diff --git a/core/src/main/java/io/undertow/conduits/ChunkedStreamSinkConduit.java b/core/src/main/java/io/undertow/conduits/ChunkedStreamSinkConduit.java index 02902e5d32..ec8a8e3a61 100644 --- a/core/src/main/java/io/undertow/conduits/ChunkedStreamSinkConduit.java +++ b/core/src/main/java/io/undertow/conduits/ChunkedStreamSinkConduit.java @@ -200,6 +200,9 @@ int doWrite(final ByteBuffer src) throws IOException { @Override public void truncateWrites() throws IOException { + if (anyAreSet(state, FLAG_FINISHED)) { + return; + } try { if (lastChunkBuffer != null) { lastChunkBuffer.close(); @@ -259,6 +262,9 @@ public long transferFrom(final StreamSourceChannel source, final long count, fin @Override public boolean flush() throws IOException { + if (anyAreSet(state, FLAG_FINISHED)) { + return true; + } this.state |= FLAG_FIRST_DATA_WRITTEN; if (anyAreSet(state, FLAG_WRITES_SHUTDOWN)) { if (anyAreSet(state, FLAG_NEXT_SHUTDOWN)) { diff --git a/core/src/main/java/io/undertow/protocols/http2/HpackDecoder.java b/core/src/main/java/io/undertow/protocols/http2/HpackDecoder.java index f0da72dc56..70feece00d 100644 --- a/core/src/main/java/io/undertow/protocols/http2/HpackDecoder.java +++ b/core/src/main/java/io/undertow/protocols/http2/HpackDecoder.java @@ -252,7 +252,7 @@ private String readHpackString(ByteBuffer buffer) throws HpackException { return readHuffmanString(length, buffer); } for (int i = 0; i < length; ++i) { - stringBuilder.append((char) buffer.get()); + stringBuilder.append((char) (buffer.get() & 0xFF)); } String ret = stringBuilder.toString(); stringBuilder.setLength(0); diff --git a/core/src/main/java/io/undertow/server/Connectors.java b/core/src/main/java/io/undertow/server/Connectors.java index d3931a8032..7dea9b0295 100644 --- a/core/src/main/java/io/undertow/server/Connectors.java +++ b/core/src/main/java/io/undertow/server/Connectors.java @@ -22,6 +22,8 @@ import io.undertow.UndertowMessages; import io.undertow.UndertowOptions; import io.undertow.server.handlers.Cookie; +import io.undertow.server.protocol.http.HttpRequestParser; +import io.undertow.util.BadRequestException; import io.undertow.util.DateUtils; import io.undertow.util.HeaderMap; import io.undertow.util.HeaderValues; @@ -446,7 +448,7 @@ public static void setExchangeRequestPath(final HttpServerExchange exchange, fin try { final boolean slashDecodingFlag = URLUtils.getSlashDecodingFlag(allowEncodedSlash, exchange.getConnection().getUndertowOptions().get(UndertowOptions.DECODE_SLASH)); setExchangeRequestPath(exchange, encodedPath, charset, decode, slashDecodingFlag, decodeBuffer, exchange.getConnection().getUndertowOptions().get(UndertowOptions.MAX_PARAMETERS, UndertowOptions.DEFAULT_MAX_PARAMETERS)); - } catch (ParameterLimitException e) { + } catch (ParameterLimitException | BadRequestException e) { throw new RuntimeException(e); } } @@ -459,8 +461,9 @@ public static void setExchangeRequestPath(final HttpServerExchange exchange, fin * @param encodedPath The encoded path to decode * @param decodeBuffer The decode buffer to use * @throws ParameterLimitException + * @throws BadRequestException */ - public static void setExchangeRequestPath(final HttpServerExchange exchange, final String encodedPath, StringBuilder decodeBuffer) throws ParameterLimitException { + public static void setExchangeRequestPath(final HttpServerExchange exchange, final String encodedPath, StringBuilder decodeBuffer) throws ParameterLimitException, BadRequestException { final OptionMap options = exchange.getConnection().getUndertowOptions(); boolean slashDecodingFlag = URLUtils.getSlashDecodingFlag(options); setExchangeRequestPath(exchange, encodedPath, @@ -474,16 +477,44 @@ public static void setExchangeRequestPath(final HttpServerExchange exchange, fin /** * Sets the request path and query parameters, decoding to the requested charset. * - * @param exchange The exchange - * @param encodedPath The encoded path - * @param charset The charset + * @param exchange the exchange + * @param encodedPath the encoded path + * @param decode indicates if the request path should be decoded + * @param decodeSlashFlag indicates if slash characters contained in the encoded path should be decoded + * @param decodeBuffer the buffer used for decoding + * @param maxParameters maximum number of parameters allowed in the path + * @param charset the charset + * @throws BadRequestException if there is something wrong with the request, such as non-allowed characters + */ + public static void setExchangeRequestPath(final HttpServerExchange exchange, final String encodedPath, final String charset, boolean decode, final boolean decodeSlashFlag, StringBuilder decodeBuffer, int maxParameters) throws ParameterLimitException, BadRequestException { + setExchangeRequestPath(exchange, encodedPath, charset, decode, decode, decodeSlashFlag, decodeBuffer, maxParameters); + } + + /** + * Sets the request path and query parameters, decoding to the requested charset. + * + * @param exchange the exchange + * @param encodedPath the encoded path + * @param decode indicates if the request path should be decoded, apart from the query string part of the + * request (see next parameter) + * @param decodeQueryString indicates if the query string of the path, when present, should be decoded + * @param decodeSlashFlag indicates if slash characters contained in the request path should be decoded + * @param decodeBuffer the buffer used for decoding + * @param maxParameters maximum number of parameters allowed in the path + * @param charset the charset + * @throws BadRequestException if there is something wrong with the request, such as non-allowed characters */ - public static void setExchangeRequestPath(final HttpServerExchange exchange, final String encodedPath, final String charset, boolean decode, final boolean decodeSlashFlag, StringBuilder decodeBuffer, int maxParameters) throws ParameterLimitException { + public static void setExchangeRequestPath(final HttpServerExchange exchange, final String encodedPath, final String charset, boolean decode, boolean decodeQueryString, final boolean decodeSlashFlag, StringBuilder decodeBuffer, int maxParameters) throws