idx
int64
0
41.2k
question
stringlengths
83
4.15k
target
stringlengths
5
715
21,900
public static boolean isMethodNode ( ASTNode node , String methodNamePattern , Integer numArguments , Class returnType ) { if ( ! ( node instanceof MethodNode ) ) { return false ; } if ( ! ( ( ( MethodNode ) node ) . getName ( ) . matches ( methodNamePattern ) ) ) { return false ; } if ( numArguments != null && ( ( MethodNode ) node ) . getParameters ( ) != null && ( ( MethodNode ) node ) . getParameters ( ) . length != numArguments ) { return false ; } if ( returnType != null && ! AstUtil . classNodeImplementsType ( ( ( MethodNode ) node ) . getReturnType ( ) , returnType ) ) { return false ; } return true ; }
Tells you if the ASTNode is a method node for the given name arity and return type .
21,901
public static boolean isVariable ( ASTNode expression , String pattern ) { return ( expression instanceof VariableExpression && ( ( VariableExpression ) expression ) . getName ( ) . matches ( pattern ) ) ; }
Tells you if the given ASTNode is a VariableExpression with the given name .
21,902
private static Class getClassForClassNode ( ClassNode type ) { Class primitiveType = getPrimitiveType ( type ) ; if ( primitiveType != null ) { return primitiveType ; } else if ( classNodeImplementsType ( type , String . class ) ) { return String . class ; } else if ( classNodeImplementsType ( type , ReentrantLock . class ) ) { return ReentrantLock . class ; } else if ( type . getName ( ) != null && type . getName ( ) . endsWith ( "[]" ) ) { return Object [ ] . class ; } return null ; }
This is private . It is a helper function for the utils .
21,903
public static int findFirstNonAnnotationLine ( ASTNode node , SourceCode sourceCode ) { if ( node instanceof AnnotatedNode && ! ( ( AnnotatedNode ) node ) . getAnnotations ( ) . isEmpty ( ) ) { AnnotationNode lastAnnotation = null ; for ( AnnotationNode annotation : ( ( AnnotatedNode ) node ) . getAnnotations ( ) ) { if ( lastAnnotation == null ) lastAnnotation = annotation ; else if ( lastAnnotation . getLineNumber ( ) < annotation . getLineNumber ( ) ) lastAnnotation = annotation ; } String rawLine = getRawLine ( sourceCode , lastAnnotation . getLastLineNumber ( ) - 1 ) ; if ( rawLine == null ) { return node . getLineNumber ( ) ; } if ( rawLine . length ( ) > lastAnnotation . getLastColumnNumber ( ) ) { return lastAnnotation . getLastLineNumber ( ) ; } return lastAnnotation . getLastLineNumber ( ) + 1 ; } return node . getLineNumber ( ) ; }
gets the first non annotation line number of a node taking into account annotations .
21,904
protected boolean isFirstVisit ( Object expression ) { if ( visited . contains ( expression ) ) { return false ; } visited . add ( expression ) ; return true ; }
Return true if the AST expression has not already been visited . If it is the first visit register the expression so that the next visit will return false .
21,905
protected String sourceLineTrimmed ( ASTNode node ) { return sourceCode . line ( AstUtil . findFirstNonAnnotationLine ( node , sourceCode ) - 1 ) ; }
Return the trimmed source line corresponding to the specified AST node
21,906
protected String sourceLine ( ASTNode node ) { return sourceCode . getLines ( ) . get ( AstUtil . findFirstNonAnnotationLine ( node , sourceCode ) - 1 ) ; }
Return the raw source line corresponding to the specified AST node
21,907
public static < T > T buildJsonResponse ( Response response , Class < T > clazz ) throws IOException , SlackApiException { if ( response . code ( ) == 200 ) { String body = response . body ( ) . string ( ) ; DETAILED_LOGGER . accept ( new HttpResponseListener . State ( SlackConfig . DEFAULT , response , body ) ) ; return GsonFactory . createSnakeCase ( ) . fromJson ( body , clazz ) ; } else { String body = response . body ( ) . string ( ) ; throw new SlackApiException ( response , body ) ; } }
use parseJsonResponse instead
21,908
public WebhookResponse send ( String url , Payload payload ) throws IOException { SlackHttpClient httpClient = getHttpClient ( ) ; Response httpResponse = httpClient . postJsonPostRequest ( url , payload ) ; String body = httpResponse . body ( ) . string ( ) ; httpClient . runHttpResponseListeners ( httpResponse , body ) ; return WebhookResponse . builder ( ) . code ( httpResponse . code ( ) ) . message ( httpResponse . message ( ) ) . body ( body ) . build ( ) ; }
Send a data to Incoming Webhook endpoint .
21,909
private void updateSession ( Session newSession ) { if ( this . currentSession == null ) { this . currentSession = newSession ; } else { synchronized ( this . currentSession ) { this . currentSession = newSession ; } } }
Overwrites the underlying WebSocket session .
21,910
public Class < E > getEventClass ( ) { if ( cachedClazz != null ) { return cachedClazz ; } Class < ? > clazz = this . getClass ( ) ; while ( clazz != Object . class ) { try { Type mySuperclass = clazz . getGenericSuperclass ( ) ; Type tType = ( ( ParameterizedType ) mySuperclass ) . getActualTypeArguments ( ) [ 0 ] ; cachedClazz = ( Class < E > ) Class . forName ( tType . getTypeName ( ) ) ; return cachedClazz ; } catch ( Exception e ) { } clazz = clazz . getSuperclass ( ) ; } throw new IllegalStateException ( "Failed to load event class - " + this . getClass ( ) . getCanonicalName ( ) ) ; }
Returns the Class object of the Event implementation .
21,911
protected final String computeId ( final ITemplateContext context , final IProcessableElementTag tag , final String name , final boolean sequence ) { String id = tag . getAttributeValue ( this . idAttributeDefinition . getAttributeName ( ) ) ; if ( ! org . thymeleaf . util . StringUtils . isEmptyOrWhitespace ( id ) ) { return ( StringUtils . hasText ( id ) ? id : null ) ; } id = FieldUtils . idFromName ( name ) ; if ( sequence ) { final Integer count = context . getIdentifierSequences ( ) . getAndIncrementIDSeq ( id ) ; return id + count . toString ( ) ; } return id ; }
This method is designed to be called from the diverse subclasses
21,912
public String code ( final String code ) { if ( this . theme == null ) { throw new TemplateProcessingException ( "Theme cannot be resolved because RequestContext was not found. " + "Are you using a Context object without a RequestContext variable?" ) ; } return this . theme . getMessageSource ( ) . getMessage ( code , null , "" , this . locale ) ; }
Looks up and returns the value of the given key in the properties file of the currently - selected theme .
21,913
private static DirectoryGrouping resolveDirectoryGrouping ( final ModelNode model , final ExpressionResolver expressionResolver ) { try { return DirectoryGrouping . forName ( HostResourceDefinition . DIRECTORY_GROUPING . resolveModelAttribute ( expressionResolver , model ) . asString ( ) ) ; } catch ( OperationFailedException e ) { throw new IllegalStateException ( e ) ; } }
Returns the value of found in the model .
21,914
private String addPathProperty ( final List < String > command , final String typeName , final String propertyName , final Map < String , String > properties , final DirectoryGrouping directoryGrouping , final File typeDir , File serverDir ) { final String result ; final String value = properties . get ( propertyName ) ; if ( value == null ) { switch ( directoryGrouping ) { case BY_TYPE : result = getAbsolutePath ( typeDir , "servers" , serverName ) ; break ; case BY_SERVER : default : result = getAbsolutePath ( serverDir , typeName ) ; break ; } properties . put ( propertyName , result ) ; } else { final File dir = new File ( value ) ; switch ( directoryGrouping ) { case BY_TYPE : result = getAbsolutePath ( dir , "servers" , serverName ) ; break ; case BY_SERVER : default : result = getAbsolutePath ( dir , serverName ) ; break ; } } command . add ( String . format ( "-D%s=%s" , propertyName , result ) ) ; return result ; }
Adds the absolute path to command .
