templates.graphql.clientYml Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of light-graphql-4j-generator Show documentation
Show all versions of light-graphql-4j-generator Show documentation
light-graphql-4j code generator.
package templates.graphql;
import java.io.IOException;
import com.fizzed.rocker.ForIterator;
import com.fizzed.rocker.RenderingException;
import com.fizzed.rocker.RockerContent;
import com.fizzed.rocker.RockerOutput;
import com.fizzed.rocker.runtime.DefaultRockerTemplate;
import com.fizzed.rocker.runtime.PlainTextUnloadedClassLoader;
/*
* Auto generated code to render template templates/graphql/clientYml.rocker.raw
* Do not edit this file. Changes will eventually be overwritten by Rocker parser!
*/
@SuppressWarnings("unused")
public class clientYml extends com.fizzed.rocker.runtime.DefaultRockerModel {
static public com.fizzed.rocker.ContentType getContentType() { return com.fizzed.rocker.ContentType.RAW; }
static public String getTemplateName() { return "clientYml.rocker.raw"; }
static public String getTemplatePackageName() { return "templates.graphql"; }
static public String getHeaderHash() { return "2508083"; }
static public long getModifiedAt() { return 1668132081261L; }
static public String[] getArgumentNames() { return new String[] { }; }
static public clientYml template() {
return new clientYml();
}
@Override
protected DefaultRockerTemplate buildTemplate() throws RenderingException {
// optimized for convenience (runtime auto reloading enabled if rocker.reloading=true)
return com.fizzed.rocker.runtime.RockerRuntime.getInstance().getBootstrap().template(this.getClass(), this);
}
static public class Template extends com.fizzed.rocker.runtime.DefaultRockerTemplate {
// # This is the configuration file for Http2Client.\n---\n# Settings for TLS\ntls:\n # if the server is using self-signed certificate, this need to be false. If true, you have to use CA signed certificate\n # or load truststore that contains the self-signed cretificate.\n verifyHostname: ${client.verifyHostname:true}\n # The default trustedNames group used to created default SSL context. This is used to create Http2Client.SSL if set.\n defaultGroupKey: ${client.defaultGroupKey:trustedNames...
static private final byte[] PLAIN_TEXT_0_0;
static {
PlainTextUnloadedClassLoader loader = PlainTextUnloadedClassLoader.tryLoad(clientYml.class.getClassLoader(), clientYml.class.getName() + "$PlainText", "UTF-8");
PLAIN_TEXT_0_0 = loader.tryGet("PLAIN_TEXT_0_0");
}
public Template(clientYml model) {
super(model);
__internal.setCharset("UTF-8");
__internal.setContentType(getContentType());
__internal.setTemplateName(getTemplateName());
__internal.setTemplatePackageName(getTemplatePackageName());
}
@Override
protected void __doRender() throws IOException, RenderingException {
// PlainText @ [1:1]
__internal.aboutToExecutePosInTemplate(1, 1);
__internal.writeValue(PLAIN_TEXT_0_0);
}
}
private static class PlainText {
static private final String PLAIN_TEXT_0_0 = "# This is the configuration file for Http2Client.\n---\n# Settings for TLS\ntls:\n # if the server is using self-signed certificate, this need to be false. If true, you have to use CA signed certificate\n # or load truststore that contains the self-signed cretificate.\n verifyHostname: ${client.verifyHostname:true}\n # The default trustedNames group used to created default SSL context. This is used to create Http2Client.SSL if set.\n defaultGroupKey: ${client.defaultGroupKey:trustedNames.local}\n # trusted hostnames, service names, service Ids, and so on.\n # Note: localhost and 127.0.0.1 are not trustable hostname/ip in general. So, these values should not be used as trusted names in production.\n trustedNames:\n local: localhost\n negativeTest: invalidhost\n empty:\n # trust store contains certifictes that server needs. Enable if tls is used.\n loadTrustStore: ${client.loadTrustStore:true}\n # trust store location can be specified here or system properties javax.net.ssl.trustStore and password javax.net.ssl.trustStorePassword\n trustStore: ${client.trustStore:client.truststore}\n # trust store password\n trustStorePass: ${client.trustStorePass:password}\n # key store contains client key and it should be loaded if two-way ssl is uesed.\n loadKeyStore: ${client.loadKeyStore:false}\n # key store location\n keyStore: ${client.keyStore:client.keystore}\n # key store password\n keyStorePass: ${client.keyStorePass:password}\n # private key password\n keyPass: ${client.keyPass:password}\n# settings for OAuth2 server communication\noauth:\n # OAuth 2.0 token endpoint configuration\n token:\n cache:\n #capacity of caching TOKENs\n capacity: ${client.tokenCacheCapacity:200}\n # The scope token will be renewed automatically 1 minutes before expiry\n tokenRenewBeforeExpired: ${client.tokenRenewBeforeExpired:60000}\n # if scope token is expired, we need short delay so that we can retry faster.\n expiredRefreshRetryDelay: ${client.expiredRefreshRetryDelay:2000}\n # if scope token is not expired but in renew windown, we need slow retry delay.\n earlyRefreshRetryDelay: ${client.earlyRefreshRetryDelay:4000}\n # token server url. The default port number for token service is 6882. If this is set,\n # it will take high priority than serviceId for the direct connection\n # server_url: ${client.tokenServerUrl:https://localhost:6882}\n # For users who leverage SaaS OAuth 2.0 provider from lightapi.net or others in the public cloud\n # and has an internal proxy server to access code, token and key services of OAuth 2.0, set up the\n # proxyHost here for the HTTPS traffic. This option is only working with server_url and serviceId\n # below should be commented out. OAuth 2.0 services cannot be discovered if a proxy server is used.\n # proxyHost: ${client.tokenProxyHost:proxy.lightapi.net}\n # We only support HTTPS traffic for the proxy and the default port is 443. If your proxy server has\n # a different port, please specify it here. If proxyHost is available and proxyPort is missing, then\n # the default value 443 is going to be used for the HTTP connection.\n # proxyPort: ${client.tokenProxyPort:3128}\n # token service unique id for OAuth 2.0 provider. If server_url is not set above,\n # a service discovery action will be taken to find an instance of token service.\n serviceId: ${client.tokenServiceId:com.networknt.oauth2-token-1.0.0}\n # For users who leverage SaaS OAuth 2.0 provider from lightapi.net or others in the public cloud\n # and has an internal proxy server to access code, token and key services of OAuth 2.0, set up the\n # proxyHost here for the HTTPS traffic. This option is only working with server_url and serviceId\n # below should be commented out. OAuth 2.0 services cannot be discovered if a proxy server is used.\n # proxyHost: ${client.tokenProxyHost:proxy.lightapi.net}\n # We only support HTTPS traffic for the proxy and the default port is 443. If your proxy server has\n # a different port, please specify it here. If proxyHost is available and proxyPort is missing, then\n # the default value 443 is going to be used for the HTTP connection.\n # proxyPort: ${client.tokenProxyPort:3128}\n # set to true if the oauth2 provider supports HTTP/2\n enableHttp2: ${client.tokenEnableHttp2:true}\n # the following section defines uri and parameters for authorization code grant type\n authorization_code:\n # token endpoint for authorization code grant\n uri: ${client.tokenAcUri:/oauth2/token}\n # client_id for authorization code grant flow.\n client_id: ${client.tokenAcClientId:f7d42348-c647-4efb-a52d-4c5787421e72}\n # client_secret for authorization code grant flow.\n client_secret: ${client.tokenAcClientSecret:f6h1FTI8Q3-7UScPZDzfXA}\n # the web server uri that will receive the redirected authorization code\n redirect_uri: ${client.tokenAcRedirectUri:https://localhost:3000/authorization}\n # optional scope, default scope in the client registration will be used if not defined.\n # If there are scopes specified here, they will be verified against the registered scopes.\n # scope:\n # - petstore.r\n # - petstore.w\n # the following section defines uri and parameters for client credentials grant type\n client_credentials:\n # token endpoint for client credentials grant\n uri: ${client.tokenCcUri:/oauth2/token}\n # client_id for client credentials grant flow.\n client_id: ${client.tokenCcClientId:f7d42348-c647-4efb-a52d-4c5787421e72}\n # client_secret for client credentials grant flow.\n client_secret: ${client.tokenCcClientSecret:f6h1FTI8Q3-7UScPZDzfXA}\n # optional scope, default scope in the client registration will be used if not defined.\n # If there are scopes specified here, they will be verified against the registered scopes.\n # scope:\n # - petstore.r\n # - petstore.w\n refresh_token:\n # token endpoint for refresh token grant\n uri: ${client.tokenRtUri:/oauth2/token}\n # client_id for refresh token grant flow.\n client_id: ${client.tokenRtClientId:f7d42348-c647-4efb-a52d-4c5787421e72}\n # client_secret for refresh token grant flow\n client_secret: ${client.tokenRtClientSecret:f6h1FTI8Q3-7UScPZDzfXA}\n # optional scope, default scope in the client registration will be used if not defined.\n # If there are scopes specified here, they will be verified against the registered scopes.\n # scope:\n # - petstore.r\n # - petstore.w\n # light-oauth2 key distribution endpoint configuration for token verification\n key:\n # key distribution server url for token verification. It will be used if it is configured.\n # If it is not set, a service lookup will be taken with serviceId to find an instance.\n # server_url: ${client.tokenKeyServerUrl:https://localhost:6886}\n # For users who leverage SaaS OAuth 2.0 provider from lightapi.net or others in the public cloud\n # and has an internal proxy server to access code, token and key services of OAuth 2.0, set up the\n # proxyHost here for the HTTPS traffic. This option is only working with server_url and serviceId\n # below should be commented out. OAuth 2.0 services cannot be discovered if a proxy server is used.\n # proxyHost: ${client.tokenKeyProxyHost:proxy.lightapi.net}\n # We only support HTTPS traffic for the proxy and the default port is 443. If your proxy server has\n # a different port, please specify it here. If proxyHost is available and proxyPort is missing, then\n # the default value 443 is going to be used for the HTTP connection.\n # proxyPort: ${client.tokenKeyProxyPort:3128}\n # key serviceId for key distribution service, it will be used if above server_url is not configured.\n serviceId: ${client.tokenKeyServiceId:com.networknt.oauth2-key-1.0.0}\n # the path for the key distribution endpoint\n uri: ${client.tokenKeyUri:/oauth2/key}\n # client_id used to access key distribution service. It can be the same client_id with token service or not.\n client_id: ${client.tokenKeyClientId:f7d42348-c647-4efb-a52d-4c5787421e72}\n # client secret used to access the key distribution service.\n client_secret: ${client.tokenKeyClientSecret:f6h1FTI8Q3-7UScPZDzfXA}\n # set to true if the oauth2 provider supports HTTP/2\n enableHttp2: ${client.tokenKeyEnableHttp2:true}\n # sign endpoint configuration\n sign:\n # token server url. The default port number for token service is 6882. If this url exists, it will be used.\n # if it is not set, then a service lookup against serviceId will be taken to discover an instance.\n # server_url: ${client.signServerUrl:https://localhost:6882}\n # For users who leverage SaaS OAuth 2.0 provider from lightapi.net or others in the public cloud\n # and has an internal proxy server to access code, token and key services of OAuth 2.0, set up the\n # proxyHost here for the HTTPS traffic. This option is only working with server_url and serviceId\n # below should be commented out. OAuth 2.0 services cannot be discovered if a proxy server is used.\n # proxyHost: ${client.signProxyHost:proxy.lightapi.net}\n # We only support HTTPS traffic for the proxy and the default port is 443. If your proxy server has\n # a different port, please specify it here. If proxyHost is available and proxyPort is missing, then\n # the default value 443 is going to be used for the HTTP connection.\n # proxyPort: ${client.signProxyPort:3128}\n # token serviceId. If server_url doesn't exist, the serviceId will be used to lookup the token service.\n serviceId: ${client.signServiceId:com.networknt.oauth2-token-1.0.0}\n # signing endpoint for the sign request\n uri: ${client.signUri:/oauth2/token}\n # timeout in milliseconds\n timeout: ${client.signTimeout:2000}\n # set to true if the oauth2 provider supports HTTP/2\n enableHttp2: ${client.signEnableHttp2:true}\n # client_id for client authentication\n client_id: ${client.signClientId:f7d42348-c647-4efb-a52d-4c5787421e72}\n # client secret for client authentication and it can be encrypted here.\n client_secret: ${client.signClientSecret:f6h1FTI8Q3-7UScPZDzfXA}\n # the key distribution sever config for sign. It can be different then token key distribution server.\n key:\n # key distribution server url. It will be used to establish connection if it exists.\n # if it is not set, then a service lookup against serviceId will be taken to discover an instance.\n # server_url: ${client.signKeyServerUrl:https://localhost:6886}\n # For users who leverage SaaS OAuth 2.0 provider from lightapi.net or others in the public cloud\n # and has an internal proxy server to access code, token and key services of OAuth 2.0, set up the\n # proxyHost here for the HTTPS traffic. This option is only working with server_url and serviceId\n # below should be commented out. OAuth 2.0 services cannot be discovered if a proxy server is used.\n # proxyHost: ${client.signKeyProxyHost:proxy.lightapi.net}\n # We only support HTTPS traffic for the proxy and the default port is 443. If your proxy server has\n # a different port, please specify it here. If proxyHost is available and proxyPort is missing, then\n # the default value 443 is going to be used for the HTTP connection.\n # proxyPort: ${client.signKeyProxyPort:3128}\n # the unique service id for key distribution service, it will be used to lookup key service if above url doesn't exist.\n serviceId: ${client.signKeyServiceId:com.networknt.oauth2-key-1.0.0}\n # the path for the key distribution endpoint\n uri: ${client.signKeyUri:/oauth2/key}\n # client_id used to access key distribution service. It can be the same client_id with token service or not.\n client_id: ${client.signKeyClientId:f7d42348-c647-4efb-a52d-4c5787421e72}\n # client secret used to access the key distribution service.\n client_secret: ${client.signKeyClientSecret:f6h1FTI8Q3-7UScPZDzfXA}\n # set to true if the oauth2 provider supports HTTP/2\n enableHttp2: ${client.signKeyEnableHttp2:true}\n # de-ref by reference token to JWT token. It is separate service as it might be the external OAuth 2.0 provider.\n deref:\n # Token service server url, this might be different than the above token server url. The static url will be used if it is configured.\n # server_url: ${client.derefServerUrl:https://localhost:6882}\n # For users who leverage SaaS OAuth 2.0 provider in the public cloud and has an internal\n # proxy server to access code, token and key services of OAuth 2.0, set up the proxyHost\n # here for the HTTPS traffic. This option is only working with server_url and serviceId\n # below should be commented out. OAuth 2.0 services cannot be discovered if a proxy is used.\n # proxyHost: ${client.derefProxyHost:proxy.lightapi.net}\n # We only support HTTPS traffic for the proxy and the default port is 443. If your proxy server has\n # a different port, please specify it here. If proxyHost is available and proxyPort is missing, then\n # the default value 443 is going to be used for the HTTP connection.\n # proxyPort: ${client.derefProxyPort:3128}\n # token service unique id for OAuth 2.0 provider. Need for service lookup/discovery. It will be used if above server_url is not configured.\n serviceId: ${client.derefServiceId:com.networknt.oauth2-token-1.0.0}\n # set to true if the oauth2 provider supports HTTP/2\n enableHttp2: ${client.derefEnableHttp2:true}\n # the path for the key distribution endpoint\n uri: ${client.derefUri:/oauth2/deref}\n # client_id used to access key distribution service. It can be the same client_id with token service or not.\n client_id: ${client.derefClientId:f7d42348-c647-4efb-a52d-4c5787421e72}\n # client_secret for deref\n client_secret: ${client.derefClientSecret:f6h1FTI8Q3-7UScPZDzfXA}\n# circuit breaker configuration for the client\nrequest:\n # number of timeouts/errors to break the circuit\n errorThreshold: ${client.errorThreshold:2}\n # timeout in millisecond to indicate a client error.\n timeout: ${client.timeout:3000}\n # reset the circuit after this timeout in millisecond\n resetTimeout: ${client.resetTimeout:7000}\n # if open tracing is enable. traceability, correlation and metrics should not be in the chain if opentracing is used.\n injectOpenTracing: ${client.injectOpenTracing:false}\n # inject serviceId as callerId into the http header for metrics to collect the caller. The serviceId is from server.yml\n injectCallerId: ${client.injectCallerId:false}\n # the flag to indicate whether http/2 is enabled when calling client.callService()\n enableHttp2: ${client.enableHttp2:true}\n # the maximum host capacity of connection pool\n connectionPoolSize: ${client.connectionPoolSize:1000}\n # the maximum request limitation for each connection\n maxReqPerConn: ${client.maxReqPerConn:1000000}\n # maximum quantity of connection in connection pool for each host\n maxConnectionNumPerHost: ${client.maxConnectionNumPerHost:1000}\n # minimum quantity of connection in connection pool for each host. The corresponding connection number will shrink to minConnectionNumPerHost\n # by remove least recently used connections when the connection number of a host reach 0.75 * maxConnectionNumPerHost.\n minConnectionNumPerHost: ${client.minConnectionNumPerHost:250}\n";
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy