mirror of
https://github.com/apache/httpd.git
synced 2025-08-06 11:06:17 +00:00

bearer tokens, both as part of the aaa framework, and as a way to generate tokens and pass them to backend servers and services. *) mod_auth_bearer: New module to handle RFC 6750 Bearer tokens, using the token_checker hook. *) mod_autht_core: New module to handle provider aliases for token authentication. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1909411 13f79535-47bb-0310-9956-ffa450edef68
228 lines
7.9 KiB
C
228 lines
7.9 KiB
C
/* Licensed to the Apache Software Foundation (ASF) under one or more
|
|
* contributor license agreements. See the NOTICE file distributed with
|
|
* this work for additional information regarding copyright ownership.
|
|
* The ASF licenses this file to You under the Apache License, Version 2.0
|
|
* (the "License"); you may not use this file except in compliance with
|
|
* the License. You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
/*
|
|
* Security options etc.
|
|
*
|
|
* Module derived from code originally written by Rob McCool
|
|
*
|
|
*/
|
|
|
|
#include "apr_strings.h"
|
|
#include "apr_network_io.h"
|
|
#define APR_WANT_STRFUNC
|
|
#define APR_WANT_BYTEFUNC
|
|
#include "apr_want.h"
|
|
|
|
#include "ap_config.h"
|
|
#include "httpd.h"
|
|
#include "http_config.h"
|
|
#include "http_core.h"
|
|
#include "http_log.h"
|
|
#include "http_request.h"
|
|
#include "http_protocol.h"
|
|
#include "ap_provider.h"
|
|
|
|
#include "mod_auth.h"
|
|
|
|
#if APR_HAVE_NETINET_IN_H
|
|
#include <netinet/in.h>
|
|
#endif
|
|
|
|
typedef struct provider_alias_rec {
|
|
char *provider_name;
|
|
char *provider_alias;
|
|
ap_conf_vector_t *sec_auth;
|
|
const autht_provider *provider;
|
|
} provider_alias_rec;
|
|
|
|
typedef struct autht_alias_srv_conf {
|
|
apr_hash_t *alias_rec;
|
|
} autht_alias_srv_conf;
|
|
|
|
|
|
module AP_MODULE_DECLARE_DATA autht_core_module;
|
|
|
|
static autht_status authn_alias_check_token(request_rec *r, const char *type,
|
|
const char *token)
|
|
{
|
|
/* Look up the provider alias in the alias list */
|
|
/* Get the dir_config and call ap_Merge_per_dir_configs() */
|
|
/* Call the real provider->check_password() function */
|
|
/* return the result of the above function call */
|
|
|
|
const char *provider_name = apr_table_get(r->notes, AUTHT_PROVIDER_NAME_NOTE);
|
|
autht_status ret = AUTHT_MISMATCH;
|
|
autht_alias_srv_conf *authcfg =
|
|
(autht_alias_srv_conf *)ap_get_module_config(r->server->module_config,
|
|
&autht_core_module);
|
|
|
|
if (provider_name) {
|
|
provider_alias_rec *prvdraliasrec = apr_hash_get(authcfg->alias_rec,
|
|
provider_name, APR_HASH_KEY_STRING);
|
|
ap_conf_vector_t *orig_dir_config = r->per_dir_config;
|
|
|
|
/* If we found the alias provider in the list, then merge the directory
|
|
configurations and call the real provider */
|
|
if (prvdraliasrec) {
|
|
r->per_dir_config = ap_merge_per_dir_configs(r->pool, orig_dir_config,
|
|
prvdraliasrec->sec_auth);
|
|
ret = prvdraliasrec->provider->check_token(r, type, token);
|
|
r->per_dir_config = orig_dir_config;
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static void *create_autht_alias_svr_config(apr_pool_t *p, server_rec *s)
|
|
{
|
|
|
|
autht_alias_srv_conf *authcfg;
|
|
|
|
authcfg = (autht_alias_srv_conf *) apr_pcalloc(p, sizeof(autht_alias_srv_conf));
|
|
authcfg->alias_rec = apr_hash_make(p);
|
|
|
|
return (void *) authcfg;
|
|
}
|
|
|
|
/* Only per-server directive we have is GLOBAL_ONLY */
|
|
static void *merge_autht_alias_svr_config(apr_pool_t *p, void *basev, void *overridesv)
|
|
{
|
|
return basev;
|
|
}
|
|
|
|
static const autht_provider autht_alias_provider =
|
|
{
|
|
&authn_alias_check_token
|
|
};
|
|
|
|
static const char *authaliassection(cmd_parms *cmd, void *mconfig, const char *arg)
|
|
{
|
|
const char *endp = ap_strrchr_c(arg, '>');
