/* MODULE HTGroup.c
** GROUP FILE ROUTINES
**
** Contains group file parser and routines to match IP
** address templates and to find out group membership.
**
**
** AUTHORS:
** AL Ari Luotonen luotonen@dxcern.cern.ch
**
** HISTORY:
**
**
** BUGS:
**
**
**
** GROUP DEFINITION GRAMMAR:
**
** string = "sequence of alphanumeric characters"
** user_name ::= string
** group_name ::= string
** group_ref ::= group_name
** user_def ::= user_name | group_ref
** user_def_list ::= user_def { ',' user_def }
** user_part = user_def | '(' user_def_list ')'
**
** templ = "sequence of alphanumeric characters and '*'s"
** ip_number_mask ::= templ '.' templ '.' templ '.' templ
** domain_name_mask ::= templ { '.' templ }
** address ::= ip_number_mask | domain_name_mask
** address_def ::= address
** address_def_list ::= address_def { ',' address_def }
** address_part = address_def | '(' address_def_list ')'
**
** item ::= [user_part] ['@' address_part]
** item_list ::= item { ',' item }
** group_def ::= item_list
** group_decl ::= group_name ':' group_def
**
*/
#include "HTUtils.h"
#include <string.h>
#include "HTAAUtil.h"
#include "HTLex.h" /* Lexical analysor */
#include "HTGroup.h" /* Implemented here */
#include "LYLeaks.h"
/*
** Group file parser
*/
typedef HTList UserDefList;
typedef HTList AddressDefList;
typedef struct {
UserDefList * user_def_list;
AddressDefList * address_def_list;
} Item;
typedef struct {
char * name;
GroupDef * translation;
} Ref;
PRIVATE void syntax_error ARGS3(FILE *, fp,
char *, msg,
LexItem, lex_item)
{
char buffer[41];
int cnt = 0;
int ch;
while ((ch = getc(fp)) != EOF && ch != '\n')
if (cnt < 40) buffer[cnt++] = ch;
buffer[cnt] = (char)0;
if (TRACE)
fprintf(stderr, "%s %d before: '%s'\nHTGroup.c: %s (got %s)\n",
"HTGroup.c: Syntax error in rule file at line",
HTlex_line, buffer, msg, lex_verbose(lex_item));
HTlex_line++;
}
PRIVATE AddressDefList *parse_address_part ARGS1(FILE *, fp)
{
AddressDefList *address_def_list = NULL;
LexItem lex_item;
BOOL only_one = NO;
lex_item = lex(fp);
if (lex_item == LEX_ALPH_STR || lex_item == LEX_TMPL_STR)
only_one = YES;
else if (lex_item != LEX_OPEN_PAREN ||
((lex_item = lex(fp)) != LEX_ALPH_STR &&
lex_item != LEX_TMPL_STR)) {
syntax_error(fp, "Expecting a single address or '(' beginning list",
lex_item);
return NULL;
}
address_def_list = HTList_new();
for(;;) {
Ref *ref = (Ref*)calloc(1, sizeof(Ref));
ref->name = NULL;
ref->translation = NULL;
StrAllocCopy(ref->name, HTlex_buffer);
HTList_addObject(address_def_list, (void*)ref);
if (only_one || (lex_item = lex(fp)) != LEX_ITEM_SEP)
break;
/*
** Here lex_item == LEX_ITEM_SEP; after item separator it
** is ok to have one or more newlines (LEX_REC_SEP) and
** they are ignored (continuation line).
*/
do {
lex_item = lex(fp);
} while (lex_item == LEX_REC_SEP);
if (lex_item != LEX_ALPH_STR && lex_item != LEX_TMPL_STR) {
syntax_error(fp, "Expecting an address template", lex_item);
HTList_delete(address_def_list);
address_def_list = NULL;
return NULL;
}
}
if (!only_one && lex_item != LEX_CLOSE_PAREN) {
HTList_delete(address_def_list);
address_def_list = NULL;
syntax_error(fp, "Expecting ')' closing address list", lex_item);
return NULL;
}
return address_def_list;
}
PRIVATE UserDefList *parse_user_part ARGS1(FILE *, fp)
{
UserDefList *user_def_list = NULL;
LexItem lex_item;
BOOL only_one = NO;
lex_item = lex(fp);
if (lex_item == LEX_ALPH_STR)
only_one = YES;
else if (lex_item != LEX_OPEN_PAREN ||
(lex_item = lex(fp)) != LEX_ALPH_STR) {
syntax_error(fp, "Expecting a single name or '(' beginning list",
lex_item);
return NULL;
}
user_def_list = HTList_new();
for (;;) {
Ref *ref = (Ref*)calloc(1, sizeof(Ref));
ref->name = NULL;
ref->translation = NULL;
StrAllocCopy(ref->name, HTlex_buffer);
HTList_addObject(user_def_list, (void*)ref);
if (only_one || (lex_item = lex(fp)) != LEX_ITEM_SEP)
break;
/*
** Here lex_item == LEX_ITEM_SEP; after item separator it
** is ok to have one or more newlines (LEX_REC_SEP) and
** they are ignored (continuation line).
*/
do {
lex_item = lex(fp);
} while (lex_item == LEX_REC_SEP);
if (lex_item != LEX_ALPH_STR) {
syntax_error(fp, "Expecting user or group name", lex_item);
HTList_delete(user_def_list);
user_def_list = NULL;
return NULL;
}
}
if (!only_one && lex_item != LEX_CLOSE_PAREN) {
HTList_delete(user_def_list);
user_def_list = NULL;
syntax_error(fp, "Expecting ')' closing user/group list", lex_item);
return NULL;
}
return user_def_list;
}
PRIVATE Item *parse_item ARGS1(FILE *, fp)
{
Item *item = NULL;
UserDefList *user_def_list = NULL;
AddressDefList *address_def_list = NULL;
LexItem lex_item;
lex_item = lex(fp);
if (lex_item == LEX_ALPH_STR || lex_item == LEX_OPEN_PAREN) {
unlex(lex_item);
user_def_list = parse_user_part(fp);
lex_item = lex(fp);
}
if (lex_item == LEX_AT_SIGN) {
lex_item = lex(fp);
if (lex_item == LEX_ALPH_STR || lex_item == LEX_TMPL_STR ||
lex_item == LEX_OPEN_PAREN) {
unlex(lex_item);
address_def_list = parse_address_part(fp);
}
else {
if (user_def_list) {
HTList_delete(user_def_list); /* @@@@ */
user_def_list = NULL;
}
syntax_error(fp, "Expected address part (single address or list)",
lex_item);
return NULL;
}
}
else unlex(lex_item);
if (!user_def_list && !address_def_list) {
syntax_error(fp, "Empty item not allowed", lex_item);
return NULL;
}
item = (Item*)calloc(1, sizeof(Item));
item->user_def_list = user_def_list;
item->address_def_list = address_def_list;
return item;
}
PRIVATE ItemList *parse_item_list ARGS1(FILE *, fp)
{
ItemList *item_list = HTList_new();
Item *item;
LexItem lex_item;
for(;;) {
if (!(item = parse_item(fp))) {
HTList_delete(item_list); /* @@@@ */
item_list = NULL;
return NULL;
}
HTList_addObject(item_list, (void*)item);
lex_item = lex(fp);
if (lex_item != LEX_ITEM_SEP) {
unlex(lex_item);
return item_list;
