开发工具:
文件大小: 5mb
下载次数: 0
上传时间: 2009-04-08
详细说明: Mule的很不错的资料。虽然还是Draft,但还是符合in Action系列的风格与质量,不但有概念与操作层面的阐述,而且案例不少,很多是值得参考的。 目录如下: I. Core Mule ........................................................... 1 1. Discovering Mule .................................................... 2 1.1. ESB, the EAI workhorse ............................................ 3 1.2. A workhorse named Mule ............................................ 5 1.2.1. History ......................................................... 5 1.2.2. Competition ............................................... ...... 6 1.3. Mule's anatomy .................................................... 7 1.3.1. Model ........................................................... 8 1.3.2. Service ......................................................... 8 1.3.3. Transports ...................................................... 9 1.3.4. Routers ......................................................... 10 1.3.5. Components ...................................................... 11 1.3.6. Request processing .............................................. 12 1.4. Mule on your machine .............................................. 14 1.5. Summary ........................................................... 15 2. Configuring Mule .................................................... 16 2.1. First rides ....................................................... 17 2.1.1. Echo World in Spring XML ........................................ 17 2.1.2. Echo World in Groovy ............................................ 20 2.2. The Spring XML configuration ...................................... 22 2.2.1. XML element families ............................................ 23 2.2.2. Configured values ............................................... 26 2.2.3. Schemas location ................................................ 28 2.3. Configuration modularity .......................................... 30 2.3.1. Independent configurations ...................................... 30 2.3.2. Inherited configurations ........................................ 31 2.3.3. Imported configurations ......................................... 32 2.3.4. Heterogeneous configurations .................................... 32 2.4. Summary ........................................................... 33 3. Sending and Receiving Data with Mule ................................ 35 3.1. Understanding Connectors and Endpoints ............................ 35 3.1.1. Configuring Connectors .......................................... 36 3.1.2. Configuring Endpoints ........................................... 38 3.2. Working with Files and Directories using the File Transport ....... 41 3.2.1. Reading and Writing Files with File Endpoints ................... 42 3.2.2. Using Filters on Inbound File Endpoints ......................... 43 3.2.3. Using STDIO Endpoints ........................................... 44 3.3. Using Email ....................................................... 45 3.3.1. Receiving Email with the IMAP Transport ......................... 45 3.3.2. Sending Mail Using the SMTP Transport ........................... 48 3.4. Using Web Services ................................................ 49 3.4.1. Consuming and Exposing SOAP Services with the CXF Transport ..... 50 3.4.2. Sending and Receiving Data Using the HTTP Transport ............. 55 3.5. Using the JMS Transport for Asynchronous Messaging ................ 58 3.5.1. Sending JMS Messages with the JMS Outbound Endpoint ............. 60 3.5.2. Receiving JMS Messages with the JMS Inbound Endpoint ............ 61 3.5.3. Using Selector Filters on JMS Endpoints ......................... 62 3.5.4. Using remoteSync for Synchronous JMS ............................ 63 3.6. Receiving and Sending Files Using the FTP Transport ............... 64 3.6.1. Receiving Files with Inbound FTP Endpoints ...................... 65 3.6.2. Sending Files with Outbound FTP Endpoints ....................... 66 3.7. Working with Databases ............................................ 66 3.7.1. Using a JDBC Inbound Endpoint to Perform Queries ................ 67 3.7.2. Using a JDBC Outbound Endpoint to Perform Insertions ............ 69 3.8. Accessing EJB's ................................................... 70 3.8.1. Invoking EJB Methods Using an Outbound Endpoint ................. 70 3.9. Using the XMPP Transport .......................................... 71 3.9.1. Sending Jabber Messages on an Outbound Endpoint ................. 72 3.9.2. Receiving Jabber Messages on an Inbound Endpoint ................ 73 3.10. The VM Transport ................................................. 73 3.10.1. Sending and Receiving Messages on VM Endpoints ................. 74 3.10.2. Using Persistent Queues on VM Endpoints ........................ 75 3.11. Summary .......................................................... 76 4. Routing Data with Mule .............................................. 78 4.1. Working with Routers .............................................. 79 4.1.1. Inbound Routers ................................................. 79 4.1.2. Outbound Routers ................................................ 80 4.2. Using Filters with Routers ........................................ 81 4.2.1. Filtering by Type ............................................... 82 4.2.2. Filtering by Textual Content .................................... 82 4.2.3. Filtering with Expressions ...................................... 82 4.2.4. Logical Filtering ............................................... 84 4.3. Using Inbound Routers ............................................. 85 4.3.1. Being Picky with the Selective Consumer Router .................. 85 4.3.2. Altering Message Flow with the Forwarding Consumer Router ....... 86 4.3.3. Collecting Data with the Collection Aggregator .................. 87 4.3.4. Insuring Atomic Delivery with the Idempotent Receiever .......... 90 4.3.5. Snooping Messages with the Wire Tap Router ...................... 92 4.4. Outbound Routing .................................................. 93 4.4.1. Being Picky with the Filtering Router ........................... 94 4.4.2. Sending to Multiple Endpoints with the Static Recipient List .... 95 4.4.3. Broadcasting Messages with the Multicasting Router .............. 96 4.4.4. Service Composition with the Chaining Router .................... 97 4.4.5. Chopping Up Messages with the Message Splitter .................. 98 4.4.6. Using Asynchronous Reply Routers ................................ 100 4.5. Summary ........................................................... 103 5. Transforming data with Mule ......................................... 105 5.1. Working with transformers ......................................... 105 5.2. Configuring transformers .......................................... 108 5.3. Using core transformers ........................................... 110 5.3.1. Dealing with bytes .............................................. 111 5.3.2. Compressing data ................................................ 113 5.3.3. Modifying properties ............................................ 114 5.3.4. Leveraging expression evaluators ................................ 115 5.4. Using XML transformers ............................................ 116 5.4.1. Transforming format with XSL .................................... 117 5.4.2. XML object marshalling .......................................... 118 5.5. Using JMS transformers ............................................ 119 5.5.1. Producing JMS messages .......................................... 120 5.5.2. Consuming JMS messages .......................................... 121 5.6. Existing transformers in action ................................... 121 5.7. Writing custom transformers ....................................... 124 5.7.1. Transforming payloads ........................................... 125 5.7.2. Transforming messages ........................................... 128 5.8. Summary ........................................................... 132 6. Working with Components ............................................. 133 6.1. Massaging messages ................................................ 135 6.1.1. Building bridges ................................................ 135 6.1.2. Echoing data .................................................... 136 6.1.3. Logging data .................................................... 138 6.1.4. Building messages ............................................... 139 6.2. Invoking remote logic ............................................. 142 6.2.1. Feeling good with SOAP .......................................... 143 6.2.2. Taking some REST ................................................ 144 6.3. Executing business logic .......................................... 146 6.3.1. Resolving the entry point ....................................... 147 6.3.2. Configuring the component ....................................... 151 6.3.3. Handling workload with a pool ................................... 153 6.3.4. Reaching out .................................................... 155 6.4. Summary ........................................................... 158 II. Running Mule ....................................................... 159 7. Deploying Mule ...................................................... 160 7.1. Deployment strategies ............................................. 160 7.1.1. Standalone server ............................................... 161 7.1.2. Netboot server .................................................. 163 7.1.3. Embedded in a Java application .................................. 165 7.1.4. Embedded in a Web application ................................... 167 7.1.5. Embedded in a JCA Resource ...................................... 169 7.2. Deployment topologies ............................................. 171 7.2.1. Satisfying functional needs ..................................... 172 7.2.2. Dealing with the network ........................................ 174 7.2.3. Designing for high-availability ................................. 178 7.2.4. Shooting for fault tolerance .................................... 181 7.3. Deployment management ............................................. 183 7.3.1. Using development tools ......................................... 183 7.3.2. Hitchhiking Galaxy .............................................. 184 7.4. Summary ........................................................... 187 8. Exception Handling and Logging ...................................... 188 8.1. Exception Strategies .............................................. 188 8.1.1. Using the Default Exception Strategies .......................... 188 8.1.2. Exceptions and Routing .......................................... 193 8.2. Using Retry Policies .............................................. 199 8.2.1. Implementing a Retry Policy ..................................... 199 8.2.2. Using the SimpleRetryPolicy with JMS ............................ 200 8.2.3. Starting Mule with Failed Connectors ............................ 201 8.3. Logging with Mule ................................................. 202 8.3.1. Using Log4J with Mule ........................................... 203 8.3.2. Using Different Loggers with SL4J ............................... 204 8.3.3. Using Apache Chainsaw with Log4J ................................ 205 8.4. Summary ........................................................... 208 9. Securing Mule ....................................................... 209 9.1. Demonstrating Mule Security ....................................... 209 9.2. Using Security Managers and Understanding Security Providers ...... 212 9.2.1. Using Spring-Security ........................................... 212 9.2.2. Using JAAS ...................................................... 216 9.3. Securing Endpoints with Security Filters .......................... 217 9.3.1. Securing an HTTP Endpoint with Spring-Security .................. 217 9.3.2. Performing JMS Header Authentication with JAAS .................. 219 9.3.3. Using Password Based Encryption ................................. 222 9.3.4. Decrypting Message Payloads with the PGPSecurityFilter .......... 223 9.4. Deploying Mule Security ........................................... 226 9.4.1. Using Mule Security in ESB Deployments .......................... 