code
stringlengths
73
34.1k
label
stringclasses
1 value
@Override public void ready(VirtualConnection inVC) { if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) { Tr.entry(tc, "ready, vc=" + getVCHash()); } // Double check for error condition where close already happened. Protective measure. if (!closed && FrameworkState.isValid()) { try { // Outbound connections took care of sslContext and sslEngine creation already. // If inbound, discrimination may have already created the engine and context if (isInbound) { // See if discrimination ran already. Get the state map from the VC. Map<Object, Object> stateMap = inVC.getStateMap(); // Extract and remove result of discrimination, if it happened. discState = (SSLDiscriminatorState) stateMap.remove(SSLChannel.SSL_DISCRIMINATOR_STATE); if (discState != null) { // Discrimination has happened. Save already existing sslEngine. sslEngine = discState.getEngine(); sslContext = discState.getSSLContext(); setLinkConfig((SSLLinkConfig) stateMap.get(SSLConnectionLink.LINKCONFIG)); } else if (sslContext == null || getSSLEngine() == null) { // Create a new SSL context based on the current properties in the ssl config. sslContext = getChannel().getSSLContextForInboundLink(this, inVC); // Discrimination has not happened yet. Create new SSL engine. sslEngine = SSLUtils.getSSLEngine(sslContext, sslChannel.getConfig().getFlowType(), getLinkConfig(), this); } } else { // Outbound connect is ready. Ensure we have an sslContext and sslEngine. if (sslContext == null || getSSLEngine() == null) { // Create a new SSL context based on the current properties in the ssl config. sslContext = getChannel().getSSLContextForOutboundLink(this, inVC, targetAddress); // PK46069 - use engine that allows session id re-use sslEngine = SSLUtils.getOutboundSSLEngine( sslContext, getLinkConfig(), targetAddress.getRemoteAddress().getHostName(), targetAddress.getRemoteAddress().getPort(), this); } } if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) { Tr.debug(tc, "SSL engine hc=" + getSSLEngine().hashCode() + " associated with vc=" + getVCHash()); } // Flag that connection has been established. // Need to set this to true for inbound and outbound so close will work right. connected = true; // Determine if this is an inbound or outbound connection. if (isInbound) { readyInbound(inVC); } else { readyOutbound(inVC, true); } } catch (Exception e) { if (FrameworkState.isStopping()) { if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) { Tr.debug(tc, "Ignoring exception during server shutdown: " + e); } } else { if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) { Tr.debug(tc, "Caught exception during ready, " + e, e); } FFDCFilter.processException(e, getClass().getName(), "238", this); } close(inVC, e); } } else { if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) { Tr.debug(tc, "ready called after close so do nothing"); } } if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) { Tr.exit(tc, "ready"); } }
java
protected void readyInboundPostHandshake( WsByteBuffer netBuffer, WsByteBuffer decryptedNetBuffer, WsByteBuffer encryptedAppBuffer, HandshakeStatus hsStatus) { if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) { Tr.entry(tc, "readyInboundPostHandshake, vc=" + getVCHash()); } // Release the no longer needed buffers. encryptedAppBuffer.release(); if (hsStatus == HandshakeStatus.FINISHED) { AlpnSupportUtils.getAlpnResult(getSSLEngine(), this); // PK16095 - take certain actions when the handshake completes getChannel().onHandshakeFinish(getSSLEngine()); // Handshake complete. Now get the request. Use our read interface so unwrap already done. // Check if data exists in the network buffer still. This would be app data beyond handshake. if (netBuffer.remaining() == 0 || netBuffer.position() == 0) { // No app data. Release the netBuffer as it will no longer be used. if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) { Tr.debug(tc, "Releasing netBuffer: " + netBuffer.hashCode()); } netBuffer.release(); getDeviceReadInterface().setBuffers(null); } else { // Found encrypted app data. Don't release the network buffer yet. Let the read decrypt it. if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) { Tr.debug(tc, "App data exists in netBuffer after handshake: " + netBuffer.remaining()); } } readInterface.setBuffer(decryptedNetBuffer); // No need to save number of bytes read. MyReadCompletedCallback readCallback = new MyReadCompletedCallback(decryptedNetBuffer); if (null != readInterface.read(1, readCallback, false, TCPRequestContext.USE_CHANNEL_TIMEOUT)) { // Read was handled synchronously. determineNextChannel(); } } else { // Unknown result from handshake. All other results should have thrown exceptions. // Clean up buffers used during read. netBuffer.release(); getDeviceReadInterface().setBuffers(null); decryptedNetBuffer.release(); if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) { Tr.debug(tc, "Unhandled result from SSL engine: " + hsStatus); } SSLException ssle = new SSLException("Unhandled result from SSL engine: " + hsStatus); FFDCFilter.processException(ssle, getClass().getName(), "401", this); close(getVirtualConnection(), ssle); } if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) { Tr.exit(tc, "readyInboundPostHandshake"); } }
java
private void readyOutbound(VirtualConnection inVC, boolean async) throws IOException { if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) { Tr.entry(tc, "readyOutbound, vc=" + getVCHash()); } final SSLChannelData config = this.sslChannel.getConfig(); // Encrypted buffer from the network. WsByteBuffer netBuffer = SSLUtils.allocateByteBuffer(getPacketBufferSize(), config.getEncryptBuffersDirect()); // Unencrypted buffer from the ssl engine output to be handed up to the application. WsByteBuffer decryptedNetBuffer = SSLUtils.allocateByteBuffer(getAppBufferSize(), config.getDecryptBuffersDirect()); // Encrypted buffer from the ssl engine to be sent sent out on the network. WsByteBuffer encryptedAppBuffer = SSLUtils.allocateByteBuffer(getPacketBufferSize(), true); // Result from the SSL engine. SSLEngineResult sslResult = null; // Build the required callback. MyHandshakeCompletedCallback callback = null; // Flag if an error took place IOException exception = null; // Only create the callback if this is for an async request. if (async) { callback = new MyHandshakeCompletedCallback(this, netBuffer, decryptedNetBuffer, encryptedAppBuffer, FlowType.OUTBOUND); } try { // Start the aynchronous SSL handshake. sslResult = SSLUtils.handleHandshake(this, netBuffer, decryptedNetBuffer, encryptedAppBuffer, sslResult, callback, false); // Check to see if the work was able to be done synchronously. if (sslResult != null) { // Handshake was done synchronously. readyOutboundPostHandshake(netBuffer, decryptedNetBuffer, encryptedAppBuffer, sslResult.getHandshakeStatus(), async); } } catch (IOException e) { exception = e; } catch (ReadOnlyBufferException e) { exception = new IOException("Caught exception: " + e); } if (exception != null) { FFDCFilter.processException(exception, getClass().getName(), "540", this); if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) { Tr.debug(tc, "Caught exception during handshake after connect, " + exception); } // Release the buffers. if (netBuffer != null) { netBuffer.release(); netBuffer = null; getDeviceReadInterface().setBuffers(null); } if (decryptedNetBuffer != null) { decryptedNetBuffer.release(); decryptedNetBuffer = null; } if (encryptedAppBuffer != null) { encryptedAppBuffer.release(); encryptedAppBuffer = null; } if (async) { close(inVC, exception); } else { this.syncConnectFailure = true; close(inVC, exception); throw exception; } } if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) { Tr.exit(tc, "readyOutbound"); } return; }
java
protected void readyOutboundPostHandshake( WsByteBuffer netBuffer, WsByteBuffer decryptedNetBuffer, WsByteBuffer encryptedAppBuffer, HandshakeStatus hsStatus, boolean async) throws IOException { if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) { Tr.entry(tc, "readyOutboundPostHandshake, vc=" + getVCHash()); } // Exception to call destroy with in case of bad return code from SSL engine. IOException exception = null; if (hsStatus != HandshakeStatus.FINISHED) { // Handshake failed. if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) { Tr.debug(tc, "Unexpected results of handshake after connect, " + hsStatus); } exception = new IOException("Unexpected results of handshake after connect, " + hsStatus); } // PK16095 - take certain actions when the handshake completes getChannel().onHandshakeFinish(getSSLEngine()); // Null out the buffer references on the device side so they don't wrongly reused later. getDeviceReadInterface().setBuffers(null); // Clean up the buffers. // PI48725 Start // Handshake complete. Now get the request. Use our read interface so unwrap already done. // Check if data exists in the network buffer still. This would be app data beyond handshake. if (netBuffer.remaining() == 0 || netBuffer.position() == 0) { // No app data. Release the netBuffer as it will no longer be used. if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) { Tr.debug(tc, "Releasing netBuffer: " + netBuffer.hashCode()); } // Null out the buffer references on the device side so they don't wrongly reused later. netBuffer.release(); } else { // Found encrypted app data. Don't release the network buffer yet. Let the read decrypt it. if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) { Tr.debug(tc, "App data exists in netBuffer after handshake: " + netBuffer.remaining()); } this.readInterface.setNetBuffer(netBuffer); } // PI48725 Finish // Clean up the buffers. decryptedNetBuffer.release(); encryptedAppBuffer.release(); // Call appropriate callback if async if (async) { if (exception != null) { close(getVirtualConnection(), exception); } else { if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) { Tr.debug(tc, "Calling ready method."); } super.ready(getVirtualConnection()); } } else { if (exception != null) { throw exception; } } if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) { Tr.exit(tc, "readyOutboundPostHandshake"); } }
java
private void handleRedundantConnect() { if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) { Tr.entry(tc, "handleRedundantConnect, vc=" + getVCHash()); } // This conn link has already been connected. // Need to shut get a new SSL engine. cleanup(); // PK46069 - use engine that allows session id re-use sslEngine = SSLUtils.getOutboundSSLEngine( sslContext, getLinkConfig(), targetAddress.getRemoteAddress().getHostName(), targetAddress.getRemoteAddress().getPort(), this); if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) { Tr.debug(tc, "New SSL engine=" + getSSLEngine().hashCode() + " for vc=" + getVCHash()); } if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) { Tr.exit(tc, "handleRedundantConnect"); } }
java
public void setAlpnProtocol(String protocol) { if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) { Tr.debug(tc, "setAlpnProtocol: " + protocol + " " + this); } this.alpnProtocol = protocol; this.sslConnectionContext.setAlpnProtocol(protocol); }
java
private void destroyConnLinks() { synchronized (inUse) { int numlinks = inUse.size(); for (int i = 0; i < numlinks; i++) { inUse.removeFirst().destroy(null); } } }
java
public boolean verifySender(InetAddress remoteAddr) { boolean returnValue = true; if (alists != null) { returnValue = !alists.accessDenied(remoteAddr); } return returnValue; }
java
public boolean aboveRange(InetAddress ip) { if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) { Tr.debug(tc, "aboveRange, ip is " + ip); Tr.debug(tc, "aboveRange, ip is " + ip); } return greaterThan(ip, ipHigher); }
java
public boolean belowRange(InetAddress ip) { if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) { Tr.debug(tc, "belowRange, ip is " + ip); Tr.debug(tc, "belowRange, ipLower is " + ipLower); } return lessThan(ip, ipLower); }
java
private String metadataValueOf(String value) { if (value == null || value.trim().isEmpty()) return null; return value; }
java
@Override public final Object get() { Object o = buffer.pop(); if (beanPerf != null) { // Update PMI data beanPerf.objectRetrieve(buffer.size(), (o != null)); } return o; }
java
@Override public final void put(Object o) { boolean discarded = false; if (inactive) { if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) Tr.debug(tc, "setting active: " + this); // If the pool was marked inactive by the pool manager alarm, then // switch it back to active. Hopefully this happens before too // many other threads notice and cause contention with the // following sync block. inactive = false; // If this pool has been inactive long enough to be marked // unmanaged, then add it back as managed again. synchronized (this) { if (!ivManaged) { poolMgr.add(this); ivManaged = true; } } } discarded = !buffer.pushWithLimit(o, poolSize.maxSize); if (discarded) { if (discardStrategy != null) { discardStrategy.discard(o); } } if (beanPerf != null) { // Update PMI data beanPerf.objectReturn(buffer.size(), discarded); } }
java
@Override final void periodicDrain() { // Drain to the minimum size but only by the maxDrainAmount. // This slows the drain process, allowing for the pool to become // active before becoming fully drained (to minimum level). SizeData size = poolSize; int numDiscarded = drainToSize(size.minSize, size.maxDrainAmount); // When a pool becomes inactive, and is drained to the minimum level // then there is really no point to continue calling periodicDrain. // To avoid this, the pool is removed from the list of managed pools, // and since the pool has a reference to the pool manager, it can // easily add itself back to the list if it becomes active again. // Note that this has the side effect of allowing orphaned pools // to be garbage collected... since the PoolManager will also drop // its reference. d376426 if (numDiscarded == 0) { // Do not remove immediately, but keep a count and only // remove after a few iterations of no drain... to avoid // some of the churn of add/remove for pools that are // used regularly, but lightly. ++ivInactiveNoDrainCount; if (ivInactiveNoDrainCount > 4) { synchronized (this) { poolMgr.remove(this); ivManaged = false; } // Reset the count for the next time it becomes active. ivInactiveNoDrainCount = 0; } } else ivInactiveNoDrainCount = 0; }
java
public void init(HttpInboundConnection conn, RequestMessage req) { this.request = req; this.response = conn.getResponse(); this.connection = conn; this.outStream = new ResponseBody(this.response.getBody()); this.locale = Locale.getDefault(); }
java
public void clear() { this.contentType = null; this.encoding = null; this.locale = null; this.outStream = null; this.outWriter = null; this.streamActive = false; }
java
private String convertURItoURL(String uri) { int indexScheme = uri.indexOf("://"); if (-1 != indexScheme) { int indexQuery = uri.indexOf('?'); if (-1 == indexQuery || indexScheme < indexQuery) { // already a full url return uri; } } StringBuilder sb = new StringBuilder(); String scheme = this.request.getScheme(); sb.append(scheme).append("://"); sb.append(this.request.getServerName()); int port = this.request.getServerPort(); if ("http".equalsIgnoreCase(scheme) && 80 != port) { sb.append(':').append(port); } else if ("https".equalsIgnoreCase(scheme) && 443 != port) { sb.append(':').append(port); } String data = this.request.getContextPath(); if (!"".equals(data)) { sb.append(data); } if (0 == uri.length()) { sb.append('/'); } else if (uri.charAt(0) == '/') { // relative to servlet container root... sb.append(uri); } else { // relative to current URI, data = this.request.getServletPath(); if (!"".equals(data)) { sb.append(data); } data = this.request.getPathInfo(); if (null != data) { sb.append(data); } sb.append('/'); sb.append(uri); // TODO: webcontainer converted "/./" and "/../" info too } return sb.toString(); }
java
public void commit() { if (isCommitted()) { return; } if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) { Tr.debug(tc, "Committing: " + this); } if (null == this.response.getHeader("Content-Language")) { // content-language not yet set, add now this.response.setHeader( "Content-Language", getLocale().toString().replace('_', '-')); } if (null != this.response.getHeader("Content-Encoding")) { this.response.removeHeader("Content-Length"); } // if a session exists, store the set-cookie in the response now SessionInfo info = this.request.getSessionInfo(); if (null != info) { SessionConfig config = info.getSessionConfig(); if (config.usingCookies() && null != info.getSession()) { // create a session cookie now boolean add = true; HttpCookie existing = this.response.getCookie(config.getIDName()); if (null != existing) { if (!info.getSession().getId().equals(existing.getValue())) { // some other session cookie existed but doesn't match // the current session, remove it this.response.removeCookie(existing); } else { // this session already exists add = false; } } if (add) { this.response.addCookie( convertCookie(SessionInfo.encodeCookie(info))); } } } // end-if-request-session-exists }
java
public void setApi(String api) { api = api.trim(); if ("liberty".equalsIgnoreCase(api)) { this.api = "liberty"; } else if ("websphere".equalsIgnoreCase(api)) { this.api = "tr"; } else if ("tr".equalsIgnoreCase(api)) { this.api = "tr"; } else if ("jsr47".equalsIgnoreCase(api)) { this.api = "java-logging"; } else if ("java".equalsIgnoreCase(api)) { this.api = "java-logging"; } else if ("java.logging".equalsIgnoreCase(api)) { this.api = "java-logging"; } else if ("java-logging".equalsIgnoreCase(api)) { this.api = "java-logging"; } else { log("Invalid trace type " + api, Project.MSG_ERR); } }
java
private Map<String, String> getServletNameClassPairsInWebXML(Container containerToAdapt) throws UnableToAdaptException { Map<String, String> nameClassPairs = new HashMap<String, String>(); WebAppConfig webAppConfig = containerToAdapt.adapt(WebAppConfig.class); Iterator<IServletConfig> cfgIter = webAppConfig.getServletInfos(); while (cfgIter.hasNext()) { IServletConfig servletCfg = cfgIter.next(); if (servletCfg.getClassName() == null) { continue; } nameClassPairs.put(servletCfg.getServletName(), servletCfg.getClassName()); } return nameClassPairs; }
java
private void processClassesInWebXML(EndpointInfoBuilder endpointInfoBuilder, EndpointInfoBuilderContext ctx, WebAppConfig webAppConfig, JaxWsModuleInfo jaxWsModuleInfo, Set<String> presentedServices) throws UnableToAdaptException { Iterator<IServletConfig> cfgIter = webAppConfig.getServletInfos(); while (cfgIter.hasNext()) { IServletConfig servletCfg = cfgIter.next(); String servletClassName = servletCfg.getClassName(); if (servletClassName == null || presentedServices.contains(servletClassName) || !JaxWsUtils.isWebService(ctx.getInfoStore().getDelayableClassInfo(servletClassName))) { continue; } String servletName = servletCfg.getServletName(); // add the servletName into EndpointInfoContext env ctx.addContextEnv(JaxWsConstants.ENV_ATTRIBUTE_ENDPOINT_SERVLET_NAME, servletName); jaxWsModuleInfo.addEndpointInfo(servletName, endpointInfoBuilder.build(ctx, servletClassName, EndpointType.SERVLET)); } }
java
public static TrmMessageFactory getInstance() { if (_instance == null) { synchronized(TrmMessageFactory.class) { if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.entry(tc, "createFactoryInstance"); try { Class cls = Class.forName(TRM_MESSAGE_FACTORY_CLASS); _instance = (TrmMessageFactory) cls.newInstance(); } catch (Exception e) { FFDCFilter.processException(e, "com.ibm.ws.sib.mfp.TrmMessageFactory.createFactoryInstance", "112"); SibTr.error(tc,"UNABLE_TO_CREATE_TRMFACTORY_CWSIF0021",e); } if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.exit(tc, "createFactoryInstance",_instance); } } return _instance; }
java
public void addNamedEvent (String shortName, Class<? extends ComponentSystemEvent> cls) { String key = shortName; Collection<Class<? extends ComponentSystemEvent>> eventList; // Per the spec, if the short name is missing, generate one. if (shortName == null) { key = getFixedName (cls); } eventList = events.get (key); if (eventList == null) { // First event registered to this short name. eventList = new LinkedList<Class<? extends ComponentSystemEvent>>(); events.put (key, eventList); } eventList.add (cls); }
java
private String getFixedName (Class<? extends ComponentSystemEvent> cls) { StringBuilder result = new StringBuilder(); String className; // Get the unqualified class name. className = cls.getSimpleName(); // Strip the trailing "event" off the class name if present. if (className.toLowerCase().endsWith ("event")) { className = className.substring (0, result.length() - 5); } // Prepend the package name. if (cls.getPackage() != null) { result.append (cls.getPackage().getName()); result.append ('.'); } result.append (className); return result.toString(); }
java
public static String jsonifyEvent(Object event, String eventType, String serverName, String wlpUserDir, String serverHostName, String[] tags, int maxFieldLength) { if (eventType.equals(CollectorConstants.GC_EVENT_TYPE)) { if (event instanceof GCData) { return jsonifyGCEvent(wlpUserDir, serverName, serverHostName, event, tags); } else { return jsonifyGCEvent(-1, wlpUserDir, serverName, serverHostName, CollectorConstants.GC_EVENT_TYPE, event, tags); } } else if (eventType.equals(CollectorConstants.MESSAGES_LOG_EVENT_TYPE)) { return jsonifyTraceAndMessage(maxFieldLength, wlpUserDir, serverName, serverHostName, CollectorConstants.MESSAGES_LOG_EVENT_TYPE, event, tags); } else if (eventType.equals(CollectorConstants.TRACE_LOG_EVENT_TYPE)) { return jsonifyTraceAndMessage(maxFieldLength, wlpUserDir, serverName, serverHostName, CollectorConstants.TRACE_LOG_EVENT_TYPE, event, tags); } else if (eventType.equals(CollectorConstants.FFDC_EVENT_TYPE)) { return jsonifyFFDC(maxFieldLength, wlpUserDir, serverName, serverHostName, event, tags); } else if (eventType.equals(CollectorConstants.ACCESS_LOG_EVENT_TYPE)) { return jsonifyAccess(wlpUserDir, serverName, serverHostName, event, tags); } else if (eventType.equals(CollectorConstants.AUDIT_LOG_EVENT_TYPE)) { return jsonifyAudit(wlpUserDir, serverName, serverHostName, event, tags); } return ""; }
java
public void valueHasChanged(DCache cache, Object id, long expirationTime, int inactivity) { // CPF-Inactivity //final String methodName = "valueHasChanged()"; if (expirationTime <= 0 && inactivity <=0 ) { // CPF-Inactivity throw new IllegalArgumentException("expirationTime or inactivity must be positive"); } if ( UNIT_TEST_INACTIVITY ) { System.out.println(" valueHasChanged() - entry"); System.out.println(" expirationTime="+expirationTime); System.out.println(" inactivity="+inactivity); } // CPF-Inactivity //----------------------------------------------------------- // Force an expriationTime if we have an inactivity timer //----------------------------------------------------------- boolean isInactivityTimeOut = false; if ( inactivity > 0 ) { // For 7.0, use QuickApproxTime.getRef.getApproxTime() long adjustedExpirationTime = System.currentTimeMillis() + ( inactivity * 1000 ); if ( adjustedExpirationTime < expirationTime || expirationTime <= 0 ) { expirationTime = adjustedExpirationTime; isInactivityTimeOut = true; } } ExpirationMetaData expirationMetaData = (ExpirationMetaData)cacheInstancesTable.get(cache); // Just make sure expirationMetaData is NOT NULL in case of an internal-error condition if (expirationMetaData == null) { return; } synchronized (expirationMetaData) { InvalidationTask it = (InvalidationTask) expirationMetaData.expirationTable.get(id); if (it == null) { it = (InvalidationTask) taskPool.remove(); it.id = id; expirationMetaData.expirationTable.put(id, it); } else { expirationMetaData.timeLimitHeap.delete(it); } it.expirationTime = expirationTime; it.isInactivityTimeOut = isInactivityTimeOut; expirationMetaData.timeLimitHeap.insert(it); //ccount++; //traceDebug(methodName, "cacheName=" + cache.getCacheName() + " id=" + id + " expirationTableSize=" + expirationMetaData.expirationTable.size() + " timeLimitHeapSize=" + expirationMetaData.timeLimitHeap.size() + " count=" + ccount); } }
java
public void valueWasRemoved(DCache cache, Object id) { //final String methodName = "valueWasRemoved()"; if ( UNIT_TEST_INACTIVITY ) { System.out.println("valueWasRemoved() - entry"); } ExpirationMetaData expirationMetaData = (ExpirationMetaData)cacheInstancesTable.get(cache); if (expirationMetaData == null) { return; } synchronized (expirationMetaData) { InvalidationTask it = (InvalidationTask) expirationMetaData.expirationTable.remove(id); if (it != null) { expirationMetaData.timeLimitHeap.delete(it); it.reset(); taskPool.add(it); //traceDebug(methodName, "cacheName=" + cache.cacheName + " id=" + id + " expirationTableSize=" + expirationMetaData.expirationTable.size() + " timeLimitHeapSize=" + expirationMetaData.timeLimitHeap.size()); } } }
java
public void valueWasAccessed(DCache cache, Object id, long expirationTime, int inactivity) { valueHasChanged(cache, id, expirationTime, inactivity); }
java
public void createExpirationMetaData(DCache cache) { //final String methodName = "createExpirationMetaData()"; ExpirationMetaData expirationMetaData = (ExpirationMetaData)cacheInstancesTable.get(cache); if (expirationMetaData == null) { int initialTableSize = DEFAULT_SIZE_FOR_MEM; if (cache.getSwapToDisk() && cache.getCacheConfig().getDiskCachePerformanceLevel() == CacheConfig.HIGH) { initialTableSize = DEFAULT_SIZE_FOR_MEM_DISK; } expirationMetaData = new ExpirationMetaData(initialTableSize); cacheInstancesTable.put(cache, expirationMetaData); } }
