blob: 787800c031dbb03317c07ce5962b2812f89c4065 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more contributor license
* agreements. See the NOTICE file distributed with this work for additional information regarding
* copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance with the License. You may obtain a
* copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software distributed under the License
* is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
* or implied. See the License for the specific language governing permissions and limitations under
* the License.
*/
package org.apache.geode.cache.query.security;
import java.lang.reflect.Method;
import java.util.Collections;
import java.util.Objects;
import java.util.Properties;
import java.util.Set;
import java.util.regex.Pattern;
import org.apache.geode.cache.Cache;
import org.apache.geode.cache.Declarable;
import org.apache.geode.cache.Region;
/**
* An immutable and thread-safe {@link MethodInvocationAuthorizer} that allows any method execution
* that follows the design patterns for accessor methods described in the JavaBean specification
* 1.01; that is, any method whose name begins with 'get' or 'is'. For additional security, only
* methods belonging to classes in user-specified packages will be allowed. If a method does not
* match the user-specified parameters, or belongs to the 'org.apache.geode' package, then the
* decision of whether to authorize or not will be delegated to the default
* {@link RestrictedMethodAuthorizer}.
* <p/>
*
* Some known dangerous methods, like {@link Object#getClass()}, are also rejected by this
* authorizer implementation (see
* {@link RestrictedMethodAuthorizer#isPermanentlyForbiddenMethod(Method, Object)}).
* <p/>
*
* When used as intended, with all region entries and OQL bind parameters following the JavaBean
* specification 1.01, this authorizer implementation addresses all four of the known security
* risks: {@code Java Reflection}, {@code Cache Modification}, {@code Region Modification} and
* {@code Region Entry Modification}.
* <p/>
*
* It should be noted that the {@code Region Entry Modification} security risk still potentially
* exists: users with the {@code DATA:READ:RegionName} privilege will be able to execute any
* method whose name starts with 'is' or 'get' on the objects stored within the region and on
* instances used as bind parameters of the OQL, providing they are in the specified packages.
* If those methods do not fully follow the JavaBean 1.01 specification that accessors do not
* modify the instance's state then entry modifications are possible.
* <p/>
*
* Usage of this authorizer implementation is only recommended for secured clusters on which the
* Operator has full confidence that all objects stored in regions and used as OQL bind parameters
* follow JavaBean specification 1.01. It might also be used on clusters on which the entries
* stored are immutable.
* <p/>
*
* @see org.apache.geode.cache.Cache
* @see org.apache.geode.cache.query.security.MethodInvocationAuthorizer
* @see org.apache.geode.cache.query.security.RestrictedMethodAuthorizer
*/
public final class JavaBeanAccessorMethodAuthorizer implements MethodInvocationAuthorizer {
static final String NULL_PACKAGE_MESSAGE =
"A set of allowed packages should be provided to configure the authorizer.";
static final String NULL_AUTHORIZER_MESSAGE =
"RestrictedMethodAuthorizer should be provided to create this authorizer.";
static final String NULL_CACHE_MESSAGE = "Cache should be provided to configure the authorizer.";
static final String GEODE_BASE_PACKAGE = "org.apache.geode";
private static final Pattern pattern = Pattern.compile("^(get|is)($|[A-Z])+.*");
private final RestrictedMethodAuthorizer restrictedMethodAuthorizer;
private final Set<String> allowedPackages;
/**
* Creates a {@code JavaBeanAccessorMethodAuthorizer} object and initializes it so it can be
* safely used in a multi-threaded environment.
* <p/>
*
* Applications can use this constructor as part of the initialization for custom authorizers
* (see {@link Declarable#initialize(Cache, Properties)}), when using a declarative approach.
*
* @param cache the {@code Cache} instance that owns this authorizer, required in order to
* configure the default {@link RestrictedMethodAuthorizer}.
* @param allowedPackages the packages containing classes for which 'is' and 'get' methods will
* be authorized.
*/
public JavaBeanAccessorMethodAuthorizer(Cache cache, Set<String> allowedPackages) {
Objects.requireNonNull(cache, NULL_CACHE_MESSAGE);
Objects.requireNonNull(allowedPackages, NULL_PACKAGE_MESSAGE);
this.restrictedMethodAuthorizer = new RestrictedMethodAuthorizer(cache);
this.allowedPackages = Collections.unmodifiableSet(allowedPackages);
}
/**
* Creates a {@code JavaBeanAccessorMethodAuthorizer} object and initializes it so it can be
* safely used in a multi-threaded environment.
* <p/>
*
* @param restrictedMethodAuthorizer the default {@code RestrictedMethodAuthorizer} to use.
* @param allowedPackages the packages containing classes for which 'is' and 'get' methods will
* be authorized.
*/
public JavaBeanAccessorMethodAuthorizer(RestrictedMethodAuthorizer restrictedMethodAuthorizer,
Set<String> allowedPackages) {
Objects.requireNonNull(restrictedMethodAuthorizer, NULL_AUTHORIZER_MESSAGE);
Objects.requireNonNull(allowedPackages, NULL_PACKAGE_MESSAGE);
this.restrictedMethodAuthorizer = restrictedMethodAuthorizer;
this.allowedPackages = Collections.unmodifiableSet(allowedPackages);
}
/**
* Executes the authorization logic to determine whether the {@code method} is allowed to be
* executed on the {@code target} object instance.
* If the {@code target} object is an instance of {@link Region}, this methods also ensures that
* the user has the {@code DATA:READ} permission granted for the target {@link Region}.
* </p>
*
* @param method the {@link Method} that should be authorized.
* @param target the {@link Object} on which the {@link Method} will be executed.
* @return {@code true} if the {@code method} can be executed on on the {@code target} instance,
* {@code false} otherwise.
*
* @see org.apache.geode.cache.query.security.MethodInvocationAuthorizer
*/
@Override
public boolean authorize(Method method, Object target) {
// Return false for known dangerous methods.
if (restrictedMethodAuthorizer.isPermanentlyForbiddenMethod(method, target)) {
return false;
}
String packageName = target.getClass().getPackage().getName();
// If the target object belongs to the 'org.apache.geode' package, delegate to the default
// authorizer.
if (packageName.startsWith(GEODE_BASE_PACKAGE)) {
return restrictedMethodAuthorizer.isAllowedGeodeMethod(method, target);
}
String methodName = method.getName();
// Return true if the the object belongs to an allowed package and the method starts with
// exactly 'get' or 'is' followed by a non-lowercase character (to prevent matching with
// methods that might have names like 'getawayDate' or 'islandName' etc.)
if (pattern.matcher(methodName).matches()) {
if (allowedPackages.stream().anyMatch(packageName::startsWith)) {
return true;
}
}
// Delegate to the default authorizer if none of the above criteria are met.
return restrictedMethodAuthorizer.authorize(method, target);
}
/**
* Returns an unmodifiable view of the allowed packages for this authorizer.
* This method can be used to get "read-only" access to the set containing the packages
* specified as allowed on construction of this authorizer.
*
* @return an unmodifiable view of the allowed packages for this authorizer.
*/
public Set<String> getAllowedPackages() {
return allowedPackages;
}
}