Example usage for org.apache.commons.collections.iterators IteratorEnumeration IteratorEnumeration

List of usage examples for org.apache.commons.collections.iterators IteratorEnumeration IteratorEnumeration

Introduction

In this page you can find the example usage for org.apache.commons.collections.iterators IteratorEnumeration IteratorEnumeration.

Prototype

public IteratorEnumeration(Iterator iterator) 

Source Link

Document

Constructs a new IteratorEnumeration that will use the given iterator.

Usage

From source file:org.apache.cocoon.servletservice.util.RequestParameters.java

/**
 * Get all parameter names./*from  w  w  w.  j a v  a 2  s .c  om*/
 *
 * @return  Enumeration for the (String) parameter names.
 */
public Enumeration getParameterNames() {
    return new IteratorEnumeration(values.keySet().iterator());
}

From source file:org.apache.isis.core.metamodel.facets.collections.CollectionFacetAbstract.java

@Override
@SuppressWarnings("unchecked")
public final Enumeration<ObjectAdapter> elements(final ObjectAdapter collectionAdapter) {
    return new IteratorEnumeration(iterator(collectionAdapter));
}

From source file:org.apache.isis.core.metamodel.spec.FreeStandingList.java

/**
 * @deprecated - use {@link #iterator()}.
 *//* w  ww  .  j a va2  s  .  com*/
@SuppressWarnings("unchecked")
@Deprecated
public Enumeration<ObjectAdapter> elements() {
    return new IteratorEnumeration(iterator());
}

From source file:org.apache.ranger.security.web.filter.RangerKRBAuthenticationFilter.java

@Override
public void init(FilterConfig conf) throws ServletException {
    final FilterConfig globalConf = conf;
    final Map<String, String> params = new HashMap<String, String>();
    params.put(AUTH_TYPE, PropertiesUtil.getProperty(RANGER_AUTH_TYPE, "simple"));
    params.put(NAME_RULES_PARAM, PropertiesUtil.getProperty(NAME_RULES, "DEFAULT"));
    params.put(TOKEN_VALID_PARAM, PropertiesUtil.getProperty(TOKEN_VALID, "30"));
    params.put(COOKIE_DOMAIN_PARAM,// w  ww . j av a 2s.  com
            PropertiesUtil.getProperty(COOKIE_DOMAIN, PropertiesUtil.getProperty(HOST_NAME, "localhost")));
    params.put(COOKIE_PATH_PARAM, PropertiesUtil.getProperty(COOKIE_PATH, "/"));
    try {
        params.put(PRINCIPAL_PARAM, SecureClientLogin.getPrincipal(PropertiesUtil.getProperty(PRINCIPAL, ""),
                PropertiesUtil.getProperty(HOST_NAME)));
    } catch (IOException ignored) {
        // do nothing
    }
    params.put(KEYTAB_PARAM, PropertiesUtil.getProperty(KEYTAB, ""));

    FilterConfig myConf = new FilterConfig() {
        @Override
        public ServletContext getServletContext() {
            if (globalConf != null) {
                return globalConf.getServletContext();
            } else {
                return noContext;
            }
        }

        @SuppressWarnings("unchecked")
        @Override
        public Enumeration<String> getInitParameterNames() {
            return new IteratorEnumeration(params.keySet().iterator());
        }

        @Override
        public String getInitParameter(String param) {
            return params.get(param);
        }

        @Override
        public String getFilterName() {
            return "KerberosFilter";
        }
    };
    super.init(myConf);
}

From source file:org.apache.solr.security.GenericHadoopAuthPlugin.java

@SuppressWarnings("unchecked")
protected FilterConfig getInitFilterConfig(Map<String, Object> pluginConfig) {
    Map<String, String> params = new HashMap<>();

    String type = (String) Objects.requireNonNull(pluginConfig.get(HADOOP_AUTH_TYPE));
    params.put(HADOOP_AUTH_TYPE, type);/*from ww w.j  a  v  a 2s. c  o m*/

    String sysPropPrefix = (String) pluginConfig.getOrDefault(SYSPROP_PREFIX_PROPERTY, "solr.");
    Collection<String> authConfigNames = (Collection<String>) pluginConfig
            .getOrDefault(AUTH_CONFIG_NAMES_PROPERTY, Collections.emptyList());
    Map<String, String> authConfigDefaults = (Map<String, String>) pluginConfig
            .getOrDefault(DEFAULT_AUTH_CONFIGS_PROPERTY, Collections.emptyMap());
    Map<String, String> proxyUserConfigs = (Map<String, String>) pluginConfig.getOrDefault(PROXY_USER_CONFIGS,
            Collections.emptyMap());

    for (String configName : authConfigNames) {
        String systemProperty = sysPropPrefix + configName;
        String defaultConfigVal = authConfigDefaults.get(configName);
        String configVal = System.getProperty(systemProperty, defaultConfigVal);
        if (configVal != null) {
            params.put(configName, configVal);
        }
    }

    // Configure proxy user settings.
    params.putAll(proxyUserConfigs);

    final ServletContext servletContext = new AttributeOnlyServletContext();
    log.info("Params: " + params);

    ZkController controller = coreContainer.getZkController();
    if (controller != null) {
        servletContext.setAttribute(DELEGATION_TOKEN_ZK_CLIENT, controller.getZkClient());
    }

    FilterConfig conf = new FilterConfig() {
        @Override
        public ServletContext getServletContext() {
            return servletContext;
        }

        @Override
        public Enumeration<String> getInitParameterNames() {
            return new IteratorEnumeration(params.keySet().iterator());
        }

        @Override
        public String getInitParameter(String param) {
            return params.get(param);
        }

        @Override
        public String getFilterName() {
            return "HadoopAuthFilter";
        }
    };

    return conf;
}

From source file:org.apache.solr.security.KerberosPlugin.java

@VisibleForTesting
protected FilterConfig getInitFilterConfig(Map<String, Object> pluginConfig, boolean skipKerberosChecking) {
    Map<String, String> params = new HashMap();
    params.put("type", "kerberos");
    putParam(params, "kerberos.name.rules", NAME_RULES_PARAM, "DEFAULT");
    putParam(params, "token.valid", TOKEN_VALID_PARAM, "30");
    putParam(params, "cookie.path", COOKIE_PATH_PARAM, "/");
    if (!skipKerberosChecking) {
        putParam(params, "kerberos.principal", PRINCIPAL_PARAM, null);
        putParam(params, "kerberos.keytab", KEYTAB_PARAM, null);
    } else {/*from ww  w.j a va2 s  .  co m*/
        putParamOptional(params, "kerberos.principal", PRINCIPAL_PARAM);
        putParamOptional(params, "kerberos.keytab", KEYTAB_PARAM);
    }

    String delegationTokenStr = System.getProperty(DELEGATION_TOKEN_ENABLED, null);
    boolean delegationTokenEnabled = (delegationTokenStr == null) ? false
            : Boolean.parseBoolean(delegationTokenStr);
    ZkController controller = coreContainer.getZkController();

    if (delegationTokenEnabled) {
        putParam(params, "delegation-token.token-kind", DELEGATION_TOKEN_KIND, DELEGATION_TOKEN_TYPE_DEFAULT);
        if (coreContainer.isZooKeeperAware()) {
            putParam(params, "signer.secret.provider", DELEGATION_TOKEN_SECRET_PROVIDER, "zookeeper");
            if ("zookeeper".equals(params.get("signer.secret.provider"))) {
                String zkHost = controller.getZkServerAddress();
                putParam(params, "token.validity", DELEGATION_TOKEN_VALIDITY, "36000");
                params.put("zk-dt-secret-manager.enable", "true");

                String chrootPath = zkHost.contains("/") ? zkHost.substring(zkHost.indexOf("/")) : "";
                String znodeWorkingPath = chrootPath + SecurityAwareZkACLProvider.SECURITY_ZNODE_PATH
                        + "/zkdtsm";
                // Note - Curator complains if the znodeWorkingPath starts with /
                znodeWorkingPath = znodeWorkingPath.startsWith("/") ? znodeWorkingPath.substring(1)
                        : znodeWorkingPath;
                putParam(params, "zk-dt-secret-manager.znodeWorkingPath",
                        DELEGATION_TOKEN_SECRET_MANAGER_ZNODE_WORKING_PATH, znodeWorkingPath);
                putParam(params, "signer.secret.provider.zookeeper.path",
                        DELEGATION_TOKEN_SECRET_PROVIDER_ZK_PATH, "/token");
                // ensure krb5 is setup properly before running curator
                getHttpClientBuilder(SolrHttpClientBuilder.create());
            }
        } else {
            log.info("CoreContainer is not ZooKeeperAware, not setting ZK-related delegation token properties");
        }
    }

    // Special handling for the "cookie.domain" based on whether port should be
    // appended to the domain. Useful for situations where multiple solr nodes are
    // on the same host.
    String usePortStr = System.getProperty(COOKIE_PORT_AWARE_PARAM, null);
    boolean needPortAwareCookies = (usePortStr == null) ? false : Boolean.parseBoolean(usePortStr);

    if (!needPortAwareCookies || !coreContainer.isZooKeeperAware()) {
        putParam(params, "cookie.domain", COOKIE_DOMAIN_PARAM, null);
    } else { // we need port aware cookies and we are in SolrCloud mode.
        String host = System.getProperty(COOKIE_DOMAIN_PARAM, null);
        if (host == null) {
            throw new SolrException(ErrorCode.SERVER_ERROR,
                    "Missing required parameter '" + COOKIE_DOMAIN_PARAM + "'.");
        }
        int port = controller.getHostPort();
        params.put("cookie.domain", host + ":" + port);
    }

