<?xml version="1.0" encoding="UTF-8"?>
<web-app version="3.0" xmlns="http://java.sun.com/xml/ns/javaee"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xsi:schemaLocation="http://java.sun.com/xml/ns/javaee http://java.sun.com/xml/ns/javaee/web-app_3_0.xsd">
	<display-name>SIPWeb-Services</display-name>
	<module-name>sipwebservices</module-name>

	<!-- Resteasy 2.3.4.Final User Guide 18.4. Configuring Document Marshalling 
		XML document parsers are subject to a form of attack known as the XXE (Xml 
		eXternal Entity) Attack (http://www.securiteam.com/securitynews/6D0100A5PU.html), 
		in which expanding an external entity causes an unsafe file to be loaded. 
		For example, the document -->
	<!-- <context-param>
		<param-name>resteasy.document.expand.entity.references</param-name>
		<param-value>false</param-value>
	</context-param> -->

	<!-- Necessário para o deploy no wildfly 
	-->
	 <!--<listener>
		<listener-class>org.jboss.resteasy.plugins.server.servlet.ResteasyBootstrap</listener-class>
	</listener>
	 <servlet>
		<servlet-name>Resteasy</servlet-name>
		<servlet-class>org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher</servlet-class>
	</servlet>-->

	<filter-mapping>
		<filter-name>CorsFilter</filter-name>
		<url-pattern>/*</url-pattern>
	</filter-mapping>

	<filter>
		<filter-name>CorsFilter</filter-name>
		<filter-class>br.com.fiorilli.sipweb.webservices.filter.CorsFilter</filter-class>
	</filter>

	<context-param>
		<param-name>resteasy.servlet.mapping.prefix</param-name>
		<param-value>/api</param-value>
	</context-param>

</web-app>
