SSLPROP_KEY_STORE_FILE_BASED, flag.toString());
} | java |
private void setReadOnly(Boolean flag) {
this.readOnly = flag;
setProperty(Constants.SSLPROP_KEY_STORE_READ_ONLY, flag.toString());
} | java |
private void setInitializeAtStartup(Boolean flag) {
this.initializeAtStartup = flag;
setProperty(Constants.SSLPROP_KEY_STORE_INITIALIZE_AT_STARTUP, flag.toString());
} | java |
public String getLocation() {
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) {
Tr.debug(tc, "getLocation -> " + location);
}
return this.location;
} | java |
public long getPollingRate() {
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled())
Tr.debug(tc, "getPollingRate returning " + pollingRate);
return this.pollingRate;
} | java |
public String getTrigger() {
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled())
Tr.debug(tc, "getTrigger returning " + trigger);
return this.trigger;
} | java |
public KeyStore getKeyStore(boolean reinitialize, boolean createIfNotPresent) throws Exception {
if (myKeyStore == null || reinitialize) {
myKeyStore = do_getKeyStore(reinitialize, createIfNotPresent);
}
return myKeyStore;
} | java |
public void store() throws Exception {
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
Tr.entry(tc, "store");
try {
String name = getProperty(Constants.SSLPROP_KEY_STORE_NAME);
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled())
Tr.debug(tc, "Storing KeyStore " + name);
String SSLKeyFile = getProperty(Constants.SSLPROP_KEY_STORE);
String SSLKeyPassword = decodePassword(getProperty(Constants.SSLPROP_KEY_STORE_PASSWORD));
String SSLKeyStoreType = getProperty(Constants.SSLPROP_KEY_STORE_TYPE);
boolean readOnly = Boolean.parseBoolean(getProperty(Constants.SSLPROP_KEY_STORE_READ_ONLY));
boolean fileBased = Boolean.parseBoolean(getProperty(Constants.SSLPROP_KEY_STORE_FILE_BASED));
String SSLKeyStoreStash = getProperty(Constants.SSLPROP_KEY_STORE_CREATE_CMS_STASH);
KeyStore ks = getKeyStore(false, false);
if (ks != null && !readOnly) {
if (fileBased) {
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled())
Tr.debug(tc, "Storing filebased keystore type " + SSLKeyStoreType);
String keyStoreLocation = SSLKeyFile;
String keyStorePassword = SSLKeyPassword;
final FileOutputStream fos = new FileOutputStream(keyStoreLocation);
try {
ks.store(fos, keyStorePassword.toCharArray());
} finally {
fos.close();
}
} else {
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled())
Tr.debug(tc, "Storing non-filebased keystore type " + SSLKeyStoreType);
String keyStoreLocation = SSLKeyFile;
String keyStorePassword = SSLKeyPassword;
URL ring = new URL(keyStoreLocation);
URLConnection ringConnect = ring.openConnection();
final OutputStream fos = ringConnect.getOutputStream();
try {
ks.store(fos, keyStorePassword.toCharArray());
} finally {
fos.close();
}
}
}
// we will likely have to store other types too
} catch (Exception e) {
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled())
Tr.debug(tc, "Exception storing KeyStore; " + e);
FFDCFilter.processException(e, getClass().getName(), "store", this);
throw e;
}
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
Tr.exit(tc, "store");
} | java |
public void initializeKeyStore(boolean reinitialize) throws Exception {
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
Tr.entry(tc, "initializeKeyStore");
try {
String initAtStartup = getProperty(Constants.SSLPROP_KEY_STORE_INITIALIZE_AT_STARTUP);
boolean createIfMissing = LibertyConstants.DEFAULT_KEYSTORE_REF_ID.equals(getProperty("id"));
if (Boolean.parseBoolean(initAtStartup) || reinitialize) {
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled())
Tr.debug(tc, "Initializing keystore at startup.");
getKeyStore(reinitialize, createIfMissing);
}
} catch (Exception e) {
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled())
Tr.debug(tc, "Exception initializing KeyStore; " + e);
throw e;
}
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
Tr.exit(tc, "initializeKeyStore");
} | java |
public void provideExpirationWarnings(int daysBeforeExpireWarning, String keyStoreName) throws Exception {
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
Tr.entry(tc, "provideExpirationWarnings", Integer.valueOf(daysBeforeExpireWarning));
KeyStore keystore = getKeyStore(false, false);
if (keystore != null) {
try {
Enumeration<String> e = keystore.aliases();
if (e != null) {
for (; e.hasMoreElements();) {
String alias = e.nextElement();
if (null == alias)
continue;
Certificate[] cert_chain = keystore.getCertificateChain(alias);
if (null == cert_chain)
continue;
for (int i = 0; i < cert_chain.length; i++) {
printWarning(daysBeforeExpireWarning, keyStoreName, alias, (X509Certificate) cert_chain[i]);
}
}
}
} catch (Exception e) {
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled())
Tr.debug(tc, "Exception validating KeyStore expirations; " + e);
FFDCFilter.processException(e, getClass().getName(), "provideExpirationWarnings", this);
throw e;
}
}
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
Tr.exit(tc, "provideExpirationWarnings");
} | java |
public void printWarning(int daysBeforeExpireWarning, String keyStoreName, String alias, X509Certificate cert) {
try {
long millisDelta = ((((daysBeforeExpireWarning * 24L) * 60L) * 60L) * 1000L);
long millisBeforeExpiration = cert.getNotAfter().getTime() - System.currentTimeMillis();
long daysLeft = ((((millisBeforeExpiration / 1000L) / 60L) / 60L) / 24L);
// cert is already expired
if (millisBeforeExpiration < 0) {
Tr.error(tc, "ssl.expiration.expired.CWPKI0017E", new Object[] { alias, keyStoreName });
} else if (millisBeforeExpiration < millisDelta) {
Tr.warning(tc, "ssl.expiration.warning.CWPKI0016W", new Object[] { alias, keyStoreName, Long.valueOf(daysLeft) });
} else {
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled())
Tr.debug(tc, "The certificate with alias " + alias + " from keyStore " + keyStoreName + " has " + daysLeft + " days left before expiring.");
}
} catch (Exception e) {
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled())
Tr.debug(tc, "Exception reading KeyStore certificates during expiration check; " + e);
FFDCFilter.processException(e, getClass().getName(), "printWarning", this);
}
} | java |
public static InputStream openKeyStore(String fileName) throws MalformedURLException, IOException {
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
Tr.entry(tc, "openKeyStore: " + fileName);
URL urlFile = null;
// Check if the filename exists as a File.
