This is the glossary for the Wolframe Application Building Manual. Although it covers most of the terms used in the Wolframe world, some terms might be skipped if they are rarely used in this context. These terms are explained in the Application Building Manual.

External glossary

Data Definition Language

A domain specific language for describing data structures

Wolframe glossary

Connection Handler

Interface for the networking to one client/server connection during its whole lifetime.

Command Handler

Interface for delegating processing of client protocol commands in a hierarchical way. A command handler is created by a connection handler or another command handler. During command execution the input/output of the connection is entirely handled by the command handler. Command Handlers are used to build the communication protocol processing as hierarchical state machine.


A set of named units of description of processing or data in a source file. The source file is loaded at server startup.


A transaction is a call of a database defined in a transaction program. A transaction either fails completely or succeeds as whole. Auditing is seen as part of the transaction. Transactions have an object as input and return an object or an error as result. Authorization tags that are checked against the user privileges of the connection can be attached to transactions.


Lua ( is a scripting language. It is used in Wolframe as one language for writing programs. Lua integrates nice into a cooperative system with a single threaded execution model as Wolframe is.


Filters are attached to network input and output to read and write input in a well defined format. Filters let you process input and print output in an iterative way. Filters are loaded by the system at startup and have a unique name.


A form is a hierarchical description of typed data. Forms are used to create objects from a serialization and to validate input. Forms are defined in programs written in a DDL (Data Definition Language) or as declared as part of a build-in function API.


The flow for a single connection. Not all objects have channels (e.g. databases).


A set of objects of the same type seen as one single object for the objects that use it.


An element of a group. A group is a set of units.


An entity providing objects of a kind. Some providers are factories, but not all of them.

End Of Data (EoD)

Marks the end of a complete data unit to be processed by a processor. End of data is marked with CR LF dot ('.') CR LF or LF dot LF. For passing lines with a dot ('.') at the start of a content line, the client has to escape an LF dot in the content with LF dot dot. This escaping applies also to the result returned to the client. So client has to unescape LF dot sequences by replacing them by a LF.

Application Reference Path

The application server defines this file path where all relative paths defined in the configuration refer to.



Acronym for Authentication, Authorization, Accounting and Auditing

See Also Authentication, Authorization, Accounting, Auditing.


Authentication is a process that creates a login for the user, granting him access to parts of the system.


Authorization grant or deny the execution of functions or database transactions based on rules on the client login of the session (Authentication). You can specify such access rules on different levels of processing.



Auditing describes a special kind of logging of transactions. Audit operations are represented as function calls. Audit operations specified as critical are handled as a critical part of the transaction. If a critical audit operation fails then the transaction fails (rollback).



Secure Sockets Layer

Cryptographic protocols which provide secure communications on the Internet. SSL is a predecessor to TLS

See Also TLS.



Transport Layer Security

Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide communication security over the Internet. TLS and SSL encrypt the segments of network connections above the Transport Layer, using asymmetric cryptography for key exchange, symmetric encryption for privacy, and message authentication codes for message integrity.

See Also SSL.