This is an automated email from the ASF dual-hosted git repository.
markt pushed a commit to branch 9.0.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git
The following commit(s) were added to refs/heads/9.0.x by this push:
new c303148225 Code clean-up - formatting. No functional change.
c303148225 is described below
commit c30314822526db2456dbfc10352899bd6188d1e9
Author: Mark Thomas <[email protected]>
AuthorDate: Tue Jul 4 12:31:50 2023 +0100
Code clean-up - formatting. No functional change.
---
java/org/apache/catalina/filters/Constants.java | 3 +-
java/org/apache/catalina/filters/CorsFilter.java | 12 ++++----
.../catalina/filters/CsrfPreventionFilter.java | 10 +++----
.../catalina/filters/CsrfPreventionFilterBase.java | 4 +--
.../org/apache/catalina/filters/ExpiresFilter.java | 34 +++++++++++++---------
.../catalina/filters/HttpHeaderSecurityFilter.java | 4 ++-
.../apache/catalina/filters/RateLimitFilter.java | 4 +--
.../apache/catalina/filters/RemoteIpFilter.java | 22 +++++++-------
.../catalina/filters/RestCsrfPreventionFilter.java | 15 +++++-----
9 files changed, 59 insertions(+), 49 deletions(-)
diff --git a/java/org/apache/catalina/filters/Constants.java
b/java/org/apache/catalina/filters/Constants.java
index 25693aef56..dbec2a72cc 100644
--- a/java/org/apache/catalina/filters/Constants.java
+++ b/java/org/apache/catalina/filters/Constants.java
@@ -60,5 +60,6 @@ public final class Constants {
/**
* The servlet context attribute key under which the CSRF REST header name
can be found.
*/
- public static final String CSRF_REST_NONCE_HEADER_NAME_KEY =
"org.apache.catalina.filters.CSRF_REST_NONCE_HEADER_NAME";
+ public static final String CSRF_REST_NONCE_HEADER_NAME_KEY =
+ "org.apache.catalina.filters.CSRF_REST_NONCE_HEADER_NAME";
}
diff --git a/java/org/apache/catalina/filters/CorsFilter.java
b/java/org/apache/catalina/filters/CorsFilter.java
index ef9705510c..1994bcc6b3 100644
--- a/java/org/apache/catalina/filters/CorsFilter.java
+++ b/java/org/apache/catalina/filters/CorsFilter.java
@@ -276,8 +276,8 @@ public class CorsFilter extends GenericFilter {
}
// Section 6.2.4
- String accessControlRequestHeadersHeader = request
-
.getHeader(CorsFilter.REQUEST_HEADER_ACCESS_CONTROL_REQUEST_HEADERS);
+ String accessControlRequestHeadersHeader =
+
request.getHeader(CorsFilter.REQUEST_HEADER_ACCESS_CONTROL_REQUEST_HEADERS);
List<String> accessControlRequestHeaders = new ArrayList<>();
if (accessControlRequestHeadersHeader != null &&
!accessControlRequestHeadersHeader.trim().isEmpty()) {
String[] headers =
accessControlRequestHeadersHeader.trim().split(",");
@@ -563,8 +563,8 @@ public class CorsFilter extends GenericFilter {
String method = request.getMethod();
if (method != null) {
if ("OPTIONS".equals(method)) {
- String accessControlRequestMethodHeader = request
-
.getHeader(REQUEST_HEADER_ACCESS_CONTROL_REQUEST_METHOD);
+ String accessControlRequestMethodHeader =
+
request.getHeader(REQUEST_HEADER_ACCESS_CONTROL_REQUEST_METHOD);
if (accessControlRequestMethodHeader != null &&
!accessControlRequestMethodHeader.isEmpty()) {
requestType = CORSRequestType.PRE_FLIGHT;
} else if (accessControlRequestMethodHeader != null &&
@@ -924,8 +924,8 @@ public class CorsFilter extends GenericFilter {
/**
* Request headers sent as 'Access-Control-Request-Headers' header, for
pre-flight request.
