[Bug 65226] The StandardJarScanner extract wrong jar name and cause duplicate jar scan

2021-04-09 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=65226

--- Comment #1 from Remy Maucherat  ---
I think you are right, since the 8.5 code is now:
https://github.com/apache/tomcat/blob/8.5.x/java/org/apache/tomcat/util/scan/StandardJarScanner.java#L478

-- 
You are receiving this mail because:
You are the assignee for the bug.
-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] branch 7.0.x updated: Harmonize StandardJarScanner extraction of JAR name

2021-04-09 Thread remm
This is an automated email from the ASF dual-hosted git repository.

remm pushed a commit to branch 7.0.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/7.0.x by this push:
 new fc761db  Harmonize StandardJarScanner extraction of JAR name
fc761db is described below

commit fc761dbf2f56b538ed42febda0b3a518469adf01
Author: remm 
AuthorDate: Fri Apr 9 10:24:19 2021 +0200

Harmonize StandardJarScanner extraction of JAR name

From 8.5 code.
---
 java/org/apache/tomcat/util/scan/StandardJarScanner.java | 2 +-
 webapps/docs/changelog.xml   | 8 
 2 files changed, 9 insertions(+), 1 deletion(-)

diff --git a/java/org/apache/tomcat/util/scan/StandardJarScanner.java 
b/java/org/apache/tomcat/util/scan/StandardJarScanner.java
index b27f40b..965b69d 100644
--- a/java/org/apache/tomcat/util/scan/StandardJarScanner.java
+++ b/java/org/apache/tomcat/util/scan/StandardJarScanner.java
@@ -359,7 +359,7 @@ public class StandardJarScanner implements JarScanner {
 String name = null;
 
 String path = url.getPath();
-int end = path.indexOf(Constants.JAR_EXT);
+int end = path.lastIndexOf(Constants.JAR_EXT);
 if (end != -1) {
 int start = path.lastIndexOf('/', end);
 name = path.substring(start + 1, end + 4);
diff --git a/webapps/docs/changelog.xml b/webapps/docs/changelog.xml
index 875a339..54255ef 100644
--- a/webapps/docs/changelog.xml
+++ b/webapps/docs/changelog.xml
@@ -119,6 +119,14 @@
   issues do not "pop up" wrt. others).
 -->
 
+  
+
+  
+65226: Fix extraction of JAR name in some cases in
+StandardJarScanner. Submitted by Lynx. (remm)
+  
+
+  
   
 
   

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[Bug 65226] The StandardJarScanner extract wrong jar name and cause duplicate jar scan

2021-04-09 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=65226

Remy Maucherat  changed:

   What|Removed |Added

 Resolution|--- |FIXED
 Status|NEW |RESOLVED

--- Comment #2 from Remy Maucherat  ---
Switched to lastIndexOf like for 8.5, the fix will be in 7.0.109.

-- 
You are receiving this mail because:
You are the assignee for the bug.
-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



buildbot success in on tomcat-7-trunk

2021-04-09 Thread buildbot
The Buildbot has detected a restored build on builder tomcat-7-trunk while 
building tomcat. Full details are available at:
https://ci.apache.org/builders/tomcat-7-trunk/builds/1861

Buildbot URL: https://ci.apache.org/

Buildslave for this Build: asf946_ubuntu

Build Reason: The AnyBranchScheduler scheduler named 'on-tomcat-7-commit' 
triggered this build
Build Source Stamp: [branch 7.0.x] fc761dbf2f56b538ed42febda0b3a518469adf01
Blamelist: remm 

Build succeeded!

Sincerely,
 -The Buildbot




-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] branch 9.0.x updated (b36454d -> 70027ed)

2021-04-09 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a change to branch 9.0.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git.


from b36454d  Remove unnecessary code
 add 70027ed  Code clean-up. No functional change.

No new revisions were added by this update.

Summary of changes:
 java/org/apache/catalina/realm/JNDIRealm.java | 670 +++---
 1 file changed, 287 insertions(+), 383 deletions(-)

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



[tomcat] branch master updated: Code clean-up. No functional change.

2021-04-09 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/master by this push:
 new ec29686  Code clean-up. No functional change.
ec29686 is described below

commit ec29686465037c31a318fc9803856c2f6ac8fd8c
Author: Mark Thomas 
AuthorDate: Fri Apr 9 16:56:25 2021 +0100

Code clean-up. No functional change.
---
 java/org/apache/catalina/realm/JNDIRealm.java | 670 +++---
 1 file changed, 287 insertions(+), 383 deletions(-)

diff --git a/java/org/apache/catalina/realm/JNDIRealm.java 
b/java/org/apache/catalina/realm/JNDIRealm.java
index 7e09d5c..cda0603 100644
--- a/java/org/apache/catalina/realm/JNDIRealm.java
+++ b/java/org/apache/catalina/realm/JNDIRealm.java
@@ -181,7 +181,6 @@ import org.ietf.jgss.GSSName;
  */
 public class JNDIRealm extends RealmBase {
 
-
 // - Instance Variables
 
 /**
@@ -194,19 +193,16 @@ public class JNDIRealm extends RealmBase {
  */
 protected String connectionName = null;
 
-
 /**
  * The connection password for the server we will contact.
  */
 protected String connectionPassword = null;
 
-
 /**
  * The connection URL for the server we will contact.
  */
 protected String connectionURL = null;
 
-
 /**
  * The JNDI context factory used to acquire our InitialContext.  By
  * default, assumes use of an LDAP server using the standard JNDI LDAP
@@ -214,7 +210,6 @@ public class JNDIRealm extends RealmBase {
  */
 protected String contextFactory = "com.sun.jndi.ldap.LdapCtxFactory";
 
-
 /**
  * How aliases should be dereferenced during search operations.
  */
@@ -226,14 +221,12 @@ public class JNDIRealm extends RealmBase {
  */
 public static final String DEREF_ALIASES = "java.naming.ldap.derefAliases";
 
-
 /**
  * The protocol that will be used in the communication with the
  * directory server.
  */
 protected String protocol = null;
 
-
 /**
  * Should we ignore PartialResultExceptions when iterating over 
NamingEnumerations?
  * Microsoft Active Directory often returns referrals, which lead
@@ -243,7 +236,6 @@ public class JNDIRealm extends RealmBase {
  */
 protected boolean adCompat = false;
 
-
 /**
  * How should we handle referrals?  Microsoft Active Directory often 
returns
  * referrals. If you need to follow them set referrals to "follow".
@@ -252,20 +244,17 @@ public class JNDIRealm extends RealmBase {
  */
 protected String referrals = null;
 
-
 /**
  * The base element for user searches.
  */
 protected String userBase = "";
 
-
 /**
  * The message format used to search for a user, with "{0}" marking
  * the spot where the username goes.
  */
 protected String userSearch = null;
 
-
 /**
  * When searching for users, should the search be performed as the user
  * currently being authenticated? If false, {@link #connectionName} and
@@ -274,13 +263,11 @@ public class JNDIRealm extends RealmBase {
  */
 private boolean userSearchAsUser = false;
 
-
 /**
  * Should we search the entire subtree for matching users?
  */
 protected boolean userSubtree = false;
 
-
 /**
  * The attribute name used to retrieve the user password.
  */
@@ -294,7 +281,6 @@ public class JNDIRealm extends RealmBase {
  */
 protected String userRoleAttribute = null;
 
-
 /**
  * A string of LDAP user patterns or paths, ":"-separated
  * These will be used to form the distinguished name of a
@@ -305,7 +291,6 @@ public class JNDIRealm extends RealmBase {
  */
 protected String[] userPatternArray = null;
 
-
 /**
  * The message format used to form the distinguished name of a
  * user, with "{0}" marking the spot where the specified username
@@ -313,26 +298,22 @@ public class JNDIRealm extends RealmBase {
  */
 protected String userPattern = null;
 
-
 /**
  * The base element for role searches.
  */
 protected String roleBase = "";
 
-
 /**
  * The name of an attribute in the user's entry containing
  * roles for that user
  */
 protected String userRoleName = null;
 
-
 /**
  * The name of the attribute containing roles held elsewhere
  */
 protected String roleName = null;
 
-
 /**
  * The message format used to select roles for a user, with "{0}" marking
  * the spot where the distinguished name of the user goes. The "{1}"
@@ -340,7 +321,6 @@ public class JNDIRealm extends RealmBase {
  */
 protected String roleSearch = null;
 
-
 /**
  * Should we search the entire subtree for matching memberships?
  */
@@ -375,7 +355,6 @@ public class JNDIRealm extends RealmBase {
  */
 protected String com

[tomcat] branch 8.5.x updated: Code clean-up. No functional change.

