[tomcat] branch master updated: Proposed Connector API and XML refactoring

2020-04-15 Thread remm
This is an automated email from the ASF dual-hosted git repository.

remm pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/master by this push:
 new 92923fe  Proposed Connector API and XML refactoring
92923fe is described below

commit 92923febadb5d7901747530272302dc3da6311c2
Author: remm 
AuthorDate: Wed Apr 15 23:04:47 2020 +0200

Proposed Connector API and XML refactoring

See 
https://cwiki.apache.org/confluence/display/TOMCAT/Connector+API+refactoring
The basics were relatively easy to do [the XML given in the JIRA is
functional] although I have lots of items to finish: testsuite, JMX,
storeconfig, some defaults todo, polish [a few shotnames for some class
names here and there], documentation (ouch). This is essentially the
only way to do to allow progress on the get/set duplication which is
quite prevalent in the connector API (in addition to a lot of other
cleanups), without this item 2 "Reduce instances of setters and getters
for the same property" on the list will have to be given up on.
Please indicate if this magnitude of changes is acceptable in Tomcat 10.
---
 TOMCAT-NEXT.txt | 4 
 1 file changed, 4 insertions(+)

diff --git a/TOMCAT-NEXT.txt b/TOMCAT-NEXT.txt
index 129a8c7..e535179 100644
--- a/TOMCAT-NEXT.txt
+++ b/TOMCAT-NEXT.txt
@@ -29,6 +29,10 @@ New items for 10.0.x onwards:
 
  1. Remove APR connector.
 
+ 2. Connector API and XML refactoring
+
https://cwiki.apache.org/confluence/display/TOMCAT/Connector+API+refactoring
+for details.
+
 Deferred until 10.1.x:
 
  1. Remove the ExtensionValidator and associated classes (assuming that the


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[Bug 62072] Add support for request compression

2020-04-15 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=62072

--- Comment #4 from Mark Thomas  ---
Have a look at org.apache.coyote.http11.filters under java/

If I was going to do this I'd Look at how ChunkedInputFilter and
ChunkedOutputFilter are used compared to GzipOutoutFilter and use that as a
basis for a new GzipInputFilter class and associated plumbing.

This will definitely need lots of test cases. See the equivalent package under
test/

-- 
You are receiving this mail because:
You are the assignee for the bug.
-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[Bug 63943] Add possibility to overwrite remote port with information from header value

2020-04-15 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=63943

--- Comment #7 from Mark Thomas  ---
Because users want to write applications that "just work" irrespective of
whether there is a reverse proxy in front of Tomcat and/or how that reverse
proxy is configured.

-- 
You are receiving this mail because:
You are the assignee for the bug.
-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



Re: API Change - Connector.java Constructor

2020-04-15 Thread Rémy Maucherat
On Fri, Apr 10, 2020 at 6:32 PM Filip Hanik  wrote:

>
>
> On Fri, Apr 10, 2020 at 1:28 AM Rémy Maucherat  wrote:
>
>>
>>
>>> This configuration gives the impression that the Endpoint is a child of
>>> the Connector.
>>> But the Connector truly only needs the ProtocolHandler interface to
>>> function. The injected object would then be better to an instance of a
>>> ProtocolHandler
>>>
>>> The XML can of course be configured to instantiate and inject the
>>> ProtocolHandler handler directly into the Connector
>>> In this setting, it doesn't make sense to have any properties on the
>>> Connector, since the Connector receives the protocol handler already
>>> configured.
>>>
>>> 
>>> >> maxHeaderCount="10" >
>>>   >> port="8443" SSLEnabled="true"
>>>
>>>  
>>> sslImplementationName="org.apache.tomcat.util.net.openssl.OpenSSLImplementation">
>>>   
>>>   
>>> >> certificateKeyFile="${catalina.home}/conf/key.pem"
>>>  certificateFile="${catalina.home}/conf/cert.pem"
>>>  type="RSA" />
>>>   
>>>   
>>>   >> className="org.apache.coyote.http2.Http2Protocol" />
>>>>> 
>>>
>>
>> Either way, I experimented a bit and it's not doable. Too many intrusive
>> changes and impossibility to be compatible.
>>
>
> Sounds good.
>

I started working on it more to make a real attempt and see how it behaves
in practice. Even though the changes are problematic [the biggest
Catalina/Tomcat API break ever, surpassing the TLS configuration changes
earlier], the Connector is still the biggest problem for duplicated
properties and random hacks, including reflection abuse. That's a goal/todo
for 10 so it is worth doing it to put it on review to know if it exceeds
the pain threshold of most.

Rémy


>
> Filip
>


[Bug 63943] Add possibility to overwrite remote port with information from header value

2020-04-15 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=63943

--- Comment #6 from Nicolò Boschi  ---
Why can't you just read the header value?

-- 
You are receiving this mail because:
You are the assignee for the bug.
-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[Bug 62072] Add support for request compression

2020-04-15 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=62072

--- Comment #3 from Nicolò Boschi  ---
I'd like to work on that, could someone tell me where the changes need to be
made?
This is my first issue on tomcat

-- 
You are receiving this mail because:
You are the assignee for the bug.
-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] branch 8.5.x updated: Move entry to correct section

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch 8.5.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/8.5.x by this push:
 new b403654  Move entry to correct section
b403654 is described below

commit b4036541c8efe7d2e9aa611bd0db5ad2065a8881
Author: Mark Thomas 
AuthorDate: Wed Apr 15 16:13:54 2020 +0100

Move entry to correct section
---
 webapps/docs/changelog.xml | 8 
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/webapps/docs/changelog.xml b/webapps/docs/changelog.xml
index 24c02e0..d377c99 100644
--- a/webapps/docs/changelog.xml
+++ b/webapps/docs/changelog.xml
@@ -58,10 +58,6 @@
 that use a custom class loader that loads resources from non-standard
 locations. (markt)
   
-  
-Include the problematic data in the error message when reporting that
-the provided request line contains an invalid component. (markt)
-  
 
   
   
@@ -70,6 +66,10 @@
 Move SocketProperties mbean to its own type rather than
 use a subType to improve robustness with tools. (remm)
   
+  
+Include the problematic data in the error message when reporting that
+the provided request line contains an invalid component. (markt)
+  
 
   
 


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] branch 9.0.x updated: Move entry to correct section

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch 9.0.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/9.0.x by this push:
 new ce16f8e  Move entry to correct section
ce16f8e is described below

commit ce16f8e1c9c1f846b3be1d358f940ed3cc2031ca
Author: Mark Thomas 
AuthorDate: Wed Apr 15 16:13:54 2020 +0100

Move entry to correct section
---
 webapps/docs/changelog.xml | 8 
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/webapps/docs/changelog.xml b/webapps/docs/changelog.xml
index 757c434..cf0d4e8 100644
--- a/webapps/docs/changelog.xml
+++ b/webapps/docs/changelog.xml
@@ -56,10 +56,6 @@
 that use a custom class loader that loads resources from non-standard
 locations. (markt)
   
-  
-Include the problematic data in the error message when reporting that
-the provided request line contains an invalid component. (markt)
-  
 
   
   
@@ -68,6 +64,10 @@
 Move SocketProperties mbean to its own type rather than
 use a subType to improve robustness with tools. (remm)
   
+  
+Include the problematic data in the error message when reporting that
+the provided request line contains an invalid component. (markt)
+  
 
   
 


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] branch master updated: Move entry to correct section

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/master by this push:
 new d55c093  Move entry to correct section
d55c093 is described below

commit d55c0934a43974e4a2e98e3cce65101fb1ba1281
Author: Mark Thomas 
AuthorDate: Wed Apr 15 16:13:54 2020 +0100

Move entry to correct section
---
 webapps/docs/changelog.xml | 8 
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/webapps/docs/changelog.xml b/webapps/docs/changelog.xml
index 29628ab..2155942 100644
--- a/webapps/docs/changelog.xml
+++ b/webapps/docs/changelog.xml
@@ -71,10 +71,6 @@
 that use a custom class loader that loads resources from non-standard
 locations. (markt)
   
-  
-Include the problematic data in the error message when reporting that
-the provided request line contains an invalid component. (markt)
-  
 
   
   
@@ -83,6 +79,10 @@
 Move SocketProperties mbean to its own type rather than
 use a subType to improve robustness with tools. (remm)
   
+  
+Include the problematic data in the error message when reporting that
+the provided request line contains an invalid component. (markt)
+  
 
   
 


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] branch 7.0.x updated: Improve reporting of invalid request lines

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch 7.0.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/7.0.x by this push:
 new 3834041  Improve reporting of invalid request lines
3834041 is described below

commit 3834041925d549cab2562ff8a146e8e9134bd023
Author: Mark Thomas 
AuthorDate: Wed Apr 15 16:12:55 2020 +0100

Improve reporting of invalid request lines
---
 java/org/apache/coyote/http11/AbstractInputBuffer.java   | 16 
 .../org/apache/coyote/http11/InternalAprInputBuffer.java | 15 ++-
 java/org/apache/coyote/http11/InternalInputBuffer.java   | 15 ++-
 .../org/apache/coyote/http11/InternalNioInputBuffer.java | 15 ++-
 java/org/apache/coyote/http11/LocalStrings.properties|  6 +++---
 webapps/docs/changelog.xml   |  4 
 6 files changed, 53 insertions(+), 18 deletions(-)

diff --git a/java/org/apache/coyote/http11/AbstractInputBuffer.java 
b/java/org/apache/coyote/http11/AbstractInputBuffer.java
index 7f9b856..b08194b 100644
--- a/java/org/apache/coyote/http11/AbstractInputBuffer.java
+++ b/java/org/apache/coyote/http11/AbstractInputBuffer.java
@@ -21,6 +21,7 @@ import java.io.IOException;
 import org.apache.coyote.InputBuffer;
 import org.apache.coyote.Request;
 import org.apache.tomcat.util.buf.ByteChunk;
+import org.apache.tomcat.util.http.HeaderUtil;
 import org.apache.tomcat.util.http.MimeHeaders;
 import org.apache.tomcat.util.http.parser.HttpParser;
 import org.apache.tomcat.util.net.AbstractEndpoint;
@@ -183,6 +184,21 @@ public abstract class AbstractInputBuffer implements 
InputBuffer{
 }
 
 
+protected String parseInvalid(int startPos, byte[] buffer) {
+// Look for the next space
+int pos = startPos;
+while (pos < lastValid && buffer[pos] != 0x20) {
+pos++;
+}
+String result = HeaderUtil.toPrintableString(buffer, startPos, pos - 
startPos);
+if (pos == lastValid) {
+// Ran out of buffer rather than found a space
+result = result + "...";
+}
+return result;
+}
+
+
 /**
  * Implementations are expected to call {@link Request#setStartTime(long)}
  * as soon as the first byte is read from the request.
diff --git a/java/org/apache/coyote/http11/InternalAprInputBuffer.java 
b/java/org/apache/coyote/http11/InternalAprInputBuffer.java
index bfa769e..6f153a9 100644
--- a/java/org/apache/coyote/http11/InternalAprInputBuffer.java
+++ b/java/org/apache/coyote/http11/InternalAprInputBuffer.java
@@ -182,7 +182,8 @@ public class InternalAprInputBuffer extends 
AbstractInputBuffer {
 space = true;
 request.method().setBytes(buf, start, pos - start);
 } else if (!HttpParser.isToken(buf[pos])) {
-throw new 
IllegalArgumentException(sm.getString("iib.invalidmethod"));
+String invalidMethodValue = parseInvalid(start, buf);
+throw new 
IllegalArgumentException(sm.getString("iib.invalidmethod", invalidMethodValue));
 }
 
 pos++;
@@ -227,7 +228,8 @@ public class InternalAprInputBuffer extends 
AbstractInputBuffer {
 // therefore invalid. Trigger error handling.
 // Avoid unknown protocol triggering an additional error
 request.protocol().setString(Constants.HTTP_11);
-throw new 
IllegalArgumentException(sm.getString("iib.invalidRequestTarget"));
+String invalidRequestTarget = parseInvalid(start, buf);
+throw new 
IllegalArgumentException(sm.getString("iib.invalidRequestTarget", 
invalidRequestTarget));
 }
 
 // Spec says single SP but it also says be tolerant of HT
@@ -253,12 +255,14 @@ public class InternalAprInputBuffer extends 
AbstractInputBuffer {
 questionPos = pos;
 } else if (questionPos != -1 && 
!httpParser.isQueryRelaxed(buf[pos])) {
 // %nn decoding will be checked at the point of decoding
-throw new 
IllegalArgumentException(sm.getString("iib.invalidRequestTarget"));
+String invalidRequestTarget = parseInvalid(start, buf);
+throw new 
IllegalArgumentException(sm.getString("iib.invalidRequestTarget", 
invalidRequestTarget));
 } else if (httpParser.isNotRequestTargetRelaxed(buf[pos])) {
 // This is a general check that aims to catch problems early
 // Detailed checking of each part of the request target will
 // happen in AbstractHttp11Processor#prepareRequest()
-throw new 
IllegalArgumentException(sm.getString("iib.invalidRequestTarget"));
+String invalidRequestTarget = parseInvalid(start, buf);
+throw new 

[tomcat] branch 8.5.x updated: Improve reporting of invalid request lines

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch 8.5.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/8.5.x by this push:
 new 331611b  Improve reporting of invalid request lines
331611b is described below

commit 331611bd02c90c7c53d0326c61f93880f61eed8b
Author: Mark Thomas 
AuthorDate: Wed Apr 15 15:35:00 2020 +0100

Improve reporting of invalid request lines
---
 .../apache/coyote/http11/Http11InputBuffer.java| 31 +-
 .../apache/coyote/http11/LocalStrings.properties   |  6 ++---
 webapps/docs/changelog.xml |  4 +++
 3 files changed, 32 insertions(+), 9 deletions(-)

diff --git a/java/org/apache/coyote/http11/Http11InputBuffer.java 
b/java/org/apache/coyote/http11/Http11InputBuffer.java
index eecac4f..fe9cc96 100644
--- a/java/org/apache/coyote/http11/Http11InputBuffer.java
+++ b/java/org/apache/coyote/http11/Http11InputBuffer.java
@@ -426,10 +426,10 @@ public class Http11InputBuffer implements InputBuffer, 
ApplicationBufferHandler
 request.method().setBytes(byteBuffer.array(), 
parsingRequestLineStart,
 pos - parsingRequestLineStart);
 } else if (!HttpParser.isToken(chr)) {
-byteBuffer.position(byteBuffer.position() - 1);
 // Avoid unknown protocol triggering an additional error
 request.protocol().setString(Constants.HTTP_11);
-throw new 
IllegalArgumentException(sm.getString("iib.invalidmethod"));
+String invalidMethodValue = 
parseInvalid(parsingRequestLineStart, byteBuffer);
+throw new 
IllegalArgumentException(sm.getString("iib.invalidmethod", invalidMethodValue));
 }
 }
 parsingRequestLinePhase = 3;
@@ -474,7 +474,8 @@ public class Http11InputBuffer implements InputBuffer, 
ApplicationBufferHandler
 // therefore invalid. Trigger error handling.
 // Avoid unknown protocol triggering an additional error
 request.protocol().setString(Constants.HTTP_11);
-throw new 
IllegalArgumentException(sm.getString("iib.invalidRequestTarget"));
+String invalidRequestTarget = 
parseInvalid(parsingRequestLineStart, byteBuffer);
+throw new 
IllegalArgumentException(sm.getString("iib.invalidRequestTarget", 
invalidRequestTarget));
 }
 if (chr == Constants.SP || chr == Constants.HT) {
 space = true;
@@ -500,14 +501,16 @@ public class Http11InputBuffer implements InputBuffer, 
ApplicationBufferHandler
 // Avoid unknown protocol triggering an additional error
 request.protocol().setString(Constants.HTTP_11);
 // %nn decoding will be checked at the point of decoding
-throw new 
IllegalArgumentException(sm.getString("iib.invalidRequestTarget"));
+String invalidRequestTarget = 
parseInvalid(parsingRequestLineStart, byteBuffer);
+throw new 
IllegalArgumentException(sm.getString("iib.invalidRequestTarget", 
invalidRequestTarget));
 } else if (httpParser.isNotRequestTargetRelaxed(chr)) {
 // Avoid unknown protocol triggering an additional error
 request.protocol().setString(Constants.HTTP_11);
 // This is a general check that aims to catch problems 
early
 // Detailed checking of each part of the request target 
will
 // happen in Http11Processor#prepareRequest()
-throw new 
IllegalArgumentException(sm.getString("iib.invalidRequestTarget"));
+String invalidRequestTarget = 
parseInvalid(parsingRequestLineStart, byteBuffer);
+throw new 
IllegalArgumentException(sm.getString("iib.invalidRequestTarget", 
invalidRequestTarget));
 }
 }
 if (parsingRequestLineQPos >= 0) {
@@ -567,7 +570,8 @@ public class Http11InputBuffer implements InputBuffer, 
ApplicationBufferHandler
 end = pos - 1;
 parsingRequestLineEol = true;
 } else if (!HttpParser.isHttpProtocol(chr)) {
-throw new 
IllegalArgumentException(sm.getString("iib.invalidHttpProtocol"));
+String invalidProtocol = 
parseInvalid(parsingRequestLineStart, byteBuffer);
+throw new 
IllegalArgumentException(sm.getString("iib.invalidHttpProtocol", 
invalidProtocol));
 }
 }
 
