Merged branch 'jetty-9.2.x' into 'master'.
This commit is contained in:
commit
e8c88cfd9c
|
@ -61,6 +61,7 @@ import org.eclipse.jetty.client.util.BufferingResponseListener;
|
||||||
import org.eclipse.jetty.client.util.BytesContentProvider;
|
import org.eclipse.jetty.client.util.BytesContentProvider;
|
||||||
import org.eclipse.jetty.client.util.DeferredContentProvider;
|
import org.eclipse.jetty.client.util.DeferredContentProvider;
|
||||||
import org.eclipse.jetty.client.util.FutureResponseListener;
|
import org.eclipse.jetty.client.util.FutureResponseListener;
|
||||||
|
import org.eclipse.jetty.client.util.StringContentProvider;
|
||||||
import org.eclipse.jetty.http.HttpField;
|
import org.eclipse.jetty.http.HttpField;
|
||||||
import org.eclipse.jetty.http.HttpHeader;
|
import org.eclipse.jetty.http.HttpHeader;
|
||||||
import org.eclipse.jetty.http.HttpHeaderValue;
|
import org.eclipse.jetty.http.HttpHeaderValue;
|
||||||
|
@ -1300,4 +1301,79 @@ public class HttpClientTest extends AbstractHttpClientServerTest
|
||||||
Assert.assertEquals(200, response.getStatus());
|
Assert.assertEquals(200, response.getStatus());
|
||||||
Assert.assertArrayEquals(data, response.getContent());
|
Assert.assertArrayEquals(data, response.getContent());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testRequestRetries() throws Exception
|
||||||
|
{
|
||||||
|
final int maxRetries = 3;
|
||||||
|
final AtomicInteger requests = new AtomicInteger();
|
||||||
|
start(new AbstractHandler()
|
||||||
|
{
|
||||||
|
@Override
|
||||||
|
public void handle(String target, org.eclipse.jetty.server.Request baseRequest, HttpServletRequest request, HttpServletResponse response) throws IOException, ServletException
|
||||||
|
{
|
||||||
|
int count = requests.incrementAndGet();
|
||||||
|
if (count == maxRetries)
|
||||||
|
baseRequest.setHandled(true);
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
final CountDownLatch latch = new CountDownLatch(1);
|
||||||
|
new RetryListener(client, scheme, "localhost", connector.getLocalPort(), maxRetries)
|
||||||
|
{
|
||||||
|
@Override
|
||||||
|
protected void completed(Result result)
|
||||||
|
{
|
||||||
|
latch.countDown();
|
||||||
|
}
|
||||||
|
}.perform();
|
||||||
|
|
||||||
|
Assert.assertTrue(latch.await(5, TimeUnit.SECONDS));
|
||||||
|
}
|
||||||
|
|
||||||
|
public static abstract class RetryListener implements Response.CompleteListener
|
||||||
|
{
|
||||||
|
private final HttpClient client;
|
||||||
|
private final String scheme;
|
||||||
|
private final String host;
|
||||||
|
private final int port;
|
||||||
|
private final int maxRetries;
|
||||||
|
private int retries;
|
||||||
|
|
||||||
|
public RetryListener(HttpClient client, String scheme, String host, int port, int maxRetries)
|
||||||
|
{
|
||||||
|
this.client = client;
|
||||||
|
this.scheme = scheme;
|
||||||
|
this.host = host;
|
||||||
|
this.port = port;
|
||||||
|
this.maxRetries = maxRetries;
|
||||||
|
}
|
||||||
|
|
||||||
|
protected abstract void completed(Result result);
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onComplete(Result result)
|
||||||
|
{
|
||||||
|
if (retries > maxRetries || result.isSucceeded() && result.getResponse().getStatus() == 200)
|
||||||
|
completed(result);
|
||||||
|
else
|
||||||
|
retry();
|
||||||
|
}
|
||||||
|
|
||||||
|
private void retry()
|
||||||
|
{
|
||||||
|
++retries;
|
||||||
|
perform();
|
||||||
|
}
|
||||||
|
|
||||||
|
public void perform()
|
||||||
|
{
|
||||||
|
client.newRequest(host, port)
|
||||||
|
.scheme(scheme)
|
||||||
|
.method("POST")
|
||||||
|
.param("attempt", String.valueOf(retries))
|
||||||
|
.content(new StringContentProvider("0123456789ABCDEF"))
|
||||||
|
.send(this);
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -520,7 +520,9 @@ public class SslConnection extends AbstractConnection
|
||||||
HandshakeStatus unwrapHandshakeStatus = unwrapResult.getHandshakeStatus();
|
HandshakeStatus unwrapHandshakeStatus = unwrapResult.getHandshakeStatus();
|
||||||
Status unwrapResultStatus = unwrapResult.getStatus();
|
Status unwrapResultStatus = unwrapResult.getStatus();
|
||||||
|
|
||||||
_underFlown = unwrapResultStatus == Status.BUFFER_UNDERFLOW;
|
// Extra check on unwrapResultStatus == OK with zero length buffer is due
|
||||||
|
// to SSL client on android (see bug #454773)
|
||||||
|
_underFlown = unwrapResultStatus == Status.BUFFER_UNDERFLOW || unwrapResultStatus == Status.OK && unwrapResult.bytesConsumed()==0 && unwrapResult.bytesProduced()==0;
|
||||||
|
|
||||||
if (_underFlown)
|
if (_underFlown)
|
||||||
{
|
{
|
||||||
|
|
|
@ -38,5 +38,18 @@
|
||||||
<groupId>org.eclipse.jetty.orbit</groupId>
|
<groupId>org.eclipse.jetty.orbit</groupId>
|
||||||
<artifactId>javax.security.auth.message</artifactId>
|
<artifactId>javax.security.auth.message</artifactId>
|
||||||
</dependency>
|
</dependency>
|
||||||
|
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.apache.geronimo.components</groupId>
|
||||||
|
<artifactId>geronimo-jaspi</artifactId>
|
||||||
|
<version>2.0.0</version>
|
||||||
|
<exclusions>
|
||||||
|
<exclusion>
|
||||||
|
<groupId>org.apache.geronimo.specs</groupId>
|
||||||
|
<artifactId>geronimo-jaspic_1.0_spec</artifactId>
|
||||||
|
</exclusion>
|
||||||
|
</exclusions>
|
||||||
|
<scope>test</scope>
|
||||||
|
</dependency>
|
||||||
</dependencies>
|
</dependencies>
|
||||||
</project>
|
</project>
|
||||||
|
|
|
@ -18,6 +18,7 @@
|
||||||
|
|
||||||
package org.eclipse.jetty.security.jaspi;
|
package org.eclipse.jetty.security.jaspi;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
import java.security.Principal;
|
import java.security.Principal;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
|
@ -32,6 +33,7 @@ import javax.security.auth.message.config.ServerAuthContext;
|
||||||
import javax.servlet.ServletRequest;
|
import javax.servlet.ServletRequest;
|
||||||
import javax.servlet.ServletResponse;
|
import javax.servlet.ServletResponse;
|
||||||
import javax.servlet.http.HttpServletRequest;
|
import javax.servlet.http.HttpServletRequest;
|
||||||
|
import javax.servlet.http.HttpServletResponse;
|
||||||
import javax.servlet.http.HttpSession;
|
import javax.servlet.http.HttpSession;
|
||||||
|
|
||||||
import org.eclipse.jetty.security.IdentityService;
|
import org.eclipse.jetty.security.IdentityService;
|
||||||
|
@ -192,10 +194,16 @@ public class JaspiAuthenticator extends LoginAuthenticator
|
||||||
// we are processing a message in a secureResponse dialog.
