/hg/release/icedtea-web-1.5: 4 new changesets
jvanek at icedtea.classpath.org
jvanek at icedtea.classpath.org
Tue Sep 8 15:12:11 UTC 2015
changeset b668c06dcb36 in /hg/release/icedtea-web-1.5
details: http://icedtea.classpath.org/hg/release/icedtea-web-1.5?cmd=changeset;node=b668c06dcb36
author: Jiri Vanek <jvanek at redhat.com>
date: Tue Sep 08 15:24:32 2015 +0200
Saving of status of dialogs for "whole codebase" now includes also document base
changeset b3779eedeef1 in /hg/release/icedtea-web-1.5
details: http://icedtea.classpath.org/hg/release/icedtea-web-1.5?cmd=changeset;node=b3779eedeef1
author: Jiri Vanek <jvanek at redhat.com>
date: Tue Sep 08 16:01:10 2015 +0200
Newline characters are banned from saving to .appletTrustSettings
changeset 4f9c4a81d775 in /hg/release/icedtea-web-1.5
details: http://icedtea.classpath.org/hg/release/icedtea-web-1.5?cmd=changeset;node=4f9c4a81d775
author: Jiri Vanek <jvanek at redhat.com>
date: Tue Sep 08 16:12:32 2015 +0200
All UrlRegEx-es got unified and correct quoting
changeset 14c84c250e84 in /hg/release/icedtea-web-1.5
details: http://icedtea.classpath.org/hg/release/icedtea-web-1.5?cmd=changeset;node=14c84c250e84
author: Jiri Vanek <jvanek at redhat.com>
date: Tue Sep 08 17:11:35 2015 +0200
Added identificator to .appletTrustSettings to specify version of file
diffstat:
ChangeLog | 85 ++
netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletActionTableModel.java | 6 +-
netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletsTrustingListPanel.java | 6 +-
netx/net/sourceforge/jnlp/security/appletextendedsecurity/InvalidLineException.java | 47 +
netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java | 12 +-
netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java | 53 +-
netx/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegEx.java | 77 ++-
netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageExtendedImpl.java | 4 +-
netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java | 115 ++-
netx/net/sourceforge/jnlp/util/UrlUtils.java | 4 +-
tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmationTest.java | 286 ++++++++
tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegExTest.java | 184 +++++
tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImplTest.java | 8 +-
tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/impl/VersionRestrictionTest.java | 338 ++++++++++
tests/reproducers/simple/FakeCodebase/resources/FakeCodebase.html.in | 44 +
tests/reproducers/simple/FakeCodebase/resources/FakeCodebase.jnlp.in | 14 +
tests/reproducers/simple/FakeCodebase/resources/OriginalCodebase.html | 44 +
tests/reproducers/simple/FakeCodebase/resources/OriginalCodebase.jnlp | 14 +
tests/reproducers/simple/FakeCodebase/srcs/FakeCodebase.java | 55 +
tests/reproducers/simple/FakeCodebase/testcases/FakeCodebaseTests.java | 161 ++++
tests/reproducers/simple/UnicodeLineBreak/resources/UnicodeLineBreak.html | 44 +
tests/reproducers/simple/UnicodeLineBreak/srcs/UnicodeLineBreak.java | 47 +
tests/reproducers/simple/UnicodeLineBreak/testcases/UnicodeLineBreakTests.java | 105 +++
tests/test-extensions/net/sourceforge/jnlp/mock/DummyJNLPFileWithJar.java | 36 +-
24 files changed, 1729 insertions(+), 60 deletions(-)
diffs (truncated from 2099 to 500 lines):
diff -r f45e2b0ee174 -r 14c84c250e84 ChangeLog
--- a/ChangeLog Tue Sep 08 15:02:10 2015 +0200
+++ b/ChangeLog Tue Sep 08 17:11:35 2015 +0200
@@ -1,3 +1,88 @@
+2015-09-03 Jiri Vanek <jvanek at redhat.com>
+
+ Fixed ArrayIndexOutOfBound in version cornercase issue
+ * netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java:
+ length of array is checked,
+ * tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/impl/VersionRestrictionTest.java:
+ added tests for this case
+ * tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImplTest.java:
+ (updateAppletActionTest1) adapted to version string
+
+2015-09-03 Jiri Vanek <jvanek at redhat.com>
+
+ Added identificator to .appletTrustSettings to specify version of file
+ * netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java:
+ added handling of version - readVersion, versionPreffix, backup, currentVersion.
