123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253 |
- /*
- Copyright (c) 2020 Roger Light <roger@atchoo.org>
- All rights reserved. This program and the accompanying materials
- are made available under the terms of the Eclipse Public License 2.0
- and Eclipse Distribution License v1.0 which accompany this distribution.
- The Eclipse Public License is available at
- https://www.eclipse.org/legal/epl-2.0/
- and the Eclipse Distribution License is available at
- http://www.eclipse.org/org/documents/edl-v10.php.
- SPDX-License-Identifier: EPL-2.0 OR BSD-3-Clause
- Contributors:
- Roger Light - initial implementation and documentation.
- */
- #include "config.h"
- #include "dynamic_security.h"
- #include "mosquitto.h"
- #include "mosquitto_broker.h"
- #include "mosquitto_plugin.h"
- typedef int (*MOSQ_FUNC_acl_check)(struct mosquitto_evt_acl_check *, struct dynsec__rolelist *);
- /* FIXME - CACHE! */
- /* ################################################################
- * #
- * # ACL check - publish broker to client
- * #
- * ################################################################ */
- static int acl_check_publish_c_recv(struct mosquitto_evt_acl_check *ed, struct dynsec__rolelist *base_rolelist)
- {
- struct dynsec__rolelist *rolelist, *rolelist_tmp = NULL;
- struct dynsec__acl *acl, *acl_tmp = NULL;
- bool result;
- HASH_ITER(hh, base_rolelist, rolelist, rolelist_tmp){
- HASH_ITER(hh, rolelist->role->acls.publish_c_recv, acl, acl_tmp){
- mosquitto_topic_matches_sub(acl->topic, ed->topic, &result);
- if(result){
- if(acl->allow){
- return MOSQ_ERR_SUCCESS;
- }else{
- return MOSQ_ERR_ACL_DENIED;
- }
- }
- }
- }
- return MOSQ_ERR_NOT_FOUND;
- }
- /* ################################################################
- * #
- * # ACL check - publish client to broker
- * #
- * ################################################################ */
- static int acl_check_publish_c_send(struct mosquitto_evt_acl_check *ed, struct dynsec__rolelist *base_rolelist)
- {
- struct dynsec__rolelist *rolelist, *rolelist_tmp = NULL;
- struct dynsec__acl *acl, *acl_tmp = NULL;
- bool result;
- HASH_ITER(hh, base_rolelist, rolelist, rolelist_tmp){
- HASH_ITER(hh, rolelist->role->acls.publish_c_send, acl, acl_tmp){
- mosquitto_topic_matches_sub(acl->topic, ed->topic, &result);
- if(result){
- if(acl->allow){
- return MOSQ_ERR_SUCCESS;
- }else{
- return MOSQ_ERR_ACL_DENIED;
- }
- }
- }
- }
- return MOSQ_ERR_NOT_FOUND;
- }
- /* ################################################################
- * #
- * # ACL check - subscribe
- * #
- * ################################################################ */
- static int acl_check_subscribe(struct mosquitto_evt_acl_check *ed, struct dynsec__rolelist *base_rolelist)
- {
- struct dynsec__rolelist *rolelist, *rolelist_tmp = NULL;
- struct dynsec__acl *acl, *acl_tmp = NULL;
- size_t len;
- len = strlen(ed->topic);
- HASH_ITER(hh, base_rolelist, rolelist, rolelist_tmp){
- HASH_FIND(hh, rolelist->role->acls.subscribe_literal, ed->topic, len, acl);
- if(acl){
- if(acl->allow){
- return MOSQ_ERR_SUCCESS;
- }else{
- return MOSQ_ERR_ACL_DENIED;
- }
- }
- HASH_ITER(hh, rolelist->role->acls.subscribe_pattern, acl, acl_tmp){
- if(sub_acl_check(acl->topic, ed->topic)){
- if(acl->allow){
- return MOSQ_ERR_SUCCESS;
- }else{
- return MOSQ_ERR_ACL_DENIED;
- }
- }
- }
- }
- return MOSQ_ERR_NOT_FOUND;
- }
- /* ################################################################
- * #
- * # ACL check - unsubscribe
- * #
- * ################################################################ */