File kfile = new File(fileName);
if (kfile.exists() && kfile.length() == 0) {
throw new IOException("Keystore file exists, but is empty: " + fileName);
} else if (!kfile.exists()) {
urlFile = new URL(fileName);
} else {
// kfile exists
urlFile = new URL("file:" + kfile.getCanonicalPath());
}
// Finally open the file.
InputStream fis = urlFile.openStream();
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
Tr.exit(tc, "openKeyStore: " + (null != fis));
return fis;
} | java |
public void setCertificateEntry(String alias, Certificate cert) throws KeyStoreException, KeyException {
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) {
Tr.entry(this, tc, "setCertificateEntry", new Object[] { alias, cert });
}
if (Boolean.parseBoolean(getProperty(Constants.SSLPROP_KEY_STORE_READ_ONLY))) {
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) {
Tr.debug(this, tc, "Unable to update readonly store");
}
throw new KeyStoreException("Unable to add to read-only store");
}
final KeyStoreManager mgr = KeyStoreManager.getInstance();
try {
KeyStore jKeyStore = getKeyStore(false, false);
if (null == jKeyStore) {
final String keyStoreLocation = getProperty(Constants.SSLPROP_KEY_STORE);
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) {
Tr.debug(tc, "Cannot load the Java keystore at location \"" + keyStoreLocation + "\"");
}
throw new KeyStoreException("Cannot load the Java keystore at location \"" + keyStoreLocation + "\"");
}
// store the cert... errors are thrown if conflicts or errors occur
jKeyStore.setCertificateEntry(alias, cert);
try {
store();
} catch (IOException e) {
// Note: debug + ffdc in store() itself
// on z/OS we have an issue where the certificate may be stored but the
// alias
// already exists in RACF so the keystore API will through an
// IOException
// we need to catch this condition on z/OS and if the certs is in the
// keystore
// prior after adding the certificate then we know the cert was actually
// added and its not
// a true failure. If the cert was not added then we need to rethrow the
// exception.
final String ksType = getProperty(Constants.SSLPROP_KEY_STORE_TYPE);
if ((ksType.equals(Constants.KEYSTORE_TYPE_JCERACFKS) || ksType.equals(Constants.KEYSTORE_TYPE_JCECCARACFKS)
|| ksType.equals(Constants.KEYSTORE_TYPE_JCEHYBRIDRACFKS))) {
KeyStore ks = getKeyStore(true, false);
if (mgr.checkIfSignerAlreadyExistsInTrustStore((X509Certificate) cert, ks)) {
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) {
Tr.debug(tc, "Certificate already exists in RACF: " + e.getMessage());
}
} else {
throw new KeyException(e.getMessage(), e);
}
} else {
throw new KeyException(e.getMessage(), e);
}
}
} catch (KeyStoreException kse) {
throw kse;
} catch (KeyException ke) {
throw ke;
} catch (Exception e) {
throw new KeyException(e.getMessage(), e);
}
// after adding the certificate, clear the keystore and SSL caches so it
// reloads it.
