jetty-9 merged jetty-8
Merge remote-tracking branch 'origin/jetty-8' into jetty-9 Conflicts: jetty-security/src/main/java/org/eclipse/jetty/security/authentication/FormAuthenticator.java jetty-server/src/main/java/org/eclipse/jetty/server/AbstractHttpConnection.java jetty-server/src/test/java/org/eclipse/jetty/server/HttpConnectionTest.java jetty-util/src/main/java/org/eclipse/jetty/util/log/StdErrLog.java jetty-util/src/main/java/org/eclipse/jetty/util/resource/JarFileResource.java jetty-util/src/test/java/org/eclipse/jetty/util/log/StdErrLogTest.java
This commit is contained in:
commit
086e74bed8
|
@ -0,0 +1,15 @@
|
||||||
|
========================================================================
|
||||||
|
Copyright (c) ${copyright-range} Mort Bay Consulting Pty. Ltd.
|
||||||
|
------------------------------------------------------------------------
|
||||||
|
All rights reserved. This program and the accompanying materials
|
||||||
|
are made available under the terms of the Eclipse Public License v1.0
|
||||||
|
and Apache License v2.0 which accompanies this distribution.
|
||||||
|
|
||||||
|
The Eclipse Public License is available at
|
||||||
|
http://www.eclipse.org/legal/epl-v10.html
|
||||||
|
|
||||||
|
The Apache License v2.0 is available at
|
||||||
|
http://www.opensource.org/licenses/apache2.0.php
|
||||||
|
|
||||||
|
You may elect to redistribute this code under either of these licenses.
|
||||||
|
========================================================================
|
|
@ -588,6 +588,55 @@ public class HttpURI
|
||||||
return new String(bytes,0,n,_charset);
|
return new String(bytes,0,n,_charset);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
public String getDecodedPath(String encoding)
|
||||||
|
{
|
||||||
|
if (_path==_param)
|
||||||
|
return null;
|
||||||
|
|
||||||
|
int length = _param-_path;
|
||||||
|
byte[] bytes=null;
|
||||||
|
int n=0;
|
||||||
|
|
||||||
|
for (int i=_path;i<_param;i++)
|
||||||
|
{
|
||||||
|
byte b = _raw[i];
|
||||||
|
|
||||||
|
if (b=='%')
|
||||||
|
{
|
||||||
|
if ((i+2)>=_param)
|
||||||
|
throw new IllegalArgumentException("Bad % encoding: "+this);
|
||||||
|
b=(byte)(0xff&TypeUtil.parseInt(_raw,i+1,2,16));
|
||||||
|
i+=2;
|
||||||
|
}
|
||||||
|
else if (bytes==null)
|
||||||
|
{
|
||||||
|
n++;
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (bytes==null)
|
||||||
|
{
|
||||||
|
bytes=new byte[length];
|
||||||
|
System.arraycopy(_raw,_path,bytes,0,n);
|
||||||
|
}
|
||||||
|
|
||||||
|
bytes[n++]=b;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
if (bytes==null)
|
||||||
|
return StringUtil.toString(_raw,_path,_param-_path,encoding);
|
||||||
|
|
||||||
|
return StringUtil.toString(bytes,0,n,encoding);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
public String getPathAndParam()
|
public String getPathAndParam()
|
||||||
{
|
{
|
||||||
if (_path==_query)
|
if (_path==_query)
|
||||||
|
|
|
@ -23,8 +23,11 @@ import java.util.Set;
|
||||||
import javax.servlet.ServletException;
|
import javax.servlet.ServletException;
|
||||||
import javax.servlet.http.HttpServletRequest;
|
import javax.servlet.http.HttpServletRequest;
|
||||||
import javax.servlet.http.HttpServletResponse;
|
import javax.servlet.http.HttpServletResponse;
|
||||||
|
import javax.servlet.http.HttpSessionEvent;
|
||||||
|
import javax.servlet.http.HttpSessionListener;
|
||||||
|
|
||||||
import org.eclipse.jetty.security.authentication.DeferredAuthentication;
|
import org.eclipse.jetty.security.authentication.DeferredAuthentication;
|
||||||
|
import org.eclipse.jetty.server.AbstractHttpConnection;
|
||||||
import org.eclipse.jetty.server.Authentication;
|
import org.eclipse.jetty.server.Authentication;
|
||||||
import org.eclipse.jetty.server.Handler;
|
import org.eclipse.jetty.server.Handler;
|
||||||
import org.eclipse.jetty.server.Request;
|
import org.eclipse.jetty.server.Request;
|
||||||
|
@ -33,6 +36,7 @@ import org.eclipse.jetty.server.UserIdentity;
|
||||||
import org.eclipse.jetty.server.handler.ContextHandler;
|
import org.eclipse.jetty.server.handler.ContextHandler;
|
||||||
import org.eclipse.jetty.server.handler.ContextHandler.Context;
|
import org.eclipse.jetty.server.handler.ContextHandler.Context;
|
||||||
import org.eclipse.jetty.server.handler.HandlerWrapper;
|
import org.eclipse.jetty.server.handler.HandlerWrapper;
|
||||||
|
import org.eclipse.jetty.server.session.AbstractSessionManager;
|
||||||
import org.eclipse.jetty.util.component.LifeCycle;
|
import org.eclipse.jetty.util.component.LifeCycle;
|
||||||
import org.eclipse.jetty.util.log.Log;
|
import org.eclipse.jetty.util.log.Log;
|
||||||
import org.eclipse.jetty.util.log.Logger;
|
import org.eclipse.jetty.util.log.Logger;
|
||||||
|
@ -285,6 +289,32 @@ public abstract class SecurityHandler extends HandlerWrapper implements Authenti
|
||||||
getInitParameter(name)==null)
|
getInitParameter(name)==null)
|
||||||
setInitParameter(name,context.getInitParameter(name));
|
setInitParameter(name,context.getInitParameter(name));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
//register a session listener to handle securing sessions when authentication is performed
|
||||||
|
context.getContextHandler().addEventListener(new HttpSessionListener()
|
||||||
|
{
|
||||||
|
|
||||||
|
public void sessionDestroyed(HttpSessionEvent se)
|
||||||
|
{
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
public void sessionCreated(HttpSessionEvent se)
|
||||||
|
{
|
||||||
|
//if current request is authenticated, then as we have just created the session, mark it as secure, as it has not yet been returned to a user
|
||||||
|
AbstractHttpConnection connection = AbstractHttpConnection.getCurrentConnection();
|
||||||
|
