glassfish 0.1.1-universal-java-1.5
Sign up to get free protection for your applications and to get access to all the features.
- data/COPYRIGHT +33 -0
- data/LICENSE.txt +263 -0
- data/README +12 -0
- data/bin/asadmin +7 -0
- data/bin/asadmin.bat +8 -0
- data/bin/glassfish_rails +40 -0
- data/config/asadminenv.conf +6 -0
- data/config/asenv.bat +28 -0
- data/config/asenv.conf +27 -0
- data/config/glassfish.container +4 -0
- data/domains/domain1/config/admin-keyfile +3 -0
- data/domains/domain1/config/cacerts.jks +0 -0
- data/domains/domain1/config/default-web.xml +906 -0
- data/domains/domain1/config/domain-passwords +0 -0
- data/domains/domain1/config/domain.xml +208 -0
- data/domains/domain1/config/keyfile +6 -0
- data/domains/domain1/config/keystore.jks +0 -0
- data/domains/domain1/config/logging.properties +82 -0
- data/domains/domain1/config/login.conf +18 -0
- data/domains/domain1/config/server.policy +160 -0
- data/domains/domain1/config/sun-acc.xml +40 -0
- data/domains/domain1/config/wss-server-config-1.0.xml +86 -0
- data/domains/domain1/config/wss-server-config-2.0.xml +94 -0
- data/domains/domain1/docroot/favicon.gif +0 -0
- data/domains/domain1/docroot/index.html +87 -0
- data/domains/domain1/master-password +0 -0
- data/lib/appclient/appclientlogin.conf +10 -0
- data/lib/appclient/client.policy +79 -0
- data/lib/appclient/wss-client-config-1.0.xml +84 -0
- data/lib/appclient/wss-client-config-2.0.xml +96 -0
- data/lib/dtds/application-client_1_2.dtd +292 -0
- data/lib/dtds/application-client_1_3.dtd +506 -0
- data/lib/dtds/application_1_2.dtd +197 -0
- data/lib/dtds/application_1_3.dtd +312 -0
- data/lib/dtds/connector_1_0.dtd +561 -0
- data/lib/dtds/ejb-jar_1_1.dtd +894 -0
- data/lib/dtds/ejb-jar_2_0.dtd +1671 -0
- data/lib/dtds/sun-application-client-container_1_0.dtd +123 -0
- data/lib/dtds/sun-application-client-container_1_1.dtd +264 -0
- data/lib/dtds/sun-application-client-container_1_2.dtd +267 -0
- data/lib/dtds/sun-application-client_1_3-0.dtd +57 -0
- data/lib/dtds/sun-application-client_1_4-0.dtd +182 -0
- data/lib/dtds/sun-application-client_1_4-1.dtd +431 -0
- data/lib/dtds/sun-application-client_5_0-0.dtd +495 -0
- data/lib/dtds/sun-application_1_3-0.dtd +30 -0
- data/lib/dtds/sun-application_1_4-0.dtd +44 -0
- data/lib/dtds/sun-application_5_0-0.dtd +51 -0
- data/lib/dtds/sun-cmp-mapping_1_0.dtd +100 -0
- data/lib/dtds/sun-cmp-mapping_1_1.dtd +99 -0
- data/lib/dtds/sun-cmp-mapping_1_2.dtd +106 -0
- data/lib/dtds/sun-connector_1_0-0.dtd +66 -0
- data/lib/dtds/sun-connector_1_5-0.dtd +62 -0
- data/lib/dtds/sun-domain_1_0.dtd +2007 -0
- data/lib/dtds/sun-domain_1_1.dtd +3080 -0
- data/lib/dtds/sun-domain_1_2.dtd +3697 -0
- data/lib/dtds/sun-domain_1_3.dtd +3867 -0
- data/lib/dtds/sun-ejb-jar_2_0-0.dtd +449 -0
- data/lib/dtds/sun-ejb-jar_2_0-1.dtd +454 -0
- data/lib/dtds/sun-ejb-jar_2_1-0.dtd +756 -0
