Hi Mark,

Thanks, can you tell me how to enable all security in tomcat Catalina.policy.

Thanks,

Suresh Kesavan
OISM/ASD
National Institute of Standards and Technology
Office:- 301-975-6973

-----Original Message-----
From: Mark Thomas <ma...@apache.org> 
Sent: Wednesday, March 29, 2023 8:37 PM
To: users@tomcat.apache.org
Subject: Re: [org.apache.jasper.JasperException: Unable to compile class for 
JSP] with root cause

Hi,

I am unable to reproduce this with a clean build of the current 9.0.x source.

I built the sample application without configuring the connection to Azure.

Once deployed, it failed with a security permissions error. This has fixed by 
adding the following to the web application permissions:

permission java.util.PropertyPermission 
"com.ctc.wstx.returnNullForDefaultNamespace", "read";

No other changes were made compared to the default.

The index page then showed correctly.

Mark



On 27/03/2023 16:47, Kesavan, Suresh Prabhu (Fed) wrote:
> Hi Mark,
> 
> Sure, below is the policy file
> 
> */_catalina.policy_/*
> 
> // Licensed to the Apache Software Foundation (ASF) under one or more 
> // contributor license agreements.  See the NOTICE file distributed 
> with // this work for additional information regarding copyright ownership.
> // The ASF licenses this file to You under the Apache License, Version 
> 2.0 // (the "License"); you may not use this file except in compliance 
> with // the License.  You may obtain a copy of the License at //
> //     
> https://gcc02.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.apache.org%2Flicenses%2FLICENSE-2.0&data=05%7C01%7Csureshprabhu.kesavan%40nist.gov%7C0fae3558eb82448fe0f408db30b6dbe9%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C0%7C638157334161987625%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=1MXkLyzwJ0d9CWADPfIAjbvaGHlX2whCFY7iPYR3sdM%3D&reserved=0
> //
> // Unless required by applicable law or agreed to in writing, software 
> // distributed under the License is distributed on an "AS IS" BASIS, 
> // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
> // See the License for the specific language governing permissions and 
> // limitations under the License.
> 
> // 
> ======================================================================
> ====== // catalina.policy - Security Policy Permissions for Tomcat // 
> // This file contains a default set of security policies to be 
> enforced (by the // JVM) when Catalina is executed with the 
> "-security" option.  In addition // to the permissions granted here, 
> the following additional permissions are // granted to each web application:
> //
> // * Read access to the web application's document root directory // * 
> Read, write and delete access to the web application's working 
> directory // 
> ======================================================================
> ======
> 
> 
> // ========== SYSTEM CODE PERMISSIONS 
> =========================================
> 
> 
> // These permissions apply to javac
> grant codeBase "file:${java.home}/lib/-" {
>          permission java.security.AllPermission; };
> 
> // These permissions apply to all shared system extensions grant 
> codeBase "file:${java.home}/jre/lib/ext/-" {
>          permission java.security.AllPermission; };
> 
> // These permissions apply to javac when ${java.home} points at 
> $JAVA_HOME/jre grant codeBase "file:${java.home}/../lib/-" {
>          permission java.security.AllPermission; };
> 
> // These permissions apply to all shared system extensions when // 
> ${java.home} points at $JAVA_HOME/jre grant codeBase 
> "file:${java.home}/lib/ext/-" {
>          permission java.security.AllPermission; };
> 
> // This permission is required when using javac to compile JSPs on 
> Java 9 // onwards grant codeBase "jrt:/jdk.compiler" {
>          permission java.security.AllPermission; };
> 
> 
> // ========== CATALINA CODE PERMISSIONS 
> =======================================
> 
> // These permissions apply to the daemon code
> grant codeBase "file:${catalina.home}/bin/commons-daemon.jar" {
>          permission java.security.AllPermission;
> };
> 
> // These permissions apply to the logging API
> // Note: If tomcat-juli.jar is in ${catalina.base} and not in 
> ${catalina.home},
> // update this section accordingly.
> //  grant codeBase "file:${catalina.base}/bin/tomcat-juli.jar" {..}
> grant codeBase "file:${catalina.home}/bin/tomcat-juli.jar" {
>          permission java.io.FilePermission
>           
> "${java.home}${file.separator}lib${file.separator}logging.properties", "read";
> 
>          permission java.io.FilePermission
>           
> "${catalina.base}${file.separator}conf${file.separator}logging.properties", 
> "read";
>          permission java.io.FilePermission
>           "${catalina.base}${file.separator}logs", "read, write";
>          permission java.io.FilePermission
>           "${catalina.base}${file.separator}logs${file.separator}*", "read, 
> write, delete";
> 
>          permission java.lang.RuntimePermission "shutdownHooks";
>          permission java.lang.RuntimePermission "getClassLoader";
>          permission java.lang.RuntimePermission "setContextClassLoader";
> 
>          permission java.lang.management.ManagementPermission "monitor";
> 
>          permission java.util.logging.LoggingPermission "control";
> 
>          permission java.util.PropertyPermission 
> "java.util.logging.config.class", "read";
>          permission java.util.PropertyPermission 
> "java.util.logging.config.file", "read";
>          permission java.util.PropertyPermission 
> "org.apache.juli.AsyncMaxRecordCount", "read";
>          permission java.util.PropertyPermission 
> "org.apache.juli.AsyncOverflowDropType", "read";
>          permission java.util.PropertyPermission 
> "org.apache.juli.ClassLoaderLogManager.debug", "read";
>          permission java.util.PropertyPermission "catalina.base", "read";
> 
>          // Note: To enable per context logging configuration, permit read 
> access to
>          // the appropriate file. Be sure that the logging configuration is
>          // secure before enabling such access.
>          // E.g. for the examples web application (uncomment and unwrap
>          // the following to be on a single line):
>          // permission java.io.FilePermission 
> "${catalina.base}${file.separator}
>          //  webapps${file.separator}examples${file.separator}WEB-INF
>          //  ${file.separator}classes${file.separator}logging.properties", 
> "read";
> };
> 
> // These permissions apply to the server startup code
> grant codeBase "file:${catalina.home}/bin/bootstrap.jar" {
>          permission java.security.AllPermission;
> };
> 
> // These permissions apply to the servlet API classes
> // and those that are shared across all class loaders
> // located in the "lib" directory
> grant codeBase "file:${catalina.home}/lib/-" {
>          permission java.security.AllPermission;
> };
> 
> 
> // If using a per instance lib directory, i.e. ${catalina.base}/lib,
> // then the following permission will need to be uncommented
> // grant codeBase "file:${catalina.base}/lib/-" {
> //         permission java.security.AllPermission;
> // };
> 
> 
> // ========== WEB APPLICATION PERMISSIONS 
> =====================================
> 
> 
> // These permissions are granted by default to all web applications
> // In addition, a web application will be given a read FilePermission
> // for all files and directories in its document root.
> grant {
>      // Required for JNDI lookup of named JDBC DataSource's and
>      // javamail named MimePart DataSource used to send mail
>      permission java.util.PropertyPermission "java.home", "read";
>      permission java.util.PropertyPermission "java.naming.*", "read";
>      permission java.util.PropertyPermission "javax.sql.*", "read";
> 
>      // OS Specific properties to allow read access
>      permission java.util.PropertyPermission "os.name", "read";
>      permission java.util.PropertyPermission "os.version", "read";
>      permission java.util.PropertyPermission "os.arch", "read";
>      permission java.util.PropertyPermission "file.separator", "read";
>      permission java.util.PropertyPermission "path.separator", "read";
>      permission java.util.PropertyPermission "line.separator", "read";
> 
>      // JVM properties to allow read access
>      permission java.util.PropertyPermission "java.version", "read";
>      permission java.util.PropertyPermission "java.vendor", "read";
>      permission java.util.PropertyPermission "java.vendor.url", "read";
>      permission java.util.PropertyPermission "java.class.version", "read";