if (connection == null)
|
||||||
|
return;
|
||||||
|
Request request = connection.getRequest();
|
||||||
|
if (request == null)
|
||||||
|
return;
|
||||||
|
|
||||||
|
if (request.isSecure())
|
||||||
|
{
|
||||||
|
se.getSession().setAttribute(AbstractSessionManager.SESSION_KNOWN_ONLY_TO_AUTHENTICATED, Boolean.TRUE);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
// complicated resolution of login and identity service to handle
|
// complicated resolution of login and identity service to handle
|
||||||
|
|
|
@ -83,7 +83,7 @@ public class BasicAuthenticator extends LoginAuthenticator
|
||||||
UserIdentity user = _loginService.login(username,password);
|
UserIdentity user = _loginService.login(username,password);
|
||||||
if (user!=null)
|
if (user!=null)
|
||||||
{
|
{
|
||||||
renewSessionOnAuthentication(request,response);
|
renewSession(request,response);
|
||||||
return new UserAuthentication(getAuthMethod(),user);
|
return new UserAuthentication(getAuthMethod(),user);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -119,7 +119,7 @@ public class ClientCertAuthenticator extends LoginAuthenticator
|
||||||
UserIdentity user = _loginService.login(username,credential);
|
UserIdentity user = _loginService.login(username,credential);
|
||||||
if (user!=null)
|
if (user!=null)
|
||||||
{
|
{
|
||||||
renewSessionOnAuthentication(request,response);
|
renewSession(request,response);
|
||||||
return new UserAuthentication(getAuthMethod(),user);
|
return new UserAuthentication(getAuthMethod(),user);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -183,7 +183,7 @@ public class DigestAuthenticator extends LoginAuthenticator
|
||||||
UserIdentity user = _loginService.login(digest.username,digest);
|
UserIdentity user = _loginService.login(digest.username,digest);
|
||||||
if (user!=null)
|
if (user!=null)
|
||||||
{
|
{
|
||||||
renewSessionOnAuthentication(request,response);
|
renewSession(request,response);
|
||||||
return new UserAuthentication(getAuthMethod(),user);
|
return new UserAuthentication(getAuthMethod(),user);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -189,8 +189,8 @@ public class FormAuthenticator extends LoginAuthenticator
|
||||||
if (!mandatory)
|
if (!mandatory)
|
||||||
return _deferred;
|
return _deferred;
|
||||||
|
|
||||||
if (isLoginOrErrorPage(URIUtil.addPaths(request.getServletPath(),request.getPathInfo())))
|
if (isLoginOrErrorPage(URIUtil.addPaths(request.getServletPath(),request.getPathInfo())) &&!DeferredAuthentication.isDeferred(response))
|
||||||
return Authentication.NOT_CHECKED;
|
return _deferred;
|
||||||
|
|
||||||
HttpSession session = request.getSession(true);
|
HttpSession session = request.getSession(true);
|
||||||
|
|
||||||
|
@ -205,7 +205,7 @@ public class FormAuthenticator extends LoginAuthenticator
|
||||||
UserIdentity user = _loginService.login(username,password);
|
UserIdentity user = _loginService.login(username,password);
|
||||||
if (user!=null)
|
if (user!=null)
|
||||||
{
|
{
|
||||||
session=renewSessionOnAuthentication(request,response);
|
session=renewSession(request,response);
|
||||||
|
|
||||||
// Redirect to original request
|
// Redirect to original request
|
||||||
String nuri;
|
String nuri;
|
||||||
|
|
|
@ -13,10 +13,6 @@
|
||||||
|
|
||||||
package org.eclipse.jetty.security.authentication;
|
package org.eclipse.jetty.security.authentication;
|
||||||
|
|
||||||
import java.util.Enumeration;
|
|
||||||
import java.util.HashMap;
|
|
||||||
import java.util.Map;
|
|
||||||
|
|
||||||
import javax.servlet.http.HttpServletRequest;
|
import javax.servlet.http.HttpServletRequest;
|
||||||
import javax.servlet.http.HttpServletResponse;
|
import javax.servlet.http.HttpServletResponse;
|
||||||
import javax.servlet.http.HttpSession;
|
import javax.servlet.http.HttpSession;
|
||||||
|
@ -24,10 +20,10 @@ import javax.servlet.http.HttpSession;
|
||||||
import org.eclipse.jetty.security.Authenticator;
|
import org.eclipse.jetty.security.Authenticator;
|
||||||
import org.eclipse.jetty.security.IdentityService;
|
import org.eclipse.jetty.security.IdentityService;
|
||||||
import org.eclipse.jetty.security.LoginService;
|
import org.eclipse.jetty.security.LoginService;
|
||||||
|
import org.eclipse.jetty.server.session.AbstractSessionManager;
|
||||||
|
|
||||||
public abstract class LoginAuthenticator implements Authenticator
|
public abstract class LoginAuthenticator implements Authenticator
|
||||||
{
|
{
|
||||||
public final static String SESSION_SECURED="org.eclipse.jetty.security.secured";
|
|
||||||
protected final DeferredAuthentication _deferred=new DeferredAuthentication(this);
|
protected final DeferredAuthentication _deferred=new DeferredAuthentication(this);
|
||||||
protected LoginService _loginService;
|
protected LoginService _loginService;
|
||||||
protected IdentityService _identityService;
|
protected IdentityService _identityService;
|
||||||
|
@ -53,34 +49,29 @@ public abstract class LoginAuthenticator implements Authenticator
|
||||||
return _loginService;
|
return _loginService;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* ------------------------------------------------------------ */
|
/** Change the session id.
|
||||||
/** Change the session when the request is authenticated for the first time
|
* The session is changed to a new instance with a new ID if and only if:<ul>
|
||||||
|
* <li>A session exists.
|
||||||
|
* <li>The {@link AuthConfiguration#isSessionRenewedOnAuthentication()} returns true.
|
||||||
|
* <li>The session ID has been given to unauthenticated responses
|
||||||
|
* </ul>
|
||||||
* @param request
|
* @param request
|
||||||
* @param response
|
* @param response
|
||||||
* @return The new session.
|
* @return The new session.
