]> git.netwichtig.de Git - user/henk/code/inspircd.git/blobdiff - src/modules/m_httpd_acl.cpp
Use Utils->ServerUser instead of ServerInstance->FakeClient in m_spanningtree
[user/henk/code/inspircd.git] / src / modules / m_httpd_acl.cpp
index 18270507ca627840d5ce4c0069a58c2c8c885284..ceb3294719bf24af5cc4a2680649abdab5200699 100644 (file)
@@ -2,8 +2,8 @@
  *       | Inspire Internet Relay Chat Daemon |
  *       +------------------------------------+
  *
- *  InspIRCd: (C) 2002-2008 InspIRCd Development Team
- * See: http://www.inspircd.org/wiki/index.php/Credits
+ *  InspIRCd: (C) 2002-2009 InspIRCd Development Team
+ * See: http://wiki.inspircd.org/Credits
  *
  * This program is free but copyrighted software; see
  *         the file COPYING for details.
 #include "inspircd.h"
 #include "httpd.h"
 #include "protocol.h"
-#include "wildcard.h"
 
 /* $ModDesc: Provides access control lists (passwording of resources, ip restrictions etc) to m_httpd.so dependent modules */
 /* $ModDep: httpd.h */
 
-class ACL : public Extensible
+class HTTPACL : public Extensible
 {
  public:
        std::string path;
+       std::string username;
        std::string password;
        std::string whitelist;
        std::string blacklist;
 
-       ACL(const std::string &set_path, const std::string &set_password,
+       HTTPACL(const std::string &set_path, const std::string &set_username, const std::string &set_password,
                const std::string &set_whitelist, const std::string &set_blacklist)
-               : path(set_path), password(set_password), whitelist(set_whitelist),
+               : path(set_path), username(set_username), password(set_password), whitelist(set_whitelist),
                blacklist(set_blacklist) { }
 
-       ~ACL() { }
+       ~HTTPACL() { }
 };
 
 class ModuleHTTPAccessList : public Module
 {
-       
+
        std::string stylesheet;
        bool changed;
-       std::vector<ACL> acl_list;
+       std::vector<HTTPACL> acl_list;
 
  public:
 
@@ -48,13 +48,14 @@ class ModuleHTTPAccessList : public Module
        {
                acl_list.clear();
                ConfigReader c(ServerInstance);
-               int n_items = c.Enumerate("httpacl");
+               int n_items = c.Enumerate("httpdacl");
                for (int i = 0; i < n_items; ++i)
                {
-                       std::string path = c.ReadValue("httpacl", "path", i);
-                       std::string types = c.ReadValue("httpacl", "types", i);
+                       std::string path = c.ReadValue("httpdacl", "path", i);
+                       std::string types = c.ReadValue("httpdacl", "types", i);
                        irc::commasepstream sep(types);
                        std::string type;
+                       std::string username;
                        std::string password;
                        std::string whitelist;
                        std::string blacklist;
@@ -63,15 +64,16 @@ class ModuleHTTPAccessList : public Module
                        {
                                if (type == "password")
                                {
-                                       password = c.ReadValue("httpacl", "password", i);
+                                       username = c.ReadValue("httpdacl", "username", i);
+                                       password = c.ReadValue("httpdacl", "password", i);
                                }
                                else if (type == "whitelist")
                                {
-                                       whitelist = c.ReadValue("httpacl", "whitelist", i);
+                                       whitelist = c.ReadValue("httpdacl", "whitelist", i);
                                }
                                else if (type == "blacklist")
                                {
-                                       blacklist = c.ReadValue("httpacl", "blacklist", i);
+                                       blacklist = c.ReadValue("httpdacl", "blacklist", i);
                                }
                                else
                                {
@@ -79,55 +81,195 @@ class ModuleHTTPAccessList : public Module
                                }
                        }
 
-                       acl_list.push_back(ACL(path, password, whitelist, blacklist));
+                       ServerInstance->Logs->Log("m_httpd_acl", DEBUG, "Read ACL: path=%s pass=%s whitelist=%s blacklist=%s", path.c_str(),
+                                       password.c_str(), whitelist.c_str(), blacklist.c_str());
+
+                       acl_list.push_back(HTTPACL(path, username, password, whitelist, blacklist));
                }
        }
 
        ModuleHTTPAccessList(InspIRCd* Me) : Module(Me)
        {
                ReadConfig();
-               this->changed = true;
                Implementation eventlist[] = { I_OnEvent, I_OnRequest };
                ServerInstance->Modules->Attach(eventlist, this, 2);
        }
 
