blob: d16b37e6a9cb8135f3176d0d29b7427ce221e7a9 [file] [log] [blame]
cristy3ed852e2009-09-05 21:47:34 +00001/*
2%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
3% %
4% %
5% PPPP OOO L IIIII CCCC Y Y %
6% P P O O L I C Y Y %
7% PPPP O O L I C Y %
8% P O O L I C Y %
9% P OOO LLLLL IIIII CCCC Y %
10% %
11% %
12% MagickCore Policy Methods %
13% %
14% Software Design %
15% John Cristy %
16% July 1992 %
17% %
18% %
19% Copyright 1999-2009 ImageMagick Studio LLC, a non-profit organization %
20% dedicated to making software imaging solutions freely available. %
21% %
22% You may not use this file except in compliance with the License. You may %
23% obtain a copy of the License at %
24% %
25% http://www.imagemagick.org/script/license.php %
26% %
27% Unless required by applicable law or agreed to in writing, software %
28% distributed under the License is distributed on an "AS IS" BASIS, %
29% WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. %
30% See the License for the specific language governing permissions and %
31% limitations under the License. %
32% %
33%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
34%
35% We use linked-lists because splay-trees do not currently support duplicate
36% key / value pairs (.e.g X11 green compliance and SVG green compliance).
37%
38*/
39
40/*
41 Include declarations.
42*/
43#include "magick/studio.h"
44#include "magick/client.h"
45#include "magick/configure.h"
46#include "magick/exception.h"
47#include "magick/exception-private.h"
48#include "magick/memory_.h"
49#include "magick/monitor.h"
50#include "magick/monitor-private.h"
51#include "magick/option.h"
52#include "magick/policy.h"
53#include "magick/semaphore.h"
54#include "magick/string_.h"
55#include "magick/token.h"
56#include "magick/utility.h"
57#include "magick/xml-tree.h"
58
59/*
60 Define declarations.
61*/
62#define PolicyFilename "policy.xml"
63
64/*
cristy54a531d2009-10-21 17:58:01 +000065 Typedef declarations.
cristy3ed852e2009-09-05 21:47:34 +000066*/
67struct _PolicyInfo
68{
69 char
cristy54a531d2009-10-21 17:58:01 +000070 *path;
cristy3ed852e2009-09-05 21:47:34 +000071
72 PolicyDomain
73 domain;
74
75 PolicyRights
76 rights;
77
78 char
cristy54a531d2009-10-21 17:58:01 +000079 *name,
cristy3ed852e2009-09-05 21:47:34 +000080 *pattern,
81 *value;
82
83 MagickBooleanType
cristy54a531d2009-10-21 17:58:01 +000084 exempt,
cristy3ed852e2009-09-05 21:47:34 +000085 stealth,
86 debug;
87
88 SemaphoreInfo
89 *semaphore;
90
91 unsigned long
92 signature;
93};
cristy54a531d2009-10-21 17:58:01 +000094
95typedef struct _PolicyMapInfo
96{
97 const PolicyDomain
98 domain;
99
100 const PolicyRights
101 rights;
102
103 const char
104 *name,
105 *pattern,
106 *value;
107} PolicyMapInfo;
cristy3ed852e2009-09-05 21:47:34 +0000108
109/*
110 Static declarations.
111*/
cristy54a531d2009-10-21 17:58:01 +0000112static const PolicyMapInfo
113 PolicyMap[] =
114 {
cristyfa378d92009-10-23 15:41:15 +0000115 { UndefinedPolicyDomain, UndefinedPolicyRights, (const char *) NULL,
116 (const char *) NULL, (const char *) NULL }
cristy54a531d2009-10-21 17:58:01 +0000117 };
118
cristy3ed852e2009-09-05 21:47:34 +0000119static LinkedListInfo
120 *policy_list = (LinkedListInfo *) NULL;
121
122static SemaphoreInfo
123 *policy_semaphore = (SemaphoreInfo *) NULL;
124
125static volatile MagickBooleanType
126 instantiate_policy = MagickFalse;
127
128/*
129 Forward declarations.
130*/
131static MagickBooleanType
132 InitializePolicyList(ExceptionInfo *),
133 LoadPolicyLists(const char *,ExceptionInfo *);
134
135/*
136%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
137% %
138% %
139% %
cristy3ed852e2009-09-05 21:47:34 +0000140+ G e t P o l i c y I n f o %
141% %
142% %
143% %
144%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
145%
146% GetPolicyInfo() searches the policy list for the specified name and if found
147% returns attributes for that policy.
