[GUMP@brutus]: Project jakarta-tomcat-jk-native (in module jakarta-tomcat-connectors) failed

2005-03-02 Thread Bill Barker
To whom it may engage...

This is an automated request, but not an unsolicited one. For 
more information please visit http://gump.apache.org/nagged.html, 
and/or contact the folk at [EMAIL PROTECTED]

Project jakarta-tomcat-jk-native has an issue affecting its community 
integration.
This issue affects 1 projects,
 and has been outstanding for 46 runs.
The current state of this project is 'Failed', with reason 'Build Failed'.
For reference only, the following projects are affected by this:
- jakarta-tomcat-jk-native :  Connectors to various web servers


Full details are available at:

http://brutus.apache.org/gump/public/jakarta-tomcat-connectors/jakarta-tomcat-jk-native/index.html

That said, some information snippets are provided here.

The following annotations (debug/informational/warning/error messages) were 
provided:
 -INFO- Failed with reason build failed



The following work was performed:
http://brutus.apache.org/gump/public/jakarta-tomcat-connectors/jakarta-tomcat-jk-native/gump_work/build_jakarta-tomcat-connectors_jakarta-tomcat-jk-native.html
Work Name: build_jakarta-tomcat-connectors_jakarta-tomcat-jk-native (Type: 
Build)
Work ended in a state of : Failed
Elapsed: 
Command Line: make 
[Working Directory: 
/usr/local/gump/public/workspace/jakarta-tomcat-connectors/jk/native]
-
Making all in common
make[1]: Entering directory 
`/home/gump/workspaces2/public/workspace/jakarta-tomcat-connectors/jk/native/common'
/bin/sh 
/usr/local/gump/public/workspace/apache-httpd/dest-02032005/build/libtool 
--silent --mode=compile gcc 
-I/usr/local/gump/public/workspace/apache-httpd/dest-02032005/include -g -O2 -g 
-O2 -pthread -DHAVE_APR 
-I/usr/local/gump/public/workspace/apr/dest-02032005/include/apr-1 -g -O2 
-DLINUX=2 -D_REENTRANT -D_GNU_SOURCE -D_LARGEFILE64_SOURCE 
-I/home/gump/workspaces2/public/workspace/apache-httpd/srclib/pcre -I 
/opt/jdk1.4/include -I /opt/jdk1.4/include/ -c jk_ajp12_worker.c 
/usr/local/gump/public/workspace/apache-httpd/dest-02032005/build/libtool: 
/usr/local/gump/public/workspace/apache-httpd/dest-02032005/build/libtool: No 
such file or directory
make[1]: *** [jk_ajp12_worker.lo] Error 127
make[1]: Leaving directory 
`/home/gump/workspaces2/public/workspace/jakarta-tomcat-connectors/jk/native/common'
make: *** [all-recursive] Error 1
-

To subscribe to this information via syndicated feeds:
- RSS: 
http://brutus.apache.org/gump/public/jakarta-tomcat-connectors/jakarta-tomcat-jk-native/rss.xml
- Atom: 
http://brutus.apache.org/gump/public/jakarta-tomcat-connectors/jakarta-tomcat-jk-native/atom.xml

== Gump Tracking Only ===
Produced by Gump version 2.2.
Gump Run 2402032005, brutus:brutus-public:2402032005
Gump E-mail Identifier (unique within run) #12.

--
Apache Gump
http://gump.apache.org/ [Instance: brutus]

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[GUMP@brutus]: Project jakarta-tomcat-5 (in module jakarta-tomcat-5) failed

2005-03-02 Thread bobh
To whom it may engage...

This is an automated request, but not an unsolicited one. For 
more information please visit http://gump.apache.org/nagged.html, 
and/or contact the folk at [EMAIL PROTECTED]

Project jakarta-tomcat-5 has an issue affecting its community integration.
This issue affects 11 projects,
 and has been outstanding for 5 runs.
The current state of this project is 'Failed', with reason 'Build Failed'.
For reference only, the following projects are affected by this:
- avalon-http-context :  Avalon SVN
- avalon-http-demo :  Avalon SVN
- avalon-http-examples :  Avalon SVN
- avalon-http-impl :  Avalon SVN
- avalon-http-server :  Avalon SVN
- avalon-http-servlet :  Avalon SVN
- avalon-http-static :  Avalon SVN
- avalon-http-test :  Avalon SVN
- avalon-planet-facilities :  Avalon SVN
- jakarta-tomcat-5 :  Servlet 2.4 and JSP 2.0 Reference Implementation
- metro-reflector-blocks-complete :  Avalon SVN


Full details are available at:

http://brutus.apache.org/gump/public/jakarta-tomcat-5/jakarta-tomcat-5/index.html

That said, some information snippets are provided here.

The following annotations (debug/informational/warning/error messages) were 
provided:
 -DEBUG- Output [servlets-default.jar] identifier set to output basename: 
[servlets-default]
 -DEBUG- Output [servlets-invoker.jar] identifier set to output basename: 
[servlets-invoker]
 -DEBUG- Output [catalina.jar] identifier set to output basename: [catalina]
 -DEBUG- Output [bootstrap.jar] identifier set to output basename: [bootstrap]
 -DEBUG- Dependency on javamail exists, no need to add for property mail.jar.
 -DEBUG- Dependency on jaf exists, no need to add for property activation.jar.
 -DEBUG- Dependency on jakarta-servletapi-5-servlet exists, no need to add for 
property servlet-api.jar.
 -DEBUG- Dependency on jakarta-servletapi-5-jsp exists, no need to add for 
property jsp-api.jar.
 -DEBUG- Dependency on xml-xerces exists, no need to add for property 
xercesImpl.jar.
 -DEBUG- Dependency on jakarta-tomcat-util exists, no need to add for property 
tomcat-util.jar.
 -DEBUG- Dependency on commons-el exists, no need to add for property 
commons-el.jar.
 -DEBUG- Dependency on commons-logging exists, no need to add for property 
commons-logging-api.jar.
 -DEBUG- Dependency on commons-modeler exists, no need to add for property 
commons-modeler.jar.
 -DEBUG- Dependency on ant exists, no need to add for property ant.home.
 -DEBUG- Dependency on jmx exists, no need to add for property jmx.home.
 -DEBUG- Dependency on jmx exists, no need to add for property jmx.jar.
 -DEBUG- Dependency on jmx exists, no need to add for property jmx-tools.jar.
 -DEBUG- Dependency on javamail exists, no need to add for property mail.home.
 -DEBUG- Dependency on jakarta-tomcat-coyote exists, no need to add for 
property tomcat-coyote.home.
 -DEBUG- Dependency on jakarta-tomcat-jasper_tc5 exists, no need to add for 
property jasper.home.
 -DEBUG- Dependency on jaf exists, no need to add for property activation.home.
 -DEBUG- Dependency on commons-modeler exists, no need to add for property 
commons-modeler.home.
 -DEBUG- Dependency on commons-daemon exists, no need to add for property 
commons-daemon.jsvc.tar.gz.
 -DEBUG- Dependency on struts-core exists, no need to add for property 
struts.home.
 -INFO- Failed with reason build failed
 -DEBUG- Extracted fallback artifacts from Gump Repository



The following work was performed:
http://brutus.apache.org/gump/public/jakarta-tomcat-5/jakarta-tomcat-5/gump_work/build_jakarta-tomcat-5_jakarta-tomcat-5.html
Work Name: build_jakarta-tomcat-5_jakarta-tomcat-5 (Type: Build)
Work ended in a state of : Failed
Elapsed: 39 secs
Command Line: java -Djava.awt.headless=true 
-Xbootclasspath/p:/usr/local/gump/public/workspace/xml-xerces2/java/build/xercesImpl.jar:/usr/local/gump/public/workspace/xml-xalan/java/build/serializer.jar:/usr/local/gump/public/workspace/xml-xalan/java/build/xalan-unbundled.jar:/usr/local/gump/public/workspace/xml-commons/java/external/build/xml-apis.jar
 org.apache.tools.ant.Main 
-Dgump.merge=/home/gump/workspaces2/public/gump/work/merge.xml 
-Dbuild.sysclasspath=only -Dtomcat33.home=--UnSet-- 
-Dstruts-core.jar=/usr/local/gump/public/workspace/struts/core/dist/lib/struts.jar
 
-Djsp-api.jar=/usr/local/gump/public/workspace/jakarta-servletapi-5/jsr152/dist/lib/jsp-api.jar
 -Djmx.jar=/usr/local/gump/packages/jmx-1_2-ri/lib/jmxri.jar 
-Djasper-compiler-jdt.jar=/usr/local/gump/packages/eclipse-3.0.1/plugins/org.eclipse.jdt.core_3.0.1/jdtcore.jar
 -Djmx.home=/usr/local/gump/packages/jmx-1_2-ri 
-Djdbc20ext.jar=/usr/local/gump/packages/jdbc2_0/jdbc2_0-stdext.jar 
-Dmail.home=/usr/local/gump/packages/javamail-1.3.2 
-Dant.home=/usr/local/gump/public/workspace/ant/dist 
-Dcommons-collections.jar=/usr/local/gump/public/workspace/jakarta-commons/collections/build/commons-collections-02032005.jar
 

DO NOT REPLY [Bug 33753] - service-ref/ tag in web.xml is ignored. Servlet 2.4 spec.

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=33753.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=33753


[EMAIL PROTECTED] changed:

   What|Removed |Added

 Status|RESOLVED|REOPENED
 Resolution|INVALID |




--- Additional Comments From [EMAIL PROTECTED]  2005-03-02 12:00 ---
Please allow me to clarify with references to the Servlet 2.4 specification.

Page 104. SRV.13.1.2:

--- CUT HERE ---
The following additional elements exist in the Web application deployment
descriptor to meet the requirements of Web containers that are JSP pages enabled
or part of a J2EE application server. They are not required to be supported by
containers wishing to support only the servlet specification:
• jsp-config
• Syntax for looking up JNDI objects (env-entry, ejb-ref, ejb-local-ref, 
resource-
ref, resource-env-ref)
• Syntax for specifying the message destination (message-destination, message-
destination-ref)
• Reference to a Web service (service-ref)
The syntax for these elements is now held in the JavaServer Pages
specification version 2.0, and the J2EE specification version 1.4.
---CUT HERE---

The key phrase is JSP pages enabled or part of a J2EE application server.
Tomcat does support JSPs. Tomcat 5.5 does claim to support JSP 2.0. Therefore,
according to the spec it should support the service-ref/ tag.

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



DO NOT REPLY [Bug 33753] - service-ref/ tag in web.xml is ignored. Servlet 2.4 spec.

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=33753.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=33753


[EMAIL PROTECTED] changed:

   What|Removed |Added

 Status|REOPENED|RESOLVED
 Resolution||INVALID




-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



DO NOT REPLY [Bug 33753] - service-ref/ tag in web.xml is ignored. Servlet 2.4 spec.

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=33753.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=33753





--- Additional Comments From [EMAIL PROTECTED]  2005-03-02 12:26 ---
Correction, the reference is actually page 104. SRV.13.1 Deployment Descriptor
Elements.


-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



DO NOT REPLY [Bug 33753] - service-ref/ tag in web.xml is ignored. Servlet 2.4 spec.

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=33753.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=33753





--- Additional Comments From [EMAIL PROTECTED]  2005-03-02 12:52 ---
Hmmm... The information is not actually in the JSP 2.0 specification. I'm
sending an email pointing out the potential problem to
[EMAIL PROTECTED] I'll post here if anything interesting comes back.

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



DO NOT REPLY [Bug 33753] - service-ref/ tag in web.xml is ignored. Servlet 2.4 spec.

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=33753.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=33753





--- Additional Comments From [EMAIL PROTECTED]  2005-03-02 13:11 ---
If you want this functionality, get a full J2EE 1.4 application server. Please
do not reopen this report.

