DO NOT REPLY [Bug 49595] Tomcat crashes in tcnative-1.dll frequently

2011-08-12 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=49595

--- Comment #7 from Hiroshi Shirosaki  2011-08-12 
07:11:32 UTC ---
Created attachment 27380
  --> https://issues.apache.org/bugzilla/attachment.cgi?id=27380
fix a issue of destroying a same socket more than one

While my ajax web application was accessed by two browsers at the same time,
tomcat sometimes crashed.

When tomcat crashes at apr_pollset_remove(), fd->desc.s is NULL in do_remove()
function of tomcat-native poll.c.
It seems that a socket has been already destroyed.

I checked which method calls destorySocket() of AprEndpoint.
At line 1261 destroySocket(addS[i]), a same socket was destroyed within a
second.

I commented out line 1261, tomcat works fine.

Before line 1261, Poll.add return value was APR_EBADF(= 9).

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 49595] Tomcat crashes in tcnative-1.dll frequently

2011-08-12 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=49595

--- Comment #8 from Hiroshi Shirosaki  2011-08-12 
07:15:32 UTC ---
Sorry. I mistake.
Attachment 27380 is for Bug 51620.

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn commit: r1156993 - in /tomcat/tc5.5.x/trunk: STATUS.txt connectors/juli/src/java/org/apache/juli/FileHandler.java container/webapps/docs/changelog.xml

2011-08-12 Thread markt
Author: markt
Date: Fri Aug 12 07:56:48 2011
New Revision: 1156993

URL: http://svn.apache.org/viewvc?rev=1156993&view=rev
Log:
Fix https://issues.apache.org/bugzilla/show_bug.cgi?id=51403
Avoid NPE in JULI FileHandler if formatter is misconfigured

Modified:
tomcat/tc5.5.x/trunk/STATUS.txt

tomcat/tc5.5.x/trunk/connectors/juli/src/java/org/apache/juli/FileHandler.java
tomcat/tc5.5.x/trunk/container/webapps/docs/changelog.xml

Modified: tomcat/tc5.5.x/trunk/STATUS.txt
URL: 
http://svn.apache.org/viewvc/tomcat/tc5.5.x/trunk/STATUS.txt?rev=1156993&r1=1156992&r2=1156993&view=diff
==
--- tomcat/tc5.5.x/trunk/STATUS.txt (original)
+++ tomcat/tc5.5.x/trunk/STATUS.txt Fri Aug 12 07:56:48 2011
@@ -77,12 +77,6 @@ PATCHES PROPOSED TO BACKPORT:
   +1: markt
   -1: 
   
-* https://issues.apache.org/bugzilla/show_bug.cgi?id=51403
-  Avoid NPE in JULI FileHandler if formatter is misconfigured
-  http://svn.apache.org/viewvc?rev=1137996&view=rev
-  +1: kkolinko, markt, kfujino
-  -1:
-
 * Fix https://issues.apache.org/bugzilla/show_bug.cgi?id=36362
   Handle tag files with attribute names that are not valid Java identifiers
   http://svn.apache.org/viewvc?rev=1138950&view=rev

Modified: 
tomcat/tc5.5.x/trunk/connectors/juli/src/java/org/apache/juli/FileHandler.java
URL: 
http://svn.apache.org/viewvc/tomcat/tc5.5.x/trunk/connectors/juli/src/java/org/apache/juli/FileHandler.java?rev=1156993&r1=1156992&r2=1156993&view=diff
==
--- 
tomcat/tc5.5.x/trunk/connectors/juli/src/java/org/apache/juli/FileHandler.java 
(original)
+++ 
tomcat/tc5.5.x/trunk/connectors/juli/src/java/org/apache/juli/FileHandler.java 
Fri Aug 12 07:56:48 2011
@@ -258,7 +258,8 @@ public class FileHandler
 try {
 setFormatter((Formatter) 
cl.loadClass(formatterName).newInstance());
 } catch (Exception e) {
-// Ignore
+// Ignore and fallback to defaults
+setFormatter(new SimpleFormatter());
 }
 } else {
 setFormatter(new SimpleFormatter());

Modified: tomcat/tc5.5.x/trunk/container/webapps/docs/changelog.xml
URL: 
http://svn.apache.org/viewvc/tomcat/tc5.5.x/trunk/container/webapps/docs/changelog.xml?rev=1156993&r1=1156992&r2=1156993&view=diff
==
--- tomcat/tc5.5.x/trunk/container/webapps/docs/changelog.xml (original)
+++ tomcat/tc5.5.x/trunk/container/webapps/docs/changelog.xml Fri Aug 12 
07:56:48 2011
@@ -59,7 +59,12 @@
 Fix CVE-2011-2204. Prevent user passwords appearing in log files if a
 runtime exception (e.g. OOME) occurs while creating a new user for a
 MemoryUserDatabase via JMX. (markt)
-  
+  
+  
+51403: Avoid NullPointerException in JULI FileHandler if
+formatter is misconfigured. (kkolinko)
+  
+
   
   
 



-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn commit: r1157000 - in /tomcat/tc5.5.x/trunk: ./ container/modules/cluster/src/share/org/apache/catalina/cluster/session/ container/modules/groupcom/src/share/org/apache/catalina/tribes/io/ contain

2011-08-12 Thread markt
Author: markt
Date: Fri Aug 12 08:13:09 2011
New Revision: 1157000

URL: http://svn.apache.org/viewvc?rev=1157000&view=rev
Log:
Fix https://issues.apache.org/bugzilla/show_bug.cgi?id=36362
Handle tag files with attribute names that are not valid Java identifiers

Modified:
tomcat/tc5.5.x/trunk/STATUS.txt

tomcat/tc5.5.x/trunk/container/modules/cluster/src/share/org/apache/catalina/cluster/session/ReplicationStream.java

tomcat/tc5.5.x/trunk/container/modules/groupcom/src/share/org/apache/catalina/tribes/io/ReplicationStream.java
tomcat/tc5.5.x/trunk/container/webapps/docs/changelog.xml

tomcat/tc5.5.x/trunk/jasper/src/share/org/apache/jasper/compiler/Generator.java

tomcat/tc5.5.x/trunk/jasper/src/share/org/apache/jasper/compiler/JspUtil.java

Modified: tomcat/tc5.5.x/trunk/STATUS.txt
URL: 
http://svn.apache.org/viewvc/tomcat/tc5.5.x/trunk/STATUS.txt?rev=1157000&r1=1156999&r2=1157000&view=diff
==
--- tomcat/tc5.5.x/trunk/STATUS.txt (original)
+++ tomcat/tc5.5.x/trunk/STATUS.txt Fri Aug 12 08:13:09 2011
@@ -77,15 +77,6 @@ PATCHES PROPOSED TO BACKPORT:
   +1: markt
   -1: 
   
-* Fix https://issues.apache.org/bugzilla/show_bug.cgi?id=36362
-  Handle tag files with attribute names that are not valid Java identifiers
-  http://svn.apache.org/viewvc?rev=1138950&view=rev
-  http://svn.apache.org/viewvc?rev=1138953&view=rev
-  http://svn.apache.org/viewvc?rev=1140693&view=rev
-  http://svn.apache.org/viewvc?rev=1142043&view=rev
-  +1: markt, kkolinko, kfujino
-  -1:
-
 * Multiple improvements to the Windows Installer
   - https://issues.apache.org/bugzilla/show_bug.cgi?id=33262
 Install monitor to auto-start for current user only rather than all users 
to

Modified: 
tomcat/tc5.5.x/trunk/container/modules/cluster/src/share/org/apache/catalina/cluster/session/ReplicationStream.java
URL: 
http://svn.apache.org/viewvc/tomcat/tc5.5.x/trunk/container/modules/cluster/src/share/org/apache/catalina/cluster/session/ReplicationStream.java?rev=1157000&r1=1156999&r2=1157000&view=diff
==
--- 
tomcat/tc5.5.x/trunk/container/modules/cluster/src/share/org/apache/catalina/cluster/session/ReplicationStream.java
 (original)
+++ 
tomcat/tc5.5.x/trunk/container/modules/cluster/src/share/org/apache/catalina/cluster/session/ReplicationStream.java
 Fri Aug 12 08:13:09 2011
@@ -22,6 +22,8 @@ import java.io.InputStream;
 import java.io.IOException;
 import java.io.ObjectInputStream;
 import java.io.ObjectStreamClass;
+import java.lang.reflect.Modifier;
+import java.lang.reflect.Proxy;
 
 /**
  * Custom subclass of ObjectInputStream that loads from the
@@ -86,6 +88,43 @@ public final class ReplicationStream ext
 }
 }
 
+/**
+ * ObjectInputStream.resolveProxyClass has some funky way of using 
+ * the incorrect class loader to resolve proxy classes, let's do it our 
way instead
+ */
+protected Class resolveProxyClass(String[] interfaces)
+throws IOException, ClassNotFoundException {
+
+ClassLoader latestLoader = classLoader;
+ClassLoader nonPublicLoader = null;
+boolean hasNonPublicInterface = false;
+
+// define proxy in class loader of non-public interface(s), if any
+Class[] classObjs = new Class[interfaces.length];
+for (int i = 0; i < interfaces.length; i++) {
+Class cl = this.findWebappClass(interfaces[i]);
+if (latestLoader == null) latestLoader = cl.getClassLoader();
+if ((cl.getModifiers() & Modifier.PUBLIC) == 0) {
+if (hasNonPublicInterface) {
+if (nonPublicLoader != cl.getClassLoader()) {
+throw new IllegalAccessError(
+"conflicting non-public interface class loaders");
+}
+} else {
+nonPublicLoader = cl.getClassLoader();
+hasNonPublicInterface = true;
+}
+}
+classObjs[i] = cl;
+}
+try {
+return Proxy.getProxyClass(hasNonPublicInterface ? nonPublicLoader
+: latestLoader, classObjs);
+} catch (IllegalArgumentException e) {
+throw new ClassNotFoundException(null, e);
+}
+}
+
 public Class findReplicationClass(String name)
 throws ClassNotFoundException, IOException {
 return Class.forName(name, false, getClass().getClassLoader());

Modified: 
tomcat/tc5.5.x/trunk/container/modules/groupcom/src/share/org/apache/catalina/tribes/io/ReplicationStream.java
URL: 
http://svn.apache.org/viewvc/tomcat/tc5.5.x/trunk/container/modules/groupcom/src/share/org/apache/catalina/tribes/io/ReplicationStream.java?rev=1157000&r1=1156999&r2=1157000&view=diff
==
--- 
tom

DO NOT REPLY [Bug 36362] missing check for Java reserved keywords in tag file processing

2011-08-12 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=36362

Mark Thomas  changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 Resolution||FIXED

--- Comment #9 from Mark Thomas  2011-08-12 08:13:26 UTC ---
This has been fixed in 5.5.x and will be included in 5.5.34 onwards.

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn commit: r1157004 - in /tomcat/tc5.5.x/trunk: STATUS.txt container/catalina/src/share/org/apache/catalina/security/SecurityConfig.java container/webapps/docs/changelog.xml

2011-08-12 Thread markt
Author: markt
Date: Fri Aug 12 08:21:32 2011
New Revision: 1157004

URL: http://svn.apache.org/viewvc?rev=1157004&view=rev
Log:
Fix https://issues.apache.org/bugzilla/show_bug.cgi?id=51473
Fix concatenation of values in SecurityConfig.setSecurityProperty() when the 
value provided by JRE is null.

Modified:
tomcat/tc5.5.x/trunk/STATUS.txt

tomcat/tc5.5.x/trunk/container/catalina/src/share/org/apache/catalina/security/SecurityConfig.java
tomcat/tc5.5.x/trunk/container/webapps/docs/changelog.xml

Modified: tomcat/tc5.5.x/trunk/STATUS.txt
URL: 
http://svn.apache.org/viewvc/tomcat/tc5.5.x/trunk/STATUS.txt?rev=1157004&r1=1157003&r2=1157004&view=diff
==
--- tomcat/tc5.5.x/trunk/STATUS.txt (original)
+++ tomcat/tc5.5.x/trunk/STATUS.txt Fri Aug 12 08:21:32 2011
@@ -102,13 +102,6 @@ PATCHES PROPOSED TO BACKPORT:
   +1: markt
   -1:
 
-* Fix https://issues.apache.org/bugzilla/show_bug.cgi?id=51473
-  Fix concatenation of values in SecurityConfig.setSecurityProperty()
-  when the value provided by JRE is null.
-  http://svn.apache.org/viewvc?rev=1142904&view=rev
-  +1: kkolinko, markt, kfujino
-  -1:
-
 * Fix https://issues.apache.org/bugzilla/show_bug.cgi?id=51324
   Improve handling of exceptions when flushing the response buffer to
   ensure that the doFlush flag does not get stuck in the enabled state.

Modified: 
tomcat/tc5.5.x/trunk/container/catalina/src/share/org/apache/catalina/security/SecurityConfig.java
URL: 
http://svn.apache.org/viewvc/tomcat/tc5.5.x/trunk/container/catalina/src/share/org/apache/catalina/security/SecurityConfig.java?rev=1157004&r1=1157003&r2=1157004&view=diff
==
--- 
tomcat/tc5.5.x/trunk/container/catalina/src/share/org/apache/catalina/security/SecurityConfig.java
 (original)
+++ 
tomcat/tc5.5.x/trunk/container/catalina/src/share/org/apache/catalina/security/SecurityConfig.java
 Fri Aug 12 08:21:32 2011
@@ -38,6 +38,8 @@ public final class SecurityConfig{
 + ",org.apache.coyote."
 + ",org.apache.tomcat.";
 
+// FIX ME package "javax." was removed to prevent HotSpot
+// fatal internal errors
 private final static String PACKAGE_DEFINITION= "java.,sun."
 + ",org.apache.catalina." 
 + ",org.apache.coyote."
@@ -116,13 +118,14 @@ public final class SecurityConfig{
 if (System.getSecurityManager() != null){
 String definition = Security.getProperty(properties);
 if( definition != null && definition.length() > 0 ){
-definition += ",";
+if (packageList.length() > 0) {
+definition = definition + ',' + packageList;
+}
+} else {
+definition = packageList;
 }
 
-Security.setProperty(properties,
-// FIX ME package "javax." was removed to prevent HotSpot
-// fatal internal errors
-definition + packageList);  
+Security.setProperty(properties, definition);  
 }
 }
 

Modified: tomcat/tc5.5.x/trunk/container/webapps/docs/changelog.xml
URL: 
http://svn.apache.org/viewvc/tomcat/tc5.5.x/trunk/container/webapps/docs/changelog.xml?rev=1157004&r1=1157003&r2=1157004&view=diff
==
--- tomcat/tc5.5.x/trunk/container/webapps/docs/changelog.xml (original)
+++ tomcat/tc5.5.x/trunk/container/webapps/docs/changelog.xml Fri Aug 12 
08:21:32 2011
@@ -64,6 +64,11 @@
 51403: Avoid NullPointerException in JULI FileHandler if
 formatter is misconfigured. (kkolinko)
   
+  
+51473: Fix concatenation of values in
+SecurityConfig.setSecurityProperty() when the value provided by JRE is
+null. (kkolinko)
+  
 
   
   



-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 51473] SecurityConfig,set "package.definition" security property to "nullsun.,java.,..."

2011-08-12 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=51473

Mark Thomas  changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 Resolution||FIXED

--- Comment #4 from Mark Thomas  2011-08-12 08:22:17 UTC ---
This has been fixed in 5.5.x and will be included in 5.5.34 onwards.

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn commit: r1157008 - in /tomcat/tc5.5.x/trunk: STATUS.txt container/catalina/src/share/org/apache/catalina/connector/OutputBuffer.java container/webapps/docs/changelog.xml

2011-08-12 Thread markt
Author: markt
Date: Fri Aug 12 08:29:13 2011
New Revision: 1157008

URL: http://svn.apache.org/viewvc?rev=1157008&view=rev
Log:
Fix https://issues.apache.org/bugzilla/show_bug.cgi?id=51324
Improve handling of exceptions when flushing the response buffer to ensure that 
the doFlush flag does not get stuck in the enabled state.
Patch by Jeremy Norris.

Modified:
tomcat/tc5.5.x/trunk/STATUS.txt

tomcat/tc5.5.x/trunk/container/catalina/src/share/org/apache/catalina/connector/OutputBuffer.java
tomcat/tc5.5.x/trunk/container/webapps/docs/changelog.xml

Modified: tomcat/tc5.5.x/trunk/STATUS.txt
URL: 
http://svn.apache.org/viewvc/tomcat/tc5.5.x/trunk/STATUS.txt?rev=1157008&r1=1157007&r2=1157008&view=diff
==
--- tomcat/tc5.5.x/trunk/STATUS.txt (original)
+++ tomcat/tc5.5.x/trunk/STATUS.txt Fri Aug 12 08:29:13 2011
@@ -102,14 +102,6 @@ PATCHES PROPOSED TO BACKPORT:
   +1: markt
   -1:
 
-* Fix https://issues.apache.org/bugzilla/show_bug.cgi?id=51324
-  Improve handling of exceptions when flushing the response buffer to
-  ensure that the doFlush flag does not get stuck in the enabled state.
-  Patch by Jeremy Norris.
-  http://svn.apache.org/viewvc?rev=1133014&view=rev
-  +1: kkolinko, markt, kfujino
-  -1:
-
 * Fix various sendfile issues. CVE-2011-2526
   This is a port of r1145380, r1145694 and r1146005
   http://people.apache.org/~markt/patches/2011-07-13-cve-2011-2526-tc5.patch

Modified: 
tomcat/tc5.5.x/trunk/container/catalina/src/share/org/apache/catalina/connector/OutputBuffer.java
URL: 
http://svn.apache.org/viewvc/tomcat/tc5.5.x/trunk/container/catalina/src/share/org/apache/catalina/connector/OutputBuffer.java?rev=1157008&r1=1157007&r2=1157008&view=diff
==
--- 
tomcat/tc5.5.x/trunk/container/catalina/src/share/org/apache/catalina/connector/OutputBuffer.java
 (original)
+++ 
tomcat/tc5.5.x/trunk/container/catalina/src/share/org/apache/catalina/connector/OutputBuffer.java
 Fri Aug 12 08:29:13 2011
@@ -237,6 +237,7 @@ public class OutputBuffer extends Writer
 cb.recycle();
 bb.recycle(); 
 closed = false;
+doFlush = false;
 suspended = false;
 
 if (conv!= null) {
@@ -315,19 +316,22 @@ public class OutputBuffer extends Writer
 return;
 
 doFlush = true;
-if (initial) {
-// If the buffers are empty, commit the response header
-coyoteResponse.sendHeaders();
-initial = false;
-}
-if (state == CHAR_STATE) {
-cb.flushBuffer();
-bb.flushBuffer();
-state = BYTE_STATE;
-} else if (state == BYTE_STATE) {
-bb.flushBuffer();
+try {
+if (initial) {
+// If the buffers are empty, commit the response header
+coyoteResponse.sendHeaders();
+initial = false;
+}
+if (state == CHAR_STATE) {
+cb.flushBuffer();
+bb.flushBuffer();
+state = BYTE_STATE;
+} else if (state == BYTE_STATE) {
+bb.flushBuffer();
+}
+} finally {
+doFlush = false;
 }
-doFlush = false;
 
 if (realFlush) {
 coyoteResponse.action(ActionCode.ACTION_CLIENT_FLUSH, 

Modified: tomcat/tc5.5.x/trunk/container/webapps/docs/changelog.xml
URL: 
http://svn.apache.org/viewvc/tomcat/tc5.5.x/trunk/container/webapps/docs/changelog.xml?rev=1157008&r1=1157007&r2=1157008&view=diff
==
--- tomcat/tc5.5.x/trunk/container/webapps/docs/changelog.xml (original)
+++ tomcat/tc5.5.x/trunk/container/webapps/docs/changelog.xml Fri Aug 12 
08:29:13 2011
@@ -61,6 +61,11 @@
 MemoryUserDatabase via JMX. (markt)
   
   
+51324: Improve handling of exceptions when flushing the
+response buffer to ensure that the doFlush flag does not get stuck in
+the enabled state. Patch provided by Jeremy Norris. (kkolinko)
+  
+  
 51403: Avoid NullPointerException in JULI FileHandler if
 formatter is misconfigured. (kkolinko)
   



-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn commit: r1157015 - /tomcat/trunk/webapps/docs/config/listeners.xml