+ (readLine) when first line is read, it is checked for version and acted. If
+ loaded version is missing or older then current 2, then file is not loaded.
+ otherwise normal loading. (writeContent) now inserts header with version.
+ (actOnVersionLoad) new method, handling consequences of recognized x current version
+ (backupOldFile) new method, backuping old file as .appletTrustSettings.version-backup
+ * netx/net/sourceforge/jnlp/util/UrlUtils.java: consumed exception during
+ normalization is logged only to console/verbose
+ * tests/netx/unit/net/sourceforge/jnlp/security/SecurityDialogsTest.java:
+ added considering of version
+ * tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/impl/LegacyUnsignedAppletActionStorageImplTest.java:
+ same
+ * tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImplTest.java:
+ same
+ * tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/impl/VersionRestrictionTest.java:
+ new test file testing version recognition and processing
+
+2015-09-02 Jiri Vanek <jvanek at redhat.com>
+
+ All UrlRegEx-es got unified and correct quoting
+ * netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletActionTableModel.java:
+ (addRow) now uses factory methods of quoteAndStar form UrlRegEx
+ * netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletsTrustingListPanel.java:
+ same, but of exact. Removed redundant space in APPEXTSECguiPanelTableInvalid key
+ * netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java:
+ same of exact.
+ * netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java:
+ same
+ * netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageExtendedImpl.java:
+ same
+ * netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java:
+ same
+ * netx/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegEx.java:
+ constructor made private, field final. Creation allowed over factory methods of
+ quote. quoteAndStar, exact. Added and iprved mehtods for visualisation
+ * tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegExTest.java:
+ new test file with tests to new methods in UrlRegex
+
+2015-09-02 Jiri Vanek <jvanek at redhat.com>
+
+ Newline characters are banned from saving to .appletTrustSettings
+ * netx/net/sourceforge/jnlp/security/appletextendedsecurity/InvalidLineException.java:
+ New file. Exception to be specially handled if error appear in saved line.
+ * netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java:
+ (serializeToReadableAndParseableString) if new-line appear in line,
+ InvalidLineException is thrown
+ * netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java:
+ (writeContent) InvalidLineException is expected and logged.
+ * tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmationTest.java:
+ adapted and quite a lot of tests added.
+ * tests/reproducers/simple/UnicodeLineBreak/resources/UnicodeLineBreak.java:
+ * tests/reproducers/simple/UnicodeLineBreak/srcs/UnicodeLineBreak.java:
+ * tests/reproducers/simple/UnicodeLineBreak/testcases/UnicodeLineBreakTests.java:
+ half automated reproducer of this behavior
+
+2015-09-01 Jiri Vanek <jvanek at redhat.com>
+
+ Saving of status of dialogs for "whole codebase" now includes also document base
+ * netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java:
+ (updateAppletAction) now saves base of docbase instead of .* "for remember for codebase"
+ stripFile - new method, ensuring docbase do not contains file
+ * tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmationTest.java:
+ added testSripFile unit test for new method
+ * tests/reproducers/simple/FakeCodebase/resources/FakeCodebase.html.in:
+ * tests/reproducers/simple/FakeCodebase/resources/FakeCodebase.jnlp.in:
+ * tests/reproducers/simple/FakeCodebase/resources/OriginalCodebase.html:
+ * tests/reproducers/simple/FakeCodebase/resources/OriginalCodebase.jnlp:
+ * tests/reproducers/simple/FakeCodebase/srcs/FakeCodebase.java:
+ * tests/reproducers/simple/FakeCodebase/testcases/FakeCodebaseTests.java:
+ Reproducer of this behavior
+
2015-09-01 Jiri Vanek <jvanek at redhat.com>
application-library-allowable-codebase dialog made available for unsigned apps
diff -r f45e2b0ee174 -r 14c84c250e84 netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletActionTableModel.java
--- a/netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletActionTableModel.java Tue Sep 08 15:02:10 2015 +0200
+++ b/netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletActionTableModel.java Tue Sep 08 17:11:35 2015 +0200
@@ -143,12 +143,12 @@
public void addRow() {
int i = getRowCount()-1;
- String s = "\\Qhttp://localhost:80/\\E.*";
+ String s = "http://localhost:80/";
back.add(new UnsignedAppletActionEntry(
ExecuteAppletAction.NEVER,
new Date(),
- new UrlRegEx(s),
- new UrlRegEx(s),
+ UrlRegEx.quoteAndStar(s),
+ UrlRegEx.quoteAndStar(s),
null));
fireTableRowsInserted(i+1, i+1);
}
diff -r f45e2b0ee174 -r 14c84c250e84 netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletsTrustingListPanel.java
--- a/netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletsTrustingListPanel.java Tue Sep 08 15:02:10 2015 +0200
+++ b/netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletsTrustingListPanel.java Tue Sep 08 17:11:35 2015 +0200
@@ -630,7 +630,7 @@
JOptionPane.showMessageDialog(this, Translator.R("APPEXTSECguiPanelTableValid"));
} catch (Exception ex) {
OutputController.getLogger().log(OutputController.Level.ERROR_ALL, ex);
- JOptionPane.showMessageDialog(this, Translator.R("APPEXTSECguiPanelTableInvalid ", ex.toString()));
+ JOptionPane.showMessageDialog(this, Translator.R("APPEXTSECguiPanelTableInvalid", ex.toString()));
} finally {
f.delete();
}
@@ -821,7 +821,7 @@
private MyTextField(UrlRegEx urlRegEx) {
if (urlRegEx == null) {
- keeper = new UrlRegEx("");
+ keeper = UrlRegEx.exact("");
} else {
this.keeper = urlRegEx;
}
@@ -840,7 +840,7 @@
private UrlRegexCellRenderer(UrlRegEx urlRegEx) {
if (urlRegEx == null) {
- keeper = new UrlRegEx("");
+ keeper = UrlRegEx.exact("");
} else {
this.keeper = urlRegEx;
}
diff -r f45e2b0ee174 -r 14c84c250e84 netx/net/sourceforge/jnlp/security/appletextendedsecurity/InvalidLineException.java
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/InvalidLineException.java Tue Sep 08 17:11:35 2015 +0200
@@ -0,0 +1,47 @@
+/*
+ Copyright (C) 2015 Red Hat, Inc.
+
+ This file is part of IcedTea.
+
+ IcedTea is free software; you can redistribute it and/or
+ modify it under the terms of the GNU General Public License as published by
+ the Free Software Foundation, version 2.
+
+ IcedTea is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with IcedTea; see the file COPYING. If not, write to
+ the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
+ 02110-1301 USA.
+
+ Linking this library statically or dynamically with other modules is
+ making a combined work based on this library. Thus, the terms and
+ conditions of the GNU General Public License cover the whole
+ combination.
+
+ As a special exception, the copyright holders of this library give you
+ permission to link this library with independent modules to produce an
+ executable, regardless of the license terms of these independent
+ modules, and to copy and distribute the resulting executable under
+ terms of your choice, provided that you also meet, for each linked
+ independent module, the terms and conditions of the license of that
+ module. An independent module is a module which is not derived from
+ or based on this library. If you modify this library, you may extend
+ this exception to your version of the library, but you are not
+ obligated to do so. If you do not wish to do so, delete this
+ exception statement from your version.
