diff options
author | Jack Magne <jmagne@dhcp-32-224.sjc.redhat.com> | 2012-09-10 15:07:51 -0700 |
---|---|---|
committer | Jack Magne <jmagne@dhcp-32-224.sjc.redhat.com> | 2012-09-10 15:10:36 -0700 |
commit | f5e601fccf3f846afe2b26131db9e30c1782a30c (patch) | |
tree | de7d746461ca265c9979c7a2f9316dd7a10a5bca | |
parent | 5dff3de4434aad7cce8ccfe79c061e60f1e71a05 (diff) | |
download | pki-f5e601fccf3f846afe2b26131db9e30c1782a30c.tar.gz pki-f5e601fccf3f846afe2b26131db9e30c1782a30c.tar.xz pki-f5e601fccf3f846afe2b26131db9e30c1782a30c.zip |
Bugzilla Bug# 852855 - rhcs81 - remove unexpected anonymous binds to internal db in cert status thread.
-rw-r--r-- | base/common/src/com/netscape/cmscore/apps/CMSEngine.java | 36 |
1 files changed, 19 insertions, 17 deletions
diff --git a/base/common/src/com/netscape/cmscore/apps/CMSEngine.java b/base/common/src/com/netscape/cmscore/apps/CMSEngine.java index e5eac3b93..132de912f 100644 --- a/base/common/src/com/netscape/cmscore/apps/CMSEngine.java +++ b/base/common/src/com/netscape/cmscore/apps/CMSEngine.java @@ -342,28 +342,11 @@ public class CMSEngine implements ICMSEngine { mOwner = owner; mConfig = config; int state = mConfig.getInteger("cs.state"); - String sd = mConfig.getString("securitydomain.select", ""); // my default is 1 day String flush_timeout = config.getString("securitydomain.flushinterval", "86400000"); String secdomain_source = config.getString("securitydomain.source", "memory"); String secdomain_check_interval = config.getString("securitydomain.checkinterval", "5000"); - if ((state == 1) && (!sd.equals("existing"))) { - // check session domain table only if this is a - // configured security domain host - - if (secdomain_source.equals("ldap")) { - mSecurityDomainSessionTable = new LDAPSecurityDomainSessionTable((new Long(flush_timeout)).longValue()); - } else { - mSecurityDomainSessionTable = new SecurityDomainSessionTable((new Long(flush_timeout)).longValue()); - } - - mSDTimer = new Timer(); - SessionTimer timertask = new SessionTimer(mSecurityDomainSessionTable); - - mSDTimer.schedule(timertask, 5, (new Long(secdomain_check_interval)).longValue()); - } - String tsClass = config.getString("timeSourceClass", null); if (tsClass != null) { @@ -413,6 +396,25 @@ public class CMSEngine implements ICMSEngine { } parseServerXML(); fixProxyPorts(); + + String sd = mConfig.getString("securitydomain.select", ""); + + if ((state == 1) && (!sd.equals("existing"))) { + // check session domain table only if this is a + // configured security domain host + + if (secdomain_source.equals("ldap")) { + mSecurityDomainSessionTable = new LDAPSecurityDomainSessionTable((new Long(flush_timeout)).longValue()); + } else { + mSecurityDomainSessionTable = new SecurityDomainSessionTable((new Long(flush_timeout)).longValue()); + } + + mSDTimer = new Timer(); + SessionTimer timertask = new SessionTimer(mSecurityDomainSessionTable); + + mSDTimer.schedule(timertask, 5, (new Long(secdomain_check_interval)).longValue()); + } + } /** |