    // check impersonator config
    for (Enumeration e = System.getProperties().propertyNames(); e.hasMoreElements();) {
        String key = e.nextElement().toString();
        if (key.startsWith(IMPERSONATOR_PREFIX)) {
            if (!delegationTokenEnabled) {
                throw new SolrException(ErrorCode.SERVER_ERROR,
                        "Impersonator configuration requires delegation tokens to be enabled: " + key);
            }
            params.put(key, System.getProperty(key));
        }
    }
    final ServletContext servletContext = new AttributeOnlyServletContext();
    if (controller != null) {
        servletContext.setAttribute(DELEGATION_TOKEN_ZK_CLIENT, controller.getZkClient());
    }
    if (delegationTokenEnabled) {
        kerberosFilter = new DelegationTokenKerberosFilter();
        // pass an attribute-enabled context in order to pass the zkClient
        // and because the filter may pass a curator instance.
    } else {
        kerberosFilter = new KerberosFilter();
    }
    log.info("Params: " + params);

    FilterConfig conf = new FilterConfig() {
        @Override
        public ServletContext getServletContext() {
            return servletContext;
        }

        @Override
        public Enumeration<String> getInitParameterNames() {
            return new IteratorEnumeration(params.keySet().iterator());
        }

        @Override
        public String getInitParameter(String param) {
            return params.get(param);
        }

        @Override
        public String getFilterName() {
            return "KerberosFilter";
        }
    };

    return conf;
}

From source file:org.apache.velocity.tools.test.blackbox.ServletAdaptor.java

protected Object request(Object proxy, Method method, Object[] args) {
    String methodName = method.getName();

    if ("getContextPath".equals(methodName)) {
        return _contextPath;
    } else if ("getParameter".equals(methodName)) {
        Object value = _params.get(args[0]);

        if (value instanceof String) {
            return value;
        } else if (value instanceof String[]) {
            return ((String[]) value)[0];
        } else {//from   w ww .  j av a  2 s . c o  m
            throw new IllegalStateException("Parameter value must be either String or String[].");
        }
    } else if ("getParameterValues".equals(methodName)) {
        Object value = _params.get(args[0]);

        if (value instanceof String) {
            return new String[] { (String) value };
        } else if (value instanceof String[]) {
            return value;
        } else {
            throw new IllegalStateException("Parameter value must be either String or String[].");
        }
    } else if ("getParameterMap".equals(methodName)) {
        return Collections.unmodifiableMap(_params);
    } else if ("getParameterNames".equals(methodName)) {
        return new IteratorEnumeration(_params.keySet().iterator());
    } else if ("getSession".equals(methodName)) {
        return null;
    } else if ("getAttribute".equals(methodName)) {
        if (((String) args[0]).equals("XHTML")) {
            return Boolean.TRUE; // xhtml = true
        } else {
            return null;
        }
    } else if ("getScheme".equals(methodName)) {
        return "http";
    } else if ("getServerPort".equals(methodName)) {
        return new Integer(8081);
    } else if ("getServerName".equals(methodName)) {
        return "localhost";
    } else if ("getServletPath".equals(methodName)) {
        return _contextPath;
    } else if ("getPathInfo".equals(methodName)) {
        return _pathInfo;
    } else if ("getCharacterEncoding".equals(methodName)) {
        return "UTF-8";
    } else if ("getCookies".equals(methodName)) {
        // just let params double as the cookie store
        Cookie[] jar = new Cookie[_params.size()];
        int i = 0;
        for (Iterator iter = _params.keySet().iterator(); iter.hasNext(); i++) {
            Object key = iter.next();
            Object val = _params.get(key);
            if (val instanceof Cookie) {
                jar[i] = (Cookie) val;
            } else {
                String name = String.valueOf(key);
                String value = String.valueOf(val);
                jar[i] = new Cookie(name, value);
                _params.put(name, jar[i]);
            }
        }
        return jar;
    } else {
        throw new IllegalStateException("Unexpected method call: " + method);
    }
}

From source file:org.artifactory.api.request.InternalArtifactoryRequest.java

@Override
public Enumeration getHeaders(String headerName) {
    return new IteratorEnumeration(headers.values().iterator());
}

From source file:org.artifactory.common.wicket.model.sitemap.MenuNode.java

@Override
public Enumeration children() {
    return new IteratorEnumeration(children.iterator());
}

From source file:org.codehaus.groovy.grails.web.pages.ext.jsp.GroovyPagesPageContext.java

@SuppressWarnings("rawtypes")
@Override/*w  w w.  ja  va 2 s  . c o  m*/
public Enumeration getAttributeNamesInScope(int scope) {
    switch (scope) {
    case PAGE_SCOPE:
        return new IteratorEnumeration(pageScope.getVariables().keySet().iterator());
    case REQUEST_SCOPE:
        return request.getAttributeNames();
    case SESSION_SCOPE:
        HttpSession httpSession = request.getSession(false);
        if (httpSession != null) {
            return httpSession.getAttributeNames();
        }
        return EMPTY_ENUMERATION;
    case APPLICATION_SCOPE:
        return servletContext.getAttributeNames();
    }
    return EMPTY_ENUMERATION;
}