[RFC] netx: throw errors when unsigned jnlp applications request permissions
Deepak Bhole
dbhole at redhat.com
Tue Jul 20 07:35:17 PDT 2010
* Omair Majid <omajid at redhat.com> [2010-07-19 13:54]:
> Hi,
>
> The attached patch makes netx throw exceptions if JNLP applications
> have unsigned jars but request permissions. This causes netx fail
> early and loudly rather than assuming sandbox permissions and
> leading to transient failures. This is similar to what Sun/Oracle's
> Web Start implementation does.
>
> Any comments?
>
Looks good! Please commit.
Cheers,
Deepak
> Cheers,
> Omair
> diff -r bd443070a313 netx/net/sourceforge/jnlp/resources/Messages.properties
> --- a/netx/net/sourceforge/jnlp/resources/Messages.properties Mon Jul 19 14:39:53 2010 +0200
> +++ b/netx/net/sourceforge/jnlp/resources/Messages.properties Mon Jul 19 13:41:25 2010 -0400
> @@ -50,6 +50,8 @@
> LNotLaunchableInfo=File must be a JNLP application, applet, or installer type.
> LCantDetermineMainClass=Unknown Main-Class.
> LCantDetermineMainClassInfo=Could not determine the main class for this application.
> +LUnsignedJarWithSecurity=Cannot grant permissions to unsigned jars.
> +LUnsignedJarWithSecurityInfo=Application requested security permissions, but jars are not signed.
>
> JNotApplet=File is not an applet.
> JNotApplication=File is not an application.
> diff -r bd443070a313 netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
> --- a/netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java Mon Jul 19 14:39:53 2010 +0200
> +++ b/netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java Mon Jul 19 13:41:25 2010 -0400
> @@ -167,7 +167,7 @@
>
> }
>
> - private void setSecurity() {
> + private void setSecurity() throws LaunchException {
>
> URL codebase = null;
>
> @@ -196,15 +196,22 @@
> }
> } else { //regular jnlp file
>
> - /**
> - * If the application is signed, then we set the SecurityDesc to the
> - * <security> tag in the jnlp file. Note that if an application is
> - * signed, but there is no <security> tag in the jnlp file, the
> - * application will get sandbox permissions.
> - * If the application is unsigned, we ignore the <security> tag and
> - * use a sandbox instead.
> + /*
> + * Various combinations of the jars being signed and <security> tags being
> + * present are possible. They are treated as follows
> + *
> + * Jars JNLP File Result
> + *
> + * Signed <security> Appropriate Permissions
> + * Signed no <security> Sandbox
> + * Unsigned <security> Error
> + * Unsigned no <security> Sandbox
> + *
> */
> - if (signing == true) {
> + if (! file.getSecurity().getSecurityType().equals(SecurityDesc.SANDBOX_PERMISSIONS) && !signing) {
> + throw new LaunchException(file, null, R("LSFatal"), R("LCClient"), R("LUnsignedJarWithSecurity"), R("LUnsignedJarWithSecurityInfo"));
> + }
> + else if (signing == true) {
> this.security = file.getSecurity();
> } else {
> this.security = new SecurityDesc(file,
More information about the distro-pkg-dev
mailing list