AbstractJSSEProvider.clearSSLContextCache();
mgr.clearJavaKeyStoresFromKeyStoreMap();
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) {
Tr.exit(this, tc, "setCertificateEntry");
}
} | java |
private SerializableProtectedString getKeyPassword(String alias) {
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled())
Tr.debug(tc, "getKeyPassword " + alias);
SerializableProtectedString keyPass = certAliasInfo.get(alias);
if (keyPass != null) {
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled())
Tr.debug(tc, "getKeyPassword entry found.");
} else {
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled())
Tr.debug(tc, "getKeyPassword -> null");
}
return keyPass;
} | java |
private void validateServerVariables(ValidationHelper helper, Context context, Set<String> variables, Server t) {
ServerVariables serverVariables = t.getVariables();
for (String variable : variables) {
if (serverVariables == null || !serverVariables.containsKey(variable)) {
final String message = Tr.formatMessage(tc, "serverVariableNotDefined", variable);
helper.addValidationEvent(new ValidationEvent(ValidationEvent.Severity.ERROR, context.getLocation("variables"), message));
}
}
} | java |
private Set<String> validateURL(ValidationHelper helper, Context context, String url) {
String pathToCheck = url;
Set<String> serverVariables = new HashSet<String>();
while (pathToCheck.contains("{")) {
if (!pathToCheck.contains("}")) {
final String message = Tr.formatMessage(tc, "serverInvalidURL", pathToCheck);
helper.addValidationEvent(new ValidationEvent(ValidationEvent.Severity.ERROR, context.getLocation("url"), message));
return serverVariables;
}
int firstIndex = pathToCheck.indexOf("{");
int lastIndex = pathToCheck.indexOf("}");
if (firstIndex > lastIndex) {
final String message = Tr.formatMessage(tc, "serverInvalidURL", pathToCheck);
helper.addValidationEvent(new ValidationEvent(ValidationEvent.Severity.ERROR, context.getLocation("url"), message));
return serverVariables;
}
String variable = pathToCheck.substring(firstIndex + 1, lastIndex);
if (variable.isEmpty() || variable.contains("{") || variable.contains("/")) {
final String message = Tr.formatMessage(tc, "serverInvalidURL", pathToCheck);
helper.addValidationEvent(new ValidationEvent(ValidationEvent.Severity.ERROR, context.getLocation("url"), message));
return serverVariables;
}
serverVariables.add(variable);
pathToCheck = pathToCheck.substring(lastIndex + 1);
}
if (pathToCheck.contains("}")) {
final String message = Tr.formatMessage(tc, "serverInvalidURL", pathToCheck);
helper.addValidationEvent(new ValidationEvent(ValidationEvent.Severity.ERROR, context.getLocation("url"), message));
return serverVariables;
}
return serverVariables;
} | java |
public int findFirstEyeCatcher(byte[] buffer, int off, int len) {
if (off < 0 || off >= buffer.length) {
throw new IllegalArgumentException("Offset should be in the buffer boundaries");
}
if (off + len > buffer.length) {
len = buffer.length - off;
}
// i - pointer in eyeCatcher, p - in the buffer.
int p = off + EYE_CATCHER.length - 1;
for (int i=EYE_CATCHER.length-1; i>=0; i--, p--) {
if (p >= off + len) {
return -1;
}
byte b = buffer[p];
if (b != EYE_CATCHER[i]) {
if (i == EYE_CATCHER.length-1) {
// Check if the byte is from the middle of the EYE_CATCHER
for (i--; i>=0; i--) {
if (b == EYE_CATCHER[i]) {
break;
}
}
// shift buffer to have the byte in i-th position
p += EYE_CATCHER.length - i;
} else {
// the whole buffer should be shifted due to the assumption.
p += EYE_CATCHER.length * 2 - i;
}
i = EYE_CATCHER.length;
}
}
return p+1;
} | java |
private void initialize()
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(this, tc, "initialize");
subsets = new ReliabilitySubset[maxReliabilityIndex + 1];
subsetIDs = new long[maxReliabilityIndex + 1];
for(int i=0;i<subsetIDs.length;i++)
{
subsetIDs[i] = NO_ID;
}
createControlAdapter();
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(tc, "initialize");
} | java |
protected void setStream(
int priority,
Reliability reliability,
Stream stream) throws SIResourceException
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(
tc,
"setStream",
new Object[] { new Integer(priority), reliability, stream });
ReliabilitySubset subset = getSubset(reliability);
subset.setStream(priority, stream);
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(tc, "setStream");
} | java |
public void updateCellule( SIBUuid8 newRemoteMEUuid)
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(this, tc, "updateCellule", newRemoteMEUuid);
this.remoteMEUuid = newRemoteMEUuid;
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(tc, "updateCellule");
} | java |
private ReliabilitySubset createPersistentSubset(Reliability reliability,
TransactionCommon tran) throws SIResourceException
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(this, tc, "createPersistentSubset", new Object[] { reliability });
ReliabilitySubset subset = new ReliabilitySubset(reliability, initialData);
subsets[getIndex(reliability)] = subset;
if(reliability.compareTo(Reliability.BEST_EFFORT_NONPERSISTENT) > 0)
{
try
{
Transaction msTran = txManager.resolveAndEnlistMsgStoreTransaction(tran);
itemStream.addItem(subset, msTran);
subsetIDs[getIndex(reliability)] = subset.getID();
}
catch (MessageStoreException e)
{
// FFDC
FFDCFilter.processException(
e,
"com.ibm.ws.sib.processor.gd.StreamSet.createPersistentSubset",
"1:398:1.67",
this);
//not sure if this default is needed but better safe than sorry
subsetIDs[getIndex(reliability)] = NO_ID;
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
{
SibTr.exception(tc, e);
SibTr.exit(tc, "createPersistentSubset", e);
}
}
}
else
{
subsetIDs[getIndex(reliability)] = NO_ID;
}
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(tc, "createPersistentSubset", subset);
return subset;
} | java |
private void createNonPersistentSubsets()
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(this, tc, "createNonPersistentSubsets");
for(int i=0; i<subsets.length; i++)
{
createNonPersistentSubset(getReliability(i));
}
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(tc, "createNonPersistentSubsets");
} | java |
private ReliabilitySubset createNonPersistentSubset(Reliability reliability)
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(
tc,
"createNonPersistentSubset",
new Object[] { reliability });
ReliabilitySubset subset = new ReliabilitySubset(reliability, initialData);