2021-04-09 Thread markt
This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch 8.5.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/8.5.x by this push:
 new 5862cb9  Code clean-up. No functional change.
5862cb9 is described below

commit 5862cb95edbeb75782c923619453affe4d47c614
Author: Mark Thomas 
AuthorDate: Fri Apr 9 16:56:25 2021 +0100

Code clean-up. No functional change.
---
 java/org/apache/catalina/realm/JNDIRealm.java | 676 +++---
 1 file changed, 290 insertions(+), 386 deletions(-)

diff --git a/java/org/apache/catalina/realm/JNDIRealm.java 
b/java/org/apache/catalina/realm/JNDIRealm.java
index 1eedab6..e4ba051 100644
--- a/java/org/apache/catalina/realm/JNDIRealm.java
+++ b/java/org/apache/catalina/realm/JNDIRealm.java
@@ -181,7 +181,6 @@ import org.ietf.jgss.GSSName;
  */
 public class JNDIRealm extends RealmBase {
 
-
 // - Instance Variables
 
 /**
@@ -194,19 +193,16 @@ public class JNDIRealm extends RealmBase {
  */
 protected String connectionName = null;
 
-
 /**
  * The connection password for the server we will contact.
  */
 protected String connectionPassword = null;
 
-
 /**
  * The connection URL for the server we will contact.
  */
 protected String connectionURL = null;
 
-
 /**
  * The JNDI context factory used to acquire our InitialContext.  By
  * default, assumes use of an LDAP server using the standard JNDI LDAP
@@ -214,7 +210,6 @@ public class JNDIRealm extends RealmBase {
  */
 protected String contextFactory = "com.sun.jndi.ldap.LdapCtxFactory";
 
-
 /**
  * How aliases should be dereferenced during search operations.
  */
@@ -226,7 +221,6 @@ public class JNDIRealm extends RealmBase {
  */
 public static final String DEREF_ALIASES = "java.naming.ldap.derefAliases";
 
-
 /**
  * Descriptive information about this Realm implementation.
  * @deprecated This will be removed in Tomcat 9 onwards.
@@ -241,7 +235,6 @@ public class JNDIRealm extends RealmBase {
  */
 protected String protocol = null;
 
-
 /**
  * Should we ignore PartialResultExceptions when iterating over 
NamingEnumerations?
  * Microsoft Active Directory often returns referrals, which lead
@@ -251,7 +244,6 @@ public class JNDIRealm extends RealmBase {
  */
 protected boolean adCompat = false;
 
-
 /**
  * How should we handle referrals?  Microsoft Active Directory often 
returns
  * referrals. If you need to follow them set referrals to "follow".
@@ -260,20 +252,17 @@ public class JNDIRealm extends RealmBase {
  */
 protected String referrals = null;
 
-
 /**
  * The base element for user searches.
  */
 protected String userBase = "";
 
-
 /**
  * The message format used to search for a user, with "{0}" marking
  * the spot where the username goes.
  */
 protected String userSearch = null;
 
-
 /**
  * When searching for users, should the search be performed as the user
  * currently being authenticated? If false, {@link #connectionName} and
@@ -282,13 +271,11 @@ public class JNDIRealm extends RealmBase {
  */
 private boolean userSearchAsUser = false;
 
-
 /**
  * Should we search the entire subtree for matching users?
  */
 protected boolean userSubtree = false;
 
-
 /**
  * The attribute name used to retrieve the user password.
  */
@@ -302,7 +289,6 @@ public class JNDIRealm extends RealmBase {
  */
 protected String userRoleAttribute = null;
 
-
 /**
  * A string of LDAP user patterns or paths, ":"-separated
  * These will be used to form the distinguished name of a
@@ -313,7 +299,6 @@ public class JNDIRealm extends RealmBase {
  */
 protected String[] userPatternArray = null;
 
-
 /**
  * The message format used to form the distinguished name of a
  * user, with "{0}" marking the spot where the specified username
@@ -321,26 +306,22 @@ public class JNDIRealm extends RealmBase {
  */
 protected String userPattern = null;
 
-
 /**
  * The base element for role searches.
  */
 protected String roleBase = "";
 
-
 /**
  * The name of an attribute in the user's entry containing
  * roles for that user
  */
 protected String userRoleName = null;
 
-
 /**
  * The name of the attribute containing roles held elsewhere
  */
 protected String roleName = null;
 
-
 /**
  * The message format used to select roles for a user, with "{0}" marking
  * the spot where the distinguished name of the user goes. The "{1}"
@@ -348,7 +329,6 @@ public class JNDIRealm extends RealmBase {
  */
 protected String roleSearch = null;
 
-
 /**
  * Should we search the entire subtree for matching memberships?
  */
@@ -38

[Bug 65226] The StandardJarScanner extract wrong jar name and cause duplicate jar scan

2021-04-09 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=65226

--- Comment #3 from Lynx  ---
Thanks! Can you estimate the schedule for 109? I'm expecting the new release in
my environment.

-- 
You are receiving this mail because:
You are the assignee for the bug.
-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org