@@ -629,6 +633,21 @@ public class Http11InputBuffer implements InputBuffer, 
ApplicationBufferHandler
 }
 
 
+private String parseInvalid(int startPos, ByteBuffer buffer) {
+ 

[tomcat] branch 9.0.x updated: Improve reporting of invalid request lines

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch 9.0.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/9.0.x by this push:
 new 9ca36d1  Improve reporting of invalid request lines
9ca36d1 is described below

commit 9ca36d1318bb51b84b9534d5915cfd168ff048c3
Author: Mark Thomas 
AuthorDate: Wed Apr 15 15:35:00 2020 +0100

Improve reporting of invalid request lines
---
 .../apache/coyote/http11/Http11InputBuffer.java| 31 +-
 .../apache/coyote/http11/LocalStrings.properties   |  6 ++---
 webapps/docs/changelog.xml |  4 +++
 3 files changed, 32 insertions(+), 9 deletions(-)

diff --git a/java/org/apache/coyote/http11/Http11InputBuffer.java 
b/java/org/apache/coyote/http11/Http11InputBuffer.java
index d4c4dc3..181d631 100644
--- a/java/org/apache/coyote/http11/Http11InputBuffer.java
+++ b/java/org/apache/coyote/http11/Http11InputBuffer.java
@@ -412,10 +412,10 @@ public class Http11InputBuffer implements InputBuffer, 
ApplicationBufferHandler
 request.method().setBytes(byteBuffer.array(), 
parsingRequestLineStart,
 pos - parsingRequestLineStart);
 } else if (!HttpParser.isToken(chr)) {
-byteBuffer.position(byteBuffer.position() - 1);
 // Avoid unknown protocol triggering an additional error
 request.protocol().setString(Constants.HTTP_11);
-throw new 
IllegalArgumentException(sm.getString("iib.invalidmethod"));
+String invalidMethodValue = 
parseInvalid(parsingRequestLineStart, byteBuffer);
+throw new 
IllegalArgumentException(sm.getString("iib.invalidmethod", invalidMethodValue));
 }
 }
 parsingRequestLinePhase = 3;
@@ -460,7 +460,8 @@ public class Http11InputBuffer implements InputBuffer, 
ApplicationBufferHandler
 // therefore invalid. Trigger error handling.
 // Avoid unknown protocol triggering an additional error
 request.protocol().setString(Constants.HTTP_11);
-throw new 
IllegalArgumentException(sm.getString("iib.invalidRequestTarget"));
+String invalidRequestTarget = 
parseInvalid(parsingRequestLineStart, byteBuffer);
+throw new 
IllegalArgumentException(sm.getString("iib.invalidRequestTarget", 
invalidRequestTarget));
 }
 if (chr == Constants.SP || chr == Constants.HT) {
 space = true;
@@ -486,14 +487,16 @@ public class Http11InputBuffer implements InputBuffer, 
ApplicationBufferHandler
 // Avoid unknown protocol triggering an additional error
 request.protocol().setString(Constants.HTTP_11);
 // %nn decoding will be checked at the point of decoding
-throw new 
IllegalArgumentException(sm.getString("iib.invalidRequestTarget"));
+String invalidRequestTarget = 
parseInvalid(parsingRequestLineStart, byteBuffer);
+throw new 
IllegalArgumentException(sm.getString("iib.invalidRequestTarget", 
invalidRequestTarget));
 } else if (httpParser.isNotRequestTargetRelaxed(chr)) {
 // Avoid unknown protocol triggering an additional error
 request.protocol().setString(Constants.HTTP_11);
 // This is a general check that aims to catch problems 
early
 // Detailed checking of each part of the request target 
will
 // happen in Http11Processor#prepareRequest()
-throw new 
IllegalArgumentException(sm.getString("iib.invalidRequestTarget"));
+String invalidRequestTarget = 
parseInvalid(parsingRequestLineStart, byteBuffer);
+throw new 
IllegalArgumentException(sm.getString("iib.invalidRequestTarget", 
invalidRequestTarget));
 }
 }
 if (parsingRequestLineQPos >= 0) {
@@ -553,7 +556,8 @@ public class Http11InputBuffer implements InputBuffer, 
ApplicationBufferHandler
 end = pos - 1;
 parsingRequestLineEol = true;
 } else if (!HttpParser.isHttpProtocol(chr)) {
-throw new 
IllegalArgumentException(sm.getString("iib.invalidHttpProtocol"));
+String invalidProtocol = 
parseInvalid(parsingRequestLineStart, byteBuffer);
+throw new 
IllegalArgumentException(sm.getString("iib.invalidHttpProtocol", 
invalidProtocol));
 }
 }
 
@@ -615,6 +619,21 @@ public class Http11InputBuffer implements InputBuffer, 
ApplicationBufferHandler
 }
 
 
+private String parseInvalid(int startPos, ByteBuffer buffer) {
+ 

[tomcat] branch master updated: Improve reporting of invalid request lines

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/master by this push:
 new 71a0ec7  Improve reporting of invalid request lines
71a0ec7 is described below

commit 71a0ec7f5cefefd80b98c246b215f66efc63211f
Author: Mark Thomas 
AuthorDate: Wed Apr 15 15:35:00 2020 +0100

Improve reporting of invalid request lines
---
 .../apache/coyote/http11/Http11InputBuffer.java| 31 +-
 .../apache/coyote/http11/LocalStrings.properties   |  6 ++---
 webapps/docs/changelog.xml |  4 +++
 3 files changed, 32 insertions(+), 9 deletions(-)

diff --git a/java/org/apache/coyote/http11/Http11InputBuffer.java 
b/java/org/apache/coyote/http11/Http11InputBuffer.java
index 2794bfb..8619a32 100644
--- a/java/org/apache/coyote/http11/Http11InputBuffer.java
+++ b/java/org/apache/coyote/http11/Http11InputBuffer.java
@@ -412,10 +412,10 @@ public class Http11InputBuffer implements InputBuffer, 
ApplicationBufferHandler
 request.method().setBytes(byteBuffer.array(), 
parsingRequestLineStart,
 pos - parsingRequestLineStart);
 } else if (!HttpParser.isToken(chr)) {
-byteBuffer.position(byteBuffer.position() - 1);
 // Avoid unknown protocol triggering an additional error
 request.protocol().setString(Constants.HTTP_11);
-throw new 
IllegalArgumentException(sm.getString("iib.invalidmethod"));
+String invalidMethodValue = 
parseInvalid(parsingRequestLineStart, byteBuffer);
+throw new 
IllegalArgumentException(sm.getString("iib.invalidmethod", invalidMethodValue));
 }
 }
 parsingRequestLinePhase = 3;
@@ -460,7 +460,8 @@ public class Http11InputBuffer implements InputBuffer, 
ApplicationBufferHandler
 // therefore invalid. Trigger error handling.
 // Avoid unknown protocol triggering an additional error
 request.protocol().setString(Constants.HTTP_11);
-throw new 
IllegalArgumentException(sm.getString("iib.invalidRequestTarget"));
+String invalidRequestTarget = 
parseInvalid(parsingRequestLineStart, byteBuffer);
+throw new 
IllegalArgumentException(sm.getString("iib.invalidRequestTarget", 
invalidRequestTarget));
 }
 if (chr == Constants.SP || chr == Constants.HT) {
 space = true;
@@ -486,14 +487,16 @@ public class Http11InputBuffer implements InputBuffer, 
ApplicationBufferHandler
 // Avoid unknown protocol triggering an additional error
 request.protocol().setString(Constants.HTTP_11);
 // %nn decoding will be checked at the point of decoding
-throw new 
IllegalArgumentException(sm.getString("iib.invalidRequestTarget"));
+String invalidRequestTarget = 
parseInvalid(parsingRequestLineStart, byteBuffer);
+throw new 
IllegalArgumentException(sm.getString("iib.invalidRequestTarget", 
invalidRequestTarget));
 } else if (httpParser.isNotRequestTargetRelaxed(chr)) {
 // Avoid unknown protocol triggering an additional error
 request.protocol().setString(Constants.HTTP_11);
 // This is a general check that aims to catch problems 
early
 // Detailed checking of each part of the request target 
will
 // happen in Http11Processor#prepareRequest()
-throw new 
IllegalArgumentException(sm.getString("iib.invalidRequestTarget"));
+String invalidRequestTarget = 
parseInvalid(parsingRequestLineStart, byteBuffer);
+throw new 
IllegalArgumentException(sm.getString("iib.invalidRequestTarget", 
invalidRequestTarget));
 }
 }
 if (parsingRequestLineQPos >= 0) {
@@ -553,7 +556,8 @@ public class Http11InputBuffer implements InputBuffer, 
ApplicationBufferHandler
 end = pos - 1;
 parsingRequestLineEol = true;
 } else if (!HttpParser.isHttpProtocol(chr)) {
-throw new 
IllegalArgumentException(sm.getString("iib.invalidHttpProtocol"));
+String invalidProtocol = 
parseInvalid(parsingRequestLineStart, byteBuffer);
+throw new 
IllegalArgumentException(sm.getString("iib.invalidHttpProtocol", 
invalidProtocol));
 }
 }
 
