MagickCore  6.9.13-46
Convert, Edit, Or Compose Bitmap Images
policy.c
1 /*
2 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
3 % %
4 % %
5 % PPPP OOO L IIIII CCCC Y Y %
6 % P P O O L I C Y Y %
7 % PPPP O O L I C Y %
8 % P O O L I C Y %
9 % P OOO LLLLL IIIII CCCC Y %
10 % %
11 % %
12 % MagickCore Policy Methods %
13 % %
14 % Software Design %
15 % Cristy %
16 % July 1992 %
17 % %
18 % %
19 % Copyright 1999 ImageMagick Studio LLC, a non-profit organization %
20 % dedicated to making software imaging solutions freely available. %
21 % %
22 % You may not use this file except in compliance with the License. You may %
23 % obtain a copy of the License at %
24 % %
25 % https://imagemagick.org/license/ %
26 % %
27 % Unless required by applicable law or agreed to in writing, software %
28 % distributed under the License is distributed on an "AS IS" BASIS, %
29 % WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. %
30 % See the License for the specific language governing permissions and %
31 % limitations under the License. %
32 % %
33 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
34 %
35 */
36 
37 /*
38  Include declarations.
39 */
40 #include "magick/studio.h"
41 #include "magick/cache-private.h"
42 #include "magick/client.h"
43 #include "magick/configure.h"
44 #include "magick/exception.h"
45 #include "magick/exception-private.h"
46 #include "magick/hashmap-private.h"
47 #include "magick/locale_.h"
48 #include "magick/magick-private.h"
49 #include "magick/memory_.h"
50 #include "magick/memory-private.h"
51 #include "magick/monitor.h"
52 #include "magick/monitor-private.h"
53 #include "magick/option.h"
54 #include "magick/policy.h"
55 #include "magick/policy-private.h"
56 #include "magick/resource_.h"
57 #include "magick/semaphore.h"
58 #include "magick/stream-private.h"
59 #include "magick/string_.h"
60 #include "magick/string-private.h"
61 #include "magick/timer-private.h"
62 #include "magick/token.h"
63 #include "magick/utility.h"
64 #include "magick/utility-private.h"
65 #include "magick/xml-tree.h"
66 #include "magick/xml-tree-private.h"
67 #if defined(MAGICKCORE_XML_DELEGATE)
68 # include <libxml/parser.h>
69 # include <libxml/tree.h>
70 #endif
71 
72 /*
73  Define declarations.
74 */
75 #define PolicyFilename "policy.xml"
76 
77 /*
78  Typedef declarations.
79 */
81 {
82  char
83  *path;
84 
85  PolicyDomain
86  domain;
87 
88  PolicyRights
89  rights;
90 
91  char
92  *name,
93  *pattern,
94  *value;
95 
96  MagickBooleanType
97  exempt,
98  stealth,
99  debug;
100 
102  *semaphore;
103 
104  size_t
105  signature;
106 };
107 
108 typedef struct _PolicyMapInfo
109 {
110  const PolicyDomain
111  domain;
112 
113  const PolicyRights
114  rights;
115 
116  const char
117  *name,
118  *pattern,
119  *value;
120 } PolicyMapInfo;
121 
122 /*
123  Static declarations.
124 */
125 static const PolicyMapInfo
126  PolicyMap[] =
127  {
128  { UndefinedPolicyDomain, UndefinedPolicyRights, (const char *) NULL,
129  (const char *) NULL, (const char *) NULL }
130  };
131 
132 static LinkedListInfo
133  *policy_cache = (LinkedListInfo *) NULL;
134 
135 static SemaphoreInfo
136  *policy_semaphore = (SemaphoreInfo *) NULL;
137 
138 /*
139  Forward declarations.
140 */
141 static MagickBooleanType
142  IsPolicyCacheInstantiated(ExceptionInfo *),
143  LoadPolicyCache(LinkedListInfo *,const char *,const char *,const size_t,
144  ExceptionInfo *),
145  SetMagickSecurityPolicyValue(const PolicyDomain,const char *,const char *,
146  ExceptionInfo *);
147 
148 /*
149 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
150 % %
151 % %
152 % %
153 % A c q u i r e P o l i c y C a c h e %
154 % %
155 % %
156 % %
157 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
158 %
159 % AcquirePolicyCache() caches one or more policy configurations which provides
160 % a mapping between policy attributes and a policy name.
161 %
162 % The format of the AcquirePolicyCache method is:
163 %
164 % LinkedListInfo *AcquirePolicyCache(const char *filename,
165 % ExceptionInfo *exception)
166 %
167 % A description of each parameter follows:
168 %
169 % o filename: the policy configuration file name.
170 %
171 % o exception: return any errors or warnings in this structure.
172 %
173 */
174 static LinkedListInfo *AcquirePolicyCache(const char *filename,
175  ExceptionInfo *exception)
176 {
178  *cache;
179 
180  MagickStatusType
181  status;
182 
183  ssize_t
184  i;
185 
186  /*
187  Load external policy map.
188  */
189  cache=NewLinkedList(0);
190  if (cache == (LinkedListInfo *) NULL)
191  ThrowFatalException(ResourceLimitFatalError,"MemoryAllocationFailed");
192  status=MagickTrue;
193 #if MAGICKCORE_ZERO_CONFIGURATION_SUPPORT
194  magick_unreferenced(filename);
195  status=LoadPolicyCache(cache,ZeroConfigurationPolicy,"[zero-configuration]",0,
196  exception);
197  if (status == MagickFalse)
198  CatchException(exception);
199 #else
200  {
201  const StringInfo
202  *option;
203 
205  *options;
206 
207  options=GetConfigureOptions(filename,exception);
208  option=(const StringInfo *) GetNextValueInLinkedList(options);
209  while (option != (const StringInfo *) NULL)
210  {
211  status&=LoadPolicyCache(cache,(const char *) GetStringInfoDatum(option),
212  GetStringInfoPath(option),0,exception);
213  if (status == MagickFalse)
214  CatchException(exception);
215  option=(const StringInfo *) GetNextValueInLinkedList(options);
216  }
217  options=DestroyConfigureOptions(options);
