/* * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER. * * Copyright (c) 2016 Oracle and/or its affiliates. All rights reserved. * * The contents of this file are subject to the terms of either the GNU * General Public License Version 2 only ("GPL") or the Common Development * and Distribution License("CDDL") (collectively, the "License"). You * may not use this file except in compliance with the License. You can * obtain a copy of the License at * http://glassfish.java.net/public/CDDL+GPL_1_1.html * or packager/legal/LICENSE.txt. See the License for the specific * language governing permissions and limitations under the License. * * When distributing the software, include this License Header Notice in each * file and include the License file at packager/legal/LICENSE.txt. * * GPL Classpath Exception: * Oracle designates this particular file as subject to the "Classpath" * exception as provided by Oracle in the GPL Version 2 section of the License * file that accompanied this code. * * Modifications: * If applicable, add the following below the License Header, with the fields * enclosed by brackets [] replaced by your own identifying information: * "Portions Copyright [year] [name of copyright owner]" * * Contributor(s): * If you wish your version of this file to be governed by only the CDDL or * only the GPL Version 2, indicate your decision by adding "[Contributor] * elects to include this software in this distribution under the [CDDL or GPL * Version 2] license." If you don't indicate a single choice of license, a * recipient has the option to distribute your version of this file under * either the CDDL, the GPL Version 2 or to extend the choice of license to * its licensees as provided above. However, if you add GPL Version 2 code * and therefore, elected the GPL Version 2 license, then the option applies * only if the new code is made subject to such option by the copyright * holder. */ package com.sun.xml.ws.util.xml; import com.sun.istack.Nullable; import com.sun.xml.ws.server.ServerRtException; import com.sun.xml.ws.util.ByteArrayBuffer; import java.io.IOException; import java.io.InputStream; import java.io.OutputStreamWriter; import java.io.Writer; import java.lang.reflect.Method; import java.net.URL; import java.security.AccessController; import java.security.PrivilegedAction; import java.util.ArrayList; import java.util.Collections; import java.util.Enumeration; import java.util.Iterator; import java.util.List; import java.util.StringTokenizer; import java.util.logging.Level; import java.util.logging.Logger; import java.util.stream.Collectors; import javax.xml.XMLConstants; import javax.xml.catalog.CatalogFeatures; import javax.xml.catalog.CatalogFeatures.Feature; import javax.xml.catalog.CatalogManager; import javax.xml.namespace.QName; import javax.xml.parsers.DocumentBuilderFactory; import javax.xml.parsers.ParserConfigurationException; import javax.xml.parsers.SAXParserFactory; import javax.xml.stream.XMLInputFactory; import javax.xml.transform.Result; import javax.xml.transform.Source; import javax.xml.transform.Transformer; import javax.xml.transform.TransformerConfigurationException; import javax.xml.transform.TransformerException; import javax.xml.transform.TransformerFactory; import javax.xml.transform.sax.SAXTransformerFactory; import javax.xml.transform.sax.TransformerHandler; import javax.xml.transform.stream.StreamSource; import javax.xml.validation.SchemaFactory; import javax.xml.ws.WebServiceException; import javax.xml.xpath.XPathFactory; import javax.xml.xpath.XPathFactoryConfigurationException; import org.w3c.dom.Attr; import org.w3c.dom.Element; import org.w3c.dom.EntityReference; import org.w3c.dom.Node; import org.w3c.dom.NodeList; import org.w3c.dom.Text; import org.xml.sax.EntityResolver; import org.xml.sax.ErrorHandler; import org.xml.sax.InputSource; import org.xml.sax.SAXException; import org.xml.sax.SAXParseException; import org.xml.sax.XMLReader; /** * @author WS Development Team */ public class XmlUtil { // not in older JDK, so must be duplicated here, otherwise javax.xml.XMLConstants should be used private static final String ACCESS_EXTERNAL_SCHEMA = "http://javax.xml.XMLConstants/property/accessExternalSchema"; private final static String LEXICAL_HANDLER_PROPERTY = "http://xml.org/sax/properties/lexical-handler"; private static final Logger LOGGER = Logger.getLogger(XmlUtil.class.getName()); private static final String DISABLE_XML_SECURITY = "com.sun.xml.ws.disableXmlSecurity"; private static boolean XML_SECURITY_DISABLED = AccessController.doPrivileged( new PrivilegedAction<Boolean>() { @Override public Boolean run() { return Boolean.getBoolean(DISABLE_XML_SECURITY); } } ); public static String getPrefix(String s) { int i = s.indexOf(':'); if (i == -1) return null; return s.substring(0, i); } public static String getLocalPart(String s) { int i = s.indexOf(':'); if (i == -1) return s; return s.substring(i + 1); } public static String getAttributeOrNull(Element e, String name) { Attr a = e.getAttributeNode(name); if (a == null) return null; return a.getValue(); } public static String getAttributeNSOrNull( Element e, String name, String nsURI) { Attr a = e.getAttributeNodeNS(nsURI, name); if (a == null) return null; return a.getValue(); } public static String getAttributeNSOrNull( Element e, QName name) { Attr a = e.getAttributeNodeNS(name.getNamespaceURI(), name.getLocalPart()); if (a == null) return null; return a.getValue(); } /* public static boolean matchesTagNS(Element e, String tag, String nsURI) { try { return e.getLocalName().equals(tag) && e.getNamespaceURI().equals(nsURI); } catch (NullPointerException npe) { // localname not null since parsing would fail before here throw new WSDLParseException( "null.namespace.found", e.getLocalName()); } } public static boolean matchesTagNS( Element e, javax.xml.namespace.QName name) { try { return e.getLocalName().equals(name.getLocalPart()) && e.getNamespaceURI().equals(name.getNamespaceURI()); } catch (NullPointerException npe) { // localname not null since parsing would fail before here throw new WSDLParseException( "null.namespace.found", e.getLocalName()); } }*/ public static Iterator getAllChildren(Element element) { return new NodeListIterator(element.getChildNodes()); } public static Iterator getAllAttributes(Element element) { return new NamedNodeMapIterator(element.getAttributes()); } public static List<String> parseTokenList(String tokenList) { List<String> result = new ArrayList<String>(); StringTokenizer tokenizer = new StringTokenizer(tokenList, " "); while (tokenizer.hasMoreTokens()) { result.add(tokenizer.nextToken()); } return result; } public static String getTextForNode(Node node) { StringBuilder sb = new StringBuilder(); NodeList children = node.getChildNodes(); if (children.getLength() == 0) return null; for (int i = 0; i < children.getLength(); ++i) { Node n = children.item(i); if (n instanceof Text) sb.append(n.getNodeValue()); else if (n instanceof EntityReference) { String s = getTextForNode(n); if (s == null) return null; else sb.append(s); } else return null; } return sb.toString(); } public static InputStream getUTF8Stream(String s) { try { ByteArrayBuffer bab = new ByteArrayBuffer(); Writer w = new OutputStreamWriter(bab, "utf-8"); w.write(s); w.close(); return bab.newInputStream(); } catch (IOException e) { throw new RuntimeException("should not happen"); } } static final ContextClassloaderLocal<TransformerFactory> transformerFactory = new ContextClassloaderLocal<TransformerFactory>() { @Override protected TransformerFactory initialValue() throws Exception { return TransformerFactory.newInstance(); } }; static final ContextClassloaderLocal<SAXParserFactory> saxParserFactory = new ContextClassloaderLocal<SAXParserFactory>() { @Override protected SAXParserFactory initialValue() throws Exception { SAXParserFactory factory = newSAXParserFactory(true); factory.setNamespaceAware(true); return factory; } }; /** * Creates a new identity transformer. */ public static Transformer newTransformer() { try { return transformerFactory.get().newTransformer(); } catch (TransformerConfigurationException tex) { throw new IllegalStateException("Unable to create a JAXP transformer"); } } /** * Performs identity transformation. */ public static <T extends Result> T identityTransform(Source src, T result) throws TransformerException, SAXException, ParserConfigurationException, IOException { if (src instanceof StreamSource) { // work around a bug in JAXP in JDK6u4 and earlier where the namespace processing // is not turned on by default StreamSource ssrc = (StreamSource) src; TransformerHandler th = ((SAXTransformerFactory) transformerFactory.get()).newTransformerHandler(); th.setResult(result); XMLReader reader = saxParserFactory.get().newSAXParser().getXMLReader(); reader.setContentHandler(th); reader.setProperty(LEXICAL_HANDLER_PROPERTY, th); reader.parse(toInputSource(ssrc)); } else { newTransformer().transform(src, result); } return result; } private static InputSource toInputSource(StreamSource src) { InputSource is = new InputSource(); is.setByteStream(src.getInputStream()); is.setCharacterStream(src.getReader()); is.setPublicId(src.getPublicId()); is.setSystemId(src.getSystemId()); return is; } /* * Gets an EntityResolver using XML catalog */ public static EntityResolver createEntityResolver(@Nullable URL catalogUrl) { ArrayList<URL> urlsArray = new ArrayList<URL>(); EntityResolver er; if (catalogUrl != null) { urlsArray.add(catalogUrl); } try { er = createCatalogResolver(urlsArray); } catch (Exception e) { throw new ServerRtException("server.rt.err",e); } return er; } /** * Gets a default EntityResolver for catalog at META-INF/jaxws-catalog.xml */ public static EntityResolver createDefaultCatalogResolver() { EntityResolver er; try { /** * Gets a URLs for catalog defined at META-INF/jaxws-catalog.xml */ ClassLoader cl = Thread.currentThread().getContextClassLoader(); Enumeration<URL> catalogEnum; if (cl == null) { catalogEnum = ClassLoader.getSystemResources("META-INF/jax-ws-catalog.xml"); } else { catalogEnum = cl.getResources("META-INF/jax-ws-catalog.xml"); } er = createCatalogResolver(Collections.list(catalogEnum)); } catch (Exception e) { throw new WebServiceException(e); } return er; } /** * Instantiate catalog resolver using new catalog API (javax.xml.catalog.*) * added in JDK9. Usage of new API removes dependency on internal API * (com.sun.org.apache.xml.internal) for modular runtime. */ private static EntityResolver createCatalogResolver(ArrayList<URL> urls) throws Exception { // Prepare array of catalog paths String[] paths = urls.stream() .map(u -> u.toExternalForm()) .toArray(c -> new String[c]); //Create CatalogResolver with new JDK9+ API return (EntityResolver) CatalogManager.catalogResolver(catalogFeatures, paths); } // Cache CatalogFeatures instance for future usages. // Resolve feature is set to "continue" value for backward compatibility. private static CatalogFeatures catalogFeatures = CatalogFeatures.builder() .with(Feature.RESOLVE, "continue") .build(); /** * {@link ErrorHandler} that always treat the error as fatal. */ public static final ErrorHandler DRACONIAN_ERROR_HANDLER = new ErrorHandler() { @Override public void warning(SAXParseException exception) { } @Override public void error(SAXParseException exception) throws SAXException { throw exception; } @Override public void fatalError(SAXParseException exception) throws SAXException { throw exception; } }; public static DocumentBuilderFactory newDocumentBuilderFactory(boolean disableSecurity) { DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance(); try { factory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, !xmlSecurityDisabled(disableSecurity)); } catch (ParserConfigurationException e) { LOGGER.log(Level.WARNING, "Factory [{0}] doesn't support secure xml processing!", new Object[] { factory.getClass().getName() } ); } return factory; } public static TransformerFactory newTransformerFactory(boolean disableSecurity) { TransformerFactory factory = TransformerFactory.newInstance(); try { factory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, !xmlSecurityDisabled(disableSecurity)); } catch (TransformerConfigurationException e) { LOGGER.log(Level.WARNING, "Factory [{0}] doesn't support secure xml processing!", new Object[]{factory.getClass().getName()}); } return factory; } public static SAXParserFactory newSAXParserFactory(boolean disableSecurity) { SAXParserFactory factory = SAXParserFactory.newInstance(); try { factory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, !xmlSecurityDisabled(disableSecurity)); } catch (Exception e) { LOGGER.log(Level.WARNING, "Factory [{0}] doesn't support secure xml processing!", new Object[]{factory.getClass().getName()}); } return factory; } public static XPathFactory newXPathFactory(boolean disableSecurity) { XPathFactory factory = XPathFactory.newInstance(); try { factory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, !xmlSecurityDisabled(disableSecurity)); } catch (XPathFactoryConfigurationException e) { LOGGER.log(Level.WARNING, "Factory [{0}] doesn't support secure xml processing!", new Object[] { factory.getClass().getName() } ); } return factory; } public static XMLInputFactory newXMLInputFactory(boolean disableSecurity) { XMLInputFactory factory = XMLInputFactory.newInstance(); if (xmlSecurityDisabled(disableSecurity)) { // TODO-Miran: are those apppropriate defaults? factory.setProperty(XMLInputFactory.SUPPORT_DTD, false); factory.setProperty(XMLInputFactory.IS_SUPPORTING_EXTERNAL_ENTITIES, false); } return factory; } private static boolean xmlSecurityDisabled(boolean runtimeDisabled) { return XML_SECURITY_DISABLED || runtimeDisabled; } public static SchemaFactory allowExternalAccess(SchemaFactory sf, String value, boolean disableSecurity) { // if xml security (feature secure processing) disabled, nothing to do, no restrictions applied if (xmlSecurityDisabled(disableSecurity)) { if (LOGGER.isLoggable(Level.FINE)) { LOGGER.log(Level.FINE, "Xml Security disabled, no JAXP xsd external access configuration necessary."); } return sf; } if (System.getProperty("javax.xml.accessExternalSchema") != null) { if (LOGGER.isLoggable(Level.FINE)) { LOGGER.log(Level.FINE, "Detected explicitly JAXP configuration, no JAXP xsd external access configuration necessary."); } return sf; } try { sf.setProperty(ACCESS_EXTERNAL_SCHEMA, value); if (LOGGER.isLoggable(Level.FINE)) { LOGGER.log(Level.FINE, "Property \"{0}\" is supported and has been successfully set by used JAXP implementation.", new Object[]{ACCESS_EXTERNAL_SCHEMA}); } } catch (SAXException ignored) { // nothing to do; support depends on version JDK or SAX implementation if (LOGGER.isLoggable(Level.CONFIG)) { LOGGER.log(Level.CONFIG, "Property \"{0}\" is not supported by used JAXP implementation.", new Object[]{ACCESS_EXTERNAL_SCHEMA}); } } return sf; } }