public class SecureASTCustomizer extends CompilationCustomizer
Most of the security customization options found in this class work with either blacklist or whitelist. This means that, for a single option, you can set a whitelist OR a blacklist, but not both. You can mix whitelist/blacklist strategies for different options. For example, you can have import whitelist and tokens blacklist.
The recommended way of securing shells is to use whitelists because it is guaranteed that future features of the Groovy language won't be allowed by defaut. Using blacklists, you can limit the features of the languages by opting out, but new language features would require you to update your configuration.
If you set neither a whitelist nor a blacklist, then everything is authorized.
Combinations of import and star imports constraints are authorized as long as you use the same type of list for both. For example, you may use an import whitelist and a star import whitelist together, but you cannot use an import white list with a star import blacklist. static imports are handled separately, meaning that blacklisting an import does not prevent from using a static import.
Eventually, if the features provided here are not sufficient, you may implement custom AST filtering handlers, either
implementing the SecureASTCustomizer.StatementChecker
interface or SecureASTCustomizer.ExpressionChecker
interface then register your
handlers thanks to the addExpressionCheckers(org.codehaus.groovy.control.customizers.SecureASTCustomizer.ExpressionChecker...)
and addStatementCheckers(org.codehaus.groovy.control.customizers.SecureASTCustomizer.StatementChecker...)
methods.
Here is an example of usage. We will create a groovy classloader which only supports arithmetic operations and imports the java.lang.Math classes by default.
final ImportCustomizer imports = new ImportCustomizer().addStaticStars('java.lang.Math') // add static import of java.lang.Math final SecureASTCustomizer secure = new SecureASTCustomizer() secure.with { closuresAllowed = false methodDefinitionAllowed = false importsWhitelist = [] staticImportsWhitelist = [] staticStarImportsWhitelist = ['java.lang.Math'] // only java.lang.Math is allowed tokensWhitelist = [ PLUS, MINUS, MULTIPLY, DIVIDE, MOD, POWER, PLUS_PLUS, MINUS_MINUS, COMPARE_EQUAL, COMPARE_NOT_EQUAL, COMPARE_LESS_THAN, COMPARE_LESS_THAN_EQUAL, COMPARE_GREATER_THAN, COMPARE_GREATER_THAN_EQUAL, ].asImmutable() constantTypesClassesWhiteList = [ Integer, Float, Long, Double, BigDecimal, Integer.TYPE, Long.TYPE, Float.TYPE, Double.TYPE ].asImmutable() receiversClassesWhiteList = [ Math, Integer, Float, Double, Long, BigDecimal ].asImmutable() } CompilerConfiguration config = new CompilerConfiguration() config.addCompilationCustomizers(imports, secure) GroovyClassLoader loader = new GroovyClassLoader(this.class.classLoader, config)
Modifier and Type | Class and Description |
---|---|
static interface |
SecureASTCustomizer.ExpressionChecker
This interface allows the user to plugin custom expression checkers if expression blacklist or whitelist are not
sufficient
|
static interface |
SecureASTCustomizer.StatementChecker
This interface allows the user to plugin custom statement checkers if statement blacklist or whitelist are not
sufficient
|
Constructor and Description |
---|
SecureASTCustomizer() |
getPhase
needSortedInput
public boolean isMethodDefinitionAllowed()
public void setMethodDefinitionAllowed(boolean methodDefinitionAllowed)
public boolean isPackageAllowed()
public boolean isClosuresAllowed()
public void setClosuresAllowed(boolean closuresAllowed)
public void setPackageAllowed(boolean packageAllowed)
public void setStaticImportsBlacklist(List<String> staticImportsBlacklist)
public void setStaticImportsWhitelist(List<String> staticImportsWhitelist)
public void setStaticStarImportsBlacklist(List<String> staticStarImportsBlacklist)
public void setStaticStarImportsWhitelist(List<String> staticStarImportsWhitelist)
public List<Class<? extends Expression>> getExpressionsBlacklist()
public void setExpressionsBlacklist(List<Class<? extends Expression>> expressionsBlacklist)
public List<Class<? extends Expression>> getExpressionsWhitelist()
public void setExpressionsWhitelist(List<Class<? extends Expression>> expressionsWhitelist)
public void setStatementsBlacklist(List<Class<? extends Statement>> statementsBlacklist)
public void setStatementsWhitelist(List<Class<? extends Statement>> statementsWhitelist)
public boolean isIndirectImportCheckEnabled()
public void setIndirectImportCheckEnabled(boolean indirectImportCheckEnabled)
indirectImportCheckEnabled
- set to true to enable indirect checkspublic void setTokensBlacklist(List<Integer> tokensBlacklist)
tokensBlacklist
- the tokens. The values of the tokens must be those of Types
public void setTokensWhitelist(List<Integer> tokensWhitelist)
tokensWhitelist
- the tokens. The values of the tokens must be those of Types
public void addStatementCheckers(SecureASTCustomizer.StatementChecker... checkers)
public void addExpressionCheckers(SecureASTCustomizer.ExpressionChecker... checkers)
public void setConstantTypesBlackList(List<String> constantTypesBlackList)
public void setConstantTypesWhiteList(List<String> constantTypesWhiteList)
public void setConstantTypesClassesWhiteList(List<Class> constantTypesWhiteList)
constantTypesWhiteList
- a list of classes.public void setConstantTypesClassesBlackList(List<Class> constantTypesBlackList)
constantTypesBlackList
- a list of classes.public void setReceiversBlackList(List<String> receiversBlackList)
receiversBlackList
- the list of refused classes, as fully qualified namespublic void setReceiversClassesBlackList(List<Class> receiversBlacklist)
receiver classes
.receiversBlacklist
- a list of classes.public void setReceiversWhiteList(List<String> receiversWhiteList)
receiversWhiteList
- the list of accepted classes, as fully qualified namespublic void setReceiversClassesWhiteList(List<Class> receiversWhitelist)
receiver classes
.receiversWhitelist
- a list of classes.public void call(SourceUnit source, GeneratorContext context, ClassNode classNode) throws CompilationFailedException
call
in class CompilationUnit.PrimaryClassNodeOperation
CompilationFailedException