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



DO NOT REPLY [Bug 33804] New: - Some log messages say 'JK2' when they mean 'JK'

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=33804.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=33804

   Summary: Some log messages say 'JK2' when they mean 'JK'
   Product: Tomcat 5
   Version: 5.5.7
  Platform: All
OS/Version: All
Status: NEW
  Severity: trivial
  Priority: P2
 Component: Connector:AJP
AssignedTo: tomcat-dev@jakarta.apache.org
ReportedBy: [EMAIL PROTECTED]


In the source distibution, we find log messages saying 'JK2' when
they actually mean 'JK' (I guess...) A grep for JK2 on the source distro
shows:

jakarta-tomcat-connectors/jk/java/org/apache/jk/apr/AprImpl.java:
log.info(JK2: Initialized apr );

jakarta-tomcat-connectors/jk/java/org/apache/jk/common/ChannelJni.java:
log.info(JK2: listening on channel.jni:jni );

jakarta-tomcat-connectors/jk/java/org/apache/jk/common/ChannelSocket.java:
log.info(JK2: ajp13 disabling channelSocket);

jakarta-tomcat-connectors/jk/java/org/apache/jk/common/ChannelSocket.java:
log.info(JK2: ajp13 listening on  + getAddress() + : + port );

Also, in 

jakarta-tomcat-5.5.7-src/jakarta-tomcat-connectors/jk/java/org/apache/jk/server/JkCoyoteHandler.java

the comment says Plugs Jk2 into Coyote.

All around this JK/JK2 thing is confusing. I suppose code from one was 
borrowed for the other...

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



DO NOT REPLY [Bug 33806] New: - Session tracking using URL rewriting fails, if client URL-encodes reserved characters ; and =

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=33806.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=33806

   Summary: Session tracking using URL rewriting fails, if client
URL-encodes reserved characters ; and =
   Product: Tomcat 5
   Version: 5.0.28
  Platform: PC
OS/Version: Linux
Status: NEW
  Severity: major
  Priority: P2
 Component: Servlet  JSP API
AssignedTo: tomcat-dev@jakarta.apache.org
ReportedBy: [EMAIL PROTECTED]


It seems that Tomcat 5.0.28 (at least) fails to track session using URL
rewriting (whith no cookies), when the client converts the reserved characters ;
and = in a rewritten URL, rendering what was supposed to be ;jsessionid= as
%3Bjsessionid%D.

I had a look at RFC 2396, but did not figure out, wether URL encoding in path
part of URI is valid. Is it?

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



DO NOT REPLY [Bug 33807] New: - When thread pool fills tomcat stops processing requests.

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=33807.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=33807

   Summary: When thread pool fills tomcat stops processing requests.
   Product: Tomcat 5
   Version: 5.5.4
  Platform: PC
OS/Version: Linux
Status: NEW
  Severity: normal
  Priority: P2
 Component: Catalina
AssignedTo: tomcat-dev@jakarta.apache.org
ReportedBy: [EMAIL PROTECTED]


I'm running 5.5.4 with sun jdk 1.4 (but this problem exists probably with every
jdk version and with many tomcat versions).  I have a very loaded site.  When I
restart tomcat it gets immediately hit by hundreds of clients.  The load goes up
and processing requests starts taking a very long time.  As a result all the
worker threads become busy and I get the following message in the log:

Mar 1, 2005 3:33:31 PM org.apache.tomcat.util.threads.ThreadPool logFull
SEVERE: All threads (900) are currently busy, waiting. Increase maxThreads (900)
or check the servlet status

After this tomcat stops processing new requests.  I believe that the correct
behaviour would be to continue processing requests with the existing threads and
processing new as the threads become free.  But in this case, as I said tomcat
simply stops accepting new connections and 'hangs' not doing anything.

Increasing max threads seems to be a workaround but not a good one.

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



DO NOT REPLY [Bug 33807] - When thread pool fills tomcat stops processing requests.

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=33807.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=33807





--- Additional Comments From [EMAIL PROTECTED]  2005-03-02 14:53 ---
My guess is that you may be having deadlocks somewhere in your code.

Your report is also very incomplete (no mention of configuration, platform,
etc). I recommend posting to tomcat-user instead.

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



DO NOT REPLY [Bug 33809] New: - UTF-16 Encoding does not work for response

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=33809.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=33809

   Summary: UTF-16 Encoding  does not work for response
   Product: Tomcat 4
   Version: 4.0.4 Final
  Platform: PC
OS/Version: Windows XP
Status: NEW
  Severity: major
  Priority: P2
 Component: Servlet  JSP API
AssignedTo: tomcat-dev@jakarta.apache.org
ReportedBy: [EMAIL PROTECTED]


Tomcat 4.0.4 does not work properly with UTF-16LE Encoding .  My data is in
UTF-16LE encoding and the byte are sent back using reqsponse.getWriter() 
stream. 
See the code below  :-

%
response.setContentType(text/plain; charset=utf-16le); 
response.setHeader(Content-Disposition,attachment; filename=\test.csv\);
java.io.PrintWriter out1 = response.getWriter();
//Add  Multibyte data  82A7
String strData = test+\u82A7;
strData = new String(strData.getBytes(UTF-16LE),UTF-16LE);
//Write BOM and UTF-16 encoded String
out1.write(\uFEFF+strData);
out1.flush();
out1.close();
%


This code does not work properly on tomcat4, The jsp does not show the pop up
Open/Save Dialog as desired .  
If ,  response.setContentType(text/plain; charset=utf-16le); this is changed 
to
response.setContentType(text/plain; charset=utf-8);
the the Open/Save Dialog  comes up.  But it saves the File in UTF-8 encoding. 
This is Wrong , since File contains data in  UTF-16LE ( required for CSVs that
has Multibyte data and microsoft Supports UTF-16LE by default for Excel) 

If I run the above Code in Tomcat5, it  works fine. The file test.csv is saved
in Unicode Encoding and gets opened properly in MsExcel. 

Did i miss something for tomcat4 ? 
Is it a Bug with  tomcat4

Thanks,
Anuj

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



DO NOT REPLY [Bug 33809] - UTF-16 Encoding does not work for response

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=33809.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=33809


[EMAIL PROTECTED] changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 Resolution||WONTFIX
Summary|UTF-16 Encoding  does not   |UTF-16 Encoding  does not
   |work for response   |work for response




--- Additional Comments From [EMAIL PROTECTED]  2005-03-02 15:17 ---
4.0.4 is an out of date code base not being updated. The tomcat-user list might
be of help.

[Bugzilla is not a help desk forum]
 

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: TCKs and vote for 5.5.8

2005-03-02 Thread Fernando Nasser
Hi,
Thanks for your prompt response.
Yoav Shapira wrote:
Hola,
5.0.30 will stay beta, there will be no vote on it, no matter what the TCKs
say, because of other bugs.  (I don't remember the specifics right now, they
were discussed on this list at the time shortly after the release).
Sorry, I joined after that.  Should have checked the archives.
When a good new 5.0.x release comes out (for which there's no ETA), we'll
request the TCKs be run.
OK, so there is a possibility that this still happens.  Good to know.
Thanks again for the clarifications.
Regards,
Fernando

Yoav

-Original Message-
From: Fernando Nasser [mailto:[EMAIL PROTECTED]
Sent: Tuesday, March 01, 2005 4:10 PM
To: Tomcat Developers List
Subject: Re: TCKs and vote for 5.5.8
Any chance of doing the same for the last of the 5.0.x lineage, 5.0.30,
which is
still marked as Beta?
I know that as part of an Application Server (running as the embedded Web
Container) it does pass the TCK.
Regards to all,
Fernando
Yoav Shapira wrote:
Hola,
Can someone please run the TCKs for 5.5.8 if you haven't already?  I'd
like
to have the results before voting on release stability.  Thanks,

Yoav Shapira
System Design and Management Fellow
MIT Sloan School of Management / School of Engineering
Cambridge, MA USA
mailto:[EMAIL PROTECTED] [EMAIL PROTECTED] /
mailto:[EMAIL PROTECTED] [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

--
Fernando Nasser
Red Hat Canada Ltd. E-Mail:  [EMAIL PROTECTED]
2323 Yonge Street, Suite #300
Toronto, Ontario   M4P 2C9
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


DO NOT REPLY [Bug 33810] New: - Stream closed errors from JSP tags under load

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=33810.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=33810

   Summary: Stream closed errors from JSP tags under load
   Product: Tomcat 5
   Version: 5.0.28
  Platform: PC
OS/Version: Linux
Status: NEW
  Severity: critical
  Priority: P2
 Component: Unknown
AssignedTo: tomcat-dev@jakarta.apache.org
ReportedBy: [EMAIL PROTECTED]


We have a Struts based application deployed on JBoss 3.2.6. In our production
environment under load the servers throw Stream closed errors and after that
the servers do not work and forced to restart.  We have not seen this problem in
test regions where the load is lower.  We have tried disabling tag pooling in
Tomcat, but that does not seem to help fix the problems. Does any one else have
similar issues in production environment?

The server encountered an internal error () that prevented it from fulfilling
this request.
exception
java.io.IOException: Stream closed
org.apache.jasper.runtime.BodyContentImpl.ensureOpen(BodyContentImpl.java:576)
org.apache.jasper.runtime.BodyContentImpl.write(BodyContentImpl.java:140)
org.apache.jasper.runtime.BodyContentImpl.write(BodyContentImpl.java:157)
org.apache.jsp.protected_.security.AvailApplications_jsp._jspService(AvailApplications_jsp.java:210)
org.apache.jasper.runtime.HttpJspBase.service(HttpJspBase.java:94)
javax.servlet.http.HttpServlet.service(HttpServlet.java:810)
org.apache.jasper.servlet.JspServletWrapper.service(JspServletWrapper.java:324)
org.apache.jasper.servlet.JspServlet.serviceJspFile(JspServlet.java:292)
org.apache.jasper.servlet.JspServlet.service(JspServlet.java:236)
javax.servlet.http.HttpServlet.service(HttpServlet.java:810)
org.apache.struts.action.RequestProcessor.doForward(RequestProcessor.java:1069)
org.apache.struts.action.RequestProcessor.processForwardConfig(RequestProcessor.java:455)
com.citistreet.id.i401k.struts.util.PwebRequestProcessor.processForwardConfig(PwebRequestProcessor.java:96)
org.apache.struts.action.RequestProcessor.process(RequestProcessor.java:279)
org.apache.struts.action.ActionServlet.process(ActionServlet.java:1482)
citistreet.id.struts.action.AbstractController.process(AbstractController.java:141)
com.citistreet.id.i401k.struts.action.Controller.process(Controller.java:142)
org.apache.struts.action.ActionServlet.doGet(ActionServlet.java:507)
javax.servlet.http.HttpServlet.service(HttpServlet.java:697)
citistreet.id.struts.action.AbstractController.service(AbstractController.java:108)
com.citistreet.id.i401k.struts.action.Controller.service(Controller.java:118)
javax.servlet.http.HttpServlet.service(HttpServlet.java:810)
citistreet.id.servlet.filter.AbstractFilter.doFilter(AbstractFilter.java:79)
citistreet.id.servlet.filter.AbstractFilter.doFilter(AbstractFilter.java:79)
com.citistreet.id.i401k.servlet.filter.TimingFilter.doFilter(TimingFilter.java:54)
org.jboss.web.tomcat.filters.ReplyHeaderFilter.doFilter(ReplyHeaderFilter.java:75)

Thanks
Purush

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



DO NOT REPLY [Bug 33810] - Stream closed errors from JSP tags under load

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=33810.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=33810


[EMAIL PROTECTED] changed:

   What|Removed |Added

   Priority|P2  |P1




-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



DO NOT REPLY [Bug 21220] - java.util.zip.ZipException on Tomcat boot is less than helpful

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=21220.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=21220





--- Additional Comments From [EMAIL PROTECTED]  2005-03-02 18:03 ---
Here we go again, this time in Tomcat 5.5.

