Codota Logo
org.restlet.ext.platform
Code IndexAdd Codota to your IDE (free)

How to use org.restlet.ext.platform

Best Java code snippets using org.restlet.ext.platform (Showing top 20 results out of 315)

  • Add the Codota plugin to your IDE and get smart completions
private void myMethod () {
OutputStreamWriter o =
  • Codota IconOutputStream out;new OutputStreamWriter(out)
  • Codota IconOutputStream out;String charsetName;new OutputStreamWriter(out, charsetName)
  • Codota IconHttpURLConnection connection;new OutputStreamWriter(connection.getOutputStream())
  • Smart code suggestions by Codota
}
origin: org.restlet.gae/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of concurrent requests, in any other case the access is forbidden.
 * 
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesConcurrencyCounter(Map<String, Integer> limitsPerRole) {
  addRolesConcurrencyCounter(limitsPerRole, 0);
}
origin: org.restlet.jse/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of requests by period of time, in any other case the access is forbidden.
 * 
 * @param period
 *            The period of time.
 * @param periodUnit
 *            Period time unit associated to the rule.
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesPeriodicCounter(int period, TimeUnit periodUnit,
    Map<String, Integer> limitsPerRole) {
  addRolesPeriodicCounter(period, periodUnit, limitsPerRole, 0);
}
origin: org.restlet.osgi/org.restlet.ext.platform

/**
 * Adds a rule that forbids access to the given set of IP addresses.
 * 
 * @param blackList
 *            The list of rejected IP addresses.
 */
public void addIpAddressesBlackList(List<String> blackList) {
  add(new FirewallIpFilteringRule(blackList, false));
}
origin: org.restlet.jee/org.restlet.ext.platform

private void addIpFilterRules(FirewallSettings firewallSettings,
    FirewallConfig firewallConfig) {
  if (firewallSettings.getIpFilters() != null) {
    for (FirewallIpFilter ipFilter : firewallSettings.getIpFilters()) {
      if (ipFilter.isWhiteList()) {
        firewallConfig.addIpAddressesWhiteList(ipFilter.getIps());
      } else {
        firewallConfig.addIpAddressesBlackList(ipFilter.getIps());
      }
    }
  }
}
origin: org.restlet.jee/org.restlet.ext.platform

private Integer getRequiredIntegerProperty(Properties properties, String key) {
  String value = getRequiredProperty(properties, key);
  try {
    return Integer.valueOf(value);
  } catch (NumberFormatException e) {
    throw new IllegalArgumentException(
        "Restlet Cloud configuration file error. The property '" + key
            + "' should be a number", e);
  }
}
origin: org.restlet.gae/org.restlet.ext.platform

private void addIpFilterRules(FirewallSettings firewallSettings,
    FirewallConfig firewallConfig) {
  if (firewallSettings.getIpFilters() != null) {
    for (FirewallIpFilter ipFilter : firewallSettings.getIpFilters()) {
      if (ipFilter.isWhiteList()) {
        firewallConfig.addIpAddressesWhiteList(ipFilter.getIps());
      } else {
        firewallConfig.addIpAddressesBlackList(ipFilter.getIps());
      }
    }
  }
}
origin: org.restlet.jee/org.restlet.ext.platform

/**
 * Adds a rule that restricts access to the given set of IP addresses.
 * 
 * @param whiteList
 *            The list of accepted IP addresses.
 */
public void addIpAddressesWhiteList(List<String> whiteList) {
  add(new FirewallIpFilteringRule(whiteList, true));
}
origin: org.restlet.jee/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of concurrent requests, in any other case the access is forbidden.
 * 
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesConcurrencyCounter(Map<String, Integer> limitsPerRole) {
  addRolesConcurrencyCounter(limitsPerRole, 0);
}
origin: org.restlet.gae/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of requests by period of time, in any other case the access is forbidden.
 * 
 * @param period
 *            The period of time.
 * @param periodUnit
 *            Period time unit associated to the rule.
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesPeriodicCounter(int period, TimeUnit periodUnit,
    Map<String, Integer> limitsPerRole) {
  addRolesPeriodicCounter(period, periodUnit, limitsPerRole, 0);
}
origin: org.restlet.gae/org.restlet.ext.platform

private Integer getRequiredIntegerProperty(Properties properties, String key) {
  String value = getRequiredProperty(properties, key);
  try {
    return Integer.valueOf(value);
  } catch (NumberFormatException e) {
    throw new IllegalArgumentException(
        "Restlet Cloud configuration file error. The property '" + key
            + "' should be a number", e);
  }
}
origin: org.restlet.jee/org.restlet.ext.platform

/**
 * Adds a rule that forbids access to the given set of IP addresses.
 * 
 * @param blackList
 *            The list of rejected IP addresses.
 */
public void addIpAddressesBlackList(List<String> blackList) {
  add(new FirewallIpFilteringRule(blackList, false));
}
origin: org.restlet.osgi/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of concurrent requests, in any other case the access is forbidden.
 * 
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesConcurrencyCounter(Map<String, Integer> limitsPerRole) {
  addRolesConcurrencyCounter(limitsPerRole, 0);
}
origin: org.restlet.osgi/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of requests by period of time, in any other case the access is forbidden.
 * 
 * @param period
 *            The period of time.
 * @param periodUnit
 *            Period time unit associated to the rule.
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesPeriodicCounter(int period, TimeUnit periodUnit,
    Map<String, Integer> limitsPerRole) {
  addRolesPeriodicCounter(period, periodUnit, limitsPerRole, 0);
}
origin: org.restlet.jse/org.restlet.ext.platform

/**
 * Adds a rule that restricts access to the given set of IP addresses.
 * 
 * @param whiteList
 *            The list of accepted IP addresses.
 */
public void addIpAddressesWhiteList(List<String> whiteList) {
  add(new FirewallIpFilteringRule(whiteList, true));
}
origin: org.restlet.jse/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of concurrent requests, in any other case the access is forbidden.
 * 
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesConcurrencyCounter(Map<String, Integer> limitsPerRole) {
  addRolesConcurrencyCounter(limitsPerRole, 0);
}
origin: org.restlet.jee/org.restlet.ext.platform

/**
 * Adds a rule that restricts access according to the {@link Role} of the
 * current authenticated {@link User}. Each role is defined a limit in terms
 * of requests by period of time, in any other case the access is forbidden.
 * 
 * @param period
 *            The period of time.
 * @param periodUnit
 *            Period time unit associated to the rule.
 * @param limitsPerRole
 *            The limit assigned per role's name.
 */
public void addRolesPeriodicCounter(int period, TimeUnit periodUnit,
    Map<String, Integer> limitsPerRole) {
  addRolesPeriodicCounter(period, periodUnit, limitsPerRole, 0);
}
origin: org.restlet.gae/org.restlet.ext.platform

/**
 * Adds a rule that forbids access to the given set of IP addresses.
 * 
 * @param blackList
 *            The list of rejected IP addresses.
 */
public void addIpAddressesBlackList(List<String> blackList) {
  add(new FirewallIpFilteringRule(blackList, false));
}
origin: org.restlet.jse/org.restlet.ext.platform

/**
 * Adds a rule that forbids access to the given set of IP addresses.
 * 
 * @param blackList
 *            The list of rejected IP addresses.
 */
public void addIpAddressesBlackList(List<String> blackList) {
  add(new FirewallIpFilteringRule(blackList, false));
}
origin: org.restlet.gae/org.restlet.ext.platform

/**
 * Adds a rule that restricts access to the given set of IP addresses.
 * 
 * @param whiteList
 *            The list of accepted IP addresses.
 */
public void addIpAddressesWhiteList(List<String> whiteList) {
  add(new FirewallIpFilteringRule(whiteList, true));
}
origin: org.restlet.osgi/org.restlet.ext.platform

/**
 * Adds a rule that restricts access to the given set of IP addresses.
 * 
 * @param whiteList
 *            The list of accepted IP addresses.
 */
public void addIpAddressesWhiteList(List<String> whiteList) {
  add(new FirewallIpFilteringRule(whiteList, true));
}
org.restlet.ext.platform

Most used classes

  • FirewallConfig
    Configuration methods for the Firewall.
  • Introspector
    Generates the Web API documentation of a Restlet based Applicationand imports it into the Restlet Cl
  • RestletCloudService
    Configures a proxy for your own application and provides some services hosted by the Restlet Cloud p
  • RestletCloudConfig
    TODO I'm not convinced by the presence of such configuration bean. The service really hosts the conf
  • RestletCloudFilter
  • AgentConfigurationTimerTask,
  • AgentException,
  • AgentUtils,
  • AuthenticationSettings,
  • CallLog,
  • CallLogs,
  • Credentials,
  • FirewallIpFilter,
  • FirewallRateLimit,
  • FirewallSettings,
  • ModulesSettings,
  • OperationAuthorization,
  • User,
  • AnalyticsHandler$AsyncCallLogsPostTask
Codota Logo
  • Products

    Search for Java codeSearch for JavaScript codeEnterprise
  • IDE Plugins

    IntelliJ IDEAWebStormAndroid StudioEclipseVisual Studio CodePyCharmSublime TextPhpStormVimAtomGoLandRubyMineEmacsJupyter
  • Company

    About UsContact UsCareers
  • Resources

    FAQBlogCodota Academy Plugin user guide Terms of usePrivacy policyJava Code IndexJavascript Code Index
Get Codota for your IDE now