From 133bf49fdf9f4dc577e07d5e057c6b4bf62f987c Mon Sep 17 00:00:00 2001 From: Graham Leggett Date: Mon, 30 Dec 2013 08:54:09 +0000 Subject: [PATCH] mod_authnz_dbd: Support the expression parser within the require directives. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1554168 13f79535-47bb-0310-9956-ffa450edef68 --- CHANGES | 3 ++ docs/log-message-tags/next-number | 2 +- docs/manual/expr.xml | 1 + docs/manual/mod/mod_authz_dbd.xml | 49 +++++++++++++++++++++++++++++++ modules/aaa/mod_authz_dbd.c | 36 +++++++++++++++++++++-- 5 files changed, 88 insertions(+), 3 deletions(-) diff --git a/CHANGES b/CHANGES index 133fe72039..8cf00cf801 100644 --- a/CHANGES +++ b/CHANGES @@ -1,6 +1,9 @@ -*- coding: utf-8 -*- Changes with Apache 2.5.0 + *) mod_authnz_dbd: Support the expression parser within the require + directives. [Graham Leggett] + *) mod_authnz_ldap: Support the expression parser within the require directives. [Graham Leggett] diff --git a/docs/log-message-tags/next-number b/docs/log-message-tags/next-number index 06e45f3b09..198c10de8d 100644 --- a/docs/log-message-tags/next-number +++ b/docs/log-message-tags/next-number @@ -1 +1 @@ -2590 +2591 diff --git a/docs/manual/expr.xml b/docs/manual/expr.xml index dc9e8fbe47..292a389523 100644 --- a/docs/manual/expr.xml +++ b/docs/manual/expr.xml @@ -56,6 +56,7 @@ Require ldap-dn Require ldap-attribute Require ldap-filter +Require dbd-group SSLRequire LogMessage mod_include diff --git a/docs/manual/mod/mod_authz_dbd.xml b/docs/manual/mod/mod_authz_dbd.xml index fc441791a9..10b9d7572a 100644 --- a/docs/manual/mod/mod_authz_dbd.xml +++ b/docs/manual/mod/mod_authz_dbd.xml @@ -52,6 +52,55 @@ DBDriver DBDParams +
The Require Directives + +

Apache's Require + directives are used during the authorization phase to ensure that + a user is allowed to access a resource. mod_authz_dbd extends the + authorization types with dbd-group, dbd-login and + dbd-logout.

+ +

Since v2.5.0, expressions are supported + within the DBD require directives.

+ +
Require dbd-group + +

This directive specifies group membership that is required for the + user to gain access.

+ + + Require dbd-group team + AuthzDBDQuery "SELECT group FROM authz WHERE user = %s" + + +
+ +
Require dbd-login + +

This directive specifies a query to be run indicating the user + has logged in.

+ + + Require dbd-login + AuthzDBDQuery "UPDATE authn SET login = 'true' WHERE user = %s" + + +
+ +
Require dbd-logout + +

This directive specifies a query to be run indicating the user + has logged out.

+ + + Require dbd-logout + AuthzDBDQuery "UPDATE authn SET login = 'false' WHERE user = %s" + + +
+ +
+
Database Login

diff --git a/modules/aaa/mod_authz_dbd.c b/modules/aaa/mod_authz_dbd.c index 2d4925f522..d766d55486 100644 --- a/modules/aaa/mod_authz_dbd.c +++ b/modules/aaa/mod_authz_dbd.c @@ -253,6 +253,11 @@ static authz_status dbdgroup_check_authorization(request_rec *r, int i, rv; const char *w; apr_array_header_t *groups = NULL; + + const char *err = NULL; + const ap_expr_info_t *expr = parsed_require_args; + const char *require; + const char *t; authz_dbd_cfg *cfg = ap_get_module_config(r->per_dir_config, &authz_dbd_module); @@ -269,7 +274,15 @@ static authz_status dbdgroup_check_authorization(request_rec *r, } } - t = require_args; + require = ap_expr_str_exec(r, expr, &err); + if (err) { + ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(02590) + "authz_dbd authorize: require dbd-group: Can't " + "evaluate require expression: %s", err); + return AUTHZ_DENIED; + } + + t = require; while (t[0]) { w = ap_getword_white(r->pool, &t); for (i=0; i < groups->nelts; ++i) { @@ -310,10 +323,29 @@ static authz_status dbdlogout_check_authorization(request_rec *r, return (authz_dbd_login(r, cfg, "logout") == OK ? AUTHZ_GRANTED : AUTHZ_DENIED); } +static const char *dbd_parse_config(cmd_parms *cmd, const char *require_line, + const void **parsed_require_line) +{ + const char *expr_err = NULL; + ap_expr_info_t *expr = apr_pcalloc(cmd->pool, sizeof(*expr)); + + expr = ap_expr_parse_cmd(cmd, require_line, AP_EXPR_FLAG_STRING_RESULT, + &expr_err, NULL); + + if (expr_err) + return apr_pstrcat(cmd->temp_pool, + "Cannot parse expression in require line: ", + expr_err, NULL); + + *parsed_require_line = expr; + + return NULL; +} + static const authz_provider authz_dbdgroup_provider = { &dbdgroup_check_authorization, - NULL, + dbd_parse_config, }; static const authz_provider authz_dbdlogin_provider = -- 2.40.0