blob: 405f9092f80bb14b605c55083e16adf2904e0673 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
package org.apache.felix.framework;
import java.security.Permission;
import java.security.ProtectionDomain;
import org.apache.felix.framework.Logger;
import org.apache.felix.framework.ext.SecurityProvider;
import org.apache.felix.framework.security.condpermadmin.ConditionalPermissionAdminImpl;
import org.apache.felix.framework.security.permissionadmin.PermissionAdminImpl;
import org.apache.felix.framework.security.util.TrustManager;
import org.apache.felix.framework.security.verifier.BundleDNParser;
import org.apache.felix.framework.util.SecureAction;
import org.osgi.framework.Bundle;
import org.osgi.framework.wiring.BundleRevision;
/**
* This class is the entry point to the security. It is used to determine
* whether a given bundle is signed correctely and has permissions based on
* PermissionAdmin or ConditionalPermissionAdmin.
*/
public final class SecurityProviderImpl implements SecurityProvider
{
private final BundleDNParser m_parser;
private final PermissionAdminImpl m_pai;
private final ConditionalPermissionAdminImpl m_cpai;
private final SecureAction m_action;
SecurityProviderImpl(String crlList, String typeList, String passwdList,
String storeList, PermissionAdminImpl pai,
ConditionalPermissionAdminImpl cpai, SecureAction action, Logger logger)
{
m_pai = pai;
m_cpai = cpai;
m_action = action;
m_parser = new BundleDNParser(new TrustManager(crlList, typeList,
passwdList, storeList, m_action), logger);
}
/**
* If the given bundle is signed but can not be verified (e.g., missing
* files) then throw an exception.
*/
public void checkBundle(Bundle bundle) throws Exception
{
BundleRevisionImpl module = (BundleRevisionImpl) bundle.adapt(BundleRevisionImpl.class);
m_parser.checkDNChains(module, module.getContent(),
Bundle.SIGNERS_TRUSTED);
}
/**
* Get a signer matcher that can be used to match digital signed bundles.
*/
public Object getSignerMatcher(final Bundle bundle, int signersType)
{
BundleRevisionImpl module = (BundleRevisionImpl) bundle.adapt(BundleRevisionImpl.class);
return m_parser.getDNChains(module, module.getContent(), signersType);
}
/**
* If we have a permissionadmin then ask that one first and have it decide
* in case there is a location bound. If not then either use its default
* permission in case there is no conditional permission admin or else ask
* that one.
*/
public boolean hasBundlePermission(ProtectionDomain bundleProtectionDomain,
Permission permission, boolean direct)
{
BundleProtectionDomain pd = (BundleProtectionDomain) bundleProtectionDomain;
BundleImpl bundle = pd.getBundle();
BundleRevisionImpl module = (BundleRevisionImpl) pd.getRevision();
if (bundle.getBundleId() == 0)
{
return true;
}
// System.out.println(info.getBundleId() + " - " + permission);
// TODO: using true, false, or null seems a bit awkward. Improve this.
Boolean result = null;
if (m_pai != null)
{
result = m_pai.hasPermission(bundle._getLocation(), pd.getBundle(),
permission, m_cpai, pd, module.getContent());
}
if (result != null)
{
if ((m_cpai != null) && !direct)
{
boolean allow = result.booleanValue();
if (!allow)
{
m_cpai.clearPD();
return false;
}
return m_cpai.handlePAHandle(pd);
}
return result.booleanValue();
}
if (m_cpai != null)
{
try
{
return m_cpai.hasPermission(module, module.getContent(), pd,
permission, direct, m_pai);
}
catch (Exception e)
{
// TODO Auto-generated catch block
e.printStackTrace();
}
}
return false;
}
}