Merge remote-tracking branch 'origin/jetty-10.0.x' into jetty-11.0.x
This commit is contained in:
commit
acdb6ccfee
|
@ -195,6 +195,8 @@ public class HttpRequest implements Request
|
|||
String rawPath = uri.getRawPath();
|
||||
if (rawPath == null)
|
||||
rawPath = "";
|
||||
if (!rawPath.startsWith("/"))
|
||||
rawPath = "/" + rawPath;
|
||||
this.path = rawPath;
|
||||
String query = uri.getRawQuery();
|
||||
if (query != null)
|
||||
|
@ -949,14 +951,14 @@ public class HttpRequest implements Request
|
|||
return result;
|
||||
}
|
||||
|
||||
private URI newURI(String uri)
|
||||
private URI newURI(String path)
|
||||
{
|
||||
try
|
||||
{
|
||||
// Handle specially the "OPTIONS *" case, since it is possible to create a URI from "*" (!).
|
||||
if ("*".equals(uri))
|
||||
if ("*".equals(path))
|
||||
return null;
|
||||
URI result = new URI(uri);
|
||||
URI result = new URI(path);
|
||||
return result.isOpaque() ? null : result;
|
||||
}
|
||||
catch (URISyntaxException x)
|
||||
|
|
|
@ -24,8 +24,10 @@ import java.net.SocketException;
|
|||
import java.net.URLEncoder;
|
||||
import java.nio.charset.StandardCharsets;
|
||||
import java.util.Locale;
|
||||
import java.util.concurrent.CountDownLatch;
|
||||
import java.util.concurrent.ExecutionException;
|
||||
import java.util.concurrent.TimeUnit;
|
||||
import java.util.concurrent.atomic.AtomicReference;
|
||||
|
||||
import jakarta.servlet.ServletException;
|
||||
import jakarta.servlet.http.HttpServletRequest;
|
||||
|
@ -36,6 +38,8 @@ import org.eclipse.jetty.http.HttpField;
|
|||
import org.eclipse.jetty.http.HttpHeader;
|
||||
import org.eclipse.jetty.http.HttpMethod;
|
||||
import org.eclipse.jetty.http.HttpStatus;
|
||||
import org.eclipse.jetty.http.UriCompliance;
|
||||
import org.eclipse.jetty.server.HttpConfiguration;
|
||||
import org.eclipse.jetty.server.handler.AbstractHandler;
|
||||
import org.eclipse.jetty.toolchain.test.Net;
|
||||
import org.eclipse.jetty.util.Fields;
|
||||
|
@ -77,6 +81,52 @@ public class HttpClientURITest extends AbstractHttpClientServerTest
|
|||
assertEquals(HttpStatus.OK_200, request.send().getStatus());
|
||||
}
|
||||
|
||||
@ParameterizedTest
|
||||
@ArgumentsSource(ScenarioProvider.class)
|
||||
public void testPathWithPathParameter(Scenario scenario) throws Exception
|
||||
{
|
||||
AtomicReference<CountDownLatch> serverLatchRef = new AtomicReference<>();
|
||||
start(scenario, new EmptyServerHandler()
|
||||
{
|
||||
@Override
|
||||
protected void service(String target, org.eclipse.jetty.server.Request jettyRequest, HttpServletRequest request, HttpServletResponse response)
|
||||
{
|
||||
if (jettyRequest.getHttpURI().hasAmbiguousEmptySegment())
|
||||
response.setStatus(400);
|
||||
serverLatchRef.get().countDown();
|
||||
}
|
||||
});
|
||||
// Allow empty segments to test them.
|
||||
connector.getContainedBeans(HttpConfiguration.class)
|
||||
.forEach(httpConfig -> httpConfig.setUriCompliance(UriCompliance.from("DEFAULT,AMBIGUOUS_EMPTY_SEGMENT")));
|
||||
|
||||
serverLatchRef.set(new CountDownLatch(1));
|
||||
ContentResponse response1 = client.newRequest("localhost", connector.getLocalPort())
|
||||
.scheme(scenario.getScheme())
|
||||
.path("/url;p=v")
|
||||
.send();
|
||||
assertEquals(HttpStatus.OK_200, response1.getStatus());
|
||||
assertTrue(serverLatchRef.get().await(5, TimeUnit.SECONDS));
|
||||
|
||||
// Ambiguous empty segment.
|
||||
serverLatchRef.set(new CountDownLatch(1));
|
||||
ContentResponse response2 = client.newRequest("localhost", connector.getLocalPort())
|
||||
.scheme(scenario.getScheme())
|
||||
.path(";p=v/url")
|
||||
.send();
|
||||
assertEquals(HttpStatus.BAD_REQUEST_400, response2.getStatus());
|
||||
assertTrue(serverLatchRef.get().await(5, TimeUnit.SECONDS));
|
||||
|
||||
// Ambiguous empty segment.
|
||||
serverLatchRef.set(new CountDownLatch(1));
|
||||
ContentResponse response3 = client.newRequest("localhost", connector.getLocalPort())
|
||||
.scheme(scenario.getScheme())
|
||||
.path(";@host.org/url")
|
||||
.send();
|
||||
assertEquals(HttpStatus.BAD_REQUEST_400, response3.getStatus());
|
||||
assertTrue(serverLatchRef.get().await(5, TimeUnit.SECONDS));
|
||||
}
|
||||
|
||||
@ParameterizedTest
|
||||
@ArgumentsSource(ScenarioProvider.class)
|
||||
public void testIDNHost(Scenario scenario) throws Exception
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
<name>Jetty :: GCloud</name>
|
||||
|
||||
<properties>
|
||||
<gcloud.version>2.5.0</gcloud.version>
|
||||
<gcloud.version>2.5.1</gcloud.version>
|
||||
</properties>
|
||||
|
||||
<modules>
|
||||
|
|
|
@ -119,7 +119,7 @@ public interface HttpURI
|
|||
static Immutable from(String method, String uri)
|
||||
{
|
||||
if (HttpMethod.CONNECT.is(method))
|
||||
return new Immutable(uri);
|
||||
return HttpURI.build().uri(method, uri).asImmutable();
|
||||
if (uri.startsWith("/"))
|
||||
return HttpURI.build().pathQuery(uri).asImmutable();
|
||||
return HttpURI.from(uri);
|
||||
|
@ -628,6 +628,8 @@ public interface HttpURI
|
|||
*/
|
||||
public Mutable authority(String host, int port)
|
||||
{
|
||||
if (host != null && !isPathValidForAuthority(_path))
|
||||
throw new IllegalArgumentException("Relative path with authority");
|
||||
_user = null;
|
||||
_host = host;
|
||||
_port = port;
|
||||
|
@ -636,12 +638,14 @@ public interface HttpURI
|
|||
}
|
||||
|
||||
/**
|
||||
* @param hostport the host and port combined
|
||||
* @param hostPort the host and port combined
|
||||
* @return this mutable
|
||||
*/
|
||||
public Mutable authority(String hostport)
|
||||
public Mutable authority(String hostPort)
|
||||
{
|
||||
HostPort hp = new HostPort(hostport);
|
||||
if (hostPort != null && !isPathValidForAuthority(_path))
|
||||
throw new IllegalArgumentException("Relative path with authority");
|
||||
HostPort hp = new HostPort(hostPort);
|
||||
_user = null;
|
||||
_host = hp.getHost();
|
||||
_port = hp.getPort();
|
||||
|
@ -649,6 +653,15 @@ public interface HttpURI
|
|||
return this;
|
||||
}
|
||||
|
||||
private boolean isPathValidForAuthority(String path)
|
||||
{
|
||||
if (path == null)
|
||||
return true;
|
||||
if (path.isEmpty() || "*".equals(path))
|
||||
return true;
|
||||
return path.startsWith("/");
|
||||
}
|
||||
|
||||
public Mutable clear()
|
||||
{
|
||||
_scheme = null;
|
||||
|
@ -775,6 +788,8 @@ public interface HttpURI
|
|||
|
||||
public Mutable host(String host)
|
||||
{
|
||||
if (host != null && !isPathValidForAuthority(_path))
|
||||
throw new IllegalArgumentException("Relative path with authority");
|
||||
_host = host;
|
||||
_uri = null;
|
||||
return this;
|
||||
|
@ -834,10 +849,12 @@ public interface HttpURI
