mirror of
https://github.com/HifiExperiments/overte.git
synced 2025-04-05 21:12:42 +02:00
whitelist -> allowlist
This commit is contained in:
parent
2876a4d4ea
commit
f2d8fa2fe4
28 changed files with 199 additions and 199 deletions
|
@ -148,22 +148,22 @@ endif()
|
||||||
|
|
||||||
# OVERTE_WARNINGS
|
# OVERTE_WARNINGS
|
||||||
#
|
#
|
||||||
# Here we add the ability to whitelist warnings we've determined we can't fix, or are safe to
|
# Here we add the ability to allowlist warnings we've determined we can't fix, or are safe to
|
||||||
# ignore for one reason or another. The way of doing so is compiler-specific, so we deal with
|
# ignore for one reason or another. The way of doing so is compiler-specific, so we deal with
|
||||||
# the detection of that in cmake, and just pass it down to the code from here.
|
# the detection of that in cmake, and just pass it down to the code from here.
|
||||||
#
|
#
|
||||||
# We can also treat warnings as errors. Without the whitelist this will almost certainly lead
|
# We can also treat warnings as errors. Without the allowlist this will almost certainly lead
|
||||||
# to a build failure.
|
# to a build failure.
|
||||||
|
|
||||||
if(NOT DEFINED OVERTE_WARNINGS_WHITELIST)
|
if(NOT DEFINED OVERTE_WARNINGS_ALLOWLIST)
|
||||||
set(OVERTE_WARNINGS_WHITELIST true CACHE BOOL "Whitelist some warnings we can't currently fix")
|
set(OVERTE_WARNINGS_ALLOWLIST true CACHE BOOL "Allowlist some warnings we can't currently fix")
|
||||||
endif()
|
endif()
|
||||||
|
|
||||||
if(NOT DEFINED OVERTE_WARNINGS_AS_ERRORS)
|
if(NOT DEFINED OVERTE_WARNINGS_AS_ERRORS)
|
||||||
set(OVERTE_WARNINGS_AS_ERRORS false CACHE BOOL "Count warnings as errors")
|
set(OVERTE_WARNINGS_AS_ERRORS false CACHE BOOL "Count warnings as errors")
|
||||||
endif()
|
endif()
|
||||||
|
|
||||||
if(OVERTE_WARNINGS_WHITELIST)
|
if(OVERTE_WARNINGS_ALLOWLIST)
|
||||||
if (NOT WIN32)
|
if (NOT WIN32)
|
||||||
set(CMAKE_PLATFORM_INFO_DIR "${CMAKE_CURRENT_BINARY_DIR}")
|
set(CMAKE_PLATFORM_INFO_DIR "${CMAKE_CURRENT_BINARY_DIR}")
|
||||||
include(CMakeDetermineCXXCompiler)
|
include(CMakeDetermineCXXCompiler)
|
||||||
|
@ -171,15 +171,15 @@ if(OVERTE_WARNINGS_WHITELIST)
|
||||||
|
|
||||||
if (CMAKE_CXX_COMPILER_ID MATCHES "GNU")
|
if (CMAKE_CXX_COMPILER_ID MATCHES "GNU")
|
||||||
message("GCC compiler detected, suppressing some unsolvable warnings.")
|
message("GCC compiler detected, suppressing some unsolvable warnings.")
|
||||||
add_compile_definitions(OVERTE_WARNINGS_WHITELIST_GCC)
|
add_compile_definitions(OVERTE_WARNINGS_ALLOWLIST_GCC)
|
||||||
elseif(CMAKE_CXX_COMPILER_ID MATCHES "Clang")
|
elseif(CMAKE_CXX_COMPILER_ID MATCHES "Clang")
|
||||||
message("Clang compiler detected, suppressing some unsolvable warnings.")
|
message("Clang compiler detected, suppressing some unsolvable warnings.")
|
||||||
add_compile_definitions(OVERTE_WARNINGS_WHITELIST_CLANG)
|
add_compile_definitions(OVERTE_WARNINGS_ALLOWLIST_CLANG)
|
||||||
elseif(CMAKE_CXX_COMPILER_ID MATCHES "MSVC" OR (CMAKE_CXX_COMPILER_ID MATCHES "" AND WIN32))
|
elseif(CMAKE_CXX_COMPILER_ID MATCHES "MSVC" OR (CMAKE_CXX_COMPILER_ID MATCHES "" AND WIN32))
|
||||||
message("Microsoft Visual Studio compiler detected, suppressing some unsolvable warnings.")
|
message("Microsoft Visual Studio compiler detected, suppressing some unsolvable warnings.")
|
||||||
add_compile_definitions(OVERTE_WARNINGS_WHITELIST_MSVC)
|
add_compile_definitions(OVERTE_WARNINGS_ALLOWLIST_MSVC)
|
||||||
else()
|
else()
|
||||||
message("We don't know yet how to whitelist warnings for ${CMAKE_CXX_COMPILER_ID}")
|
message("We don't know yet how to allowlist warnings for ${CMAKE_CXX_COMPILER_ID}")
|
||||||
endif()
|
endif()
|
||||||
endif()
|
endif()
|
||||||
|
|
||||||
|
|
|
@ -1058,23 +1058,23 @@ void AvatarMixer::parseDomainServerSettings(const QJsonObject& domainSettings) {
|
||||||
qCDebug(avatars) << "This domain requires a minimum avatar height of" << _domainMinimumHeight
|
qCDebug(avatars) << "This domain requires a minimum avatar height of" << _domainMinimumHeight
|
||||||
<< "and a maximum avatar height of" << _domainMaximumHeight;
|
<< "and a maximum avatar height of" << _domainMaximumHeight;
|
||||||
|
|
||||||
static const QString AVATAR_WHITELIST_OPTION = "avatar_whitelist";
|
static const QString AVATAR_ALLOWLIST_OPTION = "avatar_allowlist";
|
||||||
_workerSharedData.skeletonURLWhitelist = avatarMixerGroupObject[AVATAR_WHITELIST_OPTION]
|
_workerSharedData.skeletonURLAllowlist = avatarMixerGroupObject[AVATAR_ALLOWLIST_OPTION]
|
||||||
.toString().split(',', Qt::KeepEmptyParts);
|
.toString().split(',', Qt::KeepEmptyParts);
|
||||||
|
|
||||||
static const QString REPLACEMENT_AVATAR_OPTION = "replacement_avatar";
|
static const QString REPLACEMENT_AVATAR_OPTION = "replacement_avatar";
|
||||||
_workerSharedData.skeletonReplacementURL = avatarMixerGroupObject[REPLACEMENT_AVATAR_OPTION]
|
_workerSharedData.skeletonReplacementURL = avatarMixerGroupObject[REPLACEMENT_AVATAR_OPTION]
|
||||||
.toString();
|
.toString();
|
||||||
|
|
||||||
if (_workerSharedData.skeletonURLWhitelist.count() == 1 && _workerSharedData.skeletonURLWhitelist[0].isEmpty()) {
|
if (_workerSharedData.skeletonURLAllowlist.count() == 1 && _workerSharedData.skeletonURLAllowlist[0].isEmpty()) {
|
||||||
// KeepEmptyParts above will parse "," as ["", ""] (which is ok), but "" as [""] (which is not ok).
|
// KeepEmptyParts above will parse "," as ["", ""] (which is ok), but "" as [""] (which is not ok).
|
||||||
_workerSharedData.skeletonURLWhitelist.clear();
|
_workerSharedData.skeletonURLAllowlist.clear();
|
||||||
}
|
}
|
||||||
|
|
||||||
if (_workerSharedData.skeletonURLWhitelist.isEmpty()) {
|
if (_workerSharedData.skeletonURLAllowlist.isEmpty()) {
|
||||||
qCDebug(avatars) << "All avatars are allowed.";
|
qCDebug(avatars) << "All avatars are allowed.";
|
||||||
} else {
|
} else {
|
||||||
qCDebug(avatars) << "Avatars other than" << _workerSharedData.skeletonURLWhitelist << "will be replaced by" << (_workerSharedData.skeletonReplacementURL.isEmpty() ? "default" : _workerSharedData.skeletonReplacementURL.toString());
|
qCDebug(avatars) << "Avatars other than" << _workerSharedData.skeletonURLAllowlist << "will be replaced by" << (_workerSharedData.skeletonReplacementURL.isEmpty() ? "default" : _workerSharedData.skeletonReplacementURL.toString());
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -221,8 +221,8 @@ void AvatarMixerClientData::processSetTraitsMessage(ReceivedMessage& message,
|
||||||
_avatar->processTrait(traitType, message.read(traitSize));
|
_avatar->processTrait(traitType, message.read(traitSize));
|
||||||
_lastReceivedTraitVersions[traitType] = packetTraitVersion;
|
_lastReceivedTraitVersions[traitType] = packetTraitVersion;
|
||||||
if (traitType == AvatarTraits::SkeletonModelURL) {
|
if (traitType == AvatarTraits::SkeletonModelURL) {
|
||||||
// special handling for skeleton model URL, since we need to make sure it is in the whitelist
|
// special handling for skeleton model URL, since we need to make sure it is in the allowlist
|
||||||
checkSkeletonURLAgainstWhitelist(workerSharedData, sendingNode, packetTraitVersion);
|
checkSkeletonURLAgainstAllowlist(workerSharedData, sendingNode, packetTraitVersion);
|
||||||
}
|
}
|
||||||
|
|
||||||
anyTraitsChanged = true;
|
anyTraitsChanged = true;
|
||||||
|
@ -366,30 +366,30 @@ void AvatarMixerClientData::processBulkAvatarTraitsAckMessage(ReceivedMessage& m
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
void AvatarMixerClientData::checkSkeletonURLAgainstWhitelist(const WorkerSharedData& workerSharedData,
|
void AvatarMixerClientData::checkSkeletonURLAgainstAllowlist(const WorkerSharedData& workerSharedData,
|
||||||
Node& sendingNode,
|
Node& sendingNode,
|
||||||
AvatarTraits::TraitVersion traitVersion) {
|
AvatarTraits::TraitVersion traitVersion) {
|
||||||
const auto& whitelist = workerSharedData.skeletonURLWhitelist;
|
const auto& allowlist = workerSharedData.skeletonURLAllowlist;
|
||||||
|
|
||||||
if (!whitelist.isEmpty()) {
|
if (!allowlist.isEmpty()) {
|
||||||
bool inWhitelist = false;
|
bool inAllowlist = false;
|
||||||
auto avatarURL = _avatar->getSkeletonModelURL();
|
auto avatarURL = _avatar->getSkeletonModelURL();
|
||||||
|
|
||||||
// The avatar is in the whitelist if:
|
// The avatar is in the allowlist if:
|
||||||
// 1. The avatar's URL's host matches one of the hosts of the URLs in the whitelist AND
|
// 1. The avatar's URL's host matches one of the hosts of the URLs in the allowlist AND
|
||||||
// 2. The avatar's URL's path starts with the path of that same URL in the whitelist
|
// 2. The avatar's URL's path starts with the path of that same URL in the allowlist
|
||||||
for (const auto& whiteListedPrefix : whitelist) {
|
for (const auto& allowListedPrefix : allowlist) {
|
||||||
