/** * @deprecated use #getListeners */ @Deprecated public Collection<ServerPort> getPorts() { final Set<ServerPort> result = new LinkedHashSet<>(); for ( ConnectionListener listener : getListeners() ) { if (listener.getServerPort() != null) { result.add( listener.getServerPort() ); } } return result; } }
/** * Stops all listeners. This ensures no listener will accept new connections. */ private synchronized void stopListeners() { for ( final ConnectionListener listener : getListeners() ) { // TODO determine by purpose exactly what needs and what need not be restarted. try { listener.stop(); } catch ( RuntimeException ex ) { Log.error( "An exception occurred while stopping listener " + listener, ex ); } } // Stop the HTTP client listener. try { HttpBindManager.getInstance().stop(); } catch ( RuntimeException ex ) { Log.error( "An exception occurred while stopping HTTP Bind listener ", ex ); } }
for ( final ConnectionListener listener : getListeners() )
for ( ConnectionListener connectionListener : connectionManager.getListeners( type ) ) { try { connectionListener.setTrustStoreConfiguration( configuration );
for ( ConnectionListener connectionListener : connectionManager.getListeners( type ) ) { try { connectionListener.setIdentityStoreConfiguration( configuration );
@Override public void storeContentChanged( CertificateStore store ) { // Note that all non-SSL listeners can be using TLS - these also need to be restarted. for ( final ConnectionListener listener : getListeners() ) { if ( listener.getIdentityStoreConfiguration().equals( store.getConfiguration() ) || listener.getTrustStoreConfiguration().equals( store.getConfiguration() ) ) { try { listener.reloadConfiguration(); } catch ( RuntimeException ex ) { Log.error( "An exception occurred while reloading listener " + listener + ". The reason for the reload was a certificate store change.", ex ); } } } }
/** * @deprecated use #getListeners */ @Deprecated public Collection<ServerPort> getPorts() { final Set<ServerPort> result = new LinkedHashSet<>(); for ( ConnectionListener listener : getListeners() ) { if (listener.getServerPort() != null) { result.add( listener.getServerPort() ); } } return result; } }
/** * Stops all listeners. This ensures no listener will accept new connections. */ private synchronized void stopListeners() { for ( final ConnectionListener listener : getListeners() ) { // TODO determine by purpose exactly what needs and what need not be restarted. try { listener.stop(); } catch ( RuntimeException ex ) { Log.error( "An exception occurred while stopping listener " + listener, ex ); } } // Stop the HTTP client listener. try { HttpBindManager.getInstance().stop(); } catch ( RuntimeException ex ) { Log.error( "An exception occurred while stopping HTTP Bind listener ", ex ); } }
for ( final ConnectionListener listener : getListeners() )
for ( ConnectionListener connectionListener : connectionManager.getListeners( type ) ) { try { connectionListener.setIdentityStoreConfiguration( configuration );
for ( ConnectionListener connectionListener : connectionManager.getListeners( type ) ) { try { connectionListener.setTrustStoreConfiguration( configuration );
@Override public void storeContentChanged( CertificateStore store ) { // Note that all non-SSL listeners can be using TLS - these also need to be restarted. for ( final ConnectionListener listener : getListeners() ) { if ( listener.getIdentityStoreConfiguration().equals( store.getConfiguration() ) || listener.getTrustStoreConfiguration().equals( store.getConfiguration() ) ) { try { listener.reloadConfiguration(); } catch ( RuntimeException ex ) { Log.error( "An exception occurred while reloading listener " + listener + ". The reason for the reload was a certificate store change.", ex ); } } } }