Here is a little patch (diff --unified) for this badness:

---
./jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/loader/WebappClassLoader.java.bak
 2005-03-02 17:53:50.136472408 +0100
+++
./jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/loader/WebappClassLoader.java
 2005-03-02 17:57:14.185452248 +0100
@@ -1540,7 +1540,7 @@
try {
jarFiles[i] = new JarFile(jarRealFiles[i]);
} catch (IOException e) {
-   log.warn(Failed to open JAR, e);
+   log.warn(Failed to open JAR file ' +
jarRealFiles[i] + ', e);
}
 }
 }
@@ -2040,7 +2040,12 @@

 if (triggers == null)
 return (true);
-JarFile jarFile = new JarFile(jarfile);
+try {
+   JarFile jarFile = new JarFile(jarfile);
+} catch (IOException e) {
+   log.warn(Failed to open JAR file ' + jarfile + ', e);
+   throw e;
+}
 for (int i = 0; i  triggers.length; i++) {
 Class clazz = null;
 try {




-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/core StandardContext.java

2005-03-02 Thread remm
remm2005/03/02 10:14:06

  Modified:catalina/src/share/org/apache/catalina/core
StandardContext.java
  Log:
  - Fix context classloader binding during loader initialization (it was set to 
null before).
  - The webapp loader should only be retrieved when the context classloader is 
set to the webapp's classloader. The initialization of
StandardContainer violates this by having its basic valve instantiated, 
which in turns gets the logger right away. This means it will use
whatever logging configuration is defined for the server classloader :(
  
  Revision  ChangesPath
  1.166 +7 -5  
jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/core/StandardContext.java
  
  Index: StandardContext.java
  ===
  RCS file: 
/home/cvs/jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/core/StandardContext.java,v
  retrieving revision 1.165
  retrieving revision 1.166
  diff -u -r1.165 -r1.166
  --- StandardContext.java  24 Feb 2005 17:11:06 -  1.165
  +++ StandardContext.java  2 Mar 2005 18:14:06 -   1.166
  @@ -4007,8 +4007,6 @@
   // Start our subordinate components, if any
   if ((loader != null)  (loader instanceof Lifecycle))
   ((Lifecycle) loader).start();
  -if ((logger != null)  (logger instanceof Lifecycle))
  -((Lifecycle) logger).start();
   
   // Unbinding thread
   unbindThread(oldCCL);
  @@ -4016,6 +4014,8 @@
   // Binding thread
   oldCCL = bindThread();
   
  +if ((logger != null)  (logger instanceof Lifecycle))
  +((Lifecycle) logger).start();
   if ((cluster != null)  (cluster instanceof Lifecycle))
   ((Lifecycle) cluster).start();
   if ((realm != null)  (realm instanceof Lifecycle))
  @@ -4483,8 +4483,10 @@
   if (getResources() == null)
   return oldContextClassLoader;
   
  -Thread.currentThread().setContextClassLoader
  -(getLoader().getClassLoader());
  +if (getLoader().getClassLoader() != null) {
  +Thread.currentThread().setContextClassLoader
  +(getLoader().getClassLoader());
  +}
   
   DirContextURLStreamHandler.bind(getResources());
   
  
  
  

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



DO NOT REPLY [Bug 32696] - WEB-INF protection stops IIS

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=32696.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=32696


[EMAIL PROTECTED] changed:

   What|Removed |Added

 Status|CLOSED  |REOPENED
  Component|Unknown |Connector:JK/AJP
   Keywords||ErrorMessage,
   ||NeedsReleaseNote
 Resolution|FIXED   |
Version|4.1.30  |4.1.31




--- Additional Comments From [EMAIL PROTECTED]  2005-03-02 19:22 ---
Finding: When the scanning tools guessed WEB-INF directory, the error message 
indicated that access to the directory was denied.  As a result, the error 
message confirmed the existence of this directory.

Tomcat response HTTP Status 404, while isapi_redirect.dll redirector responses 
Access forbidden!, which is HTTP Status 403.

Example:
http://localhost:8080/WEB-INF/
Return: HTTP Status 404 - /WEB-INF/
This is correct.

http://localhost:80/WEB-INF/
Return: Access forbidden!
You don't have permission to access the requested object. It is either read-
protected or not readable by the server.

This should be 404, not 403.

I have checked the code, jakarta-tomcat-connectors-1.2.8-
src\jk\native\isapi\jk_isapi_plugin.c, at line 713, and it does response 403 
HTTP Status.  I cannot find the place to change it from configuration file 
except re-compile this redirector.

While directory listing is not strictly considered vulnerability, I suggest to 
response 404 HTTP Status to hide the directory, like Tomcat does now.

I found a link http://jakarta.apache.org/tomcat/connectors-doc/howto/iis.html 
mentions something like this:

Protecting the WEB-INF Directory 
, this directory contains sensitive configurations data and Java classes 
and must be kept hidden from web users. Using the IIS management console it is 
possible to protect the WEB-INF directory from user access,.

To avoid this need the redirector plugin automatically protects your WEB-INF 
directories by rejecting any request that contains WEB-INF in its URL-Path.

I tried to configure IIS, but it looks like jk_isapi gets higher priority to 
handle the request and always returns 403 status.  Without re-compile the 
program, how can I make IIS return 404 status?  Or maybe next release will do?

Recommendation from Cert: When an unauthorized user attempts to access a 
directory, they should receive an error message that doesn't confirm the 
existence of the directory.  Whether a user is trying to access a valid or 
invalid directory, they should receive the same error message.

My system environment:
Win 2K
Tomcat 4.1.31
IIS 5
JK-1.2.8 - isapi_redirect-1.2.8.dll binary version - 17 December




-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]




cvs commit: jakarta-tomcat-connectors/juli - New directory

2005-03-02 Thread remm
remm2005/03/02 10:30:40

  jakarta-tomcat-connectors/juli - New directory

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



cvs commit: jakarta-tomcat-connectors/juli/src - New directory

2005-03-02 Thread remm
remm2005/03/02 10:30:40

  jakarta-tomcat-connectors/juli/src - New directory

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



cvs commit: jakarta-tomcat-connectors/juli/src/conf - New directory

2005-03-02 Thread remm
remm2005/03/02 10:30:40

  jakarta-tomcat-connectors/juli/src/conf - New directory

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



cvs commit: jakarta-tomcat-connectors/juli/src/java - New directory

2005-03-02 Thread remm
remm2005/03/02 10:30:40

  jakarta-tomcat-connectors/juli/src/java - New directory

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



cvs commit: jakarta-tomcat-connectors/juli build.xml

2005-03-02 Thread remm
remm2005/03/02 10:30:45

  Modified:.build.xml
   catalina/etc bootstrap.MF
  Added:   juli/src/conf logging.properties
   juli/src/java/org/apache/juli ClassLoaderLogManager.java
FileHandler.java
   juli build.xml
  Log:
  - Add JULI, a Java Util Logging Implementation.
  - It supports per classloader configuration, using standard JDK properties 
files, with optional extensions to be able to flexibly assign handlers to 
loggers.
  - The package includes a rotating handler, since zillions of people have 
lamented its departure in 5.5.x (even if it didn't contain anything useful 
anymore).
  - This builds a small JAR, which is then added to the classpath by 
bootstrap.jar.
  - I may need to fix packaging a little after that change; sorry for the 
trouble.
  - I'll add comments and docs soon.
  - This is based on code subimmted by Lachlan O'Dea in bug 33143, and is 
likely to move to commons (once I get comfortable enough with svn).
  
  Revision  ChangesPath
  1.1  
jakarta-tomcat-connectors/juli/src/conf/logging.properties
  
  Index: logging.properties
  ===
  handlers = org.apache.juli.FileHandler java.util.logging.ConsoleHandler
  
  
  # Handler specific properties.
  # Describes specific configuration info for Handlers.
  
  
  org.apache.juli.FileHandler.level = FINE
  org.apache.juli.FileHandler.directory = ${catalina.base}/logs
  
  java.util.logging.ConsoleHandler.level = FINE
  java.util.logging.ConsoleHandler.formatter = java.util.logging.SimpleFormatter
  
  
  
  # Facility specific properties.
  # Provides extra control for each logger.
  
  
  # For example, set the com.xyz.foo logger to only log SEVERE
  # messages:
  #org.apache.catalina.startup.ContextConfig.level = FINE
  #org.apache.catalina.startup.HostConfig.level = FINE
  #org.apache.catalina.session.ManagerBase.level = FINE
  
  
  
  1.223 +23 -0 jakarta-tomcat-5/build.xml
  
  Index: build.xml
  ===
  RCS file: /home/cvs/jakarta-tomcat-5/build.xml,v
  retrieving revision 1.222
  retrieving revision 1.223
  diff -u -r1.222 -r1.223
  --- build.xml 20 Jan 2005 12:00:20 -  1.222
  +++ build.xml 2 Mar 2005 18:30:45 -   1.223
  @@ -288,6 +288,27 @@
   
 /target
   
  +   target name=build-juli 
  +   unless=tomcatjuli.build.notrequired 
  +   depends=init description=builds j-t-c/juli
  + echo== Building: tomcat-juli /echo
  +
  + ant dir=${jtc.home}/juli target=compile-only
  +   property name=build.home value=${tomcat.build}/
  + /ant
  + 
  + !-- Java.util.logging Implementation --
  + jar jarfile=${tomcat.build}/bin/tomcat-juli.jar index=true
  +   fileset dir=${tomcat.build}/classes
  + include name=org/apache/juli/** /
  + !-- Javadoc and i18n exclusions --
  + exclude name=**/package.html /
  + exclude name=**/LocalStrings_* /
  +   /fileset
  + /jar
  +
  +   /target
  +
 target name=build-jasper 
 unless=jasper.build.notrequired 
 depends=init description=build jasper
  @@ -513,6 +534,8 @@
   
   antcall target=build-tomcathttp11/
 
  +antcall target=build-juli/
  +  
   antcall target=build-jasper/
   
   antcall target=build-i18n/
  
  
  
  1.6   +1 -1  jakarta-tomcat-catalina/catalina/etc/bootstrap.MF
  
  Index: bootstrap.MF
  ===
  RCS file: /home/cvs/jakarta-tomcat-catalina/catalina/etc/bootstrap.MF,v
  retrieving revision 1.5
  retrieving revision 1.6
  diff -u -r1.5 -r1.6
  --- bootstrap.MF  2 Mar 2004 12:32:19 -   1.5
  +++ bootstrap.MF  2 Mar 2005 18:30:45 -   1.6
  @@ -1,5 +1,5 @@
   Manifest-Version: 1.0
   Main-Class: org.apache.catalina.startup.Bootstrap
  -Class-Path: jmx.jar commons-daemon.jar commons-logging-api.jar
  +Class-Path: jmx.jar commons-daemon.jar commons-logging-api.jar 
tomcat-juli.jar
   Specification-Title: Catalina
   Specification-Version: 1.0
  \ No newline at end of file
  
  
  
  1.1  
jakarta-tomcat-connectors/juli/src/java/org/apache/juli/ClassLoaderLogManager.java
  
  Index: ClassLoaderLogManager.java
  ===
  /*
   * Copyright 1999,2004 The Apache Software Foundation.
   * 
   * Licensed under the Apache License, Version 2.0 (the License);
   * you may not use this file except in 

DO NOT REPLY [Bug 33143] - [PATCH] Java 1.4 loggers per context

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=33143.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=33143


[EMAIL PROTECTED] changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 Resolution||FIXED




--- Additional Comments From [EMAIL PROTECTED]  2005-03-02 19:34 ---
I have expanded the code provided to provide configurability using properties
file (like java.util.logging has), and the code is now (likely temporarily)
located in j-t-c/juli. Thanks.