218  }
219 #endif
220  /*
221  Load built-in policy map.
222  */
223  for (i=0; i < (ssize_t) (sizeof(PolicyMap)/sizeof(*PolicyMap)); i++)
224  {
225  const PolicyMapInfo
226  *p;
227 
228  PolicyInfo
229  *policy_info;
230 
231  p=PolicyMap+i;
232  policy_info=(PolicyInfo *) AcquireMagickMemory(sizeof(*policy_info));
233  if (policy_info == (PolicyInfo *) NULL)
234  {
235  (void) ThrowMagickException(exception,GetMagickModule(),
236  ResourceLimitError,"MemoryAllocationFailed","`%s'",
237  p->name == (char *) NULL ? "" : p->name);
238  CatchException(exception);
239  status=MagickFalse;
240  continue;
241  }
242  (void) memset(policy_info,0,sizeof(*policy_info));
243  policy_info->path=(char *) "[built-in]";
244  policy_info->domain=p->domain;
245  policy_info->rights=p->rights;
246  policy_info->name=(char *) p->name;
247  policy_info->pattern=(char *) p->pattern;
248  policy_info->value=(char *) p->value;
249  policy_info->exempt=MagickTrue;
250  policy_info->signature=MagickCoreSignature;
251  status&=AppendValueToLinkedList(cache,policy_info);
252  if (status == MagickFalse)
253  {
254  (void) ThrowMagickException(exception,GetMagickModule(),
255  ResourceLimitError,"MemoryAllocationFailed","`%s'",
256  p->name == (char *) NULL ? "" : p->name);
257  CatchException(exception);
258  }
259  }
260  if (status == MagickFalse)
261  CatchException(exception);
262  return(cache);
263 }
264 
265 /*
266 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
267 % %
268 % %
269 % %
270 + G e t P o l i c y I n f o %
271 % %
272 % %
273 % %
274 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
275 %
276 % GetPolicyInfo() searches the policy list for the specified name and if found
277 % returns attributes for that policy.
278 %
279 % The format of the GetPolicyInfo method is:
280 %
281 % PolicyInfo *GetPolicyInfo(const char *name,ExceptionInfo *exception)
282 %
283 % A description of each parameter follows:
284 %
285 % o name: the policy name.
286 %
287 % o exception: return any errors or warnings in this structure.
288 %
289 */
290 static PolicyInfo *GetPolicyInfo(const char *name,ExceptionInfo *exception)
291 {
292  char
293  policyname[MagickPathExtent],
294  *q;
295 
297  *p;
298 
299  PolicyDomain
300  domain;
301 
302  PolicyInfo
303  *policy;
304 
305  assert(exception != (ExceptionInfo *) NULL);
306  if (IsPolicyCacheInstantiated(exception) == MagickFalse)
307  return((PolicyInfo *) NULL);
308  /*
309  Strip names of whitespace.
310  */
311  *policyname='\0';
312  if (name != (const char *) NULL)
313  (void) CopyMagickString(policyname,name,MagickPathExtent);
314  for (q=policyname; *q != '\0'; q++)
315  {
316  if (isspace((int) ((unsigned char) *q)) == 0)
317  continue;
318  (void) CopyMagickString(q,q+1,MagickPathExtent);
319  q--;
320  }
321  /*
322  Strip domain from policy name (e.g. resource:map).
323  */
324  domain=UndefinedPolicyDomain;
325  for (q=policyname; *q != '\0'; q++)
326  {
327  if (*q != ':')
328  continue;
329  *q='\0';
330  domain=(PolicyDomain) ParseCommandOption(MagickPolicyDomainOptions,
331  MagickTrue,policyname);
332  (void) CopyMagickString(policyname,q+1,MagickPathExtent);
333  break;
334  }
335  /*
336  Search for policy tag.
337  */
338  policy=(PolicyInfo *) NULL;
339  LockSemaphoreInfo(policy_semaphore);
340  ResetLinkedListIterator(policy_cache);
341  p=GetHeadElementInLinkedList(policy_cache);
342  if ((name == (const char *) NULL) || (LocaleCompare(name,"*") == 0))
343  {
344  UnlockSemaphoreInfo(policy_semaphore);
345  if (p != (ElementInfo *) NULL)
346  policy=(PolicyInfo *) p->value;
347  return(policy);
348  }
349  while (p != (ElementInfo *) NULL)
350  {
351  policy=(PolicyInfo *) p->value;
352  if ((domain == UndefinedPolicyDomain) || (policy->domain == domain))
353  if (LocaleCompare(policyname,policy->name) == 0)
354  break;
355  p=p->next;
356  }
357  if (p == (ElementInfo *) NULL)
358  policy=(PolicyInfo *) NULL;
359  else
360  (void) SetHeadElementInLinkedList(policy_cache,p);
361  UnlockSemaphoreInfo(policy_semaphore);
362  return(policy);
363 }
364 
365 /*
366 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
367 % %
368 % %
369 % %
370 % G e t P o l i c y I n f o L i s t %
371 % %
372 % %
373 % %
374 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
375 %
376 % GetPolicyInfoList() returns any policies that match the specified pattern.
377 %
378 % The format of the GetPolicyInfoList function is:
379 %
380 % const PolicyInfo **GetPolicyInfoList(const char *pattern,
381 % size_t *number_policies,ExceptionInfo *exception)
382 %
383 % A description of each parameter follows:
384 %
385 % o pattern: Specifies a pointer to a text string containing a pattern.
386 %
387 % o number_policies: returns the number of policies in the list.
388 %
389 % o exception: return any errors or warnings in this structure.
390 %
391 */
392 MagickExport const PolicyInfo **GetPolicyInfoList(const char *pattern,
393  size_t *number_policies,ExceptionInfo *exception)
394 {
395  const PolicyInfo
396  **policies;
397 
398  const PolicyInfo
399  *p;
400 
401  ssize_t
402  i;
403 
404  /*
405  Allocate policy list.
406  */
407  assert(pattern != (char *) NULL);
408  assert(number_policies != (size_t *) NULL);
409  if (IsEventLogging() != MagickFalse)
410  (void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s",pattern);
411  *number_policies=0;
412  p=GetPolicyInfo("*",exception);
413  if (p == (const PolicyInfo *) NULL)
414  return((const PolicyInfo **) NULL);
415  policies=(const PolicyInfo **) AcquireQuantumMemory((size_t)
416  GetNumberOfElementsInLinkedList(policy_cache)+1UL,sizeof(*policies));
417  if (policies == (const PolicyInfo **) NULL)
418  return((const PolicyInfo **) NULL);
419  /*
420  Generate policy list.
421  */
422  LockSemaphoreInfo(policy_semaphore);
423  ResetLinkedListIterator(policy_cache);
424  p=(const PolicyInfo *) GetNextValueInLinkedList(policy_cache);
425  for (i=0; p != (const PolicyInfo *) NULL; )
426  {
427  if ((p->stealth == MagickFalse) &&
428  (GlobExpression(p->name,pattern,MagickFalse) != MagickFalse))
429  policies[i++]=p;
430  p=(const PolicyInfo *) GetNextValueInLinkedList(policy_cache);
431  }
432  UnlockSemaphoreInfo(policy_semaphore);
433  policies[i]=(PolicyInfo *) NULL;
434  *number_policies=(size_t) i;
435  return(policies);
436 }
437 
438 /*
439 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
440 % %
441 % %
442 % %
443 % G e t P o l i c y L i s t %
444 % %
445 % %
446 % %
447 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
448 %
449 % GetPolicyList() returns any policies that match the specified pattern.
450 %
451 % The format of the GetPolicyList function is:
452 %
453 % char **GetPolicyList(const char *pattern,size_t *number_policies,
454 % ExceptionInfo *exception)
455 %
456 % A description of each parameter follows:
457 %
458 % o pattern: a pointer to a text string containing a pattern.
459 %
460 % o number_policies: returns the number of policies in the list.
461 %
462 % o exception: return any errors or warnings in this structure.
463 %
464 */
465 
466 static char *AcquirePolicyString(const char *source,const size_t pad)
467 {
468  char
469  *destination;
470 
471  size_t
472  length;
473 
474  length=0;
475  if (source != (char *) NULL)
476  length+=strlen(source);
477  destination=(char *) NULL;
478  if (~length >= pad)
479  destination=(char *) AcquireMagickMemory((length+pad)*sizeof(*destination));
480  if (destination == (char *) NULL)
481  ThrowFatalException(ResourceLimitFatalError,"UnableToAcquireString");
482  if (source != (char *) NULL)
483  (void) memcpy(destination,source,length*sizeof(*destination));
484  destination[length]='\0';
485  return(destination);
486 }
487 
488 MagickExport char **GetPolicyList(const char *pattern,size_t *number_policies,
489  ExceptionInfo *exception)
490 {
491  char
492  **policies;
493 
494  const PolicyInfo
495  *p;
496 
497  ssize_t
498  i;
499 
500  /*
501  Allocate policy list.
502  */
503  assert(pattern != (char *) NULL);
504  assert(number_policies != (size_t *) NULL);
505  if (IsEventLogging() != MagickFalse)
506  (void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s",pattern);
507  *number_policies=0;
508  p=GetPolicyInfo("*",exception);
509  if (p == (const PolicyInfo *) NULL)
510  return((char **) NULL);
511  policies=(char **) AcquireQuantumMemory((size_t)
512  GetNumberOfElementsInLinkedList(policy_cache)+1UL,sizeof(*policies));
513  if (policies == (char **) NULL)
514  return((char **) NULL);
515  /*
516  Generate policy list.
517  */
518  LockSemaphoreInfo(policy_semaphore);
519  ResetLinkedListIterator(policy_cache);
520  p=(const PolicyInfo *) GetNextValueInLinkedList(policy_cache);
521  for (i=0; p != (const PolicyInfo *) NULL; )
522  {
523  if ((p->stealth == MagickFalse) &&
524  (GlobExpression(p->name,pattern,MagickFalse) != MagickFalse))
525  policies[i++]=AcquirePolicyString(p->name,1);
526  p=(const PolicyInfo *) GetNextValueInLinkedList(policy_cache);
527  }
528  UnlockSemaphoreInfo(policy_semaphore);
529  policies[i]=(char *) NULL;
530  *number_policies=(size_t) i;
531  return(policies);
532 }
533 
534 /*
535 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
536 % %
537 % %
538 % %
539 % G e t P o l i c y V a l u e %
540 % %
541 % %
542 % %
543 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
544 %
545 % GetPolicyValue() returns the value associated with the named policy.
546 %
547 % The format of the GetPolicyValue method is:
548 %
549 % char *GetPolicyValue(const char *name)
550 %
551 % A description of each parameter follows:
552 %
553 % o policy_info: The policy info.
