net.sourceforge.plantuml.security.SecurityProfile Maven / Gradle / Ivy
Show all versions of plantuml-gplv2 Show documentation
// THIS FILE HAS BEEN GENERATED BY A PREPROCESSOR.
/* +=======================================================================
* |
* | PlantUML : a free UML diagram generator
* |
* +=======================================================================
*
* (C) Copyright 2009-2024, Arnaud Roques
*
* Project Info: https://plantuml.com
*
* If you like this project or if you find it useful, you can support us at:
*
* https://plantuml.com/patreon (only 1$ per month!)
* https://plantuml.com/liberapay (only 1€ per month!)
* https://plantuml.com/paypal
*
*
* PlantUML is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License V2.
*
* THE ACCOMPANYING PROGRAM IS PROVIDED UNDER THE TERMS OF THIS ECLIPSE PUBLIC
* LICENSE ("AGREEMENT"). [GNU General Public License V2]
*
* ANY USE, REPRODUCTION OR DISTRIBUTION OF THE PROGRAM CONSTITUTES
* RECIPIENT'S ACCEPTANCE OF THIS AGREEMENT.
*
* You may obtain a copy of the License at
*
* https://www.gnu.org/licenses/old-licenses/gpl-2.0.html
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
* PlantUML can occasionally display sponsored or advertising messages. Those
* messages are usually generated on welcome or error images and never on
* functional diagrams.
* See https://plantuml.com/professional if you want to remove them
*
* Images (whatever their format : PNG, SVG, EPS...) generated by running PlantUML
* are owned by the author of their corresponding sources code (that is, their
* textual description in PlantUML language). Those images are not covered by
* this GPL v2 license.
*
* The generated images can then be used without any reference to the GPL v2 license.
* It is not even necessary to stipulate that they have been generated with PlantUML,
* although this will be appreciated by the PlantUML team.
*
* There is an exception : if the textual description in PlantUML language is also covered
* by any license, then the generated images are logically covered
* by the very same license.
*
* This is the IGY distribution (Install GraphViz by Yourself).
* You have to install GraphViz and to setup the GRAPHVIZ_DOT environment variable
* (see https://plantuml.com/graphviz-dot )
*
* Icons provided by OpenIconic : https://useiconic.com/open
* Archimate sprites provided by Archi : http://www.archimatetool.com
* Stdlib AWS provided by https://github.com/milo-minderbinder/AWS-PlantUML
* Stdlib Icons provided https://github.com/tupadr3/plantuml-icon-font-sprites
* ASCIIMathML (c) Peter Jipsen http://www.chapman.edu/~jipsen
* ASCIIMathML (c) David Lippman http://www.pierce.ctc.edu/dlippman
* CafeUndZopfli ported by Eugene Klyuchnikov https://github.com/eustas/CafeUndZopfli
* Brotli (c) by the Brotli Authors https://github.com/google/brotli
* Themes (c) by Brett Schwarz https://github.com/bschwarz/puml-themes
* Twemoji (c) by Twitter at https://twemoji.twitter.com/
*
*/
package net.sourceforge.plantuml.security;
/**
* There are 4 different security profile defined.
*
* The security profile to be used is set at the launch of PlantUML and cannot
* be changed by users. The security profile defines what an instance of
* PlantUML is allowed to do:
* - access some local file
* - connection to some remote URL
* - print some technical information to the users.
*
*
* The security profile is defined:
* - either by an environment variable
* - or an option at command line
*
* There is also a default value, which is LEGACY in this current
* implementation.
*
*/
public enum SecurityProfile {
// ::remove folder when __HAXE__
/**
* Running in SANDBOX mode is completely secure. No local file can be read
* (except dot executable) No remote URL access can be used No technical
* information are print to users.
*
* This mode is defined for test and debug, since it's not very useful for
* users. However, you can use it if you need to.
*/
SANDBOX,
/**
*
*/
ALLOWLIST,
/**
* This mode is designed for PlantUML running in a web server.
*
*/
INTERNET,
/**
* This mode reproduce old PlantUML version behaviour.
*
* Right now, this is the default Security Profile but this will be removed from
* future version because it is now full secure, especially on Internet server.
*/
LEGACY,
/**
* Running in UNSECURE mode means that PlantUML can access to any local file and
* can connect to any URL.
*
* Some technical information (file path, Java version) are also printed in some
* error messages. This is not an issue if you are running PlantUML locally. But
* you should not use this mode if PlantUML is running on some server,
* especially if the server is accessible from Internet.
*/
UNSECURE;
/**
* Initialize the default value.
*
* It search in some config variable if the user has defined a some default
* value.
*
* @return the value
*/
static SecurityProfile init() {
// ::comment when __CORE__
final String env = SecurityUtils.getenv("PLANTUML_SECURITY_PROFILE");
if ("SANDBOX".equalsIgnoreCase(env))
return SANDBOX;
else if ("ALLOWLIST".equalsIgnoreCase(env))
return ALLOWLIST;
else if ("INTERNET".equalsIgnoreCase(env))
return INTERNET;
else if ("UNSECURE".equalsIgnoreCase(env))
return UNSECURE;
// ::comment when __CORE__
return LEGACY;
}
/**
* A Human understandable description.
*/
public String longDescription() {
switch (this) {
case SANDBOX:
return "This is completely safe: no access to local files or to distant URL.";
case ALLOWLIST:
return "Some local resource may be accessible.";
case INTERNET:
return "Mode designed for server connected to Internet.";
case LEGACY:
return "Warning: this mode will be removed in future version";
case UNSECURE:
return "Make sure that this server is not accessible from Internet";
}
return "This is completely safe: no access on local files or on distant URL.";
}
/**
* Retrieve the timeout for URL.
*/
public long getTimeout() {
switch (this) {
case SANDBOX:
return 1000L;
case ALLOWLIST:
return 1000L * 60 * 5;
case INTERNET:
return 1000L * 10;
case LEGACY:
return 1000L * 60;
case UNSECURE:
return 1000L * 60 * 5;
}
throw new AssertionError();
}
public boolean canWeReadThisEnvironmentVariable(String name) {
if (name == null)
return false;
final String lname = name.toLowerCase();
if (lname.startsWith("plantuml.security"))
return false;
if (lname.startsWith("plantuml"))
return true;
if (lname.equals("path.separator") || lname.equals("line.separator"))
return true;
return this == UNSECURE;
}
}