This is an automated email from the ASF dual-hosted git repository. markt pushed a commit to branch 9.0.x in repository https://gitbox.apache.org/repos/asf/tomcat.git
The following commit(s) were added to refs/heads/9.0.x by this push: new 5f7a833a77 Code clean-up. Formatting. No functional change. 5f7a833a77 is described below commit 5f7a833a77d527f0c9d2c6d8052e5f319abbd643 Author: Mark Thomas <ma...@apache.org> AuthorDate: Tue May 23 11:23:32 2023 +0100 Code clean-up. Formatting. No functional change. --- .../catalina/authenticator/AuthenticatorBase.java | 12 +-- .../apache/catalina/authenticator/Constants.java | 4 +- .../authenticator/DigestAuthenticator.java | 27 +++--- .../catalina/authenticator/SavedRequest.java | 2 +- .../catalina/authenticator/SingleSignOn.java | 2 +- .../catalina/authenticator/SingleSignOnEntry.java | 6 +- .../authenticator/SpnegoAuthenticator.java | 2 +- .../jaspic/AuthConfigFactoryImpl.java | 104 +++++++++------------ .../authenticator/jaspic/CallbackHandlerImpl.java | 11 +-- .../authenticator/jaspic/MessageInfoImpl.java | 10 +- .../jaspic/PersistentProviderRegistrations.java | 34 +++---- .../jaspic/SimpleAuthConfigProvider.java | 18 ++-- .../jaspic/SimpleServerAuthConfig.java | 19 ++-- .../jaspic/SimpleServerAuthContext.java | 14 ++- 14 files changed, 120 insertions(+), 145 deletions(-) diff --git a/java/org/apache/catalina/authenticator/AuthenticatorBase.java b/java/org/apache/catalina/authenticator/AuthenticatorBase.java index 2dbaa7c312..cecf8347e4 100644 --- a/java/org/apache/catalina/authenticator/AuthenticatorBase.java +++ b/java/org/apache/catalina/authenticator/AuthenticatorBase.java @@ -611,8 +611,8 @@ public abstract class AuthenticatorBase extends ValveBase implements Authenticat String originHeader = request.getHeader(CorsFilter.REQUEST_HEADER_ORIGIN); if (originHeader != null && !originHeader.isEmpty() && RequestUtil.isValidOrigin(originHeader) && !RequestUtil.isSameOrigin(request, originHeader)) { - String accessControlRequestMethodHeader = request - .getHeader(CorsFilter.REQUEST_HEADER_ACCESS_CONTROL_REQUEST_METHOD); + String accessControlRequestMethodHeader = + request.getHeader(CorsFilter.REQUEST_HEADER_ACCESS_CONTROL_REQUEST_METHOD); if (accessControlRequestMethodHeader != null && !accessControlRequestMethodHeader.isEmpty()) { // This appears to be a CORS Preflight request if (allowCorsPreflight == AllowCorsPreflight.ALWAYS) { @@ -698,8 +698,8 @@ public abstract class AuthenticatorBase extends ValveBase implements Authenticat try { CallbackHandler callbackHandler = getCallbackHandler(); - ServerAuthConfig serverAuthConfig = jaspicProvider.getServerAuthConfig("HttpServlet", jaspicAppContextID, - callbackHandler); + ServerAuthConfig serverAuthConfig = + jaspicProvider.getServerAuthConfig("HttpServlet", jaspicAppContextID, callbackHandler); String authContextID = serverAuthConfig.getAuthContextID(jaspicState.messageInfo); jaspicState.serverAuthContext = serverAuthConfig.getAuthContext(authContextID, null, null); } catch (AuthException e) { @@ -1170,8 +1170,8 @@ public abstract class AuthenticatorBase extends ValveBase implements Authenticat if (client != null) { ServerAuthContext serverAuthContext; try { - ServerAuthConfig serverAuthConfig = provider.getServerAuthConfig("HttpServlet", jaspicAppContextID, - getCallbackHandler()); + ServerAuthConfig serverAuthConfig = + provider.getServerAuthConfig("HttpServlet", jaspicAppContextID, getCallbackHandler()); String authContextID = serverAuthConfig.getAuthContextID(messageInfo); serverAuthContext = serverAuthConfig.getAuthContext(authContextID, null, null); serverAuthContext.cleanSubject(messageInfo, client); diff --git a/java/org/apache/catalina/authenticator/Constants.java b/java/org/apache/catalina/authenticator/Constants.java index 983528a9d4..43d2de6a13 100644 --- a/java/org/apache/catalina/authenticator/Constants.java +++ b/java/org/apache/catalina/authenticator/Constants.java @@ -35,8 +35,8 @@ public class Constants { public static final String DEFAULT_LOGIN_MODULE_NAME = "com.sun.security.jgss.krb5.accept"; // Cookie name for single sign on support - public static final String SINGLE_SIGN_ON_COOKIE = System - .getProperty("org.apache.catalina.authenticator.Constants.SSO_SESSION_COOKIE_NAME", "JSESSIONIDSSO"); + public static final String SINGLE_SIGN_ON_COOKIE = + System.getProperty("org.apache.catalina.authenticator.Constants.SSO_SESSION_COOKIE_NAME", "JSESSIONIDSSO"); // --------------------------------------------------------- Request Notes diff --git a/java/org/apache/catalina/authenticator/DigestAuthenticator.java b/java/org/apache/catalina/authenticator/DigestAuthenticator.java index 49f7eced9f..9610cb9986 100644 --- a/java/org/apache/catalina/authenticator/DigestAuthenticator.java +++ b/java/org/apache/catalina/authenticator/DigestAuthenticator.java @@ -68,7 +68,7 @@ public class DigestAuthenticator extends AuthenticatorBase { private static final String NONCE_DIGEST = "SHA-256"; // List