org.codehaus.groovy.control.customizers.SecureASTCustomizer Maven / Gradle / Ivy
/*
* Copyright 2003-2013 the original author or authors.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.codehaus.groovy.control.customizers;
import org.codehaus.groovy.ast.*;
import org.codehaus.groovy.ast.expr.*;
import org.codehaus.groovy.ast.stmt.*;
import org.codehaus.groovy.classgen.BytecodeExpression;
import org.codehaus.groovy.classgen.GeneratorContext;
import org.codehaus.groovy.control.CompilationFailedException;
import org.codehaus.groovy.control.CompilePhase;
import org.codehaus.groovy.control.SourceUnit;
import org.codehaus.groovy.syntax.Token;
import java.util.*;
/**
* This customizer allows securing source code by controlling what code constructs are allowed. For example, if you only
* want to allow arithmetic operations in a groovy shell, you can configure this customizer to restrict package imports,
* method calls and so on.
*
* Most of the securization options found in this class work with either blacklist or whitelist. This means that, for a
* single option, you can set a whitelist OR a blacklist, but not both. You can mix whitelist/blacklist strategies for
* different options. For example, you can have import whitelist and tokens blacklist.
*
* The recommanded way of securing shells is to use whitelists because it is guaranteed that future features of the
* Groovy language won't be allowed by defaut. Using blacklists, you can limit the features of the languages by opting
* out, but new language features would require you to update your configuration.
*
* If you set neither a whitelist nor a blacklist, then everything is authorized.
*
* Combinations of import and star imports constraints are authorized as long as you use the same type of list for both.
* For example, you may use an import whitelist and a star import whitelist together, but you cannot use an import white
* list with a star import blacklist. static imports are handled separately, meaning that blacklisting an import
* does not prevent from using a static import.
*
* Eventually, if the features provided here are not sufficient, you may implement custom AST filtering handlers, either
* implementing the {@link StatementChecker} interface or {@link ExpressionChecker} interface then register your
* handlers thanks to the {@link #addExpressionCheckers(org.codehaus.groovy.control.customizers.SecureASTCustomizer.ExpressionChecker...)}
* and {@link #addStatementCheckers(org.codehaus.groovy.control.customizers.SecureASTCustomizer.StatementChecker...)}
* methods.
*
* Here is an example of usage. We will create a groovy classloader which only supports arithmetic operations and imports
* the java.lang.Math classes by default.
*
*
* final ImportCustomizer imports = new ImportCustomizer().addStaticStars('java.lang.Math') // add static import of java.lang.Math
* final SecureASTCustomizer secure = new SecureASTCustomizer()
* secure.with {
* closuresAllowed = false
* methodDefinitionAllowed = false
*
* importsWhitelist = []
* staticImportsWhitelist = []
* staticStarImportsWhitelist = ['java.lang.Math'] // only java.lang.Math is allowed
*
* tokensWhitelist = [
* PLUS,
* MINUS,
* MULTIPLY,
* DIVIDE,
* MOD,
* POWER,
* PLUS_PLUS,
* MINUS_MINUS,
* COMPARE_EQUAL,
* COMPARE_NOT_EQUAL,
* COMPARE_LESS_THAN,
* COMPARE_LESS_THAN_EQUAL,
* COMPARE_GREATER_THAN,
* COMPARE_GREATER_THAN_EQUAL,
* ].asImmutable()
*
* constantTypesClassesWhiteList = [
* Integer,
* Float,
* Long,
* Double,
* BigDecimal,
* Integer.TYPE,
* Long.TYPE,
* Float.TYPE,
* Double.TYPE
* ].asImmutable()
*
* receiversClassesWhiteList = [
* Math,
* Integer,
* Float,
* Double,
* Long,
* BigDecimal
* ].asImmutable()
* }
* CompilerConfiguration config = new CompilerConfiguration()
* config.addCompilationCustomizers(imports, secure)
* GroovyClassLoader loader = new GroovyClassLoader(this.class.classLoader, config)
*
*
* @author Cedric Champeau
* @author Guillaume Laforge
* @author Hamlet D'Arcy
* @since 1.8.0
*/
public class SecureASTCustomizer extends CompilationCustomizer {
private boolean isPackageAllowed = true;
private boolean isMethodDefinitionAllowed = true;
private boolean isClosuresAllowed = true;
// imports
private List importsWhitelist;
private List importsBlacklist;
// static imports
private List staticImportsWhitelist;
private List staticImportsBlacklist;
// star imports
private List starImportsWhitelist;
private List starImportsBlacklist;
// static star imports
private List staticStarImportsWhitelist;
private List staticStarImportsBlacklist;
// indirect import checks
// if set to true, then security rules on imports will also be applied on classnodes.
