Move acl check to own file.
parent
f5baeac976
commit
143e146e1a
@ -0,0 +1,199 @@
|
||||
/*
|
||||
Copyright (c) 2011-2021 Roger Light <roger@atchoo.org>
|
||||
|
||||
All rights reserved. This program and the accompanying materials
|
||||
are made available under the terms of the Eclipse Public License 2.0
|
||||
and Eclipse Distribution License v1.0 which accompany this distribution.
|
||||
|
||||
The Eclipse Public License is available at
|
||||
https://www.eclipse.org/legal/epl-2.0/
|
||||
and the Eclipse Distribution License is available at
|
||||
http://www.eclipse.org/org/documents/edl-v10.php.
|
||||
|
||||
SPDX-License-Identifier: EPL-2.0 OR BSD-3-Clause
|
||||
|
||||
Contributors:
|
||||
Roger Light - initial implementation and documentation.
|
||||
*/
|
||||
|
||||
#include "config.h"
|
||||
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
|
||||
#include "mosquitto_broker.h"
|
||||
#include "mosquitto_broker_internal.h"
|
||||
#include "mosquitto_plugin.h"
|
||||
#include "memory_mosq.h"
|
||||
#include "lib_load.h"
|
||||
#include "utlist.h"
|
||||
|
||||
int acl__pre_check(struct mosquitto__plugin_config *plugin, struct mosquitto *context, int access)
|
||||
{
|
||||
const char *username;
|
||||
|
||||
username = mosquitto_client_username(context);
|
||||
if(plugin->deny_special_chars == true){
|
||||
/* Check whether the client id or username contains a +, # or / and if
|
||||
* so deny access.
|
||||
*
|
||||
* Do this check for every message regardless, we have to protect the
|
||||
* plugins against possible pattern based attacks.
|
||||
*/
|
||||
if(username && strpbrk(username, "+#")){
|
||||
log__printf(NULL, MOSQ_LOG_NOTICE, "ACL denying access to client with dangerous username \"%s\"", username);
|
||||
return MOSQ_ERR_ACL_DENIED;
|
||||
}
|
||||
if(context->id && strpbrk(context->id, "+#")){
|
||||
log__printf(NULL, MOSQ_LOG_NOTICE, "ACL denying access to client with dangerous client id \"%s\"", context->id);
|
||||
return MOSQ_ERR_ACL_DENIED;
|
||||
}
|
||||
}
|
||||
|
||||
if(plugin->plugin.version == 4){
|
||||
if(access == MOSQ_ACL_UNSUBSCRIBE){
|
||||
return MOSQ_ERR_SUCCESS;
|
||||
}
|
||||
}else if(plugin->plugin.version == 3){
|
||||
if(access == MOSQ_ACL_UNSUBSCRIBE){
|
||||
return MOSQ_ERR_SUCCESS;
|
||||
}
|
||||
}else if(plugin->plugin.version == 2){
|
||||
if(access == MOSQ_ACL_SUBSCRIBE || access == MOSQ_ACL_UNSUBSCRIBE){
|
||||
return MOSQ_ERR_SUCCESS;
|
||||
}
|
||||
}
|
||||
return MOSQ_ERR_PLUGIN_DEFER;
|
||||
}
|
||||
|
||||
|
||||
static int acl__check_dollar(const char *topic, int access)
|
||||
{
|
||||
int rc;
|
||||
bool match = false;
|
||||
|
||||
if(topic[0] != '$') return MOSQ_ERR_SUCCESS;
|
||||
|
||||
if(!strncmp(topic, "$SYS", 4)){
|
||||
if(access == MOSQ_ACL_WRITE){
|
||||
/* Potentially allow write access for bridge status, otherwise explicitly deny. */
|
||||
rc = mosquitto_topic_matches_sub("$SYS/broker/connection/+/state", topic, &match);
|
||||
if(rc == MOSQ_ERR_SUCCESS && match == true){
|
||||
return MOSQ_ERR_SUCCESS;
|
||||
}else{
|
||||
return MOSQ_ERR_ACL_DENIED;
|
||||
}
|
||||
}else{
|
||||
return MOSQ_ERR_SUCCESS;
|
||||
}
|
||||
}else if(!strncmp(topic, "$share", 6)){
|
||||
/* Only allow sub/unsub to shared subscriptions */
|
||||
if(access == MOSQ_ACL_SUBSCRIBE || access == MOSQ_ACL_UNSUBSCRIBE){
|
||||
return MOSQ_ERR_SUCCESS;
|
||||
}else{
|
||||
return MOSQ_ERR_ACL_DENIED;
|
||||
}
|
||||
}else{
|
||||
/* This is an unknown $ topic, for the moment just defer to actual tests. */
