[rfc][icedtea-web][policyeditor] Parsing enhancement, unit testing, file-changed checking
Jiri Vanek
jvanek at redhat.com
Tue Feb 25 09:09:11 PST 2014
On 02/25/2014 03:47 PM, Andrew Azores wrote:
> On 02/24/2014 08:15 AM, Jiri Vanek wrote:
>> On 02/21/2014 05:48 PM, Andrew Azores wrote:
>>> Hi,
>>>
>>> One of the attached patches changes PolicyEditor to use regexes when attempting to convert Strings
>>> into PolicyEditorPermissions, and adds plenty of unit tests for various things. The other patch adds
>>> functionality so PolicyEditor will warn the user if the file on disk is modified externally in
>>> between the time PolicyEditor opened the file and when it is to be saved. This is done by checking
>>> the file's MD5, which was added to FileUtils so it's reusable in the future. ChangeLogs are included
>>> in the patches. They should apply cleanly together.
>>>
>>> Thanks,
>>>
>>
>> overall ok, few nits inline:
>>
>>> --
>>> Andrew A
>>>
>>>
>>> policy-editor-filechanged-check.patch
>>>
>>>
>>> diff --git a/ChangeLog b/ChangeLog
>>> --- a/ChangeLog
>>> +++ b/ChangeLog
>>> @@ -1,3 +1,15 @@
>>> +2014-02-21 Andrew Azores<aazores at rehdat.com>
>>> +
>>> + * netx/net/sourceforge/jnlp/resources/Messages.properties:
>>> + (RFileModifiedWhileLoaded, RFileModifiedWhileLoadedDetail, PEFileModified)
>>> + new messages for when a loaded file changes on disk
>>> + * netx/net/sourceforge/jnlp/security/policyeditor/PolicyEditor.java:
>>> + (fileMd5, openAndParsePolicyFile, savePolicyFile) keep track of file MD5,
>>> + prompt user if MD5 changes between file load and save. (updateCheckboxes)
>>> + avoid an NPE
>>> + * netx/net/sourceforge/jnlp/util/FileUtils.java:
>>> + (showFileChangedWhileLoadedDialog) new functions
>>> +
>>> 2014-02-20 Andrew Azores<aazores at redhat.com>
>>>
>>> New simplified PolicyEditor for editing Java policy files, particularly
>>> diff --git a/netx/net/sourceforge/jnlp/resources/Messages.properties
>>> b/netx/net/sourceforge/jnlp/resources/Messages.properties
>>> --- a/netx/net/sourceforge/jnlp/resources/Messages.properties
>>> +++ b/netx/net/sourceforge/jnlp/resources/Messages.properties
>>> @@ -164,6 +164,8 @@
>>> RCantWriteFile=Could not write to file {0}
>>> RFileReadOnly=Opening file in read-only mode
>>> RExpectedFile=Expected {0} to be a file but it was not
>>> +RFileModifiedWhileLoaded=File Modification Warning
>>> +RFileModifiedWhileLoadedDetail=The file {0} has been modified on disk since it was loaded. Reload?
>>> RRemoveRPermFailed=Removing read permission on file {0} failed
>>> RRemoveWPermFailed=Removing write permissions on file {0} failed
>>> RRemoveXPermFailed=Removing execute permissions on file {0} failed
>>> @@ -481,6 +483,7 @@
>>> PEExitMenuItem=Exit
>>> PEViewMenu=View
>>> PECustomPermissionsItem=Custom Permissions...
>>> +PEFileModified=The policy file has been modified since it was opened. Reload and re-edit before
>>> saving?
>>>
>>> # Policy Editor CustomPolicyViewer
>>> PECPTitle=Custom Policy Viewer
>>> diff --git a/netx/net/sourceforge/jnlp/security/policyeditor/PolicyEditor.java
>>> b/netx/net/sourceforge/jnlp/security/policyeditor/PolicyEditor.java
>>> --- a/netx/net/sourceforge/jnlp/security/policyeditor/PolicyEditor.java
>>> +++ b/netx/net/sourceforge/jnlp/security/policyeditor/PolicyEditor.java
>>> @@ -161,6 +161,7 @@
>>> private final JFileChooser fileChooser;
>>> private CustomPolicyViewer cpViewer = null;
>>> private final WeakReference<PolicyEditor> weakThis = new WeakReference<PolicyEditor>(this);
>>> + private byte[] fileMd5;
>>>
>>> private final ActionListener okButtonAction, closeButtonAction, addCodebaseButtonAction,
>>> removeCodebaseButtonAction, openButtonAction, saveAsButtonAction,
>>> viewCustomButtonAction;
>>> @@ -546,12 +547,24 @@
>>> for (final ActionListener l : box.getActionListeners()) {
>>> box.removeActionListener(l);
>>> }
>>> - box.setSelected(codebasePermissionsMap.get(codebase).get(perm));
>>> + final Map<PolicyEditorPermissions, Boolean> map = codebasePermissionsMap.get(codebase);
>>> + final boolean state;
>>> + if (map != null) {
>>> + final Boolean s = map.get(perm);
>>> + if (s != null) {
>>> + state = s;
>>> + } else {
>>> + state = false;
>>> + }
>>> + } else {
>>> + state = false;
>>> + }
>>> + box.setSelected(state);
>>> box.addActionListener(new ActionListener() {
>>> @Override
>>> public void actionPerformed(final ActionEvent e) {
>>> changesMade = true;
>>> - codebasePermissionsMap.get(codebase).put(perm, box.isSelected());
>>> + map.put(perm, box.isSelected());
>>> }
>>> });
>>> }
>>> @@ -720,17 +733,21 @@
>>> }
>>> final String contents;
>>> try {
>>> - contents = FileUtils.loadFileAsString(new File(filePath));
>>> + final File f = new File(filePath);
>>> + fileMd5 = FileUtils.getFileMD5Sum(f);
>>> + contents = FileUtils.loadFileAsString(f);
>>> } catch (final IOException e) {
>>> OutputController.getLogger().log(e);
>>> OutputController.getLogger().log(OutputController.Level.ERROR_ALL, R("RCantOpenFile", filePath));
>>> FileUtils.showCouldNotOpenDialog(weakThis.get(), R("PECouldNotOpen"));
>>> return;
>>> }
>>> + codebasePermissionsMap.clear();
>>> + customPermissionsMap.clear();
>>> // Split on newlines, both \r\n and \n style, for platform-independence
>>> final String[] lines = contents.split("[\\r\\n]+");
>>> String codebase = "";
>>> - FileLock fileLock = null;
>>> + final FileLock fileLock;
>>> try {
>>> fileLock = FileUtils.getFileLock(filePath, false, true);
>>> } catch (final FileNotFoundException e) {
>>> @@ -809,6 +826,34 @@
>>> new Thread() {
>>> @Override
>>> public void run() {
>>> + if (fileMd5 != null) {
>>> + try {
>>> + final byte[] newChecksum = FileUtils.getFileMD5Sum(new File(filePath));
>>> + if (!Arrays.equals(fileMd5, newChecksum)) {
>>> + final int response =
>>> FileUtils.showFileChangedWhileLoadedDialog(weakThis.get(),
>>> + R("PEFileModified"), R("RFileModifiedWhileLoaded"));
>>> + switch (response) {
>>> + case JOptionPane.YES_OPTION:
>>> + openAndParsePolicyFile();
>>> + return;
>>> + case JOptionPane.NO_OPTION:
>>> + break;
>>> + case JOptionPane.CANCEL_OPTION:
>>> + return;
>>> + default:
>>> + break;
>>> + }
>>> + }
>>> + } catch (final FileNotFoundException e) {
>>> + OutputController.getLogger().log(e);
>>> + showCouldNotSaveDialog();
>>
>> Why can not we save if file is not found?
>>
>> - we can not load
>> - or we can not save because of not existing path to file
>> -?
>
> Yea, I probably should have given a more informative message here. This case is happening within the
> case that we have a previous MD5 hash saved, and are not able to compute a current one because of
> the FileNotFound, so the file has been deleted or made otherwise inaccessible while the PolicyEditor
> was running. I guess some better checks can be done here, or maybe we should just continue trying to
> save regardless... ?
KLEaving it on your best conscience :)
>
>>
>>> + return;
>>> + } catch (final IOException e) {
>>> + OutputController.getLogger().log(e);
>>> + showCouldNotSaveDialog();
>>> + return;
>>> + }
>>> + }
>>> final StringBuilder sb = new StringBuilder();
>>> sb.append(AUTOGENERATED_NOTICE);
>>> sb.append("\n/* Generated by PolicyEditor at " + new
>>> SimpleDateFormat("yyyy-MM-dd HH:mm:ss")
>>> @@ -839,6 +884,7 @@
>>>
>>> try {
>>> FileUtils.saveFile(sb.toString(), new File(filePath));
>>> + fileMd5 = FileUtils.getFileMD5Sum(new File(filePath));
>>> changesMade = false;
>>> showChangesSavedDialog();
>>> } catch (final IOException e) {
>>> diff --git a/netx/net/sourceforge/jnlp/util/FileUtils.java
>>> b/netx/net/sourceforge/jnlp/util/FileUtils.java
>>> --- a/netx/net/sourceforge/jnlp/util/FileUtils.java
>>> +++ b/netx/net/sourceforge/jnlp/util/FileUtils.java
>>> @@ -30,8 +30,12 @@
>>> import java.io.OutputStreamWriter;
>>> import java.io.RandomAccessFile;
>>> import java.io.Writer;
>>> +import java.nio.ByteBuffer;
>>> import java.nio.channels.FileChannel;
>>> import java.nio.channels.FileLock;
>>> +import java.security.DigestInputStream;
>>> +import java.security.MessageDigest;
>>> +import java.security.NoSuchAlgorithmException;
>>> import java.util.ArrayList;
>>> import java.util.List;
>>>
>>> @@ -394,6 +398,27 @@
>>> }
>>>
>>> /**
>>> + * Show a message warning the user that a file has been modified on disk since it was loaded
>>> and asking to reload
>>> + * @param frame a {@link JFrame} to act as parent to this dialog
>>> + * @param message the dialog message to display
>>> + * @param title the dialog title
>>> + * @return the user's choice
>>> + */
>>> + public static int showFileChangedWhileLoadedDialog(final JFrame frame, final String message,
>>> final String title) {
>>> + return JOptionPane.showConfirmDialog(frame, message, title,
>>> JOptionPane.YES_NO_CANCEL_OPTION, JOptionPane.WARNING_MESSAGE);
>>
>> Not sure if this generalization belongs here.
>>
>> If yes, then whole md5sum compression belongs here.
>>
>> I'm imagining new class around netx/net/sourceforge/jnlp/util/FileUtils.java , eg md5sumWatcher.
>> Or UpdateWatchingFile
>>
>> And it will encapsulate all md5sum checks you do PolicyEditor. and of course handle the dialogue.
>
> Hmm... this does seem like it could be a useful tool to have. I'll look into that for the next round
> of review.
ok.
>
>>> + }
>>> +
>>> + /**
>>> + * Show a message warning the user that a file has been modified on disk since it was loaded
>>> and asking to reload
>>> + * @param frame a {@link JFrame} to act as parent to this dialog
>>> + * @param filePath the path to the file
>>> + * @return the user's choice
>>> + */
>>> + public static int showFileChangeWhileLoadedDialog(final JFrame frame, final String filePath) {
>>> + return showFileChangedWhileLoadedDialog(frame, R("RFileModifiedWhileLoadedDetail",
>>> filePath), R("RFileModifiedWhileLoaded"));
>>> + }
>>> +
>>> + /**
>>> * Returns a String that is suitable for using in GUI elements for
>>> * displaying (long) paths to users.
>>> *
>>> @@ -579,4 +604,39 @@
>>> public static String loadFileAsString(File f, String encoding) throws IOException {
>>> return getContentOfStream(new FileInputStream(f), encoding);
>>> }
>>> +
>>> + public static byte[] getFileMD5Sum(final File f) throws FileNotFoundException, IOException {
>>> + final MessageDigest md5;
>>> + final InputStream is;
>>> + final DigestInputStream dis;
>>> + try {
>>> + md5 = MessageDigest.getInstance("MD5");
>>> + is = new FileInputStream(f);
>>> + dis = new DigestInputStream(is, md5);
>>> +
>>> + md5.update(getContentOfStream(dis).getBytes());
>>> + } catch (final NoSuchAlgorithmException e) {
>>> + // There definitely should be an MD5 algorithm... if not, well, nothing to do but fail.
>>
>> Then maybe rather bubble the exception up? Yes log, but rethrow. Or at least let user know. Or
>> use timestamp as fall back.
>>
>> This return null is suspicious and smell by NPE later. ( I mean also in changesets time horizon
>> later)
>
> Rethrow as a RuntimeException perhaps? It doesn't seem right to make NoSuchAlgorithm a checked
> exception in this case.
Should be ok. But probably both fall back and special - non fatal custom runtime exception should
be ok too.
You will revisit this approach in your encapsulating class anyway. So you will hit the correct stone
during revisiting.
>
>>
>>> + OutputController.getLogger().log(e);
>>> + return null;
>>> + }
>>> +
>>> + try {
>>> + if (is != null) {
>>> + is.close();
>>> + }
>>> + } catch (final IOException e) {
>>> + OutputController.getLogger().log(e);
>> blah :)) To match try/catch -> log
>>
>> Something better here?
>>
>> Eg utility method which throw sensible information, Which is catched in proper place with proper
>> reaction?
>
> Just trying to close some Streams here... what is there really to do if closing the steam fails?
methd() throws ...{
try{
}finally{
close()
}
}
>
>>
>>> + }
>>> +
>>> + try {
>>> + if (dis != null) {
>>> + dis.close();
>>> + }
>>> + } catch (final IOException e) {
>>> + OutputController.getLogger().log(e);
>>> + }
>>> +
>>> + return md5.digest();
>>> + }
>>> }
>>>
>>>
>>> policy-editor-parsing-tests.patch
>>>
>>>
>>> diff --git a/ChangeLog b/ChangeLog
>>> --- a/ChangeLog
>>> +++ b/ChangeLog
>>> @@ -1,3 +1,24 @@
>>> +2014-02-21 Andrew Azores<aazores at redhat.com>
>>> +
>>> + * NEWS: added entry for PolicyEditor
>>> + * netx/net/sourceforge/jnlp/security/policyeditor/CustomPermission.java:
>>> + (fromString) use regexes to parse
>>> + * netx/net/sourceforge/jnlp/security/policyeditor/PolicyEditor.java:
>>> + (getPermissions) returns empty map rather than null.
>>> + (getCustomPermissions) new function. (openAndParsePolicyFile) check for
>>> + OpenFileResult FAILURE and NOT_FILE rather than null
>>> + * netx/net/sourceforge/jnlp/util/FileUtils.java:
>>> + (testDirectoryPermissions) add check for getCanonicalFile and null
>>> + safeguarding. (testFilePermissions) add check for getCanonicalFile and
>>> + return FAILURE rather than null
>>> + * tests/netx/unit/net/sourceforge/jnlp/security/policyeditor/CustomPermissionTest.java:
>>> + (testMissingQuotationMarks) new test
>>> + * tests/netx/unit/net/sourceforge/jnlp/security/policyeditor/PolicyEditorTest.java:
>>> + (testReturnedCustomPermissionsSetIsCopy,
>>> + testCodebaseTrailingSlashesDoNotMatch) new tests
>>> + * tests/netx/unit/net/sourceforge/jnlp/security/policyeditor/PolicyEditorParsingTest.java:
>>> + new tests
>>> +
>>> 2014-02-20 Andrew Azores<aazores at redhat.com>
>>>
>>> New simplified PolicyEditor for editing Java policy files, particularly
>>> diff --git a/NEWS b/NEWS
>>> --- a/NEWS
>>> +++ b/NEWS
>>> @@ -16,6 +16,7 @@
>>> * Dialogs center on screen before becoming visible
>>> * Support for u45 and u51 new manifest attributes (Application-Name, Codebase)
>>> * Custom applet permission policies panel in itweb-settings control panel
>>> +* New PolicyEditor for easily adding/removing permissions to individual applets
>>> * Cache Viewer
>>> - Can be closed by ESC key
>>> - Enabling and disabling of operational buttons is handled properly
>>> diff --git a/netx/net/sourceforge/jnlp/security/policyeditor/CustomPermission.java
>>> b/netx/net/sourceforge/jnlp/security/policyeditor/CustomPermission.java
>>> --- a/netx/net/sourceforge/jnlp/security/policyeditor/CustomPermission.java
>>> +++ b/netx/net/sourceforge/jnlp/security/policyeditor/CustomPermission.java
>>> @@ -36,6 +36,9 @@
>>>
>>> package net.sourceforge.jnlp.security.policyeditor;
>>>
>>> +import java.util.regex.Matcher;
>>> +import java.util.regex.Pattern;
>>> +
>>> /**
>>> * This class models a permission entry in a policy file which is not included
>>> * in the default set of permissions used by the PolicyEditor, ie, permissions
>>> @@ -63,16 +66,15 @@
>>> * @return a CustomPermission representing this string
>>> */
>>> public static CustomPermission fromString(final String string) {
>>> - final String[] parts = string.trim().split(" ");
>>> - if (!parts[0].equals("permission") || parts.length < 3 || !string.trim().endsWith(";")) {
>>
>> The pattenr should be precompiled, and then reused. Pelase extract the variable.
>> Also some comments would be nice :))
>> What is expected to be parsed and what not.
>
> Yea, I realized this and started working on it right after I sent this for review :/
good.
>
>>
>>> + final Pattern pattern =
>>> + Pattern.compile("permission\\s+([\\w.]+)\\s+\"([^\"]+)\",?\\s*\"?([^\"]*)\"?;");
>> Isn't the regex to benevolent?
>
> Yea, probably.
May not be wrong necessarily :)
>
>>
>>> + final Matcher matcher = pattern.matcher(string);
>>> + if (!matcher.matches()) {
>>> return null;
...snip...
>>> + @Before
>>> + public void createTempFile() throws Exception {
>>> + file = File.createTempFile("PolicyEditor", ".policy");
>>> + file.deleteOnExit();
>>> + }
>>
>> The tests for no file, jsut string parsding exists, correct?
>
> Hmm? Each test in this reproducer writes a mock policy to a temp file, has the editor load and parse
> this file, and checks on the results.
I know. But tests like string -> parse , check result (without any file) are in your initial commit,
correct?
>
>>
>>> +
>>> + private void setupTest(final String policyContents, final String codebase) throws Exception {
...snip
J.
More information about the distro-pkg-dev
mailing list