- data/lib/dtds/sun-ejb-jar_2_1-1.dtd +1085 -0
- data/lib/dtds/sun-ejb-jar_3_0-0.dtd +1113 -0
- data/lib/dtds/sun-loadbalancer_1_0.dtd +156 -0
- data/lib/dtds/sun-loadbalancer_1_1.dtd +172 -0
- data/lib/dtds/sun-resources_1_0.dtd +650 -0
- data/lib/dtds/sun-resources_1_1.dtd +650 -0
- data/lib/dtds/sun-resources_1_2.dtd +662 -0
- data/lib/dtds/sun-resources_1_3.dtd +732 -0
- data/lib/dtds/sun-server_1_0.dtd +1056 -0
- data/lib/dtds/sun-web-app_2_3-0.dtd +230 -0
- data/lib/dtds/sun-web-app_2_3-1.dtd +230 -0
- data/lib/dtds/sun-web-app_2_4-0.dtd +466 -0
- data/lib/dtds/sun-web-app_2_4-1.dtd +742 -0
- data/lib/dtds/sun-web-app_2_5-0.dtd +789 -0
- data/lib/dtds/web-app_2_2.dtd +639 -0
- data/lib/dtds/web-app_2_3.dtd +1063 -0
- data/lib/dtds/web-jsptaglibrary_1_1.dtd +265 -0
- data/lib/dtds/web-jsptaglibrary_1_2.dtd +468 -0
- data/lib/package-appclient.xml +185 -0
- data/lib/processLauncher.properties +25 -0
- data/lib/processLauncher.xml +189 -0
- data/lib/schemas/XMLSchema.dtd +402 -0
- data/lib/schemas/application-client_1_4.xsd +267 -0
- data/lib/schemas/application-client_5.xsd +304 -0
- data/lib/schemas/application_1_4.xsd +315 -0
- data/lib/schemas/application_5.xsd +336 -0
- data/lib/schemas/connector_1_5.xsd +1036 -0
- data/lib/schemas/datatypes.dtd +203 -0
- data/lib/schemas/ejb-jar_2_1.xsd +2208 -0
- data/lib/schemas/ejb-jar_3_0.xsd +2706 -0
- data/lib/schemas/j2ee_1_4.xsd +1608 -0
- data/lib/schemas/j2ee_jaxrpc_mapping_1_1.xsd +886 -0
- data/lib/schemas/j2ee_web_services_1_1.xsd +491 -0
- data/lib/schemas/j2ee_web_services_client_1_1.xsd +345 -0
- data/lib/schemas/javaee_5.xsd +2096 -0
- data/lib/schemas/javaee_web_services_1_2.xsd +747 -0
- data/lib/schemas/javaee_web_services_client_1_2.xsd +578 -0
- data/lib/schemas/jax-rpc-ri-config.xsd +416 -0
- data/lib/schemas/jsp_2_0.xsd +308 -0
- data/lib/schemas/jsp_2_1.xsd +343 -0
- data/lib/schemas/orm_1_0.xsd +1516 -0
- data/lib/schemas/persistence_1_0.xsd +260 -0
- data/lib/schemas/web-app_2_4.xsd +1234 -0
- data/lib/schemas/web-app_2_5.xsd +1271 -0
- data/lib/schemas/web-jsptaglibrary_2_0.xsd +1010 -0
- data/lib/schemas/web-jsptaglibrary_2_1.xsd +1144 -0
- data/lib/schemas/xml.xsd +82 -0
- data/modules/admin-cli-10.0-SNAPSHOT.jar +0 -0
- data/modules/auto-depends-0.2-SNAPSHOT.jar +0 -0
- data/modules/cli-framework-10.0-SNAPSHOT.jar +0 -0
- data/modules/common-ee-util-10.0-SNAPSHOT.jar +0 -0
- data/modules/common-util-10.0-SNAPSHOT.jar +0 -0
- data/modules/config-0.2-SNAPSHOT.jar +0 -0
- data/modules/config-api-10.0-SNAPSHOT.jar +0 -0
- data/modules/gf-jruby-connector-10.0-SNAPSHOT.jar +0 -0
- data/modules/glassfish-10.0-SNAPSHOT.jar +0 -0
- data/modules/glassfish-api-10.0-SNAPSHOT.jar +0 -0
- data/modules/glassfish.rb +10 -0
- data/modules/grizzly-framework-1.7.1.jar +0 -0
- data/modules/grizzly-http-1.7.1.jar +0 -0
- data/modules/grizzly-http-utils-1.7.1.jar +0 -0
