/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ /* $Rev$ $Date$ */ /** * HTTPD module for Tuscany Open authentication. * * This module allows multiple authentication mechanisms to co-exist in a * single Web site: * - OAuth1 using Tuscany's mod-tuscany-oauth1 * - OAuth2 using Tuscany's mod-tuscany-oauth2 * - OpenID using mod_auth_openid * - Form-based using HTTPD's mod_auth_form * - SSL certificate using SSLFakeBasicAuth and mod_auth_basic */ #include #include "string.hpp" #include "stream.hpp" #include "list.hpp" #include "tree.hpp" #include "value.hpp" #include "monad.hpp" #include "httpd.hpp" #include "http.hpp" #include "openauth.hpp" extern "C" { extern module AP_MODULE_DECLARE_DATA mod_tuscany_openauth; } namespace tuscany { namespace openauth { /** * Server configuration. */ class ServerConf { public: ServerConf(apr_pool_t* p, server_rec* s) : p(p), server(s) { } const gc_pool p; server_rec* server; }; /** * Directory configuration. */ class DirConf { public: DirConf(apr_pool_t* p, char* d) : p(p), dir(d), enabled(false), login("") { } const gc_pool p; const char* dir; bool enabled; string login; }; /** * Return the user info from a form auth session cookie. */ const failable userInfo(const value& sid, const string& realm) { const list> info = httpd::queryArgs(sid); debug(info, "modopenauth::userInfo::info"); const list user = assoc(realm + "-user", info); if (isNil(user)) return mkfailure("Couldn't retrieve user id"); const list pw = assoc(realm + "-pw", info); if (isNil(pw)) return mkfailure("Couldn't retrieve password"); return value(mklist(mklist("realm", realm), mklist("id", cadr(user)), mklist("password", cadr(pw)))); } /** * Return the user info from a basic auth header. */ const failable userInfo(const char* header, const string& realm, request_rec* r) { debug(header, "modopenauth::userInfo::header"); if (strcasecmp(ap_getword(r->pool, &header, ' '), "Basic")) return mkfailure("Wrong authentication scheme"); while (apr_isspace(*header)) header++; char *decoded_line = (char*)apr_palloc(r->pool, apr_base64_decode_len(header) + 1); int length = apr_base64_decode(decoded_line, header); decoded_line[length] = '\0'; const string user(ap_getword_nulls(r->pool, const_cast(&decoded_line), ':')); const string pw(decoded_line); return value(mklist(mklist("realm", realm), mklist("id", user), mklist("password", pw))); } /** * Handle an authenticated request. */ const failable authenticated(const list >& info, request_rec* r) { debug(info, "modopenauth::authenticated::info"); // Store user info in the request const list realm = assoc("realm", info); if (isNil(realm) || isNil(cdr(realm))) return mkfailure("Couldn't retrieve realm"); apr_table_set(r->subprocess_env, apr_pstrdup(r->pool, "REALM"), apr_pstrdup(r->pool, c_str(cadr(realm)))); const list id = assoc("id", info); if (isNil(id) || isNil(cdr(id))) return mkfailure("Couldn't retrieve user id"); r->user = apr_pstrdup(r->pool, c_str(cadr(id))); apr_table_set(r->subprocess_env, apr_pstrdup(r->pool, "NICKNAME"), apr_pstrdup(r->pool, c_str(cadr(id)))); return OK; } /** * Run the authnz hooks to try to authenticate a request. */ const failable checkAuthnz(const string& user, const string& pw, request_rec* r) { const authn_provider* provider = (const authn_provider*)ap_lookup_provider(AUTHN_PROVIDER_GROUP, AUTHN_DEFAULT_PROVIDER, AUTHN_PROVIDER_VERSION); if (!provider || !provider->check_password) return mkfailure("No Authn provider configured"); apr_table_setn(r->notes, AUTHN_PROVIDER_NAME_NOTE, AUTHN_DEFAULT_PROVIDER); const authn_status auth_result = provider->check_password(r, c_str(user), c_str(pw)); apr_table_unset(r->notes, AUTHN_PROVIDER_NAME_NOTE); if (auth_result != AUTH_GRANTED) return mkfailure("Authentication failure for: " + user); return OK; } /** * Check user authentication. */ static int checkAuthn(request_rec *r) { // Decline if we're not enabled or AuthType is not set to Open const DirConf& dc = httpd::dirConf(r, &mod_tuscany_openauth); if (!dc.enabled) return DECLINED; const char* atype = ap_auth_type(r); if (atype == NULL || strcasecmp(atype, "Open")) return DECLINED; gc_scoped_pool pool(r->pool); httpdDebugRequest(r, "modopenauth::checkAuthn::input"); // Get session id from the request const maybe sid = sessionID(r); if (hasContent(sid)) { // Decline if the session id was not created by this module const string stype = substr(content(sid), 0, 7); if (stype == "OAuth2_" || stype == "OAuth1_" || stype == "OpenID_") return