java
public ApplicationSignature getApplicationSignature() { if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) { SibTr.entry(tc, "getApplicationSignature"); SibTr.exit(tc, "getApplicationSignature", applicationSig); } return applicationSig; }
java
public static String getUserNameFromSubject(Subject subject) { Iterator<Principal> it = subject.getPrincipals().iterator(); String username = it.next().getName(); return username; }
java
public static String encode(String value) { if (value == null) { return value; } try { value = URLEncoder.encode(value, Constants.UTF_8); } catch (UnsupportedEncodingException e) { // Do nothing - UTF-8 should always be supported } return value; }
java
public static String getTimeStamp(long lNumber) { String timeStamp = "" + lNumber; int iIndex = TIMESTAMP_LENGTH - timeStamp.length(); // this is enough for 3000 years return zeroFillers[iIndex] + timeStamp; }
java
public static String createNonceCookieValue(String nonceValue, String state, ConvergedClientConfig clientConfig) { return HashUtils.digest(nonceValue + state + clientConfig.getClientSecret()); }
java
private void compress() { counter = 1; for (Iterator e = values().iterator(); e.hasNext(); ) { Selector s = (Selector) e.next(); s.setUniqueId(counter++); } }
java
private static JsJmsMessage decodeTextBody(String body) throws MessageDecodeFailedException { if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.entry(tc, "decodeTextBody"); JsJmsTextMessage result = new JsJmsTextMessageImpl(MfpConstants.CONSTRUCTOR_NO_OP); if (body != null) { result.setText(URLDecode(body)); } if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.exit(tc, "decodeTextBody"); return result; }
java
private static JsJmsMessage decodeBytesBody(String body) throws MessageDecodeFailedException { if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.entry(tc, "decodeBytesBody"); JsJmsBytesMessage result = new JsJmsBytesMessageImpl(MfpConstants.CONSTRUCTOR_NO_OP); if (body != null) result.setBytes(HexString.hexToBin(body, 0)); if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.exit(tc, "decodeBytesBody"); return result; }
java
private static JsJmsMessage decodeObjectBody(String body) throws MessageDecodeFailedException { if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.entry(tc, "decodeObjectBody"); JsJmsObjectMessage result = new JsJmsObjectMessageImpl(MfpConstants.CONSTRUCTOR_NO_OP); if (body != null) result.setSerializedObject(HexString.hexToBin(body, 0)); if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.exit(tc, "decodeObjectBody"); return result; }
java
private static JsJmsMessage decodeStreamBody(String body) throws MessageDecodeFailedException { if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.entry(tc, "decodeStreamBody"); JsJmsStreamMessage result = new JsJmsStreamMessageImpl(MfpConstants.CONSTRUCTOR_NO_OP); if (body != null) { try { StringTokenizer st = new StringTokenizer(body, "&"); while (st.hasMoreTokens()) result.writeObject(decodeObject(st.nextToken())); } catch (UnsupportedEncodingException e) { FFDCFilter.processException(e, "com.ibm.ws.sib.mfp.impl.WebJsJmsMessageFactoryImpl.decodeStreamBody", "196"); // This can't happen, as the Exception can only be thrown for an MQ message // which isn't what we have. } } if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.exit(tc, "decodeStreamBody"); return result; }
java
private static JsJmsMessage decodeMapBody(String body) throws MessageDecodeFailedException { if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.entry(tc, "decodeMapBody"); JsJmsMapMessage result = new JsJmsMapMessageImpl(MfpConstants.CONSTRUCTOR_NO_OP); if (body != null) { try { StringTokenizer st = new StringTokenizer(body, "&"); while (st.hasMoreTokens()) { Object[] pair = decodePair(st.nextToken()); result.setObject((String) pair[0], pair[1]); } } catch (UnsupportedEncodingException e) { FFDCFilter.processException(e, "com.ibm.ws.sib.mfp.impl.WebJsJmsMessageFactoryImpl.decodeMapBody", "218"); // This can't happen, as the Exception can only be thrown for an MQ message // which isn't what we have. } } if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.exit(tc, "decodeMapBody"); return result; }
java
private static void decodeHeader(JsJmsMessage msg, String id, String type, String topic, String props) { // id should be hexEncoded byte array but if it looks too short we prepend a '0' to // allow clients to simply use an integer if they want. if (id != null) { if (id.length() % 2 != 0) id = "0" + id; msg.setCorrelationIdAsBytes(HexString.hexToBin(id, 0)); } // type goes in the JMSXAppId property. A type of 'SIB' means the special case // compact form. if (type != null) { if (type.equals("SIB")) msg.setJmsxAppId(MfpConstants.WPM_JMSXAPPID); else msg.setJmsxAppId(URLDecode(type)); } // Topic goes to discriminator if (topic != null) msg.setDiscriminator(URLDecode(topic)); // And the properties if (props != null) { StringTokenizer st = new StringTokenizer(props, "&"); while (st.hasMoreTokens()) { Object[] pair = decodePair(st.nextToken()); // JMSXAppID has already been set from the header field if (!((String) pair[0]).equals(SIProperties.JMSXAppID)) { try { msg.setObjectProperty((String) pair[0], pair[1]); } catch (Exception e) { // No FFDC code needed // No FFDC needed as setObjectProperty() can only throw a JMSException // for a JMS_IBM_Report or JMS_IBM_Feedback property & we don't call // it for any of those. } } } } }
java
private static Object[] decodePair(String text) { Object[] result = new Object[2]; int i = text.indexOf('='); result[0] = URLDecode(text.substring(0, i)); result[1] = decodeObject(text.substring(i + 1)); return result; }
java
private static Object decodeObject(String text) { Object result = null; if (text.startsWith("[]")) result = HexString.hexToBin(text, 2); else result = URLDecode(text); return result; }
java
private static String URLDecode(String text) { String result = null; try { result = URLDecoder.decode(text, "UTF8"); } catch (UnsupportedEncodingException e) { // Should never happen - all JDKs must support UTF8 FFDCFilter.processException(e, "com.ibm.ws.sib.mfp.impl.WebJsMessageFactoryImpl.URLDecode", "293"); } return result; }
java
@Override public MatchResponse getMatchResponse(SecurityConstraint securityConstraint, String resourceName, String method) { CollectionMatch collectionMatch = getCollectionMatch(securityConstraint.getWebResourceCollections(), resourceName, method); if (CollectionMatch.RESPONSE_NO_MATCH.equals(collectionMatch) || (collectionMatch == null && securityConstraint.getRoles().isEmpty() && securityConstraint.isAccessPrecluded() == false)) { return MatchResponse.NO_MATCH_RESPONSE; } else if (collectionMatch == null) { return MatchResponse.CUSTOM_NO_MATCH_RESPONSE; } return new MatchResponse(securityConstraint.getRoles(), securityConstraint.isSSLRequired(), securityConstraint.isAccessPrecluded(), collectionMatch); }
java
protected void deactivate(ComponentContext ctxt, int reason) { if (TraceComponent.isAnyTracingEnabled() && tc.isEventEnabled()) { Tr.event(this, tc, "Deactivating, reason=" + reason); } unregisterAll(); }
java
public void addHttpSessionListener(HttpSessionListener listener, String J2EEName) { synchronized (mHttpSessionListeners) { mHttpSessionListeners.add(listener); mHttpSessionListenersJ2eeNames.add(J2EEName); sessionListener = true; _coreHttpSessionManager.getIStore().setHttpSessionListener(true); // PM03375: Set app listeners if (mHttpAppSessionListeners != null) mHttpAppSessionListeners.add(listener); // PM03375: Set listener for app session manager if (_coreHttpAppSessionManager != null) _coreHttpAppSessionManager.getIStore().setHttpSessionListener(true); if (listener instanceof IBMSessionListener) { wasHttpSessionObserver.setDoesContainIBMSessionListener(true); // PM03375: Mark app observer // Begin: PM03375: Use separate observer for app sessions if (wasHttpAppSessionObserver != null) { wasHttpAppSessionObserver.setDoesContainIBMSessionListener(true); LoggingUtil.SESSION_LOGGER_CORE.logp(Level.FINE, methodClassName, methodNames[ADD_HTTP_SESSION_LISTENER], "Marked " + " app IBM session listener for app observer " + mHttpAppSessionListeners); } // End: PM03375 } } }
java
protected String getArgumentValue(String arg, String[] args, ConsoleWrapper stdin, PrintStream stdout) { for (int i = 1; i < args.length; i++) { String key = args[i].split("=")[0]; if (key.equals(arg)) { return getValue(args[i]); } } return null; }
