templates.graphql.securityYml Maven / Gradle / Ivy
package templates.graphql;
import java.io.IOException;
import com.fizzed.rocker.ForIterator;
import com.fizzed.rocker.RenderingException;
import com.fizzed.rocker.RockerContent;
import com.fizzed.rocker.RockerOutput;
import com.fizzed.rocker.runtime.DefaultRockerTemplate;
import com.fizzed.rocker.runtime.PlainTextUnloadedClassLoader;
/*
* Auto generated code to render template templates/graphql/securityYml.rocker.raw
* Do not edit this file. Changes will eventually be overwritten by Rocker parser!
*/
@SuppressWarnings("unused")
public class securityYml extends com.fizzed.rocker.runtime.DefaultRockerModel {
static public com.fizzed.rocker.ContentType getContentType() { return com.fizzed.rocker.ContentType.RAW; }
static public String getTemplateName() { return "securityYml.rocker.raw"; }
static public String getTemplatePackageName() { return "templates.graphql"; }
static public String getHeaderHash() { return "2508083"; }
static public long getModifiedAt() { return 1645995245871L; }
static public String[] getArgumentNames() { return new String[] { }; }
static public securityYml template() {
return new securityYml();
}
@Override
protected DefaultRockerTemplate buildTemplate() throws RenderingException {
// optimized for convenience (runtime auto reloading enabled if rocker.reloading=true)
return com.fizzed.rocker.runtime.RockerRuntime.getInstance().getBootstrap().template(this.getClass(), this);
}
static public class Template extends com.fizzed.rocker.runtime.DefaultRockerTemplate {
// # Security configuration for graphql-security in light-graphql-4j. It is a specific config\n# for GraphQL framework security. It is introduced to support multiple frameworks in the\n# same server instance. If this file cannot be found, the generic security.yml will be\n# loaded for backward compatibility.\n---\n# Enable JWT verification flag.\nenableVerifyJwt: false\n\n# Enable JWT scope verification. Only valid when enableVerifyJwt is true.\nenableVerifyScope: true\n\n# User for test only. s...
static private final byte[] PLAIN_TEXT_0_0;
static {
PlainTextUnloadedClassLoader loader = PlainTextUnloadedClassLoader.tryLoad(securityYml.class.getClassLoader(), securityYml.class.getName() + "$PlainText", "UTF-8");
PLAIN_TEXT_0_0 = loader.tryGet("PLAIN_TEXT_0_0");
}
public Template(securityYml model) {
super(model);
__internal.setCharset("UTF-8");
__internal.setContentType(getContentType());
__internal.setTemplateName(getTemplateName());
__internal.setTemplatePackageName(getTemplatePackageName());
}
@Override
protected void __doRender() throws IOException, RenderingException {
// PlainText @ [1:1]
__internal.aboutToExecutePosInTemplate(1, 1);
__internal.writeValue(PLAIN_TEXT_0_0);
}
}
private static class PlainText {
static private final String PLAIN_TEXT_0_0 = "# Security configuration for graphql-security in light-graphql-4j. It is a specific config\n# for GraphQL framework security. It is introduced to support multiple frameworks in the\n# same server instance. If this file cannot be found, the generic security.yml will be\n# loaded for backward compatibility.\n---\n# Enable JWT verification flag.\nenableVerifyJwt: false\n\n# Enable JWT scope verification. Only valid when enableVerifyJwt is true.\nenableVerifyScope: true\n\n# User for test only. should be always be false on official environment.\nenableMockJwt: false\n\n# JWT signature public certificates. kid and certificate path mappings.\njwt:\n certificate:\n '100': primary.crt\n '101': secondary.crt\n clockSkewInSeconds: 60\n # Key distribution server standard: JsonWebKeySet for other OAuth 2.0 provider| X509Certificate for light-oauth2\n keyResolver: X509Certificate\n\n# Enable or disable JWT token logging\nlogJwtToken: true\n\n# Enable or disable client_id, user_id and scope logging.\nlogClientUserScope: false\n\n# Enable JWT token cache to speed up verification. This will only verify expired time\n# and skip the signature verification as it takes more CPU power and long time.\nenableJwtCache: true\n\n# If you are using light-oauth2, then you don't need to have oauth subfolder for public\n# key certificate to verify JWT token, the key will be retrieved from key endpoint once\n# the first token is arrived. Default to false for dev environment without oauth2 server\n# or official environment that use other OAuth 2.0 providers.\nbootstrapFromKeyService: false\n";
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy