This is an automated email from the ASF dual-hosted git repository.
markt pushed a commit to branch 10.1.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git
The following commit(s) were added to refs/heads/10.1.x by this push:
new e0a65018f5 Code clean-up. Formatting. No functional change.
e0a65018f5 is described below
commit e0a65018f55c3ae0f62bf1a5f5aaad11cae98932
Author: Mark Thomas <[email protected]>
AuthorDate: Fri Jan 16 10:30:33 2026 +0000
Code clean-up. Formatting. No functional change.
Need to trigger a CI build to test some BuildBot changes
---
java/org/apache/catalina/connector/Connector.java | 4 ++--
java/org/apache/catalina/connector/Request.java | 8 ++++----
2 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/java/org/apache/catalina/connector/Connector.java
b/java/org/apache/catalina/connector/Connector.java
index 4e17a925f8..c9574efd88 100644
--- a/java/org/apache/catalina/connector/Connector.java
+++ b/java/org/apache/catalina/connector/Connector.java
@@ -1068,8 +1068,8 @@ public class Connector extends LifecycleMBeanBase {
// If SSL is enabled and a specific implementation isn't
specified, select the correct default.
if (JreCompat.isJre22Available() &&
OpenSSLStatus.getUseOpenSSL() && OpenSSLStatus.isAvailable()) {
// Use FFM and OpenSSL if available
- jsseProtocolHandler
-
.setSslImplementationName("org.apache.tomcat.util.net.openssl.panama.OpenSSLImplementation");
+ jsseProtocolHandler.setSslImplementationName(
+
"org.apache.tomcat.util.net.openssl.panama.OpenSSLImplementation");
} else if (aprStatusPresent && AprStatus.isAprAvailable() &&
AprStatus.getUseOpenSSL()) {
// Use tomcat-native and OpenSSL otherwise, if available
jsseProtocolHandler.setSslImplementationName(OpenSSLImplementation.class.getName());
diff --git a/java/org/apache/catalina/connector/Request.java
b/java/org/apache/catalina/connector/Request.java
index 64772d55cf..d7a86c3044 100644
--- a/java/org/apache/catalina/connector/Request.java
+++ b/java/org/apache/catalina/connector/Request.java
@@ -2727,8 +2727,8 @@ public class Request implements HttpServletRequest {
partsParseException = e;
} finally {
/*
- * GC will delete any temporary copies of uploaded files left
in the work directory but if we know that the
- * upload has failed then explicitly clean up now.
+ * GC will delete any temporary copies of uploaded files left
in the work directory but if we know that
+ * the upload has failed then explicitly clean up now.
*/
if (!success) {
parts.clear();
@@ -3075,8 +3075,8 @@ public class Request implements HttpServletRequest {
return;
}
parameters.processParameters(formData, 0, len);
- } else if (coyoteRequest.protocol().equals("HTTP/2.0")
- ||
"chunked".equalsIgnoreCase(coyoteRequest.getHeader("transfer-encoding"))) {
+ } else if (coyoteRequest.protocol().equals("HTTP/2.0") ||
+
"chunked".equalsIgnoreCase(coyoteRequest.getHeader("transfer-encoding"))) {
byte[] formData = null;
try {
formData = readChunkedPostBody();
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]