@@ -615,6 +619,21 @@ public class Http11InputBuffer implements InputBuffer, 
ApplicationBufferHandler
 }
 
 
+private String parseInvalid(int startPos, ByteBuffer buffer) {
+   

[Bug 64353] New: Add support for accessing server certificate from TLS context

2020-04-15 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=64353

Bug ID: 64353
   Summary: Add support for accessing server certificate from TLS
context
   Product: Tomcat 10
   Version: 10.0.0-M4
  Hardware: All
OS: All
Status: NEW
  Severity: enhancement
  Priority: P2
 Component: Connectors
  Assignee: dev@tomcat.apache.org
  Reporter: micha...@apache.org
  Target Milestone: --

Based on this discussion:
https://www.mail-archive.com/users@tomcat.apache.org/msg134872.html

There should be an option to access the used server certificate from the
current request being served by one TLS context. As easy as:
request.getAttribute("magic_name")
Return would be, similar to client certs, X509Certificate or X509Certificate[].

This requires these changes (non-exhaustive):
* SSLSupport implementations
* Define a new property in SSLSupport and org.apache.catalina.Globals for the
server cert
* org.apache.catalina.util.TLSUtil.isTLSRequestAttribute(String) and its
callers
* org.apache.coyote.AbstractProcessor.populateSslRequestAttributes() to add new
attribute to the request
* SSLValve to read server cert from reverse proxy, CGI var SSL_SERVER_CERT
* AJP and friends to deliver this piece of information

-- 
You are receiving this mail because:
You are the assignee for the bug.
-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] branch 8.5.x updated: Update settings for Eclipse 4.15

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch 8.5.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/8.5.x by this push:
 new 516d828  Update settings for Eclipse 4.15
516d828 is described below

commit 516d828ebebb9110bb00716e244c5e1ca1140c3b
Author: Mark Thomas 
AuthorDate: Wed Apr 15 12:22:47 2020 +0100

Update settings for Eclipse 4.15
---
 res/ide-support/eclipse/java-compiler-errors-warnings.txt | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/res/ide-support/eclipse/java-compiler-errors-warnings.txt 
b/res/ide-support/eclipse/java-compiler-errors-warnings.txt
index 2905d56..3c1ce23 100644
--- a/res/ide-support/eclipse/java-compiler-errors-warnings.txt
+++ b/res/ide-support/eclipse/java-compiler-errors-warnings.txt
@@ -18,7 +18,7 @@
 # Java -> Compiler -> Errors/Warnings
 ===
 
-The following settings are for Oxygen (Eclipse 4.13)
+The following settings are for Eclipse 4.15
 W = Warning
 I = Ignore
 E = Error
@@ -42,6 +42,8 @@ Potential programming problems
 
- Incomplete 'switch' cases on enum- W
  [ ] Signal even if 'default' case exists
+   - Unlikely argument type for...- W
+ [ ] Perfprm strict...
- 'switch' is missing 'default' case   - I
- Potential resource leak  - I
 


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] branch 7.0.x updated: Update settings for Eclipse 4.15

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch 7.0.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/7.0.x by this push:
 new 5fd1cc6  Update settings for Eclipse 4.15
5fd1cc6 is described below

commit 5fd1cc683a55ae3be69baef1db3fbfc28211fcf7
Author: Mark Thomas 
AuthorDate: Wed Apr 15 12:22:47 2020 +0100

Update settings for Eclipse 4.15
---
 res/ide-support/eclipse/java-compiler-errors-warnings.txt | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/res/ide-support/eclipse/java-compiler-errors-warnings.txt 
b/res/ide-support/eclipse/java-compiler-errors-warnings.txt
index 2905d56..3c1ce23 100644
--- a/res/ide-support/eclipse/java-compiler-errors-warnings.txt
+++ b/res/ide-support/eclipse/java-compiler-errors-warnings.txt
@@ -18,7 +18,7 @@
 # Java -> Compiler -> Errors/Warnings
 ===
 
-The following settings are for Oxygen (Eclipse 4.13)
+The following settings are for Eclipse 4.15
 W = Warning
 I = Ignore
 E = Error
@@ -42,6 +42,8 @@ Potential programming problems
 
- Incomplete 'switch' cases on enum- W
  [ ] Signal even if 'default' case exists
+   - Unlikely argument type for...- W
+ [ ] Perfprm strict...
- 'switch' is missing 'default' case   - I
- Potential resource leak  - I
 


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] 02/02: Various places where the 4.13 -> 4.15 Eclipse update was missed

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch 9.0.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git

commit f2a0232187f275b1316154cf1b7a7d6b21c01a10
Author: Mark Thomas 
AuthorDate: Wed Apr 15 12:23:15 2020 +0100

Various places where the 4.13 -> 4.15 Eclipse update was missed
---
 build.properties.default| 2 +-
 res/ide-support/eclipse/eclipse.classpath   | 2 +-
 res/ide-support/idea/tomcat.iml | 2 +-
 res/ide-support/netbeans/nb-tomcat-build.properties | 2 +-
 res/ide-support/netbeans/project.xml| 4 ++--
 5 files changed, 6 insertions(+), 6 deletions(-)

diff --git a/build.properties.default b/build.properties.default
index e044bfd..46ce226 100644
--- a/build.properties.default
+++ b/build.properties.default
@@ -129,7 +129,7 @@ 
wsdl4j-lib.loc=${base-maven.loc}/wsdl4j/wsdl4j/${wsdl4j-lib.version}/wsdl4j-${ws
 # - Eclipse JDT, version 4.7 or later -#
 # See 
https://cwiki.apache.org/confluence/display/TOMCAT/Managing+Tomcat%27s+Dependency+on+the+Eclipse+JDT+Core+Batch+Compiler
 #
-# Checksum is from "SHA512 Checksums for 4.13" link at
+# Checksum is from "SHA512 Checksums for 4.15" link at
 # http://download.eclipse.org/eclipse/downloads/drops4/R-4.15-202003050155/
 # 
http://download.eclipse.org/eclipse/downloads/drops4/R-4.15-202003050155/checksum/eclipse-4.15-SUMSSHA512
 #
diff --git a/res/ide-support/eclipse/eclipse.classpath 
b/res/ide-support/eclipse/eclipse.classpath
index c038e17..36d4b68 100644
--- a/res/ide-support/eclipse/eclipse.classpath
+++ b/res/ide-support/eclipse/eclipse.classpath
@@ -24,7 +24,7 @@
 
 
 
-
+
 
 
 
diff --git a/res/ide-support/idea/tomcat.iml b/res/ide-support/idea/tomcat.iml
index 4973d0a..b4aad1f 100644
--- a/res/ide-support/idea/tomcat.iml
+++ b/res/ide-support/idea/tomcat.iml
@@ -70,7 +70,7 @@
 
   
 
-  
+  
 
 
 
diff --git a/res/ide-support/netbeans/nb-tomcat-build.properties 
b/res/ide-support/netbeans/nb-tomcat-build.properties
index c6c66fa..219c4fd 100644
--- a/res/ide-support/netbeans/nb-tomcat-build.properties
+++ b/res/ide-support/netbeans/nb-tomcat-build.properties
@@ -37,7 +37,7 @@ nb-test.io-method=org.apache.coyote.http11.Http11NioProtocol
 # it is not possible to retrieve the classpaths from the build to
 # use in the NetBeans targets, so they must be explicitly declared
 
-nb-test.classpath=${test.classes}:${tomcat.build}/webapps/examples/WEB-INF/classes:${base.path}/junit-4.11/junit-4.11.jar:${base.path}/easymock-3.2/easymock-3.2.jar:${base.path}/hamcrest-1.3/hamcrest-core-1.3.jar:${base.path}/ecj-4.13/ecj-4.13.jar:${tomcat.classes}
+nb-test.classpath=${test.classes}:${tomcat.build}/webapps/examples/WEB-INF/classes:${base.path}/junit-4.11/junit-4.11.jar:${base.path}/easymock-3.2/easymock-3.2.jar:${base.path}/hamcrest-1.3/hamcrest-core-1.3.jar:${base.path}/ecj-4.15/ecj-4.15.jar:${tomcat.classes}
 
