Files
alfresco-community-repo/config/alfresco/linkvalidation-service-context.xml
Derek Hulley dc9ccc985e Merged V2.2 to HEAD
7336: JMX-based admin: workaround for LinkValidationService circular reference (to allow unit tests to be run in Eclipse)
   7419: Directory listings are filtered so that child directories without READ_CHILDREN permissions
   7421: Update FOP from 0.92beta to 0.94
         Fixed line endings for .classpath


git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/HEAD/root@8337 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
2008-02-20 13:14:05 +00:00

314 lines
13 KiB
XML

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE beans PUBLIC "-//SPRING/DTD BEAN//EN"
"http://www.springframework.org/dtd/spring-beans.dtd">
<beans>
<bean id="linkValidationServiceExcludeExtensionMatcher"
class="org.alfresco.repo.avm.util.FileExtensionNameMatcher">
<property name="extensions">
<list>
<value>.o</value>
<value>.bak</value>
<value>.tmp</value>
<value>.swp</value>
<value>~</value>
</list>
</property>
</bean>
<bean id="hrefBearingRequestPathNameMatcher"
class="org.alfresco.repo.avm.util.HrefBearingRequestPathNameMatcher">
<property name="extensions">
<list>
<!--
See also: http://filext.com/alphalist.php
and: HrefBearingRequestPathNameMatcher
Note: HrefBearingRequestPathNameMatcher does not require
a leading '.' (unlike FileExtensionNameMatcher),
nor does it suffer from performance problems when
the number of extensions is large. However, it
will not tolerate extensions with internal "." chars;
everything up to and including the final "." will
simply be ignored. Matching is not case sensitive.
-->
<value></value> <!-- null extension for dirs -->
<value>ahtml</value>
<value>ahtm</value>
<value>asphtml</value>
<value>asp</value>
<value>axs</value>
<value>bhtml</value>
<value>css</value>
<value>dci</value>
<value>dht</value>
<value>dochtml</value>
<value>docmhtml</value>
<value>ehtml</value>
<value>ephtml</value>
<value>fhtml</value>
<value>fphtml</value>
<value>hhtml</value>
<value>ht3</value>
<value>htc</value>
<value>htmls</value>
<value>html</value>
<value>htm</value>
<value>ihtml</value>
<value>jcs</value>
<value>jhtml</value>
<value>jhtm</value>
<value>jsp</value>
<value>log</value>
<value>mdhtml</value>
<value>mhtml</value>
<value>mhtm</value>
<value>mht</value>
<value>mml</value>
<value>php2</value>
<value>php3</value>
<value>php4</value>
<value>php5</value>
<value>php6</value>
<value>php7</value>
<value>php8</value>
<value>php9</value>
<value>php</value>
<value>phtml</value>
<value>phtml</value>
<value>phtm</value>
<value>pht</value>
<value>pl</value>
<value>ppthtml</value>
<value>pptm</value>
<value>pt</value>
<value>pubhtml</value>
<value>pubmhtml</value>
<value>rbx</value>
<value>rhtml</value>
<value>rmh</value>
<value>s1h</value>
<value>shtml3</value>
<value>shtml</value>
<value>shtm</value>
<value>sht</value>
<value>ssi</value>
<value>stml</value>
<value>stm</value>
<value>thtml</value>
<value>txt</value>
<value>whtek</value>
<value>xhtml</value>
<value>xhtml</value>
<value>xhtm</value>
<value>xhtm</value>
<value>xht</value>
<value>xlshtml</value>
<value>xlshtm</value>
<value>xlsmhtml</value>
<value>xml</value>
<value>xtml</value>
<value>ybhtm</value>
<!-- Add others here, if you'd like! -->
</list>
</property>
</bean>
<!--
The following URI schema types will not be validated,
and will not show up as "broken" during link checking.
If you want to exclude some URI schema (aka "protocol")
from link checking, add it to this list.
The reason that link checking doesn't simply just skip
anything that isn't http/https is that sometimes people
make typos such as "httpss://...", which is clearly a
nonsense protocol. Thus, the set of protocols that
are not checked is made explicit.
See also: http://tools.ietf.org/html/rfc3986
-->
<bean id="linkValidationServiceExcludeUriSchemeNameMatcher"
class="org.alfresco.repo.avm.util.UriSchemeNameMatcher">
<property name="extensions">
<list>
<value>aaa</value>
<value>aaas</value>
<value>acap</value>
<value>afs</value>
<value>cap</value>
<value>cid</value>
<value>crid</value>
<value>data</value>
<value>dav</value>
<value>dict</value>
<value>dns</value>
<value>dtn</value>
<value>fax</value>
<value>file</value>
<value>ftp</value>
<value>go</value>
<value>gopher</value>
<value>h323</value>
<!-- <value>http</value> NOT EXCLUDED -->
<!-- <value>https</value> NOT EXCLUDED -->
<value>iax2</value>
<value>icap</value>
<value>im</value>
<value>imap</value>
<value>info</value>
<value>ipp</value>
<value>iris</value>
<value>iris.beep</value>
