summaryrefslogtreecommitdiff
path: root/jni/ruby/safe.c
diff options
context:
space:
mode:
authorJari Vetoniemi <jari.vetoniemi@indooratlas.com>2020-03-16 18:49:26 +0900
committerJari Vetoniemi <jari.vetoniemi@indooratlas.com>2020-03-30 00:39:06 +0900
commitfcbf63e62c627deae76c1b8cb8c0876c536ed811 (patch)
tree64cb17de3f41a2b6fef2368028fbd00349946994 /jni/ruby/safe.c
Fresh start
Diffstat (limited to 'jni/ruby/safe.c')
-rw-r--r--jni/ruby/safe.c133
1 files changed, 133 insertions, 0 deletions
diff --git a/jni/ruby/safe.c b/jni/ruby/safe.c
new file mode 100644
index 0000000..6bf45b5
--- /dev/null
+++ b/jni/ruby/safe.c
@@ -0,0 +1,133 @@
+/**********************************************************************
+
+ safe.c -
+
+ $Author: nobu $
+ created at: Tue Sep 23 09:44:32 JST 2008
+
+ Copyright (C) 2008 Yukihiro Matsumoto
+
+**********************************************************************/
+
+/* safe-level:
+ 0 - strings from streams/environment/ARGV are tainted (default)
+ 1 - no dangerous operation by tainted value
+ 2 - process/file operations prohibited
+ 3 - all generated objects are tainted
+*/
+
+#define SAFE_LEVEL_MAX RUBY_SAFE_LEVEL_MAX
+
+#include "ruby/ruby.h"
+#include "vm_core.h"
+
+/* $SAFE accessor */
+
+#undef rb_secure
+#undef rb_set_safe_level
+#undef ruby_safe_level_4_warning
+
+int
+ruby_safe_level_4_warning(void)
+{
+ return 4;
+}
+
+int
+rb_safe_level(void)
+{
+ return GET_THREAD()->safe_level;
+}
+
+void
+rb_set_safe_level_force(int safe)
+{
+ GET_THREAD()->safe_level = safe;
+}
+
+void
+rb_set_safe_level(int level)
+{
+ rb_thread_t *th = GET_THREAD();
+
+ if (level > th->safe_level) {
+ if (level > SAFE_LEVEL_MAX) {
+ rb_raise(rb_eArgError, "$SAFE=4 is obsolete");
+ }
+ th->safe_level = level;
+ }
+}
+
+static VALUE
+safe_getter(void)
+{
+ return INT2NUM(rb_safe_level());
+}
+
+static void
+safe_setter(VALUE val)
+{
+ int level = NUM2INT(val);
+ rb_thread_t *th = GET_THREAD();
+
+ if (level < th->safe_level) {
+ rb_raise(rb_eSecurityError,
+ "tried to downgrade safe level from %d to %d",
+ th->safe_level, level);
+ }
+ if (level == 3) {
+ rb_warning("$SAFE=3 does no sandboxing");
+ }
+ if (level > SAFE_LEVEL_MAX) {
+ rb_raise(rb_eArgError, "$SAFE=4 is obsolete");
+ }
+ th->safe_level = level;
+}
+
+void
+rb_secure(int level)
+{
+ if (level <= rb_safe_level()) {
+ ID caller_name = rb_frame_callee();
+ if (caller_name) {
+ rb_raise(rb_eSecurityError, "Insecure operation `%"PRIsVALUE"' at level %d",
+ rb_id2str(caller_name), rb_safe_level());
+ }
+ else {
+ rb_raise(rb_eSecurityError, "Insecure operation at level %d",
+ rb_safe_level());
+ }
+ }
+}
+
+void
+rb_secure_update(VALUE obj)
+{
+}
+
+void
+rb_insecure_operation(void)
+{
+ ID caller_name = rb_frame_callee();
+ if (caller_name) {
+ rb_raise(rb_eSecurityError, "Insecure operation - %"PRIsVALUE,
+ rb_id2str(caller_name));
+ }
+ else {
+ rb_raise(rb_eSecurityError, "Insecure operation: -r");
+ }
+}
+
+void
+rb_check_safe_obj(VALUE x)
+{
+ if (rb_safe_level() > 0 && OBJ_TAINTED(x)) {
+ rb_insecure_operation();
+ }
+}
+
+void
+Init_safe(void)
+{
+ rb_define_virtual_variable("$SAFE", safe_getter, safe_setter);
+}