2 * ============LICENSE_START=======================================================
3 * Copyright (C) 2018 Ericsson. All rights reserved.
4 * Copyright (C) 2019 Nordix Foundation.
5 * Modifications Copyright (C) 2020-2021 AT&T Intellectual Property. All rights reserved.
6 * Modifications Copyright (C) 2021 Bell Canada. All rights reserved.
7 * ================================================================================
8 * Licensed under the Apache License, Version 2.0 (the "License");
9 * you may not use this file except in compliance with the License.
10 * You may obtain a copy of the License at
12 * http://www.apache.org/licenses/LICENSE-2.0
14 * Unless required by applicable law or agreed to in writing, software
15 * distributed under the License is distributed on an "AS IS" BASIS,
16 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17 * See the License for the specific language governing permissions and
18 * limitations under the License.
20 * SPDX-License-Identifier: Apache-2.0
21 * ============LICENSE_END=========================================================
24 package org.onap.policy.distribution.reception.decoding.policy.file;
26 import java.io.IOException;
27 import java.nio.file.Path;
28 import java.util.ArrayList;
29 import java.util.Collection;
30 import java.util.Enumeration;
31 import java.util.zip.ZipEntry;
32 import java.util.zip.ZipFile;
33 import org.onap.policy.common.parameters.ParameterService;
34 import org.onap.policy.common.utils.coder.CoderException;
35 import org.onap.policy.common.utils.coder.StandardCoder;
36 import org.onap.policy.common.utils.coder.StandardYamlCoder;
37 import org.onap.policy.distribution.model.Csar;
38 import org.onap.policy.distribution.model.PolicyInput;
39 import org.onap.policy.distribution.reception.decoding.PolicyDecoder;
40 import org.onap.policy.distribution.reception.decoding.PolicyDecodingException;
41 import org.onap.policy.models.tosca.authorative.concepts.ToscaEntity;
42 import org.onap.policy.models.tosca.authorative.concepts.ToscaServiceTemplate;
45 * This class extracts policy files from a CSAR file.
47 * @author Ram Krishna Verma (ram.krishna.verma@ericsson.com)
49 public class PolicyDecoderFileInCsarToPolicy implements PolicyDecoder<Csar, ToscaEntity> {
51 private PolicyDecoderFileInCsarToPolicyParameterGroup decoderParameters;
52 private StandardCoder coder;
53 private StandardYamlCoder yamlCoder;
54 private static final long MAX_FILE_SIZE = 512L * 1024;
60 public void configure(final String parameterGroupName) {
61 decoderParameters = ParameterService.get(parameterGroupName);
62 coder = new StandardCoder();
63 yamlCoder = new StandardYamlCoder();
70 public boolean canHandle(final PolicyInput policyInput) {
71 return policyInput.getClass().isAssignableFrom(Csar.class);
78 public Collection<ToscaEntity> decode(final Csar csar) throws PolicyDecodingException {
79 final Collection<ToscaEntity> policyList = new ArrayList<>();
81 try (var zipFile = new ZipFile(csar.getCsarFilePath())) {
82 final Enumeration<? extends ZipEntry> entries = zipFile.entries();
83 while (entries.hasMoreElements()) {
85 // Sonar will flag this as a Security Hotspot
86 // "Expanding archive files is security-sensitive"
87 // isZipEntryValid ensures the file being read exists in the archive
89 final ZipEntry entry = entries.nextElement(); // NOSONAR
90 if (isZipEntryValid(entry.getName(), csar.getCsarFilePath(), entry.getSize())) {
91 final ToscaServiceTemplate policy =
92 decodeFile(zipFile, entry);
93 policyList.add(policy);
96 } catch (final IOException | CoderException exp) {
97 throw new PolicyDecodingException("Failed decoding the policy", exp);
104 * Method to filter out Policy type and Policy files. In addition,
105 * ensures validation of entries in the Zipfile. Attempts to solve path
106 * injection java security issues.
108 * @param entryName name of the ZipEntry to check
109 * @param csarPath Absolute path to the csar the ZipEntry is in
110 * @param entrySize size of the ZipEntry
111 * @return true if no injection detected, and it is a policy type or policy file.
112 * @throws PolicyDecodingException if the file size is too large
114 private boolean isZipEntryValid(String entryName, String csarPath, long entrySize) throws PolicyDecodingException {
116 // We only care about policy types and policies
118 if (entryName.contains(decoderParameters.getPolicyTypeFileName())
119 || entryName.contains(decoderParameters.getPolicyFileName())) {
123 if (entrySize > MAX_FILE_SIZE) {
124 throw new PolicyDecodingException("Zip entry for " + entryName + " is too large " + entrySize);
127 // Now ensure that there is no path injection
129 var path = Path.of(csarPath, entryName).normalize();
131 // Throw an exception if path is outside the csar
133 if (! path.startsWith(csarPath)) {
134 throw new PolicyDecodingException("Potential path injection for zip entry " + entryName);
143 * Method to decode either a json or yaml file into an object.
145 * @param zipFile the zip file
146 * @param entry the entry to read in the zip file.
147 * @return the decoded ToscaServiceTemplate object.
148 * @throws CoderException IOException if the file decoding fails.
150 private ToscaServiceTemplate decodeFile(ZipFile zipFile, final ZipEntry entry) throws IOException, CoderException {
151 ToscaServiceTemplate policy = null;
152 if (entry.getName().endsWith(".json")) {
153 policy = coder.decode(zipFile.getInputStream(entry), ToscaServiceTemplate.class);
154 } else if (entry.getName().endsWith(".yaml")) {
155 policy = yamlCoder.decode(zipFile.getInputStream(entry), ToscaServiceTemplate.class);