/hg/icedtea-web: 3 new changesets
jvanek at icedtea.classpath.org
jvanek at icedtea.classpath.org
Wed Sep 2 17:01:03 UTC 2015
changeset 53500e3de1bc in /hg/icedtea-web
details: http://icedtea.classpath.org/hg/icedtea-web?cmd=changeset;node=53500e3de1bc
author: Jiri Vanek <jvanek at redhat.com>
date: Wed Sep 02 18:24:33 2015 +0200
Newline characters are banned from saving to .appletTrustSettings
changeset fb798629d70a in /hg/icedtea-web
details: http://icedtea.classpath.org/hg/icedtea-web?cmd=changeset;node=fb798629d70a
author: Jiri Vanek <jvanek at redhat.com>
date: Wed Sep 02 18:26:21 2015 +0200
Changelog: fixed indentation of alaca paragraph from 9.1
changeset c9befa549f63 in /hg/icedtea-web
details: http://icedtea.classpath.org/hg/icedtea-web?cmd=changeset;node=c9befa549f63
author: Jiri Vanek <jvanek at redhat.com>
date: Wed Sep 02 19:00:46 2015 +0200
All UrlRegEx-es got unified and correct quoting
diffstat:
ChangeLog | 53 ++-
netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletActionTableModel.java | 6 +-
netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletsTrustingListPanel.java | 6 +-
netx/net/sourceforge/jnlp/runtime/HtmlBoot.java | 2 +-
netx/net/sourceforge/jnlp/runtime/html/AppletExtractor.java | 17 +-
netx/net/sourceforge/jnlp/security/appletextendedsecurity/InvalidLineException.java | 47 ++
netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java | 12 +-
netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java | 6 +-
netx/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegEx.java | 77 +++-
netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageExtendedImpl.java | 4 +-
netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java | 46 +-
tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmationTest.java | 226 ++++++++-
tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegExTest.java | 184 ++++++++
tests/reproducers/simple/UnicodeLineBreak/resources/UnicodeLineBreak.html | 44 +
tests/reproducers/simple/UnicodeLineBreak/srcs/UnicodeLineBreak.java | 47 ++
tests/reproducers/simple/UnicodeLineBreak/testcases/UnicodeLineBreakTests.java | 140 ++++++
16 files changed, 837 insertions(+), 80 deletions(-)
diffs (truncated from 1206 to 500 lines):
diff -r ee5e2cb91774 -r c9befa549f63 ChangeLog
--- a/ChangeLog Tue Sep 01 14:52:24 2015 +0200
+++ b/ChangeLog Wed Sep 02 19:00:46 2015 +0200
@@ -1,3 +1,50 @@
+2015-09-02 Jiri Vanek <jvanek at redhat.com>
+
+ All UrlRegEx-es got unified and correct quoting
+ * netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletActionTableModel.java:
+ (addRow) now uses factory methods of quoteAndStar form UrlRegEx
+ * netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletsTrustingListPanel.java:
+ same, but of exact. Removed redundant space in APPEXTSECguiPanelTableInvalid key
+ * netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java:
+ same of exact.
+ * netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java:
+ same
+ * netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageExtendedImpl.java:
+ same
+ * netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java:
+ same
+ * netx/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegEx.java:
+ constructor made private, field final. Creation allowed over factory methods of
+ quote. quoteAndStar, exact. Added and iprved mehtods for visualisation
+ * tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegExTest.java:
+ new test file with tests to new methods in UrlRegex
+
+2015-09-02 Jiri Vanek <jvanek at redhat.com>
+
+ * Changelog: fixed indentation of alaca paragraph from 9.1
+
+2015-09-02 Jiri Vanek <jvanek at redhat.com>
+
+ Newline characters are banned from saving to .appletTrustSettings
+ * netx/net/sourceforge/jnlp/security/appletextendedsecurity/InvalidLineException.java:
+ New file. Exception to be specially handled if error appear in saved line.
+ * netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java:
+ (serializeToReadableAndParseableString) if new-line appear in line,
+ InvalidLineException is thrown
+ * netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java:
+ (writeContent) InvalidLineException is expected and logged.
+ * tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmationTest.java:
+ adapted and quite a lot of tests added.
+ * tests/reproducers/simple/UnicodeLineBreak/resources/UnicodeLineBreak.java:
+ * tests/reproducers/simple/UnicodeLineBreak/srcs/UnicodeLineBreak.java:
+ * tests/reproducers/simple/UnicodeLineBreak/testcases/UnicodeLineBreakTests.java:
+ half automated reproducer of this behavior
+ * netx/net/sourceforge/jnlp/runtime/HtmlBoot.java: based on existence of -xml,
+ now can turn off tagsoup
+ * netx/net/sourceforge/jnlp/runtime/html/AppletExtractor.java: is passing
+ parsersettings to HtmlBoot
+
+
2015-09-01 Jiri Vanek <jvanek at redhat.com>
Saving of status of dialogs for "whole codebase" now includes also document base
@@ -17,12 +64,12 @@
2015-09-01 Jiri Vanek <jvanek at redhat.com>
application-library-allowable-codebase dialog made available for unsigned apps
- *netx/net/sourceforge/jnlp/resources/Messages.properties: (ALACAMissingMainTitle)
+ * netx/net/sourceforge/jnlp/resources/Messages.properties: (ALACAMissingMainTitle)
added warning about possible consequences of resources out of docbase.
(ALACAMatchingMainTitle) the red higlights changed to green and added calming
words about it.
- *netx/net/sourceforge/jnlp/resources/Messages_cs.properties: same
- *netx/net/sourceforge/jnlp/resources/Messages_de.properties: same
+ * netx/net/sourceforge/jnlp/resources/Messages_cs.properties: same
+ * netx/net/sourceforge/jnlp/resources/Messages_de.properties: same
* netx/net/sourceforge/jnlp/resources/Messages_pl.properties: adapted to red
to green recoloring
* netx/net/sourceforge/jnlp/runtime/ManifestAttributesChecker.java:
diff -r ee5e2cb91774 -r c9befa549f63 netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletActionTableModel.java
--- a/netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletActionTableModel.java Tue Sep 01 14:52:24 2015 +0200
+++ b/netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletActionTableModel.java Wed Sep 02 19:00:46 2015 +0200
@@ -142,12 +142,12 @@
public void addRow() {
int i = getRowCount()-1;
- String s = "\\Qhttp://localhost:80/\\E.*";
+ String s = "http://localhost:80/";
back.add(new UnsignedAppletActionEntry(
new AppletSecurityActions(),
new Date(),
- new UrlRegEx(s),
- new UrlRegEx(s),
+ UrlRegEx.quoteAndStar(s),
+ UrlRegEx.quoteAndStar(s),
null));
fireTableRowsInserted(i+1, i+1);
}
diff -r ee5e2cb91774 -r c9befa549f63 netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletsTrustingListPanel.java
--- a/netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletsTrustingListPanel.java Tue Sep 01 14:52:24 2015 +0200
+++ b/netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletsTrustingListPanel.java Wed Sep 02 19:00:46 2015 +0200
@@ -629,7 +629,7 @@
JOptionPane.showMessageDialog(this, Translator.R("APPEXTSECguiPanelTableValid"));
} catch (Exception ex) {
OutputController.getLogger().log(OutputController.Level.ERROR_ALL, ex);
- JOptionPane.showMessageDialog(this, Translator.R("APPEXTSECguiPanelTableInvalid ", ex.toString()));
+ JOptionPane.showMessageDialog(this, Translator.R("APPEXTSECguiPanelTableInvalid", ex.toString()));
} finally {
f.delete();
}
@@ -820,7 +820,7 @@
private MyTextField(UrlRegEx urlRegEx) {
if (urlRegEx == null) {
- keeper = new UrlRegEx("");
+ keeper = UrlRegEx.exact("");
