123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434 |
- /*
- * $Id$
- *
- * Digest Authentication Module
- *
- * Copyright (C) 2001-2003 FhG Fokus
- *
- * This file is part of Kamailio, a free SIP server.
- *
- * Kamailio is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version
- *
- * Kamailio is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
- *
- * History:
- * --------
- * 2003-02-26: checks and group moved to separate modules (janakj)
- * 2003-03-11: New module interface (janakj)
- * 2003-03-16: flags export parameter added (janakj)
- * 2003-03-19 all mallocs/frees replaced w/ pkg_malloc/pkg_free (andrei)
- * 2003-04-05: default_uri #define used (jiri)
- * 2004-06-06 cleanup: static & auth_db_{init,bind,close.ver} used (andrei)
- * 2005-05-31 general definition of AVPs in credentials now accepted - ID AVP,
- * STRING AVP, AVP aliases (bogdan)
- * 2006-03-01 pseudo variables support for domain name (bogdan)
- */
- #include <stdio.h>
- #include <string.h>
- #include "../../sr_module.h"
- #include "../../lib/srdb1/db.h"
- #include "../../dprint.h"
- #include "../../error.h"
- #include "../../mod_fix.h"
- #include "../../trim.h"
- #include "../../mem/mem.h"
- #include "../../parser/parse_uri.h"
- #include "../../modules/auth/api.h"
- #include "authorize.h"
- MODULE_VERSION
- #define TABLE_VERSION 6
- /*
- * Module destroy function prototype
- */
- static void destroy(void);
- /*
- * Module child-init function prototype
- */
- static int child_init(int rank);
- /*
- * Module initialization function prototype
- */
- static int mod_init(void);
- static int w_is_subscriber(sip_msg_t *msg, char *_uri, char* _table,
- char *_flags);
- static int auth_fixup(void** param, int param_no);
- static int auth_check_fixup(void** param, int param_no);
- int parse_aaa_pvs(char *definition, pv_elem_t **pv_def, int *cnt);
- #define USER_COL "username"
- #define DOMAIN_COL "domain"
- #define PASS_COL "ha1"
- #define PASS_COL_2 "ha1b"
- /*
- * Module parameter variables
- */
- static str db_url = str_init(DEFAULT_RODB_URL);
- str user_column = str_init(USER_COL);
- str domain_column = str_init(DOMAIN_COL);
- str pass_column = str_init(PASS_COL);
- str pass_column_2 = str_init(PASS_COL_2);
- static int version_table_check = 1;
- int calc_ha1 = 0;
- int use_domain = 0; /* Use also domain when looking up in table */
- db1_con_t* auth_db_handle = 0; /* database connection handle */
- db_func_t auth_dbf;
- auth_api_s_t auth_api;
- char *credentials_list = 0;
- pv_elem_t *credentials = 0; /* Parsed list of credentials to load */
- int credentials_n = 0; /* Number of credentials in the list */
- /*
- * Exported functions
- */
- static cmd_export_t cmds[] = {
- {"www_authorize", (cmd_function)www_authenticate, 2, auth_fixup, 0,
- REQUEST_ROUTE},
- {"www_authenticate", (cmd_function)www_authenticate, 2, auth_fixup, 0,
- REQUEST_ROUTE},
- {"www_authenticate", (cmd_function)www_authenticate2, 3, auth_fixup, 0,
- REQUEST_ROUTE},
- {"proxy_authorize", (cmd_function)proxy_authenticate, 2, auth_fixup, 0,
- REQUEST_ROUTE},
- {"proxy_authenticate", (cmd_function)proxy_authenticate, 2, auth_fixup, 0,
- REQUEST_ROUTE},
- {"auth_check", (cmd_function)auth_check, 3, auth_check_fixup, 0,
- REQUEST_ROUTE},
- {"is_subscriber", (cmd_function)w_is_subscriber, 3, auth_check_fixup, 0,
- ANY_ROUTE},
- {"bind_auth_db", (cmd_function)bind_auth_db, 0, 0, 0,
- 0},
