/
jboss-as-remoting_1_0.xsd
270 lines (237 loc) · 11.1 KB
/
jboss-as-remoting_1_0.xsd
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
<!--
~ JBoss, Home of Professional Open Source.
~ Copyright 2011, Red Hat, Inc., and individual contributors
~ as indicated by the @author tags. See the copyright.txt file in the
~ distribution for a full listing of individual contributors.
~
~ This is free software; you can redistribute it and/or modify it
~ under the terms of the GNU Lesser General Public License as
~ published by the Free Software Foundation; either version 2.1 of
~ the License, or (at your option) any later version.
~
~ This software is distributed in the hope that it will be useful,
~ but WITHOUT ANY WARRANTY; without even the implied warranty of
~ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
~ Lesser General Public License for more details.
~
~ You should have received a copy of the GNU Lesser General Public
~ License along with this software; if not, write to the Free
~ Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
~ 02110-1301 USA, or see the FSF site: http://www.fsf.org.
-->
<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
targetNamespace="urn:jboss:domain:remoting:1.0"
xmlns="urn:jboss:domain:remoting:1.0"
elementFormDefault="qualified"
attributeFormDefault="unqualified"
version="1.0">
<!-- The remoting subsystem root element -->
<xs:element name="subsystem" type="subsystem"/>
<xs:complexType name="subsystem">
<xs:annotation>
<xs:documentation>
<![CDATA[
The configuration of the Remoting subsystem.
The nested "connector" element(s) define connectors for this subsystem.
]]>
</xs:documentation>
</xs:annotation>
<xs:choice minOccurs="0" maxOccurs="unbounded">
<xs:element name="connector" type="connector"/>
</xs:choice>
</xs:complexType>
<xs:complexType name="connector">
<xs:annotation>
<xs:documentation>
<![CDATA[
The configuration of a Remoting connector.
The "name" attribute specifies the unique name of this connector.
The "socket-binding" attribute specifies the name (or names) of the socket binding(s) to attach to.
The optional nested "sasl" element contains the SASL authentication configuration for this connector.
The optional nested "authentication-provider" element contains the name of the authentication provider to
use for incoming connections.
]]>
</xs:documentation>
</xs:annotation>
<xs:all>
<!-- xs:element name="ssl-whatever??" type="ref" minOccurs="0" -->
<xs:element name="sasl" type="sasl" minOccurs="0"/>
<xs:element name="authentication-provider" type="ref" minOccurs="0"/>
<xs:element name="properties" type="properties" minOccurs="0"/>
</xs:all>
<xs:attribute name="socket-binding" type="name-list" use="required"/>
<xs:attribute name="name" type="xs:string" use="required"/>
</xs:complexType>
<xs:complexType name="sasl">
<xs:annotation>
<xs:documentation>
<![CDATA[
The configuration of the SASL authentication layer for this server.
The optional nested "include-mechanisms" element contains a whitelist of allowed SASL mechanism names.
No mechanisms will be allowed which are not present in this list.
The optional nested "qop" element contains a list of quality-of-protection values, in decreasing order
of preference.
The optional nested "strength" element contains a list of cipher strength values, in decreasing order
of preference.
The optional nested "reuse-session" boolean element specifies whether or not the server should attempt
to reuse previously authenticated session information. The mechanism may or may not support such reuse,
and other factors may also prevent it.
The optional nested "server-auth" boolean element specifies whether the server should authenticate to the
client. Not all mechanisms may support this setting.
The optional nested "policy" boolean element specifies a policy to use to narrow down the available set
of mechanisms.
]]>
</xs:documentation>
</xs:annotation>
<xs:all>
<xs:element name="include-mechanisms" type="name-listType" minOccurs="0"/>
<xs:element name="qop" type="qop-listType" minOccurs="0"/>
<xs:element name="strength" type="strength" minOccurs="0"/>
<xs:element name="reuse-session" type="boolean-element" minOccurs="0"/>
<xs:element name="server-auth" type="boolean-element" minOccurs="0"/>
<xs:element name="policy" type="policy" minOccurs="0"/>
<xs:element name="properties" type="properties" minOccurs="0"/>
</xs:all>
</xs:complexType>
<xs:complexType name="policy">
<xs:annotation>
<xs:documentation>
<![CDATA[
Policy criteria items to use in order to choose a SASL mechanism.
The optional nested "forward-secrecy" element contains a boolean value which specifies whether mechanisms
that implement forward secrecy between sessions are required. Forward secrecy means that breaking into
one session will not automatically provide information for breaking into future sessions.