+ */
+
+package net.sourceforge.jnlp.security.appletextendedsecurity;
+
+
+public class InvalidLineException extends RuntimeException {
+
+ public InvalidLineException(String s) {
+ super(s);
+ }
+
+}
diff -r f45e2b0ee174 -r 14c84c250e84 netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java
--- a/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java Tue Sep 08 15:02:10 2015 +0200
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java Tue Sep 08 17:11:35 2015 +0200
@@ -54,11 +54,11 @@
UnsignedAppletActionEntry nw = new UnsignedAppletActionEntry(
ExecuteAppletAction.fromString(split[0]),
new Date(new Long(split[1])),
- new UrlRegEx(split[2]),
+ UrlRegEx.exact(split[2]),
null,
null);
if (split.length > 3) {
- nw.setCodeBase(new UrlRegEx(split[3]));
+ nw.setCodeBase(UrlRegEx.exact(split[3]));
}
if (split.length > 4) {
nw.setArchives(createArchivesList(s.substring(s.lastIndexOf(split[3]) + split[3].length()).trim()));
@@ -85,12 +85,16 @@
bw.write(this.serializeToReadableAndParseableString());
}
- private String serializeToReadableAndParseableString() {
- return unsignedAppletAction.toChar()
+ private String serializeToReadableAndParseableString() throws InvalidLineException {
+ String s = unsignedAppletAction.toChar()
+ " " + ((timeStamp == null) ? "1" : timeStamp.getTime())
+ " " + ((documentBase == null) ? "" : documentBase.getRegEx())
+ " " + ((codeBase == null) ? "" : codeBase.getRegEx())
+ " " + createArchivesString(archives);
+ if (s.contains("\n") || s.contains("\r") || s.contains("\f")){
+ throw new InvalidLineException("Cant write line with \\n, \\r or \\f");
+ }
+ return s;
}
public Date getTimeStamp() {
diff -r f45e2b0ee174 -r 14c84c250e84 netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java
--- a/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java Tue Sep 08 15:02:10 2015 +0200
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java Tue Sep 08 17:11:35 2015 +0200
@@ -36,6 +36,7 @@
package net.sourceforge.jnlp.security.appletextendedsecurity;
+import java.net.MalformedURLException;
import static net.sourceforge.jnlp.runtime.Translator.R;
import java.net.URL;
@@ -119,7 +120,7 @@
return fileNames;
}
- private static void updateAppletAction(JNLPFile file, ExecuteAppletAction behaviour, boolean rememberForCodeBase) {
+ public static void updateAppletAction(JNLPFile file, ExecuteAppletAction behaviour, boolean rememberForCodeBase) {
UnsignedAppletActionStorage userActionStorage = securitySettings.getUnsignedAppletActionCustomStorage();
userActionStorage.lock(); // We should ensure this operation is atomic
@@ -138,12 +139,12 @@
URL documentbase = UrlUtils.normalizeUrlAndStripParams(file.getSourceLocation(), true /* encode local files */);
/* Else, create a new entry */
- UrlRegEx codebaseRegex = new UrlRegEx("\\Q" + codebase + "\\E");
- UrlRegEx documentbaseRegex = new UrlRegEx(".*"); // Match any from codebase
+ UrlRegEx codebaseRegex = UrlRegEx.quote(codebase.toExternalForm());
+ UrlRegEx documentbaseRegex = UrlRegEx.quoteAndStar(stripFile(documentbase)); // Match any from codebase and sourceFile "base"
List<String> archiveMatches = null; // Match any from codebase
if (!rememberForCodeBase) {
- documentbaseRegex = new UrlRegEx("\\Q" + documentbase + "\\E"); // Match only this applet
+ documentbaseRegex = UrlRegEx.quote(documentbase.toExternalForm()); // Match only this applet
archiveMatches = toRelativePaths(getJars(file), file.getCodeBase().toString()); // Match only this applet
}
@@ -262,4 +263,48 @@
}
+ static String stripFile(URL documentbase) {
