| /* Copyright 2002-2004 The Apache Software Foundation |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| #include "apr_strings.h" |
| |
| #include "ap_config.h" |
| #include "httpd.h" |
| #include "http_config.h" |
| #include "http_core.h" |
| #include "http_log.h" |
| #include "http_protocol.h" |
| #include "http_request.h" |
| |
| typedef struct { |
| int authoritative; |
| } authz_user_config_rec; |
| |
| static void *create_authz_user_dir_config(apr_pool_t *p, char *d) |
| { |
| authz_user_config_rec *conf = apr_palloc(p, sizeof(*conf)); |
| |
| conf->authoritative = 1; /* keep the fortress secure by default */ |
| return conf; |
| } |
| |
| static const command_rec authz_user_cmds[] = |
| { |
| AP_INIT_FLAG("AuthzUserAuthoritative", ap_set_flag_slot, |
| (void *)APR_OFFSETOF(authz_user_config_rec, authoritative), |
| OR_AUTHCFG, |
| "Set to 'Off' to allow access control to be passed along to " |
| "lower modules if the 'require user' or 'require valid-user' " |
| "statement is not met. (default: On)."), |
| {NULL} |
| }; |
| |
| module AP_MODULE_DECLARE_DATA authz_user_module; |
| |
| static int check_user_access(request_rec *r) |
| { |
| authz_user_config_rec *conf = ap_get_module_config(r->per_dir_config, |
| &authz_user_module); |
| char *user = r->user; |
| int m = r->method_number; |
| int required_user = 0; |
| register int x; |
| const char *t, *w; |
| const apr_array_header_t *reqs_arr = ap_requires(r); |
| require_line *reqs; |
| |
| /* BUG FIX: tadc, 11-Nov-1995. If there is no "requires" directive, |
| * then any user will do. |
| */ |
| if (!reqs_arr) { |
| return DECLINED; |
| } |
| reqs = (require_line *)reqs_arr->elts; |
| |
| for (x = 0; x < reqs_arr->nelts; x++) { |
| |
| if (!(reqs[x].method_mask & (AP_METHOD_BIT << m))) { |
| continue; |
| } |
| |
| t = reqs[x].requirement; |
| w = ap_getword_white(r->pool, &t); |
| if (!strcmp(w, "valid-user")) { |
| return OK; |
| } |
| if (!strcmp(w, "user")) { |
| /* And note that there are applicable requirements |
| * which we consider ourselves the owner of. |
| */ |
| required_user = 1; |
| while (t[0]) { |
| w = ap_getword_conf(r->pool, &t); |
| if (!strcmp(user, w)) { |
| return OK; |
| } |
| } |
| } |
| } |
| |
| if (!required_user) { |
| /* no applicable requirements */ |
| return DECLINED; |
| } |
| |
| if (!conf->authoritative) { |
| return DECLINED; |
| } |
| |
| ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, |
| "access to %s failed, reason: user '%s' does not meet " |
| "'require'ments for user/valid-user to be allowed access", |
| r->uri, user); |
| |
| ap_note_auth_failure(r); |
| return HTTP_UNAUTHORIZED; |
| } |
| |
| static void register_hooks(apr_pool_t *p) |
| { |
| ap_hook_auth_checker(check_user_access, NULL, NULL, APR_HOOK_MIDDLE); |
| } |
| |
| module AP_MODULE_DECLARE_DATA authz_user_module = |
| { |
| STANDARD20_MODULE_STUFF, |
| create_authz_user_dir_config, /* dir config creater */ |
| NULL, /* dir merger --- default is to override */ |
| NULL, /* server config */ |
| NULL, /* merge server config */ |
| authz_user_cmds, /* command apr_table_t */ |
| register_hooks /* register hooks */ |
| }; |