All Downloads are FREE. Search and download functionalities are using the official Maven repository.

templates.graphql.clientYml Maven / Gradle / Ivy

There is a newer version: 2.1.38
Show newest version
package templates.graphql;

import java.io.IOException;
import com.fizzed.rocker.ForIterator;
import com.fizzed.rocker.RenderingException;
import com.fizzed.rocker.RockerContent;
import com.fizzed.rocker.RockerOutput;
import com.fizzed.rocker.runtime.DefaultRockerTemplate;
import com.fizzed.rocker.runtime.PlainTextUnloadedClassLoader;

/*
 * Auto generated code to render template templates/graphql/clientYml.rocker.raw
 * Do not edit this file. Changes will eventually be overwritten by Rocker parser!
 */
@SuppressWarnings("unused")
public class clientYml extends com.fizzed.rocker.runtime.DefaultRockerModel {

    static public com.fizzed.rocker.ContentType getContentType() { return com.fizzed.rocker.ContentType.RAW; }
    static public String getTemplateName() { return "clientYml.rocker.raw"; }
    static public String getTemplatePackageName() { return "templates.graphql"; }
    static public String getHeaderHash() { return "2508083"; }
    static public long getModifiedAt() { return 1668132081261L; }
    static public String[] getArgumentNames() { return new String[] { }; }

    static public clientYml template() {
        return new clientYml();
    }

    @Override
    protected DefaultRockerTemplate buildTemplate() throws RenderingException {
        // optimized for convenience (runtime auto reloading enabled if rocker.reloading=true)
        return com.fizzed.rocker.runtime.RockerRuntime.getInstance().getBootstrap().template(this.getClass(), this);
    }

    static public class Template extends com.fizzed.rocker.runtime.DefaultRockerTemplate {

        // # This is the configuration file for Http2Client.\n---\n# Settings for TLS\ntls:\n  # if the server is using self-signed certificate, this need to be false. If true, you have to use CA signed certificate\n  # or load truststore that contains the self-signed cretificate.\n  verifyHostname: ${client.verifyHostname:true}\n  # The default trustedNames group used to created default SSL context. This is used to create Http2Client.SSL if set.\n  defaultGroupKey: ${client.defaultGroupKey:trustedNames...
        static private final byte[] PLAIN_TEXT_0_0;

        static {
            PlainTextUnloadedClassLoader loader = PlainTextUnloadedClassLoader.tryLoad(clientYml.class.getClassLoader(), clientYml.class.getName() + "$PlainText", "UTF-8");
            PLAIN_TEXT_0_0 = loader.tryGet("PLAIN_TEXT_0_0");
        }

        public Template(clientYml model) {
            super(model);
            __internal.setCharset("UTF-8");
            __internal.setContentType(getContentType());
            __internal.setTemplateName(getTemplateName());
            __internal.setTemplatePackageName(getTemplatePackageName());
        }

        @Override
        protected void __doRender() throws IOException, RenderingException {
            // PlainText @ [1:1]
            __internal.aboutToExecutePosInTemplate(1, 1);
            __internal.writeValue(PLAIN_TEXT_0_0);
        }
    }