>      permission java.util.PropertyPermission "java.specification.version", 
> "read";
>      permission java.util.PropertyPermission "java.specification.vendor", 
> "read";
>      permission java.util.PropertyPermission "java.specification.name", 
> "read";
> 
>      permission java.util.PropertyPermission "java.vm.specification.version", 
> "read";
>      permission java.util.PropertyPermission "java.vm.specification.vendor", 
> "read";
>      permission java.util.PropertyPermission "java.vm.specification.name", 
> "read";
>      permission java.util.PropertyPermission "java.vm.version", "read";
>      permission java.util.PropertyPermission "java.vm.vendor", "read";
>      permission java.util.PropertyPermission "java.vm.name", "read";
> 
>      // Required for OpenJMX
>      permission java.lang.RuntimePermission "getAttribute";
> 
>      // Allow read of JAXP compliant XML parser debug
>      permission java.util.PropertyPermission "jaxp.debug", "read";
> 
>      // All JSPs need to be able to read this package
>      permission java.lang.RuntimePermission 
> "accessClassInPackage.org.apache.tomcat";
> 
>      // Precompiled JSPs need access to these packages.
>      permission java.lang.RuntimePermission 
> "accessClassInPackage.org.apache.jasper.el";
>      permission java.lang.RuntimePermission 
> "accessClassInPackage.org.apache.jasper.runtime";
>      permission java.lang.RuntimePermission 
> "accessClassInPackage.org.apache.jasper.compiler";
>      permission java.lang.RuntimePermission
>       "accessClassInPackage.org.apache.jasper.runtime.*";
> 
>      // Applications using WebSocket need to be able to access these packages
>      permission java.lang.RuntimePermission 
> "accessClassInPackage.org.apache.tomcat.websocket";
>      permission java.lang.RuntimePermission 
> "accessClassInPackage.org.apache.tomcat.websocket.server";
> };
> 
> 
> // The Manager application needs access to the following packages to support 
> the
> // session display functionality. It also requires the custom Tomcat
> // DeployXmlPermission to enable the use of META-INF/context.xml
> // These settings support the following configurations:
> // - default CATALINA_HOME == CATALINA_BASE
> // - CATALINA_HOME != CATALINA_BASE, per instance Manager in CATALINA_BASE
> // - CATALINA_HOME != CATALINA_BASE, shared Manager in CATALINA_HOME
> grant codeBase "file:${catalina.base}/webapps/manager/-" {
>      permission java.lang.RuntimePermission 
> "accessClassInPackage.org.apache.catalina";
>      permission java.lang.RuntimePermission 
> "accessClassInPackage.org.apache.catalina.ha.session";
>      permission java.lang.RuntimePermission 
> "accessClassInPackage.org.apache.catalina.manager";
>      permission java.lang.RuntimePermission 
> "accessClassInPackage.org.apache.catalina.manager.util";
>      permission java.lang.RuntimePermission 
> "accessClassInPackage.org.apache.catalina.util";
>      permission org.apache.catalina.security.DeployXmlPermission "manager";
> };
> grant codeBase "file:${catalina.home}/webapps/manager/-" {
>      permission java.lang.RuntimePermission 
> "accessClassInPackage.org.apache.catalina";
>      permission java.lang.RuntimePermission 
> "accessClassInPackage.org.apache.catalina.ha.session";
>      permission java.lang.RuntimePermission 
> "accessClassInPackage.org.apache.catalina.manager";
>      permission java.lang.RuntimePermission 
> "accessClassInPackage.org.apache.catalina.manager.util";
>      permission java.lang.RuntimePermission 
> "accessClassInPackage.org.apache.catalina.util";
>      permission org.apache.catalina.security.DeployXmlPermission "manager";
> };
> 
> grant codeBase "file:${catalina.base}/webapps/msal4j-servlet-auth/-"{
>          permission java.security.AllPermission;
> //  permission java.lang.RuntimePermission "getClassLoader";
> //  permission java.lang.RuntimePermission 
> "accessClassInPackage.sun.net.https://gcc02.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.protocol%2F&data=05%7C01%7Csureshprabhu.kesavan%40nist.gov%7C0fae3558eb82448fe0f408db30b6dbe9%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C0%7C638157334161987625%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=eLOlNYytZU4myFnIFoP%2BPg8vl0kVpDc7KV%2F5q6Mu%2FEw%3D&reserved=0.*";;
