/hg/icedtea-web: Better validation of crytical dirs with proper ...

jvanek at icedtea.classpath.org jvanek at icedtea.classpath.org
Mon Dec 2 06:58:02 PST 2013


changeset 9420fcc175c3 in /hg/icedtea-web
details: http://icedtea.classpath.org/hg/icedtea-web?cmd=changeset;node=9420fcc175c3
author: Jiri Vanek <jvanek at redhat.com>
date: Mon Dec 02 16:04:32 2013 +0100

	Better validation of crytical dirs with proper message on startup


diffstat:

 ChangeLog                                                                    |   15 +
 netx/net/sourceforge/jnlp/config/DeploymentConfiguration.java                |   28 +-
 netx/net/sourceforge/jnlp/config/DirectoryValidator.java                     |  379 ++++++++++
 netx/net/sourceforge/jnlp/resources/Messages.properties                      |    3 +
 netx/net/sourceforge/jnlp/runtime/Boot.java                                  |    9 +-
 tests/netx/unit/net/sourceforge/jnlp/config/DeploymentConfigurationTest.java |    2 +-
 tests/netx/unit/net/sourceforge/jnlp/config/DirectoryValidatorTest.java      |  272 +++++++
 tests/reproducers/simple/simpletest1/testcases/XDGspecificationTests.java    |    6 +-
 8 files changed, 697 insertions(+), 17 deletions(-)

diffs (truncated from 852 to 500 lines):

diff -r 7432a0de8249 -r 9420fcc175c3 ChangeLog
--- a/ChangeLog	Fri Nov 29 12:43:51 2013 +0100
+++ b/ChangeLog	Mon Dec 02 16:04:32 2013 +0100
@@ -1,3 +1,18 @@
+2013-11-29  Jiri Vanek  <jvanek at redhat.com>
+
+	Better validation of crytical dirs with proper message on startup
+	* netx/net/sourceforge/jnlp/config/DeploymentConfiguration.java: small
+	refactoring to match the new directory validator pattern.
+	* netx/net/sourceforge/jnlp/config/DirectoryValidator.java: new class to verify
+	if directory have necessary permissions (like creating subdirectories,
+	read and write files created in).
+	* netx/net/sourceforge/jnlp/resources/Messages.properties: patterns for 
+	validation results
+	* netx/net/sourceforge/jnlp/runtime/Boot.java: headless determination moved
+	as up as possible in (main)
+	* tests/netx/unit/net/sourceforge/jnlp/config/DeploymentConfigurationTest.java: 
+	Few test testing what DirtectoryValidator should validate.
+
 2013-11-29  Jiri Vanek  <jvanek at redhat.com>
 
 	Pipes moved into XDG_RUNTIME_DIR
diff -r 7432a0de8249 -r 9420fcc175c3 netx/net/sourceforge/jnlp/config/DeploymentConfiguration.java
--- a/netx/net/sourceforge/jnlp/config/DeploymentConfiguration.java	Fri Nov 29 12:43:51 2013 +0100
+++ b/netx/net/sourceforge/jnlp/config/DeploymentConfiguration.java	Mon Dec 02 16:04:32 2013 +0100
@@ -36,6 +36,7 @@
 import java.util.Set;
 
 import javax.naming.ConfigurationException;
+import javax.swing.JOptionPane;
 
 import net.sourceforge.jnlp.cache.CacheLRUWrapper;
 import net.sourceforge.jnlp.runtime.JNLPRuntime;
@@ -213,9 +214,9 @@
     /** is it mandatory to load the system properties? */
     private boolean systemPropertiesMandatory = false;
 
-    /** The system's deployment.config file */
+    /** The system's subdirResult deployment.config file */
     private File systemPropertiesFile = null;
-    /** The user's deployment.config file */
+    /** The user's subdirResult deployment.config file */
     private File userPropertiesFile = null;
     
     /*default user file*/
@@ -280,7 +281,7 @@
         Map<String, Setting<String>> systemProperties = null;
 
         /*
-         * First, try to read the system's deployment.config file to find if
+         * First, try to read the system's subdirResult deployment.config file to find if
          * there is a system-level deployment.poperties file
          */
 
@@ -304,7 +305,7 @@
         }
 
         /*
-         * Third, read the user's deployment.properties file
+         * Third, read the user's subdirResult deployment.properties file
          */
         userPropertiesFile = userFile;
         Map<String, Setting<String>> userProperties = loadProperties(ConfigType.User, userPropertiesFile, false);
@@ -713,6 +714,8 @@
         int errors = 0;
         String PRE_15_DEPLOYMENT_DIR = ".icedtea";
         String LEGACY_USER_HOME = System.getProperty("user.home") + File.separator + PRE_15_DEPLOYMENT_DIR;
+        File configDir = new File(Defaults.USER_CONFIG_HOME);
+        File cacheDir = new File(Defaults.USER_CACHE_HOME);
         File legacyUserDir = new File(LEGACY_USER_HOME);
         if (legacyUserDir.exists()) {
             OutputController.getLogger().log(OutputController.Level.MESSAGE_ALL, "Legacy configuration and cache found. Those will be now transported to new locations");
@@ -723,11 +726,9 @@
 
             OutputController.getLogger().log(OutputController.Level.MESSAGE_ALL, "Preparing new directories:");
             OutputController.getLogger().log(OutputController.Level.MESSAGE_ALL, " " + Defaults.USER_CONFIG_HOME);
-            File f1 = new File(Defaults.USER_CONFIG_HOME);
-            errors += resultToStd(f1.mkdirs());
+            errors += resultToStd(configDir.mkdirs());
             OutputController.getLogger().log(OutputController.Level.MESSAGE_ALL, " " + Defaults.USER_CACHE_HOME);
-            File f2 = new File(Defaults.USER_CACHE_HOME);
-            errors += resultToStd(f2.mkdirs());
+            errors += resultToStd(cacheDir.mkdirs());
 
             String legacySecurity = LEGACY_USER_HOME + File.separator + "security";
             String currentSecurity = Defaults.USER_SECURITY;
@@ -786,16 +787,23 @@
         } else {
             OutputController.getLogger().log("System is already following XDG .cache and .config specifications");
             try {
-                OutputController.getLogger().log("config: " + Defaults.USER_CONFIG_HOME + " file exists: " + new File(Defaults.USER_CONFIG_HOME).exists());
+                OutputController.getLogger().log("config: " + Defaults.USER_CONFIG_HOME + " file exists: " + configDir.exists());
             } catch (Exception ex) {
                 OutputController.getLogger().log(ex);
             }
             try {
-                OutputController.getLogger().log("cache: " + Defaults.USER_CACHE_HOME + " file exists:" + new File(Defaults.USER_CACHE_HOME));
+                OutputController.getLogger().log("cache: " + Defaults.USER_CACHE_HOME + " file exists:" + cacheDir.exists());
             } catch (Exception ex) {
                 OutputController.getLogger().log(ex);
             }
         }
+        //this call should endure even if (ever) will migration code be removed
+        DirectoryValidator.DirectoryCheckResults r = new DirectoryValidator().ensureDirs();
+        if (!JNLPRuntime.isHeadless()) {
+            if (r.getFailures() > 0) {
+                JOptionPane.showMessageDialog(null, r.getMessage());
+            }
+        }
 
     }
 
diff -r 7432a0de8249 -r 9420fcc175c3 netx/net/sourceforge/jnlp/config/DirectoryValidator.java
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/netx/net/sourceforge/jnlp/config/DirectoryValidator.java	Mon Dec 02 16:04:32 2013 +0100
@@ -0,0 +1,379 @@
+/*
+ * To change this template, choose Tools | Templates
+ * and open the template in the editor.
+ */
+package net.sourceforge.jnlp.config;
+
+import static net.sourceforge.jnlp.runtime.Translator.R;
+
+import java.io.File;
+import java.util.ArrayList;
+import java.util.List;
+import net.sourceforge.jnlp.runtime.JNLPRuntime;
+import net.sourceforge.jnlp.util.FileUtils;
+import net.sourceforge.jnlp.util.logging.OutputController;
+
+/**
+ *
+ * @author jvanek
+ */
+public class DirectoryValidator {
+    
+    /**
+     * This class is holding results of directory validation.
+     * Various errors like can not  read, write create dir can apeear
+     * For sumaries of results are here getPasses, getFailures methods
+     * 
+     * Individual results can be read from  results field, or converted to string
+     */
+    public static class DirectoryCheckResults {
+        public final List<DirectoryCheckResult> results;
+
+        /**
+         * Wraps results so we can make some statistics or convert to message 
+         * @param results 
+         */
+        public DirectoryCheckResults(List<DirectoryCheckResult> results) {
+            this.results = results;
+        }
+        
+        /**
+         * 
+         * @return sum of passed checks, 0-3 per result
+         */
+         public int getPasses() {
+            int passes = 0;
+             for (DirectoryCheckResult directoryCheckResult : results) {
+                 passes += directoryCheckResult.getPasses();
+             }
+             return passes;
+        }
+
+         /**
+          * 
+          * @return  sum of failed checks, 0-3 per results
+          */
+        public int getFailures() {
+           int failures = 0;
+             for (DirectoryCheckResult directoryCheckResult : results) {
+                 failures += directoryCheckResult.getFailures();
+             }
+             return failures;
+        }
+        
+        /**
+         * The result have one reuslt per line, separated by \n 
+         * as is inherited from result.getMessage() method.
+         *
+         * @return all results connected. 
+         */
+        public String getMessage(){
+            return resultsToString(results);
+        }
+
+        /**
+         * using getMessage
+         * @return 
+         */
+        @Override
+        public String toString() {
+            return getMessage();
+        }
+        
+        
+        
+        public  static String resultsToString(List<DirectoryCheckResult> results) {
+        StringBuilder sb = new StringBuilder();
+        for (DirectoryCheckResult r : results) {
+            if (r.getFailures() >0 ){
+                sb.append(r.getMessage());
+            }
+        }
+        return sb.toString();
+    }
+        
+    }
+
+    /**
+     * Is storing result of directory validation.
+     * 
+     * validated are existence of directory
+     * whether it is directory
+     * if it have read/write permissions
+     */
+    public static class DirectoryCheckResult {
+
+        //do exist?
+        public boolean exists = true;
+        //is dir?
+        public boolean isDir = true;
+        //can be read, written to?
+        public boolean correctPermissions = true;
+        //have correct subdir? - this implies soe rules, when subdirecotry of some
+        //particular directory have weeker permissions
+        public DirectoryCheckResult subDir = null;
+        //actual tested directory
+        private final File testedDir;
+
+        public DirectoryCheckResult(File testedDir) {
+            this.testedDir = testedDir;
+        }
+
+        public static String notExistsMessage(File f) {
+            return R("DCmaindircheckNotexists", f.getAbsolutePath());
+        }
+
+        public static String notDirMessage(File f) {
+            return R("DCmaindircheckNotdir", f.getAbsolutePath());
+        }
+
+        public static String wrongPermissionsMessage(File f) {
+            return R("DCmaindircheckRwproblem", f.getAbsolutePath());
+        }
+
+        private static int booleanToInt(boolean b) {
+            if (b) {
+                return 1;
+            } else {
+                return 0;
+            }
+        }
+
+        
+        /**
+         * count passes of this result (0-3, both inclusive).
+         */
+        public int getPasses() {
+            int subdirs = 0;
+            if (subDir != null) {
+                subdirs = subDir.getPasses();
+            }
+            return booleanToInt(exists)
+                    + booleanToInt(isDir)
+                    + booleanToInt(correctPermissions)
+                    + subdirs;
+        }
+        
+        /*
+         * count failures of this result (0-3, both inclusive). 
+         */
+        public int getFailures() {
+            int max = 3;
+            if (subDir != null) {
+                max = 2 * max;
+            }
+            return max - getPasses();
+        }
+
+        /**
+         * Convert results to string.
+         * Each failure by line. PAsses are not mentioned
+         * The subdirectory (and it subdirectories are included to )
+         * 
+         * @return  string with \n, or/and ended by \n
+         */
+        public String getMessage() {
+            StringBuilder sb = new StringBuilder();
+            if (!exists) {
+                sb.append(notExistsMessage(testedDir)).append("\n");
+            }
+            if (!isDir) {
+                sb.append(notDirMessage(testedDir)).append("\n");
+            }
+            if (!correctPermissions) {
+                sb.append(wrongPermissionsMessage(testedDir)).append("\n");
+            }
+
+            if (subDir != null) {
+                String s = subDir.getMessage();
+                if (!s.isEmpty()) {
+                    sb.append(s);
+                }
+            }
+            return sb.toString();
+        }
+
+        @Override
+        public String toString() {
+            return getMessage();
+        }
+    }
+    
+    
+    private final List<File> dirsToCheck;
+
+    
+    /**
+     * Creates DirectoryValidator to ensure given directories
+     * 
+     * @param dirsToCheck 
+     */
+    public DirectoryValidator(List<File> dirsToCheck) {
+        this.dirsToCheck = dirsToCheck;
+    }
+
+    
+    /**
+     *  Creates DirectoryValidator to ensure directories read from
+     *  user (if any - default otherwise ) settings via keys:
+     * <li>KEY_USER_CACHE_DIR</li> 
+     * <li>KEY_USER_PERSISTENCE_CACHE_DIR</li>
+     * <li>KEY_SYSTEM_CACHE_DIR</li> 
+     * <li>KEY_USER_LOG_DIR</li>
+     * <li>KEY_USER_TMP_DIR</li> 
+     * <li>KEY_USER_LOCKS_DIR</li>
+     */
+    public DirectoryValidator() {
+        dirsToCheck = new ArrayList<File>(6);
+        DeploymentConfiguration dc = JNLPRuntime.getConfiguration();
+        String[] keys = new String[]{
+            DeploymentConfiguration.KEY_USER_CACHE_DIR,
+            DeploymentConfiguration.KEY_USER_PERSISTENCE_CACHE_DIR,
+            DeploymentConfiguration.KEY_SYSTEM_CACHE_DIR,
+            DeploymentConfiguration.KEY_USER_LOG_DIR,
+            DeploymentConfiguration.KEY_USER_TMP_DIR,
+            DeploymentConfiguration.KEY_USER_LOCKS_DIR};
+        for (String key : keys) {
+            String value = dc.getProperty(key);
+            if (value == null) {
+                OutputController.getLogger().log(OutputController.Level.MESSAGE_DEBUG, "WARNING: key " + key + " has no value, setting to default value");
+                value = Defaults.getDefaults().get(key).getValue();
+            }
+            if (value == null) {
+                if (JNLPRuntime.isDebug()) {
+                    OutputController.getLogger().log(OutputController.Level.MESSAGE_DEBUG, "WARNING: key " + key + " has no value, skipping");
+                }
+                continue;
+            }
+            File f = new File(value);
+            dirsToCheck.add(f);
+        }
+    }
+
+    /**
+     * This method is ensuring, that specified directories will exists after
+     * call and will have enough permissions. 
+     *
+     * This methods is trying to create the directories if they are not present
+     * and is testing if can be written inside. All checks are done in bulk. If
+     * one or more defect is found, user is warned via dialogue in gui mode
+     * (again in bulk). In headless mode stdout/stderr is enough, as application
+     * (both gui and headless) should not stop to work, but continue to run with
+     * hope that corrupted dirs will not be necessary
+     */
+    public DirectoryCheckResults ensureDirs() {
+        return ensureDirs(dirsToCheck);
+    }
+
+    static DirectoryCheckResults ensureDirs(List<File> dirs) {
+        List<DirectoryCheckResult> result = new ArrayList<DirectoryCheckResult>(dirs.size());
+        for (File f : dirs) {
+            if (f.exists()) {
+                DirectoryCheckResult r = testDir(f, true, true);
+                result.add(r);
+                continue;
+            }
+            if (!f.mkdirs()) {
+                OutputController.getLogger().log(OutputController.Level.ERROR_DEBUG, "ERROR: Directory " + f.getAbsolutePath() + " does not exist and has not been created");
+            } else {
+                OutputController.getLogger().log(OutputController.Level.MESSAGE_DEBUG,"OK: Directory " + f.getAbsolutePath() + " did not exist but has been created");
+            }
+            DirectoryCheckResult r = testDir(f, true, true);
+            result.add(r);
+        }
+        return new DirectoryCheckResults(result);
+    }
+
+    /**
+     * This method is package private for testing purposes only.
+     *
+     * This method verify that directory exists, is directory, file and
+     * directory can be created, file can be written into, and subdirectory can
+     * be written into.
+     *
+     * Some steps may looks like redundant, but some permission settings really
+     * alow to create file but not directory and vice versa. Also some settings
+     * can allow to create file or directory which can not be written into. (eg
+     * ACL or network disks)
+     */
+    static DirectoryCheckResult testDir(File f, boolean verbose, boolean testSubdir) {
+        DirectoryCheckResult result = new DirectoryCheckResult(f);
+        if (!f.exists()) {
+            if (verbose) {
+                OutputController.getLogger().log(OutputController.Level.ERROR_ALL, DirectoryCheckResult.notExistsMessage(f));
+            }
+            result.exists = false;
+        }
+        if (!f.isDirectory()) {
+            if (verbose) {
+                OutputController.getLogger().log(OutputController.Level.ERROR_ALL, DirectoryCheckResult.notDirMessage(f));
+            }
+            result.isDir = false;
+        }
+        File testFile = null;
+        boolean correctPermissions = true;
+        try {
+            testFile = File.createTempFile("maindir", "check", f);
+            if (!testFile.exists()) {
+                correctPermissions = false;
+            }
+            try {
+                FileUtils.saveFile("ww", testFile);
+                String s = FileUtils.loadFileAsString(testFile);
+                if (!s.trim().equals("ww")) {
+                    correctPermissions = false;
+                }
+            } catch (Exception ex) {
+                if (JNLPRuntime.isDebug()) {
+                    ex.printStackTrace();
+                }
+                correctPermissions = false;
+            }
+            File[] canList = f.listFiles();
+            if (canList == null || canList.length == 0) {
+                correctPermissions = false;
+            }
+            testFile.delete();
+            if (testFile.exists()) {
+                correctPermissions = false;
+            } else {
+                boolean created = testFile.mkdir();
+                if (!created) {
+                    correctPermissions = false;
+                }
+                if (testFile.exists()) {
+                    if (testSubdir) {
+                        DirectoryCheckResult subdirResult = testDir(testFile, verbose, false);
+                        if (subdirResult.getFailures() != 0) {
+                            result.subDir = subdirResult;
+                            correctPermissions = false;
+                        }
+                        testFile.delete();
+                        if (testFile.exists()) {
+                            correctPermissions = false;
+                        }
+                    }
+                } else {
+                    correctPermissions = false;
+                }
+            }
+        } catch (Exception ex) {
+            if (JNLPRuntime.isDebug()) {
+                ex.printStackTrace();
+            }
+            correctPermissions = false;
+        } finally {
+            if (testFile != null && testFile.exists()) {
+                testFile.delete();
+            }
+        }
+        if (!correctPermissions) {
+            if (verbose) {
+               OutputController.getLogger().log(OutputController.Level.ERROR_ALL, DirectoryCheckResult.wrongPermissionsMessage(f));
+            }
+            result.correctPermissions = false;
+        }
+        return result;
+
+    }
+}
diff -r 7432a0de8249 -r 9420fcc175c3 netx/net/sourceforge/jnlp/resources/Messages.properties
--- a/netx/net/sourceforge/jnlp/resources/Messages.properties	Fri Nov 29 12:43:51 2013 +0100
+++ b/netx/net/sourceforge/jnlp/resources/Messages.properties	Mon Dec 02 16:04:32 2013 +0100
@@ -304,6 +304,9 @@
 DCInternal=Internal error: {0}


More information about the distro-pkg-dev mailing list