/hg/release/icedtea-web-1.5: 4 new changesets

jvanek at icedtea.classpath.org jvanek at icedtea.classpath.org
Tue Sep 8 15:12:11 UTC 2015


changeset b668c06dcb36 in /hg/release/icedtea-web-1.5
details: http://icedtea.classpath.org/hg/release/icedtea-web-1.5?cmd=changeset;node=b668c06dcb36
author: Jiri Vanek <jvanek at redhat.com>
date: Tue Sep 08 15:24:32 2015 +0200

	Saving of status of dialogs for "whole codebase" now includes also document base


changeset b3779eedeef1 in /hg/release/icedtea-web-1.5
details: http://icedtea.classpath.org/hg/release/icedtea-web-1.5?cmd=changeset;node=b3779eedeef1
author: Jiri Vanek <jvanek at redhat.com>
date: Tue Sep 08 16:01:10 2015 +0200

	Newline characters are banned from saving to .appletTrustSettings


changeset 4f9c4a81d775 in /hg/release/icedtea-web-1.5
details: http://icedtea.classpath.org/hg/release/icedtea-web-1.5?cmd=changeset;node=4f9c4a81d775
author: Jiri Vanek <jvanek at redhat.com>
date: Tue Sep 08 16:12:32 2015 +0200

	All UrlRegEx-es got unified and correct quoting


changeset 14c84c250e84 in /hg/release/icedtea-web-1.5
details: http://icedtea.classpath.org/hg/release/icedtea-web-1.5?cmd=changeset;node=14c84c250e84
author: Jiri Vanek <jvanek at redhat.com>
date: Tue Sep 08 17:11:35 2015 +0200

	Added identificator to .appletTrustSettings to specify version of file


diffstat:

 ChangeLog                                                                                                          |   85 ++
 netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletActionTableModel.java                                         |    6 +-
 netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletsTrustingListPanel.java                                       |    6 +-
 netx/net/sourceforge/jnlp/security/appletextendedsecurity/InvalidLineException.java                                |   47 +
 netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java                           |   12 +-
 netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java                     |   53 +-
 netx/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegEx.java                                            |   77 ++-
 netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageExtendedImpl.java        |    4 +-
 netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java                |  115 ++-
 netx/net/sourceforge/jnlp/util/UrlUtils.java                                                                       |    4 +-
 tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmationTest.java      |  286 ++++++++
 tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegExTest.java                             |  184 +++++
 tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImplTest.java |    8 +-
 tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/impl/VersionRestrictionTest.java              |  338 ++++++++++
 tests/reproducers/simple/FakeCodebase/resources/FakeCodebase.html.in                                               |   44 +
 tests/reproducers/simple/FakeCodebase/resources/FakeCodebase.jnlp.in                                               |   14 +
 tests/reproducers/simple/FakeCodebase/resources/OriginalCodebase.html                                              |   44 +
 tests/reproducers/simple/FakeCodebase/resources/OriginalCodebase.jnlp                                              |   14 +
 tests/reproducers/simple/FakeCodebase/srcs/FakeCodebase.java                                                       |   55 +
 tests/reproducers/simple/FakeCodebase/testcases/FakeCodebaseTests.java                                             |  161 ++++
 tests/reproducers/simple/UnicodeLineBreak/resources/UnicodeLineBreak.html                                          |   44 +
 tests/reproducers/simple/UnicodeLineBreak/srcs/UnicodeLineBreak.java                                               |   47 +
 tests/reproducers/simple/UnicodeLineBreak/testcases/UnicodeLineBreakTests.java                                     |  105 +++
 tests/test-extensions/net/sourceforge/jnlp/mock/DummyJNLPFileWithJar.java                                          |   36 +-
 24 files changed, 1729 insertions(+), 60 deletions(-)

diffs (truncated from 2099 to 500 lines):