-       void OnEvent(Event* event)
+       void BlockAccess(HTTPRequest* http, Event* event, int returnval, const std::string &extraheaderkey = "", const std::string &extraheaderval="")
+       {
+               ServerInstance->Logs->Log("m_httpd_acl", DEBUG, "BlockAccess (%d)", returnval);
+
+               std::stringstream data("Access to this resource is denied by an access control list. Please contact your IRC administrator.");
+               HTTPDocument response(http->sock, &data, returnval);
+               response.headers.SetHeader("X-Powered-By", "m_httpd_acl.so");
+               if (!extraheaderkey.empty())
+                       response.headers.SetHeader(extraheaderkey, extraheaderval);
+               Request req((char*)&response, (Module*)this, event->GetSource());
+               req.Send();
+       }
+
+       bool IsBase64(unsigned char c)
+       {
+               return (isalnum(c) || (c == '+') || (c == '/'));
+       }
+
+       std::string Base64Decode(const std::string &base64)
        {
-               std::stringstream data("");
+               const std::string base64_chars("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/");
+               int inputlen = base64.length();
+               int i = 0, j = 0, input = 0;
+               unsigned char longbuf[4], shortbuf[3];
+               std::string retval;
 
-               if (event->GetEventID() == "httpd_url")
+               if (inputlen == 0)
+                       return "";
+
+               while (inputlen-- && (base64[input] != '=') && IsBase64(base64[input]))
+               {
+                       longbuf[i++] = base64[input];
+                       input++;
+                       if (i == 4)
+                       {
+                               for (i = 0; i < 4; ++i)
+                                       longbuf[i] = base64_chars.find(longbuf[i]);
+
+                               shortbuf[0] = (longbuf[0] << 2)         + ((longbuf[1] & 0x30) >> 4);
+                               shortbuf[1] = ((longbuf[1] & 0xf) << 4) + ((longbuf[2] & 0x3c) >> 2);
+                               shortbuf[2] = ((longbuf[2] & 0x3) << 6) + longbuf[3];
+
+                               for (i = 0; i < 3; ++i)
+                                       retval += shortbuf[i];
+
+                               i = 0;
+                       }
+               }
+
+               if (i)
                {
-                       ServerInstance->Logs->Log("m_http_stats", DEBUG,"Handling httpd event");
+                       for (j = i; j < 4; ++j)
+                               longbuf[j] = 0;
+
+                       for (j = 0; j < 4; ++j)
+                               longbuf[j] = base64_chars.find(longbuf[j]);
+
+                       shortbuf[0] = (longbuf[0] << 2)         + ((longbuf[1] & 0x30) >> 4);
+                       shortbuf[1] = ((longbuf[1] & 0xf) << 4) + ((longbuf[2] & 0x3c) >> 2);
+                       shortbuf[2] = ((longbuf[2] & 0x3) << 6) + longbuf[3];
+
+                       for (j = 0; j < i - 1; ++j)
+                               retval += shortbuf[j];
+               }
+
+               return retval;
+       }
+
+       void OnEvent(Event* event)
+       {
+               if (event->GetEventID() == "httpd_acl")
+               {
+                       ServerInstance->Logs->Log("m_http_stats", DEBUG,"Handling httpd acl event");
                        HTTPRequest* http = (HTTPRequest*)event->GetData();
 
-                       for (std::vector<ACL>::const_iterator this_acl = acl_list.begin(); this_acl != acl_list.end(); ++this_acl)
+                       for (std::vector<HTTPACL>::const_iterator this_acl = acl_list.begin(); this_acl != acl_list.end(); ++this_acl)
                        {
-                               if (match(http->GetURI(), this_acl->path))
+                               if (InspIRCd::Match(http->GetURI(), this_acl->path, ascii_case_insensitive_map))
                                {
                                        if (!this_acl->blacklist.empty())
                                        {
                                                /* Blacklist */
+                                               irc::commasepstream sep(this_acl->blacklist);
+                                               std::string entry;
+
+                                               while (sep.GetToken(entry))
+                                               {
+                                                       if (InspIRCd::Match(http->GetIP(), entry, ascii_case_insensitive_map))
+                                                       {
+                                                               ServerInstance->Logs->Log("m_httpd_acl", DEBUG, "Denying access to blacklisted resource %s (matched by pattern %s) from ip %s (matched by entry %s)",
+                                                                               http->GetURI().c_str(), this_acl->path.c_str(), http->GetIP().c_str(), entry.c_str());
+                                                               BlockAccess(http, event, 403);
+                                                               return;
+                                                       }
+                                               }
                                        }
                                        if (!this_acl->whitelist.empty())
                                        {
                                                /* Whitelist */
+                                               irc::commasepstream sep(this_acl->whitelist);
+                                               std::string entry;
+                                               bool allow_access = false;
+
+                                               while (sep.GetToken(entry))
+                                               {
+                                                       if (InspIRCd::Match(http->GetIP(), entry, ascii_case_insensitive_map))
+                                                               allow_access = true;
+                                               }
+
+                                               if (!allow_access)
+                                               {
+                                                       ServerInstance->Logs->Log("m_httpd_acl", DEBUG, "Denying access to whitelisted resource %s (matched by pattern %s) from ip %s (Not in whitelist)",
+                                                                       http->GetURI().c_str(), this_acl->path.c_str(), http->GetIP().c_str());
+                                                       BlockAccess(http, event, 403);
+                                                       return;
+                                               }
                                        }
-                                       if (!this_acl->password.empty())
+                                       if (!this_acl->password.empty() && !this_acl->username.empty())
                                        {
-                                               /* Password auth */
+                                               /* Password auth, first look to see if we have a basic authentication header */
+                                               ServerInstance->Logs->Log("m_httpd_acl", DEBUG, "Checking HTTP auth password for resource %s (matched by pattern %s) from ip %s, against username %s",
+                                                               http->GetURI().c_str(), this_acl->path.c_str(), http->GetIP().c_str(), this_acl->username.c_str());
+
+                                               if (http->headers->IsSet("Authorization"))
+                                               {
+                                                       /* Password has been given, validate it */
+                                                       std::string authorization = http->headers->GetHeader("Authorization");
+                                                       irc::spacesepstream sep(authorization);
+                                                       std::string authtype;
+                                                       std::string base64;
+
+                                                       sep.GetToken(authtype);
+                                                       if (authtype == "Basic")
+                                                       {
+                                                               std::string user;
+                                                               std::string pass;
+
+                                                               sep.GetToken(base64);
+                                                               std::string userpass = Base64Decode(base64);
+                                                               ServerInstance->Logs->Log("m_httpd_acl", DEBUG, "HTTP authorization: %s (%s)", userpass.c_str(), base64.c_str());
+
+                                                               irc::sepstream userpasspair(userpass, ':');
+                                                               if (userpasspair.GetToken(user))
+                                                               {
+                                                                       userpasspair.GetToken(pass);
+
+                                                                       /* Access granted if username and password are correct */
+                                                                       if (user == this_acl->username && pass == this_acl->password)
+                                                                       {
+                                                                               ServerInstance->Logs->Log("m_httpd_acl", DEBUG, "HTTP authorization: password and username match");
+                                                                               return;
+                                                                       }
+                                                                       else
+                                                                               /* Invalid password */
+                                                                               BlockAccess(http, event, 401, "WWW-Authenticate", "Basic realm=\"Restricted Object\"");
+                                                               }
+                                                               else
+                                                                       /* Malformed user:pass pair */
+                                                                       BlockAccess(http, event, 401, "WWW-Authenticate", "Basic realm=\"Restricted Object\"");
+                                                       }
+                                                       else
+                                                               /* Unsupported authentication type */
+                                                               BlockAccess(http, event, 401, "WWW-Authenticate", "Basic realm=\"Restricted Object\"");
+                                               }
+                                               else
+                                               {
+                                                       /* No password given at all, access denied */
+                                                       BlockAccess(http, event, 401, "WWW-Authenticate", "Basic realm=\"Restricted Object\"");
+                                               }
                                        }
+
+                                       /* A path may only match one ACL (the first it finds in the config file) */
+                                       return;
                                }
                        }
-
-                       //if ((http->GetURI() == "/stats") || (http->GetURI() == "/stats/"))
-                       //{
-                               /* Send the document back to m_httpd */
-                       //      HTTPDocument response(http->sock, &data, 200);
-                       //      response.headers.SetHeader("X-Powered-By", "m_httpd_stats.so");
-                       //      response.headers.SetHeader("Content-Type", "text/xml");
-                       //      Request req((char*)&response, (Module*)this, event->GetSource());
-                       //      req.Send();
-                       //}
                }
        }
 
@@ -142,7 +284,7 @@ class ModuleHTTPAccessList : public Module
 
        virtual Version GetVersion()
        {
-               return Version(1, 2, 0, 0, VF_VENDOR, API_VERSION);
+               return Version("$Id$", VF_VENDOR, API_VERSION);
        }
 };