|
|||
|
||||
/**
|
||||
* @param path the path
|
||||
* @return this Mutuble
|
||||
* @return this Mutable
|
||||
*/
|
||||
public Mutable path(String path)
|
||||
{
|
||||
if (hasAuthority() && !isPathValidForAuthority(path))
|
||||
throw new IllegalArgumentException("Relative path with authority");
|
||||
_uri = null;
|
||||
_path = path;
|
||||
_decodedPath = null;
|
||||
|
@ -846,6 +863,8 @@ public interface HttpURI
|
|||
|
||||
public Mutable pathQuery(String pathQuery)
|
||||
{
|
||||
if (hasAuthority() && !isPathValidForAuthority(pathQuery))
|
||||
throw new IllegalArgumentException("Relative path with authority");
|
||||
_uri = null;
|
||||
_path = null;
|
||||
_decodedPath = null;
|
||||
|
@ -911,10 +930,7 @@ public interface HttpURI
|
|||
_query = uri.getQuery();
|
||||
_uri = null;
|
||||
_decodedPath = uri.getDecodedPath();
|
||||
if (uri.hasAmbiguousSeparator())
|
||||
_violations.add(Violation.AMBIGUOUS_PATH_SEPARATOR);
|
||||
if (uri.hasAmbiguousSegment())
|
||||
_violations.add(Violation.AMBIGUOUS_PATH_SEGMENT);
|
||||
_violations.addAll(uri.getViolations());
|
||||
return this;
|
||||
}
|
||||
|
||||
|
@ -931,8 +947,7 @@ public interface HttpURI
|
|||
if (HttpMethod.CONNECT.is(method))
|
||||
{
|
||||
clear();
|
||||
_uri = uri;
|
||||
_path = uri;
|
||||
parse(State.HOST, uri);
|
||||
}
|
||||
else if (uri.startsWith("/"))
|
||||
{
|
||||
|
|
|
@ -177,6 +177,32 @@ public class HttpURITest
|
|||
assertThat(uri.getPath(), is("/bar"));
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testCONNECT()
|
||||
{
|
||||
HttpURI uri;
|
||||
|
||||
uri = HttpURI.from("CONNECT", "host:80");
|
||||
assertThat(uri.getHost(), is("host"));
|
||||
assertThat(uri.getPort(), is(80));
|
||||
assertThat(uri.getPath(), nullValue());
|
||||
|
||||
uri = HttpURI.from("CONNECT", "host");
|
||||
assertThat(uri.getHost(), is("host"));
|
||||
assertThat(uri.getPort(), is(-1));
|
||||
assertThat(uri.getPath(), nullValue());
|
||||
|
||||
uri = HttpURI.from("CONNECT", "192.168.0.1:8080");
|
||||
assertThat(uri.getHost(), is("192.168.0.1"));
|
||||
assertThat(uri.getPort(), is(8080));
|
||||
assertThat(uri.getPath(), nullValue());
|
||||
|
||||
uri = HttpURI.from("CONNECT", "[::1]:8080");
|
||||
assertThat(uri.getHost(), is("[::1]"));
|
||||
assertThat(uri.getPort(), is(8080));
|
||||
assertThat(uri.getPath(), nullValue());
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testAt()
|
||||
{
|
||||
|
@ -824,4 +850,46 @@ public class HttpURITest
|
|||
HttpURI httpURI = HttpURI.build(input);
|
||||
assertThat("[" + input + "] .query", httpURI.getQuery(), is(expectedQuery));
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testRelativePathWithAuthority()
|
||||
{
|
||||
assertThrows(IllegalArgumentException.class, () -> HttpURI.build()
|
||||
.authority("host")
|
||||
.path("path"));
|
||||
assertThrows(IllegalArgumentException.class, () -> HttpURI.build()
|
||||
.authority("host", 8080)
|
||||
.path(";p=v/url"));
|
||||
assertThrows(IllegalArgumentException.class, () -> HttpURI.build()
|
||||
.host("host")
|
||||
.path(";"));
|
||||
|
||||
assertThrows(IllegalArgumentException.class, () -> HttpURI.build()
|
||||
.path("path")
|
||||
.authority("host"));
|
||||
assertThrows(IllegalArgumentException.class, () -> HttpURI.build()
|
||||
.path(";p=v/url")
|
||||
.authority("host", 8080));
|
||||
assertThrows(IllegalArgumentException.class, () -> HttpURI.build()
|
||||
.path(";")
|
||||
.host("host"));
|
||||
|
||||
HttpURI.Mutable uri = HttpURI.build()
|
||||
.path("*")
|
||||
.authority("host");
|
||||
assertEquals("//host*", uri.asString());
|
||||
uri = HttpURI.build()
|
||||
.authority("host")
|
||||
.path("*");
|
||||
assertEquals("//host*", uri.asString());
|
||||
|
||||
uri = HttpURI.build()
|
||||
.path("")
|
||||
.authority("host");
|
||||
assertEquals("//host", uri.asString());
|
||||
uri = HttpURI.build()
|
||||
.authority("host")
|
||||
.path("");
|
||||
assertEquals("//host", uri.asString());
|
||||
}
|
||||
}
|
||||
|
|
|
@ -33,8 +33,6 @@ import jakarta.servlet.http.HttpServletResponse;
|
|||
import org.eclipse.jetty.http.HttpHeader;
|
||||
import org.eclipse.jetty.http.HttpHeaderValue;
|
||||
import org.eclipse.jetty.http.HttpMethod;
|
||||
import org.eclipse.jetty.http.HttpURI;
|
||||
import org.eclipse.jetty.http.HttpVersion;
|
||||
import org.eclipse.jetty.io.ByteBufferPool;
|
||||
import org.eclipse.jetty.io.Connection;
|
||||
import org.eclipse.jetty.io.EndPoint;
|
||||
|
@ -193,12 +191,7 @@ public class ConnectHandler extends HandlerWrapper
|
|||
String tunnelProtocol = jettyRequest.getMetaData().getProtocol();
|
||||
if (HttpMethod.CONNECT.is(request.getMethod()) && tunnelProtocol == null)
|
||||
{
|
||||
String serverAddress = target;
|
||||
if (HttpVersion.HTTP_2.is(request.getProtocol()))
|
||||
{
|
||||
HttpURI httpURI = jettyRequest.getHttpURI();
|
||||
serverAddress = httpURI.getHost() + ":" + httpURI.getPort();
|
||||
}
|
||||
String serverAddress = jettyRequest.getHttpURI().getAuthority();
|
||||
if (LOG.isDebugEnabled())
|
||||
LOG.debug("CONNECT request for {}", serverAddress);
|
||||
handleConnect(jettyRequest, request, response, serverAddress);
|
||||
|
|
|
@ -1749,6 +1749,7 @@ public class Request implements HttpServletRequest
|
|||
if (field instanceof HostPortHttpField)
|
||||
{
|
||||
HostPortHttpField authority = (HostPortHttpField)field;
|
||||
|
||||
builder.host(authority.getHost()).port(authority.getPort());
|
||||
}
|
||||
else
|
||||
|
|
2
pom.xml
2
pom.xml
|
@ -41,7 +41,7 @@
|
|||
<commons-lang3.version>3.12.0</commons-lang3.version>
|
||||
<conscrypt.version>2.5.2</conscrypt.version>
|
||||
<disruptor.version>3.4.2</disruptor.version>
|
||||
<felix.version>7.0.3</felix.version>
|
||||
<felix.version>7.0.4</felix.version>
|
||||
<findbugs.jsr305.version>3.0.2</findbugs.jsr305.version>
|
||||
<google.errorprone.version>2.13.1</google.errorprone.version>
|
||||
<grpc.version>1.46.0</grpc.version>
|
||||
|
|
|
@ -118,8 +118,7 @@ public class HttpClientLoadTest extends AbstractTest<HttpClientLoadTest.LoadTran
|
|||
public void testConcurrent(Transport transport) throws Exception
|
||||
{
|
||||
// TODO: cannot run HTTP/3 (or UDP) in Jenkins.
|
||||
if ("ci".equals(System.getProperty("env")))
|
||||
Assumptions.assumeTrue(transport != Transport.H3);
|
||||
Assumptions.assumeTrue(transport != Transport.H3);
|
||||
|
||||
init(transport);
|
||||
scenario.start(new LoadHandler(), client ->
|
||||
|
|
Loading…
Reference in New Issue