The Jboss 4 Application Server J2EE Reference

Total Page:16

File Type:pdf, Size:1020Kb

The Jboss 4 Application Server J2EE Reference The JBoss 4 Application Server J2EE Reference JBoss AS 4.0.5 Release 2 Copyright © 2006 JBoss, Inc. Table of Contents 1. The JBoss JMX Microkernel ...............................................................................................................1 1.1. An Introduction to JMX ............................................................................................................1 1.1.1. Instrumentation Level ....................................................................................................3 1.1.2. Agent Level ..................................................................................................................3 1.1.3. Distributed Services Level .............................................................................................4 1.1.4. JMX Component Overview ............................................................................................4 1.1.4.1. Managed Beans or MBeans .................................................................................5 1.1.4.2. Notification Model .............................................................................................5 1.1.4.3. MBean Metadata Classes ....................................................................................5 1.1.4.4. MBean Server ....................................................................................................6 1.1.4.5. Agent Services ...................................................................................................6 1.2. JBoss JMX Implementation Architecture ...................................................................................7 1.2.1. The JBoss ClassLoader Architecture ...............................................................................7 1.2.2. Class Loading and Types in Java ....................................................................................7 1.2.2.1. ClassCastExceptions - I'm Not Your Type ............................................................7 1.2.2.2. IllegalAccessException - Doing what you should not ..........................................12 1.2.2.3. LinkageErrors - Making Sure You Are Who You Say You Are ...........................14 1.2.2.4. Inside the JBoss Class Loading Architecture .......................................................19 1.2.3. JBoss XMBeans ..........................................................................................................26 1.2.3.1. Descriptors .......................................................................................................27 1.2.3.2. The Management Class .....................................................................................29 1.2.3.3. The Constructors ..............................................................................................29 1.2.3.4. The Attributes ..................................................................................................30 1.2.3.5. The Operations .................................................................................................31 1.2.3.6. Notifications .....................................................................................................32 1.3. Connecting to the JMX Server ................................................................................................33 1.3.1. Inspecting the Server - the JMX Console Web Application ............................................33 1.3.1.1. Securing the JMX Console ................................................................................35 1.3.2. Connecting to JMX Using RMI ....................................................................................37 1.3.3. Command Line Access to JMX ....................................................................................40 1.3.3.1. Connecting twiddle to a Remote Server ..............................................................40 1.3.3.2. Sample twiddle Command Usage ......................................................................40 1.3.4. Connecting to JMX Using Any Protocol .......................................................................43 1.4. Using JMX as a Microkernel ...................................................................................................44 1.4.1. The Startup Process .....................................................................................................44 1.4.2. JBoss MBean Services .................................................................................................45 1.4.2.1. The SARDeployer MBean .................................................................................46 1.4.2.2. The Service Life Cycle Interface ........................................................................49 1.4.2.3. The ServiceController MBean ...........................................................................49 1.4.2.4. Specifying Service Dependencies ......................................................................51 1.4.2.5. Identifying Unsatisfied Dependencies ................................................................52 1.4.2.6. Hot Deployment of Components, the URLDeploymentScanner ...........................53 1.4.3. Writing JBoss MBean Services ....................................................................................54 1.4.3.1. A Standard MBean Example .............................................................................55 JBoss Release 2 ii The JBoss 4 Application Server J2EE Reference 1.4.3.2. XMBean Examples ...........................................................................................58 1.4.4. Deployment Ordering and Dependencies ......................................................................65 1.5. JBoss Deployer Architecture ...................................................................................................75 1.5.1. Deployers and ClassLoaders ........................................................................................76 1.6. Remote Access to Services, Detached Invokers ........................................................................78 1.6.1. A Detached Invoker Example, the MBeanServer Invoker Adaptor Service ......................80 1.6.2. Detached Invoker Reference ........................................................................................84 1.6.2.1. The JRMPInvoker - RMI/JRMP Transport .........................................................84 1.6.2.2. The PooledInvoker - RMI/Socket Transport .......................................................85 1.6.2.3. The IIOPInvoker - RMI/IIOP Transport .............................................................86 1.6.2.4. The JRMPProxyFactory Service - Building Dynamic JRMP Proxies ....................86 1.6.2.5. The HttpInvoker - RMI/HTTP Transport ............................................................86 1.6.2.6. The HA JRMPInvoker - Clustered RMI/JRMP Transport ....................................87 1.6.2.7. The HA HttpInvoker - Clustered RMI/HTTP Transport .......................................87 1.6.2.8. HttpProxyFactory - Building Dynamic HTTP Proxies .........................................87 1.6.2.9. Steps to Expose Any RMI Interface via HTTP ....................................................88 2. Naming on JBoss ..............................................................................................................................90 2.1. An Overview of JNDI ............................................................................................................90 2.1.1. Names ........................................................................................................................90 2.1.2. Contexts .....................................................................................................................91 2.1.2.1. Obtaining a Context using InitialContext ............................................................91 2.2. The JBossNS Architecture ......................................................................................................92 2.3. The Naming InitialContext Factories .......................................................................................95 2.3.1. The standard naming context factory ............................................................................95 2.3.2. The org.jboss.naming.NamingContextFactory ...............................................................96 2.3.3. Naming Discovery in Clustered Environments ..............................................................96 2.3.4. The HTTP InitialContext Factory Implementation .........................................................97 2.3.5. The Login InitialContext Factory Implementation .........................................................98 2.3.6. The ORBInitialContextFactory .....................................................................................98 2.4. JNDI over HTTP ....................................................................................................................99 2.4.1. Accessing JNDI over HTTP .........................................................................................99 2.4.2. Accessing JNDI over HTTPS .....................................................................................102 2.4.3. Securing Access to JNDI over HTTP ..........................................................................104 2.4.4. Securing Access to JNDI with a Read-Only Unsecured Context ...................................105 2.5. Additional Naming MBeans ..................................................................................................107
Recommended publications
  • Using Microsoft Visual Studio to Create a Graphical User Interface ECE 480: Design Team 11
    Using Microsoft Visual Studio to Create a Graphical User Interface ECE 480: Design Team 11 Application Note Joshua Folks April 3, 2015 Abstract: Software Application programming involves the concept of human-computer interaction and in this area of the program, a graphical user interface is very important. Visual widgets such as checkboxes and buttons are used to manipulate information to simulate interactions with the program. A well-designed GUI gives a flexible structure where the interface is independent from, but directly connected to the application functionality. This quality is directly proportional to the user friendliness of the application. This note will briefly explain how to properly create a Graphical User Interface (GUI) while ensuring that the user friendliness and the functionality of the application are maintained at a high standard. 1 | P a g e Table of Contents Abstract…………..…………………………………………………………………………………………………………………………1 Introduction….……………………………………………………………………………………………………………………………3 Operation….………………………………………………….……………………………………………………………………………3 Operation….………………………………………………….……………………………………………………………………………3 Visual Studio Methods.…..…………………………….……………………………………………………………………………4 Interface Types………….…..…………………………….……………………………………………………………………………6 Understanding Variables..…………………………….……………………………………………………………………………7 Final Forms…………………....…………………………….……………………………………………………………………………7 Conclusion.…………………....…………………………….……………………………………………………………………………8 2 | P a g e Key Words: Interface, GUI, IDE Introduction: Establishing a connection between
    [Show full text]
  • Practical ASP.NET Web API
    Practical ASP.NET Web API Badrinarayanan Lakshmiraghavan Practical ASP.NET Web API Copyright © 2013 by Badrinarayanan Lakshmiraghavan This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law. ISBN-13 (pbk): 978-1-4302-6175-9 ISBN-13 (electronic): 978-1-4302-6176-6 Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights.
    [Show full text]
  • Command Line Interface User Guide for Version 11.0 Copyright © 1994-2017 Dell Inc
    Command Line Interface User Guide for Version 11.0 Copyright © 1994-2017 Dell Inc. or its subsidiaries. All Rights Reserved. Contact Information RSA Link at https://community.rsa.com contains a knowledgebase that answers common questions and provides solutions to known problems, product documentation, community discussions, and case management. Trademarks For a list of RSA trademarks, go to www.emc.com/legal/emc-corporation-trademarks.htm#rsa. License Agreement This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below. This software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other person. No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability. This software is subject to change without notice and should not be construed as a commitment by EMC. Third-Party Licenses This product may include software developed by parties other than RSA. The text of the license agreements applicable to third-party software in this product may be viewed on the product documentation page on RSA Link. By using this product, a user of this product agrees to be fully bound by terms of the license agreements. Note on Encryption Technologies This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption technologies, and current use, import, and export regulations should be followed when using, importing or exporting this product.
