HADOOP-17631. Configuration ${env.VAR:-FALLBACK} to eval FALLBACK when restrictSystemProps=true (#2977)

Contributed by Steve Loughran.
This commit is contained in:
Steve Loughran 2021-06-08 21:56:40 +01:00 committed by GitHub
parent a2a0283c7b
commit 762a83e044
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 106 additions and 29 deletions

View File

@ -1139,8 +1139,10 @@ private String substituteVars(String expr) {
final String var = eval.substring(varBounds[SUB_START_IDX], final String var = eval.substring(varBounds[SUB_START_IDX],
varBounds[SUB_END_IDX]); varBounds[SUB_END_IDX]);
String val = null; String val = null;
if (!restrictSystemProps) {
try { try {
// evaluate system properties or environment variables even when
// the configuration is restricted -the restrictions are enforced
// in the getenv/getProperty calls
if (var.startsWith("env.") && 4 < var.length()) { if (var.startsWith("env.") && 4 < var.length()) {
String v = var.substring(4); String v = var.substring(4);
int i = 0; int i = 0;
@ -1169,7 +1171,6 @@ private String substituteVars(String expr) {
} catch (SecurityException se) { } catch (SecurityException se) {
LOG.warn("Unexpected SecurityException in Configuration", se); LOG.warn("Unexpected SecurityException in Configuration", se);
} }
}
if (val == null) { if (val == null) {
val = getRaw(var); val = getRaw(var);
} }
@ -1195,12 +1196,32 @@ private String substituteVars(String expr) {
+ MAX_SUBST + " " + expr); + MAX_SUBST + " " + expr);
} }
/**
* Get the environment variable value if
* {@link #restrictSystemProps} does not block this.
* @param name environment variable name.
* @return the value or null if either it is unset or access forbidden.
*/
String getenv(String name) { String getenv(String name) {
if (!restrictSystemProps) {
return System.getenv(name); return System.getenv(name);
} else {
return null;
}
} }
/**
* Get a system property value if
* {@link #restrictSystemProps} does not block this.
* @param key property key
* @return the value or null if either it is unset or access forbidden.
*/
String getProperty(String key) { String getProperty(String key) {
if (!restrictSystemProps) {
return System.getProperty(key); return System.getProperty(key);
} else {
return null;
}
} }
/** /**

View File

@ -485,6 +485,62 @@ public void testEnvDefault() throws IOException {
} }
} }
/**
* Verify that when a configuration is restricted, environment
* variables and system properties will be unresolved.
* The fallback patterns for the variables are still parsed.
*/
@Test
public void testRestrictedEnv() throws IOException {
// this test relies on env.PATH being set on all platforms a
// test run will take place on, and the java.version sysprop
// set in all JVMs.
// Restricted configurations will not get access to these values, so
// will either be unresolved or, for env vars with fallbacks: the fallback
// values.
conf.setRestrictSystemProperties(true);
out = new BufferedWriter(new FileWriter(CONFIG));
startConfig();
// a simple property to reference
declareProperty("d", "D", "D");
// system property evaluation stops working completely
declareProperty("system1", "${java.version}", "${java.version}");
// the env variable does not resolve
declareProperty("secret1", "${env.PATH}", "${env.PATH}");
// but all the fallback options do work
declareProperty("secret2", "${env.PATH-a}", "a");
declareProperty("secret3", "${env.PATH:-b}", "b");
declareProperty("secret4", "${env.PATH:-}", "");
declareProperty("secret5", "${env.PATH-}", "");
// special case
declareProperty("secret6", "${env.PATH:}", "${env.PATH:}");
// safety check
declareProperty("secret7", "${env.PATH:--}", "-");
// recursive eval of the fallback
declareProperty("secret8", "${env.PATH:-${d}}", "D");
// if the fallback doesn't resolve, the result is the whole variable raw.
declareProperty("secret9", "${env.PATH:-$d}}", "${env.PATH:-$d}}");
endConfig();
Path fileResource = new Path(CONFIG);
conf.addResource(fileResource);
for (Prop p : props) {
System.out.println("p=" + p.name);
String gotVal = conf.get(p.name);
String gotRawVal = conf.getRaw(p.name);
assertEq(p.val, gotRawVal);
assertEq(p.expectEval, gotVal);
}
}
@Test @Test
public void testFinalParam() throws IOException { public void testFinalParam() throws IOException {
out=new BufferedWriter(new FileWriter(CONFIG)); out=new BufferedWriter(new FileWriter(CONFIG));