src/java.base/share/classes/java/io/FilePermission.java
author igerasim
Wed, 16 Oct 2019 14:32:17 -0700
changeset 58653 71fef5fae9cc
parent 58617 037ca385e957
child 58679 9c3209ff7550
permissions -rw-r--r--
8230407: SocketPermission and FilePermission action list allows leading comma Reviewed-by: chegar Contributed-by: Ivan Gerasimov <ivan.gerasimov@oracle.com>, Chris Hegarty <chris.hegarty@oracle.com>
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     1
/*
55026
a8673ccddffd 8214563: Use {@systemProperty} in specification of system properties in java.nio packages
dkejriwal
parents: 52727
diff changeset
     2
 * Copyright (c) 1997, 2019, Oracle and/or its affiliates. All rights reserved.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     3
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
90ce3da70b43 Initial load
duke
parents:
diff changeset
     4
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
     5
 * This code is free software; you can redistribute it and/or modify it
90ce3da70b43 Initial load
duke
parents:
diff changeset
     6
 * under the terms of the GNU General Public License version 2 only, as
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4053
diff changeset
     7
 * published by the Free Software Foundation.  Oracle designates this
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     8
 * particular file as subject to the "Classpath" exception as provided
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4053
diff changeset
     9
 * by Oracle in the LICENSE file that accompanied this code.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    10
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    11
 * This code is distributed in the hope that it will be useful, but WITHOUT
90ce3da70b43 Initial load
duke
parents:
diff changeset
    12
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
90ce3da70b43 Initial load
duke
parents:
diff changeset
    13
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
90ce3da70b43 Initial load
duke
parents:
diff changeset
    14
 * version 2 for more details (a copy is included in the LICENSE file that
90ce3da70b43 Initial load
duke
parents:
diff changeset
    15
 * accompanied this code).
90ce3da70b43 Initial load
duke
parents:
diff changeset
    16
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    17
 * You should have received a copy of the GNU General Public License version
90ce3da70b43 Initial load
duke
parents:
diff changeset
    18
 * 2 along with this work; if not, write to the Free Software Foundation,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    19
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    20
 *
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4053
diff changeset
    21
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4053
diff changeset
    22
 * or visit www.oracle.com if you need additional information or have any
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4053
diff changeset
    23
 * questions.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    24
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    25
90ce3da70b43 Initial load
duke
parents:
diff changeset
    26
package java.io;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    27
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
    28
import java.nio.file.*;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    29
import java.security.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    30
import java.util.Enumeration;
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
    31
import java.util.Objects;
31080
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
    32
import java.util.StringJoiner;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    33
import java.util.Vector;
31080
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
    34
import java.util.concurrent.ConcurrentHashMap;
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
    35
52427
3c6aa484536c 8211122: Reduce the number of internal classes made accessible to jdk.unsupported
mchung
parents: 47478
diff changeset
    36
import jdk.internal.access.JavaIOFilePermissionAccess;
3c6aa484536c 8211122: Reduce the number of internal classes made accessible to jdk.unsupported
mchung
parents: 47478
diff changeset
    37
import jdk.internal.access.SharedSecrets;
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
    38
import sun.nio.fs.DefaultFileSystemProvider;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
    39
import sun.security.action.GetPropertyAction;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
    40
import sun.security.util.FilePermCompat;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    41
import sun.security.util.SecurityConstants;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    42
90ce3da70b43 Initial load
duke
parents:
diff changeset
    43
/**
90ce3da70b43 Initial load
duke
parents:
diff changeset
    44
 * This class represents access to a file or directory.  A FilePermission consists
90ce3da70b43 Initial load
duke
parents:
diff changeset
    45
 * of a pathname and a set of actions valid for that pathname.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    46
 * <P>
90ce3da70b43 Initial load
duke
parents:
diff changeset
    47
 * Pathname is the pathname of the file or directory granted the specified
90ce3da70b43 Initial load
duke
parents:
diff changeset
    48
 * actions. A pathname that ends in "/*" (where "/" is
58288
48e480e56aad 8231186: Replace html tag <code>foo</code> with javadoc tag {@code foo} in java.base
jboes
parents: 58242
diff changeset
    49
 * the file separator character, {@code File.separatorChar}) indicates
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    50
 * all the files and directories contained in that directory. A pathname
90ce3da70b43 Initial load
duke
parents:
diff changeset
    51
 * that ends with "/-" indicates (recursively) all files
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
    52
 * and subdirectories contained in that directory. Such a pathname is called
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
    53
 * a wildcard pathname. Otherwise, it's a simple pathname.
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
    54
 * <P>
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
    55
 * A pathname consisting of the special token {@literal "<<ALL FILES>>"}
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
    56
 * matches <b>any</b> file.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    57
 * <P>
90ce3da70b43 Initial load
duke
parents:
diff changeset
    58
 * Note: A pathname consisting of a single "*" indicates all the files
90ce3da70b43 Initial load
duke
parents:
diff changeset
    59
 * in the current directory, while a pathname consisting of a single "-"
90ce3da70b43 Initial load
duke
parents:
diff changeset
    60
 * indicates all the files in the current directory and
90ce3da70b43 Initial load
duke
parents:
diff changeset
    61
 * (recursively) all files and subdirectories contained in the current
90ce3da70b43 Initial load
duke
parents:
diff changeset
    62
 * directory.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    63
 * <P>
90ce3da70b43 Initial load
duke
parents:
diff changeset
    64
 * The actions to be granted are passed to the constructor in a string containing
90ce3da70b43 Initial load
duke
parents:
diff changeset
    65
 * a list of one or more comma-separated keywords. The possible keywords are
2057
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
    66
 * "read", "write", "execute", "delete", and "readlink". Their meaning is
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
    67
 * defined as follows:
21334
c60dfce46a77 8026982: javadoc errors in core libs
rriggs
parents: 16100
diff changeset
    68
 *
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    69
 * <DL>
90ce3da70b43 Initial load
duke
parents:
diff changeset
    70
 *    <DT> read <DD> read permission
90ce3da70b43 Initial load
duke
parents:
diff changeset
    71
 *    <DT> write <DD> write permission
90ce3da70b43 Initial load
duke
parents:
diff changeset
    72
 *    <DT> execute
58288
48e480e56aad 8231186: Replace html tag <code>foo</code> with javadoc tag {@code foo} in java.base
jboes
parents: 58242
diff changeset
    73
 *    <DD> execute permission. Allows {@code Runtime.exec} to
48e480e56aad 8231186: Replace html tag <code>foo</code> with javadoc tag {@code foo} in java.base
jboes
parents: 58242
diff changeset
    74
 *         be called. Corresponds to {@code SecurityManager.checkExec}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    75
 *    <DT> delete
58288
48e480e56aad 8231186: Replace html tag <code>foo</code> with javadoc tag {@code foo} in java.base
jboes
parents: 58242
diff changeset
    76
 *    <DD> delete permission. Allows {@code File.delete} to
48e480e56aad 8231186: Replace html tag <code>foo</code> with javadoc tag {@code foo} in java.base
jboes
parents: 58242
diff changeset
    77
 *         be called. Corresponds to {@code SecurityManager.checkDelete}.
2057
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
    78
 *    <DT> readlink
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
    79
 *    <DD> read link permission. Allows the target of a
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
    80
 *         <a href="../nio/file/package-summary.html#links">symbolic link</a>
8158
77d9c0f1c19f 7006126: (fs) Updates to file system API (1/2011)
alanb
parents: 7803
diff changeset
    81
 *         to be read by invoking the {@link java.nio.file.Files#readSymbolicLink
2057
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
    82
 *         readSymbolicLink } method.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    83
 * </DL>
90ce3da70b43 Initial load
duke
parents:
diff changeset
    84
 * <P>
90ce3da70b43 Initial load
duke
parents:
diff changeset
    85
 * The actions string is converted to lowercase before processing.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    86
 * <P>
90ce3da70b43 Initial load
duke
parents:
diff changeset
    87
 * Be careful when granting FilePermissions. Think about the implications
90ce3da70b43 Initial load
duke
parents:
diff changeset
    88
 * of granting read and especially write access to various files and
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
    89
 * directories. The {@literal "<<ALL FILES>>"} permission with write action is
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    90
 * especially dangerous. This grants permission to write to the entire
90ce3da70b43 Initial load
duke
parents:
diff changeset
    91
 * file system. One thing this effectively allows is replacement of the
90ce3da70b43 Initial load
duke
parents:
diff changeset
    92
 * system binary, including the JVM runtime environment.
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
    93
 * <P>
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
    94
 * Please note: Code can always read a file from the same
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    95
 * directory it's in (or a subdirectory of that directory); it does not
90ce3da70b43 Initial load
duke
parents:
diff changeset
    96
 * need explicit permission to do so.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    97
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    98
 * @see java.security.Permission
90ce3da70b43 Initial load
duke
parents:
diff changeset
    99
 * @see java.security.Permissions
90ce3da70b43 Initial load
duke
parents:
diff changeset
   100
 * @see java.security.PermissionCollection
90ce3da70b43 Initial load
duke
parents:
diff changeset
   101
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   102
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   103
 * @author Marianne Mueller
90ce3da70b43 Initial load
duke
parents:
diff changeset
   104
 * @author Roland Schemers
90ce3da70b43 Initial load
duke
parents:
diff changeset
   105
 * @since 1.2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   106
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   107
 * @serial exclude
90ce3da70b43 Initial load
duke
parents:
diff changeset
   108
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   109
90ce3da70b43 Initial load
duke
parents:
diff changeset
   110
public final class FilePermission extends Permission implements Serializable {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   111
90ce3da70b43 Initial load
duke
parents:
diff changeset
   112
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   113
     * Execute action.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   114
     */
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31080
diff changeset
   115
    private static final int EXECUTE = 0x1;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   116
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   117
     * Write action.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   118
     */
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31080
diff changeset
   119
    private static final int WRITE   = 0x2;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   120
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   121
     * Read action.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   122
     */
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31080
diff changeset
   123
    private static final int READ    = 0x4;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   124
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   125
     * Delete action.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   126
     */
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31080
diff changeset
   127
    private static final int DELETE  = 0x8;
2057
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
   128
    /**
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
   129
     * Read link action.
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
   130
     */
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31080
diff changeset
   131
    private static final int READLINK    = 0x10;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   132
90ce3da70b43 Initial load
duke
parents:
diff changeset
   133
    /**
2057
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
   134
     * All actions (read,write,execute,delete,readlink)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   135
     */
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31080
diff changeset
   136
    private static final int ALL     = READ|WRITE|EXECUTE|DELETE|READLINK;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   137
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   138
     * No actions.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   139
     */
32649
2ee9017c7597 8136583: Core libraries should use blessed modifier order
martin
parents: 31080
diff changeset
   140
    private static final int NONE    = 0x0;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   141
90ce3da70b43 Initial load
duke
parents:
diff changeset
   142
    // the actions mask
90ce3da70b43 Initial load
duke
parents:
diff changeset
   143
    private transient int mask;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   144
90ce3da70b43 Initial load
duke
parents:
diff changeset
   145
    // does path indicate a directory? (wildcard or recursive)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   146
    private transient boolean directory;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   147
90ce3da70b43 Initial load
duke
parents:
diff changeset
   148
    // is it a recursive directory specification?
90ce3da70b43 Initial load
duke
parents:
diff changeset
   149
    private transient boolean recursive;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   150
90ce3da70b43 Initial load
duke
parents:
diff changeset
   151
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   152
     * the actions string.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   153
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   154
     * @serial
90ce3da70b43 Initial load
duke
parents:
diff changeset
   155
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   156
    private String actions; // Left null as long as possible, then
90ce3da70b43 Initial load
duke
parents:
diff changeset
   157
                            // created and re-used in the getAction function.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   158
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   159
    // canonicalized dir path. used by the "old" behavior (nb == false).
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   160
    // In the case of directories, it is the name "/blah/*" or "/blah/-"
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   161
    // without the last character (the "*" or "-").
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   162
90ce3da70b43 Initial load
duke
parents:
diff changeset
   163
    private transient String cpath;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   164
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   165
    // Following fields used by the "new" behavior (nb == true), in which
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   166
    // input path is not canonicalized. For compatibility (so that granting
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   167
    // FilePermission on "x" allows reading "`pwd`/x", an alternative path
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   168
    // can be added so that both can be used in an implies() check. Please note
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   169
    // the alternative path only deals with absolute/relative path, and does
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   170
    // not deal with symlink/target.
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   171
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   172
    private transient Path npath;       // normalized dir path.
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   173
    private transient Path npath2;      // alternative normalized dir path.
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   174
    private transient boolean allFiles; // whether this is <<ALL FILES>>
41823
10b6e8a41af5 8167646: Better invalid FilePermission
weijun
parents: 41822
diff changeset
   175
    private transient boolean invalid;  // whether input path is invalid
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   176
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   177
    // static Strings used by init(int mask)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   178
    private static final char RECURSIVE_CHAR = '-';
90ce3da70b43 Initial load
duke
parents:
diff changeset
   179
    private static final char WILD_CHAR = '*';
90ce3da70b43 Initial load
duke
parents:
diff changeset
   180
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   181
//    public String toString() {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   182
//        StringBuffer sb = new StringBuffer();
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   183
//        sb.append("*** FilePermission on " + getName() + " ***");
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   184
//        for (Field f : FilePermission.class.getDeclaredFields()) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   185
//            if (!Modifier.isStatic(f.getModifiers())) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   186
//                try {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   187
//                    sb.append(f.getName() + " = " + f.get(this));
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   188
//                } catch (Exception e) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   189
//                    sb.append(f.getName() + " = " + e.toString());
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   190
//                }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   191
//                sb.append('\n');
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   192
//            }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   193
//        }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   194
//        sb.append("***\n");
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   195
//        return sb.toString();
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   196
//    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   197
57956
e0b8b019d2f5 8229997: Apply java.io.Serial annotations in java.base
darcy
parents: 55026
diff changeset
   198
    @java.io.Serial
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   199
    private static final long serialVersionUID = 7930732926638008763L;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   200
90ce3da70b43 Initial load
duke
parents:
diff changeset
   201
    /**
52727
396dfb0e8ba5 8213406: (fs) More than one instance of built-in FileSystem observed in heap
martin
parents: 52427
diff changeset
   202
     * Use the platform's default file system to avoid recursive initialization
396dfb0e8ba5 8213406: (fs) More than one instance of built-in FileSystem observed in heap
martin
parents: 52427
diff changeset
   203
     * issues when the VM is configured to use a custom file system provider.
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   204
     */
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   205
    private static final java.nio.file.FileSystem builtInFS =
52727
396dfb0e8ba5 8213406: (fs) More than one instance of built-in FileSystem observed in heap
martin
parents: 52427
diff changeset
   206
        DefaultFileSystemProvider.theFileSystem();
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   207
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   208
    private static final Path here = builtInFS.getPath(
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   209
            GetPropertyAction.privilegedGetProperty("user.dir"));
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   210
44638
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   211
    private static final Path EMPTY_PATH = builtInFS.getPath("");
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   212
    private static final Path DASH_PATH = builtInFS.getPath("-");
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   213
    private static final Path DOTDOT_PATH = builtInFS.getPath("..");
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   214
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   215
    /**
42314
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   216
     * A private constructor that clones some and updates some,
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   217
     * always with a different name.
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   218
     * @param input
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   219
     */
42314
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   220
    private FilePermission(String name,
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   221
                           FilePermission input,
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   222
                           Path npath,
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   223
                           Path npath2,
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   224
                           int mask,
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   225
                           String actions) {
41822
9398d77cc4bb 8168127: FilePermissionCollection merges incorrectly
weijun
parents: 41377
diff changeset
   226
        super(name);
42314
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   227
        // Customizables
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   228
        this.npath = npath;
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   229
        this.npath2 = npath2;
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   230
        this.actions = actions;
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   231
        this.mask = mask;
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   232
        // Cloneds
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   233
        this.allFiles = input.allFiles;
41823
10b6e8a41af5 8167646: Better invalid FilePermission
weijun
parents: 41822
diff changeset
   234
        this.invalid = input.invalid;
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   235
        this.recursive = input.recursive;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   236
        this.directory = input.directory;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   237
        this.cpath = input.cpath;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   238
    }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   239
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   240
    /**
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   241
     * Returns the alternative path as a Path object, i.e. absolute path
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   242
     * for a relative one, or vice versa.
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   243
     *
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   244
     * @param in a real path w/o "-" or "*" at the end, and not <<ALL FILES>>.
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   245
     * @return the alternative path, or null if cannot find one.
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   246
     */
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   247
    private static Path altPath(Path in) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   248
        try {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   249
            if (!in.isAbsolute()) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   250
                return here.resolve(in).normalize();
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   251
            } else {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   252
                return here.relativize(in).normalize();
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   253
            }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   254
        } catch (IllegalArgumentException e) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   255
            return null;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   256
        }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   257
    }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   258
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   259
    static {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   260
        SharedSecrets.setJavaIOFilePermissionAccess(
42684
569aca644163 8168979: @implNote for invalid FilePermission
weijun
parents: 42343
diff changeset
   261
            /**
569aca644163 8168979: @implNote for invalid FilePermission
weijun
parents: 42343
diff changeset
   262
             * Creates FilePermission objects with special internals.
569aca644163 8168979: @implNote for invalid FilePermission
weijun
parents: 42343
diff changeset
   263
             * See {@link FilePermCompat#newPermPlusAltPath(Permission)} and
569aca644163 8168979: @implNote for invalid FilePermission
weijun
parents: 42343
diff changeset
   264
             * {@link FilePermCompat#newPermUsingAltPath(Permission)}.
569aca644163 8168979: @implNote for invalid FilePermission
weijun
parents: 42343
diff changeset
   265
             */
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   266
            new JavaIOFilePermissionAccess() {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   267
                public FilePermission newPermPlusAltPath(FilePermission input) {
42684
569aca644163 8168979: @implNote for invalid FilePermission
weijun
parents: 42343
diff changeset
   268
                    if (!input.invalid && input.npath2 == null && !input.allFiles) {
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   269
                        Path npath2 = altPath(input.npath);
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   270
                        if (npath2 != null) {
41822
9398d77cc4bb 8168127: FilePermissionCollection merges incorrectly
weijun
parents: 41377
diff changeset
   271
                            // Please note the name of the new permission is
9398d77cc4bb 8168127: FilePermissionCollection merges incorrectly
weijun
parents: 41377
diff changeset
   272
                            // different than the original so that when one is
9398d77cc4bb 8168127: FilePermissionCollection merges incorrectly
weijun
parents: 41377
diff changeset
   273
                            // added to a FilePermissionCollection it will not
9398d77cc4bb 8168127: FilePermissionCollection merges incorrectly
weijun
parents: 41377
diff changeset
   274
                            // be merged with the original one.
42314
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   275
                            return new FilePermission(input.getName() + "#plus",
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   276
                                    input,
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   277
                                    input.npath,
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   278
                                    npath2,
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   279
                                    input.mask,
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   280
                                    input.actions);
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   281
                        }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   282
                    }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   283
                    return input;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   284
                }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   285
                public FilePermission newPermUsingAltPath(FilePermission input) {
42684
569aca644163 8168979: @implNote for invalid FilePermission
weijun
parents: 42343
diff changeset
   286
                    if (!input.invalid && !input.allFiles) {
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   287
                        Path npath2 = altPath(input.npath);
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   288
                        if (npath2 != null) {
41822
9398d77cc4bb 8168127: FilePermissionCollection merges incorrectly
weijun
parents: 41377
diff changeset
   289
                            // New name, see above.
