Hi all, Following on from mod_auth_bearer, this module provides a AuthtProviderAlias container, just like AuthnProviderAlias and AuthzProviderAlias. This time, with docs.
Regards, Graham — Index: modules/aaa/mod_autht_core.c =================================================================== --- modules/aaa/mod_autht_core.c (nonexistent) +++ modules/aaa/mod_autht_core.c (working copy) @@ -0,0 +1,227 @@ +/* Licensed to the Apache Software Foundation (ASF) under one or more + * contributor license agreements. See the NOTICE file distributed with + * this work for additional information regarding copyright ownership. + * The ASF licenses this file to You under the Apache License, Version 2.0 + * (the "License"); you may not use this file except in compliance with + * the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +/* + * Security options etc. + * + * Module derived from code originally written by Rob McCool + * + */ + +#include "apr_strings.h" +#include "apr_network_io.h" +#define APR_WANT_STRFUNC +#define APR_WANT_BYTEFUNC +#include "apr_want.h" + +#include "ap_config.h" +#include "httpd.h" +#include "http_config.h" +#include "http_core.h" +#include "http_log.h" +#include "http_request.h" +#include "http_protocol.h" +#include "ap_provider.h" + +#include "mod_auth.h" + +#if APR_HAVE_NETINET_IN_H +#include <netinet/in.h> +#endif + +typedef struct provider_alias_rec { + char *provider_name; + char *provider_alias; + ap_conf_vector_t *sec_auth; + const autht_provider *provider; +} provider_alias_rec; + +typedef struct autht_alias_srv_conf { + apr_hash_t *alias_rec; +} autht_alias_srv_conf; + + +module AP_MODULE_DECLARE_DATA autht_core_module; + +static autht_status authn_alias_check_token(request_rec *r, const char *type, + const char *token) +{ + /* Look up the provider alias in the alias list */ + /* Get the dir_config and call ap_Merge_per_dir_configs() */ + /* Call the real provider->check_password() function */ + /* return the result of the above function call */ + + const char *provider_name = apr_table_get(r->notes, AUTHT_PROVIDER_NAME_NOTE); + autht_status ret = AUTHT_MISMATCH; + autht_alias_srv_conf *authcfg = + (autht_alias_srv_conf *)ap_get_module_config(r->server->module_config, + &autht_core_module); + + if (provider_name) { + provider_alias_rec *prvdraliasrec = apr_hash_get(authcfg->alias_rec, + provider_name, APR_HASH_KEY_STRING); + ap_conf_vector_t *orig_dir_config = r->per_dir_config; + + /* If we found the alias provider in the list, then merge the directory + configurations and call the real provider */ + if (prvdraliasrec) { + r->per_dir_config = ap_merge_per_dir_configs(r->pool, orig_dir_config, + prvdraliasrec->sec_auth); + ret = prvdraliasrec->provider->check_token(r, type, token); + r->per_dir_config = orig_dir_config; + } + } + + return ret; +} + +static void *create_autht_alias_svr_config(apr_pool_t *p, server_rec *s) +{ + + autht_alias_srv_conf *authcfg; + + authcfg = (autht_alias_srv_conf *) apr_pcalloc(p, sizeof(autht_alias_srv_conf)); + authcfg->alias_rec = apr_hash_make(p); + + return (void *) authcfg; +} + +/* Only per-server directive we have is GLOBAL_ONLY */ +static void *merge_autht_alias_svr_config(apr_pool_t *p, void *basev, void *overridesv) +{ + return basev; +} + +static const autht_provider autht_alias_provider = +{ + &authn_alias_check_token +}; + +static const char *authaliassection(cmd_parms *cmd, void *mconfig, const char *arg) +{ + const char *endp = ap_strrchr_c(arg, '>'); + const char *args; + char *provider_alias; + char *provider_name; + int old_overrides = cmd->override; + const char *errmsg; + const autht_provider *provider = NULL; + ap_conf_vector_t *new_auth_config = ap_create_per_dir_config(cmd->pool); + autht_alias_srv_conf *authcfg = + (autht_alias_srv_conf *)ap_get_module_config(cmd->server->module_config, + &autht_core_module); + + const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY); + if (err != NULL) { + return err; + } + + if (endp == NULL) { + return apr_pstrcat(cmd->pool, cmd->cmd->name, + "> directive missing closing '>'", NULL); + } + + args = apr_pstrndup(cmd->temp_pool, arg, endp - arg); + + if (!args[0]) { + return apr_pstrcat(cmd->pool, cmd->cmd->name, + "> directive requires additional arguments", NULL); + } + + /* Pull the real provider name and the alias name from the block header */ + provider_name = ap_getword_conf(cmd->pool, &args); + provider_alias = ap_getword_conf(cmd->pool, &args); + + if (!provider_name[0] || !provider_alias[0]) { + return apr_pstrcat(cmd->pool, cmd->cmd->name, + "> directive requires additional arguments", NULL); + } + + if (strcasecmp(provider_name, provider_alias) == 0) { + return apr_pstrcat(cmd->pool, + "The alias provider name must be different from the base provider name.", NULL); + } + + /* Look up the alias provider to make sure that it hasn't already been registered. */ + provider = ap_lookup_provider(AUTHN_PROVIDER_GROUP, provider_alias, + AUTHN_PROVIDER_VERSION); + if (provider) { + return apr_pstrcat(cmd->pool, "The alias provider ", provider_alias, + " has already be registered previously as either a base provider or an alias provider.", + NULL); + } + + /* walk the subsection configuration to get the per_dir config that we will + merge just before the real provider is called. */ + cmd->override = OR_AUTHCFG | ACCESS_CONF; + errmsg = ap_walk_config(cmd->directive->first_child, cmd, new_auth_config); + cmd->override = old_overrides; + + if (!errmsg) { + provider_alias_rec *prvdraliasrec = apr_pcalloc(cmd->pool, sizeof(provider_alias_rec)); + provider = ap_lookup_provider(AUTHN_PROVIDER_GROUP, provider_name, + AUTHN_PROVIDER_VERSION); + + if (!provider) { + /* by the time they use it, the provider should be loaded and + registered with us. */ + return apr_psprintf(cmd->pool, + "Unknown Authn provider: %s", + provider_name); + } + + /* Save off the new directory config along with the original provider name + and function pointer data */ + prvdraliasrec->sec_auth = new_auth_config; + prvdraliasrec->provider_name = provider_name; + prvdraliasrec->provider_alias = provider_alias; + prvdraliasrec->provider = provider; + apr_hash_set(authcfg->alias_rec, provider_alias, APR_HASH_KEY_STRING, prvdraliasrec); + + /* Register the fake provider so that we get called first */ + ap_register_auth_provider(cmd->pool, AUTHT_PROVIDER_GROUP, + provider_alias, AUTHT_PROVIDER_VERSION, + &autht_alias_provider, + AP_AUTH_INTERNAL_PER_CONF); + } + + return errmsg; +} + +static const command_rec autht_cmds[] = +{ + AP_INIT_RAW_ARGS("<AuthtProviderAlias", authaliassection, NULL, RSRC_CONF, + "container for grouping an authentication provider's " + "directives under a provider alias"), + {NULL} +}; + +static void register_hooks(apr_pool_t *p) +{ + +} + +AP_DECLARE_MODULE(autht_core) = +{ + STANDARD20_MODULE_STUFF, + NULL, /* dir config creater */ + NULL, /* dir merger --- default is to override */ + create_autht_alias_svr_config, /* server config */ + merge_autht_alias_svr_config, /* merge server config */ + autht_cmds, + register_hooks /* register hooks */ +}; + Index: docs/manual/mod/mod_autht_core.xml =================================================================== --- docs/manual/mod/mod_autht_core.xml (nonexistent) +++ docs/manual/mod/mod_autht_core.xml (working copy) @@ -0,0 +1,104 @@ +<?xml version="1.0"?> +<!DOCTYPE modulesynopsis SYSTEM "../style/modulesynopsis.dtd"> +<?xml-stylesheet type="text/xsl" href="../style/manual.en.xsl"?> +<!-- $LastChangedRevision: 1834267 $ --> + +<!-- + Licensed to the Apache Software Foundation (ASF) under one or more + contributor license agreements. See the NOTICE file distributed with + this work for additional information regarding copyright ownership. + The ASF licenses this file to You under the Apache License, Version 2.0 + (the "License"); you may not use this file except in compliance with + the License. You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + + Unless required by applicable law or agreed to in writing, software + distributed under the License is distributed on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + See the License for the specific language governing permissions and + limitations under the License. +--> + +<modulesynopsis metafile="mod_autht_core.xml.meta"> + +<name>mod_autht_core</name> +<description>Core Token Handling</description> +<status>Base</status> +<sourcefile>mod_autht_core.c</sourcefile> +<identifier>autht_core_module</identifier> +<compatibility>Available in Apache 2.5 and later</compatibility> + +<summary> + <p>This module provides core token handling capabilities to + allow or deny access to portions of the web site. + <module>mod_autht_core</module> provides directives that are + common to all token providers.</p> +</summary> + +<section id="authtalias"><title>Creating Token Provider Aliases</title> + + <p>Extended token providers can be created within the configuration + file and assigned an alias name. The alias providers can then be + referenced through the + <directive module="mod_auth_bearer">AuthBearerProvider</directive> + directive in the same way as a base token provider. Besides the + ability to create and alias an extended provider, it also allows + the same extended token provider to be reference by multiple + locations.</p> + + <section id="example"><title>Examples</title> + + <p>This example checks for JWT token signatures in two different + secret files.</p> + + <example><title>Checking multiple sources for JWT tokens</title> + <highlight language="config"> +# Check here first +<AuthtProviderAlias jwt jwt1> + AuthtJwtVerify hs256 file "/www/conf/realm1.secret" +</AuthtProviderAlias> + +# Then check here +<AuthtProviderAlias jwt jwt2> + AuthtJwtVerify hs256 file "/www/conf/realm2.secret" +</AuthtProviderAlias> + +<Directory "/var/web/pages/secure"> + AuthBearerProvider jwt1 jwt2 + + AuthType Basic + AuthName "Protected Area" + Require valid-user +</Directory> + </highlight> + </example> + + </section> + +</section> + +<directivesynopsis type="section"> +<name>AuthtProviderAlias</name> +<description>Enclose a group of directives that represent an +extension of a base token provider and referenced by the specified +alias</description> +<syntax><AuthtProviderAlias <var>baseProvider Alias</var>> +... </AuthtProviderAlias></syntax> +<contextlist><context>server config</context> +</contextlist> + +<usage> + <p><code><AuthtProviderAlias></code> and + <code></AuthtProviderAlias></code> are used to enclose a group of + authentication directives that can be referenced by the alias name + using the + <directive module="mod_auth_bearer">AuthBearerProvider</directive>.</p> + + <note>This directive has no affect on authentication or authorization, + even for modules that provide both authentication and authorization + in addition to token handling.</note> +</usage> +</directivesynopsis> + +</modulesynopsis> Index: docs/manual/mod/mod_autht_core.xml.meta =================================================================== --- docs/manual/mod/mod_autht_core.xml.meta (nonexistent) +++ docs/manual/mod/mod_autht_core.xml.meta (working copy) @@ -0,0 +1,12 @@ +<?xml version="1.0" encoding="UTF-8" ?> +<!-- GENERATED FROM XML: DO NOT EDIT --> + +<metafile reference="mod_autht_core.xml"> + <basename>mod_autht_core</basename> + <path>/mod/</path> + <relpath>..</relpath> + + <variants> + <variant>en</variant> + </variants> +</metafile>
smime.p7s
Description: S/MIME cryptographic signature