148%
149% The format of the GetPolicyInfo method is:
150%
151% PolicyInfo *GetPolicyInfo(const char *name,ExceptionInfo *exception)
152%
153% A description of each parameter follows:
154%
155% o name: the policy name.
156%
157% o exception: return any errors or warnings in this structure.
158%
159*/
160static PolicyInfo *GetPolicyInfo(const char *name,ExceptionInfo *exception)
161{
162 char
163 policyname[MaxTextExtent];
164
165 register PolicyInfo
166 *p;
167
168 register char
169 *q;
170
171 assert(exception != (ExceptionInfo *) NULL);
172 if ((policy_list == (LinkedListInfo *) NULL) ||
173 (instantiate_policy == MagickFalse))
174 if (InitializePolicyList(exception) == MagickFalse)
175 return((PolicyInfo *) NULL);
176 if ((policy_list == (LinkedListInfo *) NULL) ||
177 (IsLinkedListEmpty(policy_list) != MagickFalse))
178 return((PolicyInfo *) NULL);
179 if ((name == (const char *) NULL) || (LocaleCompare(name,"*") == 0))
180 return((PolicyInfo *) GetValueFromLinkedList(policy_list,0));
181 /*
182 Strip names of whitespace.
183 */
184 (void) CopyMagickString(policyname,name,MaxTextExtent);
185 for (q=policyname; *q != '\0'; q++)
186 {
187 if (isspace((int) ((unsigned char) *q)) == 0)
188 continue;
189 (void) CopyMagickString(q,q+1,MaxTextExtent);
190 q--;
191 }
192 /*
193 Search for policy tag.
194 */
cristya45da9d2009-10-25 21:29:37 +0000195 (void) LockSemaphoreInfo(policy_semaphore);
cristy3ed852e2009-09-05 21:47:34 +0000196 ResetLinkedListIterator(policy_list);
197 p=(PolicyInfo *) GetNextValueInLinkedList(policy_list);
198 while (p != (PolicyInfo *) NULL)
199 {
200 if (LocaleCompare(policyname,p->name) == 0)
201 break;
202 p=(PolicyInfo *) GetNextValueInLinkedList(policy_list);
203 }
204 if (p == (PolicyInfo *) NULL)
205 (void) ThrowMagickException(exception,GetMagickModule(),OptionWarning,
206 "UnrecognizedPolicy","`%s'",name);
207 else
208 (void) InsertValueInLinkedList(policy_list,0,
209 RemoveElementByValueFromLinkedList(policy_list,p));
cristya45da9d2009-10-25 21:29:37 +0000210 (void) UnlockSemaphoreInfo(policy_semaphore);
cristy3ed852e2009-09-05 21:47:34 +0000211 return(p);
212}
213
214/*
215%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
216% %
217% %
218% %
219% G e t P o l i c y I n f o L i s t %
220% %
221% %
222% %
223%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
224%
225% GetPolicyInfoList() returns any policies that match the specified pattern.
226%
227% The format of the GetPolicyInfoList function is:
228%
229% const PolicyInfo **GetPolicyInfoList(const char *pattern,
230% unsigned long *number_policies,ExceptionInfo *exception)
231%
232% A description of each parameter follows:
233%
234% o pattern: Specifies a pointer to a text string containing a pattern.
235%
236% o number_policies: returns the number of policies in the list.
237%
238% o exception: return any errors or warnings in this structure.
239%
240*/
241MagickExport const PolicyInfo **GetPolicyInfoList(const char *pattern,
242 unsigned long *number_policies,ExceptionInfo *exception)
243{
244 const PolicyInfo
245 **policies;
246
247 register const PolicyInfo
248 *p;
249
250 register long
251 i;
252
253 /*
254 Allocate policy list.
255 */
256 assert(pattern != (char *) NULL);
257 (void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s",pattern);
258 assert(number_policies != (unsigned long *) NULL);
259 *number_policies=0;
260 p=GetPolicyInfo("*",exception);
261 if (p == (const PolicyInfo *) NULL)
262 return((const PolicyInfo **) NULL);
263 policies=(const PolicyInfo **) AcquireQuantumMemory((size_t)
264 GetNumberOfElementsInLinkedList(policy_list)+1UL,sizeof(*policies));
265 if (policies == (const PolicyInfo **) NULL)
266 return((const PolicyInfo **) NULL);
