diff options
author | Jack Magne <jmagne@dhcp-32-224.sjc.redhat.com> | 2012-09-10 15:07:51 -0700 |
---|---|---|
committer | Jack Magne <jmagne@dhcp-32-224.sjc.redhat.com> | 2012-09-10 15:07:51 -0700 |
commit | 0004a346e5ecc42ebc0ad309e2114fc3bfce6945 (patch) | |
tree | 2643679e8c78949197464e8c5517e51d78fd7729 /base/common/src/com | |
parent | 06cf1d1c56089b3de9802c6bd4219d31908907ed (diff) | |
download | pki-0004a346e5ecc42ebc0ad309e2114fc3bfce6945.tar.gz pki-0004a346e5ecc42ebc0ad309e2114fc3bfce6945.tar.xz pki-0004a346e5ecc42ebc0ad309e2114fc3bfce6945.zip |
Bugzilla Bug# 852855 - rhcs81 - remove unexpected anonymous binds to internal db in cert status thread.
Diffstat (limited to 'base/common/src/com')
-rw-r--r-- | base/common/src/com/netscape/cmscore/apps/CMSEngine.java | 36 |
1 files changed, 19 insertions, 17 deletions
diff --git a/base/common/src/com/netscape/cmscore/apps/CMSEngine.java b/base/common/src/com/netscape/cmscore/apps/CMSEngine.java index da6b8ee7a..b29c1e731 100644 --- a/base/common/src/com/netscape/cmscore/apps/CMSEngine.java +++ b/base/common/src/com/netscape/cmscore/apps/CMSEngine.java @@ -255,28 +255,11 @@ public class CMSEngine implements ICMSEngine { mOwner = owner; mConfig = config; int state = mConfig.getInteger("cs.state"); - String sd = mConfig.getString("securitydomain.select", ""); // my default is 1 day String flush_timeout = config.getString("securitydomain.flushinterval", "86400000"); String secdomain_source = config.getString("securitydomain.source", "memory"); String secdomain_check_interval = config.getString("securitydomain.checkinterval", "5000"); - if ((state == 1) && (!sd.equals("existing"))) { - // check session domain table only if this is a - // configured security domain host - - if (secdomain_source.equals("ldap")) { - mSecurityDomainSessionTable = new LDAPSecurityDomainSessionTable((new Long(flush_timeout)).longValue()); - } else { - mSecurityDomainSessionTable = new SecurityDomainSessionTable((new Long(flush_timeout)).longValue()); - } - - mSDTimer = new Timer(); - SessionTimer timertask = new SessionTimer(mSecurityDomainSessionTable); - - mSDTimer.schedule(timertask, 5, (new Long(secdomain_check_interval)).longValue()); - } - String tsClass = config.getString("timeSourceClass", null); if (tsClass != null) { @@ -325,6 +308,25 @@ public class CMSEngine implements ICMSEngine { } parseServerXML(); fixProxyPorts(); + + String sd = mConfig.getString("securitydomain.select", ""); + + if ((state == 1) && (!sd.equals("existing"))) { + // check session domain table only if this is a + // configured security domain host + + if (secdomain_source.equals("ldap")) { + mSecurityDomainSessionTable = new LDAPSecurityDomainSessionTable((new Long(flush_timeout)).longValue()); + } else { + mSecurityDomainSessionTable = new SecurityDomainSessionTable((new Long(flush_timeout)).longValue()); + } + + mSDTimer = new Timer(); + SessionTimer timertask = new SessionTimer(mSecurityDomainSessionTable); + + mSDTimer.schedule(timertask, 5, (new Long(secdomain_check_interval)).longValue()); + } + } /** |