Please wait. This can take some minutes ...
Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance.
Project price only 1 $
You can buy this project and download/modify it how often you want.
org.apache.catalina.session.StandardSession Maven / Gradle / Ivy
/*
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
*
* Copyright (c) 1997-2016 Oracle and/or its affiliates. All rights reserved.
*
* The contents of this file are subject to the terms of either the GNU
* General Public License Version 2 only ("GPL") or the Common Development
* and Distribution License("CDDL") (collectively, the "License"). You
* may not use this file except in compliance with the License. You can
* obtain a copy of the License at
* https://glassfish.dev.java.net/public/CDDL+GPL_1_1.html
* or packager/legal/LICENSE.txt. See the License for the specific
* language governing permissions and limitations under the License.
*
* When distributing the software, include this License Header Notice in each
* file and include the License file at packager/legal/LICENSE.txt.
*
* GPL Classpath Exception:
* Oracle designates this particular file as subject to the "Classpath"
* exception as provided by Oracle in the GPL Version 2 section of the License
* file that accompanied this code.
*
* Modifications:
* If applicable, add the following below the License Header, with the fields
* enclosed by brackets [] replaced by your own identifying information:
* "Portions Copyright [year] [name of copyright owner]"
*
* Contributor(s):
* If you wish your version of this file to be governed by only the CDDL or
* only the GPL Version 2, indicate your decision by adding "[Contributor]
* elects to include this software in this distribution under the [CDDL or GPL
* Version 2] license." If you don't indicate a single choice of license, a
* recipient has the option to distribute your version of this file under
* either the CDDL, the GPL Version 2 or to extend the choice of license to
* its licensees as provided above. However, if you add GPL Version 2 code
* and therefore, elected the GPL Version 2 license, then the option applies
* only if the new code is made subject to such option by the copyright
* holder.
*
*
* This file incorporates work covered by the following copyright and
* permission notice:
*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
// Portions Copyright [2016-2017] [Payara Foundation and/or its affiliates]
package org.apache.catalina.session;
import com.google.common.cache.Cache;
import com.google.common.cache.CacheBuilder;
import com.sun.enterprise.spi.io.BaseIndirectlySerializable;
import org.apache.catalina.*;
import org.apache.catalina.core.StandardContext;
import org.apache.catalina.security.SecurityUtil;
import org.apache.catalina.util.Enumerator;
import org.apache.tomcat.util.security.PrivilegedSetTccl;
import javax.servlet.ServletContext;
import javax.servlet.http.*;
import java.io.*;
import java.lang.reflect.Method;
import java.security.AccessController;
import java.security.Principal;
import java.security.PrivilegedAction;
import java.text.MessageFormat;
import java.util.*;
import java.util.concurrent.ConcurrentHashMap;
import java.util.concurrent.atomic.AtomicLong;
import java.util.logging.Level;
import java.util.logging.Logger;
/**
* Standard implementation of the Session interface. This object is
* serializable, so that it can be stored in persistent storage or transferred
* to a different JVM for distributable session support.
*
* IMPLEMENTATION NOTE : An instance of this class represents both the
* internal (Session) and application level (HttpSession) view of the session.
* However, because the class itself is not declared public, Java logic outside
* of the org.apache.catalina.session
package cannot cast an
* HttpSession view of this instance back to a Session view.
*
* IMPLEMENTATION NOTE : If you add fields to this class, you must
* make sure that you carry them over in the read/writeObject methods so
* that this class is properly serialized.
*
* @author Craig R. McClanahan
* @author Sean Legassick
* @author Jon S. Stevens
* @version $Revision: 1.33 $ $Date: 2007/03/12 21:41:52 $
*/
public class StandardSession
implements HttpSession, Session, Serializable {
private static final Logger log = LogFacade.getLogger();
private static final ResourceBundle rb = log.getResourceBundle();
// ----------------------------------------------------------- Constructors
/**
* Construct a new Session associated with the specified Manager.
*
* @param manager The manager with which this Session is associated
*/
public StandardSession(Manager manager) {
super();
setManager(manager);
if (manager instanceof ManagerBase) {
this.debug = ((ManagerBase) manager).getDebug();
}
}
// ----------------------------------------------------- Class Variables
/**
* Type array.
*/
protected static final String EMPTY_ARRAY[] = new String[0];
/**
* The dummy attribute value serialized when a NotSerializableException is
* encountered in writeObject()
.
*/
protected static final String NOT_SERIALIZED =
"___NOT_SERIALIZABLE_EXCEPTION___";
protected static final String SEPARATE_BUFFER_SERIALIZATION =
"___SEPARATE_BUFFER_SERIALIZATION___";
//HERCULES:add
/**
* The string used in the name for setAttribute and removeAttribute
* to signify on-demand sync
*/
protected static final String SYNC_STRING = "com.sun.sync";
//end HERCULES:add
/**
* The method signature for the fireContainerEvent
method.
*/
static final Class> containerEventTypes[] =
{ String.class, Object.class };
/**
* Descriptive information describing this Session implementation.
*/
protected static final String info = "StandardSession/1.0";
/**
* Set of attribute names which are not allowed to be persisted.
*/
private static final String[] excludedAttributes = {
Globals.SUBJECT_ATTR
};
/**
* The HTTP session context associated with this session.
*/
protected static volatile HttpSessionContext sessionContext = null;
/**
* Used for serialized format versioning.
* 1 = first version where this is being tracked.
*
* NOTE: You must increment this version whenever any changes are made
* to the serialized representation of this class between releases
*/
private static final Short SERIALIZED_FORM_VERSION = Short.valueOf("1");
// ----------------------------------------------------- Instance Variables
/**
* The session identifier of the parent SipApplicationSession, if any
*/
private String sipAppSessionId = null;
/**
* The BEKEY of this session, or null .
*
*
The BEKEY is used by the Converged Loadbalancer (CLB) in DCR mode
* for loadbalancing purposes, and supplied to the web container in the
* form of a request header.
*
*
See https://sailfin.dev.java.net/issues/show_bug.cgi?id=1647
* for additional details
*/
private String beKey;
/**
* The collection of user data attributes associated with this Session.
*/
protected Map attributes = new ConcurrentHashMap();
/**
* The authentication type used to authenticate our cached Principal,
* if any. NOTE: This value is not included in the serialized
* version of this object.
*/
protected transient String authType = null;
/**
* The java.lang.Method
for the
* fireContainerEvent()
method of the
* org.apache.catalina.core.StandardContext
method,
* if our Context implementation is of this class. This value is
* computed dynamically the first time it is needed, or after
* a session reload (since it is declared transient).
*/
protected transient Method containerEventMethod = null;
/**
* The time this session was created, in milliseconds since midnight,
* January 1, 1970 GMT.
*/
protected long creationTime = 0L;
/**
* The debugging detail level for this component. NOTE: This value
* is not included in the serialized version of this object.
*/
protected transient int debug = 0;
/**
* We are currently processing a session expiration, so bypass
* certain IllegalStateException tests. NOTE: This value is not
* included in the serialized version of this object.
*/
protected transient boolean expiring = false;
/**
* The facade associated with this session. NOTE: This value is not
* included in the serialized version of this object.
*/
protected transient StandardSessionFacade facade = null;
/**
* The session identifier of this Session.
*/
protected String id = null;
/**
* The last accessed time for this Session.
*/
protected long lastAccessedTime = creationTime;
/**
* The session event listeners for this Session.
