blob: 58ea7cce638bc1c3f10567a60e31385340db17f7 [file] [log] [blame]
Willy Tarreaua84d3742007-05-07 00:36:48 +02001/*
Willy Tarreau88922352009-10-04 22:02:50 +02002 * include/types/acl.h
3 * This file provides structures and types for ACLs.
4 *
Willy Tarreau0b1cd942010-05-16 22:18:27 +02005 * Copyright (C) 2000-2010 Willy Tarreau - w@1wt.eu
Willy Tarreau88922352009-10-04 22:02:50 +02006 *
7 * This library is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU Lesser General Public
9 * License as published by the Free Software Foundation, version 2.1
10 * exclusively.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public
18 * License along with this library; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
20 */
Willy Tarreaua84d3742007-05-07 00:36:48 +020021
22#ifndef _TYPES_ACL_H
23#define _TYPES_ACL_H
24
25#include <common/compat.h>
26#include <common/config.h>
27#include <common/mini-clist.h>
28
Krzysztof Piotr Oledzkif9423ae2010-01-29 19:26:18 +010029#include <types/auth.h>
Willy Tarreaua84d3742007-05-07 00:36:48 +020030#include <types/proxy.h>
Willy Tarreau0b1cd942010-05-16 22:18:27 +020031#include <types/server.h>
Willy Tarreaua84d3742007-05-07 00:36:48 +020032#include <types/session.h>
33
Willy Tarreau438b0f32010-05-10 22:29:06 +020034#include <ebmbtree.h>
Willy Tarreaua84d3742007-05-07 00:36:48 +020035
Willy Tarreau11382812008-07-09 16:18:21 +020036/* Pattern matching function result.
37 *
38 * We're using a 3-state matching system :
39 * - PASS : at least one pattern already matches
40 * - MISS : some data is missing to decide if some rules may finally match.
41 * - FAIL : no mattern may ever match
42 *
43 * We assign values 0, 1 and 3 to FAIL, MISS and PASS respectively, so that we
44 * can make use of standard arithmetics for the truth tables below :
45 *
46 * x | !x x&y | F(0) | M(1) | P(3) x|y | F(0) | M(1) | P(3)
47 * ------+----- -----+------+------+----- -----+------+------+-----
48 * F(0) | P(3) F(0)| F(0) | F(0) | F(0) F(0)| F(0) | M(1) | P(3)
49 * M(1) | M(1) M(1)| F(0) | M(1) | M(1) M(1)| M(1) | M(1) | P(3)
50 * P(3) | F(0) P(3)| F(0) | M(1) | P(3) P(3)| P(3) | P(3) | P(3)
51 *
52 * neg(x) = (3 >> x) and(x,y) = (x & y) or(x,y) = (x | y)
53 *
54 */
55
Willy Tarreaua84d3742007-05-07 00:36:48 +020056enum {
57 ACL_PAT_FAIL = 0, /* test failed */
Willy Tarreau11382812008-07-09 16:18:21 +020058 ACL_PAT_MISS = 1, /* test may pass with more info */
59 ACL_PAT_PASS = 3, /* test passed */
Willy Tarreaua84d3742007-05-07 00:36:48 +020060};
61
62/* Condition polarity. It makes it easier for any option to choose between
63 * IF/UNLESS if it can store that information within the condition itself.
Willy Tarreau11382812008-07-09 16:18:21 +020064 * Those should be interpreted as "IF/UNLESS result == PASS".
Willy Tarreaua84d3742007-05-07 00:36:48 +020065 */
66enum {
67 ACL_COND_NONE, /* no polarity set yet */
68 ACL_COND_IF, /* positive condition (after 'if') */
69 ACL_COND_UNLESS, /* negative condition (after 'unless') */
70};
71
72/* possible flags for intermediate test values. The flags are maintained
73 * across consecutive fetches for a same entry (eg: parse all req lines).