diff -r f45e2b0ee174 -r 14c84c250e84 ChangeLog
--- a/ChangeLog	Tue Sep 08 15:02:10 2015 +0200
+++ b/ChangeLog	Tue Sep 08 17:11:35 2015 +0200
@@ -1,3 +1,88 @@
+2015-09-03  Jiri Vanek  <jvanek at redhat.com>
+
+	Fixed ArrayIndexOutOfBound in version cornercase issue
+	* netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java:
+	length of array is checked,
+	* tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/impl/VersionRestrictionTest.java:
+	added tests for this case
+	* tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImplTest.java:
+	(updateAppletActionTest1) adapted to version string
+
+2015-09-03  Jiri Vanek  <jvanek at redhat.com>
+
+	Added identificator to .appletTrustSettings to specify version of file
+	* netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java:
+	added handling of version - readVersion, versionPreffix, backup, currentVersion.
+	(readLine) when first line is read, it is checked for version and acted. If
+	loaded version is missing or older then current 2, then file is  not loaded.
+	otherwise normal loading. (writeContent) now inserts  header with version.
+	(actOnVersionLoad) new method, handling consequences of recognized x current version
+	(backupOldFile) new method, backuping old file as .appletTrustSettings.version-backup
+	* netx/net/sourceforge/jnlp/util/UrlUtils.java: consumed exception during
+	normalization is logged only to console/verbose
+	* tests/netx/unit/net/sourceforge/jnlp/security/SecurityDialogsTest.java:
+	added considering of version
+	* tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/impl/LegacyUnsignedAppletActionStorageImplTest.java:
+	same
+	* tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImplTest.java:
+	same
+	* tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/impl/VersionRestrictionTest.java:
+	new test file testing version recognition and processing
+
+2015-09-02  Jiri Vanek  <jvanek at redhat.com>
+
+	All UrlRegEx-es got unified and correct quoting
+	* netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletActionTableModel.java:
+	(addRow) now uses factory methods of quoteAndStar form UrlRegEx
+	* netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletsTrustingListPanel.java:
+	same, but of exact. Removed redundant space in APPEXTSECguiPanelTableInvalid key
+	* netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java:
+	same of exact.
+	* netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java:
+	same
+	* netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageExtendedImpl.java:
+	same
+	* netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java:
+	same
+	* netx/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegEx.java:
+	constructor made private,  field final. Creation allowed over factory methods of
+	quote. quoteAndStar, exact. Added and iprved mehtods for visualisation
+	* tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegExTest.java:
+	new test file with tests to new methods in UrlRegex
+
+2015-09-02  Jiri Vanek  <jvanek at redhat.com>
+
+	Newline characters are banned from saving to .appletTrustSettings
+	* netx/net/sourceforge/jnlp/security/appletextendedsecurity/InvalidLineException.java:
+	New file. Exception to be specially handled if error appear in saved line.
+	* netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java:
+	(serializeToReadableAndParseableString) if new-line appear in line,
+	InvalidLineException is thrown
+	* netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java:
+	(writeContent) InvalidLineException is expected and logged.
+	* tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmationTest.java:
+	adapted and quite a lot of tests added.
+	* tests/reproducers/simple/UnicodeLineBreak/resources/UnicodeLineBreak.java:
+	* tests/reproducers/simple/UnicodeLineBreak/srcs/UnicodeLineBreak.java:
+	* tests/reproducers/simple/UnicodeLineBreak/testcases/UnicodeLineBreakTests.java:
+	half automated reproducer of this behavior	
+
+2015-09-01  Jiri Vanek  <jvanek at redhat.com>
+
+	Saving of status of dialogs for "whole codebase" now includes also document base
+	* netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java:
+	(updateAppletAction) now saves  base of docbase instead of .* "for remember for codebase"
+	stripFile - new method, ensuring docbase do not contains file
+	* tests/netx/unit/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmationTest.java:
+	added testSripFile unit test for new method
+	* tests/reproducers/simple/FakeCodebase/resources/FakeCodebase.html.in:
+	* tests/reproducers/simple/FakeCodebase/resources/FakeCodebase.jnlp.in:
+	* tests/reproducers/simple/FakeCodebase/resources/OriginalCodebase.html:
+	* tests/reproducers/simple/FakeCodebase/resources/OriginalCodebase.jnlp:
+	* tests/reproducers/simple/FakeCodebase/srcs/FakeCodebase.java:
+	* tests/reproducers/simple/FakeCodebase/testcases/FakeCodebaseTests.java:
+	Reproducer of this behavior
+
 2015-09-01  Jiri Vanek  <jvanek at redhat.com>
 
