summaryrefslogtreecommitdiffstats
path: root/src/java/com/jogamp/common/util/PropertyAccess.java
diff options
context:
space:
mode:
authorSven Gothel <[email protected]>2012-03-13 19:56:54 +0100
committerSven Gothel <[email protected]>2012-03-13 19:56:54 +0100
commitf4ac27e177f6deb444280d3b375e7d343e38bd08 (patch)
tree5dc8835bd3fb47475219d71e278d622ef5742420 /src/java/com/jogamp/common/util/PropertyAccess.java
parentbab77b637e7cdd327de5f66989fcbfc0298b9b88 (diff)
SecurityUtil: Generalize cert validation and AccessControlContext query; PropertyAccess: Fix security code, grant access to common 'trusted' properties
- SecurityUtil - Generalize cert validation for JAR and property access - Grant access to common AccessControlContext for 'same' cert - PropertyAccess: - Fix security code: Passing the current AccessControlContext from the caller didn't include priviledges. - Grant access to common 'trusted' properties, which removes the need of passing the AccessControlContext for general properties like 'jnlp.', 'jogamp.' .. - Enable registering 'trusted' properties, when caller's cert is 'same'
Diffstat (limited to 'src/java/com/jogamp/common/util/PropertyAccess.java')
-rw-r--r--src/java/com/jogamp/common/util/PropertyAccess.java178
1 files changed, 178 insertions, 0 deletions
diff --git a/src/java/com/jogamp/common/util/PropertyAccess.java b/src/java/com/jogamp/common/util/PropertyAccess.java
new file mode 100644
index 0000000..f0d49e0
--- /dev/null
+++ b/src/java/com/jogamp/common/util/PropertyAccess.java
@@ -0,0 +1,178 @@
+/**
+ * Copyright 2012 JogAmp Community. All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without modification, are
+ * permitted provided that the following conditions are met:
+ *
+ * 1. Redistributions of source code must retain the above copyright notice, this list of
+ * conditions and the following disclaimer.
+ *
+ * 2. Redistributions in binary form must reproduce the above copyright notice, this list
+ * of conditions and the following disclaimer in the documentation and/or other materials
+ * provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY JogAmp Community ``AS IS'' AND ANY EXPRESS OR IMPLIED
+ * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
+ * FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JogAmp Community OR
+ * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
+ * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
+ * ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+ * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
+ * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ *
+ * The views and conclusions contained in the software and documentation are those of the
+ * authors and should not be interpreted as representing official policies, either expressed
+ * or implied, of JogAmp Community.
+ */
+
+package com.jogamp.common.util;
+
+import java.security.*;
+import java.util.HashSet;
+
+
+/** Helper routines for accessing properties. */
+public class PropertyAccess {
+ /** trusted build-in property prefix 'jnlp.' */
+ public static final String jnlp_prefix = "jnlp." ;
+ /** trusted build-in property prefix 'javaws.' */
+ public static final String javaws_prefix = "javaws.";
+
+ static final HashSet<String> trustedPrefixes;
+
+ static {
+ trustedPrefixes = new HashSet<String>();
+ trustedPrefixes.add(javaws_prefix);
+ trustedPrefixes.add(jnlp_prefix);
+ }
+
+ public static final void addTrustedPrefix(String prefix, Class<?> certClass) {
+ if(SecurityUtil.equalsLocalCert(certClass)) {
+ trustedPrefixes.add(prefix);
+ } else {
+ throw new SecurityException("Illegal Access - prefix "+prefix+", with cert class "+certClass);
+ }
+ }
+
+ public static final boolean isTrusted(String propertyKey) {
+ int dot1 = propertyKey.indexOf('.');
+ if(0<=dot1) {
+ return trustedPrefixes.contains(propertyKey.substring(0, dot1+1));
+ } else {
+ return false;
+ }
+ }
+
+ /** @see #getProperty(String, boolean, AccessControlContext) */
+ public static final int getIntProperty(final String property, final boolean jnlpAlias, final AccessControlContext acc, int defaultValue) {
+ int i=defaultValue;
+ try {
+ final String sv = PropertyAccess.getProperty(property, jnlpAlias, acc);
+ if(null!=sv) {
+ i = Integer.valueOf(sv).intValue();
