java-vulnerability / test.csv
Zaib's picture
Upload test.csv
e55511a
,label,code
0,0," private static void initKeyPair(SecureRandom prng) throws NoSuchAlgorithmException {
String sigAlg = signatureAlgorithm.toLowerCase();
if ( sigAlg.endsWith(""withdsa"") ) {
//
// Admittedly, this is a kludge. However for Sun JCE, even though
// ""SHA1withDSA"" is a valid signature algorithm name, if one calls
// KeyPairGenerator kpg = KeyPairGenerator.getInstance(""SHA1withDSA"");
// that will throw a NoSuchAlgorithmException with an exception
// message of ""SHA1withDSA KeyPairGenerator not available"". Since
// SHA1withDSA and DSA keys should be identical, we use ""DSA""
// in the case that SHA1withDSA or SHAwithDSA was specified. This is
// all just to make these 2 work as expected. Sigh. (Note:
// this was tested with JDK 1.6.0_21, but likely fails with earlier
// versions of the JDK as well.)
//
sigAlg = ""DSA"";
} else if ( sigAlg.endsWith(""withrsa"") ) {
// Ditto for RSA.
sigAlg = ""RSA"";
}
KeyPairGenerator keyGen = KeyPairGenerator.getInstance(sigAlg);
keyGen.initialize(signatureKeyLength, prng);
KeyPair pair = keyGen.generateKeyPair();
privateKey = pair.getPrivate();
publicKey = pair.getPublic();
}
"
1,0," public ZipArchiveEntry getNextZipEntry() throws IOException {
uncompressedCount = 0;
boolean firstEntry = true;
if (closed || hitCentralDirectory) {
return null;
}
if (current != null) {
closeEntry();
firstEntry = false;
}
long currentHeaderOffset = getBytesRead();
try {
if (firstEntry) {
// split archives have a special signature before the
// first local file header - look for it and fail with
// the appropriate error message if this is a split
// archive.
readFirstLocalFileHeader(lfhBuf);
} else {
readFully(lfhBuf);
}
} catch (final EOFException e) {
return null;
}
final ZipLong sig = new ZipLong(lfhBuf);
if (!sig.equals(ZipLong.LFH_SIG)) {
if (sig.equals(ZipLong.CFH_SIG) || sig.equals(ZipLong.AED_SIG) || isApkSigningBlock(lfhBuf)) {
hitCentralDirectory = true;
skipRemainderOfArchive();
return null;
}
throw new ZipException(String.format(""Unexpected record signature: 0X%X"", sig.getValue()));
}
int off = WORD;
current = new CurrentEntry();
final int versionMadeBy = ZipShort.getValue(lfhBuf, off);
off += SHORT;
current.entry.setPlatform((versionMadeBy >> ZipFile.BYTE_SHIFT) & ZipFile.NIBLET_MASK);
final GeneralPurposeBit gpFlag = GeneralPurposeBit.parse(lfhBuf, off);
final boolean hasUTF8Flag = gpFlag.usesUTF8ForNames();
final ZipEncoding entryEncoding = hasUTF8Flag ? ZipEncodingHelper.UTF8_ZIP_ENCODING : zipEncoding;
current.hasDataDescriptor = gpFlag.usesDataDescriptor();
current.entry.setGeneralPurposeBit(gpFlag);
off += SHORT;
current.entry.setMethod(ZipShort.getValue(lfhBuf, off));
off += SHORT;
final long time = ZipUtil.dosToJavaTime(ZipLong.getValue(lfhBuf, off));
current.entry.setTime(time);
off += WORD;
ZipLong size = null, cSize = null;
if (!current.hasDataDescriptor) {
current.entry.setCrc(ZipLong.getValue(lfhBuf, off));
off += WORD;
cSize = new ZipLong(lfhBuf, off);
off += WORD;
size = new ZipLong(lfhBuf, off);
off += WORD;
} else {
off += 3 * WORD;
}
final int fileNameLen = ZipShort.getValue(lfhBuf, off);
off += SHORT;
final int extraLen = ZipShort.getValue(lfhBuf, off);
off += SHORT; // NOSONAR - assignment as documentation
final byte[] fileName = new byte[fileNameLen];
readFully(fileName);
current.entry.setName(entryEncoding.decode(fileName), fileName);
if (hasUTF8Flag) {
current.entry.setNameSource(ZipArchiveEntry.NameSource.NAME_WITH_EFS_FLAG);
}
final byte[] extraData = new byte[extraLen];
readFully(extraData);
current.entry.setExtra(extraData);
if (!hasUTF8Flag && useUnicodeExtraFields) {
ZipUtil.setNameAndCommentFromExtraFields(current.entry, fileName, null);
}
processZip64Extra(size, cSize);
current.entry.setLocalHeaderOffset(currentHeaderOffset);
current.entry.setDataOffset(getBytesRead());
current.entry.setStreamContiguous(true);
ZipMethod m = ZipMethod.getMethodByCode(current.entry.getMethod());
if (current.entry.getCompressedSize() != ArchiveEntry.SIZE_UNKNOWN) {
if (ZipUtil.canHandleEntryData(current.entry) && m != ZipMethod.STORED && m != ZipMethod.DEFLATED) {
InputStream bis = new BoundedInputStream(in, current.entry.getCompressedSize());
switch (m) {
case UNSHRINKING:
current.in = new UnshrinkingInputStream(bis);
break;
case IMPLODING:
current.in = new ExplodingInputStream(
current.entry.getGeneralPurposeBit().getSlidingDictionarySize(),
current.entry.getGeneralPurposeBit().getNumberOfShannonFanoTrees(),
bis);
break;
case BZIP2:
current.in = new BZip2CompressorInputStream(bis);
break;
case ENHANCED_DEFLATED:
current.in = new Deflate64CompressorInputStream(bis);
break;
default:
// we should never get here as all supported methods have been covered
// will cause an error when read is invoked, don't throw an exception here so people can
// skip unsupported entries
break;
}
}
} else if (m == ZipMethod.ENHANCED_DEFLATED) {
current.in = new Deflate64CompressorInputStream(in);
}
entriesRead++;
return current.entry;
}
/**
* Fills the given array with the first local file header and
* deals with splitting/spanning markers that may prefix the first
* LFH.
*/
"
2,0," private static void assertCorrectConfig(User user, String unixPath) {
assertThat(user.getConfigFile().getFile().getPath(), endsWith(unixPath.replace('/', File.separatorChar)));
}
"
3,0," public void testRepositoryCreation() throws Exception {
Client client = client();
File location = randomRepoPath();
logger.info(""--> creating repository"");
PutRepositoryResponse putRepositoryResponse = client.admin().cluster().preparePutRepository(""test-repo-1"")
.setType(""fs"").setSettings(ImmutableSettings.settingsBuilder()
.put(""location"", location)
).get();
assertThat(putRepositoryResponse.isAcknowledged(), equalTo(true));
logger.info(""--> verify the repository"");
int numberOfFiles = location.listFiles().length;
VerifyRepositoryResponse verifyRepositoryResponse = client.admin().cluster().prepareVerifyRepository(""test-repo-1"").get();
assertThat(verifyRepositoryResponse.getNodes().length, equalTo(cluster().numDataAndMasterNodes()));
logger.info(""--> verify that we didn't leave any files as a result of verification"");
assertThat(location.listFiles().length, equalTo(numberOfFiles));
logger.info(""--> check that repository is really there"");
ClusterStateResponse clusterStateResponse = client.admin().cluster().prepareState().clear().setMetaData(true).get();
MetaData metaData = clusterStateResponse.getState().getMetaData();
RepositoriesMetaData repositoriesMetaData = metaData.custom(RepositoriesMetaData.TYPE);
assertThat(repositoriesMetaData, notNullValue());
assertThat(repositoriesMetaData.repository(""test-repo-1""), notNullValue());
assertThat(repositoriesMetaData.repository(""test-repo-1"").type(), equalTo(""fs""));
logger.info(""--> creating another repository"");
putRepositoryResponse = client.admin().cluster().preparePutRepository(""test-repo-2"")
.setType(""fs"").setSettings(ImmutableSettings.settingsBuilder()
.put(""location"", randomRepoPath())
).get();
assertThat(putRepositoryResponse.isAcknowledged(), equalTo(true));
logger.info(""--> check that both repositories are in cluster state"");
clusterStateResponse = client.admin().cluster().prepareState().clear().setMetaData(true).get();
metaData = clusterStateResponse.getState().getMetaData();
repositoriesMetaData = metaData.custom(RepositoriesMetaData.TYPE);
assertThat(repositoriesMetaData, notNullValue());
assertThat(repositoriesMetaData.repositories().size(), equalTo(2));
assertThat(repositoriesMetaData.repository(""test-repo-1""), notNullValue());
assertThat(repositoriesMetaData.repository(""test-repo-1"").type(), equalTo(""fs""));
assertThat(repositoriesMetaData.repository(""test-repo-2""), notNullValue());
assertThat(repositoriesMetaData.repository(""test-repo-2"").type(), equalTo(""fs""));
logger.info(""--> check that both repositories can be retrieved by getRepositories query"");
GetRepositoriesResponse repositoriesResponse = client.admin().cluster().prepareGetRepositories().get();
assertThat(repositoriesResponse.repositories().size(), equalTo(2));
assertThat(findRepository(repositoriesResponse.repositories(), ""test-repo-1""), notNullValue());
assertThat(findRepository(repositoriesResponse.repositories(), ""test-repo-2""), notNullValue());
logger.info(""--> delete repository test-repo-1"");
client.admin().cluster().prepareDeleteRepository(""test-repo-1"").get();
repositoriesResponse = client.admin().cluster().prepareGetRepositories().get();
assertThat(repositoriesResponse.repositories().size(), equalTo(1));
assertThat(findRepository(repositoriesResponse.repositories(), ""test-repo-2""), notNullValue());
logger.info(""--> delete repository test-repo-2"");
client.admin().cluster().prepareDeleteRepository(""test-repo-2"").get();
repositoriesResponse = client.admin().cluster().prepareGetRepositories().get();
assertThat(repositoriesResponse.repositories().size(), equalTo(0));
}
"
4,0," protected Blob getBlob(ResultSet resultSet, int columnIndex, Metadata m) throws SQLException {
byte[] bytes = resultSet.getBytes(columnIndex);
if (!resultSet.wasNull()) {
return new SerialBlob(bytes);
}
return null;
}
"
5,0," private <T> T run(PrivilegedAction<T> action) {
return System.getSecurityManager() != null ? AccessController.doPrivileged( action ) : action.run();
}
"
6,0," protected boolean statusDropsConnection(int status) {
return status == 400 /* SC_BAD_REQUEST */ ||
status == 408 /* SC_REQUEST_TIMEOUT */ ||
status == 411 /* SC_LENGTH_REQUIRED */ ||
status == 413 /* SC_REQUEST_ENTITY_TOO_LARGE */ ||
status == 414 /* SC_REQUEST_URI_TOO_LARGE */ ||
status == 500 /* SC_INTERNAL_SERVER_ERROR */ ||
status == 503 /* SC_SERVICE_UNAVAILABLE */ ||
status == 501 /* SC_NOT_IMPLEMENTED */;
}
"
7,0," private ControllerInfo getControllerInfo(Annotations annotation, String s) {
String[] data = s.split("":"");
if (data.length != 3) {
print(""Wrong format of the controller %s, should be in the format <protocol>:<ip>:<port>"", s);
return null;
}
String type = data[0];
IpAddress ip = IpAddress.valueOf(data[1]);
int port = Integer.parseInt(data[2]);
if (annotation != null) {
return new ControllerInfo(ip, port, type, annotation);
}
return new ControllerInfo(ip, port, type);
}
"
8,0," public Authentication authenticate(Authentication authentication) throws AuthenticationException {
Assert.isInstanceOf(UsernamePasswordAuthenticationToken.class, authentication,
messages.getMessage(""LdapAuthenticationProvider.onlySupports"",
""Only UsernamePasswordAuthenticationToken is supported""));
final UsernamePasswordAuthenticationToken userToken = (UsernamePasswordAuthenticationToken)authentication;
String username = userToken.getName();
String password = (String) authentication.getCredentials();
if (logger.isDebugEnabled()) {
logger.debug(""Processing authentication request for user: "" + username);
}
if (!StringUtils.hasLength(username)) {
throw new BadCredentialsException(messages.getMessage(""LdapAuthenticationProvider.emptyUsername"",
""Empty Username""));
}
if (!StringUtils.hasLength(password)) {
throw new BadCredentialsException(messages.getMessage(""AbstractLdapAuthenticationProvider.emptyPassword"",
""Empty Password""));
}
Assert.notNull(password, ""Null password was supplied in authentication token"");
DirContextOperations userData = doAuthentication(userToken);
UserDetails user = userDetailsContextMapper.mapUserFromContext(userData, authentication.getName(),
loadUserAuthorities(userData, authentication.getName(), (String)authentication.getCredentials()));
return createSuccessfulAuthentication(userToken, user);
}
"
9,0," protected IgnoreCsrfProtectionRegistry chainRequestMatchers(
List<RequestMatcher> requestMatchers) {
CsrfConfigurer.this.ignoredCsrfProtectionMatchers.addAll(requestMatchers);
return this;
}
}
}"
10,0," private String[] getParts(String encodedJWT) {
String[] parts = encodedJWT.split(""\\."");
// Secured JWT XXXXX.YYYYY.ZZZZZ, Unsecured JWT XXXXX.YYYYY.
if (parts.length == 3 || (parts.length == 2 && encodedJWT.endsWith("".""))) {
return parts;
}
throw new InvalidJWTException(""The encoded JWT is not properly formatted. Expected a three part dot separated string."");
}
"
11,0," public String getAlgorithm() {
return (this.algorithm);
}
/**
* Set the message digest algorithm for this Manager.
*
* @param algorithm The new message digest algorithm
*/
"
12,0," public ChannelRequestMatcherRegistry getRegistry() {
return REGISTRY;
}
@Override
"
13,0," public String getDefaultWebXml() {
if( defaultWebXml == null ) {
defaultWebXml=Constants.DefaultWebXml;
}
return (this.defaultWebXml);
}
/**
* Set the location of the default deployment descriptor
*
* @param path Absolute/relative path to the default web.xml
*/
"
14,0," public Collection<ResourcePermission> getRequiredPermissions(String regionName) {
return Collections.singletonList(ResourcePermissions.DATA_MANAGE);
}
"
15,0," private void enableAllocation(String index) {
client().admin().indices().prepareUpdateSettings(index).setSettings(ImmutableSettings.builder().put(
""index.routing.allocation.enable"", ""all""
)).get();
}
"
16,0," public void parse(InputStream stream, ContentHandler ignore,
Metadata metadata, ParseContext context) throws IOException,
SAXException, TikaException {
//Test to see if we should avoid parsing
if (parserState.recursiveParserWrapperHandler.hasHitMaximumEmbeddedResources()) {
return;
}
// Work out what this thing is
String objectName = getResourceName(metadata, parserState);
String objectLocation = this.location + objectName;
metadata.add(AbstractRecursiveParserWrapperHandler.EMBEDDED_RESOURCE_PATH, objectLocation);
//get a fresh handler
ContentHandler localHandler = parserState.recursiveParserWrapperHandler.getNewContentHandler();
parserState.recursiveParserWrapperHandler.startEmbeddedDocument(localHandler, metadata);
Parser preContextParser = context.get(Parser.class);
context.set(Parser.class, new EmbeddedParserDecorator(getWrappedParser(), objectLocation, parserState));
long started = System.currentTimeMillis();
try {
super.parse(stream, localHandler, metadata, context);
} catch (SAXException e) {
boolean wlr = isWriteLimitReached(e);
if (wlr == true) {
metadata.add(WRITE_LIMIT_REACHED, ""true"");
} else {
if (catchEmbeddedExceptions) {
ParserUtils.recordParserFailure(this, e, metadata);
} else {
throw e;
}
}
} catch(CorruptedFileException e) {
throw e;
} catch (TikaException e) {
if (catchEmbeddedExceptions) {
ParserUtils.recordParserFailure(this, e, metadata);
} else {
throw e;
}
} finally {
context.set(Parser.class, preContextParser);
long elapsedMillis = System.currentTimeMillis() - started;
metadata.set(RecursiveParserWrapperHandler.PARSE_TIME_MILLIS, Long.toString(elapsedMillis));
parserState.recursiveParserWrapperHandler.endEmbeddedDocument(localHandler, metadata);
}
}
}
/**
* This tracks the state of the parse of a single document.
* In future versions, this will allow the RecursiveParserWrapper to be thread safe.
*/
private class ParserState {
private int unknownCount = 0;
private final AbstractRecursiveParserWrapperHandler recursiveParserWrapperHandler;
private ParserState(AbstractRecursiveParserWrapperHandler handler) {
this.recursiveParserWrapperHandler = handler;
}
}
}
"
17,0," public static void beforeTests() throws Exception {
initCore(""solrconfig.xml"",""schema.xml"");
handler = new UpdateRequestHandler();
}
@Test
"
18,0," public void setUp() throws Exception {
interceptor = new I18nInterceptor();
interceptor.init();
params = new HashMap<String, Object>();
session = new HashMap();
Map<String, Object> ctx = new HashMap<String, Object>();
ctx.put(ActionContext.PARAMETERS, params);
ctx.put(ActionContext.SESSION, session);
ac = new ActionContext(ctx);
Action action = new Action() {
public String execute() throws Exception {
return SUCCESS;
}
};
mai = new MockActionInvocation();
((MockActionInvocation) mai).setAction(action);
((MockActionInvocation) mai).setInvocationContext(ac);
}
@After
"
19,0," private MockHttpServletRequestBuilder createChangePasswordRequest(ScimUser user, String code, boolean useCSRF, String password, String passwordConfirmation) throws Exception {
MockHttpServletRequestBuilder post = post(""/reset_password.do"");
if (useCSRF) {
post.with(csrf());
}
post.param(""code"", code)
.param(""email"", user.getPrimaryEmail())
.param(""password"", password)
.param(""password_confirmation"", passwordConfirmation);
return post;
}
"
20,0," protected Log getLog() {
return log;
}
// ----------------------------------------------------------- Constructors
"
21,0," public int getCount() {
return iCount;
}
"
22,0," public BeanDefinitionHolder decorate(Node node, BeanDefinitionHolder holder,
ParserContext parserContext) {
BeanDefinition filterChainProxy = holder.getBeanDefinition();
ManagedList<BeanMetadataElement> securityFilterChains = new ManagedList<BeanMetadataElement>();
Element elt = (Element) node;
MatcherType matcherType = MatcherType.fromElement(elt);
List<Element> filterChainElts = DomUtils.getChildElementsByTagName(elt,
Elements.FILTER_CHAIN);
for (Element chain : filterChainElts) {
String path = chain
.getAttribute(HttpSecurityBeanDefinitionParser.ATT_PATH_PATTERN);
String filters = chain
.getAttribute(HttpSecurityBeanDefinitionParser.ATT_FILTERS);
if (!StringUtils.hasText(path)) {
parserContext.getReaderContext().error(
""The attribute '""
+ HttpSecurityBeanDefinitionParser.ATT_PATH_PATTERN
+ ""' must not be empty"", elt);
}
if (!StringUtils.hasText(filters)) {
parserContext.getReaderContext().error(
""The attribute '"" + HttpSecurityBeanDefinitionParser.ATT_FILTERS
+ ""'must not be empty"", elt);
}
BeanDefinition matcher = matcherType.createMatcher(parserContext, path, null);
if (filters.equals(HttpSecurityBeanDefinitionParser.OPT_FILTERS_NONE)) {
securityFilterChains.add(createSecurityFilterChain(matcher,
new ManagedList(0)));
}
else {
String[] filterBeanNames = StringUtils
.tokenizeToStringArray(filters, "","");
ManagedList filterChain = new ManagedList(filterBeanNames.length);
for (String name : filterBeanNames) {
filterChain.add(new RuntimeBeanReference(name));
}
securityFilterChains.add(createSecurityFilterChain(matcher, filterChain));
}
}
filterChainProxy.getConstructorArgumentValues().addGenericArgumentValue(
securityFilterChains);
return holder;
}
"
23,0," public XObject execute(XPathContext xctxt) throws javax.xml.transform.TransformerException
{
String fullName = m_arg0.execute(xctxt).str();
int indexOfNSSep = fullName.indexOf(':');
String result = null;
String propName = """";
// List of properties where the name of the
// property argument is to be looked for.
Properties xsltInfo = new Properties();
loadPropertyFile(XSLT_PROPERTIES, xsltInfo);
if (indexOfNSSep > 0)
{
String prefix = (indexOfNSSep >= 0)
? fullName.substring(0, indexOfNSSep) : """";
String namespace;
namespace = xctxt.getNamespaceContext().getNamespaceForPrefix(prefix);
propName = (indexOfNSSep < 0)
? fullName : fullName.substring(indexOfNSSep + 1);
if (namespace.startsWith(""http://www.w3.org/XSL/Transform"")
|| namespace.equals(""http://www.w3.org/1999/XSL/Transform""))
{
result = xsltInfo.getProperty(propName);
if (null == result)
{
warn(xctxt, XPATHErrorResources.WG_PROPERTY_NOT_SUPPORTED,
new Object[]{ fullName }); //""XSL Property not supported: ""+fullName);
return XString.EMPTYSTRING;
}
}
else
{
warn(xctxt, XPATHErrorResources.WG_DONT_DO_ANYTHING_WITH_NS,
new Object[]{ namespace,
fullName }); //""Don't currently do anything with namespace ""+namespace+"" in property: ""+fullName);
try
{
//if secure procession is enabled only handle required properties do not not map any valid system property
if(!xctxt.isSecureProcessing())
{
result = System.getProperty(fullName);
}
else
{
warn(xctxt, XPATHErrorResources.WG_SECURITY_EXCEPTION,
new Object[]{ fullName }); //""SecurityException when trying to access XSL system property: ""+fullName);
result = xsltInfo.getProperty(propName);
}
if (null == result)
{
return XString.EMPTYSTRING;
}
}
catch (SecurityException se)
{
warn(xctxt, XPATHErrorResources.WG_SECURITY_EXCEPTION,
new Object[]{ fullName }); //""SecurityException when trying to access XSL system property: ""+fullName);
return XString.EMPTYSTRING;
}
}
}
else
{
try
{
//if secure procession is enabled only handle required properties do not not map any valid system property
if(!xctxt.isSecureProcessing())
{
result = System.getProperty(fullName);
}
else
{
warn(xctxt, XPATHErrorResources.WG_SECURITY_EXCEPTION,
new Object[]{ fullName }); //""SecurityException when trying to access XSL system property: ""+fullName);
result = xsltInfo.getProperty(propName);
}
if (null == result)
{
return XString.EMPTYSTRING;
}
}
catch (SecurityException se)
{
warn(xctxt, XPATHErrorResources.WG_SECURITY_EXCEPTION,
new Object[]{ fullName }); //""SecurityException when trying to access XSL system property: ""+fullName);
return XString.EMPTYSTRING;
}
}
if (propName.equals(""version"") && result.length() > 0)
{
try
{
// Needs to return the version number of the spec we conform to.
return new XString(""1.0"");
}
catch (Exception ex)
{
return new XString(result);
}
}
else
return new XString(result);
}
/**
* Retrieve a propery bundle from a specified file
*
* @param file The string name of the property file. The name
* should already be fully qualified as path/filename
* @param target The target property bag the file will be placed into.
*/
"
24,0," public boolean equals(Object obj) {
if ( this == obj ) {
return true;
}
if ( !super.equals( obj ) ) {
return false;
}
if ( getClass() != obj.getClass() ) {
return false;
}
ConstrainedExecutable other = (ConstrainedExecutable) obj;
if ( executable == null ) {
if ( other.executable != null ) {
return false;
}
}
else if ( !executable.equals( other.executable ) ) {
return false;
}
return true;
}
"
25,0," public static HierarchicalConfiguration loadXml(InputStream xmlStream) {
try {
XMLConfiguration cfg = new XMLConfiguration();
DocumentBuilderFactory dbfactory = DocumentBuilderFactory.newInstance();
//Disabling DTDs in order to avoid XXE xml-based attacks.
disableFeature(dbfactory, DISALLOW_DTD_FEATURE);
disableFeature(dbfactory, DISALLOW_EXTERNAL_DTD);
dbfactory.setXIncludeAware(false);
dbfactory.setExpandEntityReferences(false);
cfg.setDocumentBuilder(dbfactory.newDocumentBuilder());
cfg.load(xmlStream);
return cfg;
} catch (ConfigurationException | ParserConfigurationException e) {
throw new IllegalArgumentException(""Cannot load xml from Stream"", e);
}
}
"
26,0," void noteBytesRead(int pBytes) {
/* Indicates, that the given number of bytes have been read from
* the input stream.
*/
bytesRead += pBytes;
notifyListener();
}
/**
* Called to indicate, that a new file item has been detected.
*/
"
27,0," private static DocumentBuilder getBuilder() throws ParserConfigurationException {
ClassLoader loader = Thread.currentThread().getContextClassLoader();
if (loader == null) {
loader = DOMUtils.class.getClassLoader();
}
if (loader == null) {
DocumentBuilderFactory dbf = createDocumentBuilderFactory();
return dbf.newDocumentBuilder();
}
DocumentBuilder builder = DOCUMENT_BUILDERS.get(loader);
if (builder == null) {
DocumentBuilderFactory dbf = createDocumentBuilderFactory();
builder = dbf.newDocumentBuilder();
DOCUMENT_BUILDERS.put(loader, builder);
}
return builder;
}
/**
* This function is much like getAttribute, but returns null, not """", for a nonexistent attribute.
*
* @param e
* @param attributeName
*/
"
28,0," public StandardInterceptUrlRegistry getRegistry() {
return REGISTRY;
}
/**
* Adds an {@link ObjectPostProcessor} for this class.
*
* @param objectPostProcessor
* @return the {@link UrlAuthorizationConfigurer} for further customizations
*/
"
29,0," public synchronized XPathRecordReader addField(String name, String xpath, boolean multiValued, int flags) {
addField0(xpath, name, multiValued, false, flags);
return this;
}
/**
* Splits the XPATH into a List of xpath segments and calls build() to
* construct a tree of Nodes representing xpath segments. The resulting
* tree structure ends up describing all the Xpaths we are interested in.
*
* @param xpath The xpath expression for this field
* @param name The name for this field in the emitted record
* @param multiValued If 'true' then the emitted record will have values in
* a List&lt;String&gt;
* @param isRecord Flags that this XPATH is from a forEach statement
* @param flags The only supported flag is 'FLATTEN'
*/
"
30,0," public void setConstants(ContainerBuilder builder) {
for (Object keyobj : keySet()) {
String key = (String)keyobj;
builder.factory(String.class, key,
new LocatableConstantFactory<String>(getProperty(key), getPropertyLocation(key)));
}
}
}
}
"
31,0," public CommandLauncher launch(String host, TaskListener listener) throws IOException, InterruptedException {
return new CommandLauncher(command,new EnvVars(""SLAVE"",host));
}
@Extension @Symbol(""command"")
"
32,0," private void parseCSSStyleSheet(String sheet) throws SVGParseException
{
CSSParser cssp = new CSSParser(MediaType.screen);
svgDocument.addCSSRules(cssp.parse(sheet));
}
"
33,0," public void test_unsecuredJWT_validation() throws Exception {
JWT jwt = new JWT().setSubject(""123456789"");
Signer signer = new UnsecuredSigner();
Verifier hmacVerifier = HMACVerifier.newVerifier(""too many secrets"");
String encodedUnsecuredJWT = JWTEncoder.getInstance().encode(jwt, signer);
// Ensure that attempting to decode an un-secured JWT fails when we provide a verifier
expectException(MissingVerifierException.class, () -> JWT.getDecoder().decode(encodedUnsecuredJWT, hmacVerifier));
String encodedUnsecuredJWT_withKid = JWTEncoder.getInstance().encode(jwt, signer, (header) -> header.set(""kid"", ""abc""));
String encodedUnsecuredJWT_withoutKid = JWTEncoder.getInstance().encode(jwt, signer);
Map<String, Verifier> verifierMap = new HashMap<>();
verifierMap.put(null, hmacVerifier);
verifierMap.put(""abc"", hmacVerifier);
// Ensure that attempting to decode an un-secured JWT fails when we provide a verifier with or without using a kid
expectException(MissingVerifierException.class, () -> JWT.getDecoder().decode(encodedUnsecuredJWT_withKid, verifierMap));
expectException(MissingVerifierException.class, () -> JWT.getDecoder().decode(encodedUnsecuredJWT_withoutKid, verifierMap));
}
@Test
"
34,0," public String getConnectionName() {
return connectionName;
}
/**
* Set the username to use to connect to the database.
*
* @param connectionName Username
*/
"
35,0," protected Log getLog() {
return log;
}
@Override
"
36,0," public BigInteger[] decode(
byte[] encoding)
throws IOException
{
BigInteger[] sig = new BigInteger[2];
byte[] first = new byte[encoding.length / 2];
byte[] second = new byte[encoding.length / 2];
System.arraycopy(encoding, 0, first, 0, first.length);
System.arraycopy(encoding, first.length, second, 0, second.length);
sig[0] = new BigInteger(1, first);
sig[1] = new BigInteger(1, second);
return sig;
}
}
}"
37,0," public ScimGroup mapRow(ResultSet rs, int rowNum) throws SQLException {
int pos = 1;
String id = rs.getString(pos++);
String name = rs.getString(pos++);
String description = rs.getString(pos++);
Date created = rs.getTimestamp(pos++);
Date modified = rs.getTimestamp(pos++);
int version = rs.getInt(pos++);
String zoneId = rs.getString(pos++);
ScimGroup group = new ScimGroup(id, name, zoneId);
group.setDescription(description);
ScimMeta meta = new ScimMeta(created, modified, version);
group.setMeta(meta);
return group;
}
}
}
"
38,0," public void testSendStringMessage() throws Exception {
sendMessageAndHaveItTransformed(""<mail><subject>Hey</subject><body>Hello world!</body></mail>"");
}
"
39,0," public void testSingletonPatternInSerialization() {
final Object[] singletones = new Object[] {
ExceptionFactory.INSTANCE,
};
for (final Object original : singletones) {
TestUtils.assertSameAfterSerialization(
""Singletone patern broken for "" + original.getClass(),
original
);
}
}
"
40,0," private void doTestParameterNameLengthRestriction( ParametersInterceptor parametersInterceptor,
int paramNameMaxLength ) {
StringBuilder sb = new StringBuilder();
for (int i = 0; i < paramNameMaxLength + 1; i++) {
sb.append(""x"");
}
Map<String, Object> actual = new LinkedHashMap<String, Object>();
parametersInterceptor.setValueStackFactory(createValueStackFactory(actual));
ValueStack stack = createStubValueStack(actual);
Map<String, Object> parameters = new HashMap<String, Object>();
parameters.put(sb.toString(), """");
parameters.put(""huuhaa"", """");
Action action = new SimpleAction();
parametersInterceptor.setParameters(action, stack, parameters);
assertEquals(1, actual.size());
}
"
41,0," public boolean equals(Object obj) {
if (obj instanceof CharEntry) {
return value.equals(((CharEntry) obj).value);
}
return false;
}
}
}
"
42,0," protected boolean readMessage(AjpMessage message)
throws IOException {
byte[] buf = message.getBuffer();
int headerLength = message.getHeaderLength();
read(buf, 0, headerLength);
int messageLength = message.processHeader(true);
if (messageLength < 0) {
// Invalid AJP header signature
// TODO: Throw some exception and close the connection to frontend.
return false;
}
else if (messageLength == 0) {
// Zero length message.
return true;
}
else {
if (messageLength > buf.length) {
// Message too long for the buffer
// Need to trigger a 400 response
throw new IllegalArgumentException(sm.getString(
""ajpprocessor.header.tooLong"",
Integer.valueOf(messageLength),
Integer.valueOf(buf.length)));
}
read(buf, headerLength, messageLength);
return true;
}
}
"
43,0," public boolean allPresentAndPositive() {
return lockoutPeriodSeconds >= 0 && lockoutAfterFailures >= 0 && countFailuresWithin >= 0;
}
"
44,0," public boolean event(org.apache.coyote.Request req,
org.apache.coyote.Response res, SocketStatus status) {
Request request = (Request) req.getNote(ADAPTER_NOTES);
Response response = (Response) res.getNote(ADAPTER_NOTES);
if (request.getWrapper() != null) {
boolean error = false;
try {
if (status == SocketStatus.OPEN) {
request.getEvent().setEventType(CometEvent.EventType.READ);
request.getEvent().setEventSubType(null);
} else if (status == SocketStatus.DISCONNECT) {
request.getEvent().setEventType(CometEvent.EventType.ERROR);
request.getEvent().setEventSubType(CometEvent.EventSubType.CLIENT_DISCONNECT);
error = true;
} else if (status == SocketStatus.ERROR) {
request.getEvent().setEventType(CometEvent.EventType.ERROR);
request.getEvent().setEventSubType(CometEvent.EventSubType.IOEXCEPTION);
error = true;
} else if (status == SocketStatus.STOP) {
request.getEvent().setEventType(CometEvent.EventType.END);
request.getEvent().setEventSubType(CometEvent.EventSubType.SERVER_SHUTDOWN);
} else if (status == SocketStatus.TIMEOUT) {
request.getEvent().setEventType(CometEvent.EventType.ERROR);
request.getEvent().setEventSubType(CometEvent.EventSubType.TIMEOUT);
}
// Calling the container
connector.getContainer().getPipeline().getFirst().event(request, response, request.getEvent());
if (response.isClosed() || !request.isComet()) {
res.action(ActionCode.ACTION_COMET_END, null);
}
return (!error);
} catch (Throwable t) {
if (!(t instanceof IOException)) {
log.error(sm.getString(""coyoteAdapter.service""), t);
}
error = true;
// FIXME: Since there's likely some structures kept in the servlet or elsewhere,
// a cleanup event of some sort could be needed ?
return false;
} finally {
// Recycle the wrapper request and response
if (error || response.isClosed() || !request.isComet()) {
request.recycle();
request.setFilterChain(null);
response.recycle();
}
}
} else {
return false;
}
}
/**
* Service method.
*/
"
45,0," public void testSnapshotAndRestore() throws ExecutionException, InterruptedException, IOException {
logger.info(""--> creating repository"");
assertAcked(client().admin().cluster().preparePutRepository(""test-repo"")
.setType(""fs"").setSettings(ImmutableSettings.settingsBuilder()
.put(""location"", randomRepoPath().getAbsolutePath())
.put(""compress"", randomBoolean())
.put(""chunk_size"", randomIntBetween(100, 1000))));
String[] indicesBefore = new String[randomIntBetween(2,5)];
String[] indicesAfter = new String[randomIntBetween(2,5)];
for (int i = 0; i < indicesBefore.length; i++) {
indicesBefore[i] = ""index_before_"" + i;
createIndex(indicesBefore[i]);
}
for (int i = 0; i < indicesAfter.length; i++) {
indicesAfter[i] = ""index_after_"" + i;
createIndex(indicesAfter[i]);
}
String[] indices = new String[indicesBefore.length + indicesAfter.length];
System.arraycopy(indicesBefore, 0, indices, 0, indicesBefore.length);
System.arraycopy(indicesAfter, 0, indices, indicesBefore.length, indicesAfter.length);
ensureYellow();
logger.info(""--> indexing some data"");
IndexRequestBuilder[] buildersBefore = new IndexRequestBuilder[randomIntBetween(10, 200)];
for (int i = 0; i < buildersBefore.length; i++) {
buildersBefore[i] = client().prepareIndex(RandomPicks.randomFrom(getRandom(), indicesBefore), ""foo"", Integer.toString(i)).setSource(""{ \""foo\"" : \""bar\"" } "");
}
IndexRequestBuilder[] buildersAfter = new IndexRequestBuilder[randomIntBetween(10, 200)];
for (int i = 0; i < buildersAfter.length; i++) {
buildersAfter[i] = client().prepareIndex(RandomPicks.randomFrom(getRandom(), indicesBefore), ""bar"", Integer.toString(i)).setSource(""{ \""foo\"" : \""bar\"" } "");
}
indexRandom(true, buildersBefore);
indexRandom(true, buildersAfter);
assertThat(client().prepareCount(indices).get().getCount(), equalTo((long) (buildersBefore.length + buildersAfter.length)));
long[] counts = new long[indices.length];
for (int i = 0; i < indices.length; i++) {
counts[i] = client().prepareCount(indices[i]).get().getCount();
}
logger.info(""--> snapshot subset of indices before upgrage"");
CreateSnapshotResponse createSnapshotResponse = client().admin().cluster().prepareCreateSnapshot(""test-repo"", ""test-snap-1"").setWaitForCompletion(true).setIndices(""index_before_*"").get();
assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), greaterThan(0));
assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), equalTo(createSnapshotResponse.getSnapshotInfo().totalShards()));
assertThat(client().admin().cluster().prepareGetSnapshots(""test-repo"").setSnapshots(""test-snap-1"").get().getSnapshots().get(0).state(), equalTo(SnapshotState.SUCCESS));
logger.info(""--> delete some data from indices that were already snapshotted"");
int howMany = randomIntBetween(1, buildersBefore.length);
for (int i = 0; i < howMany; i++) {
IndexRequestBuilder indexRequestBuilder = RandomPicks.randomFrom(getRandom(), buildersBefore);
IndexRequest request = indexRequestBuilder.request();
client().prepareDelete(request.index(), request.type(), request.id()).get();
}
refresh();
final long numDocs = client().prepareCount(indices).get().getCount();
assertThat(client().prepareCount(indices).get().getCount(), lessThan((long) (buildersBefore.length + buildersAfter.length)));
client().admin().indices().prepareUpdateSettings(indices).setSettings(ImmutableSettings.builder().put(EnableAllocationDecider.INDEX_ROUTING_ALLOCATION_ENABLE, ""none"")).get();
backwardsCluster().allowOnAllNodes(indices);
logClusterState();
boolean upgraded;
do {
logClusterState();
CountResponse countResponse = client().prepareCount().get();
assertHitCount(countResponse, numDocs);
upgraded = backwardsCluster().upgradeOneNode();
ensureYellow();
countResponse = client().prepareCount().get();
assertHitCount(countResponse, numDocs);
} while (upgraded);
client().admin().indices().prepareUpdateSettings(indices).setSettings(ImmutableSettings.builder().put(EnableAllocationDecider.INDEX_ROUTING_ALLOCATION_ENABLE, ""all"")).get();
logger.info(""--> close indices"");
client().admin().indices().prepareClose(""index_before_*"").get();
logger.info(""--> verify repository"");
client().admin().cluster().prepareVerifyRepository(""test-repo"").get();
logger.info(""--> restore all indices from the snapshot"");
RestoreSnapshotResponse restoreSnapshotResponse = client().admin().cluster().prepareRestoreSnapshot(""test-repo"", ""test-snap-1"").setWaitForCompletion(true).execute().actionGet();
assertThat(restoreSnapshotResponse.getRestoreInfo().totalShards(), greaterThan(0));
ensureYellow();
assertThat(client().prepareCount(indices).get().getCount(), equalTo((long) (buildersBefore.length + buildersAfter.length)));
for (int i = 0; i < indices.length; i++) {
assertThat(counts[i], equalTo(client().prepareCount(indices[i]).get().getCount()));
}
logger.info(""--> snapshot subset of indices after upgrade"");
createSnapshotResponse = client().admin().cluster().prepareCreateSnapshot(""test-repo"", ""test-snap-2"").setWaitForCompletion(true).setIndices(""index_*"").get();
assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), greaterThan(0));
assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), equalTo(createSnapshotResponse.getSnapshotInfo().totalShards()));
// Test restore after index deletion
logger.info(""--> delete indices"");
String index = RandomPicks.randomFrom(getRandom(), indices);
cluster().wipeIndices(index);
logger.info(""--> restore one index after deletion"");
restoreSnapshotResponse = client().admin().cluster().prepareRestoreSnapshot(""test-repo"", ""test-snap-2"").setWaitForCompletion(true).setIndices(index).execute().actionGet();
assertThat(restoreSnapshotResponse.getRestoreInfo().totalShards(), greaterThan(0));
ensureYellow();
assertThat(client().prepareCount(indices).get().getCount(), equalTo((long) (buildersBefore.length + buildersAfter.length)));
for (int i = 0; i < indices.length; i++) {
assertThat(counts[i], equalTo(client().prepareCount(indices[i]).get().getCount()));
}
}
"
46,0," public XMSSPrivateKeyParameters getNextKey()
{
/* prepare authentication path for next leaf */
int treeHeight = this.params.getHeight();
if (this.getIndex() < ((1 << treeHeight) - 1))
{
return new XMSSPrivateKeyParameters.Builder(params)
.withSecretKeySeed(secretKeySeed).withSecretKeyPRF(secretKeyPRF)
.withPublicSeed(publicSeed).withRoot(root)
.withBDSState(bdsState.getNextState(publicSeed, secretKeySeed, (OTSHashAddress)new OTSHashAddress.Builder().build())).build();
}
else
{
return new XMSSPrivateKeyParameters.Builder(params)
.withSecretKeySeed(secretKeySeed).withSecretKeyPRF(secretKeyPRF)
.withPublicSeed(publicSeed).withRoot(root)
.withBDSState(new BDS(params, getIndex() + 1)).build(); // no more nodes left.
}
}
"
47,0," public void addRecipients(final ExtendedEmailPublisherContext context, EnvVars env, Set<InternetAddress> to, Set<InternetAddress> cc, Set<InternetAddress> bcc) {
final class Debug implements RecipientProviderUtilities.IDebug {
private final ExtendedEmailPublisherDescriptor descriptor
= Jenkins.getActiveInstance().getDescriptorByType(ExtendedEmailPublisherDescriptor.class);
private final PrintStream logger = context.getListener().getLogger();
public void send(final String format, final Object... args) {
descriptor.debug(logger, format, args);
}
}
final Debug debug = new Debug();
// looking for Upstream build.
Run<?, ?> cur = context.getRun();
Cause.UpstreamCause upc = cur.getCause(Cause.UpstreamCause.class);
while (upc != null) {
// UpstreamCause.getUpStreamProject() returns the full name, so use getItemByFullName
Job<?, ?> p = (Job<?, ?>) Jenkins.getActiveInstance().getItemByFullName(upc.getUpstreamProject());
if (p == null) {
context.getListener().getLogger().print(""There is a break in the project linkage, could not retrieve upstream project information"");
break;
}
cur = p.getBuildByNumber(upc.getUpstreamBuild());
upc = cur.getCause(Cause.UpstreamCause.class);
}
addUserTriggeringTheBuild(cur, to, cc, bcc, env, context, debug);
}
"
48,0," public void setSslSupport(SSLSupport sslSupport) {
this.sslSupport = sslSupport;
}
"
49,0," public void loadPropertyFile(String file, Properties target)
{
try
{
// Use SecuritySupport class to provide privileged access to property file
InputStream is = SecuritySupport.getResourceAsStream(ObjectFactory.findClassLoader(),
file);
// get a buffered version
BufferedInputStream bis = new BufferedInputStream(is);
target.load(bis); // and load up the property bag from this
bis.close(); // close out after reading
}
catch (Exception ex)
{
// ex.printStackTrace();
throw new org.apache.xml.utils.WrappedRuntimeException(ex);
}
}
"
50,0," protected MimeTypes getMimeTypes() {
return embeddedDocumentUtil.getMimeTypes();
}
"
51,0," public int getKDFInfo() {
final int unusedBit28 = 0x8000000; // 1000000000000000000000000000
// kdf version is bits 1-27, bit 28 (reserved) should be 0, and
// bits 29-32 are the MAC algorithm indicating which PRF to use for the KDF.
int kdfVers = getKDFVersion();
assert kdfVers > 0 && kdfVers <= 99991231 : ""KDF version (YYYYMMDD, max 99991231) out of range: "" + kdfVers;
int kdfInfo = kdfVers;
int macAlg = kdfPRFAsInt();
assert macAlg >= 0 && macAlg <= 15 : ""MAC algorithm indicator must be between 0 to 15 inclusion; value is: "" + macAlg;
// Make sure bit28 is cleared. (Reserved for future use.)
kdfInfo &= ~unusedBit28;
// Set MAC algorithm bits in high (MSB) nibble.
kdfInfo |= (macAlg << 28);
return kdfInfo;
}
"
52,0," private void readObject(ObjectInputStream stream) throws IOException, ClassNotFoundException {
stream.defaultReadObject();
EVIL_BIT = 1;
}
}
}
"
53,0," public void onStartup(Set<Class<?>> c, ServletContext ctx)
throws ServletException {
Servlet s;
if (createServlet) {
s = ctx.createServlet(servlet.getClass());
} else {
s = servlet;
}
ServletRegistration.Dynamic r = ctx.addServlet(""servlet"", s);
r.addMapping(""/"");
}
}
}
"
54,0," public ResetPasswordResponse resetPassword(String code, String newPassword) throws InvalidPasswordException {
try {
passwordValidator.validate(newPassword);
return changePasswordCodeAuthenticated(code, newPassword);
} catch (RestClientException e) {
throw new UaaException(e.getMessage());
}
}
"
55,0," public Api getApi() {
return new Api(this);
}
/**
* Returns the instance of this class.