2011-08-12 Thread markt
Author: markt
Date: Fri Aug 12 09:00:24 2011
New Revision: 1157015

URL: http://svn.apache.org/viewvc?rev=1157015&view=rev
Log:
Fix https://issues.apache.org/bugzilla/show_bug.cgi?id=51649
Document ThreadLocalLeakPreventionListener

Modified:
tomcat/trunk/webapps/docs/config/listeners.xml

Modified: tomcat/trunk/webapps/docs/config/listeners.xml
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/webapps/docs/config/listeners.xml?rev=1157015&r1=1157014&r2=1157015&view=diff
==
--- tomcat/trunk/webapps/docs/config/listeners.xml (original)
+++ tomcat/trunk/webapps/docs/config/listeners.xml Fri Aug 12 09:00:24 2011
@@ -292,6 +292,22 @@
 
   
 
+  
+
+The ThreadLocal Leak Prevention Listener triggers the
+renewal of threads in Executor pools when a
+Contextis being stopped to avoid thread-local
+related memory leaks. Active threads will be renewed one by one when they
+come back to the pool after executing their task.
+
+This listener must only be nested within Server
+elements.
+
+No additional attributes are supported by the ThreadLocal Leak
+Prevention Listener.
+
+  
+
 
 
 



-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn commit: r1157017 - in /tomcat/tc7.0.x/trunk: ./ webapps/docs/changelog.xml webapps/docs/config/listeners.xml

2011-08-12 Thread markt
Author: markt
Date: Fri Aug 12 09:03:22 2011
New Revision: 1157017

URL: http://svn.apache.org/viewvc?rev=1157017&view=rev
Log:
Fix https://issues.apache.org/bugzilla/show_bug.cgi?id=51649
Document ThreadLocalLeakPreventionListener

Modified:
tomcat/tc7.0.x/trunk/   (props changed)
tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml
tomcat/tc7.0.x/trunk/webapps/docs/config/listeners.xml

Propchange: tomcat/tc7.0.x/trunk/
--
--- svn:mergeinfo (original)
+++ svn:mergeinfo Fri Aug 12 09:03:22 2011
@@ -1 +1 @@
-/tomcat/trunk:1156171,1156276,1156304,1156530,1156602
+/tomcat/trunk:1156171,1156276,1156304,1156530,1156602,1157015

Modified: tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml
URL: 
http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml?rev=1157017&r1=1157016&r2=1157017&view=diff
==
--- tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml (original)
+++ tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml Fri Aug 12 09:03:22 2011
@@ -89,6 +89,14 @@
   
 
   
+  
+
+  
+51649: Update the documentation web application to include
+the ThreadLocal leak prevention listener. (markt)
+  
+
+  
 
 
   

Modified: tomcat/tc7.0.x/trunk/webapps/docs/config/listeners.xml
URL: 
http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/webapps/docs/config/listeners.xml?rev=1157017&r1=1157016&r2=1157017&view=diff
==
--- tomcat/tc7.0.x/trunk/webapps/docs/config/listeners.xml (original)
+++ tomcat/tc7.0.x/trunk/webapps/docs/config/listeners.xml Fri Aug 12 09:03:22 
2011
@@ -292,6 +292,22 @@
 
   
 
+  
+
+The ThreadLocal Leak Prevention Listener triggers the
+renewal of threads in Executor pools when a
+Contextis being stopped to avoid thread-local
+related memory leaks. Active threads will be renewed one by one when they
+come back to the pool after executing their task.
+
+This listener must only be nested within Server
+elements.
+
+No additional attributes are supported by the ThreadLocal Leak
+Prevention Listener.
+
+  
+
 
 
 



-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 51649] Web documentation about listeners should mention ThreadLocalLeakPreventionListener

2011-08-12 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=51649

Mark Thomas  changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 Resolution||FIXED

--- Comment #1 from Mark Thomas  2011-08-12 09:03:43 UTC ---
Fixed in trunk and 7.0.x and will be included in 7.0.21 onwards.

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn commit: r1157018 - /tomcat/trunk/java/org/apache/catalina/util/RequestUtil.java

2011-08-12 Thread markt
Author: markt
Date: Fri Aug 12 09:09:32 2011
New Revision: 1157018

URL: http://svn.apache.org/viewvc?rev=1157018&view=rev
Log:
Fix https://issues.apache.org/bugzilla/show_bug.cgi?id=51650
Code clean-up

Modified:
tomcat/trunk/java/org/apache/catalina/util/RequestUtil.java

Modified: tomcat/trunk/java/org/apache/catalina/util/RequestUtil.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/catalina/util/RequestUtil.java?rev=1157018&r1=1157017&r2=1157018&view=diff
==
--- tomcat/trunk/java/org/apache/catalina/util/RequestUtil.java (original)
+++ tomcat/trunk/java/org/apache/catalina/util/RequestUtil.java Fri Aug 12 
09:09:32 2011
@@ -174,8 +174,8 @@ public final class RequestUtil {
  *
  * @param map Map that accumulates the resulting parameters
  * @param data Input string containing request parameters
- * @param encoding The encoding to use; if null, the default encoding is
- * used. If an unsupported encoding is specified the parameters will not be
+ * @param encoding The encoding to use; encoding must not be null.
+ * If an unsupported encoding is specified the parameters will not be
  * parsed and the map will not be modified
  */
 public static void parseParameters(Map map, String data,
@@ -184,15 +184,10 @@ public final class RequestUtil {
 if ((data != null) && (data.length() > 0)) {
 
 // use the specified encoding to extract bytes out of the
-// given string so that the encoding is not lost. If an
-// encoding is not specified, let it use platform default
+// given string so that the encoding is not lost.
 byte[] bytes = null;
 try {
-if (encoding == null) {
-bytes = data.getBytes(Charset.defaultCharset());
-} else {
-bytes = data.getBytes(B2CConverter.getCharset(encoding));
-}
+bytes = data.getBytes(B2CConverter.getCharset(encoding));
 parseParameters(map, bytes, encoding);
 } catch (UnsupportedEncodingException uee) {
 if (log.isDebugEnabled()) {



-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn commit: r1157019 - in /tomcat/tc7.0.x/trunk: ./ java/org/apache/catalina/util/RequestUtil.java webapps/docs/changelog.xml

2011-08-12 Thread markt
Author: markt
Date: Fri Aug 12 09:11:35 2011
New Revision: 1157019

URL: http://svn.apache.org/viewvc?rev=1157019&view=rev
Log:
Fix https://issues.apache.org/bugzilla/show_bug.cgi?id=51650
Code clean-up
Patch provided by Felix Schumacher

Modified:
tomcat/tc7.0.x/trunk/   (props changed)
tomcat/tc7.0.x/trunk/java/org/apache/catalina/util/RequestUtil.java
tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml

Propchange: tomcat/tc7.0.x/trunk/
--
--- svn:mergeinfo (original)
+++ svn:mergeinfo Fri Aug 12 09:11:35 2011
@@ -1 +1 @@
-/tomcat/trunk:1156171,1156276,1156304,1156530,1156602,1157015
+/tomcat/trunk:1156171,1156276,1156304,1156530,1156602,1157015,1157018

Modified: tomcat/tc7.0.x/trunk/java/org/apache/catalina/util/RequestUtil.java
URL: 
http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/util/RequestUtil.java?rev=1157019&r1=1157018&r2=1157019&view=diff
==
--- tomcat/tc7.0.x/trunk/java/org/apache/catalina/util/RequestUtil.java 
(original)
+++ tomcat/tc7.0.x/trunk/java/org/apache/catalina/util/RequestUtil.java Fri Aug 
12 09:11:35 2011
@@ -174,8 +174,8 @@ public final class RequestUtil {
  *
  * @param map Map that accumulates the resulting parameters
  * @param data Input string containing request parameters
- * @param encoding The encoding to use; if null, the default encoding is
- * used. If an unsupported encoding is specified the parameters will not be
+ * @param encoding The encoding to use; encoding must not be null.
+ * If an unsupported encoding is specified the parameters will not be
  * parsed and the map will not be modified
  */
 public static void parseParameters(Map map, String data,
@@ -184,15 +184,10 @@ public final class RequestUtil {
 if ((data != null) && (data.length() > 0)) {
 
 // use the specified encoding to extract bytes out of the
-// given string so that the encoding is not lost. If an
-// encoding is not specified, let it use platform default
+// given string so that the encoding is not lost.
 byte[] bytes = null;
 try {
-if (encoding == null) {
-bytes = data.getBytes(Charset.defaultCharset());
-} else {
-bytes = data.getBytes(B2CConverter.getCharset(encoding));
-}
+bytes = data.getBytes(B2CConverter.getCharset(encoding));
 parseParameters(map, bytes, encoding);
 } catch (UnsupportedEncodingException uee) {
 if (log.isDebugEnabled()) {

Modified: tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml
URL: 
http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml?rev=1157019&r1=1157018&r2=1157019&view=diff
==
--- tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml (original)
+++ tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml Fri Aug 12 09:11:35 2011
@@ -71,6 +71,10 @@
   
 Unregisters MBean of DataSource when web application stops. (kfujino)
   
+  
+51650: Code clean-up. Patch provided by Felix Schumacher.
+(markt)
+  
 
   
   



-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 51650] possible nullpointer exception in RequestUtil.parseParameters

2011-08-12 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=51650

Mark Thomas  changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 Resolution||FIXED

--- Comment #3 from Mark Thomas  2011-08-12 09:11:57 UTC ---
Thanks for the patch. It has been applied to trunk and 7.0.x and will be
included in 7.0.21 onwards.

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 51652] Saxon JAR in the application's WEB-INF/lib will cause javax.xml.parsers.ParserConfigurationException: AElfred parser is namespace-aware

2011-08-12 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=51652

Mark Thomas  changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 Resolution||DUPLICATE
 OS/Version||All

--- Comment #1 from Mark Thomas  2011-08-12 09:14:55 UTC ---


*** This bug has been marked as a duplicate of bug 51395 ***

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 51395] First application that loads SAXParserFactory causes Class loader memory leak

2011-08-12 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=51395

Mark Thomas  changed:

   What|Removed |Added

 CC||v...@aviarc.com.au

--- Comment #4 from Mark Thomas  2011-08-12 09:14:55 UTC ---
*** Bug 51652 has been marked as a duplicate of this bug. ***

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[ANN] Apache Tomcat 7.0.20 released

2011-08-12 Thread Mark Thomas
The Apache Tomcat team announces the immediate availability of Apache
Tomcat 7.0.20

Apache Tomcat 7.0.20 includes bug fixes and the following new features
and fixes compared to version 7.0.19:
- JSP files with dependencies in JARs are no longer recompiled on every
access thereby improving performance.
- Update to version 1.1.22 of the native component of the AJP and HTTP
APR/native connectors.
- Update to Commons Daemon 1.0.7.
- Converted unit tests to JUnit 4.

Please refer to the change log for the complete list of changes:
http://tomcat.apache.org/tomcat-7.0-doc/changelog.html

Note that this version has 4 zip binaries: a generic one and three
bundled with Tomcat native binaries for Windows operating systems
running on different CPU architectures.

Downloads:
http://tomcat.apache.org/download-70.cgi

Migration guide from Apache Tomcat 5.5.x and 6.0.x:
http://tomcat.apache.org/migration.html

Thank you,

-- The Apache Tomcat Team








-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



Re: svn commit: r1157000 - in /tomcat/tc5.5.x/trunk: ./ container/modules/cluster/src/share/org/apache/catalina/cluster/session/ container/modules/groupcom/src/share/org/apache/catalina/tribes/io/ con

2011-08-12 Thread Rainer Jung
Hi Mark,

On 12.08.2011 10:13, ma...@apache.org wrote:
> Author: markt
> Date: Fri Aug 12 08:13:09 2011
> New Revision: 1157000
> 
> URL: http://svn.apache.org/viewvc?rev=1157000&view=rev
> Log:
> Fix https://issues.apache.org/bugzilla/show_bug.cgi?id=36362
> Handle tag files with attribute names that are not valid Java identifiers
> 
> Modified:
> tomcat/tc5.5.x/trunk/STATUS.txt
> 
> tomcat/tc5.5.x/trunk/container/modules/cluster/src/share/org/apache/catalina/cluster/session/ReplicationStream.java
> 
> tomcat/tc5.5.x/trunk/container/modules/groupcom/src/share/org/apache/catalina/tribes/io/ReplicationStream.java
> tomcat/tc5.5.x/trunk/container/webapps/docs/changelog.xml
> 
> tomcat/tc5.5.x/trunk/jasper/src/share/org/apache/jasper/compiler/Generator.java
> 
> tomcat/tc5.5.x/trunk/jasper/src/share/org/apache/jasper/compiler/JspUtil.java


> Modified: 
> tomcat/tc5.5.x/trunk/container/modules/cluster/src/share/org/apache/catalina/cluster/session/ReplicationStream.java
> URL: 
> http://svn.apache.org/viewvc/tomcat/tc5.5.x/trunk/container/modules/cluster/src/share/org/apache/catalina/cluster/session/ReplicationStream.java?rev=1157000&r1=1156999&r2=1157000&view=diff
> ==
> --- 
> tomcat/tc5.5.x/trunk/container/modules/cluster/src/share/org/apache/catalina/cluster/session/ReplicationStream.java
>  (original)
> +++ 
> tomcat/tc5.5.x/trunk/container/modules/cluster/src/share/org/apache/catalina/cluster/session/ReplicationStream.java
>  Fri Aug 12 08:13:09 2011


> Modified: 
> tomcat/tc5.5.x/trunk/container/modules/groupcom/src/share/org/apache/catalina/tribes/io/ReplicationStream.java
> URL: 
> http://svn.apache.org/viewvc/tomcat/tc5.5.x/trunk/container/modules/groupcom/src/share/org/apache/catalina/tribes/io/ReplicationStream.java?rev=1157000&r1=1156999&r2=1157000&view=diff
> ==
> --- 
> tomcat/tc5.5.x/trunk/container/modules/groupcom/src/share/org/apache/catalina/tribes/io/ReplicationStream.java
>  (original)
> +++ 
> tomcat/tc5.5.x/trunk/container/modules/groupcom/src/share/org/apache/catalina/tribes/io/ReplicationStream.java
>  Fri Aug 12 08:13:09 2011

It looks like you unintentionally also committed the fix for the
following STATUS item in addition to the fix for BZ36362:

 * Fix https://issues.apache.org/bugzilla/show_bug.cgi?id=51647
   Session replication fails with ClassNotFoundException when session
attribute
   is Java dynamic proxy
   https://issues.apache.org/bugzilla/attachment.cgi?id=27375
   +1: markt, kfujino

Regards,

Rainer

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 51654] New: NullPointerException in startup (org.apache.catalina.startup.HostConfig.filterAppPaths) due to missing app base

2011-08-12 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=51654

 Bug #: 51654
   Summary: NullPointerException in startup
(org.apache.catalina.startup.HostConfig.filterAppPaths
) due to missing app base
   Product: Tomcat 7
   Version: unspecified
  Platform: PC
OS/Version: Linux
Status: NEW
  Severity: normal
  Priority: P2
 Component: Catalina
AssignedTo: dev@tomcat.apache.org
ReportedBy: d.tonho...@m-plify.com
Classification: Unclassified


A hard-to-diagnose NullPointerException at startup which can be bettered with
an appropriate error message:

INFO: Starting Servlet Engine: Apache Tomcat/7.0.19
java.lang.NullPointerException
at org.apache.catalina.startup.HostConfig.filterAppPaths(HostConfig.java:493)
at org.apache.catalina.startup.HostConfig.deployApps(HostConfig.java:466)
at org.apache.catalina.startup.HostConfig.start(HostConfig.java:1322)
at org.apache.catalina.startup.HostConfig.lifecycleEvent(HostConfig.java:311)
at
org.apache.catalina.util.LifecycleSupport.fireLifecycleEvent(LifecycleSupport.java:119)
at
org.apache.catalina.util.LifecycleBase.fireLifecycleEvent(LifecycleBase.java:89)

Ok, what's this about?

In "protected String[] filterAppPaths(String[] unfilteredAppPaths)"
the exception is raised at

  for (String appPath : unfilteredAppPaths)

Which means the "unfilteredAppPaths" passed in is null. filterAppPaths does not
check for that (shouldn't there be an assertion at least)

The problems comes from "deployApps()":

protected void deployApps() {

File appBase = appBase();
File configBase = configBase();
String[] filteredAppPaths = filterAppPaths(appBase.list()); <
// Deploy XML descriptors from configBase
deployDescriptors(configBase, configBase.list());
// Deploy WARs, and loop if additional descriptors are found
deployWARs(appBase, filteredAppPaths);
// Deploy expanded folders
deployDirectories(appBase, filteredAppPaths);

}

Where "appBase.list()" returns null. This must be because "appBase" does not
actually denote a directory (A-HA!)

Indeed, the server.xml points to a nonexisting appBase.

Suggesting to add a check to "deployApps":

protected void deployApps() {

File appBase = appBase();
File configBase = configBase();

if (!appBase.exists() || appBase.list()==null) {
throw new IllegalArgumentException("The appBase " + appBase + "
does not exist or cannot be listed");
}

String[] filteredAppPaths = filterAppPaths(appBase.list()); <
// Deploy XML descriptors from configBase
deployDescriptors(configBase, configBase.list());
// Deploy WARs, and loop if additional descriptors are found
deployWARs(appBase, filteredAppPaths);
// Deploy expanded folders
deployDirectories(appBase, filteredAppPaths);

}

This probably violates some I18N requirement though.

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 51655] New: Index page does not say what native does

2011-08-12 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=51655

 Bug #: 51655
   Summary: Index page does not say what native does
   Product: Tomcat Native
   Version: unspecified
  Platform: PC
OS/Version: Windows XP
Status: NEW
  Severity: normal
  Priority: P2
 Component: Documentation
AssignedTo: dev@tomcat.apache.org
ReportedBy: s...@apache.org
Classification: Unclassified


The TC Native index page does not give any details of what it does or why/when
it should be used.

It would be helpful to add an overview of its purpose and functionality.

Also, there are no obvious links to the developer community or sources of help.

The title also reads oddly:

"The Apache Tomcat Native"

sounds like a person of Amerindian origin. It would be better as:


"The Apache Tomcat Native Library"

or

"Apache Tomcat Native Library"

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 51655] Index page does not say what native does

2011-08-12 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=51655

--- Comment #1 from Sebb  2011-08-12 11:12:15 UTC ---
By the index page, I mean:

http://tomcat.apache.org/native-doc/

which is what comes up first when searching for Tomcat Native.

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



Re: svn commit: r1157000 - in /tomcat/tc5.5.x/trunk: ./ container/modules/cluster/src/share/org/apache/catalina/cluster/session/ container/modules/groupcom/src/share/org/apache/catalina/tribes/io/ con

2011-08-12 Thread Mark Thomas
On 12/08/2011 11:29, Rainer Jung wrote:
> Hi Mark,
> 
> On 12.08.2011 10:13, ma...@apache.org wrote:
>> Author: markt
>> Date: Fri Aug 12 08:13:09 2011
>> New Revision: 1157000



> It looks like you unintentionally also committed the fix for the
> following STATUS item in addition to the fix for BZ36362:
> 
>  * Fix https://issues.apache.org/bugzilla/show_bug.cgi?id=51647
>Session replication fails with ClassNotFoundException when session
> attribute

Yep. I'll revert that shortly.

Mark

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[SECURITY] CVE-2011-2729: Commons Daemon fails to drop capabilities (Apache Tomcat)

2011-08-12 Thread Mark Thomas
CVE-2011-2729: Commons Daemon fails to drop capabilities (Apache Tomcat)

Severity: Important

Vendor:
The Apache Software Foundation

Versions Affected:
Tomcat 7.0.0 to 7.0.19
Tomcat 6.0.30 to 6.0.32
Tomcat 5.5.32 to 5.5.33

Description:
Due to a bug in the capabilities code, jsvc (the service wrapper for
Linux that is part of the Commons Daemon project) does not drop
capabilities allowing the application to access files and directories
owned by superuser. This vulnerability only applies if:
a) Tomcat is running on a Linux operating system
b) jsvc was compiled with libcap
c) -user parameter is used
The Tomcat versions above shipped with source files for jsvc that
included this vulnerability.

Mitigation:
Affected users of all versions can mitigate these vulnerabilities by
taking any of the following actions:
a) upgrade to jsvc 1.0.7 or later
b) do not use -user parameter to switch user
c) recompile the jsvc without libcap support
Updated jsvc source is included in Apache Tomcat 7.0.20 and will be
included in the next releases of Tomcat 6.0.x and 5.5.x. Updated source
can be obtained from the Apache Commons Daemon project.

Credit:
This issue was identified by Wilfried Weissmann.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn commit: r1157086 - in /tomcat/site/trunk: docs/security-5.html docs/security-6.html docs/security-7.html xdocs/security-5.xml xdocs/security-6.xml xdocs/security-7.xml

2011-08-12 Thread markt
Author: markt
Date: Fri Aug 12 13:09:21 2011
New Revision: 1157086

URL: http://svn.apache.org/viewvc?rev=1157086&view=rev
Log:
Update site for CVE-2011-2729

Modified:
tomcat/site/trunk/docs/security-5.html
tomcat/site/trunk/docs/security-6.html
tomcat/site/trunk/docs/security-7.html
tomcat/site/trunk/xdocs/security-5.xml
tomcat/site/trunk/xdocs/security-6.xml
tomcat/site/trunk/xdocs/security-7.xml

Modified: tomcat/site/trunk/docs/security-5.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-5.html?rev=1157086&r1=1157085&r2=1157086&view=diff
==
--- tomcat/site/trunk/docs/security-5.html (original)
+++ tomcat/site/trunk/docs/security-5.html Fri Aug 12 13:09:21 2011
@@ -390,6 +390,33 @@
 
 Affects: 5.5.0-5.5.33
 
+
+Important: Information disclosure
+   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2729"; 
rel="nofollow">CVE-2011-2729
+
+
+Due to a bug in the capabilities code, jsvc (the service wrapper for
+   Linux that is part of the Commons Daemon project) does not drop
+   capabilities allowing the application to access files and directories
+   owned by superuser. This vulnerability only occurs when all of the
+   following are true:
+   
+ Tomcat is running on a Linux operating system
+ jsvc was compiled with libcap
+ -user parameter is used
+   
+   Affected Tomcat versions shipped with source files for jsvc that 
included
+   this vulnerability.
+
+
+There is a http://people.apache.org/~markt/patches/2011-08-12-cve-2011-22729-tc5.patch";>
+   proposed patch for this issue.
+
+This was identified by Wilfried Weissmann on 20 July 2011 and made 
public
+   on 12 August 2011.
+
+Affects: 5.5.32-5.5.33
+
   
 
 

Modified: tomcat/site/trunk/docs/security-6.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-6.html?rev=1157086&r1=1157085&r2=1157086&view=diff
==
--- tomcat/site/trunk/docs/security-6.html (original)
+++ tomcat/site/trunk/docs/security-6.html Fri Aug 12 13:09:21 2011
@@ -387,6 +387,34 @@
 
 Affects: 6.0.0-6.0.32
 
+
+Important: Information disclosure
+   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2729"; 
rel="nofollow">CVE-2011-2729
+
+
+Due to a bug in the capabilities code, jsvc (the service wrapper for
+   Linux that is part of the Commons Daemon project) does not drop
+   capabilities allowing the application to access files and directories
+   owned by superuser. This vulnerability only occurs when all of the
+   following are true:
+   
+ Tomcat is running on a Linux operating system
+ jsvc was compiled with libcap
+ -user parameter is used
+   
+   Affected Tomcat versions shipped with source files for jsvc that 
included
+   this vulnerability.
+
+
+This was fixed in revision
+   http://svn.apache.org/viewvc?rev=1153824&view=rev";>
+   1153824.
+
+This was identified by Wilfried Weissmann on 20 July 2011 and made 
public
+   on 12 August 2011.
+
+Affects: 6.0.30-6.0.32
+
   
 
 

Modified: tomcat/site/trunk/docs/security-7.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-7.html?rev=1157086&r1=1157085&r2=1157086&view=diff
==
--- tomcat/site/trunk/docs/security-7.html (original)
+++ tomcat/site/trunk/docs/security-7.html Fri Aug 12 13:09:21 2011
@@ -215,6 +215,9 @@
 Apache Tomcat 7.x 
vulnerabilities
 
 
+Fixed in Apache Tomcat 7.0.20
+
+
 Fixed in Apache Tomcat 7.0.19
 
 
@@ -296,6 +299,62 @@
 
 
 
+
+
+
+
+Fixed in Apache Tomcat 7.0.20
+
+
+
+
+
+
+
+
+
+
+Important: Information disclosure
+   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2729"; 
rel="nofollow">CVE-2011-2729
+
+
+Due to a bug in the capabilities code, jsvc (the service wrapper for
+   Linux that is part of the Commons Daemon project) does not drop
+   capabilities allowing the application to access files and directories
+   owned by superuser. This vulnerability only occurs when all of the
+   following are true:
+   
+ Tomcat is running on a Linux operating system
+ jsvc was compiled with libcap
+ -user parameter is used
+   
+   Affected Tomcat versions shipped with source files for jsvc that 
included
+   this vulnerability.
+
+
+This was fixed in revision
+   http://svn.apache.org/viewvc?rev=1153379&view=rev";>
+   1153379.
+
+This was identified by Wilfried Weissmann on 20 July 2011 and made 
public
+   on 12 August 2011.
+
+Affects: 7.0.0-7.0.19
+  
+  
+
+
+
+
+
+
+
+
+
+
+
+
+
 
 
 

Modified: tomcat/site/trunk/xdocs/security-5.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site

[SECURITY] CVE-2011-2481: Apache Tomcat information disclosure vulnerability

2011-08-12 Thread Mark Thomas
CVE-2011-2481: Apache Tomcat information disclosure vulnerability

Severity: low

Vendor:
The Apache Software Foundation

Versions Affected:
Tomcat 7.0.0 to 7.0.16
Previous versions are not affected.

Description:
The re-factoring of XML validation for Tomcat 7.0.x re-introduced the
vulnerability previously reported as CVE-2009-0783. This was initially
reported as a memory leak
(https://issues.apache.org/bugzilla/show_bug.cgi?id=51395). If a web
application is the first web
application loaded, this bug allows that web application to potentially
view and/or alter the web.xml, context.xml and tld files of other web
applications deployed on the Tomcat instance.

Mitigation:
7.0.x users should upgrade to 7.0.17 or later

Example:
See https://issues.apache.org/bugzilla/show_bug.cgi?id=29936#c12 for an
example web application that can be used to replace the XML parser used
by Tomcat.

Credit:
The security implications of bug 51395 were identified by the Tomcat
security team.

References:
http://tomcat.apache.org/security.html
http://tomcat.apache.org/security-7.html

The Apache Tomcat Security Team

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn commit: r1157093 - in /tomcat/site/trunk: docs/security-7.html xdocs/security-7.xml

2011-08-12 Thread markt
Author: markt
Date: Fri Aug 12 13:19:44 2011
New Revision: 1157093

URL: http://svn.apache.org/viewvc?rev=1157093&view=rev
Log:
Update site for CVE-2011-2481

Modified:
tomcat/site/trunk/docs/security-7.html
tomcat/site/trunk/xdocs/security-7.xml

Modified: tomcat/site/trunk/docs/security-7.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-7.html?rev=1157093&r1=1157092&r2=1157093&view=diff
==
--- tomcat/site/trunk/docs/security-7.html (original)
+++ tomcat/site/trunk/docs/security-7.html Fri Aug 12 13:19:44 2011
@@ -415,11 +415,11 @@
 Affects: 7.0.0-7.0.18
   
 
-Note: The issue below was fixed in Apache Tomcat 7.0.17 but the
+Note: The issues below were fixed in Apache Tomcat 7.0.17 but the
release votes for the 7.0.17 and 7.0.18 release candidates did not pass.
Therefore, although users must download 7.0.19 to obtain a version that
-   includes a fix for this issue, versions 7.0.17 and 7.0.18 is not 
included
-   in the list of affected versions.
+   includes a fix for these issues, versions 7.0.17 and 7.0.18 are not
+   included in the list of affected versions.
 
 
 
@@ -445,6 +445,31 @@
 
 Affects: 7.0.0-7.0.16
   
+
+Low: Information disclosure
+   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2481"; 
rel="nofollow">CVE-2011-2481
+
+
+The re-factoring of XML validation for Tomcat 7.0.x re-introduced the
+   vulnerability previously reported as
+   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0783"; 
rel="nofollow">CVE-2009-0783. This was initially
+   https://issues.apache.org/bugzilla/show_bug.cgi?id=51395";>
+   reported as a memory leak. If a web application is the first web
+   application loaded, this bugs allows that web application to potentially
+   view and/or alter the web.xml, context.xml and tld files of other web
+   applications deployed on the Tomcat instance.
+
+This was fixed in
+   http://svn.apache.org/viewvc?rev=1137753&view=rev";>
+   revision 1137753 and
+   http://svn.apache.org/viewvc?rev=1138788&view=rev";>
+   revision 1138788 and .
+
+This was identified by the Tomcat security team on 20 June 2011 and
+   made public on 12 August 2011.
+
+Affects: 7.0.0-7.0.16
+  
   
 
 

Modified: tomcat/site/trunk/xdocs/security-7.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-7.xml?rev=1157093&r1=1157092&r2=1157093&view=diff
==
--- tomcat/site/trunk/xdocs/security-7.xml (original)
+++ tomcat/site/trunk/xdocs/security-7.xml Fri Aug 12 13:19:44 2011
@@ -102,11 +102,11 @@
 
 Affects: 7.0.0-7.0.18
   
-Note: The issue below was fixed in Apache Tomcat 7.0.17 but the
+Note: The issues below were fixed in Apache Tomcat 7.0.17 but the
release votes for the 7.0.17 and 7.0.18 release candidates did not pass.
Therefore, although users must download 7.0.19 to obtain a version that
-   includes a fix for this issue, versions 7.0.17 and 7.0.18 is not 
included
-   in the list of affected versions.
+   includes a fix for these issues, versions 7.0.17 and 7.0.18 are not
+   included in the list of affected versions.
 
 Low: Information disclosure
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2204";
@@ -130,6 +130,31 @@
 
 Affects: 7.0.0-7.0.16
   
+Low: Information disclosure
+   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2481";
+   rel="nofollow">CVE-2011-2481
+
+The re-factoring of XML validation for Tomcat 7.0.x re-introduced the
+   vulnerability previously reported as
+   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0783";
+   rel="nofollow">CVE-2009-0783. This was initially
+   https://issues.apache.org/bugzilla/show_bug.cgi?id=51395";>
+   reported as a memory leak. If a web application is the first web
+   application loaded, this bugs allows that web application to potentially
+   view and/or alter the web.xml, context.xml and tld files of other web
+   applications deployed on the Tomcat instance.
+
+This was fixed in
+   http://svn.apache.org/viewvc?rev=1137753&view=rev";>
+   revision 1137753 and
+   http://svn.apache.org/viewvc?rev=1138788&view=rev";>
+   revision 1138788 and .
+
+This was identified by the Tomcat security team on 20 June 2011 and
+   made public on 12 August 2011.
+
+Affects: 7.0.0-7.0.16
+  
   
 
   



-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn propchange: r1153379 - svn:log

2011-08-12 Thread markt
Author: markt
Revision: 1153379
Modified property: svn:log

Modified: svn:log at Fri Aug 12 13:21:55 2011
--
--- svn:log (original)
+++ svn:log Fri Aug 12 13:21:55 2011
@@ -1 +1,2 @@
 Update to daemon 1.0.7
+This fixes CVE-2011-2729


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn propchange: r1137753 - svn:log

2011-08-12 Thread markt
Author: markt
Revision: 1137753
Modified property: svn:log

Modified: svn:log at Fri Aug 12 13:22:58 2011
--
--- svn:log (original)
+++ svn:log Fri Aug 12 13:22:58 2011
@@ -1,2 +1,3 @@
 Fix https://issues.apache.org/bugzilla/show_bug.cgi?id=51395
 Fix memory leak triggered when an application that includes a SAXParserFactory 
is the first web application to be loaded.
+Fix part 1 of 2 for CVE-2011-2481


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn propchange: r1138788 - svn:log

2011-08-12 Thread markt
Author: markt
Revision: 1138788
Modified property: svn:log

Modified: svn:log at Fri Aug 12 13:23:23 2011
--
--- svn:log (original)
+++ svn:log Fri Aug 12 13:23:23 2011
@@ -1,2 +1,3 @@
 Fix https://issues.apache.org/bugzilla/show_bug.cgi?id=51395
 Better fix for memory leak that aligns ContextConfig with TldConfig
+Fix part 2 of 2 for CVE-2011-2481


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



Re: Tomcat 6.0.33 ?

2011-08-12 Thread Petr Sumbera


Jean-frederic Clere-3 wrote:
> 
> On 07/27/2011 07:07 PM, Mark Thomas wrote:
>> On 27/07/2011 17:31, Henri Gomez wrote:
>>> Hi guys,
>>>
>>> We're stuck with Tomcat 6.0.32 with this bug
>>> (https://issues.apache.org/bugzilla/show_bug.cgi?id=50189).
>>> Did there is any date for 6.0.33 release ?
>>
>> Any committer can roll a release. Last time I checked, you were a
>> committer.
> 
> Well I can do a release... Next week.
> 

Any update on this?

Thanks,

Petr
-- 
View this message in context: 
http://old.nabble.com/Tomcat-6.0.33---tp32149462p32250168.html
Sent from the Tomcat - Dev mailing list archive at Nabble.com.


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn propchange: r1153824 - svn:log

2011-08-12 Thread markt
Author: markt
Revision: 1153824
Modified property: svn:log

Modified: svn:log at Fri Aug 12 13:24:23 2011
--
--- svn:log (original)
+++ svn:log Fri Aug 12 13:24:23 2011
@@ -1,2 +1,3 @@
 * Update to Apache Commons Daemon 1.0.7
 * Use two alternative download locations for components downloaded from 
apache.org.
+This is the fix for CVE-2011-2729


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn commit: r1157107 - in /tomcat/tc5.5.x/trunk/container/modules: cluster/src/share/org/apache/catalina/cluster/session/ReplicationStream.java groupcom/src/share/org/apache/catalina/tribes/io/Replica

2011-08-12 Thread markt
Author: markt
Date: Fri Aug 12 13:47:10 2011
New Revision: 1157107

URL: http://svn.apache.org/viewvc?rev=1157107&view=rev
Log:
Undo accidental changes included in 1157000

Modified:

tomcat/tc5.5.x/trunk/container/modules/cluster/src/share/org/apache/catalina/cluster/session/ReplicationStream.java

tomcat/tc5.5.x/trunk/container/modules/groupcom/src/share/org/apache/catalina/tribes/io/ReplicationStream.java

Modified: 
tomcat/tc5.5.x/trunk/container/modules/cluster/src/share/org/apache/catalina/cluster/session/ReplicationStream.java
URL: 
http://svn.apache.org/viewvc/tomcat/tc5.5.x/trunk/container/modules/cluster/src/share/org/apache/catalina/cluster/session/ReplicationStream.java?rev=1157107&r1=1157106&r2=1157107&view=diff
==
--- 
tomcat/tc5.5.x/trunk/container/modules/cluster/src/share/org/apache/catalina/cluster/session/ReplicationStream.java
 (original)
+++ 
tomcat/tc5.5.x/trunk/container/modules/cluster/src/share/org/apache/catalina/cluster/session/ReplicationStream.java
 Fri Aug 12 13:47:10 2011
@@ -22,8 +22,6 @@ import java.io.InputStream;
 import java.io.IOException;
 import java.io.ObjectInputStream;
 import java.io.ObjectStreamClass;
-import java.lang.reflect.Modifier;
-import java.lang.reflect.Proxy;
 
 /**
  * Custom subclass of ObjectInputStream that loads from the
@@ -88,43 +86,6 @@ public final class ReplicationStream ext
 }
 }
 
-/**
- * ObjectInputStream.resolveProxyClass has some funky way of using 
- * the incorrect class loader to resolve proxy classes, let's do it our 
way instead
- */
-protected Class resolveProxyClass(String[] interfaces)
-throws IOException, ClassNotFoundException {
-
-ClassLoader latestLoader = classLoader;
-ClassLoader nonPublicLoader = null;
-boolean hasNonPublicInterface = false;
-
-// define proxy in class loader of non-public interface(s), if any
-Class[] classObjs = new Class[interfaces.length];
-for (int i = 0; i < interfaces.length; i++) {
-Class cl = this.findWebappClass(interfaces[i]);
-if (latestLoader == null) latestLoader = cl.getClassLoader();
-if ((cl.getModifiers() & Modifier.PUBLIC) == 0) {
-if (hasNonPublicInterface) {
-if (nonPublicLoader != cl.getClassLoader()) {
-throw new IllegalAccessError(
-"conflicting non-public interface class loaders");
-}
-} else {
-nonPublicLoader = cl.getClassLoader();
-hasNonPublicInterface = true;
-}
-}
-classObjs[i] = cl;
-}
-try {
-return Proxy.getProxyClass(hasNonPublicInterface ? nonPublicLoader
-: latestLoader, classObjs);
-} catch (IllegalArgumentException e) {
-throw new ClassNotFoundException(null, e);
-}
-}
-
 public Class findReplicationClass(String name)
 throws ClassNotFoundException, IOException {
 return Class.forName(name, false, getClass().getClassLoader());

Modified: 
tomcat/tc5.5.x/trunk/container/modules/groupcom/src/share/org/apache/catalina/tribes/io/ReplicationStream.java
URL: 
http://svn.apache.org/viewvc/tomcat/tc5.5.x/trunk/container/modules/groupcom/src/share/org/apache/catalina/tribes/io/ReplicationStream.java?rev=1157107&r1=1157106&r2=1157107&view=diff
==
--- 
tomcat/tc5.5.x/trunk/container/modules/groupcom/src/share/org/apache/catalina/tribes/io/ReplicationStream.java
 (original)
+++ 
tomcat/tc5.5.x/trunk/container/modules/groupcom/src/share/org/apache/catalina/tribes/io/ReplicationStream.java
 Fri Aug 12 13:47:10 2011
@@ -22,8 +22,6 @@ import java.io.IOException;
 import java.io.InputStream;
 import java.io.ObjectInputStream;
 import java.io.ObjectStreamClass;
-import java.lang.reflect.Modifier;
-import java.lang.reflect.Proxy;
 
 /**
  * Custom subclass of ObjectInputStream that loads from the
@@ -73,68 +71,23 @@ public final class ReplicationStream ext
 public Class resolveClass(ObjectStreamClass classDesc)
 throws ClassNotFoundException, IOException {
 String name = classDesc.getName();
+boolean tryRepFirst = name.startsWith("org.apache.catalina.tribes");
 try {
-return resolveClass(name);
+try
+{
+if ( tryRepFirst ) return findReplicationClass(name);
+else return findExternalClass(name);
+}
+catch ( Exception x )
+{
+if ( tryRepFirst ) return findExternalClass(name);
+else return findReplicationClass(name);
+}
 } catch (ClassNotFoundException e) {
 return super.resolveClass(classDesc);
  

DO NOT REPLY [Bug 51582] NPE in SlowQueryReport

2011-08-12 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=51582

--- Comment #1 from Patric Rufflar  2011-08-12 14:10:40 UTC 
---
Another one:

java.lang.NullPointerException
at
org.apache.tomcat.jdbc.pool.interceptor.SlowQueryReport.reportFailedQuery(SlowQueryReport.java:86)
at
org.apache.tomcat.jdbc.pool.interceptor.SlowQueryReportJmx.reportFailedQuery(SlowQueryReportJmx.java:147)
at
org.apache.tomcat.jdbc.pool.interceptor.AbstractQueryReport$StatementProxy.invoke(AbstractQueryReport.java:236)
at $Proxy7.executeQuery(Unknown Source)

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 51582] NPE in SlowQueryReport

2011-08-12 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=51582

--- Comment #2 from Patric Rufflar  2011-08-12 14:15:43 UTC 
---
Both exceptions seems to be caused due to race conditions (one thread is
executing a statement, while another one is canceling it and possibly closing
the ProxyConnection)

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 51656] New: NullPointerException in host-manager application (in javax.servlet.GenericServlet.getServletContext during logging)

2011-08-12 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=51656

 Bug #: 51656
   Summary: NullPointerException in host-manager application (in
javax.servlet.GenericServlet.getServletContext during
logging)
   Product: Tomcat 7
   Version: 7.0.19
  Platform: PC
OS/Version: Linux
Status: NEW
  Severity: normal
  Priority: P2
 Component: Catalina
AssignedTo: dev@tomcat.apache.org
ReportedBy: d.tonho...@m-plify.com
Classification: Unclassified


Starting the host application of Tomcat 7.0.19 gives an NPE

(Dammit this description window is too narrow...)

java.lang.NullPointerException
at javax.servlet.GenericServlet.getServletContext(GenericServlet.java:125)
at javax.servlet.GenericServlet.log(GenericServlet.java:190)
at org.apache.catalina.manager.host.
   HTMLHostManagerServlet.list(HTMLHostManagerServlet.java:234)
at org.apache.catalina.manager.host.
   HTMLHostManagerServlet.doGet(HTMLHostManagerServlet.java:106)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:621)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:722)
at org.apache.catalina.core.
   ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:304)
at org.apache.catalina.core.
   ApplicationFilterChain.doFilter(ApplicationFilterChain.java:210)
at org.apache.catalina.filters.
   CsrfPreventionFilter.doFilter(CsrfPreventionFilter.java:187)
at org.apache.catalina.core.
   ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:243)
at org.apache.catalina.core.
   ApplicationFilterChain.doFilter(ApplicationFilterChain.java:210)
at org.apache.catalina.core.
   StandardWrapperValve.invoke(StandardWrapperValve.java:224)
at org.apache.catalina.core.
   StandardContextValve.invoke(StandardContextValve.java:175)
at org.apache.catalina.authenticator.
   AuthenticatorBase.invoke(AuthenticatorBase.java:572)
at org.apache.catalina.core.
   StandardHostValve.invoke(StandardHostValve.java:164)
at org.apache.catalina.valves.
   ErrorReportValve.invoke(ErrorReportValve.java:100)
at org.apache.catalina.core.
   StandardEngineValve.invoke(StandardEngineValve.java:118)
at org.apache.catalina.valves.
   AccessLogValve.invoke(AccessLogValve.java:851)
at org.apache.catalina.connector.
   CoyoteAdapter.service(CoyoteAdapter.java:405)
at org.apache.coyote.http11.
   Http11Processor.process(Http11Processor.java:278)
at org.apache.coyote.
  
AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:515)
at org.apache.tomcat.util.net.
   JIoEndpoint$SocketProcessor.run(JIoEndpoint.java:302)
at java.util.concurrent.
   ThreadPoolExecutor$Worker.runTask(ThreadPoolExecutor.java:886)
at java.util.concurrent.
   ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:908)
at java.lang.Thread.run(Thread.java:662)

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



Re: Tomcat 6.0.33 ?

2011-08-12 Thread jean-frederic clere

On 08/12/2011 03:23 PM, Petr Sumbera wrote:



Jean-frederic Clere-3 wrote:


On 07/27/2011 07:07 PM, Mark Thomas wrote:

On 27/07/2011 17:31, Henri Gomez wrote:

Hi guys,

We're stuck with Tomcat 6.0.32 with this bug
(https://issues.apache.org/bugzilla/show_bug.cgi?id=50189).
Did there is any date for 6.0.33 release ?


Any committer can roll a release. Last time I checked, you were a
committer.


Well I can do a release... Next week.



Any update on this?


I will do that on Monday... Sorry too busy before.

Cheers

Jean-Frederic

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn commit: r1157151 - in /tomcat/trunk/java/org/apache/coyote/http11: AbstractInputBuffer.java InternalInputBuffer.java

2011-08-12 Thread markt
Author: markt
Date: Fri Aug 12 15:17:50 2011
New Revision: 1157151

URL: http://svn.apache.org/viewvc?rev=1157151&view=rev
Log:
Push down inputStream as it is only used by BIO

Modified:
tomcat/trunk/java/org/apache/coyote/http11/AbstractInputBuffer.java
tomcat/trunk/java/org/apache/coyote/http11/InternalInputBuffer.java

Modified: tomcat/trunk/java/org/apache/coyote/http11/AbstractInputBuffer.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/coyote/http11/AbstractInputBuffer.java?rev=1157151&r1=1157150&r2=1157151&view=diff
==
--- tomcat/trunk/java/org/apache/coyote/http11/AbstractInputBuffer.java 
(original)
+++ tomcat/trunk/java/org/apache/coyote/http11/AbstractInputBuffer.java Fri Aug 
12 15:17:50 2011
@@ -17,7 +17,6 @@
 package org.apache.coyote.http11;
 
 import java.io.IOException;
-import java.io.InputStream;
 
 import org.apache.coyote.InputBuffer;
 import org.apache.coyote.Request;
@@ -137,12 +136,6 @@ public abstract class AbstractInputBuffe
 
 
 /**
- * Underlying input stream.
- */
-protected InputStream inputStream;
-
-
-/**
  * Underlying input buffer.
  */
 protected InputBuffer inputStreamInputBuffer;
@@ -171,28 +164,6 @@ public abstract class AbstractInputBuffe
 
 
 /**
- * Set the underlying socket input stream.
- */
-public void setInputStream(InputStream inputStream) {
-
-// FIXME: Check for null ?
-
-this.inputStream = inputStream;
-
-}
-
-
-/**
- * Get the underlying socket input stream.
- */
-public InputStream getInputStream() {
-
-return inputStream;
-
-}
-
-
-/**
  * Add an input filter to the filter library.
  */
 public void addFilter(InputFilter filter) {
@@ -271,7 +242,6 @@ public abstract class AbstractInputBuffe
 // Recycle Request object
 request.recycle();
 
-inputStream = null;
 lastValid = 0;
 pos = 0;
 lastActiveFilter = -1;

Modified: tomcat/trunk/java/org/apache/coyote/http11/InternalInputBuffer.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/coyote/http11/InternalInputBuffer.java?rev=1157151&r1=1157150&r2=1157151&view=diff
==
--- tomcat/trunk/java/org/apache/coyote/http11/InternalInputBuffer.java 
(original)
+++ tomcat/trunk/java/org/apache/coyote/http11/InternalInputBuffer.java Fri Aug 
12 15:17:50 2011
@@ -18,6 +18,7 @@ package org.apache.coyote.http11;
 
 import java.io.EOFException;
 import java.io.IOException;
+import java.io.InputStream;
 import java.nio.charset.Charset;
 
 import org.apache.coyote.InputBuffer;
@@ -39,6 +40,12 @@ public class InternalInputBuffer extends
 
 
 /**
+ * Underlying input stream.
+ */
+protected InputStream inputStream;
+
+
+/**
  * Default constructor.
  */
 public InternalInputBuffer(Request request, int headerBufferSize) {
@@ -59,6 +66,29 @@ public class InternalInputBuffer extends
 
 }
 
+
+/**
+ * Set the underlying socket input stream.
+ */
+public void setInputStream(InputStream inputStream) {
+
+// FIXME: Check for null ?
+
+this.inputStream = inputStream;
+
+}
+
+
+/**
+ * Get the underlying socket input stream.
+ */
+public InputStream getInputStream() {
+
+return inputStream;
+
+}
+
+
 /**
  * Read the request line. This function is meant to be used during the 
  * HTTP request header parsing. Do NOT attempt to read the request body 
@@ -428,6 +458,13 @@ public class InternalInputBuffer extends
 }
 
 
+@Override
+public void recycle() {
+super.recycle();
+inputStream = null;
+}
+
+
 // -- Protected Methods
 
 



-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



Re: svn commit: r1157151 - in /tomcat/trunk/java/org/apache/coyote/http11: AbstractInputBuffer.java InternalInputBuffer.java

2011-08-12 Thread Christopher Schultz
Mark,

On 8/12/2011 11:17 AM, ma...@apache.org wrote:
> +@Override
> +public void recycle() {
> +super.recycle();
> +inputStream = null;
> +}

If inputStream != null, should it be close()d? Or is this a shared
reference for which that kind of thing isn't appropriate? Or do we just
let the GC take care of that?

-chris



signature.asc
Description: OpenPGP digital signature


svn commit: r1157161 - /tomcat/trunk/modules/jdbc-pool/sign.sh

2011-08-12 Thread fhanik
Author: fhanik
Date: Fri Aug 12 15:40:01 2011
New Revision: 1157161

URL: http://svn.apache.org/viewvc?rev=1157161&view=rev
Log:
remove file not needed anymore

Removed:
tomcat/trunk/modules/jdbc-pool/sign.sh


-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



Re: DO NOT REPLY [Bug 51656] New: NullPointerException in host-manager application (in javax.servlet.GenericServlet.getServletContext during logging)

2011-08-12 Thread sebb
On 12 August 2011 15:34,   wrote:
> https://issues.apache.org/bugzilla/show_bug.cgi?id=51656
>
> (Dammit this description window is too narrow...)

Just drag the bottom rh corner (indicated by small dots) ...

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn commit: r1157198 - in /tomcat/trunk/java/org/apache/coyote/http11: AbstractInputBuffer.java Http11AprProcessor.java Http11NioProcessor.java Http11Processor.java InternalAprInputBuffer.java Interna

2011-08-12 Thread markt
Author: markt
Date: Fri Aug 12 17:59:22 2011
New Revision: 1157198

URL: http://svn.apache.org/viewvc?rev=1157198&view=rev
Log:
Align InputBuffer initialisation across the connectors
Remove unused code
Reduce visibility of properties and methods

Modified:
tomcat/trunk/java/org/apache/coyote/http11/AbstractInputBuffer.java
tomcat/trunk/java/org/apache/coyote/http11/Http11AprProcessor.java
tomcat/trunk/java/org/apache/coyote/http11/Http11NioProcessor.java
tomcat/trunk/java/org/apache/coyote/http11/Http11Processor.java
tomcat/trunk/java/org/apache/coyote/http11/InternalAprInputBuffer.java
tomcat/trunk/java/org/apache/coyote/http11/InternalInputBuffer.java
tomcat/trunk/java/org/apache/coyote/http11/InternalNioInputBuffer.java

Modified: tomcat/trunk/java/org/apache/coyote/http11/AbstractInputBuffer.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/coyote/http11/AbstractInputBuffer.java?rev=1157198&r1=1157197&r2=1157198&view=diff
==
--- tomcat/trunk/java/org/apache/coyote/http11/AbstractInputBuffer.java 
(original)
+++ tomcat/trunk/java/org/apache/coyote/http11/AbstractInputBuffer.java Fri Aug 
12 17:59:22 2011
@@ -22,9 +22,11 @@ import org.apache.coyote.InputBuffer;
 import org.apache.coyote.Request;
 import org.apache.tomcat.util.buf.ByteChunk;
 import org.apache.tomcat.util.http.MimeHeaders;
+import org.apache.tomcat.util.net.AbstractEndpoint;
+import org.apache.tomcat.util.net.SocketWrapper;
 import org.apache.tomcat.util.res.StringManager;
 
