40#include "magick/studio.h"
41#include "magick/cache-private.h"
42#include "magick/client.h"
43#include "magick/configure.h"
44#include "magick/exception.h"
45#include "magick/exception-private.h"
46#include "magick/hashmap-private.h"
47#include "magick/locale_.h"
48#include "magick/magick-private.h"
49#include "magick/memory_.h"
50#include "magick/memory-private.h"
51#include "magick/monitor.h"
52#include "magick/monitor-private.h"
53#include "magick/option.h"
54#include "magick/policy.h"
55#include "magick/policy-private.h"
56#include "magick/resource_.h"
57#include "magick/semaphore.h"
58#include "magick/stream-private.h"
59#include "magick/string_.h"
60#include "magick/string-private.h"
61#include "magick/timer-private.h"
62#include "magick/token.h"
63#include "magick/utility.h"
64#include "magick/utility-private.h"
65#include "magick/xml-tree.h"
66#include "magick/xml-tree-private.h"
67#if defined(MAGICKCORE_XML_DELEGATE)
68# include <libxml/parser.h>
69# include <libxml/tree.h>
75#define PolicyFilename "policy.xml"
125static const PolicyMapInfo
128 { UndefinedPolicyDomain, UndefinedPolicyRights, (
const char *) NULL,
129 (
const char *) NULL, (
const char *) NULL }
133 *policy_cache = (LinkedListInfo *) NULL;
141static MagickBooleanType
142 IsPolicyCacheInstantiated(ExceptionInfo *),
143 LoadPolicyCache(LinkedListInfo *,
const char *,
const char *,
const size_t,
145 SetMagickSecurityPolicyValue(
const PolicyDomain,
const char *,
const char *,
174static LinkedListInfo *AcquirePolicyCache(
const char *filename,
175 ExceptionInfo *exception)
189 cache=NewLinkedList(0);
190 if (cache == (LinkedListInfo *) NULL)
191 ThrowFatalException(ResourceLimitFatalError,
"MemoryAllocationFailed");
193#if MAGICKCORE_ZERO_CONFIGURATION_SUPPORT
194 magick_unreferenced(filename);
195 status=LoadPolicyCache(cache,ZeroConfigurationPolicy,
"[zero-configuration]",0,
197 if (status == MagickFalse)
198 CatchException(exception);
207 options=GetConfigureOptions(filename,exception);
208 option=(
const StringInfo *) GetNextValueInLinkedList(options);
209 while (option != (
const StringInfo *) NULL)
211 status&=LoadPolicyCache(cache,(
const char *) GetStringInfoDatum(option),
212 GetStringInfoPath(option),0,exception);
213 if (status == MagickFalse)
214 CatchException(exception);
215 option=(
const StringInfo *) GetNextValueInLinkedList(options);
217 options=DestroyConfigureOptions(options);
223 for (i=0; i < (ssize_t) (
sizeof(PolicyMap)/
sizeof(*PolicyMap)); i++)
232 policy_info=(PolicyInfo *) AcquireMagickMemory(
sizeof(*policy_info));
233 if (policy_info == (PolicyInfo *) NULL)
235 (void) ThrowMagickException(exception,GetMagickModule(),
236 ResourceLimitError,
"MemoryAllocationFailed",
"`%s'",
237 p->name == (
char *) NULL ?
"" : p->name);
238 CatchException(exception);
242 (void) memset(policy_info,0,
sizeof(*policy_info));
243 policy_info->path=(
char *)
"[built-in]";
244 policy_info->domain=p->domain;
245 policy_info->rights=p->rights;
246 policy_info->name=(
char *) p->name;
247 policy_info->pattern=(
char *) p->pattern;
248 policy_info->value=(
char *) p->value;
249 policy_info->exempt=MagickTrue;
250 policy_info->signature=MagickCoreSignature;
251 status&=AppendValueToLinkedList(cache,policy_info);
252 if (status == MagickFalse)
254 (void) ThrowMagickException(exception,GetMagickModule(),
255 ResourceLimitError,
"MemoryAllocationFailed",
"`%s'",
256 p->name == (
char *) NULL ?
"" : p->name);
257 CatchException(exception);
260 if (status == MagickFalse)
261 CatchException(exception);
290static PolicyInfo *GetPolicyInfo(
const char *name,ExceptionInfo *exception)
293 policyname[MagickPathExtent],
305 assert(exception != (ExceptionInfo *) NULL);
306 if (IsPolicyCacheInstantiated(exception) == MagickFalse)
307 return((PolicyInfo *) NULL);
312 if (name != (
const char *) NULL)
313 (void) CopyMagickString(policyname,name,MagickPathExtent);
314 for (q=policyname; *q !=
'\0'; q++)
316 if (isspace((
int) ((
unsigned char) *q)) == 0)
318 (void) CopyMagickString(q,q+1,MagickPathExtent);
324 domain=UndefinedPolicyDomain;
325 for (q=policyname; *q !=
'\0'; q++)
330 domain=(PolicyDomain) ParseCommandOption(MagickPolicyDomainOptions,
331 MagickTrue,policyname);
332 (void) CopyMagickString(policyname,q+1,MagickPathExtent);
338 policy=(PolicyInfo *) NULL;
339 LockSemaphoreInfo(policy_semaphore);
340 ResetLinkedListIterator(policy_cache);
341 p=GetHeadElementInLinkedList(policy_cache);
342 if ((name == (
const char *) NULL) || (LocaleCompare(name,
"*") == 0))
344 UnlockSemaphoreInfo(policy_semaphore);
345 if (p != (ElementInfo *) NULL)
346 policy=(PolicyInfo *) p->value;
349 while (p != (ElementInfo *) NULL)
351 policy=(PolicyInfo *) p->value;
352 if ((domain == UndefinedPolicyDomain) || (policy->domain == domain))
353 if (LocaleCompare(policyname,policy->name) == 0)
357 if (p == (ElementInfo *) NULL)
358 policy=(PolicyInfo *) NULL;
360 (
void) SetHeadElementInLinkedList(policy_cache,p);
361 UnlockSemaphoreInfo(policy_semaphore);
392MagickExport
const PolicyInfo **GetPolicyInfoList(
const char *pattern,
393 size_t *number_policies,ExceptionInfo *exception)
407 assert(pattern != (
char *) NULL);
408 assert(number_policies != (
size_t *) NULL);
409 if (IsEventLogging() != MagickFalse)
410 (void) LogMagickEvent(TraceEvent,GetMagickModule(),
"%s",pattern);
412 p=GetPolicyInfo(
"*",exception);
413 if (p == (
const PolicyInfo *) NULL)
414 return((
const PolicyInfo **) NULL);
415 policies=(
const PolicyInfo **) AcquireQuantumMemory((
size_t)
416 GetNumberOfElementsInLinkedList(policy_cache)+1UL,
sizeof(*policies));
417 if (policies == (
const PolicyInfo **) NULL)
418 return((
const PolicyInfo **) NULL);
422 LockSemaphoreInfo(policy_semaphore);
423 ResetLinkedListIterator(policy_cache);
424 p=(
const PolicyInfo *) GetNextValueInLinkedList(policy_cache);
425 for (i=0; p != (
const PolicyInfo *) NULL; )
427 if ((p->stealth == MagickFalse) &&
428 (GlobExpression(p->name,pattern,MagickFalse) != MagickFalse))
430 p=(
const PolicyInfo *) GetNextValueInLinkedList(policy_cache);
432 UnlockSemaphoreInfo(policy_semaphore);
433 policies[i]=(PolicyInfo *) NULL;
434 *number_policies=(size_t) i;
466static char *AcquirePolicyString(
const char *source,
const size_t pad)
475 if (source != (
char *) NULL)
476 length+=strlen(source);
477 destination=(
char *) NULL;
479 destination=(
char *) AcquireMagickMemory((length+pad)*
sizeof(*destination));
480 if (destination == (
char *) NULL)
481 ThrowFatalException(ResourceLimitFatalError,
"UnableToAcquireString");
482 if (source != (
char *) NULL)
483 (void) memcpy(destination,source,length*
sizeof(*destination));
484 destination[length]=
'\0';
488MagickExport
char **GetPolicyList(
const char *pattern,
size_t *number_policies,
489 ExceptionInfo *exception)
503 assert(pattern != (
char *) NULL);
504 assert(number_policies != (
size_t *) NULL);
505 if (IsEventLogging() != MagickFalse)
506 (void) LogMagickEvent(TraceEvent,GetMagickModule(),
"%s",pattern);
508 p=GetPolicyInfo(
"*",exception);
509 if (p == (
const PolicyInfo *) NULL)
510 return((
char **) NULL);
511 policies=(
char **) AcquireQuantumMemory((
size_t)
512 GetNumberOfElementsInLinkedList(policy_cache)+1UL,
sizeof(*policies));
513 if (policies == (
char **) NULL)
514 return((
char **) NULL);
518 LockSemaphoreInfo(policy_semaphore);
519 ResetLinkedListIterator(policy_cache);
520 p=(
const PolicyInfo *) GetNextValueInLinkedList(policy_cache);
521 for (i=0; p != (
const PolicyInfo *) NULL; )
523 if ((p->stealth == MagickFalse) &&
524 (GlobExpression(p->name,pattern,MagickFalse) != MagickFalse))
525 policies[i++]=AcquirePolicyString(p->name,1);
526 p=(
const PolicyInfo *) GetNextValueInLinkedList(policy_cache);
528 UnlockSemaphoreInfo(policy_semaphore);
529 policies[i]=(
char *) NULL;
530 *number_policies=(size_t) i;
556MagickExport
char *GetPolicyValue(
const char *name)
567 assert(name != (
const char *) NULL);
568 if (IsEventLogging() != MagickFalse)
569 (void) LogMagickEvent(TraceEvent,GetMagickModule(),
"%s",name);
570 exception=AcquireExceptionInfo();
571 policy_info=GetPolicyInfo(name,exception);
572 exception=DestroyExceptionInfo(exception);
573 if (policy_info == (PolicyInfo *) NULL)
574 return((
char *) NULL);
575 value=policy_info->value;
576 if ((value == (
const char *) NULL) || (*value ==
'\0'))
577 return((
char *) NULL);
578 return(AcquirePolicyString(value,1));
604static MagickBooleanType IsPolicyCacheInstantiated(ExceptionInfo *exception)
606 if (policy_cache == (LinkedListInfo *) NULL)
608 GetMaxMemoryRequest();
610 ActivateSemaphoreInfo(&policy_semaphore);
611 LockSemaphoreInfo(policy_semaphore);
612 if (policy_cache == (LinkedListInfo *) NULL)
613 policy_cache=AcquirePolicyCache(PolicyFilename,exception);
614 UnlockSemaphoreInfo(policy_semaphore);
616 return(policy_cache != (LinkedListInfo *) NULL ? MagickTrue : MagickFalse);
648static inline MagickBooleanType ParseNamespace(
const char *qualified_pattern,
649 char **name,
char **pattern)
658 if ((qualified_pattern == (
const char *) NULL) || (name == (
char **) NULL) ||
659 (pattern == (
char **) NULL))
662 *pattern=(
char *) NULL;
663 separator=strstr(qualified_pattern,
"::");
664 if (separator == (
const char *) NULL)
666 *pattern=AcquireString(qualified_pattern);
667 return(*pattern != (
char *) NULL ? MagickTrue : MagickFalse);
669 length=(size_t) (separator-qualified_pattern);
670 *name=(
char *) AcquireQuantumMemory(length+1,
sizeof(
char));
671 if (*name == (
char *) NULL)
673 (void) CopyMagickString(*name,qualified_pattern,length+1);
675 *pattern=AcquireString(p);
676 if (*pattern == (
char *) NULL)
678 *name=DestroyString(*name);
685MagickExport MagickBooleanType IsRightsAuthorized(
const PolicyDomain domain,
686 const PolicyRights rights,
const char *qualified_pattern)
689 *canonical_directory = (
char *) NULL,
690 *canonical_path = (
char *) NULL,
691 *canonical_candidate = (
char *) NULL,
692 directory[MagickPathExtent],
693 filename[MagickPathExtent],
