416 lines
12 KiB
C++
416 lines
12 KiB
C++
/*
|
|
* Copyright (C) 2007 Apple Inc. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. Neither the name of Apple Inc. ("Apple") nor the names of
|
|
* its contributors may be used to endorse or promote products derived
|
|
* from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND ANY
|
|
* EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
* DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR ANY
|
|
* DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
|
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
|
|
* ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include "config.h"
|
|
#include "DatabaseAuthorizer.h"
|
|
|
|
#include <wtf/text/WTFString.h>
|
|
|
|
namespace WebCore {
|
|
|
|
Ref<DatabaseAuthorizer> DatabaseAuthorizer::create(const String& databaseInfoTableName)
|
|
{
|
|
return adoptRef(*new DatabaseAuthorizer(databaseInfoTableName));
|
|
}
|
|
|
|
DatabaseAuthorizer::DatabaseAuthorizer(const String& databaseInfoTableName)
|
|
: m_securityEnabled(false)
|
|
, m_databaseInfoTableName(databaseInfoTableName)
|
|
{
|
|
reset();
|
|
addAllowedFunctions();
|
|
}
|
|
|
|
void DatabaseAuthorizer::reset()
|
|
{
|
|
m_lastActionWasInsert = false;
|
|
m_lastActionChangedDatabase = false;
|
|
m_permissions = ReadWriteMask;
|
|
}
|
|
|
|
void DatabaseAuthorizer::resetDeletes()
|
|
{
|
|
m_hadDeletes = false;
|
|
}
|
|
|
|
void DatabaseAuthorizer::addAllowedFunctions()
|
|
{
|
|
// SQLite functions used to help implement some operations
|
|
// ALTER TABLE helpers
|
|
m_allowedFunctions.add("sqlite_rename_table");
|
|
m_allowedFunctions.add("sqlite_rename_trigger");
|
|
// GLOB helpers
|
|
m_allowedFunctions.add("glob");
|
|
|
|
// SQLite core functions
|
|
m_allowedFunctions.add("abs");
|
|
m_allowedFunctions.add("changes");
|
|
m_allowedFunctions.add("coalesce");
|
|
m_allowedFunctions.add("glob");
|
|
m_allowedFunctions.add("ifnull");
|
|
m_allowedFunctions.add("hex");
|
|
m_allowedFunctions.add("last_insert_rowid");
|
|
m_allowedFunctions.add("length");
|
|
m_allowedFunctions.add("like");
|
|
m_allowedFunctions.add("lower");
|
|
m_allowedFunctions.add("ltrim");
|
|
m_allowedFunctions.add("max");
|
|
m_allowedFunctions.add("min");
|
|
m_allowedFunctions.add("nullif");
|
|
m_allowedFunctions.add("quote");
|
|
m_allowedFunctions.add("replace");
|
|
m_allowedFunctions.add("round");
|
|
m_allowedFunctions.add("rtrim");
|
|
m_allowedFunctions.add("soundex");
|
|
m_allowedFunctions.add("sqlite_source_id");
|
|
m_allowedFunctions.add("sqlite_version");
|
|
m_allowedFunctions.add("substr");
|
|
m_allowedFunctions.add("total_changes");
|
|
m_allowedFunctions.add("trim");
|
|
m_allowedFunctions.add("typeof");
|
|
m_allowedFunctions.add("upper");
|
|
m_allowedFunctions.add("zeroblob");
|
|
|
|
// SQLite date and time functions
|
|
m_allowedFunctions.add("date");
|
|
m_allowedFunctions.add("time");
|
|
m_allowedFunctions.add("datetime");
|
|
m_allowedFunctions.add("julianday");
|
|
m_allowedFunctions.add("strftime");
|
|
|
|
// SQLite aggregate functions
|
|
// max() and min() are already in the list
|
|
m_allowedFunctions.add("avg");
|
|
m_allowedFunctions.add("count");
|
|
m_allowedFunctions.add("group_concat");
|
|
m_allowedFunctions.add("sum");
|
|
m_allowedFunctions.add("total");
|
|
|
|
// SQLite FTS functions
|
|
m_allowedFunctions.add("match");
|
|
m_allowedFunctions.add("snippet");
|
|
m_allowedFunctions.add("offsets");
|
|
m_allowedFunctions.add("optimize");
|
|
|
|
// SQLite ICU functions
|
|
// like(), lower() and upper() are already in the list
|
|
m_allowedFunctions.add("regexp");
|
|
}
|
|
|
|
int DatabaseAuthorizer::createTable(const String& tableName)
|
|
{
|
|
if (!allowWrite())
|
|
return SQLAuthDeny;
|
|
|
|
m_lastActionChangedDatabase = true;
|
|
return denyBasedOnTableName(tableName);
|
|
}
|
|
|
|
int DatabaseAuthorizer::createTempTable(const String& tableName)
|
|
{
|
|
// SQLITE_CREATE_TEMP_TABLE results in a UPDATE operation, which is not
|
|
// allowed in read-only transactions or private browsing, so we might as
|
|
// well disallow SQLITE_CREATE_TEMP_TABLE in these cases
|
|
if (!allowWrite())
|
|
return SQLAuthDeny;
|
|
|
|
return denyBasedOnTableName(tableName);
|
|
}
|
|
|
|
int DatabaseAuthorizer::dropTable(const String& tableName)
|
|
{
|
|
if (!allowWrite())
|
|
return SQLAuthDeny;
|
|
|
|
return updateDeletesBasedOnTableName(tableName);
|
|
}
|
|
|
|
int DatabaseAuthorizer::dropTempTable(const String& tableName)
|
|
{
|
|
// SQLITE_DROP_TEMP_TABLE results in a DELETE operation, which is not
|
|
// allowed in read-only transactions or private browsing, so we might as
|
|
// well disallow SQLITE_DROP_TEMP_TABLE in these cases
|
|
if (!allowWrite())
|
|
return SQLAuthDeny;
|
|
|
|
return updateDeletesBasedOnTableName(tableName);
|
|
}
|
|
|
|
int DatabaseAuthorizer::allowAlterTable(const String&, const String& tableName)
|
|
{
|
|
if (!allowWrite())
|
|
return SQLAuthDeny;
|
|
|
|
m_lastActionChangedDatabase = true;
|
|
return denyBasedOnTableName(tableName);
|
|
}
|
|
|
|
int DatabaseAuthorizer::createIndex(const String&, const String& tableName)
|
|
{
|
|
if (!allowWrite())
|
|
return SQLAuthDeny;
|
|
|
|
m_lastActionChangedDatabase = true;
|
|
return denyBasedOnTableName(tableName);
|
|
}
|
|
|
|
int DatabaseAuthorizer::createTempIndex(const String&, const String& tableName)
|
|
{
|
|
// SQLITE_CREATE_TEMP_INDEX should result in a UPDATE or INSERT operation,
|
|
// which is not allowed in read-only transactions or private browsing,
|
|
// so we might as well disallow SQLITE_CREATE_TEMP_INDEX in these cases
|
|
if (!allowWrite())
|
|
return SQLAuthDeny;
|
|
|
|
return denyBasedOnTableName(tableName);
|
|
}
|
|
|
|
int DatabaseAuthorizer::dropIndex(const String&, const String& tableName)
|
|
{
|
|
if (!allowWrite())
|
|
return SQLAuthDeny;
|
|
|
|
return updateDeletesBasedOnTableName(tableName);
|
|
}
|
|
|
|
int DatabaseAuthorizer::dropTempIndex(const String&, const String& tableName)
|
|
{
|
|
// SQLITE_DROP_TEMP_INDEX should result in a DELETE operation, which is
|
|
// not allowed in read-only transactions or private browsing, so we might
|
|
// as well disallow SQLITE_DROP_TEMP_INDEX in these cases
|
|
if (!allowWrite())
|
|
return SQLAuthDeny;
|
|
|
|
return updateDeletesBasedOnTableName(tableName);
|
|
}
|
|
|
|
int DatabaseAuthorizer::createTrigger(const String&, const String& tableName)
|
|
{
|
|
if (!allowWrite())
|
|
return SQLAuthDeny;
|
|
|
|
m_lastActionChangedDatabase = true;
|
|
return denyBasedOnTableName(tableName);
|
|
}
|
|
|
|
int DatabaseAuthorizer::createTempTrigger(const String&, const String& tableName)
|
|
{
|
|
// SQLITE_CREATE_TEMP_TRIGGER results in a INSERT operation, which is not
|
|
// allowed in read-only transactions or private browsing, so we might as
|
|
// well disallow SQLITE_CREATE_TEMP_TRIGGER in these cases
|
|
if (!allowWrite())
|
|
return SQLAuthDeny;
|
|
|
|
return denyBasedOnTableName(tableName);
|
|
}
|
|
|
|
int DatabaseAuthorizer::dropTrigger(const String&, const String& tableName)
|
|
{
|
|
if (!allowWrite())
|
|
return SQLAuthDeny;
|
|
|
|
return updateDeletesBasedOnTableName(tableName);
|
|
}
|
|
|
|
int DatabaseAuthorizer::dropTempTrigger(const String&, const String& tableName)
|
|
{
|
|
// SQLITE_DROP_TEMP_TRIGGER results in a DELETE operation, which is not
|
|
// allowed in read-only transactions or private browsing, so we might as
|
|
// well disallow SQLITE_DROP_TEMP_TRIGGER in these cases
|
|
if (!allowWrite())
|
|
return SQLAuthDeny;
|
|
|
|
return updateDeletesBasedOnTableName(tableName);
|
|
}
|
|
|
|
int DatabaseAuthorizer::createView(const String&)
|
|
{
|
|
return (!allowWrite() ? SQLAuthDeny : SQLAuthAllow);
|
|
}
|
|
|
|
int DatabaseAuthorizer::createTempView(const String&)
|
|
{
|
|
// SQLITE_CREATE_TEMP_VIEW results in a UPDATE operation, which is not
|
|
// allowed in read-only transactions or private browsing, so we might as
|
|
// well disallow SQLITE_CREATE_TEMP_VIEW in these cases
|
|
return (!allowWrite() ? SQLAuthDeny : SQLAuthAllow);
|
|
}
|
|
|
|
int DatabaseAuthorizer::dropView(const String&)
|
|
{
|
|
if (!allowWrite())
|
|
return SQLAuthDeny;
|
|
|
|
m_hadDeletes = true;
|
|
return SQLAuthAllow;
|
|
}
|
|
|
|
int DatabaseAuthorizer::dropTempView(const String&)
|
|
{
|
|
// SQLITE_DROP_TEMP_VIEW results in a DELETE operation, which is not
|
|
// allowed in read-only transactions or private browsing, so we might as
|
|
// well disallow SQLITE_DROP_TEMP_VIEW in these cases
|
|
if (!allowWrite())
|
|
return SQLAuthDeny;
|
|
|
|
m_hadDeletes = true;
|
|
return SQLAuthAllow;
|
|
}
|
|
|
|
int DatabaseAuthorizer::createVTable(const String&, const String&)
|
|
{
|
|
return SQLAuthDeny;
|
|
}
|
|
|
|
int DatabaseAuthorizer::dropVTable(const String&, const String&)
|
|
{
|
|
return SQLAuthDeny;
|
|
}
|
|
|
|
int DatabaseAuthorizer::allowDelete(const String& tableName)
|
|
{
|
|
if (!allowWrite())
|
|
return SQLAuthDeny;
|
|
|
|
return updateDeletesBasedOnTableName(tableName);
|
|
}
|
|
|
|
int DatabaseAuthorizer::allowInsert(const String& tableName)
|
|
{
|
|
if (!allowWrite())
|
|
return SQLAuthDeny;
|
|
|
|
m_lastActionChangedDatabase = true;
|
|
m_lastActionWasInsert = true;
|
|
return denyBasedOnTableName(tableName);
|
|
}
|
|
|
|
int DatabaseAuthorizer::allowUpdate(const String& tableName, const String&)
|
|
{
|
|
if (!allowWrite())
|
|
return SQLAuthDeny;
|
|
|
|
m_lastActionChangedDatabase = true;
|
|
return denyBasedOnTableName(tableName);
|
|
}
|
|
|
|
int DatabaseAuthorizer::allowTransaction()
|
|
{
|
|
return m_securityEnabled ? SQLAuthDeny : SQLAuthAllow;
|
|
}
|
|
|
|
int DatabaseAuthorizer::allowRead(const String& tableName, const String&)
|
|
{
|
|
if (m_permissions & NoAccessMask && m_securityEnabled)
|
|
return SQLAuthDeny;
|
|
|
|
return denyBasedOnTableName(tableName);
|
|
}
|
|
|
|
int DatabaseAuthorizer::allowReindex(const String&)
|
|
{
|
|
return (!allowWrite() ? SQLAuthDeny : SQLAuthAllow);
|
|
}
|
|
|
|
int DatabaseAuthorizer::allowAnalyze(const String& tableName)
|
|
{
|
|
return denyBasedOnTableName(tableName);
|
|
}
|
|
|
|
int DatabaseAuthorizer::allowPragma(const String&, const String&)
|
|
{
|
|
return m_securityEnabled ? SQLAuthDeny : SQLAuthAllow;
|
|
}
|
|
|
|
int DatabaseAuthorizer::allowAttach(const String&)
|
|
{
|
|
return m_securityEnabled ? SQLAuthDeny : SQLAuthAllow;
|
|
}
|
|
|
|
int DatabaseAuthorizer::allowDetach(const String&)
|
|
{
|
|
return m_securityEnabled ? SQLAuthDeny : SQLAuthAllow;
|
|
}
|
|
|
|
int DatabaseAuthorizer::allowFunction(const String& functionName)
|
|
{
|
|
if (m_securityEnabled && !m_allowedFunctions.contains(functionName))
|
|
return SQLAuthDeny;
|
|
|
|
return SQLAuthAllow;
|
|
}
|
|
|
|
void DatabaseAuthorizer::disable()
|
|
{
|
|
m_securityEnabled = false;
|
|
}
|
|
|
|
void DatabaseAuthorizer::enable()
|
|
{
|
|
m_securityEnabled = true;
|
|
}
|
|
|
|
bool DatabaseAuthorizer::allowWrite()
|
|
{
|
|
return !(m_securityEnabled && (m_permissions & ReadOnlyMask || m_permissions & NoAccessMask));
|
|
}
|
|
|
|
void DatabaseAuthorizer::setPermissions(int permissions)
|
|
{
|
|
m_permissions = permissions;
|
|
}
|
|
|
|
int DatabaseAuthorizer::denyBasedOnTableName(const String& tableName) const
|
|
{
|
|
if (!m_securityEnabled)
|
|
return SQLAuthAllow;
|
|
|
|
// Sadly, normal creates and drops end up affecting sqlite_master in an authorizer callback, so
|
|
// it will be tough to enforce all of the following policies.
|
|
// if (equalIgnoringASCIICase(tableName, "sqlite_master")
|
|
// || equalIgnoringASCIICase(tableName, "sqlite_temp_master")
|
|
// || equalIgnoringASCIICase(tableName, "sqlite_sequence")
|
|
// || equalIgnoringASCIICase(tableName, Database::databaseInfoTableName()))
|
|
// return SQLAuthDeny;
|
|
|
|
if (equalIgnoringASCIICase(tableName, m_databaseInfoTableName))
|
|
return SQLAuthDeny;
|
|
|
|
return SQLAuthAllow;
|
|
}
|
|
|
|
int DatabaseAuthorizer::updateDeletesBasedOnTableName(const String& tableName)
|
|
{
|
|
int allow = denyBasedOnTableName(tableName);
|
|
if (allow)
|
|
m_hadDeletes = true;
|
|
return allow;
|
|
}
|
|
|
|
} // namespace WebCore
|