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



cvs commit: jakarta-tomcat-5 build.xml

2005-03-02 Thread remm
remm2005/03/02 10:36:29

  Modified:.build.xml
  Log:
  - Don't include juli in dist.
  
  Revision  ChangesPath
  1.224 +1 -0  jakarta-tomcat-5/build.xml
  
  Index: build.xml
  ===
  RCS file: /home/cvs/jakarta-tomcat-5/build.xml,v
  retrieving revision 1.223
  retrieving revision 1.224
  diff -u -r1.223 -r1.224
  --- build.xml 2 Mar 2005 18:30:45 -   1.223
  +++ build.xml 2 Mar 2005 18:36:29 -   1.224
  @@ -1226,6 +1226,7 @@
exclude name=*-using-launcher.*/
exclude name=LauncherBootstrap.class/
exclude name=launcher.properties/
  + exclude name=tomcat-juli.jar/
 /fileset
   /copy
   copy todir=${tomcat.dist}/common/classes
  
  
  

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



cvs commit: jakarta-tomcat-connectors/juli/src/java/org/apache/juli - New directory

2005-03-02 Thread remm
remm2005/03/02 10:30:40

  jakarta-tomcat-connectors/juli/src/java/org/apache/juli - New directory

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



cvs commit: jakarta-tomcat-connectors/juli/src/java/org - New directory

2005-03-02 Thread remm
remm2005/03/02 10:30:40

  jakarta-tomcat-connectors/juli/src/java/org - New directory

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



cvs commit: jakarta-tomcat-connectors/juli/src/java/org/apache - New directory

2005-03-02 Thread remm
remm2005/03/02 10:30:40

  jakarta-tomcat-connectors/juli/src/java/org/apache - New directory

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm RealmBase.java

2005-03-02 Thread luehe
luehe   2005/03/02 11:27:11

  Modified:catalina/src/share/org/apache/catalina/realm RealmBase.java
  Log:
  Consider the case where original request was mapped to welcome page.
  In this case, the mapped welcome page (and not the original request
  URI!) needs to be the target of hasResourcePermission().
  
  This is consistent with the change that had been made in 
findSecurityConstraints().
  
  BTW, shouldn't request.getDecodedRequestURI() return the mapped
  welcome page (instead of the original URI) in this case?
  In other words, shouldn't the path passed to
mappingData.requestPath.setString(pathStr)
  in Mapper.java be propagated to the request object associatd with the
  mappingData?
  
  Revision  ChangesPath
  1.49  +2 -2  
jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm/RealmBase.java
  
  Index: RealmBase.java
  ===
  RCS file: 
/home/cvs/jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm/RealmBase.java,v
  retrieving revision 1.48
  retrieving revision 1.49
  diff -u -r1.48 -r1.49
  --- RealmBase.java23 Feb 2005 19:27:56 -  1.48
  +++ RealmBase.java2 Mar 2005 19:27:11 -   1.49
  @@ -702,7 +702,7 @@
   LoginConfig config = context.getLoginConfig();
   if ((config != null) 
   (Constants.FORM_METHOD.equals(config.getAuthMethod( {
  -String requestURI = request.getDecodedRequestURI();
  +String requestURI = request.getRequestPathMB().toString();
   String loginPage = context.getPath() + config.getLoginPage();
   if (loginPage.equals(requestURI)) {
   if (log.isDebugEnabled())
  
  
  

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



DO NOT REPLY [Bug 33816] New: - Unkosher lines in build.xml

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=33816.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=33816

   Summary: Unkosher lines in build.xml
   Product: Tomcat 5
   Version: 5.5.7
  Platform: PC
OS/Version: Linux
Status: NEW
  Severity: trivial
  Priority: P2
 Component: Unknown
AssignedTo: tomcat-dev@jakarta.apache.org
ReportedBy: [EMAIL PROTECTED]


Looks like jakarta-tomcat-5.5.7-src/jakarta-tomcat-5/build.xml
specifies a parameter called 'destfile' for target 'downloadgz'.

However, the definition of 'downloadgz' is such that said parameter is never 
used:

  target name=downloadgz unless=exist depends=setproxy,testexist
!-- Download and extract the package --
get src=${sourcefile} dest=${base.path}/file.tar.gz /
gunzip src=${base.path}/file.tar.gz dest=${base.path}/file.tar/
untar src=${base.path}/file.tar dest=${base.path}/
delete file=${base.path}/file.tar/
delete file=${base.path}/file.tar.gz/
  /target

So we can rip out the 'destfiles':

--- /usr/local/tarballs/jakarta-tomcat-5.5.7-src/jakarta-tomcat-5/build.xml.bak
2005-03-02 20:42:30.009017936 +0100
+++ /usr/local/tarballs/jakarta-tomcat-5.5.7-src/jakarta-tomcat-5/build.xml
2005-03-02 20:47:08.198726672 +0100
@@ -601,17 +601,14 @@
 !-- antcall target=build-commons-modeler / --
 !-- antcall target=build-commons-daemon  / --

-   antcall target=downloadgz
+antcall target=downloadgz
   param name=sourcefile value=${commons-collections-src.loc}/
-  param name=destfile value=${tomcat-dbcp.jar} /
 /antcall
-   antcall target=downloadgz
+antcall target=downloadgz
   param name=sourcefile value=${commons-pool-src.loc}/
-  param name=destfile value=${tomcat-dbcp.jar} /
 /antcall
 antcall target=downloadgz
   param name=sourcefile value=${commons-dbcp-src.loc}/
-  param name=destfile value=${tomcat-dbcp.jar} /
 /antcall

 antcall target=build-tomcat-dbcp /
@@ -1714,48 +1711,39 @@
 !-- Downdown any sub package or tools needed. --
 antcall target=downloadgz
   param name=sourcefile value=${commons-beanutils.loc}/
-  param name=destfile value=${commons-beanutils.jar}/
 /antcall

 antcall target=downloadgz
   param name=sourcefile value=${commons-collections.loc}/
-  param name=destfile value=${commons-collections.jar}/
 /antcall

 antcall target=downloadgz
   param name=sourcefile value=${commons-el.loc}/
-  param name=destfile value=${commons-el.jar}/
 /antcall

 antcall target=downloadgz
   param name=sourcefile value=${commons-logging.loc}/
-  param name=destfile value=${commons-logging.jar}/
 /antcall

 antcall target=downloadgz
   param name=sourcefile value=${commons-modeler.loc}/
-  param name=destfile value=${commons-modeler.jar}/
 /antcall

 antcall target=downloadgz
   param name=sourcefile value=${log4j.loc}/
-  param name=destfile value=${log4j.jar}/
 /antcall

 antcall target=downloadgz
   param name=sourcefile value=${commons-digester.loc}/
-  param name=destfile value=${commons-digester.jar}/
 /antcall

 antcall target=downloadgz
   param name=sourcefile value=${commons-fileupload.loc}/
-  param name=destfile value=${commons-fileupload.jar}/
 /antcall

 antcall target=downloadgz
   !-- xerces2 brings 2 files, test for one of them --
   param name=sourcefile value=${xerces.loc}/
-  param name=destfile value=${xml-apis.jar}/
 /antcall

 antcall target=downloadzip
@@ -1772,25 +1760,20 @@

 antcall target=downloadgz
   param name=sourcefile value=${commons-launcher.loc}/
-  param name=destfile value=${commons-launcher.jar}/
 /antcall

!--
 antcall target=downloadgz
   param name=sourcefile value=${commons-pool.loc}/
-  param name=destfile value=${commons-pool.jar}/
 /antcall

 antcall target=downloadgz
   param name=sourcefile value=${commons-dbcp.loc}/
-  param name=destfile value=${commons-dbcp.jar}/
-  param name=destdir value=${base.path}/
 /antcall
 --

 antcall target=downloadgz
   param name=sourcefile value=${commons-httpclient.loc}/
-  param name=destfile value=${commons-httpclient.jar}/
 /antcall

 antcall target=downloadfile
@@ -1801,22 +1784,18 @@

 antcall target=downloadgz
   param name=sourcefile value=${struts.loc}/
-  param name=destfile value=${struts.jar}/
 /antcall

 antcall target=downloadgz
   param name=sourcefile value=${commons-daemon.loc}/
-  param name=destfile value=${commons-daemon.jar}/
 /antcall

 antcall target=downloadgz
   param name=sourcefile 

Re: cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm RealmBase.java

2005-03-02 Thread Remy Maucherat
[EMAIL PROTECTED] wrote:
luehe   2005/03/02 11:27:11
  Modified:catalina/src/share/org/apache/catalina/realm RealmBase.java
  Log:
  Consider the case where original request was mapped to welcome page.
  In this case, the mapped welcome page (and not the original request
  URI!) needs to be the target of hasResourcePermission().
  
  This is consistent with the change that had been made in findSecurityConstraints().
  
  BTW, shouldn't request.getDecodedRequestURI() return the mapped
  welcome page (instead of the original URI) in this case?
  In other words, shouldn't the path passed to
mappingData.requestPath.setString(pathStr)
  in Mapper.java be propagated to the request object associatd with the
  mappingData?
I consider welcome files to be internal forwards (since it is allowed to 
handle them this way). As a result, they shouldn't be matched by 
secrurity constraints. Only the original request path should be the used 
(so here it's getDecodedRequestURI - as sent by the client).

Rémy
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


DO NOT REPLY [Bug 33816] - Unkosher lines in build.xml

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=33816.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=33816


[EMAIL PROTECTED] changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 Resolution||INVALID




--- Additional Comments From [EMAIL PROTECTED]  2005-03-02 21:01 ---
The destfile is used by the testexist target

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm RealmBase.java

2005-03-02 Thread Bill Barker

- Original Message -
From: Remy Maucherat [EMAIL PROTECTED]
To: Tomcat Developers List tomcat-dev@jakarta.apache.org
Sent: Wednesday, March 02, 2005 11:56 AM
Subject: Re: cvs commit:
jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm
RealmBase.java


[EMAIL PROTECTED] wrote:
 luehe   2005/03/02 11:27:11

   Modified:catalina/src/share/org/apache/catalina/realm
RealmBase.java
   Log:
   Consider the case where original request was mapped to welcome page.
   In this case, the mapped welcome page (and not the original request
   URI!) needs to be the target of hasResourcePermission().

   This is consistent with the change that had been made in
findSecurityConstraints().

   BTW, shouldn't request.getDecodedRequestURI() return the mapped
   welcome page (instead of the original URI) in this case?
   In other words, shouldn't the path passed to
 mappingData.requestPath.setString(pathStr)
   in Mapper.java be propagated to the request object associatd with the
   mappingData?

I consider welcome files to be internal forwards (since it is allowed to
handle them this way). As a result, they shouldn't be matched by
secrurity constraints. Only the original request path should be the used
(so here it's getDecodedRequestURI - as sent by the client).


I agree with Remy.  It's an internal Tomcat implementation detail that
welcome-files aren't handled via DefaultServlet doing:
  RequestDispatcher rd = request.getRequestDispatcher(welcome[i]);
  rd.forward(request, response);
Since this is explicitly allowed by the spec, nobody can expect that a
security-constraint mapped only to the welcome-file will be applied.
However, this is probably another thing that should be better specified in
the 2.5 spec.

Rémy

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]





This message is intended only for the use of the person(s) listed above as the 
intended recipient(s), and may contain information that is PRIVILEGED and 
CONFIDENTIAL.  If you are not an intended recipient, you may not read, copy, or 
distribute this message or any attachment. If you received this communication 
in error, please notify us immediately by e-mail and then delete all copies of 
this message and any attachments.

In addition you should be aware that ordinary (unencrypted) e-mail sent through 
the Internet is not secure. Do not send confidential or sensitive information, 
such as social security numbers, account numbers, personal identification 
numbers and passwords, to us via ordinary (unencrypted) e-mail.


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/valves ValveBase.java

2005-03-02 Thread remm
remm2005/03/02 12:19:58

  Modified:catalina/src/share/org/apache/catalina/valves ValveBase.java
  Log:
  - Move the creation of the logger to a little bit later (not late enough 
probably, but for Tomcat standalone it works).
  
  Revision  ChangesPath
  1.18  +3 -2  
jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/valves/ValveBase.java
  
  Index: ValveBase.java
  ===
  RCS file: 
/home/cvs/jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/valves/ValveBase.java,v
  retrieving revision 1.17
  retrieving revision 1.18
  diff -u -r1.17 -r1.18
  --- ValveBase.java23 Feb 2005 19:27:56 -  1.17
  +++ ValveBase.java2 Mar 2005 20:19:58 -   1.18
  @@ -114,7 +114,7 @@
   public void setContainer(Container container) {
   
   this.container = container;
  -this.containerLog = container.getLogger();
  +
   }
   
   
  @@ -239,6 +239,7 @@
   Container container=this.getContainer();
   if( container == null || ! (container instanceof ContainerBase) )
   return null;
  +this.containerLog = container.getLogger();
   ContainerBase containerBase=(ContainerBase)container;
   Pipeline pipe=containerBase.getPipeline();
   Valve valves[]=pipe.getValves();
  
  
  

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm RealmBase.java

2005-03-02 Thread Jan Luehe
Bill/Remy,

Bill Barker wrote:
 - Original Message -
 From: Remy Maucherat [EMAIL PROTECTED]
 To: Tomcat Developers List tomcat-dev@jakarta.apache.org
 Sent: Wednesday, March 02, 2005 11:56 AM
 Subject: Re: cvs commit:
 jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm
 RealmBase.java
 
 
 
[EMAIL PROTECTED] wrote:

luehe   2005/03/02 11:27:11

  Modified:catalina/src/share/org/apache/catalina/realm
 
 RealmBase.java
 
  Log:
  Consider the case where original request was mapped to welcome page.
  In this case, the mapped welcome page (and not the original request
  URI!) needs to be the target of hasResourcePermission().

  This is consistent with the change that had been made in
 
 findSecurityConstraints().
 
  BTW, shouldn't request.getDecodedRequestURI() return the mapped
  welcome page (instead of the original URI) in this case?
  In other words, shouldn't the path passed to
mappingData.requestPath.setString(pathStr)
  in Mapper.java be propagated to the request object associatd with the
  mappingData?

I consider welcome files to be internal forwards (since it is allowed to
handle them this way). As a result, they shouldn't be matched by
secrurity constraints. Only the original request path should be the used
(so here it's getDecodedRequestURI - as sent by the client).

 
 
 I agree with Remy.  It's an internal Tomcat implementation detail that
 welcome-files aren't handled via DefaultServlet doing:
   RequestDispatcher rd = request.getRequestDispatcher(welcome[i]);
   rd.forward(request, response);
 Since this is explicitly allowed by the spec, nobody can expect that a
 security-constraint mapped only to the welcome-file will be applied.
 However, this is probably another thing that should be better specified in
 the 2.5 spec.


But SRV.9.10 (Welcome Files) already has this:

  The container may send the request to the welcome resource with
  a forward, a redirect, or a container specific mechanism
  **that is indistinguishable from a direct request**.

The latter to me implies that any sec constraints must be applied
to the mapped welcome page (if any).

Also, see the attached diffs, in particular:

-String uri = request.getDecodedRequestURI();
-String contextPath = hreq.getContextPath();
-if (contextPath.length()  0)
-uri = uri.substring(contextPath.length());
+String uri = request.getRequestPathMB().toString();

in findSecurityConstraints().

When accessing host:port:/somecontext/,
which has welcome page /somecontext/index.jsp,

request.getDecodedRequestURI() returns /somecontext/,
whereas request.getRequestPathMB().toString() returns
/index.jsp (as set by the mapper), so there already is a precedent
in findSecurityConstraints() to match sec constraints against
welcome page, which I think makes sense.

Otherwise, the following sec constraint:

  security-constraint
web-resource-collection
  web-resource-nameProtected Area/web-resource-name
  url-pattern*.jsp/url-pattern
  http-methodPUT/http-method
  http-methodDELETE/http-method
  http-methodGET/http-method
  http-methodPOST/http-method
/web-resource-collection
auth-constraint
  role-nametomcat/role-name
/auth-constraint
  /security-constraint

which is supposed to protect all JSP pages, would be bypassed if a
request was mapped to index.jsp welcome page.


Jan



 
Rémy

 
 -
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]
 
 
 
 
 
 This message is intended only for the use of the person(s) listed above as 
 the intended recipient(s), and may contain information that is PRIVILEGED and 
 CONFIDENTIAL.  If you are not an intended recipient, you may not read, copy, 
 or distribute this message or any attachment. If you received this 
 communication in error, please notify us immediately by e-mail and then 
 delete all copies of this message and any attachments.
 
 In addition you should be aware that ordinary (unencrypted) e-mail sent 
 through the Internet is not secure. Do not send confidential or sensitive 
 information, such as social security numbers, account numbers, personal 
 identification numbers and passwords, to us via ordinary (unencrypted) e-mail.
 
 
 
 
 
 
 -
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]
Index: RealmBase.java
===
RCS file: 
/home/cvs/jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm/RealmBase.java,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -r1.23 -r1.24
--- RealmBase.java  26 Dec 2003 17:33:44 -  1.23
+++ RealmBase.java  10 Jan 2004 17:23:39 -  1.24
@@ -1,7 +1,7 @@
 

cvs commit: jakarta-tomcat-jasper/jasper2/src/share/org/apache/jasper/compiler Generator.java JspUtil.java

2005-03-02 Thread markt
markt   2005/03/02 12:56:03

  Modified:jasper2/src/share/org/apache/jasper/compiler Tag:
tomcat_4_branch Generator.java JspUtil.java
  Log:
  Port fix for 22867 tag handlers can't be inner/nested classes from TC5
   - TC4 port provided by Steven Parkes in bug 24586
  
  Revision  ChangesPath
  No   revision
  No   revision
  1.35.2.28 +14 -10
jakarta-tomcat-jasper/jasper2/src/share/org/apache/jasper/compiler/Generator.java
  
  Index: Generator.java
  ===
  RCS file: 
/home/cvs/jakarta-tomcat-jasper/jasper2/src/share/org/apache/jasper/compiler/Generator.java,v
  retrieving revision 1.35.2.27
  retrieving revision 1.35.2.28
  diff -u -r1.35.2.27 -r1.35.2.28
  --- Generator.java22 Feb 2005 22:00:54 -  1.35.2.27
  +++ Generator.java2 Mar 2005 20:56:02 -   1.35.2.28
  @@ -648,7 +648,7 @@
   if (beanInfo.checkVariable(name)) {
   // Bean is defined using useBean, introspect at compile time
   Class bean = beanInfo.getBeanType(name);
  -String beanName = bean.getName();
  +String beanName = JspUtil.getCanonicalName(bean);
   java.lang.reflect.Method meth =
   JspRuntimeLibrary.getReadMethod(bean, property);
   String methodName = meth.getName();
  @@ -1293,21 +1293,23 @@
   declareScriptingVars(n, VariableInfo.AT_BEGIN);
   saveScriptingVars(n, VariableInfo.AT_BEGIN);
   
  -out.printin(tagHandlerClass.getName());
  +String tagHandlerClassName =
  +JspUtil.getCanonicalName(tagHandlerClass);
  +out.printin(tagHandlerClassName);
   out.print( );
   out.print(tagHandlerVar);
   out.print( = );
   if (ctxt.getOptions().isPoolingEnabled()) {
   out.print(();
  -out.print(tagHandlerClass.getName());
  +out.print(tagHandlerClassName);
   out.print() );
   out.print(n.getTagHandlerPoolName());
   out.print(.get();
  -out.print(tagHandlerClass.getName());
  +out.print(tagHandlerClassName);
   out.println(.class););
   } else {
   out.print(new );
  -out.print(tagHandlerClass.getName());
  +out.print(tagHandlerClassName);
   out.println((););
   }
   
  @@ -1750,11 +1752,12 @@
   throws JasperException {
   
   if (propEditorClass != null) {
  -return ( + c.getName()
  +String className = JspUtil.getCanonicalName(c);
  +return ( + className
   + 
)JspRuntimeLibrary.getValueFromBeanInfoPropertyEditor(
  -+ c.getName() + .class, \ + attrName + \, 
  ++ className + .class, \ + attrName + \, 
   + quote(s) + , 
  -+ propEditorClass.getName() + .class);
  ++ JspUtil.getCanonicalName(propEditorClass) + .class);
   } else if (c == String.class) {
   return quote(s);
   } else if (c == boolean.class) {
  @@ -1808,9 +1811,10 @@
   } else if (c == Object.class) {
   return new String( + quote(s) + );
   } else {
  -return ( + c.getName()
  +String className = JspUtil.getCanonicalName(c);
  +return ( + className
   + )JspRuntimeLibrary.getValueFromPropertyEditorManager(
  -+ c.getName() + .class, \ + attrName + \, 
  ++ className + .class, \ + attrName + \, 
   + quote(s) + );
   }
   }   
  
  
  
  1.4.2.4   +29 -0 
jakarta-tomcat-jasper/jasper2/src/share/org/apache/jasper/compiler/JspUtil.java
  
  Index: JspUtil.java
  ===
  RCS file: 
/home/cvs/jakarta-tomcat-jasper/jasper2/src/share/org/apache/jasper/compiler/JspUtil.java,v
  retrieving revision 1.4.2.3
  retrieving revision 1.4.2.4
  diff -u -r1.4.2.3 -r1.4.2.4
  --- JspUtil.java  25 Aug 2004 20:53:31 -  1.4.2.3
  +++ JspUtil.java  2 Mar 2005 20:56:03 -   1.4.2.4
  @@ -423,6 +423,35 @@
   }
   return b;
   }
  +
  +// javac -classpath 
~mint/tomcat/common/lib/ant.jar:~mint/tomcat/common/endorsed/xml-apis.jar:~mint/tomcat/common/lib/servlet.jar
 `find . -name \*.java ` 
  +
  +
  +/**
  + * Compute the canonical name from a Class instance.  Note that a
  + * simple replacment of '$' with '.' of a binary name would not work,
  + * as '$' is a legal Java Identifier character.
  + 

DO NOT REPLY [Bug 24586] - Compilation error when exposing an Inner class

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=24586.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=24586


[EMAIL PROTECTED] changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 Resolution||INVALID




--- Additional Comments From [EMAIL PROTECTED]  2005-03-02 22:00 ---
I have applied the port - thanks for the patch - but it doesn't fix the test
case originally described here.

The test case needs to be modified to return the canonical rather than binary
name of the inner class. type.getName() is not sufficient. See the
getCanonicalName() function in the attached patch for how this might be 
performed.

With this modification (I just replaced type.getName() with a hard coded
test.FooTag.InnerBean) the test case works as expected.

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



DO NOT REPLY [Bug 13014] - OS/390/USS - Invalid url-pattern  in servlet mapping

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=13014.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=13014





--- Additional Comments From [EMAIL PROTECTED]  2005-03-02 22:31 ---
This is quite an old bug.

Having reviewed this bug I would make the following observations:
1. Users of OS/390 should have migrated to z/OS but as far as I can tell this
issue also applies to z/OS.
2. Binary fixes cannot be applied to CVS. I know in theory they could be reverse
engineered but I am not going own that road.
3. The getReporter() issue is in the deprecated HTTP connector.
4. A better fix may be to add a configuration option to o.a.c.util.RequestUtil 

I will leave this bug open for now but since AFAIAA none of the Tomcat
developers have access to a machine running z/OS this will be resolved as
WONTFIX at some point in the future unless appropriate source code patches are
provided for review.