42314
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   290
                            return new FilePermission(input.getName() + "#using",
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   291
                                    input,
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   292
                                    npath2,
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   293
                                    null,
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   294
                                    input.mask,
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
   295
                                    input.actions);
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   296
                        }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   297
                    }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   298
                    return null;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   299
                }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   300
            }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   301
        );
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   302
    }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   303
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   304
    /**
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   305
     * initialize a FilePermission object. Common to all constructors.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   306
     * Also called during de-serialization.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   307
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   308
     * @param mask the actions mask to use.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   309
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   310
     */
14014
da3648e13e67 8000269: Cleanup javadoc warnings
alanb
parents: 13795
diff changeset
   311
    private void init(int mask) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   312
        if ((mask & ALL) != mask)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   313
                throw new IllegalArgumentException("invalid actions mask");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   314
90ce3da70b43 Initial load
duke
parents:
diff changeset
   315
        if (mask == NONE)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   316
                throw new IllegalArgumentException("invalid actions mask");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   317
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   318
        if (FilePermCompat.nb) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   319
            String name = getName();
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   320
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   321
            if (name == null)
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   322
                throw new NullPointerException("name can't be null");
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   323
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   324
            this.mask = mask;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   325
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   326
            if (name.equals("<<ALL FILES>>")) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   327
                allFiles = true;
52727
396dfb0e8ba5 8213406: (fs) More than one instance of built-in FileSystem observed in heap
martin
parents: 52427
diff changeset
   328
                npath = EMPTY_PATH;
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   329
                // other fields remain default
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   330
                return;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   331
            }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   332
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   333
            boolean rememberStar = false;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   334
            if (name.endsWith("*")) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   335
                rememberStar = true;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   336
                recursive = false;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   337
                name = name.substring(0, name.length()-1) + "-";
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   338
            }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   339
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   340
            try {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   341
                // new File() can "normalize" some name, for example, "/C:/X" on
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   342
                // Windows. Some JDK codes generate such illegal names.
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   343
                npath = builtInFS.getPath(new File(name).getPath())
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   344
                        .normalize();
42684
569aca644163 8168979: @implNote for invalid FilePermission
weijun
parents: 42343
diff changeset
   345
                // lastName should always be non-null now
569aca644163 8168979: @implNote for invalid FilePermission
weijun
parents: 42343
diff changeset
   346
                Path lastName = npath.getFileName();
44638
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   347
                if (lastName != null && lastName.equals(DASH_PATH)) {
42684
569aca644163 8168979: @implNote for invalid FilePermission
weijun
parents: 42343
diff changeset
   348
                    directory = true;
569aca644163 8168979: @implNote for invalid FilePermission
weijun
parents: 42343
diff changeset
   349
                    recursive = !rememberStar;
569aca644163 8168979: @implNote for invalid FilePermission
weijun
parents: 42343
diff changeset
   350
                    npath = npath.getParent();
569aca644163 8168979: @implNote for invalid FilePermission
weijun
parents: 42343
diff changeset
   351
                }
569aca644163 8168979: @implNote for invalid FilePermission
weijun
parents: 42343
diff changeset
   352
                if (npath == null) {
52727
396dfb0e8ba5 8213406: (fs) More than one instance of built-in FileSystem observed in heap
martin
parents: 52427
diff changeset
   353
                    npath = EMPTY_PATH;
42684
569aca644163 8168979: @implNote for invalid FilePermission
weijun
parents: 42343
diff changeset
   354
                }
41823
10b6e8a41af5 8167646: Better invalid FilePermission
weijun
parents: 41822
diff changeset
   355
                invalid = false;
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   356
            } catch (InvalidPathException ipe) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   357
                // Still invalid. For compatibility reason, accept it
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   358
                // but make this permission useless.
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   359
                npath = builtInFS.getPath("-u-s-e-l-e-s-s-");
41823
10b6e8a41af5 8167646: Better invalid FilePermission
weijun
parents: 41822
diff changeset
   360
                invalid = true;
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   361
            }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   362
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   363
        } else {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   364
            if ((cpath = getName()) == null)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   365
                throw new NullPointerException("name can't be null");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   366
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   367
            this.mask = mask;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   368
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   369
            if (cpath.equals("<<ALL FILES>>")) {
58617
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   370
                allFiles = true;
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   371
                directory = true;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   372
                recursive = true;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   373
                cpath = "";
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   374
                return;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   375
            }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   376
58617
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   377
            // Validate path by platform's default file system
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   378
            try {
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   379
                String name = cpath.endsWith("*") ? cpath.substring(0, cpath.length() - 1) + "-" : cpath;
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   380
                builtInFS.getPath(new File(name).getPath());
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   381
            } catch (InvalidPathException ipe) {
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   382
                invalid = true;
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   383
                return;
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   384
            }
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   385
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   386
            // store only the canonical cpath if possible
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   387
            cpath = AccessController.doPrivileged(new PrivilegedAction<>() {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   388
                public String run() {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   389
                    try {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   390
                        String path = cpath;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   391
                        if (cpath.endsWith("*")) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   392
                            // call getCanonicalPath with a path with wildcard character
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   393
                            // replaced to avoid calling it with paths that are
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   394
                            // intended to match all entries in a directory
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   395
                            path = path.substring(0, path.length() - 1) + "-";
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   396
                            path = new File(path).getCanonicalPath();
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   397
                            return path.substring(0, path.length() - 1) + "*";
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   398
                        } else {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   399
                            return new File(path).getCanonicalPath();
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   400
                        }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   401
                    } catch (IOException ioe) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   402
                        return cpath;
4053
c2f8e57ba2f8 6891707: Eliminate the java.io.FilePermission dependency on PolicyFile
mchung
parents: 2057
diff changeset
   403
                    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   404
                }
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   405
            });
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   406
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   407
            int len = cpath.length();
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   408
            char last = ((len > 0) ? cpath.charAt(len - 1) : 0);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   409
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   410
            if (last == RECURSIVE_CHAR &&
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   411
                    cpath.charAt(len - 2) == File.separatorChar) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   412
                directory = true;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   413
                recursive = true;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   414
                cpath = cpath.substring(0, --len);
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   415
            } else if (last == WILD_CHAR &&
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   416
                    cpath.charAt(len - 2) == File.separatorChar) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   417
                directory = true;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   418
                //recursive = false;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   419
                cpath = cpath.substring(0, --len);
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   420
            } else {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   421
                // overkill since they are initialized to false, but
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   422
                // commented out here to remind us...
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   423
                //directory = false;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   424
                //recursive = false;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   425
            }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   426
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   427
            // XXX: at this point the path should be absolute. die if it isn't?
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   428
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   429
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   430
90ce3da70b43 Initial load
duke
parents:
diff changeset
   431
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   432
     * Creates a new FilePermission object with the specified actions.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   433
     * <i>path</i> is the pathname of a file or directory, and <i>actions</i>
90ce3da70b43 Initial load
duke
parents:
diff changeset
   434
     * contains a comma-separated list of the desired actions granted on the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   435
     * file or directory. Possible actions are
2057
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
   436
     * "read", "write", "execute", "delete", and "readlink".
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   437
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   438
     * <p>A pathname that ends in "/*" (where "/" is
58288
48e480e56aad 8231186: Replace html tag <code>foo</code> with javadoc tag {@code foo} in java.base
jboes
parents: 58242
diff changeset
   439
     * the file separator character, {@code File.separatorChar})
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   440
     * indicates all the files and directories contained in that directory.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   441
     * A pathname that ends with "/-" indicates (recursively) all files and
90ce3da70b43 Initial load
duke
parents:
diff changeset
   442
     * subdirectories contained in that directory. The special pathname
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   443
     * {@literal "<<ALL FILES>>"} matches any file.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   444
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   445
     * <p>A pathname consisting of a single "*" indicates all the files
90ce3da70b43 Initial load
duke
parents:
diff changeset
   446
     * in the current directory, while a pathname consisting of a single "-"
90ce3da70b43 Initial load
duke
parents:
diff changeset
   447
     * indicates all the files in the current directory and
90ce3da70b43 Initial load
duke
parents:
diff changeset
   448
     * (recursively) all files and subdirectories contained in the current
90ce3da70b43 Initial load
duke
parents:
diff changeset
   449
     * directory.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   450
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   451
     * <p>A pathname containing an empty string represents an empty path.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   452
     *
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   453
     * @implNote In this implementation, the
55026
a8673ccddffd 8214563: Use {@systemProperty} in specification of system properties in java.nio packages
dkejriwal
parents: 52727
diff changeset
   454
     * {@systemProperty jdk.io.permissionsUseCanonicalPath} system property
a8673ccddffd 8214563: Use {@systemProperty} in specification of system properties in java.nio packages
dkejriwal
parents: 52727
diff changeset
   455
     * dictates how the {@code path} argument is processed and stored.
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   456
     * <P>
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   457
     * If the value of the system property is set to {@code true}, {@code path}
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   458
     * is canonicalized and stored as a String object named {@code cpath}.
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   459
     * This means a relative path is converted to an absolute path, a Windows
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   460
     * DOS-style 8.3 path is expanded to a long path, and a symbolic link is
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   461
     * resolved to its target, etc.
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   462
     * <P>
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   463
     * If the value of the system property is set to {@code false}, {@code path}
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   464
     * is converted to a {@link java.nio.file.Path} object named {@code npath}
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   465
     * after {@link Path#normalize() normalization}. No canonicalization is
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   466
     * performed which means the underlying file system is not accessed.