ParameterLimitException, BadRequestException { + final OptionMap options = exchange.getConnection().getUndertowOptions(); + final boolean allowUnescapedCharactersInUrl = options.get(UndertowOptions.ALLOW_UNESCAPED_CHARACTERS_IN_URL, false); boolean requiresDecode = false; final StringBuilder pathBuilder = new StringBuilder(); int currentPathPartIndex = 0; for (int i = 0; i < encodedPath.length(); ++i) { char c = encodedPath.charAt(i); + if(!allowUnescapedCharactersInUrl && !HttpRequestParser.isTargetCharacterAllowed(c)) { + throw new BadRequestException(UndertowMessages.MESSAGES.invalidCharacterInRequestTarget(c)); + } if (c == '?') { String part; String encodedPart = encodedPath.substring(currentPathPartIndex, i); @@ -496,10 +527,22 @@ public static void setExchangeRequestPath(final HttpServerExchange exchange, fin part = pathBuilder.toString(); exchange.setRequestPath(part); exchange.setRelativePath(part); - exchange.setRequestURI(encodedPath.substring(0, i)); + if(requiresDecode && allowUnescapedCharactersInUrl) { + final String uri = URLUtils.decode(encodedPath.substring(0, i), charset, decodeSlashFlag,false, decodeBuffer); + exchange.setRequestURI(uri); + } else { + exchange.setRequestURI(encodedPath.substring(0, i)); + } + final String qs = encodedPath.substring(i + 1); - exchange.setQueryString(qs); - URLUtils.parseQueryString(qs, exchange, charset, decode, maxParameters); + if(requiresDecode && allowUnescapedCharactersInUrl) { + final String decodedQS = URLUtils.decode(qs, charset, decodeSlashFlag,false, decodeBuffer); + exchange.setQueryString(decodedQS); + } else { + exchange.setQueryString(qs); + } + + URLUtils.parseQueryString(qs, exchange, charset, decodeQueryString, maxParameters); return; } else if(c == ';') { String part; @@ -510,10 +553,16 @@ public static void setExchangeRequestPath(final HttpServerExchange exchange, fin part = encodedPart; } pathBuilder.append(part); - exchange.setRequestURI(encodedPath); + if(requiresDecode && allowUnescapedCharactersInUrl) { + final String uri = URLUtils.decode(encodedPath, charset, decodeSlashFlag,false, decodeBuffer); + exchange.setRequestURI(uri); + } else { + exchange.setRequestURI(encodedPath); + } + currentPathPartIndex = i + 1 + URLUtils.parsePathParams(encodedPath.substring(i + 1), exchange, charset, decode, maxParameters); i = currentPathPartIndex -1 ; - } else if(c == '%' || c == '+') { + } else if(decode && (c == '+' || c == '%' || c > 127)) { requiresDecode = decode; } } diff --git a/core/src/main/java/io/undertow/server/protocol/ajp/AjpRequestParser.java b/core/src/main/java/io/undertow/server/protocol/ajp/AjpRequestParser.java index 527fbfd0a1..5160261456 100644 --- a/core/src/main/java/io/undertow/server/protocol/ajp/AjpRequestParser.java +++ b/core/src/main/java/io/undertow/server/protocol/ajp/AjpRequestParser.java @@ -66,6 +66,7 @@ import io.undertow.util.HttpString; import io.undertow.util.ParameterLimitException; import io.undertow.util.URLUtils; +import io.undertow.util.UrlDecodeException; /** * @author Stuart Douglas @@ -268,7 +269,7 @@ public void parse(final ByteBuffer buf, final AjpRequestParseState state, final int colon = result.value.indexOf(';'); if (colon == -1) { String res = decode(result.value, result.containsUrlCharacters); - if(result.containsUnencodedCharacters) { + if(result.containsUnencodedCharacters || (allowUnescapedCharactersInUrl && result.containsUrlCharacters)) { //we decode if the URL was non-compliant, and contained incorrectly encoded characters //there is not really a 'correct' thing to do in this situation, but this seems the least incorrect exchange.setRequestURI(res); @@ -446,8 +447,14 @@ public void parse(final ByteBuffer buf, final AjpRequestParseState state, final state.state = AjpRequestParseState.READING_ATTRIBUTES; return; } - if(resultHolder.containsUnencodedCharacters) { - result = decode(resultHolder.value, true); + if(resultHolder.containsUnencodedCharacters || (resultHolder.containsUrlCharacters && allowUnescapedCharactersInUrl)) { + try { + result = decode(resultHolder.value, true); + } catch (UrlDecodeException | UnsupportedEncodingException e) { + UndertowLogger.REQUEST_IO_LOGGER.failedToParseRequest(e); + state.badRequest = true; + result = resultHolder.value; + } decodingAlreadyDone = true; } else { result = resultHolder.value; @@ -580,8 +587,8 @@ protected StringHolder parseString(ByteBuffer buf, AjpRequestParseState state, S return new StringHolder(null, false, false, false); } byte c = buf.get(); - if(type == StringType.QUERY_STRING && (c == '+' || c == '%' || c < 0 )) { - if (c < 0) { + if(type == StringType.QUERY_STRING && (c == '+' || c == '%' || c < 0 || c > 127 )) { + if (c < 0 || c > 127) { if (!allowUnescapedCharactersInUrl) { throw new BadRequestException(); } else { @@ -589,7 +596,7 @@ protected StringHolder parseString(ByteBuffer buf, AjpRequestParseState state, S } } containsUrlCharacters = true; - } else if(type == StringType.URL && (c == '%' || c < 0 )) { + } else if(type == StringType.URL && (c == '%' || c < 0 || c > 127 )) { if(c < 0 ) { if(!allowUnescapedCharactersInUrl) { throw new BadRequestException(); diff --git a/core/src/main/java/io/undertow/server/protocol/http/HttpRequestParser.java b/core/src/main/java/io/undertow/server/protocol/http/HttpRequestParser.java index 52df349b19..bba6586fa7 100644 --- a/core/src/main/java/io/undertow/server/protocol/http/HttpRequestParser.java +++ b/core/src/main/java/io/undertow/server/protocol/http/HttpRequestParser.java @@ -481,10 +481,15 @@ private void parsePathComplete(ParseState state, HttpServerExchange exchange, in exchange.setRelativePath("/"); exchange.setRequestURI(path, true); } else if (parseState < HOST_DONE && state.canonicalPath.length() == 0) { - String decodedPath = decode(path, urlDecodeRequired, state, slashDecodingFlag, false); - exchange.setRequestPath(decodedPath); - exchange.setRelativePath(decodedPath); - exchange.setRequestURI(path, false); + final String decodedRequestPath = decode(path, urlDecodeRequired, state, slashDecodingFlag, false); + exchange.setRequestPath(decodedRequestPath); + exchange.setRelativePath(decodedRequestPath); + if(urlDecodeRequired && allowUnescapedCharactersInUrl) { + final String uri = decode(path, urlDecodeRequired, state, slashDecodingFlag, false); + exchange.setRequestURI(uri); + } else { + exchange.setRequestURI(path); + } } else { handleFullUrl(state, exchange, canonicalPathStart, urlDecodeRequired, path, parseState); } @@ -504,10 +509,15 @@ private void beginQueryParameters(ByteBuffer buffer, ParseState state, HttpServe private void handleFullUrl(ParseState state, HttpServerExchange exchange, int canonicalPathStart, boolean urlDecodeRequired, String path, int parseState) { state.canonicalPath.append(path.substring(canonicalPathStart)); - String thePath = decode(state.canonicalPath.toString(), urlDecodeRequired, state, slashDecodingFlag, false); - exchange.setRequestPath(thePath); - exchange.setRelativePath(thePath); - exchange.setRequestURI(path, parseState == HOST_DONE); + final String requestPath = decode(state.canonicalPath.toString(), urlDecodeRequired, state, slashDecodingFlag, false); + exchange.setRequestPath(requestPath); + exchange.setRelativePath(requestPath); + if(urlDecodeRequired && allowUnescapedCharactersInUrl) { + final String uri = decode(path, urlDecodeRequired, state, slashDecodingFlag, false); + exchange.setRequestURI(uri, parseState == HOST_DONE); + } else { + exchange.setRequestURI(path, parseState == HOST_DONE); + } } @@ -521,7 +531,7 @@ private void handleFullUrl(ParseState state, HttpServerExchange exchange, int ca */ @SuppressWarnings("unused") final void handleQueryParameters(ByteBuffer buffer, ParseState state, HttpServerExchange exchange) throws BadRequestException { - StringBuilder stringBuilder = state.stringBuilder; + final StringBuilder stringBuilder = state.stringBuilder; int queryParamPos = state.pos; int mapCount = state.mapCount; boolean urlDecodeRequired = state.urlDecodeRequired; @@ -535,12 +545,15 @@ final void handleQueryParameters(ByteBuffer buffer, ParseState state, HttpServer //we encounter an encoded character while (buffer.hasRemaining()) { - char next = (char) (buffer.get() & 0xFF); + final char next = (char) (buffer.get() & 0xFF); if(!allowUnescapedCharactersInUrl && !ALLOWED_TARGET_CHARACTER[next]) { throw new BadRequestException(UndertowMessages.MESSAGES.invalidCharacterInRequestTarget(next)); } if (next == ' ' || next == '\t') { - final String queryString = stringBuilder.toString(); + String queryString = stringBuilder.toString(); + if(urlDecodeRequired && this.allowUnescapedCharactersInUrl) { + queryString = decode(queryString, urlDecodeRequired, state, slashDecodingFlag, false); + } exchange.setQueryString(queryString); if (nextQueryParam == null) { if (queryParamPos != stringBuilder.length()) { diff --git a/core/src/main/java/io/undertow/server/protocol/http2/Http2ReceiveListener.java b/core/src/main/java/io/undertow/server/protocol/http2/Http2ReceiveListener.java index 88a89a351f..1eb8aa9896 100644 --- a/core/src/main/java/io/undertow/server/protocol/http2/Http2ReceiveListener.java +++ b/core/src/main/java/io/undertow/server/protocol/http2/Http2ReceiveListener.java @@ -43,6 +43,7 @@ import io.undertow.server.protocol.http.HttpAttachments; import io.undertow.server.protocol.http.HttpContinue; import io.undertow.server.protocol.http.HttpRequestParser; +import io.undertow.util.BadRequestException; import io.undertow.util.ConduitFactory; import io.undertow.util.HeaderMap; import io.undertow.util.HeaderValues; @@ -193,7 +194,7 @@ public void handleEvent(Http2StreamSourceChannel channel) { try { Connectors.setExchangeRequestPath(exchange, path, encoding, decode, slashDecodingFlag, decodeBuffer, maxParameters); - } catch (ParameterLimitException e) { + } catch (ParameterLimitException | BadRequestException e) { //this can happen if max parameters is exceeded UndertowLogger.REQUEST_IO_LOGGER.debug("Failed to set request path", e); exchange.setStatusCode(StatusCodes.BAD_REQUEST); @@ -217,6 +218,19 @@ public void handleEvent(Http2StreamSourceChannel channel) { * @param initial The initial upgrade request that started the HTTP2 connection */ void handleInitialRequest(HttpServerExchange initial, Http2Channel channel, byte[] data) { + handleInitialRequest(initial, channel, data, this.decode, this.decode); + } + + /** + * Handles the initial request when the exchange was started by a HTTP upgrade. + * + * @param initial the initial upgrade request that started the HTTP2 connection + * @param channel the channel that received the request + * @param data any extra data read by the channel that has not been parsed yet + * @param decode indicates if the request path should be decoded, apart from the query string + * @param decodeQueryString indicates if the query string of the path, when present, should be decoded + */ + void handleInitialRequest(HttpServerExchange initial, Http2Channel channel, byte[] data, boolean decode, boolean decodeQueryString) { //we have a request Http2HeadersStreamSinkChannel sink = channel.createInitialUpgradeResponseStream(); final Http2ServerConnection connection = new Http2ServerConnection(channel, sink, undertowOptions, bufferSize, rootHandler); @@ -243,8 +257,8 @@ void handleInitialRequest(HttpServerExchange initial, Http2Channel channel, byte Connectors.terminateRequest(exchange); String uri = exchange.getQueryString().isEmpty() ? initial.getRequestURI() : initial.getRequestURI() + '?' + exchange.getQueryString(); try { - Connectors.setExchangeRequestPath(exchange, uri, encoding, decode, slashDecodingFlag, decodeBuffer, maxParameters); - } catch (ParameterLimitException e) { + Connectors.setExchangeRequestPath(exchange, uri, encoding, decode, decodeQueryString, slashDecodingFlag, decodeBuffer, maxParameters); + } catch (ParameterLimitException | BadRequestException e) { exchange.setStatusCode(StatusCodes.BAD_REQUEST); exchange.endExchange(); return; diff --git a/core/src/main/java/io/undertow/server/protocol/http2/Http2ServerConnection.java b/core/src/main/java/io/undertow/server/protocol/http2/Http2ServerConnection.java index 56e1a520e4..838f5986f5 100644 --- a/core/src/main/java/io/undertow/server/protocol/http2/Http2ServerConnection.java +++ b/core/src/main/java/io/undertow/server/protocol/http2/Http2ServerConnection.java @@ -69,6 +69,7 @@ import io.undertow.server.ServerConnection; import io.undertow.util.AttachmentKey; import io.undertow.util.AttachmentList; +import io.undertow.util.BadRequestException; import io.undertow.util.HeaderMap; import io.undertow.util.HttpString; import io.undertow.util.StatusCodes; @@ -434,7 +435,7 @@ public boolean pushResource(String path, HttpString method, HeaderMap requestHea exchange.setRequestScheme(this.exchange.getRequestScheme()); try { Connectors.setExchangeRequestPath(exchange, path, getUndertowOptions().get(UndertowOptions.URL_CHARSET, StandardCharsets.UTF_8.name()), getUndertowOptions().get(UndertowOptions.DECODE_URL, true), URLUtils.getSlashDecodingFlag(getUndertowOptions()), new StringBuilder(), getUndertowOptions().get(UndertowOptions.MAX_PARAMETERS, UndertowOptions.DEFAULT_MAX_HEADERS)); - } catch (ParameterLimitException e) { + } catch (ParameterLimitException | BadRequestException e) { UndertowLogger.REQUEST_IO_LOGGER.debug("Too many parameters in HTTP/2 request", e); exchange.setStatusCode(StatusCodes.BAD_REQUEST); exchange.endExchange(); diff --git a/core/src/main/java/io/undertow/server/protocol/http2/Http2UpgradeHandler.java b/core/src/main/java/io/undertow/server/protocol/http2/Http2UpgradeHandler.java index 2a1ca672cc..a674e00876 100644 --- a/core/src/main/java/io/undertow/server/protocol/http2/Http2UpgradeHandler.java +++ b/core/src/main/java/io/undertow/server/protocol/http2/Http2UpgradeHandler.java @@ -175,7 +175,13 @@ public void handleRequest(HttpServerExchange exchange) throws Exception { } }, undertowOptions, exchange.getConnection().getBufferSize(), null); channel.getReceiveSetter().set(receiveListener); - receiveListener.handleInitialRequest(exchange, channel, data); + // don't decode requests from upgrade, they are already decoded by the parser for protocol HTTP 1.1 (HttpRequestParser) + // however, the queries have to be decoded, since this is decoded only once, when the connector parses the query string + // to fill in the query param collection of the HttpServerExchange (see Connectors invoking URLUtils.QUERY_STRING_PARSER) + final boolean decodeURL = undertowOptions.get(UndertowOptions.DECODE_URL, true); + final boolean allowUnescapedCharactersInURL = undertowOptions.get(UndertowOptions.ALLOW_UNESCAPED_CHARACTERS_IN_URL, false); + // if allowUnescapedCharactersInURL is true, the decoding has already been done + receiveListener.handleInitialRequest(exchange, channel, data, decodeURL && !allowUnescapedCharactersInURL, decodeURL); channel.resumeReceives(); } }); diff --git a/core/src/test/java/io/undertow/conduits/ChunkedStreamSinkConduitTest.java b/core/src/test/java/io/undertow/conduits/ChunkedStreamSinkConduitTest.java new file mode 100644 index 0000000000..5b820d69e2 --- /dev/null +++ b/core/src/test/java/io/undertow/conduits/ChunkedStreamSinkConduitTest.java @@ -0,0 +1,177 @@ +/* + * JBoss, Home of Professional Open Source. + * Copyright 2024 Red Hat, Inc., and individual contributors + * as indicated by the @author tags. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package io.undertow.conduits; + +import io.undertow.connector.ByteBufferPool; +import io.undertow.server.DefaultByteBufferPool; +import io.undertow.testutils.category.UnitTest; +import io.undertow.util.AbstractAttachable; +import io.undertow.util.HeaderMap; +import org.junit.Test; +import org.junit.experimental.categories.Category; +import org.xnio.XnioIoThread; +import org.xnio.XnioWorker; +import org.xnio.channels.StreamSourceChannel; +import org.xnio.conduits.StreamSinkConduit; +import org.xnio.conduits.WriteReadyHandler; + +import java.io.IOException; +import java.nio.ByteBuffer; +import java.nio.channels.FileChannel; +import java.nio.charset.StandardCharsets; +import java.util.concurrent.TimeUnit; +import java.util.concurrent.atomic.AtomicInteger; +import java.util.concurrent.atomic.AtomicLong; + +import static org.junit.Assert.*; + +/** + * Test case for UNDERTOW-2424. + */ +@Category(UnitTest.class) +public class ChunkedStreamSinkConduitTest { + + @Test + public void testChunkedStreamSinkConduit() throws IOException { + ByteBufferPool pool = new DefaultByteBufferPool(false, 1024, -1, -1); + AtomicLong written = new AtomicLong(); + AtomicInteger flushes = new AtomicInteger(); + AtomicInteger listenerInvocations = new AtomicInteger(); + StreamSinkConduit next = new StreamSinkConduit() { + + @Override + public long transferFrom(FileChannel src, long position, long count) throws IOException { + written.addAndGet(count); + return count; + } + + @Override + public long transferFrom(StreamSourceChannel source, long count, ByteBuffer throughBuffer) throws IOException { + written.addAndGet(count); + return count; + } + + @Override + public int write(ByteBuffer src) { + int remaining = src.remaining(); + src.position(src.position() + remaining); + written.addAndGet(remaining); + return remaining; + } + + @Override + public long write(ByteBuffer[] srcs, int offs, int len) throws IOException { + long total = 0; + for (int i = offs; i < len; i++) { + int written = write(srcs[i]); + if (written == 0) { + break; + } + total += written; + } + return total; + } + + @Override + public int writeFinal(ByteBuffer src) throws IOException { + return write(src); + } + + @Override + public long writeFinal(ByteBuffer[] srcs, int offset, int length) throws IOException { + return write(srcs, offset, length); + } + + @Override + public void terminateWrites() { + } + + @Override + public boolean isWriteShutdown() { + return false; + } + + @Override + public void resumeWrites() { + } + + @Override + public void suspendWrites() { + } + + @Override + public void wakeupWrites() { + } + + @Override + public boolean isWriteResumed() { + return false; + } + + @Override + public void awaitWritable() { + } + + @Override + public void awaitWritable(long time, TimeUnit timeUnit) { + + } + + @Override + public XnioIoThread getWriteThread() { + return null; + } + + @Override + public void setWriteReadyHandler(WriteReadyHandler handler) { + + } + + @Override + public void truncateWrites() { + + } + + @Override + public boolean flush() { + flushes.incrementAndGet(); + return true; + } + + @Override + public XnioWorker getWorker() { + return null; + } + }; + ConduitListener listener = channel -> listenerInvocations.incrementAndGet(); + ChunkedStreamSinkConduit conduit = new ChunkedStreamSinkConduit(next, pool, false, false, new HeaderMap(), listener, new AbstractAttachable() {}); + + assertEquals(5, conduit.write(ByteBuffer.wrap("Hello".getBytes(StandardCharsets.UTF_8)))); + assertEquals("Expected 11 bytes to be flushed including chunk headers", 11, written.get()); + assertEquals(0, flushes.get()); + conduit.terminateWrites(); + assertTrue(conduit.flush()); + int flushesAfterTerminate = flushes.get(); + assertTrue(conduit.flush()); + // UNDERTOW-2424: If this isn't the case, invocations from response wrappers may invoke flush on persistent + // connections that are already being used to process other requests on other threads. + assertEquals("Expected flushing after termination not to have any impact", flushesAfterTerminate, flushes.get()); + assertEquals(1, listenerInvocations.get()); + } +} diff --git a/core/src/test/java/io/undertow/server/handlers/accesslog/AccessLogFileWithUnescapedCharactersTestCase.java b/core/src/test/java/io/undertow/server/handlers/accesslog/AccessLogFileWithUnescapedCharactersTestCase.java new file mode 100644 index 0000000000..249c38bb41 --- /dev/null +++ b/core/src/test/java/io/undertow/server/handlers/accesslog/AccessLogFileWithUnescapedCharactersTestCase.java @@ -0,0 +1,113 @@ +/* + * JBoss, Home of Professional Open Source. + * Copyright 2024 Red Hat, Inc., and individual contributors + * as indicated by the @author tags. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package io.undertow.server.handlers.accesslog; + +import io.undertow.UndertowOptions; +import io.undertow.server.HttpHandler; +import io.undertow.server.HttpServerExchange; +import io.undertow.testutils.DefaultServer; +import io.undertow.testutils.HttpClientUtils; +import io.undertow.testutils.TestHttpClient; +import io.undertow.util.CompletionLatchHandler; +import io.undertow.util.FileUtils; +import io.undertow.util.StatusCodes; +import org.apache.http.HttpResponse; +import org.apache.http.client.methods.HttpGet; +import org.junit.After; +import org.junit.Assert; +import org.junit.Before; +import org.junit.Test; +import org.junit.runner.RunWith; +import org.xnio.OptionMap; + +import java.io.IOException; +import java.nio.charset.StandardCharsets; +import java.nio.file.Files; +import java.nio.file.Path; +import java.nio.file.Paths; + +/** + * Tests writing the access log to a file + * + * @author Flavia Rainone + */ +@RunWith(DefaultServer.class) +public class AccessLogFileWithUnescapedCharactersTestCase { + + private static final Path logDirectory = Paths.get(System.getProperty("java.io.tmpdir"), "logs"); + + private static final int NUM_THREADS = 10; + private static final int NUM_REQUESTS = 12; + + @Before + public void before() throws IOException { + Files.createDirectories(logDirectory); + } + + @After + public void after() throws IOException { + FileUtils.deleteRecursive(logDirectory); + } + + private static final HttpHandler HELLO_HANDLER = new HttpHandler() { + @Override + public void handleRequest(final HttpServerExchange exchange) throws Exception { + exchange.getResponseSender().send("Hello"); + } + }; + + @Test + public void testSingleLogMessageToFile() throws IOException, InterruptedException { + Path directory = logDirectory; + Path logFileName = directory.resolve("server1.log"); + DefaultAccessLogReceiver logReceiver = new DefaultAccessLogReceiver(DefaultServer.getWorker(), directory, "server1."); + verifySingleLogMessageToFile(logFileName, logReceiver); + } + + @Test + public void testSingleLogMessageToFileWithSuffix() throws IOException, InterruptedException { + Path directory = logDirectory; + Path logFileName = directory.resolve("server1.logsuffix"); + DefaultAccessLogReceiver logReceiver = new DefaultAccessLogReceiver(DefaultServer.getWorker(), directory, "server1.", "logsuffix"); + verifySingleLogMessageToFile(logFileName, logReceiver); + } + + private void verifySingleLogMessageToFile(Path logFileName, DefaultAccessLogReceiver logReceiver) throws IOException, InterruptedException { + CompletionLatchHandler latchHandler; + DefaultServer.setRootHandler(latchHandler = new CompletionLatchHandler(new AccessLogHandler(HELLO_HANDLER, logReceiver, + "%h \"%r\" %s %b", AccessLogFileWithUnescapedCharactersTestCase.class.getClassLoader()))); + DefaultServer.setUndertowOptions( + OptionMap.create(UndertowOptions.ALLOW_UNESCAPED_CHARACTERS_IN_URL, true)); + DefaultServer.setServerOptions(OptionMap.create(UndertowOptions.ALLOW_UNESCAPED_CHARACTERS_IN_URL, true)); + TestHttpClient client = new TestHttpClient(); + try { + HttpGet get = new HttpGet(DefaultServer.getDefaultServerURL() + "/helloworld/한글이름_test.html?param=한글이름_ahoy"); + HttpResponse result = client.execute(get); + Assert.assertEquals(StatusCodes.OK, result.getStatusLine().getStatusCode()); + Assert.assertEquals("Hello", HttpClientUtils.readResponse(result)); + latchHandler.await(); + logReceiver.awaitWrittenForTest(); + String written = new String(Files.readAllBytes(logFileName), StandardCharsets.UTF_8); + final String protocolVersion = DefaultServer.isH2()? "HTTP/2.0" : result.getProtocolVersion().toString(); + Assert.assertEquals(DefaultServer.getDefaultServerAddress().getAddress().getHostAddress() + " \"GET " + "/helloworld/한글이름_test.html?param=한글이름_ahoy " + protocolVersion + "\" 200 5" + System.lineSeparator(), written); + } finally { + client.getConnectionManager().shutdown(); + } + } +} diff --git a/core/src/test/java/io/undertow/server/protocol/ajp/AjpCharacterEncodingTestCase.java b/core/src/test/java/io/undertow/server/protocol/ajp/AjpCharacterEncodingTestCase.java index 307bb09279..ef6a000af5 100644 --- a/core/src/test/java/io/undertow/server/protocol/ajp/AjpCharacterEncodingTestCase.java +++ b/core/src/test/java/io/undertow/server/protocol/ajp/AjpCharacterEncodingTestCase.java @@ -30,6 +30,7 @@ import org.junit.AfterClass; import org.junit.Assert; import org.junit.BeforeClass; +import org.junit.Ignore; import org.junit.Test; import org.junit.runner.RunWith; import org.xnio.OptionMap; @@ -43,6 +44,7 @@ */ @RunWith(DefaultServer.class) @ProxyIgnore +@Ignore public class AjpCharacterEncodingTestCase { private static final int PORT = DefaultServer.getHostPort() + 10; diff --git a/core/src/test/java/io/undertow/server/protocol/http/SimpleParserTestCase.java b/core/src/test/java/io/undertow/server/protocol/http/SimpleParserTestCase.java index 39bd7649ce..25c7567501 100644 --- a/core/src/test/java/io/undertow/server/protocol/http/SimpleParserTestCase.java +++ b/core/src/test/java/io/undertow/server/protocol/http/SimpleParserTestCase.java @@ -673,7 +673,7 @@ public void testNonEncodedAsciiCharactersExplicitlyAllowed() throws UnsupportedE HttpRequestParser.instance(OptionMap.create(UndertowOptions.ALLOW_UNESCAPED_CHARACTERS_IN_URL, true)).handle(ByteBuffer.wrap(in), context, result); Assert.assertSame(Methods.GET, result.getRequestMethod()); Assert.assertEquals("/bår", result.getRequestPath()); - Assert.assertEquals("/bÃ¥r", result.getRequestURI()); //not decoded + Assert.assertEquals("/bår", result.getRequestURI()); //!not decoded } @Test @@ -715,7 +715,6 @@ public void testDirectoryTraversal() throws Exception { Assert.assertEquals("", result.getQueryString()); } - private void runTest(final byte[] in) throws BadRequestException { runTest(in, "some value"); } diff --git a/servlet/src/main/java/io/undertow/servlet/spec/AsyncContextImpl.java b/servlet/src/main/java/io/undertow/servlet/spec/AsyncContextImpl.java index f342c2b754..c21594f65a 100644 --- a/servlet/src/main/java/io/undertow/servlet/spec/AsyncContextImpl.java +++ b/servlet/src/main/java/io/undertow/servlet/spec/AsyncContextImpl.java @@ -60,6 +60,7 @@ import io.undertow.servlet.handlers.ServletPathMatch; import io.undertow.servlet.handlers.ServletRequestContext; import io.undertow.servlet.util.DispatchUtils; +import io.undertow.util.BadRequestException; import io.undertow.util.CanonicalPathUtils; import io.undertow.util.Headers; import io.undertow.util.ParameterLimitException; @@ -223,7 +224,7 @@ public void dispatch(final ServletContext context, final String path) { ServletPathMatch info; try { info = DispatchUtils.dispatchAsync(path, requestImpl, responseImpl, (ServletContextImpl) context); - } catch (ParameterLimitException e) { + } catch (ParameterLimitException | BadRequestException e) { throw new IllegalStateException(e); } diff --git a/servlet/src/main/java/io/undertow/servlet/spec/RequestDispatcherImpl.java b/servlet/src/main/java/io/undertow/servlet/spec/RequestDispatcherImpl.java index 473c9f971b..bbfaa13990 100644 --- a/servlet/src/main/java/io/undertow/servlet/spec/RequestDispatcherImpl.java +++ b/servlet/src/main/java/io/undertow/servlet/spec/RequestDispatcherImpl.java @@ -46,6 +46,7 @@ import io.undertow.servlet.handlers.ServletChain; import io.undertow.servlet.handlers.ServletPathMatch; import io.undertow.servlet.util.DispatchUtils; +import io.undertow.util.BadRequestException; import io.undertow.util.ParameterLimitException; /** @@ -173,7 +174,7 @@ private void forwardImpl(ServletRequest request, ServletResponse response, Servl if (!named) { try { pathMatch = DispatchUtils.dispatchForward(path, requestImpl, responseImpl, servletContext); - } catch (ParameterLimitException e) { + } catch (ParameterLimitException | BadRequestException e) { throw new ServletException(e); } } @@ -319,7 +320,7 @@ private void includeImpl(ServletRequest request, ServletResponse response, Servl try { pathMatch = DispatchUtils.dispatchInclude(path, requestImpl, responseImpl, servletContext); - } catch (ParameterLimitException e) { + } catch (ParameterLimitException | BadRequestException e) { throw new ServletException(e); } } @@ -403,7 +404,7 @@ private void error(ServletRequestContext servletRequestContext, final ServletReq ServletPathMatch pathMatch; try { pathMatch = DispatchUtils.dispatchError(path, servletName, exception, message, requestImpl, responseImpl, servletContext); - } catch (ParameterLimitException e) { + } catch (ParameterLimitException | BadRequestException e) { throw new ServletException(e); } diff --git a/servlet/src/main/java/io/undertow/servlet/spec/ServletOutputStreamImpl.java b/servlet/src/main/java/io/undertow/servlet/spec/ServletOutputStreamImpl.java index 7829a7528e..0865545863 100644 --- a/servlet/src/main/java/io/undertow/servlet/spec/ServletOutputStreamImpl.java +++ b/servlet/src/main/java/io/undertow/servlet/spec/ServletOutputStreamImpl.java @@ -178,34 +178,14 @@ private void writeTooLargeForBuffer(byte[] b, int off, int len, ByteBuffer buffe int rem = buffer.remaining(); buffer.put(b, bytesWritten + off, rem); buffer.flip(); - bytesWritten += rem; - int bufferCount = 1; - for (int i = 0; i < MAX_BUFFERS_TO_ALLOCATE; ++i) { - PooledByteBuffer pooled = bufferPool.allocate(); - pooledBuffers[bufferCount - 1] = pooled; - buffers[bufferCount++] = pooled.getBuffer(); - ByteBuffer cb = pooled.getBuffer(); - int toWrite = len - bytesWritten; - if (toWrite > cb.remaining()) { - rem = cb.remaining(); - cb.put(b, bytesWritten + off, rem); - cb.flip(); - bytesWritten += rem; - } else { - cb.put(b, bytesWritten + off, toWrite); - bytesWritten = len; - cb.flip(); - break; - } - } - Channels.writeBlocking(channel, buffers, 0, bufferCount); - while (bytesWritten < len) { - //ok, it did not fit, loop and loop and loop until it is done - bufferCount = 0; - for (int i = 0; i < MAX_BUFFERS_TO_ALLOCATE + 1; ++i) { - ByteBuffer cb = buffers[i]; - cb.clear(); - bufferCount++; + try { + bytesWritten += rem; + int bufferCount = 1; + for (int i = 0; i < MAX_BUFFERS_TO_ALLOCATE; ++i) { + PooledByteBuffer pooled = bufferPool.allocate(); + pooledBuffers[bufferCount - 1] = pooled; + buffers[bufferCount++] = pooled.getBuffer(); + ByteBuffer cb = pooled.getBuffer(); int toWrite = len - bytesWritten; if (toWrite > cb.remaining()) { rem = cb.remaining(); @@ -219,9 +199,38 @@ private void writeTooLargeForBuffer(byte[] b, int off, int len, ByteBuffer buffe break; } } - Channels.writeBlocking(channel, buffers, 0, bufferCount); + writeBlocking(buffers, 0, bufferCount, bytesWritten); + // at this point, we know that all buffers[i] have 0 bytes remaining(), so it is safe to loop next just + // until we