Author: markt Date: Mon Jun 8 17:57:05 2015 New Revision: 1684233 URL: http://svn.apache.org/r1684233 Log: Rename ErrorCode -> Error
Added: tomcat/trunk/java/org/apache/coyote/http2/Error.java - copied, changed from r1683410, tomcat/trunk/java/org/apache/coyote/http2/ErrorCode.java Removed: tomcat/trunk/java/org/apache/coyote/http2/ErrorCode.java Modified: tomcat/trunk/java/org/apache/coyote/http2/ConnectionSettings.java tomcat/trunk/java/org/apache/coyote/http2/FrameType.java tomcat/trunk/java/org/apache/coyote/http2/Http2Exception.java tomcat/trunk/java/org/apache/coyote/http2/Http2Parser.java tomcat/trunk/java/org/apache/coyote/http2/Http2UpgradeHandler.java tomcat/trunk/java/org/apache/coyote/http2/StreamStateMachine.java tomcat/trunk/test/org/apache/coyote/http2/TestHttp2Section_4_3.java tomcat/trunk/test/org/apache/coyote/http2/TestHttp2Section_5_1.java Modified: tomcat/trunk/java/org/apache/coyote/http2/ConnectionSettings.java URL: http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/coyote/http2/ConnectionSettings.java?rev=1684233&r1=1684232&r2=1684233&view=diff ============================================================================== --- tomcat/trunk/java/org/apache/coyote/http2/ConnectionSettings.java (original) +++ tomcat/trunk/java/org/apache/coyote/http2/ConnectionSettings.java Mon Jun 8 17:57:05 2015 @@ -84,7 +84,7 @@ public class ConnectionSettings { // Need to put a sensible limit on this. Start with 16k (default is 4k) if (headerTableSize > (16 * 1024)) { throw new Http2Exception(sm.getString("connectionSettings.headerTableSizeLimit", - Long.toString(headerTableSize)), 0, ErrorCode.PROTOCOL_ERROR); + Long.toString(headerTableSize)), 0, Error.PROTOCOL_ERROR); } this.headerTableSize = (int) headerTableSize; } @@ -98,7 +98,7 @@ public class ConnectionSettings { // will never be negative if (enablePush > 1) { throw new Http2Exception(sm.getString("connectionSettings.enablePushInvalid", - Long.toString(enablePush)), 0, ErrorCode.PROTOCOL_ERROR); + Long.toString(enablePush)), 0, Error.PROTOCOL_ERROR); } this.enablePush = (enablePush == 1); } @@ -119,7 +119,7 @@ public class ConnectionSettings { if (initialWindowSize > MAX_WINDOW_SIZE) { throw new Http2Exception(sm.getString("connectionSettings.windowSizeTooBig", Long.toString(initialWindowSize), Long.toString(MAX_WINDOW_SIZE)), - 0, ErrorCode.PROTOCOL_ERROR); + 0, Error.PROTOCOL_ERROR); } this.initialWindowSize = (int) initialWindowSize; } @@ -132,7 +132,7 @@ public class ConnectionSettings { if (maxFrameSize < MIN_MAX_FRAME_SIZE || maxFrameSize > MAX_MAX_FRAME_SIZE) { throw new Http2Exception(sm.getString("connectionSettings.maxFrameSizeInvalid", Long.toString(maxFrameSize), Integer.toString(MIN_MAX_FRAME_SIZE), - Integer.toString(MAX_MAX_FRAME_SIZE)), 0, ErrorCode.PROTOCOL_ERROR); + Integer.toString(MAX_MAX_FRAME_SIZE)), 0, Error.PROTOCOL_ERROR); } this.maxFrameSize = (int) maxFrameSize; } Copied: tomcat/trunk/java/org/apache/coyote/http2/Error.java (from r1683410, tomcat/trunk/java/org/apache/coyote/http2/ErrorCode.java) URL: http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/coyote/http2/Error.java?p2=tomcat/trunk/java/org/apache/coyote/http2/Error.java&p1=tomcat/trunk/java/org/apache/coyote/http2/ErrorCode.java&r1=1683410&r2=1684233&rev=1684233&view=diff ============================================================================== --- tomcat/trunk/java/org/apache/coyote/http2/ErrorCode.java (original) +++ tomcat/trunk/java/org/apache/coyote/http2/Error.java Mon Jun 8 17:57:05 2015 @@ -16,7 +16,7 @@ */ package org.apache.coyote.http2; -public enum ErrorCode { +public enum Error { NO_ERROR (0x00), PROTOCOL_ERROR (0x01), @@ -33,21 +33,21 @@ public enum ErrorCode { INADEQUATE_SECURITY (0x0c), HTTP_1_1_REQUIRED (0x0d); - private final long errorCode; + private final long code; - private ErrorCode(long errorCode) { - this.errorCode = errorCode; + private Error(long code) { + this.code = code; } - public long getErrorCode() { - return errorCode; + public long getCode() { + return code; } - public byte[] getErrorCodeBytes() { - byte[] errorCodeByte = new byte[4]; - ByteUtil.setFourBytes(errorCodeByte, 0, errorCode); - return errorCodeByte; + public byte[] getCodeBytes() { + byte[] codeByte = new byte[4]; + ByteUtil.setFourBytes(codeByte, 0, code); + return codeByte; } } Modified: tomcat/trunk/java/org/apache/coyote/http2/FrameType.java URL: http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/coyote/http2/FrameType.java?rev=1684233&r1=1684232&r2=1684233&view=diff ============================================================================== --- tomcat/trunk/java/org/apache/coyote/http2/FrameType.java (original) +++ tomcat/trunk/java/org/apache/coyote/http2/FrameType.java Mon Jun 8 17:57:05 2015 @@ -59,10 +59,10 @@ public enum FrameType { public void checkStream(String connectionId, int streamId) throws Http2Exception { if (streamId == 0 && !streamZero) { throw new Http2Exception(sm.getString("frameType.checkStream.invalidForZero", - connectionId, this), 0, ErrorCode.PROTOCOL_ERROR); + connectionId, this), 0, Error.PROTOCOL_ERROR); } else if (streamId != 0 && !streamNonZero) { throw new Http2Exception(sm.getString("frameType.checkStream.invalidForNonZero", - connectionId, Integer.valueOf(streamId), this), 0, ErrorCode.PROTOCOL_ERROR); + connectionId, Integer.valueOf(streamId), this), 0, Error.PROTOCOL_ERROR); } } @@ -72,7 +72,7 @@ public enum FrameType { if (payloadSizeValidator != null && !payloadSizeValidator.test(payloadSize)) { throw new Http2Exception(sm.getString("frameType.checkPayloadSize", connectionId, Integer.toString(streamId), this, Integer.toString(payloadSize)), - 0, ErrorCode.FRAME_SIZE_ERROR); + 0, Error.FRAME_SIZE_ERROR); } } Modified: tomcat/trunk/java/org/apache/coyote/http2/Http2Exception.java URL: http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/coyote/http2/Http2Exception.java?rev=1684233&r1=1684232&r2=1684233&view=diff ============================================================================== --- tomcat/trunk/java/org/apache/coyote/http2/Http2Exception.java (original) +++ tomcat/trunk/java/org/apache/coyote/http2/Http2Exception.java Mon Jun 8 17:57:05 2015 @@ -23,13 +23,13 @@ public class Http2Exception extends IOEx private static final long serialVersionUID = 1L; private final int streamId; - private final ErrorCode errorCode; + private final Error error; - public Http2Exception(String msg, int streamId, ErrorCode errorCode) { + public Http2Exception(String msg, int streamId, Error error) { super(msg); this.streamId = streamId; - this.errorCode = errorCode; + this.error = error; } @@ -38,7 +38,7 @@ public class Http2Exception extends IOEx } - public ErrorCode getErrorCode() { - return errorCode; + public Error getError() { + return error; } } Modified: tomcat/trunk/java/org/apache/coyote/http2/Http2Parser.java URL: http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/coyote/http2/Http2Parser.java?rev=1684233&r1=1684232&r2=1684233&view=diff ============================================================================== --- tomcat/trunk/java/org/apache/coyote/http2/Http2Parser.java (original) +++ tomcat/trunk/java/org/apache/coyote/http2/Http2Parser.java Mon Jun 8 17:57:05 2015 @@ -233,7 +233,7 @@ class Http2Parser { boolean ack = Flags.isAck(flags); if (payloadSize > 0 && ack) { throw new Http2Exception(sm.getString("http2Parser.processFrameSettings.ackWithNonZeroPayload"), - 0, ErrorCode.FRAME_SIZE_ERROR); + 0, Error.FRAME_SIZE_ERROR); } if (payloadSize != 0) { @@ -252,7 +252,7 @@ class Http2Parser { private void readPushPromiseFrame(int streamId) throws IOException { throw new Http2Exception(sm.getString("http2Parser.processFramePushPromise", - connectionId, Integer.valueOf(streamId)), 0, ErrorCode.PROTOCOL_ERROR); + connectionId, Integer.valueOf(streamId)), 0, Error.PROTOCOL_ERROR); } @@ -295,7 +295,7 @@ class Http2Parser { // Validate the data if (windowSizeIncrement == 0) { throw new Http2Exception("http2Parser.processFrameWindowUpdate.invalidIncrement", - streamId, ErrorCode.PROTOCOL_ERROR); + streamId, Error.PROTOCOL_ERROR); } output.incrementWindowSize(streamId, windowSizeIncrement); @@ -308,7 +308,7 @@ class Http2Parser { // No headers to continue throw new Http2Exception(sm.getString( "http2Parser.processFrameContinuation.notExpected", connectionId, - Integer.toString(streamId)), 0, ErrorCode.PROTOCOL_ERROR); + Integer.toString(streamId)), 0, Error.PROTOCOL_ERROR); } boolean endOfHeaders = Flags.isEndOfHeaders(flags); @@ -337,7 +337,7 @@ class Http2Parser { } catch (HpackException hpe) { throw new Http2Exception( sm.getString("http2Parser.processFrameHeaders.decodingFailed"), - 0, ErrorCode.COMPRESSION_ERROR); + 0, Error.COMPRESSION_ERROR); } // switches to write mode headerReadBuffer.compact(); @@ -347,7 +347,7 @@ class Http2Parser { if (headerReadBuffer.position() > 0 && endOfHeaders) { throw new Http2Exception( sm.getString("http2Parser.processFrameHeaders.decodingDataLeft"), - 0, ErrorCode.COMPRESSION_ERROR); + 0, Error.COMPRESSION_ERROR); } } @@ -392,25 +392,25 @@ class Http2Parser { if (expected != null && frameType != expected) { throw new Http2Exception(sm.getString("http2Parser.processFrame.unexpectedType", - expected, frameType), streamId, ErrorCode.PROTOCOL_ERROR); + expected, frameType), streamId, Error.PROTOCOL_ERROR); } if (payloadSize > maxPayloadSize) { throw new Http2Exception(sm.getString("http2Parser.payloadTooBig", Integer.toString(payloadSize), Integer.toString(maxPayloadSize)), - streamId, ErrorCode.FRAME_SIZE_ERROR); + streamId, Error.FRAME_SIZE_ERROR); } if (headersCurrentStream != -1) { if (headersCurrentStream != streamId) { throw new Http2Exception(sm.getString("http2Parser.headers.wrongStream", connectionId, Integer.toString(headersCurrentStream), - Integer.toString(streamId)), streamId, ErrorCode.COMPRESSION_ERROR); + Integer.toString(streamId)), streamId, Error.COMPRESSION_ERROR); } if (frameType != FrameType.CONTINUATION) { throw new Http2Exception(sm.getString("http2Parser.headers.wrongFrameType", connectionId, Integer.toString(headersCurrentStream), - frameType), streamId, ErrorCode.COMPRESSION_ERROR); + frameType), streamId, Error.COMPRESSION_ERROR); } } Modified: tomcat/trunk/java/org/apache/coyote/http2/Http2UpgradeHandler.java URL: http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/coyote/http2/Http2UpgradeHandler.java?rev=1684233&r1=1684232&r2=1684233&view=diff ============================================================================== --- tomcat/trunk/java/org/apache/coyote/http2/Http2UpgradeHandler.java (original) +++ tomcat/trunk/java/org/apache/coyote/http2/Http2UpgradeHandler.java Mon Jun 8 17:57:05 2015 @@ -344,7 +344,7 @@ public class Http2UpgradeHandler extends byte[] fixedPayload = new byte[8]; // TODO needs to be correct value ByteUtil.set31Bits(fixedPayload, 0, (2 << 31) - 1); - ByteUtil.setFourBytes(fixedPayload, 4, h2e.getErrorCode().getErrorCode()); + ByteUtil.setFourBytes(fixedPayload, 4, h2e.getError().getCode()); byte[] debugMessage = h2e.getMessage().getBytes(StandardCharsets.UTF_8); byte[] payloadLength = new byte[3]; ByteUtil.setThreeBytes(payloadLength, 0, debugMessage.length + 8); Modified: tomcat/trunk/java/org/apache/coyote/http2/StreamStateMachine.java URL: http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/coyote/http2/StreamStateMachine.java?rev=1684233&r1=1684232&r2=1684233&view=diff ============================================================================== --- tomcat/trunk/java/org/apache/coyote/http2/StreamStateMachine.java (original) +++ tomcat/trunk/java/org/apache/coyote/http2/StreamStateMachine.java Mon Jun 8 17:57:05 2015 @@ -126,29 +126,29 @@ public class StreamStateMachine { private enum State { - IDLE (true, ErrorCode.PROTOCOL_ERROR, FrameType.HEADERS, FrameType.PRIORITY), - OPEN (true, ErrorCode.PROTOCOL_ERROR, FrameType.DATA, FrameType.HEADERS, + IDLE (true, Error.PROTOCOL_ERROR, FrameType.HEADERS, FrameType.PRIORITY), + OPEN (true, Error.PROTOCOL_ERROR, FrameType.DATA, FrameType.HEADERS, FrameType.PRIORITY, FrameType.RST, FrameType.PUSH_PROMISE, FrameType.WINDOW_UPDATE), - RESERVED_LOCAL (true, ErrorCode.PROTOCOL_ERROR, FrameType.PRIORITY, FrameType.RST, + RESERVED_LOCAL (true, Error.PROTOCOL_ERROR, FrameType.PRIORITY, FrameType.RST, FrameType.WINDOW_UPDATE), - RESERVED_REMOTE (true, ErrorCode.PROTOCOL_ERROR, FrameType.HEADERS, FrameType.PRIORITY, + RESERVED_REMOTE (true, Error.PROTOCOL_ERROR, FrameType.HEADERS, FrameType.PRIORITY, FrameType.RST), - HALF_CLOSED_LOCAL (true, ErrorCode.PROTOCOL_ERROR, FrameType.DATA, FrameType.HEADERS, + HALF_CLOSED_LOCAL (true, Error.PROTOCOL_ERROR, FrameType.DATA, FrameType.HEADERS, FrameType.PRIORITY, FrameType.RST, FrameType.PUSH_PROMISE, FrameType.WINDOW_UPDATE), - HALF_CLOSED_REMOTE (true, ErrorCode.STREAM_CLOSED, FrameType.PRIORITY, FrameType.RST, + HALF_CLOSED_REMOTE (true, Error.STREAM_CLOSED, FrameType.PRIORITY, FrameType.RST, FrameType.WINDOW_UPDATE), - CLOSED_RX (true, ErrorCode.STREAM_CLOSED, FrameType.PRIORITY), - CLOSED_RST (false, ErrorCode.STREAM_CLOSED, FrameType.PRIORITY), - CLOSED_TX (true, ErrorCode.STREAM_CLOSED, FrameType.PRIORITY, FrameType.RST, + CLOSED_RX (true, Error.STREAM_CLOSED, FrameType.PRIORITY), + CLOSED_RST (false, Error.STREAM_CLOSED, FrameType.PRIORITY), + CLOSED_TX (true, Error.STREAM_CLOSED, FrameType.PRIORITY, FrameType.RST, FrameType.WINDOW_UPDATE); private final boolean connectionErrorForInvalidFrame; - private final ErrorCode errorCodeForInvalidFrame; + private final Error errorCodeForInvalidFrame; private final Set<FrameType> frameTypesPermitted = new HashSet<>(); - private State(boolean connectionErrorForInvalidFrame, ErrorCode errorCode, + private State(boolean connectionErrorForInvalidFrame, Error errorCode, FrameType... frameTypes) { this.connectionErrorForInvalidFrame = connectionErrorForInvalidFrame; this.errorCodeForInvalidFrame = errorCode; Modified: tomcat/trunk/test/org/apache/coyote/http2/TestHttp2Section_4_3.java URL: http://svn.apache.org/viewvc/tomcat/trunk/test/org/apache/coyote/http2/TestHttp2Section_4_3.java?rev=1684233&r1=1684232&r2=1684233&view=diff ============================================================================== --- tomcat/trunk/test/org/apache/coyote/http2/TestHttp2Section_4_3.java (original) +++ tomcat/trunk/test/org/apache/coyote/http2/TestHttp2Section_4_3.java Mon Jun 8 17:57:05 2015 @@ -53,7 +53,7 @@ public class TestHttp2Section_4_3 extend Assert.assertTrue(output.getTrace(), output.getTrace().startsWith("0-Goaway-[2147483647]-[" + - ErrorCode.COMPRESSION_ERROR.getErrorCode() + "]-[")); + Error.COMPRESSION_ERROR.getCode() + "]-[")); } @@ -108,6 +108,6 @@ public class TestHttp2Section_4_3 extend Assert.assertTrue(output.getTrace(), output.getTrace().startsWith("0-Goaway-[2147483647]-[" + - ErrorCode.COMPRESSION_ERROR.getErrorCode() + "]-[")); + Error.COMPRESSION_ERROR.getCode() + "]-[")); } } Modified: tomcat/trunk/test/org/apache/coyote/http2/TestHttp2Section_5_1.java URL: http://svn.apache.org/viewvc/tomcat/trunk/test/org/apache/coyote/http2/TestHttp2Section_5_1.java?rev=1684233&r1=1684232&r2=1684233&view=diff ============================================================================== --- tomcat/trunk/test/org/apache/coyote/http2/TestHttp2Section_5_1.java (original) +++ tomcat/trunk/test/org/apache/coyote/http2/TestHttp2Section_5_1.java Mon Jun 8 17:57:05 2015 @@ -41,7 +41,7 @@ public class TestHttp2Section_5_1 extend Assert.assertTrue(output.getTrace(), output.getTrace().startsWith("0-Goaway-[2147483647]-[" + - ErrorCode.PROTOCOL_ERROR.getErrorCode() + "]-[")); + Error.PROTOCOL_ERROR.getCode() + "]-[")); } @@ -55,7 +55,7 @@ public class TestHttp2Section_5_1 extend Assert.assertTrue(output.getTrace(), output.getTrace().startsWith("0-Goaway-[2147483647]-[" + - ErrorCode.PROTOCOL_ERROR.getErrorCode() + "]-[")); + Error.PROTOCOL_ERROR.getCode() + "]-[")); } @@ -80,7 +80,7 @@ public class TestHttp2Section_5_1 extend Assert.assertTrue(output.getTrace(), output.getTrace().startsWith("0-Goaway-[2147483647]-[" + - ErrorCode.STREAM_CLOSED.getErrorCode() + "]-[")); + Error.STREAM_CLOSED.getCode() + "]-[")); } @@ -104,7 +104,7 @@ public class TestHttp2Section_5_1 extend writeFrame(frameHeader, headersPayload); // Send a rst - sendRst(3, ErrorCode.INTERNAL_ERROR.getErrorCode()); + sendRst(3, Error.INTERNAL_ERROR.getCode()); // Then try sending some data (which should fail) sendData(3, new byte[] {}); @@ -112,7 +112,7 @@ public class TestHttp2Section_5_1 extend Assert.assertTrue(output.getTrace(), output.getTrace().startsWith("0-Goaway-[2147483647]-[" + - ErrorCode.STREAM_CLOSED.getErrorCode() + "]-[")); + Error.STREAM_CLOSED.getCode() + "]-[")); } @@ -126,7 +126,7 @@ public class TestHttp2Section_5_1 extend Assert.assertTrue(output.getTrace(), output.getTrace().startsWith("0-Goaway-[2147483647]-[" + - ErrorCode.STREAM_CLOSED.getErrorCode() + "]-[")); + Error.STREAM_CLOSED.getCode() + "]-[")); } --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org