2 * InspIRCd -- Internet Relay Chat Daemon
4 * Copyright (C) 2009-2010 Daniel De Graaf <danieldg@inspircd.org>
5 * Copyright (C) 2008 Craig Edwards <craigedwards@brainbox.cc>
7 * This file is part of InspIRCd. InspIRCd is free software: you can
8 * redistribute it and/or modify it under the terms of the GNU General Public
9 * License as published by the Free Software Foundation, version 2.
11 * This program is distributed in the hope that it will be useful, but WITHOUT
12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
13 * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
16 * You should have received a copy of the GNU General Public License
17 * along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "modules/httpd.h"
31 std::string whitelist;
32 std::string blacklist;
34 HTTPACL(const std::string &set_path, const std::string &set_username, const std::string &set_password,
35 const std::string &set_whitelist, const std::string &set_blacklist)
36 : path(set_path), username(set_username), password(set_password), whitelist(set_whitelist),
37 blacklist(set_blacklist) { }
40 class ModuleHTTPAccessList : public Module
42 std::string stylesheet;
43 std::vector<HTTPACL> acl_list;
47 ModuleHTTPAccessList()
52 void ReadConfig(ConfigStatus& status) CXX11_OVERRIDE
55 ConfigTagList acls = ServerInstance->Config->ConfTags("httpdacl");
56 for (ConfigIter i = acls.first; i != acls.second; i++)
58 ConfigTag* c = i->second;
59 std::string path = c->getString("path");
60 std::string types = c->getString("types");
61 irc::commasepstream sep(types);
65 std::string whitelist;
66 std::string blacklist;
68 while (sep.GetToken(type))
70 if (type == "password")
72 username = c->getString("username");
73 password = c->getString("password");
75 else if (type == "whitelist")
77 whitelist = c->getString("whitelist");
79 else if (type == "blacklist")
81 blacklist = c->getString("blacklist");
85 throw ModuleException("Invalid HTTP ACL type '" + type + "'");
89 ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "Read ACL: path=%s pass=%s whitelist=%s blacklist=%s", path.c_str(),
90 password.c_str(), whitelist.c_str(), blacklist.c_str());
92 acl_list.push_back(HTTPACL(path, username, password, whitelist, blacklist));
96 void BlockAccess(HTTPRequest* http, int returnval, const std::string &extraheaderkey = "", const std::string &extraheaderval="")
98 ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "BlockAccess (%d)", returnval);
100 std::stringstream data("Access to this resource is denied by an access control list. Please contact your IRC administrator.");
101 HTTPDocumentResponse response(this, *http, &data, returnval);
102 response.headers.SetHeader("X-Powered-By", MODNAME);
103 if (!extraheaderkey.empty())
104 response.headers.SetHeader(extraheaderkey, extraheaderval);
105 API->SendResponse(response);
108 void OnEvent(Event& event) CXX11_OVERRIDE
110 if (event.id == "httpd_acl")
112 ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "Handling httpd acl event");
113 HTTPRequest* http = (HTTPRequest*)&event;
115 for (std::vector<HTTPACL>::const_iterator this_acl = acl_list.begin(); this_acl != acl_list.end(); ++this_acl)
117 if (InspIRCd::Match(http->GetURI(), this_acl->path, ascii_case_insensitive_map))
119 if (!this_acl->blacklist.empty())
122 irc::commasepstream sep(this_acl->blacklist);
125 while (sep.GetToken(entry))
127 if (InspIRCd::Match(http->GetIP(), entry, ascii_case_insensitive_map))
129 ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "Denying access to blacklisted resource %s (matched by pattern %s) from ip %s (matched by entry %s)",
130 http->GetURI().c_str(), this_acl->path.c_str(), http->GetIP().c_str(), entry.c_str());
131 BlockAccess(http, 403);
136 if (!this_acl->whitelist.empty())
139 irc::commasepstream sep(this_acl->whitelist);
141 bool allow_access = false;
143 while (sep.GetToken(entry))
145 if (InspIRCd::Match(http->GetIP(), entry, ascii_case_insensitive_map))
151 ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "Denying access to whitelisted resource %s (matched by pattern %s) from ip %s (Not in whitelist)",
152 http->GetURI().c_str(), this_acl->path.c_str(), http->GetIP().c_str());
153 BlockAccess(http, 403);
157 if (!this_acl->password.empty() && !this_acl->username.empty())
159 /* Password auth, first look to see if we have a basic authentication header */
160 ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "Checking HTTP auth password for resource %s (matched by pattern %s) from ip %s, against username %s",
161 http->GetURI().c_str(), this_acl->path.c_str(), http->GetIP().c_str(), this_acl->username.c_str());
163 if (http->headers->IsSet("Authorization"))
165 /* Password has been given, validate it */
166 std::string authorization = http->headers->GetHeader("Authorization");
167 irc::spacesepstream sep(authorization);
168 std::string authtype;
171 sep.GetToken(authtype);
172 if (authtype == "Basic")
177 sep.GetToken(base64);
178 std::string userpass = Base64ToBin(base64);
179 ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "HTTP authorization: %s (%s)", userpass.c_str(), base64.c_str());
181 irc::sepstream userpasspair(userpass, ':');
182 if (userpasspair.GetToken(user))
184 userpasspair.GetToken(pass);
186 /* Access granted if username and password are correct */
187 if (user == this_acl->username && pass == this_acl->password)
189 ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "HTTP authorization: password and username match");
193 /* Invalid password */
194 BlockAccess(http, 401, "WWW-Authenticate", "Basic realm=\"Restricted Object\"");
197 /* Malformed user:pass pair */
198 BlockAccess(http, 401, "WWW-Authenticate", "Basic realm=\"Restricted Object\"");
201 /* Unsupported authentication type */
202 BlockAccess(http, 401, "WWW-Authenticate", "Basic realm=\"Restricted Object\"");
206 /* No password given at all, access denied */
207 BlockAccess(http, 401, "WWW-Authenticate", "Basic realm=\"Restricted Object\"");
211 /* A path may only match one ACL (the first it finds in the config file) */
218 Version GetVersion() CXX11_OVERRIDE
220 return Version("Provides access control lists (passwording of resources, ip restrictions etc) to m_httpd.so dependent modules", VF_VENDOR);
224 MODULE_INIT(ModuleHTTPAccessList)