+ }
+ } catch (NumberFormatException nfe) {}
+ return i;
+ }
+
+ /** @see #getProperty(String, boolean, AccessControlContext) */
+ public static final long getLongProperty(final String property, final boolean jnlpAlias, final AccessControlContext acc, long defaultValue) {
+ long l=defaultValue;
+ try {
+ final String sv = PropertyAccess.getProperty(property, jnlpAlias, acc);
+ if(null!=sv) {
+ l = Long.valueOf(sv).longValue();
+ }
+ } catch (NumberFormatException nfe) {}
+ return l;
+ }
+
+ /** @see #getProperty(String, boolean, AccessControlContext) */
+ public static final boolean getBooleanProperty(final String property, final boolean jnlpAlias, final AccessControlContext acc) {
+ return Boolean.valueOf(PropertyAccess.getProperty(property, jnlpAlias, acc)).booleanValue();
+ }
+
+ /** @see #getProperty(String, boolean, AccessControlContext) */
+ public static final boolean getBooleanProperty(final String property, final boolean jnlpAlias, final AccessControlContext acc, boolean defaultValue) {
+ final String valueS = PropertyAccess.getProperty(property, jnlpAlias, acc);
+ if(null != valueS) {
+ return Boolean.valueOf(valueS).booleanValue();
+ }
+ return defaultValue;
+ }
+
+ /** @see #getProperty(String, boolean, AccessControlContext) */
+ public static final boolean isPropertyDefined(final String property, final boolean jnlpAlias, final AccessControlContext acc) {
+ return (PropertyAccess.getProperty(property, jnlpAlias, acc) != null) ? true : false;
+ }
+
+ /** @see #getProperty(String, boolean, AccessControlContext) */
+ public static final boolean isPropertyDefined(final String property, final boolean jnlpAlias) {
+ return (PropertyAccess.getProperty(property, jnlpAlias, null) != null) ? true : false;
+ }
+
+ /**
+ * Query the property with the name <code>propertyKey</code>.
+ * <p>
+ * If <code>jnlpAlias</code> is <code>true</code> and the plain <code>propertyKey</code>
+ * could not be resolved, an attempt to resolve the JNLP aliased <i>trusted property</i> is made.<br>
+ * Example: For the propertyName <code>OneTwo</code>, the jnlp alias name is <code>jnlp.OneTwo</code>, which is considered trusted.<br>
+ * </p>
+ *
+ * @param propertyKey the property name to query.
+ * @param jnlpAlias true if a fallback attempt to query the JNLP aliased <i>trusted property</i> shall be made,
+ * otherwise false.
+ * @param acc the AccessControlerContext to be used for privileged access to the system property, or null.
+ *
+ * @return the property value if exists, or null
+ *
+ * @throws NullPointerException if the property name is null
+ * @throws IllegalArgumentException if the property name is of length 0
+ * @throws SecurityException if access is not allowed to the given <code>propertyKey</code>
+ *
+ * @see System#getProperty(String)
+ */
+ public static final String getProperty(final String propertyKey, final boolean jnlpAlias, final AccessControlContext acc)
+ throws SecurityException, NullPointerException, IllegalArgumentException {
+ if(null == propertyKey) {
+ throw new NullPointerException("propertyKey is NULL");
+ }
+ if(0 == propertyKey.length()) {
+ throw new IllegalArgumentException("propertyKey is empty");
+ }
+ if(isTrusted(propertyKey)) {
+ return getTrustedPropKey(propertyKey);
+ }
+ String s=null;
+ if( null!=acc ) {
+ s = AccessController.doPrivileged(new PrivilegedAction<String>() {
+ public String run() {
+ return System.getProperty(propertyKey);
+ } }, acc);
+ } else {
+ s = System.getProperty(propertyKey);
+ }
+ if(null==s && jnlpAlias) {
+ // Properties within the namespace "jnlp." or "javaws." should be considered trusted,
+ // i.e. always granted w/o special priviledges.
+ // FIXME: Nevertheless we use this class AccessControlContext to ensure access
+ // on all supported implementations.
+ return getTrustedPropKey(jnlp_prefix + propertyKey);
+ }
+ return s;
+ }
+
+ private static final String getTrustedPropKey(final String propertyKey) {
+ return AccessController.doPrivileged(new PrivilegedAction<String>() {
+ public String run() {
+ try {
+ return System.getProperty(propertyKey);
+ } catch (SecurityException se) {
+ throw new SecurityException("Could not access trusted property '"+propertyKey+"'", se);
+
+ }
+ }
+ });
+ }
+}