subsets[getIndex(reliability)] = subset;
subsetIDs[getIndex(reliability)] = NO_ID;
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(tc, "createNonPersistentSubset", subset);
return subset;
} | java |
public Stream getStream(int priority, Reliability reliability) throws SIResourceException
{
return getSubset(reliability).getStream(priority);
} | java |
public SIBUuid12 getDestUuid()
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
{
SibTr.entry(this, tc, "getDestUuid");
SibTr.exit(tc, "getDestUuid", destID);
}
return destID;
} | java |
protected void setDestUuid(SIBUuid12 destID)
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(tc, "setDestUuid", destID);
this.destID = destID;
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(tc, "setDestUuid");
} | java |
public SIBUuid8 getBusUuid()
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
{
SibTr.entry(this, tc, "getBusUuid");
SibTr.exit(tc, "getBusUuid", busID);
}
return busID;
} | java |
public boolean isPersistent()
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
{
SibTr.entry(this, tc, "isPersistent");
SibTr.exit(tc, "isPersistent", Boolean.valueOf(persistent));
}
return persistent;
} | java |
public SIBUuid12 getStreamID()
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
{
SibTr.entry(this, tc, "getStreamID");
SibTr.exit(tc, "getStreamID", streamID);
}
return streamID;
} | java |
protected void setPersistentData(int priority,
Reliability reliability,
long completedPrefix) throws SIResourceException
{
getSubset(reliability).setPersistentData(priority, completedPrefix);
} | java |
protected long getPersistentData(int priority, Reliability reliability) throws SIResourceException
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(
tc,
"getPersistentData",
new Object[] { new Integer(priority), reliability });
long prefix = getSubset(reliability).getPersistentData(priority);
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(tc, "getPersistentData", new Long(prefix));
return prefix;
} | java |
private boolean isOverFileLimit(int addition) {
if (LogFile.UNLIMITED == getMaximumSize()) {
return false;
}
// Note: to do this properly, we need to know if the admin updates the
// file externally, i.e. 'cat /dev/null > file' to clear it out. Windows
// JDK filechannel.size() was a buffered value (AIX was not), but the
// file.length() call on each checked the real value each time. This is
// a slight performance hit but it's the only 100% guarentee of being
// accurate.
long newlen = this.myFile.length() + addition;
return (newlen > getMaximumSize() || 0 > newlen);
} | java |
private void renameFile(File source, File target) {
if (!source.exists()) {
// don't do anything if the source file doesn't exist
return;
}
if (target.exists()) {
target.delete();
}
boolean rc = source.renameTo(target);
if (!rc) {
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) {
Tr.debug(tc, getFileName() + ": Unable to rename " + source + " to " + target);
}
}
} | java |
private void addBackup() {
// move the current log file to the newly formatted backup name
String newname = this.fileinfo + this.myFormat.format(new Date(HttpDispatcher.getApproxTime())) + this.extensioninfo;
File newFile = new File(newname);
renameFile(this.myFile, newFile);
// now see if we need to delete an existing backup to make room
if (this.backups.size() == getMaximumBackupFiles()) {
File oldest = this.backups.removeLast();
if (null != oldest && oldest.exists()) {
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) {
Tr.debug(tc, getFileName() + ": Purging oldest backup-> " + oldest.getName());
}
oldest.delete();
}
}
this.backups.addFirst(newFile);
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) {
Tr.debug(tc, getFileName() + ": number of backup files-> " + this.backups.size());
}
} | java |
private void rotate() {
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) {
Tr.debug(tc, getFileName() + ": Rotating output log");
}
try {
this.myChannel.close();
} catch (IOException ioe) {
FFDCFilter.processException(ioe, getClass().getName() + ".rotate", "424", this);
if (TraceComponent.isAnyTracingEnabled() && tc.isEventEnabled()) {
Tr.event(tc, getFileName() + ": Failed to close the output file; " + ioe);
}
}
try {
if (0 < getMaximumBackupFiles()) {
// add the new backup file to the stored list
addBackup();
}
this.myChannel = new FileOutputStream(this.myFile, true).getChannel();
} catch (SecurityException se) {
FFDCFilter.processException(se, getClass().getName() + ".rotate", "436", this);
if (TraceComponent.isAnyTracingEnabled() && tc.isEventEnabled()) {
Tr.event(tc, getFileName() + ": security error in rotate; " + se);
}
} catch (Throwable t) {
FFDCFilter.processException(t, getClass().getName() + ".rotate", "441", this);
if (TraceComponent.isAnyTracingEnabled() && tc.isEventEnabled()) {
Tr.event(tc, getFileName() + ": error in rotate; " + t);
}
}
} | java |
public static void binToHex(byte[] bin, int start, int length, StringBuffer hex) {
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.entry(tc, "binToHex", new Object[]{bin, Integer.valueOf(start), Integer.valueOf(length), hex});
/* Constant for binary to Hex conversion */
final char BIN2HEX[] = {'0','1','2','3','4','5','6','7','8','9','a','b','c','d','e','f'};
int binByte;
for (int i=start; i<start+length; i++)
{
binByte = bin[i];
/* SibTreat the byte as unsigned */
if (binByte < 0) binByte += 256;
/* Convert and append each digit */
hex.append(BIN2HEX[binByte/16]);
hex.append(BIN2HEX[binByte%16]);
}
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.exit(tc, "binToHex", hex);
} | java |
public static String binToHex(byte[] bin)
{
StringBuffer hex = new StringBuffer();
binToHex(bin,0,bin.length,hex);
return hex.toString();
} | java |
public static byte[] hexToBin(String hex, int start) {
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.entry(tc, "hexToBin", new Object[]{hex, Integer.valueOf(start)});
int digit1, digit2;
int length = (hex.length() - start); // no of characters to be processed
// Handle the special case when there is no data
if (length == 0) {
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.exit(tc, "hexToBin");
return new byte[0];
}
// It's an error if we have an odd number of hex characters
if ((length < 0) || ((length % 2) != 0)) {
String nlsMsg = nls.getFormattedMessage("BAD_HEX_STRING_CWSIU0200"
,new Object[]{hex}
,"The hexadecimal string " + hex + " is incorrectly formatted."
