Return-Path: Delivered-To: apmail-tomcat-dev-archive@www.apache.org Received: (qmail 9441 invoked from network); 21 Dec 2009 13:28:23 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.3) by minotaur.apache.org with SMTP; 21 Dec 2009 13:28:23 -0000 Received: (qmail 31954 invoked by uid 500); 21 Dec 2009 13:28:22 -0000 Delivered-To: apmail-tomcat-dev-archive@tomcat.apache.org Received: (qmail 31885 invoked by uid 500); 21 Dec 2009 13:28:22 -0000 Mailing-List: contact dev-help@tomcat.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: "Tomcat Developers List" Delivered-To: mailing list dev@tomcat.apache.org Received: (qmail 31874 invoked by uid 99); 21 Dec 2009 13:28:22 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 21 Dec 2009 13:28:22 +0000 X-ASF-Spam-Status: No, hits=-2000.0 required=10.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.4] (HELO eris.apache.org) (140.211.11.4) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 21 Dec 2009 13:28:19 +0000 Received: by eris.apache.org (Postfix, from userid 65534) id 0A2C823889EC; Mon, 21 Dec 2009 13:27:58 +0000 (UTC) Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Subject: svn commit: r892815 - in /tomcat/tc6.0.x/trunk: ./ java/org/apache/catalina/loader/ java/org/apache/catalina/startup/ webapps/docs/ Date: Mon, 21 Dec 2009 13:27:57 -0000 To: dev@tomcat.apache.org From: markt@apache.org X-Mailer: svnmailer-1.0.8 Message-Id: <20091221132758.0A2C823889EC@eris.apache.org> X-Virus-Checked: Checked by ClamAV on apache.org Author: markt Date: Mon Dec 21 13:27:57 2009 New Revision: 892815 URL: http://svn.apache.org/viewvc?rev=892815&view=rev Log: Various related (un)deploy improvements including: - better handling of failed (un)deployment - adding checking for valid zip file entries that don't make sense in a WAR file - improved validation of WAR file names - make sure error messages match the action - the return from File.getCanonicalPath() may or may not return a final separator for directories Modified: tomcat/tc6.0.x/trunk/STATUS.txt tomcat/tc6.0.x/trunk/java/org/apache/catalina/loader/LocalStrings.properties tomcat/tc6.0.x/trunk/java/org/apache/catalina/loader/WebappClassLoader.java tomcat/tc6.0.x/trunk/java/org/apache/catalina/startup/ContextConfig.java tomcat/tc6.0.x/trunk/java/org/apache/catalina/startup/ExpandWar.java tomcat/tc6.0.x/trunk/java/org/apache/catalina/startup/HostConfig.java tomcat/tc6.0.x/trunk/java/org/apache/catalina/startup/LocalStrings.properties tomcat/tc6.0.x/trunk/webapps/docs/changelog.xml Modified: tomcat/tc6.0.x/trunk/STATUS.txt URL: http://svn.apache.org/viewvc/tomcat/tc6.0.x/trunk/STATUS.txt?rev=892815&r1=892814&r2=892815&view=diff ============================================================================== --- tomcat/tc6.0.x/trunk/STATUS.txt (original) +++ tomcat/tc6.0.x/trunk/STATUS.txt Mon Dec 21 13:27:57 2009 @@ -322,9 +322,3 @@ http://svn.apache.org/viewvc?rev=892341&view=rev +1: markt, rjung -1: - -* Various (un)deployment improvements - http://people.apache.org/~markt/patches/2009-12-21-deployment-improvements.patch - +1: markt, jfclere, kkolinko - -1: - kkolinko: s/canoncial/canonical/ in a comment Modified: tomcat/tc6.0.x/trunk/java/org/apache/catalina/loader/LocalStrings.properties URL: http://svn.apache.org/viewvc/tomcat/tc6.0.x/trunk/java/org/apache/catalina/loader/LocalStrings.properties?rev=892815&r1=892814&r2=892815&view=diff ============================================================================== --- tomcat/tc6.0.x/trunk/java/org/apache/catalina/loader/LocalStrings.properties (original) +++ tomcat/tc6.0.x/trunk/java/org/apache/catalina/loader/LocalStrings.properties Mon Dec 21 13:27:57 2009 @@ -28,8 +28,10 @@ standardLoader.removeRepository=Removing repository {0} standardLoader.starting=Starting this Loader standardLoader.stopping=Stopping this Loader +webappClassLoader.illegalJarPath=Illegal JAR entry detected with name {0} webappClassLoader.stopped=Illegal access: this web application instance has been stopped already. Could not load {0}. The eventual following stack trace is caused by an error thrown for debugging purposes as well as to attempt to terminate the thread which caused the illegal access, and has no functional impact. webappClassLoader.readError=Resource read error: Could not load {0}. +webappClassLoader.validationErrorJarPath=Unable to validate JAR entry with name {0} webappClassLoader.wrongVersion=(unable to load class {0}) webappLoader.addRepository=Adding repository {0} webappLoader.deploy=Deploying class repositories to work directory {0} Modified: tomcat/tc6.0.x/trunk/java/org/apache/catalina/loader/WebappClassLoader.java URL: http://svn.apache.org/viewvc/tomcat/tc6.0.x/trunk/java/org/apache/catalina/loader/WebappClassLoader.java?rev=892815&r1=892814&r2=892815&view=diff ============================================================================== --- tomcat/tc6.0.x/trunk/java/org/apache/catalina/loader/WebappClassLoader.java (original) +++ tomcat/tc6.0.x/trunk/java/org/apache/catalina/loader/WebappClassLoader.java Mon Dec 21 13:27:57 2009 @@ -365,7 +365,7 @@ * Path where resources loaded from JARs will be extracted. */ protected File loaderDir = null; - + protected String canonicalLoaderDir = null; /** * The PermissionCollection for each CodeSource for a web @@ -558,6 +558,18 @@ */ public void setWorkDir(File workDir) { this.loaderDir = new File(workDir, "loader"); + if (loaderDir == null) { + canonicalLoaderDir = null; + } else { + try { + canonicalLoaderDir = loaderDir.getCanonicalPath(); + if (!canonicalLoaderDir.endsWith(File.separator)) { + canonicalLoaderDir += File.separator; + } + } catch (IOException ioe) { + canonicalLoaderDir = null; + } + } } /** @@ -2139,6 +2151,18 @@ (".class"))) { resourceFile = new File (loaderDir, jarEntry2.getName()); + try { + if (!resourceFile.getCanonicalPath().startsWith( + canonicalLoaderDir)) { + throw new IllegalArgumentException( + sm.getString("webappClassLoader.illegalJarPath", + jarEntry2.getName())); + } + } catch (IOException ioe) { + throw new IllegalArgumentException( + sm.getString("webappClassLoader.validationErrorJarPath", + jarEntry2.getName()), ioe); + } resourceFile.getParentFile().mkdirs(); FileOutputStream os = null; InputStream is = null; Modified: tomcat/tc6.0.x/trunk/java/org/apache/catalina/startup/ContextConfig.java URL: http://svn.apache.org/viewvc/tomcat/tc6.0.x/trunk/java/org/apache/catalina/startup/ContextConfig.java?rev=892815&r1=892814&r2=892815&view=diff ============================================================================== --- tomcat/tc6.0.x/trunk/java/org/apache/catalina/startup/ContextConfig.java (original) +++ tomcat/tc6.0.x/trunk/java/org/apache/catalina/startup/ContextConfig.java Mon Dec 21 13:27:57 2009 @@ -870,35 +870,40 @@ file = new File(docBase); String origDocBase = docBase; - String contextPath = context.getPath(); - if (contextPath.equals("")) { - contextPath = "ROOT"; + String pathName = context.getPath(); + if (pathName.equals("")) { + pathName = "ROOT"; } else { - if (contextPath.lastIndexOf('/') > 0) { - contextPath = "/" + contextPath.substring(1).replace('/','#'); - } + // Context path must start with '/' + pathName = pathName.substring(1).replace('/', '#'); } if (docBase.toLowerCase().endsWith(".war") && !file.isDirectory() && unpackWARs) { URL war = new URL("jar:" + (new File(docBase)).toURI().toURL() + "!/"); - docBase = ExpandWar.expand(host, war, contextPath); + docBase = ExpandWar.expand(host, war, pathName); file = new File(docBase); docBase = file.getCanonicalPath(); if (context instanceof StandardContext) { ((StandardContext) context).setOriginalDocBase(origDocBase); } + } else if (docBase.toLowerCase().endsWith(".war") && + !file.isDirectory() && !unpackWARs) { + URL war = + new URL("jar:" + (new File (docBase)).toURI().toURL() + "!/"); + ExpandWar.validate(host, war, pathName); } else { File docDir = new File(docBase); if (!docDir.exists()) { File warFile = new File(docBase + ".war"); if (warFile.exists()) { + URL war = + new URL("jar:" + warFile.toURI().toURL() + "!/"); if (unpackWARs) { - URL war = - new URL("jar:" + warFile.toURI().toURL() + "!