auto whiteListURL = QUrl::fromUserInput(whiteListedPrefix);
|
auto allowListURL = QUrl::fromUserInput(allowListedPrefix);
|
||||||
// check if this script URL matches the whitelist domain and, optionally, is beneath the path
|
// check if this script URL matches the allowlist domain and, optionally, is beneath the path
|
||||||
if (avatarURL.host().compare(whiteListURL.host(), Qt::CaseInsensitive) == 0 &&
|
if (avatarURL.host().compare(allowListURL.host(), Qt::CaseInsensitive) == 0 &&
|
||||||
avatarURL.path().startsWith(whiteListURL.path(), Qt::CaseInsensitive)) {
|
avatarURL.path().startsWith(allowListURL.path(), Qt::CaseInsensitive)) {
|
||||||
inWhitelist = true;
|
inAllowlist = true;
|
||||||
|
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!inWhitelist) {
|
if (!inAllowlist) {
|
||||||
// make sure we're not unecessarily overriding the default avatar with the default avatar
|
// make sure we're not unecessarily overriding the default avatar with the default avatar
|
||||||
if (_avatar->getWireSafeSkeletonModelURL() != workerSharedData.skeletonReplacementURL) {
|
if (_avatar->getWireSafeSkeletonModelURL() != workerSharedData.skeletonReplacementURL) {
|
||||||
// we need to change this avatar's skeleton URL, and send them a traits packet informing them of the change
|
// we need to change this avatar's skeleton URL, and send them a traits packet informing them of the change
|
||||||
|
|
|
@ -135,7 +135,7 @@ public:
|
||||||
void processSetTraitsMessage(ReceivedMessage& message, const WorkerSharedData& workerSharedData, Node& sendingNode);
|
void processSetTraitsMessage(ReceivedMessage& message, const WorkerSharedData& workerSharedData, Node& sendingNode);
|
||||||
void emulateDeleteEntitiesTraitsMessage(const QList<QUuid>& avatarEntityIDs);
|
void emulateDeleteEntitiesTraitsMessage(const QList<QUuid>& avatarEntityIDs);
|
||||||
void processBulkAvatarTraitsAckMessage(ReceivedMessage& message);
|
void processBulkAvatarTraitsAckMessage(ReceivedMessage& message);
|
||||||
void checkSkeletonURLAgainstWhitelist(const WorkerSharedData& workerSharedData, Node& sendingNode,
|
void checkSkeletonURLAgainstAllowlist(const WorkerSharedData& workerSharedData, Node& sendingNode,
|
||||||
AvatarTraits::TraitVersion traitVersion);
|
AvatarTraits::TraitVersion traitVersion);
|
||||||
|
|
||||||
using TraitsCheckTimestamp = std::chrono::steady_clock::time_point;
|
using TraitsCheckTimestamp = std::chrono::steady_clock::time_point;
|
||||||
|
|
|
@ -97,7 +97,7 @@ class EntityTree;
|
||||||
using EntityTreePointer = std::shared_ptr<EntityTree>;
|
using EntityTreePointer = std::shared_ptr<EntityTree>;
|
||||||
|
|
||||||
struct WorkerSharedData {
|
struct WorkerSharedData {
|
||||||
QStringList skeletonURLWhitelist;
|
QStringList skeletonURLAllowlist;
|
||||||
QUrl skeletonReplacementURL;
|
QUrl skeletonReplacementURL;
|
||||||
EntityTreePointer entityTree;
|
EntityTreePointer entityTree;
|
||||||
};
|
};
|
||||||
|
|
|
@ -320,11 +320,11 @@ void EntityServer::readAdditionalConfiguration(const QJsonObject& settingsSectio
|
||||||
tree->setWantEditLogging(wantEditLogging);
|
tree->setWantEditLogging(wantEditLogging);
|
||||||
tree->setWantTerseEditLogging(wantTerseEditLogging);
|
tree->setWantTerseEditLogging(wantTerseEditLogging);
|
||||||
|
|
||||||
QString entityScriptSourceWhitelist;
|
QString entityScriptSourceAllowlist;
|
||||||
if (readOptionString("entityScriptSourceWhitelist", settingsSectionObject, entityScriptSourceWhitelist)) {
|
if (readOptionString("entityScriptSourceAllowlist", settingsSectionObject, entityScriptSourceAllowlist)) {
|
||||||
tree->setEntityScriptSourceWhitelist(entityScriptSourceWhitelist);
|
tree->setEntityScriptSourceAllowlist(entityScriptSourceAllowlist);
|
||||||
} else {
|
} else {
|
||||||
tree->setEntityScriptSourceWhitelist("");
|
tree->setEntityScriptSourceAllowlist("");
|
||||||
}
|
}
|
||||||
|
|
||||||
auto entityEditFilters = DependencyManager::get<EntityEditFilters>();
|
auto entityEditFilters = DependencyManager::get<EntityEditFilters>();
|
||||||
|
|
|
@ -26,7 +26,7 @@ macro(SET_PACKAGING_PARAMETERS)
|
||||||
set_from_env(STABLE_BUILD STABLE_BUILD 0)
|
set_from_env(STABLE_BUILD STABLE_BUILD 0)
|
||||||
|
|
||||||
set_from_env(PRELOADED_STARTUP_LOCATION PRELOADED_STARTUP_LOCATION "")
|
set_from_env(PRELOADED_STARTUP_LOCATION PRELOADED_STARTUP_LOCATION "")
|
||||||
set_from_env(PRELOADED_SCRIPT_WHITELIST PRELOADED_SCRIPT_WHITELIST "")
|
set_from_env(PRELOADED_SCRIPT_ALLOWLIST PRELOADED_SCRIPT_ALLOWLIST "")
|
||||||
|
|
||||||
set_from_env(BYPASS_SIGNING BYPASS_SIGNING 0)
|
set_from_env(BYPASS_SIGNING BYPASS_SIGNING 0)
|
||||||
|
|
||||||
|
|
|
@ -29,7 +29,7 @@ namespace BuildInfo {
|
||||||
const QString BUILD_GLOBAL_SERVICES = "@BUILD_GLOBAL_SERVICES@";
|
const QString BUILD_GLOBAL_SERVICES = "@BUILD_GLOBAL_SERVICES@";
|
||||||
const QString BUILD_TIME = "@BUILD_TIME@";
|
const QString BUILD_TIME = "@BUILD_TIME@";
|
||||||
const QString PRELOADED_STARTUP_LOCATION = "@PRELOADED_STARTUP_LOCATION@";
|
const QString PRELOADED_STARTUP_LOCATION = "@PRELOADED_STARTUP_LOCATION@";
|
||||||
const QString PRELOADED_SCRIPT_WHITELIST = "@PRELOADED_SCRIPT_WHITELIST@";
|
const QString PRELOADED_SCRIPT_ALLOWLIST = "@PRELOADED_SCRIPT_ALLOWLIST@";
|
||||||
|
|
||||||
enum BuildType {
|
enum BuildType {
|
||||||
Dev,
|
Dev,
|
||||||
|
|
|
@ -341,17 +341,17 @@ DomainServer::DomainServer(int argc, char* argv[]) :
|
||||||
connect(&_settingsManager, &DomainServerSettingsManager::updateNodePermissions, [this] { _metadata->securityChanged(true); });
|
connect(&_settingsManager, &DomainServerSettingsManager::updateNodePermissions, [this] { _metadata->securityChanged(true); });
|
||||||
|
|
||||||
qDebug() << "domain-server is running";
|
qDebug() << "domain-server is running";
|
||||||
static const QString AC_SUBNET_WHITELIST_SETTING_PATH = "security.ac_subnet_whitelist";
|
static const QString AC_SUBNET_ALLOWLIST_SETTING_PATH = "security.ac_subnet_allowlist";
|
||||||
|
|
||||||
static const Subnet LOCALHOST { QHostAddress("127.0.0.1"), 32 };
|
static const Subnet LOCALHOST { QHostAddress("127.0.0.1"), 32 };
|
||||||
_acSubnetWhitelist = { LOCALHOST };
|
_acSubnetAllowlist = { LOCALHOST };
|
||||||
|
|
||||||
auto whitelist = _settingsManager.valueOrDefaultValueForKeyPath(AC_SUBNET_WHITELIST_SETTING_PATH).toStringList();
|
auto allowlist = _settingsManager.valueOrDefaultValueForKeyPath(AC_SUBNET_ALLOWLIST_SETTING_PATH).toStringList();
|
||||||
for (auto& subnet : whitelist) {
|
for (auto& subnet : allowlist) {
|
||||||
auto netmaskParts = subnet.trimmed().split("/");
|
auto netmaskParts = subnet.trimmed().split("/");
|
||||||
|
|
||||||
if (netmaskParts.size() > 2) {
|
if (netmaskParts.size() > 2) {
|
||||||
qDebug() << "Ignoring subnet in whitelist, malformed: " << subnet;
|
qDebug() << "Ignoring subnet in allowlist, malformed: " << subnet;
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -363,7 +363,7 @@ DomainServer::DomainServer(int argc, char* argv[]) :
|
||||||
bool ok;
|
bool ok;
|
||||||
netmask = netmaskParts[1].toInt(&ok);
|
netmask = netmaskParts[1].toInt(&ok);
|
||||||
if (!ok) {
|
if (!ok) {
|
||||||
qDebug() << "Ignoring subnet in whitelist, bad netmask: " << subnet;
|
qDebug() << "Ignoring subnet in allowlist, bad netmask: " << subnet;
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -371,10 +371,10 @@ DomainServer::DomainServer(int argc, char* argv[]) :
|
||||||
auto ip = QHostAddress(netmaskParts[0]);
|
auto ip = QHostAddress(netmaskParts[0]);
|
||||||
|
|
||||||
if (!ip.isNull()) {
|
if (!ip.isNull()) {
|
||||||
qDebug() << "Adding AC whitelist subnet: " << subnet << " -> " << (ip.toString() + "/" + QString::number(netmask));
|
qDebug() << "Adding AC allowlist subnet: " << subnet << " -> " << (ip.toString() + "/" + QString::number(netmask));
|
||||||
_acSubnetWhitelist.push_back({ ip , netmask });
|
_acSubnetAllowlist.push_back({ ip , netmask });
|
||||||
} else {
|
} else {
|
||||||
qDebug() << "Ignoring subnet in whitelist, invalid ip portion: " << subnet;
|
qDebug() << "Ignoring subnet in allowlist, invalid ip portion: " << subnet;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1502,8 +1502,8 @@ void DomainServer::processRequestAssignmentPacket(QSharedPointer<ReceivedMessage
|
||||||
return senderAddr.isInSubnet(mask);
|
return senderAddr.isInSubnet(mask);
|
||||||
};
|
};
|
||||||
|
|
||||||
auto it = find_if(_acSubnetWhitelist.begin(), _acSubnetWhitelist.end(), isHostAddressInSubnet);
|
auto it = find_if(_acSubnetAllowlist.begin(), _acSubnetAllowlist.end(), isHostAddressInSubnet);
|
||||||
if (it == _acSubnetWhitelist.end()) {
|
if (it == _acSubnetAllowlist.end()) {
|
||||||
HIFI_FDEBUG("Received an assignment connect request from a disallowed ip address:"
|
HIFI_FDEBUG("Received an assignment connect request from a disallowed ip address:"