);
IllegalArgumentException e = new IllegalArgumentException(nlsMsg);
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.exit(tc, "hexToBin", e);
throw e;
}
// Change length from number of characters to number of bytes to be produced
length /= 2;
// Allocate a buffer to hold the result
byte[] retval = new byte[length];
// Convert from HexString to a byte array
for (int i = 0; i < length; i++) {
digit1 = (Character.digit(hex.charAt(2 * i + start), 16)) << 4;
digit2 = Character.digit(hex.charAt(2 * i + start + 1), 16);
// The Character.digit() method signals an error by returning -1, so we have
// to test for it here
if ((digit1 < 0) || (digit2 < 0)) {
String nlsMsg = nls.getFormattedMessage("BAD_HEX_STRING_CWSIF0200"
,new Object[]{hex}
,"The hexadecimal string " + hex + " is incorrectly formatted."
);
IllegalArgumentException e = new IllegalArgumentException(nlsMsg);
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.exit(tc, "hexToBin", e);
throw e;
}
retval[i] = (byte) (digit1 + digit2);
}
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.exit(tc, "hexToBin");
return retval;
} | java |
public FilterCell findNextCell(int nextValue) {
if (nextCell == null) {
return null;
}
return (FilterCell) (nextCell.get(nextValue));
} | java |
static void rcvCloseProducerSess(CommsByteBuffer request, Conversation conversation,
int requestNumber, boolean allocatedFromBufferPool,
boolean partOfExchange)
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(tc, "rcvCloseProducerSess",
new Object[]
{
request,
conversation,
"" + requestNumber,
"" + allocatedFromBufferPool,
"" + partOfExchange
});
ConversationState convState = (ConversationState) conversation.getAttachment();
short connectionObjectID = request.getShort(); // BIT16 ConnectionObjectId
short producerObjectID = request.getShort(); // BIT16 SyncProducerSessionId
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled())
{
SibTr.debug(tc, "connectionObjectID", connectionObjectID);
SibTr.debug(tc, "producerObjectID", producerObjectID);
}
ProducerSession producerSession = ((ProducerSession) convState.getObject(producerObjectID));
try
{
producerSession.close();
convState.removeObject(producerObjectID);
try
{
conversation.send(poolManager.allocate(),
JFapChannelConstants.SEG_CLOSE_PRODUCER_SESS_R,
requestNumber,
JFapChannelConstants.PRIORITY_MEDIUM,
true,
ThrottlingPolicy.BLOCK_THREAD,
null);
} catch (SIException e)
{
FFDCFilter.processException(e,
CLASS_NAME + ".rcvCloseProducerSess",
CommsConstants.STATICCATPRODUCER_CLOSE_01);
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled())
SibTr.debug(tc, e.getMessage(), e);
SibTr.error(tc, "COMMUNICATION_ERROR_SICO2024", e);
}
} catch (SIException e)
{
//No FFDC code needed - processor will have already FFDC'ed any interesting ones....