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm RealmBase.java

2005-03-02 Thread Remy Maucherat
Jan Luehe wrote:
Bill/Remy,
But SRV.9.10 (Welcome Files) already has this:
  The container may send the request to the welcome resource with
  a forward, a redirect, or a container specific mechanism
  **that is indistinguishable from a direct request**.
The latter to me implies that any sec constraints must be applied
to the mapped welcome page (if any).
The plot thickens.
Also, see the attached diffs, in particular:
-String uri = request.getDecodedRequestURI();
-String contextPath = hreq.getContextPath();
-if (contextPath.length()  0)
-uri = uri.substring(contextPath.length());
+String uri = request.getRequestPathMB().toString();
in findSecurityConstraints().
When accessing host:port:/somecontext/,
which has welcome page /somecontext/index.jsp,
request.getDecodedRequestURI() returns /somecontext/,
whereas request.getRequestPathMB().toString() returns
/index.jsp (as set by the mapper), so there already is a precedent
in findSecurityConstraints() to match sec constraints against
welcome page, which I think makes sense.
Right. However, when I made that commit, the current mapper behavior may 
not have been in place already, or maybe it's simply that I thought the 
two would be equivalent (I was busy optimizing at the time). I don't 
quite remember ;)

Rémy
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


cvs commit: jakarta-tomcat-connectors/juli/src/java/org/apache/juli ClassLoaderLogManager.java FileHandler.java

2005-03-02 Thread remm
remm2005/03/02 13:40:00

  Modified:juli/src/java/org/apache/juli ClassLoaderLogManager.java
FileHandler.java
  Log:
  - The java.util.logging javadocs imply that the configuration of the handler 
(filter, formatter, etc) should be done by the handler itself.
  
  Revision  ChangesPath
  1.2   +30 -3 
jakarta-tomcat-connectors/juli/src/java/org/apache/juli/ClassLoaderLogManager.java
  
  Index: ClassLoaderLogManager.java
  ===
  RCS file: 
/home/cvs/jakarta-tomcat-connectors/juli/src/java/org/apache/juli/ClassLoaderLogManager.java,v
  retrieving revision 1.1
  retrieving revision 1.2
  diff -u -r1.1 -r1.2
  --- ClassLoaderLogManager.java2 Mar 2005 18:30:45 -   1.1
  +++ ClassLoaderLogManager.java2 Mar 2005 21:40:00 -   1.2
  @@ -16,13 +16,23 @@
   
   package org.apache.juli;
   
  -import java.util.logging.*;
  -import java.util.*;
   import java.io.IOException;
   import java.io.InputStream;
   import java.net.URLClassLoader;
   import java.security.AccessController;
   import java.security.PrivilegedAction;
  +import java.util.Collections;
  +import java.util.Enumeration;
  +import java.util.HashMap;
  +import java.util.Iterator;
  +import java.util.Map;
  +import java.util.Properties;
  +import java.util.StringTokenizer;
  +import java.util.WeakHashMap;
  +import java.util.logging.Handler;
  +import java.util.logging.Level;
  +import java.util.logging.LogManager;
  +import java.util.logging.Logger;
   
   
   /**
  @@ -294,12 +304,29 @@
   this.prefix.set(prefix);
   Handler handler = 
   (Handler) 
classLoader.loadClass(handlerClassName).newInstance();
  -this.prefix.set(null);
  +// FIXME: The specification strongly implies 
this should be done in the
  +// handler configuration
  +/*
  +// Initialize handler's level
   String handlerLevel = 
   info.props.getProperty(handlerName + 
.level);
   if (handlerLevel != null) {
   
handler.setLevel(Level.parse(handlerLevel.trim()));
   }
  +// Initialize filter
  +String filterName =
  +info.props.getProperty(handlerName + 
.filter);
  +if (filterName != null) {
  +try {
  +handler.setFilter
  +((Filter) 
classLoader.loadClass(filterName).newInstance());
  +} catch (Exception e) {
  +// FIXME: Report this using the main 
logger ?
  +// Ignore
  +}
  +}
  +*/
  +this.prefix.set(null);
   info.handlers.put(handlerName, handler);
   if (rootHandlers == null) {
   localRootLogger.addHandler(handler);
  
  
  
  1.2   +37 -8 
jakarta-tomcat-connectors/juli/src/java/org/apache/juli/FileHandler.java
  
  Index: FileHandler.java
  ===
  RCS file: 
/home/cvs/jakarta-tomcat-connectors/juli/src/java/org/apache/juli/FileHandler.java,v
  retrieving revision 1.1
  retrieving revision 1.2
  diff -u -r1.1 -r1.2
  --- FileHandler.java  2 Mar 2005 18:30:45 -   1.1
  +++ FileHandler.java  2 Mar 2005 21:40:00 -   1.2
  @@ -23,7 +23,10 @@
   import java.io.UnsupportedEncodingException;
   import java.sql.Timestamp;
   import java.util.logging.ErrorManager;
  +import java.util.logging.Filter;
  +import java.util.logging.Formatter;
   import java.util.logging.Handler;
  +import java.util.logging.Level;
   import java.util.logging.LogManager;
   import java.util.logging.LogRecord;
   import java.util.logging.SimpleFormatter;
  @@ -238,27 +241,53 @@
   LogManager manager = LogManager.getLogManager();
   String className = FileHandler.class.getName();
   
  +ClassLoader cl = Thread.currentThread().getContextClassLoader();
  +
   // Retrieve configuration of logging file name
   directory = getProperty(className + .directory, logs);
   prefix = getProperty(className + .prefix, juli.);
   suffix = getProperty(className + .suffix, .log);
   
  -// FIXME: Add filter configuration in LogManager ?
  -//setFilter(manager.getFilterProperty(className + .filter, null));
  -// 

DO NOT REPLY [Bug 33819] New: - 5.5.7 startup script does not work on Linux, JDK 1.5.0

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=33819.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=33819

   Summary: 5.5.7 startup script does not work on Linux, JDK 1.5.0
   Product: Tomcat 5
   Version: 5.5.7
  Platform: PC
OS/Version: Linux
Status: NEW
  Severity: blocker
  Priority: P1
 Component: Catalina
AssignedTo: tomcat-dev@jakarta.apache.org
ReportedBy: [EMAIL PROTECTED]


The startup 5.5.7 startup script does not work on Linux.  Please note that this
is NOT the JRE problem - I have JDK 1.5.0 (or 5.0 under the new numbering
system) installed, and have JAVA_HOME set to it. Note also that this is specific
to 5.5; after I was unable to get 5.5.7 to work, I downloaded 5.0.28, which
works per the installation instructions with no changes to my system.

After running the 5.5.7 startup.sh, catalina.log contains:

Error: could not find libjava.so
Error: could not find Java 2 Runtime Environment.

Looks like a path problem, but $JAVA_HOME is correct and $LD_LIBRARY_PATH is 
unset.

Regards
B. Wagman

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm RealmBase.java

2005-03-02 Thread Bill Barker

- Original Message -
From: Jan Luehe [EMAIL PROTECTED]
To: Tomcat Developers List tomcat-dev@jakarta.apache.org
Sent: Wednesday, March 02, 2005 12:51 PM
Subject: Re: cvs commit:
jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm
RealmBase.java


Bill/Remy,

Bill Barker wrote:
 - Original Message -
 From: Remy Maucherat [EMAIL PROTECTED]
 To: Tomcat Developers List tomcat-dev@jakarta.apache.org
 Sent: Wednesday, March 02, 2005 11:56 AM
 Subject: Re: cvs commit:
 jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm
 RealmBase.java



[EMAIL PROTECTED] wrote:

luehe   2005/03/02 11:27:11

  Modified:catalina/src/share/org/apache/catalina/realm

 RealmBase.java

  Log:
  Consider the case where original request was mapped to welcome page.
  In this case, the mapped welcome page (and not the original request
  URI!) needs to be the target of hasResourcePermission().

  This is consistent with the change that had been made in

 findSecurityConstraints().

  BTW, shouldn't request.getDecodedRequestURI() return the mapped
  welcome page (instead of the original URI) in this case?
  In other words, shouldn't the path passed to
mappingData.requestPath.setString(pathStr)
  in Mapper.java be propagated to the request object associatd with the
  mappingData?

I consider welcome files to be internal forwards (since it is allowed to
handle them this way). As a result, they shouldn't be matched by
secrurity constraints. Only the original request path should be the used
(so here it's getDecodedRequestURI - as sent by the client).



 I agree with Remy.  It's an internal Tomcat implementation detail that
 welcome-files aren't handled via DefaultServlet doing:
   RequestDispatcher rd = request.getRequestDispatcher(welcome[i]);
   rd.forward(request, response);
 Since this is explicitly allowed by the spec, nobody can expect that a
 security-constraint mapped only to the welcome-file will be applied.
 However, this is probably another thing that should be better specified
in
 the 2.5 spec.


But SRV.9.10 (Welcome Files) already has this:

  The container may send the request to the welcome resource with
  a forward, a redirect, or a container specific mechanism
  **that is indistinguishable from a direct request**.


I read the emphasised text as referring to 'container specific mechanism'.
Yes, I agree that the last-minute changes that were made to 9.10 made it a
total mess, but it still explicitly allows DefaultServlet to do a
rd.forward.

The latter to me implies that any sec constraints must be applied
to the mapped welcome page (if any).

Also, see the attached diffs, in particular:


Firstly, I'm strongly -1 on the patch, since removing the 'if(found)return'
statements causes Tomcat to no longer be spec-complient.  Just because the
spec is silly doesn't mean that we don't have to implement it.


-String uri = request.getDecodedRequestURI();
-String contextPath = hreq.getContextPath();
-if (contextPath.length()  0)
-uri = uri.substring(contextPath.length());
+String uri = request.getRequestPathMB().toString();

in findSecurityConstraints().

When accessing host:port:/somecontext/,
which has welcome page /somecontext/index.jsp,

request.getDecodedRequestURI() returns /somecontext/,
whereas request.getRequestPathMB().toString() returns
/index.jsp (as set by the mapper), so there already is a precedent
in findSecurityConstraints() to match sec constraints against
welcome page, which I think makes sense.


Servlet 12.8.3 says to use the decoded requestURI, which is defined as
contextPath+servletPath+pathInfo.  Since servletPath is set to /index.jsp in
Tomcat, I guess that requestPathMB is the correct one to use.

Otherwise, the following sec constraint:

  security-constraint
web-resource-collection
  web-resource-nameProtected Area/web-resource-name
  url-pattern*.jsp/url-pattern
  http-methodPUT/http-method
  http-methodDELETE/http-method
  http-methodGET/http-method
  http-methodPOST/http-method
/web-resource-collection
auth-constraint
  role-nametomcat/role-name
/auth-constraint
  /security-constraint

which is supposed to protect all JSP pages, would be bypassed if a
request was mapped to index.jsp welcome page.


Jan




Rémy


 -
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]





 This message is intended only for the use of the person(s) listed above as
the intended recipient(s), and may contain information that is PRIVILEGED
and CONFIDENTIAL.  If you are not an intended recipient, you may not read,
copy, or distribute this message or any attachment. If you received this
communication in error, please notify us immediately by e-mail and then
delete all copies of this message and any attachments.

 In addition you should be aware that ordinary 

Re: cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm RealmBase.java

2005-03-02 Thread Jan Luehe
Remy,

Remy Maucherat wrote:
 Jan Luehe wrote:
 
Bill/Remy,

But SRV.9.10 (Welcome Files) already has this:

  The container may send the request to the welcome resource with
  a forward, a redirect, or a container specific mechanism
  **that is indistinguishable from a direct request**.

The latter to me implies that any sec constraints must be applied
to the mapped welcome page (if any).
 
 
 The plot thickens.


What do you mean by that? ;-)
Do you agree the spec is pretty clear about the fact that
any sec constraints must be applied to welcome page?


