All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.codehaus.groovy.control.customizers.SecureASTCustomizer Maven / Gradle / Ivy

There is a newer version: 3.9
Show newest version
/*
 * Copyright 2003-2013 the original author or authors.
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

package org.codehaus.groovy.control.customizers;

import org.codehaus.groovy.ast.*;
import org.codehaus.groovy.ast.expr.*;
import org.codehaus.groovy.ast.stmt.*;
import org.codehaus.groovy.classgen.BytecodeExpression;
import org.codehaus.groovy.classgen.GeneratorContext;
import org.codehaus.groovy.control.CompilationFailedException;
import org.codehaus.groovy.control.CompilePhase;
import org.codehaus.groovy.control.SourceUnit;
import org.codehaus.groovy.syntax.Token;

import java.util.*;

/**
 * This customizer allows securing source code by controlling what code constructs are allowed. For example, if you only
 * want to allow arithmetic operations in a groovy shell, you can configure this customizer to restrict package imports,
 * method calls and so on.
 * 

* Most of the securization options found in this class work with either blacklist or whitelist. This means that, for a * single option, you can set a whitelist OR a blacklist, but not both. You can mix whitelist/blacklist strategies for * different options. For example, you can have import whitelist and tokens blacklist. *

* The recommanded way of securing shells is to use whitelists because it is guaranteed that future features of the * Groovy language won't be allowed by defaut. Using blacklists, you can limit the features of the languages by opting * out, but new language features would require you to update your configuration. *

* If you set neither a whitelist nor a blacklist, then everything is authorized. *

* Combinations of import and star imports constraints are authorized as long as you use the same type of list for both. * For example, you may use an import whitelist and a star import whitelist together, but you cannot use an import white * list with a star import blacklist. static imports are handled separately, meaning that blacklisting an import * does not prevent from using a static import. *

* Eventually, if the features provided here are not sufficient, you may implement custom AST filtering handlers, either * implementing the {@link StatementChecker} interface or {@link ExpressionChecker} interface then register your * handlers thanks to the {@link #addExpressionCheckers(org.codehaus.groovy.control.customizers.SecureASTCustomizer.ExpressionChecker...)} * and {@link #addStatementCheckers(org.codehaus.groovy.control.customizers.SecureASTCustomizer.StatementChecker...)} * methods. *

* Here is an example of usage. We will create a groovy classloader which only supports arithmetic operations and imports * the java.lang.Math classes by default. * *

 * final ImportCustomizer imports = new ImportCustomizer().addStaticStars('java.lang.Math') // add static import of java.lang.Math
 *             final SecureASTCustomizer secure = new SecureASTCustomizer()
 *             secure.with {
 *                 closuresAllowed = false
 *                 methodDefinitionAllowed = false
 *
 *                 importsWhitelist = []
 *                 staticImportsWhitelist = []
 *                 staticStarImportsWhitelist = ['java.lang.Math'] // only java.lang.Math is allowed
 *
 *                 tokensWhitelist = [
 *                         PLUS,
 *                         MINUS,
 *                         MULTIPLY,
 *                         DIVIDE,
 *                         MOD,
 *                         POWER,
 *                         PLUS_PLUS,
 *                         MINUS_MINUS,
 *                         COMPARE_EQUAL,
 *                         COMPARE_NOT_EQUAL,
 *                         COMPARE_LESS_THAN,
 *                         COMPARE_LESS_THAN_EQUAL,
 *                         COMPARE_GREATER_THAN,
 *                         COMPARE_GREATER_THAN_EQUAL,
 *                 ].asImmutable()
 *
 *                 constantTypesClassesWhiteList = [
 *                         Integer,
 *                         Float,
 *                         Long,
 *                         Double,
 *                         BigDecimal,
 *                         Integer.TYPE,
 *                         Long.TYPE,
 *                         Float.TYPE,
 *                         Double.TYPE
 *                 ].asImmutable()
 *
 *                 receiversClassesWhiteList = [
 *                         Math,
 *                         Integer,
 *                         Float,
 *                         Double,
 *                         Long,
 *                         BigDecimal
 *                 ].asImmutable()
 *             }