/"); - docBase = ExpandWar.expand(host, war, contextPath); + docBase = ExpandWar.expand(host, war, pathName); file = new File(docBase); docBase = file.getCanonicalPath(); } else { docBase = warFile.getCanonicalPath(); + ExpandWar.validate(host, war, pathName); } } if (context instanceof StandardContext) { @@ -1260,7 +1265,8 @@ if (!docBaseFile.isAbsolute()) { docBaseFile = new File(appBase, docBase); } - ExpandWar.delete(docBaseFile); + // No need to log failure - it is expected in this case + ExpandWar.delete(docBaseFile, false); } ok = true; Modified: tomcat/tc6.0.x/trunk/java/org/apache/catalina/startup/ExpandWar.java URL: http://svn.apache.org/viewvc/tomcat/tc6.0.x/trunk/java/org/apache/catalina/startup/ExpandWar.java?rev=892815&r1=892814&r2=892815&view=diff ============================================================================== --- tomcat/tc6.0.x/trunk/java/org/apache/catalina/startup/ExpandWar.java (original) +++ tomcat/tc6.0.x/trunk/java/org/apache/catalina/startup/ExpandWar.java Mon Dec 21 13:27:57 2009 @@ -105,7 +105,8 @@ * (must start with "jar:") * @param pathname Context path name for web application * - * @exception IllegalArgumentException if this is not a "jar:" URL + * @exception IllegalArgumentException if this is not a "jar:" URL or if the + * WAR file is invalid * @exception IOException if an input/output error was encountered * during expansion */ @@ -123,6 +124,7 @@ (sm.getString("hostConfig.appBase", appBase.getAbsolutePath())); } + File docBase = new File(appBase, pathname); if (docBase.exists()) { // War file is already installed @@ -133,16 +135,29 @@ docBase.mkdir(); // Expand the WAR into the new document base directory + String canonicalDocBasePrefix = docBase.getCanonicalPath(); + if (!canonicalDocBasePrefix.endsWith(File.separator)) { + canonicalDocBasePrefix += File.separator; + } JarURLConnection juc = (JarURLConnection) war.openConnection(); juc.setUseCaches(false); JarFile jarFile = null; InputStream input = null; + boolean success = false; try { jarFile = juc.getJarFile(); Enumeration jarEntries = jarFile.entries(); while (jarEntries.hasMoreElements()) { JarEntry jarEntry = (JarEntry) jarEntries.nextElement(); String name = jarEntry.getName(); + File expandedFile = new File(docBase, name); + if (!expandedFile.getCanonicalPath().startsWith( + canonicalDocBasePrefix)) { + // Trying to expand outside the docBase + // Throw an exception to stop the deployment + throw new IllegalArgumentException( + sm.getString("expandWar.illegalPath",war, name)); + } int last = name.lastIndexOf('/'); if (last >= 0) { File parent = new File(docBase, @@ -155,21 +170,24 @@ input = jarFile.getInputStream(jarEntry); // Bugzilla 33636 - File expandedFile = expand(input, docBase, name); + expand(input, expandedFile); long lastModified = jarEntry.getTime(); - if ((lastModified != -1) && (lastModified != 0) && (expandedFile != null)) { + if ((lastModified != -1) && (lastModified != 0)) { expandedFile.setLastModified(lastModified); } input.close(); input = null; } + success = true; } catch (IOException e) { - // If something went wrong, delete expanded dir to keep things - // clean - deleteDir(docBase); throw e; } finally { + if (!success) { + // If something went wrong, delete expanded dir to keep things + // clean + deleteDir(docBase); + } if (input != null) { try { input.close(); @@ -195,6 +213,69 @@ /** + * Validate the WAR file found at the specified URL. + * + * @param host Host war is being installed for + * @param war URL of the web application archive to be validated + * (must start with "jar:") + * @param pathname Context path name for web application + * + * @exception IllegalArgumentException if this is not a "jar:" URL or if the + * WAR file is invalid + * @exception IOException if an input/output error was encountered + * during validation + */ + public static void validate(Host host, URL war, String pathname) + throws IOException { + + // Make the appBase absolute + File appBase = new File(host.getAppBase()); + if (!appBase.isAbsolute()) { + appBase = new File(System.getProperty("catalina.base"), + host.getAppBase()); + } + + File docBase = new File(appBase, pathname); + + // Calculate the document base directory + String canonicalDocBasePrefix = docBase.getCanonicalPath(); + if (!canonicalDocBasePrefix.endsWith(File.separator)) { + canonicalDocBasePrefix += File.separator; + } + JarURLConnection juc = (JarURLConnection) war.openConnection(); + juc.setUseCaches(false); + JarFile jarFile = null; + try { + jarFile = juc.getJarFile(); + Enumeration jarEntries = jarFile.entries(); + while (jarEntries.hasMoreElements()) { + JarEntry jarEntry = jarEntries.nextElement(); + String name = jarEntry.getName(); + File expandedFile = new File(docBase, name); + if (!expandedFile.getCanonicalPath().startsWith( + canonicalDocBasePrefix)) { + // Entry located outside the docBase + // Throw an exception to stop the deployment + throw new IllegalArgumentException( + sm.getString("expandWar.illegalPath",war, name)); + } + } + } catch (IOException e) { + throw e; + } finally { + if (jarFile != null) { + try { + jarFile.close(); + } catch (Throwable t) { + // Ignore + } + jarFile = null; + } + } + } + + + /** * Copy the specified file or directory to the destination. * * @param src File object representing the source @@ -254,26 +335,61 @@ /** * Delete the specified directory, including all of its contents and - * subdirectories recursively. + * sub-directories recursively. Any failure will be logged. * * @param dir File object representing the directory to be deleted */ public static boolean delete(File dir) { + // Log failure by default + return delete(dir, true); + } + + /** + * Delete the specified directory, including all of its contents and + * sub-directories recursively. + * + * @param dir File object representing the directory to be deleted + * @param logFailure true if failure to delete the resource + * should be logged + */ + public static boolean delete(File dir, boolean logFailure) { + boolean result; if (dir.isDirectory()) { - return deleteDir(dir); + result = deleteDir(dir, logFailure); } else { - return dir.delete(); + if (dir.exists()) { + result = dir.delete(); + } else { + result = true; + } + } + if (logFailure && !result) { + log.error(sm.getString( + "expandWar.deleteFailed", dir.getAbsolutePath())); } + return result; } /** * Delete the specified directory, including all of its contents and - * subdirectories recursively. + * sub-directories recursively. Any failure will be logged. * * @param dir File object representing the directory to be deleted */ public static boolean deleteDir(File dir) { + return deleteDir(dir, true); + } + + /** + * Delete the specified directory, including all of its contents and + * sub-directories recursively. + * + * @param dir File object representing the directory to be deleted + * @param logFailure true if failure to delete the resource + * should be logged + */ + public static boolean deleteDir(File dir, boolean logFailure) { String files[] = dir.list(); if (files == null) { @@ -282,12 +398,25 @@ for (int i = 0; i < files.length; i++) { File file = new File(dir, files[i]); if (file.isDirectory()) { - deleteDir(file); + deleteDir(file, logFailure); } else { file.delete(); } } - return dir.delete(); + + boolean result; + if (dir.exists()) { + result = dir.delete(); + } else { + result = true; + } + + if (logFailure && !result) { + log.error(sm.getString( + "expandWar.deleteFailed", dir.getAbsolutePath())); + } + + return result; } @@ -302,11 +431,27 @@ * @return A handle to the expanded File * * @exception IOException if an input/output error occurs + * + * @deprecated */ protected static File expand(InputStream input, File docBase, String name) throws IOException { - File file = new File(docBase, name); + expand(input, file); + return file; + } + + + /** + * Expand the specified input stream into the specified file. + * + * @param input InputStream to be copied + * @param file The file to be created + * + * @exception IOException if an input/output error occurs + */ + private static void expand(InputStream input, File file) + throws IOException { BufferedOutputStream output = null; try { output = @@ -327,8 +472,6 @@ } } } - - return file; } Modified: tomcat/tc6.0.x/trunk/java/org/apache/catalina/startup/HostConfig.java URL: http://svn.apache.org/viewvc/tomcat/tc6.0.x/trunk/java/org/apache/catalina/startup/HostConfig.java?rev=892815&r1=892814&r2=892815&view=diff ============================================================================== --- tomcat/tc6.0.x/trunk/java/org/apache/catalina/startup/HostConfig.java (original) +++ tomcat/tc6.0.x/trunk/java/org/apache/catalina/startup/HostConfig.java Mon Dec 21 13:27:57 2009 @@ -28,7 +28,9 @@ import java.io.OutputStream; import java.util.ArrayList; import java.util.HashMap; +import java.util.HashSet; import java.util.LinkedHashMap; +import java.util.Set; import java.util.jar.JarEntry; import java.util.jar.JarFile; @@ -152,6 +154,11 @@ */ protected static Digester digester = createDigester(); + /** + * The list of Wars in the appBase to be ignored because they are invalid + * (e.g. contain /../ sequences). + */ + protected Set invalidWars = new HashSet(); // ------------------------------------------------------------- Properties @@ -706,13 +713,22 @@ if (files[i].equalsIgnoreCase("WEB-INF")) continue; File dir = new File(appBase, files[i]); - if (files[i].toLowerCase().endsWith(".war") && dir.isFile()) { + if (files[i].toLowerCase().endsWith(".war") && dir.isFile() + && !invalidWars.contains(files[i]) ) { // Calculate the context path and make sure it is unique String contextPath = "/" + files[i].replace('#','/'); int period = contextPath.lastIndexOf("."); - if (period >= 0) - contextPath = contextPath.substring(0, period); + contextPath = contextPath.substring(0, period); + + // Check for WARs with /../ /./ or similar sequences in the name + if (!validateContextPath(appBase, contextPath)) { + log.error(sm.getString( + "hostConfig.illegalWarName", files[i])); + invalidWars.add(files[i]); + continue; + } + if (contextPath.equals("/ROOT")) contextPath = ""; @@ -730,6 +746,42 @@ } + private boolean validateContextPath(File appBase, String contextPath) { + // More complicated than the ideal as the canonical path may or may + // not end with File.separator for a directory + + StringBuilder docBase; + String canonicalDocBase = null; + + try { + String canonicalAppBase = appBase.getCanonicalPath(); + docBase = new StringBuilder(canonicalAppBase); + if (canonicalAppBase.endsWith(File.separator)) { + docBase.append(contextPath.substring(1).replace( + '/', File.separatorChar)); + } else { + docBase.append(contextPath.replace('/', File.separatorChar)); + } + // At this point docBase should be canonical but will not end + // with File.separator + + canonicalDocBase = + (new File(docBase.toString())).getCanonicalPath(); + + // If the canonicalDocBase ends with File.separator, add one to + // docBase before they are compared + if (canonicalDocBase.endsWith(File.separator)) { + docBase.append(File.separator); + } + } catch (IOException ioe) { + return false; + } + + // Compare the two. If they are not the same, the contextPath must + // have /../ like sequences in it + return canonicalDocBase.equals(docBase.toString()); + } + /** * @param contextPath * @param war Modified: tomcat/tc6.0.x/trunk/java/org/apache/catalina/startup/LocalStrings.properties URL: http://svn.apache.org/viewvc/tomcat/tc6.0.x/trunk/java/org/apache/catalina/startup/LocalStrings.properties?rev=892815&r1=892814&r2=892815&view=diff ============================================================================== --- tomcat/tc6.0.x/trunk/java/org/apache/catalina/startup/LocalStrings.properties (original) +++ tomcat/tc6.0.x/trunk/java/org/apache/catalina/startup/LocalStrings.properties Mon Dec 21 13:27:57 2009 @@ -57,6 +57,8 @@ engineConfig.start=EngineConfig: Processing START engineConfig.stop=EngineConfig: Processing STOP expandWar.copy=Error copying {0} to {1} +expandWar.deleteFailed=[{0}] could not be completely deleted. The presence of the remaining files may cause problems +expandWar.illegalPath=The archive [{0}] is malformed and will be ignored: an entry contains an illegal path [{1}] hostConfig.appBase=Application base directory {0} does not exist hostConfig.canonicalizing=Error delete redeploy resources from context [{0}] hostConfig.cce=Lifecycle event data object {0} is not a Host @@ -76,6 +78,7 @@ hostConfig.expand=Expanding web application archive {0} hostConfig.expand.error=Exception while expanding web application archive {0} hostConfig.expanding=Expanding discovered web application archives +hostConfig.illegalWarName=The war name [{0}] is invalid. The archive will be ignored. hostConfig.jmx.register=Register context [{0}] failed hostConfig.jmx.unregister=Unregister context [{0}] failed hostConfig.reload=Reloading context [{0}] Modified: tomcat/tc6.0.x/trunk/webapps/docs/changelog.xml URL: http://svn.apache.org/viewvc/tomcat/tc6.0.x/trunk/webapps/docs/changelog.xml?rev=892815&r1=892814&r2=892815&view=diff ============================================================================== --- tomcat/tc6.0.x/trunk/webapps/docs/changelog.xml (original) +++ tomcat/tc6.0.x/trunk/webapps/docs/changelog.xml Mon Dec 21 13:27:57 2009 @@ -359,6 +359,12 @@ Add support for a connectionTimeout parameter to the JNDIRealm. (markt) + + Various (un)deployment related improvements including better handling of + failed (un)deployment, additional checking for valid zip entries that + don't make sense in a WAR and improved validation of WAR file names. + (markt) + --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscribe@tomcat.apache.org For additional commands, e-mail: dev-help@tomcat.apache.org