 # Extra properties used by the Tomcat project additional NetBeans targets.
 
diff --git a/res/ide-support/netbeans/project.xml 
b/res/ide-support/netbeans/project.xml
index 8cb521e..1648953 100644
--- a/res/ide-support/netbeans/project.xml
+++ b/res/ide-support/netbeans/project.xml
@@ -178,7 +178,7 @@
 -->
 
 java
-${base.path}/jaxrpc-1.1-rc4/geronimo-spec-jaxrpc-1.1-rc4.jar:${base.path}/wsdl4j-1.6.3/wsdl4j-1.6.3.jar:${base.path}/ecj-4.13/ecj-4.13.jar:${ant.includes}/
+${base.path}/jaxrpc-1.1-rc4/geronimo-spec-jaxrpc-1.1-rc4.jar:${base.path}/wsdl4j-1.6.3/wsdl4j-1.6.3.jar:${base.path}/ecj-4.15/ecj-4.15.jar:${ant.includes}/
 1.7
 
 
@@ -189,7 +189,7 @@
 
 test
 
-output/classes:output/testclasses:${base.path}/junit-4.13/junit-4.13.jar:${base.path}/easymock-3.2/easymock-3.2.jar:${base.path}/hamcrest-1.3/hamcrest-core-1.3.jar
+output/classes:output/testclasses:${base.path}/junit-4.15/junit-4.15.jar:${base.path}/easymock-3.2/easymock-3.2.jar:${base.path}/hamcrest-1.3/hamcrest-core-1.3.jar
 1.7
 
 


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] branch 9.0.x updated (92fd912 -> f2a0232)

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a change to branch 9.0.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git.


from 92fd912  Additional logging to help debug CI failure
 new 245a34d  Update settings for Eclipse 4.15
 new f2a0232  Various places where the 4.13 -> 4.15 Eclipse update was 
missed

The 2 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 build.properties.default  | 2 +-
 res/ide-support/eclipse/eclipse.classpath | 2 +-
 res/ide-support/eclipse/java-compiler-errors-warnings.txt | 4 +++-
 res/ide-support/idea/tomcat.iml   | 2 +-
 res/ide-support/netbeans/nb-tomcat-build.properties   | 2 +-
 res/ide-support/netbeans/project.xml  | 4 ++--
 6 files changed, 9 insertions(+), 7 deletions(-)


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] 01/02: Update settings for Eclipse 4.15

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch 9.0.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git

commit 245a34d4d1277620d37d45cc6873344cb7298345
Author: Mark Thomas 
AuthorDate: Wed Apr 15 12:22:47 2020 +0100

Update settings for Eclipse 4.15
---
 res/ide-support/eclipse/java-compiler-errors-warnings.txt | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/res/ide-support/eclipse/java-compiler-errors-warnings.txt 
b/res/ide-support/eclipse/java-compiler-errors-warnings.txt
index 2905d56..3c1ce23 100644
--- a/res/ide-support/eclipse/java-compiler-errors-warnings.txt
+++ b/res/ide-support/eclipse/java-compiler-errors-warnings.txt
@@ -18,7 +18,7 @@
 # Java -> Compiler -> Errors/Warnings
 ===
 
-The following settings are for Oxygen (Eclipse 4.13)
+The following settings are for Eclipse 4.15
 W = Warning
 I = Ignore
 E = Error
@@ -42,6 +42,8 @@ Potential programming problems
 
- Incomplete 'switch' cases on enum- W
  [ ] Signal even if 'default' case exists
+   - Unlikely argument type for...- W
+ [ ] Perfprm strict...
- 'switch' is missing 'default' case   - I
- Potential resource leak  - I
 


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] 02/02: Various places where the 4.13 -> 4.15 Eclipse update was missed

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/tomcat.git

commit 013affb81f7f237d6191aabd76cbb7f9db677a2d
Author: Mark Thomas 
AuthorDate: Wed Apr 15 12:23:15 2020 +0100

Various places where the 4.13 -> 4.15 Eclipse update was missed
---
 build.properties.default| 2 +-
 res/ide-support/eclipse/eclipse.classpath   | 2 +-
 res/ide-support/idea/tomcat.iml | 2 +-
 res/ide-support/netbeans/nb-tomcat-build.properties | 2 +-
 res/ide-support/netbeans/project.xml| 4 ++--
 5 files changed, 6 insertions(+), 6 deletions(-)

diff --git a/build.properties.default b/build.properties.default
index efc9673..2b8bf3b 100644
--- a/build.properties.default
+++ b/build.properties.default
@@ -129,7 +129,7 @@ 
wsdl4j-lib.loc=${base-maven.loc}/wsdl4j/wsdl4j/${wsdl4j-lib.version}/wsdl4j-${ws
 # - Eclipse JDT, version 4.7 or later -#
 # See 
https://cwiki.apache.org/confluence/display/TOMCAT/Managing+Tomcat%27s+Dependency+on+the+Eclipse+JDT+Core+Batch+Compiler
 #
-# Checksum is from "SHA512 Checksums for 4.13" link at
+# Checksum is from "SHA512 Checksums for 4.15" link at
 # http://download.eclipse.org/eclipse/downloads/drops4/R-4.15-202003050155/
 # 
http://download.eclipse.org/eclipse/downloads/drops4/R-4.15-202003050155/checksum/eclipse-4.15-SUMSSHA512
 #
diff --git a/res/ide-support/eclipse/eclipse.classpath 
b/res/ide-support/eclipse/eclipse.classpath
index c038e17..36d4b68 100644
--- a/res/ide-support/eclipse/eclipse.classpath
+++ b/res/ide-support/eclipse/eclipse.classpath
@@ -24,7 +24,7 @@
 
 
 
-
+
 
 
 
diff --git a/res/ide-support/idea/tomcat.iml b/res/ide-support/idea/tomcat.iml
index 4973d0a..b4aad1f 100644
--- a/res/ide-support/idea/tomcat.iml
+++ b/res/ide-support/idea/tomcat.iml
@@ -70,7 +70,7 @@
 
   
 
-  
+  
 
 
 
diff --git a/res/ide-support/netbeans/nb-tomcat-build.properties 
b/res/ide-support/netbeans/nb-tomcat-build.properties
index c6c66fa..219c4fd 100644
--- a/res/ide-support/netbeans/nb-tomcat-build.properties
+++ b/res/ide-support/netbeans/nb-tomcat-build.properties
@@ -37,7 +37,7 @@ nb-test.io-method=org.apache.coyote.http11.Http11NioProtocol
 # it is not possible to retrieve the classpaths from the build to
 # use in the NetBeans targets, so they must be explicitly declared
 
-nb-test.classpath=${test.classes}:${tomcat.build}/webapps/examples/WEB-INF/classes:${base.path}/junit-4.11/junit-4.11.jar:${base.path}/easymock-3.2/easymock-3.2.jar:${base.path}/hamcrest-1.3/hamcrest-core-1.3.jar:${base.path}/ecj-4.13/ecj-4.13.jar:${tomcat.classes}
+nb-test.classpath=${test.classes}:${tomcat.build}/webapps/examples/WEB-INF/classes:${base.path}/junit-4.11/junit-4.11.jar:${base.path}/easymock-3.2/easymock-3.2.jar:${base.path}/hamcrest-1.3/hamcrest-core-1.3.jar:${base.path}/ecj-4.15/ecj-4.15.jar:${tomcat.classes}
 
 # Extra properties used by the Tomcat project additional NetBeans targets.
 
diff --git a/res/ide-support/netbeans/project.xml 
b/res/ide-support/netbeans/project.xml
index 8cb521e..1648953 100644
--- a/res/ide-support/netbeans/project.xml
+++ b/res/ide-support/netbeans/project.xml
@@ -178,7 +178,7 @@
 -->
 
 java
-${base.path}/jaxrpc-1.1-rc4/geronimo-spec-jaxrpc-1.1-rc4.jar:${base.path}/wsdl4j-1.6.3/wsdl4j-1.6.3.jar:${base.path}/ecj-4.13/ecj-4.13.jar:${ant.includes}/
+${base.path}/jaxrpc-1.1-rc4/geronimo-spec-jaxrpc-1.1-rc4.jar:${base.path}/wsdl4j-1.6.3/wsdl4j-1.6.3.jar:${base.path}/ecj-4.15/ecj-4.15.jar:${ant.includes}/
 1.7
 
