[tracker/wip/carlosg/portal: 279/298] libtracker-data: Check graph permissions on graph manipulation syntax
- From: Carlos Garnacho <carlosg src gnome org>
- To: commits-list gnome org
- Cc:
- Subject: [tracker/wip/carlosg/portal: 279/298] libtracker-data: Check graph permissions on graph manipulation syntax
- Date: Fri, 22 May 2020 20:48:55 +0000 (UTC)
commit 1073d39b71f603c333d6645070d6fe1cff99e3dc
Author: Carlos Garnacho <carlosg gnome org>
Date: Sat Jan 25 13:54:20 2020 +0100
libtracker-data: Check graph permissions on graph manipulation syntax
Check when handling CREATE/DROP/ADD/MOVE/COPY that the graph can be
accessed.
src/libtracker-data/tracker-sparql.c | 40 ++++++++++++++++++++++++++++++++++++
1 file changed, 40 insertions(+)
---
diff --git a/src/libtracker-data/tracker-sparql.c b/src/libtracker-data/tracker-sparql.c
index 5b99e3bbf..999f5d4a7 100644
--- a/src/libtracker-data/tracker-sparql.c
+++ b/src/libtracker-data/tracker-sparql.c
@@ -3875,6 +3875,14 @@ translate_Drop (TrackerSparql *sparql,
}
for (l = graphs; l; l = l->next) {
+ if (!tracker_sparql_graph_is_whitelisted (sparql, l->data)) {
+ inner_error = g_error_new (TRACKER_SPARQL_ERROR,
+ TRACKER_SPARQL_ERROR_CONSTRAINT,
+ "Graph '%s' disallowed by policy",
+ (const gchar *) l->data);
+ break;
+ }
+
if (!tracker_data_manager_drop_graph (sparql->data_manager,
l->data, &inner_error))
break;
@@ -3913,6 +3921,14 @@ translate_Create (TrackerSparql *sparql,
goto error;
}
+ if (!tracker_sparql_graph_is_whitelisted (sparql, graph_name)) {
+ inner_error = g_error_new (TRACKER_SPARQL_ERROR,
+ TRACKER_SPARQL_ERROR_CONSTRAINT,
+ "Graph '%s' disallowed by policy",
+ graph_name);
+ goto error;
+ }
+
if (!tracker_data_manager_create_graph (sparql->data_manager,
graph_name,
&inner_error))
@@ -3961,6 +3977,14 @@ translate_Add (TrackerSparql *sparql,
goto error;
}
+ if (!tracker_sparql_graph_is_whitelisted (sparql, destination)) {
+ inner_error = g_error_new (TRACKER_SPARQL_ERROR,
+ TRACKER_SPARQL_ERROR_CONSTRAINT,
+ "Graph '%s' disallowed by policy",
+ destination);
+ goto error;
+ }
+
if (destination &&
!tracker_sparql_find_graph (sparql, destination)) {
if (!tracker_data_manager_create_graph (sparql->data_manager,
@@ -4023,6 +4047,14 @@ translate_Move (TrackerSparql *sparql,
goto error;
}
+ if (!tracker_sparql_graph_is_whitelisted (sparql, destination)) {
+ inner_error = g_error_new (TRACKER_SPARQL_ERROR,
+ TRACKER_SPARQL_ERROR_CONSTRAINT,
+ "Graph '%s' disallowed by policy",
+ destination);
+ goto error;
+ }
+
if (destination &&
!tracker_sparql_find_graph (sparql, destination)) {
if (!tracker_data_manager_create_graph (sparql->data_manager,
@@ -4097,6 +4129,14 @@ translate_Copy (TrackerSparql *sparql,
goto error;
}
+ if (!tracker_sparql_graph_is_whitelisted (sparql, destination)) {
+ inner_error = g_error_new (TRACKER_SPARQL_ERROR,
+ TRACKER_SPARQL_ERROR_CONSTRAINT,
+ "Graph '%s' disallowed by policy",
+ destination);
+ goto error;
+ }
+
if (destination &&
!tracker_sparql_find_graph (sparql, destination)) {
if (!tracker_data_manager_create_graph (sparql->data_manager,
[
Date Prev][
Date Next] [
Thread Prev][
Thread Next]
[
Thread Index]
[
Date Index]
[
Author Index]