|
||||
return MOSQ_ERR_SUCCESS;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
static int plugin__acl_check(struct mosquitto__security_options *opts, struct mosquitto *context, const char *topic, uint32_t payloadlen, void* payload, uint8_t qos, bool retain, int access)
|
||||
{
|
||||
int rc = MOSQ_ERR_PLUGIN_DEFER;
|
||||
struct mosquitto_acl_msg msg;
|
||||
struct mosquitto__callback *cb_base;
|
||||
struct mosquitto_evt_acl_check event_data;
|
||||
|
||||
memset(&msg, 0, sizeof(msg));
|
||||
msg.topic = topic;
|
||||
msg.payloadlen = payloadlen;
|
||||
msg.payload = payload;
|
||||
msg.qos = qos;
|
||||
msg.retain = retain;
|
||||
|
||||
DL_FOREACH(opts->plugin_callbacks.acl_check, cb_base){
|
||||
rc = MOSQ_ERR_PLUGIN_DEFER;
|
||||
/* FIXME - username deny special chars */
|
||||
|
||||
memset(&event_data, 0, sizeof(event_data));
|
||||
event_data.client = context;
|
||||
event_data.access = access;
|
||||
event_data.topic = topic;
|
||||
event_data.payloadlen = payloadlen;
|
||||
event_data.payload = payload;
|
||||
event_data.qos = qos;
|
||||
event_data.retain = retain;
|
||||
event_data.properties = NULL;
|
||||
rc = cb_base->cb(MOSQ_EVT_ACL_CHECK, &event_data, cb_base->userdata);
|
||||
if(rc != MOSQ_ERR_PLUGIN_DEFER && rc != MOSQ_ERR_PLUGIN_IGNORE){
|
||||
return rc;
|
||||
}
|
||||
}
|
||||
|
||||
return rc;
|
||||
}
|
||||
|
||||
int mosquitto_acl_check(struct mosquitto *context, const char *topic, uint32_t payloadlen, void* payload, uint8_t qos, bool retain, int access)
|
||||
{
|
||||
int rc;
|
||||
int rc_final;
|
||||
|
||||
if(!context->id){
|
||||
return MOSQ_ERR_ACL_DENIED;
|
||||
}
|
||||
if(context->bridge){
|
||||
return MOSQ_ERR_SUCCESS;
|
||||
}
|
||||
|
||||
rc = acl__check_dollar(topic, access);
|
||||
if(rc) return rc;
|
||||
|
||||
/*
|
||||
* If no plugins exist we should accept at this point so set rc to success.
|
||||
*/
|
||||
rc_final = MOSQ_ERR_SUCCESS;
|
||||
|
||||
/* If per_listener_settings is true, these are the global plugins.
|
||||
* If per listener_settings is false, these are global and listener plugins. */
|
||||
if(db.config->security_options.plugin_callbacks.acl_check){
|
||||
rc = plugin__acl_check(&db.config->security_options, context, topic, payloadlen,
|
||||
payload, qos, retain, access);
|
||||
|
||||
if(rc == MOSQ_ERR_PLUGIN_IGNORE){
|
||||
/* Do nothing, this is as if the plugin doesn't exist */
|
||||
}else if(rc == MOSQ_ERR_PLUGIN_DEFER){
|
||||
rc_final = MOSQ_ERR_PLUGIN_DEFER;
|
||||
}else{
|
||||
return rc;
|
||||
}
|
||||
}
|
||||
|
||||
if(db.config->per_listener_settings){
|
||||
if(context->listener){
|
||||
if(context->listener->security_options.plugin_callbacks.acl_check){
|
||||
rc = plugin__acl_check(&context->listener->security_options, context, topic, payloadlen,
|
||||
payload, qos, retain, access);
|
||||
|
||||
if(rc == MOSQ_ERR_PLUGIN_IGNORE){
|
||||
/* Do nothing, this is as if the plugin doesn't exist */
|
||||
}else if(rc == MOSQ_ERR_PLUGIN_DEFER){
|
||||
rc_final = MOSQ_ERR_PLUGIN_DEFER;
|
||||
}else{
|
||||
return rc;
|
||||
}
|
||||
}
|
||||
}else{
|
||||
return MOSQ_ERR_ACL_DENIED;
|
||||
}
|
||||
}
|
||||
|
||||
/* If all plugins deferred, this is a denial. If rc == MOSQ_ERR_SUCCESS
|
||||
* here, then no plugins were configured, or all plugins ignored. */
|
||||
if(rc_final == MOSQ_ERR_PLUGIN_DEFER){
|
||||
rc_final = MOSQ_ERR_ACL_DENIED;
|
||||
}
|
||||
return rc_final;
|
||||
}
|
Loading…
Reference in New Issue