// Direct instantiation of classes without imports will therefore also fail if this option is enabled
private boolean isIndirectImportCheckEnabled;
// statements
private List> statementsWhitelist;
private List> statementsBlacklist;
private final List statementCheckers = new LinkedList();
// expressions
private List> expressionsWhitelist;
private List> expressionsBlacklist;
private final List expressionCheckers = new LinkedList();
// tokens from Types
private List tokensWhitelist;
private List tokensBlacklist;
// constant types
private List constantTypesWhiteList;
private List constantTypesBlackList;
// receivers
private List receiversWhiteList;
private List receiversBlackList;
public SecureASTCustomizer() {
super(CompilePhase.CANONICALIZATION);
}
public boolean isMethodDefinitionAllowed() {
return isMethodDefinitionAllowed;
}
public void setMethodDefinitionAllowed(final boolean methodDefinitionAllowed) {
isMethodDefinitionAllowed = methodDefinitionAllowed;
}
public boolean isPackageAllowed() {
return isPackageAllowed;
}
public boolean isClosuresAllowed() {
return isClosuresAllowed;
}
public void setClosuresAllowed(final boolean closuresAllowed) {
isClosuresAllowed = closuresAllowed;
}
public void setPackageAllowed(final boolean packageAllowed) {
isPackageAllowed = packageAllowed;
}
public List getImportsBlacklist() {
return importsBlacklist;
}
public void setImportsBlacklist(final List importsBlacklist) {
if (importsWhitelist != null || starImportsWhitelist != null) {
throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist");
}
this.importsBlacklist = importsBlacklist;
}
public List getImportsWhitelist() {
return importsWhitelist;
}
public void setImportsWhitelist(final List importsWhitelist) {
if (importsBlacklist != null || starImportsBlacklist != null) {
throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist");
}
this.importsWhitelist = importsWhitelist;
}
public List getStarImportsBlacklist() {
return starImportsBlacklist;
}
public void setStarImportsBlacklist(final List starImportsBlacklist) {
if (importsWhitelist != null || starImportsWhitelist != null) {
throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist");
}
this.starImportsBlacklist = normalizeStarImports(starImportsBlacklist);
if (this.importsBlacklist == null) importsBlacklist = Collections.emptyList();
}
public List getStarImportsWhitelist() {
return starImportsWhitelist;
}
public void setStarImportsWhitelist(final List starImportsWhitelist) {
if (importsBlacklist != null || starImportsBlacklist != null) {
throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist");
}
this.starImportsWhitelist = normalizeStarImports(starImportsWhitelist);
if (this.importsWhitelist == null) importsWhitelist = Collections.emptyList();
}
/**
* Ensures that every star import ends with .* as this is the expected syntax in import checks.
*/
private static List normalizeStarImports(List starImports) {
List result = new ArrayList(starImports.size());
for (String starImport : starImports) {
if (starImport.endsWith(".*")) {
result.add(starImport);
} else if (starImport.endsWith(".")) {
result.add(starImport + "*");
} else {
result.add(starImport + ".*");
}
}
return Collections.unmodifiableList(result);
}
public List getStaticImportsBlacklist() {
return staticImportsBlacklist;
}
public void setStaticImportsBlacklist(final List staticImportsBlacklist) {
if (staticImportsWhitelist != null || staticStarImportsWhitelist != null) {
throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist");
}
this.staticImportsBlacklist = staticImportsBlacklist;
}
public List getStaticImportsWhitelist() {
return staticImportsWhitelist;
}
public void setStaticImportsWhitelist(final List staticImportsWhitelist) {
if (staticImportsBlacklist != null || staticStarImportsBlacklist != null) {
throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist");
}
this.staticImportsWhitelist = staticImportsWhitelist;
}
public List getStaticStarImportsBlacklist() {
return staticStarImportsBlacklist;
}
public void setStaticStarImportsBlacklist(final List staticStarImportsBlacklist) {
if (staticImportsWhitelist != null || staticStarImportsWhitelist != null) {
throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist");
}
this.staticStarImportsBlacklist = normalizeStarImports(staticStarImportsBlacklist);
if (this.staticImportsBlacklist == null) this.staticImportsBlacklist = Collections.emptyList();
}
public List getStaticStarImportsWhitelist() {
return staticStarImportsWhitelist;
}
public void setStaticStarImportsWhitelist(final List staticStarImportsWhitelist) {
if (staticImportsBlacklist != null || staticStarImportsBlacklist != null) {
throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist");
}
this.staticStarImportsWhitelist = normalizeStarImports(staticStarImportsWhitelist);
if (this.staticImportsWhitelist == null) this.staticImportsWhitelist = Collections.emptyList();
}
public List> getExpressionsBlacklist() {
return expressionsBlacklist;
}
public void setExpressionsBlacklist(final List> expressionsBlacklist) {
if (expressionsWhitelist != null) {
throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist");
}
this.expressionsBlacklist = expressionsBlacklist;
}
public List> getExpressionsWhitelist() {
return expressionsWhitelist;
}
public void setExpressionsWhitelist(final List> expressionsWhitelist) {
if (expressionsBlacklist != null) {
throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist");
}
this.expressionsWhitelist = expressionsWhitelist;
}
public List> getStatementsBlacklist() {
return statementsBlacklist;
}
public void setStatementsBlacklist(final List> statementsBlacklist) {
if (statementsWhitelist != null) {
throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist");
}
this.statementsBlacklist = statementsBlacklist;
}
public List> getStatementsWhitelist() {
return statementsWhitelist;
}
public void setStatementsWhitelist(final List> statementsWhitelist) {
if (statementsBlacklist != null) {
throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist");
}
this.statementsWhitelist = statementsWhitelist;
}
public List getTokensBlacklist() {
return tokensBlacklist;
}
public boolean isIndirectImportCheckEnabled() {
return isIndirectImportCheckEnabled;
}
/**
* Set this option to true if you want your import rules to be checked against every class node. This means that if
* someone uses a fully qualified class name, then it will also be checked against the import rules, preventing, for
* example, instantiation of classes without imports thanks to FQCN.
*
* @param indirectImportCheckEnabled set to true to enable indirect checks
*/
public void setIndirectImportCheckEnabled(final boolean indirectImportCheckEnabled) {
isIndirectImportCheckEnabled = indirectImportCheckEnabled;
}
/**
* Sets the list of tokens which are blacklisted.
*
* @param tokensBlacklist the tokens. The values of the tokens must be those of {@link org.codehaus.groovy.syntax.Types}
*/
public void setTokensBlacklist(final List tokensBlacklist) {
if (tokensWhitelist != null) {
throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist");
}
this.tokensBlacklist = tokensBlacklist;
}
public List getTokensWhitelist() {
return tokensWhitelist;
}
/**
* Sets the list of tokens which are whitelisted.
*
* @param tokensWhitelist the tokens. The values of the tokens must be those of {@link org.codehaus.groovy.syntax.Types}
*/
public void setTokensWhitelist(final List tokensWhitelist) {
if (tokensBlacklist != null) {
throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist");
}
this.tokensWhitelist = tokensWhitelist;
}
public void addStatementCheckers(StatementChecker... checkers) {
statementCheckers.addAll(Arrays.asList(checkers));
}
public void addExpressionCheckers(ExpressionChecker... checkers) {
expressionCheckers.addAll(Arrays.asList(checkers));
}
public List getConstantTypesBlackList() {
return constantTypesBlackList;
}
public void setConstantTypesBlackList(final List constantTypesBlackList) {
if (constantTypesWhiteList != null) {
throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist");
}
this.constantTypesBlackList = constantTypesBlackList;
}
public List getConstantTypesWhiteList() {
return constantTypesWhiteList;
}
public void setConstantTypesWhiteList(final List constantTypesWhiteList) {
if (constantTypesBlackList != null) {
throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist");
}
this.constantTypesWhiteList = constantTypesWhiteList;
}
/**
* An alternative way of setting constant types.
*
* @param constantTypesWhiteList a list of classes.
*/
public void setConstantTypesClassesWhiteList(final List constantTypesWhiteList) {
List values = new LinkedList();
for (Class aClass : constantTypesWhiteList) {
values.add(aClass.getName());
}
setConstantTypesWhiteList(values);
}
/**
* An alternative way of setting constant types.
*
* @param constantTypesBlackList a list of classes.
*/
public void setConstantTypesClassesBlackList(final List constantTypesBlackList) {
List values = new LinkedList();
for (Class aClass : constantTypesBlackList) {
values.add(aClass.getName());
}
setConstantTypesBlackList(values);
}
public List getReceiversBlackList() {
return receiversBlackList;
}
/**
* Sets the list of classes which deny method calls.
*
* @param receiversBlackList the list of refused classes, as fully qualified names
*/
public void setReceiversBlackList(final List receiversBlackList) {
if (receiversWhiteList != null) {
throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist");
}
this.receiversBlackList = receiversBlackList;
}
/**
* An alternative way of setting {@link #setReceiversBlackList(java.util.List) receiver classes}.
*
* @param receiversBlacklist a list of classes.
*/
public void setReceiversClassesBlackList(final List receiversBlacklist) {
List values = new LinkedList();
for (Class aClass : receiversBlacklist) {
values.add(aClass.getName());
}
setReceiversBlackList(values);
}
public List getReceiversWhiteList() {
return receiversWhiteList;
}
/**
* Sets the list of classes which may accept method calls.
*
* @param receiversWhiteList the list of accepted classes, as fully qualified names
*/
public void setReceiversWhiteList(final List receiversWhiteList) {
if (receiversBlackList != null) {
throw new IllegalArgumentException("You are not allowed to set both whitelist and blacklist");
}
this.receiversWhiteList = receiversWhiteList;
}
/**
* An alternative way of setting {@link #setReceiversWhiteList(java.util.List) receiver classes}.
*
* @param receiversWhitelist a list of classes.
*/
public void setReceiversClassesWhiteList(final List receiversWhitelist) {
List values = new LinkedList();
for (Class aClass : receiversWhitelist) {
values.add(aClass.getName());
}
setReceiversWhiteList(values);
}
@Override
public void call(final SourceUnit source, final GeneratorContext context, final ClassNode classNode) throws CompilationFailedException {
final ModuleNode ast = source.getAST();
if (!isPackageAllowed && ast.getPackage() != null) {
throw new SecurityException("Package definitions are not allowed");
}
checkMethodDefinitionAllowed(classNode);
// verify imports
if (importsBlacklist != null || importsWhitelist != null || starImportsBlacklist != null || starImportsWhitelist != null) {
for (ImportNode importNode : ast.getImports()) {
final String className = importNode.getClassName();
assertImportIsAllowed(className);
}
for (ImportNode importNode : ast.getStarImports()) {
final String className = importNode.getPackageName();
assertStarImportIsAllowed(className + "*");
}
}
// verify static imports
if (staticImportsBlacklist != null || staticImportsWhitelist != null || staticStarImportsBlacklist != null || staticStarImportsWhitelist != null) {
for (Map.Entry entry : ast.getStaticImports().entrySet()) {
final String className = entry.getValue().getClassName();
assertStaticImportIsAllowed(entry.getKey(), className);
}
for (Map.Entry entry : ast.getStaticStarImports().entrySet()) {
final String className = entry.getValue().getClassName();
assertStaticImportIsAllowed(entry.getKey(), className);
}
}
final SecuringCodeVisitor visitor = new SecuringCodeVisitor();
ast.getStatementBlock().visit(visitor);
for (ClassNode clNode : ast.getClasses()) {
if (clNode!=classNode) {
checkMethodDefinitionAllowed(clNode);
for (MethodNode methodNode : clNode.getMethods()) {
if (!methodNode.isSynthetic()) {
methodNode.getCode().visit(visitor);
}
}
}
}
List methods = filterMethods(classNode);
if (isMethodDefinitionAllowed) {
for (MethodNode method : methods) {
if (method.getDeclaringClass()==classNode) method.getCode().visit(visitor);
}
}
}
private void checkMethodDefinitionAllowed(ClassNode owner) {
if (isMethodDefinitionAllowed) return;
List methods = filterMethods(owner);
if (!methods.isEmpty()) throw new SecurityException("Method definitions are not allowed");
}
private List filterMethods(ClassNode owner) {
List result = new LinkedList();
List methods = owner.getMethods();
for (MethodNode method : methods) {
if (method.getDeclaringClass() == owner && !method.isSynthetic()) {
if ("main".equals(method.getName()) || "run".equals(method.getName()) && owner.isScriptBody()) continue;
result.add(method);
}
}
return result;
}
private void assertStarImportIsAllowed(final String packageName) {
if (starImportsWhitelist != null && !starImportsWhitelist.contains(packageName)) {
throw new SecurityException("Importing [" + packageName + "] is not allowed");
}
if (starImportsBlacklist != null && starImportsBlacklist.contains(packageName)) {
throw new SecurityException("Importing [" + packageName + "] is not allowed");
}
}
private void assertImportIsAllowed(final String className) {
if (importsWhitelist != null && !importsWhitelist.contains(className)) {
if (starImportsWhitelist != null) {
// we should now check if the import is in the star imports
ClassNode node = ClassHelper.make(className);
final String packageName = node.getPackageName();
if (!starImportsWhitelist.contains(packageName + ".*")) {
throw new SecurityException("Importing [" + className + "] is not allowed");
}
} else {
throw new SecurityException("Importing [" + className + "] is not allowed");
}
}
if (importsBlacklist != null && importsBlacklist.contains(className)) {
throw new SecurityException("Importing [" + className + "] is not allowed");
}
// check that there's no star import blacklist
if (starImportsBlacklist != null) {
ClassNode node = ClassHelper.make(className);
final String packageName = node.getPackageName();
if (starImportsBlacklist.contains(packageName + ".*")) {
throw new SecurityException("Importing [" + className + "] is not allowed");
}
}
}
private void assertStaticImportIsAllowed(final String member, final String className) {
final String fqn = member.equals(className) ? member : className + "." + member;
if (staticImportsWhitelist != null && !staticImportsWhitelist.contains(fqn)) {
if (staticStarImportsWhitelist != null) {
// we should now check if the import is in the star imports
if (!staticStarImportsWhitelist.contains(className + ".*")) {
throw new SecurityException("Importing [" + fqn + "] is not allowed");
}
} else {
throw new SecurityException("Importing [" + fqn + "] is not allowed");
}
}
if (staticImportsBlacklist != null && staticImportsBlacklist.contains(fqn)) {
throw new SecurityException("Importing [" + fqn + "] is not allowed");
}
// check that there's no star import blacklist
if (staticStarImportsBlacklist != null) {
if (staticStarImportsBlacklist.contains(className + ".*")) {
throw new SecurityException("Importing [" + fqn + "] is not allowed");
}
}
}
/**
* This visitor directly implements the {@link GroovyCodeVisitor} interface instead of using the {@link
* CodeVisitorSupport} class to make sure that future features of the language gets managed by this visitor. Thus,
* adding a new feature would result in a compilation error if this visitor is not updated.
*/
private class SecuringCodeVisitor implements GroovyCodeVisitor {
/**
* Checks that a given statement is either in the whitelist or not in the blacklist.
*
* @param statement the statement to be checked
* @throws SecurityException if usage of this statement class is forbidden
*/
private void assertStatementAuthorized(final Statement statement) throws SecurityException {
final Class extends Statement> clazz = statement.getClass();
if (statementsBlacklist != null && statementsBlacklist.contains(clazz)) {
throw new SecurityException(clazz.getSimpleName() + "s are not allowed");
} else if (statementsWhitelist != null && !statementsWhitelist.contains(clazz)) {
throw new SecurityException(clazz.getSimpleName() + "s are not allowed");
}
for (StatementChecker statementChecker : statementCheckers) {
if (!statementChecker.isAuthorized(statement)) {
throw new SecurityException("Statement [" + clazz.getSimpleName() + "] is not allowed");
}
}
}
/**
* Checks that a given expression is either in the whitelist or not in the blacklist.
*
* @param expression the expression to be checked
* @throws SecurityException if usage of this expression class is forbidden
*/
private void assertExpressionAuthorized(final Expression expression) throws SecurityException {
final Class extends Expression> clazz = expression.getClass();
if (expressionsBlacklist != null && expressionsBlacklist.contains(clazz)) {
throw new SecurityException(clazz.getSimpleName() + "s are not allowed: " + expression.getText());
} else if (expressionsWhitelist != null && !expressionsWhitelist.contains(clazz)) {
throw new SecurityException(clazz.getSimpleName() + "s are not allowed: " + expression.getText());
}
for (ExpressionChecker expressionChecker : expressionCheckers) {
if (!expressionChecker.isAuthorized(expression)) {
throw new SecurityException("Expression [" + clazz.getSimpleName() + "] is not allowed: " + expression.getText());
}
}
if (isIndirectImportCheckEnabled) {
try {
if (expression instanceof ConstructorCallExpression) {
assertImportIsAllowed(expression.getType().getName());
} else if (expression instanceof MethodCallExpression) {
MethodCallExpression expr = (MethodCallExpression) expression;
final String typename = expr.getObjectExpression().getType().getName();
assertImportIsAllowed(typename);
assertStaticImportIsAllowed(expr.getMethodAsString(), typename);
} else if (expression instanceof StaticMethodCallExpression) {
StaticMethodCallExpression expr = (StaticMethodCallExpression) expression;
final String typename = expr.getOwnerType().getName();
assertImportIsAllowed(typename);
assertStaticImportIsAllowed(expr.getMethod(), typename);
} else if (expression instanceof MethodPointerExpression) {
MethodPointerExpression expr = (MethodPointerExpression) expression;
final String typename = expr.getType().getName();
assertImportIsAllowed(typename);
assertStaticImportIsAllowed(expr.getText(), typename);
}
} catch (SecurityException e) {
throw new SecurityException("Indirect import checks prevents usage of expression", e);
}
}
}
/**
* Checks that a given token is either in the whitelist or not in the blacklist.
*
* @param token the token to be checked
* @throws SecurityException if usage of this token is forbidden
*/
private void assertTokenAuthorized(final Token token) throws SecurityException {
final int value = token.getType();
if (tokensBlacklist != null && tokensBlacklist.contains(value)) {
throw new SecurityException("Token " + token + " is not allowed");
} else if (tokensWhitelist != null && !tokensWhitelist.contains(value)) {
throw new SecurityException("Token " + token + " is not allowed");
}
}
public void visitBlockStatement(final BlockStatement block) {
assertStatementAuthorized(block);
for (Statement statement : block.getStatements()) {
statement.visit(this);
}
}
public void visitForLoop(final ForStatement forLoop) {
assertStatementAuthorized(forLoop);
forLoop.getCollectionExpression().visit(this);
forLoop.getLoopBlock().visit(this);
}
public void visitWhileLoop(final WhileStatement loop) {
assertStatementAuthorized(loop);
loop.getBooleanExpression().visit(this);
loop.getLoopBlock().visit(this);
}
public void visitDoWhileLoop(final DoWhileStatement loop) {
assertStatementAuthorized(loop);
loop.getBooleanExpression().visit(this);
loop.getLoopBlock().visit(this);
}
public void visitIfElse(final IfStatement ifElse) {
assertStatementAuthorized(ifElse);
ifElse.getBooleanExpression().visit(this);
ifElse.getIfBlock().visit(this);
Statement elseBlock = ifElse.getElseBlock();
if (elseBlock instanceof EmptyStatement) {
// dispatching to EmptyStatement will not call back visitor,
// must call our visitEmptyStatement explicitly
visitEmptyStatement((EmptyStatement) elseBlock);
} else {
elseBlock.visit(this);
}
}
public void visitExpressionStatement(final ExpressionStatement statement) {
assertStatementAuthorized(statement);
statement.getExpression().visit(this);
}
public void visitReturnStatement(final ReturnStatement statement) {
assertStatementAuthorized(statement);
statement.getExpression().visit(this);
}
public void visitAssertStatement(final AssertStatement statement) {
assertStatementAuthorized(statement);
statement.getBooleanExpression().visit(this);
statement.getMessageExpression().visit(this);
}
public void visitTryCatchFinally(final TryCatchStatement statement) {
assertStatementAuthorized(statement);
statement.getTryStatement().visit(this);
for (CatchStatement catchStatement : statement.getCatchStatements()) {
catchStatement.visit(this);
}
Statement finallyStatement = statement.getFinallyStatement();
if (finallyStatement instanceof EmptyStatement) {
// dispatching to EmptyStatement will not call back visitor,
// must call our visitEmptyStatement explicitly
visitEmptyStatement((EmptyStatement) finallyStatement);
} else {
finallyStatement.visit(this);
}
}
protected void visitEmptyStatement(EmptyStatement statement) {
// noop
}
public void visitSwitch(final SwitchStatement statement) {
assertStatementAuthorized(statement);
statement.getExpression().visit(this);
for (CaseStatement caseStatement : statement.getCaseStatements()) {
caseStatement.visit(this);
}
statement.getDefaultStatement().visit(this);
}
public void visitCaseStatement(final CaseStatement statement) {
assertStatementAuthorized(statement);
statement.getExpression().visit(this);
statement.getCode().visit(this);
}
public void visitBreakStatement(final BreakStatement statement) {
assertStatementAuthorized(statement);
}
public void visitContinueStatement(final ContinueStatement statement) {
assertStatementAuthorized(statement);
}
public void visitThrowStatement(final ThrowStatement statement) {
assertStatementAuthorized(statement);
statement.getExpression().visit(this);
}
public void visitSynchronizedStatement(final SynchronizedStatement statement) {
assertStatementAuthorized(statement);
statement.getExpression().visit(this);
statement.getCode().visit(this);
}
public void visitCatchStatement(final CatchStatement statement) {
assertStatementAuthorized(statement);
statement.getCode().visit(this);
}
public void visitMethodCallExpression(final MethodCallExpression call) {
assertExpressionAuthorized(call);
Expression receiver = call.getObjectExpression();
final String typeName = receiver.getType().getName();
if (receiversWhiteList != null && !receiversWhiteList.contains(typeName)) {
throw new SecurityException("Method calls not allowed on [" + typeName + "]");
} else if (receiversBlackList != null && receiversBlackList.contains(typeName)) {
throw new SecurityException("Method calls not allowed on [" + typeName + "]");
}
receiver.visit(this);
final Expression method = call.getMethod();
checkConstantTypeIfNotMethodNameOrProperty(method);