 	application-library-allowable-codebase dialog made available for unsigned apps
diff -r f45e2b0ee174 -r 14c84c250e84 netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletActionTableModel.java
--- a/netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletActionTableModel.java	Tue Sep 08 15:02:10 2015 +0200
+++ b/netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletActionTableModel.java	Tue Sep 08 17:11:35 2015 +0200
@@ -143,12 +143,12 @@
 
     public void addRow() {
         int i = getRowCount()-1;
-        String s = "\\Qhttp://localhost:80/\\E.*";
+        String s = "http://localhost:80/";
         back.add(new UnsignedAppletActionEntry(
                 ExecuteAppletAction.NEVER,
                 new Date(),
-                new UrlRegEx(s),
-                new UrlRegEx(s),
+                UrlRegEx.quoteAndStar(s),
+                UrlRegEx.quoteAndStar(s),
                 null));
         fireTableRowsInserted(i+1, i+1);
     }
diff -r f45e2b0ee174 -r 14c84c250e84 netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletsTrustingListPanel.java
--- a/netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletsTrustingListPanel.java	Tue Sep 08 15:02:10 2015 +0200
+++ b/netx/net/sourceforge/jnlp/controlpanel/UnsignedAppletsTrustingListPanel.java	Tue Sep 08 17:11:35 2015 +0200
@@ -630,7 +630,7 @@
             JOptionPane.showMessageDialog(this, Translator.R("APPEXTSECguiPanelTableValid"));
         } catch (Exception ex) {
             OutputController.getLogger().log(OutputController.Level.ERROR_ALL, ex);
-            JOptionPane.showMessageDialog(this, Translator.R("APPEXTSECguiPanelTableInvalid ", ex.toString()));
+            JOptionPane.showMessageDialog(this, Translator.R("APPEXTSECguiPanelTableInvalid", ex.toString()));
         } finally {
             f.delete();
         }
@@ -821,7 +821,7 @@
 
         private MyTextField(UrlRegEx urlRegEx) {
             if (urlRegEx == null) {
-                keeper = new UrlRegEx("");
+                keeper = UrlRegEx.exact("");
             } else {
                 this.keeper = urlRegEx;
             }
@@ -840,7 +840,7 @@
 
         private UrlRegexCellRenderer(UrlRegEx urlRegEx) {
             if (urlRegEx == null) {
-                keeper = new UrlRegEx("");
+                keeper =  UrlRegEx.exact("");
             } else {
                 this.keeper = urlRegEx;
             }
diff -r f45e2b0ee174 -r 14c84c250e84 netx/net/sourceforge/jnlp/security/appletextendedsecurity/InvalidLineException.java
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/InvalidLineException.java	Tue Sep 08 17:11:35 2015 +0200
@@ -0,0 +1,47 @@
+/* 
+ Copyright (C) 2015 Red Hat, Inc.
+
+ This file is part of IcedTea.
+
+ IcedTea is free software; you can redistribute it and/or
+ modify it under the terms of the GNU General Public License as published by
+ the Free Software Foundation, version 2.
+
+ IcedTea is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
+ General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with IcedTea; see the file COPYING.  If not, write to
+ the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
+ 02110-1301 USA.
+
+ Linking this library statically or dynamically with other modules is
+ making a combined work based on this library.  Thus, the terms and
+ conditions of the GNU General Public License cover the whole
+ combination.
+
+ As a special exception, the copyright holders of this library give you
+ permission to link this library with independent modules to produce an
+ executable, regardless of the license terms of these independent
+ modules, and to copy and distribute the resulting executable under
+ terms of your choice, provided that you also meet, for each linked
+ independent module, the terms and conditions of the license of that
+ module.  An independent module is a module which is not derived from
+ or based on this library.  If you modify this library, you may extend
+ this exception to your version of the library, but you are not
+ obligated to do so.  If you do not wish to do so, delete this
+ exception statement from your version.
+ */
+
+package net.sourceforge.jnlp.security.appletextendedsecurity;
+
+
+public class InvalidLineException extends RuntimeException {
+
+    public InvalidLineException(String s) {
+        super(s);
+    }
+    
+}
diff -r f45e2b0ee174 -r 14c84c250e84 netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java
--- a/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java	Tue Sep 08 15:02:10 2015 +0200
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletActionEntry.java	Tue Sep 08 17:11:35 2015 +0200
@@ -54,11 +54,11 @@
         UnsignedAppletActionEntry nw = new UnsignedAppletActionEntry(
                 ExecuteAppletAction.fromString(split[0]),
                 new Date(new Long(split[1])),
-                new UrlRegEx(split[2]),
+                UrlRegEx.exact(split[2]),
                 null,
                 null);
         if (split.length > 3) {
-            nw.setCodeBase(new UrlRegEx(split[3]));
+            nw.setCodeBase(UrlRegEx.exact(split[3]));
         }
         if (split.length > 4) {
             nw.setArchives(createArchivesList(s.substring(s.lastIndexOf(split[3]) + split[3].length()).trim()));
@@ -85,12 +85,16 @@
         bw.write(this.serializeToReadableAndParseableString());
     }
 