42684
569aca644163 8168979: @implNote for invalid FilePermission
weijun
parents: 42343
diff changeset
   467
     * If an {@link InvalidPathException} is thrown during the conversion,
569aca644163 8168979: @implNote for invalid FilePermission
weijun
parents: 42343
diff changeset
   468
     * this {@code FilePermission} will be labeled as invalid.
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   469
     * <P>
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   470
     * In either case, the "*" or "-" character at the end of a wildcard
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   471
     * {@code path} is removed before canonicalization or normalization.
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   472
     * It is stored in a separate wildcard flag field.
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   473
     * <P>
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   474
     * The default value of the {@code jdk.io.permissionsUseCanonicalPath}
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   475
     * system property is {@code false} in this implementation.
58612
32aff2b7585b 8209901: Canonical file handling
weijun
parents: 58388
diff changeset
   476
     * <p>
32aff2b7585b 8209901: Canonical file handling
weijun
parents: 58388
diff changeset
   477
     * The value can also be set with a security property using the same name,
32aff2b7585b 8209901: Canonical file handling
weijun
parents: 58388
diff changeset
   478
     * but setting a system property will override the security property value.
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   479
     *
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   480
     * @param path the pathname of the file/directory.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   481
     * @param actions the action string.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   482
     *
58653
71fef5fae9cc 8230407: SocketPermission and FilePermission action list allows leading comma
igerasim
parents: 58617
diff changeset
   483
     * @throws IllegalArgumentException if actions is {@code null}, empty,
71fef5fae9cc 8230407: SocketPermission and FilePermission action list allows leading comma
igerasim
parents: 58617
diff changeset
   484
     *         malformed or contains an action other than the specified
71fef5fae9cc 8230407: SocketPermission and FilePermission action list allows leading comma
igerasim
parents: 58617
diff changeset
   485
     *         possible actions
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   486
     */
14014
da3648e13e67 8000269: Cleanup javadoc warnings
alanb
parents: 13795
diff changeset
   487
    public FilePermission(String path, String actions) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   488
        super(path);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   489
        init(getMask(actions));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   490
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   491
90ce3da70b43 Initial load
duke
parents:
diff changeset
   492
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   493
     * Creates a new FilePermission object using an action mask.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   494
     * More efficient than the FilePermission(String, String) constructor.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   495
     * Can be used from within
90ce3da70b43 Initial load
duke
parents:
diff changeset
   496
     * code that needs to create a FilePermission object to pass into the
58288
48e480e56aad 8231186: Replace html tag <code>foo</code> with javadoc tag {@code foo} in java.base
jboes
parents: 58242
diff changeset
   497
     * {@code implies} method.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   498
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   499
     * @param path the pathname of the file/directory.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   500
     * @param mask the action mask to use.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   501
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   502
    // package private for use by the FilePermissionCollection add method
14014
da3648e13e67 8000269: Cleanup javadoc warnings
alanb
parents: 13795
diff changeset
   503
    FilePermission(String path, int mask) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   504
        super(path);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   505
        init(mask);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   506
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   507
90ce3da70b43 Initial load
duke
parents:
diff changeset
   508
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   509
     * Checks if this FilePermission object "implies" the specified permission.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   510
     * <P>
21334
c60dfce46a77 8026982: javadoc errors in core libs
rriggs
parents: 16100
diff changeset
   511
     * More specifically, this method returns true if:
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   512
     * <ul>
21334
c60dfce46a77 8026982: javadoc errors in core libs
rriggs
parents: 16100
diff changeset
   513
     * <li> <i>p</i> is an instanceof FilePermission,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   514
     * <li> <i>p</i>'s actions are a proper subset of this
21334
c60dfce46a77 8026982: javadoc errors in core libs
rriggs
parents: 16100
diff changeset
   515
     * object's actions, and
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   516
     * <li> <i>p</i>'s pathname is implied by this object's
90ce3da70b43 Initial load
duke
parents:
diff changeset
   517
     *      pathname. For example, "/tmp/*" implies "/tmp/foo", since
90ce3da70b43 Initial load
duke
parents:
diff changeset
   518
     *      "/tmp/*" encompasses all files in the "/tmp" directory,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   519
     *      including the one named "foo".
90ce3da70b43 Initial load
duke
parents:
diff changeset
   520
     * </ul>
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   521
     * <P>
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   522
     * Precisely, a simple pathname implies another simple pathname
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   523
     * if and only if they are equal. A simple pathname never implies
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   524
     * a wildcard pathname. A wildcard pathname implies another wildcard
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   525
     * pathname if and only if all simple pathnames implied by the latter
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   526
     * are implied by the former. A wildcard pathname implies a simple
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   527
     * pathname if and only if
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   528
     * <ul>
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   529
     *     <li>if the wildcard flag is "*", the simple pathname's path
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   530
     *     must be right inside the wildcard pathname's path.
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   531
     *     <li>if the wildcard flag is "-", the simple pathname's path
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   532
     *     must be recursively inside the wildcard pathname's path.
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   533
     * </ul>
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   534
     * <P>
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   535
     * {@literal "<<ALL FILES>>"} implies every other pathname. No pathname,
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   536
     * except for {@literal "<<ALL FILES>>"} itself, implies
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   537
     * {@literal "<<ALL FILES>>"}.
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   538
     *
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   539
     * @implNote
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   540
     * If {@code jdk.io.permissionsUseCanonicalPath} is {@code true}, a
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   541
     * simple {@code cpath} is inside a wildcard {@code cpath} if and only if
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   542
     * after removing the base name (the last name in the pathname's name
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   543
     * sequence) from the former the remaining part equals to the latter,
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   544
     * a simple {@code cpath} is recursively inside a wildcard {@code cpath}
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   545
     * if and only if the former starts with the latter.
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   546
     * <p>
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   547
     * If {@code jdk.io.permissionsUseCanonicalPath} is {@code false}, a
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   548
     * simple {@code npath} is inside a wildcard {@code npath} if and only if
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   549
     * {@code  simple_npath.relativize(wildcard_npath)} is exactly "..",
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   550
     * a simple {@code npath} is recursively inside a wildcard {@code npath}
42999
110c2df82517 8170900: Issue with FilePermission::implies for wildcard flag(-)
weijun
parents: 42684
diff changeset
   551
     * if and only if {@code simple_npath.relativize(wildcard_npath)} is a
110c2df82517 8170900: Issue with FilePermission::implies for wildcard flag(-)
weijun
parents: 42684
diff changeset
   552
     * series of one or more "..". This means "/-" implies "/foo" but not "foo".
110c2df82517 8170900: Issue with FilePermission::implies for wildcard flag(-)
weijun
parents: 42684
diff changeset
   553
     * <p>
110c2df82517 8170900: Issue with FilePermission::implies for wildcard flag(-)
weijun
parents: 42684
diff changeset
   554
     * An invalid {@code FilePermission} does not imply any object except for
110c2df82517 8170900: Issue with FilePermission::implies for wildcard flag(-)
weijun
parents: 42684
diff changeset
   555
     * itself. An invalid {@code FilePermission} is not implied by any object
110c2df82517 8170900: Issue with FilePermission::implies for wildcard flag(-)
weijun
parents: 42684
diff changeset
   556
     * except for itself or a {@code FilePermission} on
110c2df82517 8170900: Issue with FilePermission::implies for wildcard flag(-)
weijun
parents: 42684
diff changeset
   557
     * {@literal "<<ALL FILES>>"} whose actions is a superset of this
42684
569aca644163 8168979: @implNote for invalid FilePermission
weijun
parents: 42343
diff changeset
   558
     * invalid {@code FilePermission}. Even if two {@code FilePermission}
569aca644163 8168979: @implNote for invalid FilePermission
weijun
parents: 42343
diff changeset
   559
     * are created with the same invalid path, one does not imply the other.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   560
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   561
     * @param p the permission to check against.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   562
     *
58288
48e480e56aad 8231186: Replace html tag <code>foo</code> with javadoc tag {@code foo} in java.base
jboes
parents: 58242
diff changeset
   563
     * @return {@code true} if the specified permission is not
48e480e56aad 8231186: Replace html tag <code>foo</code> with javadoc tag {@code foo} in java.base
jboes
parents: 58242
diff changeset
   564
     *                  {@code null} and is implied by this object,
48e480e56aad 8231186: Replace html tag <code>foo</code> with javadoc tag {@code foo} in java.base
jboes
parents: 58242
diff changeset
   565
     *                  {@code false} otherwise.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   566
     */
31080
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
   567
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   568
    public boolean implies(Permission p) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   569
        if (!(p instanceof FilePermission))
90ce3da70b43 Initial load
duke
parents:
diff changeset
   570
            return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   571
90ce3da70b43 Initial load
duke
parents:
diff changeset
   572
        FilePermission that = (FilePermission) p;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   573
90ce3da70b43 Initial load
duke
parents:
diff changeset
   574
        // we get the effective mask. i.e., the "and" of this and that.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   575
        // They must be equal to that.mask for implies to return true.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   576
90ce3da70b43 Initial load
duke
parents:
diff changeset
   577
        return ((this.mask & that.mask) == that.mask) && impliesIgnoreMask(that);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   578
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   579
90ce3da70b43 Initial load
duke
parents:
diff changeset
   580
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   581
     * Checks if the Permission's actions are a proper subset of the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   582
     * this object's actions. Returns the effective mask iff the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   583
     * this FilePermission's path also implies that FilePermission's path.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   584
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   585
     * @param that the FilePermission to check against.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   586
     * @return the effective mask
90ce3da70b43 Initial load
duke
parents:
diff changeset
   587
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   588
    boolean impliesIgnoreMask(FilePermission that) {
58617
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   589
        if (this == that) {
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   590
            return true;
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   591
        }
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   592
        if (allFiles) {
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   593
            return true;
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   594
        }
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   595
        if (this.invalid || that.invalid) {
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   596
            return false;
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   597
        }
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   598
        if (that.allFiles) {
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   599
            return false;
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   600
        }
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   601
        if (FilePermCompat.nb) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   602
            // Left at least same level of wildness as right
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   603
            if ((this.recursive && that.recursive) != that.recursive
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   604
                    || (this.directory && that.directory) != that.directory) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   605
                return false;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   606
            }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   607
            // Same npath is good as long as both or neither are directories
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   608
            if (this.npath.equals(that.npath)
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   609
                    && this.directory == that.directory) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   610
                return true;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   611
            }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   612
            int diff = containsPath(this.npath, that.npath);
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   613
            // Right inside left is good if recursive
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   614
            if (diff >= 1 && recursive) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   615
                return true;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   616
            }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   617
            // Right right inside left if it is element in set
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   618
            if (diff == 1 && directory && !that.directory) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   619
                return true;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   620
            }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   621
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   622
            // Hack: if a npath2 field exists, apply the same checks
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   623
            // on it as a fallback.