 
@@ -189,7 +189,7 @@
 
 test
 
-output/classes:output/testclasses:${base.path}/junit-4.13/junit-4.13.jar:${base.path}/easymock-3.2/easymock-3.2.jar:${base.path}/hamcrest-1.3/hamcrest-core-1.3.jar
+output/classes:output/testclasses:${base.path}/junit-4.15/junit-4.15.jar:${base.path}/easymock-3.2/easymock-3.2.jar:${base.path}/hamcrest-1.3/hamcrest-core-1.3.jar
 1.7
 
 


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] 01/02: Update settings for Eclipse 4.15

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/tomcat.git

commit 6cf8869416245294819114c902634bbc68e53250
Author: Mark Thomas 
AuthorDate: Wed Apr 15 12:22:47 2020 +0100

Update settings for Eclipse 4.15
---
 res/ide-support/eclipse/java-compiler-errors-warnings.txt | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/res/ide-support/eclipse/java-compiler-errors-warnings.txt 
b/res/ide-support/eclipse/java-compiler-errors-warnings.txt
index 2905d56..3c1ce23 100644
--- a/res/ide-support/eclipse/java-compiler-errors-warnings.txt
+++ b/res/ide-support/eclipse/java-compiler-errors-warnings.txt
@@ -18,7 +18,7 @@
 # Java -> Compiler -> Errors/Warnings
 ===
 
-The following settings are for Oxygen (Eclipse 4.13)
+The following settings are for Eclipse 4.15
 W = Warning
 I = Ignore
 E = Error
@@ -42,6 +42,8 @@ Potential programming problems
 
- Incomplete 'switch' cases on enum- W
  [ ] Signal even if 'default' case exists
+   - Unlikely argument type for...- W
+ [ ] Perfprm strict...
- 'switch' is missing 'default' case   - I
- Potential resource leak  - I
 


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] branch master updated (a35efa6 -> 013affb)

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a change to branch master
in repository https://gitbox.apache.org/repos/asf/tomcat.git.


from a35efa6  Additional logging to help debug CI failure
 new 6cf8869  Update settings for Eclipse 4.15
 new 013affb  Various places where the 4.13 -> 4.15 Eclipse update was 
missed

The 2 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 build.properties.default  | 2 +-
 res/ide-support/eclipse/eclipse.classpath | 2 +-
 res/ide-support/eclipse/java-compiler-errors-warnings.txt | 4 +++-
 res/ide-support/idea/tomcat.iml   | 2 +-
 res/ide-support/netbeans/nb-tomcat-build.properties   | 2 +-
 res/ide-support/netbeans/project.xml  | 4 ++--
 6 files changed, 9 insertions(+), 7 deletions(-)


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] branch 8.5.x updated: Additional logging to help debug CI failure

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch 8.5.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/8.5.x by this push:
 new f3ab699  Additional logging to help debug CI failure
f3ab699 is described below

commit f3ab69947e5663635f37c6dbc951240e7f383269
Author: Mark Thomas 
AuthorDate: Wed Apr 15 12:03:04 2020 +0100

Additional logging to help debug CI failure
---
 .../websocket/TestWsWebSocketContainerGetOpenSessions.java   | 12 
 1 file changed, 8 insertions(+), 4 deletions(-)

diff --git 
a/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java 
b/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
index 5ff4684..8190d6c 100644
--- 
a/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
+++ 
b/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
@@ -193,11 +193,11 @@ public class TestWsWebSocketContainerGetOpenSessions 
extends WebSocketBaseTest {
 delayCount++;
 }
 
-Assert.assertTrue(Tracker.checkRecord("client1", client1Count));
-Assert.assertTrue(Tracker.checkRecord("client2", client2Count));
+Assert.assertTrue(Tracker.dump(), Tracker.checkRecord("client1", 
client1Count));
+Assert.assertTrue(Tracker.dump(), Tracker.checkRecord("client2", 
client2Count));
 // Note: need to strip leading '/' from path
-Assert.assertTrue(Tracker.checkRecord(server1.substring(1), 
server1Count));
-Assert.assertTrue(Tracker.checkRecord(server2.substring(1), 
server2Count));
+Assert.assertTrue(Tracker.dump(), 
Tracker.checkRecord(server1.substring(1), server1Count));
+Assert.assertTrue(Tracker.dump(), 
Tracker.checkRecord(server2.substring(1), server2Count));
 
 sClient1Server1.close();
 sClient1Server2.close();
@@ -384,5 +384,9 @@ public class TestWsWebSocketContainerGetOpenSessions 
extends WebSocketBaseTest {
 records.clear();
 updateCount.set(0);
 }
+
+public static String dump() {
+return records.toString();
+}
 }
 }


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] branch 9.0.x updated: Additional logging to help debug CI failure

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch 9.0.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/9.0.x by this push:
 new 92fd912  Additional logging to help debug CI failure
92fd912 is described below

commit 92fd91226eb4e782e79a9e8d33bfffea711a8626
Author: Mark Thomas 
AuthorDate: Wed Apr 15 12:03:04 2020 +0100

Additional logging to help debug CI failure
---
 .../websocket/TestWsWebSocketContainerGetOpenSessions.java   | 12 
 1 file changed, 8 insertions(+), 4 deletions(-)

diff --git 
a/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java 
b/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
index 5ff4684..8190d6c 100644
--- 
a/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
+++ 
b/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
@@ -193,11 +193,11 @@ public class TestWsWebSocketContainerGetOpenSessions 
extends WebSocketBaseTest {
 delayCount++;
 }
 
-Assert.assertTrue(Tracker.checkRecord("client1", client1Count));
-Assert.assertTrue(Tracker.checkRecord("client2", client2Count));
+Assert.assertTrue(Tracker.dump(), Tracker.checkRecord("client1", 
client1Count));
+Assert.assertTrue(Tracker.dump(), Tracker.checkRecord("client2", 
client2Count));
 // Note: need to strip leading '/' from path
-Assert.assertTrue(Tracker.checkRecord(server1.substring(1), 
server1Count));
-Assert.assertTrue(Tracker.checkRecord(server2.substring(1), 
server2Count));
+Assert.assertTrue(Tracker.dump(), 
Tracker.checkRecord(server1.substring(1), server1Count));
+Assert.assertTrue(Tracker.dump(), 
Tracker.checkRecord(server2.substring(1), server2Count));
 
 sClient1Server1.close();
 sClient1Server2.close();
@@ -384,5 +384,9 @@ public class TestWsWebSocketContainerGetOpenSessions 
extends WebSocketBaseTest {
 records.clear();
 updateCount.set(0);
 }
+
+public static String dump() {
+return records.toString();
+}
 }
 }


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] branch 7.0.x updated: Additional logging to help debug CI failure

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch 7.0.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/7.0.x by this push:
 new 4cc93c0  Additional logging to help debug CI failure
4cc93c0 is described below

commit 4cc93c0ce6c0da6cb68289f0a83e94c533b408b3
Author: Mark Thomas 
AuthorDate: Wed Apr 15 12:03:04 2020 +0100

Additional logging to help debug CI failure
---
 .../websocket/TestWsWebSocketContainerGetOpenSessions.java   | 12 
 1 file changed, 8 insertions(+), 4 deletions(-)

diff --git 
a/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java 
b/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
index e9af34f..68a1698 100644
--- 
a/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
+++ 
b/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
@@ -193,11 +193,11 @@ public class TestWsWebSocketContainerGetOpenSessions 
extends WebSocketBaseTest {
 delayCount++;
 }
 
-Assert.assertTrue(Tracker.checkRecord("client1", client1Count));
-Assert.assertTrue(Tracker.checkRecord("client2", client2Count));
+Assert.assertTrue(Tracker.dump(), Tracker.checkRecord("client1", 
client1Count));
+Assert.assertTrue(Tracker.dump(), Tracker.checkRecord("client2", 
client2Count));
 // Note: need to strip leading '/' from path
-Assert.assertTrue(Tracker.checkRecord(server1.substring(1), 
server1Count));
-Assert.assertTrue(Tracker.checkRecord(server2.substring(1), 
server2Count));
+Assert.assertTrue(Tracker.dump(), 
Tracker.checkRecord(server1.substring(1), server1Count));
+Assert.assertTrue(Tracker.dump(), 
Tracker.checkRecord(server2.substring(1), server2Count));
 
 sClient1Server1.close();
 sClient1Server2.close();
@@ -384,5 +384,9 @@ public class TestWsWebSocketContainerGetOpenSessions 
extends WebSocketBaseTest {
 records.clear();
 updateCount.set(0);
 }
+
+public static String dump() {
+return records.toString();
+}
 }
 }


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] branch master updated: Additional logging to help debug CI failure