226 9.4.2. Simplifying Account Provisioning with Mule ...................... 228 9.5. Summary ........................................................... 229 10. Using Transactions with Mule ....................................... 230 10.1. Using Transactions With a Single Resource ........................ 231 10.1.1. Using JDBC Endpoints Transactionally ........................... 231 10.1.2. Using JMS Endpoints Transactionally ............................ 234 10.2. Using Multiple Resource Transactions ............................. 239 10.2.1. Spanning Multiple Resources with JBossTS ....................... 240 10.2.2. Using XA Transactions in a Container ........................... 242 10.3. Managing Transactions with Exception Strategies .................. 244 10.3.1. Handling Component Exceptions .................................. 244 10.3.2. Committing Transactions with an Exception Strategy ............. 245 10.4. Summary .......................................................... 246 11. Monitoring with Mule ............................................... 247 11.1. Checking health .................................................. 247 11.1.1. At network level ............................................... 248 11.1.2. At system and JVM levels ....................................... 249 11.1.3. At JVM and Mule levels ......................................... 251 11.2. Tracking activity ................................................ 258 11.2.1. Using log files ................................................ 258 11.2.2. Using notifications ............................................ 261 11.2.3. Periodic data monitoring ....................................... 263 11.3. Building dashboards .............................................. 265 11.4. Summary .......................................................... 268 III. Traveling further with Mule ....................................... 269 12. Developing with Mule ............................................... 270 13. Using the Mule API ................................................. 271 13.1. Piggybacking the Mule client ..................................... 271 13.1.1. Reaching a local Mule .......................................... 272 13.1.2. Reaching a remote Mule ......................................... 273 13.1.3. Reaching out with transports ................................... 276 13.2. Exploring the Mule context ....................................... 278 13.3. Digging the Mule event context ................................... 282 13.3.1. Prospecting messages ........................................... 282 13.3.2. Influencing message processing ................................. 284 13.4. Keeping abreast with Mule ........................................ 287 13.4.1. Leveraging life cycle events ................................... 287 13.4.2. Intercepting messages .......................................... 290 13.4.3. Receiving notifications ........................................ 293 13.5. Summary .......................................................... 296 14. Using Dynamic Languages with Mule .................................. 297 15. Business Process Management and Scheduling With Mule ............... 298 15.1. Orchestrating Services with Mule ................................. 298 15.1.1. Introducing jBPM ............................................... 301 15.1.2. Using jBPM with Mule ........................................... 304 15.1.3. Interacting with a BPEL Engine ................................. 310 15.2. Job Scheduling with Mule ......................................... 312 15.2.1. Using Quartz to Schedule Jobs .................................. 312 15.2.2. Polling Endpoints .............................................. 314 15.2.3. Dispatching Jobs ............................................... 316 15.3. Summary .......................................................... 317 16. Tuning Mule ........................................................ 318 16.1. Understanding thread pools ....................................... 318 16.1.1. Synchronicity aspects .......................................... 321 16.1.2. Transport peculiarities ........................................ 324 16.1.3. Configuration options .......................................... 327 16.2. Increasing performances .......................................... 329 16.2.1. Profiler-based investigation ................................... 329 16.2.2. Performance advices ............................................ 332 16.3. Summary .......................................................... 334 A. Mule XML core schema elements ....................................... 335 A.1. Schema references ................................................. 335 A.2. Spring root elements .............................................. 336 A.3. Global properties ................................................. 338 A.4. System configuration .............................................. 338 A.5. Notifications ..................................................... 338 A.6. Extensions ........................................................ 339 A.7. Security managers ................................................. 339 A.8. Transaction managers .............................................. 340 A.9. Connectors ........................................................ 340 A.10. Global transformers .............................................. 340 A.11. Global endpoints ................................................. 340 A.12. Global filters ................................................... 341 A.13. Models ........................................................... 341 B. The expression evaluation framework ................................. 343 C. The community of Mule ............................................... 347 Index .................................................................. 349 ...展开收缩
(系统自动生成,下载前可以参看下载内容)
下载文件列表
相关说明
- 本站资源为会员上传分享交流与学习,如有侵犯您的权益,请联系我们删除.
- 本站是交换下载平台,提供交流渠道,下载内容来自于网络,除下载问题外,其它问题请自行百度。
- 本站已设置防盗链,请勿用迅雷、QQ旋风等多线程下载软件下载资源,下载后用WinRAR最新版进行解压.
- 如果您发现内容无法下载,请稍后再次尝试;或者到消费记录里找到下载记录反馈给我们.
- 下载后发现下载的内容跟说明不相乎,请到消费记录里找到下载记录反馈给我们,经确认后退回积分.
- 如下载前有疑问,可以通过点击"提供者"的名字,查看对方的联系方式,联系对方咨询.