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   624
            if (this.npath2 != null) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   625
                if (this.npath2.equals(that.npath)
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   626
                        && this.directory == that.directory) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   627
                    return true;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   628
                }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   629
                diff = containsPath(this.npath2, that.npath);
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   630
                if (diff >= 1 && recursive) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   631
                    return true;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   632
                }
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   633
                if (diff == 1 && directory && !that.directory) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   634
                    return true;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   635
                }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   636
            }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   637
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   638
            return false;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   639
        } else {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   640
            if (this.directory) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   641
                if (this.recursive) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   642
                    // make sure that.path is longer then path so
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   643
                    // something like /foo/- does not imply /foo
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   644
                    if (that.directory) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   645
                        return (that.cpath.length() >= this.cpath.length()) &&
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   646
                                that.cpath.startsWith(this.cpath);
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   647
                    } else {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   648
                        return ((that.cpath.length() > this.cpath.length()) &&
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   649
                                that.cpath.startsWith(this.cpath));
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   650
                    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   651
                } else {
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   652
                    if (that.directory) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   653
                        // if the permission passed in is a directory
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   654
                        // specification, make sure that a non-recursive
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   655
                        // permission (i.e., this object) can't imply a recursive
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   656
                        // permission.
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   657
                        if (that.recursive)
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   658
                            return false;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   659
                        else
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   660
                            return (this.cpath.equals(that.cpath));
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   661
                    } else {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   662
                        int last = that.cpath.lastIndexOf(File.separatorChar);
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   663
                        if (last == -1)
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   664
                            return false;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   665
                        else {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   666
                            // this.cpath.equals(that.cpath.substring(0, last+1));
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   667
                            // Use regionMatches to avoid creating new string
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   668
                            return (this.cpath.length() == (last + 1)) &&
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   669
                                    this.cpath.regionMatches(0, that.cpath, 0, last + 1);
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   670
                        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   671
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   672
                }
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   673
            } else if (that.directory) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   674
                // if this is NOT recursive/wildcarded,
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   675
                // do not let it imply a recursive/wildcarded permission
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   676
                return false;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   677
            } else {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   678
                return (this.cpath.equals(that.cpath));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   679
            }
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   680
        }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   681
    }
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   682
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   683
    /**
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   684
     * Returns the depth between an outer path p1 and an inner path p2. -1
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   685
     * is returned if
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   686
     *
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   687
     * - p1 does not contains p2.
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   688
     * - this is not decidable. For example, p1="../x", p2="y".
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   689
     * - the depth is not decidable. For example, p1="/", p2="x".
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   690
     *
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   691
     * This method can return 2 if the depth is greater than 2.
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   692
     *
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   693
     * @param p1 the expected outer path, normalized
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   694
     * @param p2 the expected inner path, normalized
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   695
     * @return the depth in between
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   696
     */
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   697
    private static int containsPath(Path p1, Path p2) {
44638
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   698
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   699
        // Two paths must have the same root. For example,
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   700
        // there is no contains relation between any two of
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   701
        // "/x", "x", "C:/x", "C:x", and "//host/share/x".
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   702
        if (!Objects.equals(p1.getRoot(), p2.getRoot())) {
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   703
            return -1;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   704
        }
44638
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   705
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   706
        // Empty path (i.e. "." or "") is a strange beast,
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   707
        // because its getNameCount()==1 but getName(0) is null.
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   708
        // It's better to deal with it separately.
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   709
        if (p1.equals(EMPTY_PATH)) {
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   710
            if (p2.equals(EMPTY_PATH)) {
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   711
                return 0;
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   712
            } else if (p2.getName(0).equals(DOTDOT_PATH)) {
47478
438e0c9f2f17 8190382: fix small typographic errors in comments
smarks
parents: 47216
diff changeset
   713
                // "." contains p2 iff p2 has no "..". Since
44638
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   714
                // a normalized path can only have 0 or more
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   715
                // ".." at the beginning. We only need to look
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   716
                // at the head.
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   717
                return -1;
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   718
            } else {
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   719
                // and the distance is p2's name count. i.e.
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   720
                // 3 between "." and "a/b/c".
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   721
                return p2.getNameCount();
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   722
            }
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   723
        } else if (p2.equals(EMPTY_PATH)) {
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   724
            int c1 = p1.getNameCount();
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   725
            if (!p1.getName(c1 - 1).equals(DOTDOT_PATH)) {
47478
438e0c9f2f17 8190382: fix small typographic errors in comments
smarks
parents: 47216
diff changeset
   726
                // "." is inside p1 iff p1 is 1 or more "..".
44638
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   727
                // For the same reason above, we only need to
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   728
                // look at the tail.
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   729
                return -1;
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   730
            }
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   731
            // and the distance is the count of ".."
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   732
            return c1;
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   733
        }
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   734
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   735
        // Good. No more empty paths.
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   736
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   737
        // Common heads are removed
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   738
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   739
        int c1 = p1.getNameCount();
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   740
        int c2 = p2.getNameCount();
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   741
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   742
        int n = Math.min(c1, c2);
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   743
        int i = 0;
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   744
        while (i < n) {
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   745
            if (!p1.getName(i).equals(p2.getName(i)))
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   746
                break;
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   747
            i++;
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   748
        }
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   749
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   750
        // for p1 containing p2, p1 must be 0-or-more "..",
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   751
        // and p2 cannot have "..". For the same reason, we only
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   752
        // check tail of p1 and head of p2.
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   753
        if (i < c1 && !p1.getName(c1 - 1).equals(DOTDOT_PATH)) {
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   754
            return -1;
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   755
        }
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   756
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   757
        if (i < c2 && p2.getName(i).equals(DOTDOT_PATH)) {
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   758
            return -1;
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   759
        }
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   760
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   761
        // and the distance is the name counts added (after removing
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   762
        // the common heads).
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   763
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   764
        // For example: p1 = "../../..", p2 = "../a".
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   765
        // After removing the common heads, they become "../.." and "a",
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   766
        // and the distance is (3-1)+(2-1) = 3.
525862468d5a 8177969: Faster FilePermission::implies by avoiding the use of Path::relativize
weijun
parents: 42999
diff changeset
   767
        return c1 - i + c2 - i;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   768
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   769
90ce3da70b43 Initial load
duke
parents:
diff changeset
   770
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   771
     * Checks two FilePermission objects for equality. Checks that <i>obj</i> is
90ce3da70b43 Initial load
duke
parents:
diff changeset
   772
     * a FilePermission, and has the same pathname and actions as this object.
21801
b8a5ff5f0c2a 8028049: Tidy warnings cleanup for packages java.nio/java.io
yan
parents: 21334
diff changeset
   773
     *
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   774
     * @implNote More specifically, two pathnames are the same if and only if
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   775
     * they have the same wildcard flag and their {@code cpath}
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   776
     * (if {@code jdk.io.permissionsUseCanonicalPath} is {@code true}) or
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   777
     * {@code npath} (if {@code jdk.io.permissionsUseCanonicalPath}
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   778
     * is {@code false}) are equal. Or they are both {@literal "<<ALL FILES>>"}.
42684
569aca644163 8168979: @implNote for invalid FilePermission
weijun
parents: 42343
diff changeset
   779
     * <p>
569aca644163 8168979: @implNote for invalid FilePermission
weijun
parents: 42343
diff changeset
   780
     * When {@code jdk.io.permissionsUseCanonicalPath} is {@code false}, an
569aca644163 8168979: @implNote for invalid FilePermission
weijun
parents: 42343
diff changeset
   781
     * invalid {@code FilePermission} does not equal to any object except
569aca644163 8168979: @implNote for invalid FilePermission
weijun
parents: 42343
diff changeset
   782
     * for itself, even if they are created using the same invalid path.
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   783
     *
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   784
     * @param obj the object we are testing for equality with this object.