if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled())
SibTr.debug(tc, e.getMessage(), e);
StaticCATHelper.sendExceptionToClient(e,
CommsConstants.STATICCATPRODUCER_CLOSE_02, // d186970
conversation, requestNumber); // f172297
}
request.release(allocatedFromBufferPool);
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(tc, "rcvCloseProducerSess");
} | java |
static void rcvSendSessMsg(CommsServerByteBuffer request,
Conversation conversation,
int requestNumber,
boolean allocatedFromBufferPool,
boolean partOfExchange)
{
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.entry(tc, "rcvSendSessMsg");
final boolean optimizedTx = CommsUtils.requiresOptimizedTransaction(conversation);
sendSessMsg(request, conversation, requestNumber, partOfExchange,
allocatedFromBufferPool, true, optimizedTx);
if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled())
SibTr.exit(tc, "rcvSendSessMsg");
} | java |
RegistryEntry getRegistryEntry(String pid) {
if (pid == null) {
return null;
}
return entryMap.get(pid);
} | java |
private void processReferencedTypes(RegistryEntry pidEntry) {
//parent first, AD has a reference pid
for (ExtendedAttributeDefinition ad : pidEntry.getAttributeMap().values()) {
if (ad.getType() == MetaTypeFactory.PID_TYPE) {
if (ad.getReferencePid() != null) {
RegistryEntry other = getRegistryEntry(ad.getReferencePid());
if (other != null) {
PidReference ref = new PidReference(other, pidEntry, ad.getID(), true);
other.addReferencingEntry(ref);
pidEntry.addReferencedEntry(ref);
}
} else if (ad.getService() != null) {
addServiceUse(ad.getService(), pidEntry);
} else {
// Error.. should always be caught by metatype validation.. warn anyway?
}
}
}
//child first, child has a parentPid
if (pidEntry.getObjectClassDefinition().getParentPID() != null) {
RegistryEntry other = getRegistryEntry(pidEntry.getObjectClassDefinition().getParentPID());
if (other != null) {
pidEntry.addReferencingEntry(new PidReference(pidEntry, other, pidEntry.getChildAlias(), false));
}
//else.... this should go into invalidParentEntryMap
}
//see if anyone is referencing us.
for (RegistryEntry other : entryMap.values()) {
if (pidEntry.getPid().equals(other.getObjectClassDefinition().getParentPID())) {
other.addReferencingEntry(new PidReference(other, pidEntry, other.getChildAlias(), false));
}
for (ExtendedAttributeDefinition ad : other.getAttributeMap().values()) {
if (ad.getType() == MetaTypeFactory.PID_TYPE) {
if (pidEntry.getPid().equals(ad.getReferencePid())) {
pidEntry.addReferencingEntry(new PidReference(pidEntry, other, ad.getID(), true));
//TODO deal with service/objectclass here?
}
}
}
}
} | java |
protected final void unLock(ObjectManagerState objectManagerState)
{
synchronized (objectManagerState.transactionUnlockSequenceLock) {
unlockSequence = objectManagerState.getNewGlobalTransactionUnlockSequence();
lockingTransaction = null;
} // synchronized.
} | java |
protected void validateCertificate(X509Certificate[] chain) throws com.ibm.wsspi.security.wim.exception.CertificateMapFailedException {
// validate the certificate array
if (chain == null || chain.length == 0) {
throw new com.ibm.wsspi.security.wim.exception.CertificateMapFailedException();
}
for (X509Certificate cert : chain) {
if (cert == null) {
throw new com.ibm.wsspi.security.wim.exception.CertificateMapFailedException();
}
}
} | java |
protected IDAndRealm separateIDAndRealm(String inputString) throws WIMException {
// initialize the method name
String methodName = "seperateIDAndRealm";
if (tc.isDebugEnabled()) {
Tr.debug(tc, methodName + " " + "inputString = \"" + inputString + "\"");
}
String defaultRealm = getDefaultRealmName();
if (tc.isDebugEnabled()) {
Tr.debug(tc, methodName + " " + "Default realm name = \"" + defaultRealm + "\"");
}
String defaultRealmDelimiter = getCoreConfiguration().getDefaultDelimiter();
Set<String> virtualRealms = getCoreConfiguration().getRealmNames(); //will not be null since set will always be returned
Map<String, String> virtualRealmsDelimiter = new HashMap<String, String>();
for (Iterator<String> itr = virtualRealms.iterator(); itr.hasNext();) {
String virtualRealm = itr.next();
String delimiter = getCoreConfiguration().getDelimiter(virtualRealm);
virtualRealmsDelimiter.put(virtualRealm, delimiter);
}
//add default/UR realm to the list of realms to handle no VMM realm scenorio
if (virtualRealms.size() == 0) {
virtualRealms = new HashSet(); //if empty it will be a abstract set.So need to initialize, else will fail while adding element to it.