DECLINED; // Retrieve the auth realm const char* aname = ap_auth_name(r); if (aname == NULL) return httpd::reportStatus(mkfailure("Missing AuthName")); // Extract user info from the session id const failable info = userInfo(content(sid), aname); if (hasContent(info)) { // Try to authenticate the request const value cinfo = content(info); const failable authz = checkAuthnz(cadr(assoc("id", cinfo)), cadr(assoc("password", cinfo)), r); if (!hasContent(authz)) { // Authentication failed, redirect to login page r->ap_auth_type = const_cast(atype); return httpd::reportStatus(login(dc.login, r)); } // Successfully authenticated, store the user info in the request r->ap_auth_type = const_cast(atype); return httpd::reportStatus(authenticated(cinfo, r)); } } // Get basic auth header from the request const char* header = apr_table_get(r->headers_in, (PROXYREQ_PROXY == r->proxyreq) ? "Proxy-Authorization" : "Authorization"); if (header != NULL) { // Retrieve the auth realm const char* aname = ap_auth_name(r); if (aname == NULL) return httpd::reportStatus(mkfailure("Missing AuthName")); // Extract user info from the session id const failable info = userInfo(header, aname, r); if (hasContent(info)) { // Try to authenticate the request const value cinfo = content(info); const failable authz = checkAuthnz(cadr(assoc("id", cinfo)), cadr(assoc("password", cinfo)), r); if (!hasContent(authz)) { // Authentication failed, redirect to login page r->ap_auth_type = const_cast(atype); return httpd::reportStatus(login(dc.login, r)); } // Successfully authenticated, store the user info in the request r->ap_auth_type = const_cast(atype); return httpd::reportStatus(authenticated(cinfo, r)); } } // Get the request args const list > args = httpd::queryArgs(r); // Decline if the request is for another authentication provider if (!isNil(assoc("openid_identifier", args))) return DECLINED; if (!isNil(assoc("mod_oauth1_step", args))) return DECLINED; if (!isNil(assoc("mod_oauth2_step", args))) return DECLINED; // Redirect to the login page r->ap_auth_type = const_cast(atype); return httpd::reportStatus(login(dc.login, r)); } /** * Process the module configuration. */ int postConfigMerge(ServerConf& mainsc, server_rec* s) { if (s == NULL) return OK; debug(httpd::serverName(s), "modopenauth::postConfigMerge::serverName"); return postConfigMerge(mainsc, s->next); } int postConfig(apr_pool_t* p, unused apr_pool_t* plog, unused apr_pool_t* ptemp, server_rec* s) { gc_scoped_pool pool(p); ServerConf& sc = httpd::serverConf(s, &mod_tuscany_openauth); debug(httpd::serverName(s), "modopenauth::postConfig::serverName"); // Merge server configurations return postConfigMerge(sc, s); } /** * Child process initialization. */ void childInit(apr_pool_t* p, server_rec* s) { gc_scoped_pool pool(p); ServerConf* psc = (ServerConf*)ap_get_module_config(s->module_config, &mod_tuscany_openauth); if(psc == NULL) { cfailure << "[Tuscany] Due to one or more errors mod_tuscany_openauth loading failed. Causing apache to stop loading." << endl; exit(APEXIT_CHILDFATAL); } ServerConf& sc = *psc; // Merge the updated configuration into the virtual hosts postConfigMerge(sc, s->next); } /** * Configuration commands. */ const char* confEnabled(cmd_parms *cmd, void *c, const int arg) { gc_scoped_pool pool(cmd->pool); DirConf& dc = httpd::dirConf(c); dc.enabled = (bool)arg; return NULL; } const char* confLogin(cmd_parms *cmd, void *c, const char* arg) { gc_scoped_pool pool(cmd->pool); DirConf& dc = httpd::dirConf(c); dc.login = arg; return NULL; } /** * HTTP server module declaration. */ const command_rec commands[] = { AP_INIT_FLAG("AuthOpenAuth", (const char*(*)())confEnabled, NULL, OR_AUTHCFG, "Tuscany Open Auth authentication On | Off"), AP_INIT_TAKE1("AuthOpenAuthLoginPage", (const char*(*)())confLogin, NULL, OR_AUTHCFG, "Tuscany Open Auth login page"), {NULL, NULL, NULL, 0, NO_ARGS, NULL} }; void registerHooks(unused apr_pool_t *p) { ap_hook_post_config(postConfig, NULL, NULL, APR_HOOK_MIDDLE); ap_hook_child_init(childInit, NULL, NULL, APR_HOOK_MIDDLE); ap_hook_check_authn(checkAuthn, NULL, NULL, APR_HOOK_MIDDLE, AP_AUTH_INTERNAL_PER_CONF); } } } extern "C" { module AP_MODULE_DECLARE_DATA mod_tuscany_openauth = { STANDARD20_MODULE_STUFF, // dir config and merger tuscany::httpd::makeDirConf, NULL, // server config and merger tuscany::httpd::makeServerConf, NULL, // commands and hooks tuscany::openauth::commands, tuscany::openauth::registerHooks }; }