-public abstract class AbstractInputBuffer implements InputBuffer{
+public abstract class AbstractInputBuffer implements InputBuffer{
 
 protected static final boolean[] HTTP_TOKEN_CHAR = new boolean[128];
 
@@ -223,12 +225,16 @@ public abstract class AbstractInputBuffe
 }
 
 
-public abstract boolean parseRequestLine(boolean useAvailableDataOnly) 
throws IOException;
+public abstract boolean parseRequestLine(boolean useAvailableDataOnly)
+throws IOException;
 
 public abstract boolean parseHeaders() throws IOException;
 
 protected abstract boolean fill(boolean block) throws IOException; 
 
+protected abstract void init(SocketWrapper socketWrapper,
+AbstractEndpoint endpoint) throws IOException;
+
 
 // - Public Methods
 

Modified: tomcat/trunk/java/org/apache/coyote/http11/Http11AprProcessor.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/coyote/http11/Http11AprProcessor.java?rev=1157198&r1=1157197&r2=1157198&view=diff
==
--- tomcat/trunk/java/org/apache/coyote/http11/Http11AprProcessor.java 
(original)
+++ tomcat/trunk/java/org/apache/coyote/http11/Http11AprProcessor.java Fri Aug 
12 17:59:22 2011
@@ -174,8 +174,8 @@ public class Http11AprProcessor extends 
 
 // Setting up the socket
 this.socket = socketWrapper;
+inputBuffer.init(socketWrapper, endpoint);
 long socketRef = socketWrapper.getSocket().longValue();
-inputBuffer.setSocket(socketRef);
 outputBuffer.setSocket(socketRef);
 
 // Error flag
@@ -619,7 +619,7 @@ public class Http11AprProcessor extends 
 }
 
 @Override
-protected AbstractInputBuffer getInputBuffer() {
+protected AbstractInputBuffer getInputBuffer() {
 return inputBuffer;
 }
 

Modified: tomcat/trunk/java/org/apache/coyote/http11/Http11NioProcessor.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/coyote/http11/Http11NioProcessor.java?rev=1157198&r1=1157197&r2=1157198&view=diff
==
--- tomcat/trunk/java/org/apache/coyote/http11/Http11NioProcessor.java 
(original)
+++ tomcat/trunk/java/org/apache/coyote/http11/Http11NioProcessor.java Fri Aug 
12 17:59:22 2011
@@ -205,9 +205,8 @@ public class Http11NioProcessor extends 
 
 // Setting up the socket
 this.socket = socketWrapper;
-inputBuffer.setSocket(this.socket.getSocket());
+inputBuffer.init(socketWrapper, endpoint);
 outputBuffer.setSocket(this.socket.getSocket());
-inputBuffer.setSelectorPool(((NioEndpoint)endpoint).getSelectorPool());
 
outputBuffer.setSelectorPool(((NioEndpoint)endpoint).getSelectorPool());
 
 // Error flag
@@ -647,7 +646,7 @@ public class Http11NioProcessor extends 
 }
 
 @Override
-protected AbstractInputBuffer getInputBuffer() {
+protected AbstractInputBuffer getInputBuffer() {
 return inputBuffer;
 }
 

Modified: tomcat/trunk/java/org/apache/coyote/http11/Http11Processor.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/coyote/http11/Http11Processor.java?rev=1157198&r1=1157197&r2=1157198&view=diff
===

DO NOT REPLY [Bug 51056] Disable / drop support for SSLv2

2011-08-12 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=51056

--- Comment #7 from drazzib  2011-08-12 18:00:50 UTC ---
I've updated my patch :
- for 1.1.22 release
- to use OPENSSL_NO_SSL2 define instead of dropping code

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 51056] Disable / drop support for SSLv2

2011-08-12 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=51056

drazzib  changed:

   What|Removed |Added

  Attachment #26883|0   |1
is obsolete||

--- Comment #8 from drazzib  2011-08-12 18:01:40 UTC ---
Created attachment 27383
  --> https://issues.apache.org/bugzilla/attachment.cgi?id=27383
Drop SSLv2 support

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn commit: r1157204 - in /tomcat/trunk: java/org/apache/coyote/http11/ test/org/apache/coyote/http11/

2011-08-12 Thread markt
Author: markt
Date: Fri Aug 12 18:24:21 2011
New Revision: 1157204

URL: http://svn.apache.org/viewvc?rev=1157204&view=rev
Log:
Align OutputBuffer initialisation across the connectors
Reduce visibility of properties and methods

Modified:
tomcat/trunk/java/org/apache/coyote/http11/AbstractOutputBuffer.java
tomcat/trunk/java/org/apache/coyote/http11/Http11AprProcessor.java
tomcat/trunk/java/org/apache/coyote/http11/Http11NioProcessor.java
tomcat/trunk/java/org/apache/coyote/http11/Http11Processor.java
tomcat/trunk/java/org/apache/coyote/http11/InternalAprOutputBuffer.java
tomcat/trunk/java/org/apache/coyote/http11/InternalNioOutputBuffer.java
tomcat/trunk/java/org/apache/coyote/http11/InternalOutputBuffer.java
tomcat/trunk/test/org/apache/coyote/http11/TestGzipOutputFilter.java

Modified: tomcat/trunk/java/org/apache/coyote/http11/AbstractOutputBuffer.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/coyote/http11/AbstractOutputBuffer.java?rev=1157204&r1=1157203&r2=1157204&view=diff
==
--- tomcat/trunk/java/org/apache/coyote/http11/AbstractOutputBuffer.java 
(original)
+++ tomcat/trunk/java/org/apache/coyote/http11/AbstractOutputBuffer.java Fri 
Aug 12 18:24:21 2011
@@ -28,9 +28,11 @@ import org.apache.tomcat.util.buf.ByteCh
 import org.apache.tomcat.util.buf.CharChunk;
 import org.apache.tomcat.util.buf.MessageBytes;
 import org.apache.tomcat.util.http.HttpMessages;
+import org.apache.tomcat.util.net.AbstractEndpoint;
+import org.apache.tomcat.util.net.SocketWrapper;
 import org.apache.tomcat.util.res.StringManager;
 
-public abstract class AbstractOutputBuffer implements OutputBuffer{
+public abstract class AbstractOutputBuffer implements OutputBuffer{
 
 // - Instance Variables
 
@@ -316,7 +318,11 @@ public abstract class AbstractOutputBuff
 activeFilters[lastActiveFilter].end();
 finished = true;
 }
+
 
+public abstract void init(SocketWrapper socketWrapper,
+AbstractEndpoint endpoint) throws IOException;
+
 public abstract void sendAck() throws IOException;
 
 protected abstract void commit() throws IOException;

Modified: tomcat/trunk/java/org/apache/coyote/http11/Http11AprProcessor.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/coyote/http11/Http11AprProcessor.java?rev=1157204&r1=1157203&r2=1157204&view=diff
==
--- tomcat/trunk/java/org/apache/coyote/http11/Http11AprProcessor.java 
(original)
+++ tomcat/trunk/java/org/apache/coyote/http11/Http11AprProcessor.java Fri Aug 
12 18:24:21 2011
@@ -175,8 +175,7 @@ public class Http11AprProcessor extends 
 // Setting up the socket
 this.socket = socketWrapper;
 inputBuffer.init(socketWrapper, endpoint);
-long socketRef = socketWrapper.getSocket().longValue();
-outputBuffer.setSocket(socketRef);
+outputBuffer.init(socketWrapper, endpoint);
 
 // Error flag
 error = false;
@@ -190,6 +189,8 @@ public class Http11AprProcessor extends 
 boolean openSocket = false;
 boolean sendfileInProgress = false;
 
+long socketRef = socketWrapper.getSocket().longValue();
+
 while (!error && keepAlive && !comet && !isAsync() && 
!endpoint.isPaused()) {
 
 // Parsing the request header
@@ -624,7 +625,7 @@ public class Http11AprProcessor extends 
 }
 
 @Override
-protected AbstractOutputBuffer getOutputBuffer() {
+protected AbstractOutputBuffer getOutputBuffer() {
 return outputBuffer;
 }
 }

Modified: tomcat/trunk/java/org/apache/coyote/http11/Http11NioProcessor.java
URL: 
http://svn.apache.org/viewvc/tomcat/trunk/java/org/apache/coyote/http11/Http11NioProcessor.java?rev=1157204&r1=1157203&r2=1157204&view=diff
==
--- tomcat/trunk/java/org/apache/coyote/http11/Http11NioProcessor.java 
(original)
+++ tomcat/trunk/java/org/apache/coyote/http11/Http11NioProcessor.java Fri Aug 
12 18:24:21 2011
@@ -206,8 +206,7 @@ public class Http11NioProcessor extends 
 // Setting up the socket
 this.socket = socketWrapper;
 inputBuffer.init(socketWrapper, endpoint);
-outputBuffer.setSocket(this.socket.getSocket());
-
outputBuffer.setSelectorPool(((NioEndpoint)endpoint).getSelectorPool());
+outputBuffer.init(socketWrapper, endpoint);
 
 // Error flag
 error = false;
@@ -651,7 +650,7 @@ public class Http11NioProcessor extends 
 }
 
 @Override
-protected AbstractOutputBuffer getOutputBuffer() {
+protected AbstractOutputBuffer getOutputBuffer() {
 return outputBuffer;
 }
 

Modified: tomcat/trunk/java/org/apache/coyote/http11/Http11Processor.java
URL: 
http://svn.apache.o

DO NOT REPLY [Bug 51580] Severe error deploying WAR application (ExpandWar error)

2011-08-12 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=51580

Christopher Schultz  changed:

   What|Removed |Added

   Severity|enhancement |major

--- Comment #7 from Christopher Schultz  
2011-08-12 19:02:50 UTC ---
Cleon, can you attach a minimal WAR file that reproduces this issue? Also, if
there are any environmental settings necessary, such as expandWars="false",
please let me know.

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org