virtualRealms.add(defaultRealm);
virtualRealmsDelimiter.put(defaultRealm, defaultRealmDelimiter);
}
return seperateIDAndRealm(inputString, defaultRealm, defaultRealmDelimiter, virtualRealms,
virtualRealmsDelimiter);
} | java |
public boolean isIdentifierTypeProperty(String inputProperty) {
// initialize the return value
boolean returnValue = false;
// test the property
if ((inputProperty != null)
&& ((inputProperty.equals(Service.PROP_UNIQUE_ID)) || (inputProperty.equals(Service.PROP_UNIQUE_NAME))
|| (inputProperty.equals(Service.PROP_EXTERNAL_ID)) || (inputProperty.equals(Service.PROP_EXTERNAL_NAME)))) {
returnValue = true;
}
return returnValue;
} | java |
protected void createRealmDataObject(Root inputRootObject, String inputRealm) {
// use the root DataGraph to create a Context DataGraph
List<Context> contexts = inputRootObject.getContexts();
if (contexts != null) {
Context ctx = new Context();
// set "WIM.Realm" in the Context DataGraph to the realm
ctx.setKey(Service.VALUE_CONTEXT_REALM_KEY);
ctx.setValue(inputRealm);
contexts.add(ctx);
}
} | java |
protected void createPropertyControlDataObject(Root inputRootDataObject, String inputProperty) {
// use the root DataGraph to create a PropertyControl DataGraph
List<Control> propertyControls = inputRootDataObject.getControls();
PropertyControl propCtrl = null;
if (propertyControls != null) {
propCtrl = new PropertyControl();
propertyControls.add(propCtrl);
}
// add the requested property to the return list of properties
if (propCtrl != null) {
propCtrl.getProperties().add(inputProperty);
}
} | java |
protected String getRealInputAttrName(String inputAttrName, String id, boolean isUser) {
boolean isInputAttrValueDN = UniqueNameHelper.isDN(id) != null;
boolean isInputAttrIdentifier = isIdentifierTypeProperty(inputAttrName);
if (!isInputAttrIdentifier && isInputAttrValueDN) {
// To suppress the below message from coming in trace.log due to defect 94474
/*
* if (tc.isWarningEnabled()) {
* //Tr.warning(tc, "the propertyForInput " + inputAttrName + " doesn't match the format of input value " + id + ", switch to uniqueName");
* Tr.warning(tc, WIMMessageKey.INVALID_PROPERTY_VALUE_FORMAT, inputAttrName);
* }
*/
inputAttrName = "uniqueName";
//take it as uniqueName because we don't know if it's externalName or uniqueName value
} else if (isInputAttrIdentifier && !isInputAttrValueDN) {
// if dealing with LoginAccount or Group
if (isUser) {
// To suppress the below message from coming in trace.log due to defect 94474
/*
* if (tc.isWarningEnabled()) {
* //Tr.warning(tc, "the propertyForInput " + inputAttrName + " doesn't match the format of input value " + id + ", switch to principalName");
* Tr.warning(tc, WIMMessageKey.INVALID_PROPERTY_VALUE_FORMAT, inputAttrName);
* }
*/
inputAttrName = "principalName"; // loginaccounts
}
//OR
else {
// To suppress the below message from coming in trace.log due to defect 94474
/*
* if (tc.isWarningEnabled()) {
* //Tr.warning(tc, "the propertyForInput " + inputAttrName + " doesn't match the format of input value " + id + ", swith to cn");
* Tr.warning(tc, WIMMessageKey.INVALID_PROPERTY_VALUE_FORMAT, inputAttrName);
* }
*/
inputAttrName = "cn"; // groups
}
}
return inputAttrName;
} | java |
public String getDefaultRealmName() {
String returnRealm = getCoreConfiguration().getDefaultRealmName();
if (returnRealm == null) {
returnRealm = urRealmName;
}
return returnRealm;
} | java |
private final Properties loadPropertiesFile(WsResource res) throws IOException {
Properties props = new Properties();
InputStream is = res.get();
try {
props.load(is);
} catch (IOException e) {
if (TraceComponent.isAnyTracingEnabled() && tc.isEventEnabled()) {
Tr.event(this, tc, "Error loading properties; " + e);
}
throw e;
} finally {
if (is != null)
try {
is.close();
} catch (IOException e) {
}
}
return props;
} | java |
final WsResource getLTPAKeyFileResource(WsLocationAdmin locService, String ltpaKeyFile) {
WsResource ltpaFile = locService.resolveResource(ltpaKeyFile);
if (ltpaFile != null && ltpaFile.exists()) {
return ltpaFile;
} else {
// The file does not exist so return null
return null;
}
} | java |
void cleanupBoxedCache(int boxedAccessor) {
for (int i = 0; i < boxedCache.length; i++)
if (boxed[i][0] == boxedAccessor)
boxedCache[i] = null;
} | java |
private JSON getJSON() throws JSONMarshallException {
if (json == null) {
JSONSettings settings = new JSONSettings(Include.NON_NULL);
json = JSONFactory.newInstance(settings);
}
return json;
} | java |
public void setSubscriptionIDFilter(String subscriptionId)
{
if (tc.isEntryEnabled())
SibTr.entry(tc, "setSubscriptionIDFilter", subscriptionId);
this._subscriptionId = subscriptionId;
this._destination = null;
this._consumerDispatcherState = null;
if (tc.isEntryEnabled())
SibTr.exit(tc, "setSubscriptionIDFilter");
} | java |
public void setDestinationFilter(SIBUuid12 destination)
{
if (tc.isEntryEnabled())
SibTr.entry(tc, "setDestinationFilter", destination);
this._destination = destination;