|
// we are processing a message in a secureResponse dialog.
|
||||||
return Authentication.SEND_SUCCESS;
|
return Authentication.SEND_SUCCESS;
|
||||||
}
|
}
|
||||||
// should not happen
|
if (authStatus == AuthStatus.FAILURE)
|
||||||
throw new NullPointerException("No AuthStatus returned");
|
{
|
||||||
|
HttpServletResponse response = (HttpServletResponse) messageInfo.getResponseMessage();
|
||||||
|
response.sendError(HttpServletResponse.SC_FORBIDDEN);
|
||||||
|
return Authentication.SEND_FAILURE;
|
||||||
}
|
}
|
||||||
catch (AuthException e)
|
// should not happen
|
||||||
|
throw new IllegalStateException("No AuthStatus returned");
|
||||||
|
}
|
||||||
|
catch (IOException|AuthException e)
|
||||||
{
|
{
|
||||||
throw new ServerAuthException(e);
|
throw new ServerAuthException(e);
|
||||||
}
|
}
|
||||||
|
|
|
@ -102,6 +102,9 @@ public class JaspiAuthenticatorFactory extends DefaultAuthenticatorFactory
|
||||||
|
|
||||||
Subject serviceSubject=findServiceSubject(server);
|
Subject serviceSubject=findServiceSubject(server);
|
||||||
String serverName=findServerName(server,serviceSubject);
|
String serverName=findServerName(server,serviceSubject);
|
||||||
|
String contextPath=context.getContextPath();
|
||||||
|
if (contextPath==null || contextPath.length()==0)
|
||||||
|
contextPath="/";
|
||||||
String appContext = serverName + " " + context.getContextPath();
|
String appContext = serverName + " " + context.getContextPath();
|
||||||
|
|
||||||
AuthConfigProvider authConfigProvider = authConfigFactory.getConfigProvider(MESSAGE_LAYER,appContext,listener);
|
AuthConfigProvider authConfigProvider = authConfigFactory.getConfigProvider(MESSAGE_LAYER,appContext,listener);
|
||||||
|
|
|
@ -46,7 +46,6 @@ import org.eclipse.jetty.util.security.Credential;
|
||||||
import org.eclipse.jetty.util.security.Password;
|
import org.eclipse.jetty.util.security.Password;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @deprecated use *ServerAuthentication
|
|
||||||
* @version $Rev: 4792 $ $Date: 2009-03-18 22:55:52 +0100 (Wed, 18 Mar 2009) $
|
* @version $Rev: 4792 $ $Date: 2009-03-18 22:55:52 +0100 (Wed, 18 Mar 2009) $
|
||||||
*/
|
*/
|
||||||
public class BaseAuthModule implements ServerAuthModule, ServerAuthContext
|
public class BaseAuthModule implements ServerAuthModule, ServerAuthContext
|
||||||
|
|
|
@ -150,7 +150,8 @@ public class FormAuthModule extends BaseAuthModule
|
||||||
HttpSession session = request.getSession(mandatory);
|
HttpSession session = request.getSession(mandatory);
|
||||||
|
|
||||||
// not mandatory or its the login or login error page don't authenticate
|
// not mandatory or its the login or login error page don't authenticate
|
||||||
if (!mandatory || isLoginOrErrorPage(URIUtil.addPaths(request.getServletPath(),request.getPathInfo()))) return AuthStatus.SUCCESS;
|
if (!mandatory || isLoginOrErrorPage(URIUtil.addPaths(request.getServletPath(),request.getPathInfo())))
|
||||||
|
return AuthStatus.SUCCESS; // TODO return null for do nothing?
|
||||||
|
|
||||||
try
|
try
|
||||||
{
|
{
|
||||||
|
|
|
@ -0,0 +1,125 @@
|
||||||
|
//
|
||||||
|
// ========================================================================
|
||||||
|
// Copyright (c) 1995-2014 Mort Bay Consulting Pty. Ltd.
|
||||||
|
// ------------------------------------------------------------------------
|
||||||
|
// All rights reserved. This program and the accompanying materials
|
||||||
|
// are made available under the terms of the Eclipse Public License v1.0
|
||||||
|
// and Apache License v2.0 which accompanies this distribution.
|
||||||
|
//
|
||||||
|
// The Eclipse Public License is available at
|
||||||
|
// http://www.eclipse.org/legal/epl-v10.html
|
||||||
|
//
|
||||||
|
// The Apache License v2.0 is available at
|
||||||
|
// http://www.opensource.org/licenses/apache2.0.php
|
||||||
|
//
|
||||||
|
// You may elect to redistribute this code under either of these licenses.
|
||||||
|
// ========================================================================
|
||||||
|
//
|
||||||
|
|
||||||
|
package org.eclipse.jetty.security.jaspi;
|
||||||
|
|
||||||
|
import java.util.Map;
|
||||||
|
|
||||||
|
import javax.security.auth.Subject;
|
||||||
|
import javax.security.auth.callback.Callback;
|
||||||
|
import javax.security.auth.callback.CallbackHandler;
|
||||||
|
import javax.security.auth.message.AuthException;
|
||||||
|
import javax.security.auth.message.AuthStatus;
|
||||||
|
import javax.security.auth.message.MessageInfo;
|
||||||
|
import javax.security.auth.message.MessagePolicy;
|
||||||
|
import javax.security.auth.message.callback.CallerPrincipalCallback;
|
||||||
|
import javax.security.auth.message.callback.GroupPrincipalCallback;
|
||||||
|
import javax.security.auth.message.module.ServerAuthModule;
|
||||||
|
import javax.servlet.http.HttpServletRequest;
|
||||||
|
import javax.servlet.http.HttpServletResponse;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Example JASPI Auth Module based on http://www.trajano.net/2014/06/creating-a-simple-jaspic-auth-module/
|
||||||
|
*/
|
||||||
|
public class HttpHeaderAuthModule implements ServerAuthModule
|
||||||
|
{
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Supported message types. For our case we only need to deal with HTTP servlet request and responses. On Java EE 7 this will handle WebSockets as well.
|
||||||
|
*/
|
||||||
|
private static final Class<?>[] SUPPORTED_MESSAGE_TYPES = new Class<?>[]
|
||||||
|
{ HttpServletRequest.class, HttpServletResponse.class };
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Callback handler that is passed in initialize by the container. This processes the callbacks which are objects that populate the "subject".
|
||||||
|
*/
|
||||||
|
private CallbackHandler handler;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Does nothing of note for what we need.
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public void cleanSubject(final MessageInfo messageInfo, final Subject subject) throws AuthException
|
||||||
|
{
|
||||||
|
}
|
||||||
|
|
||||||
|
@SuppressWarnings("rawtypes")
|
||||||
|
@Override
|
||||||
|
public Class[] getSupportedMessageTypes()
|
||||||
|
{
|
||||||
|
return SUPPORTED_MESSAGE_TYPES;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Initializes the module. Allows you to pass in options.
|
||||||
|
*
|
||||||
|
* @param requestPolicy
|
||||||
|
* request policy, ignored
|
||||||
|
* @param responsePolicy
|
||||||
|
* response policy, ignored
|
||||||
|
* @param h
|
||||||
|
* callback handler
|
||||||
|
* @param options
|
||||||
|
* options
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public void initialize(final MessagePolicy requestPolicy, MessagePolicy responsePolicy, CallbackHandler h, Map options) throws AuthException
|
||||||
|
{
|
||||||
|
handler = h;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @return AuthStatus.SEND_SUCCESS
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public AuthStatus secureResponse(final MessageInfo paramMessageInfo, final Subject subject) throws AuthException
|
||||||
|
{
|
||||||
|
return AuthStatus.SEND_SUCCESS;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Validation occurs here.
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public AuthStatus validateRequest(final MessageInfo messageInfo, final Subject client, final Subject serviceSubject) throws AuthException
|
||||||
|
{
|
||||||
|
|
||||||
|
// Take the request from the messageInfo structure.
|
||||||
|
final HttpServletRequest req = (HttpServletRequest)messageInfo.getRequestMessage();
|
||||||
|
try
|
||||||
|
{
|
||||||
|
// Get the user name from the header. If not there then fail authentication.
|
||||||
|
final String userName = req.getHeader("X-Forwarded-User");
|
||||||
|
if (userName == null)
|
||||||
|
{
|
||||||
|
return AuthStatus.FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Store the user name that was in the header and also set a group.
|
||||||
|
handler.handle(new Callback[]
|
||||||
|
{ new CallerPrincipalCallback(client,userName), new GroupPrincipalCallback(client,new String[]
|
||||||
|
{ "users" }) });
|
||||||
|
return AuthStatus.SUCCESS;
|
||||||
|
}
|
||||||
|
catch (final Exception e)
|
||||||
|
{
|
||||||
|
throw new AuthException(e.getMessage());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,167 @@
|
||||||
|
//
|
||||||
|
// ========================================================================
|
||||||
|
// Copyright (c) 1995-2014 Mort Bay Consulting Pty. Ltd.
|
||||||
|
// ------------------------------------------------------------------------
|
||||||
|
// All rights reserved. This program and the accompanying materials
|
||||||
|
// are made available under the terms of the Eclipse Public License v1.0
|
||||||
|
// and Apache License v2.0 which accompanies this distribution.
|
||||||
|
//
|
||||||
|
// The Eclipse Public License is available at
|
||||||
|
// http://www.eclipse.org/legal/epl-v10.html
|
||||||
|
//
|
||||||
|
// The Apache License v2.0 is available at
|
||||||
|
// http://www.opensource.org/licenses/apache2.0.php
|
||||||
|
//
|
||||||
|
// You may elect to redistribute this code under either of these licenses.
|
||||||
|
// ========================================================================
|
||||||
|
//
|
||||||
|
|
||||||
|
package org.eclipse.jetty.security.jaspi;
|
||||||
|
|
||||||
|
import static org.hamcrest.Matchers.startsWith;
|
||||||
|
import static org.junit.Assert.assertThat;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
|
||||||
|
import javax.servlet.ServletException;
|
||||||
|
import javax.servlet.http.HttpServletRequest;
|
||||||
|
import javax.servlet.http.HttpServletResponse;
|
||||||
|
|
||||||
|
import org.eclipse.jetty.security.ConstraintMapping;
|
||||||
|
import org.eclipse.jetty.security.ConstraintSecurityHandler;
|
||||||
|
import org.eclipse.jetty.security.HashLoginService;
|
||||||
|
import org.eclipse.jetty.server.LocalConnector;
|
||||||
|
import org.eclipse.jetty.server.Request;
|
||||||
|
import org.eclipse.jetty.server.Server;
|
||||||
|
import org.eclipse.jetty.server.handler.AbstractHandler;
|
||||||
|
import org.eclipse.jetty.server.handler.ContextHandler;
|
||||||
|
import org.eclipse.jetty.server.handler.ContextHandlerCollection;
|
||||||
|
import org.eclipse.jetty.util.B64Code;
|
||||||
|
import org.eclipse.jetty.util.security.Constraint;
|
||||||
|
import org.eclipse.jetty.util.security.Password;
|
||||||
|
import org.hamcrest.Matchers;
|
||||||
|
import org.junit.After;
|
||||||
|
import org.junit.Before;
|
||||||
|
import org.junit.Test;
|
||||||
|
|
||||||
|
public class JaspiTest
|
||||||
|
{
|
||||||
|
Server _server;
|
||||||
|
LocalConnector _connector;
|
||||||
|
|
||||||
|
@Before
|
||||||
|
public void before() throws Exception
|
||||||
|
{
|
||||||
|
System.setProperty("org.apache.geronimo.jaspic.configurationFile","src/test/resources/jaspi.xml");
|
||||||
|
_server = new Server();
|
||||||
|
_connector = new LocalConnector(_server);
|
||||||
|
_server.addConnector(_connector);
|
||||||
|
|
||||||
|
ContextHandlerCollection contexts = new ContextHandlerCollection();
|
||||||
|
_server.setHandler(contexts);
|
||||||
|
|
||||||
|
HashLoginService loginService = new HashLoginService("TestRealm");
|
||||||
|
loginService.putUser("user",new Password("password"),new String[]{"users"});
|
||||||
|
loginService.putUser("admin",new Password("secret"),new String[]{"users","admins"});
|
||||||
|
_server.addBean(loginService);
|
||||||
|
|
||||||
|
ContextHandler context = new ContextHandler();
|
||||||
|
contexts.addHandler(context);
|
||||||
|
context.setContextPath("/ctx");
|
||||||
|
|
||||||
|
JaspiAuthenticatorFactory jaspiAuthFactory = new JaspiAuthenticatorFactory();
|
||||||
|
|
||||||
|
ConstraintSecurityHandler security = new ConstraintSecurityHandler();
|
||||||
|
context.setHandler(security);
|
||||||
|
security.setAuthenticatorFactory(jaspiAuthFactory);
|
||||||
|
// security.setAuthenticator(new BasicAuthenticator());
|
||||||
|
|
||||||
|
Constraint constraint = new Constraint("All","users");
|
||||||
|
constraint.setAuthenticate(true);
|
||||||
|
ConstraintMapping mapping = new ConstraintMapping();
|
||||||
|
mapping.setPathSpec("/jaspi/*");
|
||||||
|
mapping.setConstraint(constraint);
|
||||||
|
security.addConstraintMapping(mapping);
|
||||||
|
|
||||||
|
TestHandler handler = new TestHandler();
|
||||||
|
security.setHandler(handler);
|
||||||
|
|
||||||
|
ContextHandler other = new ContextHandler();
|
||||||
|
contexts.addHandler(other);
|
||||||
|
other.setContextPath("/other");
|
||||||
|
ConstraintSecurityHandler securityOther = new ConstraintSecurityHandler();
|
||||||
|
other.setHandler(securityOther);
|
||||||
|
securityOther.setAuthenticatorFactory(jaspiAuthFactory);
|
||||||
|
securityOther.addConstraintMapping(mapping);
|
||||||
|
securityOther.setHandler(new TestHandler());
|
||||||
|
|
||||||
|
_server.start();
|
||||||
|
}
|
||||||
|
|
||||||
|
@After
|
||||||
|
public void after() throws Exception
|
||||||
|
{
|
||||||
|
_server.stop();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testNoConstraint() throws Exception
|
||||||
|
{
|
||||||
|
String response = _connector.getResponses("GET /ctx/test HTTP/1.0\n\n");
|
||||||
|
assertThat(response,startsWith("HTTP/1.1 200 OK"));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testConstraintNoAuth() throws Exception
|
||||||
|
{
|
||||||
|
String response = _connector.getResponses("GET /ctx/jaspi/test HTTP/1.0\n\n");
|
||||||
|
assertThat(response,startsWith("HTTP/1.1 401 Unauthorized"));
|
||||||
|
assertThat(response,Matchers.containsString("WWW-Authenticate: basic realm=\"TestRealm\""));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testConstraintWrongAuth() throws Exception
|
||||||
|
{
|
||||||
|
String response = _connector.getResponses("GET /ctx/jaspi/test HTTP/1.0\n"+
|
||||||
|
"Authorization: Basic " + B64Code.encode("user:wrong") + "\n\n");
|
||||||
|
assertThat(response,startsWith("HTTP/1.1 401 Unauthorized"));
|
||||||
|
assertThat(response,Matchers.containsString("WWW-Authenticate: basic realm=\"TestRealm\""));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testConstraintAuth() throws Exception
|
||||||
|
{
|
||||||
|
String response = _connector.getResponses("GET /ctx/jaspi/test HTTP/1.0\n"+
|
||||||
|
"Authorization: Basic " + B64Code.encode("user:password") + "\n\n");
|
||||||
|
assertThat(response,startsWith("HTTP/1.1 200 OK"));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testOtherNoAuth() throws Exception
|
||||||
|
{
|
||||||
|
String response = _connector.getResponses("GET /other/test HTTP/1.0\n\n");
|
||||||
|
assertThat(response,startsWith("HTTP/1.1 403 Forbidden"));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testOtherAuth() throws Exception
|
||||||
|
{
|
||||||
|
String response = _connector.getResponses("GET /other/test HTTP/1.0\n"+
|
||||||
|
"X-Forwarded-User: user\n\n");
|
||||||
|
assertThat(response,startsWith("HTTP/1.1 200 OK"));
|
||||||
|
}
|
||||||
|
|
||||||
|
public class TestHandler extends AbstractHandler
|
||||||
|
{
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void handle(String target, Request baseRequest, HttpServletRequest request, HttpServletResponse response) throws IOException, ServletException
|
||||||
|
{
|
||||||
|
baseRequest.setHandled(true);
|
||||||
|
response.setStatus(200);
|
||||||
|
response.setContentType("text/plain");
|
||||||
|
response.getWriter().println("All OK");
|
||||||
|
response.getWriter().println("requestURI="+request.getRequestURI());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,39 @@
|
||||||
|
<?xml version="1.0" encoding="UTF-8"?>
|
||||||
|
|
||||||
|
<jaspi xmlns="http://geronimo.apache.org/xml/ns/geronimo-jaspi">
|
||||||
|
<configProvider>
|
||||||
|
<messageLayer>HTTP</messageLayer>
|
||||||
|
<appContext>server /ctx</appContext>
|
||||||
|
<description>description</description>
|
||||||
|
<serverAuthConfig>
|
||||||
|
<authenticationContextID>authenticationContextID1</authenticationContextID>
|
||||||
|
<protected>true</protected>
|
||||||
|
<serverAuthContext>
|
||||||
|
<serverAuthModule>
|
||||||
|
<className>org.eclipse.jetty.security.jaspi.modules.BasicAuthModule</className>
|
||||||
|
<options>
|
||||||
|
org.eclipse.jetty.security.jaspi.modules.RealmName=TestRealm
|
||||||
|
</options>
|
||||||
|
</serverAuthModule>
|
||||||
|
</serverAuthContext>
|
||||||
|
</serverAuthConfig>
|
||||||
|
<persistent>true</persistent>
|
||||||
|
</configProvider>
|
||||||
|
<configProvider>
|
||||||
|
<messageLayer>HTTP</messageLayer>
|
||||||
|
<appContext>server /other</appContext>
|
||||||
|
<description>description</description>
|
||||||
|
<serverAuthConfig>
|
||||||
|
<authenticationContextID>authenticationContextID2</authenticationContextID>
|
||||||
|
<protected>true</protected>
|
||||||
|
<serverAuthContext>
|
||||||
|
<serverAuthModule>
|
||||||
|
<className>org.eclipse.jetty.security.jaspi.HttpHeaderAuthModule</className>
|
||||||
|
<options>
|
||||||
|
</options>
|
||||||
|
</serverAuthModule>
|
||||||
|
</serverAuthContext>
|
||||||
|
</serverAuthConfig>
|
||||||
|
<persistent>true</persistent>
|
||||||
|
</configProvider>
|
||||||
|
</jaspi>
|
|
@ -259,6 +259,7 @@ public class MongoSessionIdManager extends AbstractSessionIdManager
|
||||||
*/
|
*/
|
||||||
protected void purge()
|
protected void purge()
|
||||||
{
|
{
|
||||||
|
__log.debug("PURGING");
|
||||||
BasicDBObject invalidQuery = new BasicDBObject();
|
BasicDBObject invalidQuery = new BasicDBObject();
|
||||||
|
|
||||||
invalidQuery.put(MongoSessionManager.__ACCESSED, new BasicDBObject("$lt",System.currentTimeMillis() - _purgeInvalidAge));
|
invalidQuery.put(MongoSessionManager.__ACCESSED, new BasicDBObject("$lt",System.currentTimeMillis() - _purgeInvalidAge));
|
||||||
|
@ -432,6 +433,8 @@ public class MongoSessionIdManager extends AbstractSessionIdManager
|
||||||
|
|
||||||
