8229773: Resolve permissions for code source URLs lazily
Reviewed-by: alanb, mullan, rriggs, dfuchs
This commit is contained in:
parent
742e9f26c8
commit
2c245bd2b9
@ -32,6 +32,7 @@
|
|||||||
package build.tools.classlist;
|
package build.tools.classlist;
|
||||||
|
|
||||||
import java.net.InetAddress;
|
import java.net.InetAddress;
|
||||||
|
import java.nio.file.FileSystems;
|
||||||
import java.time.LocalDateTime;
|
import java.time.LocalDateTime;
|
||||||
import java.time.ZoneId;
|
import java.time.ZoneId;
|
||||||
import java.time.format.DateTimeFormatter;
|
import java.time.format.DateTimeFormatter;
|
||||||
@ -56,6 +57,8 @@ public class HelloClasslist {
|
|||||||
|
|
||||||
public static void main(String ... args) {
|
public static void main(String ... args) {
|
||||||
|
|
||||||
|
FileSystems.getDefault();
|
||||||
|
|
||||||
List<String> strings = Arrays.asList("Hello", "World!", "From: ",
|
List<String> strings = Arrays.asList("Hello", "World!", "From: ",
|
||||||
InetAddress.getLoopbackAddress().toString());
|
InetAddress.getLoopbackAddress().toString());
|
||||||
|
|
||||||
|
@ -74,6 +74,7 @@ import jdk.internal.logger.LazyLoggers;
|
|||||||
import jdk.internal.logger.LocalizedLoggerWrapper;
|
import jdk.internal.logger.LocalizedLoggerWrapper;
|
||||||
import jdk.internal.util.SystemProps;
|
import jdk.internal.util.SystemProps;
|
||||||
import jdk.internal.vm.annotation.Stable;
|
import jdk.internal.vm.annotation.Stable;
|
||||||
|
import sun.nio.fs.DefaultFileSystemProvider;
|
||||||
import sun.reflect.annotation.AnnotationType;
|
import sun.reflect.annotation.AnnotationType;
|
||||||
import sun.nio.ch.Interruptible;
|
import sun.nio.ch.Interruptible;
|
||||||
import sun.security.util.SecurityConstants;
|
import sun.security.util.SecurityConstants;
|
||||||
@ -339,6 +340,8 @@ public final class System {
|
|||||||
if (security == null) {
|
if (security == null) {
|
||||||
// ensure image reader is initialized
|
// ensure image reader is initialized
|
||||||
Object.class.getResource("java/lang/ANY");
|
Object.class.getResource("java/lang/ANY");
|
||||||
|
// ensure the default file system is initialized
|
||||||
|
DefaultFileSystemProvider.theFileSystem();
|
||||||
}
|
}
|
||||||
if (sm != null) {
|
if (sm != null) {
|
||||||
try {
|
try {
|
||||||
|
@ -57,7 +57,7 @@ public class CodeSource implements java.io.Serializable {
|
|||||||
*
|
*
|
||||||
* @serial
|
* @serial
|
||||||
*/
|
*/
|
||||||
private URL location;
|
private final URL location;
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* The code signers.
|
* The code signers.
|
||||||
|
@ -25,8 +25,6 @@
|
|||||||
|
|
||||||
package jdk.internal.loader;
|
package jdk.internal.loader;
|
||||||
|
|
||||||
import java.io.File;
|
|
||||||
import java.io.FilePermission;
|
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.io.InputStream;
|
import java.io.InputStream;
|
||||||
import java.lang.module.ModuleDescriptor;
|
import java.lang.module.ModuleDescriptor;
|
||||||
@ -40,7 +38,6 @@ import java.nio.ByteBuffer;
|
|||||||
import java.security.AccessController;
|
import java.security.AccessController;
|
||||||
import java.security.CodeSigner;
|
import java.security.CodeSigner;
|
||||||
import java.security.CodeSource;
|
import java.security.CodeSource;
|
||||||
import java.security.Permission;
|
|
||||||
import java.security.PermissionCollection;
|
import java.security.PermissionCollection;
|
||||||
import java.security.PrivilegedAction;
|
import java.security.PrivilegedAction;
|
||||||
import java.security.PrivilegedActionException;
|
import java.security.PrivilegedActionException;
|
||||||
@ -65,6 +62,7 @@ import jdk.internal.misc.VM;
|
|||||||
import jdk.internal.module.ModulePatcher.PatchedModuleReader;
|
import jdk.internal.module.ModulePatcher.PatchedModuleReader;
|
||||||
import jdk.internal.module.Resources;
|
import jdk.internal.module.Resources;
|
||||||
import jdk.internal.vm.annotation.Stable;
|
import jdk.internal.vm.annotation.Stable;
|
||||||
|
import sun.security.util.LazyCodeSourcePermissionCollection;
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -966,39 +964,9 @@ public class BuiltinClassLoader
|
|||||||
*/
|
*/
|
||||||
@Override
|
@Override
|
||||||
protected PermissionCollection getPermissions(CodeSource cs) {
|
protected PermissionCollection getPermissions(CodeSource cs) {
|
||||||
PermissionCollection perms = super.getPermissions(cs);
|
return new LazyCodeSourcePermissionCollection(super.getPermissions(cs), cs);
|
||||||
|
|
||||||
// add the permission to access the resource
|
|
||||||
URL url = cs.getLocation();
|
|
||||||
if (url == null)
|
|
||||||
return perms;
|
|
||||||
|
|
||||||
// avoid opening connection when URL is to resource in run-time image
|
|
||||||
if (url.getProtocol().equals("jrt")) {
|
|
||||||
perms.add(new RuntimePermission("accessSystemModules"));
|
|
||||||
return perms;
|
|
||||||
}
|
|
||||||
|
|
||||||
// open connection to determine the permission needed
|
|
||||||
try {
|
|
||||||
Permission p = url.openConnection().getPermission();
|
|
||||||
if (p != null) {
|
|
||||||
// for directories then need recursive access
|
|
||||||
if (p instanceof FilePermission) {
|
|
||||||
String path = p.getName();
|
|
||||||
if (path.endsWith(File.separator)) {
|
|
||||||
path += "-";
|
|
||||||
p = new FilePermission(path, "read");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
perms.add(p);
|
|
||||||
}
|
|
||||||
} catch (IOException ioe) { }
|
|
||||||
|
|
||||||
return perms;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
// -- miscellaneous supporting methods
|
// -- miscellaneous supporting methods
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -0,0 +1,126 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (c) 2019, Oracle and/or its affiliates. All rights reserved.
|
||||||
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||||
|
*
|
||||||
|
* This code is free software; you can redistribute it and/or modify it
|
||||||
|
* under the terms of the GNU General Public License version 2 only, as
|
||||||
|
* published by the Free Software Foundation. Oracle designates this
|
||||||
|
* particular file as subject to the "Classpath" exception as provided
|
||||||
|
* by Oracle in the LICENSE file that accompanied this code.
|
||||||
|
*
|
||||||
|
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||||||
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||||
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||||
|
* version 2 for more details (a copy is included in the LICENSE file that
|
||||||
|
* accompanied this code).
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU General Public License version
|
||||||
|
* 2 along with this work; if not, write to the Free Software Foundation,
|
||||||
|
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||||
|
*
|
||||||
|
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
||||||
|
* or visit www.oracle.com if you need additional information or have any
|
||||||
|
* questions.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package sun.security.util;
|
||||||
|
|
||||||
|
import java.io.File;
|
||||||
|
import java.io.FilePermission;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.net.URL;
|
||||||
|
import java.security.CodeSource;
|
||||||
|
import java.security.Permission;
|
||||||
|
import java.security.PermissionCollection;
|
||||||
|
import java.util.Enumeration;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* This {@code PermissionCollection} implementation delegates to another
|
||||||
|
* {@code PermissionCollection}, taking care to lazily add the permission needed
|
||||||
|
* to read from the given {@code CodeSource} at first use, i.e., when either of
|
||||||
|
* {@link #elements}, {@link #implies} or {@link #toString} is called, or when
|
||||||
|
* the collection is serialized.
|
||||||
|
*/
|
||||||
|
public final class LazyCodeSourcePermissionCollection
|
||||||
|
extends PermissionCollection
|
||||||
|
{
|
||||||
|
private static final long serialVersionUID = -6727011328946861783L;
|
||||||
|
private final PermissionCollection perms;
|
||||||
|
private final CodeSource cs;
|
||||||
|
private volatile boolean permissionAdded;
|
||||||
|
|
||||||
|
public LazyCodeSourcePermissionCollection(PermissionCollection perms,
|
||||||
|
CodeSource cs) {
|
||||||
|
this.perms = perms;
|
||||||
|
this.cs = cs;
|
||||||
|
}
|
||||||
|
|
||||||
|
private void ensureAdded() {
|
||||||
|
if (!permissionAdded) {
|
||||||
|
synchronized(perms) {
|
||||||
|
if (permissionAdded)
|
||||||
|
return;
|
||||||
|
|
||||||
|
// open connection to determine the permission needed
|
||||||
|
URL location = cs.getLocation();
|
||||||
|
if (location != null) {
|
||||||
|
try {
|
||||||
|
Permission p = location.openConnection().getPermission();
|
||||||
|
if (p != null) {
|
||||||
|
// for directories then need recursive access
|
||||||
|
if (p instanceof FilePermission) {
|
||||||
|
String path = p.getName();
|
||||||
|
if (path.endsWith(File.separator)) {
|
||||||
|
path += "-";
|
||||||
|
p = new FilePermission(path,
|
||||||
|
SecurityConstants.FILE_READ_ACTION);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
perms.add(p);
|
||||||
|
}
|
||||||
|
} catch (IOException ioe) {
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (isReadOnly()) {
|
||||||
|
perms.setReadOnly();
|
||||||
|
}
|
||||||
|
permissionAdded = true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void add(Permission permission) {
|
||||||
|
if (isReadOnly())
|
||||||
|
throw new SecurityException(
|
||||||
|
"attempt to add a Permission to a readonly PermissionCollection");
|
||||||
|
perms.add(permission);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean implies(Permission permission) {
|
||||||
|
ensureAdded();
|
||||||
|
return perms.implies(permission);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Enumeration<Permission> elements() {
|
||||||
|
ensureAdded();
|
||||||
|
return perms.elements();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String toString() {
|
||||||
|
ensureAdded();
|
||||||
|
return perms.toString();
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* On serialization, initialize and replace with the underlying
|
||||||
|
* permissions. This removes the laziness on deserialization.
|
||||||
|
*/
|
||||||
|
private Object writeReplace() {
|
||||||
|
ensureAdded();
|
||||||
|
return perms;
|
||||||
|
}
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user