Skip to content

Commit f62e05e

Browse files
author
Eirik Bjørsnøs
committedNov 15, 2024
8344231: SecurityManager cleanup in java.lang.module and jdk.internal.module
Reviewed-by: alanb
1 parent 1bb0d3b commit f62e05e

File tree

4 files changed

+8
-68
lines changed

4 files changed

+8
-68
lines changed
 

‎src/java.base/share/classes/java/lang/module/ModuleFinder.java

+1-12
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,6 @@
2626
package java.lang.module;
2727

2828
import java.nio.file.Path;
29-
import java.security.AccessController;
30-
import java.security.Permission;
31-
import java.security.PrivilegedAction;
3229
import java.util.Collections;
3330
import java.util.HashMap;
3431
import java.util.HashSet;
@@ -130,16 +127,8 @@ public interface ModuleFinder {
130127
*
131128
* @return A {@code ModuleFinder} that locates the system modules
132129
*/
133-
@SuppressWarnings("removal")
134130
static ModuleFinder ofSystem() {
135-
SecurityManager sm = System.getSecurityManager();
136-
if (sm != null) {
137-
sm.checkPermission(new RuntimePermission("accessSystemModules"));
138-
PrivilegedAction<ModuleFinder> pa = SystemModuleFinders::ofSystem;
139-
return AccessController.doPrivileged(pa);
140-
} else {
141-
return SystemModuleFinders.ofSystem();
142-
}
131+
return SystemModuleFinders.ofSystem();
143132
}
144133

145134
/**

‎src/java.base/share/classes/jdk/internal/module/ModuleReferences.java

+1-9
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 2015, 2021, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 2015, 2024, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -370,14 +370,6 @@ static class ExplodedModuleReader implements ModuleReader {
370370

371371
ExplodedModuleReader(Path dir) {
372372
this.dir = dir;
373-
374-
// when running with a security manager then check that the caller
375-
// has access to the directory.
376-
@SuppressWarnings("removal")
377-
SecurityManager sm = System.getSecurityManager();
378-
if (sm != null) {
379-
boolean unused = Files.isDirectory(dir);
380-
}
381373
}
382374

383375
/**

‎src/java.base/share/classes/jdk/internal/module/Modules.java

+1-6
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,6 @@
3232
import java.lang.module.ModuleReference;
3333
import java.lang.module.ResolvedModule;
3434
import java.net.URI;
35-
import java.security.AccessController;
36-
import java.security.PrivilegedAction;
3735
import java.util.Collection;
3836
import java.util.List;
3937
import java.util.Map;
@@ -155,10 +153,7 @@ public static void addUses(Module m, Class<?> service) {
155153
public static void addProvides(Module m, Class<?> service, Class<?> impl) {
156154
ModuleLayer layer = m.getLayer();
157155

158-
PrivilegedAction<ClassLoader> pa = m::getClassLoader;
159-
@SuppressWarnings("removal")
160-
ClassLoader loader = AccessController.doPrivileged(pa);
161-
156+
ClassLoader loader = m.getClassLoader();
162157
ClassLoader platformClassLoader = ClassLoaders.platformClassLoader();
163158
if (layer == null || loader == null || loader == platformClassLoader) {
164159
// update ClassLoader catalog

‎src/java.base/share/classes/jdk/internal/module/SystemModuleFinders.java

+5-41
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 2015, 2021, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 2015, 2024, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -38,8 +38,6 @@
3838
import java.nio.ByteBuffer;
3939
import java.nio.file.Files;
4040
import java.nio.file.Path;
41-
import java.security.AccessController;
42-
import java.security.PrivilegedAction;
4341
import java.util.ArrayDeque;
4442
import java.util.Collections;
4543
import java.util.Deque;
@@ -208,21 +206,7 @@ public static ModuleFinder ofSystem() {
208206
Path dir = Path.of(home, "modules");
209207
if (!Files.isDirectory(dir))
210208
throw new InternalError("Unable to detect the run-time image");
211-
ModuleFinder f = ModulePath.of(ModuleBootstrap.patcher(), dir);
212-
return new ModuleFinder() {
213-
@SuppressWarnings("removal")
214-
@Override
215-
public Optional<ModuleReference> find(String name) {
216-
PrivilegedAction<Optional<ModuleReference>> pa = () -> f.find(name);
217-
return AccessController.doPrivileged(pa);
218-
}
219-
@SuppressWarnings("removal")
220-
@Override
221-
public Set<ModuleReference> findAll() {
222-
PrivilegedAction<Set<ModuleReference>> pa = f::findAll;
223-
return AccessController.doPrivileged(pa);
224-
}
225-
};
209+
return ModulePath.of(ModuleBootstrap.patcher(), dir);
226210
}
227211

228212
/**
@@ -314,7 +298,7 @@ static ModuleReference toModuleReference(ModuleDescriptor descriptor,
314298
Supplier<ModuleReader> readerSupplier = new Supplier<>() {
315299
@Override
316300
public ModuleReader get() {
317-
return new SystemModuleReader(mn, uri);
301+
return new SystemModuleReader(mn);
318302
}
319303
};
320304

@@ -377,9 +361,7 @@ public byte[] generate(String algorithm) {
377361
}
378362

379363
/**
380-
* Holder class for the ImageReader
381-
*
382-
* @apiNote This class must be loaded before a security manager is set.
364+
* Holder class for the ImageReader.
383365
*/
384366
private static class SystemImage {
385367
static final ImageReader READER = ImageReaderFactory.getImageReader();
@@ -396,25 +378,7 @@ private static class SystemModuleReader implements ModuleReader {
396378
private final String module;
397379
private volatile boolean closed;
398380

399-
/**
400-
* If there is a security manager set then check permission to
401-
* connect to the run-time image.
402-
*/
403-
private static void checkPermissionToConnect(URI uri) {
404-
@SuppressWarnings("removal")
405-
SecurityManager sm = System.getSecurityManager();
406-
if (sm != null) {
407-
try {
408-
URLConnection uc = uri.toURL().openConnection();
409-
sm.checkPermission(uc.getPermission());
410-
} catch (IOException ioe) {
411-
throw new UncheckedIOException(ioe);
412-
}
413-
}
414-
}
415-
416-
SystemModuleReader(String module, URI uri) {
417-
checkPermissionToConnect(uri);
381+
SystemModuleReader(String module) {
418382
this.module = module;
419383
}
420384

0 commit comments

Comments
 (0)
Please sign in to comment.