public static Builder builder() { return new Builder(new ExternalMetadataFeature()); }
public Builder addFiles(File... files) { o.addFiles(files); return this; }
public Builder addResources(String... res) { o.addResources(res); return this; }
public static MetadataReader getExternalMetadatReader(Class<?> implType, WSBinding binding) { com.oracle.webservices.api.databinding.ExternalMetadataFeature ef = binding.getFeature( com.oracle.webservices.api.databinding.ExternalMetadataFeature.class); // TODO-Miran: would it be necessary to disable secure xml processing? if (ef != null) return ef.getMetadataReader(implType.getClassLoader(), false); return null; }
if (externalMetadata != null) { metadataReader = ExternalMetadataFeature .builder() .addResources(externalMetadata) .build() .getMetadataReader(ClassLoaders.findMostCompleteClassLoader(endpointConfiguration.getImplementation()), false);
protected ExternalMetadataFeature configureExternalMetadataReader(XMLStreamReader reader) { ExternalMetadataFeature.Builder featureBuilder = null; while (QNAME_EXT_METADA.equals(reader.getName())) { if (reader.getEventType() == XMLStreamConstants.START_ELEMENT) { Attributes attrs = XMLStreamReaderUtil.getAttributes(reader); String file = getAttribute(attrs, ATTR_FILE); if (file != null) { if (featureBuilder == null) { featureBuilder = ExternalMetadataFeature.builder(); } featureBuilder.addFiles(new File(file)); } String res = getAttribute(attrs, ATTR_RESOURCE); if (res != null) { if (featureBuilder == null) { featureBuilder = ExternalMetadataFeature.builder(); } featureBuilder.addResources(res); } } XMLStreamReaderUtil.nextElementContent(reader); } return buildFeature(featureBuilder); }
@Override public String toString() { return "[" + getID() + ", enabled=" + enabled + ", resourceNames=" + resourceNames + ", files=" + files + ']'; }
public static MetadataReader getExternalMetadatReader(Class<?> implType, WSBinding binding) { com.oracle.webservices.api.databinding.ExternalMetadataFeature ef = binding.getFeature( com.oracle.webservices.api.databinding.ExternalMetadataFeature.class); // TODO-Miran: would it be necessary to disable secure xml processing? if (ef != null) return ef.getMetadataReader(implType.getClassLoader(), false); return null; }
protected ExternalMetadataFeature configureExternalMetadataReader(XMLStreamReader reader) { ExternalMetadataFeature.Builder featureBuilder = null; while (QNAME_EXT_METADA.equals(reader.getName())) { if (reader.getEventType() == XMLStreamConstants.START_ELEMENT) { Attributes attrs = XMLStreamReaderUtil.getAttributes(reader); String file = getAttribute(attrs, ATTR_FILE); if (file != null) { if (featureBuilder == null) { featureBuilder = ExternalMetadataFeature.builder(); } featureBuilder.addFiles(new File(file)); } String res = getAttribute(attrs, ATTR_RESOURCE); if (res != null) { if (featureBuilder == null) { featureBuilder = ExternalMetadataFeature.builder(); } featureBuilder.addResources(res); } } XMLStreamReaderUtil.nextElementContent(reader); } return buildFeature(featureBuilder); }
@Override public String toString() { return "[" + getID() + ", enabled=" + enabled + ", resourceNames=" + resourceNames + ", files=" + files + ']'; }
private MetadataReader getMetadadaReader(WebServiceFeatureList features, ClassLoader classLoader) { if (features == null) return null; com.oracle.webservices.api.databinding.ExternalMetadataFeature ef = features.get(com.oracle.webservices.api.databinding.ExternalMetadataFeature.class); // TODO-Miran: would it be necessary to disable secure xml processing? if (ef != null) return ef.getMetadataReader(classLoader, false); return null; }
protected ExternalMetadataFeature configureExternalMetadataReader(XMLStreamReader reader) { ExternalMetadataFeature.Builder featureBuilder = null; while (QNAME_EXT_METADA.equals(reader.getName())) { if (reader.getEventType() == XMLStreamConstants.START_ELEMENT) { Attributes attrs = XMLStreamReaderUtil.getAttributes(reader); String file = getAttribute(attrs, ATTR_FILE); if (file != null) { if (featureBuilder == null) { featureBuilder = ExternalMetadataFeature.builder(); } featureBuilder.addFiles(new File(file)); } String res = getAttribute(attrs, ATTR_RESOURCE); if (res != null) { if (featureBuilder == null) { featureBuilder = ExternalMetadataFeature.builder(); } featureBuilder.addResources(res); } } XMLStreamReaderUtil.nextElementContent(reader); } return buildFeature(featureBuilder); }
@Override public String toString() { return "[" + getID() + ", enabled=" + enabled + ", resourceNames=" + resourceNames + ", files=" + files + ']'; }
public Builder addResources(String... res) { o.addResources(res); return this; }
public Builder addFiles(File... files) { o.addFiles(files); return this; }
public static Builder builder() { return new Builder(new ExternalMetadataFeature()); }
private MetadataReader getMetadadaReader(WebServiceFeatureList features, ClassLoader classLoader) { if (features == null) return null; com.oracle.webservices.api.databinding.ExternalMetadataFeature ef = features.get(com.oracle.webservices.api.databinding.ExternalMetadataFeature.class); // TODO-Miran: would it be necessary to disable secure xml processing? if (ef != null) return ef.getMetadataReader(classLoader, false); return null; }
public Builder addResources(String... res) { o.addResources(res); return this; }
public Builder addFiles(File... files) { o.addFiles(files); return this; }
public static Builder builder() { return new Builder(new ExternalMetadataFeature()); }