/hg/icedtea-web: 3 new changesets

jvanek at icedtea.classpath.org jvanek at icedtea.classpath.org
Wed Sep 2 17:01:03 UTC 2015


changeset 53500e3de1bc in /hg/icedtea-web
details: http://icedtea.classpath.org/hg/icedtea-web?cmd=changeset;node=53500e3de1bc
author: Jiri Vanek <jvanek at redhat.com>
date: Wed Sep 02 18:24:33 2015 +0200

	Newline characters are banned from saving to .appletTrustSettings


changeset fb798629d70a in /hg/icedtea-web
details: http://icedtea.classpath.org/hg/icedtea-web?cmd=changeset;node=fb798629d70a
author: Jiri Vanek <jvanek at redhat.com>
date: Wed Sep 02 18:26:21 2015 +0200

	Changelog: fixed indentation of alaca  paragraph from 9.1


changeset c9befa549f63 in /hg/icedtea-web
details: http://icedtea.classpath.org/hg/icedtea-web?cmd=changeset;node=c9befa549f63
author: Jiri Vanek <jvanek at redhat.com>
date: Wed Sep 02 19:00:46 2015 +0200

	All UrlRegEx-es got unified and correct quoting


diffstat:

 ChangeLog                                                                                                     |   53 ++-
 netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletActionTableModel.java                                    |    6 +-
 netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletsTrustingListPanel.java                                  |    6 +-
 netx/net/sourceforge/jnlp/runtime/HtmlBoot.java                                                               |    2 +-
 netx/net/sourceforge/jnlp/runtime/html/AppletExtractor.java                                                   |   17 +-
 netx/net/sourceforge/jnlp/security/appletextendedsecurity/InvalidLineException.java                           |   47 ++
 netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java                      |   12 +-
 netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java                |    6 +-
 netx/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegEx.java                                       |   77 +++-
 netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageExtendedImpl.java   |    4 +-
 netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java           |   46 +-
 tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmationTest.java |  226 ++++++++-
 tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegExTest.java                        |  184 ++++++++
 tests/reproducers/simple/UnicodeLineBreak/resources/UnicodeLineBreak.html                                     |   44 +
 tests/reproducers/simple/UnicodeLineBreak/srcs/UnicodeLineBreak.java                                          |   47 ++
 tests/reproducers/simple/UnicodeLineBreak/testcases/UnicodeLineBreakTests.java                                |  140 ++++++
 16 files changed, 837 insertions(+), 80 deletions(-)

diffs (truncated from 1206 to 500 lines):

diff -r ee5e2cb91774 -r c9befa549f63 ChangeLog
--- a/ChangeLog	Tue Sep 01 14:52:24 2015 +0200
+++ b/ChangeLog	Wed Sep 02 19:00:46 2015 +0200
@@ -1,3 +1,50 @@
+2015-09-02  Jiri Vanek  <jvanek at redhat.com>
+
+	All UrlRegEx-es got unified and correct quoting
+	* netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletActionTableModel.java:
+	(addRow) now uses factory methods of quoteAndStar form UrlRegEx
+	* netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletsTrustingListPanel.java:
+	same, but of exact. Removed redundant space in APPEXTSECguiPanelTableInvalid key
+	* netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java:
+	same of exact.
+	* netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java:
+	same
+	* netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageExtendedImpl.java:
+	same
+	* netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java:
+	same
+	* netx/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegEx.java:
+	constructor made private,  field final. Creation allowed over factory methods of
+	quote. quoteAndStar, exact. Added and iprved mehtods for visualisation
+	* tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegExTest.java:
+	new test file with tests to new methods in UrlRegex
+
+2015-09-02  Jiri Vanek  <jvanek at redhat.com>
+
+	* Changelog: fixed indentation of alaca  paragraph from 9.1
+
+2015-09-02  Jiri Vanek  <jvanek at redhat.com>
+
+	Newline characters are banned from saving to .appletTrustSettings
+	* netx/net/sourceforge/jnlp/security/appletextendedsecurity/InvalidLineException.java:
+	New file. Exception to be specially handled if error appear in saved line.
+	* netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java:
+	(serializeToReadableAndParseableString) if new-line appear in line,
+	InvalidLineException is thrown
+	* netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java:
+	(writeContent) InvalidLineException is expected and logged.
+	* tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmationTest.java:
+	adapted and quite a lot of tests added.
+	* tests/reproducers/simple/UnicodeLineBreak/resources/UnicodeLineBreak.java:
+	* tests/reproducers/simple/UnicodeLineBreak/srcs/UnicodeLineBreak.java:
+	* tests/reproducers/simple/UnicodeLineBreak/testcases/UnicodeLineBreakTests.java:
+	half automated reproducer of this behavior	
+	* netx/net/sourceforge/jnlp/runtime/HtmlBoot.java: based on existence of -xml,
+	now can turn off tagsoup
+	* netx/net/sourceforge/jnlp/runtime/html/AppletExtractor.java: is passing
+	parsersettings to HtmlBoot
+
+
 2015-09-01  Jiri Vanek  <jvanek at redhat.com>
 
 	Saving of status of dialogs for "whole codebase" now includes also document base
@@ -17,12 +64,12 @@
 2015-09-01  Jiri Vanek  <jvanek at redhat.com>
 
 	application-library-allowable-codebase dialog made available for unsigned apps
-	*netx/net/sourceforge/jnlp/resources/Messages.properties: (ALACAMissingMainTitle)
+	* netx/net/sourceforge/jnlp/resources/Messages.properties: (ALACAMissingMainTitle)
 	added warning about possible consequences of  resources out of docbase.
 	(ALACAMatchingMainTitle) the red higlights changed to green and added calming
 	words about it.
-	*netx/net/sourceforge/jnlp/resources/Messages_cs.properties: same
-	*netx/net/sourceforge/jnlp/resources/Messages_de.properties: same
+	* netx/net/sourceforge/jnlp/resources/Messages_cs.properties: same
+	* netx/net/sourceforge/jnlp/resources/Messages_de.properties: same
 	* netx/net/sourceforge/jnlp/resources/Messages_pl.properties: adapted to red
 	to green recoloring
 	* netx/net/sourceforge/jnlp/runtime/ManifestAttributesChecker.java:
diff -r ee5e2cb91774 -r c9befa549f63 netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletActionTableModel.java
--- a/netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletActionTableModel.java	Tue Sep 01 14:52:24 2015 +0200
+++ b/netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletActionTableModel.java	Wed Sep 02 19:00:46 2015 +0200
@@ -142,12 +142,12 @@
 
     public void addRow() {
         int i = getRowCount()-1;
-        String s = "\\Qhttp://localhost:80/\\E.*";
+        String s = "http://localhost:80/";
         back.add(new UnsignedAppletActionEntry(
                 new AppletSecurityActions(),
                 new Date(),
-                new UrlRegEx(s),
-                new UrlRegEx(s),
+                UrlRegEx.quoteAndStar(s),
+                UrlRegEx.quoteAndStar(s),
                 null));
         fireTableRowsInserted(i+1, i+1);
     }
diff -r ee5e2cb91774 -r c9befa549f63 netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletsTrustingListPanel.java
--- a/netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletsTrustingListPanel.java	Tue Sep 01 14:52:24 2015 +0200
+++ b/netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletsTrustingListPanel.java	Wed Sep 02 19:00:46 2015 +0200
@@ -629,7 +629,7 @@
             JOptionPane.showMessageDialog(this, Translator.R("APPEXTSECguiPanelTableValid"));
         } catch (Exception ex) {
             OutputController.getLogger().log(OutputController.Level.ERROR_ALL, ex);
-            JOptionPane.showMessageDialog(this, Translator.R("APPEXTSECguiPanelTableInvalid ", ex.toString()));
+            JOptionPane.showMessageDialog(this, Translator.R("APPEXTSECguiPanelTableInvalid", ex.toString()));
         } finally {
             f.delete();
         }
@@ -820,7 +820,7 @@
 
         private MyTextField(UrlRegEx urlRegEx) {
             if (urlRegEx == null) {
-                keeper = new UrlRegEx("");
+                keeper = UrlRegEx.exact("");
             } else {
                 this.keeper = urlRegEx;
             }
@@ -839,7 +839,7 @@
 