|
||||||
<< senderAddr.toString());
|
<< senderAddr.toString());
|
||||||
return;
|
return;
|
||||||
|
|
|
@ -251,7 +251,7 @@ private:
|
||||||
|
|
||||||
QString operationToString(const QNetworkAccessManager::Operation &op);
|
QString operationToString(const QNetworkAccessManager::Operation &op);
|
||||||
|
|
||||||
SubnetList _acSubnetWhitelist;
|
SubnetList _acSubnetAllowlist;
|
||||||
|
|
||||||
std::vector<QString> _replicatedUsernames;
|
std::vector<QString> _replicatedUsernames;
|
||||||
|
|
||||||
|
|
|
@ -1743,7 +1743,7 @@ bool DomainServerSettingsManager::recurseJSONObjectAndOverwriteSettings(const QJ
|
||||||
QJsonObject postedObject(postedSettingsObject);
|
QJsonObject postedObject(postedSettingsObject);
|
||||||
|
|
||||||
static const QString SECURITY_ROOT_KEY = "security";
|
static const QString SECURITY_ROOT_KEY = "security";
|
||||||
static const QString AC_SUBNET_WHITELIST_KEY = "ac_subnet_whitelist";
|
static const QString AC_SUBNET_ALLOWLIST_KEY = "ac_subnet_allowlist";
|
||||||
static const QString BROADCASTING_KEY = "broadcasting";
|
static const QString BROADCASTING_KEY = "broadcasting";
|
||||||
static const QString WIZARD_KEY = "wizard";
|
static const QString WIZARD_KEY = "wizard";
|
||||||
static const QString DESCRIPTION_ROOT_KEY = "descriptors";
|
static const QString DESCRIPTION_ROOT_KEY = "descriptors";
|
||||||
|
@ -1863,7 +1863,7 @@ bool DomainServerSettingsManager::recurseJSONObjectAndOverwriteSettings(const QJ
|
||||||
|
|
||||||
if ((rootKey != SECURITY_ROOT_KEY && rootKey != BROADCASTING_KEY &&
|
if ((rootKey != SECURITY_ROOT_KEY && rootKey != BROADCASTING_KEY &&
|
||||||
rootKey != DESCRIPTION_ROOT_KEY && rootKey != WIZARD_KEY) ||
|
rootKey != DESCRIPTION_ROOT_KEY && rootKey != WIZARD_KEY) ||
|
||||||
settingKey == AC_SUBNET_WHITELIST_KEY) {
|
settingKey == AC_SUBNET_ALLOWLIST_KEY) {
|
||||||
needRestart = true;
|
needRestart = true;
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
//
|
//
|
||||||
// EntityScriptQMLWhitelist.qml
|
// EntityScriptQMLAllowlist.qml
|
||||||
// interface/resources/qml/hifi/dialogs/security
|
// interface/resources/qml/hifi/dialogs/security
|
||||||
//
|
//
|
||||||
// Created by Kalila L. on 2019.12.05 | realities.dev | somnilibertas@gmail.com
|
// Created by Kalila L. on 2019.12.05 | realities.dev | somnilibertas@gmail.com
|
||||||
|
@ -8,7 +8,7 @@
|
||||||
// Distributed under the Apache License, Version 2.0.
|
// Distributed under the Apache License, Version 2.0.
|
||||||
// See the accompanying file LICENSE or http://www.apache.org/licenses/LICENSE-2.0.html
|
// See the accompanying file LICENSE or http://www.apache.org/licenses/LICENSE-2.0.html
|
||||||
//
|
//
|
||||||
// Security Settings for the Entity Script QML Whitelist
|
// Security Settings for the Entity Script QML Allowlist
|
||||||
|
|
||||||
import Hifi 1.0 as Hifi
|
import Hifi 1.0 as Hifi
|
||||||
import QtQuick 2.8
|
import QtQuick 2.8
|
||||||
|
@ -23,25 +23,25 @@ import "../../../windows"
|
||||||
Rectangle {
|
Rectangle {
|
||||||
id: parentBody;
|
id: parentBody;
|
||||||
|
|
||||||
function getWhitelistAsText() {
|
function getAllowlistAsText() {
|
||||||
var whitelist = Settings.getValue("private/settingsSafeURLS");
|
var allowlist = Settings.getValue("private/settingsSafeURLS");
|
||||||
var arrayWhitelist = whitelist.split(",").join("\n");
|
var arrayAllowlist = allowlist.split(",").join("\n");
|
||||||
return arrayWhitelist;
|
return arrayAllowlist;
|
||||||
}
|
}
|
||||||
|
|
||||||
function setWhitelistAsText(whitelistText) {
|
function setAllowlistAsText(allowlistText) {
|
||||||
Settings.setValue("private/settingsSafeURLS", whitelistText.text);
|
Settings.setValue("private/settingsSafeURLS", allowlistText.text);
|
||||||
|
|
||||||
var originalSetString = whitelistText.text;
|
var originalSetString = allowlistText.text;
|
||||||
var originalSet = originalSetString.split(' ').join('');
|
var originalSet = originalSetString.split(' ').join('');
|
||||||
|
|
||||||
var check = Settings.getValue("private/settingsSafeURLS");
|
var check = Settings.getValue("private/settingsSafeURLS");
|
||||||
var arrayCheck = check.split(",").join("\n");
|
var arrayCheck = check.split(",").join("\n");
|
||||||
|
|
||||||
setWhitelistSuccess(arrayCheck === originalSet);
|
setAllowlistSuccess(arrayCheck === originalSet);
|
||||||
}
|
}
|
||||||
|
|
||||||
function setWhitelistSuccess(success) {
|
function setAllowlistSuccess(success) {
|
||||||
if (success) {
|
if (success) {
|
||||||
notificationText.text = "Successfully saved settings.";
|
notificationText.text = "Successfully saved settings.";
|
||||||
} else {
|
} else {
|
||||||
|
@ -49,20 +49,20 @@ Rectangle {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
function toggleWhitelist(enabled) {
|
function toggleAllowlist(enabled) {
|
||||||
Settings.setValue("private/whitelistEnabled", enabled);
|
Settings.setValue("private/allowlistEnabled", enabled);
|
||||||
console.info("Toggling Whitelist to:", enabled);
|
console.info("Toggling Allowlist to:", enabled);
|
||||||
}
|
}
|
||||||
|
|
||||||
function initCheckbox() {
|
function initCheckbox() {
|
||||||
var check = Settings.getValue("private/whitelistEnabled", false);
|
var check = Settings.getValue("private/allowlistEnabled", false);
|
||||||
|
|
||||||
if (check) {
|
if (check) {
|
||||||
whitelistEnabled.toggle();
|
allowlistEnabled.toggle();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
anchors.fill: parent
|
anchors.fill: parent
|
||||||
width: parent.width;
|
width: parent.width;
|
||||||
height: 120;
|
height: 120;
|
||||||
|
@ -70,7 +70,7 @@ Rectangle {
|
||||||
|
|
||||||
HifiStylesUit.RalewayRegular {
|
HifiStylesUit.RalewayRegular {
|
||||||
id: titleText;
|
id: titleText;
|
||||||
text: "Entity Script / QML Whitelist"
|
text: "Entity Script / QML Allowlist"
|
||||||
// Text size
|
// Text size
|
||||||
size: 24;
|
size: 24;
|
||||||
// Style
|
// Style
|
||||||
|
@ -89,13 +89,13 @@ Rectangle {
|
||||||
initCheckbox();
|
initCheckbox();
|
||||||
}
|
}
|
||||||
|
|
||||||
id: whitelistEnabled;
|
id: allowlistEnabled;
|
||||||
|
|
||||||
anchors.right: parent.right;
|
anchors.right: parent.right;
|
||||||
anchors.top: parent.top;
|
anchors.top: parent.top;
|
||||||
anchors.topMargin: 10;
|
anchors.topMargin: 10;
|
||||||
onToggled: {
|
onToggled: {
|
||||||
toggleWhitelist(whitelistEnabled.checked)
|
toggleAllowlist(allowlistEnabled.checked)
|
||||||
}
|
}
|
||||||
|
|
||||||
Label {
|
Label {
|
||||||
|
@ -115,7 +115,7 @@ Rectangle {
|
||||||
width: parent.width;
|
width: parent.width;
|
||||||
height: 250;
|
height: 250;
|
||||||
anchors.top: titleText.bottom;
|
anchors.top: titleText.bottom;
|
||||||
|
|
||||||
ScrollView {
|
ScrollView {
|
||||||
id: textAreaScrollView
|
id: textAreaScrollView
|
||||||
anchors.fill: parent;
|
anchors.fill: parent;
|
||||||
|
@ -126,8 +126,8 @@ Rectangle {
|
||||||
clip: false;
|
clip: false;
|
||||||
|
|
||||||
TextArea {
|
TextArea {
|
||||||
id: whitelistTextArea
|
id: allowlistTextArea
|
||||||
text: getWhitelistAsText();
|
text: getAllowlistAsText();
|
||||||
onTextChanged: notificationText.text = "";
|
onTextChanged: notificationText.text = "";
|
||||||
width: parent.width;
|
width: parent.width;
|
||||||
height: parent.height;
|
height: parent.height;
|
||||||
|
@ -136,7 +136,7 @@ Rectangle {
|
||||||
color: "white";
|
color: "white";
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
Button {
|
Button {
|
||||||
id: saveChanges
|
id: saveChanges
|
||||||
anchors.topMargin: 5;
|
anchors.topMargin: 5;
|
||||||
|
@ -155,8 +155,8 @@ Rectangle {
|
||||||
elide: Text.ElideRight
|
elide: Text.ElideRight
|
||||||
}
|
}
|
||||||
text: "Save Changes"
|
text: "Save Changes"
|
||||||
onClicked: setWhitelistAsText(whitelistTextArea)
|
onClicked: setAllowlistAsText(allowlistTextArea)
|
||||||
|
|
||||||
HifiStylesUit.RalewayRegular {
|
HifiStylesUit.RalewayRegular {
|
||||||
id: notificationText;
|
id: notificationText;
|
||||||
text: ""
|
text: ""
|
||||||
|
@ -170,15 +170,15 @@ Rectangle {
|
||||||
anchors.rightMargin: 10;
|
anchors.rightMargin: 10;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
HifiStylesUit.RalewayRegular {
|
HifiStylesUit.RalewayRegular {
|
||||||
id: descriptionText;
|
id: descriptionText;
|
||||||
text:
|
text:
|
||||||
"The whitelist checks scripts and QML as they are loaded.<br/>
|
"The allowlist checks scripts and QML as they are loaded.<br/>
|
||||||
Therefore, if a script is cached or has no reason to load again,<br/>
|
Therefore, if a script is cached or has no reason to load again,<br/>
|
||||||
removing it from the whitelist will have no effect until<br/>
|
removing it from the allowlist will have no effect until<br/>
|
||||||
it is reloaded.<br/>
|
it is reloaded.<br/>
|
||||||
Separate your whitelisted domains by line, not commas. e.g.