 *             CompilerConfiguration config = new CompilerConfiguration()
 *             config.addCompilationCustomizers(imports, secure)
 *             GroovyClassLoader loader = new GroovyClassLoader(this.class.classLoader, config)
 *  
* * @author Cedric Champeau * @author Guillaume Laforge * @author Hamlet D'Arcy * @since 1.8.0 */ public class SecureASTCustomizer extends CompilationCustomizer { private boolean isPackageAllowed = true; private boolean isMethodDefinitionAllowed = true; private boolean isClosuresAllowed = true; // imports private List importsWhitelist; private List importsBlacklist; // static imports private List staticImportsWhitelist; private List staticImportsBlacklist; // star imports private List starImportsWhitelist; private List starImportsBlacklist; // static star imports private List staticStarImportsWhitelist; private List staticStarImportsBlacklist; // indirect import checks // if set to true, then security rules on imports will also be applied on classnodes. // Direct instantiation of classes without imports will therefore also fail if this option is enabled private boolean isIndirectImportCheckEnabled; // statements private List> statementsWhitelist; private List> statementsBlacklist; private final List statementCheckers = new LinkedList(); // expressions private List> expressionsWhitelist; private List> expressionsBlacklist; private final List expressionCheckers = new LinkedList(); // tokens from Types private List tokensWhitelist; private List tokensBlacklist; // constant types private List constantTypesWhiteList; private List constantTypesBlackList; // receivers private List receiversWhiteList; private List receiversBlackList; public SecureASTCustomizer() { super(CompilePhase.CANONICALIZATION); } public boolean isMethodDefinitionAllowed() { return isMethodDefinitionAllowed; } public void setMethodDefinitionAllowed(final boolean methodDefinitionAllowed) { isMethodDefinitionAllowed = methodDefinitionAllowed; } public boolean isPackageAllowed() { return isPackageAllowed; } public boolean isClosuresAllowed() { return isClosuresAllowed; } public void setClosuresAllowed(final boolean closuresAllowed) { isClosuresAllowed = closuresAllowed; } public void setPackageAllowed(final boolean packageAllowed) { isPackageAllowed = packageAllowed; } public List getImportsBlacklist() { return importsBlacklist; } public void setImportsBlacklist(final List importsBlacklist) { if (importsWhitelist != null || starImportsWhitelist != null) { throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist"); } this.importsBlacklist = importsBlacklist; } public List getImportsWhitelist() { return importsWhitelist; } public void setImportsWhitelist(final List importsWhitelist) { if (importsBlacklist != null || starImportsBlacklist != null) { throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist"); } this.importsWhitelist = importsWhitelist; } public List getStarImportsBlacklist() { return starImportsBlacklist; } public void setStarImportsBlacklist(final List starImportsBlacklist) { if (importsWhitelist != null || starImportsWhitelist != null) { throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist"); } this.starImportsBlacklist = normalizeStarImports(starImportsBlacklist); if (this.importsBlacklist == null) importsBlacklist = Collections.emptyList(); } public List getStarImportsWhitelist() { return starImportsWhitelist; } public void setStarImportsWhitelist(final List starImportsWhitelist) { if (importsBlacklist != null || starImportsBlacklist != null) { throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist"); } this.starImportsWhitelist = normalizeStarImports(starImportsWhitelist); if (this.importsWhitelist == null) importsWhitelist = Collections.emptyList(); } /** * Ensures that every star import ends with .* as this is the expected syntax in import checks. */ private static List normalizeStarImports(List starImports) { List result = new ArrayList(starImports.size()); for (String starImport : starImports) { if (starImport.endsWith(".*")) { result.add(starImport); } else if (starImport.endsWith(".")) { result.add(starImport + "*"); } else { result.add(starImport + ".