21,915
private String findLoggingProfile ( final ResourceRoot resourceRoot ) { final Manifest manifest = resourceRoot . getAttachment ( Attachments . MANIFEST ) ; if ( manifest != null ) { final String loggingProfile = manifest . getMainAttributes ( ) . getValue ( LOGGING_PROFILE ) ; if ( loggingProfile != null ) { LoggingLogger . ROOT_LOGGER . debugf ( "Logging profile '%s' found in '%s'." , loggingProfile , resourceRoot ) ; return loggingProfile ; } } return null ; }
Find the logging profile attached to any resource .
21,916
public static int getBytesToken ( ParsingContext ctx ) { String input = ctx . getInput ( ) . substring ( ctx . getLocation ( ) ) ; int tokenOffset = 0 ; int i = 0 ; char [ ] inputChars = input . toCharArray ( ) ; for ( ; i < input . length ( ) ; i += 1 ) { char c = inputChars [ i ] ; if ( c == ' ' ) { continue ; } if ( c != BYTES_TOKEN_CHARS [ tokenOffset ] ) { return - 1 ; } else { tokenOffset += 1 ; if ( tokenOffset == BYTES_TOKEN_CHARS . length ) { return i ; } } } return - 1 ; }
handle white spaces .
21,917
public static void addOperation ( final OperationContext context ) { RbacSanityCheckOperation added = context . getAttachment ( KEY ) ; if ( added == null ) { if ( ! context . isNormalServer ( ) ) return ; context . addStep ( createOperation ( ) , INSTANCE , Stage . MODEL ) ; context . attach ( KEY , INSTANCE ) ; } }
Add the operation at the end of Stage MODEL if this operation has not already been registered .
21,918
public static ModelNode getFailureDescription ( final ModelNode result ) { if ( isSuccessfulOutcome ( result ) ) { throw ControllerClientLogger . ROOT_LOGGER . noFailureDescription ( ) ; } if ( result . hasDefined ( FAILURE_DESCRIPTION ) ) { return result . get ( FAILURE_DESCRIPTION ) ; } return new ModelNode ( ) ; }
Parses the result and returns the failure description .
21,919
public static ModelNode getOperationAddress ( final ModelNode op ) { return op . hasDefined ( OP_ADDR ) ? op . get ( OP_ADDR ) : new ModelNode ( ) ; }
Returns the address for the operation .
21,920
public static String getOperationName ( final ModelNode op ) { if ( op . hasDefined ( OP ) ) { return op . get ( OP ) . asString ( ) ; } throw ControllerClientLogger . ROOT_LOGGER . operationNameNotFound ( ) ; }
Returns the name of the operation .
21,921
public static ModelNode createReadResourceOperation ( final ModelNode address , final boolean recursive ) { final ModelNode op = createOperation ( READ_RESOURCE_OPERATION , address ) ; op . get ( RECURSIVE ) . set ( recursive ) ; return op ; }
Creates an operation to read a resource .
21,922
public ModelNode buildRequest ( ) throws OperationFormatException { ModelNode address = request . get ( Util . ADDRESS ) ; if ( prefix . isEmpty ( ) ) { address . setEmptyList ( ) ; } else { Iterator < Node > iterator = prefix . iterator ( ) ; while ( iterator . hasNext ( ) ) { OperationRequestAddress . Node node = iterator . next ( ) ; if ( node . getName ( ) != null ) { address . add ( node . getType ( ) , node . getName ( ) ) ; } else if ( iterator . hasNext ( ) ) { throw new OperationFormatException ( "The node name is not specified for type '" + node . getType ( ) + "'" ) ; } } } if ( ! request . hasDefined ( Util . OPERATION ) ) { throw new OperationFormatException ( "The operation name is missing or the format of the operation request is wrong." ) ; } return request ; }
Makes sure that the operation name and the address have been set and returns a ModelNode representing the operation request .
21,923
private void parseUsersAuthentication ( final XMLExtendedStreamReader reader , final ModelNode realmAddress , final List < ModelNode > list ) throws XMLStreamException { final ModelNode usersAddress = realmAddress . clone ( ) . add ( AUTHENTICATION , USERS ) ; list . add ( Util . getEmptyOperation ( ADD , usersAddress ) ) ; while ( reader . hasNext ( ) && reader . nextTag ( ) != END_ELEMENT ) { requireNamespace ( reader , namespace ) ; final Element element = Element . forName ( reader . getLocalName ( ) ) ; switch ( element ) { case USER : { parseUser ( reader , usersAddress , list ) ; break ; } default : { throw unexpectedElement ( reader ) ; } } } }
The users element defines users within the domain model it is a simple authentication for some out of the box users .
21,924
public Set < Action . ActionEffect > getActionEffects ( ) { switch ( getImpact ( ) ) { case CLASSLOADING : case WRITE : return WRITES ; case READ_ONLY : return READS ; default : throw new IllegalStateException ( ) ; } }
Gets the effects of this action .
21,925
private ModelNode addLocalHost ( final ModelNode address , final List < ModelNode > operationList , final String hostName ) { String resolvedHost = hostName != null ? hostName : defaultHostControllerName ; address . add ( HOST , resolvedHost ) ; final ModelNode hostAddOp = new ModelNode ( ) ; hostAddOp . get ( OP ) . set ( HostAddHandler . OPERATION_NAME ) ; hostAddOp . get ( OP_ADDR ) . set ( address ) ; operationList . add ( hostAddOp ) ; ModelNode nameValue = hostName == null ? new ModelNode ( ) : new ModelNode ( hostName ) ; final ModelNode writeName = Util . getWriteAttributeOperation ( address , NAME , nameValue ) ; operationList . add ( writeName ) ; return hostAddOp ; }
Add the operation to add the local host definition .
21,926
public static byte [ ] hashPath ( MessageDigest messageDigest , Path path ) throws IOException { try ( InputStream in = getRecursiveContentStream ( path ) ) { return hashContent ( messageDigest , in ) ; } }
Hashes a path if the path points to a directory then hashes the contents recursively .
21,927
public synchronized ModelNode doCommand ( String command ) throws CommandFormatException , IOException { ModelNode request = cmdCtx . buildRequest ( command ) ; return execute ( request , isSlowCommand ( command ) ) . getResponseNode ( ) ; }
Submit a command to the server .
21,928
public synchronized Response doCommandFullResponse ( String command ) throws CommandFormatException , IOException { ModelNode request = cmdCtx . buildRequest ( command ) ; boolean replacedBytes = replaceFilePathsWithBytes ( request ) ; OperationResponse response = execute ( request , isSlowCommand ( command ) || replacedBytes ) ; return new Response ( command , request , response ) ; }
User - initiated commands use this method .
21,929
private File [ ] getFilesFromProperty ( final String name , final Properties props ) { String sep = WildFlySecurityManager . getPropertyPrivileged ( "path.separator" , null ) ; String value = props . getProperty ( name , null ) ; if ( value != null ) { final String [ ] paths = value . split ( Pattern . quote ( sep ) ) ; final int len = paths . length ; final File [ ] files = new File [ len ] ; for ( int i = 0 ; i < len ; i ++ ) { files [ i ] = new File ( paths [ i ] ) ; } return files ; } return NO_FILES ; }
Get a File path list from configuration .
21,930
public boolean putAtomic ( C instance , K key , V value , Map < K , V > snapshot ) { Assert . checkNotNullParam ( "key" , key ) ; final Map < K , V > newMap ; final int oldSize = snapshot . size ( ) ; if ( oldSize == 0 ) { newMap = Collections . singletonMap ( key , value ) ; } else if ( oldSize == 1 ) { final Map . Entry < K , V > entry = snapshot . entrySet ( ) . iterator ( ) . next ( ) ; final K oldKey = entry . getKey ( ) ; if ( oldKey . equals ( key ) ) { return false ; } else { newMap = new FastCopyHashMap < K , V > ( snapshot ) ; newMap . put ( key , value ) ; } } else { newMap = new FastCopyHashMap < K , V > ( snapshot ) ; newMap . put ( key , value ) ; } return updater . compareAndSet ( instance , snapshot , newMap ) ; }
Put a value if and only if the map has not changed since the given snapshot was taken . If the put fails it is the caller s responsibility to retry .
21,931
public void parseAndSetParameter ( String value , ModelNode operation , XMLStreamReader reader ) throws XMLStreamException { if ( value != null ) { for ( String element : value . split ( "," ) ) { parseAndAddParameterElement ( element . trim ( ) , operation , reader ) ; } } }
Parses whole value as list attribute
21,932
boolean lock ( final Integer permit , final long timeout , final TimeUnit unit ) { boolean result = false ; try { result = lockInterruptibly ( permit , timeout , unit ) ; } catch ( InterruptedException e ) { Thread . currentThread ( ) . interrupt ( ) ; } return result ; }
Attempts exclusive acquisition with a max wait time .
21,933
boolean lockShared ( final Integer permit , final long timeout , final TimeUnit unit ) { boolean result = false ; try { result = lockSharedInterruptibly ( permit , timeout , unit ) ; } catch ( InterruptedException e ) { Thread . currentThread ( ) . interrupt ( ) ; } return result ; }
Attempts shared acquisition with a max wait time .
21,934
void lockInterruptibly ( final Integer permit ) throws InterruptedException { if ( permit == null ) { throw new IllegalArgumentException ( ) ; } sync . acquireInterruptibly ( permit ) ; }
Acquire the exclusive lock allowing the acquisition to be interrupted .
21,935
void lockSharedInterruptibly ( final Integer permit ) throws InterruptedException { if ( permit == null ) { throw new IllegalArgumentException ( ) ; } sync . acquireSharedInterruptibly ( permit ) ; }
Acquire the shared lock allowing the acquisition to be interrupted .
21,936
boolean lockInterruptibly ( final Integer permit , final long timeout , final TimeUnit unit ) throws InterruptedException { if ( permit == null ) { throw new IllegalArgumentException ( ) ; } return sync . tryAcquireNanos ( permit , unit . toNanos ( timeout ) ) ; }
Acquire the exclusive lock with a max wait timeout to acquire .
21,937
boolean lockSharedInterruptibly ( final Integer permit , final long timeout , final TimeUnit unit ) throws InterruptedException { if ( permit == null ) { throw new IllegalArgumentException ( ) ; } return sync . tryAcquireSharedNanos ( permit , unit . toNanos ( timeout ) ) ; }
Acquire the shared lock with a max wait timeout to acquire .
21,938
CapabilityRegistry createShadowCopy ( ) { CapabilityRegistry result = new CapabilityRegistry ( forServer , this ) ; readLock . lock ( ) ; try { try { result . writeLock . lock ( ) ; copy ( this , result ) ; } finally { result . writeLock . unlock ( ) ; } } finally { readLock . unlock ( ) ; } return result ; }
Creates updateable version of capability registry that on publish pushes all changes to main registry this is used to create context local registry that only on completion commits changes to main registry
21,939
private void registerRequirement ( RuntimeRequirementRegistration requirement ) { assert writeLock . isHeldByCurrentThread ( ) ; CapabilityId dependentId = requirement . getDependentId ( ) ; if ( ! capabilities . containsKey ( dependentId ) ) { throw ControllerLogger . MGMT_OP_LOGGER . unknownCapabilityInContext ( dependentId . getName ( ) , dependentId . getScope ( ) . getName ( ) ) ; } Map < CapabilityId , Map < String , RuntimeRequirementRegistration > > requirementMap = requirement . isRuntimeOnly ( ) ? runtimeOnlyRequirements : requirements ; Map < String , RuntimeRequirementRegistration > dependents = requirementMap . get ( dependentId ) ; if ( dependents == null ) { dependents = new HashMap < > ( ) ; requirementMap . put ( dependentId , dependents ) ; } RuntimeRequirementRegistration existing = dependents . get ( requirement . getRequiredName ( ) ) ; if ( existing == null ) { dependents . put ( requirement . getRequiredName ( ) , requirement ) ; } else { existing . addRegistrationPoint ( requirement . getOldestRegistrationPoint ( ) ) ; } modified = true ; }
This must be called with the write lock held .
21,940
public void removeCapabilityRequirement ( RuntimeRequirementRegistration requirementRegistration ) { writeLock . lock ( ) ; try { removeRequirement ( requirementRegistration , false ) ; removeRequirement ( requirementRegistration , true ) ; } finally { writeLock . unlock ( ) ; } }
Remove a previously registered requirement for a capability .
21,941
void publish ( ) { assert publishedFullRegistry != null : "Cannot write directly to main registry" ; writeLock . lock ( ) ; try { if ( ! modified ) { return ; } publishedFullRegistry . writeLock . lock ( ) ; try { publishedFullRegistry . clear ( true ) ; copy ( this , publishedFullRegistry ) ; pendingRemoveCapabilities . clear ( ) ; pendingRemoveRequirements . clear ( ) ; modified = false ; } finally { publishedFullRegistry . writeLock . unlock ( ) ; } } finally { writeLock . unlock ( ) ; } }
Publish the changes to main registry
21,942
void rollback ( ) { if ( publishedFullRegistry == null ) { return ; } writeLock . lock ( ) ; try { publishedFullRegistry . readLock . lock ( ) ; try { clear ( true ) ; copy ( publishedFullRegistry , this ) ; modified = false ; } finally { publishedFullRegistry . readLock . unlock ( ) ; } } finally { writeLock . unlock ( ) ; } }
Discard the changes .
21,943
static void addOperationAddress ( final ModelNode operation , final PathAddress base , final String key , final String value ) { operation . get ( OP_ADDR ) . set ( base . append ( key , value ) . toModelNode ( ) ) ; }
Appends the key and value to the address and sets the address on the operation .
21,944
static String findNonProgressingOp ( Resource resource , boolean forServer , long timeout ) throws OperationFailedException { Resource . ResourceEntry nonProgressing = null ; for ( Resource . ResourceEntry child : resource . getChildren ( ACTIVE_OPERATION ) ) { ModelNode model = child . getModel ( ) ; if ( model . get ( EXCLUSIVE_RUNNING_TIME ) . asLong ( ) > timeout ) { nonProgressing = child ; ControllerLogger . MGMT_OP_LOGGER . tracef ( "non-progressing op: %s" , nonProgressing . getModel ( ) ) ; break ; } } if ( nonProgressing != null && ! forServer ) { ModelNode model = nonProgressing . getModel ( ) ; if ( model . get ( DOMAIN_ROLLOUT ) . asBoolean ( ) && OperationContext . ExecutionStatus . COMPLETING . toString ( ) . equals ( model . get ( EXECUTION_STATUS ) . asString ( ) ) && model . hasDefined ( DOMAIN_UUID ) ) { ControllerLogger . MGMT_OP_LOGGER . trace ( "Potential domain rollout issue" ) ; String domainUUID = model . get ( DOMAIN_UUID ) . asString ( ) ; Set < String > relatedIds = null ; List < Resource . ResourceEntry > relatedExecutingOps = null ; for ( Resource . ResourceEntry activeOp : resource . getChildren ( ACTIVE_OPERATION ) ) { if ( nonProgressing . getName ( ) . equals ( activeOp . getName ( ) ) ) { continue ; } ModelNode opModel = activeOp . getModel ( ) ; if ( opModel . hasDefined ( DOMAIN_UUID ) && domainUUID . equals ( opModel . get ( DOMAIN_UUID ) . asString ( ) ) && opModel . get ( RUNNING_TIME ) . asLong ( ) > timeout ) { if ( relatedIds == null ) { relatedIds = new TreeSet < String > ( ) ; } relatedIds . add ( activeOp . getName ( ) ) ; if ( OperationContext . ExecutionStatus . EXECUTING . toString ( ) . equals ( opModel . get ( EXECUTION_STATUS ) . asString ( ) ) ) { if ( relatedExecutingOps == null ) { relatedExecutingOps = new ArrayList < Resource . ResourceEntry > ( ) ; } relatedExecutingOps . add ( activeOp ) ; ControllerLogger . MGMT_OP_LOGGER . tracef ( "Related executing: %s" , opModel ) ; } else ControllerLogger . MGMT_OP_LOGGER . tracef ( "Related non-executing: %s" , opModel ) ; } else ControllerLogger . MGMT_OP_LOGGER . tracef ( "unrelated: %s" , opModel ) ; } if ( relatedIds != null ) { if ( relatedExecutingOps != null && relatedExecutingOps . size ( ) == 1 ) { nonProgressing = relatedExecutingOps . get ( 0 ) ; } else { throw DomainManagementLogger . ROOT_LOGGER . domainRolloutNotProgressing ( nonProgressing . getName ( ) , timeout , domainUUID , relatedIds ) ; } } } } return nonProgressing == null ? null : nonProgressing . getName ( ) ; }
Separate from other findNonProgressingOp variant to allow unit testing without needing a mock OperationContext
21,945
void bootTimeScan ( final DeploymentOperations deploymentOperations ) { if ( ! checkDeploymentDir ( this . deploymentDir ) ) { DeploymentScannerLogger . ROOT_LOGGER . bootTimeScanFailed ( deploymentDir . getAbsolutePath ( ) ) ; return ; } this . establishDeployedContentList ( this . deploymentDir , deploymentOperations ) ; deployedContentEstablished = true ; if ( acquireScanLock ( ) ) { try { scan ( true , deploymentOperations ) ; } finally { releaseScanLock ( ) ; } } }
Perform a one - off scan during boot to establish deployment tasks to execute during boot
21,946
void scan ( ) { if ( acquireScanLock ( ) ) { boolean scheduleRescan = false ; try { scheduleRescan = scan ( false , deploymentOperations ) ; } finally { try { if ( scheduleRescan ) { synchronized ( this ) { if ( scanEnabled ) { rescanIncompleteTask = scheduledExecutor . schedule ( scanRunnable , 200 , TimeUnit . MILLISECONDS ) ; } } } } finally { releaseScanLock ( ) ; } } } }
Perform a normal scan
21,947
void forcedUndeployScan ( ) { if ( acquireScanLock ( ) ) { try { ROOT_LOGGER . tracef ( "Performing a post-boot forced undeploy scan for scan directory %s" , deploymentDir . getAbsolutePath ( ) ) ; ScanContext scanContext = new ScanContext ( deploymentOperations ) ; for ( Map . Entry < String , DeploymentMarker > missing : scanContext . toRemove . entrySet ( ) ) { if ( scanContext . registeredDeployments . containsKey ( missing . getKey ( ) ) ) { scanContext . registeredDeployments . remove ( missing . getKey ( ) ) ; } } Set < String > scannedDeployments = new HashSet < String > ( scanContext . registeredDeployments . keySet ( ) ) ; scannedDeployments . removeAll ( scanContext . persistentDeployments ) ; List < ScannerTask > scannerTasks = scanContext . scannerTasks ; for ( String toUndeploy : scannedDeployments ) { scannerTasks . add ( new UndeployTask ( toUndeploy , deploymentDir , scanContext . scanStartTime , true ) ) ; } try { executeScannerTasks ( scannerTasks , deploymentOperations , true ) ; } catch ( InterruptedException e ) { Thread . currentThread ( ) . interrupt ( ) ; } ROOT_LOGGER . tracef ( "Forced undeploy scan complete" ) ; } catch ( Exception e ) { ROOT_LOGGER . scanException ( e , deploymentDir . getAbsolutePath ( ) ) ; } finally { releaseScanLock ( ) ; } } }
Perform a post - boot scan to remove any deployments added during boot that failed to deploy properly . This method isn t private solely to allow a unit test in the same package to call it .
21,948
private boolean checkDeploymentDir ( File directory ) { if ( ! directory . exists ( ) ) { if ( deploymentDirAccessible ) { deploymentDirAccessible = false ; ROOT_LOGGER . directoryIsNonexistent ( deploymentDir . getAbsolutePath ( ) ) ; } } else if ( ! directory . isDirectory ( ) ) { if ( deploymentDirAccessible ) { deploymentDirAccessible = false ; ROOT_LOGGER . isNotADirectory ( deploymentDir . getAbsolutePath ( ) ) ; } } else if ( ! directory . canRead ( ) ) { if ( deploymentDirAccessible ) { deploymentDirAccessible = false ; ROOT_LOGGER . directoryIsNotReadable ( deploymentDir . getAbsolutePath ( ) ) ; } } else if ( ! directory . canWrite ( ) ) { if ( deploymentDirAccessible ) { deploymentDirAccessible = false ; ROOT_LOGGER . directoryIsNotWritable ( deploymentDir . getAbsolutePath ( ) ) ; } } else { deploymentDirAccessible = true ; } return deploymentDirAccessible ; }
Checks that given directory if readable & writable and prints a warning if the check fails . Warning is only printed once and is not repeated until the condition is fixed and broken again .
21,949
private static ModelNode createOperation ( final ModelNode operationToValidate ) { PathAddress pa = PathAddress . pathAddress ( operationToValidate . require ( OP_ADDR ) ) ; PathAddress validationAddress = pa . subAddress ( 0 , pa . size ( ) - 1 ) ; return Util . getEmptyOperation ( "validate-cache" , validationAddress . toModelNode ( ) ) ; }
Creates an operations that targets the valiadating handler .
21,950
public synchronized RegistrationPoint getOldestRegistrationPoint ( ) { return registrationPoints . size ( ) == 0 ? null : registrationPoints . values ( ) . iterator ( ) . next ( ) . get ( 0 ) ; }
Gets the registration point that been associated with the registration for the longest period .
21,951
public synchronized Set < RegistrationPoint > getRegistrationPoints ( ) { Set < RegistrationPoint > result = new HashSet < > ( ) ; for ( List < RegistrationPoint > registrationPoints : registrationPoints . values ( ) ) { result . addAll ( registrationPoints ) ; } return Collections . unmodifiableSet ( result ) ; }
Get all registration points associated with this registration .
21,952
public static boolean hasValidContentAdditionParameterDefined ( ModelNode operation ) { for ( String s : DeploymentAttributes . MANAGED_CONTENT_ATTRIBUTES . keySet ( ) ) { if ( operation . hasDefined ( s ) ) { return true ; } } return false ; }
Checks to see if a valid deployment parameter has been defined .
21,953
static InstalledIdentity load ( final InstalledImage image , final ProductConfig productConfig , final List < File > moduleRoots , final List < File > bundleRoots ) throws IOException { final String productVersion = productConfig . resolveVersion ( ) ; final String productName = productConfig . resolveName ( ) ; final Identity identity = new AbstractLazyIdentity ( ) { public String getName ( ) { return productName ; } public String getVersion ( ) { return productVersion ; } public InstalledImage getInstalledImage ( ) { return image ; } } ; final Properties properties = PatchUtils . loadProperties ( identity . getDirectoryStructure ( ) . getInstallationInfo ( ) ) ; final List < String > allPatches = PatchUtils . readRefs ( properties , Constants . ALL_PATCHES ) ; final InstalledConfiguration conf = createInstalledConfig ( image ) ; final ProcessedLayers processedLayers = process ( conf , moduleRoots , bundleRoots ) ; final InstalledConfiguration config = processedLayers . getConf ( ) ; final InstalledIdentityImpl installedIdentity = new InstalledIdentityImpl ( identity , allPatches , image ) ; for ( final LayerPathConfig layer : processedLayers . getLayers ( ) . values ( ) ) { final String name = layer . name ; installedIdentity . putLayer ( name , createPatchableTarget ( name , layer , config . getLayerMetadataDir ( name ) , image ) ) ; } for ( final LayerPathConfig addOn : processedLayers . getAddOns ( ) . values ( ) ) { final String name = addOn . name ; installedIdentity . putAddOn ( name , createPatchableTarget ( name , addOn , config . getAddOnMetadataDir ( name ) , image ) ) ; } return installedIdentity ; }
Load the available layers .