554 %
555 */
556 MagickExport char *GetPolicyValue(const char *name)
557 {
558  const char
559  *value;
560 
561  const PolicyInfo
562  *policy_info;
563 
565  *exception;
566 
567  assert(name != (const char *) NULL);
568  if (IsEventLogging() != MagickFalse)
569  (void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s",name);
570  exception=AcquireExceptionInfo();
571  policy_info=GetPolicyInfo(name,exception);
572  exception=DestroyExceptionInfo(exception);
573  if (policy_info == (PolicyInfo *) NULL)
574  return((char *) NULL);
575  value=policy_info->value;
576  if ((value == (const char *) NULL) || (*value == '\0'))
577  return((char *) NULL);
578  return(AcquirePolicyString(value,1));
579 }
580 
581 /*
582 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
583 % %
584 % %
585 % %
586 + I s P o l i c y C a c h e I n s t a n t i a t e d %
587 % %
588 % %
589 % %
590 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
591 %
592 % IsPolicyCacheInstantiated() determines if the policy list is instantiated.
593 % If not, it instantiates the list and returns it.
594 %
595 % The format of the IsPolicyInstantiated method is:
596 %
597 % MagickBooleanType IsPolicyCacheInstantiated(ExceptionInfo *exception)
598 %
599 % A description of each parameter follows.
600 %
601 % o exception: return any errors or warnings in this structure.
602 %
603 */
604 static MagickBooleanType IsPolicyCacheInstantiated(ExceptionInfo *exception)
605 {
606  if (policy_cache == (LinkedListInfo *) NULL)
607  {
608  GetMaxMemoryRequest(); /* avoid OMP deadlock */
609  if (policy_semaphore == (SemaphoreInfo *) NULL)
610  ActivateSemaphoreInfo(&policy_semaphore);
611  LockSemaphoreInfo(policy_semaphore);
612  if (policy_cache == (LinkedListInfo *) NULL)
613  policy_cache=AcquirePolicyCache(PolicyFilename,exception);
614  UnlockSemaphoreInfo(policy_semaphore);
615  }
616  return(policy_cache != (LinkedListInfo *) NULL ? MagickTrue : MagickFalse);
617 }
618 
619 /*
620 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
621 % %
622 % %
623 % %
624 % I s R i g h t s A u t h o r i z e d %
625 % %
626 % %
627 % %
628 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
629 %
630 % IsRightsAuthorized() returns MagickTrue if the policy authorizes the
631 % requested rights for the specified domain.
632 %
633 % The format of the IsRightsAuthorized method is:
634 %
635 % MagickBooleanType IsRightsAuthorized(const PolicyDomain domain,
636 % const PolicyRights rights,const char *qualified_pattern)
637 %
638 % A description of each parameter follows:
639 %
640 % o domain: the policy domain.
641 %
642 % o rights: the policy rights.
643 %
644 % o qualified_pattern: the pattern.
645 %
646 */
647 
648 static inline MagickBooleanType ParseNamespace(const char *qualified_pattern,
649  char **name,char **pattern)
650 {
651  const char
652  *p,
653  *separator;
654 
655  size_t
656  length;
657 
658  if ((qualified_pattern == (const char *) NULL) || (name == (char **) NULL) ||
659  (pattern == (char **) NULL))
660  return(MagickFalse);
661  *name=(char *) NULL;
662  *pattern=(char *) NULL;
663  separator=strstr(qualified_pattern,"::");
664  if (separator == (const char *) NULL)
665  {
666  *pattern=AcquireString(qualified_pattern);
667  return(*pattern != (char *) NULL ? MagickTrue : MagickFalse);
668  }
669  length=(size_t) (separator-qualified_pattern);
670  *name=(char *) AcquireQuantumMemory(length+1,sizeof(char));
671  if (*name == (char *) NULL)
672  return(MagickFalse);
673  (void) CopyMagickString(*name,qualified_pattern,length+1);
674  p=separator+2;
675  *pattern=AcquireString(p);
676  if (*pattern == (char *) NULL)
677  {
678  *name=DestroyString(*name);
679  *name=(char *) NULL;
680  return(MagickFalse);
681  }
682  return(MagickTrue);
683 }
684 
685 MagickExport MagickBooleanType IsRightsAuthorized(const PolicyDomain domain,
686  const PolicyRights rights,const char *qualified_pattern)
687 {
688  char
689  *name = (char *) NULL,
690  *pattern = (char *) NULL,
691  *real_pattern = (char *) NULL;
692 
693  const PolicyInfo
694  **policies = (const PolicyInfo **) NULL;
695 
697  *exception;
698 
699  MagickBooleanType
700  matched_any = MagickFalse;
701 
702  PolicyRights
703  effective_rights = AllPolicyRights; /* rights authorized unless denied */
704 
705  size_t
706  count = 0;
707 
708  ssize_t
709  i;
710 
711  if ((GetLogEventMask() & PolicyEvent) != 0)
712  (void) LogMagickEvent(PolicyEvent,GetMagickModule(),
713  "Domain: %s; rights=%s; pattern=\"%s\" ...",
714  CommandOptionToMnemonic(MagickPolicyDomainOptions,domain),
715  CommandOptionToMnemonic(MagickPolicyRightsOptions,rights),
716  qualified_pattern);
717  /*
718  Load policies.
719  */
720  exception=AcquireExceptionInfo();
721  policies=GetPolicyInfoList("*",&count,exception);
722  exception=DestroyExceptionInfo(exception);
723  if (policies == (const PolicyInfo **) NULL)
724  return(MagickTrue);
725  if (ParseNamespace(qualified_pattern,&name,&pattern) == MagickFalse)
726  return(MagickFalse);
