[rfc][icedtea-web] policytool in itweb-settings
Jacob Wisor
gitne at gmx.de
Tue Jan 14 15:34:37 PST 2014
On 01/14/2014 07:16 PM, Andrew Azores wrote:
> On 01/14/2014 10:34 AM, Jiri Vanek wrote:
>> On 01/14/2014 03:16 PM, Jacob Wisor wrote:
>>> On 01/14/2014 01:42 PM, Jiri Vanek wrote:
>>>> On 01/14/2014 12:33 AM, Jacob Wisor wrote:
>>>>> Hello there!
>>>>>
>>>>> On 01/13/2014 11:20 PM, Andrew Azores wrote:
>>>>>> Hi,
>>>>>>
>>>>>> This small patch hooks the JDK policytool into itweb-settings. It can then be
>>>>>> used to set up a custom user-level JNLP policy - this, in combination with
>>>>>> the
>>>>>> Run in Sandbox patch, will allow for quite a lot more flexibility in how
>>>>>> permissions are handled with signed applets/applications.
>>>>>>
>>>>>> A nicer, more user-friendly editor to replace the policytool will
>>>>>> hopefully come
>>>>>> later on.
>>>>>
>>>>> Oooooooh yes, please! This would be awesome! :-)
>>>>
>>>> Yes this would be :))
>>>> But it is different task. And Quite complex. Especially it must pass upstream
>>>> (openjdk). And that is *the* task!
>>>
>>> Well, it does not need to replace or displace OpenJDK's policytool. It should
>>> be probably enough
>>> that it complements it. ;-) You know, it's neither forbidden nor against any
>>> spec to build
>>> augmenting tools around OpenJDK.
>>
>> But still contribute to Openjdk itself is the right thing to do.
>>
>> ...
>>>
>>> At first, I thought that the problem would rather be that some system
>>> configurations may be missing
>>> a PATH environment variable entry to policytool and thus launching it may
>>> fail. But, Jiri is right.
>>> The best approach here would probably be to call directly into policytool's
>>> main() method with
>>> user.home as its current working directory. policytool is part of rt.jar, not
>>> tools.jar, so it
>>> should already be on bootclasspath. But, you may have to investigate deeper
>>> into it because the
>>
>> Great!
>>
>> But I doubt "with user.home as its current working directory" is possible.
>> Or do we misunderstand each other?
>>
>> I had in my mind simple PolicyTool.main(arg,aerg,arg) call in itw-settings.
>>
>>
>>> package names of some tools have changed from OpenJDK 6 over to OpenJDK 7.
>>
>> I doubt policy tool was touched in last 10 years ;)
>>
>> J.
>>
>
> [...]
>
> The actual PolicyPanel is now launching the PolicyTool by invoking its main
> method, rather than exec'ing a new process.
After I have hit the send button for my last e-mail, I have realized that it may
be desirable to run policytool in a separate process for security reasons,
although calling directly into PolicyTool.main(). Maybe it's just me being
paranoid, but authoring policies is a security sensitive task. In the current
patch policytool gets loaded into the same JVM as itw-settings. If the current
JVM or itw-settings has been compromised for the current user, he/she may be
editing a heck of secure policy but could end up with a policy file on disk,
granting AllPermissions to some malicious code bearing URL. Sure, policy files
are simple human readable text files that can be checked before applying. But,
who really does that?
Of course, I do realize that if one's system JRE has been compromised then
probably all other JVM instances and the applications running on them are going
to get compromised sooner or later on that system. I don't know, I just wanted
to share some wired thoughts on policy authoring security. :-D
> I've put this into a new thread, but tbh I'm not sure if that was entirely necessary.
In this case, I had rather something like SwingUtilities.invokeLater() or
EventQueue.invokeLater() in mind. In general, only activities related to
manipulating and displaying UI elements should be placed on the AWT thread. Work
code should either be put into invokeLater() or custom working threads (like
SwingWorker for example), although the later has some more caveats in most
cases. invokeLater() actually does indeed create a thread too but it also neatly
ties it into the UI toolkit and takes care of most of those caveats, so
developers are really advised to use it. You may want to read the tiny
discussion on "Swing's Threading Policy" at the bottom of javax.swing's package
API documentation regarding this topic. ;-)
> The "View Policy" button has a tooltip now that indicates the location of the file that will be opened,
> although this is also displayed in the policytool itself if you launch it.
Right, that's actually why I have remained silent on that matter. It's a good
move to indicate the policy file's location before launching policytool.
> The View Button's action listener is no longer an anonymous inner class, since I
> don't really mind the style either way personally.
Yey, I love inner classes! :-D Declaring a member variable holding the
ActionListener's reference would have been enough too, but hey, going all the
way through is even cooler. 8-)
> Its implementation does have an anonymous inner Runnable inside its Thread, though.
An anonymous Runnable implementation without keeping a reference to it is okay
here because in any case, there can only be one Runnable object per Thread
object, hence a reference to that anonymous Runnable object is always
unambiguously retrievable. Nevertheless, you may want to prefer invokeLater()
over that custom thread.
> Oh, and there's also now an error dialog if for some reason the policy file can't be opened (eg it exists
> but you don't have read permission, or it exists but is a directory, or
> whatever). If the file doesn't already exist then we attempt to create a blank
> one there first, since the PolicyTool itself doesn't seem to do this.
Although all JOptionPane.showXxxDialog() dialogs are modal, please pass it a
reference to itw-settings' JFrame for the sake of completeness, before it grabs
some undesired /default/ Compenent - what ever this might be - or perhaps even
the desktop window.
I hope you are sure about what you have been probably intending to accomplish
with canOpenPolicyFile() actually does what you had in mind. File.canRead() and
File.canWrite() are not platform agnostic and they are only checking file system
access permissions, not physical read/write capability. Those methods are so
misleading in their semantics and should not have found their way into the Java
API in the first place. The JCP board would be well advised to deprecate these
methods as soon as possible for being highly platform dependent and having
misleading semantics. I have already covered this in an earlier post to this
mailing list. ;-)
Besides File.canRead() and File.canWrite() also test for existence so you may
want to simplify and drop some redundant tests in you current code. I may be
mistaken, but there may already be code present in
net.sourceforge.jnlp.util.FileUtils for your intended purpose.
IMHO, you should probably drop these tests anyway because it's on the policytool
to do those tests (from a software engineering point of view).
> [...]
Jacob
More information about the distro-pkg-dev
mailing list