267 /*
268 Generate policy list.
269 */
cristya45da9d2009-10-25 21:29:37 +0000270 (void) LockSemaphoreInfo(policy_semaphore);
cristy3ed852e2009-09-05 21:47:34 +0000271 ResetLinkedListIterator(policy_list);
272 p=(const PolicyInfo *) GetNextValueInLinkedList(policy_list);
273 for (i=0; p != (const PolicyInfo *) NULL; )
274 {
275 if ((p->stealth == MagickFalse) &&
276 (GlobExpression(p->name,pattern,MagickFalse) != MagickFalse))
277 policies[i++]=p;
278 p=(const PolicyInfo *) GetNextValueInLinkedList(policy_list);
279 }
cristya45da9d2009-10-25 21:29:37 +0000280 (void) UnlockSemaphoreInfo(policy_semaphore);
cristy3ed852e2009-09-05 21:47:34 +0000281 policies[i]=(PolicyInfo *) NULL;
282 *number_policies=(unsigned long) i;
283 return(policies);
284}
285
286/*
287%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
288% %
289% %
290% %
291% G e t P o l i c y L i s t %
292% %
293% %
294% %
295%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
296%
297% GetPolicyList() returns any policies that match the specified pattern.
298%
299% The format of the GetPolicyList function is:
300%
301% char **GetPolicyList(const char *pattern,unsigned long *number_policies,
302% ExceptionInfo *exception)
303%
304% A description of each parameter follows:
305%
306% o pattern: a pointer to a text string containing a pattern.
307%
308% o number_policies: returns the number of policies in the list.
309%
310% o exception: return any errors or warnings in this structure.
311%
312*/
313MagickExport char **GetPolicyList(const char *pattern,
314 unsigned long *number_policies,ExceptionInfo *exception)
315{
316 char
317 **policies;
318
319 register const PolicyInfo
320 *p;
321
322 register long
323 i;
324
325 /*
326 Allocate policy list.
327 */
328 assert(pattern != (char *) NULL);
329 (void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s",pattern);
330 assert(number_policies != (unsigned long *) NULL);
331 *number_policies=0;
332 p=GetPolicyInfo("*",exception);
333 if (p == (const PolicyInfo *) NULL)
334 return((char **) NULL);
335 policies=(char **) AcquireQuantumMemory((size_t)
336 GetNumberOfElementsInLinkedList(policy_list)+1UL,sizeof(*policies));
337 if (policies == (char **) NULL)
338 return((char **) NULL);
339 /*
340 Generate policy list.
341 */
cristya45da9d2009-10-25 21:29:37 +0000342 (void) LockSemaphoreInfo(policy_semaphore);
cristy3ed852e2009-09-05 21:47:34 +0000343 ResetLinkedListIterator(policy_list);
344 p=(const PolicyInfo *) GetNextValueInLinkedList(policy_list);
345 for (i=0; p != (const PolicyInfo *) NULL; )
346 {
347 if ((p->stealth == MagickFalse) &&
348 (GlobExpression(p->name,pattern,MagickFalse) != MagickFalse))
349 policies[i++]=ConstantString(p->name);
350 p=(const PolicyInfo *) GetNextValueInLinkedList(policy_list);
351 }
cristya45da9d2009-10-25 21:29:37 +0000352 (void) UnlockSemaphoreInfo(policy_semaphore);
cristy3ed852e2009-09-05 21:47:34 +0000353 policies[i]=(char *) NULL;
354 *number_policies=(unsigned long) i;
355 return(policies);
356}
357
358/*
359%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
360% %
361% %
362% %
363% G e t P o l i c y V a l u e %
364% %
365% %
366% %
367%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
368%
369% GetPolicyValue() returns the value associated with the named policy.
370%
371% The format of the GetPolicyValue method is:
372%
373% char *GetPolicyValue(const char *name)
374%
375% A description of each parameter follows:
376%
377% o policy_info: The policy info.