permitted algorithms and maps them to Java standard names - private static final Map<String, AuthDigest> PERMITTED_ALGORITHMS = new HashMap<>(); + private static final Map<String,AuthDigest> PERMITTED_ALGORITHMS = new HashMap<>(); static { // Allows the digester to be configured with either the Standard Java name or the name used the RFC. for (AuthDigest authDigest : AuthDigest.values()) { @@ -91,7 +91,7 @@ public class DigestAuthenticator extends AuthenticatorBase { /** * List of server nonce values currently being tracked */ - protected Map<String, NonceInfo> nonces; + protected Map<String,NonceInfo> nonces; /** @@ -233,7 +233,7 @@ public class DigestAuthenticator extends AuthenticatorBase { /* - * Initialise algorithms, removing ones that the JRE does not support + * Initialise algorithms, removing ones that the JRE does not support */ private void initAlgorithms(List<AuthDigest> algorithms) { Iterator<AuthDigest> algorithmIterator = algorithms.iterator(); @@ -243,7 +243,8 @@ public class DigestAuthenticator extends AuthenticatorBase { ConcurrentMessageDigest.init(algorithm.getJavaName()); } catch (NoSuchAlgorithmException e) { // In theory, a JRE can choose not to implement SHA-512/256 - log.warn(sm.getString("digestAuthenticator.unsupportedAlgorithm", algorithms, algorithm.getJavaName()), e); + log.warn(sm.getString("digestAuthenticator.unsupportedAlgorithm", algorithms, algorithm.getJavaName()), + e); algorithmIterator.remove(); } } @@ -453,7 +454,7 @@ public class DigestAuthenticator extends AuthenticatorBase { * This is a FIFO cache as using an older nonce should not delay its removal from the cache in favour of more * recent values. */ - nonces = new LinkedHashMap<String, DigestAuthenticator.NonceInfo>() { + nonces = new LinkedHashMap<String,DigestAuthenticator.NonceInfo>() { private static final long serialVersionUID = 1L; private static final long LOG_SUPPRESS_TIME = 5 * 60 * 1000; @@ -461,7 +462,7 @@ public class DigestAuthenticator extends AuthenticatorBase { private long lastLog = 0; @Override - protected boolean removeEldestEntry(Map.Entry<String, NonceInfo> eldest) { + protected boolean removeEldestEntry(Map.Entry<String,NonceInfo> eldest) { // This is called from a sync so keep it simple long currentTime = System.currentTimeMillis(); if (size() > getNonceCacheSize()) { @@ -490,7 +491,7 @@ public class DigestAuthenticator extends AuthenticatorBase { private final String opaque; private final long nonceValidity; private final String key; - private final Map<String, NonceInfo> nonces; + private final Map<String,NonceInfo> nonces; private boolean validateUri = true; private String userName = null; @@ -508,7 +509,7 @@ public class DigestAuthenticator extends AuthenticatorBase { private AuthDigest algorithm = null; - public DigestInfo(String opaque, long nonceValidity, String key, Map<String, NonceInfo> nonces, + public DigestInfo(String opaque, long nonceValidity, String key, Map<String,NonceInfo> nonces, boolean validateUri) { this.opaque = opaque; this.nonceValidity = nonceValidity; @@ -529,7 +530,7 @@ public class DigestAuthenticator extends AuthenticatorBase { return false; } - Map<String, String> directives; + Map<String,String> directives; try { directives = Authorization.parseAuthorizationDigest(new StringReader(authorization)); } catch (IOException e) { @@ -631,8 +632,8 @@ public class DigestAuthenticator extends AuthenticatorBase { } String serverIpTimeKey = request.getRemoteAddr() + ":" + nonceTime + ":" + key; // Note: The digest used to generate the nonce is independent of the the digest used for authentication/ - byte[] buffer = ConcurrentMessageDigest.digest(NONCE_DIGEST, - serverIpTimeKey.getBytes(StandardCharsets.ISO_8859_1)); + byte[] buffer = + ConcurrentMessageDigest.digest(NONCE_DIGEST, serverIpTimeKey.getBytes(StandardCharsets.ISO_8859_1)); String digestServerIpTimeKey = HexUtils.toHexString(buffer); if (!digestServerIpTimeKey.equals(digestclientIpTimeKey)) { return false; @@ -698,8 +699,8 @@ public class DigestAuthenticator extends AuthenticatorBase { ConcurrentMessageDigest.digest(algorithm.getJavaName(), a2.getBytes(StandardCharsets.ISO_8859_1)); String digestA2 = HexUtils.toHexString(buffer); - return realm.authenticate( - userName, response, nonce, nc, cnonce, qop, realmName, digestA2, algorithm.getJavaName()); + return realm.authenticate(userName, response, nonce, nc, cnonce, qop, realmName, digestA2, + algorithm.getJavaName()); } } diff --git a/java/org/apache/catalina/authenticator/SavedRequest.java b/java/org/apache/catalina/authenticator/SavedRequest.java index 147e98df68..e0cec1cfe4 100644 --- a/java/org/apache/catalina/authenticator/SavedRequest.java +++ b/java/org/apache/catalina/authenticator/SavedRequest.java @@ -60,7 +60,7 @@ public final class SavedRequest implements Serializable { * The set of Headers associated with this Request. Each key is a header name, while the value is a List containing * one or more actual values for this header. The values are returned as an Iterator when you ask for them. */ - private final Map<String, List<String>> headers = new HashMap<>(); + private final Map<String,List<String>> headers = new HashMap<>(); public void addHeader(String name, String value) { headers.computeIfAbsent(name, k -> new ArrayList<>()).add(value); diff --git a/java/org/apache/catalina/authenticator/SingleSignOn.java b/java/org/apache/catalina/authenticator/SingleSignOn.java index 7bd5a9393c..9d49fd8e1f 100644 --- a/java/org/apache/catalina/authenticator/SingleSignOn.java +++ b/java/org/apache/catalina/authenticator/SingleSignOn.java @@ -76,7 +76,7 @@ public class SingleSignOn extends ValveBase { * The cache of SingleSignOnEntry instances for authenticated Principals, keyed by the cookie value that is used to * select them. */ - protected Map<String, SingleSignOnEntry> cache = new ConcurrentHashMap<>(); + protected Map<String,SingleSignOnEntry> cache = new ConcurrentHashMap<>(); /** * Indicates whether this valve should require a downstream Authenticator to reauthenticate each request, or if it diff --git a/java/org/apache/catalina/authenticator/SingleSignOnEntry.java b/java/org/apache/catalina/authenticator/SingleSignOnEntry.java index 047bbed8ba..1f1cc761ce 100644 --- a/java/org/apache/catalina/authenticator/SingleSignOnEntry.java +++ b/java/org/apache/catalina/authenticator/SingleSignOnEntry.java @@ -52,7 +52,7 @@ public class SingleSignOnEntry implements Serializable { // Marked as transient so special handling can be applied to serialization private transient Principal principal = null; - private final Map<SingleSignOnSessionKey, SingleSignOnSessionKey> sessionKeys = new ConcurrentHashMap<>(); + private final Map<SingleSignOnSessionKey,SingleSignOnSessionKey> sessionKeys = new ConcurrentHashMap<>(); private String username = null; @@ -171,8 +171,8 @@ public class SingleSignOnEntry implements Serializable { this.authType = authType; this.username = username; this.password = password; - this.canReauthenticate = (HttpServletRequest.BASIC_AUTH.equals(authType) || - HttpServletRequest.FORM_AUTH.equals(authType)); + this.canReauthenticate = + (HttpServletRequest.BASIC_AUTH.equals(authType) || HttpServletRequest.FORM_AUTH.equals(authType)); } diff --git a/java/org/apache/catalina/authenticator/SpnegoAuthenticator.java b/java/org/apache/catalina/authenticator/SpnegoAuthenticator.java index 38ac493fcf..08ae4e1426 100644 --- a/java/org/apache/catalina/authenticator/SpnegoAuthenticator.java +++ b/java/org/apache/catalina/authenticator/SpnegoAuthenticator.java @@ -398,7 +398,7 @@ public class SpnegoAuthenticator extends AuthenticatorBase { // Read the mechTypes into an ordered set int mechTypesLen = lengthAsInt(); int mechTypesStart = pos; - LinkedHashMap<String, int[]> mechTypeEntries = new LinkedHashMap<>(); + LinkedHashMap<String,int[]> mechTypeEntries = new LinkedHashMap<>(); while (pos < mechTypesStart + mechTypesLen) { int[] value = new int[2]; value[0] = pos; diff --git a/java/org/apache/catalina/authenticator/jaspic/AuthConfigFactoryImpl.java b/java/org/apache/catalina/authenticator/jaspic/AuthConfigFactoryImpl.java index d9b1b1054a..10a7edb391 100644 --- a/java/org/apache/catalina/authenticator/jaspic/AuthConfigFactoryImpl.java +++ b/java/org/apache/catalina/authenticator/jaspic/AuthConfigFactoryImpl.java @@ -44,24 +44,19 @@ public class AuthConfigFactoryImpl extends AuthConfigFactory { private static final StringManager sm = StringManager.getManager(AuthConfigFactoryImpl.class); private static final String CONFIG_PATH = "conf/jaspic-providers.xml"; - private static final File CONFIG_FILE = - new File(System.getProperty(Globals.CATALINA_BASE_PROP), CONFIG_PATH); + private static final File CONFIG_FILE = new File(System.getProperty(Globals.CATALINA_BASE_PROP), CONFIG_PATH); private static final Object CONFIG_FILE_LOCK = new Object(); private static final String[] EMPTY_STRING_ARRAY = new String[0]; private static String DEFAULT_REGISTRATION_ID = getRegistrationID(null, null); - private final Map<String,RegistrationContextImpl> layerAppContextRegistrations = - new ConcurrentHashMap<>(); - private final Map<String,RegistrationContextImpl> appContextRegistrations = - new ConcurrentHashMap<>(); - private final Map<String,RegistrationContextImpl> layerRegistrations = - new ConcurrentHashMap<>(); + private final Map<String,RegistrationContextImpl> layerAppContextRegistrations = new ConcurrentHashMap<>(); + private final Map<String,RegistrationContextImpl> appContextRegistrations = new ConcurrentHashMap<>(); + private final Map<String,RegistrationContextImpl> layerRegistrations = new ConcurrentHashMap<>(); // Note: Although there will only ever be a maximum of one entry in this - // Map, use a ConcurrentHashMap for consistency - private final Map<String,RegistrationContextImpl> defaultRegistration = - new ConcurrentHashMap<>(1); + // Map, use a ConcurrentHashMap for consistency + private final Map<String,RegistrationContextImpl> defaultRegistration = new ConcurrentHashMap<>(1); public AuthConfigFactoryImpl() { @@ -70,14 +65,11 @@ public class AuthConfigFactoryImpl extends AuthConfigFactory { @Override - public AuthConfigProvider getConfigProvider(String layer, String appContext, - RegistrationListener listener) { - RegistrationContextImpl registrationContext = - findRegistrationContextImpl(layer, appContext); + public AuthConfigProvider getConfigProvider(String layer, String appContext, RegistrationListener listener) { + RegistrationContextImpl registrationContext = findRegistrationContextImpl(layer, appContext); if (registrationContext != null) { if (listener != null) { - RegistrationListenerWrapper wrapper = new RegistrationListenerWrapper( - layer, appContext, listener); + RegistrationListenerWrapper wrapper = new RegistrationListenerWrapper(layer, appContext, listener); registrationContext.addListener(wrapper); } return registrationContext.getProvider(); @@ -87,23 +79,19 @@ public class AuthConfigFactoryImpl extends AuthConfigFactory { @Override - public String registerConfigProvider(String className, - @SuppressWarnings("rawtypes") Map properties, String layer, String appContext, - String description) { - String registrationID = - doRegisterConfigProvider(className, properties, layer, appContext, description); + public String registerConfigProvider(String className, @SuppressWarnings("rawtypes") Map properties, String layer, + String appContext, String description) { + String registrationID = doRegisterConfigProvider(className, properties, layer, appContext, description); savePersistentRegistrations(); return registrationID; } @SuppressWarnings("unchecked") - private String doRegisterConfigProvider(String className, - @SuppressWarnings("rawtypes") Map properties, String layer, String appContext, - String description) { + private String doRegisterConfigProvider(String className, @SuppressWarnings("rawtypes") Map properties, + String layer, String appContext, String description) { if (log.isDebugEnabled()) { - log.debug(sm.getString("authConfigFactoryImpl.registerClass", - className, layer, appContext)); + log.debug(sm.getString("authConfigFactoryImpl.registerClass", className, layer, appContext)); } AuthConfigProvider provider = null; @@ -112,15 +100,15 @@ public class AuthConfigFactoryImpl extends AuthConfigFactory { } String registrationID = getRegistrationID(layer, appContext); - RegistrationContextImpl registrationContextImpl = new RegistrationContextImpl( - layer, appContext, description, true, provider, properties); + RegistrationContextImpl registrationContextImpl = + new RegistrationContextImpl(layer, appContext, description, true, provider, properties); addRegistrationContextImpl(layer, appContext, registrationID, registrationContextImpl); return registrationID; } - private AuthConfigProvider createAuthConfigProvider(String className, - @SuppressWarnings("rawtypes") Map properties) throws SecurityException { + private AuthConfigProvider createAuthConfigProvider(String className, @SuppressWarnings("rawtypes") Map properties) + throws SecurityException { Class<?> clazz = null; AuthConfigProvider provider = null; try { @@ -142,22 +130,22 @@ public class AuthConfigFactoryImpl extends AuthConfigFactory { @Override - public String registerConfigProvider(AuthConfigProvider provider, String layer, - String appContext, String description) { + public String registerConfigProvider(AuthConfigProvider provider, String layer, String appContext, + String description) { if (log.isDebugEnabled()) { - log.debug(sm.getString("authConfigFactoryImpl.registerInstance", - provider.getClass().getName(), layer, appContext)); + log.debug(sm.getString("authConfigFactoryImpl.registerInstance", provider.getClass().getName(), layer, + appContext)); } String registrationID = getRegistrationID(layer, appContext); - RegistrationContextImpl registrationContextImpl = new RegistrationContextImpl( - layer, appContext, description, false, provider, null); + RegistrationContextImpl registrationContextImpl = + new RegistrationContextImpl(layer, appContext, description, false, provider, null); addRegistrationContextImpl(layer, appContext, registrationID, registrationContextImpl); return registrationID; } - private void addRegistrationContextImpl(String layer, String appContext, - String registrationID, RegistrationContextImpl registrationContextImpl) { + private void addRegistrationContextImpl(String layer, String appContext, String registrationID, + RegistrationContextImpl registrationContextImpl) { RegistrationContextImpl previous = null; // Add the registration, noting any registration it replaces @@ -180,12 +168,10 @@ public class AuthConfigFactoryImpl extends AuthConfigFactory { // Need to check existing appContext registrations // (and layer and default) // appContext must match - RegistrationContextImpl registration = - appContextRegistrations.get(getRegistrationID(null, appContext)); + RegistrationContextImpl registration = appContextRegistrations.get(getRegistrationID(null, appContext)); if (registration != null) { for (RegistrationListenerWrapper wrapper : registration.listeners) { - if (layer.equals(wrapper.getMessageLayer()) && - appContext.equals(wrapper.getAppContext())) { + if (layer.equals(wrapper.getMessageLayer()) && appContext.equals(wrapper.getAppContext())) { registration.listeners.remove(wrapper); wrapper.listener.notify(wrapper.messageLayer, wrapper.appContext); } @@ -237,7 +223,7 @@ public class AuthConfigFactoryImpl extends AuthConfigFactory { registration = layerAppContextRegistrations.remove(registrationID); } if (registration == null) { - registration = appContextRegistrations.remove(registrationID); + registration = appContextRegistrations.remove(registrationID); } if (registration == null) { registration = layerRegistrations.remove(registrationID); @@ -288,8 +274,8 @@ public class AuthConfigFactoryImpl extends AuthConfigFactory { } - private void findProvider(AuthConfigProvider provider, - Map<String,RegistrationContextImpl> registrations, List<String> result) { + private void findProvider(AuthConfigProvider provider, Map<String,RegistrationContextImpl> registrations, + List<String> result) { for (Entry<String,RegistrationContextImpl> entry : registrations.entrySet()) { if (provider.equals(entry.getValue().getProvider())) { result.add(entry.getKey()); @@ -322,12 +308,10 @@ public class AuthConfigFactoryImpl extends AuthConfigFactory { private static String getRegistrationID(String layer, String appContext) { if (layer != null && layer.length() == 0) { - throw new IllegalArgumentException( - sm.getString("authConfigFactoryImpl.zeroLengthMessageLayer")); + throw new IllegalArgumentException(sm.getString("authConfigFactoryImpl.zeroLengthMessageLayer")); } if (appContext != null && appContext.length() == 0) { - throw new IllegalArgumentException( - sm.getString("authConfigFactoryImpl.zeroLengthAppContext")); + throw new IllegalArgumentException(sm.getString("authConfigFactoryImpl.zeroLengthAppContext")); } return (layer == null ? "" : layer) + ":" + (appContext == null ? "" : appContext); } @@ -336,16 +320,15 @@ public class AuthConfigFactoryImpl extends AuthConfigFactory { private void loadPersistentRegistrations() { synchronized (CONFIG_FILE_LOCK) { if (log.isDebugEnabled()) { - log.debug(sm.getString("authConfigFactoryImpl.load", - CONFIG_FILE.getAbsolutePath())); + log.debug(sm.getString("authConfigFactoryImpl.load", CONFIG_FILE.getAbsolutePath())); } if (!CONFIG_FILE.isFile()) { return; } Providers providers = PersistentProviderRegistrations.loadProviders(CONFIG_FILE); for (Provider provider : providers.getProviders()) { - doRegisterConfigProvider(provider.getClassName(), provider.getProperties(), - provider.getLayer(), provider.getAppContext(), provider.getDescription()); + doRegisterConfigProvider(provider.getClassName(), provider.getProperties(), provider.getLayer(), + provider.getAppContext(), provider.getDescription()); } } } @@ -363,16 +346,14 @@ public class AuthConfigFactoryImpl extends AuthConfigFactory { } - private void savePersistentProviders(Providers providers, - Map<String,RegistrationContextImpl> registrations) { + private void savePersistentProviders(Providers providers, Map<String,RegistrationContextImpl> registrations) { for (Entry<String,RegistrationContextImpl> entry : registrations.entrySet()) { savePersistentProvider(providers, entry.getValue()); } } - private void savePersistentProvider(Providers providers, - RegistrationContextImpl registrationContextImpl) { + private void savePersistentProvider(Providers providers, RegistrationContextImpl registrationContextImpl) { if (registrationContextImpl != null && registrationContextImpl.isPersistent()) { Provider provider = new Provider(); provider.setAppContext(registrationContextImpl.getAppContext()); @@ -407,8 +388,8 @@ public class AuthConfigFactoryImpl extends AuthConfigFactory { private static class RegistrationContextImpl implements RegistrationContext { - private RegistrationContextImpl(String messageLayer, String appContext, String description, - boolean persistent, AuthConfigProvider provider, Map<String,String> properties) { + private RegistrationContextImpl(String messageLayer, String appContext, String description, boolean persistent, + AuthConfigProvider provider, Map<String,String> properties) { this.messageLayer = messageLayer; this.appContext = appContext; this.description = description; @@ -489,8 +470,7 @@ public class AuthConfigFactoryImpl extends AuthConfigFactory { private final RegistrationListener listener; - RegistrationListenerWrapper(String messageLayer, String appContext, - RegistrationListener listener) { + RegistrationListenerWrapper(String messageLayer, String appContext, RegistrationListener listener) { this.messageLayer = messageLayer; this.appContext = appContext; this.listener = listener; diff --git a/java/org/apache/catalina/authenticator/jaspic/CallbackHandlerImpl.java b/java/org/apache/catalina/authenticator/jaspic/CallbackHandlerImpl.java index d88ff80bf1..80029e2f8c 100644 --- a/java/org/apache/catalina/authenticator/jaspic/CallbackHandlerImpl.java +++ b/java/org/apache/catalina/authenticator/jaspic/CallbackHandlerImpl.java @@ -73,18 +73,17 @@ public class CallbackHandlerImpl implements CallbackHandler, Contained { if (container == null) { log.warn(sm.getString("callbackHandlerImpl.containerMissing", callback.getClass().getName())); } else if (container.getRealm() == null) { - log.warn(sm.getString("callbackHandlerImpl.realmMissing", - callback.getClass().getName(), container.getName())); + log.warn(sm.getString("callbackHandlerImpl.realmMissing", callback.getClass().getName(), + container.getName())); } else { PasswordValidationCallback pvc = (PasswordValidationCallback) callback; - principal = container.getRealm().authenticate(pvc.getUsername(), - String.valueOf(pvc.getPassword())); + principal = + container.getRealm().authenticate(pvc.getUsername(), String.valueOf(pvc.getPassword())); pvc.setResult(principal != null); subject = pvc.getSubject(); } } else { - log.error(sm.getString("callbackHandlerImpl.jaspicCallbackMissing", - callback.getClass().getName())); + log.error(sm.getString("callbackHandlerImpl.jaspicCallbackMissing", callback.getClass().getName())); } } diff --git a/java/org/apache/catalina/authenticator/jaspic/MessageInfoImpl.java b/java/org/apache/catalina/authenticator/jaspic/MessageInfoImpl.java index 4d0ba64a7c..a9d793c713 100644 --- a/java/org/apache/catalina/authenticator/jaspic/MessageInfoImpl.java +++ b/java/org/apache/catalina/authenticator/jaspic/MessageInfoImpl.java @@ -30,7 +30,7 @@ public class MessageInfoImpl implements MessageInfo { public static final String IS_MANDATORY = "javax.security.auth.message.MessagePolicy.isMandatory"; - private final Map<String, Object> map = new HashMap<>(); + private final Map<String,Object> map = new HashMap<>(); private HttpServletRequest request; private HttpServletResponse response; @@ -63,8 +63,8 @@ public class MessageInfoImpl implements MessageInfo { @Override public void setRequestMessage(Object request) { if (!(request instanceof HttpServletRequest)) { - throw new IllegalArgumentException(sm.getString("authenticator.jaspic.badRequestType", - request.getClass().getName())); + throw new IllegalArgumentException( + sm.getString("authenticator.jaspic.badRequestType", request.getClass().getName())); } this.request = (HttpServletRequest) request; } @@ -72,8 +72,8 @@ public class MessageInfoImpl implements MessageInfo { @Override public void setResponseMessage(Object response) { if (!(response instanceof HttpServletResponse)) { - throw new IllegalArgumentException(sm.getString("authenticator.jaspic.badResponseType", - response.getClass().getName())); + throw new IllegalArgumentException( + sm.getString("authenticator.jaspic.badResponseType", response.getClass().getName())); } this.response = (HttpServletResponse) response; } diff --git a/java/org/apache/catalina/authenticator/jaspic/PersistentProviderRegistrations.java b/java/org/apache/catalina/authenticator/jaspic/PersistentProviderRegistrations.java index b53310574e..40845783a0 100644 --- a/java/org/apache/catalina/authenticator/jaspic/PersistentProviderRegistrations.java +++ b/java/org/apache/catalina/authenticator/jaspic/PersistentProviderRegistrations.java @@ -40,14 +40,12 @@ import org.apache.tomcat.util.res.StringManager; import org.xml.sax.SAXException; /** - * Utility class for the loading and saving of JASPIC persistent provider - * registrations. + * Utility class for the loading and saving of JASPIC persistent provider registrations. */ public final class PersistentProviderRegistrations { private static final Log log = LogFactory.getLog(PersistentProviderRegistrations.class); - private static final StringManager sm = - StringManager.getManager(PersistentProviderRegistrations.class); + private static final StringManager sm = StringManager.getManager(PersistentProviderRegistrations.class); private PersistentProviderRegistrations() { @@ -100,15 +98,13 @@ public final class PersistentProviderRegistrations { // Remove left over temporary files if present if (configFileOld.exists()) { if (configFileOld.delete()) { - throw new SecurityException(sm.getString( - "persistentProviderRegistrations.existsDeleteFail", + throw new SecurityException(sm.getString("persistentProviderRegistrations.existsDeleteFail", configFileOld.getAbsolutePath())); } } if (configFileNew.exists()) { if (configFileNew.delete()) { - throw new SecurityException(sm.getString( - "persistentProviderRegistrations.existsDeleteFail", + throw new SecurityException(sm.getString("persistentProviderRegistrations.existsDeleteFail", configFileNew.getAbsolutePath())); } } @@ -116,9 +112,7 @@ public final class PersistentProviderRegistrations { // Write out the providers to the temporary new file try (OutputStream fos = new FileOutputStream(configFileNew); Writer writer = new OutputStreamWriter(fos, StandardCharsets.UTF_8)) { - writer.write( - "<?xml version='1.0' encoding='utf-8'?>\n" + - "<jaspic-providers\n" + + writer.write("<?xml version='1.0' encoding='utf-8'?>\n" + "<jaspic-providers\n" + " xmlns=\"http://tomcat.apache.org/xml\"\n" + " xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\"\n" + " xsi:schemaLocation=\"http://tomcat.apache.org/xml jaspic-providers.xsd\"\n" + @@ -143,8 +137,7 @@ public final class PersistentProviderRegistrations { } catch (IOException e) { if (!configFileNew.delete()) { Log log = LogFactory.getLog(PersistentProviderRegistrations.class); - log.warn(sm.getString("persistentProviderRegistrations.deleteFail", - configFileNew.getAbsolutePath())); + log.warn(sm.getString("persistentProviderRegistrations.deleteFail", configFileNew.getAbsolutePath())); } throw new SecurityException(e); } @@ -166,8 +159,7 @@ public final class PersistentProviderRegistrations { // Remove the old file if (configFileOld.exists() && !configFileOld.delete()) { Log log = LogFactory.getLog(PersistentProviderRegistrations.class); - log.warn(sm.getString("persistentProviderRegistrations.deleteFail", - configFileOld.getAbsolutePath())); + log.warn(sm.getString("persistentProviderRegistrations.deleteFail", configFileOld.getAbsolutePath())); } } @@ -205,6 +197,7 @@ public final class PersistentProviderRegistrations { public String getClassName() { return className; } + public void setClassName(String className) { this.className = className; } @@ -213,6 +206,7 @@ public final class PersistentProviderRegistrations { public String getLayer() { return layer; } + public void setLayer(String layer) { this.layer = layer; } @@ -221,6 +215,7 @@ public final class PersistentProviderRegistrations { public String getAppContext() { return appContext; } + public void setAppContext(String appContext) { this.appContext = appContext; } @@ -229,6 +224,7 @@ public final class PersistentProviderRegistrations { public String getDescription() { return description; } + public void setDescription(String description) { this.description = description; } @@ -240,16 +236,20 @@ public final class PersistentProviderRegistrations { /** * Used by IntrospectionUtils via reflection. - * @param name - the name of of the property to set on this object + * + * @param name - the name of of the property to set on this object * @param value - the value to set + * * @see #addProperty(String, String) */ public void setProperty(String name, String value) { addProperty(name, value); } + void addProperty(String name, String value) { properties.put(name, value); } + public Map<String,String> getProperties() { return properties; } @@ -264,6 +264,7 @@ public final class PersistentProviderRegistrations { public String getName() { return name; } + public void setName(String name) { this.name = name; } @@ -272,6 +273,7 @@ public final class PersistentProviderRegistrations { public String getValue() { return value; } + public void setValue(String value) { this.value = value; } diff --git a/java/org/apache/catalina/authenticator/jaspic/SimpleAuthConfigProvider.java b/java/org/apache/catalina/authenticator/jaspic/SimpleAuthConfigProvider.java index 476e97822c..09af1567e0 100644 --- a/java/org/apache/catalina/authenticator/jaspic/SimpleAuthConfigProvider.java +++ b/java/org/apache/catalina/authenticator/jaspic/SimpleAuthConfigProvider.java @@ -27,8 +27,7 @@ import javax.security.auth.message.config.ServerAuthConfig; /** * Basic implementation primarily intended for use when using third-party - * {@link javax.security.auth.message.module.ServerAuthModule} implementations - * that only provide the module. + * {@link javax.security.auth.message.module.ServerAuthModule} implementations that only provide the module. */ public class SimpleAuthConfigProvider implements AuthConfigProvider { @@ -47,19 +46,18 @@ public class SimpleAuthConfigProvider implements AuthConfigProvider { /** * {@inheritDoc} * <p> - * This implementation does not support client-side authentication and - * therefore always returns {@code null}. + * This implementation does not support client-side authentication and therefore always returns {@code null}. */ @Override - public ClientAuthConfig getClientAuthConfig(String layer, String appContext, - CallbackHandler handler) throws AuthException { + public ClientAuthConfig getClientAuthConfig(String layer, String appContext, CallbackHandler handler) + throws AuthException { return null; } @Override - public ServerAuthConfig getServerAuthConfig(String layer, String appContext, - CallbackHandler handler) throws AuthException { + public ServerAuthConfig getServerAuthConfig(String layer, String appContext, CallbackHandler handler) + throws AuthException { ServerAuthConfig serverAuthConfig = this.serverAuthConfig; if (serverAuthConfig == null) { synchronized (this) { @@ -73,8 +71,8 @@ public class SimpleAuthConfigProvider implements AuthConfigProvider { } - protected ServerAuthConfig createServerAuthConfig(String layer, String appContext, - CallbackHandler handler, Map<String,String> properties) { + protected ServerAuthConfig createServerAuthConfig(String layer, String appContext, CallbackHandler handler, + Map<String,String> properties) { return new SimpleServerAuthConfig(layer, appContext, handler, properties); } diff --git a/java/org/apache/catalina/authenticator/jaspic/SimpleServerAuthConfig.java b/java/org/apache/catalina/authenticator/jaspic/SimpleServerAuthConfig.java index 15d29e109d..289b6f83af 100644 --- a/java/org/apache/catalina/authenticator/jaspic/SimpleServerAuthConfig.java +++ b/java/org/apache/catalina/authenticator/jaspic/SimpleServerAuthConfig.java @@ -32,10 +32,9 @@ import javax.security.auth.message.module.ServerAuthModule; import org.apache.tomcat.util.res.StringManager; /** - * Basic implementation primarily intended for use when using third-party - * {@link ServerAuthModule} implementations that only provide the module. This - * implementation supports configuring the {@link ServerAuthContext} with - * multiple modules. + * Basic implementation primarily intended for use when using third-party {@link ServerAuthModule} implementations that + * only provide the module. This implementation supports configuring the {@link ServerAuthContext} with multiple + * modules. */ public class SimpleServerAuthConfig implements ServerAuthConfig { @@ -90,10 +89,10 @@ public class SimpleServerAuthConfig implements ServerAuthConfig { } - @SuppressWarnings({"rawtypes", "unchecked"}) // JASPIC API uses raw types + @SuppressWarnings({ "rawtypes", "unchecked" }) // JASPIC API uses raw types @Override - public ServerAuthContext getAuthContext(String authContextID, Subject serviceSubject, - Map properties) throws AuthException { + public ServerAuthContext getAuthContext(String authContextID, Subject serviceSubject, Map properties) + throws AuthException { ServerAuthContext serverAuthContext = this.serverAuthContext; if (serverAuthContext == null) { synchronized (this) { @@ -113,12 +112,10 @@ public class SimpleServerAuthConfig implements ServerAuthConfig { while (moduleClassName != null) { try { Class<?> clazz = Class.forName(moduleClassName); - ServerAuthModule module = - (ServerAuthModule) clazz.getConstructor().newInstance(); + ServerAuthModule module = (ServerAuthModule) clazz.getConstructor().newInstance(); module.initialize(null, null, handler, mergedProperties); modules.add(module); - } catch (ReflectiveOperationException | IllegalArgumentException | - SecurityException e) { + } catch (ReflectiveOperationException | IllegalArgumentException | SecurityException e) { AuthException ae = new AuthException(); ae.initCause(e); throw ae; diff --git a/java/org/apache/catalina/authenticator/jaspic/SimpleServerAuthContext.java b/java/org/apache/catalina/authenticator/jaspic/SimpleServerAuthContext.java index d36cb0f9b6..d6da034558 100644 --- a/java/org/apache/catalina/authenticator/jaspic/SimpleServerAuthContext.java +++ b/java/org/apache/catalina/authenticator/jaspic/SimpleServerAuthContext.java @@ -26,10 +26,9 @@ import javax.security.auth.message.config.ServerAuthContext; import javax.security.auth.message.module.ServerAuthModule; /** - * Basic implementation primarily intended for use when using third-party - * {@link ServerAuthModule} implementations that only provide the module. This - * implementation supports multiple modules and will treat the user as - * authenticated if any one module is able to authenticate the user. + * Basic implementation primarily intended for use when using third-party {@link ServerAuthModule} implementations that + * only provide the module. This implementation supports multiple modules and will treat the user as authenticated if + * any one module is able to authenticate the user. */ public class SimpleServerAuthContext implements ServerAuthContext { @@ -43,8 +42,8 @@ public class SimpleServerAuthContext implements ServerAuthContext { @SuppressWarnings("unchecked") // JASPIC API uses raw types @Override - public AuthStatus validateRequest(MessageInfo messageInfo, Subject clientSubject, - Subject serviceSubject) throws AuthException { + public AuthStatus validateRequest(MessageInfo messageInfo, Subject clientSubject, Subject serviceSubject) + throws AuthException { for (int moduleIndex = 0; moduleIndex < modules.size(); moduleIndex++) { ServerAuthModule module = modules.get(moduleIndex); AuthStatus result = module.validateRequest(messageInfo, clientSubject, serviceSubject); @@ -58,8 +57,7 @@ public class SimpleServerAuthContext implements ServerAuthContext { @Override - public AuthStatus secureResponse(MessageInfo messageInfo, Subject serviceSubject) - throws AuthException { + public AuthStatus secureResponse(MessageInfo messageInfo, Subject serviceSubject) throws AuthException { ServerAuthModule module = modules.get(((Integer) messageInfo.getMap().get("moduleIndex")).intValue()); return module.secureResponse(messageInfo, serviceSubject); } --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org