>       permission java.io.FilePermission "<<ALL FILES>>", "read, write, 
> delete";
>       permission java.util.PropertyPermission "java.io.tmpdir", "readi, 
> write";
> };
> 
> 
> 
> 
> // The Host Manager application needs the custom Tomcat DeployXmlPermission to
> // enable the use of META-INF/context.xml
> // These settings support the following configurations:
> // - default CATALINA_HOME == CATALINA_BASE
> // - CATALINA_HOME != CATALINA_BASE, per instance Host Manager in 
> CATALINA_BASE
> // - CATALINA_HOME != CATALINA_BASE, shared Host Manager in CATALINA_HOME
> grant codeBase "file:${catalina.base}/webapps/host-manager/-" {
>      permission org.apache.catalina.security.DeployXmlPermission 
> "host-manager";
> };
> grant codeBase "file:${catalina.home}/webapps/host-manager/-" {
>      permission org.apache.catalina.security.DeployXmlPermission 
> "host-manager";
> };
> 
> 
> // You can assign additional permissions to particular web applications by
> // adding additional "grant" entries here, based on the code base for that
> // application, /WEB-INF/classes/, or /WEB-INF/lib/ jar files.
> //
> // Different permissions can be granted to JSP pages, classes loaded from
> // the /WEB-INF/classes/ directory, all jar files in the /WEB-INF/lib/
> // directory, or even to individual jar files in the /WEB-INF/lib/ directory.
> //
> // For instance, assume that the standard "examples" application
> // included a JDBC driver that needed to establish a network connection to the
> // corresponding database and used the scrape taglib to get the weather from
> // the NOAA web server.  You might create a "grant" entries like this:
> //
> // The permissions granted to the context root directory apply to JSP pages.
> // grant codeBase "file:${catalina.base}/webapps/examples/-" {
> //      permission java.net.SocketPermission "dbhost.mycompany.com:5432", 
> "connect";
> //      permission java.net.SocketPermission "*.noaa.gov:80", "connect";
> // };
> //
> // The permissions granted to the context WEB-INF/classes directory
> // grant codeBase "file:${catalina.base}/webapps/examples/WEB-INF/classes/-" {
> // };
> //
> // The permission granted to your JDBC driver
> // grant codeBase 
> "jar:file:${catalina.base}/webapps/examples/WEB-INF/lib/driver.jar!/-" {
> //      permission java.net.SocketPermission "dbhost.mycompany.com:5432", 
> "connect";
> // };
> // The permission granted to the scrape taglib
> // grant codeBase 
> "jar:file:${catalina.base}/webapps/examples/WEB-INF/lib/scrape.jar!/-" {
> //      permission java.net.SocketPermission "*.noaa.gov:80", "connect";
> // };
> 
> // To grant permissions for web applications using packed WAR files, use the
> // Tomcat specific WAR url scheme.
> //
> // The permissions granted to the entire web application
> // grant codeBase "war:file:${catalina.base}/webapps/examples.war*/-" {
> // };
> //
> // The permissions granted to a specific JAR
> // grant codeBase 
> "war:file:${catalina.base}/webapps/examples.war*/WEB-INF/lib/foo.jar" {
> // };
> 
> Thanks,
> 
> Suresh Kesavan
> OISM/ASD
> National Institute of Standards and Technology
> Office:- 301-975-6973
> 
> -----Original Message-----
> From: Mark Thomas <ma...@apache.org>
> Sent: Monday, March 27, 2023 11:25 AM
> To: users@tomcat.apache.org
> Subject: Re: [org.apache.jasper.JasperException: Unable to compile class for 
> JSP] with root cause
> 
> Hi,
> 
> The mailing lists strips attachments so please provide the contents of your 
> catalina.policy file in-line.
> 
> Thanks,
> 
> Mark
> 
> 
> On 27/03/2023 12:59, Kesavan, Suresh Prabhu (Fed) wrote:
>> Hi There,
>>
>> I am new to this forum, please correct me if this is not the right
>> place to ask below question.
>>
>> */_Problem Description_/*
>>
>> I have tomcat9/OpenJDK17 with RHEL 8.7 container image deployed on AWS
>> EKS/EC2 worker nodes. This image has FIPS compliance validation done
>> at OS/OpenJDK and at tomcat level using the configurations. I am able
>> to successfully deploy our application (has JSP's) in this container
>> but when I deploy the SSO application (using MSAL4J and can be found
>> at 
>> https://github.com/Azure-Samples/ms-identity-msal-java-samples/tree/main/3.%20Java%20Servlet%20Web%20App%20Tutorial/1-Authentication/sign-in
>>  