- data/modules/grizzly-jruby-1.7.0.jar +0 -0
- data/modules/grizzly-jruby-module-1.7.0.jar +0 -0
- data/modules/grizzly-module-1.7.1.jar +0 -0
- data/modules/grizzly-portunif-1.7.1.jar +0 -0
- data/modules/grizzly-rcm-1.7.1.jar +0 -0
- data/modules/hk2-0.2-SNAPSHOT.jar +0 -0
- data/modules/hk2-core-0.2-SNAPSHOT.jar +0 -0
- data/modules/junit-4.3.1.jar +0 -0
- data/modules/kernel-10.0-SNAPSHOT.jar +0 -0
- data/modules/persistence-api-1.0b.jar +0 -0
- data/modules/servlet-api-2.5.jar +0 -0
- data/modules/sjsxp-1.0.jar +0 -0
- data/modules/stax-api-1.0-2.jar +0 -0
- data/modules/tiger-types-1.0.jar +0 -0
- metadata +206 -0
@@ -0,0 +1,495 @@
|
|
1
|
+
|
2
|
+
<!--
|
3
|
+
XML DTD for Sun Application Server specific Java EE Client Application
|
4
|
+
deployment descriptor. This is a companion DTD to application-client_5.xsd
|
5
|
+
|
6
|
+
It must include a DOCTYPE of the following form:
|
7
|
+
|
8
|
+
<!DOCTYPE sun-application-client PUBLIC "-//Sun Microsystems, Inc.//DTD Application Server 9.0 Application Client 5.0//EN" "http://www.sun.com/software/appserver/dtds/sun-application-client_5_0-0.dtd">
|
9
|
+
|
10
|
+
-->
|
11
|
+
|
12
|
+
<!--
|
13
|
+
application-client is the root element describing all the runtime bindings
|
14
|
+
of a single application client
|
15
|
+
-->
|
16
|
+
<!ELEMENT sun-application-client (ejb-ref*, resource-ref*, resource-env-ref*, service-ref*,
|
17
|
+
message-destination-ref*, message-destination*, java-web-start-access?)>
|
18
|
+
|
19
|
+
<!--
|
20
|
+
name of a resource reference.
|
21
|
+
-->
|
22
|
+
<!ELEMENT res-ref-name (#PCDATA)>
|
23
|
+
|
24
|
+
<!--
|
25
|
+
resource-env-ref holds all the runtime bindings of a resource env reference.
|
26
|
+
-->
|
27
|
+
<!ELEMENT resource-env-ref ( resource-env-ref-name, jndi-name )>
|
28
|
+
|
29
|
+
<!--
|
30
|
+
name of a resource env reference.
|
31
|
+
-->
|
32
|
+
<!ELEMENT resource-env-ref-name (#PCDATA)>
|
33
|
+
|
34
|
+
<!--
|
35
|
+
resource-ref holds the runtime bindings of a resource reference.
|
36
|
+
-->
|
37
|
+
<!ELEMENT resource-ref ( res-ref-name, jndi-name, default-resource-principal?)>
|
38
|
+
|
39
|
+
<!--
|
40
|
+
default-resource-principal specifies the default principal that the container
|
41
|
+
will use to access a resource.
|
42
|
+
-->
|
43
|
+
<!ELEMENT default-resource-principal ( name, password)>
|
44
|
+
|
45
|
+
<!--
|
46
|
+
name element holds the user name
|
47
|
+
-->
|
48
|
+
<!ELEMENT name (#PCDATA)>
|
49
|
+
|
50
|
+
<!--
|
51
|
+
password element holds a password string.
|
52
|
+
-->
|
53
|
+
<!ELEMENT password (#PCDATA)>
|
54
|
+
|
55
|
+
<!--
|
56
|
+
ejb-ref element which binds an ejb reference to a jndi name.
|
57
|
+
-->
|
58
|
+
<!ELEMENT ejb-ref (ejb-ref-name, jndi-name)>
|
59
|
+
|
60
|
+
<!--
|
61
|
+
ejb-ref-name locates the name of the ejb reference in the application.