    [Show full text]
  • CA Plex C# Best Practices
    CA Plex C# Best Practices Example Document Creating packages and code libraries and managing C# source code and application artifacts CA Plex version 6.1 Created by: In collaboration with IIDEA Solutions and CCH, and assistance from CA. Published with the kind permission of the South Carolina Judicial Department . Packages and .NET Assemblies Best Practices for CA Plex. Contents 1. Introduction ......................................................................................................................................... 3 2. Use of assemblies and modules when creating code libraries ............................................................. 3 3. Creating and using assemblies ............................................................................................................. 4 4. Considerations when packaging your model ....................................................................................... 5 5. Software required on the build server .................................................................................................. 6 6. Modelling C# Code Libraries in Plex .................................................................................................. 7 7. Setting up the build server and installing Cruise Control .................................................................. 10 8. Development life cycle ...................................................................................................................... 20 Appendix ..................................................................................................................................................
    [Show full text]
  • Programming with Windows Forms
    A P P E N D I X A ■ ■ ■ Programming with Windows Forms Since the release of the .NET platform (circa 2001), the base class libraries have included a particular API named Windows Forms, represented primarily by the System.Windows.Forms.dll assembly. The Windows Forms toolkit provides the types necessary to build desktop graphical user interfaces (GUIs), create custom controls, manage resources (e.g., string tables and icons), and perform other desktop- centric programming tasks. In addition, a separate API named GDI+ (represented by the System.Drawing.dll assembly) provides additional types that allow programmers to generate 2D graphics, interact with networked printers, and manipulate image data. The Windows Forms (and GDI+) APIs remain alive and well within the .NET 4.0 platform, and they will exist within the base class library for quite some time (arguably forever). However, Microsoft has shipped a brand new GUI toolkit called Windows Presentation Foundation (WPF) since the release of .NET 3.0. As you saw in Chapters 27-31, WPF provides a massive amount of horsepower that you can use to build bleeding-edge user interfaces, and it has become the preferred desktop API for today’s .NET graphical user interfaces. The point of this appendix, however, is to provide a tour of the traditional Windows Forms API. One reason it is helpful to understand the original programming model: you can find many existing Windows Forms applications out there that will need to be maintained for some time to come. Also, many desktop GUIs simply might not require the horsepower offered by WPF.
    [Show full text]
  • For Mac OS X
    C More on Stata for Mac Contents C.1 Using Stata datasets and graphs created on other platforms C.2 Exporting a Stata graph to another document C.3 Stata and the Notification Manager C.4 Stata(console) for Mac OS X C.1 Using Stata datasets and graphs created on other platforms Stata will open any Stata .dta dataset or .gph graph file, regardless of the platform on which it was created, even if it was a Windows or Unix system. Also, Stata for Windows and Stata for Unix users can use any files that you create. Remember that .dta and .gph files are binary files, not text (ASCII) files, so they need no translation; simply copy them over to your hard disk as is. Files created on other platforms can be directly opened in the Command window; for example, you can load a dataset by typing use filename or by double-clicking on the file in the Finder. C.2 Exporting a Stata graph to another document Suppose that you wish to export a Stata graph to a document created by your favorite word processor or presentation application. You have two main choices for exporting graphs: you may copy and paste the graph by using the Clipboard, or you may save the graph in one of several formats and import the graph into the application. C.2.1 Exporting the graph by using the Clipboard The easiest way to export a Stata graph into another application is to use drag and drop. You can select the graph in the Graph window and drag it to the location you would like it in another open application.
    [Show full text]
  • C Add Web Reference to Console Application
    C Add Web Reference To Console Application Opposed Taylor escalading observantly while Frederic always garner his gyrations parody similarly, he pledging so impudently. Heliolithic and nihilism Zak gelatinizes her polyclinics blueing elect and triturated palewise. Liable Morse preplanned irretrievably, he territorializes his Leto very man-to-man. And once provided project reference is added we can extract the debugger and. Using the Web Service from Code Microsoft Visual C NET. Hi i am on console application i want to footing the wsdl file without service reference or web reference This XML file does then appear to. Net objects before actual visual studio with odata web services? Visual studio c console application template Code Example. You can reference and to add web reference console application project? Add bleed and assembly references in C Interactive. Using client certificates in much part 5 working with client. Visual basic code example. C Copy using System using SystemIO Renders a report located on. And web reference to create drive location. Now welcome you want are doing HTTP requests in another console application in NET 4 then I. Azure SQL Azure-IoT c-sharp C Cloud Cloud Computing Cloud DataBase csharp CSS. In business Solution Explorer right-click on YourSolutionYourProjectReferences Select permanent Service Reference. Visual C using System using SystemData using MySqlDataMySqlClient. I have added a method CheckArgs which checks if the application is called with command line parameters. C Windows AzureWebSitesnet. The WSDL document actually tells a client application what consider the types. Comen-usdotnetcoreadditional-toolswcf-web-service-reference-guide I'm. NET Client C 11242017 7 minutes to read 11 In quality article by Mike Wasson and Rick Anderson.
