Enforce android command escaping with flow

Summary: Splits the utility into a public and private part - just for the opaque types to work. The private part validates arguments and does the command running. Both are safe to use, but the non-internal one is easier, you don't have to validate anything.

Reviewed By: passy

Differential Revision: D15393477

fbshipit-source-id: 92f63180fb94af4337fdf8c7dace5bc5a85d5a54
This commit is contained in:
John Knox
2019-05-17 09:41:36 -07:00
committed by Facebook Github Bot
parent d238a958ec
commit 7823389081
3 changed files with 126 additions and 53 deletions

View File

@@ -331,11 +331,7 @@ export default class CertificateProvider {
csr: string,
): Promise<boolean> {
return androidUtil
.executeCommandAsApp(
deviceId,
processName,
`cat ${directory + csrFileName}`,
)
.pull(deviceId, processName, directory + csrFileName)
.then(deviceCsr => {
return this.santitizeString(deviceCsr.toString()) === csr;
});

View File

@@ -4,58 +4,37 @@
* LICENSE file in the root directory of this source tree.
* @format
*/
import {getAdbClient} from './adbClient';
const adbkit = require('adbkit-fb');
const logTag = 'androidContainerUtility';
const appNotDebuggableRegex = /debuggable/;
const allowedAppNameRegex = /^[a-zA-Z0-9._\-]+$/;
const operationNotPermittedRegex = /not permitted/;
const adb = getAdbClient();
export function executeCommandAsApp(
deviceId: string,
app: string,
command: string,
): Promise<string> {
if (!app.match(allowedAppNameRegex)) {
return Promise.reject(new Error(`Disallowed run-as user: ${app}`));
}
if (command.match(/[']/)) {
return Promise.reject(new Error(`Disallowed escaping command: ${command}`));
}
return adb
.then(client =>
client.shell(deviceId, `echo '${command}' | run-as '${app}'`),
)
.then(adbkit.util.readAll)
.then(buffer => buffer.toString())
.then(output => {
if (output.match(appNotDebuggableRegex)) {
throw new Error(
`Android app ${app} is not debuggable. To use it with Flipper, add android:debuggable="true" to the application section of AndroidManifest.xml`,
);
}
if (output.toLowerCase().match(operationNotPermittedRegex)) {
throw new Error(
`Your android device (${deviceId}) does not support the adb shell run-as command. We're tracking this at https://github.com/facebook/flipper/issues/92`,
);
}
return output;
});
}
import {
validateAppName,
validateFilePath,
validateFileContent,
_push,
_pull,
} from './androidContainerUtilityInternal';
export function push(
deviceId: string,
app: string,
filename: string,
filepath: string,
contents: string,
): Promise<void> {
console.debug(`Deploying ${filename} to ${deviceId}:${app}`, logTag);
return executeCommandAsApp(
deviceId,
app,
`echo "${contents}" > ${filename} && chmod 600 ${filename}`,
).then(output => undefined);
return validateAppName(app).then(validApp =>
validateFilePath(filepath).then(validFilepath =>
validateFileContent(contents).then(validContent =>
_push(deviceId, validApp, validFilepath, validContent),
),
),
);
}
export function pull(
deviceId: string,
app: string,
path: string,
): Promise<string> {
return validateAppName(app).then(validApp =>
validateFilePath(path).then(validPath =>
_pull(deviceId, validApp, validPath),
),
);
}

View File

@@ -0,0 +1,98 @@
/**
* Copyright 2018-present Facebook.
* This source code is licensed under the MIT license found in the
* LICENSE file in the root directory of this source tree.
* @format
*/
/*
* This file is intentionally separate from androidContainerUtility so the
* opaque types will ensure the commands are only ever run on validated
* arguments.
*/
import {getAdbClient} from './adbClient';
const adbkit = require('adbkit-fb');
const allowedAppNameRegex = /^[a-zA-Z0-9._\-]+$/;
const appNotDebuggableRegex = /debuggable/;
const operationNotPermittedRegex = /not permitted/;
const logTag = 'androidContainerUtility';
const adb = getAdbClient();
export opaque type AppName = string;
export opaque type Command = string;
export opaque type FilePath = string;
export opaque type FileContent = string;
export function validateAppName(app: string): Promise<AppName> {
if (app.match(allowedAppNameRegex)) {
return Promise.resolve(app);
}
return Promise.reject(new Error(`Disallowed run-as user: ${app}`));
}
export function validateFilePath(filePath: string): Promise<FilePath> {
if (!filePath.match(/[']/)) {
return Promise.resolve(filePath);
}
return Promise.reject(new Error(`Disallowed escaping filepath: ${filePath}`));
}
export function validateFileContent(content: string): Promise<FileContent> {
if (!content.match(/["]/)) {
return Promise.resolve(content);
}
return Promise.reject(
new Error(`Disallowed escaping file content: ${content}`),
);
}
export function _push(
deviceId: string,
app: AppName,
filename: FilePath,
contents: FileContent,
): Promise<void> {
console.debug(`Deploying ${filename} to ${deviceId}:${app}`, logTag);
return executeCommandAsApp(
deviceId,
app,
`echo "${contents}" > '${filename}' && chmod 600 '${filename}'`,
).then(output => undefined);
}
export function _pull(
deviceId: string,
app: AppName,
path: FilePath,
): Promise<string> {
return executeCommandAsApp(deviceId, app, `cat '${path}'`);
}
// Keep this method private since it relies on pre-validated arguments
function executeCommandAsApp(
deviceId: string,
app: string,
command: string,
): Promise<string> {
return adb
.then(client =>
client.shell(deviceId, `echo '${command}' | run-as '${app}'`),
)
.then(adbkit.util.readAll)
.then(buffer => buffer.toString())
.then(output => {
if (output.match(appNotDebuggableRegex)) {
throw new Error(
`Android app ${app} is not debuggable. To use it with Flipper, add android:debuggable="true" to the application section of AndroidManifest.xml`,
);
}
if (output.toLowerCase().match(operationNotPermittedRegex)) {
throw new Error(
`Your android device (${deviceId}) does not support the adb shell run-as command. We're tracking this at https://github.com/facebook/flipper/issues/92`,
);
}
return output;
});
}