jboss-app_4_0.dtd 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145
  1. <?xml version='1.0' encoding='UTF-8' ?>
  2. <!-- The JBoss 4.x specific elements for ears.
  3. $Id: jboss-app_4_0.dtd 60563 2007-02-15 11:11:32Z dimitris@jboss.org $
  4. DOCTYPE jboss-app
  5. PUBLIC "-//JBoss//DTD J2EE Application 1.4//EN"
  6. "http://www.jboss.org/j2ee/dtd/jboss-app_4_0.dtd"
  7. -->
  8. <!-- The jboss-app element is the root element.
  9. -->
  10. <!ELEMENT jboss-app (module-order?,security-domain?, unauthenticated-principal?,
  11. loader-repository?, jmx-name?, module*, security-role*)>
  12. <!--
  13. The value of the module-order could be implicit or strict
  14. <module-order>strict</module-order>
  15. or
  16. <module-order>implicit</module-order>
  17. The strict value indicates that the deployments of the modules will
  18. be done in the order that would be specified in the application.xml
  19. and jboss-app.xml file .
  20. The implicit value indicates the deployment would follow the order
  21. which would be specified in the DeploymentSorter.
  22. The default order will be implicit to support backward compatibility
  23. -->
  24. <!ELEMENT module-order (#PCDATA)>
  25. <!--
  26. The security-domain element specifies the JNDI name of the security
  27. manager that implements the EJBSecurityManager and RealmMapping for
  28. the domain. When specified at the jboss level it specifies the security
  29. domain for all j2ee components in the deployment unit.
  30. One can override the global security-domain at the container
  31. level using the security-domain element at the container-configuration
  32. level.
  33. Used in: jboss-app
  34. -->
  35. <!ELEMENT security-domain (#PCDATA)>
  36. <!--
  37. The unauthenticated-principal element specifies the name of the principal
  38. that will be returned by the EJBContext.getCallerPrincipal() method if there
  39. is no authenticated user. This Principal has no roles or privaledges to call
  40. any other beans.
  41. -->
  42. <!ELEMENT unauthenticated-principal (#PCDATA)>
  43. <!-- The loader-repository specifies the name of the UnifiedLoaderRepository
  44. MBean to use for the ear to provide ear level scoping of classes deployed
  45. in the ear. It is a unique JMX ObjectName string. It may also specify
  46. an arbitrary configuration by including a loader-repository-config element.
  47. Examples:
  48. <loader-repository>jboss.test:loader=cts-cmp2v1-sar.ear</loader-repository>
  49. <loader-repository loaderRepositoryClass='dot.com.LoaderRepository'>
  50. dot.com:loader=unique-archive-name
  51. <loader-repository-config configParserClass='dot.com.LoaderParser'>
  52. java2ParentDelegaton=true
  53. </loader-repository-config>
  54. </loader-repository>
  55. -->
  56. <!ELEMENT loader-repository (#PCDATA | loader-repository-config)*>
  57. <!-- The loaderRepositoryClass attribute gives the classname of the
  58. org.jboss.mx.loading.LoaderRepository implementation.
  59. -->
  60. <!ATTLIST loader-repository loaderRepositoryClass CDATA #IMPLIED>
  61. <!-- The loader-repository-config element specifies any arbitrary configuration
  62. fragment for use in configuring the loader-repository instance. The actual
  63. content of this element is specific to the loaderRepositoryClass and the
  64. code parsing the element.
  65. -->
  66. <!ELEMENT loader-repository-config (#PCDATA)>
  67. <!-- The configParserClass attribute gives the classname of the
  68. org.jboss.mx.loading.LoaderRepositoryFactory.LoaderRepositoryConfigParser
  69. implementation to use to parse the loader-repository-config content.
  70. -->
  71. <!ATTLIST loader-repository-config configParserClass CDATA #IMPLIED>
  72. <!-- The jmx-name element allows one to specify the JMX ObjectName to use
  73. for the MBean associated with the ejb-jar module. This must be a unique
  74. name and valid JMX ObjectName string.
  75. Used in: jboss-app
  76. -->
  77. <!ELEMENT jmx-name (#PCDATA)>
  78. <!-- The module element is used to specify a jboss specific module archive.
  79. -->
  80. <!ELEMENT module (service | har)>
  81. <!-- Allow the module to have a unique id -->
  82. <!ATTLIST module id ID #IMPLIED>
  83. <!-- The service element specifies a service archive (SAR) to deploy.
  84. Example:
  85. <module>
  86. <service>external.sar</service>
  87. </module>
  88. -->
  89. <!ELEMENT service (#PCDATA)>
  90. <!-- The har element specifies a Hibernate archive (HAR) to deploy.
  91. Example:
  92. <module>
  93. <har>myapp.har</har>
  94. </module>
  95. -->
  96. <!ELEMENT har (#PCDATA)>
  97. <!--
  98. The security-role element contains the definition of a security role.
  99. The definition consists of an the security role name and principal name element(s).
  100. Used in: jboss-app
  101. Example:
  102. <security-role>
  103. <role-name>Manager</role-name>
  104. <principal-name>j2ee</principal-name>
  105. <principal-name>javajoe</principal-name>
  106. </security-role>
  107. -->
  108. <!ELEMENT security-role (role-name, principal-name+)>
  109. <!--
  110. The role-name element is the name of the role.
  111. Used in: security-role
  112. -->
  113. <!ELEMENT role-name (#PCDATA)>
  114. <!--
  115. The principal-name element is the name of the principal that is mapped
  116. to the assembly role-name.
  117. Used in: security-role
  118. -->
  119. <!ELEMENT principal-name (#PCDATA)>