*/
protected transient ArrayList listeners =
new ArrayList();
/**
* The Manager with which this Session is associated.
*/
protected transient Manager manager = null;
protected static final transient ThreadLocal threadContextManager
= new ThreadLocal<>();
private transient Cache checkedSerializableObjects = buildSerializableCache();
/**
* The context with which this Session is associated.
*/
protected transient StandardContext context = null;
/**
* The maximum time interval, in seconds, between client requests before
* the servlet container may invalidate this session. A negative time
* indicates that the session should never time out.
*/
protected int maxInactiveInterval = -1;
/**
* Flag indicating whether this session is new or not.
*/
protected boolean isNew = false;
/**
* Flag indicating whether this session is valid or not.
*/
protected boolean isValid = false;
/**
* Internal notes associated with this session by Catalina components
* and event listeners. IMPLEMENTATION NOTE: This object is
* not saved and restored across session serializations!
*/
protected transient Map notes = new Hashtable();
/**
* The authenticated Principal associated with this session, if any.
// START SJSWS 6371339
// * IMPLEMENTATION NOTE: This object is not saved and
// * restored across session serializations!
// END SJSWS 6371339
*/
protected transient Principal principal = null;
/**
* The current accessed time for this session.
*/
protected long thisAccessedTime = creationTime;
/**
* The session version, incremented and used by in-memory-replicating
* session managers
*/
protected AtomicLong version = new AtomicLong(-1);
/**
* single sign on id. It is null if there is no SSO.
*/
protected String ssoId = null;
/**
* single sign on version.
*/
protected volatile long ssoVersion = 0L;
// ----------------------------------------------------- Session Properties
/**
* Return the authentication type used to authenticate our cached
* Principal, if any.
*/
public String getAuthType() {
return (this.authType);
}
/**
* Set the authentication type used to authenticate our cached
* Principal, if any.
*
* @param authType The new cached authentication type
*/
public void setAuthType(String authType) {
this.authType = authType;
}
/**
* Set the creation time for this session. This method is called by the
* Manager when an existing Session instance is reused.
*
* @param time The new creation time
*/
public void setCreationTime(long time) {
this.creationTime = time;
this.lastAccessedTime = time;
this.thisAccessedTime = time;
}
/**
* Return the session identifier for this session.
*/
public String getId() {
return getIdInternal();
}
/**
* Return the session identifier for this session.
*/
public String getIdInternal() {
return (this.id);
}
/**
* Set the session identifier for this session.
*
* @param id The new session identifier
*/
public void setId(String id) {
if ((this.id != null) && (manager != null))
manager.remove(this);
String oldId = this.id;
this.id = id;
if (manager != null)
manager.add(this);
// Notify interested session event listeners
if (oldId == null) { // the session is just created
tellNew();
} else { // change session id
HttpSessionEvent event = null;
List listeners = context.getApplicationEventListeners();
if (listeners.isEmpty()) {
return;
}
Iterator iter = listeners.iterator();
while (iter.hasNext()) {
EventListener eventListener = iter.next();
if (!(eventListener instanceof HttpSessionIdListener)) {
continue;
}
HttpSessionIdListener listener = (HttpSessionIdListener)eventListener;
try {
fireContainerEvent(context,
"beforeSessionIdChanged",
listener);
if (event == null) {
event = new HttpSessionEvent(getSession());
}
listener.sessionIdChanged(event, oldId);
fireContainerEvent(context,
"afterSessionIdChanged",
listener);
} catch (Throwable t) {
try {
fireContainerEvent(context,
"afterSessionIdChanged",
listener);
} catch (Exception e) {
// Ignore
}
log(rb.getString(LogFacade.SESSION_ID_CHANGE_EVENT_LISTENER_EXCEPTION), t);
}
}
}
}
/**
* Sets the BEKEY for this session
*
* The BEKEY is used by the Converged Loadbalancer (CLB) in DCR mode
* for loadbalancing purposes, and supplied to the web container in the
* form of a request header.
*
* @param beKey the BEKEY for this session, or null if not
* present
*/
public void setBeKey(String beKey) {
this.beKey = beKey;
}
/**
* Gets the BEKEY of this session
*
* @return the BEKEY of this session, or null if not present
*/
public String getBeKey() {
return beKey;
}
/**
* Sets the id of the SipApplicationSession that is the parent of this
* StandardSession.
*
* @param id SipApplicationSession id
*/
public void setSipApplicationSessionId(String id) {
sipAppSessionId = id;
}
/**
* Gets the id of the SipApplicationSession that is the parent of this
* StandardSession.
*
* @return The SipApplicationSession id, or null if this
* StandardSession does not have any SipApplicationSession parent
*/
public String getSipApplicationSessionId() {
return sipAppSessionId;
}
/**
* Inform the listeners about the new session.
*
*/
public void tellNew() {
// Notify interested session event listeners
fireSessionEvent(Session.SESSION_CREATED_EVENT, null);
HttpSessionEvent event = new HttpSessionEvent(getSession());
// Notify interested application event listeners
for (HttpSessionListener listener : context.getSessionListeners()) {
try {
fireContainerEvent(context, "beforeSessionCreated",
listener);
listener.sessionCreated(event);
fireContainerEvent(context, "afterSessionCreated",
listener);
} catch (Throwable t) {
try {
fireContainerEvent(context, "afterSessionCreated",
listener);
} catch (Exception e) {
// Ignore
}
log(rb.getString(LogFacade.SESSION_EVENT_LISTENER_EXCEPTION), t);
}
}
}
/**
* Return descriptive information about this Session implementation and
* the corresponding version number, in the format
* <description>/<version>
.
*/
public String getInfo() {
return (this.info);
}
/**
* Return the last time the client sent a request associated with this
* session, as the number of milliseconds since midnight, January 1, 1970
* GMT. Actions that your application takes, such as getting or setting
* a value associated with the session, do not affect the access time.
*/
public long getLastAccessedTime() {
if ( !isValid() ) {
throw new IllegalStateException
("getLastAccessedTime: " + rb.getString(LogFacade.SESSION_INVALIDATED_EXCEPTION));
}
return (this.lastAccessedTime);
}
// START SJSAS 6470831
/**
* Same as getLastAccessedTime(), except that there is no call to
* isValid(), which may expire the session and cause any subsequent
* session access to throw an IllegalStateException.
*/
public long getLastAccessedTimeInternal() {
return this.lastAccessedTime;
}
// END SJSAS 6470831
/**
* Set the last time the client sent a request associated with this
* session, as the number of milliseconds since midnight, January 1, 1970
* GMT. Actions that your application takes, such as getting or setting
* a value associated with the session, do not affect the access time.
* HERCULES: added method
*/
public void setLastAccessedTime(long lastAcessedTime) {
this.lastAccessedTime = lastAcessedTime;
}
/**
* Return the Manager within which this Session is valid.
*/
public Manager getManager() {
return (this.manager);
}
/**
* Set the Manager within which this Session is valid.
*
* @param manager The new Manager
*/
public void setManager(Manager manager) {
this.manager = manager;
context = (StandardContext) manager.getContainer();
}
/**
* Return the maximum time interval, in seconds, between client requests
* before the servlet container will invalidate the session. A negative
* time indicates that the session should never time out.
*/
public int getMaxInactiveInterval() {
return (this.maxInactiveInterval);
}
/**
* Set the maximum time interval, in seconds, between client requests
* before the servlet container will invalidate the session. A negative
* time indicates that the session should never time out.
*
* @param interval The new maximum interval
*/
public void setMaxInactiveInterval(int interval) {
this.maxInactiveInterval = interval;
if (isValid && interval == 0) {
expire();
}
}
/**
* Set the isNew
flag for this session.
*
* @param isNew The new value for the isNew
flag
*/
public void setNew(boolean isNew) {
this.isNew = isNew;
}
/**
* Return the authenticated Principal that is associated with this Session.
* This provides an Authenticator
with a means to cache a
* previously authenticated Principal, and avoid potentially expensive
* Realm.authenticate()
calls on every request. If there
* is no current associated Principal, return null
.
*/
public Principal getPrincipal() {
return (this.principal);
}
/**
* Set the authenticated Principal that is associated with this Session.
* This provides an Authenticator
with a means to cache a
* previously authenticated Principal, and avoid potentially expensive
* Realm.authenticate()
calls on every request.
*
* @param principal The new Principal, or null
if none
*/
public void setPrincipal(Principal principal) {
this.principal = principal;
}
/**
* Return the HttpSession
for which this object
* is the facade.
*/
public HttpSession getSession() {
if (facade == null){
if (SecurityUtil.isPackageProtectionEnabled()){
final StandardSession fsession = this;
facade = AccessController.doPrivileged(
new PrivilegedAction(){
public StandardSessionFacade run(){
return new StandardSessionFacade(fsession);
}
});
} else {
facade = new StandardSessionFacade(this);
}
}
return (facade);
}
/**
* Return the isValid
flag for this session.
*/
public boolean isValid() {
if (this.expiring){
return true;
}
if (!this.isValid ) {
return false;
}
if (isForegroundLocked()) {
return true;
}
/* SJSAS 6329289
if (maxInactiveInterval >= 0) {
long timeNow = System.currentTimeMillis();
int timeIdle = (int) ((timeNow - thisAccessedTime) / 1000L);
if (timeIdle >= maxInactiveInterval) {
expire(true);
}
}
*/
// START SJSAS 6329289
if (hasExpired()) {
expire(true);
}
// END SJSAS 6329289
return (this.isValid);
}
// START CR 6363689
public boolean getIsValid() {
return this.isValid;
}
// END CR 6363689
/**
* Set the isValid
flag for this session.
*
* @param isValid The new value for the isValid
flag
*/
public void setValid(boolean isValid) {
this.isValid = isValid;
//SJSAS 6406580 START
if (!isValid && (getManager() instanceof PersistentManagerBase)) {
((PersistentManagerBase) getManager()).addToInvalidatedSessions(this.id);
}
//SJSAS 6406580 END
}
// ------------------------------------------------- Session Public Methods
/**
* Update the accessed time information for this session. This method
* should be called by the context when a request comes in for a particular
* session, even if the application does not reference it.
*/
public void access() {
this.lastAccessedTime = this.thisAccessedTime;
this.thisAccessedTime = System.currentTimeMillis();
evaluateIfValid();
}
/**
* End the access.
*/
public void endAccess() {
isNew = false;
}
/**
* Add a session event listener to this component.
*/
public void addSessionListener(SessionListener listener) {
synchronized (listeners) {
listeners.add(listener);
}
}
/**
* Perform the internal processing required to invalidate this session,
* without triggering an exception if the session has already expired.
*/
public void expire() {
expire(true);
}
/**
* Perform the internal processing required to invalidate this session,
* without triggering an exception if the session has already expired.
*
* @param notify Should we notify listeners about the demise of
* this session?
*/
public void expire(boolean notify) {
expire(notify, true);
}
/**
* Perform the internal processing required to invalidate this session,
* without triggering an exception if the session has already expired.
*
* @param notify Should we notify listeners about the demise of
* this session?
* @param persistentRemove should we call store to remove the session
* if available
*/
public void expire(boolean notify, boolean persistentRemove) {
// Mark this session as "being expired" if needed
if (expiring)
return;
synchronized (this) {
if (manager == null)
return;
expiring = true;
// Notify interested application event listeners
// FIXME - Assumes we call listeners in reverse order
// The call to expire() may not have been triggered by the webapp.
// Make sure the webapp's class loader is set when calling the
// listeners
ClassLoader oldTccl = null;
if (context.getLoader() != null &&
context.getLoader().getClassLoader() != null) {
oldTccl = Thread.currentThread().getContextClassLoader();
if (Globals.IS_SECURITY_ENABLED) {
PrivilegedAction pa = new PrivilegedSetTccl(
context.getLoader().getClassLoader());
AccessController.doPrivileged(pa);
} else {
Thread.currentThread().setContextClassLoader(
context.getLoader().getClassLoader());
}
}
try {
List listeners = context.getSessionListeners();
if (notify && !listeners.isEmpty()) {
HttpSessionEvent event = new HttpSessionEvent(getSession());
int len = listeners.size();
for (int i = 0; i < len; i++) {
// Invoke in reverse order of declaration
HttpSessionListener listener = listeners.get((len - 1) - i);
try {
fireContainerEvent(context,
"beforeSessionDestroyed",
listener);
listener.sessionDestroyed(event);
fireContainerEvent(context,
"afterSessionDestroyed",
listener);
} catch (Throwable t) {
try {
fireContainerEvent(context,
"afterSessionDestroyed",
listener);
} catch (Exception e) {
// Ignore
}
// FIXME - should we do anything besides log these?
log(rb.getString(LogFacade.SESSION_EVENT_LISTENER_EXCEPTION), t);
}
}
}
} finally {
if (oldTccl != null) {
if (Globals.IS_SECURITY_ENABLED) {
PrivilegedAction pa =
new PrivilegedSetTccl(oldTccl);
AccessController.doPrivileged(pa);
} else {
Thread.currentThread().setContextClassLoader(oldTccl);
}
}
}
setValid(false);
/*
* Compute how long this session has been alive, and update
* session manager's related properties accordingly
*/
long timeNow = System.currentTimeMillis();
int timeAlive = (int) ((timeNow - creationTime)/1000);
synchronized (manager) {
if (timeAlive > manager.getSessionMaxAliveTimeSeconds()) {
manager.setSessionMaxAliveTimeSeconds(timeAlive);
}
int numExpired = manager.getExpiredSessions();
numExpired++;
manager.setExpiredSessions(numExpired);
int average = manager.getSessionAverageAliveTimeSeconds();
average = ((average * (numExpired-1)) + timeAlive)/numExpired;
manager.setSessionAverageAliveTimeSeconds(average);
}
// Remove this session from our manager's active sessions
if(persistentRemove) {
manager.remove(this);
} else {
if(manager instanceof PersistentManagerBase) {
((PersistentManagerBase)manager).remove(this, false);
}
}
/*
* Mark session as expired *before* removing its attributes, so
* that its HttpSessionBindingListener objects will get an
* IllegalStateException when accessing the session attributes
* from within their valueUnbound() method
*/
expiring = false;
// Unbind any objects associated with this session
String keys[] = keys();
for (int i = 0; i < keys.length; i++)
removeAttribute(keys[i], notify, false);
// Notify interested session event listeners
if (notify) {
context.sessionExpiredEvent(this);
fireSessionEvent(Session.SESSION_DESTROYED_EVENT, null);
}
}
}
/**
* Perform the internal processing required to passivate
* this session.
*/
public void passivate() {
context.sessionPassivatedStartEvent(this);
try {
// Notify ActivationListeners
HttpSessionEvent event = null;
String keys[] = keys();
for (int i = 0; i < keys.length; i++) {
Object attribute = getAttributeInternal(keys[i]);
if (attribute instanceof HttpSessionActivationListener) {
if (event == null)
event = new HttpSessionEvent(getSession());
// FIXME: Should we catch throwables?
((HttpSessionActivationListener)attribute).sessionWillPassivate(event);
}
}
} finally {
context.sessionPassivatedEndEvent(this);
}
}
/**
* Perform internal processing required to activate this
* session.
*/
public void activate() {
context.sessionActivatedStartEvent(this);
try {
// Notify ActivationListeners
HttpSessionEvent event = null;
String keys[] = keys();
for (int i = 0; i < keys.length; i++) {
Object attribute = getAttributeInternal(keys[i]);
if (attribute instanceof HttpSessionActivationListener) {
if (event == null)
event = new HttpSessionEvent(getSession());
// FIXME: Should we catch throwables?
((HttpSessionActivationListener)attribute).sessionDidActivate(event);
}
}
} finally {
context.sessionActivatedEndEvent(this);
}
}
/**
* Return the object bound with the specified name to the internal notes
* for this session, or null
if no such binding exists.
*
* @param name Name of the note to be returned
*/
public Object getNote(String name) {
return (notes.get(name));
}
/**
* Return an Iterator containing the String names of all notes bindings
* that exist for this session.
*/
public Iterator getNoteNames() {
return (notes.keySet().iterator());
}
/**
* Release all object references, and initialize instance variables, in
* preparation for reuse of this object.
*/
public void recycle() {
// Reset the instance variables associated with this Session
attributes.clear();
setAuthType(null);
creationTime = 0L;
expiring = false;
id = null;
lastAccessedTime = 0L;
maxInactiveInterval = -1;
notes.clear();
setPrincipal(null);
isNew = false;
isValid = false;
listeners.clear();
manager = null;
}
/**
* Remove any object bound to the specified name in the internal notes
* for this session.
*
* @param name Name of the note to be removed
*/
public void removeNote(String name) {
notes.remove(name);
}
/**
* Remove a session event listener from this component.
*/
public void removeSessionListener(SessionListener listener) {
synchronized (listeners) {
listeners.remove(listener);
}
}
/**
* Bind an object to a specified name in the internal notes associated
* with this session, replacing any existing binding for this name.
*
* @param name Name to which the object should be bound
* @param value Object to be bound to the specified name
*/
public void setNote(String name, Object value) {
notes.put(name, value);
}
// START SJSAS 6329289
/**
* Checks whether this Session has expired.
*
* @return true if this Session has expired, false otherwise
*/
public boolean hasExpired() {
if (maxInactiveInterval >= 0
&& (System.currentTimeMillis() - thisAccessedTime >=
maxInactiveInterval * 1000L)) {
return true;
} else {
return false;
}
}
// END SJSAS 6329289
/**
* Increments the version number
*/
public long incrementVersion() {
return version.incrementAndGet();
}
/**
* Gets the version number
*/
public long getVersion() {
return version.get();
}
/**
* Sets the version number
*/
public void setVersion(long value) {
version.set(value);
}
/**
* Return the single sign on id.
* It is null if there is no SSO.
*/
public String getSsoId() {
return ssoId;
}
/**
* Set the single sign on id.
*/
public void setSsoId(String ssoId) {
this.ssoId = ssoId;
}
/**
* Return the single sign on version.
*/
public long getSsoVersion() {
return ssoVersion;
}
/**
* Set the single sign on version.
*/
public void setSsoVersion(long value) {
ssoVersion = value;
}
/**
* Return a string representation of this object.
*/
public String toString() {
// STARTS S1AS
/*
StringBuilder sb = new StringBuilder();
sb.append("StandardSession[");
sb.append(id);
sb.append("]");
return (sb.toString());
*/
// END S1AS
// START S1AS
StringBuilder sb = null;
if(!this.isValid) {
sb = new StringBuilder();
} else {
sb = new StringBuilder(1000);
}
sb.append("StandardSession[");
sb.append(id);
sb.append("]");
if (this.isValid) {
Enumeration attrNamesEnum = getAttributeNames();
while(attrNamesEnum.hasMoreElements()) {
String nextAttrName = attrNamesEnum.nextElement();
Object nextAttrValue = getAttribute(nextAttrName);
sb.append("\n");
sb.append("attrName = " + nextAttrName);
sb.append(" : attrValue = " + nextAttrValue);
}
}
return sb.toString();
// END S1AS
}
// ------------------------------------------------ Session Package Methods
/**
* Creates a StandardSession instance from the given ObjectInputStream,
* and returns it.
*
* If ObjectInputStream does not contain a serialized StandardSession
* (or one of its subclasses), this method will create an empty session
* and populate it with the serialized data (this is for backwards
* compatibility).
*
* @param ois The ObjectInputStream from which to read the serialized
* session data
* @param manager The session manager from which to create an empty
* session if needed
*
* @return The restored session
*
* @exception ClassNotFoundException If the class for an object being
* restored cannot be found.
* @exception IOException if I/O errors occur
*/
static StandardSession deserialize(ObjectInputStream ois,
Manager manager)
throws ClassNotFoundException, IOException {
StandardSession result = null;
try {
threadContextManager.set(manager);
Object obj = ois.readObject();
if (obj instanceof StandardSession) {
// New format following standard serialization
result = (StandardSession) obj;
} else {
// Old format, obj is an instance of Long and contains the
// session's creation time
result = (StandardSession) manager.createEmptySession();
result.setCreationTime(((Long) obj).longValue());
result.readRemainingObject(ois);
}
}
finally {
threadContextManager.remove();
}
return result;
}
// ------------------------------------------------- HttpSession Properties
/**
* Return the time when this session was created, in milliseconds since
* midnight, January 1, 1970 GMT.
*
* @exception IllegalStateException if this method is called on an
* invalidated session
*/
public long getCreationTime() {
if (!isValid())
throw new IllegalStateException
("getCreationTime: " + rb.getString(LogFacade.SESSION_INVALIDATED_EXCEPTION));
return (this.creationTime);
}
/**
* Return the ServletContext to which this session belongs.
*/
public ServletContext getServletContext() {
if (manager == null)
return (null);
if (context == null)
return (null);
else
return (context.getServletContext());
}
/**
* Return the session context with which this session is associated.
*
* @deprecated As of Version 2.1, this method is deprecated and has no
* replacement. It will be removed in a future version of the
* Java Servlet API.
*/
public HttpSessionContext getSessionContext() {
if (sessionContext == null)
sessionContext = new StandardSessionContext();
return (sessionContext);
}
// ----------------------------------------------HttpSession Public Methods
/**
* Return the object bound with the specified name in this session, or
* null
if no object is bound with that name.
*
* @param name Name of the attribute to be returned
* * @exception IllegalStateException if this method is called on an
* invalidated session
*/
public Object getAttribute(String name) {
if (!isValid())
throw new IllegalStateException
("getAttribute: " + rb.getString(LogFacade.SESSION_INVALIDATED_EXCEPTION));
if (name == null) return null;
return (attributes.get(name));
}
@Override
public Map getAttributes() {
return attributes;
}
/**
* Return an Enumeration
of String
objects
* containing the names of the objects bound to this session.
*
* @exception IllegalStateException if this method is called on an
* invalidated session
*/
public Enumeration getAttributeNames() {
if (!isValid())
throw new IllegalStateException
("getAttributeNames: " + rb.getString(LogFacade.SESSION_INVALIDATED_EXCEPTION));
return (new Enumerator(attributes.keySet(), true));
}
/**
* Return the object bound with the specified name in this session, or
* null
if no object is bound with that name.
*
* @param name Name of the value to be returned
*
* @exception IllegalStateException if this method is called on an
* invalidated session
*
* @deprecated As of Version 2.2, this method is replaced by
* getAttribute()
*/
public Object getValue(String name) {
return (getAttribute(name));
}
/**
* Return the set of names of objects bound to this session. If there
* are no such objects, a zero-length array is returned.
*
* @exception IllegalStateException if this method is called on an
* invalidated session
*
* @deprecated As of Version 2.2, this method is replaced by
* getAttributeNames()
*/
public String[] getValueNames() {
if (!isValid())
throw new IllegalStateException
("getValueNames: " + rb.getString(LogFacade.SESSION_INVALIDATED_EXCEPTION));
return (keys());
}
// ------------------------session locking --HERCULES:add-------------------
/**
* get this session locked for foreground
* if the session is found to be presently background
* locked; retry logic in a time-decay polling loop
* waits for background lock to clear
* after 6 attempts (12.6 seconds) it unlocks the
* session and acquires the foreground lock
*/
protected boolean getSessionLockForForeground() {
boolean result = false;
StandardSession sess = (StandardSession) this;
//now lock the session
//System.out.println("IN LOCK_SESSION_FOR_FOREGROUND: sess =" + sess);
long pollTime = 200L;
int tryNumber = 0;
int numTries = 7;
boolean keepTrying = true;
boolean lockResult = false;
//System.out.println("locking session: sess =" + sess);
//try to lock up to numTries (i.e. 7) times
//poll and wait starting with 200 ms
while(keepTrying) {
lockResult = sess.lockForeground();
if(lockResult) {
keepTrying = false;
result = true;
break;
}
tryNumber++;
if(tryNumber < (numTries - 1) ) {
pollTime = pollTime * 2L;
} else {
//unlock the background so we can take over
//FIXME: need to log warning for this situation
sess.unlockBackground();
}
}
//System.out.println("finished locking session: sess =" + sess);
//System.out.println("LOCK = " + sess.getSessionLock());
return result;
}
/**
* return whether this session is currently foreground locked
*/
public boolean isForegroundLocked() {
//in this case we are not using locks
//so just return false
if(_sessionLock == null)
return false;
synchronized(sessionLockMonitor) {
return _sessionLock.isForegroundLocked();
}
}
/**
* lock the session for foreground
* returns true if successful; false if unsuccessful
*/
public boolean lockBackground() {
//in this case we are not using locks
//so just return true
if(_sessionLock == null)
return true;
synchronized(sessionLockMonitor) {
return _sessionLock.lockBackground();
}
}
/**
* lock the session for background
* returns true if successful; false if unsuccessful
*/
public boolean lockForeground() {
//in this case we are not using locks
//so just return true
if(_sessionLock == null)
return true;
synchronized(sessionLockMonitor) {
return _sessionLock.lockForeground();
}
}
/**
* unlock the session completely
* irregardless of whether it was foreground or background locked
*/
public void unlockForegroundCompletely() {
//in this case we are not using locks
//so just return true
if(_sessionLock == null)
return;
synchronized(sessionLockMonitor) {
_sessionLock.unlockForegroundCompletely();
}
}
/**
* unlock the session from foreground
*/
public void unlockForeground() {
//in this case we are not using locks
//so just return true
if(_sessionLock == null)
return;
synchronized(sessionLockMonitor) {
_sessionLock.unlockForeground();
}
}
/**
* unlock the session from background
*/
public void unlockBackground() {
//in this case we are not using locks
//so just return true
if(_sessionLock == null)
return;
synchronized(sessionLockMonitor) {
_sessionLock.unlockBackground();
}
}
/**
* return the Session lock
*/
public SessionLock getSessionLock() {
return _sessionLock;
}
/**
* set the Session lock
* @param sessionLock
*/
public void setSessionLock(SessionLock sessionLock) {
_sessionLock = sessionLock;
}
/**
* @return true if this session has been locked by any
* out-of-band (i.e., non-http) request, false otherwise
*/
public boolean hasNonHttpLockOccurred() {
//in this case we are not using locks
//so just return false
if (_sessionLock == null) {
return false;
}
synchronized (sessionLockMonitor) {
return _sessionLock.hasNonHttpLockOccurred();
}
}
protected transient SessionLock _sessionLock = new SessionLock();
protected final Object sessionLockMonitor = new Object();
// ------------------------end session locking ---HERCULES:add--------
/**
* Invalidates this session and unbinds any objects bound to it.
*
* @exception IllegalStateException if this method is called on
* an invalidated session
* HERCULES:modified method
*/
public void invalidate() {
if (!isValid)
throw new IllegalStateException
("invalidate: " + rb.getString(LogFacade.SESSION_INVALIDATED_EXCEPTION));
//make sure foreground locked first
if(!this.isForegroundLocked()) {
this.getSessionLockForForeground();
}
// Cause this session to expire
try {
expire();
} finally {
this.unlockForeground();
}
}
/**
* Return true
if the client does not yet know about the
* session, or if the client chooses not to join the session. For
* example, if the server used only cookie-based sessions, and the client
* has disabled the use of cookies, then a session would be new on each
* request.
*
* @exception IllegalStateException if this method is called on an
* invalidated session
*/
public boolean isNew() {
if (!isValid())
throw new IllegalStateException
("isNew: " + rb.getString(LogFacade.SESSION_INVALIDATED_EXCEPTION));
return (this.isNew);
}
/**
* Bind an object to this session, using the specified name. If an object
* of the same name is already bound to this session, the object is
* replaced.
*
* After this method executes, and if the object implements
* HttpSessionBindingListener
, the container calls
* valueBound()
on the object.
*
* @param name Name to which the object is bound, cannot be null
* @param value Object to be bound, cannot be null
*
* @exception IllegalStateException if this method is called on an
* invalidated session
*
* @deprecated As of Version 2.2, this method is replaced by
* setAttribute()
*/
public void putValue(String name, Object value) {
setAttribute(name, value);
}
/**
* Remove the object bound with the specified name from this session. If
* the session does not have an object bound with this name, this method
* does nothing.
*
* After this method executes, and if the object implements
* HttpSessionBindingListener
, the container calls
* valueUnbound()
on the object.
*
* @param name Name of the object to remove from this session.
*
* @exception IllegalStateException if this method is called on an
* invalidated session
*/
public void removeAttribute(String name) {
removeAttribute(name, true, true);
}
/**
* Remove the object bound with the specified name from this session. If
* the session does not have an object bound with this name, this method
* does nothing.
*
* After this method executes, and if the object implements
* HttpSessionBindingListener
, the container calls
* valueUnbound()
on the object.
*
* @param name Name of the object to remove from this session.
* @param notify Should we notify interested listeners that this
* attribute is being removed?
* @param checkValid Indicates whether IllegalStateException must be
* thrown if session has already been invalidated
*
* @exception IllegalStateException if this method is called on an
* invalidated session
*/
public void removeAttribute(String name, boolean notify,
boolean checkValid) {
if (name == null) return;
// Validate our current state
if (!isValid() && checkValid)
throw new IllegalStateException
("removeAttribute: " + rb.getString(LogFacade.SESSION_INVALIDATED_EXCEPTION));
// Remove this attribute from our collection
Object value = attributes.remove(name);
// Do we need to do valueUnbound() and attributeRemoved() notification?
if (!notify || (value == null)) {
return;
}
// Call the valueUnbound() method if necessary
HttpSessionBindingEvent event = null;
if (value instanceof HttpSessionBindingListener) {
event = new HttpSessionBindingEvent(getSession(), name, value);
try {
context.fireContainerEvent(
ContainerEvent.BEFORE_SESSION_VALUE_UNBOUND, null);
((HttpSessionBindingListener) value).valueUnbound(event);
context.fireContainerEvent(
ContainerEvent.AFTER_SESSION_VALUE_UNBOUND, null);
} catch (Throwable t) {
// Log exception
context.fireContainerEvent(
ContainerEvent.AFTER_SESSION_VALUE_UNBOUND, null);
}
}
// Notify special event listeners on removeAttribute
//HERCULES:add
// fire container event
context.fireContainerEvent("sessionRemoveAttributeCalled", event);
// fire sync container event if name equals SYNC_STRING
if (SYNC_STRING.equals(name)) {
context.fireContainerEvent("sessionSync", (new HttpSessionBindingEvent(getSession(), name)));
}
//END HERCULES:add
// Notify interested application event listeners
List listeners = context.getApplicationEventListeners();
if (listeners.isEmpty()) {
return;
}
Iterator iter = listeners.iterator();
while (iter.hasNext()) {
EventListener eventListener = iter.next();
if (!(eventListener instanceof HttpSessionAttributeListener)) {
continue;
}
HttpSessionAttributeListener listener =
(HttpSessionAttributeListener) eventListener;
try {
fireContainerEvent(context,
"beforeSessionAttributeRemoved",
listener);
if (event == null) {
event = new HttpSessionBindingEvent(getSession(), name, value);
}
listener.attributeRemoved(event);
fireContainerEvent(context,
"afterSessionAttributeRemoved",
listener);
} catch (Throwable t) {
try {
fireContainerEvent(context,
"afterSessionAttributeRemoved",
listener);
} catch (Exception e) {
// Ignore
}
log(rb.getString(LogFacade.SESSION_ATTRIBUTE_EVENT_LISTENER_EXCEPTION), t);
}
}
}
/**
* Remove the object bound with the specified name from this session. If
* the session does not have an object bound with this name, this method
* does nothing.
*
* After this method executes, and if the object implements
* HttpSessionBindingListener
, the container calls
* valueUnbound()
on the object.
*
* @param name Name of the object to remove from this session.
*
* @exception IllegalStateException if this method is called on an
* invalidated session
*
* @deprecated As of Version 2.2, this method is replaced by
* removeAttribute()
*/
public void removeValue(String name) {
removeAttribute(name);
}
/**
* Bind an object to this session, using the specified name. If an object
* of the same name is already bound to this session, the object is
* replaced.
*
* After this method executes, and if the object implements
* HttpSessionBindingListener
, the container calls
* valueBound()
on the object.
*
* @param name Name to which the object is bound, cannot be null
* @param value Object to be bound, cannot be null
*
* @exception IllegalArgumentException if an attempt is made to add a
* non-serializable object in an environment marked distributable.
* @exception IllegalStateException if this method is called on an
* invalidated session
*/
public void setAttribute(String name, Object value) {
// Name cannot be null
if (name == null)
throw new IllegalArgumentException
(rb.getString(LogFacade.NAME_PARAMETER_CANNOT_BE_NULL_EXCEPTION));
// Null value is the same as removeAttribute()
if (value == null) {
removeAttribute(name);
return;
}
// Validate our current state
if (!isValid()) {
throw new IllegalStateException
("setAttribute: "+ rb.getString(LogFacade.SESSION_INVALIDATED_EXCEPTION));
}
if (manager != null) {
manager.checkSessionAttribute(name, value);
}
// Construct an event with the new value
HttpSessionBindingEvent event = null;
// Call the valueBound() method if necessary
if (value instanceof HttpSessionBindingListener) {
event = new HttpSessionBindingEvent(getSession(), name, value);
try {
((HttpSessionBindingListener) value).valueBound(event);
} catch (Throwable t){
log(rb.getString(LogFacade.SESSION_BINDING_EVENT_LISTENER_EXCEPTION), t);
}
}
// Replace or add this attribute
Object unbound = attributes.put(name, value);
// Call the valueUnbound() method if necessary
if ((unbound != null) &&
(unbound instanceof HttpSessionBindingListener)) {
try {
context.fireContainerEvent(
ContainerEvent.BEFORE_SESSION_VALUE_UNBOUND, null);
((HttpSessionBindingListener) unbound).valueUnbound
(new HttpSessionBindingEvent(getSession(), name));
context.fireContainerEvent(
ContainerEvent.AFTER_SESSION_VALUE_UNBOUND, null);
} catch (Throwable t) {
context.fireContainerEvent(
ContainerEvent.AFTER_SESSION_VALUE_UNBOUND, null);
log(rb.getString(LogFacade.SESSION_BINDING_EVENT_LISTENER_EXCEPTION), t);
}
}
//HERCULES:add
// fire sync container event if name equals SYNC_STRING
if (SYNC_STRING.equals(name)) {
context.fireContainerEvent("sessionSync",
new HttpSessionBindingEvent(getSession(), name));
}
//end HERCULES:add
// Notify interested application event listeners
List listeners = context.getApplicationEventListeners();
if (listeners.isEmpty()) {
return;
}
Iterator iter = listeners.iterator();
while (iter.hasNext()) {
EventListener eventListener = iter.next();
if (!(eventListener instanceof HttpSessionAttributeListener)) {
continue;
}
HttpSessionAttributeListener listener =
(HttpSessionAttributeListener) eventListener;
try {
if (unbound != null) {
fireContainerEvent(context,
"beforeSessionAttributeReplaced",
listener);
if (event == null) {
event = new HttpSessionBindingEvent
(getSession(), name, unbound);
}
listener.attributeReplaced(event);
fireContainerEvent(context,
"afterSessionAttributeReplaced",
listener);
} else {
fireContainerEvent(context,
"beforeSessionAttributeAdded",
listener);
if (event == null) {
event = new HttpSessionBindingEvent(
getSession(), name, value);
}
listener.attributeAdded(event);
fireContainerEvent(context,
"afterSessionAttributeAdded",
listener);
}
} catch (Throwable t) {
try {
if (unbound != null) {
fireContainerEvent(context,
"afterSessionAttributeReplaced",
listener);
} else {
fireContainerEvent(context,
"afterSessionAttributeAdded",
listener);
}
} catch (Exception e) {
// Ignore
}
log(rb.getString(LogFacade.SESSION_ATTRIBUTE_EVENT_LISTENER_EXCEPTION), t);
}
}
}
// ------------------------------------------ HttpSession Protected Methods
/**
* Read a serialized version of this session object from the specified
* object input stream.
*
* IMPLEMENTATION NOTE : The reference to the owning Manager
* is not restored by this method, and must be set explicitly.
*
* @param stream The input stream to read from
*
* @exception ClassNotFoundException if an unknown class is specified
* @exception IOException if an input/output error occurs
*/
private void readObject(ObjectInputStream stream)
throws ClassNotFoundException, IOException {
if (listeners == null) {
listeners = new ArrayList<>();
}
if (notes == null) {
notes = new Hashtable<>();
}
if(checkedSerializableObjects == null) {
checkedSerializableObjects = buildSerializableCache();
}
// Deserialize the scalar instance variables (except Manager)
authType = null; // Transient only
/*
* The stream starts with a Long, which indicates the session's
* creation time. This Long may optionally be preceded by a Short,
* which indicates the session's serializedFormVersion.
*/
Object obj = stream.readObject();
short readSerializedFormVersion = 0;
if (obj instanceof Short) {
readSerializedFormVersion = ((Short) obj).shortValue();
creationTime = ((Long) stream.readObject()).longValue();
} else {
creationTime = ((Long) obj).longValue();
}
readRemainingObject(stream);
/*
* Any additional fields that are to be included in the serialized
* representation of this class MUST be written to the end of the
* stream (in writeObject), and must be read back in HERE, i.e.,
* AFTER readRemainingObject (which is shared by the code that reads
* in sessions that were serialized using an earlier, proprietary
* format) has returned.
*/
sipAppSessionId = (String) stream.readObject();
switch (readSerializedFormVersion) {
case 0:
// Do nothing
break;
case 1:
beKey = (String) stream.readObject();
break;
default:
throw new IOException("Unable to deserialize into "
+ getClass().getName()
+ " due to unknown serializedFormVersion of "
+ readSerializedFormVersion);
}
}
/**
* Reads the serialized session data from the given ObjectInputStream,
* with the assumption that the session's creation time, which appears
* first in the serialized data, has already been consumed.
*
* @param stream The ObjectInputStream from which to read the serialized
* session data
*
* @exception ClassNotFoundException If the class for an object being
* restored cannot be found.
* @exception IOException if I/O errors occur
*/
private void readRemainingObject(ObjectInputStream stream)
throws ClassNotFoundException, IOException {
version = new AtomicLong();
lastAccessedTime = ((Long) stream.readObject()).longValue();
maxInactiveInterval = ((Integer) stream.readObject()).intValue();
isNew = ((Boolean) stream.readObject()).booleanValue();
isValid = ((Boolean) stream.readObject()).booleanValue();
thisAccessedTime = ((Long) stream.readObject()).longValue();
/* SJSWS 6371339
principal = null; // Transient only
// setId((String) stream.readObject());
id = (String) stream.readObject();
*/
// START SJSWS 6371339
// Read the next object, if it is of type Principal, then
// store it in the principal variable
Object obj = stream.readObject();
if (obj instanceof Principal) {
principal = (Principal)obj;
id = (String) stream.readObject();
}
else {
principal = null;
id = (String) obj;
}
// END SJSWS 6371339
if (debug >= 2)
log("readObject() loading session " + id);
// START PWC 6444754
obj = stream.readObject();
int n = 0;
if (obj instanceof String) {
authType = (String) obj;
n = ((Integer) stream.readObject()).intValue();
} else {
n = ((Integer) obj).intValue();
}
// END PWC 6444754
// Deserialize the attribute count and attribute values
if (attributes == null)
attributes = new ConcurrentHashMap();
/* PWC 6444754
int n = ((Integer) stream.readObject()).intValue();
*/
boolean isValidSave = isValid;
isValid = true;
for (int i = 0; i < n; i++) {
String name = (String) stream.readObject();
Object value = stream.readObject();
if (value instanceof String) {
switch((String)value) {
case NOT_SERIALIZED:
continue;
case SEPARATE_BUFFER_SERIALIZATION:
{
value = stream.readObject();
ManagerBase mgr = (ManagerBase) getManager();
if (mgr == null) {
mgr = (ManagerBase)threadContextManager.get();
}
value = mgr.createObjectInputStream(new ByteArrayInputStream((byte[]) value)).readObject();
break;
}
}
}
if (debug >= 2)
log(" loading attribute '" + name +
"' with value '" + value + "'");
attributes.put(name, value);
}
isValid = isValidSave;
}
/**
* Write a serialized version of this session object to the specified
* object output stream.
*
* IMPLEMENTATION NOTE : The owning Manager will not be stored
* in the serialized representation of this Session. After calling
* readObject()
, you must set the associated Manager
* explicitly.
*
* IMPLEMENTATION NOTE : Any attribute that is not Serializable
* will be unbound from the session, with appropriate actions if it
* implements HttpSessionBindingListener. If you do not want any such
* attributes, be sure the distributable
property of the
* associated Manager is set to true
.
*
* @param stream The output stream to write to
*
* @exception IOException if an input/output error occurs
*/
private void writeObject(ObjectOutputStream stream) throws IOException {
stream.writeObject(SERIALIZED_FORM_VERSION);
stream.writeObject(Long.valueOf(creationTime));
stream.writeObject(Long.valueOf(lastAccessedTime));
stream.writeObject(Integer.valueOf(maxInactiveInterval));
stream.writeObject(Boolean.valueOf(isNew));
stream.writeObject(Boolean.valueOf(isValid));
stream.writeObject(Long.valueOf(thisAccessedTime));
// START SJSWS 6371339
// If the principal is serializable, write it out
// START PWC 6444754
boolean serialPrincipal = false;
// END PWC 6444754
if (principal instanceof java.io.Serializable) {
// START PWC 6444754
serialPrincipal = true;
// END PWC 6444754
stream.writeObject(principal);
}
// END SJSWS 6371339
stream.writeObject(id);
if (debug >= 2)
log("writeObject() storing session " + id);
// START PWC 6444754
if (serialPrincipal && authType != null) {
stream.writeObject(authType);
}
// END PWC 6444754
// Accumulate the names of serializable and non-serializable attributes
String keys[] = keys();
ArrayList saveNames = new ArrayList();
ArrayList saveValues = new ArrayList();
for (int i = 0; i < keys.length; i++) {
Object value = attributes.get(keys[i]);
if (value == null) {
continue;
//HERCULES:mod
/* original PE code next 4 lines
else if (value instanceof Serializable) {
saveNames.add(keys[i]);
saveValues.add(value);
}
*/
//original Hercules code was next line
//else if (value instanceof Serializable || value instanceof javax.ejb.EJBLocalObject || value instanceof javax.naming.Context || value instanceof javax.ejb.EJBLocalHome ) { //Bug 4853798
//FIXME: IndirectlySerializable includes more than 3 classes in Hercules code
//need to explore implications of this
} else if (isSerializable(value)) {
saveNames.add(keys[i]);
saveValues.add(value);
//end HERCULES:mod
} else {
removeAttribute(keys[i], true, true);
}
}
// Serialize the attribute count and the Serializable attributes
int n = saveNames.size();
stream.writeObject(Integer.valueOf(n));
for (int i = 0; i < n; i++) {
stream.writeObject(saveNames.get(i));
//HERCULES:mod
/* orignal PE code
try {
stream.writeObject(saveValues.get(i));
if (debug >= 2)
log(" storing attribute '" + saveNames.get(i) +
"' with value '" + saveValues.get(i) + "'");
} catch (NotSerializableException e) {
log(sm.getString("standardSession.notSerializable",
saveNames.get(i), id), e);
//standardSession.notSerializable=PWC2785: Cannot serialize session attribute {0} for session {1}
stream.writeObject(NOT_SERIALIZED);
if (debug >= 2)
log(" storing attribute '" + saveNames.get(i) +
"' with value NOT_SERIALIZED");
}
*end original PE code
*/
//following is replacement code from Hercules
Object val = saveValues.get(i);
Boolean serSuccess = checkedSerializableObjects.getIfPresent(val);
try {
if(serSuccess == null) {
ManagerBase mgr = (ManagerBase)getManager();
ByteArrayOutputStream baos = new ByteArrayOutputStream();
try (ObjectOutputStream oos = mgr.createObjectOutputStream(baos)) {
// need to write the object to temporary buffer,
// so main stream doesn't get corrupted in case of partial
// object write and NotSerializedException
checkedSerializableObjects.put(val, false);
oos.writeObject(val);
oos.flush();
stream.writeObject(SEPARATE_BUFFER_SERIALIZATION);
stream.writeObject(baos.toByteArray());
}
checkedSerializableObjects.put(val, true);
}
else if(serSuccess == true) {
stream.writeObject(val);
}
else {
stream.writeObject(NOT_SERIALIZED);
}
if (debug >= 2)
log(" storing attribute '" + saveNames.get(i) +
"' with value '" + saveValues.get(i) + "'");
} catch (IOException e) {
if((e instanceof NotSerializableException || e.getCause() instanceof NotSerializableException)
&& (serSuccess == null || serSuccess == false)) {
String msg = MessageFormat.format(rb.getString(LogFacade.CANNOT_SERIALIZE_SESSION_EXCEPTION),
new Object[] {saveNames.get(i), id});
log(msg, Level.WARNING);
stream.writeObject(NOT_SERIALIZED);
if (debug >= 2)
log(" storing attribute '" + saveNames.get(i) +
"' with value NOT_SERIALIZED");
}
else {
throw e;
}
}
//end HERCULES:mod
}
stream.writeObject(sipAppSessionId);
stream.writeObject(beKey);
}
/**
* Exclude attribute that cannot be serialized.
* @param name the attribute's name
*/
protected boolean exclude(String name){
for (int i = 0; i < excludedAttributes.length; i++) {
if (name.equalsIgnoreCase(excludedAttributes[i]))
return true;
}
return false;
}
protected void evaluateIfValid() {
/*
* If this session has expired or is in the process of expiring or
* will never expire, return
*/
if (!this.isValid || expiring || maxInactiveInterval < 0)
return;
isValid();
}
// ------------------------------------------------------ Protected Methods
/**
* Fire container events if the Context implementation is the
* org.apache.catalina.core.StandardContext
.
*
* @param context Context for which to fire events
* @param type Event type
* @param data Event data
*
* @exception Exception occurred during event firing
*/
protected void fireContainerEvent(Context context, String type, Object data)
throws Exception {
if (!(context instanceof StandardContext)) {
return; // Container events are not supported
}
// NOTE: Race condition is harmless, so do not synchronize
if (containerEventMethod == null) {
containerEventMethod =
context.getClass().getMethod("fireContainerEvent",
containerEventTypes);
}
Object containerEventParams[] = new Object[2];
containerEventParams[0] = type;
containerEventParams[1] = data;
containerEventMethod.invoke(context, containerEventParams);
}
/**
* Notify all session event listeners that a particular event has
* occurred for this Session. The default implementation performs
* this notification synchronously using the calling thread.
*
* @param type Event type
* @param data Event data
*/
public void fireSessionEvent(String type, Object data) {
// Fire monitoring probe
if (Session.SESSION_CREATED_EVENT.equals(type)) {
context.sessionCreatedEvent(this);
} else {
context.sessionDestroyedEvent(this);
}
if (listeners.size() < 1)
return;
SessionEvent event = new SessionEvent(this, type, data);
SessionListener list[] = new SessionListener[0];
synchronized (listeners) {
list = listeners.toArray(list);
}
for (int i = 0; i < list.length; i++){
(list[i]).sessionEvent(event);
}
}
/**
* Return the names of all currently defined session attributes
* as an array of Strings. If there are no defined attributes, a
* zero-length array is returned.
*/
protected String[] keys() {
if (attributes.size() > 0) {
// take a snapshot of attributes.keySet()
List list = new ArrayList();
for (String key : attributes.keySet()) {
list.add(key);
}
return list.toArray(new String[list.size()]);
} else {
return EMPTY_ARRAY;
}
}
/**
* Return the value of an attribute without a check for validity.
*/
protected Object getAttributeInternal(String name) {
return (attributes.get(name));
}
/**
* Log a message on the Logger associated with our Manager (if any).
*
* @param message Message to be logged
*/
protected void log(String message) {
if ((manager != null) && (manager instanceof ManagerBase)) {
((ManagerBase) manager).log(message);
} else {
log.log(Level.INFO, "StandardSession: " + message);
}
}
/**
* Log a message on the Logger associated with our Manager (if any).
*
* @param message Message to be logged
* @param t Associated exception
*/
protected void log(String message, Throwable t) {
if ((manager != null) && (manager instanceof ManagerBase)) {
((ManagerBase) manager).log(message, t);
} else {
log.log(Level.WARNING, "StandardSession: " + message, t);
}
}
/**
* Log a message on the Logger associated with our Manager (if any).
*
* @param message Message to be logged
* @param level
*/
protected void log(String message, Level level) {
log.log(level, "StandardSession: {0}", message);
}
/**
* Returns true if the given value may be serialized, false otherwise.
*
* A given value is considered serializable if it is an instance of
* java.io.Serializable or
* com.sun.enterprise.spi.io.BaseIndirectlySerializable, or if special
* serialization logic for it exists. For example, in the case of
* GlassFish, instances of javax.naming.Context are replaced with
* corresponding instances of SerializableJNDIContext during serialization
* (this is done by the specialized object outputstream returned by
* the JavaEEObjectStreamFactory mechanism).
*
* @return true if the given value may be serialized, false otherwise
*/
static boolean isSerializable(Object value) {
if ((value instanceof Serializable)
|| (value instanceof BaseIndirectlySerializable)
|| (value instanceof javax.naming.Context)) {
return true;
} else {
return false;
}
}
private static Cache buildSerializableCache() {
return CacheBuilder.newBuilder().softValues()
.maximumSize(Integer.getInteger(StandardSession.class.getName() + ".identityCacheSize", 100))
.build();
}
}
// ------------------------------------------------------------ Protected Class
/**
* This class is a dummy implementation of the HttpSessionContext
* interface, to conform to the requirement that such an object be returned
* when HttpSession.getSessionContext()
is called.
*
* @author Craig R. McClanahan
*
* @deprecated As of Java Servlet API 2.1 with no replacement. The
* interface will be removed in a future version of this API.
*/
final class StandardSessionContext implements HttpSessionContext {
private HashMap, String> dummy = new HashMap();
/**
* Return the session identifiers of all sessions defined
* within this context.
*
* @deprecated As of Java Servlet API 2.1 with no replacement.
* This method must return an empty Enumeration
* and will be removed in a future version of the API.
*/
public Enumeration getIds() {
return (new Enumerator(dummy));
}
/**
* Return the HttpSession
associated with the
* specified session identifier.
*
* @param id Session identifier for which to look up a session
*
* @deprecated As of Java Servlet API 2.1 with no replacement.
* This method must return null and will be removed in a
* future version of the API.
*/
public HttpSession getSession(String id) {
return (null);
}
}