21,954
static ProcessedLayers process ( final InstalledConfiguration conf , final List < File > moduleRoots , final List < File > bundleRoots ) throws IOException { final ProcessedLayers layers = new ProcessedLayers ( conf ) ; final LayerPathSetter moduleSetter = new LayerPathSetter ( ) { public boolean setPath ( final LayerPathConfig pending , final File root ) { if ( pending . modulePath == null ) { pending . modulePath = root ; return true ; } return false ; } } ; for ( final File moduleRoot : moduleRoots ) { processRoot ( moduleRoot , layers , moduleSetter ) ; } final LayerPathSetter bundleSetter = new LayerPathSetter ( ) { public boolean setPath ( LayerPathConfig pending , File root ) { if ( pending . bundlePath == null ) { pending . bundlePath = root ; return true ; } return false ; } } ; for ( final File bundleRoot : bundleRoots ) { processRoot ( bundleRoot , layers , bundleSetter ) ; } return layers ; }
Process the module and bundle roots and cross check with the installed information .
21,955
static void processRoot ( final File root , final ProcessedLayers layers , final LayerPathSetter setter ) throws IOException { final LayersConfig layersConfig = LayersConfig . getLayersConfig ( root ) ; final File layersDir = new File ( root , layersConfig . getLayersPath ( ) ) ; if ( ! layersDir . exists ( ) ) { if ( layersConfig . isConfigured ( ) ) { throw PatchLogger . ROOT_LOGGER . installationNoLayersConfigFound ( layersDir . getAbsolutePath ( ) ) ; } } else { for ( final String layer : layersConfig . getLayers ( ) ) { File layerDir = new File ( layersDir , layer ) ; if ( ! layerDir . exists ( ) ) { if ( layersConfig . isConfigured ( ) ) { throw PatchLogger . ROOT_LOGGER . installationMissingLayer ( layer , layersDir . getAbsolutePath ( ) ) ; } return ; } layers . addLayer ( layer , layerDir , setter ) ; } } final File addOnsDir = new File ( root , layersConfig . getAddOnsPath ( ) ) ; final File [ ] addOnsList = addOnsDir . listFiles ( ) ; if ( addOnsList != null ) { for ( final File addOn : addOnsList ) { layers . addAddOn ( addOn . getName ( ) , addOn , setter ) ; } } }
Process a module or bundle root .
21,956
static AbstractLazyPatchableTarget createPatchableTarget ( final String name , final LayerPathConfig layer , final File metadata , final InstalledImage image ) throws IOException { return new AbstractLazyPatchableTarget ( ) { public InstalledImage getInstalledImage ( ) { return image ; } public File getModuleRoot ( ) { return layer . modulePath ; } public File getBundleRepositoryRoot ( ) { return layer . bundlePath ; } public File getPatchesMetadata ( ) { return metadata ; } public String getName ( ) { return name ; } } ; }
Create the actual patchable target .
21,957
public List < ModelNode > getAllowedValues ( ) { if ( allowedValues == null ) { return Collections . emptyList ( ) ; } return Arrays . asList ( this . allowedValues ) ; }
returns array with all allowed values
21,958
protected void addAllowedValuesToDescription ( ModelNode result , ParameterValidator validator ) { if ( allowedValues != null ) { for ( ModelNode allowedValue : allowedValues ) { result . get ( ModelDescriptionConstants . ALLOWED ) . add ( allowedValue ) ; } } else if ( validator instanceof AllowedValuesValidator ) { AllowedValuesValidator avv = ( AllowedValuesValidator ) validator ; List < ModelNode > allowed = avv . getAllowedValues ( ) ; if ( allowed != null ) { for ( ModelNode ok : allowed ) { result . get ( ModelDescriptionConstants . ALLOWED ) . add ( ok ) ; } } } }
Adds the allowed values . Override for attributes who should not use the allowed values .
21,959
public static ModelNode validateRequest ( CommandContext ctx , ModelNode request ) throws CommandFormatException { final Set < String > keys = request . keys ( ) ; if ( keys . size ( ) == 2 ) { return null ; } ModelNode outcome = ( ModelNode ) ctx . get ( Scope . REQUEST , DESCRIPTION_RESPONSE ) ; if ( outcome == null ) { outcome = retrieveDescription ( ctx , request , true ) ; if ( outcome == null ) { return null ; } else { ctx . set ( Scope . REQUEST , DESCRIPTION_RESPONSE , outcome ) ; } } if ( ! outcome . has ( Util . RESULT ) ) { throw new CommandFormatException ( "Failed to perform " + Util . READ_OPERATION_DESCRIPTION + " to validate the request: result is not available." ) ; } final String operationName = request . get ( Util . OPERATION ) . asString ( ) ; final ModelNode result = outcome . get ( Util . RESULT ) ; final Set < String > definedProps = result . hasDefined ( Util . REQUEST_PROPERTIES ) ? result . get ( Util . REQUEST_PROPERTIES ) . keys ( ) : Collections . emptySet ( ) ; if ( definedProps . isEmpty ( ) ) { if ( ! ( keys . size ( ) == 3 && keys . contains ( Util . OPERATION_HEADERS ) ) ) { throw new CommandFormatException ( "Operation '" + operationName + "' does not expect any property." ) ; } } else { int skipped = 0 ; for ( String prop : keys ) { if ( skipped < 2 && ( prop . equals ( Util . ADDRESS ) || prop . equals ( Util . OPERATION ) ) ) { ++ skipped ; continue ; } if ( ! definedProps . contains ( prop ) ) { if ( ! Util . OPERATION_HEADERS . equals ( prop ) ) { throw new CommandFormatException ( "'" + prop + "' is not found among the supported properties: " + definedProps ) ; } } } } return outcome ; }
return null if the operation has no params to validate
21,960
public static boolean reconnectContext ( RedirectException re , CommandContext ctx ) { boolean reconnected = false ; try { ConnectionInfo info = ctx . getConnectionInfo ( ) ; ControllerAddress address = null ; if ( info != null ) { address = info . getControllerAddress ( ) ; } if ( address != null && isHttpsRedirect ( re , address . getProtocol ( ) ) ) { LOG . debug ( "Trying to reconnect an http to http upgrade" ) ; try { ctx . connectController ( ) ; reconnected = true ; } catch ( Exception ex ) { LOG . warn ( "Exception reconnecting" , ex ) ; } } } catch ( URISyntaxException ex ) { LOG . warn ( "Invalid URI: " , ex ) ; } return reconnected ; }
Reconnect the context if the RedirectException is valid .
21,961
public static String compactToString ( ModelNode node ) { Objects . requireNonNull ( node ) ; final StringWriter stringWriter = new StringWriter ( ) ; final PrintWriter writer = new PrintWriter ( stringWriter , true ) ; node . writeString ( writer , true ) ; return stringWriter . toString ( ) ; }
Build a compact representation of the ModelNode .
21,962
private void init ( ) { validatePreSignedUrls ( ) ; try { conn = new AWSAuthConnection ( access_key , secret_access_key ) ; if ( prefix != null && prefix . length ( ) > 0 ) { ListAllMyBucketsResponse bucket_list = conn . listAllMyBuckets ( null ) ; List buckets = bucket_list . entries ; if ( buckets != null ) { boolean found = false ; for ( Object tmp : buckets ) { if ( tmp instanceof Bucket ) { Bucket bucket = ( Bucket ) tmp ; if ( bucket . name . startsWith ( prefix ) ) { location = bucket . name ; found = true ; } } } if ( ! found ) { location = prefix + "-" + java . util . UUID . randomUUID ( ) . toString ( ) ; } } } if ( usingPreSignedUrls ( ) ) { PreSignedUrlParser parsedPut = new PreSignedUrlParser ( pre_signed_put_url ) ; location = parsedPut . getBucket ( ) ; } if ( ! conn . checkBucketExists ( location ) ) { conn . createBucket ( location , AWSAuthConnection . LOCATION_DEFAULT , null ) . connection . getResponseMessage ( ) ; } } catch ( Exception e ) { throw HostControllerLogger . ROOT_LOGGER . cannotAccessS3Bucket ( location , e . getLocalizedMessage ( ) ) ; } }
Do the set - up that s needed to access Amazon S3 .