|
Separate your allowlisted domains by line, not commas. e.g.
|
||||||
<blockquote>
|
<blockquote>
|
||||||
<b>https://google.com/</b><br/>
|
<b>https://google.com/</b><br/>
|
||||||
<b>hifi://the-spot/</b><br/>
|
<b>hifi://the-spot/</b><br/>
|
||||||
|
@ -186,7 +186,7 @@ Rectangle {
|
||||||
<b>https://mydomain.here/</b>
|
<b>https://mydomain.here/</b>
|
||||||
</blockquote>
|
</blockquote>
|
||||||
Ensure there are no spaces or whitespace.<br/><br/>
|
Ensure there are no spaces or whitespace.<br/><br/>
|
||||||
For QML files, you can only whitelist each file individually<br/>
|
For QML files, you can only allowlist each file individually<br/>
|
||||||
ending with '.qml'."
|
ending with '.qml'."
|
||||||
// Text size
|
// Text size
|
||||||
size: 16;
|
size: 16;
|
|
@ -5,7 +5,7 @@
|
||||||
// Created by dr Karol Suprynowicz on 2024/03/24.
|
// Created by dr Karol Suprynowicz on 2024/03/24.
|
||||||
// Copyright 2024 Overte e.V.
|
// Copyright 2024 Overte e.V.
|
||||||
//
|
//
|
||||||
// Based on EntityScriptQMLWhitelist.qml
|
// Based on EntityScriptQMLAllowlist.qml
|
||||||
// Created by Kalila L. on 2019.12.05 | realities.dev | somnilibertas@gmail.com
|
// Created by Kalila L. on 2019.12.05 | realities.dev | somnilibertas@gmail.com
|
||||||
// Copyright 2019 Kalila L.
|
// Copyright 2019 Kalila L.
|
||||||
//
|
//
|
||||||
|
@ -27,15 +27,15 @@ import "../../../windows"
|
||||||
Rectangle {
|
Rectangle {
|
||||||
id: parentBody;
|
id: parentBody;
|
||||||
|
|
||||||
function getWhitelistAsText() {
|
function getAllowlistAsText() {
|
||||||
var whitelist = Settings.getValue("private/scriptPermissionGetAvatarURLSafeURLs");
|
var allowlist = Settings.getValue("private/scriptPermissionGetAvatarURLSafeURLs");
|
||||||
var arrayWhitelist = whitelist.replace(",", "\n");
|
var arrayAllowlist = allowlist.replace(",", "\n");
|
||||||
return arrayWhitelist;
|
return arrayAllowlist;
|
||||||
}
|
}
|
||||||
|
|
||||||
function setWhitelistAsText(whitelistText) {
|
function setAllowlistAsText(allowlistText) {
|
||||||
Settings.setValue("private/scriptPermissionGetAvatarURLSafeURLs", whitelistText.text);
|
Settings.setValue("private/scriptPermissionGetAvatarURLSafeURLs", allowlistText.text);
|
||||||
notificationText.text = "Whitelist saved.";
|
notificationText.text = "Allowlist saved.";
|
||||||
}
|
}
|
||||||
|
|
||||||
function setAvatarProtection(enabled) {
|
function setAvatarProtection(enabled) {
|
||||||
|
@ -65,7 +65,7 @@ Rectangle {
|
||||||
height: 60;
|
height: 60;
|
||||||
|
|
||||||
CheckBox {
|
CheckBox {
|
||||||
id: whitelistEnabled;
|
id: allowlistEnabled;
|
||||||
|
|
||||||
checked: Settings.getValue("private/scriptPermissionGetAvatarURLEnable", true);
|
checked: Settings.getValue("private/scriptPermissionGetAvatarURLEnable", true);
|
||||||
|
|
||||||
|
@ -73,7 +73,7 @@ Rectangle {
|
||||||
anchors.top: parent.top;
|
anchors.top: parent.top;
|
||||||
anchors.topMargin: 10;
|
anchors.topMargin: 10;
|
||||||
onToggled: {
|
onToggled: {
|
||||||
setAvatarProtection(whitelistEnabled.checked)
|
setAvatarProtection(allowlistEnabled.checked)
|
||||||
}
|
}
|
||||||
|
|
||||||
Label {
|
Label {
|
||||||
|
@ -104,8 +104,8 @@ Rectangle {
|
||||||
clip: false;
|
clip: false;
|
||||||
|
|
||||||
TextArea {
|
TextArea {
|
||||||
id: whitelistTextArea
|
id: allowlistTextArea
|
||||||
text: getWhitelistAsText();
|
text: getAllowlistAsText();
|
||||||
onTextChanged: notificationText.text = "";
|
onTextChanged: notificationText.text = "";
|
||||||
width: parent.width;
|
width: parent.width;
|
||||||
height: parent.height;
|
height: parent.height;
|
||||||
|
@ -133,7 +133,7 @@ Rectangle {
|
||||||
elide: Text.ElideRight
|
elide: Text.ElideRight
|
||||||
}
|
}
|
||||||
text: "Save Changes"
|
text: "Save Changes"
|
||||||
onClicked: setWhitelistAsText(whitelistTextArea)
|
onClicked: setAllowlistAsText(allowlistTextArea)
|
||||||
|
|
||||||
HifiStylesUit.RalewayRegular {
|
HifiStylesUit.RalewayRegular {
|
||||||
id: notificationText;
|
id: notificationText;
|
||||||
|
|
|
@ -3293,9 +3293,9 @@ void Application::initializeUi() {
|
||||||
{
|
{
|
||||||
auto defaultUrlValidator = OffscreenQmlSurface::getUrlValidator();
|
auto defaultUrlValidator = OffscreenQmlSurface::getUrlValidator();
|
||||||
auto newValidator = [=](const QUrl& url) -> bool {
|
auto newValidator = [=](const QUrl& url) -> bool {
|
||||||
QString whitelistPrefix = "[WHITELIST ENTITY SCRIPTS]";
|
QString allowlistPrefix = "[ALLOWLIST ENTITY SCRIPTS]";
|
||||||
QList<QString> safeURLS = { "" };
|
QList<QString> safeURLS = { "" };
|
||||||
safeURLS += qEnvironmentVariable("EXTRA_WHITELIST").trimmed().split(QRegExp("\\s*,\\s*"), Qt::SkipEmptyParts);
|
safeURLS += qEnvironmentVariable("EXTRA_ALLOWLIST").trimmed().split(QRegExp("\\s*,\\s*"), Qt::SkipEmptyParts);
|
||||||
|
|
||||||
// PULL SAFEURLS FROM INTERFACE.JSON Settings
|
// PULL SAFEURLS FROM INTERFACE.JSON Settings
|
||||||
|
|
||||||
|
@ -3332,7 +3332,7 @@ void Application::initializeUi() {
|
||||||
QmlContextCallback platformInfoCallback = [](QQmlContext* context) {
|
QmlContextCallback platformInfoCallback = [](QQmlContext* context) {
|
||||||
context->setContextProperty("PlatformInfo", new PlatformInfoScriptingInterface());
|
context->setContextProperty("PlatformInfo", new PlatformInfoScriptingInterface());
|
||||||
};
|
};
|
||||||
OffscreenQmlSurface::addWhitelistContextHandler({
|
OffscreenQmlSurface::addAllowlistContextHandler({
|
||||||
QUrl{ "hifi/tablet/TabletAddressDialog.qml" },
|
QUrl{ "hifi/tablet/TabletAddressDialog.qml" },
|
||||||
QUrl{ "hifi/Card.qml" },
|
QUrl{ "hifi/Card.qml" },
|
||||||
QUrl{ "hifi/Pal.qml" },
|
QUrl{ "hifi/Pal.qml" },
|
||||||
|
@ -3342,7 +3342,7 @@ void Application::initializeUi() {
|
||||||
QmlContextCallback ttsCallback = [](QQmlContext* context) {
|
QmlContextCallback ttsCallback = [](QQmlContext* context) {
|
||||||
context->setContextProperty("TextToSpeech", DependencyManager::get<TTSScriptingInterface>().data());
|
context->setContextProperty("TextToSpeech", DependencyManager::get<TTSScriptingInterface>().data());
|
||||||
};
|
};
|
||||||
OffscreenQmlSurface::addWhitelistContextHandler({
|
OffscreenQmlSurface::addAllowlistContextHandler({
|
||||||
QUrl{ "hifi/tts/TTS.qml" }
|
QUrl{ "hifi/tts/TTS.qml" }
|
||||||
}, ttsCallback);
|
}, ttsCallback);
|
||||||
qmlRegisterType<ResourceImageItem>("Hifi", 1, 0, "ResourceImageItem");
|
qmlRegisterType<ResourceImageItem>("Hifi", 1, 0, "ResourceImageItem");
|
||||||
|
|
|
@ -310,13 +310,13 @@ Menu::Menu() {
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
|
||||||
// Settings > Entity Script / QML Whitelist
|
// Settings > Entity Script / QML Allowlist
|
||||||
action = addActionToQMenuAndActionHash(settingsMenu, "Entity Script / QML Whitelist");
|
action = addActionToQMenuAndActionHash(settingsMenu, "Entity Script / QML Allowlist");
|
||||||
connect(action, &QAction::triggered, [] {
|
connect(action, &QAction::triggered, [] {
|
||||||
auto tablet = DependencyManager::get<TabletScriptingInterface>()->getTablet("com.highfidelity.interface.tablet.system");
|
auto tablet = DependencyManager::get<TabletScriptingInterface>()->getTablet("com.highfidelity.interface.tablet.system");
|
||||||
auto hmd = DependencyManager::get<HMDScriptingInterface>();
|
auto hmd = DependencyManager::get<HMDScriptingInterface>();
|
||||||
|
|
||||||
tablet->pushOntoStack("hifi/dialogs/security/EntityScriptQMLWhitelist.qml");
|
tablet->pushOntoStack("hifi/dialogs/security/EntityScriptQMLAllowlist.qml");
|
||||||
|
|
||||||
if (!hmd->getShouldShowTablet()) {
|
if (!hmd->getShouldShowTablet()) {
|
||||||
hmd->toggleShouldShowTablet();
|
hmd->toggleShouldShowTablet();
|
||||||
|
|
|
@ -189,7 +189,7 @@ namespace MenuOption {
|
||||||
const QString RunningScripts = "Running Scripts...";
|
const QString RunningScripts = "Running Scripts...";
|
||||||
const QString RunTimingTests = "Run Timing Tests";
|