    private static class PlainText {

        static private final String PLAIN_TEXT_0_0 = "# This is the configuration file for Http2Client.\n---\n# Settings for TLS\ntls:\n  # if the server is using self-signed certificate, this need to be false. If true, you have to use CA signed certificate\n  # or load truststore that contains the self-signed cretificate.\n  verifyHostname: ${client.verifyHostname:true}\n  # The default trustedNames group used to created default SSL context. This is used to create Http2Client.SSL if set.\n  defaultGroupKey: ${client.defaultGroupKey:trustedNames.local}\n  # trusted hostnames, service names, service Ids, and so on.\n  # Note: localhost and 127.0.0.1 are not trustable hostname/ip in general. So, these values should not be used as trusted names in production.\n  trustedNames:\n    local: localhost\n    negativeTest: invalidhost\n    empty:\n  # trust store contains certifictes that server needs. Enable if tls is used.\n  loadTrustStore: ${client.loadTrustStore:true}\n  # trust store location can be specified here or system properties javax.net.ssl.trustStore and password javax.net.ssl.trustStorePassword\n  trustStore: ${client.trustStore:client.truststore}\n  # trust store password\n  trustStorePass: ${client.trustStorePass:password}\n  # key store contains client key and it should be loaded if two-way ssl is uesed.\n  loadKeyStore: ${client.loadKeyStore:false}\n  # key store location\n  keyStore: ${client.keyStore:client.keystore}\n  # key store password\n  keyStorePass: ${client.keyStorePass:password}\n  # private key password\n  keyPass: ${client.keyPass:password}\n# settings for OAuth2 server communication\noauth:\n  # OAuth 2.0 token endpoint configuration\n  token:\n    cache:\n      #capacity of caching TOKENs\n      capacity: ${client.tokenCacheCapacity:200}\n    # The scope token will be renewed automatically 1 minutes before expiry\n    tokenRenewBeforeExpired: ${client.tokenRenewBeforeExpired:60000}\n    # if scope token is expired, we need short delay so that we can retry faster.\n    expiredRefreshRetryDelay: ${client.expiredRefreshRetryDelay:2000}\n    # if scope token is not expired but in renew windown, we need slow retry delay.\n    earlyRefreshRetryDelay: ${client.earlyRefreshRetryDelay:4000}\n    # token server url. The default port number for token service is 6882. If this is set,\n    # it will take high priority than serviceId for the direct connection\n    # server_url: ${client.tokenServerUrl:https://localhost:6882}\n    # For users who leverage SaaS OAuth 2.0 provider from lightapi.net or others in the public cloud\n    # and has an internal proxy server to access code, token and key services of OAuth 2.0, set up the\n    # proxyHost here for the HTTPS traffic. This option is only working with server_url and serviceId\n    # below should be commented out. OAuth 2.0 services cannot be discovered if a proxy server is used.\n    # proxyHost: ${client.tokenProxyHost:proxy.lightapi.net}\n    # We only support HTTPS traffic for the proxy and the default port is 443. If your proxy server has\n    # a different port, please specify it here. If proxyHost is available and proxyPort is missing, then\n    # the default value 443 is going to be used for the HTTP connection.\n    # proxyPort: ${client.tokenProxyPort:3128}\n    # token service unique id for OAuth 2.0 provider. If server_url is not set above,\n    # a service discovery action will be taken to find an instance of token service.\n    serviceId: ${client.tokenServiceId:com.networknt.oauth2-token-1.0.0}\n    # For users who leverage SaaS OAuth 2.0 provider from lightapi.net or others in the public cloud\n    # and has an internal proxy server to access code, token and key services of OAuth 2.0, set up the\n    # proxyHost here for the HTTPS traffic. This option is only working with server_url and serviceId\n    # below should be commented out. OAuth 2.0 services cannot be discovered if a proxy server is used.\n    # proxyHost: ${client.tokenProxyHost:proxy.lightapi.net}\n    # We only support HTTPS traffic for the proxy and the default port is 443. If your proxy server has\n    # a different port, please specify it here. If proxyHost is available and proxyPort is missing, then\n    # the default value 443 is going to be used for the HTTP connection.\n    # proxyPort: ${client.tokenProxyPort:3128}\n    # set to true if the oauth2 provider supports HTTP/2\n    enableHttp2: ${client.tokenEnableHttp2:true}\n    # the following section defines uri and parameters for authorization code grant type\n    authorization_code:\n      # token endpoint for authorization code grant\n      uri: ${client.tokenAcUri:/oauth2/token}\n      # client_id for authorization code grant flow.\n      client_id: ${client.tokenAcClientId:f7d42348-c647-4efb-a52d-4c5787421e72}\n      # client_secret for authorization code grant flow.\n      client_secret: ${client.tokenAcClientSecret:f6h1FTI8Q3-7UScPZDzfXA}\n      # the web server uri that will receive the redirected authorization code\n      redirect_uri: ${client.tokenAcRedirectUri:https://localhost:3000/authorization}\n      # optional scope, default scope in the client registration will be used if not defined.\n      # If there are scopes specified here, they will be verified against the registered scopes.\n      # scope:\n      # - petstore.r\n      # - petstore.w\n    # the following section defines uri and parameters for client credentials grant type\n    client_credentials:\n      # token endpoint for client credentials grant\n      uri: ${client.tokenCcUri:/oauth2/token}\n      # client_id for client credentials grant flow.\n      client_id: ${client.tokenCcClientId:f7d42348-c647-4efb-a52d-4c5787421e72}\n      # client_secret for client credentials grant flow.\n      client_secret: ${client.tokenCcClientSecret:f6h1FTI8Q3-7UScPZDzfXA}\n      # optional scope, default scope in the client registration will be used if not defined.\n      # If there are scopes specified here, they will be verified against the registered scopes.\n      # scope:\n      # - petstore.r\n      # - petstore.w\n    refresh_token:\n      # token endpoint for refresh token grant\n      uri: ${client.tokenRtUri:/oauth2/token}\n      # client_id for refresh token grant flow.\n      client_id: ${client.tokenRtClientId:f7d42348-c647-4efb-a52d-4c5787421e72}\n      # client_secret for refresh token grant flow\n      client_secret: ${client.tokenRtClientSecret:f6h1FTI8Q3-7UScPZDzfXA}\n      # optional scope, default scope in the client registration will be used if not defined.\n      # If there are scopes specified here, they will be verified against the registered scopes.\n      # scope:\n      # - petstore.r\n      # - petstore.w\n    # light-oauth2 key distribution endpoint configuration for token verification\n    key:\n      # key distribution server url for token verification. It will be used if it is configured.\n      # If it is not set, a service lookup will be taken with serviceId to find an instance.\n      # server_url: ${client.tokenKeyServerUrl:https://localhost:6886}\n      # For users who leverage SaaS OAuth 2.0 provider from lightapi.net or others in the public cloud\n      # and has an internal proxy server to access code, token and key services of OAuth 2.0, set up the\n      # proxyHost here for the HTTPS traffic. This option is only working with server_url and serviceId\n      # below should be commented out. OAuth 2.0 services cannot be discovered if a proxy server is used.\n      # proxyHost: ${client.tokenKeyProxyHost:proxy.lightapi.net}\n      # We only support HTTPS traffic for the proxy and the default port is 443. If your proxy server has\n      # a different port, please specify it here. If proxyHost is available and proxyPort is missing, then\n      # the default value 443 is going to be used for the HTTP connection.\n      # proxyPort: ${client.tokenKeyProxyPort:3128}\n      # key serviceId for key distribution service, it will be used if above server_url is not configured.\n      serviceId: ${client.tokenKeyServiceId:com.networknt.oauth2-key-1.0.0}\n      # the path for the key distribution endpoint\n      uri: ${client.tokenKeyUri:/oauth2/key}\n      # client_id used to access key distribution service. It can be the same client_id with token service or not.\n      client_id: ${client.tokenKeyClientId:f7d42348-c647-4efb-a52d-4c5787421e72}\n      # client secret used to access the key distribution service.\n      client_secret: ${client.tokenKeyClientSecret:f6h1FTI8Q3-7UScPZDzfXA}\n      # set to true if the oauth2 provider supports HTTP/2\n      enableHttp2: ${client.tokenKeyEnableHttp2:true}\n  # sign endpoint configuration\n  sign:\n    # token server url. The default port number for token service is 6882. If this url exists, it will be used.\n    # if it is not set, then a service lookup against serviceId will be taken to discover an instance.\n    # server_url: ${client.signServerUrl:https://localhost:6882}\n    # For users who leverage SaaS OAuth 2.0 provider from lightapi.net or others in the public cloud\n    # and has an internal proxy server to access code, token and key services of OAuth 2.0, set up the\n    # proxyHost here for the HTTPS traffic. This option is only working with server_url and serviceId\n    # below should be commented out. OAuth 2.0 services cannot be discovered if a proxy server is used.\n    # proxyHost: ${client.signProxyHost:proxy.lightapi.net}\n    # We only support HTTPS traffic for the proxy and the default port is 443. If your proxy server has\n    # a different port, please specify it here. If proxyHost is available and proxyPort is missing, then\n    # the default value 443 is going to be used for the HTTP connection.\n    # proxyPort: ${client.signProxyPort:3128}\n    # token serviceId. If server_url doesn't exist, the serviceId will be used to lookup the token service.\n    serviceId: ${client.signServiceId:com.networknt.oauth2-token-1.0.0}\n    # signing endpoint for the sign request\n    uri: ${client.signUri:/oauth2/token}\n    # timeout in milliseconds\n    timeout: ${client.signTimeout:2000}\n    # set to true if the oauth2 provider supports HTTP/2\n    enableHttp2: ${client.signEnableHttp2:true}\n    # client_id for client authentication\n    client_id: ${client.signClientId:f7d42348-c647-4efb-a52d-4c5787421e72}\n    # client secret for client authentication and it can be encrypted here.\n    client_secret: ${client.signClientSecret:f6h1FTI8Q3-7UScPZDzfXA}\n    # the key distribution sever config for sign. It can be different then token key distribution server.