#include "inspircd.h"
#include "httpd.h"
#include "protocol.h"
-#include "wildcard.h"
/* $ModDesc: Provides access control lists (passwording of resources, ip restrictions etc) to m_httpd.so dependent modules */
/* $ModDep: httpd.h */
-class ACL : public Extensible
+class HTTPACL : public Extensible
{
public:
std::string path;
+ std::string username;
std::string password;
std::string whitelist;
std::string blacklist;
- ACL(const std::string &set_path, const std::string &set_password,
+ HTTPACL(const std::string &set_path, const std::string &set_username, const std::string &set_password,
const std::string &set_whitelist, const std::string &set_blacklist)
- : path(set_path), password(set_password), whitelist(set_whitelist),
+ : path(set_path), username(set_username), password(set_password), whitelist(set_whitelist),
blacklist(set_blacklist) { }
- ~ACL() { }
+ ~HTTPACL() { }
};
class ModuleHTTPAccessList : public Module
{
-
+
std::string stylesheet;
bool changed;
- std::vector<ACL> acl_list;
+ std::vector<HTTPACL> acl_list;
public:
{
acl_list.clear();
ConfigReader c(ServerInstance);
- int n_items = c.Enumerate("httpacl");
+ int n_items = c.Enumerate("httpdacl");
for (int i = 0; i < n_items; ++i)
{
- std::string path = c.ReadValue("httpacl", "path", i);
- std::string types = c.ReadValue("httpacl", "types", i);
+ std::string path = c.ReadValue("httpdacl", "path", i);
+ std::string types = c.ReadValue("httpdacl", "types", i);
irc::commasepstream sep(types);
std::string type;
+ std::string username;
std::string password;
std::string whitelist;
std::string blacklist;
{
if (type == "password")
{
- password = c.ReadValue("httpacl", "password", i);
+ username = c.ReadValue("httpdacl", "username", i);
+ password = c.ReadValue("httpdacl", "password", i);
}
else if (type == "whitelist")
{
- whitelist = c.ReadValue("httpacl", "whitelist", i);
+ whitelist = c.ReadValue("httpdacl", "whitelist", i);
}
else if (type == "blacklist")
{
- blacklist = c.ReadValue("httpacl", "blacklist", i);
+ blacklist = c.ReadValue("httpdacl", "blacklist", i);
}
else
{
}
}
- acl_list.push_back(ACL(path, password, whitelist, blacklist));
+ ServerInstance->Logs->Log("m_httpd_acl", DEBUG, "Read ACL: path=%s pass=%s whitelist=%s blacklist=%s", path.c_str(),
+ password.c_str(), whitelist.c_str(), blacklist.c_str());
+
+ acl_list.push_back(HTTPACL(path, username, password, whitelist, blacklist));
}
}
ModuleHTTPAccessList(InspIRCd* Me) : Module(Me)
{
ReadConfig();
- this->changed = true;
Implementation eventlist[] = { I_OnEvent, I_OnRequest };
ServerInstance->Modules->Attach(eventlist, this, 2);
}
- void OnEvent(Event* event)
+ void BlockAccess(HTTPRequest* http, Event* event, int returnval, const std::string &extraheaderkey = "", const std::string &extraheaderval="")
+ {
+ ServerInstance->Logs->Log("m_httpd_acl", DEBUG, "BlockAccess (%d)", returnval);
+
+ std::stringstream data("Access to this resource is denied by an access control list. Please contact your IRC administrator.");
+ HTTPDocument response(http->sock, &data, returnval);
+ response.headers.SetHeader("X-Powered-By", "m_httpd_acl.so");
+ if (!extraheaderkey.empty())
+ response.headers.SetHeader(extraheaderkey, extraheaderval);
+ Request req((char*)&response, (Module*)this, event->GetSource());
+ req.Send();
+ }
+
+ bool IsBase64(unsigned char c)
+ {
+ return (isalnum(c) || (c == '+') || (c == '/'));
+ }
+
+ std::string Base64Decode(const std::string &base64)
{
- std::stringstream data("");
+ const std::string base64_chars("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/");
+ int inputlen = base64.length();
+ int i = 0, j = 0, input = 0;
+ unsigned char longbuf[4], shortbuf[3];
+ std::string retval;
- if (event->GetEventID() == "httpd_url")
+ if (inputlen == 0)
+ return "";
+
+ while (inputlen-- && (base64[input] != '=') && IsBase64(base64[input]))
+ {
+ longbuf[i++] = base64[input];
+ input++;
+ if (i == 4)
+ {
+ for (i = 0; i < 4; ++i)
+ longbuf[i] = base64_chars.find(longbuf[i]);
+
+ shortbuf[0] = (longbuf[0] << 2) + ((longbuf[1] & 0x30) >> 4);
+ shortbuf[1] = ((longbuf[1] & 0xf) << 4) + ((longbuf[2] & 0x3c) >> 2);
+ shortbuf[2] = ((longbuf[2] & 0x3) << 6) + longbuf[3];
+
+ for (i = 0; i < 3; ++i)
+ retval += shortbuf[i];
+
+ i = 0;
+ }
+ }
+
+ if (i)
{
- ServerInstance->Logs->Log("m_http_stats", DEBUG,"Handling httpd event");
+ for (j = i; j < 4; ++j)
+ longbuf[j] = 0;
+
+ for (j = 0; j < 4; ++j)
+ longbuf[j] = base64_chars.find(longbuf[j]);
+