         private UrlRegexCellRenderer(UrlRegEx urlRegEx) {
             if (urlRegEx == null) {
-                keeper = new UrlRegEx("");
+                keeper =  UrlRegEx.exact("");
             } else {
                 this.keeper = urlRegEx;
             }
diff -r ee5e2cb91774 -r c9befa549f63 netx/net/sourceforge/jnlp/runtime/HtmlBoot.java
--- a/netx/net/sourceforge/jnlp/runtime/HtmlBoot.java	Tue Sep 01 14:52:24 2015 +0200
+++ b/netx/net/sourceforge/jnlp/runtime/HtmlBoot.java	Wed Sep 02 19:00:46 2015 +0200
@@ -132,7 +132,7 @@
         try {
             OutputController.getLogger().log("Proceeding with html");
             final URL html = Boot.getFileLocation();
-            AppletExtractor axe = new AppletExtractor(html);
+            AppletExtractor axe = new AppletExtractor(html, settings);
             AppletsFilter filtered = new AppletsFilter(axe.findAppletsOnPage(), html, vars.subList(1, vars.size()));
             List<AppletParser> applets = filtered.getApplets();
             // this hack was needed in early phases of the patch.   Now it sees to be not neede. Keeping inside to remove after much more testing
diff -r ee5e2cb91774 -r c9befa549f63 netx/net/sourceforge/jnlp/runtime/html/AppletExtractor.java
--- a/netx/net/sourceforge/jnlp/runtime/html/AppletExtractor.java	Tue Sep 01 14:52:24 2015 +0200
+++ b/netx/net/sourceforge/jnlp/runtime/html/AppletExtractor.java	Wed Sep 02 19:00:46 2015 +0200
@@ -45,7 +45,9 @@
 import javax.xml.parsers.DocumentBuilderFactory;
 import javax.xml.parsers.ParserConfigurationException;
 import net.sourceforge.jnlp.JNLPFile;
+import net.sourceforge.jnlp.OptionsDefinitions;
 import net.sourceforge.jnlp.Parser;
+import net.sourceforge.jnlp.ParserSettings;
 import net.sourceforge.jnlp.cache.UpdatePolicy;
 import net.sourceforge.jnlp.runtime.JNLPRuntime;
 import net.sourceforge.jnlp.util.logging.OutputController;
@@ -68,10 +70,15 @@
         "applet", "APPLET", "Applet",
         "object", "OBJECT", "Object",
         "embed", "EMBED", "Embed"};
+    private final ParserSettings ps;
 
     public AppletExtractor(URL html) {
+        this(html, null);
+    }
+    public AppletExtractor(URL html, ParserSettings ps) {
         JNLPRuntime.saveHistory(html.toExternalForm());
         this.html = html;
+        this.ps = ps;
     }
 
     public URL getHtml() {
@@ -80,9 +87,13 @@
 
     private InputStream cleanStreamIfPossible(InputStream is) {
         try {
-            Class<?> klass = Class.forName(Parser.MALFORMED_PARSER_CLASS);
-            Method m = klass.getMethod("xmlizeInputStream", InputStream.class);
-            return (InputStream) m.invoke(null, is);
+            if (ps != null && ps.isMalformedXmlAllowed()){
+                Class<?> klass = Class.forName(Parser.MALFORMED_PARSER_CLASS);
+                Method m = klass.getMethod("xmlizeInputStream", InputStream.class);
+                return (InputStream) m.invoke(null, is);
+            } else {
+                OutputController.getLogger().log(OutputController.Level.WARNING_DEBUG, "Tagsoup's html2xml cleaning is Disabled. Remove "+OptionsDefinitions.OPTIONS.XML.option+". Parsing will probably fail.");    
+            }
         } catch (Exception ex) {
             OutputController.getLogger().log(OutputController.Level.WARNING_DEBUG, "Tagsoup's html2xml cleaning not loaded. Install tagsoup. Parsing will probably fail.");
             OutputController.getLogger().log(ex);
diff -r ee5e2cb91774 -r c9befa549f63 netx/net/sourceforge/jnlp/security/appletextendedsecurity/InvalidLineException.java
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/InvalidLineException.java	Wed Sep 02 19:00:46 2015 +0200
@@ -0,0 +1,47 @@
+/* 
+ Copyright (C) 2015 Red Hat, Inc.
+
+ This file is part of IcedTea.
+
+ IcedTea is free software; you can redistribute it and/or
+ modify it under the terms of the GNU General Public License as published by
+ the Free Software Foundation, version 2.
+
+ IcedTea is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
+ General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with IcedTea; see the file COPYING.  If not, write to
+ the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
+ 02110-1301 USA.
+
+ Linking this library statically or dynamically with other modules is
+ making a combined work based on this library.  Thus, the terms and
+ conditions of the GNU General Public License cover the whole
+ combination.
+
+ As a special exception, the copyright holders of this library give you
+ permission to link this library with independent modules to produce an
+ executable, regardless of the license terms of these independent
+ modules, and to copy and distribute the resulting executable under
+ terms of your choice, provided that you also meet, for each linked
+ independent module, the terms and conditions of the license of that
+ module.  An independent module is a module which is not derived from
+ or based on this library.  If you modify this library, you may extend
+ this exception to your version of the library, but you are not
+ obligated to do so.  If you do not wish to do so, delete this
+ exception statement from your version.
+ */
+
+package net.sourceforge.jnlp.security.appletextendedsecurity;
+
+
+public class InvalidLineException extends RuntimeException {
+
+    public InvalidLineException(String s) {
+        super(s);
+    }
+    
+}
diff -r ee5e2cb91774 -r c9befa549f63 netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java
--- a/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java	Tue Sep 01 14:52:24 2015 +0200
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java	Wed Sep 02 19:00:46 2015 +0200
@@ -62,11 +62,11 @@
         UnsignedAppletActionEntry nw = new UnsignedAppletActionEntry(
                 AppletSecurityActions.fromString(split[0]),
                 new Date(new Long(split[1])),
-                new UrlRegEx(split[2]),
+                UrlRegEx.exact(split[2]),
                 null,
                 null);
         if (split.length > 3) {
-            nw.setCodeBase(new UrlRegEx(split[3]));
+            nw.setCodeBase(UrlRegEx.exact(split[3]));
         }
         if (split.length > 4) {
             nw.setArchives(createArchivesList(s.substring(s.lastIndexOf(split[3]) + split[3].length()).trim()));
@@ -93,12 +93,16 @@
         bw.write(this.serializeToReadableAndParseableString());
     }
 
-    private String serializeToReadableAndParseableString() {
-        return appletSecurityActions.toString()
+    private String serializeToReadableAndParseableString() throws InvalidLineException {
+        String s = appletSecurityActions.toString()
                 + " " + ((timeStamp == null) ? "1" : timeStamp.getTime())
                 + " " + ((documentBase == null) ? "" : documentBase.getRegEx())
                 + " " + ((codeBase == null) ? "" : codeBase.getRegEx())
                 + " " + createArchivesString(archives);
+        if (s.contains("\n") || s.contains("\r") || s.contains("\f")){
+            throw new InvalidLineException("Cant write line with \\n, \\r or \\f");
+        }
+        return s;
     }
 
     public Date getTimeStamp() {
diff -r ee5e2cb91774 -r c9befa549f63 netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java
--- a/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java	Tue Sep 01 14:52:24 2015 +0200
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java	Wed Sep 02 19:00:46 2015 +0200
@@ -150,13 +150,13 @@
             
             if (rememberForCodeBase != null) {
                 
-                codebaseRegex = new UrlRegEx("\\Q" + codebase + "\\E");
+                codebaseRegex = UrlRegEx.quote(codebase.toExternalForm());
 
                 if (!rememberForCodeBase) {
-                    documentbaseRegex = new UrlRegEx("\\Q" + documentbase + "\\E"); // Match only this applet
+                    documentbaseRegex = UrlRegEx.quote(documentbase.toExternalForm()); // Match only this applet
                     archiveMatches = toRelativePaths(getJars(file), file.getCodeBase().toString()); // Match only this applet
                 } else {
-                    documentbaseRegex = new UrlRegEx("\\Q" + stripFile(documentbase)+ "\\E.*"); // Match any from codebase and sourceFile "base"
+                    documentbaseRegex = UrlRegEx.quoteAndStar(stripFile(documentbase)); // Match any from codebase and sourceFile "base"
                 }
             }
             
diff -r ee5e2cb91774 -r c9befa549f63 netx/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegEx.java
--- a/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegEx.java	Tue Sep 01 14:52:24 2015 +0200
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegEx.java	Wed Sep 02 19:00:46 2015 +0200
@@ -35,11 +35,29 @@
  */
 package net.sourceforge.jnlp.security.appletextendedsecurity;
 
+import java.util.regex.Pattern;
+
 public class UrlRegEx {
 
-    String regEx;
+    private static String quoteString(String s) {
+        return Pattern.quote(s);
+    }
 
-    public UrlRegEx(String s) {
+    private final String regEx;
+
+    public static UrlRegEx quote(String s) {
+        return new UrlRegEx(quoteString(s));
+    }
+    
+    public static UrlRegEx quoteAndStar(String s) {
+        return new UrlRegEx(quoteString(s)+".*");
+    }
+    
+    public static UrlRegEx exact(String s) {
+        return new UrlRegEx(s);
+    }
+    
+    private UrlRegEx(String s) {
         regEx = s;
     }
 
@@ -52,11 +70,60 @@
         return regEx;
     }
 
+    /**
+     * Just cosmetic method to show nicer tables, as \Qsomething\Emaybe is most
+     * common record when cell is edited, the regex is shown fully
+     *
+     * @return unquted pattern or original string
+     */
     public String getFilteredRegEx() {
-        return regEx.replaceAll("\\\\Q", "").replaceAll("\\\\E", "");
+        try {
+            return simpleUnquote(regEx);
+        } catch (Exception ex) {
+            return regEx;
+        }
     }
 
-    public void setRegEx(String regEx) {
-        this.regEx = regEx;
+    //needs testing
+    static String replaceLast(String where, String what, String by) {
+        if (!where.contains(what)) {
+            return where;
+        }
+        StringBuilder b = new StringBuilder(where);
+        b.replace(where.lastIndexOf(what), where.lastIndexOf(what)+what.length(), by);
+        return b.toString();
+    }
+    
+     //needs testing
+    static String simpleUnquote(String s) {
+        //escaped run needs at least \E\Q, but only single char actually hurts
+        if (s.length()<=1){
+            return s;
+        }
+        boolean in = false;
+        for(int i = 1 ; i < s.length() ; i++){
+            if ( i == 0) {
+                continue;
+            }
+            if (!in && s.charAt(i) == 'Q' && s.charAt(i-1) ==  '\\'){
+                in = true;
+                String s1=s.substring(0, i - 1);
+                String s2=s.substring(i + 1);
+                s= s1+s2;
+                i = i - 2;
+                continue;
+            }
+            if (in && s.charAt(i) == 'E' && s.charAt(i-1) ==  '\\'){
+                String s1=s.substring(0, i - 1);
+                String s2=s.substring(i + 1);
+                s= s1+s2;
+                i = i - 2;
+                in = false;
+                continue;
+            }
+        }
+        //all text\Etext were replaced  \Qtext\E\\E\Qtext\E
+        //after above text\\Etext  should remain
+        return s.replace("\\\\E", "\\E");
     }
 }
diff -r ee5e2cb91774 -r c9befa549f63 netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageExtendedImpl.java
--- a/netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageExtendedImpl.java	Tue Sep 01 14:52:24 2015 +0200
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageExtendedImpl.java	Wed Sep 02 19:00:46 2015 +0200
@@ -170,10 +170,10 @@
                         source.setTimeStamp((Date) aValue);
                     }
                     if (columnIndex == 2) {
-                        source.setDocumentBase(new UrlRegEx((String) aValue));
+                        source.setDocumentBase(UrlRegEx.exact((String) aValue));
                     }
                     if (columnIndex == 3) {
-                        source.setCodeBase(new UrlRegEx((String) aValue));
+                        source.setCodeBase(UrlRegEx.exact((String) aValue));
                     }
                     if (columnIndex == 4) {
                         source.setArchives(UnsignedAppletActionEntry.createArchivesList((String) aValue));
diff -r ee5e2cb91774 -r c9befa549f63 netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java
--- a/netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java	Tue Sep 01 14:52:24 2015 +0200
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java	Wed Sep 02 19:00:46 2015 +0200
@@ -41,12 +41,15 @@
 import java.util.ArrayList;
 import java.util.Collections;
 import java.util.List;
+import java.util.regex.PatternSyntaxException;
+import net.sourceforge.jnlp.security.appletextendedsecurity.InvalidLineException;
 import net.sourceforge.jnlp.security.appletextendedsecurity.UnsignedAppletActionEntry;
 import net.sourceforge.jnlp.security.appletextendedsecurity.UnsignedAppletActionStorage;
 import net.sourceforge.jnlp.security.dialogs.remember.ExecuteAppletAction;
 import net.sourceforge.jnlp.security.dialogs.remember.RememberableDialog;
 import net.sourceforge.jnlp.util.lockingfile.LockingReaderWriter;
 import net.sourceforge.jnlp.util.lockingfile.StorageIoException;
+import net.sourceforge.jnlp.util.logging.OutputController;
 
 public class UnsignedAppletActionStorageImpl extends LockingReaderWriter implements UnsignedAppletActionStorage {
 
@@ -73,7 +76,7 @@
     @Override
     protected void readContents() throws IOException {
         if (items == null) {
-            items = new ArrayList<UnsignedAppletActionEntry>();
+            items = new ArrayList<>();
         } else {
             items.clear();
         }
@@ -90,8 +93,12 @@
     @Override
     public void writeContent(BufferedWriter bw) throws IOException {
         for (UnsignedAppletActionEntry item : items) {
-            item.write(bw);
-            bw.newLine();
+            try{
+                item.write(bw);
+                bw.newLine();
+            }catch (InvalidLineException ex){
+                OutputController.getLogger().log(ex);
+            }
         }
     }
 
@@ -177,21 +184,26 @@
     }
 
     private boolean isMatching(UnsignedAppletActionEntry unsignedAppletActionEntry, String documentBase, String codeBase, List<String> archives) {
-        boolean result = true;
-        if (documentBase != null && !documentBase.trim().isEmpty()) {
-            result = result && documentBase.matches(unsignedAppletActionEntry.getDocumentBase().getRegEx());
+        try {
+            boolean result = true;
+            if (documentBase != null && !documentBase.trim().isEmpty()) {
+                result = result && documentBase.matches(unsignedAppletActionEntry.getDocumentBase().getRegEx());
+            }
+            if (codeBase != null && !codeBase.trim().isEmpty()) {
+                result = result && codeBase.matches(unsignedAppletActionEntry.getCodeBase().getRegEx());
+            }
+            if (archives != null) {
+                List<String> saved = unsignedAppletActionEntry.getArchives();
+                if (saved == null || saved.isEmpty()) {
+                    return result;
+                }
+                result = result && compareArchives(archives, saved);
+            }
+            return result;
+        } catch (PatternSyntaxException ex) {
+            OutputController.getLogger().log(OutputController.Level.WARNING_ALL, ex);
+            return false;
         }
-        if (codeBase != null && !codeBase.trim().isEmpty()) {
-            result = result && codeBase.matches(unsignedAppletActionEntry.getCodeBase().getRegEx());
-        }
-        if (archives != null) {
-            List<String> saved = unsignedAppletActionEntry.getArchives();
-            if (saved == null || saved.isEmpty()) {
-                return result;
-            }
-            result = result && compareArchives(archives, saved);
-        }
-        return result;
     }
 
     @Override
diff -r ee5e2cb91774 -r c9befa549f63 tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmationTest.java
--- a/tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmationTest.java	Tue Sep 01 14:52:24 2015 +0200
+++ b/tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmationTest.java	Wed Sep 02 19:00:46 2015 +0200
@@ -36,6 +36,8 @@
 package net.sourceforge.jnlp.security.appletextendedsecurity;
 
 import java.io.File;
+import java.io.IOException;
+import java.io.StringReader;
 import java.lang.reflect.Field;
 import java.lang.reflect.Modifier;
 import java.net.MalformedURLException;
@@ -43,15 +45,19 @@
 import static org.junit.Assert.assertEquals;
 
 import java.util.Arrays;
+import java.util.List;


More information about the distro-pkg-dev mailing list