ttomcat-1778514358873.zip-extract/apache-tomcat-11.0.18-src/java/org/apache/catalina/connector/Connector.java

Path
ttomcat-1778514358873.zip-extract/apache-tomcat-11.0.18-src/java/org/apache/catalina/connector/Connector.java
Status
scanned
Type
file
Name
Connector.java
Extension
.java
Programming language
Java
Mime type
text/plain
File type
ASCII text, with CRLF line terminators
Tag

      
    
Rootfs path

      
    
Size
37477 (36.6 KB)
MD5
4e01fe98412a81293cf63684cf888de1
SHA1
c85504f361eca07efadea0930851395ac3e92a7d
SHA256
8e5c539180660c2616c7fd89bd85a9b0563c08e372f1d12aa0b56e802552b533
SHA512

      
    
SHA1_git
76209b0d8b95ed84074fe9f76855d65a886bc0dd
Is binary

      
    
Is text
True
Is archive

      
    
Is media

      
    
Is legal

      
    
Is manifest

      
    
Is readme

      
    
Is top level

      
    
Is key file

      
    
Connector.java | 36.6 KB |

/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.catalina.connector; import java.io.UnsupportedEncodingException; import java.net.InetAddress; import java.nio.charset.Charset; import java.nio.charset.StandardCharsets; import java.util.Arrays; import java.util.HashSet; import javax.management.ObjectName; import org.apache.catalina.LifecycleException; import org.apache.catalina.LifecycleState; import org.apache.catalina.Service; import org.apache.catalina.util.LifecycleMBeanBase; import org.apache.coyote.AbstractProtocol; import org.apache.coyote.Adapter; import org.apache.coyote.ProtocolHandler; import org.apache.coyote.UpgradeProtocol; import org.apache.coyote.http11.AbstractHttp11Protocol; import org.apache.juli.logging.Log; import org.apache.juli.logging.LogFactory; import org.apache.tomcat.jni.AprStatus; import org.apache.tomcat.util.IntrospectionUtils; import org.apache.tomcat.util.buf.B2CConverter; import org.apache.tomcat.util.buf.CharsetUtil; import org.apache.tomcat.util.buf.EncodedSolidusHandling; import org.apache.tomcat.util.buf.StringUtils; import org.apache.tomcat.util.compat.JreCompat; import org.apache.tomcat.util.http.Method; import org.apache.tomcat.util.net.SSLHostConfig; import org.apache.tomcat.util.net.openssl.OpenSSLImplementation; import org.apache.tomcat.util.net.openssl.OpenSSLStatus; import org.apache.tomcat.util.res.StringManager; /** * Implementation of a Coyote connector. */ public class Connector extends LifecycleMBeanBase { private static final Log log = LogFactory.getLog(Connector.class); public static final String INTERNAL_EXECUTOR_NAME = "Internal"; private static final boolean aprStatusPresent; static { /* * The AprStatus class has to be in the org.apache.tomcat.jni package so it can be referenced by the OpenSSL * clean-up code to avoid a race condition on shutdown between the AprLifecycleListener shutting down the Tomcat * Native library along with any remaining open connections and the OpenSSL clean-up code shutting down an * individual connection that can trigger a JVM crash. * * In some deployment scenarios AprStatus is not present - e.g. because tomcat-jni.jar is not present. To avoid * a CNFE in this class on Connector initialisation when AprStatus is not present - and ugly work-arounds that * try loading the class and catching the exception - use getResource() to see if AprStatus is present. */ aprStatusPresent = (Connector.class.getClassLoader().getResource("org/apache/tomcat/jni/AprStatus.class") != null); } // ------------------------------------------------------------ Constructor /** * Defaults to using HTTP/1.1 NIO implementation. */ public Connector() { this("HTTP/1.1"); } public Connector(String protocol) { configuredProtocol = protocol; ProtocolHandler p = null; try { p = ProtocolHandler.create(protocol); } catch (Exception e) { log.error(sm.getString("coyoteConnector.protocolHandlerInstantiationFailed"), e); } if (p != null) { protocolHandler = p; protocolHandlerClassName = protocolHandler.getClass().getName(); } else { protocolHandler = null; protocolHandlerClassName = protocol; } // Default for Connector depends on this system property setThrowOnFailure(Boolean.getBoolean("org.apache.catalina.startup.EXIT_ON_INIT_FAILURE")); } public Connector(ProtocolHandler protocolHandler) { protocolHandlerClassName = protocolHandler.getClass().getName(); configuredProtocol = protocolHandlerClassName; this.protocolHandler = protocolHandler; // Default for Connector