const QString RunTimingTests = "Run Timing Tests";
|
||||||
const QString ScriptedMotorControl = "Enable Scripted Motor Control";
|
const QString ScriptedMotorControl = "Enable Scripted Motor Control";
|
||||||
const QString EntityScriptQMLWhitelist = "Entity Script / QML Whitelist";
|
const QString EntityScriptQMLAllowlist = "Entity Script / QML Allowlist";
|
||||||
const QString ScriptSecurity = "Script Security";
|
const QString ScriptSecurity = "Script Security";
|
||||||
const QString ShowTrackedObjects = "Show Tracked Objects";
|
const QString ShowTrackedObjects = "Show Tracked Objects";
|
||||||
const QString SelfieCamera = "Selfie";
|
const QString SelfieCamera = "Selfie";
|
||||||
|
|
|
@ -408,9 +408,9 @@ CollisionRegion CollisionPick::getMathematicalPick() const {
|
||||||
void CollisionPick::filterIntersections(std::vector<ContactTestResult>& intersections) const {
|
void CollisionPick::filterIntersections(std::vector<ContactTestResult>& intersections) const {
|
||||||
const QVector<QUuid>& ignoreItems = getIgnoreItems();
|
const QVector<QUuid>& ignoreItems = getIgnoreItems();
|
||||||
const QVector<QUuid>& includeItems = getIncludeItems();
|
const QVector<QUuid>& includeItems = getIncludeItems();
|
||||||
bool isWhitelist = !includeItems.empty();
|
bool isAllowlist = !includeItems.empty();
|
||||||
|
|
||||||
if (!isWhitelist && ignoreItems.empty()) {
|
if (!isAllowlist && ignoreItems.empty()) {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -420,7 +420,7 @@ void CollisionPick::filterIntersections(std::vector<ContactTestResult>& intersec
|
||||||
for (int i = 0; i < n; i++) {
|
for (int i = 0; i < n; i++) {
|
||||||
auto& intersection = intersections[i];
|
auto& intersection = intersections[i];
|
||||||
const QUuid& id = intersection.foundID;
|
const QUuid& id = intersection.foundID;
|
||||||
if (!ignoreItems.contains(id) && (!isWhitelist || includeItems.contains(id))) {
|
if (!ignoreItems.contains(id) && (!isAllowlist || includeItems.contains(id))) {
|
||||||
filteredIntersections.push_back(intersection);
|
filteredIntersections.push_back(intersection);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -221,8 +221,8 @@ InteractiveWindow::InteractiveWindow(const QString& sourceUrl, const QVariantMap
|
||||||
|
|
||||||
Application::setupQmlSurface(quickView->rootContext(), true);
|
Application::setupQmlSurface(quickView->rootContext(), true);
|
||||||
|
|
||||||
//add any whitelisted callbacks
|
//add any allowlisted callbacks
|
||||||
OffscreenUi::applyWhiteList(sourceUrl, quickView->rootContext());
|
OffscreenUi::applyAllowList(sourceUrl, quickView->rootContext());
|
||||||
|
|
||||||
/*@jsdoc
|
/*@jsdoc
|
||||||
* Configures how a <code>NATIVE</code> window is displayed.
|
* Configures how a <code>NATIVE</code> window is displayed.
|
||||||
|
|
|
@ -65,8 +65,8 @@ EntityTree::~EntityTree() {
|
||||||
//eraseAllOctreeElements(false); // KEEP THIS
|
//eraseAllOctreeElements(false); // KEEP THIS
|
||||||
}
|
}
|
||||||
|
|
||||||
void EntityTree::setEntityScriptSourceWhitelist(const QString& entityScriptSourceWhitelist) {
|
void EntityTree::setEntityScriptSourceAllowlist(const QString& entityScriptSourceAllowlist) {
|
||||||
_entityScriptSourceWhitelist = entityScriptSourceWhitelist.split(',', Qt::SkipEmptyParts);
|
_entityScriptSourceAllowlist = entityScriptSourceAllowlist.split(',', Qt::SkipEmptyParts);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@ -1411,17 +1411,17 @@ void EntityTree::bumpTimestamp(EntityItemProperties& properties) { //fixme put c
|
||||||
properties.setLastEdited(properties.getLastEdited() + LAST_EDITED_SERVERSIDE_BUMP);
|
properties.setLastEdited(properties.getLastEdited() + LAST_EDITED_SERVERSIDE_BUMP);
|
||||||
}
|
}
|
||||||
|
|
||||||
bool EntityTree::isScriptInWhitelist(const QString& scriptProperty) {
|
bool EntityTree::isScriptInAllowlist(const QString& scriptProperty) {
|
||||||
|
|
||||||
// grab a URL representation of the entity script so we can check the host for this script
|
// grab a URL representation of the entity script so we can check the host for this script
|
||||||
auto entityScriptURL = QUrl::fromUserInput(scriptProperty);
|
auto entityScriptURL = QUrl::fromUserInput(scriptProperty);
|
||||||
|
|
||||||
for (const auto& whiteListedPrefix : _entityScriptSourceWhitelist) {
|
for (const auto& allowListedPrefix : _entityScriptSourceAllowlist) {
|
||||||
auto whiteListURL = QUrl::fromUserInput(whiteListedPrefix);
|
auto allowListURL = QUrl::fromUserInput(allowListedPrefix);
|
||||||
|
|
||||||
// check if this script URL matches the whitelist domain and, optionally, is beneath the path
|
// check if this script URL matches the allowlist domain and, optionally, is beneath the path
|
||||||
if (entityScriptURL.host().compare(whiteListURL.host(), Qt::CaseInsensitive) == 0 &&
|
if (entityScriptURL.host().compare(allowListURL.host(), Qt::CaseInsensitive) == 0 &&
|
||||||
entityScriptURL.path().startsWith(whiteListURL.path(), Qt::CaseInsensitive)) {
|
entityScriptURL.path().startsWith(allowListURL.path(), Qt::CaseInsensitive)) {
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1504,18 +1504,18 @@ int EntityTree::processEditPacketData(ReceivedMessage& message, const unsigned c
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (validEditPacket && !_entityScriptSourceWhitelist.isEmpty()) {
|
if (validEditPacket && !_entityScriptSourceAllowlist.isEmpty()) {
|
||||||
|
|
||||||
bool wasDeletedBecauseOfClientScript = false;
|
bool wasDeletedBecauseOfClientScript = false;
|
||||||
|
|
||||||
// check the client entity script to make sure its URL is in the whitelist
|
// check the client entity script to make sure its URL is in the allowlist
|
||||||
if (!properties.getScript().isEmpty()) {
|
if (!properties.getScript().isEmpty()) {
|
||||||
bool clientScriptPassedWhitelist = isScriptInWhitelist(properties.getScript());
|
bool clientScriptPassedAllowlist = isScriptInAllowlist(properties.getScript());
|
||||||
|
|
||||||
if (!clientScriptPassedWhitelist) {
|
if (!clientScriptPassedAllowlist) {
|
||||||
if (wantEditLogging()) {
|
if (wantEditLogging()) {
|
||||||
qCDebug(entities) << "User [" << senderNode->getUUID()
|
qCDebug(entities) << "User [" << senderNode->getUUID()
|
||||||
<< "] attempting to set entity script not on whitelist, edit rejected";
|
<< "] attempting to set entity script not on allowlist, edit rejected";
|
||||||
}
|
}
|
||||||
|
|
||||||
// If this was an add, we also want to tell the client that sent this edit that the entity was not added.
|
// If this was an add, we also want to tell the client that sent this edit that the entity was not added.
|
||||||
|
@ -1530,20 +1530,20 @@ int EntityTree::processEditPacketData(ReceivedMessage& message, const unsigned c
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// check all server entity scripts to make sure their URLs are in the whitelist
|
// check all server entity scripts to make sure their URLs are in the allowlist
|
||||||
if (!properties.getServerScripts().isEmpty()) {
|
if (!properties.getServerScripts().isEmpty()) {
|
||||||
bool serverScriptPassedWhitelist = isScriptInWhitelist(properties.getServerScripts());
|
bool serverScriptPassedAllowlist = isScriptInAllowlist(properties.getServerScripts());
|
||||||
|
|
||||||
if (!serverScriptPassedWhitelist) {
|
if (!serverScriptPassedAllowlist) {
|
||||||
if (wantEditLogging()) {
|
if (wantEditLogging()) {
|
||||||
qCDebug(entities) << "User [" << senderNode->getUUID()
|
qCDebug(entities) << "User [" << senderNode->getUUID()
|
||||||
<< "] attempting to set server entity script not on whitelist, edit rejected";
|
<< "] attempting to set server entity script not on allowlist, edit rejected";
|
||||||
}
|
}
|
||||||
|
|
||||||
// If this was an add, we also want to tell the client that sent this edit that the entity was not added.
|
// If this was an add, we also want to tell the client that sent this edit that the entity was not added.
