| /* |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, |
| * software distributed under the License is distributed on an |
| * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| * KIND, either express or implied. See the License for the |
| * specific language governing permissions and limitations |
| * under the License. |
| */ |
| package org.apache.felix.framework; |
| |
| import java.security.Permission; |
| import java.security.ProtectionDomain; |
| |
| import org.apache.felix.framework.Logger; |
| import org.apache.felix.framework.ext.SecurityProvider; |
| import org.apache.felix.framework.security.condpermadmin.ConditionalPermissionAdminImpl; |
| import org.apache.felix.framework.security.permissionadmin.PermissionAdminImpl; |
| import org.apache.felix.framework.security.util.TrustManager; |
| import org.apache.felix.framework.security.verifier.BundleDNParser; |
| import org.apache.felix.framework.util.SecureAction; |
| import org.osgi.framework.Bundle; |
| import org.osgi.framework.wiring.BundleRevision; |
| |
| /** |
| * This class is the entry point to the security. It is used to determine |
| * whether a given bundle is signed correctely and has permissions based on |
| * PermissionAdmin or ConditionalPermissionAdmin. |
| */ |
| public final class SecurityProviderImpl implements SecurityProvider |
| { |
| private final BundleDNParser m_parser; |
| private final PermissionAdminImpl m_pai; |
| private final ConditionalPermissionAdminImpl m_cpai; |
| private final SecureAction m_action; |
| |
| SecurityProviderImpl(String crlList, String typeList, String passwdList, |
| String storeList, PermissionAdminImpl pai, |
| ConditionalPermissionAdminImpl cpai, SecureAction action, Logger logger) |
| { |
| m_pai = pai; |
| m_cpai = cpai; |
| m_action = action; |
| m_parser = new BundleDNParser(new TrustManager(crlList, typeList, |
| passwdList, storeList, m_action), logger); |
| } |
| |
| /** |
| * If the given bundle is signed but can not be verified (e.g., missing |
| * files) then throw an exception. |
| */ |
| public void checkBundle(Bundle bundle) throws Exception |
| { |
| BundleRevisionImpl module = (BundleRevisionImpl) bundle.adapt(BundleRevisionImpl.class); |
| m_parser.checkDNChains(module, module.getContent(), |
| Bundle.SIGNERS_TRUSTED); |
| } |
| |
| /** |
| * Get a signer matcher that can be used to match digital signed bundles. |
| */ |
| public Object getSignerMatcher(final Bundle bundle, int signersType) |
| { |
| BundleRevisionImpl module = (BundleRevisionImpl) bundle.adapt(BundleRevisionImpl.class); |
| return m_parser.getDNChains(module, module.getContent(), signersType); |
| } |
| |
| /** |
| * If we have a permissionadmin then ask that one first and have it decide |
| * in case there is a location bound. If not then either use its default |
| * permission in case there is no conditional permission admin or else ask |
| * that one. |
| */ |
| public boolean hasBundlePermission(ProtectionDomain bundleProtectionDomain, |
| Permission permission, boolean direct) |
| { |
| BundleProtectionDomain pd = (BundleProtectionDomain) bundleProtectionDomain; |
| BundleImpl bundle = pd.getBundle(); |
| BundleRevisionImpl module = (BundleRevisionImpl) pd.getRevision(); |
| |
| if (bundle.getBundleId() == 0) |
| { |
| return true; |
| } |
| |
| // System.out.println(info.getBundleId() + " - " + permission); |
| // TODO: using true, false, or null seems a bit awkward. Improve this. |
| Boolean result = null; |
| if (m_pai != null) |
| { |
| result = m_pai.hasPermission(bundle._getLocation(), pd.getBundle(), |
| permission, m_cpai, pd, module.getContent()); |
| } |
| |
| if (result != null) |
| { |
| if ((m_cpai != null) && !direct) |
| { |
| boolean allow = result.booleanValue(); |
| if (!allow) |
| { |
| m_cpai.clearPD(); |
| return false; |
| } |
| return m_cpai.handlePAHandle(pd); |
| } |
| return result.booleanValue(); |
| } |
| |
| if (m_cpai != null) |
| { |
| try |
| { |
| return m_cpai.hasPermission(module, module.getContent(), pd, |
| permission, direct, m_pai); |
| } |
| catch (Exception e) |
| { |
| // TODO Auto-generated catch block |
| e.printStackTrace(); |
| } |
| } |
| |
| return false; |
| } |
| } |