|
||||||
*/
|
*/
|
||||||
protected HttpSession renewSessionOnAuthentication(HttpServletRequest request, HttpServletResponse response)
|
protected HttpSession renewSession(HttpServletRequest request, HttpServletResponse response)
|
||||||
{
|
{
|
||||||
HttpSession httpSession = request.getSession(false);
|
HttpSession httpSession = request.getSession(false);
|
||||||
if (_renewSession && httpSession!=null && httpSession.getAttribute(SESSION_SECURED)==null)
|
|
||||||
|
//if we should renew sessions, and there is an existing session that may have been seen by non-authenticated users
|
||||||
|
//(indicated by SESSION_SECURED not being set on the session) then we should change id
|
||||||
|
if (_renewSession && httpSession!=null && httpSession.getAttribute(AbstractSessionManager.SESSION_KNOWN_ONLY_TO_AUTHENTICATED)!=Boolean.TRUE)
|
||||||
{
|
{
|
||||||
synchronized (this)
|
synchronized (this)
|
||||||
{
|
{
|
||||||
Map<String,Object> attributes = new HashMap<String, Object>();
|
httpSession = AbstractSessionManager.renewSession(request, httpSession,true);
|
||||||
for (Enumeration<String> e=httpSession.getAttributeNames();e.hasMoreElements();)
|
|
||||||
{
|
|
||||||
String name=e.nextElement();
|
|
||||||
attributes.put(name,httpSession.getAttribute(name));
|
|
||||||
httpSession.removeAttribute(name);
|
|
||||||
}
|
|
||||||
httpSession.invalidate();
|
|
||||||
httpSession = request.getSession(true);
|
|
||||||
httpSession.setAttribute(SESSION_SECURED,Boolean.TRUE);
|
|
||||||
for (Map.Entry<String, Object> entry: attributes.entrySet())
|
|
||||||
httpSession.setAttribute(entry.getKey(),entry.getValue());
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return httpSession;
|
return httpSession;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -29,6 +29,7 @@ import org.eclipse.jetty.security.SecurityHandler;
|
||||||
import org.eclipse.jetty.server.Authentication;
|
import org.eclipse.jetty.server.Authentication;
|
||||||
import org.eclipse.jetty.server.UserIdentity;
|
import org.eclipse.jetty.server.UserIdentity;
|
||||||
import org.eclipse.jetty.server.UserIdentity.Scope;
|
import org.eclipse.jetty.server.UserIdentity.Scope;
|
||||||
|
import org.eclipse.jetty.server.session.AbstractSessionManager;
|
||||||
import org.eclipse.jetty.util.log.Log;
|
import org.eclipse.jetty.util.log.Log;
|
||||||
import org.eclipse.jetty.util.log.Logger;
|
import org.eclipse.jetty.util.log.Logger;
|
||||||
|
|
||||||
|
@ -102,7 +103,7 @@ public class SessionAuthentication implements Authentication.User, Serializable,
|
||||||
if (security!=null)
|
if (security!=null)
|
||||||
security.logout(this);
|
security.logout(this);
|
||||||
if (_session!=null)
|
if (_session!=null)
|
||||||
_session.removeAttribute(LoginAuthenticator.SESSION_SECURED);
|
_session.removeAttribute(AbstractSessionManager.SESSION_KNOWN_ONLY_TO_AUTHENTICATED);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
|
|
@ -37,6 +37,7 @@ import org.eclipse.jetty.util.ByteArrayISO8859Writer;
|
||||||
public class ErrorHandler extends AbstractHandler
|
public class ErrorHandler extends AbstractHandler
|
||||||
{
|
{
|
||||||
boolean _showStacks=true;
|
boolean _showStacks=true;
|
||||||
|
boolean _showMessageInTitle=true;
|
||||||
String _cacheControl="must-revalidate,no-cache,no-store";
|
String _cacheControl="must-revalidate,no-cache,no-store";
|
||||||
|
|
||||||
/* ------------------------------------------------------------ */
|
/* ------------------------------------------------------------ */
|
||||||
|
@ -86,12 +87,16 @@ public class ErrorHandler extends AbstractHandler
|
||||||
/* ------------------------------------------------------------ */
|
/* ------------------------------------------------------------ */
|
||||||
protected void writeErrorPageHead(HttpServletRequest request, Writer writer, int code, String message)
|
protected void writeErrorPageHead(HttpServletRequest request, Writer writer, int code, String message)
|
||||||
throws IOException
|
throws IOException
|
||||||
{
|
{
|
||||||
writer.write("<meta http-equiv=\"Content-Type\" content=\"text/html; charset=ISO-8859-1\"/>\n");
|
writer.write("<meta http-equiv=\"Content-Type\" content=\"text/html; charset=ISO-8859-1\"/>\n");
|
||||||
writer.write("<title>Error ");
|
writer.write("<title>Error ");
|
||||||
writer.write(Integer.toString(code));
|
writer.write(Integer.toString(code));
|
||||||
writer.write(' ');
|
|
||||||
write(writer,message);
|
if (_showMessageInTitle)
|
||||||
|
{
|
||||||
|
writer.write(' ');
|
||||||
|
write(writer,message);
|
||||||
|
}
|
||||||
writer.write("</title>\n");
|
writer.write("</title>\n");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -176,6 +181,22 @@ public class ErrorHandler extends AbstractHandler
|
||||||
_showStacks = showStacks;
|
_showStacks = showStacks;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
/**
|
||||||
|
* @param showMessageInTitle if true, the error message appears in page title
|
||||||
|
*/
|
||||||
|
public void setShowMessageInTitle(boolean showMessageInTitle)
|
||||||
|
{
|
||||||
|
_showMessageInTitle = showMessageInTitle;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
public boolean getShowMessageInTitle()
|
||||||
|
{
|
||||||
|
return _showMessageInTitle;
|
||||||
|
}
|
||||||
|
|
||||||
/* ------------------------------------------------------------ */
|
/* ------------------------------------------------------------ */
|
||||||
protected void write(Writer writer,String string)
|
protected void write(Writer writer,String string)
|
||||||
throws IOException
|
throws IOException
|
||||||
|
|
|
@ -20,6 +20,7 @@ import java.util.Collections;
|
||||||
import java.util.Enumeration;
|
import java.util.Enumeration;
|
||||||
import java.util.EventListener;
|
import java.util.EventListener;
|
||||||
import java.util.HashSet;
|
import java.util.HashSet;
|
||||||
|
import java.util.HashMap;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
|
@ -69,6 +70,8 @@ public abstract class AbstractSessionManager extends AbstractLifeCycle implement
|
||||||
new HashSet<SessionTrackingMode>(
|
new HashSet<SessionTrackingMode>(
|
||||||
Arrays.asList(new SessionTrackingMode[]{SessionTrackingMode.COOKIE,SessionTrackingMode.URL})));
|
Arrays.asList(new SessionTrackingMode[]{SessionTrackingMode.COOKIE,SessionTrackingMode.URL})));
|
||||||
|
|
||||||
|
public final static String SESSION_KNOWN_ONLY_TO_AUTHENTICATED="org.eclipse.jetty.security.sessionKnownOnlytoAuthenticated";
|
||||||
|
|
||||||
/* ------------------------------------------------------------ */
|
/* ------------------------------------------------------------ */
|
||||||
public final static int __distantFuture=60*60*24*7*52*20;
|
public final static int __distantFuture=60*60*24*7*52*20;
|
||||||
|
|
||||||
|
@ -121,6 +124,28 @@ public abstract class AbstractSessionManager extends AbstractLifeCycle implement
|
||||||
protected final CounterStatistic _sessionsStats = new CounterStatistic();
|
protected final CounterStatistic _sessionsStats = new CounterStatistic();
|
||||||
protected final SampleStatistic _sessionTimeStats = new SampleStatistic();
|
protected final SampleStatistic _sessionTimeStats = new SampleStatistic();
|
||||||
|
|
||||||
|
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
public static HttpSession renewSession (HttpServletRequest request, HttpSession httpSession, boolean authenticated)
|
||||||
|
{
|
||||||
|
Map<String,Object> attributes = new HashMap<String, Object>();
|
||||||
|
|
||||||
|
for (Enumeration<String> e=httpSession.getAttributeNames();e.hasMoreElements();)
|
||||||
|
{
|
||||||
|
