This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch 9.0.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/9.0.x by this push:
     new b71907391c Unify conditional statement format (#661)
b71907391c is described below

commit b71907391c0b46ee3541cd3f5d92fb6f0f0eabea
Author: ReO <89302528+jaeyoun...@users.noreply.github.com>
AuthorDate: Wed Sep 6 22:13:18 2023 +0900

    Unify conditional statement format (#661)
    
    Remove unnecessary parentheses
    
    Simplify some conditional statements using De Morgan's law
---
 java/org/apache/catalina/ant/AbstractCatalinaTask.java         |  2 +-
 java/org/apache/catalina/connector/Request.java                |  4 ++--
 java/org/apache/catalina/connector/Response.java               |  2 +-
 java/org/apache/catalina/core/ApplicationContext.java          |  4 ++--
 java/org/apache/catalina/core/ApplicationFilterFactory.java    |  2 +-
 java/org/apache/catalina/core/StandardContext.java             |  2 +-
 java/org/apache/catalina/filters/CsrfPreventionFilter.java     |  2 +-
 java/org/apache/catalina/manager/ManagerServlet.java           |  2 +-
 java/org/apache/catalina/manager/host/HostManagerServlet.java  |  2 +-
 java/org/apache/catalina/realm/JNDIRealm.java                  |  2 +-
 java/org/apache/catalina/realm/RealmBase.java                  |  2 +-
 java/org/apache/coyote/ajp/AjpMessage.java                     |  2 +-
 java/org/apache/coyote/http11/Http11InputBuffer.java           | 10 +++++-----
 java/org/apache/coyote/http11/filters/ChunkedInputFilter.java  |  6 +++---
 .../apache/tomcat/util/descriptor/web/SecurityConstraint.java  |  4 ++--
 java/org/apache/tomcat/util/digester/RulesBase.java            |  2 +-
 16 files changed, 25 insertions(+), 25 deletions(-)

diff --git a/java/org/apache/catalina/ant/AbstractCatalinaTask.java 
b/java/org/apache/catalina/ant/AbstractCatalinaTask.java
index 75676e2960..61ac76e5e5 100644
--- a/java/org/apache/catalina/ant/AbstractCatalinaTask.java
+++ b/java/org/apache/catalina/ant/AbstractCatalinaTask.java
@@ -233,7 +233,7 @@ public abstract class AbstractCatalinaTask extends 
BaseRedirectorHelperTask {
                 int ch = reader.read();
                 if (ch < 0) {
                     break;
-                } else if ((ch == '\r') || (ch == '\n')) {
+                } else if (ch == '\r' || ch == '\n') {
                     // in Win \r\n would cause handleOutput() to be called
                     // twice, the second time with an empty string,
                     // producing blank lines
diff --git a/java/org/apache/catalina/connector/Request.java 
b/java/org/apache/catalina/connector/Request.java
index eb07a8c749..8f1e4aac16 100644
--- a/java/org/apache/catalina/connector/Request.java
+++ b/java/org/apache/catalina/connector/Request.java
@@ -1563,7 +1563,7 @@ public class Request implements HttpServletRequest {
             return;
         }
         Object listeners[] = context.getApplicationEventListeners();
-        if ((listeners == null) || (listeners.length == 0)) {
+        if (listeners == null || listeners.length == 0) {
             return;
         }
         boolean replaced = (oldValue != null);
@@ -1604,7 +1604,7 @@ public class Request implements HttpServletRequest {
     private void notifyAttributeRemoved(String name, Object value) {
         Context context = getContext();
         Object listeners[] = context.getApplicationEventListeners();
-        if ((listeners == null) || (listeners.length == 0)) {
+        if (listeners == null || listeners.length == 0) {
             return;
         }
         ServletRequestAttributeEvent event =
diff --git a/java/org/apache/catalina/connector/Response.java 
b/java/org/apache/catalina/connector/Response.java
index e3c2c27339..8be3c26a95 100644
--- a/java/org/apache/catalina/connector/Response.java
+++ b/java/org/apache/catalina/connector/Response.java
@@ -1780,7 +1780,7 @@ public class Response implements HttpServletResponse {
      * @return the encoded URL
      */
     protected String toEncoded(String url, String sessionId) {
-        if ((url == null) || (sessionId == null)) {
+        if (url == null || sessionId == null) {
             return url;
         }
 
diff --git a/java/org/apache/catalina/core/ApplicationContext.java 
b/java/org/apache/catalina/core/ApplicationContext.java
index 409018243d..1f00282154 100644
--- a/java/org/apache/catalina/core/ApplicationContext.java
+++ b/java/org/apache/catalina/core/ApplicationContext.java
@@ -664,7 +664,7 @@ public class ApplicationContext implements ServletContext {
 