_scavengerTask = _scheduler.schedule(new Scavenger(), _scavengePeriod, TimeUnit.MILLISECONDS);
|
_scavengerTask = _scheduler.schedule(new Scavenger(), _scavengePeriod, TimeUnit.MILLISECONDS);
|
||||||
}
|
}
|
||||||
|
else if (__log.isDebugEnabled())
|
||||||
|
__log.debug("Scavenger disabled");
|
||||||
|
|
||||||
|
|
||||||
//if purging is enabled, setup the purge thread
|
//if purging is enabled, setup the purge thread
|
||||||
|
@ -444,6 +447,8 @@ public class MongoSessionIdManager extends AbstractSessionIdManager
|
||||||
}
|
}
|
||||||
_purgerTask = _scheduler.schedule(new Purger(), _purgeDelay, TimeUnit.MILLISECONDS);
|
_purgerTask = _scheduler.schedule(new Purger(), _purgeDelay, TimeUnit.MILLISECONDS);
|
||||||
}
|
}
|
||||||
|
else if (__log.isDebugEnabled())
|
||||||
|
__log.debug("Purger disabled");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -42,6 +42,8 @@ import com.mongodb.BasicDBObject;
|
||||||
import com.mongodb.DBCollection;
|
import com.mongodb.DBCollection;
|
||||||
import com.mongodb.DBObject;
|
import com.mongodb.DBObject;
|
||||||
import com.mongodb.MongoException;
|
import com.mongodb.MongoException;
|
||||||
|
import com.mongodb.WriteConcern;
|
||||||
|
import com.mongodb.WriteResult;
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -268,7 +270,7 @@ public class MongoSessionManager extends NoSqlSessionManager
|
||||||
Long currentExpiry = (Long)o.get(__EXPIRY);
|
Long currentExpiry = (Long)o.get(__EXPIRY);
|
||||||
if (currentMaxIdle != null && getMaxInactiveInterval() > 0 && getMaxInactiveInterval() < currentMaxIdle)
|
if (currentMaxIdle != null && getMaxInactiveInterval() > 0 && getMaxInactiveInterval() < currentMaxIdle)
|
||||||
sets.put(__MAX_IDLE, getMaxInactiveInterval());
|
sets.put(__MAX_IDLE, getMaxInactiveInterval());
|
||||||
if (currentExpiry != null && expiry > 0 && expiry < currentExpiry)
|
if (currentExpiry != null && expiry > 0 && expiry != currentExpiry)
|
||||||
sets.put(__EXPIRY, currentExpiry);
|
sets.put(__EXPIRY, currentExpiry);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -302,8 +304,10 @@ public class MongoSessionManager extends NoSqlSessionManager
|
||||||
if (!unsets.isEmpty())
|
if (!unsets.isEmpty())
|
||||||
update.put("$unset",unsets);
|
update.put("$unset",unsets);
|
||||||
|
|
||||||
_dbSessions.update(key,update,upsert,false);
|
_dbSessions.update(key,update,upsert,false,WriteConcern.SAFE);
|
||||||
__log.debug("MongoSessionManager:save:db.sessions.update( {}, {}, true) ", key, update);
|
|
||||||
|
if (__log.isDebugEnabled())
|
||||||
|
__log.debug("MongoSessionManager:save:db.sessions.update( {}, {} )", key, update);
|
||||||
|
|
||||||
if (activateAfterSave)
|
if (activateAfterSave)
|
||||||
session.didActivate();
|
session.didActivate();
|
||||||
|
@ -421,7 +425,7 @@ public class MongoSessionManager extends NoSqlSessionManager
|
||||||
update.put("$set",sets);
|
update.put("$set",sets);
|
||||||
}
|
}
|
||||||
|
|
||||||
_dbSessions.update(key,update,false,false);
|
_dbSessions.update(key,update,false,false,WriteConcern.SAFE);
|
||||||
|
|
||||||
session.didActivate();
|
session.didActivate();
|
||||||
|
|
||||||
|
@ -520,7 +524,7 @@ public class MongoSessionManager extends NoSqlSessionManager
|
||||||
BasicDBObject unsets = new BasicDBObject();
|
BasicDBObject unsets = new BasicDBObject();
|
||||||
unsets.put(getContextKey(),1);
|
unsets.put(getContextKey(),1);
|
||||||
remove.put("$unset",unsets);
|
remove.put("$unset",unsets);
|
||||||
_dbSessions.update(key,remove);
|
_dbSessions.update(key,remove,false,false,WriteConcern.SAFE);
|
||||||
|
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
@ -556,7 +560,7 @@ public class MongoSessionManager extends NoSqlSessionManager
|
||||||
update.put("$set",sets);
|
update.put("$set",sets);
|
||||||
|
|
||||||
BasicDBObject key = new BasicDBObject(__ID,idInCluster);
|
BasicDBObject key = new BasicDBObject(__ID,idInCluster);
|
||||||
_dbSessions.update(key,update);
|
_dbSessions.update(key,update,false,false,WriteConcern.SAFE);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -573,7 +577,7 @@ public class MongoSessionManager extends NoSqlSessionManager
|
||||||
BasicDBObject sets = new BasicDBObject();
|
BasicDBObject sets = new BasicDBObject();
|
||||||
BasicDBObject update = new BasicDBObject(__ID, newClusterId);
|
BasicDBObject update = new BasicDBObject(__ID, newClusterId);
|
||||||
sets.put("$set", update);
|
sets.put("$set", update);
|
||||||
_dbSessions.update(key, sets, false, false);
|
_dbSessions.update(key, sets, false, false,WriteConcern.SAFE);
|
||||||
}
|
}
|
||||||
|
|
||||||
/*------------------------------------------------------------ */
|
/*------------------------------------------------------------ */
|
||||||
|
|
|
@ -103,6 +103,10 @@ public class AnnotationConfiguration extends org.eclipse.jetty.annotations.Annot
|
||||||
//index and scan fragments
|
//index and scan fragments
|
||||||
for (Bundle bundle : fragAndRequiredBundles)
|
for (Bundle bundle : fragAndRequiredBundles)
|
||||||
{
|
{
|
||||||
|
//skip bundles that have been uninstalled since we discovered them
|
||||||
|
if (bundle.getState() == Bundle.UNINSTALLED)
|
||||||
|
continue;
|
||||||
|
|
||||||
Resource bundleRes = oparser.indexBundle(bundle);
|
Resource bundleRes = oparser.indexBundle(bundle);
|
||||||
if (!context.getMetaData().getWebInfJars().contains(bundleRes))
|
if (!context.getMetaData().getWebInfJars().contains(bundleRes))
|
||||||
{
|
{
|
||||||
|
@ -127,6 +131,10 @@ public class AnnotationConfiguration extends org.eclipse.jetty.annotations.Annot
|
||||||
//scan the required bundles
|
//scan the required bundles
|
||||||
for (Bundle requiredBundle : fragAndRequiredBundles)
|
for (Bundle requiredBundle : fragAndRequiredBundles)
|
||||||
{
|
{
|
||||||
|
//skip bundles that have been uninstalled since we discovered them
|
||||||
|
if (requiredBundle.getState() == Bundle.UNINSTALLED)
|
||||||
|
continue;
|
||||||
|
|
||||||
if (requiredBundle.getHeaders().get(Constants.FRAGMENT_HOST) == null)
|
if (requiredBundle.getHeaders().get(Constants.FRAGMENT_HOST) == null)