|
||||||
if (isAdd) {
|
if (isAdd) {
|
||||||
// Make sure we didn't already need to send back a delete because the client script failed
|
// Make sure we didn't already need to send back a delete because the client script failed
|
||||||
// the whitelist check
|
// the allowlist check
|
||||||
if (!wasDeletedBecauseOfClientScript) {
|
if (!wasDeletedBecauseOfClientScript) {
|
||||||
QWriteLocker locker(&_recentlyDeletedEntitiesLock);
|
QWriteLocker locker(&_recentlyDeletedEntitiesLock);
|
||||||
_recentlyDeletedEntityItemIDs.insert(usecTimestampNow(), entityItemID);
|
_recentlyDeletedEntityItemIDs.insert(usecTimestampNow(), entityItemID);
|
||||||
|
|
|
@ -63,7 +63,7 @@ public:
|
||||||
|
|
||||||
|
|
||||||
void setEntityMaxTmpLifetime(float maxTmpEntityLifetime) { _maxTmpEntityLifetime = maxTmpEntityLifetime; }
|
void setEntityMaxTmpLifetime(float maxTmpEntityLifetime) { _maxTmpEntityLifetime = maxTmpEntityLifetime; }
|
||||||
void setEntityScriptSourceWhitelist(const QString& entityScriptSourceWhitelist);
|
void setEntityScriptSourceAllowlist(const QString& entityScriptSourceAllowlist);
|
||||||
|
|
||||||
/// Implements our type specific root element factory
|
/// Implements our type specific root element factory
|
||||||
virtual OctreeElementPointer createNewElement(unsigned char* octalCode = NULL) override;
|
virtual OctreeElementPointer createNewElement(unsigned char* octalCode = NULL) override;
|
||||||
|
@ -300,7 +300,7 @@ protected:
|
||||||
|
|
||||||
void notifyNewlyCreatedEntity(const EntityItem& newEntity, const SharedNodePointer& senderNode);
|
void notifyNewlyCreatedEntity(const EntityItem& newEntity, const SharedNodePointer& senderNode);
|
||||||
|
|
||||||
bool isScriptInWhitelist(const QString& scriptURL);
|
bool isScriptInAllowlist(const QString& scriptURL);
|
||||||
|
|
||||||
QReadWriteLock _newlyCreatedHooksLock;
|
QReadWriteLock _newlyCreatedHooksLock;
|
||||||
QVector<NewlyCreatedEntityHook*> _newlyCreatedHooks;
|
QVector<NewlyCreatedEntityHook*> _newlyCreatedHooks;
|
||||||
|
@ -363,7 +363,7 @@ protected:
|
||||||
|
|
||||||
bool filterProperties(const EntityItemPointer& existingEntity, EntityItemProperties& propertiesIn, EntityItemProperties& propertiesOut, bool& wasChanged, FilterType filterType) const;
|
bool filterProperties(const EntityItemPointer& existingEntity, EntityItemProperties& propertiesIn, EntityItemProperties& propertiesOut, bool& wasChanged, FilterType filterType) const;
|
||||||
bool _hasEntityEditFilter{ false };
|
bool _hasEntityEditFilter{ false };
|
||||||
QStringList _entityScriptSourceWhitelist;
|
QStringList _entityScriptSourceAllowlist;
|
||||||
|
|
||||||
MovingEntitiesOperator _entityMover;
|
MovingEntitiesOperator _entityMover;
|
||||||
QHash<EntityItemID, EntityItemPointer> _entitiesToAdd;
|
QHash<EntityItemID, EntityItemPointer> _entitiesToAdd;
|
||||||
|
|
|
@ -19,21 +19,21 @@ void ScriptGatekeeper::initialize() {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
QVariant rawCurrentWhitelistValues = Setting::Handle<QVariant>(SCRIPT_WHITELIST_ENTRIES_KEY).get();
|
QVariant rawCurrentAllowlistValues = Setting::Handle<QVariant>(SCRIPT_ALLOWLIST_ENTRIES_KEY).get();
|
||||||
QString settingsSafeValues = rawCurrentWhitelistValues.toString();
|
QString settingsSafeValues = rawCurrentAllowlistValues.toString();
|
||||||
|
|
||||||
Setting::Handle<bool> whitelistEnabled { SCRIPT_WHITELIST_ENABLED_KEY, false };
|
Setting::Handle<bool> allowlistEnabled { SCRIPT_ALLOWLIST_ENABLED_KEY, false };
|
||||||
Setting::Handle<bool> isFirstRun { Settings::firstRun, true };
|
Setting::Handle<bool> isFirstRun { Settings::firstRun, true };
|
||||||
|
|
||||||
QString preloadedVal = BuildInfo::PRELOADED_SCRIPT_WHITELIST;
|
QString preloadedVal = BuildInfo::PRELOADED_SCRIPT_ALLOWLIST;
|
||||||
|
|
||||||
if (settingsSafeValues.isEmpty() && !preloadedVal.isEmpty() && isFirstRun.get()) {
|
if (settingsSafeValues.isEmpty() && !preloadedVal.isEmpty() && isFirstRun.get()) {
|
||||||
// We assume that the whitelist should be enabled if a preloaded whitelist is attached, so we activate it if it's not already active.
|
// We assume that the allowlist should be enabled if a preloaded allowlist is attached, so we activate it if it's not already active.
|
||||||
if (!whitelistEnabled.get()) {
|
if (!allowlistEnabled.get()) {
|
||||||
whitelistEnabled.set(true);
|
allowlistEnabled.set(true);
|
||||||
}
|
}
|
||||||
|
|
||||||
Setting::Handle<QVariant>(SCRIPT_WHITELIST_ENTRIES_KEY).set(preloadedVal);
|
Setting::Handle<QVariant>(SCRIPT_ALLOWLIST_ENTRIES_KEY).set(preloadedVal);
|
||||||
}
|
}
|
||||||
|
|
||||||
_initialized = true;
|
_initialized = true;
|
||||||
|
|
|
@ -17,14 +17,14 @@
|
||||||
|
|
||||||
#include <QtCore/QObject>
|
#include <QtCore/QObject>
|
||||||
|
|
||||||
/// Manages script whitelisting in a domain
|
/// Manages script allowlisting in a domain
|
||||||
class ScriptGatekeeper : public QObject {
|
class ScriptGatekeeper : public QObject {
|
||||||
Q_OBJECT
|
Q_OBJECT
|
||||||
public:
|
public:
|
||||||
void initialize();
|
void initialize();
|
||||||
|
|
||||||
QString SCRIPT_WHITELIST_ENABLED_KEY{ "private/whitelistEnabled" };
|
QString SCRIPT_ALLOWLIST_ENABLED_KEY{ "private/allowlistEnabled" };
|
||||||
QString SCRIPT_WHITELIST_ENTRIES_KEY{ "private/settingsSafeURLS" };
|
QString SCRIPT_ALLOWLIST_ENTRIES_KEY{ "private/settingsSafeURLS" };
|
||||||
|
|
||||||
private:
|
private:
|
||||||
bool _initialized { false };
|
bool _initialized { false };
|
||||||
|
|
|
@ -2192,17 +2192,17 @@ void ScriptManager::entityScriptContentAvailable(const EntityItemID& entityID, c
|
||||||
exception = testConstructor;
|
exception = testConstructor;
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
// ENTITY SCRIPT WHITELIST STARTS HERE
|
// ENTITY SCRIPT ALLOWLIST STARTS HERE
|
||||||
auto nodeList = DependencyManager::get<NodeList>();
|
auto nodeList = DependencyManager::get<NodeList>();
|
||||||
bool passList = false; // assume unsafe
|
bool passList = false; // assume unsafe
|
||||||
QString whitelistPrefix = "[WHITELIST ENTITY SCRIPTS]";
|
QString allowlistPrefix = "[ALLOWLIST ENTITY SCRIPTS]";
|
||||||
QList<QString> safeURLPrefixes = { "file:///", "atp:", "cache:" };
|
QList<QString> safeURLPrefixes = { "file:///", "atp:", "cache:" };
|
||||||
safeURLPrefixes += qEnvironmentVariable("EXTRA_WHITELIST").trimmed().split(QRegExp("\\s*,\\s*"), Qt::SkipEmptyParts);
|
safeURLPrefixes += qEnvironmentVariable("EXTRA_ALLOWLIST").trimmed().split(QRegExp("\\s*,\\s*"), Qt::SkipEmptyParts);
|
||||||
|
|
||||||
// Entity Script Whitelist toggle check.
|
// Entity Script Allowlist toggle check.
|
||||||
Setting::Handle<bool> whitelistEnabled {"private/whitelistEnabled", false };
|
Setting::Handle<bool> allowlistEnabled {"private/allowlistEnabled", false };
|
||||||
|
|
||||||
if (!whitelistEnabled.get()) {
|
if (!allowlistEnabled.get()) {
|
||||||
passList = true;
|
passList = true;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -2212,39 +2212,39 @@ void ScriptManager::entityScriptContentAvailable(const EntityItemID& entityID, c
|
||||||
safeURLPrefixes += settingsSafeURLS;
|
safeURLPrefixes += settingsSafeURLS;
|
||||||
// END Pull SAFEURLS from the Interface.JSON settings.
|
// END Pull SAFEURLS from the Interface.JSON settings.
|
||||||
|
|
||||||
// Get current domain whitelist bypass, in case an entire domain is whitelisted.
|
// Get current domain allowlist bypass, in case an entire domain is allowlisted.
|
||||||
QString currentDomain = DependencyManager::get<AddressManager>()->getDomainURL().host();
|
QString currentDomain = DependencyManager::get<AddressManager>()->getDomainURL().host();
|
||||||
|
|
||||||
QString domainSafeIP = nodeList->getDomainHandler().getHostname();
|
QString domainSafeIP = nodeList->getDomainHandler().getHostname();
|
||||||
QString domainSafeURL = URL_SCHEME_OVERTE + "://" + currentDomain;
|
QString domainSafeURL = URL_SCHEME_OVERTE + "://" + currentDomain;
|
||||||
for (const auto& str : safeURLPrefixes) {
|
for (const auto& str : safeURLPrefixes) {
|
||||||
if (domainSafeURL.startsWith(str) || domainSafeIP.startsWith(str)) {
|
if (domainSafeURL.startsWith(str) || domainSafeIP.startsWith(str)) {
|
||||||
qCDebug(scriptengine) << whitelistPrefix << "Whitelist Bypassed, entire domain is whitelisted. Current Domain Host: "
|
qCDebug(scriptengine) << allowlistPrefix << "Allowlist Bypassed, entire domain is allowlisted. Current Domain Host: "
|
||||||
<< nodeList->getDomainHandler().getHostname()
|
<< nodeList->getDomainHandler().getHostname()
|
||||||
<< "Current Domain: " << currentDomain;
|
<< "Current Domain: " << currentDomain;
|
||||||
passList = true;
|
passList = true;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
// END bypass whitelist based on current domain.
|
// END bypass allowlist based on current domain.
|
||||||
|
|
||||||
// Start processing scripts through the whitelist.
|
// Start processing scripts through the allowlist.
|
||||||
if (ScriptManager::getContext() == "entity_server") { // If running on the server, do not engage whitelist.
|
if (ScriptManager::getContext() == "entity_server") { // If running on the server, do not engage allowlist.
|
||||||
passList = true;
|
passList = true;
|
||||||
} else if (!passList) { // If waved through, do not engage whitelist.
|
} else if (!passList) { // If waved through, do not engage allowlist.
|
||||||
for (const auto& str : safeURLPrefixes) {
|
for (const auto& str : safeURLPrefixes) {
|
||||||
qCDebug(scriptengine) << whitelistPrefix << "Script URL: " << scriptOrURL << "TESTING AGAINST" << str << "RESULTS IN"
|
qCDebug(scriptengine) << allowlistPrefix << "Script URL: " << scriptOrURL << "TESTING AGAINST" << str << "RESULTS IN"
|
||||||
<< scriptOrURL.startsWith(str);
|
<< scriptOrURL.startsWith(str);
|
||||||
if (!str.isEmpty() && scriptOrURL.startsWith(str)) {
|
if (!str.isEmpty() && scriptOrURL.startsWith(str)) {
|
||||||
passList = true;
|
passList = true;
|
||||||
qCDebug(scriptengine) << whitelistPrefix << "Script approved.";
|
qCDebug(scriptengine) << allowlistPrefix << "Script approved.";
|
||||||
break; // Bail early since we found a match.
|
break; // Bail early since we found a match.
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
// END processing of scripts through the whitelist.
|
// END processing of scripts through the allowlist.
|
||||||
|
|
||||||
if (!passList) { // If the entity failed to pass for any reason, it's blocked and an error is thrown.
|
if (!passList) { // If the entity failed to pass for any reason, it's blocked and an error is thrown.
|
||||||
qCDebug(scriptengine) << whitelistPrefix << "(disabled entity script)" << entityID.toString() << scriptOrURL;
|
qCDebug(scriptengine) << allowlistPrefix << "(disabled entity script)" << entityID.toString() << scriptOrURL;
|
||||||
exception = _engine->makeError(_engine->newValue("UNSAFE_ENTITY_SCRIPTS == 0"));
|
exception = _engine->makeError(_engine->newValue("UNSAFE_ENTITY_SCRIPTS == 0"));
|
||||||
} else {
|
} else {
|
||||||
QTimer timeout;
|
QTimer timeout;
|
||||||
|
@ -2267,7 +2267,7 @@ void ScriptManager::entityScriptContentAvailable(const EntityItemID& entityID, c
|
||||||
exception = testConstructor;
|
exception = testConstructor;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
// ENTITY SCRIPT WHITELIST ENDS HERE, uncomment below for original full disabling.
|
// ENTITY SCRIPT ALLOWLIST ENDS HERE, uncomment below for original full disabling.
|
||||||
|
|
||||||
// qCDebug(scriptengine) << "(disabled entity script)" << entityID.toString() << scriptOrURL;
|
// qCDebug(scriptengine) << "(disabled entity script)" << entityID.toString() << scriptOrURL;
|
||||||
// exception = makeError("UNSAFE_ENTITY_SCRIPTS == 0");
|
// exception = makeError("UNSAFE_ENTITY_SCRIPTS == 0");
|
||||||
|
@ -2303,17 +2303,17 @@ void ScriptManager::entityScriptContentAvailable(const EntityItemID& entityID, c
|
||||||
return; // done processing script
|
return; // done processing script
|
||||||
}*/
|
}*/
|
||||||
|
|
||||||
// ENTITY SCRIPT WHITELIST STARTS HERE
|
// ENTITY SCRIPT ALLOWLIST STARTS HERE
|
||||||
auto nodeList = DependencyManager::get<NodeList>();
|
auto nodeList = DependencyManager::get<NodeList>();
|
||||||
bool passList = false; // assume unsafe
|
bool passList = false; // assume unsafe
|
||||||
QString whitelistPrefix = "[WHITELIST ENTITY SCRIPTS]";
|
QString allowlistPrefix = "[ALLOWLIST ENTITY SCRIPTS]";
|
||||||
QList<QString> safeURLPrefixes = { "file:///", "atp:", "cache:" };
|
QList<QString> safeURLPrefixes = { "file:///", "atp:", "cache:" };
|
||||||
safeURLPrefixes += qEnvironmentVariable("EXTRA_WHITELIST").trimmed().split(QRegExp("\\s*,\\s*"), Qt::SkipEmptyParts);
|
safeURLPrefixes += qEnvironmentVariable("EXTRA_ALLOWLIST").trimmed().split(QRegExp("\\s*,\\s*"), Qt::SkipEmptyParts);
|
||||||
|
|
||||||
// Entity Script Whitelist toggle check.
|
// Entity Script Allowlist toggle check.
|
||||||
Setting::Handle<bool> whitelistEnabled {"private/whitelistEnabled", false };
|
Setting::Handle<bool> allowlistEnabled {"private/allowlistEnabled", false };
|
||||||
|
|
||||||
if (!whitelistEnabled.get()) {
|
if (!allowlistEnabled.get()) {
|
||||||
passList = true;
|
passList = true;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -2323,40 +2323,40 @@ void ScriptManager::entityScriptContentAvailable(const EntityItemID& entityID, c
|
||||||
safeURLPrefixes += settingsSafeURLS;
|
safeURLPrefixes += settingsSafeURLS;
|
||||||
// END Pull SAFEURLS from the Interface.JSON settings.
|
// END Pull SAFEURLS from the Interface.JSON settings.
|
||||||
|
|
||||||
// Get current domain whitelist bypass, in case an entire domain is whitelisted.
|
// Get current domain allowlist bypass, in case an entire domain is allowlisted.
|
||||||
QString currentDomain = DependencyManager::get<AddressManager>()->getDomainURL().host();
|
QString currentDomain = DependencyManager::get<AddressManager>()->getDomainURL().host();
|
||||||
|
|
||||||
QString domainSafeIP = nodeList->getDomainHandler().getHostname();
|
QString domainSafeIP = nodeList->getDomainHandler().getHostname();
|
||||||
QString domainSafeURL = URL_SCHEME_OVERTE + "://" + currentDomain;
|
QString domainSafeURL = URL_SCHEME_OVERTE + "://" + currentDomain;
|
||||||
for (const auto& str : safeURLPrefixes) {
|
for (const auto& str : safeURLPrefixes) {
|
||||||
if (domainSafeURL.startsWith(str) || domainSafeIP.startsWith(str)) {
|
if (domainSafeURL.startsWith(str) || domainSafeIP.startsWith(str)) {
|
||||||
qCDebug(scriptengine) << whitelistPrefix << "Whitelist Bypassed, entire domain is whitelisted. Current Domain Host: "
|
qCDebug(scriptengine) << allowlistPrefix << "Allowlist Bypassed, entire domain is allowlisted. Current Domain Host: "
|
||||||
<< nodeList->getDomainHandler().getHostname()
|
<< nodeList->getDomainHandler().getHostname()
|
||||||
<< "Current Domain: " << currentDomain;
|
<< "Current Domain: " << currentDomain;
|
||||||
passList = true;
|
passList = true;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
// END bypass whitelist based on current domain.
|
// END bypass allowlist based on current domain.
|
||||||
|
|
||||||
// Start processing scripts through the whitelist.
|
// Start processing scripts through the allowlist.
|
||||||
if (ScriptManager::getContext() == "entity_server") { // If running on the server, do not engage whitelist.
|
if (ScriptManager::getContext() == "entity_server") { // If running on the server, do not engage allowlist.
|
||||||
passList = true;
|
passList = true;
|
||||||
} else if (!passList) { // If waved through, do not engage whitelist.
|
} else if (!passList) { // If waved through, do not engage allowlist.
|
||||||
for (const auto& str : safeURLPrefixes) {
|
for (const auto& str : safeURLPrefixes) {
|
||||||
qCDebug(scriptengine) << whitelistPrefix << "Script URL: " << scriptOrURL << "TESTING AGAINST" << str << "RESULTS IN"
|
qCDebug(scriptengine) << allowlistPrefix << "Script URL: " << scriptOrURL << "TESTING AGAINST" << str << "RESULTS IN"
|
||||||
<< scriptOrURL.startsWith(str);
|
<< scriptOrURL.startsWith(str);
|
||||||
if (!str.isEmpty() && scriptOrURL.startsWith(str)) {
|
if (!str.isEmpty() && scriptOrURL.startsWith(str)) {
|
||||||
passList = true;
|
passList = true;
|
||||||
qCDebug(scriptengine) << whitelistPrefix << "Script approved.";
|
qCDebug(scriptengine) << allowlistPrefix << "Script approved.";
|
||||||
break; // Bail early since we found a match.
|
break; // Bail early since we found a match.
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
// END processing of scripts through the whitelist.
|
// END processing of scripts through the allowlist.
|
||||||
|
|
||||||
ScriptValue exception;
|
ScriptValue exception;
|
||||||
if (!passList) { // If the entity failed to pass for any reason, it's blocked and an error is thrown.
|
if (!passList) { // If the entity failed to pass for any reason, it's blocked and an error is thrown.
|
||||||
qCDebug(scriptengine) << whitelistPrefix << "(disabled entity script)" << entityID.toString() << scriptOrURL;
|
qCDebug(scriptengine) << allowlistPrefix << "(disabled entity script)" << entityID.toString() << scriptOrURL;
|
||||||
exception = _engine->makeError(_engine->newValue("UNSAFE_ENTITY_SCRIPTS == 0"));
|
exception = _engine->makeError(_engine->newValue("UNSAFE_ENTITY_SCRIPTS == 0"));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -2369,7 +2369,7 @@ void ScriptManager::entityScriptContentAvailable(const EntityItemID& entityID, c
|
||||||
emit unhandledException(scriptRuntimeException);
|
emit unhandledException(scriptRuntimeException);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
// ENTITY SCRIPT WHITELIST ENDS HERE, uncomment below for original full disabling.
|
// ENTITY SCRIPT ALLOWLIST ENDS HERE, uncomment below for original full disabling.
|
||||||
|
|
||||||
// qCDebug(scriptengine) << "(disabled entity script)" << entityID.toString() << scriptOrURL;
|
// qCDebug(scriptengine) << "(disabled entity script)" << entityID.toString() << scriptOrURL;
|
||||||
// exception = makeError("UNSAFE_ENTITY_SCRIPTS == 0");
|
// exception = makeError("UNSAFE_ENTITY_SCRIPTS == 0");
|
||||||
|
|
|
@ -854,11 +854,11 @@ void printSystemInformation() {
|
||||||
|
|
||||||
qCDebug(shared) << "Environment Variables";
|
qCDebug(shared) << "Environment Variables";
|
||||||
// List of env variables to include in the log. For privacy reasons we don't send all env variables.
|
// List of env variables to include in the log. For privacy reasons we don't send all env variables.
|
||||||
const QStringList envWhitelist = {
|
const QStringList envAllowlist = {
|
||||||
"QTWEBENGINE_REMOTE_DEBUGGING"
|
"QTWEBENGINE_REMOTE_DEBUGGING"
|
||||||
};
|
};
|
||||||
auto envVariables = QProcessEnvironment::systemEnvironment();
|
auto envVariables = QProcessEnvironment::systemEnvironment();
|
||||||
for (auto& env : envWhitelist)
|
for (auto& env : envAllowlist)
|
||||||
{
|
{
|
||||||
qCDebug(shared).noquote().nospace() << "\t" <<
|
qCDebug(shared).noquote().nospace() << "\t" <<
|
||||||
(envVariables.contains(env) ? " = " + envVariables.value(env) : " NOT FOUND");
|
(envVariables.contains(env) ? " = " + envVariables.value(env) : " NOT FOUND");
|
||||||
|
|
|
@ -19,7 +19,7 @@
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
|
||||||
#ifdef OVERTE_WARNINGS_WHITELIST_GCC
|
#ifdef OVERTE_WARNINGS_ALLOWLIST_GCC
|
||||||
|
|
||||||
#define OVERTE_IGNORE_DEPRECATED_BEGIN \
|
#define OVERTE_IGNORE_DEPRECATED_BEGIN \
|
||||||
_Pragma("GCC diagnostic push") \
|
_Pragma("GCC diagnostic push") \
|
||||||
|
@ -27,7 +27,7 @@
|
||||||
|
|
||||||
#define OVERTE_IGNORE_DEPRECATED_END _Pragma("GCC diagnostic pop")
|
#define OVERTE_IGNORE_DEPRECATED_END _Pragma("GCC diagnostic pop")
|
||||||
|
|
||||||
#elif OVERTE_WARNINGS_WHITELIST_CLANG
|
#elif OVERTE_WARNINGS_ALLOWLIST_CLANG
|
||||||
|
|
||||||
#define OVERTE_IGNORE_DEPRECATED_BEGIN \
|
#define OVERTE_IGNORE_DEPRECATED_BEGIN \
|
||||||
_Pragma("clang diagnostic push") \
|
_Pragma("clang diagnostic push") \
|
||||||
|
@ -35,7 +35,7 @@
|
||||||
|
|
||||||
#define OVERTE_IGNORE_DEPRECATED_END _Pragma("clang diagnostic pop")
|
#define OVERTE_IGNORE_DEPRECATED_END _Pragma("clang diagnostic pop")
|
||||||
|
|
||||||
#elif OVERTE_WARNINGS_WHITELIST_MSVC
|
#elif OVERTE_WARNINGS_ALLOWLIST_MSVC
|
||||||
|
|
||||||
#define OVERTE_IGNORE_DEPRECATED_BEGIN \
|
#define OVERTE_IGNORE_DEPRECATED_BEGIN \
|
||||||
_Pragma("warning(push)") \
|
_Pragma("warning(push)") \
|
||||||
|
|
|
@ -63,11 +63,11 @@
|
||||||
|
|
||||||
namespace hifi { namespace qml { namespace offscreen {
|
namespace hifi { namespace qml { namespace offscreen {
|
||||||
|
|
||||||
class OffscreenQmlWhitelist : public Dependency, private ReadWriteLockable {
|
class OffscreenQmlAllowlist : public Dependency, private ReadWriteLockable {
|
||||||
SINGLETON_DEPENDENCY
|
SINGLETON_DEPENDENCY
|
||||||
|
|
||||||
public:
|
public:
|
||||||
void addWhitelistContextHandler(const std::initializer_list<QUrl>& urls, const QmlContextCallback& callback) {
|
void addAllowlistContextHandler(const std::initializer_list<QUrl>& urls, const QmlContextCallback& callback) {
|
||||||
withWriteLock([&] {
|
withWriteLock([&] {
|
||||||
for (auto url : urls) {
|
for (auto url : urls) {
|
||||||
if (url.isRelative()) {
|
if (url.isRelative()) {
|
||||||
|
@ -93,11 +93,11 @@ private:
|
||||||
QHash<QUrl, QList<QmlContextCallback>> _callbacks;
|
QHash<QUrl, QList<QmlContextCallback>> _callbacks;
|
||||||
};
|
};
|
||||||
|
|
||||||
QSharedPointer<OffscreenQmlWhitelist> getQmlWhitelist() {
|
QSharedPointer<OffscreenQmlAllowlist> getQmlAllowlist() {
|
||||||
static std::once_flag once;
|
static std::once_flag once;
|
||||||
std::call_once(once, [&] { DependencyManager::set<OffscreenQmlWhitelist>(); });
|
std::call_once(once, [&] { DependencyManager::set<OffscreenQmlAllowlist>(); });
|
||||||
|
|
||||||
return DependencyManager::get<OffscreenQmlWhitelist>();
|
return DependencyManager::get<OffscreenQmlAllowlist>();
|
||||||
}
|
}
|
||||||
|
|
||||||
// Class to handle changing QML audio output device using another thread
|
// Class to handle changing QML audio output device using another thread
|
||||||
|
@ -292,9 +292,9 @@ void OffscreenQmlSurface::initializeEngine(QQmlEngine* engine) {
|
||||||
engine->setObjectOwnership(tablet, QQmlEngine::CppOwnership);
|
engine->setObjectOwnership(tablet, QQmlEngine::CppOwnership);
|
||||||
}
|
}
|
||||||
|
|
||||||
void OffscreenQmlSurface::addWhitelistContextHandler(const std::initializer_list<QUrl>& urls,
|
void OffscreenQmlSurface::addAllowlistContextHandler(const std::initializer_list<QUrl>& urls,
|
||||||
const QmlContextCallback& callback) {
|
const QmlContextCallback& callback) {
|
||||||
getQmlWhitelist()->addWhitelistContextHandler(urls, callback);
|
getQmlAllowlist()->addAllowlistContextHandler(urls, callback);
|
||||||
}
|
}
|
||||||
|
|
||||||
void OffscreenQmlSurface::onRootContextCreated(QQmlContext* qmlContext) {
|
void OffscreenQmlSurface::onRootContextCreated(QQmlContext* qmlContext) {
|
||||||
|
@ -319,17 +319,17 @@ void OffscreenQmlSurface::onRootContextCreated(QQmlContext* qmlContext) {
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
void OffscreenQmlSurface::applyWhiteList(const QUrl& url, QQmlContext* context) {
|
void OffscreenQmlSurface::applyAllowList(const QUrl& url, QQmlContext* context) {
|
||||||
QList<QmlContextCallback> callbacks = getQmlWhitelist()->getCallbacksForUrl(url);
|
QList<QmlContextCallback> callbacks = getQmlAllowlist()->getCallbacksForUrl(url);
|
||||||
for(const auto& callback : callbacks){
|
for(const auto& callback : callbacks){
|
||||||
callback(context);
|
callback(context);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
QQmlContext* OffscreenQmlSurface::contextForUrl(const QUrl& qmlSource, QQuickItem* parent, bool forceNewContext) {
|
QQmlContext* OffscreenQmlSurface::contextForUrl(const QUrl& qmlSource, QQuickItem* parent, bool forceNewContext) {
|
||||||
// Get any whitelist functionality
|
// Get any allowlist functionality
|
||||||
QList<QmlContextCallback> callbacks = getQmlWhitelist()->getCallbacksForUrl(qmlSource);
|
QList<QmlContextCallback> callbacks = getQmlAllowlist()->getCallbacksForUrl(qmlSource);
|
||||||
// If we have whitelisted content, we must load a new context
|
// If we have allowlisted content, we must load a new context
|
||||||
forceNewContext |= !callbacks.empty();
|
forceNewContext |= !callbacks.empty();
|
||||||
|
|
||||||
QQmlContext* targetContext = Parent::contextForUrl(qmlSource, parent, forceNewContext);
|
QQmlContext* targetContext = Parent::contextForUrl(qmlSource, parent, forceNewContext);
|
||||||
|
|
|
@ -28,9 +28,9 @@ class OffscreenQmlSurface : public hifi::qml::OffscreenSurface {
|
||||||
public:
|
public:
|
||||||
~OffscreenQmlSurface();
|
~OffscreenQmlSurface();
|
||||||
|
|
||||||
static void addWhitelistContextHandler(const std::initializer_list<QUrl>& urls, const QmlContextCallback& callback);
|
static void addAllowlistContextHandler(const std::initializer_list<QUrl>& urls, const QmlContextCallback& callback);
|
||||||
static void addWhitelistContextHandler(const QUrl& url, const QmlContextCallback& callback) { addWhitelistContextHandler({ { url } }, callback); };
|
static void addAllowlistContextHandler(const QUrl& url, const QmlContextCallback& callback) { addAllowlistContextHandler({ { url } }, callback); };
|
||||||
static void applyWhiteList(const QUrl& url,QQmlContext* context);
|
static void applyAllowList(const QUrl& url,QQmlContext* context);
|
||||||
|
|
||||||
bool isFocusText() const { return _focusText; }
|
bool isFocusText() const { return _focusText; }
|
||||||
bool getCleaned() { return _isCleaned; }
|
bool getCleaned() { return _isCleaned; }
|
||||||
|
|
|
@ -54,7 +54,7 @@ namespace {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
// We can potentially add whitelisting logic or development environment variables that
|
// We can potentially add allowlisting logic or development environment variables that
|
||||||
// will allow people to override this setting on a per-client basis here.
|
// will allow people to override this setting on a per-client basis here.
|
||||||
QString targetFilePath = QFileInfo(requestUrl.toLocalFile()).canonicalFilePath();
|
QString targetFilePath = QFileInfo(requestUrl.toLocalFile()).canonicalFilePath();
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue