Return-Path: X-Original-To: apmail-cxf-users-archive@www.apache.org Delivered-To: apmail-cxf-users-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 53DBA2C44 for ; Mon, 25 Apr 2011 23:20:04 +0000 (UTC) Received: (qmail 30716 invoked by uid 500); 25 Apr 2011 23:20:03 -0000 Delivered-To: apmail-cxf-users-archive@cxf.apache.org Received: (qmail 30658 invoked by uid 500); 25 Apr 2011 23:20:03 -0000 Mailing-List: contact users-help@cxf.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: users@cxf.apache.org Delivered-To: mailing list users@cxf.apache.org Received: (qmail 30650 invoked by uid 99); 25 Apr 2011 23:20:03 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 25 Apr 2011 23:20:03 +0000 X-ASF-Spam-Status: No, hits=-2.3 required=5.0 tests=RCVD_IN_DNSWL_MED,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (athena.apache.org: local policy) Received: from [216.82.241.195] (HELO mail119.messagelabs.com) (216.82.241.195) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 25 Apr 2011 23:19:54 +0000 X-VirusChecked: Checked X-Env-Sender: dk068x@att.com X-Msg-Ref: server-8.tower-119.messagelabs.com!1303773572!16036452!1 X-StarScan-Version: 6.2.9; banners=-,-,- X-Originating-IP: [144.160.112.25] Received: (qmail 8177 invoked from network); 25 Apr 2011 23:19:33 -0000 Received: from sbcsmtp3.sbc.com (HELO tlph064.enaf.dadc.sbc.com) (144.160.112.25) by server-8.tower-119.messagelabs.com with DHE-RSA-AES256-SHA encrypted SMTP; 25 Apr 2011 23:19:33 -0000 Received: from enaf.dadc.sbc.com (localhost.localdomain [127.0.0.1]) by tlph064.enaf.dadc.sbc.com (8.14.4/8.14.4) with ESMTP id p3PNJWoU015098 for ; Mon, 25 Apr 2011 18:19:32 -0500 Received: from WABOTH9MSGHUB8F.ITServices.sbc.com (waboth9msghub8f.itservices.sbc.com [135.163.35.68]) by tlph064.enaf.dadc.sbc.com (8.14.4/8.14.4) with ESMTP id p3PNJQKO015049 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL) for ; Mon, 25 Apr 2011 18:19:26 -0500 Received: from WABOTH9MSGUSR8C.ITServices.sbc.com ([169.254.3.4]) by WABOTH9MSGHUB8F.ITServices.sbc.com ([135.163.35.68]) with mapi id 14.01.0255.000; Mon, 25 Apr 2011 16:19:25 -0700 From: "KARR, DAVID (ATTSI)" To: "users@cxf.apache.org" Subject: How to append file extent to end of path, before query parameters? Thread-Topic: How to append file extent to end of path, before query parameters? Thread-Index: AcwDnzd+uJjibKiKTouODKtHKW1sJA== Date: Mon, 25 Apr 2011 23:19:25 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [135.163.34.6] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 I'm currently using UriBuilder to generate a HATEOAS URL. I need to be abl= e to add a file extent to the last component, before the query parameters. For instance, if I would have generated "http://host:port/stuff/something?p= aram=3Djunk", I need to instead make "http://host:port/stuff/something.exte= nt?param=3Djunk". The last field in the URL is from a parameter value. I figured out at leas= t a way to do this, which is to simply modify the value of the last paramet= er to append the extent to it, but that seems pretty wonky. I'd really like to call "getRawPath()" on the return from "build(xxx, xxx)"= , modify the result, and then call "setRawPath()" (if such a method existed= ). Is there a reasonable way to do this, or is my workaround the only way?