diff --git a/build.xml b/build.xml index e01e479686b1ca53bf63869782be33c12374f958..21aa3fb3a65061f950a45c1460d3074a45f48f9d 100644 --- a/build.xml +++ b/build.xml @@ -2592,16 +2592,26 @@ </target> <target name="debcheckpatch"> + <echo message="Checking debian/patches/0001-path-substitution.patch" /> <exec executable="patch" failonerror="true" input="debian/patches/0001-path-substitution.patch" > <arg value="--dry-run" /> <arg value="-F0" /> <arg value="-p1" /> </exec> + <echo /> + <echo message="Checking debian/patches/0002-jetty-compatibility.patch" /> <exec executable="patch" failonerror="true" input="debian/patches/0002-jetty-compatibility.patch" > <arg value="--dry-run" /> <arg value="-F0" /> <arg value="-p1" /> </exec> + <echo /> + <echo message="Checking debian-alt/xenial/patches/0002-jetty-old-api.patch" /> + <exec executable="patch" failonerror="true" input="debian-alt/xenial/patches/0002-jetty-old-api.patch" > + <arg value="--dry-run" /> + <arg value="-F0" /> + <arg value="-p1" /> + </exec> </target> diff --git a/debian-alt/xenial/patches/0002-jetty-old-api.patch b/debian-alt/xenial/patches/0002-jetty-old-api.patch index 569b38662f6fb5e6a5fab4f02665b2b9fe3450c3..d918a6641baf1c061f672c54862e6efbf7b1eb2f 100644 --- a/debian-alt/xenial/patches/0002-jetty-old-api.patch +++ b/debian-alt/xenial/patches/0002-jetty-old-api.patch @@ -1,7 +1,29 @@ +Index: b/apps/jetty/java/src/net/i2p/jetty/I2PRequestLog.java +============================================================ +--- a/apps/jetty/java/src/net/i2p/jetty/I2PRequestLog.java ++++ b/apps/jetty/java/src/net/i2p/jetty/I2PRequestLog.java +@@ -317,7 +317,7 @@ public class I2PRequestLog extends Abstr + buf.append(request.getMethod()); + buf.append(' '); + +- u8buf.append(request.getHttpURI().toString()); ++ request.getUri().writeTo(u8buf); + + buf.append(' '); + buf.append(request.getProtocol()); Index: b/apps/routerconsole/java/src/net/i2p/router/web/HostCheckHandler.java =================================================================== --- a/apps/routerconsole/java/src/net/i2p/router/web/HostCheckHandler.java +++ b/apps/routerconsole/java/src/net/i2p/router/web/HostCheckHandler.java +@@ -15,7 +15,7 @@ import org.eclipse.jetty.server.Request; + import net.i2p.util.PortMapper; + + import org.eclipse.jetty.server.Request; +-import org.eclipse.jetty.server.handler.gzip.GzipHandler; ++import org.eclipse.jetty.servlets.gzip.GzipHandler; + + /** + * Block certain Host headers to prevent DNS rebinding attacks. @@ -44,19 +44,12 @@ public class HostCheckHandler extends Gz _listenHosts = new HashSet<String>(8); setMinGzipSize(64*1024); @@ -24,3 +46,18 @@ Index: b/apps/routerconsole/java/src/net/i2p/router/web/HostCheckHandler.java } } +Index: b/apps/routerconsole/java/src/net/i2p/router/web/RouterConsoleRunner.java +============================================================ +--- a/apps/routerconsole/java/src/net/i2p/router/web/RouterConsoleRunner.java ++++ b/apps/routerconsole/java/src/net/i2p/router/web/RouterConsoleRunner.java +@@ -1085,8 +1085,8 @@ public class RouterConsoleRunner impleme + } + + @Override +- public UserIdentity login(String username, Object credentials, ServletRequest request) { +- UserIdentity rv = super.login(username, credentials, request); ++ public UserIdentity login(String username, Object credentials) { ++ UserIdentity rv = super.login(username, credentials); + if (rv == null) + //_log.logAlways(net.i2p.util.Log.WARN, "Console authentication failed, webapp: " + _webapp + ", user: " + username); + _log.logAlways(net.i2p.util.Log.WARN, "Console authentication failed, user: " + username); diff --git a/debian/patches/0002-jetty-compatibility.patch b/debian/patches/0002-jetty-compatibility.patch index 59f8542d11f8ac8c649018454e76c8ed00ecfaf0..b109c9f9e2e0161010380903251df97ff62fa58f 100644 --- a/debian/patches/0002-jetty-compatibility.patch +++ b/debian/patches/0002-jetty-compatibility.patch @@ -23,39 +23,9 @@ protected void sendDirectory(HttpServletRequest request, HttpServletResponse response, Resource resource, ---- a/apps/jetty/java/src/net/i2p/jetty/I2PRequestLog.java -+++ b/apps/jetty/java/src/net/i2p/jetty/I2PRequestLog.java -@@ -317,7 +317,7 @@ - buf.append(request.getMethod()); - buf.append(' '); - -- request.getUri().writeTo(u8buf); -+ u8buf.append(request.getHttpURI().toString()); - - buf.append(' '); - buf.append(request.getProtocol()); ---- a/apps/routerconsole/java/src/net/i2p/router/web/HostCheckHandler.java -+++ b/apps/routerconsole/java/src/net/i2p/router/web/HostCheckHandler.java -@@ -15,7 +15,7 @@ - import net.i2p.util.PortMapper; - - import