depends on this system property setThrowOnFailure(Boolean.getBoolean("org.apache.catalina.startup.EXIT_ON_INIT_FAILURE")); } // ----------------------------------------------------- Instance Variables /** * The <code>Service</code> we are associated with (if any). */ protected Service service = null; /** * If this is <code>true</code> the '\' character will be permitted as a path delimiter. If not specified, the * default value of <code>false</code> will be used. */ protected boolean allowBackslash = false; /** * Do we allow TRACE ? */ protected boolean allowTrace = false; /** * Default timeout for asynchronous requests (ms). */ protected long asyncTimeout = 30000; /** * The "enable DNS lookups" flag for this Connector. */ protected boolean enableLookups = false; /** * If this is <code>true</code> then a call to <code>Response.getWriter()</code> if no character encoding has been * specified will result in subsequent calls to <code>Response.getCharacterEncoding()</code> returning * <code>ISO-8859-1</code> and the <code>Content-Type</code> response header will include a * <code>charset=ISO-8859-1</code> component. (SRV.15.2.22.1) If not specified, the default specification compliant * value of <code>true</code> will be used. */ protected boolean enforceEncodingInGetWriter = true; /** * Is generation of X-Powered-By response header enabled/disabled? */ protected boolean xpoweredBy = false; /** * The server name to which we should pretend requests to this Connector were directed. This is useful when * operating Tomcat behind a proxy server, so that redirects get constructed accurately. If not specified, the * server name included in the <code>Host</code> header is used. */ protected String proxyName = null; /** * The server port to which we should pretend requests to this Connector were directed. This is useful when * operating Tomcat behind a proxy server, so that redirects get constructed accurately. If not specified, the port * number specified by the <code>port</code> property is used. */ protected int proxyPort = 0; /** * The flag that controls recycling of the facades of the request processing objects. If set to <code>true</code> * the object facades will be discarded when the request is recycled. If the security manager is enabled, this * setting is ignored and object facades are always discarded. */ protected boolean discardFacades = true; /** * The redirect port for non-SSL to SSL redirects. */ protected int redirectPort = 443; /** * The request scheme that will be set on all requests received through this connector. */ protected String scheme = "http"; /** * The secure connection flag that will be set on all requests received through this connector. */ protected boolean secure = false; /** * The string manager for this package. */ protected static final StringManager sm = StringManager.getManager(Connector.class); /** * The maximum number of cookies permitted for a request. Use a value less than zero for no limit. Defaults to 200. */ private int maxCookieCount = 200; /** * The maximum number of parameters (GET plus POST) which will be automatically parsed by the container. 1000 by * default. A value of less than 0 means no limit. */ protected int maxParameterCount = 1000; private int maxPartCount = 50; private int maxPartHeaderSize = 512; /** * Maximum size of a POST which will be automatically parsed by the container. 2 MiB by default. */ protected int maxPostSize = 2 * 1024 * 1024; /** * Maximum size of a POST which will be saved by the container during authentication. 4 KiB by default */ protected int maxSavePostSize = 4 * 1024; /** * Comma-separated list of HTTP methods that will be parsed according to POST-style rules for * application/x-www-form-urlencoded request bodies. */ protected String parseBodyMethods = Method.POST; /** * A Set of methods determined by {@link #parseBodyMethods}. */ protected HashSet<String> parseBodyMethodsSet; /** * Flag to use IP-based virtual hosting. */ protected boolean useIPVHosts = false; /** * Coyote Protocol handler class name. See {@link #Connector()} for current default. */ protected final String protocolHandlerClassName; /** * Name of the protocol that was configured. */ protected final String configuredProtocol; /** * Coyote protocol handler. */ protected final ProtocolHandler protocolHandler; /** * Coyote adapter. */ protected Adapter adapter = null; /** * The URI encoding in use. */ private Charset uriCharset = StandardCharsets.UTF_8; /** * The behavior when an encoded reverse solidus (backslash - \) is submitted. */ private EncodedSolidusHandling encodedReverseSolidusHandling = EncodedSolidusHandling.DECODE; /** * The behavior when an encoded solidus (slash - /) is submitted. */ private EncodedSolidusHandling encodedSolidusHandling = EncodedSolidusHandling.REJECT; /** * URI encoding as body. */ protected boolean useBodyEncodingForURI = false; private boolean rejectSuspiciousURIs; // ------------------------------------------------------------- Properties /** * Return a property from the protocol handler. * * @param name the property name * * @return the property value */ public Object getProperty(String name) { if (protocolHandler == null) { return null; } return IntrospectionUtils.getProperty(protocolHandler, name); } /** * Set a property on the protocol handler. * * @param name the property name * @param value the property value * * @return <code>true</code> if the property was successfully set */ public boolean setProperty(String name, String value) { if (protocolHandler == null) { return false; } return IntrospectionUtils.setProperty(protocolHandler, name, value); } /** * @return the <code>Service</code> with which we are associated (if any). */ public Service getService() { return this.service; } /** * Set the <code>Service</code> with which we are associated (if any). * * @param service The service that owns this Engine */ public void setService(Service service) { this.service = service; } /** * @return <code>true</code> if backslash characters are allowed in URLs. Default value is <code>false</code>. */ public boolean getAllowBackslash() { return allowBackslash; } /** * Set the allowBackslash flag. * * @param allowBackslash the new flag value */ public void setAllowBackslash(boolean allowBackslash) { this.allowBackslash = allowBackslash; } /** * @return <code>true</code> if the TRACE method is allowed. Default value is <code>false</code>. */ public boolean getAllowTrace() { return this.allowTrace; } /** * Set the allowTrace flag, to disable or enable the TRACE HTTP method. * * @param allowTrace The new allowTrace flag */ public void setAllowTrace(boolean allowTrace) { this.allowTrace = allowTrace; } /** * @return the default timeout for async requests in ms. */ public long getAsyncTimeout() { return asyncTimeout; } /** * Set the default timeout for async requests. * * @param asyncTimeout The new timeout in ms. */ public void setAsyncTimeout(long asyncTimeout) { this.asyncTimeout = asyncTimeout; } /** * @return <code>true</code> if the object facades are discarded. */ public boolean getDiscardFacades() { return discardFacades; } /** * Set the recycling strategy for the object facades. * * @param discardFacades the new value of the flag */ public void setDiscardFacades(boolean discardFacades) { this.discardFacades = discardFacades; } /** * @return the "enable DNS lookups" flag. */ public boolean getEnableLookups() { return this.enableLookups; } /** * Set the "enable DNS lookups" flag. * * @param enableLookups The new "enable DNS lookups" flag value */ public void setEnableLookups(boolean enableLookups) { this.enableLookups = enableLookups; } /** * @return <code>true</code> if a default character encoding will be set when calling Response.getWriter() */ public boolean getEnforceEncodingInGetWriter() { return enforceEncodingInGetWriter; } /** * Set the enforceEncodingInGetWriter flag. * * @param enforceEncodingInGetWriter the new flag value */ public void setEnforceEncodingInGetWriter(boolean enforceEncodingInGetWriter) { this.enforceEncodingInGetWriter = enforceEncodingInGetWriter; } public int getMaxCookieCount() { return maxCookieCount; } public void setMaxCookieCount(int maxCookieCount) { this.maxCookieCount = maxCookieCount; } /** * @return the maximum number of parameters (GET plus POST) that will be automatically parsed by the container. A * value of less than 0 means no limit. */ public int getMaxParameterCount() { return maxParameterCount; } /** * Set the maximum number of parameters (GET plus POST) that will be automatically parsed by the container. A value * of less than 0 means no limit. * * @param maxParameterCount The new setting */ public void setMaxParameterCount(int maxParameterCount) { this.maxParameterCount = maxParameterCount; } public int getMaxPartCount() { return maxPartCount; } public void setMaxPartCount(int maxPartCount) { this.maxPartCount = maxPartCount; } public int getMaxPartHeaderSize() { return maxPartHeaderSize; } public void setMaxPartHeaderSize(int maxPartHeaderSize) { this.maxPartHeaderSize = maxPartHeaderSize; } /** * @return the maximum size of a POST which will be automatically parsed by the container. */ public int getMaxPostSize() { return maxPostSize; } /** * Set the maximum size of a POST which will be automatically parsed by the container. * * @param maxPostSize The new maximum size in bytes of a POST which will be automatically parsed by the container */ public void setMaxPostSize(int maxPostSize) { this.maxPostSize = maxPostSize; } /** * @return the maximum size of a POST which will be saved by the container during authentication. */ public int getMaxSavePostSize() { return maxSavePostSize; } /** * Set the maximum size of a POST which will be saved by the container during authentication. * * @param maxSavePostSize The new maximum size in bytes of a POST which will be saved by the container during * authentication. */ public void setMaxSavePostSize(int maxSavePostSize) { this.maxSavePostSize = maxSavePostSize; setProperty("maxSavePostSize", String.valueOf(maxSavePostSize)); } /** * @return the HTTP methods which will support body parameters parsing */ public String getParseBodyMethods() { return this.parseBodyMethods; } /** * Set list of HTTP methods which should allow body parameter parsing. This defaults to <code>POST</code>. * * @param methods Comma separated list of HTTP method names */ public void setParseBodyMethods(String methods) { HashSet<String> methodSet = new HashSet<>(); if (null != methods) { methodSet.addAll(Arrays.asList(StringUtils.splitCommaSeparated(methods))); } if (methodSet.contains(Method.TRACE)) { throw new IllegalArgumentException(sm.getString("coyoteConnector.parseBodyMethodNoTrace")); } this.parseBodyMethods = methods; this.parseBodyMethodsSet = methodSet; } protected boolean isParseBodyMethod(String method) { return parseBodyMethodsSet.contains(method); } /** * @return the port number on which this connector is configured to listen for requests. The special value of 0 * means select a random free port when the socket is bound. */ public int getPort() { // Try shortcut that should work for nearly all uses first as it does // not use reflection and is therefore faster. if (protocolHandler instanceof AbstractProtocol<?>) { return ((AbstractProtocol<?>) protocolHandler).getPort(); } // Fall back for custom protocol handlers not based on AbstractProtocol Object port = getProperty("port"); if (port instanceof Integer) { return ((Integer) port).intValue(); } // Usually means an invalid protocol has been configured return -1; } /** * Set the port number on which we listen for requests. * * @param port The new port number */ public void setPort(int port) { setProperty("port", String.valueOf(port)); } public int getPortOffset() { // Try shortcut that should work for nearly all uses first as it does // not use reflection and is therefore faster. if (protocolHandler instanceof AbstractProtocol<?>) { return ((AbstractProtocol<?>) protocolHandler).getPortOffset(); } // Fall back for custom protocol handlers not based on AbstractProtocol Object port = getProperty("portOffset"); if (port instanceof Integer) { return ((Integer) port).intValue(); } // Usually means an invalid protocol has been configured. return 0; } public void setPortOffset(int portOffset) { setProperty("portOffset", String.valueOf(portOffset)); } public int getPortWithOffset() { int port = getPort(); // Zero is a special case and negative values are invalid if (port > 0) { return port + getPortOffset(); } return port; } /** * @return the port number on which this connector is listening to requests. If the special value for * {@link #getPort} of zero is used then this method will report the actual port bound. */ public int getLocalPort() { return ((Integer) getProperty("localPort")).intValue(); } /** * @return the Coyote protocol handler in use. */ public String getProtocol() { return configuredProtocol; } /** * @return the class name of the Coyote protocol handler in use. */ public String getProtocolHandlerClassName() { return this.protocolHandlerClassName; } /** * @return the protocol handler