2015-05-04 15:38:46 -04:00
|
|
|
/*
|
|
|
|
* Licensed to Elasticsearch under one or more contributor
|
|
|
|
* license agreements. See the NOTICE file distributed with
|
|
|
|
* this work for additional information regarding copyright
|
|
|
|
* ownership. Elasticsearch licenses this file to you under
|
|
|
|
* the Apache License, Version 2.0 (the "License"); you may
|
|
|
|
* not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing,
|
|
|
|
* software distributed under the License is distributed on an
|
|
|
|
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
|
|
|
* KIND, either express or implied. See the License for the
|
|
|
|
* specific language governing permissions and limitations
|
|
|
|
* under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package org.elasticsearch.bootstrap;
|
|
|
|
|
2015-05-05 00:33:29 -04:00
|
|
|
import org.elasticsearch.common.SuppressForbidden;
|
|
|
|
|
2015-12-18 20:16:15 -05:00
|
|
|
import java.io.FilePermission;
|
|
|
|
import java.io.IOException;
|
2016-11-22 10:26:36 -05:00
|
|
|
import java.net.SocketPermission;
|
|
|
|
import java.net.URL;
|
2015-09-01 00:34:34 -04:00
|
|
|
import java.security.CodeSource;
|
2015-05-04 15:38:46 -04:00
|
|
|
import java.security.Permission;
|
|
|
|
import java.security.PermissionCollection;
|
2015-10-23 21:57:50 -04:00
|
|
|
import java.security.Permissions;
|
2015-05-04 15:38:46 -04:00
|
|
|
import java.security.Policy;
|
|
|
|
import java.security.ProtectionDomain;
|
2017-03-21 12:12:16 -07:00
|
|
|
import java.util.Collections;
|
2015-10-14 14:46:45 -04:00
|
|
|
import java.util.Map;
|
2016-11-22 10:26:36 -05:00
|
|
|
import java.util.function.Predicate;
|
2015-05-04 15:38:46 -04:00
|
|
|
|
|
|
|
/** custom policy for union of static and dynamic permissions */
|
2015-05-22 16:45:48 -04:00
|
|
|
final class ESPolicy extends Policy {
|
2016-05-31 10:41:44 +02:00
|
|
|
|
2015-05-04 15:38:46 -04:00
|
|
|
/** template policy file, the one used in tests */
|
|
|
|
static final String POLICY_RESOURCE = "security.policy";
|
2015-10-04 17:13:47 -04:00
|
|
|
/** limited policy for scripts */
|
|
|
|
static final String UNTRUSTED_RESOURCE = "untrusted.policy";
|
2016-05-31 10:41:44 +02:00
|
|
|
|
2015-05-04 15:38:46 -04:00
|
|
|
final Policy template;
|
2015-10-04 17:13:47 -04:00
|
|
|
final Policy untrusted;
|
2015-11-12 18:05:59 -05:00
|
|
|
final Policy system;
|
2015-05-04 15:38:46 -04:00
|
|
|
final PermissionCollection dynamic;
|
2020-08-21 17:38:40 -06:00
|
|
|
final PermissionCollection dataPathPermission;
|
2015-10-27 20:06:13 -04:00
|
|
|
final Map<String,Policy> plugins;
|
2015-05-04 15:38:46 -04:00
|
|
|
|
2020-08-21 17:38:40 -06:00
|
|
|
ESPolicy(Map<String, URL> codebases, PermissionCollection dynamic, Map<String,Policy> plugins, boolean filterBadDefaults,
|
|
|
|
PermissionCollection dataPathPermission) {
|
2018-01-03 11:12:43 -08:00
|
|
|
this.template = Security.readPolicy(getClass().getResource(POLICY_RESOURCE), codebases);
|
2020-08-21 17:38:40 -06:00
|
|
|
this.dataPathPermission = dataPathPermission;
|
2018-01-03 11:12:43 -08:00
|
|
|
this.untrusted = Security.readPolicy(getClass().getResource(UNTRUSTED_RESOURCE), Collections.emptyMap());
|
2015-11-12 18:05:59 -05:00
|
|
|
if (filterBadDefaults) {
|
|
|
|
this.system = new SystemPolicy(Policy.getPolicy());
|
|
|
|
} else {
|
|
|
|
this.system = Policy.getPolicy();
|
|
|
|
}
|
2015-05-04 15:38:46 -04:00
|
|
|
this.dynamic = dynamic;
|
2015-10-14 14:46:45 -04:00
|
|
|
this.plugins = plugins;
|
2015-05-04 15:38:46 -04:00
|
|
|
}
|
|
|
|
|
2015-05-05 10:59:39 -04:00
|
|
|
@Override @SuppressForbidden(reason = "fast equals check is desired")
|
2016-05-31 10:41:44 +02:00
|
|
|
public boolean implies(ProtectionDomain domain, Permission permission) {
|
2015-09-01 00:34:34 -04:00
|
|
|
CodeSource codeSource = domain.getCodeSource();
|
|
|
|
// codesource can be null when reducing privileges via doPrivileged()
|
2015-10-04 17:13:47 -04:00
|
|
|
if (codeSource == null) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
URL location = codeSource.getLocation();
|
|
|
|
// location can be null... ??? nobody knows
|
|
|
|
// https://bugs.openjdk.java.net/browse/JDK-8129972
|
|
|
|
if (location != null) {
|
|
|
|
// run scripts with limited permissions
|
|
|
|
if (BootstrapInfo.UNTRUSTED_CODEBASE.equals(location.getFile())) {
|
|
|
|
return untrusted.implies(domain, permission);
|
2015-09-01 00:34:34 -04:00
|
|
|
}
|
2015-10-27 20:06:13 -04:00
|
|
|
// check for an additional plugin permission: plugin policy is
|
|
|
|
// only consulted for its codesources.