378%
379*/
380MagickExport char *GetPolicyValue(const char *name)
381{
382 const char
383 *value;
384
385 const PolicyInfo
386 *policy_info;
387
388 ExceptionInfo
389 *exception;
390
391 assert(name != (const char *) NULL);
392 (void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s",name);
393 exception=AcquireExceptionInfo();
394 policy_info=GetPolicyInfo(name,exception);
395 exception=DestroyExceptionInfo(exception);
396 if (policy_info == (PolicyInfo *) NULL)
397 return((char *) NULL);
398 value=policy_info->value;
399 if ((value == (const char *) NULL) || (*value == '\0'))
400 return((char *) NULL);
401 return(ConstantString(value));
402}
403
404/*
405%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
406% %
407% %
408% %
409+ I n i t i a l i z e P o l i c y L i s t %
410% %
411% %
412% %
413%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
414%
415% InitializePolicyList() initializes the policy list.
416%
417% The format of the InitializePolicyList method is:
418%
419% MagickBooleanType InitializePolicyList(ExceptionInfo *exception)
420%
421% A description of each parameter follows.
422%
423% o exception: return any errors or warnings in this structure.
424%
425*/
426static MagickBooleanType InitializePolicyList(ExceptionInfo *exception)
427{
428 if ((policy_list == (LinkedListInfo *) NULL) &&
429 (instantiate_policy == MagickFalse))
430 {
cristy4e1dff62009-10-25 20:36:03 +0000431 if (policy_semaphore == (SemaphoreInfo *) NULL)
432 AcquireSemaphoreInfo(&policy_semaphore);
cristya45da9d2009-10-25 21:29:37 +0000433 (void) LockSemaphoreInfo(policy_semaphore);
cristy3ed852e2009-09-05 21:47:34 +0000434 if ((policy_list == (LinkedListInfo *) NULL) &&
435 (instantiate_policy == MagickFalse))
436 {
437 (void) LoadPolicyLists(PolicyFilename,exception);
438 instantiate_policy=MagickTrue;
439 }
cristya45da9d2009-10-25 21:29:37 +0000440 (void) UnlockSemaphoreInfo(policy_semaphore);
cristy3ed852e2009-09-05 21:47:34 +0000441 }
442 return(policy_list != (LinkedListInfo *) NULL ? MagickTrue : MagickFalse);
443}
444
445/*
446%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
447% %
448% %
449% %
cristy3ed852e2009-09-05 21:47:34 +0000450% I s R i g h t s A u t h o r i z e d %
451% %
452% %
453% %
454%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
455%
456% IsRightsAuthorized() returns MagickTrue if the policy authorizes the
457% requested rights for the specified domain.
458%
459% The format of the IsRightsAuthorized method is:
460%
461% MagickBooleanType IsRightsAuthorized(const PolicyDomain domain,
462% const PolicyRights rights,const char *pattern)
463%
464% A description of each parameter follows:
465%
466% o domain: the policy domain.
467%
468% o rights: the policy rights.
469%
470% o pattern: the coder, delegate, filter, or path pattern.
471%
472*/
473MagickExport MagickBooleanType IsRightsAuthorized(const PolicyDomain domain,
474 const PolicyRights rights,const char *pattern)
475{
476 const PolicyInfo
477 *policy_info;
478
479 ExceptionInfo
480 *exception;
481
482 MagickBooleanType
483 authorized;
484
485 register PolicyInfo
486 *p;
487
488 (void) LogMagickEvent(PolicyEvent,GetMagickModule(),
489 "Domain: %s; rights=%s; pattern=\"%s\" ...",
490 MagickOptionToMnemonic(MagickPolicyDomainOptions,domain),
491 MagickOptionToMnemonic(MagickPolicyRightsOptions,rights),pattern);
492 exception=AcquireExceptionInfo();
493 policy_info=GetPolicyInfo("*",exception);
494 exception=DestroyExceptionInfo(exception);
495 if (policy_info == (PolicyInfo *) NULL)
496 return(MagickTrue);
497 authorized=MagickTrue;
cristya45da9d2009-10-25 21:29:37 +0000498 (void) LockSemaphoreInfo(policy_semaphore);
cristy3ed852e2009-09-05 21:47:34 +0000499 ResetLinkedListIterator(policy_list);
500 p=(PolicyInfo *) GetNextValueInLinkedList(policy_list);
501 while ((p != (PolicyInfo *) NULL) && (authorized != MagickFalse))
502 {
503 if ((p->domain == domain) &&
504 (GlobExpression(pattern,p->pattern,MagickFalse) != MagickFalse))
505 {
506 if (((rights & ReadPolicyRights) != 0) &&
507 ((p->rights & ReadPolicyRights) == 0))
508 authorized=MagickFalse;
509 if (((rights & WritePolicyRights) != 0) &&
510 ((p->rights & WritePolicyRights) == 0))
511 authorized=MagickFalse;
512 if (((rights & ExecutePolicyRights) != 0) &&
513 ((p->rights & ExecutePolicyRights) == 0))
514 authorized=MagickFalse;
515 }
516 p=(PolicyInfo *) GetNextValueInLinkedList(policy_list);
517 }
cristya45da9d2009-10-25 21:29:37 +0000518 (void) UnlockSemaphoreInfo(policy_semaphore);
cristy3ed852e2009-09-05 21:47:34 +0000519 return(authorized);
520}
521
522/*
523%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
524% %
525% %
526% %
527% L i s t P o l i c y I n f o %
528% %
529% %
530% %
531%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
532%
533% ListPolicyInfo() lists policies to the specified file.
534%
535% The format of the ListPolicyInfo method is:
536%
537% MagickBooleanType ListPolicyInfo(FILE *file,ExceptionInfo *exception)
538%
539% A description of each parameter follows.
540%
541% o file: List policy names to this file handle.
542%
543% o exception: return any errors or warnings in this structure.
544%
545*/
546MagickExport MagickBooleanType ListPolicyInfo(FILE *file,
547 ExceptionInfo *exception)
548{
549 const char
550 *path,
551 *domain;
552
553 const PolicyInfo
554 **policy_info;
555
556 register long
557 i;
558
559 unsigned long
560 number_policies;
561
562 /*
563 List name and attributes of each policy in the list.
564 */
565 if (file == (const FILE *) NULL)
566 file=stdout;
567 policy_info=GetPolicyInfoList("*",&number_policies,exception);
568 if (policy_info == (const PolicyInfo **) NULL)
569 return(MagickFalse);
570 path=(const char *) NULL;
571 for (i=0; i < (long) number_policies; i++)
572 {
573 if (policy_info[i]->stealth != MagickFalse)
574 continue;
575 if (((path == (const char *) NULL) ||
576 (LocaleCompare(path,policy_info[i]->path) != 0)) &&
577 (policy_info[i]->path != (char *) NULL))
578 (void) fprintf(file,"\nPath: %s\n",policy_info[i]->path);
579 path=policy_info[i]->path;
580 domain=MagickOptionToMnemonic(MagickPolicyDomainOptions,
581 policy_info[i]->domain);
582 (void) fprintf(file," Policy: %s\n",domain);
583 if (policy_info[i]->domain == ResourcePolicyDomain)
584 {
585 if (policy_info[i]->name != (char *) NULL)
586 (void) fprintf(file," name: %s\n",policy_info[i]->name);
587 if (policy_info[i]->value != (char *) NULL)
588 (void) fprintf(file," value: %s\n",policy_info[i]->value);
589 }
590 else
591 {
592 (void) fprintf(file," rights: ");
593 if (policy_info[i]->rights == NoPolicyRights)
594 (void) fprintf(file,"None ");
595 if ((policy_info[i]->rights & ReadPolicyRights) != 0)
596 (void) fprintf(file,"Read ");
597 if ((policy_info[i]->rights & WritePolicyRights) != 0)
598 (void) fprintf(file,"Write ");
599 if ((policy_info[i]->rights & ExecutePolicyRights) != 0)
600 (void) fprintf(file,"Execute ");
601 (void) fprintf(file,"\n");
602 if (policy_info[i]->pattern != (char *) NULL)
603 (void) fprintf(file," pattern: %s\n",policy_info[i]->pattern);
604 }
605 }
606 policy_info=(const PolicyInfo **) RelinquishMagickMemory((void *)
607 policy_info);
608 (void) fflush(file);
609 return(MagickTrue);
610}
611
612/*
613%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
614% %
615% %
616% %
617+ L o a d P o l i c y L i s t %
618% %
619% %
620% %
621%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
622%
623% LoadPolicyList() loads the policy configuration file which provides a mapping
624% between policy attributes and a policy domain.
625%
626% The format of the LoadPolicyList method is:
627%
628% MagickBooleanType LoadPolicyList(const char *xml,const char *filename,
629% const unsigned long depth,ExceptionInfo *exception)
630%
631% A description of each parameter follows:
632%
633% o xml: The policy list in XML format.
634%
635% o filename: The policy list filename.
636%
637% o depth: depth of <include /> statements.
638%
639% o exception: return any errors or warnings in this structure.
640%
641*/
642static MagickBooleanType LoadPolicyList(const char *xml,const char *filename,
643 const unsigned long depth,ExceptionInfo *exception)
644{
645 char
646 keyword[MaxTextExtent],
647 *token;
648
649 PolicyInfo
650 *policy_info;
651
652 const char
653 *q;
654
655 MagickBooleanType
656 status;
657
658 /*
659 Load the policy map file.
660 */
661 (void) LogMagickEvent(ConfigureEvent,GetMagickModule(),
662 "Loading policy file \"%s\" ...",filename);
663 if (xml == (char *) NULL)
664 return(MagickFalse);
665 if (policy_list == (LinkedListInfo *) NULL)
666 {
667 policy_list=NewLinkedList(0);
668 if (policy_list == (LinkedListInfo *) NULL)
669 {
670 ThrowFileException(exception,ResourceLimitError,
671 "MemoryAllocationFailed",filename);
672 return(MagickFalse);
673 }
674 }
675 status=MagickTrue;
676 policy_info=(PolicyInfo *) NULL;
677 token=AcquireString(xml);
678 for (q=(const char *) xml; *q != '\0'; )
679 {
680 /*
681 Interpret XML.
682 */
683 GetMagickToken(q,&q,token);
684 if (*token == '\0')
685 break;
686 (void) CopyMagickString(keyword,token,MaxTextExtent);
687 if (LocaleNCompare(keyword,"<!DOCTYPE",9) == 0)
688 {
689 /*
690 Docdomain element.
691 */
692 while ((LocaleNCompare(q,"]>",2) != 0) && (*q != '\0'))
693 GetMagickToken(q,&q,token);
694 continue;
695 }
696 if (LocaleNCompare(keyword,"<!--",4) == 0)
697 {
698 /*
699 Comment element.
700 */
701 while ((LocaleNCompare(q,"->",2) != 0) && (*q != '\0'))
702 GetMagickToken(q,&q,token);
703 continue;
704 }
705 if (LocaleCompare(keyword,"<include") == 0)
706 {
707 /*
708 Include element.
709 */
710 while (((*token != '/') && (*(token+1) != '>')) && (*q != '\0'))
711 {
712 (void) CopyMagickString(keyword,token,MaxTextExtent);
713 GetMagickToken(q,&q,token);
714 if (*token != '=')
715 continue;
716 GetMagickToken(q,&q,token);
717 if (LocaleCompare(keyword,"file") == 0)
718 {
719 if (depth > 200)
720 (void) ThrowMagickException(exception,GetMagickModule(),
721 ConfigureError,"IncludeElementNestedTooDeeply","`%s'",token);
722 else
723 {
724 char
725 path[MaxTextExtent],
726 *xml;
727
728 GetPathComponent(filename,HeadPath,path);
729 if (*path != '\0')
730 (void) ConcatenateMagickString(path,DirectorySeparator,
731 MaxTextExtent);
732 if (*token == *DirectorySeparator)
733 (void) CopyMagickString(path,token,MaxTextExtent);
734 else
735 (void) ConcatenateMagickString(path,token,MaxTextExtent);
736 xml=FileToString(path,~0,exception);
737 if (xml != (char *) NULL)
738 {
739 status=LoadPolicyList(xml,path,depth+1,exception);
740 xml=(char *) RelinquishMagickMemory(xml);
741 }
742 }
743 }
744 }
745 continue;
746 }
747 if (LocaleCompare(keyword,"<policy") == 0)
748 {
749 /*
750 Policy element.
751 */
752 policy_info=(PolicyInfo *) AcquireMagickMemory(sizeof(*policy_info));
753 if (policy_info == (PolicyInfo *) NULL)
754 ThrowFatalException(ResourceLimitFatalError,"MemoryAllocationFailed");
755 (void) ResetMagickMemory(policy_info,0,sizeof(*policy_info));
756 policy_info->path=ConstantString(filename);
cristy54a531d2009-10-21 17:58:01 +0000757 policy_info->exempt=MagickFalse;
cristy3ed852e2009-09-05 21:47:34 +0000758 policy_info->signature=MagickSignature;
759 continue;
760 }
761 if (policy_info == (PolicyInfo *) NULL)
762 continue;
763 if (LocaleCompare(keyword,"/>") == 0)
764 {
765 status=AppendValueToLinkedList(policy_list,policy_info);
766 if (status == MagickFalse)
767 (void) ThrowMagickException(exception,GetMagickModule(),
768 ResourceLimitError,"MemoryAllocationFailed","`%s'",
769 policy_info->name);
770 policy_info=(PolicyInfo *) NULL;
771 }
772 GetMagickToken(q,(const char **) NULL,token);
773 if (*token != '=')
774 continue;
775 GetMagickToken(q,&q,token);
776 GetMagickToken(q,&q,token);
777 switch (*keyword)
778 {
779 case 'D':
780 case 'd':
781 {
782 if (LocaleCompare((char *) keyword,"domain") == 0)
783 {
784 policy_info->domain=(PolicyDomain) ParseMagickOption(
785 MagickPolicyDomainOptions,MagickTrue,token);
786 break;
787 }
788 break;
789 }
790 case 'N':
791 case 'n':
792 {
793 if (LocaleCompare((char *) keyword,"name") == 0)
794 {
795 policy_info->name=ConstantString(token);
796 break;
797 }
798 break;
799 }
800 case 'P':
801 case 'p':
802 {
803 if (LocaleCompare((char *) keyword,"pattern") == 0)
804 {
805 policy_info->pattern=ConstantString(token);
806 break;
807 }
808 break;
809 }
810 case 'R':
811 case 'r':
812 {
813 if (LocaleCompare((char *) keyword,"rights") == 0)
814 {
815 policy_info->rights=(PolicyRights) ParseMagickOption(
816 MagickPolicyRightsOptions,MagickTrue,token);
817 break;
818 }
819 break;
820 }
821 case 'S':
822 case 's':
823 {
824 if (LocaleCompare((char *) keyword,"stealth") == 0)
825 {
826 policy_info->stealth=IsMagickTrue(token);
827 break;
828 }
829 break;
830 }
831 case 'V':
832 case 'v':
833 {
834 if (LocaleCompare((char *) keyword,"value") == 0)
835 {
836 policy_info->value=ConstantString(token);
837 break;
838 }
839 break;
840 }
841 default:
842 break;
843 }
844 }
845 token=(char *) RelinquishMagickMemory(token);
846 return(status);
847}
848
849/*
850%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
851% %
852% %
853% %
854% L o a d P o l i c y L i s t s %
855% %
856% %
857% %
858%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
859%
860% LoadPolicyList() loads one or more policy configuration file which provides a
861% mapping between policy attributes and a policy name.
862%
863% The format of the LoadPolicyLists method is:
864%
865% MagickBooleanType LoadPolicyLists(const char *filename,
866% ExceptionInfo *exception)
867%
868% A description of each parameter follows:
869%
870% o filename: the font file name.
871%
872% o exception: return any errors or warnings in this structure.
873%
874*/
875static MagickBooleanType LoadPolicyLists(const char *filename,
876 ExceptionInfo *exception)
877{
cristy3ed852e2009-09-05 21:47:34 +0000878 const StringInfo
879 *option;
880
881 LinkedListInfo
882 *options;
883
884 MagickStatusType
885 status;
886
cristy54a531d2009-10-21 17:58:01 +0000887 register long
888 i;
889
890 /*
891 Load built-in policy map.
892 */
cristy3ed852e2009-09-05 21:47:34 +0000893 status=MagickFalse;
cristy54a531d2009-10-21 17:58:01 +0000894 if (policy_list == (LinkedListInfo *) NULL)
895 {
896 policy_list=NewLinkedList(0);
897 if (policy_list == (LinkedListInfo *) NULL)
898 {
899 ThrowFileException(exception,ResourceLimitError,
900 "MemoryAllocationFailed",filename);
901 return(MagickFalse);
902 }
903 }
904 for (i=0; i < (long) (sizeof(PolicyMap)/sizeof(*PolicyMap)); i++)
905 {
906 PolicyInfo
907 *policy_info;
908
909 register const PolicyMapInfo
910 *p;
911
912 p=PolicyMap+i;
913 policy_info=(PolicyInfo *) AcquireMagickMemory(sizeof(*policy_info));
914 if (policy_info == (PolicyInfo *) NULL)
915 {
916 (void) ThrowMagickException(exception,GetMagickModule(),
917 ResourceLimitError,"MemoryAllocationFailed","`%s'",policy_info->name);
918 continue;
919 }
920 (void) ResetMagickMemory(policy_info,0,sizeof(*policy_info));
921 policy_info->path=(char *) "[built-in]";
922 policy_info->domain=p->domain;
923 policy_info->rights=p->rights;
924 policy_info->name=(char *) p->name;
925 policy_info->pattern=(char *) p->pattern;
926 policy_info->value=(char *) p->value;
927 policy_info->exempt=MagickTrue;
928 policy_info->signature=MagickSignature;
929 status=AppendValueToLinkedList(policy_list,policy_info);
930 if (status == MagickFalse)
931 (void) ThrowMagickException(exception,GetMagickModule(),
932 ResourceLimitError,"MemoryAllocationFailed","`%s'",policy_info->name);
933 }
934 /*
935 Load external policy map.
936 */
cristy3ed852e2009-09-05 21:47:34 +0000937 options=GetConfigureOptions(filename,exception);
938 option=(const StringInfo *) GetNextValueInLinkedList(options);
939 while (option != (const StringInfo *) NULL)
940 {
941 status|=LoadPolicyList((const char *) GetStringInfoDatum(option),
942 GetStringInfoPath(option),0,exception);
943 option=(const StringInfo *) GetNextValueInLinkedList(options);
944 }
945 options=DestroyConfigureOptions(options);
cristy3ed852e2009-09-05 21:47:34 +0000946 return(status != 0 ? MagickTrue : MagickFalse);
cristy3ed852e2009-09-05 21:47:34 +0000947}
cristyf34a1452009-10-24 22:29:27 +0000948
949/*
950%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
951% %
952% %
953% %
954+ P o l i c y C o m p o n e n t G e n e s i s %
955% %
956% %
957% %
958%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
959%
960% PolicyComponentGenesis() instantiates the policy component.
961%
962% The format of the PolicyComponentGenesis method is:
963%
964% MagickBooleanType PolicyComponentGenesis(void)
965%
966*/
967MagickExport MagickBooleanType PolicyComponentGenesis(void)
968{
cristy165b6092009-10-26 13:52:10 +0000969 AcquireSemaphoreInfo(&policy_semaphore);
cristyf34a1452009-10-24 22:29:27 +0000970 return(MagickTrue);
971}
972
973/*
974%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
975% %
976% %
977% %
978+ P o l i c y C o m p o n e n t T e r m i n u s %
979% %
980% %
981% %
982%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
983%
984% PolicyComponentTerminus() destroys the policy component.
985%
986% The format of the PolicyComponentTerminus method is:
987%
988% PolicyComponentTerminus(void)
989%
990*/
991
992static void *DestroyPolicyElement(void *policy_info)
993{
994 register PolicyInfo
995 *p;
996
997 p=(PolicyInfo *) policy_info;
998 if (p->exempt == MagickFalse)
999 {
1000 if (p->value != (char *) NULL)
1001 p->value=DestroyString(p->value);
1002 if (p->pattern != (char *) NULL)
1003 p->pattern=DestroyString(p->pattern);
1004 if (p->name != (char *) NULL)
1005 p->name=DestroyString(p->name);
1006 if (p->path != (char *) NULL)
1007 p->path=DestroyString(p->path);
1008 }
1009 p=(PolicyInfo *) RelinquishMagickMemory(p);
1010 return((void *) NULL);
1011}
1012
1013MagickExport void PolicyComponentTerminus(void)
1014{
cristy18b17442009-10-25 18:36:48 +00001015 if (policy_semaphore == (SemaphoreInfo *) NULL)
1016 AcquireSemaphoreInfo(&policy_semaphore);
cristya45da9d2009-10-25 21:29:37 +00001017 (void) LockSemaphoreInfo(policy_semaphore);
cristyf34a1452009-10-24 22:29:27 +00001018 if (policy_list != (LinkedListInfo *) NULL)
1019 policy_list=DestroyLinkedList(policy_list,DestroyPolicyElement);
1020 instantiate_policy=MagickFalse;
cristya45da9d2009-10-25 21:29:37 +00001021 (void) UnlockSemaphoreInfo(policy_semaphore);
cristyf34a1452009-10-24 22:29:27 +00001022 DestroySemaphoreInfo(&policy_semaphore);
1023}