+ //whenused in generation of regec, the trailing slash is very important
+ //see the result between http:/some.url/path.* and http:/some.url/path/.*
+ return ensureSlashTail(stripFileImp(documentbase));
+ }
+
+ private static String stripFileImp(URL documentbase) {
+ try {
+ String normlaized = UrlUtils.normalizeUrlAndStripParams(documentbase).toExternalForm().trim();
+ if (normlaized.endsWith("/") || normlaized.endsWith("\\")) {
+ return normlaized;
+ }
+ URL middleway = new URL(normlaized);
+ String file = middleway.getFile();
+ int i = Math.max(file.lastIndexOf('/'), file.lastIndexOf('\\'));
+ if (i<0){
+ return normlaized;
+ }
+ String parent = file.substring(0, i+1);
+ String stripped = normlaized.replace(file, parent);
+ return stripped;
+ } catch (Exception ex) {
+ OutputController.getLogger().log(ex);
+ return documentbase.toExternalForm();
+ }
+
+ }
+
+ private static String ensureSlashTail(String s) {
+ if (s.endsWith("/")) {
+ return s;
+ }
+ if (s.endsWith("\\")) {
+ return s;
+ }
+ if (s.contains("/")) {
+ return s + "/";
+ }
+ if (s.contains("\\")) {
+ return s + "\\";
+ }
+ return s + "/";
+ }
+
}
\ No newline at end of file
diff -r f45e2b0ee174 -r 14c84c250e84 netx/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegEx.java
--- a/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegEx.java Tue Sep 08 15:02:10 2015 +0200
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegEx.java Tue Sep 08 17:11:35 2015 +0200
@@ -35,11 +35,29 @@
*/
package net.sourceforge.jnlp.security.appletextendedsecurity;
+import java.util.regex.Pattern;
+
public class UrlRegEx {
- String regEx;
+ private static String quoteString(String s) {
+ return Pattern.quote(s);
+ }
- public UrlRegEx(String s) {
+ private final String regEx;
+
+ public static UrlRegEx quote(String s) {
+ return new UrlRegEx(quoteString(s));
+ }
+
+ public static UrlRegEx quoteAndStar(String s) {
+ return new UrlRegEx(quoteString(s)+".*");
+ }
+
+ public static UrlRegEx exact(String s) {
+ return new UrlRegEx(s);
+ }
+
+ private UrlRegEx(String s) {
regEx = s;
}
@@ -52,11 +70,60 @@
return regEx;
}
+ /**
+ * Just cosmetic method to show nicer tables, as \Qsomething\Emaybe is most
+ * common record when cell is edited, the regex is shown fully
+ *
+ * @return unquted pattern or original string
+ */
public String getFilteredRegEx() {
- return regEx.replaceAll("\\\\Q", "").replaceAll("\\\\E", "");
+ try {
+ return simpleUnquote(regEx);
+ } catch (Exception ex) {
+ return regEx;
+ }
}
- public void setRegEx(String regEx) {
- this.regEx = regEx;
+ //needs testing
+ static String replaceLast(String where, String what, String by) {
+ if (!where.contains(what)) {
+ return where;
+ }
+ StringBuilder b = new StringBuilder(where);
+ b.replace(where.lastIndexOf(what), where.lastIndexOf(what)+what.length(), by);
+ return b.toString();
+ }
+
+ //needs testing
+ static String simpleUnquote(String s) {
+ //escaped run needs at least \E\Q, but only single char actually hurts
+ if (s.length()<=1){
+ return s;
+ }
+ boolean in = false;
+ for(int i = 1 ; i < s.length() ; i++){
+ if ( i == 0) {
+ continue;
+ }
+ if (!in && s.charAt(i) == 'Q' && s.charAt(i-1) == '\\'){
+ in = true;
+ String s1=s.substring(0, i - 1);
+ String s2=s.substring(i + 1);
+ s= s1+s2;
+ i = i - 2;
+ continue;
+ }
+ if (in && s.charAt(i) == 'E' && s.charAt(i-1) == '\\'){
+ String s1=s.substring(0, i - 1);
+ String s2=s.substring(i + 1);
+ s= s1+s2;
+ i = i - 2;
+ in = false;
+ continue;
+ }
+ }
+ //all text\Etext were replaced \Qtext\E\\E\Qtext\E
