| ,label,code |
| 0,0," private static void initKeyPair(SecureRandom prng) throws NoSuchAlgorithmException { |
| String sigAlg = signatureAlgorithm.toLowerCase(); |
| if ( sigAlg.endsWith(""withdsa"") ) { |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| sigAlg = ""DSA""; |
| } else if ( sigAlg.endsWith(""withrsa"") ) { |
| |
| sigAlg = ""RSA""; |
| } |
| KeyPairGenerator keyGen = KeyPairGenerator.getInstance(sigAlg); |
| keyGen.initialize(signatureKeyLength, prng); |
| KeyPair pair = keyGen.generateKeyPair(); |
| privateKey = pair.getPrivate(); |
| publicKey = pair.getPublic(); |
| } |
| " |
| 1,0," public ZipArchiveEntry getNextZipEntry() throws IOException { |
| uncompressedCount = 0; |
|
|
| boolean firstEntry = true; |
| if (closed || hitCentralDirectory) { |
| return null; |
| } |
| if (current != null) { |
| closeEntry(); |
| firstEntry = false; |
| } |
|
|
| long currentHeaderOffset = getBytesRead(); |
| try { |
| if (firstEntry) { |
| |
| |
| |
| |
| readFirstLocalFileHeader(lfhBuf); |
| } else { |
| readFully(lfhBuf); |
| } |
| } catch (final EOFException e) { |
| return null; |
| } |
|
|
| final ZipLong sig = new ZipLong(lfhBuf); |
| if (!sig.equals(ZipLong.LFH_SIG)) { |
| if (sig.equals(ZipLong.CFH_SIG) || sig.equals(ZipLong.AED_SIG) || isApkSigningBlock(lfhBuf)) { |
| hitCentralDirectory = true; |
| skipRemainderOfArchive(); |
| return null; |
| } |
| throw new ZipException(String.format(""Unexpected record signature: 0X%X"", sig.getValue())); |
| } |
|
|
| int off = WORD; |
| current = new CurrentEntry(); |
|
|
| final int versionMadeBy = ZipShort.getValue(lfhBuf, off); |
| off += SHORT; |
| current.entry.setPlatform((versionMadeBy >> ZipFile.BYTE_SHIFT) & ZipFile.NIBLET_MASK); |
|
|
| final GeneralPurposeBit gpFlag = GeneralPurposeBit.parse(lfhBuf, off); |
| final boolean hasUTF8Flag = gpFlag.usesUTF8ForNames(); |
| final ZipEncoding entryEncoding = hasUTF8Flag ? ZipEncodingHelper.UTF8_ZIP_ENCODING : zipEncoding; |
| current.hasDataDescriptor = gpFlag.usesDataDescriptor(); |
| current.entry.setGeneralPurposeBit(gpFlag); |
|
|
| off += SHORT; |
|
|
| current.entry.setMethod(ZipShort.getValue(lfhBuf, off)); |
| off += SHORT; |
|
|
| final long time = ZipUtil.dosToJavaTime(ZipLong.getValue(lfhBuf, off)); |
| current.entry.setTime(time); |
| off += WORD; |
|
|
| ZipLong size = null, cSize = null; |
| if (!current.hasDataDescriptor) { |
| current.entry.setCrc(ZipLong.getValue(lfhBuf, off)); |
| off += WORD; |
|
|
| cSize = new ZipLong(lfhBuf, off); |
| off += WORD; |
|
|
| size = new ZipLong(lfhBuf, off); |
| off += WORD; |
| } else { |
| off += 3 * WORD; |
| } |
|
|
| final int fileNameLen = ZipShort.getValue(lfhBuf, off); |
|
|
| off += SHORT; |
|
|
| final int extraLen = ZipShort.getValue(lfhBuf, off); |
| off += SHORT; |
|
|
| final byte[] fileName = new byte[fileNameLen]; |
| readFully(fileName); |
| current.entry.setName(entryEncoding.decode(fileName), fileName); |
| if (hasUTF8Flag) { |
| current.entry.setNameSource(ZipArchiveEntry.NameSource.NAME_WITH_EFS_FLAG); |
| } |
|
|
| final byte[] extraData = new byte[extraLen]; |
| readFully(extraData); |
| current.entry.setExtra(extraData); |
|
|
| if (!hasUTF8Flag && useUnicodeExtraFields) { |
| ZipUtil.setNameAndCommentFromExtraFields(current.entry, fileName, null); |
| } |
|
|
| processZip64Extra(size, cSize); |
|
|
| current.entry.setLocalHeaderOffset(currentHeaderOffset); |
| current.entry.setDataOffset(getBytesRead()); |
| current.entry.setStreamContiguous(true); |
|
|
| ZipMethod m = ZipMethod.getMethodByCode(current.entry.getMethod()); |
| if (current.entry.getCompressedSize() != ArchiveEntry.SIZE_UNKNOWN) { |
| if (ZipUtil.canHandleEntryData(current.entry) && m != ZipMethod.STORED && m != ZipMethod.DEFLATED) { |
| InputStream bis = new BoundedInputStream(in, current.entry.getCompressedSize()); |
| switch (m) { |
| case UNSHRINKING: |
| current.in = new UnshrinkingInputStream(bis); |
| break; |
| case IMPLODING: |
| current.in = new ExplodingInputStream( |
| current.entry.getGeneralPurposeBit().getSlidingDictionarySize(), |
| current.entry.getGeneralPurposeBit().getNumberOfShannonFanoTrees(), |
| bis); |
| break; |
| case BZIP2: |
| current.in = new BZip2CompressorInputStream(bis); |
| break; |
| case ENHANCED_DEFLATED: |
| current.in = new Deflate64CompressorInputStream(bis); |
| break; |
| default: |
| |
| |
| |
| break; |
| } |
| } |
| } else if (m == ZipMethod.ENHANCED_DEFLATED) { |
| current.in = new Deflate64CompressorInputStream(in); |
| } |
|
|
| entriesRead++; |
| return current.entry; |
| } |
|
|
| /** |
| * Fills the given array with the first local file header and |
| * deals with splitting/spanning markers that may prefix the first |
| * LFH. |
| */ |
| " |
| 2,0," private static void assertCorrectConfig(User user, String unixPath) { |
| assertThat(user.getConfigFile().getFile().getPath(), endsWith(unixPath.replace('/', File.separatorChar))); |
| } |
|
|
| " |
| 3,0," public void testRepositoryCreation() throws Exception { |
| Client client = client(); |
|
|
| File location = randomRepoPath(); |
|
|
| logger.info(""--> creating repository""); |
| PutRepositoryResponse putRepositoryResponse = client.admin().cluster().preparePutRepository(""test-repo-1"") |
| .setType(""fs"").setSettings(ImmutableSettings.settingsBuilder() |
| .put(""location"", location) |
| ).get(); |
| assertThat(putRepositoryResponse.isAcknowledged(), equalTo(true)); |
|
|
| logger.info(""--> verify the repository""); |
| int numberOfFiles = location.listFiles().length; |
| VerifyRepositoryResponse verifyRepositoryResponse = client.admin().cluster().prepareVerifyRepository(""test-repo-1"").get(); |
| assertThat(verifyRepositoryResponse.getNodes().length, equalTo(cluster().numDataAndMasterNodes())); |
|
|
| logger.info(""--> verify that we didn't leave any files as a result of verification""); |
| assertThat(location.listFiles().length, equalTo(numberOfFiles)); |
|
|
| logger.info(""--> check that repository is really there""); |
| ClusterStateResponse clusterStateResponse = client.admin().cluster().prepareState().clear().setMetaData(true).get(); |
| MetaData metaData = clusterStateResponse.getState().getMetaData(); |
| RepositoriesMetaData repositoriesMetaData = metaData.custom(RepositoriesMetaData.TYPE); |
| assertThat(repositoriesMetaData, notNullValue()); |
| assertThat(repositoriesMetaData.repository(""test-repo-1""), notNullValue()); |
| assertThat(repositoriesMetaData.repository(""test-repo-1"").type(), equalTo(""fs"")); |
|
|
| logger.info(""--> creating another repository""); |
| putRepositoryResponse = client.admin().cluster().preparePutRepository(""test-repo-2"") |
| .setType(""fs"").setSettings(ImmutableSettings.settingsBuilder() |
| .put(""location"", randomRepoPath()) |
| ).get(); |
| assertThat(putRepositoryResponse.isAcknowledged(), equalTo(true)); |
|
|
| logger.info(""--> check that both repositories are in cluster state""); |
| clusterStateResponse = client.admin().cluster().prepareState().clear().setMetaData(true).get(); |
| metaData = clusterStateResponse.getState().getMetaData(); |
| repositoriesMetaData = metaData.custom(RepositoriesMetaData.TYPE); |
| assertThat(repositoriesMetaData, notNullValue()); |
| assertThat(repositoriesMetaData.repositories().size(), equalTo(2)); |
| assertThat(repositoriesMetaData.repository(""test-repo-1""), notNullValue()); |
| assertThat(repositoriesMetaData.repository(""test-repo-1"").type(), equalTo(""fs"")); |
| assertThat(repositoriesMetaData.repository(""test-repo-2""), notNullValue()); |
| assertThat(repositoriesMetaData.repository(""test-repo-2"").type(), equalTo(""fs"")); |
|
|
| logger.info(""--> check that both repositories can be retrieved by getRepositories query""); |
| GetRepositoriesResponse repositoriesResponse = client.admin().cluster().prepareGetRepositories().get(); |
| assertThat(repositoriesResponse.repositories().size(), equalTo(2)); |
| assertThat(findRepository(repositoriesResponse.repositories(), ""test-repo-1""), notNullValue()); |
| assertThat(findRepository(repositoriesResponse.repositories(), ""test-repo-2""), notNullValue()); |
|
|
| logger.info(""--> delete repository test-repo-1""); |
| client.admin().cluster().prepareDeleteRepository(""test-repo-1"").get(); |
| repositoriesResponse = client.admin().cluster().prepareGetRepositories().get(); |
| assertThat(repositoriesResponse.repositories().size(), equalTo(1)); |
| assertThat(findRepository(repositoriesResponse.repositories(), ""test-repo-2""), notNullValue()); |
|
|
| logger.info(""--> delete repository test-repo-2""); |
| client.admin().cluster().prepareDeleteRepository(""test-repo-2"").get(); |
| repositoriesResponse = client.admin().cluster().prepareGetRepositories().get(); |
| assertThat(repositoriesResponse.repositories().size(), equalTo(0)); |
| } |
|
|
| " |
| 4,0," protected Blob getBlob(ResultSet resultSet, int columnIndex, Metadata m) throws SQLException { |
| byte[] bytes = resultSet.getBytes(columnIndex); |
| if (!resultSet.wasNull()) { |
| return new SerialBlob(bytes); |
| } |
| return null; |
| } |
| " |
| 5,0," private <T> T run(PrivilegedAction<T> action) { |
| return System.getSecurityManager() != null ? AccessController.doPrivileged( action ) : action.run(); |
| } |
| " |
| 6,0," protected boolean statusDropsConnection(int status) { |
| return status == 400 /* SC_BAD_REQUEST */ || |
| status == 408 /* SC_REQUEST_TIMEOUT */ || |
| status == 411 /* SC_LENGTH_REQUIRED */ || |
| status == 413 /* SC_REQUEST_ENTITY_TOO_LARGE */ || |
| status == 414 /* SC_REQUEST_URI_TOO_LARGE */ || |
| status == 500 /* SC_INTERNAL_SERVER_ERROR */ || |
| status == 503 /* SC_SERVICE_UNAVAILABLE */ || |
| status == 501 /* SC_NOT_IMPLEMENTED */; |
| } |
|
|
| " |
| 7,0," private ControllerInfo getControllerInfo(Annotations annotation, String s) { |
| String[] data = s.split("":""); |
| if (data.length != 3) { |
| print(""Wrong format of the controller %s, should be in the format <protocol>:<ip>:<port>"", s); |
| return null; |
| } |
| String type = data[0]; |
| IpAddress ip = IpAddress.valueOf(data[1]); |
| int port = Integer.parseInt(data[2]); |
| if (annotation != null) { |
| return new ControllerInfo(ip, port, type, annotation); |
| } |
| return new ControllerInfo(ip, port, type); |
| } |
| " |
| 8,0," public Authentication authenticate(Authentication authentication) throws AuthenticationException { |
| Assert.isInstanceOf(UsernamePasswordAuthenticationToken.class, authentication, |
| messages.getMessage(""LdapAuthenticationProvider.onlySupports"", |
| ""Only UsernamePasswordAuthenticationToken is supported"")); |
|
|
| final UsernamePasswordAuthenticationToken userToken = (UsernamePasswordAuthenticationToken)authentication; |
|
|
| String username = userToken.getName(); |
| String password = (String) authentication.getCredentials(); |
|
|
| if (logger.isDebugEnabled()) { |
| logger.debug(""Processing authentication request for user: "" + username); |
| } |
|
|
| if (!StringUtils.hasLength(username)) { |
| throw new BadCredentialsException(messages.getMessage(""LdapAuthenticationProvider.emptyUsername"", |
| ""Empty Username"")); |
| } |
|
|
| if (!StringUtils.hasLength(password)) { |
| throw new BadCredentialsException(messages.getMessage(""AbstractLdapAuthenticationProvider.emptyPassword"", |
| ""Empty Password"")); |
| } |
|
|
| Assert.notNull(password, ""Null password was supplied in authentication token""); |
|
|
| DirContextOperations userData = doAuthentication(userToken); |
|
|
| UserDetails user = userDetailsContextMapper.mapUserFromContext(userData, authentication.getName(), |
| loadUserAuthorities(userData, authentication.getName(), (String)authentication.getCredentials())); |
|
|
| return createSuccessfulAuthentication(userToken, user); |
| } |
|
|
| " |
| 9,0," protected IgnoreCsrfProtectionRegistry chainRequestMatchers( |
| List<RequestMatcher> requestMatchers) { |
| CsrfConfigurer.this.ignoredCsrfProtectionMatchers.addAll(requestMatchers); |
| return this; |
| } |
| } |
| }" |
| 10,0," private String[] getParts(String encodedJWT) { |
| String[] parts = encodedJWT.split(""\\.""); |
| // Secured JWT XXXXX.YYYYY.ZZZZZ, Unsecured JWT XXXXX.YYYYY. |
| if (parts.length == 3 || (parts.length == 2 && encodedJWT.endsWith("".""))) { |
| return parts; |
| } |
|
|
| throw new InvalidJWTException(""The encoded JWT is not properly formatted. Expected a three part dot separated string.""); |
| } |
| " |
| 11,0," public String getAlgorithm() { |
|
|
| return (this.algorithm); |
|
|
| } |
|
|
|
|
| /** |
| * Set the message digest algorithm for this Manager. |
| * |
| * @param algorithm The new message digest algorithm |
| */ |
| " |
| 12,0," public ChannelRequestMatcherRegistry getRegistry() { |
| return REGISTRY; |
| } |
|
|
| @Override |
| " |
| 13,0," public String getDefaultWebXml() { |
| if( defaultWebXml == null ) { |
| defaultWebXml=Constants.DefaultWebXml; |
| } |
|
|
| return (this.defaultWebXml); |
|
|
| } |
|
|
|
|
| /** |
| * Set the location of the default deployment descriptor |
| * |
| * @param path Absolute/relative path to the default web.xml |
| */ |
| " |
| 14,0," public Collection<ResourcePermission> getRequiredPermissions(String regionName) { |
| return Collections.singletonList(ResourcePermissions.DATA_MANAGE); |
| } |
|
|
| " |
| 15,0," private void enableAllocation(String index) { |
| client().admin().indices().prepareUpdateSettings(index).setSettings(ImmutableSettings.builder().put( |
| ""index.routing.allocation.enable"", ""all"" |
| )).get(); |
| } |
| " |
| 16,0," public void parse(InputStream stream, ContentHandler ignore, |
| Metadata metadata, ParseContext context) throws IOException, |
| SAXException, TikaException { |
| //Test to see if we should avoid parsing |
| if (parserState.recursiveParserWrapperHandler.hasHitMaximumEmbeddedResources()) { |
| return; |
| } |
| // Work out what this thing is |
| String objectName = getResourceName(metadata, parserState); |
| String objectLocation = this.location + objectName; |
| |
| metadata.add(AbstractRecursiveParserWrapperHandler.EMBEDDED_RESOURCE_PATH, objectLocation); |
|
|
|
|
| //get a fresh handler |
| ContentHandler localHandler = parserState.recursiveParserWrapperHandler.getNewContentHandler(); |
| parserState.recursiveParserWrapperHandler.startEmbeddedDocument(localHandler, metadata); |
|
|
| Parser preContextParser = context.get(Parser.class); |
| context.set(Parser.class, new EmbeddedParserDecorator(getWrappedParser(), objectLocation, parserState)); |
| long started = System.currentTimeMillis(); |
| try { |
| super.parse(stream, localHandler, metadata, context); |
| } catch (SAXException e) { |
| boolean wlr = isWriteLimitReached(e); |
| if (wlr == true) { |
| metadata.add(WRITE_LIMIT_REACHED, ""true""); |
| } else { |
| if (catchEmbeddedExceptions) { |
| ParserUtils.recordParserFailure(this, e, metadata); |
| } else { |
| throw e; |
| } |
| } |
| } catch(CorruptedFileException e) { |
| throw e; |
| } catch (TikaException e) { |
| if (catchEmbeddedExceptions) { |
| ParserUtils.recordParserFailure(this, e, metadata); |
| } else { |
| throw e; |
| } |
| } finally { |
| context.set(Parser.class, preContextParser); |
| long elapsedMillis = System.currentTimeMillis() - started; |
| metadata.set(RecursiveParserWrapperHandler.PARSE_TIME_MILLIS, Long.toString(elapsedMillis)); |
| parserState.recursiveParserWrapperHandler.endEmbeddedDocument(localHandler, metadata); |
| } |
| } |
| } |
|
|
| /** |
| * This tracks the state of the parse of a single document. |
| * In future versions, this will allow the RecursiveParserWrapper to be thread safe. |
| */ |
| private class ParserState { |
| private int unknownCount = 0; |
| private final AbstractRecursiveParserWrapperHandler recursiveParserWrapperHandler; |
| private ParserState(AbstractRecursiveParserWrapperHandler handler) { |
| this.recursiveParserWrapperHandler = handler; |
| } |
|
|
|
|
| } |
| } |
| " |
| 17,0," public static void beforeTests() throws Exception { |
| initCore(""solrconfig.xml"",""schema.xml""); |
| handler = new UpdateRequestHandler(); |
| } |
|
|
| @Test |
| " |
| 18,0," public void setUp() throws Exception { |
| interceptor = new I18nInterceptor(); |
| interceptor.init(); |
| params = new HashMap<String, Object>(); |
| session = new HashMap(); |
|
|
| Map<String, Object> ctx = new HashMap<String, Object>(); |
| ctx.put(ActionContext.PARAMETERS, params); |
| ctx.put(ActionContext.SESSION, session); |
| ac = new ActionContext(ctx); |
|
|
| Action action = new Action() { |
| public String execute() throws Exception { |
| return SUCCESS; |
| } |
| }; |
| mai = new MockActionInvocation(); |
| ((MockActionInvocation) mai).setAction(action); |
| ((MockActionInvocation) mai).setInvocationContext(ac); |
| } |
|
|
| @After |
| " |
| 19,0," private MockHttpServletRequestBuilder createChangePasswordRequest(ScimUser user, String code, boolean useCSRF, String password, String passwordConfirmation) throws Exception { |
| MockHttpServletRequestBuilder post = post(""/reset_password.do""); |
| if (useCSRF) { |
| post.with(csrf()); |
| } |
| post.param(""code"", code) |
| .param(""email"", user.getPrimaryEmail()) |
| .param(""password"", password) |
| .param(""password_confirmation"", passwordConfirmation); |
| return post; |
| } |
| " |
| 20,0," protected Log getLog() { |
| return log; |
| } |
|
|
| // ----------------------------------------------------------- Constructors |
|
|
|
|
| " |
| 21,0," public int getCount() { |
| return iCount; |
| } |
|
|
| " |
| 22,0," public BeanDefinitionHolder decorate(Node node, BeanDefinitionHolder holder, |
| ParserContext parserContext) { |
| BeanDefinition filterChainProxy = holder.getBeanDefinition(); |
|
|
| ManagedList<BeanMetadataElement> securityFilterChains = new ManagedList<BeanMetadataElement>(); |
| Element elt = (Element) node; |
|
|
| MatcherType matcherType = MatcherType.fromElement(elt); |
|
|
| List<Element> filterChainElts = DomUtils.getChildElementsByTagName(elt, |
| Elements.FILTER_CHAIN); |
|
|
| for (Element chain : filterChainElts) { |
| String path = chain |
| .getAttribute(HttpSecurityBeanDefinitionParser.ATT_PATH_PATTERN); |
| String filters = chain |
| .getAttribute(HttpSecurityBeanDefinitionParser.ATT_FILTERS); |
|
|
| if (!StringUtils.hasText(path)) { |
| parserContext.getReaderContext().error( |
| ""The attribute '"" |
| + HttpSecurityBeanDefinitionParser.ATT_PATH_PATTERN |
| + ""' must not be empty"", elt); |
| } |
|
|
| if (!StringUtils.hasText(filters)) { |
| parserContext.getReaderContext().error( |
| ""The attribute '"" + HttpSecurityBeanDefinitionParser.ATT_FILTERS |
| + ""'must not be empty"", elt); |
| } |
|
|
| BeanDefinition matcher = matcherType.createMatcher(parserContext, path, null); |
|
|
| if (filters.equals(HttpSecurityBeanDefinitionParser.OPT_FILTERS_NONE)) { |
| securityFilterChains.add(createSecurityFilterChain(matcher, |
| new ManagedList(0))); |
| } |
| else { |
| String[] filterBeanNames = StringUtils |
| .tokenizeToStringArray(filters, "",""); |
| ManagedList filterChain = new ManagedList(filterBeanNames.length); |
|
|
| for (String name : filterBeanNames) { |
| filterChain.add(new RuntimeBeanReference(name)); |
| } |
|
|
| securityFilterChains.add(createSecurityFilterChain(matcher, filterChain)); |
| } |
| } |
|
|
| filterChainProxy.getConstructorArgumentValues().addGenericArgumentValue( |
| securityFilterChains); |
|
|
| return holder; |
| } |
|
|
| " |
| 23,0," public XObject execute(XPathContext xctxt) throws javax.xml.transform.TransformerException |
| { |
|
|
| String fullName = m_arg0.execute(xctxt).str(); |
| int indexOfNSSep = fullName.indexOf(':'); |
| String result = null; |
| String propName = """"; |
|
|
| // List of properties where the name of the |
| // property argument is to be looked for. |
| Properties xsltInfo = new Properties(); |
|
|
| loadPropertyFile(XSLT_PROPERTIES, xsltInfo); |
|
|
| if (indexOfNSSep > 0) |
| { |
| String prefix = (indexOfNSSep >= 0) |
| ? fullName.substring(0, indexOfNSSep) : """"; |
| String namespace; |
|
|
| namespace = xctxt.getNamespaceContext().getNamespaceForPrefix(prefix); |
| propName = (indexOfNSSep < 0) |
| ? fullName : fullName.substring(indexOfNSSep + 1); |
|
|
| if (namespace.startsWith(""http://www.w3.org/XSL/Transform"") |
| || namespace.equals(""http://www.w3.org/1999/XSL/Transform"")) |
| { |
| result = xsltInfo.getProperty(propName); |
|
|
| if (null == result) |
| { |
| warn(xctxt, XPATHErrorResources.WG_PROPERTY_NOT_SUPPORTED, |
| new Object[]{ fullName }); //""XSL Property not supported: ""+fullName); |
|
|
| return XString.EMPTYSTRING; |
| } |
| } |
| else |
| { |
| warn(xctxt, XPATHErrorResources.WG_DONT_DO_ANYTHING_WITH_NS, |
| new Object[]{ namespace, |
| fullName }); //""Don't currently do anything with namespace ""+namespace+"" in property: ""+fullName); |
|
|
| try |
| { |
| |
| if(!xctxt.isSecureProcessing()) |
| { |
| result = System.getProperty(fullName); |
| } |
| else |
| { |
| warn(xctxt, XPATHErrorResources.WG_SECURITY_EXCEPTION, |
| new Object[]{ fullName }); |
| result = xsltInfo.getProperty(propName); |
| } |
| if (null == result) |
| { |
| return XString.EMPTYSTRING; |
| } |
| } |
| catch (SecurityException se) |
| { |
| warn(xctxt, XPATHErrorResources.WG_SECURITY_EXCEPTION, |
| new Object[]{ fullName }); |
|
|
| return XString.EMPTYSTRING; |
| } |
| } |
| } |
| else |
| { |
| try |
| { |
| |
| if(!xctxt.isSecureProcessing()) |
| { |
| result = System.getProperty(fullName); |
| } |
| else |
| { |
| warn(xctxt, XPATHErrorResources.WG_SECURITY_EXCEPTION, |
| new Object[]{ fullName }); |
| result = xsltInfo.getProperty(propName); |
| } |
| if (null == result) |
| { |
| return XString.EMPTYSTRING; |
| } |
| } |
| catch (SecurityException se) |
| { |
| warn(xctxt, XPATHErrorResources.WG_SECURITY_EXCEPTION, |
| new Object[]{ fullName }); |
|
|
| return XString.EMPTYSTRING; |
| } |
| } |
|
|
| if (propName.equals(""version"") && result.length() > 0) |
| { |
| try |
| { |
| |
| return new XString(""1.0""); |
| } |
| catch (Exception ex) |
| { |
| return new XString(result); |
| } |
| } |
| else |
| return new XString(result); |
| } |
|
|
| /** |
| * Retrieve a propery bundle from a specified file |
| * |
| * @param file The string name of the property file. The name |
| * should already be fully qualified as path/filename |
| * @param target The target property bag the file will be placed into. |
| */ |
| " |
| 24,0," public boolean equals(Object obj) { |
| if ( this == obj ) { |
| return true; |
| } |
| if ( !super.equals( obj ) ) { |
| return false; |
| } |
| if ( getClass() != obj.getClass() ) { |
| return false; |
| } |
| ConstrainedExecutable other = (ConstrainedExecutable) obj; |
| if ( executable == null ) { |
| if ( other.executable != null ) { |
| return false; |
| } |
| } |
| else if ( !executable.equals( other.executable ) ) { |
| return false; |
| } |
| return true; |
| } |
| " |
| 25,0," public static HierarchicalConfiguration loadXml(InputStream xmlStream) { |
| try { |
| XMLConfiguration cfg = new XMLConfiguration(); |
| DocumentBuilderFactory dbfactory = DocumentBuilderFactory.newInstance(); |
| |
| disableFeature(dbfactory, DISALLOW_DTD_FEATURE); |
| disableFeature(dbfactory, DISALLOW_EXTERNAL_DTD); |
| dbfactory.setXIncludeAware(false); |
| dbfactory.setExpandEntityReferences(false); |
| cfg.setDocumentBuilder(dbfactory.newDocumentBuilder()); |
| cfg.load(xmlStream); |
| return cfg; |
| } catch (ConfigurationException | ParserConfigurationException e) { |
| throw new IllegalArgumentException(""Cannot load xml from Stream"", e); |
| } |
| } |
|
|
| " |
| 26,0," void noteBytesRead(int pBytes) { |
| /* Indicates, that the given number of bytes have been read from |
| * the input stream. |
| */ |
| bytesRead += pBytes; |
| notifyListener(); |
| } |
|
|
| /** |
| * Called to indicate, that a new file item has been detected. |
| */ |
| " |
| 27,0," private static DocumentBuilder getBuilder() throws ParserConfigurationException { |
| ClassLoader loader = Thread.currentThread().getContextClassLoader(); |
| if (loader == null) { |
| loader = DOMUtils.class.getClassLoader(); |
| } |
| if (loader == null) { |
| DocumentBuilderFactory dbf = createDocumentBuilderFactory(); |
| return dbf.newDocumentBuilder(); |
| } |
| DocumentBuilder builder = DOCUMENT_BUILDERS.get(loader); |
| if (builder == null) { |
| DocumentBuilderFactory dbf = createDocumentBuilderFactory(); |
| builder = dbf.newDocumentBuilder(); |
| DOCUMENT_BUILDERS.put(loader, builder); |
| } |
| return builder; |
| } |
|
|
| /** |
| * This function is much like getAttribute, but returns null, not """", for a nonexistent attribute. |
| * |
| * @param e |
| * @param attributeName |
| */ |
| " |
| 28,0," public StandardInterceptUrlRegistry getRegistry() { |
| return REGISTRY; |
| } |
|
|
| /** |
| * Adds an {@link ObjectPostProcessor} for this class. |
| * |
| * @param objectPostProcessor |
| * @return the {@link UrlAuthorizationConfigurer} for further customizations |
| */ |
| " |
| 29,0," public synchronized XPathRecordReader addField(String name, String xpath, boolean multiValued, int flags) { |
| addField0(xpath, name, multiValued, false, flags); |
| return this; |
| } |
|
|
| /** |
| * Splits the XPATH into a List of xpath segments and calls build() to |
| * construct a tree of Nodes representing xpath segments. The resulting |
| * tree structure ends up describing all the Xpaths we are interested in. |
| * |
| * @param xpath The xpath expression for this field |
| * @param name The name for this field in the emitted record |
| * @param multiValued If 'true' then the emitted record will have values in |
| * a List<String> |
| * @param isRecord Flags that this XPATH is from a forEach statement |
| * @param flags The only supported flag is 'FLATTEN' |
| */ |
| " |
| 30,0," public void setConstants(ContainerBuilder builder) { |
| for (Object keyobj : keySet()) { |
| String key = (String)keyobj; |
| builder.factory(String.class, key, |
| new LocatableConstantFactory<String>(getProperty(key), getPropertyLocation(key))); |
| } |
| } |
| } |
| } |
| " |
| 31,0," public CommandLauncher launch(String host, TaskListener listener) throws IOException, InterruptedException { |
| return new CommandLauncher(command,new EnvVars(""SLAVE"",host)); |
| } |
|
|
| @Extension @Symbol(""command"") |
| " |
| 32,0," private void parseCSSStyleSheet(String sheet) throws SVGParseException |
| { |
| CSSParser cssp = new CSSParser(MediaType.screen); |
| svgDocument.addCSSRules(cssp.parse(sheet)); |
| } |
|
|
| " |
| 33,0," public void test_unsecuredJWT_validation() throws Exception { |
| JWT jwt = new JWT().setSubject(""123456789""); |
| Signer signer = new UnsecuredSigner(); |
| Verifier hmacVerifier = HMACVerifier.newVerifier(""too many secrets""); |
|
|
| String encodedUnsecuredJWT = JWTEncoder.getInstance().encode(jwt, signer); |
|
|
| |
| expectException(MissingVerifierException.class, () -> JWT.getDecoder().decode(encodedUnsecuredJWT, hmacVerifier)); |
|
|
| String encodedUnsecuredJWT_withKid = JWTEncoder.getInstance().encode(jwt, signer, (header) -> header.set(""kid"", ""abc"")); |
| String encodedUnsecuredJWT_withoutKid = JWTEncoder.getInstance().encode(jwt, signer); |
|
|
| Map<String, Verifier> verifierMap = new HashMap<>(); |
| verifierMap.put(null, hmacVerifier); |
| verifierMap.put(""abc"", hmacVerifier); |
|
|
| |
| expectException(MissingVerifierException.class, () -> JWT.getDecoder().decode(encodedUnsecuredJWT_withKid, verifierMap)); |
| expectException(MissingVerifierException.class, () -> JWT.getDecoder().decode(encodedUnsecuredJWT_withoutKid, verifierMap)); |
| } |
|
|
| @Test |
| " |
| 34,0," public String getConnectionName() { |
| return connectionName; |
| } |
|
|
| /** |
| * Set the username to use to connect to the database. |
| * |
| * @param connectionName Username |
| */ |
| " |
| 35,0," protected Log getLog() { |
| return log; |
| } |
|
|
| @Override |
| " |
| 36,0," public BigInteger[] decode( |
| byte[] encoding) |
| throws IOException |
| { |
| BigInteger[] sig = new BigInteger[2]; |
|
|
| byte[] first = new byte[encoding.length / 2]; |
| byte[] second = new byte[encoding.length / 2]; |
|
|
| System.arraycopy(encoding, 0, first, 0, first.length); |
| System.arraycopy(encoding, first.length, second, 0, second.length); |
|
|
| sig[0] = new BigInteger(1, first); |
| sig[1] = new BigInteger(1, second); |
|
|
| return sig; |
| } |
| } |
| }" |
| 37,0," public ScimGroup mapRow(ResultSet rs, int rowNum) throws SQLException { |
| int pos = 1; |
| String id = rs.getString(pos++); |
| String name = rs.getString(pos++); |
| String description = rs.getString(pos++); |
| Date created = rs.getTimestamp(pos++); |
| Date modified = rs.getTimestamp(pos++); |
| int version = rs.getInt(pos++); |
| String zoneId = rs.getString(pos++); |
| ScimGroup group = new ScimGroup(id, name, zoneId); |
| group.setDescription(description); |
| ScimMeta meta = new ScimMeta(created, modified, version); |
| group.setMeta(meta); |
| return group; |
| } |
| } |
| } |
| " |
| 38,0," public void testSendStringMessage() throws Exception { |
| sendMessageAndHaveItTransformed(""<mail><subject>Hey</subject><body>Hello world!</body></mail>""); |
| } |
| |
| " |
| 39,0," public void testSingletonPatternInSerialization() { |
| final Object[] singletones = new Object[] { |
| ExceptionFactory.INSTANCE, |
| }; |
|
|
| for (final Object original : singletones) { |
| TestUtils.assertSameAfterSerialization( |
| ""Singletone patern broken for "" + original.getClass(), |
| original |
| ); |
| } |
| } |
|
|
| " |
| 40,0," private void doTestParameterNameLengthRestriction( ParametersInterceptor parametersInterceptor, |
| int paramNameMaxLength ) { |
| StringBuilder sb = new StringBuilder(); |
| for (int i = 0; i < paramNameMaxLength + 1; i++) { |
| sb.append(""x""); |
| } |
|
|
| Map<String, Object> actual = new LinkedHashMap<String, Object>(); |
| parametersInterceptor.setValueStackFactory(createValueStackFactory(actual)); |
| ValueStack stack = createStubValueStack(actual); |
|
|
| Map<String, Object> parameters = new HashMap<String, Object>(); |
| parameters.put(sb.toString(), """"); |
| parameters.put(""huuhaa"", """"); |
|
|
| Action action = new SimpleAction(); |
| parametersInterceptor.setParameters(action, stack, parameters); |
| assertEquals(1, actual.size()); |
| } |
|
|
| " |
| 41,0," public boolean equals(Object obj) { |
| if (obj instanceof CharEntry) { |
| return value.equals(((CharEntry) obj).value); |
| } |
| return false; |
| } |
| |
| } |
|
|
|
|
| } |
| " |
| 42,0," protected boolean readMessage(AjpMessage message) |
| throws IOException { |
|
|
| byte[] buf = message.getBuffer(); |
| int headerLength = message.getHeaderLength(); |
|
|
| read(buf, 0, headerLength); |
|
|
| int messageLength = message.processHeader(true); |
| if (messageLength < 0) { |
| |
| |
| return false; |
| } |
| else if (messageLength == 0) { |
| |
| return true; |
| } |
| else { |
| if (messageLength > buf.length) { |
| |
| |
| throw new IllegalArgumentException(sm.getString( |
| ""ajpprocessor.header.tooLong"", |
| Integer.valueOf(messageLength), |
| Integer.valueOf(buf.length))); |
| } |
| read(buf, headerLength, messageLength); |
| return true; |
| } |
| } |
| " |
| 43,0," public boolean allPresentAndPositive() { |
| return lockoutPeriodSeconds >= 0 && lockoutAfterFailures >= 0 && countFailuresWithin >= 0; |
| } |
| " |
| 44,0," public boolean event(org.apache.coyote.Request req, |
| org.apache.coyote.Response res, SocketStatus status) { |
|
|
| Request request = (Request) req.getNote(ADAPTER_NOTES); |
| Response response = (Response) res.getNote(ADAPTER_NOTES); |
|
|
| if (request.getWrapper() != null) { |
| |
| boolean error = false; |
| try { |
| if (status == SocketStatus.OPEN) { |
| request.getEvent().setEventType(CometEvent.EventType.READ); |
| request.getEvent().setEventSubType(null); |
| } else if (status == SocketStatus.DISCONNECT) { |
| request.getEvent().setEventType(CometEvent.EventType.ERROR); |
| request.getEvent().setEventSubType(CometEvent.EventSubType.CLIENT_DISCONNECT); |
| error = true; |
| } else if (status == SocketStatus.ERROR) { |
| request.getEvent().setEventType(CometEvent.EventType.ERROR); |
| request.getEvent().setEventSubType(CometEvent.EventSubType.IOEXCEPTION); |
| error = true; |
| } else if (status == SocketStatus.STOP) { |
| request.getEvent().setEventType(CometEvent.EventType.END); |
| request.getEvent().setEventSubType(CometEvent.EventSubType.SERVER_SHUTDOWN); |
| } else if (status == SocketStatus.TIMEOUT) { |
| request.getEvent().setEventType(CometEvent.EventType.ERROR); |
| request.getEvent().setEventSubType(CometEvent.EventSubType.TIMEOUT); |
| } |
| |
| |
| connector.getContainer().getPipeline().getFirst().event(request, response, request.getEvent()); |
|
|
| if (response.isClosed() || !request.isComet()) { |
| res.action(ActionCode.ACTION_COMET_END, null); |
| } |
| return (!error); |
| } catch (Throwable t) { |
| if (!(t instanceof IOException)) { |
| log.error(sm.getString(""coyoteAdapter.service""), t); |
| } |
| error = true; |
| |
| |
| return false; |
| } finally { |
| |
| if (error || response.isClosed() || !request.isComet()) { |
| request.recycle(); |
| request.setFilterChain(null); |
| response.recycle(); |
| } |
| } |
| |
| } else { |
| return false; |
| } |
| } |
| |
|
|
| /** |
| * Service method. |
| */ |
| " |
| 45,0," public void testSnapshotAndRestore() throws ExecutionException, InterruptedException, IOException { |
| logger.info(""--> creating repository""); |
| assertAcked(client().admin().cluster().preparePutRepository(""test-repo"") |
| .setType(""fs"").setSettings(ImmutableSettings.settingsBuilder() |
| .put(""location"", randomRepoPath().getAbsolutePath()) |
| .put(""compress"", randomBoolean()) |
| .put(""chunk_size"", randomIntBetween(100, 1000)))); |
| String[] indicesBefore = new String[randomIntBetween(2,5)]; |
| String[] indicesAfter = new String[randomIntBetween(2,5)]; |
| for (int i = 0; i < indicesBefore.length; i++) { |
| indicesBefore[i] = ""index_before_"" + i; |
| createIndex(indicesBefore[i]); |
| } |
| for (int i = 0; i < indicesAfter.length; i++) { |
| indicesAfter[i] = ""index_after_"" + i; |
| createIndex(indicesAfter[i]); |
| } |
| String[] indices = new String[indicesBefore.length + indicesAfter.length]; |
| System.arraycopy(indicesBefore, 0, indices, 0, indicesBefore.length); |
| System.arraycopy(indicesAfter, 0, indices, indicesBefore.length, indicesAfter.length); |
| ensureYellow(); |
| logger.info(""--> indexing some data""); |
| IndexRequestBuilder[] buildersBefore = new IndexRequestBuilder[randomIntBetween(10, 200)]; |
| for (int i = 0; i < buildersBefore.length; i++) { |
| buildersBefore[i] = client().prepareIndex(RandomPicks.randomFrom(getRandom(), indicesBefore), ""foo"", Integer.toString(i)).setSource(""{ \""foo\"" : \""bar\"" } ""); |
| } |
| IndexRequestBuilder[] buildersAfter = new IndexRequestBuilder[randomIntBetween(10, 200)]; |
| for (int i = 0; i < buildersAfter.length; i++) { |
| buildersAfter[i] = client().prepareIndex(RandomPicks.randomFrom(getRandom(), indicesBefore), ""bar"", Integer.toString(i)).setSource(""{ \""foo\"" : \""bar\"" } ""); |
| } |
| indexRandom(true, buildersBefore); |
| indexRandom(true, buildersAfter); |
| assertThat(client().prepareCount(indices).get().getCount(), equalTo((long) (buildersBefore.length + buildersAfter.length))); |
| long[] counts = new long[indices.length]; |
| for (int i = 0; i < indices.length; i++) { |
| counts[i] = client().prepareCount(indices[i]).get().getCount(); |
| } |
|
|
| logger.info(""--> snapshot subset of indices before upgrage""); |
| CreateSnapshotResponse createSnapshotResponse = client().admin().cluster().prepareCreateSnapshot(""test-repo"", ""test-snap-1"").setWaitForCompletion(true).setIndices(""index_before_*"").get(); |
| assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), greaterThan(0)); |
| assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), equalTo(createSnapshotResponse.getSnapshotInfo().totalShards())); |
|
|
| assertThat(client().admin().cluster().prepareGetSnapshots(""test-repo"").setSnapshots(""test-snap-1"").get().getSnapshots().get(0).state(), equalTo(SnapshotState.SUCCESS)); |
|
|
| logger.info(""--> delete some data from indices that were already snapshotted""); |
| int howMany = randomIntBetween(1, buildersBefore.length); |
|
|
| for (int i = 0; i < howMany; i++) { |
| IndexRequestBuilder indexRequestBuilder = RandomPicks.randomFrom(getRandom(), buildersBefore); |
| IndexRequest request = indexRequestBuilder.request(); |
| client().prepareDelete(request.index(), request.type(), request.id()).get(); |
| } |
| refresh(); |
| final long numDocs = client().prepareCount(indices).get().getCount(); |
| assertThat(client().prepareCount(indices).get().getCount(), lessThan((long) (buildersBefore.length + buildersAfter.length))); |
|
|
|
|
| client().admin().indices().prepareUpdateSettings(indices).setSettings(ImmutableSettings.builder().put(EnableAllocationDecider.INDEX_ROUTING_ALLOCATION_ENABLE, ""none"")).get(); |
| backwardsCluster().allowOnAllNodes(indices); |
| logClusterState(); |
| boolean upgraded; |
| do { |
| logClusterState(); |
| CountResponse countResponse = client().prepareCount().get(); |
| assertHitCount(countResponse, numDocs); |
| upgraded = backwardsCluster().upgradeOneNode(); |
| ensureYellow(); |
| countResponse = client().prepareCount().get(); |
| assertHitCount(countResponse, numDocs); |
| } while (upgraded); |
| client().admin().indices().prepareUpdateSettings(indices).setSettings(ImmutableSettings.builder().put(EnableAllocationDecider.INDEX_ROUTING_ALLOCATION_ENABLE, ""all"")).get(); |
|
|
| logger.info(""--> close indices""); |
| client().admin().indices().prepareClose(""index_before_*"").get(); |
|
|
| logger.info(""--> verify repository""); |
| client().admin().cluster().prepareVerifyRepository(""test-repo"").get(); |
|
|
| logger.info(""--> restore all indices from the snapshot""); |
| RestoreSnapshotResponse restoreSnapshotResponse = client().admin().cluster().prepareRestoreSnapshot(""test-repo"", ""test-snap-1"").setWaitForCompletion(true).execute().actionGet(); |
| assertThat(restoreSnapshotResponse.getRestoreInfo().totalShards(), greaterThan(0)); |
|
|
| ensureYellow(); |
| assertThat(client().prepareCount(indices).get().getCount(), equalTo((long) (buildersBefore.length + buildersAfter.length))); |
| for (int i = 0; i < indices.length; i++) { |
| assertThat(counts[i], equalTo(client().prepareCount(indices[i]).get().getCount())); |
| } |
|
|
| logger.info(""--> snapshot subset of indices after upgrade""); |
| createSnapshotResponse = client().admin().cluster().prepareCreateSnapshot(""test-repo"", ""test-snap-2"").setWaitForCompletion(true).setIndices(""index_*"").get(); |
| assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), greaterThan(0)); |
| assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), equalTo(createSnapshotResponse.getSnapshotInfo().totalShards())); |
|
|
| |
| logger.info(""--> delete indices""); |
| String index = RandomPicks.randomFrom(getRandom(), indices); |
| cluster().wipeIndices(index); |
| logger.info(""--> restore one index after deletion""); |
| restoreSnapshotResponse = client().admin().cluster().prepareRestoreSnapshot(""test-repo"", ""test-snap-2"").setWaitForCompletion(true).setIndices(index).execute().actionGet(); |
| assertThat(restoreSnapshotResponse.getRestoreInfo().totalShards(), greaterThan(0)); |
| ensureYellow(); |
| assertThat(client().prepareCount(indices).get().getCount(), equalTo((long) (buildersBefore.length + buildersAfter.length))); |
| for (int i = 0; i < indices.length; i++) { |
| assertThat(counts[i], equalTo(client().prepareCount(indices[i]).get().getCount())); |
| } |
| } |
|
|
| " |
| 46,0," public XMSSPrivateKeyParameters getNextKey() |
| { |
| /* prepare authentication path for next leaf */ |
| int treeHeight = this.params.getHeight(); |
| if (this.getIndex() < ((1 << treeHeight) - 1)) |
| { |
| return new XMSSPrivateKeyParameters.Builder(params) |
| .withSecretKeySeed(secretKeySeed).withSecretKeyPRF(secretKeyPRF) |
| .withPublicSeed(publicSeed).withRoot(root) |
| .withBDSState(bdsState.getNextState(publicSeed, secretKeySeed, (OTSHashAddress)new OTSHashAddress.Builder().build())).build(); |
| } |
| else |
| { |
| return new XMSSPrivateKeyParameters.Builder(params) |
| .withSecretKeySeed(secretKeySeed).withSecretKeyPRF(secretKeyPRF) |
| .withPublicSeed(publicSeed).withRoot(root) |
| .withBDSState(new BDS(params, getIndex() + 1)).build(); |
| } |
| } |
|
|
| " |
| 47,0," public void addRecipients(final ExtendedEmailPublisherContext context, EnvVars env, Set<InternetAddress> to, Set<InternetAddress> cc, Set<InternetAddress> bcc) { |
| final class Debug implements RecipientProviderUtilities.IDebug { |
| private final ExtendedEmailPublisherDescriptor descriptor |
| = Jenkins.getActiveInstance().getDescriptorByType(ExtendedEmailPublisherDescriptor.class); |
|
|
| private final PrintStream logger = context.getListener().getLogger(); |
|
|
| public void send(final String format, final Object... args) { |
| descriptor.debug(logger, format, args); |
| } |
| } |
| final Debug debug = new Debug(); |
| |
| Run<?, ?> cur = context.getRun(); |
| Cause.UpstreamCause upc = cur.getCause(Cause.UpstreamCause.class); |
| while (upc != null) { |
| |
| Job<?, ?> p = (Job<?, ?>) Jenkins.getActiveInstance().getItemByFullName(upc.getUpstreamProject()); |
| if (p == null) { |
| context.getListener().getLogger().print(""There is a break in the project linkage, could not retrieve upstream project information""); |
| break; |
| } |
| cur = p.getBuildByNumber(upc.getUpstreamBuild()); |
| upc = cur.getCause(Cause.UpstreamCause.class); |
| } |
| addUserTriggeringTheBuild(cur, to, cc, bcc, env, context, debug); |
| } |
|
|
| " |
| 48,0," public void setSslSupport(SSLSupport sslSupport) { |
| this.sslSupport = sslSupport; |
| } |
| " |
| 49,0," public void loadPropertyFile(String file, Properties target) |
| { |
| try |
| { |
| |
| InputStream is = SecuritySupport.getResourceAsStream(ObjectFactory.findClassLoader(), |
| file); |
|
|
| |
| BufferedInputStream bis = new BufferedInputStream(is); |
|
|
| target.load(bis); |
| bis.close(); |
| } |
| catch (Exception ex) |
| { |
| |
| throw new org.apache.xml.utils.WrappedRuntimeException(ex); |
| } |
| } |
| " |
| 50,0," protected MimeTypes getMimeTypes() { |
| return embeddedDocumentUtil.getMimeTypes(); |
| } |
|
|
| " |
| 51,0," public int getKDFInfo() { |
| final int unusedBit28 = 0x8000000; |
| |
| |
| |
| int kdfVers = getKDFVersion(); |
| assert kdfVers > 0 && kdfVers <= 99991231 : ""KDF version (YYYYMMDD, max 99991231) out of range: "" + kdfVers; |
| int kdfInfo = kdfVers; |
| int macAlg = kdfPRFAsInt(); |
| assert macAlg >= 0 && macAlg <= 15 : ""MAC algorithm indicator must be between 0 to 15 inclusion; value is: "" + macAlg; |
| |
| |
| kdfInfo &= ~unusedBit28; |
|
|
| |
| kdfInfo |= (macAlg << 28); |
|
|
| return kdfInfo; |
| } |
| " |
| 52,0," private void readObject(ObjectInputStream stream) throws IOException, ClassNotFoundException { |
| stream.defaultReadObject(); |
| EVIL_BIT = 1; |
| } |
|
|
| } |
|
|
| } |
| " |
| 53,0," public void onStartup(Set<Class<?>> c, ServletContext ctx) |
| throws ServletException { |
| Servlet s; |
| |
| if (createServlet) { |
| s = ctx.createServlet(servlet.getClass()); |
| } else { |
| s = servlet; |
| } |
| ServletRegistration.Dynamic r = ctx.addServlet(""servlet"", s); |
| r.addMapping(""/""); |
| } |
| } |
| } |
| " |
| 54,0," public ResetPasswordResponse resetPassword(String code, String newPassword) throws InvalidPasswordException { |
| try { |
| passwordValidator.validate(newPassword); |
| return changePasswordCodeAuthenticated(code, newPassword); |
| } catch (RestClientException e) { |
| throw new UaaException(e.getMessage()); |
| } |
| } |
|
|
| " |
| 55,0," public Api getApi() { |
| return new Api(this); |
| } |
|
|
| /** |
| * Returns the instance of this class. |
| * If {@link jenkins.model.Jenkins#getInstance()} isn't available |
| * or the plugin class isn't registered null will be returned. |
| * |
| * @return the instance. |
| */ |
| @CheckForNull |
| " |
| 56,0," protected int readMessage(AjpMessage message, boolean blockFirstRead) |
| throws IOException { |
|
|
| byte[] buf = message.getBuffer(); |
| int headerLength = message.getHeaderLength(); |
|
|
| int bytesRead = read(buf, 0, headerLength, blockFirstRead); |
|
|
| if (bytesRead == 0) { |
| return 0; |
| } |
| |
| int messageLength = message.processHeader(true); |
| if (messageLength < 0) { |
| // Invalid AJP header signature |
| throw new IOException(sm.getString(""ajpmessage.invalidLength"", |
| Integer.valueOf(messageLength))); |
| } |
| else if (messageLength == 0) { |
| // Zero length message. |
| return bytesRead; |
| } |
| else { |
| if (messageLength > buf.length) { |
| // Message too long for the buffer |
| // Need to trigger a 400 response |
| throw new IllegalArgumentException(sm.getString( |
| ""ajpprocessor.header.tooLong"", |
| Integer.valueOf(messageLength), |
| Integer.valueOf(buf.length))); |
| } |
| bytesRead += read(buf, headerLength, messageLength, true); |
| return bytesRead; |
| } |
| } |
|
|
|
|
| " |
| 57,0," public boolean isHA() { |
| return false; |
| } |
|
|
| @Override |
| " |
| 58,0," public XMSSMTPrivateKeyParameters getNextKey() |
| { |
| BDSStateMap newState = new BDSStateMap(bdsState, params, this.getIndex(), publicSeed, secretKeySeed); |
|
|
| return new XMSSMTPrivateKeyParameters.Builder(params).withIndex(index + 1) |
| .withSecretKeySeed(secretKeySeed).withSecretKeyPRF(secretKeyPRF) |
| .withPublicSeed(publicSeed).withRoot(root) |
| .withBDSState(newState).build(); |
| } |
| " |
| 59,0," public TransformerFactory createTransformerFactory() { |
| TransformerFactory factory = TransformerFactory.newInstance(); |
| // Enable the Security feature by default |
| try { |
| factory.setFeature(javax.xml.XMLConstants.FEATURE_SECURE_PROCESSING, true); |
| } catch (TransformerConfigurationException e) { |
| LOG.warn(""TransformerFactory doesn't support the feature {} with value {}, due to {}."", new Object[]{javax.xml.XMLConstants.FEATURE_SECURE_PROCESSING, ""true"", e}); |
| } |
| factory.setErrorListener(new XmlErrorListener()); |
| return factory; |
| } |
|
|
| " |
| 60,0," long getTimeStamp(); |
|
|
| " |
| 61,0," public void init(KeyGenerationParameters param) |
| { |
| this.param = (RSAKeyGenerationParameters)param; |
| } |
|
|
| " |
| 62,0," public Document getMetaData(Idp config) throws RuntimeException { |
| try { |
| |
| Crypto crypto = CertsUtils.createCrypto(config.getCertificate()); |
|
|
| W3CDOMStreamWriter writer = new W3CDOMStreamWriter(); |
|
|
| writer.writeStartDocument(""UTF-8"", ""1.0""); |
|
|
| String referenceID = IDGenerator.generateID(""_""); |
| writer.writeStartElement(""md"", ""EntityDescriptor"", SAML2_METADATA_NS); |
| writer.writeAttribute(""ID"", referenceID); |
|
|
| writer.writeAttribute(""entityID"", config.getIdpUrl().toString()); |
|
|
| writer.writeNamespace(""md"", SAML2_METADATA_NS); |
| writer.writeNamespace(""fed"", WS_FEDERATION_NS); |
| writer.writeNamespace(""wsa"", WS_ADDRESSING_NS); |
| writer.writeNamespace(""auth"", WS_FEDERATION_NS); |
| writer.writeNamespace(""xsi"", SCHEMA_INSTANCE_NS); |
|
|
| writeFederationMetadata(writer, config, crypto); |
|
|
| writer.writeEndElement(); |
|
|
| writer.writeEndDocument(); |
|
|
| writer.close(); |
|
|
| if (LOG.isDebugEnabled()) { |
| String out = DOM2Writer.nodeToString(writer.getDocument()); |
| LOG.debug(""***************** unsigned ****************""); |
| LOG.debug(out); |
| LOG.debug(""***************** unsigned ****************""); |
| } |
|
|
| Document result = SignatureUtils.signMetaInfo(crypto, null, config.getCertificatePassword(), |
| writer.getDocument(), referenceID); |
| if (result != null) { |
| return result; |
| } else { |
| throw new RuntimeException(""Failed to sign the metadata document: result=null""); |
| } |
| } catch (Exception e) { |
| LOG.error(""Error creating service metadata information "", e); |
| throw new RuntimeException(""Error creating service metadata information: "" + e.getMessage()); |
| } |
|
|
| } |
| |
| " |
| 63,0," protected void publish(ApplicationEvent event) { |
| if (publisher!=null) { |
| publisher.publishEvent(event); |
| } |
| } |
| " |
| 64,0," private static File getUnsanitizedLegacyConfigFileFor(String id) { |
| return new File(getRootDir(), idStrategy().legacyFilenameOf(id) + ""/config.xml""); |
| } |
|
|
| /** |
| * Gets the directory where Hudson stores user information. |
| */ |
| " |
| 65,0," protected void _initFactories(XMLInputFactory xmlIn, XMLOutputFactory xmlOut) |
| { |
| |
| xmlOut.setProperty(XMLOutputFactory.IS_REPAIRING_NAMESPACES, Boolean.TRUE); |
| |
| xmlIn.setProperty(XMLInputFactory.IS_COALESCING, Boolean.TRUE); |
| } |
|
|
| /** |
| * Note: compared to base implementation by {@link JsonFactory}, |
| * here the copy will actually share underlying XML input and |
| * output factories, as there is no way to make copies of those. |
| * |
| * @since 2.1 |
| */ |
| @Override |
| " |
| 66,0," public ScimUser retrieve(String id) { |
| try { |
| ScimUser u = jdbcTemplate.queryForObject(USER_BY_ID_QUERY, mapper, id); |
| return u; |
| } catch (EmptyResultDataAccessException e) { |
| throw new ScimResourceNotFoundException(""User "" + id + "" does not exist""); |
| } |
| } |
|
|
| @Override |
| " |
| 67,0," private <T> T run(PrivilegedAction<T> action) { |
| return System.getSecurityManager() != null ? AccessController.doPrivileged( action ) : action.run(); |
| } |
| " |
| 68,0," public boolean getMapperDirectoryRedirectEnabled() { return false; } |
| " |
| 69,0," protected void setUpResources(JAXRSServerFactoryBean sf) { |
| sf.setResourceClasses(TikaResource.class); |
| sf.setResourceProvider(TikaResource.class, |
| new SingletonResourceProvider(new TikaResource())); |
| } |
|
|
| @Override |
| " |
| 70,0," public HttpBinding getBinding() { |
| if (this.binding == null) { |
| this.binding = new AttachmentHttpBinding(); |
| this.binding.setTransferException(isTransferException()); |
| if (getComponent() != null) { |
| this.binding.setAllowJavaSerializedObject(getComponent().isAllowJavaSerializedObject()); |
| } |
| this.binding.setHeaderFilterStrategy(getHeaderFilterStrategy()); |
| } |
| return this.binding; |
| } |
|
|
| @Override |
| " |
| 71,0," public void testNamedEntity() throws Exception { |
| assertU(""<?xml version=\""1.0\"" ?>\n""+ |
| ""<!DOCTYPE add [\n<!ENTITY wacky \""zzz\"" >\n]>""+ |
| ""<add><doc>""+ |
| ""<field name=\""id\"">1</field>""+ |
| ""<field name=\""foo_s\"">&wacky;</field>"" + |
| ""</doc></add>""); |
| |
| assertU(""<commit/>""); |
| assertQ(req(""foo_s:zzz""), |
| "" |
| ); |
| } |
| |
| @Test |
| " |
| 72,0," private FreeStyleProject createDownstreamProject() throws Exception { |
| FreeStyleProject dp = createFreeStyleProject(""downstream""); |
|
|
| |
| WebClient webClient = new WebClient(); |
| HtmlPage page = webClient.getPage(dp,""configure""); |
| HtmlForm form = page.getFormByName(""config""); |
| form.getInputByName(""hasCustomQuietPeriod"").click(); |
| form.getInputByName(""quiet_period"").setValueAttribute(""0""); |
| submit(form); |
| assertEquals(""set quiet period"", 0, dp.getQuietPeriod()); |
|
|
| return dp; |
| } |
|
|
| " |
| 73,0," public void setOkStatusCodeRange(String okStatusCodeRange) { |
| this.okStatusCodeRange = okStatusCodeRange; |
| } |
| " |
| 74,0," public boolean shouldParseEmbedded(Metadata metadata) { |
| DocumentSelector selector = context.get(DocumentSelector.class); |
| if (selector != null) { |
| return selector.select(metadata); |
| } |
|
|
| FilenameFilter filter = context.get(FilenameFilter.class); |
| if (filter != null) { |
| String name = metadata.get(Metadata.RESOURCE_NAME_KEY); |
| if (name != null) { |
| return filter.accept(ABSTRACT_PATH, name); |
| } |
| } |
|
|
| return true; |
| } |
|
|
| " |
| 75,0," public void testLockTryingToDelete() throws Exception { |
| String lockType = ""native""; |
| Settings nodeSettings = ImmutableSettings.builder() |
| .put(""gateway.type"", ""local"") |
| .put(""index.store.fs.fs_lock"", lockType) |
| .build(); |
| String IDX = ""test""; |
| logger.info(""--> lock type: {}"", lockType); |
|
|
| internalCluster().startNode(nodeSettings); |
| Settings idxSettings = ImmutableSettings.builder() |
| .put(IndexMetaData.SETTING_NUMBER_OF_SHARDS, 1) |
| .put(IndexMetaData.SETTING_NUMBER_OF_REPLICAS, 0) |
| .put(""index.store.fs.fs_lock"", lockType) |
| .build(); |
|
|
| |
| prepareCreate(IDX).setSettings(idxSettings).addMapping(""doc"", ""foo"", ""type=string,index=not_analyzed"").get(); |
| ensureGreen(IDX); |
| client().prepareIndex(IDX, ""doc"").setSource(""foo"", ""bar"").get(); |
| flushAndRefresh(IDX); |
| NodeEnvironment env = internalCluster().getDataNodeInstance(NodeEnvironment.class); |
| logger.info(""--> data paths: [{}]"", env.nodeDataPaths()); |
| Path[] shardPaths = env.shardDataPaths(new ShardId(""test"", 0), ImmutableSettings.builder().build()); |
| logger.info(""--> paths: [{}]"", shardPaths); |
| |
| try { |
| NodeEnvironment.acquireFSLockForPaths(ImmutableSettings.EMPTY, shardPaths); |
| fail(""should not have been able to acquire the lock""); |
| } catch (ElasticsearchException e) { |
| assertTrue(""msg: "" + e.getMessage(), e.getMessage().contains(""unable to acquire write.lock"")); |
| } |
| |
| |
| |
| ShardLock sLock = new DummyShardLock(new ShardId(""test"", 0)); |
| try { |
| env.deleteShardDirectoryUnderLock(sLock, ImmutableSettings.builder().build()); |
| fail(""should not have been able to delete the directory""); |
| } catch (ElasticsearchException e) { |
| assertTrue(""msg: "" + e.getMessage(), e.getMessage().contains(""unable to acquire write.lock"")); |
| } |
| } |
| " |
| 76,0," public KeyPair generateKeyPair() |
| { |
| if (!initialised) |
| { |
| Integer paramStrength = Integers.valueOf(strength); |
|
|
| if (params.containsKey(paramStrength)) |
| { |
| param = (DSAKeyGenerationParameters)params.get(paramStrength); |
| } |
| else |
| { |
| synchronized (lock) |
| { |
| |
| |
| if (params.containsKey(paramStrength)) |
| { |
| param = (DSAKeyGenerationParameters)params.get(paramStrength); |
| } |
| else |
| { |
| DSAParametersGenerator pGen; |
| DSAParameterGenerationParameters dsaParams; |
|
|
| |
| |
| |
| |
| |
| |
| |
| if (strength == 1024) |
| { |
| pGen = new DSAParametersGenerator(); |
| if (Properties.isOverrideSet(""org.bouncycastle.dsa.FIPS186-2for1024bits"")) |
| { |
| pGen.init(strength, certainty, random); |
| } |
| else |
| { |
| dsaParams = new DSAParameterGenerationParameters(1024, 160, certainty, random); |
| pGen.init(dsaParams); |
| } |
| } |
| else if (strength > 1024) |
| { |
| dsaParams = new DSAParameterGenerationParameters(strength, 256, certainty, random); |
| pGen = new DSAParametersGenerator(new SHA256Digest()); |
| pGen.init(dsaParams); |
| } |
| else |
| { |
| pGen = new DSAParametersGenerator(); |
| pGen.init(strength, certainty, random); |
| } |
| param = new DSAKeyGenerationParameters(random, pGen.generateParameters()); |
|
|
| params.put(paramStrength, param); |
| } |
| } |
| } |
|
|
| engine.init(param); |
| initialised = true; |
| } |
|
|
| AsymmetricCipherKeyPair pair = engine.generateKeyPair(); |
| DSAPublicKeyParameters pub = (DSAPublicKeyParameters)pair.getPublic(); |
| DSAPrivateKeyParameters priv = (DSAPrivateKeyParameters)pair.getPrivate(); |
|
|
| return new KeyPair(new BCDSAPublicKey(pub), new BCDSAPrivateKey(priv)); |
| } |
| " |
| 77,0," Attributes setPropertiesFromAttributes( |
| StylesheetHandler handler, String rawName, Attributes attributes, |
| ElemTemplateElement target, boolean throwError) |
| throws org.xml.sax.SAXException |
| { |
|
|
| XSLTElementDef def = getElemDef(); |
| AttributesImpl undefines = null; |
| boolean isCompatibleMode = ((null != handler.getStylesheet() |
| && handler.getStylesheet().getCompatibleMode()) |
| || !throwError); |
| if (isCompatibleMode) |
| undefines = new AttributesImpl(); |
|
|
|
|
| |
| |
| List processedDefs = new ArrayList(); |
|
|
| |
| List errorDefs = new ArrayList(); |
| int nAttrs = attributes.getLength(); |
|
|
| for (int i = 0; i < nAttrs; i++) |
| { |
| String attrUri = attributes.getURI(i); |
| |
| if((null != attrUri) && (attrUri.length() == 0) |
| && (attributes.getQName(i).startsWith(""xmlns:"") || |
| attributes.getQName(i).equals(""xmlns""))) |
| { |
| attrUri = org.apache.xalan.templates.Constants.S_XMLNAMESPACEURI; |
| } |
| String attrLocalName = attributes.getLocalName(i); |
| XSLTAttributeDef attrDef = def.getAttributeDef(attrUri, attrLocalName); |
|
|
| if (null == attrDef) |
| { |
| if (!isCompatibleMode) |
| { |
|
|
| |
| handler.error(XSLTErrorResources.ER_ATTR_NOT_ALLOWED, new Object[]{attributes.getQName(i), rawName}, null); |
| |
| |
| } |
| else |
| { |
| undefines.addAttribute(attrUri, attrLocalName, |
| attributes.getQName(i), |
| attributes.getType(i), |
| attributes.getValue(i)); |
| } |
| } |
| else |
| { |
| |
| if(handler.getStylesheetProcessor()==null) |
| System.out.println(""stylesheet processor null""); |
| if(attrDef.getName().compareTo(""*"")==0 && handler.getStylesheetProcessor().isSecureProcessing()) |
| { |
| |
| |
| handler.error(XSLTErrorResources.ER_ATTR_NOT_ALLOWED, new Object[]{attributes.getQName(i), rawName}, null); |
| |
| |
| } |
| else |
| { |
|
|
|
|
| boolean success = attrDef.setAttrValue(handler, attrUri, attrLocalName, |
| attributes.getQName(i), attributes.getValue(i), |
| target); |
|
|
| |
| if (success) |
| processedDefs.add(attrDef); |
| else |
| errorDefs.add(attrDef); |
| } |
| } |
| } |
|
|
| XSLTAttributeDef[] attrDefs = def.getAttributes(); |
| int nAttrDefs = attrDefs.length; |
|
|
| for (int i = 0; i < nAttrDefs; i++) |
| { |
| XSLTAttributeDef attrDef = attrDefs[i]; |
| String defVal = attrDef.getDefault(); |
|
|
| if (null != defVal) |
| { |
| if (!processedDefs.contains(attrDef)) |
| { |
| attrDef.setDefAttrValue(handler, target); |
| } |
| } |
|
|
| if (attrDef.getRequired()) |
| { |
| if ((!processedDefs.contains(attrDef)) && (!errorDefs.contains(attrDef))) |
| handler.error( |
| XSLMessages.createMessage( |
| XSLTErrorResources.ER_REQUIRES_ATTRIB, new Object[]{ rawName, |
| attrDef.getName() }), null); |
| } |
| } |
|
|
| return undefines; |
| } |
| " |
| 78,0," public static void beforeClass() throws Exception { |
| SUITE_SEED = randomLong(); |
| initializeSuiteScope(); |
| } |
|
|
| " |
| 79,0," public void connect(HttpConsumer consumer) throws Exception { |
| } |
|
|
| /** |
| * Disconnects the URL specified on the endpoint from the specified processor. |
| * |
| * @param consumer the consumer |
| * @throws Exception can be thrown |
| */ |
| " |
| 80,0," private void writeAttribute(SessionAttribute sessionAttribute) throws IOException { |
| write(""<td>""); |
| writeDirectly(htmlEncodeButNotSpace(sessionAttribute.getName())); |
| write(""</td><td>""); |
| write(String.valueOf(sessionAttribute.getType())); |
| write(""</td><td align='center'>""); |
| if (sessionAttribute.isSerializable()) { |
| write(""#oui#""); |
| } else { |
| write(""<span class='severe'>#non#</span>""); |
| } |
| write(""</td><td align='right'>""); |
| write(integerFormat.format(sessionAttribute.getSerializedSize())); |
| write(""</td><td>""); |
| writeDirectly(htmlEncodeButNotSpace(String.valueOf(sessionAttribute.getContent()))); |
| write(""</td>""); |
| } |
| " |
| 81,0," public boolean isUseRouteBuilder() { |
| return false; |
| } |
|
|
| @Test |
| @Ignore |
| " |
| 82,0," public String getDisplayName() { |
| return ""Developers""; |
| } |
| } |
| } |
| " |
| 83,0," private <T> T run(PrivilegedExceptionAction<T> action) throws JAXBException { |
| try { |
| return System.getSecurityManager() != null ? AccessController.doPrivileged( action ) : action.run(); |
| } |
| catch ( JAXBException e ) { |
| throw e; |
| } |
| catch ( Exception e ) { |
| throw log.getErrorParsingMappingFileException( e ); |
| } |
| } |
|
|
| |
| " |
| 84,0," protected void checkIllegalTypes(DeserializationContext ctxt, JavaType type, |
| BeanDescription beanDesc) |
| throws JsonMappingException |
| { |
| |
| |
| String full = type.getRawClass().getName(); |
|
|
| if (_cfgIllegalClassNames.contains(full)) { |
| throw JsonMappingException.from(ctxt, |
| String.format(""Illegal type (%s) to deserialize: prevented for security reasons"", full)); |
| } |
| } |
| " |
| 85,0," public FileVisitResult postVisitDirectory(Path dir, IOException ioe) |
| throws IOException { |
| |
| return FileVisitResult.CONTINUE; |
| }}); |
| } |
| } |
| " |
| 86,0," public JettyHttpEndpoint getEndpoint() { |
| return (JettyHttpEndpoint) super.getEndpoint(); |
| } |
|
|
| " |
| 87,0," public static File randomRepoPath(Settings settings) { |
| Environment environment = new Environment(settings); |
| File[] repoFiles = environment.repoFiles(); |
| assert repoFiles.length > 0; |
| File path; |
| do { |
| path = new File(repoFiles[0], randomAsciiOfLength(10)); |
| } while (path.exists()); |
| return path; |
| } |
|
|
| " |
| 88,0," public void setup() { |
| this.request = new MockHttpServletRequest(); |
| this.request.setMethod(""GET""); |
| this.response = new MockHttpServletResponse(); |
| this.chain = new MockFilterChain(); |
| } |
|
|
| @After |
| " |
| 89,0," public static Context getCurrentContext() |
| { |
| return __context.get(); |
| } |
|
|
| " |
| 90,0," protected Log getLog() { |
| return log; |
| } |
|
|
| |
|
|
|
|
| " |
| 91,0," protected void checkIllegalTypes(DeserializationContext ctxt, JavaType type, |
| BeanDescription beanDesc) |
| throws JsonMappingException |
| { |
| |
| |
| String full = type.getRawClass().getName(); |
|
|
| if (_cfgIllegalClassNames.contains(full)) { |
| ctxt.reportBadTypeDefinition(beanDesc, |
| ""Illegal type (%s) to deserialize: prevented for security reasons"", full); |
| } |
| } |
| " |
| 92,0," public String toString() { |
| return xpathExpression; |
| } |
| " |
| 93,0," protected void setLocale(HttpServletRequest request) { |
| if (defaultLocale == null) { |
| defaultLocale = request.getLocale(); |
| } |
| } |
|
|
| " |
| 94,0," protected boolean isWithinLengthLimit( String name ) { |
| return name.length() <= paramNameMaxLength; |
| } |
|
|
| " |
| 95,0," private CoderResult decodeHasArray(ByteBuffer in, CharBuffer out) { |
| int outRemaining = out.remaining(); |
| int pos = in.position(); |
| int limit = in.limit(); |
| final byte[] bArr = in.array(); |
| final char[] cArr = out.array(); |
| final int inIndexLimit = limit + in.arrayOffset(); |
| int inIndex = pos + in.arrayOffset(); |
| int outIndex = out.position() + out.arrayOffset(); |
| |
| |
| for (; inIndex < inIndexLimit && outRemaining > 0; inIndex++) { |
| int jchar = bArr[inIndex]; |
| if (jchar < 0) { |
| jchar = jchar & 0x7F; |
| int tail = remainingBytes[jchar]; |
| if (tail == -1) { |
| in.position(inIndex - in.arrayOffset()); |
| out.position(outIndex - out.arrayOffset()); |
| return CoderResult.malformedForLength(1); |
| } |
| if (inIndexLimit - inIndex < 1 + tail) { |
| |
| |
| if (jchar == 0x74 && inIndexLimit > inIndex + 1) { |
| if ((bArr[inIndex + 1] & 0xFF) > 0x8F) { |
| |
| |
| return CoderResult.unmappableForLength(4); |
| } |
| } |
| if (jchar == 0x60 && inIndexLimit > inIndex +1) { |
| if ((bArr[inIndex + 1] & 0x7F) == 0) { |
| |
| |
| |
| return CoderResult.malformedForLength(3); |
| } |
| } |
| if (jchar == 0x70 && inIndexLimit > inIndex +1) { |
| if ((bArr[inIndex + 1] & 0x7F) < 0x10) { |
| |
| |
| |
| return CoderResult.malformedForLength(4); |
| } |
| } |
| break; |
| } |
| for (int i = 0; i < tail; i++) { |
| int nextByte = bArr[inIndex + i + 1] & 0xFF; |
| if ((nextByte & 0xC0) != 0x80) { |
| in.position(inIndex - in.arrayOffset()); |
| out.position(outIndex - out.arrayOffset()); |
| return CoderResult.malformedForLength(1 + i); |
| } |
| jchar = (jchar << 6) + nextByte; |
| } |
| jchar -= remainingNumbers[tail]; |
| if (jchar < lowerEncodingLimit[tail]) { |
| |
| in.position(inIndex - in.arrayOffset()); |
| out.position(outIndex - out.arrayOffset()); |
| return CoderResult.malformedForLength(1); |
| } |
| inIndex += tail; |
| } |
| |
| if (jchar >= 0xD800 && jchar <= 0xDFFF) { |
| return CoderResult.unmappableForLength(3); |
| } |
| |
| if (jchar > 0x10FFFF) { |
| return CoderResult.unmappableForLength(4); |
| } |
| if (jchar <= 0xffff) { |
| cArr[outIndex++] = (char) jchar; |
| outRemaining--; |
| } else { |
| if (outRemaining < 2) { |
| return CoderResult.OVERFLOW; |
| } |
| cArr[outIndex++] = (char) ((jchar >> 0xA) + 0xD7C0); |
| cArr[outIndex++] = (char) ((jchar & 0x3FF) + 0xDC00); |
| outRemaining -= 2; |
| } |
| } |
| in.position(inIndex - in.arrayOffset()); |
| out.position(outIndex - out.arrayOffset()); |
| return (outRemaining == 0 && inIndex < inIndexLimit) ? CoderResult.OVERFLOW |
| : CoderResult.UNDERFLOW; |
| } |
| " |
| 96,0," public static CipherText fromPortableSerializedBytes(byte[] bytes) |
| throws EncryptionException |
| { |
| CipherTextSerializer cts = new CipherTextSerializer(bytes); |
| return cts.asCipherText(); |
| } |
|
|
| |
|
|
| /** |
| * Obtain the String representing the cipher transformation used to encrypt |
| * the plaintext. The cipher transformation represents the cipher algorithm, |
| * the cipher mode, and the padding scheme used to do the encryption. An |
| * example would be ""AES/CBC/PKCS5Padding"". See Appendix A in the |
| * <a href=""http: |
| * Java Cryptography Architecture Reference Guide</a> |
| * for information about standard supported cipher transformation names. |
| * <p> |
| * The cipher transformation name is usually sufficient to be passed to |
| * {@link javax.crypto.Cipher#getInstance(String)} to create a |
| * <code>Cipher</code> object to decrypt the ciphertext. |
| * |
| * @return The cipher transformation name used to encrypt the plaintext |
| * resulting in this ciphertext. |
| */ |
| " |
| 97,0," protected void _verifyException(Throwable t, Class<?> expExcType, |
| String... patterns) throws Exception |
| { |
| Class<?> actExc = t.getClass(); |
| if (!expExcType.isAssignableFrom(actExc)) { |
| fail(""Expected Exception of type '""+expExcType.getName()+""', got '"" |
| +actExc.getName()+""', message: ""+t.getMessage()); |
| } |
| for (String pattern : patterns) { |
| verifyException(t, pattern); |
| } |
| } |
| " |
| 98,0," public String getCompression() { |
| switch (compressionLevel) { |
| case 0: |
| return ""off""; |
| case 1: |
| return ""on""; |
| case 2: |
| return ""force""; |
| } |
| return ""off""; |
| } |
|
|
|
|
| /** |
| * Set compression level. |
| */ |
| " |
| 99,0," public void close() throws IOException { |
| if (authFilter != null) { |
| authFilter.destroy(); |
| } |
| } |
| " |
| 100,0," public void destroy() { |
| } |
| }; |
|
|
| " |
| 101,0," public O getOrBuild() { |
| if (isUnbuilt()) { |
| try { |
| return build(); |
| } |
| catch (Exception e) { |
| logger.debug(""Failed to perform build. Returning null"", e); |
| return null; |
| } |
| } |
| else { |
| return getObject(); |
| } |
| } |
|
|
| /** |
| * Applies a {@link SecurityConfigurerAdapter} to this {@link SecurityBuilder} and |
| * invokes {@link SecurityConfigurerAdapter#setBuilder(SecurityBuilder)}. |
| * |
| * @param configurer |
| * @return |
| * @throws Exception |
| */ |
| @SuppressWarnings(""unchecked"") |
| " |
| 102,0," private void testModified() |
| throws Exception |
| { |
| ECNamedCurveParameterSpec namedCurve = ECNamedCurveTable.getParameterSpec(""P-256""); |
| org.bouncycastle.jce.spec.ECPublicKeySpec pubSpec = new org.bouncycastle.jce.spec.ECPublicKeySpec(namedCurve.getCurve().createPoint(PubX, PubY), namedCurve); |
| KeyFactory kFact = KeyFactory.getInstance(""EC"", ""BC""); |
| PublicKey pubKey = kFact.generatePublic(pubSpec); |
| Signature sig = Signature.getInstance(""SHA256WithECDSA"", ""BC""); |
|
|
| for (int i = 0; i != MODIFIED_SIGNATURES.length; i++) |
| { |
| sig.initVerify(pubKey); |
|
|
| sig.update(Strings.toByteArray(""Hello"")); |
|
|
| boolean failed; |
|
|
| try |
| { |
| failed = !sig.verify(Hex.decode(MODIFIED_SIGNATURES[i])); |
| System.err.println(ASN1Dump.dumpAsString(ASN1Primitive.fromByteArray(Hex.decode(MODIFIED_SIGNATURES[i])))); |
| } |
| catch (SignatureException e) |
| { |
| failed = true; |
| } |
|
|
| isTrue(""sig verified when shouldn't: "" + i, failed); |
| } |
| } |
|
|
| " |
| 103,0," protected void populateParams() { |
| super.populateParams(); |
|
|
| UIBean uiBean = (UIBean) component; |
| uiBean.setCssClass(cssClass); |
| uiBean.setCssStyle(cssStyle); |
| uiBean.setCssErrorClass(cssErrorClass); |
| uiBean.setCssErrorStyle(cssErrorStyle); |
| uiBean.setTitle(title); |
| uiBean.setDisabled(disabled); |
| uiBean.setLabel(label); |
| uiBean.setLabelSeparator(labelSeparator); |
| uiBean.setLabelposition(labelposition); |
| uiBean.setRequiredPosition(requiredPosition); |
| uiBean.setErrorPosition(errorPosition); |
| uiBean.setName(name); |
| uiBean.setRequiredLabel(requiredLabel); |
| uiBean.setTabindex(tabindex); |
| uiBean.setValue(value); |
| uiBean.setTemplate(template); |
| uiBean.setTheme(theme); |
| uiBean.setTemplateDir(templateDir); |
| uiBean.setOnclick(onclick); |
| uiBean.setOndblclick(ondblclick); |
| uiBean.setOnmousedown(onmousedown); |
| uiBean.setOnmouseup(onmouseup); |
| uiBean.setOnmouseover(onmouseover); |
| uiBean.setOnmousemove(onmousemove); |
| uiBean.setOnmouseout(onmouseout); |
| uiBean.setOnfocus(onfocus); |
| uiBean.setOnblur(onblur); |
| uiBean.setOnkeypress(onkeypress); |
| uiBean.setOnkeydown(onkeydown); |
| uiBean.setOnkeyup(onkeyup); |
| uiBean.setOnselect(onselect); |
| uiBean.setOnchange(onchange); |
| uiBean.setTooltip(tooltip); |
| uiBean.setTooltipConfig(tooltipConfig); |
| uiBean.setJavascriptTooltip(javascriptTooltip); |
| uiBean.setTooltipCssClass(tooltipCssClass); |
| uiBean.setTooltipDelay(tooltipDelay); |
| uiBean.setTooltipIconPath(tooltipIconPath); |
| uiBean.setAccesskey(accesskey); |
| uiBean.setKey(key); |
| uiBean.setId(id); |
|
|
| uiBean.setDynamicAttributes(dynamicAttributes); |
| } |
|
|
| " |
| 104,0," public long getTimestamp() { |
| return timestamp; |
| } |
| } |
| } |
| " |
| 105,0," public boolean isUseRouteBuilder() { |
| return false; |
| } |
|
|
| @Test |
| " |
| 106,0," public ServerSocket createSocket (int port, int backlog, |
| InetAddress ifAddress) |
| throws IOException |
| { |
| if (!initialized) init(); |
| ServerSocket socket = sslProxy.createServerSocket(port, backlog, |
| ifAddress); |
| initServerSocket(socket); |
| return socket; |
| } |
| |
| " |
| 107,0," public static void init() throws Exception { |
|
|
| idpHttpsPort = System.getProperty(""idp.https.port""); |
| Assert.assertNotNull(""Property 'idp.https.port' null"", idpHttpsPort); |
| rpHttpsPort = System.getProperty(""rp.https.port""); |
| Assert.assertNotNull(""Property 'rp.https.port' null"", rpHttpsPort); |
|
|
| idpServer = startServer(true, idpHttpsPort); |
|
|
| WSSConfig.init(); |
| } |
|
|
| " |
| 108,0," public void testPrivateKeySerialisation() |
| throws Exception |
| { |
| String stream = ""AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAArO0ABXNyACJzdW4ucm1pLnNlcnZlci5BY3RpdmF0aW9uR3JvdXBJbXBsT+r9SAwuMqcCAARaAA1ncm91cEluYWN0aXZlTAAGYWN0aXZldAAVTGphdmEvdXRpbC9IYXNodGFibGU7TAAHZ3JvdXBJRHQAJ0xqYXZhL3JtaS9hY3RpdmF0aW9uL0FjdGl2YXRpb25Hcm91cElEO0wACWxvY2tlZElEc3QAEExqYXZhL3V0aWwvTGlzdDt4cgAjamF2YS5ybWkuYWN0aXZhdGlvbi5BY3RpdmF0aW9uR3JvdXCVLvKwBSnVVAIAA0oAC2luY2FybmF0aW9uTAAHZ3JvdXBJRHEAfgACTAAHbW9uaXRvcnQAJ0xqYXZhL3JtaS9hY3RpdmF0aW9uL0FjdGl2YXRpb25Nb25pdG9yO3hyACNqYXZhLnJtaS5zZXJ2ZXIuVW5pY2FzdFJlbW90ZU9iamVjdEUJEhX14n4xAgADSQAEcG9ydEwAA2NzZnQAKExqYXZhL3JtaS9zZXJ2ZXIvUk1JQ2xpZW50U29ja2V0RmFjdG9yeTtMAANzc2Z0AChMamF2YS9ybWkvc2VydmVyL1JNSVNlcnZlclNvY2tldEZhY3Rvcnk7eHIAHGphdmEucm1pLnNlcnZlci5SZW1vdGVTZXJ2ZXLHGQcSaPM5+wIAAHhyABxqYXZhLnJtaS5zZXJ2ZXIuUmVtb3RlT2JqZWN002G0kQxhMx4DAAB4cHcSABBVbmljYXN0U2VydmVyUmVmeAAAFbNwcAAAAAAAAAAAcHAAcHBw""; |
|
|
| XMSSParameters params = new XMSSParameters(10, new SHA256Digest()); |
|
|
| byte[] output = Base64.decode(new String(stream).getBytes(""UTF-8"")); |
|
|
|
|
| //Simple Exploit |
|
|
| try |
| { |
| new XMSSPrivateKeyParameters.Builder(params).withPrivateKey(output, params).build(); |
| } |
| catch (IllegalArgumentException e) |
| { |
| assertTrue(e.getCause() instanceof IOException); |
| } |
|
|
| //Same Exploit other method |
|
|
| XMSS xmss2 = new XMSS(params, new SecureRandom()); |
|
|
| xmss2.generateKeys(); |
|
|
| byte[] publicKey = xmss2.exportPublicKey(); |
|
|
| try |
| { |
| xmss2.importState(output, publicKey); |
| } |
| catch (IllegalArgumentException e) |
| { |
| assertTrue(e.getCause() instanceof IOException); |
| } |
| } |
|
|
| " |
| 109,0," public void setAllowJavaSerializedObject(boolean allowJavaSerializedObject) { |
| this.allowJavaSerializedObject = allowJavaSerializedObject; |
| } |
|
|
| " |
| 110,0," public Collection<ResourcePermission> getRequiredPermissions(String regionName) { |
| return Collections.singletonList(new ResourcePermission(ResourcePermission.Resource.DATA, |
| ResourcePermission.Operation.READ, regionName)); |
| } |
|
|
| " |
| 111,0," abstract protected JDBCTableReader getTableReader(Connection connection, |
| String tableName, |
| EmbeddedDocumentUtil embeddedDocumentUtil); |
|
|
| " |
| 112,0," public FederationConfig getFederationConfig() { |
| return federationConfig; |
| } |
|
|
| " |
| 113,0," protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain filterChain) |
| throws ServletException, IOException { |
|
|
| String identityZoneId = request.getHeader(HEADER); |
| if (StringUtils.hasText(identityZoneId)) { |
| if (!isAuthorizedToSwitchToIdentityZone(identityZoneId)) { |
| response.sendError(HttpServletResponse.SC_FORBIDDEN, ""User is not authorized to switch to IdentityZone with id ""+identityZoneId); |
| return; |
| } |
| IdentityZone originalIdentityZone = IdentityZoneHolder.get(); |
| try { |
|
|
| IdentityZone identityZone = null; |
| try { |
| identityZone = dao.retrieve(identityZoneId); |
| } catch (ZoneDoesNotExistsException ex) { |
| } catch (EmptyResultDataAccessException ex) { |
| } catch (Exception ex) { |
| throw ex; |
| } |
| if (identityZone == null) { |
| response.sendError(HttpServletResponse.SC_NOT_FOUND, ""Identity zone with id ""+identityZoneId+"" does not exist""); |
| return; |
| } |
| stripScopesFromAuthentication(identityZoneId, request); |
| IdentityZoneHolder.set(identityZone); |
| filterChain.doFilter(request, response); |
| } finally { |
| IdentityZoneHolder.set(originalIdentityZone); |
| } |
| } else { |
| filterChain.doFilter(request, response); |
| } |
| } |
| " |
| 114,0," public BeanDefinition createMatcher(ParserContext pc, String path, String method) { |
| if ((""/**"".equals(path) || ""**"".equals(path)) && method == null) { |
| return new RootBeanDefinition(AnyRequestMatcher.class); |
| } |
|
|
| BeanDefinitionBuilder matcherBldr = BeanDefinitionBuilder |
| .rootBeanDefinition(type); |
|
|
| if (this == mvc) { |
| if (!pc.getRegistry().isBeanNameInUse(HANDLER_MAPPING_INTROSPECTOR_BEAN_NAME)) { |
| BeanDefinitionBuilder hmifb = BeanDefinitionBuilder |
| .rootBeanDefinition(HandlerMappingIntrospectorFactoryBean.class); |
| pc.getRegistry().registerBeanDefinition(HANDLER_MAPPING_INTROSPECTOR_FACTORY_BEAN_NAME, |
| hmifb.getBeanDefinition()); |
|
|
| RootBeanDefinition hmi = new RootBeanDefinition(HANDLER_MAPPING_INTROSPECTOR_BEAN_NAME); |
| hmi.setFactoryBeanName(HANDLER_MAPPING_INTROSPECTOR_FACTORY_BEAN_NAME); |
| hmi.setFactoryMethodName(""createHandlerMappingIntrospector""); |
| pc.getRegistry().registerBeanDefinition(HANDLER_MAPPING_INTROSPECTOR_BEAN_NAME, hmi); |
| } |
| matcherBldr.addConstructorArgReference(HANDLER_MAPPING_INTROSPECTOR_BEAN_NAME); |
| } |
|
|
| matcherBldr.addConstructorArgValue(path); |
| if (this == mvc) { |
| matcherBldr.addPropertyValue(""method"", method); |
| } |
| else { |
| matcherBldr.addConstructorArgValue(method); |
| } |
|
|
| if (this == ciRegex) { |
| matcherBldr.addConstructorArgValue(true); |
| } |
|
|
| return matcherBldr.getBeanDefinition(); |
| } |
|
|
| " |
| 115,0," protected Settings nodeSettings(int nodeOrdinal) { |
| return ImmutableSettings.builder() |
| // we really need local GW here since this also checks for corruption etc. |
| // and we need to make sure primaries are not just trashed if we don't have replicas |
| .put(super.nodeSettings(nodeOrdinal)).put(""gateway.type"", ""local"") |
| .put(TransportModule.TRANSPORT_SERVICE_TYPE_KEY, MockTransportService.class.getName()) |
| |
| .put(RecoverySettings.INDICES_RECOVERY_CONCURRENT_STREAMS, 10) |
| .put(RecoverySettings.INDICES_RECOVERY_CONCURRENT_SMALL_FILE_STREAMS, 10) |
| .put(ThrottlingAllocationDecider.CLUSTER_ROUTING_ALLOCATION_NODE_CONCURRENT_RECOVERIES, 5) |
| .build(); |
| } |
|
|
| /** |
| * Tests that we can actually recover from a corruption on the primary given that we have replica shards around. |
| */ |
| @Test |
| " |
| 116,0," private void writeFederationMetadata( |
| XMLStreamWriter writer, Idp config, Crypto crypto |
| ) throws XMLStreamException { |
|
|
| writer.writeStartElement(""md"", ""RoleDescriptor"", WS_FEDERATION_NS); |
| writer.writeAttribute(SCHEMA_INSTANCE_NS, ""type"", ""fed:SecurityTokenServiceType""); |
| writer.writeAttribute(""protocolSupportEnumeration"", WS_FEDERATION_NS); |
| if (config.getServiceDescription() != null && config.getServiceDescription().length() > 0 ) { |
| writer.writeAttribute(""ServiceDescription"", config.getServiceDescription()); |
| } |
| if (config.getServiceDisplayName() != null && config.getServiceDisplayName().length() > 0 ) { |
| writer.writeAttribute(""ServiceDisplayName"", config.getServiceDisplayName()); |
| } |
|
|
| |
| |
|
|
| |
| writer.writeStartElement("""", ""KeyDescriptor"", SAML2_METADATA_NS); |
| writer.writeAttribute(""use"", ""signing""); |
| writer.writeStartElement("""", ""KeyInfo"", ""http: |
| writer.writeStartElement("""", ""X509Data"", ""http: |
| writer.writeStartElement("""", ""X509Certificate"", ""http: |
|
|
| try { |
| String keyAlias = crypto.getDefaultX509Identifier(); |
| X509Certificate cert = CertsUtils.getX509Certificate(crypto, keyAlias); |
| writer.writeCharacters(Base64.encode(cert.getEncoded())); |
| } catch (Exception ex) { |
| LOG.error(""Failed to add certificate information to metadata. Metadata incomplete"", ex); |
| } |
|
|
| writer.writeEndElement(); |
| writer.writeEndElement(); |
| writer.writeEndElement(); |
| writer.writeEndElement(); |
|
|
|
|
| |
| writer.writeStartElement(""fed"", ""SecurityTokenServiceEndpoint"", WS_FEDERATION_NS); |
| writer.writeStartElement(""wsa"", ""EndpointReference"", WS_ADDRESSING_NS); |
|
|
| writer.writeStartElement(""wsa"", ""Address"", WS_ADDRESSING_NS); |
| writer.writeCharacters(config.getStsUrl().toString()); |
|
|
| writer.writeEndElement(); |
| writer.writeEndElement(); |
| writer.writeEndElement(); |
|
|
|
|
| |
| writer.writeStartElement(""fed"", ""PassiveRequestorEndpoint"", WS_FEDERATION_NS); |
| writer.writeStartElement(""wsa"", ""EndpointReference"", WS_ADDRESSING_NS); |
|
|
| writer.writeStartElement(""wsa"", ""Address"", WS_ADDRESSING_NS); |
| writer.writeCharacters(config.getIdpUrl().toString()); |
|
|
| writer.writeEndElement(); |
| writer.writeEndElement(); |
| writer.writeEndElement(); |
|
|
|
|
| |
| if (config.getClaimTypesOffered() != null && config.getClaimTypesOffered().size() > 0) { |
| writer.writeStartElement(""fed"", ""ClaimTypesOffered"", WS_FEDERATION_NS); |
| for (Claim claim : config.getClaimTypesOffered()) { |
|
|
| writer.writeStartElement(""auth"", ""ClaimType"", WS_FEDERATION_NS); |
| writer.writeAttribute(""Uri"", claim.getClaimType().toString()); |
| writer.writeAttribute(""Optional"", ""true""); |
| writer.writeEndElement(); |
|
|
| } |
| writer.writeEndElement(); |
| } |
|
|
| writer.writeEndElement(); |
| } |
|
|
| |
| " |
| 117,0," public Set<MediaType> getSupportedTypes(ParseContext context) { |
| return null; |
| } |
|
|
| @Override |
| " |
| 118,0," public Container getContainer() { |
|
|
| return (container); |
|
|
| } |
|
|
|
|
| /** |
| * Set the Container with which this Realm has been associated. |
| * |
| * @param container The associated Container |
| */ |
| " |
| 119,0," public Set<MediaType> getSupportedTypes(ParseContext context) { |
| return null; |
| } |
|
|
| @Override |
| " |
| 120,0," public void testSendEntityMessage() throws Exception { |
| |
| MockEndpoint endpoint = getMockEndpoint(""mock:result""); |
| endpoint.expectedMessageCount(1); |
| |
|
|
| String message = ""<hello/>""; |
| template.sendBody(""direct:start2"", message); |
|
|
| assertMockEndpointsSatisfied(); |
| |
| List<Exchange> list = endpoint.getReceivedExchanges(); |
| Exchange exchange = list.get(0); |
| String xml = exchange.getIn().getBody(String.class); |
| |
| System.out.println(xml); |
| } |
|
|
| " |
| 121,0," public void execute(FunctionContext context) { |
| RegionFunctionContext rfc = (RegionFunctionContext) context; |
| context.getResultSender().lastResult(rfc.getDataSet().size()); |
| } |
|
|
| @Override |
| " |
| 122,0," public DescriptorImpl getDescriptor() { |
| return Hudson.getInstance().getDescriptorByType(DescriptorImpl.class); |
| } |
|
|
| /** |
| * Returns the Missed Events playback manager. |
| * @return GerritMissedEventsPlaybackManager |
| */ |
| " |
| 123,0," public void setAllowJavaSerializedObject(boolean allowJavaSerializedObject) { |
| this.allowJavaSerializedObject = allowJavaSerializedObject; |
| } |
|
|
| " |
| 124,0," public int doRead(ByteChunk chunk, Request req) throws IOException { |
| checkError(); |
|
|
| if (endChunk) { |
| return -1; |
| } |
|
|
| if(needCRLFParse) { |
| needCRLFParse = false; |
| parseCRLF(false); |
| } |
|
|
| if (remaining <= 0) { |
| if (!parseChunkHeader()) { |
| throwIOException(sm.getString(""chunkedInputFilter.invalidHeader"")); |
| } |
| if (endChunk) { |
| parseEndChunk(); |
| return -1; |
| } |
| } |
|
|
| int result = 0; |
|
|
| if (pos >= lastValid) { |
| if (readBytes() < 0) { |
| throwIOException(sm.getString(""chunkedInputFilter.eos"")); |
| } |
| } |
|
|
| if (remaining > (lastValid - pos)) { |
| result = lastValid - pos; |
| remaining = remaining - result; |
| chunk.setBytes(buf, pos, result); |
| pos = lastValid; |
| } else { |
| result = remaining; |
| chunk.setBytes(buf, pos, remaining); |
| pos = pos + remaining; |
| remaining = 0; |
| |
| if ((pos+1) >= lastValid) { |
| |
| |
| needCRLFParse = true; |
| } else { |
| parseCRLF(false); |
| } |
| } |
|
|
| return result; |
| } |
|
|
|
|
| |
|
|
| /** |
| * Read the content length from the request. |
| */ |
| @Override |
| " |
| 125,0," public byte getValue() { return value; } |
| " |
| 126,0," public final Permission getRequiredPermission() { |
| return Jenkins.ADMINISTER; |
| } |
|
|
| /** |
| * Starts the server's project list updater, send command queue and event manager. |
| * |
| */ |
| " |
| 127,0," public Object compile(String expression, Map<String, Object> context) throws OgnlException { |
| Object tree; |
| if (enableExpressionCache) { |
| tree = expressions.get(expression); |
| if (tree == null) { |
| tree = Ognl.parseExpression(expression); |
| expressions.putIfAbsent(expression, tree); |
| } |
| } else { |
| tree = Ognl.parseExpression(expression); |
| } |
|
|
| if (!enableEvalExpression && isEvalExpression(tree, context)) { |
| throw new OgnlException(""Eval expressions has been disabled""); |
| } |
|
|
| return tree; |
| } |
|
|
| /** |
| * Copies the properties in the object ""from"" and sets them in the object ""to"" |
| * using specified type converter, or {@link com.opensymphony.xwork2.conversion.impl.XWorkConverter} if none |
| * is specified. |
| * |
| * @param from the source object |
| * @param to the target object |
| * @param context the action context we're running under |
| * @param exclusions collection of method names to excluded from copying ( can be null) |
| * @param inclusions collection of method names to included copying (can be null) |
| * note if exclusions AND inclusions are supplied and not null nothing will get copied. |
| */ |
| " |
| 128,0," public SolrInputDocument readDoc(XMLStreamReader parser) throws XMLStreamException { |
| SolrInputDocument doc = new SolrInputDocument(); |
|
|
| String attrName = """"; |
| for (int i = 0; i < parser.getAttributeCount(); i++) { |
| attrName = parser.getAttributeLocalName(i); |
| if (""boost"".equals(attrName)) { |
| doc.setDocumentBoost(Float.parseFloat(parser.getAttributeValue(i))); |
| } else { |
| log.warn(""Unknown attribute doc/@"" + attrName); |
| } |
| } |
|
|
| StringBuilder text = new StringBuilder(); |
| String name = null; |
| float boost = 1.0f; |
| boolean isNull = false; |
| String update = null; |
|
|
| while (true) { |
| int event = parser.next(); |
| switch (event) { |
| |
| case XMLStreamConstants.SPACE: |
| case XMLStreamConstants.CDATA: |
| case XMLStreamConstants.CHARACTERS: |
| text.append(parser.getText()); |
| break; |
|
|
| case XMLStreamConstants.END_ELEMENT: |
| if (""doc"".equals(parser.getLocalName())) { |
| return doc; |
| } else if (""field"".equals(parser.getLocalName())) { |
| Object v = isNull ? null : text.toString(); |
| if (update != null) { |
| Map<String,Object> extendedValue = new HashMap<String,Object>(1); |
| extendedValue.put(update, v); |
| v = extendedValue; |
| } |
| doc.addField(name, v, boost); |
| boost = 1.0f; |
| } |
| break; |
|
|
| case XMLStreamConstants.START_ELEMENT: |
| text.setLength(0); |
| String localName = parser.getLocalName(); |
| if (!""field"".equals(localName)) { |
| log.warn(""unexpected XML tag doc/"" + localName); |
| throw new SolrException(SolrException.ErrorCode.BAD_REQUEST, |
| ""unexpected XML tag doc/"" + localName); |
| } |
| boost = 1.0f; |
| update = null; |
| String attrVal = """"; |
| for (int i = 0; i < parser.getAttributeCount(); i++) { |
| attrName = parser.getAttributeLocalName(i); |
| attrVal = parser.getAttributeValue(i); |
| if (""name"".equals(attrName)) { |
| name = attrVal; |
| } else if (""boost"".equals(attrName)) { |
| boost = Float.parseFloat(attrVal); |
| } else if (""null"".equals(attrName)) { |
| isNull = StrUtils.parseBoolean(attrVal); |
| } else if (""update"".equals(attrName)) { |
| update = attrVal; |
| } else { |
| log.warn(""Unknown attribute doc/field/@"" + attrName); |
| } |
| } |
| break; |
| } |
| } |
| } |
| " |
| 129,0," private AsymmetricCipherKeyPair genKeyPair() |
| { |
| if (!initialized) |
| { |
| initializeDefault(); |
| } |
|
|
| |
| byte[][][] currentAuthPaths = new byte[numLayer][][]; |
| byte[][][] nextAuthPaths = new byte[numLayer - 1][][]; |
| Treehash[][] currentTreehash = new Treehash[numLayer][]; |
| Treehash[][] nextTreehash = new Treehash[numLayer - 1][]; |
|
|
| Vector[] currentStack = new Vector[numLayer]; |
| Vector[] nextStack = new Vector[numLayer - 1]; |
|
|
| Vector[][] currentRetain = new Vector[numLayer][]; |
| Vector[][] nextRetain = new Vector[numLayer - 1][]; |
|
|
| for (int i = 0; i < numLayer; i++) |
| { |
| currentAuthPaths[i] = new byte[heightOfTrees[i]][mdLength]; |
| currentTreehash[i] = new Treehash[heightOfTrees[i] - K[i]]; |
|
|
| if (i > 0) |
| { |
| nextAuthPaths[i - 1] = new byte[heightOfTrees[i]][mdLength]; |
| nextTreehash[i - 1] = new Treehash[heightOfTrees[i] - K[i]]; |
| } |
|
|
| currentStack[i] = new Vector(); |
| if (i > 0) |
| { |
| nextStack[i - 1] = new Vector(); |
| } |
| } |
|
|
| |
| byte[][] currentRoots = new byte[numLayer][mdLength]; |
| byte[][] nextRoots = new byte[numLayer - 1][mdLength]; |
| |
| byte[][] seeds = new byte[numLayer][mdLength]; |
| |
| |
| for (int i = 0; i < numLayer; i++) |
| { |
| System.arraycopy(currentSeeds[i], 0, seeds[i], 0, mdLength); |
| } |
|
|
| |
| currentRootSigs = new byte[numLayer - 1][mdLength]; |
|
|
| |
| |
| |
| |
| |
| for (int h = numLayer - 1; h >= 0; h--) |
| { |
| GMSSRootCalc tree; |
|
|
| |
| |
| if (h == numLayer - 1) |
| { |
| tree = this.generateCurrentAuthpathAndRoot(null, currentStack[h], seeds[h], h); |
| } |
| else |
| |
| |
| { |
| tree = this.generateCurrentAuthpathAndRoot(currentRoots[h + 1], currentStack[h], seeds[h], h); |
| } |
|
|
| |
| for (int i = 0; i < heightOfTrees[h]; i++) |
| { |
| System.arraycopy(tree.getAuthPath()[i], 0, currentAuthPaths[h][i], 0, mdLength); |
| } |
| currentRetain[h] = tree.getRetain(); |
| currentTreehash[h] = tree.getTreehash(); |
| System.arraycopy(tree.getRoot(), 0, currentRoots[h], 0, mdLength); |
| } |
|
|
| |
| |
| for (int h = numLayer - 2; h >= 0; h--) |
| { |
| GMSSRootCalc tree = this.generateNextAuthpathAndRoot(nextStack[h], seeds[h + 1], h + 1); |
|
|
| |
| for (int i = 0; i < heightOfTrees[h + 1]; i++) |
| { |
| System.arraycopy(tree.getAuthPath()[i], 0, nextAuthPaths[h][i], 0, mdLength); |
| } |
| nextRetain[h] = tree.getRetain(); |
| nextTreehash[h] = tree.getTreehash(); |
| System.arraycopy(tree.getRoot(), 0, nextRoots[h], 0, mdLength); |
|
|
| |
| |
| System.arraycopy(seeds[h + 1], 0, this.nextNextSeeds[h], 0, mdLength); |
| } |
| |
|
|
| |
| GMSSPublicKeyParameters publicKey = new GMSSPublicKeyParameters(currentRoots[0], gmssPS); |
|
|
| |
| GMSSPrivateKeyParameters privateKey = new GMSSPrivateKeyParameters(currentSeeds, nextNextSeeds, currentAuthPaths, |
| nextAuthPaths, currentTreehash, nextTreehash, currentStack, nextStack, currentRetain, nextRetain, nextRoots, currentRootSigs, gmssPS, digestProvider); |
|
|
| |
| return (new AsymmetricCipherKeyPair(publicKey, privateKey)); |
| } |
|
|
| /** |
| * calculates the authpath for tree in layer h which starts with seed[h] |
| * additionally computes the rootSignature of underlaying root |
| * |
| * @param currentStack stack used for the treehash instance created by this method |
| * @param lowerRoot stores the root of the lower tree |
| * @param seed starting seeds |
| * @param h actual layer |
| */ |
| " |
| 130,0," public static void redirectToSavedRequest(ServletRequest request, ServletResponse response, String fallbackUrl) |
| throws IOException { |
| String successUrl = null; |
| boolean contextRelative = true; |
| SavedRequest savedRequest = WebUtils.getAndClearSavedRequest(request); |
| if (savedRequest != null && savedRequest.getMethod().equalsIgnoreCase(AccessControlFilter.GET_METHOD)) { |
| successUrl = savedRequest.getRequestUrl(); |
| contextRelative = false; |
| } |
|
|
| if (successUrl == null) { |
| successUrl = fallbackUrl; |
| } |
|
|
| if (successUrl == null) { |
| throw new IllegalStateException(""Success URL not available via saved request or via the "" + |
| ""successUrlFallback method parameter. One of these must be non-null for "" + |
| ""issueSuccessRedirect() to work.""); |
| } |
|
|
| WebUtils.issueRedirect(request, response, successUrl, null, contextRelative); |
| } |
|
|
| " |
| 131,0," private void doTestRewrite(String config, String request, String expectedURI) throws Exception { |
| Tomcat tomcat = getTomcatInstance(); |
|
|
| |
| Context ctx = tomcat.addContext("""", null); |
|
|
| RewriteValve rewriteValve = new RewriteValve(); |
| ctx.getPipeline().addValve(rewriteValve); |
|
|
| rewriteValve.setConfiguration(config); |
|
|
| |
| |
| Tomcat.addServlet(ctx, ""snoop"", new SnoopServlet()); |
| ctx.addServletMapping(""/a/%255A"", ""snoop""); |
| ctx.addServletMapping(""/c/*"", ""snoop""); |
| Tomcat.addServlet(ctx, ""default"", new DefaultServlet()); |
| ctx.addServletMapping(""/"", ""default""); |
|
|
| tomcat.start(); |
|
|
| ByteChunk res = getUrl(""http: |
|
|
| String body = res.toString(); |
| RequestDescriptor requestDesc = SnoopResult.parse(body); |
| String requestURI = requestDesc.getRequestInfo(""REQUEST-URI""); |
| Assert.assertEquals(expectedURI, requestURI); |
| } |
| " |
| 132,0," protected void setLocation(String location) { |
| this.location = location; |
| } |
|
|
| " |
| 133,0," protected String adjustFilterForJoin(String filter) { |
| if (StringUtils.hasText(filter)) { |
| filter = filter.replace(""displayName"", ""g.displayName""); |
| filter = filter.replace(""externalGroup"", ""gm.external_group""); |
| filter = filter.replace(""groupId"", ""g.id""); |
| filter = filter.replace(""origin"", ""gm.origin""); |
| } |
| return filter; |
| } |
|
|
| @Override |
| " |
| 134,0," private static void disableFeature(DocumentBuilderFactory dbfactory, String feature) { |
| try { |
| dbfactory.setFeature(feature, true); |
| } catch (ParserConfigurationException e) { |
| |
| log.info(""ParserConfigurationException was thrown. The feature '"" + |
| feature + ""' is probably not supported by your XML processor.""); |
| } |
| } |
| " |
| 135,0," private static LinkedHashMap<RequestMatcher, Collection<ConfigAttribute>> processMap( |
| LinkedHashMap<RequestMatcher, Collection<ConfigAttribute>> requestMap, |
| ExpressionParser parser) { |
| Assert.notNull(parser, ""SecurityExpressionHandler returned a null parser object""); |
|
|
| LinkedHashMap<RequestMatcher, Collection<ConfigAttribute>> requestToExpressionAttributesMap = new LinkedHashMap<RequestMatcher, Collection<ConfigAttribute>>( |
| requestMap); |
|
|
| for (Map.Entry<RequestMatcher, Collection<ConfigAttribute>> entry : requestMap |
| .entrySet()) { |
| RequestMatcher request = entry.getKey(); |
| Assert.isTrue(entry.getValue().size() == 1, |
| ""Expected a single expression attribute for "" + request); |
| ArrayList<ConfigAttribute> attributes = new ArrayList<ConfigAttribute>(1); |
| String expression = entry.getValue().toArray(new ConfigAttribute[1])[0] |
| .getAttribute(); |
| logger.debug(""Adding web access control expression '"" + expression + ""', for "" |
| + request); |
|
|
| AbstractVariableEvaluationContextPostProcessor postProcessor = createPostProcessor( |
| request); |
| try { |
| attributes.add(new WebExpressionConfigAttribute( |
| parser.parseExpression(expression), postProcessor)); |
| } |
| catch (ParseException e) { |
| throw new IllegalArgumentException( |
| ""Failed to parse expression '"" + expression + ""'""); |
| } |
|
|
| requestToExpressionAttributesMap.put(request, attributes); |
| } |
|
|
| return requestToExpressionAttributesMap; |
| } |
|
|
| " |
| 136,0," public T create() { |
| final ByteArrayOutputStream baos = new ByteArrayOutputStream(512); |
| ByteArrayInputStream bais = null; |
| try { |
| final ObjectOutputStream out = new ObjectOutputStream(baos); |
| out.writeObject(iPrototype); |
|
|
| bais = new ByteArrayInputStream(baos.toByteArray()); |
| final ObjectInputStream in = new ObjectInputStream(bais); |
| return (T) in.readObject(); |
|
|
| } catch (final ClassNotFoundException ex) { |
| throw new FunctorException(ex); |
| } catch (final IOException ex) { |
| throw new FunctorException(ex); |
| } finally { |
| try { |
| if (bais != null) { |
| bais.close(); |
| } |
| } catch (final IOException ex) { |
| |
| } |
| try { |
| baos.close(); |
| } catch (final IOException ex) { |
| |
| } |
| } |
| } |
| } |
|
|
| } |
| " |
| 137,0," private File getFile(String fn) throws IOException { |
| File tmp = null; |
|
|
| String path = System.getProperty(""java.io.tmpdir"") + TMP; |
| File dir = new File(path); |
| if (!dir.exists()) { |
| LOGGER.fine(""Creating directory. Path: "" + dir.getCanonicalPath()); |
| Files.createDirectories(dir.toPath()); |
| } |
| tmp = new File(dir, fn); |
| LOGGER.fine(""Temp file: "" + tmp.getCanonicalPath()); |
|
|
| return tmp; |
| } |
| " |
| 138,0," private Object readResolve() { |
| throw new UnsupportedOperationException(); |
| } |
|
|
| /* Traverseproc implementation */ |
| @Override |
| " |
| 139,0," public Document getMetaData(Idp config, TrustedIdp serviceConfig) throws ProcessingException { |
|
|
| try { |
| Crypto crypto = CertsUtils.createCrypto(config.getCertificate()); |
| |
| W3CDOMStreamWriter writer = new W3CDOMStreamWriter(); |
|
|
| writer.writeStartDocument(""UTF-8"", ""1.0""); |
|
|
| String referenceID = IDGenerator.generateID(""_""); |
| writer.writeStartElement(""md"", ""EntityDescriptor"", SAML2_METADATA_NS); |
| writer.writeAttribute(""ID"", referenceID); |
| |
| String serviceURL = config.getIdpUrl().toString(); |
| writer.writeAttribute(""entityID"", serviceURL); |
| |
| writer.writeNamespace(""md"", SAML2_METADATA_NS); |
| writer.writeNamespace(""fed"", WS_FEDERATION_NS); |
| writer.writeNamespace(""wsa"", WS_ADDRESSING_NS); |
| writer.writeNamespace(""auth"", WS_FEDERATION_NS); |
| writer.writeNamespace(""xsi"", SCHEMA_INSTANCE_NS); |
|
|
| if (""http: |
| writeFederationMetadata(writer, serviceConfig, serviceURL); |
| } else if (""urn:oasis:names:tc:SAML:2.0:profiles:SSO:browser"".equals(serviceConfig.getProtocol())) { |
| writeSAMLMetadata(writer, serviceConfig, serviceURL, crypto); |
| } |
| |
| writer.writeEndElement(); |
|
|
| writer.writeEndDocument(); |
| |
| writer.close(); |
|
|
| if (LOG.isDebugEnabled()) { |
| String out = DOM2Writer.nodeToString(writer.getDocument()); |
| LOG.debug(""***************** unsigned ****************""); |
| LOG.debug(out); |
| LOG.debug(""***************** unsigned ****************""); |
| } |
|
|
| Document result = SignatureUtils.signMetaInfo(crypto, null, config.getCertificatePassword(), |
| writer.getDocument(), referenceID); |
| if (result != null) { |
| return result; |
| } else { |
| throw new RuntimeException(""Failed to sign the metadata document: result=null""); |
| } |
| } catch (ProcessingException e) { |
| throw e; |
| } catch (Exception e) { |
| LOG.error(""Error creating service metadata information "", e); |
| throw new ProcessingException(""Error creating service metadata information: "" + e.getMessage()); |
| } |
|
|
| } |
|
|
| " |
| 140,0," protected BlobStore blobStore() { |
| return blobStore; |
| } |
|
|
| /** |
| * {@inheritDoc} |
| */ |
| @Override |
| " |
| 141,0," public void recycle(boolean socketClosing) { |
| super.recycle(socketClosing); |
|
|
| inputBuffer.clear(); |
| inputBuffer.limit(0); |
| outputBuffer.clear(); |
|
|
| } |
| " |
| 142,0," public void winzipBackSlashWorkaround() throws Exception { |
| ZipArchiveInputStream in = null; |
| try { |
| in = new ZipArchiveInputStream(new FileInputStream(getFile(""test-winzip.zip""))); |
| ZipArchiveEntry zae = in.getNextZipEntry(); |
| zae = in.getNextZipEntry(); |
| zae = in.getNextZipEntry(); |
| assertEquals(""\u00e4/"", zae.getName()); |
| } finally { |
| if (in != null) { |
| in.close(); |
| } |
| } |
| } |
|
|
| /** |
| * @see ""https: |
| */ |
| @Test |
| " |
| 143,0," public long getAvailable() { |
|
|
| return (this.available); |
|
|
| } |
|
|
|
|
| /** |
| * Set the available date/time for this servlet, in milliseconds since the |
| * epoch. If this date/time is Long.MAX_VALUE, it is considered to mean |
| * that unavailability is permanent and any request for this servlet will return |
| * an SC_NOT_FOUND error. If this date/time is in the future, any request for |
| * this servlet will return an SC_SERVICE_UNAVAILABLE error. |
| * |
| * @param available The new available date/time |
| */ |
| @Override |
| " |
| 144,0," public String toString() |
| { |
| return name; |
| } |
| } |
|
|
| } |
| " |
| 145,0," public T transform(final Class<? extends T> input) { |
| try { |
| if (input == null) { |
| throw new FunctorException( |
| ""InstantiateTransformer: Input object was not an instanceof Class, it was a null object""); |
| } |
| final Constructor<? extends T> con = input.getConstructor(iParamTypes); |
| return con.newInstance(iArgs); |
| } catch (final NoSuchMethodException ex) { |
| throw new FunctorException(""InstantiateTransformer: The constructor must exist and be public ""); |
| } catch (final InstantiationException ex) { |
| throw new FunctorException(""InstantiateTransformer: InstantiationException"", ex); |
| } catch (final IllegalAccessException ex) { |
| throw new FunctorException(""InstantiateTransformer: Constructor must be public"", ex); |
| } catch (final InvocationTargetException ex) { |
| throw new FunctorException(""InstantiateTransformer: Constructor threw an exception"", ex); |
| } |
| } |
|
|
| " |
| 146,0," public String getTreeDigest() |
| { |
| return DigestUtil.getXMSSDigestName(treeDigest); |
| } |
| " |
| 147,0," public void run() { |
| try { |
| LOGGER.info(""Initiating a re-keying of secrets. See ""+getLogFile()); |
| StreamTaskListener listener = new StreamTaskListener(getLogFile()); |
| try { |
| PrintStream log = listener.getLogger(); |
| log.println(""Started re-keying "" + new Date()); |
| int count = rewriter.rewriteRecursive(Jenkins.getInstance().getRootDir(), listener); |
| log.printf(""Completed re-keying %d files on %s\n"",count,new Date()); |
| new RekeySecretAdminMonitor().done.on(); |
| LOGGER.info(""Secret re-keying completed""); |
| } catch (Exception e) { |
| LOGGER.log(Level.SEVERE, ""Fatal failure in re-keying secrets"",e); |
| e.printStackTrace(listener.error(""Fatal failure in rewriting secrets"")); |
| } |
| } catch (IOException e) { |
| LOGGER.log(Level.SEVERE, ""Catastrophic failure to rewrite secrets"",e); |
| } |
| } |
| } |
|
|
| private static final Logger LOGGER = Logger.getLogger(RekeySecretAdminMonitor.class.getName()); |
|
|
| } |
| " |
| 148,0," protected BlobPath basePath() { |
| return basePath; |
| } |
| " |
| 149,0," public ServerSocket createServerSocket(int port) throws IOException { |
| SSLServerSocket sslServerSocket = |
| (SSLServerSocket) sslServerSocketFactory.createServerSocket(port, 0, bindAddress); |
| if (getEnabledCipherSuites() != null) { |
| sslServerSocket.setEnabledCipherSuites(getEnabledCipherSuites()); |
| } |
| if (getEnabledProtocols() == null) { |
| sslServerSocket.setEnabledProtocols(defaultProtocols); |
| } else { |
| sslServerSocket.setEnabledProtocols(getEnabledProtocols()); |
| } |
| sslServerSocket.setNeedClientAuth(getNeedClientAuth()); |
| return sslServerSocket; |
| } |
| } |
| } |
| " |
| 150,0," protected boolean statusDropsConnection(int status) { |
| return status == 400 /* SC_BAD_REQUEST */ || |
| status == 408 /* SC_REQUEST_TIMEOUT */ || |
| status == 411 /* SC_LENGTH_REQUIRED */ || |
| status == 413 /* SC_REQUEST_ENTITY_TOO_LARGE */ || |
| status == 414 /* SC_REQUEST_URI_TOO_LARGE */ || |
| status == 500 /* SC_INTERNAL_SERVER_ERROR */ || |
| status == 503 /* SC_SERVICE_UNAVAILABLE */ || |
| status == 501 /* SC_NOT_IMPLEMENTED */; |
| } |
|
|
| " |
| 151,0," public void setExpressionParser(ExpressionParser expressionParser) { |
| this.expressionParser = expressionParser; |
| } |
|
|
| /** |
| * Sets the service to use to expose formatters for field values. |
| * @param conversionService the conversion service |
| */ |
| " |
| 152,0," void setAllowJavaSerializedObject(boolean allowJavaSerializedObject); |
|
|
| /** |
| * Gets the header filter strategy |
| * |
| * @return the strategy |
| */ |
| " |
| 153,0," protected String savedRequestURL(Session session) { |
|
|
| SavedRequest saved = |
| (SavedRequest) session.getNote(Constants.FORM_REQUEST_NOTE); |
| if (saved == null) { |
| return (null); |
| } |
| StringBuilder sb = new StringBuilder(saved.getRequestURI()); |
| if (saved.getQueryString() != null) { |
| sb.append('?'); |
| sb.append(saved.getQueryString()); |
| } |
| return (sb.toString()); |
|
|
| } |
|
|
|
|
| " |
| 154,0," public static String getAttributeValueEmptyNull(Element e, String attributeName) { |
| Attr node = e.getAttributeNode(attributeName); |
| if (node == null) { |
| return null; |
| } |
| return node.getValue(); |
| } |
|
|
| /** |
| * Get the trimmed text content of a node or null if there is no text |
| */ |
| " |
| 155,0," private boolean evaluate(String text) { |
| try { |
| InputSource inputSource = new InputSource(new StringReader(text)); |
| Document inputDocument = builder.parse(inputSource); |
| return ((Boolean) xpath.evaluate(xpathExpression, inputDocument, XPathConstants.BOOLEAN)).booleanValue(); |
| } catch (Exception e) { |
| return false; |
| } |
| } |
|
|
| @Override |
| " |
| 156,0," public void destroy() { |
| |
| } |
|
|
| " |
| 157,0," public void initialize( |
| AlgorithmParameterSpec params, |
| SecureRandom random) |
| throws InvalidAlgorithmParameterException |
| { |
| if (!(params instanceof DSAParameterSpec)) |
| { |
| throw new InvalidAlgorithmParameterException(""parameter object not a DSAParameterSpec""); |
| } |
| DSAParameterSpec dsaParams = (DSAParameterSpec)params; |
|
|
| param = new DSAKeyGenerationParameters(random, new DSAParameters(dsaParams.getP(), dsaParams.getQ(), dsaParams.getG())); |
|
|
| engine.init(param); |
| initialised = true; |
| } |
|
|
| " |
| 158,0," public static String nodeMode() { |
| Builder builder = ImmutableSettings.builder(); |
| if (Strings.isEmpty(System.getProperty(""es.node.mode"")) && Strings.isEmpty(System.getProperty(""es.node.local""))) { |
| return ""local""; |
| } |
| if (Strings.hasLength(System.getProperty(""es.node.mode""))) { |
| builder.put(""node.mode"", System.getProperty(""es.node.mode"")); |
| } |
| if (Strings.hasLength(System.getProperty(""es.node.local""))) { |
| builder.put(""node.local"", System.getProperty(""es.node.local"")); |
| } |
| if (DiscoveryNode.localNode(builder.build())) { |
| return ""local""; |
| } else { |
| return ""network""; |
| } |
| } |
|
|
| @Override |
| " |
| 159,0," public AsymmetricCipherKeyPair generateKeyPair() |
| { |
| return genKeyPair(); |
| } |
| " |
| 160,0," public synchronized void save() throws IOException { |
| super.save(); |
| updateTransientActions(); |
| } |
|
|
| @Override |
| " |
| 161,0," public static ASN1Integer getInstance( |
| ASN1TaggedObject obj, |
| boolean explicit) |
| { |
| ASN1Primitive o = obj.getObject(); |
|
|
| if (explicit || o instanceof ASN1Integer) |
| { |
| return getInstance(o); |
| } |
| else |
| { |
| return new ASN1Integer(ASN1OctetString.getInstance(obj.getObject()).getOctets()); |
| } |
| } |
|
|
| " |
| 162,0," public void testNoRewrite() throws Exception { |
| doTestRewrite("""", ""/a/%255A"", ""/a/%255A""); |
| } |
|
|
| @Test |
| " |
| 163,0," public void execute(String key, ActionMapping mapping) { |
| String name = key.substring(ACTION_PREFIX.length()); |
| if (allowDynamicMethodCalls) { |
| int bang = name.indexOf('!'); |
| if (bang != -1) { |
| String method = name.substring(bang + 1); |
| mapping.setMethod(method); |
| name = name.substring(0, bang); |
| } |
| } |
| mapping.setName(cleanupActionName(name)); |
| } |
| }); |
|
|
| } |
| }; |
| } |
|
|
| /** |
| * Adds a parameter action. Should only be called during initialization |
| * |
| * @param prefix The string prefix to trigger the action |
| * @param parameterAction The parameter action to execute |
| * @since 2.1.0 |
| */ |
| " |
| 164,0," public Collection<ResourcePermission> getRequiredPermissions(String regionName) { |
| return Collections.singletonList(new ResourcePermission(ResourcePermission.Resource.DATA, |
| ResourcePermission.Operation.READ, regionName)); |
| } |
|
|
| " |
| 165,0," public T create() { |
| |
| if (iConstructor == null) { |
| findConstructor(); |
| } |
|
|
| try { |
| return iConstructor.newInstance(iArgs); |
| } catch (final InstantiationException ex) { |
| throw new FunctorException(""InstantiateFactory: InstantiationException"", ex); |
| } catch (final IllegalAccessException ex) { |
| throw new FunctorException(""InstantiateFactory: Constructor must be public"", ex); |
| } catch (final InvocationTargetException ex) { |
| throw new FunctorException(""InstantiateFactory: Constructor threw an exception"", ex); |
| } |
| } |
|
|
| " |
| 166,0," public void parseEmbedded( |
| InputStream stream, ContentHandler handler, Metadata metadata, boolean outputHtml) |
| throws SAXException, IOException { |
| if(outputHtml) { |
| AttributesImpl attributes = new AttributesImpl(); |
| attributes.addAttribute("""", ""class"", ""class"", ""CDATA"", ""package-entry""); |
| handler.startElement(XHTML, ""div"", ""div"", attributes); |
| } |
|
|
| String name = metadata.get(Metadata.RESOURCE_NAME_KEY); |
| if (name != null && name.length() > 0 && outputHtml) { |
| handler.startElement(XHTML, ""h1"", ""h1"", new AttributesImpl()); |
| char[] chars = name.toCharArray(); |
| handler.characters(chars, 0, chars.length); |
| handler.endElement(XHTML, ""h1"", ""h1""); |
| } |
|
|
| |
| try (TemporaryResources tmp = new TemporaryResources()) { |
| final TikaInputStream newStream = TikaInputStream.get(new CloseShieldInputStream(stream), tmp); |
| if (stream instanceof TikaInputStream) { |
| final Object container = ((TikaInputStream) stream).getOpenContainer(); |
| if (container != null) { |
| newStream.setOpenContainer(container); |
| } |
| } |
| DELEGATING_PARSER.parse( |
| newStream, |
| new EmbeddedContentHandler(new BodyContentHandler(handler)), |
| metadata, context); |
| } catch (EncryptedDocumentException ede) { |
| |
| |
| } catch (CorruptedFileException e) { |
| throw new IOExceptionWithCause(e); |
| } catch (TikaException e) { |
| |
| |
| } |
|
|
| if(outputHtml) { |
| handler.endElement(XHTML, ""div"", ""div""); |
| } |
| } |
|
|
| " |
| 167,0," private void checkParams() |
| { |
| if (vi == null) |
| { |
| throw new IllegalArgumentException(""no layers defined.""); |
| } |
| if (vi.length > 1) |
| { |
| for (int i = 0; i < vi.length - 1; i++) |
| { |
| if (vi[i] >= vi[i + 1]) |
| { |
| throw new IllegalArgumentException( |
| ""v[i] has to be smaller than v[i+1]""); |
| } |
| } |
| } |
| else |
| { |
| throw new IllegalArgumentException( |
| ""Rainbow needs at least 1 layer, such that v1 < v2.""); |
| } |
| } |
|
|
| /** |
| * Getter for the number of layers |
| * |
| * @return the number of layers |
| */ |
| " |
| 168,0," public void markPaused() { |
| paused = true; |
| } |
| } |
|
|
| |
|
|
|
|
| protected static class MappedWrapper extends MapElement<Wrapper> { |
|
|
| public final boolean jspWildCard; |
| public final boolean resourceOnly; |
|
|
| public MappedWrapper(String name, Wrapper wrapper, boolean jspWildCard, |
| boolean resourceOnly) { |
| super(name, wrapper); |
| this.jspWildCard = jspWildCard; |
| this.resourceOnly = resourceOnly; |
| } |
| } |
| } |
| " |
| 169,0," public String getUsername() { |
| return username; |
| } |
|
|
| " |
| 170,0," public boolean isMapHeaders() { |
| return mapHeaders; |
| } |
|
|
| /** |
| * If this option is enabled, then during binding from Spark to Camel Message then the headers will be mapped as well |
| * (eg added as header to the Camel Message as well). You can turn off this option to disable this. |
| * The headers can still be accessed from the org.apache.camel.component.sparkrest.SparkMessage message with the |
| * method getRequest() that returns the Spark HTTP request instance. |
| */ |
| " |
| 171,0," public int[] getVi() |
| { |
| return this.vi; |
| } |
| " |
| 172,0," public void setUp() throws Exception { |
| int randomInt = new SecureRandom().nextInt(); |
|
|
| String adminAccessToken = testClient.getOAuthAccessToken(""admin"", ""adminsecret"", ""client_credentials"", ""clients.read clients.write clients.secret""); |
|
|
| String scimClientId = ""scim"" + randomInt; |
| testClient.createScimClient(adminAccessToken, scimClientId); |
|
|
| String scimAccessToken = testClient.getOAuthAccessToken(scimClientId, ""scimsecret"", ""client_credentials"", ""scim.read scim.write password.write""); |
|
|
| userEmail = ""user"" + randomInt + ""@example.com""; |
| testClient.createUser(scimAccessToken, userEmail, userEmail, PASSWORD, true); |
| } |
|
|
| @Test |
| " |
| 173,0," public final void invoke(Request request, Response response) |
| throws IOException, ServletException { |
|
|
| |
| Context context = request.getContext(); |
| if (context == null) { |
| response.sendError(HttpServletResponse.SC_INTERNAL_SERVER_ERROR, |
| sm.getString(""standardHost.noContext"")); |
| return; |
| } |
|
|
| if (request.isAsyncSupported()) { |
| request.setAsyncSupported(context.getPipeline().isAsyncSupported()); |
| } |
|
|
| boolean asyncAtStart = request.isAsync(); |
| boolean asyncDispatching = request.isAsyncDispatching(); |
|
|
| try { |
| context.bind(Globals.IS_SECURITY_ENABLED, MY_CLASSLOADER); |
|
|
| if (!asyncAtStart && !context.fireRequestInitEvent(request.getRequest())) { |
| |
| |
| |
| |
| return; |
| } |
|
|
| |
| |
| |
| |
| try { |
| if (!asyncAtStart || asyncDispatching) { |
| context.getPipeline().getFirst().invoke(request, response); |
| } else { |
| |
| |
| if (!response.isErrorReportRequired()) { |
| throw new IllegalStateException(sm.getString(""standardHost.asyncStateError"")); |
| } |
| } |
| } catch (Throwable t) { |
| ExceptionUtils.handleThrowable(t); |
| container.getLogger().error(""Exception Processing "" + request.getRequestURI(), t); |
| |
| |
| if (!response.isErrorReportRequired()) { |
| request.setAttribute(RequestDispatcher.ERROR_EXCEPTION, t); |
| throwable(request, response, t); |
| } |
| } |
|
|
| |
| |
| |
| response.setSuspended(false); |
|
|
| Throwable t = (Throwable) request.getAttribute(RequestDispatcher.ERROR_EXCEPTION); |
|
|
| |
| |
| if (!context.getState().isAvailable()) { |
| return; |
| } |
|
|
| |
| if (response.isErrorReportRequired()) { |
| if (t != null) { |
| throwable(request, response, t); |
| } else { |
| status(request, response); |
| } |
| } |
|
|
| if (!request.isAsync() && !asyncAtStart) { |
| context.fireRequestDestroyEvent(request.getRequest()); |
| } |
| } finally { |
| |
| |
| if (ACCESS_SESSION) { |
| request.getSession(false); |
| } |
|
|
| context.unbind(Globals.IS_SECURITY_ENABLED, MY_CLASSLOADER); |
| } |
| } |
|
|
|
|
| |
|
|
| /** |
| * Handle the HTTP status code (and corresponding message) generated |
| * while processing the specified Request to produce the specified |
| * Response. Any exceptions that occur during generation of the error |
| * report are logged and swallowed. |
| * |
| * @param request The request being processed |
| * @param response The response being generated |
| */ |
| " |
| 174,0," private <T> T run(PrivilegedExceptionAction<T> action) throws Exception { |
| return System.getSecurityManager() != null ? AccessController.doPrivileged( action ) : action.run(); |
| } |
| " |
| 175,0," public void setUp() throws Exception { |
| sshKey = SshdServerMock.generateKeyPair(); |
| System.setProperty(PluginImpl.TEST_SSH_KEYFILE_LOCATION_PROPERTY, sshKey.getPrivateKey().getAbsolutePath()); |
| server = new SshdServerMock(); |
| sshd = SshdServerMock.startServer(server); |
| server.returnCommandFor(""gerrit ls-projects"", SshdServerMock.EofCommandMock.class); |
| server.returnCommandFor(GERRIT_STREAM_EVENTS, SshdServerMock.CommandMock.class); |
| server.returnCommandFor(""gerrit review.*"", SshdServerMock.EofCommandMock.class); |
| server.returnCommandFor(""gerrit version"", SshdServerMock.EofCommandMock.class); |
| } |
|
|
| /** |
| * Runs after test method. |
| * |
| * @throws Exception throw if so. |
| */ |
| @After |
| " |
| 176,0," public boolean getSource_location() { |
| return m_source_location; |
| } |
|
|
| " |
| 177,0," public void setCoyoteRequest(org.apache.coyote.Request coyoteRequest) { |
| this.coyoteRequest = coyoteRequest; |
| inputBuffer.setRequest(coyoteRequest); |
| } |
|
|
| /** |
| * Get the Coyote request. |
| */ |
| " |
| 178,0," public ExpressionInterceptUrlRegistry access(String attribute) { |
| if (not) { |
| attribute = ""!"" + attribute; |
| } |
| interceptUrl(requestMatchers, SecurityConfig.createList(attribute)); |
| return ExpressionUrlAuthorizationConfigurer.this.REGISTRY; |
| } |
| } |
| } |
| " |
| 179,0," private @CheckForNull File getDirectChild(File parentFile, String childPath){ |
| File current = new File(parentFile, childPath); |
| while (current != null && !parentFile.equals(current.getParentFile())) { |
| current = current.getParentFile(); |
| } |
| return current; |
| } |
| } |
|
|
| private static final SoloFilePathFilter UNRESTRICTED = SoloFilePathFilter.wrap(FilePathFilter.UNRESTRICTED); |
| } |
| " |
| 180,0," public static boolean containsExpression(String expr) { |
| return expr.contains(""%{"") && expr.contains(""}""); |
| } |
|
|
| " |
| 181,0," public void derIntegerTest() |
| throws Exception |
| { |
| try |
| { |
| new ASN1Integer(new byte[] { 0, 0, 0, 1}); |
| } |
| catch (IllegalArgumentException e) |
| { |
| isTrue(""wrong exc"", ""malformed integer"".equals(e.getMessage())); |
| } |
|
|
| try |
| { |
| new ASN1Integer(new byte[] {(byte)0xff, (byte)0x80, 0, 1}); |
| } |
| catch (IllegalArgumentException e) |
| { |
| isTrue(""wrong exc"", ""malformed integer"".equals(e.getMessage())); |
| } |
|
|
| try |
| { |
| new ASN1Enumerated(new byte[] { 0, 0, 0, 1}); |
| } |
| catch (IllegalArgumentException e) |
| { |
| isTrue(""wrong exc"", ""malformed enumerated"".equals(e.getMessage())); |
| } |
|
|
| try |
| { |
| new ASN1Enumerated(new byte[] {(byte)0xff, (byte)0x80, 0, 1}); |
| } |
| catch (IllegalArgumentException e) |
| { |
| isTrue(""wrong exc"", ""malformed enumerated"".equals(e.getMessage())); |
| } |
| } |
|
|
| " |
| 182,0," public void cleanUp() { |
| Set<String> names = files.keySet(); |
| for (String name : names) { |
| List<FileItem> items = files.get(name); |
| for (FileItem item : items) { |
| if (LOG.isDebugEnabled()) { |
| String msg = LocalizedTextUtil.findText(this.getClass(), ""struts.messages.removing.file"", |
| Locale.ENGLISH, ""no.message.found"", new Object[]{name, item}); |
| LOG.debug(msg); |
| } |
| if (!item.isInMemory()) { |
| item.delete(); |
| } |
| } |
| } |
| } |
|
|
| " |
| 183,0," protected JDBCTableReader getTableReader(Connection connection, String tableName, EmbeddedDocumentUtil embeddedDocumentUtil) { |
| return new SQLite3TableReader(connection, tableName, embeddedDocumentUtil); |
| } |
| " |
| 184,0," public Character decodeCharacter( PushbackString input ) { |
| input.mark(); |
| Character first = input.next(); |
| if ( first == null ) { |
| input.reset(); |
| return null; |
| } |
|
|
| |
| if (first != '%' ) { |
| input.reset(); |
| return null; |
| } |
|
|
| |
| StringBuilder sb = new StringBuilder(); |
| for ( int i=0; i<2; i++ ) { |
| Character c = input.nextHex(); |
| if ( c != null ) sb.append( c ); |
| } |
| if ( sb.length() == 2 ) { |
| try { |
| |
| int i = Integer.parseInt(sb.toString(), 16); |
| if (Character.isValidCodePoint(i)) { |
| return (char) i; |
| } |
| } catch( NumberFormatException ignored ) { } |
| } |
| input.reset(); |
| return null; |
| } |
|
|
| " |
| 185,0," public String getPathname() { |
|
|
| return pathname; |
|
|
| } |
|
|
|
|
| /** |
| * Set the pathname of our XML file containing user definitions. If a |
| * relative pathname is specified, it is resolved against ""catalina.base"". |
| * |
| * @param pathname The new pathname |
| */ |
| " |
| 186,0," public boolean isSecureProcessing() |
| { |
| return m_isSecureProcessing; |
| } |
| " |
| 187,0," public void write(OutputStream outputStream) |
| throws IOException, WebApplicationException { |
| Writer writer = new OutputStreamWriter(outputStream, UTF_8); |
| ContentHandler content; |
|
|
| try { |
| SAXTransformerFactory factory = (SAXTransformerFactory) SAXTransformerFactory.newInstance(); |
| TransformerHandler handler = factory.newTransformerHandler(); |
| handler.getTransformer().setOutputProperty(OutputKeys.METHOD, format); |
| handler.getTransformer().setOutputProperty(OutputKeys.INDENT, ""yes""); |
| handler.getTransformer().setOutputProperty(OutputKeys.ENCODING, UTF_8.name()); |
| handler.setResult(new StreamResult(writer)); |
| content = new ExpandedTitleContentHandler(handler); |
| } catch (TransformerConfigurationException e) { |
| throw new WebApplicationException(e); |
| } |
|
|
| parse(parser, LOG, info.getPath(), is, content, metadata, context); |
| } |
| }; |
| } |
| } |
| " |
| 188,0," private boolean isSameAs( |
| byte[] a, |
| byte[] b) |
| { |
| if (a.length != b.length) |
| { |
| return false; |
| } |
| |
| for (int i = 0; i != a.length; i++) |
| { |
| if (a[i] != b[i]) |
| { |
| return false; |
| } |
| } |
| |
| return true; |
| } |
|
|
| " |
| 189,0," private void testModified() |
| throws Exception |
| { |
| KeyFactory kFact = KeyFactory.getInstance(""DSA"", ""BC""); |
| PublicKey pubKey = kFact.generatePublic(PUBLIC_KEY); |
| Signature sig = Signature.getInstance(""DSA"", ""BC""); |
|
|
| for (int i = 0; i != MODIFIED_SIGNATURES.length; i++) |
| { |
| sig.initVerify(pubKey); |
|
|
| sig.update(Strings.toByteArray(""Hello"")); |
|
|
| boolean failed; |
|
|
| try |
| { |
| failed = !sig.verify(Hex.decode(MODIFIED_SIGNATURES[i])); |
| } |
| catch (SignatureException e) |
| { |
| failed = true; |
| } |
|
|
| isTrue(""sig verified when shouldn't"", failed); |
| } |
| } |
|
|
| " |
| 190,0," public LockoutPolicyRetriever getLockoutPolicyRetriever() { |
| return lockoutPolicyRetriever; |
| } |
| " |
| 191,0," public void close() throws IOException { |
| if (!closed) { |
| synchronized (this) { |
| if (!closed) { |
| closed = true; |
| socket.close(); |
| } |
| } |
| } |
| } |
|
|
| " |
| 192,0," protected abstract void recycleInternal(); |
| " |
| 193,0," public static JWTDecoder getInstance() { |
| if (instance == null) { |
| instance = new JWTDecoder(); |
| } |
|
|
| return instance; |
| } |
|
|
| /** |
| * Decode the JWT using one of they provided verifiers. One more verifiers may be provided, the first verifier found |
| * supporting the algorithm reported by the JWT header will be utilized. |
| * <p> |
| * A JWT that is expired or not yet valid will not be decoded, instead a {@link JWTExpiredException} or {@link |
| * JWTUnavailableForProcessingException} exception will be thrown respectively. |
| * |
| * @param encodedJWT The encoded JWT in string format. |
| * @param verifiers A map of verifiers. |
| * @return a decoded JWT. |
| */ |
| " |
| 194,0," public boolean check(String path, Resource resource) |
| { |
| int slash = path.lastIndexOf('/'); |
| if (slash<0 || resource.exists()) |
| return false; |
| String suffix=path.substring(slash); |
| return resource.getAlias().toString().endsWith(suffix); |
| } |
| } |
| } |
| " |
| 195,0," public void setMaxParameterCount(int maxParameterCount) { |
| this.maxParameterCount = maxParameterCount; |
| } |
|
|
|
|
| /** |
| * Return the maximum size of a POST which will be automatically |
| * parsed by the container. |
| */ |
| " |
| 196,0," protected boolean requiresAuthentication(final HttpServletRequest request, final HttpServletResponse response) { |
| boolean result = request.getRequestURI().contains(getFilterProcessesUrl()); |
| result |= isTokenExpired(); |
| if (logger.isDebugEnabled()) { |
| logger.debug(""requiresAuthentication = "" + result); |
| } |
| return result; |
| } |
| |
| " |
| 197,0," public JettyContentExchange createContentExchange() { |
| return new JettyContentExchange9(); |
| } |
| " |
| 198,0," protected void populateResponse(Exchange exchange, JettyContentExchange httpExchange, |
| Message in, HeaderFilterStrategy strategy, int responseCode) throws IOException { |
| Message answer = exchange.getOut(); |
|
|
| answer.setHeader(Exchange.HTTP_RESPONSE_CODE, responseCode); |
|
|
| // must use response fields to get the http headers as |
| // httpExchange.getHeaders() does not work well with multi valued headers |
| Map<String, Collection<String>> headers = httpExchange.getResponseHeaders(); |
| for (Map.Entry<String, Collection<String>> ent : headers.entrySet()) { |
| String name = ent.getKey(); |
| Collection<String> values = ent.getValue(); |
| for (String value : values) { |
| if (name.toLowerCase().equals(""content-type"")) { |
| name = Exchange.CONTENT_TYPE; |
| exchange.setProperty(Exchange.CHARSET_NAME, IOHelper.getCharsetNameFromContentType(value)); |
| } |
| if (strategy != null && !strategy.applyFilterToExternalHeaders(name, value, exchange)) { |
| HttpHelper.appendHeader(answer.getHeaders(), name, value); |
| } |
| } |
| } |
| |
| // preserve headers from in by copying any non existing headers |
| // to avoid overriding existing headers with old values |
| // We also need to apply the httpProtocolHeaderFilterStrategy to filter the http protocol header |
| MessageHelper.copyHeaders(exchange.getIn(), answer, httpProtocolHeaderFilterStrategy, false); |
|
|
| // extract body after headers has been set as we want to ensure content-type from Jetty HttpExchange |
| // has been populated first |
| answer.setBody(extractResponseBody(exchange, httpExchange)); |
| } |
|
|
| " |
| 199,0," protected boolean isAuthorizedToSwitchToIdentityZone(String identityZoneId) { |
| Authentication authentication = SecurityContextHolder.getContext().getAuthentication(); |
| boolean hasScope = OAuth2ExpressionUtils.hasAnyScope(authentication, getZoneSwitchingScopes(identityZoneId)); |
| boolean isUaa = IdentityZoneHolder.isUaa(); |
| boolean isTokenAuth = (authentication instanceof OAuth2Authentication); |
| return isTokenAuth && isUaa && hasScope; |
| } |
|
|
| " |
| 200,0," protected static void copyBytes(byte[] b, int dest, int src, int len) { |
| for (int pos = 0; pos < len; pos++) { |
| b[pos + dest] = b[pos + src]; |
| } |
| } |
|
|
|
|
| " |
| 201,0," public String getSessionId() |
| throws IOException { |
| // Look up the current SSLSession |
| SSLSession session = ssl.getSession(); |
| if (session == null) |
| return null; |
| // Expose ssl_session (getId) |
| byte [] ssl_session = session.getId(); |
| if ( ssl_session == null) |
| return null; |
| StringBuffer buf=new StringBuffer(""""); |
| for(int x=0; x<ssl_session.length; x++) { |
| String digit=Integer.toHexString((int)ssl_session[x]); |
| if (digit.length()<2) buf.append('0'); |
| if (digit.length()>2) digit=digit.substring(digit.length()-2); |
| buf.append(digit); |
| } |
| return buf.toString(); |
| } |
|
|
|
|
| " |
| 202,0," private void login(String clientId) throws Exception { |
| getMockMvc().perform(post(""/oauth/token"") |
| .accept(MediaType.APPLICATION_JSON_VALUE) |
| .header(""Authorization"", ""Basic "" + new String(Base64.encode((clientId + "":"" + SECRET).getBytes()))) |
| .param(""grant_type"", ""client_credentials"") |
| ) |
| .andExpect(status().isOk()) |
| .andReturn().getResponse().getContentAsString(); |
| } |
|
|
| @Test |
| " |
| 203,0," public abstract JettyContentExchange createContentExchange(); |
|
|
| " |
| 204,0," public void testParameterNameAware() { |
| ParametersInterceptor pi = createParametersInterceptor(); |
| final Map actual = injectValueStackFactory(pi); |
| ValueStack stack = createStubValueStack(actual); |
| final Map expected = new HashMap() { |
| { |
| put(""fooKey"", ""fooValue""); |
| put(""barKey"", ""barValue""); |
| } |
| }; |
| Object a = new ParameterNameAware() { |
| public boolean acceptableParameterName(String parameterName) { |
| return expected.containsKey(parameterName); |
| } |
| }; |
| Map parameters = new HashMap() { |
| { |
| put(""fooKey"", ""fooValue""); |
| put(""barKey"", ""barValue""); |
| put(""error"", ""error""); |
| } |
| }; |
| pi.setParameters(a, stack, parameters); |
| assertEquals(expected, actual); |
| } |
|
|
| " |
| 205,0," protected CloseButtonBehavior newCloseButtonBehavior() |
| { |
| return new CloseButtonBehavior(); |
| } |
| " |
| 206,0," public void repositoryVerificationTimeoutTest() throws Exception { |
| Client client = client(); |
|
|
| Settings settings = ImmutableSettings.settingsBuilder() |
| .put(""location"", randomRepoPath()) |
| .put(""random_control_io_exception_rate"", 1.0).build(); |
| logger.info(""--> creating repository that cannot write any files - should fail""); |
| assertThrows(client.admin().cluster().preparePutRepository(""test-repo-1"") |
| .setType(MockRepositoryModule.class.getCanonicalName()).setSettings(settings), |
| RepositoryVerificationException.class); |
|
|
| logger.info(""--> creating repository that cannot write any files, but suppress verification - should be acked""); |
| assertAcked(client.admin().cluster().preparePutRepository(""test-repo-1"") |
| .setType(MockRepositoryModule.class.getCanonicalName()).setSettings(settings).setVerify(false)); |
|
|
| logger.info(""--> verifying repository""); |
| assertThrows(client.admin().cluster().prepareVerifyRepository(""test-repo-1""), RepositoryVerificationException.class); |
|
|
| File location = randomRepoPath(); |
|
|
| logger.info(""--> creating repository""); |
| try { |
| client.admin().cluster().preparePutRepository(""test-repo-1"") |
| .setType(MockRepositoryModule.class.getCanonicalName()) |
| .setSettings(ImmutableSettings.settingsBuilder() |
| .put(""location"", location) |
| .put(""localize_location"", true) |
| ).get(); |
| fail(""RepositoryVerificationException wasn't generated""); |
| } catch (RepositoryVerificationException ex) { |
| assertThat(ex.getMessage(), containsString(""is not shared"")); |
| } |
| } |
|
|
| " |
| 207,0," private static void log( String s ) { |
| if (log.isDebugEnabled()) |
| log.debug(""URLDecoder: "" + s ); |
| } |
|
|
| " |
| 208,0," private boolean evaluate(String text) { |
| try { |
| InputSource inputSource = new InputSource(new StringReader(text)); |
| Document inputDocument = builder.parse(inputSource); |
| return ((Boolean)xpath.evaluate(xpathExpression, inputDocument, XPathConstants.BOOLEAN)).booleanValue(); |
| } catch (Exception e) { |
| return false; |
| } |
| } |
|
|
| @Override |
| " |
| 209,0," public void basicWorkFlowTest() throws Exception { |
| Client client = client(); |
|
|
| logger.info(""--> creating repository""); |
| assertAcked(client.admin().cluster().preparePutRepository(""test-repo"") |
| .setType(""fs"").setSettings(ImmutableSettings.settingsBuilder() |
| .put(""location"", randomRepoPath()) |
| .put(""compress"", randomBoolean()) |
| .put(""chunk_size"", randomIntBetween(100, 1000)))); |
|
|
| createIndex(""test-idx-1"", ""test-idx-2"", ""test-idx-3""); |
| ensureGreen(); |
|
|
| logger.info(""--> indexing some data""); |
| for (int i = 0; i < 100; i++) { |
| index(""test-idx-1"", ""doc"", Integer.toString(i), ""foo"", ""bar"" + i); |
| index(""test-idx-2"", ""doc"", Integer.toString(i), ""foo"", ""baz"" + i); |
| index(""test-idx-3"", ""doc"", Integer.toString(i), ""foo"", ""baz"" + i); |
| } |
| refresh(); |
| assertHitCount(client.prepareCount(""test-idx-1"").get(), 100L); |
| assertHitCount(client.prepareCount(""test-idx-2"").get(), 100L); |
| assertHitCount(client.prepareCount(""test-idx-3"").get(), 100L); |
|
|
| ListenableActionFuture<FlushResponse> flushResponseFuture = null; |
| if (randomBoolean()) { |
| ArrayList<String> indicesToFlush = newArrayList(); |
| for (int i = 1; i < 4; i++) { |
| if (randomBoolean()) { |
| indicesToFlush.add(""test-idx-"" + i); |
| } |
| } |
| if (!indicesToFlush.isEmpty()) { |
| String[] indices = indicesToFlush.toArray(new String[indicesToFlush.size()]); |
| logger.info(""--> starting asynchronous flush for indices {}"", Arrays.toString(indices)); |
| flushResponseFuture = client.admin().indices().prepareFlush(indices).execute(); |
| } |
| } |
| logger.info(""--> snapshot""); |
| CreateSnapshotResponse createSnapshotResponse = client.admin().cluster().prepareCreateSnapshot(""test-repo"", ""test-snap"").setWaitForCompletion(true).setIndices(""test-idx-*"", ""-test-idx-3"").get(); |
| assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), greaterThan(0)); |
| assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), equalTo(createSnapshotResponse.getSnapshotInfo().totalShards())); |
|
|
| assertThat(client.admin().cluster().prepareGetSnapshots(""test-repo"").setSnapshots(""test-snap"").get().getSnapshots().get(0).state(), equalTo(SnapshotState.SUCCESS)); |
|
|
| logger.info(""--> delete some data""); |
| for (int i = 0; i < 50; i++) { |
| client.prepareDelete(""test-idx-1"", ""doc"", Integer.toString(i)).get(); |
| } |
| for (int i = 50; i < 100; i++) { |
| client.prepareDelete(""test-idx-2"", ""doc"", Integer.toString(i)).get(); |
| } |
| for (int i = 0; i < 100; i += 2) { |
| client.prepareDelete(""test-idx-3"", ""doc"", Integer.toString(i)).get(); |
| } |
| refresh(); |
| assertHitCount(client.prepareCount(""test-idx-1"").get(), 50L); |
| assertHitCount(client.prepareCount(""test-idx-2"").get(), 50L); |
| assertHitCount(client.prepareCount(""test-idx-3"").get(), 50L); |
|
|
| logger.info(""--> close indices""); |
| client.admin().indices().prepareClose(""test-idx-1"", ""test-idx-2"").get(); |
|
|
| logger.info(""--> restore all indices from the snapshot""); |
| RestoreSnapshotResponse restoreSnapshotResponse = client.admin().cluster().prepareRestoreSnapshot(""test-repo"", ""test-snap"").setWaitForCompletion(true).execute().actionGet(); |
| assertThat(restoreSnapshotResponse.getRestoreInfo().totalShards(), greaterThan(0)); |
|
|
| ensureGreen(); |
| for (int i=0; i<5; i++) { |
| assertHitCount(client.prepareCount(""test-idx-1"").get(), 100L); |
| assertHitCount(client.prepareCount(""test-idx-2"").get(), 100L); |
| assertHitCount(client.prepareCount(""test-idx-3"").get(), 50L); |
| } |
|
|
| |
| logger.info(""--> delete indices""); |
| cluster().wipeIndices(""test-idx-1"", ""test-idx-2""); |
| logger.info(""--> restore one index after deletion""); |
| restoreSnapshotResponse = client.admin().cluster().prepareRestoreSnapshot(""test-repo"", ""test-snap"").setWaitForCompletion(true).setIndices(""test-idx-*"", ""-test-idx-2"").execute().actionGet(); |
| assertThat(restoreSnapshotResponse.getRestoreInfo().totalShards(), greaterThan(0)); |
|
|
| ensureGreen(); |
| for (int i=0; i<5; i++) { |
| assertHitCount(client.prepareCount(""test-idx-1"").get(), 100L); |
| } |
| ClusterState clusterState = client.admin().cluster().prepareState().get().getState(); |
| assertThat(clusterState.getMetaData().hasIndex(""test-idx-1""), equalTo(true)); |
| assertThat(clusterState.getMetaData().hasIndex(""test-idx-2""), equalTo(false)); |
|
|
| if (flushResponseFuture != null) { |
| |
| flushResponseFuture.actionGet(); |
| } |
| } |
|
|
|
|
| @Test |
| " |
| 210,0," public ReturnValueDescriptor asDescriptor(boolean defaultGroupSequenceRedefined, List<Class<?>> defaultGroupSequence) { |
| return new ReturnValueDescriptorImpl( |
| getType(), |
| asDescriptors( getConstraints() ), |
| isCascading(), |
| defaultGroupSequenceRedefined, |
| defaultGroupSequence, |
| groupConversionHelper.asDescriptors() |
| ); |
| } |
| " |
| 211,0," static final PyObject function___new__(PyNewWrapper new_, boolean init, PyType subtype, |
| PyObject[] args, String[] keywords) { |
| ArgParser ap = new ArgParser(""function"", args, keywords, |
| new String[] {""code"", ""globals"", ""name"", ""argdefs"", |
| ""closure""}, 0); |
| PyObject code = ap.getPyObject(0); |
| PyObject globals = ap.getPyObject(1); |
| PyObject name = ap.getPyObject(2, Py.None); |
| PyObject defaults = ap.getPyObject(3, Py.None); |
| PyObject closure = ap.getPyObject(4, Py.None); |
|
|
| if (!(code instanceof PyBaseCode)) { |
| throw Py.TypeError(""function() argument 1 must be code, not "" + |
| code.getType().fastGetName()); |
| } |
| if (name != Py.None && !Py.isInstance(name, PyString.TYPE)) { |
| throw Py.TypeError(""arg 3 (name) must be None or string""); |
| } |
| if (defaults != Py.None && !(defaults instanceof PyTuple)) { |
| throw Py.TypeError(""arg 4 (defaults) must be None or tuple""); |
| } |
|
|
| PyBaseCode tcode = (PyBaseCode)code; |
| int nfree = tcode.co_freevars == null ? 0 : tcode.co_freevars.length; |
| if (!(closure instanceof PyTuple)) { |
| if (nfree > 0 && closure == Py.None) { |
| throw Py.TypeError(""arg 5 (closure) must be tuple""); |
| } else if (closure != Py.None) { |
| throw Py.TypeError(""arg 5 (closure) must be None or tuple""); |
| } |
| } |
|
|
| int nclosure = closure == Py.None ? 0 : closure.__len__(); |
| if (nfree != nclosure) { |
| throw Py.ValueError(String.format(""%s requires closure of length %d, not %d"", |
| tcode.co_name, nfree, nclosure)); |
| } |
| if (nclosure > 0) { |
| for (PyObject o : ((PyTuple)closure).asIterable()) { |
| if (!(o instanceof PyCell)) { |
| throw Py.TypeError(String.format(""arg 5 (closure) expected cell, found %s"", |
| o.getType().fastGetName())); |
| } |
| } |
| } |
|
|
| PyFunction function = new PyFunction(globals, |
| defaults == Py.None |
| ? null : ((PyTuple)defaults).getArray(), |
| tcode, null, |
| closure == Py.None |
| ? null : ((PyTuple)closure).getArray()); |
| if (name != Py.None) { |
| function.__name__ = name.toString(); |
| } |
| return function; |
| } |
|
|
| @ExposedSet(name = ""__name__"") |
| " |
| 212,0," private static byte[] toUtf8Bytes(String str) |
| { |
| try |
| { |
| return str.getBytes(""UTF-8""); |
| } |
| catch(UnsupportedEncodingException e) |
| { |
| throw new IllegalStateException(""The Java spec requires UTF-8 support."", e); |
| } |
| } |
|
|
| /** |
| * Append the two upper case hex characters for a byte. |
| * @param sb The string buffer to append to. |
| * @param b The byte to hexify |
| * @return sb with the hex characters appended. |
| */ |
| |
| |
| |
| " |
| 213,0," void getElUnsupported(String expression); |
|
|
| " |
| 214,0," public String toString() { |
| return xpathExpression; |
| } |
| " |
| 215,0," public Descriptor<Cloud> getDescriptor() { |
| throw new UnsupportedOperationException(); |
| } |
| } |
| } |
| " |
| 216,1," public void getAllPropertiesRequiresAdmin() { |
| j.jenkins.setAuthorizationStrategy(new MockAuthorizationStrategy() |
| .grant(Jenkins.ADMINISTER).everywhere().to(""admin"") |
| .grant(Jenkins.READ).everywhere().toEveryone()); |
| j.jenkins.setSecurityRealm(j.createDummySecurityRealm()); |
|
|
| User admin = User.get(""admin""); |
| User alice = User.get(""alice""); |
| User bob = User.get(""bob""); |
|
|
| |
| try (ACLContext as = ACL.as(admin)) { |
| assertThat(alice.getAllProperties(), not(empty())); |
| assertThat(bob.getAllProperties(), not(empty())); |
| assertThat(admin.getAllProperties(), not(empty())); |
| } |
|
|
| |
| try (ACLContext as = ACL.as(alice)) { |
| assertThat(alice.getAllProperties(), not(empty())); |
| assertThat(bob.getAllProperties(), empty()); |
| assertThat(admin.getAllProperties(), empty()); |
| } |
| } |
|
|
| " |
| 217,1," protected <P> P postProcess(P object) { |
| return (P) this.objectPostProcessor.postProcess(object); |
| } |
|
|
| /** |
| * Executes the build using the {@link SecurityConfigurer}'s that have been applied |
| * using the following steps: |
| * |
| * <ul> |
| * <li>Invokes {@link #beforeInit()} for any subclass to hook into</li> |
| * <li>Invokes {@link SecurityConfigurer#init(SecurityBuilder)} for any |
| * {@link SecurityConfigurer} that was applied to this builder.</li> |
| * <li>Invokes {@link #beforeConfigure()} for any subclass to hook into</li> |
| * <li>Invokes {@link #performBuild()} which actually builds the Object</li> |
| * </ul> |
| */ |
| @Override |
| " |
| 218,1," public SAXSource toSAXSourceFromStream(StreamSource source, Exchange exchange) throws SAXException { |
| InputSource inputSource; |
| if (source.getReader() != null) { |
| inputSource = new InputSource(source.getReader()); |
| } else { |
| inputSource = new InputSource(source.getInputStream()); |
| } |
| inputSource.setSystemId(source.getSystemId()); |
| inputSource.setPublicId(source.getPublicId()); |
| XMLReader xmlReader = null; |
| SAXParserFactory sfactory = null; |
| //Need to setup XMLReader security feature by default |
| try { |
| // use the SAXPaserFactory which is set from exchange |
| if (exchange != null) { |
| sfactory = exchange.getProperty(Exchange.SAXPARSER_FACTORY, SAXParserFactory.class); |
| } |
| if (sfactory == null) { |
| sfactory = SAXParserFactory.newInstance(); |
| try { |
| sfactory.setFeature(javax.xml.XMLConstants.FEATURE_SECURE_PROCESSING, true); |
| } catch (Exception e) { |
| LOG.warn(""SAXParser doesn't support the feature {} with value {}, due to {}."", new Object[]{javax.xml.XMLConstants.FEATURE_SECURE_PROCESSING, ""true"", e}); |
| } |
| } |
| sfactory.setNamespaceAware(true); |
| SAXParser parser = sfactory.newSAXParser(); |
| xmlReader = parser.getXMLReader(); |
| } catch (Exception ex) { |
| LOG.warn(""Cannot create the SAXParser XMLReader, due to {}"", ex); |
| } |
| return new SAXSource(xmlReader, inputSource); |
| } |
|
|
| /** |
| * @deprecated will be removed in Camel 3.0. Use the method which has 2 parameters. |
| */ |
| @Deprecated |
| " |
| 219,1," public String getDisplayName() { |
| return Messages.CommandLauncher_displayName(); |
| } |
| } |
| } |
| " |
| 220,1," public SSOValidatorResponse validateSamlResponse( |
| org.opensaml.saml.saml2.core.Response samlResponse, |
| boolean postBinding |
| ) throws WSSecurityException { |
| |
| validateIssuer(samlResponse.getIssuer()); |
|
|
| |
| if (samlResponse.getAssertions() == null || samlResponse.getAssertions().isEmpty()) { |
| LOG.fine(""The Response must contain at least one Assertion""); |
| throw new WSSecurityException(WSSecurityException.ErrorCode.FAILURE, ""invalidSAMLsecurity""); |
| } |
| |
| |
| |
| String destination = samlResponse.getDestination(); |
| if (samlResponse.isSigned() |
| && (destination == null || !destination.equals(assertionConsumerURL))) { |
| LOG.fine(""The Response must contain a destination that matches the assertion consumer URL""); |
| throw new WSSecurityException(WSSecurityException.ErrorCode.FAILURE, ""invalidSAMLsecurity""); |
| } |
| |
| |
| boolean foundValidSubject = false; |
| Date sessionNotOnOrAfter = null; |
| for (org.opensaml.saml.saml2.core.Assertion assertion : samlResponse.getAssertions()) { |
| |
| if (assertion.getIssuer() == null) { |
| LOG.fine(""Assertion Issuer must not be null""); |
| throw new WSSecurityException(WSSecurityException.ErrorCode.FAILURE, ""invalidSAMLsecurity""); |
| } |
| validateIssuer(assertion.getIssuer()); |
| |
| if (enforceAssertionsSigned && postBinding && assertion.getSignature() == null) { |
| LOG.fine(""If the HTTP Post binding is used to deliver the Response, "" |
| + ""the enclosed assertions must be signed""); |
| throw new WSSecurityException(WSSecurityException.ErrorCode.FAILURE, ""invalidSAMLsecurity""); |
| } |
| |
| |
| if (assertion.getAuthnStatements() != null |
| && !assertion.getAuthnStatements().isEmpty()) { |
| org.opensaml.saml.saml2.core.Subject subject = assertion.getSubject(); |
| if (validateAuthenticationSubject(subject, assertion.getID(), postBinding)) { |
| validateAudienceRestrictionCondition(assertion.getConditions()); |
| foundValidSubject = true; |
| |
| for (AuthnStatement authnStatment : assertion.getAuthnStatements()) { |
| if (authnStatment.getSessionNotOnOrAfter() != null) { |
| sessionNotOnOrAfter = authnStatment.getSessionNotOnOrAfter().toDate(); |
| } |
| } |
| } |
| } |
| |
| } |
| |
| if (!foundValidSubject) { |
| LOG.fine(""The Response did not contain any Authentication Statement that matched "" |
| + ""the Subject Confirmation criteria""); |
| throw new WSSecurityException(WSSecurityException.ErrorCode.FAILURE, ""invalidSAMLsecurity""); |
| } |
| |
| SSOValidatorResponse validatorResponse = new SSOValidatorResponse(); |
| validatorResponse.setResponseId(samlResponse.getID()); |
| validatorResponse.setSessionNotOnOrAfter(sessionNotOnOrAfter); |
| if (samlResponse.getIssueInstant() != null) { |
| validatorResponse.setCreated(samlResponse.getIssueInstant().toDate()); |
| } |
| |
| |
| Element assertionElement = samlResponse.getAssertions().get(0).getDOM(); |
| Element clonedAssertionElement = (Element)assertionElement.cloneNode(true); |
| validatorResponse.setAssertionElement(clonedAssertionElement); |
| validatorResponse.setAssertion(DOM2Writer.nodeToString(clonedAssertionElement)); |
| |
| return validatorResponse; |
| } |
| |
| /** |
| * Validate the Issuer (if it exists) |
| */ |
| " |
| 221,1," private JWT decode(String encodedJWT, Header header, String[] parts, Verifier verifier) { |
| int index = encodedJWT.lastIndexOf("".""); |
| |
| byte[] message = encodedJWT.substring(0, index).getBytes(StandardCharsets.UTF_8); |
|
|
| |
| if (parts.length == 3 && verifier == null) { |
| throw new MissingVerifierException(""No Verifier has been provided for verify a signature signed using ["" + header.algorithm.getName() + ""]""); |
| } |
|
|
| |
| if (parts.length == 2 && verifier != null) { |
| throw new InvalidJWTSignatureException(); |
| } |
|
|
| if (parts.length == 3) { |
| |
| byte[] signature = base64Decode(parts[2].getBytes(StandardCharsets.UTF_8)); |
| verifier.verify(header.algorithm, message, signature); |
| } |
|
|
| JWT jwt = Mapper.deserialize(base64Decode(parts[1].getBytes(StandardCharsets.UTF_8)), JWT.class); |
|
|
| |
| if (jwt.isExpired()) { |
| throw new JWTExpiredException(); |
| } |
|
|
| |
| if (jwt.isUnavailableForProcessing()) { |
| throw new JWTUnavailableForProcessingException(); |
| } |
|
|
| return jwt; |
| } |
|
|
| " |
| 222,1," String postProcessVariableName(String variableName) { |
| return this.matcher.postProcessVariableName(variableName); |
| } |
| } |
|
|
| } |
| " |
| 223,1," public String toString() { |
|
|
| StringBuilder sb = new StringBuilder(""<user username=\""""); |
| sb.append(RequestUtil.filter(username)); |
| sb.append(""\"" password=\""""); |
| sb.append(RequestUtil.filter(password)); |
| sb.append(""\""""); |
| if (fullName != null) { |
| sb.append("" fullName=\""""); |
| sb.append(RequestUtil.filter(fullName)); |
| sb.append(""\""""); |
| } |
| synchronized (groups) { |
| if (groups.size() > 0) { |
| sb.append("" groups=\""""); |
| int n = 0; |
| Iterator<Group> values = groups.iterator(); |
| while (values.hasNext()) { |
| if (n > 0) { |
| sb.append(','); |
| } |
| n++; |
| sb.append(RequestUtil.filter(values.next().getGroupname())); |
| } |
| sb.append(""\""""); |
| } |
| } |
| synchronized (roles) { |
| if (roles.size() > 0) { |
| sb.append("" roles=\""""); |
| int n = 0; |
| Iterator<Role> values = roles.iterator(); |
| while (values.hasNext()) { |
| if (n > 0) { |
| sb.append(','); |
| } |
| n++; |
| sb.append(RequestUtil.filter(values.next().getRolename())); |
| } |
| sb.append(""\""""); |
| } |
| } |
| sb.append(""/>""); |
| return (sb.toString()); |
|
|
| } |
|
|
|
|
| " |
| 224,1," public void processParameters( String str ) { |
| int end=str.length(); |
| int pos=0; |
| if( debug > 0) |
| log(""String: "" + str ); |
| |
| do { |
| boolean noEq=false; |
| int valStart=-1; |
| int valEnd=-1; |
| |
| int nameStart=pos; |
| int nameEnd=str.indexOf('=', nameStart ); |
| int nameEnd2=str.indexOf('&', nameStart ); |
| if( nameEnd2== -1 ) nameEnd2=end; |
| if( (nameEnd2!=-1 ) && |
| ( nameEnd==-1 || nameEnd > nameEnd2) ) { |
| nameEnd=nameEnd2; |
| noEq=true; |
| valStart=nameEnd; |
| valEnd=nameEnd; |
| if(debug>0) log(""no equal "" + nameStart + "" "" + nameEnd + "" "" + |
| str.substring(nameStart, nameEnd)); |
| } |
|
|
| if( nameEnd== -1 ) nameEnd=end; |
|
|
| if( ! noEq ) { |
| valStart=nameEnd+1; |
| valEnd=str.indexOf('&', valStart); |
| if( valEnd== -1 ) valEnd = (valStart < end) ? end : valStart; |
| } |
| |
| pos=valEnd+1; |
| |
| if( nameEnd<=nameStart ) { |
| continue; |
| } |
| if( debug>0) |
| log( ""XXX "" + nameStart + "" "" + nameEnd + "" "" |
| + valStart + "" "" + valEnd ); |
| |
| try { |
| tmpNameC.append(str, nameStart, nameEnd-nameStart ); |
| tmpValueC.append(str, valStart, valEnd-valStart ); |
| |
| if( debug > 0 ) |
| log( tmpNameC + ""= "" + tmpValueC); |
|
|
| if( urlDec==null ) { |
| urlDec=new UDecoder(); |
| } |
|
|
| urlDec.convert( tmpNameC ); |
| urlDec.convert( tmpValueC ); |
|
|
| if( debug > 0 ) |
| log( tmpNameC + ""= "" + tmpValueC); |
| |
| addParam( tmpNameC.toString(), tmpValueC.toString() ); |
| } catch( IOException ex ) { |
| ex.printStackTrace(); |
| } |
|
|
| tmpNameC.recycle(); |
| tmpValueC.recycle(); |
|
|
| } while( pos<end ); |
| } |
|
|
|
|
| " |
| 225,1," public final void recycle() { |
| try { |
| |
| while (ready()) { |
| |
| read(); |
| } |
| } catch(IOException ioe){ |
| } |
| } |
| } |
|
|
|
|
| /** Special output stream where close() is overriden, so super.close() |
| is never called. |
| |
| This allows recycling. It can also be disabled, so callbacks will |
| not be called if recycling the converter and if data was not flushed. |
| */ |
| final class IntermediateInputStream extends InputStream { |
| ByteChunk bc = null; |
| boolean initialized = false; |
| |
| public IntermediateInputStream() { |
| } |
| |
| public final void close() throws IOException { |
| |
| throw new IOException(""close() called - shouldn't happen ""); |
| } |
| |
| public final int read(byte cbuf[], int off, int len) throws IOException { |
| if (!initialized) return -1; |
| int nread = bc.substract(cbuf, off, len); |
| return nread; |
| } |
| |
| public final int read() throws IOException { |
| if (!initialized) return -1; |
| return bc.substract(); |
| } |
| |
| public int available() throws IOException { |
| if (!initialized) return 0; |
| return bc.getLength(); |
| } |
|
|
|
|
| // -------------------- Internal methods -------------------- |
|
|
|
|
| void setByteChunk( ByteChunk mb ) { |
| initialized = (mb!=null); |
| bc = mb; |
| } |
|
|
| " |
| 226,1," public void resetPassword_ReturnsUnprocessableEntity_NewPasswordSameAsOld() throws Exception { |
| ScimUserProvisioning userProvisioning = getWebApplicationContext().getBean(ScimUserProvisioning.class); |
| List<ScimUser> users = userProvisioning.query(""username eq \""marissa\""""); |
| assertNotNull(users); |
| assertEquals(1, users.size()); |
| ScimUser user = users.get(0); |
|
|
| ExpiringCode code = codeStore.generateCode(user.getId(), new Timestamp(System.currentTimeMillis() + UaaResetPasswordService.PASSWORD_RESET_LIFETIME), null); |
| getMockMvc().perform(createChangePasswordRequest(user, code, true, ""d3faultPasswd"", ""d3faultPasswd"")); |
|
|
| code = codeStore.generateCode(user.getId(), new Timestamp(System.currentTimeMillis() + UaaResetPasswordService.PASSWORD_RESET_LIFETIME), null); |
| getMockMvc().perform(createChangePasswordRequest(user, code, true, ""d3faultPasswd"", ""d3faultPasswd"")) |
| .andExpect(status().isUnprocessableEntity()) |
| .andExpect(view().name(""forgot_password"")) |
| .andExpect(model().attribute(""message"", ""Your new password cannot be the same as the old password."")); |
| } |
|
|
| " |
| 227,1," public void recycle() { |
| if (buffered.getBuffer().length > 65536) { |
| buffered = null; |
| } else { |
| buffered.recycle(); |
| } |
| tempRead.recycle(); |
| hasRead = false; |
| buffer = null; |
| } |
|
|
| " |
| 228,1," public XMLLoader init(SolrParams args) { |
| inputFactory = XMLInputFactory.newInstance(); |
| try { |
| // The java 1.6 bundled stax parser (sjsxp) does not currently have a thread-safe |
| // XMLInputFactory, as that implementation tries to cache and reuse the |
| // XMLStreamReader. Setting the parser-specific ""reuse-instance"" property to false |
| // prevents this. |
| // All other known open-source stax parsers (and the bea ref impl) |
| // have thread-safe factories. |
| inputFactory.setProperty(""reuse-instance"", Boolean.FALSE); |
| } |
| catch (IllegalArgumentException ex) { |
| // Other implementations will likely throw this exception since ""reuse-instance"" |
| // isimplementation specific. |
| log.debug(""Unable to set the 'reuse-instance' property for the input chain: "" + inputFactory); |
| } |
| inputFactory.setXMLReporter(xmllog); |
| |
| xsltCacheLifetimeSeconds = XSLT_CACHE_DEFAULT; |
| if(args != null) { |
| xsltCacheLifetimeSeconds = args.getInt(XSLT_CACHE_PARAM,XSLT_CACHE_DEFAULT); |
| log.info(""xsltCacheLifetimeSeconds="" + xsltCacheLifetimeSeconds); |
| } |
| return this; |
| } |
|
|
| " |
| 229,1," protected void execute() { |
|
|
| Arrays.asList(controllersListStrings).forEach( |
| cInfoString -> controllers.add(parseCInfoString(cInfoString))); |
| DriverService service = get(DriverService.class); |
| deviceId = DeviceId.deviceId(uri); |
| DriverHandler h = service.createHandler(deviceId); |
| ControllerConfig config = h.behaviour(ControllerConfig.class); |
| print(""before:""); |
| config.getControllers().forEach(c -> print(c.target())); |
| try { |
| if (removeAll) { |
| if (!controllers.isEmpty()) { |
| print(""Controllers list should be empty to remove all controllers""); |
| } else { |
| List<ControllerInfo> controllersToRemove = config.getControllers(); |
| controllersToRemove.forEach(c -> print(""Will remove "" + c.target())); |
| config.removeControllers(controllersToRemove); |
| } |
| } else { |
| if (controllers.isEmpty()) { |
| print(""Controllers list is empty, cannot set/remove empty controllers""); |
| } else { |
| if (removeCont) { |
| print(""Will remove specified controllers""); |
| config.removeControllers(controllers); |
| } else { |
| print(""Will add specified controllers""); |
| config.setControllers(controllers); |
| } |
| } |
| } |
| } catch (NullPointerException e) { |
| print(""No Device with requested parameters {} "", uri); |
| } |
| print(""after:""); |
| config.getControllers().forEach(c -> print(c.target())); |
| print(""size %d"", config.getControllers().size()); |
| } |
|
|
|
|
| " |
| 230,1," protected boolean parseChunkHeader() |
| throws IOException { |
|
|
| int result = 0; |
| boolean eol = false; |
| boolean readDigit = false; |
| boolean trailer = false; |
|
|
| while (!eol) { |
|
|
| if (pos >= lastValid) { |
| if (readBytes() <= 0) |
| return false; |
| } |
|
|
| if (buf[pos] == Constants.CR || buf[pos] == Constants.LF) { |
| parseCRLF(false); |
| eol = true; |
| } else if (buf[pos] == Constants.SEMI_COLON) { |
| trailer = true; |
| } else if (!trailer) { |
| //don't read data after the trailer |
| int charValue = HexUtils.getDec(buf[pos]); |
| if (charValue != -1) { |
| readDigit = true; |
| result *= 16; |
| result += charValue; |
| } else { |
| |
| |
| return false; |
| } |
| } |
|
|
| |
| if (!eol) { |
| pos++; |
| } |
|
|
| } |
|
|
| if (!readDigit) |
| return false; |
|
|
| if (result == 0) |
| endChunk = true; |
|
|
| remaining = result; |
| if (remaining < 0) |
| return false; |
|
|
| return true; |
|
|
| } |
|
|
|
|
| /** |
| * Parse CRLF at end of chunk. |
| * |
| * @param tolerant Should tolerant parsing (LF and CRLF) be used? This |
| * is recommended (RFC2616, section 19.3) for message |
| * headers. |
| */ |
| " |
| 231,1," private static DocumentBuilder getBuilder() throws ParserConfigurationException { |
| ClassLoader loader = Thread.currentThread().getContextClassLoader(); |
| if (loader == null) { |
| loader = DOMUtils.class.getClassLoader(); |
| } |
| if (loader == null) { |
| return XMLUtils.getParser(); |
| } |
| DocumentBuilder builder = DOCUMENT_BUILDERS.get(loader); |
| if (builder == null) { |
| builder = XMLUtils.getParser(); |
| DOCUMENT_BUILDERS.put(loader, builder); |
| } |
| return builder; |
| } |
|
|
| /** |
| * This function is much like getAttribute, but returns null, not """", for a nonexistent attribute. |
| * |
| * @param e |
| * @param attributeName |
| */ |
| " |
| 232,1," public void init(Map<String,Object> pluginConfig) { |
| try { |
| String delegationTokenEnabled = (String)pluginConfig.getOrDefault(DELEGATION_TOKEN_ENABLED_PROPERTY, ""false""); |
| authFilter = (Boolean.parseBoolean(delegationTokenEnabled)) ? new HadoopAuthFilter() : new AuthenticationFilter(); |
|
|
| |
| boolean initKerberosZk = Boolean.parseBoolean((String)pluginConfig.getOrDefault(INIT_KERBEROS_ZK, ""false"")); |
| if (initKerberosZk) { |
| (new Krb5HttpClientBuilder()).getBuilder(); |
| } |
|
|
| FilterConfig conf = getInitFilterConfig(pluginConfig); |
| authFilter.init(conf); |
|
|
| } catch (ServletException e) { |
| throw new SolrException(ErrorCode.SERVER_ERROR, ""Error initializing "" + getClass().getName() + "": ""+e); |
| } |
| } |
|
|
| @SuppressWarnings(""unchecked"") |
| " |
| 233,1," public void addRecipients(final ExtendedEmailPublisherContext context, EnvVars env, Set<InternetAddress> to, Set<InternetAddress> cc, Set<InternetAddress> bcc) { |
| final class Debug implements RecipientProviderUtilities.IDebug { |
| private final ExtendedEmailPublisherDescriptor descriptor |
| = Jenkins.getActiveInstance().getDescriptorByType(ExtendedEmailPublisherDescriptor.class); |
|
|
| private final PrintStream logger = context.getListener().getLogger(); |
|
|
| public void send(final String format, final Object... args) { |
| descriptor.debug(logger, format, args); |
| } |
| } |
| final Debug debug = new Debug(); |
| debug.send(""Sending email to upstream committer(s).""); |
| Run<?, ?> cur; |
| Cause.UpstreamCause upc = context.getRun().getCause(Cause.UpstreamCause.class); |
| while (upc != null) { |
| Job<?, ?> p = (Job<?, ?>) Jenkins.getActiveInstance().getItemByFullName(upc.getUpstreamProject()); |
| if(p == null) { |
| context.getListener().getLogger().print(""There is a break in the project linkage, could not retrieve upstream project information""); |
| break; |
| } |
| cur = p.getBuildByNumber(upc.getUpstreamBuild()); |
| upc = cur.getCause(Cause.UpstreamCause.class); |
| addUpstreamCommittersTriggeringBuild(cur, to, cc, bcc, env, context.getListener(), debug); |
| } |
| } |
|
|
| /** |
| * Adds for the given upstream build the committers to the recipient list for each commit in the upstream build. |
| * |
| * @param build the upstream build |
| * @param to the to recipient list |
| * @param cc the cc recipient list |
| * @param bcc the bcc recipient list |
| * @param env |
| * @param listener |
| */ |
| " |
| 234,1," public void test_noVerification() throws Exception { |
| |
| JWT jwt = new JWT().setSubject(""art""); |
| String encodedJWT = JWT.getEncoder().encode(jwt, HMACSigner.newSHA256Signer(""secret"")); |
|
|
| expectException(MissingVerifierException.class, () |
| -> JWT.getDecoder().decode(encodedJWT)); |
| } |
|
|
| @Test |
| " |
| 235,1," protected void configure(HttpSecurity http) throws Exception { |
| |
| http |
| .apply(new UrlAuthorizationConfigurer<HttpSecurity>()).getRegistry() |
| .antMatchers(""/users**"",""/sessions/**"").hasRole(""USER"") |
| .antMatchers(""/signup"").hasRole(""ANONYMOUS"") |
| .anyRequest().hasRole(""USER""); |
| } |
| |
| " |
| 236,1," public void register(ContainerBuilder builder, LocatableProperties props) |
| throws ConfigurationException { |
|
|
| builder.factory(com.opensymphony.xwork2.ObjectFactory.class) |
| .factory(ActionProxyFactory.class, DefaultActionProxyFactory.class, Scope.SINGLETON) |
| .factory(ObjectTypeDeterminer.class, DefaultObjectTypeDeterminer.class, Scope.SINGLETON) |
|
|
| .factory(XWorkConverter.class, Scope.SINGLETON) |
| .factory(XWorkBasicConverter.class, Scope.SINGLETON) |
| .factory(ConversionPropertiesProcessor.class, DefaultConversionPropertiesProcessor.class, Scope.SINGLETON) |
| .factory(ConversionFileProcessor.class, DefaultConversionFileProcessor.class, Scope.SINGLETON) |
| .factory(ConversionAnnotationProcessor.class, DefaultConversionAnnotationProcessor.class, Scope.SINGLETON) |
| .factory(TypeConverterCreator.class, DefaultTypeConverterCreator.class, Scope.SINGLETON) |
| .factory(TypeConverterHolder.class, DefaultTypeConverterHolder.class, Scope.SINGLETON) |
|
|
| .factory(FileManager.class, ""system"", DefaultFileManager.class, Scope.SINGLETON) |
| .factory(FileManagerFactory.class, DefaultFileManagerFactory.class, Scope.SINGLETON) |
| .factory(ValueStackFactory.class, OgnlValueStackFactory.class, Scope.SINGLETON) |
| .factory(ValidatorFactory.class, DefaultValidatorFactory.class, Scope.SINGLETON) |
| .factory(ValidatorFileParser.class, DefaultValidatorFileParser.class, Scope.SINGLETON) |
| .factory(PatternMatcher.class, WildcardHelper.class, Scope.SINGLETON) |
| .factory(ReflectionProvider.class, OgnlReflectionProvider.class, Scope.SINGLETON) |
| .factory(ReflectionContextFactory.class, OgnlReflectionContextFactory.class, Scope.SINGLETON) |
| .factory(PropertyAccessor.class, CompoundRoot.class.getName(), CompoundRootAccessor.class, Scope.SINGLETON) |
| .factory(PropertyAccessor.class, Object.class.getName(), ObjectAccessor.class, Scope.SINGLETON) |
| .factory(PropertyAccessor.class, Iterator.class.getName(), XWorkIteratorPropertyAccessor.class, Scope.SINGLETON) |
| .factory(PropertyAccessor.class, Enumeration.class.getName(), XWorkEnumerationAccessor.class, Scope.SINGLETON) |
| .factory(UnknownHandlerManager.class, DefaultUnknownHandlerManager.class, Scope.SINGLETON) |
|
|
| |
| .factory(PropertyAccessor.class, List.class.getName(), XWorkListPropertyAccessor.class, Scope.SINGLETON) |
| .factory(PropertyAccessor.class, ArrayList.class.getName(), XWorkListPropertyAccessor.class, Scope.SINGLETON) |
| .factory(PropertyAccessor.class, HashSet.class.getName(), XWorkCollectionPropertyAccessor.class, Scope.SINGLETON) |
| .factory(PropertyAccessor.class, Set.class.getName(), XWorkCollectionPropertyAccessor.class, Scope.SINGLETON) |
| .factory(PropertyAccessor.class, HashMap.class.getName(), XWorkMapPropertyAccessor.class, Scope.SINGLETON) |
| .factory(PropertyAccessor.class, Map.class.getName(), XWorkMapPropertyAccessor.class, Scope.SINGLETON) |
| .factory(PropertyAccessor.class, Collection.class.getName(), XWorkCollectionPropertyAccessor.class, Scope.SINGLETON) |
| .factory(PropertyAccessor.class, ObjectProxy.class.getName(), ObjectProxyPropertyAccessor.class, Scope.SINGLETON) |
| .factory(MethodAccessor.class, Object.class.getName(), XWorkMethodAccessor.class, Scope.SINGLETON) |
| .factory(MethodAccessor.class, CompoundRoot.class.getName(), CompoundRootAccessor.class, Scope.SINGLETON) |
|
|
| .factory(TextParser.class, OgnlTextParser.class, Scope.SINGLETON) |
|
|
| .factory(NullHandler.class, Object.class.getName(), InstantiatingNullHandler.class, Scope.SINGLETON) |
| .factory(ActionValidatorManager.class, AnnotationActionValidatorManager.class, Scope.SINGLETON) |
| .factory(ActionValidatorManager.class, ""no-annotations"", DefaultActionValidatorManager.class, Scope.SINGLETON) |
| .factory(TextProvider.class, ""system"", DefaultTextProvider.class, Scope.SINGLETON) |
| .factory(TextProvider.class, TextProviderSupport.class, Scope.SINGLETON) |
| .factory(LocaleProvider.class, DefaultLocaleProvider.class, Scope.SINGLETON) |
| .factory(OgnlUtil.class, Scope.SINGLETON) |
| .factory(CollectionConverter.class, Scope.SINGLETON) |
| .factory(ArrayConverter.class, Scope.SINGLETON) |
| .factory(DateConverter.class, Scope.SINGLETON) |
| .factory(NumberConverter.class, Scope.SINGLETON) |
| .factory(StringConverter.class, Scope.SINGLETON); |
| props.setProperty(XWorkConstants.DEV_MODE, Boolean.FALSE.toString()); |
| props.setProperty(XWorkConstants.LOG_MISSING_PROPERTIES, Boolean.FALSE.toString()); |
| props.setProperty(XWorkConstants.ENABLE_OGNL_EXPRESSION_CACHE, Boolean.TRUE.toString()); |
| props.setProperty(XWorkConstants.RELOAD_XML_CONFIGURATION, Boolean.FALSE.toString()); |
| } |
|
|
| " |
| 237,1," public void fireOnComplete() { |
| List<AsyncListenerWrapper> listenersCopy = new ArrayList<>(); |
| listenersCopy.addAll(listeners); |
|
|
| ClassLoader oldCL = context.bind(Globals.IS_SECURITY_ENABLED, null); |
| try { |
| for (AsyncListenerWrapper listener : listenersCopy) { |
| try { |
| listener.fireOnComplete(event); |
| } catch (Throwable t) { |
| ExceptionUtils.handleThrowable(t); |
| log.warn(""onComplete() failed for listener of type ["" + |
| listener.getClass().getName() + ""]"", t); |
| } |
| } |
| } finally { |
| context.fireRequestDestroyEvent(request); |
| clearServletRequestResponse(); |
| context.unbind(Globals.IS_SECURITY_ENABLED, oldCL); |
| } |
| } |
|
|
|
|
| " |
| 238,1," public void testExcludedTrickyParameters() throws Exception { |
| Map<String, Object> params = new HashMap<String, Object>() { |
| { |
| put(""blah"", ""This is blah""); |
| put(""name"", ""try_1""); |
| put(""(name)"", ""try_2""); |
| put(""['name']"", ""try_3""); |
| put(""['na' + 'me']"", ""try_4""); |
| put(""{name}[0]"", ""try_5""); |
| put(""(new string{'name'})[0]"", ""try_6""); |
| put(""#{key: 'name'}.key"", ""try_7""); |
|
|
| } |
| }; |
|
|
| HashMap<String, Object> extraContext = new HashMap<String, Object>(); |
| extraContext.put(ActionContext.PARAMETERS, params); |
|
|
| ActionProxy proxy = actionProxyFactory.createActionProxy("""", MockConfigurationProvider.PARAM_INTERCEPTOR_ACTION_NAME, extraContext); |
|
|
| ActionConfig config = configuration.getRuntimeConfiguration().getActionConfig("""", MockConfigurationProvider.PARAM_INTERCEPTOR_ACTION_NAME); |
| ParametersInterceptor pi =(ParametersInterceptor) config.getInterceptors().get(0).getInterceptor(); |
| pi.setExcludeParams(""name""); |
|
|
| proxy.execute(); |
|
|
| SimpleAction action = (SimpleAction) proxy.getAction(); |
| assertNull(action.getName()); |
| assertEquals(""This is blah"", (action).getBlah()); |
| } |
|
|
| " |
| 239,1," protected BindResult process(final LDAPConnection connection, final int depth) |
| throws LDAPException |
| { |
| if (connection.synchronousMode()) |
| { |
| @SuppressWarnings(""deprecation"") |
| final boolean autoReconnect = |
| connection.getConnectionOptions().autoReconnect(); |
| return processSync(connection, autoReconnect); |
| } |
|
|
| |
| |
| if (password != null) |
| { |
| if ((bindDN.getValue().length > 0) && (password.getValue().length == 0) && |
| connection.getConnectionOptions().bindWithDNRequiresPassword()) |
| { |
| final LDAPException le = new LDAPException(ResultCode.PARAM_ERROR, |
| ERR_SIMPLE_BIND_DN_WITHOUT_PASSWORD.get()); |
| debugCodingError(le); |
| throw le; |
| } |
| } |
|
|
|
|
| |
| messageID = connection.nextMessageID(); |
| final LDAPMessage message = new LDAPMessage(messageID, this, getControls()); |
|
|
|
|
| |
| |
| connection.registerResponseAcceptor(messageID, this); |
|
|
|
|
| try |
| { |
| |
| final long responseTimeout = getResponseTimeoutMillis(connection); |
| debugLDAPRequest(Level.INFO, this, messageID, connection); |
| final long requestTime = System.nanoTime(); |
| connection.getConnectionStatistics().incrementNumBindRequests(); |
| connection.sendMessage(message, responseTimeout); |
|
|
| |
| final LDAPResponse response; |
| try |
| { |
| if (responseTimeout > 0) |
| { |
| response = responseQueue.poll(responseTimeout, TimeUnit.MILLISECONDS); |
| } |
| else |
| { |
| response = responseQueue.take(); |
| } |
| } |
| catch (final InterruptedException ie) |
| { |
| debugException(ie); |
| Thread.currentThread().interrupt(); |
| throw new LDAPException(ResultCode.LOCAL_ERROR, |
| ERR_BIND_INTERRUPTED.get(connection.getHostPort()), ie); |
| } |
|
|
| return handleResponse(connection, response, requestTime, false); |
| } |
| finally |
| { |
| connection.deregisterResponseAcceptor(messageID); |
| } |
| } |
|
|
|
|
|
|
| /** |
| * Processes this bind operation in synchronous mode, in which the same |
| * thread will send the request and read the response. |
| * |
| * @param connection The connection to use to communicate with the directory |
| * server. |
| * @param allowRetry Indicates whether the request may be re-tried on a |
| * re-established connection if the initial attempt fails |
| * in a way that indicates the connection is no longer |
| * valid and autoReconnect is true. |
| * |
| * @return An LDAP result object that provides information about the result |
| * of the bind processing. |
| * |
| * @throws LDAPException If a problem occurs while sending the request or |
| * reading the response. |
| */ |
| " |
| 240,1," public Set<ControllerServiceNode> getControllerServices(final boolean recursive) { |
| readLock.lock(); |
| try { |
| final Set<ControllerServiceNode> services = new HashSet<>(); |
| services.addAll(controllerServices.values()); |
|
|
| if (recursive && parent.get() != null) { |
| services.addAll(parent.get().getControllerServices(true)); |
| } |
|
|
| return services; |
| } finally { |
| readLock.unlock(); |
| } |
| } |
|
|
| @Override |
| " |
| 241,1," public boolean getValidateClientProvidedNewSessionId() { |
| return validateClientProvidedNewSessionId; |
| } |
|
|
| @Override |
| " |
| 242,1," private static void doZipDir(File dir, ZipOutputStream out) throws IOException { |
| File[] children = dir.listFiles(); |
| if (children == null) { |
| throw new IllegalStateException(""Fail to list files of directory "" + dir.getAbsolutePath()); |
| } |
| for (File child : children) { |
| doZip(child.getName(), child, out); |
| } |
| } |
|
|
| /** |
| * @see #unzip(File, File, Predicate) |
| * @deprecated replaced by {@link Predicate<ZipEntry>} in 6.2. |
| */ |
| @Deprecated |
| @FunctionalInterface |
| " |
| 243,1," public H and() { |
| return ChannelSecurityConfigurer.this.and(); |
| } |
|
|
| " |
| 244,1," public boolean isLockoutEnabled() { |
| return countFailuresWithin > 0; |
| } |
|
|
| " |
| 245,1," protected synchronized void authenticatorConfig() { |
|
|
| |
| LoginConfig loginConfig = context.getLoginConfig(); |
| if (loginConfig == null) { |
| loginConfig = DUMMY_LOGIN_CONFIG; |
| context.setLoginConfig(loginConfig); |
| } |
|
|
| |
| if (context.getAuthenticator() != null) |
| return; |
| |
| if (!(context instanceof ContainerBase)) { |
| return; |
| } |
|
|
| |
| if (context.getRealm() == null) { |
| log.error(sm.getString(""contextConfig.missingRealm"")); |
| ok = false; |
| return; |
| } |
|
|
| /* |
| * First check to see if there is a custom mapping for the login |
| * method. If so, use it. Otherwise, check if there is a mapping in |
| * org/apache/catalina/startup/Authenticators.properties. |
| */ |
| Valve authenticator = null; |
| if (customAuthenticators != null) { |
| authenticator = (Valve) |
| customAuthenticators.get(loginConfig.getAuthMethod()); |
| } |
| if (authenticator == null) { |
| |
| if (authenticators == null) { |
| try { |
| InputStream is=this.getClass().getClassLoader().getResourceAsStream(""org/apache/catalina/startup/Authenticators.properties""); |
| if( is!=null ) { |
| authenticators = new Properties(); |
| authenticators.load(is); |
| } else { |
| log.error(sm.getString( |
| ""contextConfig.authenticatorResources"")); |
| ok=false; |
| return; |
| } |
| } catch (IOException e) { |
| log.error(sm.getString( |
| ""contextConfig.authenticatorResources""), e); |
| ok = false; |
| return; |
| } |
| } |
|
|
| |
| String authenticatorName = null; |
| authenticatorName = |
| authenticators.getProperty(loginConfig.getAuthMethod()); |
| if (authenticatorName == null) { |
| log.error(sm.getString(""contextConfig.authenticatorMissing"", |
| loginConfig.getAuthMethod())); |
| ok = false; |
| return; |
| } |
|
|
| |
| try { |
| Class<?> authenticatorClass = Class.forName(authenticatorName); |
| authenticator = (Valve) authenticatorClass.newInstance(); |
| } catch (Throwable t) { |
| ExceptionUtils.handleThrowable(t); |
| log.error(sm.getString( |
| ""contextConfig.authenticatorInstantiate"", |
| authenticatorName), |
| t); |
| ok = false; |
| } |
| } |
|
|
| if (authenticator != null && context instanceof ContainerBase) { |
| Pipeline pipeline = ((ContainerBase) context).getPipeline(); |
| if (pipeline != null) { |
| ((ContainerBase) context).getPipeline().addValve(authenticator); |
| if (log.isDebugEnabled()) { |
| log.debug(sm.getString( |
| ""contextConfig.authenticatorConfigured"", |
| loginConfig.getAuthMethod())); |
| } |
| } |
| } |
|
|
| } |
|
|
|
|
| /** |
| * Create (if necessary) and return a Digester configured to process the |
| * web application deployment descriptor (web.xml). |
| */ |
| " |
| 246,1," private void processInternal(Exchange exchange, AsyncCallback callback) throws Exception { |
| |
| String url = HttpHelper.createURL(exchange, getEndpoint()); |
| URI uri = HttpHelper.createURI(exchange, url, getEndpoint()); |
| |
| url = uri.toASCIIString(); |
|
|
| |
| String rewriteUrl = HttpHelper.urlRewrite(exchange, url, getEndpoint(), this); |
| if (rewriteUrl != null) { |
| |
| url = rewriteUrl; |
| } |
|
|
| String methodName = HttpHelper.createMethod(exchange, getEndpoint(), exchange.getIn().getBody() != null).name(); |
|
|
| JettyContentExchange httpExchange = getEndpoint().createContentExchange(); |
| httpExchange.init(exchange, getBinding(), client, callback); |
| httpExchange.setURL(url); |
| httpExchange.setMethod(methodName); |
| |
| if (getEndpoint().getHttpClientParameters() != null) { |
| |
| |
| String timeout = (String)getEndpoint().getHttpClientParameters().get(""timeout""); |
| if (timeout != null) { |
| httpExchange.setTimeout(new Long(timeout)); |
| } |
| String supportRedirect = (String)getEndpoint().getHttpClientParameters().get(""supportRedirect""); |
| if (supportRedirect != null) { |
| httpExchange.setSupportRedirect(Boolean.valueOf(supportRedirect)); |
| } |
| } |
|
|
| LOG.trace(""Using URL: {} with method: {}"", url, methodName); |
|
|
| |
| if (exchange.getIn().getBody() != null) { |
| String contentType = ExchangeHelper.getContentType(exchange); |
| if (contentType != null) { |
| httpExchange.setRequestContentType(contentType); |
| } |
|
|
| if (contentType != null && HttpConstants.CONTENT_TYPE_JAVA_SERIALIZED_OBJECT.equals(contentType)) { |
| |
| Serializable obj = exchange.getIn().getMandatoryBody(Serializable.class); |
| |
| ByteArrayOutputStream bos = new ByteArrayOutputStream(); |
| try { |
| HttpHelper.writeObjectToStream(bos, obj); |
| httpExchange.setRequestContent(bos.toByteArray()); |
| } finally { |
| IOHelper.close(bos, ""body"", LOG); |
| } |
| } else { |
| Object body = exchange.getIn().getBody(); |
| if (body instanceof String) { |
| String data = (String) body; |
| |
| |
| |
| |
| String charset = IOHelper.getCharsetName(exchange, false); |
| httpExchange.setRequestContent(data, charset); |
| } else { |
| |
| InputStream is = exchange.getContext().getTypeConverter().mandatoryConvertTo(InputStream.class, exchange, exchange.getIn().getBody()); |
| httpExchange.setRequestContent(is); |
| |
| String length = exchange.getIn().getHeader(Exchange.CONTENT_LENGTH, String.class); |
| if (ObjectHelper.isNotEmpty(length)) { |
| httpExchange.addRequestHeader(Exchange.CONTENT_LENGTH, length); |
| } |
| } |
| } |
| } |
|
|
| |
| |
| Map<String, Object> skipRequestHeaders = null; |
| if (getEndpoint().isBridgeEndpoint()) { |
| exchange.setProperty(Exchange.SKIP_GZIP_ENCODING, Boolean.TRUE); |
| String queryString = exchange.getIn().getHeader(Exchange.HTTP_QUERY, String.class); |
| if (queryString != null) { |
| skipRequestHeaders = URISupport.parseQuery(queryString, false, true); |
| } |
| |
| exchange.getIn().getHeaders().remove(""host""); |
| } |
|
|
| |
| Message in = exchange.getIn(); |
| HeaderFilterStrategy strategy = getEndpoint().getHeaderFilterStrategy(); |
| for (Map.Entry<String, Object> entry : in.getHeaders().entrySet()) { |
| String key = entry.getKey(); |
| Object headerValue = in.getHeader(key); |
|
|
| if (headerValue != null) { |
| |
| final Iterator<?> it = ObjectHelper.createIterator(headerValue, null, true); |
|
|
| |
| final List<String> values = new ArrayList<String>(); |
|
|
| |
| |
| while (it.hasNext()) { |
| String value = exchange.getContext().getTypeConverter().convertTo(String.class, it.next()); |
|
|
| |
| |
| if (skipRequestHeaders != null && skipRequestHeaders.containsKey(key)) { |
| continue; |
| } |
| if (value != null && strategy != null && !strategy.applyFilterToCamelHeaders(key, value, exchange)) { |
| values.add(value); |
| } |
| } |
|
|
| |
| if (values.size() > 0) { |
| |
| |
| String s = values.size() > 1 ? values.toString() : values.get(0); |
| httpExchange.addRequestHeader(key, s); |
| } |
| } |
| } |
|
|
| |
| if (LOG.isDebugEnabled()) { |
| LOG.debug(""Sending HTTP request to: {}"", httpExchange.getUrl()); |
| } |
| httpExchange.send(client); |
| } |
|
|
| " |
| 247,1," public void send(final String format, final Object... args) { |
| descriptor.debug(logger, format, args); |
| } |
| } |
| final Debug debug = new Debug(); |
|
|
| Set<User> users = null; |
|
|
| final Run<?, ?> currentRun = context.getRun(); |
| if (currentRun == null) { |
| debug.send(""currentRun was null""); |
| } else { |
| if (!Objects.equals(currentRun.getResult(), Result.FAILURE)) { |
| debug.send(""currentBuild did not fail""); |
| } else { |
| users = new HashSet<>(); |
| debug.send(""Collecting builds with suspects...""); |
| final HashSet<Run<?, ?>> buildsWithSuspects = new HashSet<>(); |
| Run<?, ?> firstFailedBuild = currentRun; |
| Run<?, ?> candidate = currentRun; |
| while (candidate != null) { |
| final Result candidateResult = candidate.getResult(); |
| if ( candidateResult == null || !candidateResult.isWorseOrEqualTo(Result.FAILURE) ) { |
| break; |
| } |
| firstFailedBuild = candidate; |
| candidate = candidate.getPreviousCompletedBuild(); |
| } |
| if (firstFailedBuild instanceof AbstractBuild) { |
| buildsWithSuspects.add(firstFailedBuild); |
| } else { |
| debug.send("" firstFailedBuild was not an instance of AbstractBuild""); |
| } |
| debug.send(""Collecting suspects...""); |
| users.addAll(RecipientProviderUtilities.getChangeSetAuthors(buildsWithSuspects, debug)); |
| users.addAll(RecipientProviderUtilities.getUsersTriggeringTheBuilds(buildsWithSuspects, debug)); |
| } |
| } |
| if (users != null) { |
| RecipientProviderUtilities.addUsers(users, context.getListener(), env, to, cc, bcc, debug); |
| } |
| } |
|
|
| @Extension |
| public static final class DescriptorImpl extends RecipientProviderDescriptor { |
| @Override |
| public String getDisplayName() { |
| return ""Suspects Causing the Build to Begin Failing""; |
| } |
| } |
|
|
| } |
| " |
| 248,1," public Document getMetaData(Idp config) throws RuntimeException { |
| |
| try { |
| Crypto crypto = CertsUtils.createCrypto(config.getCertificate()); |
| |
| ByteArrayOutputStream bout = new ByteArrayOutputStream(4096); |
| Writer streamWriter = new OutputStreamWriter(bout, ""UTF-8""); |
| XMLStreamWriter writer = XML_OUTPUT_FACTORY.createXMLStreamWriter(streamWriter); |
|
|
| writer.writeStartDocument(""UTF-8"", ""1.0""); |
|
|
| String referenceID = IDGenerator.generateID(""_""); |
| writer.writeStartElement(""md"", ""EntityDescriptor"", SAML2_METADATA_NS); |
| writer.writeAttribute(""ID"", referenceID); |
| |
| writer.writeAttribute(""entityID"", config.getIdpUrl().toString()); |
|
|
| writer.writeNamespace(""md"", SAML2_METADATA_NS); |
| writer.writeNamespace(""fed"", WS_FEDERATION_NS); |
| writer.writeNamespace(""wsa"", WS_ADDRESSING_NS); |
| writer.writeNamespace(""auth"", WS_FEDERATION_NS); |
| writer.writeNamespace(""xsi"", SCHEMA_INSTANCE_NS); |
| |
| writeFederationMetadata(writer, config, crypto); |
| |
| writer.writeEndElement(); |
|
|
| writer.writeEndDocument(); |
| streamWriter.flush(); |
| bout.flush(); |
|
|
| if (LOG.isDebugEnabled()) { |
| String out = new String(bout.toByteArray()); |
| LOG.debug(""***************** unsigned ****************""); |
| LOG.debug(out); |
| LOG.debug(""***************** unsigned ****************""); |
| } |
| |
| InputStream is = new ByteArrayInputStream(bout.toByteArray()); |
| |
| Document result = SignatureUtils.signMetaInfo(crypto, null, config.getCertificatePassword(), is, referenceID); |
| if (result != null) { |
| return result; |
| } else { |
| throw new RuntimeException(""Failed to sign the metadata document: result=null""); |
| } |
| } catch (RuntimeException e) { |
| throw e; |
| } catch (Exception e) { |
| LOG.error(""Error creating service metadata information "", e); |
| throw new RuntimeException(""Error creating service metadata information: "" + e.getMessage()); |
| } |
| |
| } |
| |
| " |
| 249,1," public void chaosSnapshotTest() throws Exception { |
| final List<String> indices = new CopyOnWriteArrayList<>(); |
| Settings settings = settingsBuilder().put(""action.write_consistency"", ""one"").build(); |
| int initialNodes = between(1, 3); |
| logger.info(""--> start {} nodes"", initialNodes); |
| for (int i = 0; i < initialNodes; i++) { |
| internalCluster().startNode(settings); |
| } |
|
|
| logger.info(""--> creating repository""); |
| assertAcked(client().admin().cluster().preparePutRepository(""test-repo"") |
| .setType(""fs"").setSettings(ImmutableSettings.settingsBuilder() |
| .put(""location"", newTempDir(LifecycleScope.SUITE)) |
| .put(""compress"", randomBoolean()) |
| .put(""chunk_size"", randomIntBetween(100, 1000)))); |
|
|
| int initialIndices = between(1, 3); |
| logger.info(""--> create {} indices"", initialIndices); |
| for (int i = 0; i < initialIndices; i++) { |
| createTestIndex(""test-"" + i); |
| indices.add(""test-"" + i); |
| } |
|
|
| int asyncNodes = between(0, 5); |
| logger.info(""--> start {} additional nodes asynchronously"", asyncNodes); |
| ListenableFuture<List<String>> asyncNodesFuture = internalCluster().startNodesAsync(asyncNodes, settings); |
|
|
| int asyncIndices = between(0, 10); |
| logger.info(""--> create {} additional indices asynchronously"", asyncIndices); |
| Thread[] asyncIndexThreads = new Thread[asyncIndices]; |
| for (int i = 0; i < asyncIndices; i++) { |
| final int cur = i; |
| asyncIndexThreads[i] = new Thread(new Runnable() { |
| @Override |
| public void run() { |
| createTestIndex(""test-async-"" + cur); |
| indices.add(""test-async-"" + cur); |
|
|
| } |
| }); |
| asyncIndexThreads[i].start(); |
| } |
|
|
| logger.info(""--> snapshot""); |
|
|
| ListenableActionFuture<CreateSnapshotResponse> snapshotResponseFuture = client().admin().cluster().prepareCreateSnapshot(""test-repo"", ""test-snap"").setWaitForCompletion(true).setIndices(""test-*"").setPartial(true).execute(); |
|
|
| long start = System.currentTimeMillis(); |
| |
| int randomIndices = 0; |
| while (System.currentTimeMillis() - start < 30000 && !snapshotIsDone(""test-repo"", ""test-snap"")) { |
| Thread.sleep(100); |
| int chaosType = randomInt(10); |
| if (chaosType < 4) { |
| |
| if (indices.size() > 0) { |
| String index = indices.remove(randomInt(indices.size() - 1)); |
| logger.info(""--> deleting random index [{}]"", index); |
| internalCluster().wipeIndices(index); |
| } |
| } else if (chaosType < 6) { |
| |
| if (cluster().size() > 1) { |
| logger.info(""--> shutting down random node""); |
| internalCluster().stopRandomDataNode(); |
| } |
| } else if (chaosType < 8) { |
| |
| String index = ""test-rand-"" + randomIndices; |
| logger.info(""--> creating random index [{}]"", index); |
| createTestIndex(index); |
| randomIndices++; |
| } else { |
| |
| logger.info(""--> noop""); |
| } |
| } |
|
|
| logger.info(""--> waiting for async indices creation to finish""); |
| for (int i = 0; i < asyncIndices; i++) { |
| asyncIndexThreads[i].join(); |
| } |
|
|
| logger.info(""--> update index settings to back to normal""); |
| assertAcked(client().admin().indices().prepareUpdateSettings(""test-*"").setSettings(ImmutableSettings.builder() |
| .put(AbstractIndexStore.INDEX_STORE_THROTTLE_TYPE, ""node"") |
| )); |
|
|
| |
| try { |
| CreateSnapshotResponse snapshotResponse = snapshotResponseFuture.get(); |
| SnapshotInfo snapshotInfo = snapshotResponse.getSnapshotInfo(); |
| assertNotNull(snapshotInfo); |
| logger.info(""--> snapshot is done with state [{}], total shards [{}], successful shards [{}]"", snapshotInfo.state(), snapshotInfo.totalShards(), snapshotInfo.successfulShards()); |
| } catch (Exception ex) { |
| logger.info(""--> snapshot didn't start properly"", ex); |
| } |
|
|
| asyncNodesFuture.get(); |
| logger.info(""--> done""); |
| } |
|
|
| " |
| 250,1," public Principal authenticate(String username, String credentials) { |
|
|
| // No user or no credentials |
| // Can't possibly authenticate, don't bother the database then |
| if (username == null || credentials == null) { |
| if (log.isDebugEnabled()) |
| log.debug(sm.getString(""memoryRealm.authenticateFailure"", username)); |
| return null; |
| } |
|
|
| GenericPrincipal principal = principals.get(username); |
|
|
| if(principal == null || principal.getPassword() == null) { |
| // User was not found in the database of the password was null |
|
|
| if (log.isDebugEnabled()) |
| log.debug(sm.getString(""memoryRealm.authenticateFailure"", username)); |
| return null; |
| } |
|
|
| boolean validated = getCredentialHandler().matches(credentials, principal.getPassword()); |
|
|
| if (validated) { |
| if (log.isDebugEnabled()) |
| log.debug(sm.getString(""memoryRealm.authenticateSuccess"", username)); |
| return principal; |
| } else { |
| if (log.isDebugEnabled()) |
| log.debug(sm.getString(""memoryRealm.authenticateFailure"", username)); |
| return null; |
| } |
| } |
|
|
|
|
| // -------------------------------------------------------- Package Methods |
|
|
|
|
| /** |
| * Add a new user to the in-memory database. |
| * |
| * @param username User's username |
| * @param password User's password (clear text) |
| * @param roles Comma-delimited set of roles associated with this user |
| */ |
| " |
| 251,1," public Object getValue(Object o) { |
| if ( location.getMember() == null ) { |
| return o; |
| } |
| else { |
| return ReflectionHelper.getValue( location.getMember(), o ); |
| } |
| } |
|
|
| @Override |
| " |
| 252,1," private String buildErrorMessage(Throwable e, Object[] args) { |
| String errorKey = ""struts.message.upload.error."" + e.getClass().getSimpleName(); |
| if (LOG.isDebugEnabled()) |
| LOG.debug(""Preparing error message for key: [#0]"", errorKey); |
| return LocalizedTextUtil.findText(this.getClass(), errorKey, defaultLocale, e.getMessage(), args); |
| } |
|
|
| /** |
| * Build action message. |
| * |
| * @param e |
| * @param args |
| * @return |
| */ |
| " |
| 253,1," private void resetContext() throws Exception { |
| // Restore the original state ( pre reading web.xml in start ) |
| // If you extend this - override this method and make sure to clean up |
| |
| // Don't reset anything that is read from a <Context.../> element since |
| |
| |
| children = new HashMap<String, Container>(); |
| startupTime = 0; |
| startTime = 0; |
| tldScanTime = 0; |
|
|
| |
| distributable = false; |
|
|
| applicationListeners = new String[0]; |
| applicationEventListenersObjects = new Object[0]; |
| applicationLifecycleListenersObjects = new Object[0]; |
| jspConfigDescriptor = new ApplicationJspConfigDescriptor(); |
| |
| initializers.clear(); |
| |
| if(log.isDebugEnabled()) |
| log.debug(""resetContext "" + getObjectName()); |
| } |
|
|
| /** |
| * Return a String representation of this component. |
| */ |
| @Override |
| " |
| 254,1," public void testRestoreToShadow() throws ExecutionException, InterruptedException { |
| Settings nodeSettings = nodeSettings(); |
|
|
| internalCluster().startNodesAsync(3, nodeSettings).get(); |
| final Path dataPath = newTempDir().toPath(); |
| Settings idxSettings = ImmutableSettings.builder() |
| .put(IndexMetaData.SETTING_NUMBER_OF_SHARDS, 1) |
| .put(IndexMetaData.SETTING_NUMBER_OF_REPLICAS, 0).build(); |
| assertAcked(prepareCreate(""foo"").setSettings(idxSettings)); |
| ensureGreen(); |
| final int numDocs = randomIntBetween(10, 100); |
| for (int i = 0; i < numDocs; i++) { |
| client().prepareIndex(""foo"", ""doc"", """"+i).setSource(""foo"", ""bar"").get(); |
| } |
| assertNoFailures(client().admin().indices().prepareFlush().setForce(true).setWaitIfOngoing(true).execute().actionGet()); |
|
|
| assertAcked(client().admin().cluster().preparePutRepository(""test-repo"") |
| .setType(""fs"").setSettings(ImmutableSettings.settingsBuilder() |
| .put(""location"", newTempDir().toPath()))); |
| CreateSnapshotResponse createSnapshotResponse = client().admin().cluster().prepareCreateSnapshot(""test-repo"", ""test-snap"").setWaitForCompletion(true).setIndices(""foo"").get(); |
| assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), greaterThan(0)); |
| assertThat(createSnapshotResponse.getSnapshotInfo().successfulShards(), equalTo(createSnapshotResponse.getSnapshotInfo().totalShards())); |
| assertThat(client().admin().cluster().prepareGetSnapshots(""test-repo"").setSnapshots(""test-snap"").get().getSnapshots().get(0).state(), equalTo(SnapshotState.SUCCESS)); |
|
|
| Settings shadowSettings = ImmutableSettings.builder() |
| .put(IndexMetaData.SETTING_DATA_PATH, dataPath.toAbsolutePath().toString()) |
| .put(IndexMetaData.SETTING_SHADOW_REPLICAS, true) |
| .put(IndexMetaData.SETTING_SHARED_FILESYSTEM, true) |
| .put(IndexMetaData.SETTING_NUMBER_OF_REPLICAS, 2).build(); |
|
|
| logger.info(""--> restore the index into shadow replica index""); |
| RestoreSnapshotResponse restoreSnapshotResponse = client().admin().cluster().prepareRestoreSnapshot(""test-repo"", ""test-snap"") |
| .setIndexSettings(shadowSettings).setWaitForCompletion(true) |
| .setRenamePattern(""(.+)"").setRenameReplacement(""$1-copy"") |
| .execute().actionGet(); |
| assertThat(restoreSnapshotResponse.getRestoreInfo().totalShards(), greaterThan(0)); |
| ensureGreen(); |
| refresh(); |
|
|
| for (IndicesService service : internalCluster().getDataNodeInstances(IndicesService.class)) { |
| if (service.hasIndex(""foo-copy"")) { |
| IndexShard shard = service.indexServiceSafe(""foo-copy"").shard(0); |
| if (shard.routingEntry().primary()) { |
| assertFalse(shard instanceof ShadowIndexShard); |
| } else { |
| assertTrue(shard instanceof ShadowIndexShard); |
| } |
| } |
| } |
| logger.info(""--> performing query""); |
| SearchResponse resp = client().prepareSearch(""foo-copy"").setQuery(matchAllQuery()).get(); |
| assertHitCount(resp, numDocs); |
|
|
| } |
|
|
| @Test |
| " |
| 255,1," public KeyPair generateKeyPair() |
| { |
| if (!initialised) |
| { |
| DSAParametersGenerator pGen = new DSAParametersGenerator(); |
|
|
| pGen.init(strength, certainty, random); |
| param = new DSAKeyGenerationParameters(random, pGen.generateParameters()); |
| engine.init(param); |
| initialised = true; |
| } |
|
|
| AsymmetricCipherKeyPair pair = engine.generateKeyPair(); |
| DSAPublicKeyParameters pub = (DSAPublicKeyParameters)pair.getPublic(); |
| DSAPrivateKeyParameters priv = (DSAPrivateKeyParameters)pair.getPrivate(); |
|
|
| return new KeyPair(new BCDSAPublicKey(pub), new BCDSAPrivateKey(priv)); |
| } |
| " |
| 256,1," public void testInvalidate() throws IOException { |
| ProjectWorkspace workspace = |
| TestDataHelper.createProjectWorkspaceForScenario(this, ""parser_with_cell"", tmp); |
| workspace.setUp(); |
|
|
| |
| TestContext context = new TestContext(); |
| ProcessResult runBuckResult = |
| workspace.runBuckdCommand(context, ""query"", ""deps( |
| runBuckResult.assertSuccess(); |
| assertThat( |
| runBuckResult.getStdout(), |
| Matchers.containsString( |
| "" |
| + "" |
| + "" |
| + ""bar |
|
|
| |
| NamedTemporaryFile tempFile = new NamedTemporaryFile(""parser_data"", null); |
| runBuckResult = |
| workspace.runBuckdCommand(context, ""parser-cache"", ""--save"", tempFile.get().toString()); |
| runBuckResult.assertSuccess(); |
|
|
| |
| Path path = tmp.getRoot().resolve(""Apps/BUCK""); |
| byte[] data = {}; |
| Files.write(path, data); |
|
|
| |
| Path invalidationJsonPath = tmp.getRoot().resolve(""invalidation-data.json""); |
| String jsonData = ""[{\""path\"":\""Apps/BUCK\"",\""status\"":\""M\""}]""; |
| Files.write(invalidationJsonPath, jsonData.getBytes(StandardCharsets.UTF_8)); |
|
|
| context = new TestContext(); |
| |
| runBuckResult = |
| workspace.runBuckdCommand( |
| context, |
| ""parser-cache"", |
| ""--load"", |
| tempFile.get().toString(), |
| ""--changes"", |
| invalidationJsonPath.toString()); |
| runBuckResult.assertSuccess(); |
|
|
| |
| try { |
| workspace.runBuckdCommand(context, ""query"", ""deps( |
| } catch (HumanReadableException e) { |
| assertThat( |
| e.getMessage(), Matchers.containsString("" |
| } |
| } |
| " |
| 257,1," public void send(final String format, final Object... args) { |
| descriptor.debug(logger, format, args); |
| } |
| } |
| final Debug debug = new Debug(); |
| Set<User> users = RecipientProviderUtilities.getChangeSetAuthors(Collections.<Run<?, ?>>singleton(context.getRun()), debug); |
| RecipientProviderUtilities.addUsers(users, context.getListener(), env, to, cc, bcc, debug); |
| } |
|
|
| @Extension |
| public static final class DescriptorImpl extends RecipientProviderDescriptor { |
| @Override |
| public String getDisplayName() { |
| return ""Developers""; |
| } |
| } |
| } |
| " |
| 258,1," public void testRejectBindWithDNButNoPassword() |
| throws Exception |
| { |
| if (! isDirectoryInstanceAvailable()) |
| { |
| return; |
| } |
|
|
| LDAPConnection conn = getUnauthenticatedConnection(); |
| SimpleBindRequest bindRequest = new SimpleBindRequest(getTestBindDN(), """"); |
|
|
| try |
| { |
| bindRequest.process(conn, 1); |
| fail(""Expected an exception when binding with a DN but no password""); |
| } |
| catch (LDAPException le) |
| { |
| assertEquals(le.getResultCode(), ResultCode.PARAM_ERROR); |
| } |
|
|
|
|
| |
| |
| conn.getConnectionOptions().setBindWithDNRequiresPassword(false); |
| try |
| { |
| bindRequest.process(conn, 1); |
| } |
| catch (LDAPException le) |
| { |
| |
| |
| assertFalse(le.getResultCode() == ResultCode.PARAM_ERROR); |
| } |
|
|
| conn.getConnectionOptions().setBindWithDNRequiresPassword(true); |
| conn.close(); |
| } |
| " |
| 259,1," public LockoutPolicy getLockoutPolicy() { |
| LockoutPolicy res = IdentityZoneHolder.get().getConfig().getClientLockoutPolicy(); |
| return res.getLockoutAfterFailures() != -1 ? res : defaultLockoutPolicy; |
| } |
|
|
| @Override |
| " |
| 260,1," private void detectJPA() { |
| |
| Class<?> persistenceClass; |
| try { |
| persistenceClass = run( LoadClass.action( PERSISTENCE_CLASS_NAME, this.getClass() ) ); |
| } |
| catch ( ValidationException e ) { |
| log.debugf( |
| ""Cannot find %s on classpath. Assuming non JPA 2 environment. All properties will per default be traversable."", |
| PERSISTENCE_CLASS_NAME |
| ); |
| return; |
| } |
|
|
| |
| Method persistenceUtilGetter = run( GetMethod.action( persistenceClass, PERSISTENCE_UTIL_METHOD ) ); |
| if ( persistenceUtilGetter == null ) { |
| log.debugf( |
| ""Found %s on classpath, but no method '%s'. Assuming JPA 1 environment. All properties will per default be traversable."", |
| PERSISTENCE_CLASS_NAME, |
| PERSISTENCE_UTIL_METHOD |
| ); |
| return; |
| } |
|
|
| |
| |
| try { |
| Object persistence = run( NewInstance.action( persistenceClass, ""persistence provider"" ) ); |
| ReflectionHelper.getValue(persistenceUtilGetter, persistence ); |
| } |
| catch ( Exception e ) { |
| log.debugf( |
| ""Unable to invoke %s.%s. Inconsistent JPA environment. All properties will per default be traversable."", |
| PERSISTENCE_CLASS_NAME, |
| PERSISTENCE_UTIL_METHOD |
| ); |
| } |
|
|
| log.debugf( |
| ""Found %s on classpath containing '%s'. Assuming JPA 2 environment. Trying to instantiate JPA aware TraversableResolver"", |
| PERSISTENCE_CLASS_NAME, |
| PERSISTENCE_UTIL_METHOD |
| ); |
|
|
| try { |
| @SuppressWarnings(""unchecked"") |
| Class<? extends TraversableResolver> jpaAwareResolverClass = (Class<? extends TraversableResolver>) |
| run( LoadClass.action( JPA_AWARE_TRAVERSABLE_RESOLVER_CLASS_NAME, this.getClass() ) ); |
| jpaTraversableResolver = run( NewInstance.action( jpaAwareResolverClass, """" ) ); |
| log.debugf( |
| ""Instantiated JPA aware TraversableResolver of type %s."", JPA_AWARE_TRAVERSABLE_RESOLVER_CLASS_NAME |
| ); |
| } |
| catch ( ValidationException e ) { |
| log.debugf( |
| ""Unable to load or instantiate JPA aware resolver %s. All properties will per default be traversable."", |
| JPA_AWARE_TRAVERSABLE_RESOLVER_CLASS_NAME |
| ); |
| } |
| } |
|
|
| @Override |
| " |
| 261,1," public void addRecipients(final ExtendedEmailPublisherContext context, EnvVars env, Set<InternetAddress> to, Set<InternetAddress> cc, Set<InternetAddress> bcc) { |
| final class Debug implements RecipientProviderUtilities.IDebug { |
| private final ExtendedEmailPublisherDescriptor descriptor |
| = Jenkins.getActiveInstance().getDescriptorByType(ExtendedEmailPublisherDescriptor.class); |
|
|
| private final PrintStream logger = context.getListener().getLogger(); |
|
|
| public void send(final String format, final Object... args) { |
| descriptor.debug(logger, format, args); |
| } |
| } |
| final Debug debug = new Debug(); |
| Run<?,?> run = context.getRun(); |
| final Result runResult = run.getResult(); |
| if (run instanceof AbstractBuild) { |
| Set<User> users = ((AbstractBuild<?,?>)run).getCulprits(); |
| RecipientProviderUtilities.addUsers(users, context.getListener(), env, to, cc, bcc, debug); |
| } else if (runResult != null) { |
| List<Run<?, ?>> builds = new ArrayList<>(); |
| Run<?, ?> build = run; |
| builds.add(build); |
| build = build.getPreviousCompletedBuild(); |
| while (build != null) { |
| final Result buildResult = build.getResult(); |
| if (buildResult != null) { |
| if (buildResult.isWorseThan(Result.SUCCESS)) { |
| debug.send(""Including build %s with status %s"", build.getId(), buildResult); |
| builds.add(build); |
| } else { |
| break; |
| } |
| } |
| build = build.getPreviousCompletedBuild(); |
| } |
| Set<User> users = RecipientProviderUtilities.getChangeSetAuthors(builds, debug); |
| RecipientProviderUtilities.addUsers(users, context.getListener(), env, to, cc, bcc, debug); |
| } |
| } |
|
|
| @Extension |
| " |
| 262,1," protected boolean isProbablePrime(BigInteger x) |
| { |
| /* |
| * Primes class for FIPS 186-4 C.3 primality checking |
| */ |
| return !Primes.hasAnySmallFactors(x) && Primes.isMRProbablePrime(x, param.getRandom(), iterations); |
| } |
|
|
| " |
| 263,1," public void batchingShardUpdateTaskTest() throws Exception { |
|
|
| final Client client = client(); |
|
|
| logger.info(""--> creating repository""); |
| assertAcked(client.admin().cluster().preparePutRepository(""test-repo"") |
| .setType(""fs"").setSettings(ImmutableSettings.settingsBuilder() |
| .put(""location"", newTempDir()) |
| .put(""compress"", randomBoolean()) |
| .put(""chunk_size"", randomIntBetween(100, 1000)))); |
|
|
| assertAcked(prepareCreate(""test-idx"", 0, settingsBuilder().put(""number_of_shards"", between(1, 20)) |
| .put(""number_of_replicas"", 0))); |
| ensureGreen(); |
|
|
| logger.info(""--> indexing some data""); |
| final int numdocs = randomIntBetween(10, 100); |
| IndexRequestBuilder[] builders = new IndexRequestBuilder[numdocs]; |
| for (int i = 0; i < builders.length; i++) { |
| builders[i] = client().prepareIndex(""test-idx"", ""type1"", Integer.toString(i)).setSource(""field1"", ""bar "" + i); |
| } |
| indexRandom(true, builders); |
| flushAndRefresh(); |
|
|
| final int numberOfShards = getNumShards(""test-idx"").numPrimaries; |
| logger.info(""number of shards: {}"", numberOfShards); |
|
|
| final ClusterService clusterService = internalCluster().clusterService(internalCluster().getMasterName()); |
| BlockingClusterStateListener snapshotListener = new BlockingClusterStateListener(clusterService, ""update_snapshot ["", ""update snapshot state"", Priority.HIGH); |
| try { |
| clusterService.addFirst(snapshotListener); |
| logger.info(""--> snapshot""); |
| ListenableActionFuture<CreateSnapshotResponse> snapshotFuture = client.admin().cluster().prepareCreateSnapshot(""test-repo"", ""test-snap"").setWaitForCompletion(true).setIndices(""test-idx"").execute(); |
|
|
| |
| assertBusyPendingTasks(""update snapshot state"", numberOfShards); |
| snapshotListener.unblock(); |
|
|
| |
| CreateSnapshotResponse createSnapshotResponse = snapshotFuture.actionGet(); |
| assertEquals(SnapshotState.SUCCESS, createSnapshotResponse.getSnapshotInfo().state()); |
| assertEquals(numberOfShards, createSnapshotResponse.getSnapshotInfo().totalShards()); |
| assertEquals(numberOfShards, createSnapshotResponse.getSnapshotInfo().successfulShards()); |
|
|
| } finally { |
| clusterService.remove(snapshotListener); |
| } |
|
|
| |
| assertFalse(snapshotListener.timedOut()); |
| |
| assertEquals(1, snapshotListener.count()); |
|
|
| logger.info(""--> close indices""); |
| client.admin().indices().prepareClose(""test-idx"").get(); |
|
|
| BlockingClusterStateListener restoreListener = new BlockingClusterStateListener(clusterService, ""restore_snapshot["", ""update snapshot state"", Priority.HIGH); |
|
|
| try { |
| clusterService.addFirst(restoreListener); |
| logger.info(""--> restore snapshot""); |
| ListenableActionFuture<RestoreSnapshotResponse> futureRestore = client.admin().cluster().prepareRestoreSnapshot(""test-repo"", ""test-snap"").setWaitForCompletion(true).execute(); |
|
|
| |
| assertBusyPendingTasks(""update snapshot state"", numberOfShards); |
| restoreListener.unblock(); |
|
|
| RestoreSnapshotResponse restoreSnapshotResponse = futureRestore.actionGet(); |
| assertThat(restoreSnapshotResponse.getRestoreInfo().totalShards(), equalTo(numberOfShards)); |
|
|
| } finally { |
| clusterService.remove(restoreListener); |
| } |
|
|
| |
| assertFalse(restoreListener.timedOut()); |
| |
| assertEquals(1, restoreListener.count()); |
| } |
|
|
| " |
| 264,1," private File getLocationUnderBuild(AbstractBuild build) { |
| return new File(build.getRootDir(), ""fileParameters/"" + location); |
| } |
|
|
| /** |
| * Default implementation from {@link File}. |
| */ |
| " |
| 265,1," protected Details authenticate(String username, String password) throws AuthenticationException { |
| Details u = loadUserByUsername(username); |
| if (!u.isPasswordCorrect(password)) |
| throw new BadCredentialsException(""Failed to login as ""+username); |
| return u; |
| } |
|
|
| /** |
| * Show the sign up page with the data from the identity. |
| */ |
| @Override |
| " |
| 266,1," public void resetPassword_InvalidPasswordException_NewPasswordSameAsOld() { |
| ScimUser user = new ScimUser(""user-id"", ""username"", ""firstname"", ""lastname""); |
| user.setMeta(new ScimMeta(new Date(), new Date(), 0)); |
| user.setPrimaryEmail(""foo@example.com""); |
| ExpiringCode expiringCode = new ExpiringCode(""good_code"", |
| new Timestamp(System.currentTimeMillis() + UaaResetPasswordService.PASSWORD_RESET_LIFETIME), ""user-id"", null); |
| when(codeStore.retrieveCode(""good_code"")).thenReturn(expiringCode); |
| when(scimUserProvisioning.retrieve(""user-id"")).thenReturn(user); |
| when(scimUserProvisioning.checkPasswordMatches(""user-id"", ""Passwo3dAsOld"")) |
| .thenThrow(new InvalidPasswordException(""Your new password cannot be the same as the old password."", UNPROCESSABLE_ENTITY)); |
| SecurityContext securityContext = mock(SecurityContext.class); |
| when(securityContext.getAuthentication()).thenReturn(new MockAuthentication()); |
| SecurityContextHolder.setContext(securityContext); |
| try { |
| emailResetPasswordService.resetPassword(""good_code"", ""Passwo3dAsOld""); |
| fail(); |
| } catch (InvalidPasswordException e) { |
| assertEquals(""Your new password cannot be the same as the old password."", e.getMessage()); |
| assertEquals(UNPROCESSABLE_ENTITY, e.getStatus()); |
| } |
| } |
|
|
| @Test |
| " |
| 267,1," public boolean getValidateClientProvidedNewSessionId() { return false; } |
| " |
| 268,1," protected Http11AprProcessor createProcessor() { |
| Http11AprProcessor processor = new Http11AprProcessor( |
| proto.getMaxHttpHeaderSize(), (AprEndpoint)proto.endpoint, |
| proto.getMaxTrailerSize()); |
| processor.setAdapter(proto.getAdapter()); |
| processor.setMaxKeepAliveRequests(proto.getMaxKeepAliveRequests()); |
| processor.setKeepAliveTimeout(proto.getKeepAliveTimeout()); |
| processor.setConnectionUploadTimeout( |
| proto.getConnectionUploadTimeout()); |
| processor.setDisableUploadTimeout(proto.getDisableUploadTimeout()); |
| processor.setCompressionMinSize(proto.getCompressionMinSize()); |
| processor.setCompression(proto.getCompression()); |
| processor.setNoCompressionUserAgents(proto.getNoCompressionUserAgents()); |
| processor.setCompressableMimeTypes(proto.getCompressableMimeTypes()); |
| processor.setRestrictedUserAgents(proto.getRestrictedUserAgents()); |
| processor.setSocketBuffer(proto.getSocketBuffer()); |
| processor.setMaxSavePostSize(proto.getMaxSavePostSize()); |
| processor.setServer(proto.getServer()); |
| processor.setClientCertProvider(proto.getClientCertProvider()); |
| register(processor); |
| return processor; |
| } |
|
|
| @Override |
| " |
| 269,1," public synchronized Servlet loadServlet() throws ServletException { |
|
|
| |
| if (!singleThreadModel && (instance != null)) |
| return instance; |
|
|
| PrintStream out = System.out; |
| if (swallowOutput) { |
| SystemLogHandler.startCapture(); |
| } |
|
|
| Servlet servlet; |
| try { |
| long t1=System.currentTimeMillis(); |
| |
| if (servletClass == null) { |
| unavailable(null); |
| throw new ServletException |
| (sm.getString(""standardWrapper.notClass"", getName())); |
| } |
|
|
| InstanceManager instanceManager = ((StandardContext)getParent()).getInstanceManager(); |
| try { |
| servlet = (Servlet) instanceManager.newInstance(servletClass); |
| } catch (ClassCastException e) { |
| unavailable(null); |
| |
| throw new ServletException |
| (sm.getString(""standardWrapper.notServlet"", servletClass), e); |
| } catch (Throwable e) { |
| ExceptionUtils.handleThrowable(e); |
| unavailable(null); |
|
|
| |
| |
| if(log.isDebugEnabled()) { |
| log.debug(sm.getString(""standardWrapper.instantiate"", servletClass), e); |
| } |
|
|
| |
| throw new ServletException |
| (sm.getString(""standardWrapper.instantiate"", servletClass), e); |
| } |
|
|
| if (multipartConfigElement == null) { |
| MultipartConfig annotation = |
| servlet.getClass().getAnnotation(MultipartConfig.class); |
| if (annotation != null) { |
| multipartConfigElement = |
| new MultipartConfigElement(annotation); |
| } |
| } |
|
|
| ServletSecurity secAnnotation = |
| servlet.getClass().getAnnotation(ServletSecurity.class); |
| Context ctxt = (Context) getParent(); |
| if (secAnnotation != null) { |
| ctxt.addServletSecurity( |
| new ApplicationServletRegistration(this, ctxt), |
| new ServletSecurityElement(secAnnotation)); |
| } |
| |
|
|
| |
| if ((servlet instanceof ContainerServlet) && |
| (isContainerProvidedServlet(servletClass) || |
| ctxt.getPrivileged() )) { |
| ((ContainerServlet) servlet).setWrapper(this); |
| } |
|
|
| classLoadTime=(int) (System.currentTimeMillis() -t1); |
|
|
| initServlet(servlet); |
|
|
| |
| singleThreadModel = servlet instanceof SingleThreadModel; |
| if (singleThreadModel) { |
| if (instancePool == null) |
| instancePool = new Stack<Servlet>(); |
| } |
| fireContainerEvent(""load"", this); |
|
|
| loadTime=System.currentTimeMillis() -t1; |
| } finally { |
| if (swallowOutput) { |
| String log = SystemLogHandler.stopCapture(); |
| if (log != null && log.length() > 0) { |
| if (getServletContext() != null) { |
| getServletContext().log(log); |
| } else { |
| out.println(log); |
| } |
| } |
| } |
| } |
| return servlet; |
|
|
| } |
|
|
| " |
| 270,1," public void testWelcomeFileStrict() throws Exception { |
|
|
| Tomcat tomcat = getTomcatInstance(); |
|
|
| File appDir = new File(""test/webapp""); |
|
|
| StandardContext ctxt = (StandardContext) tomcat.addWebapp(null, ""/test"", |
| appDir.getAbsolutePath()); |
| ctxt.setReplaceWelcomeFiles(true); |
| ctxt.addWelcomeFile(""index.jsp""); |
| |
| ctxt.addWelcomeFile(""index.do""); |
|
|
| |
| ctxt.setResourceOnlyServlets(""""); |
|
|
| tomcat.start(); |
| ByteChunk bc = new ByteChunk(); |
| int rc = getUrl(""http: |
| ""/test/welcome-files"", bc, new HashMap<String,List<String>>()); |
| Assert.assertEquals(HttpServletResponse.SC_OK, rc); |
| Assert.assertTrue(bc.toString().contains(""JSP"")); |
|
|
| rc = getUrl(""http: |
| ""/test/welcome-files/sub"", bc, |
| new HashMap<String,List<String>>()); |
| Assert.assertEquals(HttpServletResponse.SC_NOT_FOUND, rc); |
| } |
|
|
| /** |
| * Prepare a string to search in messages that contain a timestamp, when it |
| * is known that the timestamp was printed between {@code timeA} and |
| * {@code timeB}. |
| */ |
| " |
| 271,1," protected void stripScopesFromAuthentication(String identityZoneId, HttpServletRequest servletRequest) { |
| OAuth2Authentication oa = (OAuth2Authentication)SecurityContextHolder.getContext().getAuthentication(); |
|
|
| Object oaDetails = oa.getDetails(); |
|
|
| |
| OAuth2Request request = oa.getOAuth2Request(); |
| Collection<String> requestAuthorities = UaaStringUtils.getStringsFromAuthorities(request.getAuthorities()); |
| Set<String> clientScopes = new HashSet<>(); |
| Set<String> clientAuthorities = new HashSet<>(); |
| for (String s : getZoneSwitchingScopes(identityZoneId)) { |
| String scope = stripPrefix(s, identityZoneId); |
| if (request.getScope().contains(s)) { |
| clientScopes.add(scope); |
| } |
| if (requestAuthorities.contains(s)) { |
| clientAuthorities.add(scope); |
| } |
| } |
| request = new OAuth2Request( |
| request.getRequestParameters(), |
| request.getClientId(), |
| UaaStringUtils.getAuthoritiesFromStrings(clientAuthorities), |
| request.isApproved(), |
| clientScopes, |
| request.getResourceIds(), |
| request.getRedirectUri(), |
| request.getResponseTypes(), |
| request.getExtensions() |
| ); |
|
|
|
|
| UaaAuthentication userAuthentication = (UaaAuthentication)oa.getUserAuthentication(); |
| if (userAuthentication!=null) { |
| userAuthentication = new UaaAuthentication( |
| userAuthentication.getPrincipal(), |
| null, |
| UaaStringUtils.getAuthoritiesFromStrings(clientScopes), |
| new UaaAuthenticationDetails(servletRequest), |
| true); |
| } |
| oa = new OAuth2Authentication(request, userAuthentication); |
| oa.setDetails(oaDetails); |
| SecurityContextHolder.getContext().setAuthentication(oa); |
| } |
|
|
| " |
| 272,1," public void testHandleNoInitialResponseNull() throws Exception |
| { |
| final AuthenticationResult result = _negotiator.handleResponse(null); |
| assertEquals(""Unexpected authentication status"", AuthenticationResult.AuthenticationStatus.CONTINUE, result.getStatus()); |
| assertArrayEquals(""Unexpected authentication challenge"", new byte[0], result.getChallenge()); |
|
|
| final AuthenticationResult firstResult = _negotiator.handleResponse(VALID_RESPONSE.getBytes()); |
| assertEquals(""Unexpected first authentication result"", _expectedResult, firstResult); |
| } |
| " |
| 273,1," private int readStored(final byte[] buffer, final int offset, final int length) throws IOException { |
|
|
| if (current.hasDataDescriptor) { |
| if (lastStoredEntry == null) { |
| readStoredEntry(); |
| } |
| return lastStoredEntry.read(buffer, offset, length); |
| } |
|
|
| final long csize = current.entry.getSize(); |
| if (current.bytesRead >= csize) { |
| return -1; |
| } |
|
|
| if (buf.position() >= buf.limit()) { |
| buf.position(0); |
| final int l = in.read(buf.array()); |
| if (l == -1) { |
| return -1; |
| } |
| buf.limit(l); |
|
|
| count(l); |
| current.bytesReadFromStream += l; |
| } |
|
|
| int toRead = Math.min(buf.remaining(), length); |
| if ((csize - current.bytesRead) < toRead) { |
| |
| toRead = (int) (csize - current.bytesRead); |
| } |
| buf.get(buffer, offset, toRead); |
| current.bytesRead += toRead; |
| return toRead; |
| } |
|
|
| /** |
| * Implementation of read for DEFLATED entries. |
| */ |
| " |
| 274,1," private Object readResolve() { |
| return INSTANCE; |
| } |
|
|
| " |
| 275,1," private static ZipOutputStream getZipOutputStream(OutputStream out, Charset charset) { |
| charset = (null == charset) ? DEFAULT_CHARSET : charset; |
| return new ZipOutputStream(out, charset); |
| } |
|
|
| /** |
| * 递归压缩文件夹 |
| * |
| * @param out 压缩文件存储对象 |
| * @param srcRootDir 压缩文件夹根目录的子路径 |
| * @param file 当前递归压缩的文件或目录对象 |
| * @throws UtilException IO异常 |
| */ |
| " |
| 276,1," public boolean isFinished() { |
| return endChunk; |
| } |
| " |
| 277,1," public Object compile(String expression) throws OgnlException { |
| if (enableExpressionCache) { |
| Object o = expressions.get(expression); |
| if (o == null) { |
| o = Ognl.parseExpression(expression); |
| expressions.putIfAbsent(expression, o); |
| } |
| return o; |
| } else |
| return Ognl.parseExpression(expression); |
| } |
|
|
| /** |
| * Copies the properties in the object ""from"" and sets them in the object ""to"" |
| * using specified type converter, or {@link com.opensymphony.xwork2.conversion.impl.XWorkConverter} if none |
| * is specified. |
| * |
| * @param from the source object |
| * @param to the target object |
| * @param context the action context we're running under |
| * @param exclusions collection of method names to excluded from copying ( can be null) |
| * @param inclusions collection of method names to included copying (can be null) |
| * note if exclusions AND inclusions are supplied and not null nothing will get copied. |
| */ |
| " |
| 278,1," String hash(String plaintext, String salt, int iterations) throws EncryptionException; |
| |
| /** |
| * Encrypts the provided plaintext and returns a ciphertext string using the |
| * master secret key and default cipher transformation. |
| * </p><p> |
| * <b>Compatibility with earlier ESAPI versions:</b> The symmetric encryption |
| * in ESAPI 2.0 and later is not compatible with the encryption in ESAPI 1.4 |
| * or earlier. Not only are the interfaces slightly different, but they format |
| * of the serialized encrypted data is incompatible. Therefore, if you have |
| * encrypted data with ESAPI 1.4 or earlier, you must first encrypt it and |
| * then re-encrypt it with ESAPI 2.0. Backward compatibility with ESAPI 1.4 |
| * was proposed to both the ESAPI Developers and ESAPI Users mailing lists |
| * and voted down. More details are available in the ESAPI document |
| * <a href=""http://owasp-esapi-java.googlecode.com/svn/trunk/documentation/esapi4java-core-2.0-readme-crypto-changes.html""> |
| * Why Is OWASP Changing ESAPI Encryption?</a> |
| * </p><p> |
| * <b>Why this method is deprecated:</b> Most cryptographers strongly suggest |
| * that if you are creating crypto functionality for general-purpose use, |
| * at a minimum you should ensure that it provides authenticity, integrity, |
| * and confidentiality. This method only provides confidentiality, but not |
| * authenticity or integrity. Therefore, you are encouraged to use |
| * one of the other encryption methods referenced below. Because this |
| * method provides neither authenticity nor integrity, it may be |
| * removed in some future ESAPI Java release. Note: there are some cases |
| * where authenticity / integrity are not that important. For instance, consider |
| * a case where the encrypted data is never out of your application's control. For |
| * example, if you receive data that your application is encrypting itself and then |
| * storing the encrypted data in its own database for later use (and no other |
| * applications can query or update that column of the database), providing |
| * confidentiality alone might be sufficient. However, if there are cases |
| * where your application will be sending or receiving already encrypted data |
| * over an insecure, unauthenticated channel, in such cases authenticity and |
| * integrity of the encrypted data likely is important and this method should |
| * be avoided in favor of one of the other two. |
| * |
| * @param plaintext |
| * the plaintext {@code String} to encrypt. Note that if you are encrypting |
| * general bytes, you should encypt that byte array to a String using |
| * ""UTF-8"" encoding. |
| * |
| * @return |
| * the encrypted, base64-encoded String representation of 'plaintext' plus |
| * the random IV used. |
| * |
| * @throws EncryptionException |
| * if the specified encryption algorithm could not be found or another problem exists with |
| * the encryption of 'plaintext' |
| * |
| * @see #encrypt(PlainText) |
| * @see #encrypt(SecretKey, PlainText) |
| * |
| * @deprecated As of 1.4.2; use {@link #encrypt(PlainText)} instead, which |
| * also ensures message authenticity. This method will be |
| * completely removed as of the next major release or point |
| * release (3.0 or 2.1, whichever comes first) as per OWASP |
| * deprecation policy. |
| */ |
| " |
| 279,1," public void handleDialog(ActionRequest req, ActionResponse resp) throws IOException, PortletException { |
| List<String> lines = new ArrayList<String>(); |
| req.getPortletSession().setAttribute(""lines"", lines); |
|
|
| lines.add(""handling dialog""); |
| StringBuilder txt = new StringBuilder(128); |
|
|
| String clr = req.getActionParameters().getValue(""color""); |
| txt.append(""Color: "").append(clr); |
| lines.add(txt.toString()); |
| LOGGER.fine(txt.toString()); |
|
|
| resp.getRenderParameters().setValue(""color"", clr); |
|
|
| txt.setLength(0); |
| Part part = null; |
| try { |
| part = req.getPart(""file""); |
| } catch (Throwable t) {} |
| |
| if ((part != null) && (part.getSubmittedFileName() != null) && |
| (part.getSubmittedFileName().length() > 0)) { |
| txt.append(""Uploaded file name: "").append(part.getSubmittedFileName()); |
| txt.append("", part name: "").append(part.getName()); |
| txt.append("", size: "").append(part.getSize()); |
| txt.append("", content type: "").append(part.getContentType()); |
| lines.add(txt.toString()); |
| LOGGER.fine(txt.toString()); |
| txt.setLength(0); |
| txt.append(""Headers: ""); |
| String sep = """"; |
| for (String hdrname : part.getHeaderNames()) { |
| txt.append(sep).append(hdrname).append(""="").append(part.getHeaders(hdrname)); |
| sep = "", ""; |
| } |
| lines.add(txt.toString()); |
| LOGGER.fine(txt.toString()); |
|
|
| |
| |
| |
| |
|
|
| try { |
| String path = req.getPortletContext().getRealPath(TMP); |
| File dir = new File(path); |
| lines.add(""Temp path: "" + dir.getCanonicalPath()); |
| if (!dir.exists()) { |
| lines.add(""Creating directory. Path: "" + dir.getCanonicalPath()); |
| Files.createDirectories(dir.toPath()); |
| } |
| String fn = TMP + part.getSubmittedFileName(); |
| lines.add(""Temp file: "" + fn); |
| path = req.getPortletContext().getRealPath(fn); |
| File img = new File(path); |
| if (img.exists()) { |
| lines.add(""deleting existing temp file.""); |
| img.delete(); |
| } |
| InputStream is = part.getInputStream(); |
| Files.copy(is, img.toPath(), StandardCopyOption.REPLACE_EXISTING); |
|
|
| resp.getRenderParameters().setValue(""fn"", fn); |
| resp.getRenderParameters().setValue(""ct"", part.getContentType()); |
|
|
| } catch (Exception e) { |
| lines.add(""Exception doing I/O: "" + e.toString()); |
| } |
| } else { |
| lines.add(""file part was null""); |
| } |
|
|
| } |
|
|
| @RenderMethod(portletNames = ""MultipartPortlet"") |
| " |
| 280,1," protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain filterChain) |
| throws ServletException, IOException { |
|
|
| HttpServletRequest requestToUse = request; |
|
|
| if (""POST"".equals(request.getMethod()) && request.getAttribute(WebUtils.ERROR_EXCEPTION_ATTRIBUTE) == null) { |
| String paramValue = request.getParameter(this.methodParam); |
| if (StringUtils.hasLength(paramValue)) { |
| requestToUse = new HttpMethodRequestWrapper(request, paramValue); |
| } |
| } |
|
|
| filterChain.doFilter(requestToUse, response); |
| } |
|
|
|
|
| /** |
| * Simple {@link HttpServletRequest} wrapper that returns the supplied method for |
| * {@link HttpServletRequest#getMethod()}. |
| */ |
| " |
| 281,1," private ScimGroupExternalMember getExternalGroupMap(final String groupId, |
| final String externalGroup, |
| final String origin) |
| throws ScimResourceNotFoundException { |
| try { |
| ScimGroupExternalMember u = jdbcTemplate.queryForObject(GET_GROUPS_WITH_EXTERNAL_GROUP_MAPPINGS_SQL, |
| rowMapper, groupId, origin, externalGroup); |
| return u; |
| } catch (EmptyResultDataAccessException e) { |
| throw new ScimResourceNotFoundException(""The mapping between groupId "" + groupId + "" and external group "" |
| + externalGroup + "" does not exist""); |
| } |
| } |
|
|
| " |
| 282,1," protected void serveResource(HttpServletRequest request, |
| HttpServletResponse response, |
| boolean content, |
| String encoding) |
| throws IOException, ServletException { |
|
|
| boolean serveContent = content; |
|
|
| |
| String path = getRelativePath(request); |
| if (debug > 0) { |
| if (serveContent) |
| log(""DefaultServlet.serveResource: Serving resource '"" + |
| path + ""' headers and data""); |
| else |
| log(""DefaultServlet.serveResource: Serving resource '"" + |
| path + ""' headers only""); |
| } |
|
|
| WebResource resource = resources.getResource(path); |
|
|
| if (!resource.exists()) { |
| |
| |
| String requestUri = (String) request.getAttribute( |
| RequestDispatcher.INCLUDE_REQUEST_URI); |
| if (requestUri == null) { |
| requestUri = request.getRequestURI(); |
| } else { |
| |
| |
| throw new FileNotFoundException(sm.getString( |
| ""defaultServlet.missingResource"", requestUri)); |
| } |
|
|
| response.sendError(HttpServletResponse.SC_NOT_FOUND, requestUri); |
| return; |
| } |
|
|
| if (!resource.canRead()) { |
| |
| |
| String requestUri = (String) request.getAttribute( |
| RequestDispatcher.INCLUDE_REQUEST_URI); |
| if (requestUri == null) { |
| requestUri = request.getRequestURI(); |
| } else { |
| |
| |
| |
| throw new FileNotFoundException(sm.getString( |
| ""defaultServlet.missingResource"", requestUri)); |
| } |
|
|
| response.sendError(HttpServletResponse.SC_FORBIDDEN, requestUri); |
| return; |
| } |
|
|
| |
| |
| if (resource.isFile() && (path.endsWith(""/"") || path.endsWith(""\\""))) { |
| |
| |
| String requestUri = (String) request.getAttribute( |
| RequestDispatcher.INCLUDE_REQUEST_URI); |
| if (requestUri == null) { |
| requestUri = request.getRequestURI(); |
| } |
| response.sendError(HttpServletResponse.SC_NOT_FOUND, requestUri); |
| return; |
| } |
|
|
| boolean isError = response.getStatus() >= HttpServletResponse.SC_BAD_REQUEST; |
|
|
| boolean included = false; |
| |
| |
| if (resource.isFile()) { |
| |
| included = (request.getAttribute( |
| RequestDispatcher.INCLUDE_CONTEXT_PATH) != null); |
| if (!included && !isError && !checkIfHeaders(request, response, resource)) { |
| return; |
| } |
| } |
|
|
| |
| String contentType = resource.getMimeType(); |
| if (contentType == null) { |
| contentType = getServletContext().getMimeType(resource.getName()); |
| resource.setMimeType(contentType); |
| } |
|
|
| |
| |
| |
| String eTag = null; |
| String lastModifiedHttp = null; |
| if (resource.isFile() && !isError) { |
| eTag = resource.getETag(); |
| lastModifiedHttp = resource.getLastModifiedHttp(); |
| } |
|
|
|
|
| |
| boolean usingGzippedVersion = false; |
| if (gzip && !included && resource.isFile() && !path.endsWith("".gz"")) { |
| WebResource gzipResource = resources.getResource(path + "".gz""); |
| if (gzipResource.exists() && gzipResource.isFile()) { |
| Collection<String> varyHeaders = response.getHeaders(""Vary""); |
| boolean addRequired = true; |
| for (String varyHeader : varyHeaders) { |
| if (""*"".equals(varyHeader) || |
| ""accept-encoding"".equalsIgnoreCase(varyHeader)) { |
| addRequired = false; |
| break; |
| } |
| } |
| if (addRequired) { |
| response.addHeader(""Vary"", ""accept-encoding""); |
| } |
| if (checkIfGzip(request)) { |
| response.addHeader(""Content-Encoding"", ""gzip""); |
| resource = gzipResource; |
| usingGzippedVersion = true; |
| } |
| } |
| } |
|
|
| ArrayList<Range> ranges = null; |
| long contentLength = -1L; |
|
|
| if (resource.isDirectory()) { |
| |
| |
| if (!listings) { |
| response.sendError(HttpServletResponse.SC_NOT_FOUND, |
| request.getRequestURI()); |
| return; |
| } |
| contentType = ""text/html;charset=UTF-8""; |
| } else { |
| if (!isError) { |
| if (useAcceptRanges) { |
| |
| response.setHeader(""Accept-Ranges"", ""bytes""); |
| } |
|
|
| |
| ranges = parseRange(request, response, resource); |
|
|
| |
| response.setHeader(""ETag"", eTag); |
|
|
| |
| response.setHeader(""Last-Modified"", lastModifiedHttp); |
| } |
|
|
| |
| contentLength = resource.getContentLength(); |
| |
| |
| if (contentLength == 0L) { |
| serveContent = false; |
| } |
| } |
|
|
| ServletOutputStream ostream = null; |
| PrintWriter writer = null; |
|
|
| if (serveContent) { |
| |
| try { |
| ostream = response.getOutputStream(); |
| } catch (IllegalStateException e) { |
| |
| |
| if (!usingGzippedVersion && |
| ((contentType == null) || |
| (contentType.startsWith(""text"")) || |
| (contentType.endsWith(""xml"")) || |
| (contentType.contains(""/javascript""))) |
| ) { |
| writer = response.getWriter(); |
| |
| ranges = FULL; |
| } else { |
| throw e; |
| } |
| } |
| } |
|
|
| |
| |
| |
| ServletResponse r = response; |
| long contentWritten = 0; |
| while (r instanceof ServletResponseWrapper) { |
| r = ((ServletResponseWrapper) r).getResponse(); |
| } |
| if (r instanceof ResponseFacade) { |
| contentWritten = ((ResponseFacade) r).getContentWritten(); |
| } |
| if (contentWritten > 0) { |
| ranges = FULL; |
| } |
|
|
| if (resource.isDirectory() || |
| isError || |
| ( (ranges == null || ranges.isEmpty()) |
| && request.getHeader(""Range"") == null ) || |
| ranges == FULL ) { |
|
|
| |
| if (contentType != null) { |
| if (debug > 0) |
| log(""DefaultServlet.serveFile: contentType='"" + |
| contentType + ""'""); |
| response.setContentType(contentType); |
| } |
| if (resource.isFile() && contentLength >= 0 && |
| (!serveContent || ostream != null)) { |
| if (debug > 0) |
| log(""DefaultServlet.serveFile: contentLength="" + |
| contentLength); |
| |
| |
| if (contentWritten == 0) { |
| response.setContentLengthLong(contentLength); |
| } |
| } |
|
|
| if (serveContent) { |
| try { |
| response.setBufferSize(output); |
| } catch (IllegalStateException e) { |
| |
| } |
| InputStream renderResult = null; |
| if (ostream == null) { |
| |
| |
| if (resource.isDirectory()) { |
| renderResult = render(getPathPrefix(request), resource); |
| } else { |
| renderResult = resource.getInputStream(); |
| } |
| copy(resource, renderResult, writer, encoding); |
| } else { |
| |
| if (resource.isDirectory()) { |
| renderResult = render(getPathPrefix(request), resource); |
| } else { |
| |
| if (!checkSendfile(request, response, resource, |
| contentLength, null)) { |
| |
| |
| byte[] resourceBody = resource.getContent(); |
| if (resourceBody == null) { |
| |
| |
| renderResult = resource.getInputStream(); |
| } else { |
| |
| ostream.write(resourceBody); |
| } |
| } |
| } |
| |
| |
| if (renderResult != null) { |
| copy(resource, renderResult, ostream); |
| } |
| } |
| } |
|
|
| } else { |
|
|
| if ((ranges == null) || (ranges.isEmpty())) |
| return; |
|
|
| |
|
|
| response.setStatus(HttpServletResponse.SC_PARTIAL_CONTENT); |
|
|
| if (ranges.size() == 1) { |
|
|
| Range range = ranges.get(0); |
| response.addHeader(""Content-Range"", ""bytes "" |
| + range.start |
| + ""-"" + range.end + ""/"" |
| + range.length); |
| long length = range.end - range.start + 1; |
| response.setContentLengthLong(length); |
|
|
| if (contentType != null) { |
| if (debug > 0) |
| log(""DefaultServlet.serveFile: contentType='"" + |
| contentType + ""'""); |
| response.setContentType(contentType); |
| } |
|
|
| if (serveContent) { |
| try { |
| response.setBufferSize(output); |
| } catch (IllegalStateException e) { |
| |
| } |
| if (ostream != null) { |
| if (!checkSendfile(request, response, resource, |
| range.end - range.start + 1, range)) |
| copy(resource, ostream, range); |
| } else { |
| |
| throw new IllegalStateException(); |
| } |
| } |
| } else { |
| response.setContentType(""multipart/byteranges; boundary="" |
| + mimeSeparation); |
| if (serveContent) { |
| try { |
| response.setBufferSize(output); |
| } catch (IllegalStateException e) { |
| |
| } |
| if (ostream != null) { |
| copy(resource, ostream, ranges.iterator(), contentType); |
| } else { |
| |
| throw new IllegalStateException(); |
| } |
| } |
| } |
| } |
| } |
|
|
|
|
| /** |
| * Parse the content-range header. |
| * |
| * @param request The servlet request we a)re processing |
| * @param response The servlet response we are creating |
| * @return Range |
| */ |
| " |
| 283,1," private void findCloneMethod() { |
| try { |
| iCloneMethod = iPrototype.getClass().getMethod(""clone"", (Class[]) null); |
| } catch (final NoSuchMethodException ex) { |
| throw new IllegalArgumentException(""PrototypeCloneFactory: The clone method must exist and be public ""); |
| } |
| } |
|
|
| /** |
| * Creates an object by calling the clone method. |
| * |
| * @return the new object |
| */ |
| @SuppressWarnings(""unchecked"") |
| " |
| 284,1," public boolean isSequenceType() { return false; } |
|
|
|
|
| /* Traverseproc implementation */ |
| @Override |
| " |
| 285,1," public void setDynamicAttribute(String uri, String localName, Object value) throws JspException { |
| if (ComponentUtils.altSyntax(getStack()) && ComponentUtils.isExpression(value)) { |
| dynamicAttributes.put(localName, String.valueOf(ObjectUtils.defaultIfNull(findValue(value.toString()), value))); |
| } else { |
| dynamicAttributes.put(localName, value); |
| } |
| } |
|
|
| " |
| 286,1," protected void onModified() throws IOException { |
| super.onModified(); |
| Jenkins.getInstance().trimLabels(); |
| } |
| } |
|
|
| /** |
| * Set of installed cluster nodes. |
| * <p> |
| * We use this field with copy-on-write semantics. |
| * This field has mutable list (to keep the serialization look clean), |
| * but it shall never be modified. Only new completely populated slave |
| * list can be set here. |
| * <p> |
| * The field name should be really {@code nodes}, but again the backward compatibility |
| * prevents us from renaming. |
| */ |
| protected volatile NodeList slaves; |
|
|
| /** |
| * Quiet period. |
| * |
| * This is {@link Integer} so that we can initialize it to '5' for upgrading users. |
| */ |
| /*package*/ Integer quietPeriod; |
|
|
| /** |
| * Global default for {@link AbstractProject#getScmCheckoutRetryCount()} |
| */ |
| /*package*/ int scmCheckoutRetryCount; |
|
|
| /** |
| * {@link View}s. |
| */ |
| private final CopyOnWriteArrayList<View> views = new CopyOnWriteArrayList<View>(); |
|
|
| /** |
| * Name of the primary view. |
| * <p> |
| * Start with null, so that we can upgrade pre-1.269 data well. |
| * @since 1.269 |
| */ |
| private volatile String primaryView; |
|
|
| private transient final ViewGroupMixIn viewGroupMixIn = new ViewGroupMixIn(this) { |
| protected List<View> views() { return views; } |
| protected String primaryView() { return primaryView; } |
| protected void primaryView(String name) { primaryView=name; } |
| }; |
|
|
|
|
| private transient final FingerprintMap fingerprintMap = new FingerprintMap(); |
|
|
| /** |
| * Loaded plugins. |
| */ |
| public transient final PluginManager pluginManager; |
|
|
| public transient volatile TcpSlaveAgentListener tcpSlaveAgentListener; |
|
|
| private transient UDPBroadcastThread udpBroadcastThread; |
|
|
| private transient DNSMultiCast dnsMultiCast; |
|
|
| /** |
| * List of registered {@link SCMListener}s. |
| */ |
| private transient final CopyOnWriteList<SCMListener> scmListeners = new CopyOnWriteList<SCMListener>(); |
|
|
| /** |
| * TCP slave agent port. |
| * 0 for random, -1 to disable. |
| */ |
| private int slaveAgentPort =0; |
|
|
| /** |
| * Whitespace-separated labels assigned to the master as a {@link Node}. |
| */ |
| private String label=""""; |
|
|
| /** |
| * {@link hudson.security.csrf.CrumbIssuer} |
| */ |
| private volatile CrumbIssuer crumbIssuer; |
|
|
| /** |
| * All labels known to Jenkins. This allows us to reuse the same label instances |
| * as much as possible, even though that's not a strict requirement. |
| */ |
| private transient final ConcurrentHashMap<String,Label> labels = new ConcurrentHashMap<String,Label>(); |
|
|
| /** |
| * Load statistics of the entire system. |
| * |
| * This includes every executor and every job in the system. |
| */ |
| @Exported |
| public transient final OverallLoadStatistics overallLoad = new OverallLoadStatistics(); |
|
|
| /** |
| * Load statistics of the free roaming jobs and slaves. |
| * |
| * This includes all executors on {@link Mode#NORMAL} nodes and jobs that do not have any assigned nodes. |
| * |
| * @since 1.467 |
| */ |
| @Exported |
| public transient final LoadStatistics unlabeledLoad = new UnlabeledLoadStatistics(); |
|
|
| /** |
| * {@link NodeProvisioner} that reacts to {@link #unlabeledLoad}. |
| * @since 1.467 |
| */ |
| public transient final NodeProvisioner unlabeledNodeProvisioner = new NodeProvisioner(null,unlabeledLoad); |
|
|
| /** |
| * @deprecated as of 1.467 |
| * Use {@link #unlabeledNodeProvisioner}. |
| * This was broken because it was tracking all the executors in the system, but it was only tracking |
| * free-roaming jobs in the queue. So {@link Cloud} fails to launch nodes when you have some exclusive |
| * slaves and free-roaming jobs in the queue. |
| */ |
| @Restricted(NoExternalUse.class) |
| public transient final NodeProvisioner overallNodeProvisioner = unlabeledNodeProvisioner; |
|
|
|
|
| public transient final ServletContext servletContext; |
|
|
| /** |
| * Transient action list. Useful for adding navigation items to the navigation bar |
| * on the left. |
| */ |
| private transient final List<Action> actions = new CopyOnWriteArrayList<Action>(); |
|
|
| /** |
| * List of master node properties |
| */ |
| private DescribableList<NodeProperty<?>,NodePropertyDescriptor> nodeProperties = new DescribableList<NodeProperty<?>,NodePropertyDescriptor>(this); |
|
|
| /** |
| * List of global properties |
| */ |
| private DescribableList<NodeProperty<?>,NodePropertyDescriptor> globalNodeProperties = new DescribableList<NodeProperty<?>,NodePropertyDescriptor>(this); |
|
|
| /** |
| * {@link AdministrativeMonitor}s installed on this system. |
| * |
| * @see AdministrativeMonitor |
| */ |
| public transient final List<AdministrativeMonitor> administrativeMonitors = getExtensionList(AdministrativeMonitor.class); |
|
|
| /** |
| * Widgets on Hudson. |
| */ |
| private transient final List<Widget> widgets = getExtensionList(Widget.class); |
|
|
| /** |
| * {@link AdjunctManager} |
| */ |
| private transient final AdjunctManager adjuncts; |
|
|
| /** |
| * Code that handles {@link ItemGroup} work. |
| */ |
| private transient final ItemGroupMixIn itemGroupMixIn = new ItemGroupMixIn(this,this) { |
| @Override |
| protected void add(TopLevelItem item) { |
| items.put(item.getName(),item); |
| } |
|
|
| @Override |
| protected File getRootDirFor(String name) { |
| return Jenkins.this.getRootDirFor(name); |
| } |
|
|
| /** |
| * Send the browser to the config page. |
| * use View to trim view/{default-view} from URL if possible |
| */ |
| @Override |
| protected String redirectAfterCreateItem(StaplerRequest req, TopLevelItem result) throws IOException { |
| String redirect = result.getUrl()+""configure""; |
| List<Ancestor> ancestors = req.getAncestors(); |
| for (int i = ancestors.size() - 1; i >= 0; i--) { |
| Object o = ancestors.get(i).getObject(); |
| if (o instanceof View) { |
| redirect = req.getContextPath() + '/' + ((View)o).getUrl() + redirect; |
| break; |
| } |
| } |
| return redirect; |
| } |
| }; |
|
|
|
|
| /** |
| * Hook for a test harness to intercept Jenkins.getInstance() |
| * |
| * Do not use in the production code as the signature may change. |
| */ |
| public interface JenkinsHolder { |
| Jenkins getInstance(); |
| } |
|
|
| static JenkinsHolder HOLDER = new JenkinsHolder() { |
| public Jenkins getInstance() { |
| return theInstance; |
| } |
| }; |
|
|
| @CLIResolver |
| public static Jenkins getInstance() { |
| return HOLDER.getInstance(); |
| } |
|
|
| /** |
| * Secret key generated once and used for a long time, beyond |
| * container start/stop. Persisted outside <tt>config.xml</tt> to avoid |
| * accidental exposure. |
| */ |
| private transient final String secretKey; |
|
|
| private transient final UpdateCenter updateCenter = new UpdateCenter(); |
|
|
| /** |
| * True if the user opted out from the statistics tracking. We'll never send anything if this is true. |
| */ |
| private Boolean noUsageStatistics; |
|
|
| /** |
| * HTTP proxy configuration. |
| */ |
| public transient volatile ProxyConfiguration proxy; |
|
|
| /** |
| * Bound to ""/log"". |
| */ |
| private transient final LogRecorderManager log = new LogRecorderManager(); |
|
|
| protected Jenkins(File root, ServletContext context) throws IOException, InterruptedException, ReactorException { |
| this(root,context,null); |
| } |
|
|
| /** |
| * @param pluginManager |
| * If non-null, use existing plugin manager. create a new one. |
| */ |
| @edu.umd.cs.findbugs.annotations.SuppressWarnings({ |
| ""SC_START_IN_CTOR"", |
| ""ST_WRITE_TO_STATIC_FROM_INSTANCE_METHOD"" |
| }) |
| protected Jenkins(File root, ServletContext context, PluginManager pluginManager) throws IOException, InterruptedException, ReactorException { |
| long start = System.currentTimeMillis(); |
| |
| |
| ACL.impersonate(ACL.SYSTEM); |
| try { |
| this.root = root; |
| this.servletContext = context; |
| computeVersion(context); |
| if(theInstance!=null) |
| throw new IllegalStateException(""second instance""); |
| theInstance = this; |
|
|
| if (!new File(root,""jobs"").exists()) { |
| |
| workspaceDir = ""${JENKINS_HOME}/workspace/${ITEM_FULLNAME}""; |
| } |
|
|
| |
| final InitStrategy is = InitStrategy.get(Thread.currentThread().getContextClassLoader()); |
|
|
| Trigger.timer = new Timer(""Jenkins cron thread""); |
| queue = new Queue(LoadBalancer.CONSISTENT_HASH); |
|
|
| try { |
| dependencyGraph = DependencyGraph.EMPTY; |
| } catch (InternalError e) { |
| if(e.getMessage().contains(""window server"")) { |
| throw new Error(""Looks like the server runs without X. Please specify -Djava.awt.headless=true as JVM option"",e); |
| } |
| throw e; |
| } |
|
|
| |
| TextFile secretFile = new TextFile(new File(getRootDir(),""secret.key"")); |
| if(secretFile.exists()) { |
| secretKey = secretFile.readTrim(); |
| } else { |
| SecureRandom sr = new SecureRandom(); |
| byte[] random = new byte[32]; |
| sr.nextBytes(random); |
| secretKey = Util.toHexString(random); |
| secretFile.write(secretKey); |
| } |
|
|
| try { |
| proxy = ProxyConfiguration.load(); |
| } catch (IOException e) { |
| LOGGER.log(SEVERE, ""Failed to load proxy configuration"", e); |
| } |
|
|
| if (pluginManager==null) |
| pluginManager = new LocalPluginManager(this); |
| this.pluginManager = pluginManager; |
| |
| WebApp.get(servletContext).setClassLoader(pluginManager.uberClassLoader); |
|
|
| adjuncts = new AdjunctManager(servletContext, pluginManager.uberClassLoader,""adjuncts/""+SESSION_HASH); |
|
|
| |
| executeReactor( is, |
| pluginManager.initTasks(is), |
| loadTasks(), |
| InitMilestone.ordering() |
| ); |
|
|
| if(KILL_AFTER_LOAD) |
| System.exit(0); |
|
|
| if(slaveAgentPort!=-1) { |
| try { |
| tcpSlaveAgentListener = new TcpSlaveAgentListener(slaveAgentPort); |
| } catch (BindException e) { |
| new AdministrativeError(getClass().getName()+"".tcpBind"", |
| ""Failed to listen to incoming slave connection"", |
| ""Failed to listen to incoming slave connection. <a href='configure'>Change the port number</a> to solve the problem."",e); |
| } |
| } else |
| tcpSlaveAgentListener = null; |
|
|
| try { |
| udpBroadcastThread = new UDPBroadcastThread(this); |
| udpBroadcastThread.start(); |
| } catch (IOException e) { |
| LOGGER.log(Level.WARNING, ""Failed to broadcast over UDP"",e); |
| } |
| dnsMultiCast = new DNSMultiCast(this); |
|
|
| Timer timer = Trigger.timer; |
| if (timer != null) { |
| timer.scheduleAtFixedRate(new SafeTimerTask() { |
| @Override |
| protected void doRun() throws Exception { |
| trimLabels(); |
| } |
| }, TimeUnit2.MINUTES.toMillis(5), TimeUnit2.MINUTES.toMillis(5)); |
| } |
|
|
| updateComputerList(); |
|
|
| { |
| Computer c = toComputer(); |
| if(c!=null) |
| for (ComputerListener cl : ComputerListener.all()) |
| cl.onOnline(c,StreamTaskListener.fromStdout()); |
| } |
|
|
| for (ItemListener l : ItemListener.all()) { |
| long itemListenerStart = System.currentTimeMillis(); |
| l.onLoaded(); |
| if (LOG_STARTUP_PERFORMANCE) |
| LOGGER.info(String.format(""Took %dms for item listener %s startup"", |
| System.currentTimeMillis()-itemListenerStart,l.getClass().getName())); |
| } |
| |
| if (LOG_STARTUP_PERFORMANCE) |
| LOGGER.info(String.format(""Took %dms for complete Jenkins startup"", |
| System.currentTimeMillis()-start)); |
| } finally { |
| SecurityContextHolder.clearContext(); |
| } |
| } |
|
|
| /** |
| * Executes a reactor. |
| * |
| * @param is |
| * If non-null, this can be consulted for ignoring some tasks. Only used during the initialization of Hudson. |
| */ |
| private void executeReactor(final InitStrategy is, TaskBuilder... builders) throws IOException, InterruptedException, ReactorException { |
| Reactor reactor = new Reactor(builders) { |
| /** |
| * Sets the thread name to the task for better diagnostics. |
| */ |
| @Override |
| protected void runTask(Task task) throws Exception { |
| if (is!=null && is.skipInitTask(task)) return; |
|
|
| ACL.impersonate(ACL.SYSTEM); |
| String taskName = task.getDisplayName(); |
|
|
| Thread t = Thread.currentThread(); |
| String name = t.getName(); |
| if (taskName !=null) |
| t.setName(taskName); |
| try { |
| long start = System.currentTimeMillis(); |
| super.runTask(task); |
| if(LOG_STARTUP_PERFORMANCE) |
| LOGGER.info(String.format(""Took %dms for %s by %s"", |
| System.currentTimeMillis()-start, taskName, name)); |
| } finally { |
| t.setName(name); |
| SecurityContextHolder.clearContext(); |
| } |
| } |
| }; |
|
|
| new InitReactorRunner() { |
| @Override |
| protected void onInitMilestoneAttained(InitMilestone milestone) { |
| initLevel = milestone; |
| } |
| }.run(reactor); |
| } |
|
|
|
|
| public TcpSlaveAgentListener getTcpSlaveAgentListener() { |
| return tcpSlaveAgentListener; |
| } |
|
|
| /** |
| * Makes {@link AdjunctManager} URL-bound. |
| * The dummy parameter allows us to use different URLs for the same adjunct, |
| * for proper cache handling. |
| */ |
| public AdjunctManager getAdjuncts(String dummy) { |
| return adjuncts; |
| } |
|
|
| @Exported |
| public int getSlaveAgentPort() { |
| return slaveAgentPort; |
| } |
|
|
| /** |
| * @param port |
| * 0 to indicate random available TCP port. -1 to disable this service. |
| */ |
| public void setSlaveAgentPort(int port) throws IOException { |
| this.slaveAgentPort = port; |
|
|
| |
| if(tcpSlaveAgentListener==null) { |
| if(slaveAgentPort!=-1) |
| tcpSlaveAgentListener = new TcpSlaveAgentListener(slaveAgentPort); |
| } else { |
| if(tcpSlaveAgentListener.configuredPort!=slaveAgentPort) { |
| tcpSlaveAgentListener.shutdown(); |
| tcpSlaveAgentListener = null; |
| if(slaveAgentPort!=-1) |
| tcpSlaveAgentListener = new TcpSlaveAgentListener(slaveAgentPort); |
| } |
| } |
| } |
|
|
| public void setNodeName(String name) { |
| throw new UnsupportedOperationException(); |
| } |
|
|
| public String getNodeDescription() { |
| return Messages.Hudson_NodeDescription(); |
| } |
|
|
| @Exported |
| public String getDescription() { |
| return systemMessage; |
| } |
|
|
| public PluginManager getPluginManager() { |
| return pluginManager; |
| } |
|
|
| public UpdateCenter getUpdateCenter() { |
| return updateCenter; |
| } |
|
|
| public boolean isUsageStatisticsCollected() { |
| return noUsageStatistics==null || !noUsageStatistics; |
| } |
|
|
| public void setNoUsageStatistics(Boolean noUsageStatistics) throws IOException { |
| this.noUsageStatistics = noUsageStatistics; |
| save(); |
| } |
|
|
| public View.People getPeople() { |
| return new View.People(this); |
| } |
|
|
| /** |
| * @since 1.484 |
| */ |
| public View.AsynchPeople getAsynchPeople() { |
| return new View.AsynchPeople(this); |
| } |
|
|
| /** |
| * Does this {@link View} has any associated user information recorded? |
| */ |
| public boolean hasPeople() { |
| return View.People.isApplicable(items.values()); |
| } |
|
|
| public Api getApi() { |
| return new Api(this); |
| } |
|
|
| /** |
| * Returns a secret key that survives across container start/stop. |
| * <p> |
| * This value is useful for implementing some of the security features. |
| * |
| * @deprecated |
| * Due to the past security advisory, this value should not be used any more to protect sensitive information. |
| * See {@link ConfidentialStore} and {@link ConfidentialKey} for how to store secrets. |
| */ |
| public String getSecretKey() { |
| return secretKey; |
| } |
|
|
| /** |
| * Gets {@linkplain #getSecretKey() the secret key} as a key for AES-128. |
| * @since 1.308 |
| * @deprecated |
| * See {@link #getSecretKey()}. |
| */ |
| public SecretKey getSecretKeyAsAES128() { |
| return Util.toAes128Key(secretKey); |
| } |
|
|
| /** |
| * Returns the unique identifier of this Jenkins that has been historically used to identify |
| * this Jenkins to the outside world. |
| * |
| * <p> |
| * This form of identifier is weak in that it can be impersonated by others. See |
| * https: |
| * that can be challenged and verified. |
| * |
| * @since 1.498 |
| */ |
| @SuppressWarnings(""deprecation"") |
| public String getLegacyInstanceId() { |
| return Util.getDigestOf(getSecretKey()); |
| } |
|
|
| /** |
| * Gets the SCM descriptor by name. Primarily used for making them web-visible. |
| */ |
| public Descriptor<SCM> getScm(String shortClassName) { |
| return findDescriptor(shortClassName,SCM.all()); |
| } |
|
|
| /** |
| * Gets the repository browser descriptor by name. Primarily used for making them web-visible. |
| */ |
| public Descriptor<RepositoryBrowser<?>> getRepositoryBrowser(String shortClassName) { |
| return findDescriptor(shortClassName,RepositoryBrowser.all()); |
| } |
|
|
| /** |
| * Gets the builder descriptor by name. Primarily used for making them web-visible. |
| */ |
| public Descriptor<Builder> getBuilder(String shortClassName) { |
| return findDescriptor(shortClassName, Builder.all()); |
| } |
|
|
| /** |
| * Gets the build wrapper descriptor by name. Primarily used for making them web-visible. |
| */ |
| public Descriptor<BuildWrapper> getBuildWrapper(String shortClassName) { |
| return findDescriptor(shortClassName, BuildWrapper.all()); |
| } |
|
|
| /** |
| * Gets the publisher descriptor by name. Primarily used for making them web-visible. |
| */ |
| public Descriptor<Publisher> getPublisher(String shortClassName) { |
| return findDescriptor(shortClassName, Publisher.all()); |
| } |
|
|
| /** |
| * Gets the trigger descriptor by name. Primarily used for making them web-visible. |
| */ |
| public TriggerDescriptor getTrigger(String shortClassName) { |
| return (TriggerDescriptor) findDescriptor(shortClassName, Trigger.all()); |
| } |
|
|
| /** |
| * Gets the retention strategy descriptor by name. Primarily used for making them web-visible. |
| */ |
| public Descriptor<RetentionStrategy<?>> getRetentionStrategy(String shortClassName) { |
| return findDescriptor(shortClassName, RetentionStrategy.all()); |
| } |
|
|
| /** |
| * Gets the {@link JobPropertyDescriptor} by name. Primarily used for making them web-visible. |
| */ |
| public JobPropertyDescriptor getJobProperty(String shortClassName) { |
| |
| Descriptor d = findDescriptor(shortClassName, JobPropertyDescriptor.all()); |
| return (JobPropertyDescriptor) d; |
| } |
|
|
| /** |
| * @deprecated |
| * UI method. Not meant to be used programatically. |
| */ |
| public ComputerSet getComputer() { |
| return new ComputerSet(); |
| } |
|
|
| /** |
| * Exposes {@link Descriptor} by its name to URL. |
| * |
| * After doing all the {@code getXXX(shortClassName)} methods, I finally realized that |
| * this just doesn't scale. |
| * |
| * @param id |
| * Either {@link Descriptor#getId()} (recommended) or the short name of a {@link Describable} subtype (for compatibility) |
| * @throws IllegalArgumentException if a short name was passed which matches multiple IDs (fail fast) |
| */ |
| @SuppressWarnings({""unchecked"", ""rawtypes""}) // too late to fix |
| public Descriptor getDescriptor(String id) { |
| // legacy descriptors that are reigstered manually doesn't show up in getExtensionList, so check them explicitly. |
| Iterable<Descriptor> descriptors = Iterators.sequence(getExtensionList(Descriptor.class), DescriptorExtensionList.listLegacyInstances()); |
| for (Descriptor d : descriptors) { |
| if (d.getId().equals(id)) { |
| return d; |
| } |
| } |
| Descriptor candidate = null; |
| for (Descriptor d : descriptors) { |
| String name = d.getId(); |
| if (name.substring(name.lastIndexOf('.') + 1).equals(id)) { |
| if (candidate == null) { |
| candidate = d; |
| } else { |
| throw new IllegalArgumentException(id + "" is ambiguous; matches both "" + name + "" and "" + candidate.getId()); |
| } |
| } |
| } |
| return candidate; |
| } |
|
|
| /** |
| * Alias for {@link #getDescriptor(String)}. |
| */ |
| public Descriptor getDescriptorByName(String id) { |
| return getDescriptor(id); |
| } |
|
|
| /** |
| * Gets the {@link Descriptor} that corresponds to the given {@link Describable} type. |
| * <p> |
| * If you have an instance of {@code type} and call {@link Describable#getDescriptor()}, |
| * you'll get the same instance that this method returns. |
| */ |
| public Descriptor getDescriptor(Class<? extends Describable> type) { |
| for( Descriptor d : getExtensionList(Descriptor.class) ) |
| if(d.clazz==type) |
| return d; |
| return null; |
| } |
|
|
| /** |
| * Works just like {@link #getDescriptor(Class)} but don't take no for an answer. |
| * |
| * @throws AssertionError |
| * If the descriptor is missing. |
| * @since 1.326 |
| */ |
| public Descriptor getDescriptorOrDie(Class<? extends Describable> type) { |
| Descriptor d = getDescriptor(type); |
| if (d==null) |
| throw new AssertionError(type+"" is missing its descriptor""); |
| return d; |
| } |
|
|
| /** |
| * Gets the {@link Descriptor} instance in the current Hudson by its type. |
| */ |
| public <T extends Descriptor> T getDescriptorByType(Class<T> type) { |
| for( Descriptor d : getExtensionList(Descriptor.class) ) |
| if(d.getClass()==type) |
| return type.cast(d); |
| return null; |
| } |
|
|
| /** |
| * Gets the {@link SecurityRealm} descriptors by name. Primarily used for making them web-visible. |
| */ |
| public Descriptor<SecurityRealm> getSecurityRealms(String shortClassName) { |
| return findDescriptor(shortClassName,SecurityRealm.all()); |
| } |
|
|
| /** |
| * Finds a descriptor that has the specified name. |
| */ |
| private <T extends Describable<T>> |
| Descriptor<T> findDescriptor(String shortClassName, Collection<? extends Descriptor<T>> descriptors) { |
| String name = '.'+shortClassName; |
| for (Descriptor<T> d : descriptors) { |
| if(d.clazz.getName().endsWith(name)) |
| return d; |
| } |
| return null; |
| } |
|
|
| protected void updateComputerList() throws IOException { |
| updateComputerList(AUTOMATIC_SLAVE_LAUNCH); |
| } |
|
|
| /** |
| * Gets all the installed {@link SCMListener}s. |
| */ |
| public CopyOnWriteList<SCMListener> getSCMListeners() { |
| return scmListeners; |
| } |
|
|
| /** |
| * Gets the plugin object from its short name. |
| * |
| * <p> |
| * This allows URL <tt>hudson/plugin/ID</tt> to be served by the views |
| * of the plugin class. |
| */ |
| public Plugin getPlugin(String shortName) { |
| PluginWrapper p = pluginManager.getPlugin(shortName); |
| if(p==null) return null; |
| return p.getPlugin(); |
| } |
|
|
| /** |
| * Gets the plugin object from its class. |
| * |
| * <p> |
| * This allows easy storage of plugin information in the plugin singleton without |
| * every plugin reimplementing the singleton pattern. |
| * |
| * @param clazz The plugin class (beware class-loader fun, this will probably only work |
| * from within the jpi that defines the plugin class, it may or may not work in other cases) |
| * |
| * @return The plugin instance. |
| */ |
| @SuppressWarnings(""unchecked"") |
| public <P extends Plugin> P getPlugin(Class<P> clazz) { |
| PluginWrapper p = pluginManager.getPlugin(clazz); |
| if(p==null) return null; |
| return (P) p.getPlugin(); |
| } |
|
|
| /** |
| * Gets the plugin objects from their super-class. |
| * |
| * @param clazz The plugin class (beware class-loader fun) |
| * |
| * @return The plugin instances. |
| */ |
| public <P extends Plugin> List<P> getPlugins(Class<P> clazz) { |
| List<P> result = new ArrayList<P>(); |
| for (PluginWrapper w: pluginManager.getPlugins(clazz)) { |
| result.add((P)w.getPlugin()); |
| } |
| return Collections.unmodifiableList(result); |
| } |
|
|
| /** |
| * Synonym for {@link #getDescription}. |
| */ |
| public String getSystemMessage() { |
| return systemMessage; |
| } |
|
|
| /** |
| * Gets the markup formatter used in the system. |
| * |
| * @return |
| * never null. |
| * @since 1.391 |
| */ |
| public MarkupFormatter getMarkupFormatter() { |
| return markupFormatter!=null ? markupFormatter : RawHtmlMarkupFormatter.INSTANCE; |
| } |
|
|
| /** |
| * Sets the markup formatter used in the system globally. |
| * |
| * @since 1.391 |
| */ |
| public void setMarkupFormatter(MarkupFormatter f) { |
| this.markupFormatter = f; |
| } |
|
|
| /** |
| * Sets the system message. |
| */ |
| public void setSystemMessage(String message) throws IOException { |
| this.systemMessage = message; |
| save(); |
| } |
|
|
| public FederatedLoginService getFederatedLoginService(String name) { |
| for (FederatedLoginService fls : FederatedLoginService.all()) { |
| if (fls.getUrlName().equals(name)) |
| return fls; |
| } |
| return null; |
| } |
|
|
| public List<FederatedLoginService> getFederatedLoginServices() { |
| return FederatedLoginService.all(); |
| } |
|
|
| public Launcher createLauncher(TaskListener listener) { |
| return new LocalLauncher(listener).decorateFor(this); |
| } |
|
|
|
|
| public String getFullName() { |
| return """"; |
| } |
|
|
| public String getFullDisplayName() { |
| return """"; |
| } |
|
|
| /** |
| * Returns the transient {@link Action}s associated with the top page. |
| * |
| * <p> |
| * Adding {@link Action} is primarily useful for plugins to contribute |
| * an item to the navigation bar of the top page. See existing {@link Action} |
| * implementation for it affects the GUI. |
| * |
| * <p> |
| * To register an {@link Action}, implement {@link RootAction} extension point, or write code like |
| * {@code Hudson.getInstance().getActions().add(...)}. |
| * |
| * @return |
| * Live list where the changes can be made. Can be empty but never null. |
| * @since 1.172 |
| */ |
| public List<Action> getActions() { |
| return actions; |
| } |
|
|
| /** |
| * Gets just the immediate children of {@link Jenkins}. |
| * |
| * @see #getAllItems(Class) |
| */ |
| @Exported(name=""jobs"") |
| public List<TopLevelItem> getItems() { |
| if (authorizationStrategy instanceof AuthorizationStrategy.Unsecured || |
| authorizationStrategy instanceof FullControlOnceLoggedInAuthorizationStrategy) { |
| return new ArrayList(items.values()); |
| } |
|
|
| List<TopLevelItem> viewableItems = new ArrayList<TopLevelItem>(); |
| for (TopLevelItem item : items.values()) { |
| if (item.hasPermission(Item.READ)) |
| viewableItems.add(item); |
| } |
| |
| return viewableItems; |
| } |
|
|
| /** |
| * Returns the read-only view of all the {@link TopLevelItem}s keyed by their names. |
| * <p> |
| * This method is efficient, as it doesn't involve any copying. |
| * |
| * @since 1.296 |
| */ |
| public Map<String,TopLevelItem> getItemMap() { |
| return Collections.unmodifiableMap(items); |
| } |
|
|
| /** |
| * Gets just the immediate children of {@link Jenkins} but of the given type. |
| */ |
| public <T> List<T> getItems(Class<T> type) { |
| List<T> r = new ArrayList<T>(); |
| for (TopLevelItem i : getItems()) |
| if (type.isInstance(i)) |
| r.add(type.cast(i)); |
| return r; |
| } |
|
|
| /** |
| * Gets all the {@link Item}s recursively in the {@link ItemGroup} tree |
| * and filter them by the given type. |
| */ |
| public <T extends Item> List<T> getAllItems(Class<T> type) { |
| List<T> r = new ArrayList<T>(); |
|
|
| Stack<ItemGroup> q = new Stack<ItemGroup>(); |
| q.push(this); |
|
|
| while(!q.isEmpty()) { |
| ItemGroup<?> parent = q.pop(); |
| for (Item i : parent.getItems()) { |
| if(type.isInstance(i)) { |
| if (i.hasPermission(Item.READ)) |
| r.add(type.cast(i)); |
| } |
| if(i instanceof ItemGroup) |
| q.push((ItemGroup)i); |
| } |
| } |
|
|
| return r; |
| } |
|
|
| /** |
| * Gets all the items recursively. |
| * |
| * @since 1.402 |
| */ |
| public List<Item> getAllItems() { |
| return getAllItems(Item.class); |
| } |
|
|
| /** |
| * Gets a list of simple top-level projects. |
| * @deprecated This method will ignore Maven and matrix projects, as well as projects inside containers such as folders. |
| * You may prefer to call {@link #getAllItems(Class)} on {@link AbstractProject}, |
| * perhaps also using {@link Util#createSubList} to consider only {@link TopLevelItem}s. |
| * (That will also consider the caller's permissions.) |
| * If you really want to get just {@link Project}s at top level, ignoring permissions, |
| * you can filter the values from {@link #getItemMap} using {@link Util#createSubList}. |
| */ |
| @Deprecated |
| public List<Project> getProjects() { |
| return Util.createSubList(items.values(),Project.class); |
| } |
|
|
| /** |
| * Gets the names of all the {@link Job}s. |
| */ |
| public Collection<String> getJobNames() { |
| List<String> names = new ArrayList<String>(); |
| for (Job j : getAllItems(Job.class)) |
| names.add(j.getFullName()); |
| return names; |
| } |
|
|
| public List<Action> getViewActions() { |
| return getActions(); |
| } |
|
|
| /** |
| * Gets the names of all the {@link TopLevelItem}s. |
| */ |
| public Collection<String> getTopLevelItemNames() { |
| List<String> names = new ArrayList<String>(); |
| for (TopLevelItem j : items.values()) |
| names.add(j.getName()); |
| return names; |
| } |
|
|
| public View getView(String name) { |
| return viewGroupMixIn.getView(name); |
| } |
|
|
| /** |
| * Gets the read-only list of all {@link View}s. |
| */ |
| @Exported |
| public Collection<View> getViews() { |
| return viewGroupMixIn.getViews(); |
| } |
|
|
| public void addView(View v) throws IOException { |
| viewGroupMixIn.addView(v); |
| } |
|
|
| public boolean canDelete(View view) { |
| return viewGroupMixIn.canDelete(view); |
| } |
|
|
| public synchronized void deleteView(View view) throws IOException { |
| viewGroupMixIn.deleteView(view); |
| } |
|
|
| public void onViewRenamed(View view, String oldName, String newName) { |
| viewGroupMixIn.onViewRenamed(view,oldName,newName); |
| } |
|
|
| /** |
| * Returns the primary {@link View} that renders the top-page of Hudson. |
| */ |
| @Exported |
| public View getPrimaryView() { |
| return viewGroupMixIn.getPrimaryView(); |
| } |
|
|
| public void setPrimaryView(View v) { |
| this.primaryView = v.getViewName(); |
| } |
|
|
| public ViewsTabBar getViewsTabBar() { |
| return viewsTabBar; |
| } |
|
|
| public void setViewsTabBar(ViewsTabBar viewsTabBar) { |
| this.viewsTabBar = viewsTabBar; |
| } |
|
|
| public Jenkins getItemGroup() { |
| return this; |
| } |
|
|
| public MyViewsTabBar getMyViewsTabBar() { |
| return myViewsTabBar; |
| } |
|
|
| public void setMyViewsTabBar(MyViewsTabBar myViewsTabBar) { |
| this.myViewsTabBar = myViewsTabBar; |
| } |
|
|
| /** |
| * Returns true if the current running Hudson is upgraded from a version earlier than the specified version. |
| * |
| * <p> |
| * This method continues to return true until the system configuration is saved, at which point |
| * {@link #version} will be overwritten and Hudson forgets the upgrade history. |
| * |
| * <p> |
| * To handle SNAPSHOTS correctly, pass in ""1.N.*"" to test if it's upgrading from the version |
| * equal or younger than N. So say if you implement a feature in 1.301 and you want to check |
| * if the installation upgraded from pre-1.301, pass in ""1.300.*"" |
| * |
| * @since 1.301 |
| */ |
| public boolean isUpgradedFromBefore(VersionNumber v) { |
| try { |
| return new VersionNumber(version).isOlderThan(v); |
| } catch (IllegalArgumentException e) { |
| // fail to parse this version number |
| return false; |
| } |
| } |
|
|
| /** |
| * Gets the read-only list of all {@link Computer}s. |
| */ |
| public Computer[] getComputers() { |
| Computer[] r = computers.values().toArray(new Computer[computers.size()]); |
| Arrays.sort(r,new Comparator<Computer>() { |
| final Collator collator = Collator.getInstance(); |
| public int compare(Computer lhs, Computer rhs) { |
| if(lhs.getNode()==Jenkins.this) return -1; |
| if(rhs.getNode()==Jenkins.this) return 1; |
| return collator.compare(lhs.getDisplayName(), rhs.getDisplayName()); |
| } |
| }); |
| return r; |
| } |
|
|
| @CLIResolver |
| public Computer getComputer(@Argument(required=true,metaVar=""NAME"",usage=""Node name"") String name) { |
| if(name.equals(""(master)"")) |
| name = """"; |
|
|
| for (Computer c : computers.values()) { |
| if(c.getName().equals(name)) |
| return c; |
| } |
| return null; |
| } |
|
|
| /** |
| * Gets the label that exists on this system by the name. |
| * |
| * @return null if name is null. |
| * @see Label#parseExpression(String) (String) |
| */ |
| public Label getLabel(String expr) { |
| if(expr==null) return null; |
| while(true) { |
| Label l = labels.get(expr); |
| if(l!=null) |
| return l; |
|
|
| // non-existent |
| try { |
| labels.putIfAbsent(expr,Label.parseExpression(expr)); |
| } catch (ANTLRException e) { |
| // laxly accept it as a single label atom for backward compatibility |
| return getLabelAtom(expr); |
| } |
| } |
| } |
|
|
| /** |
| * Returns the label atom of the given name. |
| * @return non-null iff name is non-null |
| */ |
| public @Nullable LabelAtom getLabelAtom(@CheckForNull String name) { |
| if (name==null) return null; |
|
|
| while(true) { |
| Label l = labels.get(name); |
| if(l!=null) |
| return (LabelAtom)l; |
|
|
| // non-existent |
| LabelAtom la = new LabelAtom(name); |
| if (labels.putIfAbsent(name, la)==null) |
| la.load(); |
| } |
| } |
|
|
| /** |
| * Gets all the active labels in the current system. |
| */ |
| public Set<Label> getLabels() { |
| Set<Label> r = new TreeSet<Label>(); |
| for (Label l : labels.values()) { |
| if(!l.isEmpty()) |
| r.add(l); |
| } |
| return r; |
| } |
|
|
| public Set<LabelAtom> getLabelAtoms() { |
| Set<LabelAtom> r = new TreeSet<LabelAtom>(); |
| for (Label l : labels.values()) { |
| if(!l.isEmpty() && l instanceof LabelAtom) |
| r.add((LabelAtom)l); |
| } |
| return r; |
| } |
|
|
| public Queue getQueue() { |
| return queue; |
| } |
|
|
| @Override |
| public String getDisplayName() { |
| return Messages.Hudson_DisplayName(); |
| } |
|
|
| public List<JDK> getJDKs() { |
| if(jdks==null) |
| jdks = new ArrayList<JDK>(); |
| return jdks; |
| } |
|
|
| /** |
| * Gets the JDK installation of the given name, or returns null. |
| */ |
| public JDK getJDK(String name) { |
| if(name==null) { |
| // if only one JDK is configured, ""default JDK"" should mean that JDK. |
| List<JDK> jdks = getJDKs(); |
| if(jdks.size()==1) return jdks.get(0); |
| return null; |
| } |
| for (JDK j : getJDKs()) { |
| if(j.getName().equals(name)) |
| return j; |
| } |
| return null; |
| } |
|
|
|
|
|
|
| /** |
| * Gets the slave node of the give name, hooked under this Hudson. |
| */ |
| public @CheckForNull Node getNode(String name) { |
| return slaves.getNode(name); |
| } |
|
|
| /** |
| * Gets a {@link Cloud} by {@link Cloud#name its name}, or null. |
| */ |
| public Cloud getCloud(String name) { |
| return clouds.getByName(name); |
| } |
|
|
| protected Map<Node,Computer> getComputerMap() { |
| return computers; |
| } |
|
|
| /** |
| * Returns all {@link Node}s in the system, excluding {@link Jenkins} instance itself which |
| * represents the master. |
| */ |
| public List<Node> getNodes() { |
| return slaves; |
| } |
|
|
| /** |
| * Adds one more {@link Node} to Hudson. |
| */ |
| public synchronized void addNode(Node n) throws IOException { |
| if(n==null) throw new IllegalArgumentException(); |
| ArrayList<Node> nl = new ArrayList<Node>(this.slaves); |
| if(!nl.contains(n)) // defensive check |
| nl.add(n); |
| setNodes(nl); |
| } |
|
|
| /** |
| * Removes a {@link Node} from Hudson. |
| */ |
| public synchronized void removeNode(@Nonnull Node n) throws IOException { |
| Computer c = n.toComputer(); |
| if (c!=null) |
| c.disconnect(OfflineCause.create(Messages._Hudson_NodeBeingRemoved())); |
|
|
| ArrayList<Node> nl = new ArrayList<Node>(this.slaves); |
| nl.remove(n); |
| setNodes(nl); |
| } |
|
|
| public void setNodes(List<? extends Node> nodes) throws IOException { |
| this.slaves = new NodeList(nodes); |
| updateComputerList(); |
| trimLabels(); |
| save(); |
| } |
|
|
| public DescribableList<NodeProperty<?>, NodePropertyDescriptor> getNodeProperties() { |
| return nodeProperties; |
| } |
|
|
| public DescribableList<NodeProperty<?>, NodePropertyDescriptor> getGlobalNodeProperties() { |
| return globalNodeProperties; |
| } |
|
|
| /** |
| * Resets all labels and remove invalid ones. |
| * |
| * This should be called when the assumptions behind label cache computation changes, |
| * but we also call this periodically to self-heal any data out-of-sync issue. |
| */ |
| private void trimLabels() { |
| for (Iterator<Label> itr = labels.values().iterator(); itr.hasNext();) { |
| Label l = itr.next(); |
| resetLabel(l); |
| if(l.isEmpty()) |
| itr.remove(); |
| } |
| } |
|
|
| /** |
| * Binds {@link AdministrativeMonitor}s to URL. |
| */ |
| public AdministrativeMonitor getAdministrativeMonitor(String id) { |
| for (AdministrativeMonitor m : administrativeMonitors) |
| if(m.id.equals(id)) |
| return m; |
| return null; |
| } |
|
|
| public NodeDescriptor getDescriptor() { |
| return DescriptorImpl.INSTANCE; |
| } |
|
|
| public static final class DescriptorImpl extends NodeDescriptor { |
| @Extension |
| public static final DescriptorImpl INSTANCE = new DescriptorImpl(); |
|
|
| public String getDisplayName() { |
| return """"; |
| } |
|
|
| @Override |
| public boolean isInstantiable() { |
| return false; |
| } |
|
|
| public FormValidation doCheckNumExecutors(@QueryParameter String value) { |
| return FormValidation.validateNonNegativeInteger(value); |
| } |
|
|
| // to route /descriptor/FQCN/xxx to getDescriptor(FQCN).xxx |
| public Object getDynamic(String token) { |
| return Jenkins.getInstance().getDescriptor(token); |
| } |
| } |
|
|
| /** |
| * Gets the system default quiet period. |
| */ |
| public int getQuietPeriod() { |
| return quietPeriod!=null ? quietPeriod : 5; |
| } |
|
|
| /** |
| * Sets the global quiet period. |
| * |
| * @param quietPeriod |
| * null to the default value. |
| */ |
| public void setQuietPeriod(Integer quietPeriod) throws IOException { |
| this.quietPeriod = quietPeriod; |
| save(); |
| } |
|
|
| /** |
| * Gets the global SCM check out retry count. |
| */ |
| public int getScmCheckoutRetryCount() { |
| return scmCheckoutRetryCount; |
| } |
|
|
| public void setScmCheckoutRetryCount(int scmCheckoutRetryCount) throws IOException { |
| this.scmCheckoutRetryCount = scmCheckoutRetryCount; |
| save(); |
| } |
|
|
| @Override |
| public String getSearchUrl() { |
| return """"; |
| } |
|
|
| @Override |
| public SearchIndexBuilder makeSearchIndex() { |
| return super.makeSearchIndex() |
| .add(""configure"", ""config"",""configure"") |
| .add(""manage"") |
| .add(""log"") |
| .add(new CollectionSearchIndex<TopLevelItem>() { |
| protected SearchItem get(String key) { return getItem(key); } |
| protected Collection<TopLevelItem> all() { return getItems(); } |
| }) |
| .add(getPrimaryView().makeSearchIndex()) |
| .add(new CollectionSearchIndex() {// for computers |
| protected Computer get(String key) { return getComputer(key); } |
| protected Collection<Computer> all() { return computers.values(); } |
| }) |
| .add(new CollectionSearchIndex() {// for users |
| protected User get(String key) { return User.get(key,false); } |
| protected Collection<User> all() { return User.getAll(); } |
| }) |
| .add(new CollectionSearchIndex() {// for views |
| protected View get(String key) { return getView(key); } |
| protected Collection<View> all() { return views; } |
| }); |
| } |
|
|
| public String getUrlChildPrefix() { |
| return ""job""; |
| } |
|
|
| /** |
| * Gets the absolute URL of Jenkins, |
| * such as ""http://localhost/jenkins/"". |
| * |
| * <p> |
| * This method first tries to use the manually configured value, then |
| * fall back to {@link StaplerRequest#getRootPath()}. |
| * It is done in this order so that it can work correctly even in the face |
| * of a reverse proxy. |
| * |
| * @return |
| * This method returns null if this parameter is not configured by the user. |
| * The caller must gracefully deal with this situation. |
| * The returned URL will always have the trailing '/'. |
| * @since 1.66 |
| * @see Descriptor#getCheckUrl(String) |
| * @see #getRootUrlFromRequest() |
| */ |
| public String getRootUrl() { |
| // for compatibility. the actual data is stored in Mailer |
| String url = JenkinsLocationConfiguration.get().getUrl(); |
| if(url!=null) { |
| if (!url.endsWith(""/"")) url += '/'; |
| return url; |
| } |
|
|
| StaplerRequest req = Stapler.getCurrentRequest(); |
| if(req!=null) |
| return getRootUrlFromRequest(); |
| return null; |
| } |
|
|
| /** |
| * Is Jenkins running in HTTPS? |
| * |
| * Note that we can't really trust {@link StaplerRequest#isSecure()} because HTTPS might be terminated |
| * in the reverse proxy. |
| */ |
| public boolean isRootUrlSecure() { |
| String url = getRootUrl(); |
| return url!=null && url.startsWith(""https""); |
| } |
|
|
| /** |
| * Gets the absolute URL of Hudson top page, such as ""http: |
| * |
| * <p> |
| * Unlike {@link #getRootUrl()}, which uses the manually configured value, |
| * this one uses the current request to reconstruct the URL. The benefit is |
| * that this is immune to the configuration mistake (users often fail to set the root URL |
| * correctly, especially when a migration is involved), but the downside |
| * is that unless you are processing a request, this method doesn't work. |
| * |
| * Please note that this will not work in all cases if Jenkins is running behind a |
| * reverse proxy (e.g. when user has switched off ProxyPreserveHost, which is |
| * default setup or the actual url uses https) and you should use getRootUrl if |
| * you want to be sure you reflect user setup. |
| * See https://wiki.jenkins-ci.org/display/JENKINS/Running+Jenkins+behind+Apache |
| * |
| * @since 1.263 |
| */ |
| public String getRootUrlFromRequest() { |
| StaplerRequest req = Stapler.getCurrentRequest(); |
| StringBuilder buf = new StringBuilder(); |
| buf.append(req.getScheme()+""://""); |
| buf.append(req.getServerName()); |
| if(req.getServerPort()!=80) |
| buf.append(':').append(req.getServerPort()); |
| buf.append(req.getContextPath()).append('/'); |
| return buf.toString(); |
| } |
|
|
| public File getRootDir() { |
| return root; |
| } |
|
|
| public FilePath getWorkspaceFor(TopLevelItem item) { |
| return new FilePath(expandVariablesForDirectory(workspaceDir, item)); |
| } |
|
|
| public File getBuildDirFor(Job job) { |
| return expandVariablesForDirectory(buildsDir, job); |
| } |
|
|
| private File expandVariablesForDirectory(String base, Item item) { |
| return new File(Util.replaceMacro(base, ImmutableMap.of( |
| ""JENKINS_HOME"", getRootDir().getPath(), |
| ""ITEM_ROOTDIR"", item.getRootDir().getPath(), |
| ""ITEM_FULLNAME"", item.getFullName()))); |
| } |
| |
| public String getRawWorkspaceDir() { |
| return workspaceDir; |
| } |
|
|
| public String getRawBuildsDir() { |
| return buildsDir; |
| } |
|
|
| public FilePath getRootPath() { |
| return new FilePath(getRootDir()); |
| } |
|
|
| @Override |
| public FilePath createPath(String absolutePath) { |
| return new FilePath((VirtualChannel)null,absolutePath); |
| } |
|
|
| public ClockDifference getClockDifference() { |
| return ClockDifference.ZERO; |
| } |
|
|
| /** |
| * For binding {@link LogRecorderManager} to ""/log"". |
| * Everything below here is admin-only, so do the check here. |
| */ |
| public LogRecorderManager getLog() { |
| checkPermission(ADMINISTER); |
| return log; |
| } |
|
|
| /** |
| * A convenience method to check if there's some security |
| * restrictions in place. |
| */ |
| @Exported |
| public boolean isUseSecurity() { |
| return securityRealm!=SecurityRealm.NO_AUTHENTICATION || authorizationStrategy!=AuthorizationStrategy.UNSECURED; |
| } |
| |
| public boolean isUseProjectNamingStrategy(){ |
| return projectNamingStrategy != DefaultProjectNamingStrategy.DEFAULT_NAMING_STRATEGY; |
| } |
|
|
| /** |
| * If true, all the POST requests to Hudson would have to have crumb in it to protect |
| * Hudson from CSRF vulnerabilities. |
| */ |
| @Exported |
| public boolean isUseCrumbs() { |
| return crumbIssuer!=null; |
| } |
|
|
| /** |
| * Returns the constant that captures the three basic security modes |
| * in Hudson. |
| */ |
| public SecurityMode getSecurity() { |
| |
| SecurityRealm realm = securityRealm; |
|
|
| if(realm==SecurityRealm.NO_AUTHENTICATION) |
| return SecurityMode.UNSECURED; |
| if(realm instanceof LegacySecurityRealm) |
| return SecurityMode.LEGACY; |
| return SecurityMode.SECURED; |
| } |
|
|
| /** |
| * @return |
| * never null. |
| */ |
| public SecurityRealm getSecurityRealm() { |
| return securityRealm; |
| } |
|
|
| public void setSecurityRealm(SecurityRealm securityRealm) { |
| if(securityRealm==null) |
| securityRealm= SecurityRealm.NO_AUTHENTICATION; |
| this.useSecurity = true; |
| this.securityRealm = securityRealm; |
| |
| try { |
| HudsonFilter filter = HudsonFilter.get(servletContext); |
| if (filter == null) { |
| |
| |
| LOGGER.fine(""HudsonFilter has not yet been initialized: Can't perform security setup for now""); |
| } else { |
| LOGGER.fine(""HudsonFilter has been previously initialized: Setting security up""); |
| filter.reset(securityRealm); |
| LOGGER.fine(""Security is now fully set up""); |
| } |
| } catch (ServletException e) { |
| // for binary compatibility, this method cannot throw a checked exception |
| throw new AcegiSecurityException(""Failed to configure filter"",e) {}; |
| } |
| } |
|
|
| public void setAuthorizationStrategy(AuthorizationStrategy a) { |
| if (a == null) |
| a = AuthorizationStrategy.UNSECURED; |
| useSecurity = true; |
| authorizationStrategy = a; |
| } |
|
|
| public void disableSecurity() { |
| useSecurity = null; |
| setSecurityRealm(SecurityRealm.NO_AUTHENTICATION); |
| authorizationStrategy = AuthorizationStrategy.UNSECURED; |
| markupFormatter = null; |
| } |
|
|
| public void setProjectNamingStrategy(ProjectNamingStrategy ns) { |
| if(ns == null){ |
| ns = DefaultProjectNamingStrategy.DEFAULT_NAMING_STRATEGY; |
| } |
| projectNamingStrategy = ns; |
| } |
| |
| public Lifecycle getLifecycle() { |
| return Lifecycle.get(); |
| } |
|
|
| /** |
| * Gets the dependency injection container that hosts all the extension implementations and other |
| * components in Jenkins. |
| * |
| * @since 1.GUICE |
| */ |
| public Injector getInjector() { |
| return lookup(Injector.class); |
| } |
|
|
| /** |
| * Returns {@link ExtensionList} that retains the discovered instances for the given extension type. |
| * |
| * @param extensionType |
| * The base type that represents the extension point. Normally {@link ExtensionPoint} subtype |
| * but that's not a hard requirement. |
| * @return |
| * Can be an empty list but never null. |
| */ |
| @SuppressWarnings({""unchecked""}) |
| public <T> ExtensionList<T> getExtensionList(Class<T> extensionType) { |
| return extensionLists.get(extensionType); |
| } |
|
|
| /** |
| * Used to bind {@link ExtensionList}s to URLs. |
| * |
| * @since 1.349 |
| */ |
| public ExtensionList getExtensionList(String extensionType) throws ClassNotFoundException { |
| return getExtensionList(pluginManager.uberClassLoader.loadClass(extensionType)); |
| } |
|
|
| /** |
| * Returns {@link ExtensionList} that retains the discovered {@link Descriptor} instances for the given |
| * kind of {@link Describable}. |
| * |
| * @return |
| * Can be an empty list but never null. |
| */ |
| @SuppressWarnings({""unchecked""}) |
| public <T extends Describable<T>,D extends Descriptor<T>> DescriptorExtensionList<T,D> getDescriptorList(Class<T> type) { |
| return descriptorLists.get(type); |
| } |
|
|
| /** |
| * Refresh {@link ExtensionList}s by adding all the newly discovered extensions. |
| * |
| * Exposed only for {@link PluginManager#dynamicLoad(File)}. |
| */ |
| public void refreshExtensions() throws ExtensionRefreshException { |
| ExtensionList<ExtensionFinder> finders = getExtensionList(ExtensionFinder.class); |
| for (ExtensionFinder ef : finders) { |
| if (!ef.isRefreshable()) |
| throw new ExtensionRefreshException(ef+"" doesn't support refresh""); |
| } |
|
|
| List<ExtensionComponentSet> fragments = Lists.newArrayList(); |
| for (ExtensionFinder ef : finders) { |
| fragments.add(ef.refresh()); |
| } |
| ExtensionComponentSet delta = ExtensionComponentSet.union(fragments).filtered(); |
|
|
| // if we find a new ExtensionFinder, we need it to list up all the extension points as well |
| List<ExtensionComponent<ExtensionFinder>> newFinders = Lists.newArrayList(delta.find(ExtensionFinder.class)); |
| while (!newFinders.isEmpty()) { |
| ExtensionFinder f = newFinders.remove(newFinders.size()-1).getInstance(); |
|
|
| ExtensionComponentSet ecs = ExtensionComponentSet.allOf(f).filtered(); |
| newFinders.addAll(ecs.find(ExtensionFinder.class)); |
| delta = ExtensionComponentSet.union(delta, ecs); |
| } |
|
|
| for (ExtensionList el : extensionLists.values()) { |
| el.refresh(delta); |
| } |
| for (ExtensionList el : descriptorLists.values()) { |
| el.refresh(delta); |
| } |
|
|
| // TODO: we need some generalization here so that extension points can be notified when a refresh happens? |
| for (ExtensionComponent<RootAction> ea : delta.find(RootAction.class)) { |
| Action a = ea.getInstance(); |
| if (!actions.contains(a)) actions.add(a); |
| } |
| } |
|
|
| /** |
| * Returns the root {@link ACL}. |
| * |
| * @see AuthorizationStrategy#getRootACL() |
| */ |
| @Override |
| public ACL getACL() { |
| return authorizationStrategy.getRootACL(); |
| } |
|
|
| /** |
| * @return |
| * never null. |
| */ |
| public AuthorizationStrategy getAuthorizationStrategy() { |
| return authorizationStrategy; |
| } |
| |
| /** |
| * The strategy used to check the project names. |
| * @return never <code>null</code> |
| */ |
| public ProjectNamingStrategy getProjectNamingStrategy() { |
| return projectNamingStrategy == null ? ProjectNamingStrategy.DEFAULT_NAMING_STRATEGY : projectNamingStrategy; |
| } |
|
|
| /** |
| * Returns true if Hudson is quieting down. |
| * <p> |
| * No further jobs will be executed unless it |
| * can be finished while other current pending builds |
| * are still in progress. |
| */ |
| @Exported |
| public boolean isQuietingDown() { |
| return isQuietingDown; |
| } |
|
|
| /** |
| * Returns true if the container initiated the termination of the web application. |
| */ |
| public boolean isTerminating() { |
| return terminating; |
| } |
|
|
| /** |
| * Gets the initialization milestone that we've already reached. |
| * |
| * @return |
| * {@link InitMilestone#STARTED} even if the initialization hasn't been started, so that this method |
| * never returns null. |
| */ |
| public InitMilestone getInitLevel() { |
| return initLevel; |
| } |
|
|
| public void setNumExecutors(int n) throws IOException { |
| this.numExecutors = n; |
| save(); |
| } |
|
|
|
|
|
|
| /** |
| * {@inheritDoc}. |
| * |
| * Note that the look up is case-insensitive. |
| */ |
| public TopLevelItem getItem(String name) { |
| if (name==null) return null; |
| TopLevelItem item = items.get(name); |
| if (item==null) |
| return null; |
| if (!item.hasPermission(Item.READ)) { |
| if (item.hasPermission(Item.DISCOVER)) { |
| throw new AccessDeniedException(""Please login to access job "" + name); |
| } |
| return null; |
| } |
| return item; |
| } |
|
|
| /** |
| * Gets the item by its path name from the given context |
| * |
| * <h2>Path Names</h2> |
| * <p> |
| * If the name starts from '/', like ""/foo/bar/zot"", then it's interpreted as absolute. |
| * Otherwise, the name should be something like ""foo/bar"" and it's interpreted like |
| * relative path name in the file system is, against the given context. |
| * |
| * @param context |
| * null is interpreted as {@link Jenkins}. Base 'directory' of the interpretation. |
| * @since 1.406 |
| */ |
| public Item getItem(String pathName, ItemGroup context) { |
| if (context==null) context = this; |
| if (pathName==null) return null; |
|
|
| if (pathName.startsWith(""/"")) |
| return getItemByFullName(pathName); |
|
|
| Object/*Item|ItemGroup*/ ctx = context; |
|
|
| StringTokenizer tokens = new StringTokenizer(pathName,""/""); |
| while (tokens.hasMoreTokens()) { |
| String s = tokens.nextToken(); |
| if (s.equals("".."")) { |
| if (ctx instanceof Item) { |
| ctx = ((Item)ctx).getParent(); |
| continue; |
| } |
|
|
| ctx=null; |
| break; |
| } |
| if (s.equals(""."")) { |
| continue; |
| } |
|
|
| if (ctx instanceof ItemGroup) { |
| ItemGroup g = (ItemGroup) ctx; |
| Item i = g.getItem(s); |
| if (i==null || !i.hasPermission(Item.READ)) { // XXX consider DISCOVER |
| ctx=null; |
| break; |
| } |
| ctx=i; |
| } else { |
| return null; |
| } |
| } |
|
|
| if (ctx instanceof Item) |
| return (Item)ctx; |
|
|
| |
| return getItemByFullName(pathName); |
| } |
|
|
| public final Item getItem(String pathName, Item context) { |
| return getItem(pathName,context!=null?context.getParent():null); |
| } |
|
|
| public final <T extends Item> T getItem(String pathName, ItemGroup context, Class<T> type) { |
| Item r = getItem(pathName, context); |
| if (type.isInstance(r)) |
| return type.cast(r); |
| return null; |
| } |
|
|
| public final <T extends Item> T getItem(String pathName, Item context, Class<T> type) { |
| return getItem(pathName,context!=null?context.getParent():null,type); |
| } |
|
|
| public File getRootDirFor(TopLevelItem child) { |
| return getRootDirFor(child.getName()); |
| } |
|
|
| private File getRootDirFor(String name) { |
| return new File(new File(getRootDir(),""jobs""), name); |
| } |
|
|
| /** |
| * Gets the {@link Item} object by its full name. |
| * Full names are like path names, where each name of {@link Item} is |
| * combined by '/'. |
| * |
| * @return |
| * null if either such {@link Item} doesn't exist under the given full name, |
| * or it exists but it's no an instance of the given type. |
| */ |
| public @CheckForNull <T extends Item> T getItemByFullName(String fullName, Class<T> type) { |
| StringTokenizer tokens = new StringTokenizer(fullName,""/""); |
| ItemGroup parent = this; |
|
|
| if(!tokens.hasMoreTokens()) return null; |
|
|
| while(true) { |
| Item item = parent.getItem(tokens.nextToken()); |
| if(!tokens.hasMoreTokens()) { |
| if(type.isInstance(item)) |
| return type.cast(item); |
| else |
| return null; |
| } |
|
|
| if(!(item instanceof ItemGroup)) |
| return null; |
|
|
| if (!item.hasPermission(Item.READ)) |
| return null; |
|
|
| parent = (ItemGroup) item; |
| } |
| } |
|
|
| public @CheckForNull Item getItemByFullName(String fullName) { |
| return getItemByFullName(fullName,Item.class); |
| } |
|
|
| /** |
| * Gets the user of the given name. |
| * |
| * @return the user of the given name, if that person exists or the invoker {@link #hasPermission} on {@link #ADMINISTER}; else null |
| * @see User#get(String,boolean) |
| */ |
| public @CheckForNull User getUser(String name) { |
| return User.get(name,hasPermission(ADMINISTER)); |
| } |
|
|
| public synchronized TopLevelItem createProject( TopLevelItemDescriptor type, String name ) throws IOException { |
| return createProject(type, name, true); |
| } |
|
|
| public synchronized TopLevelItem createProject( TopLevelItemDescriptor type, String name, boolean notify ) throws IOException { |
| return itemGroupMixIn.createProject(type,name,notify); |
| } |
|
|
| /** |
| * Overwrites the existing item by new one. |
| * |
| * <p> |
| * This is a short cut for deleting an existing job and adding a new one. |
| */ |
| public synchronized void putItem(TopLevelItem item) throws IOException, InterruptedException { |
| String name = item.getName(); |
| TopLevelItem old = items.get(name); |
| if (old ==item) return; |
|
|
| checkPermission(Item.CREATE); |
| if (old!=null) |
| old.delete(); |
| items.put(name,item); |
| ItemListener.fireOnCreated(item); |
| } |
|
|
| /** |
| * Creates a new job. |
| * |
| * <p> |
| * This version infers the descriptor from the type of the top-level item. |
| * |
| * @throws IllegalArgumentException |
| * if the project of the given name already exists. |
| */ |
| public synchronized <T extends TopLevelItem> T createProject( Class<T> type, String name ) throws IOException { |
| return type.cast(createProject((TopLevelItemDescriptor)getDescriptor(type),name)); |
| } |
|
|
| /** |
| * Called by {@link Job#renameTo(String)} to update relevant data structure. |
| * assumed to be synchronized on Hudson by the caller. |
| */ |
| public void onRenamed(TopLevelItem job, String oldName, String newName) throws IOException { |
| items.remove(oldName); |
| items.put(newName,job); |
|
|
| for (View v : views) |
| v.onJobRenamed(job, oldName, newName); |
| save(); |
| } |
|
|
| /** |
| * Called in response to {@link Job#doDoDelete(StaplerRequest, StaplerResponse)} |
| */ |
| public void onDeleted(TopLevelItem item) throws IOException { |
| for (ItemListener l : ItemListener.all()) |
| l.onDeleted(item); |
|
|
| items.remove(item.getName()); |
| for (View v : views) |
| v.onJobRenamed(item, item.getName(), null); |
| save(); |
| } |
|
|
| public FingerprintMap getFingerprintMap() { |
| return fingerprintMap; |
| } |
|
|
| |
| public Object getFingerprint( String md5sum ) throws IOException { |
| Fingerprint r = fingerprintMap.get(md5sum); |
| if(r==null) return new NoFingerprintMatch(md5sum); |
| else return r; |
| } |
|
|
| /** |
| * Gets a {@link Fingerprint} object if it exists. |
| * Otherwise null. |
| */ |
| public Fingerprint _getFingerprint( String md5sum ) throws IOException { |
| return fingerprintMap.get(md5sum); |
| } |
|
|
| /** |
| * The file we save our configuration. |
| */ |
| private XmlFile getConfigFile() { |
| return new XmlFile(XSTREAM, new File(root,""config.xml"")); |
| } |
|
|
| public int getNumExecutors() { |
| return numExecutors; |
| } |
|
|
| public Mode getMode() { |
| return mode; |
| } |
|
|
| public void setMode(Mode m) throws IOException { |
| this.mode = m; |
| save(); |
| } |
|
|
| public String getLabelString() { |
| return fixNull(label).trim(); |
| } |
|
|
| @Override |
| public void setLabelString(String label) throws IOException { |
| this.label = label; |
| save(); |
| } |
|
|
| @Override |
| public LabelAtom getSelfLabel() { |
| return getLabelAtom(""master""); |
| } |
|
|
| public Computer createComputer() { |
| return new Hudson.MasterComputer(); |
| } |
|
|
| private synchronized TaskBuilder loadTasks() throws IOException { |
| File projectsDir = new File(root,""jobs""); |
| if(!projectsDir.getCanonicalFile().isDirectory() && !projectsDir.mkdirs()) { |
| if(projectsDir.exists()) |
| throw new IOException(projectsDir+"" is not a directory""); |
| throw new IOException(""Unable to create ""+projectsDir+""\nPermission issue? Please create this directory manually.""); |
| } |
| File[] subdirs = projectsDir.listFiles(new FileFilter() { |
| public boolean accept(File child) { |
| return child.isDirectory() && Items.getConfigFile(child).exists(); |
| } |
| }); |
|
|
| TaskGraphBuilder g = new TaskGraphBuilder(); |
| Handle loadHudson = g.requires(EXTENSIONS_AUGMENTED).attains(JOB_LOADED).add(""Loading global config"", new Executable() { |
| public void run(Reactor session) throws Exception { |
| |
| |
| NodeList oldSlaves = slaves; |
| |
| XmlFile cfg = getConfigFile(); |
| if (cfg.exists()) { |
| |
| |
| primaryView = null; |
| views.clear(); |
|
|
| |
| cfg.unmarshal(Jenkins.this); |
| } |
|
|
| |
| if (slaves == null) slaves = new NodeList(); |
|
|
| clouds.setOwner(Jenkins.this); |
| items.clear(); |
|
|
| |
| |
| if (oldSlaves != null) { |
| ArrayList<Node> newSlaves = new ArrayList<Node>(slaves); |
| for (Node n: oldSlaves) { |
| if (n instanceof EphemeralNode) { |
| if(!newSlaves.contains(n)) { |
| newSlaves.add(n); |
| } |
| } |
| } |
| setNodes(newSlaves); |
| } |
| } |
| }); |
|
|
| for (final File subdir : subdirs) { |
| g.requires(loadHudson).attains(JOB_LOADED).notFatal().add(""Loading job ""+subdir.getName(),new Executable() { |
| public void run(Reactor session) throws Exception { |
| TopLevelItem item = (TopLevelItem) Items.load(Jenkins.this, subdir); |
| items.put(item.getName(), item); |
| } |
| }); |
| } |
|
|
| g.requires(JOB_LOADED).add(""Finalizing set up"",new Executable() { |
| public void run(Reactor session) throws Exception { |
| rebuildDependencyGraph(); |
|
|
| { |
| for (Node slave : slaves) |
| |
| slave.getAssignedLabels(); |
| getAssignedLabels(); |
| } |
|
|
| |
| |
| if(views.size()==0 || primaryView==null) { |
| View v = new AllView(Messages.Hudson_ViewName()); |
| setViewOwner(v); |
| views.add(0,v); |
| primaryView = v.getViewName(); |
| } |
|
|
| |
| if(authorizationStrategy==null) { |
| if(useSecurity==null || !useSecurity) |
| authorizationStrategy = AuthorizationStrategy.UNSECURED; |
| else |
| authorizationStrategy = new LegacyAuthorizationStrategy(); |
| } |
| if(securityRealm==null) { |
| if(useSecurity==null || !useSecurity) |
| setSecurityRealm(SecurityRealm.NO_AUTHENTICATION); |
| else |
| setSecurityRealm(new LegacySecurityRealm()); |
| } else { |
| |
| setSecurityRealm(securityRealm); |
| } |
|
|
| if(useSecurity!=null && !useSecurity) { |
| |
| |
| authorizationStrategy = AuthorizationStrategy.UNSECURED; |
| setSecurityRealm(SecurityRealm.NO_AUTHENTICATION); |
| } |
|
|
| |
| setCrumbIssuer(crumbIssuer); |
|
|
| |
| for (Action a : getExtensionList(RootAction.class)) |
| if (!actions.contains(a)) actions.add(a); |
| } |
| }); |
|
|
| return g; |
| } |
|
|
| /** |
| * Save the settings to a file. |
| */ |
| public synchronized void save() throws IOException { |
| if(BulkChange.contains(this)) return; |
| getConfigFile().write(this); |
| SaveableListener.fireOnChange(this, getConfigFile()); |
| } |
|
|
|
|
| /** |
| * Called to shut down the system. |
| */ |
| @edu.umd.cs.findbugs.annotations.SuppressWarnings(""ST_WRITE_TO_STATIC_FROM_INSTANCE_METHOD"") |
| public void cleanUp() { |
| for (ItemListener l : ItemListener.all()) |
| l.onBeforeShutdown(); |
|
|
| Set<Future<?>> pending = new HashSet<Future<?>>(); |
| terminating = true; |
| for( Computer c : computers.values() ) { |
| c.interrupt(); |
| killComputer(c); |
| pending.add(c.disconnect(null)); |
| } |
| if(udpBroadcastThread!=null) |
| udpBroadcastThread.shutdown(); |
| if(dnsMultiCast!=null) |
| dnsMultiCast.close(); |
| interruptReloadThread(); |
| Timer timer = Trigger.timer; |
| if (timer != null) { |
| timer.cancel(); |
| } |
| |
| Trigger.timer = null; |
| if(tcpSlaveAgentListener!=null) |
| tcpSlaveAgentListener.shutdown(); |
|
|
| if(pluginManager!=null) |
| pluginManager.stop(); |
|
|
| if(getRootDir().exists()) |
| |
| |
| getQueue().save(); |
|
|
| threadPoolForLoad.shutdown(); |
| for (Future<?> f : pending) |
| try { |
| f.get(10, TimeUnit.SECONDS); |
| } catch (InterruptedException e) { |
| Thread.currentThread().interrupt(); |
| break; |
| } catch (ExecutionException e) { |
| LOGGER.log(Level.WARNING, ""Failed to shut down properly"",e); |
| } catch (TimeoutException e) { |
| LOGGER.log(Level.WARNING, ""Failed to shut down properly"",e); |
| } |
|
|
| LogFactory.releaseAll(); |
|
|
| theInstance = null; |
| } |
|
|
| public Object getDynamic(String token) { |
| for (Action a : getActions()) { |
| String url = a.getUrlName(); |
| if (url==null) continue; |
| if (url.equals(token) || url.equals('/' + token)) |
| return a; |
| } |
| for (Action a : getManagementLinks()) |
| if(a.getUrlName().equals(token)) |
| return a; |
| return null; |
| } |
|
|
|
|
| |
| |
| |
| |
| |
| /** |
| * Accepts submission from the configuration page. |
| */ |
| public synchronized void doConfigSubmit( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException, FormException { |
| BulkChange bc = new BulkChange(this); |
| try { |
| checkPermission(ADMINISTER); |
|
|
| JSONObject json = req.getSubmittedForm(); |
|
|
| workspaceDir = json.getString(""rawWorkspaceDir""); |
| buildsDir = json.getString(""rawBuildsDir""); |
|
|
| systemMessage = Util.nullify(req.getParameter(""system_message"")); |
|
|
| jdks.clear(); |
| jdks.addAll(req.bindJSONToList(JDK.class,json.get(""jdks""))); |
|
|
| boolean result = true; |
| for( Descriptor<?> d : Functions.getSortedDescriptorsForGlobalConfig() ) |
| result &= configureDescriptor(req,json,d); |
|
|
| version = VERSION; |
|
|
| save(); |
| updateComputerList(); |
| if(result) |
| FormApply.success(req.getContextPath()+'/').generateResponse(req, rsp, null); |
| else |
| FormApply.success(""configure"").generateResponse(req, rsp, null); |
| } finally { |
| bc.commit(); |
| } |
| } |
|
|
| /** |
| * Gets the {@link CrumbIssuer} currently in use. |
| * |
| * @return null if none is in use. |
| */ |
| public CrumbIssuer getCrumbIssuer() { |
| return crumbIssuer; |
| } |
|
|
| public void setCrumbIssuer(CrumbIssuer issuer) { |
| crumbIssuer = issuer; |
| } |
|
|
| public synchronized void doTestPost( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException { |
| rsp.sendRedirect(""foo""); |
| } |
|
|
| private boolean configureDescriptor(StaplerRequest req, JSONObject json, Descriptor<?> d) throws FormException { |
| |
| String name = d.getJsonSafeClassName(); |
| JSONObject js = json.has(name) ? json.getJSONObject(name) : new JSONObject(); |
| json.putAll(js); |
| return d.configure(req, js); |
| } |
|
|
| /** |
| * Accepts submission from the node configuration page. |
| */ |
| public synchronized void doConfigExecutorsSubmit( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException, FormException { |
| checkPermission(ADMINISTER); |
|
|
| BulkChange bc = new BulkChange(this); |
| try { |
| JSONObject json = req.getSubmittedForm(); |
|
|
| MasterBuildConfiguration mbc = MasterBuildConfiguration.all().get(MasterBuildConfiguration.class); |
| if (mbc!=null) |
| mbc.configure(req,json); |
|
|
| getNodeProperties().rebuild(req, json.optJSONObject(""nodeProperties""), NodeProperty.all()); |
| } finally { |
| bc.commit(); |
| } |
|
|
| rsp.sendRedirect(req.getContextPath()+'/'+toComputer().getUrl()); |
| } |
|
|
| /** |
| * Accepts the new description. |
| */ |
| public synchronized void doSubmitDescription( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException { |
| getPrimaryView().doSubmitDescription(req, rsp); |
| } |
|
|
| public synchronized HttpRedirect doQuietDown() throws IOException { |
| try { |
| return doQuietDown(false,0); |
| } catch (InterruptedException e) { |
| throw new AssertionError(); |
| } |
| } |
|
|
| @CLIMethod(name=""quiet-down"") |
| public HttpRedirect doQuietDown( |
| @Option(name=""-block"",usage=""Block until the system really quiets down and no builds are running"") @QueryParameter boolean block, |
| @Option(name=""-timeout"",usage=""If non-zero, only block up to the specified number of milliseconds"") @QueryParameter int timeout) throws InterruptedException, IOException { |
| synchronized (this) { |
| checkPermission(ADMINISTER); |
| isQuietingDown = true; |
| } |
| if (block) { |
| if (timeout > 0) timeout += System.currentTimeMillis(); |
| while (isQuietingDown |
| && (timeout <= 0 || System.currentTimeMillis() < timeout) |
| && !RestartListener.isAllReady()) { |
| Thread.sleep(1000); |
| } |
| } |
| return new HttpRedirect("".""); |
| } |
|
|
| @CLIMethod(name=""cancel-quiet-down"") |
| public synchronized HttpRedirect doCancelQuietDown() { |
| checkPermission(ADMINISTER); |
| isQuietingDown = false; |
| getQueue().scheduleMaintenance(); |
| return new HttpRedirect("".""); |
| } |
|
|
| /** |
| * Backward compatibility. Redirect to the thread dump. |
| */ |
| public void doClassicThreadDump(StaplerResponse rsp) throws IOException, ServletException { |
| rsp.sendRedirect2(""threadDump""); |
| } |
|
|
| /** |
| * Obtains the thread dump of all slaves (including the master.) |
| * |
| * <p> |
| * Since this is for diagnostics, it has a built-in precautionary measure against hang slaves. |
| */ |
| public Map<String,Map<String,String>> getAllThreadDumps() throws IOException, InterruptedException { |
| checkPermission(ADMINISTER); |
|
|
| |
| Map<String,Future<Map<String,String>>> future = new HashMap<String, Future<Map<String, String>>>(); |
|
|
| for (Computer c : getComputers()) { |
| try { |
| future.put(c.getName(), RemotingDiagnostics.getThreadDumpAsync(c.getChannel())); |
| } catch(Exception e) { |
| LOGGER.info(""Failed to get thread dump for node "" + c.getName() + "": "" + e.getMessage()); |
| } |
| } |
| if (toComputer() == null) { |
| future.put(""master"", RemotingDiagnostics.getThreadDumpAsync(MasterComputer.localChannel)); |
| } |
|
|
| |
| |
| long endTime = System.currentTimeMillis() + 5000; |
|
|
| Map<String,Map<String,String>> r = new HashMap<String, Map<String, String>>(); |
| for (Entry<String, Future<Map<String, String>>> e : future.entrySet()) { |
| try { |
| r.put(e.getKey(), e.getValue().get(endTime-System.currentTimeMillis(), TimeUnit.MILLISECONDS)); |
| } catch (Exception x) { |
| StringWriter sw = new StringWriter(); |
| x.printStackTrace(new PrintWriter(sw,true)); |
| r.put(e.getKey(), Collections.singletonMap(""Failed to retrieve thread dump"",sw.toString())); |
| } |
| } |
| return r; |
| } |
|
|
| public synchronized TopLevelItem doCreateItem( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException { |
| return itemGroupMixIn.createTopLevelItem(req, rsp); |
| } |
|
|
| /** |
| * @since 1.319 |
| */ |
| public TopLevelItem createProjectFromXML(String name, InputStream xml) throws IOException { |
| return itemGroupMixIn.createProjectFromXML(name, xml); |
| } |
|
|
|
|
| @SuppressWarnings({""unchecked""}) |
| public <T extends TopLevelItem> T copy(T src, String name) throws IOException { |
| return itemGroupMixIn.copy(src, name); |
| } |
|
|
| |
| |
| public <T extends AbstractProject<?,?>> T copy(T src, String name) throws IOException { |
| return (T)copy((TopLevelItem)src,name); |
| } |
|
|
| public synchronized void doCreateView( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException, FormException { |
| checkPermission(View.CREATE); |
| addView(View.create(req,rsp, this)); |
| } |
|
|
| /** |
| * Check if the given name is suitable as a name |
| * for job, view, etc. |
| * |
| * @throws ParseException |
| * if the given name is not good |
| */ |
| public static void checkGoodName(String name) throws Failure { |
| if(name==null || name.length()==0) |
| throw new Failure(Messages.Hudson_NoName()); |
|
|
| for( int i=0; i<name.length(); i++ ) { |
| char ch = name.charAt(i); |
| if(Character.isISOControl(ch)) { |
| throw new Failure(Messages.Hudson_ControlCodeNotAllowed(toPrintableName(name))); |
| } |
| if(""?*/\\%!@#$^&|<>[]:;"".indexOf(ch)!=-1) |
| throw new Failure(Messages.Hudson_UnsafeChar(ch)); |
| } |
|
|
| |
| } |
|
|
| /** |
| * Makes sure that the given name is good as a job name. |
| * @return trimmed name if valid; throws ParseException if not |
| */ |
| private String checkJobName(String name) throws Failure { |
| checkGoodName(name); |
| name = name.trim(); |
| projectNamingStrategy.checkName(name); |
| if(getItem(name)!=null) |
| throw new Failure(Messages.Hudson_JobAlreadyExists(name)); |
| |
| return name; |
| } |
|
|
| private static String toPrintableName(String name) { |
| StringBuilder printableName = new StringBuilder(); |
| for( int i=0; i<name.length(); i++ ) { |
| char ch = name.charAt(i); |
| if(Character.isISOControl(ch)) |
| printableName.append(""\\u"").append((int)ch).append(';'); |
| else |
| printableName.append(ch); |
| } |
| return printableName.toString(); |
| } |
|
|
| /** |
| * Checks if the user was successfully authenticated. |
| * |
| * @see BasicAuthenticationFilter |
| */ |
| public void doSecured( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException { |
| if(req.getUserPrincipal()==null) { |
| |
| rsp.setStatus(HttpServletResponse.SC_UNAUTHORIZED); |
| return; |
| } |
|
|
| |
| String path = req.getContextPath()+req.getOriginalRestOfPath(); |
| String q = req.getQueryString(); |
| if(q!=null) |
| path += '?'+q; |
|
|
| rsp.sendRedirect2(path); |
| } |
|
|
| /** |
| * Called once the user logs in. Just forward to the top page. |
| */ |
| public void doLoginEntry( StaplerRequest req, StaplerResponse rsp ) throws IOException { |
| if(req.getUserPrincipal()==null) { |
| rsp.sendRedirect2(""noPrincipal""); |
| return; |
| } |
|
|
| String from = req.getParameter(""from""); |
| if(from!=null && from.startsWith(""/"") && !from.equals(""/loginError"")) { |
| rsp.sendRedirect2(from); |
| return; |
| } |
|
|
| String url = AbstractProcessingFilter.obtainFullRequestUrl(req); |
| if(url!=null) { |
| |
| |
| rsp.sendRedirect2(url); |
| return; |
| } |
|
|
| rsp.sendRedirect2("".""); |
| } |
|
|
| /** |
| * Logs out the user. |
| */ |
| public void doLogout( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException { |
| securityRealm.doLogout(req, rsp); |
| } |
|
|
| /** |
| * Serves jar files for JNLP slave agents. |
| */ |
| public Slave.JnlpJar getJnlpJars(String fileName) { |
| return new Slave.JnlpJar(fileName); |
| } |
|
|
| public Slave.JnlpJar doJnlpJars(StaplerRequest req) { |
| return new Slave.JnlpJar(req.getRestOfPath().substring(1)); |
| } |
|
|
| /** |
| * Reloads the configuration. |
| */ |
| @CLIMethod(name=""reload-configuration"") |
| public synchronized HttpResponse doReload() throws IOException { |
| checkPermission(ADMINISTER); |
|
|
| |
| servletContext.setAttribute(""app"", new HudsonIsLoading()); |
|
|
| new Thread(""Jenkins config reload thread"") { |
| @Override |
| public void run() { |
| try { |
| ACL.impersonate(ACL.SYSTEM); |
| reload(); |
| } catch (Exception e) { |
| LOGGER.log(SEVERE,""Failed to reload Jenkins config"",e); |
| WebApp.get(servletContext).setApp(new JenkinsReloadFailed(e)); |
| } |
| } |
| }.start(); |
|
|
| return HttpResponses.redirectViaContextPath(""/""); |
| } |
|
|
| /** |
| * Reloads the configuration synchronously. |
| */ |
| public void reload() throws IOException, InterruptedException, ReactorException { |
| executeReactor(null, loadTasks()); |
| User.reload(); |
| servletContext.setAttribute(""app"", this); |
| } |
|
|
| /** |
| * Do a finger-print check. |
| */ |
| public void doDoFingerprintCheck( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException { |
| |
| MultipartFormDataParser p = new MultipartFormDataParser(req); |
| if(isUseCrumbs() && !getCrumbIssuer().validateCrumb(req, p)) { |
| rsp.sendError(HttpServletResponse.SC_FORBIDDEN,""No crumb found""); |
| } |
| try { |
| rsp.sendRedirect2(req.getContextPath()+""/fingerprint/""+ |
| Util.getDigestOf(p.getFileItem(""name"").getInputStream())+'/'); |
| } finally { |
| p.cleanUp(); |
| } |
| } |
|
|
| /** |
| * For debugging. Expose URL to perform GC. |
| */ |
| @edu.umd.cs.findbugs.annotations.SuppressWarnings(""DM_GC"") |
| public void doGc(StaplerResponse rsp) throws IOException { |
| checkPermission(Jenkins.ADMINISTER); |
| System.gc(); |
| rsp.setStatus(HttpServletResponse.SC_OK); |
| rsp.setContentType(""text/plain""); |
| rsp.getWriter().println(""GCed""); |
| } |
|
|
| /** |
| * End point that intentionally throws an exception to test the error behaviour. |
| */ |
| public void doException() { |
| throw new RuntimeException(); |
| } |
|
|
| public ContextMenu doContextMenu(StaplerRequest request, StaplerResponse response) throws IOException, JellyException { |
| ContextMenu menu = new ContextMenu().from(this, request, response); |
| for (MenuItem i : menu.items) { |
| if (i.url.equals(""/manage"")) { |
| |
| i.subMenu = new ContextMenu().from(this, request, response, ""manage""); |
| } |
| } |
| return menu; |
| } |
|
|
| /** |
| * Obtains the heap dump. |
| */ |
| public HeapDump getHeapDump() throws IOException { |
| return new HeapDump(this,MasterComputer.localChannel); |
| } |
|
|
| /** |
| * Simulates OutOfMemoryError. |
| * Useful to make sure OutOfMemoryHeapDump setting. |
| */ |
| public void doSimulateOutOfMemory() throws IOException { |
| checkPermission(ADMINISTER); |
|
|
| System.out.println(""Creating artificial OutOfMemoryError situation""); |
| List<Object> args = new ArrayList<Object>(); |
| while (true) |
| args.add(new byte[1024*1024]); |
| } |
|
|
| private transient final Map<UUID,FullDuplexHttpChannel> duplexChannels = new HashMap<UUID, FullDuplexHttpChannel>(); |
|
|
| /** |
| * Handles HTTP requests for duplex channels for CLI. |
| */ |
| public void doCli(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException, InterruptedException { |
| if (!""POST"".equals(req.getMethod())) { |
| |
| checkPermission(READ); |
| req.getView(this,""_cli.jelly"").forward(req,rsp); |
| return; |
| } |
|
|
| |
| |
|
|
| UUID uuid = UUID.fromString(req.getHeader(""Session"")); |
| rsp.setHeader(""Hudson-Duplex"",""""); |
|
|
| FullDuplexHttpChannel server; |
| if(req.getHeader(""Side"").equals(""download"")) { |
| duplexChannels.put(uuid,server=new FullDuplexHttpChannel(uuid, !hasPermission(ADMINISTER)) { |
| protected void main(Channel channel) throws IOException, InterruptedException { |
| |
| channel.setProperty(CLICommand.TRANSPORT_AUTHENTICATION,getAuthentication()); |
| channel.setProperty(CliEntryPoint.class.getName(),new CliManagerImpl(channel)); |
| } |
| }); |
| try { |
| server.download(req,rsp); |
| } finally { |
| duplexChannels.remove(uuid); |
| } |
| } else { |
| duplexChannels.get(uuid).upload(req,rsp); |
| } |
| } |
|
|
| /** |
| * Binds /userContent/... to $JENKINS_HOME/userContent. |
| */ |
| public DirectoryBrowserSupport doUserContent() { |
| return new DirectoryBrowserSupport(this,getRootPath().child(""userContent""),""User content"",""folder.png"",true); |
| } |
|
|
| /** |
| * Perform a restart of Hudson, if we can. |
| * |
| * This first replaces ""app"" to {@link HudsonIsRestarting} |
| */ |
| @CLIMethod(name=""restart"") |
| public void doRestart(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException, RestartNotSupportedException { |
| checkPermission(ADMINISTER); |
| if (req != null && req.getMethod().equals(""GET"")) { |
| req.getView(this,""_restart.jelly"").forward(req,rsp); |
| return; |
| } |
|
|
| restart(); |
|
|
| if (rsp != null) |
| rsp.sendRedirect2("".""); |
| } |
|
|
| /** |
| * Queues up a restart of Hudson for when there are no builds running, if we can. |
| * |
| * This first replaces ""app"" to {@link HudsonIsRestarting} |
| * |
| * @since 1.332 |
| */ |
| @CLIMethod(name=""safe-restart"") |
| public HttpResponse doSafeRestart(StaplerRequest req) throws IOException, ServletException, RestartNotSupportedException { |
| checkPermission(ADMINISTER); |
| if (req != null && req.getMethod().equals(""GET"")) |
| return HttpResponses.forwardToView(this,""_safeRestart.jelly""); |
|
|
| safeRestart(); |
|
|
| return HttpResponses.redirectToDot(); |
| } |
|
|
| /** |
| * Performs a restart. |
| */ |
| public void restart() throws RestartNotSupportedException { |
| final Lifecycle lifecycle = Lifecycle.get(); |
| lifecycle.verifyRestartable(); |
| servletContext.setAttribute(""app"", new HudsonIsRestarting()); |
|
|
| new Thread(""restart thread"") { |
| final String exitUser = getAuthentication().getName(); |
| @Override |
| public void run() { |
| try { |
| ACL.impersonate(ACL.SYSTEM); |
|
|
| |
| Thread.sleep(5000); |
| LOGGER.severe(String.format(""Restarting VM as requested by %s"",exitUser)); |
| for (RestartListener listener : RestartListener.all()) |
| listener.onRestart(); |
| lifecycle.restart(); |
| } catch (InterruptedException e) { |
| LOGGER.log(Level.WARNING, ""Failed to restart Hudson"",e); |
| } catch (IOException e) { |
| LOGGER.log(Level.WARNING, ""Failed to restart Hudson"",e); |
| } |
| } |
| }.start(); |
| } |
|
|
| /** |
| * Queues up a restart to be performed once there are no builds currently running. |
| * @since 1.332 |
| */ |
| public void safeRestart() throws RestartNotSupportedException { |
| final Lifecycle lifecycle = Lifecycle.get(); |
| lifecycle.verifyRestartable(); |
| |
| isQuietingDown = true; |
|
|
| new Thread(""safe-restart thread"") { |
| final String exitUser = getAuthentication().getName(); |
| @Override |
| public void run() { |
| try { |
| ACL.impersonate(ACL.SYSTEM); |
|
|
| |
| doQuietDown(true, 0); |
|
|
| |
| if (isQuietingDown) { |
| servletContext.setAttribute(""app"",new HudsonIsRestarting()); |
| |
| LOGGER.info(""Restart in 10 seconds""); |
| Thread.sleep(10000); |
| LOGGER.severe(String.format(""Restarting VM as requested by %s"",exitUser)); |
| for (RestartListener listener : RestartListener.all()) |
| listener.onRestart(); |
| lifecycle.restart(); |
| } else { |
| LOGGER.info(""Safe-restart mode cancelled""); |
| } |
| } catch (InterruptedException e) { |
| LOGGER.log(Level.WARNING, ""Failed to restart Hudson"",e); |
| } catch (IOException e) { |
| LOGGER.log(Level.WARNING, ""Failed to restart Hudson"",e); |
| } |
| } |
| }.start(); |
| } |
|
|
| /** |
| * Shutdown the system. |
| * @since 1.161 |
| */ |
| @CLIMethod(name=""shutdown"") |
| public void doExit( StaplerRequest req, StaplerResponse rsp ) throws IOException { |
| checkPermission(ADMINISTER); |
| LOGGER.severe(String.format(""Shutting down VM as requested by %s from %s"", |
| getAuthentication().getName(), req!=null?req.getRemoteAddr():""???"")); |
| if (rsp!=null) { |
| rsp.setStatus(HttpServletResponse.SC_OK); |
| rsp.setContentType(""text/plain""); |
| PrintWriter w = rsp.getWriter(); |
| w.println(""Shutting down""); |
| w.close(); |
| } |
|
|
| System.exit(0); |
| } |
|
|
|
|
| /** |
| * Shutdown the system safely. |
| * @since 1.332 |
| */ |
| @CLIMethod(name=""safe-shutdown"") |
| public HttpResponse doSafeExit(StaplerRequest req) throws IOException { |
| checkPermission(ADMINISTER); |
| isQuietingDown = true; |
| final String exitUser = getAuthentication().getName(); |
| final String exitAddr = req!=null ? req.getRemoteAddr() : ""unknown""; |
| new Thread(""safe-exit thread"") { |
| @Override |
| public void run() { |
| try { |
| ACL.impersonate(ACL.SYSTEM); |
| LOGGER.severe(String.format(""Shutting down VM as requested by %s from %s"", |
| exitUser, exitAddr)); |
| |
| while (isQuietingDown |
| && (overallLoad.computeTotalExecutors() > overallLoad.computeIdleExecutors())) { |
| Thread.sleep(5000); |
| } |
| |
| if (isQuietingDown) { |
| cleanUp(); |
| System.exit(0); |
| } |
| } catch (InterruptedException e) { |
| LOGGER.log(Level.WARNING, ""Failed to shutdown Hudson"",e); |
| } |
| } |
| }.start(); |
|
|
| return HttpResponses.plainText(""Shutting down as soon as all jobs are complete""); |
| } |
|
|
| /** |
| * Gets the {@link Authentication} object that represents the user |
| * associated with the current request. |
| */ |
| public static Authentication getAuthentication() { |
| Authentication a = SecurityContextHolder.getContext().getAuthentication(); |
| |
| |
| |
| |
| if(a==null) |
| a = ANONYMOUS; |
| return a; |
| } |
|
|
| /** |
| * For system diagnostics. |
| * Run arbitrary Groovy script. |
| */ |
| public void doScript(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException { |
| doScript(req, rsp, req.getView(this, ""_script.jelly"")); |
| } |
|
|
| /** |
| * Run arbitrary Groovy script and return result as plain text. |
| */ |
| public void doScriptText(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException { |
| doScript(req, rsp, req.getView(this, ""_scriptText.jelly"")); |
| } |
|
|
| private void doScript(StaplerRequest req, StaplerResponse rsp, RequestDispatcher view) throws IOException, ServletException { |
| |
| checkPermission(RUN_SCRIPTS); |
|
|
| String text = req.getParameter(""script""); |
| if (text != null) { |
| try { |
| req.setAttribute(""output"", |
| RemotingDiagnostics.executeGroovy(text, MasterComputer.localChannel)); |
| } catch (InterruptedException e) { |
| throw new ServletException(e); |
| } |
| } |
|
|
| view.forward(req, rsp); |
| } |
|
|
| /** |
| * Evaluates the Jelly script submitted by the client. |
| * |
| * This is useful for system administration as well as unit testing. |
| */ |
| @RequirePOST |
| public void doEval(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException { |
| checkPermission(ADMINISTER); |
|
|
| try { |
| MetaClass mc = WebApp.getCurrent().getMetaClass(getClass()); |
| Script script = mc.classLoader.loadTearOff(JellyClassLoaderTearOff.class).createContext().compileScript(new InputSource(req.getReader())); |
| new JellyRequestDispatcher(this,script).forward(req,rsp); |
| } catch (JellyException e) { |
| throw new ServletException(e); |
| } |
| } |
|
|
| /** |
| * Sign up for the user account. |
| */ |
| public void doSignup( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException { |
| req.getView(getSecurityRealm(), ""signup.jelly"").forward(req, rsp); |
| } |
|
|
| /** |
| * Changes the icon size by changing the cookie |
| */ |
| public void doIconSize( StaplerRequest req, StaplerResponse rsp ) throws IOException, ServletException { |
| String qs = req.getQueryString(); |
| if(qs==null || !ICON_SIZE.matcher(qs).matches()) |
| throw new ServletException(); |
| Cookie cookie = new Cookie(""iconSize"", qs); |
| cookie.setMaxAge(/* ~4 mo. */9999999); |
| rsp.addCookie(cookie); |
| String ref = req.getHeader(""Referer""); |
| if(ref==null) ref="".""; |
| rsp.sendRedirect2(ref); |
| } |
|
|
| public void doFingerprintCleanup(StaplerResponse rsp) throws IOException { |
| FingerprintCleanupThread.invoke(); |
| rsp.setStatus(HttpServletResponse.SC_OK); |
| rsp.setContentType(""text/plain""); |
| rsp.getWriter().println(""Invoked""); |
| } |
|
|
| public void doWorkspaceCleanup(StaplerResponse rsp) throws IOException { |
| WorkspaceCleanupThread.invoke(); |
| rsp.setStatus(HttpServletResponse.SC_OK); |
| rsp.setContentType(""text/plain""); |
| rsp.getWriter().println(""Invoked""); |
| } |
|
|
| /** |
| * If the user chose the default JDK, make sure we got 'java' in PATH. |
| */ |
| public FormValidation doDefaultJDKCheck(StaplerRequest request, @QueryParameter String value) { |
| if(!value.equals(""(Default)"")) |
| |
| |
| return FormValidation.ok(); |
|
|
| |
| if(JDK.isDefaultJDKValid(Jenkins.this)) |
| return FormValidation.ok(); |
| else |
| return FormValidation.errorWithMarkup(Messages.Hudson_NoJavaInPath(request.getContextPath())); |
| } |
|
|
| /** |
| * Makes sure that the given name is good as a job name. |
| */ |
| public FormValidation doCheckJobName(@QueryParameter String value) { |
| |
| |
| checkPermission(Item.CREATE); |
|
|
| if(fixEmpty(value)==null) |
| return FormValidation.ok(); |
|
|
| try { |
| checkJobName(value); |
| return FormValidation.ok(); |
| } catch (Failure e) { |
| return FormValidation.error(e.getMessage()); |
| } |
| } |
|
|
| /** |
| * Checks if a top-level view with the given name exists. |
| */ |
| public FormValidation doViewExistsCheck(@QueryParameter String value) { |
| checkPermission(View.CREATE); |
|
|
| String view = fixEmpty(value); |
| if(view==null) return FormValidation.ok(); |
|
|
| if(getView(view)==null) |
| return FormValidation.ok(); |
| else |
| return FormValidation.error(Messages.Hudson_ViewAlreadyExists(view)); |
| } |
|
|
| /** |
| * Serves static resources placed along with Jelly view files. |
| * <p> |
| * This method can serve a lot of files, so care needs to be taken |
| * to make this method secure. It's not clear to me what's the best |
| * strategy here, though the current implementation is based on |
| * file extensions. |
| */ |
| public void doResources(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException { |
| String path = req.getRestOfPath(); |
| |
| |
| |
| path = path.substring(path.indexOf('/',1)+1); |
|
|
| int idx = path.lastIndexOf('.'); |
| String extension = path.substring(idx+1); |
| if(ALLOWED_RESOURCE_EXTENSIONS.contains(extension)) { |
| URL url = pluginManager.uberClassLoader.getResource(path); |
| if(url!=null) { |
| long expires = MetaClass.NO_CACHE ? 0 : 365L * 24 * 60 * 60 * 1000; /*1 year*/ |
| rsp.serveFile(req,url,expires); |
| return; |
| } |
| } |
| rsp.sendError(HttpServletResponse.SC_NOT_FOUND); |
| } |
|
|
| /** |
| * Extension list that {@link #doResources(StaplerRequest, StaplerResponse)} can serve. |
| * This set is mutable to allow plugins to add additional extensions. |
| */ |
| public static final Set<String> ALLOWED_RESOURCE_EXTENSIONS = new HashSet<String>(Arrays.asList( |
| ""js|css|jpeg|jpg|png|gif|html|htm"".split(""\\|"") |
| )); |
|
|
| /** |
| * Checks if container uses UTF-8 to decode URLs. See |
| * http: |
| */ |
| public FormValidation doCheckURIEncoding(StaplerRequest request) throws IOException { |
| |
| final String expected = ""\u57f7\u4e8b""; |
| final String value = fixEmpty(request.getParameter(""value"")); |
| if (!expected.equals(value)) |
| return FormValidation.warningWithMarkup(Messages.Hudson_NotUsesUTF8ToDecodeURL()); |
| return FormValidation.ok(); |
| } |
|
|
| /** |
| * Does not check when system default encoding is ""ISO-8859-1"". |
| */ |
| public static boolean isCheckURIEncodingEnabled() { |
| return !""ISO-8859-1"".equalsIgnoreCase(System.getProperty(""file.encoding"")); |
| } |
|
|
| /** |
| * Rebuilds the dependency map. |
| */ |
| public void rebuildDependencyGraph() { |
| DependencyGraph graph = new DependencyGraph(); |
| graph.build(); |
| |
| |
| dependencyGraph = graph; |
| } |
|
|
| public DependencyGraph getDependencyGraph() { |
| return dependencyGraph; |
| } |
|
|
| |
| public List<ManagementLink> getManagementLinks() { |
| return ManagementLink.all(); |
| } |
|
|
| /** |
| * Exposes the current user to <tt>/me</tt> URL. |
| */ |
| public User getMe() { |
| User u = User.current(); |
| if (u == null) |
| throw new AccessDeniedException(""/me is not available when not logged in""); |
| return u; |
| } |
|
|
| /** |
| * Gets the {@link Widget}s registered on this object. |
| * |
| * <p> |
| * Plugins who wish to contribute boxes on the side panel can add widgets |
| * by {@code getWidgets().add(new MyWidget())} from {@link Plugin#start()}. |
| */ |
| public List<Widget> getWidgets() { |
| return widgets; |
| } |
|
|
| public Object getTarget() { |
| try { |
| checkPermission(READ); |
| } catch (AccessDeniedException e) { |
| String rest = Stapler.getCurrentRequest().getRestOfPath(); |
| if(rest.startsWith(""/login"") |
| || rest.startsWith(""/logout"") |
| || rest.startsWith(""/accessDenied"") |
| || rest.startsWith(""/adjuncts/"") |
| || rest.startsWith(""/signup"") |
| || rest.startsWith(""/tcpSlaveAgentListener"") |
| || rest.startsWith(""/cli"") |
| || rest.startsWith(""/federatedLoginService/"") |
| || rest.startsWith(""/securityRealm"")) |
| return this; |
|
|
| for (String name : getUnprotectedRootActions()) { |
| if (rest.startsWith(""/"" + name + ""/"") || rest.equals(""/"" + name)) { |
| return this; |
| } |
| } |
|
|
| throw e; |
| } |
| return this; |
| } |
|
|
| /** |
| * Gets a list of unprotected root actions. |
| * These URL prefixes should be exempted from access control checks by container-managed security. |
| * Ideally would be synchronized with {@link #getTarget}. |
| * @return a list of {@linkplain Action#getUrlName URL names} |
| * @since 1.495 |
| */ |
| public Collection<String> getUnprotectedRootActions() { |
| Set<String> names = new TreeSet<String>(); |
| names.add(""jnlpJars""); |
| |
| for (Action a : getActions()) { |
| if (a instanceof UnprotectedRootAction) { |
| names.add(a.getUrlName()); |
| } |
| } |
| return names; |
| } |
|
|
| /** |
| * Fallback to the primary view. |
| */ |
| public View getStaplerFallback() { |
| return getPrimaryView(); |
| } |
|
|
| /** |
| * This method checks all existing jobs to see if displayName is |
| * unique. It does not check the displayName against the displayName of the |
| * job that the user is configuring though to prevent a validation warning |
| * if the user sets the displayName to what it currently is. |
| * @param displayName |
| * @param currentJobName |
| * @return |
| */ |
| boolean isDisplayNameUnique(String displayName, String currentJobName) { |
| Collection<TopLevelItem> itemCollection = items.values(); |
| |
| |
| |
| for(TopLevelItem item : itemCollection) { |
| if(item.getName().equals(currentJobName)) { |
| |
| |
| |
| continue; |
| } |
| else if(displayName.equals(item.getDisplayName())) { |
| return false; |
| } |
| } |
| |
| return true; |
| } |
| |
| /** |
| * True if there is no item in Jenkins that has this name |
| * @param name The name to test |
| * @param currentJobName The name of the job that the user is configuring |
| * @return |
| */ |
| boolean isNameUnique(String name, String currentJobName) { |
| Item item = getItem(name); |
| |
| if(null==item) { |
| |
| return true; |
| } |
| else if(item.getName().equals(currentJobName)) { |
| |
| |
| return true; |
| } |
| else { |
| |
| return false; |
| } |
| } |
| |
| /** |
| * Checks to see if the candidate displayName collides with any |
| * existing display names or project names |
| * @param displayName The display name to test |
| * @param jobName The name of the job the user is configuring |
| * @return |
| */ |
| public FormValidation doCheckDisplayName(@QueryParameter String displayName, |
| @QueryParameter String jobName) { |
| displayName = displayName.trim(); |
| |
| if(LOGGER.isLoggable(Level.FINE)) { |
| LOGGER.log(Level.FINE, ""Current job name is "" + jobName); |
| } |
| |
| if(!isNameUnique(displayName, jobName)) { |
| return FormValidation.warning(Messages.Jenkins_CheckDisplayName_NameNotUniqueWarning(displayName)); |
| } |
| else if(!isDisplayNameUnique(displayName, jobName)){ |
| return FormValidation.warning(Messages.Jenkins_CheckDisplayName_DisplayNameNotUniqueWarning(displayName)); |
| } |
| else { |
| return FormValidation.ok(); |
| } |
| } |
| |
| public static class MasterComputer extends Computer { |
| protected MasterComputer() { |
| super(Jenkins.getInstance()); |
| } |
|
|
| /** |
| * Returns """" to match with {@link Jenkins#getNodeName()}. |
| */ |
| @Override |
| public String getName() { |
| return """"; |
| } |
|
|
| @Override |
| public boolean isConnecting() { |
| return false; |
| } |
|
|
| @Override |
| public String getDisplayName() { |
| return Messages.Hudson_Computer_DisplayName(); |
| } |
|
|
| @Override |
| public String getCaption() { |
| return Messages.Hudson_Computer_Caption(); |
| } |
|
|
| @Override |
| public String getUrl() { |
| return ""computer/(master)/""; |
| } |
|
|
| public RetentionStrategy getRetentionStrategy() { |
| return RetentionStrategy.NOOP; |
| } |
|
|
| /** |
| * Report an error. |
| */ |
| @Override |
| public HttpResponse doDoDelete() throws IOException { |
| throw HttpResponses.status(SC_BAD_REQUEST); |
| } |
|
|
| @Override |
| public void doConfigSubmit(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException, FormException { |
| Jenkins.getInstance().doConfigExecutorsSubmit(req, rsp); |
| } |
|
|
| @Override |
| public boolean hasPermission(Permission permission) { |
| |
| |
| if(permission==Computer.DELETE) |
| return false; |
| |
| return super.hasPermission(permission==Computer.CONFIGURE ? Jenkins.ADMINISTER : permission); |
| } |
|
|
| @Override |
| public VirtualChannel getChannel() { |
| return localChannel; |
| } |
|
|
| @Override |
| public Charset getDefaultCharset() { |
| return Charset.defaultCharset(); |
| } |
|
|
| public List<LogRecord> getLogRecords() throws IOException, InterruptedException { |
| return logRecords; |
| } |
|
|
| public void doLaunchSlaveAgent(StaplerRequest req, StaplerResponse rsp) throws IOException, ServletException { |
| |
| |
| rsp.sendError(SC_NOT_FOUND); |
| } |
|
|
| protected Future<?> _connect(boolean forceReconnect) { |
| return Futures.precomputed(null); |
| } |
|
|
| /** |
| * {@link LocalChannel} instance that can be used to execute programs locally. |
| */ |
| public static final LocalChannel localChannel = new LocalChannel(threadPoolForRemoting); |
| } |
|
|
| /** |
| * Shortcut for {@code Hudson.getInstance().lookup.get(type)} |
| */ |
| public static <T> T lookup(Class<T> type) { |
| return Jenkins.getInstance().lookup.get(type); |
| } |
|
|
| /** |
| * Live view of recent {@link LogRecord}s produced by Hudson. |
| */ |
| public static List<LogRecord> logRecords = Collections.emptyList(); |
|
|
| /** |
| * Thread-safe reusable {@link XStream}. |
| */ |
| public static final XStream XSTREAM = new XStream2(); |
|
|
| /** |
| * Alias to {@link #XSTREAM} so that one can access additional methods on {@link XStream2} more easily. |
| */ |
| public static final XStream2 XSTREAM2 = (XStream2)XSTREAM; |
|
|
| private static final int TWICE_CPU_NUM = Math.max(4, Runtime.getRuntime().availableProcessors() * 2); |
|
|
| /** |
| * Thread pool used to load configuration in parallel, to improve the start up time. |
| * <p> |
| * The idea here is to overlap the CPU and I/O, so we want more threads than CPU numbers. |
| */ |
| /*package*/ transient final ExecutorService threadPoolForLoad = new ThreadPoolExecutor( |
| TWICE_CPU_NUM, TWICE_CPU_NUM, |
| 5L, TimeUnit.SECONDS, new LinkedBlockingQueue<Runnable>(), new DaemonThreadFactory()); |
|
|
|
|
| private static void computeVersion(ServletContext context) { |
| |
| Properties props = new Properties(); |
| try { |
| InputStream is = Jenkins.class.getResourceAsStream(""jenkins-version.properties""); |
| if(is!=null) |
| props.load(is); |
| } catch (IOException e) { |
| e.printStackTrace(); |
| } |
| String ver = props.getProperty(""version""); |
| if(ver==null) ver=""?""; |
| VERSION = ver; |
| context.setAttribute(""version"",ver); |
|
|
| VERSION_HASH = Util.getDigestOf(ver).substring(0, 8); |
| SESSION_HASH = Util.getDigestOf(ver+System.currentTimeMillis()).substring(0, 8); |
|
|
| if(ver.equals(""?"") || Boolean.getBoolean(""hudson.script.noCache"")) |
| RESOURCE_PATH = """"; |
| else |
| RESOURCE_PATH = ""/static/""+SESSION_HASH; |
|
|
| VIEW_RESOURCE_PATH = ""/resources/""+ SESSION_HASH; |
| } |
|
|
| /** |
| * Version number of this Hudson. |
| */ |
| public static String VERSION=""?""; |
|
|
| /** |
| * Parses {@link #VERSION} into {@link VersionNumber}, or null if it's not parseable as a version number |
| * (such as when Hudson is run with ""mvn hudson-dev:run"") |
| */ |
| public static VersionNumber getVersion() { |
| try { |
| return new VersionNumber(VERSION); |
| } catch (NumberFormatException e) { |
| try { |
| |
| int idx = VERSION.indexOf(' '); |
| if (idx>0) |
| return new VersionNumber(VERSION.substring(0,idx)); |
| } catch (NumberFormatException _) { |
| |
| } |
|
|
| |
| return null; |
| } catch (IllegalArgumentException e) { |
| |
| return null; |
| } |
| } |
|
|
| /** |
| * Hash of {@link #VERSION}. |
| */ |
| public static String VERSION_HASH; |
|
|
| /** |
| * Unique random token that identifies the current session. |
| * Used to make {@link #RESOURCE_PATH} unique so that we can set long ""Expires"" header. |
| * |
| * We used to use {@link #VERSION_HASH}, but making this session local allows us to |
| * reuse the same {@link #RESOURCE_PATH} for static resources in plugins. |
| */ |
| public static String SESSION_HASH; |
|
|
| /** |
| * Prefix to static resources like images and javascripts in the war file. |
| * Either """" or strings like ""/static/VERSION"", which avoids Hudson to pick up |
| * stale cache when the user upgrades to a different version. |
| * <p> |
| * Value computed in {@link WebAppMain}. |
| */ |
| public static String RESOURCE_PATH = """"; |
|
|
| /** |
| * Prefix to resources alongside view scripts. |
| * Strings like ""/resources/VERSION"", which avoids Hudson to pick up |
| * stale cache when the user upgrades to a different version. |
| * <p> |
| * Value computed in {@link WebAppMain}. |
| */ |
| public static String VIEW_RESOURCE_PATH = ""/resources/TBD""; |
|
|
| public static boolean PARALLEL_LOAD = Configuration.getBooleanConfigParameter(""parallelLoad"", true); |
| public static boolean KILL_AFTER_LOAD = Configuration.getBooleanConfigParameter(""killAfterLoad"", false); |
| /** |
| * Enabled by default as of 1.337. Will keep it for a while just in case we have some serious problems. |
| */ |
| public static boolean FLYWEIGHT_SUPPORT = Configuration.getBooleanConfigParameter(""flyweightSupport"", true); |
|
|
| /** |
| * Tentative switch to activate the concurrent build behavior. |
| * When we merge this back to the trunk, this allows us to keep |
| * this feature hidden for a while until we iron out the kinks. |
| * @see AbstractProject#isConcurrentBuild() |
| * @deprecated as of 1.464 |
| * This flag will have no effect. |
| */ |
| @Restricted(NoExternalUse.class) |
| public static boolean CONCURRENT_BUILD = true; |
|
|
| /** |
| * Switch to enable people to use a shorter workspace name. |
| */ |
| private static final String WORKSPACE_DIRNAME = Configuration.getStringConfigParameter(""workspaceDirName"", ""workspace""); |
|
|
| /** |
| * Automatically try to launch a slave when Jenkins is initialized or a new slave is created. |
| */ |
| public static boolean AUTOMATIC_SLAVE_LAUNCH = true; |
|
|
| private static final Logger LOGGER = Logger.getLogger(Jenkins.class.getName()); |
|
|
| private static final Pattern ICON_SIZE = Pattern.compile(""\\d+x\\d+""); |
|
|
| public static final PermissionGroup PERMISSIONS = Permission.HUDSON_PERMISSIONS; |
| public static final Permission ADMINISTER = Permission.HUDSON_ADMINISTER; |
| public static final Permission READ = new Permission(PERMISSIONS,""Read"",Messages._Hudson_ReadPermission_Description(),Permission.READ,PermissionScope.JENKINS); |
| public static final Permission RUN_SCRIPTS = new Permission(PERMISSIONS, ""RunScripts"", Messages._Hudson_RunScriptsPermission_Description(),ADMINISTER,PermissionScope.JENKINS); |
|
|
| /** |
| * {@link Authentication} object that represents the anonymous user. |
| * Because Acegi creates its own {@link AnonymousAuthenticationToken} instances, the code must not |
| * expect the singleton semantics. This is just a convenient instance. |
| * |
| * @since 1.343 |
| */ |
| public static final Authentication ANONYMOUS = new AnonymousAuthenticationToken( |
| ""anonymous"",""anonymous"",new GrantedAuthority[]{new GrantedAuthorityImpl(""anonymous"")}); |
|
|
| static { |
| XSTREAM.alias(""jenkins"",Jenkins.class); |
| XSTREAM.alias(""slave"", DumbSlave.class); |
| XSTREAM.alias(""jdk"",JDK.class); |
| |
| XSTREAM.alias(""view"", ListView.class); |
| XSTREAM.alias(""listView"", ListView.class); |
| |
| Mode.class.getEnumConstants(); |
|
|
| |
| assert PERMISSIONS!=null; |
| assert ADMINISTER!=null; |
| } |
|
|
| } |
| " |
| 287,1," Object getValue(Object parent); |
|
|
| /** |
| * Returns the name of this cascadable element. |
| * |
| * @return The name of this cascadable element. |
| */ |
| " |
| 288,1," public String getInfo() { |
|
|
| return (info); |
|
|
| } |
|
|
|
|
|
|
| " |
| 289,1," protected boolean addInputFilter(InputFilter[] inputFilters, |
| String encodingName) { |
| if (encodingName.equals(""identity"")) { |
| |
| } else if (encodingName.equals(""chunked"")) { |
| inputBuffer.addActiveFilter |
| (inputFilters[Constants.CHUNKED_FILTER]); |
| contentDelimitation = true; |
| } else { |
| for (int i = 2; i < inputFilters.length; i++) { |
| if (inputFilters[i].getEncodingName() |
| .toString().equals(encodingName)) { |
| inputBuffer.addActiveFilter(inputFilters[i]); |
| return true; |
| } |
| } |
| return false; |
| } |
| return true; |
| } |
|
|
|
|
| /** |
| * Specialized utility method: find a sequence of lower case bytes inside |
| * a ByteChunk. |
| */ |
| " |
| 290,1," public void changePassword_Resets_Session() throws Exception { |
| ScimUser user = createUser(); |
|
|
| MockHttpSession session = new MockHttpSession(); |
| MockHttpSession afterLoginSession = (MockHttpSession) getMockMvc().perform(post(""/login.do"") |
| .session(session) |
| .accept(TEXT_HTML_VALUE) |
| .param(""username"", user.getUserName()) |
| .param(""password"", ""secr3T"")) |
| .andExpect(status().isFound()) |
| .andExpect(redirectedUrl(""/"")) |
| .andReturn().getRequest().getSession(false); |
|
|
| assertTrue(session.isInvalid()); |
| assertNotNull(afterLoginSession); |
| assertNotNull(afterLoginSession.getAttribute(HttpSessionSecurityContextRepository.SPRING_SECURITY_CONTEXT_KEY)); |
|
|
| MockHttpSession afterPasswordChange = (MockHttpSession) getMockMvc().perform(post(""/change_password.do"") |
| .session(afterLoginSession) |
| .with(csrf()) |
| .accept(TEXT_HTML_VALUE) |
| .param(""current_password"", ""secr3T"") |
| .param(""new_password"", ""secr3T1"") |
| .param(""confirm_password"", ""secr3T1"")) |
| .andExpect(status().isFound()) |
| .andExpect(redirectedUrl(""profile"")) |
| .andReturn().getRequest().getSession(false); |
|
|
| assertTrue(afterLoginSession.isInvalid()); |
| assertNotNull(afterPasswordChange); |
| assertNotNull(afterPasswordChange.getAttribute(HttpSessionSecurityContextRepository.SPRING_SECURITY_CONTEXT_KEY)); |
| assertNotSame(afterLoginSession, afterPasswordChange); |
|
|
| } |
|
|
| " |
| 291,1," public String changePassword( |
| Model model, |
| @RequestParam(""current_password"") String currentPassword, |
| @RequestParam(""new_password"") String newPassword, |
| @RequestParam(""confirm_password"") String confirmPassword, |
| HttpServletResponse response, |
| HttpServletRequest request) { |
|
|
| PasswordConfirmationValidation validation = new PasswordConfirmationValidation(newPassword, confirmPassword); |
| if (!validation.valid()) { |
| model.addAttribute(""message_code"", validation.getMessageCode()); |
| response.setStatus(HttpStatus.UNPROCESSABLE_ENTITY.value()); |
| return ""change_password""; |
| } |
|
|
| SecurityContext securityContext = SecurityContextHolder.getContext(); |
| Authentication authentication = securityContext.getAuthentication(); |
| String username = authentication.getName(); |
|
|
| try { |
| changePasswordService.changePassword(username, currentPassword, newPassword); |
| request.getSession().invalidate(); |
| request.getSession(true); |
| securityContext.setAuthentication(authentication); |
| return ""redirect:profile""; |
| } catch (BadCredentialsException e) { |
| model.addAttribute(""message_code"", ""unauthorized""); |
| } catch (InvalidPasswordException e) { |
| model.addAttribute(""message"", e.getMessagesAsOneString()); |
| } |
| response.setStatus(HttpStatus.UNPROCESSABLE_ENTITY.value()); |
| return ""change_password""; |
| } |
| " |
| 292,1," private XPathEvaluator createEvaluator(String xpath2) { |
| try { |
| return (XPathEvaluator)EVALUATOR_CONSTRUCTOR.newInstance(new Object[] {xpath}); |
| } catch (InvocationTargetException e) { |
| Throwable cause = e.getCause(); |
| if (cause instanceof RuntimeException) { |
| throw (RuntimeException)cause; |
| } |
| throw new RuntimeException(""Invalid XPath Expression: "" + xpath + "" reason: "" + e.getMessage(), e); |
| } catch (Throwable e) { |
| throw new RuntimeException(""Invalid XPath Expression: "" + xpath + "" reason: "" + e.getMessage(), e); |
| } |
| } |
|
|
| " |
| 293,1," protected RequestEntity createRequestEntity(Exchange exchange) throws CamelExchangeException { |
| Message in = exchange.getIn(); |
| if (in.getBody() == null) { |
| return null; |
| } |
|
|
| RequestEntity answer = in.getBody(RequestEntity.class); |
| if (answer == null) { |
| try { |
| Object data = in.getBody(); |
| if (data != null) { |
| String contentType = ExchangeHelper.getContentType(exchange); |
|
|
| if (contentType != null && HttpConstants.CONTENT_TYPE_JAVA_SERIALIZED_OBJECT.equals(contentType)) { |
| |
| Serializable obj = in.getMandatoryBody(Serializable.class); |
| |
| ByteArrayOutputStream bos = new ByteArrayOutputStream(); |
| HttpHelper.writeObjectToStream(bos, obj); |
| answer = new ByteArrayRequestEntity(bos.toByteArray(), HttpConstants.CONTENT_TYPE_JAVA_SERIALIZED_OBJECT); |
| IOHelper.close(bos); |
| } else if (data instanceof File || data instanceof GenericFile) { |
| |
| File file = in.getBody(File.class); |
| if (file != null) { |
| answer = new FileRequestEntity(file, contentType); |
| } |
| } else if (data instanceof String) { |
| |
| |
| |
| |
| String charset = IOHelper.getCharsetName(exchange, false); |
| answer = new StringRequestEntity((String) data, contentType, charset); |
| } |
| |
| if (answer == null) { |
| |
| InputStream is = in.getMandatoryBody(InputStream.class); |
| answer = new InputStreamRequestEntity(is, contentType); |
| } |
| } |
| } catch (UnsupportedEncodingException e) { |
| throw new CamelExchangeException(""Error creating RequestEntity from message body"", exchange, e); |
| } catch (IOException e) { |
| throw new CamelExchangeException(""Error serializing message body"", exchange, e); |
| } |
| } |
| return answer; |
| } |
|
|
| " |
| 294,1," public void execute(String key, ActionMapping mapping) { |
| String location = key.substring(REDIRECT_ACTION_PREFIX |
| .length()); |
| ServletRedirectResult redirect = new ServletRedirectResult(); |
| container.inject(redirect); |
| String extension = getDefaultExtension(); |
| if (extension != null && extension.length() > 0) { |
| location += ""."" + extension; |
| } |
| redirect.setLocation(location); |
| mapping.setResult(redirect); |
| } |
| }); |
| } |
| }; |
| } |
|
|
| /** |
| * Adds a parameter action. Should only be called during initialization |
| * |
| * @param prefix The string prefix to trigger the action |
| * @param parameterAction The parameter action to execute |
| * @since 2.1.0 |
| */ |
| " |
| 295,1," private void findConstructor() { |
| try { |
| iConstructor = iClassToInstantiate.getConstructor(iParamTypes); |
| } catch (final NoSuchMethodException ex) { |
| throw new IllegalArgumentException(""InstantiateFactory: The constructor must exist and be public ""); |
| } |
| } |
|
|
| /** |
| * Creates an object using the stored constructor. |
| * |
| * @return the new object |
| */ |
| " |
| 296,1," private void checkParams() |
| throws Exception |
| { |
| if (vi == null) |
| { |
| throw new Exception(""no layers defined.""); |
| } |
| if (vi.length > 1) |
| { |
| for (int i = 0; i < vi.length - 1; i++) |
| { |
| if (vi[i] >= vi[i + 1]) |
| { |
| throw new Exception( |
| ""v[i] has to be smaller than v[i+1]""); |
| } |
| } |
| } |
| else |
| { |
| throw new Exception( |
| ""Rainbow needs at least 1 layer, such that v1 < v2.""); |
| } |
| } |
|
|
| /** |
| * Getter for the number of layers |
| * |
| * @return the number of layers |
| */ |
| " |
| 297,1," public boolean isTransferException() { |
| return transferException; |
| } |
|
|
| /** |
| * If enabled and an Exchange failed processing on the consumer side, and if the caused Exception was send back serialized |
| * in the response as a application/x-java-serialized-object content type (for example using Jetty or Servlet Camel components). |
| * On the producer side the exception will be deserialized and thrown as is, instead of the AhcOperationFailedException. |
| * The caused exception is required to be serialized. |
| */ |
| " |
| 298,1," public void setMethods(Set<String> methods) { |
| this.methods = new HashSet<String>(); |
| for (String method : methods) { |
| this.methods.add(method.toUpperCase()); |
| } |
| } |
|
|
| /** |
| * @param authenticationEntryPoint the authenticationEntryPoint to set |
| */ |
| " |
| 299,1," private EnumSet<ExecutableType> getValidatedExecutableTypes(DefaultValidatedExecutableTypesType validatedExecutables) { |
| if ( validatedExecutables == null ) { |
| return null; |
| } |
|
|
| EnumSet<ExecutableType> executableTypes = EnumSet.noneOf( ExecutableType.class ); |
| executableTypes.addAll( validatedExecutables.getExecutableType() ); |
|
|
| return executableTypes; |
| } |
| " |
| 300,1," public boolean getValidateClientProvidedNewSessionId(); |
| " |
| 301,1," private File mkdirsE(File dir) throws IOException { |
| if (dir.exists()) { |
| return dir; |
| } |
| filterNonNull().mkdirs(dir); |
| return IOUtils.mkdirs(dir); |
| } |
|
|
| " |
| 302,1," public static boolean isExpression(Object value) { |
| String expr = value.toString(); |
| return expr.startsWith(""%{"") && expr.endsWith(""}""); |
| } |
|
|
| " |
| 303,1," protected final GF2Polynomial[] invertMatrix(GF2Polynomial[] matrix) |
| { |
| GF2Polynomial[] a = new GF2Polynomial[matrix.length]; |
| GF2Polynomial[] inv = new GF2Polynomial[matrix.length]; |
| GF2Polynomial dummy; |
| int i, j; |
| |
| for (i = 0; i < mDegree; i++) |
| { |
| try |
| { |
| a[i] = new GF2Polynomial(matrix[i]); |
| inv[i] = new GF2Polynomial(mDegree); |
| inv[i].setBit(mDegree - 1 - i); |
| } |
| catch (RuntimeException BDNEExc) |
| { |
| BDNEExc.printStackTrace(); |
| } |
| } |
| |
| |
| for (i = 0; i < mDegree - 1; i++) |
| { |
| |
| j = i; |
| while ((j < mDegree) && !a[j].testBit(mDegree - 1 - i)) |
| { |
| j++; |
| } |
| if (j >= mDegree) |
| { |
| throw new RuntimeException( |
| ""GF2nField.invertMatrix: Matrix cannot be inverted!""); |
| } |
| if (i != j) |
| { |
| dummy = a[i]; |
| a[i] = a[j]; |
| a[j] = dummy; |
| dummy = inv[i]; |
| inv[i] = inv[j]; |
| inv[j] = dummy; |
| } |
| for (j = i + 1; j < mDegree; j++) |
| { |
| |
| if (a[j].testBit(mDegree - 1 - i)) |
| { |
| a[j].addToThis(a[i]); |
| inv[j].addToThis(inv[i]); |
| } |
| } |
| } |
| |
| for (i = mDegree - 1; i > 0; i--) |
| { |
| for (j = i - 1; j >= 0; j--) |
| { |
| |
| if (a[j].testBit(mDegree - 1 - i)) |
| { |
| a[j].addToThis(a[i]); |
| inv[j].addToThis(inv[i]); |
| } |
| } |
| } |
| return inv; |
| } |
|
|
| /** |
| * Converts the given element in representation according to this field to a |
| * new element in representation according to B1 using the change-of-basis |
| * matrix calculated by computeCOBMatrix. |
| * |
| * @param elem the GF2nElement to convert |
| * @param basis the basis to convert <tt>elem</tt> to |
| * @return <tt>elem</tt> converted to a new element representation |
| * according to <tt>basis</tt> |
| * @see GF2nField#computeCOBMatrix |
| * @see GF2nField#getRandomRoot |
| * @see GF2nPolynomial |
| * @see ""P1363 A.7 p109ff"" |
| */ |
| " |
| 304,1," public JDBCTableReader getTableReader(Connection connection, String tableName, ParseContext context) { |
| return new SQLite3TableReader(connection, tableName, context); |
| } |
| " |
| 305,1," public Source getAssociatedStylesheet( |
| Source source, String media, String title, String charset) |
| throws TransformerConfigurationException |
| { |
|
|
| String baseID; |
| InputSource isource = null; |
| Node node = null; |
| XMLReader reader = null; |
|
|
| if (source instanceof DOMSource) |
| { |
| DOMSource dsource = (DOMSource) source; |
|
|
| node = dsource.getNode(); |
| baseID = dsource.getSystemId(); |
| } |
| else |
| { |
| isource = SAXSource.sourceToInputSource(source); |
| baseID = isource.getSystemId(); |
| } |
|
|
| |
| |
| |
| StylesheetPIHandler handler = new StylesheetPIHandler(baseID, media, |
| title, charset); |
| |
| |
| if (m_uriResolver != null) |
| { |
| handler.setURIResolver(m_uriResolver); |
| } |
|
|
| try |
| { |
| if (null != node) |
| { |
| TreeWalker walker = new TreeWalker(handler, new org.apache.xml.utils.DOM2Helper(), baseID); |
|
|
| walker.traverse(node); |
| } |
| else |
| { |
|
|
| |
| try |
| { |
| javax.xml.parsers.SAXParserFactory factory = |
| javax.xml.parsers.SAXParserFactory.newInstance(); |
|
|
| factory.setNamespaceAware(true); |
|
|
| if (m_isSecureProcessing) |
| { |
| try |
| { |
| factory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, true); |
| } |
| catch (org.xml.sax.SAXException e) {} |
| } |
|
|
| javax.xml.parsers.SAXParser jaxpParser = factory.newSAXParser(); |
|
|
| reader = jaxpParser.getXMLReader(); |
| } |
| catch (javax.xml.parsers.ParserConfigurationException ex) |
| { |
| throw new org.xml.sax.SAXException(ex); |
| } |
| catch (javax.xml.parsers.FactoryConfigurationError ex1) |
| { |
| throw new org.xml.sax.SAXException(ex1.toString()); |
| } |
| catch (NoSuchMethodError ex2){} |
| catch (AbstractMethodError ame){} |
|
|
| if (null == reader) |
| { |
| reader = XMLReaderFactory.createXMLReader(); |
| } |
|
|
| |
| reader.setContentHandler(handler); |
| reader.parse(isource); |
| } |
| } |
| catch (StopParseException spe) |
| { |
|
|
| |
| } |
| catch (org.xml.sax.SAXException se) |
| { |
| throw new TransformerConfigurationException( |
| ""getAssociatedStylesheets failed"", se); |
| } |
| catch (IOException ioe) |
| { |
| throw new TransformerConfigurationException( |
| ""getAssociatedStylesheets failed"", ioe); |
| } |
|
|
| return handler.getAssociatedStylesheet(); |
| } |
|
|
| /** |
| * Create a new Transformer object that performs a copy |
| * of the source to the result. |
| * |
| * @return A Transformer object that may be used to perform a transformation |
| * in a single thread, never null. |
| * |
| * @throws TransformerConfigurationException May throw this during |
| * the parse when it is constructing the |
| * Templates object and fails. |
| */ |
| " |
| 306,1," public Calendar ceil(Calendar cal) { |
| Calendar twoYearsFuture = (Calendar) cal.clone(); |
| twoYearsFuture.add(Calendar.YEAR, 2); |
| OUTER: |
| while (true) { |
| if (cal.compareTo(twoYearsFuture) > 0) { |
| |
| throw new RareOrImpossibleDateException(); |
| } |
| for (CalendarField f : CalendarField.ADJUST_ORDER) { |
| int cur = f.valueOf(cal); |
| int next = f.ceil(this,cur); |
| if (cur==next) continue; |
|
|
| |
| for (CalendarField l=f.lowerField; l!=null; l=l.lowerField) |
| l.clear(cal); |
|
|
| if (next<0) { |
| |
| f.rollUp(cal, 1); |
| f.setTo(cal,f.first(this)); |
| |
| continue OUTER; |
| } else { |
| f.setTo(cal,next); |
| if (f.redoAdjustmentIfModified) |
| continue OUTER; |
| } |
| } |
| return cal; |
| } |
| } |
|
|
| /** |
| * Computes the nearest past timestamp that matched this cron tab. |
| * <p> |
| * More precisely, given the time 't', computes another smallest time x such that: |
| * |
| * <ul> |
| * <li>x <= t (inclusive) |
| * <li>x matches this crontab |
| * </ul> |
| * |
| * <p> |
| * Note that if t already matches this cron, it's returned as is. |
| */ |
| " |
| 307,1," public void run() { |
| try { |
| ObjectInputStream in = new ObjectInputStream(socket.getInputStream()); |
| while (!closed) { |
| Message msg = (Message) in.readObject(); |
| handle(msg); |
| } |
| } catch (EOFException eof) { |
| // Remote side has closed the connection, just cleanup. |
| try { |
| close(); |
| } catch (Exception unused) { |
| // no-op. |
| } |
| } catch (Exception e) { |
| if (!closed) { |
| LOG.log(Level.WARNING, ""Error in inbound message handling."", e); |
| try { |
| close(); |
| } catch (Exception unused) { |
| // no-op. |
| } |
| } |
| } |
| } |
|
|
| " |
| 308,1," public void setAllowJavaSerializedObject(boolean allowJavaSerializedObject) { |
| this.allowJavaSerializedObject = allowJavaSerializedObject; |
| } |
| " |
| 309,1," private void updateGraph(ActionRequest actionRequest, |
| ActionResponse actionResponse) { |
| DBManager DBase = new DBManager(); |
| Connection con = DBase.getConnection(); |
| String graph_id = actionRequest.getParameter(""graph_id""); |
| actionResponse.setRenderParameter(""graph_id"", graph_id); |
|
|
| String name = actionRequest.getParameter(""name""); |
| String description = actionRequest.getParameter(""description""); |
| String server_id = actionRequest.getParameter(""server_id""); |
| String xlabel = actionRequest.getParameter(""xlabel""); |
| String ylabel = actionRequest.getParameter(""ylabel""); |
| String timeframe = actionRequest.getParameter(""timeframe""); |
| String mbean = actionRequest.getParameter(""mbean""); |
| String dataname1 = actionRequest.getParameter(""dataname1""); |
| String data1operation = actionRequest.getParameter(""data1operation""); |
| String operation = actionRequest.getParameter(""operation""); |
| int archive = 0; |
| if (actionRequest.getParameter(""showArchive"") != null |
| && actionRequest.getParameter(""showArchive"").equals(""on"")) { |
| archive = 1; |
| } |
|
|
| if (operation.equals(""other"")) { |
| operation = actionRequest.getParameter(""othermath""); |
| } |
| String dataname2 = actionRequest.getParameter(""dataname2""); |
| String data2operation = actionRequest.getParameter(""data2operation""); |
| if (data2operation == null) |
| data2operation = ""A""; |
| try { |
| PreparedStatement pStmt = con |
| .prepareStatement(""UPDATE graphs SET server_id="" |
| + server_id |
| + "", name='"" |
| + name |
| + ""', description='"" |
| + description |
| + ""', timeframe="" |
| + timeframe |
| + "", mbean='"" |
| + mbean |
| + ""', dataname1='"" |
| + dataname1 |
| + ""', xlabel='"" |
| + xlabel |
| + ""', ylabel='"" |
| + ylabel |
| + ""', data1operation='"" |
| + data1operation |
| + ""', operation='"" |
| + operation |
| + ""', data2operation='"" |
| + data2operation |
| + ""', dataname2='"" |
| + dataname2 |
| + ""', warninglevel1=0, warninglevel2=0, modified=CURRENT_TIMESTAMP, archive="" |
| + archive + "" WHERE graph_id="" + graph_id); |
| pStmt.executeUpdate(); |
| con.close(); |
| actionResponse.setRenderParameter(""message"", |
| ""Graph "" + name |
| + "" has been updated.""); |
| return; |
|
|
| } catch (Exception e) { |
| actionResponse.setRenderParameter(""message"", |
| ""Error editing graph "" |
| + e.getMessage()); |
| return; |
| } |
| } |
|
|
| " |
| 310,1," protected void onSuccessfulAuthentication(HttpServletRequest request, HttpServletResponse response, Authentication authResult) throws IOException { |
| super.onSuccessfulAuthentication(request,response,authResult); |
| // make sure we have a session to store this successful authentication, given that we no longer |
| // let HttpSessionContextIntegrationFilter2 to create sessions. |
| // HttpSessionContextIntegrationFilter stores the updated SecurityContext object into this session later |
| // (either when a redirect is issued, via its HttpResponseWrapper, or when the execution returns to its |
| // doFilter method. |
| request.getSession(); |
| } |
|
|
| /** |
| * Leave the information about login failure. |
| * |
| * <p> |
| * Otherwise it seems like Acegi doesn't really leave the detail of the failure anywhere. |
| */ |
| @Override |
| " |
| 311,1," private Cache verifyCacheExists() { |
| int timeToWait = 0; |
| Cache cache = null; |
| while (timeToWait < TIME_TO_WAIT_FOR_CACHE) { |
| try { |
| cache = CacheFactory.getAnyInstance(); |
| break; |
| } catch (Exception ignore) { |
| |
| } |
| try { |
| Thread.sleep(250); |
| } catch (InterruptedException ie) { |
| Thread.currentThread().interrupt(); |
| break; |
| } |
| timeToWait += 250; |
| } |
|
|
| if (cache == null) { |
| cache = new CacheFactory().create(); |
| } |
|
|
| return cache; |
| } |
|
|
| " |
| 312,1," public void clientCredentials_byDefault_WillNotLockoutDuringFailedBasicAuthAndFormData() throws Exception { |
| String clientId = ""testclient"" + generator.generate(); |
| String scopes = ""space.*.developer,space.*.admin,org.*.reader,org.123*.admin,*.*,*""; |
| setUpClients(clientId, scopes, scopes, GRANT_TYPES, true); |
|
|
| String body = null; |
| for(int i = 0; i < 3; i++){ |
| body = getMockMvc().perform(post(""/oauth/token"") |
| .accept(MediaType.APPLICATION_JSON_VALUE) |
| .header(""Authorization"", ""Basic "" + new String(Base64.encode((clientId + "":"" + BADSECRET).getBytes()))) |
| .param(""grant_type"", ""client_credentials"") |
| ) |
| .andExpect(status().isUnauthorized()) |
| .andReturn().getResponse().getContentAsString(); |
|
|
| body = getMockMvc().perform(post(""/oauth/token"") |
| .accept(MediaType.APPLICATION_JSON_VALUE) |
| .contentType(MediaType.APPLICATION_FORM_URLENCODED_VALUE) |
| .param(""grant_type"", ""client_credentials"") |
| .param(""client_id"", clientId) |
| .param(""client_secret"", BADSECRET) |
| ) |
| .andExpect(status().isUnauthorized()) |
| .andReturn().getResponse().getContentAsString(); |
|
|
| } |
|
|
| body = getMockMvc().perform(post(""/oauth/token"") |
| .accept(MediaType.APPLICATION_JSON_VALUE) |
| .header(""Authorization"", ""Basic "" + new String(Base64.encode((clientId + "":"" + SECRET).getBytes()))) |
| .param(""grant_type"", ""client_credentials"") |
| ) |
| .andExpect(status().isOk()) |
| .andReturn().getResponse().getContentAsString(); |
| } |
|
|
| @Test |
| " |
| 313,1," public String toStringInternal() { |
| String strValue=null; |
| try { |
| if( enc==null ) enc=DEFAULT_CHARACTER_ENCODING; |
| strValue = new String( buff, start, end-start, enc ); |
| /* |
| Does not improve the speed too much on most systems, |
| it's safer to use the ""clasical"" new String(). |
| |
| Most overhead is in creating char[] and copying, |
| the internal implementation of new String() is very close to |
| what we do. The decoder is nice for large buffers and if |
| we don't go to String ( so we can take advantage of reduced GC) |
| |
| |
| return B2CConverter.decodeString( enc ); |
| */ |
| } catch (java.io.UnsupportedEncodingException e) { |
| |
| |
| strValue = new String(buff, start, end-start); |
| } |
| return strValue; |
| } |
|
|
| " |
| 314,1," public void repositoryVerificationTimeoutTest() throws Exception { |
| Client client = client(); |
|
|
| Settings settings = ImmutableSettings.settingsBuilder() |
| .put(""location"", newTempDir(LifecycleScope.SUITE)) |
| .put(""random_control_io_exception_rate"", 1.0).build(); |
| logger.info(""--> creating repository that cannot write any files - should fail""); |
| assertThrows(client.admin().cluster().preparePutRepository(""test-repo-1"") |
| .setType(MockRepositoryModule.class.getCanonicalName()).setSettings(settings), |
| RepositoryVerificationException.class); |
|
|
| logger.info(""--> creating repository that cannot write any files, but suppress verification - should be acked""); |
| assertAcked(client.admin().cluster().preparePutRepository(""test-repo-1"") |
| .setType(MockRepositoryModule.class.getCanonicalName()).setSettings(settings).setVerify(false)); |
|
|
| logger.info(""--> verifying repository""); |
| assertThrows(client.admin().cluster().prepareVerifyRepository(""test-repo-1""), RepositoryVerificationException.class); |
|
|
| File location = newTempDir(LifecycleScope.SUITE); |
|
|
| logger.info(""--> creating repository""); |
| try { |
| client.admin().cluster().preparePutRepository(""test-repo-1"") |
| .setType(MockRepositoryModule.class.getCanonicalName()) |
| .setSettings(ImmutableSettings.settingsBuilder() |
| .put(""location"", location) |
| .put(""localize_location"", true) |
| ).get(); |
| fail(""RepositoryVerificationException wasn't generated""); |
| } catch (RepositoryVerificationException ex) { |
| assertThat(ex.getMessage(), containsString(""is not shared"")); |
| } |
| } |
|
|
| " |
| 315,1," public void execute(String key, ActionMapping mapping) { |
| String location = key.substring(REDIRECT_ACTION_PREFIX |
| .length()); |
| ServletRedirectResult redirect = new ServletRedirectResult(); |
| container.inject(redirect); |
| String extension = getDefaultExtension(); |
| if (extension != null && extension.length() > 0) { |
| location += ""."" + extension; |
| } |
| redirect.setLocation(location); |
| mapping.setResult(redirect); |
| } |
| }); |
| } |
| }; |
| } |
|
|
| /** |
| * Adds a parameter action. Should only be called during initialization |
| * |
| * @param prefix The string prefix to trigger the action |
| * @param parameterAction The parameter action to execute |
| * @since 2.1.0 |
| */ |
| " |
| 316,1," public void noUserSearchCausesUsernameNotFound() throws Exception { |
| DirContext ctx = mock(DirContext.class); |
| when(ctx.getNameInNamespace()).thenReturn(""""); |
| when(ctx.search(any(Name.class), any(String.class), any(Object[].class), any(SearchControls.class))) |
| .thenReturn(new EmptyEnumeration<SearchResult>()); |
|
|
| provider.contextFactory = createContextFactoryReturning(ctx); |
|
|
| provider.authenticate(joe); |
| } |
|
|
| @SuppressWarnings(""unchecked"") |
| @Test(expected = IncorrectResultSizeDataAccessException.class) |
| " |
| 317,1," protected void addEmptyValueMapping(DefaultMapper mapper, String field, Object model) { |
| ParserContext parserContext = new FluentParserContext().evaluate(model.getClass()); |
| Expression target = expressionParser.parseExpression(field, parserContext); |
| try { |
| Class<?> propertyType = target.getValueType(model); |
| Expression source = new StaticExpression(getEmptyValue(propertyType)); |
| DefaultMapping mapping = new DefaultMapping(source, target); |
| if (logger.isDebugEnabled()) { |
| logger.debug(""Adding empty value mapping for parameter '"" + field + ""'""); |
| } |
| mapper.addMapping(mapping); |
| } catch (EvaluationException e) { |
| } |
| } |
|
|
| /** |
| * Adds a {@link DefaultMapping} between the given request parameter name and a matching model field. |
| * |
| * @param mapper the mapper to add the mapping to |
| * @param parameter the request parameter name |
| * @param model the model |
| */ |
| " |
| 318,1," private boolean evaluate(String text) { |
| try { |
| InputSource inputSource = new InputSource(new StringReader(text)); |
| return ((Boolean)expression.evaluate(inputSource, XPathConstants.BOOLEAN)).booleanValue(); |
| } catch (XPathExpressionException e) { |
| return false; |
| } |
| } |
|
|
| @Override |
| " |
|
|