com.sun.enterprise.web.connector.coyote.PECoyoteConnector Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of payara-micro Show documentation
Show all versions of payara-micro Show documentation
Micro Distribution of the Payara Project
/*
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
*
* Copyright (c) 1997-2017 Oracle and/or its affiliates. All rights reserved.
*
* The contents of this file are subject to the terms of either the GNU
* General Public License Version 2 only ("GPL") or the Common Development
* and Distribution License("CDDL") (collectively, the "License"). You
* may not use this file except in compliance with the License. You can
* obtain a copy of the License at
* https://glassfish.dev.java.net/public/CDDL+GPL_1_1.html
* or packager/legal/LICENSE.txt. See the License for the specific
* language governing permissions and limitations under the License.
*
* When distributing the software, include this License Header Notice in each
* file and include the License file at packager/legal/LICENSE.txt.
*
* GPL Classpath Exception:
* Oracle designates this particular file as subject to the "Classpath"
* exception as provided by Oracle in the GPL Version 2 section of the License
* file that accompanied this code.
*
* Modifications:
* If applicable, add the following below the License Header, with the fields
* enclosed by brackets [] replaced by your own identifying information:
* "Portions Copyright [year] [name of copyright owner]"
*
* Contributor(s):
* If you wish your version of this file to be governed by only the CDDL or
* only the GPL Version 2, indicate your decision by adding "[Contributor]
* elects to include this software in this distribution under the [CDDL or GPL
* Version 2] license." If you don't indicate a single choice of license, a
* recipient has the option to distribute your version of this file under
* either the CDDL, the GPL Version 2 or to extend the choice of license to
* its licensees as provided above. However, if you add GPL Version 2 code
* and therefore, elected the GPL Version 2 license, then the option applies
* only if the new code is made subject to such option by the copyright
* holder.
*/
// Portions Copyright [2018-2023] [Payara Foundation and/or its affiliates]
package com.sun.enterprise.web.connector.coyote;
import com.sun.appserv.ProxyHandler;
import com.sun.enterprise.config.serverbeans.ConfigBeansUtilities;
import com.sun.enterprise.config.serverbeans.HttpService;
import com.sun.enterprise.web.WebContainer;
import com.sun.enterprise.web.WebModule;
import com.sun.enterprise.web.connector.MapperListener;
import com.sun.enterprise.web.connector.extension.GrizzlyConfig;
import com.sun.enterprise.web.connector.grizzly.DummyConnectorLauncher;
import com.sun.enterprise.web.pwc.connector.coyote.PwcCoyoteRequest;
import jakarta.servlet.http.HttpServletRequest;
import org.apache.catalina.*;
import org.apache.catalina.connector.Connector;
import org.glassfish.grizzly.config.dom.*;
import org.glassfish.security.common.CipherInfo;
import org.glassfish.web.LogFacade;
import org.glassfish.web.admin.monitor.RequestProbeProvider;
import org.glassfish.web.util.IntrospectionUtils;
import javax.management.Notification;
import java.io.BufferedInputStream;
import java.io.File;
import java.io.FileInputStream;
import java.io.InputStream;
import java.text.MessageFormat;
import java.util.*;
import java.util.logging.Level;
import java.util.logging.Logger;
import static org.glassfish.grizzly.config.dom.Ssl.*;
public class PECoyoteConnector extends Connector {
private static final String DEFAULT_KEYSTORE_TYPE = "JKS";
private static final String DEFAULT_TRUSTSTORE_TYPE = "JKS";
private static final String DUMMY_CONNECTOR_LAUNCHER = DummyConnectorLauncher.class.getName();
protected static final Logger _logger = LogFacade.getLogger();
protected static final ResourceBundle _rb = _logger.getResourceBundle();
/**
* Are we recycling objects
*/
protected boolean recycleObjects;
/**
* The number of acceptor threads.
*/
protected int maxAcceptWorkerThreads;
/**
* The number of reader threads.
*/
protected int maxReadWorkerThreads;
/**
* The request timeout value used by the processor threads.
*/
protected int processorWorkerThreadsTimeout;
/**
* The increment number used by the processor threads.
*
protected int minProcessorWorkerThreadsIncrement;
*/
/**
* The size of the accept queue.
*/
protected int minAcceptQueueLength;
/**
* The size of the read queue
*/
protected int minReadQueueLength;
/**
* The size of the processor queue.
*/
protected int minProcessorQueueLength;
/**
* Use direct or non direct byte buffer.
*/
protected boolean useDirectByteBuffer;
// Are we using the NIO Connector or the CoyoteConnector
//private boolean coyoteOn = false;
/*
* Number of seconds before idle keep-alive connections expire
*/
private int keepAliveTimeoutInSeconds;
/*
* Number of keep-alive threads
*/
private int keepAliveThreadCount;
/**
* Maximum pending connection before refusing requests.
*/
private int queueSizeInBytes = 4096;
/**
* Server socket backlog.
*/
protected int ssBackLog = 4096;
/**
* Set the number of Selector
used by Grizzly.
*/
private int selectorReadThreadsCount = 0;
/**
* The monitoring classes used to gather stats.
*/
protected GrizzlyConfig grizzlyMonitor;
/**
* The root folder where application are deployed
*/
private String rootFolder = "";
/**
* Mapper listener.
*/
protected MapperListener mapperListener;
// --------------------------------------------- FileCache support --//
/**
* Timeout before remove the static resource from the cache.
*/
private int secondsMaxAge = -1;
/**
* The maximum entries in the fileCache
*/
private int maxCacheEntries = 1024;
/**
* The maximum size of a cached resources.
*/
private long minEntrySize = 2048;
/**
* The maximum size of a cached resources.
*/
private long maxEntrySize = 537600;
/**
* The maximum cached bytes
*/
private long maxLargeFileCacheSize = 10485760;
/**
* The maximum cached bytes
*/
private long maxSmallFileCacheSize = 1048576;
/**
* Is the FileCache enabled.
*/
private boolean fileCacheEnabled = true;
/**
* Is the large FileCache enabled.
*/
private boolean isLargeFileCacheEnabled = true;
/**
* Location of the CRL file
*/
private String crlFile;
/**
* The trust management algorithm
*/
private String trustAlgorithm;
/**
* The maximum number of non-self-issued intermediate
* certificates that may exist in a certification path
*/
private String trustMaxCertLength;
private WebContainer webContainer;
private RequestProbeProvider requestProbeProvider;
/**
* Constructor
*/
public PECoyoteConnector(WebContainer webContainer) {
this.webContainer = webContainer;
requestProbeProvider = webContainer.getRequestProbeProvider();
setProtocolHandlerClassName(DUMMY_CONNECTOR_LAUNCHER);
}
/**
* Create (or allocate) and return a Request object suitable for
* specifying the contents of a Request to the responsible ContractProvider.
*/
@Override
public Request createRequest() {
PwcCoyoteRequest request = new PwcCoyoteRequest();
request.setConnector(this);
return request;
}
/**
* Creates and returns Response object.
*
* @return Response object
*/
@Override
public Response createResponse() {
PECoyoteResponse response = new PECoyoteResponse();
response.setConnector(this);
return response;
}
/**
* Gets the number of seconds before a keep-alive connection that has
* been idle times out and is closed.
*
* @return Keep-alive timeout in number of seconds
*/
public int getKeepAliveTimeoutInSeconds() {
return keepAliveTimeoutInSeconds;
}
/**
* Sets the number of seconds before a keep-alive connection that has
* been idle times out and is closed.
*
* @param timeout Keep-alive timeout in number of seconds
*/
public void setKeepAliveTimeoutInSeconds(int timeout) {
keepAliveTimeoutInSeconds = timeout;
setProperty("keepAliveTimeoutInSeconds", String.valueOf(timeout));
}
/**
* Gets the number of keep-alive threads.
*
* @return Number of keep-alive threads
*/
public int getKeepAliveThreadCount() {
return keepAliveThreadCount;
}
/**
* Sets the number of keep-alive threads
*
* @param number Number of keep-alive threads
*/
public void setKeepAliveThreadCount(int number) {
keepAliveThreadCount = number;
setProperty("KeepAliveThreadCount", String.valueOf(number));
}
/**
* Set the maximum pending connection this Connector
* can handle.
*/
public void setQueueSizeInBytes(int queueSizeInBytes){
this.queueSizeInBytes = queueSizeInBytes;
setProperty("queueSizeInBytes", String.valueOf(queueSizeInBytes));
}
/**
* Return the maximum pending connection.
*/
public int getQueueSizeInBytes(){
return queueSizeInBytes;
}
/**
* Set the SocketServer
backlog.
*/
public void setSocketServerBacklog(int ssBackLog){
this.ssBackLog = ssBackLog;
setProperty("socketServerBacklog", String.valueOf(ssBackLog));
}
/**
* Return the maximum pending connection.
*/
public int getSocketServerBacklog(){
return ssBackLog;
}
/**
* Set the recycle-tasks
used by this Selector
*/
public void setRecycleObjects(boolean recycleObjects){
this.recycleObjects= recycleObjects;
setProperty("recycleObjects",
String.valueOf(recycleObjects));
}
/**
* Return the recycle-tasks
used by this
* Selector
*/
public boolean getRecycleObjects(){
return recycleObjects;
}
/**
* Set the reader-thread
from domian.xml.
*/
public void setMaxReadWorkerThreads(int maxReadWorkerThreads){
this.maxReadWorkerThreads = maxReadWorkerThreads;
setProperty("maxReadWorkerThreads",
String.valueOf(maxReadWorkerThreads));
}
/**
* Return the read-thread
used by this Selector
*/
public int getMaxReadWorkerThreads(){
return maxReadWorkerThreads;
}
/**
* Set the reader-thread
from domian.xml.
*/
public void setMaxAcceptWorkerThreads(int maxAcceptWorkerThreads){
this.maxAcceptWorkerThreads = maxAcceptWorkerThreads;
setProperty("maxAcceptWorkerThreads",
String.valueOf(maxAcceptWorkerThreads));
}
/**
* Return the read-thread
used by this Selector
*/
public int getMaxAcceptWorkerThreads(){
return maxAcceptWorkerThreads;
}
/**
* Set the acceptor-queue-length
value
* on this Selector
*/
public void setMinAcceptQueueLength(int minAcceptQueueLength){
this.minAcceptQueueLength = minAcceptQueueLength;
setProperty("minAcceptQueueLength",
String.valueOf(minAcceptQueueLength));
}
/**
* Return the acceptor-queue-length
value
* on this Selector
*/
public int getMinAcceptQueueLength(){
return minAcceptQueueLength;
}
/**
* Set the reader-queue-length
value
* on this Selector
*/
public void setMinReadQueueLength(int minReadQueueLength){
this.minReadQueueLength = minReadQueueLength;
setProperty("minReadQueueLength",
String.valueOf(minReadQueueLength));
}
/**
* Return the reader-queue-length
value
* on this Selector
*/
public int getMinReadQueueLength(){
return minReadQueueLength;
}
/**
* Set the processor-queue-length
value
* on this Selector
*/
public void setMinProcessorQueueLength(int minProcessorQueueLength){
this.minProcessorQueueLength = minProcessorQueueLength;
setProperty("minProcessorQueueLength",
String.valueOf(minProcessorQueueLength));
}
/**
* Return the processor-queue-length
value
* on this Selector
*/
public int getMinProcessorQueueLength(){
return minProcessorQueueLength;
}
/**
* Set the use-nio-non-blocking
by this Selector
*/
public void setUseDirectByteBuffer(boolean useDirectByteBuffer){
this.useDirectByteBuffer = useDirectByteBuffer;
setProperty("useDirectByteBuffer",
String.valueOf(useDirectByteBuffer));
}
/**
* Return the use-nio-non-blocking
used by this
* Selector
*/
public boolean getUseDirectByteBuffer(){
return useDirectByteBuffer;
}
public void setProcessorWorkerThreadsTimeout(int timeout){
processorWorkerThreadsTimeout = timeout;
setProperty("processorWorkerThreadsTimeout",
String.valueOf(timeout));
}
public int getProcessorWorkerThreadsTimeout(){
return processorWorkerThreadsTimeout;
}
/*public int getMinProcessorWorkerThreadsIncrement(){
return minProcessorWorkerThreadsIncrement;
}*/
public void setSelectorReadThreadsCount(int selectorReadThreadsCount) {
this.selectorReadThreadsCount = selectorReadThreadsCount;
setProperty("selectorReadThreadsCount",
String.valueOf(selectorReadThreadsCount));
}
public int getSelectorReadThreadsCount() {
return selectorReadThreadsCount;
}
@Override
public void start() throws LifecycleException {
super.start();
if( this.domain != null ) {
if (!"admin-listener".equals(getName())) {
// See IT 8255
mapper.removeContext(getDefaultHost(), "");
mapper.removeHost(getDefaultHost());
}
mapperListener.setDomain(domain);
// BEGIN S1AS 5000999
mapperListener.setNetworkListenerName(this.getName());
mapperListener.setDefaultHost(getDefaultHost());
// END S1AS 5000999
//mapperListener.setEngine( service.getContainer().getName() );
mapperListener.setInstanceName(getInstanceName());
mapperListener.init();
getService().getBroadcaster().addNotificationListener(mapperListener, mapperListener, null);
Notification notification =
new Notification("chloe", this.getObjectName(), 0);
getService().getBroadcaster().sendNotification(notification);
}
if ( grizzlyMonitor != null ) {
grizzlyMonitor.initConfig();
grizzlyMonitor.registerMonitoringLevelEvents();
}
}
@Override
public void stop() throws LifecycleException {
super.stop();
if ( grizzlyMonitor != null ) {
grizzlyMonitor.destroy();
grizzlyMonitor=null;
}
}
//------------------------------------------------- FileCache config -----/
/**
* The timeout in seconds before remove a FileCacheEntry
* from the fileCache
*/
public void setSecondsMaxAge(int sMaxAges) {
secondsMaxAge = sMaxAges;
setProperty("secondsMaxAge", String.valueOf(secondsMaxAge));
}
public int getSecondsMaxAge() {
return secondsMaxAge;
}
/**
* Set the maximum entries this cache can contains.
*/
public void setMaxCacheEntries(int mEntries){
maxCacheEntries = mEntries;
setProperty("maxCacheEntries", String.valueOf(maxCacheEntries));
}
/**
* Return the maximum entries this cache can contains.
*/
public int getMaxCacheEntries(){
return maxCacheEntries;
}
/**
* Set the maximum size a FileCacheEntry
can have.
*/
public void setMinEntrySize(long mSize){
minEntrySize = mSize;
setProperty("minEntrySize", String.valueOf(minEntrySize));
}
/**
* Get the maximum size a FileCacheEntry
can have.
*/
public long getMinEntrySize(){
return minEntrySize;
}
/**
* Set the maximum size a FileCacheEntry
can have.
*/
public void setMaxEntrySize(long mEntrySize){
maxEntrySize = mEntrySize;
setProperty("maxEntrySize", String.valueOf(maxEntrySize));
}
/**
* Get the maximum size a FileCacheEntry
can have.
*/
public long getMaxEntrySize(){
return maxEntrySize;
}
/**
* Set the maximum cache size
*/
public void setMaxLargeCacheSize(long mCacheSize){
maxLargeFileCacheSize = mCacheSize;
setProperty("maxLargeFileCacheSize",
String.valueOf(maxLargeFileCacheSize));
}
/**
* Get the maximum cache size
*/
public long getMaxLargeCacheSize(){
return maxLargeFileCacheSize;
}
/**
* Set the maximum cache size
*/
public void setMaxSmallCacheSize(long mCacheSize){
maxSmallFileCacheSize = mCacheSize;
setProperty("maxSmallFileCacheSize",
String.valueOf(maxSmallFileCacheSize));
}
/**
* Get the maximum cache size
*/
public long getMaxSmallCacheSize(){
return maxSmallFileCacheSize;
}
/**
* Is the fileCache enabled.
*/
public boolean isFileCacheEnabled(){
return fileCacheEnabled;
}
/**
* Is the file caching mechanism enabled.
*/
public void setFileCacheEnabled(boolean fileCacheEnabled){
this.fileCacheEnabled = fileCacheEnabled;
setProperty("fileCacheEnabled",String.valueOf(fileCacheEnabled));
}
/**
* Is the large file cache support enabled.
*/
public void setLargeFileCacheEnabled(boolean isLargeEnabled){
isLargeFileCacheEnabled = isLargeEnabled;
setProperty("largeFileCacheEnabled",
String.valueOf(isLargeFileCacheEnabled));
}
/**
* Is the large file cache support enabled.
*/
public boolean getLargeFileCacheEnabled(){
return isLargeFileCacheEnabled;
}
// --------------------------------------------------------------------//
/**
* Set the documenr root folder
*/
public void setWebAppRootPath(String rootFolder){
this.rootFolder = rootFolder;
setProperty("webAppRootPath",rootFolder);
}
/**
* Return the folder's root where application are deployed.
*/
public String getWebAppRootPath(){
return rootFolder;
}
/**
* Initialize this connector.
*/
@Override
public void initialize() throws LifecycleException {
super.initialize();
mapperListener = new MapperListener(mapper, webContainer);
// Set the monitoring.
grizzlyMonitor = new GrizzlyConfig(webContainer, domain, getPort());
}
/**
* Sets the truststore location of this connector.
*
* @param truststore The truststore location
*/
public void setTruststore(String truststore) {
setProperty("truststore", truststore);
}
/**
* Gets the truststore location of this connector.
*
* @return The truststore location
*/
public String getTruststore() {
return getProperty("truststore");
}
/**
* Sets the truststore type of this connector.
*
* @param type The truststore type
*/
public void setTruststoreType(String type) {
setProperty("truststoreType", type);
}
/**
* Gets the truststore type of this connector.
*
* @return The truststore type
*/
public String getTruststoreType() {
return getProperty("truststoreType");
}
/**
* Sets the keystore type of this connector.
*
* @param type The keystore type
*/
public void setKeystoreType(String type) {
setProperty("keystoreType", type);
}
/**
* Gets the keystore type of this connector.
*
* @return The keystore type
*/
public String getKeystoreType() {
return getProperty("keystoreType");
}
/**
* Gets the location of the CRL file
*
* @return The location of the CRL file
*/
public String getCrlFile() {
return crlFile;
}
/**
* Sets the location of the CRL file.
*
* @param crlFile The location of the CRL file
*/
public void setCrlFile(String crlFile) {
this.crlFile = crlFile;
setProperty("crlFile", crlFile);
}
/**
* Gets the trust management algorithm
*
* @return The trust management algorithm
*/
public String getTrustAlgorithm() {
return trustAlgorithm;
}
/**
* Sets the trust management algorithm
*
* @param trustAlgorithm The trust management algorithm
*/
public void setTrustAlgorithm(String trustAlgorithm) {
this.trustAlgorithm = trustAlgorithm;
setProperty("truststoreAlgorithm", trustAlgorithm);
}
/**
* Gets the maximum number of non-self-issued intermediate
* certificates that may exist in a certification path
*
* @return The maximum number of non-self-issued intermediate
* certificates that may exist in a certification path
*/
public String getTrustMaxCertLength() {
return trustMaxCertLength;
}
/**
* Sets the maximum number of non-self-issued intermediate
* certificates that may exist in a certification path
*
* @param trustMaxCertLength The maximum number of non-self-issued
* intermediate certificates that may exist in a certification path
*/
public void setTrustMaxCertLength(String trustMaxCertLength) {
this.trustMaxCertLength = trustMaxCertLength;
setProperty("trustMaxCertLength", trustMaxCertLength);
}
/**
* Gets the MapperListener of this connector.
*
* @return The MapperListener of this connector
*/
public MapperListener getMapperListener() {
return mapperListener;
}
/*
* Configures this connector.
*
* @param listener The http-listener that corresponds to the given
* connector
* @param isSecure true if the connector is security-enabled, false
* otherwise
* @param httpServiceProps The http-service properties
*/
public void configure(NetworkListener listener, boolean isSecure,
HttpService httpService) {
final Transport transport = listener.findTransport();
try {
setSocketServerBacklog(
Integer.parseInt(transport.getMaxConnectionsCount()));
} catch (NumberFormatException ex) {
String msg = MessageFormat.format(
_rb.getString(LogFacade.INVALID_MAX_PENDING_COUNT), transport.getMaxConnectionsCount(),
Integer.toString(getSocketServerBacklog()));
_logger.log(Level.WARNING, msg, ex);
}
/* TODO
//WebContainerFeatureFactory wcFeatureFactory = _serverContext.getDefaultHabitat().getService(WebContainerFeatureFactory.class);
String sslImplementationName =
webFeatureFactory.getSSLImplementationName();
if (sslImplementationName != null) {
connector.setProperty("sSLImplementation",sslImplementationName);
}*/
setDomain(webContainer.getServerContext().getDefaultDomainName());
configureSSL(listener);
configureThreadPool(listener.findThreadPool());
final Http http = listener.findHttpProtocol().getHttp();
configureFileCache(http.getFileCache());
setMaxHttpHeaderSize(Integer.parseInt(http.getSendBufferSizeBytes()));
setDefaultHost(http.getDefaultVirtualServer());
setEnableLookups(ConfigBeansUtilities.toBoolean(http.getDnsLookupEnabled()));
if (Boolean.parseBoolean(http.getCookieSameSiteEnabled())) {
setProperty("sameSiteValue", http.getCookieSameSiteValue());
}
setXpoweredBy(Boolean.valueOf(http.getXpoweredBy()));
// Application root
setWebAppRootPath(webContainer.getModulesRoot().getAbsolutePath());
// server-name (may contain scheme and colon-separated port number)
String serverName = http.getServerName();
if (serverName != null && serverName.length() > 0) {
// Ignore scheme, which was required for webcore issued redirects
// in 8.x EE
if (serverName.startsWith("http://")) {
serverName = serverName.substring("http://".length());
} else if (serverName.startsWith("https://")) {
serverName = serverName.substring("https://".length());
}
int index = serverName.indexOf(':');
if (index != -1) {
setProxyName(serverName.substring(0, index).trim());
String serverPort = serverName.substring(index+1).trim();
if (serverPort.length() > 0) {
try {
setProxyPort(Integer.parseInt(serverPort));
} catch (NumberFormatException nfe) {
_logger.log(Level.SEVERE,
LogFacade.INVALID_PROXY_PORT,
new Object[] { serverPort, listener.getName() });
}
}
} else {
setProxyName(serverName);
}
}
// redirect-port
String redirectPort = http.getRedirectPort();
if (redirectPort != null && redirectPort.length() != 0) {
try {
setRedirectPort(Integer.parseInt(redirectPort));
} catch (NumberFormatException nfe) {
_logger.log(Level.WARNING,
LogFacade.INVALID_REDIRECT_PORT,
new Object[] {
redirectPort,
listener.getName(),
Integer.toString(getRedirectPort()) });
}
} else {
setRedirectPort(-1);
}
// acceptor-threads
String acceptorThreads = transport.getAcceptorThreads();
if (acceptorThreads != null) {
try {
setSelectorReadThreadsCount(Integer.parseInt(
acceptorThreads));
} catch (NumberFormatException nfe) {
_logger.log(Level.WARNING,
LogFacade.INVALID_ACCEPTOR_THREADS,
new Object[] {
acceptorThreads,
listener.getName(),
Integer.toString(getMaxProcessors()) });
}
}
// Configure Connector with keystore password and location
if (isSecure) {
configureKeysAndCerts();
}
webContainer.configureHttpServiceProperties(httpService, this);
// Overrided http-service property if defined.
configureHttpListenerProperties(listener);
}
/*
* Configures this connector for modjk.
*/
public void configureJKProperties(final NetworkListener listener) {
File propertiesFile = null;
if (listener != null) {
propertiesFile = new File(listener.getJkConfigurationFile());
}
String propertyFile = System.getProperty("com.sun.enterprise.web.connector.enableJK.propertyFile");
if (propertiesFile!=null && !propertiesFile.exists() && propertyFile!=null) {
propertiesFile = new File(propertyFile);
}
if (propertiesFile==null) {
if (_logger.isLoggable(Level.FINEST)) {
_logger.log(Level.FINEST, LogFacade.JK_PROPERTIES_NOT_DEFINED);
}
return;
}
if (!propertiesFile.exists()) {
_logger.log(Level.WARNING,
MessageFormat.format(_rb.getString("pewebcontainer.missingJKProperties"),
propertiesFile.getAbsolutePath()));
return;
}
if (_logger.isLoggable(Level.FINEST)) {
_logger.log(Level.FINEST,
MessageFormat.format(_rb.getString(LogFacade.LOADING_JK_PROPERTIED),
propertiesFile.getAbsolutePath()));
}
try (InputStream is = new BufferedInputStream(new FileInputStream(propertiesFile))) {
Properties properties = new Properties();
properties.load(is);
Enumeration enumeration = properties.keys();
while (enumeration.hasMoreElements()) {
String propName = (String) enumeration.nextElement();
String value = properties.getProperty(propName);
if (value != null) {
IntrospectionUtils.setProperty(this, propName, value);
}
}
} catch (Exception ex) {
String msg = MessageFormat.format(_rb.getString(LogFacade.UNABLE_TO_CONFIGURE_JK), propertiesFile, getPort());
_logger.log(Level.SEVERE, msg, ex);
}
}
/**
* Configure the Grizzly FileCache mechanism
* @param fileCache
*/
public void configureFileCache(FileCache fileCache) {
if (fileCache != null) {
setLargeFileCacheEnabled(ConfigBeansUtilities.toBoolean(
fileCache.getEnabled()));
if (fileCache.getMaxAgeSeconds() != null) {
setSecondsMaxAge(Integer.parseInt(fileCache.getMaxAgeSeconds()));
}
if (fileCache.getMaxFilesCount() != null) {
setMaxCacheEntries(Integer.parseInt(
fileCache.getMaxFilesCount()));
}
if (fileCache.getMaxCacheSizeBytes() != null) {
setMaxLargeCacheSize(Integer.parseInt(fileCache.getMaxCacheSizeBytes()));
}
}
}
/**
* Configures this connector from the given thread-pool
* configuration bean.
*
* @param pool the thread-pool configuration bean
*/
public void configureThreadPool(ThreadPool pool){
if (pool != null) {
try {
setMaxProcessors(Integer.parseInt(
pool.getMaxThreadPoolSize()));
} catch (NumberFormatException ex) {
String msg = MessageFormat.format(_rb.getString(LogFacade.INVALID_THREAD_POOL_ATTRIBUTE), "max-thread-pool-size");
_logger.log(Level.WARNING, msg, ex);
}
try {
setMinProcessors(Integer.parseInt(
pool.getMinThreadPoolSize()));
} catch (NumberFormatException ex) {
String msg = MessageFormat.format(_rb.getString(LogFacade.INVALID_THREAD_POOL_ATTRIBUTE), "min-thread-pool-size");
_logger.log(Level.WARNING, msg, ex);
}
try {
setQueueSizeInBytes(Integer.parseInt(
pool.getMaxQueueSize()));
} catch (NumberFormatException ex) {
String msg = MessageFormat.format(_rb.getString(LogFacade.INVALID_THREAD_POOL_ATTRIBUTE), "max-queue-size");
_logger.log(Level.WARNING, msg, ex);
}
}
}
/**
* Configure http-listener property.
* return true if the property exists and has been set.
*/
public boolean configureHttpListenerProperty(String propName, String propValue)
throws NumberFormatException {
if ("proxyHandler".equals(propName)) {
setProxyHandler(propValue);
return true;
}
return false;
}
public void configHttpProperties(Http http, Transport transport, Ssl ssl) {
setAllowTrace(ConfigBeansUtilities.toBoolean(http.getTraceEnabled()));
setMaxKeepAliveRequests(Integer.parseInt(http.getMaxConnections()));
setKeepAliveTimeoutInSeconds(Integer.parseInt(http.getTimeoutSeconds()));
setAuthPassthroughEnabled(ConfigBeansUtilities.toBoolean(http.getAuthPassThroughEnabled()));
setMaxPostSize(Integer.parseInt(http.getMaxPostSizeBytes()));
setMaxSavePostSize(Integer.parseInt(http.getMaxSavePostSizeBytes()));
setProperty("compression", http.getCompression());
setProperty("compressableMimeType", http.getCompressableMimeType());
setProperty("compressionLevel", http.getCompressionLevel());
setProperty("compressionStrategy", http.getCompressionStrategy());
if (http.getNoCompressionUserAgents() != null) {
setProperty("noCompressionUserAgents", http.getNoCompressionUserAgents());
}
setProperty("compressionMinSize", http.getCompressionMinSizeBytes());
if (http.getRestrictedUserAgents() != null) {
setProperty("restrictedUserAgents", http.getRestrictedUserAgents());
}
setProperty("cometSupport",
Boolean.valueOf(ConfigBeansUtilities.toBoolean(http.getCometSupportEnabled())).toString());
setProperty("rcmSupport",
Boolean.valueOf(ConfigBeansUtilities.toBoolean(http.getRcmSupportEnabled())).toString());
setConnectionUploadTimeout(Integer.parseInt(http.getConnectionUploadTimeoutMillis()));
setDisableUploadTimeout(!ConfigBeansUtilities.toBoolean(http.getUploadTimeoutEnabled()));
setURIEncoding(http.getUriEncoding());
configSslOptions(ssl);
}
private void configSslOptions(final Ssl ssl) {
if (ssl != null) {
if (ssl.getCrlFile() != null) {
setCrlFile(ssl.getCrlFile());
}
if (ssl.getTrustAlgorithm() != null) {
setTrustAlgorithm(ssl.getTrustAlgorithm());
}
if (ssl.getTrustMaxCertLength() != null) {
setTrustMaxCertLength(ssl.getTrustMaxCertLength());
}
}
}
/*
* Loads and instantiates the ProxyHandler implementation
* class with the specified name, and sets the instantiated
* ProxyHandler on this connector.
*
* @param className The ProxyHandler implementation class name
*/
public void setProxyHandler(String className) {
Object handler = null;
try {
Class handlerClass = webContainer.loadCommonClass(className);
handler = handlerClass.newInstance();
} catch (Exception e) {
String msg = MessageFormat.format(_rb.getString(LogFacade.PROXY_HANDLER_CLASS_LOAD_ERROR), className);
_logger.log(Level.SEVERE, msg, e);
}
if (handler != null) {
if (!(handler instanceof ProxyHandler)) {
_logger.log(
Level.SEVERE,
LogFacade.PROXY_HANDLER_CLASS_INVALID,
className);
} else {
setProxyHandler((ProxyHandler) handler);
}
}
}
/*
* Request/response related probe events
*/
/**
* Fires probe event related to the fact that the given request has
* been entered the web container.
*
* @param request the request object
* @param host the virtual server to which the request was mapped
* @param context the Context to which the request was mapped
*/
@Override
public void requestStartEvent(HttpServletRequest request, Host host,
Context context) {
if (requestProbeProvider != null) {
String appName = null;
if (context instanceof WebModule) {
appName = ((WebModule) context).getMonitoringNodeName();
}
String hostName = null;
if (host != null) {
hostName = host.getName();
}
requestProbeProvider.requestStartEvent(
appName, hostName,
request.getServerName(), request.getServerPort(),
request.getContextPath(), request.getServletPath());
}
};
/**
* Fires probe event related to the fact that the given request is about
* to exit from the web container.
*
* @param request the request object
* @param host the virtual server to which the request was mapped
* @param context the Context to which the request was mapped
* @param statusCode the response status code
*/
@Override
public void requestEndEvent(HttpServletRequest request, Host host,
Context context, int statusCode) {
if (requestProbeProvider != null) {
String appName = null;
if (context instanceof WebModule) {
appName = ((WebModule) context).getMonitoringNodeName();
}
String hostName = null;
if (host != null) {
hostName = host.getName();
}
requestProbeProvider.requestEndEvent(
appName, hostName,
request.getServerName(), request.getServerPort(),
request.getContextPath(), request.getServletPath(),
statusCode, request.getMethod(), request.getRequestURI());
}
};
/*
* Configures the SSL properties on this PECoyoteConnector from the
* SSL config of the given HTTP listener.
*
* @param listener HTTP listener whose SSL config to use
*/
private void configureSSL(NetworkListener listener) {
Ssl sslConfig = listener.findHttpProtocol().getSsl();
if (sslConfig == null) {
return;
}
// client-auth
if (Boolean.valueOf(sslConfig.getClientAuthEnabled())) {
setClientAuth(true);
}
// ssl protocol variants
List sslProtocolsBuf = new ArrayList<>();
if (Boolean.valueOf(sslConfig.getTls12Enabled())) {
sslProtocolsBuf.add(TLS12);
}
if (Boolean.valueOf(sslConfig.getTls13Enabled())) {
sslProtocolsBuf.add(TLS13);
}
if (sslProtocolsBuf.isEmpty()) {
_logger.log(Level.WARNING, LogFacade.ALL_SSL_PROTOCOLS_DISABLED, listener.getName());
} else {
setSslProtocols(String.join(", ", sslProtocolsBuf));
}
// cert-nickname
String certNickname = sslConfig.getCertNickname();
if (certNickname != null && certNickname.length() > 0) {
setKeyAlias(sslConfig.getCertNickname());
}
// ssl3-tls-ciphers
String ciphers = sslConfig.getSsl3TlsCiphers();
if (ciphers != null) {
String jsseCiphers = getJSSECiphers(ciphers);
if (jsseCiphers == null) {
if (_logger.isLoggable(Level.FINE)) {
_logger.log(Level.FINE, LogFacade.ALL_CIPHERS_DISABLED, listener.getName());
}
} else {
setCiphers(jsseCiphers);
}
}
}
/*
* Configures this connector with its keystore and truststore.
*/
private void configureKeysAndCerts() {
/*
* Keystore
*/
String prop = System.getProperty("javax.net.ssl.keyStore");
String keyStoreType = System.getProperty("javax.net.ssl.keyStoreType",DEFAULT_KEYSTORE_TYPE);
if (prop != null) {
// PE
setKeystoreFile(prop);
setKeystoreType(keyStoreType);
}
/*
* Get keystore password from password.conf file.
* Notice that JSSE, the underlying SSL implementation in PE,
* currently does not support individual key entry passwords
* that are different from the keystore password.
*
String ksPasswd = null;
try {
ksPasswd = PasswordConfReader.getKeyStorePassword();
} catch (IOException ioe) {
// Ignore
}
if (ksPasswd == null) {
ksPasswd = System.getProperty("javax.net.ssl.keyStorePassword");
}
if (ksPasswd != null) {
try {
connector.setKeystorePass(ksPasswd);
} catch (Exception e) {
_logger.log(Level.SEVERE,
"pewebcontainer.http_listener_keystore_password_exception",
e);
}
}*/
/*
* Truststore
*/
prop = System.getProperty("javax.net.ssl.trustStore");
if (prop != null) {
// PE
setTruststore(prop);
setTruststoreType(DEFAULT_TRUSTSTORE_TYPE);
}
}
/**
* Configure http-listener properties
*/
private void configureHttpListenerProperties(NetworkListener listener) {
// Configure Connector with properties
configHttpProperties(listener.findHttpProtocol().getHttp(),
listener.findTransport(), listener.findHttpProtocol().getSsl());
}
/*
* Parses the given comma-separated string of cipher suite names,
* converts each cipher suite that is enabled (i.e., not preceded by a
* '-') to the corresponding JSSE cipher suite name, and returns a string
* of comma-separated JSSE cipher suite names.
*
* @param sslCiphers String of SSL ciphers to parse
*
* @return String of comma-separated JSSE cipher suite names, or null if
* none of the cipher suites in the given string are enabled or can be
* mapped to corresponding JSSE cipher suite names
*/
private String getJSSECiphers(String ciphers) {
String cipher = null;
StringBuilder enabledCiphers = null;
boolean first = true;
int index = ciphers.indexOf(',');
if (index != -1) {
int fromIndex = 0;
while (index != -1) {
cipher = ciphers.substring(fromIndex, index).trim();
if (cipher.length() > 0 && !cipher.startsWith("-")) {
if (cipher.startsWith("+")) {
cipher = cipher.substring(1);
}
String jsseCipher = getJSSECipher(cipher);
if (jsseCipher == null) {
_logger.log(Level.WARNING,
LogFacade.UNRECOGNIZED_CIPHER, cipher);
} else {
if (enabledCiphers == null) {
enabledCiphers = new StringBuilder();
}
if (!first) {
enabledCiphers.append(", ");
} else {
first = false;
}
enabledCiphers.append(jsseCipher);
}
}
fromIndex = index + 1;
index = ciphers.indexOf(',', fromIndex);
}
cipher = ciphers.substring(fromIndex);
} else {
cipher = ciphers;
}
if (cipher != null) {
cipher = cipher.trim();
if (cipher.length() > 0 && !cipher.startsWith("-")) {
if (cipher.startsWith("+")) {
cipher = cipher.substring(1);
}
String jsseCipher = getJSSECipher(cipher);
if (jsseCipher == null) {
_logger.log(Level.WARNING,
LogFacade.UNRECOGNIZED_CIPHER, cipher);
} else {
if (enabledCiphers == null) {
enabledCiphers = new StringBuilder();
}
if (!first) {
enabledCiphers.append(", ");
} else {
first = false;
}
enabledCiphers.append(jsseCipher);
}
}
}
return enabledCiphers == null ? null : enabledCiphers.toString();
}
/*
* Converts the given cipher suite name to the corresponding JSSE cipher.
*
* @param cipher The cipher suite name to convert
*
* @return The corresponding JSSE cipher suite name, or null if the given
* cipher suite name can not be mapped
*/
private String getJSSECipher(String cipher) {
String jsseCipher = null;
CipherInfo ci = CipherInfo.getCipherInfo(cipher);
if( ci != null ) {
jsseCipher = ci.getCipherName();
}
return jsseCipher;
}
}