|
62
|
+
-->
|
63
|
+
<!ELEMENT ejb-ref-name (#PCDATA)>
|
64
|
+
|
65
|
+
<!--
|
66
|
+
jndi name of the associated entity
|
67
|
+
-->
|
68
|
+
<!ELEMENT jndi-name (#PCDATA)>
|
69
|
+
|
70
|
+
<!--
|
71
|
+
This node holds information about a logical message destination
|
72
|
+
-->
|
73
|
+
<!ELEMENT message-destination (message-destination-name, jndi-name)>
|
74
|
+
|
75
|
+
<!--
|
76
|
+
This node holds the name of a logical message destination
|
77
|
+
-->
|
78
|
+
<!ELEMENT message-destination-name (#PCDATA)>
|
79
|
+
|
80
|
+
<!--
|
81
|
+
message-destination-ref is used to directly bind a message destination reference
|
82
|
+
to the jndi-name of a Queue,Topic, or some other physical destination. It should
|
83
|
+
only be used when the corresponding message destination reference does not
|
84
|
+
specify a message-destination-link to a logical message-destination.
|
85
|
+
-->
|
86
|
+
<!ELEMENT message-destination-ref (message-destination-ref-name, jndi-name)>
|
87
|
+
|
88
|
+
<!--
|
89
|
+
name of a message-destination reference.
|
90
|
+
-->
|
91
|
+
<!ELEMENT message-destination-ref-name (#PCDATA)>
|
92
|
+
|
93
|
+
<!--
|
94
|
+
Specifies the name of a durable subscription associated with a message-driven bean's
|
95
|
+
destination. Required for a Topic destination, if subscription-durability is set to
|
96
|
+
Durable (in ejb-jar.xml)
|
97
|
+
-->
|
98
|
+
|
99
|
+
<!--
|
100
|
+
W E B S E R V I C E S
|
101
|
+
-->
|
102
|
+
<!--
|
103
|
+
Runtime settings for a web service reference. In the simplest case,
|
104
|
+
there is no runtime information required for a service ref. Runtime info
|
105
|
+
is only needed in the following cases :
|
106
|
+
* to define the port that should be used to resolve a container-managed port
|
107
|
+
* to define default Stub/Call property settings for Stub objects
|
108
|
+
* to define the URL of a final WSDL document to be used instead of
|
109
|
+
the one packaged with a service-ref
|
110
|
+
-->
|
111
|
+
<!ELEMENT service-ref ( service-ref-name, port-info*, call-property*,
|
112
|
+
wsdl-override?, service-impl-class?, service-qname? )>
|
113
|
+
|
114
|
+
<!--
|
115
|
+
Coded name (relative to java:comp/env) for a service-reference
|
116
|
+
-->
|
117
|
+
<!ELEMENT service-ref-name ( #PCDATA )>
|
118
|
+
|
119
|
+
<!--
|
120
|
+
Information for a port within a service-reference.
|
121
|
+
|
122
|
+
Either service-endpoint-interface or wsdl-port or both
|
123
|
+
(service-endpoint-interface and wsdl-port) should be specified.
|
124
|
+
|
125
|
+
If both are specified, wsdl-port represents the
|
126
|
+
port the container should choose for container-managed port selection.
|
127
|
+
|
128
|
+
The same wsdl-port value must not appear in
|
129
|
+
more than one port-info entry within the same service-ref.
|
130
|
+
|
131
|
+
If a particular service-endpoint-interface is using container-managed port
|
132
|
+
selection, it must not appear in more than one port-info entry
|
133
|
+
within the same service-ref.
|
134
|
+
|
135
|
+
The optional message-security-binding element is used to customize the
|
136
|
+
port to provider binding; either by binding the port to a specific provider
|
137
|
+
or by providing a definition of the message security requirements to be
|
138
|
+
enforced by the provider.
|
139
|
+
|
140
|
+
-->
|
141
|
+
<!ELEMENT port-info ( service-endpoint-interface?, wsdl-port?, stub-property*, call-property*, message-security-binding? )>
|
142
|
+
|
143
|
+
<!--
|
144
|
+
Fully qualified name of service endpoint interface
|
145
|
+
-->
|
146
|
+
<!ELEMENT service-endpoint-interface ( #PCDATA )>
|
147
|
+
<!--
|
148
|
+
Port used in port-info.