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/master by this push:
 new a35efa6  Additional logging to help debug CI failure
a35efa6 is described below

commit a35efa672d5f989eb12ac16ce59e943afa6cb144
Author: Mark Thomas 
AuthorDate: Wed Apr 15 12:03:04 2020 +0100

Additional logging to help debug CI failure
---
 .../websocket/TestWsWebSocketContainerGetOpenSessions.java   | 12 
 1 file changed, 8 insertions(+), 4 deletions(-)

diff --git 
a/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java 
b/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
index 97f88ef..3ddd00f 100644
--- 
a/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
+++ 
b/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
@@ -193,11 +193,11 @@ public class TestWsWebSocketContainerGetOpenSessions 
extends WebSocketBaseTest {
 delayCount++;
 }
 
-Assert.assertTrue(Tracker.checkRecord("client1", client1Count));
-Assert.assertTrue(Tracker.checkRecord("client2", client2Count));
+Assert.assertTrue(Tracker.dump(), Tracker.checkRecord("client1", 
client1Count));
+Assert.assertTrue(Tracker.dump(), Tracker.checkRecord("client2", 
client2Count));
 // Note: need to strip leading '/' from path
-Assert.assertTrue(Tracker.checkRecord(server1.substring(1), 
server1Count));
-Assert.assertTrue(Tracker.checkRecord(server2.substring(1), 
server2Count));
+Assert.assertTrue(Tracker.dump(), 
Tracker.checkRecord(server1.substring(1), server1Count));
+Assert.assertTrue(Tracker.dump(), 
Tracker.checkRecord(server2.substring(1), server2Count));
 
 sClient1Server1.close();
 sClient1Server2.close();
@@ -384,5 +384,9 @@ public class TestWsWebSocketContainerGetOpenSessions 
extends WebSocketBaseTest {
 records.clear();
 updateCount.set(0);
 }
+
+public static String dump() {
+return records.toString();
+}
 }
 }


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[Bug 64317] org.apache.tomcat.util.net.TestSsl testPost() test failing on Windows

2020-04-15 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=64317

Mark Thomas  changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 Resolution|--- |FIXED

--- Comment #12 from Mark Thomas  ---
I ran the test 20 times on Windows with Java 8 (Adopt OpenJDK 242 64-bit) and
didn't see a single error. Once I dropped the connection timeout to 1500ms I
started to see errors similar to those reported here.

I've increased the default timeout on this test to 20s so this should be fixed.

-- 
You are receiving this mail because:
You are the assignee for the bug.
-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[GitHub] [tomcat-jakartaee-migration] ebourg commented on issue #3: Bug: Removing signature from JAR file with JCE providers leads to SecurityException

2020-04-15 Thread GitBox
ebourg commented on issue #3: Bug: Removing signature from JAR file with JCE 
providers leads to SecurityException
URL: 
https://github.com/apache/tomcat-jakartaee-migration/issues/3#issuecomment-613938070
 
 
   Also `bcprov*.jar` could be excluded by default.


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



buildbot success in on tomcat-9-trunk

2020-04-15 Thread buildbot
The Buildbot has detected a restored build on builder tomcat-9-trunk while 
building tomcat. Full details are available at:
https://ci.apache.org/builders/tomcat-9-trunk/builds/169

Buildbot URL: https://ci.apache.org/

Buildslave for this Build: asf946_ubuntu

Build Reason: The AnyBranchScheduler scheduler named 'on-tomcat-9-commit' 
triggered this build
Build Source Stamp: [branch 9.0.x] 3b3c34d572ba1f61bdf10d444f5cd6efabd7e9f4
Blamelist: Mark Thomas 

Build succeeded!

Sincerely,
 -The Buildbot




-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[GitHub] [tomcat-jakartaee-migration] ebourg commented on issue #3: Bug: Removing signature from JAR file with JCE providers leads to SecurityException

2020-04-15 Thread GitBox
ebourg commented on issue #3: Bug: Removing signature from JAR file with JCE 
providers leads to SecurityException
URL: 
https://github.com/apache/tomcat-jakartaee-migration/issues/3#issuecomment-613937324
 
 
   
   > Trying to do too much would lead to more problems, here a likely excessive 
memory use.
   
   What is an excessive memory usage? A typical jar easily fits in the heap 
allocated by default to the JVM. This tool is mainly used at build time on 
beefy machines, I don't think the memory usage is really a concern.
   
   > How about adding a command line option to exclude certain JAR files from 
getting migrated?
   
   Good idea, something like an `--exclude` option with a glob parameter that 
could be repeated many times.
   


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[GitHub] [tomcat-jakartaee-migration] rmaucher commented on issue #3: Bug: Removing signature from JAR file with JCE providers leads to SecurityException

2020-04-15 Thread GitBox
rmaucher commented on issue #3: Bug: Removing signature from JAR file with JCE 
providers leads to SecurityException
URL: 
https://github.com/apache/tomcat-jakartaee-migration/issues/3#issuecomment-613924051
 
 
   Yes, a resource filtering pattern or some kind could be a good add with 
plenty of uses.
   Still copy out and in should work and would likely be easier for you to do 
with your JCE JAR.


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] branch 7.0.x updated: Fix typo

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch 7.0.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/7.0.x by this push:
 new a88690d  Fix typo
a88690d is described below

commit a88690da4f71ac788fb996e23ab3297476538c8b
Author: Mark Thomas 
AuthorDate: Wed Apr 15 10:08:39 2020 +0100

Fix typo
---
 .../tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java   | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git 
a/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java 
b/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
index 6b89035..e9af34f 100644
--- 
a/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
+++ 
b/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
@@ -53,7 +53,7 @@ import org.apache.tomcat.websocket.server.WsContextListener;
  *
  * Each test uses 2 client endpoint and 2 server endpoints with each client
  * connecting to each server for a total of four connections (note sometimes
- * the two clients and/or the two servers will be the sam)e.
+ * the two clients and/or the two servers will be the same).
  */
 public class TestWsWebSocketContainerGetOpenSessions extends WebSocketBaseTest 
{
 


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] branch 8.5.x updated: Fix typo

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch 8.5.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/8.5.x by this push:
 new cbed07b  Fix typo
cbed07b is described below

commit cbed07b102035b79554ca3e81ecd4d9a40708d04
Author: Mark Thomas 
AuthorDate: Wed Apr 15 10:08:39 2020 +0100

Fix typo
---
 .../tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java   | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git 
a/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java 
b/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
index 8c740f1..5ff4684 100644
--- 
a/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
+++ 
b/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
@@ -53,7 +53,7 @@ import org.apache.tomcat.websocket.server.WsContextListener;
  *
  * Each test uses 2 client endpoint and 2 server endpoints with each client
  * connecting to each server for a total of four connections (note sometimes
- * the two clients and/or the two servers will be the sam)e.
+ * the two clients and/or the two servers will be the same).
  */
 public class TestWsWebSocketContainerGetOpenSessions extends WebSocketBaseTest 
{
 


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] branch master updated: Fix typo

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/master by this push:
 new f3c598f  Fix typo
f3c598f is described below

commit f3c598f0e6243efd85920b5a9630794d15ce2e6c
Author: Mark Thomas 
AuthorDate: Wed Apr 15 10:08:39 2020 +0100

Fix typo
---
 .../tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java   | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git 
a/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java 
b/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
index 91d730a..97f88ef 100644
--- 
a/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
+++ 
b/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
@@ -53,7 +53,7 @@ import org.apache.tomcat.websocket.server.WsContextListener;
  *
  * Each test uses 2 client endpoint and 2 server endpoints with each client
  * connecting to each server for a total of four connections (note sometimes
- * the two clients and/or the two servers will be the sam)e.
+ * the two clients and/or the two servers will be the same).
  */
 public class TestWsWebSocketContainerGetOpenSessions extends WebSocketBaseTest 
{
 


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] branch 9.0.x updated: Fix typo

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch 9.0.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/9.0.x by this push:
 new 3b3c34d  Fix typo
3b3c34d is described below

commit 3b3c34d572ba1f61bdf10d444f5cd6efabd7e9f4
Author: Mark Thomas 
AuthorDate: Wed Apr 15 10:08:39 2020 +0100

Fix typo
---
 .../tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java   | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git 
a/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java 
b/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
index 8c740f1..5ff4684 100644
--- 
a/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
+++ 
b/test/org/apache/tomcat/websocket/TestWsWebSocketContainerGetOpenSessions.java
@@ -53,7 +53,7 @@ import org.apache.tomcat.websocket.server.WsContextListener;
  *
  * Each test uses 2 client endpoint and 2 server endpoints with each client
  * connecting to each server for a total of four connections (note sometimes
- * the two clients and/or the two servers will be the sam)e.
+ * the two clients and/or the two servers will be the same).
  */
 public class TestWsWebSocketContainerGetOpenSessions extends WebSocketBaseTest 
{
 