         // Notify interested application event listeners
         Object listeners[] = context.getApplicationEventListeners();
-        if ((listeners == null) || (listeners.length == 0)) {
+        if (listeners == null || listeners.length == 0) {
             return;
         }
         ServletContextAttributeEvent event = new 
ServletContextAttributeEvent(context.getServletContext(), name, value);
@@ -711,7 +711,7 @@ public class ApplicationContext implements ServletContext {
 
         // Notify interested application event listeners
         Object listeners[] = context.getApplicationEventListeners();
-        if ((listeners == null) || (listeners.length == 0)) {
+        if (listeners == null || listeners.length == 0) {
             return;
         }
         ServletContextAttributeEvent event = null;
diff --git a/java/org/apache/catalina/core/ApplicationFilterFactory.java 
b/java/org/apache/catalina/core/ApplicationFilterFactory.java
index 3c3ea43c76..ad723df92e 100644
--- a/java/org/apache/catalina/core/ApplicationFilterFactory.java
+++ b/java/org/apache/catalina/core/ApplicationFilterFactory.java
@@ -81,7 +81,7 @@ public final class ApplicationFilterFactory {
         FilterMap filterMaps[] = context.findFilterMaps();
 
         // If there are no filter mappings, we are done
-        if ((filterMaps == null) || (filterMaps.length == 0)) {
+        if (filterMaps == null || filterMaps.length == 0) {
             return filterChain;
         }
 
diff --git a/java/org/apache/catalina/core/StandardContext.java 
b/java/org/apache/catalina/core/StandardContext.java
index f141c0b5da..c3ba391c87 100644
--- a/java/org/apache/catalina/core/StandardContext.java
+++ b/java/org/apache/catalina/core/StandardContext.java
@@ -2962,7 +2962,7 @@ public class StandardContext extends ContainerBase 
implements Context, Notificat
     @Override
     public void addParameter(String name, String value) {
         // Validate the proposed context initialization parameter
-        if ((name == null) || (value == null)) {
+        if (name == null || value == null) {
             throw new 
IllegalArgumentException(sm.getString("standardContext.parameter.required"));
         }
 
diff --git a/java/org/apache/catalina/filters/CsrfPreventionFilter.java 
b/java/org/apache/catalina/filters/CsrfPreventionFilter.java
index ef5e979126..2464ebc59c 100644
--- a/java/org/apache/catalina/filters/CsrfPreventionFilter.java
+++ b/java/org/apache/catalina/filters/CsrfPreventionFilter.java
@@ -303,7 +303,7 @@ public class CsrfPreventionFilter extends 
CsrfPreventionFilterBase {
          */
         private String addNonce(String url) {
 
-            if ((url == null) || (nonce == null)) {
+            if (url == null || nonce == null) {
                 return url;
             }
 
diff --git a/java/org/apache/catalina/manager/ManagerServlet.java 
b/java/org/apache/catalina/manager/ManagerServlet.java
index 3773b9a156..ed09a11fa7 100644
--- a/java/org/apache/catalina/manager/ManagerServlet.java
+++ b/java/org/apache/catalina/manager/ManagerServlet.java
@@ -475,7 +475,7 @@ public class ManagerServlet extends HttpServlet implements 
ContainerServlet {
     public void init() throws ServletException {
 
         // Ensure that our ContainerServlet properties have been set
-        if ((wrapper == null) || (context == null)) {
+        if (wrapper == null || context == null) {
             throw new UnavailableException(
                     sm.getString("managerServlet.noWrapper"));
         }
diff --git a/java/org/apache/catalina/manager/host/HostManagerServlet.java 
b/java/org/apache/catalina/manager/host/HostManagerServlet.java
index e8eaa6db97..d0c9c22836 100644
--- a/java/org/apache/catalina/manager/host/HostManagerServlet.java
+++ b/java/org/apache/catalina/manager/host/HostManagerServlet.java
@@ -302,7 +302,7 @@ public class HostManagerServlet
     public void init() throws ServletException {
 
         // Ensure that our ContainerServlet properties have been set
-        if ((wrapper == null) || (context == null)) {
+        if (wrapper == null || context == null) {
             throw new UnavailableException
                 (sm.getString("hostManagerServlet.noWrapper"));
         }
diff --git a/java/org/apache/catalina/realm/JNDIRealm.java 
b/java/org/apache/catalina/realm/JNDIRealm.java
index a68f1a0db1..aa94cb07ea 100644
--- a/java/org/apache/catalina/realm/JNDIRealm.java
+++ b/java/org/apache/catalina/realm/JNDIRealm.java
@@ -1943,7 +1943,7 @@ public class JNDIRealm extends RealmBase {
         }
 
         // Are we configured to do role searches?
-        if ((connection.roleFormat == null) || (roleName == null)) {
+        if (connection.roleFormat == null || roleName == null) {
             return list;
         }
 
diff --git a/java/org/apache/catalina/realm/RealmBase.java 
b/java/org/apache/catalina/realm/RealmBase.java
index b616e1b623..b6c0ec65cc 100644
--- a/java/org/apache/catalina/realm/RealmBase.java
+++ b/java/org/apache/catalina/realm/RealmBase.java
@@ -532,7 +532,7 @@ public abstract class RealmBase extends LifecycleMBeanBase 
implements Realm {
         ArrayList<SecurityConstraint> results = null;
         // Are there any defined security constraints?
         SecurityConstraint constraints[] = context.findConstraints();
-        if ((constraints == null) || (constraints.length == 0)) {
+        if (constraints == null || constraints.length == 0) {
             if (log.isDebugEnabled()) {
                 log.debug("  No applicable constraints defined");
             }
diff --git a/java/org/apache/coyote/ajp/AjpMessage.java 
b/java/org/apache/coyote/ajp/AjpMessage.java
index 53fca56514..1e4f0c6f3e 100644
--- a/java/org/apache/coyote/ajp/AjpMessage.java
+++ b/java/org/apache/coyote/ajp/AjpMessage.java
@@ -289,7 +289,7 @@ public class AjpMessage {
 
     private void doGetBytes(MessageBytes mb, boolean terminated) {
         int length = getInt();
-        if ((length == 0xFFFF) || (length == -1)) {
+        if (length == 0xFFFF || length == -1) {
             mb.recycle();
             return;
         }
diff --git a/java/org/apache/coyote/http11/Http11InputBuffer.java 
b/java/org/apache/coyote/http11/Http11InputBuffer.java
index b7517459fd..b3998dd858 100644
--- a/java/org/apache/coyote/http11/Http11InputBuffer.java
+++ b/java/org/apache/coyote/http11/Http11InputBuffer.java
@@ -373,7 +373,7 @@ public class Http11InputBuffer implements InputBuffer, 
ApplicationBufferHandler
                     request.setStartTime(System.currentTimeMillis());
                 }
                 chr = byteBuffer.get();
-            } while ((chr == Constants.CR) || (chr == Constants.LF));
+            } while (chr == Constants.CR || chr == Constants.LF);
             byteBuffer.position(byteBuffer.position() - 1);
 
             parsingRequestLineStart = byteBuffer.position();
@@ -420,7 +420,7 @@ public class Http11InputBuffer implements InputBuffer, 
ApplicationBufferHandler
                     }
                 }
                 chr = byteBuffer.get();
-                if (!(chr == Constants.SP || chr == Constants.HT)) {
+                if (chr != Constants.SP && chr != Constants.HT) {
                     space = false;
                     byteBuffer.position(byteBuffer.position() - 1);
                 }
@@ -516,7 +516,7 @@ public class Http11InputBuffer implements InputBuffer, 
ApplicationBufferHandler
                     }
                 }
                 byte chr = byteBuffer.get();
-                if (!(chr == Constants.SP || chr == Constants.HT)) {
+                if (chr != Constants.SP && chr != Constants.HT) {
                     space = false;
                     byteBuffer.position(byteBuffer.position() - 1);
                 }
@@ -936,7 +936,7 @@ public class Http11InputBuffer implements InputBuffer, 
ApplicationBufferHandler
                     }
 
                     chr = byteBuffer.get();
-                    if (!(chr == Constants.SP || chr == Constants.HT)) {
+                    if (chr != Constants.SP && chr != Constants.HT) {
                         headerParsePos = HeaderParsePosition.HEADER_VALUE;
                         byteBuffer.position(byteBuffer.position() - 1);
                         // Avoids prevChr = chr at start of header value
@@ -1002,7 +1002,7 @@ public class Http11InputBuffer implements InputBuffer, 
ApplicationBufferHandler
 
             byte peek = byteBuffer.get(byteBuffer.position());
             if (headerParsePos == HeaderParsePosition.HEADER_MULTI_LINE) {
-                if ((peek != Constants.SP) && (peek != Constants.HT)) {
+                if (peek != Constants.SP && peek != Constants.HT) {
                     headerParsePos = HeaderParsePosition.HEADER_START;
                     break;
                 } else {
diff --git a/java/org/apache/coyote/http11/filters/ChunkedInputFilter.java 
b/java/org/apache/coyote/http11/filters/ChunkedInputFilter.java
index 586d070f4d..33d7feef10 100644
--- a/java/org/apache/coyote/http11/filters/ChunkedInputFilter.java
+++ b/java/org/apache/coyote/http11/filters/ChunkedInputFilter.java
@@ -484,7 +484,7 @@ public class ChunkedInputFilter implements InputFilter, 
ApplicationBufferHandler
 
             // readBytes() above will set readChunk unless it returns a value 
< 0
             chr = readChunk.get(readChunk.position());
-            if ((chr >= Constants.A) && (chr <= Constants.Z)) {
+            if (chr >= Constants.A && chr <= Constants.Z) {
                 chr = (byte) (chr - Constants.LC_OFFSET);
             }
 
@@ -522,7 +522,7 @@ public class ChunkedInputFilter implements InputFilter, 
ApplicationBufferHandler
                 }
 
                 chr = readChunk.get(readChunk.position());
-                if ((chr == Constants.SP) || (chr == Constants.HT)) {
+                if (chr == Constants.SP || chr == Constants.HT) {
                     readChunk.position(readChunk.position() + 1);
                     // If we swallow whitespace, make sure it counts towards 
the
                     // limit placed on trailing header size
@@ -574,7 +574,7 @@ public class ChunkedInputFilter implements InputFilter, 
ApplicationBufferHandler
             }
 
             chr = readChunk.get(readChunk.position());
-            if ((chr != Constants.SP) && (chr != Constants.HT)) {
+            if (chr != Constants.SP && chr != Constants.HT) {
                 validLine = false;
             } else {
                 eol = false;
diff --git a/java/org/apache/tomcat/util/descriptor/web/SecurityConstraint.java 
b/java/org/apache/tomcat/util/descriptor/web/SecurityConstraint.java
index 7af67d25d1..aff796ab1d 100644
--- a/java/org/apache/tomcat/util/descriptor/web/SecurityConstraint.java
+++ b/java/org/apache/tomcat/util/descriptor/web/SecurityConstraint.java
@@ -503,10 +503,10 @@ public class SecurityConstraint extends XmlEncodingBase 
implements Serializable
     private boolean matchPattern(String path, String pattern) {
 
         // Normalize the argument strings
-        if ((path == null) || (path.length() == 0)) {
+        if (path == null || path.length() == 0) {
             path = "/";
         }
-        if ((pattern == null) || (pattern.length() == 0)) {
+        if (pattern == null || pattern.length() == 0) {
             pattern = "/";
         }
 
diff --git a/java/org/apache/tomcat/util/digester/RulesBase.java 
b/java/org/apache/tomcat/util/digester/RulesBase.java
index 2531509953..be622f0f48 100644
--- a/java/org/apache/tomcat/util/digester/RulesBase.java
+++ b/java/org/apache/tomcat/util/digester/RulesBase.java
@@ -191,7 +191,7 @@ public class RulesBase implements Rules {
         if (list == null) {
             return null;
         }
-        if ((namespaceURI == null) || (namespaceURI.length() == 0)) {
+        if (namespaceURI == null || namespaceURI.length() == 0) {
             return list;
         }
 


---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to