String name=e.nextElement();
|
||||||
|
attributes.put(name,httpSession.getAttribute(name));
|
||||||
|
httpSession.removeAttribute(name);
|
||||||
|
}
|
||||||
|
|
||||||
|
httpSession.invalidate();
|
||||||
|
httpSession = request.getSession(true);
|
||||||
|
if (authenticated)
|
||||||
|
httpSession.setAttribute(SESSION_KNOWN_ONLY_TO_AUTHENTICATED, Boolean.TRUE);
|
||||||
|
for (Map.Entry<String, Object> entry: attributes.entrySet())
|
||||||
|
httpSession.setAttribute(entry.getKey(),entry.getValue());
|
||||||
|
return httpSession;
|
||||||
|
}
|
||||||
|
|
||||||
/* ------------------------------------------------------------ */
|
/* ------------------------------------------------------------ */
|
||||||
public AbstractSessionManager()
|
public AbstractSessionManager()
|
||||||
{
|
{
|
||||||
|
|
|
@ -122,6 +122,19 @@ public class HttpConnectionTest
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testNoPath() throws Exception
|
||||||
|
{
|
||||||
|
String response=connector.getResponses("GET http://localhost:80 HTTP/1.1\n"+
|
||||||
|
"Host: localhost:80\n"+
|
||||||
|
"\n");
|
||||||
|
|
||||||
|
int offset=0;
|
||||||
|
offset = checkContains(response,offset,"HTTP/1.1 200");
|
||||||
|
checkContains(response,offset,"pathInfo=/");
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testEmpty() throws Exception
|
public void testEmpty() throws Exception
|
||||||
{
|
{
|
||||||
|
@ -185,7 +198,13 @@ public class HttpConnectionTest
|
||||||
"Host: localhost\n"+
|
"Host: localhost\n"+
|
||||||
"Connection: close\n"+
|
"Connection: close\n"+
|
||||||
"\015\012");
|
"\015\012");
|
||||||
checkContains(response,0,"HTTP/1.1 400");
|
checkContains(response,0,"HTTP/1.1 200"); //now fallback to iso-8859-1
|
||||||
|
|
||||||
|
response=connector.getResponses("GET /bad/utf8%c1 HTTP/1.1\n"+
|
||||||
|
"Host: localhost\n"+
|
||||||
|
"Connection: close\n"+
|
||||||
|
"\015\012");
|
||||||
|
checkContains(response,0,"HTTP/1.1 200"); //now fallback to iso-8859-1
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
|
|
@ -182,10 +182,11 @@ public class HttpURITest
|
||||||
|
|
||||||
private final String[][] encoding_tests=
|
private final String[][] encoding_tests=
|
||||||
{
|
{
|
||||||
/* 0*/ {"/path/info","/path/info"},
|
/* 0*/ {"/path/info","/path/info", "UTF-8"},
|
||||||
/* 1*/ {"/path/%69nfo","/path/info"},
|
/* 1*/ {"/path/%69nfo","/path/info", "UTF-8"},
|
||||||
/* 2*/ {"http://host/path/%69nfo","/path/info"},
|
/* 2*/ {"http://host/path/%69nfo","/path/info", "UTF-8"},
|
||||||
/* 3*/ {"http://host/path/%69nf%c2%a4","/path/inf\u00a4"},
|
/* 3*/ {"http://host/path/%69nf%c2%a4","/path/inf\u00a4", "UTF-8"},
|
||||||
|
/* 4*/ {"http://host/path/%E5", "/path/\u00e5", "ISO-8859-1"}
|
||||||
};
|
};
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
@ -196,7 +197,7 @@ public class HttpURITest
|
||||||
for (int t=0;t<encoding_tests.length;t++)
|
for (int t=0;t<encoding_tests.length;t++)
|
||||||
{
|
{
|
||||||
uri.parse(encoding_tests[t][0]);
|
uri.parse(encoding_tests[t][0]);
|
||||||
assertEquals(""+t,encoding_tests[t][1],uri.getDecodedPath());
|
assertEquals(""+t,encoding_tests[t][1],uri.getDecodedPath(encoding_tests[t][2]));
|
||||||
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -1305,7 +1305,7 @@ public class StandardSession implements ISession, Parser.Listener, Callback<Stan
|
||||||
@Override
|
@Override
|
||||||
public String toString()
|
public String toString()
|
||||||
{
|
{
|
||||||
return String.format("DATA bytes @%x available=%d consumed=%d on %s",dataInfo.hashCode(),dataInfo.available(),dataInfo.consumed(),getStream());
|
return String.format("DATA bytes @%x available=%d consumed=%d on %s", dataInfo.hashCode(), dataInfo.available(), dataInfo.consumed(), getStream());
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,43 @@
|
||||||
|
//========================================================================
|
||||||
|
//Copyright 2012 Mort Bay Consulting Pty. Ltd.
|
||||||
|
//------------------------------------------------------------------------
|
||||||
|
//Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
//you may not use this file except in compliance with the License.
|
||||||
|
//You may obtain a copy of the License at
|
||||||
|
//http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//Unless required by applicable law or agreed to in writing, software
|
||||||
|
//distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
//WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
//See the License for the specific language governing permissions and
|
||||||
|
//limitations under the License.
|
||||||
|
//========================================================================
|
||||||
|
|
||||||
|
package org.eclipse.jetty.util.preventers;
|
||||||
|
|
||||||
|
import java.awt.Toolkit;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* AWTLeakPreventer
|
||||||
|
*
|
||||||
|
* See https://issues.jboss.org/browse/AS7-3733
|
||||||
|
*
|
||||||
|
* The java.awt.Toolkit class has a static field that is the default toolkit.
|
||||||
|
* Creating the default toolkit causes the creation of an EventQueue, which has a
|
||||||
|
* classloader field initialized by the thread context class loader.
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
public class AWTLeakPreventer extends AbstractLeakPreventer
|
||||||
|
{
|
||||||
|
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
/**
|
||||||
|
* @see org.eclipse.jetty.util.preventers.AbstractLeakPreventer#prevent(java.lang.ClassLoader)
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public void prevent(ClassLoader loader)
|
||||||
|
{
|
||||||
|
LOG.debug("Pinning classloader for java.awt.EventQueue using "+loader);
|
||||||
|
Toolkit.getDefaultToolkit();
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,57 @@
|
||||||
|
// ========================================================================
|
||||||
|
// Copyright (c) 2012 Mort Bay Consulting Pty. Ltd.
|
||||||
|
// ------------------------------------------------------------------------
|
||||||
|
// All rights reserved. This program and the accompanying materials
|
||||||
|
// are made available under the terms of the Eclipse Public License v1.0
|
||||||
|
// and Apache License v2.0 which accompanies this distribution.
|
||||||
|
// The Eclipse Public License is available at
|
||||||
|
// http://www.eclipse.org/legal/epl-v10.html
|
||||||
|
// The Apache License v2.0 is available at
|
||||||
|
// http://www.opensource.org/licenses/apache2.0.php
|
||||||
|
// You may elect to redistribute this code under either of these licenses.
|
||||||
|
// ========================================================================
|
||||||
|
|
||||||
|
|
||||||
|
package org.eclipse.jetty.util.preventers;
|
||||||
|
|
||||||
|
import org.eclipse.jetty.util.component.AbstractLifeCycle;
|
||||||
|
import org.eclipse.jetty.util.log.Log;
|
||||||
|
import org.eclipse.jetty.util.log.Logger;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* AbstractLeakPreventer
|
||||||
|
*
|
||||||
|
* Abstract base class for code that seeks to avoid pinning of webapp classloaders by using the jetty classloader to
|
||||||
|
* proactively call the code that pins them (generally pinned as static data members, or as static
|
||||||
|
* data members that are daemon threads (which use the context classloader)).
|
||||||
|
*
|
||||||
|
* Instances of subclasses of this class should be set with Server.addBean(), which will
|
||||||
|
* ensure that they are called when the Server instance starts up, which will have the jetty
|
||||||
|
* classloader in scope.
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
public abstract class AbstractLeakPreventer extends AbstractLifeCycle
|
||||||
|
{
|
||||||
|
protected static final Logger LOG = Log.getLogger(AbstractLeakPreventer.class);
|
||||||
|
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
abstract public void prevent(ClassLoader loader);
|
||||||
|
|
||||||
|
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
@Override
|
||||||
|
protected void doStart() throws Exception
|
||||||
|
{
|
||||||
|
ClassLoader loader = Thread.currentThread().getContextClassLoader();
|
||||||
|
try
|
||||||
|
{
|
||||||
|
Thread.currentThread().setContextClassLoader(getClass().getClassLoader());
|
||||||
|
prevent(getClass().getClassLoader());
|
||||||
|
super.doStart();
|
||||||
|
}
|
||||||
|
finally
|
||||||
|
{
|
||||||
|
Thread.currentThread().setContextClassLoader(loader);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,36 @@
|
||||||
|
// ========================================================================
|
||||||
|
// Copyright (c) 2012 Mort Bay Consulting Pty. Ltd.
|
||||||
|
// ------------------------------------------------------------------------
|
||||||
|
// All rights reserved. This program and the accompanying materials
|
||||||
|
// are made available under the terms of the Eclipse Public License v1.0
|
||||||
|
// and Apache License v2.0 which accompanies this distribution.
|
||||||
|
// The Eclipse Public License is available at
|
||||||
|
// http://www.eclipse.org/legal/epl-v10.html
|
||||||
|
// The Apache License v2.0 is available at
|
||||||
|
// http://www.opensource.org/licenses/apache2.0.php
|
||||||
|
// You may elect to redistribute this code under either of these licenses.
|
||||||
|
// ========================================================================
|
||||||
|
|
||||||
|
package org.eclipse.jetty.util.preventers;
|
||||||
|
|
||||||
|
import javax.imageio.ImageIO;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* AppContextLeakPreventer
|
||||||
|
*
|
||||||
|
* Cause the classloader that is pinned by AppContext.getAppContext() to be
|
||||||
|
* a container or system classloader, not a webapp classloader.
|
||||||
|
*
|
||||||
|
* Inspired by Tomcat JreMemoryLeakPrevention.
|
||||||
|
*/
|
||||||
|
public class AppContextLeakPreventer extends AbstractLeakPreventer
|
||||||
|
{
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
@Override
|
||||||
|
public void prevent(ClassLoader loader)
|
||||||
|
{
|
||||||
|
LOG.debug("Pinning classloader for AppContext.getContext() with "+loader);
|
||||||
|
ImageIO.getUseCache();
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,52 @@
|
||||||
|
//========================================================================
|
||||||
|
//Copyright 2012 Mort Bay Consulting Pty. Ltd.
|
||||||
|
//------------------------------------------------------------------------
|
||||||
|
//Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
//you may not use this file except in compliance with the License.
|
||||||
|
//You may obtain a copy of the License at
|
||||||
|
//http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//Unless required by applicable law or agreed to in writing, software
|
||||||
|
//distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
//WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
//See the License for the specific language governing permissions and
|
||||||
|
//limitations under the License.
|
||||||
|
//========================================================================
|
||||||
|
|
||||||
|
package org.eclipse.jetty.util.preventers;
|
||||||
|
|
||||||
|
import javax.xml.parsers.DocumentBuilderFactory;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* DOMLeakPreventer
|
||||||
|
*
|
||||||
|
* See http://bugs.sun.com/bugdatabase/view_bug.do?bug_id=6916498
|
||||||
|
*
|
||||||
|
* Prevent the RuntimeException that is a static member of AbstractDOMParser
|
||||||
|
* from pinning a webapp classloader by causing it to be set here by a non-webapp classloader.
|
||||||
|
*
|
||||||
|
* Note that according to the bug report, a heap dump may not identify the GCRoot, making
|
||||||
|
* it difficult to identify the cause of the leak.
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
public class DOMLeakPreventer extends AbstractLeakPreventer
|
||||||
|
{
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
/**
|
||||||
|
* @see org.eclipse.jetty.util.preventers.AbstractLeakPreventer#prevent(java.lang.ClassLoader)
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public void prevent(ClassLoader loader)
|
||||||
|
{
|
||||||
|
DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance();
|
||||||
|
try
|
||||||
|
{
|
||||||
|
factory.newDocumentBuilder();
|
||||||
|
}
|
||||||
|
catch (Exception e)
|
||||||
|
{
|
||||||
|
LOG.warn(e);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,37 @@
|
||||||
|
// ========================================================================
|
||||||
|
// Copyright (c) 2012 Mort Bay Consulting Pty. Ltd.
|
||||||
|
// ------------------------------------------------------------------------
|
||||||
|
// All rights reserved. This program and the accompanying materials
|
||||||
|
// are made available under the terms of the Eclipse Public License v1.0
|
||||||
|
// and Apache License v2.0 which accompanies this distribution.
|
||||||
|
// The Eclipse Public License is available at
|
||||||
|
// http://www.eclipse.org/legal/epl-v10.html
|
||||||
|
// The Apache License v2.0 is available at
|
||||||
|
// http://www.opensource.org/licenses/apache2.0.php
|
||||||
|
// You may elect to redistribute this code under either of these licenses.
|
||||||
|
// ========================================================================
|
||||||
|
|
||||||
|
|
||||||
|
package org.eclipse.jetty.util.preventers;
|
||||||
|
|
||||||
|
import java.sql.DriverManager;
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* DriverManagerLeakPreventer
|
||||||
|
*
|
||||||
|
* Cause DriverManager.getCallerClassLoader() to be called, which will pin the classloader.
|
||||||
|
*
|
||||||
|
* Inspired by Tomcat JreMemoryLeakPrevention.
|
||||||
|
*/
|
||||||
|
public class DriverManagerLeakPreventer extends AbstractLeakPreventer
|
||||||
|
{
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
@Override
|
||||||
|
public void prevent(ClassLoader loader)
|
||||||
|
{
|
||||||
|
LOG.debug("Pinning DriverManager classloader with "+loader);
|
||||||
|
DriverManager.getDrivers();
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,60 @@
|
||||||
|
//========================================================================
|
||||||
|
//Copyright 2012 Mort Bay Consulting Pty. Ltd.
|
||||||
|
//------------------------------------------------------------------------
|
||||||
|
//Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
//you may not use this file except in compliance with the License.
|
||||||
|
//You may obtain a copy of the License at
|
||||||
|
//http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//Unless required by applicable law or agreed to in writing, software
|
||||||
|
//distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
//WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
//See the License for the specific language governing permissions and
|
||||||
|
//limitations under the License.
