]>
git.ipfire.org Git - thirdparty/squid.git/blob - src/acl/Gadgets.cc
2 * DEBUG: section 28 Access Control
3 * AUTHOR: Duane Wessels
5 * This file contains ACL routines that are not part of the
6 * ACL class, nor any other class yet, and that need to be
7 * factored into appropriate places. They are here to reduce
8 * unneeded dependencies between the ACL class and the rest
11 * SQUID Web Proxy Cache http://www.squid-cache.org/
12 * ----------------------------------------------------------
14 * Squid is the result of efforts by numerous individuals from
15 * the Internet community; see the CONTRIBUTORS file for full
16 * details. Many organizations have provided support for Squid's
17 * development; see the SPONSORS file for full details. Squid is
18 * Copyrighted (C) 2001 by the Regents of the University of
19 * California; see the COPYRIGHT file for full details. Squid
20 * incorporates software developed and/or copyrighted by other
21 * sources; see the CREDITS file for full details.
23 * This program is free software; you can redistribute it and/or modify
24 * it under the terms of the GNU General Public License as published by
25 * the Free Software Foundation; either version 2 of the License, or
26 * (at your option) any later version.
28 * This program is distributed in the hope that it will be useful,
29 * but WITHOUT ANY WARRANTY; without even the implied warranty of
30 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
31 * GNU General Public License for more details.
33 * You should have received a copy of the GNU General Public License
34 * along with this program; if not, write to the Free Software
35 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111, USA.
41 #include "acl/AclNameList.h"
42 #include "acl/AclDenyInfoList.h"
43 #include "acl/Checklist.h"
45 #include "acl/Strategised.h"
46 #include "acl/Gadgets.h"
47 #include "ConfigParser.h"
48 #include "errorpage.h"
50 #include "HttpRequest.h"
53 /* does name lookup, returns page_id */
55 aclGetDenyInfoPage(AclDenyInfoList
** head
, const char *name
, int redirect_allowed
)
57 AclDenyInfoList
*A
= NULL
;
59 debugs(28, 8, HERE
<< "got called for " << name
);
61 for (A
= *head
; A
; A
= A
->next
) {
62 AclNameList
*L
= NULL
;
64 if (!redirect_allowed
&& strchr(A
->err_page_name
, ':') ) {
65 debugs(28, 8, HERE
<< "Skip '" << A
->err_page_name
<< "' 30x redirects not allowed as response here.");
69 for (L
= A
->acl_list
; L
; L
= L
->next
) {
70 if (!strcmp(name
, L
->name
)) {
71 debugs(28, 8, HERE
<< "match on " << name
);
72 return A
->err_page_id
;
78 debugs(28, 8, "aclGetDenyInfoPage: no match");
82 /* does name lookup, returns if it is a proxy_auth acl */
84 aclIsProxyAuth(const char *name
)
86 debugs(28, 5, "aclIsProxyAuth: called for " << name
);
93 if ((a
= ACL::FindByName(name
))) {
94 debugs(28, 5, "aclIsProxyAuth: returning " << a
->isProxyAuth());
95 return a
->isProxyAuth();
98 debugs(28, 3, "aclIsProxyAuth: WARNING, called for nonexistent ACL");
102 /* maex@space.net (05.09.96)
103 * get the info for redirecting "access denied" to info pages
105 * currently there is no optimization for
106 * - more than one deny_info line with the same url
107 * - a check, whether the given acl really is defined
108 * - a check, whether an acl is added more than once for the same url
112 aclParseDenyInfoLine(AclDenyInfoList
** head
)
115 AclDenyInfoList
*A
= NULL
;
116 AclDenyInfoList
*B
= NULL
;
117 AclDenyInfoList
**T
= NULL
;
118 AclNameList
*L
= NULL
;
119 AclNameList
**Tail
= NULL
;
121 /* first expect a page name */
123 if ((t
= strtok(NULL
, w_space
)) == NULL
) {
124 debugs(28, DBG_CRITICAL
, "aclParseDenyInfoLine: " << cfg_filename
<< " line " << config_lineno
<< ": " << config_input_line
);
125 debugs(28, DBG_CRITICAL