*/
- public static final String HTTP_REQUEST_ATTRIBUTE_REQUEST_HEADERS =
HTTP_REQUEST_ATTRIBUTE_PREFIX +
- "request.headers";
+ public static final String HTTP_REQUEST_ATTRIBUTE_REQUEST_HEADERS =
+ HTTP_REQUEST_ATTRIBUTE_PREFIX + "request.headers";
// -------------------------------------------------------------- Constants
/**
diff --git a/java/org/apache/catalina/filters/CsrfPreventionFilter.java
b/java/org/apache/catalina/filters/CsrfPreventionFilter.java
index 9bb2660a33..ef5e979126 100644
--- a/java/org/apache/catalina/filters/CsrfPreventionFilter.java
+++ b/java/org/apache/catalina/filters/CsrfPreventionFilter.java
@@ -258,8 +258,8 @@ public class CsrfPreventionFilter extends
CsrfPreventionFilterBase {
return null;
}
@SuppressWarnings("unchecked")
- NonceCache<String> nonceCache = (NonceCache<String>) session
- .getAttribute(Constants.CSRF_NONCE_SESSION_ATTR_NAME);
+ NonceCache<String> nonceCache =
+ (NonceCache<String>)
session.getAttribute(Constants.CSRF_NONCE_SESSION_ATTR_NAME);
return nonceCache;
}
@@ -355,14 +355,14 @@ public class CsrfPreventionFilter extends
CsrfPreventionFilterBase {
// Although the internal implementation uses a Map, this cache
// implementation is only concerned with the keys.
- private final Map<T, T> cache;
+ private final Map<T,T> cache;
public LruCache(final int cacheSize) {
- cache = new LinkedHashMap<T, T>() {
+ cache = new LinkedHashMap<T,T>() {
private static final long serialVersionUID = 1L;
@Override
- protected boolean removeEldestEntry(Map.Entry<T, T> eldest) {
+ protected boolean removeEldestEntry(Map.Entry<T,T> eldest) {
if (size() > cacheSize) {
return true;
}
diff --git a/java/org/apache/catalina/filters/CsrfPreventionFilterBase.java
b/java/org/apache/catalina/filters/CsrfPreventionFilterBase.java
index f4aebc8d32..2e63d6b4a5 100644
--- a/java/org/apache/catalina/filters/CsrfPreventionFilterBase.java
+++ b/java/org/apache/catalina/filters/CsrfPreventionFilterBase.java
@@ -79,8 +79,8 @@ public abstract class CsrfPreventionFilterBase extends
FilterBase {
Class<?> clazz = Class.forName(randomClass);
randomSource = (Random) clazz.getConstructor().newInstance();
} catch (ReflectiveOperationException e) {
- ServletException se = new
ServletException(sm.getString("csrfPrevention.invalidRandomClass", randomClass),
- e);
+ ServletException se =
+ new
ServletException(sm.getString("csrfPrevention.invalidRandomClass",
randomClass), e);
throw se;
}
}
diff --git a/java/org/apache/catalina/filters/ExpiresFilter.java
b/java/org/apache/catalina/filters/ExpiresFilter.java
index b8f6afb1a6..e79f9e8f42 100644
--- a/java/org/apache/catalina/filters/ExpiresFilter.java
+++ b/java/org/apache/catalina/filters/ExpiresFilter.java
@@ -446,8 +446,13 @@ public class ExpiresFilter extends FilterBase {
* Duration unit
*/
protected enum DurationUnit {
- DAY(Calendar.DAY_OF_YEAR), HOUR(Calendar.HOUR),
MINUTE(Calendar.MINUTE), MONTH(Calendar.MONTH),
- SECOND(Calendar.SECOND), WEEK(Calendar.WEEK_OF_YEAR),
YEAR(Calendar.YEAR);
+ DAY(Calendar.DAY_OF_YEAR),
+ HOUR(Calendar.HOUR),
+ MINUTE(Calendar.MINUTE),
+ MONTH(Calendar.MONTH),
+ SECOND(Calendar.SECOND),
+ WEEK(Calendar.WEEK_OF_YEAR),
+ YEAR(Calendar.YEAR);
private final int calendarField;
@@ -506,7 +511,8 @@ public class ExpiresFilter extends FilterBase {
* {@link StartingPoint#LAST_MODIFICATION_TIME}).
*/
protected enum StartingPoint {
- ACCESS_TIME, LAST_MODIFICATION_TIME
+ ACCESS_TIME,
+ LAST_MODIFICATION_TIME
}
/**
@@ -1055,8 +1061,8 @@ public class ExpiresFilter extends FilterBase {
* @return array of patterns (non {@code null})
*/
protected static String[] commaDelimitedListToStringArray(String
commaDelimitedStrings) {
- return (commaDelimitedStrings == null ||
commaDelimitedStrings.length() == 0) ? new String[0]
- : commaSeparatedValuesPattern.split(commaDelimitedStrings);
+ return (commaDelimitedStrings == null ||
commaDelimitedStrings.length() == 0) ? new String[0] :
+ commaSeparatedValuesPattern.split(commaDelimitedStrings);
}
/**
@@ -1167,7 +1173,7 @@ public class ExpiresFilter extends FilterBase {
/**
* Expires configuration by content type. Visible for test.
*/
- private Map<String, ExpiresConfiguration>
expiresConfigurationByContentType = new LinkedHashMap<>();
+ private Map<String,ExpiresConfiguration> expiresConfigurationByContentType
= new LinkedHashMap<>();
@Override
public void doFilter(ServletRequest request, ServletResponse response,
FilterChain chain)
@@ -1364,7 +1370,7 @@ public class ExpiresFilter extends FilterBase {
return calendar.getTime();
}
- public Map<String, ExpiresConfiguration>
getExpiresConfigurationByContentType() {
+ public Map<String,ExpiresConfiguration>
getExpiresConfigurationByContentType() {
return expiresConfigurationByContentType;
}
@@ -1381,8 +1387,8 @@ public class ExpiresFilter extends FilterBase {
try {
if (name.startsWith(PARAMETER_EXPIRES_BY_TYPE)) {
- String contentType =
name.substring(PARAMETER_EXPIRES_BY_TYPE.length()).trim()
- .toLowerCase(Locale.ENGLISH);
+ String contentType =
+
name.substring(PARAMETER_EXPIRES_BY_TYPE.length()).trim().toLowerCase(Locale.ENGLISH);
ExpiresConfiguration expiresConfiguration =
parseExpiresConfiguration(value);
this.expiresConfigurationByContentType.put(contentType,
expiresConfiguration);
} else if (name.equalsIgnoreCase(PARAMETER_EXPIRES_DEFAULT)) {
@@ -1413,8 +1419,8 @@ public class ExpiresFilter extends FilterBase {
*/
protected boolean
isEligibleToExpirationHeaderGeneration(HttpServletRequest request,
XHttpServletResponse response) {
- boolean expirationHeaderHasBeenSet =
response.containsHeader(HEADER_EXPIRES) ||
- contains(response.getCacheControlHeader(), "max-age");
+ boolean expirationHeaderHasBeenSet =
+ response.containsHeader(HEADER_EXPIRES) ||
contains(response.getCacheControlHeader(), "max-age");
if (expirationHeaderHasBeenSet) {
if (log.isDebugEnabled()) {
log.debug(sm.getString("expiresFilter.expirationHeaderAlreadyDefined",
request.getRequestURI(),
@@ -1475,8 +1481,8 @@ public class ExpiresFilter extends FilterBase {
String maxAgeDirective = "max-age=" + ((expirationDate.getTime() -
System.currentTimeMillis()) / 1000);
String cacheControlHeader = response.getCacheControlHeader();
- String newCacheControlHeader = (cacheControlHeader == null) ?
maxAgeDirective
- : cacheControlHeader + ", " + maxAgeDirective;
+ String newCacheControlHeader =
+ (cacheControlHeader == null) ? maxAgeDirective :
cacheControlHeader + ", " + maxAgeDirective;
response.setHeader(HEADER_CACHE_CONTROL, newCacheControlHeader);
response.setDateHeader(HEADER_EXPIRES, expirationDate.getTime());
}
@@ -1594,7 +1600,7 @@ public class ExpiresFilter extends FilterBase {
}
public void setExpiresConfigurationByContentType(
- Map<String, ExpiresConfiguration>
expiresConfigurationByContentType) {
+ Map<String,ExpiresConfiguration>
expiresConfigurationByContentType) {
this.expiresConfigurationByContentType =
expiresConfigurationByContentType;
}
diff --git a/java/org/apache/catalina/filters/HttpHeaderSecurityFilter.java
b/java/org/apache/catalina/filters/HttpHeaderSecurityFilter.java
index 668ce3b444..81125441fa 100644
--- a/java/org/apache/catalina/filters/HttpHeaderSecurityFilter.java
+++ b/java/org/apache/catalina/filters/HttpHeaderSecurityFilter.java
@@ -254,7 +254,9 @@ public class HttpHeaderSecurityFilter extends FilterBase {
private enum XFrameOption {
- DENY("DENY"), SAME_ORIGIN("SAMEORIGIN"), ALLOW_FROM("ALLOW-FROM");
+ DENY("DENY"),
+ SAME_ORIGIN("SAMEORIGIN"),
+ ALLOW_FROM("ALLOW-FROM");
private final String headerValue;
diff --git a/java/org/apache/catalina/filters/RateLimitFilter.java
b/java/org/apache/catalina/filters/RateLimitFilter.java
index 3467d3e71f..58b8572a0c 100644
--- a/java/org/apache/catalina/filters/RateLimitFilter.java
+++ b/java/org/apache/catalina/filters/RateLimitFilter.java
@@ -193,8 +193,8 @@ public class RateLimitFilter extends GenericFilter {
statusMessage = param;
}
- ScheduledExecutorService executorService =
- (ScheduledExecutorService)
getServletContext().getAttribute(ScheduledThreadPoolExecutor.class.getName());
+ ScheduledExecutorService executorService = (ScheduledExecutorService)
getServletContext()
+ .getAttribute(ScheduledThreadPoolExecutor.class.getName());
if (executorService == null) {
executorService = new
java.util.concurrent.ScheduledThreadPoolExecutor(1);
}
diff --git a/java/org/apache/catalina/filters/RemoteIpFilter.java
b/java/org/apache/catalina/filters/RemoteIpFilter.java
index a00822816b..1d0675d755 100644
--- a/java/org/apache/catalina/filters/RemoteIpFilter.java
+++ b/java/org/apache/catalina/filters/RemoteIpFilter.java
@@ -462,7 +462,7 @@ public class RemoteIpFilter extends GenericFilter {
public static class XForwardedRequest extends HttpServletRequestWrapper {
- protected final Map<String, List<String>> headers;
+ protected final Map<String,List<String>> headers;
protected String localName;
@@ -513,15 +513,15 @@ public class RemoteIpFilter extends GenericFilter {
@Override
public String getHeader(String name) {
- Map.Entry<String, List<String>> header = getHeaderEntry(name);
+ Map.Entry<String,List<String>> header = getHeaderEntry(name);
if (header == null || header.getValue() == null ||
header.getValue().isEmpty()) {
return null;
}
return header.getValue().get(0);
}
- protected Map.Entry<String, List<String>> getHeaderEntry(String name) {
- for (Map.Entry<String, List<String>> entry : headers.entrySet()) {
+ protected Map.Entry<String,List<String>> getHeaderEntry(String name) {
+ for (Map.Entry<String,List<String>> entry : headers.entrySet()) {
if (entry.getKey().equalsIgnoreCase(name)) {
return entry;
}
@@ -536,7 +536,7 @@ public class RemoteIpFilter extends GenericFilter {
@Override
public Enumeration<String> getHeaders(String name) {
- Map.Entry<String, List<String>> header = getHeaderEntry(name);
+ Map.Entry<String,List<String>> header = getHeaderEntry(name);
if (header == null || header.getValue() == null) {
return
Collections.enumeration(Collections.<String>emptyList());
}
@@ -588,7 +588,7 @@ public class RemoteIpFilter extends GenericFilter {
}
public void removeHeader(String name) {
- Map.Entry<String, List<String>> header = getHeaderEntry(name);
+ Map.Entry<String,List<String>> header = getHeaderEntry(name);
if (header != null) {
headers.remove(header.getKey());
}
@@ -596,7 +596,7 @@ public class RemoteIpFilter extends GenericFilter {
public void setHeader(String name, String value) {
List<String> values = Collections.singletonList(value);
- Map.Entry<String, List<String>> header = getHeaderEntry(name);
+ Map.Entry<String,List<String>> header = getHeaderEntry(name);
if (header == null) {
headers.put(name, values);
} else {
@@ -701,8 +701,8 @@ public class RemoteIpFilter extends GenericFilter {
* @return array of patterns (non <code>null</code>)
*/
protected static String[] commaDelimitedListToStringArray(String
commaDelimitedStrings) {
- return (commaDelimitedStrings == null ||
commaDelimitedStrings.length() == 0) ? new String[0]
- : commaSeparatedValuesPattern.split(commaDelimitedStrings);
+ return (commaDelimitedStrings == null ||
commaDelimitedStrings.length() == 0) ? new String[0] :
+ commaSeparatedValuesPattern.split(commaDelimitedStrings);
}
/**
@@ -745,8 +745,8 @@ public class RemoteIpFilter extends GenericFilter {
/**
* @see #setInternalProxies(String)
*/
- private Pattern internalProxies = Pattern
- .compile("10\\.\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}|" +
"192\\.168\\.\\d{1,3}\\.\\d{1,3}|" +
+ private Pattern internalProxies =
+ Pattern.compile("10\\.\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}|" +
"192\\.168\\.\\d{1,3}\\.\\d{1,3}|" +
"169\\.254\\.\\d{1,3}\\.\\d{1,3}|" +
"127\\.\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}|" +
"100\\.6[4-9]{1}\\.\\d{1,3}\\.\\d{1,3}|" +
"100\\.[7-9]{1}\\d{1}\\.\\d{1,3}\\.\\d{1,3}|" +
"100\\.1[0-1]{1}\\d{1}\\.\\d{1,3}\\.\\d{1,3}|" +
"100\\.12[0-7]{1}\\.\\d{1,3}\\.\\d{1,3}|" +
diff --git a/java/org/apache/catalina/filters/RestCsrfPreventionFilter.java
b/java/org/apache/catalina/filters/RestCsrfPreventionFilter.java
index c3918f44b7..baaabb9e97 100644
--- a/java/org/apache/catalina/filters/RestCsrfPreventionFilter.java
+++ b/java/org/apache/catalina/filters/RestCsrfPreventionFilter.java
@@ -77,12 +77,13 @@ import javax.servlet.http.HttpSession;
*/
public class RestCsrfPreventionFilter extends CsrfPreventionFilterBase {
private enum MethodType {
- NON_MODIFYING_METHOD, MODIFYING_METHOD
+ NON_MODIFYING_METHOD,
+ MODIFYING_METHOD
}
private static final Pattern NON_MODIFYING_METHODS_PATTERN =
Pattern.compile("GET|HEAD|OPTIONS");
- private static final Predicate<String> nonModifyingMethods = m ->
Objects.nonNull(m) &&
- NON_MODIFYING_METHODS_PATTERN.matcher(m).matches();
+ private static final Predicate<String> nonModifyingMethods =
+ m -> Objects.nonNull(m) &&
NON_MODIFYING_METHODS_PATTERN.matcher(m).matches();
private Set<String> pathsAcceptingParams = new HashSet<>();
@@ -126,10 +127,10 @@ public class RestCsrfPreventionFilter extends
CsrfPreventionFilterBase {
}
private interface RestCsrfPreventionStrategy {
- NonceSupplier<HttpServletRequest, String> nonceFromRequestHeader =
HttpServletRequest::getHeader;
- NonceSupplier<HttpServletRequest, String[]> nonceFromRequestParams =
ServletRequest::getParameterValues;
- NonceSupplier<HttpSession, String> nonceFromSession = (s, k) ->
Objects.isNull(s) ? null
- : (String) s.getAttribute(k);
+ NonceSupplier<HttpServletRequest,String> nonceFromRequestHeader =
HttpServletRequest::getHeader;
+ NonceSupplier<HttpServletRequest,String[]> nonceFromRequestParams =
ServletRequest::getParameterValues;
+ NonceSupplier<HttpSession,String> nonceFromSession =
+ (s, k) -> Objects.isNull(s) ? null : (String)
s.getAttribute(k);
NonceConsumer<HttpServletResponse> nonceToResponse =
HttpServletResponse::setHeader;
NonceConsumer<HttpSession> nonceToSession = HttpSession::setAttribute;
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]