YARN-6472. Improve Java sandbox regex (gphillips via rkanter)
This commit is contained in:
parent
373bb4931f
commit
68e45f554b
|
@ -70,11 +70,12 @@ public class DelegatingLinuxContainerRuntime implements LinuxContainerRuntime {
|
||||||
private LinuxContainerRuntime pickContainerRuntime(
|
private LinuxContainerRuntime pickContainerRuntime(
|
||||||
Map<String, String> environment){
|
Map<String, String> environment){
|
||||||
LinuxContainerRuntime runtime;
|
LinuxContainerRuntime runtime;
|
||||||
|
//Sandbox checked first to ensure DockerRuntime doesn't circumvent controls
|
||||||
if (DockerLinuxContainerRuntime.isDockerContainerRequested(environment)){
|
if (javaSandboxLinuxContainerRuntime.isSandboxContainerRequested()){
|
||||||
runtime = dockerLinuxContainerRuntime;
|
|
||||||
} else if (javaSandboxLinuxContainerRuntime.isSandboxContainerRequested()) {
|
|
||||||
runtime = javaSandboxLinuxContainerRuntime;
|
runtime = javaSandboxLinuxContainerRuntime;
|
||||||
|
} else if (DockerLinuxContainerRuntime
|
||||||
|
.isDockerContainerRequested(environment)){
|
||||||
|
runtime = dockerLinuxContainerRuntime;
|
||||||
} else {
|
} else {
|
||||||
runtime = defaultLinuxContainerRuntime;
|
runtime = defaultLinuxContainerRuntime;
|
||||||
}
|
}
|
||||||
|
|
|
@ -141,8 +141,6 @@ public class JavaSandboxLinuxContainerRuntime
|
||||||
this.configuration.get(YarnConfiguration.YARN_CONTAINER_SANDBOX,
|
this.configuration.get(YarnConfiguration.YARN_CONTAINER_SANDBOX,
|
||||||
YarnConfiguration.DEFAULT_YARN_CONTAINER_SANDBOX));
|
YarnConfiguration.DEFAULT_YARN_CONTAINER_SANDBOX));
|
||||||
|
|
||||||
initializePolicyDir();
|
|
||||||
|
|
||||||
super.initialize(conf);
|
super.initialize(conf);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -223,6 +221,7 @@ public class JavaSandboxLinuxContainerRuntime
|
||||||
OutputStream policyOutputStream = null;
|
OutputStream policyOutputStream = null;
|
||||||
try {
|
try {
|
||||||
String containerID = ctx.getExecutionAttribute(CONTAINER_ID_STR);
|
String containerID = ctx.getExecutionAttribute(CONTAINER_ID_STR);
|
||||||
|
initializePolicyDir();
|
||||||
|
|
||||||
Path policyFilePath = Files.createFile(
|
Path policyFilePath = Files.createFile(
|
||||||
Paths.get(policyFileDir.toString(),
|
Paths.get(policyFileDir.toString(),
|
||||||
|
@ -368,8 +367,12 @@ public class JavaSandboxLinuxContainerRuntime
|
||||||
|
|
||||||
static final String STRIP_POLICY_FLAG = POLICY_APPEND_FLAG + "[^ ]+";
|
static final String STRIP_POLICY_FLAG = POLICY_APPEND_FLAG + "[^ ]+";
|
||||||
static final String CONTAINS_JAVA_CMD = "\\$" + JAVA_HOME + JAVA_CMD + ".*";
|
static final String CONTAINS_JAVA_CMD = "\\$" + JAVA_HOME + JAVA_CMD + ".*";
|
||||||
static final String CHAINED_COMMAND_REGEX =
|
static final String MULTI_COMMAND_REGEX =
|
||||||
"^.*(&&.+$)|(\\|\\|.+$).*$"; //Matches any occurrences of '||' or '&&'
|
"(?s).*(" + //command read as single line
|
||||||
|
"(&[^>]|&&)|(\\|{1,2})|(\\|&)|" + //Matches '&','&&','|','||' and '|&'
|
||||||
|
"(`[^`]+`)|(\\$\\([^)]+\\))|" + //Matches occurrences of $() or ``
|
||||||
|
"(;)" + //Matches end of statement ';'
|
||||||
|
").*";
|
||||||
static final String CLEAN_CMD_REGEX =
|
static final String CLEAN_CMD_REGEX =
|
||||||
"(" + SECURITY_FLAG + ")|" +
|
"(" + SECURITY_FLAG + ")|" +
|
||||||
"(" + STRIP_POLICY_FLAG + ")";
|
"(" + STRIP_POLICY_FLAG + ")";
|
||||||
|
@ -459,7 +462,7 @@ public class JavaSandboxLinuxContainerRuntime
|
||||||
String command = commands.get(i);
|
String command = commands.get(i);
|
||||||
if(validateJavaHome(env.get(JAVA_HOME.name()))
|
if(validateJavaHome(env.get(JAVA_HOME.name()))
|
||||||
&& command.matches(CONTAINS_JAVA_CMD)
|
&& command.matches(CONTAINS_JAVA_CMD)
|
||||||
&& !command.matches(CHAINED_COMMAND_REGEX)){
|
&& !command.matches(MULTI_COMMAND_REGEX)){
|
||||||
command = command.replaceAll(CLEAN_CMD_REGEX, "");
|
command = command.replaceAll(CLEAN_CMD_REGEX, "");
|
||||||
String securityString = JVM_SECURITY_CMD + policyPath + " ";
|
String securityString = JVM_SECURITY_CMD + policyPath + " ";
|
||||||
if(LOG.isDebugEnabled()) {
|
if(LOG.isDebugEnabled()) {
|
||||||
|
|
|
@ -47,7 +47,8 @@ import java.util.List;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
|
|
||||||
import static org.apache.hadoop.yarn.api.ApplicationConstants.Environment.JAVA_HOME;
|
import static org.apache.hadoop.yarn.api.ApplicationConstants.Environment.JAVA_HOME;
|
||||||
import static org.apache.hadoop.yarn.server.nodemanager.containermanager.linux.runtime.JavaSandboxLinuxContainerRuntime.NMContainerPolicyUtils.CHAINED_COMMAND_REGEX;
|
import static org.apache.hadoop.yarn.server.nodemanager.containermanager.linux.runtime.JavaSandboxLinuxContainerRuntime.NMContainerPolicyUtils.LOG;
|
||||||
|
import static org.apache.hadoop.yarn.server.nodemanager.containermanager.linux.runtime.JavaSandboxLinuxContainerRuntime.NMContainerPolicyUtils.MULTI_COMMAND_REGEX;
|
||||||
import static org.apache.hadoop.yarn.server.nodemanager.containermanager.linux.runtime.JavaSandboxLinuxContainerRuntime.NMContainerPolicyUtils.CLEAN_CMD_REGEX;
|
import static org.apache.hadoop.yarn.server.nodemanager.containermanager.linux.runtime.JavaSandboxLinuxContainerRuntime.NMContainerPolicyUtils.CLEAN_CMD_REGEX;
|
||||||
import static org.apache.hadoop.yarn.server.nodemanager.containermanager.linux.runtime.JavaSandboxLinuxContainerRuntime.NMContainerPolicyUtils.CONTAINS_JAVA_CMD;
|
import static org.apache.hadoop.yarn.server.nodemanager.containermanager.linux.runtime.JavaSandboxLinuxContainerRuntime.NMContainerPolicyUtils.CONTAINS_JAVA_CMD;
|
||||||
import static org.apache.hadoop.yarn.server.nodemanager.containermanager.linux.runtime.JavaSandboxLinuxContainerRuntime.NMContainerPolicyUtils.POLICY_FILE;
|
import static org.apache.hadoop.yarn.server.nodemanager.containermanager.linux.runtime.JavaSandboxLinuxContainerRuntime.NMContainerPolicyUtils.POLICY_FILE;
|
||||||
|
@ -293,8 +294,21 @@ public class TestJavaSandboxLinuxContainerRuntime {
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testChainedCmdRegex(){
|
public void testChainedCmdRegex(){
|
||||||
Assert.assertTrue("cmd1 && cmd2 || cmd3".matches(CHAINED_COMMAND_REGEX));
|
String[] multiCmds = {
|
||||||
Assert.assertFalse("cmd1 &> logfile".matches(CHAINED_COMMAND_REGEX));
|
"cmd1 && cmd2",
|
||||||
|
"cmd1 || cmd2",
|
||||||
|
"cmd1 `cmd2`",
|
||||||
|
"cmd1 $(cmd2)",
|
||||||
|
"cmd1; \\\n cmd2",
|
||||||
|
"cmd1; cmd2",
|
||||||
|
"cmd1|&cmd2",
|
||||||
|
"cmd1|cmd2",
|
||||||
|
"cmd1&cmd2"
|
||||||
|
};
|
||||||
|
|
||||||
|
Arrays.stream(multiCmds)
|
||||||
|
.forEach(cmd -> Assert.assertTrue(cmd.matches(MULTI_COMMAND_REGEX)));
|
||||||
|
Assert.assertFalse("cmd1 &> logfile".matches(MULTI_COMMAND_REGEX));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
|
Loading…
Reference in New Issue