svn commit: r1710072 - in /tomcat/tc7.0.x/trunk: ./ java/org/apache/catalina/startup/LocalStrings.properties
Author: violetagg Date: Thu Oct 22 18:20:24 2015 New Revision: 1710072 URL: http://svn.apache.org/viewvc?rev=1710072=rev Log: Merged revision 1710070 from tomcat/trunk: Spotted problems in the text messages while debugging bug 58490 Modified: tomcat/tc7.0.x/trunk/ (props changed) tomcat/tc7.0.x/trunk/java/org/apache/catalina/startup/LocalStrings.properties Propchange: tomcat/tc7.0.x/trunk/ -- --- svn:mergeinfo (original) +++ svn:mergeinfo Thu Oct 22 18:20:24 2015 @@ -1,2 +1,2 @@ /tomcat/tc8.0.x/trunk:1636525,1637336,1637685,1637709,1638726,1640089,1640276,1640349,1640363,1640366,1640642,1640672,1640674,1640689,1640884,1641001,1641065,1641067,1641375,1641638,1641723,1641726,1641729-1641730,1641736,1641988,1642669-1642670,1642698,1642701,1643205,1643215,1643217,1643230,1643232,1643273,1643285,1643329-1643330,1643511,1643513,1643521,1643539,1643571,1643581-1643582,1643635,1643655,1643738,1643964,1644018,1644333,1644954,1644992,1645014,1645360,1645456,1645627,1645642,1645686,1645903-1645904,1645908-1645909,1645913,1645920,1646458,1646460-1646462,1646735,1646738-1646741,1646744,1646746,1646748-1646755,1646757,1646759-1646760,1647043,1648816,1651420-1651422,1651844,1652926,1652939-1652940,1652973,1653798,1653817,1653841,1654042,1654161,1654736,1654767,1654787,1656592,1659907,1662986,1663265,1663278,1663325,1663535,1663567,1663679,1663997,1664175,1664321,1664872,1665061,1665086,1666027,1666395,1666503,1666506,1666560,1666570,1666581,1666759,1666967,1666988,1667553 -1667555,1667558,1667617,1667633,1667637,1667747,1667767,1667873,1668028,1668137,1668634,1669432,1669801,1669840,1669895-1669896,1670398,1670435,1670592,1670605-1670607,1670609,1670632,1670720,1670725,1670727,1670731,1671114,1672273,1672285,1673759,1674220,1674295,1675469,1675488,1675595,1675831,1676232,1676367-1676369,1676382,1676394,1676483,1676556,1676635,1678178,1679536,1679988,1680256,1681124,1681182,1681730,1681840,1681864,1681869,1682010,1682034,1682047,1682052-1682053,1682062,1682064,1682070,1682312,1682325,1682331,1682386,1684367,1684385,1685759,1685774,1685827,1685892,1687341,1688904,1689358,1689657,1692850,1693093,1693108,1693324,1694060,1694115,1694291,1694427,1694431,1694503,1694549,1694789,1694873,1694881,1695356,1695372,1695823-1695825,1696200,1696281,1696379,1696468,1700608,1700871,1700897,1700978,1701094,1701124,1701608,1701668,1701676,1701766,1701944,1702248,1702252,1702314,1702390,1702723,1702725,1702728,1702730,1702733,1702735,1702737,1702739,1702742,1702744,1702 748,1702751,1702754,1702758,1702760,1702763,1702766,1708779,1708782,1708806,1709314,1709670 -/tomcat/trunk:1156115-1157160,1157162-1157859,1157862-1157942,1157945-1160347,1160349-1163716,1163718-1166689,1166691-1174340,1174342-1175596,1175598-1175611,1175613-1175932,1175934-1177783,1177785-1177980,1178006-1180720,1180722-1183094,1183096-1187753,1187755,1187775,1187801,1187806,1187809,1187826-1188312,1188314-1188401,1188646-1188840,1188842-1190176,1190178-1195223,1195225-1195953,1195955,1195957-1201238,1201240-1203345,1203347-1206623,1206625-1208046,1208073,1208096,1208114,1208145,1208772,1209194-1212125,1212127-1220291,1220293,1220295-1221321,1221323-1222329,1222332-1222401,1222405-1222795,1222850-1222950,1222969-1225326,1225328-1225463,1225465,1225627,1225629-1226534,1226536-1228908,1228911-1228923,1228927-1229532,1229534-1230766,1230768-1231625,1231627-1233414,1233419-1235207,1235209-1237425,1237427,1237429-1237977,1237981,1237985,1237995,1238070,1238073,1239024-1239048,1239050-1239062,1239135,1239256,1239258-1239485,1239785-1240046,1240101,1240106,1240109,1240112,1240114 ,1240116,1240118,1240121,1240329,1240474-1240850,1240857,1241087,1241160,1241408-1241822,1241908-1241909,1241912-1242110,1242371-1292130,1292134-1292458,1292464-1292670,1292672-1292776,1292780-1293392,1293397-1297017,1297019-1297963,1297965-1299820,1300108,1300111-1300460,1300520-1300948,1300997,1301006,1301280,1302332,1302348,1302608-1302610,1302649,1302837,1303138,1303163,1303338,1303521,1303587,1303698,1303803,1303852,1304011,1304035,1304037,1304135,1304249,1304253,1304260,1304271,1304275,1304468,1304895,1304930-1304932,1305194,1305943,1305965,1306556,1306579-1306580,1307084,1307310,1307511-1307512,1307579,1307591,1307597,1310636,1310639-1310640,1310642,1310701,1311212,1311995,1327617,1327670,1331766,1333161,1333173,1333827,1334787,1335026,1335257,1335547,1335692,1335711,1335731,1336515,1336813,1336864,1336868,1336884,1337419,1337426,1337546,1337572,1337591-1337595,1337643,1337707,1337719,1337734,1337741,1337745,1338151-1338154,1338178,1342027,1342029,1342315,1342320,1342476,1342
svn commit: r1710074 - in /tomcat/trunk: java/org/apache/coyote/http2/ test/org/apache/coyote/http2/
Author: markt Date: Thu Oct 22 18:48:35 2015 New Revision: 1710074 URL: http://svn.apache.org/viewvc?rev=1710074=rev Log: Improve debug logging for connection settings (include the connection ID) Modified: tomcat/trunk/java/org/apache/coyote/http2/ConnectionSettingsBase.java tomcat/trunk/java/org/apache/coyote/http2/ConnectionSettingsLocal.java tomcat/trunk/java/org/apache/coyote/http2/ConnectionSettingsRemote.java tomcat/trunk/java/org/apache/coyote/http2/Http2UpgradeHandler.java tomcat/trunk/java/org/apache/coyote/http2/LocalStrings.properties tomcat/trunk/test/org/apache/coyote/http2/Http2TestBase.java Modified: tomcat/trunk/java/org/apache/coyote/http2/ConnectionSettingsBase.java URL: http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/coyote/http2/ConnectionSettingsBase.java?rev=1710074=1710073=1710074=diff == --- tomcat/trunk/java/org/apache/coyote/http2/ConnectionSettingsBase.java (original) +++ tomcat/trunk/java/org/apache/coyote/http2/ConnectionSettingsBase.java Thu Oct 22 18:48:35 2015 @@ -28,6 +28,8 @@ public abstract class ConnectionSettings private final Log log = LogFactory.getLog(ConnectionSettingsBase.class); private final StringManager sm = StringManager.getManager(ConnectionSettingsBase.class); +private final String connectionId; + // Limits protected static final int MAX_WINDOW_SIZE = (1 << 31) - 1; protected static final int MIN_MAX_FRAME_SIZE = 1 << 14; @@ -46,7 +48,8 @@ public abstract class ConnectionSettings protected Mappending = new HashMap<>(); -public ConnectionSettingsBase() { +public ConnectionSettingsBase(String connectionId) { +this.connectionId = connectionId; // Set up the defaults current.put(Setting.HEADER_TABLE_SIZE, Long.valueOf(DEFAULT_HEADER_TABLE_SIZE)); current.put(Setting.ENABLE_PUSH, Long.valueOf(DEFAULT_ENABLE_PUSH ? 1 : 0)); @@ -59,7 +62,8 @@ public abstract class ConnectionSettings public void set(Setting setting, long value) throws T { if (log.isDebugEnabled()) { -log.debug(sm.getString("connectionSettings.debug", setting, Long.toString(value))); +log.debug(sm.getString("connectionSettings.debug", +connectionId, setting, Long.toString(value))); } switch(setting) { @@ -83,7 +87,8 @@ public abstract class ConnectionSettings break; case UNKNOWN: // Unrecognised. Ignore it. -log.warn(sm.getString("connectionSettings.unknown", setting, Long.toString(value))); +log.warn(sm.getString("connectionSettings.unknown", +connectionId, setting, Long.toString(value))); return; } @@ -173,7 +178,7 @@ public abstract class ConnectionSettings // Need to put a sensible limit on this. Start with 16k (default is 4k) if (headerTableSize > (16 * 1024)) { String msg = sm.getString("connectionSettings.headerTableSizeLimit", -Long.toString(headerTableSize)); +connectionId, Long.toString(headerTableSize)); throwException(msg, Http2Error.PROTOCOL_ERROR); } } @@ -184,7 +189,7 @@ public abstract class ConnectionSettings // will never be negative if (enablePush > 1) { String msg = sm.getString("connectionSettings.enablePushInvalid", -Long.toString(enablePush)); +connectionId, Long.toString(enablePush)); throwException(msg, Http2Error.PROTOCOL_ERROR); } } @@ -193,7 +198,7 @@ public abstract class ConnectionSettings private void validateInitialWindowSize(long initialWindowSize) throws T { if (initialWindowSize > MAX_WINDOW_SIZE) { String msg = sm.getString("connectionSettings.windowSizeTooBig", -Long.toString(initialWindowSize), Long.toString(MAX_WINDOW_SIZE)); +connectionId, Long.toString(initialWindowSize), Long.toString(MAX_WINDOW_SIZE)); throwException(msg, Http2Error.FLOW_CONTROL_ERROR); } } @@ -202,7 +207,7 @@ public abstract class ConnectionSettings private void validateMaxFrameSize(long maxFrameSize) throws T { if (maxFrameSize < MIN_MAX_FRAME_SIZE || maxFrameSize > MAX_MAX_FRAME_SIZE) { String msg = sm.getString("connectionSettings.maxFrameSizeInvalid", -Long.toString(maxFrameSize), Integer.toString(MIN_MAX_FRAME_SIZE), +connectionId, Long.toString(maxFrameSize), Integer.toString(MIN_MAX_FRAME_SIZE), Integer.toString(MAX_MAX_FRAME_SIZE)); throwException(msg, Http2Error.PROTOCOL_ERROR); } Modified: tomcat/trunk/java/org/apache/coyote/http2/ConnectionSettingsLocal.java URL:
