diff -r 8c0b6bccfe47 -r 0989ad8c0860 src/share/jaxws_classes/com/sun/xml/internal/bind/v2/util/XmlFactory.java --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/src/share/jaxws_classes/com/sun/xml/internal/bind/v2/util/XmlFactory.java Tue Apr 09 14:51:13 2013 +0100 @@ -0,0 +1,189 @@ +/* + * Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved. + * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. + * + * This code is free software; you can redistribute it and/or modify it + * under the terms of the GNU General Public License version 2 only, as + * published by the Free Software Foundation. Oracle designates this + * particular file as subject to the "Classpath" exception as provided + * by Oracle in the LICENSE file that accompanied this code. + * + * This code is distributed in the hope that it will be useful, but WITHOUT + * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or + * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License + * version 2 for more details (a copy is included in the LICENSE file that + * accompanied this code). + * + * You should have received a copy of the GNU General Public License version + * 2 along with this work; if not, write to the Free Software Foundation, + * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. + * + * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA + * or visit www.oracle.com if you need additional information or have any + * questions. + */ + +package com.sun.xml.internal.bind.v2.util; + +import com.sun.xml.internal.bind.Util; +import com.sun.xml.internal.bind.v2.Messages; +import java.util.logging.Level; +import java.util.logging.Logger; +import javax.xml.XMLConstants; +import javax.xml.parsers.DocumentBuilderFactory; +import javax.xml.parsers.ParserConfigurationException; +import javax.xml.parsers.SAXParserFactory; +import javax.xml.transform.TransformerConfigurationException; +import javax.xml.transform.TransformerFactory; +import javax.xml.validation.SchemaFactory; +import javax.xml.xpath.XPathFactory; +import javax.xml.xpath.XPathFactoryConfigurationException; +import org.xml.sax.SAXNotRecognizedException; +import org.xml.sax.SAXNotSupportedException; + +/** + * Provides helper methods for creating properly configured XML parser + * factory instances with namespace support turned on and configured for + * security. + * @author snajper + */ +public class XmlFactory { + + private static final Logger LOGGER = Logger.getLogger(XmlFactory.class.getName()); + + /** + * If true XML security features when parsing XML documents will be disabled. + * The default value is false. + * + * Boolean + * @since 2.2.6 + */ + private static final String DISABLE_XML_SECURITY = "com.sun.xml.internal.bind.disableXmlSecurity"; + + public static final boolean DISABLE_SECURE_PROCESSING = + Boolean.parseBoolean(Util.getSystemProperty(DISABLE_XML_SECURITY)); + + private static boolean xmlFeatureValue(boolean runtimeSetting) { + return !(DISABLE_SECURE_PROCESSING || runtimeSetting); + } + + /** + * Returns properly configured (e.g. security features) schema factory + * - namespaceAware == true + * - securityProcessing == is set based on security processing property, default is true + */ + public static SchemaFactory createSchemaFactory(final String language, boolean disableSecureProcessing) throws IllegalStateException { + try { + SchemaFactory factory = SchemaFactory.newInstance(language); + if (LOGGER.isLoggable(Level.FINE)) { + LOGGER.log(Level.FINE, "SchemaFactory instance: {0}", factory); + } + factory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, xmlFeatureValue(disableSecureProcessing)); + return factory; + } catch (SAXNotRecognizedException ex) { + LOGGER.log(Level.SEVERE, null, ex); + throw new IllegalStateException(ex); + } catch (SAXNotSupportedException ex) { + LOGGER.log(Level.SEVERE, null, ex); + throw new IllegalStateException(ex); + } catch (AbstractMethodError er) { + LOGGER.log(Level.SEVERE, null, er); + throw new IllegalStateException(Messages.INVALID_JAXP_IMPLEMENTATION.format(), er); + } + } + + /** + * Returns properly configured (e.g. security features) parser factory + * - namespaceAware == true + * - securityProcessing == is set based on security processing property, default is true + */ + public static SAXParserFactory createParserFactory(boolean disableSecureProcessing) throws IllegalStateException { + try { + SAXParserFactory factory = SAXParserFactory.newInstance(); + if (LOGGER.isLoggable(Level.FINE)) { + LOGGER.log(Level.FINE, "SAXParserFactory instance: {0}", factory); + } + factory.setNamespaceAware(true); + factory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, xmlFeatureValue(disableSecureProcessing)); + return factory; + } catch (ParserConfigurationException ex) { + LOGGER.log(Level.SEVERE, null, ex); + throw new IllegalStateException( ex); + } catch (SAXNotRecognizedException ex) { + LOGGER.log(Level.SEVERE, null, ex); + throw new IllegalStateException( ex); + } catch (SAXNotSupportedException ex) { + LOGGER.log(Level.SEVERE, null, ex); + throw new IllegalStateException( ex); + } catch (AbstractMethodError er) { + LOGGER.log(Level.SEVERE, null, er); + throw new IllegalStateException(Messages.INVALID_JAXP_IMPLEMENTATION.format(), er); + } + } + + /** + * Returns properly configured (e.g. security features) factory + * - securityProcessing == is set based on security processing property, default is true + */ + public static XPathFactory createXPathFactory(boolean disableSecureProcessing) throws IllegalStateException { + try { + XPathFactory factory = XPathFactory.newInstance(); + if (LOGGER.isLoggable(Level.FINE)) { + LOGGER.log(Level.FINE, "XPathFactory instance: {0}", factory); + } + factory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, xmlFeatureValue(disableSecureProcessing)); + return factory; + } catch (XPathFactoryConfigurationException ex) { + LOGGER.log(Level.SEVERE, null, ex); + throw new IllegalStateException( ex); + } catch (AbstractMethodError er) { + LOGGER.log(Level.SEVERE, null, er); + throw new IllegalStateException(Messages.INVALID_JAXP_IMPLEMENTATION.format(), er); + } + } + + /** + * Returns properly configured (e.g. security features) factory + * - securityProcessing == is set based on security processing property, default is true + */ + public static TransformerFactory createTransformerFactory(boolean disableSecureProcessing) throws IllegalStateException { + try { + TransformerFactory factory = TransformerFactory.newInstance(); + if (LOGGER.isLoggable(Level.FINE)) { + LOGGER.log(Level.FINE, "TransformerFactory instance: {0}", factory); + } + factory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, xmlFeatureValue(disableSecureProcessing)); + return factory; + } catch (TransformerConfigurationException ex) { + LOGGER.log(Level.SEVERE, null, ex); + throw new IllegalStateException( ex); + } catch (AbstractMethodError er) { + LOGGER.log(Level.SEVERE, null, er); + throw new IllegalStateException(Messages.INVALID_JAXP_IMPLEMENTATION.format(), er); + } + } + + /** + * Returns properly configured (e.g. security features) factory + * - namespaceAware == true + * - securityProcessing == is set based on security processing property, default is true + */ + public static DocumentBuilderFactory createDocumentBuilderFactory(boolean disableSecureProcessing) throws IllegalStateException { + try { + DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); + if (LOGGER.isLoggable(Level.FINE)) { + LOGGER.log(Level.FINE, "DocumentBuilderFactory instance: {0}", factory); + } + factory.setNamespaceAware(true); + factory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, xmlFeatureValue(disableSecureProcessing)); + return factory; + } catch (ParserConfigurationException ex) { + LOGGER.log(Level.SEVERE, null, ex); + throw new IllegalStateException( ex); + } catch (AbstractMethodError er) { + LOGGER.log(Level.SEVERE, null, er); + throw new IllegalStateException(Messages.INVALID_JAXP_IMPLEMENTATION.format(), er); + } + } + +}