|
||||||
{
|
{
|
||||||
//a bundle indeed:
|
//a bundle indeed:
|
||||||
|
|
|
@ -19,6 +19,7 @@
|
||||||
package org.eclipse.jetty.osgi.annotations;
|
package org.eclipse.jetty.osgi.annotations;
|
||||||
|
|
||||||
import java.io.File;
|
import java.io.File;
|
||||||
|
import java.io.InputStream;
|
||||||
import java.net.URI;
|
import java.net.URI;
|
||||||
import java.net.URL;
|
import java.net.URL;
|
||||||
import java.util.Comparator;
|
import java.util.Comparator;
|
||||||
|
@ -196,10 +197,21 @@ public class AnnotationParser extends org.eclipse.jetty.annotations.AnnotationPa
|
||||||
//remove the starting '/'
|
//remove the starting '/'
|
||||||
name = path.substring(1);
|
name = path.substring(1);
|
||||||
}
|
}
|
||||||
|
if (name == null)
|
||||||
|
{
|
||||||
|
//found some .class file in the archive that was not under one of the prefix paths
|
||||||
|
//or the bundle classpath wasn't simply ".", so skip it
|
||||||
|
continue;
|
||||||
|
}
|
||||||
//transform into a classname to pass to the resolver
|
//transform into a classname to pass to the resolver
|
||||||
String shortName = name.replace('/', '.').substring(0,name.length()-6);
|
String shortName = name.replace('/', '.').substring(0,name.length()-6);
|
||||||
if ((resolver == null)|| (!resolver.isExcluded(shortName) && (!isParsed(shortName) || resolver.shouldOverride(shortName))))
|
if ((resolver == null) || (!resolver.isExcluded(shortName) && (!isParsed(shortName) || resolver.shouldOverride(shortName))))
|
||||||
scanClass(handlers, getResource(bundle), classUrl.openStream());
|
{
|
||||||
|
try (InputStream classInputStream = classUrl.openStream())
|
||||||
|
{
|
||||||
|
scanClass(handlers, getResource(bundle), classInputStream);
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -403,7 +403,7 @@ public abstract class AbstractWebAppProvider extends AbstractLifeCycle implement
|
||||||
throw new IllegalStateException("Unable to get PackageAdmin reference to locate required Tld bundles");
|
throw new IllegalStateException("Unable to get PackageAdmin reference to locate required Tld bundles");
|
||||||
|
|
||||||
StringBuilder paths = new StringBuilder();
|
StringBuilder paths = new StringBuilder();
|
||||||
String[] symbNames = requireTldBundles.split(", ");
|
String[] symbNames = requireTldBundles.split("[, ]");
|
||||||
|
|
||||||
for (String symbName : symbNames)
|
for (String symbName : symbNames)
|
||||||
{
|
{
|
||||||
|
@ -452,7 +452,7 @@ public abstract class AbstractWebAppProvider extends AbstractLifeCycle implement
|
||||||
String tmp = (String)_properties.get(OSGiWebappConstants.JETTY_CONTEXT_FILE_PATH);
|
String tmp = (String)_properties.get(OSGiWebappConstants.JETTY_CONTEXT_FILE_PATH);
|
||||||
if (tmp != null)
|
if (tmp != null)
|
||||||
{
|
{
|
||||||
String[] filenames = tmp.split(",;");
|
String[] filenames = tmp.split("[,;]");
|
||||||
if (filenames != null && filenames.length > 0)
|
if (filenames != null && filenames.length > 0)
|
||||||
{
|
{
|
||||||
String filename = filenames[0]; //should only be 1 filename in this usage
|
String filename = filenames[0]; //should only be 1 filename in this usage
|
||||||
|
|
|
@ -125,7 +125,7 @@ public class BundleContextProvider extends AbstractContextProvider implements Bu
|
||||||
//bundle defines JETTY_CONTEXT_FILE_PATH header,
|
//bundle defines JETTY_CONTEXT_FILE_PATH header,
|
||||||
//a comma separated list of context xml files that each define a ContextHandler
|
//a comma separated list of context xml files that each define a ContextHandler
|
||||||
//TODO: (could be WebAppContexts)
|
//TODO: (could be WebAppContexts)
|
||||||
String[] tmp = contextFiles.split(",;");
|
String[] tmp = contextFiles.split("[,;]");
|
||||||
for (String contextFile : tmp)
|
for (String contextFile : tmp)
|
||||||
{
|
{
|
||||||
String originId = bundle.getSymbolicName() + "-" + bundle.getVersion().toString() + "-"+contextFile;
|
String originId = bundle.getSymbolicName() + "-" + bundle.getVersion().toString() + "-"+contextFile;
|
||||||
|
|
|
@ -177,6 +177,10 @@ public class OSGiWebInfConfiguration extends WebInfConfiguration
|
||||||
|
|
||||||
for (Bundle b : bundles)
|
for (Bundle b : bundles)
|
||||||
{
|
{
|
||||||
|
//skip bundles that are not installed
|
||||||
|
if (b.getState() == Bundle.UNINSTALLED)
|
||||||
|
continue;
|
||||||
|
|
||||||
//add to context attribute storing associated fragments and required bundles
|
//add to context attribute storing associated fragments and required bundles
|
||||||
fragsAndReqsBundles.add(b);
|
fragsAndReqsBundles.add(b);
|
||||||
File f = BundleFileLocatorHelperFactory.getFactory().getHelper().getBundleInstallLocation(b);
|
File f = BundleFileLocatorHelperFactory.getFactory().getHelper().getBundleInstallLocation(b);
|
||||||
|
|
|
@ -128,6 +128,9 @@ public class DefaultJettyAtJettyHomeHelper
|
||||||
jettyHomeBundleSysProp = Util.resolvePropertyValue(jettyHomeBundleSysProp);
|
jettyHomeBundleSysProp = Util.resolvePropertyValue(jettyHomeBundleSysProp);
|
||||||
for (Bundle b : bundleContext.getBundles())
|
for (Bundle b : bundleContext.getBundles())
|
||||||
{
|
{
|
||||||
|
if (b.getState() == Bundle.UNINSTALLED)
|
||||||
|
continue;
|
||||||
|
|
||||||
if (b.getSymbolicName().equals(jettyHomeBundleSysProp))
|
if (b.getSymbolicName().equals(jettyHomeBundleSysProp))
|
||||||
{
|
{
|
||||||
jettyHomeBundle = b;
|
jettyHomeBundle = b;
|
||||||
|
|
|
@ -140,7 +140,7 @@
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>org.eclipse.jetty.toolchain</groupId>
|
<groupId>org.eclipse.jetty.toolchain</groupId>
|
||||||
<artifactId>jetty-osgi-servlet-api</artifactId>
|
<artifactId>jetty-osgi-servlet-api</artifactId>
|
||||||
<version>3.1.0.M0</version>
|
<version>3.1.0.M3</version>
|
||||||
</dependency>
|
</dependency>
|
||||||
|
|
||||||
<dependency>
|
<dependency>
|
||||||
|
|
|
@ -0,0 +1,128 @@
|
||||||
|
//
|
||||||
|
// ========================================================================
|
||||||
|
// Copyright (c) 1995-2014 Mort Bay Consulting Pty. Ltd.
