X-Git-Url: https://git.netwichtig.de/gitweb/?a=blobdiff_plain;f=src%2Fmodules%2Fm_httpd_acl.cpp;h=270e8b007ec94ef93e18122594f8bc83f70b25cf;hb=b4a174ee9c32d62ea6bf010e837e8c5b1c3d36a3;hp=903e83f26e8ea1dc92b8a3a9da0d61f7264860a7;hpb=8f7f74cf0f297e2b8476fc4c670515f8940580ea;p=user%2Fhenk%2Fcode%2Finspircd.git diff --git a/src/modules/m_httpd_acl.cpp b/src/modules/m_httpd_acl.cpp index 903e83f26..270e8b007 100644 --- a/src/modules/m_httpd_acl.cpp +++ b/src/modules/m_httpd_acl.cpp @@ -1,77 +1,89 @@ -/* +------------------------------------+ - * | Inspire Internet Relay Chat Daemon | - * +------------------------------------+ +/* + * InspIRCd -- Internet Relay Chat Daemon * - * InspIRCd: (C) 2002-2008 InspIRCd Development Team - * See: http://www.inspircd.org/wiki/index.php/Credits + * Copyright (C) 2018-2019 linuxdaemon + * Copyright (C) 2013, 2017-2018, 2020 Sadie Powell + * Copyright (C) 2013, 2015 Attila Molnar + * Copyright (C) 2012, 2019 Robby + * Copyright (C) 2009-2010 Daniel De Graaf + * Copyright (C) 2008, 2010 Craig Edwards + * Copyright (C) 2008 Robin Burchell * - * This program is free but copyrighted software; see - * the file COPYING for details. + * This file is part of InspIRCd. InspIRCd is free software: you can + * redistribute it and/or modify it under the terms of the GNU General Public + * License as published by the Free Software Foundation, version 2. * - * --------------------------------------------------- + * This program is distributed in the hope that it will be useful, but WITHOUT + * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS + * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more + * details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see . */ -#include "inspircd.h" -#include "httpd.h" -#include "protocol.h" -#include "wildcard.h" -/* $ModDesc: Provides access control lists (passwording of resources, ip restrictions etc) to m_httpd.so dependent modules */ -/* $ModDep: httpd.h */ +#include "inspircd.h" +#include "modules/httpd.h" -class ACL : public Extensible +class HTTPACL { public: std::string path; + std::string username; std::string password; std::string whitelist; std::string blacklist; - ACL(const std::string &set_path, const std::string &set_password, + HTTPACL(const std::string &set_path, const std::string &set_username, const std::string &set_password, const std::string &set_whitelist, const std::string &set_blacklist) - : path(set_path), password(set_password), whitelist(set_whitelist), + : path(set_path), username(set_username), password(set_password), whitelist(set_whitelist), blacklist(set_blacklist) { } - - ~ACL() { } }; -class ModuleHTTPAccessList : public Module +class ModuleHTTPAccessList : public Module, public HTTPACLEventListener { - - std::string stylesheet; - bool changed; - std::vector acl_list; + private: + std::vector acl_list; + HTTPdAPI API; public: + ModuleHTTPAccessList() + : HTTPACLEventListener(this) + , API(this) + { + } - void ReadConfig() + void ReadConfig(ConfigStatus& status) CXX11_OVERRIDE { - acl_list.clear(); - ConfigReader c(ServerInstance); - int n_items = c.Enumerate("httpacl"); - for (int i = 0; i < n_items; ++i) + std::vector new_acls; + ConfigTagList acls = ServerInstance->Config->ConfTags("httpdacl"); + for (ConfigIter i = acls.first; i != acls.second; i++) { - std::string path = c.ReadValue("httpacl", "path", i); - std::string types = c.ReadValue("httpacl", "types", i); + ConfigTag* c = i->second; + std::string path = c->getString("path"); + std::string types = c->getString("types"); irc::commasepstream sep(types); std::string type; + std::string username; std::string password; std::string whitelist; std::string blacklist; while (sep.GetToken(type)) { - if (type == "password") + if (stdalgo::string::equalsci(type, "password")) { - password = c.ReadValue("httpacl", "password", i); + username = c->getString("username"); + password = c->getString("password"); } - else if (type == "whitelist") + else if (stdalgo::string::equalsci(type, "whitelist")) { - whitelist = c.ReadValue("httpacl", "whitelist", i); + whitelist = c->getString("whitelist"); } - else if (type == "blacklist") + else if (stdalgo::string::equalsci(type, "blacklist")) { - blacklist = c.ReadValue("httpacl", "blacklist", i); + blacklist = c->getString("blacklist"); } else { @@ -79,39 +91,40 @@ class ModuleHTTPAccessList : public Module } } - acl_list.push_back(ACL(path, password, whitelist, blacklist)); - } - } + ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "Read ACL: path=%s pass=%s whitelist=%s blacklist=%s", path.c_str(), + password.c_str(), whitelist.c_str(), blacklist.c_str()); - ModuleHTTPAccessList(InspIRCd* Me) : Module(Me) - { - ReadConfig(); - this->changed = true; - Implementation eventlist[] = { I_OnEvent, I_OnRequest }; - ServerInstance->Modules->Attach(eventlist, this, 2); + new_acls.push_back(HTTPACL(path, username, password, whitelist, blacklist)); + } + acl_list.swap(new_acls); } - void BlockAccess(HTTPRequest* http, Event* event) + void BlockAccess(HTTPRequest* http, unsigned int returnval, const std::string &extraheaderkey = "", const std::string &extraheaderval="") { - std::stringstream data("Access to this resource is denied by an access control list. Please contact your IRC administrator."); - HTTPDocument response(http->sock, &data, 403); - response.headers.SetHeader("X-Powered-By", "m_httpd_acl.so"); - Request req((char*)&response, (Module*)this, event->GetSource()); - req.Send(); + ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "BlockAccess (%u)", returnval); + + std::stringstream data; + data << "" + << "

Error " << returnval << "

" + << "

Access to this resource is denied by an access control list.

" + << "

Please contact your IRC administrator.


" + << "Powered by InspIRCd"; + + HTTPDocumentResponse response(this, *http, &data, returnval); + response.headers.SetHeader("X-Powered-By", MODNAME); + if (!extraheaderkey.empty()) + response.headers.SetHeader(extraheaderkey, extraheaderval); + API->SendResponse(response); } - void OnEvent(Event* event) + bool IsAccessAllowed(HTTPRequest* http) { - std::stringstream data(""); - - if (event->GetEventID() == "httpd_url") { - ServerInstance->Logs->Log("m_http_stats", DEBUG,"Handling httpd event"); - HTTPRequest* http = (HTTPRequest*)event->GetData(); + ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "Handling httpd acl event"); - for (std::vector::const_iterator this_acl = acl_list.begin(); this_acl != acl_list.end(); ++this_acl) + for (std::vector::const_iterator this_acl = acl_list.begin(); this_acl != acl_list.end(); ++this_acl) { - if (match(http->GetURI(), this_acl->path)) + if (InspIRCd::Match(http->GetPath(), this_acl->path, ascii_case_insensitive_map)) { if (!this_acl->blacklist.empty()) { @@ -121,10 +134,12 @@ class ModuleHTTPAccessList : public Module while (sep.GetToken(entry)) { - if (match(http->GetIP(), entry)) + if (InspIRCd::Match(http->GetIP(), entry, ascii_case_insensitive_map)) { - BlockAccess(http, event); - return; + ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "Denying access to blacklisted resource %s (matched by pattern %s) from ip %s (matched by entry %s)", + http->GetPath().c_str(), this_acl->path.c_str(), http->GetIP().c_str(), entry.c_str()); + BlockAccess(http, 403); + return false; } } } @@ -137,37 +152,101 @@ class ModuleHTTPAccessList : public Module while (sep.GetToken(entry)) { - if (match(http->GetIP(), entry)) + if (InspIRCd::Match(http->GetIP(), entry, ascii_case_insensitive_map)) allow_access = true; } if (!allow_access) { - BlockAccess(http, event); - return; + ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "Denying access to whitelisted resource %s (matched by pattern %s) from ip %s (Not in whitelist)", + http->GetPath().c_str(), this_acl->path.c_str(), http->GetIP().c_str()); + BlockAccess(http, 403); + return false; } } - if (!this_acl->password.empty()) + if (!this_acl->password.empty() && !this_acl->username.empty()) { /* Password auth, first look to see if we have a basic authentication header */ + ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "Checking HTTP auth password for resource %s (matched by pattern %s) from ip %s, against username %s", + http->GetPath().c_str(), this_acl->path.c_str(), http->GetIP().c_str(), this_acl->username.c_str()); + + if (http->headers->IsSet("Authorization")) + { + /* Password has been given, validate it */ + std::string authorization = http->headers->GetHeader("Authorization"); + irc::spacesepstream sep(authorization); + std::string authtype; + std::string base64; + + sep.GetToken(authtype); + if (authtype == "Basic") + { + std::string user; + std::string pass; + + sep.GetToken(base64); + std::string userpass = Base64ToBin(base64); + ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "HTTP authorization: %s (%s)", userpass.c_str(), base64.c_str()); + + irc::sepstream userpasspair(userpass, ':'); + if (userpasspair.GetToken(user)) + { + userpasspair.GetToken(pass); + + /* Access granted if username and password are correct */ + if (user == this_acl->username && pass == this_acl->password) + { + ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "HTTP authorization: password and username match"); + return true; + } + else + { + /* Invalid password */ + ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "HTTP authorization: password and username do not match"); + BlockAccess(http, 401, "WWW-Authenticate", "Basic realm=\"Restricted Object\""); + } + } + else + { + /* Malformed user:pass pair */ + ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "HTTP authorization: password and username malformed"); + BlockAccess(http, 401, "WWW-Authenticate", "Basic realm=\"Restricted Object\""); + } + } + else + { + /* Unsupported authentication type */ + ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "HTTP authorization: unsupported auth type: %s", authtype.c_str()); + BlockAccess(http, 401, "WWW-Authenticate", "Basic realm=\"Restricted Object\""); + } + } + else + { + /* No password given at all, access denied */ + ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "HTTP authorization: password and username not sent"); + BlockAccess(http, 401, "WWW-Authenticate", "Basic realm=\"Restricted Object\""); + } + return false; } + + /* A path may only match one ACL (the first it finds in the config file) */ + break; } } } + return true; } - const char* OnRequest(Request* request) - { - return NULL; - } - - virtual ~ModuleHTTPAccessList() + ModResult OnHTTPACLCheck(HTTPRequest& req) CXX11_OVERRIDE { + if (IsAccessAllowed(&req)) + return MOD_RES_PASSTHRU; + return MOD_RES_DENY; } - virtual Version GetVersion() + Version GetVersion() CXX11_OVERRIDE { - return Version(1, 2, 0, 0, VF_VENDOR, API_VERSION); + return Version("Allows the server administrator to control who can access resources served over HTTP with the httpd module.", VF_VENDOR); } };