- {0, 0, 0, 0, 0, 0}
- };
- /*
- * Exported parameters
- */
- static param_export_t params[] = {
- {"db_url", PARAM_STR, &db_url },
- {"user_column", PARAM_STR, &user_column },
- {"domain_column", PARAM_STR, &domain_column },
- {"password_column", PARAM_STR, &pass_column },
- {"password_column_2", PARAM_STR, &pass_column_2 },
- {"calculate_ha1", INT_PARAM, &calc_ha1 },
- {"use_domain", INT_PARAM, &use_domain },
- {"load_credentials", PARAM_STRING, &credentials_list },
- {"version_table", INT_PARAM, &version_table_check },
- {0, 0, 0}
- };
- /*
- * Module interface
- */
- struct module_exports exports = {
- "auth_db",
- DEFAULT_DLFLAGS, /* dlopen flags */
- cmds, /* Exported functions */
- params, /* Exported parameters */
- 0, /* exported statistics */
- 0, /* exported MI functions */
- 0, /* exported pseudo-variables */
- 0, /* extra processes */
- mod_init, /* module initialization function */
- 0, /* response function */
- destroy, /* destroy function */
- child_init /* child initialization function */
- };
- static int child_init(int rank)
- {
- if (rank==PROC_INIT || rank==PROC_MAIN || rank==PROC_TCP_MAIN)
- return 0; /* do nothing for the main process */
-
- auth_db_handle = auth_dbf.init(&db_url);
- if (auth_db_handle == 0){
- LM_ERR("unable to connect to the database\n");
- return -1;
- }
- return 0;
- }
- static int mod_init(void)
- {
- bind_auth_s_t bind_auth;
- /* Find a database module */
- if (db_bind_mod(&db_url, &auth_dbf) < 0){
- LM_ERR("unable to bind to a database driver\n");
- return -1;
- }
- /* bind to auth module and import the API */
- bind_auth = (bind_auth_s_t)find_export("bind_auth_s", 0, 0);
- if (!bind_auth) {
- LM_ERR("unable to find bind_auth function. Check if you load"
- " the auth module.\n");
- return -2;
- }
- if (bind_auth(&auth_api) < 0) {
- LM_ERR("unable to bind auth module\n");
- return -3;
- }
- /* process additional list of credentials */
- if (parse_aaa_pvs(credentials_list, &credentials, &credentials_n) != 0) {
- LM_ERR("failed to parse credentials\n");
- return -5;
- }
- return 0;
- }
- static void destroy(void)
- {
- if (auth_db_handle) {
- auth_dbf.close(auth_db_handle);
- auth_db_handle = 0;
- }
- if (credentials) {
- pv_elem_free_all(credentials);
- credentials = 0;
- credentials_n = 0;
- }
- }
- /**
- * check if the subscriber identified by _uri has a valid record in
- * database table _table
- */
- static int w_is_subscriber(sip_msg_t *msg, char *_uri, char* _table,
- char *_flags)
- {
- str suri;
- str stable;
- int iflags;
- int ret;
- sip_uri_t puri;
- if(msg==NULL || _uri==NULL || _table==NULL || _flags==NULL) {
- LM_ERR("invalid parameters\n");
- return AUTH_ERROR;
- }
- if (get_str_fparam(&suri, msg, (fparam_t*)_uri) < 0) {
- LM_ERR("failed to get uri value\n");
- return -1;
- }
- if (suri.len==0) {
- LM_ERR("invalid uri parameter - empty value\n");
- return -1;
- }
- if(parse_uri(suri.s, suri.len, &puri)<0){
- LM_ERR("invalid uri parameter format\n");
- return -1;
- }
- if (get_str_fparam(&stable, msg, (fparam_t*)_table) < 0) {
- LM_ERR("failed to get table value\n");
- return -1;
- }
- if (stable.len==0) {
- LM_ERR("invalid table parameter - empty value\n");
- return -1;
- }
- if(fixup_get_ivalue(msg, (gparam_p)_flags, &iflags)!=0)
- {
- LM_ERR("invalid flags parameter\n");
- return -1;
- }
- LM_DBG("uri [%.*s] table [%.*s] flags [%d]\n", suri.len, suri.s,
- stable.len, stable.s, iflags);