21,963
private List < DomainControllerData > readFromFile ( String directoryName ) { List < DomainControllerData > data = new ArrayList < DomainControllerData > ( ) ; if ( directoryName == null ) { return data ; } if ( conn == null ) { init ( ) ; } try { if ( usingPreSignedUrls ( ) ) { PreSignedUrlParser parsedPut = new PreSignedUrlParser ( pre_signed_put_url ) ; directoryName = parsedPut . getPrefix ( ) ; } String key = S3Util . sanitize ( directoryName ) + "/" + S3Util . sanitize ( DC_FILE_NAME ) ; GetResponse val = conn . get ( location , key , null ) ; if ( val . object != null ) { byte [ ] buf = val . object . data ; if ( buf != null && buf . length > 0 ) { try { data = S3Util . domainControllerDataFromByteBuffer ( buf ) ; } catch ( Exception e ) { throw HostControllerLogger . ROOT_LOGGER . failedMarshallingDomainControllerData ( ) ; } } } return data ; } catch ( IOException e ) { throw HostControllerLogger . ROOT_LOGGER . cannotAccessS3File ( e . getLocalizedMessage ( ) ) ; } }
Read the domain controller data from an S3 file .
21,964
private void writeToFile ( List < DomainControllerData > data , String domainName ) throws IOException { if ( domainName == null || data == null ) { return ; } if ( conn == null ) { init ( ) ; } try { String key = S3Util . sanitize ( domainName ) + "/" + S3Util . sanitize ( DC_FILE_NAME ) ; byte [ ] buf = S3Util . domainControllerDataToByteBuffer ( data ) ; S3Object val = new S3Object ( buf , null ) ; if ( usingPreSignedUrls ( ) ) { Map headers = new TreeMap ( ) ; headers . put ( "x-amz-acl" , Arrays . asList ( "public-read" ) ) ; conn . put ( pre_signed_put_url , val , headers ) . connection . getResponseMessage ( ) ; } else { Map headers = new TreeMap ( ) ; headers . put ( "Content-Type" , Arrays . asList ( "text/plain" ) ) ; conn . put ( location , key , val , headers ) . connection . getResponseMessage ( ) ; } } catch ( Exception e ) { throw HostControllerLogger . ROOT_LOGGER . cannotWriteToS3File ( e . getLocalizedMessage ( ) ) ; } }
Write the domain controller data to an S3 file .
21,965
private void remove ( String directoryName ) { if ( ( directoryName == null ) || ( conn == null ) ) return ; String key = S3Util . sanitize ( directoryName ) + "/" + S3Util . sanitize ( DC_FILE_NAME ) ; try { Map headers = new TreeMap ( ) ; headers . put ( "Content-Type" , Arrays . asList ( "text/plain" ) ) ; if ( usingPreSignedUrls ( ) ) { conn . delete ( pre_signed_delete_url ) . connection . getResponseMessage ( ) ; } else { conn . delete ( location , key , headers ) . connection . getResponseMessage ( ) ; } } catch ( Exception e ) { ROOT_LOGGER . cannotRemoveS3File ( e ) ; } }
Remove the S3 file that contains the domain controller data .
21,966
public void mergeSubtree ( final OperationTransformerRegistry targetRegistry , final Map < PathAddress , ModelVersion > subTree ) { for ( Map . Entry < PathAddress , ModelVersion > entry : subTree . entrySet ( ) ) { mergeSubtree ( targetRegistry , entry . getKey ( ) , entry . getValue ( ) ) ; } }
Merge a subtree .
21,967
private static boolean isDisabledHandler ( final LogContext logContext , final String handlerName ) { final Map < String , String > disableHandlers = logContext . getAttachment ( CommonAttributes . ROOT_LOGGER_NAME , DISABLED_HANDLERS_KEY ) ; return disableHandlers != null && disableHandlers . containsKey ( handlerName ) ; }
Checks to see if a handler is disabled
21,968
static PathAddress toPathAddress ( String domain , ImmutableManagementResourceRegistration registry , ObjectName name ) { if ( ! name . getDomain ( ) . equals ( domain ) ) { return PathAddress . EMPTY_ADDRESS ; } if ( name . equals ( ModelControllerMBeanHelper . createRootObjectName ( domain ) ) ) { return PathAddress . EMPTY_ADDRESS ; } final Hashtable < String , String > properties = name . getKeyPropertyList ( ) ; return searchPathAddress ( PathAddress . EMPTY_ADDRESS , registry , properties ) ; }
Straight conversion from an ObjectName to a PathAddress .
21,969
private void stopDone ( ) { synchronized ( stopLock ) { final StopContext stopContext = this . stopContext ; this . stopContext = null ; if ( stopContext != null ) { stopContext . complete ( ) ; } stopLock . notifyAll ( ) ; } }
Callback from the worker when it terminates
21,970
public String getRejectionLogMessageId ( ) { String id = logMessageId ; if ( id == null ) { id = getRejectionLogMessage ( Collections . < String , ModelNode > emptyMap ( ) ) ; } logMessageId = id ; return logMessageId ; }
Returns the log message id used by this checker . This is used to group it so that all attributes failing a type of rejction end up in the same error message . This default implementation uses the formatted log message with an empty attribute map as the id .
21,971
public synchronized void stop ( final StopContext context ) { final boolean shutdownServers = runningModeControl . getRestartMode ( ) == RestartMode . SERVERS ; if ( shutdownServers ) { Runnable task = new Runnable ( ) { public void run ( ) { try { serverInventory . shutdown ( true , - 1 , true ) ; serverInventory = null ; } finally { serverCallback . getValue ( ) . setCallbackHandler ( null ) ; context . complete ( ) ; } } } ; try { executorService . getValue ( ) . execute ( task ) ; } catch ( RejectedExecutionException e ) { task . run ( ) ; } finally { context . asynchronous ( ) ; } } else { serverInventory . shutdown ( false , - 1 , true ) ; serverInventory = null ; } }
Stops all servers .
21,972
public boolean isResourceExcluded ( final PathAddress address ) { if ( ! localHostControllerInfo . isMasterDomainController ( ) && address . size ( ) > 0 ) { IgnoredDomainResourceRoot root = this . rootResource ; PathElement firstElement = address . getElement ( 0 ) ; IgnoreDomainResourceTypeResource typeResource = root == null ? null : root . getChildInternal ( firstElement . getKey ( ) ) ; if ( typeResource != null ) { if ( typeResource . hasName ( firstElement . getValue ( ) ) ) { return true ; } } } return false ; }
Returns whether this host should ignore operations from the master domain controller that target the given address .
21,973
VersionExcludeData getVersionIgnoreData ( int major , int minor , int micro ) { VersionExcludeData result = registry . get ( new VersionKey ( major , minor , micro ) ) ; if ( result == null ) { result = registry . get ( new VersionKey ( major , minor , null ) ) ; } return result ; }
Gets the host - ignore data for a slave host running the given version .
21,974
public static void copyRecursively ( final Path source , final Path target , boolean overwrite ) throws IOException { final CopyOption [ ] options ; if ( overwrite ) { options = new CopyOption [ ] { StandardCopyOption . COPY_ATTRIBUTES , StandardCopyOption . REPLACE_EXISTING } ; } else { options = new CopyOption [ ] { StandardCopyOption . COPY_ATTRIBUTES } ; } Files . walkFileTree ( source , new FileVisitor < Path > ( ) { public FileVisitResult preVisitDirectory ( Path dir , BasicFileAttributes attrs ) throws IOException { Files . copy ( dir , target . resolve ( source . relativize ( dir ) ) , options ) ; return FileVisitResult . CONTINUE ; } public FileVisitResult visitFile ( Path file , BasicFileAttributes attrs ) throws IOException { Files . copy ( file , target . resolve ( source . relativize ( file ) ) , options ) ; return FileVisitResult . CONTINUE ; } public FileVisitResult visitFileFailed ( Path file , IOException exc ) throws IOException { DeploymentRepositoryLogger . ROOT_LOGGER . cannotCopyFile ( exc , file ) ; return FileVisitResult . CONTINUE ; } public FileVisitResult postVisitDirectory ( Path dir , IOException exc ) throws IOException { return FileVisitResult . CONTINUE ; } } ) ; }
Copy a path recursively .
