[rfc][icedtea-web] Remove bad debug logging statements from JNLPSecurityManager

Andrew Azores aazores at redhat.com
Tue Nov 5 07:33:50 PST 2013


On 11/05/2013 03:44 AM, Jiri Vanek wrote:
> So I would say, that instead of removing the messages, somethinkg like:
>
> >            if (JNLPRuntime.isDebug()) {
> if (!cl.isSecurityNull()}{
> OutputController.getLogger().log(OutputController.Level.ERROR_ALL, 
> "Trying to get permission  for null  source to environment with 
> security, its wrong ");
> }else { //conntinue as before
> >                if (cl.getPermissions(null).implies(perm)){
> }

Ehh, if these debug messages are important I guess. The method now 
contains significantly more logic for dealing with if/when/how to 
produce debug output than actually doing its job :) and what if 
"security" appears in between checking if it's null and calling 
getPermissions(null)? Then we can still end up with an NPE being thrown 
that would never have occurred if we weren't in debug mode. I don't know 
if that situation would ever arise right now, where we would have a 
thread calling addPermission on the security manager while the 
classloader is still in the process of being initialized by another 
thread. But there's a small chance of that happening anyway.

> Also I have suspicions that this can hide more serious bug:
>   - why passing null to getPemrmission

I have no idea, I'm guessing this was written expecting getPermissions 
to just skip that block of code rather than throwing an NPE. If it just 
skipped that block of code rather than throwing an NPE then the debug 
statement actually makes some sense, since calling addPermission here 
adds it to the classloader's runtimePermissions field. getPermissions' 
result would include permissions from that field if the NPE was not thrown.

>   - why if (cs == null) {                    throw new 
> NullPointerException("Code source was null");                } if 
> security is

Well the rest of the code in that block is pretty dependent on having 
that CodeSource...

>   - and esepcially  why  // Class from host X should be allowed to 
> connect to host X
>             if (cs.getLocation() != null && 
> cs.getLocation().getHost().length() > 0)
>                 result.add(new 
> SocketPermission(cs.getLocation().getHost(),
>                         "connect, accept"));
>   when is not?

I don't know, I'm assuming this is just here to ensure that that 
permission is included in the result whether or not "security" exists. 
If security exists I'd imagine this permission would be included in the 
result collection by this point, but if security is null then it 
probably won't be (unless somehow it was a user-granted permission). 
Allowing permission to accept local socket connections seems fine to me.

Thanks,

-- 
Andrew A



More information about the distro-pkg-dev mailing list