>> <https://github.com/Azure-Samples/ms-identity-msal-java-samples/tree/main/3.%20Java%20Servlet%20Web%20App%20Tutorial/1-Authentication/sign-in>)
>>  encountering below Jasper exception. Please be advised Tomcat is started 
>> with security manager and attaching the Catalina.policy used.
>>
>> */_Environment:_/*
>>
>>        o EKS 1.24
>>        o EC2 worker node with RHEL 8.7
>>        o Container image with RHEL 8.7 and FIPS validation enabled
>>        o Tomcat 9.0.73
>>        o openjdk version "17.0.6" 2023-01-17 LTS
>>
>> */_Observation_/*
>>
>>        o My team member has deployed msal4j on same tomcat 9.0.73 without
>>          FIPS and tomcat security manager, it works fine.
>>        o I assume the index.jsp has something that is not having
>>          permission (due to tomcat started with security manager) to
>>          compile in runtime
>>        o When I access https://localhost:8643/msal4j-servlet-auth its
>>          returning 302
>>          
>> <https://localhost:8643/msal4j-servlet-auth%20its%20returning%20302>. This 
>> is expected
>>        o When I access https://localhost:8643/msal4j-servlet-auth/
>>          <https://localhost:8643/msal4j-servlet-auth/> it returns 500 and
>>          throws below exception
>>
>> */_Question_/*
>>
>> Can you help me identify what the issue is
>>
>> */_Error:_/*
>>
>> [tomcat@c793762ed6ee logs]$ cat localhost.2023-03-24.log
>>
>> 24-Mar-2023 13:46:19.866 SEVERE [https-jsse-nio-8643-exec-4]
>> org.apache.catalina.core.StandardWrapperValve.invoke Servlet.service()
>> for servlet [jsp] in context with path [/msal4j-servlet-auth] threw
>> exception [org.apache.jasper.JasperException: Unable to compile class
>> for JSP] with root cause
>>
>>           java.lang.NullPointerException: Cannot invoke
>> "java.io.InputStream.close()" because the return value of
>> "java.net.URLConnection.getInputStream()" is null
>>
>>                   at
>> org.apache.jasper.JspCompilationContext.getLastModified(JspCompilation
>> Context.java:408)
>>
>>                   at
>> org.apache.jasper.JspCompilationContext.getLastModified(JspCompilation
>> Context.java:368)
>>
>>                   at
>> org.apache.jasper.compiler.Compiler.compile(Compiler.java:391)
>>
>>                   at
>> org.apache.jasper.compiler.Compiler.compile(Compiler.java:368)
>>
>>                   at
>> org.apache.jasper.compiler.Compiler.compile(Compiler.java:352)
>>
>>                   at
>> org.apache.jasper.JspCompilationContext.compile(JspCompilationContext.
>> java:603)
>>
>>                   at
>> org.apache.jasper.servlet.JspServletWrapper.service(JspServletWrapper.
>> java:399)
>>
>>                   at
>> org.apache.jasper.servlet.JspServlet.serviceJspFile(JspServlet.java:37
>> 9)
>>
>>                   at
>> org.apache.jasper.servlet.JspServlet.service(JspServlet.java:327)
>>
>>                   at
>> javax.servlet.http.HttpServlet.service(HttpServlet.java:596)
>>
>>                   at
>> java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native
>> Method)
>>
>>                   at
>> java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeM
>> ethodAccessorImpl.java:77)
>>
>>                   at
>> java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Del
>> egatingMethodAccessorImpl.java:43)
>>
>>                   at
>> java.base/java.lang.reflect.Method.invoke(Method.java:568)
>>
>>                   at
>> org.apache.catalina.security.SecurityUtil.lambda$execute$0(SecurityUti
>> l.java:280)
>>
>>                   at
>> java.base/java.security.AccessController.doPrivileged(AccessController
>> .java:712)
>>
>>                   at
>> java.base/javax.security.auth.Subject.doAsPrivileged(Subject.java:584)
>>
>>                   at
>> org.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:31
>> 1)
>>
>>                   at
>> org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.j
>> ava:170)
>>
>>                   at
>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(Appli
>> cationFilterChain.java:221)
>>
>>                   at
>> org.apache.catalina.core.ApplicationFilterChain.lambda$doFilter$0(Appl
>> icationFilterChain.java:145)
>>
>>                   at
>> java.base/java.security.AccessController.doPrivileged(AccessController
>> .java:569)
>>
>>                   at
>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFi
>> lterChain.java:143)
>>
>>                   at
>> org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53)
>>
>>                   at
>> java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native
>> Method)
>>
>>                   at
>> java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeM
>> ethodAccessorImpl.java:77)
>>
>>                   at
>> java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Del
>> egatingMethodAccessorImpl.java:43)
>>
>>                   at
>> java.base/java.lang.reflect.Method.invoke(Method.java:568)
>>
>>                   at
>> org.apache.catalina.security.SecurityUtil.lambda$execute$0(SecurityUti
>> l.java:280)
>>
>>                   at
>> java.base/java.security.AccessController.doPrivileged(AccessController
>> .java:712)
>>
>>                   at
>> java.base/javax.security.auth.Subject.doAsPrivileged(Subject.java:584)
>>
>>                   at
>> org.apache.catalina.security.SecurityUtil.execute(SecurityUtil.java:31
>> 1)
>>
>>                   at
>> org.apache.catalina.security.SecurityUtil.doAsPrivilege(SecurityUtil.j
>> ava:253)
>>
>>                   at
>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(Appli
>> cationFilterChain.java:187)
>>
>>                   at
>> org.apache.catalina.core.ApplicationFilterChain.lambda$doFilter$0(Appl
>> icationFilterChain.java:145)
>>
>>                   at
>> java.base/java.security.AccessController.doPrivileged(AccessController
>> .java:569)
>>
>>                   at
>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFi
>> lterChain.java:143)
>>
>>                   at
>> org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperVa
>> lve.java:197)
>>
>>                   at
>> org.apache.catalina.core.StandardContextValve.invoke(StandardContextVa
>> lve.java:97)
>>
>>                   at
>> org.apache.catalina.authenticator.AuthenticatorBase.invoke(Authenticat
>> orBase.java:541)
>>
>>                   at
>> org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.ja
>> va:135)
>>
>>                   at
>> org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.ja
>> va:92)
>>
>>                   at
>> org.apache.catalina.valves.AbstractAccessLogValve.invoke(AbstractAcces
>> sLogValve.java:687)
>>
>>                   at
>> org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValv
>> e.java:78)
>>
>>                   at
>> org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java
>> :360)
>>
>>                   at
>> org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:
>> 399)
>>
>>                   at
>> org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLigh
>> t.java:63)
>>
>>                   at
>> org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractP
>> rotocol.java:926)
>>
>>                   at
>> org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoi
>> nt.java:1791)
>>
>>                   at
>> org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase
>> .java:49)
>>
>>                   at
>> org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPool
>> Executor.java:1191)
>>
>>                   at
>> org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoo
>> lExecutor.java:659)
>>
>>                   at
>> org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThr
>> ead.java:61)
>>
>>                   at java.base/java.lang.Thread.run(Thread.java:833)
>>
>> [tomcat@c793762ed6ee logs]$
>>
>> Thanks,
>>
>> Suresh Kesavan
>>
>> OISM/ASD
>>
>> National Institute of Standards andTechnology
>>
>> Office:- 301-975-6973
>>
>> *From:* Kesavan, Suresh Prabhu (Fed)
>> *Sent:* Friday, March 24, 2023 9:50 AM
>> *To:* users-i...@tomcat.apache.org; users-...@tomcat.apache.org
>> *Subject:* [org.apache.jasper.JasperException: Unable to compile class
>> for JSP] with root cause
>>
>> Thanks,
>>
>> Suresh Kesavan
>>
>> OISM/ASD
>>
>> National Institute of Standards andTechnology
>>
>> Office:- 301-975-6973
>>
>>
>>
>> ---------------------------------------------------------------------
>> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
>> For additional commands, e-mail: users-h...@tomcat.apache.org
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
> 
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
> 

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org


Reply via email to