\n    key:\n      # key distribution server url. It will be used to establish connection if it exists.\n      # if it is not set, then a service lookup against serviceId will be taken to discover an instance.\n      # server_url: ${client.signKeyServerUrl:https://localhost:6886}\n      # For users who leverage SaaS OAuth 2.0 provider from lightapi.net or others in the public cloud\n      # and has an internal proxy server to access code, token and key services of OAuth 2.0, set up the\n      # proxyHost here for the HTTPS traffic. This option is only working with server_url and serviceId\n      # below should be commented out. OAuth 2.0 services cannot be discovered if a proxy server is used.\n      # proxyHost: ${client.signKeyProxyHost:proxy.lightapi.net}\n      # We only support HTTPS traffic for the proxy and the default port is 443. If your proxy server has\n      # a different port, please specify it here. If proxyHost is available and proxyPort is missing, then\n      # the default value 443 is going to be used for the HTTP connection.\n      # proxyPort: ${client.signKeyProxyPort:3128}\n      # the unique service id for key distribution service, it will be used to lookup key service if above url doesn't exist.\n      serviceId: ${client.signKeyServiceId:com.networknt.oauth2-key-1.0.0}\n      # the path for the key distribution endpoint\n      uri: ${client.signKeyUri:/oauth2/key}\n      # client_id used to access key distribution service. It can be the same client_id with token service or not.\n      client_id: ${client.signKeyClientId:f7d42348-c647-4efb-a52d-4c5787421e72}\n      # client secret used to access the key distribution service.\n      client_secret: ${client.signKeyClientSecret:f6h1FTI8Q3-7UScPZDzfXA}\n      # set to true if the oauth2 provider supports HTTP/2\n      enableHttp2: ${client.signKeyEnableHttp2:true}\n  # de-ref by reference token to JWT token. It is separate service as it might be the external OAuth 2.0 provider.\n  deref:\n    # Token service server url, this might be different than the above token server url. The static url will be used if it is configured.\n    # server_url: ${client.derefServerUrl:https://localhost:6882}\n    # For users who leverage SaaS OAuth 2.0 provider in the public cloud and has an internal\n    # proxy server to access code, token and key services of OAuth 2.0, set up the proxyHost\n    # here for the HTTPS traffic. This option is only working with server_url and serviceId\n    # below should be commented out. OAuth 2.0 services cannot be discovered if a proxy is used.\n    # proxyHost: ${client.derefProxyHost:proxy.lightapi.net}\n    # We only support HTTPS traffic for the proxy and the default port is 443. If your proxy server has\n    # a different port, please specify it here. If proxyHost is available and proxyPort is missing, then\n    # the default value 443 is going to be used for the HTTP connection.\n    # proxyPort: ${client.derefProxyPort:3128}\n    # token service unique id for OAuth 2.0 provider. Need for service lookup/discovery. It will be used if above server_url is not configured.\n    serviceId: ${client.derefServiceId:com.networknt.oauth2-token-1.0.0}\n    # set to true if the oauth2 provider supports HTTP/2\n    enableHttp2: ${client.derefEnableHttp2:true}\n    # the path for the key distribution endpoint\n    uri: ${client.derefUri:/oauth2/deref}\n    # client_id used to access key distribution service. It can be the same client_id with token service or not.\n    client_id: ${client.derefClientId:f7d42348-c647-4efb-a52d-4c5787421e72}\n    # client_secret for deref\n    client_secret: ${client.derefClientSecret:f6h1FTI8Q3-7UScPZDzfXA}\n# circuit breaker configuration for the client\nrequest:\n  # number of timeouts/errors to break the circuit\n  errorThreshold: ${client.errorThreshold:2}\n  # timeout in millisecond to indicate a client error.\n  timeout: ${client.timeout:3000}\n  # reset the circuit after this timeout in millisecond\n  resetTimeout: ${client.resetTimeout:7000}\n  # if open tracing is enable. traceability, correlation and metrics should not be in the chain if opentracing is used.\n  injectOpenTracing: ${client.injectOpenTracing:false}\n  # inject serviceId as callerId into the http header for metrics to collect the caller. The serviceId is from server.yml\n  injectCallerId: ${client.injectCallerId:false}\n  # the flag to indicate whether http/2 is enabled when calling client.callService()\n  enableHttp2: ${client.enableHttp2:true}\n  # the maximum host capacity of connection pool\n  connectionPoolSize: ${client.connectionPoolSize:1000}\n  # the maximum request limitation for each connection\n  maxReqPerConn: ${client.maxReqPerConn:1000000}\n  # maximum quantity of connection in connection pool for each host\n  maxConnectionNumPerHost: ${client.maxConnectionNumPerHost:1000}\n  # minimum quantity of connection in connection pool for each host. The corresponding connection number will shrink to minConnectionNumPerHost\n  # by remove least recently used connections when the connection number of a host reach 0.75 * maxConnectionNumPerHost.\n  minConnectionNumPerHost: ${client.minConnectionNumPerHost:250}\n";

    }

}




© 2015 - 2025 Weber Informatics LLC | Privacy Policy