- ret = fetch_credentials(msg, &puri.user, (iflags==1)?&puri.host:NULL,
- &stable);
- if(ret>=0)
- return 1;
- return ret;
- }
- /*
- * Convert the char* parameters
- */
- static int auth_fixup(void** param, int param_no)
- {
- db1_con_t* dbh = NULL;
- str name;
- if(strlen((char*)*param)<=0) {
- LM_ERR("empty parameter %d not allowed\n", param_no);
- return -1;
- }
- if (param_no == 1 || param_no == 3) {
- return fixup_var_str_12(param, 1);
- } else if (param_no == 2) {
- name.s = (char*)*param;
- name.len = strlen(name.s);
- dbh = auth_dbf.init(&db_url);
- if (!dbh) {
- LM_ERR("unable to open database connection\n");
- return -1;
- }
- if(version_table_check!=0
- && db_check_table_version(&auth_dbf, dbh, &name,
- TABLE_VERSION) < 0) {
- LM_ERR("error during table version check.\n");
- auth_dbf.close(dbh);
- return -1;
- }
- auth_dbf.close(dbh);
- }
- return 0;
- }
- /*
- * Convert cfg parameters to run-time structures
- */
- static int auth_check_fixup(void** param, int param_no)
- {
- if(strlen((char*)*param)<=0) {
- LM_ERR("empty parameter %d not allowed\n", param_no);
- return -1;
- }
- if (param_no == 1) {
- return fixup_var_str_12(param, 1);
- }
- if (param_no == 2) {
- return fixup_var_str_12(param, 2);
- }
- if (param_no == 3) {
- return fixup_igp_null(param, 1);
- }
- return 0;
- }
- /*
- * Parse extra credentials list
- */
- int parse_aaa_pvs(char *definition, pv_elem_t **pv_def, int *cnt)
- {
- pv_elem_t *pve;
- str pv;
- char *p;
- char *end;
- char *sep;
- p = definition;
- if (p==0 || *p==0)
- return 0;
- *pv_def = 0;
- *cnt = 0;
- /* get element by element */
- while ( (end=strchr(p,';'))!=0 || (end=p+strlen(p))!=p ) {
- /* new pv_elem_t */
- if ( (pve=(pv_elem_t*)pkg_malloc(sizeof(pv_elem_t)))==0 ) {
- LM_ERR("no more pkg mem\n");
- goto error;
- }
- memset( pve, 0, sizeof(pv_elem_t));
- /* definition is between p and e */
- /* search backwards because PV definition may contain '=' characters */
- for (sep = end; sep >= p && *sep != '='; sep--);
- if (sep > p) {
- /* pv=column style */
- /* set column name */
- pve->text.s = sep + 1;
- pve->text.len = end - pve->text.s;
- trim(&pve->text);
- if (pve->text.len == 0)
- goto parse_error;
- /* set pv spec */
- pv.s = p;
- pv.len = sep - p;
- trim(&pv);
- if (pv.len == 0)
- goto parse_error;
- } else {
- /* no pv, only column name */
- pve->text.s = p;
- pve->text.len = end - pve->text.s;
- trim(&pve->text);
- if (pve->text.len == 0)
- goto parse_error;
- /* create an avp definition for the spec parser */
- pv.s = (char*)pkg_malloc(pve->text.len + 7);
- if (pv.s == NULL) {
- LM_ERR("no more pkg mem\n");
- goto parse_error;
- }
- pv.len = snprintf(pv.s, pve->text.len + 7, "$avp(%.*s)",
- pve->text.len, pve->text.s);
- }
- /* create a pv spec */
- LM_DBG("column: %.*s pv: %.*s\n", pve->text.len, pve->text.s, pv.len, pv.s);
- pve->spec = pv_spec_lookup(&pv, NULL);
- if(pve->spec==NULL || pve->spec->setf == NULL) {
- LM_ERR("PV is not writeable: %.*s\n", pv.len, pv.s);
- goto parse_error;
- }
- /* link the element */
- pve->next = *pv_def;
- *pv_def = pve;
- (*cnt)++;
- pve = 0;
- /* go to the end */
- p = end;
- if (*p==';')
- p++;
- if (*p==0)
- break;
- }
- return 0;
- parse_error:
- LM_ERR("parse failed in \"%s\" at pos %d(%s)\n",
- definition, (int)(long)(p-definition),p);
- error:
- pkg_free( pve );
- pv_elem_free_all( *pv_def );
- *pv_def = 0;
- *cnt = 0;
- return -1;
- }
|