|
149
|
+
-->
|
150
|
+
<!ELEMENT wsdl-port ( namespaceURI, localpart )>
|
151
|
+
|
152
|
+
<!--
|
153
|
+
JAXRPC property values that should be set on a stub before it's returned to
|
154
|
+
to the web service client. The property names can be any properties supported
|
155
|
+
by the JAXRPC Stub implementation. See javadoc for javax.xml.rpc.Stub
|
156
|
+
-->
|
157
|
+
<!ELEMENT stub-property ( name, value )>
|
158
|
+
|
159
|
+
<!--
|
160
|
+
JAXRPC property values that should be set on a Call object before it's
|
161
|
+
returned to the web service client. The property names can be any
|
162
|
+
properties supported by the JAXRPC Call implementation. See javadoc
|
163
|
+
for javax.xml.rpc.Call
|
164
|
+
-->
|
165
|
+
<!ELEMENT call-property ( name, value )>
|
166
|
+
|
167
|
+
<!--
|
168
|
+
This is a valid URL pointing to a final WSDL document. It is optional.
|
169
|
+
If specified, the WSDL document at this URL will be used during
|
170
|
+
deployment instead of the WSDL document associated with the
|
171
|
+
service-ref in the standard deployment descriptor.
|
172
|
+
|
173
|
+
Examples :
|
174
|
+
|
175
|
+
// available via HTTP
|
176
|
+
<wsdl-override>http://localhost:8000/myservice/myport?WSDL</wsdl-override>
|
177
|
+
|
178
|
+
// in a file
|
179
|
+
<wsdl-override>file:/home/user1/myfinalwsdl.wsdl</wsdl-override>
|
180
|
+
|
181
|
+
-->
|
182
|
+
<!ELEMENT wsdl-override ( #PCDATA )>
|
183
|
+
|
184
|
+
<!--
|
185
|
+
Name of generated service implementation class. This is not set by the
|
186
|
+
deployer. It is derived during deployment.
|
187
|
+
-->
|
188
|
+
<!ELEMENT service-impl-class ( #PCDATA )>
|
189
|
+
|
190
|
+
<!--
|
191
|
+
The service-qname element declares the specific WSDL service
|
192
|
+
element that is being refered to. It is not set by the deployer.
|
193
|
+
It is derived during deployment.
|
194
|
+
-->
|
195
|
+
<!ELEMENT service-qname (namespaceURI, localpart)>
|
196
|
+
|
197
|
+
<!--
|
198
|
+
The localpart element indicates the local part of a QNAME.
|
199
|
+
-->
|
200
|
+
<!ELEMENT localpart (#PCDATA)>
|
201
|
+
|
202
|
+
<!--
|
203
|
+
The namespaceURI element indicates a URI.
|
204
|
+
-->
|
205
|
+
<!ELEMENT namespaceURI (#PCDATA)>
|
206
|
+
|
207
|
+
<!--
|
208
|
+
This text nodes holds a value string.
|
209
|
+
-->
|
210
|
+
<!ELEMENT value (#PCDATA)>
|
211
|
+
|
212
|
+
<!--
|
213
|
+
The message-layer entity is used to define the value of the
|
214
|
+
auth-layer attribute of message-security-binding elements.
|
215
|
+
|
216
|
+
Used in: message-security-binding
|
217
|
+
-->
|
218
|
+
<!ENTITY % message-layer "(SOAP)">
|
219
|
+
|
220
|
+
<!--
|
221
|
+
The message-security-binding element is used to customize the
|
222
|
+
webservice-endpoint or port to provider binding; either by binding the
|
223
|
+
webservice-endpoint or port to a specific provider or by providing a
|
224
|
+
definition of the message security requirements to be enforced by the
|
225
|
+
provider.
|
226
|
+
|
227
|
+
These elements are typically NOT created as a result of the
|
228
|
+
deployment of an application. They need only be created when the
|
229
|
+
deployer or system administrator chooses to customize the
|
230
|
+
webservice-endpoint or port to provider binding.
|
231
|
+
|
232
|
+
The optional (repeating) message-security sub-element is used
|
233
|
+
to accomplish the latter; in which case the specified
|
234
|
+
message-security requirements override any defined with the
|
235
|
+
provider.
|
236
|
+
|
237
|
+
The auth-layer attribute identifies the message layer at which the
|
238
|
+
message-security requirements are to be enforced.
|
239
|
+
|
240
|
+
The optional provider-id attribute identifies the provider-config
|
241
|
+
and thus the authentication provider that is to be used to satisfy
|
242
|
+
the application specific message security requirements. If a value for
|
243
|
+
the provider-id attribute is not specified, and a default
|
244
|
+
provider is defined for the message layer, then it is used.
|
245
|
+
if a value for the provider-id attribute is not specified, and a
|
246
|
+
default provider is not defined at the layer, the authentication
|
247
|
+
requirements defined in the message-security-binding are not
|
248
|
+
enforced.
|
249
|
+
|
250
|
+
Default:
|
251
|
+
Used in: webservice-endpoint, port-info
|
252
|
+
-->
|
253
|
+
<!ELEMENT message-security-binding ( message-security* )>
|
254
|
+
<!ATTLIST message-security-binding
|
255
|
+
auth-layer %message-layer; #REQUIRED
|
256
|
+
provider-id CDATA #IMPLIED >
|
257
|
+
|
258
|
+
<!--
|
259
|
+
The message-security element describes message security requirements
|
260
|
+
that pertain to the request and response messages of the containing
|
261
|
+
endpoint, or port
|
262
|
+
|
263
|
+
When contained within a webservice-endpoint this element describes
|
264
|
+
the message security requirements that pertain to the request and
|
265
|
+
response messages of the containing endpoint. When contained within a
|
266
|
+
port-info of a service-ref this element describes the message security
|
267
|
+
requirements of the port of the referenced service.
|
268
|
+
|
269
|
+
The one or more contained message elements define the methods or operations
|
270
|
+
of the containing application, endpoint, or referenced service to which
|
271
|
+
the message security requirements apply.
|
272
|
+
|
273
|
+
Multiple message-security elements occur within a containing
|
274
|
+
element when it is necessary to define different message
|
275
|
+
security requirements for different messages within the encompassing
|
276
|
+
context. In such circumstances, the peer elements should not overlap
|
277
|
+
in the messages they pertain to. If there is any overlap in the
|
278
|
+
identified messages, no message security requirements apply to
|
279
|
+
the messages for which more than one message-security element apply.
|
280
|
+
|
281
|
+
Also, no message security requirements apply to any messages of
|
282
|
+
the encompassing context that are not identified by a message element.
|
283
|
+
|
284
|
+
Default:
|
285
|
+
Used in: webservice-endpoint, and port-info
|
286
|
+
-->
|
287
|
+
<!ELEMENT message-security ( message+, request-protection?, response-protection? )>
|
288
|
+
|
289
|
+
<!--
|
290
|
+
The message element identifies the methods or operations to which
|
291
|
+
the message security requirements apply.
|
292
|
+
|
293
|
+
The identified methods or operations are methods or operations of
|
294
|
+
the resource identified by the context in which the message-security
|
295
|
+
element is defined (e.g. the the resource identified by the
|
296
|
+
service-qname of the containing webservice-endpoint or service-ref).
|
297
|
+
|
298
|
+
An empty message element indicates that the security requirements
|
299
|
+
apply to all the methods or operations of the identified resource.
|
300
|
+
|
301
|
+
When operation-name is specified, the security
|
302
|
+
requirements defined in the containing message-security
|
303
|
+
element apply to all the operations of the endpoint
|
304
|
+
with the specified (and potentially overloaded) operation name.
|
305
|
+
|
306
|
+
Default:
|
307
|
+
Used in: message-security
|
308
|
+
-->
|
309
|
+
<!ELEMENT message ( java-method? | operation-name? )>
|
310
|
+
|
311
|
+
<!--
|
312
|
+
The java-method element is used to identify a method (or methods
|
313
|
+
in the case of an overloaded method-name) of the java class
|
314
|
+
indicated by the context in which the java-method is contained.
|
315
|
+
|
316
|
+
Default:
|
317
|
+
Used in: message
|
318
|
+
-->
|
319
|
+
<!ELEMENT java-method ( method-name, method-params? )>
|
320
|
+
|
321
|
+
<!--
|
322
|
+
The operation-name element is used to identify the WSDL name of an
|
323
|
+
operation of a web service.
|
324
|
+
|
325
|
+
Default:
|
326
|
+
Used in: message
|
327
|
+
-->
|
328
|
+
<!ELEMENT operation-name ( #PCDATA )>
|
329
|
+
|
330
|
+
<!--
|
331
|
+
The request-protection element describes the authentication requirements
|
332
|
+
that apply to a request.
|
333
|
+
|
334
|
+
The auth-source attribute defines a requirement for message layer
|
335
|
+
sender authentication (e.g. username password) or content authentication
|
336
|
+
(e.g. digital signature).
|
337
|
+
|
338
|
+
The auth-recipient attribute defines a requirement for message
|
339
|
+
layer authentication of the reciever of a message to its sender (e.g. by
|
340
|
+
XML encryption).
|
341
|
+
|
342
|
+
The before-content attribute value indicates that recipient
|
343
|
+
authentication (e.g. encryption) is to occur before any
|
344
|
+
content authentication (e.g. encrypt then sign) with respect
|
345
|
+
to the target of the containing auth-policy.
|
346
|
+
|
347
|
+
An absent request-protection element is the recommended shorthand
|
348
|
+
for a request-protection element with unspecified values for both the
|
349
|
+
auth-source and auth-recipient attributes.
|
350
|
+
|
351
|
+
Default:
|
352
|
+
Used in: message-security
|
353
|
+
|
354
|
+
* Expected evolution to support partial message protection:
|
355
|
+
*
|
356
|
+
* request-protection ( content-auth-policy* )
|
357
|
+
*
|
358
|
+
* If the request-protection element contains one or more
|
359
|
+
* content-auth-policy sub-elements, they define the authentication
|
360
|
+
* requirements to be applied to the identified request content. If multiple
|
361
|
+
* content-auth-policy sub-elements are defined, a request sender must
|
362
|
+
* satisfy the requirements independently, and in the specified order.
|
363
|
+
*
|
364
|
+
* The content-auth-policy element would be used to associate authentication
|
365
|
+
* requirements with the parts of the request or response object identified
|
366
|
+
* by the contained method-params or part-name-list sub-elements.
|
367
|
+
*
|
368
|
+
* The content-auth-policy element would be defined as follows:
|
369
|
+
*
|
370
|
+
* content-auth-policy ( method-params | part-name-list )
|
371
|
+
* ATTLIST content-auth-policy
|
372
|
+
* auth-source (sender | content) #IMPLIED
|
373
|
+
* auth-recipient (before-content | after-content) #IMPLIED
|
374
|
+
*
|
375
|
+
* The part-name-list and part-name elements would be defined as follows:
|
376
|
+
*
|
377
|
+
* part-name-list ( part-name* )
|
378
|
+
* part-name ( #PCDATA )
|
379
|
+
*
|
380
|
+
-->
|
381
|
+
<!ELEMENT request-protection EMPTY >
|
382
|
+
<!ATTLIST request-protection
|
383
|
+
auth-source (sender | content) #IMPLIED
|
384
|
+
auth-recipient (before-content | after-content) #IMPLIED>
|
385
|
+
|
386
|
+
<!--
|
387
|
+
The response-protection element describes the authentication requirements
|
388
|
+
that apply to a response.
|
389
|
+
|
390
|
+
The auth-source attribute defines a requirement for message layer
|
391
|
+
sender authentication (e.g. username password) or content authentication
|
392
|
+
(e.g. digital signature).
|
393
|
+
|
394
|
+
The auth-recipient attribute defines a requirement for message
|
395
|
+
layer authentication of the reciever of a message to its sender (e.g. by
|
396
|
+
XML encryption).
|
397
|
+
|
398
|
+
The before-content attribute value indicates that recipient
|
399
|
+
authentication (e.g. encryption) is to occur before any
|
400
|
+
content authentication (e.g. encrypt then sign) with respect
|
401
|
+
to the target of the containing auth-policy.
