/usr/include/tao/Policy_Validator.h is in libtao-dev 6.0.1-3.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 | // -*- C++ -*-
//=============================================================================
/**
* @file Policy_Validator.h
*
* $Id: Policy_Validator.h 84840 2009-03-16 15:11:55Z johnnyw $
*
* This file contains the declaration for the POA policy validator
* interface.
*
* @author Angelo Corsaro <corsaro@cs.wustl.edu>
* @author Frank Hunleth <fhuntleth@cs.wustl.edu>
*/
//=============================================================================
#ifndef TAO_POLICY_VALIDATOR_H
#define TAO_POLICY_VALIDATOR_H
#include /**/ "ace/pre.h"
#include "tao/Basic_Types.h"
#if !defined (ACE_LACKS_PRAGMA_ONCE)
# pragma once
#endif /* ACE_LACKS_PRAGMA_ONCE */
#include /**/ "tao/TAO_Export.h"
TAO_BEGIN_VERSIONED_NAMESPACE_DECL
// Forward declarations.
class TAO_Policy_Set;
class TAO_ORB_Core;
namespace CORBA
{
typedef ULong PolicyType;
}
/**
* @class TAO_Policy_Validator
*
* @brief An abstract class for plugging in different Policy Validator
* mechanisms.
*
* This class was moved from the PortableServer library. The Portable
* Serever library used this abstraction to add policy validators to
* for the policies in the POA. This class seems so much useful for
* passing policy information between different loaded libraries.
*/
class TAO_Export TAO_Policy_Validator
{
public:
/// Constructor.
TAO_Policy_Validator (TAO_ORB_Core &orb_core);
/// Destructor.
virtual ~TAO_Policy_Validator (void);
/**
* Validate that the policies in the specified set
* are consistent and legal. Throw an appropriate exception
* if that is not the case.
*/
void validate (TAO_Policy_Set &policies);
/**
* Add/merge policies.
**/
void merge_policies (TAO_Policy_Set &policies);
/**
* Return whether the specified policy type is legal for the
* current configuration. This is needed since the user can
* potentially specify policies that are unknown to an
* validate () routine, and these need to be caught.
*/
CORBA::Boolean legal_policy (CORBA::PolicyType type);
/**
* Adds a validator to the "chain of validators". The <code>
* TAO_POA_Policy_Validator </code> implements something that looks
* like a chain of responsability in which different member of the
* chain have the responsability of validating a given set of
* policies.
*/
void add_validator (TAO_Policy_Validator *validator);
/**
* Accessor for the stored ORB core reference
*/
TAO_ORB_Core & orb_core() const;
protected:
virtual void validate_impl (TAO_Policy_Set &policies) = 0;
virtual void merge_policies_impl (TAO_Policy_Set &policies) = 0;
virtual CORBA::Boolean legal_policy_impl (CORBA::PolicyType type) = 0;
TAO_ORB_Core &orb_core_;
private:
void operator= (const TAO_Policy_Validator &);
TAO_Policy_Validator (const TAO_Policy_Validator &);
private:
TAO_Policy_Validator *next_;
};
TAO_END_VERSIONED_NAMESPACE_DECL
#include /**/ "ace/post.h"
#endif /* TAO_POLICY_VALIDATOR_H */
|