* If {@link jenkins.model.Jenkins#getInstance()} isn't available
* or the plugin class isn't registered null will be returned.
*
* @return the instance.
*/
@CheckForNull
"
56,0," protected int readMessage(AjpMessage message, boolean blockFirstRead)
throws IOException {
byte[] buf = message.getBuffer();
int headerLength = message.getHeaderLength();
int bytesRead = read(buf, 0, headerLength, blockFirstRead);
if (bytesRead == 0) {
return 0;
}
int messageLength = message.processHeader(true);
if (messageLength < 0) {
// Invalid AJP header signature
throw new IOException(sm.getString(""ajpmessage.invalidLength"",
Integer.valueOf(messageLength)));
}
else if (messageLength == 0) {
// Zero length message.
return bytesRead;
}
else {
if (messageLength > buf.length) {
// Message too long for the buffer
// Need to trigger a 400 response
throw new IllegalArgumentException(sm.getString(
""ajpprocessor.header.tooLong"",
Integer.valueOf(messageLength),
Integer.valueOf(buf.length)));
}
bytesRead += read(buf, headerLength, messageLength, true);
return bytesRead;
}
}
"
57,0," public boolean isHA() {
return false;
}
@Override
"
58,0," public XMSSMTPrivateKeyParameters getNextKey()
{
BDSStateMap newState = new BDSStateMap(bdsState, params, this.getIndex(), publicSeed, secretKeySeed);
return new XMSSMTPrivateKeyParameters.Builder(params).withIndex(index + 1)
.withSecretKeySeed(secretKeySeed).withSecretKeyPRF(secretKeyPRF)
.withPublicSeed(publicSeed).withRoot(root)
.withBDSState(newState).build();
}
"
59,0," public TransformerFactory createTransformerFactory() {
TransformerFactory factory = TransformerFactory.newInstance();
// Enable the Security feature by default
try {
factory.setFeature(javax.xml.XMLConstants.FEATURE_SECURE_PROCESSING, true);
} catch (TransformerConfigurationException e) {
LOG.warn(""TransformerFactory doesn't support the feature {} with value {}, due to {}."", new Object[]{javax.xml.XMLConstants.FEATURE_SECURE_PROCESSING, ""true"", e});
}
factory.setErrorListener(new XmlErrorListener());
return factory;
}
"
60,0," long getTimeStamp();
"
61,0," public void init(KeyGenerationParameters param)
{
this.param = (RSAKeyGenerationParameters)param;
}
"
62,0," public Document getMetaData(Idp config) throws RuntimeException {
try {
//Return as text/xml
Crypto crypto = CertsUtils.createCrypto(config.getCertificate());
W3CDOMStreamWriter writer = new W3CDOMStreamWriter();
writer.writeStartDocument(""UTF-8"", ""1.0"");
String referenceID = IDGenerator.generateID(""_"");
writer.writeStartElement(""md"", ""EntityDescriptor"", SAML2_METADATA_NS);
writer.writeAttribute(""ID"", referenceID);
writer.writeAttribute(""entityID"", config.getIdpUrl().toString());
writer.writeNamespace(""md"", SAML2_METADATA_NS);
writer.writeNamespace(""fed"", WS_FEDERATION_NS);
writer.writeNamespace(""wsa"", WS_ADDRESSING_NS);
writer.writeNamespace(""auth"", WS_FEDERATION_NS);
writer.writeNamespace(""xsi"", SCHEMA_INSTANCE_NS);
writeFederationMetadata(writer, config, crypto);
writer.writeEndElement(); // EntityDescriptor
writer.writeEndDocument();
writer.close();
if (LOG.isDebugEnabled()) {
String out = DOM2Writer.nodeToString(writer.getDocument());
LOG.debug(""***************** unsigned ****************"");
LOG.debug(out);
LOG.debug(""***************** unsigned ****************"");
}
Document result = SignatureUtils.signMetaInfo(crypto, null, config.getCertificatePassword(),
writer.getDocument(), referenceID);
if (result != null) {
return result;
} else {
throw new RuntimeException(""Failed to sign the metadata document: result=null"");
}
} catch (Exception e) {
LOG.error(""Error creating service metadata information "", e);
throw new RuntimeException(""Error creating service metadata information: "" + e.getMessage());
}
}
"
63,0," protected void publish(ApplicationEvent event) {
if (publisher!=null) {
publisher.publishEvent(event);
}
}
"
64,0," private static File getUnsanitizedLegacyConfigFileFor(String id) {
return new File(getRootDir(), idStrategy().legacyFilenameOf(id) + ""/config.xml"");
}
/**
* Gets the directory where Hudson stores user information.
*/
"
65,0," protected void _initFactories(XMLInputFactory xmlIn, XMLOutputFactory xmlOut)
{
// Better ensure namespaces get built properly, so:
xmlOut.setProperty(XMLOutputFactory.IS_REPAIRING_NAMESPACES, Boolean.TRUE);
// and for parser, force coalescing as well (much simpler to use)
xmlIn.setProperty(XMLInputFactory.IS_COALESCING, Boolean.TRUE);
}
/**
* Note: compared to base implementation by {@link JsonFactory},
* here the copy will actually share underlying XML input and
* output factories, as there is no way to make copies of those.
*
* @since 2.1
*/
@Override
"
66,0," public ScimUser retrieve(String id) {
try {
ScimUser u = jdbcTemplate.queryForObject(USER_BY_ID_QUERY, mapper, id);
return u;
} catch (EmptyResultDataAccessException e) {
throw new ScimResourceNotFoundException(""User "" + id + "" does not exist"");
}
}
@Override
"
67,0," private <T> T run(PrivilegedAction<T> action) {
return System.getSecurityManager() != null ? AccessController.doPrivileged( action ) : action.run();
}
"
68,0," public boolean getMapperDirectoryRedirectEnabled() { return false; }
"
69,0," protected void setUpResources(JAXRSServerFactoryBean sf) {
sf.setResourceClasses(TikaResource.class);
sf.setResourceProvider(TikaResource.class,
new SingletonResourceProvider(new TikaResource()));
}
@Override
"
70,0," public HttpBinding getBinding() {
if (this.binding == null) {
this.binding = new AttachmentHttpBinding();
this.binding.setTransferException(isTransferException());
if (getComponent() != null) {
this.binding.setAllowJavaSerializedObject(getComponent().isAllowJavaSerializedObject());
}
this.binding.setHeaderFilterStrategy(getHeaderFilterStrategy());
}
return this.binding;
}
@Override
"
71,0," public void testNamedEntity() throws Exception {
assertU(""<?xml version=\""1.0\"" ?>\n""+
""<!DOCTYPE add [\n<!ENTITY wacky \""zzz\"" >\n]>""+
""<add><doc>""+
""<field name=\""id\"">1</field>""+
""<field name=\""foo_s\"">&wacky;</field>"" +
""</doc></add>"");
assertU(""<commit/>"");
assertQ(req(""foo_s:zzz""),
""//*[@numFound='1']""
);
}
@Test
"
72,0," private FreeStyleProject createDownstreamProject() throws Exception {
FreeStyleProject dp = createFreeStyleProject(""downstream"");
// Hm, no setQuietPeriod, have to submit form..
WebClient webClient = new WebClient();
HtmlPage page = webClient.getPage(dp,""configure"");
HtmlForm form = page.getFormByName(""config"");
form.getInputByName(""hasCustomQuietPeriod"").click();
form.getInputByName(""quiet_period"").setValueAttribute(""0"");
submit(form);
assertEquals(""set quiet period"", 0, dp.getQuietPeriod());
return dp;
}
"
73,0," public void setOkStatusCodeRange(String okStatusCodeRange) {
this.okStatusCodeRange = okStatusCodeRange;
}
"
74,0," public boolean shouldParseEmbedded(Metadata metadata) {
DocumentSelector selector = context.get(DocumentSelector.class);
if (selector != null) {
return selector.select(metadata);
}
FilenameFilter filter = context.get(FilenameFilter.class);
if (filter != null) {
String name = metadata.get(Metadata.RESOURCE_NAME_KEY);
if (name != null) {
return filter.accept(ABSTRACT_PATH, name);
}
}
return true;
}
"
75,0," public void testLockTryingToDelete() throws Exception {
String lockType = ""native""; // test does not work with simple locks
Settings nodeSettings = ImmutableSettings.builder()
.put(""gateway.type"", ""local"") // don't delete things!
.put(""index.store.fs.fs_lock"", lockType)
.build();
String IDX = ""test"";
logger.info(""--> lock type: {}"", lockType);
internalCluster().startNode(nodeSettings);
Settings idxSettings = ImmutableSettings.builder()
.put(IndexMetaData.SETTING_NUMBER_OF_SHARDS, 1)
.put(IndexMetaData.SETTING_NUMBER_OF_REPLICAS, 0)
.put(""index.store.fs.fs_lock"", lockType)
.build();
// only one node, so all primaries will end up on node1
prepareCreate(IDX).setSettings(idxSettings).addMapping(""doc"", ""foo"", ""type=string,index=not_analyzed"").get();
ensureGreen(IDX);
client().prepareIndex(IDX, ""doc"").setSource(""foo"", ""bar"").get();
flushAndRefresh(IDX);
NodeEnvironment env = internalCluster().getDataNodeInstance(NodeEnvironment.class);
logger.info(""--> data paths: [{}]"", env.nodeDataPaths());
Path[] shardPaths = env.shardDataPaths(new ShardId(""test"", 0), ImmutableSettings.builder().build());
logger.info(""--> paths: [{}]"", shardPaths);
// Should not be able to acquire the lock because it's already open
try {
NodeEnvironment.acquireFSLockForPaths(ImmutableSettings.EMPTY, shardPaths);
fail(""should not have been able to acquire the lock"");
} catch (ElasticsearchException e) {
assertTrue(""msg: "" + e.getMessage(), e.getMessage().contains(""unable to acquire write.lock""));
}
// Test without the regular shard lock to assume we can acquire it
// (worst case, meaning that the shard lock could be acquired and
// we're green to delete the shard's directory)
ShardLock sLock = new DummyShardLock(new ShardId(""test"", 0));
try {
env.deleteShardDirectoryUnderLock(sLock, ImmutableSettings.builder().build());
fail(""should not have been able to delete the directory"");
} catch (ElasticsearchException e) {
assertTrue(""msg: "" + e.getMessage(), e.getMessage().contains(""unable to acquire write.lock""));
}
}
"
76,0," public KeyPair generateKeyPair()
{
if (!initialised)
{
Integer paramStrength = Integers.valueOf(strength);
if (params.containsKey(paramStrength))
{
param = (DSAKeyGenerationParameters)params.get(paramStrength);
}
else
{
synchronized (lock)
{
// we do the check again in case we were blocked by a generator for
// our key size.
if (params.containsKey(paramStrength))
{
param = (DSAKeyGenerationParameters)params.get(paramStrength);
}
else
{
DSAParametersGenerator pGen;
DSAParameterGenerationParameters dsaParams;
// Typical combination of keysize and size of q.
// keysize = 1024, q's size = 160
// keysize = 2048, q's size = 224
// keysize = 2048, q's size = 256
// keysize = 3072, q's size = 256
// For simplicity if keysize is greater than 1024 then we choose q's size to be 256.
// For legacy keysize that is less than 1024-bit, we just use the 186-2 style parameters
if (strength == 1024)
{
pGen = new DSAParametersGenerator();
if (Properties.isOverrideSet(""org.bouncycastle.dsa.FIPS186-2for1024bits""))
{
pGen.init(strength, certainty, random);
}
else
{
dsaParams = new DSAParameterGenerationParameters(1024, 160, certainty, random);
pGen.init(dsaParams);
}
}
else if (strength > 1024)
{
dsaParams = new DSAParameterGenerationParameters(strength, 256, certainty, random);
pGen = new DSAParametersGenerator(new SHA256Digest());
pGen.init(dsaParams);
}
else
{
pGen = new DSAParametersGenerator();
pGen.init(strength, certainty, random);
}
param = new DSAKeyGenerationParameters(random, pGen.generateParameters());
params.put(paramStrength, param);
}
}
}
engine.init(param);
initialised = true;
}
AsymmetricCipherKeyPair pair = engine.generateKeyPair();
DSAPublicKeyParameters pub = (DSAPublicKeyParameters)pair.getPublic();
DSAPrivateKeyParameters priv = (DSAPrivateKeyParameters)pair.getPrivate();
return new KeyPair(new BCDSAPublicKey(pub), new BCDSAPrivateKey(priv));
}
"
77,0," Attributes setPropertiesFromAttributes(
StylesheetHandler handler, String rawName, Attributes attributes,
ElemTemplateElement target, boolean throwError)
throws org.xml.sax.SAXException
{
XSLTElementDef def = getElemDef();
AttributesImpl undefines = null;
boolean isCompatibleMode = ((null != handler.getStylesheet()
&& handler.getStylesheet().getCompatibleMode())
|| !throwError);
if (isCompatibleMode)
undefines = new AttributesImpl();
// Keep track of which XSLTAttributeDefs have been processed, so
// I can see which default values need to be set.
List processedDefs = new ArrayList();
// Keep track of XSLTAttributeDefs that were invalid
List errorDefs = new ArrayList();
int nAttrs = attributes.getLength();
for (int i = 0; i < nAttrs; i++)
{
String attrUri = attributes.getURI(i);
// Hack for Crimson. -sb
if((null != attrUri) && (attrUri.length() == 0)
&& (attributes.getQName(i).startsWith(""xmlns:"") ||
attributes.getQName(i).equals(""xmlns"")))
{
attrUri = org.apache.xalan.templates.Constants.S_XMLNAMESPACEURI;
}
String attrLocalName = attributes.getLocalName(i);
XSLTAttributeDef attrDef = def.getAttributeDef(attrUri, attrLocalName);
if (null == attrDef)
{
if (!isCompatibleMode)
{
// Then barf, because this element does not allow this attribute.
handler.error(XSLTErrorResources.ER_ATTR_NOT_ALLOWED, new Object[]{attributes.getQName(i), rawName}, null);//""\""""+attributes.getQName(i)+""\""""
//+ "" attribute is not allowed on the "" + rawName
// + "" element!"", null);
}
else
{
undefines.addAttribute(attrUri, attrLocalName,
attributes.getQName(i),
attributes.getType(i),
attributes.getValue(i));
}
}
else
{
//handle secure processing
if(handler.getStylesheetProcessor()==null)
System.out.println(""stylesheet processor null"");
if(attrDef.getName().compareTo(""*"")==0 && handler.getStylesheetProcessor().isSecureProcessing())
{
//foreign attributes are not allowed in secure processing mode
// Then barf, because this element does not allow this attribute.
handler.error(XSLTErrorResources.ER_ATTR_NOT_ALLOWED, new Object[]{attributes.getQName(i), rawName}, null);//""\""""+attributes.getQName(i)+""\""""
//+ "" attribute is not allowed on the "" + rawName
// + "" element!"", null);
}
else
{
boolean success = attrDef.setAttrValue(handler, attrUri, attrLocalName,
attributes.getQName(i), attributes.getValue(i),
target);
// Now we only add the element if it passed a validation check
if (success)
processedDefs.add(attrDef);
else
errorDefs.add(attrDef);
}
}
}
XSLTAttributeDef[] attrDefs = def.getAttributes();
int nAttrDefs = attrDefs.length;
for (int i = 0; i < nAttrDefs; i++)
{
XSLTAttributeDef attrDef = attrDefs[i];
String defVal = attrDef.getDefault();
if (null != defVal)
{
if (!processedDefs.contains(attrDef))
{
attrDef.setDefAttrValue(handler, target);
}
}
if (attrDef.getRequired())
{
if ((!processedDefs.contains(attrDef)) && (!errorDefs.contains(attrDef)))
handler.error(
XSLMessages.createMessage(
XSLTErrorResources.ER_REQUIRES_ATTRIB, new Object[]{ rawName,
attrDef.getName() }), null);
}
}
return undefines;
}
"
78,0," public static void beforeClass() throws Exception {
SUITE_SEED = randomLong();
initializeSuiteScope();
}
"
79,0," public void connect(HttpConsumer consumer) throws Exception {
}
/**
* Disconnects the URL specified on the endpoint from the specified processor.
*
* @param consumer the consumer
* @throws Exception can be thrown
*/
"
80,0," private void writeAttribute(SessionAttribute sessionAttribute) throws IOException {
write(""<td>"");
writeDirectly(htmlEncodeButNotSpace(sessionAttribute.getName()));
write(""</td><td>"");
write(String.valueOf(sessionAttribute.getType()));
write(""</td><td align='center'>"");
if (sessionAttribute.isSerializable()) {
write(""#oui#"");
} else {
write(""<span class='severe'>#non#</span>"");
}
write(""</td><td align='right'>"");
write(integerFormat.format(sessionAttribute.getSerializedSize()));
write(""</td><td>"");
writeDirectly(htmlEncodeButNotSpace(String.valueOf(sessionAttribute.getContent())));
write(""</td>"");
}
"
81,0," public boolean isUseRouteBuilder() {
return false;
}
@Test
@Ignore
"
82,0," public String getDisplayName() {
return ""Developers"";
}
}
}
"
83,0," private <T> T run(PrivilegedExceptionAction<T> action) throws JAXBException {
try {
return System.getSecurityManager() != null ? AccessController.doPrivileged( action ) : action.run();
}
catch ( JAXBException e ) {
throw e;
}
catch ( Exception e ) {
throw log.getErrorParsingMappingFileException( e );
}
}
// JAXB closes the underlying input stream
"
84,0," protected void checkIllegalTypes(DeserializationContext ctxt, JavaType type,
BeanDescription beanDesc)
throws JsonMappingException
{
// There are certain nasty classes that could cause problems, mostly
// via default typing -- catch them here.
String full = type.getRawClass().getName();
if (_cfgIllegalClassNames.contains(full)) {
throw JsonMappingException.from(ctxt,
String.format(""Illegal type (%s) to deserialize: prevented for security reasons"", full));
}
}
"
85,0," public FileVisitResult postVisitDirectory(Path dir, IOException ioe)
throws IOException {
// NO-OP
return FileVisitResult.CONTINUE;
}});
}
}
"
86,0," public JettyHttpEndpoint getEndpoint() {
return (JettyHttpEndpoint) super.getEndpoint();
}
"
87,0," public static File randomRepoPath(Settings settings) {
Environment environment = new Environment(settings);
File[] repoFiles = environment.repoFiles();
assert repoFiles.length > 0;
File path;
do {
path = new File(repoFiles[0], randomAsciiOfLength(10));
} while (path.exists());
return path;
}
"
88,0," public void setup() {
this.request = new MockHttpServletRequest();
this.request.setMethod(""GET"");
this.response = new MockHttpServletResponse();
this.chain = new MockFilterChain();
}
@After
"
89,0," public static Context getCurrentContext()
{
return __context.get();
}
"
90,0," protected Log getLog() {
return log;
}
// ----------------------------------------------------------- Constructors
"
91,0," protected void checkIllegalTypes(DeserializationContext ctxt, JavaType type,
BeanDescription beanDesc)
throws JsonMappingException
{
// There are certain nasty classes that could cause problems, mostly
// via default typing -- catch them here.
String full = type.getRawClass().getName();
if (_cfgIllegalClassNames.contains(full)) {
ctxt.reportBadTypeDefinition(beanDesc,
""Illegal type (%s) to deserialize: prevented for security reasons"", full);
}
}
"
92,0," public String toString() {
return xpathExpression;
}
"
93,0," protected void setLocale(HttpServletRequest request) {
if (defaultLocale == null) {
defaultLocale = request.getLocale();
}
}
"
94,0," protected boolean isWithinLengthLimit( String name ) {
return name.length() <= paramNameMaxLength;
}
"
95,0," private CoderResult decodeHasArray(ByteBuffer in, CharBuffer out) {
int outRemaining = out.remaining();
int pos = in.position();
int limit = in.limit();
final byte[] bArr = in.array();
final char[] cArr = out.array();
final int inIndexLimit = limit + in.arrayOffset();
int inIndex = pos + in.arrayOffset();
int outIndex = out.position() + out.arrayOffset();
// if someone would change the limit in process,
// he would face consequences
for (; inIndex < inIndexLimit && outRemaining > 0; inIndex++) {
int jchar = bArr[inIndex];
if (jchar < 0) {
jchar = jchar & 0x7F;
int tail = remainingBytes[jchar];
if (tail == -1) {
in.position(inIndex - in.arrayOffset());
out.position(outIndex - out.arrayOffset());
return CoderResult.malformedForLength(1);
}
if (inIndexLimit - inIndex < 1 + tail) {
// Apache Tomcat added tests - detect invalid sequences as
// early as possible
if (jchar == 0x74 && inIndexLimit > inIndex + 1) {
if ((bArr[inIndex + 1] & 0xFF) > 0x8F) {
// 11110100 1yyyxxxx xxxxxxxx xxxxxxxx
// Any non-zero y is > max code point
return CoderResult.unmappableForLength(4);
}
}
if (jchar == 0x60 && inIndexLimit > inIndex +1) {
if ((bArr[inIndex + 1] & 0x7F) == 0) {
// 11100000 10000000 10xxxxxx
// should have been
// 00xxxxxx
return CoderResult.malformedForLength(3);
}
}
if (jchar == 0x70 && inIndexLimit > inIndex +1) {
if ((bArr[inIndex + 1] & 0x7F) < 0x10) {
// 11110000 1000zzzz 1oyyyyyy 1oxxxxxx
// should have been
// 111ozzzz 1oyyyyyy 1oxxxxxx
return CoderResult.malformedForLength(4);
}
}
break;
}
for (int i = 0; i < tail; i++) {
int nextByte = bArr[inIndex + i + 1] & 0xFF;
if ((nextByte & 0xC0) != 0x80) {
in.position(inIndex - in.arrayOffset());
out.position(outIndex - out.arrayOffset());
return CoderResult.malformedForLength(1 + i);
}
jchar = (jchar << 6) + nextByte;
}
jchar -= remainingNumbers[tail];
if (jchar < lowerEncodingLimit[tail]) {
// Should have been encoded in fewer octets
in.position(inIndex - in.arrayOffset());
out.position(outIndex - out.arrayOffset());
return CoderResult.malformedForLength(1);
}
inIndex += tail;
}
// Apache Tomcat added test
if (jchar >= 0xD800 && jchar <= 0xDFFF) {
return CoderResult.unmappableForLength(3);
}
// Apache Tomcat added test
if (jchar > 0x10FFFF) {
return CoderResult.unmappableForLength(4);
}
if (jchar <= 0xffff) {
cArr[outIndex++] = (char) jchar;
outRemaining--;
} else {
if (outRemaining < 2) {
return CoderResult.OVERFLOW;
}
cArr[outIndex++] = (char) ((jchar >> 0xA) + 0xD7C0);
cArr[outIndex++] = (char) ((jchar & 0x3FF) + 0xDC00);
outRemaining -= 2;
}
}
in.position(inIndex - in.arrayOffset());
out.position(outIndex - out.arrayOffset());
return (outRemaining == 0 && inIndex < inIndexLimit) ? CoderResult.OVERFLOW
: CoderResult.UNDERFLOW;
}
"
96,0," public static CipherText fromPortableSerializedBytes(byte[] bytes)
throws EncryptionException
{
CipherTextSerializer cts = new CipherTextSerializer(bytes);
return cts.asCipherText();
}
///////////////////////// P U B L I C M E T H O D S ////////////////////
/**
* Obtain the String representing the cipher transformation used to encrypt
* the plaintext. The cipher transformation represents the cipher algorithm,
* the cipher mode, and the padding scheme used to do the encryption. An
* example would be ""AES/CBC/PKCS5Padding"". See Appendix A in the
* <a href=""http://java.sun.com/javase/6/docs/technotes/guides/security/crypto/CryptoSpec.html#AppA"">
* Java Cryptography Architecture Reference Guide</a>
* for information about standard supported cipher transformation names.
* <p>
* The cipher transformation name is usually sufficient to be passed to
* {@link javax.crypto.Cipher#getInstance(String)} to create a
* <code>Cipher</code> object to decrypt the ciphertext.
*
* @return The cipher transformation name used to encrypt the plaintext
* resulting in this ciphertext.
*/
"
97,0," protected void _verifyException(Throwable t, Class<?> expExcType,
String... patterns) throws Exception
{
Class<?> actExc = t.getClass();
if (!expExcType.isAssignableFrom(actExc)) {
fail(""Expected Exception of type '""+expExcType.getName()+""', got '""
+actExc.getName()+""', message: ""+t.getMessage());
}
for (String pattern : patterns) {
verifyException(t, pattern);
}
}
"
98,0," public String getCompression() {
switch (compressionLevel) {
case 0:
return ""off"";
case 1:
return ""on"";
case 2:
return ""force"";
}
return ""off"";
}
/**
* Set compression level.
*/
"
99,0," public void close() throws IOException {
if (authFilter != null) {
authFilter.destroy();
}
}
"
100,0," public void destroy() {
}
};
"
101,0," public O getOrBuild() {
if (isUnbuilt()) {
try {
return build();
}
catch (Exception e) {
logger.debug(""Failed to perform build. Returning null"", e);
return null;
}
}
else {
return getObject();
}
}
/**
* Applies a {@link SecurityConfigurerAdapter} to this {@link SecurityBuilder} and
* invokes {@link SecurityConfigurerAdapter#setBuilder(SecurityBuilder)}.
*
* @param configurer
* @return
* @throws Exception
*/
@SuppressWarnings(""unchecked"")
"
102,0," private void testModified()
throws Exception
{
ECNamedCurveParameterSpec namedCurve = ECNamedCurveTable.getParameterSpec(""P-256"");
org.bouncycastle.jce.spec.ECPublicKeySpec pubSpec = new org.bouncycastle.jce.spec.ECPublicKeySpec(namedCurve.getCurve().createPoint(PubX, PubY), namedCurve);
KeyFactory kFact = KeyFactory.getInstance(""EC"", ""BC"");
PublicKey pubKey = kFact.generatePublic(pubSpec);
Signature sig = Signature.getInstance(""SHA256WithECDSA"", ""BC"");
for (int i = 0; i != MODIFIED_SIGNATURES.length; i++)
{
sig.initVerify(pubKey);
sig.update(Strings.toByteArray(""Hello""));
boolean failed;
try
{
failed = !sig.verify(Hex.decode(MODIFIED_SIGNATURES[i]));
System.err.println(ASN1Dump.dumpAsString(ASN1Primitive.fromByteArray(Hex.decode(MODIFIED_SIGNATURES[i]))));
}
catch (SignatureException e)
{
failed = true;
}
isTrue(""sig verified when shouldn't: "" + i, failed);
}
}
"
103,0," protected void populateParams() {
super.populateParams();
UIBean uiBean = (UIBean) component;
uiBean.setCssClass(cssClass);
uiBean.setCssStyle(cssStyle);
uiBean.setCssErrorClass(cssErrorClass);
uiBean.setCssErrorStyle(cssErrorStyle);
uiBean.setTitle(title);
uiBean.setDisabled(disabled);
uiBean.setLabel(label);
uiBean.setLabelSeparator(labelSeparator);
uiBean.setLabelposition(labelposition);
uiBean.setRequiredPosition(requiredPosition);
uiBean.setErrorPosition(errorPosition);
uiBean.setName(name);
uiBean.setRequiredLabel(requiredLabel);
uiBean.setTabindex(tabindex);
uiBean.setValue(value);
uiBean.setTemplate(template);
uiBean.setTheme(theme);
uiBean.setTemplateDir(templateDir);
uiBean.setOnclick(onclick);
uiBean.setOndblclick(ondblclick);
uiBean.setOnmousedown(onmousedown);
uiBean.setOnmouseup(onmouseup);
uiBean.setOnmouseover(onmouseover);
uiBean.setOnmousemove(onmousemove);
uiBean.setOnmouseout(onmouseout);
uiBean.setOnfocus(onfocus);
uiBean.setOnblur(onblur);
uiBean.setOnkeypress(onkeypress);
uiBean.setOnkeydown(onkeydown);
uiBean.setOnkeyup(onkeyup);
uiBean.setOnselect(onselect);
uiBean.setOnchange(onchange);
uiBean.setTooltip(tooltip);
uiBean.setTooltipConfig(tooltipConfig);
uiBean.setJavascriptTooltip(javascriptTooltip);
uiBean.setTooltipCssClass(tooltipCssClass);
uiBean.setTooltipDelay(tooltipDelay);
uiBean.setTooltipIconPath(tooltipIconPath);
uiBean.setAccesskey(accesskey);
uiBean.setKey(key);
uiBean.setId(id);
uiBean.setDynamicAttributes(dynamicAttributes);
}
"
104,0," public long getTimestamp() {
return timestamp;
}
}
}
"
105,0," public boolean isUseRouteBuilder() {
return false;
}
@Test
"
106,0," public ServerSocket createSocket (int port, int backlog,
InetAddress ifAddress)
throws IOException
{
if (!initialized) init();
ServerSocket socket = sslProxy.createServerSocket(port, backlog,
ifAddress);
initServerSocket(socket);
return socket;
}
"
107,0," public static void init() throws Exception {
idpHttpsPort = System.getProperty(""idp.https.port"");
Assert.assertNotNull(""Property 'idp.https.port' null"", idpHttpsPort);
rpHttpsPort = System.getProperty(""rp.https.port"");
Assert.assertNotNull(""Property 'rp.https.port' null"", rpHttpsPort);
idpServer = startServer(true, idpHttpsPort);
WSSConfig.init();
}
"
108,0," public void testPrivateKeySerialisation()
throws Exception
{
String stream = ""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"";
XMSSParameters params = new XMSSParameters(10, new SHA256Digest());
byte[] output = Base64.decode(new String(stream).getBytes(""UTF-8""));
//Simple Exploit
try
{
new XMSSPrivateKeyParameters.Builder(params).withPrivateKey(output, params).build();
}
catch (IllegalArgumentException e)
{
assertTrue(e.getCause() instanceof IOException);
}
//Same Exploit other method
XMSS xmss2 = new XMSS(params, new SecureRandom());
xmss2.generateKeys();
byte[] publicKey = xmss2.exportPublicKey();
try
{
xmss2.importState(output, publicKey);
}
catch (IllegalArgumentException e)
{
assertTrue(e.getCause() instanceof IOException);
}
}
"
109,0," public void setAllowJavaSerializedObject(boolean allowJavaSerializedObject) {
this.allowJavaSerializedObject = allowJavaSerializedObject;
}
"
110,0," public Collection<ResourcePermission> getRequiredPermissions(String regionName) {
return Collections.singletonList(new ResourcePermission(ResourcePermission.Resource.DATA,
ResourcePermission.Operation.READ, regionName));
}
"
111,0," abstract protected JDBCTableReader getTableReader(Connection connection,
String tableName,
EmbeddedDocumentUtil embeddedDocumentUtil);
"
112,0," public FederationConfig getFederationConfig() {
return federationConfig;
}
"
113,0," protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain filterChain)
throws ServletException, IOException {
String identityZoneId = request.getHeader(HEADER);
if (StringUtils.hasText(identityZoneId)) {
if (!isAuthorizedToSwitchToIdentityZone(identityZoneId)) {
response.sendError(HttpServletResponse.SC_FORBIDDEN, ""User is not authorized to switch to IdentityZone with id ""+identityZoneId);
return;
}
IdentityZone originalIdentityZone = IdentityZoneHolder.get();
try {
IdentityZone identityZone = null;
try {
identityZone = dao.retrieve(identityZoneId);
} catch (ZoneDoesNotExistsException ex) {
} catch (EmptyResultDataAccessException ex) {
} catch (Exception ex) {
throw ex;
}
if (identityZone == null) {
response.sendError(HttpServletResponse.SC_NOT_FOUND, ""Identity zone with id ""+identityZoneId+"" does not exist"");
return;
}
stripScopesFromAuthentication(identityZoneId, request);
IdentityZoneHolder.set(identityZone);
filterChain.doFilter(request, response);
} finally {
IdentityZoneHolder.set(originalIdentityZone);
}
} else {
filterChain.doFilter(request, response);
}
}
"
114,0," public BeanDefinition createMatcher(ParserContext pc, String path, String method) {
if ((""/**"".equals(path) || ""**"".equals(path)) && method == null) {
return new RootBeanDefinition(AnyRequestMatcher.class);
}
BeanDefinitionBuilder matcherBldr = BeanDefinitionBuilder
.rootBeanDefinition(type);
if (this == mvc) {
if (!pc.getRegistry().isBeanNameInUse(HANDLER_MAPPING_INTROSPECTOR_BEAN_NAME)) {
BeanDefinitionBuilder hmifb = BeanDefinitionBuilder
.rootBeanDefinition(HandlerMappingIntrospectorFactoryBean.class);
pc.getRegistry().registerBeanDefinition(HANDLER_MAPPING_INTROSPECTOR_FACTORY_BEAN_NAME,
hmifb.getBeanDefinition());
RootBeanDefinition hmi = new RootBeanDefinition(HANDLER_MAPPING_INTROSPECTOR_BEAN_NAME);
hmi.setFactoryBeanName(HANDLER_MAPPING_INTROSPECTOR_FACTORY_BEAN_NAME);
hmi.setFactoryMethodName(""createHandlerMappingIntrospector"");
pc.getRegistry().registerBeanDefinition(HANDLER_MAPPING_INTROSPECTOR_BEAN_NAME, hmi);
}
matcherBldr.addConstructorArgReference(HANDLER_MAPPING_INTROSPECTOR_BEAN_NAME);
}
matcherBldr.addConstructorArgValue(path);
if (this == mvc) {
matcherBldr.addPropertyValue(""method"", method);
}
else {
matcherBldr.addConstructorArgValue(method);
}
if (this == ciRegex) {
matcherBldr.addConstructorArgValue(true);
}
return matcherBldr.getBeanDefinition();
}
"
115,0," protected Settings nodeSettings(int nodeOrdinal) {
return ImmutableSettings.builder()
// we really need local GW here since this also checks for corruption etc.
// and we need to make sure primaries are not just trashed if we don't have replicas
.put(super.nodeSettings(nodeOrdinal)).put(""gateway.type"", ""local"")
.put(TransportModule.TRANSPORT_SERVICE_TYPE_KEY, MockTransportService.class.getName())
// speed up recoveries
.put(RecoverySettings.INDICES_RECOVERY_CONCURRENT_STREAMS, 10)
.put(RecoverySettings.INDICES_RECOVERY_CONCURRENT_SMALL_FILE_STREAMS, 10)
.put(ThrottlingAllocationDecider.CLUSTER_ROUTING_ALLOCATION_NODE_CONCURRENT_RECOVERIES, 5)
.build();
}
/**
* Tests that we can actually recover from a corruption on the primary given that we have replica shards around.
*/
@Test
"
116,0," private void writeFederationMetadata(
XMLStreamWriter writer, Idp config, Crypto crypto
) throws XMLStreamException {
writer.writeStartElement(""md"", ""RoleDescriptor"", WS_FEDERATION_NS);
writer.writeAttribute(SCHEMA_INSTANCE_NS, ""type"", ""fed:SecurityTokenServiceType"");
writer.writeAttribute(""protocolSupportEnumeration"", WS_FEDERATION_NS);
if (config.getServiceDescription() != null && config.getServiceDescription().length() > 0 ) {
writer.writeAttribute(""ServiceDescription"", config.getServiceDescription());
}
if (config.getServiceDisplayName() != null && config.getServiceDisplayName().length() > 0 ) {
writer.writeAttribute(""ServiceDisplayName"", config.getServiceDisplayName());
}
//http://docs.oasis-open.org/security/saml/v2.0/saml-schema-metadata-2.0.xsd
//missing organization, contactperson
//KeyDescriptor
writer.writeStartElement("""", ""KeyDescriptor"", SAML2_METADATA_NS);
writer.writeAttribute(""use"", ""signing"");
writer.writeStartElement("""", ""KeyInfo"", ""http://www.w3.org/2000/09/xmldsig#"");
writer.writeStartElement("""", ""X509Data"", ""http://www.w3.org/2000/09/xmldsig#"");
writer.writeStartElement("""", ""X509Certificate"", ""http://www.w3.org/2000/09/xmldsig#"");
try {
String keyAlias = crypto.getDefaultX509Identifier();
X509Certificate cert = CertsUtils.getX509Certificate(crypto, keyAlias);
writer.writeCharacters(Base64.encode(cert.getEncoded()));
} catch (Exception ex) {
LOG.error(""Failed to add certificate information to metadata. Metadata incomplete"", ex);
}
writer.writeEndElement(); // X509Certificate
writer.writeEndElement(); // X509Data
writer.writeEndElement(); // KeyInfo
writer.writeEndElement(); // KeyDescriptor
// SecurityTokenServiceEndpoint
writer.writeStartElement(""fed"", ""SecurityTokenServiceEndpoint"", WS_FEDERATION_NS);
writer.writeStartElement(""wsa"", ""EndpointReference"", WS_ADDRESSING_NS);
writer.writeStartElement(""wsa"", ""Address"", WS_ADDRESSING_NS);
writer.writeCharacters(config.getStsUrl().toString());
writer.writeEndElement(); // Address
writer.writeEndElement(); // EndpointReference
writer.writeEndElement(); // SecurityTokenServiceEndpoint
// PassiveRequestorEndpoint
writer.writeStartElement(""fed"", ""PassiveRequestorEndpoint"", WS_FEDERATION_NS);
writer.writeStartElement(""wsa"", ""EndpointReference"", WS_ADDRESSING_NS);
writer.writeStartElement(""wsa"", ""Address"", WS_ADDRESSING_NS);
writer.writeCharacters(config.getIdpUrl().toString());
writer.writeEndElement(); // Address
writer.writeEndElement(); // EndpointReference
writer.writeEndElement(); // PassiveRequestorEndpoint
// create ClaimsType section
if (config.getClaimTypesOffered() != null && config.getClaimTypesOffered().size() > 0) {
writer.writeStartElement(""fed"", ""ClaimTypesOffered"", WS_FEDERATION_NS);
for (Claim claim : config.getClaimTypesOffered()) {
writer.writeStartElement(""auth"", ""ClaimType"", WS_FEDERATION_NS);
writer.writeAttribute(""Uri"", claim.getClaimType().toString());
writer.writeAttribute(""Optional"", ""true"");
writer.writeEndElement(); // ClaimType
}
writer.writeEndElement(); // ClaimTypesOffered
}
writer.writeEndElement(); // RoleDescriptor
}
"
117,0," public Set<MediaType> getSupportedTypes(ParseContext context) {
return null;
}
@Override
"
118,0," public Container getContainer() {
return (container);
}
/**
* Set the Container with which this Realm has been associated.
*
* @param container The associated Container
*/
"
119,0," public Set<MediaType> getSupportedTypes(ParseContext context) {
return null;
}
@Override
"
120,0," public void testSendEntityMessage() throws Exception {
MockEndpoint endpoint = getMockEndpoint(""mock:result"");
endpoint.expectedMessageCount(1);
//String message = ""<!DOCTYPE foo [<!ENTITY xxe SYSTEM \""file:///Users//jiangning//.CFUserTextEncoding\"">]><task><name>&xxe;</name></task>"";
String message = ""<hello/>"";
template.sendBody(""direct:start2"", message);
assertMockEndpointsSatisfied();
List<Exchange> list = endpoint.getReceivedExchanges();
Exchange exchange = list.get(0);
String xml = exchange.getIn().getBody(String.class);
System.out.println(xml);
}
"
121,0," public void execute(FunctionContext context) {
RegionFunctionContext rfc = (RegionFunctionContext) context;
context.getResultSender().lastResult(rfc.getDataSet().size());
}
@Override
"
122,0," public DescriptorImpl getDescriptor() {
return Hudson.getInstance().getDescriptorByType(DescriptorImpl.class);
}
/**
* Returns the Missed Events playback manager.
* @return GerritMissedEventsPlaybackManager
*/
"
123,0," public void setAllowJavaSerializedObject(boolean allowJavaSerializedObject) {
this.allowJavaSerializedObject = allowJavaSerializedObject;
}
"
124,0," public int doRead(ByteChunk chunk, Request req) throws IOException {
checkError();
if (endChunk) {
return -1;
}
if(needCRLFParse) {
needCRLFParse = false;
parseCRLF(false);
}
if (remaining <= 0) {
if (!parseChunkHeader()) {
throwIOException(sm.getString(""chunkedInputFilter.invalidHeader""));
}
if (endChunk) {
parseEndChunk();
return -1;
}
}
int result = 0;
if (pos >= lastValid) {
if (readBytes() < 0) {
throwIOException(sm.getString(""chunkedInputFilter.eos""));
}
}
if (remaining > (lastValid - pos)) {
result = lastValid - pos;
remaining = remaining - result;
chunk.setBytes(buf, pos, result);
pos = lastValid;
} else {
result = remaining;
chunk.setBytes(buf, pos, remaining);
pos = pos + remaining;
remaining = 0;
//we need a CRLF
if ((pos+1) >= lastValid) {
//if we call parseCRLF we overrun the buffer here
//so we defer it to the next call BZ 11117
needCRLFParse = true;
} else {
parseCRLF(false); //parse the CRLF immediately
}
}
return result;
}
// ---------------------------------------------------- InputFilter Methods
/**
* Read the content length from the request.
*/
@Override
"
125,0," public byte getValue() { return value; }
"
126,0," public final Permission getRequiredPermission() {
return Jenkins.ADMINISTER;
}
/**
* Starts the server's project list updater, send command queue and event manager.
*
*/
"
127,0," public Object compile(String expression, Map<String, Object> context) throws OgnlException {
Object tree;
if (enableExpressionCache) {
tree = expressions.get(expression);
if (tree == null) {
tree = Ognl.parseExpression(expression);
expressions.putIfAbsent(expression, tree);
}
} else {
tree = Ognl.parseExpression(expression);
}
if (!enableEvalExpression && isEvalExpression(tree, context)) {
throw new OgnlException(""Eval expressions has been disabled"");
}
return tree;
}
/**
* Copies the properties in the object ""from"" and sets them in the object ""to""
* using specified type converter, or {@link com.opensymphony.xwork2.conversion.impl.XWorkConverter} if none
* is specified.
*
* @param from the source object
* @param to the target object
* @param context the action context we're running under
* @param exclusions collection of method names to excluded from copying ( can be null)
* @param inclusions collection of method names to included copying (can be null)
* note if exclusions AND inclusions are supplied and not null nothing will get copied.
*/
"
128,0," public SolrInputDocument readDoc(XMLStreamReader parser) throws XMLStreamException {
SolrInputDocument doc = new SolrInputDocument();
String attrName = """";
for (int i = 0; i < parser.getAttributeCount(); i++) {
attrName = parser.getAttributeLocalName(i);
if (""boost"".equals(attrName)) {
doc.setDocumentBoost(Float.parseFloat(parser.getAttributeValue(i)));
} else {
log.warn(""Unknown attribute doc/@"" + attrName);
}
}
StringBuilder text = new StringBuilder();
String name = null;
float boost = 1.0f;
boolean isNull = false;
String update = null;
while (true) {
int event = parser.next();
switch (event) {
// Add everything to the text
case XMLStreamConstants.SPACE:
case XMLStreamConstants.CDATA:
case XMLStreamConstants.CHARACTERS:
text.append(parser.getText());
break;
case XMLStreamConstants.END_ELEMENT:
if (""doc"".equals(parser.getLocalName())) {
return doc;
} else if (""field"".equals(parser.getLocalName())) {
Object v = isNull ? null : text.toString();
if (update != null) {
Map<String,Object> extendedValue = new HashMap<String,Object>(1);
extendedValue.put(update, v);
v = extendedValue;
}
doc.addField(name, v, boost);
boost = 1.0f;
}
break;
case XMLStreamConstants.START_ELEMENT:
text.setLength(0);
String localName = parser.getLocalName();
if (!""field"".equals(localName)) {
log.warn(""unexpected XML tag doc/"" + localName);
throw new SolrException(SolrException.ErrorCode.BAD_REQUEST,
""unexpected XML tag doc/"" + localName);
}
boost = 1.0f;
update = null;
String attrVal = """";
for (int i = 0; i < parser.getAttributeCount(); i++) {
attrName = parser.getAttributeLocalName(i);
attrVal = parser.getAttributeValue(i);
if (""name"".equals(attrName)) {
name = attrVal;
} else if (""boost"".equals(attrName)) {
boost = Float.parseFloat(attrVal);
} else if (""null"".equals(attrName)) {
isNull = StrUtils.parseBoolean(attrVal);
} else if (""update"".equals(attrName)) {
update = attrVal;
} else {
log.warn(""Unknown attribute doc/field/@"" + attrName);
}
}
break;
}
}
}
"
129,0," private AsymmetricCipherKeyPair genKeyPair()
{
if (!initialized)
{
initializeDefault();
}
// initialize authenticationPaths and treehash instances
byte[][][] currentAuthPaths = new byte[numLayer][][];
byte[][][] nextAuthPaths = new byte[numLayer - 1][][];
Treehash[][] currentTreehash = new Treehash[numLayer][];
Treehash[][] nextTreehash = new Treehash[numLayer - 1][];
Vector[] currentStack = new Vector[numLayer];
Vector[] nextStack = new Vector[numLayer - 1];
Vector[][] currentRetain = new Vector[numLayer][];
Vector[][] nextRetain = new Vector[numLayer - 1][];
for (int i = 0; i < numLayer; i++)
{
currentAuthPaths[i] = new byte[heightOfTrees[i]][mdLength];
currentTreehash[i] = new Treehash[heightOfTrees[i] - K[i]];
if (i > 0)
{
nextAuthPaths[i - 1] = new byte[heightOfTrees[i]][mdLength];
nextTreehash[i - 1] = new Treehash[heightOfTrees[i] - K[i]];
}
currentStack[i] = new Vector();
if (i > 0)
{
nextStack[i - 1] = new Vector();
}
}
// initialize roots
byte[][] currentRoots = new byte[numLayer][mdLength];
byte[][] nextRoots = new byte[numLayer - 1][mdLength];
// initialize seeds
byte[][] seeds = new byte[numLayer][mdLength];
// initialize seeds[] by copying starting-seeds of first trees of each
// layer
for (int i = 0; i < numLayer; i++)
{
System.arraycopy(currentSeeds[i], 0, seeds[i], 0, mdLength);
}
// initialize rootSigs
currentRootSigs = new byte[numLayer - 1][mdLength];
// -------------------------
// -------------------------
// --- calculation of current authpaths and current rootsigs (AUTHPATHS,
// SIG)------
// from bottom up to the root
for (int h = numLayer - 1; h >= 0; h--)
{
GMSSRootCalc tree;
// on lowest layer no lower root is available, so just call
// the method with null as first parameter
if (h == numLayer - 1)
{
tree = this.generateCurrentAuthpathAndRoot(null, currentStack[h], seeds[h], h);
}
else
// otherwise call the method with the former computed root
// value
{
tree = this.generateCurrentAuthpathAndRoot(currentRoots[h + 1], currentStack[h], seeds[h], h);
}
// set initial values needed for the private key construction
for (int i = 0; i < heightOfTrees[h]; i++)
{
System.arraycopy(tree.getAuthPath()[i], 0, currentAuthPaths[h][i], 0, mdLength);
}
currentRetain[h] = tree.getRetain();
currentTreehash[h] = tree.getTreehash();
System.arraycopy(tree.getRoot(), 0, currentRoots[h], 0, mdLength);
}
// --- calculation of next authpaths and next roots (AUTHPATHS+, ROOTS+)
// ------
for (int h = numLayer - 2; h >= 0; h--)
{
GMSSRootCalc tree = this.generateNextAuthpathAndRoot(nextStack[h], seeds[h + 1], h + 1);
// set initial values needed for the private key construction
for (int i = 0; i < heightOfTrees[h + 1]; i++)
{
System.arraycopy(tree.getAuthPath()[i], 0, nextAuthPaths[h][i], 0, mdLength);
}
nextRetain[h] = tree.getRetain();
nextTreehash[h] = tree.getTreehash();
System.arraycopy(tree.getRoot(), 0, nextRoots[h], 0, mdLength);
// create seed for the Merkle tree after next (nextNextSeeds)
// SEEDs++
System.arraycopy(seeds[h + 1], 0, this.nextNextSeeds[h], 0, mdLength);
}
// ------------
// generate JDKGMSSPublicKey
GMSSPublicKeyParameters publicKey = new GMSSPublicKeyParameters(currentRoots[0], gmssPS);
// generate the JDKGMSSPrivateKey
GMSSPrivateKeyParameters privateKey = new GMSSPrivateKeyParameters(currentSeeds, nextNextSeeds, currentAuthPaths,
nextAuthPaths, currentTreehash, nextTreehash, currentStack, nextStack, currentRetain, nextRetain, nextRoots, currentRootSigs, gmssPS, digestProvider);
// return the KeyPair
return (new AsymmetricCipherKeyPair(publicKey, privateKey));
}
/**
* calculates the authpath for tree in layer h which starts with seed[h]
* additionally computes the rootSignature of underlaying root
*
* @param currentStack stack used for the treehash instance created by this method
* @param lowerRoot stores the root of the lower tree
* @param seed starting seeds
* @param h actual layer
*/
"
130,0," public static void redirectToSavedRequest(ServletRequest request, ServletResponse response, String fallbackUrl)
throws IOException {
String successUrl = null;
boolean contextRelative = true;
SavedRequest savedRequest = WebUtils.getAndClearSavedRequest(request);
if (savedRequest != null && savedRequest.getMethod().equalsIgnoreCase(AccessControlFilter.GET_METHOD)) {
successUrl = savedRequest.getRequestUrl();
contextRelative = false;
}
if (successUrl == null) {
successUrl = fallbackUrl;
}
if (successUrl == null) {
throw new IllegalStateException(""Success URL not available via saved request or via the "" +
""successUrlFallback method parameter. One of these must be non-null for "" +
""issueSuccessRedirect() to work."");
}
WebUtils.issueRedirect(request, response, successUrl, null, contextRelative);
}
"
131,0," private void doTestRewrite(String config, String request, String expectedURI) throws Exception {
Tomcat tomcat = getTomcatInstance();
// No file system docBase required
Context ctx = tomcat.addContext("""", null);
RewriteValve rewriteValve = new RewriteValve();
ctx.getPipeline().addValve(rewriteValve);
rewriteValve.setConfiguration(config);
// Note: URLPatterns should be URL encoded
// (http://svn.apache.org/r285186)
Tomcat.addServlet(ctx, ""snoop"", new SnoopServlet());
ctx.addServletMapping(""/a/%255A"", ""snoop"");
ctx.addServletMapping(""/c/*"", ""snoop"");
Tomcat.addServlet(ctx, ""default"", new DefaultServlet());
ctx.addServletMapping(""/"", ""default"");
tomcat.start();
ByteChunk res = getUrl(""http://localhost:"" + getPort() + request);
String body = res.toString();
RequestDescriptor requestDesc = SnoopResult.parse(body);
String requestURI = requestDesc.getRequestInfo(""REQUEST-URI"");
Assert.assertEquals(expectedURI, requestURI);
}
"
132,0," protected void setLocation(String location) {
this.location = location;
}
"
133,0," protected String adjustFilterForJoin(String filter) {
if (StringUtils.hasText(filter)) {
filter = filter.replace(""displayName"", ""g.displayName"");
filter = filter.replace(""externalGroup"", ""gm.external_group"");
filter = filter.replace(""groupId"", ""g.id"");
filter = filter.replace(""origin"", ""gm.origin"");
}
return filter;
}
@Override
"
134,0," private static void disableFeature(DocumentBuilderFactory dbfactory, String feature) {
try {
dbfactory.setFeature(feature, true);
} catch (ParserConfigurationException e) {
// This should catch a failed setFeature feature
log.info(""ParserConfigurationException was thrown. The feature '"" +
feature + ""' is probably not supported by your XML processor."");
}
}
"
135,0," private static LinkedHashMap<RequestMatcher, Collection<ConfigAttribute>> processMap(
LinkedHashMap<RequestMatcher, Collection<ConfigAttribute>> requestMap,
ExpressionParser parser) {
Assert.notNull(parser, ""SecurityExpressionHandler returned a null parser object"");
LinkedHashMap<RequestMatcher, Collection<ConfigAttribute>> requestToExpressionAttributesMap = new LinkedHashMap<RequestMatcher, Collection<ConfigAttribute>>(
requestMap);
for (Map.Entry<RequestMatcher, Collection<ConfigAttribute>> entry : requestMap
.entrySet()) {
RequestMatcher request = entry.getKey();
Assert.isTrue(entry.getValue().size() == 1,
""Expected a single expression attribute for "" + request);
ArrayList<ConfigAttribute> attributes = new ArrayList<ConfigAttribute>(1);
String expression = entry.getValue().toArray(new ConfigAttribute[1])[0]
.getAttribute();
logger.debug(""Adding web access control expression '"" + expression + ""', for ""
+ request);
AbstractVariableEvaluationContextPostProcessor postProcessor = createPostProcessor(
request);
try {
attributes.add(new WebExpressionConfigAttribute(
parser.parseExpression(expression), postProcessor));
}
catch (ParseException e) {
throw new IllegalArgumentException(
""Failed to parse expression '"" + expression + ""'"");
}
requestToExpressionAttributesMap.put(request, attributes);
}
return requestToExpressionAttributesMap;
}
"
136,0," public T create() {
final ByteArrayOutputStream baos = new ByteArrayOutputStream(512);
ByteArrayInputStream bais = null;
try {
final ObjectOutputStream out = new ObjectOutputStream(baos);
out.writeObject(iPrototype);
bais = new ByteArrayInputStream(baos.toByteArray());
final ObjectInputStream in = new ObjectInputStream(bais);
return (T) in.readObject();
} catch (final ClassNotFoundException ex) {
throw new FunctorException(ex);
} catch (final IOException ex) {
throw new FunctorException(ex);
} finally {
try {
if (bais != null) {
bais.close();
}
} catch (final IOException ex) {
// ignore
}
try {
baos.close();
} catch (final IOException ex) {
// ignore
}
}
}
}
}
"
137,0," private File getFile(String fn) throws IOException {
File tmp = null;
String path = System.getProperty(""java.io.tmpdir"") + TMP;
File dir = new File(path);
if (!dir.exists()) {
LOGGER.fine(""Creating directory. Path: "" + dir.getCanonicalPath());
Files.createDirectories(dir.toPath());
}
tmp = new File(dir, fn);
LOGGER.fine(""Temp file: "" + tmp.getCanonicalPath());
return tmp;
}
"
138,0," private Object readResolve() {
throw new UnsupportedOperationException();
}
/* Traverseproc implementation */
@Override
"
139,0," public Document getMetaData(Idp config, TrustedIdp serviceConfig) throws ProcessingException {
try {
Crypto crypto = CertsUtils.createCrypto(config.getCertificate());
W3CDOMStreamWriter writer = new W3CDOMStreamWriter();
writer.writeStartDocument(""UTF-8"", ""1.0"");
String referenceID = IDGenerator.generateID(""_"");
writer.writeStartElement(""md"", ""EntityDescriptor"", SAML2_METADATA_NS);
writer.writeAttribute(""ID"", referenceID);
String serviceURL = config.getIdpUrl().toString();
writer.writeAttribute(""entityID"", serviceURL);
writer.writeNamespace(""md"", SAML2_METADATA_NS);
writer.writeNamespace(""fed"", WS_FEDERATION_NS);
writer.writeNamespace(""wsa"", WS_ADDRESSING_NS);
writer.writeNamespace(""auth"", WS_FEDERATION_NS);
writer.writeNamespace(""xsi"", SCHEMA_INSTANCE_NS);
if (""http://docs.oasis-open.org/wsfed/federation/200706"".equals(serviceConfig.getProtocol())) {
writeFederationMetadata(writer, serviceConfig, serviceURL);
} else if (""urn:oasis:names:tc:SAML:2.0:profiles:SSO:browser"".equals(serviceConfig.getProtocol())) {
writeSAMLMetadata(writer, serviceConfig, serviceURL, crypto);
}
writer.writeEndElement(); // EntityDescriptor
writer.writeEndDocument();
writer.close();
if (LOG.isDebugEnabled()) {
String out = DOM2Writer.nodeToString(writer.getDocument());
LOG.debug(""***************** unsigned ****************"");
LOG.debug(out);
LOG.debug(""***************** unsigned ****************"");
}
Document result = SignatureUtils.signMetaInfo(crypto, null, config.getCertificatePassword(),
writer.getDocument(), referenceID);
if (result != null) {
return result;
} else {
throw new RuntimeException(""Failed to sign the metadata document: result=null"");
}
} catch (ProcessingException e) {
throw e;
} catch (Exception e) {
LOG.error(""Error creating service metadata information "", e);
throw new ProcessingException(""Error creating service metadata information: "" + e.getMessage());
}
}
"
140,0," protected BlobStore blobStore() {
return blobStore;
}
/**
* {@inheritDoc}
*/
@Override
"
141,0," public void recycle(boolean socketClosing) {
super.recycle(socketClosing);
inputBuffer.clear();
inputBuffer.limit(0);
outputBuffer.clear();
}
"
142,0," public void winzipBackSlashWorkaround() throws Exception {
ZipArchiveInputStream in = null;
try {
in = new ZipArchiveInputStream(new FileInputStream(getFile(""test-winzip.zip"")));
ZipArchiveEntry zae = in.getNextZipEntry();
zae = in.getNextZipEntry();
zae = in.getNextZipEntry();
assertEquals(""\u00e4/"", zae.getName());
} finally {
if (in != null) {
in.close();
}
}
}
/**
* @see ""https://issues.apache.org/jira/browse/COMPRESS-189""
*/
@Test
"
143,0," public long getAvailable() {
return (this.available);
}
/**
* Set the available date/time for this servlet, in milliseconds since the
* epoch. If this date/time is Long.MAX_VALUE, it is considered to mean
* that unavailability is permanent and any request for this servlet will return
* an SC_NOT_FOUND error. If this date/time is in the future, any request for
* this servlet will return an SC_SERVICE_UNAVAILABLE error.
*
* @param available The new available date/time
*/
@Override
"
144,0," public String toString()
{
return name;
}
}
}
"
145,0," public T transform(final Class<? extends T> input) {
try {
if (input == null) {
throw new FunctorException(
""InstantiateTransformer: Input object was not an instanceof Class, it was a null object"");
}
final Constructor<? extends T> con = input.getConstructor(iParamTypes);
return con.newInstance(iArgs);
} catch (final NoSuchMethodException ex) {
throw new FunctorException(""InstantiateTransformer: The constructor must exist and be public "");
} catch (final InstantiationException ex) {
throw new FunctorException(""InstantiateTransformer: InstantiationException"", ex);
} catch (final IllegalAccessException ex) {
throw new FunctorException(""InstantiateTransformer: Constructor must be public"", ex);
} catch (final InvocationTargetException ex) {
throw new FunctorException(""InstantiateTransformer: Constructor threw an exception"", ex);
}
}
"
146,0," public String getTreeDigest()
{
return DigestUtil.getXMSSDigestName(treeDigest);
}
"
147,0," public void run() {
try {
LOGGER.info(""Initiating a re-keying of secrets. See ""+getLogFile());
StreamTaskListener listener = new StreamTaskListener(getLogFile());
try {
PrintStream log = listener.getLogger();
log.println(""Started re-keying "" + new Date());
int count = rewriter.rewriteRecursive(Jenkins.getInstance().getRootDir(), listener);
log.printf(""Completed re-keying %d files on %s\n"",count,new Date());
new RekeySecretAdminMonitor().done.on();
LOGGER.info(""Secret re-keying completed"");
} catch (Exception e) {
LOGGER.log(Level.SEVERE, ""Fatal failure in re-keying secrets"",e);
e.printStackTrace(listener.error(""Fatal failure in rewriting secrets""));
}
} catch (IOException e) {
LOGGER.log(Level.SEVERE, ""Catastrophic failure to rewrite secrets"",e);
}
}
}
private static final Logger LOGGER = Logger.getLogger(RekeySecretAdminMonitor.class.getName());
}
"
148,0," protected BlobPath basePath() {
return basePath;
}
"
149,0," public ServerSocket createServerSocket(int port) throws IOException {
SSLServerSocket sslServerSocket =
(SSLServerSocket) sslServerSocketFactory.createServerSocket(port, 0, bindAddress);
if (getEnabledCipherSuites() != null) {
sslServerSocket.setEnabledCipherSuites(getEnabledCipherSuites());
}
if (getEnabledProtocols() == null) {
sslServerSocket.setEnabledProtocols(defaultProtocols);
} else {
sslServerSocket.setEnabledProtocols(getEnabledProtocols());
}
sslServerSocket.setNeedClientAuth(getNeedClientAuth());
return sslServerSocket;
}
}
}
"
150,0," protected boolean statusDropsConnection(int status) {
return status == 400 /* SC_BAD_REQUEST */ ||
status == 408 /* SC_REQUEST_TIMEOUT */ ||
status == 411 /* SC_LENGTH_REQUIRED */ ||
status == 413 /* SC_REQUEST_ENTITY_TOO_LARGE */ ||
status == 414 /* SC_REQUEST_URI_TOO_LARGE */ ||
status == 500 /* SC_INTERNAL_SERVER_ERROR */ ||
status == 503 /* SC_SERVICE_UNAVAILABLE */ ||
status == 501 /* SC_NOT_IMPLEMENTED */;
}
"
151,0," public void setExpressionParser(ExpressionParser expressionParser) {
this.expressionParser = expressionParser;
}
/**
* Sets the service to use to expose formatters for field values.
* @param conversionService the conversion service
*/
"
152,0," void setAllowJavaSerializedObject(boolean allowJavaSerializedObject);
/**
* Gets the header filter strategy
*
* @return the strategy
*/
"
153,0," protected String savedRequestURL(Session session) {
SavedRequest saved =
(SavedRequest) session.getNote(Constants.FORM_REQUEST_NOTE);
if (saved == null) {
return (null);
}
StringBuilder sb = new StringBuilder(saved.getRequestURI());
if (saved.getQueryString() != null) {
sb.append('?');
sb.append(saved.getQueryString());
}
return (sb.toString());
}
"
154,0," public static String getAttributeValueEmptyNull(Element e, String attributeName) {
Attr node = e.getAttributeNode(attributeName);
if (node == null) {
return null;
}
return node.getValue();
}
/**
* Get the trimmed text content of a node or null if there is no text
*/
"
155,0," private boolean evaluate(String text) {
try {
InputSource inputSource = new InputSource(new StringReader(text));
Document inputDocument = builder.parse(inputSource);
return ((Boolean) xpath.evaluate(xpathExpression, inputDocument, XPathConstants.BOOLEAN)).booleanValue();
} catch (Exception e) {
return false;
}
}
@Override
"
156,0," public void destroy() {
// NO-OP
}
"
157,0," public void initialize(
AlgorithmParameterSpec params,
SecureRandom random)
throws InvalidAlgorithmParameterException
{
if (!(params instanceof DSAParameterSpec))
{
throw new InvalidAlgorithmParameterException(""parameter object not a DSAParameterSpec"");
}
DSAParameterSpec dsaParams = (DSAParameterSpec)params;
param = new DSAKeyGenerationParameters(random, new DSAParameters(dsaParams.getP(), dsaParams.getQ(), dsaParams.getG()));
engine.init(param);
initialised = true;
}
"
158,0," public static String nodeMode() {
Builder builder = ImmutableSettings.builder();
if (Strings.isEmpty(System.getProperty(""es.node.mode"")) && Strings.isEmpty(System.getProperty(""es.node.local""))) {
return ""local""; // default if nothing is specified
}
if (Strings.hasLength(System.getProperty(""es.node.mode""))) {
builder.put(""node.mode"", System.getProperty(""es.node.mode""));
}
if (Strings.hasLength(System.getProperty(""es.node.local""))) {
builder.put(""node.local"", System.getProperty(""es.node.local""));
}
if (DiscoveryNode.localNode(builder.build())) {
return ""local"";
} else {
return ""network"";
}
}
@Override
"
159,0," public AsymmetricCipherKeyPair generateKeyPair()
{
return genKeyPair();
}
"
160,0," public synchronized void save() throws IOException {
super.save();
updateTransientActions();
}
@Override
"
161,0," public static ASN1Integer getInstance(
ASN1TaggedObject obj,
boolean explicit)
{
ASN1Primitive o = obj.getObject();
if (explicit || o instanceof ASN1Integer)
{
return getInstance(o);
}
else
{
return new ASN1Integer(ASN1OctetString.getInstance(obj.getObject()).getOctets());
}
}
"
162,0," public void testNoRewrite() throws Exception {
doTestRewrite("""", ""/a/%255A"", ""/a/%255A"");
}
@Test
"
163,0," public void execute(String key, ActionMapping mapping) {
String name = key.substring(ACTION_PREFIX.length());
if (allowDynamicMethodCalls) {
int bang = name.indexOf('!');
if (bang != -1) {
String method = name.substring(bang + 1);
mapping.setMethod(method);
name = name.substring(0, bang);
}
}
mapping.setName(cleanupActionName(name));
}
});
}
};
}
/**
* Adds a parameter action. Should only be called during initialization
*
* @param prefix The string prefix to trigger the action
* @param parameterAction The parameter action to execute
* @since 2.1.0
*/
"
164,0," public Collection<ResourcePermission> getRequiredPermissions(String regionName) {
return Collections.singletonList(new ResourcePermission(ResourcePermission.Resource.DATA,
ResourcePermission.Operation.READ, regionName));
}
"
165,0," public T create() {
// needed for post-serialization
if (iConstructor == null) {
findConstructor();
}
try {
return iConstructor.newInstance(iArgs);
} catch (final InstantiationException ex) {
throw new FunctorException(""InstantiateFactory: InstantiationException"", ex);
} catch (final IllegalAccessException ex) {
throw new FunctorException(""InstantiateFactory: Constructor must be public"", ex);
} catch (final InvocationTargetException ex) {
throw new FunctorException(""InstantiateFactory: Constructor threw an exception"", ex);
}
}
"
166,0," public void parseEmbedded(
InputStream stream, ContentHandler handler, Metadata metadata, boolean outputHtml)
throws SAXException, IOException {
if(outputHtml) {
AttributesImpl attributes = new AttributesImpl();
attributes.addAttribute("""", ""class"", ""class"", ""CDATA"", ""package-entry"");
handler.startElement(XHTML, ""div"", ""div"", attributes);
}
String name = metadata.get(Metadata.RESOURCE_NAME_KEY);
if (name != null && name.length() > 0 && outputHtml) {
handler.startElement(XHTML, ""h1"", ""h1"", new AttributesImpl());
char[] chars = name.toCharArray();
handler.characters(chars, 0, chars.length);
handler.endElement(XHTML, ""h1"", ""h1"");
}
// Use the delegate parser to parse this entry
try (TemporaryResources tmp = new TemporaryResources()) {
final TikaInputStream newStream = TikaInputStream.get(new CloseShieldInputStream(stream), tmp);
if (stream instanceof TikaInputStream) {
final Object container = ((TikaInputStream) stream).getOpenContainer();
if (container != null) {
newStream.setOpenContainer(container);
}
}
DELEGATING_PARSER.parse(
newStream,
new EmbeddedContentHandler(new BodyContentHandler(handler)),
metadata, context);
} catch (EncryptedDocumentException ede) {
// TODO: can we log a warning that we lack the password?
// For now, just skip the content
} catch (CorruptedFileException e) {
throw new IOExceptionWithCause(e);
} catch (TikaException e) {
// TODO: can we log a warning somehow?
// Could not parse the entry, just skip the content
}
if(outputHtml) {
handler.endElement(XHTML, ""div"", ""div"");
}
}
"
167,0," private void checkParams()
{
if (vi == null)
{
throw new IllegalArgumentException(""no layers defined."");
}
if (vi.length > 1)
{
for (int i = 0; i < vi.length - 1; i++)
{
if (vi[i] >= vi[i + 1])
{
throw new IllegalArgumentException(
""v[i] has to be smaller than v[i+1]"");
}
}
}
else
{
throw new IllegalArgumentException(
""Rainbow needs at least 1 layer, such that v1 < v2."");
}
}
/**
* Getter for the number of layers
*
* @return the number of layers
*/
"
168,0," public void markPaused() {
paused = true;
}
}
// ---------------------------------------------------- Wrapper Inner Class
protected static class MappedWrapper extends MapElement<Wrapper> {
public final boolean jspWildCard;
public final boolean resourceOnly;
public MappedWrapper(String name, Wrapper wrapper, boolean jspWildCard,
boolean resourceOnly) {
super(name, wrapper);
this.jspWildCard = jspWildCard;
this.resourceOnly = resourceOnly;
}
}
}
"
169,0," public String getUsername() {
return username;
}
"
170,0," public boolean isMapHeaders() {
return mapHeaders;
}
/**
* If this option is enabled, then during binding from Spark to Camel Message then the headers will be mapped as well
* (eg added as header to the Camel Message as well). You can turn off this option to disable this.
* The headers can still be accessed from the org.apache.camel.component.sparkrest.SparkMessage message with the
* method getRequest() that returns the Spark HTTP request instance.
*/
"
171,0," public int[] getVi()
{
return this.vi;
}
"
172,0," public void setUp() throws Exception {
int randomInt = new SecureRandom().nextInt();
String adminAccessToken = testClient.getOAuthAccessToken(""admin"", ""adminsecret"", ""client_credentials"", ""clients.read clients.write clients.secret"");
String scimClientId = ""scim"" + randomInt;
testClient.createScimClient(adminAccessToken, scimClientId);
String scimAccessToken = testClient.getOAuthAccessToken(scimClientId, ""scimsecret"", ""client_credentials"", ""scim.read scim.write password.write"");
userEmail = ""user"" + randomInt + ""@example.com"";
testClient.createUser(scimAccessToken, userEmail, userEmail, PASSWORD, true);
}
@Test
"
173,0," public final void invoke(Request request, Response response)
throws IOException, ServletException {
// Select the Context to be used for this Request
Context context = request.getContext();
if (context == null) {
response.sendError(HttpServletResponse.SC_INTERNAL_SERVER_ERROR,
sm.getString(""standardHost.noContext""));
return;
}
if (request.isAsyncSupported()) {
request.setAsyncSupported(context.getPipeline().isAsyncSupported());
}
boolean asyncAtStart = request.isAsync();
boolean asyncDispatching = request.isAsyncDispatching();
try {
context.bind(Globals.IS_SECURITY_ENABLED, MY_CLASSLOADER);
if (!asyncAtStart && !context.fireRequestInitEvent(request.getRequest())) {
// Don't fire listeners during async processing (the listener
// fired for the request that called startAsync()).
// If a request init listener throws an exception, the request
// is aborted.
return;
}
// Ask this Context to process this request. Requests that are in
// async mode and are not being dispatched to this resource must be
// in error and have been routed here to check for application
// defined error pages.
try {
if (!asyncAtStart || asyncDispatching) {
context.getPipeline().getFirst().invoke(request, response);
} else {
// Make sure this request/response is here because an error
// report is required.
if (!response.isErrorReportRequired()) {
throw new IllegalStateException(sm.getString(""standardHost.asyncStateError""));
}
}
} catch (Throwable t) {
ExceptionUtils.handleThrowable(t);
container.getLogger().error(""Exception Processing "" + request.getRequestURI(), t);
// If a new error occurred while trying to report a previous
// error allow the original error to be reported.
if (!response.isErrorReportRequired()) {
request.setAttribute(RequestDispatcher.ERROR_EXCEPTION, t);
throwable(request, response, t);
}
}
// Now that the request/response pair is back under container
// control lift the suspension so that the error handling can
// complete and/or the container can flush any remaining data
response.setSuspended(false);
Throwable t = (Throwable) request.getAttribute(RequestDispatcher.ERROR_EXCEPTION);
// Protect against NPEs if the context was destroyed during a
// long running request.
if (!context.getState().isAvailable()) {
return;
}
// Look for (and render if found) an application level error page
if (response.isErrorReportRequired()) {
if (t != null) {
throwable(request, response, t);
} else {
status(request, response);
}
}
if (!request.isAsync() && !asyncAtStart) {
context.fireRequestDestroyEvent(request.getRequest());
}
} finally {
// Access a session (if present) to update last accessed time, based
// on a strict interpretation of the specification
if (ACCESS_SESSION) {
request.getSession(false);
}
context.unbind(Globals.IS_SECURITY_ENABLED, MY_CLASSLOADER);
}
}
// -------------------------------------------------------- Private Methods
/**
* Handle the HTTP status code (and corresponding message) generated
* while processing the specified Request to produce the specified
* Response. Any exceptions that occur during generation of the error
* report are logged and swallowed.
*
* @param request The request being processed
* @param response The response being generated
*/
"
174,0," private <T> T run(PrivilegedExceptionAction<T> action) throws Exception {
return System.getSecurityManager() != null ? AccessController.doPrivileged( action ) : action.run();
}
"
175,0," public void setUp() throws Exception {
sshKey = SshdServerMock.generateKeyPair();
System.setProperty(PluginImpl.TEST_SSH_KEYFILE_LOCATION_PROPERTY, sshKey.getPrivateKey().getAbsolutePath());
server = new SshdServerMock();
sshd = SshdServerMock.startServer(server);
server.returnCommandFor(""gerrit ls-projects"", SshdServerMock.EofCommandMock.class);
server.returnCommandFor(GERRIT_STREAM_EVENTS, SshdServerMock.CommandMock.class);
server.returnCommandFor(""gerrit review.*"", SshdServerMock.EofCommandMock.class);
server.returnCommandFor(""gerrit version"", SshdServerMock.EofCommandMock.class);
}
/**
* Runs after test method.
*
* @throws Exception throw if so.
*/
@After
"
176,0," public boolean getSource_location() {
return m_source_location;
}
"
177,0," public void setCoyoteRequest(org.apache.coyote.Request coyoteRequest) {
this.coyoteRequest = coyoteRequest;
inputBuffer.setRequest(coyoteRequest);
}
/**
* Get the Coyote request.
*/
"
178,0," public ExpressionInterceptUrlRegistry access(String attribute) {
if (not) {
attribute = ""!"" + attribute;
}
interceptUrl(requestMatchers, SecurityConfig.createList(attribute));
return ExpressionUrlAuthorizationConfigurer.this.REGISTRY;
}
}
}
"
179,0," private @CheckForNull File getDirectChild(File parentFile, String childPath){
File current = new File(parentFile, childPath);
while (current != null && !parentFile.equals(current.getParentFile())) {
current = current.getParentFile();
}
return current;
}
}
private static final SoloFilePathFilter UNRESTRICTED = SoloFilePathFilter.wrap(FilePathFilter.UNRESTRICTED);
}
"
180,0," public static boolean containsExpression(String expr) {
return expr.contains(""%{"") && expr.contains(""}"");
}
"
181,0," public void derIntegerTest()
throws Exception
{
try
{
new ASN1Integer(new byte[] { 0, 0, 0, 1});
}
catch (IllegalArgumentException e)
{
isTrue(""wrong exc"", ""malformed integer"".equals(e.getMessage()));
}
try
{
new ASN1Integer(new byte[] {(byte)0xff, (byte)0x80, 0, 1});
}
catch (IllegalArgumentException e)
{
isTrue(""wrong exc"", ""malformed integer"".equals(e.getMessage()));
}
try
{
new ASN1Enumerated(new byte[] { 0, 0, 0, 1});
}
catch (IllegalArgumentException e)
{
isTrue(""wrong exc"", ""malformed enumerated"".equals(e.getMessage()));
}
try
{
new ASN1Enumerated(new byte[] {(byte)0xff, (byte)0x80, 0, 1});
}
catch (IllegalArgumentException e)
{
isTrue(""wrong exc"", ""malformed enumerated"".equals(e.getMessage()));
}
}
"
182,0," public void cleanUp() {
Set<String> names = files.keySet();
for (String name : names) {
List<FileItem> items = files.get(name);
for (FileItem item : items) {
if (LOG.isDebugEnabled()) {
String msg = LocalizedTextUtil.findText(this.getClass(), ""struts.messages.removing.file"",
Locale.ENGLISH, ""no.message.found"", new Object[]{name, item});
LOG.debug(msg);
}
if (!item.isInMemory()) {
item.delete();
}
}
}
}
"
183,0," protected JDBCTableReader getTableReader(Connection connection, String tableName, EmbeddedDocumentUtil embeddedDocumentUtil) {
return new SQLite3TableReader(connection, tableName, embeddedDocumentUtil);
}
"
184,0," public Character decodeCharacter( PushbackString input ) {
input.mark();
Character first = input.next();
if ( first == null ) {
input.reset();
return null;
}
// if this is not an encoded character, return null
if (first != '%' ) {
input.reset();
return null;
}
// Search for exactly 2 hex digits following
StringBuilder sb = new StringBuilder();
for ( int i=0; i<2; i++ ) {
Character c = input.nextHex();
if ( c != null ) sb.append( c );
}
if ( sb.length() == 2 ) {
try {
// parse the hex digit and create a character
int i = Integer.parseInt(sb.toString(), 16);
if (Character.isValidCodePoint(i)) {
return (char) i;
}
} catch( NumberFormatException ignored ) { }
}
input.reset();
return null;
}
"
185,0," public String getPathname() {
return pathname;
}
/**
* Set the pathname of our XML file containing user definitions. If a
* relative pathname is specified, it is resolved against ""catalina.base"".
*
* @param pathname The new pathname
*/
"
186,0," public boolean isSecureProcessing()
{
return m_isSecureProcessing;
}
"
187,0," public void write(OutputStream outputStream)
throws IOException, WebApplicationException {
Writer writer = new OutputStreamWriter(outputStream, UTF_8);
ContentHandler content;
try {
SAXTransformerFactory factory = (SAXTransformerFactory) SAXTransformerFactory.newInstance();
TransformerHandler handler = factory.newTransformerHandler();
handler.getTransformer().setOutputProperty(OutputKeys.METHOD, format);
handler.getTransformer().setOutputProperty(OutputKeys.INDENT, ""yes"");
handler.getTransformer().setOutputProperty(OutputKeys.ENCODING, UTF_8.name());
handler.setResult(new StreamResult(writer));
content = new ExpandedTitleContentHandler(handler);
} catch (TransformerConfigurationException e) {
throw new WebApplicationException(e);
}
parse(parser, LOG, info.getPath(), is, content, metadata, context);
}
};
}
}
"
188,0," private boolean isSameAs(
byte[] a,
byte[] b)
{
if (a.length != b.length)
{
return false;
}
for (int i = 0; i != a.length; i++)
{
if (a[i] != b[i])
{
return false;
}
}
return true;
}
"
189,0," private void testModified()
throws Exception
{
KeyFactory kFact = KeyFactory.getInstance(""DSA"", ""BC"");
PublicKey pubKey = kFact.generatePublic(PUBLIC_KEY);
Signature sig = Signature.getInstance(""DSA"", ""BC"");
for (int i = 0; i != MODIFIED_SIGNATURES.length; i++)
{
sig.initVerify(pubKey);
sig.update(Strings.toByteArray(""Hello""));
boolean failed;
try
{
failed = !sig.verify(Hex.decode(MODIFIED_SIGNATURES[i]));
}
catch (SignatureException e)
{
failed = true;
}
isTrue(""sig verified when shouldn't"", failed);
}
}
"
190,0," public LockoutPolicyRetriever getLockoutPolicyRetriever() {
return lockoutPolicyRetriever;
}
"
191,0," public void close() throws IOException {
if (!closed) {
synchronized (this) {
if (!closed) {
closed = true;
socket.close();
}
}
}
}
"
192,0," protected abstract void recycleInternal();
"
193,0," public static JWTDecoder getInstance() {
if (instance == null) {
instance = new JWTDecoder();
}
return instance;
}
/**
* Decode the JWT using one of they provided verifiers. One more verifiers may be provided, the first verifier found
* supporting the algorithm reported by the JWT header will be utilized.
* <p>
* A JWT that is expired or not yet valid will not be decoded, instead a {@link JWTExpiredException} or {@link
* JWTUnavailableForProcessingException} exception will be thrown respectively.
*
* @param encodedJWT The encoded JWT in string format.
* @param verifiers A map of verifiers.
* @return a decoded JWT.
*/
"
194,0," public boolean check(String path, Resource resource)
{
int slash = path.lastIndexOf('/');
if (slash<0 || resource.exists())
return false;
String suffix=path.substring(slash);
return resource.getAlias().toString().endsWith(suffix);
}
}
}
"
195,0," public void setMaxParameterCount(int maxParameterCount) {
this.maxParameterCount = maxParameterCount;
}
/**
* Return the maximum size of a POST which will be automatically
* parsed by the container.
*/
"
196,0," protected boolean requiresAuthentication(final HttpServletRequest request, final HttpServletResponse response) {
boolean result = request.getRequestURI().contains(getFilterProcessesUrl());
result |= isTokenExpired();
if (logger.isDebugEnabled()) {
logger.debug(""requiresAuthentication = "" + result);
}
return result;
}
"
197,0," public JettyContentExchange createContentExchange() {
return new JettyContentExchange9();
}
"
198,0," protected void populateResponse(Exchange exchange, JettyContentExchange httpExchange,
Message in, HeaderFilterStrategy strategy, int responseCode) throws IOException {
Message answer = exchange.getOut();
answer.setHeader(Exchange.HTTP_RESPONSE_CODE, responseCode);
// must use response fields to get the http headers as
// httpExchange.getHeaders() does not work well with multi valued headers
Map<String, Collection<String>> headers = httpExchange.getResponseHeaders();
for (Map.Entry<String, Collection<String>> ent : headers.entrySet()) {
String name = ent.getKey();
Collection<String> values = ent.getValue();
for (String value : values) {
if (name.toLowerCase().equals(""content-type"")) {
name = Exchange.CONTENT_TYPE;
exchange.setProperty(Exchange.CHARSET_NAME, IOHelper.getCharsetNameFromContentType(value));
}
if (strategy != null && !strategy.applyFilterToExternalHeaders(name, value, exchange)) {
HttpHelper.appendHeader(answer.getHeaders(), name, value);
}
}
}
// preserve headers from in by copying any non existing headers
// to avoid overriding existing headers with old values
// We also need to apply the httpProtocolHeaderFilterStrategy to filter the http protocol header
MessageHelper.copyHeaders(exchange.getIn(), answer, httpProtocolHeaderFilterStrategy, false);
// extract body after headers has been set as we want to ensure content-type from Jetty HttpExchange
// has been populated first
answer.setBody(extractResponseBody(exchange, httpExchange));
}
"
199,0," protected boolean isAuthorizedToSwitchToIdentityZone(String identityZoneId) {
Authentication authentication = SecurityContextHolder.getContext().getAuthentication();
boolean hasScope = OAuth2ExpressionUtils.hasAnyScope(authentication, getZoneSwitchingScopes(identityZoneId));
boolean isUaa = IdentityZoneHolder.isUaa();
boolean isTokenAuth = (authentication instanceof OAuth2Authentication);
return isTokenAuth && isUaa && hasScope;
}
"
200,0," protected static void copyBytes(byte[] b, int dest, int src, int len) {
for (int pos = 0; pos < len; pos++) {
b[pos + dest] = b[pos + src];
}
}
"
201,0," public String getSessionId()
throws IOException {
// Look up the current SSLSession
SSLSession session = ssl.getSession();
if (session == null)
return null;
// Expose ssl_session (getId)
byte [] ssl_session = session.getId();
if ( ssl_session == null)
return null;
StringBuffer buf=new StringBuffer("""");
for(int x=0; x<ssl_session.length; x++) {
String digit=Integer.toHexString((int)ssl_session[x]);
if (digit.length()<2) buf.append('0');
if (digit.length()>2) digit=digit.substring(digit.length()-2);
buf.append(digit);
}
return buf.toString();
}
"
202,0," private void login(String clientId) throws Exception {
getMockMvc().perform(post(""/oauth/token"")
.accept(MediaType.APPLICATION_JSON_VALUE)
.header(""Authorization"", ""Basic "" + new String(Base64.encode((clientId + "":"" + SECRET).getBytes())))
.param(""grant_type"", ""client_credentials"")
)
.andExpect(status().isOk())
.andReturn().getResponse().getContentAsString();
}
@Test
"
203,0," public abstract JettyContentExchange createContentExchange();
"
204,0," public void testParameterNameAware() {
ParametersInterceptor pi = createParametersInterceptor();
final Map actual = injectValueStackFactory(pi);
ValueStack stack = createStubValueStack(actual);
final Map expected = new HashMap() {
{
put(""fooKey"", ""fooValue"");
put(""barKey"", ""barValue"");
}
};
Object a = new ParameterNameAware() {
public boolean acceptableParameterName(String parameterName) {
return expected.containsKey(parameterName);
}
};
Map parameters = new HashMap() {
{
put(""fooKey"", ""fooValue"");
put(""barKey"", ""barValue"");
put(""error"", ""error"");
}
};
pi.setParameters(a, stack, parameters);
assertEquals(expected, actual);
}
"
205,0," protected CloseButtonBehavior newCloseButtonBehavior()
{
return new CloseButtonBehavior();
}
"
206,0," public void repositoryVerificationTimeoutTest() throws Exception {
Client client = client();
Settings settings = ImmutableSettings.settingsBuilder()
.put(""location"", randomRepoPath())
.put(""random_control_io_exception_rate"", 1.0).build();
logger.info(""--> creating repository that cannot write any files - should fail"");
assertThrows(client.admin().cluster().preparePutRepository(""test-repo-1"")
.setType(MockRepositoryModule.class.getCanonicalName()).setSettings(settings),
RepositoryVerificationException.class);
logger.info(""--> creating repository that cannot write any files, but suppress verification - should be acked"");
assertAcked(client.admin().cluster().preparePutRepository(""test-repo-1"")
.setType(MockRepositoryModule.class.getCanonicalName()).setSettings(settings).setVerify(false));
logger.info(""--> verifying repository"");
assertThrows(client.admin().cluster().prepareVerifyRepository(""test-repo-1""), RepositoryVerificationException.class);
File location = randomRepoPath();
logger.info(""--> creating repository"");
try {
client.admin().cluster().preparePutRepository(""test-repo-1"")
.setType(MockRepositoryModule.class.getCanonicalName())
.setSettings(ImmutableSettings.settingsBuilder()
.put(""location"", location)
.put(""localize_location"", true)
).get();
fail(""RepositoryVerificationException wasn't generated"");
} catch (RepositoryVerificationException ex) {
assertThat(ex.getMessage(), containsString(""is not shared""));
}
}
"
207,0," private static void log( String s ) {
if (log.isDebugEnabled())
log.debug(""URLDecoder: "" + s );
}
"
208,0," private boolean evaluate(String text) {
try {
InputSource inputSource = new InputSource(new StringReader(text));
Document inputDocument = builder.parse(inputSource);
return ((Boolean)xpath.evaluate(xpathExpression, inputDocument, XPathConstants.BOOLEAN)).booleanValue();
} catch (Exception e) {
return false;
}
}
@Override
"
209,0," public void basicWorkFlowTest() throws Exception {
Client client = client();
logger.info(""--> creating repository"");
assertAcked(client.admin().cluster().preparePutRepository(""test-repo"")
.setType(""fs"").setSettings(ImmutableSettings.settingsBuilder()
.put(""location"", randomRepoPath())
.put(""compress"", randomBoolean())
.put(""chunk_size"", randomIntBetween(100, 1000))));
createIndex(""test-idx-1"", ""test-idx-2"", ""test-idx-3"");
ensureGreen();
logger.info(""--> indexing some data"");
for (int i = 0; i < 100; i++) {
index(""test-idx-1"", ""doc"", Integer.toString(i), ""foo"", ""bar"" + i);
index(""test-idx-2"", ""doc"", Integer.toString(i), ""foo"", ""baz"" + i);
index(""test-idx-3"", ""doc"", Integer.toString(i), ""foo"", ""baz"" + i);
}
refresh();
assertHitCount(client.prepareCount(""test-idx-1"").get(), 100L);
assertHitCount(client.prepareCount(""test-idx-2"").get(), 100L);
assertHitCount(client.prepareCount(""test-idx-3"").get(), 100L);
ListenableActionFuture<FlushResponse> flushResponseFuture = null;
if (randomBoolean()) {
ArrayList<String> indicesToFlush = newArrayList();
for (int i = 1; i < 4; i++) {
if (randomBoolean()) {
indicesToFlush.add(""test-idx-"" + i);
}
}
if (!indicesToFlush.isEmpty()) {
String[] indices = indicesToFlush.toArray(new String[indicesToFlush.size()]);
logger.info(""--> starting asynchronous flush for indices {}"", Arrays.toString(indices));
flushResponseFuture = client.admin().indices().prepareFlush(indices).execute();
}
}
logger.info(""--> snapshot"");
CreateSnapshotResponse createSnapshotResponse = client.admin().cluster().prepareCreateSnapshot(""test-repo"", ""test-snap"").setWaitForCompletion(true).setIndices(""test-idx-*"", ""-test-idx-3"").get();
assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), greaterThan(0));
assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), equalTo(createSnapshotResponse.getSnapshotInfo().totalShards()));
assertThat(client.admin().cluster().prepareGetSnapshots(""test-repo"").setSnapshots(""test-snap"").get().getSnapshots().get(0).state(), equalTo(SnapshotState.SUCCESS));
logger.info(""--> delete some data"");
for (int i = 0; i < 50; i++) {
client.prepareDelete(""test-idx-1"", ""doc"", Integer.toString(i)).get();
}
for (int i = 50; i < 100; i++) {
client.prepareDelete(""test-idx-2"", ""doc"", Integer.toString(i)).get();
}
for (int i = 0; i < 100; i += 2) {
client.prepareDelete(""test-idx-3"", ""doc"", Integer.toString(i)).get();
}
refresh();
assertHitCount(client.prepareCount(""test-idx-1"").get(), 50L);
assertHitCount(client.prepareCount(""test-idx-2"").get(), 50L);
assertHitCount(client.prepareCount(""test-idx-3"").get(), 50L);
logger.info(""--> close indices"");
client.admin().indices().prepareClose(""test-idx-1"", ""test-idx-2"").get();
logger.info(""--> restore all indices from the snapshot"");
RestoreSnapshotResponse restoreSnapshotResponse = client.admin().cluster().prepareRestoreSnapshot(""test-repo"", ""test-snap"").setWaitForCompletion(true).execute().actionGet();
assertThat(restoreSnapshotResponse.getRestoreInfo().totalShards(), greaterThan(0));
ensureGreen();
for (int i=0; i<5; i++) {
assertHitCount(client.prepareCount(""test-idx-1"").get(), 100L);
assertHitCount(client.prepareCount(""test-idx-2"").get(), 100L);
assertHitCount(client.prepareCount(""test-idx-3"").get(), 50L);
}
// Test restore after index deletion
logger.info(""--> delete indices"");
cluster().wipeIndices(""test-idx-1"", ""test-idx-2"");
logger.info(""--> restore one index after deletion"");
restoreSnapshotResponse = client.admin().cluster().prepareRestoreSnapshot(""test-repo"", ""test-snap"").setWaitForCompletion(true).setIndices(""test-idx-*"", ""-test-idx-2"").execute().actionGet();
assertThat(restoreSnapshotResponse.getRestoreInfo().totalShards(), greaterThan(0));
ensureGreen();
for (int i=0; i<5; i++) {
assertHitCount(client.prepareCount(""test-idx-1"").get(), 100L);
}
ClusterState clusterState = client.admin().cluster().prepareState().get().getState();
assertThat(clusterState.getMetaData().hasIndex(""test-idx-1""), equalTo(true));
assertThat(clusterState.getMetaData().hasIndex(""test-idx-2""), equalTo(false));
if (flushResponseFuture != null) {
// Finish flush
flushResponseFuture.actionGet();
}
}
@Test
"
210,0," public ReturnValueDescriptor asDescriptor(boolean defaultGroupSequenceRedefined, List<Class<?>> defaultGroupSequence) {
return new ReturnValueDescriptorImpl(
getType(),
asDescriptors( getConstraints() ),
isCascading(),
defaultGroupSequenceRedefined,
defaultGroupSequence,
groupConversionHelper.asDescriptors()
);
}
"
211,0," static final PyObject function___new__(PyNewWrapper new_, boolean init, PyType subtype,
PyObject[] args, String[] keywords) {
ArgParser ap = new ArgParser(""function"", args, keywords,
new String[] {""code"", ""globals"", ""name"", ""argdefs"",
""closure""}, 0);
PyObject code = ap.getPyObject(0);
PyObject globals = ap.getPyObject(1);
PyObject name = ap.getPyObject(2, Py.None);
PyObject defaults = ap.getPyObject(3, Py.None);
PyObject closure = ap.getPyObject(4, Py.None);
if (!(code instanceof PyBaseCode)) {
throw Py.TypeError(""function() argument 1 must be code, not "" +
code.getType().fastGetName());
}
if (name != Py.None && !Py.isInstance(name, PyString.TYPE)) {
throw Py.TypeError(""arg 3 (name) must be None or string"");
}
if (defaults != Py.None && !(defaults instanceof PyTuple)) {
throw Py.TypeError(""arg 4 (defaults) must be None or tuple"");
}
PyBaseCode tcode = (PyBaseCode)code;
int nfree = tcode.co_freevars == null ? 0 : tcode.co_freevars.length;
if (!(closure instanceof PyTuple)) {
if (nfree > 0 && closure == Py.None) {
throw Py.TypeError(""arg 5 (closure) must be tuple"");
} else if (closure != Py.None) {
throw Py.TypeError(""arg 5 (closure) must be None or tuple"");
}
}
int nclosure = closure == Py.None ? 0 : closure.__len__();
if (nfree != nclosure) {
throw Py.ValueError(String.format(""%s requires closure of length %d, not %d"",
tcode.co_name, nfree, nclosure));
}
if (nclosure > 0) {
for (PyObject o : ((PyTuple)closure).asIterable()) {
if (!(o instanceof PyCell)) {
throw Py.TypeError(String.format(""arg 5 (closure) expected cell, found %s"",
o.getType().fastGetName()));
}
}
}
PyFunction function = new PyFunction(globals,
defaults == Py.None
? null : ((PyTuple)defaults).getArray(),
tcode, null,
closure == Py.None
? null : ((PyTuple)closure).getArray());
if (name != Py.None) {
function.__name__ = name.toString();
}
return function;
}
@ExposedSet(name = ""__name__"")
"
212,0," private static byte[] toUtf8Bytes(String str)
{
try
{
return str.getBytes(""UTF-8"");
}
catch(UnsupportedEncodingException e)
{
throw new IllegalStateException(""The Java spec requires UTF-8 support."", e);
}
}
/**
* Append the two upper case hex characters for a byte.
* @param sb The string buffer to append to.
* @param b The byte to hexify
* @return sb with the hex characters appended.
*/
// rfc3986 2.1: For consistency, URI producers
// should use uppercase hexadecimal digits for all percent-
// encodings.
"
213,0," void getElUnsupported(String expression);
"
214,0," public String toString() {
return xpathExpression;
}
"
215,0," public Descriptor<Cloud> getDescriptor() {
throw new UnsupportedOperationException();
}
}
}
"
216,1," public void getAllPropertiesRequiresAdmin() {
j.jenkins.setAuthorizationStrategy(new MockAuthorizationStrategy()
.grant(Jenkins.ADMINISTER).everywhere().to(""admin"")
.grant(Jenkins.READ).everywhere().toEveryone());
j.jenkins.setSecurityRealm(j.createDummySecurityRealm());
User admin = User.get(""admin"");
User alice = User.get(""alice"");
User bob = User.get(""bob"");
// Admin can access user properties for all users
try (ACLContext as = ACL.as(admin)) {
assertThat(alice.getAllProperties(), not(empty()));
assertThat(bob.getAllProperties(), not(empty()));
assertThat(admin.getAllProperties(), not(empty()));
}
// Non admins can only view their own
try (ACLContext as = ACL.as(alice)) {
assertThat(alice.getAllProperties(), not(empty()));
assertThat(bob.getAllProperties(), empty());
assertThat(admin.getAllProperties(), empty());
}
}
"
217,1," protected <P> P postProcess(P object) {
return (P) this.objectPostProcessor.postProcess(object);
}
/**
* Executes the build using the {@link SecurityConfigurer}'s that have been applied
* using the following steps:
*
* <ul>
* <li>Invokes {@link #beforeInit()} for any subclass to hook into</li>
* <li>Invokes {@link SecurityConfigurer#init(SecurityBuilder)} for any
* {@link SecurityConfigurer} that was applied to this builder.</li>
* <li>Invokes {@link #beforeConfigure()} for any subclass to hook into</li>
* <li>Invokes {@link #performBuild()} which actually builds the Object</li>
* </ul>
*/
@Override
"
218,1," public SAXSource toSAXSourceFromStream(StreamSource source, Exchange exchange) throws SAXException {
InputSource inputSource;
if (source.getReader() != null) {
inputSource = new InputSource(source.getReader());
} else {
inputSource = new InputSource(source.getInputStream());
}
inputSource.setSystemId(source.getSystemId());
inputSource.setPublicId(source.getPublicId());
XMLReader xmlReader = null;
SAXParserFactory sfactory = null;
//Need to setup XMLReader security feature by default
try {
// use the SAXPaserFactory which is set from exchange
if (exchange != null) {
sfactory = exchange.getProperty(Exchange.SAXPARSER_FACTORY, SAXParserFactory.class);
}
if (sfactory == null) {
sfactory = SAXParserFactory.newInstance();
try {
sfactory.setFeature(javax.xml.XMLConstants.FEATURE_SECURE_PROCESSING, true);
} catch (Exception e) {
LOG.warn(""SAXParser doesn't support the feature {} with value {}, due to {}."", new Object[]{javax.xml.XMLConstants.FEATURE_SECURE_PROCESSING, ""true"", e});
}
}
sfactory.setNamespaceAware(true);
SAXParser parser = sfactory.newSAXParser();
xmlReader = parser.getXMLReader();
} catch (Exception ex) {
LOG.warn(""Cannot create the SAXParser XMLReader, due to {}"", ex);
}
return new SAXSource(xmlReader, inputSource);
}
/**
* @deprecated will be removed in Camel 3.0. Use the method which has 2 parameters.
*/
@Deprecated
"
219,1," public String getDisplayName() {
return Messages.CommandLauncher_displayName();
}
}
}
"
220,1," public SSOValidatorResponse validateSamlResponse(
org.opensaml.saml.saml2.core.Response samlResponse,
boolean postBinding
) throws WSSecurityException {
// Check the Issuer
validateIssuer(samlResponse.getIssuer());
// The Response must contain at least one Assertion.
if (samlResponse.getAssertions() == null || samlResponse.getAssertions().isEmpty()) {
LOG.fine(""The Response must contain at least one Assertion"");
throw new WSSecurityException(WSSecurityException.ErrorCode.FAILURE, ""invalidSAMLsecurity"");
}
// The Response must contain a Destination that matches the assertionConsumerURL if it is
// signed
String destination = samlResponse.getDestination();
if (samlResponse.isSigned()
&& (destination == null || !destination.equals(assertionConsumerURL))) {
LOG.fine(""The Response must contain a destination that matches the assertion consumer URL"");
throw new WSSecurityException(WSSecurityException.ErrorCode.FAILURE, ""invalidSAMLsecurity"");
}
// Validate Assertions
boolean foundValidSubject = false;
Date sessionNotOnOrAfter = null;
for (org.opensaml.saml.saml2.core.Assertion assertion : samlResponse.getAssertions()) {
// Check the Issuer
if (assertion.getIssuer() == null) {
LOG.fine(""Assertion Issuer must not be null"");
throw new WSSecurityException(WSSecurityException.ErrorCode.FAILURE, ""invalidSAMLsecurity"");
}
validateIssuer(assertion.getIssuer());
if (enforceAssertionsSigned && postBinding && assertion.getSignature() == null) {
LOG.fine(""If the HTTP Post binding is used to deliver the Response, ""
+ ""the enclosed assertions must be signed"");
throw new WSSecurityException(WSSecurityException.ErrorCode.FAILURE, ""invalidSAMLsecurity"");
}
// Check for AuthnStatements and validate the Subject accordingly
if (assertion.getAuthnStatements() != null
&& !assertion.getAuthnStatements().isEmpty()) {
org.opensaml.saml.saml2.core.Subject subject = assertion.getSubject();
if (validateAuthenticationSubject(subject, assertion.getID(), postBinding)) {
validateAudienceRestrictionCondition(assertion.getConditions());
foundValidSubject = true;
// Store Session NotOnOrAfter
for (AuthnStatement authnStatment : assertion.getAuthnStatements()) {
if (authnStatment.getSessionNotOnOrAfter() != null) {
sessionNotOnOrAfter = authnStatment.getSessionNotOnOrAfter().toDate();
}
}
}
}
}
if (!foundValidSubject) {
LOG.fine(""The Response did not contain any Authentication Statement that matched ""
+ ""the Subject Confirmation criteria"");
throw new WSSecurityException(WSSecurityException.ErrorCode.FAILURE, ""invalidSAMLsecurity"");
}
SSOValidatorResponse validatorResponse = new SSOValidatorResponse();
validatorResponse.setResponseId(samlResponse.getID());
validatorResponse.setSessionNotOnOrAfter(sessionNotOnOrAfter);
if (samlResponse.getIssueInstant() != null) {
validatorResponse.setCreated(samlResponse.getIssueInstant().toDate());
}
// the assumption for now is that SAMLResponse will contain only a single assertion
Element assertionElement = samlResponse.getAssertions().get(0).getDOM();
Element clonedAssertionElement = (Element)assertionElement.cloneNode(true);
validatorResponse.setAssertionElement(clonedAssertionElement);
validatorResponse.setAssertion(DOM2Writer.nodeToString(clonedAssertionElement));
return validatorResponse;
}
/**
* Validate the Issuer (if it exists)
*/
"
221,1," private JWT decode(String encodedJWT, Header header, String[] parts, Verifier verifier) {
int index = encodedJWT.lastIndexOf(""."");
// The message comprises the first two segments of the entire JWT, the signature is the last segment.
byte[] message = encodedJWT.substring(0, index).getBytes(StandardCharsets.UTF_8);
// If a signature is provided and verifier must be provided.
if (parts.length == 3 && verifier == null) {
throw new MissingVerifierException(""No Verifier has been provided for verify a signature signed using ["" + header.algorithm.getName() + ""]"");
}
// A verifier was provided but no signature exists, this is treated as an invalid signature.
if (parts.length == 2 && verifier != null) {
throw new InvalidJWTSignatureException();
}
if (parts.length == 3) {
// Verify the signature before de-serializing the payload.
byte[] signature = base64Decode(parts[2].getBytes(StandardCharsets.UTF_8));
verifier.verify(header.algorithm, message, signature);
}
JWT jwt = Mapper.deserialize(base64Decode(parts[1].getBytes(StandardCharsets.UTF_8)), JWT.class);
// Verify expiration claim
if (jwt.isExpired()) {
throw new JWTExpiredException();
}
// Verify the notBefore claim
if (jwt.isUnavailableForProcessing()) {
throw new JWTUnavailableForProcessingException();
}
return jwt;
}
"
222,1," String postProcessVariableName(String variableName) {
return this.matcher.postProcessVariableName(variableName);
}
}
}
"
223,1," public String toString() {
StringBuilder sb = new StringBuilder(""<user username=\"""");
sb.append(RequestUtil.filter(username));
sb.append(""\"" password=\"""");
sb.append(RequestUtil.filter(password));
sb.append(""\"""");
if (fullName != null) {
sb.append("" fullName=\"""");
sb.append(RequestUtil.filter(fullName));
sb.append(""\"""");
}
synchronized (groups) {
if (groups.size() > 0) {
sb.append("" groups=\"""");
int n = 0;
Iterator<Group> values = groups.iterator();
while (values.hasNext()) {
if (n > 0) {
sb.append(',');
}
n++;
sb.append(RequestUtil.filter(values.next().getGroupname()));
}
sb.append(""\"""");
}
}
synchronized (roles) {
if (roles.size() > 0) {
sb.append("" roles=\"""");
int n = 0;
Iterator<Role> values = roles.iterator();
while (values.hasNext()) {
if (n > 0) {
sb.append(',');
}
n++;
sb.append(RequestUtil.filter(values.next().getRolename()));
}
sb.append(""\"""");
}
}
sb.append(""/>"");
return (sb.toString());
}
"
224,1," public void processParameters( String str ) {
int end=str.length();
int pos=0;
if( debug > 0)
log(""String: "" + str );
do {
boolean noEq=false;
int valStart=-1;
int valEnd=-1;
int nameStart=pos;
int nameEnd=str.indexOf('=', nameStart );
int nameEnd2=str.indexOf('&', nameStart );
if( nameEnd2== -1 ) nameEnd2=end;
if( (nameEnd2!=-1 ) &&
( nameEnd==-1 || nameEnd > nameEnd2) ) {
nameEnd=nameEnd2;
noEq=true;
valStart=nameEnd;
valEnd=nameEnd;
if(debug>0) log(""no equal "" + nameStart + "" "" + nameEnd + "" "" +
str.substring(nameStart, nameEnd));
}
if( nameEnd== -1 ) nameEnd=end;
if( ! noEq ) {
valStart=nameEnd+1;
valEnd=str.indexOf('&', valStart);
if( valEnd== -1 ) valEnd = (valStart < end) ? end : valStart;
}
pos=valEnd+1;
if( nameEnd<=nameStart ) {
continue;
}
if( debug>0)
log( ""XXX "" + nameStart + "" "" + nameEnd + "" ""
+ valStart + "" "" + valEnd );
try {
tmpNameC.append(str, nameStart, nameEnd-nameStart );
tmpValueC.append(str, valStart, valEnd-valStart );
if( debug > 0 )
log( tmpNameC + ""= "" + tmpValueC);
if( urlDec==null ) {
urlDec=new UDecoder();
}
urlDec.convert( tmpNameC );
urlDec.convert( tmpValueC );
if( debug > 0 )
log( tmpNameC + ""= "" + tmpValueC);
addParam( tmpNameC.toString(), tmpValueC.toString() );
} catch( IOException ex ) {
ex.printStackTrace();
}
tmpNameC.recycle();
tmpValueC.recycle();
} while( pos<end );
}
"
225,1," public final void recycle() {
try {
// Must clear super's buffer.
while (ready()) {
// InputStreamReader#skip(long) will allocate buffer to skip.
read();
}
} catch(IOException ioe){
}
}
}
/** Special output stream where close() is overriden, so super.close()
is never called.
This allows recycling. It can also be disabled, so callbacks will
not be called if recycling the converter and if data was not flushed.
*/
final class IntermediateInputStream extends InputStream {
ByteChunk bc = null;
boolean initialized = false;
public IntermediateInputStream() {
}
public final void close() throws IOException {
// shouldn't be called - we filter it out in writer
throw new IOException(""close() called - shouldn't happen "");
}
public final int read(byte cbuf[], int off, int len) throws IOException {
if (!initialized) return -1;
int nread = bc.substract(cbuf, off, len);
return nread;
}
public final int read() throws IOException {
if (!initialized) return -1;
return bc.substract();
}
public int available() throws IOException {
if (!initialized) return 0;
return bc.getLength();
}
// -------------------- Internal methods --------------------
void setByteChunk( ByteChunk mb ) {
initialized = (mb!=null);
bc = mb;
}
"
226,1," public void resetPassword_ReturnsUnprocessableEntity_NewPasswordSameAsOld() throws Exception {
ScimUserProvisioning userProvisioning = getWebApplicationContext().getBean(ScimUserProvisioning.class);
List<ScimUser> users = userProvisioning.query(""username eq \""marissa\"""");
assertNotNull(users);
assertEquals(1, users.size());
ScimUser user = users.get(0);
ExpiringCode code = codeStore.generateCode(user.getId(), new Timestamp(System.currentTimeMillis() + UaaResetPasswordService.PASSWORD_RESET_LIFETIME), null);
getMockMvc().perform(createChangePasswordRequest(user, code, true, ""d3faultPasswd"", ""d3faultPasswd""));
code = codeStore.generateCode(user.getId(), new Timestamp(System.currentTimeMillis() + UaaResetPasswordService.PASSWORD_RESET_LIFETIME), null);
getMockMvc().perform(createChangePasswordRequest(user, code, true, ""d3faultPasswd"", ""d3faultPasswd""))
.andExpect(status().isUnprocessableEntity())
.andExpect(view().name(""forgot_password""))
.andExpect(model().attribute(""message"", ""Your new password cannot be the same as the old password.""));
}
"
227,1," public void recycle() {
if (buffered.getBuffer().length > 65536) {
buffered = null;
} else {
buffered.recycle();
}
tempRead.recycle();
hasRead = false;
buffer = null;
}
"
228,1," public XMLLoader init(SolrParams args) {
inputFactory = XMLInputFactory.newInstance();
try {
// The java 1.6 bundled stax parser (sjsxp) does not currently have a thread-safe
// XMLInputFactory, as that implementation tries to cache and reuse the
// XMLStreamReader. Setting the parser-specific ""reuse-instance"" property to false
// prevents this.
// All other known open-source stax parsers (and the bea ref impl)
// have thread-safe factories.
inputFactory.setProperty(""reuse-instance"", Boolean.FALSE);
}
catch (IllegalArgumentException ex) {
// Other implementations will likely throw this exception since ""reuse-instance""
// isimplementation specific.
log.debug(""Unable to set the 'reuse-instance' property for the input chain: "" + inputFactory);
}
inputFactory.setXMLReporter(xmllog);
xsltCacheLifetimeSeconds = XSLT_CACHE_DEFAULT;
if(args != null) {
xsltCacheLifetimeSeconds = args.getInt(XSLT_CACHE_PARAM,XSLT_CACHE_DEFAULT);
log.info(""xsltCacheLifetimeSeconds="" + xsltCacheLifetimeSeconds);
}
return this;
}
"
229,1," protected void execute() {
Arrays.asList(controllersListStrings).forEach(
cInfoString -> controllers.add(parseCInfoString(cInfoString)));
DriverService service = get(DriverService.class);
deviceId = DeviceId.deviceId(uri);
DriverHandler h = service.createHandler(deviceId);
ControllerConfig config = h.behaviour(ControllerConfig.class);
print(""before:"");
config.getControllers().forEach(c -> print(c.target()));
try {
if (removeAll) {
if (!controllers.isEmpty()) {
print(""Controllers list should be empty to remove all controllers"");
} else {
List<ControllerInfo> controllersToRemove = config.getControllers();
controllersToRemove.forEach(c -> print(""Will remove "" + c.target()));
config.removeControllers(controllersToRemove);
}
} else {
if (controllers.isEmpty()) {
print(""Controllers list is empty, cannot set/remove empty controllers"");
} else {
if (removeCont) {
print(""Will remove specified controllers"");
config.removeControllers(controllers);
} else {
print(""Will add specified controllers"");
config.setControllers(controllers);
}
}
}
} catch (NullPointerException e) {
print(""No Device with requested parameters {} "", uri);
}
print(""after:"");
config.getControllers().forEach(c -> print(c.target()));
print(""size %d"", config.getControllers().size());
}
"
230,1," protected boolean parseChunkHeader()
throws IOException {
int result = 0;
boolean eol = false;
boolean readDigit = false;
boolean trailer = false;
while (!eol) {
if (pos >= lastValid) {
if (readBytes() <= 0)
return false;
}
if (buf[pos] == Constants.CR || buf[pos] == Constants.LF) {
parseCRLF(false);
eol = true;
} else if (buf[pos] == Constants.SEMI_COLON) {
trailer = true;
} else if (!trailer) {
//don't read data after the trailer
int charValue = HexUtils.getDec(buf[pos]);
if (charValue != -1) {
readDigit = true;
result *= 16;
result += charValue;
} else {
//we shouldn't allow invalid, non hex characters
//in the chunked header
return false;
}
}
// Parsing the CRLF increments pos
if (!eol) {
pos++;
}
}
if (!readDigit)
return false;
if (result == 0)
endChunk = true;
remaining = result;
if (remaining < 0)
return false;
return true;
}
/**
* Parse CRLF at end of chunk.
*
* @param tolerant Should tolerant parsing (LF and CRLF) be used? This
* is recommended (RFC2616, section 19.3) for message
* headers.
*/
"
231,1," private static DocumentBuilder getBuilder() throws ParserConfigurationException {
ClassLoader loader = Thread.currentThread().getContextClassLoader();
if (loader == null) {
loader = DOMUtils.class.getClassLoader();
}
if (loader == null) {
return XMLUtils.getParser();
}
DocumentBuilder builder = DOCUMENT_BUILDERS.get(loader);
if (builder == null) {
builder = XMLUtils.getParser();
DOCUMENT_BUILDERS.put(loader, builder);
}
return builder;
}
/**
* This function is much like getAttribute, but returns null, not """", for a nonexistent attribute.
*
* @param e
* @param attributeName
*/
"
232,1," public void init(Map<String,Object> pluginConfig) {
try {
String delegationTokenEnabled = (String)pluginConfig.getOrDefault(DELEGATION_TOKEN_ENABLED_PROPERTY, ""false"");
authFilter = (Boolean.parseBoolean(delegationTokenEnabled)) ? new HadoopAuthFilter() : new AuthenticationFilter();
// Initialize kerberos before initializing curator instance.
boolean initKerberosZk = Boolean.parseBoolean((String)pluginConfig.getOrDefault(INIT_KERBEROS_ZK, ""false""));
if (initKerberosZk) {
(new Krb5HttpClientBuilder()).getBuilder();
}
FilterConfig conf = getInitFilterConfig(pluginConfig);
authFilter.init(conf);
} catch (ServletException e) {
throw new SolrException(ErrorCode.SERVER_ERROR, ""Error initializing "" + getClass().getName() + "": ""+e);
}
}
@SuppressWarnings(""unchecked"")
"
233,1," public void addRecipients(final ExtendedEmailPublisherContext context, EnvVars env, Set<InternetAddress> to, Set<InternetAddress> cc, Set<InternetAddress> bcc) {
final class Debug implements RecipientProviderUtilities.IDebug {
private final ExtendedEmailPublisherDescriptor descriptor
= Jenkins.getActiveInstance().getDescriptorByType(ExtendedEmailPublisherDescriptor.class);
private final PrintStream logger = context.getListener().getLogger();
public void send(final String format, final Object... args) {
descriptor.debug(logger, format, args);
}
}
final Debug debug = new Debug();
debug.send(""Sending email to upstream committer(s)."");
Run<?, ?> cur;
Cause.UpstreamCause upc = context.getRun().getCause(Cause.UpstreamCause.class);
while (upc != null) {
Job<?, ?> p = (Job<?, ?>) Jenkins.getActiveInstance().getItemByFullName(upc.getUpstreamProject());
if(p == null) {
context.getListener().getLogger().print(""There is a break in the project linkage, could not retrieve upstream project information"");
break;
}
cur = p.getBuildByNumber(upc.getUpstreamBuild());
upc = cur.getCause(Cause.UpstreamCause.class);
addUpstreamCommittersTriggeringBuild(cur, to, cc, bcc, env, context.getListener(), debug);
}
}
/**
* Adds for the given upstream build the committers to the recipient list for each commit in the upstream build.
*
* @param build the upstream build
* @param to the to recipient list
* @param cc the cc recipient list
* @param bcc the bcc recipient list
* @param env
* @param listener
*/
"
234,1," public void test_noVerification() throws Exception {
// Sign a JWT and then attempt to verify it using None.
JWT jwt = new JWT().setSubject(""art"");
String encodedJWT = JWT.getEncoder().encode(jwt, HMACSigner.newSHA256Signer(""secret""));
expectException(MissingVerifierException.class, ()
-> JWT.getDecoder().decode(encodedJWT));
}
@Test
"
235,1," protected void configure(HttpSecurity http) throws Exception {
// This config is also on UrlAuthorizationConfigurer javadoc
http
.apply(new UrlAuthorizationConfigurer<HttpSecurity>()).getRegistry()
.antMatchers(""/users**"",""/sessions/**"").hasRole(""USER"")
.antMatchers(""/signup"").hasRole(""ANONYMOUS"")
.anyRequest().hasRole(""USER"");
}
// @formatter:on
"
236,1," public void register(ContainerBuilder builder, LocatableProperties props)
throws ConfigurationException {
builder.factory(com.opensymphony.xwork2.ObjectFactory.class)
.factory(ActionProxyFactory.class, DefaultActionProxyFactory.class, Scope.SINGLETON)
.factory(ObjectTypeDeterminer.class, DefaultObjectTypeDeterminer.class, Scope.SINGLETON)
.factory(XWorkConverter.class, Scope.SINGLETON)
.factory(XWorkBasicConverter.class, Scope.SINGLETON)
.factory(ConversionPropertiesProcessor.class, DefaultConversionPropertiesProcessor.class, Scope.SINGLETON)
.factory(ConversionFileProcessor.class, DefaultConversionFileProcessor.class, Scope.SINGLETON)
.factory(ConversionAnnotationProcessor.class, DefaultConversionAnnotationProcessor.class, Scope.SINGLETON)
.factory(TypeConverterCreator.class, DefaultTypeConverterCreator.class, Scope.SINGLETON)
.factory(TypeConverterHolder.class, DefaultTypeConverterHolder.class, Scope.SINGLETON)
.factory(FileManager.class, ""system"", DefaultFileManager.class, Scope.SINGLETON)
.factory(FileManagerFactory.class, DefaultFileManagerFactory.class, Scope.SINGLETON)
.factory(ValueStackFactory.class, OgnlValueStackFactory.class, Scope.SINGLETON)
.factory(ValidatorFactory.class, DefaultValidatorFactory.class, Scope.SINGLETON)
.factory(ValidatorFileParser.class, DefaultValidatorFileParser.class, Scope.SINGLETON)
.factory(PatternMatcher.class, WildcardHelper.class, Scope.SINGLETON)
.factory(ReflectionProvider.class, OgnlReflectionProvider.class, Scope.SINGLETON)
.factory(ReflectionContextFactory.class, OgnlReflectionContextFactory.class, Scope.SINGLETON)
.factory(PropertyAccessor.class, CompoundRoot.class.getName(), CompoundRootAccessor.class, Scope.SINGLETON)
.factory(PropertyAccessor.class, Object.class.getName(), ObjectAccessor.class, Scope.SINGLETON)
.factory(PropertyAccessor.class, Iterator.class.getName(), XWorkIteratorPropertyAccessor.class, Scope.SINGLETON)
.factory(PropertyAccessor.class, Enumeration.class.getName(), XWorkEnumerationAccessor.class, Scope.SINGLETON)
.factory(UnknownHandlerManager.class, DefaultUnknownHandlerManager.class, Scope.SINGLETON)
// silly workarounds for ognl since there is no way to flush its caches
.factory(PropertyAccessor.class, List.class.getName(), XWorkListPropertyAccessor.class, Scope.SINGLETON)
.factory(PropertyAccessor.class, ArrayList.class.getName(), XWorkListPropertyAccessor.class, Scope.SINGLETON)
.factory(PropertyAccessor.class, HashSet.class.getName(), XWorkCollectionPropertyAccessor.class, Scope.SINGLETON)
.factory(PropertyAccessor.class, Set.class.getName(), XWorkCollectionPropertyAccessor.class, Scope.SINGLETON)
.factory(PropertyAccessor.class, HashMap.class.getName(), XWorkMapPropertyAccessor.class, Scope.SINGLETON)
.factory(PropertyAccessor.class, Map.class.getName(), XWorkMapPropertyAccessor.class, Scope.SINGLETON)
.factory(PropertyAccessor.class, Collection.class.getName(), XWorkCollectionPropertyAccessor.class, Scope.SINGLETON)
.factory(PropertyAccessor.class, ObjectProxy.class.getName(), ObjectProxyPropertyAccessor.class, Scope.SINGLETON)
.factory(MethodAccessor.class, Object.class.getName(), XWorkMethodAccessor.class, Scope.SINGLETON)
.factory(MethodAccessor.class, CompoundRoot.class.getName(), CompoundRootAccessor.class, Scope.SINGLETON)
.factory(TextParser.class, OgnlTextParser.class, Scope.SINGLETON)
.factory(NullHandler.class, Object.class.getName(), InstantiatingNullHandler.class, Scope.SINGLETON)
.factory(ActionValidatorManager.class, AnnotationActionValidatorManager.class, Scope.SINGLETON)
.factory(ActionValidatorManager.class, ""no-annotations"", DefaultActionValidatorManager.class, Scope.SINGLETON)
.factory(TextProvider.class, ""system"", DefaultTextProvider.class, Scope.SINGLETON)
.factory(TextProvider.class, TextProviderSupport.class, Scope.SINGLETON)
.factory(LocaleProvider.class, DefaultLocaleProvider.class, Scope.SINGLETON)
.factory(OgnlUtil.class, Scope.SINGLETON)
.factory(CollectionConverter.class, Scope.SINGLETON)
.factory(ArrayConverter.class, Scope.SINGLETON)
.factory(DateConverter.class, Scope.SINGLETON)
.factory(NumberConverter.class, Scope.SINGLETON)
.factory(StringConverter.class, Scope.SINGLETON);
props.setProperty(XWorkConstants.DEV_MODE, Boolean.FALSE.toString());
props.setProperty(XWorkConstants.LOG_MISSING_PROPERTIES, Boolean.FALSE.toString());
props.setProperty(XWorkConstants.ENABLE_OGNL_EXPRESSION_CACHE, Boolean.TRUE.toString());
props.setProperty(XWorkConstants.RELOAD_XML_CONFIGURATION, Boolean.FALSE.toString());
}
"
237,1," public void fireOnComplete() {
List<AsyncListenerWrapper> listenersCopy = new ArrayList<>();
listenersCopy.addAll(listeners);
ClassLoader oldCL = context.bind(Globals.IS_SECURITY_ENABLED, null);
try {
for (AsyncListenerWrapper listener : listenersCopy) {
try {
listener.fireOnComplete(event);
} catch (Throwable t) {
ExceptionUtils.handleThrowable(t);
log.warn(""onComplete() failed for listener of type ["" +
listener.getClass().getName() + ""]"", t);
}
}
} finally {
context.fireRequestDestroyEvent(request);
clearServletRequestResponse();
context.unbind(Globals.IS_SECURITY_ENABLED, oldCL);
}
}
"
238,1," public void testExcludedTrickyParameters() throws Exception {
Map<String, Object> params = new HashMap<String, Object>() {
{
put(""blah"", ""This is blah"");
put(""name"", ""try_1"");
put(""(name)"", ""try_2"");
put(""['name']"", ""try_3"");
put(""['na' + 'me']"", ""try_4"");
put(""{name}[0]"", ""try_5"");
put(""(new string{'name'})[0]"", ""try_6"");
put(""#{key: 'name'}.key"", ""try_7"");
}
};
HashMap<String, Object> extraContext = new HashMap<String, Object>();
extraContext.put(ActionContext.PARAMETERS, params);
ActionProxy proxy = actionProxyFactory.createActionProxy("""", MockConfigurationProvider.PARAM_INTERCEPTOR_ACTION_NAME, extraContext);
ActionConfig config = configuration.getRuntimeConfiguration().getActionConfig("""", MockConfigurationProvider.PARAM_INTERCEPTOR_ACTION_NAME);
ParametersInterceptor pi =(ParametersInterceptor) config.getInterceptors().get(0).getInterceptor();
pi.setExcludeParams(""name"");
proxy.execute();
SimpleAction action = (SimpleAction) proxy.getAction();
assertNull(action.getName());
assertEquals(""This is blah"", (action).getBlah());
}
"
239,1," protected BindResult process(final LDAPConnection connection, final int depth)
throws LDAPException
{
if (connection.synchronousMode())
{
@SuppressWarnings(""deprecation"")
final boolean autoReconnect =
connection.getConnectionOptions().autoReconnect();
return processSync(connection, autoReconnect);
}
// See if a bind DN was provided without a password. If that is the case
// and this should not be allowed, then throw an exception.
if (password != null)
{
if ((bindDN.getValue().length > 0) && (password.getValue().length == 0) &&
connection.getConnectionOptions().bindWithDNRequiresPassword())
{
final LDAPException le = new LDAPException(ResultCode.PARAM_ERROR,
ERR_SIMPLE_BIND_DN_WITHOUT_PASSWORD.get());
debugCodingError(le);
throw le;
}
}
// Create the LDAP message.
messageID = connection.nextMessageID();
final LDAPMessage message = new LDAPMessage(messageID, this, getControls());
// Register with the connection reader to be notified of responses for the
// request that we've created.
connection.registerResponseAcceptor(messageID, this);
try
{
// Send the request to the server.
final long responseTimeout = getResponseTimeoutMillis(connection);
debugLDAPRequest(Level.INFO, this, messageID, connection);
final long requestTime = System.nanoTime();
connection.getConnectionStatistics().incrementNumBindRequests();
connection.sendMessage(message, responseTimeout);
// Wait for and process the response.
final LDAPResponse response;
try
{
if (responseTimeout > 0)
{
response = responseQueue.poll(responseTimeout, TimeUnit.MILLISECONDS);
}
else
{
response = responseQueue.take();
}
}
catch (final InterruptedException ie)
{
debugException(ie);
Thread.currentThread().interrupt();
throw new LDAPException(ResultCode.LOCAL_ERROR,
ERR_BIND_INTERRUPTED.get(connection.getHostPort()), ie);
}
return handleResponse(connection, response, requestTime, false);
}
finally
{
connection.deregisterResponseAcceptor(messageID);
}
}
/**
* Processes this bind operation in synchronous mode, in which the same
* thread will send the request and read the response.
*
* @param connection The connection to use to communicate with the directory
* server.
* @param allowRetry Indicates whether the request may be re-tried on a
* re-established connection if the initial attempt fails
* in a way that indicates the connection is no longer
* valid and autoReconnect is true.
*
* @return An LDAP result object that provides information about the result
* of the bind processing.
*
* @throws LDAPException If a problem occurs while sending the request or
* reading the response.
*/
"
240,1," public Set<ControllerServiceNode> getControllerServices(final boolean recursive) {
readLock.lock();
try {
final Set<ControllerServiceNode> services = new HashSet<>();
services.addAll(controllerServices.values());
if (recursive && parent.get() != null) {
services.addAll(parent.get().getControllerServices(true));
}
return services;
} finally {
readLock.unlock();
}
}
@Override
"
241,1," public boolean getValidateClientProvidedNewSessionId() {
return validateClientProvidedNewSessionId;
}
@Override
"
242,1," private static void doZipDir(File dir, ZipOutputStream out) throws IOException {
File[] children = dir.listFiles();
if (children == null) {
throw new IllegalStateException(""Fail to list files of directory "" + dir.getAbsolutePath());
}
for (File child : children) {
doZip(child.getName(), child, out);
}
}
/**
* @see #unzip(File, File, Predicate)
* @deprecated replaced by {@link Predicate<ZipEntry>} in 6.2.
*/
@Deprecated
@FunctionalInterface
"
243,1," public H and() {
return ChannelSecurityConfigurer.this.and();
}
"
244,1," public boolean isLockoutEnabled() {
return countFailuresWithin > 0;
}
"
245,1," protected synchronized void authenticatorConfig() {
// Always need an authenticator to support @ServletSecurity annotations
LoginConfig loginConfig = context.getLoginConfig();
if (loginConfig == null) {
loginConfig = DUMMY_LOGIN_CONFIG;
context.setLoginConfig(loginConfig);
}
// Has an authenticator been configured already?
if (context.getAuthenticator() != null)
return;
if (!(context instanceof ContainerBase)) {
return; // Cannot install a Valve even if it would be needed
}
// Has a Realm been configured for us to authenticate against?
if (context.getRealm() == null) {
log.error(sm.getString(""contextConfig.missingRealm""));
ok = false;
return;
}
/*
* First check to see if there is a custom mapping for the login
* method. If so, use it. Otherwise, check if there is a mapping in
* org/apache/catalina/startup/Authenticators.properties.
*/
Valve authenticator = null;
if (customAuthenticators != null) {
authenticator = (Valve)
customAuthenticators.get(loginConfig.getAuthMethod());
}
if (authenticator == null) {
// Load our mapping properties if necessary
if (authenticators == null) {
try {
InputStream is=this.getClass().getClassLoader().getResourceAsStream(""org/apache/catalina/startup/Authenticators.properties"");
if( is!=null ) {
authenticators = new Properties();
authenticators.load(is);
} else {
log.error(sm.getString(
""contextConfig.authenticatorResources""));
ok=false;
return;
}
} catch (IOException e) {
log.error(sm.getString(
""contextConfig.authenticatorResources""), e);
ok = false;
return;
}
}
// Identify the class name of the Valve we should configure
String authenticatorName = null;
authenticatorName =
authenticators.getProperty(loginConfig.getAuthMethod());
if (authenticatorName == null) {
log.error(sm.getString(""contextConfig.authenticatorMissing"",
loginConfig.getAuthMethod()));
ok = false;
return;
}
// Instantiate and install an Authenticator of the requested class
try {
Class<?> authenticatorClass = Class.forName(authenticatorName);
authenticator = (Valve) authenticatorClass.newInstance();
} catch (Throwable t) {
ExceptionUtils.handleThrowable(t);
log.error(sm.getString(
""contextConfig.authenticatorInstantiate"",
authenticatorName),
t);
ok = false;
}
}
if (authenticator != null && context instanceof ContainerBase) {
Pipeline pipeline = ((ContainerBase) context).getPipeline();
if (pipeline != null) {
((ContainerBase) context).getPipeline().addValve(authenticator);
if (log.isDebugEnabled()) {
log.debug(sm.getString(
""contextConfig.authenticatorConfigured"",
loginConfig.getAuthMethod()));
}
}
}
}
/**
* Create (if necessary) and return a Digester configured to process the
* web application deployment descriptor (web.xml).
*/
"
246,1," private void processInternal(Exchange exchange, AsyncCallback callback) throws Exception {
// creating the url to use takes 2-steps
String url = HttpHelper.createURL(exchange, getEndpoint());
URI uri = HttpHelper.createURI(exchange, url, getEndpoint());
// get the url from the uri
url = uri.toASCIIString();
// execute any custom url rewrite
String rewriteUrl = HttpHelper.urlRewrite(exchange, url, getEndpoint(), this);
if (rewriteUrl != null) {
// update url and query string from the rewritten url
url = rewriteUrl;
}
String methodName = HttpHelper.createMethod(exchange, getEndpoint(), exchange.getIn().getBody() != null).name();
JettyContentExchange httpExchange = getEndpoint().createContentExchange();
httpExchange.init(exchange, getBinding(), client, callback);
httpExchange.setURL(url); // Url has to be set first
httpExchange.setMethod(methodName);
if (getEndpoint().getHttpClientParameters() != null) {
// For jetty 9 these parameters can not be set on the client
// so we need to set them on the httpExchange
String timeout = (String)getEndpoint().getHttpClientParameters().get(""timeout"");
if (timeout != null) {
httpExchange.setTimeout(new Long(timeout));
}
String supportRedirect = (String)getEndpoint().getHttpClientParameters().get(""supportRedirect"");
if (supportRedirect != null) {
httpExchange.setSupportRedirect(Boolean.valueOf(supportRedirect));
}
}
LOG.trace(""Using URL: {} with method: {}"", url, methodName);
// if there is a body to send as data
if (exchange.getIn().getBody() != null) {
String contentType = ExchangeHelper.getContentType(exchange);
if (contentType != null) {
httpExchange.setRequestContentType(contentType);
}
if (contentType != null && HttpConstants.CONTENT_TYPE_JAVA_SERIALIZED_OBJECT.equals(contentType)) {
// serialized java object
Serializable obj = exchange.getIn().getMandatoryBody(Serializable.class);
// write object to output stream
ByteArrayOutputStream bos = new ByteArrayOutputStream();
try {
HttpHelper.writeObjectToStream(bos, obj);
httpExchange.setRequestContent(bos.toByteArray());
} finally {
IOHelper.close(bos, ""body"", LOG);
}
} else {
Object body = exchange.getIn().getBody();
if (body instanceof String) {
String data = (String) body;
// be a bit careful with String as any type can most likely be converted to String
// so we only do an instanceof check and accept String if the body is really a String
// do not fallback to use the default charset as it can influence the request
// (for example application/x-www-form-urlencoded forms being sent)
String charset = IOHelper.getCharsetName(exchange, false);
httpExchange.setRequestContent(data, charset);
} else {
// then fallback to input stream
InputStream is = exchange.getContext().getTypeConverter().mandatoryConvertTo(InputStream.class, exchange, exchange.getIn().getBody());
httpExchange.setRequestContent(is);
// setup the content length if it is possible
String length = exchange.getIn().getHeader(Exchange.CONTENT_LENGTH, String.class);
if (ObjectHelper.isNotEmpty(length)) {
httpExchange.addRequestHeader(Exchange.CONTENT_LENGTH, length);
}
}
}
}
// if we bridge endpoint then we need to skip matching headers with the HTTP_QUERY to avoid sending
// duplicated headers to the receiver, so use this skipRequestHeaders as the list of headers to skip
Map<String, Object> skipRequestHeaders = null;
if (getEndpoint().isBridgeEndpoint()) {
exchange.setProperty(Exchange.SKIP_GZIP_ENCODING, Boolean.TRUE);
String queryString = exchange.getIn().getHeader(Exchange.HTTP_QUERY, String.class);
if (queryString != null) {
skipRequestHeaders = URISupport.parseQuery(queryString, false, true);
}
// Need to remove the Host key as it should be not used
exchange.getIn().getHeaders().remove(""host"");
}
// propagate headers as HTTP headers
Message in = exchange.getIn();
HeaderFilterStrategy strategy = getEndpoint().getHeaderFilterStrategy();
for (Map.Entry<String, Object> entry : in.getHeaders().entrySet()) {
String key = entry.getKey();
Object headerValue = in.getHeader(key);
if (headerValue != null) {
// use an iterator as there can be multiple values. (must not use a delimiter, and allow empty values)
final Iterator<?> it = ObjectHelper.createIterator(headerValue, null, true);
// the values to add as a request header
final List<String> values = new ArrayList<String>();
// if its a multi value then check each value if we can add it and for multi values they
// should be combined into a single value
while (it.hasNext()) {
String value = exchange.getContext().getTypeConverter().convertTo(String.class, it.next());
// we should not add headers for the parameters in the uri if we bridge the endpoint
// as then we would duplicate headers on both the endpoint uri, and in HTTP headers as well
if (skipRequestHeaders != null && skipRequestHeaders.containsKey(key)) {
continue;
}
if (value != null && strategy != null && !strategy.applyFilterToCamelHeaders(key, value, exchange)) {
values.add(value);
}
}
// add the value(s) as a http request header
if (values.size() > 0) {
// use the default toString of a ArrayList to create in the form [xxx, yyy]
// if multi valued, for a single value, then just output the value as is
String s = values.size() > 1 ? values.toString() : values.get(0);
httpExchange.addRequestHeader(key, s);
}
}
}
// set the callback, which will handle all the response logic
if (LOG.isDebugEnabled()) {
LOG.debug(""Sending HTTP request to: {}"", httpExchange.getUrl());
}
httpExchange.send(client);
}
"
247,1," public void send(final String format, final Object... args) {
descriptor.debug(logger, format, args);
}
}
final Debug debug = new Debug();
Set<User> users = null;
final Run<?, ?> currentRun = context.getRun();
if (currentRun == null) {
debug.send(""currentRun was null"");
} else {
if (!Objects.equals(currentRun.getResult(), Result.FAILURE)) {
debug.send(""currentBuild did not fail"");
} else {
users = new HashSet<>();
debug.send(""Collecting builds with suspects..."");
final HashSet<Run<?, ?>> buildsWithSuspects = new HashSet<>();
Run<?, ?> firstFailedBuild = currentRun;
Run<?, ?> candidate = currentRun;
while (candidate != null) {
final Result candidateResult = candidate.getResult();
if ( candidateResult == null || !candidateResult.isWorseOrEqualTo(Result.FAILURE) ) {
break;
}
firstFailedBuild = candidate;
candidate = candidate.getPreviousCompletedBuild();
}
if (firstFailedBuild instanceof AbstractBuild) {
buildsWithSuspects.add(firstFailedBuild);
} else {
debug.send("" firstFailedBuild was not an instance of AbstractBuild"");
}
debug.send(""Collecting suspects..."");
users.addAll(RecipientProviderUtilities.getChangeSetAuthors(buildsWithSuspects, debug));
users.addAll(RecipientProviderUtilities.getUsersTriggeringTheBuilds(buildsWithSuspects, debug));
}
}
if (users != null) {
RecipientProviderUtilities.addUsers(users, context.getListener(), env, to, cc, bcc, debug);
}
}
@Extension
public static final class DescriptorImpl extends RecipientProviderDescriptor {
@Override
public String getDisplayName() {
return ""Suspects Causing the Build to Begin Failing"";
}
}
}
"
248,1," public Document getMetaData(Idp config) throws RuntimeException {
//Return as text/xml
try {
Crypto crypto = CertsUtils.createCrypto(config.getCertificate());
ByteArrayOutputStream bout = new ByteArrayOutputStream(4096);
Writer streamWriter = new OutputStreamWriter(bout, ""UTF-8"");
XMLStreamWriter writer = XML_OUTPUT_FACTORY.createXMLStreamWriter(streamWriter);
writer.writeStartDocument(""UTF-8"", ""1.0"");
String referenceID = IDGenerator.generateID(""_"");
writer.writeStartElement(""md"", ""EntityDescriptor"", SAML2_METADATA_NS);
writer.writeAttribute(""ID"", referenceID);
writer.writeAttribute(""entityID"", config.getIdpUrl().toString());
writer.writeNamespace(""md"", SAML2_METADATA_NS);
writer.writeNamespace(""fed"", WS_FEDERATION_NS);
writer.writeNamespace(""wsa"", WS_ADDRESSING_NS);
writer.writeNamespace(""auth"", WS_FEDERATION_NS);
writer.writeNamespace(""xsi"", SCHEMA_INSTANCE_NS);
writeFederationMetadata(writer, config, crypto);
writer.writeEndElement(); // EntityDescriptor
writer.writeEndDocument();
streamWriter.flush();
bout.flush();
if (LOG.isDebugEnabled()) {
String out = new String(bout.toByteArray());
LOG.debug(""***************** unsigned ****************"");
LOG.debug(out);
LOG.debug(""***************** unsigned ****************"");
}
InputStream is = new ByteArrayInputStream(bout.toByteArray());
Document result = SignatureUtils.signMetaInfo(crypto, null, config.getCertificatePassword(), is, referenceID);
if (result != null) {
return result;
} else {
throw new RuntimeException(""Failed to sign the metadata document: result=null"");
}
} catch (RuntimeException e) {
throw e;
} catch (Exception e) {
LOG.error(""Error creating service metadata information "", e);
throw new RuntimeException(""Error creating service metadata information: "" + e.getMessage());
}
}
"
249,1," public void chaosSnapshotTest() throws Exception {
final List<String> indices = new CopyOnWriteArrayList<>();
Settings settings = settingsBuilder().put(""action.write_consistency"", ""one"").build();
int initialNodes = between(1, 3);
logger.info(""--> start {} nodes"", initialNodes);
for (int i = 0; i < initialNodes; i++) {
internalCluster().startNode(settings);
}
logger.info(""--> creating repository"");
assertAcked(client().admin().cluster().preparePutRepository(""test-repo"")
.setType(""fs"").setSettings(ImmutableSettings.settingsBuilder()
.put(""location"", newTempDir(LifecycleScope.SUITE))
.put(""compress"", randomBoolean())
.put(""chunk_size"", randomIntBetween(100, 1000))));
int initialIndices = between(1, 3);
logger.info(""--> create {} indices"", initialIndices);
for (int i = 0; i < initialIndices; i++) {
createTestIndex(""test-"" + i);
indices.add(""test-"" + i);
}
int asyncNodes = between(0, 5);
logger.info(""--> start {} additional nodes asynchronously"", asyncNodes);
ListenableFuture<List<String>> asyncNodesFuture = internalCluster().startNodesAsync(asyncNodes, settings);
int asyncIndices = between(0, 10);
logger.info(""--> create {} additional indices asynchronously"", asyncIndices);
Thread[] asyncIndexThreads = new Thread[asyncIndices];
for (int i = 0; i < asyncIndices; i++) {
final int cur = i;
asyncIndexThreads[i] = new Thread(new Runnable() {
@Override
public void run() {
createTestIndex(""test-async-"" + cur);
indices.add(""test-async-"" + cur);
}
});
asyncIndexThreads[i].start();
}
logger.info(""--> snapshot"");
ListenableActionFuture<CreateSnapshotResponse> snapshotResponseFuture = client().admin().cluster().prepareCreateSnapshot(""test-repo"", ""test-snap"").setWaitForCompletion(true).setIndices(""test-*"").setPartial(true).execute();
long start = System.currentTimeMillis();
// Produce chaos for 30 sec or until snapshot is done whatever comes first
int randomIndices = 0;
while (System.currentTimeMillis() - start < 30000 && !snapshotIsDone(""test-repo"", ""test-snap"")) {
Thread.sleep(100);
int chaosType = randomInt(10);
if (chaosType < 4) {
// Randomly delete an index
if (indices.size() > 0) {
String index = indices.remove(randomInt(indices.size() - 1));
logger.info(""--> deleting random index [{}]"", index);
internalCluster().wipeIndices(index);
}
} else if (chaosType < 6) {
// Randomly shutdown a node
if (cluster().size() > 1) {
logger.info(""--> shutting down random node"");
internalCluster().stopRandomDataNode();
}
} else if (chaosType < 8) {
// Randomly create an index
String index = ""test-rand-"" + randomIndices;
logger.info(""--> creating random index [{}]"", index);
createTestIndex(index);
randomIndices++;
} else {
// Take a break
logger.info(""--> noop"");
}
}
logger.info(""--> waiting for async indices creation to finish"");
for (int i = 0; i < asyncIndices; i++) {
asyncIndexThreads[i].join();
}
logger.info(""--> update index settings to back to normal"");
assertAcked(client().admin().indices().prepareUpdateSettings(""test-*"").setSettings(ImmutableSettings.builder()
.put(AbstractIndexStore.INDEX_STORE_THROTTLE_TYPE, ""node"")
));
// Make sure that snapshot finished - doesn't matter if it failed or succeeded
try {
CreateSnapshotResponse snapshotResponse = snapshotResponseFuture.get();
SnapshotInfo snapshotInfo = snapshotResponse.getSnapshotInfo();
assertNotNull(snapshotInfo);
logger.info(""--> snapshot is done with state [{}], total shards [{}], successful shards [{}]"", snapshotInfo.state(), snapshotInfo.totalShards(), snapshotInfo.successfulShards());
} catch (Exception ex) {
logger.info(""--> snapshot didn't start properly"", ex);
}
asyncNodesFuture.get();
logger.info(""--> done"");
}
"
250,1," public Principal authenticate(String username, String credentials) {
// No user or no credentials
// Can't possibly authenticate, don't bother the database then
if (username == null || credentials == null) {
if (log.isDebugEnabled())
log.debug(sm.getString(""memoryRealm.authenticateFailure"", username));
return null;
}
GenericPrincipal principal = principals.get(username);
if(principal == null || principal.getPassword() == null) {
// User was not found in the database of the password was null
if (log.isDebugEnabled())
log.debug(sm.getString(""memoryRealm.authenticateFailure"", username));
return null;
}
boolean validated = getCredentialHandler().matches(credentials, principal.getPassword());
if (validated) {
if (log.isDebugEnabled())
log.debug(sm.getString(""memoryRealm.authenticateSuccess"", username));
return principal;
} else {
if (log.isDebugEnabled())
log.debug(sm.getString(""memoryRealm.authenticateFailure"", username));
return null;
}
}
// -------------------------------------------------------- Package Methods
/**
* Add a new user to the in-memory database.
*
* @param username User's username
* @param password User's password (clear text)
* @param roles Comma-delimited set of roles associated with this user
*/
"
251,1," public Object getValue(Object o) {
if ( location.getMember() == null ) {
return o;
}
else {
return ReflectionHelper.getValue( location.getMember(), o );
}
}
@Override
"
252,1," private String buildErrorMessage(Throwable e, Object[] args) {
String errorKey = ""struts.message.upload.error."" + e.getClass().getSimpleName();
if (LOG.isDebugEnabled())
LOG.debug(""Preparing error message for key: [#0]"", errorKey);
return LocalizedTextUtil.findText(this.getClass(), errorKey, defaultLocale, e.getMessage(), args);
}
/**
* Build action message.
*
* @param e
* @param args
* @return
*/
"
253,1," private void resetContext() throws Exception {
// Restore the original state ( pre reading web.xml in start )
// If you extend this - override this method and make sure to clean up
// Don't reset anything that is read from a <Context.../> element since
// <Context .../> elements are read at initialisation will not be read
// again for this object
children = new HashMap<String, Container>();
startupTime = 0;
startTime = 0;
tldScanTime = 0;
// Bugzilla 32867
distributable = false;
applicationListeners = new String[0];
applicationEventListenersObjects = new Object[0];
applicationLifecycleListenersObjects = new Object[0];
jspConfigDescriptor = new ApplicationJspConfigDescriptor();
initializers.clear();
if(log.isDebugEnabled())
log.debug(""resetContext "" + getObjectName());
}
/**
* Return a String representation of this component.
*/
@Override
"
254,1," public void testRestoreToShadow() throws ExecutionException, InterruptedException {
Settings nodeSettings = nodeSettings();
internalCluster().startNodesAsync(3, nodeSettings).get();
final Path dataPath = newTempDir().toPath();
Settings idxSettings = ImmutableSettings.builder()
.put(IndexMetaData.SETTING_NUMBER_OF_SHARDS, 1)
.put(IndexMetaData.SETTING_NUMBER_OF_REPLICAS, 0).build();
assertAcked(prepareCreate(""foo"").setSettings(idxSettings));
ensureGreen();
final int numDocs = randomIntBetween(10, 100);
for (int i = 0; i < numDocs; i++) {
client().prepareIndex(""foo"", ""doc"", """"+i).setSource(""foo"", ""bar"").get();
}
assertNoFailures(client().admin().indices().prepareFlush().setForce(true).setWaitIfOngoing(true).execute().actionGet());
assertAcked(client().admin().cluster().preparePutRepository(""test-repo"")
.setType(""fs"").setSettings(ImmutableSettings.settingsBuilder()
.put(""location"", newTempDir().toPath())));
CreateSnapshotResponse createSnapshotResponse = client().admin().cluster().prepareCreateSnapshot(""test-repo"", ""test-snap"").setWaitForCompletion(true).setIndices(""foo"").get();
assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), greaterThan(0));
assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), equalTo(createSnapshotResponse.getSnapshotInfo().totalShards()));
assertThat(client().admin().cluster().prepareGetSnapshots(""test-repo"").setSnapshots(""test-snap"").get().getSnapshots().get(0).state(), equalTo(SnapshotState.SUCCESS));
Settings shadowSettings = ImmutableSettings.builder()
.put(IndexMetaData.SETTING_DATA_PATH, dataPath.toAbsolutePath().toString())
.put(IndexMetaData.SETTING_SHADOW_REPLICAS, true)
.put(IndexMetaData.SETTING_SHARED_FILESYSTEM, true)
.put(IndexMetaData.SETTING_NUMBER_OF_REPLICAS, 2).build();
logger.info(""--> restore the index into shadow replica index"");
RestoreSnapshotResponse restoreSnapshotResponse = client().admin().cluster().prepareRestoreSnapshot(""test-repo"", ""test-snap"")
.setIndexSettings(shadowSettings).setWaitForCompletion(true)
.setRenamePattern(""(.+)"").setRenameReplacement(""$1-copy"")
.execute().actionGet();
assertThat(restoreSnapshotResponse.getRestoreInfo().totalShards(), greaterThan(0));
ensureGreen();
refresh();
for (IndicesService service : internalCluster().getDataNodeInstances(IndicesService.class)) {
if (service.hasIndex(""foo-copy"")) {
IndexShard shard = service.indexServiceSafe(""foo-copy"").shard(0);
if (shard.routingEntry().primary()) {
assertFalse(shard instanceof ShadowIndexShard);
} else {
assertTrue(shard instanceof ShadowIndexShard);
}
}
}
logger.info(""--> performing query"");
SearchResponse resp = client().prepareSearch(""foo-copy"").setQuery(matchAllQuery()).get();
assertHitCount(resp, numDocs);
}
@Test
"
255,1," public KeyPair generateKeyPair()
{
if (!initialised)
{
DSAParametersGenerator pGen = new DSAParametersGenerator();
pGen.init(strength, certainty, random);
param = new DSAKeyGenerationParameters(random, pGen.generateParameters());
engine.init(param);
initialised = true;
}
AsymmetricCipherKeyPair pair = engine.generateKeyPair();
DSAPublicKeyParameters pub = (DSAPublicKeyParameters)pair.getPublic();
DSAPrivateKeyParameters priv = (DSAPrivateKeyParameters)pair.getPrivate();
return new KeyPair(new BCDSAPublicKey(pub), new BCDSAPrivateKey(priv));
}
"
256,1," public void testInvalidate() throws IOException {
ProjectWorkspace workspace =
TestDataHelper.createProjectWorkspaceForScenario(this, ""parser_with_cell"", tmp);
workspace.setUp();
// Warm the parser cache.
TestContext context = new TestContext();
ProcessResult runBuckResult =
workspace.runBuckdCommand(context, ""query"", ""deps(//Apps:TestAppsLibrary)"");
runBuckResult.assertSuccess();
assertThat(
runBuckResult.getStdout(),
Matchers.containsString(
""//Apps:TestAppsLibrary\n""
+ ""//Libraries/Dep1:Dep1_1\n""
+ ""//Libraries/Dep1:Dep1_2\n""
+ ""bar//Dep2:Dep2""));
// Save the parser cache to a file.
NamedTemporaryFile tempFile = new NamedTemporaryFile(""parser_data"", null);
runBuckResult =
workspace.runBuckdCommand(context, ""parser-cache"", ""--save"", tempFile.get().toString());
runBuckResult.assertSuccess();
// Write an empty content to Apps/BUCK.
Path path = tmp.getRoot().resolve(""Apps/BUCK"");
byte[] data = {};
Files.write(path, data);
// Write an empty content to Apps/BUCK.
Path invalidationJsonPath = tmp.getRoot().resolve(""invalidation-data.json"");
String jsonData = ""[{\""path\"":\""Apps/BUCK\"",\""status\"":\""M\""}]"";
Files.write(invalidationJsonPath, jsonData.getBytes(StandardCharsets.UTF_8));
context = new TestContext();
// Load the parser cache to a new buckd context.
runBuckResult =
workspace.runBuckdCommand(
context,
""parser-cache"",
""--load"",
tempFile.get().toString(),
""--changes"",
invalidationJsonPath.toString());
runBuckResult.assertSuccess();
// Perform the query again.
try {
workspace.runBuckdCommand(context, ""query"", ""deps(//Apps:TestAppsLibrary)"");
} catch (HumanReadableException e) {
assertThat(
e.getMessage(), Matchers.containsString(""//Apps:TestAppsLibrary could not be found""));
}
}
"
257,1," public void send(final String format, final Object... args) {
descriptor.debug(logger, format, args);
}
}
final Debug debug = new Debug();
Set<User> users = RecipientProviderUtilities.getChangeSetAuthors(Collections.<Run<?, ?>>singleton(context.getRun()), debug);
RecipientProviderUtilities.addUsers(users, context.getListener(), env, to, cc, bcc, debug);
}
@Extension
public static final class DescriptorImpl extends RecipientProviderDescriptor {
@Override
public String getDisplayName() {
return ""Developers"";
}
}
}
"
258,1," public void testRejectBindWithDNButNoPassword()
throws Exception
{
if (! isDirectoryInstanceAvailable())
{
return;
}
LDAPConnection conn = getUnauthenticatedConnection();
SimpleBindRequest bindRequest = new SimpleBindRequest(getTestBindDN(), """");
try
{
bindRequest.process(conn, 1);
fail(""Expected an exception when binding with a DN but no password"");
}
catch (LDAPException le)
{
assertEquals(le.getResultCode(), ResultCode.PARAM_ERROR);
}
// Reconfigure the connection so that it will allow binds with a DN but no
// password.
conn.getConnectionOptions().setBindWithDNRequiresPassword(false);
try
{
bindRequest.process(conn, 1);
}
catch (LDAPException le)
{
// The server will still likely reject the operation, but we should at
// least verify that it wasn't a parameter error.
assertFalse(le.getResultCode() == ResultCode.PARAM_ERROR);
}
conn.getConnectionOptions().setBindWithDNRequiresPassword(true);
conn.close();
}
"
259,1," public LockoutPolicy getLockoutPolicy() {
LockoutPolicy res = IdentityZoneHolder.get().getConfig().getClientLockoutPolicy();
return res.getLockoutAfterFailures() != -1 ? res : defaultLockoutPolicy;
}
@Override
"
260,1," private void detectJPA() {
// check whether we have Persistence on the classpath
Class<?> persistenceClass;
try {
persistenceClass = run( LoadClass.action( PERSISTENCE_CLASS_NAME, this.getClass() ) );
}
catch ( ValidationException e ) {
log.debugf(
""Cannot find %s on classpath. Assuming non JPA 2 environment. All properties will per default be traversable."",
PERSISTENCE_CLASS_NAME
);
return;
}
// check whether Persistence contains getPersistenceUtil
Method persistenceUtilGetter = run( GetMethod.action( persistenceClass, PERSISTENCE_UTIL_METHOD ) );
if ( persistenceUtilGetter == null ) {
log.debugf(
""Found %s on classpath, but no method '%s'. Assuming JPA 1 environment. All properties will per default be traversable."",
PERSISTENCE_CLASS_NAME,
PERSISTENCE_UTIL_METHOD
);
return;
}
// try to invoke the method to make sure that we are dealing with a complete JPA2 implementation
// unfortunately there are several incomplete implementations out there (see HV-374)
try {
Object persistence = run( NewInstance.action( persistenceClass, ""persistence provider"" ) );
ReflectionHelper.getValue(persistenceUtilGetter, persistence );
}
catch ( Exception e ) {
log.debugf(
""Unable to invoke %s.%s. Inconsistent JPA environment. All properties will per default be traversable."",
PERSISTENCE_CLASS_NAME,
PERSISTENCE_UTIL_METHOD
);
}
log.debugf(
""Found %s on classpath containing '%s'. Assuming JPA 2 environment. Trying to instantiate JPA aware TraversableResolver"",
PERSISTENCE_CLASS_NAME,
PERSISTENCE_UTIL_METHOD
);
try {
@SuppressWarnings(""unchecked"")
Class<? extends TraversableResolver> jpaAwareResolverClass = (Class<? extends TraversableResolver>)
run( LoadClass.action( JPA_AWARE_TRAVERSABLE_RESOLVER_CLASS_NAME, this.getClass() ) );
jpaTraversableResolver = run( NewInstance.action( jpaAwareResolverClass, """" ) );
log.debugf(
""Instantiated JPA aware TraversableResolver of type %s."", JPA_AWARE_TRAVERSABLE_RESOLVER_CLASS_NAME
);
}
catch ( ValidationException e ) {
log.debugf(
""Unable to load or instantiate JPA aware resolver %s. All properties will per default be traversable."",
JPA_AWARE_TRAVERSABLE_RESOLVER_CLASS_NAME
);
}
}
@Override
"
261,1," public void addRecipients(final ExtendedEmailPublisherContext context, EnvVars env, Set<InternetAddress> to, Set<InternetAddress> cc, Set<InternetAddress> bcc) {
final class Debug implements RecipientProviderUtilities.IDebug {
private final ExtendedEmailPublisherDescriptor descriptor
= Jenkins.getActiveInstance().getDescriptorByType(ExtendedEmailPublisherDescriptor.class);
private final PrintStream logger = context.getListener().getLogger();
public void send(final String format, final Object... args) {
descriptor.debug(logger, format, args);
}
}
final Debug debug = new Debug();
Run<?,?> run = context.getRun();
final Result runResult = run.getResult();
if (run instanceof AbstractBuild) {
Set<User> users = ((AbstractBuild<?,?>)run).getCulprits();
RecipientProviderUtilities.addUsers(users, context.getListener(), env, to, cc, bcc, debug);
} else if (runResult != null) {
List<Run<?, ?>> builds = new ArrayList<>();
Run<?, ?> build = run;
builds.add(build);
build = build.getPreviousCompletedBuild();
while (build != null) {
final Result buildResult = build.getResult();
if (buildResult != null) {
if (buildResult.isWorseThan(Result.SUCCESS)) {
debug.send(""Including build %s with status %s"", build.getId(), buildResult);
builds.add(build);
} else {
break;
}
}
build = build.getPreviousCompletedBuild();
}
Set<User> users = RecipientProviderUtilities.getChangeSetAuthors(builds, debug);
RecipientProviderUtilities.addUsers(users, context.getListener(), env, to, cc, bcc, debug);
}
}
@Extension
"
262,1," protected boolean isProbablePrime(BigInteger x)
{
/*
* Primes class for FIPS 186-4 C.3 primality checking
*/
return !Primes.hasAnySmallFactors(x) && Primes.isMRProbablePrime(x, param.getRandom(), iterations);
}
"
263,1," public void batchingShardUpdateTaskTest() throws Exception {
final Client client = client();
logger.info(""--> creating repository"");
assertAcked(client.admin().cluster().preparePutRepository(""test-repo"")
.setType(""fs"").setSettings(ImmutableSettings.settingsBuilder()
.put(""location"", newTempDir())
.put(""compress"", randomBoolean())
.put(""chunk_size"", randomIntBetween(100, 1000))));
assertAcked(prepareCreate(""test-idx"", 0, settingsBuilder().put(""number_of_shards"", between(1, 20))
.put(""number_of_replicas"", 0)));
ensureGreen();
logger.info(""--> indexing some data"");
final int numdocs = randomIntBetween(10, 100);
IndexRequestBuilder[] builders = new IndexRequestBuilder[numdocs];
for (int i = 0; i < builders.length; i++) {
builders[i] = client().prepareIndex(""test-idx"", ""type1"", Integer.toString(i)).setSource(""field1"", ""bar "" + i);
}
indexRandom(true, builders);
flushAndRefresh();
final int numberOfShards = getNumShards(""test-idx"").numPrimaries;
logger.info(""number of shards: {}"", numberOfShards);
final ClusterService clusterService = internalCluster().clusterService(internalCluster().getMasterName());
BlockingClusterStateListener snapshotListener = new BlockingClusterStateListener(clusterService, ""update_snapshot ["", ""update snapshot state"", Priority.HIGH);
try {
clusterService.addFirst(snapshotListener);
logger.info(""--> snapshot"");
ListenableActionFuture<CreateSnapshotResponse> snapshotFuture = client.admin().cluster().prepareCreateSnapshot(""test-repo"", ""test-snap"").setWaitForCompletion(true).setIndices(""test-idx"").execute();
// Await until shard updates are in pending state.
assertBusyPendingTasks(""update snapshot state"", numberOfShards);
snapshotListener.unblock();
// Check that the snapshot was successful
CreateSnapshotResponse createSnapshotResponse = snapshotFuture.actionGet();
assertEquals(SnapshotState.SUCCESS, createSnapshotResponse.getSnapshotInfo().state());
assertEquals(numberOfShards, createSnapshotResponse.getSnapshotInfo().totalShards());
assertEquals(numberOfShards, createSnapshotResponse.getSnapshotInfo().successfulShards());
} finally {
clusterService.remove(snapshotListener);
}
// Check that we didn't timeout
assertFalse(snapshotListener.timedOut());
// Check that cluster state update task was called only once
assertEquals(1, snapshotListener.count());
logger.info(""--> close indices"");
client.admin().indices().prepareClose(""test-idx"").get();
BlockingClusterStateListener restoreListener = new BlockingClusterStateListener(clusterService, ""restore_snapshot["", ""update snapshot state"", Priority.HIGH);
try {
clusterService.addFirst(restoreListener);
logger.info(""--> restore snapshot"");
ListenableActionFuture<RestoreSnapshotResponse> futureRestore = client.admin().cluster().prepareRestoreSnapshot(""test-repo"", ""test-snap"").setWaitForCompletion(true).execute();
// Await until shard updates are in pending state.
assertBusyPendingTasks(""update snapshot state"", numberOfShards);
restoreListener.unblock();
RestoreSnapshotResponse restoreSnapshotResponse = futureRestore.actionGet();
assertThat(restoreSnapshotResponse.getRestoreInfo().totalShards(), equalTo(numberOfShards));
} finally {
clusterService.remove(restoreListener);
}
// Check that we didn't timeout
assertFalse(restoreListener.timedOut());
// Check that cluster state update task was called only once
assertEquals(1, restoreListener.count());
}
"
264,1," private File getLocationUnderBuild(AbstractBuild build) {
return new File(build.getRootDir(), ""fileParameters/"" + location);
}
/**
* Default implementation from {@link File}.
*/
"
265,1," protected Details authenticate(String username, String password) throws AuthenticationException {
Details u = loadUserByUsername(username);
if (!u.isPasswordCorrect(password))
throw new BadCredentialsException(""Failed to login as ""+username);
return u;
}
/**
* Show the sign up page with the data from the identity.
*/
@Override
"
266,1," public void resetPassword_InvalidPasswordException_NewPasswordSameAsOld() {
ScimUser user = new ScimUser(""user-id"", ""username"", ""firstname"", ""lastname"");
user.setMeta(new ScimMeta(new Date(), new Date(), 0));
user.setPrimaryEmail(""foo@example.com"");
ExpiringCode expiringCode = new ExpiringCode(""good_code"",
new Timestamp(System.currentTimeMillis() + UaaResetPasswordService.PASSWORD_RESET_LIFETIME), ""user-id"", null);
when(codeStore.retrieveCode(""good_code"")).thenReturn(expiringCode);
when(scimUserProvisioning.retrieve(""user-id"")).thenReturn(user);
when(scimUserProvisioning.checkPasswordMatches(""user-id"", ""Passwo3dAsOld""))
.thenThrow(new InvalidPasswordException(""Your new password cannot be the same as the old password."", UNPROCESSABLE_ENTITY));
SecurityContext securityContext = mock(SecurityContext.class);
when(securityContext.getAuthentication()).thenReturn(new MockAuthentication());
SecurityContextHolder.setContext(securityContext);
try {
emailResetPasswordService.resetPassword(""good_code"", ""Passwo3dAsOld"");
fail();
} catch (InvalidPasswordException e) {
assertEquals(""Your new password cannot be the same as the old password."", e.getMessage());
assertEquals(UNPROCESSABLE_ENTITY, e.getStatus());
}
}
@Test
"
267,1," public boolean getValidateClientProvidedNewSessionId() { return false; }
"
268,1," protected Http11AprProcessor createProcessor() {
Http11AprProcessor processor = new Http11AprProcessor(
proto.getMaxHttpHeaderSize(), (AprEndpoint)proto.endpoint,
proto.getMaxTrailerSize());
processor.setAdapter(proto.getAdapter());
processor.setMaxKeepAliveRequests(proto.getMaxKeepAliveRequests());
processor.setKeepAliveTimeout(proto.getKeepAliveTimeout());
processor.setConnectionUploadTimeout(
proto.getConnectionUploadTimeout());
processor.setDisableUploadTimeout(proto.getDisableUploadTimeout());
processor.setCompressionMinSize(proto.getCompressionMinSize());
processor.setCompression(proto.getCompression());
processor.setNoCompressionUserAgents(proto.getNoCompressionUserAgents());
processor.setCompressableMimeTypes(proto.getCompressableMimeTypes());
processor.setRestrictedUserAgents(proto.getRestrictedUserAgents());
processor.setSocketBuffer(proto.getSocketBuffer());
processor.setMaxSavePostSize(proto.getMaxSavePostSize());
processor.setServer(proto.getServer());
processor.setClientCertProvider(proto.getClientCertProvider());
register(processor);
return processor;
}
@Override
"
269,1," public synchronized Servlet loadServlet() throws ServletException {
// Nothing to do if we already have an instance or an instance pool
if (!singleThreadModel && (instance != null))
return instance;
PrintStream out = System.out;
if (swallowOutput) {
SystemLogHandler.startCapture();
}
Servlet servlet;
try {
long t1=System.currentTimeMillis();
// Complain if no servlet class has been specified
if (servletClass == null) {
unavailable(null);
throw new ServletException
(sm.getString(""standardWrapper.notClass"", getName()));
}
InstanceManager instanceManager = ((StandardContext)getParent()).getInstanceManager();
try {
servlet = (Servlet) instanceManager.newInstance(servletClass);
} catch (ClassCastException e) {
unavailable(null);
// Restore the context ClassLoader
throw new ServletException
(sm.getString(""standardWrapper.notServlet"", servletClass), e);
} catch (Throwable e) {
ExceptionUtils.handleThrowable(e);
unavailable(null);
// Added extra log statement for Bugzilla 36630:
// http://issues.apache.org/bugzilla/show_bug.cgi?id=36630
if(log.isDebugEnabled()) {
log.debug(sm.getString(""standardWrapper.instantiate"", servletClass), e);
}
// Restore the context ClassLoader
throw new ServletException
(sm.getString(""standardWrapper.instantiate"", servletClass), e);
}
if (multipartConfigElement == null) {
MultipartConfig annotation =
servlet.getClass().getAnnotation(MultipartConfig.class);
if (annotation != null) {
multipartConfigElement =
new MultipartConfigElement(annotation);
}
}
ServletSecurity secAnnotation =
servlet.getClass().getAnnotation(ServletSecurity.class);
Context ctxt = (Context) getParent();
if (secAnnotation != null) {
ctxt.addServletSecurity(
new ApplicationServletRegistration(this, ctxt),
new ServletSecurityElement(secAnnotation));
}
// Special handling for ContainerServlet instances
if ((servlet instanceof ContainerServlet) &&
(isContainerProvidedServlet(servletClass) ||
ctxt.getPrivileged() )) {
((ContainerServlet) servlet).setWrapper(this);
}
classLoadTime=(int) (System.currentTimeMillis() -t1);
initServlet(servlet);
// Register our newly initialized instance
singleThreadModel = servlet instanceof SingleThreadModel;
if (singleThreadModel) {
if (instancePool == null)
instancePool = new Stack<Servlet>();
}
fireContainerEvent(""load"", this);
loadTime=System.currentTimeMillis() -t1;
} finally {
if (swallowOutput) {
String log = SystemLogHandler.stopCapture();
if (log != null && log.length() > 0) {
if (getServletContext() != null) {
getServletContext().log(log);
} else {
out.println(log);
}
}
}
}
return servlet;
}
"
270,1," public void testWelcomeFileStrict() throws Exception {
Tomcat tomcat = getTomcatInstance();
File appDir = new File(""test/webapp"");
StandardContext ctxt = (StandardContext) tomcat.addWebapp(null, ""/test"",
appDir.getAbsolutePath());
ctxt.setReplaceWelcomeFiles(true);
ctxt.addWelcomeFile(""index.jsp"");
// Mapping for *.do is defined in web.xml
ctxt.addWelcomeFile(""index.do"");
// Simulate STRICT_SERVLET_COMPLIANCE
ctxt.setResourceOnlyServlets("""");
tomcat.start();
ByteChunk bc = new ByteChunk();
int rc = getUrl(""http://localhost:"" + getPort() +
""/test/welcome-files"", bc, new HashMap<String,List<String>>());
Assert.assertEquals(HttpServletResponse.SC_OK, rc);
Assert.assertTrue(bc.toString().contains(""JSP""));
rc = getUrl(""http://localhost:"" + getPort() +
""/test/welcome-files/sub"", bc,
new HashMap<String,List<String>>());
Assert.assertEquals(HttpServletResponse.SC_NOT_FOUND, rc);
}
/**
* Prepare a string to search in messages that contain a timestamp, when it
* is known that the timestamp was printed between {@code timeA} and
* {@code timeB}.
*/
"
271,1," protected void stripScopesFromAuthentication(String identityZoneId, HttpServletRequest servletRequest) {
OAuth2Authentication oa = (OAuth2Authentication)SecurityContextHolder.getContext().getAuthentication();
Object oaDetails = oa.getDetails();
//strip client scopes
OAuth2Request request = oa.getOAuth2Request();
Collection<String> requestAuthorities = UaaStringUtils.getStringsFromAuthorities(request.getAuthorities());
Set<String> clientScopes = new HashSet<>();
Set<String> clientAuthorities = new HashSet<>();
for (String s : getZoneSwitchingScopes(identityZoneId)) {
String scope = stripPrefix(s, identityZoneId);
if (request.getScope().contains(s)) {
clientScopes.add(scope);
}
if (requestAuthorities.contains(s)) {
clientAuthorities.add(scope);
}
}
request = new OAuth2Request(
request.getRequestParameters(),
request.getClientId(),
UaaStringUtils.getAuthoritiesFromStrings(clientAuthorities),
request.isApproved(),
clientScopes,
request.getResourceIds(),
request.getRedirectUri(),
request.getResponseTypes(),
request.getExtensions()
);
UaaAuthentication userAuthentication = (UaaAuthentication)oa.getUserAuthentication();
if (userAuthentication!=null) {
userAuthentication = new UaaAuthentication(
userAuthentication.getPrincipal(),
null,
UaaStringUtils.getAuthoritiesFromStrings(clientScopes),
new UaaAuthenticationDetails(servletRequest),
true);
}
oa = new OAuth2Authentication(request, userAuthentication);
oa.setDetails(oaDetails);
SecurityContextHolder.getContext().setAuthentication(oa);
}
"
272,1," public void testHandleNoInitialResponseNull() throws Exception
{
final AuthenticationResult result = _negotiator.handleResponse(null);
assertEquals(""Unexpected authentication status"", AuthenticationResult.AuthenticationStatus.CONTINUE, result.getStatus());
assertArrayEquals(""Unexpected authentication challenge"", new byte[0], result.getChallenge());
final AuthenticationResult firstResult = _negotiator.handleResponse(VALID_RESPONSE.getBytes());
assertEquals(""Unexpected first authentication result"", _expectedResult, firstResult);
}
"
273,1," private int readStored(final byte[] buffer, final int offset, final int length) throws IOException {
if (current.hasDataDescriptor) {
if (lastStoredEntry == null) {
readStoredEntry();
}
return lastStoredEntry.read(buffer, offset, length);
}
final long csize = current.entry.getSize();
if (current.bytesRead >= csize) {
return -1;
}
if (buf.position() >= buf.limit()) {
buf.position(0);
final int l = in.read(buf.array());
if (l == -1) {
return -1;
}
buf.limit(l);
count(l);
current.bytesReadFromStream += l;
}
int toRead = Math.min(buf.remaining(), length);
if ((csize - current.bytesRead) < toRead) {
// if it is smaller than toRead then it fits into an int
toRead = (int) (csize - current.bytesRead);
}
buf.get(buffer, offset, toRead);
current.bytesRead += toRead;
return toRead;
}
/**
* Implementation of read for DEFLATED entries.
*/
"
274,1," private Object readResolve() {
return INSTANCE;
}
"
275,1," private static ZipOutputStream getZipOutputStream(OutputStream out, Charset charset) {
charset = (null == charset) ? DEFAULT_CHARSET : charset;
return new ZipOutputStream(out, charset);
}
/**
* 递归压缩文件夹
*
* @param out 压缩文件存储对象
* @param srcRootDir 压缩文件夹根目录的子路径
* @param file 当前递归压缩的文件或目录对象
* @throws UtilException IO异常
*/
"
276,1," public boolean isFinished() {
return endChunk;
}
"
277,1," public Object compile(String expression) throws OgnlException {
if (enableExpressionCache) {
Object o = expressions.get(expression);
if (o == null) {
o = Ognl.parseExpression(expression);
expressions.putIfAbsent(expression, o);
}
return o;
} else
return Ognl.parseExpression(expression);
}
/**
* Copies the properties in the object ""from"" and sets them in the object ""to""
* using specified type converter, or {@link com.opensymphony.xwork2.conversion.impl.XWorkConverter} if none
* is specified.
*
* @param from the source object
* @param to the target object
* @param context the action context we're running under
* @param exclusions collection of method names to excluded from copying ( can be null)
* @param inclusions collection of method names to included copying (can be null)
* note if exclusions AND inclusions are supplied and not null nothing will get copied.
*/
"
278,1," String hash(String plaintext, String salt, int iterations) throws EncryptionException;
/**
* Encrypts the provided plaintext and returns a ciphertext string using the
* master secret key and default cipher transformation.
* </p><p>
* <b>Compatibility with earlier ESAPI versions:</b> The symmetric encryption
* in ESAPI 2.0 and later is not compatible with the encryption in ESAPI 1.4
* or earlier. Not only are the interfaces slightly different, but they format
* of the serialized encrypted data is incompatible. Therefore, if you have
* encrypted data with ESAPI 1.4 or earlier, you must first encrypt it and
* then re-encrypt it with ESAPI 2.0. Backward compatibility with ESAPI 1.4
* was proposed to both the ESAPI Developers and ESAPI Users mailing lists
* and voted down. More details are available in the ESAPI document
* <a href=""http://owasp-esapi-java.googlecode.com/svn/trunk/documentation/esapi4java-core-2.0-readme-crypto-changes.html"">
* Why Is OWASP Changing ESAPI Encryption?</a>
* </p><p>
* <b>Why this method is deprecated:</b> Most cryptographers strongly suggest
* that if you are creating crypto functionality for general-purpose use,
* at a minimum you should ensure that it provides authenticity, integrity,
* and confidentiality. This method only provides confidentiality, but not
* authenticity or integrity. Therefore, you are encouraged to use
* one of the other encryption methods referenced below. Because this
* method provides neither authenticity nor integrity, it may be
* removed in some future ESAPI Java release. Note: there are some cases
* where authenticity / integrity are not that important. For instance, consider
* a case where the encrypted data is never out of your application's control. For
* example, if you receive data that your application is encrypting itself and then
* storing the encrypted data in its own database for later use (and no other
* applications can query or update that column of the database), providing
* confidentiality alone might be sufficient. However, if there are cases
* where your application will be sending or receiving already encrypted data
* over an insecure, unauthenticated channel, in such cases authenticity and
* integrity of the encrypted data likely is important and this method should
* be avoided in favor of one of the other two.
*
* @param plaintext
* the plaintext {@code String} to encrypt. Note that if you are encrypting
* general bytes, you should encypt that byte array to a String using
* ""UTF-8"" encoding.
*
* @return
* the encrypted, base64-encoded String representation of 'plaintext' plus
* the random IV used.
*
* @throws EncryptionException
* if the specified encryption algorithm could not be found or another problem exists with
* the encryption of 'plaintext'
*
* @see #encrypt(PlainText)
* @see #encrypt(SecretKey, PlainText)
*
* @deprecated As of 1.4.2; use {@link #encrypt(PlainText)} instead, which
* also ensures message authenticity. This method will be
* completely removed as of the next major release or point
* release (3.0 or 2.1, whichever comes first) as per OWASP
* deprecation policy.
*/
"
279,1," public void handleDialog(ActionRequest req, ActionResponse resp) throws IOException, PortletException {
List<String> lines = new ArrayList<String>();
req.getPortletSession().setAttribute(""lines"", lines);
lines.add(""handling dialog"");
StringBuilder txt = new StringBuilder(128);
String clr = req.getActionParameters().getValue(""color"");
txt.append(""Color: "").append(clr);
lines.add(txt.toString());
LOGGER.fine(txt.toString());
resp.getRenderParameters().setValue(""color"", clr);
txt.setLength(0);
Part part = null;
try {
part = req.getPart(""file"");
} catch (Throwable t) {}
if ((part != null) && (part.getSubmittedFileName() != null) &&
(part.getSubmittedFileName().length() > 0)) {
txt.append(""Uploaded file name: "").append(part.getSubmittedFileName());
txt.append("", part name: "").append(part.getName());
txt.append("", size: "").append(part.getSize());
txt.append("", content type: "").append(part.getContentType());
lines.add(txt.toString());
LOGGER.fine(txt.toString());
txt.setLength(0);
txt.append(""Headers: "");
String sep = """";
for (String hdrname : part.getHeaderNames()) {
txt.append(sep).append(hdrname).append(""="").append(part.getHeaders(hdrname));
sep = "", "";
}
lines.add(txt.toString());
LOGGER.fine(txt.toString());
// Store the file in a temporary location in the webapp where it can be served.
// Note that this is, in general, not what you want to do in production, as
// there can be problems serving the resource. Did it this way for a
// quick solution that doesn't require additional Tomcat configuration.
try {
String path = req.getPortletContext().getRealPath(TMP);
File dir = new File(path);
lines.add(""Temp path: "" + dir.getCanonicalPath());
if (!dir.exists()) {
lines.add(""Creating directory. Path: "" + dir.getCanonicalPath());
Files.createDirectories(dir.toPath());
}
String fn = TMP + part.getSubmittedFileName();
lines.add(""Temp file: "" + fn);
path = req.getPortletContext().getRealPath(fn);
File img = new File(path);
if (img.exists()) {
lines.add(""deleting existing temp file."");
img.delete();
}
InputStream is = part.getInputStream();
Files.copy(is, img.toPath(), StandardCopyOption.REPLACE_EXISTING);
resp.getRenderParameters().setValue(""fn"", fn);
resp.getRenderParameters().setValue(""ct"", part.getContentType());
} catch (Exception e) {
lines.add(""Exception doing I/O: "" + e.toString());
}
} else {
lines.add(""file part was null"");
}
}
@RenderMethod(portletNames = ""MultipartPortlet"")
"
280,1," protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain filterChain)
throws ServletException, IOException {
HttpServletRequest requestToUse = request;
if (""POST"".equals(request.getMethod()) && request.getAttribute(WebUtils.ERROR_EXCEPTION_ATTRIBUTE) == null) {
String paramValue = request.getParameter(this.methodParam);
if (StringUtils.hasLength(paramValue)) {
requestToUse = new HttpMethodRequestWrapper(request, paramValue);
}
}
filterChain.doFilter(requestToUse, response);
}
/**
* Simple {@link HttpServletRequest} wrapper that returns the supplied method for
* {@link HttpServletRequest#getMethod()}.
*/
"
281,1," private ScimGroupExternalMember getExternalGroupMap(final String groupId,
final String externalGroup,
final String origin)
throws ScimResourceNotFoundException {
try {
ScimGroupExternalMember u = jdbcTemplate.queryForObject(GET_GROUPS_WITH_EXTERNAL_GROUP_MAPPINGS_SQL,
rowMapper, groupId, origin, externalGroup);
return u;
} catch (EmptyResultDataAccessException e) {
throw new ScimResourceNotFoundException(""The mapping between groupId "" + groupId + "" and external group ""
+ externalGroup + "" does not exist"");
}
}
"
282,1," protected void serveResource(HttpServletRequest request,
HttpServletResponse response,
boolean content,
String encoding)
throws IOException, ServletException {
boolean serveContent = content;
// Identify the requested resource path
String path = getRelativePath(request);
if (debug > 0) {
if (serveContent)
log(""DefaultServlet.serveResource: Serving resource '"" +
path + ""' headers and data"");
else
log(""DefaultServlet.serveResource: Serving resource '"" +
path + ""' headers only"");
}
WebResource resource = resources.getResource(path);
if (!resource.exists()) {
// Check if we're included so we can return the appropriate
// missing resource name in the error
String requestUri = (String) request.getAttribute(
RequestDispatcher.INCLUDE_REQUEST_URI);
if (requestUri == null) {
requestUri = request.getRequestURI();
} else {
// We're included
// SRV.9.3 says we must throw a FNFE
throw new FileNotFoundException(sm.getString(
""defaultServlet.missingResource"", requestUri));
}
response.sendError(HttpServletResponse.SC_NOT_FOUND, requestUri);
return;
}
if (!resource.canRead()) {
// Check if we're included so we can return the appropriate
// missing resource name in the error
String requestUri = (String) request.getAttribute(
RequestDispatcher.INCLUDE_REQUEST_URI);
if (requestUri == null) {
requestUri = request.getRequestURI();
} else {
// We're included
// Spec doesn't say what to do in this case but a FNFE seems
// reasonable
throw new FileNotFoundException(sm.getString(
""defaultServlet.missingResource"", requestUri));
}
response.sendError(HttpServletResponse.SC_FORBIDDEN, requestUri);
return;
}
// If the resource is not a collection, and the resource path
// ends with ""/"" or ""\"", return NOT FOUND
if (resource.isFile() && (path.endsWith(""/"") || path.endsWith(""\\""))) {
// Check if we're included so we can return the appropriate
// missing resource name in the error
String requestUri = (String) request.getAttribute(
RequestDispatcher.INCLUDE_REQUEST_URI);
if (requestUri == null) {
requestUri = request.getRequestURI();
}
response.sendError(HttpServletResponse.SC_NOT_FOUND, requestUri);
return;
}
boolean isError = response.getStatus() >= HttpServletResponse.SC_BAD_REQUEST;
boolean included = false;
// Check if the conditions specified in the optional If headers are
// satisfied.
if (resource.isFile()) {
// Checking If headers
included = (request.getAttribute(
RequestDispatcher.INCLUDE_CONTEXT_PATH) != null);
if (!included && !isError && !checkIfHeaders(request, response, resource)) {
return;
}
}
// Find content type.
String contentType = resource.getMimeType();
if (contentType == null) {
contentType = getServletContext().getMimeType(resource.getName());
resource.setMimeType(contentType);
}
// These need to reflect the original resource, not the potentially
// gzip'd version of the resource so get them now if they are going to
// be needed later
String eTag = null;
String lastModifiedHttp = null;
if (resource.isFile() && !isError) {
eTag = resource.getETag();
lastModifiedHttp = resource.getLastModifiedHttp();
}
// Serve a gzipped version of the file if present
boolean usingGzippedVersion = false;
if (gzip && !included && resource.isFile() && !path.endsWith("".gz"")) {
WebResource gzipResource = resources.getResource(path + "".gz"");
if (gzipResource.exists() && gzipResource.isFile()) {
Collection<String> varyHeaders = response.getHeaders(""Vary"");
boolean addRequired = true;
for (String varyHeader : varyHeaders) {
if (""*"".equals(varyHeader) ||
""accept-encoding"".equalsIgnoreCase(varyHeader)) {
addRequired = false;
break;
}
}
if (addRequired) {
response.addHeader(""Vary"", ""accept-encoding"");
}
if (checkIfGzip(request)) {
response.addHeader(""Content-Encoding"", ""gzip"");
resource = gzipResource;
usingGzippedVersion = true;
}
}
}
ArrayList<Range> ranges = null;
long contentLength = -1L;
if (resource.isDirectory()) {
// Skip directory listings if we have been configured to
// suppress them
if (!listings) {
response.sendError(HttpServletResponse.SC_NOT_FOUND,
request.getRequestURI());
return;
}
contentType = ""text/html;charset=UTF-8"";
} else {
if (!isError) {
if (useAcceptRanges) {
// Accept ranges header
response.setHeader(""Accept-Ranges"", ""bytes"");
}
// Parse range specifier
ranges = parseRange(request, response, resource);
// ETag header
response.setHeader(""ETag"", eTag);
// Last-Modified header
response.setHeader(""Last-Modified"", lastModifiedHttp);
}
// Get content length
contentLength = resource.getContentLength();
// Special case for zero length files, which would cause a
// (silent) ISE when setting the output buffer size
if (contentLength == 0L) {
serveContent = false;
}
}
ServletOutputStream ostream = null;
PrintWriter writer = null;
if (serveContent) {
// Trying to retrieve the servlet output stream
try {
ostream = response.getOutputStream();
} catch (IllegalStateException e) {
// If it fails, we try to get a Writer instead if we're
// trying to serve a text file
if (!usingGzippedVersion &&
((contentType == null) ||
(contentType.startsWith(""text"")) ||
(contentType.endsWith(""xml"")) ||
(contentType.contains(""/javascript"")))
) {
writer = response.getWriter();
// Cannot reliably serve partial content with a Writer
ranges = FULL;
} else {
throw e;
}
}
}
// Check to see if a Filter, Valve of wrapper has written some content.
// If it has, disable range requests and setting of a content length
// since neither can be done reliably.
ServletResponse r = response;
long contentWritten = 0;
while (r instanceof ServletResponseWrapper) {
r = ((ServletResponseWrapper) r).getResponse();
}
if (r instanceof ResponseFacade) {
contentWritten = ((ResponseFacade) r).getContentWritten();
}
if (contentWritten > 0) {
ranges = FULL;
}
if (resource.isDirectory() ||
isError ||
( (ranges == null || ranges.isEmpty())
&& request.getHeader(""Range"") == null ) ||
ranges == FULL ) {
// Set the appropriate output headers
if (contentType != null) {
if (debug > 0)
log(""DefaultServlet.serveFile: contentType='"" +
contentType + ""'"");
response.setContentType(contentType);
}
if (resource.isFile() && contentLength >= 0 &&
(!serveContent || ostream != null)) {
if (debug > 0)
log(""DefaultServlet.serveFile: contentLength="" +
contentLength);
// Don't set a content length if something else has already
// written to the response.
if (contentWritten == 0) {
response.setContentLengthLong(contentLength);
}
}
if (serveContent) {
try {
response.setBufferSize(output);
} catch (IllegalStateException e) {
// Silent catch
}
InputStream renderResult = null;
if (ostream == null) {
// Output via a writer so can't use sendfile or write
// content directly.
if (resource.isDirectory()) {
renderResult = render(getPathPrefix(request), resource);
} else {
renderResult = resource.getInputStream();
}
copy(resource, renderResult, writer, encoding);
} else {
// Output is via an InputStream
if (resource.isDirectory()) {
renderResult = render(getPathPrefix(request), resource);
} else {
// Output is content of resource
if (!checkSendfile(request, response, resource,
contentLength, null)) {
// sendfile not possible so check if resource
// content is available directly
byte[] resourceBody = resource.getContent();
if (resourceBody == null) {
// Resource content not available, use
// inputstream
renderResult = resource.getInputStream();
} else {
// Use the resource content directly
ostream.write(resourceBody);
}
}
}
// If a stream was configured, it needs to be copied to
// the output (this method closes the stream)
if (renderResult != null) {
copy(resource, renderResult, ostream);
}
}
}
} else {
if ((ranges == null) || (ranges.isEmpty()))
return;
// Partial content response.
response.setStatus(HttpServletResponse.SC_PARTIAL_CONTENT);
if (ranges.size() == 1) {
Range range = ranges.get(0);
response.addHeader(""Content-Range"", ""bytes ""
+ range.start
+ ""-"" + range.end + ""/""
+ range.length);
long length = range.end - range.start + 1;
response.setContentLengthLong(length);
if (contentType != null) {
if (debug > 0)
log(""DefaultServlet.serveFile: contentType='"" +
contentType + ""'"");
response.setContentType(contentType);
}
if (serveContent) {
try {
response.setBufferSize(output);
} catch (IllegalStateException e) {
// Silent catch
}
if (ostream != null) {
if (!checkSendfile(request, response, resource,
range.end - range.start + 1, range))
copy(resource, ostream, range);
} else {
// we should not get here
throw new IllegalStateException();
}
}
} else {
response.setContentType(""multipart/byteranges; boundary=""
+ mimeSeparation);
if (serveContent) {
try {
response.setBufferSize(output);
} catch (IllegalStateException e) {
// Silent catch
}
if (ostream != null) {
copy(resource, ostream, ranges.iterator(), contentType);
} else {
// we should not get here
throw new IllegalStateException();
}
}
}
}
}
/**
* Parse the content-range header.
*
* @param request The servlet request we a)re processing
* @param response The servlet response we are creating
* @return Range
*/
"
283,1," private void findCloneMethod() {
try {
iCloneMethod = iPrototype.getClass().getMethod(""clone"", (Class[]) null);
} catch (final NoSuchMethodException ex) {
throw new IllegalArgumentException(""PrototypeCloneFactory: The clone method must exist and be public "");
}
}
/**
* Creates an object by calling the clone method.
*
* @return the new object
*/
@SuppressWarnings(""unchecked"")
"
284,1," public boolean isSequenceType() { return false; }
/* Traverseproc implementation */
@Override
"
285,1," public void setDynamicAttribute(String uri, String localName, Object value) throws JspException {
if (ComponentUtils.altSyntax(getStack()) && ComponentUtils.isExpression(value)) {
dynamicAttributes.put(localName, String.valueOf(ObjectUtils.defaultIfNull(findValue(value.toString()), value)));
} else {
dynamicAttributes.put(localName, value);
}
}
"
286,1," protected void onModified() throws IOException {
super.onModified();
Jenkins.getInstance().trimLabels();
}
}
/**
* Set of installed cluster nodes.
* <p>
* We use this field with copy-on-write semantics.
* This field has mutable list (to keep the serialization look clean),
* but it shall never be modified. Only new completely populated slave
* list can be set here.
* <p>
* The field name should be really {@code nodes}, but again the backward compatibility
* prevents us from renaming.
*/
protected volatile NodeList slaves;
/**
* Quiet period.
*
* This is {@link Integer} so that we can initialize it to '5' for upgrading users.
*/
/*package*/ Integer quietPeriod;
/**
* Global default for {@link AbstractProject#getScmCheckoutRetryCount()}
*/
/*package*/ int scmCheckoutRetryCount;
/**
* {@link View}s.
*/
private final CopyOnWriteArrayList<View> views = new CopyOnWriteArrayList<View>();
/**
* Name of the primary view.
* <p>
* Start with null, so that we can upgrade pre-1.269 data well.
* @since 1.269
*/
private volatile String primaryView;
private transient final ViewGroupMixIn viewGroupMixIn = new ViewGroupMixIn(this) {
protected List<View> views() { return views; }
protected String primaryView() { return primaryView; }
protected void primaryView(String name) { primaryView=name; }
};
private transient final FingerprintMap fingerprintMap = new FingerprintMap();
/**
* Loaded plugins.
*/
public transient final PluginManager pluginManager;
public transient volatile TcpSlaveAgentListener tcpSlaveAgentListener;
private transient UDPBroadcastThread udpBroadcastThread;
private transient DNSMultiCast dnsMultiCast;
/**
* List of registered {@link SCMListener}s.
*/
private transient final CopyOnWriteList<SCMListener> scmListeners = new CopyOnWriteList<SCMListener>();
/**
* TCP slave agent port.
* 0 for random, -1 to disable.
*/
private int slaveAgentPort =0;
/**
* Whitespace-separated labels assigned to the master as a {@link Node}.
*/
private String label="""";
/**
* {@link hudson.security.csrf.CrumbIssuer}
*/
private volatile CrumbIssuer crumbIssuer;
/**
* All labels known to Jenkins. This allows us to reuse the same label instances
* as much as possible, even though that's not a strict requirement.
*/
private transient final ConcurrentHashMap<String,Label> labels = new ConcurrentHashMap<String,Label>();
/**
* Load statistics of the entire system.
*
* This includes every executor and every job in the system.
*/
@Exported
public transient final OverallLoadStatistics overallLoad = new OverallLoadStatistics();
/**
* Load statistics of the free roaming jobs and slaves.
*
* This includes all executors on {@link Mode#NORMAL} nodes and jobs that do not have any assigned nodes.
*
* @since 1.467
*/
@Exported
public transient final LoadStatistics unlabeledLoad = new UnlabeledLoadStatistics();
/**
* {@link NodeProvisioner} that reacts to {@link #unlabeledLoad}.
* @since 1.467
*/
public transient final NodeProvisioner unlabeledNodeProvisioner = new NodeProvisioner(null,unlabeledLoad);
/**
* @deprecated as of 1.467
* Use {@link #unlabeledNodeProvisioner}.
* This was broken because it was tracking all the executors in the system, but it was only tracking
* free-roaming jobs in the queue. So {@link Cloud} fails to launch nodes when you have some exclusive
* slaves and free-roaming jobs in the queue.
*/
@Restricted(NoExternalUse.class)
public transient final NodeProvisioner overallNodeProvisioner = unlabeledNodeProvisioner;
public transient final ServletContext servletContext;
/**
* Transient action list. Useful for adding navigation items to the navigation bar
* on the left.
*/
private transient final List<Action> actions = new CopyOnWriteArrayList<Action>();
/**
* List of master node properties
*/
private DescribableList<NodeProperty<?>,NodePropertyDescriptor> nodeProperties = new DescribableList<NodeProperty<?>,NodePropertyDescriptor>(this);
/**
* List of global properties
*/
private DescribableList<NodeProperty<?>,NodePropertyDescriptor> globalNodeProperties = new DescribableList<NodeProperty<?>,NodePropertyDescriptor>(this);
/**
* {@link AdministrativeMonitor}s installed on this system.
*
* @see AdministrativeMonitor
*/
public transient final List<AdministrativeMonitor> administrativeMonitors = getExtensionList(AdministrativeMonitor.class);
/**
* Widgets on Hudson.
*/
private transient final List<Widget> widgets = getExtensionList(Widget.class);
/**
* {@link AdjunctManager}
*/
private transient final AdjunctManager adjuncts;
/**
* Code that handles {@link ItemGroup} work.
*/
private transient final ItemGroupMixIn itemGroupMixIn = new ItemGroupMixIn(this,this) {
@Override
protected void add(TopLevelItem item) {
items.put(item.getName(),item);
}
@Override
protected File getRootDirFor(String name) {
return Jenkins.this.getRootDirFor(name);
}
/**
* Send the browser to the config page.
* use View to trim view/{default-view} from URL if possible
*/
@Override
protected String redirectAfterCreateItem(StaplerRequest req, TopLevelItem result) throws IOException {
String redirect = result.getUrl()+""configure"";
List<Ancestor> ancestors = req.getAncestors();
for (int i = ancestors.size() - 1; i >= 0; i--) {
Object o = ancestors.get(i).getObject();
if (o instanceof View) {
redirect = req.getContextPath() + '/' + ((View)o).getUrl() + redirect;
break;
}
}
return redirect;
}
};
/**
* Hook for a test harness to intercept Jenkins.getInstance()
*
* Do not use in the production code as the signature may change.
*/
public interface JenkinsHolder {
Jenkins getInstance();
}
static JenkinsHolder HOLDER = new JenkinsHolder() {
public Jenkins getInstance() {
return theInstance;
}
};
@CLIResolver
public static Jenkins getInstance() {
return HOLDER.getInstance();
}
/**
* Secret key generated once and used for a long time, beyond
* container start/stop. Persisted outside <tt>config.xml</tt> to avoid
* accidental exposure.
*/
private transient final String secretKey;
private transient final UpdateCenter updateCenter = new UpdateCenter();
/**
* True if the user opted out from the statistics tracking. We'll never send anything if this is true.
*/
private Boolean noUsageStatistics;
/**
* HTTP proxy configuration.
*/
public transient volatile ProxyConfiguration proxy;
/**
* Bound to ""/log"".
*/
private transient final LogRecorderManager log = new LogRecorderManager();
protected Jenkins(File root, ServletContext context) throws IOException, InterruptedException, ReactorException {
this(root,context,null);
}
/**
* @param pluginManager
* If non-null, use existing plugin manager. create a new one.
*/
@edu.umd.cs.findbugs.annotations.SuppressWarnings({
""SC_START_IN_CTOR"", // bug in FindBugs. It flags UDPBroadcastThread.start() call but that's for another class
""ST_WRITE_TO_STATIC_FROM_INSTANCE_METHOD"" // Trigger.timer
})
protected Jenkins(File root, ServletContext context, PluginManager pluginManager) throws IOException, InterruptedException, ReactorException {
long start = System.currentTimeMillis();
// As Jenkins is starting, grant this process full control
ACL.impersonate(ACL.SYSTEM);
try {
this.root = root;
this.servletContext = context;
computeVersion(context);
if(theInstance!=null)
throw new IllegalStateException(""second instance"");
theInstance = this;
if (!new File(root,""jobs"").exists()) {
// if this is a fresh install, use more modern default layout that's consistent with slaves
workspaceDir = ""${JENKINS_HOME}/workspace/${ITEM_FULLNAME}"";
}
// doing this early allows InitStrategy to set environment upfront
final InitStrategy is = InitStrategy.get(Thread.currentThread().getContextClassLoader());
Trigger.timer = new Timer(""Jenkins cron thread"");
queue = new Queue(LoadBalancer.CONSISTENT_HASH);
try {
dependencyGraph = DependencyGraph.EMPTY;
} catch (InternalError e) {
if(e.getMessage().contains(""window server"")) {
throw new Error(""Looks like the server runs without X. Please specify -Djava.awt.headless=true as JVM option"",e);
}
throw e;
}
// get or create the secret
TextFile secretFile = new TextFile(new File(getRootDir(),""secret.key""));
if(secretFile.exists()) {
secretKey = secretFile.readTrim();
} else {
SecureRandom sr = new SecureRandom();
byte[] random = new byte[32];
sr.nextBytes(random);
secretKey = Util.toHexString(random);
secretFile.write(secretKey);
}
try {
proxy = ProxyConfiguration.load();
} catch (IOException e) {
LOGGER.log(SEVERE, ""Failed to load proxy configuration"", e);
}
if (pluginManager==null)
pluginManager = new LocalPluginManager(this);
this.pluginManager = pluginManager;
// JSON binding needs to be able to see all the classes from all the plugins
WebApp.get(servletContext).setClassLoader(pluginManager.uberClassLoader);
adjuncts = new AdjunctManager(servletContext, pluginManager.uberClassLoader,""adjuncts/""+SESSION_HASH);
// initialization consists of ...
executeReactor( is,
pluginManager.initTasks(is), // loading and preparing plugins
loadTasks(), // load jobs
InitMilestone.ordering() // forced ordering among key milestones
);
if(KILL_AFTER_LOAD)
System.exit(0);
if(slaveAgentPort!=-1) {
try {
tcpSlaveAgentListener = new TcpSlaveAgentListener(slaveAgentPort);
} catch (BindException e) {
new AdministrativeError(getClass().getName()+"".tcpBind"",
""Failed to listen to incoming slave connection"",
""Failed to listen to incoming slave connection. <a href='configure'>Change the port number</a> to solve the problem."",e);
}
} else
tcpSlaveAgentListener = null;
try {
udpBroadcastThread = new UDPBroadcastThread(this);
udpBroadcastThread.start();
} catch (IOException e) {
LOGGER.log(Level.WARNING, ""Failed to broadcast over UDP"",e);
}
dnsMultiCast = new DNSMultiCast(this);
Timer timer = Trigger.timer;
if (timer != null) {
timer.scheduleAtFixedRate(new SafeTimerTask() {
@Override
protected void doRun() throws Exception {
trimLabels();
}
}, TimeUnit2.MINUTES.toMillis(5), TimeUnit2.MINUTES.toMillis(5));
}
updateComputerList();
{// master is online now
Computer c = toComputer();
if(c!=null)
for (ComputerListener cl : ComputerListener.all())
cl.onOnline(c,StreamTaskListener.fromStdout());
}
for (ItemListener l : ItemListener.all()) {
long itemListenerStart = System.currentTimeMillis();
l.onLoaded();
if (LOG_STARTUP_PERFORMANCE)
LOGGER.info(String.format(""Took %dms for item listener %s startup"",
System.currentTimeMillis()-itemListenerStart,l.getClass().getName()));
}
if (LOG_STARTUP_PERFORMANCE)
LOGGER.info(String.format(""Took %dms for complete Jenkins startup"",
System.currentTimeMillis()-start));
} finally {
SecurityContextHolder.clearContext();
}
}
/**
* Executes a reactor.
*
* @param is
* If non-null, this can be consulted for ignoring some tasks. Only used during the initialization of Hudson.
*/
private void executeReactor(final InitStrategy is, TaskBuilder... builders) throws IOException, InterruptedException, ReactorException {
Reactor reactor = new Reactor(builders) {
/**
* Sets the thread name to the task for better diagnostics.
*/
@Override
protected void runTask(Task task) throws Exception {
if (is!=null && is.skipInitTask(task)) return;
ACL.impersonate(ACL.SYSTEM); // full access in the initialization thread
String taskName = task.getDisplayName();
Thread t = Thread.currentThread();
String name = t.getName();
if (taskName !=null)
t.setName(taskName);
try {
long start = System.currentTimeMillis();
super.runTask(task);
if(LOG_STARTUP_PERFORMANCE)
LOGGER.info(String.format(""Took %dms for %s by %s"",
System.currentTimeMillis()-start, taskName, name));
} finally {
t.setName(name);
SecurityContextHolder.clearContext();
}
}
};
new InitReactorRunner() {
@Override
protected void onInitMilestoneAttained(InitMilestone milestone) {
initLevel = milestone;
}
}.run(reactor);
}
public TcpSlaveAgentListener getTcpSlaveAgentListener() {
return tcpSlaveAgentListener;
}
/**
* Makes {@link AdjunctManager} URL-bound.
* The dummy parameter allows us to use different URLs for the same adjunct,
* for proper cache handling.
*/
public AdjunctManager getAdjuncts(String dummy) {
return adjuncts;
}
@Exported
public int getSlaveAgentPort() {
return slaveAgentPort;
}
/**
* @param port
* 0 to indicate random available TCP port. -1 to disable this service.
*/
public void setSlaveAgentPort(int port) throws IOException {
this.slaveAgentPort = port;
// relaunch the agent
if(tcpSlaveAgentListener==null) {
if(slaveAgentPort!=-1)
tcpSlaveAgentListener = new TcpSlaveAgentListener(slaveAgentPort);
} else {
if(tcpSlaveAgentListener.configuredPort!=slaveAgentPort) {
tcpSlaveAgentListener.shutdown();
tcpSlaveAgentListener = null;
if(slaveAgentPort!=-1)
tcpSlaveAgentListener = new TcpSlaveAgentListener(slaveAgentPort);
}
}
}
public void setNodeName(String name) {
throw new UnsupportedOperationException(); // not allowed
}
public String getNodeDescription() {
return Messages.Hudson_NodeDescription();
}
@Exported
public String getDescription() {
return systemMessage;
}
public PluginManager getPluginManager() {
return pluginManager;
}
public UpdateCenter getUpdateCenter() {
return updateCenter;
}
public boolean isUsageStatisticsCollected() {
return noUsageStatistics==null || !noUsageStatistics;
}
public void setNoUsageStatistics(Boolean noUsageStatistics) throws IOException {
this.noUsageStatistics = noUsageStatistics;
save();
}
public View.People getPeople() {
return new View.People(this);
}
/**
* @since 1.484
*/
public View.AsynchPeople getAsynchPeople() {
return new View.AsynchPeople(this);
}
/**
* Does this {@link View} has any associated user information recorded?
*/
public boolean hasPeople() {
return View.People.isApplicable(items.values());
}
public Api getApi() {
return new Api(this);
}
/**
* Returns a secret key that survives across container start/stop.
* <p>
* This value is useful for implementing some of the security features.
*
* @deprecated
* Due to the past security advisory, this value should not be used any more to protect sensitive information.
* See {@link ConfidentialStore} and {@link ConfidentialKey} for how to store secrets.
*/
public String getSecretKey() {
return secretKey;
}
/**
* Gets {@linkplain #getSecretKey() the secret key} as a key for AES-128.
* @since 1.308
* @deprecated
* See {@link #getSecretKey()}.
*/
public SecretKey getSecretKeyAsAES128() {
return Util.toAes128Key(secretKey);
}
/**
* Returns the unique identifier of this Jenkins that has been historically used to identify
* this Jenkins to the outside world.
*
* <p>
* This form of identifier is weak in that it can be impersonated by others. See
* https://wiki.jenkins-ci.org/display/JENKINS/Instance+Identity for more modern form of instance ID
* that can be challenged and verified.
*
* @since 1.498
*/
@SuppressWarnings(""deprecation"")
public String getLegacyInstanceId() {
return Util.getDigestOf(getSecretKey());
}
/**
* Gets the SCM descriptor by name. Primarily used for making them web-visible.
*/
public Descriptor<SCM> getScm(String shortClassName) {
return findDescriptor(shortClassName,SCM.all());
}
/**
* Gets the repository browser descriptor by name. Primarily used for making them web-visible.
*/
public Descriptor<RepositoryBrowser<?>> getRepositoryBrowser(String shortClassName) {
return findDescriptor(shortClassName,RepositoryBrowser.all());
}
/**
* Gets the builder descriptor by name. Primarily used for making them web-visible.
*/
public Descriptor<Builder> getBuilder(String shortClassName) {
return findDescriptor(shortClassName, Builder.all());
}
/**
* Gets the build wrapper descriptor by name. Primarily used for making them web-visible.
*/
public Descriptor<BuildWrapper> getBuildWrapper(String shortClassName) {
return findDescriptor(shortClassName, BuildWrapper.all());
}
/**
* Gets the publisher descriptor by name. Primarily used for making them web-visible.
*/
public Descriptor<Publisher> getPublisher(String shortClassName) {
return findDescriptor(shortClassName, Publisher.all());
}
/**
* Gets the trigger descriptor by name. Primarily used for making them web-visible.
*/
public TriggerDescriptor getTrigger(String shortClassName) {
return (TriggerDescriptor) findDescriptor(shortClassName, Trigger.all());
}
/**
* Gets the retention strategy descriptor by name. Primarily used for making them web-visible.
*/
public Descriptor<RetentionStrategy<?>> getRetentionStrategy(String shortClassName) {
return findDescriptor(shortClassName, RetentionStrategy.all());
}
/**
* Gets the {@link JobPropertyDescriptor} by name. Primarily used for making them web-visible.
*/
public JobPropertyDescriptor getJobProperty(String shortClassName) {
// combining these two lines triggers javac bug. See issue #610.
Descriptor d = findDescriptor(shortClassName, JobPropertyDescriptor.all());
return (JobPropertyDescriptor) d;
}
/**
* @deprecated
* UI method. Not meant to be used programatically.
*/
public ComputerSet getComputer() {
return new ComputerSet();
}
/**
* Exposes {@link Descriptor} by its name to URL.
*
* After doing all the {@code getXXX(shortClassName)} methods, I finally realized that
* this just doesn't scale.
*
* @param id
* Either {@link Descriptor#getId()} (recommended) or the short name of a {@link Describable} subtype (for compatibility)
* @throws IllegalArgumentException if a short name was passed which matches multiple IDs (fail fast)
*/
@SuppressWarnings({""unchecked"", ""rawtypes""}) // too late to fix
public Descriptor getDescriptor(String id) {
// legacy descriptors that are reigstered manually doesn't show up in getExtensionList, so check them explicitly.
Iterable<Descriptor> descriptors = Iterators.sequence(getExtensionList(Descriptor.class), DescriptorExtensionList.listLegacyInstances());
for (Descriptor d : descriptors) {
if (d.getId().equals(id)) {
return d;
}
}
Descriptor candidate = null;
for (Descriptor d : descriptors) {
String name = d.getId();
if (name.substring(name.lastIndexOf('.') + 1).equals(id)) {
if (candidate == null) {
candidate = d;
} else {
throw new IllegalArgumentException(id + "" is ambiguous; matches both "" + name + "" and "" + candidate.getId());
}
}
}
return candidate;
}
/**
* Alias for {@link #getDescriptor(String)}.
*/
public Descriptor getDescriptorByName(String id) {
return getDescriptor(id);
}
/**
* Gets the {@link Descriptor} that corresponds to the given {@link Describable} type.
* <p>
* If you have an instance of {@code type} and call {@link Describable#getDescriptor()},
* you'll get the same instance that this method returns.
*/
public Descriptor getDescriptor(Class<? extends Describable> type) {
for( Descriptor d : getExtensionList(Descriptor.class) )
if(d.clazz==type)
return d;
return null;
}
/**
* Works just like {@link #getDescriptor(Class)} but don't take no for an answer.
*
* @throws AssertionError
* If the descriptor is missing.
* @since 1.326
*/
public Descriptor getDescriptorOrDie(Class<? extends Describable> type) {
Descriptor d = getDescriptor(type);
if (d==null)
throw new AssertionError(type+"" is missing its descriptor"");
return d;
}
/**
* Gets the {@link Descriptor} instance in the current Hudson by its type.
*/
public <T extends Descriptor> T getDescriptorByType(Class<T> type) {
for( Descriptor d : getExtensionList(Descriptor.class) )
if(d.getClass()==type)
return type.cast(d);
return null;
}
/**
* Gets the {@link SecurityRealm} descriptors by name. Primarily used for making them web-visible.
*/
public Descriptor<SecurityRealm> getSecurityRealms(String shortClassName) {
return findDescriptor(shortClassName,SecurityRealm.all());
}
/**
* Finds a descriptor that has the specified name.
*/
private <T extends Describable<T>>
Descriptor<T> findDescriptor(String shortClassName, Collection<? extends Descriptor<T>> descriptors) {
String name = '.'+shortClassName;
for (Descriptor<T> d : descriptors) {
if(d.clazz.getName().endsWith(name))
return d;
}
return null;
}
protected void updateComputerList() throws IOException {
updateComputerList(AUTOMATIC_SLAVE_LAUNCH);
}
/**
* Gets all the installed {@link SCMListener}s.
*/
public CopyOnWriteList<SCMListener> getSCMListeners() {
return scmListeners;
}
/**
* Gets the plugin object from its short name.
*
* <p>
* This allows URL <tt>hudson/plugin/ID</tt> to be served by the views
* of the plugin class.
*/
public Plugin getPlugin(String shortName) {
PluginWrapper p = pluginManager.getPlugin(shortName);
if(p==null) return null;
return p.getPlugin();
}
/**
* Gets the plugin object from its class.
*
* <p>
* This allows easy storage of plugin information in the plugin singleton without
* every plugin reimplementing the singleton pattern.
*
* @param clazz The plugin class (beware class-loader fun, this will probably only work
* from within the jpi that defines the plugin class, it may or may not work in other cases)
*
* @return The plugin instance.
*/
@SuppressWarnings(""unchecked"")
public <P extends Plugin> P getPlugin(Class<P> clazz) {
PluginWrapper p = pluginManager.getPlugin(clazz);
if(p==null) return null;
return (P) p.getPlugin();
}
/**
* Gets the plugin objects from their super-class.
*
* @param clazz The plugin class (beware class-loader fun)
*
* @return The plugin instances.
*/
public <P extends Plugin> List<P> getPlugins(Class<P> clazz) {
List<P> result = new ArrayList<P>();
for (PluginWrapper w: pluginManager.getPlugins(clazz)) {
result.add((P)w.getPlugin());
}
return Collections.unmodifiableList(result);
}
/**
* Synonym for {@link #getDescription}.
*/
public String getSystemMessage() {
return systemMessage;
}
/**
* Gets the markup formatter used in the system.
*
* @return
* never null.
* @since 1.391
*/
public MarkupFormatter getMarkupFormatter() {
return markupFormatter!=null ? markupFormatter : RawHtmlMarkupFormatter.INSTANCE;
}
/**
* Sets the markup formatter used in the system globally.
*
* @since 1.391
*/
public void setMarkupFormatter(MarkupFormatter f) {
this.markupFormatter = f;
}
/**
* Sets the system message.
*/
public void setSystemMessage(String message) throws IOException {
this.systemMessage = message;
save();
}
public FederatedLoginService getFederatedLoginService(String name) {
for (FederatedLoginService fls : FederatedLoginService.all()) {
if (fls.getUrlName().equals(name))
return fls;
}
return null;
}
public List<FederatedLoginService> getFederatedLoginServices() {
return FederatedLoginService.all();
}
public Launcher createLauncher(TaskListener listener) {
return new LocalLauncher(listener).decorateFor(this);
}
public String getFullName() {
return """";
}
public String getFullDisplayName() {
return """";
}
/**
* Returns the transient {@link Action}s associated with the top page.
*
* <p>
* Adding {@link Action} is primarily useful for plugins to contribute
* an item to the navigation bar of the top page. See existing {@link Action}
* implementation for it affects the GUI.
*
* <p>
* To register an {@link Action}, implement {@link RootAction} extension point, or write code like
* {@code Hudson.getInstance().getActions().add(...)}.
*
* @return
* Live list where the changes can be made. Can be empty but never null.
* @since 1.172
*/
public List<Action> getActions() {
return actions;
}
/**
* Gets just the immediate children of {@link Jenkins}.
*
* @see #getAllItems(Class)
*/
@Exported(name=""jobs"")
public List<TopLevelItem> getItems() {
if (authorizationStrategy instanceof AuthorizationStrategy.Unsecured ||
authorizationStrategy instanceof FullControlOnceLoggedInAuthorizationStrategy) {
return new ArrayList(items.values());
}
List<TopLevelItem> viewableItems = new ArrayList<TopLevelItem>();
for (TopLevelItem item : items.values()) {
if (item.hasPermission(Item.READ))
viewableItems.add(item);
}
return viewableItems;
}
/**
* Returns the read-only view of all the {@link TopLevelItem}s keyed by their names.
* <p>
* This method is efficient, as it doesn't involve any copying.
*
* @since 1.296
*/
public Map<String,TopLevelItem> getItemMap() {
return Collections.unmodifiableMap(items);
}
/**
* Gets just the immediate children of {@link Jenkins} but of the given type.
*/
public <T> List<T> getItems(Class<T> type) {
List<T> r = new ArrayList<T>();
for (TopLevelItem i : getItems())
if (type.isInstance(i))
r.add(type.cast(i));
return r;
}
/**
* Gets all the {@link Item}s recursively in the {@link ItemGroup} tree
* and filter them by the given type.
*/
public <T extends Item> List<T> getAllItems(Class<T> type) {
List<T> r = new ArrayList<T>();
Stack<ItemGroup> q = new Stack<ItemGroup>();
q.push(this);
while(!q.isEmpty()) {
ItemGroup<?> parent = q.pop();
for (Item i : parent.getItems()) {
if(type.isInstance(i)) {
if (i.hasPermission(Item.READ))
r.add(type.cast(i));
}
if(i instanceof ItemGroup)
q.push((ItemGroup)i);
}
}
return r;
}
/**
* Gets all the items recursively.
*
* @since 1.402
*/
public List<Item> getAllItems() {
return getAllItems(Item.class);
}
/**
* Gets a list of simple top-level projects.
* @deprecated This method will ignore Maven and matrix projects, as well as projects inside containers such as folders.
* You may prefer to call {@link #getAllItems(Class)} on {@link AbstractProject},
* perhaps also using {@link Util#createSubList} to consider only {@link TopLevelItem}s.
* (That will also consider the caller's permissions.)
* If you really want to get just {@link Project}s at top level, ignoring permissions,
* you can filter the values from {@link #getItemMap} using {@link Util#createSubList}.
*/
@Deprecated
public List<Project> getProjects() {
return Util.createSubList(items.values(),Project.class);
}
/**
* Gets the names of all the {@link Job}s.
*/
public Collection<String> getJobNames() {
List<String> names = new ArrayList<String>();
for (Job j : getAllItems(Job.class))
names.add(j.getFullName());
return names;
}
public List<Action> getViewActions() {
return getActions();
}
/**
* Gets the names of all the {@link TopLevelItem}s.
*/
public Collection<String> getTopLevelItemNames() {
List<String> names = new ArrayList<String>();
for (TopLevelItem j : items.values())
names.add(j.getName());
return names;
}
public View getView(String name) {
return viewGroupMixIn.getView(name);
}
/**
* Gets the read-only list of all {@link View}s.
*/
@Exported
public Collection<View> getViews() {
return viewGroupMixIn.getViews();
}
public void addView(View v) throws IOException {
viewGroupMixIn.addView(v);
}
public boolean canDelete(View view) {
return viewGroupMixIn.canDelete(view);
}
public synchronized void deleteView(View view) throws IOException {
viewGroupMixIn.deleteView(view);
}
public void onViewRenamed(View view, String oldName, String newName) {
viewGroupMixIn.onViewRenamed(view,oldName,newName);
}
/**
* Returns the primary {@link View} that renders the top-page of Hudson.
*/
@Exported
public View getPrimaryView() {
return viewGroupMixIn.getPrimaryView();
}
public void setPrimaryView(View v) {
this.primaryView = v.getViewName();
}
public ViewsTabBar getViewsTabBar() {
return viewsTabBar;
}
public void setViewsTabBar(ViewsTabBar viewsTabBar) {
this.viewsTabBar = viewsTabBar;
}
public Jenkins getItemGroup() {
return this;
}
public MyViewsTabBar getMyViewsTabBar() {
return myViewsTabBar;
}
public void setMyViewsTabBar(MyViewsTabBar myViewsTabBar) {
this.myViewsTabBar = myViewsTabBar;
}
/**
* Returns true if the current running Hudson is upgraded from a version earlier than the specified version.
*
* <p>
* This method continues to return true until the system configuration is saved, at which point
* {@link #version} will be overwritten and Hudson forgets the upgrade history.
*
* <p>
* To handle SNAPSHOTS correctly, pass in ""1.N.*"" to test if it's upgrading from the version
* equal or younger than N. So say if you implement a feature in 1.301 and you want to check
* if the installation upgraded from pre-1.301, pass in ""1.300.*""
*
* @since 1.301
*/
public boolean isUpgradedFromBefore(VersionNumber v) {
try {
return new VersionNumber(version).isOlderThan(v);
} catch (IllegalArgumentException e) {
// fail to parse this version number
return false;
}
}
/**
* Gets the read-only list of all {@link Computer}s.
*/
public Computer[] getComputers() {
Computer[] r = computers.values().toArray(new Computer[computers.size()]);
Arrays.sort(r,new Comparator<Computer>() {
final Collator collator = Collator.getInstance();
public int compare(Computer lhs, Computer rhs) {
if(lhs.getNode()==Jenkins.this) return -1;
if(rhs.getNode()==Jenkins.this) return 1;
return collator.compare(lhs.getDisplayName(), rhs.getDisplayName());
}
});
return r;
}
@CLIResolver
public Computer getComputer(@Argument(required=true,metaVar=""NAME"",usage=""Node name"") String name) {
if(name.equals(""(master)""))
name = """";
for (Computer c : computers.values()) {
if(c.getName().equals(name))
return c;
}
return null;
}
/**
* Gets the label that exists on this system by the name.
*
* @return null if name is null.
* @see Label#parseExpression(String) (String)
*/
public Label getLabel(String expr) {
if(expr==null) return null;
while(true) {
Label l = labels.get(expr);
if(l!=null)
return l;
// non-existent
try {
labels.putIfAbsent(expr,Label.parseExpression(expr));
} catch (ANTLRException e) {
// laxly accept it as a single label atom for backward compatibility
return getLabelAtom(expr);
}
}
}
/**
* Returns the label atom of the given name.
* @return non-null iff name is non-null
*/
public @Nullable LabelAtom getLabelAtom(@CheckForNull String name) {
if (name==null) return null;
while(true) {
Label l = labels.get(name);
if(l!=null)
return (LabelAtom)l;
// non-existent
LabelAtom la = new LabelAtom(name);
if (labels.putIfAbsent(name, la)==null)
la.load();
}
}
/**
* Gets all the active labels in the current system.
*/
public Set<Label> getLabels() {
Set<Label> r = new TreeSet<Label>();
for (Label l : labels.values()) {
if(!l.isEmpty())
r.add(l);
}
return r;
}
public Set<LabelAtom> getLabelAtoms() {
Set<LabelAtom> r = new TreeSet<LabelAtom>();
for (Label l : labels.values()) {
if(!l.isEmpty() && l instanceof LabelAtom)
r.add((LabelAtom)l);
}
return r;
}
public Queue getQueue() {
return queue;
}
@Override
public String getDisplayName() {
return Messages.Hudson_DisplayName();
}
public List<JDK> getJDKs() {
if(jdks==null)
jdks = new ArrayList<JDK>();
return jdks;
}
/**
* Gets the JDK installation of the given name, or returns null.
*/
public JDK getJDK(String name) {
if(name==null) {
// if only one JDK is configured, ""default JDK"" should mean that JDK.
List<JDK> jdks = getJDKs();
if(jdks.size()==1) return jdks.get(0);
return null;
}
for (JDK j : getJDKs()) {
if(j.getName().equals(name))
return j;
}
return null;
}
/**
* Gets the slave node of the give name, hooked under this Hudson.
*/
public @CheckForNull Node getNode(String name) {
return slaves.getNode(name);
}
/**
* Gets a {@link Cloud} by {@link Cloud#name its name}, or null.
*/
public Cloud getCloud(String name) {
return clouds.getByName(name);
}
protected Map<Node,Computer> getComputerMap() {
return computers;
}
/**
* Returns all {@link Node}s in the system, excluding {@link Jenkins} instance itself which
* represents the master.
*/
public List<Node> getNodes() {
return slaves;
}
/**
* Adds one more {@link Node} to Hudson.
*/
public synchronized void addNode(Node n) throws IOException {
if(n==null) throw new IllegalArgumentException();
ArrayList<Node> nl = new ArrayList<Node>(this.slaves);
if(!nl.contains(n)) // defensive check
nl.add(n);
setNodes(nl);
}
/**
* Removes a {@link Node} from Hudson.
*/
public synchronized void removeNode(@Nonnull Node n) throws IOException {
Computer c = n.toComputer();
if (c!=null)
c.disconnect(OfflineCause.create(Messages._Hudson_NodeBeingRemoved()));
ArrayList<Node> nl = new ArrayList<Node>(this.slaves);
nl.remove(n);
setNodes(nl);
}
public void setNodes(List<? extends Node> nodes) throws IOException {
this.slaves = new NodeList(nodes);
updateComputerList();
trimLabels();
save();
}
public DescribableList<NodeProperty<?>, NodePropertyDescriptor> getNodeProperties() {
return nodeProperties;
}
public DescribableList<NodeProperty<?>, NodePropertyDescriptor> getGlobalNodeProperties() {
return globalNodeProperties;
}
/**
* Resets all labels and remove invalid ones.
*
* This should be called when the assumptions behind label cache computation changes,
* but we also call this periodically to self-heal any data out-of-sync issue.
*/
private void trimLabels() {
for (Iterator<Label> itr = labels.values().iterator(); itr.hasNext();) {
Label l = itr.next();
resetLabel(l);
if(l.isEmpty())
itr.remove();
}
}
/**
* Binds {@link AdministrativeMonitor}s to URL.
*/
public AdministrativeMonitor getAdministrativeMonitor(String id) {
for (AdministrativeMonitor m : administrativeMonitors)
if(m.id.equals(id))
return m;
return null;
}
public NodeDescriptor getDescriptor() {
return DescriptorImpl.INSTANCE;
}
public static final class DescriptorImpl extends NodeDescriptor {
@Extension
public static final DescriptorImpl INSTANCE = new DescriptorImpl();
public String getDisplayName() {
return """";
}
@Override
public boolean isInstantiable() {
return false;
}
public FormValidation doCheckNumExecutors(@QueryParameter String value) {
return FormValidation.validateNonNegativeInteger(value);
}
// to route /descriptor/FQCN/xxx to getDescriptor(FQCN).xxx
public Object getDynamic(String token) {
return Jenkins.getInstance().getDescriptor(token);
}
}
/**
* Gets the system default quiet period.
*/
public int getQuietPeriod() {
return quietPeriod!=null ? quietPeriod : 5;
}
/**
* Sets the global quiet period.
*
* @param quietPeriod
* null to the default value.
*/
public void setQuietPeriod(Integer quietPeriod) throws IOException {
this.quietPeriod = quietPeriod;
save();
}
/**
* Gets the global SCM check out retry count.
*/
public int getScmCheckoutRetryCount() {
return scmCheckoutRetryCount;
}
public void setScmCheckoutRetryCount(int scmCheckoutRetryCount) throws IOException {
this.scmCheckoutRetryCount = scmCheckoutRetryCount;
save();
}
@Override
public String getSearchUrl() {
return """";
}
@Override
public SearchIndexBuilder makeSearchIndex() {
return super.makeSearchIndex()
.add(""configure"", ""config"",""configure"")
.add(""manage"")
.add(""log"")
.add(new CollectionSearchIndex<TopLevelItem>() {
protected SearchItem get(String key) { return getItem(key); }
protected Collection<TopLevelItem> all() { return getItems(); }
})
.add(getPrimaryView().makeSearchIndex())
.add(new CollectionSearchIndex() {// for computers
protected Computer get(String key) { return getComputer(key); }
protected Collection<Computer> all() { return computers.values(); }
})
.add(new CollectionSearchIndex() {// for users
protected User get(String key) { return User.get(key,false); }
protected Collection<User> all() { return User.getAll(); }
})
.add(new CollectionSearchIndex() {// for views
protected View get(String key) { return getView(key); }
protected Collection<View> all() { return views; }
});
}
public String getUrlChildPrefix() {
return ""job"";
}
/**
* Gets the absolute URL of Jenkins,
* such as ""http://localhost/jenkins/"".
*
* <p>
* This method first tries to use the manually configured value, then
* fall back to {@link StaplerRequest#getRootPath()}.
* It is done in this order so that it can work correctly even in the face
* of a reverse proxy.
*
* @return
* This method returns null if this parameter is not configured by the user.
* The caller must gracefully deal with this situation.
* The returned URL will always have the trailing '/'.
* @since 1.66
* @see Descriptor#getCheckUrl(String)
* @see #getRootUrlFromRequest()
*/
public String getRootUrl() {
// for compatibility. the actual data is stored in Mailer
String url = JenkinsLocationConfiguration.get().getUrl();
if(url!=null) {
if (!url.endsWith(""/"")) url += '/';
return url;
}
StaplerRequest req = Stapler.getCurrentRequest();
if(req!=null)
return getRootUrlFromRequest();
return null;
}
/**
* Is Jenkins running in HTTPS?
*
* Note that we can't really trust {@link StaplerRequest#isSecure()} because HTTPS might be terminated
* in the reverse proxy.
*/
public boolean isRootUrlSecure() {
String url = getRootUrl();
return url!=null && url.startsWith(""https"");
}
/**
* Gets the absolute URL of Hudson top page, such as ""http://localhost/hudson/"".
*
* <p>
* Unlike {@link #getRootUrl()}, which uses the manually configured value,
* this one uses the current request to reconstruct the URL. The benefit is
* that this is immune to the configuration mistake (users often fail to set the root URL
* correctly, especially when a migration is involved), but the downside
* is that unless you are processing a request, this method doesn't work.
*
* Please note that this will not work in all cases if Jenkins is running behind a
* reverse proxy (e.g. when user has switched off ProxyPreserveHost, which is
* default setup or the actual url uses https) and you should use getRootUrl if
* you want to be sure you reflect user setup.
* See https://wiki.jenkins-ci.org/display/JENKINS/Running+Jenkins+behind+Apache
*
* @since 1.263
*/
public String getRootUrlFromRequest() {
StaplerRequest req = Stapler.getCurrentRequest();
StringBuilder buf = new StringBuilder();
buf.append(req.getScheme()+""://"");
buf.append(req.getServerName());
if(req.getServerPort()!=80)
buf.append(':').append(req.getServerPort());
buf.append(req.getContextPath()).append('/');
return buf.toString();
}
public File getRootDir() {
return root;
}
public FilePath getWorkspaceFor(TopLevelItem item) {
return new FilePath(expandVariablesForDirectory(workspaceDir, item));
}
public File getBuildDirFor(Job job) {
return expandVariablesForDirectory(buildsDir, job);
}
private File expandVariablesForDirectory(String base, Item item) {
return new File(Util.replaceMacro(base, ImmutableMap.of(
""JENKINS_HOME"", getRootDir().getPath(),
""ITEM_ROOTDIR"", item.getRootDir().getPath(),
""ITEM_FULLNAME"", item.getFullName())));
}
public String getRawWorkspaceDir() {
return workspaceDir;
}
public String getRawBuildsDir() {
return buildsDir;
}
public FilePath getRootPath() {
return new FilePath(getRootDir());
}
@Override
public FilePath createPath(String absolutePath) {
return new FilePath((VirtualChannel)null,absolutePath);
}
public ClockDifference getClockDifference() {
return ClockDifference.ZERO;
}
/**
* For binding {@link LogRecorderManager} to ""/log"".
* Everything below here is admin-only, so do the check here.
*/
public LogRecorderManager getLog() {
checkPermission(ADMINISTER);
return log;
}
/**
* A convenience method to check if there's some security
* restrictions in place.
*/
@Exported
public boolean isUseSecurity() {
return securityRealm!=SecurityRealm.NO_AUTHENTICATION || authorizationStrategy!=AuthorizationStrategy.UNSECURED;
}
public boolean isUseProjectNamingStrategy(){
return projectNamingStrategy != DefaultProjectNamingStrategy.DEFAULT_NAMING_STRATEGY;
}
/**
* If true, all the POST requests to Hudson would have to have crumb in it to protect
* Hudson from CSRF vulnerabilities.
*/
@Exported
public boolean isUseCrumbs() {
return crumbIssuer!=null;
}
/**
* Returns the constant that captures the three basic security modes
* in Hudson.
*/
public SecurityMode getSecurity() {
// fix the variable so that this code works under concurrent modification to securityRealm.
SecurityRealm realm = securityRealm;
if(realm==SecurityRealm.NO_AUTHENTICATION)
return SecurityMode.UNSECURED;
if(realm instanceof LegacySecurityRealm)
return SecurityMode.LEGACY;
return SecurityMode.SECURED;
}
/**
* @return
* never null.
*/
public SecurityRealm getSecurityRealm() {
return securityRealm;
}
public void setSecurityRealm(SecurityRealm securityRealm) {
if(securityRealm==null)
securityRealm= SecurityRealm.NO_AUTHENTICATION;
this.useSecurity = true;
this.securityRealm = securityRealm;
// reset the filters and proxies for the new SecurityRealm
try {
HudsonFilter filter = HudsonFilter.get(servletContext);
if (filter == null) {
// Fix for #3069: This filter is not necessarily initialized before the servlets.
// when HudsonFilter does come back, it'll initialize itself.
LOGGER.fine(""HudsonFilter has not yet been initialized: Can't perform security setup for now"");
} else {
LOGGER.fine(""HudsonFilter has been previously initialized: Setting security up"");
filter.reset(securityRealm);
LOGGER.fine(""Security is now fully set up"");
}
} catch (ServletException e) {
// for binary compatibility, this method cannot throw a checked exception
throw new AcegiSecurityException(""Failed to configure filter"",e) {};
}
}
public void setAuthorizationStrategy(AuthorizationStrategy a) {
if (a == null)
a = AuthorizationStrategy.UNSECURED;
useSecurity = true;
authorizationStrategy = a;
}
public void disableSecurity() {
useSecurity = null;
setSecurityRealm(SecurityRealm.NO_AUTHENTICATION);
authorizationStrategy = AuthorizationStrategy.UNSECURED;
markupFormatter = null;
}
public void setProjectNamingStrategy(ProjectNamingStrategy ns) {
if(ns == null){
ns = DefaultProjectNamingStrategy.DEFAULT_NAMING_STRATEGY;
}
projectNamingStrategy = ns;
}
public Lifecycle getLifecycle() {
return Lifecycle.get();
}
/**
* Gets the dependency injection container that hosts all the extension implementations and other
* components in Jenkins.
*
* @since 1.GUICE
*/
public Injector getInjector() {
return lookup(Injector.class);
}
/**
* Returns {@link ExtensionList} that retains the discovered instances for the given extension type.
*
* @param extensionType
* The base type that represents the extension point. Normally {@link ExtensionPoint} subtype
* but that's not a hard requirement.
* @return
* Can be an empty list but never null.
*/
@SuppressWarnings({""unchecked""})
public <T> ExtensionList<T> getExtensionList(Class<T> extensionType) {
return extensionLists.get(extensionType);
}
/**
* Used to bind {@link ExtensionList}s to URLs.
*
* @since 1.349
*/
public ExtensionList getExtensionList(String extensionType) throws ClassNotFoundException {
return getExtensionList(pluginManager.uberClassLoader.loadClass(extensionType));
}
/**
* Returns {@link ExtensionList} that retains the discovered {@link Descriptor} instances for the given
* kind of {@link Describable}.
*
* @return
* Can be an empty list but never null.
*/
@SuppressWarnings({""unchecked""})
public <T extends Describable<T>,D extends Descriptor<T>> DescriptorExtensionList<T,D> getDescriptorList(Class<T> type) {
return descriptorLists.get(type);
}
/**
* Refresh {@link ExtensionList}s by adding all the newly discovered extensions.
*
* Exposed only for {@link PluginManager#dynamicLoad(File)}.
*/
public void refreshExtensions() throws ExtensionRefreshException {
ExtensionList<ExtensionFinder> finders = getExtensionList(ExtensionFinder.class);
for (ExtensionFinder ef : finders) {
if (!ef.isRefreshable())
throw new ExtensionRefreshException(ef+"" doesn't support refresh"");
}
List<ExtensionComponentSet> fragments = Lists.newArrayList();
for (ExtensionFinder ef : finders) {
fragments.add(ef.refresh());
}
ExtensionComponentSet delta = ExtensionComponentSet.union(fragments).filtered();
// if we find a new ExtensionFinder, we need it to list up all the extension points as well
List<ExtensionComponent<ExtensionFinder>> newFinders = Lists.newArrayList(delta.find(ExtensionFinder.class));
while (!newFinders.isEmpty()) {
ExtensionFinder f = newFinders.remove(newFinders.size()-1).getInstance();
ExtensionComponentSet ecs = ExtensionComponentSet.allOf(f).filtered();
newFinders.addAll(ecs.find(ExtensionFinder.class));
delta = ExtensionComponentSet.union(delta, ecs);
}
for (ExtensionList el : extensionLists.values()) {
el.refresh(delta);
}
for (ExtensionList el : descriptorLists.values()) {
el.refresh(delta);
}
// TODO: we need some generalization here so that extension points can be notified when a refresh happens?
for (ExtensionComponent<RootAction> ea : delta.find(RootAction.class)) {
Action a = ea.getInstance();
if (!actions.contains(a)) actions.add(a);
}
}
/**
* Returns the root {@link ACL}.
*
* @see AuthorizationStrategy#getRootACL()
*/
@Override
public ACL getACL() {
return authorizationStrategy.getRootACL();
}
/**
* @return
* never null.
*/
public AuthorizationStrategy getAuthorizationStrategy() {
return authorizationStrategy;
}
/**
* The strategy used to check the project names.
* @return never <code>null</code>
*/
public ProjectNamingStrategy getProjectNamingStrategy() {
return projectNamingStrategy == null ? ProjectNamingStrategy.DEFAULT_NAMING_STRATEGY : projectNamingStrategy;
}
/**
* Returns true if Hudson is quieting down.
* <p>
* No further jobs will be executed unless it
* can be finished while other current pending builds
* are still in progress.
*/
@Exported
public boolean isQuietingDown() {
return isQuietingDown;
}
/**
* Returns true if the container initiated the termination of the web application.
*/
public boolean isTerminating() {
return terminating;
}
/**
* Gets the initialization milestone that we've already reached.
*
* @return
* {@link InitMilestone#STARTED} even if the initialization hasn't been started, so that this method
* never returns null.
*/
public InitMilestone getInitLevel() {
return initLevel;
}
public void setNumExecutors(int n) throws IOException {
this.numExecutors = n;
save();
}
/**
* {@inheritDoc}.
*
* Note that the look up is case-insensitive.
*/
public TopLevelItem getItem(String name) {
if (name==null) return null;
TopLevelItem item = items.get(name);
if (item==null)
return null;
if (!item.hasPermission(Item.READ)) {
if (item.hasPermission(Item.DISCOVER)) {
throw new AccessDeniedException(""Please login to access job "" + name);
}
return null;
}
return item;
}
/**
* Gets the item by its path name from the given context
*
* <h2>Path Names</h2>
* <p>
* If the name starts from '/', like ""/foo/bar/zot"", then it's interpreted as absolute.
* Otherwise, the name should be something like ""foo/bar"" and it's interpreted like
* relative path name in the file system is, against the given context.
*
* @param context
* null is interpreted as {@link Jenkins}. Base 'directory' of the interpretation.
* @since 1.406
*/
public Item getItem(String pathName, ItemGroup context) {
if (context==null) context = this;
if (pathName==null) return null;
if (pathName.startsWith(""/"")) // absolute
return getItemByFullName(pathName);
Object/*Item|ItemGroup*/ ctx = context;
StringTokenizer tokens = new StringTokenizer(pathName,""/"");
while (tokens.hasMoreTokens()) {
String s = tokens.nextToken();
if (s.equals("".."")) {
if (ctx instanceof Item) {
ctx = ((Item)ctx).getParent();
continue;
}
ctx=null; // can't go up further
break;
}
if (s.equals(""."")) {
continue;
}
if (ctx instanceof ItemGroup) {
ItemGroup g = (ItemGroup) ctx;
Item i = g.getItem(s);
if (i==null || !i.hasPermission(Item.READ)) { // XXX consider DISCOVER
ctx=null; // can't go up further
break;
}
ctx=i;
} else {
return null;
}
}
if (ctx instanceof Item)
return (Item)ctx;
// fall back to the classic interpretation
return getItemByFullName(pathName);
}
public final Item getItem(String pathName, Item context) {
return getItem(pathName,context!=null?context.getParent():null);
}
public final <T extends Item> T getItem(String pathName, ItemGroup context, Class<T> type) {
Item r = getItem(pathName, context);
if (type.isInstance(r))
return type.cast(r);
return null;
}
public final <T extends Item> T getItem(String pathName, Item context, Class<T> type) {
return getItem(pathName,context!=null?context.getParent():null,type);
}
public File getRootDirFor(TopLevelItem child) {
return getRootDirFor(child.getName());
}
private File getRootDirFor(String name) {
return new File(new File(getRootDir(),""jobs""), name);
}
/**
* Gets the {@link Item} object by its full name.
* Full names are like path names, where each name of {@link Item} is
* combined by '/'.
*
* @return
* null if either such {@link Item} doesn't exist under the given full name,
* or it exists but it's no an instance of the given type.
*/
public @CheckForNull <T extends Item> T getItemByFullName(String fullName, Class<T> type) {
StringTokenizer tokens = new StringTokenizer(fullName,""/"");
ItemGroup parent = this;
if(!tokens.hasMoreTokens()) return null; // for example, empty full name.
while(true) {
Item item = parent.getItem(tokens.nextToken());
if(!tokens.hasMoreTokens()) {
if(type.isInstance(item))
return type.cast(item);
else
return null;
}
if(!(item instanceof ItemGroup))
return null; // this item can't have any children
if (!item.hasPermission(Item.READ))
return null; // XXX consider DISCOVER
parent = (ItemGroup) item;
}
}
public @CheckForNull Item getItemByFullName(String fullName) {
return getItemByFullName(fullName,Item.class);
}
/**
* Gets the user of the given name.
*
* @return the user of the given name, if that person exists or the invoker {@link #hasPermission} on {@link #ADMINISTER}; else null
* @see User#get(String,boolean)
*/
public @CheckForNull User getUser(String name) {
return User.get(name,hasPermission(ADMINISTER));
}
public synchronized TopLevelItem createProject( TopLevelItemDescriptor type, String name ) throws IOException {
return createProject(type, name, true);
}
public synchronized TopLevelItem createProject( TopLevelItemDescriptor type, String name, boolean notify ) throws IOException {
return itemGroupMixIn.createProject(type,name,notify);
}
/**
* Overwrites the existing item by new one.
*
* <p>
* This is a short cut for deleting an existing job and adding a new one.
*/
public synchronized void putItem(TopLevelItem item) throws IOException, InterruptedException {
String name = item.getName();
TopLevelItem old = items.get(name);
if (old ==item) return; // noop
checkPermission(Item.CREATE);
if (old!=null)
old.delete();
items.put(name,item);
ItemListener.fireOnCreated(item);
}
/**
* Creates a new job.
*
* <p>
* This version infers the descriptor from the type of the top-level item.
*
* @throws IllegalArgumentException
* if the project of the given name already exists.
*/
public synchronized <T extends TopLevelItem> T createProject( Class<T> type, String name ) throws IOException {
return type.cast(createProject((TopLevelItemDescriptor)getDescriptor(type),name));
}
/**
* Called by {@link Job#renameTo(String)} to update relevant data structure.
* assumed to be synchronized on Hudson by the caller.
*/
public void onRenamed(TopLevelItem job, String oldName, String newName) throws IOException {
items.remove(oldName);
items.put(newName,job);
for (View v : views)
v.onJobRenamed(job, oldName, newName);
save();
}
/**
* Called in response to {@link Job#doDoDelete(StaplerRequest, StaplerResponse)}
*/
public void onDeleted(TopLevelItem item) throws IOException {
for (ItemListener l : ItemListener.all())
l.onDeleted(item);
items.remove(item.getName());
for (View v : views)
v.onJobRenamed(item, item.getName(), null);
save();
}
public FingerprintMap getFingerprintMap() {
return fingerprintMap;
}
// if no finger print matches, display ""not found page"".
public Object getFingerprint( String md5sum ) throws IOException {
Fingerprint r = fingerprintMap.get(md5sum);
if(r==null) return new NoFingerprintMatch(md5sum);
else return r;
}
/**
* Gets a {@link Fingerprint} object if it exists.
* Otherwise null.
*/
public Fingerprint _getFingerprint( String md5sum ) throws IOException {
return fingerprintMap.get(md5sum);
}
/**
* The file we save our configuration.
*/
private XmlFile getConfigFile() {
return new XmlFile(XSTREAM, new File(root,""config.xml""));
}
public int getNumExecutors() {
return numExecutors;
}
public Mode getMode() {
return mode;
}
public void setMode(Mode m) throws IOException {
this.mode = m;
save();
}
public String getLabelString() {
return fixNull(label).trim();
}
@Override
public void setLabelString(String label) throws IOException {
this.label = label;
save();
}
@Override
public LabelAtom getSelfLabel() {
return getLabelAtom(""master"");
}
public Computer createComputer() {
return new Hudson.MasterComputer();
}
private synchronized TaskBuilder loadTasks() throws IOException {
File projectsDir = new File(root,""jobs"");
if(!projectsDir.getCanonicalFile().isDirectory() && !projectsDir.mkdirs()) {
if(projectsDir.exists())
throw new IOException(projectsDir+"" is not a directory"");
throw new IOException(""Unable to create ""+projectsDir+""\nPermission issue? Please create this directory manually."");
}
File[] subdirs = projectsDir.listFiles(new FileFilter() {
public boolean accept(File child) {
return child.isDirectory() && Items.getConfigFile(child).exists();
}
});
TaskGraphBuilder g = new TaskGraphBuilder();
Handle loadHudson = g.requires(EXTENSIONS_AUGMENTED).attains(JOB_LOADED).add(""Loading global config"", new Executable() {
public void run(Reactor session) throws Exception {
// JENKINS-8043: some slaves (eg. swarm slaves) are not saved into the config file
// and will get overwritten when reloading. Make a backup copy now, and re-add them later
NodeList oldSlaves = slaves;
XmlFile cfg = getConfigFile();
if (cfg.exists()) {
// reset some data that may not exist in the disk file
// so that we can take a proper compensation action later.
primaryView = null;
views.clear();
// load from disk
cfg.unmarshal(Jenkins.this);
}
// if we are loading old data that doesn't have this field
if (slaves == null) slaves = new NodeList();
clouds.setOwner(Jenkins.this);
items.clear();
// JENKINS-8043: re-add the slaves which were not saved into the config file
// and are now missing, but still connected.
if (oldSlaves != null) {
ArrayList<Node> newSlaves = new ArrayList<Node>(slaves);
for (Node n: oldSlaves) {
if (n instanceof EphemeralNode) {
if(!newSlaves.contains(n)) {
newSlaves.add(n);
}
}
}
setNodes(newSlaves);
}
}
});
for (final File subdir : subdirs) {
g.requires(loadHudson).attains(JOB_LOADED).notFatal().add(""Loading job ""+subdir.getName(),new Executable() {
public void run(Reactor session) throws Exception {
TopLevelItem item = (TopLevelItem) Items.load(Jenkins.this, subdir);
items.put(item.getName(), item);
}
});
}
g.requires(JOB_LOADED).add(""Finalizing set up"",new Executable() {
public void run(Reactor session) throws Exception {
rebuildDependencyGraph();
{// recompute label objects - populates the labels mapping.
for (Node slave : slaves)
// Note that not all labels are visible until the slaves have connected.
slave.getAssignedLabels();
getAssignedLabels();
}
// initialize views by inserting the default view if necessary
// this is both for clean Hudson and for backward compatibility.
if(views.size()==0 || primaryView==null) {
View v = new AllView(Messages.Hudson_ViewName());
setViewOwner(v);
views.add(0,v);
primaryView = v.getViewName();
}
// read in old data that doesn't have the security field set
if(authorizationStrategy==null) {
if(useSecurity==null || !useSecurity)
authorizationStrategy = AuthorizationStrategy.UNSECURED;
else
authorizationStrategy = new LegacyAuthorizationStrategy();
}
if(securityRealm==null) {
if(useSecurity==null || !useSecurity)
setSecurityRealm(SecurityRealm.NO_AUTHENTICATION);
else
setSecurityRealm(new LegacySecurityRealm());
} else {
// force the set to proxy
setSecurityRealm(securityRealm);
}
if(useSecurity!=null && !useSecurity) {
// forced reset to the unsecure mode.
// this works as an escape hatch for people who locked themselves out.
authorizationStrategy = AuthorizationStrategy.UNSECURED;
setSecurityRealm(SecurityRealm.NO_AUTHENTICATION);
}
// Initialize the filter with the crumb issuer
setCrumbIssuer(crumbIssuer);
// auto register root actions
for (Action a : getExtensionList(RootAction.class))
if (!actions.contains(a)) actions.add(a);
}
});
return g;
}
/**
* Save the settings to a file.
*/
public synchronized void save() throws IOException {
if(BulkChange.contains(this)) return;
getConfigFile().write(this);
SaveableListener.fireOnChange(this, getConfigFile());
}
/**
* Called to shut down the system.
*/
@edu.umd.cs.findbugs.annotations.SuppressWarnings(""ST_WRITE_TO_STATIC_FROM_INSTANCE_METHOD"")
public void cleanUp() {
for (ItemListener l : ItemListener.all())
l.onBeforeShutdown();
Set<Future<?>> pending = new HashSet<Future<?>>();
terminating = true;
for( Computer c : computers.values() ) {
c.interrupt();
killComputer(c);
pending.add(c.disconnect(null));
}
if(udpBroadcastThread!=null)
udpBroadcastThread.shutdown();
if(dnsMultiCast!=null)
dnsMultiCast.close();
interruptReloadThread();
Timer timer = Trigger.timer;
if (timer != null) {
timer.cancel();
}
// TODO: how to wait for the completion of the last job?
Trigger.timer = null;
if(tcpSlaveAgentListener!=null)
tcpSlaveAgentListener.shutdown();
if(pluginManager!=null) // be defensive. there could be some ugly timing related issues
pluginManager.stop();
if(getRootDir().exists())
// if we are aborting because we failed to create JENKINS_HOME,
// don't try to save. Issue #536
getQueue().save();
threadPoolForLoad.shutdown();
for (Future<?> f : pending)
try {
f.get(10, TimeUnit.SECONDS); // if clean up operation didn't complete in time, we fail the test
} catch (InterruptedException e) {
Thread.currentThread().interrupt();
break; // someone wants us to die now. quick!
} catch (ExecutionException e) {
LOGGER.log(Level.WARNING, ""Failed to shut down properly"",e);
} catch (TimeoutException e) {
LOGGER.log(Level.WARNING, ""Failed to shut down properly"",e);
}
LogFactory.releaseAll();
theInstance = null;
}
public Object getDynamic(String token) {
for (Action a : getActions()) {
String url = a.getUrlName();
if (url==null) continue;
if (url.equals(token) || url.equals('/' + token))
return a;
}
for (Action a : getManagementLinks())
if(a.getUrlName().equals(token))
return a;
return null;
}
//
//
// actions
//
//
/**
* Accepts submission from the configuration page.
*/
public synchronized void doConfigSubmit( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException, FormException {
BulkChange bc = new BulkChange(this);
try {
checkPermission(ADMINISTER);
JSONObject json = req.getSubmittedForm();
workspaceDir = json.getString(""rawWorkspaceDir"");
buildsDir = json.getString(""rawBuildsDir"");
systemMessage = Util.nullify(req.getParameter(""system_message""));
jdks.clear();
jdks.addAll(req.bindJSONToList(JDK.class,json.get(""jdks"")));
boolean result = true;
for( Descriptor<?> d : Functions.getSortedDescriptorsForGlobalConfig() )
result &= configureDescriptor(req,json,d);
version = VERSION;
save();
updateComputerList();
if(result)
FormApply.success(req.getContextPath()+'/').generateResponse(req, rsp, null);
else
FormApply.success(""configure"").generateResponse(req, rsp, null); // back to config
} finally {
bc.commit();
}
}
/**
* Gets the {@link CrumbIssuer} currently in use.
*
* @return null if none is in use.
*/
public CrumbIssuer getCrumbIssuer() {
return crumbIssuer;
}
public void setCrumbIssuer(CrumbIssuer issuer) {
crumbIssuer = issuer;
}
public synchronized void doTestPost( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException {
rsp.sendRedirect(""foo"");
}
private boolean configureDescriptor(StaplerRequest req, JSONObject json, Descriptor<?> d) throws FormException {
// collapse the structure to remain backward compatible with the JSON structure before 1.
String name = d.getJsonSafeClassName();
JSONObject js = json.has(name) ? json.getJSONObject(name) : new JSONObject(); // if it doesn't have the property, the method returns invalid null object.
json.putAll(js);
return d.configure(req, js);
}
/**
* Accepts submission from the node configuration page.
*/
public synchronized void doConfigExecutorsSubmit( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException, FormException {
checkPermission(ADMINISTER);
BulkChange bc = new BulkChange(this);
try {
JSONObject json = req.getSubmittedForm();
MasterBuildConfiguration mbc = MasterBuildConfiguration.all().get(MasterBuildConfiguration.class);
if (mbc!=null)
mbc.configure(req,json);
getNodeProperties().rebuild(req, json.optJSONObject(""nodeProperties""), NodeProperty.all());
} finally {
bc.commit();
}
rsp.sendRedirect(req.getContextPath()+'/'+toComputer().getUrl()); // back to the computer page
}
/**
* Accepts the new description.
*/
public synchronized void doSubmitDescription( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException {
getPrimaryView().doSubmitDescription(req, rsp);
}
public synchronized HttpRedirect doQuietDown() throws IOException {
try {
return doQuietDown(false,0);
} catch (InterruptedException e) {
throw new AssertionError(); // impossible
}
}
@CLIMethod(name=""quiet-down"")
public HttpRedirect doQuietDown(
@Option(name=""-block"",usage=""Block until the system really quiets down and no builds are running"") @QueryParameter boolean block,
@Option(name=""-timeout"",usage=""If non-zero, only block up to the specified number of milliseconds"") @QueryParameter int timeout) throws InterruptedException, IOException {
synchronized (this) {
checkPermission(ADMINISTER);
isQuietingDown = true;
}
if (block) {
if (timeout > 0) timeout += System.currentTimeMillis();
while (isQuietingDown
&& (timeout <= 0 || System.currentTimeMillis() < timeout)
&& !RestartListener.isAllReady()) {
Thread.sleep(1000);
}
}
return new HttpRedirect(""."");
}
@CLIMethod(name=""cancel-quiet-down"")
public synchronized HttpRedirect doCancelQuietDown() {
checkPermission(ADMINISTER);
isQuietingDown = false;
getQueue().scheduleMaintenance();
return new HttpRedirect(""."");
}
/**
* Backward compatibility. Redirect to the thread dump.
*/
public void doClassicThreadDump(StaplerResponse rsp) throws IOException, ServletException {
rsp.sendRedirect2(""threadDump"");
}
/**
* Obtains the thread dump of all slaves (including the master.)
*
* <p>
* Since this is for diagnostics, it has a built-in precautionary measure against hang slaves.
*/
public Map<String,Map<String,String>> getAllThreadDumps() throws IOException, InterruptedException {
checkPermission(ADMINISTER);
// issue the requests all at once
Map<String,Future<Map<String,String>>> future = new HashMap<String, Future<Map<String, String>>>();
for (Computer c : getComputers()) {
try {
future.put(c.getName(), RemotingDiagnostics.getThreadDumpAsync(c.getChannel()));
} catch(Exception e) {
LOGGER.info(""Failed to get thread dump for node "" + c.getName() + "": "" + e.getMessage());
}
}
if (toComputer() == null) {
future.put(""master"", RemotingDiagnostics.getThreadDumpAsync(MasterComputer.localChannel));
}
// if the result isn't available in 5 sec, ignore that.
// this is a precaution against hang nodes
long endTime = System.currentTimeMillis() + 5000;
Map<String,Map<String,String>> r = new HashMap<String, Map<String, String>>();
for (Entry<String, Future<Map<String, String>>> e : future.entrySet()) {
try {
r.put(e.getKey(), e.getValue().get(endTime-System.currentTimeMillis(), TimeUnit.MILLISECONDS));
} catch (Exception x) {
StringWriter sw = new StringWriter();
x.printStackTrace(new PrintWriter(sw,true));
r.put(e.getKey(), Collections.singletonMap(""Failed to retrieve thread dump"",sw.toString()));
}
}
return r;
}
public synchronized TopLevelItem doCreateItem( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException {
return itemGroupMixIn.createTopLevelItem(req, rsp);
}
/**
* @since 1.319
*/
public TopLevelItem createProjectFromXML(String name, InputStream xml) throws IOException {
return itemGroupMixIn.createProjectFromXML(name, xml);
}
@SuppressWarnings({""unchecked""})
public <T extends TopLevelItem> T copy(T src, String name) throws IOException {
return itemGroupMixIn.copy(src, name);
}
// a little more convenient overloading that assumes the caller gives us the right type
// (or else it will fail with ClassCastException)
public <T extends AbstractProject<?,?>> T copy(T src, String name) throws IOException {
return (T)copy((TopLevelItem)src,name);
}
public synchronized void doCreateView( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException, FormException {
checkPermission(View.CREATE);
addView(View.create(req,rsp, this));
}
/**
* Check if the given name is suitable as a name
* for job, view, etc.
*
* @throws ParseException
* if the given name is not good
*/
public static void checkGoodName(String name) throws Failure {
if(name==null || name.length()==0)
throw new Failure(Messages.Hudson_NoName());
for( int i=0; i<name.length(); i++ ) {
char ch = name.charAt(i);
if(Character.isISOControl(ch)) {
throw new Failure(Messages.Hudson_ControlCodeNotAllowed(toPrintableName(name)));
}
if(""?*/\\%!@#$^&|<>[]:;"".indexOf(ch)!=-1)
throw new Failure(Messages.Hudson_UnsafeChar(ch));
}
// looks good
}
/**
* Makes sure that the given name is good as a job name.
* @return trimmed name if valid; throws ParseException if not
*/
private String checkJobName(String name) throws Failure {
checkGoodName(name);
name = name.trim();
projectNamingStrategy.checkName(name);
if(getItem(name)!=null)
throw new Failure(Messages.Hudson_JobAlreadyExists(name));
// looks good
return name;
}
private static String toPrintableName(String name) {
StringBuilder printableName = new StringBuilder();
for( int i=0; i<name.length(); i++ ) {
char ch = name.charAt(i);
if(Character.isISOControl(ch))
printableName.append(""\\u"").append((int)ch).append(';');
else
printableName.append(ch);
}
return printableName.toString();
}
/**
* Checks if the user was successfully authenticated.
*
* @see BasicAuthenticationFilter
*/
public void doSecured( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException {
if(req.getUserPrincipal()==null) {
// authentication must have failed
rsp.setStatus(HttpServletResponse.SC_UNAUTHORIZED);
return;
}
// the user is now authenticated, so send him back to the target
String path = req.getContextPath()+req.getOriginalRestOfPath();
String q = req.getQueryString();
if(q!=null)
path += '?'+q;
rsp.sendRedirect2(path);
}
/**
* Called once the user logs in. Just forward to the top page.
*/
public void doLoginEntry( StaplerRequest req, StaplerResponse rsp ) throws IOException {
if(req.getUserPrincipal()==null) {
rsp.sendRedirect2(""noPrincipal"");
return;
}
String from = req.getParameter(""from"");
if(from!=null && from.startsWith(""/"") && !from.equals(""/loginError"")) {
rsp.sendRedirect2(from); // I'm bit uncomfortable letting users redircted to other sites, make sure the URL falls into this domain
return;
}
String url = AbstractProcessingFilter.obtainFullRequestUrl(req);
if(url!=null) {
// if the login redirect is initiated by Acegi
// this should send the user back to where s/he was from.
rsp.sendRedirect2(url);
return;
}
rsp.sendRedirect2(""."");
}
/**
* Logs out the user.
*/
public void doLogout( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException {
securityRealm.doLogout(req, rsp);
}
/**
* Serves jar files for JNLP slave agents.
*/
public Slave.JnlpJar getJnlpJars(String fileName) {
return new Slave.JnlpJar(fileName);
}
public Slave.JnlpJar doJnlpJars(StaplerRequest req) {
return new Slave.JnlpJar(req.getRestOfPath().substring(1));
}
/**
* Reloads the configuration.
*/
@CLIMethod(name=""reload-configuration"")
public synchronized HttpResponse doReload() throws IOException {
checkPermission(ADMINISTER);
// engage ""loading ..."" UI and then run the actual task in a separate thread
servletContext.setAttribute(""app"", new HudsonIsLoading());
new Thread(""Jenkins config reload thread"") {
@Override
public void run() {
try {
ACL.impersonate(ACL.SYSTEM);
reload();
} catch (Exception e) {
LOGGER.log(SEVERE,""Failed to reload Jenkins config"",e);
WebApp.get(servletContext).setApp(new JenkinsReloadFailed(e));
}
}
}.start();
return HttpResponses.redirectViaContextPath(""/"");
}
/**
* Reloads the configuration synchronously.
*/
public void reload() throws IOException, InterruptedException, ReactorException {
executeReactor(null, loadTasks());
User.reload();
servletContext.setAttribute(""app"", this);
}
/**
* Do a finger-print check.
*/
public void doDoFingerprintCheck( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException {
// Parse the request
MultipartFormDataParser p = new MultipartFormDataParser(req);
if(isUseCrumbs() && !getCrumbIssuer().validateCrumb(req, p)) {
rsp.sendError(HttpServletResponse.SC_FORBIDDEN,""No crumb found"");
}
try {
rsp.sendRedirect2(req.getContextPath()+""/fingerprint/""+
Util.getDigestOf(p.getFileItem(""name"").getInputStream())+'/');
} finally {
p.cleanUp();
}
}
/**
* For debugging. Expose URL to perform GC.
*/
@edu.umd.cs.findbugs.annotations.SuppressWarnings(""DM_GC"")
public void doGc(StaplerResponse rsp) throws IOException {
checkPermission(Jenkins.ADMINISTER);
System.gc();
rsp.setStatus(HttpServletResponse.SC_OK);
rsp.setContentType(""text/plain"");
rsp.getWriter().println(""GCed"");
}
/**
* End point that intentionally throws an exception to test the error behaviour.
*/
public void doException() {
throw new RuntimeException();
}
public ContextMenu doContextMenu(StaplerRequest request, StaplerResponse response) throws IOException, JellyException {
ContextMenu menu = new ContextMenu().from(this, request, response);
for (MenuItem i : menu.items) {
if (i.url.equals(""/manage"")) {
// add ""Manage Jenkins"" subitems
i.subMenu = new ContextMenu().from(this, request, response, ""manage"");
}
}
return menu;
}
/**
* Obtains the heap dump.
*/
public HeapDump getHeapDump() throws IOException {
return new HeapDump(this,MasterComputer.localChannel);
}
/**
* Simulates OutOfMemoryError.
* Useful to make sure OutOfMemoryHeapDump setting.
*/
public void doSimulateOutOfMemory() throws IOException {
checkPermission(ADMINISTER);
System.out.println(""Creating artificial OutOfMemoryError situation"");
List<Object> args = new ArrayList<Object>();
while (true)
args.add(new byte[1024*1024]);
}
private transient final Map<UUID,FullDuplexHttpChannel> duplexChannels = new HashMap<UUID, FullDuplexHttpChannel>();
/**
* Handles HTTP requests for duplex channels for CLI.
*/
public void doCli(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException, InterruptedException {
if (!""POST"".equals(req.getMethod())) {
// for GET request, serve _cli.jelly, assuming this is a browser
checkPermission(READ);
req.getView(this,""_cli.jelly"").forward(req,rsp);
return;
}
// do not require any permission to establish a CLI connection
// the actual authentication for the connecting Channel is done by CLICommand
UUID uuid = UUID.fromString(req.getHeader(""Session""));
rsp.setHeader(""Hudson-Duplex"",""""); // set the header so that the client would know
FullDuplexHttpChannel server;
if(req.getHeader(""Side"").equals(""download"")) {
duplexChannels.put(uuid,server=new FullDuplexHttpChannel(uuid, !hasPermission(ADMINISTER)) {
protected void main(Channel channel) throws IOException, InterruptedException {
// capture the identity given by the transport, since this can be useful for SecurityRealm.createCliAuthenticator()
channel.setProperty(CLICommand.TRANSPORT_AUTHENTICATION,getAuthentication());
channel.setProperty(CliEntryPoint.class.getName(),new CliManagerImpl(channel));
}
});
try {
server.download(req,rsp);
} finally {
duplexChannels.remove(uuid);
}
} else {
duplexChannels.get(uuid).upload(req,rsp);
}
}
/**
* Binds /userContent/... to $JENKINS_HOME/userContent.
*/
public DirectoryBrowserSupport doUserContent() {
return new DirectoryBrowserSupport(this,getRootPath().child(""userContent""),""User content"",""folder.png"",true);
}
/**
* Perform a restart of Hudson, if we can.
*
* This first replaces ""app"" to {@link HudsonIsRestarting}
*/
@CLIMethod(name=""restart"")
public void doRestart(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException, RestartNotSupportedException {
checkPermission(ADMINISTER);
if (req != null && req.getMethod().equals(""GET"")) {
req.getView(this,""_restart.jelly"").forward(req,rsp);
return;
}
restart();
if (rsp != null) // null for CLI
rsp.sendRedirect2(""."");
}
/**
* Queues up a restart of Hudson for when there are no builds running, if we can.
*
* This first replaces ""app"" to {@link HudsonIsRestarting}
*
* @since 1.332
*/
@CLIMethod(name=""safe-restart"")
public HttpResponse doSafeRestart(StaplerRequest req) throws IOException, ServletException, RestartNotSupportedException {
checkPermission(ADMINISTER);
if (req != null && req.getMethod().equals(""GET""))
return HttpResponses.forwardToView(this,""_safeRestart.jelly"");
safeRestart();
return HttpResponses.redirectToDot();
}
/**
* Performs a restart.
*/
public void restart() throws RestartNotSupportedException {
final Lifecycle lifecycle = Lifecycle.get();
lifecycle.verifyRestartable(); // verify that Hudson is restartable
servletContext.setAttribute(""app"", new HudsonIsRestarting());
new Thread(""restart thread"") {
final String exitUser = getAuthentication().getName();
@Override
public void run() {
try {
ACL.impersonate(ACL.SYSTEM);
// give some time for the browser to load the ""reloading"" page
Thread.sleep(5000);
LOGGER.severe(String.format(""Restarting VM as requested by %s"",exitUser));
for (RestartListener listener : RestartListener.all())
listener.onRestart();
lifecycle.restart();
} catch (InterruptedException e) {
LOGGER.log(Level.WARNING, ""Failed to restart Hudson"",e);
} catch (IOException e) {
LOGGER.log(Level.WARNING, ""Failed to restart Hudson"",e);
}
}
}.start();
}
/**
* Queues up a restart to be performed once there are no builds currently running.
* @since 1.332
*/
public void safeRestart() throws RestartNotSupportedException {
final Lifecycle lifecycle = Lifecycle.get();
lifecycle.verifyRestartable(); // verify that Hudson is restartable
// Quiet down so that we won't launch new builds.
isQuietingDown = true;
new Thread(""safe-restart thread"") {
final String exitUser = getAuthentication().getName();
@Override
public void run() {
try {
ACL.impersonate(ACL.SYSTEM);
// Wait 'til we have no active executors.
doQuietDown(true, 0);
// Make sure isQuietingDown is still true.
if (isQuietingDown) {
servletContext.setAttribute(""app"",new HudsonIsRestarting());
// give some time for the browser to load the ""reloading"" page
LOGGER.info(""Restart in 10 seconds"");
Thread.sleep(10000);
LOGGER.severe(String.format(""Restarting VM as requested by %s"",exitUser));
for (RestartListener listener : RestartListener.all())
listener.onRestart();
lifecycle.restart();
} else {
LOGGER.info(""Safe-restart mode cancelled"");
}
} catch (InterruptedException e) {
LOGGER.log(Level.WARNING, ""Failed to restart Hudson"",e);
} catch (IOException e) {
LOGGER.log(Level.WARNING, ""Failed to restart Hudson"",e);
}
}
}.start();
}
/**
* Shutdown the system.
* @since 1.161
*/
@CLIMethod(name=""shutdown"")
public void doExit( StaplerRequest req, StaplerResponse rsp ) throws IOException {
checkPermission(ADMINISTER);
LOGGER.severe(String.format(""Shutting down VM as requested by %s from %s"",
getAuthentication().getName(), req!=null?req.getRemoteAddr():""???""));
if (rsp!=null) {
rsp.setStatus(HttpServletResponse.SC_OK);
rsp.setContentType(""text/plain"");
PrintWriter w = rsp.getWriter();
w.println(""Shutting down"");
w.close();
}
System.exit(0);
}
/**
* Shutdown the system safely.
* @since 1.332
*/
@CLIMethod(name=""safe-shutdown"")
public HttpResponse doSafeExit(StaplerRequest req) throws IOException {
checkPermission(ADMINISTER);
isQuietingDown = true;
final String exitUser = getAuthentication().getName();
final String exitAddr = req!=null ? req.getRemoteAddr() : ""unknown"";
new Thread(""safe-exit thread"") {
@Override
public void run() {
try {
ACL.impersonate(ACL.SYSTEM);
LOGGER.severe(String.format(""Shutting down VM as requested by %s from %s"",
exitUser, exitAddr));
// Wait 'til we have no active executors.
while (isQuietingDown
&& (overallLoad.computeTotalExecutors() > overallLoad.computeIdleExecutors())) {
Thread.sleep(5000);
}
// Make sure isQuietingDown is still true.
if (isQuietingDown) {
cleanUp();
System.exit(0);
}
} catch (InterruptedException e) {
LOGGER.log(Level.WARNING, ""Failed to shutdown Hudson"",e);
}
}
}.start();
return HttpResponses.plainText(""Shutting down as soon as all jobs are complete"");
}
/**
* Gets the {@link Authentication} object that represents the user
* associated with the current request.
*/
public static Authentication getAuthentication() {
Authentication a = SecurityContextHolder.getContext().getAuthentication();
// on Tomcat while serving the login page, this is null despite the fact
// that we have filters. Looking at the stack trace, Tomcat doesn't seem to
// run the request through filters when this is the login request.
// see http://www.nabble.com/Matrix-authorization-problem-tp14602081p14886312.html
if(a==null)
a = ANONYMOUS;
return a;
}
/**
* For system diagnostics.
* Run arbitrary Groovy script.
*/
public void doScript(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException {
doScript(req, rsp, req.getView(this, ""_script.jelly""));
}
/**
* Run arbitrary Groovy script and return result as plain text.
*/
public void doScriptText(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException {
doScript(req, rsp, req.getView(this, ""_scriptText.jelly""));
}
private void doScript(StaplerRequest req, StaplerResponse rsp, RequestDispatcher view) throws IOException, ServletException {
// ability to run arbitrary script is dangerous
checkPermission(RUN_SCRIPTS);
String text = req.getParameter(""script"");
if (text != null) {
try {
req.setAttribute(""output"",
RemotingDiagnostics.executeGroovy(text, MasterComputer.localChannel));
} catch (InterruptedException e) {
throw new ServletException(e);
}
}
view.forward(req, rsp);
}
/**
* Evaluates the Jelly script submitted by the client.
*
* This is useful for system administration as well as unit testing.
*/
@RequirePOST
public void doEval(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException {
checkPermission(ADMINISTER);
try {
MetaClass mc = WebApp.getCurrent().getMetaClass(getClass());
Script script = mc.classLoader.loadTearOff(JellyClassLoaderTearOff.class).createContext().compileScript(new InputSource(req.getReader()));
new JellyRequestDispatcher(this,script).forward(req,rsp);
} catch (JellyException e) {
throw new ServletException(e);
}
}
/**
* Sign up for the user account.
*/
public void doSignup( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException {
req.getView(getSecurityRealm(), ""signup.jelly"").forward(req, rsp);
}
/**
* Changes the icon size by changing the cookie
*/
public void doIconSize( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException {
String qs = req.getQueryString();
if(qs==null || !ICON_SIZE.matcher(qs).matches())
throw new ServletException();
Cookie cookie = new Cookie(""iconSize"", qs);
cookie.setMaxAge(/* ~4 mo. */9999999); // #762
rsp.addCookie(cookie);
String ref = req.getHeader(""Referer"");
if(ref==null) ref=""."";
rsp.sendRedirect2(ref);
}
public void doFingerprintCleanup(StaplerResponse rsp) throws IOException {
FingerprintCleanupThread.invoke();
rsp.setStatus(HttpServletResponse.SC_OK);
rsp.setContentType(""text/plain"");
rsp.getWriter().println(""Invoked"");
}
public void doWorkspaceCleanup(StaplerResponse rsp) throws IOException {
WorkspaceCleanupThread.invoke();
rsp.setStatus(HttpServletResponse.SC_OK);
rsp.setContentType(""text/plain"");
rsp.getWriter().println(""Invoked"");
}
/**
* If the user chose the default JDK, make sure we got 'java' in PATH.
*/
public FormValidation doDefaultJDKCheck(StaplerRequest request, @QueryParameter String value) {
if(!value.equals(""(Default)""))
// assume the user configured named ones properly in system config ---
// or else system config should have reported form field validation errors.
return FormValidation.ok();
// default JDK selected. Does such java really exist?
if(JDK.isDefaultJDKValid(Jenkins.this))
return FormValidation.ok();
else
return FormValidation.errorWithMarkup(Messages.Hudson_NoJavaInPath(request.getContextPath()));
}
/**
* Makes sure that the given name is good as a job name.
*/
public FormValidation doCheckJobName(@QueryParameter String value) {
// this method can be used to check if a file exists anywhere in the file system,
// so it should be protected.
checkPermission(Item.CREATE);
if(fixEmpty(value)==null)
return FormValidation.ok();
try {
checkJobName(value);
return FormValidation.ok();
} catch (Failure e) {
return FormValidation.error(e.getMessage());
}
}
/**
* Checks if a top-level view with the given name exists.
*/
public FormValidation doViewExistsCheck(@QueryParameter String value) {
checkPermission(View.CREATE);
String view = fixEmpty(value);
if(view==null) return FormValidation.ok();
if(getView(view)==null)
return FormValidation.ok();
else
return FormValidation.error(Messages.Hudson_ViewAlreadyExists(view));
}
/**
* Serves static resources placed along with Jelly view files.
* <p>
* This method can serve a lot of files, so care needs to be taken
* to make this method secure. It's not clear to me what's the best
* strategy here, though the current implementation is based on
* file extensions.
*/
public void doResources(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException {
String path = req.getRestOfPath();
// cut off the ""..."" portion of /resources/.../path/to/file
// as this is only used to make path unique (which in turn
// allows us to set a long expiration date
path = path.substring(path.indexOf('/',1)+1);
int idx = path.lastIndexOf('.');
String extension = path.substring(idx+1);
if(ALLOWED_RESOURCE_EXTENSIONS.contains(extension)) {
URL url = pluginManager.uberClassLoader.getResource(path);
if(url!=null) {
long expires = MetaClass.NO_CACHE ? 0 : 365L * 24 * 60 * 60 * 1000; /*1 year*/
rsp.serveFile(req,url,expires);
return;
}
}
rsp.sendError(HttpServletResponse.SC_NOT_FOUND);
}
/**
* Extension list that {@link #doResources(StaplerRequest, StaplerResponse)} can serve.
* This set is mutable to allow plugins to add additional extensions.
*/
public static final Set<String> ALLOWED_RESOURCE_EXTENSIONS = new HashSet<String>(Arrays.asList(
""js|css|jpeg|jpg|png|gif|html|htm"".split(""\\|"")
));
/**
* Checks if container uses UTF-8 to decode URLs. See
* http://wiki.jenkins-ci.org/display/JENKINS/Tomcat#Tomcat-i18n
*/
public FormValidation doCheckURIEncoding(StaplerRequest request) throws IOException {
// expected is non-ASCII String
final String expected = ""\u57f7\u4e8b"";
final String value = fixEmpty(request.getParameter(""value""));
if (!expected.equals(value))
return FormValidation.warningWithMarkup(Messages.Hudson_NotUsesUTF8ToDecodeURL());
return FormValidation.ok();
}
/**
* Does not check when system default encoding is ""ISO-8859-1"".
*/
public static boolean isCheckURIEncodingEnabled() {
return !""ISO-8859-1"".equalsIgnoreCase(System.getProperty(""file.encoding""));
}
/**
* Rebuilds the dependency map.
*/
public void rebuildDependencyGraph() {
DependencyGraph graph = new DependencyGraph();
graph.build();
// volatile acts a as a memory barrier here and therefore guarantees
// that graph is fully build, before it's visible to other threads
dependencyGraph = graph;
}
public DependencyGraph getDependencyGraph() {
return dependencyGraph;
}
// for Jelly
public List<ManagementLink> getManagementLinks() {
return ManagementLink.all();
}
/**
* Exposes the current user to <tt>/me</tt> URL.
*/
public User getMe() {
User u = User.current();
if (u == null)
throw new AccessDeniedException(""/me is not available when not logged in"");
return u;
}
/**
* Gets the {@link Widget}s registered on this object.
*
* <p>
* Plugins who wish to contribute boxes on the side panel can add widgets
* by {@code getWidgets().add(new MyWidget())} from {@link Plugin#start()}.
*/
public List<Widget> getWidgets() {
return widgets;
}
public Object getTarget() {
try {
checkPermission(READ);
} catch (AccessDeniedException e) {
String rest = Stapler.getCurrentRequest().getRestOfPath();
if(rest.startsWith(""/login"")
|| rest.startsWith(""/logout"")
|| rest.startsWith(""/accessDenied"")
|| rest.startsWith(""/adjuncts/"")
|| rest.startsWith(""/signup"")
|| rest.startsWith(""/tcpSlaveAgentListener"")
|| rest.startsWith(""/cli"")
|| rest.startsWith(""/federatedLoginService/"")
|| rest.startsWith(""/securityRealm""))
return this; // URLs that are always visible without READ permission
for (String name : getUnprotectedRootActions()) {
if (rest.startsWith(""/"" + name + ""/"") || rest.equals(""/"" + name)) {
return this;
}
}
throw e;
}
return this;
}
/**
* Gets a list of unprotected root actions.
* These URL prefixes should be exempted from access control checks by container-managed security.
* Ideally would be synchronized with {@link #getTarget}.
* @return a list of {@linkplain Action#getUrlName URL names}
* @since 1.495
*/
public Collection<String> getUnprotectedRootActions() {
Set<String> names = new TreeSet<String>();
names.add(""jnlpJars""); // XXX cleaner to refactor doJnlpJars into a URA
// XXX consider caching (expiring cache when actions changes)
for (Action a : getActions()) {
if (a instanceof UnprotectedRootAction) {
names.add(a.getUrlName());
}
}
return names;
}
/**
* Fallback to the primary view.
*/
public View getStaplerFallback() {
return getPrimaryView();
}
/**
* This method checks all existing jobs to see if displayName is
* unique. It does not check the displayName against the displayName of the
* job that the user is configuring though to prevent a validation warning
* if the user sets the displayName to what it currently is.
* @param displayName
* @param currentJobName
* @return
*/
boolean isDisplayNameUnique(String displayName, String currentJobName) {
Collection<TopLevelItem> itemCollection = items.values();
// if there are a lot of projects, we'll have to store their
// display names in a HashSet or something for a quick check
for(TopLevelItem item : itemCollection) {
if(item.getName().equals(currentJobName)) {
// we won't compare the candidate displayName against the current
// item. This is to prevent an validation warning if the user
// sets the displayName to what the existing display name is
continue;
}
else if(displayName.equals(item.getDisplayName())) {
return false;
}
}
return true;
}
/**
* True if there is no item in Jenkins that has this name
* @param name The name to test
* @param currentJobName The name of the job that the user is configuring
* @return
*/
boolean isNameUnique(String name, String currentJobName) {
Item item = getItem(name);
if(null==item) {
// the candidate name didn't return any items so the name is unique
return true;
}
else if(item.getName().equals(currentJobName)) {
// the candidate name returned an item, but the item is the item
// that the user is configuring so this is ok
return true;
}
else {
// the candidate name returned an item, so it is not unique
return false;
}
}
/**
* Checks to see if the candidate displayName collides with any
* existing display names or project names
* @param displayName The display name to test
* @param jobName The name of the job the user is configuring
* @return
*/
public FormValidation doCheckDisplayName(@QueryParameter String displayName,
@QueryParameter String jobName) {
displayName = displayName.trim();
if(LOGGER.isLoggable(Level.FINE)) {
LOGGER.log(Level.FINE, ""Current job name is "" + jobName);
}
if(!isNameUnique(displayName, jobName)) {
return FormValidation.warning(Messages.Jenkins_CheckDisplayName_NameNotUniqueWarning(displayName));
}
else if(!isDisplayNameUnique(displayName, jobName)){
return FormValidation.warning(Messages.Jenkins_CheckDisplayName_DisplayNameNotUniqueWarning(displayName));
}
else {
return FormValidation.ok();
}
}
public static class MasterComputer extends Computer {
protected MasterComputer() {
super(Jenkins.getInstance());
}
/**
* Returns """" to match with {@link Jenkins#getNodeName()}.
*/
@Override
public String getName() {
return """";
}
@Override
public boolean isConnecting() {
return false;
}
@Override
public String getDisplayName() {
return Messages.Hudson_Computer_DisplayName();
}
@Override
public String getCaption() {
return Messages.Hudson_Computer_Caption();
}
@Override
public String getUrl() {
return ""computer/(master)/"";
}
public RetentionStrategy getRetentionStrategy() {
return RetentionStrategy.NOOP;
}
/**
* Report an error.
*/
@Override
public HttpResponse doDoDelete() throws IOException {
throw HttpResponses.status(SC_BAD_REQUEST);
}
@Override
public void doConfigSubmit(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException, FormException {
Jenkins.getInstance().doConfigExecutorsSubmit(req, rsp);
}
@Override
public boolean hasPermission(Permission permission) {
// no one should be allowed to delete the master.
// this hides the ""delete"" link from the /computer/(master) page.
if(permission==Computer.DELETE)
return false;
// Configuration of master node requires ADMINISTER permission
return super.hasPermission(permission==Computer.CONFIGURE ? Jenkins.ADMINISTER : permission);
}
@Override
public VirtualChannel getChannel() {
return localChannel;
}
@Override
public Charset getDefaultCharset() {
return Charset.defaultCharset();
}
public List<LogRecord> getLogRecords() throws IOException, InterruptedException {
return logRecords;
}
public void doLaunchSlaveAgent(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException {
// this computer never returns null from channel, so
// this method shall never be invoked.
rsp.sendError(SC_NOT_FOUND);
}
protected Future<?> _connect(boolean forceReconnect) {
return Futures.precomputed(null);
}
/**
* {@link LocalChannel} instance that can be used to execute programs locally.
*/
public static final LocalChannel localChannel = new LocalChannel(threadPoolForRemoting);
}
/**
* Shortcut for {@code Hudson.getInstance().lookup.get(type)}
*/
public static <T> T lookup(Class<T> type) {
return Jenkins.getInstance().lookup.get(type);
}
/**
* Live view of recent {@link LogRecord}s produced by Hudson.
*/
public static List<LogRecord> logRecords = Collections.emptyList(); // initialized to dummy value to avoid NPE
/**
* Thread-safe reusable {@link XStream}.
*/
public static final XStream XSTREAM = new XStream2();
/**
* Alias to {@link #XSTREAM} so that one can access additional methods on {@link XStream2} more easily.
*/
public static final XStream2 XSTREAM2 = (XStream2)XSTREAM;
private static final int TWICE_CPU_NUM = Math.max(4, Runtime.getRuntime().availableProcessors() * 2);
/**
* Thread pool used to load configuration in parallel, to improve the start up time.
* <p>
* The idea here is to overlap the CPU and I/O, so we want more threads than CPU numbers.
*/
/*package*/ transient final ExecutorService threadPoolForLoad = new ThreadPoolExecutor(
TWICE_CPU_NUM, TWICE_CPU_NUM,
5L, TimeUnit.SECONDS, new LinkedBlockingQueue<Runnable>(), new DaemonThreadFactory());
private static void computeVersion(ServletContext context) {
// set the version
Properties props = new Properties();
try {
InputStream is = Jenkins.class.getResourceAsStream(""jenkins-version.properties"");
if(is!=null)
props.load(is);
} catch (IOException e) {
e.printStackTrace(); // if the version properties is missing, that's OK.
}
String ver = props.getProperty(""version"");
if(ver==null) ver=""?"";
VERSION = ver;
context.setAttribute(""version"",ver);
VERSION_HASH = Util.getDigestOf(ver).substring(0, 8);
SESSION_HASH = Util.getDigestOf(ver+System.currentTimeMillis()).substring(0, 8);
if(ver.equals(""?"") || Boolean.getBoolean(""hudson.script.noCache""))
RESOURCE_PATH = """";
else
RESOURCE_PATH = ""/static/""+SESSION_HASH;
VIEW_RESOURCE_PATH = ""/resources/""+ SESSION_HASH;
}
/**
* Version number of this Hudson.
*/
public static String VERSION=""?"";
/**
* Parses {@link #VERSION} into {@link VersionNumber}, or null if it's not parseable as a version number
* (such as when Hudson is run with ""mvn hudson-dev:run"")
*/
public static VersionNumber getVersion() {
try {
return new VersionNumber(VERSION);
} catch (NumberFormatException e) {
try {
// for non-released version of Hudson, this looks like ""1.345 (private-foobar), so try to approximate.
int idx = VERSION.indexOf(' ');
if (idx>0)
return new VersionNumber(VERSION.substring(0,idx));
} catch (NumberFormatException _) {
// fall through
}
// totally unparseable
return null;
} catch (IllegalArgumentException e) {
// totally unparseable
return null;
}
}
/**
* Hash of {@link #VERSION}.
*/
public static String VERSION_HASH;
/**
* Unique random token that identifies the current session.
* Used to make {@link #RESOURCE_PATH} unique so that we can set long ""Expires"" header.
*
* We used to use {@link #VERSION_HASH}, but making this session local allows us to
* reuse the same {@link #RESOURCE_PATH} for static resources in plugins.
*/
public static String SESSION_HASH;
/**
* Prefix to static resources like images and javascripts in the war file.
* Either """" or strings like ""/static/VERSION"", which avoids Hudson to pick up
* stale cache when the user upgrades to a different version.
* <p>
* Value computed in {@link WebAppMain}.
*/
public static String RESOURCE_PATH = """";
/**
* Prefix to resources alongside view scripts.
* Strings like ""/resources/VERSION"", which avoids Hudson to pick up
* stale cache when the user upgrades to a different version.
* <p>
* Value computed in {@link WebAppMain}.
*/
public static String VIEW_RESOURCE_PATH = ""/resources/TBD"";
public static boolean PARALLEL_LOAD = Configuration.getBooleanConfigParameter(""parallelLoad"", true);
public static boolean KILL_AFTER_LOAD = Configuration.getBooleanConfigParameter(""killAfterLoad"", false);
/**
* Enabled by default as of 1.337. Will keep it for a while just in case we have some serious problems.
*/
public static boolean FLYWEIGHT_SUPPORT = Configuration.getBooleanConfigParameter(""flyweightSupport"", true);
/**
* Tentative switch to activate the concurrent build behavior.
* When we merge this back to the trunk, this allows us to keep
* this feature hidden for a while until we iron out the kinks.
* @see AbstractProject#isConcurrentBuild()
* @deprecated as of 1.464
* This flag will have no effect.
*/
@Restricted(NoExternalUse.class)
public static boolean CONCURRENT_BUILD = true;
/**
* Switch to enable people to use a shorter workspace name.
*/
private static final String WORKSPACE_DIRNAME = Configuration.getStringConfigParameter(""workspaceDirName"", ""workspace"");
/**
* Automatically try to launch a slave when Jenkins is initialized or a new slave is created.
*/
public static boolean AUTOMATIC_SLAVE_LAUNCH = true;
private static final Logger LOGGER = Logger.getLogger(Jenkins.class.getName());
private static final Pattern ICON_SIZE = Pattern.compile(""\\d+x\\d+"");
public static final PermissionGroup PERMISSIONS = Permission.HUDSON_PERMISSIONS;
public static final Permission ADMINISTER = Permission.HUDSON_ADMINISTER;
public static final Permission READ = new Permission(PERMISSIONS,""Read"",Messages._Hudson_ReadPermission_Description(),Permission.READ,PermissionScope.JENKINS);
public static final Permission RUN_SCRIPTS = new Permission(PERMISSIONS, ""RunScripts"", Messages._Hudson_RunScriptsPermission_Description(),ADMINISTER,PermissionScope.JENKINS);
/**
* {@link Authentication} object that represents the anonymous user.
* Because Acegi creates its own {@link AnonymousAuthenticationToken} instances, the code must not
* expect the singleton semantics. This is just a convenient instance.
*
* @since 1.343
*/
public static final Authentication ANONYMOUS = new AnonymousAuthenticationToken(
""anonymous"",""anonymous"",new GrantedAuthority[]{new GrantedAuthorityImpl(""anonymous"")});
static {
XSTREAM.alias(""jenkins"",Jenkins.class);
XSTREAM.alias(""slave"", DumbSlave.class);
XSTREAM.alias(""jdk"",JDK.class);
// for backward compatibility with <1.75, recognize the tag name ""view"" as well.
XSTREAM.alias(""view"", ListView.class);
XSTREAM.alias(""listView"", ListView.class);
// this seems to be necessary to force registration of converter early enough
Mode.class.getEnumConstants();
// double check that initialization order didn't do any harm
assert PERMISSIONS!=null;
assert ADMINISTER!=null;
}
}
"
287,1," Object getValue(Object parent);
/**
* Returns the name of this cascadable element.
*
* @return The name of this cascadable element.
*/
"
288,1," public String getInfo() {
return (info);
}
"
289,1," protected boolean addInputFilter(InputFilter[] inputFilters,
String encodingName) {
if (encodingName.equals(""identity"")) {
// Skip
} else if (encodingName.equals(""chunked"")) {
inputBuffer.addActiveFilter
(inputFilters[Constants.CHUNKED_FILTER]);
contentDelimitation = true;
} else {
for (int i = 2; i < inputFilters.length; i++) {
if (inputFilters[i].getEncodingName()
.toString().equals(encodingName)) {
inputBuffer.addActiveFilter(inputFilters[i]);
return true;
}
}
return false;
}
return true;
}
/**
* Specialized utility method: find a sequence of lower case bytes inside
* a ByteChunk.
*/
"
290,1," public void changePassword_Resets_Session() throws Exception {
ScimUser user = createUser();
MockHttpSession session = new MockHttpSession();
MockHttpSession afterLoginSession = (MockHttpSession) getMockMvc().perform(post(""/login.do"")
.session(session)
.accept(TEXT_HTML_VALUE)
.param(""username"", user.getUserName())
.param(""password"", ""secr3T""))
.andExpect(status().isFound())
.andExpect(redirectedUrl(""/""))
.andReturn().getRequest().getSession(false);
assertTrue(session.isInvalid());
assertNotNull(afterLoginSession);
assertNotNull(afterLoginSession.getAttribute(HttpSessionSecurityContextRepository.SPRING_SECURITY_CONTEXT_KEY));
MockHttpSession afterPasswordChange = (MockHttpSession) getMockMvc().perform(post(""/change_password.do"")
.session(afterLoginSession)
.with(csrf())
.accept(TEXT_HTML_VALUE)
.param(""current_password"", ""secr3T"")
.param(""new_password"", ""secr3T1"")
.param(""confirm_password"", ""secr3T1""))
.andExpect(status().isFound())
.andExpect(redirectedUrl(""profile""))
.andReturn().getRequest().getSession(false);
assertTrue(afterLoginSession.isInvalid());
assertNotNull(afterPasswordChange);
assertNotNull(afterPasswordChange.getAttribute(HttpSessionSecurityContextRepository.SPRING_SECURITY_CONTEXT_KEY));
assertNotSame(afterLoginSession, afterPasswordChange);
}
"
291,1," public String changePassword(
Model model,
@RequestParam(""current_password"") String currentPassword,
@RequestParam(""new_password"") String newPassword,
@RequestParam(""confirm_password"") String confirmPassword,
HttpServletResponse response,
HttpServletRequest request) {
PasswordConfirmationValidation validation = new PasswordConfirmationValidation(newPassword, confirmPassword);
if (!validation.valid()) {
model.addAttribute(""message_code"", validation.getMessageCode());
response.setStatus(HttpStatus.UNPROCESSABLE_ENTITY.value());
return ""change_password"";
}
SecurityContext securityContext = SecurityContextHolder.getContext();
Authentication authentication = securityContext.getAuthentication();
String username = authentication.getName();
try {
changePasswordService.changePassword(username, currentPassword, newPassword);
request.getSession().invalidate();
request.getSession(true);
securityContext.setAuthentication(authentication);
return ""redirect:profile"";
} catch (BadCredentialsException e) {
model.addAttribute(""message_code"", ""unauthorized"");
} catch (InvalidPasswordException e) {
model.addAttribute(""message"", e.getMessagesAsOneString());
}
response.setStatus(HttpStatus.UNPROCESSABLE_ENTITY.value());
return ""change_password"";
}
"
292,1," private XPathEvaluator createEvaluator(String xpath2) {
try {
return (XPathEvaluator)EVALUATOR_CONSTRUCTOR.newInstance(new Object[] {xpath});
} catch (InvocationTargetException e) {
Throwable cause = e.getCause();
if (cause instanceof RuntimeException) {
throw (RuntimeException)cause;
}
throw new RuntimeException(""Invalid XPath Expression: "" + xpath + "" reason: "" + e.getMessage(), e);
} catch (Throwable e) {
throw new RuntimeException(""Invalid XPath Expression: "" + xpath + "" reason: "" + e.getMessage(), e);
}
}
"
293,1," protected RequestEntity createRequestEntity(Exchange exchange) throws CamelExchangeException {
Message in = exchange.getIn();
if (in.getBody() == null) {
return null;
}
RequestEntity answer = in.getBody(RequestEntity.class);
if (answer == null) {
try {
Object data = in.getBody();
if (data != null) {
String contentType = ExchangeHelper.getContentType(exchange);
if (contentType != null && HttpConstants.CONTENT_TYPE_JAVA_SERIALIZED_OBJECT.equals(contentType)) {
// serialized java object
Serializable obj = in.getMandatoryBody(Serializable.class);
// write object to output stream
ByteArrayOutputStream bos = new ByteArrayOutputStream();
HttpHelper.writeObjectToStream(bos, obj);
answer = new ByteArrayRequestEntity(bos.toByteArray(), HttpConstants.CONTENT_TYPE_JAVA_SERIALIZED_OBJECT);
IOHelper.close(bos);
} else if (data instanceof File || data instanceof GenericFile) {
// file based (could potentially also be a FTP file etc)
File file = in.getBody(File.class);
if (file != null) {
answer = new FileRequestEntity(file, contentType);
}
} else if (data instanceof String) {
// be a bit careful with String as any type can most likely be converted to String
// so we only do an instanceof check and accept String if the body is really a String
// do not fallback to use the default charset as it can influence the request
// (for example application/x-www-form-urlencoded forms being sent)
String charset = IOHelper.getCharsetName(exchange, false);
answer = new StringRequestEntity((String) data, contentType, charset);
}
// fallback as input stream
if (answer == null) {
// force the body as an input stream since this is the fallback
InputStream is = in.getMandatoryBody(InputStream.class);
answer = new InputStreamRequestEntity(is, contentType);
}
}
} catch (UnsupportedEncodingException e) {
throw new CamelExchangeException(""Error creating RequestEntity from message body"", exchange, e);
} catch (IOException e) {
throw new CamelExchangeException(""Error serializing message body"", exchange, e);
}
}
return answer;
}
"
294,1," public void execute(String key, ActionMapping mapping) {
String location = key.substring(REDIRECT_ACTION_PREFIX
.length());
ServletRedirectResult redirect = new ServletRedirectResult();
container.inject(redirect);
String extension = getDefaultExtension();
if (extension != null && extension.length() > 0) {
location += ""."" + extension;
}
redirect.setLocation(location);
mapping.setResult(redirect);
}
});
}
};
}
/**
* Adds a parameter action. Should only be called during initialization
*
* @param prefix The string prefix to trigger the action
* @param parameterAction The parameter action to execute
* @since 2.1.0
*/
"
295,1," private void findConstructor() {
try {
iConstructor = iClassToInstantiate.getConstructor(iParamTypes);
} catch (final NoSuchMethodException ex) {
throw new IllegalArgumentException(""InstantiateFactory: The constructor must exist and be public "");
}
}
/**
* Creates an object using the stored constructor.
*
* @return the new object
*/
"
296,1," private void checkParams()
throws Exception
{
if (vi == null)
{
throw new Exception(""no layers defined."");
}
if (vi.length > 1)
{
for (int i = 0; i < vi.length - 1; i++)
{
if (vi[i] >= vi[i + 1])
{
throw new Exception(
""v[i] has to be smaller than v[i+1]"");
}
}
}
else
{
throw new Exception(
""Rainbow needs at least 1 layer, such that v1 < v2."");
}
}
/**
* Getter for the number of layers
*
* @return the number of layers
*/
"
297,1," public boolean isTransferException() {
return transferException;
}
/**
* If enabled and an Exchange failed processing on the consumer side, and if the caused Exception was send back serialized
* in the response as a application/x-java-serialized-object content type (for example using Jetty or Servlet Camel components).
* On the producer side the exception will be deserialized and thrown as is, instead of the AhcOperationFailedException.
* The caused exception is required to be serialized.
*/
"
298,1," public void setMethods(Set<String> methods) {
this.methods = new HashSet<String>();
for (String method : methods) {
this.methods.add(method.toUpperCase());
}
}
/**
* @param authenticationEntryPoint the authenticationEntryPoint to set
*/
"
299,1," private EnumSet<ExecutableType> getValidatedExecutableTypes(DefaultValidatedExecutableTypesType validatedExecutables) {
if ( validatedExecutables == null ) {
return null;
}
EnumSet<ExecutableType> executableTypes = EnumSet.noneOf( ExecutableType.class );
executableTypes.addAll( validatedExecutables.getExecutableType() );
return executableTypes;
}
"
300,1," public boolean getValidateClientProvidedNewSessionId();
"
301,1," private File mkdirsE(File dir) throws IOException {
if (dir.exists()) {
return dir;
}
filterNonNull().mkdirs(dir);
return IOUtils.mkdirs(dir);
}
"
302,1," public static boolean isExpression(Object value) {
String expr = value.toString();
return expr.startsWith(""%{"") && expr.endsWith(""}"");
}
"
303,1," protected final GF2Polynomial[] invertMatrix(GF2Polynomial[] matrix)
{
GF2Polynomial[] a = new GF2Polynomial[matrix.length];
GF2Polynomial[] inv = new GF2Polynomial[matrix.length];
GF2Polynomial dummy;
int i, j;
// initialize a as a copy of matrix and inv as E(inheitsmatrix)
for (i = 0; i < mDegree; i++)
{
try
{
a[i] = new GF2Polynomial(matrix[i]);
inv[i] = new GF2Polynomial(mDegree);
inv[i].setBit(mDegree - 1 - i);
}
catch (RuntimeException BDNEExc)
{
BDNEExc.printStackTrace();
}
}
// construct triangle matrix so that for each a[i] the first i bits are
// zero
for (i = 0; i < mDegree - 1; i++)
{
// find column where bit i is set
j = i;
while ((j < mDegree) && !a[j].testBit(mDegree - 1 - i))
{
j++;
}
if (j >= mDegree)
{
throw new RuntimeException(
""GF2nField.invertMatrix: Matrix cannot be inverted!"");
}
if (i != j)
{ // swap a[i]/a[j] and inv[i]/inv[j]
dummy = a[i];
a[i] = a[j];
a[j] = dummy;
dummy = inv[i];
inv[i] = inv[j];
inv[j] = dummy;
}
for (j = i + 1; j < mDegree; j++)
{ // add column i to all columns>i
// having their i-th bit set
if (a[j].testBit(mDegree - 1 - i))
{
a[j].addToThis(a[i]);
inv[j].addToThis(inv[i]);
}
}
}
// construct Einheitsmatrix from a
for (i = mDegree - 1; i > 0; i--)
{
for (j = i - 1; j >= 0; j--)
{ // eliminate the i-th bit in all
// columns < i
if (a[j].testBit(mDegree - 1 - i))
{
a[j].addToThis(a[i]);
inv[j].addToThis(inv[i]);
}
}
}
return inv;
}
/**
* Converts the given element in representation according to this field to a
* new element in representation according to B1 using the change-of-basis
* matrix calculated by computeCOBMatrix.
*
* @param elem the GF2nElement to convert
* @param basis the basis to convert <tt>elem</tt> to
* @return <tt>elem</tt> converted to a new element representation
* according to <tt>basis</tt>
* @see GF2nField#computeCOBMatrix
* @see GF2nField#getRandomRoot
* @see GF2nPolynomial
* @see ""P1363 A.7 p109ff""
*/
"
304,1," public JDBCTableReader getTableReader(Connection connection, String tableName, ParseContext context) {
return new SQLite3TableReader(connection, tableName, context);
}
"
305,1," public Source getAssociatedStylesheet(
Source source, String media, String title, String charset)
throws TransformerConfigurationException
{
String baseID;
InputSource isource = null;
Node node = null;
XMLReader reader = null;
if (source instanceof DOMSource)
{
DOMSource dsource = (DOMSource) source;
node = dsource.getNode();
baseID = dsource.getSystemId();
}
else
{
isource = SAXSource.sourceToInputSource(source);
baseID = isource.getSystemId();
}
// What I try to do here is parse until the first startElement
// is found, then throw a special exception in order to terminate
// the parse.
StylesheetPIHandler handler = new StylesheetPIHandler(baseID, media,
title, charset);
// Use URIResolver. Patch from Dmitri Ilyin
if (m_uriResolver != null)
{
handler.setURIResolver(m_uriResolver);
}
try
{
if (null != node)
{
TreeWalker walker = new TreeWalker(handler, new org.apache.xml.utils.DOM2Helper(), baseID);
walker.traverse(node);
}
else
{
// Use JAXP1.1 ( if possible )
try
{
javax.xml.parsers.SAXParserFactory factory =
javax.xml.parsers.SAXParserFactory.newInstance();
factory.setNamespaceAware(true);
if (m_isSecureProcessing)
{
try
{
factory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, true);
}
catch (org.xml.sax.SAXException e) {}
}
javax.xml.parsers.SAXParser jaxpParser = factory.newSAXParser();
reader = jaxpParser.getXMLReader();
}
catch (javax.xml.parsers.ParserConfigurationException ex)
{
throw new org.xml.sax.SAXException(ex);
}
catch (javax.xml.parsers.FactoryConfigurationError ex1)
{
throw new org.xml.sax.SAXException(ex1.toString());
}
catch (NoSuchMethodError ex2){}
catch (AbstractMethodError ame){}
if (null == reader)
{
reader = XMLReaderFactory.createXMLReader();
}
// Need to set options!
reader.setContentHandler(handler);
reader.parse(isource);
}
}
catch (StopParseException spe)
{
// OK, good.
}
catch (org.xml.sax.SAXException se)
{
throw new TransformerConfigurationException(
""getAssociatedStylesheets failed"", se);
}
catch (IOException ioe)
{
throw new TransformerConfigurationException(
""getAssociatedStylesheets failed"", ioe);
}
return handler.getAssociatedStylesheet();
}
/**
* Create a new Transformer object that performs a copy
* of the source to the result.
*
* @return A Transformer object that may be used to perform a transformation
* in a single thread, never null.
*
* @throws TransformerConfigurationException May throw this during
* the parse when it is constructing the
* Templates object and fails.
*/
"
306,1," public Calendar ceil(Calendar cal) {
Calendar twoYearsFuture = (Calendar) cal.clone();
twoYearsFuture.add(Calendar.YEAR, 2);
OUTER:
while (true) {
if (cal.compareTo(twoYearsFuture) > 0) {
// we went too far into the future
throw new RareOrImpossibleDateException();
}
for (CalendarField f : CalendarField.ADJUST_ORDER) {
int cur = f.valueOf(cal);
int next = f.ceil(this,cur);
if (cur==next) continue; // this field is already in a good shape. move on to next
// we are modifying this field, so clear all the lower level fields
for (CalendarField l=f.lowerField; l!=null; l=l.lowerField)
l.clear(cal);
if (next<0) {
// we need to roll over to the next field.
f.rollUp(cal, 1);
f.setTo(cal,f.first(this));
// since higher order field is affected by this, we need to restart from all over
continue OUTER;
} else {
f.setTo(cal,next);
if (f.redoAdjustmentIfModified)
continue OUTER; // when we modify DAY_OF_MONTH and DAY_OF_WEEK, do it all over from the top
}
}
return cal; // all fields adjusted
}
}
/**
* Computes the nearest past timestamp that matched this cron tab.
* <p>
* More precisely, given the time 't', computes another smallest time x such that:
*
* <ul>
* <li>x &lt;= t (inclusive)
* <li>x matches this crontab
* </ul>
*
* <p>
* Note that if t already matches this cron, it's returned as is.
*/
"
307,1," public void run() {
try {
ObjectInputStream in = new ObjectInputStream(socket.getInputStream());
while (!closed) {
Message msg = (Message) in.readObject();
handle(msg);
}
} catch (EOFException eof) {
// Remote side has closed the connection, just cleanup.
try {
close();
} catch (Exception unused) {
// no-op.
}
} catch (Exception e) {
if (!closed) {
LOG.log(Level.WARNING, ""Error in inbound message handling."", e);
try {
close();
} catch (Exception unused) {
// no-op.
}
}
}
}
"
308,1," public void setAllowJavaSerializedObject(boolean allowJavaSerializedObject) {
this.allowJavaSerializedObject = allowJavaSerializedObject;
}
"
309,1," private void updateGraph(ActionRequest actionRequest,
ActionResponse actionResponse) {
DBManager DBase = new DBManager();
Connection con = DBase.getConnection();
String graph_id = actionRequest.getParameter(""graph_id"");
actionResponse.setRenderParameter(""graph_id"", graph_id);
String name = actionRequest.getParameter(""name"");
String description = actionRequest.getParameter(""description"");
String server_id = actionRequest.getParameter(""server_id"");
String xlabel = actionRequest.getParameter(""xlabel"");
String ylabel = actionRequest.getParameter(""ylabel"");
String timeframe = actionRequest.getParameter(""timeframe"");
String mbean = actionRequest.getParameter(""mbean"");
String dataname1 = actionRequest.getParameter(""dataname1"");
String data1operation = actionRequest.getParameter(""data1operation"");
String operation = actionRequest.getParameter(""operation"");
int archive = 0;
if (actionRequest.getParameter(""showArchive"") != null
&& actionRequest.getParameter(""showArchive"").equals(""on"")) {
archive = 1;
}
if (operation.equals(""other"")) {
operation = actionRequest.getParameter(""othermath"");
}
String dataname2 = actionRequest.getParameter(""dataname2"");
String data2operation = actionRequest.getParameter(""data2operation"");
if (data2operation == null)
data2operation = ""A"";
try {
PreparedStatement pStmt = con
.prepareStatement(""UPDATE graphs SET server_id=""
+ server_id
+ "", name='""
+ name
+ ""', description='""
+ description
+ ""', timeframe=""
+ timeframe
+ "", mbean='""
+ mbean
+ ""', dataname1='""
+ dataname1
+ ""', xlabel='""
+ xlabel
+ ""', ylabel='""
+ ylabel
+ ""', data1operation='""
+ data1operation
+ ""', operation='""
+ operation
+ ""', data2operation='""
+ data2operation
+ ""', dataname2='""
+ dataname2
+ ""', warninglevel1=0, warninglevel2=0, modified=CURRENT_TIMESTAMP, archive=""
+ archive + "" WHERE graph_id="" + graph_id);
pStmt.executeUpdate();
con.close();
actionResponse.setRenderParameter(""message"",
""Graph "" + name
+ "" has been updated."");
return;
} catch (Exception e) {
actionResponse.setRenderParameter(""message"",
""Error editing graph ""
+ e.getMessage());
return;
}
}
"
310,1," protected void onSuccessfulAuthentication(HttpServletRequest request, HttpServletResponse response, Authentication authResult) throws IOException {
super.onSuccessfulAuthentication(request,response,authResult);
// make sure we have a session to store this successful authentication, given that we no longer
// let HttpSessionContextIntegrationFilter2 to create sessions.
// HttpSessionContextIntegrationFilter stores the updated SecurityContext object into this session later
// (either when a redirect is issued, via its HttpResponseWrapper, or when the execution returns to its
// doFilter method.
request.getSession();
}
/**
* Leave the information about login failure.
*
* <p>
* Otherwise it seems like Acegi doesn't really leave the detail of the failure anywhere.
*/
@Override
"
311,1," private Cache verifyCacheExists() {
int timeToWait = 0;
Cache cache = null;
while (timeToWait < TIME_TO_WAIT_FOR_CACHE) {
try {
cache = CacheFactory.getAnyInstance();
break;
} catch (Exception ignore) {
// keep trying and hope for the best
}
try {
Thread.sleep(250);
} catch (InterruptedException ie) {
Thread.currentThread().interrupt();
break;
}
timeToWait += 250;
}
if (cache == null) {
cache = new CacheFactory().create();
}
return cache;
}
"
312,1," public void clientCredentials_byDefault_WillNotLockoutDuringFailedBasicAuthAndFormData() throws Exception {
String clientId = ""testclient"" + generator.generate();
String scopes = ""space.*.developer,space.*.admin,org.*.reader,org.123*.admin,*.*,*"";
setUpClients(clientId, scopes, scopes, GRANT_TYPES, true);
String body = null;
for(int i = 0; i < 3; i++){
body = getMockMvc().perform(post(""/oauth/token"")
.accept(MediaType.APPLICATION_JSON_VALUE)
.header(""Authorization"", ""Basic "" + new String(Base64.encode((clientId + "":"" + BADSECRET).getBytes())))
.param(""grant_type"", ""client_credentials"")
)
.andExpect(status().isUnauthorized())
.andReturn().getResponse().getContentAsString();
body = getMockMvc().perform(post(""/oauth/token"")
.accept(MediaType.APPLICATION_JSON_VALUE)
.contentType(MediaType.APPLICATION_FORM_URLENCODED_VALUE)
.param(""grant_type"", ""client_credentials"")
.param(""client_id"", clientId)
.param(""client_secret"", BADSECRET)
)
.andExpect(status().isUnauthorized())
.andReturn().getResponse().getContentAsString();
}
body = getMockMvc().perform(post(""/oauth/token"")
.accept(MediaType.APPLICATION_JSON_VALUE)
.header(""Authorization"", ""Basic "" + new String(Base64.encode((clientId + "":"" + SECRET).getBytes())))
.param(""grant_type"", ""client_credentials"")
)
.andExpect(status().isOk())
.andReturn().getResponse().getContentAsString();
}
@Test
"
313,1," public String toStringInternal() {
String strValue=null;
try {
if( enc==null ) enc=DEFAULT_CHARACTER_ENCODING;
strValue = new String( buff, start, end-start, enc );
/*
Does not improve the speed too much on most systems,
it's safer to use the ""clasical"" new String().
Most overhead is in creating char[] and copying,
the internal implementation of new String() is very close to
what we do. The decoder is nice for large buffers and if
we don't go to String ( so we can take advantage of reduced GC)
// Method is commented out, in:
return B2CConverter.decodeString( enc );
*/
} catch (java.io.UnsupportedEncodingException e) {
// Use the platform encoding in that case; the usage of a bad
// encoding will have been logged elsewhere already
strValue = new String(buff, start, end-start);
}
return strValue;
}
"
314,1," public void repositoryVerificationTimeoutTest() throws Exception {
Client client = client();
Settings settings = ImmutableSettings.settingsBuilder()
.put(""location"", newTempDir(LifecycleScope.SUITE))
.put(""random_control_io_exception_rate"", 1.0).build();
logger.info(""--> creating repository that cannot write any files - should fail"");
assertThrows(client.admin().cluster().preparePutRepository(""test-repo-1"")
.setType(MockRepositoryModule.class.getCanonicalName()).setSettings(settings),
RepositoryVerificationException.class);
logger.info(""--> creating repository that cannot write any files, but suppress verification - should be acked"");
assertAcked(client.admin().cluster().preparePutRepository(""test-repo-1"")
.setType(MockRepositoryModule.class.getCanonicalName()).setSettings(settings).setVerify(false));
logger.info(""--> verifying repository"");
assertThrows(client.admin().cluster().prepareVerifyRepository(""test-repo-1""), RepositoryVerificationException.class);
File location = newTempDir(LifecycleScope.SUITE);
logger.info(""--> creating repository"");
try {
client.admin().cluster().preparePutRepository(""test-repo-1"")
.setType(MockRepositoryModule.class.getCanonicalName())
.setSettings(ImmutableSettings.settingsBuilder()
.put(""location"", location)
.put(""localize_location"", true)
).get();
fail(""RepositoryVerificationException wasn't generated"");
} catch (RepositoryVerificationException ex) {
assertThat(ex.getMessage(), containsString(""is not shared""));
}
}
"
315,1," public void execute(String key, ActionMapping mapping) {
String location = key.substring(REDIRECT_ACTION_PREFIX
.length());
ServletRedirectResult redirect = new ServletRedirectResult();
container.inject(redirect);
String extension = getDefaultExtension();
if (extension != null && extension.length() > 0) {
location += ""."" + extension;
}
redirect.setLocation(location);
mapping.setResult(redirect);
}
});
}
};
}
/**
* Adds a parameter action. Should only be called during initialization
*
* @param prefix The string prefix to trigger the action
* @param parameterAction The parameter action to execute
* @since 2.1.0
*/
"
316,1," public void noUserSearchCausesUsernameNotFound() throws Exception {
DirContext ctx = mock(DirContext.class);
when(ctx.getNameInNamespace()).thenReturn("""");
when(ctx.search(any(Name.class), any(String.class), any(Object[].class), any(SearchControls.class)))
.thenReturn(new EmptyEnumeration<SearchResult>());
provider.contextFactory = createContextFactoryReturning(ctx);
provider.authenticate(joe);
}
@SuppressWarnings(""unchecked"")
@Test(expected = IncorrectResultSizeDataAccessException.class)
"
317,1," protected void addEmptyValueMapping(DefaultMapper mapper, String field, Object model) {
ParserContext parserContext = new FluentParserContext().evaluate(model.getClass());
Expression target = expressionParser.parseExpression(field, parserContext);
try {
Class<?> propertyType = target.getValueType(model);
Expression source = new StaticExpression(getEmptyValue(propertyType));
DefaultMapping mapping = new DefaultMapping(source, target);
if (logger.isDebugEnabled()) {
logger.debug(""Adding empty value mapping for parameter '"" + field + ""'"");
}
mapper.addMapping(mapping);
} catch (EvaluationException e) {
}
}
/**
* Adds a {@link DefaultMapping} between the given request parameter name and a matching model field.
*
* @param mapper the mapper to add the mapping to
* @param parameter the request parameter name
* @param model the model
*/
"
318,1," private boolean evaluate(String text) {
try {
InputSource inputSource = new InputSource(new StringReader(text));
return ((Boolean)expression.evaluate(inputSource, XPathConstants.BOOLEAN)).booleanValue();
} catch (XPathExpressionException e) {
return false;
}
}
@Override
"