|
|
const char *args;
|
|
char *provider_alias;
|
|
char *provider_name;
|
|
int old_overrides = cmd->override;
|
|
const char *errmsg;
|
|
const autht_provider *provider = NULL;
|
|
ap_conf_vector_t *new_auth_config = ap_create_per_dir_config(cmd->pool);
|
|
autht_alias_srv_conf *authcfg =
|
|
(autht_alias_srv_conf *)ap_get_module_config(cmd->server->module_config,
|
|
&autht_core_module);
|
|
|
|
const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY);
|
|
if (err != NULL) {
|
|
return err;
|
|
}
|
|
|
|
if (endp == NULL) {
|
|
return apr_pstrcat(cmd->pool, cmd->cmd->name,
|
|
"> directive missing closing '>'", NULL);
|
|
}
|
|
|
|
args = apr_pstrndup(cmd->temp_pool, arg, endp - arg);
|
|
|
|
if (!args[0]) {
|
|
return apr_pstrcat(cmd->pool, cmd->cmd->name,
|
|
"> directive requires additional arguments", NULL);
|
|
}
|
|
|
|
/* Pull the real provider name and the alias name from the block header */
|
|
provider_name = ap_getword_conf(cmd->pool, &args);
|
|
provider_alias = ap_getword_conf(cmd->pool, &args);
|
|
|
|
if (!provider_name[0] || !provider_alias[0]) {
|
|
return apr_pstrcat(cmd->pool, cmd->cmd->name,
|
|
"> directive requires additional arguments", NULL);
|
|
}
|
|
|
|
if (strcasecmp(provider_name, provider_alias) == 0) {
|
|
return apr_pstrcat(cmd->pool,
|
|
"The alias provider name must be different from the base provider name.", NULL);
|
|
}
|
|
|
|
/* Look up the alias provider to make sure that it hasn't already been registered. */
|
|
provider = ap_lookup_provider(AUTHN_PROVIDER_GROUP, provider_alias,
|
|
AUTHN_PROVIDER_VERSION);
|
|
if (provider) {
|
|
return apr_pstrcat(cmd->pool, "The alias provider ", provider_alias,
|
|
" has already be registered previously as either a base provider or an alias provider.",
|
|
NULL);
|
|
}
|
|
|
|
/* walk the subsection configuration to get the per_dir config that we will
|
|
merge just before the real provider is called. */
|
|
cmd->override = OR_AUTHCFG | ACCESS_CONF;
|
|
errmsg = ap_walk_config(cmd->directive->first_child, cmd, new_auth_config);
|
|
cmd->override = old_overrides;
|
|
|
|
if (!errmsg) {
|
|
provider_alias_rec *prvdraliasrec = apr_pcalloc(cmd->pool, sizeof(provider_alias_rec));
|
|
provider = ap_lookup_provider(AUTHN_PROVIDER_GROUP, provider_name,
|
|
AUTHN_PROVIDER_VERSION);
|
|
|
|
if (!provider) {
|
|
/* by the time they use it, the provider should be loaded and
|
|
registered with us. */
|
|
return apr_psprintf(cmd->pool,
|
|
"Unknown Authn provider: %s",
|
|
provider_name);
|
|
}
|
|
|
|
/* Save off the new directory config along with the original provider name
|
|
and function pointer data */
|
|
prvdraliasrec->sec_auth = new_auth_config;
|
|
prvdraliasrec->provider_name = provider_name;
|
|
prvdraliasrec->provider_alias = provider_alias;
|
|
prvdraliasrec->provider = provider;
|
|
apr_hash_set(authcfg->alias_rec, provider_alias, APR_HASH_KEY_STRING, prvdraliasrec);
|
|
|
|
/* Register the fake provider so that we get called first */
|
|
ap_register_auth_provider(cmd->pool, AUTHT_PROVIDER_GROUP,
|
|
provider_alias, AUTHT_PROVIDER_VERSION,
|
|
&autht_alias_provider,
|
|
AP_AUTH_INTERNAL_PER_CONF);
|
|
}
|
|
|
|
return errmsg;
|
|
}
|
|
|
|
static const command_rec autht_cmds[] =
|
|
{
|
|
AP_INIT_RAW_ARGS("<AuthtProviderAlias", authaliassection, NULL, RSRC_CONF,
|
|
"container for grouping an authentication provider's "
|
|
"directives under a provider alias"),
|
|
{NULL}
|
|
};
|
|
|
|
static void register_hooks(apr_pool_t *p)
|
|
{
|
|
|
|
}
|
|
|
|
AP_DECLARE_MODULE(autht_core) =
|
|
{
|
|
STANDARD20_MODULE_STUFF,
|
|
NULL, /* dir config creater */
|
|
NULL, /* dir merger --- default is to override */
|
|
create_autht_alias_svr_config, /* server config */
|
|
merge_autht_alias_svr_config, /* merge server config */
|
|
autht_cmds,
|
|
register_hooks /* register hooks */
|
|
};
|
|
|