|
|
|
|
Policy plugin = plugins.get(location.getFile());
|
|
|
|
if (plugin != null && plugin.implies(domain, permission)) {
|
2015-10-14 14:46:45 -04:00
|
|
|
return true;
|
|
|
|
}
|
2015-05-05 00:33:29 -04:00
|
|
|
}
|
2015-09-01 00:34:34 -04:00
|
|
|
|
2015-12-18 20:16:15 -05:00
|
|
|
// Special handling for broken Hadoop code: "let me execute or my classes will not load"
|
|
|
|
// yeah right, REMOVE THIS when hadoop is fixed
|
|
|
|
if (permission instanceof FilePermission && "<<ALL FILES>>".equals(permission.getName())) {
|
|
|
|
for (StackTraceElement element : Thread.currentThread().getStackTrace()) {
|
|
|
|
if ("org.apache.hadoop.util.Shell".equals(element.getClassName()) &&
|
|
|
|
"runCommand".equals(element.getMethodName())) {
|
|
|
|
// we found the horrible method: the hack begins!
|
|
|
|
// force the hadoop code to back down, by throwing an exception that it catches.
|
|
|
|
rethrow(new IOException("no hadoop, you cannot do this."));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-08-21 17:38:40 -06:00
|
|
|
// The FilePermission to check access to the path.data is the hottest permission check in
|
|
|
|
// Elasticsearch, so we check it first.
|
|
|
|
if (permission instanceof FilePermission && dataPathPermission.implies(permission)) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2015-09-01 00:34:34 -04:00
|
|
|
// otherwise defer to template + dynamic file permissions
|
2015-11-12 18:05:59 -05:00
|
|
|
return template.implies(domain, permission) || dynamic.implies(permission) || system.implies(domain, permission);
|
2015-05-04 15:38:46 -04:00
|
|
|
}
|
2015-09-12 14:16:16 -04:00
|
|
|
|
2015-12-18 20:16:15 -05:00
|
|
|
/**
|
|
|
|
* Classy puzzler to rethrow any checked exception as an unchecked one.
|
|
|
|
*/
|
|
|
|
private static class Rethrower<T extends Throwable> {
|
|
|
|
private void rethrow(Throwable t) throws T {
|
|
|
|
throw (T) t;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Rethrows <code>t</code> (identical object).
|
|
|
|
*/
|
|
|
|
private void rethrow(Throwable t) {
|
|
|
|
new Rethrower<Error>().rethrow(t);
|
|
|
|
}
|
|
|
|
|
2015-10-23 21:57:50 -04:00
|
|
|
@Override
|
|
|
|
public PermissionCollection getPermissions(CodeSource codesource) {
|
|
|
|
// code should not rely on this method, or at least use it correctly:
|
|
|
|
// https://bugs.openjdk.java.net/browse/JDK-8014008
|
|
|
|
// return them a new empty permissions object so jvisualvm etc work
|
|
|
|
for (StackTraceElement element : Thread.currentThread().getStackTrace()) {
|
|
|
|
if ("sun.rmi.server.LoaderHandler".equals(element.getClassName()) &&
|
|
|
|
"loadClass".equals(element.getMethodName())) {
|
|
|
|
return new Permissions();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// return UNSUPPORTED_EMPTY_COLLECTION since it is safe.
|
|
|
|
return super.getPermissions(codesource);
|
|
|
|
}
|
2015-11-12 18:05:59 -05:00
|
|
|
|
|
|
|
// TODO: remove this hack when insecure defaults are removed from java
|
|
|
|
|
2016-11-22 10:26:36 -05:00
|
|
|
/**
|
|
|
|
* Wraps a bad default permission, applying a pre-implies to any permissions before checking if the wrapped bad default permission
|
|
|
|
* implies a permission.
|
|
|
|
*/
|
|
|
|
private static class BadDefaultPermission extends Permission {
|
|
|
|
|
|
|
|
private final Permission badDefaultPermission;
|
|
|
|
private final Predicate<Permission> preImplies;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Construct an instance with a pre-implies check to apply to desired permissions.
|
|
|
|
*
|
|
|
|
* @param badDefaultPermission the bad default permission to wrap
|
|
|
|
* @param preImplies a test that is applied to a desired permission before checking if the bad default permission that
|
|
|
|
* this instance wraps implies the desired permission
|
|
|
|
*/
|
2017-02-03 09:46:44 -05:00
|
|
|
BadDefaultPermission(final Permission badDefaultPermission, final Predicate<Permission> preImplies) {
|
2016-11-22 10:26:36 -05:00
|
|
|
super(badDefaultPermission.getName());
|
|
|
|
this.badDefaultPermission = badDefaultPermission;
|
|
|
|
this.preImplies = preImplies;
|
|
|
|
}
|
|
|
|
|
|
|
|
@Override
|
|
|
|
public final boolean implies(Permission permission) {
|
|
|
|
return preImplies.test(permission) && badDefaultPermission.implies(permission);
|
|
|
|
}
|
|
|
|
|
|
|
|
@Override
|
|
|
|
public final boolean equals(Object obj) {
|
|
|
|
return badDefaultPermission.equals(obj);
|
|
|
|
}
|
|
|
|
|
|
|
|
@Override
|
|
|
|
public int hashCode() {
|
|
|
|
return badDefaultPermission.hashCode();
|
|
|
|
}
|
|
|
|
|
|
|
|
@Override
|
|
|
|
public String getActions() {
|
|
|
|
return badDefaultPermission.getActions();
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2015-11-12 18:05:59 -05:00
|
|
|
// default policy file states:
|
|
|
|
// "It is strongly recommended that you either remove this permission
|
|
|
|
// from this policy file or further restrict it to code sources
|
|
|
|
// that you specify, because Thread.stop() is potentially unsafe."
|
|
|
|
// not even sure this method still works...
|
2016-11-22 10:26:36 -05:00
|
|
|
private static final Permission BAD_DEFAULT_NUMBER_ONE = new BadDefaultPermission(new RuntimePermission("stopThread"), p -> true);
|
2015-11-12 18:05:59 -05:00
|
|
|
|
|
|
|
// default policy file states:
|
|
|
|
// "allows anyone to listen on dynamic ports"
|
|
|
|
// specified exactly because that is what we want, and fastest since it won't imply any
|
|
|
|
// expensive checks for the implicit "resolve"
|
2016-11-22 10:26:36 -05:00
|
|
|
private static final Permission BAD_DEFAULT_NUMBER_TWO =
|
|
|
|
new BadDefaultPermission(
|
|
|
|
new SocketPermission("localhost:0", "listen"),
|
|
|
|
// we apply this pre-implies test because some SocketPermission#implies calls do expensive reverse-DNS resolves
|
|
|
|
p -> p instanceof SocketPermission && p.getActions().contains("listen"));
|
2015-11-12 18:05:59 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Wraps the Java system policy, filtering out bad default permissions that
|
|
|
|
* are granted to all domains. Note, before java 8 these were even worse.
|
|
|
|
*/
|
|
|
|
static class SystemPolicy extends Policy {
|
|
|
|
final Policy delegate;
|
|
|
|
|
|
|
|
SystemPolicy(Policy delegate) {
|
|
|
|
this.delegate = delegate;
|
|
|
|
}
|
|
|
|
|
|
|
|
@Override
|
|
|
|
public boolean implies(ProtectionDomain domain, Permission permission) {
|
2016-11-22 10:26:36 -05:00
|
|
|
if (BAD_DEFAULT_NUMBER_ONE.implies(permission) || BAD_DEFAULT_NUMBER_TWO.implies(permission)) {
|
2015-11-12 18:05:59 -05:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return delegate.implies(domain, permission);
|
|
|
|
}
|
|
|
|
}
|
2015-05-04 15:38:46 -04:00
|
|
|
}
|