|
402
|
+
|
403
|
+
An absent response-protection element is the recommended shorthand
|
404
|
+
for a request-protection element with unspecified values for both the
|
405
|
+
auth-source and auth-recipient attributes.
|
406
|
+
|
407
|
+
Default:
|
408
|
+
Used in: message-security
|
409
|
+
|
410
|
+
* Expected evolution to support partial message protection:
|
411
|
+
*
|
412
|
+
* response-protection ( content-auth-policy* )
|
413
|
+
*
|
414
|
+
* see request-protection element for more details
|
415
|
+
*
|
416
|
+
-->
|
417
|
+
<!ELEMENT response-protection EMPTY >
|
418
|
+
<!ATTLIST response-protection
|
419
|
+
auth-source (sender | content) #IMPLIED
|
420
|
+
auth-recipient (before-content | after-content) #IMPLIED>
|
421
|
+
|
422
|
+
<!--
|
423
|
+
The method-name element contains the name of a service method of a web service
|
424
|
+
implementation class.
|
425
|
+
|
426
|
+
Used in: java-method
|
427
|
+
-->
|
428
|
+
<!ELEMENT method-name (#PCDATA)>
|
429
|
+
<!--
|
430
|
+
The method-params element contains a list of the fully-qualified Java
|
431
|
+
type names of the method parameters.
|
432
|
+
|
433
|
+
Used in: java-method
|
434
|
+
-->
|
435
|
+
<!ELEMENT method-params (method-param*)>
|
436
|
+
|
437
|
+
<!--
|
438
|
+
The method-param element contains the fully-qualified Java type name
|
439
|
+
of a method parameter.
|
440
|
+
|
441
|
+
Used in: method-params
|
442
|
+
-->
|
443
|
+
<!ELEMENT method-param (#PCDATA)>
|
444
|
+
|
445
|
+
<!--
|
446
|
+
J A V A W E B S T A R T A C C E S S
|
447
|
+
-->
|
448
|
+
|
449
|
+
<!--
|
450
|
+
The java-web-start-access element contains all information relevant to Java
|
451
|
+
Web Start access to the app client.
|
452
|
+
|
453
|
+
Note that all elements that support Java Web Start access appear below
|
454
|
+
the java-web-start-access definition alphabetically by tag name.
|
455
|
+
|
456
|
+
The context-root subelement allows the developer to specify what context root
|
457
|
+
will be used for addressing the app client via Java Web Start. If absent, the
|
458
|
+
app server uses a default context root value.
|
459
|
+
|
460
|
+
The eligible subelement allows the developer to control whether this app client
|
461
|
+
should allow Java Web Start access. If this value is false, then Java Web Start
|
462
|
+
will never be allowed access. Default: true.
|
463
|
+
|
464
|
+
The vendor subelement allows the developer to specify the vendor name that Java
|
465
|
+
Web Start should display to the end-user as the app client is downloaded and launched.
|
466
|
+
|
467
|
+
Used in: sun-application-client
|
468
|
+
-->
|
469
|
+
<!ELEMENT java-web-start-access (context-root?, eligible?, vendor?)>
|
470
|
+
|
471
|
+
<!--
|
472
|
+
The context-root element allows the developer to specify the context root
|
473
|
+
with which Java Web Start should access the app client. The app server
|
474
|
+
provides a default value if the developer omits this.
|
475
|
+
|
476
|
+
Used in: java-web-start-access
|
477
|
+
-->
|
478
|
+
<!ELEMENT context-root (#PCDATA)>
|
479
|
+
|
480
|
+
<!--
|
481
|
+
The eligible element allows the developer to indicate whether Java Web Start
|
482
|
+
access should ever be permitted to launch this app client.
|
483
|
+
|
484
|
+
Used in: java-web-start-access
|
485
|
+
-->
|
486
|
+
<!ELEMENT eligible (#PCDATA)>
|
487
|
+
|
488
|
+
<!--
|
489
|
+
The vendor element allows the developer to indicate what vendor name Java Web Start
|
490
|
+
should display in the splash screen as the app client is downloaded and/or launched.
|
491
|
+
|
492
|
+
Used in: java-web-start-access
|
493
|
+
-->
|
494
|
+
<!ELEMENT vendor (#PCDATA)>
|
495
|
+
|