java
public void setHeartbeatInterval(short heartbeatInterval) { if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.entry(this, tc, "setHeartbeatInterval"); properties.put(HEARTBEAT_INTERVAL, heartbeatInterval); if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.exit(this, tc, "setHeartbeatInterval", ""+heartbeatInterval); }
java
private boolean isZip(JarEntry entry) throws IOException { try (InputStream entryInputStream = sourceFatJar.getInputStream(entry)) { try (ZipInputStream zipInputStream = new ZipInputStream(entryInputStream)) { ZipEntry ze = zipInputStream.getNextEntry(); if (ze == null) { return false; } return true; } } }
java
public static File getLogDir() { String logDirLoc = null; // 1st check in environment variable is set. This is the normal case // when the server is started from the command line. if (logDir.get() == null) { File resultDir = null; try { logDirLoc = AccessController.doPrivileged(new java.security.PrivilegedExceptionAction<String>() { @Override public String run() throws Exception { return System.getenv(BootstrapConstants.ENV_LOG_DIR); } }); } catch (Exception ex) { } //outputDirLoc = System.getenv(BootstrapConstants.ENV_WLP_OUTPUT_DIR); if (logDirLoc != null) { resultDir = new File(logDirLoc); } else { // PI20344: Check if the Java property is set, which is the normal case when // the server is embedded; i.e. they didn't launch it from the command line. logDirLoc = System.getProperty(BootstrapConstants.ENV_LOG_DIR); if (logDirLoc != null) { resultDir = new File(logDirLoc); } } logDir = StaticValue.mutateStaticValue(logDir, new FileInitializer(resultDir)); } return logDir.get(); }
java
public static File getOutputDir(boolean isClient) { String outputDirLoc = null; // 1st check in environment variable is set. This is the normal case // when the server is started from the command line. if (outputDir.get() == null) { try { outputDirLoc = AccessController.doPrivileged(new java.security.PrivilegedExceptionAction<String>() { @Override public String run() throws Exception { return System.getenv(BootstrapConstants.ENV_WLP_OUTPUT_DIR); } }); } catch (Exception ex) { } //outputDirLoc = System.getenv(BootstrapConstants.ENV_WLP_OUTPUT_DIR); File resultDir = null; if (outputDirLoc != null) { resultDir = new File(outputDirLoc); } else { // PI20344: Check if the Java property is set, which is the normal case when // the server is embedded; i.e. they didn't launch it from the command line. outputDirLoc = System.getProperty(BootstrapConstants.ENV_WLP_OUTPUT_DIR); if (outputDirLoc != null) { resultDir = new File(outputDirLoc); } else { File userDir = Utils.getUserDir(); if (userDir != null) { if (isClient) { resultDir = new File(userDir, "clients"); } else { resultDir = new File(userDir, "servers"); } } } } outputDir = StaticValue.mutateStaticValue(outputDir, new FileInitializer(resultDir)); } return outputDir.get(); }
java
public static boolean tryToClose(ZipFile zipFile) { if (zipFile != null) { try { zipFile.close(); return true; } catch (IOException e) { // ignore } } return false; }
java
public static Class<?> getRealClass(Class<?> clazz) { Class<?> realClazz = clazz; if (isWeldProxy(clazz)) { realClazz = clazz.getSuperclass(); } return realClazz; }
java
public void destroy(Exception e) { if (this.appCallback != null) { this.appCallback.destroy(e); this.appCallback = null; } }
java
public synchronized void addSmap(String smap, String stratumName) { embedded.add("*O " + stratumName + "\n" + smap + "*C " + stratumName + "\n"); }
java
public void dumpItems() { LinkedList<CBuffRecord> copy = new LinkedList<CBuffRecord>(); synchronized(this) { copy.addAll(buffer); buffer.clear(); currentSize = 0L; if (headerBytes == null) { return; } } dumpWriter.setHeader(headerBytes); for(CBuffRecord record: copy) { dumpWriter.logRecord(record.timestamp, record.bytes); } }
java
protected Index getJandexIndex() { String methodName = "getJandexIndex"; boolean doLog = tc.isDebugEnabled(); boolean doJandexLog = JandexLogger.doLog(); boolean useJandex = getUseJandex(); if ( !useJandex ) { // Figuring out if there is a Jandex index is mildly expensive, // and is to be avoided when logging is disabled. if ( doLog || doJandexLog ) { boolean haveJandex = basicHasJandexIndex(); String msg; if ( haveJandex ) { msg = MessageFormat.format( "[ {0} ] Jandex disabled; Jandex index [ {1} ] found", getHashText(), getJandexIndexPath()); } else { msg = MessageFormat.format( "[ {0} ] Jandex disabled; Jandex index [ {1} ] not found", getHashText(), getJandexIndexPath()); } if ( doLog ) { Tr.debug(tc, msg); } if ( doJandexLog ) { JandexLogger.log(CLASS_NAME, methodName, msg); } } return null; } else { Index jandexIndex = basicGetJandexIndex(); if ( doLog || doJandexLog ) { String msg; if ( jandexIndex != null ) { msg = MessageFormat.format( "[ {0} ] Jandex enabled; Jandex index [ {1} ] found", getHashText(), getJandexIndexPath()); } else { msg = MessageFormat.format( "[ {0} ] Jandex enabled; Jandex index [ {1} ] not found", getHashText(), getJandexIndexPath()); } if ( doLog ) { Tr.debug(tc, msg); } if ( doJandexLog ) { JandexLogger.log(CLASS_NAME, methodName, msg); } } return jandexIndex; } }
java
public boolean and(SimpleTest newTest) { for (int i = 0; i < tmpSimpleTests.size(); i++) { SimpleTest cand = (SimpleTest) tmpSimpleTests.get(i); if (cand.getIdentifier().getName().equals(newTest.getIdentifier().getName())) { // Careful, may be operating in XPath selector domain, in which // case we need more stringent tests if(cand.getIdentifier().isExtended()) { if(cand.getIdentifier().getStep() == newTest.getIdentifier().getStep()) { // Identifiers have same name and same location step return cand.combine(newTest); } } else return cand.combine(newTest); } } tmpSimpleTests.add(newTest); alwaysTrue = false; return true; }
java
public boolean organize() { // First, find any simple tests that can be used to reduce residual components to // simple tests or pure truth values, either because the simple test is a NULL test or // because it is effectively an equality test. if (tmpResidual.size() > 0) { List[] equatedIds = findEquatedIdentifiers(); while (equatedIds != null && tmpResidual.size() > 0) { equatedIds = reduceResidual(equatedIds); if (equatedIds != null && equatedIds.length == 0) // Special indicator for contradiction return false; } } // We now have a reduced form Conjunction that is still capable of being true. We // call shedSubtests on each SimpleTest so that STRINGOTH tests can move their // "difficult" parts to the residual. We didn't do this earlier because we wanted to // give the STRINGOTH test an opportunity to be trumped by a EQ test on the // same identifier (or to be contradicted by a NULL test). A false return from // shedSubtests causes the entire SimpleTest to be removed. for (int i = 0; i < tmpSimpleTests.size(); ) if (((SimpleTestImpl) tmpSimpleTests.get(i)).shedSubtests(tmpResidual)) i++; else tmpSimpleTests.remove(i); // Sort the simple tests by ordinal position, looking for illegal position // assignments. for (int i = 0; i < tmpSimpleTests.size()-1; i++) for (int j = i+1; j < tmpSimpleTests.size(); j++) { SimpleTest iTest = (SimpleTest) tmpSimpleTests.get(i); SimpleTest jTest = (SimpleTest) tmpSimpleTests.get(j); OrdinalPosition iPos = (OrdinalPosition) iTest.getIdentifier().getOrdinalPosition(); OrdinalPosition jPos = (OrdinalPosition) jTest.getIdentifier().getOrdinalPosition(); if(jPos.compareTo(iPos) < 0) { tmpSimpleTests.set(j, iTest); tmpSimpleTests.set(i, jTest); } else if (jTest.getIdentifier().getOrdinalPosition() == iTest.getIdentifier().getOrdinalPosition()) throw new IllegalStateException(); } // We can now convert the Conjunction to its final form simpleTests = (SimpleTest[]) tmpSimpleTests.toArray(new SimpleTest[0]); tmpSimpleTests = null; for (int i = 0; i < tmpResidual.size(); i++) if (residual == null) residual = (Selector) tmpResidual.get(i); else residual = new OperatorImpl(Operator.AND, residual, (Selector) tmpResidual.get(i)); tmpResidual = null; alwaysTrue = simpleTests.length == 0 && residual == null; return true; }
java
private List[] findEquatedIdentifiers() { List[] ans = null; for (int i = 0; i < tmpSimpleTests.size(); i++) { SimpleTest cand = (SimpleTest) tmpSimpleTests.get(i); if (cand.getKind() == SimpleTest.NULL) { if (ans == null) ans = new List[] { new ArrayList(), new ArrayList() }; ans[0].add(cand.getIdentifier().getName()); ans[1].add(null); } else { Object candValue = cand.getValue(); if (candValue != null) { if (ans == null) ans = new List[] { new ArrayList(), new ArrayList() }; ans[0].add(cand.getIdentifier().getName()); ans[1].add(candValue); } } } return ans; }
