One thing I am curious about. Is there a reason why getObject(ObjectInputFilter) requires a permission check?

In this case, the caller is the one creating the filter and passing it in, so the caller can only cause harm to themselves, and the ObjectInputStream is a local variable which is not returned. This method also does not mutate the contents of the SignedObject (or SealedObject) ... so I don't see the risk here. I think you can just wrap ObjectInputStream.setObjectInputFilter in doPrivileged.

--Sean

On 8/22/18 2:37 AM, Weijun Wang wrote:
Updated webrev at

    http://cr.openjdk.java.net/~weijun/8193859/webrev.02/

Changes:

1) More spec change

    - describing the filter in class spec

    - mentioning the system filter in existing getObject() methods

    - add "@throws InvalidClassException" to all getObject() methods

2) More test cases

    - check SecurityException when a security manager is set

    - set the system filter to see how existing getObject() works

The 2 tests are very similar but they belong to jdk_security1 and 
jdk_security2. Therefore I haven't combined them.

Thanks
Max

On Aug 17, 2018, at 10:56 PM, Weijun Wang <weijun.w...@oracle.com> wrote:

Please take a review at the updated webrev at

   http://cr.openjdk.java.net/~weijun/8193859/webrev.01

Changes only in doc, including

1) The "2018-8-15 updates" in the CSR [1]

2) formatting

Thanks
Max

[1] https://bugs.openjdk.java.net/browse/JDK-8193887

On Aug 14, 2018, at 11:19 PM, Roger Riggs <roger.ri...@oracle.com> wrote:

Hi,

On 8/14/2018 10:59 AM, Weijun Wang wrote:

s/initial process-wide filter/system filter/?

yes

Roger


--Max

[1]    8202675  Replace process-wide terminology in serial filtering to be 
consistent

Regards, Roger





Reply via email to