<value>iris.lwz</value>
<value>iris.xpc</value>
<value>iris.xpcs</value>
<value>javascript</value>
<value>ldap</value>
<value>mailserver</value>
<value>mailto</value>
<value>mid</value>
<value>modem</value>
<value>msrp</value>
<value>msrps</value>
<value>mtqp</value>
<value>mupdate</value>
<value>news</value>
<value>nfs</value>
<value>nntp</value>
<value>opaquelocktoken</value>
<value>pop</value>
<value>pres</value>
<value>prospero</value>
<value>rtsp</value>
<value>service</value>
<value>shttp</value>
<value>sip</value>
<value>sips</value>
<value>snmp</value>
<value>soap.beep</value>
<value>soap.beeps</value>
<value>tag</value>
<value>tel</value>
<value>telnet</value>
<value>tftp</value>
<value>thismessage</value>
<value>tip</value>
<value>tn3270</value>
<value>tv</value>
<value>urn</value>
<value>vemmi</value>
<value>wais</value>
<value>xmlrpc.beep</value>
<value>xmlrpc.beeps</value>
<value>xmpp</value>
<value>z39.50r</value>
<value>z39.50s</value>
<!-- Add others here, if you'd like! -->
</list>
</property>
</bean>
<bean id="linkValidationService"
class="org.alfresco.linkvalidation.LinkValidationServiceImpl"
lazy-init="true"
init-method="register">
<property name="attributeService">
<ref bean="AttributeService"/>
</property>
<property name="avmRemote">
<ref bean="avmRemote"/>
</property>
<property name="virtServerRegistry">
<ref bean="VirtServerRegistry"/>
</property>
<property name="AVMSyncService">
<ref bean="AVMSyncService"/>
</property>
<property name="excludePathMatcher">
<ref bean="linkValidationServiceExcludeExtensionMatcher"/>
</property>
<property name="hrefBearingRequestPathMatcher">
<ref bean="hrefBearingRequestPathNameMatcher"/>
</property>
<property name="excludeUriMatcher">
<ref bean="linkValidationServiceExcludeUriSchemeNameMatcher"/>
</property>
<property name="retryingTransactionHelper">
<ref bean="retryingTransactionHelper"/>
</property>
<property name="createVersionTxnListener">
<ref bean="createVersionTxnListener"/>
</property>
<property name="purgeVersionTxnListener">
<ref bean="purgeVersionTxnListener"/>
</property>
<property name="purgeStoreTxnListener">
<ref bean="purgeStoreTxnListener"/>
</property>
<property name="sysAdminCache">
<ref bean="sysAdminCache"/>
</property>
<property name="repoServerMgmt">
<ref bean="RepoServerMgmt"/>
</property>
<!-- Poll interval to check getLatestSnapshotID (in milliseconds). -->
<!-- Note: If pollInterval is 0, link validation is disabled. -->
<property name="pollInterval" value="5000"/>
<!-- Timeouts (in milliseconds) -->
<property name="localConnectTimeout" value="10000"/>
<property name="remoteConnectTimeout" value="10000"/>
<property name="localReadTimeout" value="30000"/>
<property name="remoteReadTimeout" value="30000"/>
<!-- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -->
<!-- Advanced Option: -->
<!-- -->
<!-- JSSE Security parameters (for validating HTTPS links) -->
<!-- -->
<!-- NOTE: -->
<!-- -->
<!-- When the following jsse properties below are commented -->
<!-- out the LinkValidationService uses the system's default -->
<!-- cacert file and password. Typically, there's no need to -->
<!-- change these values, but if you'd like to do so, you can. -->
<!-- -->
<!-- The most common case where you'd use a custom trust store -->
<!-- and password is when you want to validate https links for -->
<!-- which the name on the site's cert does not match the host -->
<!-- you're contacting, is invalid, and/or is not trusted. -->
<!-- If you do nothing, such links will appear "broken". -->
<!-- One option would be to modify your default cert at: -->
<!-- -->
<!-- Unix: ${JAVA_HOME}/lib/security/cacerts -->
<!-- Windows: ${JAVA_HOME}\lib\security\cacerts -->
<!-- -->
<!-- However, this is often not particularly desirable. -->
<!-- By allowing you to point at a custom cacert/password, -->
<!-- the configuration options below allow you to validate -->
<!-- what would be otherwise untrusted "broken" https links -->
<!-- without disturbing the system's default cacert file. -->
<!-- -->
<!-- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -->
<!-- <property name="jsseTrustStoreFile" value="...???..."/> -->
<!-- <property name="jsseTrustStorePassword" value="...???..."/> -->
<!-- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -->
<!-- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -->
<!-- Low-level parameters that typical users should never modify! -->
<!-- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -->
<property name="purgeAllValidationDataOnBootstrap" value="false"/>
</bean>
</beans>