694 *name = (
char *) NULL,
695 *pattern = (
char *) NULL;
698 **policies = (
const PolicyInfo **) NULL;
704 matched_any = MagickFalse,
705 paths_provisioned = MagickFalse;
708 effective_rights = AllPolicyRights;
716 if ((GetLogEventMask() & PolicyEvent) != 0)
717 (void) LogMagickEvent(PolicyEvent,GetMagickModule(),
718 "Domain: %s; rights=%s; pattern=\"%s\" ...",
719 CommandOptionToMnemonic(MagickPolicyDomainOptions,domain),
720 CommandOptionToMnemonic(MagickPolicyRightsOptions,rights),
725 exception=AcquireExceptionInfo();
726 policies=GetPolicyInfoList(
"*",&count,exception);
727 exception=DestroyExceptionInfo(exception);
728 if (policies == (
const PolicyInfo **) NULL)
730 if (ParseNamespace(qualified_pattern,&name,&pattern) == MagickFalse)
732 policies=(
const PolicyInfo **) RelinquishMagickMemory((
void *) policies);
738 for (i=0; i < (ssize_t) count; i++)
741 *policy = policies[i];
746 if (policy->domain != domain)
748 if ((name != (
char *) NULL) && (LocaleCompare(name,policy->name) != 0))
750 match=GlobExpression(pattern,policy->pattern,MagickFalse);
751 if (policy->domain == PathPolicyDomain)
753 if (paths_provisioned == MagickFalse)
758 paths_provisioned=MagickTrue;
759 GetPathComponent(pattern,HeadPath,directory);
760 GetPathComponent(pattern,TailPath,filename);
761 canonical_directory=realpath_utf8(directory);
762 if ((canonical_directory != (
char *) NULL) && (*filename !=
'\0'))
767 length=strlen(canonical_directory)+strlen(filename)+2;
768 canonical_candidate=(
char *) AcquireQuantumMemory(length,
769 sizeof(*canonical_candidate));
770 if (canonical_candidate != (
char *) NULL)
771 (void) FormatLocaleString(canonical_candidate,length,
"%s%s%s",
772 canonical_directory,DirectorySeparator,filename);
774 canonical_path=realpath_utf8(pattern);
779 if ((canonical_directory != (
char *) NULL) && (match == MagickFalse))
780 match=GlobExpression(canonical_directory,policy->pattern,MagickFalse);
781 if ((canonical_candidate != (
char *) NULL) && (match == MagickFalse))
782 match=GlobExpression(canonical_candidate,policy->pattern,MagickFalse);
783 if ((canonical_path != (
char *) NULL) && (match == MagickFalse))
784 match=GlobExpression(canonical_path,policy->pattern,MagickFalse);
786 if (match == MagickFalse)
788 matched_any=MagickTrue;
789 effective_rights=policy->rights;
791 policies=(
const PolicyInfo **) RelinquishMagickMemory((
void *) policies);
792 if (pattern != (
char *) NULL)
793 pattern=DestroyString(pattern);
794 if (name != (
char *) NULL)
795 name=DestroyString(name);
796 if (canonical_directory != (
char *) NULL)
797 canonical_directory=DestroyString(canonical_directory);
798 if (canonical_candidate != (
char *) NULL)
799 canonical_candidate=DestroyString(canonical_candidate);
800 if (canonical_path != (
char *) NULL)
801 canonical_path=DestroyString(canonical_path);
805 if (matched_any == MagickFalse)
807 if ((rights & ReadPolicyRights) && !(effective_rights & ReadPolicyRights))
809 if ((rights & WritePolicyRights) && !(effective_rights & WritePolicyRights))
811 if ((rights & ExecutePolicyRights) &&
812 !(effective_rights & ExecutePolicyRights))
841MagickExport MagickBooleanType ListPolicyInfo(FILE *file,
842 ExceptionInfo *exception)
860 if (file == (
const FILE *) NULL)