    [Show full text]
  • Installation Manual for Oracle Application Server 10.1.3.3 on Unix for Agile E6.1
    Oracle® Agile Engineering Data Management Installation Manual for Oracle Application Server 10.1.3.3 on Unix for Agile e6.1 Part No. E13352-02 February 2009 Installation Manual for Oracle Application Server 10.1.3.3 on Unix for Agile e6.1 Copyright and Trademarks Copyright © 1995, 2009, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007).
    [Show full text]
  • Console Command Line Shell Guide
    Red Hat Gluster Storage 3 Console Command Line Shell Guide A guide for installing and using the Command Line Shell for Red Hat Storage Console. Last Updated: 2017-10-18 Red Hat Gluster Storage 3 Console Command Line Shell Guide A guide for installing and using the Command Line Shell for Red Hat Storage Console. Pavithra Srinivasan Red Hat Engineering Content Services [email protected] Legal Notice Copyright © 2013-2014 Red Hat, Inc. This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent.
    [Show full text]
  • Application Programming Interfaces
    ERserver zSeries Application Programming Interfaces SB10-7030-06 Level 06a, November 2004 ER s er ver zSeries Application Programming Interfaces SB10-7030-06 Level 06a, November 2004 Level 06a, November 2004 Note! Before using this information and the product it supports, be sure to read the general information under Appendix F, “Notices,” on page F-1. Seventh Edition (October 2004) ™ ® | This edition, SB10-7030-06, applies to zSeries Processors and S/390 Processors. | This edition replaces SB10-7030-05 and -05a. A technical change to the text or illustration is indicated by a vertical line to the left of the change. ™ There may be a newer version of this document in PDF format available on Resource Link . Go to http://www.ibm.com/servers/resourcelink and click on Library on the Navigation bar. A newer version is indicated by a lower-case, alphabetic letter following the form number suffix (for example: 00a, 00b, 01a, 01b). © Copyright International Business Machines Corporation 2000, 2004. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Level 06a, November 2004 Contents Safety and Environmental Notices . vii Laser Safety Information . vii Laser Compliance . vii Environmental Notices . vii Product Recycling and Disposal . vii Refrigeration . vii Battery Return Program . vii IBM Cryptographic Adapter Card Return Program . viii Cable Warning . viii Preface . .ix Message Event Notification . .x Load Command Support . .x Hardware Message Refresh Command Support . .x Hardware Message Event Data . .x Activation Profile Support . .x Hardware Message Delete Command Support . .x Reset Clear Command Support . .xi || Security Log Event Support .
    [Show full text]
  • Airconsole User Manual
    User Manual Version 2.5 1 Welcome to Airconsole ......................................................................................... 4 1.1 Airconsole Features ..................................................................................................................................... 4 1.2 Package Contents .......................................................................................................................................... 4 2 Quick Setup ........................................................................................................... 5 3 Hardware and Connectivity Overview .................................................................... 9 4 Airconsole Web Configuration ............................................................................... 9 4.1 Serial Settings .............................................................................................................................................. 11 4.1.1 Advanced Serial Settings......................................................................................................................... 12 4.2 LAN Settings ................................................................................................................................................. 13 4.2.1 Setup Page ..................................................................................................................................................... 14 4.2.2 Static IP Address ........................................................................................................................................
    [Show full text]
  • Advanced Management Console Installation and Configuration Guide
    Java Platform, Standard Edition Advanced Management Console Installation and Configuration Guide 2.20 F38329-01 January 2021 Java Platform, Standard Edition Advanced Management Console Installation and Configuration Guide, 2.20 F38329-01 Copyright © 2014, 2021, Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer
    [Show full text]