} else {
this.keeper = urlRegEx;
}
@@ -839,7 +839,7 @@
private UrlRegexCellRenderer(UrlRegEx urlRegEx) {
if (urlRegEx == null) {
- keeper = new UrlRegEx("");
+ keeper = UrlRegEx.exact("");
} else {
this.keeper = urlRegEx;
}
diff -r ee5e2cb91774 -r c9befa549f63 netx/net/sourceforge/jnlp/runtime/HtmlBoot.java
--- a/netx/net/sourceforge/jnlp/runtime/HtmlBoot.java Tue Sep 01 14:52:24 2015 +0200
+++ b/netx/net/sourceforge/jnlp/runtime/HtmlBoot.java Wed Sep 02 19:00:46 2015 +0200
@@ -132,7 +132,7 @@
try {
OutputController.getLogger().log("Proceeding with html");
final URL html = Boot.getFileLocation();
- AppletExtractor axe = new AppletExtractor(html);
+ AppletExtractor axe = new AppletExtractor(html, settings);
AppletsFilter filtered = new AppletsFilter(axe.findAppletsOnPage(), html, vars.subList(1, vars.size()));
List<AppletParser> applets = filtered.getApplets();
// this hack was needed in early phases of the patch. Now it sees to be not neede. Keeping inside to remove after much more testing
diff -r ee5e2cb91774 -r c9befa549f63 netx/net/sourceforge/jnlp/runtime/html/AppletExtractor.java
--- a/netx/net/sourceforge/jnlp/runtime/html/AppletExtractor.java Tue Sep 01 14:52:24 2015 +0200
+++ b/netx/net/sourceforge/jnlp/runtime/html/AppletExtractor.java Wed Sep 02 19:00:46 2015 +0200
@@ -45,7 +45,9 @@
import javax.xml.parsers.DocumentBuilderFactory;
import javax.xml.parsers.ParserConfigurationException;
import net.sourceforge.jnlp.JNLPFile;
+import net.sourceforge.jnlp.OptionsDefinitions;
import net.sourceforge.jnlp.Parser;
+import net.sourceforge.jnlp.ParserSettings;
import net.sourceforge.jnlp.cache.UpdatePolicy;
import net.sourceforge.jnlp.runtime.JNLPRuntime;
import net.sourceforge.jnlp.util.logging.OutputController;
@@ -68,10 +70,15 @@
"applet", "APPLET", "Applet",
"object", "OBJECT", "Object",
"embed", "EMBED", "Embed"};
+ private final ParserSettings ps;
public AppletExtractor(URL html) {
+ this(html, null);
+ }
+ public AppletExtractor(URL html, ParserSettings ps) {
JNLPRuntime.saveHistory(html.toExternalForm());
this.html = html;
+ this.ps = ps;
}
public URL getHtml() {
@@ -80,9 +87,13 @@
private InputStream cleanStreamIfPossible(InputStream is) {
try {
- Class<?> klass = Class.forName(Parser.MALFORMED_PARSER_CLASS);
- Method m = klass.getMethod("xmlizeInputStream", InputStream.class);
- return (InputStream) m.invoke(null, is);
+ if (ps != null && ps.isMalformedXmlAllowed()){
+ Class<?> klass = Class.forName(Parser.MALFORMED_PARSER_CLASS);
+ Method m = klass.getMethod("xmlizeInputStream", InputStream.class);
+ return (InputStream) m.invoke(null, is);
+ } else {
+ OutputController.getLogger().log(OutputController.Level.WARNING_DEBUG, "Tagsoup's html2xml cleaning is Disabled. Remove "+OptionsDefinitions.OPTIONS.XML.option+". Parsing will probably fail.");
+ }
} catch (Exception ex) {
OutputController.getLogger().log(OutputController.Level.WARNING_DEBUG, "Tagsoup's html2xml cleaning not loaded. Install tagsoup. Parsing will probably fail.");
OutputController.getLogger().log(ex);
diff -r ee5e2cb91774 -r c9befa549f63 netx/net/sourceforge/jnlp/security/appletextendedsecurity/InvalidLineException.java
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/InvalidLineException.java Wed Sep 02 19:00:46 2015 +0200
@@ -0,0 +1,47 @@
+/*
+ Copyright (C) 2015 Red Hat, Inc.
