src/share/jaxws_classes/com/sun/xml/internal/ws/message/PayloadElementSniffer.java

Fri, 14 Feb 2014 11:13:45 +0100

author
mkos
date
Fri, 14 Feb 2014 11:13:45 +0100
changeset 515
6cd506508147
parent 368
0989ad8c0860
child 637
9c07ef4934dd
permissions
-rw-r--r--

8026188: Enhance envelope factory
Summary: Avoiding caching data initialized via TCCL in static context; fix also reviewed by Alexander Fomin
Reviewed-by: ahgross, mgrebac, skoivu

ohair@286 1 /*
alanb@368 2 * Copyright (c) 1997, 2012, Oracle and/or its affiliates. All rights reserved.
ohair@286 3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
ohair@286 4 *
ohair@286 5 * This code is free software; you can redistribute it and/or modify it
ohair@286 6 * under the terms of the GNU General Public License version 2 only, as
ohair@286 7 * published by the Free Software Foundation. Oracle designates this
ohair@286 8 * particular file as subject to the "Classpath" exception as provided
ohair@286 9 * by Oracle in the LICENSE file that accompanied this code.
ohair@286 10 *
ohair@286 11 * This code is distributed in the hope that it will be useful, but WITHOUT
ohair@286 12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
ohair@286 13 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
ohair@286 14 * version 2 for more details (a copy is included in the LICENSE file that
ohair@286 15 * accompanied this code).
ohair@286 16 *
ohair@286 17 * You should have received a copy of the GNU General Public License version
ohair@286 18 * 2 along with this work; if not, write to the Free Software Foundation,
ohair@286 19 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
ohair@286 20 *
ohair@286 21 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
ohair@286 22 * or visit www.oracle.com if you need additional information or have any
ohair@286 23 * questions.
ohair@286 24 */
ohair@286 25
ohair@286 26 package com.sun.xml.internal.ws.message;
ohair@286 27
ohair@286 28 import com.sun.xml.internal.ws.encoding.soap.SOAP12Constants;
ohair@286 29 import com.sun.xml.internal.ws.encoding.soap.SOAPConstants;
ohair@286 30 import org.xml.sax.Attributes;
ohair@286 31 import org.xml.sax.SAXException;
ohair@286 32 import org.xml.sax.helpers.DefaultHandler;
ohair@286 33
ohair@286 34 import javax.xml.namespace.QName;
ohair@286 35
ohair@286 36 /**
ohair@286 37 * Parses the SOAP message in order to get {@link QName} of a payload element.
ohair@286 38 * It parses message until it
ohair@286 39 *
ohair@286 40 * @author Miroslav Kos (miroslav.kos at oracle.com)
ohair@286 41 */
ohair@286 42 public class PayloadElementSniffer extends DefaultHandler {
ohair@286 43
ohair@286 44 // flag if the last element was SOAP body
ohair@286 45 private boolean bodyStarted;
ohair@286 46
ohair@286 47 // payloadQName used as a return value
ohair@286 48 private QName payloadQName;
ohair@286 49
ohair@286 50 @Override
ohair@286 51 public void startElement(String uri, String localName, String qName, Attributes attributes) throws SAXException {
ohair@286 52
ohair@286 53 if (bodyStarted) {
ohair@286 54 payloadQName = new QName(uri, localName);
ohair@286 55 // we have what we wanted - let's skip rest of parsing ...
ohair@286 56 throw new SAXException("Payload element found, interrupting the parsing process.");
ohair@286 57 }
ohair@286 58
ohair@286 59 // check for both SOAP 1.1/1.2
ohair@286 60 if (equalsQName(uri, localName, SOAPConstants.QNAME_SOAP_BODY) ||
ohair@286 61 equalsQName(uri, localName, SOAP12Constants.QNAME_SOAP_BODY)) {
ohair@286 62 bodyStarted = true;
ohair@286 63 }
ohair@286 64
ohair@286 65 }
ohair@286 66
ohair@286 67 private boolean equalsQName(String uri, String localName, QName qname) {
ohair@286 68 return qname.getLocalPart().equals(localName) &&
ohair@286 69 qname.getNamespaceURI().equals(uri);
ohair@286 70 }
ohair@286 71
ohair@286 72 public QName getPayloadQName() {
ohair@286 73 return payloadQName;
ohair@286 74 }
ohair@286 75 }

mercurial