-    private String serializeToReadableAndParseableString() {
-        return unsignedAppletAction.toChar()
+    private String serializeToReadableAndParseableString() throws InvalidLineException {
+        String s = unsignedAppletAction.toChar()
                 + " " + ((timeStamp == null) ? "1" : timeStamp.getTime())
                 + " " + ((documentBase == null) ? "" : documentBase.getRegEx())
                 + " " + ((codeBase == null) ? "" : codeBase.getRegEx())
                 + " " + createArchivesString(archives);
+        if (s.contains("\n") || s.contains("\r") || s.contains("\f")){
+            throw new InvalidLineException("Cant write line with \\n, \\r or \\f");
+        }
+        return s;
     }
 
     public Date getTimeStamp() {
diff -r f45e2b0ee174 -r 14c84c250e84 netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java
--- a/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java	Tue Sep 08 15:02:10 2015 +0200
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UnsignedAppletTrustConfirmation.java	Tue Sep 08 17:11:35 2015 +0200
@@ -36,6 +36,7 @@
 
 package net.sourceforge.jnlp.security.appletextendedsecurity;
 
+import java.net.MalformedURLException;
 import static net.sourceforge.jnlp.runtime.Translator.R;
 
 import java.net.URL;
@@ -119,7 +120,7 @@
         return fileNames;
     }
 
-    private static void updateAppletAction(JNLPFile file, ExecuteAppletAction behaviour, boolean rememberForCodeBase) {
+    public  static void updateAppletAction(JNLPFile file, ExecuteAppletAction behaviour, boolean rememberForCodeBase) {
         UnsignedAppletActionStorage userActionStorage = securitySettings.getUnsignedAppletActionCustomStorage();
 
         userActionStorage.lock(); // We should ensure this operation is atomic
@@ -138,12 +139,12 @@
             URL documentbase = UrlUtils.normalizeUrlAndStripParams(file.getSourceLocation(), true /* encode local files */);
 
             /* Else, create a new entry */
-            UrlRegEx codebaseRegex = new UrlRegEx("\\Q" + codebase + "\\E");
-            UrlRegEx documentbaseRegex = new UrlRegEx(".*"); // Match any from codebase
+            UrlRegEx codebaseRegex = UrlRegEx.quote(codebase.toExternalForm());
+            UrlRegEx documentbaseRegex = UrlRegEx.quoteAndStar(stripFile(documentbase)); // Match any from codebase and sourceFile "base"
             List<String> archiveMatches = null; // Match any from codebase
 
             if (!rememberForCodeBase) { 
-                documentbaseRegex = new UrlRegEx("\\Q" + documentbase + "\\E"); // Match only this applet
+                documentbaseRegex = UrlRegEx.quote(documentbase.toExternalForm()); // Match only this applet
                 archiveMatches = toRelativePaths(getJars(file), file.getCodeBase().toString()); // Match only this applet
             }
 
