2 * Copyright (c) 2011 Apple Inc. All Rights Reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
21 * @APPLE_LICENSE_HEADER_END@
25 #include "policyengine.h"
26 #include <Security/CodeSigning.h>
27 #include <security_utilities/cfutilities.h>
28 #include <security_utilities/cfmunge.h>
31 namespace CodeSigning
{
34 using namespace SQLite
;
38 // The one and only PolicyDatabase object.
39 // It auto-adapts to readonly vs. writable use.
41 ModuleNexus
<PolicyDatabase
> PolicyDatabase
;
45 // Determine the database path
47 static const char *dbPath()
49 if (const char *s
= getenv("SYSPOLICYDATABASE"))
51 return defaultDatabase
;
56 // Help mapping API-ish CFString keys to more convenient internal enumerations
59 const CFStringRef
&cstring
;
63 static uint
mapEnum(CFDictionaryRef context
, CFStringRef attr
, const StringMap
*map
, uint value
= 0)
66 if (CFTypeRef value
= CFDictionaryGetValue(context
, attr
))
67 for (const StringMap
*mp
= map
; mp
->cstring
; ++mp
)
68 if (CFEqual(mp
->cstring
, value
))
69 return mp
->enumeration
;
73 static const StringMap mapType
[] = {
74 { kSecAssessmentOperationTypeExecute
, kAuthorityExecute
},
75 { kSecAssessmentOperationTypeInstall
, kAuthorityInstall
},
76 { kSecAssessmentOperationTypeOpenDocument
, kAuthorityOpenDoc
},
80 AuthorityType
typeFor(CFDictionaryRef context
, AuthorityType type
/* = kAuthorityInvalid */)
82 return mapEnum(context
, kSecAssessmentContextKeyOperation
, mapType
, type
);
87 // Open the database (creating it if necessary and possible).
88 // Note that this isn't creating the schema; we do that on first write.
90 PolicyDatabase::PolicyDatabase(const char *path
, int flags
)
91 : SQLite::Database(path
? path
: dbPath(), flags
)
95 PolicyDatabase::~PolicyDatabase()
100 // Quick-check the cache for a match.
101 // Return true on a cache hit, false on failure to confirm a hit for any reason.
103 bool PolicyDatabase::checkCache(CFURLRef path
, AuthorityType type
, CFMutableDictionaryRef result
)
105 // we currently don't use the cache for anything but execution rules
106 if (type
!= kAuthorityExecute
)
109 CFRef
<SecStaticCodeRef
> code
;
110 MacOSError::check(SecStaticCodeCreateWithPath(path
, kSecCSDefaultFlags
, &code
.aref()));
111 if (SecStaticCodeCheckValidity(code
, kSecCSBasicValidateOnly
, NULL
) != noErr
)
112 return false; // quick pass - any error is a cache miss
113 CFRef
<CFDictionaryRef
> info
;
114 MacOSError::check(SecCodeCopySigningInformation(code
, kSecCSDefaultFlags
, &info
.aref()));
115 CFDataRef cdHash
= CFDataRef(CFDictionaryGetValue(info
, kSecCodeInfoUnique
));
117 // check the cache table for a fast match
118 SQLite::Statement
cached(*this, "SELECT object.allow, authority.label, authority FROM object, authority"
119 " WHERE object.authority = authority.id AND object.type = :type AND object.hash = :hash AND authority.disabled = 0"
120 " AND JULIANDAY('now') < object.expires;");
121 cached
.bind(":type").integer(type
);
122 cached
.bind(":hash") = cdHash
;
123 if (cached
.nextRow()) {
124 bool allow
= int(cached
[0]);
125 const char *label
= cached
[1];
126 SQLite::int64 auth
= cached
[2];
127 SYSPOLICY_ASSESS_CACHE_HIT();
129 // If its allowed, lets do a full validation unless if
130 // we are overriding the assessement, since that force
131 // the verdict to 'pass' at the end
133 if (allow
&& !overrideAssessment())
134 MacOSError::check(SecStaticCodeCheckValidity(code
, kSecCSDefaultFlags
, NULL
));
136 cfadd(result
, "{%O=%B}", kSecAssessmentAssessmentVerdict
, allow
);
137 PolicyEngine::addAuthority(result
, label
, auth
, kCFBooleanTrue
);
145 // Purge the object cache of all expired entries.
146 // These are meant to run within the caller's transaction.
148 void PolicyDatabase::purgeAuthority()
150 SQLite::Statement
cleaner(*this,
151 "DELETE FROM authority WHERE expires <= JULIANDAY('now');");
155 void PolicyDatabase::purgeObjects()
157 SQLite::Statement
cleaner(*this,
158 "DELETE FROM object WHERE expires <= JULIANDAY('now');");
162 void PolicyDatabase::purgeObjects(double priority
)
164 SQLite::Statement
cleaner(*this,
165 "DELETE FROM object WHERE expires <= JULIANDAY('now') OR (SELECT priority FROM authority WHERE id = object.authority) <= :priority;");
166 cleaner
.bind(":priority") = priority
;
172 // Check the override-enable master flag
174 bool overrideAssessment()
176 if (::access(visibleSecurityFlagFile
, F_OK
) == 0) {
178 } else if (errno
== ENOENT
) {
181 UnixError::throwMe();
185 } // end namespace CodeSigning
186 } // end namespace Security