+
+ This file is part of IcedTea.
+
+ IcedTea is free software; you can redistribute it and/or
+ modify it under the terms of the GNU General Public License as published by
+ the Free Software Foundation, version 2.
+
+ IcedTea is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with IcedTea; see the file COPYING. If not, write to
+ the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
+ 02110-1301 USA.
+
+ Linking this library statically or dynamically with other modules is
+ making a combined work based on this library. Thus, the terms and
+ conditions of the GNU General Public License cover the whole
+ combination.
+
+ As a special exception, the copyright holders of this library give you
+ permission to link this library with independent modules to produce an
+ executable, regardless of the license terms of these independent
+ modules, and to copy and distribute the resulting executable under
+ terms of your choice, provided that you also meet, for each linked
+ independent module, the terms and conditions of the license of that
+ module. An independent module is a module which is not derived from
+ or based on this library. If you modify this library, you may extend
+ this exception to your version of the library, but you are not
+ obligated to do so. If you do not wish to do so, delete this
+ exception statement from your version.
+ */
+
+package net.sourceforge.jnlp.security.appletextendedsecurity;
+
+
+public class InvalidLineException extends RuntimeException {
+
+ public InvalidLineException(String s) {
+ super(s);
+ }
+
+}
diff -r ee5e2cb91774 -r c9befa549f63 netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java
--- a/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java Tue Sep 01 14:52:24 2015 +0200
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java Wed Sep 02 19:00:46 2015 +0200
@@ -62,11 +62,11 @@
UnsignedAppletActionEntry nw = new UnsignedAppletActionEntry(
AppletSecurityActions.fromString(split[0]),
new Date(new Long(split[1])),
- new UrlRegEx(split[2]),
+ UrlRegEx.exact(split[2]),
null,
null);
if (split.length > 3) {
- nw.setCodeBase(new UrlRegEx(split[3]));
+ nw.setCodeBase(UrlRegEx.exact(split[3]));
}
if (split.length > 4) {
nw.setArchives(createArchivesList(s.substring(s.lastIndexOf(split[3]) + split[3].length()).trim()));
@@ -93,12 +93,16 @@
bw.write(this.serializeToReadableAndParseableString());
}
- private String serializeToReadableAndParseableString() {
- return appletSecurityActions.toString()
+ private String serializeToReadableAndParseableString() throws InvalidLineException {
+ String s = appletSecurityActions.toString()
+ " " + ((timeStamp == null) ? "1" : timeStamp.getTime())
+ " " + ((documentBase == null) ? "" : documentBase.getRegEx())
+ " " + ((codeBase == null) ? "" : codeBase.getRegEx())
+ " " + createArchivesString(archives);
+ if (s.contains("\n") || s.contains("\r") || s.contains("\f")){
+ throw new InvalidLineException("Cant write line with \\n, \\r or \\f");
+ }
+ return s;
}
public Date getTimeStamp() {
diff -r ee5e2cb91774 -r c9befa549f63 netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java
--- a/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java Tue Sep 01 14:52:24 2015 +0200
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java Wed Sep 02 19:00:46 2015 +0200
@@ -150,13 +150,13 @@
if (rememberForCodeBase != null) {
- codebaseRegex = new UrlRegEx("\\Q" + codebase + "\\E");
+ codebaseRegex = UrlRegEx.quote(codebase.toExternalForm());
if (!rememberForCodeBase) {
- documentbaseRegex = new UrlRegEx("\\Q" + documentbase + "\\E"); // Match only this applet
+ documentbaseRegex = UrlRegEx.quote(documentbase.toExternalForm()); // Match only this applet
archiveMatches = toRelativePaths(getJars(file), file.getCodeBase().toString()); // Match only this applet
} else {
- documentbaseRegex = new UrlRegEx("\\Q" + stripFile(documentbase)+ "\\E.*"); // Match any from codebase and sourceFile "base"
+ documentbaseRegex = UrlRegEx.quoteAndStar(stripFile(documentbase)); // Match any from codebase and sourceFile "base"
}
}
diff -r ee5e2cb91774 -r c9befa549f63 netx/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegEx.java
--- a/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegEx.java Tue Sep 01 14:52:24 2015 +0200
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegEx.java Wed Sep 02 19:00:46 2015 +0200
@@ -35,11 +35,29 @@
*/
package net.sourceforge.jnlp.security.appletextendedsecurity;
+import java.util.regex.Pattern;
+
public class UrlRegEx {
- String regEx;
+ private static String quoteString(String s) {
+ return Pattern.quote(s);
+ }
- public UrlRegEx(String s) {
+ private final String regEx;
+
+ public static UrlRegEx quote(String s) {
+ return new UrlRegEx(quoteString(s));
+ }
+
+ public static UrlRegEx quoteAndStar(String s) {
+ return new UrlRegEx(quoteString(s)+".*");
+ }
+
+ public static UrlRegEx exact(String s) {
+ return new UrlRegEx(s);
+ }
+
+ private UrlRegEx(String s) {
regEx = s;
}
@@ -52,11 +70,60 @@
return regEx;
}
+ /**
+ * Just cosmetic method to show nicer tables, as \Qsomething\Emaybe is most
+ * common record when cell is edited, the regex is shown fully
+ *
+ * @return unquted pattern or original string
+ */
public String getFilteredRegEx() {
- return regEx.replaceAll("\\\\Q", "").replaceAll("\\\\E", "");
+ try {
+ return simpleUnquote(regEx);
+ } catch (Exception ex) {
+ return regEx;
+ }
}
- public void setRegEx(String regEx) {
- this.regEx = regEx;
+ //needs testing
+ static String replaceLast(String where, String what, String by) {
+ if (!where.contains(what)) {
+ return where;
+ }
+ StringBuilder b = new StringBuilder(where);
+ b.replace(where.lastIndexOf(what), where.lastIndexOf(what)+what.length(), by);
+ return b.toString();
+ }
+
+ //needs testing
+ static String simpleUnquote(String s) {
+ //escaped run needs at least \E\Q, but only single char actually hurts
+ if (s.length()<=1){
+ return s;
+ }
+ boolean in = false;
+ for(int i = 1 ; i < s.length() ; i++){
+ if ( i == 0) {
+ continue;
+ }
+ if (!in && s.charAt(i) == 'Q' && s.charAt(i-1) == '\\'){
+ in = true;
+ String s1=s.substring(0, i - 1);
+ String s2=s.substring(i + 1);
+ s= s1+s2;
+ i = i - 2;
+ continue;
+ }
+ if (in && s.charAt(i) == 'E' && s.charAt(i-1) == '\\'){
+ String s1=s.substring(0, i - 1);
+ String s2=s.substring(i + 1);
+ s= s1+s2;
+ i = i - 2;
+ in = false;
+ continue;
+ }
+ }
+ //all text\Etext were replaced \Qtext\E\\E\Qtext\E
+ //after above text\\Etext should remain
+ return s.replace("\\\\E", "\\E");
}
}
diff -r ee5e2cb91774 -r c9befa549f63 netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageExtendedImpl.java
--- a/netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageExtendedImpl.java Tue Sep 01 14:52:24 2015 +0200
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageExtendedImpl.java Wed Sep 02 19:00:46 2015 +0200
@@ -170,10 +170,10 @@
source.setTimeStamp((Date) aValue);
}
if (columnIndex == 2) {
- source.setDocumentBase(new UrlRegEx((String) aValue));
+ source.setDocumentBase(UrlRegEx.exact((String) aValue));
}
if (columnIndex == 3) {
- source.setCodeBase(new UrlRegEx((String) aValue));
+ source.setCodeBase(UrlRegEx.exact((String) aValue));
}
if (columnIndex == 4) {
source.setArchives(UnsignedAppletActionEntry.createArchivesList((String) aValue));
diff -r ee5e2cb91774 -r c9befa549f63 netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java
--- a/netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java Tue Sep 01 14:52:24 2015 +0200
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java Wed Sep 02 19:00:46 2015 +0200
@@ -41,12 +41,15 @@
import java.util.ArrayList;
import java.util.Collections;
import java.util.List;
+import java.util.regex.PatternSyntaxException;
+import net.sourceforge.jnlp.security.appletextendedsecurity.InvalidLineException;
import net.sourceforge.jnlp.security.appletextendedsecurity.UnsignedAppletActionEntry;
import net.sourceforge.jnlp.security.appletextendedsecurity.UnsignedAppletActionStorage;
import net.sourceforge.jnlp.security.dialogs.remember.ExecuteAppletAction;
import net.sourceforge.jnlp.security.dialogs.remember.RememberableDialog;
import net.sourceforge.jnlp.util.lockingfile.LockingReaderWriter;
import net.sourceforge.jnlp.util.lockingfile.StorageIoException;
+import net.sourceforge.jnlp.util.logging.OutputController;
public class UnsignedAppletActionStorageImpl extends LockingReaderWriter implements UnsignedAppletActionStorage {
@@ -73,7 +76,7 @@
@Override
protected void readContents() throws IOException {
if (items == null) {
- items = new ArrayList<UnsignedAppletActionEntry>();
+ items = new ArrayList<>();
} else {
items.clear();
}
@@ -90,8 +93,12 @@
@Override
public void writeContent(BufferedWriter bw) throws IOException {
for (UnsignedAppletActionEntry item : items) {
- item.write(bw);
- bw.newLine();
+ try{
+ item.write(bw);
+ bw.newLine();
+ }catch (InvalidLineException ex){
+ OutputController.getLogger().log(ex);
+ }
}
}
@@ -177,21 +184,26 @@
}
private boolean isMatching(UnsignedAppletActionEntry unsignedAppletActionEntry, String documentBase, String codeBase, List<String> archives) {
- boolean result = true;
- if (documentBase != null && !documentBase.trim().isEmpty()) {
- result = result && documentBase.matches(unsignedAppletActionEntry.getDocumentBase().getRegEx());
+ try {
+ boolean result = true;
+ if (documentBase != null && !documentBase.trim().isEmpty()) {
+ result = result && documentBase.matches(unsignedAppletActionEntry.getDocumentBase().getRegEx());
+ }
+ if (codeBase != null && !codeBase.trim().isEmpty()) {
+ result = result && codeBase.matches(unsignedAppletActionEntry.getCodeBase().getRegEx());
+ }
+ if (archives != null) {
+ List<String> saved = unsignedAppletActionEntry.getArchives();
+ if (saved == null || saved.isEmpty()) {
+ return result;
+ }
+ result = result && compareArchives(archives, saved);
+ }
+ return result;
+ } catch (PatternSyntaxException ex) {
+ OutputController.getLogger().log(OutputController.Level.WARNING_ALL, ex);
+ return false;
}
- if (codeBase != null && !codeBase.trim().isEmpty()) {
- result = result && codeBase.matches(unsignedAppletActionEntry.getCodeBase().getRegEx());
- }
- if (archives != null) {
- List<String> saved = unsignedAppletActionEntry.getArchives();
- if (saved == null || saved.isEmpty()) {
- return result;
- }
- result = result && compareArchives(archives, saved);
- }
- return result;
}
@Override
diff -r ee5e2cb91774 -r c9befa549f63 tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmationTest.java
--- a/tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmationTest.java Tue Sep 01 14:52:24 2015 +0200
+++ b/tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmationTest.java Wed Sep 02 19:00:46 2015 +0200
@@ -36,6 +36,8 @@
package net.sourceforge.jnlp.security.appletextendedsecurity;
import java.io.File;
+import java.io.IOException;
+import java.io.StringReader;
import java.lang.reflect.Field;
import java.lang.reflect.Modifier;
import java.net.MalformedURLException;
@@ -43,15 +45,19 @@
import static org.junit.Assert.assertEquals;
import java.util.Arrays;
+import java.util.List;
More information about the distro-pkg-dev
mailing list