RFR: 8319332: Security properties files inclusion [v18]
Martin Balao
mbalao at openjdk.org
Wed Aug 7 18:25:36 UTC 2024
On Wed, 7 Aug 2024 17:44:44 GMT, Weijun Wang <weijun at openjdk.org> wrote:
>> Francisco Ferrari Bihurriet has updated the pull request incrementally with one additional commit since the last revision:
>>
>> Throw an IllegalArgumentException exception if Security.setProperty("include", ...) is invoked.
>>
>> Co-authored-by: Martin Balao <mbalao at redhat.com>
>> Co-authored-by: Francisco Ferrari Bihurriet <fferrari at redhat.com>
>
> src/java.base/share/classes/java/security/Security.java line 241:
>
>> 239: try {
>> 240: Path path = Path.of(expPropFile);
>> 241: if (!path.isAbsolute()) {
>
> So you allow a properties file on the net to include a local absolute path file. Is this intended?
Yes, that's intended. Files obtained from a URL have no issues with having absolute-path includes. The only restriction for them is not to have relative includes, as there isn't a file path base to resolve it.
> src/java.base/share/conf/security/java.security line 45:
>
>> 43: # "include" definition, if local. Paths may contain system properties for
>> 44: # expansion in the form of ${system.property}. If a system property does
>> 45: # not have a value, it expands to the empty string.
>
> I mentioned this in a previous comment, but if java.security.properties points to an HTTP URL, can it still include a local file with absolute path?
Yes, that's intended as said above.
-------------
PR Review Comment: https://git.openjdk.org/jdk/pull/16483#discussion_r1707612026
PR Review Comment: https://git.openjdk.org/jdk/pull/16483#discussion_r1707614207
More information about the security-dev
mailing list