, "aclParseDenyInfoLine: missing 'error page' parameter.");
129 A
= (AclDenyInfoList
*)memAllocate(MEM_ACL_DENY_INFO_LIST
);
130 A
->err_page_id
= errorReservePageId(t
);
131 A
->err_page_name
= xstrdup(t
);
132 A
->next
= (AclDenyInfoList
*) NULL
;
133 /* next expect a list of ACL names */
136 while ((t
= strtok(NULL
, w_space
))) {
137 L
= (AclNameList
*)memAllocate(MEM_ACL_NAME_LIST
);
138 xstrncpy(L
->name
, t
, ACL_NAME_SZ
-1);
143 if (A
->acl_list
== NULL
) {
144 debugs(28, DBG_CRITICAL
, "aclParseDenyInfoLine: " << cfg_filename
<< " line " << config_lineno
<< ": " << config_input_line
);
145 debugs(28, DBG_CRITICAL
, "aclParseDenyInfoLine: deny_info line contains no ACL's, skipping");
146 memFree(A
, MEM_ACL_DENY_INFO_LIST
);
150 for (B
= *head
, T
= head
; B
; T
= &B
->next
, B
= B
->next
)
152 ; /* find the tail */
157 aclParseAccessLine(const char *directive
, ConfigParser
&, acl_access
**treep
)
159 /* first expect either 'allow' or 'deny' */
160 const char *t
= ConfigParser::strtokFile();
163 debugs(28, DBG_CRITICAL
, "aclParseAccessLine: " << cfg_filename
<< " line " << config_lineno
<< ": " << config_input_line
);
164 debugs(28, DBG_CRITICAL
, "aclParseAccessLine: missing 'allow' or 'deny'.");
168 allow_t action
= ACCESS_DUNNO
;
169 if (!strcmp(t
, "allow"))
170 action
= ACCESS_ALLOWED
;
171 else if (!strcmp(t
, "deny"))
172 action
= ACCESS_DENIED
;
174 debugs(28, DBG_CRITICAL
, "aclParseAccessLine: " << cfg_filename
<< " line " << config_lineno
<< ": " << config_input_line
);
175 debugs(28, DBG_CRITICAL
, "aclParseAccessLine: expecting 'allow' or 'deny', got '" << t
<< "'.");
179 const int ruleId
= ((treep
&& *treep
) ? (*treep
)->childrenCount() : 0) + 1;
182 ctxBuf
.Printf("%s#%d", directive
, ruleId
);
185 Acl::AndNode
*rule
= new Acl::AndNode
;
186 rule
->context(ctxBuf
.content(), config_input_line
);
189 debugs(28, DBG_CRITICAL
, "aclParseAccessLine: " << cfg_filename
<< " line " << config_lineno
<< ": " << config_input_line
);
190 debugs(28, DBG_CRITICAL
, "aclParseAccessLine: Access line contains no ACL's, skipping");
195 /* Append to the end of this list */
199 *treep
= new Acl::Tree
;
200 (*treep
)->context(directive
, config_input_line
);
203 (*treep
)->add(rule
, action
);
205 /* We lock _acl_access structures in ACLChecklist::matchNonBlocking() */
208 // aclParseAclList does not expect or set actions (cf. aclParseAccessLine)
210 aclParseAclList(ConfigParser
&, Acl::Tree
**treep
, const char *label
)
212 // accomodate callers unable to convert their ACL list context to string
218 ctxLine
.Printf("(%s %s line)", cfg_directive
, label
);
221 Acl::AndNode
*rule
= new Acl::AndNode
;
222 rule
->context(ctxLine
.content(), config_input_line
);
227 ctxTree
.Printf("%s %s", cfg_directive
, label
);
230 // We want a cbdata-protected Tree (despite giving it only one child node).
231 Acl::Tree
*tree
= new Acl::Tree
;
233 tree
->context(ctxTree
.content(), config_input_line
);
240 /*********************/
241 /* Destroy functions */
242 /*********************/
245 aclDestroyAcls(ACL
** head
)
249 debugs(28, 8, "aclDestroyACLs: invoked");
251 for (ACL
*a
= *head
; a
; a
= next
) {
260 aclDestroyAclList(ACLList
**list
)
262 debugs(28, 8, "aclDestroyAclList: invoked");
268 aclDestroyAccessList(acl_access
** list
)
272 debugs(28, 3, "destroying: " << *list
<< ' ' << (*list
)->name
);
276 /* maex@space.net (06.09.1996)
277 * destroy an AclDenyInfoList */
280 aclDestroyDenyInfoList(AclDenyInfoList
** list
)
282 AclDenyInfoList
*a
= NULL
;
283 AclDenyInfoList
*a_next
= NULL
;
284 AclNameList
*l
= NULL
;
285 AclNameList
*l_next
= NULL
;
287 debugs(28, 8, "aclDestroyDenyInfoList: invoked");
289 for (a
= *list
; a
; a
= a_next
) {
290 for (l
= a
->acl_list
; l
; l
= l_next
) {
296 xfree(a
->err_page_name
);
297 memFree(a
, MEM_ACL_DENY_INFO_LIST
);