java
private List[] reduceResidual(List[] equatedIds) { List[] ans = null; for (int i = 0; i < tmpResidual.size(); ) { Operator oper = substitute((Operator) tmpResidual.get(i), equatedIds); if (oper.getNumIds() > 0 && !Matching.isSimple(oper)) // Even after substitution, must remain as a residual tmpResidual.set(i++, oper); else if (oper.getNumIds() == 1) { // Eligible as a simple test. DNF transform the test first to exploit new type // information that may have been introduced by the substitution. Selector trans = Matching.getTransformer().DNF(oper); if (trans instanceof Operator && ((Operator) trans).getOp() == Selector.OR) // DNF transformation of the result has revealed a new OR connector. This can // happen iff the process of substitution changed a <> operator of type // UNKNOWN into type NUMERIC, which in turn became a disjunction of // inequalities. If this happens we choose to punt since otherwise we would // have to redo the entire division of the selector into Conjunctions. We // don't have logic for the case where the transformation reveals a new AND // because there is no substitution into a DNF-normalized conjunct that can // produce a naked AND. tmpResidual.set(i++, oper); else { // Otherwise, remove the residual and make a new SimpleTest and enter it. If // the new SimpleTest is non-conflicting, proceed, otherwise abandon the // Conjunction. SimpleTest newTest = new SimpleTestImpl(trans); if (!and(newTest)) return new List[0]; tmpResidual.remove(i); // See if the new test is capable of further reducing the residual if (newTest.getKind() == SimpleTest.NULL) { if (ans == null) ans = new List[] { new ArrayList(), new ArrayList() }; ans[0].add(newTest.getIdentifier().getName()); ans[1].add(null); } else { Object newTestValue = newTest.getValue(); if (newTestValue != null) { if (ans == null) ans = new List[] { new ArrayList(), new ArrayList() }; ans[0].add(newTest.getIdentifier().getName()); ans[1].add(newTestValue); } } } } else { // oper.numIds == 0 // Bail if always false Boolean theEval = (Boolean) Matching.getEvaluator().eval(oper); if (theEval == null || !(theEval).booleanValue()) return new List[0]; // Always true, so just forget this residual tmpResidual.remove(i); } } return ans; }
java
private static Operator substitute(Operator oper, List[] equatedIds) { Selector op1 = oper.getOperands()[0]; Selector op2 = (oper.getOperands().length == 1) ? null : oper.getOperands()[1]; if (op1 instanceof Identifier) op1 = substitute((Identifier) op1, equatedIds); else if (op1 instanceof Operator) op1 = substitute((Operator) op1, equatedIds); if (op1 == null) return null; if (op2 != null) { if (op2 instanceof Identifier) op2 = substitute((Identifier) op2, equatedIds); else if (op2 instanceof Operator) op2 = substitute((Operator) op2, equatedIds); if (op2 == null) return null; } if (op1 == oper.getOperands()[0] && (op2 == null || op2 == oper.getOperands()[1])) return oper; else if (oper instanceof LikeOperator) { LikeOperatorImpl loper = (LikeOperatorImpl) oper; return new LikeOperatorImpl(loper.getOp(), op1, loper.getInternalPattern(), loper.getPattern(), loper.isEscaped(), loper.getEscape()); } else return (op2 == null) ? new OperatorImpl(oper.getOp(), op1) : new OperatorImpl(oper.getOp(), op1, op2); }
java
private static Selector substitute(Identifier id, List[] equatedIds) { for (int i = 0; i < equatedIds[0].size(); i++) if (id.getName().equals(equatedIds[0].get(i))) return new LiteralImpl(equatedIds[1].get(i)); return id; }
java
private void setUnavailableUntil(long time, boolean isInit) //PM01373 { if (com.ibm.ejs.ras.TraceComponent.isAnyTracingEnabled() && logger.isLoggable(Level.FINE)) logger.logp(Level.FINE, CLASS_NAME, "setUnavailableUntil", "setUnavailableUntil() : " + time); if(isInit){ state = UNINITIALIZED_STATE; //PM01373 } else { state = UNAVAILABLE_STATE; } unavailableUntil = time; evtSource.onServletUnavailableForService(getServletEvent()); }
java
protected void setUninitialize() { if (com.ibm.ejs.ras.TraceComponent.isAnyTracingEnabled()&&logger.isLoggable (Level.FINE)) logger.logp(Level.FINE, CLASS_NAME,"setUninitialized ","" + this.toString()); state = UNINITIALIZED_STATE; }
java
protected synchronized void invalidateCacheWrappers() { if (com.ibm.ejs.ras.TraceComponent.isAnyTracingEnabled() && logger.isLoggable(Level.FINE)) // 306998.15 logger.entering(CLASS_NAME, "invalidateCacheWrappers"); // 569469 if (cacheWrappers != null) { // invalidate all the cache wrappers that wrap this target. Iterator i = cacheWrappers.iterator(); while (i.hasNext()) { ServletReferenceListener w = (ServletReferenceListener) i.next(); if (com.ibm.ejs.ras.TraceComponent.isAnyTracingEnabled() && logger.isLoggable(Level.FINE)) // 306998.15 logger.logp(Level.FINE, CLASS_NAME, "invalidateCacheWrappers", "servlet reference listener -->[" + w + "]"); w.invalidate(); } cacheWrappers = null; } if (com.ibm.ejs.ras.TraceComponent.isAnyTracingEnabled() && logger.isLoggable(Level.FINE)) // 306998.15 logger.exiting(CLASS_NAME, "invalidateCacheWrappers"); // 569469 }
java
private boolean checkForDefaultImplementation(Class checkClass, String checkMethod, Class[] methodParams){ if (com.ibm.ejs.ras.TraceComponent.isAnyTracingEnabled() && logger.isLoggable (Level.FINE)) //306998.14 logger.exiting(CLASS_NAME,"checkForDefaultImplementation","Method : " + checkMethod + ", Class : " + checkClass.getName()); boolean defaultMethodInUse=true; while (defaultMethodInUse && checkClass!=null && !checkClass.getName().equals("javax.servlet.http.HttpServlet")) { try { checkClass.getDeclaredMethod(checkMethod, methodParams); if (com.ibm.ejs.ras.TraceComponent.isAnyTracingEnabled() && logger.isLoggable (Level.FINE)) //306998.14 logger.logp(Level.FINE, CLASS_NAME,"checkForDefaultImplementation","Class implementing " + checkMethod + " is " + checkClass.getName()); defaultMethodInUse=false; break; } catch (java.lang.NoSuchMethodException exc) { if (com.ibm.ejs.ras.TraceComponent.isAnyTracingEnabled() && logger.isLoggable (Level.FINE)) //306998.14 logger.logp(Level.FINE, CLASS_NAME,"checkForDefaultImplementation",checkMethod + " is not implemented by class " + checkClass.getName()); } catch (java.lang.SecurityException exc) { if (com.ibm.ejs.ras.TraceComponent.isAnyTracingEnabled() && logger.isLoggable (Level.FINE)) //306998.14 logger.logp(Level.FINE, CLASS_NAME,"checkForDefaultImplementation","Cannot determine if " + checkMethod + " is implemented by class " + checkClass.getName()); } checkClass = checkClass.getSuperclass(); } if (com.ibm.ejs.ras.TraceComponent.isAnyTracingEnabled() && logger.isLoggable (Level.FINE)) //306998.14 logger.exiting(CLASS_NAME,"checkForDefaultImplementation","Result : " + defaultMethodInUse); return defaultMethodInUse; }
java
private int findIndexByKey(Object key) { // Traverse the vector from the back. Given proper locking done at // a higher level, this will ensure that the cache gets to the same // element in the presence of duplicates. // Traversing the vector from the first element causes a problem since // elements are inserted at the end of the vector (for efficiency). // Consequently after inserting duplicate element 1.2, if another // operation is performed on the same key 1, we will get to 1.1 instead // of 1.2 for (int i = (size() - 1); i >= 0; --i) { Element element = (Element) get(i); if (element.key.equals(key)) { return i; } } return -1; }
java
public void toArray(Element[] dest) { if (ivElements != null) { System.arraycopy(ivElements, ivHeadIndex, dest, 0, size()); } }
java
private void add(Element element) { if (ivElements == null) { ivElements = new Element[DEFAULT_CAPACITY]; } else if (ivTailIndex == ivElements.length) { // No more room at the tail of the array. If we're completely out of // space (ivBaseIndex == 0), then we need a bigger array. Otherwise, // determine if we can reset ivBaseIndex to 0 without needing to copy // more than half the elements. If not, we allocate a new array. // // We choose to limit to half the array to avoid repeatedly copying // the array. For example, if the array is full and ivBaseIndex == 0, // and we have a sequence of remove(0)/add(x), we do not want: // - remove(0): ivBaseIndex++ // - add(x): copy 1..N to 0..N-1, ivBaseIndex=0, array[N] = x // - remove(0): ivBaseIndex++ // - add(x): copy 1..N to 0..N-1, ivBaseIndex=0, array[N] = x // - ...etc. int size = size(); int halfCapacity = ivElements.length >> 1; if (ivHeadIndex > halfCapacity) { // Less than half of the array is full. Rather than creating a new // array, just copy all the elements to the front. System.arraycopy(ivElements, ivHeadIndex, ivElements, 0, size); Arrays.fill(ivElements, ivHeadIndex, ivElements.length, null); } else { // Either we're completely out of space (ivBaseIndex == 0), or it // would be wasteful to continuously copy over half the elements. // Grow the array by half its current size. Element[] newElements = new Element[ivElements.length + halfCapacity]; System.arraycopy(ivElements, ivHeadIndex, newElements, 0, size); ivElements = newElements; } ivHeadIndex = 0; ivTailIndex = size; } ivElements[ivTailIndex++] = element; }