58288
48e480e56aad 8231186: Replace html tag <code>foo</code> with javadoc tag {@code foo} in java.base
jboes
parents: 58242
diff changeset
   785
     * @return {@code true} if obj is a FilePermission, and has the same
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   786
     *          pathname and actions as this FilePermission object,
58288
48e480e56aad 8231186: Replace html tag <code>foo</code> with javadoc tag {@code foo} in java.base
jboes
parents: 58242
diff changeset
   787
     *          {@code false} otherwise.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   788
     */
31080
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
   789
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   790
    public boolean equals(Object obj) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   791
        if (obj == this)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   792
            return true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   793
90ce3da70b43 Initial load
duke
parents:
diff changeset
   794
        if (! (obj instanceof FilePermission))
90ce3da70b43 Initial load
duke
parents:
diff changeset
   795
            return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   796
90ce3da70b43 Initial load
duke
parents:
diff changeset
   797
        FilePermission that = (FilePermission) obj;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   798
58617
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   799
        if (this.invalid || that.invalid) {
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   800
            return false;
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   801
        }
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   802
        if (FilePermCompat.nb) {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   803
            return (this.mask == that.mask) &&
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   804
                    (this.allFiles == that.allFiles) &&
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   805
                    this.npath.equals(that.npath) &&
41822
9398d77cc4bb 8168127: FilePermissionCollection merges incorrectly
weijun
parents: 41377
diff changeset
   806
                    Objects.equals(npath2, that.npath2) &&
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   807
                    (this.directory == that.directory) &&
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   808
                    (this.recursive == that.recursive);
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   809
        } else {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   810
            return (this.mask == that.mask) &&
58617
037ca385e957 8213429: Windows file handling redux
aefimov
parents: 58612
diff changeset
   811
                    (this.allFiles == that.allFiles) &&
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   812
                    this.cpath.equals(that.cpath) &&
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   813
                    (this.directory == that.directory) &&
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   814
                    (this.recursive == that.recursive);
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   815
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   816
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   817
90ce3da70b43 Initial load
duke
parents:
diff changeset
   818
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   819
     * Returns the hash code value for this object.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   820
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   821
     * @return a hash code value for this object.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   822
     */
31080
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
   823
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   824
    public int hashCode() {
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   825
        if (FilePermCompat.nb) {
41822
9398d77cc4bb 8168127: FilePermissionCollection merges incorrectly
weijun
parents: 41377
diff changeset
   826
            return Objects.hash(
41823
10b6e8a41af5 8167646: Better invalid FilePermission
weijun
parents: 41822
diff changeset
   827
                    mask, allFiles, directory, recursive, npath, npath2, invalid);
41377
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   828
        } else {
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   829
            return 0;
271ee055cb31 8164705: Remove pathname canonicalization from FilePermission
weijun
parents: 32649
diff changeset
   830
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   831
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   832
90ce3da70b43 Initial load
duke
parents:
diff changeset
   833
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   834
     * Converts an actions String to an actions mask.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   835
     *
13795
73850c397272 7193406: Clean-up JDK Build Warnings in java.util, java.io
dxu
parents: 9035
diff changeset
   836
     * @param actions the action string.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   837
     * @return the actions mask.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   838
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   839
    private static int getMask(String actions) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   840
        int mask = NONE;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   841
90ce3da70b43 Initial load
duke
parents:
diff changeset
   842
        // Null action valid?
90ce3da70b43 Initial load
duke
parents:
diff changeset
   843
        if (actions == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   844
            return mask;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   845
        }
13795
73850c397272 7193406: Clean-up JDK Build Warnings in java.util, java.io
dxu
parents: 9035
diff changeset
   846
73850c397272 7193406: Clean-up JDK Build Warnings in java.util, java.io
dxu
parents: 9035
diff changeset
   847
        // Use object identity comparison against known-interned strings for
73850c397272 7193406: Clean-up JDK Build Warnings in java.util, java.io
dxu
parents: 9035
diff changeset
   848
        // performance benefit (these values are used heavily within the JDK).
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   849
        if (actions == SecurityConstants.FILE_READ_ACTION) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   850
            return READ;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   851
        } else if (actions == SecurityConstants.FILE_WRITE_ACTION) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   852
            return WRITE;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   853
        } else if (actions == SecurityConstants.FILE_EXECUTE_ACTION) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   854
            return EXECUTE;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   855
        } else if (actions == SecurityConstants.FILE_DELETE_ACTION) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   856
            return DELETE;
2057
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
   857
        } else if (actions == SecurityConstants.FILE_READLINK_ACTION) {
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
   858
            return READLINK;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   859
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   860
90ce3da70b43 Initial load
duke
parents:
diff changeset
   861
        char[] a = actions.toCharArray();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   862
90ce3da70b43 Initial load
duke
parents:
diff changeset
   863
        int i = a.length - 1;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   864
        if (i < 0)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   865
            return mask;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   866
90ce3da70b43 Initial load
duke
parents:
diff changeset
   867
        while (i != -1) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   868
            char c;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   869
90ce3da70b43 Initial load
duke
parents:
diff changeset
   870
            // skip whitespace
90ce3da70b43 Initial load
duke
parents:
diff changeset
   871
            while ((i!=-1) && ((c = a[i]) == ' ' ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   872
                               c == '\r' ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   873
                               c == '\n' ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   874
                               c == '\f' ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   875
                               c == '\t'))
90ce3da70b43 Initial load
duke
parents:
diff changeset
   876
                i--;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   877
90ce3da70b43 Initial load
duke
parents:
diff changeset
   878
            // check for the known strings
90ce3da70b43 Initial load
duke
parents:
diff changeset
   879
            int matchlen;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   880
90ce3da70b43 Initial load
duke
parents:
diff changeset
   881
            if (i >= 3 && (a[i-3] == 'r' || a[i-3] == 'R') &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   882
                          (a[i-2] == 'e' || a[i-2] == 'E') &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   883
                          (a[i-1] == 'a' || a[i-1] == 'A') &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   884
                          (a[i] == 'd' || a[i] == 'D'))
90ce3da70b43 Initial load
duke
parents:
diff changeset
   885
            {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   886
                matchlen = 4;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   887
                mask |= READ;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   888
90ce3da70b43 Initial load
duke
parents:
diff changeset
   889
            } else if (i >= 4 && (a[i-4] == 'w' || a[i-4] == 'W') &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   890
                                 (a[i-3] == 'r' || a[i-3] == 'R') &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   891
                                 (a[i-2] == 'i' || a[i-2] == 'I') &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   892
                                 (a[i-1] == 't' || a[i-1] == 'T') &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   893
                                 (a[i] == 'e' || a[i] == 'E'))
90ce3da70b43 Initial load
duke
parents:
diff changeset
   894
            {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   895
                matchlen = 5;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   896
                mask |= WRITE;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   897
90ce3da70b43 Initial load
duke
parents:
diff changeset
   898
            } else if (i >= 6 && (a[i-6] == 'e' || a[i-6] == 'E') &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   899
                                 (a[i-5] == 'x' || a[i-5] == 'X') &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   900
                                 (a[i-4] == 'e' || a[i-4] == 'E') &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   901
                                 (a[i-3] == 'c' || a[i-3] == 'C') &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   902
                                 (a[i-2] == 'u' || a[i-2] == 'U') &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   903
                                 (a[i-1] == 't' || a[i-1] == 'T') &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   904
                                 (a[i] == 'e' || a[i] == 'E'))
90ce3da70b43 Initial load
duke
parents:
diff changeset
   905
            {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   906
                matchlen = 7;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   907
                mask |= EXECUTE;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   908
90ce3da70b43 Initial load
duke
parents:
diff changeset
   909
            } else if (i >= 5 && (a[i-5] == 'd' || a[i-5] == 'D') &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   910
                                 (a[i-4] == 'e' || a[i-4] == 'E') &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   911
                                 (a[i-3] == 'l' || a[i-3] == 'L') &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   912
                                 (a[i-2] == 'e' || a[i-2] == 'E') &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   913
                                 (a[i-1] == 't' || a[i-1] == 'T') &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   914
                                 (a[i] == 'e' || a[i] == 'E'))
90ce3da70b43 Initial load
duke
parents:
diff changeset
   915
            {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   916
                matchlen = 6;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   917
                mask |= DELETE;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   918
2057
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
   919
            } else if (i >= 7 && (a[i-7] == 'r' || a[i-7] == 'R') &&
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
   920
                                 (a[i-6] == 'e' || a[i-6] == 'E') &&
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
   921
                                 (a[i-5] == 'a' || a[i-5] == 'A') &&
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
   922
                                 (a[i-4] == 'd' || a[i-4] == 'D') &&
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
   923
                                 (a[i-3] == 'l' || a[i-3] == 'L') &&
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
   924
                                 (a[i-2] == 'i' || a[i-2] == 'I') &&
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
   925
                                 (a[i-1] == 'n' || a[i-1] == 'N') &&
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
   926
                                 (a[i] == 'k' || a[i] == 'K'))
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
   927
            {
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
   928
                matchlen = 8;
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
   929
                mask |= READLINK;
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
   930
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   931
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   932
                // parse error
90ce3da70b43 Initial load
duke
parents:
diff changeset
   933
                throw new IllegalArgumentException(
90ce3da70b43 Initial load
duke
parents:
diff changeset
   934
                        "invalid permission: " + actions);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   935
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   936
90ce3da70b43 Initial load
duke
parents:
diff changeset
   937
            // make sure we didn't just match the tail of a word
58653
71fef5fae9cc 8230407: SocketPermission and FilePermission action list allows leading comma
igerasim
parents: 58617
diff changeset
   938
            // like "ackbarfdelete".  Also, skip to the comma.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   939
            boolean seencomma = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   940
            while (i >= matchlen && !seencomma) {
58653
71fef5fae9cc 8230407: SocketPermission and FilePermission action list allows leading comma
igerasim
parents: 58617
diff changeset
   941
                switch (c = a[i-matchlen]) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   942
                case ' ': case '\r': case '\n':
90ce3da70b43 Initial load
duke
parents:
diff changeset
   943
                case '\f': case '\t':
90ce3da70b43 Initial load
duke
parents:
diff changeset
   944
                    break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   945
                default:
58653
71fef5fae9cc 8230407: SocketPermission and FilePermission action list allows leading comma
igerasim
parents: 58617
diff changeset
   946
                    if (c == ',' && i > matchlen) {
71fef5fae9cc 8230407: SocketPermission and FilePermission action list allows leading comma
igerasim
parents: 58617
diff changeset
   947
                        seencomma = true;
71fef5fae9cc 8230407: SocketPermission and FilePermission action list allows leading comma
igerasim
parents: 58617
diff changeset
   948
                        break;
71fef5fae9cc 8230407: SocketPermission and FilePermission action list allows leading comma
igerasim
parents: 58617
diff changeset
   949
                    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   950
                    throw new IllegalArgumentException(
90ce3da70b43 Initial load
duke
parents:
diff changeset
   951
                            "invalid permission: " + actions);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   952
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   953
                i--;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   954
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   955
90ce3da70b43 Initial load
duke
parents:
diff changeset
   956
            // point i at the location of the comma minus one (or -1).
90ce3da70b43 Initial load
duke
parents:
diff changeset
   957
            i -= matchlen;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   958
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   959
90ce3da70b43 Initial load
duke
parents:
diff changeset
   960
        return mask;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   961
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   962
90ce3da70b43 Initial load
duke
parents:
diff changeset
   963
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   964
     * Return the current action mask. Used by the FilePermissionCollection.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   965
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   966
     * @return the actions mask.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   967
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   968
    int getMask() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   969
        return mask;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   970
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   971
90ce3da70b43 Initial load
duke
parents:
diff changeset
   972
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   973
     * Return the canonical string representation of the actions.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   974
     * Always returns present actions in the following order:
2057
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
   975
     * read, write, execute, delete, readlink.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   976
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   977
     * @return the canonical string representation of the actions.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   978
     */
14014
da3648e13e67 8000269: Cleanup javadoc warnings
alanb
parents: 13795
diff changeset
   979
    private static String getActions(int mask) {
26219
1a19360ff122 8054714: Use StringJoiner where it makes the code cleaner
igerasim
parents: 25859
diff changeset
   980
        StringJoiner sj = new StringJoiner(",");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   981
90ce3da70b43 Initial load
duke
parents:
diff changeset
   982
        if ((mask & READ) == READ) {
26219
1a19360ff122 8054714: Use StringJoiner where it makes the code cleaner
igerasim
parents: 25859
diff changeset
   983
            sj.add("read");
1a19360ff122 8054714: Use StringJoiner where it makes the code cleaner
igerasim
parents: 25859
diff changeset
   984
        }
1a19360ff122 8054714: Use StringJoiner where it makes the code cleaner
igerasim
parents: 25859
diff changeset
   985
        if ((mask & WRITE) == WRITE) {
1a19360ff122 8054714: Use StringJoiner where it makes the code cleaner
igerasim
parents: 25859
diff changeset
   986
            sj.add("write");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   987
        }
26219
1a19360ff122 8054714: Use StringJoiner where it makes the code cleaner
igerasim
parents: 25859
diff changeset
   988
        if ((mask & EXECUTE) == EXECUTE) {
1a19360ff122 8054714: Use StringJoiner where it makes the code cleaner
igerasim
parents: 25859
diff changeset
   989
            sj.add("execute");
1a19360ff122 8054714: Use StringJoiner where it makes the code cleaner
igerasim
parents: 25859
diff changeset
   990
        }
1a19360ff122 8054714: Use StringJoiner where it makes the code cleaner
igerasim
parents: 25859
diff changeset
   991
        if ((mask & DELETE) == DELETE) {
1a19360ff122 8054714: Use StringJoiner where it makes the code cleaner
igerasim
parents: 25859
diff changeset
   992
            sj.add("delete");
1a19360ff122 8054714: Use StringJoiner where it makes the code cleaner
igerasim
parents: 25859
diff changeset
   993
        }
1a19360ff122 8054714: Use StringJoiner where it makes the code cleaner
igerasim
parents: 25859
diff changeset
   994
        if ((mask & READLINK) == READLINK) {
1a19360ff122 8054714: Use StringJoiner where it makes the code cleaner
igerasim
parents: 25859
diff changeset
   995
            sj.add("readlink");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   996
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   997
26219
1a19360ff122 8054714: Use StringJoiner where it makes the code cleaner
igerasim
parents: 25859
diff changeset
   998
        return sj.toString();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   999
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1000
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1001
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1002
     * Returns the "canonical string representation" of the actions.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1003
     * That is, this method always returns present actions in the following order:
2057
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
  1004
     * read, write, execute, delete, readlink. For example, if this FilePermission
58288
48e480e56aad 8231186: Replace html tag <code>foo</code> with javadoc tag {@code foo} in java.base
jboes
parents: 58242
diff changeset
  1005
     * object allows both write and read actions, a call to {@code getActions}
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1006
     * will return the string "read,write".
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1007
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1008
     * @return the canonical string representation of the actions.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1009
     */
31080
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1010
    @Override
14014
da3648e13e67 8000269: Cleanup javadoc warnings
alanb
parents: 13795
diff changeset
  1011
    public String getActions() {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1012
        if (actions == null)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1013
            actions = getActions(this.mask);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1014
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1015
        return actions;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1016
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1017
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1018
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1019
     * Returns a new PermissionCollection object for storing FilePermission
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1020
     * objects.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1021
     * <p>
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1022
     * FilePermission objects must be stored in a manner that allows them
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1023
     * to be inserted into the collection in any order, but that also enables the
58288
48e480e56aad 8231186: Replace html tag <code>foo</code> with javadoc tag {@code foo} in java.base
jboes
parents: 58242
diff changeset
  1024
     * PermissionCollection {@code implies}
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1025
     * method to be implemented in an efficient (and consistent) manner.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1026
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1027
     * <p>For example, if you have two FilePermissions:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1028
     * <OL>
58288
48e480e56aad 8231186: Replace html tag <code>foo</code> with javadoc tag {@code foo} in java.base
jboes
parents: 58242
diff changeset
  1029
     * <LI>  {@code "/tmp/-", "read"}
48e480e56aad 8231186: Replace html tag <code>foo</code> with javadoc tag {@code foo} in java.base
jboes
parents: 58242
diff changeset
  1030
     * <LI>  {@code "/tmp/scratch/foo", "write"}
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1031
     * </OL>
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1032
     *
58288
48e480e56aad 8231186: Replace html tag <code>foo</code> with javadoc tag {@code foo} in java.base
jboes
parents: 58242
diff changeset
  1033
     * <p>and you are calling the {@code implies} method with the FilePermission:
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1034
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1035
     * <pre>
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1036
     *   "/tmp/scratch/foo", "read,write",
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1037
     * </pre>
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1038
     *
58288
48e480e56aad 8231186: Replace html tag <code>foo</code> with javadoc tag {@code foo} in java.base
jboes
parents: 58242
diff changeset
  1039
     * then the {@code implies} function must
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1040
     * take into account both the "/tmp/-" and "/tmp/scratch/foo"
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1041
     * permissions, so the effective permission is "read,write",
58288
48e480e56aad 8231186: Replace html tag <code>foo</code> with javadoc tag {@code foo} in java.base
jboes
parents: 58242
diff changeset
  1042
     * and {@code implies} returns true. The "implies" semantics for
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1043
     * FilePermissions are handled properly by the PermissionCollection object
58288
48e480e56aad 8231186: Replace html tag <code>foo</code> with javadoc tag {@code foo} in java.base
jboes
parents: 58242
diff changeset
  1044
     * returned by this {@code newPermissionCollection} method.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1045
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1046
     * @return a new PermissionCollection object suitable for storing
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1047
     * FilePermissions.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1048
     */
31080
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1049
    @Override
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1050
    public PermissionCollection newPermissionCollection() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1051
        return new FilePermissionCollection();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1052
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1053
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1054
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1055
     * WriteObject is called to save the state of the FilePermission
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1056
     * to a stream. The actions are serialized, and the superclass
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1057
     * takes care of the name.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1058
     */
57956
e0b8b019d2f5 8229997: Apply java.io.Serial annotations in java.base
darcy
parents: 55026
diff changeset
  1059
    @java.io.Serial
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1060
    private void writeObject(ObjectOutputStream s)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1061
        throws IOException
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1062
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1063
        // Write out the actions. The superclass takes care of the name
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1064
        // call getActions to make sure actions field is initialized
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1065
        if (actions == null)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1066
            getActions();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1067
        s.defaultWriteObject();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1068
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1069
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1070
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1071
     * readObject is called to restore the state of the FilePermission from
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1072
     * a stream.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1073
     */
57956
e0b8b019d2f5 8229997: Apply java.io.Serial annotations in java.base
darcy
parents: 55026
diff changeset
  1074
    @java.io.Serial
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1075
    private void readObject(ObjectInputStream s)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1076
         throws IOException, ClassNotFoundException
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1077
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1078
        // Read in the actions, then restore everything else by calling init.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1079
        s.defaultReadObject();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1080
        init(getMask(actions));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1081
    }
42314
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
  1082
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
  1083
    /**
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
  1084
     * Create a cloned FilePermission with a different actions.
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
  1085
     * @param effective the new actions
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
  1086
     * @return a new object
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
  1087
     */
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
  1088
    FilePermission withNewActions(int effective) {
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
  1089
        return new FilePermission(this.getName(),
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
  1090
                this,
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
  1091
                this.npath,
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
  1092
                this.npath2,
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
  1093
                effective,
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
  1094
                null);
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
  1095
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1096
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1097
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1098
/**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1099
 * A FilePermissionCollection stores a set of FilePermission permissions.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1100
 * FilePermission objects
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1101
 * must be stored in a manner that allows them to be inserted in any
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1102
 * order, but enable the implies function to evaluate the implies
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1103
 * method.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1104
 * For example, if you have two FilePermissions:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1105
 * <OL>
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1106
 * <LI> "/tmp/-", "read"
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1107
 * <LI> "/tmp/scratch/foo", "write"
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1108
 * </OL>
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1109
 * And you are calling the implies function with the FilePermission:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1110
 * "/tmp/scratch/foo", "read,write", then the implies function must
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1111
 * take into account both the /tmp/- and /tmp/scratch/foo
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1112
 * permissions, so the effective permission is "read,write".
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1113
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1114
 * @see java.security.Permission
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1115
 * @see java.security.Permissions
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1116
 * @see java.security.PermissionCollection
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1117
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1118
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1119
 * @author Marianne Mueller
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1120
 * @author Roland Schemers
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1121
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1122
 * @serial include
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1123
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1124
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1125
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1126
final class FilePermissionCollection extends PermissionCollection
14014
da3648e13e67 8000269: Cleanup javadoc warnings
alanb
parents: 13795
diff changeset
  1127
    implements Serializable
da3648e13e67 8000269: Cleanup javadoc warnings
alanb
parents: 13795
diff changeset
  1128
{
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1129
    // Not serialized; see serialization section at end of class
31080
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1130
    private transient ConcurrentHashMap<String, Permission> perms;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1131
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1132
    /**
14014
da3648e13e67 8000269: Cleanup javadoc warnings
alanb
parents: 13795
diff changeset
  1133
     * Create an empty FilePermissionCollection object.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1134
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1135
    public FilePermissionCollection() {
31080
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1136
        perms = new ConcurrentHashMap<>();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1137
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1138
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1139
    /**
14014
da3648e13e67 8000269: Cleanup javadoc warnings
alanb
parents: 13795
diff changeset
  1140
     * Adds a permission to the FilePermissionCollection. The key for the hash is
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1141
     * permission.path.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1142
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1143
     * @param permission the Permission object to add.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1144
     *
58653
71fef5fae9cc 8230407: SocketPermission and FilePermission action list allows leading comma
igerasim
parents: 58617
diff changeset
  1145
     * @throws    IllegalArgumentException   if the permission is not a
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1146
     *                                       FilePermission
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1147
     *
58653
71fef5fae9cc 8230407: SocketPermission and FilePermission action list allows leading comma
igerasim
parents: 58617
diff changeset
  1148
     * @throws    SecurityException   if this FilePermissionCollection object
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1149
     *                                has been marked readonly
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1150
     */
31080
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1151
    @Override
14014
da3648e13e67 8000269: Cleanup javadoc warnings
alanb
parents: 13795
diff changeset
  1152
    public void add(Permission permission) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1153
        if (! (permission instanceof FilePermission))
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1154
            throw new IllegalArgumentException("invalid permission: "+
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1155
                                               permission);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1156
        if (isReadOnly())
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1157
            throw new SecurityException(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1158
                "attempt to add a Permission to a readonly PermissionCollection");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1159
31080
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1160
        FilePermission fp = (FilePermission)permission;
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1161
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1162
        // Add permission to map if it is absent, or replace with new
42327
9acc435acfa2 8170408: LogGeneratedClassesTest.java fails with recent changes
weijun
parents: 42314
diff changeset
  1163
        // permission if applicable.
31080
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1164
        perms.merge(fp.getName(), fp,
42343
58076b66ffdb 8170602: Startup regression due to introduction of lambda in java.io.FilePermissionCollection
redestad
parents: 42327
diff changeset
  1165
            new java.util.function.BiFunction<>() {
58076b66ffdb 8170602: Startup regression due to introduction of lambda in java.io.FilePermissionCollection
redestad
parents: 42327
diff changeset
  1166
                @Override
58076b66ffdb 8170602: Startup regression due to introduction of lambda in java.io.FilePermissionCollection
redestad
parents: 42327
diff changeset
  1167
                public Permission apply(Permission existingVal,
58076b66ffdb 8170602: Startup regression due to introduction of lambda in java.io.FilePermissionCollection
redestad
parents: 42327
diff changeset
  1168
                                        Permission newVal) {
31080
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1169
                    int oldMask = ((FilePermission)existingVal).getMask();
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1170
                    int newMask = ((FilePermission)newVal).getMask();
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1171
                    if (oldMask != newMask) {
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1172
                        int effective = oldMask | newMask;
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1173
                        if (effective == newMask) {
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1174
                            return newVal;
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1175
                        }
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1176
                        if (effective != oldMask) {
42314
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
  1177
                            return ((FilePermission)newVal)
e0c05dfa71db 8170364: FilePermission path modified during merge
weijun
parents: 41823
diff changeset
  1178
                                    .withNewActions(effective);
31080
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1179
                        }
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1180
                    }
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1181
                    return existingVal;
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1182
                }
42343
58076b66ffdb 8170602: Startup regression due to introduction of lambda in java.io.FilePermissionCollection
redestad
parents: 42327
diff changeset
  1183
            }
31080
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1184
        );
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1185
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1186
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1187
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1188
     * Check and see if this set of permissions implies the permissions
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1189
     * expressed in "permission".
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1190
     *
14014
da3648e13e67 8000269: Cleanup javadoc warnings
alanb
parents: 13795
diff changeset
  1191
     * @param permission the Permission object to compare
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1192
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1193
     * @return true if "permission" is a proper subset of a permission in
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1194
     * the set, false if not.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1195
     */
31080
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1196
    @Override
14014
da3648e13e67 8000269: Cleanup javadoc warnings
alanb
parents: 13795
diff changeset
  1197
    public boolean implies(Permission permission) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1198
        if (! (permission instanceof FilePermission))
14014
da3648e13e67 8000269: Cleanup javadoc warnings
alanb
parents: 13795
diff changeset
  1199
            return false;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1200
31080
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1201
        FilePermission fperm = (FilePermission) permission;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1202
31080
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1203
        int desired = fperm.getMask();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1204
        int effective = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1205
        int needed = desired;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1206
31080
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1207
        for (Permission perm : perms.values()) {
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1208
            FilePermission fp = (FilePermission)perm;
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1209
            if (((needed & fp.getMask()) != 0) && fp.impliesIgnoreMask(fperm)) {
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1210
                effective |= fp.getMask();
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1211
                if ((effective & desired) == desired) {
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1212
                    return true;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1213
                }
58388
a819c684964b 8230415: Avoid redundant permission checking in FilePermissionCollection and SocketPermissionCollection
igerasim
parents: 58288
diff changeset
  1214
                needed = (desired & ~effective);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1215
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1216
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1217
        return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1218
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1219
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1220
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1221
     * Returns an enumeration of all the FilePermission objects in the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1222
     * container.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1223
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1224
     * @return an enumeration of all the FilePermission objects.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1225
     */
31080
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1226
    @Override
13795
73850c397272 7193406: Clean-up JDK Build Warnings in java.util, java.io
dxu
parents: 9035
diff changeset
  1227
    public Enumeration<Permission> elements() {
31080
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1228
        return perms.elements();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1229
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1230
57956
e0b8b019d2f5 8229997: Apply java.io.Serial annotations in java.base
darcy
parents: 55026
diff changeset
  1231
    @java.io.Serial
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1232
    private static final long serialVersionUID = 2202956749081564585L;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1233
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1234
    // Need to maintain serialization interoperability with earlier releases,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1235
    // which had the serializable field:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1236
    //    private Vector permissions;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1237
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1238
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1239
     * @serialField permissions java.util.Vector
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1240
     *     A list of FilePermission objects.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1241
     */
57956
e0b8b019d2f5 8229997: Apply java.io.Serial annotations in java.base
darcy
parents: 55026
diff changeset
  1242
    @java.io.Serial
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1243
    private static final ObjectStreamField[] serialPersistentFields = {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1244
        new ObjectStreamField("permissions", Vector.class),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1245
    };
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1246
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1247
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1248
     * @serialData "permissions" field (a Vector containing the FilePermissions).
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1249
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1250
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1251
     * Writes the contents of the perms field out as a Vector for
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1252
     * serialization compatibility with earlier releases.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1253
     */
57956
e0b8b019d2f5 8229997: Apply java.io.Serial annotations in java.base
darcy
parents: 55026
diff changeset
  1254
    @java.io.Serial
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1255
    private void writeObject(ObjectOutputStream out) throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1256
        // Don't call out.defaultWriteObject()
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1257
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1258
        // Write out Vector
31080
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1259
        Vector<Permission> permissions = new Vector<>(perms.values());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1260
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1261
        ObjectOutputStream.PutField pfields = out.putFields();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1262
        pfields.put("permissions", permissions);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1263
        out.writeFields();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1264
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1265
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1266
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1267
     * Reads in a Vector of FilePermissions and saves them in the perms field.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1268
     */
57956
e0b8b019d2f5 8229997: Apply java.io.Serial annotations in java.base
darcy
parents: 55026
diff changeset
  1269
    @java.io.Serial
14014
da3648e13e67 8000269: Cleanup javadoc warnings
alanb
parents: 13795
diff changeset
  1270
    private void readObject(ObjectInputStream in)
da3648e13e67 8000269: Cleanup javadoc warnings
alanb
parents: 13795
diff changeset
  1271
        throws IOException, ClassNotFoundException
da3648e13e67 8000269: Cleanup javadoc warnings
alanb
parents: 13795
diff changeset
  1272
    {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1273
        // Don't call defaultReadObject()
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1274
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1275
        // Read in serialized fields
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1276
        ObjectInputStream.GetField gfields = in.readFields();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1277
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1278
        // Get the one we want
13795
73850c397272 7193406: Clean-up JDK Build Warnings in java.util, java.io
dxu
parents: 9035
diff changeset
  1279
        @SuppressWarnings("unchecked")
2057
3acf8e5e2ca0 6781363: New I/O: Update socket-channel API to jsr203/nio2-b99
alanb
parents: 2
diff changeset
  1280
        Vector<Permission> permissions = (Vector<Permission>)gfields.get("permissions", null);
31080
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1281
        perms = new ConcurrentHashMap<>(permissions.size());
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1282
        for (Permission perm : permissions) {
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1283
            perms.put(perm.getName(), perm);
00a25f4c4d44 8056179: Store permissions in concurrent collections in PermissionCollection subclasses
mullan
parents: 29986
diff changeset
  1284
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1285
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1286
}