diff --git "a/validation.csv" "b/validation.csv" deleted file mode 100644--- "a/validation.csv" +++ /dev/null @@ -1,11455 +0,0 @@ -label,code --1," private static void initKeyPair(SecureRandom prng) throws NoSuchAlgorithmException { - String sigAlg = signatureAlgorithm.toLowerCase(); - if ( sigAlg.endsWith(""withdsa"") ) { - // - // Admittedly, this is a kludge. However for Sun JCE, even though - // ""SHA1withDSA"" is a valid signature algorithm name, if one calls - // KeyPairGenerator kpg = KeyPairGenerator.getInstance(""SHA1withDSA""); - // that will throw a NoSuchAlgorithmException with an exception - // message of ""SHA1withDSA KeyPairGenerator not available"". Since - // SHA1withDSA and DSA keys should be identical, we use ""DSA"" - // in the case that SHA1withDSA or SHAwithDSA was specified. This is - // all just to make these 2 work as expected. Sigh. (Note: - // this was tested with JDK 1.6.0_21, but likely fails with earlier - // versions of the JDK as well.) - // - sigAlg = ""DSA""; - } else if ( sigAlg.endsWith(""withrsa"") ) { - // Ditto for RSA. - sigAlg = ""RSA""; - } - KeyPairGenerator keyGen = KeyPairGenerator.getInstance(sigAlg); - keyGen.initialize(signatureKeyLength, prng); - KeyPair pair = keyGen.generateKeyPair(); - privateKey = pair.getPrivate(); - publicKey = pair.getPublic(); - } -" --1," public ZipArchiveEntry getNextZipEntry() throws IOException { - uncompressedCount = 0; - - boolean firstEntry = true; - if (closed || hitCentralDirectory) { - return null; - } - if (current != null) { - closeEntry(); - firstEntry = false; - } - - long currentHeaderOffset = getBytesRead(); - try { - if (firstEntry) { - // split archives have a special signature before the - // first local file header - look for it and fail with - // the appropriate error message if this is a split - // archive. - readFirstLocalFileHeader(lfhBuf); - } else { - readFully(lfhBuf); - } - } catch (final EOFException e) { - return null; - } - - final ZipLong sig = new ZipLong(lfhBuf); - if (!sig.equals(ZipLong.LFH_SIG)) { - if (sig.equals(ZipLong.CFH_SIG) || sig.equals(ZipLong.AED_SIG) || isApkSigningBlock(lfhBuf)) { - hitCentralDirectory = true; - skipRemainderOfArchive(); - return null; - } - throw new ZipException(String.format(""Unexpected record signature: 0X%X"", sig.getValue())); - } - - int off = WORD; - current = new CurrentEntry(); - - final int versionMadeBy = ZipShort.getValue(lfhBuf, off); - off += SHORT; - current.entry.setPlatform((versionMadeBy >> ZipFile.BYTE_SHIFT) & ZipFile.NIBLET_MASK); - - final GeneralPurposeBit gpFlag = GeneralPurposeBit.parse(lfhBuf, off); - final boolean hasUTF8Flag = gpFlag.usesUTF8ForNames(); - final ZipEncoding entryEncoding = hasUTF8Flag ? ZipEncodingHelper.UTF8_ZIP_ENCODING : zipEncoding; - current.hasDataDescriptor = gpFlag.usesDataDescriptor(); - current.entry.setGeneralPurposeBit(gpFlag); - - off += SHORT; - - current.entry.setMethod(ZipShort.getValue(lfhBuf, off)); - off += SHORT; - - final long time = ZipUtil.dosToJavaTime(ZipLong.getValue(lfhBuf, off)); - current.entry.setTime(time); - off += WORD; - - ZipLong size = null, cSize = null; - if (!current.hasDataDescriptor) { - current.entry.setCrc(ZipLong.getValue(lfhBuf, off)); - off += WORD; - - cSize = new ZipLong(lfhBuf, off); - off += WORD; - - size = new ZipLong(lfhBuf, off); - off += WORD; - } else { - off += 3 * WORD; - } - - final int fileNameLen = ZipShort.getValue(lfhBuf, off); - - off += SHORT; - - final int extraLen = ZipShort.getValue(lfhBuf, off); - off += SHORT; // NOSONAR - assignment as documentation - - final byte[] fileName = new byte[fileNameLen]; - readFully(fileName); - current.entry.setName(entryEncoding.decode(fileName), fileName); - if (hasUTF8Flag) { - current.entry.setNameSource(ZipArchiveEntry.NameSource.NAME_WITH_EFS_FLAG); - } - - final byte[] extraData = new byte[extraLen]; - readFully(extraData); - current.entry.setExtra(extraData); - - if (!hasUTF8Flag && useUnicodeExtraFields) { - ZipUtil.setNameAndCommentFromExtraFields(current.entry, fileName, null); - } - - processZip64Extra(size, cSize); - - current.entry.setLocalHeaderOffset(currentHeaderOffset); - current.entry.setDataOffset(getBytesRead()); - current.entry.setStreamContiguous(true); - - ZipMethod m = ZipMethod.getMethodByCode(current.entry.getMethod()); - if (current.entry.getCompressedSize() != ArchiveEntry.SIZE_UNKNOWN) { - if (ZipUtil.canHandleEntryData(current.entry) && m != ZipMethod.STORED && m != ZipMethod.DEFLATED) { - InputStream bis = new BoundedInputStream(in, current.entry.getCompressedSize()); - switch (m) { - case UNSHRINKING: - current.in = new UnshrinkingInputStream(bis); - break; - case IMPLODING: - current.in = new ExplodingInputStream( - current.entry.getGeneralPurposeBit().getSlidingDictionarySize(), - current.entry.getGeneralPurposeBit().getNumberOfShannonFanoTrees(), - bis); - break; - case BZIP2: - current.in = new BZip2CompressorInputStream(bis); - break; - case ENHANCED_DEFLATED: - current.in = new Deflate64CompressorInputStream(bis); - break; - default: - // we should never get here as all supported methods have been covered - // will cause an error when read is invoked, don't throw an exception here so people can - // skip unsupported entries - break; - } - } - } else if (m == ZipMethod.ENHANCED_DEFLATED) { - current.in = new Deflate64CompressorInputStream(in); - } - - entriesRead++; - return current.entry; - } - - /** - * Fills the given array with the first local file header and - * deals with splitting/spanning markers that may prefix the first - * LFH. - */ -" --1," private static void assertCorrectConfig(User user, String unixPath) { - assertThat(user.getConfigFile().getFile().getPath(), endsWith(unixPath.replace('/', File.separatorChar))); - } - -" --1," public void testRepositoryCreation() throws Exception { - Client client = client(); - - File location = randomRepoPath(); - - logger.info(""--> creating repository""); - PutRepositoryResponse putRepositoryResponse = client.admin().cluster().preparePutRepository(""test-repo-1"") - .setType(""fs"").setSettings(ImmutableSettings.settingsBuilder() - .put(""location"", location) - ).get(); - assertThat(putRepositoryResponse.isAcknowledged(), equalTo(true)); - - logger.info(""--> verify the repository""); - int numberOfFiles = location.listFiles().length; - VerifyRepositoryResponse verifyRepositoryResponse = client.admin().cluster().prepareVerifyRepository(""test-repo-1"").get(); - assertThat(verifyRepositoryResponse.getNodes().length, equalTo(cluster().numDataAndMasterNodes())); - - logger.info(""--> verify that we didn't leave any files as a result of verification""); - assertThat(location.listFiles().length, equalTo(numberOfFiles)); - - logger.info(""--> check that repository is really there""); - ClusterStateResponse clusterStateResponse = client.admin().cluster().prepareState().clear().setMetaData(true).get(); - MetaData metaData = clusterStateResponse.getState().getMetaData(); - RepositoriesMetaData repositoriesMetaData = metaData.custom(RepositoriesMetaData.TYPE); - assertThat(repositoriesMetaData, notNullValue()); - assertThat(repositoriesMetaData.repository(""test-repo-1""), notNullValue()); - assertThat(repositoriesMetaData.repository(""test-repo-1"").type(), equalTo(""fs"")); - - logger.info(""--> creating another repository""); - putRepositoryResponse = client.admin().cluster().preparePutRepository(""test-repo-2"") - .setType(""fs"").setSettings(ImmutableSettings.settingsBuilder() - .put(""location"", randomRepoPath()) - ).get(); - assertThat(putRepositoryResponse.isAcknowledged(), equalTo(true)); - - logger.info(""--> check that both repositories are in cluster state""); - clusterStateResponse = client.admin().cluster().prepareState().clear().setMetaData(true).get(); - metaData = clusterStateResponse.getState().getMetaData(); - repositoriesMetaData = metaData.custom(RepositoriesMetaData.TYPE); - assertThat(repositoriesMetaData, notNullValue()); - assertThat(repositoriesMetaData.repositories().size(), equalTo(2)); - assertThat(repositoriesMetaData.repository(""test-repo-1""), notNullValue()); - assertThat(repositoriesMetaData.repository(""test-repo-1"").type(), equalTo(""fs"")); - assertThat(repositoriesMetaData.repository(""test-repo-2""), notNullValue()); - assertThat(repositoriesMetaData.repository(""test-repo-2"").type(), equalTo(""fs"")); - - logger.info(""--> check that both repositories can be retrieved by getRepositories query""); - GetRepositoriesResponse repositoriesResponse = client.admin().cluster().prepareGetRepositories().get(); - assertThat(repositoriesResponse.repositories().size(), equalTo(2)); - assertThat(findRepository(repositoriesResponse.repositories(), ""test-repo-1""), notNullValue()); - assertThat(findRepository(repositoriesResponse.repositories(), ""test-repo-2""), notNullValue()); - - logger.info(""--> delete repository test-repo-1""); - client.admin().cluster().prepareDeleteRepository(""test-repo-1"").get(); - repositoriesResponse = client.admin().cluster().prepareGetRepositories().get(); - assertThat(repositoriesResponse.repositories().size(), equalTo(1)); - assertThat(findRepository(repositoriesResponse.repositories(), ""test-repo-2""), notNullValue()); - - logger.info(""--> delete repository test-repo-2""); - client.admin().cluster().prepareDeleteRepository(""test-repo-2"").get(); - repositoriesResponse = client.admin().cluster().prepareGetRepositories().get(); - assertThat(repositoriesResponse.repositories().size(), equalTo(0)); - } - -" --1," protected Blob getBlob(ResultSet resultSet, int columnIndex, Metadata m) throws SQLException { - byte[] bytes = resultSet.getBytes(columnIndex); - if (!resultSet.wasNull()) { - return new SerialBlob(bytes); - } - return null; - } -" --1," private T run(PrivilegedAction action) { - return System.getSecurityManager() != null ? AccessController.doPrivileged( action ) : action.run(); - } -" --1," protected boolean statusDropsConnection(int status) { - return status == 400 /* SC_BAD_REQUEST */ || - status == 408 /* SC_REQUEST_TIMEOUT */ || - status == 411 /* SC_LENGTH_REQUIRED */ || - status == 413 /* SC_REQUEST_ENTITY_TOO_LARGE */ || - status == 414 /* SC_REQUEST_URI_TOO_LARGE */ || - status == 500 /* SC_INTERNAL_SERVER_ERROR */ || - status == 503 /* SC_SERVICE_UNAVAILABLE */ || - status == 501 /* SC_NOT_IMPLEMENTED */; - } - -" --1," private ControllerInfo getControllerInfo(Annotations annotation, String s) { - String[] data = s.split("":""); - if (data.length != 3) { - print(""Wrong format of the controller %s, should be in the format ::"", s); - return null; - } - String type = data[0]; - IpAddress ip = IpAddress.valueOf(data[1]); - int port = Integer.parseInt(data[2]); - if (annotation != null) { - return new ControllerInfo(ip, port, type, annotation); - } - return new ControllerInfo(ip, port, type); - } -" --1," public Authentication authenticate(Authentication authentication) throws AuthenticationException { - Assert.isInstanceOf(UsernamePasswordAuthenticationToken.class, authentication, - messages.getMessage(""LdapAuthenticationProvider.onlySupports"", - ""Only UsernamePasswordAuthenticationToken is supported"")); - - final UsernamePasswordAuthenticationToken userToken = (UsernamePasswordAuthenticationToken)authentication; - - String username = userToken.getName(); - String password = (String) authentication.getCredentials(); - - if (logger.isDebugEnabled()) { - logger.debug(""Processing authentication request for user: "" + username); - } - - if (!StringUtils.hasLength(username)) { - throw new BadCredentialsException(messages.getMessage(""LdapAuthenticationProvider.emptyUsername"", - ""Empty Username"")); - } - - if (!StringUtils.hasLength(password)) { - throw new BadCredentialsException(messages.getMessage(""AbstractLdapAuthenticationProvider.emptyPassword"", - ""Empty Password"")); - } - - Assert.notNull(password, ""Null password was supplied in authentication token""); - - DirContextOperations userData = doAuthentication(userToken); - - UserDetails user = userDetailsContextMapper.mapUserFromContext(userData, authentication.getName(), - loadUserAuthorities(userData, authentication.getName(), (String)authentication.getCredentials())); - - return createSuccessfulAuthentication(userToken, user); - } - -" --1," protected IgnoreCsrfProtectionRegistry chainRequestMatchers( - List requestMatchers) { - CsrfConfigurer.this.ignoredCsrfProtectionMatchers.addAll(requestMatchers); - return this; - } - } -}" --1," private String[] getParts(String encodedJWT) { - String[] parts = encodedJWT.split(""\\.""); - // Secured JWT XXXXX.YYYYY.ZZZZZ, Unsecured JWT XXXXX.YYYYY. - if (parts.length == 3 || (parts.length == 2 && encodedJWT.endsWith("".""))) { - return parts; - } - - throw new InvalidJWTException(""The encoded JWT is not properly formatted. Expected a three part dot separated string.""); - } -" --1," public String getAlgorithm() { - - return (this.algorithm); - - } - - - /** - * Set the message digest algorithm for this Manager. - * - * @param algorithm The new message digest algorithm - */ -" --1," public ChannelRequestMatcherRegistry getRegistry() { - return REGISTRY; - } - - @Override -" --1," public String getDefaultWebXml() { - if( defaultWebXml == null ) { - defaultWebXml=Constants.DefaultWebXml; - } - - return (this.defaultWebXml); - - } - - - /** - * Set the location of the default deployment descriptor - * - * @param path Absolute/relative path to the default web.xml - */ -" --1," public Collection getRequiredPermissions(String regionName) { - return Collections.singletonList(ResourcePermissions.DATA_MANAGE); - } - -" --1," private void enableAllocation(String index) { - client().admin().indices().prepareUpdateSettings(index).setSettings(ImmutableSettings.builder().put( - ""index.routing.allocation.enable"", ""all"" - )).get(); - } -" --1," public void parse(InputStream stream, ContentHandler ignore, - Metadata metadata, ParseContext context) throws IOException, - SAXException, TikaException { - //Test to see if we should avoid parsing - if (parserState.recursiveParserWrapperHandler.hasHitMaximumEmbeddedResources()) { - return; - } - // Work out what this thing is - String objectName = getResourceName(metadata, parserState); - String objectLocation = this.location + objectName; - - metadata.add(AbstractRecursiveParserWrapperHandler.EMBEDDED_RESOURCE_PATH, objectLocation); - - - //get a fresh handler - ContentHandler localHandler = parserState.recursiveParserWrapperHandler.getNewContentHandler(); - parserState.recursiveParserWrapperHandler.startEmbeddedDocument(localHandler, metadata); - - Parser preContextParser = context.get(Parser.class); - context.set(Parser.class, new EmbeddedParserDecorator(getWrappedParser(), objectLocation, parserState)); - long started = System.currentTimeMillis(); - try { - super.parse(stream, localHandler, metadata, context); - } catch (SAXException e) { - boolean wlr = isWriteLimitReached(e); - if (wlr == true) { - metadata.add(WRITE_LIMIT_REACHED, ""true""); - } else { - if (catchEmbeddedExceptions) { - ParserUtils.recordParserFailure(this, e, metadata); - } else { - throw e; - } - } - } catch(CorruptedFileException e) { - throw e; - } catch (TikaException e) { - if (catchEmbeddedExceptions) { - ParserUtils.recordParserFailure(this, e, metadata); - } else { - throw e; - } - } finally { - context.set(Parser.class, preContextParser); - long elapsedMillis = System.currentTimeMillis() - started; - metadata.set(RecursiveParserWrapperHandler.PARSE_TIME_MILLIS, Long.toString(elapsedMillis)); - parserState.recursiveParserWrapperHandler.endEmbeddedDocument(localHandler, metadata); - } - } - } - - /** - * This tracks the state of the parse of a single document. - * In future versions, this will allow the RecursiveParserWrapper to be thread safe. - */ - private class ParserState { - private int unknownCount = 0; - private final AbstractRecursiveParserWrapperHandler recursiveParserWrapperHandler; - private ParserState(AbstractRecursiveParserWrapperHandler handler) { - this.recursiveParserWrapperHandler = handler; - } - - - } -} -" --1," public static void beforeTests() throws Exception { - initCore(""solrconfig.xml"",""schema.xml""); - handler = new UpdateRequestHandler(); - } - - @Test -" --1," public void setUp() throws Exception { - interceptor = new I18nInterceptor(); - interceptor.init(); - params = new HashMap(); - session = new HashMap(); - - Map ctx = new HashMap(); - ctx.put(ActionContext.PARAMETERS, params); - ctx.put(ActionContext.SESSION, session); - ac = new ActionContext(ctx); - - Action action = new Action() { - public String execute() throws Exception { - return SUCCESS; - } - }; - mai = new MockActionInvocation(); - ((MockActionInvocation) mai).setAction(action); - ((MockActionInvocation) mai).setInvocationContext(ac); - } - - @After -" --1," private MockHttpServletRequestBuilder createChangePasswordRequest(ScimUser user, String code, boolean useCSRF, String password, String passwordConfirmation) throws Exception { - MockHttpServletRequestBuilder post = post(""/reset_password.do""); - if (useCSRF) { - post.with(csrf()); - } - post.param(""code"", code) - .param(""email"", user.getPrimaryEmail()) - .param(""password"", password) - .param(""password_confirmation"", passwordConfirmation); - return post; - } -" --1," protected Log getLog() { - return log; - } - - // ----------------------------------------------------------- Constructors - - -" --1," public int getCount() { - return iCount; - } - -" --1," public BeanDefinitionHolder decorate(Node node, BeanDefinitionHolder holder, - ParserContext parserContext) { - BeanDefinition filterChainProxy = holder.getBeanDefinition(); - - ManagedList securityFilterChains = new ManagedList(); - Element elt = (Element) node; - - MatcherType matcherType = MatcherType.fromElement(elt); - - List filterChainElts = DomUtils.getChildElementsByTagName(elt, - Elements.FILTER_CHAIN); - - for (Element chain : filterChainElts) { - String path = chain - .getAttribute(HttpSecurityBeanDefinitionParser.ATT_PATH_PATTERN); - String filters = chain - .getAttribute(HttpSecurityBeanDefinitionParser.ATT_FILTERS); - - if (!StringUtils.hasText(path)) { - parserContext.getReaderContext().error( - ""The attribute '"" - + HttpSecurityBeanDefinitionParser.ATT_PATH_PATTERN - + ""' must not be empty"", elt); - } - - if (!StringUtils.hasText(filters)) { - parserContext.getReaderContext().error( - ""The attribute '"" + HttpSecurityBeanDefinitionParser.ATT_FILTERS - + ""'must not be empty"", elt); - } - - BeanDefinition matcher = matcherType.createMatcher(parserContext, path, null); - - if (filters.equals(HttpSecurityBeanDefinitionParser.OPT_FILTERS_NONE)) { - securityFilterChains.add(createSecurityFilterChain(matcher, - new ManagedList(0))); - } - else { - String[] filterBeanNames = StringUtils - .tokenizeToStringArray(filters, "",""); - ManagedList filterChain = new ManagedList(filterBeanNames.length); - - for (String name : filterBeanNames) { - filterChain.add(new RuntimeBeanReference(name)); - } - - securityFilterChains.add(createSecurityFilterChain(matcher, filterChain)); - } - } - - filterChainProxy.getConstructorArgumentValues().addGenericArgumentValue( - securityFilterChains); - - return holder; - } - -" --1," public XObject execute(XPathContext xctxt) throws javax.xml.transform.TransformerException - { - - String fullName = m_arg0.execute(xctxt).str(); - int indexOfNSSep = fullName.indexOf(':'); - String result = null; - String propName = """"; - - // List of properties where the name of the - // property argument is to be looked for. - Properties xsltInfo = new Properties(); - - loadPropertyFile(XSLT_PROPERTIES, xsltInfo); - - if (indexOfNSSep > 0) - { - String prefix = (indexOfNSSep >= 0) - ? fullName.substring(0, indexOfNSSep) : """"; - String namespace; - - namespace = xctxt.getNamespaceContext().getNamespaceForPrefix(prefix); - propName = (indexOfNSSep < 0) - ? fullName : fullName.substring(indexOfNSSep + 1); - - if (namespace.startsWith(""http://www.w3.org/XSL/Transform"") - || namespace.equals(""http://www.w3.org/1999/XSL/Transform"")) - { - result = xsltInfo.getProperty(propName); - - if (null == result) - { - warn(xctxt, XPATHErrorResources.WG_PROPERTY_NOT_SUPPORTED, - new Object[]{ fullName }); //""XSL Property not supported: ""+fullName); - - return XString.EMPTYSTRING; - } - } - else - { - warn(xctxt, XPATHErrorResources.WG_DONT_DO_ANYTHING_WITH_NS, - new Object[]{ namespace, - fullName }); //""Don't currently do anything with namespace ""+namespace+"" in property: ""+fullName); - - try - { - //if secure procession is enabled only handle required properties do not not map any valid system property - if(!xctxt.isSecureProcessing()) - { - result = System.getProperty(fullName); - } - else - { - warn(xctxt, XPATHErrorResources.WG_SECURITY_EXCEPTION, - new Object[]{ fullName }); //""SecurityException when trying to access XSL system property: ""+fullName); - result = xsltInfo.getProperty(propName); - } - if (null == result) - { - return XString.EMPTYSTRING; - } - } - catch (SecurityException se) - { - warn(xctxt, XPATHErrorResources.WG_SECURITY_EXCEPTION, - new Object[]{ fullName }); //""SecurityException when trying to access XSL system property: ""+fullName); - - return XString.EMPTYSTRING; - } - } - } - else - { - try - { - //if secure procession is enabled only handle required properties do not not map any valid system property - if(!xctxt.isSecureProcessing()) - { - result = System.getProperty(fullName); - } - else - { - warn(xctxt, XPATHErrorResources.WG_SECURITY_EXCEPTION, - new Object[]{ fullName }); //""SecurityException when trying to access XSL system property: ""+fullName); - result = xsltInfo.getProperty(propName); - } - if (null == result) - { - return XString.EMPTYSTRING; - } - } - catch (SecurityException se) - { - warn(xctxt, XPATHErrorResources.WG_SECURITY_EXCEPTION, - new Object[]{ fullName }); //""SecurityException when trying to access XSL system property: ""+fullName); - - return XString.EMPTYSTRING; - } - } - - if (propName.equals(""version"") && result.length() > 0) - { - try - { - // Needs to return the version number of the spec we conform to. - return new XString(""1.0""); - } - catch (Exception ex) - { - return new XString(result); - } - } - else - return new XString(result); - } - - /** - * Retrieve a propery bundle from a specified file - * - * @param file The string name of the property file. The name - * should already be fully qualified as path/filename - * @param target The target property bag the file will be placed into. - */ -" --1," public boolean equals(Object obj) { - if ( this == obj ) { - return true; - } - if ( !super.equals( obj ) ) { - return false; - } - if ( getClass() != obj.getClass() ) { - return false; - } - ConstrainedExecutable other = (ConstrainedExecutable) obj; - if ( executable == null ) { - if ( other.executable != null ) { - return false; - } - } - else if ( !executable.equals( other.executable ) ) { - return false; - } - return true; - } -" --1," public static HierarchicalConfiguration loadXml(InputStream xmlStream) { - try { - XMLConfiguration cfg = new XMLConfiguration(); - DocumentBuilderFactory dbfactory = DocumentBuilderFactory.newInstance(); - //Disabling DTDs in order to avoid XXE xml-based attacks. - disableFeature(dbfactory, DISALLOW_DTD_FEATURE); - disableFeature(dbfactory, DISALLOW_EXTERNAL_DTD); - dbfactory.setXIncludeAware(false); - dbfactory.setExpandEntityReferences(false); - cfg.setDocumentBuilder(dbfactory.newDocumentBuilder()); - cfg.load(xmlStream); - return cfg; - } catch (ConfigurationException | ParserConfigurationException e) { - throw new IllegalArgumentException(""Cannot load xml from Stream"", e); - } - } - -" --1," void noteBytesRead(int pBytes) { - /* Indicates, that the given number of bytes have been read from - * the input stream. - */ - bytesRead += pBytes; - notifyListener(); - } - - /** - * Called to indicate, that a new file item has been detected. - */ -" --1," private static DocumentBuilder getBuilder() throws ParserConfigurationException { - ClassLoader loader = Thread.currentThread().getContextClassLoader(); - if (loader == null) { - loader = DOMUtils.class.getClassLoader(); - } - if (loader == null) { - DocumentBuilderFactory dbf = createDocumentBuilderFactory(); - return dbf.newDocumentBuilder(); - } - DocumentBuilder builder = DOCUMENT_BUILDERS.get(loader); - if (builder == null) { - DocumentBuilderFactory dbf = createDocumentBuilderFactory(); - builder = dbf.newDocumentBuilder(); - DOCUMENT_BUILDERS.put(loader, builder); - } - return builder; - } - - /** - * This function is much like getAttribute, but returns null, not """", for a nonexistent attribute. - * - * @param e - * @param attributeName - */ -" --1," public StandardInterceptUrlRegistry getRegistry() { - return REGISTRY; - } - - /** - * Adds an {@link ObjectPostProcessor} for this class. - * - * @param objectPostProcessor - * @return the {@link UrlAuthorizationConfigurer} for further customizations - */ -" --1," public synchronized XPathRecordReader addField(String name, String xpath, boolean multiValued, int flags) { - addField0(xpath, name, multiValued, false, flags); - return this; - } - - /** - * Splits the XPATH into a List of xpath segments and calls build() to - * construct a tree of Nodes representing xpath segments. The resulting - * tree structure ends up describing all the Xpaths we are interested in. - * - * @param xpath The xpath expression for this field - * @param name The name for this field in the emitted record - * @param multiValued If 'true' then the emitted record will have values in - * a List<String> - * @param isRecord Flags that this XPATH is from a forEach statement - * @param flags The only supported flag is 'FLATTEN' - */ -" --1," public void setConstants(ContainerBuilder builder) { - for (Object keyobj : keySet()) { - String key = (String)keyobj; - builder.factory(String.class, key, - new LocatableConstantFactory(getProperty(key), getPropertyLocation(key))); - } - } - } -} -" --1," public CommandLauncher launch(String host, TaskListener listener) throws IOException, InterruptedException { - return new CommandLauncher(command,new EnvVars(""SLAVE"",host)); - } - - @Extension @Symbol(""command"") -" --1," private void parseCSSStyleSheet(String sheet) throws SVGParseException - { - CSSParser cssp = new CSSParser(MediaType.screen); - svgDocument.addCSSRules(cssp.parse(sheet)); - } - -" --1," public void test_unsecuredJWT_validation() throws Exception { - JWT jwt = new JWT().setSubject(""123456789""); - Signer signer = new UnsecuredSigner(); - Verifier hmacVerifier = HMACVerifier.newVerifier(""too many secrets""); - - String encodedUnsecuredJWT = JWTEncoder.getInstance().encode(jwt, signer); - - // Ensure that attempting to decode an un-secured JWT fails when we provide a verifier - expectException(MissingVerifierException.class, () -> JWT.getDecoder().decode(encodedUnsecuredJWT, hmacVerifier)); - - String encodedUnsecuredJWT_withKid = JWTEncoder.getInstance().encode(jwt, signer, (header) -> header.set(""kid"", ""abc"")); - String encodedUnsecuredJWT_withoutKid = JWTEncoder.getInstance().encode(jwt, signer); - - Map verifierMap = new HashMap<>(); - verifierMap.put(null, hmacVerifier); - verifierMap.put(""abc"", hmacVerifier); - - // Ensure that attempting to decode an un-secured JWT fails when we provide a verifier with or without using a kid - expectException(MissingVerifierException.class, () -> JWT.getDecoder().decode(encodedUnsecuredJWT_withKid, verifierMap)); - expectException(MissingVerifierException.class, () -> JWT.getDecoder().decode(encodedUnsecuredJWT_withoutKid, verifierMap)); - } - - @Test -" --1," public String getConnectionName() { - return connectionName; - } - - /** - * Set the username to use to connect to the database. - * - * @param connectionName Username - */ -" --1," protected Log getLog() { - return log; - } - - @Override -" --1," public BigInteger[] decode( - byte[] encoding) - throws IOException - { - BigInteger[] sig = new BigInteger[2]; - - byte[] first = new byte[encoding.length / 2]; - byte[] second = new byte[encoding.length / 2]; - - System.arraycopy(encoding, 0, first, 0, first.length); - System.arraycopy(encoding, first.length, second, 0, second.length); - - sig[0] = new BigInteger(1, first); - sig[1] = new BigInteger(1, second); - - return sig; - } - } -}" --1," public ScimGroup mapRow(ResultSet rs, int rowNum) throws SQLException { - int pos = 1; - String id = rs.getString(pos++); - String name = rs.getString(pos++); - String description = rs.getString(pos++); - Date created = rs.getTimestamp(pos++); - Date modified = rs.getTimestamp(pos++); - int version = rs.getInt(pos++); - String zoneId = rs.getString(pos++); - ScimGroup group = new ScimGroup(id, name, zoneId); - group.setDescription(description); - ScimMeta meta = new ScimMeta(created, modified, version); - group.setMeta(meta); - return group; - } - } -} -" --1," public void testSendStringMessage() throws Exception { - sendMessageAndHaveItTransformed(""HeyHello world!""); - } - -" --1," public void testSingletonPatternInSerialization() { - final Object[] singletones = new Object[] { - ExceptionFactory.INSTANCE, - }; - - for (final Object original : singletones) { - TestUtils.assertSameAfterSerialization( - ""Singletone patern broken for "" + original.getClass(), - original - ); - } - } - -" --1," private void doTestParameterNameLengthRestriction( ParametersInterceptor parametersInterceptor, - int paramNameMaxLength ) { - StringBuilder sb = new StringBuilder(); - for (int i = 0; i < paramNameMaxLength + 1; i++) { - sb.append(""x""); - } - - Map actual = new LinkedHashMap(); - parametersInterceptor.setValueStackFactory(createValueStackFactory(actual)); - ValueStack stack = createStubValueStack(actual); - - Map parameters = new HashMap(); - parameters.put(sb.toString(), """"); - parameters.put(""huuhaa"", """"); - - Action action = new SimpleAction(); - parametersInterceptor.setParameters(action, stack, parameters); - assertEquals(1, actual.size()); - } - -" --1," public boolean equals(Object obj) { - if (obj instanceof CharEntry) { - return value.equals(((CharEntry) obj).value); - } - return false; - } - - } - - -} -" --1," protected boolean readMessage(AjpMessage message) - throws IOException { - - byte[] buf = message.getBuffer(); - int headerLength = message.getHeaderLength(); - - read(buf, 0, headerLength); - - int messageLength = message.processHeader(true); - if (messageLength < 0) { - // Invalid AJP header signature - // TODO: Throw some exception and close the connection to frontend. - return false; - } - else if (messageLength == 0) { - // Zero length message. - return true; - } - else { - if (messageLength > buf.length) { - // Message too long for the buffer - // Need to trigger a 400 response - throw new IllegalArgumentException(sm.getString( - ""ajpprocessor.header.tooLong"", - Integer.valueOf(messageLength), - Integer.valueOf(buf.length))); - } - read(buf, headerLength, messageLength); - return true; - } - } -" --1," public boolean allPresentAndPositive() { - return lockoutPeriodSeconds >= 0 && lockoutAfterFailures >= 0 && countFailuresWithin >= 0; - } -" --1," public boolean event(org.apache.coyote.Request req, - org.apache.coyote.Response res, SocketStatus status) { - - Request request = (Request) req.getNote(ADAPTER_NOTES); - Response response = (Response) res.getNote(ADAPTER_NOTES); - - if (request.getWrapper() != null) { - - boolean error = false; - try { - if (status == SocketStatus.OPEN) { - request.getEvent().setEventType(CometEvent.EventType.READ); - request.getEvent().setEventSubType(null); - } else if (status == SocketStatus.DISCONNECT) { - request.getEvent().setEventType(CometEvent.EventType.ERROR); - request.getEvent().setEventSubType(CometEvent.EventSubType.CLIENT_DISCONNECT); - error = true; - } else if (status == SocketStatus.ERROR) { - request.getEvent().setEventType(CometEvent.EventType.ERROR); - request.getEvent().setEventSubType(CometEvent.EventSubType.IOEXCEPTION); - error = true; - } else if (status == SocketStatus.STOP) { - request.getEvent().setEventType(CometEvent.EventType.END); - request.getEvent().setEventSubType(CometEvent.EventSubType.SERVER_SHUTDOWN); - } else if (status == SocketStatus.TIMEOUT) { - request.getEvent().setEventType(CometEvent.EventType.ERROR); - request.getEvent().setEventSubType(CometEvent.EventSubType.TIMEOUT); - } - - // Calling the container - connector.getContainer().getPipeline().getFirst().event(request, response, request.getEvent()); - - if (response.isClosed() || !request.isComet()) { - res.action(ActionCode.ACTION_COMET_END, null); - } - return (!error); - } catch (Throwable t) { - if (!(t instanceof IOException)) { - log.error(sm.getString(""coyoteAdapter.service""), t); - } - error = true; - // FIXME: Since there's likely some structures kept in the servlet or elsewhere, - // a cleanup event of some sort could be needed ? - return false; - } finally { - // Recycle the wrapper request and response - if (error || response.isClosed() || !request.isComet()) { - request.recycle(); - request.setFilterChain(null); - response.recycle(); - } - } - - } else { - return false; - } - } - - - /** - * Service method. - */ -" --1," public void testSnapshotAndRestore() throws ExecutionException, InterruptedException, IOException { - logger.info(""--> creating repository""); - assertAcked(client().admin().cluster().preparePutRepository(""test-repo"") - .setType(""fs"").setSettings(ImmutableSettings.settingsBuilder() - .put(""location"", randomRepoPath().getAbsolutePath()) - .put(""compress"", randomBoolean()) - .put(""chunk_size"", randomIntBetween(100, 1000)))); - String[] indicesBefore = new String[randomIntBetween(2,5)]; - String[] indicesAfter = new String[randomIntBetween(2,5)]; - for (int i = 0; i < indicesBefore.length; i++) { - indicesBefore[i] = ""index_before_"" + i; - createIndex(indicesBefore[i]); - } - for (int i = 0; i < indicesAfter.length; i++) { - indicesAfter[i] = ""index_after_"" + i; - createIndex(indicesAfter[i]); - } - String[] indices = new String[indicesBefore.length + indicesAfter.length]; - System.arraycopy(indicesBefore, 0, indices, 0, indicesBefore.length); - System.arraycopy(indicesAfter, 0, indices, indicesBefore.length, indicesAfter.length); - ensureYellow(); - logger.info(""--> indexing some data""); - IndexRequestBuilder[] buildersBefore = new IndexRequestBuilder[randomIntBetween(10, 200)]; - for (int i = 0; i < buildersBefore.length; i++) { - buildersBefore[i] = client().prepareIndex(RandomPicks.randomFrom(getRandom(), indicesBefore), ""foo"", Integer.toString(i)).setSource(""{ \""foo\"" : \""bar\"" } ""); - } - IndexRequestBuilder[] buildersAfter = new IndexRequestBuilder[randomIntBetween(10, 200)]; - for (int i = 0; i < buildersAfter.length; i++) { - buildersAfter[i] = client().prepareIndex(RandomPicks.randomFrom(getRandom(), indicesBefore), ""bar"", Integer.toString(i)).setSource(""{ \""foo\"" : \""bar\"" } ""); - } - indexRandom(true, buildersBefore); - indexRandom(true, buildersAfter); - assertThat(client().prepareCount(indices).get().getCount(), equalTo((long) (buildersBefore.length + buildersAfter.length))); - long[] counts = new long[indices.length]; - for (int i = 0; i < indices.length; i++) { - counts[i] = client().prepareCount(indices[i]).get().getCount(); - } - - logger.info(""--> snapshot subset of indices before upgrage""); - CreateSnapshotResponse createSnapshotResponse = client().admin().cluster().prepareCreateSnapshot(""test-repo"", ""test-snap-1"").setWaitForCompletion(true).setIndices(""index_before_*"").get(); - assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), greaterThan(0)); - assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), equalTo(createSnapshotResponse.getSnapshotInfo().totalShards())); - - assertThat(client().admin().cluster().prepareGetSnapshots(""test-repo"").setSnapshots(""test-snap-1"").get().getSnapshots().get(0).state(), equalTo(SnapshotState.SUCCESS)); - - logger.info(""--> delete some data from indices that were already snapshotted""); - int howMany = randomIntBetween(1, buildersBefore.length); - - for (int i = 0; i < howMany; i++) { - IndexRequestBuilder indexRequestBuilder = RandomPicks.randomFrom(getRandom(), buildersBefore); - IndexRequest request = indexRequestBuilder.request(); - client().prepareDelete(request.index(), request.type(), request.id()).get(); - } - refresh(); - final long numDocs = client().prepareCount(indices).get().getCount(); - assertThat(client().prepareCount(indices).get().getCount(), lessThan((long) (buildersBefore.length + buildersAfter.length))); - - - client().admin().indices().prepareUpdateSettings(indices).setSettings(ImmutableSettings.builder().put(EnableAllocationDecider.INDEX_ROUTING_ALLOCATION_ENABLE, ""none"")).get(); - backwardsCluster().allowOnAllNodes(indices); - logClusterState(); - boolean upgraded; - do { - logClusterState(); - CountResponse countResponse = client().prepareCount().get(); - assertHitCount(countResponse, numDocs); - upgraded = backwardsCluster().upgradeOneNode(); - ensureYellow(); - countResponse = client().prepareCount().get(); - assertHitCount(countResponse, numDocs); - } while (upgraded); - client().admin().indices().prepareUpdateSettings(indices).setSettings(ImmutableSettings.builder().put(EnableAllocationDecider.INDEX_ROUTING_ALLOCATION_ENABLE, ""all"")).get(); - - logger.info(""--> close indices""); - client().admin().indices().prepareClose(""index_before_*"").get(); - - logger.info(""--> verify repository""); - client().admin().cluster().prepareVerifyRepository(""test-repo"").get(); - - logger.info(""--> restore all indices from the snapshot""); - RestoreSnapshotResponse restoreSnapshotResponse = client().admin().cluster().prepareRestoreSnapshot(""test-repo"", ""test-snap-1"").setWaitForCompletion(true).execute().actionGet(); - assertThat(restoreSnapshotResponse.getRestoreInfo().totalShards(), greaterThan(0)); - - ensureYellow(); - assertThat(client().prepareCount(indices).get().getCount(), equalTo((long) (buildersBefore.length + buildersAfter.length))); - for (int i = 0; i < indices.length; i++) { - assertThat(counts[i], equalTo(client().prepareCount(indices[i]).get().getCount())); - } - - logger.info(""--> snapshot subset of indices after upgrade""); - createSnapshotResponse = client().admin().cluster().prepareCreateSnapshot(""test-repo"", ""test-snap-2"").setWaitForCompletion(true).setIndices(""index_*"").get(); - assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), greaterThan(0)); - assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), equalTo(createSnapshotResponse.getSnapshotInfo().totalShards())); - - // Test restore after index deletion - logger.info(""--> delete indices""); - String index = RandomPicks.randomFrom(getRandom(), indices); - cluster().wipeIndices(index); - logger.info(""--> restore one index after deletion""); - restoreSnapshotResponse = client().admin().cluster().prepareRestoreSnapshot(""test-repo"", ""test-snap-2"").setWaitForCompletion(true).setIndices(index).execute().actionGet(); - assertThat(restoreSnapshotResponse.getRestoreInfo().totalShards(), greaterThan(0)); - ensureYellow(); - assertThat(client().prepareCount(indices).get().getCount(), equalTo((long) (buildersBefore.length + buildersAfter.length))); - for (int i = 0; i < indices.length; i++) { - assertThat(counts[i], equalTo(client().prepareCount(indices[i]).get().getCount())); - } - } - -" --1," public XMSSPrivateKeyParameters getNextKey() - { - /* prepare authentication path for next leaf */ - int treeHeight = this.params.getHeight(); - if (this.getIndex() < ((1 << treeHeight) - 1)) - { - return new XMSSPrivateKeyParameters.Builder(params) - .withSecretKeySeed(secretKeySeed).withSecretKeyPRF(secretKeyPRF) - .withPublicSeed(publicSeed).withRoot(root) - .withBDSState(bdsState.getNextState(publicSeed, secretKeySeed, (OTSHashAddress)new OTSHashAddress.Builder().build())).build(); - } - else - { - return new XMSSPrivateKeyParameters.Builder(params) - .withSecretKeySeed(secretKeySeed).withSecretKeyPRF(secretKeyPRF) - .withPublicSeed(publicSeed).withRoot(root) - .withBDSState(new BDS(params, getIndex() + 1)).build(); // no more nodes left. - } - } - -" --1," public void addRecipients(final ExtendedEmailPublisherContext context, EnvVars env, Set to, Set cc, Set bcc) { - final class Debug implements RecipientProviderUtilities.IDebug { - private final ExtendedEmailPublisherDescriptor descriptor - = Jenkins.getActiveInstance().getDescriptorByType(ExtendedEmailPublisherDescriptor.class); - - private final PrintStream logger = context.getListener().getLogger(); - - public void send(final String format, final Object... args) { - descriptor.debug(logger, format, args); - } - } - final Debug debug = new Debug(); - // looking for Upstream build. - Run cur = context.getRun(); - Cause.UpstreamCause upc = cur.getCause(Cause.UpstreamCause.class); - while (upc != null) { - // UpstreamCause.getUpStreamProject() returns the full name, so use getItemByFullName - Job p = (Job) Jenkins.getActiveInstance().getItemByFullName(upc.getUpstreamProject()); - if (p == null) { - context.getListener().getLogger().print(""There is a break in the project linkage, could not retrieve upstream project information""); - break; - } - cur = p.getBuildByNumber(upc.getUpstreamBuild()); - upc = cur.getCause(Cause.UpstreamCause.class); - } - addUserTriggeringTheBuild(cur, to, cc, bcc, env, context, debug); - } - -" --1," public void setSslSupport(SSLSupport sslSupport) { - this.sslSupport = sslSupport; - } -" --1," public void loadPropertyFile(String file, Properties target) - { - try - { - // Use SecuritySupport class to provide privileged access to property file - InputStream is = SecuritySupport.getResourceAsStream(ObjectFactory.findClassLoader(), - file); - - // get a buffered version - BufferedInputStream bis = new BufferedInputStream(is); - - target.load(bis); // and load up the property bag from this - bis.close(); // close out after reading - } - catch (Exception ex) - { - // ex.printStackTrace(); - throw new org.apache.xml.utils.WrappedRuntimeException(ex); - } - } -" --1," protected MimeTypes getMimeTypes() { - return embeddedDocumentUtil.getMimeTypes(); - } - -" --1," public int getKDFInfo() { - final int unusedBit28 = 0x8000000; // 1000000000000000000000000000 - - // kdf version is bits 1-27, bit 28 (reserved) should be 0, and - // bits 29-32 are the MAC algorithm indicating which PRF to use for the KDF. - int kdfVers = getKDFVersion(); - assert kdfVers > 0 && kdfVers <= 99991231 : ""KDF version (YYYYMMDD, max 99991231) out of range: "" + kdfVers; - int kdfInfo = kdfVers; - int macAlg = kdfPRFAsInt(); - assert macAlg >= 0 && macAlg <= 15 : ""MAC algorithm indicator must be between 0 to 15 inclusion; value is: "" + macAlg; - - // Make sure bit28 is cleared. (Reserved for future use.) - kdfInfo &= ~unusedBit28; - - // Set MAC algorithm bits in high (MSB) nibble. - kdfInfo |= (macAlg << 28); - - return kdfInfo; - } -" --1," private void readObject(ObjectInputStream stream) throws IOException, ClassNotFoundException { - stream.defaultReadObject(); - EVIL_BIT = 1; - } - - } - -} -" --1," public void onStartup(Set> c, ServletContext ctx) - throws ServletException { - Servlet s; - - if (createServlet) { - s = ctx.createServlet(servlet.getClass()); - } else { - s = servlet; - } - ServletRegistration.Dynamic r = ctx.addServlet(""servlet"", s); - r.addMapping(""/""); - } - } -} -" --1," public ResetPasswordResponse resetPassword(String code, String newPassword) throws InvalidPasswordException { - try { - passwordValidator.validate(newPassword); - return changePasswordCodeAuthenticated(code, newPassword); - } catch (RestClientException e) { - throw new UaaException(e.getMessage()); - } - } - -" --1," public Api getApi() { - return new Api(this); - } - - /** - * Returns the instance of this class. - * If {@link jenkins.model.Jenkins#getInstance()} isn't available - * or the plugin class isn't registered null will be returned. - * - * @return the instance. - */ - @CheckForNull -" --1," protected int readMessage(AjpMessage message, boolean blockFirstRead) - throws IOException { - - byte[] buf = message.getBuffer(); - int headerLength = message.getHeaderLength(); - - int bytesRead = read(buf, 0, headerLength, blockFirstRead); - - if (bytesRead == 0) { - return 0; - } - - int messageLength = message.processHeader(true); - if (messageLength < 0) { - // Invalid AJP header signature - throw new IOException(sm.getString(""ajpmessage.invalidLength"", - Integer.valueOf(messageLength))); - } - else if (messageLength == 0) { - // Zero length message. - return bytesRead; - } - else { - if (messageLength > buf.length) { - // Message too long for the buffer - // Need to trigger a 400 response - throw new IllegalArgumentException(sm.getString( - ""ajpprocessor.header.tooLong"", - Integer.valueOf(messageLength), - Integer.valueOf(buf.length))); - } - bytesRead += read(buf, headerLength, messageLength, true); - return bytesRead; - } - } - - -" --1," public boolean isHA() { - return false; - } - - @Override -" --1," public XMSSMTPrivateKeyParameters getNextKey() - { - BDSStateMap newState = new BDSStateMap(bdsState, params, this.getIndex(), publicSeed, secretKeySeed); - - return new XMSSMTPrivateKeyParameters.Builder(params).withIndex(index + 1) - .withSecretKeySeed(secretKeySeed).withSecretKeyPRF(secretKeyPRF) - .withPublicSeed(publicSeed).withRoot(root) - .withBDSState(newState).build(); - } -" --1," public TransformerFactory createTransformerFactory() { - TransformerFactory factory = TransformerFactory.newInstance(); - // Enable the Security feature by default - try { - factory.setFeature(javax.xml.XMLConstants.FEATURE_SECURE_PROCESSING, true); - } catch (TransformerConfigurationException e) { - LOG.warn(""TransformerFactory doesn't support the feature {} with value {}, due to {}."", new Object[]{javax.xml.XMLConstants.FEATURE_SECURE_PROCESSING, ""true"", e}); - } - factory.setErrorListener(new XmlErrorListener()); - return factory; - } - -" --1," long getTimeStamp(); - -" --1," public void init(KeyGenerationParameters param) - { - this.param = (RSAKeyGenerationParameters)param; - } - -" --1," public Document getMetaData(Idp config) throws RuntimeException { - try { - //Return as text/xml - Crypto crypto = CertsUtils.createCrypto(config.getCertificate()); - - W3CDOMStreamWriter writer = new W3CDOMStreamWriter(); - - writer.writeStartDocument(""UTF-8"", ""1.0""); - - String referenceID = IDGenerator.generateID(""_""); - writer.writeStartElement(""md"", ""EntityDescriptor"", SAML2_METADATA_NS); - writer.writeAttribute(""ID"", referenceID); - - writer.writeAttribute(""entityID"", config.getIdpUrl().toString()); - - writer.writeNamespace(""md"", SAML2_METADATA_NS); - writer.writeNamespace(""fed"", WS_FEDERATION_NS); - writer.writeNamespace(""wsa"", WS_ADDRESSING_NS); - writer.writeNamespace(""auth"", WS_FEDERATION_NS); - writer.writeNamespace(""xsi"", SCHEMA_INSTANCE_NS); - - writeFederationMetadata(writer, config, crypto); - - writer.writeEndElement(); // EntityDescriptor - - writer.writeEndDocument(); - - writer.close(); - - if (LOG.isDebugEnabled()) { - String out = DOM2Writer.nodeToString(writer.getDocument()); - LOG.debug(""***************** unsigned ****************""); - LOG.debug(out); - LOG.debug(""***************** unsigned ****************""); - } - - Document result = SignatureUtils.signMetaInfo(crypto, null, config.getCertificatePassword(), - writer.getDocument(), referenceID); - if (result != null) { - return result; - } else { - throw new RuntimeException(""Failed to sign the metadata document: result=null""); - } - } catch (Exception e) { - LOG.error(""Error creating service metadata information "", e); - throw new RuntimeException(""Error creating service metadata information: "" + e.getMessage()); - } - - } - -" --1," protected void publish(ApplicationEvent event) { - if (publisher!=null) { - publisher.publishEvent(event); - } - } -" --1," private static File getUnsanitizedLegacyConfigFileFor(String id) { - return new File(getRootDir(), idStrategy().legacyFilenameOf(id) + ""/config.xml""); - } - - /** - * Gets the directory where Hudson stores user information. - */ -" --1," protected void _initFactories(XMLInputFactory xmlIn, XMLOutputFactory xmlOut) - { - // Better ensure namespaces get built properly, so: - xmlOut.setProperty(XMLOutputFactory.IS_REPAIRING_NAMESPACES, Boolean.TRUE); - // and for parser, force coalescing as well (much simpler to use) - xmlIn.setProperty(XMLInputFactory.IS_COALESCING, Boolean.TRUE); - } - - /** - * Note: compared to base implementation by {@link JsonFactory}, - * here the copy will actually share underlying XML input and - * output factories, as there is no way to make copies of those. - * - * @since 2.1 - */ - @Override -" --1," public ScimUser retrieve(String id) { - try { - ScimUser u = jdbcTemplate.queryForObject(USER_BY_ID_QUERY, mapper, id); - return u; - } catch (EmptyResultDataAccessException e) { - throw new ScimResourceNotFoundException(""User "" + id + "" does not exist""); - } - } - - @Override -" --1," private T run(PrivilegedAction action) { - return System.getSecurityManager() != null ? AccessController.doPrivileged( action ) : action.run(); - } -" --1," public boolean getMapperDirectoryRedirectEnabled() { return false; } -" --1," protected void setUpResources(JAXRSServerFactoryBean sf) { - sf.setResourceClasses(TikaResource.class); - sf.setResourceProvider(TikaResource.class, - new SingletonResourceProvider(new TikaResource())); - } - - @Override -" --1," public HttpBinding getBinding() { - if (this.binding == null) { - this.binding = new AttachmentHttpBinding(); - this.binding.setTransferException(isTransferException()); - if (getComponent() != null) { - this.binding.setAllowJavaSerializedObject(getComponent().isAllowJavaSerializedObject()); - } - this.binding.setHeaderFilterStrategy(getHeaderFilterStrategy()); - } - return this.binding; - } - - @Override -" --1," public void testNamedEntity() throws Exception { - assertU(""\n""+ - ""\n]>""+ - """"+ - ""1""+ - ""&wacky;"" + - """"); - - assertU(""""); - assertQ(req(""foo_s:zzz""), - ""//*[@numFound='1']"" - ); - } - - @Test -" --1," private FreeStyleProject createDownstreamProject() throws Exception { - FreeStyleProject dp = createFreeStyleProject(""downstream""); - - // Hm, no setQuietPeriod, have to submit form.. - WebClient webClient = new WebClient(); - HtmlPage page = webClient.getPage(dp,""configure""); - HtmlForm form = page.getFormByName(""config""); - form.getInputByName(""hasCustomQuietPeriod"").click(); - form.getInputByName(""quiet_period"").setValueAttribute(""0""); - submit(form); - assertEquals(""set quiet period"", 0, dp.getQuietPeriod()); - - return dp; - } - -" --1," public void setOkStatusCodeRange(String okStatusCodeRange) { - this.okStatusCodeRange = okStatusCodeRange; - } -" --1," public boolean shouldParseEmbedded(Metadata metadata) { - DocumentSelector selector = context.get(DocumentSelector.class); - if (selector != null) { - return selector.select(metadata); - } - - FilenameFilter filter = context.get(FilenameFilter.class); - if (filter != null) { - String name = metadata.get(Metadata.RESOURCE_NAME_KEY); - if (name != null) { - return filter.accept(ABSTRACT_PATH, name); - } - } - - return true; - } - -" --1," public void testLockTryingToDelete() throws Exception { - String lockType = ""native""; // test does not work with simple locks - Settings nodeSettings = ImmutableSettings.builder() - .put(""gateway.type"", ""local"") // don't delete things! - .put(""index.store.fs.fs_lock"", lockType) - .build(); - String IDX = ""test""; - logger.info(""--> lock type: {}"", lockType); - - internalCluster().startNode(nodeSettings); - Settings idxSettings = ImmutableSettings.builder() - .put(IndexMetaData.SETTING_NUMBER_OF_SHARDS, 1) - .put(IndexMetaData.SETTING_NUMBER_OF_REPLICAS, 0) - .put(""index.store.fs.fs_lock"", lockType) - .build(); - - // only one node, so all primaries will end up on node1 - prepareCreate(IDX).setSettings(idxSettings).addMapping(""doc"", ""foo"", ""type=string,index=not_analyzed"").get(); - ensureGreen(IDX); - client().prepareIndex(IDX, ""doc"").setSource(""foo"", ""bar"").get(); - flushAndRefresh(IDX); - NodeEnvironment env = internalCluster().getDataNodeInstance(NodeEnvironment.class); - logger.info(""--> data paths: [{}]"", env.nodeDataPaths()); - Path[] shardPaths = env.shardDataPaths(new ShardId(""test"", 0), ImmutableSettings.builder().build()); - logger.info(""--> paths: [{}]"", shardPaths); - // Should not be able to acquire the lock because it's already open - try { - NodeEnvironment.acquireFSLockForPaths(ImmutableSettings.EMPTY, shardPaths); - fail(""should not have been able to acquire the lock""); - } catch (ElasticsearchException e) { - assertTrue(""msg: "" + e.getMessage(), e.getMessage().contains(""unable to acquire write.lock"")); - } - // Test without the regular shard lock to assume we can acquire it - // (worst case, meaning that the shard lock could be acquired and - // we're green to delete the shard's directory) - ShardLock sLock = new DummyShardLock(new ShardId(""test"", 0)); - try { - env.deleteShardDirectoryUnderLock(sLock, ImmutableSettings.builder().build()); - fail(""should not have been able to delete the directory""); - } catch (ElasticsearchException e) { - assertTrue(""msg: "" + e.getMessage(), e.getMessage().contains(""unable to acquire write.lock"")); - } - } -" --1," public KeyPair generateKeyPair() - { - if (!initialised) - { - Integer paramStrength = Integers.valueOf(strength); - - if (params.containsKey(paramStrength)) - { - param = (DSAKeyGenerationParameters)params.get(paramStrength); - } - else - { - synchronized (lock) - { - // we do the check again in case we were blocked by a generator for - // our key size. - if (params.containsKey(paramStrength)) - { - param = (DSAKeyGenerationParameters)params.get(paramStrength); - } - else - { - DSAParametersGenerator pGen; - DSAParameterGenerationParameters dsaParams; - - // Typical combination of keysize and size of q. - // keysize = 1024, q's size = 160 - // keysize = 2048, q's size = 224 - // keysize = 2048, q's size = 256 - // keysize = 3072, q's size = 256 - // For simplicity if keysize is greater than 1024 then we choose q's size to be 256. - // For legacy keysize that is less than 1024-bit, we just use the 186-2 style parameters - if (strength == 1024) - { - pGen = new DSAParametersGenerator(); - if (Properties.isOverrideSet(""org.bouncycastle.dsa.FIPS186-2for1024bits"")) - { - pGen.init(strength, certainty, random); - } - else - { - dsaParams = new DSAParameterGenerationParameters(1024, 160, certainty, random); - pGen.init(dsaParams); - } - } - else if (strength > 1024) - { - dsaParams = new DSAParameterGenerationParameters(strength, 256, certainty, random); - pGen = new DSAParametersGenerator(new SHA256Digest()); - pGen.init(dsaParams); - } - else - { - pGen = new DSAParametersGenerator(); - pGen.init(strength, certainty, random); - } - param = new DSAKeyGenerationParameters(random, pGen.generateParameters()); - - params.put(paramStrength, param); - } - } - } - - engine.init(param); - initialised = true; - } - - AsymmetricCipherKeyPair pair = engine.generateKeyPair(); - DSAPublicKeyParameters pub = (DSAPublicKeyParameters)pair.getPublic(); - DSAPrivateKeyParameters priv = (DSAPrivateKeyParameters)pair.getPrivate(); - - return new KeyPair(new BCDSAPublicKey(pub), new BCDSAPrivateKey(priv)); - } -" --1," Attributes setPropertiesFromAttributes( - StylesheetHandler handler, String rawName, Attributes attributes, - ElemTemplateElement target, boolean throwError) - throws org.xml.sax.SAXException - { - - XSLTElementDef def = getElemDef(); - AttributesImpl undefines = null; - boolean isCompatibleMode = ((null != handler.getStylesheet() - && handler.getStylesheet().getCompatibleMode()) - || !throwError); - if (isCompatibleMode) - undefines = new AttributesImpl(); - - - // Keep track of which XSLTAttributeDefs have been processed, so - // I can see which default values need to be set. - List processedDefs = new ArrayList(); - - // Keep track of XSLTAttributeDefs that were invalid - List errorDefs = new ArrayList(); - int nAttrs = attributes.getLength(); - - for (int i = 0; i < nAttrs; i++) - { - String attrUri = attributes.getURI(i); - // Hack for Crimson. -sb - if((null != attrUri) && (attrUri.length() == 0) - && (attributes.getQName(i).startsWith(""xmlns:"") || - attributes.getQName(i).equals(""xmlns""))) - { - attrUri = org.apache.xalan.templates.Constants.S_XMLNAMESPACEURI; - } - String attrLocalName = attributes.getLocalName(i); - XSLTAttributeDef attrDef = def.getAttributeDef(attrUri, attrLocalName); - - if (null == attrDef) - { - if (!isCompatibleMode) - { - - // Then barf, because this element does not allow this attribute. - handler.error(XSLTErrorResources.ER_ATTR_NOT_ALLOWED, new Object[]{attributes.getQName(i), rawName}, null);//""\""""+attributes.getQName(i)+""\"""" - //+ "" attribute is not allowed on the "" + rawName - // + "" element!"", null); - } - else - { - undefines.addAttribute(attrUri, attrLocalName, - attributes.getQName(i), - attributes.getType(i), - attributes.getValue(i)); - } - } - else - { - //handle secure processing - if(handler.getStylesheetProcessor()==null) - System.out.println(""stylesheet processor null""); - if(attrDef.getName().compareTo(""*"")==0 && handler.getStylesheetProcessor().isSecureProcessing()) - { - //foreign attributes are not allowed in secure processing mode - // Then barf, because this element does not allow this attribute. - handler.error(XSLTErrorResources.ER_ATTR_NOT_ALLOWED, new Object[]{attributes.getQName(i), rawName}, null);//""\""""+attributes.getQName(i)+""\"""" - //+ "" attribute is not allowed on the "" + rawName - // + "" element!"", null); - } - else - { - - - boolean success = attrDef.setAttrValue(handler, attrUri, attrLocalName, - attributes.getQName(i), attributes.getValue(i), - target); - - // Now we only add the element if it passed a validation check - if (success) - processedDefs.add(attrDef); - else - errorDefs.add(attrDef); - } - } - } - - XSLTAttributeDef[] attrDefs = def.getAttributes(); - int nAttrDefs = attrDefs.length; - - for (int i = 0; i < nAttrDefs; i++) - { - XSLTAttributeDef attrDef = attrDefs[i]; - String defVal = attrDef.getDefault(); - - if (null != defVal) - { - if (!processedDefs.contains(attrDef)) - { - attrDef.setDefAttrValue(handler, target); - } - } - - if (attrDef.getRequired()) - { - if ((!processedDefs.contains(attrDef)) && (!errorDefs.contains(attrDef))) - handler.error( - XSLMessages.createMessage( - XSLTErrorResources.ER_REQUIRES_ATTRIB, new Object[]{ rawName, - attrDef.getName() }), null); - } - } - - return undefines; - } -" --1," public static void beforeClass() throws Exception { - SUITE_SEED = randomLong(); - initializeSuiteScope(); - } - -" --1," public void connect(HttpConsumer consumer) throws Exception { - } - - /** - * Disconnects the URL specified on the endpoint from the specified processor. - * - * @param consumer the consumer - * @throws Exception can be thrown - */ -" --1," private void writeAttribute(SessionAttribute sessionAttribute) throws IOException { - write(""""); - writeDirectly(htmlEncodeButNotSpace(sessionAttribute.getName())); - write(""""); - write(String.valueOf(sessionAttribute.getType())); - write(""""); - if (sessionAttribute.isSerializable()) { - write(""#oui#""); - } else { - write(""#non#""); - } - write(""""); - write(integerFormat.format(sessionAttribute.getSerializedSize())); - write(""""); - writeDirectly(htmlEncodeButNotSpace(String.valueOf(sessionAttribute.getContent()))); - write(""""); - } -" --1," public boolean isUseRouteBuilder() { - return false; - } - - @Test - @Ignore -" --1," public String getDisplayName() { - return ""Developers""; - } - } -} -" --1," private T run(PrivilegedExceptionAction action) throws JAXBException { - try { - return System.getSecurityManager() != null ? AccessController.doPrivileged( action ) : action.run(); - } - catch ( JAXBException e ) { - throw e; - } - catch ( Exception e ) { - throw log.getErrorParsingMappingFileException( e ); - } - } - - // JAXB closes the underlying input stream -" --1," protected void checkIllegalTypes(DeserializationContext ctxt, JavaType type, - BeanDescription beanDesc) - throws JsonMappingException - { - // There are certain nasty classes that could cause problems, mostly - // via default typing -- catch them here. - String full = type.getRawClass().getName(); - - if (_cfgIllegalClassNames.contains(full)) { - throw JsonMappingException.from(ctxt, - String.format(""Illegal type (%s) to deserialize: prevented for security reasons"", full)); - } - } -" --1," public FileVisitResult postVisitDirectory(Path dir, IOException ioe) - throws IOException { - // NO-OP - return FileVisitResult.CONTINUE; - }}); - } -} -" --1," public JettyHttpEndpoint getEndpoint() { - return (JettyHttpEndpoint) super.getEndpoint(); - } - -" --1," public static File randomRepoPath(Settings settings) { - Environment environment = new Environment(settings); - File[] repoFiles = environment.repoFiles(); - assert repoFiles.length > 0; - File path; - do { - path = new File(repoFiles[0], randomAsciiOfLength(10)); - } while (path.exists()); - return path; - } - -" --1," public void setup() { - this.request = new MockHttpServletRequest(); - this.request.setMethod(""GET""); - this.response = new MockHttpServletResponse(); - this.chain = new MockFilterChain(); - } - - @After -" --1," public static Context getCurrentContext() - { - return __context.get(); - } - -" --1," protected Log getLog() { - return log; - } - - // ----------------------------------------------------------- Constructors - - -" --1," protected void checkIllegalTypes(DeserializationContext ctxt, JavaType type, - BeanDescription beanDesc) - throws JsonMappingException - { - // There are certain nasty classes that could cause problems, mostly - // via default typing -- catch them here. - String full = type.getRawClass().getName(); - - if (_cfgIllegalClassNames.contains(full)) { - ctxt.reportBadTypeDefinition(beanDesc, - ""Illegal type (%s) to deserialize: prevented for security reasons"", full); - } - } -" --1," public String toString() { - return xpathExpression; - } -" --1," protected void setLocale(HttpServletRequest request) { - if (defaultLocale == null) { - defaultLocale = request.getLocale(); - } - } - -" --1," protected boolean isWithinLengthLimit( String name ) { - return name.length() <= paramNameMaxLength; - } - -" --1," private CoderResult decodeHasArray(ByteBuffer in, CharBuffer out) { - int outRemaining = out.remaining(); - int pos = in.position(); - int limit = in.limit(); - final byte[] bArr = in.array(); - final char[] cArr = out.array(); - final int inIndexLimit = limit + in.arrayOffset(); - int inIndex = pos + in.arrayOffset(); - int outIndex = out.position() + out.arrayOffset(); - // if someone would change the limit in process, - // he would face consequences - for (; inIndex < inIndexLimit && outRemaining > 0; inIndex++) { - int jchar = bArr[inIndex]; - if (jchar < 0) { - jchar = jchar & 0x7F; - int tail = remainingBytes[jchar]; - if (tail == -1) { - in.position(inIndex - in.arrayOffset()); - out.position(outIndex - out.arrayOffset()); - return CoderResult.malformedForLength(1); - } - if (inIndexLimit - inIndex < 1 + tail) { - // Apache Tomcat added tests - detect invalid sequences as - // early as possible - if (jchar == 0x74 && inIndexLimit > inIndex + 1) { - if ((bArr[inIndex + 1] & 0xFF) > 0x8F) { - // 11110100 1yyyxxxx xxxxxxxx xxxxxxxx - // Any non-zero y is > max code point - return CoderResult.unmappableForLength(4); - } - } - if (jchar == 0x60 && inIndexLimit > inIndex +1) { - if ((bArr[inIndex + 1] & 0x7F) == 0) { - // 11100000 10000000 10xxxxxx - // should have been - // 00xxxxxx - return CoderResult.malformedForLength(3); - } - } - if (jchar == 0x70 && inIndexLimit > inIndex +1) { - if ((bArr[inIndex + 1] & 0x7F) < 0x10) { - // 11110000 1000zzzz 1oyyyyyy 1oxxxxxx - // should have been - // 111ozzzz 1oyyyyyy 1oxxxxxx - return CoderResult.malformedForLength(4); - } - } - break; - } - for (int i = 0; i < tail; i++) { - int nextByte = bArr[inIndex + i + 1] & 0xFF; - if ((nextByte & 0xC0) != 0x80) { - in.position(inIndex - in.arrayOffset()); - out.position(outIndex - out.arrayOffset()); - return CoderResult.malformedForLength(1 + i); - } - jchar = (jchar << 6) + nextByte; - } - jchar -= remainingNumbers[tail]; - if (jchar < lowerEncodingLimit[tail]) { - // Should have been encoded in fewer octets - in.position(inIndex - in.arrayOffset()); - out.position(outIndex - out.arrayOffset()); - return CoderResult.malformedForLength(1); - } - inIndex += tail; - } - // Apache Tomcat added test - if (jchar >= 0xD800 && jchar <= 0xDFFF) { - return CoderResult.unmappableForLength(3); - } - // Apache Tomcat added test - if (jchar > 0x10FFFF) { - return CoderResult.unmappableForLength(4); - } - if (jchar <= 0xffff) { - cArr[outIndex++] = (char) jchar; - outRemaining--; - } else { - if (outRemaining < 2) { - return CoderResult.OVERFLOW; - } - cArr[outIndex++] = (char) ((jchar >> 0xA) + 0xD7C0); - cArr[outIndex++] = (char) ((jchar & 0x3FF) + 0xDC00); - outRemaining -= 2; - } - } - in.position(inIndex - in.arrayOffset()); - out.position(outIndex - out.arrayOffset()); - return (outRemaining == 0 && inIndex < inIndexLimit) ? CoderResult.OVERFLOW - : CoderResult.UNDERFLOW; - } -" --1," public static CipherText fromPortableSerializedBytes(byte[] bytes) - throws EncryptionException - { - CipherTextSerializer cts = new CipherTextSerializer(bytes); - return cts.asCipherText(); - } - - ///////////////////////// P U B L I C M E T H O D S //////////////////// - - /** - * Obtain the String representing the cipher transformation used to encrypt - * the plaintext. The cipher transformation represents the cipher algorithm, - * the cipher mode, and the padding scheme used to do the encryption. An - * example would be ""AES/CBC/PKCS5Padding"". See Appendix A in the - * - * Java Cryptography Architecture Reference Guide - * for information about standard supported cipher transformation names. - *

