Skip to content

Commit

Permalink
[Java] refine AllowListChecker (#893)
Browse files Browse the repository at this point in the history
* refine AllowListChecker

* refine security warn log
  • Loading branch information
chaokunyang committed Sep 1, 2023
1 parent 712d600 commit 6b54cf7
Show file tree
Hide file tree
Showing 2 changed files with 96 additions and 43 deletions.
4 changes: 2 additions & 2 deletions java/fury-core/src/main/java/io/fury/Fury.java
Original file line number Diff line number Diff line change
Expand Up @@ -1461,9 +1461,9 @@ private void finish() {
if (!requireClassRegistration) {
LOG.warn(
"Class registration isn't forced, unknown classes can be deserialized. "
+ "If the environment isn't 100% secure, please enable class registration by "
+ "If the environment isn't secure, please enable class registration by "
+ "`FuryBuilder#requireClassRegistration(true)` or configure ClassChecker by "
+ "`ClassResolver.setClassChecker`");
+ "`ClassResolver#setClassChecker`");
}
}

Expand Down
135 changes: 94 additions & 41 deletions java/fury-core/src/main/java/io/fury/resolver/AllowListChecker.java
Original file line number Diff line number Diff line change
Expand Up @@ -21,6 +21,7 @@
import io.fury.memory.MemoryBuffer;
import io.fury.serializer.Serializer;
import io.fury.util.LoggerFactory;
import java.util.Collection;
import java.util.HashSet;
import java.util.Set;
import java.util.WeakHashMap;
Expand Down Expand Up @@ -49,7 +50,7 @@ public enum CheckLevel {
STRICT
}

private final CheckLevel checkLevel;
private volatile CheckLevel checkLevel;
private final Set<String> allowList;
private final Set<String> allowListPrefix;
private final Set<String> disallowList;
Expand All @@ -71,8 +72,25 @@ public AllowListChecker(CheckLevel checkLevel) {
listeners = new WeakHashMap<>();
}

public CheckLevel getCheckLevel() {
return checkLevel;
}

public void setCheckLevel(CheckLevel checkLevel) {
this.checkLevel = checkLevel;
}

@Override
public boolean checkClass(ClassResolver classResolver, String className) {
try {
lock.readLock().lock();
return check(className);
} finally {
lock.readLock().unlock();
}
}

private boolean check(String className) {
switch (checkLevel) {
case DISABLE:
return true;
Expand Down Expand Up @@ -106,41 +124,56 @@ public boolean checkClass(ClassResolver classResolver, String className) {
}
}

boolean containsPrefix(Set<String> set, Set<String> prefixSet, String className) {
try {
lock.readLock().lock();
if (set.contains(className)) {
static boolean containsPrefix(Set<String> set, Set<String> prefixSet, String className) {
if (set.contains(className)) {
return true;
}
for (String prefix : prefixSet) {
if (className.startsWith(prefix)) {
return true;
}
for (String prefix : prefixSet) {
if (className.startsWith(prefix)) {
return true;
}
}
return false;
} finally {
lock.readLock().unlock();
}
return false;
}

/**
* Add class to allow list.
*
* @param classNameOrPrefix class name or class name prefix ends with *.
* @param classNameOrPrefix class name or name prefix ends with *.
*/
public void allowClass(String classNameOrPrefix) {
try {
lock.writeLock().lock();
if (classNameOrPrefix.endsWith("*")) {
allowListPrefix.add(classNameOrPrefix.substring(0, classNameOrPrefix.length() - 1));
} else {
allowList.add(classNameOrPrefix);
allow(classNameOrPrefix);
} finally {
lock.writeLock().unlock();
}
}

/**
* Add classes to allow list.
*
* @param classNamesOrPrefixes class names or name prefixes ends with *.
*/
public void allowClasses(Collection<String> classNamesOrPrefixes) {
try {
lock.writeLock().lock();
for (String namesOrPrefix : classNamesOrPrefixes) {
allow(namesOrPrefix);
}
} finally {
lock.writeLock().unlock();
}
}

private void allow(String classNameOrPrefix) {
if (classNameOrPrefix.endsWith("*")) {
allowListPrefix.add(classNameOrPrefix.substring(0, classNameOrPrefix.length() - 1));
} else {
allowList.add(classNameOrPrefix);
}
}

/**
* Add class to disallow list.
*
Expand All @@ -149,35 +182,55 @@ public void allowClass(String classNameOrPrefix) {
public void disallowClass(String classNameOrPrefix) {
try {
lock.writeLock().lock();
if (classNameOrPrefix.endsWith("*")) {
String prefix = classNameOrPrefix.substring(0, classNameOrPrefix.length() - 1);
disallowListPrefix.add(prefix);
for (ClassResolver classResolver : listeners.keySet()) {
try {
classResolver.getFury().getJITContext().lock();
// clear serializer may throw NullPointerException for field serialization.
classResolver.setSerializers(prefix, DisallowSerializer.class);
} finally {
classResolver.getFury().getJITContext().unlock();
}
}
} else {
disallowList.add(classNameOrPrefix);
for (ClassResolver classResolver : listeners.keySet()) {
try {
classResolver.getFury().getJITContext().lock();
// clear serializer may throw NullPointerException for field serialization.
classResolver.setSerializer(classNameOrPrefix, DisallowSerializer.class);
} finally {
classResolver.getFury().getJITContext().unlock();
}
}
disallow(classNameOrPrefix);
} finally {
lock.writeLock().unlock();
}
}

/**
* Add classes to disallow list.
*
* @param classNamesOrPrefixes class names or name prefixes ends with *.
*/
public void disallowClasses(Collection<String> classNamesOrPrefixes) {
try {
lock.writeLock().lock();
for (String prefix : classNamesOrPrefixes) {
disallow(prefix);
}
} finally {
lock.writeLock().unlock();
}
}

private void disallow(String classNameOrPrefix) {
if (classNameOrPrefix.endsWith("*")) {
String prefix = classNameOrPrefix.substring(0, classNameOrPrefix.length() - 1);
disallowListPrefix.add(prefix);
for (ClassResolver classResolver : listeners.keySet()) {
try {
classResolver.getFury().getJITContext().lock();
// clear serializer may throw NullPointerException for field serialization.
classResolver.setSerializers(prefix, DisallowSerializer.class);
} finally {
classResolver.getFury().getJITContext().unlock();
}
}
} else {
disallowList.add(classNameOrPrefix);
for (ClassResolver classResolver : listeners.keySet()) {
try {
classResolver.getFury().getJITContext().lock();
// clear serializer may throw NullPointerException for field serialization.
classResolver.setSerializer(classNameOrPrefix, DisallowSerializer.class);
} finally {
classResolver.getFury().getJITContext().unlock();
}
}
}
}

/**
* Add listener to in response to disallow list. So if object of a class is serialized before,
* future serialization will be refused.
Expand Down

0 comments on commit 6b54cf7

Please sign in to comment.