+ //after above text\\Etext should remain
+ return s.replace("\\\\E", "\\E");
}
}
diff -r f45e2b0ee174 -r 14c84c250e84 netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageExtendedImpl.java
--- a/netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageExtendedImpl.java Tue Sep 08 15:02:10 2015 +0200
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageExtendedImpl.java Tue Sep 08 17:11:35 2015 +0200
@@ -162,10 +162,10 @@
source.setTimeStamp((Date) aValue);
}
if (columnIndex == 2) {
- source.setDocumentBase(new UrlRegEx((String) aValue));
+ source.setDocumentBase(UrlRegEx.exact((String) aValue));
}
if (columnIndex == 3) {
- source.setCodeBase(new UrlRegEx((String) aValue));
+ source.setCodeBase(UrlRegEx.exact((String) aValue));
}
if (columnIndex == 4) {
source.setArchives(UnsignedAppletActionEntry.createArchivesList((String) aValue));
diff -r f45e2b0ee174 -r 14c84c250e84 netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java
--- a/netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java Tue Sep 08 15:02:10 2015 +0200
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java Tue Sep 08 17:11:35 2015 +0200
@@ -41,19 +41,25 @@
import java.util.ArrayList;
import java.util.Collections;
import java.util.List;
+import java.util.regex.PatternSyntaxException;
+import net.sourceforge.jnlp.security.appletextendedsecurity.InvalidLineException;
import net.sourceforge.jnlp.security.appletextendedsecurity.ExecuteAppletAction;
import net.sourceforge.jnlp.security.appletextendedsecurity.UnsignedAppletActionEntry;
import net.sourceforge.jnlp.security.appletextendedsecurity.UnsignedAppletActionStorage;
+import net.sourceforge.jnlp.util.FileUtils;
import net.sourceforge.jnlp.util.lockingfile.LockingReaderWriter;
import net.sourceforge.jnlp.util.lockingfile.StorageIoException;
+import net.sourceforge.jnlp.util.logging.OutputController;
public class UnsignedAppletActionStorageImpl extends LockingReaderWriter implements UnsignedAppletActionStorage {
protected List<UnsignedAppletActionEntry> items;
-
- public UnsignedAppletActionStorageImpl(String location) {
- this(new File(location));
- }
+ private String readVersion = null;
+ public static final String versionPreffix="#VERSION ";
+ public static final String BACKUP_SUFFIX = "-backup";
+ public static final int currentVersion = 2;
+ private int lineCounter = 0;
+ private boolean loadingDisabled = false;
public UnsignedAppletActionStorageImpl(File location) {
super(location);
@@ -82,15 +88,36 @@
@Override
protected void readLine(String line) {
if (line.trim().length() != 0) {
- this.items.add(UnsignedAppletActionEntry.createFromString(line));
+ lineCounter++;
+ if (line.startsWith(versionPreffix) && line.trim().split("\\s+").length > 1) {
+ if (readVersion == null) {
+ readVersion = line.trim();
+ actOnVersionLoad();
+ }
+ } else {
+ if (lineCounter>0 && readVersion == null){
+ actOnNoVersionLoad();
+ }
+ if (!loadingDisabled) {
+ this.items.add(UnsignedAppletActionEntry.createFromString(line));
+ }
+ }
}
}
@Override
public void writeContent(BufferedWriter bw) throws IOException {
+ lineCounter = 0;
+ readVersion = null;
+ bw.write(versionPreffix + currentVersion + " - note, do not edit or modify this line. It may cause removal of this file.");
+ bw.newLine();
for (UnsignedAppletActionEntry item : items) {
- item.write(bw);
- bw.newLine();
+ try{
+ item.write(bw);
+ bw.newLine();
+ }catch (InvalidLineException ex){
+ OutputController.getLogger().log(ex);
+ }
}
More information about the distro-pkg-dev
mailing list