- * The cipher transformation name is usually sufficient to be passed to - * {@link javax.crypto.Cipher#getInstance(String)} to create a - * Cipher object to decrypt the ciphertext. - * - * @return The cipher transformation name used to encrypt the plaintext - * resulting in this ciphertext. - */ -" --1," protected void _verifyException(Throwable t, Class expExcType, - String... patterns) throws Exception - { - Class actExc = t.getClass(); - if (!expExcType.isAssignableFrom(actExc)) { - fail(""Expected Exception of type '""+expExcType.getName()+""', got '"" - +actExc.getName()+""', message: ""+t.getMessage()); - } - for (String pattern : patterns) { - verifyException(t, pattern); - } - } -" --1," public String getCompression() { - switch (compressionLevel) { - case 0: - return ""off""; - case 1: - return ""on""; - case 2: - return ""force""; - } - return ""off""; - } - - - /** - * Set compression level. - */ -" --1," public void close() throws IOException { - if (authFilter != null) { - authFilter.destroy(); - } - } -" --1," public void destroy() { - } - }; - -" --1," public O getOrBuild() { - if (isUnbuilt()) { - try { - return build(); - } - catch (Exception e) { - logger.debug(""Failed to perform build. Returning null"", e); - return null; - } - } - else { - return getObject(); - } - } - - /** - * Applies a {@link SecurityConfigurerAdapter} to this {@link SecurityBuilder} and - * invokes {@link SecurityConfigurerAdapter#setBuilder(SecurityBuilder)}. - * - * @param configurer - * @return - * @throws Exception - */ - @SuppressWarnings(""unchecked"") -" --1," private void testModified() - throws Exception - { - ECNamedCurveParameterSpec namedCurve = ECNamedCurveTable.getParameterSpec(""P-256""); - org.bouncycastle.jce.spec.ECPublicKeySpec pubSpec = new org.bouncycastle.jce.spec.ECPublicKeySpec(namedCurve.getCurve().createPoint(PubX, PubY), namedCurve); - KeyFactory kFact = KeyFactory.getInstance(""EC"", ""BC""); - PublicKey pubKey = kFact.generatePublic(pubSpec); - Signature sig = Signature.getInstance(""SHA256WithECDSA"", ""BC""); - - for (int i = 0; i != MODIFIED_SIGNATURES.length; i++) - { - sig.initVerify(pubKey); - - sig.update(Strings.toByteArray(""Hello"")); - - boolean failed; - - try - { - failed = !sig.verify(Hex.decode(MODIFIED_SIGNATURES[i])); - System.err.println(ASN1Dump.dumpAsString(ASN1Primitive.fromByteArray(Hex.decode(MODIFIED_SIGNATURES[i])))); - } - catch (SignatureException e) - { - failed = true; - } - - isTrue(""sig verified when shouldn't: "" + i, failed); - } - } - -" --1," protected void populateParams() { - super.populateParams(); - - UIBean uiBean = (UIBean) component; - uiBean.setCssClass(cssClass); - uiBean.setCssStyle(cssStyle); - uiBean.setCssErrorClass(cssErrorClass); - uiBean.setCssErrorStyle(cssErrorStyle); - uiBean.setTitle(title); - uiBean.setDisabled(disabled); - uiBean.setLabel(label); - uiBean.setLabelSeparator(labelSeparator); - uiBean.setLabelposition(labelposition); - uiBean.setRequiredPosition(requiredPosition); - uiBean.setErrorPosition(errorPosition); - uiBean.setName(name); - uiBean.setRequiredLabel(requiredLabel); - uiBean.setTabindex(tabindex); - uiBean.setValue(value); - uiBean.setTemplate(template); - uiBean.setTheme(theme); - uiBean.setTemplateDir(templateDir); - uiBean.setOnclick(onclick); - uiBean.setOndblclick(ondblclick); - uiBean.setOnmousedown(onmousedown); - uiBean.setOnmouseup(onmouseup); - uiBean.setOnmouseover(onmouseover); - uiBean.setOnmousemove(onmousemove); - uiBean.setOnmouseout(onmouseout); - uiBean.setOnfocus(onfocus); - uiBean.setOnblur(onblur); - uiBean.setOnkeypress(onkeypress); - uiBean.setOnkeydown(onkeydown); - uiBean.setOnkeyup(onkeyup); - uiBean.setOnselect(onselect); - uiBean.setOnchange(onchange); - uiBean.setTooltip(tooltip); - uiBean.setTooltipConfig(tooltipConfig); - uiBean.setJavascriptTooltip(javascriptTooltip); - uiBean.setTooltipCssClass(tooltipCssClass); - uiBean.setTooltipDelay(tooltipDelay); - uiBean.setTooltipIconPath(tooltipIconPath); - uiBean.setAccesskey(accesskey); - uiBean.setKey(key); - uiBean.setId(id); - - uiBean.setDynamicAttributes(dynamicAttributes); - } - -" --1," public long getTimestamp() { - return timestamp; - } - } -} -" --1," public boolean isUseRouteBuilder() { - return false; - } - - @Test -" --1," public ServerSocket createSocket (int port, int backlog, - InetAddress ifAddress) - throws IOException - { - if (!initialized) init(); - ServerSocket socket = sslProxy.createServerSocket(port, backlog, - ifAddress); - initServerSocket(socket); - return socket; - } - -" --1," public static void init() throws Exception { - - idpHttpsPort = System.getProperty(""idp.https.port""); - Assert.assertNotNull(""Property 'idp.https.port' null"", idpHttpsPort); - rpHttpsPort = System.getProperty(""rp.https.port""); - Assert.assertNotNull(""Property 'rp.https.port' null"", rpHttpsPort); - - idpServer = startServer(true, idpHttpsPort); - - WSSConfig.init(); - } - -" --1," public void testPrivateKeySerialisation() - throws Exception - { - String stream = ""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""; - - XMSSParameters params = new XMSSParameters(10, new SHA256Digest()); - - byte[] output = Base64.decode(new String(stream).getBytes(""UTF-8"")); - - - //Simple Exploit - - try - { - new XMSSPrivateKeyParameters.Builder(params).withPrivateKey(output, params).build(); - } - catch (IllegalArgumentException e) - { - assertTrue(e.getCause() instanceof IOException); - } - - //Same Exploit other method - - XMSS xmss2 = new XMSS(params, new SecureRandom()); - - xmss2.generateKeys(); - - byte[] publicKey = xmss2.exportPublicKey(); - - try - { - xmss2.importState(output, publicKey); - } - catch (IllegalArgumentException e) - { - assertTrue(e.getCause() instanceof IOException); - } - } - -" --1," public void setAllowJavaSerializedObject(boolean allowJavaSerializedObject) { - this.allowJavaSerializedObject = allowJavaSerializedObject; - } - -" --1," public Collection getRequiredPermissions(String regionName) { - return Collections.singletonList(new ResourcePermission(ResourcePermission.Resource.DATA, - ResourcePermission.Operation.READ, regionName)); - } - -" --1," abstract protected JDBCTableReader getTableReader(Connection connection, - String tableName, - EmbeddedDocumentUtil embeddedDocumentUtil); - -" --1," public FederationConfig getFederationConfig() { - return federationConfig; - } - -" --1," protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain filterChain) - throws ServletException, IOException { - - String identityZoneId = request.getHeader(HEADER); - if (StringUtils.hasText(identityZoneId)) { - if (!isAuthorizedToSwitchToIdentityZone(identityZoneId)) { - response.sendError(HttpServletResponse.SC_FORBIDDEN, ""User is not authorized to switch to IdentityZone with id ""+identityZoneId); - return; - } - IdentityZone originalIdentityZone = IdentityZoneHolder.get(); - try { - - IdentityZone identityZone = null; - try { - identityZone = dao.retrieve(identityZoneId); - } catch (ZoneDoesNotExistsException ex) { - } catch (EmptyResultDataAccessException ex) { - } catch (Exception ex) { - throw ex; - } - if (identityZone == null) { - response.sendError(HttpServletResponse.SC_NOT_FOUND, ""Identity zone with id ""+identityZoneId+"" does not exist""); - return; - } - stripScopesFromAuthentication(identityZoneId, request); - IdentityZoneHolder.set(identityZone); - filterChain.doFilter(request, response); - } finally { - IdentityZoneHolder.set(originalIdentityZone); - } - } else { - filterChain.doFilter(request, response); - } - } -" --1," public BeanDefinition createMatcher(ParserContext pc, String path, String method) { - if ((""/**"".equals(path) || ""**"".equals(path)) && method == null) { - return new RootBeanDefinition(AnyRequestMatcher.class); - } - - BeanDefinitionBuilder matcherBldr = BeanDefinitionBuilder - .rootBeanDefinition(type); - - if (this == mvc) { - if (!pc.getRegistry().isBeanNameInUse(HANDLER_MAPPING_INTROSPECTOR_BEAN_NAME)) { - BeanDefinitionBuilder hmifb = BeanDefinitionBuilder - .rootBeanDefinition(HandlerMappingIntrospectorFactoryBean.class); - pc.getRegistry().registerBeanDefinition(HANDLER_MAPPING_INTROSPECTOR_FACTORY_BEAN_NAME, - hmifb.getBeanDefinition()); - - RootBeanDefinition hmi = new RootBeanDefinition(HANDLER_MAPPING_INTROSPECTOR_BEAN_NAME); - hmi.setFactoryBeanName(HANDLER_MAPPING_INTROSPECTOR_FACTORY_BEAN_NAME); - hmi.setFactoryMethodName(""createHandlerMappingIntrospector""); - pc.getRegistry().registerBeanDefinition(HANDLER_MAPPING_INTROSPECTOR_BEAN_NAME, hmi); - } - matcherBldr.addConstructorArgReference(HANDLER_MAPPING_INTROSPECTOR_BEAN_NAME); - } - - matcherBldr.addConstructorArgValue(path); - if (this == mvc) { - matcherBldr.addPropertyValue(""method"", method); - } - else { - matcherBldr.addConstructorArgValue(method); - } - - if (this == ciRegex) { - matcherBldr.addConstructorArgValue(true); - } - - return matcherBldr.getBeanDefinition(); - } - -" --1," protected Settings nodeSettings(int nodeOrdinal) { - return ImmutableSettings.builder() - // we really need local GW here since this also checks for corruption etc. - // and we need to make sure primaries are not just trashed if we don't have replicas - .put(super.nodeSettings(nodeOrdinal)).put(""gateway.type"", ""local"") - .put(TransportModule.TRANSPORT_SERVICE_TYPE_KEY, MockTransportService.class.getName()) - // speed up recoveries - .put(RecoverySettings.INDICES_RECOVERY_CONCURRENT_STREAMS, 10) - .put(RecoverySettings.INDICES_RECOVERY_CONCURRENT_SMALL_FILE_STREAMS, 10) - .put(ThrottlingAllocationDecider.CLUSTER_ROUTING_ALLOCATION_NODE_CONCURRENT_RECOVERIES, 5) - .build(); - } - - /** - * Tests that we can actually recover from a corruption on the primary given that we have replica shards around. - */ - @Test -" --1," private void writeFederationMetadata( - XMLStreamWriter writer, Idp config, Crypto crypto - ) throws XMLStreamException { - - writer.writeStartElement(""md"", ""RoleDescriptor"", WS_FEDERATION_NS); - writer.writeAttribute(SCHEMA_INSTANCE_NS, ""type"", ""fed:SecurityTokenServiceType""); - writer.writeAttribute(""protocolSupportEnumeration"", WS_FEDERATION_NS); - if (config.getServiceDescription() != null && config.getServiceDescription().length() > 0 ) { - writer.writeAttribute(""ServiceDescription"", config.getServiceDescription()); - } - if (config.getServiceDisplayName() != null && config.getServiceDisplayName().length() > 0 ) { - writer.writeAttribute(""ServiceDisplayName"", config.getServiceDisplayName()); - } - - //http://docs.oasis-open.org/security/saml/v2.0/saml-schema-metadata-2.0.xsd - //missing organization, contactperson - - //KeyDescriptor - writer.writeStartElement("""", ""KeyDescriptor"", SAML2_METADATA_NS); - writer.writeAttribute(""use"", ""signing""); - writer.writeStartElement("""", ""KeyInfo"", ""http://www.w3.org/2000/09/xmldsig#""); - writer.writeStartElement("""", ""X509Data"", ""http://www.w3.org/2000/09/xmldsig#""); - writer.writeStartElement("""", ""X509Certificate"", ""http://www.w3.org/2000/09/xmldsig#""); - - try { - String keyAlias = crypto.getDefaultX509Identifier(); - X509Certificate cert = CertsUtils.getX509Certificate(crypto, keyAlias); - writer.writeCharacters(Base64.encode(cert.getEncoded())); - } catch (Exception ex) { - LOG.error(""Failed to add certificate information to metadata. Metadata incomplete"", ex); - } - - writer.writeEndElement(); // X509Certificate - writer.writeEndElement(); // X509Data - writer.writeEndElement(); // KeyInfo - writer.writeEndElement(); // KeyDescriptor - - - // SecurityTokenServiceEndpoint - writer.writeStartElement(""fed"", ""SecurityTokenServiceEndpoint"", WS_FEDERATION_NS); - writer.writeStartElement(""wsa"", ""EndpointReference"", WS_ADDRESSING_NS); - - writer.writeStartElement(""wsa"", ""Address"", WS_ADDRESSING_NS); - writer.writeCharacters(config.getStsUrl().toString()); - - writer.writeEndElement(); // Address - writer.writeEndElement(); // EndpointReference - writer.writeEndElement(); // SecurityTokenServiceEndpoint - - - // PassiveRequestorEndpoint - writer.writeStartElement(""fed"", ""PassiveRequestorEndpoint"", WS_FEDERATION_NS); - writer.writeStartElement(""wsa"", ""EndpointReference"", WS_ADDRESSING_NS); - - writer.writeStartElement(""wsa"", ""Address"", WS_ADDRESSING_NS); - writer.writeCharacters(config.getIdpUrl().toString()); - - writer.writeEndElement(); // Address - writer.writeEndElement(); // EndpointReference - writer.writeEndElement(); // PassiveRequestorEndpoint - - - // create ClaimsType section - if (config.getClaimTypesOffered() != null && config.getClaimTypesOffered().size() > 0) { - writer.writeStartElement(""fed"", ""ClaimTypesOffered"", WS_FEDERATION_NS); - for (Claim claim : config.getClaimTypesOffered()) { - - writer.writeStartElement(""auth"", ""ClaimType"", WS_FEDERATION_NS); - writer.writeAttribute(""Uri"", claim.getClaimType().toString()); - writer.writeAttribute(""Optional"", ""true""); - writer.writeEndElement(); // ClaimType - - } - writer.writeEndElement(); // ClaimTypesOffered - } - - writer.writeEndElement(); // RoleDescriptor - } - - -" --1," public Set getSupportedTypes(ParseContext context) { - return null; - } - - @Override -" --1," public Container getContainer() { - - return (container); - - } - - - /** - * Set the Container with which this Realm has been associated. - * - * @param container The associated Container - */ -" --1," public Set getSupportedTypes(ParseContext context) { - return null; - } - - @Override -" --1," public void testSendEntityMessage() throws Exception { - - MockEndpoint endpoint = getMockEndpoint(""mock:result""); - endpoint.expectedMessageCount(1); - //String message = ""]>&xxe;""; - - String message = """"; - template.sendBody(""direct:start2"", message); - - assertMockEndpointsSatisfied(); - - List list = endpoint.getReceivedExchanges(); - Exchange exchange = list.get(0); - String xml = exchange.getIn().getBody(String.class); - - System.out.println(xml); - } - -" --1," public void execute(FunctionContext context) { - RegionFunctionContext rfc = (RegionFunctionContext) context; - context.getResultSender().lastResult(rfc.getDataSet().size()); - } - - @Override -" --1," public DescriptorImpl getDescriptor() { - return Hudson.getInstance().getDescriptorByType(DescriptorImpl.class); - } - - /** - * Returns the Missed Events playback manager. - * @return GerritMissedEventsPlaybackManager - */ -" --1," public void setAllowJavaSerializedObject(boolean allowJavaSerializedObject) { - this.allowJavaSerializedObject = allowJavaSerializedObject; - } - -" --1," public int doRead(ByteChunk chunk, Request req) throws IOException { - checkError(); - - if (endChunk) { - return -1; - } - - if(needCRLFParse) { - needCRLFParse = false; - parseCRLF(false); - } - - if (remaining <= 0) { - if (!parseChunkHeader()) { - throwIOException(sm.getString(""chunkedInputFilter.invalidHeader"")); - } - if (endChunk) { - parseEndChunk(); - return -1; - } - } - - int result = 0; - - if (pos >= lastValid) { - if (readBytes() < 0) { - throwIOException(sm.getString(""chunkedInputFilter.eos"")); - } - } - - if (remaining > (lastValid - pos)) { - result = lastValid - pos; - remaining = remaining - result; - chunk.setBytes(buf, pos, result); - pos = lastValid; - } else { - result = remaining; - chunk.setBytes(buf, pos, remaining); - pos = pos + remaining; - remaining = 0; - //we need a CRLF - if ((pos+1) >= lastValid) { - //if we call parseCRLF we overrun the buffer here - //so we defer it to the next call BZ 11117 - needCRLFParse = true; - } else { - parseCRLF(false); //parse the CRLF immediately - } - } - - return result; - } - - - // ---------------------------------------------------- InputFilter Methods - - /** - * Read the content length from the request. - */ - @Override -" --1," public byte getValue() { return value; } -" --1," public final Permission getRequiredPermission() { - return Jenkins.ADMINISTER; - } - - /** - * Starts the server's project list updater, send command queue and event manager. - * - */ -" --1," public Object compile(String expression, Map context) throws OgnlException { - Object tree; - if (enableExpressionCache) { - tree = expressions.get(expression); - if (tree == null) { - tree = Ognl.parseExpression(expression); - expressions.putIfAbsent(expression, tree); - } - } else { - tree = Ognl.parseExpression(expression); - } - - if (!enableEvalExpression && isEvalExpression(tree, context)) { - throw new OgnlException(""Eval expressions has been disabled""); - } - - return tree; - } - - /** - * Copies the properties in the object ""from"" and sets them in the object ""to"" - * using specified type converter, or {@link com.opensymphony.xwork2.conversion.impl.XWorkConverter} if none - * is specified. - * - * @param from the source object - * @param to the target object - * @param context the action context we're running under - * @param exclusions collection of method names to excluded from copying ( can be null) - * @param inclusions collection of method names to included copying (can be null) - * note if exclusions AND inclusions are supplied and not null nothing will get copied. - */ -" --1," public SolrInputDocument readDoc(XMLStreamReader parser) throws XMLStreamException { - SolrInputDocument doc = new SolrInputDocument(); - - String attrName = """"; - for (int i = 0; i < parser.getAttributeCount(); i++) { - attrName = parser.getAttributeLocalName(i); - if (""boost"".equals(attrName)) { - doc.setDocumentBoost(Float.parseFloat(parser.getAttributeValue(i))); - } else { - log.warn(""Unknown attribute doc/@"" + attrName); - } - } - - StringBuilder text = new StringBuilder(); - String name = null; - float boost = 1.0f; - boolean isNull = false; - String update = null; - - while (true) { - int event = parser.next(); - switch (event) { - // Add everything to the text - case XMLStreamConstants.SPACE: - case XMLStreamConstants.CDATA: - case XMLStreamConstants.CHARACTERS: - text.append(parser.getText()); - break; - - case XMLStreamConstants.END_ELEMENT: - if (""doc"".equals(parser.getLocalName())) { - return doc; - } else if (""field"".equals(parser.getLocalName())) { - Object v = isNull ? null : text.toString(); - if (update != null) { - Map extendedValue = new HashMap(1); - extendedValue.put(update, v); - v = extendedValue; - } - doc.addField(name, v, boost); - boost = 1.0f; - } - break; - - case XMLStreamConstants.START_ELEMENT: - text.setLength(0); - String localName = parser.getLocalName(); - if (!""field"".equals(localName)) { - log.warn(""unexpected XML tag doc/"" + localName); - throw new SolrException(SolrException.ErrorCode.BAD_REQUEST, - ""unexpected XML tag doc/"" + localName); - } - boost = 1.0f; - update = null; - String attrVal = """"; - for (int i = 0; i < parser.getAttributeCount(); i++) { - attrName = parser.getAttributeLocalName(i); - attrVal = parser.getAttributeValue(i); - if (""name"".equals(attrName)) { - name = attrVal; - } else if (""boost"".equals(attrName)) { - boost = Float.parseFloat(attrVal); - } else if (""null"".equals(attrName)) { - isNull = StrUtils.parseBoolean(attrVal); - } else if (""update"".equals(attrName)) { - update = attrVal; - } else { - log.warn(""Unknown attribute doc/field/@"" + attrName); - } - } - break; - } - } - } -" --1," private AsymmetricCipherKeyPair genKeyPair() - { - if (!initialized) - { - initializeDefault(); - } - - // initialize authenticationPaths and treehash instances - byte[][][] currentAuthPaths = new byte[numLayer][][]; - byte[][][] nextAuthPaths = new byte[numLayer - 1][][]; - Treehash[][] currentTreehash = new Treehash[numLayer][]; - Treehash[][] nextTreehash = new Treehash[numLayer - 1][]; - - Vector[] currentStack = new Vector[numLayer]; - Vector[] nextStack = new Vector[numLayer - 1]; - - Vector[][] currentRetain = new Vector[numLayer][]; - Vector[][] nextRetain = new Vector[numLayer - 1][]; - - for (int i = 0; i < numLayer; i++) - { - currentAuthPaths[i] = new byte[heightOfTrees[i]][mdLength]; - currentTreehash[i] = new Treehash[heightOfTrees[i] - K[i]]; - - if (i > 0) - { - nextAuthPaths[i - 1] = new byte[heightOfTrees[i]][mdLength]; - nextTreehash[i - 1] = new Treehash[heightOfTrees[i] - K[i]]; - } - - currentStack[i] = new Vector(); - if (i > 0) - { - nextStack[i - 1] = new Vector(); - } - } - - // initialize roots - byte[][] currentRoots = new byte[numLayer][mdLength]; - byte[][] nextRoots = new byte[numLayer - 1][mdLength]; - // initialize seeds - byte[][] seeds = new byte[numLayer][mdLength]; - // initialize seeds[] by copying starting-seeds of first trees of each - // layer - for (int i = 0; i < numLayer; i++) - { - System.arraycopy(currentSeeds[i], 0, seeds[i], 0, mdLength); - } - - // initialize rootSigs - currentRootSigs = new byte[numLayer - 1][mdLength]; - - // ------------------------- - // ------------------------- - // --- calculation of current authpaths and current rootsigs (AUTHPATHS, - // SIG)------ - // from bottom up to the root - for (int h = numLayer - 1; h >= 0; h--) - { - GMSSRootCalc tree; - - // on lowest layer no lower root is available, so just call - // the method with null as first parameter - if (h == numLayer - 1) - { - tree = this.generateCurrentAuthpathAndRoot(null, currentStack[h], seeds[h], h); - } - else - // otherwise call the method with the former computed root - // value - { - tree = this.generateCurrentAuthpathAndRoot(currentRoots[h + 1], currentStack[h], seeds[h], h); - } - - // set initial values needed for the private key construction - for (int i = 0; i < heightOfTrees[h]; i++) - { - System.arraycopy(tree.getAuthPath()[i], 0, currentAuthPaths[h][i], 0, mdLength); - } - currentRetain[h] = tree.getRetain(); - currentTreehash[h] = tree.getTreehash(); - System.arraycopy(tree.getRoot(), 0, currentRoots[h], 0, mdLength); - } - - // --- calculation of next authpaths and next roots (AUTHPATHS+, ROOTS+) - // ------ - for (int h = numLayer - 2; h >= 0; h--) - { - GMSSRootCalc tree = this.generateNextAuthpathAndRoot(nextStack[h], seeds[h + 1], h + 1); - - // set initial values needed for the private key construction - for (int i = 0; i < heightOfTrees[h + 1]; i++) - { - System.arraycopy(tree.getAuthPath()[i], 0, nextAuthPaths[h][i], 0, mdLength); - } - nextRetain[h] = tree.getRetain(); - nextTreehash[h] = tree.getTreehash(); - System.arraycopy(tree.getRoot(), 0, nextRoots[h], 0, mdLength); - - // create seed for the Merkle tree after next (nextNextSeeds) - // SEEDs++ - System.arraycopy(seeds[h + 1], 0, this.nextNextSeeds[h], 0, mdLength); - } - // ------------ - - // generate JDKGMSSPublicKey - GMSSPublicKeyParameters publicKey = new GMSSPublicKeyParameters(currentRoots[0], gmssPS); - - // generate the JDKGMSSPrivateKey - GMSSPrivateKeyParameters privateKey = new GMSSPrivateKeyParameters(currentSeeds, nextNextSeeds, currentAuthPaths, - nextAuthPaths, currentTreehash, nextTreehash, currentStack, nextStack, currentRetain, nextRetain, nextRoots, currentRootSigs, gmssPS, digestProvider); - - // return the KeyPair - return (new AsymmetricCipherKeyPair(publicKey, privateKey)); - } - - /** - * calculates the authpath for tree in layer h which starts with seed[h] - * additionally computes the rootSignature of underlaying root - * - * @param currentStack stack used for the treehash instance created by this method - * @param lowerRoot stores the root of the lower tree - * @param seed starting seeds - * @param h actual layer - */ -" --1," public static void redirectToSavedRequest(ServletRequest request, ServletResponse response, String fallbackUrl) - throws IOException { - String successUrl = null; - boolean contextRelative = true; - SavedRequest savedRequest = WebUtils.getAndClearSavedRequest(request); - if (savedRequest != null && savedRequest.getMethod().equalsIgnoreCase(AccessControlFilter.GET_METHOD)) { - successUrl = savedRequest.getRequestUrl(); - contextRelative = false; - } - - if (successUrl == null) { - successUrl = fallbackUrl; - } - - if (successUrl == null) { - throw new IllegalStateException(""Success URL not available via saved request or via the "" + - ""successUrlFallback method parameter. One of these must be non-null for "" + - ""issueSuccessRedirect() to work.""); - } - - WebUtils.issueRedirect(request, response, successUrl, null, contextRelative); - } - -" --1," private void doTestRewrite(String config, String request, String expectedURI) throws Exception { - Tomcat tomcat = getTomcatInstance(); - - // No file system docBase required - Context ctx = tomcat.addContext("""", null); - - RewriteValve rewriteValve = new RewriteValve(); - ctx.getPipeline().addValve(rewriteValve); - - rewriteValve.setConfiguration(config); - - // Note: URLPatterns should be URL encoded - // (http://svn.apache.org/r285186) - Tomcat.addServlet(ctx, ""snoop"", new SnoopServlet()); - ctx.addServletMapping(""/a/%255A"", ""snoop""); - ctx.addServletMapping(""/c/*"", ""snoop""); - Tomcat.addServlet(ctx, ""default"", new DefaultServlet()); - ctx.addServletMapping(""/"", ""default""); - - tomcat.start(); - - ByteChunk res = getUrl(""http://localhost:"" + getPort() + request); - - String body = res.toString(); - RequestDescriptor requestDesc = SnoopResult.parse(body); - String requestURI = requestDesc.getRequestInfo(""REQUEST-URI""); - Assert.assertEquals(expectedURI, requestURI); - } -" --1," protected void setLocation(String location) { - this.location = location; - } - -" --1," protected String adjustFilterForJoin(String filter) { - if (StringUtils.hasText(filter)) { - filter = filter.replace(""displayName"", ""g.displayName""); - filter = filter.replace(""externalGroup"", ""gm.external_group""); - filter = filter.replace(""groupId"", ""g.id""); - filter = filter.replace(""origin"", ""gm.origin""); - } - return filter; - } - - @Override -" --1," private static void disableFeature(DocumentBuilderFactory dbfactory, String feature) { - try { - dbfactory.setFeature(feature, true); - } catch (ParserConfigurationException e) { - // This should catch a failed setFeature feature - log.info(""ParserConfigurationException was thrown. The feature '"" + - feature + ""' is probably not supported by your XML processor.""); - } - } -" --1," private static LinkedHashMap> processMap( - LinkedHashMap> requestMap, - ExpressionParser parser) { - Assert.notNull(parser, ""SecurityExpressionHandler returned a null parser object""); - - LinkedHashMap> requestToExpressionAttributesMap = new LinkedHashMap>( - requestMap); - - for (Map.Entry> entry : requestMap - .entrySet()) { - RequestMatcher request = entry.getKey(); - Assert.isTrue(entry.getValue().size() == 1, - ""Expected a single expression attribute for "" + request); - ArrayList attributes = new ArrayList(1); - String expression = entry.getValue().toArray(new ConfigAttribute[1])[0] - .getAttribute(); - logger.debug(""Adding web access control expression '"" + expression + ""', for "" - + request); - - AbstractVariableEvaluationContextPostProcessor postProcessor = createPostProcessor( - request); - try { - attributes.add(new WebExpressionConfigAttribute( - parser.parseExpression(expression), postProcessor)); - } - catch (ParseException e) { - throw new IllegalArgumentException( - ""Failed to parse expression '"" + expression + ""'""); - } - - requestToExpressionAttributesMap.put(request, attributes); - } - - return requestToExpressionAttributesMap; - } - -" --1," public T create() { - final ByteArrayOutputStream baos = new ByteArrayOutputStream(512); - ByteArrayInputStream bais = null; - try { - final ObjectOutputStream out = new ObjectOutputStream(baos); - out.writeObject(iPrototype); - - bais = new ByteArrayInputStream(baos.toByteArray()); - final ObjectInputStream in = new ObjectInputStream(bais); - return (T) in.readObject(); - - } catch (final ClassNotFoundException ex) { - throw new FunctorException(ex); - } catch (final IOException ex) { - throw new FunctorException(ex); - } finally { - try { - if (bais != null) { - bais.close(); - } - } catch (final IOException ex) { - // ignore - } - try { - baos.close(); - } catch (final IOException ex) { - // ignore - } - } - } - } - -} -" --1," private File getFile(String fn) throws IOException { - File tmp = null; - - String path = System.getProperty(""java.io.tmpdir"") + TMP; - File dir = new File(path); - if (!dir.exists()) { - LOGGER.fine(""Creating directory. Path: "" + dir.getCanonicalPath()); - Files.createDirectories(dir.toPath()); - } - tmp = new File(dir, fn); - LOGGER.fine(""Temp file: "" + tmp.getCanonicalPath()); - - return tmp; - } -" --1," private Object readResolve() { - throw new UnsupportedOperationException(); - } - - /* Traverseproc implementation */ - @Override -" --1," public Document getMetaData(Idp config, TrustedIdp serviceConfig) throws ProcessingException { - - try { - Crypto crypto = CertsUtils.createCrypto(config.getCertificate()); - - W3CDOMStreamWriter writer = new W3CDOMStreamWriter(); - - writer.writeStartDocument(""UTF-8"", ""1.0""); - - String referenceID = IDGenerator.generateID(""_""); - writer.writeStartElement(""md"", ""EntityDescriptor"", SAML2_METADATA_NS); - writer.writeAttribute(""ID"", referenceID); - - String serviceURL = config.getIdpUrl().toString(); - writer.writeAttribute(""entityID"", serviceURL); - - writer.writeNamespace(""md"", SAML2_METADATA_NS); - writer.writeNamespace(""fed"", WS_FEDERATION_NS); - writer.writeNamespace(""wsa"", WS_ADDRESSING_NS); - writer.writeNamespace(""auth"", WS_FEDERATION_NS); - writer.writeNamespace(""xsi"", SCHEMA_INSTANCE_NS); - - if (""http://docs.oasis-open.org/wsfed/federation/200706"".equals(serviceConfig.getProtocol())) { - writeFederationMetadata(writer, serviceConfig, serviceURL); - } else if (""urn:oasis:names:tc:SAML:2.0:profiles:SSO:browser"".equals(serviceConfig.getProtocol())) { - writeSAMLMetadata(writer, serviceConfig, serviceURL, crypto); - } - - writer.writeEndElement(); // EntityDescriptor - - writer.writeEndDocument(); - - writer.close(); - - if (LOG.isDebugEnabled()) { - String out = DOM2Writer.nodeToString(writer.getDocument()); - LOG.debug(""***************** unsigned ****************""); - LOG.debug(out); - LOG.debug(""***************** unsigned ****************""); - } - - Document result = SignatureUtils.signMetaInfo(crypto, null, config.getCertificatePassword(), - writer.getDocument(), referenceID); - if (result != null) { - return result; - } else { - throw new RuntimeException(""Failed to sign the metadata document: result=null""); - } - } catch (ProcessingException e) { - throw e; - } catch (Exception e) { - LOG.error(""Error creating service metadata information "", e); - throw new ProcessingException(""Error creating service metadata information: "" + e.getMessage()); - } - - } - -" --1," protected BlobStore blobStore() { - return blobStore; - } - - /** - * {@inheritDoc} - */ - @Override -" --1," public void recycle(boolean socketClosing) { - super.recycle(socketClosing); - - inputBuffer.clear(); - inputBuffer.limit(0); - outputBuffer.clear(); - - } -" --1," public void winzipBackSlashWorkaround() throws Exception { - ZipArchiveInputStream in = null; - try { - in = new ZipArchiveInputStream(new FileInputStream(getFile(""test-winzip.zip""))); - ZipArchiveEntry zae = in.getNextZipEntry(); - zae = in.getNextZipEntry(); - zae = in.getNextZipEntry(); - assertEquals(""\u00e4/"", zae.getName()); - } finally { - if (in != null) { - in.close(); - } - } - } - - /** - * @see ""https://issues.apache.org/jira/browse/COMPRESS-189"" - */ - @Test -" --1," public long getAvailable() { - - return (this.available); - - } - - - /** - * Set the available date/time for this servlet, in milliseconds since the - * epoch. If this date/time is Long.MAX_VALUE, it is considered to mean - * that unavailability is permanent and any request for this servlet will return - * an SC_NOT_FOUND error. If this date/time is in the future, any request for - * this servlet will return an SC_SERVICE_UNAVAILABLE error. - * - * @param available The new available date/time - */ - @Override -" --1," public String toString() - { - return name; - } - } - -} -" --1," public T transform(final Class input) { - try { - if (input == null) { - throw new FunctorException( - ""InstantiateTransformer: Input object was not an instanceof Class, it was a null object""); - } - final Constructor con = input.getConstructor(iParamTypes); - return con.newInstance(iArgs); - } catch (final NoSuchMethodException ex) { - throw new FunctorException(""InstantiateTransformer: The constructor must exist and be public ""); - } catch (final InstantiationException ex) { - throw new FunctorException(""InstantiateTransformer: InstantiationException"", ex); - } catch (final IllegalAccessException ex) { - throw new FunctorException(""InstantiateTransformer: Constructor must be public"", ex); - } catch (final InvocationTargetException ex) { - throw new FunctorException(""InstantiateTransformer: Constructor threw an exception"", ex); - } - } - -" --1," public String getTreeDigest() - { - return DigestUtil.getXMSSDigestName(treeDigest); - } -" --1," public void run() { - try { - LOGGER.info(""Initiating a re-keying of secrets. See ""+getLogFile()); - StreamTaskListener listener = new StreamTaskListener(getLogFile()); - try { - PrintStream log = listener.getLogger(); - log.println(""Started re-keying "" + new Date()); - int count = rewriter.rewriteRecursive(Jenkins.getInstance().getRootDir(), listener); - log.printf(""Completed re-keying %d files on %s\n"",count,new Date()); - new RekeySecretAdminMonitor().done.on(); - LOGGER.info(""Secret re-keying completed""); - } catch (Exception e) { - LOGGER.log(Level.SEVERE, ""Fatal failure in re-keying secrets"",e); - e.printStackTrace(listener.error(""Fatal failure in rewriting secrets"")); - } - } catch (IOException e) { - LOGGER.log(Level.SEVERE, ""Catastrophic failure to rewrite secrets"",e); - } - } - } - - private static final Logger LOGGER = Logger.getLogger(RekeySecretAdminMonitor.class.getName()); - -} -" --1," protected BlobPath basePath() { - return basePath; - } -" --1," public ServerSocket createServerSocket(int port) throws IOException { - SSLServerSocket sslServerSocket = - (SSLServerSocket) sslServerSocketFactory.createServerSocket(port, 0, bindAddress); - if (getEnabledCipherSuites() != null) { - sslServerSocket.setEnabledCipherSuites(getEnabledCipherSuites()); - } - if (getEnabledProtocols() == null) { - sslServerSocket.setEnabledProtocols(defaultProtocols); - } else { - sslServerSocket.setEnabledProtocols(getEnabledProtocols()); - } - sslServerSocket.setNeedClientAuth(getNeedClientAuth()); - return sslServerSocket; - } - } -} -" --1," protected boolean statusDropsConnection(int status) { - return status == 400 /* SC_BAD_REQUEST */ || - status == 408 /* SC_REQUEST_TIMEOUT */ || - status == 411 /* SC_LENGTH_REQUIRED */ || - status == 413 /* SC_REQUEST_ENTITY_TOO_LARGE */ || - status == 414 /* SC_REQUEST_URI_TOO_LARGE */ || - status == 500 /* SC_INTERNAL_SERVER_ERROR */ || - status == 503 /* SC_SERVICE_UNAVAILABLE */ || - status == 501 /* SC_NOT_IMPLEMENTED */; - } - -" --1," public void setExpressionParser(ExpressionParser expressionParser) { - this.expressionParser = expressionParser; - } - - /** - * Sets the service to use to expose formatters for field values. - * @param conversionService the conversion service - */ -" --1," void setAllowJavaSerializedObject(boolean allowJavaSerializedObject); - - /** - * Gets the header filter strategy - * - * @return the strategy - */ -" --1," protected String savedRequestURL(Session session) { - - SavedRequest saved = - (SavedRequest) session.getNote(Constants.FORM_REQUEST_NOTE); - if (saved == null) { - return (null); - } - StringBuilder sb = new StringBuilder(saved.getRequestURI()); - if (saved.getQueryString() != null) { - sb.append('?'); - sb.append(saved.getQueryString()); - } - return (sb.toString()); - - } - - -" --1," public static String getAttributeValueEmptyNull(Element e, String attributeName) { - Attr node = e.getAttributeNode(attributeName); - if (node == null) { - return null; - } - return node.getValue(); - } - - /** - * Get the trimmed text content of a node or null if there is no text - */ -" --1," private boolean evaluate(String text) { - try { - InputSource inputSource = new InputSource(new StringReader(text)); - Document inputDocument = builder.parse(inputSource); - return ((Boolean) xpath.evaluate(xpathExpression, inputDocument, XPathConstants.BOOLEAN)).booleanValue(); - } catch (Exception e) { - return false; - } - } - - @Override -" --1," public void destroy() { - // NO-OP - } - -" --1," public void initialize( - AlgorithmParameterSpec params, - SecureRandom random) - throws InvalidAlgorithmParameterException - { - if (!(params instanceof DSAParameterSpec)) - { - throw new InvalidAlgorithmParameterException(""parameter object not a DSAParameterSpec""); - } - DSAParameterSpec dsaParams = (DSAParameterSpec)params; - - param = new DSAKeyGenerationParameters(random, new DSAParameters(dsaParams.getP(), dsaParams.getQ(), dsaParams.getG())); - - engine.init(param); - initialised = true; - } - -" --1," public static String nodeMode() { - Builder builder = ImmutableSettings.builder(); - if (Strings.isEmpty(System.getProperty(""es.node.mode"")) && Strings.isEmpty(System.getProperty(""es.node.local""))) { - return ""local""; // default if nothing is specified - } - if (Strings.hasLength(System.getProperty(""es.node.mode""))) { - builder.put(""node.mode"", System.getProperty(""es.node.mode"")); - } - if (Strings.hasLength(System.getProperty(""es.node.local""))) { - builder.put(""node.local"", System.getProperty(""es.node.local"")); - } - if (DiscoveryNode.localNode(builder.build())) { - return ""local""; - } else { - return ""network""; - } - } - - @Override -" --1," public AsymmetricCipherKeyPair generateKeyPair() - { - return genKeyPair(); - } -" --1," public synchronized void save() throws IOException { - super.save(); - updateTransientActions(); - } - - @Override -" --1," public static ASN1Integer getInstance( - ASN1TaggedObject obj, - boolean explicit) - { - ASN1Primitive o = obj.getObject(); - - if (explicit || o instanceof ASN1Integer) - { - return getInstance(o); - } - else - { - return new ASN1Integer(ASN1OctetString.getInstance(obj.getObject()).getOctets()); - } - } - -" --1," public void testNoRewrite() throws Exception { - doTestRewrite("""", ""/a/%255A"", ""/a/%255A""); - } - - @Test -" --1," public void execute(String key, ActionMapping mapping) { - String name = key.substring(ACTION_PREFIX.length()); - if (allowDynamicMethodCalls) { - int bang = name.indexOf('!'); - if (bang != -1) { - String method = name.substring(bang + 1); - mapping.setMethod(method); - name = name.substring(0, bang); - } - } - mapping.setName(cleanupActionName(name)); - } - }); - - } - }; - } - - /** - * Adds a parameter action. Should only be called during initialization - * - * @param prefix The string prefix to trigger the action - * @param parameterAction The parameter action to execute - * @since 2.1.0 - */ -" --1," public Collection getRequiredPermissions(String regionName) { - return Collections.singletonList(new ResourcePermission(ResourcePermission.Resource.DATA, - ResourcePermission.Operation.READ, regionName)); - } - -" --1," public T create() { - // needed for post-serialization - if (iConstructor == null) { - findConstructor(); - } - - try { - return iConstructor.newInstance(iArgs); - } catch (final InstantiationException ex) { - throw new FunctorException(""InstantiateFactory: InstantiationException"", ex); - } catch (final IllegalAccessException ex) { - throw new FunctorException(""InstantiateFactory: Constructor must be public"", ex); - } catch (final InvocationTargetException ex) { - throw new FunctorException(""InstantiateFactory: Constructor threw an exception"", ex); - } - } - -" --1," public void parseEmbedded( - InputStream stream, ContentHandler handler, Metadata metadata, boolean outputHtml) - throws SAXException, IOException { - if(outputHtml) { - AttributesImpl attributes = new AttributesImpl(); - attributes.addAttribute("""", ""class"", ""class"", ""CDATA"", ""package-entry""); - handler.startElement(XHTML, ""div"", ""div"", attributes); - } - - String name = metadata.get(Metadata.RESOURCE_NAME_KEY); - if (name != null && name.length() > 0 && outputHtml) { - handler.startElement(XHTML, ""h1"", ""h1"", new AttributesImpl()); - char[] chars = name.toCharArray(); - handler.characters(chars, 0, chars.length); - handler.endElement(XHTML, ""h1"", ""h1""); - } - - // Use the delegate parser to parse this entry - try (TemporaryResources tmp = new TemporaryResources()) { - final TikaInputStream newStream = TikaInputStream.get(new CloseShieldInputStream(stream), tmp); - if (stream instanceof TikaInputStream) { - final Object container = ((TikaInputStream) stream).getOpenContainer(); - if (container != null) { - newStream.setOpenContainer(container); - } - } - DELEGATING_PARSER.parse( - newStream, - new EmbeddedContentHandler(new BodyContentHandler(handler)), - metadata, context); - } catch (EncryptedDocumentException ede) { - // TODO: can we log a warning that we lack the password? - // For now, just skip the content - } catch (CorruptedFileException e) { - throw new IOExceptionWithCause(e); - } catch (TikaException e) { - // TODO: can we log a warning somehow? - // Could not parse the entry, just skip the content - } - - if(outputHtml) { - handler.endElement(XHTML, ""div"", ""div""); - } - } - -" --1," private void checkParams() - { - if (vi == null) - { - throw new IllegalArgumentException(""no layers defined.""); - } - if (vi.length > 1) - { - for (int i = 0; i < vi.length - 1; i++) - { - if (vi[i] >= vi[i + 1]) - { - throw new IllegalArgumentException( - ""v[i] has to be smaller than v[i+1]""); - } - } - } - else - { - throw new IllegalArgumentException( - ""Rainbow needs at least 1 layer, such that v1 < v2.""); - } - } - - /** - * Getter for the number of layers - * - * @return the number of layers - */ -" --1," public void markPaused() { - paused = true; - } - } - - // ---------------------------------------------------- Wrapper Inner Class - - - protected static class MappedWrapper extends MapElement { - - public final boolean jspWildCard; - public final boolean resourceOnly; - - public MappedWrapper(String name, Wrapper wrapper, boolean jspWildCard, - boolean resourceOnly) { - super(name, wrapper); - this.jspWildCard = jspWildCard; - this.resourceOnly = resourceOnly; - } - } -} -" --1," public String getUsername() { - return username; - } - -" --1," public boolean isMapHeaders() { - return mapHeaders; - } - - /** - * If this option is enabled, then during binding from Spark to Camel Message then the headers will be mapped as well - * (eg added as header to the Camel Message as well). You can turn off this option to disable this. - * The headers can still be accessed from the org.apache.camel.component.sparkrest.SparkMessage message with the - * method getRequest() that returns the Spark HTTP request instance. - */ -" --1," public int[] getVi() - { - return this.vi; - } -" --1," public void setUp() throws Exception { - int randomInt = new SecureRandom().nextInt(); - - String adminAccessToken = testClient.getOAuthAccessToken(""admin"", ""adminsecret"", ""client_credentials"", ""clients.read clients.write clients.secret""); - - String scimClientId = ""scim"" + randomInt; - testClient.createScimClient(adminAccessToken, scimClientId); - - String scimAccessToken = testClient.getOAuthAccessToken(scimClientId, ""scimsecret"", ""client_credentials"", ""scim.read scim.write password.write""); - - userEmail = ""user"" + randomInt + ""@example.com""; - testClient.createUser(scimAccessToken, userEmail, userEmail, PASSWORD, true); - } - - @Test -" --1," public final void invoke(Request request, Response response) - throws IOException, ServletException { - - // Select the Context to be used for this Request - Context context = request.getContext(); - if (context == null) { - response.sendError(HttpServletResponse.SC_INTERNAL_SERVER_ERROR, - sm.getString(""standardHost.noContext"")); - return; - } - - if (request.isAsyncSupported()) { - request.setAsyncSupported(context.getPipeline().isAsyncSupported()); - } - - boolean asyncAtStart = request.isAsync(); - boolean asyncDispatching = request.isAsyncDispatching(); - - try { - context.bind(Globals.IS_SECURITY_ENABLED, MY_CLASSLOADER); - - if (!asyncAtStart && !context.fireRequestInitEvent(request.getRequest())) { - // Don't fire listeners during async processing (the listener - // fired for the request that called startAsync()). - // If a request init listener throws an exception, the request - // is aborted. - return; - } - - // Ask this Context to process this request. Requests that are in - // async mode and are not being dispatched to this resource must be - // in error and have been routed here to check for application - // defined error pages. - try { - if (!asyncAtStart || asyncDispatching) { - context.getPipeline().getFirst().invoke(request, response); - } else { - // Make sure this request/response is here because an error - // report is required. - if (!response.isErrorReportRequired()) { - throw new IllegalStateException(sm.getString(""standardHost.asyncStateError"")); - } - } - } catch (Throwable t) { - ExceptionUtils.handleThrowable(t); - container.getLogger().error(""Exception Processing "" + request.getRequestURI(), t); - // If a new error occurred while trying to report a previous - // error allow the original error to be reported. - if (!response.isErrorReportRequired()) { - request.setAttribute(RequestDispatcher.ERROR_EXCEPTION, t); - throwable(request, response, t); - } - } - - // Now that the request/response pair is back under container - // control lift the suspension so that the error handling can - // complete and/or the container can flush any remaining data - response.setSuspended(false); - - Throwable t = (Throwable) request.getAttribute(RequestDispatcher.ERROR_EXCEPTION); - - // Protect against NPEs if the context was destroyed during a - // long running request. - if (!context.getState().isAvailable()) { - return; - } - - // Look for (and render if found) an application level error page - if (response.isErrorReportRequired()) { - if (t != null) { - throwable(request, response, t); - } else { - status(request, response); - } - } - - if (!request.isAsync() && !asyncAtStart) { - context.fireRequestDestroyEvent(request.getRequest()); - } - } finally { - // Access a session (if present) to update last accessed time, based - // on a strict interpretation of the specification - if (ACCESS_SESSION) { - request.getSession(false); - } - - context.unbind(Globals.IS_SECURITY_ENABLED, MY_CLASSLOADER); - } - } - - - // -------------------------------------------------------- Private Methods - - /** - * Handle the HTTP status code (and corresponding message) generated - * while processing the specified Request to produce the specified - * Response. Any exceptions that occur during generation of the error - * report are logged and swallowed. - * - * @param request The request being processed - * @param response The response being generated - */ -" --1," private T run(PrivilegedExceptionAction action) throws Exception { - return System.getSecurityManager() != null ? AccessController.doPrivileged( action ) : action.run(); - } -" --1," public void setUp() throws Exception { - sshKey = SshdServerMock.generateKeyPair(); - System.setProperty(PluginImpl.TEST_SSH_KEYFILE_LOCATION_PROPERTY, sshKey.getPrivateKey().getAbsolutePath()); - server = new SshdServerMock(); - sshd = SshdServerMock.startServer(server); - server.returnCommandFor(""gerrit ls-projects"", SshdServerMock.EofCommandMock.class); - server.returnCommandFor(GERRIT_STREAM_EVENTS, SshdServerMock.CommandMock.class); - server.returnCommandFor(""gerrit review.*"", SshdServerMock.EofCommandMock.class); - server.returnCommandFor(""gerrit version"", SshdServerMock.EofCommandMock.class); - } - - /** - * Runs after test method. - * - * @throws Exception throw if so. - */ - @After -" --1," public boolean getSource_location() { - return m_source_location; - } - -" --1," public void setCoyoteRequest(org.apache.coyote.Request coyoteRequest) { - this.coyoteRequest = coyoteRequest; - inputBuffer.setRequest(coyoteRequest); - } - - /** - * Get the Coyote request. - */ -" --1," public ExpressionInterceptUrlRegistry access(String attribute) { - if (not) { - attribute = ""!"" + attribute; - } - interceptUrl(requestMatchers, SecurityConfig.createList(attribute)); - return ExpressionUrlAuthorizationConfigurer.this.REGISTRY; - } - } -} -" --1," private @CheckForNull File getDirectChild(File parentFile, String childPath){ - File current = new File(parentFile, childPath); - while (current != null && !parentFile.equals(current.getParentFile())) { - current = current.getParentFile(); - } - return current; - } - } - - private static final SoloFilePathFilter UNRESTRICTED = SoloFilePathFilter.wrap(FilePathFilter.UNRESTRICTED); -} -" --1," public static boolean containsExpression(String expr) { - return expr.contains(""%{"") && expr.contains(""}""); - } - -" --1," public void derIntegerTest() - throws Exception - { - try - { - new ASN1Integer(new byte[] { 0, 0, 0, 1}); - } - catch (IllegalArgumentException e) - { - isTrue(""wrong exc"", ""malformed integer"".equals(e.getMessage())); - } - - try - { - new ASN1Integer(new byte[] {(byte)0xff, (byte)0x80, 0, 1}); - } - catch (IllegalArgumentException e) - { - isTrue(""wrong exc"", ""malformed integer"".equals(e.getMessage())); - } - - try - { - new ASN1Enumerated(new byte[] { 0, 0, 0, 1}); - } - catch (IllegalArgumentException e) - { - isTrue(""wrong exc"", ""malformed enumerated"".equals(e.getMessage())); - } - - try - { - new ASN1Enumerated(new byte[] {(byte)0xff, (byte)0x80, 0, 1}); - } - catch (IllegalArgumentException e) - { - isTrue(""wrong exc"", ""malformed enumerated"".equals(e.getMessage())); - } - } - -" --1," public void cleanUp() { - Set names = files.keySet(); - for (String name : names) { - List items = files.get(name); - for (FileItem item : items) { - if (LOG.isDebugEnabled()) { - String msg = LocalizedTextUtil.findText(this.getClass(), ""struts.messages.removing.file"", - Locale.ENGLISH, ""no.message.found"", new Object[]{name, item}); - LOG.debug(msg); - } - if (!item.isInMemory()) { - item.delete(); - } - } - } - } - -" --1," protected JDBCTableReader getTableReader(Connection connection, String tableName, EmbeddedDocumentUtil embeddedDocumentUtil) { - return new SQLite3TableReader(connection, tableName, embeddedDocumentUtil); - } -" --1," public Character decodeCharacter( PushbackString input ) { - input.mark(); - Character first = input.next(); - if ( first == null ) { - input.reset(); - return null; - } - - // if this is not an encoded character, return null - if (first != '%' ) { - input.reset(); - return null; - } - - // Search for exactly 2 hex digits following - StringBuilder sb = new StringBuilder(); - for ( int i=0; i<2; i++ ) { - Character c = input.nextHex(); - if ( c != null ) sb.append( c ); - } - if ( sb.length() == 2 ) { - try { - // parse the hex digit and create a character - int i = Integer.parseInt(sb.toString(), 16); - if (Character.isValidCodePoint(i)) { - return (char) i; - } - } catch( NumberFormatException ignored ) { } - } - input.reset(); - return null; - } - -" --1," public String getPathname() { - - return pathname; - - } - - - /** - * Set the pathname of our XML file containing user definitions. If a - * relative pathname is specified, it is resolved against ""catalina.base"". - * - * @param pathname The new pathname - */ -" --1," public boolean isSecureProcessing() - { - return m_isSecureProcessing; - } -" --1," public void write(OutputStream outputStream) - throws IOException, WebApplicationException { - Writer writer = new OutputStreamWriter(outputStream, UTF_8); - ContentHandler content; - - try { - SAXTransformerFactory factory = (SAXTransformerFactory) SAXTransformerFactory.newInstance(); - TransformerHandler handler = factory.newTransformerHandler(); - handler.getTransformer().setOutputProperty(OutputKeys.METHOD, format); - handler.getTransformer().setOutputProperty(OutputKeys.INDENT, ""yes""); - handler.getTransformer().setOutputProperty(OutputKeys.ENCODING, UTF_8.name()); - handler.setResult(new StreamResult(writer)); - content = new ExpandedTitleContentHandler(handler); - } catch (TransformerConfigurationException e) { - throw new WebApplicationException(e); - } - - parse(parser, LOG, info.getPath(), is, content, metadata, context); - } - }; - } -} -" --1," private boolean isSameAs( - byte[] a, - byte[] b) - { - if (a.length != b.length) - { - return false; - } - - for (int i = 0; i != a.length; i++) - { - if (a[i] != b[i]) - { - return false; - } - } - - return true; - } - -" --1," private void testModified() - throws Exception - { - KeyFactory kFact = KeyFactory.getInstance(""DSA"", ""BC""); - PublicKey pubKey = kFact.generatePublic(PUBLIC_KEY); - Signature sig = Signature.getInstance(""DSA"", ""BC""); - - for (int i = 0; i != MODIFIED_SIGNATURES.length; i++) - { - sig.initVerify(pubKey); - - sig.update(Strings.toByteArray(""Hello"")); - - boolean failed; - - try - { - failed = !sig.verify(Hex.decode(MODIFIED_SIGNATURES[i])); - } - catch (SignatureException e) - { - failed = true; - } - - isTrue(""sig verified when shouldn't"", failed); - } - } - -" --1," public LockoutPolicyRetriever getLockoutPolicyRetriever() { - return lockoutPolicyRetriever; - } -" --1," public void close() throws IOException { - if (!closed) { - synchronized (this) { - if (!closed) { - closed = true; - socket.close(); - } - } - } - } - -" --1," protected abstract void recycleInternal(); -" --1," public static JWTDecoder getInstance() { - if (instance == null) { - instance = new JWTDecoder(); - } - - return instance; - } - - /** - * Decode the JWT using one of they provided verifiers. One more verifiers may be provided, the first verifier found - * supporting the algorithm reported by the JWT header will be utilized. - *

- * A JWT that is expired or not yet valid will not be decoded, instead a {@link JWTExpiredException} or {@link - * JWTUnavailableForProcessingException} exception will be thrown respectively. - * - * @param encodedJWT The encoded JWT in string format. - * @param verifiers A map of verifiers. - * @return a decoded JWT. - */ -" --1," public boolean check(String path, Resource resource) - { - int slash = path.lastIndexOf('/'); - if (slash<0 || resource.exists()) - return false; - String suffix=path.substring(slash); - return resource.getAlias().toString().endsWith(suffix); - } - } -} -" --1," public void setMaxParameterCount(int maxParameterCount) { - this.maxParameterCount = maxParameterCount; - } - - - /** - * Return the maximum size of a POST which will be automatically - * parsed by the container. - */ -" --1," protected boolean requiresAuthentication(final HttpServletRequest request, final HttpServletResponse response) { - boolean result = request.getRequestURI().contains(getFilterProcessesUrl()); - result |= isTokenExpired(); - if (logger.isDebugEnabled()) { - logger.debug(""requiresAuthentication = "" + result); - } - return result; - } - -" --1," public JettyContentExchange createContentExchange() { - return new JettyContentExchange9(); - } -" --1," protected void populateResponse(Exchange exchange, JettyContentExchange httpExchange, - Message in, HeaderFilterStrategy strategy, int responseCode) throws IOException { - Message answer = exchange.getOut(); - - answer.setHeader(Exchange.HTTP_RESPONSE_CODE, responseCode); - - // must use response fields to get the http headers as - // httpExchange.getHeaders() does not work well with multi valued headers - Map> headers = httpExchange.getResponseHeaders(); - for (Map.Entry> ent : headers.entrySet()) { - String name = ent.getKey(); - Collection values = ent.getValue(); - for (String value : values) { - if (name.toLowerCase().equals(""content-type"")) { - name = Exchange.CONTENT_TYPE; - exchange.setProperty(Exchange.CHARSET_NAME, IOHelper.getCharsetNameFromContentType(value)); - } - if (strategy != null && !strategy.applyFilterToExternalHeaders(name, value, exchange)) { - HttpHelper.appendHeader(answer.getHeaders(), name, value); - } - } - } - - // preserve headers from in by copying any non existing headers - // to avoid overriding existing headers with old values - // We also need to apply the httpProtocolHeaderFilterStrategy to filter the http protocol header - MessageHelper.copyHeaders(exchange.getIn(), answer, httpProtocolHeaderFilterStrategy, false); - - // extract body after headers has been set as we want to ensure content-type from Jetty HttpExchange - // has been populated first - answer.setBody(extractResponseBody(exchange, httpExchange)); - } - -" --1," protected boolean isAuthorizedToSwitchToIdentityZone(String identityZoneId) { - Authentication authentication = SecurityContextHolder.getContext().getAuthentication(); - boolean hasScope = OAuth2ExpressionUtils.hasAnyScope(authentication, getZoneSwitchingScopes(identityZoneId)); - boolean isUaa = IdentityZoneHolder.isUaa(); - boolean isTokenAuth = (authentication instanceof OAuth2Authentication); - return isTokenAuth && isUaa && hasScope; - } - -" --1," protected static void copyBytes(byte[] b, int dest, int src, int len) { - for (int pos = 0; pos < len; pos++) { - b[pos + dest] = b[pos + src]; - } - } - - -" --1," public String getSessionId() - throws IOException { - // Look up the current SSLSession - SSLSession session = ssl.getSession(); - if (session == null) - return null; - // Expose ssl_session (getId) - byte [] ssl_session = session.getId(); - if ( ssl_session == null) - return null; - StringBuffer buf=new StringBuffer(""""); - for(int x=0; x2) digit=digit.substring(digit.length()-2); - buf.append(digit); - } - return buf.toString(); - } - - -" --1," private void login(String clientId) throws Exception { - getMockMvc().perform(post(""/oauth/token"") - .accept(MediaType.APPLICATION_JSON_VALUE) - .header(""Authorization"", ""Basic "" + new String(Base64.encode((clientId + "":"" + SECRET).getBytes()))) - .param(""grant_type"", ""client_credentials"") - ) - .andExpect(status().isOk()) - .andReturn().getResponse().getContentAsString(); - } - - @Test -" --1," public abstract JettyContentExchange createContentExchange(); - -" --1," public void testParameterNameAware() { - ParametersInterceptor pi = createParametersInterceptor(); - final Map actual = injectValueStackFactory(pi); - ValueStack stack = createStubValueStack(actual); - final Map expected = new HashMap() { - { - put(""fooKey"", ""fooValue""); - put(""barKey"", ""barValue""); - } - }; - Object a = new ParameterNameAware() { - public boolean acceptableParameterName(String parameterName) { - return expected.containsKey(parameterName); - } - }; - Map parameters = new HashMap() { - { - put(""fooKey"", ""fooValue""); - put(""barKey"", ""barValue""); - put(""error"", ""error""); - } - }; - pi.setParameters(a, stack, parameters); - assertEquals(expected, actual); - } - -" --1," protected CloseButtonBehavior newCloseButtonBehavior() - { - return new CloseButtonBehavior(); - } -" --1," public void repositoryVerificationTimeoutTest() throws Exception { - Client client = client(); - - Settings settings = ImmutableSettings.settingsBuilder() - .put(""location"", randomRepoPath()) - .put(""random_control_io_exception_rate"", 1.0).build(); - logger.info(""--> creating repository that cannot write any files - should fail""); - assertThrows(client.admin().cluster().preparePutRepository(""test-repo-1"") - .setType(MockRepositoryModule.class.getCanonicalName()).setSettings(settings), - RepositoryVerificationException.class); - - logger.info(""--> creating repository that cannot write any files, but suppress verification - should be acked""); - assertAcked(client.admin().cluster().preparePutRepository(""test-repo-1"") - .setType(MockRepositoryModule.class.getCanonicalName()).setSettings(settings).setVerify(false)); - - logger.info(""--> verifying repository""); - assertThrows(client.admin().cluster().prepareVerifyRepository(""test-repo-1""), RepositoryVerificationException.class); - - File location = randomRepoPath(); - - logger.info(""--> creating repository""); - try { - client.admin().cluster().preparePutRepository(""test-repo-1"") - .setType(MockRepositoryModule.class.getCanonicalName()) - .setSettings(ImmutableSettings.settingsBuilder() - .put(""location"", location) - .put(""localize_location"", true) - ).get(); - fail(""RepositoryVerificationException wasn't generated""); - } catch (RepositoryVerificationException ex) { - assertThat(ex.getMessage(), containsString(""is not shared"")); - } - } - -" --1," private static void log( String s ) { - if (log.isDebugEnabled()) - log.debug(""URLDecoder: "" + s ); - } - -" --1," private boolean evaluate(String text) { - try { - InputSource inputSource = new InputSource(new StringReader(text)); - Document inputDocument = builder.parse(inputSource); - return ((Boolean)xpath.evaluate(xpathExpression, inputDocument, XPathConstants.BOOLEAN)).booleanValue(); - } catch (Exception e) { - return false; - } - } - - @Override -" --1," public void basicWorkFlowTest() throws Exception { - Client client = client(); - - logger.info(""--> creating repository""); - assertAcked(client.admin().cluster().preparePutRepository(""test-repo"") - .setType(""fs"").setSettings(ImmutableSettings.settingsBuilder() - .put(""location"", randomRepoPath()) - .put(""compress"", randomBoolean()) - .put(""chunk_size"", randomIntBetween(100, 1000)))); - - createIndex(""test-idx-1"", ""test-idx-2"", ""test-idx-3""); - ensureGreen(); - - logger.info(""--> indexing some data""); - for (int i = 0; i < 100; i++) { - index(""test-idx-1"", ""doc"", Integer.toString(i), ""foo"", ""bar"" + i); - index(""test-idx-2"", ""doc"", Integer.toString(i), ""foo"", ""baz"" + i); - index(""test-idx-3"", ""doc"", Integer.toString(i), ""foo"", ""baz"" + i); - } - refresh(); - assertHitCount(client.prepareCount(""test-idx-1"").get(), 100L); - assertHitCount(client.prepareCount(""test-idx-2"").get(), 100L); - assertHitCount(client.prepareCount(""test-idx-3"").get(), 100L); - - ListenableActionFuture flushResponseFuture = null; - if (randomBoolean()) { - ArrayList indicesToFlush = newArrayList(); - for (int i = 1; i < 4; i++) { - if (randomBoolean()) { - indicesToFlush.add(""test-idx-"" + i); - } - } - if (!indicesToFlush.isEmpty()) { - String[] indices = indicesToFlush.toArray(new String[indicesToFlush.size()]); - logger.info(""--> starting asynchronous flush for indices {}"", Arrays.toString(indices)); - flushResponseFuture = client.admin().indices().prepareFlush(indices).execute(); - } - } - logger.info(""--> snapshot""); - CreateSnapshotResponse createSnapshotResponse = client.admin().cluster().prepareCreateSnapshot(""test-repo"", ""test-snap"").setWaitForCompletion(true).setIndices(""test-idx-*"", ""-test-idx-3"").get(); - assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), greaterThan(0)); - assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), equalTo(createSnapshotResponse.getSnapshotInfo().totalShards())); - - assertThat(client.admin().cluster().prepareGetSnapshots(""test-repo"").setSnapshots(""test-snap"").get().getSnapshots().get(0).state(), equalTo(SnapshotState.SUCCESS)); - - logger.info(""--> delete some data""); - for (int i = 0; i < 50; i++) { - client.prepareDelete(""test-idx-1"", ""doc"", Integer.toString(i)).get(); - } - for (int i = 50; i < 100; i++) { - client.prepareDelete(""test-idx-2"", ""doc"", Integer.toString(i)).get(); - } - for (int i = 0; i < 100; i += 2) { - client.prepareDelete(""test-idx-3"", ""doc"", Integer.toString(i)).get(); - } - refresh(); - assertHitCount(client.prepareCount(""test-idx-1"").get(), 50L); - assertHitCount(client.prepareCount(""test-idx-2"").get(), 50L); - assertHitCount(client.prepareCount(""test-idx-3"").get(), 50L); - - logger.info(""--> close indices""); - client.admin().indices().prepareClose(""test-idx-1"", ""test-idx-2"").get(); - - logger.info(""--> restore all indices from the snapshot""); - RestoreSnapshotResponse restoreSnapshotResponse = client.admin().cluster().prepareRestoreSnapshot(""test-repo"", ""test-snap"").setWaitForCompletion(true).execute().actionGet(); - assertThat(restoreSnapshotResponse.getRestoreInfo().totalShards(), greaterThan(0)); - - ensureGreen(); - for (int i=0; i<5; i++) { - assertHitCount(client.prepareCount(""test-idx-1"").get(), 100L); - assertHitCount(client.prepareCount(""test-idx-2"").get(), 100L); - assertHitCount(client.prepareCount(""test-idx-3"").get(), 50L); - } - - // Test restore after index deletion - logger.info(""--> delete indices""); - cluster().wipeIndices(""test-idx-1"", ""test-idx-2""); - logger.info(""--> restore one index after deletion""); - restoreSnapshotResponse = client.admin().cluster().prepareRestoreSnapshot(""test-repo"", ""test-snap"").setWaitForCompletion(true).setIndices(""test-idx-*"", ""-test-idx-2"").execute().actionGet(); - assertThat(restoreSnapshotResponse.getRestoreInfo().totalShards(), greaterThan(0)); - - ensureGreen(); - for (int i=0; i<5; i++) { - assertHitCount(client.prepareCount(""test-idx-1"").get(), 100L); - } - ClusterState clusterState = client.admin().cluster().prepareState().get().getState(); - assertThat(clusterState.getMetaData().hasIndex(""test-idx-1""), equalTo(true)); - assertThat(clusterState.getMetaData().hasIndex(""test-idx-2""), equalTo(false)); - - if (flushResponseFuture != null) { - // Finish flush - flushResponseFuture.actionGet(); - } - } - - - @Test -" --1," public ReturnValueDescriptor asDescriptor(boolean defaultGroupSequenceRedefined, List> defaultGroupSequence) { - return new ReturnValueDescriptorImpl( - getType(), - asDescriptors( getConstraints() ), - isCascading(), - defaultGroupSequenceRedefined, - defaultGroupSequence, - groupConversionHelper.asDescriptors() - ); - } -" --1," static final PyObject function___new__(PyNewWrapper new_, boolean init, PyType subtype, - PyObject[] args, String[] keywords) { - ArgParser ap = new ArgParser(""function"", args, keywords, - new String[] {""code"", ""globals"", ""name"", ""argdefs"", - ""closure""}, 0); - PyObject code = ap.getPyObject(0); - PyObject globals = ap.getPyObject(1); - PyObject name = ap.getPyObject(2, Py.None); - PyObject defaults = ap.getPyObject(3, Py.None); - PyObject closure = ap.getPyObject(4, Py.None); - - if (!(code instanceof PyBaseCode)) { - throw Py.TypeError(""function() argument 1 must be code, not "" + - code.getType().fastGetName()); - } - if (name != Py.None && !Py.isInstance(name, PyString.TYPE)) { - throw Py.TypeError(""arg 3 (name) must be None or string""); - } - if (defaults != Py.None && !(defaults instanceof PyTuple)) { - throw Py.TypeError(""arg 4 (defaults) must be None or tuple""); - } - - PyBaseCode tcode = (PyBaseCode)code; - int nfree = tcode.co_freevars == null ? 0 : tcode.co_freevars.length; - if (!(closure instanceof PyTuple)) { - if (nfree > 0 && closure == Py.None) { - throw Py.TypeError(""arg 5 (closure) must be tuple""); - } else if (closure != Py.None) { - throw Py.TypeError(""arg 5 (closure) must be None or tuple""); - } - } - - int nclosure = closure == Py.None ? 0 : closure.__len__(); - if (nfree != nclosure) { - throw Py.ValueError(String.format(""%s requires closure of length %d, not %d"", - tcode.co_name, nfree, nclosure)); - } - if (nclosure > 0) { - for (PyObject o : ((PyTuple)closure).asIterable()) { - if (!(o instanceof PyCell)) { - throw Py.TypeError(String.format(""arg 5 (closure) expected cell, found %s"", - o.getType().fastGetName())); - } - } - } - - PyFunction function = new PyFunction(globals, - defaults == Py.None - ? null : ((PyTuple)defaults).getArray(), - tcode, null, - closure == Py.None - ? null : ((PyTuple)closure).getArray()); - if (name != Py.None) { - function.__name__ = name.toString(); - } - return function; - } - - @ExposedSet(name = ""__name__"") -" --1," private static byte[] toUtf8Bytes(String str) - { - try - { - return str.getBytes(""UTF-8""); - } - catch(UnsupportedEncodingException e) - { - throw new IllegalStateException(""The Java spec requires UTF-8 support."", e); - } - } - - /** - * Append the two upper case hex characters for a byte. - * @param sb The string buffer to append to. - * @param b The byte to hexify - * @return sb with the hex characters appended. - */ - // rfc3986 2.1: For consistency, URI producers - // should use uppercase hexadecimal digits for all percent- - // encodings. -" --1," void getElUnsupported(String expression); - -" --1," public String toString() { - return xpathExpression; - } -" --1," public Descriptor getDescriptor() { - throw new UnsupportedOperationException(); - } - } -} -" -1," public void getAllPropertiesRequiresAdmin() { - j.jenkins.setAuthorizationStrategy(new MockAuthorizationStrategy() - .grant(Jenkins.ADMINISTER).everywhere().to(""admin"") - .grant(Jenkins.READ).everywhere().toEveryone()); - j.jenkins.setSecurityRealm(j.createDummySecurityRealm()); - - User admin = User.get(""admin""); - User alice = User.get(""alice""); - User bob = User.get(""bob""); - - // Admin can access user properties for all users - try (ACLContext as = ACL.as(admin)) { - assertThat(alice.getAllProperties(), not(empty())); - assertThat(bob.getAllProperties(), not(empty())); - assertThat(admin.getAllProperties(), not(empty())); - } - - // Non admins can only view their own - try (ACLContext as = ACL.as(alice)) { - assertThat(alice.getAllProperties(), not(empty())); - assertThat(bob.getAllProperties(), empty()); - assertThat(admin.getAllProperties(), empty()); - } - } - -" -1," protected

P postProcess(P object) { - return (P) this.objectPostProcessor.postProcess(object); - } - - /** - * Executes the build using the {@link SecurityConfigurer}'s that have been applied - * using the following steps: - * - *

    - *
  • Invokes {@link #beforeInit()} for any subclass to hook into
  • - *
  • Invokes {@link SecurityConfigurer#init(SecurityBuilder)} for any - * {@link SecurityConfigurer} that was applied to this builder.
  • - *
  • Invokes {@link #beforeConfigure()} for any subclass to hook into
  • - *
  • Invokes {@link #performBuild()} which actually builds the Object
  • - *
- */ - @Override -" -1," public SAXSource toSAXSourceFromStream(StreamSource source, Exchange exchange) throws SAXException { - InputSource inputSource; - if (source.getReader() != null) { - inputSource = new InputSource(source.getReader()); - } else { - inputSource = new InputSource(source.getInputStream()); - } - inputSource.setSystemId(source.getSystemId()); - inputSource.setPublicId(source.getPublicId()); - XMLReader xmlReader = null; - SAXParserFactory sfactory = null; - //Need to setup XMLReader security feature by default - try { - // use the SAXPaserFactory which is set from exchange - if (exchange != null) { - sfactory = exchange.getProperty(Exchange.SAXPARSER_FACTORY, SAXParserFactory.class); - } - if (sfactory == null) { - sfactory = SAXParserFactory.newInstance(); - try { - sfactory.setFeature(javax.xml.XMLConstants.FEATURE_SECURE_PROCESSING, true); - } catch (Exception e) { - LOG.warn(""SAXParser doesn't support the feature {} with value {}, due to {}."", new Object[]{javax.xml.XMLConstants.FEATURE_SECURE_PROCESSING, ""true"", e}); - } - } - sfactory.setNamespaceAware(true); - SAXParser parser = sfactory.newSAXParser(); - xmlReader = parser.getXMLReader(); - } catch (Exception ex) { - LOG.warn(""Cannot create the SAXParser XMLReader, due to {}"", ex); - } - return new SAXSource(xmlReader, inputSource); - } - - /** - * @deprecated will be removed in Camel 3.0. Use the method which has 2 parameters. - */ - @Deprecated -" -1," public String getDisplayName() { - return Messages.CommandLauncher_displayName(); - } - } -} -" -1," public SSOValidatorResponse validateSamlResponse( - org.opensaml.saml.saml2.core.Response samlResponse, - boolean postBinding - ) throws WSSecurityException { - // Check the Issuer - validateIssuer(samlResponse.getIssuer()); - - // The Response must contain at least one Assertion. - if (samlResponse.getAssertions() == null || samlResponse.getAssertions().isEmpty()) { - LOG.fine(""The Response must contain at least one Assertion""); - throw new WSSecurityException(WSSecurityException.ErrorCode.FAILURE, ""invalidSAMLsecurity""); - } - - // The Response must contain a Destination that matches the assertionConsumerURL if it is - // signed - String destination = samlResponse.getDestination(); - if (samlResponse.isSigned() - && (destination == null || !destination.equals(assertionConsumerURL))) { - LOG.fine(""The Response must contain a destination that matches the assertion consumer URL""); - throw new WSSecurityException(WSSecurityException.ErrorCode.FAILURE, ""invalidSAMLsecurity""); - } - - // Validate Assertions - boolean foundValidSubject = false; - Date sessionNotOnOrAfter = null; - for (org.opensaml.saml.saml2.core.Assertion assertion : samlResponse.getAssertions()) { - // Check the Issuer - if (assertion.getIssuer() == null) { - LOG.fine(""Assertion Issuer must not be null""); - throw new WSSecurityException(WSSecurityException.ErrorCode.FAILURE, ""invalidSAMLsecurity""); - } - validateIssuer(assertion.getIssuer()); - - if (enforceAssertionsSigned && postBinding && assertion.getSignature() == null) { - LOG.fine(""If the HTTP Post binding is used to deliver the Response, "" - + ""the enclosed assertions must be signed""); - throw new WSSecurityException(WSSecurityException.ErrorCode.FAILURE, ""invalidSAMLsecurity""); - } - - // Check for AuthnStatements and validate the Subject accordingly - if (assertion.getAuthnStatements() != null - && !assertion.getAuthnStatements().isEmpty()) { - org.opensaml.saml.saml2.core.Subject subject = assertion.getSubject(); - if (validateAuthenticationSubject(subject, assertion.getID(), postBinding)) { - validateAudienceRestrictionCondition(assertion.getConditions()); - foundValidSubject = true; - // Store Session NotOnOrAfter - for (AuthnStatement authnStatment : assertion.getAuthnStatements()) { - if (authnStatment.getSessionNotOnOrAfter() != null) { - sessionNotOnOrAfter = authnStatment.getSessionNotOnOrAfter().toDate(); - } - } - } - } - - } - - if (!foundValidSubject) { - LOG.fine(""The Response did not contain any Authentication Statement that matched "" - + ""the Subject Confirmation criteria""); - throw new WSSecurityException(WSSecurityException.ErrorCode.FAILURE, ""invalidSAMLsecurity""); - } - - SSOValidatorResponse validatorResponse = new SSOValidatorResponse(); - validatorResponse.setResponseId(samlResponse.getID()); - validatorResponse.setSessionNotOnOrAfter(sessionNotOnOrAfter); - if (samlResponse.getIssueInstant() != null) { - validatorResponse.setCreated(samlResponse.getIssueInstant().toDate()); - } - - // the assumption for now is that SAMLResponse will contain only a single assertion - Element assertionElement = samlResponse.getAssertions().get(0).getDOM(); - Element clonedAssertionElement = (Element)assertionElement.cloneNode(true); - validatorResponse.setAssertionElement(clonedAssertionElement); - validatorResponse.setAssertion(DOM2Writer.nodeToString(clonedAssertionElement)); - - return validatorResponse; - } - - /** - * Validate the Issuer (if it exists) - */ -" -1," private JWT decode(String encodedJWT, Header header, String[] parts, Verifier verifier) { - int index = encodedJWT.lastIndexOf("".""); - // The message comprises the first two segments of the entire JWT, the signature is the last segment. - byte[] message = encodedJWT.substring(0, index).getBytes(StandardCharsets.UTF_8); - - // If a signature is provided and verifier must be provided. - if (parts.length == 3 && verifier == null) { - throw new MissingVerifierException(""No Verifier has been provided for verify a signature signed using ["" + header.algorithm.getName() + ""]""); - } - - // A verifier was provided but no signature exists, this is treated as an invalid signature. - if (parts.length == 2 && verifier != null) { - throw new InvalidJWTSignatureException(); - } - - if (parts.length == 3) { - // Verify the signature before de-serializing the payload. - byte[] signature = base64Decode(parts[2].getBytes(StandardCharsets.UTF_8)); - verifier.verify(header.algorithm, message, signature); - } - - JWT jwt = Mapper.deserialize(base64Decode(parts[1].getBytes(StandardCharsets.UTF_8)), JWT.class); - - // Verify expiration claim - if (jwt.isExpired()) { - throw new JWTExpiredException(); - } - - // Verify the notBefore claim - if (jwt.isUnavailableForProcessing()) { - throw new JWTUnavailableForProcessingException(); - } - - return jwt; - } - -" -1," String postProcessVariableName(String variableName) { - return this.matcher.postProcessVariableName(variableName); - } - } - -} -" -1," public String toString() { - - StringBuilder sb = new StringBuilder("" 0) { - sb.append("" groups=\""""); - int n = 0; - Iterator values = groups.iterator(); - while (values.hasNext()) { - if (n > 0) { - sb.append(','); - } - n++; - sb.append(RequestUtil.filter(values.next().getGroupname())); - } - sb.append(""\""""); - } - } - synchronized (roles) { - if (roles.size() > 0) { - sb.append("" roles=\""""); - int n = 0; - Iterator values = roles.iterator(); - while (values.hasNext()) { - if (n > 0) { - sb.append(','); - } - n++; - sb.append(RequestUtil.filter(values.next().getRolename())); - } - sb.append(""\""""); - } - } - sb.append(""/>""); - return (sb.toString()); - - } - - -" -1," public void processParameters( String str ) { - int end=str.length(); - int pos=0; - if( debug > 0) - log(""String: "" + str ); - - do { - boolean noEq=false; - int valStart=-1; - int valEnd=-1; - - int nameStart=pos; - int nameEnd=str.indexOf('=', nameStart ); - int nameEnd2=str.indexOf('&', nameStart ); - if( nameEnd2== -1 ) nameEnd2=end; - if( (nameEnd2!=-1 ) && - ( nameEnd==-1 || nameEnd > nameEnd2) ) { - nameEnd=nameEnd2; - noEq=true; - valStart=nameEnd; - valEnd=nameEnd; - if(debug>0) log(""no equal "" + nameStart + "" "" + nameEnd + "" "" + - str.substring(nameStart, nameEnd)); - } - - if( nameEnd== -1 ) nameEnd=end; - - if( ! noEq ) { - valStart=nameEnd+1; - valEnd=str.indexOf('&', valStart); - if( valEnd== -1 ) valEnd = (valStart < end) ? end : valStart; - } - - pos=valEnd+1; - - if( nameEnd<=nameStart ) { - continue; - } - if( debug>0) - log( ""XXX "" + nameStart + "" "" + nameEnd + "" "" - + valStart + "" "" + valEnd ); - - try { - tmpNameC.append(str, nameStart, nameEnd-nameStart ); - tmpValueC.append(str, valStart, valEnd-valStart ); - - if( debug > 0 ) - log( tmpNameC + ""= "" + tmpValueC); - - if( urlDec==null ) { - urlDec=new UDecoder(); - } - - urlDec.convert( tmpNameC ); - urlDec.convert( tmpValueC ); - - if( debug > 0 ) - log( tmpNameC + ""= "" + tmpValueC); - - addParam( tmpNameC.toString(), tmpValueC.toString() ); - } catch( IOException ex ) { - ex.printStackTrace(); - } - - tmpNameC.recycle(); - tmpValueC.recycle(); - - } while( pos users = userProvisioning.query(""username eq \""marissa\""""); - assertNotNull(users); - assertEquals(1, users.size()); - ScimUser user = users.get(0); - - ExpiringCode code = codeStore.generateCode(user.getId(), new Timestamp(System.currentTimeMillis() + UaaResetPasswordService.PASSWORD_RESET_LIFETIME), null); - getMockMvc().perform(createChangePasswordRequest(user, code, true, ""d3faultPasswd"", ""d3faultPasswd"")); - - code = codeStore.generateCode(user.getId(), new Timestamp(System.currentTimeMillis() + UaaResetPasswordService.PASSWORD_RESET_LIFETIME), null); - getMockMvc().perform(createChangePasswordRequest(user, code, true, ""d3faultPasswd"", ""d3faultPasswd"")) - .andExpect(status().isUnprocessableEntity()) - .andExpect(view().name(""forgot_password"")) - .andExpect(model().attribute(""message"", ""Your new password cannot be the same as the old password."")); - } - -" -1," public void recycle() { - if (buffered.getBuffer().length > 65536) { - buffered = null; - } else { - buffered.recycle(); - } - tempRead.recycle(); - hasRead = false; - buffer = null; - } - -" -1," public XMLLoader init(SolrParams args) { - inputFactory = XMLInputFactory.newInstance(); - try { - // The java 1.6 bundled stax parser (sjsxp) does not currently have a thread-safe - // XMLInputFactory, as that implementation tries to cache and reuse the - // XMLStreamReader. Setting the parser-specific ""reuse-instance"" property to false - // prevents this. - // All other known open-source stax parsers (and the bea ref impl) - // have thread-safe factories. - inputFactory.setProperty(""reuse-instance"", Boolean.FALSE); - } - catch (IllegalArgumentException ex) { - // Other implementations will likely throw this exception since ""reuse-instance"" - // isimplementation specific. - log.debug(""Unable to set the 'reuse-instance' property for the input chain: "" + inputFactory); - } - inputFactory.setXMLReporter(xmllog); - - xsltCacheLifetimeSeconds = XSLT_CACHE_DEFAULT; - if(args != null) { - xsltCacheLifetimeSeconds = args.getInt(XSLT_CACHE_PARAM,XSLT_CACHE_DEFAULT); - log.info(""xsltCacheLifetimeSeconds="" + xsltCacheLifetimeSeconds); - } - return this; - } - -" -1," protected void execute() { - - Arrays.asList(controllersListStrings).forEach( - cInfoString -> controllers.add(parseCInfoString(cInfoString))); - DriverService service = get(DriverService.class); - deviceId = DeviceId.deviceId(uri); - DriverHandler h = service.createHandler(deviceId); - ControllerConfig config = h.behaviour(ControllerConfig.class); - print(""before:""); - config.getControllers().forEach(c -> print(c.target())); - try { - if (removeAll) { - if (!controllers.isEmpty()) { - print(""Controllers list should be empty to remove all controllers""); - } else { - List controllersToRemove = config.getControllers(); - controllersToRemove.forEach(c -> print(""Will remove "" + c.target())); - config.removeControllers(controllersToRemove); - } - } else { - if (controllers.isEmpty()) { - print(""Controllers list is empty, cannot set/remove empty controllers""); - } else { - if (removeCont) { - print(""Will remove specified controllers""); - config.removeControllers(controllers); - } else { - print(""Will add specified controllers""); - config.setControllers(controllers); - } - } - } - } catch (NullPointerException e) { - print(""No Device with requested parameters {} "", uri); - } - print(""after:""); - config.getControllers().forEach(c -> print(c.target())); - print(""size %d"", config.getControllers().size()); - } - - -" -1," protected boolean parseChunkHeader() - throws IOException { - - int result = 0; - boolean eol = false; - boolean readDigit = false; - boolean trailer = false; - - while (!eol) { - - if (pos >= lastValid) { - if (readBytes() <= 0) - return false; - } - - if (buf[pos] == Constants.CR || buf[pos] == Constants.LF) { - parseCRLF(false); - eol = true; - } else if (buf[pos] == Constants.SEMI_COLON) { - trailer = true; - } else if (!trailer) { - //don't read data after the trailer - int charValue = HexUtils.getDec(buf[pos]); - if (charValue != -1) { - readDigit = true; - result *= 16; - result += charValue; - } else { - //we shouldn't allow invalid, non hex characters - //in the chunked header - return false; - } - } - - // Parsing the CRLF increments pos - if (!eol) { - pos++; - } - - } - - if (!readDigit) - return false; - - if (result == 0) - endChunk = true; - - remaining = result; - if (remaining < 0) - return false; - - return true; - - } - - - /** - * Parse CRLF at end of chunk. - * - * @param tolerant Should tolerant parsing (LF and CRLF) be used? This - * is recommended (RFC2616, section 19.3) for message - * headers. - */ -" -1," private static DocumentBuilder getBuilder() throws ParserConfigurationException { - ClassLoader loader = Thread.currentThread().getContextClassLoader(); - if (loader == null) { - loader = DOMUtils.class.getClassLoader(); - } - if (loader == null) { - return XMLUtils.getParser(); - } - DocumentBuilder builder = DOCUMENT_BUILDERS.get(loader); - if (builder == null) { - builder = XMLUtils.getParser(); - DOCUMENT_BUILDERS.put(loader, builder); - } - return builder; - } - - /** - * This function is much like getAttribute, but returns null, not """", for a nonexistent attribute. - * - * @param e - * @param attributeName - */ -" -1," public void init(Map pluginConfig) { - try { - String delegationTokenEnabled = (String)pluginConfig.getOrDefault(DELEGATION_TOKEN_ENABLED_PROPERTY, ""false""); - authFilter = (Boolean.parseBoolean(delegationTokenEnabled)) ? new HadoopAuthFilter() : new AuthenticationFilter(); - - // Initialize kerberos before initializing curator instance. - boolean initKerberosZk = Boolean.parseBoolean((String)pluginConfig.getOrDefault(INIT_KERBEROS_ZK, ""false"")); - if (initKerberosZk) { - (new Krb5HttpClientBuilder()).getBuilder(); - } - - FilterConfig conf = getInitFilterConfig(pluginConfig); - authFilter.init(conf); - - } catch (ServletException e) { - throw new SolrException(ErrorCode.SERVER_ERROR, ""Error initializing "" + getClass().getName() + "": ""+e); - } - } - - @SuppressWarnings(""unchecked"") -" -1," public void addRecipients(final ExtendedEmailPublisherContext context, EnvVars env, Set to, Set cc, Set bcc) { - final class Debug implements RecipientProviderUtilities.IDebug { - private final ExtendedEmailPublisherDescriptor descriptor - = Jenkins.getActiveInstance().getDescriptorByType(ExtendedEmailPublisherDescriptor.class); - - private final PrintStream logger = context.getListener().getLogger(); - - public void send(final String format, final Object... args) { - descriptor.debug(logger, format, args); - } - } - final Debug debug = new Debug(); - debug.send(""Sending email to upstream committer(s).""); - Run cur; - Cause.UpstreamCause upc = context.getRun().getCause(Cause.UpstreamCause.class); - while (upc != null) { - Job p = (Job) Jenkins.getActiveInstance().getItemByFullName(upc.getUpstreamProject()); - if(p == null) { - context.getListener().getLogger().print(""There is a break in the project linkage, could not retrieve upstream project information""); - break; - } - cur = p.getBuildByNumber(upc.getUpstreamBuild()); - upc = cur.getCause(Cause.UpstreamCause.class); - addUpstreamCommittersTriggeringBuild(cur, to, cc, bcc, env, context.getListener(), debug); - } - } - - /** - * Adds for the given upstream build the committers to the recipient list for each commit in the upstream build. - * - * @param build the upstream build - * @param to the to recipient list - * @param cc the cc recipient list - * @param bcc the bcc recipient list - * @param env - * @param listener - */ -" -1," public void test_noVerification() throws Exception { - // Sign a JWT and then attempt to verify it using None. - JWT jwt = new JWT().setSubject(""art""); - String encodedJWT = JWT.getEncoder().encode(jwt, HMACSigner.newSHA256Signer(""secret"")); - - expectException(MissingVerifierException.class, () - -> JWT.getDecoder().decode(encodedJWT)); - } - - @Test -" -1," protected void configure(HttpSecurity http) throws Exception { - // This config is also on UrlAuthorizationConfigurer javadoc - http - .apply(new UrlAuthorizationConfigurer()).getRegistry() - .antMatchers(""/users**"",""/sessions/**"").hasRole(""USER"") - .antMatchers(""/signup"").hasRole(""ANONYMOUS"") - .anyRequest().hasRole(""USER""); - } - // @formatter:on -" -1," public void register(ContainerBuilder builder, LocatableProperties props) - throws ConfigurationException { - - builder.factory(com.opensymphony.xwork2.ObjectFactory.class) - .factory(ActionProxyFactory.class, DefaultActionProxyFactory.class, Scope.SINGLETON) - .factory(ObjectTypeDeterminer.class, DefaultObjectTypeDeterminer.class, Scope.SINGLETON) - - .factory(XWorkConverter.class, Scope.SINGLETON) - .factory(XWorkBasicConverter.class, Scope.SINGLETON) - .factory(ConversionPropertiesProcessor.class, DefaultConversionPropertiesProcessor.class, Scope.SINGLETON) - .factory(ConversionFileProcessor.class, DefaultConversionFileProcessor.class, Scope.SINGLETON) - .factory(ConversionAnnotationProcessor.class, DefaultConversionAnnotationProcessor.class, Scope.SINGLETON) - .factory(TypeConverterCreator.class, DefaultTypeConverterCreator.class, Scope.SINGLETON) - .factory(TypeConverterHolder.class, DefaultTypeConverterHolder.class, Scope.SINGLETON) - - .factory(FileManager.class, ""system"", DefaultFileManager.class, Scope.SINGLETON) - .factory(FileManagerFactory.class, DefaultFileManagerFactory.class, Scope.SINGLETON) - .factory(ValueStackFactory.class, OgnlValueStackFactory.class, Scope.SINGLETON) - .factory(ValidatorFactory.class, DefaultValidatorFactory.class, Scope.SINGLETON) - .factory(ValidatorFileParser.class, DefaultValidatorFileParser.class, Scope.SINGLETON) - .factory(PatternMatcher.class, WildcardHelper.class, Scope.SINGLETON) - .factory(ReflectionProvider.class, OgnlReflectionProvider.class, Scope.SINGLETON) - .factory(ReflectionContextFactory.class, OgnlReflectionContextFactory.class, Scope.SINGLETON) - .factory(PropertyAccessor.class, CompoundRoot.class.getName(), CompoundRootAccessor.class, Scope.SINGLETON) - .factory(PropertyAccessor.class, Object.class.getName(), ObjectAccessor.class, Scope.SINGLETON) - .factory(PropertyAccessor.class, Iterator.class.getName(), XWorkIteratorPropertyAccessor.class, Scope.SINGLETON) - .factory(PropertyAccessor.class, Enumeration.class.getName(), XWorkEnumerationAccessor.class, Scope.SINGLETON) - .factory(UnknownHandlerManager.class, DefaultUnknownHandlerManager.class, Scope.SINGLETON) - - // silly workarounds for ognl since there is no way to flush its caches - .factory(PropertyAccessor.class, List.class.getName(), XWorkListPropertyAccessor.class, Scope.SINGLETON) - .factory(PropertyAccessor.class, ArrayList.class.getName(), XWorkListPropertyAccessor.class, Scope.SINGLETON) - .factory(PropertyAccessor.class, HashSet.class.getName(), XWorkCollectionPropertyAccessor.class, Scope.SINGLETON) - .factory(PropertyAccessor.class, Set.class.getName(), XWorkCollectionPropertyAccessor.class, Scope.SINGLETON) - .factory(PropertyAccessor.class, HashMap.class.getName(), XWorkMapPropertyAccessor.class, Scope.SINGLETON) - .factory(PropertyAccessor.class, Map.class.getName(), XWorkMapPropertyAccessor.class, Scope.SINGLETON) - .factory(PropertyAccessor.class, Collection.class.getName(), XWorkCollectionPropertyAccessor.class, Scope.SINGLETON) - .factory(PropertyAccessor.class, ObjectProxy.class.getName(), ObjectProxyPropertyAccessor.class, Scope.SINGLETON) - .factory(MethodAccessor.class, Object.class.getName(), XWorkMethodAccessor.class, Scope.SINGLETON) - .factory(MethodAccessor.class, CompoundRoot.class.getName(), CompoundRootAccessor.class, Scope.SINGLETON) - - .factory(TextParser.class, OgnlTextParser.class, Scope.SINGLETON) - - .factory(NullHandler.class, Object.class.getName(), InstantiatingNullHandler.class, Scope.SINGLETON) - .factory(ActionValidatorManager.class, AnnotationActionValidatorManager.class, Scope.SINGLETON) - .factory(ActionValidatorManager.class, ""no-annotations"", DefaultActionValidatorManager.class, Scope.SINGLETON) - .factory(TextProvider.class, ""system"", DefaultTextProvider.class, Scope.SINGLETON) - .factory(TextProvider.class, TextProviderSupport.class, Scope.SINGLETON) - .factory(LocaleProvider.class, DefaultLocaleProvider.class, Scope.SINGLETON) - .factory(OgnlUtil.class, Scope.SINGLETON) - .factory(CollectionConverter.class, Scope.SINGLETON) - .factory(ArrayConverter.class, Scope.SINGLETON) - .factory(DateConverter.class, Scope.SINGLETON) - .factory(NumberConverter.class, Scope.SINGLETON) - .factory(StringConverter.class, Scope.SINGLETON); - props.setProperty(XWorkConstants.DEV_MODE, Boolean.FALSE.toString()); - props.setProperty(XWorkConstants.LOG_MISSING_PROPERTIES, Boolean.FALSE.toString()); - props.setProperty(XWorkConstants.ENABLE_OGNL_EXPRESSION_CACHE, Boolean.TRUE.toString()); - props.setProperty(XWorkConstants.RELOAD_XML_CONFIGURATION, Boolean.FALSE.toString()); - } - -" -1," public void fireOnComplete() { - List listenersCopy = new ArrayList<>(); - listenersCopy.addAll(listeners); - - ClassLoader oldCL = context.bind(Globals.IS_SECURITY_ENABLED, null); - try { - for (AsyncListenerWrapper listener : listenersCopy) { - try { - listener.fireOnComplete(event); - } catch (Throwable t) { - ExceptionUtils.handleThrowable(t); - log.warn(""onComplete() failed for listener of type ["" + - listener.getClass().getName() + ""]"", t); - } - } - } finally { - context.fireRequestDestroyEvent(request); - clearServletRequestResponse(); - context.unbind(Globals.IS_SECURITY_ENABLED, oldCL); - } - } - - -" -1," public void testExcludedTrickyParameters() throws Exception { - Map params = new HashMap() { - { - put(""blah"", ""This is blah""); - put(""name"", ""try_1""); - put(""(name)"", ""try_2""); - put(""['name']"", ""try_3""); - put(""['na' + 'me']"", ""try_4""); - put(""{name}[0]"", ""try_5""); - put(""(new string{'name'})[0]"", ""try_6""); - put(""#{key: 'name'}.key"", ""try_7""); - - } - }; - - HashMap extraContext = new HashMap(); - extraContext.put(ActionContext.PARAMETERS, params); - - ActionProxy proxy = actionProxyFactory.createActionProxy("""", MockConfigurationProvider.PARAM_INTERCEPTOR_ACTION_NAME, extraContext); - - ActionConfig config = configuration.getRuntimeConfiguration().getActionConfig("""", MockConfigurationProvider.PARAM_INTERCEPTOR_ACTION_NAME); - ParametersInterceptor pi =(ParametersInterceptor) config.getInterceptors().get(0).getInterceptor(); - pi.setExcludeParams(""name""); - - proxy.execute(); - - SimpleAction action = (SimpleAction) proxy.getAction(); - assertNull(action.getName()); - assertEquals(""This is blah"", (action).getBlah()); - } - -" -1," protected BindResult process(final LDAPConnection connection, final int depth) - throws LDAPException - { - if (connection.synchronousMode()) - { - @SuppressWarnings(""deprecation"") - final boolean autoReconnect = - connection.getConnectionOptions().autoReconnect(); - return processSync(connection, autoReconnect); - } - - // See if a bind DN was provided without a password. If that is the case - // and this should not be allowed, then throw an exception. - if (password != null) - { - if ((bindDN.getValue().length > 0) && (password.getValue().length == 0) && - connection.getConnectionOptions().bindWithDNRequiresPassword()) - { - final LDAPException le = new LDAPException(ResultCode.PARAM_ERROR, - ERR_SIMPLE_BIND_DN_WITHOUT_PASSWORD.get()); - debugCodingError(le); - throw le; - } - } - - - // Create the LDAP message. - messageID = connection.nextMessageID(); - final LDAPMessage message = new LDAPMessage(messageID, this, getControls()); - - - // Register with the connection reader to be notified of responses for the - // request that we've created. - connection.registerResponseAcceptor(messageID, this); - - - try - { - // Send the request to the server. - final long responseTimeout = getResponseTimeoutMillis(connection); - debugLDAPRequest(Level.INFO, this, messageID, connection); - final long requestTime = System.nanoTime(); - connection.getConnectionStatistics().incrementNumBindRequests(); - connection.sendMessage(message, responseTimeout); - - // Wait for and process the response. - final LDAPResponse response; - try - { - if (responseTimeout > 0) - { - response = responseQueue.poll(responseTimeout, TimeUnit.MILLISECONDS); - } - else - { - response = responseQueue.take(); - } - } - catch (final InterruptedException ie) - { - debugException(ie); - Thread.currentThread().interrupt(); - throw new LDAPException(ResultCode.LOCAL_ERROR, - ERR_BIND_INTERRUPTED.get(connection.getHostPort()), ie); - } - - return handleResponse(connection, response, requestTime, false); - } - finally - { - connection.deregisterResponseAcceptor(messageID); - } - } - - - - /** - * Processes this bind operation in synchronous mode, in which the same - * thread will send the request and read the response. - * - * @param connection The connection to use to communicate with the directory - * server. - * @param allowRetry Indicates whether the request may be re-tried on a - * re-established connection if the initial attempt fails - * in a way that indicates the connection is no longer - * valid and autoReconnect is true. - * - * @return An LDAP result object that provides information about the result - * of the bind processing. - * - * @throws LDAPException If a problem occurs while sending the request or - * reading the response. - */ -" -1," public Set getControllerServices(final boolean recursive) { - readLock.lock(); - try { - final Set services = new HashSet<>(); - services.addAll(controllerServices.values()); - - if (recursive && parent.get() != null) { - services.addAll(parent.get().getControllerServices(true)); - } - - return services; - } finally { - readLock.unlock(); - } - } - - @Override -" -1," public boolean getValidateClientProvidedNewSessionId() { - return validateClientProvidedNewSessionId; - } - - @Override -" -1," private static void doZipDir(File dir, ZipOutputStream out) throws IOException { - File[] children = dir.listFiles(); - if (children == null) { - throw new IllegalStateException(""Fail to list files of directory "" + dir.getAbsolutePath()); - } - for (File child : children) { - doZip(child.getName(), child, out); - } - } - - /** - * @see #unzip(File, File, Predicate) - * @deprecated replaced by {@link Predicate} in 6.2. - */ - @Deprecated - @FunctionalInterface -" -1," public H and() { - return ChannelSecurityConfigurer.this.and(); - } - -" -1," public boolean isLockoutEnabled() { - return countFailuresWithin > 0; - } - -" -1," protected synchronized void authenticatorConfig() { - - // Always need an authenticator to support @ServletSecurity annotations - LoginConfig loginConfig = context.getLoginConfig(); - if (loginConfig == null) { - loginConfig = DUMMY_LOGIN_CONFIG; - context.setLoginConfig(loginConfig); - } - - // Has an authenticator been configured already? - if (context.getAuthenticator() != null) - return; - - if (!(context instanceof ContainerBase)) { - return; // Cannot install a Valve even if it would be needed - } - - // Has a Realm been configured for us to authenticate against? - if (context.getRealm() == null) { - log.error(sm.getString(""contextConfig.missingRealm"")); - ok = false; - return; - } - - /* - * First check to see if there is a custom mapping for the login - * method. If so, use it. Otherwise, check if there is a mapping in - * org/apache/catalina/startup/Authenticators.properties. - */ - Valve authenticator = null; - if (customAuthenticators != null) { - authenticator = (Valve) - customAuthenticators.get(loginConfig.getAuthMethod()); - } - if (authenticator == null) { - // Load our mapping properties if necessary - if (authenticators == null) { - try { - InputStream is=this.getClass().getClassLoader().getResourceAsStream(""org/apache/catalina/startup/Authenticators.properties""); - if( is!=null ) { - authenticators = new Properties(); - authenticators.load(is); - } else { - log.error(sm.getString( - ""contextConfig.authenticatorResources"")); - ok=false; - return; - } - } catch (IOException e) { - log.error(sm.getString( - ""contextConfig.authenticatorResources""), e); - ok = false; - return; - } - } - - // Identify the class name of the Valve we should configure - String authenticatorName = null; - authenticatorName = - authenticators.getProperty(loginConfig.getAuthMethod()); - if (authenticatorName == null) { - log.error(sm.getString(""contextConfig.authenticatorMissing"", - loginConfig.getAuthMethod())); - ok = false; - return; - } - - // Instantiate and install an Authenticator of the requested class - try { - Class authenticatorClass = Class.forName(authenticatorName); - authenticator = (Valve) authenticatorClass.newInstance(); - } catch (Throwable t) { - ExceptionUtils.handleThrowable(t); - log.error(sm.getString( - ""contextConfig.authenticatorInstantiate"", - authenticatorName), - t); - ok = false; - } - } - - if (authenticator != null && context instanceof ContainerBase) { - Pipeline pipeline = ((ContainerBase) context).getPipeline(); - if (pipeline != null) { - ((ContainerBase) context).getPipeline().addValve(authenticator); - if (log.isDebugEnabled()) { - log.debug(sm.getString( - ""contextConfig.authenticatorConfigured"", - loginConfig.getAuthMethod())); - } - } - } - - } - - - /** - * Create (if necessary) and return a Digester configured to process the - * web application deployment descriptor (web.xml). - */ -" -1," private void processInternal(Exchange exchange, AsyncCallback callback) throws Exception { - // creating the url to use takes 2-steps - String url = HttpHelper.createURL(exchange, getEndpoint()); - URI uri = HttpHelper.createURI(exchange, url, getEndpoint()); - // get the url from the uri - url = uri.toASCIIString(); - - // execute any custom url rewrite - String rewriteUrl = HttpHelper.urlRewrite(exchange, url, getEndpoint(), this); - if (rewriteUrl != null) { - // update url and query string from the rewritten url - url = rewriteUrl; - } - - String methodName = HttpHelper.createMethod(exchange, getEndpoint(), exchange.getIn().getBody() != null).name(); - - JettyContentExchange httpExchange = getEndpoint().createContentExchange(); - httpExchange.init(exchange, getBinding(), client, callback); - httpExchange.setURL(url); // Url has to be set first - httpExchange.setMethod(methodName); - - if (getEndpoint().getHttpClientParameters() != null) { - // For jetty 9 these parameters can not be set on the client - // so we need to set them on the httpExchange - String timeout = (String)getEndpoint().getHttpClientParameters().get(""timeout""); - if (timeout != null) { - httpExchange.setTimeout(new Long(timeout)); - } - String supportRedirect = (String)getEndpoint().getHttpClientParameters().get(""supportRedirect""); - if (supportRedirect != null) { - httpExchange.setSupportRedirect(Boolean.valueOf(supportRedirect)); - } - } - - LOG.trace(""Using URL: {} with method: {}"", url, methodName); - - // if there is a body to send as data - if (exchange.getIn().getBody() != null) { - String contentType = ExchangeHelper.getContentType(exchange); - if (contentType != null) { - httpExchange.setRequestContentType(contentType); - } - - if (contentType != null && HttpConstants.CONTENT_TYPE_JAVA_SERIALIZED_OBJECT.equals(contentType)) { - // serialized java object - Serializable obj = exchange.getIn().getMandatoryBody(Serializable.class); - // write object to output stream - ByteArrayOutputStream bos = new ByteArrayOutputStream(); - try { - HttpHelper.writeObjectToStream(bos, obj); - httpExchange.setRequestContent(bos.toByteArray()); - } finally { - IOHelper.close(bos, ""body"", LOG); - } - } else { - Object body = exchange.getIn().getBody(); - if (body instanceof String) { - String data = (String) body; - // be a bit careful with String as any type can most likely be converted to String - // so we only do an instanceof check and accept String if the body is really a String - // do not fallback to use the default charset as it can influence the request - // (for example application/x-www-form-urlencoded forms being sent) - String charset = IOHelper.getCharsetName(exchange, false); - httpExchange.setRequestContent(data, charset); - } else { - // then fallback to input stream - InputStream is = exchange.getContext().getTypeConverter().mandatoryConvertTo(InputStream.class, exchange, exchange.getIn().getBody()); - httpExchange.setRequestContent(is); - // setup the content length if it is possible - String length = exchange.getIn().getHeader(Exchange.CONTENT_LENGTH, String.class); - if (ObjectHelper.isNotEmpty(length)) { - httpExchange.addRequestHeader(Exchange.CONTENT_LENGTH, length); - } - } - } - } - - // if we bridge endpoint then we need to skip matching headers with the HTTP_QUERY to avoid sending - // duplicated headers to the receiver, so use this skipRequestHeaders as the list of headers to skip - Map skipRequestHeaders = null; - if (getEndpoint().isBridgeEndpoint()) { - exchange.setProperty(Exchange.SKIP_GZIP_ENCODING, Boolean.TRUE); - String queryString = exchange.getIn().getHeader(Exchange.HTTP_QUERY, String.class); - if (queryString != null) { - skipRequestHeaders = URISupport.parseQuery(queryString, false, true); - } - // Need to remove the Host key as it should be not used - exchange.getIn().getHeaders().remove(""host""); - } - - // propagate headers as HTTP headers - Message in = exchange.getIn(); - HeaderFilterStrategy strategy = getEndpoint().getHeaderFilterStrategy(); - for (Map.Entry entry : in.getHeaders().entrySet()) { - String key = entry.getKey(); - Object headerValue = in.getHeader(key); - - if (headerValue != null) { - // use an iterator as there can be multiple values. (must not use a delimiter, and allow empty values) - final Iterator it = ObjectHelper.createIterator(headerValue, null, true); - - // the values to add as a request header - final List values = new ArrayList(); - - // if its a multi value then check each value if we can add it and for multi values they - // should be combined into a single value - while (it.hasNext()) { - String value = exchange.getContext().getTypeConverter().convertTo(String.class, it.next()); - - // we should not add headers for the parameters in the uri if we bridge the endpoint - // as then we would duplicate headers on both the endpoint uri, and in HTTP headers as well - if (skipRequestHeaders != null && skipRequestHeaders.containsKey(key)) { - continue; - } - if (value != null && strategy != null && !strategy.applyFilterToCamelHeaders(key, value, exchange)) { - values.add(value); - } - } - - // add the value(s) as a http request header - if (values.size() > 0) { - // use the default toString of a ArrayList to create in the form [xxx, yyy] - // if multi valued, for a single value, then just output the value as is - String s = values.size() > 1 ? values.toString() : values.get(0); - httpExchange.addRequestHeader(key, s); - } - } - } - - // set the callback, which will handle all the response logic - if (LOG.isDebugEnabled()) { - LOG.debug(""Sending HTTP request to: {}"", httpExchange.getUrl()); - } - httpExchange.send(client); - } - -" -1," public void send(final String format, final Object... args) { - descriptor.debug(logger, format, args); - } - } - final Debug debug = new Debug(); - - Set users = null; - - final Run currentRun = context.getRun(); - if (currentRun == null) { - debug.send(""currentRun was null""); - } else { - if (!Objects.equals(currentRun.getResult(), Result.FAILURE)) { - debug.send(""currentBuild did not fail""); - } else { - users = new HashSet<>(); - debug.send(""Collecting builds with suspects...""); - final HashSet> buildsWithSuspects = new HashSet<>(); - Run firstFailedBuild = currentRun; - Run candidate = currentRun; - while (candidate != null) { - final Result candidateResult = candidate.getResult(); - if ( candidateResult == null || !candidateResult.isWorseOrEqualTo(Result.FAILURE) ) { - break; - } - firstFailedBuild = candidate; - candidate = candidate.getPreviousCompletedBuild(); - } - if (firstFailedBuild instanceof AbstractBuild) { - buildsWithSuspects.add(firstFailedBuild); - } else { - debug.send("" firstFailedBuild was not an instance of AbstractBuild""); - } - debug.send(""Collecting suspects...""); - users.addAll(RecipientProviderUtilities.getChangeSetAuthors(buildsWithSuspects, debug)); - users.addAll(RecipientProviderUtilities.getUsersTriggeringTheBuilds(buildsWithSuspects, debug)); - } - } - if (users != null) { - RecipientProviderUtilities.addUsers(users, context.getListener(), env, to, cc, bcc, debug); - } - } - - @Extension - public static final class DescriptorImpl extends RecipientProviderDescriptor { - @Override - public String getDisplayName() { - return ""Suspects Causing the Build to Begin Failing""; - } - } - -} -" -1," public Document getMetaData(Idp config) throws RuntimeException { - //Return as text/xml - try { - Crypto crypto = CertsUtils.createCrypto(config.getCertificate()); - - ByteArrayOutputStream bout = new ByteArrayOutputStream(4096); - Writer streamWriter = new OutputStreamWriter(bout, ""UTF-8""); - XMLStreamWriter writer = XML_OUTPUT_FACTORY.createXMLStreamWriter(streamWriter); - - writer.writeStartDocument(""UTF-8"", ""1.0""); - - String referenceID = IDGenerator.generateID(""_""); - writer.writeStartElement(""md"", ""EntityDescriptor"", SAML2_METADATA_NS); - writer.writeAttribute(""ID"", referenceID); - - writer.writeAttribute(""entityID"", config.getIdpUrl().toString()); - - writer.writeNamespace(""md"", SAML2_METADATA_NS); - writer.writeNamespace(""fed"", WS_FEDERATION_NS); - writer.writeNamespace(""wsa"", WS_ADDRESSING_NS); - writer.writeNamespace(""auth"", WS_FEDERATION_NS); - writer.writeNamespace(""xsi"", SCHEMA_INSTANCE_NS); - - writeFederationMetadata(writer, config, crypto); - - writer.writeEndElement(); // EntityDescriptor - - writer.writeEndDocument(); - streamWriter.flush(); - bout.flush(); - - if (LOG.isDebugEnabled()) { - String out = new String(bout.toByteArray()); - LOG.debug(""***************** unsigned ****************""); - LOG.debug(out); - LOG.debug(""***************** unsigned ****************""); - } - - InputStream is = new ByteArrayInputStream(bout.toByteArray()); - - Document result = SignatureUtils.signMetaInfo(crypto, null, config.getCertificatePassword(), is, referenceID); - if (result != null) { - return result; - } else { - throw new RuntimeException(""Failed to sign the metadata document: result=null""); - } - } catch (RuntimeException e) { - throw e; - } catch (Exception e) { - LOG.error(""Error creating service metadata information "", e); - throw new RuntimeException(""Error creating service metadata information: "" + e.getMessage()); - } - - } - -" -1," public void chaosSnapshotTest() throws Exception { - final List indices = new CopyOnWriteArrayList<>(); - Settings settings = settingsBuilder().put(""action.write_consistency"", ""one"").build(); - int initialNodes = between(1, 3); - logger.info(""--> start {} nodes"", initialNodes); - for (int i = 0; i < initialNodes; i++) { - internalCluster().startNode(settings); - } - - logger.info(""--> creating repository""); - assertAcked(client().admin().cluster().preparePutRepository(""test-repo"") - .setType(""fs"").setSettings(ImmutableSettings.settingsBuilder() - .put(""location"", newTempDir(LifecycleScope.SUITE)) - .put(""compress"", randomBoolean()) - .put(""chunk_size"", randomIntBetween(100, 1000)))); - - int initialIndices = between(1, 3); - logger.info(""--> create {} indices"", initialIndices); - for (int i = 0; i < initialIndices; i++) { - createTestIndex(""test-"" + i); - indices.add(""test-"" + i); - } - - int asyncNodes = between(0, 5); - logger.info(""--> start {} additional nodes asynchronously"", asyncNodes); - ListenableFuture> asyncNodesFuture = internalCluster().startNodesAsync(asyncNodes, settings); - - int asyncIndices = between(0, 10); - logger.info(""--> create {} additional indices asynchronously"", asyncIndices); - Thread[] asyncIndexThreads = new Thread[asyncIndices]; - for (int i = 0; i < asyncIndices; i++) { - final int cur = i; - asyncIndexThreads[i] = new Thread(new Runnable() { - @Override - public void run() { - createTestIndex(""test-async-"" + cur); - indices.add(""test-async-"" + cur); - - } - }); - asyncIndexThreads[i].start(); - } - - logger.info(""--> snapshot""); - - ListenableActionFuture snapshotResponseFuture = client().admin().cluster().prepareCreateSnapshot(""test-repo"", ""test-snap"").setWaitForCompletion(true).setIndices(""test-*"").setPartial(true).execute(); - - long start = System.currentTimeMillis(); - // Produce chaos for 30 sec or until snapshot is done whatever comes first - int randomIndices = 0; - while (System.currentTimeMillis() - start < 30000 && !snapshotIsDone(""test-repo"", ""test-snap"")) { - Thread.sleep(100); - int chaosType = randomInt(10); - if (chaosType < 4) { - // Randomly delete an index - if (indices.size() > 0) { - String index = indices.remove(randomInt(indices.size() - 1)); - logger.info(""--> deleting random index [{}]"", index); - internalCluster().wipeIndices(index); - } - } else if (chaosType < 6) { - // Randomly shutdown a node - if (cluster().size() > 1) { - logger.info(""--> shutting down random node""); - internalCluster().stopRandomDataNode(); - } - } else if (chaosType < 8) { - // Randomly create an index - String index = ""test-rand-"" + randomIndices; - logger.info(""--> creating random index [{}]"", index); - createTestIndex(index); - randomIndices++; - } else { - // Take a break - logger.info(""--> noop""); - } - } - - logger.info(""--> waiting for async indices creation to finish""); - for (int i = 0; i < asyncIndices; i++) { - asyncIndexThreads[i].join(); - } - - logger.info(""--> update index settings to back to normal""); - assertAcked(client().admin().indices().prepareUpdateSettings(""test-*"").setSettings(ImmutableSettings.builder() - .put(AbstractIndexStore.INDEX_STORE_THROTTLE_TYPE, ""node"") - )); - - // Make sure that snapshot finished - doesn't matter if it failed or succeeded - try { - CreateSnapshotResponse snapshotResponse = snapshotResponseFuture.get(); - SnapshotInfo snapshotInfo = snapshotResponse.getSnapshotInfo(); - assertNotNull(snapshotInfo); - logger.info(""--> snapshot is done with state [{}], total shards [{}], successful shards [{}]"", snapshotInfo.state(), snapshotInfo.totalShards(), snapshotInfo.successfulShards()); - } catch (Exception ex) { - logger.info(""--> snapshot didn't start properly"", ex); - } - - asyncNodesFuture.get(); - logger.info(""--> done""); - } - -" -1," public Principal authenticate(String username, String credentials) { - - // No user or no credentials - // Can't possibly authenticate, don't bother the database then - if (username == null || credentials == null) { - if (log.isDebugEnabled()) - log.debug(sm.getString(""memoryRealm.authenticateFailure"", username)); - return null; - } - - GenericPrincipal principal = principals.get(username); - - if(principal == null || principal.getPassword() == null) { - // User was not found in the database of the password was null - - if (log.isDebugEnabled()) - log.debug(sm.getString(""memoryRealm.authenticateFailure"", username)); - return null; - } - - boolean validated = getCredentialHandler().matches(credentials, principal.getPassword()); - - if (validated) { - if (log.isDebugEnabled()) - log.debug(sm.getString(""memoryRealm.authenticateSuccess"", username)); - return principal; - } else { - if (log.isDebugEnabled()) - log.debug(sm.getString(""memoryRealm.authenticateFailure"", username)); - return null; - } - } - - - // -------------------------------------------------------- Package Methods - - - /** - * Add a new user to the in-memory database. - * - * @param username User's username - * @param password User's password (clear text) - * @param roles Comma-delimited set of roles associated with this user - */ -" -1," public Object getValue(Object o) { - if ( location.getMember() == null ) { - return o; - } - else { - return ReflectionHelper.getValue( location.getMember(), o ); - } - } - - @Override -" -1," private String buildErrorMessage(Throwable e, Object[] args) { - String errorKey = ""struts.message.upload.error."" + e.getClass().getSimpleName(); - if (LOG.isDebugEnabled()) - LOG.debug(""Preparing error message for key: [#0]"", errorKey); - return LocalizedTextUtil.findText(this.getClass(), errorKey, defaultLocale, e.getMessage(), args); - } - - /** - * Build action message. - * - * @param e - * @param args - * @return - */ -" -1," private void resetContext() throws Exception { - // Restore the original state ( pre reading web.xml in start ) - // If you extend this - override this method and make sure to clean up - - // Don't reset anything that is read from a element since - // elements are read at initialisation will not be read - // again for this object - children = new HashMap(); - startupTime = 0; - startTime = 0; - tldScanTime = 0; - - // Bugzilla 32867 - distributable = false; - - applicationListeners = new String[0]; - applicationEventListenersObjects = new Object[0]; - applicationLifecycleListenersObjects = new Object[0]; - jspConfigDescriptor = new ApplicationJspConfigDescriptor(); - - initializers.clear(); - - if(log.isDebugEnabled()) - log.debug(""resetContext "" + getObjectName()); - } - - /** - * Return a String representation of this component. - */ - @Override -" -1," public void testRestoreToShadow() throws ExecutionException, InterruptedException { - Settings nodeSettings = nodeSettings(); - - internalCluster().startNodesAsync(3, nodeSettings).get(); - final Path dataPath = newTempDir().toPath(); - Settings idxSettings = ImmutableSettings.builder() - .put(IndexMetaData.SETTING_NUMBER_OF_SHARDS, 1) - .put(IndexMetaData.SETTING_NUMBER_OF_REPLICAS, 0).build(); - assertAcked(prepareCreate(""foo"").setSettings(idxSettings)); - ensureGreen(); - final int numDocs = randomIntBetween(10, 100); - for (int i = 0; i < numDocs; i++) { - client().prepareIndex(""foo"", ""doc"", """"+i).setSource(""foo"", ""bar"").get(); - } - assertNoFailures(client().admin().indices().prepareFlush().setForce(true).setWaitIfOngoing(true).execute().actionGet()); - - assertAcked(client().admin().cluster().preparePutRepository(""test-repo"") - .setType(""fs"").setSettings(ImmutableSettings.settingsBuilder() - .put(""location"", newTempDir().toPath()))); - CreateSnapshotResponse createSnapshotResponse = client().admin().cluster().prepareCreateSnapshot(""test-repo"", ""test-snap"").setWaitForCompletion(true).setIndices(""foo"").get(); - assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), greaterThan(0)); - assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), equalTo(createSnapshotResponse.getSnapshotInfo().totalShards())); - assertThat(client().admin().cluster().prepareGetSnapshots(""test-repo"").setSnapshots(""test-snap"").get().getSnapshots().get(0).state(), equalTo(SnapshotState.SUCCESS)); - - Settings shadowSettings = ImmutableSettings.builder() - .put(IndexMetaData.SETTING_DATA_PATH, dataPath.toAbsolutePath().toString()) - .put(IndexMetaData.SETTING_SHADOW_REPLICAS, true) - .put(IndexMetaData.SETTING_SHARED_FILESYSTEM, true) - .put(IndexMetaData.SETTING_NUMBER_OF_REPLICAS, 2).build(); - - logger.info(""--> restore the index into shadow replica index""); - RestoreSnapshotResponse restoreSnapshotResponse = client().admin().cluster().prepareRestoreSnapshot(""test-repo"", ""test-snap"") - .setIndexSettings(shadowSettings).setWaitForCompletion(true) - .setRenamePattern(""(.+)"").setRenameReplacement(""$1-copy"") - .execute().actionGet(); - assertThat(restoreSnapshotResponse.getRestoreInfo().totalShards(), greaterThan(0)); - ensureGreen(); - refresh(); - - for (IndicesService service : internalCluster().getDataNodeInstances(IndicesService.class)) { - if (service.hasIndex(""foo-copy"")) { - IndexShard shard = service.indexServiceSafe(""foo-copy"").shard(0); - if (shard.routingEntry().primary()) { - assertFalse(shard instanceof ShadowIndexShard); - } else { - assertTrue(shard instanceof ShadowIndexShard); - } - } - } - logger.info(""--> performing query""); - SearchResponse resp = client().prepareSearch(""foo-copy"").setQuery(matchAllQuery()).get(); - assertHitCount(resp, numDocs); - - } - - @Test -" -1," public KeyPair generateKeyPair() - { - if (!initialised) - { - DSAParametersGenerator pGen = new DSAParametersGenerator(); - - pGen.init(strength, certainty, random); - param = new DSAKeyGenerationParameters(random, pGen.generateParameters()); - engine.init(param); - initialised = true; - } - - AsymmetricCipherKeyPair pair = engine.generateKeyPair(); - DSAPublicKeyParameters pub = (DSAPublicKeyParameters)pair.getPublic(); - DSAPrivateKeyParameters priv = (DSAPrivateKeyParameters)pair.getPrivate(); - - return new KeyPair(new BCDSAPublicKey(pub), new BCDSAPrivateKey(priv)); - } -" -1," public void testInvalidate() throws IOException { - ProjectWorkspace workspace = - TestDataHelper.createProjectWorkspaceForScenario(this, ""parser_with_cell"", tmp); - workspace.setUp(); - - // Warm the parser cache. - TestContext context = new TestContext(); - ProcessResult runBuckResult = - workspace.runBuckdCommand(context, ""query"", ""deps(//Apps:TestAppsLibrary)""); - runBuckResult.assertSuccess(); - assertThat( - runBuckResult.getStdout(), - Matchers.containsString( - ""//Apps:TestAppsLibrary\n"" - + ""//Libraries/Dep1:Dep1_1\n"" - + ""//Libraries/Dep1:Dep1_2\n"" - + ""bar//Dep2:Dep2"")); - - // Save the parser cache to a file. - NamedTemporaryFile tempFile = new NamedTemporaryFile(""parser_data"", null); - runBuckResult = - workspace.runBuckdCommand(context, ""parser-cache"", ""--save"", tempFile.get().toString()); - runBuckResult.assertSuccess(); - - // Write an empty content to Apps/BUCK. - Path path = tmp.getRoot().resolve(""Apps/BUCK""); - byte[] data = {}; - Files.write(path, data); - - // Write an empty content to Apps/BUCK. - Path invalidationJsonPath = tmp.getRoot().resolve(""invalidation-data.json""); - String jsonData = ""[{\""path\"":\""Apps/BUCK\"",\""status\"":\""M\""}]""; - Files.write(invalidationJsonPath, jsonData.getBytes(StandardCharsets.UTF_8)); - - context = new TestContext(); - // Load the parser cache to a new buckd context. - runBuckResult = - workspace.runBuckdCommand( - context, - ""parser-cache"", - ""--load"", - tempFile.get().toString(), - ""--changes"", - invalidationJsonPath.toString()); - runBuckResult.assertSuccess(); - - // Perform the query again. - try { - workspace.runBuckdCommand(context, ""query"", ""deps(//Apps:TestAppsLibrary)""); - } catch (HumanReadableException e) { - assertThat( - e.getMessage(), Matchers.containsString(""//Apps:TestAppsLibrary could not be found"")); - } - } -" -1," public void send(final String format, final Object... args) { - descriptor.debug(logger, format, args); - } - } - final Debug debug = new Debug(); - Set users = RecipientProviderUtilities.getChangeSetAuthors(Collections.>singleton(context.getRun()), debug); - RecipientProviderUtilities.addUsers(users, context.getListener(), env, to, cc, bcc, debug); - } - - @Extension - public static final class DescriptorImpl extends RecipientProviderDescriptor { - @Override - public String getDisplayName() { - return ""Developers""; - } - } -} -" -1," public void testRejectBindWithDNButNoPassword() - throws Exception - { - if (! isDirectoryInstanceAvailable()) - { - return; - } - - LDAPConnection conn = getUnauthenticatedConnection(); - SimpleBindRequest bindRequest = new SimpleBindRequest(getTestBindDN(), """"); - - try - { - bindRequest.process(conn, 1); - fail(""Expected an exception when binding with a DN but no password""); - } - catch (LDAPException le) - { - assertEquals(le.getResultCode(), ResultCode.PARAM_ERROR); - } - - - // Reconfigure the connection so that it will allow binds with a DN but no - // password. - conn.getConnectionOptions().setBindWithDNRequiresPassword(false); - try - { - bindRequest.process(conn, 1); - } - catch (LDAPException le) - { - // The server will still likely reject the operation, but we should at - // least verify that it wasn't a parameter error. - assertFalse(le.getResultCode() == ResultCode.PARAM_ERROR); - } - - conn.getConnectionOptions().setBindWithDNRequiresPassword(true); - conn.close(); - } -" -1," public LockoutPolicy getLockoutPolicy() { - LockoutPolicy res = IdentityZoneHolder.get().getConfig().getClientLockoutPolicy(); - return res.getLockoutAfterFailures() != -1 ? res : defaultLockoutPolicy; - } - - @Override -" -1," private void detectJPA() { - // check whether we have Persistence on the classpath - Class persistenceClass; - try { - persistenceClass = run( LoadClass.action( PERSISTENCE_CLASS_NAME, this.getClass() ) ); - } - catch ( ValidationException e ) { - log.debugf( - ""Cannot find %s on classpath. Assuming non JPA 2 environment. All properties will per default be traversable."", - PERSISTENCE_CLASS_NAME - ); - return; - } - - // check whether Persistence contains getPersistenceUtil - Method persistenceUtilGetter = run( GetMethod.action( persistenceClass, PERSISTENCE_UTIL_METHOD ) ); - if ( persistenceUtilGetter == null ) { - log.debugf( - ""Found %s on classpath, but no method '%s'. Assuming JPA 1 environment. All properties will per default be traversable."", - PERSISTENCE_CLASS_NAME, - PERSISTENCE_UTIL_METHOD - ); - return; - } - - // try to invoke the method to make sure that we are dealing with a complete JPA2 implementation - // unfortunately there are several incomplete implementations out there (see HV-374) - try { - Object persistence = run( NewInstance.action( persistenceClass, ""persistence provider"" ) ); - ReflectionHelper.getValue(persistenceUtilGetter, persistence ); - } - catch ( Exception e ) { - log.debugf( - ""Unable to invoke %s.%s. Inconsistent JPA environment. All properties will per default be traversable."", - PERSISTENCE_CLASS_NAME, - PERSISTENCE_UTIL_METHOD - ); - } - - log.debugf( - ""Found %s on classpath containing '%s'. Assuming JPA 2 environment. Trying to instantiate JPA aware TraversableResolver"", - PERSISTENCE_CLASS_NAME, - PERSISTENCE_UTIL_METHOD - ); - - try { - @SuppressWarnings(""unchecked"") - Class jpaAwareResolverClass = (Class) - run( LoadClass.action( JPA_AWARE_TRAVERSABLE_RESOLVER_CLASS_NAME, this.getClass() ) ); - jpaTraversableResolver = run( NewInstance.action( jpaAwareResolverClass, """" ) ); - log.debugf( - ""Instantiated JPA aware TraversableResolver of type %s."", JPA_AWARE_TRAVERSABLE_RESOLVER_CLASS_NAME - ); - } - catch ( ValidationException e ) { - log.debugf( - ""Unable to load or instantiate JPA aware resolver %s. All properties will per default be traversable."", - JPA_AWARE_TRAVERSABLE_RESOLVER_CLASS_NAME - ); - } - } - - @Override -" -1," public void addRecipients(final ExtendedEmailPublisherContext context, EnvVars env, Set to, Set cc, Set bcc) { - final class Debug implements RecipientProviderUtilities.IDebug { - private final ExtendedEmailPublisherDescriptor descriptor - = Jenkins.getActiveInstance().getDescriptorByType(ExtendedEmailPublisherDescriptor.class); - - private final PrintStream logger = context.getListener().getLogger(); - - public void send(final String format, final Object... args) { - descriptor.debug(logger, format, args); - } - } - final Debug debug = new Debug(); - Run run = context.getRun(); - final Result runResult = run.getResult(); - if (run instanceof AbstractBuild) { - Set users = ((AbstractBuild)run).getCulprits(); - RecipientProviderUtilities.addUsers(users, context.getListener(), env, to, cc, bcc, debug); - } else if (runResult != null) { - List> builds = new ArrayList<>(); - Run build = run; - builds.add(build); - build = build.getPreviousCompletedBuild(); - while (build != null) { - final Result buildResult = build.getResult(); - if (buildResult != null) { - if (buildResult.isWorseThan(Result.SUCCESS)) { - debug.send(""Including build %s with status %s"", build.getId(), buildResult); - builds.add(build); - } else { - break; - } - } - build = build.getPreviousCompletedBuild(); - } - Set users = RecipientProviderUtilities.getChangeSetAuthors(builds, debug); - RecipientProviderUtilities.addUsers(users, context.getListener(), env, to, cc, bcc, debug); - } - } - - @Extension -" -1," protected boolean isProbablePrime(BigInteger x) - { - /* - * Primes class for FIPS 186-4 C.3 primality checking - */ - return !Primes.hasAnySmallFactors(x) && Primes.isMRProbablePrime(x, param.getRandom(), iterations); - } - -" -1," public void batchingShardUpdateTaskTest() throws Exception { - - final Client client = client(); - - logger.info(""--> creating repository""); - assertAcked(client.admin().cluster().preparePutRepository(""test-repo"") - .setType(""fs"").setSettings(ImmutableSettings.settingsBuilder() - .put(""location"", newTempDir()) - .put(""compress"", randomBoolean()) - .put(""chunk_size"", randomIntBetween(100, 1000)))); - - assertAcked(prepareCreate(""test-idx"", 0, settingsBuilder().put(""number_of_shards"", between(1, 20)) - .put(""number_of_replicas"", 0))); - ensureGreen(); - - logger.info(""--> indexing some data""); - final int numdocs = randomIntBetween(10, 100); - IndexRequestBuilder[] builders = new IndexRequestBuilder[numdocs]; - for (int i = 0; i < builders.length; i++) { - builders[i] = client().prepareIndex(""test-idx"", ""type1"", Integer.toString(i)).setSource(""field1"", ""bar "" + i); - } - indexRandom(true, builders); - flushAndRefresh(); - - final int numberOfShards = getNumShards(""test-idx"").numPrimaries; - logger.info(""number of shards: {}"", numberOfShards); - - final ClusterService clusterService = internalCluster().clusterService(internalCluster().getMasterName()); - BlockingClusterStateListener snapshotListener = new BlockingClusterStateListener(clusterService, ""update_snapshot ["", ""update snapshot state"", Priority.HIGH); - try { - clusterService.addFirst(snapshotListener); - logger.info(""--> snapshot""); - ListenableActionFuture snapshotFuture = client.admin().cluster().prepareCreateSnapshot(""test-repo"", ""test-snap"").setWaitForCompletion(true).setIndices(""test-idx"").execute(); - - // Await until shard updates are in pending state. - assertBusyPendingTasks(""update snapshot state"", numberOfShards); - snapshotListener.unblock(); - - // Check that the snapshot was successful - CreateSnapshotResponse createSnapshotResponse = snapshotFuture.actionGet(); - assertEquals(SnapshotState.SUCCESS, createSnapshotResponse.getSnapshotInfo().state()); - assertEquals(numberOfShards, createSnapshotResponse.getSnapshotInfo().totalShards()); - assertEquals(numberOfShards, createSnapshotResponse.getSnapshotInfo().successfulShards()); - - } finally { - clusterService.remove(snapshotListener); - } - - // Check that we didn't timeout - assertFalse(snapshotListener.timedOut()); - // Check that cluster state update task was called only once - assertEquals(1, snapshotListener.count()); - - logger.info(""--> close indices""); - client.admin().indices().prepareClose(""test-idx"").get(); - - BlockingClusterStateListener restoreListener = new BlockingClusterStateListener(clusterService, ""restore_snapshot["", ""update snapshot state"", Priority.HIGH); - - try { - clusterService.addFirst(restoreListener); - logger.info(""--> restore snapshot""); - ListenableActionFuture futureRestore = client.admin().cluster().prepareRestoreSnapshot(""test-repo"", ""test-snap"").setWaitForCompletion(true).execute(); - - // Await until shard updates are in pending state. - assertBusyPendingTasks(""update snapshot state"", numberOfShards); - restoreListener.unblock(); - - RestoreSnapshotResponse restoreSnapshotResponse = futureRestore.actionGet(); - assertThat(restoreSnapshotResponse.getRestoreInfo().totalShards(), equalTo(numberOfShards)); - - } finally { - clusterService.remove(restoreListener); - } - - // Check that we didn't timeout - assertFalse(restoreListener.timedOut()); - // Check that cluster state update task was called only once - assertEquals(1, restoreListener.count()); - } - -" -1," private File getLocationUnderBuild(AbstractBuild build) { - return new File(build.getRootDir(), ""fileParameters/"" + location); - } - - /** - * Default implementation from {@link File}. - */ -" -1," protected Details authenticate(String username, String password) throws AuthenticationException { - Details u = loadUserByUsername(username); - if (!u.isPasswordCorrect(password)) - throw new BadCredentialsException(""Failed to login as ""+username); - return u; - } - - /** - * Show the sign up page with the data from the identity. - */ - @Override -" -1," public void resetPassword_InvalidPasswordException_NewPasswordSameAsOld() { - ScimUser user = new ScimUser(""user-id"", ""username"", ""firstname"", ""lastname""); - user.setMeta(new ScimMeta(new Date(), new Date(), 0)); - user.setPrimaryEmail(""foo@example.com""); - ExpiringCode expiringCode = new ExpiringCode(""good_code"", - new Timestamp(System.currentTimeMillis() + UaaResetPasswordService.PASSWORD_RESET_LIFETIME), ""user-id"", null); - when(codeStore.retrieveCode(""good_code"")).thenReturn(expiringCode); - when(scimUserProvisioning.retrieve(""user-id"")).thenReturn(user); - when(scimUserProvisioning.checkPasswordMatches(""user-id"", ""Passwo3dAsOld"")) - .thenThrow(new InvalidPasswordException(""Your new password cannot be the same as the old password."", UNPROCESSABLE_ENTITY)); - SecurityContext securityContext = mock(SecurityContext.class); - when(securityContext.getAuthentication()).thenReturn(new MockAuthentication()); - SecurityContextHolder.setContext(securityContext); - try { - emailResetPasswordService.resetPassword(""good_code"", ""Passwo3dAsOld""); - fail(); - } catch (InvalidPasswordException e) { - assertEquals(""Your new password cannot be the same as the old password."", e.getMessage()); - assertEquals(UNPROCESSABLE_ENTITY, e.getStatus()); - } - } - - @Test -" -1," public boolean getValidateClientProvidedNewSessionId() { return false; } -" -1," protected Http11AprProcessor createProcessor() { - Http11AprProcessor processor = new Http11AprProcessor( - proto.getMaxHttpHeaderSize(), (AprEndpoint)proto.endpoint, - proto.getMaxTrailerSize()); - processor.setAdapter(proto.getAdapter()); - processor.setMaxKeepAliveRequests(proto.getMaxKeepAliveRequests()); - processor.setKeepAliveTimeout(proto.getKeepAliveTimeout()); - processor.setConnectionUploadTimeout( - proto.getConnectionUploadTimeout()); - processor.setDisableUploadTimeout(proto.getDisableUploadTimeout()); - processor.setCompressionMinSize(proto.getCompressionMinSize()); - processor.setCompression(proto.getCompression()); - processor.setNoCompressionUserAgents(proto.getNoCompressionUserAgents()); - processor.setCompressableMimeTypes(proto.getCompressableMimeTypes()); - processor.setRestrictedUserAgents(proto.getRestrictedUserAgents()); - processor.setSocketBuffer(proto.getSocketBuffer()); - processor.setMaxSavePostSize(proto.getMaxSavePostSize()); - processor.setServer(proto.getServer()); - processor.setClientCertProvider(proto.getClientCertProvider()); - register(processor); - return processor; - } - - @Override -" -1," public synchronized Servlet loadServlet() throws ServletException { - - // Nothing to do if we already have an instance or an instance pool - if (!singleThreadModel && (instance != null)) - return instance; - - PrintStream out = System.out; - if (swallowOutput) { - SystemLogHandler.startCapture(); - } - - Servlet servlet; - try { - long t1=System.currentTimeMillis(); - // Complain if no servlet class has been specified - if (servletClass == null) { - unavailable(null); - throw new ServletException - (sm.getString(""standardWrapper.notClass"", getName())); - } - - InstanceManager instanceManager = ((StandardContext)getParent()).getInstanceManager(); - try { - servlet = (Servlet) instanceManager.newInstance(servletClass); - } catch (ClassCastException e) { - unavailable(null); - // Restore the context ClassLoader - throw new ServletException - (sm.getString(""standardWrapper.notServlet"", servletClass), e); - } catch (Throwable e) { - ExceptionUtils.handleThrowable(e); - unavailable(null); - - // Added extra log statement for Bugzilla 36630: - // http://issues.apache.org/bugzilla/show_bug.cgi?id=36630 - if(log.isDebugEnabled()) { - log.debug(sm.getString(""standardWrapper.instantiate"", servletClass), e); - } - - // Restore the context ClassLoader - throw new ServletException - (sm.getString(""standardWrapper.instantiate"", servletClass), e); - } - - if (multipartConfigElement == null) { - MultipartConfig annotation = - servlet.getClass().getAnnotation(MultipartConfig.class); - if (annotation != null) { - multipartConfigElement = - new MultipartConfigElement(annotation); - } - } - - ServletSecurity secAnnotation = - servlet.getClass().getAnnotation(ServletSecurity.class); - Context ctxt = (Context) getParent(); - if (secAnnotation != null) { - ctxt.addServletSecurity( - new ApplicationServletRegistration(this, ctxt), - new ServletSecurityElement(secAnnotation)); - } - - - // Special handling for ContainerServlet instances - if ((servlet instanceof ContainerServlet) && - (isContainerProvidedServlet(servletClass) || - ctxt.getPrivileged() )) { - ((ContainerServlet) servlet).setWrapper(this); - } - - classLoadTime=(int) (System.currentTimeMillis() -t1); - - initServlet(servlet); - - // Register our newly initialized instance - singleThreadModel = servlet instanceof SingleThreadModel; - if (singleThreadModel) { - if (instancePool == null) - instancePool = new Stack(); - } - fireContainerEvent(""load"", this); - - loadTime=System.currentTimeMillis() -t1; - } finally { - if (swallowOutput) { - String log = SystemLogHandler.stopCapture(); - if (log != null && log.length() > 0) { - if (getServletContext() != null) { - getServletContext().log(log); - } else { - out.println(log); - } - } - } - } - return servlet; - - } - -" -1," public void testWelcomeFileStrict() throws Exception { - - Tomcat tomcat = getTomcatInstance(); - - File appDir = new File(""test/webapp""); - - StandardContext ctxt = (StandardContext) tomcat.addWebapp(null, ""/test"", - appDir.getAbsolutePath()); - ctxt.setReplaceWelcomeFiles(true); - ctxt.addWelcomeFile(""index.jsp""); - // Mapping for *.do is defined in web.xml - ctxt.addWelcomeFile(""index.do""); - - // Simulate STRICT_SERVLET_COMPLIANCE - ctxt.setResourceOnlyServlets(""""); - - tomcat.start(); - ByteChunk bc = new ByteChunk(); - int rc = getUrl(""http://localhost:"" + getPort() + - ""/test/welcome-files"", bc, new HashMap>()); - Assert.assertEquals(HttpServletResponse.SC_OK, rc); - Assert.assertTrue(bc.toString().contains(""JSP"")); - - rc = getUrl(""http://localhost:"" + getPort() + - ""/test/welcome-files/sub"", bc, - new HashMap>()); - Assert.assertEquals(HttpServletResponse.SC_NOT_FOUND, rc); - } - - /** - * Prepare a string to search in messages that contain a timestamp, when it - * is known that the timestamp was printed between {@code timeA} and - * {@code timeB}. - */ -" -1," protected void stripScopesFromAuthentication(String identityZoneId, HttpServletRequest servletRequest) { - OAuth2Authentication oa = (OAuth2Authentication)SecurityContextHolder.getContext().getAuthentication(); - - Object oaDetails = oa.getDetails(); - - //strip client scopes - OAuth2Request request = oa.getOAuth2Request(); - Collection requestAuthorities = UaaStringUtils.getStringsFromAuthorities(request.getAuthorities()); - Set clientScopes = new HashSet<>(); - Set clientAuthorities = new HashSet<>(); - for (String s : getZoneSwitchingScopes(identityZoneId)) { - String scope = stripPrefix(s, identityZoneId); - if (request.getScope().contains(s)) { - clientScopes.add(scope); - } - if (requestAuthorities.contains(s)) { - clientAuthorities.add(scope); - } - } - request = new OAuth2Request( - request.getRequestParameters(), - request.getClientId(), - UaaStringUtils.getAuthoritiesFromStrings(clientAuthorities), - request.isApproved(), - clientScopes, - request.getResourceIds(), - request.getRedirectUri(), - request.getResponseTypes(), - request.getExtensions() - ); - - - UaaAuthentication userAuthentication = (UaaAuthentication)oa.getUserAuthentication(); - if (userAuthentication!=null) { - userAuthentication = new UaaAuthentication( - userAuthentication.getPrincipal(), - null, - UaaStringUtils.getAuthoritiesFromStrings(clientScopes), - new UaaAuthenticationDetails(servletRequest), - true); - } - oa = new OAuth2Authentication(request, userAuthentication); - oa.setDetails(oaDetails); - SecurityContextHolder.getContext().setAuthentication(oa); - } - -" -1," public void testHandleNoInitialResponseNull() throws Exception - { - final AuthenticationResult result = _negotiator.handleResponse(null); - assertEquals(""Unexpected authentication status"", AuthenticationResult.AuthenticationStatus.CONTINUE, result.getStatus()); - assertArrayEquals(""Unexpected authentication challenge"", new byte[0], result.getChallenge()); - - final AuthenticationResult firstResult = _negotiator.handleResponse(VALID_RESPONSE.getBytes()); - assertEquals(""Unexpected first authentication result"", _expectedResult, firstResult); - } -" -1," private int readStored(final byte[] buffer, final int offset, final int length) throws IOException { - - if (current.hasDataDescriptor) { - if (lastStoredEntry == null) { - readStoredEntry(); - } - return lastStoredEntry.read(buffer, offset, length); - } - - final long csize = current.entry.getSize(); - if (current.bytesRead >= csize) { - return -1; - } - - if (buf.position() >= buf.limit()) { - buf.position(0); - final int l = in.read(buf.array()); - if (l == -1) { - return -1; - } - buf.limit(l); - - count(l); - current.bytesReadFromStream += l; - } - - int toRead = Math.min(buf.remaining(), length); - if ((csize - current.bytesRead) < toRead) { - // if it is smaller than toRead then it fits into an int - toRead = (int) (csize - current.bytesRead); - } - buf.get(buffer, offset, toRead); - current.bytesRead += toRead; - return toRead; - } - - /** - * Implementation of read for DEFLATED entries. - */ -" -1," private Object readResolve() { - return INSTANCE; - } - -" -1," private static ZipOutputStream getZipOutputStream(OutputStream out, Charset charset) { - charset = (null == charset) ? DEFAULT_CHARSET : charset; - return new ZipOutputStream(out, charset); - } - - /** - * 递归压缩文件夹 - * - * @param out 压缩文件存储对象 - * @param srcRootDir 压缩文件夹根目录的子路径 - * @param file 当前递归压缩的文件或目录对象 - * @throws UtilException IO异常 - */ -" -1," public boolean isFinished() { - return endChunk; - } -" -1," public Object compile(String expression) throws OgnlException { - if (enableExpressionCache) { - Object o = expressions.get(expression); - if (o == null) { - o = Ognl.parseExpression(expression); - expressions.putIfAbsent(expression, o); - } - return o; - } else - return Ognl.parseExpression(expression); - } - - /** - * Copies the properties in the object ""from"" and sets them in the object ""to"" - * using specified type converter, or {@link com.opensymphony.xwork2.conversion.impl.XWorkConverter} if none - * is specified. - * - * @param from the source object - * @param to the target object - * @param context the action context we're running under - * @param exclusions collection of method names to excluded from copying ( can be null) - * @param inclusions collection of method names to included copying (can be null) - * note if exclusions AND inclusions are supplied and not null nothing will get copied. - */ -" -1," String hash(String plaintext, String salt, int iterations) throws EncryptionException; - - /** - * Encrypts the provided plaintext and returns a ciphertext string using the - * master secret key and default cipher transformation. - *

- * Compatibility with earlier ESAPI versions: The symmetric encryption - * in ESAPI 2.0 and later is not compatible with the encryption in ESAPI 1.4 - * or earlier. Not only are the interfaces slightly different, but they format - * of the serialized encrypted data is incompatible. Therefore, if you have - * encrypted data with ESAPI 1.4 or earlier, you must first encrypt it and - * then re-encrypt it with ESAPI 2.0. Backward compatibility with ESAPI 1.4 - * was proposed to both the ESAPI Developers and ESAPI Users mailing lists - * and voted down. More details are available in the ESAPI document - * - * Why Is OWASP Changing ESAPI Encryption? - *

- * Why this method is deprecated: Most cryptographers strongly suggest - * that if you are creating crypto functionality for general-purpose use, - * at a minimum you should ensure that it provides authenticity, integrity, - * and confidentiality. This method only provides confidentiality, but not - * authenticity or integrity. Therefore, you are encouraged to use - * one of the other encryption methods referenced below. Because this - * method provides neither authenticity nor integrity, it may be - * removed in some future ESAPI Java release. Note: there are some cases - * where authenticity / integrity are not that important. For instance, consider - * a case where the encrypted data is never out of your application's control. For - * example, if you receive data that your application is encrypting itself and then - * storing the encrypted data in its own database for later use (and no other - * applications can query or update that column of the database), providing - * confidentiality alone might be sufficient. However, if there are cases - * where your application will be sending or receiving already encrypted data - * over an insecure, unauthenticated channel, in such cases authenticity and - * integrity of the encrypted data likely is important and this method should - * be avoided in favor of one of the other two. - * - * @param plaintext - * the plaintext {@code String} to encrypt. Note that if you are encrypting - * general bytes, you should encypt that byte array to a String using - * ""UTF-8"" encoding. - * - * @return - * the encrypted, base64-encoded String representation of 'plaintext' plus - * the random IV used. - * - * @throws EncryptionException - * if the specified encryption algorithm could not be found or another problem exists with - * the encryption of 'plaintext' - * - * @see #encrypt(PlainText) - * @see #encrypt(SecretKey, PlainText) - * - * @deprecated As of 1.4.2; use {@link #encrypt(PlainText)} instead, which - * also ensures message authenticity. This method will be - * completely removed as of the next major release or point - * release (3.0 or 2.1, whichever comes first) as per OWASP - * deprecation policy. - */ -" -1," public void handleDialog(ActionRequest req, ActionResponse resp) throws IOException, PortletException { - List lines = new ArrayList(); - req.getPortletSession().setAttribute(""lines"", lines); - - lines.add(""handling dialog""); - StringBuilder txt = new StringBuilder(128); - - String clr = req.getActionParameters().getValue(""color""); - txt.append(""Color: "").append(clr); - lines.add(txt.toString()); - LOGGER.fine(txt.toString()); - - resp.getRenderParameters().setValue(""color"", clr); - - txt.setLength(0); - Part part = null; - try { - part = req.getPart(""file""); - } catch (Throwable t) {} - - if ((part != null) && (part.getSubmittedFileName() != null) && - (part.getSubmittedFileName().length() > 0)) { - txt.append(""Uploaded file name: "").append(part.getSubmittedFileName()); - txt.append("", part name: "").append(part.getName()); - txt.append("", size: "").append(part.getSize()); - txt.append("", content type: "").append(part.getContentType()); - lines.add(txt.toString()); - LOGGER.fine(txt.toString()); - txt.setLength(0); - txt.append(""Headers: ""); - String sep = """"; - for (String hdrname : part.getHeaderNames()) { - txt.append(sep).append(hdrname).append(""="").append(part.getHeaders(hdrname)); - sep = "", ""; - } - lines.add(txt.toString()); - LOGGER.fine(txt.toString()); - - // Store the file in a temporary location in the webapp where it can be served. - // Note that this is, in general, not what you want to do in production, as - // there can be problems serving the resource. Did it this way for a - // quick solution that doesn't require additional Tomcat configuration. - - try { - String path = req.getPortletContext().getRealPath(TMP); - File dir = new File(path); - lines.add(""Temp path: "" + dir.getCanonicalPath()); - if (!dir.exists()) { - lines.add(""Creating directory. Path: "" + dir.getCanonicalPath()); - Files.createDirectories(dir.toPath()); - } - String fn = TMP + part.getSubmittedFileName(); - lines.add(""Temp file: "" + fn); - path = req.getPortletContext().getRealPath(fn); - File img = new File(path); - if (img.exists()) { - lines.add(""deleting existing temp file.""); - img.delete(); - } - InputStream is = part.getInputStream(); - Files.copy(is, img.toPath(), StandardCopyOption.REPLACE_EXISTING); - - resp.getRenderParameters().setValue(""fn"", fn); - resp.getRenderParameters().setValue(""ct"", part.getContentType()); - - } catch (Exception e) { - lines.add(""Exception doing I/O: "" + e.toString()); - } - } else { - lines.add(""file part was null""); - } - - } - - @RenderMethod(portletNames = ""MultipartPortlet"") -" -1," protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain filterChain) - throws ServletException, IOException { - - HttpServletRequest requestToUse = request; - - if (""POST"".equals(request.getMethod()) && request.getAttribute(WebUtils.ERROR_EXCEPTION_ATTRIBUTE) == null) { - String paramValue = request.getParameter(this.methodParam); - if (StringUtils.hasLength(paramValue)) { - requestToUse = new HttpMethodRequestWrapper(request, paramValue); - } - } - - filterChain.doFilter(requestToUse, response); - } - - - /** - * Simple {@link HttpServletRequest} wrapper that returns the supplied method for - * {@link HttpServletRequest#getMethod()}. - */ -" -1," private ScimGroupExternalMember getExternalGroupMap(final String groupId, - final String externalGroup, - final String origin) - throws ScimResourceNotFoundException { - try { - ScimGroupExternalMember u = jdbcTemplate.queryForObject(GET_GROUPS_WITH_EXTERNAL_GROUP_MAPPINGS_SQL, - rowMapper, groupId, origin, externalGroup); - return u; - } catch (EmptyResultDataAccessException e) { - throw new ScimResourceNotFoundException(""The mapping between groupId "" + groupId + "" and external group "" - + externalGroup + "" does not exist""); - } - } - -" -1," protected void serveResource(HttpServletRequest request, - HttpServletResponse response, - boolean content, - String encoding) - throws IOException, ServletException { - - boolean serveContent = content; - - // Identify the requested resource path - String path = getRelativePath(request); - if (debug > 0) { - if (serveContent) - log(""DefaultServlet.serveResource: Serving resource '"" + - path + ""' headers and data""); - else - log(""DefaultServlet.serveResource: Serving resource '"" + - path + ""' headers only""); - } - - WebResource resource = resources.getResource(path); - - if (!resource.exists()) { - // Check if we're included so we can return the appropriate - // missing resource name in the error - String requestUri = (String) request.getAttribute( - RequestDispatcher.INCLUDE_REQUEST_URI); - if (requestUri == null) { - requestUri = request.getRequestURI(); - } else { - // We're included - // SRV.9.3 says we must throw a FNFE - throw new FileNotFoundException(sm.getString( - ""defaultServlet.missingResource"", requestUri)); - } - - response.sendError(HttpServletResponse.SC_NOT_FOUND, requestUri); - return; - } - - if (!resource.canRead()) { - // Check if we're included so we can return the appropriate - // missing resource name in the error - String requestUri = (String) request.getAttribute( - RequestDispatcher.INCLUDE_REQUEST_URI); - if (requestUri == null) { - requestUri = request.getRequestURI(); - } else { - // We're included - // Spec doesn't say what to do in this case but a FNFE seems - // reasonable - throw new FileNotFoundException(sm.getString( - ""defaultServlet.missingResource"", requestUri)); - } - - response.sendError(HttpServletResponse.SC_FORBIDDEN, requestUri); - return; - } - - // If the resource is not a collection, and the resource path - // ends with ""/"" or ""\"", return NOT FOUND - if (resource.isFile() && (path.endsWith(""/"") || path.endsWith(""\\""))) { - // Check if we're included so we can return the appropriate - // missing resource name in the error - String requestUri = (String) request.getAttribute( - RequestDispatcher.INCLUDE_REQUEST_URI); - if (requestUri == null) { - requestUri = request.getRequestURI(); - } - response.sendError(HttpServletResponse.SC_NOT_FOUND, requestUri); - return; - } - - boolean isError = response.getStatus() >= HttpServletResponse.SC_BAD_REQUEST; - - boolean included = false; - // Check if the conditions specified in the optional If headers are - // satisfied. - if (resource.isFile()) { - // Checking If headers - included = (request.getAttribute( - RequestDispatcher.INCLUDE_CONTEXT_PATH) != null); - if (!included && !isError && !checkIfHeaders(request, response, resource)) { - return; - } - } - - // Find content type. - String contentType = resource.getMimeType(); - if (contentType == null) { - contentType = getServletContext().getMimeType(resource.getName()); - resource.setMimeType(contentType); - } - - // These need to reflect the original resource, not the potentially - // gzip'd version of the resource so get them now if they are going to - // be needed later - String eTag = null; - String lastModifiedHttp = null; - if (resource.isFile() && !isError) { - eTag = resource.getETag(); - lastModifiedHttp = resource.getLastModifiedHttp(); - } - - - // Serve a gzipped version of the file if present - boolean usingGzippedVersion = false; - if (gzip && !included && resource.isFile() && !path.endsWith("".gz"")) { - WebResource gzipResource = resources.getResource(path + "".gz""); - if (gzipResource.exists() && gzipResource.isFile()) { - Collection varyHeaders = response.getHeaders(""Vary""); - boolean addRequired = true; - for (String varyHeader : varyHeaders) { - if (""*"".equals(varyHeader) || - ""accept-encoding"".equalsIgnoreCase(varyHeader)) { - addRequired = false; - break; - } - } - if (addRequired) { - response.addHeader(""Vary"", ""accept-encoding""); - } - if (checkIfGzip(request)) { - response.addHeader(""Content-Encoding"", ""gzip""); - resource = gzipResource; - usingGzippedVersion = true; - } - } - } - - ArrayList ranges = null; - long contentLength = -1L; - - if (resource.isDirectory()) { - // Skip directory listings if we have been configured to - // suppress them - if (!listings) { - response.sendError(HttpServletResponse.SC_NOT_FOUND, - request.getRequestURI()); - return; - } - contentType = ""text/html;charset=UTF-8""; - } else { - if (!isError) { - if (useAcceptRanges) { - // Accept ranges header - response.setHeader(""Accept-Ranges"", ""bytes""); - } - - // Parse range specifier - ranges = parseRange(request, response, resource); - - // ETag header - response.setHeader(""ETag"", eTag); - - // Last-Modified header - response.setHeader(""Last-Modified"", lastModifiedHttp); - } - - // Get content length - contentLength = resource.getContentLength(); - // Special case for zero length files, which would cause a - // (silent) ISE when setting the output buffer size - if (contentLength == 0L) { - serveContent = false; - } - } - - ServletOutputStream ostream = null; - PrintWriter writer = null; - - if (serveContent) { - // Trying to retrieve the servlet output stream - try { - ostream = response.getOutputStream(); - } catch (IllegalStateException e) { - // If it fails, we try to get a Writer instead if we're - // trying to serve a text file - if (!usingGzippedVersion && - ((contentType == null) || - (contentType.startsWith(""text"")) || - (contentType.endsWith(""xml"")) || - (contentType.contains(""/javascript""))) - ) { - writer = response.getWriter(); - // Cannot reliably serve partial content with a Writer - ranges = FULL; - } else { - throw e; - } - } - } - - // Check to see if a Filter, Valve of wrapper has written some content. - // If it has, disable range requests and setting of a content length - // since neither can be done reliably. - ServletResponse r = response; - long contentWritten = 0; - while (r instanceof ServletResponseWrapper) { - r = ((ServletResponseWrapper) r).getResponse(); - } - if (r instanceof ResponseFacade) { - contentWritten = ((ResponseFacade) r).getContentWritten(); - } - if (contentWritten > 0) { - ranges = FULL; - } - - if (resource.isDirectory() || - isError || - ( (ranges == null || ranges.isEmpty()) - && request.getHeader(""Range"") == null ) || - ranges == FULL ) { - - // Set the appropriate output headers - if (contentType != null) { - if (debug > 0) - log(""DefaultServlet.serveFile: contentType='"" + - contentType + ""'""); - response.setContentType(contentType); - } - if (resource.isFile() && contentLength >= 0 && - (!serveContent || ostream != null)) { - if (debug > 0) - log(""DefaultServlet.serveFile: contentLength="" + - contentLength); - // Don't set a content length if something else has already - // written to the response. - if (contentWritten == 0) { - response.setContentLengthLong(contentLength); - } - } - - if (serveContent) { - try { - response.setBufferSize(output); - } catch (IllegalStateException e) { - // Silent catch - } - InputStream renderResult = null; - if (ostream == null) { - // Output via a writer so can't use sendfile or write - // content directly. - if (resource.isDirectory()) { - renderResult = render(getPathPrefix(request), resource); - } else { - renderResult = resource.getInputStream(); - } - copy(resource, renderResult, writer, encoding); - } else { - // Output is via an InputStream - if (resource.isDirectory()) { - renderResult = render(getPathPrefix(request), resource); - } else { - // Output is content of resource - if (!checkSendfile(request, response, resource, - contentLength, null)) { - // sendfile not possible so check if resource - // content is available directly - byte[] resourceBody = resource.getContent(); - if (resourceBody == null) { - // Resource content not available, use - // inputstream - renderResult = resource.getInputStream(); - } else { - // Use the resource content directly - ostream.write(resourceBody); - } - } - } - // If a stream was configured, it needs to be copied to - // the output (this method closes the stream) - if (renderResult != null) { - copy(resource, renderResult, ostream); - } - } - } - - } else { - - if ((ranges == null) || (ranges.isEmpty())) - return; - - // Partial content response. - - response.setStatus(HttpServletResponse.SC_PARTIAL_CONTENT); - - if (ranges.size() == 1) { - - Range range = ranges.get(0); - response.addHeader(""Content-Range"", ""bytes "" - + range.start - + ""-"" + range.end + ""/"" - + range.length); - long length = range.end - range.start + 1; - response.setContentLengthLong(length); - - if (contentType != null) { - if (debug > 0) - log(""DefaultServlet.serveFile: contentType='"" + - contentType + ""'""); - response.setContentType(contentType); - } - - if (serveContent) { - try { - response.setBufferSize(output); - } catch (IllegalStateException e) { - // Silent catch - } - if (ostream != null) { - if (!checkSendfile(request, response, resource, - range.end - range.start + 1, range)) - copy(resource, ostream, range); - } else { - // we should not get here - throw new IllegalStateException(); - } - } - } else { - response.setContentType(""multipart/byteranges; boundary="" - + mimeSeparation); - if (serveContent) { - try { - response.setBufferSize(output); - } catch (IllegalStateException e) { - // Silent catch - } - if (ostream != null) { - copy(resource, ostream, ranges.iterator(), contentType); - } else { - // we should not get here - throw new IllegalStateException(); - } - } - } - } - } - - - /** - * Parse the content-range header. - * - * @param request The servlet request we a)re processing - * @param response The servlet response we are creating - * @return Range - */ -" -1," private void findCloneMethod() { - try { - iCloneMethod = iPrototype.getClass().getMethod(""clone"", (Class[]) null); - } catch (final NoSuchMethodException ex) { - throw new IllegalArgumentException(""PrototypeCloneFactory: The clone method must exist and be public ""); - } - } - - /** - * Creates an object by calling the clone method. - * - * @return the new object - */ - @SuppressWarnings(""unchecked"") -" -1," public boolean isSequenceType() { return false; } - - - /* Traverseproc implementation */ - @Override -" -1," public void setDynamicAttribute(String uri, String localName, Object value) throws JspException { - if (ComponentUtils.altSyntax(getStack()) && ComponentUtils.isExpression(value)) { - dynamicAttributes.put(localName, String.valueOf(ObjectUtils.defaultIfNull(findValue(value.toString()), value))); - } else { - dynamicAttributes.put(localName, value); - } - } - -" -1," protected void onModified() throws IOException { - super.onModified(); - Jenkins.getInstance().trimLabels(); - } - } - - /** - * Set of installed cluster nodes. - *

- * We use this field with copy-on-write semantics. - * This field has mutable list (to keep the serialization look clean), - * but it shall never be modified. Only new completely populated slave - * list can be set here. - *

- * The field name should be really {@code nodes}, but again the backward compatibility - * prevents us from renaming. - */ - protected volatile NodeList slaves; - - /** - * Quiet period. - * - * This is {@link Integer} so that we can initialize it to '5' for upgrading users. - */ - /*package*/ Integer quietPeriod; - - /** - * Global default for {@link AbstractProject#getScmCheckoutRetryCount()} - */ - /*package*/ int scmCheckoutRetryCount; - - /** - * {@link View}s. - */ - private final CopyOnWriteArrayList views = new CopyOnWriteArrayList(); - - /** - * Name of the primary view. - *

- * Start with null, so that we can upgrade pre-1.269 data well. - * @since 1.269 - */ - private volatile String primaryView; - - private transient final ViewGroupMixIn viewGroupMixIn = new ViewGroupMixIn(this) { - protected List views() { return views; } - protected String primaryView() { return primaryView; } - protected void primaryView(String name) { primaryView=name; } - }; - - - private transient final FingerprintMap fingerprintMap = new FingerprintMap(); - - /** - * Loaded plugins. - */ - public transient final PluginManager pluginManager; - - public transient volatile TcpSlaveAgentListener tcpSlaveAgentListener; - - private transient UDPBroadcastThread udpBroadcastThread; - - private transient DNSMultiCast dnsMultiCast; - - /** - * List of registered {@link SCMListener}s. - */ - private transient final CopyOnWriteList scmListeners = new CopyOnWriteList(); - - /** - * TCP slave agent port. - * 0 for random, -1 to disable. - */ - private int slaveAgentPort =0; - - /** - * Whitespace-separated labels assigned to the master as a {@link Node}. - */ - private String label=""""; - - /** - * {@link hudson.security.csrf.CrumbIssuer} - */ - private volatile CrumbIssuer crumbIssuer; - - /** - * All labels known to Jenkins. This allows us to reuse the same label instances - * as much as possible, even though that's not a strict requirement. - */ - private transient final ConcurrentHashMap labels = new ConcurrentHashMap(); - - /** - * Load statistics of the entire system. - * - * This includes every executor and every job in the system. - */ - @Exported - public transient final OverallLoadStatistics overallLoad = new OverallLoadStatistics(); - - /** - * Load statistics of the free roaming jobs and slaves. - * - * This includes all executors on {@link Mode#NORMAL} nodes and jobs that do not have any assigned nodes. - * - * @since 1.467 - */ - @Exported - public transient final LoadStatistics unlabeledLoad = new UnlabeledLoadStatistics(); - - /** - * {@link NodeProvisioner} that reacts to {@link #unlabeledLoad}. - * @since 1.467 - */ - public transient final NodeProvisioner unlabeledNodeProvisioner = new NodeProvisioner(null,unlabeledLoad); - - /** - * @deprecated as of 1.467 - * Use {@link #unlabeledNodeProvisioner}. - * This was broken because it was tracking all the executors in the system, but it was only tracking - * free-roaming jobs in the queue. So {@link Cloud} fails to launch nodes when you have some exclusive - * slaves and free-roaming jobs in the queue. - */ - @Restricted(NoExternalUse.class) - public transient final NodeProvisioner overallNodeProvisioner = unlabeledNodeProvisioner; - - - public transient final ServletContext servletContext; - - /** - * Transient action list. Useful for adding navigation items to the navigation bar - * on the left. - */ - private transient final List actions = new CopyOnWriteArrayList(); - - /** - * List of master node properties - */ - private DescribableList,NodePropertyDescriptor> nodeProperties = new DescribableList,NodePropertyDescriptor>(this); - - /** - * List of global properties - */ - private DescribableList,NodePropertyDescriptor> globalNodeProperties = new DescribableList,NodePropertyDescriptor>(this); - - /** - * {@link AdministrativeMonitor}s installed on this system. - * - * @see AdministrativeMonitor - */ - public transient final List administrativeMonitors = getExtensionList(AdministrativeMonitor.class); - - /** - * Widgets on Hudson. - */ - private transient final List widgets = getExtensionList(Widget.class); - - /** - * {@link AdjunctManager} - */ - private transient final AdjunctManager adjuncts; - - /** - * Code that handles {@link ItemGroup} work. - */ - private transient final ItemGroupMixIn itemGroupMixIn = new ItemGroupMixIn(this,this) { - @Override - protected void add(TopLevelItem item) { - items.put(item.getName(),item); - } - - @Override - protected File getRootDirFor(String name) { - return Jenkins.this.getRootDirFor(name); - } - - /** - * Send the browser to the config page. - * use View to trim view/{default-view} from URL if possible - */ - @Override - protected String redirectAfterCreateItem(StaplerRequest req, TopLevelItem result) throws IOException { - String redirect = result.getUrl()+""configure""; - List ancestors = req.getAncestors(); - for (int i = ancestors.size() - 1; i >= 0; i--) { - Object o = ancestors.get(i).getObject(); - if (o instanceof View) { - redirect = req.getContextPath() + '/' + ((View)o).getUrl() + redirect; - break; - } - } - return redirect; - } - }; - - - /** - * Hook for a test harness to intercept Jenkins.getInstance() - * - * Do not use in the production code as the signature may change. - */ - public interface JenkinsHolder { - Jenkins getInstance(); - } - - static JenkinsHolder HOLDER = new JenkinsHolder() { - public Jenkins getInstance() { - return theInstance; - } - }; - - @CLIResolver - public static Jenkins getInstance() { - return HOLDER.getInstance(); - } - - /** - * Secret key generated once and used for a long time, beyond - * container start/stop. Persisted outside config.xml to avoid - * accidental exposure. - */ - private transient final String secretKey; - - private transient final UpdateCenter updateCenter = new UpdateCenter(); - - /** - * True if the user opted out from the statistics tracking. We'll never send anything if this is true. - */ - private Boolean noUsageStatistics; - - /** - * HTTP proxy configuration. - */ - public transient volatile ProxyConfiguration proxy; - - /** - * Bound to ""/log"". - */ - private transient final LogRecorderManager log = new LogRecorderManager(); - - protected Jenkins(File root, ServletContext context) throws IOException, InterruptedException, ReactorException { - this(root,context,null); - } - - /** - * @param pluginManager - * If non-null, use existing plugin manager. create a new one. - */ - @edu.umd.cs.findbugs.annotations.SuppressWarnings({ - ""SC_START_IN_CTOR"", // bug in FindBugs. It flags UDPBroadcastThread.start() call but that's for another class - ""ST_WRITE_TO_STATIC_FROM_INSTANCE_METHOD"" // Trigger.timer - }) - protected Jenkins(File root, ServletContext context, PluginManager pluginManager) throws IOException, InterruptedException, ReactorException { - long start = System.currentTimeMillis(); - - // As Jenkins is starting, grant this process full control - ACL.impersonate(ACL.SYSTEM); - try { - this.root = root; - this.servletContext = context; - computeVersion(context); - if(theInstance!=null) - throw new IllegalStateException(""second instance""); - theInstance = this; - - if (!new File(root,""jobs"").exists()) { - // if this is a fresh install, use more modern default layout that's consistent with slaves - workspaceDir = ""${JENKINS_HOME}/workspace/${ITEM_FULLNAME}""; - } - - // doing this early allows InitStrategy to set environment upfront - final InitStrategy is = InitStrategy.get(Thread.currentThread().getContextClassLoader()); - - Trigger.timer = new Timer(""Jenkins cron thread""); - queue = new Queue(LoadBalancer.CONSISTENT_HASH); - - try { - dependencyGraph = DependencyGraph.EMPTY; - } catch (InternalError e) { - if(e.getMessage().contains(""window server"")) { - throw new Error(""Looks like the server runs without X. Please specify -Djava.awt.headless=true as JVM option"",e); - } - throw e; - } - - // get or create the secret - TextFile secretFile = new TextFile(new File(getRootDir(),""secret.key"")); - if(secretFile.exists()) { - secretKey = secretFile.readTrim(); - } else { - SecureRandom sr = new SecureRandom(); - byte[] random = new byte[32]; - sr.nextBytes(random); - secretKey = Util.toHexString(random); - secretFile.write(secretKey); - } - - try { - proxy = ProxyConfiguration.load(); - } catch (IOException e) { - LOGGER.log(SEVERE, ""Failed to load proxy configuration"", e); - } - - if (pluginManager==null) - pluginManager = new LocalPluginManager(this); - this.pluginManager = pluginManager; - // JSON binding needs to be able to see all the classes from all the plugins - WebApp.get(servletContext).setClassLoader(pluginManager.uberClassLoader); - - adjuncts = new AdjunctManager(servletContext, pluginManager.uberClassLoader,""adjuncts/""+SESSION_HASH); - - // initialization consists of ... - executeReactor( is, - pluginManager.initTasks(is), // loading and preparing plugins - loadTasks(), // load jobs - InitMilestone.ordering() // forced ordering among key milestones - ); - - if(KILL_AFTER_LOAD) - System.exit(0); - - if(slaveAgentPort!=-1) { - try { - tcpSlaveAgentListener = new TcpSlaveAgentListener(slaveAgentPort); - } catch (BindException e) { - new AdministrativeError(getClass().getName()+"".tcpBind"", - ""Failed to listen to incoming slave connection"", - ""Failed to listen to incoming slave connection. Change the port number to solve the problem."",e); - } - } else - tcpSlaveAgentListener = null; - - try { - udpBroadcastThread = new UDPBroadcastThread(this); - udpBroadcastThread.start(); - } catch (IOException e) { - LOGGER.log(Level.WARNING, ""Failed to broadcast over UDP"",e); - } - dnsMultiCast = new DNSMultiCast(this); - - Timer timer = Trigger.timer; - if (timer != null) { - timer.scheduleAtFixedRate(new SafeTimerTask() { - @Override - protected void doRun() throws Exception { - trimLabels(); - } - }, TimeUnit2.MINUTES.toMillis(5), TimeUnit2.MINUTES.toMillis(5)); - } - - updateComputerList(); - - {// master is online now - Computer c = toComputer(); - if(c!=null) - for (ComputerListener cl : ComputerListener.all()) - cl.onOnline(c,StreamTaskListener.fromStdout()); - } - - for (ItemListener l : ItemListener.all()) { - long itemListenerStart = System.currentTimeMillis(); - l.onLoaded(); - if (LOG_STARTUP_PERFORMANCE) - LOGGER.info(String.format(""Took %dms for item listener %s startup"", - System.currentTimeMillis()-itemListenerStart,l.getClass().getName())); - } - - if (LOG_STARTUP_PERFORMANCE) - LOGGER.info(String.format(""Took %dms for complete Jenkins startup"", - System.currentTimeMillis()-start)); - } finally { - SecurityContextHolder.clearContext(); - } - } - - /** - * Executes a reactor. - * - * @param is - * If non-null, this can be consulted for ignoring some tasks. Only used during the initialization of Hudson. - */ - private void executeReactor(final InitStrategy is, TaskBuilder... builders) throws IOException, InterruptedException, ReactorException { - Reactor reactor = new Reactor(builders) { - /** - * Sets the thread name to the task for better diagnostics. - */ - @Override - protected void runTask(Task task) throws Exception { - if (is!=null && is.skipInitTask(task)) return; - - ACL.impersonate(ACL.SYSTEM); // full access in the initialization thread - String taskName = task.getDisplayName(); - - Thread t = Thread.currentThread(); - String name = t.getName(); - if (taskName !=null) - t.setName(taskName); - try { - long start = System.currentTimeMillis(); - super.runTask(task); - if(LOG_STARTUP_PERFORMANCE) - LOGGER.info(String.format(""Took %dms for %s by %s"", - System.currentTimeMillis()-start, taskName, name)); - } finally { - t.setName(name); - SecurityContextHolder.clearContext(); - } - } - }; - - new InitReactorRunner() { - @Override - protected void onInitMilestoneAttained(InitMilestone milestone) { - initLevel = milestone; - } - }.run(reactor); - } - - - public TcpSlaveAgentListener getTcpSlaveAgentListener() { - return tcpSlaveAgentListener; - } - - /** - * Makes {@link AdjunctManager} URL-bound. - * The dummy parameter allows us to use different URLs for the same adjunct, - * for proper cache handling. - */ - public AdjunctManager getAdjuncts(String dummy) { - return adjuncts; - } - - @Exported - public int getSlaveAgentPort() { - return slaveAgentPort; - } - - /** - * @param port - * 0 to indicate random available TCP port. -1 to disable this service. - */ - public void setSlaveAgentPort(int port) throws IOException { - this.slaveAgentPort = port; - - // relaunch the agent - if(tcpSlaveAgentListener==null) { - if(slaveAgentPort!=-1) - tcpSlaveAgentListener = new TcpSlaveAgentListener(slaveAgentPort); - } else { - if(tcpSlaveAgentListener.configuredPort!=slaveAgentPort) { - tcpSlaveAgentListener.shutdown(); - tcpSlaveAgentListener = null; - if(slaveAgentPort!=-1) - tcpSlaveAgentListener = new TcpSlaveAgentListener(slaveAgentPort); - } - } - } - - public void setNodeName(String name) { - throw new UnsupportedOperationException(); // not allowed - } - - public String getNodeDescription() { - return Messages.Hudson_NodeDescription(); - } - - @Exported - public String getDescription() { - return systemMessage; - } - - public PluginManager getPluginManager() { - return pluginManager; - } - - public UpdateCenter getUpdateCenter() { - return updateCenter; - } - - public boolean isUsageStatisticsCollected() { - return noUsageStatistics==null || !noUsageStatistics; - } - - public void setNoUsageStatistics(Boolean noUsageStatistics) throws IOException { - this.noUsageStatistics = noUsageStatistics; - save(); - } - - public View.People getPeople() { - return new View.People(this); - } - - /** - * @since 1.484 - */ - public View.AsynchPeople getAsynchPeople() { - return new View.AsynchPeople(this); - } - - /** - * Does this {@link View} has any associated user information recorded? - */ - public boolean hasPeople() { - return View.People.isApplicable(items.values()); - } - - public Api getApi() { - return new Api(this); - } - - /** - * Returns a secret key that survives across container start/stop. - *

- * This value is useful for implementing some of the security features. - * - * @deprecated - * Due to the past security advisory, this value should not be used any more to protect sensitive information. - * See {@link ConfidentialStore} and {@link ConfidentialKey} for how to store secrets. - */ - public String getSecretKey() { - return secretKey; - } - - /** - * Gets {@linkplain #getSecretKey() the secret key} as a key for AES-128. - * @since 1.308 - * @deprecated - * See {@link #getSecretKey()}. - */ - public SecretKey getSecretKeyAsAES128() { - return Util.toAes128Key(secretKey); - } - - /** - * Returns the unique identifier of this Jenkins that has been historically used to identify - * this Jenkins to the outside world. - * - *

- * This form of identifier is weak in that it can be impersonated by others. See - * https://wiki.jenkins-ci.org/display/JENKINS/Instance+Identity for more modern form of instance ID - * that can be challenged and verified. - * - * @since 1.498 - */ - @SuppressWarnings(""deprecation"") - public String getLegacyInstanceId() { - return Util.getDigestOf(getSecretKey()); - } - - /** - * Gets the SCM descriptor by name. Primarily used for making them web-visible. - */ - public Descriptor getScm(String shortClassName) { - return findDescriptor(shortClassName,SCM.all()); - } - - /** - * Gets the repository browser descriptor by name. Primarily used for making them web-visible. - */ - public Descriptor> getRepositoryBrowser(String shortClassName) { - return findDescriptor(shortClassName,RepositoryBrowser.all()); - } - - /** - * Gets the builder descriptor by name. Primarily used for making them web-visible. - */ - public Descriptor getBuilder(String shortClassName) { - return findDescriptor(shortClassName, Builder.all()); - } - - /** - * Gets the build wrapper descriptor by name. Primarily used for making them web-visible. - */ - public Descriptor getBuildWrapper(String shortClassName) { - return findDescriptor(shortClassName, BuildWrapper.all()); - } - - /** - * Gets the publisher descriptor by name. Primarily used for making them web-visible. - */ - public Descriptor getPublisher(String shortClassName) { - return findDescriptor(shortClassName, Publisher.all()); - } - - /** - * Gets the trigger descriptor by name. Primarily used for making them web-visible. - */ - public TriggerDescriptor getTrigger(String shortClassName) { - return (TriggerDescriptor) findDescriptor(shortClassName, Trigger.all()); - } - - /** - * Gets the retention strategy descriptor by name. Primarily used for making them web-visible. - */ - public Descriptor> getRetentionStrategy(String shortClassName) { - return findDescriptor(shortClassName, RetentionStrategy.all()); - } - - /** - * Gets the {@link JobPropertyDescriptor} by name. Primarily used for making them web-visible. - */ - public JobPropertyDescriptor getJobProperty(String shortClassName) { - // combining these two lines triggers javac bug. See issue #610. - Descriptor d = findDescriptor(shortClassName, JobPropertyDescriptor.all()); - return (JobPropertyDescriptor) d; - } - - /** - * @deprecated - * UI method. Not meant to be used programatically. - */ - public ComputerSet getComputer() { - return new ComputerSet(); - } - - /** - * Exposes {@link Descriptor} by its name to URL. - * - * After doing all the {@code getXXX(shortClassName)} methods, I finally realized that - * this just doesn't scale. - * - * @param id - * Either {@link Descriptor#getId()} (recommended) or the short name of a {@link Describable} subtype (for compatibility) - * @throws IllegalArgumentException if a short name was passed which matches multiple IDs (fail fast) - */ - @SuppressWarnings({""unchecked"", ""rawtypes""}) // too late to fix - public Descriptor getDescriptor(String id) { - // legacy descriptors that are reigstered manually doesn't show up in getExtensionList, so check them explicitly. - Iterable descriptors = Iterators.sequence(getExtensionList(Descriptor.class), DescriptorExtensionList.listLegacyInstances()); - for (Descriptor d : descriptors) { - if (d.getId().equals(id)) { - return d; - } - } - Descriptor candidate = null; - for (Descriptor d : descriptors) { - String name = d.getId(); - if (name.substring(name.lastIndexOf('.') + 1).equals(id)) { - if (candidate == null) { - candidate = d; - } else { - throw new IllegalArgumentException(id + "" is ambiguous; matches both "" + name + "" and "" + candidate.getId()); - } - } - } - return candidate; - } - - /** - * Alias for {@link #getDescriptor(String)}. - */ - public Descriptor getDescriptorByName(String id) { - return getDescriptor(id); - } - - /** - * Gets the {@link Descriptor} that corresponds to the given {@link Describable} type. - *

- * If you have an instance of {@code type} and call {@link Describable#getDescriptor()}, - * you'll get the same instance that this method returns. - */ - public Descriptor getDescriptor(Class type) { - for( Descriptor d : getExtensionList(Descriptor.class) ) - if(d.clazz==type) - return d; - return null; - } - - /** - * Works just like {@link #getDescriptor(Class)} but don't take no for an answer. - * - * @throws AssertionError - * If the descriptor is missing. - * @since 1.326 - */ - public Descriptor getDescriptorOrDie(Class type) { - Descriptor d = getDescriptor(type); - if (d==null) - throw new AssertionError(type+"" is missing its descriptor""); - return d; - } - - /** - * Gets the {@link Descriptor} instance in the current Hudson by its type. - */ - public T getDescriptorByType(Class type) { - for( Descriptor d : getExtensionList(Descriptor.class) ) - if(d.getClass()==type) - return type.cast(d); - return null; - } - - /** - * Gets the {@link SecurityRealm} descriptors by name. Primarily used for making them web-visible. - */ - public Descriptor getSecurityRealms(String shortClassName) { - return findDescriptor(shortClassName,SecurityRealm.all()); - } - - /** - * Finds a descriptor that has the specified name. - */ - private > - Descriptor findDescriptor(String shortClassName, Collection> descriptors) { - String name = '.'+shortClassName; - for (Descriptor d : descriptors) { - if(d.clazz.getName().endsWith(name)) - return d; - } - return null; - } - - protected void updateComputerList() throws IOException { - updateComputerList(AUTOMATIC_SLAVE_LAUNCH); - } - - /** - * Gets all the installed {@link SCMListener}s. - */ - public CopyOnWriteList getSCMListeners() { - return scmListeners; - } - - /** - * Gets the plugin object from its short name. - * - *

- * This allows URL hudson/plugin/ID to be served by the views - * of the plugin class. - */ - public Plugin getPlugin(String shortName) { - PluginWrapper p = pluginManager.getPlugin(shortName); - if(p==null) return null; - return p.getPlugin(); - } - - /** - * Gets the plugin object from its class. - * - *

- * This allows easy storage of plugin information in the plugin singleton without - * every plugin reimplementing the singleton pattern. - * - * @param clazz The plugin class (beware class-loader fun, this will probably only work - * from within the jpi that defines the plugin class, it may or may not work in other cases) - * - * @return The plugin instance. - */ - @SuppressWarnings(""unchecked"") - public

P getPlugin(Class

clazz) { - PluginWrapper p = pluginManager.getPlugin(clazz); - if(p==null) return null; - return (P) p.getPlugin(); - } - - /** - * Gets the plugin objects from their super-class. - * - * @param clazz The plugin class (beware class-loader fun) - * - * @return The plugin instances. - */ - public

List

getPlugins(Class

clazz) { - List

result = new ArrayList

(); - for (PluginWrapper w: pluginManager.getPlugins(clazz)) { - result.add((P)w.getPlugin()); - } - return Collections.unmodifiableList(result); - } - - /** - * Synonym for {@link #getDescription}. - */ - public String getSystemMessage() { - return systemMessage; - } - - /** - * Gets the markup formatter used in the system. - * - * @return - * never null. - * @since 1.391 - */ - public MarkupFormatter getMarkupFormatter() { - return markupFormatter!=null ? markupFormatter : RawHtmlMarkupFormatter.INSTANCE; - } - - /** - * Sets the markup formatter used in the system globally. - * - * @since 1.391 - */ - public void setMarkupFormatter(MarkupFormatter f) { - this.markupFormatter = f; - } - - /** - * Sets the system message. - */ - public void setSystemMessage(String message) throws IOException { - this.systemMessage = message; - save(); - } - - public FederatedLoginService getFederatedLoginService(String name) { - for (FederatedLoginService fls : FederatedLoginService.all()) { - if (fls.getUrlName().equals(name)) - return fls; - } - return null; - } - - public List getFederatedLoginServices() { - return FederatedLoginService.all(); - } - - public Launcher createLauncher(TaskListener listener) { - return new LocalLauncher(listener).decorateFor(this); - } - - - public String getFullName() { - return """"; - } - - public String getFullDisplayName() { - return """"; - } - - /** - * Returns the transient {@link Action}s associated with the top page. - * - *

- * Adding {@link Action} is primarily useful for plugins to contribute - * an item to the navigation bar of the top page. See existing {@link Action} - * implementation for it affects the GUI. - * - *

- * To register an {@link Action}, implement {@link RootAction} extension point, or write code like - * {@code Hudson.getInstance().getActions().add(...)}. - * - * @return - * Live list where the changes can be made. Can be empty but never null. - * @since 1.172 - */ - public List getActions() { - return actions; - } - - /** - * Gets just the immediate children of {@link Jenkins}. - * - * @see #getAllItems(Class) - */ - @Exported(name=""jobs"") - public List getItems() { - if (authorizationStrategy instanceof AuthorizationStrategy.Unsecured || - authorizationStrategy instanceof FullControlOnceLoggedInAuthorizationStrategy) { - return new ArrayList(items.values()); - } - - List viewableItems = new ArrayList(); - for (TopLevelItem item : items.values()) { - if (item.hasPermission(Item.READ)) - viewableItems.add(item); - } - - return viewableItems; - } - - /** - * Returns the read-only view of all the {@link TopLevelItem}s keyed by their names. - *

- * This method is efficient, as it doesn't involve any copying. - * - * @since 1.296 - */ - public Map getItemMap() { - return Collections.unmodifiableMap(items); - } - - /** - * Gets just the immediate children of {@link Jenkins} but of the given type. - */ - public List getItems(Class type) { - List r = new ArrayList(); - for (TopLevelItem i : getItems()) - if (type.isInstance(i)) - r.add(type.cast(i)); - return r; - } - - /** - * Gets all the {@link Item}s recursively in the {@link ItemGroup} tree - * and filter them by the given type. - */ - public List getAllItems(Class type) { - List r = new ArrayList(); - - Stack q = new Stack(); - q.push(this); - - while(!q.isEmpty()) { - ItemGroup parent = q.pop(); - for (Item i : parent.getItems()) { - if(type.isInstance(i)) { - if (i.hasPermission(Item.READ)) - r.add(type.cast(i)); - } - if(i instanceof ItemGroup) - q.push((ItemGroup)i); - } - } - - return r; - } - - /** - * Gets all the items recursively. - * - * @since 1.402 - */ - public List getAllItems() { - return getAllItems(Item.class); - } - - /** - * Gets a list of simple top-level projects. - * @deprecated This method will ignore Maven and matrix projects, as well as projects inside containers such as folders. - * You may prefer to call {@link #getAllItems(Class)} on {@link AbstractProject}, - * perhaps also using {@link Util#createSubList} to consider only {@link TopLevelItem}s. - * (That will also consider the caller's permissions.) - * If you really want to get just {@link Project}s at top level, ignoring permissions, - * you can filter the values from {@link #getItemMap} using {@link Util#createSubList}. - */ - @Deprecated - public List getProjects() { - return Util.createSubList(items.values(),Project.class); - } - - /** - * Gets the names of all the {@link Job}s. - */ - public Collection getJobNames() { - List names = new ArrayList(); - for (Job j : getAllItems(Job.class)) - names.add(j.getFullName()); - return names; - } - - public List getViewActions() { - return getActions(); - } - - /** - * Gets the names of all the {@link TopLevelItem}s. - */ - public Collection getTopLevelItemNames() { - List names = new ArrayList(); - for (TopLevelItem j : items.values()) - names.add(j.getName()); - return names; - } - - public View getView(String name) { - return viewGroupMixIn.getView(name); - } - - /** - * Gets the read-only list of all {@link View}s. - */ - @Exported - public Collection getViews() { - return viewGroupMixIn.getViews(); - } - - public void addView(View v) throws IOException { - viewGroupMixIn.addView(v); - } - - public boolean canDelete(View view) { - return viewGroupMixIn.canDelete(view); - } - - public synchronized void deleteView(View view) throws IOException { - viewGroupMixIn.deleteView(view); - } - - public void onViewRenamed(View view, String oldName, String newName) { - viewGroupMixIn.onViewRenamed(view,oldName,newName); - } - - /** - * Returns the primary {@link View} that renders the top-page of Hudson. - */ - @Exported - public View getPrimaryView() { - return viewGroupMixIn.getPrimaryView(); - } - - public void setPrimaryView(View v) { - this.primaryView = v.getViewName(); - } - - public ViewsTabBar getViewsTabBar() { - return viewsTabBar; - } - - public void setViewsTabBar(ViewsTabBar viewsTabBar) { - this.viewsTabBar = viewsTabBar; - } - - public Jenkins getItemGroup() { - return this; - } - - public MyViewsTabBar getMyViewsTabBar() { - return myViewsTabBar; - } - - public void setMyViewsTabBar(MyViewsTabBar myViewsTabBar) { - this.myViewsTabBar = myViewsTabBar; - } - - /** - * Returns true if the current running Hudson is upgraded from a version earlier than the specified version. - * - *

- * This method continues to return true until the system configuration is saved, at which point - * {@link #version} will be overwritten and Hudson forgets the upgrade history. - * - *

- * To handle SNAPSHOTS correctly, pass in ""1.N.*"" to test if it's upgrading from the version - * equal or younger than N. So say if you implement a feature in 1.301 and you want to check - * if the installation upgraded from pre-1.301, pass in ""1.300.*"" - * - * @since 1.301 - */ - public boolean isUpgradedFromBefore(VersionNumber v) { - try { - return new VersionNumber(version).isOlderThan(v); - } catch (IllegalArgumentException e) { - // fail to parse this version number - return false; - } - } - - /** - * Gets the read-only list of all {@link Computer}s. - */ - public Computer[] getComputers() { - Computer[] r = computers.values().toArray(new Computer[computers.size()]); - Arrays.sort(r,new Comparator() { - final Collator collator = Collator.getInstance(); - public int compare(Computer lhs, Computer rhs) { - if(lhs.getNode()==Jenkins.this) return -1; - if(rhs.getNode()==Jenkins.this) return 1; - return collator.compare(lhs.getDisplayName(), rhs.getDisplayName()); - } - }); - return r; - } - - @CLIResolver - public Computer getComputer(@Argument(required=true,metaVar=""NAME"",usage=""Node name"") String name) { - if(name.equals(""(master)"")) - name = """"; - - for (Computer c : computers.values()) { - if(c.getName().equals(name)) - return c; - } - return null; - } - - /** - * Gets the label that exists on this system by the name. - * - * @return null if name is null. - * @see Label#parseExpression(String) (String) - */ - public Label getLabel(String expr) { - if(expr==null) return null; - while(true) { - Label l = labels.get(expr); - if(l!=null) - return l; - - // non-existent - try { - labels.putIfAbsent(expr,Label.parseExpression(expr)); - } catch (ANTLRException e) { - // laxly accept it as a single label atom for backward compatibility - return getLabelAtom(expr); - } - } - } - - /** - * Returns the label atom of the given name. - * @return non-null iff name is non-null - */ - public @Nullable LabelAtom getLabelAtom(@CheckForNull String name) { - if (name==null) return null; - - while(true) { - Label l = labels.get(name); - if(l!=null) - return (LabelAtom)l; - - // non-existent - LabelAtom la = new LabelAtom(name); - if (labels.putIfAbsent(name, la)==null) - la.load(); - } - } - - /** - * Gets all the active labels in the current system. - */ - public Set

- * This method first tries to use the manually configured value, then - * fall back to {@link StaplerRequest#getRootPath()}. - * It is done in this order so that it can work correctly even in the face - * of a reverse proxy. - * - * @return - * This method returns null if this parameter is not configured by the user. - * The caller must gracefully deal with this situation. - * The returned URL will always have the trailing '/'. - * @since 1.66 - * @see Descriptor#getCheckUrl(String) - * @see #getRootUrlFromRequest() - */ - public String getRootUrl() { - // for compatibility. the actual data is stored in Mailer - String url = JenkinsLocationConfiguration.get().getUrl(); - if(url!=null) { - if (!url.endsWith(""/"")) url += '/'; - return url; - } - - StaplerRequest req = Stapler.getCurrentRequest(); - if(req!=null) - return getRootUrlFromRequest(); - return null; - } - - /** - * Is Jenkins running in HTTPS? - * - * Note that we can't really trust {@link StaplerRequest#isSecure()} because HTTPS might be terminated - * in the reverse proxy. - */ - public boolean isRootUrlSecure() { - String url = getRootUrl(); - return url!=null && url.startsWith(""https""); - } - - /** - * Gets the absolute URL of Hudson top page, such as ""http://localhost/hudson/"". - * - *

- * Unlike {@link #getRootUrl()}, which uses the manually configured value, - * this one uses the current request to reconstruct the URL. The benefit is - * that this is immune to the configuration mistake (users often fail to set the root URL - * correctly, especially when a migration is involved), but the downside - * is that unless you are processing a request, this method doesn't work. - * - * Please note that this will not work in all cases if Jenkins is running behind a - * reverse proxy (e.g. when user has switched off ProxyPreserveHost, which is - * default setup or the actual url uses https) and you should use getRootUrl if - * you want to be sure you reflect user setup. - * See https://wiki.jenkins-ci.org/display/JENKINS/Running+Jenkins+behind+Apache - * - * @since 1.263 - */ - public String getRootUrlFromRequest() { - StaplerRequest req = Stapler.getCurrentRequest(); - StringBuilder buf = new StringBuilder(); - buf.append(req.getScheme()+""://""); - buf.append(req.getServerName()); - if(req.getServerPort()!=80) - buf.append(':').append(req.getServerPort()); - buf.append(req.getContextPath()).append('/'); - return buf.toString(); - } - - public File getRootDir() { - return root; - } - - public FilePath getWorkspaceFor(TopLevelItem item) { - return new FilePath(expandVariablesForDirectory(workspaceDir, item)); - } - - public File getBuildDirFor(Job job) { - return expandVariablesForDirectory(buildsDir, job); - } - - private File expandVariablesForDirectory(String base, Item item) { - return new File(Util.replaceMacro(base, ImmutableMap.of( - ""JENKINS_HOME"", getRootDir().getPath(), - ""ITEM_ROOTDIR"", item.getRootDir().getPath(), - ""ITEM_FULLNAME"", item.getFullName()))); - } - - public String getRawWorkspaceDir() { - return workspaceDir; - } - - public String getRawBuildsDir() { - return buildsDir; - } - - public FilePath getRootPath() { - return new FilePath(getRootDir()); - } - - @Override - public FilePath createPath(String absolutePath) { - return new FilePath((VirtualChannel)null,absolutePath); - } - - public ClockDifference getClockDifference() { - return ClockDifference.ZERO; - } - - /** - * For binding {@link LogRecorderManager} to ""/log"". - * Everything below here is admin-only, so do the check here. - */ - public LogRecorderManager getLog() { - checkPermission(ADMINISTER); - return log; - } - - /** - * A convenience method to check if there's some security - * restrictions in place. - */ - @Exported - public boolean isUseSecurity() { - return securityRealm!=SecurityRealm.NO_AUTHENTICATION || authorizationStrategy!=AuthorizationStrategy.UNSECURED; - } - - public boolean isUseProjectNamingStrategy(){ - return projectNamingStrategy != DefaultProjectNamingStrategy.DEFAULT_NAMING_STRATEGY; - } - - /** - * If true, all the POST requests to Hudson would have to have crumb in it to protect - * Hudson from CSRF vulnerabilities. - */ - @Exported - public boolean isUseCrumbs() { - return crumbIssuer!=null; - } - - /** - * Returns the constant that captures the three basic security modes - * in Hudson. - */ - public SecurityMode getSecurity() { - // fix the variable so that this code works under concurrent modification to securityRealm. - SecurityRealm realm = securityRealm; - - if(realm==SecurityRealm.NO_AUTHENTICATION) - return SecurityMode.UNSECURED; - if(realm instanceof LegacySecurityRealm) - return SecurityMode.LEGACY; - return SecurityMode.SECURED; - } - - /** - * @return - * never null. - */ - public SecurityRealm getSecurityRealm() { - return securityRealm; - } - - public void setSecurityRealm(SecurityRealm securityRealm) { - if(securityRealm==null) - securityRealm= SecurityRealm.NO_AUTHENTICATION; - this.useSecurity = true; - this.securityRealm = securityRealm; - // reset the filters and proxies for the new SecurityRealm - try { - HudsonFilter filter = HudsonFilter.get(servletContext); - if (filter == null) { - // Fix for #3069: This filter is not necessarily initialized before the servlets. - // when HudsonFilter does come back, it'll initialize itself. - LOGGER.fine(""HudsonFilter has not yet been initialized: Can't perform security setup for now""); - } else { - LOGGER.fine(""HudsonFilter has been previously initialized: Setting security up""); - filter.reset(securityRealm); - LOGGER.fine(""Security is now fully set up""); - } - } catch (ServletException e) { - // for binary compatibility, this method cannot throw a checked exception - throw new AcegiSecurityException(""Failed to configure filter"",e) {}; - } - } - - public void setAuthorizationStrategy(AuthorizationStrategy a) { - if (a == null) - a = AuthorizationStrategy.UNSECURED; - useSecurity = true; - authorizationStrategy = a; - } - - public void disableSecurity() { - useSecurity = null; - setSecurityRealm(SecurityRealm.NO_AUTHENTICATION); - authorizationStrategy = AuthorizationStrategy.UNSECURED; - markupFormatter = null; - } - - public void setProjectNamingStrategy(ProjectNamingStrategy ns) { - if(ns == null){ - ns = DefaultProjectNamingStrategy.DEFAULT_NAMING_STRATEGY; - } - projectNamingStrategy = ns; - } - - public Lifecycle getLifecycle() { - return Lifecycle.get(); - } - - /** - * Gets the dependency injection container that hosts all the extension implementations and other - * components in Jenkins. - * - * @since 1.GUICE - */ - public Injector getInjector() { - return lookup(Injector.class); - } - - /** - * Returns {@link ExtensionList} that retains the discovered instances for the given extension type. - * - * @param extensionType - * The base type that represents the extension point. Normally {@link ExtensionPoint} subtype - * but that's not a hard requirement. - * @return - * Can be an empty list but never null. - */ - @SuppressWarnings({""unchecked""}) - public ExtensionList getExtensionList(Class extensionType) { - return extensionLists.get(extensionType); - } - - /** - * Used to bind {@link ExtensionList}s to URLs. - * - * @since 1.349 - */ - public ExtensionList getExtensionList(String extensionType) throws ClassNotFoundException { - return getExtensionList(pluginManager.uberClassLoader.loadClass(extensionType)); - } - - /** - * Returns {@link ExtensionList} that retains the discovered {@link Descriptor} instances for the given - * kind of {@link Describable}. - * - * @return - * Can be an empty list but never null. - */ - @SuppressWarnings({""unchecked""}) - public ,D extends Descriptor> DescriptorExtensionList getDescriptorList(Class type) { - return descriptorLists.get(type); - } - - /** - * Refresh {@link ExtensionList}s by adding all the newly discovered extensions. - * - * Exposed only for {@link PluginManager#dynamicLoad(File)}. - */ - public void refreshExtensions() throws ExtensionRefreshException { - ExtensionList finders = getExtensionList(ExtensionFinder.class); - for (ExtensionFinder ef : finders) { - if (!ef.isRefreshable()) - throw new ExtensionRefreshException(ef+"" doesn't support refresh""); - } - - List fragments = Lists.newArrayList(); - for (ExtensionFinder ef : finders) { - fragments.add(ef.refresh()); - } - ExtensionComponentSet delta = ExtensionComponentSet.union(fragments).filtered(); - - // if we find a new ExtensionFinder, we need it to list up all the extension points as well - List> newFinders = Lists.newArrayList(delta.find(ExtensionFinder.class)); - while (!newFinders.isEmpty()) { - ExtensionFinder f = newFinders.remove(newFinders.size()-1).getInstance(); - - ExtensionComponentSet ecs = ExtensionComponentSet.allOf(f).filtered(); - newFinders.addAll(ecs.find(ExtensionFinder.class)); - delta = ExtensionComponentSet.union(delta, ecs); - } - - for (ExtensionList el : extensionLists.values()) { - el.refresh(delta); - } - for (ExtensionList el : descriptorLists.values()) { - el.refresh(delta); - } - - // TODO: we need some generalization here so that extension points can be notified when a refresh happens? - for (ExtensionComponent ea : delta.find(RootAction.class)) { - Action a = ea.getInstance(); - if (!actions.contains(a)) actions.add(a); - } - } - - /** - * Returns the root {@link ACL}. - * - * @see AuthorizationStrategy#getRootACL() - */ - @Override - public ACL getACL() { - return authorizationStrategy.getRootACL(); - } - - /** - * @return - * never null. - */ - public AuthorizationStrategy getAuthorizationStrategy() { - return authorizationStrategy; - } - - /** - * The strategy used to check the project names. - * @return never null - */ - public ProjectNamingStrategy getProjectNamingStrategy() { - return projectNamingStrategy == null ? ProjectNamingStrategy.DEFAULT_NAMING_STRATEGY : projectNamingStrategy; - } - - /** - * Returns true if Hudson is quieting down. - *

- * No further jobs will be executed unless it - * can be finished while other current pending builds - * are still in progress. - */ - @Exported - public boolean isQuietingDown() { - return isQuietingDown; - } - - /** - * Returns true if the container initiated the termination of the web application. - */ - public boolean isTerminating() { - return terminating; - } - - /** - * Gets the initialization milestone that we've already reached. - * - * @return - * {@link InitMilestone#STARTED} even if the initialization hasn't been started, so that this method - * never returns null. - */ - public InitMilestone getInitLevel() { - return initLevel; - } - - public void setNumExecutors(int n) throws IOException { - this.numExecutors = n; - save(); - } - - - - /** - * {@inheritDoc}. - * - * Note that the look up is case-insensitive. - */ - public TopLevelItem getItem(String name) { - if (name==null) return null; - TopLevelItem item = items.get(name); - if (item==null) - return null; - if (!item.hasPermission(Item.READ)) { - if (item.hasPermission(Item.DISCOVER)) { - throw new AccessDeniedException(""Please login to access job "" + name); - } - return null; - } - return item; - } - - /** - * Gets the item by its path name from the given context - * - *

Path Names

- *

- * If the name starts from '/', like ""/foo/bar/zot"", then it's interpreted as absolute. - * Otherwise, the name should be something like ""foo/bar"" and it's interpreted like - * relative path name in the file system is, against the given context. - * - * @param context - * null is interpreted as {@link Jenkins}. Base 'directory' of the interpretation. - * @since 1.406 - */ - public Item getItem(String pathName, ItemGroup context) { - if (context==null) context = this; - if (pathName==null) return null; - - if (pathName.startsWith(""/"")) // absolute - return getItemByFullName(pathName); - - Object/*Item|ItemGroup*/ ctx = context; - - StringTokenizer tokens = new StringTokenizer(pathName,""/""); - while (tokens.hasMoreTokens()) { - String s = tokens.nextToken(); - if (s.equals("".."")) { - if (ctx instanceof Item) { - ctx = ((Item)ctx).getParent(); - continue; - } - - ctx=null; // can't go up further - break; - } - if (s.equals(""."")) { - continue; - } - - if (ctx instanceof ItemGroup) { - ItemGroup g = (ItemGroup) ctx; - Item i = g.getItem(s); - if (i==null || !i.hasPermission(Item.READ)) { // XXX consider DISCOVER - ctx=null; // can't go up further - break; - } - ctx=i; - } else { - return null; - } - } - - if (ctx instanceof Item) - return (Item)ctx; - - // fall back to the classic interpretation - return getItemByFullName(pathName); - } - - public final Item getItem(String pathName, Item context) { - return getItem(pathName,context!=null?context.getParent():null); - } - - public final T getItem(String pathName, ItemGroup context, Class type) { - Item r = getItem(pathName, context); - if (type.isInstance(r)) - return type.cast(r); - return null; - } - - public final T getItem(String pathName, Item context, Class type) { - return getItem(pathName,context!=null?context.getParent():null,type); - } - - public File getRootDirFor(TopLevelItem child) { - return getRootDirFor(child.getName()); - } - - private File getRootDirFor(String name) { - return new File(new File(getRootDir(),""jobs""), name); - } - - /** - * Gets the {@link Item} object by its full name. - * Full names are like path names, where each name of {@link Item} is - * combined by '/'. - * - * @return - * null if either such {@link Item} doesn't exist under the given full name, - * or it exists but it's no an instance of the given type. - */ - public @CheckForNull T getItemByFullName(String fullName, Class type) { - StringTokenizer tokens = new StringTokenizer(fullName,""/""); - ItemGroup parent = this; - - if(!tokens.hasMoreTokens()) return null; // for example, empty full name. - - while(true) { - Item item = parent.getItem(tokens.nextToken()); - if(!tokens.hasMoreTokens()) { - if(type.isInstance(item)) - return type.cast(item); - else - return null; - } - - if(!(item instanceof ItemGroup)) - return null; // this item can't have any children - - if (!item.hasPermission(Item.READ)) - return null; // XXX consider DISCOVER - - parent = (ItemGroup) item; - } - } - - public @CheckForNull Item getItemByFullName(String fullName) { - return getItemByFullName(fullName,Item.class); - } - - /** - * Gets the user of the given name. - * - * @return the user of the given name, if that person exists or the invoker {@link #hasPermission} on {@link #ADMINISTER}; else null - * @see User#get(String,boolean) - */ - public @CheckForNull User getUser(String name) { - return User.get(name,hasPermission(ADMINISTER)); - } - - public synchronized TopLevelItem createProject( TopLevelItemDescriptor type, String name ) throws IOException { - return createProject(type, name, true); - } - - public synchronized TopLevelItem createProject( TopLevelItemDescriptor type, String name, boolean notify ) throws IOException { - return itemGroupMixIn.createProject(type,name,notify); - } - - /** - * Overwrites the existing item by new one. - * - *

- * This is a short cut for deleting an existing job and adding a new one. - */ - public synchronized void putItem(TopLevelItem item) throws IOException, InterruptedException { - String name = item.getName(); - TopLevelItem old = items.get(name); - if (old ==item) return; // noop - - checkPermission(Item.CREATE); - if (old!=null) - old.delete(); - items.put(name,item); - ItemListener.fireOnCreated(item); - } - - /** - * Creates a new job. - * - *

- * This version infers the descriptor from the type of the top-level item. - * - * @throws IllegalArgumentException - * if the project of the given name already exists. - */ - public synchronized T createProject( Class type, String name ) throws IOException { - return type.cast(createProject((TopLevelItemDescriptor)getDescriptor(type),name)); - } - - /** - * Called by {@link Job#renameTo(String)} to update relevant data structure. - * assumed to be synchronized on Hudson by the caller. - */ - public void onRenamed(TopLevelItem job, String oldName, String newName) throws IOException { - items.remove(oldName); - items.put(newName,job); - - for (View v : views) - v.onJobRenamed(job, oldName, newName); - save(); - } - - /** - * Called in response to {@link Job#doDoDelete(StaplerRequest, StaplerResponse)} - */ - public void onDeleted(TopLevelItem item) throws IOException { - for (ItemListener l : ItemListener.all()) - l.onDeleted(item); - - items.remove(item.getName()); - for (View v : views) - v.onJobRenamed(item, item.getName(), null); - save(); - } - - public FingerprintMap getFingerprintMap() { - return fingerprintMap; - } - - // if no finger print matches, display ""not found page"". - public Object getFingerprint( String md5sum ) throws IOException { - Fingerprint r = fingerprintMap.get(md5sum); - if(r==null) return new NoFingerprintMatch(md5sum); - else return r; - } - - /** - * Gets a {@link Fingerprint} object if it exists. - * Otherwise null. - */ - public Fingerprint _getFingerprint( String md5sum ) throws IOException { - return fingerprintMap.get(md5sum); - } - - /** - * The file we save our configuration. - */ - private XmlFile getConfigFile() { - return new XmlFile(XSTREAM, new File(root,""config.xml"")); - } - - public int getNumExecutors() { - return numExecutors; - } - - public Mode getMode() { - return mode; - } - - public void setMode(Mode m) throws IOException { - this.mode = m; - save(); - } - - public String getLabelString() { - return fixNull(label).trim(); - } - - @Override - public void setLabelString(String label) throws IOException { - this.label = label; - save(); - } - - @Override - public LabelAtom getSelfLabel() { - return getLabelAtom(""master""); - } - - public Computer createComputer() { - return new Hudson.MasterComputer(); - } - - private synchronized TaskBuilder loadTasks() throws IOException { - File projectsDir = new File(root,""jobs""); - if(!projectsDir.getCanonicalFile().isDirectory() && !projectsDir.mkdirs()) { - if(projectsDir.exists()) - throw new IOException(projectsDir+"" is not a directory""); - throw new IOException(""Unable to create ""+projectsDir+""\nPermission issue? Please create this directory manually.""); - } - File[] subdirs = projectsDir.listFiles(new FileFilter() { - public boolean accept(File child) { - return child.isDirectory() && Items.getConfigFile(child).exists(); - } - }); - - TaskGraphBuilder g = new TaskGraphBuilder(); - Handle loadHudson = g.requires(EXTENSIONS_AUGMENTED).attains(JOB_LOADED).add(""Loading global config"", new Executable() { - public void run(Reactor session) throws Exception { - // JENKINS-8043: some slaves (eg. swarm slaves) are not saved into the config file - // and will get overwritten when reloading. Make a backup copy now, and re-add them later - NodeList oldSlaves = slaves; - - XmlFile cfg = getConfigFile(); - if (cfg.exists()) { - // reset some data that may not exist in the disk file - // so that we can take a proper compensation action later. - primaryView = null; - views.clear(); - - // load from disk - cfg.unmarshal(Jenkins.this); - } - - // if we are loading old data that doesn't have this field - if (slaves == null) slaves = new NodeList(); - - clouds.setOwner(Jenkins.this); - items.clear(); - - // JENKINS-8043: re-add the slaves which were not saved into the config file - // and are now missing, but still connected. - if (oldSlaves != null) { - ArrayList newSlaves = new ArrayList(slaves); - for (Node n: oldSlaves) { - if (n instanceof EphemeralNode) { - if(!newSlaves.contains(n)) { - newSlaves.add(n); - } - } - } - setNodes(newSlaves); - } - } - }); - - for (final File subdir : subdirs) { - g.requires(loadHudson).attains(JOB_LOADED).notFatal().add(""Loading job ""+subdir.getName(),new Executable() { - public void run(Reactor session) throws Exception { - TopLevelItem item = (TopLevelItem) Items.load(Jenkins.this, subdir); - items.put(item.getName(), item); - } - }); - } - - g.requires(JOB_LOADED).add(""Finalizing set up"",new Executable() { - public void run(Reactor session) throws Exception { - rebuildDependencyGraph(); - - {// recompute label objects - populates the labels mapping. - for (Node slave : slaves) - // Note that not all labels are visible until the slaves have connected. - slave.getAssignedLabels(); - getAssignedLabels(); - } - - // initialize views by inserting the default view if necessary - // this is both for clean Hudson and for backward compatibility. - if(views.size()==0 || primaryView==null) { - View v = new AllView(Messages.Hudson_ViewName()); - setViewOwner(v); - views.add(0,v); - primaryView = v.getViewName(); - } - - // read in old data that doesn't have the security field set - if(authorizationStrategy==null) { - if(useSecurity==null || !useSecurity) - authorizationStrategy = AuthorizationStrategy.UNSECURED; - else - authorizationStrategy = new LegacyAuthorizationStrategy(); - } - if(securityRealm==null) { - if(useSecurity==null || !useSecurity) - setSecurityRealm(SecurityRealm.NO_AUTHENTICATION); - else - setSecurityRealm(new LegacySecurityRealm()); - } else { - // force the set to proxy - setSecurityRealm(securityRealm); - } - - if(useSecurity!=null && !useSecurity) { - // forced reset to the unsecure mode. - // this works as an escape hatch for people who locked themselves out. - authorizationStrategy = AuthorizationStrategy.UNSECURED; - setSecurityRealm(SecurityRealm.NO_AUTHENTICATION); - } - - // Initialize the filter with the crumb issuer - setCrumbIssuer(crumbIssuer); - - // auto register root actions - for (Action a : getExtensionList(RootAction.class)) - if (!actions.contains(a)) actions.add(a); - } - }); - - return g; - } - - /** - * Save the settings to a file. - */ - public synchronized void save() throws IOException { - if(BulkChange.contains(this)) return; - getConfigFile().write(this); - SaveableListener.fireOnChange(this, getConfigFile()); - } - - - /** - * Called to shut down the system. - */ - @edu.umd.cs.findbugs.annotations.SuppressWarnings(""ST_WRITE_TO_STATIC_FROM_INSTANCE_METHOD"") - public void cleanUp() { - for (ItemListener l : ItemListener.all()) - l.onBeforeShutdown(); - - Set> pending = new HashSet>(); - terminating = true; - for( Computer c : computers.values() ) { - c.interrupt(); - killComputer(c); - pending.add(c.disconnect(null)); - } - if(udpBroadcastThread!=null) - udpBroadcastThread.shutdown(); - if(dnsMultiCast!=null) - dnsMultiCast.close(); - interruptReloadThread(); - Timer timer = Trigger.timer; - if (timer != null) { - timer.cancel(); - } - // TODO: how to wait for the completion of the last job? - Trigger.timer = null; - if(tcpSlaveAgentListener!=null) - tcpSlaveAgentListener.shutdown(); - - if(pluginManager!=null) // be defensive. there could be some ugly timing related issues - pluginManager.stop(); - - if(getRootDir().exists()) - // if we are aborting because we failed to create JENKINS_HOME, - // don't try to save. Issue #536 - getQueue().save(); - - threadPoolForLoad.shutdown(); - for (Future f : pending) - try { - f.get(10, TimeUnit.SECONDS); // if clean up operation didn't complete in time, we fail the test - } catch (InterruptedException e) { - Thread.currentThread().interrupt(); - break; // someone wants us to die now. quick! - } catch (ExecutionException e) { - LOGGER.log(Level.WARNING, ""Failed to shut down properly"",e); - } catch (TimeoutException e) { - LOGGER.log(Level.WARNING, ""Failed to shut down properly"",e); - } - - LogFactory.releaseAll(); - - theInstance = null; - } - - public Object getDynamic(String token) { - for (Action a : getActions()) { - String url = a.getUrlName(); - if (url==null) continue; - if (url.equals(token) || url.equals('/' + token)) - return a; - } - for (Action a : getManagementLinks()) - if(a.getUrlName().equals(token)) - return a; - return null; - } - - -// -// -// actions -// -// - /** - * Accepts submission from the configuration page. - */ - public synchronized void doConfigSubmit( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException, FormException { - BulkChange bc = new BulkChange(this); - try { - checkPermission(ADMINISTER); - - JSONObject json = req.getSubmittedForm(); - - workspaceDir = json.getString(""rawWorkspaceDir""); - buildsDir = json.getString(""rawBuildsDir""); - - systemMessage = Util.nullify(req.getParameter(""system_message"")); - - jdks.clear(); - jdks.addAll(req.bindJSONToList(JDK.class,json.get(""jdks""))); - - boolean result = true; - for( Descriptor d : Functions.getSortedDescriptorsForGlobalConfig() ) - result &= configureDescriptor(req,json,d); - - version = VERSION; - - save(); - updateComputerList(); - if(result) - FormApply.success(req.getContextPath()+'/').generateResponse(req, rsp, null); - else - FormApply.success(""configure"").generateResponse(req, rsp, null); // back to config - } finally { - bc.commit(); - } - } - - /** - * Gets the {@link CrumbIssuer} currently in use. - * - * @return null if none is in use. - */ - public CrumbIssuer getCrumbIssuer() { - return crumbIssuer; - } - - public void setCrumbIssuer(CrumbIssuer issuer) { - crumbIssuer = issuer; - } - - public synchronized void doTestPost( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException { - rsp.sendRedirect(""foo""); - } - - private boolean configureDescriptor(StaplerRequest req, JSONObject json, Descriptor d) throws FormException { - // collapse the structure to remain backward compatible with the JSON structure before 1. - String name = d.getJsonSafeClassName(); - JSONObject js = json.has(name) ? json.getJSONObject(name) : new JSONObject(); // if it doesn't have the property, the method returns invalid null object. - json.putAll(js); - return d.configure(req, js); - } - - /** - * Accepts submission from the node configuration page. - */ - public synchronized void doConfigExecutorsSubmit( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException, FormException { - checkPermission(ADMINISTER); - - BulkChange bc = new BulkChange(this); - try { - JSONObject json = req.getSubmittedForm(); - - MasterBuildConfiguration mbc = MasterBuildConfiguration.all().get(MasterBuildConfiguration.class); - if (mbc!=null) - mbc.configure(req,json); - - getNodeProperties().rebuild(req, json.optJSONObject(""nodeProperties""), NodeProperty.all()); - } finally { - bc.commit(); - } - - rsp.sendRedirect(req.getContextPath()+'/'+toComputer().getUrl()); // back to the computer page - } - - /** - * Accepts the new description. - */ - public synchronized void doSubmitDescription( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException { - getPrimaryView().doSubmitDescription(req, rsp); - } - - public synchronized HttpRedirect doQuietDown() throws IOException { - try { - return doQuietDown(false,0); - } catch (InterruptedException e) { - throw new AssertionError(); // impossible - } - } - - @CLIMethod(name=""quiet-down"") - public HttpRedirect doQuietDown( - @Option(name=""-block"",usage=""Block until the system really quiets down and no builds are running"") @QueryParameter boolean block, - @Option(name=""-timeout"",usage=""If non-zero, only block up to the specified number of milliseconds"") @QueryParameter int timeout) throws InterruptedException, IOException { - synchronized (this) { - checkPermission(ADMINISTER); - isQuietingDown = true; - } - if (block) { - if (timeout > 0) timeout += System.currentTimeMillis(); - while (isQuietingDown - && (timeout <= 0 || System.currentTimeMillis() < timeout) - && !RestartListener.isAllReady()) { - Thread.sleep(1000); - } - } - return new HttpRedirect("".""); - } - - @CLIMethod(name=""cancel-quiet-down"") - public synchronized HttpRedirect doCancelQuietDown() { - checkPermission(ADMINISTER); - isQuietingDown = false; - getQueue().scheduleMaintenance(); - return new HttpRedirect("".""); - } - - /** - * Backward compatibility. Redirect to the thread dump. - */ - public void doClassicThreadDump(StaplerResponse rsp) throws IOException, ServletException { - rsp.sendRedirect2(""threadDump""); - } - - /** - * Obtains the thread dump of all slaves (including the master.) - * - *

- * Since this is for diagnostics, it has a built-in precautionary measure against hang slaves. - */ - public Map> getAllThreadDumps() throws IOException, InterruptedException { - checkPermission(ADMINISTER); - - // issue the requests all at once - Map>> future = new HashMap>>(); - - for (Computer c : getComputers()) { - try { - future.put(c.getName(), RemotingDiagnostics.getThreadDumpAsync(c.getChannel())); - } catch(Exception e) { - LOGGER.info(""Failed to get thread dump for node "" + c.getName() + "": "" + e.getMessage()); - } - } - if (toComputer() == null) { - future.put(""master"", RemotingDiagnostics.getThreadDumpAsync(MasterComputer.localChannel)); - } - - // if the result isn't available in 5 sec, ignore that. - // this is a precaution against hang nodes - long endTime = System.currentTimeMillis() + 5000; - - Map> r = new HashMap>(); - for (Entry>> e : future.entrySet()) { - try { - r.put(e.getKey(), e.getValue().get(endTime-System.currentTimeMillis(), TimeUnit.MILLISECONDS)); - } catch (Exception x) { - StringWriter sw = new StringWriter(); - x.printStackTrace(new PrintWriter(sw,true)); - r.put(e.getKey(), Collections.singletonMap(""Failed to retrieve thread dump"",sw.toString())); - } - } - return r; - } - - public synchronized TopLevelItem doCreateItem( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException { - return itemGroupMixIn.createTopLevelItem(req, rsp); - } - - /** - * @since 1.319 - */ - public TopLevelItem createProjectFromXML(String name, InputStream xml) throws IOException { - return itemGroupMixIn.createProjectFromXML(name, xml); - } - - - @SuppressWarnings({""unchecked""}) - public T copy(T src, String name) throws IOException { - return itemGroupMixIn.copy(src, name); - } - - // a little more convenient overloading that assumes the caller gives us the right type - // (or else it will fail with ClassCastException) - public > T copy(T src, String name) throws IOException { - return (T)copy((TopLevelItem)src,name); - } - - public synchronized void doCreateView( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException, FormException { - checkPermission(View.CREATE); - addView(View.create(req,rsp, this)); - } - - /** - * Check if the given name is suitable as a name - * for job, view, etc. - * - * @throws ParseException - * if the given name is not good - */ - public static void checkGoodName(String name) throws Failure { - if(name==null || name.length()==0) - throw new Failure(Messages.Hudson_NoName()); - - for( int i=0; i[]:;"".indexOf(ch)!=-1) - throw new Failure(Messages.Hudson_UnsafeChar(ch)); - } - - // looks good - } - - /** - * Makes sure that the given name is good as a job name. - * @return trimmed name if valid; throws ParseException if not - */ - private String checkJobName(String name) throws Failure { - checkGoodName(name); - name = name.trim(); - projectNamingStrategy.checkName(name); - if(getItem(name)!=null) - throw new Failure(Messages.Hudson_JobAlreadyExists(name)); - // looks good - return name; - } - - private static String toPrintableName(String name) { - StringBuilder printableName = new StringBuilder(); - for( int i=0; i args = new ArrayList(); - while (true) - args.add(new byte[1024*1024]); - } - - private transient final Map duplexChannels = new HashMap(); - - /** - * Handles HTTP requests for duplex channels for CLI. - */ - public void doCli(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException, InterruptedException { - if (!""POST"".equals(req.getMethod())) { - // for GET request, serve _cli.jelly, assuming this is a browser - checkPermission(READ); - req.getView(this,""_cli.jelly"").forward(req,rsp); - return; - } - - // do not require any permission to establish a CLI connection - // the actual authentication for the connecting Channel is done by CLICommand - - UUID uuid = UUID.fromString(req.getHeader(""Session"")); - rsp.setHeader(""Hudson-Duplex"",""""); // set the header so that the client would know - - FullDuplexHttpChannel server; - if(req.getHeader(""Side"").equals(""download"")) { - duplexChannels.put(uuid,server=new FullDuplexHttpChannel(uuid, !hasPermission(ADMINISTER)) { - protected void main(Channel channel) throws IOException, InterruptedException { - // capture the identity given by the transport, since this can be useful for SecurityRealm.createCliAuthenticator() - channel.setProperty(CLICommand.TRANSPORT_AUTHENTICATION,getAuthentication()); - channel.setProperty(CliEntryPoint.class.getName(),new CliManagerImpl(channel)); - } - }); - try { - server.download(req,rsp); - } finally { - duplexChannels.remove(uuid); - } - } else { - duplexChannels.get(uuid).upload(req,rsp); - } - } - - /** - * Binds /userContent/... to $JENKINS_HOME/userContent. - */ - public DirectoryBrowserSupport doUserContent() { - return new DirectoryBrowserSupport(this,getRootPath().child(""userContent""),""User content"",""folder.png"",true); - } - - /** - * Perform a restart of Hudson, if we can. - * - * This first replaces ""app"" to {@link HudsonIsRestarting} - */ - @CLIMethod(name=""restart"") - public void doRestart(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException, RestartNotSupportedException { - checkPermission(ADMINISTER); - if (req != null && req.getMethod().equals(""GET"")) { - req.getView(this,""_restart.jelly"").forward(req,rsp); - return; - } - - restart(); - - if (rsp != null) // null for CLI - rsp.sendRedirect2("".""); - } - - /** - * Queues up a restart of Hudson for when there are no builds running, if we can. - * - * This first replaces ""app"" to {@link HudsonIsRestarting} - * - * @since 1.332 - */ - @CLIMethod(name=""safe-restart"") - public HttpResponse doSafeRestart(StaplerRequest req) throws IOException, ServletException, RestartNotSupportedException { - checkPermission(ADMINISTER); - if (req != null && req.getMethod().equals(""GET"")) - return HttpResponses.forwardToView(this,""_safeRestart.jelly""); - - safeRestart(); - - return HttpResponses.redirectToDot(); - } - - /** - * Performs a restart. - */ - public void restart() throws RestartNotSupportedException { - final Lifecycle lifecycle = Lifecycle.get(); - lifecycle.verifyRestartable(); // verify that Hudson is restartable - servletContext.setAttribute(""app"", new HudsonIsRestarting()); - - new Thread(""restart thread"") { - final String exitUser = getAuthentication().getName(); - @Override - public void run() { - try { - ACL.impersonate(ACL.SYSTEM); - - // give some time for the browser to load the ""reloading"" page - Thread.sleep(5000); - LOGGER.severe(String.format(""Restarting VM as requested by %s"",exitUser)); - for (RestartListener listener : RestartListener.all()) - listener.onRestart(); - lifecycle.restart(); - } catch (InterruptedException e) { - LOGGER.log(Level.WARNING, ""Failed to restart Hudson"",e); - } catch (IOException e) { - LOGGER.log(Level.WARNING, ""Failed to restart Hudson"",e); - } - } - }.start(); - } - - /** - * Queues up a restart to be performed once there are no builds currently running. - * @since 1.332 - */ - public void safeRestart() throws RestartNotSupportedException { - final Lifecycle lifecycle = Lifecycle.get(); - lifecycle.verifyRestartable(); // verify that Hudson is restartable - // Quiet down so that we won't launch new builds. - isQuietingDown = true; - - new Thread(""safe-restart thread"") { - final String exitUser = getAuthentication().getName(); - @Override - public void run() { - try { - ACL.impersonate(ACL.SYSTEM); - - // Wait 'til we have no active executors. - doQuietDown(true, 0); - - // Make sure isQuietingDown is still true. - if (isQuietingDown) { - servletContext.setAttribute(""app"",new HudsonIsRestarting()); - // give some time for the browser to load the ""reloading"" page - LOGGER.info(""Restart in 10 seconds""); - Thread.sleep(10000); - LOGGER.severe(String.format(""Restarting VM as requested by %s"",exitUser)); - for (RestartListener listener : RestartListener.all()) - listener.onRestart(); - lifecycle.restart(); - } else { - LOGGER.info(""Safe-restart mode cancelled""); - } - } catch (InterruptedException e) { - LOGGER.log(Level.WARNING, ""Failed to restart Hudson"",e); - } catch (IOException e) { - LOGGER.log(Level.WARNING, ""Failed to restart Hudson"",e); - } - } - }.start(); - } - - /** - * Shutdown the system. - * @since 1.161 - */ - @CLIMethod(name=""shutdown"") - public void doExit( StaplerRequest req, StaplerResponse rsp ) throws IOException { - checkPermission(ADMINISTER); - LOGGER.severe(String.format(""Shutting down VM as requested by %s from %s"", - getAuthentication().getName(), req!=null?req.getRemoteAddr():""???"")); - if (rsp!=null) { - rsp.setStatus(HttpServletResponse.SC_OK); - rsp.setContentType(""text/plain""); - PrintWriter w = rsp.getWriter(); - w.println(""Shutting down""); - w.close(); - } - - System.exit(0); - } - - - /** - * Shutdown the system safely. - * @since 1.332 - */ - @CLIMethod(name=""safe-shutdown"") - public HttpResponse doSafeExit(StaplerRequest req) throws IOException { - checkPermission(ADMINISTER); - isQuietingDown = true; - final String exitUser = getAuthentication().getName(); - final String exitAddr = req!=null ? req.getRemoteAddr() : ""unknown""; - new Thread(""safe-exit thread"") { - @Override - public void run() { - try { - ACL.impersonate(ACL.SYSTEM); - LOGGER.severe(String.format(""Shutting down VM as requested by %s from %s"", - exitUser, exitAddr)); - // Wait 'til we have no active executors. - while (isQuietingDown - && (overallLoad.computeTotalExecutors() > overallLoad.computeIdleExecutors())) { - Thread.sleep(5000); - } - // Make sure isQuietingDown is still true. - if (isQuietingDown) { - cleanUp(); - System.exit(0); - } - } catch (InterruptedException e) { - LOGGER.log(Level.WARNING, ""Failed to shutdown Hudson"",e); - } - } - }.start(); - - return HttpResponses.plainText(""Shutting down as soon as all jobs are complete""); - } - - /** - * Gets the {@link Authentication} object that represents the user - * associated with the current request. - */ - public static Authentication getAuthentication() { - Authentication a = SecurityContextHolder.getContext().getAuthentication(); - // on Tomcat while serving the login page, this is null despite the fact - // that we have filters. Looking at the stack trace, Tomcat doesn't seem to - // run the request through filters when this is the login request. - // see http://www.nabble.com/Matrix-authorization-problem-tp14602081p14886312.html - if(a==null) - a = ANONYMOUS; - return a; - } - - /** - * For system diagnostics. - * Run arbitrary Groovy script. - */ - public void doScript(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException { - doScript(req, rsp, req.getView(this, ""_script.jelly"")); - } - - /** - * Run arbitrary Groovy script and return result as plain text. - */ - public void doScriptText(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException { - doScript(req, rsp, req.getView(this, ""_scriptText.jelly"")); - } - - private void doScript(StaplerRequest req, StaplerResponse rsp, RequestDispatcher view) throws IOException, ServletException { - // ability to run arbitrary script is dangerous - checkPermission(RUN_SCRIPTS); - - String text = req.getParameter(""script""); - if (text != null) { - try { - req.setAttribute(""output"", - RemotingDiagnostics.executeGroovy(text, MasterComputer.localChannel)); - } catch (InterruptedException e) { - throw new ServletException(e); - } - } - - view.forward(req, rsp); - } - - /** - * Evaluates the Jelly script submitted by the client. - * - * This is useful for system administration as well as unit testing. - */ - @RequirePOST - public void doEval(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException { - checkPermission(ADMINISTER); - - try { - MetaClass mc = WebApp.getCurrent().getMetaClass(getClass()); - Script script = mc.classLoader.loadTearOff(JellyClassLoaderTearOff.class).createContext().compileScript(new InputSource(req.getReader())); - new JellyRequestDispatcher(this,script).forward(req,rsp); - } catch (JellyException e) { - throw new ServletException(e); - } - } - - /** - * Sign up for the user account. - */ - public void doSignup( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException { - req.getView(getSecurityRealm(), ""signup.jelly"").forward(req, rsp); - } - - /** - * Changes the icon size by changing the cookie - */ - public void doIconSize( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException { - String qs = req.getQueryString(); - if(qs==null || !ICON_SIZE.matcher(qs).matches()) - throw new ServletException(); - Cookie cookie = new Cookie(""iconSize"", qs); - cookie.setMaxAge(/* ~4 mo. */9999999); // #762 - rsp.addCookie(cookie); - String ref = req.getHeader(""Referer""); - if(ref==null) ref="".""; - rsp.sendRedirect2(ref); - } - - public void doFingerprintCleanup(StaplerResponse rsp) throws IOException { - FingerprintCleanupThread.invoke(); - rsp.setStatus(HttpServletResponse.SC_OK); - rsp.setContentType(""text/plain""); - rsp.getWriter().println(""Invoked""); - } - - public void doWorkspaceCleanup(StaplerResponse rsp) throws IOException { - WorkspaceCleanupThread.invoke(); - rsp.setStatus(HttpServletResponse.SC_OK); - rsp.setContentType(""text/plain""); - rsp.getWriter().println(""Invoked""); - } - - /** - * If the user chose the default JDK, make sure we got 'java' in PATH. - */ - public FormValidation doDefaultJDKCheck(StaplerRequest request, @QueryParameter String value) { - if(!value.equals(""(Default)"")) - // assume the user configured named ones properly in system config --- - // or else system config should have reported form field validation errors. - return FormValidation.ok(); - - // default JDK selected. Does such java really exist? - if(JDK.isDefaultJDKValid(Jenkins.this)) - return FormValidation.ok(); - else - return FormValidation.errorWithMarkup(Messages.Hudson_NoJavaInPath(request.getContextPath())); - } - - /** - * Makes sure that the given name is good as a job name. - */ - public FormValidation doCheckJobName(@QueryParameter String value) { - // this method can be used to check if a file exists anywhere in the file system, - // so it should be protected. - checkPermission(Item.CREATE); - - if(fixEmpty(value)==null) - return FormValidation.ok(); - - try { - checkJobName(value); - return FormValidation.ok(); - } catch (Failure e) { - return FormValidation.error(e.getMessage()); - } - } - - /** - * Checks if a top-level view with the given name exists. - */ - public FormValidation doViewExistsCheck(@QueryParameter String value) { - checkPermission(View.CREATE); - - String view = fixEmpty(value); - if(view==null) return FormValidation.ok(); - - if(getView(view)==null) - return FormValidation.ok(); - else - return FormValidation.error(Messages.Hudson_ViewAlreadyExists(view)); - } - - /** - * Serves static resources placed along with Jelly view files. - *

- * This method can serve a lot of files, so care needs to be taken - * to make this method secure. It's not clear to me what's the best - * strategy here, though the current implementation is based on - * file extensions. - */ - public void doResources(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException { - String path = req.getRestOfPath(); - // cut off the ""..."" portion of /resources/.../path/to/file - // as this is only used to make path unique (which in turn - // allows us to set a long expiration date - path = path.substring(path.indexOf('/',1)+1); - - int idx = path.lastIndexOf('.'); - String extension = path.substring(idx+1); - if(ALLOWED_RESOURCE_EXTENSIONS.contains(extension)) { - URL url = pluginManager.uberClassLoader.getResource(path); - if(url!=null) { - long expires = MetaClass.NO_CACHE ? 0 : 365L * 24 * 60 * 60 * 1000; /*1 year*/ - rsp.serveFile(req,url,expires); - return; - } - } - rsp.sendError(HttpServletResponse.SC_NOT_FOUND); - } - - /** - * Extension list that {@link #doResources(StaplerRequest, StaplerResponse)} can serve. - * This set is mutable to allow plugins to add additional extensions. - */ - public static final Set ALLOWED_RESOURCE_EXTENSIONS = new HashSet(Arrays.asList( - ""js|css|jpeg|jpg|png|gif|html|htm"".split(""\\|"") - )); - - /** - * Checks if container uses UTF-8 to decode URLs. See - * http://wiki.jenkins-ci.org/display/JENKINS/Tomcat#Tomcat-i18n - */ - public FormValidation doCheckURIEncoding(StaplerRequest request) throws IOException { - // expected is non-ASCII String - final String expected = ""\u57f7\u4e8b""; - final String value = fixEmpty(request.getParameter(""value"")); - if (!expected.equals(value)) - return FormValidation.warningWithMarkup(Messages.Hudson_NotUsesUTF8ToDecodeURL()); - return FormValidation.ok(); - } - - /** - * Does not check when system default encoding is ""ISO-8859-1"". - */ - public static boolean isCheckURIEncodingEnabled() { - return !""ISO-8859-1"".equalsIgnoreCase(System.getProperty(""file.encoding"")); - } - - /** - * Rebuilds the dependency map. - */ - public void rebuildDependencyGraph() { - DependencyGraph graph = new DependencyGraph(); - graph.build(); - // volatile acts a as a memory barrier here and therefore guarantees - // that graph is fully build, before it's visible to other threads - dependencyGraph = graph; - } - - public DependencyGraph getDependencyGraph() { - return dependencyGraph; - } - - // for Jelly - public List getManagementLinks() { - return ManagementLink.all(); - } - - /** - * Exposes the current user to /me URL. - */ - public User getMe() { - User u = User.current(); - if (u == null) - throw new AccessDeniedException(""/me is not available when not logged in""); - return u; - } - - /** - * Gets the {@link Widget}s registered on this object. - * - *

- * Plugins who wish to contribute boxes on the side panel can add widgets - * by {@code getWidgets().add(new MyWidget())} from {@link Plugin#start()}. - */ - public List getWidgets() { - return widgets; - } - - public Object getTarget() { - try { - checkPermission(READ); - } catch (AccessDeniedException e) { - String rest = Stapler.getCurrentRequest().getRestOfPath(); - if(rest.startsWith(""/login"") - || rest.startsWith(""/logout"") - || rest.startsWith(""/accessDenied"") - || rest.startsWith(""/adjuncts/"") - || rest.startsWith(""/signup"") - || rest.startsWith(""/tcpSlaveAgentListener"") - || rest.startsWith(""/cli"") - || rest.startsWith(""/federatedLoginService/"") - || rest.startsWith(""/securityRealm"")) - return this; // URLs that are always visible without READ permission - - for (String name : getUnprotectedRootActions()) { - if (rest.startsWith(""/"" + name + ""/"") || rest.equals(""/"" + name)) { - return this; - } - } - - throw e; - } - return this; - } - - /** - * Gets a list of unprotected root actions. - * These URL prefixes should be exempted from access control checks by container-managed security. - * Ideally would be synchronized with {@link #getTarget}. - * @return a list of {@linkplain Action#getUrlName URL names} - * @since 1.495 - */ - public Collection getUnprotectedRootActions() { - Set names = new TreeSet(); - names.add(""jnlpJars""); // XXX cleaner to refactor doJnlpJars into a URA - // XXX consider caching (expiring cache when actions changes) - for (Action a : getActions()) { - if (a instanceof UnprotectedRootAction) { - names.add(a.getUrlName()); - } - } - return names; - } - - /** - * Fallback to the primary view. - */ - public View getStaplerFallback() { - return getPrimaryView(); - } - - /** - * This method checks all existing jobs to see if displayName is - * unique. It does not check the displayName against the displayName of the - * job that the user is configuring though to prevent a validation warning - * if the user sets the displayName to what it currently is. - * @param displayName - * @param currentJobName - * @return - */ - boolean isDisplayNameUnique(String displayName, String currentJobName) { - Collection itemCollection = items.values(); - - // if there are a lot of projects, we'll have to store their - // display names in a HashSet or something for a quick check - for(TopLevelItem item : itemCollection) { - if(item.getName().equals(currentJobName)) { - // we won't compare the candidate displayName against the current - // item. This is to prevent an validation warning if the user - // sets the displayName to what the existing display name is - continue; - } - else if(displayName.equals(item.getDisplayName())) { - return false; - } - } - - return true; - } - - /** - * True if there is no item in Jenkins that has this name - * @param name The name to test - * @param currentJobName The name of the job that the user is configuring - * @return - */ - boolean isNameUnique(String name, String currentJobName) { - Item item = getItem(name); - - if(null==item) { - // the candidate name didn't return any items so the name is unique - return true; - } - else if(item.getName().equals(currentJobName)) { - // the candidate name returned an item, but the item is the item - // that the user is configuring so this is ok - return true; - } - else { - // the candidate name returned an item, so it is not unique - return false; - } - } - - /** - * Checks to see if the candidate displayName collides with any - * existing display names or project names - * @param displayName The display name to test - * @param jobName The name of the job the user is configuring - * @return - */ - public FormValidation doCheckDisplayName(@QueryParameter String displayName, - @QueryParameter String jobName) { - displayName = displayName.trim(); - - if(LOGGER.isLoggable(Level.FINE)) { - LOGGER.log(Level.FINE, ""Current job name is "" + jobName); - } - - if(!isNameUnique(displayName, jobName)) { - return FormValidation.warning(Messages.Jenkins_CheckDisplayName_NameNotUniqueWarning(displayName)); - } - else if(!isDisplayNameUnique(displayName, jobName)){ - return FormValidation.warning(Messages.Jenkins_CheckDisplayName_DisplayNameNotUniqueWarning(displayName)); - } - else { - return FormValidation.ok(); - } - } - - public static class MasterComputer extends Computer { - protected MasterComputer() { - super(Jenkins.getInstance()); - } - - /** - * Returns """" to match with {@link Jenkins#getNodeName()}. - */ - @Override - public String getName() { - return """"; - } - - @Override - public boolean isConnecting() { - return false; - } - - @Override - public String getDisplayName() { - return Messages.Hudson_Computer_DisplayName(); - } - - @Override - public String getCaption() { - return Messages.Hudson_Computer_Caption(); - } - - @Override - public String getUrl() { - return ""computer/(master)/""; - } - - public RetentionStrategy getRetentionStrategy() { - return RetentionStrategy.NOOP; - } - - /** - * Report an error. - */ - @Override - public HttpResponse doDoDelete() throws IOException { - throw HttpResponses.status(SC_BAD_REQUEST); - } - - @Override - public void doConfigSubmit(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException, FormException { - Jenkins.getInstance().doConfigExecutorsSubmit(req, rsp); - } - - @Override - public boolean hasPermission(Permission permission) { - // no one should be allowed to delete the master. - // this hides the ""delete"" link from the /computer/(master) page. - if(permission==Computer.DELETE) - return false; - // Configuration of master node requires ADMINISTER permission - return super.hasPermission(permission==Computer.CONFIGURE ? Jenkins.ADMINISTER : permission); - } - - @Override - public VirtualChannel getChannel() { - return localChannel; - } - - @Override - public Charset getDefaultCharset() { - return Charset.defaultCharset(); - } - - public List getLogRecords() throws IOException, InterruptedException { - return logRecords; - } - - public void doLaunchSlaveAgent(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException { - // this computer never returns null from channel, so - // this method shall never be invoked. - rsp.sendError(SC_NOT_FOUND); - } - - protected Future _connect(boolean forceReconnect) { - return Futures.precomputed(null); - } - - /** - * {@link LocalChannel} instance that can be used to execute programs locally. - */ - public static final LocalChannel localChannel = new LocalChannel(threadPoolForRemoting); - } - - /** - * Shortcut for {@code Hudson.getInstance().lookup.get(type)} - */ - public static T lookup(Class type) { - return Jenkins.getInstance().lookup.get(type); - } - - /** - * Live view of recent {@link LogRecord}s produced by Hudson. - */ - public static List logRecords = Collections.emptyList(); // initialized to dummy value to avoid NPE - - /** - * Thread-safe reusable {@link XStream}. - */ - public static final XStream XSTREAM = new XStream2(); - - /** - * Alias to {@link #XSTREAM} so that one can access additional methods on {@link XStream2} more easily. - */ - public static final XStream2 XSTREAM2 = (XStream2)XSTREAM; - - private static final int TWICE_CPU_NUM = Math.max(4, Runtime.getRuntime().availableProcessors() * 2); - - /** - * Thread pool used to load configuration in parallel, to improve the start up time. - *

- * The idea here is to overlap the CPU and I/O, so we want more threads than CPU numbers. - */ - /*package*/ transient final ExecutorService threadPoolForLoad = new ThreadPoolExecutor( - TWICE_CPU_NUM, TWICE_CPU_NUM, - 5L, TimeUnit.SECONDS, new LinkedBlockingQueue(), new DaemonThreadFactory()); - - - private static void computeVersion(ServletContext context) { - // set the version - Properties props = new Properties(); - try { - InputStream is = Jenkins.class.getResourceAsStream(""jenkins-version.properties""); - if(is!=null) - props.load(is); - } catch (IOException e) { - e.printStackTrace(); // if the version properties is missing, that's OK. - } - String ver = props.getProperty(""version""); - if(ver==null) ver=""?""; - VERSION = ver; - context.setAttribute(""version"",ver); - - VERSION_HASH = Util.getDigestOf(ver).substring(0, 8); - SESSION_HASH = Util.getDigestOf(ver+System.currentTimeMillis()).substring(0, 8); - - if(ver.equals(""?"") || Boolean.getBoolean(""hudson.script.noCache"")) - RESOURCE_PATH = """"; - else - RESOURCE_PATH = ""/static/""+SESSION_HASH; - - VIEW_RESOURCE_PATH = ""/resources/""+ SESSION_HASH; - } - - /** - * Version number of this Hudson. - */ - public static String VERSION=""?""; - - /** - * Parses {@link #VERSION} into {@link VersionNumber}, or null if it's not parseable as a version number - * (such as when Hudson is run with ""mvn hudson-dev:run"") - */ - public static VersionNumber getVersion() { - try { - return new VersionNumber(VERSION); - } catch (NumberFormatException e) { - try { - // for non-released version of Hudson, this looks like ""1.345 (private-foobar), so try to approximate. - int idx = VERSION.indexOf(' '); - if (idx>0) - return new VersionNumber(VERSION.substring(0,idx)); - } catch (NumberFormatException _) { - // fall through - } - - // totally unparseable - return null; - } catch (IllegalArgumentException e) { - // totally unparseable - return null; - } - } - - /** - * Hash of {@link #VERSION}. - */ - public static String VERSION_HASH; - - /** - * Unique random token that identifies the current session. - * Used to make {@link #RESOURCE_PATH} unique so that we can set long ""Expires"" header. - * - * We used to use {@link #VERSION_HASH}, but making this session local allows us to - * reuse the same {@link #RESOURCE_PATH} for static resources in plugins. - */ - public static String SESSION_HASH; - - /** - * Prefix to static resources like images and javascripts in the war file. - * Either """" or strings like ""/static/VERSION"", which avoids Hudson to pick up - * stale cache when the user upgrades to a different version. - *

- * Value computed in {@link WebAppMain}. - */ - public static String RESOURCE_PATH = """"; - - /** - * Prefix to resources alongside view scripts. - * Strings like ""/resources/VERSION"", which avoids Hudson to pick up - * stale cache when the user upgrades to a different version. - *

- * Value computed in {@link WebAppMain}. - */ - public static String VIEW_RESOURCE_PATH = ""/resources/TBD""; - - public static boolean PARALLEL_LOAD = Configuration.getBooleanConfigParameter(""parallelLoad"", true); - public static boolean KILL_AFTER_LOAD = Configuration.getBooleanConfigParameter(""killAfterLoad"", false); - /** - * Enabled by default as of 1.337. Will keep it for a while just in case we have some serious problems. - */ - public static boolean FLYWEIGHT_SUPPORT = Configuration.getBooleanConfigParameter(""flyweightSupport"", true); - - /** - * Tentative switch to activate the concurrent build behavior. - * When we merge this back to the trunk, this allows us to keep - * this feature hidden for a while until we iron out the kinks. - * @see AbstractProject#isConcurrentBuild() - * @deprecated as of 1.464 - * This flag will have no effect. - */ - @Restricted(NoExternalUse.class) - public static boolean CONCURRENT_BUILD = true; - - /** - * Switch to enable people to use a shorter workspace name. - */ - private static final String WORKSPACE_DIRNAME = Configuration.getStringConfigParameter(""workspaceDirName"", ""workspace""); - - /** - * Automatically try to launch a slave when Jenkins is initialized or a new slave is created. - */ - public static boolean AUTOMATIC_SLAVE_LAUNCH = true; - - private static final Logger LOGGER = Logger.getLogger(Jenkins.class.getName()); - - private static final Pattern ICON_SIZE = Pattern.compile(""\\d+x\\d+""); - - public static final PermissionGroup PERMISSIONS = Permission.HUDSON_PERMISSIONS; - public static final Permission ADMINISTER = Permission.HUDSON_ADMINISTER; - public static final Permission READ = new Permission(PERMISSIONS,""Read"",Messages._Hudson_ReadPermission_Description(),Permission.READ,PermissionScope.JENKINS); - public static final Permission RUN_SCRIPTS = new Permission(PERMISSIONS, ""RunScripts"", Messages._Hudson_RunScriptsPermission_Description(),ADMINISTER,PermissionScope.JENKINS); - - /** - * {@link Authentication} object that represents the anonymous user. - * Because Acegi creates its own {@link AnonymousAuthenticationToken} instances, the code must not - * expect the singleton semantics. This is just a convenient instance. - * - * @since 1.343 - */ - public static final Authentication ANONYMOUS = new AnonymousAuthenticationToken( - ""anonymous"",""anonymous"",new GrantedAuthority[]{new GrantedAuthorityImpl(""anonymous"")}); - - static { - XSTREAM.alias(""jenkins"",Jenkins.class); - XSTREAM.alias(""slave"", DumbSlave.class); - XSTREAM.alias(""jdk"",JDK.class); - // for backward compatibility with <1.75, recognize the tag name ""view"" as well. - XSTREAM.alias(""view"", ListView.class); - XSTREAM.alias(""listView"", ListView.class); - // this seems to be necessary to force registration of converter early enough - Mode.class.getEnumConstants(); - - // double check that initialization order didn't do any harm - assert PERMISSIONS!=null; - assert ADMINISTER!=null; - } - -} -" -1," Object getValue(Object parent); - - /** - * Returns the name of this cascadable element. - * - * @return The name of this cascadable element. - */ -" -1," public String getInfo() { - - return (info); - - } - - - -" -1," protected boolean addInputFilter(InputFilter[] inputFilters, - String encodingName) { - if (encodingName.equals(""identity"")) { - // Skip - } else if (encodingName.equals(""chunked"")) { - inputBuffer.addActiveFilter - (inputFilters[Constants.CHUNKED_FILTER]); - contentDelimitation = true; - } else { - for (int i = 2; i < inputFilters.length; i++) { - if (inputFilters[i].getEncodingName() - .toString().equals(encodingName)) { - inputBuffer.addActiveFilter(inputFilters[i]); - return true; - } - } - return false; - } - return true; - } - - - /** - * Specialized utility method: find a sequence of lower case bytes inside - * a ByteChunk. - */ -" -1," public void changePassword_Resets_Session() throws Exception { - ScimUser user = createUser(); - - MockHttpSession session = new MockHttpSession(); - MockHttpSession afterLoginSession = (MockHttpSession) getMockMvc().perform(post(""/login.do"") - .session(session) - .accept(TEXT_HTML_VALUE) - .param(""username"", user.getUserName()) - .param(""password"", ""secr3T"")) - .andExpect(status().isFound()) - .andExpect(redirectedUrl(""/"")) - .andReturn().getRequest().getSession(false); - - assertTrue(session.isInvalid()); - assertNotNull(afterLoginSession); - assertNotNull(afterLoginSession.getAttribute(HttpSessionSecurityContextRepository.SPRING_SECURITY_CONTEXT_KEY)); - - MockHttpSession afterPasswordChange = (MockHttpSession) getMockMvc().perform(post(""/change_password.do"") - .session(afterLoginSession) - .with(csrf()) - .accept(TEXT_HTML_VALUE) - .param(""current_password"", ""secr3T"") - .param(""new_password"", ""secr3T1"") - .param(""confirm_password"", ""secr3T1"")) - .andExpect(status().isFound()) - .andExpect(redirectedUrl(""profile"")) - .andReturn().getRequest().getSession(false); - - assertTrue(afterLoginSession.isInvalid()); - assertNotNull(afterPasswordChange); - assertNotNull(afterPasswordChange.getAttribute(HttpSessionSecurityContextRepository.SPRING_SECURITY_CONTEXT_KEY)); - assertNotSame(afterLoginSession, afterPasswordChange); - - } - -" -1," public String changePassword( - Model model, - @RequestParam(""current_password"") String currentPassword, - @RequestParam(""new_password"") String newPassword, - @RequestParam(""confirm_password"") String confirmPassword, - HttpServletResponse response, - HttpServletRequest request) { - - PasswordConfirmationValidation validation = new PasswordConfirmationValidation(newPassword, confirmPassword); - if (!validation.valid()) { - model.addAttribute(""message_code"", validation.getMessageCode()); - response.setStatus(HttpStatus.UNPROCESSABLE_ENTITY.value()); - return ""change_password""; - } - - SecurityContext securityContext = SecurityContextHolder.getContext(); - Authentication authentication = securityContext.getAuthentication(); - String username = authentication.getName(); - - try { - changePasswordService.changePassword(username, currentPassword, newPassword); - request.getSession().invalidate(); - request.getSession(true); - securityContext.setAuthentication(authentication); - return ""redirect:profile""; - } catch (BadCredentialsException e) { - model.addAttribute(""message_code"", ""unauthorized""); - } catch (InvalidPasswordException e) { - model.addAttribute(""message"", e.getMessagesAsOneString()); - } - response.setStatus(HttpStatus.UNPROCESSABLE_ENTITY.value()); - return ""change_password""; - } -" -1," private XPathEvaluator createEvaluator(String xpath2) { - try { - return (XPathEvaluator)EVALUATOR_CONSTRUCTOR.newInstance(new Object[] {xpath}); - } catch (InvocationTargetException e) { - Throwable cause = e.getCause(); - if (cause instanceof RuntimeException) { - throw (RuntimeException)cause; - } - throw new RuntimeException(""Invalid XPath Expression: "" + xpath + "" reason: "" + e.getMessage(), e); - } catch (Throwable e) { - throw new RuntimeException(""Invalid XPath Expression: "" + xpath + "" reason: "" + e.getMessage(), e); - } - } - -" -1," protected RequestEntity createRequestEntity(Exchange exchange) throws CamelExchangeException { - Message in = exchange.getIn(); - if (in.getBody() == null) { - return null; - } - - RequestEntity answer = in.getBody(RequestEntity.class); - if (answer == null) { - try { - Object data = in.getBody(); - if (data != null) { - String contentType = ExchangeHelper.getContentType(exchange); - - if (contentType != null && HttpConstants.CONTENT_TYPE_JAVA_SERIALIZED_OBJECT.equals(contentType)) { - // serialized java object - Serializable obj = in.getMandatoryBody(Serializable.class); - // write object to output stream - ByteArrayOutputStream bos = new ByteArrayOutputStream(); - HttpHelper.writeObjectToStream(bos, obj); - answer = new ByteArrayRequestEntity(bos.toByteArray(), HttpConstants.CONTENT_TYPE_JAVA_SERIALIZED_OBJECT); - IOHelper.close(bos); - } else if (data instanceof File || data instanceof GenericFile) { - // file based (could potentially also be a FTP file etc) - File file = in.getBody(File.class); - if (file != null) { - answer = new FileRequestEntity(file, contentType); - } - } else if (data instanceof String) { - // be a bit careful with String as any type can most likely be converted to String - // so we only do an instanceof check and accept String if the body is really a String - // do not fallback to use the default charset as it can influence the request - // (for example application/x-www-form-urlencoded forms being sent) - String charset = IOHelper.getCharsetName(exchange, false); - answer = new StringRequestEntity((String) data, contentType, charset); - } - // fallback as input stream - if (answer == null) { - // force the body as an input stream since this is the fallback - InputStream is = in.getMandatoryBody(InputStream.class); - answer = new InputStreamRequestEntity(is, contentType); - } - } - } catch (UnsupportedEncodingException e) { - throw new CamelExchangeException(""Error creating RequestEntity from message body"", exchange, e); - } catch (IOException e) { - throw new CamelExchangeException(""Error serializing message body"", exchange, e); - } - } - return answer; - } - -" -1," public void execute(String key, ActionMapping mapping) { - String location = key.substring(REDIRECT_ACTION_PREFIX - .length()); - ServletRedirectResult redirect = new ServletRedirectResult(); - container.inject(redirect); - String extension = getDefaultExtension(); - if (extension != null && extension.length() > 0) { - location += ""."" + extension; - } - redirect.setLocation(location); - mapping.setResult(redirect); - } - }); - } - }; - } - - /** - * Adds a parameter action. Should only be called during initialization - * - * @param prefix The string prefix to trigger the action - * @param parameterAction The parameter action to execute - * @since 2.1.0 - */ -" -1," private void findConstructor() { - try { - iConstructor = iClassToInstantiate.getConstructor(iParamTypes); - } catch (final NoSuchMethodException ex) { - throw new IllegalArgumentException(""InstantiateFactory: The constructor must exist and be public ""); - } - } - - /** - * Creates an object using the stored constructor. - * - * @return the new object - */ -" -1," private void checkParams() - throws Exception - { - if (vi == null) - { - throw new Exception(""no layers defined.""); - } - if (vi.length > 1) - { - for (int i = 0; i < vi.length - 1; i++) - { - if (vi[i] >= vi[i + 1]) - { - throw new Exception( - ""v[i] has to be smaller than v[i+1]""); - } - } - } - else - { - throw new Exception( - ""Rainbow needs at least 1 layer, such that v1 < v2.""); - } - } - - /** - * Getter for the number of layers - * - * @return the number of layers - */ -" -1," public boolean isTransferException() { - return transferException; - } - - /** - * If enabled and an Exchange failed processing on the consumer side, and if the caused Exception was send back serialized - * in the response as a application/x-java-serialized-object content type (for example using Jetty or Servlet Camel components). - * On the producer side the exception will be deserialized and thrown as is, instead of the AhcOperationFailedException. - * The caused exception is required to be serialized. - */ -" -1," public void setMethods(Set methods) { - this.methods = new HashSet(); - for (String method : methods) { - this.methods.add(method.toUpperCase()); - } - } - - /** - * @param authenticationEntryPoint the authenticationEntryPoint to set - */ -" -1," private EnumSet getValidatedExecutableTypes(DefaultValidatedExecutableTypesType validatedExecutables) { - if ( validatedExecutables == null ) { - return null; - } - - EnumSet executableTypes = EnumSet.noneOf( ExecutableType.class ); - executableTypes.addAll( validatedExecutables.getExecutableType() ); - - return executableTypes; - } -" -1," public boolean getValidateClientProvidedNewSessionId(); -" -1," private File mkdirsE(File dir) throws IOException { - if (dir.exists()) { - return dir; - } - filterNonNull().mkdirs(dir); - return IOUtils.mkdirs(dir); - } - -" -1," public static boolean isExpression(Object value) { - String expr = value.toString(); - return expr.startsWith(""%{"") && expr.endsWith(""}""); - } - -" -1," protected final GF2Polynomial[] invertMatrix(GF2Polynomial[] matrix) - { - GF2Polynomial[] a = new GF2Polynomial[matrix.length]; - GF2Polynomial[] inv = new GF2Polynomial[matrix.length]; - GF2Polynomial dummy; - int i, j; - // initialize a as a copy of matrix and inv as E(inheitsmatrix) - for (i = 0; i < mDegree; i++) - { - try - { - a[i] = new GF2Polynomial(matrix[i]); - inv[i] = new GF2Polynomial(mDegree); - inv[i].setBit(mDegree - 1 - i); - } - catch (RuntimeException BDNEExc) - { - BDNEExc.printStackTrace(); - } - } - // construct triangle matrix so that for each a[i] the first i bits are - // zero - for (i = 0; i < mDegree - 1; i++) - { - // find column where bit i is set - j = i; - while ((j < mDegree) && !a[j].testBit(mDegree - 1 - i)) - { - j++; - } - if (j >= mDegree) - { - throw new RuntimeException( - ""GF2nField.invertMatrix: Matrix cannot be inverted!""); - } - if (i != j) - { // swap a[i]/a[j] and inv[i]/inv[j] - dummy = a[i]; - a[i] = a[j]; - a[j] = dummy; - dummy = inv[i]; - inv[i] = inv[j]; - inv[j] = dummy; - } - for (j = i + 1; j < mDegree; j++) - { // add column i to all columns>i - // having their i-th bit set - if (a[j].testBit(mDegree - 1 - i)) - { - a[j].addToThis(a[i]); - inv[j].addToThis(inv[i]); - } - } - } - // construct Einheitsmatrix from a - for (i = mDegree - 1; i > 0; i--) - { - for (j = i - 1; j >= 0; j--) - { // eliminate the i-th bit in all - // columns < i - if (a[j].testBit(mDegree - 1 - i)) - { - a[j].addToThis(a[i]); - inv[j].addToThis(inv[i]); - } - } - } - return inv; - } - - /** - * Converts the given element in representation according to this field to a - * new element in representation according to B1 using the change-of-basis - * matrix calculated by computeCOBMatrix. - * - * @param elem the GF2nElement to convert - * @param basis the basis to convert elem to - * @return elem converted to a new element representation - * according to basis - * @see GF2nField#computeCOBMatrix - * @see GF2nField#getRandomRoot - * @see GF2nPolynomial - * @see ""P1363 A.7 p109ff"" - */ -" -1," public JDBCTableReader getTableReader(Connection connection, String tableName, ParseContext context) { - return new SQLite3TableReader(connection, tableName, context); - } -" -1," public Source getAssociatedStylesheet( - Source source, String media, String title, String charset) - throws TransformerConfigurationException - { - - String baseID; - InputSource isource = null; - Node node = null; - XMLReader reader = null; - - if (source instanceof DOMSource) - { - DOMSource dsource = (DOMSource) source; - - node = dsource.getNode(); - baseID = dsource.getSystemId(); - } - else - { - isource = SAXSource.sourceToInputSource(source); - baseID = isource.getSystemId(); - } - - // What I try to do here is parse until the first startElement - // is found, then throw a special exception in order to terminate - // the parse. - StylesheetPIHandler handler = new StylesheetPIHandler(baseID, media, - title, charset); - - // Use URIResolver. Patch from Dmitri Ilyin - if (m_uriResolver != null) - { - handler.setURIResolver(m_uriResolver); - } - - try - { - if (null != node) - { - TreeWalker walker = new TreeWalker(handler, new org.apache.xml.utils.DOM2Helper(), baseID); - - walker.traverse(node); - } - else - { - - // Use JAXP1.1 ( if possible ) - try - { - javax.xml.parsers.SAXParserFactory factory = - javax.xml.parsers.SAXParserFactory.newInstance(); - - factory.setNamespaceAware(true); - - if (m_isSecureProcessing) - { - try - { - factory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, true); - } - catch (org.xml.sax.SAXException e) {} - } - - javax.xml.parsers.SAXParser jaxpParser = factory.newSAXParser(); - - reader = jaxpParser.getXMLReader(); - } - catch (javax.xml.parsers.ParserConfigurationException ex) - { - throw new org.xml.sax.SAXException(ex); - } - catch (javax.xml.parsers.FactoryConfigurationError ex1) - { - throw new org.xml.sax.SAXException(ex1.toString()); - } - catch (NoSuchMethodError ex2){} - catch (AbstractMethodError ame){} - - if (null == reader) - { - reader = XMLReaderFactory.createXMLReader(); - } - - // Need to set options! - reader.setContentHandler(handler); - reader.parse(isource); - } - } - catch (StopParseException spe) - { - - // OK, good. - } - catch (org.xml.sax.SAXException se) - { - throw new TransformerConfigurationException( - ""getAssociatedStylesheets failed"", se); - } - catch (IOException ioe) - { - throw new TransformerConfigurationException( - ""getAssociatedStylesheets failed"", ioe); - } - - return handler.getAssociatedStylesheet(); - } - - /** - * Create a new Transformer object that performs a copy - * of the source to the result. - * - * @return A Transformer object that may be used to perform a transformation - * in a single thread, never null. - * - * @throws TransformerConfigurationException May throw this during - * the parse when it is constructing the - * Templates object and fails. - */ -" -1," public Calendar ceil(Calendar cal) { - Calendar twoYearsFuture = (Calendar) cal.clone(); - twoYearsFuture.add(Calendar.YEAR, 2); - OUTER: - while (true) { - if (cal.compareTo(twoYearsFuture) > 0) { - // we went too far into the future - throw new RareOrImpossibleDateException(); - } - for (CalendarField f : CalendarField.ADJUST_ORDER) { - int cur = f.valueOf(cal); - int next = f.ceil(this,cur); - if (cur==next) continue; // this field is already in a good shape. move on to next - - // we are modifying this field, so clear all the lower level fields - for (CalendarField l=f.lowerField; l!=null; l=l.lowerField) - l.clear(cal); - - if (next<0) { - // we need to roll over to the next field. - f.rollUp(cal, 1); - f.setTo(cal,f.first(this)); - // since higher order field is affected by this, we need to restart from all over - continue OUTER; - } else { - f.setTo(cal,next); - if (f.redoAdjustmentIfModified) - continue OUTER; // when we modify DAY_OF_MONTH and DAY_OF_WEEK, do it all over from the top - } - } - return cal; // all fields adjusted - } - } - - /** - * Computes the nearest past timestamp that matched this cron tab. - *

- * More precisely, given the time 't', computes another smallest time x such that: - * - *

    - *
  • x <= t (inclusive) - *
  • x matches this crontab - *
- * - *

- * Note that if t already matches this cron, it's returned as is. - */ -" -1," public void run() { - try { - ObjectInputStream in = new ObjectInputStream(socket.getInputStream()); - while (!closed) { - Message msg = (Message) in.readObject(); - handle(msg); - } - } catch (EOFException eof) { - // Remote side has closed the connection, just cleanup. - try { - close(); - } catch (Exception unused) { - // no-op. - } - } catch (Exception e) { - if (!closed) { - LOG.log(Level.WARNING, ""Error in inbound message handling."", e); - try { - close(); - } catch (Exception unused) { - // no-op. - } - } - } - } - -" -1," public void setAllowJavaSerializedObject(boolean allowJavaSerializedObject) { - this.allowJavaSerializedObject = allowJavaSerializedObject; - } -" -1," private void updateGraph(ActionRequest actionRequest, - ActionResponse actionResponse) { - DBManager DBase = new DBManager(); - Connection con = DBase.getConnection(); - String graph_id = actionRequest.getParameter(""graph_id""); - actionResponse.setRenderParameter(""graph_id"", graph_id); - - String name = actionRequest.getParameter(""name""); - String description = actionRequest.getParameter(""description""); - String server_id = actionRequest.getParameter(""server_id""); - String xlabel = actionRequest.getParameter(""xlabel""); - String ylabel = actionRequest.getParameter(""ylabel""); - String timeframe = actionRequest.getParameter(""timeframe""); - String mbean = actionRequest.getParameter(""mbean""); - String dataname1 = actionRequest.getParameter(""dataname1""); - String data1operation = actionRequest.getParameter(""data1operation""); - String operation = actionRequest.getParameter(""operation""); - int archive = 0; - if (actionRequest.getParameter(""showArchive"") != null - && actionRequest.getParameter(""showArchive"").equals(""on"")) { - archive = 1; - } - - if (operation.equals(""other"")) { - operation = actionRequest.getParameter(""othermath""); - } - String dataname2 = actionRequest.getParameter(""dataname2""); - String data2operation = actionRequest.getParameter(""data2operation""); - if (data2operation == null) - data2operation = ""A""; - try { - PreparedStatement pStmt = con - .prepareStatement(""UPDATE graphs SET server_id="" - + server_id - + "", name='"" - + name - + ""', description='"" - + description - + ""', timeframe="" - + timeframe - + "", mbean='"" - + mbean - + ""', dataname1='"" - + dataname1 - + ""', xlabel='"" - + xlabel - + ""', ylabel='"" - + ylabel - + ""', data1operation='"" - + data1operation - + ""', operation='"" - + operation - + ""', data2operation='"" - + data2operation - + ""', dataname2='"" - + dataname2 - + ""', warninglevel1=0, warninglevel2=0, modified=CURRENT_TIMESTAMP, archive="" - + archive + "" WHERE graph_id="" + graph_id); - pStmt.executeUpdate(); - con.close(); - actionResponse.setRenderParameter(""message"", - ""Graph "" + name - + "" has been updated.""); - return; - - } catch (Exception e) { - actionResponse.setRenderParameter(""message"", - ""Error editing graph "" - + e.getMessage()); - return; - } - } - -" -1," protected void onSuccessfulAuthentication(HttpServletRequest request, HttpServletResponse response, Authentication authResult) throws IOException { - super.onSuccessfulAuthentication(request,response,authResult); - // make sure we have a session to store this successful authentication, given that we no longer - // let HttpSessionContextIntegrationFilter2 to create sessions. - // HttpSessionContextIntegrationFilter stores the updated SecurityContext object into this session later - // (either when a redirect is issued, via its HttpResponseWrapper, or when the execution returns to its - // doFilter method. - request.getSession(); - } - - /** - * Leave the information about login failure. - * - *

- * Otherwise it seems like Acegi doesn't really leave the detail of the failure anywhere. - */ - @Override -" -1," private Cache verifyCacheExists() { - int timeToWait = 0; - Cache cache = null; - while (timeToWait < TIME_TO_WAIT_FOR_CACHE) { - try { - cache = CacheFactory.getAnyInstance(); - break; - } catch (Exception ignore) { - // keep trying and hope for the best - } - try { - Thread.sleep(250); - } catch (InterruptedException ie) { - Thread.currentThread().interrupt(); - break; - } - timeToWait += 250; - } - - if (cache == null) { - cache = new CacheFactory().create(); - } - - return cache; - } - -" -1," public void clientCredentials_byDefault_WillNotLockoutDuringFailedBasicAuthAndFormData() throws Exception { - String clientId = ""testclient"" + generator.generate(); - String scopes = ""space.*.developer,space.*.admin,org.*.reader,org.123*.admin,*.*,*""; - setUpClients(clientId, scopes, scopes, GRANT_TYPES, true); - - String body = null; - for(int i = 0; i < 3; i++){ - body = getMockMvc().perform(post(""/oauth/token"") - .accept(MediaType.APPLICATION_JSON_VALUE) - .header(""Authorization"", ""Basic "" + new String(Base64.encode((clientId + "":"" + BADSECRET).getBytes()))) - .param(""grant_type"", ""client_credentials"") - ) - .andExpect(status().isUnauthorized()) - .andReturn().getResponse().getContentAsString(); - - body = getMockMvc().perform(post(""/oauth/token"") - .accept(MediaType.APPLICATION_JSON_VALUE) - .contentType(MediaType.APPLICATION_FORM_URLENCODED_VALUE) - .param(""grant_type"", ""client_credentials"") - .param(""client_id"", clientId) - .param(""client_secret"", BADSECRET) - ) - .andExpect(status().isUnauthorized()) - .andReturn().getResponse().getContentAsString(); - - } - - body = getMockMvc().perform(post(""/oauth/token"") - .accept(MediaType.APPLICATION_JSON_VALUE) - .header(""Authorization"", ""Basic "" + new String(Base64.encode((clientId + "":"" + SECRET).getBytes()))) - .param(""grant_type"", ""client_credentials"") - ) - .andExpect(status().isOk()) - .andReturn().getResponse().getContentAsString(); - } - - @Test -" -1," public String toStringInternal() { - String strValue=null; - try { - if( enc==null ) enc=DEFAULT_CHARACTER_ENCODING; - strValue = new String( buff, start, end-start, enc ); - /* - Does not improve the speed too much on most systems, - it's safer to use the ""clasical"" new String(). - - Most overhead is in creating char[] and copying, - the internal implementation of new String() is very close to - what we do. The decoder is nice for large buffers and if - we don't go to String ( so we can take advantage of reduced GC) - - // Method is commented out, in: - return B2CConverter.decodeString( enc ); - */ - } catch (java.io.UnsupportedEncodingException e) { - // Use the platform encoding in that case; the usage of a bad - // encoding will have been logged elsewhere already - strValue = new String(buff, start, end-start); - } - return strValue; - } - -" -1," public void repositoryVerificationTimeoutTest() throws Exception { - Client client = client(); - - Settings settings = ImmutableSettings.settingsBuilder() - .put(""location"", newTempDir(LifecycleScope.SUITE)) - .put(""random_control_io_exception_rate"", 1.0).build(); - logger.info(""--> creating repository that cannot write any files - should fail""); - assertThrows(client.admin().cluster().preparePutRepository(""test-repo-1"") - .setType(MockRepositoryModule.class.getCanonicalName()).setSettings(settings), - RepositoryVerificationException.class); - - logger.info(""--> creating repository that cannot write any files, but suppress verification - should be acked""); - assertAcked(client.admin().cluster().preparePutRepository(""test-repo-1"") - .setType(MockRepositoryModule.class.getCanonicalName()).setSettings(settings).setVerify(false)); - - logger.info(""--> verifying repository""); - assertThrows(client.admin().cluster().prepareVerifyRepository(""test-repo-1""), RepositoryVerificationException.class); - - File location = newTempDir(LifecycleScope.SUITE); - - logger.info(""--> creating repository""); - try { - client.admin().cluster().preparePutRepository(""test-repo-1"") - .setType(MockRepositoryModule.class.getCanonicalName()) - .setSettings(ImmutableSettings.settingsBuilder() - .put(""location"", location) - .put(""localize_location"", true) - ).get(); - fail(""RepositoryVerificationException wasn't generated""); - } catch (RepositoryVerificationException ex) { - assertThat(ex.getMessage(), containsString(""is not shared"")); - } - } - -" -1," public void execute(String key, ActionMapping mapping) { - String location = key.substring(REDIRECT_ACTION_PREFIX - .length()); - ServletRedirectResult redirect = new ServletRedirectResult(); - container.inject(redirect); - String extension = getDefaultExtension(); - if (extension != null && extension.length() > 0) { - location += ""."" + extension; - } - redirect.setLocation(location); - mapping.setResult(redirect); - } - }); - } - }; - } - - /** - * Adds a parameter action. Should only be called during initialization - * - * @param prefix The string prefix to trigger the action - * @param parameterAction The parameter action to execute - * @since 2.1.0 - */ -" -1," public void noUserSearchCausesUsernameNotFound() throws Exception { - DirContext ctx = mock(DirContext.class); - when(ctx.getNameInNamespace()).thenReturn(""""); - when(ctx.search(any(Name.class), any(String.class), any(Object[].class), any(SearchControls.class))) - .thenReturn(new EmptyEnumeration()); - - provider.contextFactory = createContextFactoryReturning(ctx); - - provider.authenticate(joe); - } - - @SuppressWarnings(""unchecked"") - @Test(expected = IncorrectResultSizeDataAccessException.class) -" -1," protected void addEmptyValueMapping(DefaultMapper mapper, String field, Object model) { - ParserContext parserContext = new FluentParserContext().evaluate(model.getClass()); - Expression target = expressionParser.parseExpression(field, parserContext); - try { - Class propertyType = target.getValueType(model); - Expression source = new StaticExpression(getEmptyValue(propertyType)); - DefaultMapping mapping = new DefaultMapping(source, target); - if (logger.isDebugEnabled()) { - logger.debug(""Adding empty value mapping for parameter '"" + field + ""'""); - } - mapper.addMapping(mapping); - } catch (EvaluationException e) { - } - } - - /** - * Adds a {@link DefaultMapping} between the given request parameter name and a matching model field. - * - * @param mapper the mapper to add the mapping to - * @param parameter the request parameter name - * @param model the model - */ -" -1," private boolean evaluate(String text) { - try { - InputSource inputSource = new InputSource(new StringReader(text)); - return ((Boolean)expression.evaluate(inputSource, XPathConstants.BOOLEAN)).booleanValue(); - } catch (XPathExpressionException e) { - return false; - } - } - - @Override -"