Additional lock down of conditionals
This commit is contained in:
parent
5258e6d52a
commit
404b2864ef
1 changed files with 45 additions and 25 deletions
|
@ -29,6 +29,7 @@ from ansible.compat.six import text_type
|
|||
from ansible.errors import AnsibleError, AnsibleUndefinedVariable
|
||||
from ansible.playbook.attribute import FieldAttribute
|
||||
from ansible.template import Templar
|
||||
from ansible.template.safe_eval import safe_eval
|
||||
from ansible.module_utils._text import to_native
|
||||
|
||||
DEFINED_REGEX = re.compile(r'(hostvars\[.+\]|[\w_]+)\s+(not\s+is|is|is\s+not)\s+(defined|undefined)')
|
||||
|
@ -104,7 +105,9 @@ class Conditional:
|
|||
if not self._check_conditional(conditional, templar, all_vars):
|
||||
return False
|
||||
except Exception as e:
|
||||
raise AnsibleError("The conditional check '%s' failed. The error was: %s" % (to_native(conditional), to_native(e)), obj=ds)
|
||||
raise AnsibleError(
|
||||
"The conditional check '%s' failed. The error was: %s" % (to_native(conditional), to_native(e)), obj=ds
|
||||
)
|
||||
|
||||
return True
|
||||
|
||||
|
@ -143,35 +146,50 @@ class Conditional:
|
|||
# and we don't want future templating calls to do unsafe things
|
||||
disable_lookups |= hasattr(conditional, '__UNSAFE__')
|
||||
|
||||
# now we generated the "presented" string, which is a jinja2 if/else block
|
||||
# used to evaluate the conditional. First, we do some low-level jinja2 parsing
|
||||
# involving the AST format of the statement to ensure we don't do anything
|
||||
# unsafe (using the disable_lookup flag above)
|
||||
e = templar.environment.overlay()
|
||||
e.filters.update(templar._get_filters())
|
||||
e.tests.update(templar._get_tests())
|
||||
|
||||
presented = "{%% if %s %%} True {%% else %%} False {%% endif %%}" % conditional
|
||||
res = e._parse(presented, None, None)
|
||||
res = generate(res, e, None, None)
|
||||
parsed = ast.parse(res, mode='exec')
|
||||
|
||||
# First, we do some low-level jinja2 parsing involving the AST format of the
|
||||
# statement to ensure we don't do anything unsafe (using the disable_lookup flag above)
|
||||
class CleansingNodeVisitor(ast.NodeVisitor):
|
||||
def generic_visit(self, node, inside_call=False):
|
||||
def generic_visit(self, node, inside_call=False, inside_yield=False):
|
||||
if isinstance(node, ast.Call):
|
||||
inside_call = True
|
||||
elif isinstance(node, ast.Yield):
|
||||
inside_yield = True
|
||||
elif isinstance(node, ast.Str):
|
||||
# calling things with a dunder is generally bad at this point...
|
||||
if inside_call and disable_lookups and node.s.startswith("__"):
|
||||
raise AnsibleError("Invalid access found in the presented conditional: '%s'" % conditional)
|
||||
if disable_lookups:
|
||||
if inside_call and node.s.startswith("__"):
|
||||
# calling things with a dunder is generally bad at this point...
|
||||
raise AnsibleError(
|
||||
"Invalid access found in the conditional: '%s'" % conditional
|
||||
)
|
||||
elif inside_yield:
|
||||
# we're inside a yield, so recursively parse and traverse the AST
|
||||
# of the result to catch forbidden syntax from executing
|
||||
parsed = ast.parse(node.s, mode='exec')
|
||||
cnv = CleansingNodeVisitor()
|
||||
cnv.visit(parsed)
|
||||
# iterate over all child nodes
|
||||
for child_node in ast.iter_child_nodes(node):
|
||||
self.generic_visit(child_node, inside_call=inside_call)
|
||||
self.generic_visit(
|
||||
child_node,
|
||||
inside_call=inside_call,
|
||||
inside_yield=inside_yield
|
||||
)
|
||||
try:
|
||||
e = templar.environment.overlay()
|
||||
e.filters.update(templar._get_filters())
|
||||
e.tests.update(templar._get_tests())
|
||||
|
||||
cnv = CleansingNodeVisitor()
|
||||
cnv.visit(parsed)
|
||||
res = e._parse(conditional, None, None)
|
||||
res = generate(res, e, None, None)
|
||||
parsed = ast.parse(res, mode='exec')
|
||||
|
||||
# and finally we templated the presented string and look at the resulting string
|
||||
cnv = CleansingNodeVisitor()
|
||||
cnv.visit(parsed)
|
||||
except Exception as e:
|
||||
raise AnsibleError("Invalid conditional detected: %s" % to_native(e))
|
||||
|
||||
# and finally we generate and template the presented string and look at the resulting string
|
||||
presented = "{%% if %s %%} True {%% else %%} False {%% endif %%}" % conditional
|
||||
val = templar.template(presented, disable_lookups=disable_lookups).strip()
|
||||
if val == "True":
|
||||
return True
|
||||
|
@ -180,8 +198,8 @@ class Conditional:
|
|||
else:
|
||||
raise AnsibleError("unable to evaluate conditional: %s" % original)
|
||||
except (AnsibleUndefinedVariable, UndefinedError) as e:
|
||||
# the templating failed, meaning most likely a variable was undefined. If we happened to be
|
||||
# looking for an undefined variable, return True, otherwise fail
|
||||
# the templating failed, meaning most likely a variable was undefined. If we happened
|
||||
# to be looking for an undefined variable, return True, otherwise fail
|
||||
try:
|
||||
# first we extract the variable name from the error message
|
||||
var_name = re.compile(r"'(hostvars\[.+\]|[\w_]+)' is undefined").search(str(e)).groups()[0]
|
||||
|
@ -206,5 +224,7 @@ class Conditional:
|
|||
# trigger the AnsibleUndefinedVariable exception again below
|
||||
raise
|
||||
except Exception as new_e:
|
||||
raise AnsibleUndefinedVariable("error while evaluating conditional (%s): %s" % (original, e))
|
||||
raise AnsibleUndefinedVariable(
|
||||
"error while evaluating conditional (%s): %s" % (original, e)
|
||||
)
|
||||
|
||||
|
|
Loading…
Reference in a new issue