java
private void remove(int listIndex) { if (listIndex == 0) { // Trivially remove from head. ivElements[ivHeadIndex++] = null; } else if (listIndex == ivTailIndex - 1) { // Trivially remove from tail. ivElements[--ivTailIndex] = null; } else { // Determine whether shifting the head or the tail requires the lower // number of element copies. int size = size(); int halfSize = size >> 1; if (listIndex < halfSize) { // The index is less than half. Shift the elements at the head of // the array up one index to cover the removed element. System.arraycopy(ivElements, ivHeadIndex, ivElements, ivHeadIndex + 1, listIndex); ivElements[ivHeadIndex++] = null; } else { // The index is more than half. Shift the elements at the tail of // the array down one index to cover the removed element. int arrayIndex = ivHeadIndex + listIndex; System.arraycopy(ivElements, arrayIndex + 1, ivElements, arrayIndex, size - listIndex - 1); ivElements[--ivTailIndex] = null; } } if (isEmpty()) { // Reset ivHeadIndex to 0 to avoid element copies in add(). ivHeadIndex = 0; ivTailIndex = 0; } }
java
public void setToBeDeleted() { if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.entry(tc, "setToBeDeleted"); synchronized (_anycastInputHandlers) { _toBeDeleted = true; } if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.exit(tc, "setToBeDeleted"); }
java
private boolean isInternalUnprotectedMethod(EJBMethodMetaData methodMetaData) { EJBMethodInterface interfaceType = methodMetaData.getEJBMethodInterface(); /*** * For TIMED_OBJECT, the code references EJB 2.1 spec section 22.2.2 and matches a * method signature, which is necessary but not sufficient. As of EJB 3.0, the * TimedObject interface is not necessary and arbitrary methods can be designated * as timeout callback methods using the @Timeout annotation. Further, the EJB * 3.1 spec adds the ability to specify timeout methods without a Timer argument, * and it also adds new timeout callback methods via the @Schedule annotation. In * all of these cases, the MethodInterface will be TIMED_OBJECT. * * For LIFECYCLE_INTERCEPTOR, this type is used only for lifecycle interceptors of * EJB 3.1 singleton session beans. This type should have been added to the EJB 3.1 * spec, but it was overlooked by the EG. However, EJB container needs to classify * methods in this way, so an internal type was added. * * For background on why returning true from internalUnprotected is correct for * LIFECYCLE_INTERCEPTOR, a singleton method invocation has two steps, and the * container invokes the security collaborator for each. * * 1. Obtain the bean instance if it does not already exist. * If the bean does not exist, the container calls the security collaborator * with LifecycleInterceptor to establish a RunAs security context. However, * authorization checks are not needed because the bean is performing * initialization, not business logic. Further, attempting to pass the * internal-only LifecycleInterceptor type to JACC causes an * IllegalArgumentException. * * If a singleton session bean is annotated @Startup, then the container * performs this step as part of application start rather than when a method * is first invoked on the bean. This is the scenario for this defect. * * 2. Invoke the business method. * The container calls the security collaborator "as normal" with Local, * Remote, or ServiceEndpoint to both authorize the caller security context * and to establish a RunAs security context as needed. * * Per EJB spec section 22.2.2: * * Since the ejbTimeout method is an internal method of the bean class, * it has no client security context. When getCallerPrincipal is called * from within the ejbTimeout method, it returns the container * representation of the unauthenticated identity. * Since the ejbTimeout method is an internal method of the bean class, * it has no client security context. The Bean Provider should use the * run-as deployment descriptor element to specify a security identity to * be used for the invocation of methods from within the ejbTimeout method. * * Because of the above spec requirements, we still need to establish the * runasSpecified identity when this method is called. **/ if (EJBMethodInterface.LIFECYCLE_INTERCEPTOR.value() == (interfaceType.value()) || EJBMethodInterface.TIMER.value() == (interfaceType.value())) { return true; //TODO: should this logic go into ejb container? } return false; }
java
public JWTTokenValidationFailedException errorCommon(boolean bTrError, TraceComponent tc, String[] msgCodes, Object[] objects) throws JWTTokenValidationFailedException { int msgIndex = 0; if (!TYPE_ID_TOKEN.equals(this.getTokenType())) { msgIndex = 1; } return errorCommon(bTrError, tc, msgCodes[msgIndex], objects); }
java
static JSBoxedListImpl create(JSVaryingList subList, int subAccessor) { if (subList.getIndirection() > 0) return new JSIndirectBoxedListImpl(subList, subAccessor); else return new JSBoxedListImpl(subList, subAccessor); }
java
public Object get(int accessor) { try { return ((JMFNativePart)subList.getValue(accessor)).getValue(subAccessor); } catch (JMFException ex) { FFDCFilter.processException(ex, "get", "129", this); return null; } }
java
protected void setCredentials(Subject subject, String securityName, String urAuthenticatedId) throws Exception { // Principal principal = new WSPrincipal(securityName, accessId, authMethod); if (urAuthenticatedId != null && !urAuthenticatedId.equals(securityName)) { Hashtable<String, String> subjectHash = new Hashtable<String, String>(); subjectHash.put(AuthenticationConstants.UR_AUTHENTICATED_USERID_KEY, urAuthenticatedId); subject.getPrivateCredentials().add(subjectHash); } CredentialsService credentialsService = getCredentialsService(); credentialsService.setCredentials(subject); }
java
protected void updateSubjectWithSharedStateContents() { subject.getPrincipals().add((WSPrincipal) sharedState.get(Constants.WSPRINCIPAL_KEY)); subject.getPublicCredentials().add(sharedState.get(Constants.WSCREDENTIAL_KEY)); if (sharedState.get(Constants.WSSSOTOKEN_KEY) != null) subject.getPrivateCredentials().add(sharedState.get(Constants.WSSSOTOKEN_KEY)); }
java
void setUpSubject(final String securityName, final String accessId, final String authMethod) throws LoginException { // Populate a temporary subject in response to a successful authentication. // We use a temporary Subject because if something goes wrong in this flow, // we are not updating the "live" Subject. try { AccessController.doPrivileged(new PrivilegedExceptionAction<Object>() { @Override public Object run() throws Exception { temporarySubject = new Subject(); setWSPrincipal(temporarySubject, securityName, accessId, authMethod); setCredentials(temporarySubject, securityName, null); setOtherPrincipals(temporarySubject, securityName, accessId, authMethod, null); // Commit the newly created elements into the original Subject subject.getPrincipals().addAll(temporarySubject.getPrincipals()); subject.getPublicCredentials().addAll(temporarySubject.getPublicCredentials()); subject.getPrivateCredentials().addAll(temporarySubject.getPrivateCredentials()); return null; } }); } catch (PrivilegedActionException e) { throw new LoginException(e.getLocalizedMessage()); } }
java
protected void payloadWritten(int payloadSize) { if (tc.isEntryEnabled()) Tr.entry(tc, "payloadWritten", new Object[] { this, payloadSize }); _unwrittenDataSize.addAndGet(-payloadSize); if (tc.isDebugEnabled()) Tr.debug(tc, "unwrittenDataSize = " + _unwrittenDataSize.get() + " totalDataSize = " + _totalDataSize); if (tc.isEntryEnabled()) Tr.exit(tc, "payloadWritten"); }
java
protected void payloadDeleted(int totalPayloadSize, int unwrittenPayloadSize) { if (tc.isEntryEnabled()) Tr.entry(tc, "payloadDeleted", new Object[] { this, totalPayloadSize, unwrittenPayloadSize }); _unwrittenDataSize.addAndGet(-unwrittenPayloadSize); synchronized (this) { _totalDataSize -= totalPayloadSize; } if (tc.isDebugEnabled()) Tr.debug(tc, "unwrittenDataSize = " + _unwrittenDataSize.get() + " totalDataSize = " + _totalDataSize); if (tc.isEntryEnabled()) Tr.exit(tc, "payloadDeleted"); }
java
protected void addRecoverableUnit(RecoverableUnit recoverableUnit, boolean recovered) { if (tc.isEntryEnabled()) Tr.entry(tc, "addRecoverableUnit", new Object[] { recoverableUnit, recovered, this }); final long identity = recoverableUnit.identity(); _recoverableUnits.put(identity, recoverableUnit); if (recovered) { _recUnitIdTable.reserveId(identity, recoverableUnit); } if (tc.isEntryEnabled()) Tr.exit(tc, "addRecoverableUnit"); }
java
protected RecoverableUnitImpl removeRecoverableUnitMapEntries(long identity) { if (tc.isEntryEnabled()) Tr.entry(tc, "removeRecoverableUnitMapEntries", new Object[] { identity, this }); final RecoverableUnitImpl recoverableUnit = (RecoverableUnitImpl) _recoverableUnits.remove(identity); if (recoverableUnit != null) { _recUnitIdTable.removeId(identity); } if (tc.isEntryEnabled()) Tr.exit(tc, "removeRecoverableUnitMapEntries", recoverableUnit); return recoverableUnit; }
java
protected RecoverableUnitImpl getRecoverableUnit(long identity) { if (tc.isEntryEnabled()) Tr.entry(tc, "getRecoverableUnit", new Object[] { identity, this }); RecoverableUnitImpl recoverableUnit = null; // Only attempt to resolve the recoverable unit if the log is compatible and valid. if (!incompatible() && !failed()) { recoverableUnit = (RecoverableUnitImpl) _recoverableUnits.get(identity); } if (tc.isEntryEnabled()) Tr.exit(tc, "getRecoverableUnit", recoverableUnit); return recoverableUnit; }
java
@Override public void associateLog(DistributedRecoveryLog otherLog, boolean failAssociatedLog) { if (tc.isEntryEnabled()) Tr.entry(tc, "associateLog", new Object[] { otherLog, failAssociatedLog, this }); if (otherLog instanceof MultiScopeLog) { _associatedLog = (MultiScopeLog) otherLog; _failAssociatedLog = failAssociatedLog; } if (tc.isEntryEnabled()) Tr.exit(tc, "associateLog"); }
java
public Class getDiscriminatoryDataType() { if (tc.isEntryEnabled()) SibTr.entry(this, tc, "getDiscriminatorDataType"); if (tc.isEntryEnabled()) SibTr.exit(this, tc, "getDiscriminatorDataType"); return com.ibm.wsspi.bytebuffer.WsByteBuffer.class; // F188491 }
java
public Channel getChannel() { if (tc.isEntryEnabled()) SibTr.entry(this, tc, "getChannel"); if (tc.isEntryEnabled()) SibTr.exit(this, tc, "getChannel", channel); return channel; }
java
public int getWeight() { if (tc.isEntryEnabled()) SibTr.entry(this, tc, "getWeight"); if (tc.isEntryEnabled()) SibTr.exit(this, tc, "getWeight"); // TODO: this probably isn't a good value. return 0; }
java
protected synchronized void join(SIXAResource resource) { if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.entry(this, tc, "join", resource); resourcesJoinedToThisResource.add(resource); if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.exit(this, tc, "join"); }
java
protected synchronized void unjoin(SIXAResource resource) { if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.entry(this, tc, "unjoin", resource); resourcesJoinedToThisResource.remove(resource); if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) SibTr.exit(this, tc, "unjoin"); }
java
protected void updatedSslSupport(SSLSupport service, Map<String, Object> props) { if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) { Tr.entry(tc, "updatedSslSupport", props); } sslSupport = service; // If the default pid has changed.. we need to go hunting for who was using the default. String id = (String) props.get(SSL_CFG_REF); if (!defaultId.equals(id)) { for (SSLChannelOptions options : sslOptions.values()) { options.updateRefId(id); options.updateRegistration(bContext, sslConfigs); } defaultId = id; } if (TraceComponent.isAnyTracingEnabled() && tc.isEntryEnabled()) { Tr.exit(tc, "updatedSslSupport", "defaultConfigId=" + defaultId); } }
java
public static JSSEProvider getJSSEProvider() { SSLChannelProvider p = instance.get(); if (p != null) return p.sslSupport.getJSSEProvider(); throw new IllegalStateException("Requested service is null: no active component instance"); }
java
public static JSSEHelper getJSSEHelper() { SSLChannelProvider p = instance.get(); if (p != null) return p.sslSupport.getJSSEHelper(); throw new IllegalStateException("Requested service is null: no active component instance"); }
java
public static DateFormat getBasicDateFormatter() { // PK42263 - made static // Retrieve a standard Java DateFormat object with desired format, using default locale return customizeDateFormat(DateFormat.getDateTimeInstance(DateFormat.SHORT, DateFormat.MEDIUM), false); }
java
public static DateFormat customizeDateFormat(DateFormat formatter, boolean isoDateFormat) { String pattern; int patternLength; int endOfSecsIndex; if (!!!isoDateFormat) { if (formatter instanceof SimpleDateFormat) { // Retrieve the pattern from the formatter, since we will need to modify it. SimpleDateFormat sdFormatter = (SimpleDateFormat) formatter; pattern = sdFormatter.toPattern(); // Append milliseconds and timezone after seconds patternLength = pattern.length(); endOfSecsIndex = pattern.lastIndexOf('s') + 1; String newPattern = pattern.substring(0, endOfSecsIndex) + ":SSS z"; if (endOfSecsIndex < patternLength) newPattern += pattern.substring(endOfSecsIndex, patternLength); // 0-23 hour clock (get rid of any other clock formats and am/pm) newPattern = newPattern.replace('h', 'H'); newPattern = newPattern.replace('K', 'H'); newPattern = newPattern.replace('k', 'H'); newPattern = newPattern.replace('a', ' '); newPattern = newPattern.trim(); sdFormatter.applyPattern(newPattern); formatter = sdFormatter; } else { formatter = new SimpleDateFormat("yy.MM.dd HH:mm:ss:SSS z"); } } else { formatter = new SimpleDateFormat("yyyy-MM-dd'T'HH:mm:ss.SSSZ"); } // PK13288 Start - if (sysTimeZone != null) { formatter.setTimeZone(sysTimeZone); } // PK13288 End return formatter; }
java
private void setAndValidateProperties(String cfgAuthentication, String cfgAuthorization, String cfgUserRegistry) { if ((cfgAuthentication == null) || cfgAuthentication.isEmpty()) { throwIllegalArgumentExceptionMissingAttribute(CFG_KEY_AUTHENTICATION_REF); } this.cfgAuthenticationRef = cfgAuthentication; if ((cfgAuthorization == null) || cfgAuthorization.isEmpty()) { throwIllegalArgumentExceptionMissingAttribute(CFG_KEY_AUTHORIZATION_REF); } this.cfgAuthorizationRef = cfgAuthorization; if ((cfgUserRegistry == null) || cfgUserRegistry.isEmpty()) { throwIllegalArgumentExceptionMissingAttribute(CFG_KEY_USERREGISTRY_REF); } this.cfgUserRegistryRef = cfgUserRegistry; }
java
@Reference(policy = ReferencePolicy.DYNAMIC, cardinality = ReferenceCardinality.OPTIONAL) protected synchronized void setServerStarted(ServerStarted serverStarted) { isServerStarted = true; // Start SystemModule if everything else is ready startManagementEJB(); }
java
public HashMap<String,Object> saveContextData(){ HashMap<String,Object> contextData = new HashMap<String, Object>(); //Save off the data from the other components we have hooks into ComponentMetaDataAccessorImpl cmdai = ComponentMetaDataAccessorImpl.getComponentMetaDataAccessor(); ComponentMetaData cmd = cmdai.getComponentMetaData(); if (cmd != null) { contextData.put(ComponentMetaData, cmd); } //Each producer service of the Transfer service is accessed in order to get the thread context data //The context data is then stored off Iterator<ITransferContextService> TransferIterator = com.ibm.ws.webcontainer.osgi.WebContainer.getITransferContextServices(); if (TransferIterator != null) { while(TransferIterator.hasNext()){ ITransferContextService tcs = TransferIterator.next(); if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) { Tr.debug(tc, "Calling storeState on: " + tcs); } tcs.storeState(contextData); } } else { if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) { Tr.debug(tc, "No implmenting services found"); } } if (TraceComponent.isAnyTracingEnabled() && tc.isDebugEnabled()) { Tr.debug(tc, "Saving the context data : " + contextData); } return contextData; }
java
@Override public Subject finalizeSubject(Subject subject, ConnectionRequestInfo reqInfo, CMConfigData cmConfigData) throws ResourceException { final boolean isTracingEnabled = TraceComponent.isAnyTracingEnabled(); if (isTracingEnabled && tc.isEntryEnabled()) { Tr.entry(this, tc, "finalizeSubject"); } if (isTracingEnabled && tc.isEntryEnabled()) { Tr.exit(this, tc, "finalizeSubject"); } return subject; // Pass back unchanged Subject }
java