[Bug 58518] New: SSL connection failed (Time out)
https://bz.apache.org/bugzilla/show_bug.cgi?id=58518 Bug ID: 58518 Summary: SSL connection failed (Time out) Product: Tomcat 8 Version: 8.0.28 Hardware: PC Status: NEW Severity: critical Priority: P2 Component: Connectors Assignee: dev@tomcat.apache.org Reporter: han...@mitac.com.tw After upgrade to Tomcat 8.0.28, the SSL connection failed (Time out). When downgrade back to Tomcat 8.0.27, the SSL connection back to normal. Any other variables are not changed (OS, JVM, configurations). Only change the Tomcat version. I guess this problem is caused by 8.0.28 changed the rule of reading/parsing the path of configuration resources (keystore locations of SSL). e.g. using the format of C:/ or / will cause reading configuration resources fail in the Tomcat 8.0.28 but 8.0.27 works well. Here is my server.xml of Connector part. Other parts of server.xml are the same with default version. Note: This bug may related to Bug 56777 https://bz.apache.org/bugzilla/show_bug.cgi?id=56777 -- You are receiving this mail because: You are the assignee for the bug. - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
Re: [GUMP@vmgump]: Project tomcat-trunk-validate (in module tomcat-trunk) failed
2015-10-22 6:25 GMT+03:00 Bill Barker <billbar...@apache.org>: > > To whom it may engage... > > This is an automated request, but not an unsolicited one. For > more information please visit http://gump.apache.org/nagged.html, > and/or contact the folk at gene...@gump.apache.org. > > Project tomcat-trunk-validate has an issue affecting its community integration. > This issue affects 1 projects, > and has been outstanding for 2 runs. > The current state of this project is 'Failed', with reason 'Build Failed'. > For reference only, the following projects are affected by this: > - tomcat-trunk-validate : Tomcat 9.x, a web server implementing the Java Servlet 4.0, > ... > > > Full details are available at: > http://vmgump.apache.org/gump/public/tomcat-trunk/tomcat-trunk-validate/index.html > > That said, some information snippets are provided here. > > The following annotations (debug/informational/warning/error messages) were provided: > -DEBUG- Dependency on checkstyle exists, no need to add for property checkstyle.jar. > -INFO- Failed with reason build failed > > > > The following work was performed: > http://vmgump.apache.org/gump/public/tomcat-trunk/tomcat-trunk-validate/gump_work/build_tomcat-trunk_tomcat-trunk-validate.html > Work Name: build_tomcat-trunk_tomcat-trunk-validate (Type: Build) > Work ended in a state of : Failed > Elapsed: 1 min 47 secs > Command Line: /usr/lib/jvm/java-8-oracle/bin/java -Djava.awt.headless=true -Dbuild.sysclasspath=only org.apache.tools.ant.Main -Dgump.merge=/srv/gump/public/gump/work/merge.xml -Dcheckstyle.jar=/srv/gump/public/workspace/checkstyle/target/checkstyle-6.12-SNAPSHOT.jar -Dexecute.validate=true validate > [Working Directory: /srv/gump/public/workspace/tomcat-trunk] > CLASSPATH: /usr/lib/jvm/java-8-oracle/lib/tools.jar:/srv/gump/public/workspace/ant/dist/lib/ant.jar:/srv/gump/public/workspace/ant/dist/lib/ant-launcher.jar:/srv/gump/public/workspace/ant/dist/lib/ant-jmf.jar:/srv/gump/public/workspace/ant/dist/lib/ant-junit.jar:/srv/gump/public/workspace/ant/dist/lib/ant-junit4.jar:/srv/gump/public/workspace/ant/dist/lib/ant-swing.jar:/srv/gump/public/workspace/ant/dist/lib/ant-apache-resolver.jar:/srv/gump/public/workspace/ant/dist/lib/ant-apache-xalan2.jar:/srv/gump/public/workspace/xml-commons/java/build/resolver.jar:/srv/gump/public/workspace/checkstyle/target/checkstyle-6.12-SNAPSHOT.jar:/srv/gump/packages/antlr/antlr-3.1.3.jar:/srv/gump/public/workspace/apache-commons/beanutils/dist/commons-beanutils-20151022.jar:/srv/gump/packages/commons-collections3/commons-collections-3.2.1.jar:/srv/gump/public/workspace/apache-commons/cli/target/commons-cli-1.4-SNAPSHOT.jar:/srv/gump/public/workspace/commons-lang-trunk/target/commons-lang3-3.5-SNAPSHOT.ja > r:/srv/gump/public/workspace/apache-commons/logging/target/commons-logging-20151022.jar:/srv/gump/public/workspace/apache-commons/logging/target/commons-logging-api-20151022.jar:/srv/gump/packages/guava/guava-18.0.jar > - > Buildfile: /srv/gump/public/workspace/tomcat-trunk/build.xml > > build-prepare: >[delete] Deleting directory /srv/gump/public/workspace/tomcat-trunk/output/build/temp > [mkdir] Created dir: /srv/gump/public/workspace/tomcat-trunk/output/build/temp > > compile-prepare: > > download-validate: > > testexist: > [echo] Testing for /srv/gump/public/workspace/checkstyle/target/checkstyle-6.12-SNAPSHOT.jar > > setproxy: > > downloadfile: > > validate: > [mkdir] Created dir: /srv/gump/public/workspace/tomcat-trunk/output/res/checkstyle > [checkstyle] Running Checkstyle 6.12-SNAPSHOT on 3067 files > [checkstyle] /srv/gump/public/workspace/tomcat-trunk/webapps/docs/config/filter.xml:368: error: Line matches the illegal pattern '\s+#39;. > [checkstyle] /srv/gump/public/workspace/tomcat-trunk/webapps/docs/config/filter.xml:411: error: Line matches the illegal pattern '\s+#39;. > That was me ... I'll fix it in a minute Regards, Violeta > BUILD FAILED > /srv/gump/public/workspace/tomcat-trunk/build.xml:549: Got 2 errors and 0 warnings. > > Total time: 1 minute 46 seconds > - > > To subscribe to this information via syndicated feeds: > - RSS: http://vmgump.apache.org/gump/public/tomcat-trunk/tomcat-trunk-validate/rss.xml > - Atom: http://vmgump.apache.org/gump/public/tomcat-trunk/tomcat-trunk-validate/atom.xml > > == Gump Tracking Only === > Produced by Apache Gump(TM) version 2.3. > Gump Run 2015102208, vmgump.apache.org:vmgump:2015102208 > Gump E-mail Identifier (unique within run) #10. > > -- > Apache Gump > http://gump.apache.org/ [Instance: vmgump] > > - > To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org > For additional commands, e-mail: dev-h...@tomcat.apache.org >
[Bug 58519] org.apache.catalina.loader.WebappClassLoaderBase.checkStateForClassLoading throwing java.lang.IllegalStateException: Can't overwrite cause
https://bz.apache.org/bugzilla/show_bug.cgi?id=58519 --- Comment #2 from Kaszaq--- No need, thanks. Trigger of this was inside hazelcast library. Hazelcast that loads class for itself called a function on ClassLoader which was expected to throw ClassNotFoundException in case of any problem. I believe that if ClassLoader would throw expected ClassNotFoundException the problem would not occur. However I am considering to report this to them as well as RuntimeException from any method should not cause the entire Hazelcast cluster to collapse - which is exactly what have happened because of the bug reported here and badly handling of runtime exceptions in Hazelcast. The problem was caused by deploy of new version of application when the previous was was not undeployed correctly by Tomcat. -- You are receiving this mail because: You are the assignee for the bug. - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
svn commit: r1710081 - /tomcat/trunk/java/org/apache/coyote/AbstractProtocol.java
Author: markt Date: Thu Oct 22 19:20:13 2015 New Revision: 1710081 URL: http://svn.apache.org/viewvc?rev=1710081=rev Log: More quote removal Modified: tomcat/trunk/java/org/apache/coyote/AbstractProtocol.java Modified: tomcat/trunk/java/org/apache/coyote/AbstractProtocol.java URL: http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/coyote/AbstractProtocol.java?rev=1710081=1710080=1710081=diff == --- tomcat/trunk/java/org/apache/coyote/AbstractProtocol.java (original) +++ tomcat/trunk/java/org/apache/coyote/AbstractProtocol.java Thu Oct 22 19:20:13 2015 @@ -539,12 +539,12 @@ public abstract class AbstractProtocol