reach len, even if we stop before reaching the end of buffers array + while (bytesWritten < len) { + int oldBytesWritten = bytesWritten; + //ok, it did not fit, loop and loop and loop until it is done + bufferCount = 0; + for (int i = 0; i < MAX_BUFFERS_TO_ALLOCATE + 1; ++i) { + ByteBuffer cb = buffers[i]; + cb.clear(); + bufferCount++; + int toWrite = len - bytesWritten; + if (toWrite > cb.remaining()) { + rem = cb.remaining(); + cb.put(b, bytesWritten + off, rem); + cb.flip(); + bytesWritten += rem; + } else { + cb.put(b, bytesWritten + off, toWrite); + bytesWritten = len; + cb.flip(); + // safe to break, all buffers that come next have zero remaining() bytes and hence + // won't affect the next writeBlocking call + break; + } + } + writeBlocking(buffers, 0, bufferCount, bytesWritten - oldBytesWritten); + } + } finally { + if (buffer != null) + buffer.compact(); } - buffer.clear(); } finally { for (int i = 0; i < pooledBuffers.length; ++i) { PooledByteBuffer p = pooledBuffers[i]; @@ -245,29 +254,36 @@ private void writeAsync(byte[] b, int off, int len) throws IOException { buffer.put(b, off, len); } else { buffer.flip(); - final ByteBuffer userBuffer = ByteBuffer.wrap(b, off, len); - final ByteBuffer[] bufs = new ByteBuffer[]{buffer, userBuffer}; - long toWrite = Buffers.remaining(bufs); - long res; - long written = 0; - createChannel(); - setFlags(FLAG_WRITE_STARTED); - do { - res = channel.write(bufs); - written += res; - if (res == 0) { - //write it out with a listener - //but we need to copy any extra data - final ByteBuffer copy = ByteBuffer.allocate(userBuffer.remaining()); - copy.put(userBuffer); - copy.flip(); - - this.buffersToWrite = new ByteBuffer[]{buffer, copy}; - clearFlags(FLAG_READY); - return; + boolean clearBuffer = true; + try { + final ByteBuffer userBuffer = ByteBuffer.wrap(b, off, len); + final ByteBuffer[] bufs = new ByteBuffer[]{buffer, userBuffer}; + long toWrite = Buffers.remaining(bufs); + long res; + long written = 0; + createChannel(); + setFlags(FLAG_WRITE_STARTED); + do { + res = channel.write(bufs); + written += res; + if (res == 0) { + //write it out with a listener + //but we need to copy any extra data + final ByteBuffer copy = ByteBuffer.allocate(userBuffer.remaining()); + copy.put(userBuffer); + copy.flip(); + + this.buffersToWrite = new ByteBuffer[]{buffer, copy}; + clearFlags(FLAG_READY); + clearBuffer = false; + return; + } + } while (written < toWrite); + } finally { + if (clearBuffer && buffer != null) { + buffer.compact(); } - } while (written < toWrite); - buffer.clear(); + } } } finally { updateWrittenAsync(len); @@ -296,7 +312,7 @@ public void write(ByteBuffer[] buffers) throws IOException { if (channel == null) { channel = servletRequestContext.getExchange().getResponseChannel(); } - Channels.writeBlocking(channel, buffers, 0, buffers.length); + writeBlocking(buffers, 0, buffers.length, len); setFlags(FLAG_WRITE_STARTED); } else { ByteBuffer buffer = buffer(); @@ -307,14 +323,18 @@ public void write(ByteBuffer[] buffers) throws IOException { channel = servletRequestContext.getExchange().getResponseChannel(); } if (buffer.position() == 0) { - Channels.writeBlocking(channel, buffers, 0, buffers.length); + writeBlocking(buffers, 0, buffers.length, len); } else { final ByteBuffer[] newBuffers = new ByteBuffer[buffers.length + 1]; buffer.flip(); - newBuffers[0] = buffer; - System.arraycopy(buffers, 0, newBuffers, 1, buffers.length); - Channels.writeBlocking(channel, newBuffers, 0, newBuffers.length); - buffer.clear(); + try { + newBuffers[0] = buffer; + System.arraycopy(buffers, 0, newBuffers, 1, buffers.length); + writeBlocking(newBuffers, 0, newBuffers.length, len + buffer.remaining()); + } finally { + if (buffer != null) + buffer.clear(); + } } setFlags(FLAG_WRITE_STARTED); } @@ -333,30 +353,34 @@ public void write(ByteBuffer[] buffers) throws IOException { } else { final ByteBuffer[] bufs = new ByteBuffer[buffers.length + 1]; buffer.flip(); - bufs[0] = buffer; - System.arraycopy(buffers, 0, bufs, 1, buffers.length); - long toWrite = Buffers.remaining(bufs); - long res; - long written = 0; - createChannel(); - setFlags(FLAG_WRITE_STARTED); - do { - res = channel.write(bufs); - written += res; - if (res == 0) { - //write it out with a listener - //but we need to copy any extra data - //TODO: should really allocate from the pool here - final ByteBuffer copy = ByteBuffer.allocate((int) Buffers.remaining(buffers)); - Buffers.copy(copy, buffers, 0, buffers.length); - copy.flip(); - this.buffersToWrite = new ByteBuffer[]{buffer, copy}; - clearFlags(FLAG_READY); - channel.resumeWrites(); - return; - } - } while (written < toWrite); - buffer.clear(); + try { + bufs[0] = buffer; + System.arraycopy(buffers, 0, bufs, 1, buffers.length); + long toWrite = Buffers.remaining(bufs); + long res; + long written = 0; + createChannel(); + setFlags(FLAG_WRITE_STARTED); + do { + res = channel.write(bufs); + written += res; + if (res == 0) { + //write it out with a listener + //but we need to copy any extra data + //TODO: should really allocate from the pool here + final ByteBuffer copy = ByteBuffer.allocate((int) Buffers.remaining(buffers)); + Buffers.copy(copy, buffers, 0, buffers.length); + copy.flip(); + this.buffersToWrite = new ByteBuffer[] { buffer, copy }; + clearFlags(FLAG_READY); + channel.resumeWrites(); + return; + } + } while (written < toWrite); + } finally { + if (buffer != null) + buffer.compact(); + } } } finally { updateWrittenAsync(len); @@ -515,14 +539,18 @@ public void flushInternal() throws IOException { //if the write fails we just compact, rather than changing the ready state setFlags(FLAG_WRITE_STARTED); buffer.flip(); - long res; - do { - res = channel.write(buffer); - } while (buffer.hasRemaining() && res != 0); - if (!buffer.hasRemaining()) { - channel.flush(); + try { + long res; + do { + res = channel.write(buffer); + } while (buffer.hasRemaining() && res != 0); + if (!buffer.hasRemaining()) { + channel.flush(); + } + } finally { + if (buffer != null) + buffer.compact(); } - buffer.compact(); } } @@ -579,14 +607,18 @@ private void writeBufferBlocking(final boolean writeFinal) throws IOException { channel = servletRequestContext.getExchange().getResponseChannel(); } buffer.flip(); - while (buffer.hasRemaining()) { - int result = writeFinal ? channel.writeFinal(buffer) : channel.write(buffer); - if (result == 0) { - channel.awaitWritable(); + try { + while (buffer.hasRemaining()) { + int result = writeFinal ? channel.writeFinal(buffer) : channel.write(buffer); + if (result == 0) { + channel.awaitWritable(); + } } + } finally { + if (buffer != null) + buffer.compact(); + setFlags(FLAG_WRITE_STARTED); } - buffer.clear(); - setFlags(FLAG_WRITE_STARTED); } /** @@ -964,4 +996,10 @@ private void clearFlags(int flags) { } while (!stateUpdater.compareAndSet(this, old, old & ~flags)); } + private void writeBlocking(ByteBuffer[] buffers, int offs, int len, int bytesToWrite) throws IOException { + int totalWritten = 0; + do { + totalWritten += Channels.writeBlocking(channel, buffers, 0, len); + } while (totalWritten < bytesToWrite); + } } diff --git a/servlet/src/main/java/io/undertow/servlet/spec/ServletPrintWriter.java b/servlet/src/main/java/io/undertow/servlet/spec/ServletPrintWriter.java index a48232f9bb..e9d6a13899 100644 --- a/servlet/src/main/java/io/undertow/servlet/spec/ServletPrintWriter.java +++ b/servlet/src/main/java/io/undertow/servlet/spec/ServletPrintWriter.java @@ -95,7 +95,9 @@ public void close() { underflow = null; } if (charsetEncoder != null) { + int remaining = 0; do { + // before we get the underlying buffer, we need to flush outputStream ByteBuffer out = outputStream.underlyingBuffer(); if (out == null) { //servlet output stream has already been closed @@ -105,11 +107,13 @@ public void close() { CoderResult result = charsetEncoder.encode(buffer, out, true); if (result.isOverflow()) { outputStream.flushInternal(); - if (out.remaining() == 0) { + if (out.remaining() == remaining) { + // no progress in flush outputStream.close(); error = true; return; - } + } else + remaining = out.remaining(); } else { done = true; } @@ -169,7 +173,7 @@ public void write(final CharBuffer input) { outputStream.updateWritten(writtenLength); if (result.isOverflow() || !buffer.hasRemaining()) { outputStream.flushInternal(); - if (!buffer.hasRemaining()) { + if (buffer.remaining() == remaining) { error = true; return; } diff --git a/servlet/src/main/java/io/undertow/servlet/util/DispatchUtils.java b/servlet/src/main/java/io/undertow/servlet/util/DispatchUtils.java index 1845536744..f0777cca34 100644 --- a/servlet/src/main/java/io/undertow/servlet/util/DispatchUtils.java +++ b/servlet/src/main/java/io/undertow/servlet/util/DispatchUtils.java @@ -24,6 +24,7 @@ import io.undertow.servlet.spec.HttpServletRequestImpl; import io.undertow.servlet.spec.HttpServletResponseImpl; import io.undertow.servlet.spec.ServletContextImpl; +import io.undertow.util.BadRequestException; import io.undertow.util.ParameterLimitException; import java.util.Deque; import java.util.Map; @@ -77,11 +78,12 @@ private DispatchUtils() { * @param servletContext The servlet context * @return The match for the path * @throws ParameterLimitException parameter limit exceeded + * @throws BadRequestException */ public static ServletPathMatch dispatchForward(final String path, final HttpServletRequestImpl requestImpl, final HttpServletResponseImpl responseImpl, - final ServletContextImpl servletContext) throws ParameterLimitException { + final ServletContextImpl servletContext) throws ParameterLimitException, BadRequestException { //only update if this is the first forward if (requestImpl.getAttribute(FORWARD_REQUEST_URI) == null) { requestImpl.setAttribute(FORWARD_REQUEST_URI, requestImpl.getRequestURI()); @@ -111,11 +113,12 @@ public static ServletPathMatch dispatchForward(final String path, * @param servletContext The servlet context * @return The match for the path * @throws ParameterLimitException parameter limit exceeded + * @throws BadRequestException */ public static ServletPathMatch dispatchInclude(final String path, final HttpServletRequestImpl requestImpl, final HttpServletResponseImpl responseImpl, - final ServletContextImpl servletContext) throws ParameterLimitException { + final ServletContextImpl servletContext) throws ParameterLimitException, BadRequestException { final String newRequestPath = assignRequestPath(path, requestImpl, servletContext, true); final ServletPathMatch pathMatch = servletContext.getDeployment().getServletPaths().getServletHandlerByPath(newRequestPath); @@ -140,12 +143,13 @@ public static ServletPathMatch dispatchInclude(final String path, * @param servletContext The servlet context * @return The match for the path * @throws ParameterLimitException parameter limit exceeded + * @throws BadRequestException */ public static ServletPathMatch dispatchError(final String path, final String servletName, final Throwable exception, final String message, final HttpServletRequestImpl requestImpl, final HttpServletResponseImpl responseImpl, - final ServletContextImpl servletContext) throws ParameterLimitException { + final ServletContextImpl servletContext) throws ParameterLimitException, BadRequestException { //only update if this is the first forward if (requestImpl.getAttribute(FORWARD_REQUEST_URI) == null) { requestImpl.setAttribute(FORWARD_REQUEST_URI, requestImpl.getRequestURI()); @@ -189,11 +193,12 @@ public static ServletPathMatch dispatchError(final String path, final String ser * @param servletContext The servlet context * @return The match for the path * @throws ParameterLimitException parameter limit exceeded + * @throws BadRequestException */ public static ServletPathMatch dispatchAsync(final String path, final HttpServletRequestImpl requestImpl, final HttpServletResponseImpl responseImpl, - final ServletContextImpl servletContext) throws ParameterLimitException { + final ServletContextImpl servletContext) throws ParameterLimitException, BadRequestException { requestImpl.setAttribute(ASYNC_REQUEST_URI, requestImpl.getOriginalRequestURI()); requestImpl.setAttribute(ASYNC_CONTEXT_PATH, requestImpl.getOriginalContextPath()); requestImpl.setAttribute(ASYNC_SERVLET_PATH, requestImpl.getOriginalServletPath()); @@ -229,7 +234,7 @@ private static Map> mergeQueryParameters(final Map + + + + + + + +