@@ -262,4 +263,48 @@
 
     }
 
+    static String stripFile(URL documentbase) {
+        //whenused in generation of regec, the trailing slash is very important
+        //see the result between http:/some.url/path.* and http:/some.url/path/.*
+        return ensureSlashTail(stripFileImp(documentbase));
+    }
+    
+    private static String stripFileImp(URL documentbase) {
+        try {
+            String normlaized = UrlUtils.normalizeUrlAndStripParams(documentbase).toExternalForm().trim();
+            if (normlaized.endsWith("/") || normlaized.endsWith("\\")) {
+                return normlaized;
+            }
+            URL middleway = new URL(normlaized);
+            String file = middleway.getFile();
+            int i = Math.max(file.lastIndexOf('/'), file.lastIndexOf('\\'));
+            if (i<0){
+                return normlaized;
+            }
+            String parent = file.substring(0, i+1);
+            String stripped = normlaized.replace(file, parent);
+            return stripped;
+        } catch (Exception ex) {
+            OutputController.getLogger().log(ex);
+            return documentbase.toExternalForm();
+        }
+
+    }
+
+    private static String ensureSlashTail(String s) {
+        if (s.endsWith("/")) {
+            return s;
+        }
+        if (s.endsWith("\\")) {
+            return s;
+        }
+        if (s.contains("/")) {
+            return s + "/";
+        }
+        if (s.contains("\\")) {
+            return s + "\\";
+        }
+        return s + "/";
+    }
+
 }
\ No newline at end of file
diff -r f45e2b0ee174 -r 14c84c250e84 netx/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegEx.java
--- a/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegEx.java	Tue Sep 08 15:02:10 2015 +0200
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/UrlRegEx.java	Tue Sep 08 17:11:35 2015 +0200
@@ -35,11 +35,29 @@
  */
 package net.sourceforge.jnlp.security.appletextendedsecurity;
 
+import java.util.regex.Pattern;
+
 public class UrlRegEx {
 
-    String regEx;
+    private static String quoteString(String s) {
+        return Pattern.quote(s);
+    }
 
-    public UrlRegEx(String s) {
+    private final String regEx;
+
+    public static UrlRegEx quote(String s) {
+        return new UrlRegEx(quoteString(s));
+    }
+    
+    public static UrlRegEx quoteAndStar(String s) {
+        return new UrlRegEx(quoteString(s)+".*");
+    }
+    
+    public static UrlRegEx exact(String s) {
+        return new UrlRegEx(s);
+    }
+    
+    private UrlRegEx(String s) {
         regEx = s;
     }
 
@@ -52,11 +70,60 @@
         return regEx;
     }
 
+    /**
+     * Just cosmetic method to show nicer tables, as \Qsomething\Emaybe is most
+     * common record when cell is edited, the regex is shown fully
+     *
+     * @return unquted pattern or original string
+     */
     public String getFilteredRegEx() {
-        return regEx.replaceAll("\\\\Q", "").replaceAll("\\\\E", "");
+        try {
+            return simpleUnquote(regEx);
+        } catch (Exception ex) {
+            return regEx;
+        }
     }
 