}
/*
** Here lex_item == LEX_ITEM_SEP; after item separator it
** is ok to have one or more newlines (LEX_REC_SEP) and
** they are ignored (continuation line).
*/
do {
lex_item = lex(fp);
} while (lex_item == LEX_REC_SEP);
unlex(lex_item);
}
}
PUBLIC GroupDef *HTAA_parseGroupDef ARGS1(FILE *, fp)
{
ItemList *item_list = NULL;
GroupDef *group_def = NULL;
LexItem lex_item;
if (!(item_list = parse_item_list(fp))) {
return NULL;
}
group_def = (GroupDef*)calloc(1, sizeof(GroupDef));
group_def->group_name = NULL;
group_def->item_list = item_list;
if ((lex_item = lex(fp)) != LEX_REC_SEP) {
syntax_error(fp, "Garbage after group definition", lex_item);
}
return group_def;
}
PRIVATE GroupDef *parse_group_decl ARGS1(FILE *, fp)
{
char *group_name = NULL;
GroupDef *group_def = NULL;
LexItem lex_item;
do {
lex_item = lex(fp);
} while (lex_item == LEX_REC_SEP); /* Ignore empty lines */
if (lex_item != LEX_ALPH_STR) {
if (lex_item != LEX_EOF)
syntax_error(fp, "Expecting group name", lex_item);
return NULL;
}
StrAllocCopy(group_name, HTlex_buffer);
if (LEX_FIELD_SEP != (lex_item = lex(fp))) {
syntax_error(fp, "Expecting field separator", lex_item);
FREE(group_name);
return NULL;
}
if (!(group_def = HTAA_parseGroupDef(fp))) {
FREE(group_name);
return NULL;
}
group_def->group_name = group_name;
return group_def;
}
/*
** Group manipulation routines
*/
PRIVATE GroupDef *find_group_def ARGS2(GroupDefList *, group_list,
CONST char *, group_name)
{
if (group_list && group_name) {
GroupDefList *cur = group_list;
GroupDef *group_def;
while (NULL != (group_def = (GroupDef*)HTList_nextObject(cur))) {
if (!strcmp(group_name, group_def->group_name)) {
return group_def;
}
}
}
return NULL;
}
PUBLIC void HTAA_resolveGroupReferences ARGS2(GroupDef *, group_def,
GroupDefList *, group_def_list)
{
if (group_def && group_def->item_list && group_def_list) {
ItemList *cur1 = group_def->item_list;
Item *item;
while (NULL != (item = (Item*)HTList_nextObject(cur1))) {
UserDefList *cur2 = item->user_def_list;
Ref *ref;
while (NULL != (ref = (Ref*)HTList_nextObject(cur2)))
ref->translation = find_group_def(group_def_list, ref->name);
/* Does NOT translate address_def_list */
}
}
}
PRIVATE void add_group_def ARGS2(GroupDefList *, group_def_list,
GroupDef *, group_def)
{
HTAA_resolveGroupReferences(group_def, group_def_list);
HTList_addObject(group_def_list, (void*)group_def);
}
PRIVATE GroupDefList *parse_group_file ARGS1(FILE *, fp)
{
GroupDefList *group_def_list = HTList_new();
GroupDef *group_def;
while (NULL != (group_def = parse_group_decl(fp)))
add_group_def(group_def_list, group_def);
return group_def_list;
}
/*
** Trace functions
*/
PRIVATE void print_item ARGS1(Item *, item)
{
if (!item)
fprintf(stderr, "\tNULL-ITEM\n");
else {
UserDefList *cur1 = item->user_def_list;
AddressDefList *cur2 = item->address_def_list;
Ref *user_ref = (Ref*)HTList_nextObject(cur1);
Ref *addr_ref = (Ref*)HTList_nextObject(cur2);
if (user_ref) {
fprintf(stderr, "\t[%s%s", user_ref->name,
(user_ref->translation ? "*REF*" : ""));
while (NULL != (user_ref = (Ref*)HTList_nextObject(cur1)))
fprintf(stderr, "; %s%s", user_ref->name,
(user_ref->translation ? "*REF*" : ""));
fprintf(stderr, "] ");
} else fprintf(stderr, "\tANYBODY ");
if (addr_ref) {
fprintf(stderr, "@ [%s", addr_ref->name);
while (NULL != (addr_ref = (Ref*)HTList_nextObject(cur2)))
fprintf(stderr, "; %s", addr_ref->name);
fprintf(stderr, "]\n");
} else fprintf(stderr, "@ ANYADDRESS\n");
}
}
PRIVATE void print_item_list ARGS1(ItemList *, item_list)
{
ItemList *cur = item_list;
Item *item;
if (!item_list)
fprintf(stderr, "EMPTY");
else while (NULL != (item = (Item*)HTList_nextObject(cur)))
print_item(item);
}
PUBLIC void HTAA_printGroupDef ARGS1(GroupDef *, group_def)
{
if (!group_def) {
fprintf(stderr, "\nNULL RECORD\n");
return;
}
fprintf(stderr, "\nGroup %s:\n",
(group_def->group_name ? group_def->group_name : "NULL"));
print_item_list(group_def->item_list);
fprintf(stderr, "\n");
}
PRIVATE void print_group_def_list ARGS1(GroupDefList *, group_list)
{
GroupDefList *cur = group_list;
GroupDef *group_def;
while (NULL != (group_def = (GroupDef*)HTList_nextObject(cur)))
HTAA_printGroupDef(group_def);
}
/*
** IP address template matching
*/
/* PRIVATE part_match()