Also, see the attached diffs, in particular:

-String uri = request.getDecodedRequestURI();
-String contextPath = hreq.getContextPath();
-if (contextPath.length()  0)
-uri = uri.substring(contextPath.length());
+String uri = request.getRequestPathMB().toString();

in findSecurityConstraints().

When accessing host:port:/somecontext/,
which has welcome page /somecontext/index.jsp,

request.getDecodedRequestURI() returns /somecontext/,
whereas request.getRequestPathMB().toString() returns
/index.jsp (as set by the mapper), so there already is a precedent
in findSecurityConstraints() to match sec constraints against
welcome page, which I think makes sense.
 
 
 Right. However, when I made that commit, the current mapper behavior may 
 not have been in place already, or maybe it's simply that I thought the 
 two would be equivalent (I was busy optimizing at the time). I don't 
 quite remember ;)


I think you did the right thing without realizing it. :)
The change I committed earlier today is just consistent with
what you had done.

I'm still nervous about request.getDecodedRequestURI() returning
the original URI even after the request has been mapped to a welcome
page. This violates spec requirement that any container specific
mechanism for mapping request to welcome page must be
indistinguishable from a direct request.


Jan



 Rémy
 
 -
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]
 


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm RealmBase.java

2005-03-02 Thread Remy Maucherat
Jan Luehe wrote:
Remy,
Remy Maucherat wrote:
Jan Luehe wrote:
Bill/Remy,
But SRV.9.10 (Welcome Files) already has this:
The container may send the request to the welcome resource with
a forward, a redirect, or a container specific mechanism
**that is indistinguishable from a direct request**.
The latter to me implies that any sec constraints must be applied
to the mapped welcome page (if any).
The plot thickens.
What do you mean by that? ;-)
Do you agree the spec is pretty clear about the fact that
any sec constraints must be applied to welcome page?
It means that the statement would seem to be conflicting with other 
things, but still seems relevant to the topic. So it makes the problem 
more complex.

Right. However, when I made that commit, the current mapper behavior may 
not have been in place already, or maybe it's simply that I thought the 
two would be equivalent (I was busy optimizing at the time). I don't 
quite remember ;)
I think you did the right thing without realizing it. :)
The change I committed earlier today is just consistent with
what you had done.
I was out to kiil the substring thing.
I'm still nervous about request.getDecodedRequestURI() returning
the original URI even after the request has been mapped to a welcome
page. This violates spec requirement that any container specific
mechanism for mapping request to welcome page must be
indistinguishable from a direct request.
Changing this is very risky, as it will have uses elsewhere. If using 
Eclipse, you should use the call hierarchy (since it's an internal 
method which is never used through reflection).

Rémy
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


Re: cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm RealmBase.java

2005-03-02 Thread Jan Luehe
Bill,

Bill Barker wrote:
 - Original Message -
 From: Jan Luehe [EMAIL PROTECTED]
 To: Tomcat Developers List tomcat-dev@jakarta.apache.org
 Sent: Wednesday, March 02, 2005 12:51 PM
 Subject: Re: cvs commit:
 jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm
 RealmBase.java
 
 
 
Bill/Remy,

Bill Barker wrote:

- Original Message -
From: Remy Maucherat [EMAIL PROTECTED]
To: Tomcat Developers List tomcat-dev@jakarta.apache.org
Sent: Wednesday, March 02, 2005 11:56 AM
Subject: Re: cvs commit:
jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm
RealmBase.java




[EMAIL PROTECTED] wrote:


luehe   2005/03/02 11:27:11

 Modified:catalina/src/share/org/apache/catalina/realm

RealmBase.java


 Log:
 Consider the case where original request was mapped to welcome page.
 In this case, the mapped welcome page (and not the original request
 URI!) needs to be the target of hasResourcePermission().

 This is consistent with the change that had been made in

findSecurityConstraints().


 BTW, shouldn't request.getDecodedRequestURI() return the mapped
 welcome page (instead of the original URI) in this case?
 In other words, shouldn't the path passed to
   mappingData.requestPath.setString(pathStr)
 in Mapper.java be propagated to the request object associatd with the
 mappingData?

I consider welcome files to be internal forwards (since it is allowed to
handle them this way). As a result, they shouldn't be matched by
secrurity constraints. Only the original request path should be the used
(so here it's getDecodedRequestURI - as sent by the client).



I agree with Remy.  It's an internal Tomcat implementation detail that
welcome-files aren't handled via DefaultServlet doing:
  RequestDispatcher rd = request.getRequestDispatcher(welcome[i]);
  rd.forward(request, response);
Since this is explicitly allowed by the spec, nobody can expect that a
security-constraint mapped only to the welcome-file will be applied.
However, this is probably another thing that should be better specified
 
 in
 
the 2.5 spec.


But SRV.9.10 (Welcome Files) already has this:

 The container may send the request to the welcome resource with
 a forward, a redirect, or a container specific mechanism
 **that is indistinguishable from a direct request**.

 
 
 I read the emphasised text as referring to 'container specific mechanism'.

So do I. indistinguishable from a direct request means that any
sec constraints will have to be applied to welcome pages when the
request is sent to the welcome page via container specific
mechanism (as in Tomcat).

 Yes, I agree that the last-minute changes that were made to 9.10 made it a
 total mess, but it still explicitly allows DefaultServlet to do a
 rd.forward.

Yes, in which case the welcome page that is the target of the
rd.forward() will not be subjected to any sec constraints.

So the spec is inconsistent as to whether sec constraints need to
be applied to welcome pages.

This means that web developers should always use a pattern of this
form:

  url-pattern/*/url-pattern

in their DD's security constraints if they want their welcome
pages to be subjected to the specified sec constraints no matter
which container their webapp is deployed on.

If they specify:

  url-pattern*.jsp/url-pattern

their index.jsp welcome page will not be subjected to any sec
constraints in containers that send the request to the welcome page
using rd.forward().

The latter to me implies that any sec constraints must be applied
to the mapped welcome page (if any).

Also, see the attached diffs, in particular:

 
 
 Firstly, I'm strongly -1 on the patch, since removing the 'if(found)return'
 statements causes Tomcat to no longer be spec-complient.  Just because the
 spec is silly doesn't mean that we don't have to implement it.

The patch I attached has been 1 year old.
My main purpose in attaching it was to draw attention to
this change in rev 1.24:
 
 
-String uri = request.getDecodedRequestURI();
-String contextPath = hreq.getContextPath();
-if (contextPath.length()  0)
-uri = uri.substring(contextPath.length());
+String uri = request.getRequestPathMB().toString();

in findSecurityConstraints().

Remy had restored the 'if(found)return' in rev 1.25:

revision 1.25
date: 2004/01/11 09:23:42;  author: remm;  state: Exp;  lines: +11 -11
- Ooops. Put back the if(found) blocks.

revision 1.24
date: 2004/01/10 17:23:39;  author: remm;  state: Exp;  lines: +16 -11
- findMethod wasn't called on the right collection.
- The algorithm ignored extension mapped constraints as long as a widcard
  or exact mapped constraint was found. This doesn't seem right (I did
quickly
  read the relevant portions of the spec).
- Next, I'll try to optimize the algorithm (allocating a collection on
each request
  is not good, we should add a matched contraints array on the request).

When accessing host:port:/somecontext/,

DO NOT REPLY [Bug 33810] - Stream closed errors from JSP tags under load

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=33810.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=33810


[EMAIL PROTECTED] changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 Resolution||INVALID




--- Additional Comments From [EMAIL PROTECTED]  2005-03-03 00:08 ---
Sounds like the client closed the connection while still writing content. Please
use tomcat-user to debug this

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



cvs commit: jakarta-tomcat-connectors/juli/src/java/org/apache/juli ClassLoaderLogManager.java FileHandler.java

2005-03-02 Thread remm
remm2005/03/02 16:23:00

  Modified:juli/src/java/org/apache/juli ClassLoaderLogManager.java
FileHandler.java
  Log:
  - Fix NPE caused by my last change.
  - Use ',' as separator for the handler lists.
  - Just noticed that java.util.logging does support a handlers property on 
loggers, and that I reinvented it
(I had been looking at the JDK 1.4 config files all along).
  
  Revision  ChangesPath
  1.3   +4 -4  
jakarta-tomcat-connectors/juli/src/java/org/apache/juli/ClassLoaderLogManager.java
  
  Index: ClassLoaderLogManager.java
  ===
  RCS file: 
/home/cvs/jakarta-tomcat-connectors/juli/src/java/org/apache/juli/ClassLoaderLogManager.java,v
  retrieving revision 1.2
  retrieving revision 1.3
  diff -u -r1.2 -r1.3
  --- ClassLoaderLogManager.java2 Mar 2005 21:40:00 -   1.2
  +++ ClassLoaderLogManager.java3 Mar 2005 00:23:00 -   1.3
  @@ -150,9 +150,9 @@
   final String handlers = getProperty(loggerName + .handlers);
   if (handlers != null) {
   logger.setUseParentHandlers(false);
  -StringTokenizer tok = new StringTokenizer(handlers);
  +StringTokenizer tok = new StringTokenizer(handlers, ,);
   while (tok.hasMoreTokens()) {
  -String handlerName = (tok.nextToken());
  +String handlerName = (tok.nextToken().trim());
   Handler handler = (Handler) info.handlers.get(handlerName);
   if (handler != null) {
   logger.addHandler(handler);
  @@ -283,9 +283,9 @@
   String rootHandlers = info.props.getProperty(.handlers);
   String handlers = info.props.getProperty(handlers);
   if (handlers != null) {
  -StringTokenizer tok = new StringTokenizer(handlers);
  +StringTokenizer tok = new StringTokenizer(handlers, ,);
   while (tok.hasMoreTokens()) {
  -String handlerName = (tok.nextToken());
  +String handlerName = (tok.nextToken().trim());
   String handlerClassName = handlerName;
   String prefix = ;
   if (handlerClassName.length() = 0) {
  
  
  
  1.3   +4 -2  
jakarta-tomcat-connectors/juli/src/java/org/apache/juli/FileHandler.java
  
  Index: FileHandler.java
  ===
  RCS file: 
/home/cvs/jakarta-tomcat-connectors/juli/src/java/org/apache/juli/FileHandler.java,v
  retrieving revision 1.2
  retrieving revision 1.3
  diff -u -r1.2 -r1.3
  --- FileHandler.java  2 Mar 2005 21:40:00 -   1.2
  +++ FileHandler.java  3 Mar 2005 00:23:00 -   1.3
  @@ -297,8 +297,10 @@
   String value = LogManager.getLogManager().getProperty(name);
   if (value == null) {
   value = defaultValue;
  +} else {
  +value = value.trim();
   }
  -return value.trim();
  +return value;
   }
   
   
  
  
  

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



DO NOT REPLY [Bug 33810] - Stream closed errors from JSP tags under load

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=33810.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=33810


[EMAIL PROTECTED] changed:

   What|Removed |Added

 Status|RESOLVED|REOPENED
 Resolution|INVALID |




-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



DO NOT REPLY [Bug 33810] - Stream closed errors from JSP tags under load

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=33810.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=33810





--- Additional Comments From [EMAIL PROTECTED]  2005-03-03 01:50 ---
All this is happening from JSPs that use JSP tags. These JSPs work fine under
normal load. If the stream is closed incorrectly by user code then this should
happen all the time, not just under load.

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



cvs commit: jakarta-tomcat-connectors/juli/src/java/org/apache/juli ClassLoaderLogManager.java FileHandler.java

2005-03-02 Thread remm
remm2005/03/02 17:51:13

  Modified:juli/src/java/org/apache/juli ClassLoaderLogManager.java
FileHandler.java
  Log:
  - Implement delegation in getProperty (when the current classloader does not 
have any configuration).
  - Read useParentHandlers property.
  - Code cleanup in FileHandler.
  
  Revision  ChangesPath
  1.4   +31 -5 
jakarta-tomcat-connectors/juli/src/java/org/apache/juli/ClassLoaderLogManager.java
  
  Index: ClassLoaderLogManager.java
  ===
  RCS file: 
/home/cvs/jakarta-tomcat-connectors/juli/src/java/org/apache/juli/ClassLoaderLogManager.java,v
  retrieving revision 1.3
  retrieving revision 1.4
  diff -u -r1.3 -r1.4
  --- ClassLoaderLogManager.java3 Mar 2005 00:23:00 -   1.3
  +++ ClassLoaderLogManager.java3 Mar 2005 01:51:12 -   1.4
  @@ -159,6 +159,17 @@
   }
   }
   }
  +
  +// Parse useParentHandlers to set if the logger should delegate to 
its parent.
  +// Unlike java.util.logging, the default is to not delegate if a 
list of handlers
  +// has been specified for the logger.
  +String useParentHandlersString = getProperty(loggerName + 
.useParentHandlers);
  +if ((useParentHandlersString != null) 
  + 
(!Boolean.valueOf(useParentHandlersString).booleanValue())) {
  +logger.setUseParentHandlers(false);
  +} else {
  +logger.setUseParentHandlers(true);
  +}
   
   return true;
   }
  @@ -216,11 +227,26 @@
   }
   final ClassLoader classLoader = Thread.currentThread()
   .getContextClassLoader();
  -String result = 
  -getClassLoaderInfo(classLoader).props.getProperty(name);
  -if (result == null) {
  -// FIXME: Look in parent classloader ? Probably not.
  -result = super.getProperty(name);
  +ClassLoaderLogInfo info = getClassLoaderInfo(classLoader);
  +String result = info.props.getProperty(name);
  +// If the property was not found, and the current classloader had no 
  +// configuration (property list is empty), look for the parent 
classloader
  +// properties.
  +if ((result == null)  (info.props.isEmpty())) {
  +ClassLoader current = classLoader.getParent();
  +while (current != null) {
  +info = (ClassLoaderLogInfo) classLoaderLoggers.get(current);
  +if (info != null) {
  +result = info.props.getProperty(name);
  +if ((result != null) || (!info.props.isEmpty())) {
  +break;
  +}
  +}
  +current = current.getParent();
  +}
  +if (result == null) {
  +result = super.getProperty(name);
  +}
   }
   // Simple property replacement (mostly for folder names)
   if (result != null) {
  
  
  
  1.4   +11 -72
jakarta-tomcat-connectors/juli/src/java/org/apache/juli/FileHandler.java
  
  Index: FileHandler.java
  ===
  RCS file: 
/home/cvs/jakarta-tomcat-connectors/juli/src/java/org/apache/juli/FileHandler.java,v
  retrieving revision 1.3
  retrieving revision 1.4
  diff -u -r1.3 -r1.4
  --- FileHandler.java  3 Mar 2005 00:23:00 -   1.3
  +++ FileHandler.java  3 Mar 2005 01:51:12 -   1.4
  @@ -20,7 +20,6 @@
   import java.io.File;
   import java.io.FileWriter;
   import java.io.PrintWriter;
  -import java.io.UnsupportedEncodingException;
   import java.sql.Timestamp;
   import java.util.logging.ErrorManager;
   import java.util.logging.Filter;
  @@ -51,6 +50,14 @@
   open();
   }
   
  +
  +public FileHandler(String directory, String prefix, String suffix) {
  +this();
  +this.directory = directory;
  +this.prefix = prefix;
  +this.suffix = suffix;
  +}
  +
   
   // - Instance 
Variables
   
  @@ -86,63 +93,6 @@
   private PrintWriter writer = null;
   
   
  -// - 
Properties
  -
  -
  -/**
  - * Return the directory in which we create log files.
  -public String getDirectory() {
  -return (directory);
  -}
  - */
  -
  -
  -/**
  - * Set the directory in which we create log files.
  - *
  - * @param directory The new log file directory
  -public void setDirectory(String directory) {
  -this.directory = directory;
  -}
  - */
  -
  -
  -/**
  - * Return the log file prefix.
  -public String getPrefix() {
  -return (prefix);
  -}
  - */
  -
  -
  -/**
  - 

Re: cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/valves ValveBase.java

2005-03-02 Thread Jan Luehe


Remy Maucherat wrote:
 [EMAIL PROTECTED] wrote:
 
luehe   2005/02/23 11:27:56

  Modified:catalina/src/share/org/apache/catalina/authenticator
FormAuthenticator.java NonLoginAuthenticator.java
SSLAuthenticator.java SingleSignOn.java
   catalina/src/share/org/apache/catalina/realm
DataSourceRealm.java JDBCRealm.java JNDIRealm.java
RealmBase.java UserDatabaseRealm.java
   catalina/src/share/org/apache/catalina/valves ValveBase.java
  Log:
  No change in functionality.
  
  Added new containerLog instance var to RealmBase and ValveBase, which is
  initialized as container.getLogger() inside setContainer().
  
  This will make it easier to do something like
  
containerLog = LogFactory.getLog(container.logName()+.RealmBase);
  
  in the future, as suggested by Bill Barker.
 
 
 Actually, this is probably a bad idea (or at least the implementation is 
 bad): the logger must be retrieved only when the context class loader of 
 the application is set.

This is where I'm not following: ;-)
I don't see any dependency on the context's context class loader when
calling ContainerBase.getLogger(), which is implemented like this:

  logger = LogFactory.getLog(logName());

A context's context class loader is required only for loading webapp
resources.

Jan


 This means no retrieving the logger in 
 ValveBase.setContainer, since this is first called in StandardContext().



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



DO NOT REPLY [Bug 33810] - Stream closed errors from JSP tags under load

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=33810.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=33810


[EMAIL PROTECTED] changed:

   What|Removed |Added

 Status|REOPENED|RESOLVED
 Resolution||INVALID




--- Additional Comments From [EMAIL PROTECTED]  2005-03-03 03:01 ---
Looking at BodyContentImpl - the error is thrown if something tries to call
write some time after close was already called on the BodyContent. Why close was
called is up to your code. (For example, sendredirects, writing to stream after
a forwards, ...)

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Logging The Revenge

2005-03-02 Thread Remy Maucherat
Hi,
As I will rewrite the documentation for java.util.logging, I'd like to 
ask the question of how it will be packaged and distributed.

The package needs to be placed in the classpath (note: any custom 
components, such as handlers, formatters, etc, can be deployed in other 
classloaders, the only requirement is that their classes must be visible 
to the classloader which contains the logging configuration where they 
are used), and needs a system property to be used when starting the JVM 
(using -Djava.util.logging.manager=org.apache.juli.ClassLoaderLogManager).

The defaults provided by the java.util.logging implementation inside the 
JVM are acceptable for a development use (if usage remains simple 
enough), but are bad for production. So overall, it is decent, but could 
be better.

If the implementation is bundled, I'd recommend including it directly 
inside bootstrap.jar. If it's not, the package should be as easy to 
install as possible (it will be very small, it's a start :) ).

Comments ?
Rémy
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


Re: cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/valves ValveBase.java

2005-03-02 Thread Remy Maucherat
Jan Luehe wrote:
Remy Maucherat wrote:
Actually, this is probably a bad idea (or at least the implementation is 
bad): the logger must be retrieved only when the context class loader of 
the application is set.
This is where I'm not following: ;-)
I don't see any dependency on the context's context class loader when
calling ContainerBase.getLogger(), which is implemented like this:
  logger = LogFactory.getLog(logName());
A context's context class loader is required only for loading webapp
resources.
The configuration for that logger should be doable at the webapp level 
(to summarize, I'd like to be able to have my logger configured using 
either /WEB-INF/classes/logging.properties or 
common/classes/logging.properties if the first one does not exist). The 
logging implementation gets which config it should lookup for the logger 
based on what the context CL is when calling getLogger. So the context 
CL needs to be set properly (or getLogger has to be called again).

Rémy
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


Re: cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/valves ValveBase.java

2005-03-02 Thread Jan Luehe


Remy Maucherat wrote:
 Jan Luehe wrote:
 
Remy Maucherat wrote:


Actually, this is probably a bad idea (or at least the implementation is 
bad): the logger must be retrieved only when the context class loader of 
the application is set.

This is where I'm not following: ;-)
I don't see any dependency on the context's context class loader when
calling ContainerBase.getLogger(), which is implemented like this:

  logger = LogFactory.getLog(logName());

A context's context class loader is required only for loading webapp
resources.
 
 
 The configuration for that logger should be doable at the webapp level 
 (to summarize, I'd like to be able to have my logger configured using 
 either /WEB-INF/classes/logging.properties or 
 common/classes/logging.properties if the first one does not exist). The 
 logging implementation gets which config it should lookup for the logger 
 based on what the context CL is when calling getLogger. So the context 
 CL needs to be set properly (or getLogger has to be called again).

Got it. Thanks!

Jan




-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Logging The Revenge

2005-03-02 Thread Bill Barker

- Original Message -
From: Remy Maucherat [EMAIL PROTECTED]
To: Tomcat Developers List tomcat-dev@jakarta.apache.org
Sent: Wednesday, March 02, 2005 6:10 PM
Subject: Logging The Revenge


Hi,

As I will rewrite the documentation for java.util.logging, I'd like to
ask the question of how it will be packaged and distributed.

The package needs to be placed in the classpath (note: any custom
components, such as handlers, formatters, etc, can be deployed in other
classloaders, the only requirement is that their classes must be visible
to the classloader which contains the logging configuration where they
are used), and needs a system property to be used when starting the JVM
(using -Djava.util.logging.manager=org.apache.juli.ClassLoaderLogManager).

The defaults provided by the java.util.logging implementation inside the
JVM are acceptable for a development use (if usage remains simple
enough), but are bad for production. So overall, it is decent, but could
be better.

If the implementation is bundled, I'd recommend including it directly
inside bootstrap.jar. If it's not, the package should be as easy to
install as possible (it will be very small, it's a start :) ).

Comments ?


As a log4j user I'd prefer a separate jar for Juli (so that I can remove her
easily :).  I'm pretty agnostic as to including it in the default
tomcat-5.5.x.tar.gz or as tomcat-logging.tar.gz.  In the second case, it
should be enough to have tomcat-juli.jar.  It's easy enough to have
catalina.sh/bat look to see if tomcat-juli.jar is in bin and add
the -Dj.u.l.m= to the JAVA_OPTS.

I haven't had time to look at it in detail, but from what I have looked at
Juli looks nice.

Rémy

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]





This message is intended only for the use of the person(s) listed above as the 
intended recipient(s), and may contain information that is PRIVILEGED and 
CONFIDENTIAL.  If you are not an intended recipient, you may not read, copy, or 
distribute this message or any attachment. If you received this communication 
in error, please notify us immediately by e-mail and then delete all copies of 
this message and any attachments.

In addition you should be aware that ordinary (unencrypted) e-mail sent through 
the Internet is not secure. Do not send confidential or sensitive information, 
such as social security numbers, account numbers, personal identification 
numbers and passwords, to us via ordinary (unencrypted) e-mail.


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

DO NOT REPLY [Bug 33810] - Stream closed errors from JSP tags under load

2005-03-02 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=33810.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=33810


[EMAIL PROTECTED] changed:

   What|Removed |Added

 Status|RESOLVED|REOPENED
 Resolution|INVALID |




--- Additional Comments From [EMAIL PROTECTED]  2005-03-03 04:14 ---
There are no explicit stream closes in JSP. The JSPs use Struts tags which work
fine for some time and fail with these errors after some time and under load. If
it  is a code issue it should fail consistently under normal cases too. This
could be a  problem with how Tomcat handles JSP tags at run-time. If you need
more information, I will be glad to provide.

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]