- static int acl_check_unsubscribe(struct mosquitto_evt_acl_check *ed, struct dynsec__rolelist *base_rolelist)
- {
- struct dynsec__rolelist *rolelist, *rolelist_tmp = NULL;
- struct dynsec__acl *acl, *acl_tmp = NULL;
- size_t len;
- len = strlen(ed->topic);
- HASH_ITER(hh, base_rolelist, rolelist, rolelist_tmp){
- HASH_FIND(hh, rolelist->role->acls.unsubscribe_literal, ed->topic, len, acl);
- if(acl){
- if(acl->allow){
- return MOSQ_ERR_SUCCESS;
- }else{
- return MOSQ_ERR_ACL_DENIED;
- }
- }
- HASH_ITER(hh, rolelist->role->acls.unsubscribe_pattern, acl, acl_tmp){
- if(sub_acl_check(acl->topic, ed->topic)){
- if(acl->allow){
- return MOSQ_ERR_SUCCESS;
- }else{
- return MOSQ_ERR_ACL_DENIED;
- }
- }
- }
- }
- return MOSQ_ERR_NOT_FOUND;
- }
- /* ################################################################
- * #
- * # ACL check - generic check
- * #
- * ################################################################ */
- static int acl_check(struct mosquitto_evt_acl_check *ed, MOSQ_FUNC_acl_check check, bool acl_default_access)
- {
- struct dynsec__client *client;
- struct dynsec__grouplist *grouplist, *grouplist_tmp = NULL;
- const char *username;
- int rc;
- username = mosquitto_client_username(ed->client);
- if(username){
- client = dynsec_clients__find(username);
- if(client == NULL) return MOSQ_ERR_PLUGIN_DEFER;
- /* Client roles */
- rc = check(ed, client->rolelist);
- if(rc != MOSQ_ERR_NOT_FOUND){
- return rc;
- }
- HASH_ITER(hh, client->grouplist, grouplist, grouplist_tmp){
- rc = check(ed, grouplist->group->rolelist);
- if(rc != MOSQ_ERR_NOT_FOUND){
- return rc;
- }
- }
- }else if(dynsec_anonymous_group){
- /* If we have a group for anonymous users, use that for checking. */
- rc = check(ed, dynsec_anonymous_group->rolelist);
- if(rc != MOSQ_ERR_NOT_FOUND){
- return rc;
- }
- }
- if(acl_default_access == false){
- return MOSQ_ERR_PLUGIN_DEFER;
- }else{
- if(!strncmp(ed->topic, "$CONTROL", strlen("$CONTROL"))){
- /* We never give fall through access to $CONTROL topics, they must
- * be granted explicitly. */
- return MOSQ_ERR_PLUGIN_DEFER;
- }else{
- return MOSQ_ERR_SUCCESS;
- }
- }
- }
- /* ################################################################
- * #
- * # ACL check - plugin callback
- * #
- * ################################################################ */
- int dynsec__acl_check_callback(int event, void *event_data, void *userdata)
- {
- struct mosquitto_evt_acl_check *ed = event_data;
- UNUSED(event);
- UNUSED(userdata);
- /* ACL checks are made in the order below until a match occurs, at which
- * point the decision is made.
- *
- * User roles in priority order highest to lowest.
- * Roles have their ACLs checked in priority order, highest to lowest
- * Groups are processed in priority order highest to lowest
- * Group roles are processed in priority order, highest to lowest
- * Roles have their ACLs checked in priority order, highest to lowest
- */
- switch(ed->access){
- case MOSQ_ACL_SUBSCRIBE:
- return acl_check(event_data, acl_check_subscribe, default_access.subscribe);
- break;
- case MOSQ_ACL_UNSUBSCRIBE:
- return acl_check(event_data, acl_check_unsubscribe, default_access.unsubscribe);
- break;
- case MOSQ_ACL_WRITE: /* Client to broker */
- return acl_check(event_data, acl_check_publish_c_send, default_access.publish_c_send);
- break;
- case MOSQ_ACL_READ:
- return acl_check(event_data, acl_check_publish_c_recv, default_access.publish_c_recv);
- break;
- default:
- return MOSQ_ERR_PLUGIN_DEFER;
- }
- return MOSQ_ERR_PLUGIN_DEFER;
- }
|