74 */
75enum {
76 ACL_TEST_F_READ_ONLY = 1 << 0, /* test data are read-only */
77 ACL_TEST_F_MUST_FREE = 1 << 1, /* test data must be freed after end of evaluation */
78 ACL_TEST_F_VOL_TEST = 1 << 2, /* result must not survive longer than the test (eg: time) */
79 ACL_TEST_F_VOL_HDR = 1 << 3, /* result sensitive to changes in headers */
80 ACL_TEST_F_VOL_1ST = 1 << 4, /* result sensitive to changes in first line (eg: URI) */
81 ACL_TEST_F_VOL_TXN = 1 << 5, /* result sensitive to new transaction (eg: persist) */
82 ACL_TEST_F_VOL_SESS = 1 << 6, /* result sensitive to new session (eg: IP) */
83 ACL_TEST_F_VOLATILE = (1<<2)|(1<<3)|(1<<4)|(1<<5)|(1<<6),
Willy Tarreaub6866442008-07-14 23:54:42 +020084 ACL_TEST_F_FETCH_MORE = 1 << 7, /* if test does not match, retry with next entry (for multi-match) */
85 ACL_TEST_F_MAY_CHANGE = 1 << 8, /* if test does not match, retry later (eg: request size) */
Willy Tarreaua79534f2008-07-20 10:13:37 +020086 ACL_TEST_F_RES_SET = 1 << 9, /* for fetch() function to assign the result without calling match() */
87 ACL_TEST_F_RES_PASS = 1 << 10,/* with SET_RESULT, sets result to PASS (defaults to FAIL) */
88 ACL_TEST_F_SET_RES_PASS = (ACL_TEST_F_RES_SET|ACL_TEST_F_RES_PASS), /* sets result to PASS */
89 ACL_TEST_F_SET_RES_FAIL = (ACL_TEST_F_RES_SET), /* sets result to FAIL */
Krzysztof Piotr Oledzkid7528e52010-01-29 17:55:53 +010090 ACL_TEST_F_NULL_MATCH = 1 << 11,/* call expr->kw->match with NULL pattern if expr->patterns is empty */
Willy Tarreaua84d3742007-05-07 00:36:48 +020091};
92
Willy Tarreaub6866442008-07-14 23:54:42 +020093/* ACLs can be evaluated on requests and on responses, and on partial or complete data */
Willy Tarreaud41f8d82007-06-10 10:06:18 +020094enum {
95 ACL_DIR_REQ = 0, /* ACL evaluated on request */
Willy Tarreaub6866442008-07-14 23:54:42 +020096 ACL_DIR_RTR = (1 << 0), /* ACL evaluated on response */
97 ACL_DIR_MASK = (ACL_DIR_REQ | ACL_DIR_RTR),
98 ACL_PARTIAL = (1 << 1), /* partial data, return MISS if data are missing */
Willy Tarreaud41f8d82007-06-10 10:06:18 +020099};
100
Willy Tarreauc8d7c962007-06-17 08:20:33 +0200101/* possible flags for expressions or patterns */
102enum {
103 ACL_PAT_F_IGNORE_CASE = 1 << 0, /* ignore case */
104 ACL_PAT_F_FROM_FILE = 1 << 1, /* pattern comes from a file */
Willy Tarreau438b0f32010-05-10 22:29:06 +0200105 ACL_PAT_F_TREE_OK = 1 << 2, /* the pattern parser is allowed to build a tree */
106 ACL_PAT_F_TREE = 1 << 3, /* some patterns are arranged in a tree */
Willy Tarreauc8d7c962007-06-17 08:20:33 +0200107};
108
Willy Tarreaua9802632008-07-25 19:13:19 +0200109/* what capabilities an ACL uses. These flags are set during parsing, which
110 * allows for flexible ACLs typed by their contents.