svn commit: r1710070 - /tomcat/trunk/java/org/apache/catalina/startup/LocalStrings.properties
Author: violetagg Date: Thu Oct 22 18:16:48 2015 New Revision: 1710070 URL: http://svn.apache.org/viewvc?rev=1710070=rev Log: Spotted problems in the text messages while debugging bug 58490 Modified: tomcat/trunk/java/org/apache/catalina/startup/LocalStrings.properties Modified: tomcat/trunk/java/org/apache/catalina/startup/LocalStrings.properties URL: http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/catalina/startup/LocalStrings.properties?rev=1710070=1710069=1710070=diff == --- tomcat/trunk/java/org/apache/catalina/startup/LocalStrings.properties (original) +++ tomcat/trunk/java/org/apache/catalina/startup/LocalStrings.properties Thu Oct 22 18:16:48 2015 @@ -55,13 +55,13 @@ contextConfig.jndiUrlNotDirContextConn=T contextConfig.jspFile.error=JSP file {0} must start with a ''/' contextConfig.jspFile.warning=WARNING: JSP file {0} must start with a ''/'' in Servlet 2.4 contextConfig.missingRealm=No Realm has been configured to authenticate against -contextConfig.resourceJarFail=Failed to processes JAR found at URL [{0}] for static resources to be included in context with name [{0}] +contextConfig.resourceJarFail=Failed to process JAR found at URL [{0}] for static resources to be included in context with name [{1}] contextConfig.role.auth=Security role name {0} used in an without being defined in a contextConfig.role.link=Security role name {0} used in a without being defined in a contextConfig.role.runas=Security role name {0} used in a without being defined in a contextConfig.sci.debug=Unable to process ServletContainerInitializer for [{0}]. This is most likely due to a class defined in the @HandlesTypes annotation being missing contextConfig.sci.info=Unable to process ServletContainerInitializer for [{0}]. This is most likely due to a class defined in the @HandlesTypes annotation being missing. Enable DEBUG level logging for the full stack trace. -contextConfig.servletContainerInitializerFail=Failed to process JAR found at URL [{0}] for ServletContainerInitializers for context with name [{1}] +contextConfig.servletContainerInitializerFail=Failed to detect ServletContainerInitializers for context with name [{0}] contextConfig.start=ContextConfig: Processing START contextConfig.stop=ContextConfig: Processing STOP contextConfig.unavailable=Marking this application unavailable due to previous error(s) - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
svn commit: r1710071 - in /tomcat/tc8.0.x/trunk: ./ java/org/apache/catalina/startup/LocalStrings.properties
Author: violetagg Date: Thu Oct 22 18:18:07 2015 New Revision: 1710071 URL: http://svn.apache.org/viewvc?rev=1710071=rev Log: Merged revision 1710070 from tomcat/trunk: Spotted problems in the text messages while debugging bug 58490 Modified: tomcat/tc8.0.x/trunk/ (props changed) tomcat/tc8.0.x/trunk/java/org/apache/catalina/startup/LocalStrings.properties Propchange: tomcat/tc8.0.x/trunk/ -- --- svn:mergeinfo (original) +++ svn:mergeinfo Thu Oct 22 18:18:07 2015 @@ -1 +1 @@ -/tomcat/trunk:1636524,1637156,1637176,1637188,1637331,1637684,1637695,1638720-1638725,1639653,1640010,1640083-1640084,1640088,1640275,1640322,1640347,1640361,1640365,1640403,1640410,1640652,1640655-1640658,1640688,1640700-1640883,1640903,1640976,1640978,1641000,1641026,1641038-1641039,1641051-1641052,1641058,1641064,1641300,1641369,1641374,1641380,1641486,1641634,1641656-1641692,1641704,1641707-1641718,1641720-1641722,1641735,1641981,1642233,1642280,1642554,1642564,1642595,1642606,1642668,1642679,1642697,1642699,1642766,1643002,1643045,1643054-1643055,1643066,1643121,1643128,1643206,1643209-1643210,1643216,1643249,1643270,1643283,1643309-1643310,1643323,1643365-1643366,1643370-1643371,1643465,1643474,1643536,1643570,1643634,1643649,1643651,1643654,1643675,1643731,1643733-1643734,1643761,1643766,1643814,1643937,1643963,1644017,1644169,1644201-1644203,1644321,1644323,1644516,1644523,1644529,1644535,1644730,1644768,1644784-1644785,1644790,1644793,1644815,1644884,1644886,1644890,1644892 ,1644910,1644924,1644929-1644930,1644935,1644989,1645011,1645247,1645355,1645357-1645358,1645455,1645465,1645469,1645471,1645473,1645475,1645486-1645488,1645626,1645641,1645685,1645743,1645763,1645951-1645953,1645955,1645993,1646098-1646106,1646178,1646220,1646302,1646304,1646420,1646470-1646471,1646476,1646559,1646717-1646723,1646773,1647026,1647042,1647530,1647655,1648304,1648815,1648907,1649973,1650081,1650365,1651116,1651120,1651280,1651470,1652938,1652970,1653041,1653471,1653550,1653574,1653797,1653815-1653816,1653819,1653840,1653857,1653888,1653972,1654013,1654030,1654050,1654123,1654148,1654159,1654513,1654515,1654517,1654522,1654524,1654725,1654735,1654766,1654785,1654851-1654852,1654978,1655122-1655124,1655126-1655127,1655129-1655130,1655132-1655133,1655312,1655351,1655438,1655441,1655454,168,1656087,1656299,1656319,1656331,1656345,1656350,1656590,1656648-1656650,1656657,1657041,1657054,1657374,1657492,1657510,1657565,1657580,1657584,1657586,1657589,1657592,1657607,1657 609,1657682,1657907,1658207,1658734,1658781,1658790,1658799,1658802,1658804,1658833,1658840,1658966,1659043,1659053,1659059,1659188-1659189,1659216,1659263,1659293,1659304,1659306-1659307,1659382,1659384,1659428,1659471,1659486,1659505,1659516,1659521,1659524,1659559,1659562,1659803,1659806,1659814,1659833,1659862,1659905,1659919,1659948,1659967,1659983-1659984,1660060,1660074,1660077,1660133,1660168,1660331-1660332,1660353,1660358,1660924,1661386,1661867,1661972,1661990,1662200,1662308-1662309,1662548,1662614,1662736,1662985,1662988-1662989,1663264,1663277,1663298,1663534,1663562,1663676,1663715,1663754,1663768,1663772,1663781,1663893,1663995,1664143,1664163,1664174,1664301,1664317,1664347,1664657,1664659,1664710,1664863-1664864,1664866,1665085,1665292,1665559,1665653,1665661,1665672,1665694,1665697,1665736,1665779,1665976-1665977,1665980-1665981,1665985-1665986,1665989,1665998,1666004,1666008,1666013,1666017,1666024,1666116,1666386-1666387,1666494,1666496,1666552,1666569,1666579,1 37,149,1666757,1666966,1666972,1666985,1666995,1666997,1667292,1667402,1667406,1667546,1667615,1667630,1667636,1667688,1667764,1667871,1668026,1668135,1668193,1668593,1668596,1668630,1668639,1668843,1669353,1669370,1669451,1669800,1669838,1669876,1669882,1670394,1670433,1670591,1670598-1670600,1670610,1670631,1670719,1670724,1670726,1670730,1670940,1671112,1672272,1672284,1673754,1674294,1675461,1675486,1675594,1675830,1676231,1676250-1676251,1676364,1676381,1676393,1676479,1676525,1676552,1676615,1676630,1676634,1676721,1676926,1676943,1677140,1677802,1678011,1678162,1678174,1678339,1678426-1678427,1678694,1678701,1679534,1679708,1679710,1679716,1680034,1680246,1681056,1681123,1681138,1681280,1681283,1681286,1681450,1681697,1681701,1681729,1681770,1681779,1681793,1681807,1681837-1681838,1681854,1681862,1681958,1682028,1682033,1682311,1682315,1682317,1682320,1682324,1682330,1682842,1684172,1684366,1684383,1684526-1684527,1684549-1684550,1685556,1685591,1685739,1685744,168577
svn commit: r1710080 - /tomcat/trunk/java/org/apache/coyote/AbstractProtocol.java
Author: markt Date: Thu Oct 22 19:19:26 2015 New Revision: 1710080 URL: http://svn.apache.org/viewvc?rev=1710080=rev Log: Get rid of the " characters in the async timeout thread names Modified: tomcat/trunk/java/org/apache/coyote/AbstractProtocol.java Modified: tomcat/trunk/java/org/apache/coyote/AbstractProtocol.java URL: http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/coyote/AbstractProtocol.java?rev=1710080=1710079=1710080=diff == --- tomcat/trunk/java/org/apache/coyote/AbstractProtocol.java (original) +++ tomcat/trunk/java/org/apache/coyote/AbstractProtocol.java Thu Oct 22 19:19:26 2015 @@ -333,6 +333,11 @@ public abstract class AbstractProtocol
[Bug 58522] New: concurrency problem corrupts WARDirContext.Entry children
https://bz.apache.org/bugzilla/show_bug.cgi?id=58522 Bug ID: 58522 Summary: concurrency problem corrupts WARDirContext.Entry children Product: Tomcat 7 Version: 7.0.52 Hardware: All OS: All Status: NEW Severity: normal Priority: P2 Component: Catalina Assignee: dev@tomcat.apache.org Reporter: ryan.f...@workday.com We discovered a problem where calling ServletContext.getResourcePaths from a jsp may corrupt WARDirContext.Entry.children. The WARDirContext.list(Entry) method performs an Arrays.sort(children) call which is not thread-safe. Calling this from multiple request threads may result in the children array losing some entries and duplicating others. When entries representing directories in the war are lost, Tomcat cannot load resources from there. Static resource requests result in http error code 404 and jsp compliation can throw JasperException when included files are not found. We have seen this on CentOS 6.5 (and newer versions) with Tomcat 7.0.52 and Java 1.7.0_51. The following are attached in the zip: * Test case project which demonstrates this corruption. It usually requires multiple runs. * A stack trace illustrating the problematic flow. * A patch file for WARDirContext.java. -- You are receiving this mail because: You are the assignee for the bug. - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
buildbot exception in ASF Buildbot on tomcat-8-trunk
The Buildbot has detected a build exception on builder tomcat-8-trunk while building ASF Buildbot. Full details are available at: http://ci.apache.org/builders/tomcat-8-trunk/builds/190 Buildbot URL: http://ci.apache.org/ Buildslave for this Build: silvanus_ubuntu Build Reason: The AnyBranchScheduler scheduler named 'on-tomcat-8-commit' triggered this build Build Source Stamp: [branch tomcat/tc8.0.x/trunk] 1710071 Blamelist: violetagg BUILD FAILED: exception upload_2 Sincerely, -The Buildbot - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
svn commit: r1709960 - /tomcat/trunk/webapps/docs/config/filter.xml
Author: violetagg Date: Thu Oct 22 08:24:04 2015 New Revision: 1709960 URL: http://svn.apache.org/viewvc?rev=1709960=rev Log: Remove extra white spaces Modified: tomcat/trunk/webapps/docs/config/filter.xml Modified: tomcat/trunk/webapps/docs/config/filter.xml URL: http://svn.apache.org/viewvc/tomcat/trunk/webapps/docs/config/filter.xml?rev=1709960=1709959=1709960=diff == --- tomcat/trunk/webapps/docs/config/filter.xml (original) +++ tomcat/trunk/webapps/docs/config/filter.xml Thu Oct 22 08:24:04 2015 @@ -365,7 +365,7 @@ X-CSRF-Token: Fetch Cache the returned session id and nonce in order to provide them in the subsequent modifying requests to protected resources. - Modifying requests can be denied and header + Modifying requests can be denied and header X-CSRF-Token: Required will be returned in case of invalid or missing nonce, expired session or in case the session id is changed by the server. @@ -408,7 +408,7 @@ HTTP/1.1 200 OK Request parameters cannot be used to fetch new nonce, only header can be used to request a new nonce. -
svn commit: r1709999 - /tomcat/trunk/java/org/apache/coyote/http2/Http2UpgradeHandler.java
Author: markt Date: Thu Oct 22 12:03:51 2015 New Revision: 170 URL: http://svn.apache.org/viewvc?rev=170=rev Log: Align error handling for being unable to send the preface with the other error handling in this method. Modified: tomcat/trunk/java/org/apache/coyote/http2/Http2UpgradeHandler.java Modified: tomcat/trunk/java/org/apache/coyote/http2/Http2UpgradeHandler.java URL: http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/coyote/http2/Http2UpgradeHandler.java?rev=170=1709998=170=diff == --- tomcat/trunk/java/org/apache/coyote/http2/Http2UpgradeHandler.java (original) +++ tomcat/trunk/java/org/apache/coyote/http2/Http2UpgradeHandler.java Thu Oct 22 12:03:51 2015 @@ -217,7 +217,7 @@ public class Http2UpgradeHandler extends socketWrapper.write(true, settings, 0, settings.length); socketWrapper.flush(true); } catch (IOException ioe) { -throw new IllegalStateException(sm.getString("upgradeHandler.sendPrefaceFail"), ioe); +throw new ProtocolException(sm.getString("upgradeHandler.sendPrefaceFail"), ioe); } // Make sure the client has sent a valid connection preface before we - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
[Bug 58519] org.apache.catalina.loader.WebappClassLoaderBase.checkStateForClassLoading throwing java.lang.IllegalStateException: Can't overwrite cause
https://bz.apache.org/bugzilla/show_bug.cgi?id=58519 Kaszaqchanged: What|Removed |Added CC||kaszaq+bz.apache.org@gmail. ||com OS||All -- You are receiving this mail because: You are the assignee for the bug. - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
[Bug 58519] New: org.apache.catalina.loader.WebappClassLoaderBase.checkStateForClassLoading throwing java.lang.IllegalStateException: Can't overwrite cause
https://bz.apache.org/bugzilla/show_bug.cgi?id=58519 Bug ID: 58519 Summary: org.apache.catalina.loader.WebappClassLoaderBase.check StateForClassLoading throwing java.lang.IllegalStateException: Can't overwrite cause Product: Tomcat 8 Version: trunk Hardware: PC Status: NEW Severity: normal Priority: P2 Component: Catalina Assignee: dev@tomcat.apache.org Reporter: kaszaq+bz.apache@gmail.com Hi, Recently I had catalina log grow in few seconds to enormous sizes, partially due to problems with mentioned method. Instead of creating and declared ClassNotFoundException it throws "java.lang.IllegalStateException: Can't overwrite cause". Looking into the code I found here: http://grepcode.com/file/repo1.maven.org/maven2/org.apache.tomcat/tomcat-catalina/8.0.23/org/apache/catalina/loader/WebappClassLoaderBase.java#WebappClassLoaderBase.checkStateForClassLoading%28java.lang.String%29 1309protected void checkStateForClassLoading(String className) throws ClassNotFoundException { 1310// It is not permitted to load new classes once the web application has 1311// been stopped. 1312try { 1313checkStateForResourceLoading(className); 1314} catch (IllegalStateException ise) { 1315ClassNotFoundException cnfe = new ClassNotFoundException(); 1316cnfe.initCause(ise); 1317throw cnfe; 1318} 1319} I belive the problem is caused by setting initcause on created class when constructor new ClassNotFoundException() has explicty stated: 71 public ClassNotFoundException() { 72 super((Throwable)null); // Disallow initCause 73 } Which during initCause is producing mentioned exception: 454 public synchronized Throwable initCause(Throwable cause) { 455 if (this.cause != this) 456 throw new IllegalStateException("Can't overwrite cause with " + 457 Objects.toString(cause, "a null"), this); 458 if (cause == this) 459 throw new IllegalArgumentException("Self-causation not permitted", this); 460 this.cause = cause; 461 return this; 462 } -- You are receiving this mail because: You are the assignee for the bug. - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
[Bug 58519] org.apache.catalina.loader.WebappClassLoaderBase.checkStateForClassLoading throwing java.lang.IllegalStateException: Can't overwrite cause
https://bz.apache.org/bugzilla/show_bug.cgi?id=58519 Konstantin Kolinkochanged: What|Removed |Added Version|trunk |8.0.28 --- Comment #1 from Konstantin Kolinko --- Ack. 1) Tomcat side. > 1314} catch (IllegalStateException ise) { > 1315ClassNotFoundException cnfe = new ClassNotFoundException(); > 1316cnfe.initCause(ise); > 1317throw cnfe; > 1318} initCause() usually is used for compatibility for 1.3 and earlier versions of java that did not have a Throwable(Throwable cause) constructor. There is no ClassNotFoundException(Throwable) constructor, but there is (String, Throwable) one. Calling initCause() here is a recent code, introduced in r1596004 (17 months ago) with additional refactoring in r1640087. > > I belive the problem is caused by setting initcause on created class when > constructor > new ClassNotFoundException() > > has explicty stated: > > 71 public ClassNotFoundException() { > 72 super((Throwable)null); // Disallow initCause > 73 } The above nasty trick in JRE is old. E.g. 5u20 already has it... 2) The trigger for this behaviour is a bug in your own web application. You cannot load classes when the web application (and its class loader) has already been stopped. If you need help with fixing this bug in your application, ask on the users mailing list. Don't forget to provide version numbers and full stack trace. http://tomcat.apache.org/lists.html#tomcat-users http://markmail.org/message/ntwrtxeke4agdexj -- You are receiving this mail because: You are the assignee for the bug. - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
[VOTE] Release Apache Tomcat Native 1.2.0
Version 1.2.0 includes the following changes: - Windows binaries built with APR 1.5.1 and OpenSSL 1.0.2d - ALPN support The proposed release artefacts can be found at [1], and the build was done using tag [2]. The Apache Tomcat Native 1.2.0 is [ ] Stable, go ahead and release [ ] Broken because of ... [1] https://dist.apache.org/repos/dist/dev/tomcat/tomcat-connectors/native/1.2.0/ [2] https://svn.apache.org/repos/asf/tomcat/native/tags/TOMCAT_NATIVE_1_2_0 - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
Re: [VOTE] Release Apache Tomcat 7.0.65
Hi, I noticed test failures when rebuilding Tomcat 7.0.65 on Debian with OpenJDK 7 & 8. An IllegalArgumentException "Illegal character(s) in message header field: Cookie:" is thrown in TestNonLoginAndBasicAuthenticator, TestSSOnonLoginAndBasicAuthenticator and TestSSOnonLoginAndDigestAuthenticator: Testcase: testBasicLoginThenAcceptWithCookies took 0.539 sec Caused an ERROR Illegal character(s) in message header field: Cookie: java.lang.IllegalArgumentException: Illegal character(s) in message header field: Cookie: at sun.net.www.protocol.http.HttpURLConnection.checkMessageHeader(HttpURLConnection.java:489) at sun.net.www.protocol.http.HttpURLConnection.isExternalMessageHeaderAllowed(HttpURLConnection.java:459) at sun.net.www.protocol.http.HttpURLConnection.setRequestProperty(HttpURLConnection.java:3018) at org.apache.catalina.startup.TomcatBaseTest.methodUrl(TomcatBaseTest.java:648) at org.apache.catalina.startup.TomcatBaseTest.getUrl(TomcatBaseTest.java:625) at org.apache.catalina.startup.TomcatBaseTest.getUrl(TomcatBaseTest.java:619) at org.apache.catalina.authenticator.TestSSOnonLoginAndBasicAuthenticator.doTestNonLogin(TestSSOnonLoginAndBasicAuthenticator.java:365) at org.apache.catalina.authenticator.TestSSOnonLoginAndBasicAuthenticator.testBasicLoginThenAcceptWithCookies(TestSSOnonLoginAndBasicAuthenticator.java:215) Could this be a locale sensitive test case? Emmanuel Bourg - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
svn commit: r1710107 - /tomcat/trunk/java/org/apache/tomcat/util/net/SecureNio2Channel.java
Author: markt Date: Thu Oct 22 22:15:04 2015 New Revision: 1710107 URL: http://svn.apache.org/viewvc?rev=1710107=rev Log: Remove unused code Modified: tomcat/trunk/java/org/apache/tomcat/util/net/SecureNio2Channel.java Modified: tomcat/trunk/java/org/apache/tomcat/util/net/SecureNio2Channel.java URL: http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/tomcat/util/net/SecureNio2Channel.java?rev=1710107=1710106=1710107=diff == --- tomcat/trunk/java/org/apache/tomcat/util/net/SecureNio2Channel.java (original) +++ tomcat/trunk/java/org/apache/tomcat/util/net/SecureNio2Channel.java Thu Oct 22 22:15:04 2015 @@ -111,10 +111,6 @@ public class SecureNio2Channel extends N }; } -public void setSSLEngine(SSLEngine engine) { -this.sslEngine = engine; -} - @Override public void reset(AsynchronousSocketChannel channel, SocketWrapperBase socket) throws IOException { @@ -213,6 +209,7 @@ public class SecureNio2Channel extends N SSLEngineResult handshake = null; while (!handshakeComplete) { +log.debug("Handshake status [" + handshakeStatus + "]" ); switch (handshakeStatus) { case NOT_HANDSHAKING: { //should never happen @@ -305,6 +302,7 @@ public class SecureNio2Channel extends N } default: throw new IllegalStateException(sm.getString("channel.nio.ssl.invalidStatus", handshakeStatus)); } +log.debug("Handshake complete [" + handshakeComplete + "]" ); } //return 0 if we are complete, otherwise recurse to process the task return handshakeComplete ? 0 : handshakeInternal(async); @@ -463,6 +461,7 @@ public class SecureNio2Channel extends N netOutBuffer.flip(); //set the status handshakeStatus = result.getHandshakeStatus(); +log.debug("Result [" + result + "]"); return result; } @@ -499,6 +498,7 @@ public class SecureNio2Channel extends N cont = result.getStatus() == SSLEngineResult.Status.OK && handshakeStatus == HandshakeStatus.NEED_UNWRAP; } while (cont); +log.debug("Result [" + result + "]"); return result; } - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
[Bug 58522] concurrency problem corrupts WARDirContext.Entry children
https://bz.apache.org/bugzilla/show_bug.cgi?id=58522 --- Comment #1 from Ryan Fong--- Created attachment 33195 --> https://bz.apache.org/bugzilla/attachment.cgi?id=33195=edit everything -- You are receiving this mail because: You are the assignee for the bug. - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
[Bug 57129] Regression. Load WEB-INF/lib jarfiles in alphabetical order
https://bz.apache.org/bugzilla/show_bug.cgi?id=57129 --- Comment #16 from Philippe Busque--- We just begun converting your tomcat 6 and tomcat 7 Webfarm to Tomcat 8, and honestly, this is a show stopper for us. We cannot, in a cluster setup, start Tomcat and have each instance have a different class loading behaviour. This is especially important when serialization come into play with session sharing inside the cluster, where a class mismatch can lead to Serialization Exception. Or with logging libraries, such as logback, which override existing libraries with their own to offer a logging facade. In an ideal world, yes, we would have a nice war with no overriding classes, with no dependencies pulling deep libraries. In an ideal world, we would use absolute path for a PreResources. But this is not ideal. Maven-generated war with SNAPSHOT dependencies will have variables suffixes. Unless PreResources can support wildcards or prefixes in order to support versioning, this solution is not viable for most of us. There was a similar use case back in Tomcat 7, when the support for War outside the webapp support was dropped, but added back later with a flag. There exist applications that need a deterministic class loading. Heck, Java itself at it's core, is deterministic. That's the whole notion of classpath that is being ignored. If you do not want to make the jar sorting as the default behaviour, fine. But at the very least, offer it as an option for people to decide if they need it. ie Thanks -- You are receiving this mail because: You are the assignee for the bug. - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
svn commit: r1710108 - /tomcat/trunk/java/org/apache/tomcat/util/net/SecureNio2Channel.java
Author: markt Date: Thu Oct 22 22:27:11 2015 New Revision: 1710108 URL: http://svn.apache.org/viewvc?rev=1710108=rev Log: Remove temporary debug statements from r1710107 Modified: tomcat/trunk/java/org/apache/tomcat/util/net/SecureNio2Channel.java Modified: tomcat/trunk/java/org/apache/tomcat/util/net/SecureNio2Channel.java URL: http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/tomcat/util/net/SecureNio2Channel.java?rev=1710108=1710107=1710108=diff == --- tomcat/trunk/java/org/apache/tomcat/util/net/SecureNio2Channel.java (original) +++ tomcat/trunk/java/org/apache/tomcat/util/net/SecureNio2Channel.java Thu Oct 22 22:27:11 2015 @@ -209,7 +209,6 @@ public class SecureNio2Channel extends N SSLEngineResult handshake = null; while (!handshakeComplete) { -log.debug("Handshake status [" + handshakeStatus + "]" ); switch (handshakeStatus) { case NOT_HANDSHAKING: { //should never happen @@ -302,7 +301,6 @@ public class SecureNio2Channel extends N } default: throw new IllegalStateException(sm.getString("channel.nio.ssl.invalidStatus", handshakeStatus)); } -log.debug("Handshake complete [" + handshakeComplete + "]" ); } //return 0 if we are complete, otherwise recurse to process the task return handshakeComplete ? 0 : handshakeInternal(async); @@ -461,7 +459,6 @@ public class SecureNio2Channel extends N netOutBuffer.flip(); //set the status handshakeStatus = result.getHandshakeStatus(); -log.debug("Result [" + result + "]"); return result; } @@ -498,7 +495,6 @@ public class SecureNio2Channel extends N cont = result.getStatus() == SSLEngineResult.Status.OK && handshakeStatus == HandshakeStatus.NEED_UNWRAP; } while (cont); -log.debug("Result [" + result + "]"); return result; } - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
Re: svn commit: r1710107 - /tomcat/trunk/java/org/apache/tomcat/util/net/SecureNio2Channel.java
On 22/10/2015 23:15, ma...@apache.org wrote: > Author: markt > Date: Thu Oct 22 22:15:04 2015 > New Revision: 1710107 > > URL: http://svn.apache.org/viewvc?rev=1710107=rev > Log: > Remove unused code > > Modified: > tomcat/trunk/java/org/apache/tomcat/util/net/SecureNio2Channel.java > > Modified: tomcat/trunk/java/org/apache/tomcat/util/net/SecureNio2Channel.java > URL: > http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/tomcat/util/net/SecureNio2Channel.java?rev=1710107=1710106=1710107=diff > == > --- tomcat/trunk/java/org/apache/tomcat/util/net/SecureNio2Channel.java > (original) > +++ tomcat/trunk/java/org/apache/tomcat/util/net/SecureNio2Channel.java Thu > Oct 22 22:15:04 2015 > @@ -111,10 +111,6 @@ public class SecureNio2Channel extends N > }; > } > > -public void setSSLEngine(SSLEngine engine) { > -this.sslEngine = engine; > -} > - Sorry. The rest of this is temporary debug statements. I'll get them removed shortly. Mark > @Override > public void reset(AsynchronousSocketChannel channel, > SocketWrapperBase socket) > throws IOException { > @@ -213,6 +209,7 @@ public class SecureNio2Channel extends N > SSLEngineResult handshake = null; > > while (!handshakeComplete) { > +log.debug("Handshake status [" + handshakeStatus + "]" ); > switch (handshakeStatus) { > case NOT_HANDSHAKING: { > //should never happen > @@ -305,6 +302,7 @@ public class SecureNio2Channel extends N > } > default: throw new > IllegalStateException(sm.getString("channel.nio.ssl.invalidStatus", > handshakeStatus)); > } > +log.debug("Handshake complete [" + handshakeComplete + "]" ); > } > //return 0 if we are complete, otherwise recurse to process the task > return handshakeComplete ? 0 : handshakeInternal(async); > @@ -463,6 +461,7 @@ public class SecureNio2Channel extends N > netOutBuffer.flip(); > //set the status > handshakeStatus = result.getHandshakeStatus(); > +log.debug("Result [" + result + "]"); > return result; > } > > @@ -499,6 +498,7 @@ public class SecureNio2Channel extends N > cont = result.getStatus() == SSLEngineResult.Status.OK && > handshakeStatus == HandshakeStatus.NEED_UNWRAP; > } while (cont); > +log.debug("Result [" + result + "]"); > return result; > } > > > > > - > To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org > For additional commands, e-mail: dev-h...@tomcat.apache.org > - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
svn commit: r10883 - /dev/tomcat/tomcat-connectors/native/1.2.0/binaries/
Author: markt Date: Thu Oct 22 10:39:30 2015 New Revision: 10883 Log: Add the Windows binaries for x86 and x64 Added: dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-ocsp-win32-bin.zip (with props) dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-ocsp-win32-bin.zip.asc (with props) dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-ocsp-win32-bin.zip.md5 dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-ocsp-win32-bin.zip.sha1 (with props) dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-win32-bin.zip (with props) dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-win32-bin.zip.asc (with props) dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-win32-bin.zip.md5 dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-win32-bin.zip.sha1 Added: dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-ocsp-win32-bin.zip == Binary file - no diff available. Propchange: dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-ocsp-win32-bin.zip -- svn:executable = * Propchange: dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-ocsp-win32-bin.zip -- svn:mime-type = application/java-archive Added: dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-ocsp-win32-bin.zip.asc == Binary file - no diff available. Propchange: dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-ocsp-win32-bin.zip.asc -- svn:mime-type = application/pgp-signature Added: dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-ocsp-win32-bin.zip.md5 == --- dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-ocsp-win32-bin.zip.md5 (added) +++ dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-ocsp-win32-bin.zip.md5 Thu Oct 22 10:39:30 2015 @@ -0,0 +1 @@ +91b29152d99873ad3fedee348fef6ef6 *tomcat-native-1.2.0-ocsp-win32-bin.zip \ No newline at end of file Added: dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-ocsp-win32-bin.zip.sha1 == Binary file - no diff available. Propchange: dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-ocsp-win32-bin.zip.sha1 -- svn:mime-type = application/zlib Added: dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-win32-bin.zip == Binary file - no diff available. Propchange: dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-win32-bin.zip -- svn:executable = * Propchange: dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-win32-bin.zip -- svn:mime-type = application/java-archive Added: dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-win32-bin.zip.asc == Binary file - no diff available. Propchange: dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-win32-bin.zip.asc -- svn:mime-type = application/pgp-signature Added: dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-win32-bin.zip.md5 == --- dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-win32-bin.zip.md5 (added) +++ dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-win32-bin.zip.md5 Thu Oct 22 10:39:30 2015 @@ -0,0 +1 @@ +d8316940f6849625c98ed78daea1f32a *tomcat-native-1.2.0-win32-bin.zip \ No newline at end of file Added: dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-win32-bin.zip.sha1 == --- dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-win32-bin.zip.sha1 (added) +++ dev/tomcat/tomcat-connectors/native/1.2.0/binaries/tomcat-native-1.2.0-win32-bin.zip.sha1 Thu Oct 22
[Bug 56777] Allow configuration resources to be loaded from places other than straight off the filesystem
https://bz.apache.org/bugzilla/show_bug.cgi?id=56777 --- Comment #12 from Violeta Georgieva--- Hi, You may want to see this issue 58518 which seems to be connected with this feature. Best Regards, Violeta Georgieva -- You are receiving this mail because: You are the assignee for the bug. - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
Tomcat 9.0.x, tc-native and itanium support
I've been having problems building OpenSSL 1.0.2d for Windows Itanium 64-bit as part of building the tcnative binaries for Windows. Given that the last Windows platform to support Itanium is Server 2008 R2 and that that has already entered extended support (with that due to end in Jan 2020) how do folks feel about dropping the Itanium build from the binary packages for tcnative 1.2.x and Tomcat 9.0.x? Mark - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
svn commit: r1710022 - /tomcat/trunk/java/org/apache/coyote/http2/Stream.java
Author: markt Date: Thu Oct 22 14:09:49 2015 New Revision: 1710022 URL: http://svn.apache.org/viewvc?rev=1710022=rev Log: Fix an NPE if available() is called before the input buffer is created. Modified: tomcat/trunk/java/org/apache/coyote/http2/Stream.java Modified: tomcat/trunk/java/org/apache/coyote/http2/Stream.java URL: http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/coyote/http2/Stream.java?rev=1710022=1710021=1710022=diff == --- tomcat/trunk/java/org/apache/coyote/http2/Stream.java (original) +++ tomcat/trunk/java/org/apache/coyote/http2/Stream.java Thu Oct 22 14:09:49 2015 @@ -616,6 +616,9 @@ public class Stream extends AbstractStre synchronized int available() { +if (inBuffer == null) { +return 0; +} return inBuffer.position(); } - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
Re: [VOTE] Release Apache Tomcat Native 1.2.0
2015-10-22 12:47 GMT+02:00 Mark Thomas: > Version 1.2.0 includes the following changes: > - Windows binaries built with APR 1.5.1 and OpenSSL 1.0.2d > - ALPN support > (most importantly IMO) - Add API methods to access OpenSSL BIO > > The proposed release artefacts can be found at [1], > and the build was done using tag [2]. > > The Apache Tomcat Native 1.2.0 is > [X] Stable, go ahead and release > [ ] Broken because of ... > > > [1] > > https://dist.apache.org/repos/dist/dev/tomcat/tomcat-connectors/native/1.2.0/ > [2] > https://svn.apache.org/repos/asf/tomcat/native/tags/TOMCAT_NATIVE_1_2_0 > > So I guess I've been testing the OpenSSL engine for a while, and I didn't run into issues. ALPN works as well [APR and NIOx] with HTTP/2. So IMO this is quite ambitious, but maybe "stable" can be tried since most of the "new" code is actually only a merge from code released elsewhere. Rémy
Re: Plan for 9.0.0.RC1
On 19/10/2015 13:38, Rémy Maucherat wrote: > 2015-10-19 14:24 GMT+02:00 Mark Thomas: >> Anything reproducible? > > Chrome mostly, Firefox is a bit nicer for me. I use JF's ApacheCon example > as well so that issues are easier to see: > https://github.com/jfclere/h2_demos/tree/master/httpd > Although APR works perfectly, NIO has some glitches and NIO2 doesn't work. > After debugging everything, I think the encryption layer is fine, the IO > looks fine as well, and the HTTP2 code looks ok as well. First of all, I have to say that the sslImplementationName option on the Connector is fantastic. To be able to switch from APR to NIO+OpenSSL that easily is great. JF's HTTP/2 example web page is pretty good too. I've got things up and running on Windows (a good opportunity to test the tcnative binaries) and I see what looks to be the same problem with Chrome + NIO2 in that no images are displayed. Even a simple HTTP/2 page fails. I'm hoping that the recent handful of HTTP/2 fixes will have made the root cause easier to track down. I guess I'll find out soon enough. Mark - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
[Bug 58523] New: servlet filter not working over virtual directories in tomcat
https://bz.apache.org/bugzilla/show_bug.cgi?id=58523 Bug ID: 58523 Summary: servlet filter not working over virtual directories in tomcat Product: Tomcat 8 Version: 8.0.15 Hardware: All OS: All Status: NEW Severity: major Priority: P2 Component: Catalina Assignee: dev@tomcat.apache.org Reporter: prady...@gmail.com Hi, I had configured virtual directories in glassfish3.x over which I could write filters. For an example I could access files at c:/web from http://localhost/TestApp/web over which I could also place a filter at my web app's web/xml file with dir_filter /web/* Unfortunately Tomcat 8.0 is not allowing me to write a filter above that. It simply ignores the filters and shows the content in the web directory. The problem is anybody can access all of the files in the "web" folder. Any how can we place filter over the virtual directories. FYI - i have made the web app named "TestApp" and the virtual config is located at "$tomcat_dir/conf/Catalina/localhost" directory with the file name "TestApp#web.xml" file and having the content The question is also at stackoverflow - http://stackoverflow.com/questions/33290483/servlet-filter-not-working-over-virtual-directories-in-tomcat Regards Praddy, India -- You are receiving this mail because: You are the assignee for the bug. - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
[Bug 56777] Allow configuration resources to be loaded from places other than straight off the filesystem
https://bz.apache.org/bugzilla/show_bug.cgi?id=56777 --- Comment #13 from Huxing Zhang--- Okay, just give me some time to look into this issue. -- You are receiving this mail because: You are the assignee for the bug. - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
Re: [VOTE] Release Apache Tomcat Native 1.2.0
On 22/10/2015 11:47, Mark Thomas wrote: > Version 1.2.0 includes the following changes: > - Windows binaries built with APR 1.5.1 and OpenSSL 1.0.2d > - ALPN support > > The proposed release artefacts can be found at [1], > and the build was done using tag [2]. > > The Apache Tomcat Native 1.2.0 is > [X] Stable, go ahead and release > [ ] Broken because of ... I'm happily running HTTP/2 on Windows with the x64 binaries. I've found a couple of bugs but they have all been in the 9.0.x Java code. Mark > [1] > https://dist.apache.org/repos/dist/dev/tomcat/tomcat-connectors/native/1.2.0/ > [2] > https://svn.apache.org/repos/asf/tomcat/native/tags/TOMCAT_NATIVE_1_2_0 > > - > To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org > For additional commands, e-mail: dev-h...@tomcat.apache.org > - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
Re: Plan for 9.0.0.RC1
2015-10-22 16:56 GMT+02:00 Mark Thomas: > On 19/10/2015 13:38, Rémy Maucherat wrote: > > 2015-10-19 14:24 GMT+02:00 Mark Thomas : > > >> Anything reproducible? > > > > Chrome mostly, Firefox is a bit nicer for me. I use JF's ApacheCon > example > > as well so that issues are easier to see: > > https://github.com/jfclere/h2_demos/tree/master/httpd > > Although APR works perfectly, NIO has some glitches and NIO2 doesn't > work. > > After debugging everything, I think the encryption layer is fine, the IO > > looks fine as well, and the HTTP2 code looks ok as well. > > First of all, I have to say that the sslImplementationName option on the > Connector is fantastic. To be able to switch from APR to NIO+OpenSSL > that easily is great. > > JF's HTTP/2 example web page is pretty good too. > Cool ! Yes, it's a good stress test which makes it easy to spot an issue. > > I've got things up and running on Windows (a good opportunity to test > the tcnative binaries) and I see what looks to be the same problem with > Chrome + NIO2 in that no images are displayed. Even a simple HTTP/2 page > fails. > That's what I get. Nice test since I had never tried the OpenSSL engine on Windows [and I don't think JF did either]. > > I'm hoping that the recent handful of HTTP/2 fixes will have made the > root cause easier to track down. I guess I'll find out soon enough. > > Ok, I hope you'll find something interesting. Rémy
Re: Plan for 9.0.0.RC1
On 10/22/2015 05:19 PM, Rémy Maucherat wrote: > 2015-10-22 16:56 GMT+02:00 Mark Thomas: > >> On 19/10/2015 13:38, Rémy Maucherat wrote: >>> 2015-10-19 14:24 GMT+02:00 Mark Thomas : >> Anything reproducible? >>> >>> Chrome mostly, Firefox is a bit nicer for me. I use JF's ApacheCon >> example >>> as well so that issues are easier to see: >>> https://github.com/jfclere/h2_demos/tree/master/httpd >>> Although APR works perfectly, NIO has some glitches and NIO2 doesn't >> work. >>> After debugging everything, I think the encryption layer is fine, the IO >>> looks fine as well, and the HTTP2 code looks ok as well. >> >> First of all, I have to say that the sslImplementationName option on the >> Connector is fantastic. To be able to switch from APR to NIO+OpenSSL >> that easily is great. >> >> JF's HTTP/2 example web page is pretty good too. >> > > Cool ! Yes, it's a good stress test which makes it easy to spot an issue. > >> >> I've got things up and running on Windows (a good opportunity to test >> the tcnative binaries) and I see what looks to be the same problem with >> Chrome + NIO2 in that no images are displayed. Even a simple HTTP/2 page >> fails. >> > > That's what I get. Nice test since I had never tried the OpenSSL engine on > Windows [and I don't think JF did either]. I have issue building 1.0.2c on my windows box for the moment... Cheers Jean-Frederic - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
svn commit: r1710030 - in /tomcat/trunk/java/org/apache/catalina/authenticator: ./ jaspic/provider/modules/
Author: remm Date: Thu Oct 22 15:11:06 2015 New Revision: 1710030 URL: http://svn.apache.org/viewvc?rev=1710030=rev Log: Remove some duplicate code (helper classes are public for now), add configuration for digest, cleanups. Modified: tomcat/trunk/java/org/apache/catalina/authenticator/DigestAuthenticator.java tomcat/trunk/java/org/apache/catalina/authenticator/SpnegoAuthenticator.java tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/BasicAuthModule.java tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/DigestAuthModule.java tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/FormAuthModule.java tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/SpnegoAuthModule.java tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/TomcatAuthModule.java Modified: tomcat/trunk/java/org/apache/catalina/authenticator/DigestAuthenticator.java URL: http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/catalina/authenticator/DigestAuthenticator.java?rev=1710030=1710029=1710030=diff == --- tomcat/trunk/java/org/apache/catalina/authenticator/DigestAuthenticator.java (original) +++ tomcat/trunk/java/org/apache/catalina/authenticator/DigestAuthenticator.java Thu Oct 22 15:11:06 2015 @@ -402,7 +402,7 @@ public class DigestAuthenticator extends }; } -private static class DigestInfo { +public static class DigestInfo { private final String opaque; private final long nonceValidity; @@ -608,7 +608,7 @@ public class DigestAuthenticator extends } -private static class NonceInfo { +public static class NonceInfo { private final long timestamp; private final boolean seen[]; private final int offset; Modified: tomcat/trunk/java/org/apache/catalina/authenticator/SpnegoAuthenticator.java URL: http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/catalina/authenticator/SpnegoAuthenticator.java?rev=1710030=1710029=1710030=diff == --- tomcat/trunk/java/org/apache/catalina/authenticator/SpnegoAuthenticator.java (original) +++ tomcat/trunk/java/org/apache/catalina/authenticator/SpnegoAuthenticator.java Thu Oct 22 15:11:06 2015 @@ -307,13 +307,13 @@ public class SpnegoAuthenticator extends /** * This class gets a gss credential via a privileged action. */ -private static class AcceptAction implements PrivilegedExceptionAction{ +public static class AcceptAction implements PrivilegedExceptionAction { GSSContext gssContext; byte[] decoded; -AcceptAction(GSSContext context, byte[] decodedToken) { +public AcceptAction(GSSContext context, byte[] decodedToken) { this.gssContext = context; this.decoded = decodedToken; } @@ -326,7 +326,7 @@ public class SpnegoAuthenticator extends } -private static class AuthenticateAction implements PrivilegedAction { +public static class AuthenticateAction implements PrivilegedAction { private final Realm realm; private final GSSContext gssContext; @@ -359,7 +359,7 @@ public class SpnegoAuthenticator extends * This hack works by re-ordering the list of mechTypes in the NegTokenInit * token. */ -private static class SpnegoTokenFixer { +public static class SpnegoTokenFixer { public static void fix(byte[] token) { SpnegoTokenFixer fixer = new SpnegoTokenFixer(token); Modified: tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/BasicAuthModule.java URL: http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/BasicAuthModule.java?rev=1710030=1710029=1710030=diff == --- tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/BasicAuthModule.java (original) +++ tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/BasicAuthModule.java Thu Oct 22 15:11:06 2015 @@ -18,7 +18,6 @@ package org.apache.catalina.authenticato import java.io.IOException; import java.text.MessageFormat; -import java.util.Iterator; import java.util.Map; import javax.security.auth.Subject; @@ -35,7 +34,6 @@ import javax.servlet.http.HttpServletRes import org.apache.catalina.Context; import org.apache.catalina.authenticator.BasicAuthenticator.BasicCredentials; import org.apache.catalina.connector.Request; -import org.apache.catalina.realm.GenericPrincipal; import org.apache.tomcat.util.buf.ByteChunk; import org.apache.tomcat.util.buf.MessageBytes; @@ -53,10 +51,9 @@ public class BasicAuthModule extends Tom } -
[Bug 58520] New: Future returned by javax.websocket.Session.getAsyncRemote().sendText(...) always returns true
https://bz.apache.org/bugzilla/show_bug.cgi?id=58520 Bug ID: 58520 Summary: Future returned by javax.websocket.Session.getAsyncRemote().sendText(...) always returns true Product: Tomcat 8 Version: 8.0.27 Hardware: PC Status: NEW Severity: normal Priority: P2 Component: WebSocket Assignee: dev@tomcat.apache.org Reporter: jeperjaperjie...@gmail.com In our websocket implementation, we are sending events through websockets every 250ms to the client. It seems that the Future returned by javax.websocket.Session.getAsyncRemote().sendText(...) always returns true. This makes it impossible to cancel pending outgoing data. Scenario: 1. Server is up and running 2. Client connects 3. Server starts sending events every 250ms 4. All goes well 5. Client disconnects from the network (for example by unplugging its UTP) 6. Server keeps sending events; the server has no idea that the client is disconnected (which is OK, on itself) 7. Twenty seconds later, clients reconnects to network 8. Clients receives all events from the last 20 seconds (around 80 events) Ideally, during step 6, the server notices that there is a previous pending event, which can be canceled in favor of the current/new event. With that approach, the client will not receive all past events at step 8. -- You are receiving this mail because: You are the assignee for the bug. - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
svn commit: r1710058 - in /tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules: BasicAuthModule.java DigestAuthModule.java FormAuthModule.java LocalStrings.properties SSLAuthMo
Author: remm Date: Thu Oct 22 16:26:51 2015 New Revision: 1710058 URL: http://svn.apache.org/viewvc?rev=1710058=rev Log: Pull up some methods and quick port of SSL authenticator. Added: tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/LocalStrings.properties tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/SSLAuthModule.java Modified: tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/BasicAuthModule.java tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/DigestAuthModule.java tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/FormAuthModule.java tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/SpnegoAuthModule.java tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/TomcatAuthModule.java Modified: tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/BasicAuthModule.java URL: http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/BasicAuthModule.java?rev=1710058=1710057=1710058=diff == --- tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/BasicAuthModule.java (original) +++ tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/BasicAuthModule.java Thu Oct 22 16:26:51 2015 @@ -28,7 +28,6 @@ import javax.security.auth.message.AuthS import javax.security.auth.message.MessageInfo; import javax.security.auth.message.MessagePolicy; import javax.security.auth.message.callback.PasswordValidationCallback; -import javax.servlet.http.HttpServletRequest; import javax.servlet.http.HttpServletResponse; import org.apache.catalina.Context; @@ -42,10 +41,6 @@ import org.apache.tomcat.util.buf.Messag */ public class BasicAuthModule extends TomcatAuthModule { -private Class[] supportedMessageTypes = new Class[] { HttpServletRequest.class, -HttpServletResponse.class }; - - public BasicAuthModule(Context context) { super(context); } @@ -111,22 +106,4 @@ public class BasicAuthModule extends Tom } -@Override -public AuthStatus secureResponse(MessageInfo messageInfo, Subject serviceSubject) -throws AuthException { -return null; -} - - -@Override -public void cleanSubject(MessageInfo messageInfo, Subject subject) throws AuthException { - -} - - -@Override -public Class[] getSupportedMessageTypes() { -return supportedMessageTypes; -} - } Modified: tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/DigestAuthModule.java URL: http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/DigestAuthModule.java?rev=1710058=1710057=1710058=diff == --- tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/DigestAuthModule.java (original) +++ tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/DigestAuthModule.java Thu Oct 22 16:26:51 2015 @@ -51,9 +51,6 @@ public class DigestAuthModule extends To */ protected static final String QOP = "auth"; -private Class[] supportedMessageTypes = new Class[] { HttpServletRequest.class, -HttpServletResponse.class }; - private CallbackHandler handler; private Realm realm; @@ -292,25 +289,6 @@ public class DigestAuthModule extends To } -@Override -public AuthStatus secureResponse(MessageInfo messageInfo, Subject serviceSubject) -throws AuthException { -return null; -} - - -@Override -public void cleanSubject(MessageInfo messageInfo, Subject subject) throws AuthException { - -} - - -@Override -public Class[] getSupportedMessageTypes() { -return supportedMessageTypes; -} - - /** * Removes the quotes on a string. RFC2617 states quotes are optional for * all parameters except realm. Modified: tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/FormAuthModule.java URL: http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/FormAuthModule.java?rev=1710058=1710057=1710058=diff == --- tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/FormAuthModule.java (original) +++ tomcat/trunk/java/org/apache/catalina/authenticator/jaspic/provider/modules/FormAuthModule.java Thu Oct 22 16:26:51 2015 @@ -35,7 +35,6 @@ import javax.security.auth.message.Messa import javax.security.auth.message.callback.PasswordValidationCallback; import javax.servlet.RequestDispatcher; import