/*
Licensed to the Apache Software Foundation (ASF) under one or more
contributor license agreements. See the NOTICE file distributed with
this work for additional information regarding copyright ownership.
The ASF licenses this file to You under the Apache License, Version 2.0
(the "License"); you may not use this file except in compliance with
the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package org.apache.batik.script.rhino;
import java.security.AccessControlContext;
import java.security.AccessController;
import java.security.PrivilegedExceptionAction;
import org.mozilla.javascript.Callable;
import org.mozilla.javascript.Context;
import org.mozilla.javascript.GeneratedClassLoader;
import org.mozilla.javascript.Scriptable;
import org.mozilla.javascript.SecurityController;
import org.mozilla.javascript.WrappedException;
This implementation of the Rhino SecurityController
interface is
meant for use within the context of Batik only. It is a partial
implementation of the interface that does what is needed by Batik and
no more.
Author: Christophe Jolif Version: $Id: BatikSecurityController.java 1733416 2016-03-03 07:07:13Z gadams $
/**
* This implementation of the Rhino <code>SecurityController</code> interface is
* meant for use within the context of Batik only. It is a partial
* implementation of the interface that does what is needed by Batik and
* no more.
*
* @author <a href="mailto:cjolif@ilog.fr">Christophe Jolif</a>
* @version $Id: BatikSecurityController.java 1733416 2016-03-03 07:07:13Z gadams $
*/
public class BatikSecurityController extends SecurityController {
Default constructor
/**
* Default constructor
*/
public GeneratedClassLoader createClassLoader
(final ClassLoader parentLoader, Object securityDomain) {
if (securityDomain instanceof RhinoClassLoader) {
return (RhinoClassLoader)securityDomain;
}
// FIXX: This should be supported by intersecting perms.
// Calling var script = Script(source); script(); is not supported
throw new SecurityException("Script() objects are not supported");
}
Get dynamic security domain that allows an action only if it is allowed
by the current Java stack and securityDomain. If
securityDomain is null, return domain representing permissions
allowed by the current stack.
/**
* Get dynamic security domain that allows an action only if it is allowed
* by the current Java stack and <i>securityDomain</i>. If
* <i>securityDomain</i> is null, return domain representing permissions
* allowed by the current stack.
*/
public Object getDynamicSecurityDomain(Object securityDomain) {
ClassLoader loader = (RhinoClassLoader)securityDomain;
// Already have a rhino loader in place no need to
// do anything (normally you would want to union the
// the current stack with the loader's context but
// in our case no one has lower privledges than a
// rhino class loader).
if (loader != null)
return loader;
return AccessController.getContext();
}
Calls Callable.call(Context, Scriptable, Scriptable, Object[])
of callable
under restricted security domain where an action is
allowed only if it is allowed according to the Java stack on the
moment of the callWithDomain
call and
securityDomain
. Any call to getDynamicSecurityDomain(Object)
during execution of Callable.call(Context, Scriptable, Scriptable, Object[])
should return a domain incorporate restrictions imposed by securityDomain
.
/**
* Calls {@link Callable#call(Context, Scriptable, Scriptable, Object[])} of
* <code>callable</code> under restricted security domain where an action is
* allowed only if it is allowed according to the Java stack on the
* moment of the <code>callWithDomain</code> call and
* <code>securityDomain</code>. Any call to
* {@link #getDynamicSecurityDomain(Object)} during execution of
* {@link Callable#call(Context, Scriptable, Scriptable, Object[])}
* should return a domain incorporate restrictions imposed by
* <code>securityDomain</code>.
*/
public Object callWithDomain(Object securityDomain, final Context cx,
final Callable callable,
final Scriptable scope,
final Scriptable thisObj,
final Object[] args) {
AccessControlContext acc;
if (securityDomain instanceof AccessControlContext)
acc = (AccessControlContext)securityDomain;
else {
RhinoClassLoader loader = (RhinoClassLoader)securityDomain;
acc = loader.rhinoAccessControlContext;
}
PrivilegedExceptionAction execAction = new PrivilegedExceptionAction() {
public Object run() {
return callable.call(cx, scope, thisObj, args);
}
};
try {
return AccessController.doPrivileged(execAction, acc);
} catch (Exception e) {
throw new WrappedException(e);
}
}
}