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] branch master updated: Fix IDE nag

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/master by this push:
 new a5498ac  Fix IDE nag
a5498ac is described below

commit a5498ac591ba0654646d86ea329c8c4048854bf4
Author: Mark Thomas 
AuthorDate: Wed Apr 15 10:07:30 2020 +0100

Fix IDE nag
---
 test/org/apache/catalina/startup/EmbeddedTomcat.java | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/test/org/apache/catalina/startup/EmbeddedTomcat.java 
b/test/org/apache/catalina/startup/EmbeddedTomcat.java
index 4f2c46d..869b707 100644
--- a/test/org/apache/catalina/startup/EmbeddedTomcat.java
+++ b/test/org/apache/catalina/startup/EmbeddedTomcat.java
@@ -79,6 +79,8 @@ public class EmbeddedTomcat {
 
 private static class CounterServlet extends HttpServlet {
 
+private static final long serialVersionUID = 1L;
+
 private AtomicInteger callCount = new AtomicInteger(0);
 
 @Override


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[GitHub] [tomcat-jakartaee-migration] smarkwal commented on issue #3: Bug: Removing signature from JAR file with JCE providers leads to SecurityException

2020-04-15 Thread GitBox
smarkwal commented on issue #3: Bug: Removing signature from JAR file with JCE 
providers leads to SecurityException
URL: 
https://github.com/apache/tomcat-jakartaee-migration/issues/3#issuecomment-613915909
 
 
   How about adding a command line option to exclude certain JAR files from 
getting migrated? It adds just a little bit of complexity in how to use the 
tool, but it has no impact on memory usage. And it is maybe useful in other 
scenarios as well.


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[Bug 62920] Maven Plugin For Tomcat 9.0.x

2020-04-15 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=62920

Mark Thomas  changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 Resolution|--- |MOVED

--- Comment #4 from Mark Thomas  ---
And the issue tracker for the Tomcat Maven plugin is in Jira:
https://issues.apache.org/jira/projects/MTOMCAT

-- 
You are receiving this mail because:
You are the assignee for the bug.
-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[Bug 62920] Maven Plugin For Tomcat 9.0.x

2020-04-15 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=62920

--- Comment #3 from mgrigorov  ---
The source code of the Maven plugin is at
https://svn.apache.org/repos/asf/tomcat/maven-plugin/

-- 
You are receiving this mail because:
You are the assignee for the bug.
-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



buildbot failure in on tomcat-9-trunk

2020-04-15 Thread buildbot
The Buildbot has detected a new failure on builder tomcat-9-trunk while 
building tomcat. Full details are available at:
https://ci.apache.org/builders/tomcat-9-trunk/builds/168

Buildbot URL: https://ci.apache.org/

Buildslave for this Build: asf946_ubuntu

Build Reason: The AnyBranchScheduler scheduler named 'on-tomcat-9-commit' 
triggered this build
Build Source Stamp: [branch 9.0.x] 293406cd045bbd62b48fd2769e498aac8df1bb7a
Blamelist: Mark Thomas 

BUILD FAILED: failed compile_1

Sincerely,
 -The Buildbot




-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[Bug 64317] org.apache.tomcat.util.net.TestSsl testPost() test failing on Windows

2020-04-15 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=64317

--- Comment #11 from Mark Thomas  ---
I'm wondering if this is a load issue. The test had a fairly low timeout on the
server (3s) and I can imagine a situation where that timeout might get
triggered if the host machine was under load. I've increased the timeout and
I'll run some tests locally.

-- 
You are receiving this mail because:
You are the assignee for the bug.
-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] branch 8.5.x updated: Attempt to address intermittent CI failures on Gump

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch 8.5.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/8.5.x by this push:
 new 7756b51  Attempt to address intermittent CI failures on Gump
7756b51 is described below

commit 7756b512d5f8bc2625f4353902b38215ed0b12f6
Author: Mark Thomas 
AuthorDate: Wed Apr 15 08:56:56 2020 +0100

Attempt to address intermittent CI failures on Gump
---
 test/org/apache/tomcat/util/net/TestSsl.java | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/test/org/apache/tomcat/util/net/TestSsl.java 
b/test/org/apache/tomcat/util/net/TestSsl.java
index f5ae28b..c594c09 100644
--- a/test/org/apache/tomcat/util/net/TestSsl.java
+++ b/test/org/apache/tomcat/util/net/TestSsl.java
@@ -86,6 +86,8 @@ public class TestSsl extends TomcatBaseTest {
 
 Tomcat tomcat = getTomcatInstance();
 TesterSupport.initSsl(tomcat);
+// Increase timeout as default (3s) can be too low for some CI systems
+
Assert.assertTrue(tomcat.getConnector().setProperty("connectionTimeout", 
"2"));
 
 Context ctxt = tomcat.addContext("", null);
 Tomcat.addServlet(ctxt, "post", new SimplePostServlet());


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] branch master updated: Attempt to address intermittent CI failures on Gump

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/master by this push:
 new 1350098  Attempt to address intermittent CI failures on Gump
1350098 is described below

commit 13500985d610d2e067e927c6fb1f464e08407afa
Author: Mark Thomas 
AuthorDate: Wed Apr 15 08:56:56 2020 +0100

Attempt to address intermittent CI failures on Gump
---
 test/org/apache/tomcat/util/net/TestSsl.java | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/test/org/apache/tomcat/util/net/TestSsl.java 
b/test/org/apache/tomcat/util/net/TestSsl.java
index f4d2c27..bb4c4eb 100644
--- a/test/org/apache/tomcat/util/net/TestSsl.java
+++ b/test/org/apache/tomcat/util/net/TestSsl.java
@@ -87,6 +87,8 @@ public class TestSsl extends TomcatBaseTest {
 
 Tomcat tomcat = getTomcatInstance();
 TesterSupport.initSsl(tomcat);
+// Increase timeout as default (3s) can be too low for some CI systems
+
Assert.assertTrue(tomcat.getConnector().setProperty("connectionTimeout", 
"2"));
 
 Context ctxt = tomcat.addContext("", null);
 Tomcat.addServlet(ctxt, "post", new SimplePostServlet());


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] branch 9.0.x updated: Attempt to address intermittent CI failures on Gump

2020-04-15 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch 9.0.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/9.0.x by this push:
 new 293406c  Attempt to address intermittent CI failures on Gump
293406c is described below

commit 293406cd045bbd62b48fd2769e498aac8df1bb7a
Author: Mark Thomas 
AuthorDate: Wed Apr 15 08:56:56 2020 +0100

Attempt to address intermittent CI failures on Gump
---
 test/org/apache/tomcat/util/net/TestSsl.java | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/test/org/apache/tomcat/util/net/TestSsl.java 
b/test/org/apache/tomcat/util/net/TestSsl.java
index f55a794..0507231 100644
--- a/test/org/apache/tomcat/util/net/TestSsl.java
+++ b/test/org/apache/tomcat/util/net/TestSsl.java
@@ -86,6 +86,8 @@ public class TestSsl extends TomcatBaseTest {
 
 Tomcat tomcat = getTomcatInstance();
 TesterSupport.initSsl(tomcat);
+// Increase timeout as default (3s) can be too low for some CI systems
+
Assert.assertTrue(tomcat.getConnector().setProperty("connectionTimeout", 
"2"));
 
 Context ctxt = tomcat.addContext("", null);
 Tomcat.addServlet(ctxt, "post", new SimplePostServlet());


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[GitHub] [tomcat-jakartaee-migration] rmaucher commented on issue #3: Bug: Removing signature from JAR file with JCE providers leads to SecurityException

2020-04-15 Thread GitBox
rmaucher commented on issue #3: Bug: Removing signature from JAR file with JCE 
providers leads to SecurityException
URL: 
https://github.com/apache/tomcat-jakartaee-migration/issues/3#issuecomment-613880074
 
 
   I think users should probably use scripting to exclude problem JARs from the 
migration.
   
   Trying to do too much would lead to more problems, here a likely excessive 
memory use [there is the same problem with SB which wants some uncompressed 
JARs, also not doable without full load in memory]. This tool is IMO better if 
it stays simple.


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[Bug 62920] Maven Plugin For Tomcat 9.0.x

2020-04-15 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=62920

--- Comment #2 from Nicolò Boschi  ---
I'd like to work on that, could someone tell me where the changes need to be
made? 
This is my first issue on tomcat

-- 
You are receiving this mail because:
You are the assignee for the bug.
-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org