/*

   Licensed to the Apache Software Foundation (ASF) under one or more
   contributor license agreements.  See the NOTICE file distributed with
   this work for additional information regarding copyright ownership.
   The ASF licenses this file to You under the Apache License, Version 2.0
   (the "License"); you may not use this file except in compliance with
   the License.  You may obtain a copy of the License at

       http://www.apache.org/licenses/LICENSE-2.0

   Unless required by applicable law or agreed to in writing, software
   distributed under the License is distributed on an "AS IS" BASIS,
   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
   See the License for the specific language governing permissions and
   limitations under the License.

 */
package org.apache.batik.script.rhino;

import java.security.AccessControlContext;
import java.security.AccessController;
import java.security.PrivilegedExceptionAction;

import org.mozilla.javascript.Callable;
import org.mozilla.javascript.Context;
import org.mozilla.javascript.GeneratedClassLoader;
import org.mozilla.javascript.Scriptable;
import org.mozilla.javascript.SecurityController;
import org.mozilla.javascript.WrappedException;

This implementation of the Rhino SecurityController interface is meant for use within the context of Batik only. It is a partial implementation of the interface that does what is needed by Batik and no more.
Author:Christophe Jolif
Version:$Id: BatikSecurityController.java 1733416 2016-03-03 07:07:13Z gadams $
/** * This implementation of the Rhino <code>SecurityController</code> interface is * meant for use within the context of Batik only. It is a partial * implementation of the interface that does what is needed by Batik and * no more. * * @author <a href="mailto:cjolif@ilog.fr">Christophe Jolif</a> * @version $Id: BatikSecurityController.java 1733416 2016-03-03 07:07:13Z gadams $ */
public class BatikSecurityController extends SecurityController {
Default constructor
/** * Default constructor */
public GeneratedClassLoader createClassLoader (final ClassLoader parentLoader, Object securityDomain) { if (securityDomain instanceof RhinoClassLoader) { return (RhinoClassLoader)securityDomain; } // FIXX: This should be supported by intersecting perms. // Calling var script = Script(source); script(); is not supported throw new SecurityException("Script() objects are not supported"); }
Get dynamic security domain that allows an action only if it is allowed by the current Java stack and securityDomain. If securityDomain is null, return domain representing permissions allowed by the current stack.
/** * Get dynamic security domain that allows an action only if it is allowed * by the current Java stack and <i>securityDomain</i>. If * <i>securityDomain</i> is null, return domain representing permissions * allowed by the current stack. */
public Object getDynamicSecurityDomain(Object securityDomain) { ClassLoader loader = (RhinoClassLoader)securityDomain; // Already have a rhino loader in place no need to // do anything (normally you would want to union the // the current stack with the loader's context but // in our case no one has lower privledges than a // rhino class loader). if (loader != null) return loader; return AccessController.getContext(); }
Calls Callable.call(Context, Scriptable, Scriptable, Object[]) of callable under restricted security domain where an action is allowed only if it is allowed according to the Java stack on the moment of the callWithDomain call and securityDomain. Any call to getDynamicSecurityDomain(Object) during execution of Callable.call(Context, Scriptable, Scriptable, Object[]) should return a domain incorporate restrictions imposed by securityDomain.
/** * Calls {@link Callable#call(Context, Scriptable, Scriptable, Object[])} of * <code>callable</code> under restricted security domain where an action is * allowed only if it is allowed according to the Java stack on the * moment of the <code>callWithDomain</code> call and * <code>securityDomain</code>. Any call to * {@link #getDynamicSecurityDomain(Object)} during execution of * {@link Callable#call(Context, Scriptable, Scriptable, Object[])} * should return a domain incorporate restrictions imposed by * <code>securityDomain</code>. */
public Object callWithDomain(Object securityDomain, final Context cx, final Callable callable, final Scriptable scope, final Scriptable thisObj, final Object[] args) { AccessControlContext acc; if (securityDomain instanceof AccessControlContext) acc = (AccessControlContext)securityDomain; else { RhinoClassLoader loader = (RhinoClassLoader)securityDomain; acc = loader.rhinoAccessControlContext; } PrivilegedExceptionAction execAction = new PrivilegedExceptionAction() { public Object run() { return callable.call(cx, scope, thisObj, args); } }; try { return AccessController.doPrivileged(execAction, acc); } catch (Exception e) { throw new WrappedException(e); } } }