-    public void setRegEx(String regEx) {
-        this.regEx = regEx;
+    //needs testing
+    static String replaceLast(String where, String what, String by) {
+        if (!where.contains(what)) {
+            return where;
+        }
+        StringBuilder b = new StringBuilder(where);
+        b.replace(where.lastIndexOf(what), where.lastIndexOf(what)+what.length(), by);
+        return b.toString();
+    }
+    
+     //needs testing
+    static String simpleUnquote(String s) {
+        //escaped run needs at least \E\Q, but only single char actually hurts
+        if (s.length()<=1){
+            return s;
+        }
+        boolean in = false;
+        for(int i = 1 ; i < s.length() ; i++){
+            if ( i == 0) {
+                continue;
+            }
+            if (!in && s.charAt(i) == 'Q' && s.charAt(i-1) ==  '\\'){
+                in = true;
+                String s1=s.substring(0, i - 1);
+                String s2=s.substring(i + 1);
+                s= s1+s2;
+                i = i - 2;
+                continue;
+            }
+            if (in && s.charAt(i) == 'E' && s.charAt(i-1) ==  '\\'){
+                String s1=s.substring(0, i - 1);
+                String s2=s.substring(i + 1);
+                s= s1+s2;
+                i = i - 2;
+                in = false;
+                continue;
+            }
+        }
+        //all text\Etext were replaced  \Qtext\E\\E\Qtext\E
+        //after above text\\Etext  should remain
+        return s.replace("\\\\E", "\\E");
     }
 }
diff -r f45e2b0ee174 -r 14c84c250e84 netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageExtendedImpl.java
--- a/netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageExtendedImpl.java	Tue Sep 08 15:02:10 2015 +0200
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageExtendedImpl.java	Tue Sep 08 17:11:35 2015 +0200
@@ -162,10 +162,10 @@
                         source.setTimeStamp((Date) aValue);
                     }
                     if (columnIndex == 2) {
-                        source.setDocumentBase(new UrlRegEx((String) aValue));
+                        source.setDocumentBase(UrlRegEx.exact((String) aValue));
                     }
                     if (columnIndex == 3) {
-                        source.setCodeBase(new UrlRegEx((String) aValue));
+                        source.setCodeBase(UrlRegEx.exact((String) aValue));
                     }
                     if (columnIndex == 4) {
                         source.setArchives(UnsignedAppletActionEntry.createArchivesList((String) aValue));
diff -r f45e2b0ee174 -r 14c84c250e84 netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java
--- a/netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java	Tue Sep 08 15:02:10 2015 +0200
+++ b/netx/net/sourceforge/jnlp/security/appletextendedsecurity/impl/UnsignedAppletActionStorageImpl.java	Tue Sep 08 17:11:35 2015 +0200
@@ -41,19 +41,25 @@
 import java.util.ArrayList;
 import java.util.Collections;
 import java.util.List;
+import java.util.regex.PatternSyntaxException;
+import net.sourceforge.jnlp.security.appletextendedsecurity.InvalidLineException;
 import net.sourceforge.jnlp.security.appletextendedsecurity.ExecuteAppletAction;
 import net.sourceforge.jnlp.security.appletextendedsecurity.UnsignedAppletActionEntry;
 import net.sourceforge.jnlp.security.appletextendedsecurity.UnsignedAppletActionStorage;
+import net.sourceforge.jnlp.util.FileUtils;
 import net.sourceforge.jnlp.util.lockingfile.LockingReaderWriter;
 import net.sourceforge.jnlp.util.lockingfile.StorageIoException;
+import net.sourceforge.jnlp.util.logging.OutputController;
 
 public class UnsignedAppletActionStorageImpl extends LockingReaderWriter implements UnsignedAppletActionStorage {
 
     protected List<UnsignedAppletActionEntry> items;
-
-    public UnsignedAppletActionStorageImpl(String location) {
-        this(new File(location));
-    }
+    private String readVersion = null;
+    public static final String versionPreffix="#VERSION ";
+    public static final String BACKUP_SUFFIX = "-backup";
+    public static final int currentVersion = 2;
+    private int lineCounter = 0;
+    private boolean loadingDisabled = false;
 
     public UnsignedAppletActionStorageImpl(File location) {
         super(location);
@@ -82,15 +88,36 @@
     @Override
     protected void readLine(String line) {
         if (line.trim().length() != 0) {
-            this.items.add(UnsignedAppletActionEntry.createFromString(line));
+            lineCounter++;
+            if (line.startsWith(versionPreffix) && line.trim().split("\\s+").length > 1) {
+                if (readVersion == null) {
+                    readVersion = line.trim();
+                    actOnVersionLoad();
+                }
+            } else {
+                if (lineCounter>0 && readVersion == null){
+                    actOnNoVersionLoad();
+                }
+                if (!loadingDisabled) {
+                    this.items.add(UnsignedAppletActionEntry.createFromString(line));
+                }
+            }
         }
     }
 
     @Override
     public void writeContent(BufferedWriter bw) throws IOException {
+        lineCounter = 0;
+        readVersion = null;
+        bw.write(versionPreffix + currentVersion + " - note, do not edit or modify this line. It may cause removal of this file.");
+        bw.newLine();
         for (UnsignedAppletActionEntry item : items) {
-            item.write(bw);
-            bw.newLine();
+            try{
+                item.write(bw);
+                bw.newLine();
+            }catch (InvalidLineException ex){
+                OutputController.getLogger().log(ex);
+            }
         }


More information about the distro-pkg-dev mailing list