/** * Assigns the given redirect port to each Connector whose corresponding * http-listener element in domain.xml does not specify its own * redirect-port attribute. * <p/> * The given defaultRedirectPort corresponds to the port number of the * first security-enabled http-listener in domain.xml. * <p/> * This method does nothing if none of the http-listener elements is * security-enabled, in which case Tomcat's default redirect port (443) * will be used. * * @param defaultRedirectPort The redirect port to be assigned to any * Connector object that doesn't specify its own */ private void setDefaultRedirectPort(int defaultRedirectPort) { if (defaultRedirectPort != -1) { Connector[] connectors = _embedded.getConnectors(); for (Connector connector : connectors) { if (connector.getRedirectPort() == -1) { connector.setRedirectPort(defaultRedirectPort); } } } }
/** * Find and return the Connector associated with this Service and Connector name. */ public Connector findConnector(String name) { for (Connector connector : connectors) { if (connector.getName().equals(name)) { return connector; } } return null; }
/** * Return the remote IP address making this Request. */ @Override public String getRemoteAddr() { if (remoteAddr == null) { // START SJSAS 6347215 if (connector.getAuthPassthroughEnabled() && connector.getProxyHandler() != null) { remoteAddr = connector.getProxyHandler().getRemoteAddress( getRequest()); if (remoteAddr == null && log.isLoggable(Level.FINEST)) { log.log(Level.FINEST, LogFacade.UNABLE_DETERMINE_CLIENT_ADDRESS); } return remoteAddr; } // END SJSAS 6347215 if (socket != null) { InetAddress inet = socket.getInetAddress(); remoteAddr = inet.getHostAddress(); } else { // coyoteRequest.action(ActionCode.ACTION_REQ_HOST_ADDR_ATTRIBUTE, coyoteRequest); remoteAddr = coyoteRequest.getRemoteAddr(); } } return remoteAddr; }
int redirectPort = request.getConnector().getRedirectPort();
public String getRemoteHost() { if (remoteHost == null) { if (!connector.getEnableLookups()) { remoteHost = getRemoteAddr(); } else if (connector.getAuthPassthroughEnabled() && connector.getProxyHandler() != null) { String addr = connector.getProxyHandler().getRemoteAddress(getRequest()); if (addr != null) { try {
private void log(String message, Throwable t) { org.apache.catalina.Logger logger = null; if (connector != null && connector.getContainer() != null) { logger = connector.getContainer().getLogger(); } String localName = "Response"; if (logger != null) { logger.log(localName + " " + message, t, org.apache.catalina.Logger.WARNING); } else { log.log(Level.WARNING, localName + " " + message, t); } }
/** * Set the requested session ID for this request. This is normally called * by the HTTP Connector, when it parses the request headers. * * This method, which is called when the session id is sent as a cookie, * or when it is encoded in the request URL, removes a jvmRoute * (if present) from the given id. * * @param id The new session id */ @Override public void setRequestedSessionId(String id) { requestedSessionId = id; if (id != null && connector.getJvmRoute() != null) { // Remove jvmRoute. The assumption is that the first dot in the // passed in id is the separator between the session id and the // jvmRoute. Therefore, the session id, however generated, must // never have any dots in it if the jvmRoute mechanism has been // enabled. There is no choice to use a separator other than dot // because this is the semantics mandated by the mod_jk LB for it // to function properly. // We can't use StandardContext.getJvmRoute() to determine whether // jvmRoute has been enabled, because this CoyoteRequest may not // have been associated with any context yet. int index = id.indexOf("."); if (index > 0) { requestedSessionId = id.substring(0, index); } } }
/** * Add a new Connector to the set of defined Connectors. The newly * added Connector will be associated with the most recently added Engine. * * @param connector The connector to be added * * @exception IllegalStateException if no engines have been added yet */ public synchronized void addConnector(Connector connector) { if (log.isLoggable(Level.FINE)) { log.log(Level.FINE, "Adding connector (" + connector.getInfo() + ")"); } // Make sure we have a Container to send requests to if (engines.length < 1) throw new IllegalStateException (rb.getString(LogFacade.NO_ENGINES_DEFINED)); /* * Add the connector. This will set the connector's container to the * most recently added Engine */ super.addConnector(connector); }
body.setLimit(request.getConnector().getMaxSavePostSize());
HttpServletResponse hresponse = (HttpServletResponse) response.getResponse(); int redirectPort = request.getConnector().getRedirectPort();
/** * Log a message on the Logger associated with our Container (if any). * * @param message Message to be logged * @param t Associated exception */ private void log(String message, Throwable t) { org.apache.catalina.Logger logger = null; if (connector != null && connector.getContainer() != null) { logger = connector.getContainer().getLogger(); } String localName = "Request"; if (logger != null) { logger.log(localName + " " + message, t, org.apache.catalina.Logger.WARNING); } else { log.log(Level.WARNING, localName + " " + message, t); } }
int redirectPort = request.getConnector().getRedirectPort();
/** * Stops and deletes the specified http listener. */ public void deleteConnector(NetworkListener httpListener) throws LifecycleException { Connector[] connectors = _embedded.findConnectors(); String name = httpListener.getName(); for (Connector conn : connectors) { if (name.equals(conn.getName())) { _embedded.removeConnector(conn); connectorMap.remove(name); } } }
/** * Returns the scheme for a redirect if it is not specified. */ private String getRedirectScheme() { String scheme = request.getScheme(); // START S1AS 6170450 if (getConnector() != null && getConnector().getAuthPassthroughEnabled()) { ProxyHandler proxyHandler = getConnector().getProxyHandler(); if (proxyHandler != null && proxyHandler.getSSLKeysize(request) > 0) { scheme = "https"; } } // END S1AS 6170450 return scheme; }
int n = -1; for (int i = 0; i < connectors.length; i++) { if (connectors[i].getContainer() == (Container) engine) { n = i; break;
/** * Stops and deletes the specified http listener. */ public void deleteConnector(WebConnector connector) throws LifecycleException { String name = connector.getName(); Connector[] connectors = _embedded.findConnectors(); for (Connector conn : connectors) { if (name.equals(conn.getName())) { _embedded.removeConnector(conn); connectorMap.remove(connector.getName()); } } }
/** * Return the scheme used to make this Request. */ @Override public String getScheme() { // START S1AS 6170450 if (getConnector() != null && getConnector().getAuthPassthroughEnabled()) { ProxyHandler proxyHandler = getConnector().getProxyHandler(); if (proxyHandler != null && proxyHandler.getSSLKeysize(getRequest()) > 0) { return "https"; } } // END S1AS 6170450 return coyoteRequest.getScheme(); }