862 policy_info=GetPolicyInfoList(
"*",&number_policies,exception);
863 if (policy_info == (
const PolicyInfo **) NULL)
865 path=(
const char *) NULL;
866 for (i=0; i < (ssize_t) number_policies; i++)
868 if (policy_info[i]->stealth != MagickFalse)
870 if (((path == (
const char *) NULL) ||
871 (LocaleCompare(path,policy_info[i]->path) != 0)) &&
872 (policy_info[i]->path != (
char *) NULL))
873 (void) FormatLocaleFile(file,
"\nPath: %s\n",policy_info[i]->path);
874 path=policy_info[i]->path;
875 domain=CommandOptionToMnemonic(MagickPolicyDomainOptions,
876 policy_info[i]->domain);
877 (void) FormatLocaleFile(file,
" Policy: %s\n",domain);
878 if ((policy_info[i]->domain == CachePolicyDomain) ||
879 (policy_info[i]->domain == ResourcePolicyDomain) ||
880 (policy_info[i]->domain == SystemPolicyDomain))
882 if (policy_info[i]->name != (
char *) NULL)
883 (void) FormatLocaleFile(file,
" name: %s\n",policy_info[i]->name);
884 if (policy_info[i]->value != (
char *) NULL)
885 (void) FormatLocaleFile(file,
" value: %s\n",policy_info[i]->value);
889 (void) FormatLocaleFile(file,
" rights: ");
890 if (policy_info[i]->rights == NoPolicyRights)
891 (void) FormatLocaleFile(file,
"None ");
892 if ((policy_info[i]->rights & ReadPolicyRights) != 0)
893 (void) FormatLocaleFile(file,
"Read ");
894 if ((policy_info[i]->rights & WritePolicyRights) != 0)
895 (void) FormatLocaleFile(file,
"Write ");
896 if ((policy_info[i]->rights & ExecutePolicyRights) != 0)
897 (void) FormatLocaleFile(file,
"Execute ");
898 (void) FormatLocaleFile(file,
"\n");
899 if (policy_info[i]->pattern != (
char *) NULL)
900 (void) FormatLocaleFile(file,
" pattern: %s\n",
901 policy_info[i]->pattern);
904 policy_info=(
const PolicyInfo **) RelinquishMagickMemory((
void *)
940static MagickBooleanType LoadPolicyCache(LinkedListInfo *cache,
const char *xml,
941 const char *filename,
const size_t depth,ExceptionInfo *exception)
944 keyword[MagickPathExtent],
962 (void) LogMagickEvent(ConfigureEvent,GetMagickModule(),
963 "Loading policy file \"%s\" ...",filename);
964 if (xml == (
char *) NULL)
967 policy_info=(PolicyInfo *) NULL;
968 token=AcquirePolicyString(xml,MagickPathExtent);
969 extent=strlen(token)+MagickPathExtent;
970 for (q=(
const char *) xml; *q !=
'\0'; )
975 (void) GetNextToken(q,&q,extent,token);
978 (void) CopyMagickString(keyword,token,MagickPathExtent);
979 if (LocaleNCompare(keyword,
"<!DOCTYPE",9) == 0)
984 while ((LocaleNCompare(q,
"]>",2) != 0) && (*q !=
'\0'))
985 (void) GetNextToken(q,&q,extent,token);
988 if (LocaleNCompare(keyword,
"<!--",4) == 0)
993 while ((LocaleNCompare(q,
"->",2) != 0) && (*q !=
'\0'))
994 (void) GetNextToken(q,&q,extent,token);
997 if (LocaleCompare(keyword,
"<include") == 0)
1002 while (((*token !=
'/') && (*(token+1) !=
'>')) && (*q !=
'\0'))
1004 (void) CopyMagickString(keyword,token,MagickPathExtent);
1005 (void) GetNextToken(q,&q,extent,token);
1008 (void) GetNextToken(q,&q,extent,token);
1009 if (LocaleCompare(keyword,
"file") == 0)
1011 if (depth > MagickMaxRecursionDepth)
1012 (void) ThrowMagickException(exception,GetMagickModule(),
1013 ConfigureError,
"IncludeElementNestedTooDeeply",
"`%s'",token);
1017 path[MagickPathExtent],
1020 GetPathComponent(filename,HeadPath,path);
1022 (void) ConcatenateMagickString(path,DirectorySeparator,