*"); } } return Collections.unmodifiableList(result); } public List getStaticImportsBlacklist() { return staticImportsBlacklist; } public void setStaticImportsBlacklist(final List staticImportsBlacklist) { if (staticImportsWhitelist != null || staticStarImportsWhitelist != null) { throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist"); } this.staticImportsBlacklist = staticImportsBlacklist; } public List getStaticImportsWhitelist() { return staticImportsWhitelist; } public void setStaticImportsWhitelist(final List staticImportsWhitelist) { if (staticImportsBlacklist != null || staticStarImportsBlacklist != null) { throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist"); } this.staticImportsWhitelist = staticImportsWhitelist; } public List getStaticStarImportsBlacklist() { return staticStarImportsBlacklist; } public void setStaticStarImportsBlacklist(final List staticStarImportsBlacklist) { if (staticImportsWhitelist != null || staticStarImportsWhitelist != null) { throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist"); } this.staticStarImportsBlacklist = normalizeStarImports(staticStarImportsBlacklist); if (this.staticImportsBlacklist == null) this.staticImportsBlacklist = Collections.emptyList(); } public List getStaticStarImportsWhitelist() { return staticStarImportsWhitelist; } public void setStaticStarImportsWhitelist(final List staticStarImportsWhitelist) { if (staticImportsBlacklist != null || staticStarImportsBlacklist != null) { throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist"); } this.staticStarImportsWhitelist = normalizeStarImports(staticStarImportsWhitelist); if (this.staticImportsWhitelist == null) this.staticImportsWhitelist = Collections.emptyList(); } public List> getExpressionsBlacklist() { return expressionsBlacklist; } public void setExpressionsBlacklist(final List> expressionsBlacklist) { if (expressionsWhitelist != null) { throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist"); } this.expressionsBlacklist = expressionsBlacklist; } public List> getExpressionsWhitelist() { return expressionsWhitelist; } public void setExpressionsWhitelist(final List> expressionsWhitelist) { if (expressionsBlacklist != null) { throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist"); } this.expressionsWhitelist = expressionsWhitelist; } public List> getStatementsBlacklist() { return statementsBlacklist; } public void setStatementsBlacklist(final List> statementsBlacklist) { if (statementsWhitelist != null) { throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist"); } this.statementsBlacklist = statementsBlacklist; } public List> getStatementsWhitelist() { return statementsWhitelist; } public void setStatementsWhitelist(final List> statementsWhitelist) { if (statementsBlacklist != null) { throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist"); } this.statementsWhitelist = statementsWhitelist; } public List getTokensBlacklist() { return tokensBlacklist; } public boolean isIndirectImportCheckEnabled() { return isIndirectImportCheckEnabled; } /** * Set this option to true if you want your import rules to be checked against every class node. This means that if * someone uses a fully qualified class name, then it will also be checked against the import rules, preventing, for * example, instantiation of classes without imports thanks to FQCN. * * @param indirectImportCheckEnabled set to true to enable indirect checks */ public void setIndirectImportCheckEnabled(final boolean indirectImportCheckEnabled) { isIndirectImportCheckEnabled = indirectImportCheckEnabled; } /** * Sets the list of tokens which are blacklisted. * * @param tokensBlacklist the tokens. The values of the tokens must be those of {@link org.codehaus.groovy.syntax.Types} */ public void setTokensBlacklist(final List tokensBlacklist) { if (tokensWhitelist != null) { throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist"); } this.tokensBlacklist = tokensBlacklist; } public List getTokensWhitelist() { return tokensWhitelist; } /** * Sets the list of tokens which are whitelisted. * * @param tokensWhitelist the tokens. The values of the tokens must be those of {@link org.codehaus.groovy.syntax.Types} */ public void setTokensWhitelist(final List tokensWhitelist) { if (tokensBlacklist != null) { throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist"); } this.tokensWhitelist = tokensWhitelist; } public void addStatementCheckers(StatementChecker... checkers) { statementCheckers.addAll(Arrays.asList(checkers)); } public void addExpressionCheckers(ExpressionChecker... checkers) { expressionCheckers.addAll(Arrays.asList(checkers)); } public List getConstantTypesBlackList() { return constantTypesBlackList; } public void setConstantTypesBlackList(final List constantTypesBlackList) { if (constantTypesWhiteList != null) { throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist"); } this.constantTypesBlackList = constantTypesBlackList; } public List getConstantTypesWhiteList() { return constantTypesWhiteList; } public void setConstantTypesWhiteList(final List constantTypesWhiteList) { if (constantTypesBlackList != null) { throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist"); } this.constantTypesWhiteList = constantTypesWhiteList; } /** * An alternative way of setting constant types. * * @param constantTypesWhiteList a list of classes. */ public void setConstantTypesClassesWhiteList(final List constantTypesWhiteList) { List values = new LinkedList(); for (Class aClass : constantTypesWhiteList) { values.add(aClass.getName()); } setConstantTypesWhiteList(values); } /** * An alternative way of setting constant types. * * @param constantTypesBlackList a list of classes. */ public void setConstantTypesClassesBlackList(final List constantTypesBlackList) { List values = new LinkedList(); for (Class aClass : constantTypesBlackList) { values.add(aClass.getName()); } setConstantTypesBlackList(values); } public List getReceiversBlackList() { return receiversBlackList; } /** * Sets the list of classes which deny method calls. * * @param receiversBlackList the list of refused classes, as fully qualified names */ public void setReceiversBlackList(final List receiversBlackList) { if (receiversWhiteList != null) { throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist"); } this.receiversBlackList = receiversBlackList; } /** * An alternative way of setting {@link #setReceiversBlackList(java.util.List) receiver classes}. * * @param receiversBlacklist a list of classes. */ public void setReceiversClassesBlackList(final List receiversBlacklist) { List values = new LinkedList(); for (Class aClass : receiversBlacklist) { values.add(aClass.getName()); } setReceiversBlackList(values); } public List getReceiversWhiteList() { return receiversWhiteList; } /** * Sets the list of classes which may accept method calls. * * @param receiversWhiteList the list of accepted classes, as fully qualified names */ public void setReceiversWhiteList(final List receiversWhiteList) { if (receiversBlackList != null) { throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist"); } this.receiversWhiteList = receiversWhiteList; } /** * An alternative way of setting {@link #setReceiversWhiteList(java.util.List) receiver classes}. * * @param receiversWhitelist a list of classes. */ public void setReceiversClassesWhiteList(final List receiversWhitelist) { List values = new LinkedList(); for (Class aClass : receiversWhitelist) { values.add(aClass.getName()); } setReceiversWhiteList(values); } @Override public void call(final SourceUnit source, final GeneratorContext context, final ClassNode classNode) throws CompilationFailedException { final ModuleNode ast = source.getAST(); if (!isPackageAllowed && ast.getPackage() != null) { throw new SecurityException("Package definitions are not allowed"); } checkMethodDefinitionAllowed(classNode); // verify imports if (importsBlacklist != null || importsWhitelist != null || starImportsBlacklist != null || starImportsWhitelist != null) { for (ImportNode importNode : ast.getImports()) { final String className = importNode.getClassName(); assertImportIsAllowed(className); } for (ImportNode importNode : ast.getStarImports()) { final String className = importNode.getPackageName(); assertStarImportIsAllowed(className + "*"); } } // verify static imports if (staticImportsBlacklist != null || staticImportsWhitelist != null || staticStarImportsBlacklist != null || staticStarImportsWhitelist != null) { for (Map.Entry entry : ast.getStaticImports().entrySet()) { final String className = entry.getValue().getClassName(); assertStaticImportIsAllowed(entry.getKey(), className); } for (Map.Entry entry : ast.getStaticStarImports().entrySet()) { final String className = entry.getValue().getClassName(); assertStaticImportIsAllowed(entry.getKey(), className); } } final SecuringCodeVisitor visitor = new SecuringCodeVisitor(); ast.getStatementBlock().visit(visitor); for (ClassNode clNode : ast.getClasses()) { if (clNode!=classNode) { checkMethodDefinitionAllowed(clNode); for (MethodNode methodNode : clNode.getMethods()) { if (!methodNode.isSynthetic()) { methodNode.getCode().visit(visitor); } } } } List methods = filterMethods(classNode); if (isMethodDefinitionAllowed) { for (MethodNode method : methods) { if (method.getDeclaringClass()==classNode) method.getCode().visit(visitor); } } } private void checkMethodDefinitionAllowed(ClassNode owner) { if (isMethodDefinitionAllowed) return; List methods = filterMethods(owner); if (!methods.isEmpty()) throw new SecurityException("Method definitions are not allowed"); } private List filterMethods(ClassNode owner) { List result = new LinkedList(); List methods = owner.getMethods(); for (MethodNode method : methods) { if (method.getDeclaringClass() == owner && !method.isSynthetic()) { if ("main".equals(method.getName()) || "run".equals(method.getName()) && owner.isScriptBody()) continue; result.add(method); } } return result; } private void assertStarImportIsAllowed(final String packageName) { if (starImportsWhitelist != null && !starImportsWhitelist.contains(packageName)) { throw new SecurityException("Importing [" + packageName + "] is not allowed"); } if (starImportsBlacklist != null && starImportsBlacklist.contains(packageName)) { throw new SecurityException("Importing [" + packageName + "] is not allowed"); } } private void assertImportIsAllowed(final String className) { if (importsWhitelist != null && !importsWhitelist.contains(className)) { if (starImportsWhitelist != null) { // we should now check if the import is in the star imports ClassNode node = ClassHelper.make(className); final String packageName = node.getPackageName(); if (!starImportsWhitelist.contains(packageName + ".*")) { throw new SecurityException("Importing [" + className + "] is not allowed"); } } else { throw new SecurityException("Importing [" + className + "] is not allowed"); } } if (importsBlacklist != null && importsBlacklist.contains(className)) { throw new SecurityException("Importing [" + className + "] is not allowed"); } // check that there's no star import blacklist if (starImportsBlacklist != null) { ClassNode node = ClassHelper.make(className); final String packageName = node.getPackageName(); if (starImportsBlacklist.contains(packageName + ".*")) { throw new SecurityException("Importing [" + className + "] is not allowed"); } } } private void assertStaticImportIsAllowed(final String member, final String className) { final String fqn = member.equals(className) ? member : className + "." + member; if (staticImportsWhitelist != null && !staticImportsWhitelist.contains(fqn)) { if (staticStarImportsWhitelist != null) { // we should now check if the import is in the star imports if (!staticStarImportsWhitelist.contains(className + ".*")) { throw new SecurityException("Importing [" + fqn + "] is not allowed"); } } else { throw new SecurityException("Importing [" + fqn + "] is not allowed"); } } if (staticImportsBlacklist != null && staticImportsBlacklist.contains(fqn)) { throw new SecurityException("Importing [" + fqn + "] is not allowed"); } // check that there's no star import blacklist if (staticStarImportsBlacklist != null) { if (staticStarImportsBlacklist.contains(className + ".*")) { throw new SecurityException("Importing [" + fqn + "] is not allowed"); } } } /** * This visitor directly implements the {@link GroovyCodeVisitor} interface instead of using the {@link * CodeVisitorSupport} class to make sure that future features of the language gets managed by this visitor. Thus, * adding a new feature would result in a compilation error if this visitor is not updated. */ private class SecuringCodeVisitor implements GroovyCodeVisitor { /** * Checks that a given statement is either in the whitelist or not in the blacklist. * * @param statement the statement to be checked * @throws SecurityException if usage of this statement class is forbidden */ private void assertStatementAuthorized(final Statement statement) throws SecurityException { final Class clazz = statement.getClass(); if (statementsBlacklist != null && statementsBlacklist.contains(clazz)) { throw new SecurityException(clazz.getSimpleName() + "s are not allowed"); } else if (statementsWhitelist != null && !statementsWhitelist.contains(clazz)) { throw new SecurityException(clazz.getSimpleName() + "s are not allowed"); } for (StatementChecker statementChecker : statementCheckers) { if (!statementChecker.isAuthorized(statement)) { throw new SecurityException("Statement [" + clazz.getSimpleName() + "] is not allowed"); } } } /** * Checks that a given expression is either in the whitelist or not in the blacklist. * * @param expression the expression to be checked * @throws SecurityException if usage of this expression class is forbidden */ private void assertExpressionAuthorized(final Expression expression) throws SecurityException { final Class clazz = expression.getClass(); if (expressionsBlacklist != null && expressionsBlacklist.contains(clazz)) { throw new SecurityException(clazz.getSimpleName() + "s are not allowed: " + expression.getText()); } else if (expressionsWhitelist != null && !expressionsWhitelist.contains(clazz)) { throw new SecurityException(clazz.getSimpleName() + "s are not allowed: " + expression.getText()); } for (ExpressionChecker expressionChecker : expressionCheckers) { if (!expressionChecker.isAuthorized(expression)) { throw new SecurityException("Expression [" + clazz.getSimpleName() + "] is not allowed: " + expression.getText()); } } if (isIndirectImportCheckEnabled) { try { if (expression instanceof ConstructorCallExpression) { assertImportIsAllowed(expression.getType().getName()); } else if (expression instanceof MethodCallExpression) { MethodCallExpression expr = (MethodCallExpression) expression; final String typename = expr.getObjectExpression().getType().getName(); assertImportIsAllowed(typename); assertStaticImportIsAllowed(expr.getMethodAsString(), typename); } else if (expression instanceof StaticMethodCallExpression) { StaticMethodCallExpression expr = (StaticMethodCallExpression) expression; final String typename = expr.getOwnerType().getName(); assertImportIsAllowed(typename); assertStaticImportIsAllowed(expr.getMethod(), typename); } else if (expression instanceof MethodPointerExpression) { MethodPointerExpression expr = (MethodPointerExpression) expression; final String typename = expr.getType().getName(); assertImportIsAllowed(typename); assertStaticImportIsAllowed(expr.getText(), typename); } } catch (SecurityException e) { throw new SecurityException("Indirect import checks prevents usage of expression", e); } } } /** * Checks that a given token is either in the whitelist or not in the blacklist. * * @param token the token to be checked * @throws SecurityException if usage of this token is forbidden */ private void assertTokenAuthorized(final Token token) throws SecurityException { final int value = token.getType(); if (tokensBlacklist != null && tokensBlacklist.contains(value)) { throw new SecurityException("Token " + token + " is not allowed"); } else if (tokensWhitelist != null && !tokensWhitelist.contains(value)) { throw new SecurityException("Token " + token + " is not allowed"); } } public void visitBlockStatement(final BlockStatement block) { assertStatementAuthorized(block); for (Statement statement : block.getStatements()) { statement.visit(this); } } public void visitForLoop(final ForStatement forLoop) { assertStatementAuthorized(forLoop); forLoop.getCollectionExpression().visit(this); forLoop.getLoopBlock().visit(this); } public void visitWhileLoop(final WhileStatement loop) { assertStatementAuthorized(loop); loop.getBooleanExpression().visit(this); loop.getLoopBlock().visit(this); } public void visitDoWhileLoop(final DoWhileStatement loop) { assertStatementAuthorized(loop); loop.getBooleanExpression().visit(this); loop.getLoopBlock().visit(this); } public void visitIfElse(final IfStatement ifElse) { assertStatementAuthorized(ifElse); ifElse.getBooleanExpression().visit(this); ifElse.getIfBlock().visit(this); Statement elseBlock = ifElse.getElseBlock(); if (elseBlock instanceof EmptyStatement) { // dispatching to EmptyStatement will not call back visitor, // must call our visitEmptyStatement explicitly visitEmptyStatement((EmptyStatement) elseBlock); } else { elseBlock.visit(this); } } public void visitExpressionStatement(final ExpressionStatement statement) { assertStatementAuthorized(statement); statement.getExpression().visit(this); } public void visitReturnStatement(final ReturnStatement statement) { assertStatementAuthorized(statement); statement.getExpression().visit(this); } public void visitAssertStatement(final AssertStatement statement) { assertStatementAuthorized(statement); statement.getBooleanExpression().visit(this); statement.getMessageExpression().visit(this); } public void visitTryCatchFinally(final TryCatchStatement statement) { assertStatementAuthorized(statement); statement.getTryStatement().visit(this); for (CatchStatement catchStatement : statement.getCatchStatements()) { catchStatement.visit(this); } Statement finallyStatement = statement.getFinallyStatement(); if (finallyStatement instanceof EmptyStatement) { // dispatching to EmptyStatement will not call back visitor, // must call our visitEmptyStatement explicitly visitEmptyStatement((EmptyStatement) finallyStatement); } else { finallyStatement.visit(this); } } protected void visitEmptyStatement(EmptyStatement statement) { // noop } public void visitSwitch(final SwitchStatement statement) { assertStatementAuthorized(statement); statement.getExpression().visit(this); for (CaseStatement caseStatement : statement.getCaseStatements()) { caseStatement.visit(this); } statement.getDefaultStatement().visit(this); } public void visitCaseStatement(final CaseStatement statement) { assertStatementAuthorized(statement); statement.getExpression().visit(this); statement.getCode().visit(this); } public void visitBreakStatement(final BreakStatement statement) { assertStatementAuthorized(statement); } public void visitContinueStatement(final ContinueStatement statement) { assertStatementAuthorized(statement); } public void visitThrowStatement(final ThrowStatement statement) { assertStatementAuthorized(statement); statement.getExpression().visit(this); } public void visitSynchronizedStatement(final SynchronizedStatement statement) { assertStatementAuthorized(statement); statement.getExpression().visit(this); statement.getCode().visit(this); } public void visitCatchStatement(final CatchStatement statement) { assertStatementAuthorized(statement); statement.getCode().visit(this); } public void visitMethodCallExpression(final MethodCallExpression call) { assertExpressionAuthorized(call); Expression receiver = call.getObjectExpression(); final String typeName = receiver.getType().getName(); if (receiversWhiteList != null && !receiversWhiteList.contains(typeName)) { throw new SecurityException("Method calls not allowed on [" + typeName + "]"); } else if (receiversBlackList != null && receiversBlackList.contains(typeName)) { throw new SecurityException("Method calls not allowed on [" + typeName + "]"); } receiver.visit(this); final Expression method = call.getMethod(); checkConstantTypeIfNotMethodNameOrProperty(method); call.getArguments().visit(this); } public void visitStaticMethodCallExpression(final StaticMethodCallExpression call) { assertExpressionAuthorized(call); final String typeName = call.getOwnerType().getName(); if (receiversWhiteList != null && !receiversWhiteList.contains(typeName)) { throw new SecurityException("Method calls not allowed on [" + typeName + "]"); } else if (receiversBlackList != null && receiversBlackList.contains(typeName)) { throw new SecurityException("Method calls not allowed on [" + typeName + "]"); } call.getArguments().visit(this); } public void visitConstructorCallExpression(final ConstructorCallExpression call) { assertExpressionAuthorized(call); call.getArguments().visit(this); } public void visitTernaryExpression(final TernaryExpression expression) { assertExpressionAuthorized(expression); expression.getBooleanExpression().visit(this); expression.getTrueExpression().visit(this); expression.getFalseExpression().visit(this); } public void visitShortTernaryExpression(final ElvisOperatorExpression expression) { assertExpressionAuthorized(expression); visitTernaryExpression(expression); } public void visitBinaryExpression(final BinaryExpression expression) { assertExpressionAuthorized(expression); assertTokenAuthorized(expression.getOperation()); expression.getLeftExpression().visit(this); expression.getRightExpression().visit(this); } public void visitPrefixExpression(final PrefixExpression expression) { assertExpressionAuthorized(expression); assertTokenAuthorized(expression.getOperation()); expression.getExpression().visit(this); } public void visitPostfixExpression(final PostfixExpression expression) { assertExpressionAuthorized(expression); assertTokenAuthorized(expression.getOperation()); expression.getExpression().visit(this); } public void visitBooleanExpression(final BooleanExpression expression) { assertExpressionAuthorized(expression); expression.getExpression().visit(this); } public void visitClosureExpression(final ClosureExpression expression) { assertExpressionAuthorized(expression); if (!isClosuresAllowed) throw new SecurityException("Closures are not allowed"); expression.getCode().visit(this); } public void visitTupleExpression(final TupleExpression expression) { assertExpressionAuthorized(expression); visitListOfExpressions(expression.getExpressions()); } public void visitMapExpression(final MapExpression expression) { assertExpressionAuthorized(expression); visitListOfExpressions(expression.getMapEntryExpressions()); } public void visitMapEntryExpression(final MapEntryExpression expression) { assertExpressionAuthorized(expression); expression.getKeyExpression().visit(this); expression.getValueExpression().visit(this); } public void visitListExpression(final ListExpression expression) { assertExpressionAuthorized(expression); visitListOfExpressions(expression.getExpressions()); } public void visitRangeExpression(final RangeExpression expression) { assertExpressionAuthorized(expression); expression.getFrom().visit(this); expression.getTo().visit(this); } public void visitPropertyExpression(final PropertyExpression expression) { assertExpressionAuthorized(expression); Expression receiver = expression.getObjectExpression(); final String typeName = receiver.getType().getName(); if (receiversWhiteList != null && !receiversWhiteList.contains(typeName)) { throw new SecurityException("Property access not allowed on [" + typeName + "]"); } else if (receiversBlackList != null && receiversBlackList.contains(typeName)) { throw new SecurityException("Property access not allowed on [" + typeName + "]"); } receiver.visit(this); final Expression property = expression.getProperty(); checkConstantTypeIfNotMethodNameOrProperty(property); } private void checkConstantTypeIfNotMethodNameOrProperty(final Expression expr) { if (expr instanceof ConstantExpression) { if (!"java.lang.String".equals(expr.getType().getName())) { expr.visit(this); } } else { expr.visit(this); } } public void visitAttributeExpression(final AttributeExpression expression) { assertExpressionAuthorized(expression); Expression receiver = expression.getObjectExpression(); final String typeName = receiver.getType().getName(); if (receiversWhiteList != null && !receiversWhiteList.contains(typeName)) { throw new SecurityException("Attribute access not allowed on [" + typeName + "]"); } else if (receiversBlackList != null && receiversBlackList.contains(typeName)) { throw new SecurityException("Attribute access not allowed on [" + typeName + "]"); } receiver.visit(this); final Expression property = expression.getProperty(); checkConstantTypeIfNotMethodNameOrProperty(property); } public void visitFieldExpression(final FieldExpression expression) { assertExpressionAuthorized(expression); } public void visitMethodPointerExpression(final MethodPointerExpression expression) { assertExpressionAuthorized(expression); expression.getExpression().visit(this); expression.getMethodName().visit(this); } public void visitConstantExpression(final ConstantExpression expression) { assertExpressionAuthorized(expression); final String type = expression.getType().getName(); if (constantTypesWhiteList != null && !constantTypesWhiteList.contains(type)) { throw new SecurityException("Constant expression type [" + type + "] is not allowed"); } if (constantTypesBlackList != null && constantTypesBlackList.contains(type)) { throw new SecurityException("Constant expression type [" + type + "] is not allowed"); } } public void visitClassExpression(final ClassExpression expression) { assertExpressionAuthorized(expression); } public void visitVariableExpression(final VariableExpression expression) { assertExpressionAuthorized(expression); final String type = expression.getType().getName(); if (constantTypesWhiteList != null && !constantTypesWhiteList.contains(type)) { throw new SecurityException("Usage of variables of type [" + type + "] is not allowed"); } if (constantTypesBlackList != null && constantTypesBlackList.contains(type)) { throw new SecurityException("Usage of variables of type [" + type + "] is not allowed"); } } public void visitDeclarationExpression(final DeclarationExpression expression) { assertExpressionAuthorized(expression); visitBinaryExpression(expression); } protected void visitListOfExpressions(List list) { if (list == null) return; for (Expression expression : list) { if (expression instanceof SpreadExpression) { Expression spread = ((SpreadExpression) expression).getExpression(); spread.visit(this); } else { expression.visit(this); } } } public void visitGStringExpression(final GStringExpression expression) { assertExpressionAuthorized(expression); visitListOfExpressions(expression.getStrings()); visitListOfExpressions(expression.getValues()); } public void visitArrayExpression(final ArrayExpression expression) { assertExpressionAuthorized(expression); visitListOfExpressions(expression.getExpressions()); visitListOfExpressions(expression.getSizeExpression()); } public void visitSpreadExpression(final SpreadExpression expression) { assertExpressionAuthorized(expression); expression.getExpression().visit(this); } public void visitSpreadMapExpression(final SpreadMapExpression expression) { assertExpressionAuthorized(expression); expression.getExpression().visit(this); } public void visitNotExpression(final NotExpression expression) { assertExpressionAuthorized(expression); expression.getExpression().visit(this); } public void visitUnaryMinusExpression(final UnaryMinusExpression expression) { assertExpressionAuthorized(expression); expression.getExpression().visit(this); } public void visitUnaryPlusExpression(final UnaryPlusExpression expression) { assertExpressionAuthorized(expression); expression.getExpression().visit(this); } public void visitBitwiseNegationExpression(final BitwiseNegationExpression expression) { assertExpressionAuthorized(expression); expression.getExpression().visit(this); } public void visitCastExpression(final CastExpression expression) { assertExpressionAuthorized(expression); expression.getExpression().visit(this); } public void visitArgumentlistExpression(final ArgumentListExpression expression) { assertExpressionAuthorized(expression); visitTupleExpression(expression); } public void visitClosureListExpression(final ClosureListExpression closureListExpression) { assertExpressionAuthorized(closureListExpression); if (!isClosuresAllowed) throw new SecurityException("Closures are not allowed"); visitListOfExpressions(closureListExpression.getExpressions()); } public void visitBytecodeExpression(final BytecodeExpression expression) { assertExpressionAuthorized(expression); } } /** * This interface allows the user to plugin custom expression checkers if expression blacklist or whitelist are not * sufficient */ public static interface ExpressionChecker { boolean isAuthorized(Expression expression); } /** * This interface allows the user to plugin custom statement checkers if statement blacklist or whitelist are not * sufficient */ public static interface StatementChecker { boolean isAuthorized(Statement expression); } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy