blob: 2f9cc4fb43c96d60a075eb81fb04a907db5c5e80 [file] [log] [blame]
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +01001/*
2 * User authentication & authorization
3 *
4 * Copyright 2010 Krzysztof Piotr Oledzki <ole@ans.pl>
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 *
11 */
12
Willy Tarreau890a33e2010-03-04 19:10:14 +010013#ifdef CONFIG_HAP_CRYPT
14/* This is to have crypt() defined on Linux */
15#define _GNU_SOURCE
16
17#ifdef NEED_CRYPT_H
18/* some platforms such as Solaris need this */
19#include <crypt.h>
20#endif
21#endif /* CONFIG_HAP_CRYPT */
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +010022
23#include <stdio.h>
24#include <stdlib.h>
25#include <string.h>
26#include <unistd.h>
27
Willy Tarreaue8692b42016-12-21 19:36:25 +010028#include <types/global.h>
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +010029#include <common/config.h>
Thierry FOURNIER9eec0a62014-01-22 18:38:02 +010030#include <common/errors.h>
Willy Tarreau34d4b522018-10-29 18:02:54 +010031#include <common/hathreads.h>
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +010032
33#include <proto/acl.h>
34#include <proto/log.h>
35
36#include <types/auth.h>
Thierry FOURNIERa65b3432013-11-28 18:22:00 +010037#include <types/pattern.h>
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +010038
39struct userlist *userlist = NULL; /* list of all existing userlists */
40
Willy Tarreau34d4b522018-10-29 18:02:54 +010041#ifdef CONFIG_HAP_CRYPT
Willy Tarreau943e7ec2018-10-29 19:16:27 +010042#ifdef HA_HAVE_CRYPT_R
43/* context for crypt_r() */
44static THREAD_LOCAL struct crypt_data crypt_data = { .initialized = 0 };
45#else
46/* lock for crypt() */
Willy Tarreau34d4b522018-10-29 18:02:54 +010047__decl_hathreads(static HA_SPINLOCK_T auth_lock);
48#endif
Willy Tarreau943e7ec2018-10-29 19:16:27 +010049#endif
Willy Tarreau34d4b522018-10-29 18:02:54 +010050
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +010051/* find targets for selected gropus. The function returns pointer to
52 * the userlist struct ot NULL if name is NULL/empty or unresolvable.
53 */
54
55struct userlist *
56auth_find_userlist(char *name)
57{
58 struct userlist *l;
59
60 if (!name || !*name)
61 return NULL;
62
63 for (l = userlist; l; l = l->next)
64 if (!strcmp(l->name, name))
65 return l;
66
67 return NULL;
68}
69
Thierry FOURNIER9eec0a62014-01-22 18:38:02 +010070int check_group(struct userlist *ul, char *name)
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +010071{
Thierry FOURNIER9eec0a62014-01-22 18:38:02 +010072 struct auth_groups *ag;
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +010073
Thierry FOURNIER9eec0a62014-01-22 18:38:02 +010074 for (ag = ul->groups; ag; ag = ag->next)
75 if (strcmp(name, ag->name) == 0)
76 return 1;
77 return 0;
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +010078}
79
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +010080void
81userlist_free(struct userlist *ul)
82{
83 struct userlist *tul;
84 struct auth_users *au, *tau;
Thierry FOURNIER9eec0a62014-01-22 18:38:02 +010085 struct auth_groups_list *agl, *tagl;
86 struct auth_groups *ag, *tag;
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +010087
88 while (ul) {
Thierry FOURNIER9eec0a62014-01-22 18:38:02 +010089 /* Free users. */
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +010090 au = ul->users;
91 while (au) {
Thierry FOURNIER9eec0a62014-01-22 18:38:02 +010092 /* Free groups that own current user. */
93 agl = au->u.groups;
94 while (agl) {
95 tagl = agl;
96 agl = agl->next;
97 free(tagl);
98 }
99
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +0100100 tau = au;
101 au = au->next;
102 free(tau->user);
103 free(tau->pass);
104 free(tau);
105 }
106
Thierry FOURNIER9eec0a62014-01-22 18:38:02 +0100107 /* Free grouplist. */
108 ag = ul->groups;
109 while (ag) {
110 tag = ag;
111 ag = ag->next;
112 free(tag->name);
113 free(tag);
114 }
115
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +0100116 tul = ul;
117 ul = ul->next;
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +0100118 free(tul->name);
119 free(tul);
120 };
121}
122
Thierry FOURNIER9eec0a62014-01-22 18:38:02 +0100123int userlist_postinit()
124{
125 struct userlist *curuserlist = NULL;
126
127 /* Resolve usernames and groupnames. */
128 for (curuserlist = userlist; curuserlist; curuserlist = curuserlist->next) {
129 struct auth_groups *ag;
130 struct auth_users *curuser;
131 struct auth_groups_list *grl;
132
133 for (curuser = curuserlist->users; curuser; curuser = curuser->next) {
134 char *group = NULL;
135 struct auth_groups_list *groups = NULL;
136
137 if (!curuser->u.groups_names)
138 continue;
139
140 while ((group = strtok(group?NULL:curuser->u.groups_names, ","))) {
141 for (ag = curuserlist->groups; ag; ag = ag->next) {
142 if (!strcmp(ag->name, group))
143 break;
144 }
145
146 if (!ag) {
Christopher Faulet767a84b2017-11-24 16:50:31 +0100147 ha_alert("userlist '%s': no such group '%s' specified in user '%s'\n",
148 curuserlist->name, group, curuser->user);
Dirkjan Bussink07fcaaa2014-04-28 22:57:16 +0000149 free(groups);
Thierry FOURNIER9eec0a62014-01-22 18:38:02 +0100150 return ERR_ALERT | ERR_FATAL;
151 }
152
153 /* Add this group at the group userlist. */
154 grl = calloc(1, sizeof(*grl));
155 if (!grl) {
Christopher Faulet767a84b2017-11-24 16:50:31 +0100156 ha_alert("userlist '%s': no more memory when trying to allocate the user groups.\n",
157 curuserlist->name);
Dirkjan Bussink07fcaaa2014-04-28 22:57:16 +0000158 free(groups);
159 return ERR_ALERT | ERR_FATAL;
Thierry FOURNIER9eec0a62014-01-22 18:38:02 +0100160 }
161
162 grl->group = ag;
163 grl->next = groups;
164 groups = grl;
165 }
166
167 free(curuser->u.groups);
168 curuser->u.groups = groups;
169 }
170
171 for (ag = curuserlist->groups; ag; ag = ag->next) {
172 char *user = NULL;
173
174 if (!ag->groupusers)
175 continue;
176
177 while ((user = strtok(user?NULL:ag->groupusers, ","))) {
178 for (curuser = curuserlist->users; curuser; curuser = curuser->next) {
179 if (!strcmp(curuser->user, user))
180 break;
181 }
182
183 if (!curuser) {
Christopher Faulet767a84b2017-11-24 16:50:31 +0100184 ha_alert("userlist '%s': no such user '%s' specified in group '%s'\n",
185 curuserlist->name, user, ag->name);
Thierry FOURNIER9eec0a62014-01-22 18:38:02 +0100186 return ERR_ALERT | ERR_FATAL;
187 }
188
189 /* Add this group at the group userlist. */
190 grl = calloc(1, sizeof(*grl));
191 if (!grl) {
Christopher Faulet767a84b2017-11-24 16:50:31 +0100192 ha_alert("userlist '%s': no more memory when trying to allocate the user groups.\n",
193 curuserlist->name);
Thierry FOURNIER9eec0a62014-01-22 18:38:02 +0100194 return ERR_ALERT | ERR_FATAL;
195 }
196
197 grl->group = ag;
198 grl->next = curuser->u.groups;
199 curuser->u.groups = grl;
200 }
201
202 free(ag->groupusers);
203 ag->groupusers = NULL;
204 }
205
206#ifdef DEBUG_AUTH
207 for (ag = curuserlist->groups; ag; ag = ag->next) {
208 struct auth_groups_list *agl;
209
210 fprintf(stderr, "group %s, id %p, users:", ag->name, ag);
211 for (curuser = curuserlist->users; curuser; curuser = curuser->next) {
212 for (agl = curuser->u.groups; agl; agl = agl->next) {
213 if (agl->group == ag)
214 fprintf(stderr, " %s", curuser->user);
215 }
216 }
217 fprintf(stderr, "\n");
218 }
219#endif
220 }
221
222 return ERR_NONE;
223}
224
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +0100225/*
226 * Authenticate and authorize user; return 1 if OK, 0 if case of error.
227 */
228int
Thierry FOURNIER9eec0a62014-01-22 18:38:02 +0100229check_user(struct userlist *ul, const char *user, const char *pass)
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +0100230{
231
232 struct auth_users *u;
CJ Ess6eac32e2015-05-02 16:35:24 -0400233#ifdef DEBUG_AUTH
234 struct auth_groups_list *agl;
235#endif
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +0100236 const char *ep;
237
238#ifdef DEBUG_AUTH
CJ Ess6eac32e2015-05-02 16:35:24 -0400239 fprintf(stderr, "req: userlist=%s, user=%s, pass=%s\n",
240 ul->name, user, pass);
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +0100241#endif
242
243 for (u = ul->users; u; u = u->next)
244 if (!strcmp(user, u->user))
245 break;
246
247 if (!u)
248 return 0;
249
250#ifdef DEBUG_AUTH
Thierry FOURNIER9eec0a62014-01-22 18:38:02 +0100251 fprintf(stderr, "cfg: user=%s, pass=%s, flags=%X, groups=",
252 u->user, u->pass, u->flags);
253 for (agl = u->u.groups; agl; agl = agl->next)
254 fprintf(stderr, " %s", agl->group->name);
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +0100255#endif
256
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +0100257 if (!(u->flags & AU_O_INSECURE)) {
258#ifdef CONFIG_HAP_CRYPT
Willy Tarreau943e7ec2018-10-29 19:16:27 +0100259#ifdef HA_HAVE_CRYPT_R
260 ep = crypt_r(pass, u->pass, &crypt_data);
261#else
Willy Tarreau34d4b522018-10-29 18:02:54 +0100262 HA_SPIN_LOCK(AUTH_LOCK, &auth_lock);
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +0100263 ep = crypt(pass, u->pass);
Willy Tarreau34d4b522018-10-29 18:02:54 +0100264 HA_SPIN_UNLOCK(AUTH_LOCK, &auth_lock);
Willy Tarreau943e7ec2018-10-29 19:16:27 +0100265#endif
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +0100266#else
267 return 0;
268#endif
269 } else
270 ep = pass;
271
272#ifdef DEBUG_AUTH
273 fprintf(stderr, ", crypt=%s\n", ep);
274#endif
275
Cyril Bontéc82279c2014-08-29 20:20:01 +0200276 if (ep && strcmp(ep, u->pass) == 0)
Krzysztof Piotr Oledzki96105042010-01-29 17:50:44 +0100277 return 1;
278 else
279 return 0;
280}
Krzysztof Piotr Oledzkif9423ae2010-01-29 19:26:18 +0100281
Thierry FOURNIER5338eea2013-12-16 14:22:13 +0100282struct pattern *
283pat_match_auth(struct sample *smp, struct pattern_expr *expr, int fill)
Krzysztof Piotr Oledzkif9423ae2010-01-29 19:26:18 +0100284{
Willy Tarreau37406352012-04-23 16:16:37 +0200285 struct userlist *ul = smp->ctx.a[0];
Thierry FOURNIER5338eea2013-12-16 14:22:13 +0100286 struct pattern_list *lst;
Thierry FOURNIER9eec0a62014-01-22 18:38:02 +0100287 struct auth_users *u;
288 struct auth_groups_list *agl;
Thierry FOURNIER5338eea2013-12-16 14:22:13 +0100289 struct pattern *pattern;
Krzysztof Piotr Oledzkif9423ae2010-01-29 19:26:18 +0100290
Thierry FOURNIER9eec0a62014-01-22 18:38:02 +0100291 /* Check if the userlist is present in the context data. */
292 if (!ul)
Willy Tarreau86e0fc12014-04-29 19:52:16 +0200293 return NULL;
Thierry FOURNIER9eec0a62014-01-22 18:38:02 +0100294
295 /* Browse the userlist for searching user. */
296 for (u = ul->users; u; u = u->next) {
Willy Tarreau843b7cb2018-07-13 10:54:26 +0200297 if (strcmp(smp->data.u.str.area, u->user) == 0)
Thierry FOURNIER9eec0a62014-01-22 18:38:02 +0100298 break;
299 }
300 if (!u)
Thierry FOURNIER5338eea2013-12-16 14:22:13 +0100301 return NULL;
Thierry FOURNIER9eec0a62014-01-22 18:38:02 +0100302
Thierry FOURNIER5338eea2013-12-16 14:22:13 +0100303 /* Browse each pattern. */
304 list_for_each_entry(lst, &expr->patterns, list) {
305 pattern = &lst->pat;
306
307 /* Browse each group for searching group name that match the pattern. */
308 for (agl = u->u.groups; agl; agl = agl->next) {
309 if (strcmp(agl->group->name, pattern->ptr.str) == 0)
310 return pattern;
311 }
Thierry FOURNIER9eec0a62014-01-22 18:38:02 +0100312 }
Thierry FOURNIER5338eea2013-12-16 14:22:13 +0100313 return NULL;
Krzysztof Piotr Oledzkif9423ae2010-01-29 19:26:18 +0100314}
Willy Tarreaue8692b42016-12-21 19:36:25 +0100315
316__attribute__((constructor))
317static void __auth_init(void)
318{
319 hap_register_build_opts("Encrypted password support via crypt(3): yes", 0);
320}