this._subscriptionId = null;
this._consumerDispatcherState = null;
if (tc.isEntryEnabled())
SibTr.exit(tc, "setDestinationFilter");
} | java |
public void setConsumerDispatcherStateFilter(ConsumerDispatcherState consumerDispatcherState)
{
if (tc.isEntryEnabled())
SibTr.entry(tc, "setConsumerDispatcherStateFilter", consumerDispatcherState);
this._consumerDispatcherState = consumerDispatcherState;
this._subscriptionId = null;
this._destination = null;
if (tc.isEntryEnabled())
SibTr.exit(tc, "setConsumerDispatcherStateFilter");
} | java |
public boolean filterMatches(AbstractItem item)
{
if (tc.isEntryEnabled())
SibTr.entry(tc, "filterMatches", item);
/* Cast the incoming item to a subscriptionState object. if it is not, an
* exception will be thrown and the match will fail */
ConsumerDispatcherState subState = null;
if (item instanceof DurableSubscriptionItemStream)
{
try
{
subState = ((DurableSubscriptionItemStream) item).getConsumerDispatcherState();
}
catch (Exception e)
{
FFDCFilter.processException(
e,
"com.ibm.ws.sib.processor.impl.store.filters.SubscriptionStateFilter.filterMatches",
"1:180:1.33.1.1",
this);
SibTr.exception(tc, e);
if (tc.isEntryEnabled())
SibTr.exit(tc, "filterMatches", e);
return false;
}
/* If this filter is a subscriptionId filter, check for a match */
if (_subscriptionId != null)
{
boolean retval = (subState.getSubscriberID().equals(_subscriptionId));
if (tc.isEntryEnabled())
SibTr.exit(tc, "filterMatches", Boolean.valueOf(retval));
return retval;
}
/* If this filter is a destination name filter, check for a match */
if (_destination != null)
{
boolean retval = (subState.getTopicSpaceUuid().equals(_destination));
if (tc.isEntryEnabled())
SibTr.exit(tc, "filterMatches", Boolean.valueOf(retval));
return retval;
}
/* If this filter is for a specific consumer dispatcher state object, check for a match */
if (_consumerDispatcherState != null)
{
boolean retval = (subState == _consumerDispatcherState);
if (tc.isEntryEnabled())
SibTr.exit(tc, "filterMatches", Boolean.valueOf(retval));
return retval;
}
//The match succeeds if its a durable subscription and no specific matching is requested
if ((_destination == null) && (_subscriptionId == null) && (_consumerDispatcherState == null))
{
if (tc.isEntryEnabled())
SibTr.exit(tc, "filterMatches", Boolean.TRUE);
return true;
}
}
/* If filter type has not been set, the match fails */
if (tc.isEntryEnabled())
SibTr.exit(tc, "filterMatches", Boolean.FALSE);
return false;
} | java |
public boolean matchesToMicros(LibertyVersion other) {
if (other == null) {
return true;
}
return this.major == other.major && this.minor == other.minor && this.micro == other.micro;
} | java |
public void putCustomizedProperty(String key, Object obj) {
if (key == null || obj == null)
return;
customizedProperties.put(key, obj);
} | java |
PartialMatch newPartialMatch(char[] key, PartialMatch pm) {
if (tc.isEntryEnabled())
tc.entry(this,cclass, "newPartialMatch", "key: "+new String(key)+", pm:"+pm);
PartialMatch ans = new PartialMatch(key, pm, owner);
if (tc.isEntryEnabled())
tc.exit(this,cclass, "newPartialMatch", ans);
return ans;
} | java |
void put(PatternWrapper pattern, Conjunction selector, MatchTarget object,
InternTable subExpr) throws MatchingException {
if (tc.isEntryEnabled())
tc.entry(this,cclass, "put", new Object[]{pattern,selector,object,subExpr});
switch (pattern.getState()) {
case PatternWrapper.FINAL_EXACT:
exactChild = owner.nextMatcher(selector, exactChild);
exactChild.put(selector, object, subExpr);
break;
case PatternWrapper.FINAL_MANY:
if(hasMidClauses(pattern))
{
// We have multiple multi-level wildcarding and need to work with the
// matchManyChildren list
ContentMatcher next = null;
MatchManyWrapper wrapper= findMatchManyWrapper(pattern);
if(wrapper != null)
next = wrapper.matcher;
ContentMatcher newNext = owner.nextMatcher(selector, next);
if (newNext != next)
{
if (matchManyChildren == null)
matchManyChildren = new ArrayList(3); // 3 is somewhat arbitrary
MatchManyWrapper matchManyElement = new MatchManyWrapper(pattern, newNext);
matchManyChildren.add(matchManyElement);
}
newNext.put(selector, object, subExpr);
}
else
{
// Simpler case where there is a single multi-level wildcard
singleMatchManyChild = owner.nextMatcher(selector, singleMatchManyChild);
singleMatchManyChild.put(selector, object, subExpr);
}
break;
case PatternWrapper.PREFIX_CHARS:
case PatternWrapper.SUFFIX_CHARS:
PartialMatch pm = findOrCreate(pattern.getChars());
pm.put(pattern, selector, object, subExpr);
break;
case PatternWrapper.SKIP_ONE_PREFIX:
case PatternWrapper.SKIP_ONE_SUFFIX:
if (matchOneChild == null)
matchOneChild = newPartialMatch();
pattern.advance();
matchOneChild.put(pattern, selector, object, subExpr);
break;
case PatternWrapper.SWITCH_TO_SUFFIX:
if (suffix == null)
suffix = newPartialMatch();
pattern.advance();
suffix.put(pattern, selector, object, subExpr);
break;
}
if (tc.isEntryEnabled())
tc.exit(this,cclass, "put");
} | java |