1024 if (*token == *DirectorySeparator)
1025 (void) CopyMagickString(path,token,MagickPathExtent);
1027 (
void) ConcatenateMagickString(path,token,MagickPathExtent);
1028 xml=FileToXML(path,~0UL);
1029 if (xml != (
char *) NULL)
1031 status&=LoadPolicyCache(cache,xml,path,depth+1,
1033 xml=(
char *) RelinquishMagickMemory(xml);
1040 if (LocaleCompare(keyword,
"<policy") == 0)
1045 policy_info=(PolicyInfo *) AcquireMagickMemory(
sizeof(*policy_info));
1046 if (policy_info == (PolicyInfo *) NULL)
1047 ThrowFatalException(ResourceLimitFatalError,
"MemoryAllocationFailed");
1048 (void) memset(policy_info,0,
sizeof(*policy_info));
1049 policy_info->path=AcquirePolicyString(filename,1);
1050 policy_info->exempt=MagickFalse;
1051 policy_info->signature=MagickCoreSignature;
1054 if (policy_info == (PolicyInfo *) NULL)
1056 if ((LocaleCompare(keyword,
"/>") == 0) ||
1057 (LocaleCompare(keyword,
"</policy>") == 0))
1059 status=AppendValueToLinkedList(cache,policy_info);
1060 if (status == MagickFalse)
1061 (void) ThrowMagickException(exception,GetMagickModule(),
1062 ResourceLimitError,
"MemoryAllocationFailed",
"`%s'",
1064 policy_info=(PolicyInfo *) NULL;
1067 (void) GetNextToken(q,(
const char **) NULL,extent,token);
1070 (void) GetNextToken(q,&q,extent,token);
1071 (void) GetNextToken(q,&q,extent,token);
1077 if (LocaleCompare((
char *) keyword,
"domain") == 0)
1079 policy_info->domain=(PolicyDomain) ParseCommandOption(
1080 MagickPolicyDomainOptions,MagickTrue,token);
1088 if (LocaleCompare((
char *) keyword,
"name") == 0)
1090 policy_info->name=AcquirePolicyString(token,1);
1098 if (LocaleCompare((
char *) keyword,
"pattern") == 0)
1100 policy_info->pattern=AcquirePolicyString(token,1);
1108 if (LocaleCompare((
char *) keyword,
"rights") == 0)
1110 policy_info->rights=(PolicyRights) ParseCommandOption(
1111 MagickPolicyRightsOptions,MagickTrue,token);
1119 if (LocaleCompare((
char *) keyword,
"stealth") == 0)
1121 policy_info->stealth=IsMagickTrue(token);
1129 if (LocaleCompare((
char *) keyword,
"value") == 0)
1131 policy_info->value=AcquirePolicyString(token,1);
1140 token=(
char *) RelinquishMagickMemory(token);
1141 if (status == MagickFalse)
1142 CatchException(exception);
1143 return(status != 0 ? MagickTrue : MagickFalse);
1164MagickExport MagickBooleanType PolicyComponentGenesis(
void)
1167 policy_semaphore=AllocateSemaphoreInfo();
1190static void *DestroyPolicyElement(
void *policy_info)
1195 p=(PolicyInfo *) policy_info;
1196 if (p->exempt == MagickFalse)
1198 if (p->value != (
char *) NULL)
1199 p->value=DestroyString(p->value);
1200 if (p->pattern != (
char *) NULL)
1201 p->pattern=DestroyString(p->pattern);
1202 if (p->name != (
char *) NULL)
1203 p->name=DestroyString(p->name);
1204 if (p->path != (
char *) NULL)
1205 p->path=DestroyString(p->path);
1207 p=(PolicyInfo *) RelinquishMagickMemory(p);
1208 return((
void *) NULL);
1211MagickExport
void PolicyComponentTerminus(
void)
1214 ActivateSemaphoreInfo(&policy_semaphore);
1215 LockSemaphoreInfo(policy_semaphore);
1216 if (policy_cache != (LinkedListInfo *) NULL)
1217 policy_cache=DestroyLinkedList(policy_cache,DestroyPolicyElement);
1218 UnlockSemaphoreInfo(policy_semaphore);
1219 DestroySemaphoreInfo(&policy_semaphore);
