Class ExportRowsCommand
java.lang.Object
com.google.refine.commands.Command
com.google.refine.commands.project.ExportRowsCommand
-
Nested Class Summary
Nested classes/interfaces inherited from class com.google.refine.commands.Command
Command.HistoryEntryResponse, Command.IllegalJsonpException -
Field Summary
Fields inherited from class com.google.refine.commands.Command
csrfFactory, servlet -
Constructor Summary
Constructors -
Method Summary
Modifier and TypeMethodDescriptionvoiddoPost(javax.servlet.http.HttpServletRequest request, javax.servlet.http.HttpServletResponse response) static PropertiesgetRequestParameters(javax.servlet.http.HttpServletRequest request) Deprecated.Methods inherited from class com.google.refine.commands.Command
checkJSONP, doDelete, doGet, doHead, doPut, getEngine, getEngineConfig, getIntegerParameter, getParameters, getProject, getProjectMetadata, hasValidCSRFToken, hasValidCSRFTokenAsGET, init, logRequests, performProcessAndRespond, redirect, respond, respond, respondCodeError, respondCodeError, respondCodeError, respondCodePending, respondCSRFError, respondException, respondJSON, respondJSON, respondNoJsonpException, respondOkDone, respondStatus, respondStatusError, respondStatusErrors, respondStatusOk, respondStatusOk, respondWithErrorPage
-
Constructor Details
-
ExportRowsCommand
public ExportRowsCommand()
-
-
Method Details
-
getRequestParameters
@Deprecated(since="3.9") public static Properties getRequestParameters(javax.servlet.http.HttpServletRequest request) Deprecated.This command uses POST but is left CSRF-unprotected as it does not incur a state change. TODO: add CSRF protection anyway, as it does not cost much and could still have prevented an XSS vulnerability -
doPost
public void doPost(javax.servlet.http.HttpServletRequest request, javax.servlet.http.HttpServletResponse response) throws javax.servlet.ServletException, IOException - Overrides:
doPostin classCommand- Throws:
javax.servlet.ServletExceptionIOException
-