** MATCH ONE PART OF INET ADDRESS AGAIST
** A PART OF MASK (inet address has 4 parts)
** ON ENTRY:
** tcur pointer to the beginning of template part.
** icur pointer to the beginning of actual inet
** number part.
**
** ON EXIT:
** returns YES, if match.
*/
PRIVATE BOOL part_match ARGS2(CONST char *, tcur,
CONST char *, icur)
{
char required[4];
char actual[4];
CONST char *cur;
int cnt;
if (!tcur || !icur) return NO;
cur=tcur;
cnt=0;
while (cnt < 3 && *cur && *cur != '.')
required[cnt++] = *(cur++);
required[cnt] = (char)0;
cur=icur;
cnt=0;
while (cnt < 3 && *cur && *cur != '.')
actual[cnt++] = *(cur++);
actual[cnt] = (char)0;
if (TRACE) {
BOOL status = HTAA_templateMatch(required, actual);
fprintf(stderr, "part_match: req: '%s' act: '%s' match: %s\n",
required, actual, (status ? "yes" : "no"));
return status;
}
return HTAA_templateMatch(required, actual);
}
/* PRIVATE ip_number_match()
** MATCH INET NUMBER AGAINST AN INET NUMBER MASK
** ON ENTRY:
** template mask to match agaist, e.g. 128.141.*.*
** the_inet_addr actual inet address, e.g. 128.141.201.74
**
** ON EXIT:
** returns YES, if match; NO, if not.
*/
PRIVATE BOOL ip_number_match ARGS2(CONST char *, template,
CONST char *, the_inet_addr)
{
CONST char *tcur = template;
CONST char *icur = the_inet_addr;
int cnt;
for (cnt=0; cnt<4; cnt++) {
if (!tcur || !icur || !part_match(tcur, icur))
return NO;
if (NULL != (tcur = strchr(tcur, '.'))) tcur++;
if (NULL != (icur = strchr(icur, '.'))) icur++;
}
return YES;
}
/* PRIVATE is_domain_mask()
** DETERMINE IF A GIVEN MASK IS A
** DOMAIN NAME MASK OR AN INET NUMBER MASK
** ON ENTRY:
** mask either a domain name mask,
** e.g.
** *.cern.ch
**
** or an inet number mask,
** e.g.
** 128.141.*.*
**
** ON EXIT:
** returns YES, if mask is a domain name mask.
** NO, if it is an inet number mask.
*/
PRIVATE BOOL is_domain_mask ARGS1(CONST char *, mask)
{
CONST char *cur = mask;
if (!mask) return NO;
while (*cur) {
if (*cur != '.' && *cur != '*' && (*cur < '0' || *cur > '9'))
return YES; /* Even one non-digit makes it a domain name mask */
cur++;
}
return NO; /* All digits and dots, so it is an inet number mask */
}
/* PRIVATE ip_mask_match()
** MATCH AN IP NUMBER MASK OR IP NAME MASK
** AGAINST ACTUAL IP NUMBER OR IP NAME
**
** ON ENTRY:
** mask mask. Mask may be either an inet number
** mask or a domain name mask,
** e.g.
** 128.141.*.*
** or
** *.cern.ch
**
** ip_number IP number of connecting host.
** ip_name IP name of the connecting host.
**
** ON EXIT:
** returns YES, if hostname/internet number
** matches the mask.
** NO, if no match (no fire).
*/
PRIVATE BOOL ip_mask_match ARGS3(CONST char *, mask,
CONST char *, ip_number,
CONST char *, ip_name)
{
if (mask && (ip_number || ip_name)) {
if (is_domain_mask(mask)) {
if (HTAA_templateMatch(mask, ip_name))
return YES;
}
else {
if (ip_number_match(mask, ip_number))
return YES;
}
}
return NO;
}
PRIVATE BOOL ip_in_def_list ARGS3(AddressDefList *, address_def_list,
char *, ip_number,
char *, ip_name)
{
if (address_def_list && (ip_number || ip_name)) {
AddressDefList *cur = address_def_list;
Ref *ref;
while (NULL != (ref = (Ref*)HTList_nextObject(cur))) {
/* Value of ref->translation is ignored, i.e. */
/* no recursion for ip address tamplates. */
if (ip_mask_match(ref->name, ip_number, ip_name))
return YES;
}
}
return NO;
}
/*
** Group file cached reading
*/
typedef struct {
char * group_filename;
GroupDefList * group_list;
} GroupCache;
typedef HTList GroupCacheList;
PRIVATE GroupCacheList *group_cache_list = NULL;
PUBLIC GroupDefList *HTAA_readGroupFile ARGS1(CONST char *, filename)
{
FILE *fp;
GroupCache *group_cache;
if (!filename || !*filename) return NULL;
if (!group_cache_list)
group_cache_list = HTList_new();
else {
GroupCacheList *cur = group_cache_list;
while (NULL != (group_cache = (GroupCache*)HTList_nextObject(cur))) {
if (!strcmp(filename, group_cache->group_filename)) {
if (TRACE) fprintf(stderr, "%s '%s' %s\n",
"HTAA_readGroupFile: group file",
filename, "already found in cache");
return group_cache->group_list;
} /* if cache match */
} /* while cached files remain */
} /* cache exists */
if (TRACE) fprintf(stderr, "HTAA_readGroupFile: reading group file `%s'\n",
filename);
if (!(fp = fopen(filename, "r"))) {
if (TRACE) fprintf(stderr, "%s '%s'\n",
"HTAA_readGroupFile: unable to open group file",
filename);
return NULL;
}
if (!(group_cache = (GroupCache*)calloc(1, sizeof(GroupCache))))
outofmem(__FILE__, "HTAA_readGroupFile");
group_cache->group_filename = NULL;
StrAllocCopy(group_cache->group_filename, filename);
group_cache->group_list = parse_group_file(fp);
HTList_addObject(group_cache_list, (void*)group_cache);
fclose(fp);
if (TRACE) {
fprintf(stderr, "Read group file '%s', results follow:\n", filename);
print_group_def_list(group_cache->group_list);
}
return group_cache->group_list;
}
/* PUBLIC HTAA_userAndInetInGroup()
** CHECK IF USER BELONGS TO TO A GIVEN GROUP
** AND THAT THE CONNECTION COMES FROM AN
** ADDRESS THAT IS ALLOWED BY THAT GROUP
** ON ENTRY:
** group the group definition structure.
** username connecting user.
** ip_number browser host IP number, optional.
** ip_name browser host IP name, optional.
** However, one of ip_number or ip_name
** must be given.
** ON EXIT:
** returns HTAA_IP_MASK, if IP address mask was
** reason for failing.
** HTAA_NOT_MEMBER, if user does not belong
** to the group.
** HTAA_OK if both IP address and user are ok.
*/
PUBLIC HTAAFailReasonType HTAA_userAndInetInGroup ARGS4(GroupDef *, group,
char *, username,
char *, ip_number,
char *, ip_name)
{
HTAAFailReasonType reason = HTAA_NOT_MEMBER;
if (group && username) {
ItemList *cur1 = group->item_list;
Item *item;
while (NULL != (item = (Item*)HTList_nextObject(cur1))) {
if (!item->address_def_list || /* Any address allowed */
ip_in_def_list(item->address_def_list, ip_number, ip_name)) {
if (!item->user_def_list) /* Any user allowed */
return HTAA_OK;
else {
UserDefList *cur2 = item->user_def_list;
Ref *ref;
while (NULL != (ref = (Ref*)HTList_nextObject(cur2))) {
if (ref->translation) { /* Group, check recursively */
reason = HTAA_userAndInetInGroup(ref->translation,
username,
ip_number,ip_name);
if (reason == HTAA_OK)
return HTAA_OK;
}
else { /* Username, check directly */
if (username && *username &&
0==strcmp(ref->name, username))
return HTAA_OK;
}
} /* Every user/group name in this group */
} /* search for username */
} /* IP address ok */
else {
reason = HTAA_IP_MASK;
}
} /* while items in group */
} /* valid parameters */
return reason; /* No match, or invalid parameters */
}
PUBLIC void GroupDef_delete ARGS1(GroupDef *, group_def)
{
if (group_def) {
FREE(group_def->group_name);
if (group_def->item_list) {
HTList_delete(group_def->item_list); /* @@@@ */
group_def->item_list = NULL;
}
FREE(group_def);
}
}