1249static MagickBooleanType ValidateSecurityPolicy(
const char *policy,
1250 const char *url,ExceptionInfo *exception)
1252#if defined(MAGICKCORE_XML_DELEGATE)
1259 document=xmlReadMemory(policy,(
int) strlen(policy),url,NULL,
1260 XML_PARSE_NOERROR | XML_PARSE_NOWARNING);
1261 if (document == (xmlDocPtr) NULL)
1263 (void) ThrowMagickException(exception,GetMagickModule(),ConfigureError,
1264 "PolicyValidationException",
"'%s'",url);
1265 return(MagickFalse);
1267 xmlFreeDoc(document);
1276MagickExport MagickBooleanType SetMagickSecurityPolicy(
const char *policy,
1277 ExceptionInfo *exception)
1291 assert(exception != (ExceptionInfo *) NULL);
1292 if (policy == (
const char *) NULL)
1293 return(MagickFalse);
1294 if (ValidateSecurityPolicy(policy,PolicyFilename,exception) == MagickFalse)
1295 return(MagickFalse);
1296 status=LoadPolicyCache(policy_cache,policy,
"[user-policy]",0,exception);
1297 if (status == MagickFalse)
1302 user_policies=NewLinkedList(0);
1303 status=LoadPolicyCache(user_policies,policy,
"[user-policy]",0,exception);
1304 if (status == MagickFalse)
1306 user_policies=DestroyLinkedList(user_policies,DestroyPolicyElement);
1307 return(MagickFalse);
1309 ResetLinkedListIterator(user_policies);
1310 p=(PolicyInfo *) GetNextValueInLinkedList(user_policies);
1311 while (p != (PolicyInfo *) NULL)
1313 if ((p->name != (
char *) NULL) && (p->value != (
char *) NULL))
1314 (void) SetMagickSecurityPolicyValue(p->domain,p->name,p->value,exception);
1315 p=(PolicyInfo *) GetNextValueInLinkedList(user_policies);
1317 user_policies=DestroyLinkedList(user_policies,DestroyPolicyElement);
1354static MagickBooleanType SetMagickSecurityPolicyValue(
const PolicyDomain domain,
1355 const char *name,
const char *value,ExceptionInfo *exception)
1357 magick_unreferenced(exception);
1358 assert(exception != (ExceptionInfo *) NULL);
1359 if ((name == (
const char *) NULL) || (value == (
const char *) NULL))
1360 return(MagickFalse);
1363 case CachePolicyDomain:
1365 if (LocaleCompare(name,
"memory-map") == 0)
1367 if (LocaleCompare(value,
"anonymous") != 0)
1368 return(MagickFalse);
1369 ResetCacheAnonymousMemory();
1370 ResetStreamAnonymousMemory();
1375 case ResourcePolicyDomain:
1380 type=ParseCommandOption(MagickResourceOptions,MagickFalse,name);
1386 limit=MagickResourceInfinity;
1387 if (LocaleCompare(
"unlimited",value) != 0)
1388 limit=StringToMagickSizeType(value,100.0);
1389 if ((ResourceType) type == TimeResource)
1390 limit=(MagickSizeType) ParseMagickTimeToLive(value);
1391 return(SetMagickResourceLimit((ResourceType) type,limit));
1395 case SystemPolicyDomain:
1397 if (LocaleCompare(name,
"max-memory-request") == 0)
1402 limit=MagickResourceInfinity;
1403 if (LocaleCompare(
"unlimited",value) != 0)
1404 limit=StringToMagickSizeType(value,100.0);
1405 SetMaxMemoryRequest(limit);
1408 if (LocaleCompare(name,
"memory-map") == 0)
1410 if (LocaleCompare(value,
"anonymous") != 0)
1411 return(MagickFalse);
1412 ResetVirtualAnonymousMemory();
1415 if (LocaleCompare(name,
"precision") == 0)
1420 limit=StringToInteger(value);
1421 SetMagickPrecision(limit);
1426 case CoderPolicyDomain:
1427 case DelegatePolicyDomain:
1428 case FilterPolicyDomain:
1429 case ModulePolicyDomain:
1430 case PathPolicyDomain:
1434 return(MagickFalse);