call.getArguments().visit(this);
}
public void visitStaticMethodCallExpression(final StaticMethodCallExpression call) {
assertExpressionAuthorized(call);
final String typeName = call.getOwnerType().getName();
if (receiversWhiteList != null && !receiversWhiteList.contains(typeName)) {
throw new SecurityException("Method calls not allowed on [" + typeName + "]");
} else if (receiversBlackList != null && receiversBlackList.contains(typeName)) {
throw new SecurityException("Method calls not allowed on [" + typeName + "]");
}
call.getArguments().visit(this);
}
public void visitConstructorCallExpression(final ConstructorCallExpression call) {
assertExpressionAuthorized(call);
call.getArguments().visit(this);
}
public void visitTernaryExpression(final TernaryExpression expression) {
assertExpressionAuthorized(expression);
expression.getBooleanExpression().visit(this);
expression.getTrueExpression().visit(this);
expression.getFalseExpression().visit(this);
}
public void visitShortTernaryExpression(final ElvisOperatorExpression expression) {
assertExpressionAuthorized(expression);
visitTernaryExpression(expression);
}
public void visitBinaryExpression(final BinaryExpression expression) {
assertExpressionAuthorized(expression);
assertTokenAuthorized(expression.getOperation());
expression.getLeftExpression().visit(this);
expression.getRightExpression().visit(this);
}
public void visitPrefixExpression(final PrefixExpression expression) {
assertExpressionAuthorized(expression);
assertTokenAuthorized(expression.getOperation());
expression.getExpression().visit(this);
}
public void visitPostfixExpression(final PostfixExpression expression) {
assertExpressionAuthorized(expression);
assertTokenAuthorized(expression.getOperation());
expression.getExpression().visit(this);
}
public void visitBooleanExpression(final BooleanExpression expression) {
assertExpressionAuthorized(expression);
expression.getExpression().visit(this);
}
public void visitClosureExpression(final ClosureExpression expression) {
assertExpressionAuthorized(expression);
if (!isClosuresAllowed) throw new SecurityException("Closures are not allowed");
expression.getCode().visit(this);
}
public void visitTupleExpression(final TupleExpression expression) {
assertExpressionAuthorized(expression);
visitListOfExpressions(expression.getExpressions());
}
public void visitMapExpression(final MapExpression expression) {
assertExpressionAuthorized(expression);
visitListOfExpressions(expression.getMapEntryExpressions());
}
public void visitMapEntryExpression(final MapEntryExpression expression) {
assertExpressionAuthorized(expression);
expression.getKeyExpression().visit(this);
expression.getValueExpression().visit(this);
}
public void visitListExpression(final ListExpression expression) {
assertExpressionAuthorized(expression);
visitListOfExpressions(expression.getExpressions());
}
public void visitRangeExpression(final RangeExpression expression) {
assertExpressionAuthorized(expression);
expression.getFrom().visit(this);
expression.getTo().visit(this);
}
public void visitPropertyExpression(final PropertyExpression expression) {
assertExpressionAuthorized(expression);
Expression receiver = expression.getObjectExpression();
final String typeName = receiver.getType().getName();
if (receiversWhiteList != null && !receiversWhiteList.contains(typeName)) {
throw new SecurityException("Property access not allowed on [" + typeName + "]");
} else if (receiversBlackList != null && receiversBlackList.contains(typeName)) {
throw new SecurityException("Property access not allowed on [" + typeName + "]");
}
receiver.visit(this);
final Expression property = expression.getProperty();
checkConstantTypeIfNotMethodNameOrProperty(property);
}
private void checkConstantTypeIfNotMethodNameOrProperty(final Expression expr) {
if (expr instanceof ConstantExpression) {
if (!"java.lang.String".equals(expr.getType().getName())) {
expr.visit(this);
}
} else {
expr.visit(this);
}
}
public void visitAttributeExpression(final AttributeExpression expression) {
assertExpressionAuthorized(expression);
Expression receiver = expression.getObjectExpression();
final String typeName = receiver.getType().getName();
if (receiversWhiteList != null && !receiversWhiteList.contains(typeName)) {
throw new SecurityException("Attribute access not allowed on [" + typeName + "]");
} else if (receiversBlackList != null && receiversBlackList.contains(typeName)) {
throw new SecurityException("Attribute access not allowed on [" + typeName + "]");
}
receiver.visit(this);
final Expression property = expression.getProperty();
checkConstantTypeIfNotMethodNameOrProperty(property);
}
public void visitFieldExpression(final FieldExpression expression) {
assertExpressionAuthorized(expression);
}
public void visitMethodPointerExpression(final MethodPointerExpression expression) {
assertExpressionAuthorized(expression);
expression.getExpression().visit(this);
expression.getMethodName().visit(this);
}
public void visitConstantExpression(final ConstantExpression expression) {
assertExpressionAuthorized(expression);
final String type = expression.getType().getName();
if (constantTypesWhiteList != null && !constantTypesWhiteList.contains(type)) {
throw new SecurityException("Constant expression type [" + type + "] is not allowed");
}
if (constantTypesBlackList != null && constantTypesBlackList.contains(type)) {
throw new SecurityException("Constant expression type [" + type + "] is not allowed");
}
}
public void visitClassExpression(final ClassExpression expression) {
assertExpressionAuthorized(expression);
}
public void visitVariableExpression(final VariableExpression expression) {
assertExpressionAuthorized(expression);
final String type = expression.getType().getName();
if (constantTypesWhiteList != null && !constantTypesWhiteList.contains(type)) {
throw new SecurityException("Usage of variables of type [" + type + "] is not allowed");
}
if (constantTypesBlackList != null && constantTypesBlackList.contains(type)) {
throw new SecurityException("Usage of variables of type [" + type + "] is not allowed");
}
}
public void visitDeclarationExpression(final DeclarationExpression expression) {
assertExpressionAuthorized(expression);
visitBinaryExpression(expression);
}
protected void visitListOfExpressions(List extends Expression> list) {
if (list == null) return;
for (Expression expression : list) {
if (expression instanceof SpreadExpression) {
Expression spread = ((SpreadExpression) expression).getExpression();
spread.visit(this);
} else {
expression.visit(this);
}
}
}
public void visitGStringExpression(final GStringExpression expression) {
assertExpressionAuthorized(expression);
visitListOfExpressions(expression.getStrings());
visitListOfExpressions(expression.getValues());
}
public void visitArrayExpression(final ArrayExpression expression) {
assertExpressionAuthorized(expression);
visitListOfExpressions(expression.getExpressions());
visitListOfExpressions(expression.getSizeExpression());
}
public void visitSpreadExpression(final SpreadExpression expression) {
assertExpressionAuthorized(expression);
expression.getExpression().visit(this);
}
public void visitSpreadMapExpression(final SpreadMapExpression expression) {
assertExpressionAuthorized(expression);
expression.getExpression().visit(this);
}
public void visitNotExpression(final NotExpression expression) {
assertExpressionAuthorized(expression);
expression.getExpression().visit(this);
}
public void visitUnaryMinusExpression(final UnaryMinusExpression expression) {
assertExpressionAuthorized(expression);
expression.getExpression().visit(this);
}
public void visitUnaryPlusExpression(final UnaryPlusExpression expression) {
assertExpressionAuthorized(expression);
expression.getExpression().visit(this);
}
public void visitBitwiseNegationExpression(final BitwiseNegationExpression expression) {
assertExpressionAuthorized(expression);
expression.getExpression().visit(this);
}
public void visitCastExpression(final CastExpression expression) {
assertExpressionAuthorized(expression);
expression.getExpression().visit(this);
}
public void visitArgumentlistExpression(final ArgumentListExpression expression) {
assertExpressionAuthorized(expression);
visitTupleExpression(expression);
}
public void visitClosureListExpression(final ClosureListExpression closureListExpression) {
assertExpressionAuthorized(closureListExpression);
if (!isClosuresAllowed) throw new SecurityException("Closures are not allowed");
visitListOfExpressions(closureListExpression.getExpressions());
}
public void visitBytecodeExpression(final BytecodeExpression expression) {
assertExpressionAuthorized(expression);
}
}
/**
* This interface allows the user to plugin custom expression checkers if expression blacklist or whitelist are not
* sufficient
*/
public static interface ExpressionChecker {
boolean isAuthorized(Expression expression);
}
/**
* This interface allows the user to plugin custom statement checkers if statement blacklist or whitelist are not
* sufficient
*/
public static interface StatementChecker {
boolean isAuthorized(Statement expression);
}
}