The optional nested "no-active" element contains a boolean value which specifies whether mechanisms
susceptible to active (non-dictionary) attacks are not permitted. "false" to permit, "true" to deny.
The optional nested "no-anonymous" element contains a boolean value which specifies whether mechanisms
that accept anonymous login are permitted. "false" to permit, "true" to deny.
The optional nested "no-dictionary" element contains a boolean value which specifies whether mechanisms
susceptible to passive dictionary attacks are permitted. "false" to permit, "true" to deny.
The optional nested "no-plain-text" element contains a boolean value which specifies whether mechanisms
susceptible to simple plain passive attacks (e.g., "PLAIN") are not permitted. "false" to permit, "true" to deny.
The optional nested "pass-credentials" element contains a boolean value which specifies whether
mechanisms that pass client credentials are required.
]]>
</xs:documentation>
</xs:annotation>
<xs:all>
<xs:element name="forward-secrecy" type="boolean-element" minOccurs="0"/>
<xs:element name="no-active" type="boolean-element" minOccurs="0"/>
<xs:element name="no-anonymous" type="boolean-element" minOccurs="0"/>
<xs:element name="no-dictionary" type="boolean-element" minOccurs="0"/>
<xs:element name="no-plain-text" type="boolean-element" minOccurs="0"/>
<xs:element name="pass-credentials" type="boolean-element" minOccurs="0"/>
</xs:all>
</xs:complexType>
<xs:complexType name="boolean-element">
<xs:annotation>
<xs:documentation>
<![CDATA[
An element specifying a boolean value.
]]>
</xs:documentation>
</xs:annotation>
<xs:attribute name="value" type="xs:boolean" use="required"/>
</xs:complexType>
<xs:simpleType name="name-listType">
<xs:annotation>
<xs:documentation>
<![CDATA[
An element specifying a string list.
]]>
</xs:documentation>
</xs:annotation>
<xs:attribute name="value" type="name-list" use="required"/>
</xs:simpleType>
<xs:simpleType name="name-list">
<xs:annotation>
<xs:documentation>
<![CDATA[
A set of string items.
]]>
</xs:documentation>
</xs:annotation>
<xs:list itemType="xs:string"/>
</xs:simpleType>
<xs:complexType name="qop-listType">
<xs:annotation>
<xs:documentation>
<![CDATA[
An element specifying a qop list.
]]>
</xs:documentation>
</xs:annotation>
<xs:attribute name="value" type="qop-list" use="required"/>
</xs:complexType>
<xs:simpleType name="qop-list">
<xs:annotation>
<xs:documentation>
<![CDATA[
The SASL quality-of-protection value list. See http://download.oracle.com/docs/cd/E17409_01/javase/6/docs/api/javax/security/sasl/Sasl.html#QOP
for more information.
]]>
</xs:documentation>
</xs:annotation>
<xs:list>
<xs:simpleType>
<xs:restriction base="xs:token">
<xs:enumeration value="auth"/>
<xs:enumeration value="auth-int"/>
<xs:enumeration value="auth-conf"/>
</xs:restriction>
</xs:simpleType>
</xs:list>
</xs:simpleType>
<xs:simpleType name="strength">
<xs:annotation>
<xs:documentation>
<![CDATA[
The SASL strength value list. See http://download.oracle.com/docs/cd/E17409_01/javase/6/docs/api/javax/security/sasl/Sasl.html#STRENGTH
for more information.
]]>
</xs:documentation>
</xs:annotation>
<xs:list>
<xs:simpleType>
<xs:restriction base="xs:token">
<xs:enumeration value="low"/>
<xs:enumeration value="medium"/>
<xs:enumeration value="high"/>
</xs:restriction>
</xs:simpleType>
</xs:list>
</xs:simpleType>
<xs:complexType name="properties">
<xs:annotation>
<xs:documentation>
<![CDATA[
A set of free-form properties.
]]>
</xs:documentation>
</xs:annotation>
<xs:choice minOccurs="0" maxOccurs="unbounded">
<xs:element name="property" type="property"/>
</xs:choice>
</xs:complexType>
<xs:complexType name="property">
<xs:annotation>
<xs:documentation>
<![CDATA[
A free-form property. The name is required; the value is optional.
]]>
</xs:documentation>
</xs:annotation>
<xs:attribute name="name" type="xs:string" use="required"/>
<xs:attribute name="value" type="xs:string" use="optional"/>
</xs:complexType>
<xs:complexType name="ref">
<xs:annotation>
<xs:documentation>
<![CDATA[
A reference to another named service.
]]>
</xs:documentation>
</xs:annotation>
<xs:attribute name="name" type="xs:string" use="required"/>
</xs:complexType>
</xs:schema>