org.eclipse.jetty.server.Request; --import org.eclipse.jetty.servlets.gzip.GzipHandler; -+import org.eclipse.jetty.server.handler.gzip.GzipHandler; - - /** - * Block certain Host headers to prevent DNS rebinding attacks. --- a/apps/routerconsole/java/src/net/i2p/router/web/RouterConsoleRunner.java +++ b/apps/routerconsole/java/src/net/i2p/router/web/RouterConsoleRunner.java -@@ -22,6 +22,7 @@ - import java.util.SortedSet; - import java.util.StringTokenizer; - import java.util.concurrent.LinkedBlockingQueue; -+import javax.servlet.ServletRequest; - - import net.i2p.I2PAppContext; - import net.i2p.app.ClientApp; -@@ -48,6 +49,7 @@ +@@ -49,6 +50,7 @@ import org.eclipse.jetty.security.HashLoginService; import org.eclipse.jetty.security.ConstraintMapping; import org.eclipse.jetty.security.ConstraintSecurityHandler; @@ -63,7 +33,7 @@ import org.eclipse.jetty.security.authentication.DigestAuthenticator; import org.eclipse.jetty.server.AbstractConnector; import org.eclipse.jetty.server.ConnectionFactory; -@@ -968,6 +970,8 @@ +@@ -972,6 +974,8 @@ } else { HashLoginService realm = new CustomHashLoginService(JETTY_REALM, context.getContextPath(), ctx.logManager().getLog(RouterConsoleRunner.class)); @@ -72,7 +42,7 @@ sec.setLoginService(realm); sec.setAuthenticator(authenticator); String[] role = new String[] {JETTY_ROLE}; -@@ -975,7 +979,7 @@ +@@ -979,7 +983,7 @@ String user = e.getKey(); String pw = e.getValue(); Credential cred = Credential.getCredential(MD5_CREDENTIAL_TYPE + pw); @@ -81,7 +51,7 @@ Constraint constraint = new Constraint(user, JETTY_ROLE); constraint.setAuthenticate(true); ConstraintMapping cm = new ConstraintMapping(); -@@ -995,7 +999,7 @@ +@@ -999,7 +1003,7 @@ try { // each char truncated to 8 bytes String user2 = new String(b2, "ISO-8859-1"); @@ -90,7 +60,7 @@ constraint = new Constraint(user2, JETTY_ROLE); constraint.setAuthenticate(true); cm = new ConstraintMapping(); -@@ -1006,7 +1010,7 @@ +@@ -1010,7 +1014,7 @@ // each UTF-8 byte as a char // this is what chrome does String user3 = new String(b1, "ISO-8859-1"); @@ -99,17 +69,6 @@ constraint = new Constraint(user3, JETTY_ROLE); constraint.setAuthenticate(true); cm = new ConstraintMapping(); -@@ -1081,8 +1085,8 @@ - } - - @Override -- public UserIdentity login(String username, Object credentials) { -- UserIdentity rv = super.login(username, credentials); -+ public UserIdentity login(String username, Object credentials, ServletRequest request) { -+ UserIdentity rv = super.login(username, credentials, request); - if (rv == null) - //_log.logAlways(net.i2p.util.Log.WARN, "Console authentication failed, webapp: " + _webapp + ", user: " + username); - _log.logAlways(net.i2p.util.Log.WARN, "Console authentication failed, user: " + username); --- a/apps/routerconsole/java/src/net/i2p/router/web/LocaleWebAppHandler.java +++ b/apps/routerconsole/java/src/net/i2p/router/web/LocaleWebAppHandler.java @@ -85,9 +85,9 @@ @@ -124,48 +83,3 @@ if (servletPath != null && !servletPath.startsWith("*")) { // success!! //System.err.println("Servlet is: " + servletPath); ---- a/installer/resources/eepsite/contexts/base-context.xml -+++ b/installer/resources/eepsite/contexts/base-context.xml -@@ -42,42 +42,5 @@ to serve static html files and images. - <Arg>net.i2p.servlet.I2PDefaultServlet</Arg> - <Arg>/</Arg> - </Call> -- <Call name="addFilter"> -- <!-- Add a filter to gzip on-the fly, since if we don't do it, I2P will. -- - This lowers the resource usage in the Java process on the client side, -- - by pushing the decompression out of Java and into the browser. -- - For all the reasons noted in the GzipFilter javadocs, this is normally -- - a bad idea for static content, but this is I2P. -- - See I2PTunnelHTTPServer for the I2P compressor. -- --> -- <Arg> -- <New class="org.eclipse.jetty.servlet.FilterHolder" > -- <Arg> -- <New class="org.eclipse.jetty.servlets.GzipFilter" /> -- </Arg> -- <Call name="setInitParameter"> -- <!-- minimum in Java is 1300 --> -- <Arg>minGzipSize</Arg> -- <Arg>512</Arg> -- </Call> -- <Call name="setInitParameter"> -- <!-- In Java we have a blacklist. This covers the most common cases. --> -- <Arg>mimeTypes</Arg> -- <Arg>application/pdf,application/x-javascript,application/xhtml+xml,application/xml,image/svg+xml,text/css,text/html,text/plain</Arg> -- </Call> -- </New> -- </Arg> -- <Arg>/*</Arg> -- <Arg> -- <!-- just guessing here --> -- <Call class="java.util.EnumSet" name="of" > -- <Arg> -- <Call class="javax.servlet.DispatcherType" name="valueOf" > -- <Arg>REQUEST</Arg> -- </Call> -- </Arg> -- </Call> -- </Arg> -- </Call> - </Configure> -