/* * Copyright (C) 2015-2020 "IoT.bzh" * Author "Fulup Ar Foll" * Author José Bollo * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #define _GNU_SOURCE #include #include #include #include #if WITH_LEGACY_BINDING_V1 #include #endif #include "afb-auth.h" #include "afb-context.h" #include "afb-xreq.h" #include "verbose.h" int afb_auth_check(struct afb_context *context, const struct afb_auth *auth) { switch (auth->type) { default: case afb_auth_No: return 0; case afb_auth_Token: return afb_context_check(context); case afb_auth_LOA: return afb_context_check_loa(context, auth->loa); case afb_auth_Permission: return afb_context_has_permission(context, auth->text); case afb_auth_Or: return afb_auth_check(context, auth->first) || afb_auth_check(context, auth->next); case afb_auth_And: return afb_auth_check(context, auth->first) && afb_auth_check(context, auth->next); case afb_auth_Not: return !afb_auth_check(context, auth->first); case afb_auth_Yes: return 1; } } #if WITH_LEGACY_BINDING_V1 int afb_auth_check_and_set_session_x1(struct afb_xreq *xreq, int sessionflags) { int loa; if ((sessionflags & (AFB_SESSION_CLOSE_X1|AFB_SESSION_CHECK_X1|AFB_SESSION_LOA_EQ_X1)) != 0) { if (!afb_context_check(&xreq->context)) { afb_context_close(&xreq->context); return afb_xreq_reply_invalid_token(xreq); } } if ((sessionflags & AFB_SESSION_LOA_GE_X1) != 0) { loa = (sessionflags >> AFB_SESSION_LOA_SHIFT_X1) & AFB_SESSION_LOA_MASK_X1; if (!afb_context_check_loa(&xreq->context, loa)) return afb_xreq_reply_insufficient_scope(xreq, "invalid LOA"); } if ((sessionflags & AFB_SESSION_LOA_LE_X1) != 0) { loa = (sessionflags >> AFB_SESSION_LOA_SHIFT_X1) & AFB_SESSION_LOA_MASK_X1; if (afb_context_check_loa(&xreq->context, loa + 1)) return afb_xreq_reply_insufficient_scope(xreq, "invalid LOA"); } if ((sessionflags & AFB_SESSION_CLOSE_X1) != 0) { afb_context_change_loa(&xreq->context, 0); afb_context_close(&xreq->context); } return 1; } #endif int afb_auth_check_and_set_session_x2(struct afb_xreq *xreq, const struct afb_auth *auth, uint32_t sessionflags) { int loa; if (sessionflags != 0) { if (!afb_context_check(&xreq->context)) { afb_context_close(&xreq->context); return afb_xreq_reply_invalid_token(xreq); } } loa = (int)(sessionflags & AFB_SESSION_LOA_MASK_X2); if (loa && !afb_context_check_loa(&xreq->context, loa)) return afb_xreq_reply_insufficient_scope(xreq, "invalid LOA"); if (auth && !afb_auth_check(&xreq->context, auth)) return afb_xreq_reply_insufficient_scope(xreq, NULL /* TODO */); if ((sessionflags & AFB_SESSION_CLOSE_X2) != 0) afb_context_close(&xreq->context); return 1; } /*********************************************************************************/ static struct json_object *addperm(struct json_object *o, struct json_object *x) { struct json_object *a; if (!o) return x; if (!json_object_object_get_ex(o, "allOf", &a)) { a = json_object_new_array(); json_object_array_add(a, o); o = json_object_new_object(); json_object_object_add(o, "allOf", a); } json_object_array_add(a, x); return o; } static struct json_object *addperm_key_val(struct json_object *o, const char *key, struct json_object *val) { struct json_object *x = json_object_new_object(); json_object_object_add(x, key, val); return addperm(o, x); } static struct json_object *addperm_key_valstr(struct json_object *o, const char *key, const char *val) { return addperm_key_val(o, key, json_object_new_string(val)); } static struct json_object *addperm_key_valint(struct json_object *o, const char *key, int val) { return addperm_key_val(o, key, json_object_new_int(val)); } static struct json_object *addauth_or_array(struct json_object *o, const struct afb_auth *auth); static struct json_object *addauth(struct json_object *o, const struct afb_auth *auth) { switch(auth->type) { case afb_auth_No: return addperm(o, json_object_new_boolean(0)); case afb_auth_Token: return addperm_key_valstr(o, "session", "check"); case afb_auth_LOA: return addperm_key_valint(o, "LOA", auth->loa); case afb_auth_Permission: return addperm_key_valstr(o, "permission", auth->text); case afb_auth_Or: return addperm_key_val(o, "anyOf", addauth_or_array(json_object_new_array(), auth)); case afb_auth_And: return addauth(addauth(o, auth->first), auth->next); case afb_auth_Not: return addperm_key_val(o, "not", addauth(NULL, auth->first)); case afb_auth_Yes: return addperm(o, json_object_new_boolean(1)); } return o; } static struct json_object *addauth_or_array(struct json_object *o, const struct afb_auth *auth) { if (auth->type != afb_auth_Or) json_object_array_add(o, addauth(NULL, auth)); else { addauth_or_array(o, auth->first); addauth_or_array(o, auth->next); } return o; } struct json_object *afb_auth_json_x2(const struct afb_auth *auth, uint32_t session) { struct json_object *result = NULL; if (session & AFB_SESSION_CLOSE_X2) result = addperm_key_valstr(result, "session", "close"); if (session & AFB_SESSION_CHECK_X2) result = addperm_key_valstr(result, "session", "check"); if (session & AFB_SESSION_REFRESH_X2) result = addperm_key_valstr(result, "token", "refresh"); if (session & AFB_SESSION_LOA_MASK_X2) result = addperm_key_valint(result, "LOA", session & AFB_SESSION_LOA_MASK_X2); if (auth) result = addauth(result, auth); return result; } #if WITH_LEGACY_BINDING_V1 struct json_object *afb_auth_json_x1(int session) { struct json_object *result = NULL; if (session & AFB_SESSION_CLOSE_X1) result = addperm_key_valstr(result, "session", "close"); if (session & AFB_SESSION_CHECK_X1) result = addperm_key_valstr(result, "session", "check"); if (session & AFB_SESSION_RENEW_X1) result = addperm_key_valstr(result, "token", "refresh"); if (session & AFB_SESSION_LOA_MASK_X1) result = addperm_key_valint(result, "LOA", (session >> AFB_SESSION_LOA_SHIFT_X1) & AFB_SESSION_LOA_MASK_X1); return result; } #endif