111 */
112enum {
Willy Tarreau0ceba5a2008-07-25 19:31:03 +0200113 ACL_USE_NOTHING = 0, /* no need for anything beyond internal information */
Willy Tarreaua9802632008-07-25 19:13:19 +0200114 ACL_USE_TCP4_PERMANENT = 1 << 0, /* unchanged TCPv4 data (eg: source IP) */
115 ACL_USE_TCP4_CACHEABLE = 1 << 1, /* cacheable TCPv4 data (eg: src conns) */
116 ACL_USE_TCP4_VOLATILE = 1 << 2, /* volatile TCPv4 data (eg: RTT) */
117 ACL_USE_TCP4_ANY = (ACL_USE_TCP4_PERMANENT | ACL_USE_TCP4_CACHEABLE | ACL_USE_TCP4_VOLATILE),
118
119 ACL_USE_TCP6_PERMANENT = 1 << 3, /* unchanged TCPv6 data (eg: source IP) */
120 ACL_USE_TCP6_CACHEABLE = 1 << 4, /* cacheable TCPv6 data (eg: src conns) */
121 ACL_USE_TCP6_VOLATILE = 1 << 5, /* volatile TCPv6 data (eg: RTT) */
122 ACL_USE_TCP6_ANY = (ACL_USE_TCP6_PERMANENT | ACL_USE_TCP6_CACHEABLE | ACL_USE_TCP6_VOLATILE),
123
124 ACL_USE_TCP_PERMANENT = 1 << 6, /* unchanged TCPv4/v6 data (eg: source IP) */
125 ACL_USE_TCP_CACHEABLE = 1 << 7, /* cacheable TCPv4/v6 data (eg: src conns) */
126 ACL_USE_TCP_VOLATILE = 1 << 8, /* volatile TCPv4/v6 data (eg: RTT) */
127 ACL_USE_TCP_ANY = (ACL_USE_TCP_PERMANENT | ACL_USE_TCP_CACHEABLE | ACL_USE_TCP_VOLATILE),
128
Willy Tarreau06457872010-05-23 12:24:38 +0200129 ACL_USE_L6REQ_PERMANENT = 1 << 9, /* unchanged layer6 request data */
130 ACL_USE_L6REQ_CACHEABLE = 1 << 10, /* cacheable layer6 request data (eg: length) */
131 ACL_USE_L6REQ_VOLATILE = 1 << 11, /* volatile layer6 request data (eg: contents) */
132 ACL_USE_L6REQ_ANY = (ACL_USE_L6REQ_PERMANENT | ACL_USE_L6REQ_CACHEABLE | ACL_USE_L6REQ_VOLATILE),
Willy Tarreaua9802632008-07-25 19:13:19 +0200133
Willy Tarreau06457872010-05-23 12:24:38 +0200134 ACL_USE_L6RTR_PERMANENT = 1 << 12, /* unchanged layer6 response data */
135 ACL_USE_L6RTR_CACHEABLE = 1 << 13, /* cacheable layer6 response data (eg: length) */
136 ACL_USE_L6RTR_VOLATILE = 1 << 14, /* volatile layer6 response data (eg: contents) */
137 ACL_USE_L6RTR_ANY = (ACL_USE_L6RTR_PERMANENT | ACL_USE_L6RTR_CACHEABLE | ACL_USE_L6RTR_VOLATILE),
Willy Tarreaua9802632008-07-25 19:13:19 +0200138
139 ACL_USE_L7REQ_PERMANENT = 1 << 15, /* unchanged layer7 request data (eg: method) */
140 ACL_USE_L7REQ_CACHEABLE = 1 << 16, /* cacheable layer7 request data (eg: content-length) */
141 ACL_USE_L7REQ_VOLATILE = 1 << 17, /* volatile layer7 request data (eg: cookie) */
142 ACL_USE_L7REQ_ANY = (ACL_USE_L7REQ_PERMANENT | ACL_USE_L7REQ_CACHEABLE | ACL_USE_L7REQ_VOLATILE),
143
144 ACL_USE_L7RTR_PERMANENT = 1 << 18, /* unchanged layer7 response data (eg: status) */
145 ACL_USE_L7RTR_CACHEABLE = 1 << 19, /* cacheable layer7 response data (eg: content-length) */
146 ACL_USE_L7RTR_VOLATILE = 1 << 20, /* volatile layer7 response data (eg: cookie) */
147 ACL_USE_L7RTR_ANY = (ACL_USE_L7RTR_PERMANENT | ACL_USE_L7RTR_CACHEABLE | ACL_USE_L7RTR_VOLATILE),
148
149 /* those ones are used for ambiguous "hdr_xxx" verbs */
150 ACL_USE_HDR_CACHEABLE = 1 << 21, /* cacheable request or response header (eg: content-length) */
151 ACL_USE_HDR_VOLATILE = 1 << 22, /* volatile request or response header (eg: cookie) */
152 ACL_USE_HDR_ANY = (ACL_USE_HDR_CACHEABLE | ACL_USE_HDR_VOLATILE),
153
154 /* information which remains during response */
155 ACL_USE_REQ_PERMANENT = (ACL_USE_TCP4_PERMANENT | ACL_USE_TCP6_PERMANENT | ACL_USE_TCP_PERMANENT |
Willy Tarreau06457872010-05-23 12:24:38 +0200156 ACL_USE_L6REQ_PERMANENT | ACL_USE_L7REQ_PERMANENT),
Willy Tarreaua9802632008-07-25 19:13:19 +0200157 ACL_USE_REQ_CACHEABLE = (ACL_USE_TCP4_CACHEABLE | ACL_USE_TCP6_CACHEABLE | ACL_USE_TCP_CACHEABLE |
Willy Tarreau06457872010-05-23 12:24:38 +0200158 ACL_USE_L6REQ_CACHEABLE | ACL_USE_L7REQ_CACHEABLE | ACL_USE_HDR_CACHEABLE),
Willy Tarreaua9802632008-07-25 19:13:19 +0200159
160 /* information which does not remain during response */
161 ACL_USE_REQ_VOLATILE = (ACL_USE_TCP4_VOLATILE | ACL_USE_TCP6_VOLATILE | ACL_USE_TCP_VOLATILE |
Willy Tarreau06457872010-05-23 12:24:38 +0200162 ACL_USE_L6REQ_VOLATILE | ACL_USE_L7REQ_VOLATILE),
Willy Tarreaua9802632008-07-25 19:13:19 +0200163
Willy Tarreau06457872010-05-23 12:24:38 +0200164 /* any type of layer 6 contents information (random data available in a buffer) */
165 ACL_USE_L6_ANY = (ACL_USE_L6REQ_ANY | ACL_USE_L6RTR_ANY),
Willy Tarreaua9802632008-07-25 19:13:19 +0200166
167 /* any type of layer 7 information */
168 ACL_USE_L7_ANY = (ACL_USE_L7REQ_ANY | ACL_USE_L7RTR_ANY | ACL_USE_HDR_ANY),
169
170 /* any type of response information */
Willy Tarreau06457872010-05-23 12:24:38 +0200171 ACL_USE_RTR_ANY = (ACL_USE_L6RTR_ANY | ACL_USE_L7RTR_ANY),
Willy Tarreau438b0f32010-05-10 22:29:06 +0200172
173 /* some flags indicating if a keyword supports exact pattern matching,
174 * so that patterns may be arranged in lookup trees. Let's put those
175 * flags at the end to leave some space for the other ones above.
176 */
177 ACL_MAY_LOOKUP = 1 << 31, /* exact pattern lookup */
Willy Tarreaua9802632008-07-25 19:13:19 +0200178};
179
180/* filtering hooks */
181enum {
182 /* hooks on the request path */
183 ACL_HOOK_REQ_FE_TCP = 0,
184 ACL_HOOK_REQ_FE_TCP_CONTENT,
185 ACL_HOOK_REQ_FE_HTTP_IN,
186 ACL_HOOK_REQ_FE_SWITCH,
187 ACL_HOOK_REQ_BE_TCP_CONTENT,
188 ACL_HOOK_REQ_BE_HTTP_IN,
189 ACL_HOOK_REQ_BE_SWITCH,
190 ACL_HOOK_REQ_FE_HTTP_OUT,
191 ACL_HOOK_REQ_BE_HTTP_OUT,
192 /* hooks on the response path */
193 ACL_HOOK_RTR_BE_TCP_CONTENT,
194 ACL_HOOK_RTR_BE_HTTP_IN,
195 ACL_HOOK_RTR_FE_TCP_CONTENT,
196 ACL_HOOK_RTR_FE_HTTP_IN,
197 ACL_HOOK_RTR_BE_HTTP_OUT,
198 ACL_HOOK_RTR_FE_HTTP_OUT,
199};
200
Willy Tarreaua84d3742007-05-07 00:36:48 +0200201/* How to store a time range and the valid days in 29 bits */
202struct acl_time {
203 int dow:7; /* 1 bit per day of week: 0-6 */
204 int h1:5, m1:6; /* 0..24:0..60. Use 0:0 for all day. */
205 int h2:5, m2:6; /* 0..24:0..60. Use 24:0 for all day. */
206};
207
208/* The acl will be linked to from the proxy where it is declared */
209struct acl_pattern {
210 struct list list; /* chaining */
211 union {
212 int i; /* integer value */
Willy Tarreauae8b7962007-06-09 23:10:04 +0200213 struct {
214 signed long long min, max;
215 int min_set :1;
216 int max_set :1;
217 } range; /* integer range */
Willy Tarreaua67fad92007-05-08 19:50:09 +0200218 struct {
219 struct in_addr addr;
220 struct in_addr mask;
221 } ipv4; /* IPv4 address */
Willy Tarreaua84d3742007-05-07 00:36:48 +0200222 struct acl_time time; /* valid hours and days */
Krzysztof Piotr Oledzkif9423ae2010-01-29 19:26:18 +0100223 unsigned int group_mask;
Willy Tarreaue56cda92010-05-11 23:25:05 +0200224 struct eb_root *tree; /* tree storing all values if any */
Willy Tarreaua84d3742007-05-07 00:36:48 +0200225 } val; /* direct value */
226 union {
227 void *ptr; /* any data */
228 char *str; /* any string */
229 regex_t *reg; /* a compiled regex */
230 } ptr; /* indirect values, allocated */
Krzysztof Piotr Oledzki8001d612008-05-31 13:53:23 +0200231 void(*freeptrbuf)(void *ptr); /* a destructor able to free objects from the ptr */
Willy Tarreaua84d3742007-05-07 00:36:48 +0200232 int len; /* data length when required */
Willy Tarreauc8d7c962007-06-17 08:20:33 +0200233 int flags; /* expr or pattern flags. */
Willy Tarreaua84d3742007-05-07 00:36:48 +0200234};
235
236/* The structure exchanged between an acl_fetch_* function responsible for
237 * retrieving a value, and an acl_match_* function responsible for testing it.
238 */
239struct acl_test {
Willy Tarreau33a7e692007-06-10 19:45:56 +0200240 int i; /* integer value */
241 char *ptr; /* pointer to beginning of value */
242 int len; /* length of value at ptr, otherwise ignored */
243 int flags; /* ACL_TEST_F_* set to 0 on first call */
244 union { /* fetch_* functions context for any purpose */
245 void *p; /* any pointer */
246 int i; /* any integer */
247 long long ll; /* any long long or smaller */
248 double d; /* any float or double */
249 void *a[8]; /* any array of up to 8 pointers */
Willy Tarreaua84d3742007-05-07 00:36:48 +0200250 } ctx;
251};
252
253
254/*
255 * ACL keyword: Associates keywords with parsers, methods to retrieve the value and testers.
256 */
257
258/* some dummy declarations to silent the compiler */
259struct proxy;
260struct session;
261
Willy Tarreauae8b7962007-06-09 23:10:04 +0200262/*
263 * NOTE:
264 * The 'parse' function is called to parse words in the configuration. It must
265 * return the number of valid words read. 0 = error. The 'opaque' argument may
266 * be used by functions which need to maintain a context between consecutive
267 * values. It is initialized to zero before the first call, and passed along
268 * successive calls.
269 */
270
Willy Tarreau97be1452007-06-10 11:47:14 +0200271struct acl_expr;
Willy Tarreaua84d3742007-05-07 00:36:48 +0200272struct acl_keyword {
273 const char *kw;
Willy Tarreauae8b7962007-06-09 23:10:04 +0200274 int (*parse)(const char **text, struct acl_pattern *pattern, int *opaque);
Willy Tarreau97be1452007-06-10 11:47:14 +0200275 int (*fetch)(struct proxy *px, struct session *l4, void *l7, int dir,
276 struct acl_expr *expr, struct acl_test *test);
Willy Tarreaua84d3742007-05-07 00:36:48 +0200277 int (*match)(struct acl_test *test, struct acl_pattern *pattern);
Willy Tarreaua9802632008-07-25 19:13:19 +0200278 unsigned int requires; /* bit mask of all ACL_USE_* required to evaluate this keyword */
Willy Tarreaua84d3742007-05-07 00:36:48 +0200279 int use_cnt;
280};
281
282/*
283 * A keyword list. It is a NULL-terminated array of keywords. It embeds a
284 * struct list in order to be linked to other lists, allowing it to easily
285 * be declared where it is needed, and linked without duplicating data nor
286 * allocating memory.
287 */
288struct acl_kw_list {
289 struct list list;
290 struct acl_keyword kw[VAR_ARRAY];
291};
292
293/*
294 * Description of an ACL expression.
295 * It contains a subject and a set of patterns to test against it.
296 * - the function get() is called to retrieve the subject from the
297 * current session or transaction and build a test.
298 * - the function test() is called to evaluate the test based on the
299 * available patterns and return ACL_PAT_*
300 * Both of those functions are available through the keyword.
301 */
302struct acl_expr {
303 struct list list; /* chaining */
304 struct acl_keyword *kw; /* back-reference to the keyword */
305 union { /* optional argument of the subject (eg: header or cookie name) */
306 char *str;
Krzysztof Piotr Oledzkif9423ae2010-01-29 19:26:18 +0100307 struct userlist *ul;
Willy Tarreau0b1cd942010-05-16 22:18:27 +0200308 struct server *srv;
Willy Tarreaua84d3742007-05-07 00:36:48 +0200309 } arg;
Willy Tarreaubb768912007-06-10 11:17:01 +0200310 int arg_len; /* optional argument length */
Willy Tarreaua84d3742007-05-07 00:36:48 +0200311 struct list patterns; /* list of acl_patterns */
Willy Tarreau438b0f32010-05-10 22:29:06 +0200312 struct eb_root pattern_tree; /* may be used for lookup in large datasets */
Willy Tarreaua84d3742007-05-07 00:36:48 +0200313};
314
315struct acl {
316 struct list list; /* chaining */
317 char *name; /* acl name */
318 struct list expr; /* list of acl_exprs */
319 int cache_idx; /* ACL index in cache */
Willy Tarreaua9802632008-07-25 19:13:19 +0200320 unsigned int requires; /* or'ed bit mask of all acl_expr's ACL_USE_* */
Willy Tarreaua84d3742007-05-07 00:36:48 +0200321};
322
323/* the condition will be linked to from an action in a proxy */
324struct acl_term {
325 struct list list; /* chaining */
326 struct acl *acl; /* acl pointed to by this term */
327 int neg; /* 1 if the ACL result must be negated */
328};
329
330struct acl_term_suite {
331 struct list list; /* chaining of term suites */
332 struct list terms; /* list of acl_terms */
333};
334
335struct acl_cond {
336 struct list list; /* Some specific tests may use multiple conditions */
337 struct list suites; /* list of acl_term_suites */
338 int pol; /* polarity: ACL_COND_IF / ACL_COND_UNLESS */
Willy Tarreaua9802632008-07-25 19:13:19 +0200339 unsigned int requires; /* or'ed bit mask of all acl's ACL_USE_* */
Willy Tarreau88922352009-10-04 22:02:50 +0200340 const char *file; /* config file where the condition is declared */
Willy Tarreaua9802632008-07-25 19:13:19 +0200341 int line; /* line in the config file where the condition is declared */
Willy Tarreaua84d3742007-05-07 00:36:48 +0200342};
343
344
345#endif /* _TYPES_ACL_H */
346
347/*
348 * Local variables:
349 * c-indent-level: 8
350 * c-basic-offset: 8
351 * End:
352 */