727  /*
728  Evaluate policies in order; last match wins.
729  */
730  for (i=0; i < (ssize_t) count; i++)
731  {
732  const PolicyInfo
733  *policy = policies[i];
734 
735  MagickBooleanType
736  match;
737 
738  if (policy->domain != domain)
739  continue;
740  if ((name != (char *) NULL) && (LocaleCompare(name,policy->name) != 0))
741  continue;
742  if ((policy->domain == PathPolicyDomain) &&
743  (real_pattern == (const char *) NULL))
744  real_pattern=realpath_utf8(pattern);
745  match=GlobExpression(real_pattern != (char*) NULL ? real_pattern : pattern,
746  policy->pattern,MagickFalse);
747  if (match == MagickFalse)
748  continue;
749  matched_any=MagickTrue;
750  effective_rights=policy->rights;
751  }
752  policies=(const PolicyInfo **) RelinquishMagickMemory((void *) policies);
753  if (pattern != (char *) NULL)
754  pattern=DestroyString(pattern);
755  if (name != (char *) NULL)
756  name=DestroyString(name);
757  if (real_pattern != (char *) NULL)
758  real_pattern=DestroyString(real_pattern);
759  /*
760  Is rights authorized?
761  */
762  if (matched_any == MagickFalse)
763  return(MagickTrue);
764  if ((rights & ReadPolicyRights) &&
765  !(effective_rights & ReadPolicyRights))
766  return(MagickFalse);
767  if ((rights & WritePolicyRights) &&
768  !(effective_rights & WritePolicyRights))
769  return(MagickFalse);
770  if ((rights & ExecutePolicyRights) &&
771  !(effective_rights & ExecutePolicyRights))
772  return(MagickFalse);
773  return(MagickTrue);
774 }
775 
776 /*
777 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
778 % %
779 % %
780 % %
781 % L i s t P o l i c y I n f o %
782 % %
783 % %
784 % %
785 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
786 %
787 % ListPolicyInfo() lists policies to the specified file.
788 %
789 % The format of the ListPolicyInfo method is:
790 %
791 % MagickBooleanType ListPolicyInfo(FILE *file,ExceptionInfo *exception)
792 %
793 % A description of each parameter follows.
794 %
795 % o file: List policy names to this file handle.
796 %
797 % o exception: return any errors or warnings in this structure.
798 %
799 */
800 MagickExport MagickBooleanType ListPolicyInfo(FILE *file,
801  ExceptionInfo *exception)
802 {
803  const char
804  *path,
805  *domain;
806 
807  const PolicyInfo
808  **policy_info;
809 
810  ssize_t
811  i;
812 
813  size_t
814  number_policies;
815 
816  /*
817  List name and attributes of each policy in the list.
818  */
819  if (file == (const FILE *) NULL)
820  file=stdout;
821  policy_info=GetPolicyInfoList("*",&number_policies,exception);
822  if (policy_info == (const PolicyInfo **) NULL)
823  return(MagickFalse);
824  path=(const char *) NULL;
825  for (i=0; i < (ssize_t) number_policies; i++)
826  {
827  if (policy_info[i]->stealth != MagickFalse)
828  continue;
829  if (((path == (const char *) NULL) ||
830  (LocaleCompare(path,policy_info[i]->path) != 0)) &&
831  (policy_info[i]->path != (char *) NULL))
832  (void) FormatLocaleFile(file,"\nPath: %s\n",policy_info[i]->path);
833  path=policy_info[i]->path;
834  domain=CommandOptionToMnemonic(MagickPolicyDomainOptions,
835  policy_info[i]->domain);
836  (void) FormatLocaleFile(file," Policy: %s\n",domain);
837  if ((policy_info[i]->domain == CachePolicyDomain) ||
838  (policy_info[i]->domain == ResourcePolicyDomain) ||
839  (policy_info[i]->domain == SystemPolicyDomain))
840  {
841  if (policy_info[i]->name != (char *) NULL)
842  (void) FormatLocaleFile(file," name: %s\n",policy_info[i]->name);
843  if (policy_info[i]->value != (char *) NULL)
844  (void) FormatLocaleFile(file," value: %s\n",policy_info[i]->value);
845  }
846  else
847  {
848  (void) FormatLocaleFile(file," rights: ");
849  if (policy_info[i]->rights == NoPolicyRights)
850  (void) FormatLocaleFile(file,"None ");
851  if ((policy_info[i]->rights & ReadPolicyRights) != 0)
852  (void) FormatLocaleFile(file,"Read ");
853  if ((policy_info[i]->rights & WritePolicyRights) != 0)
854  (void) FormatLocaleFile(file,"Write ");
855  if ((policy_info[i]->rights & ExecutePolicyRights) != 0)
856  (void) FormatLocaleFile(file,"Execute ");
857  (void) FormatLocaleFile(file,"\n");
858  if (policy_info[i]->pattern != (char *) NULL)
859  (void) FormatLocaleFile(file," pattern: %s\n",
860  policy_info[i]->pattern);
861  }
862  }
863  policy_info=(const PolicyInfo **) RelinquishMagickMemory((void *)
864  policy_info);
865  (void) fflush(file);
866  return(MagickTrue);
867 }
868 
869 /*
870 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
871 % %
872 % %
873 % %
874 + L o a d P o l i c y C a c h e %
875 % %
876 % %
877 % %
878 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
879 %
880 % LoadPolicyCache() loads the policy configurations which provides a mapping
881 % between policy attributes and a policy domain.
882 %
883 % The format of the LoadPolicyCache method is:
884 %
885 % MagickBooleanType LoadPolicyCache(LinkedListInfo *cache,const char *xml,
886 % const char *filename,const size_t depth,ExceptionInfo *exception)
887 %
888 % A description of each parameter follows:
889 %
890 % o xml: The policy list in XML format.
891 %
892 % o filename: The policy list filename.
893 %
894 % o depth: depth of <include /> statements.
895 %
896 % o exception: return any errors or warnings in this structure.
897 %
898 */
899 static MagickBooleanType LoadPolicyCache(LinkedListInfo *cache,const char *xml,
900  const char *filename,const size_t depth,ExceptionInfo *exception)
901 {
902  char
903  keyword[MagickPathExtent],
904  *token;
905 
906  const char
907  *q;
908 
909  MagickStatusType
910  status;
911 
912  PolicyInfo
913  *policy_info;
914 
915  size_t
916  extent;
917 
918  /*
919  Load the policy map file.
920  */
921  (void) LogMagickEvent(ConfigureEvent,GetMagickModule(),
922  "Loading policy file \"%s\" ...",filename);
923  if (xml == (char *) NULL)
924  return(MagickFalse);
925  status=MagickTrue;
926  policy_info=(PolicyInfo *) NULL;
927  token=AcquirePolicyString(xml,MagickPathExtent);
928  extent=strlen(token)+MagickPathExtent;
929  for (q=(const char *) xml; *q != '\0'; )
930  {
931  /*
932  Interpret XML.
933  */
934  (void) GetNextToken(q,&q,extent,token);
935  if (*token == '\0')
936  break;
937  (void) CopyMagickString(keyword,token,MagickPathExtent);
938  if (LocaleNCompare(keyword,"<!DOCTYPE",9) == 0)
939  {
940  /*
941  Docdomain element.
942  */
943  while ((LocaleNCompare(q,"]>",2) != 0) && (*q != '\0'))
944  (void) GetNextToken(q,&q,extent,token);
945  continue;
946  }
947  if (LocaleNCompare(keyword,"<!--",4) == 0)
948  {
949  /*
950  Comment element.
951  */
952  while ((LocaleNCompare(q,"->",2) != 0) && (*q != '\0'))
953  (void) GetNextToken(q,&q,extent,token);
954  continue;
955  }
956  if (LocaleCompare(keyword,"<include") == 0)
957  {
958  /*
959  Include element.
960  */
961  while (((*token != '/') && (*(token+1) != '>')) && (*q != '\0'))
962  {
963  (void) CopyMagickString(keyword,token,MagickPathExtent);
964  (void) GetNextToken(q,&q,extent,token);
965  if (*token != '=')
966  continue;
967  (void) GetNextToken(q,&q,extent,token);
968  if (LocaleCompare(keyword,"file") == 0)
969  {
970  if (depth > MagickMaxRecursionDepth)
971  (void) ThrowMagickException(exception,GetMagickModule(),
972  ConfigureError,"IncludeElementNestedTooDeeply","`%s'",token);
973  else
974  {
975  char
976  path[MagickPathExtent],
977  *xml;
978 
979  GetPathComponent(filename,HeadPath,path);
980  if (*path != '\0')
981  (void) ConcatenateMagickString(path,DirectorySeparator,
982  MagickPathExtent);
983  if (*token == *DirectorySeparator)
984  (void) CopyMagickString(path,token,MagickPathExtent);
985  else
986  (void) ConcatenateMagickString(path,token,MagickPathExtent);
987  xml=FileToXML(path,~0UL);
988  if (xml != (char *) NULL)
989  {
990  status&=LoadPolicyCache(cache,xml,path,depth+1,
991  exception);
992  xml=(char *) RelinquishMagickMemory(xml);
993  }
994  }
995  }
996  }
997  continue;
998  }
999  if (LocaleCompare(keyword,"<policy") == 0)
1000  {
1001  /*
1002  Policy element.
1003  */
1004  policy_info=(PolicyInfo *) AcquireMagickMemory(sizeof(*policy_info));
1005  if (policy_info == (PolicyInfo *) NULL)
1006  ThrowFatalException(ResourceLimitFatalError,"MemoryAllocationFailed");
1007  (void) memset(policy_info,0,sizeof(*policy_info));
1008  policy_info->path=AcquirePolicyString(filename,1);
1009  policy_info->exempt=MagickFalse;
1010  policy_info->signature=MagickCoreSignature;
1011  continue;
1012  }
1013  if (policy_info == (PolicyInfo *) NULL)
1014  continue;
1015  if ((LocaleCompare(keyword,"/>") == 0) ||
1016  (LocaleCompare(keyword,"</policy>") == 0))
1017  {
1018  status=AppendValueToLinkedList(cache,policy_info);
1019  if (status == MagickFalse)
1020  (void) ThrowMagickException(exception,GetMagickModule(),
1021  ResourceLimitError,"MemoryAllocationFailed","`%s'",
1022  policy_info->name);
1023  policy_info=(PolicyInfo *) NULL;
1024  continue;
1025  }
1026  (void) GetNextToken(q,(const char **) NULL,extent,token);
1027  if (*token != '=')
1028  continue;
1029  (void) GetNextToken(q,&q,extent,token);
1030  (void) GetNextToken(q,&q,extent,token);
1031  switch (*keyword)
1032  {
1033  case 'D':
1034  case 'd':
1035  {
1036  if (LocaleCompare((char *) keyword,"domain") == 0)
1037  {
1038  policy_info->domain=(PolicyDomain) ParseCommandOption(
1039  MagickPolicyDomainOptions,MagickTrue,token);
1040  break;
1041  }
1042  break;
1043  }
1044  case 'N':
1045  case 'n':
1046  {
1047  if (LocaleCompare((char *) keyword,"name") == 0)
1048  {
1049  policy_info->name=AcquirePolicyString(token,1);
1050  break;
1051  }
1052  break;
1053  }
1054  case 'P':
1055  case 'p':
1056  {
1057  if (LocaleCompare((char *) keyword,"pattern") == 0)
1058  {
1059  policy_info->pattern=AcquirePolicyString(token,1);
1060  break;
1061  }
1062  break;
1063  }
1064  case 'R':
1065  case 'r':
1066  {
1067  if (LocaleCompare((char *) keyword,"rights") == 0)
1068  {
1069  policy_info->rights=(PolicyRights) ParseCommandOption(
1070  MagickPolicyRightsOptions,MagickTrue,token);
1071  break;
1072  }
1073  break;
1074  }
1075  case 'S':
1076  case 's':
1077  {
1078  if (LocaleCompare((char *) keyword,"stealth") == 0)
1079  {
1080  policy_info->stealth=IsMagickTrue(token);
1081  break;
1082  }
1083  break;
1084  }
1085  case 'V':
1086  case 'v':
1087  {
1088  if (LocaleCompare((char *) keyword,"value") == 0)
1089  {
1090  policy_info->value=AcquirePolicyString(token,1);
1091  break;
1092  }
1093  break;
1094  }
1095  default:
1096  break;
1097  }
1098  }
1099  token=(char *) RelinquishMagickMemory(token);
1100  if (status == MagickFalse)
1101  CatchException(exception);
1102  return(status != 0 ? MagickTrue : MagickFalse);
1103 }
1104 
1105 /*
1106 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
1107 % %
1108 % %
1109 % %
1110 + P o l i c y C o m p o n e n t G e n e s i s %
1111 % %
1112 % %
1113 % %
1114 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
1115 %
1116 % PolicyComponentGenesis() instantiates the policy component.
