On Sat, 22 May 2021 20:16:37 GMT, Roger Riggs <rri...@openjdk.org> wrote:

>> JEP 415: Context-specific Deserialization Filters extends the 
>> deserialization filtering mechanisms with more flexible and customizable 
>> protections against malicious deserialization.  See JEP 415: 
>> https://openjdk.java.net/jeps/415.
>> The `java.io.ObjectInputFilter` and `java.io.ObjectInputStream` classes are 
>> extended with additional
>> configuration mechanisms and filter utilities.
>> 
>> javadoc for `ObjectInputFilter`, `ObjectInputFilter.Config`, and 
>> `ObjectInputStream`:
>>     
>> http://cr.openjdk.java.net/~rriggs/filter-factory/java.base/java/io/ObjectInputFilter.html
>
> Roger Riggs has updated the pull request incrementally with one additional 
> commit since the last revision:
> 
>   Editorial javadoc updated based on review comments.
>   Clarified behavior of rejectUndecidedClass method.
>   Example test added to check status returned from file.

src/java.base/share/classes/java/io/ObjectInputFilter.java line 829:

> 827:          * Returns a filter that returns {@code Status.ALLOWED} if the 
> check is for limits
> 828:          * and not checking a class; otherwise {@code Status.UNDECIDED}.
> 829:          * If the {@link FilterInfo#serialClass()} is {@code null}, the 
> filter returns

"Returns a filter that returns {@code Status.ALLOWED} ... ". Maybe "Returns a 
filter that allows all limits ..".

Up-levelling a bit, it seems that filter operations fall into two broad 
categories: 1) class-checking, and 2)limits-checking. At least, in the way that 
some of these factories and adapters are laid out.  If we had such a notional 
at the class-level, then maybe that could influence the naming of these 
factories - and tie them to a higher-level concept.

-------------

PR: https://git.openjdk.java.net/jdk/pull/3996

Reply via email to