associated with the connector. */ public ProtocolHandler getProtocolHandler() { return this.protocolHandler; } /** * @return the proxy server name for this Connector. */ public String getProxyName() { return this.proxyName; } /** * Set the proxy server name for this Connector. * * @param proxyName The new proxy server name */ public void setProxyName(String proxyName) { if (proxyName != null && !proxyName.isEmpty()) { this.proxyName = proxyName; } else { this.proxyName = null; } } /** * @return the proxy server port for this Connector. */ public int getProxyPort() { return this.proxyPort; } /** * Set the proxy server port for this Connector. * * @param proxyPort The new proxy server port */ public void setProxyPort(int proxyPort) { this.proxyPort = proxyPort; } /** * @return the port number to which a request should be redirected if it comes in on a non-SSL port and is subject * to a security constraint with a transport guarantee that requires SSL. */ public int getRedirectPort() { return this.redirectPort; } /** * Set the redirect port number. * * @param redirectPort The redirect port number (non-SSL to SSL) */ public void setRedirectPort(int redirectPort) { this.redirectPort = redirectPort; } public int getRedirectPortWithOffset() { return getRedirectPort() + getPortOffset(); } /** * @return the scheme that will be assigned to requests received through this connector. Default value is "http". */ public String getScheme() { return this.scheme; } /** * Set the scheme that will be assigned to requests received through this connector. * * @param scheme The new scheme */ public void setScheme(String scheme) { this.scheme = scheme; } /** * @return the secure connection flag that will be assigned to requests received through this connector. Default * value is "false". */ public boolean getSecure() { return this.secure; } /** * Set the secure connection flag that will be assigned to requests received through this connector. * * @param secure The new secure connection flag */ public void setSecure(boolean secure) { this.secure = secure; setProperty("secure", Boolean.toString(secure)); } /** * @return the name of character encoding to be used for the URI using the original case. */ public String getURIEncoding() { return uriCharset.name(); } /** * @return The Charset to use to convert raw URI bytes (after %nn decoding) to characters. This will never be null */ public Charset getURICharset() { return uriCharset; } /** * Set the URI encoding to be used for the URI. * * @param URIEncoding The new URI character encoding. */ public void setURIEncoding(String URIEncoding) { try { Charset charset = B2CConverter.getCharset(URIEncoding); if (!CharsetUtil.isAsciiSuperset(charset)) { log.error(sm.getString("coyoteConnector.notAsciiSuperset", URIEncoding, uriCharset.name())); return; } uriCharset = charset; } catch (UnsupportedEncodingException e) { log.error(sm.getString("coyoteConnector.invalidEncoding", URIEncoding, uriCharset.name()), e); } } /** * @return the true if the entity body encoding should be used for the URI. */ public boolean getUseBodyEncodingForURI() { return this.useBodyEncodingForURI; } /** * Set if the entity body encoding should be used for the URI. * * @param useBodyEncodingForURI The new value for the flag. */ public void setUseBodyEncodingForURI(boolean useBodyEncodingForURI) { this.useBodyEncodingForURI = useBodyEncodingForURI; } /** * Indicates whether the generation of an X-Powered-By response header for Servlet-generated responses is enabled or * disabled for this Connector. * * @return <code>true</code> if generation of X-Powered-By response header is enabled, false otherwise */ public boolean getXpoweredBy() { return xpoweredBy; } /** * Enables or disables the generation of an X-Powered-By header (with value Servlet/2.5) for all servlet-generated * responses returned by this Connector. * * @param xpoweredBy true if generation of X-Powered-By response header is to be enabled, false otherwise */ public void setXpoweredBy(boolean xpoweredBy) { this.xpoweredBy = xpoweredBy; } /** * Enable the use of IP-based virtual hosting. * * @param useIPVHosts <code>true</code> if Hosts are identified by IP, <code>false</code> if Hosts are identified by * name. */ public void setUseIPVHosts(boolean useIPVHosts) { this.useIPVHosts = useIPVHosts; } /** * Test if IP-based virtual hosting is enabled. * * @return <code>true</code> if IP vhosts are enabled */ public boolean getUseIPVHosts() { return useIPVHosts; } public String getExecutorName() { Object obj = protocolHandler.getExecutor(); if (obj instanceof org.apache.catalina.Executor) { return ((org.apache.catalina.Executor) obj).getName(); } return INTERNAL_EXECUTOR_NAME; } public void addSslHostConfig(SSLHostConfig sslHostConfig) { protocolHandler.addSslHostConfig(sslHostConfig); } public SSLHostConfig[] findSslHostConfigs() { return protocolHandler.findSslHostConfigs(); } public void addUpgradeProtocol(UpgradeProtocol upgradeProtocol) { protocolHandler.addUpgradeProtocol(upgradeProtocol); } public UpgradeProtocol[] findUpgradeProtocols() { return protocolHandler.findUpgradeProtocols(); } public String getEncodedReverseSolidusHandling() { return encodedReverseSolidusHandling.getValue(); } public void setEncodedReverseSolidusHandling(String encodedReverseSolidusHandling) { this.encodedReverseSolidusHandling = EncodedSolidusHandling.fromString(encodedReverseSolidusHandling); } public EncodedSolidusHandling getEncodedReverseSolidusHandlingInternal() { return encodedReverseSolidusHandling; } public String getEncodedSolidusHandling() { return encodedSolidusHandling.getValue(); } public void setEncodedSolidusHandling(String encodedSolidusHandling) { this.encodedSolidusHandling = EncodedSolidusHandling.fromString(encodedSolidusHandling); } public EncodedSolidusHandling getEncodedSolidusHandlingInternal() { return encodedSolidusHandling; } public boolean getRejectSuspiciousURIs() { return rejectSuspiciousURIs; } public void setRejectSuspiciousURIs(boolean rejectSuspiciousURIs) { this.rejectSuspiciousURIs = rejectSuspiciousURIs; } // --------------------------------------------------------- Public Methods /** * Create (or allocate) and return a Request object suitable for specifying the contents of a Request to the * responsible Container. * * @param coyoteRequest The Coyote request with which the Request object will always be associated. In normal usage * this must be non-null. In some test scenarios, it may be possible to use a null request * without triggering an NPE. * * @return a new Servlet request object */ public Request createRequest(org.apache.coyote.Request coyoteRequest) { return new Request(this, coyoteRequest); } /** * Create and return a Response object suitable for receiving the contents of a Response from the responsible * Container. * * @param coyoteResponse The Coyote request with which the Response object will always be associated. In normal * usage this must be non-null. In some test scenarios, it may be possible to use a null * response without triggering an NPE. * * @return a new Servlet response object */ public Response createResponse(org.apache.coyote.Response coyoteResponse) { int size = protocolHandler.getDesiredBufferSize(); if (size > 0) { return new Response(coyoteResponse, size); } else { return new Response(coyoteResponse); } } protected String createObjectNameKeyProperties(String type) { Object addressObj = getProperty("address"); StringBuilder sb = new StringBuilder("type="); sb.append(type); String id = (protocolHandler != null) ? protocolHandler.getId() : null; if (id != null) { // Maintain MBean name compatibility, even if not accurate sb.append(",port=0,address="); sb.append(ObjectName.quote(id)); } else { sb.append(",port="); int port = getPortWithOffset(); if (port > 0) { sb.append(port); } else { sb.append("auto-"); sb.append(getProperty("nameIndex")); } String address = ""; if (addressObj instanceof InetAddress) { address = ((InetAddress) addressObj).getHostAddress(); } else if (addressObj != null) { address = addressObj.toString(); } if (!address.isEmpty()) { sb.append(",address="); sb.append(ObjectName.quote(address)); } } return sb.toString(); } /** * Pause the connector. */ public void pause() { try { if (protocolHandler != null) { protocolHandler.pause(); } } catch (Exception e) { log.error(sm.getString("coyoteConnector.protocolHandlerPauseFailed"), e); } } /** * Resume the connector. */ public void resume() { try { if (protocolHandler != null) { protocolHandler.resume(); } } catch (Exception e) { log.error(sm.getString("coyoteConnector.protocolHandlerResumeFailed"), e); } } @Override protected void initInternal() throws LifecycleException { super.initInternal(); if (protocolHandler == null) { throw new LifecycleException(sm.getString("coyoteConnector.protocolHandlerInstantiationFailed")); } // Initialize adapter adapter = new CoyoteAdapter(this); protocolHandler.setAdapter(adapter); // Make sure parseBodyMethodsSet has a default if (null == parseBodyMethodsSet) { setParseBodyMethods(getParseBodyMethods()); } if (protocolHandler instanceof AbstractHttp11Protocol<?> jsseProtocolHandler && jsseProtocolHandler.isSSLEnabled() && jsseProtocolHandler.getSslImplementationName() == null) { // If SSL is enabled and a specific implementation isn't specified, select the correct default. if (JreCompat.isJre22Available() && OpenSSLStatus.getUseOpenSSL() && OpenSSLStatus.isAvailable()) { // Use FFM and OpenSSL if available jsseProtocolHandler .setSslImplementationName("org.apache.tomcat.util.net.openssl.panama.OpenSSLImplementation"); } else if (aprStatusPresent && AprStatus.isAprAvailable() && AprStatus.getUseOpenSSL()) { // Use tomcat-native and OpenSSL otherwise, if available jsseProtocolHandler.setSslImplementationName(OpenSSLImplementation.class.getName()); } // Otherwise the default JSSE will be used } try { protocolHandler.init(); } catch (Exception e) { throw new LifecycleException(sm.getString("coyoteConnector.protocolHandlerInitializationFailed"), e); } } /** * Begin processing requests via this Connector. * * @exception LifecycleException if a fatal startup error occurs */ @Override protected void startInternal() throws LifecycleException { // Validate settings before starting String id = (protocolHandler != null) ? protocolHandler.getId() : null; if (id == null && getPortWithOffset() < 0) { throw new LifecycleException( sm.getString("coyoteConnector.invalidPort", Integer.valueOf(getPortWithOffset()))); } setState(LifecycleState.STARTING); // Configure the utility executor before starting the protocol handler if (protocolHandler != null && service != null) { protocolHandler.setUtilityExecutor(service.getServer().getUtilityExecutor()); } try { protocolHandler.start(); } catch (Exception e) { // Includes NPE - protocolHandler will be null for invalid protocol if throwOnFailure is false throw new LifecycleException(sm.getString("coyoteConnector.protocolHandlerStartFailed"), e); } } /** * Terminate processing requests via this Connector. * * @exception LifecycleException if a fatal shutdown error occurs */ @Override protected void stopInternal() throws LifecycleException { setState(LifecycleState.STOPPING); try { if (protocolHandler != null) { protocolHandler.stop(); } } catch (Exception e) { throw new LifecycleException(sm.getString("coyoteConnector.protocolHandlerStopFailed"), e); } // Remove the utility executor once the protocol handler has been stopped if (protocolHandler != null) { protocolHandler.setUtilityExecutor(null); } } @Override protected void destroyInternal() throws LifecycleException { try { if (protocolHandler != null) { protocolHandler.destroy(); } } catch (Exception e) { throw new LifecycleException(sm.getString("coyoteConnector.protocolHandlerDestroyFailed"), e); } if (getService() != null) { getService().removeConnector(this); } super.destroyInternal(); } @Override public String toString() { // Not worth caching this right now StringBuilder sb = new StringBuilder("Connector["); String name = (String) getProperty("name"); if (name == null) { sb.append(getProtocol()); sb.append('-'); String id = (protocolHandler != null) ? protocolHandler.getId() : null; if (id != null) { sb.append(id); } else { int port = getPortWithOffset(); if (port > 0) { sb.append(port); } else { sb.append("auto-"); sb.append(getProperty("nameIndex")); } } } else { sb.append(name); } sb.append(']'); return sb.toString(); } // -------------------- JMX registration -------------------- @Override protected String getDomainInternal() { Service s = getService(); if (s == null) { return null; } else { return service.getDomain(); } } @Override protected String getObjectNameKeyProperties() { return createObjectNameKeyProperties("Connector"); } }
Detected license expression
apache-2.0
Detected license expression (SPDX)
Apache-2.0
Percentage of license text
3.4
Copyrights

      
    
Holders

      
    
Authors

      
    
License detections License expression License expression SPDX
apache_2_0-4bde3f57-78aa-4201-96bf-531cba09e7de apache-2.0 Apache-2.0
URL Start line End line
http://www.apache.org/licenses/LICENSE-2.0 9 9