21,975
public static void deleteSilentlyRecursively ( final Path path ) { if ( path != null ) { try { deleteRecursively ( path ) ; } catch ( IOException ioex ) { DeploymentRepositoryLogger . ROOT_LOGGER . cannotDeleteFile ( ioex , path ) ; } } }
Delete a path recursively not throwing Exception if it fails or if the path is null .
21,976
public static void deleteRecursively ( final Path path ) throws IOException { DeploymentRepositoryLogger . ROOT_LOGGER . debugf ( "Deleting %s recursively" , path ) ; if ( Files . exists ( path ) ) { Files . walkFileTree ( path , new FileVisitor < Path > ( ) { public FileVisitResult preVisitDirectory ( Path dir , BasicFileAttributes attrs ) throws IOException { return FileVisitResult . CONTINUE ; } public FileVisitResult visitFile ( Path file , BasicFileAttributes attrs ) throws IOException { Files . delete ( file ) ; return FileVisitResult . CONTINUE ; } public FileVisitResult visitFileFailed ( Path file , IOException exc ) throws IOException { DeploymentRepositoryLogger . ROOT_LOGGER . cannotDeleteFile ( exc , path ) ; throw exc ; } public FileVisitResult postVisitDirectory ( Path dir , IOException exc ) throws IOException { Files . delete ( dir ) ; return FileVisitResult . CONTINUE ; } } ) ; } }
Delete a path recursively .
21,977
public static final Path resolveSecurely ( Path rootPath , String path ) { Path resolvedPath ; if ( path == null || path . isEmpty ( ) ) { resolvedPath = rootPath . normalize ( ) ; } else { String relativePath = removeSuperflousSlashes ( path ) ; resolvedPath = rootPath . resolve ( relativePath ) . normalize ( ) ; } if ( ! resolvedPath . startsWith ( rootPath ) ) { throw DeploymentRepositoryLogger . ROOT_LOGGER . forbiddenPath ( path ) ; } return resolvedPath ; }
Resolve a path from the rootPath checking that it doesn t go out of the rootPath .
21,978
public static List < ContentRepositoryElement > listFiles ( final Path rootPath , Path tempDir , final ContentFilter filter ) throws IOException { List < ContentRepositoryElement > result = new ArrayList < > ( ) ; if ( Files . exists ( rootPath ) ) { if ( isArchive ( rootPath ) ) { return listZipContent ( rootPath , filter ) ; } Files . walkFileTree ( rootPath , new FileVisitor < Path > ( ) { public FileVisitResult preVisitDirectory ( Path dir , BasicFileAttributes attrs ) throws IOException { return FileVisitResult . CONTINUE ; } public FileVisitResult visitFile ( Path file , BasicFileAttributes attrs ) throws IOException { if ( filter . acceptFile ( rootPath , file ) ) { result . add ( ContentRepositoryElement . createFile ( formatPath ( rootPath . relativize ( file ) ) , Files . size ( file ) ) ) ; } return FileVisitResult . CONTINUE ; } public FileVisitResult visitFileFailed ( Path file , IOException exc ) throws IOException { return FileVisitResult . CONTINUE ; } public FileVisitResult postVisitDirectory ( Path dir , IOException exc ) throws IOException { if ( filter . acceptDirectory ( rootPath , dir ) ) { String directoryPath = formatDirectoryPath ( rootPath . relativize ( dir ) ) ; if ( ! "/" . equals ( directoryPath ) ) { result . add ( ContentRepositoryElement . createFolder ( directoryPath ) ) ; } } return FileVisitResult . CONTINUE ; } private String formatDirectoryPath ( Path path ) { return formatPath ( path ) + '/' ; } private String formatPath ( Path path ) { return path . toString ( ) . replace ( File . separatorChar , '/' ) ; } } ) ; } else { Path file = getFile ( rootPath ) ; if ( isArchive ( file ) ) { Path relativePath = file . relativize ( rootPath ) ; Path target = createTempDirectory ( tempDir , "unarchive" ) ; unzip ( file , target ) ; return listFiles ( target . resolve ( relativePath ) , tempDir , filter ) ; } else { throw new FileNotFoundException ( rootPath . toString ( ) ) ; } } return result ; }
List files in a path according to the specified filter .
21,979
public static Path createTempDirectory ( Path dir , String prefix ) throws IOException { try { return Files . createTempDirectory ( dir , prefix ) ; } catch ( UnsupportedOperationException ex ) { } return Files . createTempDirectory ( dir , prefix ) ; }
Create a temporary directory with the same attributes as its parent directory .
21,980
public static void unzip ( Path zip , Path target ) throws IOException { try ( final ZipFile zipFile = new ZipFile ( zip . toFile ( ) ) ) { unzip ( zipFile , target ) ; } }
Unzip a file to a target directory .
21,981
public static ServiceController < String > addService ( final ServiceName name , final String path , boolean possiblyAbsolute , final String relativeTo , final ServiceTarget serviceTarget ) { if ( possiblyAbsolute && isAbsoluteUnixOrWindowsPath ( path ) ) { return AbsolutePathService . addService ( name , path , serviceTarget ) ; } RelativePathService service = new RelativePathService ( path ) ; ServiceBuilder < String > builder = serviceTarget . addService ( name , service ) . addDependency ( pathNameOf ( relativeTo ) , String . class , service . injectedPath ) ; ServiceController < String > svc = builder . install ( ) ; return svc ; }
Installs a path service .
21,982
public List < File > getInactiveHistory ( ) throws PatchingException { if ( validHistory == null ) { walk ( ) ; } final File [ ] inactiveDirs = installedIdentity . getInstalledImage ( ) . getPatchesDir ( ) . listFiles ( new FileFilter ( ) { public boolean accept ( File pathname ) { return pathname . isDirectory ( ) && ! validHistory . contains ( pathname . getName ( ) ) ; } } ) ; return inactiveDirs == null ? Collections . < File > emptyList ( ) : Arrays . asList ( inactiveDirs ) ; }
Get the inactive history directories .
21,983
public List < File > getInactiveOverlays ( ) throws PatchingException { if ( referencedOverlayDirectories == null ) { walk ( ) ; } List < File > inactiveDirs = null ; for ( Layer layer : installedIdentity . getLayers ( ) ) { final File overlaysDir = new File ( layer . getDirectoryStructure ( ) . getModuleRoot ( ) , Constants . OVERLAYS ) ; final File [ ] inactiveLayerDirs = overlaysDir . listFiles ( new FileFilter ( ) { public boolean accept ( File pathname ) { return pathname . isDirectory ( ) && ! referencedOverlayDirectories . contains ( pathname ) ; } } ) ; if ( inactiveLayerDirs != null && inactiveLayerDirs . length > 0 ) { if ( inactiveDirs == null ) { inactiveDirs = new ArrayList < File > ( ) ; } inactiveDirs . addAll ( Arrays . asList ( inactiveLayerDirs ) ) ; } } return inactiveDirs == null ? Collections . < File > emptyList ( ) : inactiveDirs ; }
Get the inactive overlay directories .
21,984
public void deleteInactiveContent ( ) throws PatchingException { List < File > dirs = getInactiveHistory ( ) ; if ( ! dirs . isEmpty ( ) ) { for ( File dir : dirs ) { deleteDir ( dir , ALL ) ; } } dirs = getInactiveOverlays ( ) ; if ( ! dirs . isEmpty ( ) ) { for ( File dir : dirs ) { deleteDir ( dir , ALL ) ; } } }
Delete inactive contents .
21,985
public void bootstrap ( ) throws Exception { final HostRunningModeControl runningModeControl = environment . getRunningModeControl ( ) ; final ControlledProcessState processState = new ControlledProcessState ( true ) ; shutdownHook . setControlledProcessState ( processState ) ; ServiceTarget target = serviceContainer . subTarget ( ) ; ControlledProcessStateService controlledProcessStateService = ControlledProcessStateService . addService ( target , processState ) . getValue ( ) ; RunningStateJmx . registerMBean ( controlledProcessStateService , null , runningModeControl , false ) ; final HostControllerService hcs = new HostControllerService ( environment , runningModeControl , authCode , processState ) ; target . addService ( HostControllerService . HC_SERVICE_NAME , hcs ) . install ( ) ; }
Start the host controller services .
21,986
private void persistDecorator ( XMLExtendedStreamWriter writer , ModelNode model ) throws XMLStreamException { if ( shouldWriteDecoratorAndElements ( model ) ) { writer . writeStartElement ( decoratorElement ) ; persistChildren ( writer , model ) ; writer . writeEndElement ( ) ; } }
persist decorator and than continue to children without touching the model
21,987
public static PersistentResourceXMLBuilder decorator ( final String elementName ) { return new PersistentResourceXMLBuilder ( PathElement . pathElement ( elementName ) , null ) . setDecoratorGroup ( elementName ) ; }
Creates builder for passed path element
21,988
void rejectAttributes ( RejectedAttributesLogContext rejectedAttributes , ModelNode attributeValue ) { for ( RejectAttributeChecker checker : checks ) { rejectedAttributes . checkAttribute ( checker , name , attributeValue ) ; } }
Checks attributes for rejection
21,989
private OperationEntry getInheritableOperationEntryLocked ( final String operationName ) { final OperationEntry entry = operations == null ? null : operations . get ( operationName ) ; if ( entry != null && entry . isInherited ( ) ) { return entry ; } return null ; }
Only call with the read lock held
21,990
private void registerChildInternal ( IgnoreDomainResourceTypeResource child ) { child . setParent ( this ) ; children . put ( child . getName ( ) , child ) ; }
call with lock on children held
21,991
protected Channel awaitChannel ( ) throws IOException { Channel channel = this . channel ; if ( channel != null ) { return channel ; } synchronized ( lock ) { for ( ; ; ) { if ( state == State . CLOSED ) { throw ProtocolLogger . ROOT_LOGGER . channelClosed ( ) ; } channel = this . channel ; if ( channel != null ) { return channel ; } if ( state == State . CLOSING ) { throw ProtocolLogger . ROOT_LOGGER . channelClosed ( ) ; } try { lock . wait ( ) ; } catch ( InterruptedException e ) { throw new IOException ( e ) ; } } } }
Get the underlying channel . This may block until the channel is set .
21,992
protected boolean prepareClose ( ) { synchronized ( lock ) { final State state = this . state ; if ( state == State . OPEN ) { this . state = State . CLOSING ; lock . notifyAll ( ) ; return true ; } } return false ; }
Signal that we are about to close the channel . This will not have any affect on the underlying channel however prevent setting a new channel .
21,993
protected boolean setChannel ( final Channel newChannel ) { if ( newChannel == null ) { return false ; } synchronized ( lock ) { if ( state != State . OPEN || channel != null ) { return false ; } this . channel = newChannel ; this . channel . addCloseHandler ( new CloseHandler < Channel > ( ) { public void handleClose ( final Channel closed , final IOException exception ) { synchronized ( lock ) { if ( FutureManagementChannel . this . channel == closed ) { FutureManagementChannel . this . channel = null ; } lock . notifyAll ( ) ; } } } ) ; lock . notifyAll ( ) ; return true ; } }
Set the channel . This will return whether the channel could be set successfully or not .
21,994
private boolean isRedeployAfterRemoval ( ModelNode operation ) { return operation . hasDefined ( DEPLOYMENT_OVERLAY_LINK_REMOVAL ) && operation . get ( DEPLOYMENT_OVERLAY_LINK_REMOVAL ) . asBoolean ( ) ; }
Check if this is a redeployment triggered after the removal of a link .
21,995
protected void createNewFile ( final File file ) { try { file . createNewFile ( ) ; setFileNotWorldReadablePermissions ( file ) ; } catch ( IOException e ) { throw new RuntimeException ( e ) ; } }
This creates a new audit log file with default permissions .
21,996
private void setFileNotWorldReadablePermissions ( File file ) { file . setReadable ( false , false ) ; file . setWritable ( false , false ) ; file . setExecutable ( false , false ) ; file . setReadable ( true , true ) ; file . setWritable ( true , true ) ; }
This procedure sets permissions to the given file to not allow everybody to read it .
21,997
protected synchronized ResourceRoot getSeamIntResourceRoot ( ) throws DeploymentUnitProcessingException { try { if ( seamIntResourceRoot == null ) { final ModuleLoader moduleLoader = Module . getBootModuleLoader ( ) ; Module extModule = moduleLoader . loadModule ( EXT_CONTENT_MODULE ) ; URL url = extModule . getExportedResource ( SEAM_INT_JAR ) ; if ( url == null ) throw ServerLogger . ROOT_LOGGER . noSeamIntegrationJarPresent ( extModule ) ; File file = new File ( url . toURI ( ) ) ; VirtualFile vf = VFS . getChild ( file . toURI ( ) ) ; final Closeable mountHandle = VFS . mountZip ( file , vf , TempFileProviderService . provider ( ) ) ; Service < Closeable > mountHandleService = new Service < Closeable > ( ) { public void start ( StartContext startContext ) throws StartException { } public void stop ( StopContext stopContext ) { VFSUtils . safeClose ( mountHandle ) ; } public Closeable getValue ( ) throws IllegalStateException , IllegalArgumentException { return mountHandle ; } } ; ServiceBuilder < Closeable > builder = serviceTarget . addService ( ServiceName . JBOSS . append ( SEAM_INT_JAR ) , mountHandleService ) ; builder . setInitialMode ( ServiceController . Mode . ACTIVE ) . install ( ) ; serviceTarget = null ; MountHandle dummy = MountHandle . create ( null ) ; seamIntResourceRoot = new ResourceRoot ( vf , dummy ) ; } return seamIntResourceRoot ; } catch ( Exception e ) { throw new DeploymentUnitProcessingException ( e ) ; } }
Lookup Seam integration resource loader .
21,998
public static PathAddress pathAddress ( final ModelNode node ) { if ( node . isDefined ( ) ) { final List < Property > props = new ArrayList < Property > ( ) ; String key = null ; for ( ModelNode element : node . asList ( ) ) { Property prop = null ; if ( element . getType ( ) == ModelType . PROPERTY || element . getType ( ) == ModelType . OBJECT ) { prop = element . asProperty ( ) ; } else if ( key == null ) { key = element . asString ( ) ; } else { prop = new Property ( key , element ) ; } if ( prop != null ) { props . add ( prop ) ; key = null ; } } if ( props . size ( ) == 0 ) { return EMPTY_ADDRESS ; } else { final Set < String > seen = new HashSet < String > ( ) ; final List < PathElement > values = new ArrayList < PathElement > ( ) ; int index = 0 ; for ( final Property prop : props ) { final String name = prop . getName ( ) ; if ( seen . add ( name ) ) { values . add ( new PathElement ( name , prop . getValue ( ) . asString ( ) ) ) ; } else { throw duplicateElement ( name ) ; } if ( index == 1 && name . equals ( SERVER ) && seen . contains ( HOST ) ) { seen . clear ( ) ; } index ++ ; } return new PathAddress ( Collections . unmodifiableList ( values ) ) ; } } else { return EMPTY_ADDRESS ; } }
Creates a PathAddress from the given ModelNode address . The given node is expected to be an address node .
21,999
public PathElement getElement ( int index ) { final List < PathElement > list = pathAddressList ; return list . get ( index ) ; }
Gets the element at the given index .