|
||||||
|
// ------------------------------------------------------------------------
|
||||||
|
// All rights reserved. This program and the accompanying materials
|
||||||
|
// are made available under the terms of the Eclipse Public License v1.0
|
||||||
|
// and Apache License v2.0 which accompanies this distribution.
|
||||||
|
//
|
||||||
|
// The Eclipse Public License is available at
|
||||||
|
// http://www.eclipse.org/legal/epl-v10.html
|
||||||
|
//
|
||||||
|
// The Apache License v2.0 is available at
|
||||||
|
// http://www.opensource.org/licenses/apache2.0.php
|
||||||
|
//
|
||||||
|
// You may elect to redistribute this code under either of these licenses.
|
||||||
|
// ========================================================================
|
||||||
|
//
|
||||||
|
|
||||||
|
package org.eclipse.jetty.rewrite.handler;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.util.regex.Matcher;
|
||||||
|
|
||||||
|
import javax.servlet.http.HttpServletRequest;
|
||||||
|
import javax.servlet.http.HttpServletResponse;
|
||||||
|
|
||||||
|
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
/** Rule to add a header based on a Regex match
|
||||||
|
*/
|
||||||
|
public class HeaderRegexRule extends RegexRule
|
||||||
|
{
|
||||||
|
|
||||||
|
private String _name;
|
||||||
|
private String _value;
|
||||||
|
private boolean _add=false;
|
||||||
|
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
public HeaderRegexRule()
|
||||||
|
{
|
||||||
|
_handling = false;
|
||||||
|
_terminating = false;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
/**
|
||||||
|
* Sets the header name.
|
||||||
|
*
|
||||||
|
* @param name name of the header field
|
||||||
|
*/
|
||||||
|
public void setName(String name)
|
||||||
|
{
|
||||||
|
_name = name;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
/**
|
||||||
|
* Sets the header value. The value can be either a <code>String</code> or <code>int</code> value.
|
||||||
|
*
|
||||||
|
* @param value of the header field
|
||||||
|
*/
|
||||||
|
public void setValue(String value)
|
||||||
|
{
|
||||||
|
_value = value;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
/**
|
||||||
|
* Sets the Add flag.
|
||||||
|
* @param add If true, the header is added to the response, otherwise the header it is set on the response.
|
||||||
|
*/
|
||||||
|
public void setAdd(boolean add)
|
||||||
|
{
|
||||||
|
_add = add;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
@Override
|
||||||
|
protected String apply(String target, HttpServletRequest request, HttpServletResponse response, Matcher matcher)
|
||||||
|
throws IOException
|
||||||
|
{
|
||||||
|
// process header
|
||||||
|
if (_add)
|
||||||
|
response.addHeader(_name, _value);
|
||||||
|
else
|
||||||
|
response.setHeader(_name, _value);
|
||||||
|
return target;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
/**
|
||||||
|
* Returns the header name.
|
||||||
|
* @return the header name.
|
||||||
|
*/
|
||||||
|
public String getName()
|
||||||
|
{
|
||||||
|
return _name;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
/**
|
||||||
|
* Returns the header value.
|
||||||
|
* @return the header value.
|
||||||
|
*/
|
||||||
|
public String getValue()
|
||||||
|
{
|
||||||
|
return _value;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
/**
|
||||||
|
* Returns the add flag value.
|
||||||
|
*/
|
||||||
|
public boolean isAdd()
|
||||||
|
{
|
||||||
|
return _add;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* ------------------------------------------------------------ */
|
||||||
|
/**
|
||||||
|
* Returns the header contents.
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public String toString()
|
||||||
|
{
|
||||||
|
return super.toString()+"["+_name+","+_value+"]";
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,131 @@
|
||||||
|
//
|
||||||
|
// ========================================================================
|
||||||
|
// Copyright (c) 1995-2014 Mort Bay Consulting Pty. Ltd.
|
||||||
|
// ------------------------------------------------------------------------
|
||||||
|
// All rights reserved. This program and the accompanying materials
|
||||||
|
// are made available under the terms of the Eclipse Public License v1.0
|
||||||
|
// and Apache License v2.0 which accompanies this distribution.
|
||||||
|
//
|
||||||
|
// The Eclipse Public License is available at
|
||||||
|
// http://www.eclipse.org/legal/epl-v10.html
|
||||||
|
//
|
||||||
|
// The Apache License v2.0 is available at
|
||||||
|
// http://www.opensource.org/licenses/apache2.0.php
|
||||||
|
//
|
||||||
|
// You may elect to redistribute this code under either of these licenses.
|
||||||
|
// ========================================================================
|
||||||
|
//
|
||||||
|
|
||||||
|
package org.eclipse.jetty.rewrite.handler;
|
||||||
|
|
||||||
|
import org.junit.Before;
|
||||||
|
import org.junit.Test;
|
||||||
|
import static org.junit.Assert.assertEquals;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.util.Iterator;
|
||||||
|
|
||||||
|
public class HeaderRegexRuleTest extends AbstractRuleTestCase
|
||||||
|
{
|
||||||
|
|
||||||
|
private HeaderRegexRule _rule;
|
||||||
|
|
||||||
|
@Before
|
||||||
|
public void init() throws Exception
|
||||||
|
{
|
||||||
|
start(false);
|
||||||
|
_rule = new HeaderRegexRule();
|
||||||
|
_rule.setRegex("\\*");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testHeaderWithTextValues() throws IOException
|
||||||
|
{
|
||||||
|
// different keys
|
||||||
|
String headers[][] =
|
||||||
|
{
|
||||||
|
{ "hnum#1", "test1" },
|
||||||
|
{ "hnum#2", "2test2" },
|
||||||
|
{ "hnum#3", "test3" } };
|
||||||
|
assertHeaders(headers);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testHeaderWithNumberValues() throws IOException
|
||||||
|
{
|
||||||
|
String headers[][] =
|
||||||
|
{
|
||||||
|
{ "hello", "1" },
|
||||||
|
{ "hello", "-1" },
|
||||||
|
{ "hello", "100" },
|
||||||
|
{ "hello", "100" },
|
||||||
|
{ "hello", "100" },
|
||||||
|
{ "hello", "100" },
|
||||||
|
{ "hello", "100" },
|
||||||
|
{ "hello1", "200" } };
|
||||||
|
assertHeaders(headers);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testHeaderOverwriteValues() throws IOException
|
||||||
|
{
|
||||||
|
String headers[][] =
|
||||||
|
{
|
||||||
|
{ "size", "100" },
|
||||||
|
{ "size", "200" },
|
||||||
|
{ "size", "300" },
|
||||||
|
{ "size", "400" },
|
||||||
|
{ "size", "500" },
|
||||||
|
{ "title", "abc" },
|
||||||
|
{ "title", "bac" },
|
||||||
|
{ "title", "cba" },
|
||||||
|
{ "title1", "abba" },
|
||||||
|
{ "title1", "abba1" },
|
||||||
|
{ "title1", "abba" },
|
||||||
|
{ "title1", "abba1" } };
|
||||||
|
assertHeaders(headers);
|
||||||
|
Iterator<String> e = _response.getHeaders("size").iterator();
|
||||||
|
int count = 0;
|
||||||
|
while (e.hasNext())
|
||||||
|
{
|
||||||
|
e.next();
|
||||||
|
count++;
|
||||||
|
}
|
||||||
|
assertEquals(1,count);
|
||||||
|
assertEquals("500",_response.getHeader("size"));
|
||||||
|
assertEquals("cba",_response.getHeader("title"));
|
||||||
|
assertEquals("abba1",_response.getHeader("title1"));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testMatch() throws Exception
|
||||||
|
{
|
||||||
|
_rule.setRegex("/my/dir/file/(.*)$");
|
||||||
|
_rule.setName("cache-control");
|
||||||
|
_rule.setValue("no-store");
|
||||||
|
_rule.matchAndApply("/my/dir/file/",_request,_response);
|
||||||
|
assertEquals("no-store",_response.getHeader("cache-control"));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testNotMatch() throws Exception
|
||||||
|
{
|
||||||
|
reset();
|
||||||
|
_rule.setRegex("/my/dir/file/(.*)$");
|
||||||
|
_rule.setName("cache-control");
|
||||||
|
_rule.setValue("no-store");
|
||||||
|
_rule.matchAndApply("/my/dir/file_not_match/",_request,_response);
|
||||||
|
assertEquals(null,_response.getHeader("cache-control"));
|
||||||
|
}
|
||||||
|
|
||||||
|
private void assertHeaders(String headers[][]) throws IOException
|
||||||
|
{
|
||||||
|
for (String[] header : headers)
|
||||||
|
{
|
||||||
|
_rule.setName(header[0]);
|
||||||
|
_rule.setValue(header[1]);
|
||||||
|
_rule.apply(null,_request,_response,null);
|
||||||
|
assertEquals(header[1],_response.getHeader(header[0]));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -256,11 +256,12 @@ public class HttpConfiguration
|
||||||
* before being sent to the client. A larger buffer can improve performance by allowing
|
* before being sent to the client. A larger buffer can improve performance by allowing
|
||||||
* a content producer to run without blocking, however larger buffers consume more memory and
|
* a content producer to run without blocking, however larger buffers consume more memory and
|
||||||
* may induce some latency before a client starts processing the content.
|
* may induce some latency before a client starts processing the content.
|
||||||
* @param responseBufferSize buffer size in bytes.
|
* @param outputBufferSize buffer size in bytes.
|
||||||
*/
|
*/
|
||||||
public void setOutputBufferSize(int responseBufferSize)
|
public void setOutputBufferSize(int outputBufferSize)
|
||||||
{
|
{
|
||||||
_outputBufferSize = responseBufferSize;
|
_outputBufferSize = outputBufferSize;
|
||||||
|
setOutputAggregationSize(outputBufferSize / 4);
|
||||||
}
|
}
|
||||||
|
|
||||||
/* ------------------------------------------------------------ */
|
/* ------------------------------------------------------------ */
|
||||||
|
|
|
@ -27,6 +27,7 @@ import javax.servlet.http.HttpServletResponse;
|
||||||
import org.eclipse.jetty.http.HttpStatus;
|
import org.eclipse.jetty.http.HttpStatus;
|
||||||
import org.eclipse.jetty.server.HttpChannel;
|
import org.eclipse.jetty.server.HttpChannel;
|
||||||
import org.eclipse.jetty.server.HttpConfiguration;
|
import org.eclipse.jetty.server.HttpConfiguration;
|
||||||
|
import org.eclipse.jetty.server.HttpConnection;
|
||||||
import org.eclipse.jetty.server.Request;
|
import org.eclipse.jetty.server.Request;
|
||||||
import org.eclipse.jetty.util.URIUtil;
|
import org.eclipse.jetty.util.URIUtil;
|
||||||
|
|
||||||
|
@ -41,11 +42,19 @@ public class SecuredRedirectHandler extends AbstractHandler
|
||||||
@Override
|
@Override
|
||||||
public void handle(String target, Request baseRequest, HttpServletRequest request, HttpServletResponse response) throws IOException, ServletException
|
public void handle(String target, Request baseRequest, HttpServletRequest request, HttpServletResponse response) throws IOException, ServletException
|
||||||
{
|
{
|
||||||
HttpConfiguration httpConfig = HttpChannel.getCurrentHttpChannel().getHttpConfiguration();
|
HttpConnection connection = HttpConnection.getCurrentConnection();
|
||||||
|
if (baseRequest.isSecure() || (connection == null))
|
||||||
if (baseRequest.isSecure())
|
|
||||||
{
|
{
|
||||||
return; // all done
|
// nothing to do
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
HttpConfiguration httpConfig = connection.getHttpConfiguration();
|
||||||
|
if (httpConfig == null)
|
||||||
|
{
|
||||||
|
// no config, show error
|
||||||
|
response.sendError(HttpStatus.FORBIDDEN_403,"No http configuration available");
|
||||||
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (httpConfig.getSecurePort() > 0)
|
if (httpConfig.getSecurePort() > 0)
|
||||||
|
@ -61,6 +70,7 @@ public class SecuredRedirectHandler extends AbstractHandler
|
||||||
{
|
{
|
||||||
response.sendError(HttpStatus.FORBIDDEN_403,"Not Secure");
|
response.sendError(HttpStatus.FORBIDDEN_403,"Not Secure");
|
||||||
}
|
}
|
||||||
|
|
||||||
baseRequest.setHandled(true);
|
baseRequest.setHandled(true);
|
||||||
}
|
}
|
||||||
}
|
}
|
2
pom.xml
2
pom.xml
|
@ -81,7 +81,7 @@
|
||||||
<manifestEntries>
|
<manifestEntries>
|
||||||
<Bundle-ManifestVersion>2</Bundle-ManifestVersion>
|
<Bundle-ManifestVersion>2</Bundle-ManifestVersion>
|
||||||
<Bundle-Name>${project.name}</Bundle-Name>
|
<Bundle-Name>${project.name}</Bundle-Name>
|
||||||
<Bundle-SymbolicName>${bundle-symbolic-name}.source;singleton:=true</Bundle-SymbolicName>
|
<Bundle-SymbolicName>${bundle-symbolic-name}.source</Bundle-SymbolicName>
|
||||||
<Bundle-Vendor>Eclipse.org - Jetty</Bundle-Vendor>
|
<Bundle-Vendor>Eclipse.org - Jetty</Bundle-Vendor>
|
||||||
<Bundle-Version>${parsedVersion.osgiVersion}</Bundle-Version>
|
<Bundle-Version>${parsedVersion.osgiVersion}</Bundle-Version>
|
||||||
<Eclipse-SourceBundle>${bundle-symbolic-name};version="${parsedVersion.osgiVersion}";roots:="."</Eclipse-SourceBundle>
|
<Eclipse-SourceBundle>${bundle-symbolic-name};version="${parsedVersion.osgiVersion}";roots:="."</Eclipse-SourceBundle>
|
||||||
|
|
Loading…
Reference in New Issue