1117 %
1118 % The format of the PolicyComponentGenesis method is:
1119 %
1120 % MagickBooleanType PolicyComponentGenesis(void)
1121 %
1122 */
1123 MagickExport MagickBooleanType PolicyComponentGenesis(void)
1124 {
1125  if (policy_semaphore == (SemaphoreInfo *) NULL)
1126  policy_semaphore=AllocateSemaphoreInfo();
1127  return(MagickTrue);
1128 }
1129 
1130 /*
1131 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
1132 % %
1133 % %
1134 % %
1135 + P o l i c y C o m p o n e n t T e r m i n u s %
1136 % %
1137 % %
1138 % %
1139 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
1140 %
1141 % PolicyComponentTerminus() destroys the policy component.
1142 %
1143 % The format of the PolicyComponentTerminus method is:
1144 %
1145 % PolicyComponentTerminus(void)
1146 %
1147 */
1148 
1149 static void *DestroyPolicyElement(void *policy_info)
1150 {
1151  PolicyInfo
1152  *p;
1153 
1154  p=(PolicyInfo *) policy_info;
1155  if (p->exempt == MagickFalse)
1156  {
1157  if (p->value != (char *) NULL)
1158  p->value=DestroyString(p->value);
1159  if (p->pattern != (char *) NULL)
1160  p->pattern=DestroyString(p->pattern);
1161  if (p->name != (char *) NULL)
1162  p->name=DestroyString(p->name);
1163  if (p->path != (char *) NULL)
1164  p->path=DestroyString(p->path);
1165  }
1166  p=(PolicyInfo *) RelinquishMagickMemory(p);
1167  return((void *) NULL);
1168 }
1169 
1170 MagickExport void PolicyComponentTerminus(void)
1171 {
1172  if (policy_semaphore == (SemaphoreInfo *) NULL)
1173  ActivateSemaphoreInfo(&policy_semaphore);
1174  LockSemaphoreInfo(policy_semaphore);
1175  if (policy_cache != (LinkedListInfo *) NULL)
1176  policy_cache=DestroyLinkedList(policy_cache,DestroyPolicyElement);
1177  UnlockSemaphoreInfo(policy_semaphore);
1178  DestroySemaphoreInfo(&policy_semaphore);
1179 }
1180 
1181 /*
1182 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
1183 % %
1184 % %
1185 % %
1186 % S e t M a g i c k S e c u r i t y P o l i c y %
1187 % %
1188 % %
1189 % %
1190 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
1191 %
1192 % SetMagickSecurityPolicy() sets or restricts the ImageMagick security policy.
1193 % It returns MagickFalse if the policy the policy does not parse.
1194 %
1195 % The format of the SetMagickSecurityPolicy method is:
1196 %
1197 % MagickBooleanType SetMagickSecurityPolicy(const char *policy,
1198 % ExceptionInfo *exception)
1199 %
1200 % A description of each parameter follows:
1201 %
1202 % o policy: the security policy in the XML format.
1203 %
1204 % o exception: return any errors or warnings in this structure.
1205 %
1206 */
1207 
1208 static MagickBooleanType ValidateSecurityPolicy(const char *policy,
1209  const char *url,ExceptionInfo *exception)
1210 {
1211 #if defined(MAGICKCORE_XML_DELEGATE)
1212  xmlDocPtr
1213  document;
1214 
1215  /*
1216  Parse security policy.
1217  */
1218  document=xmlReadMemory(policy,(int) strlen(policy),url,NULL,
1219  XML_PARSE_NOERROR | XML_PARSE_NOWARNING);
1220  if (document == (xmlDocPtr) NULL)
1221  {
1222  (void) ThrowMagickException(exception,GetMagickModule(),ConfigureError,
1223  "PolicyValidationException","'%s'",url);
1224  return(MagickFalse);
1225  }
1226  xmlFreeDoc(document);
1227 #else
1228  (void) policy;
1229  (void) url;
1230  (void) exception;
1231 #endif
1232  return(MagickTrue);
1233 }
1234 
1235 MagickExport MagickBooleanType SetMagickSecurityPolicy(const char *policy,
1236  ExceptionInfo *exception)
1237 {
1238  MagickBooleanType
1239  status;
1240 
1242  *user_policies;
1243 
1244  PolicyInfo
1245  *p;
1246 
1247  /*
1248  Load user policies.
1249  */
1250  assert(exception != (ExceptionInfo *) NULL);
1251  if (policy == (const char *) NULL)
1252  return(MagickFalse);
1253  if (ValidateSecurityPolicy(policy,PolicyFilename,exception) == MagickFalse)
1254  return(MagickFalse);
1255  status=LoadPolicyCache(policy_cache,policy,"[user-policy]",0,exception);
1256  if (status == MagickFalse)
1257  return(status);
1258  /*
1259  Synchronize user policies.
1260  */
1261  user_policies=NewLinkedList(0);
1262  status=LoadPolicyCache(user_policies,policy,"[user-policy]",0,exception);
1263  if (status == MagickFalse)
1264  {
1265  user_policies=DestroyLinkedList(user_policies,DestroyPolicyElement);
1266  return(MagickFalse);
1267  }
1268  ResetLinkedListIterator(user_policies);
1269  p=(PolicyInfo *) GetNextValueInLinkedList(user_policies);
1270  while (p != (PolicyInfo *) NULL)
1271  {
1272  if ((p->name != (char *) NULL) && (p->value != (char *) NULL))
1273  (void) SetMagickSecurityPolicyValue(p->domain,p->name,p->value,exception);
1274  p=(PolicyInfo *) GetNextValueInLinkedList(user_policies);
1275  }
1276  user_policies=DestroyLinkedList(user_policies,DestroyPolicyElement);
1277  return(status);
1278 }
1279 
1280 /*
1281 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
1282 % %
1283 % %
1284 % %
1285 % S e t M a g i c k S e c u r i t y P o l i c y V a l u e %
1286 % %
1287 % %
1288 % %
1289 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
1290 %
1291 % SetMagickSecurityPolicyValue() sets a value associated with an ImageMagick
1292 % security policy. For most policies, the value must be less than any value
1293 % set by the security policy configuration file (i.e. policy.xml). It returns
1294 % MagickFalse if the policy cannot be modified or if the policy does not parse.
1295 %
1296 % The format of the SetMagickSecurityPolicyValue method is:
1297 %
1298 % MagickBooleanType SetMagickSecurityPolicyValue(
1299 % const PolicyDomain domain,const char *name,const char *value,
1300 % ExceptionInfo *exception)
1301 %
1302 % A description of each parameter follows:
1303 %
1304 % o domain: the domain of the policy (e.g. system, resource).
1305 %
1306 % o name: the name of the policy.
1307 %
1308 % o value: the value to set the policy to.
1309 %
1310 % o exception: return any errors or warnings in this structure.
1311 %
1312 */
1313 static MagickBooleanType SetMagickSecurityPolicyValue(const PolicyDomain domain,
1314  const char *name,const char *value,ExceptionInfo *exception)
1315 {
1316  magick_unreferenced(exception);
1317  assert(exception != (ExceptionInfo *) NULL);
1318  if ((name == (const char *) NULL) || (value == (const char *) NULL))
1319  return(MagickFalse);
1320  switch (domain)
1321  {
1322  case CachePolicyDomain:
1323  {
1324  if (LocaleCompare(name,"memory-map") == 0)
1325  {
1326  if (LocaleCompare(value,"anonymous") != 0)
1327  return(MagickFalse);
1328  ResetCacheAnonymousMemory();
1329  ResetStreamAnonymousMemory();
1330  return(MagickTrue);
1331  }
1332  break;
1333  }
1334  case ResourcePolicyDomain:
1335  {
1336  ssize_t
1337  type;
1338 
1339  type=ParseCommandOption(MagickResourceOptions,MagickFalse,name);
1340  if (type >= 0)
1341  {
1342  MagickSizeType
1343  limit;
1344 
1345  limit=MagickResourceInfinity;
1346  if (LocaleCompare("unlimited",value) != 0)
1347  limit=StringToMagickSizeType(value,100.0);
1348  if ((ResourceType) type == TimeResource)
1349  limit=(MagickSizeType) ParseMagickTimeToLive(value);
1350  return(SetMagickResourceLimit((ResourceType) type,limit));
1351  }
1352  break;
1353  }
1354  case SystemPolicyDomain:
1355  {
1356  if (LocaleCompare(name,"max-memory-request") == 0)
1357  {
1358  MagickSizeType
1359  limit;
1360 
1361  limit=MagickResourceInfinity;
1362  if (LocaleCompare("unlimited",value) != 0)
1363  limit=StringToMagickSizeType(value,100.0);
1364  SetMaxMemoryRequest(limit);
1365  return(MagickTrue);
1366  }
1367  if (LocaleCompare(name,"memory-map") == 0)
1368  {
1369  if (LocaleCompare(value,"anonymous") != 0)
1370  return(MagickFalse);
1371  ResetVirtualAnonymousMemory();
1372  return(MagickTrue);
1373  }
1374  if (LocaleCompare(name,"precision") == 0)
1375  {
1376  int
1377  limit;
1378 
1379  limit=StringToInteger(value);
1380  SetMagickPrecision(limit);
1381  return(MagickTrue);
1382  }
1383  break;
1384  }
1385  case CoderPolicyDomain:
1386  case DelegatePolicyDomain:
1387  case FilterPolicyDomain:
1388  case ModulePolicyDomain:
1389  case PathPolicyDomain:
1390  default:
1391  break;
1392  }
1393  return(MagickFalse);
1394 }