/hg/icedtea-web: 2 new changesets
adomurad at icedtea.classpath.org
adomurad at icedtea.classpath.org
Thu May 24 06:12:42 PDT 2012
changeset cb6d6d2e086a in /hg/icedtea-web
details: http://icedtea.classpath.org/hg/icedtea-web?cmd=changeset;node=cb6d6d2e086a
author: Adam Domurad <adomurad at redhat.com>
date: Thu May 24 09:10:41 2012 -0400
Added Martin Olsson's typo fix
changeset 43a78616b1dd in /hg/icedtea-web
details: http://icedtea.classpath.org/hg/icedtea-web?cmd=changeset;node=43a78616b1dd
author: Adam Domurad <adomurad at redhat.com>
date: Thu May 24 09:12:38 2012 -0400
fixing conflict in ChangeLog
diffstat:
AUTHORS | 1 +
ChangeLog | 4 +
netx/net/sourceforge/jnlp/resources/Messages.properties | 6 +-
netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java | 89 ++++++++++-----
netx/net/sourceforge/jnlp/security/CertificateUtils.java | 3 +-
netx/net/sourceforge/jnlp/security/KeyStores.java | 15 ++
plugin/icedteanp/IcedTeaNPPlugin.cc | 4 +-
plugin/icedteanp/IcedTeaPluginUtils.cc | 4 +-
8 files changed, 88 insertions(+), 38 deletions(-)
diffs (267 lines):
diff -r 7041304bfc62 -r 43a78616b1dd AUTHORS
--- a/AUTHORS Wed May 23 14:56:30 2012 +0200
+++ b/AUTHORS Thu May 24 09:12:38 2012 -0400
@@ -17,6 +17,7 @@
Jon A. Maxwell <jmaxwell at users.sourceforge.net>
Thomas Meyer <thomas at m3y3r.de>
Saad Mohammad <smohammad at redhat.com>
+Martin Olsson <martin at minimum.se>
Andrew Su <asu at redhat.com>
Joshua Sumali <jsumali at redhat.com>
Jiri Vanek <jvanek at redhat.com>
diff -r 7041304bfc62 -r 43a78616b1dd ChangeLog
--- a/ChangeLog Wed May 23 14:56:30 2012 +0200
+++ b/ChangeLog Thu May 24 09:12:38 2012 -0400
@@ -1,3 +1,7 @@
+2012-05-24 Martin Olsson <martin at minimum.se>
+ * plugin/icedteanp/IcedTeaPluginUtils.cc:
+ Fix two typos.
+
2012-05-23 Jiri Vanek <jvanek at redhat.com>
Enhanced about dialog
diff -r 7041304bfc62 -r 43a78616b1dd netx/net/sourceforge/jnlp/resources/Messages.properties
--- a/netx/net/sourceforge/jnlp/resources/Messages.properties Wed May 23 14:56:30 2012 +0200
+++ b/netx/net/sourceforge/jnlp/resources/Messages.properties Thu May 24 09:12:38 2012 -0400
@@ -81,7 +81,9 @@
LSignedAppJarUsingUnsignedJar=Signed application using unsigned jars.
LSignedAppJarUsingUnsignedJarInfo=The main application jar is signed, but some of the jars it is using aren't.
LSignedJNLPFileDidNotMatch=The signed JNLP file did not match the launching JNLP file.
-
+LNoSecInstance=Error: No security instance for {0}. The application may have trouble continuing
+LCertFoundIn={0} found in cacerts ({1})
+
JNotApplet=File is not an applet.
JNotApplication=File is not an application.
JNotComponent=File is not a component.
@@ -122,7 +124,7 @@
PBadHeight=Invalid applet height.
PUrlNotInCodebase=Relative URL does not specify a subdirectory of the codebase. (node={0}, href={1}, base={2})
PBadRelativeUrl=Invalid relative URL (node={0}, href={1}, base={2})
-PBadNonrelativeUrl=Invalid non-relative URL (node={0}, href={0}).
+PBadNonrelativeUrl=Invalid non-relative URL (node={0}, href={1})
PNeedsAttribute=The {0} element must specify a {1} attribute.
PBadXML=Invalid XML document syntax.
PBadHeapSize=Invalid value for heap size ({0})
diff -r 7041304bfc62 -r 43a78616b1dd netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
--- a/netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java Wed May 23 14:56:30 2012 +0200
+++ b/netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java Thu May 24 09:12:38 2012 -0400
@@ -895,44 +895,66 @@
* Returns the permissions for the CodeSource.
*/
protected PermissionCollection getPermissions(CodeSource cs) {
- Permissions result = new Permissions();
+ try {
+ Permissions result = new Permissions();
- // should check for extensions or boot, automatically give all
- // access w/o security dialog once we actually check certificates.
+ // should check for extensions or boot, automatically give all
+ // access w/o security dialog once we actually check certificates.
- // copy security permissions from SecurityDesc element
- if (security != null) {
- // Security desc. is used only to track security settings for the
- // application. However, an application may comprise of multiple
- // jars, and as such, security must be evaluated on a per jar basis.
+ // copy security permissions from SecurityDesc element
+ if (security != null) {
+ // Security desc. is used only to track security settings for the
+ // application. However, an application may comprise of multiple
+ // jars, and as such, security must be evaluated on a per jar basis.
- // set default perms
- PermissionCollection permissions = security.getSandBoxPermissions();
+ // set default perms
+ PermissionCollection permissions = security.getSandBoxPermissions();
- // If more than default is needed:
- // 1. Code must be signed
- // 2. ALL or J2EE permissions must be requested (note: plugin requests ALL automatically)
- if (cs.getCodeSigners() != null &&
- (getCodeSourceSecurity(cs.getLocation()).getSecurityType().equals(SecurityDesc.ALL_PERMISSIONS) ||
- getCodeSourceSecurity(cs.getLocation()).getSecurityType().equals(SecurityDesc.J2EE_PERMISSIONS))) {
+ // If more than default is needed:
+ // 1. Code must be signed
+ // 2. ALL or J2EE permissions must be requested (note: plugin requests ALL automatically)
+ if (cs == null) {
+ throw new RuntimeException("Code source was null");
+ }
+ if (cs.getLocation() == null) {
+ throw new RuntimeException("Code source location was null");
+ }
+ if (getCodeSourceSecurity(cs.getLocation()) == null) {
+ throw new RuntimeException("Code source security was null");
+ }
+ if (getCodeSourceSecurity(cs.getLocation()).getSecurityType() == null) {
+ throw new RuntimeException("Code source security type was null");
+ }
+ if (cs.getCodeSigners() != null
+ && (getCodeSourceSecurity(cs.getLocation()).getSecurityType().equals(SecurityDesc.ALL_PERMISSIONS)
+ || getCodeSourceSecurity(cs.getLocation()).getSecurityType().equals(SecurityDesc.J2EE_PERMISSIONS))) {
- permissions = getCodeSourceSecurity(cs.getLocation()).getPermissions(cs);
+ permissions = getCodeSourceSecurity(cs.getLocation()).getPermissions(cs);
+ }
+
+ Enumeration<Permission> e = permissions.elements();
+ while (e.hasMoreElements()) {
+ result.add(e.nextElement());
+ }
}
- Enumeration<Permission> e = permissions.elements();
- while (e.hasMoreElements())
- result.add(e.nextElement());
+ // add in permission to read the cached JAR files
+ for (int i = 0; i < resourcePermissions.size(); i++) {
+ result.add(resourcePermissions.get(i));
+ }
+
+ // add in the permissions that the user granted.
+ for (int i = 0; i < runtimePermissions.size(); i++) {
+ result.add(runtimePermissions.get(i));
+ }
+
+ return result;
+ } catch (RuntimeException ex) {
+ if (JNLPRuntime.isDebug()) {
+ ex.printStackTrace();
+ }
+ throw ex;
}
-
- // add in permission to read the cached JAR files
- for (int i = 0; i < resourcePermissions.size(); i++)
- result.add(resourcePermissions.get(i));
-
- // add in the permissions that the user granted.
- for (int i = 0; i < runtimePermissions.size(); i++)
- result.add(runtimePermissions.get(i));
-
- return result;
}
protected void addPermission(Permission p) {
@@ -1732,7 +1754,12 @@
*/
protected SecurityDesc getCodeSourceSecurity(URL source) {
- return jarLocationSecurityMap.get(source);
+ SecurityDesc sec=jarLocationSecurityMap.get(source);
+ if (sec == null){
+ System.out.println(Translator.R("LNoSecInstance",source.toString()));
+ }
+ return sec;
+
}
/**
diff -r 7041304bfc62 -r 43a78616b1dd netx/net/sourceforge/jnlp/security/CertificateUtils.java
--- a/netx/net/sourceforge/jnlp/security/CertificateUtils.java Wed May 23 14:56:30 2012 +0200
+++ b/netx/net/sourceforge/jnlp/security/CertificateUtils.java Thu May 24 09:12:38 2012 -0400
@@ -60,6 +60,7 @@
import java.util.Random;
import net.sourceforge.jnlp.runtime.JNLPRuntime;
+import net.sourceforge.jnlp.runtime.Translator;
import net.sourceforge.jnlp.util.replacements.BASE64Encoder;
import sun.security.provider.X509Factory;
@@ -173,7 +174,7 @@
if (c.equals(keyStores[i].getCertificate(alias))) {
if (JNLPRuntime.isDebug()) {
- System.out.println(c.getSubjectX500Principal().getName() + " found in cacerts");
+ System.out.println(Translator.R("LCertFoundIn", c.getSubjectX500Principal().getName(), KeyStores.getPathToKeystore(keyStores[i].hashCode())));
}
return true;
diff -r 7041304bfc62 -r 43a78616b1dd netx/net/sourceforge/jnlp/security/KeyStores.java
--- a/netx/net/sourceforge/jnlp/security/KeyStores.java Wed May 23 14:56:30 2012 +0200
+++ b/netx/net/sourceforge/jnlp/security/KeyStores.java Thu May 24 09:12:38 2012 -0400
@@ -47,7 +47,9 @@
import java.security.NoSuchAlgorithmException;
import java.security.cert.CertificateException;
import java.util.ArrayList;
+import java.util.HashMap;
import java.util.List;
+import java.util.Map;
import java.util.StringTokenizer;
import net.sourceforge.jnlp.config.DeploymentConfiguration;
@@ -75,6 +77,8 @@
CLIENT_CERTS,
}
+ public static final Map<Integer,String> keystoresPaths=new HashMap<Integer, String>();
+
private static DeploymentConfiguration config = null;
private static final String KEYSTORE_TYPE = "JKS";
@@ -133,12 +137,23 @@
KeyStore ks = null;
try {
ks = createKeyStoreFromFile(new File(location), create, DEFAULT_PASSWORD);
+ //hashcode is used instead of instance so when no references are left
+ //to keystore, then this will not be blocker for garbage collection
+ keystoresPaths.put(ks.hashCode(),location);
} catch (Exception e) {
e.printStackTrace();
}
return ks;
}
+ public static String getPathToKeystore(int k) {
+ String s = keystoresPaths.get(k);
+ if (s == null) {
+ return "unknown keystore location";
+ }
+ return s;
+ }
+
/**
* Returns an array of KeyStore that contain certificates that are trusted.
* The KeyStores contain certificates from different sources.
diff -r 7041304bfc62 -r 43a78616b1dd plugin/icedteanp/IcedTeaNPPlugin.cc
--- a/plugin/icedteanp/IcedTeaNPPlugin.cc Wed May 23 14:56:30 2012 +0200
+++ b/plugin/icedteanp/IcedTeaNPPlugin.cc Thu May 24 09:12:38 2012 -0400
@@ -427,7 +427,7 @@
goto cleanup_done;
cleanup_appletviewer_mutex:
- g_free (data->appletviewer_mutex);
+ g_mutex_free (data->appletviewer_mutex);
data->appletviewer_mutex = NULL;
// cleanup_instance_string:
@@ -2000,7 +2000,7 @@
tofree->window_width = 0;
// cleanup_appletviewer_mutex:
- g_free (tofree->appletviewer_mutex);
+ g_mutex_free (tofree->appletviewer_mutex);
tofree->appletviewer_mutex = NULL;
// cleanup_instance_string:
diff -r 7041304bfc62 -r 43a78616b1dd plugin/icedteanp/IcedTeaPluginUtils.cc
--- a/plugin/icedteanp/IcedTeaPluginUtils.cc Wed May 23 14:56:30 2012 +0200
+++ b/plugin/icedteanp/IcedTeaPluginUtils.cc Thu May 24 09:12:38 2012 -0400
@@ -289,7 +289,7 @@
*
* @param str The string to split
* @param The delimiters to split on
- * @return A string vector containing the aplit components
+ * @return A string vector containing the split components
*/
std::vector<std::string*>*
@@ -1068,7 +1068,7 @@
if(ret)
PLUGIN_DEBUG("Error: Unable to initialize message queue mutex: %d\n", ret);
- PLUGIN_DEBUG("Mutexs %p and %p initialized\n", &subscriber_mutex, &msg_queue_mutex);
+ PLUGIN_DEBUG("Mutexes %p and %p initialized\n", &subscriber_mutex, &msg_queue_mutex);
}
/**
More information about the distro-pkg-dev
mailing list