static private String getJVMDefaultEncoding() { return SecurityUtilities.getSystemProperty("file.encoding", "utf-8"); }
/** * Creates a new file template cache that will use the current directory (the value of the system property * <code>user.dir</code> as the base directory for loading templates. It will not allow access to template files * that are accessible through symlinks that point outside the base directory. * * @deprecated Relying on what the current directory is is a bad practice; use * {@link FileTemplateLoader#FileTemplateLoader(File)} instead. */ @Deprecated public FileTemplateLoader() throws IOException { this(new File(SecurityUtilities.getSystemProperty("user.dir"))); }
public DebuggerServer(Serializable debuggerStub) { port = SecurityUtilities.getSystemProperty("freemarker.debug.port", Debugger.DEFAULT_PORT).intValue(); try { password = SecurityUtilities.getSystemProperty("freemarker.debug.password", "").getBytes("UTF-8"); } catch (UnsupportedEncodingException e) { throw new UndeclaredThrowableException(e); } this.debuggerStub = debuggerStub; }
private static DebuggerService createInstance() { // Creates the appropriate service class. If the debugging is turned // off, this is a fast no-op service, otherwise it's the real-thing // RMI service. return SecurityUtilities.getSystemProperty("freemarker.debug.password", null) == null ? (DebuggerService) new NoOpDebuggerService() : (DebuggerService) new RmiDebuggerService(); }
String sysPropVal = SecurityUtilities.getSystemProperty(SYSTEM_PROPERTY_META_INF_TLD_SOURCES, null); if (sysPropVal != null) { try { String sysPropVal = SecurityUtilities.getSystemProperty(SYSTEM_PROPERTY_CLASSPATH_TLDS, null); if (sysPropVal != null) { try {
static private String getJVMDefaultEncoding() { return SecurityUtilities.getSystemProperty("file.encoding", "utf-8"); }
static private String getJVMDefaultEncoding() { return SecurityUtilities.getSystemProperty("file.encoding", "utf-8"); }
/** * Creates a new file template cache that will use the current directory * (the value of the system property <code>user.dir</code> as the base * directory for loading templates. It will not allow access to template * files that are accessible through symlinks that point outside the * base directory. */ public FileTemplateLoader() throws IOException { this(new File(SecurityUtilities.getSystemProperty("user.dir"))); }
/** * Creates a new file template cache that will use the current directory (the value of the system property * <code>user.dir</code> as the base directory for loading templates. It will not allow access to template files * that are accessible through symlinks that point outside the base directory. * * @deprecated Relying on what the current directory is is a bad practice; use * {@link FileTemplateLoader#FileTemplateLoader(File)} instead. */ @Deprecated public FileTemplateLoader() throws IOException { this(new File(SecurityUtilities.getSystemProperty("user.dir"))); }
/** * Creates a new file template cache that will use the current directory (the value of the system property * <code>user.dir</code> as the base directory for loading templates. It will not allow access to template files * that are accessible through symlinks that point outside the base directory. * * @deprecated Relying on what the current directory is is a bad practice; use * {@link FileTemplateLoader#FileTemplateLoader(File)} instead. */ @Deprecated public FileTemplateLoader() throws IOException { this(new File(SecurityUtilities.getSystemProperty("user.dir"))); }
public DebuggerServer(Serializable debuggerStub) { port = SecurityUtilities.getSystemProperty("freemarker.debug.port", Debugger.DEFAULT_PORT).intValue(); try { password = SecurityUtilities.getSystemProperty("freemarker.debug.password", "").getBytes("UTF-8"); } catch (UnsupportedEncodingException e) { throw new UndeclaredThrowableException(e); } this.debuggerStub = debuggerStub; }
public DebuggerServer(Serializable debuggerStub) { port = SecurityUtilities.getSystemProperty("freemarker.debug.port", Debugger.DEFAULT_PORT).intValue(); try { password = SecurityUtilities.getSystemProperty("freemarker.debug.password", "").getBytes("UTF-8"); } catch (UnsupportedEncodingException e) { throw new UndeclaredThrowableException(e); } this.debuggerStub = debuggerStub; }
public DebuggerServer(Serializable debuggerStub) { port = SecurityUtilities.getSystemProperty("freemarker.debug.port", Debugger.DEFAULT_PORT).intValue(); try { password = SecurityUtilities.getSystemProperty("freemarker.debug.password", "").getBytes("UTF-8"); } catch (UnsupportedEncodingException e) { throw new UndeclaredThrowableException(e); } this.debuggerStub = debuggerStub; }
private static DebuggerService createInstance() { // Creates the appropriate service class. If the debugging is turned // off, this is a fast no-op service, otherwise it's the real-thing // RMI service. return SecurityUtilities.getSystemProperty("freemarker.debug.password", null) == null ? (DebuggerService) new NoOpDebuggerService() : (DebuggerService) new RmiDebuggerService(); }
private static DebuggerService createInstance() { // Creates the appropriate service class. If the debugging is turned // off, this is a fast no-op service, otherwise it's the real-thing // RMI service. return SecurityUtilities.getSystemProperty("freemarker.debug.password", null) == null ? (DebuggerService) new NoOpDebuggerService() : (DebuggerService) new RmiDebuggerService(); }
private static DebuggerService createInstance() { // Creates the appropriate service class. If the debugging is turned // off, this is a fast no-op service, otherwise it is the real-thing // RMI service. return SecurityUtilities.getSystemProperty("freemarker.debug.password") == null ? (DebuggerService)new NoOpDebuggerService() : (DebuggerService)new RmiDebuggerService(); }
String sysPropVal = SecurityUtilities.getSystemProperty(SYSTEM_PROPERTY_META_INF_TLD_SOURCES, null); if (sysPropVal != null) { try { String sysPropVal = SecurityUtilities.getSystemProperty(SYSTEM_PROPERTY_CLASSPATH_TLDS, null); if (sysPropVal != null) { try {
String sysPropVal = SecurityUtilities.getSystemProperty(SYSTEM_PROPERTY_META_INF_TLD_SOURCES, null); if (sysPropVal != null) { try { String sysPropVal = SecurityUtilities.getSystemProperty(SYSTEM_PROPERTY_CLASSPATH_TLDS, null); if (sysPropVal != null) { try {