|
||||||
|
//========================================================================
|
||||||
|
|
||||||
|
package org.eclipse.jetty.util.preventers;
|
||||||
|
|
||||||
|
import java.lang.reflect.Method;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* GCThreadLeakPreventer
|
||||||
|
*
|
||||||
|
* Prevents a call to sun.misc.GC.requestLatency pinning a webapp classloader
|
||||||
|
* by calling it with a non-webapp classloader. The problem appears to be that
|
||||||
|
* when this method is called, a daemon thread is created which takes the
|
||||||
|
* context classloader. A known caller of this method is the RMI impl. See
|
||||||
|
* http://stackoverflow.com/questions/6626680/does-java-garbage-collection-log-entry-full-gc-system-mean-some-class-called
|
||||||
|
*
|
||||||
|
* This preventer will start the thread with the longest possible interval, although
|
||||||
|
* subsequent calls can vary that. Recommend to only use this class if you're doing
|
||||||
|
* RMI.
|
||||||
|
*
|
||||||
|
* Inspired by Tomcat JreMemoryLeakPrevention.
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
public class GCThreadLeakPreventer extends AbstractLeakPreventer
|
||||||
|
{
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
/**
|
||||||
|
* @see org.eclipse.jetty.util.preventers.AbstractLeakPreventer#prevent(java.lang.ClassLoader)
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public void prevent(ClassLoader loader)
|
||||||
|
{
|
||||||
|
try
|
||||||
|
{
|
||||||
|
Class clazz = Class.forName("sun.misc.GC");
|
||||||
|
Method requestLatency = clazz.getMethod("requestLatency", new Class[] {long.class});
|
||||||
|
requestLatency.invoke(null, Long.valueOf(Long.MAX_VALUE-1));
|
||||||
|
}
|
||||||
|
catch (ClassNotFoundException e)
|
||||||
|
{
|
||||||
|
LOG.ignore(e);
|
||||||
|
}
|
||||||
|
catch (Exception e)
|
||||||
|
{
|
||||||
|
LOG.warn(e);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,45 @@
|
||||||
|
//========================================================================
|
||||||
|
//Copyright 2012 Mort Bay Consulting Pty. Ltd.
|
||||||
|
//------------------------------------------------------------------------
|
||||||
|
//Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
//you may not use this file except in compliance with the License.
|
||||||
|
//You may obtain a copy of the License at
|
||||||
|
//http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//Unless required by applicable law or agreed to in writing, software
|
||||||
|
//distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
//WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
//See the License for the specific language governing permissions and
|
||||||
|
//limitations under the License.
|
||||||
|
//========================================================================
|
||||||
|
|
||||||
|
package org.eclipse.jetty.util.preventers;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Java2DLeakPreventer
|
||||||
|
*
|
||||||
|
* Prevent pinning of webapp classloader by pre-loading sun.java2d.Disposer class
|
||||||
|
* before webapp classloaders are created.
|
||||||
|
*
|
||||||
|
* See https://issues.apache.org/bugzilla/show_bug.cgi?id=51687
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
public class Java2DLeakPreventer extends AbstractLeakPreventer
|
||||||
|
{
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
/**
|
||||||
|
* @see org.eclipse.jetty.util.preventers.AbstractLeakPreventer#prevent(java.lang.ClassLoader)
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public void prevent(ClassLoader loader)
|
||||||
|
{
|
||||||
|
try
|
||||||
|
{
|
||||||
|
Class.forName("sun.java2d.Disposer", true, loader);
|
||||||
|
}
|
||||||
|
catch (ClassNotFoundException e)
|
||||||
|
{
|
||||||
|
LOG.ignore(e);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,47 @@
|
||||||
|
//========================================================================
|
||||||
|
//Copyright 2012 Mort Bay Consulting Pty. Ltd.
|
||||||
|
//------------------------------------------------------------------------
|
||||||
|
//Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
//you may not use this file except in compliance with the License.
|
||||||
|
//You may obtain a copy of the License at
|
||||||
|
//http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//Unless required by applicable law or agreed to in writing, software
|
||||||
|
//distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
//WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
//See the License for the specific language governing permissions and
|
||||||
|
//limitations under the License.
|
||||||
|
//========================================================================
|
||||||
|
|
||||||
|
package org.eclipse.jetty.util.preventers;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* LDAPLeakPreventer
|
||||||
|
*
|
||||||
|
* If com.sun.jndi.LdapPoolManager class is loaded and the system property
|
||||||
|
* com.sun.jndi.ldap.connect.pool.timeout is set to a nonzero value, a daemon
|
||||||
|
* thread is started which can pin a webapp classloader if it is the first to
|
||||||
|
* load the LdapPoolManager.
|
||||||
|
*
|
||||||
|
* Inspired by Tomcat JreMemoryLeakPrevention
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
public class LDAPLeakPreventer extends AbstractLeakPreventer
|
||||||
|
{
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
/**
|
||||||
|
* @see org.eclipse.jetty.util.preventers.AbstractLeakPreventer#prevent(java.lang.ClassLoader)
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public void prevent(ClassLoader loader)
|
||||||
|
{
|
||||||
|
try
|
||||||
|
{
|
||||||
|
Class.forName("com.sun.jndi.LdapPoolManager", true, loader);
|
||||||
|
}
|
||||||
|
catch (ClassNotFoundException e)
|
||||||
|
{
|
||||||
|
LOG.ignore(e);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,45 @@
|
||||||
|
//========================================================================
|
||||||
|
//Copyright 2012 Mort Bay Consulting Pty. Ltd.
|
||||||
|
//------------------------------------------------------------------------
|
||||||
|
//Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
//you may not use this file except in compliance with the License.
|
||||||
|
//You may obtain a copy of the License at
|
||||||
|
//http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//Unless required by applicable law or agreed to in writing, software
|
||||||
|
//distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
//WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
//See the License for the specific language governing permissions and
|
||||||
|
//limitations under the License.
|
||||||
|
//========================================================================
|
||||||
|
|
||||||
|
package org.eclipse.jetty.util.preventers;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* LoginConfigurationLeakPreventer
|
||||||
|
*
|
||||||
|
* The javax.security.auth.login.Configuration class keeps a static reference to the
|
||||||
|
* thread context classloader. We prevent a webapp context classloader being used for
|
||||||
|
* that by invoking the classloading here.
|
||||||
|
*
|
||||||
|
* Inspired by Tomcat JreMemoryLeakPrevention
|
||||||
|
*/
|
||||||
|
public class LoginConfigurationLeakPreventer extends AbstractLeakPreventer
|
||||||
|
{
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
/**
|
||||||
|
* @see org.eclipse.jetty.util.preventers.AbstractLeakPreventer#prevent(java.lang.ClassLoader)
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public void prevent(ClassLoader loader)
|
||||||
|
{
|
||||||
|
try
|
||||||
|
{
|
||||||
|
Class.forName("javax.security.auth.login.Configuration", true, loader);
|
||||||
|
}
|
||||||
|
catch (ClassNotFoundException e)
|
||||||
|
{
|
||||||
|
LOG.warn(e);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,40 @@
|
||||||
|
//========================================================================
|
||||||
|
//Copyright 2012 Mort Bay Consulting Pty. Ltd.
|
||||||
|
//------------------------------------------------------------------------
|
||||||
|
//Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
//you may not use this file except in compliance with the License.
|
||||||
|
//You may obtain a copy of the License at
|
||||||
|
//http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
//Unless required by applicable law or agreed to in writing, software
|
||||||
|
//distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
//WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
//See the License for the specific language governing permissions and
|
||||||
|
//limitations under the License.
|
||||||
|
//========================================================================
|
||||||
|
|
||||||
|
package org.eclipse.jetty.util.preventers;
|
||||||
|
|
||||||
|
import java.security.Security;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* SecurityProviderLeakPreventer
|
||||||
|
*
|
||||||
|
* Some security providers, such as sun.security.pkcs11.SunPKCS11 start a deamon thread,
|
||||||
|
* which will use the thread context classloader. Load them here to ensure the classloader
|
||||||
|
* is not a webapp classloader.
|
||||||
|
*
|
||||||
|
* Inspired by Tomcat JreMemoryLeakPrevention
|
||||||
|
*/
|
||||||
|
public class SecurityProviderLeakPreventer extends AbstractLeakPreventer
|
||||||
|
{
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
/**
|
||||||
|
* @see org.eclipse.jetty.util.preventers.AbstractLeakPreventer#prevent(java.lang.ClassLoader)
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public void prevent(ClassLoader loader)
|
||||||
|
{
|
||||||
|
Security.getProviders();
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -19,6 +19,7 @@ import java.net.MalformedURLException;
|
||||||
import java.net.URL;
|
import java.net.URL;
|
||||||
import java.util.ArrayList;
|
import java.util.ArrayList;
|
||||||
import java.util.Enumeration;
|
import java.util.Enumeration;
|
||||||
|
import java.util.List;
|
||||||
import java.util.jar.JarEntry;
|
import java.util.jar.JarEntry;
|
||||||
import java.util.jar.JarFile;
|
import java.util.jar.JarFile;
|
||||||
|
|
||||||
|
@ -108,7 +109,7 @@ class JarFileResource extends JarResource
|
||||||
|
|
||||||
/* ------------------------------------------------------------ */
|
/* ------------------------------------------------------------ */
|
||||||
/**
|
/**
|
||||||
* Returns true if the respresenetd resource exists.
|
* Returns true if the represented resource exists.
|
||||||
*/
|
*/
|
||||||
@Override
|
@Override
|
||||||
public boolean exists()
|
public boolean exists()
|
||||||
|
@ -240,68 +241,102 @@ class JarFileResource extends JarResource
|
||||||
@Override
|
@Override
|
||||||
public synchronized String[] list()
|
public synchronized String[] list()
|
||||||
{
|
{
|
||||||
|
if (isDirectory() && _list==null)
|
||||||
if(isDirectory() && _list==null)
|
|
||||||
{
|
{
|
||||||
ArrayList<String> list = new ArrayList<>(32);
|
List<String> list = null;
|
||||||
|
try
|
||||||
checkConnection();
|
|
||||||
|
|
||||||
JarFile jarFile=_jarFile;
|
|
||||||
if(jarFile==null)
|
|
||||||
{
|
{
|
||||||
try
|
list = listEntries();
|
||||||
{
|
}
|
||||||
JarURLConnection jc=(JarURLConnection)((new URL(_jarUrl)).openConnection());
|
catch (Exception e)
|
||||||
jc.setUseCaches(getUseCaches());
|
{
|
||||||
jarFile=jc.getJarFile();
|
//Sun's JarURLConnection impl for jar: protocol will close a JarFile in its connect() method if
|
||||||
}
|
//useCaches == false (eg someone called URLConnection with defaultUseCaches==true).
|
||||||
catch(Exception e)
|
//As their sun.net.www.protocol.jar package caches JarFiles and/or connections, we can wind up in
|
||||||
{
|
//the situation where the JarFile we have remembered in our _jarFile member has actually been closed
|
||||||
LOG.ignore(e);
|
//by other code.
|
||||||
}
|
//So, do one retry to drop a connection and get a fresh JarFile
|
||||||
if(jarFile==null)
|
LOG.warn("Retrying list:"+e);
|
||||||
throw new IllegalStateException();
|
LOG.debug(e);
|
||||||
|
release();
|
||||||
|
list = listEntries();
|
||||||
}
|
}
|
||||||
|
|
||||||
Enumeration<JarEntry> e=jarFile.entries();
|
if (list != null)
|
||||||
String dir=_urlString.substring(_urlString.indexOf("!/")+2);
|
|
||||||
while(e.hasMoreElements())
|
|
||||||
{
|
{
|
||||||
JarEntry entry = e.nextElement();
|
_list=new String[list.size()];
|
||||||
String name=entry.getName().replace('\\','/');
|
list.toArray(_list);
|
||||||
if(!name.startsWith(dir) || name.length()==dir.length())
|
|
||||||
{
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
String listName=name.substring(dir.length());
|
|
||||||
int dash=listName.indexOf('/');
|
|
||||||
if (dash>=0)
|
|
||||||
{
|
|
||||||
//when listing jar:file urls, you get back one
|
|
||||||
//entry for the dir itself, which we ignore
|
|
||||||
if (dash==0 && listName.length()==1)
|
|
||||||
continue;
|
|
||||||
//when listing jar:file urls, all files and
|
|
||||||
//subdirs have a leading /, which we remove
|
|
||||||
if (dash==0)
|
|
||||||
listName=listName.substring(dash+1, listName.length());
|
|
||||||
else
|
|
||||||
listName=listName.substring(0,dash+1);
|
|
||||||
|
|
||||||
if (list.contains(listName))
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
|
|
||||||
list.add(listName);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
_list=new String[list.size()];
|
|
||||||
list.toArray(_list);
|
|
||||||
}
|
}
|
||||||
return _list;
|
return _list;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
private List<String> listEntries ()
|
||||||
|
{
|
||||||
|
checkConnection();
|
||||||
|
|
||||||
|
ArrayList<String> list = new ArrayList<String>(32);
|
||||||
|
JarFile jarFile=_jarFile;
|
||||||
|
if(jarFile==null)
|
||||||
|
{
|
||||||
|
try
|
||||||
|
{
|
||||||
|
JarURLConnection jc=(JarURLConnection)((new URL(_jarUrl)).openConnection());
|
||||||
|
jc.setUseCaches(getUseCaches());
|
||||||
|
jarFile=jc.getJarFile();
|
||||||
|
}
|
||||||
|
catch(Exception e)
|
||||||
|
{
|
||||||
|
|
||||||
|
e.printStackTrace();
|
||||||
|
LOG.ignore(e);
|
||||||
|
}
|
||||||
|
if(jarFile==null)
|
||||||
|
throw new IllegalStateException();
|
||||||
|
}
|
||||||
|
|
||||||
|
Enumeration e=jarFile.entries();
|
||||||
|
String dir=_urlString.substring(_urlString.indexOf("!/")+2);
|
||||||
|
while(e.hasMoreElements())
|
||||||
|
{
|
||||||
|
|
||||||
|
JarEntry entry = (JarEntry) e.nextElement();
|
||||||
|
String name=entry.getName().replace('\\','/');
|
||||||
|
if(!name.startsWith(dir) || name.length()==dir.length())
|
||||||
|
{
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
String listName=name.substring(dir.length());
|
||||||
|
int dash=listName.indexOf('/');
|
||||||
|
if (dash>=0)
|
||||||
|
{
|
||||||
|
//when listing jar:file urls, you get back one
|
||||||
|
//entry for the dir itself, which we ignore
|
||||||
|
if (dash==0 && listName.length()==1)
|
||||||
|
continue;
|
||||||
|
//when listing jar:file urls, all files and
|
||||||
|
//subdirs have a leading /, which we remove
|
||||||
|
if (dash==0)
|
||||||
|
listName=listName.substring(dash+1, listName.length());
|
||||||
|
else
|
||||||
|
listName=listName.substring(0,dash+1);
|
||||||
|
|
||||||
|
if (list.contains(listName))
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
list.add(listName);
|
||||||
|
}
|
||||||
|
|
||||||
|
return list;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
/* ------------------------------------------------------------ */
|
/* ------------------------------------------------------------ */
|
||||||
/**
|
/**
|
||||||
* Return the length of the resource
|
* Return the length of the resource
|
||||||
|
|
|
@ -77,18 +77,28 @@ public class StdErrLogTest
|
||||||
log.debug("YOU SHOULD NOT SEE THIS!",null,null);
|
log.debug("YOU SHOULD NOT SEE THIS!",null,null);
|
||||||
|
|
||||||
// Test for backward compat with old (now deprecated) method
|
// Test for backward compat with old (now deprecated) method
|
||||||
|
Logger before = log.getLogger("before");
|
||||||
log.setDebugEnabled(true);
|
log.setDebugEnabled(true);
|
||||||
|
Logger after = log.getLogger("after");
|
||||||
|
before.debug("testing {} {}","test","debug-before");
|
||||||
log.debug("testing {} {}","test","debug-deprecated");
|
log.debug("testing {} {}","test","debug-deprecated");
|
||||||
|
after.debug("testing {} {}","test","debug-after");
|
||||||
|
|
||||||
log.setDebugEnabled(false);
|
log.setDebugEnabled(false);
|
||||||
|
before.debug("testing {} {}","test","debug-before-false");
|
||||||
log.debug("testing {} {}","test","debug-deprecated-false");
|
log.debug("testing {} {}","test","debug-deprecated-false");
|
||||||
|
after.debug("testing {} {}","test","debug-after-false");
|
||||||
|
|
||||||
output.assertContains("DBUG:xxx:tname: testing test debug");
|
output.assertContains("DBUG:xxx:tname: testing test debug");
|
||||||
output.assertContains("INFO:xxx:tname: testing test info");
|
output.assertContains("INFO:xxx:tname: testing test info");
|
||||||
output.assertContains("WARN:xxx:tname: testing test warn");
|
output.assertContains("WARN:xxx:tname: testing test warn");
|
||||||
output.assertNotContains("YOU SHOULD NOT SEE THIS!");
|
output.assertNotContains("YOU SHOULD NOT SEE THIS!");
|
||||||
output.assertContains("DBUG:xxx:tname: testing test debug-deprecated");
|
output.assertContains("DBUG:x.before:tname:testing test debug-before");
|
||||||
output.assertNotContains("DBUG:xxx:tname: testing test debug-depdeprecated-false");
|
output.assertNotContains("DBUG:xxx:tname: testing test debug-depdeprecated-false");
|
||||||
|
output.assertContains("DBUG:x.after:testing test debug-after");
|
||||||
|
output.assertNotContains("DBUG:x.before:tname:testing test debug-before-false");
|
||||||
|
output.assertNotContains("DBUG:xxx:tname:testing test debug-deprecated-false");
|
||||||
|
output.assertNotContains("DBUG:x.after:tname:testing test debug-after-false");
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
|
44
pom.xml
44
pom.xml
|
@ -51,7 +51,7 @@
|
||||||
</goals>
|
</goals>
|
||||||
<configuration>
|
<configuration>
|
||||||
<resourceBundles>
|
<resourceBundles>
|
||||||
<resourceBundle>org.eclipse.jetty.toolchain:jetty-artifact-remote-resources:1.0</resourceBundle>
|
<resourceBundle>org.eclipse.jetty.toolchain:jetty-artifact-remote-resources:1.1</resourceBundle>
|
||||||
</resourceBundles>
|
</resourceBundles>
|
||||||
</configuration>
|
</configuration>
|
||||||
</execution>
|
</execution>
|
||||||
|
@ -623,5 +623,47 @@
|
||||||
</plugins>
|
</plugins>
|
||||||
</build>
|
</build>
|
||||||
</profile>
|
</profile>
|
||||||
|
<profile>
|
||||||
|
<id>license-check</id>
|
||||||
|
<build>
|
||||||
|
<plugins>
|
||||||
|
<plugin>
|
||||||
|
<inherited>false</inherited>
|
||||||
|
<groupId>com.mycila.maven-license-plugin</groupId>
|
||||||
|
<artifactId>maven-license-plugin</artifactId>
|
||||||
|
<version>1.10.b1</version>
|
||||||
|
<configuration>
|
||||||
|
<header>header-template.txt</header>
|
||||||
|
<failIfMissing>true</failIfMissing>
|
||||||
|
<aggregate>true</aggregate>
|
||||||
|
<strictCheck>true</strictCheck>
|
||||||
|
<properties>
|
||||||
|
<copyright-range>${project.inceptionYear}-2012</copyright-range>
|
||||||
|
</properties>
|
||||||
|
<mapping>
|
||||||
|
<java>DOUBLESLASH_STYLE</java>
|
||||||
|
</mapping>
|
||||||
|
<includes>
|
||||||
|
<include>**/*.java</include>
|
||||||
|
</includes>
|
||||||
|
<excludes>
|
||||||
|
<exclude>jetty-util/src/main/java/org/eclipse/jetty/util/security/UnixCrypt.java</exclude>
|
||||||
|
<exclude>jetty-policy/src/main/java/org/eclipse/jetty/policy/loader/DefaultPolicyLoader.java</exclude>
|
||||||
|
<exclude>jetty-policy/src/main/java/org/eclipse/jetty/policy/loader/PolicyFileScanner.java</exclude>
|
||||||
|
</excludes>
|
||||||
|
</configuration>
|
||||||
|
<executions>
|
||||||
|
<execution>
|
||||||
|
<id>check-headers</id>
|
||||||
|
<phase>verify</phase>
|
||||||
|
<goals>
|
||||||
|
<goal>check</goal>
|
||||||
|
</goals>
|
||||||
|
</execution>
|
||||||
|
</executions>
|
||||||
|
</plugin>
|
||||||
|
</plugins>
|
||||||
|
</build>
|
||||||
|
</profile>
|
||||||
</profiles>
|
</profiles>
|
||||||
</project>
|
</project>
|
||||||
|
|
Loading…
Reference in New Issue