+ shortbuf[0] = (longbuf[0] << 2) + ((longbuf[1] & 0x30) >> 4);
+ shortbuf[1] = ((longbuf[1] & 0xf) << 4) + ((longbuf[2] & 0x3c) >> 2);
+ shortbuf[2] = ((longbuf[2] & 0x3) << 6) + longbuf[3];
+
+ for (j = 0; j < i - 1; ++j)
+ retval += shortbuf[j];
+ }
+
+ return retval;
+ }
+
+ void OnEvent(Event* event)
+ {
+ if (event->GetEventID() == "httpd_acl")
+ {
+ ServerInstance->Logs->Log("m_http_stats", DEBUG,"Handling httpd acl event");
HTTPRequest* http = (HTTPRequest*)event->GetData();
- for (std::vector<ACL>::const_iterator this_acl = acl_list.begin(); this_acl != acl_list.end(); ++this_acl)
+ for (std::vector<HTTPACL>::const_iterator this_acl = acl_list.begin(); this_acl != acl_list.end(); ++this_acl)
{
- if (match(http->GetURI(), this_acl->path))
+ if (InspIRCd::Match(http->GetURI(), this_acl->path, ascii_case_insensitive_map))
{
if (!this_acl->blacklist.empty())
{
/* Blacklist */
+ irc::commasepstream sep(this_acl->blacklist);
+ std::string entry;
+
+ while (sep.GetToken(entry))
+ {
+ if (InspIRCd::Match(http->GetIP(), entry, ascii_case_insensitive_map))
+ {
+ ServerInstance->Logs->Log("m_httpd_acl", DEBUG, "Denying access to blacklisted resource %s (matched by pattern %s) from ip %s (matched by entry %s)",
+ http->GetURI().c_str(), this_acl->path.c_str(), http->GetIP().c_str(), entry.c_str());
+ BlockAccess(http, event, 403);
+ return;
+ }
+ }
}
if (!this_acl->whitelist.empty())
{
/* Whitelist */
+ irc::commasepstream sep(this_acl->whitelist);
+ std::string entry;
+ bool allow_access = false;
+
+ while (sep.GetToken(entry))
+ {
+ if (InspIRCd::Match(http->GetIP(), entry, ascii_case_insensitive_map))
+ allow_access = true;
+ }
+
+ if (!allow_access)
+ {
+ ServerInstance->Logs->Log("m_httpd_acl", DEBUG, "Denying access to whitelisted resource %s (matched by pattern %s) from ip %s (Not in whitelist)",
+ http->GetURI().c_str(), this_acl->path.c_str(), http->GetIP().c_str());
+ BlockAccess(http, event, 403);
+ return;
+ }
}
- if (!this_acl->password.empty())
+ if (!this_acl->password.empty() && !this_acl->username.empty())
{
- /* Password auth */
+ /* Password auth, first look to see if we have a basic authentication header */
+ ServerInstance->Logs->Log("m_httpd_acl", DEBUG, "Checking HTTP auth password for resource %s (matched by pattern %s) from ip %s, against username %s",
+ http->GetURI().c_str(), this_acl->path.c_str(), http->GetIP().c_str(), this_acl->username.c_str());
+
+ if (http->headers->IsSet("Authorization"))
+ {
+ /* Password has been given, validate it */
+ std::string authorization = http->headers->GetHeader("Authorization");
+ irc::spacesepstream sep(authorization);
+ std::string authtype;
+ std::string base64;
+
+ sep.GetToken(authtype);
+ if (authtype == "Basic")
+ {
+ std::string user;
+ std::string pass;
+
+ sep.GetToken(base64);
+ std::string userpass = Base64Decode(base64);
+ ServerInstance->Logs->Log("m_httpd_acl", DEBUG, "HTTP authorization: %s (%s)", userpass.c_str(), base64.c_str());
+
+ irc::sepstream userpasspair(userpass, ':');
+ if (userpasspair.GetToken(user))
+ {
+ userpasspair.GetToken(pass);
+
+ /* Access granted if username and password are correct */
+ if (user == this_acl->username && pass == this_acl->password)
+ {
+ ServerInstance->Logs->Log("m_httpd_acl", DEBUG, "HTTP authorization: password and username match");
+ return;
+ }
+ else
+ /* Invalid password */
+ BlockAccess(http, event, 401, "WWW-Authenticate", "Basic realm=\"Restricted Object\"");
+ }
+ else
+ /* Malformed user:pass pair */
+ BlockAccess(http, event, 401, "WWW-Authenticate", "Basic realm=\"Restricted Object\"");
+ }
+ else
+ /* Unsupported authentication type */
+ BlockAccess(http, event, 401, "WWW-Authenticate", "Basic realm=\"Restricted Object\"");
+ }
+ else
+ {
+ /* No password given at all, access denied */
+ BlockAccess(http, event, 401, "WWW-Authenticate", "Basic realm=\"Restricted Object\"");
+ }
}
+
+ /* A path may only match one ACL (the first it finds in the config file) */
+ return;
}
}
-
- //if ((http->GetURI() == "/stats") || (http->GetURI() == "/stats/"))
- //{
- /* Send the document back to m_httpd */
- // HTTPDocument response(http->sock, &data, 200);
- // response.headers.SetHeader("X-Powered-By", "m_httpd_stats.so");
- // response.headers.SetHeader("Content-Type", "text/xml");
- // Request req((char*)&response, (Module*)this, event->GetSource());
- // req.Send();
- //}
}
}
virtual Version GetVersion()
{
- return Version(1, 2, 0, 0, VF_VENDOR, API_VERSION);
+ return Version("$Id$", VF_VENDOR, API_VERSION);
}
};